Computer Science Project

Computer Science Project

Project 2

Artificial Intelligence

CSCE 5210 – Fall 2021

 

[Solutions to this assignment must be submitted via CANVAS prior to midnight on the due date. Submissions no more than one day late will not be penalized. Submissions up to one week late will be penalized 10 points. Submissions will not be accepted if more than one week later than the due date.]

This project may be undertaken individually or in pairs. If working in a pair, please state clearly the names of the two people undertaking the project and the contributions that each has made. Only one submission should be made per pair.

The purpose is to adapt the Iterative Deepening Search (IDS) method learnt in class to a realistic problem that is of relevance to Industry.

The environment is the warehouse that was used in Project 1, except that it has 15 locations, instead of 10. The 15 locations now represent divisions in the warehouse that stock different types of items. For example, location 1 is a division that stocks Electronics items while division 2 holds Clothes, and so on.

For reasons of efficiency the lead designer in the AI team has decided to map the warehouse in the hope that it will optimize the robot navigation process. Also, it was observed in the trial run undertaken earlier that the sensors were not accurate enough to support a 1-step lookahead search and it was thus decided to use the sensors to perceive the current location only and not the surrounding neighborhood. Computer Science Project.

The map produced by the AI team is in the form of a binary tree as shown below:

ORDER A PLAGIARISM-FREE PAPER NOW

 

Each link in the tree has a weight that reflects the distance between a pair of divisions. Navigation is done by moving from the current position in the map (say the robot is at division B) to other map locations (say D) in order to service customer orders.

Part A

In this part we are concerned with minimizing the amount of inter-divisional movement. A customer always orders items from only one division in the company.  Answer the following two questions. Note that the answers to the questions do not need any programming effort.

Q1) From the map above what data structure needs to be derived to support the minimization of movement between divisions that is required to support consecutive orders that involve different divisions?

Q2) How will we populate the data structure that you proposed in Q1 above? Outline the procedure involved. You only need to describe the procedure, not implement it at this stage.

Part B

In Part A above we only considered movement to divisions. In this part we will consider the effort involved in servicing a customer order by moving to the divisions required as well as navigating to the shelf location that contains the item ordered.

Customer orders are generated by a 3-step process. First, a random number is generated that specifies the division number that contains the items ordered. This will be thus a random number in the range 1 to 15. Next, a random number is generated that represents the number of items ordered k. We will assume that no customer orders more than 3 items. In the 3rd step, k random numbers, each in the range 1 to 63, are generated that represent the shelf numbers where the items are located. For example, a customer may have ordered two different items at shelf locations 17 and 61 respectively. Shelves across all divisions have the same numbering scheme, which is in the range 1 to 63. Computer Science Project.

ORDER A PLAGIARISM-FREE PAPER NOW

Thus, within a division you can represent the shelf by a complete binary tree. Except for the lowest level each node m has two children numbered 2m and 2m+1 respectively. Within any division you may assume a constant step cost of 1 to move from any parent node to any one of its child nodes.

Customer orders are serviced one-by-one in the order that they were received. The robot is in division 1 at the first order. From there it may have to move to another division if the first division does not have items contained in the first order. Once the robot services the current order at a given division it must retrace its path back to the entrance of that division which is represented by the root node of the binary tree that covers the shelf locations for that division.

Q3) Implement Q2 above by writing a Python program that populates the data structure you proposed in Q1.

Q4 Implement Iterative Deepening Search (IDS) to locate shelf locations for servicing customer orders.

Q5) Test your program for this boundary case. Generate an order for division 6 and trace its path from division 1 to division 6 and then onwards to the only item, item 33, that was ordered. Check that its path length is what you expected. Print out both the path and its length.

Q6) Run your program for a certain number N of customer orders (say 100) and answer the following questions:

  1. What is the average path length travelled across the N orders? Take care to include in your path length both the paths travelled to get to the division that contains the order and the movement required within the division to get to the items required.
  2. Print out the length of the shortest and longest paths across the N orders that you generated.

Hand in:

  • A short report (between 1 and 2 pages in size) describing the approach that you took. In addition to the description of your approach you should answer the 6 questions given above.
  • Any assumptions that you made while undertaking this project.
  • The complete set of Python code that you used.

End of project specification.

 

P.S.         A* is coming in the next project. Computer Science Project.

Assignment CC7

Assignment CC7

Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer.

The discussion questions this week are from Chapter’s 16-20  (Jamsa, 2013).

ORDER A PLAGIARISM-FREE PAPER NOW

Chapter 16 topics:

  • Define and describe economies of scale and provide a cloud-based example. Assignment CC7.

Chapter 17 topics:

  • Discuss why a designer should avoid selecting an implementation platform for as long as possible during the design process.

Chapter 18 topics:

  • Using Yahoo! Pipes, create a pipe that displays the names of pizza restaurants within a given zip code.

(OR)

  • Using Google App Engine, create a page that displays the following Python script:
    • print “Content-type: text/html\n\n”
    • print “<html>Cloud Computing, Chapter 18</html>”

Chapter 19 topics:

  • Define scalability.

Chapter 20 topics:

  • List and describe five ways you think the cloud will change the future of TV.

Analytic Slover Plateform

Analytic Slover Plateform

Excel file contains a set of receipt data for a grocery store’s produce department where each row represents a different customer’s purchase. For each row, a 1 indicates they purchased that product and a 0 means they did not. In total, there are 35 different produce items the grocery sells, and the owner is interested in determining any association rules in the purchase patterns of their customers to improve his promotional strategy.

Complete an Association Rule analysis on the following data using a minimum confidence percentage of 70% and a minimum support of 10.

How many Rules did your Association Rule analysis yield?  Analytic Slover Plateform.

ORDER A PLAGIARISM-FREE PAPER NOW

In Association Rule, the following rule was NOT suggested by the analysis:

Group of answer choicesIf a customer purchases Peaches, then she will also purchase Nectarines
If a customer purchases Carrots and Kiwis, then she will also purchase Asparagus
If a customer purchases Avocados and Cherries, then she will also purchase Nectarines
If a customer purchases Lettuce Greens and Potatoes, then she will also purchase Zucchini
If a customer purchases Avocados and Bananas, then she will also purchase Cherries Analytic Slover Plateform.

Artificial Intelligence Paper

Artificial Intelligence Paper

The purpose is to adapt the Iterative Deepening Search (IDS) method learnt in class to a realistic problem that is of relevance to Industry.

The environment is the warehouse that was used in Project 1, except that it has 15 locations, instead of 10. The 15 locations now represent divisions in the warehouse that stock different types of items. For example, location 1 is a division that stocks Electronics items while division 2 holds Clothes, and so on.

[Solutions to this assignment must be submitted via CANVAS prior to midnight on the due date. Submissions no more than one day late will not be penalized. Submissions up to one week late will be penalized 10 points. Submissions will not be accepted if more than one week later than the due date.]

This project may be undertaken individually or in pairs. If working in a pair, please state clearly the names of the two people undertaking the project and the contributions that each has made. Only one submission should be made per pair.

The purpose is to adapt the Iterative Deepening Search (IDS) method learnt in class to a realistic problem that is of relevance to Industry.

The environment is the warehouse that was used in Project 1, except that it has 15 locations, instead of 10. The 15 locations now represent divisions in the warehouse that stock different types of items. For example, location 1 is a division that stocks Electronics items while division 2 holds Clothes, and so on.

For reasons of efficiency the lead designer in the AI team has decided to map the warehouse in the hope that it will optimize the robot navigation process Artificial Intelligence Paper.Also, it was observed in the trial run undertaken earlier that the sensors were not accurate enough to support a 1-step lookahead search and it was thus decided to use the sensors to perceive the current location only and not the surrounding neighborhood.

The map produced by the AI team is in the form of a binary tree as shown below:

 

Each link in the tree has a weight that reflects the distance between a pair of divisions. Navigation is done by moving from the current position in the map (say the robot is at division B) to other map locations (say D) in order to service customer orders.

Part A

In this part we are concerned with minimizing the amount of inter-divisional movement. A customer always orders items from only one division in the company.  Answer the following two questions. Note that the answers to the questions do not need any programming effort.

Q1) From the map above what data structure needs to be derived to support the minimization of movement between divisions that is required to support consecutive orders that involve different divisions?

Q2) How will we populate the data structure that you proposed in Q1 above? Outline the procedure involved. You only need to describe the procedure, not implement it at this stage.

Part B

In Part A above we only considered movement to divisions. In this part we will consider the effort involved in servicing a customer order by moving to the divisions required as well as navigating to the shelf location that contains the item ordered.

ORDER A PLAGIARISM-FREE PAPER NOW

Customer orders are generated by a 3-step process. First, a random number is generated that specifies the division number that contains the items ordered. This will be thus a random number in the range 1 to 15. Next, a random number is generated that represents the number of items ordered k. We will assume that no customer orders more than 3 items. In the 3rd step, k random numbers, each in the range 1 to 63, are generated that represent the shelf numbers where the items are located. For example, a customer may have ordered two different items at shelf locations 17 and 61 respectively. Shelves across all divisions have the same numbering scheme, which is in the range 1 to 63.

Thus, within a division you can represent the shelf by a complete binary tree. Except for the lowest level each node m has two children numbered 2m and 2m+1 respectively. Within any division you may assume a constant step cost of 1 to move from any parent node to any one of its child nodes.

Customer orders are serviced one-by-one in the order that they were received. The robot is in division 1 at the first order. From there it may have to move to another division if the first division does not have items contained in the first order. Once the robot services the current order at a given division it must retrace its path back to the entrance of that division which is represented by the root node of the binary tree that covers the shelf locations for that division. Artificial Intelligence Paper.

Q3) Implement Q2 above by writing a Python program that populates the data structure you proposed in Q1.

Q4 Implement Iterative Deepening Search (IDS) to locate shelf locations for servicing customer orders.

Q5) Test your program for this boundary case. Generate an order for division 6 and trace its path from division 1 to division 6 and then onwards to the only item, item 33, that was ordered. Check that its path length is what you expected. Print out both the path and its length.

Q6) Run your program for a certain number N of customer orders (say 100) and answer the following questions:

  1. What is the average path length travelled across the N orders? Take care to include in your path length both the paths travelled to get to the division that contains the order and the movement required within the division to get to the items required.
  2. Print out the length of the shortest and longest paths across the N orders that you generated.

Hand in:

  • A short report (between 1 and 2 pages in size) describing the approach that you took. In addition to the description of your approach you should answer the 6 questions given above.
  • Any assumptions that you made while undertaking this project.
  • The complete set of Python code that you used.

End of project specification.

 

P.S.         A* is coming in the next project.

Threat Modeling in Healthcare Essay

Threat Modeling in Healthcare Essay

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are: Threat Modeling in Healthcare Essay

ORDER A PLAGIARISM FREE PAPER NOW  

User authentication and credentials with third-party applications
3 common security risks with ratings: low, medium or high
Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements: Threat Modeling in Healthcare Essay

Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. Threat Modeling in Healthcare Essay

Key Components of Human Resource Management Essay

Key Components of Human Resource Management Essay

Discuss the key components of human resource management. Pick at least four concepts from chapter nine and describe how these concepts interrelate to individual performance on a team.

ORDER A PLAGIARISM FREE PAPER NOW

Review table 9.2 and select one of the dimensions listed, note why it was chosen and how you relate to this behavior. If you have a personal experience, please share.
How do leaders select the best talent? What are some tools they can use to select the best-talent? Key Components of Human Resource Management Essay

Discussion: Privileged Accounts

Discussion: Privileged Accounts

Privileged accounts, such as Administrator or root, have more privileges than an ordinary user account. Anyone with privileged access can perform nearly any action on a system or network. In many environments, privileged accounts and passwords are shared by IT staff.

Privileged access management (PAM), also referred to as privileged account management, eliminates password sharing for privileged accounts. Instead, it uses a “privilege safe” with policies. When administrators need elevated privileges, they request them through the privilege safe, which checks the policy and issues a password for a limited period of time if conditions are met.

ORDER A PLAGIARISM-FREE PAPER NOW

Answer the following question(s):

  1. Other than the risk of a privileged account password falling into the hands of an attacker, what is at least one other drawback to sharing those passwords? Explain your answer.
  2. Do you see any pitfalls to using PAM? Explain your answer.

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.

Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Operational Excellence Essay Paper

Operational Excellence Essay Paper

Discussion (Need in 250-300 words):

This week we discuss the overall process of developing new software.  Please also note the differences between software development and methods Operational Excellence Essay Paper.

Assignment (two -pages in length (one page for each question):

Information Systems for Business and Beyond Questions:

ORDER A PLAGIARISM -FREE PAPER NOW

  • Chapter 9 – study questions 1-10, Exercise 3
  • Chapter 10 – study questions 1-10, Exercise 1

Information Technology and Organizational Learning Assignment:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model Operational Excellence Essay Paper.
  • Chapter 8 – Review the Siemens AG case study.  Note the importance of understanding the interrelationships amongst all the senior leaders at every location.  Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders.  Why is this important Operational Excellence Essay Paper?

 

Legal And Ethical Challenges Of Cybersecurity Essay

Legal And Ethical Challenges Of Cybersecurity Essay

Assessment Description

Cybersecurity policies and regulations should support not interfere with organization workflow, and ultimately provide the three most crucial components of security: confidentiality, integrity, and availability. That is, policies should support people doing their jobs. Successful security policy needs to demonstrate to employees the value of security, not just the requirement for security. Thus, establishing adequate organizational culture is important as it affects security structure and policy. In 750-1,200 words, discuss organizational factors in light of Christian worldview by answering questions below Legal And Ethical Challenges Of Cybersecurity Essay:

  1. How does trust grow in organizations? For example, in some organizations there is lots of trust at the base of the organization, but this trust does not necessarily rise up.
  2. When are employees comfortable with whistleblowing? Should technology have a function in extending the whistleblowing capabilities of employees?
  3. It seems reasonable to assume that all organizations have implicit tradeoffs about what is more and less important in their expressions of policy. How can these be made more explicit so that policy and security architectures can more effectively capture these values?
  4. Within an organization, while monitoring can help with technical aspect (such as access violations), it does potentially worsen behavioral aspects. Discuss the deciding factor of how much monitoring is acceptable both ethically and legally by examining the ideological foundation of the Christian worldview.

    ORDER A PLAGIARISM -FREE PAPER NOW

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required Legal And Ethical Challenges Of Cybersecurity Essay .

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Benchmark Information

This benchmark assignment assesses the following programmatic competencies:

MS Cybersecurity

4.3: Analyze the ethical implications of cybersecurity policies and regulations put in place to protect the Confidentiality, Integrity, and Availability of Intellectual Property (CAE KU 3, 7, 10, 11) Legal And Ethical Challenges Of Cybersecurity Essay.

Cybersecurity Training Essay Paper

Cybersecurity Training Essay Paper

Assessment Description

An organization should establish an effective cybersecurity training program for personnel having authorized access to critical cyber assets.

Create a training plan for everyone who works at the organization. The training plan should address (but is not limited to) the following:

ORDER A PLAGIARISM -FREE PAPER NOW

  1. Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.
  2. Describe common security risks and how to avoid them Cybersecurity Training Essay Paper.
  3. Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.
  4. Describe the proper use of critical electronic devices and communication networks.
  5. Describe the proper handling of critical information.
  6. Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.
  7. Address the risks resulting from insecure behavior of employees.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Cybersecurity Training Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion Cybersecurity Training Essay Paper.

You are not required to submit this assignment to LopesWrite.