Category: Computer Science

  • The research paper aims to compare various pretrained Cnn(Convolution neural net

    The research paper aims to compare various pretrained Cnn(Convolution neural net

    The research paper aims to compare various pretrained Cnn(Convolution neural network) models to analyze labelled dataset of cars to ascertain if it’s total loss or not. We aim to compare the various models in terms
    of their accuracy, precision and various other benchmarks to decide what model can be used to best
    determine if the damage is total loss or not.
    The attached file contains more information about the dataset. The evaluation metrics should compare ( AlexNet, VGG16 and ResNet) the models mentioned in the attached file on the datasets mentioned. I will get the code and charts.
    I would need the writer to get the abstract, methodologies, research already done in the field with reference and how does the current research aim to better the previous work or why is it different.
    example of the format and structure expected –
    https://pureadmin.qub.ac.uk/ws/portalfiles/portal/505842216/Vehicle_damage_severity_estimation.pdf#page=12&zoom=100,65,608

  • you know my research so please make sure you make an appealing presentation with

    you know my research so please make sure you make an appealing presentation with

    you know my research so please make sure you make an appealing presentation with simple English and slides should be easy to read (not so much text) and eye-friendly figures. I’ll attach my previous presentation file (which was bad and rejected by my professores)

  • In Phase 2, the student will develop a methods section, similar to a research me

    In Phase 2, the student will develop a methods section, similar to a research me

    In Phase 2, the student will develop a methods section, similar to a research methods section of a
    journal article. Methods will support the framework and standards that will be used to compare
    the old information system analysis and design to the new information system.
    his report must contain the following elements:
    I. Please reference the grading rubric for all minimums.
    II. Cover page
    III. Table of Contents (TOC)
    IV. Every section must be well supported with scholarly information systems journal articles.
    V. Introduction and conclusion sections.
    a. A succinct, high quality, and well supported introduction and conclusion should be written.
    b. Introduce the primary goals of this particular phase, the coinciding objectives, and the outcomes.
    c. The conclusion should be one of the final headings of the paper and conclude the current phase. In addition, highlight the upcoming objectives and deliverables.
    VI. Literature review and systems analysis and design methodology.
    a. Construct a well-supported review of literature related to the problem.
    b. Define a clear literature review style and theme. Different types exist.
    c. Detail and support the objective framework(s) and sub-standards that will be used
    to compare the old and new systems.
    d. Explain the stages and methods of the systems development life cycle.
    e. Support the use of rapid application development methodologies.
    I attached the rubric. I will focus on the diagrams based on my code.
    The problem being addressed is improving the workflows within Dentrix, a dental program, so that Air Force Dental Services can utilize it better. Currently no way to pull individuals up by their readiness class and hard to track those members that are not deployable or dental readiness class 3 and 4.

  • Initial assign : $20 Bonus + : $280 (You will receive the whole amount $300. To

    Initial assign : $20 Bonus + : $280 (You will receive the whole amount $300. To

    Initial assign : $20 Bonus + : $280 (You will receive the whole amount $300. To assign I have to use $20 for you to start)

  • Preparatory Instructions: Please be sure to read Chapter 6 – Data Modeling (pp

    Preparatory Instructions:
    Please be sure to read Chapter 6 – Data Modeling (pp

    Preparatory Instructions:
    Please be sure to read Chapter 6 – Data Modeling (pp 187 – 213, Systems Analysis & Design text).
    Entity Relationship Diagrams (known as ERDs) depict the data that will be used and created in a system and provides business requirements details such as the type and amount of each data element as well as the relationships between data entities.
    This week we will practice creating ERDs. You will find that ERDs are very commonly used and can be a critical tool used during requirements analysis and design phases.
    Objectives:
    This week’s assignment is to apply each Normalization rule to the Inventory Order model to reach the 3rd Normal Form.
    The system development team at the Wilcon Company is working on developing a new customer order entry system. In the process of designing the new system, the team has identified the following data entity attributes:
    Inventory Order
    Order Number (identifier)
    Order Date
    Customer Name
    Street Address
    City
    State
    Zip
    Customer Type
    Initials
    District Number
    Region Number
    1 to 22 occurrences of:
    Item Name
    Quantity Ordered
    Item Unit
    Quantity Shipped
    Item Out
    Quantity Received
    Example:
    Entity Relationship Diagram for Music CD Information
    Deliverables:
    Apply each normalization rule in order (1 to 3) to reach the 3rd Normal form.
    Apply first normal form rules and provide result as 1st normal form. Provide a brief description of what was applied to reach 1st normal form as well as the model in 1st normal form.
    Apply second normal form rules and provide result as 2nd normal form. Provide a brief description of what was applied to reach 2nd normal form as well as the model in 2nd normal form.
    Apply third normal form and provide result as 3rd normal form. Provide a brief description of what was applied to reach 3rd normal form as well as the model in 3rd normal form.
    Submit your Entity Relationship Models (1st thru 3rd normal form) as Visio, Word or image files to Canvas

  • prepare an eight-to-ten-page analytical summary of your research in which you id

    prepare an eight-to-ten-page analytical summary of your research in which you id

    prepare an eight-to-ten-page analytical summary of your research in which you identify and discuss the role of AI in Cybersecurity. Your summary should address the following:
    The NIST Artificial Intelligence Resource Center (AIRC) supports the development and deployment of trustworthy and responsible AI technologies. This site provides an excellent set of resources for providing guardrails for AI development and deployment.
    A descriiption of current uses of AI across the government and other sectors. Include specific use cases for cybersecurity.
    Describe the strengths, weaknesses, opportunities and threats (SWOT) for using AI in general and specifically for cybersecurity.

    Discuss and make specific recommendations on how you could apply the AI RMF framework and associated playbook to AI applications you are considering or might consider in the future to be implemented.
    Summarize you paper in a short conclusion section.
    Provide all associated references using APA style

  • Follow the the table of content listed below and use the PRINCE2 methodology : S

    Follow the the table of content listed below and use the PRINCE2 methodology :
    S

    Follow the the table of content listed below and use the PRINCE2 methodology :
    Section1 – PROJECT PLAN
    TASK 1 -A Business Case
    1.1 A brief rationale for the project
    1.2 Summary of benefits
    1.3 Current Problem, proposed solution and alternatives
    1.4 Cost/Benefit analysis
    TASK 1B – Project Initiation Document
    B.1 Purpose of PID
    B.2 Case Study Background
    B.3 Project Objectives
    B.4 Project Management Structure and Role Descriiptions
    B.5 Constraints
    B.6 Assumptions
    B.7 Interfaces
    B.8 Project approach
    B.9 Scope
    B.10 Quality Criteria
    B.11 Risk management approach
    B.12 Communication strategy
    B.13 Project Controls
    TASK 2 – Project Plan
    2.1 Project Plan
    2.2 Work Based Structure
    2.3 Critical Path Analysis
    TASK 3 – Approaches to Project
    Section 2 – REFLECTION

  • making a maned wolf habitat in a zoo in tinkercad with barriers, holding area fo

    making a maned wolf habitat in a zoo in tinkercad with barriers, holding area fo

    making a maned wolf habitat in a zoo in tinkercad with barriers, holding area for zookeepers and lots of rocks and as much as their natural habitat as possible.

  • Two pages of instructions will be attached. Please provide images when needed. P

    Two pages of instructions will be attached.
    Please provide images when needed.
    P

    Two pages of instructions will be attached.
    Please provide images when needed.
    Please provide in-text citation as well as references at the end of the assignment.

  • Please explain to me how using getmetricdata API I can query cloudwatch. I know

    Please explain to me how using getmetricdata API I can query cloudwatch. I know

    Please explain to me how using getmetricdata API I can query cloudwatch. I know how to schedule, eventually I will need to show the hourly requests (dimension 1 is client dimension 2 is APIPath) eg 2024-12-6 23:00, client4, /Api/path/item6 2 (this will be one row) Should not be more than 30/40 minutes