Engineering Homework Help

Engineering Homework Help. Campbellsville University Nine Step Process in Conducting a Neural Network Project Questions

I’m working on a Engineering exercise and need support.

Please select a topic from the below list and create a one-page essay answering the question noted below.

Please use at least one reference and ensure it’s in APA format (as well as the in-text citation). Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

  • Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  • List and briefly describe the nine-step process in conducting a neural network project.
  • What is the main difference between classification and clustering? Explain using concrete examples.
  • What are the privacy issues with data mining? Do you think they are substantiated?

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. QSO 320 Southern New Hampshire University Module 4 Labor Hours and Cost Worksheet

page1image1744538480QSO 320 Module Four Assignment Guidelines and Rubric

Overview: For this assignment, you will continue to build on your Labor Hours spreadsheet to examine the actual costs of a business project.

Prompt: Using the Labor Hours spreadsheet, expand the table in the Data tab to capture the actual cost of this project by performing the following steps:

  1. Total the complete labor cost.
    1. a) Add a column that totals the labor for each employee, given the added criteria. (See the last two bullets in the scenario box below.)
    2. b) Total the complete labor cost.
  2. Think about what additional costs would contribute to the overall cost of the project.
    1. a) Below is a list to consider. Add additional columns to capture these costs. (Note: Not all of these should be included; read each bullet carefully.)
      1. The project is located 30 miles from the office, and the company pays the employees .54¢ per mile to travel to the worksite and back.
      2. You are using $1,000 in materials left over from another project.
      3. Because the worksite is in a remote location, a portable office with restrooms had to be leased at a cost of $300 per day.
      4. At the cost of $350 per employee, the company provides all employees with uniforms and safety equipment. This equipment is replacedon a yearly basis.
      5. The company pays for a $60 food platter to be delivered to the site every day to feed all of the workers.
      6. Fuel to run the generator in the portable office costs $10 per day and is included in the lease agreement.
      7. A security service had to be contracted by the company to safeguard the worksite 24 hours a day at the cost of $720 per day.
    2. b) Total the entire project cost.
  3. Create a new tab titled Actual. Provide a summary statement that recommends reducing costs without lowering labor rates.

page1image1744538768 page1image1744539056page1image1744539344

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. University of Chicago Numerical Finite Element Model Discussion

I am looking for someone how is expert in Structure engineering specially in SC-CBF systems to write my report engineering. The topic of my report is “Analysis on Numerical Finite Element Model of a 3D Structure and how it impacts the unique structural components”. Also I need my report also talking about (How the system expect to behave when pushing the system)

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Campbellsville University Agents Responsibility and Beverage Business Discussion

You have recently been promoted to district manager of a large scale restaurant chain which specializes in affordable meals in a pleasant environment. In accordance with management objectives, you are responsible for increasing sales of appetizers by 20 percent by the next quarter for the 15 locations in your area. Keeping channel richness in mind, how will you make contact with the restaurant employees to facilitate the sales increase? 

2)Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.

Also, provide a graduate-level response to each of the following questions:

  1. Explain and analyze the duties owed by each party in an agent/principal relationship.
  2. What steps should an organization take to limit apparent authority that it does not intent to bestow on an agent?

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Morgan State University Project Constraints Assumptions Sample

Please help me design a two stage amplifier circuit, the first gate needs to be Common Drain and the second needs to be Common Gate. I am struggling designing the correct parameters for my circuit using LTSPICE and need major help comparing the circuit to hand calculations

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Southern New Hampshire University Virtual Personal Assistant Discussion

Need help with my Information Technology question – I’m studying for my class.

1-1 Discussion: Your Experience with Virtual Personal AssistantsDiscussion Topic

Task: Reply to this topic

In your initial post

consider the VPA used in the business trip described in the required reading, as well as virtual assistants such as Alexa, Cortana, Siri, and Google Maps that may be familiar to you. Describe the virtual assistant you use most throughout your day or would use if you had access to it.

Your description will include:

  • How often do you or would you use it?
  • What does the service offer that you need?
  • How does it meet your personal user requirements?
  • Why would you choose one service over another?
    • Do you consider your privacy and the trust you have for a specific brand?
    • Do you consider ease of use or access to the product?

Some people, as seen in this opinion article, Is Technology Making Us Lazy?, believe that the use of VPAs is encouraging laziness and a lack of self-reliance. People no longer know what to do when they lose a signal and can’t use GPS. Many would be lost if their phone battery died and they needed a friend’s phone number.

Do you agree or disagree with the idea that VPAs have caused individuals to become less self-reliant and have impacted basic problem solving skills? Please support your view.

In your response to a peer, provide at least one additional use for the VPA that was described in the initial prompt and explain why you either agree or disagree with the stance they took concerning the impact of VPAs on self-reliance and basic problem solving skills.

.https://medium.com/digital-society/is-technology-m…

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. SNHU Ethical Decisions in Information Security Discussion & Responses

1-1 Discussion: What Would You Do?Discussion Topic

Task: Reply to this topic

Select one of the scenarios below, which involve making ethical decisions in IT.

In your initial post for this week, answer the following questions:

  • State which scenario you have selected
  • Describe the legal and ethical considerations in the scenario
  • Explain what you would do, given the scenario

In your responses to your peers:

  • Explain whether you agree or disagree with the decision that your peer has made, and provide a rationale

Scenario 1: You are a new employee in the role of senior solutions architect. You have over 10 years of experience as a solutions architect in a large company known for its cutting-edge technology. Your new company asks you about the tools and content that were in the information technology infrastructure library (ITIL) at your previous company. Your new company’s leadership is wondering if you can embed some of your previous company’s best practices into the ITIL to ensure that IT practices are up to date. After all, you were hired to help your current employer stand out among its competitors.

Scenario 2: You work in the IT department for an institution of higher education. You complete a routine security audit for one of its systems that contains confidential student information. During the audit, you notice several areas of vulnerability, such as a lack of encryption on certain files and no password protections for searching student information. You bring these concerns up to your supervisor, who says that the department’s budget is too tight right now and they don’t have enough personnel to update the system. There are also a lot of staffing switches taking place across departments, and there is a concern that job responsibilities will quickly change among leadership positions. 

Post 1:

Christine Dickinson posted Jun 28, 2021 3:26 PM

Subscribe

Hi Class!

For my discussion, I chose Scenario 2.

There are many legal and ethical considerations when dealing with personal information. From ACM’s code of ethics, computing professionals should avoid harm, respect privacy, honor confidentiality, strive to achieve high quality in both processes and products of professional work, design and implement systems that are robustly and usably secure, and recognize and take special care of systems that become integrated into the infrastructure of society. All these principles are at risk of being violated in this scenario.

If a student’s financial information is available through the system and passwords aren’t required for accessing this information, students could have their identities stolen, causing harm. The student’s privacy and confidentiality are not being respected as they are not a priority for the supervisor. Missing encryptions and not requiring passwords for access is forcing the employee to produce low quality processes and products. The employee is not being allowed to develop a system that is robustly and usably secure, even though it has been integrated into the infrastructure of society through education.

Depending on where the institution is located, there are federal and potentially state laws that would need to be considered. The Federal Information Security Management Act (FISMA) requires universities to implement security programs and policies, assess risk, and test controls (Higher Education Compliance Alliance, 2019). There are also state laws like Kentucky’s HB 5 law which mandates that higher education institutions have data security and breach procedures in place (Vance, 2018).

Per the ACM code of ethics, when you notice a breach of the Code, action should be taken to resolve the ethical issue. After my supervisor dismissed my initial concerns, I would draft a document that included the noted the potential legal ramifications and different breaches that could occur. I would bring this to my supervisor and highlight the risks. If they were still unwilling to make changes, I would bring it to their supervisor and file a formal complaint.

References

The Code affirms an obligation of computing professionals to use their skills for the benefit of society. Code of Ethics. (n.d.). https://www.acm.org/code-of-ethics.

Higher Education Compliance Alliance. (2019, July 24). Compliance Matrix. Higher Education Compliance Alliance. https://www.higheredcompliance.org/compliance-matrix/.

Vance, A. (2018). Privacy Laws Protecting Student Data. EDUCAUSE Review. https://er.educause.edu/blogs/2018/1/privacy-laws-protecting-student-data

Post 2:

1-1 Discussion: What Would You Do?

Contains unread posts

Filippo Lussana posted Jun 28, 2021 6:14 PM

Subscribe

Hi everyone!

For my discussion post, I chose Scenario 1.

In this scenario, I’m a new employee in the role of senior solutions architect. My new company asked me about tools and content in the information technology infrastructure library at my previous company and if I could embed some of those best practices into the current company ITIL.

Most likely, the contract in the previous company contained some copyright laws and confidentiality agreements that are legally enforceable. Therefore, violating them by sharing best practices and private information with another company would constitute a crime. There will also be ethical considerations as sharing that information would be against the ACM Code of Ethics and Professional Conduct for points 1.5 and 1.7. Point 1.5 states that “computing professionals should credit the creators of ideas, inventions, work, and artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods of protecting authors’ works” (ACM Code of Ethics and Professional Conduct 2018). At the same time, point 1.7 Honor confidentiality states that “Computing professionals should protect confidentiality except in cases where it is evidence of the violation of law, of organizational regulations, or of the Code” ( ACM Code of Ethics and Professional Conduct 2018). Each point provides a great overview regarding the ethical implications when it is about respecting copyrights and confidentiality.

Given the scenario, I would immediately let the company’s leadership know that sharing the best practices and tools I used in the previous company is unethical and could also escalate to legal problems both for the company and for me. For example, it might be against copyright laws and the contract rules I signed with the previous company. I would share that information only if I’m sure they are public domain or allowed from the prior company regulations.

References

ACM Code of Ethics and Professional Conduct. Association for Computing Machinery. (2018, June 22). https://www.acm.org/code-of-ethics. 

Engineering Homework Help

Engineering Homework Help

Engineering Homework Help. Southern New Hampshire University Database Uses Discussion

I need an explanation for this Information Technology question to help me study.

1-1 Discussion: Database BasicsDiscussion Topic

Task: Reply to this topic

In your initial post, begin by how you hope this course will help you with your professional goals. Then, answer the following questions:

  • Have you ever had a chance to use a database? If so, how did it help? If not, how might one help in the future?
  • What would you need to consider in making a diagram of a database? What information would you need to create one?

Respond to at least two of your classmates’ posts. Address the following when responding:

  • Identify pros and cons about the ways that those databases have been used.

Your responses should show that you have given thought to what your classmates’ initial posts stated. Your responses should push the conversation forward, offer insights, and ask clarifying questions if necessary.

Engineering Homework Help