Categories
Technology

Current status of US general aviation, regional and international airports, post

Current status of US general aviation, regional and international airports, post pandemic
[UPSELL_BEGIN]
digital_copies_of_sources_used = 0
plagiarism = 0
pref_writer = 0
urgent_writer_assign = 0
version = 4; Technical line. Don’t touch!
[UPSELL_END]

Categories
Technology

The topic is broad.

its about application of technology in health care
The topic is broad. You have to select a focus for your literature search. This focus should be reflected in your title. Remember to narrow down your topic.
Your introduction can contain a general discussion of the topic. At the end of your introductory paragraph you MUST identify the specific focus or research question that guide your selection of literature. You will also need to use SIGNPOSTING in order to structure your literature review.
All of the articles you decide to include in your review should be organized into sections. Each section must include the articles which belong to a common theme (i.e. your ‘common theme’ might be a similar research methodology OR a similar topic or technology).
You can use headings/subheading for your themes (but this is not compulsory).
The conclusion restates the focus of your literature collection and summarizes prominent themes that emerged from your review.
In the final list of references you include ONLY those sources that you reference in the text of your review.
Use APA7th edition referencing style guide. The guide can be found online – it is free and is accessible to the general public.

Categories
Technology

Similar to the previous project, this esssy is again focusing on your critical thinking skills.

Similar to the previous project, this esssy is again focusing on your critical thinking skills. Because one thing happens-you oversleep, for example (cause)-something else happens-you miss class and therefore an assignment (effect). While the cause is a mistake, the effect is still a negative outcome. You will brainstorm various causes and their potential effects as you create your topic.
These topigs will be more global than our first essays-think of things in the world around us that have causes and effects. Previous students have written about electric cars and their effect on carbon emissions, social media and the effect on self image or productivity, and gardening and its effect on the bee population. You will need three in text citations and a works cited page, which is not included in the word count.

Categories
Technology

The second research paper the student should compare the two different paradigms for certification and accreditation: vulnerability focused versus risk based.

The second research paper the student should compare the two different paradigms for certification and accreditation: Vulnerability Focused versus Risk Based.

Categories
Technology

Research one nation state backed advanced persistent threat (apt) and write a 2-page paper that includes the following:

Research one nation state backed advanced persistent threat (APT) and write a 2-page paper that includes the following:
Summary of the APT and Nat …

Categories
Technology

How should the goals be pursued?

Write a five to seven-page, 12-point font, double-spaced paper outlining your response. Use citations as appropriate. Please marshal evidence in support of your argument. Do not write a purely rhetorical answer.
The NSC staff is working on a government-wide initiative on genome editing. The State Department goals proposed by the NSC staff are: (1) “Extend, deepen, and build data sharing agreements with friends and allies abroad; and (2) Build appropriate international norms on heritable human genome editing.” The Secretary of State has requested your views on the following issues:
Is the NSC list comprehensive? Should other initiatives be pursued abroad? What should be occurring in the domestic context to make the international efforts meaningful?
Are the initiatives worthwhile and in the right priority order? Please explain your reasoning. The Secretary doesn’t really know anything about Artificial Intelligence and needs background to understand the point of the initiatives and judge their relative importance.
How should the goals be pursued? Include the type of international treaty/regime/norm that could serve as a model with a discussion of its strengths and weaknesses.
Notes:
1.How does supervised learning work?
Labeled training database with both inputs and outputs
Objective is to develop an algorithm that reliably translates input into outputs
Then, a user could have only the inputs and the well-trained algorithm and venture into the world confident they can make good predictions about the expected outputs
To develop a “well-trained” algorithm: as reviewing the training database, an algorithm is posited and then refined
Extra: Host of challenges confront the effort to make the algorithm “well-trained”
2.Your company has had multiple phishing attacks. The attacks are all very similar, yet they are sent to different subsets of employees, at least one of whom seems invariably to be lured to open the attack, leading to the computer system being corrupted. You have been asked to outline an AI program that could prevent this problem and to identify any follow-up questions from an AI point of view that should be considered before developing and deploying the algorithm.
Basic strategy: create large training database of historical “regular, safe” e-mails and “phishing” e-mails and annotate each of the e-mails by hand. Train an algorithm to identify the “phishing” emails based on the training database. Deploy the algorithm, once it is well-trained, to flag new “phishing” e-mails and prevent employees from opening them until they have been carefully evaluated by IT experts.
Alternative strategy: create training database of (1) employees who seem particularly vulnerable to opening these problematic e-mails; and (2) employees who properly identify them before opening them. Annotate each employees’ status by hand. Train an algorithm to identify employees vulnerable to opening the attacks and provide them with additional training or filters on their computers.
Questions: show sensitivity to the issue of whether there are enough cases in the company to have a large enough and representative enough training database; Are the technical characteristics of the phishing attacks going to change to defeat the algorithm? Other sources of potential weakness of propose strategy.
3.How do neural networks work?
Provide inputs (which often consist of multiple data points like size, number of bedrooms, location) and outputs (price of house) in training data base
The algorithm itself identifies intermediate, hidden layers which represent interaction effects between data points
Proposed algorithm iterated thousands of times to optimize the relative weighting of the hidden intermediate nodes
Neural networks (deep learning) can supplement any of three major types of machine learning – supervised, unsupervised, and reinforcement learning
The addition of neural networks, with the intermediate layers and the optimization of their relative weighting ,increases the accuracy of the resulting algorithm, often by 20 -40 percent
These hidden nodes are a “black box” but techniques to reveal their impact on the algorithm and hence predicted output are improving rapidly
4.Neural networks raise a host of policy questions. What are these questions and how should we think about them?
Some assortment of “black box” problems and managing/solving it over time; consumption of computational power; can buibcild in insurmountable monopoly power; other

Categories
Technology

Ubcise formal and passive voice

the report should be about why we need to replace our current free packet snifer wireshark with the pay version of solarwinds and the benefits over the cost.
ubcise formal and passive voice

Categories
Technology

Please use academic articles to support the report.

this assignment is about developing a strategy in kiwi rail which is located in NZ. I have added the instructions file which needs to be read before doing the assessment, Then you need to have a look at the presentation to be related to it. also there is about six files more which the included information need to be in the report because the uni wants to see that I employ what they teach us in our writting. leave a space for the name and student ID number and please send it to me in a word format. the reference need to be in APA7. PLEASE USE ACADEMIC articles to support the report. (the information used must be linkbcied to new zealand environment please.

Categories
Technology

Ubcise formal and passive voice

the report should be about why we need to replace our current free packet snifer wireshark with the pay version of solarwinds and the benefits over the cost.
ubcise formal and passive voice

Categories
Technology

Do not write a purely rhetorical answer.

Write a five to seven-page, 12-point font, double-spaced paper outlining your response. Use citations as appropriate. Please marshal evidence in support of your argument. Do not write a purely rhetorical answer. The NSC staff is working on a government-wide initiative on genome editing. The State Department goals proposed by the NSC staff are: (1) “Extend, deepen, and build data sharing agreements with friends and allies abroad; and (2) Build appropriate international norms on heritable human genome editing.” The Secretary of State has requested your views on the following issues: Is the NSC list comprehensive? Should other initiatives be pursued abroad? What should be occurring in the domestic context to make the international efforts meaningful?
Are the initiatives worthwhile and in the right priority order? Please explain your reasoning. The Secretary doesn’t really know anything about Artificial Intelligence and needs background to understand the point of the initiatives and judge their relative importance. How should the goals be pursued? Include the type of international treaty/regime/norm that could serve as a model with a discussion of its strengths and weaknesses. Notes: 1.How does supervised learning work?
Labeled training database with both inputs and outputs
Objective is to develop an algorithm that reliably translates input into outputs Then, a user could have only the inputs and the well-trained algorithm and venture into the world confident they can make good predictions about the expected outputs
To develop a “well-trained” algorithm: as reviewing the training database, an algorithm is posited and then refined
Extra: Host of challenges confront the effort to make the algorithm “well-trained”
2.Your company has had multiple phishing attacks. The attacks are all very similar, yet they are sent to different subsets of employees, at least one of whom seems invariably to be lured to open the attack, leading to the computer system being corrupted. You have been asked to outline an AI program that could prevent this problem and to identify any follow-up questions from an AI point of view that should be considered before developing and deploying the algorithm. Basic strategy: create large training database of historical “regular, safe” e-mails and “phishing” e-mails and annotate each of the e-mails by hand. Train an algorithm to identify the “phishing” emails based on the training database. Deploy the algorithm, once it is well-trained, to flag new “phishing” e-mails and prevent employees from opening them until they have been carefully evaluated by IT experts. Alternative strategy: create training database of (1) employees who seem particularly vulnerable to opening these problematic e-mails; and (2) employees who properly identify them before opening them. Annotate each employees’ status by hand. Train an algorithm to identify employees vulnerable to opening the attacks and provide them with additional training or filters on their computers. Questions: show sensitivity to the issue of whether there are enough cases in the company to have a large enough and representative enough training database; Are the technical characteristics of the phishing attacks going to change to defeat the algorithm? Other sources of potential weakness of propose strategy.
3.How do neural networks work?
Provide inputs (which often consist of multiple data points like size, number of bedrooms, location) and outputs (price of house) in training data base
The algorithm itself identifies intermediate, hidden layers which represent interaction effects between data points
Proposed algorithm iterated thousands of times to optimize the relative weighting of the hidden intermediate nodes Neural networks (deep learning) can supplement any of three major types of machine learning – supervised, unsupervised, and reinforcement learning
The addition of neural networks, with the intermediate layers and the optimization of their relative weighting ,increases the accuracy of the resulting algorithm, often by 20 -40 percent
These hidden nodes are a “black box” but techniques to reveal their impact on the algorithm and hence predicted output are improving rapidly
4.Neural networks raise a host of policy questions. What are these questions and how should we think about them?
Some assortment of “black box” problems and managing/solving it over time; consumption of computational power; can buibcild in insurmountable monopoly power; other