Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help

Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help. Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help.


(/0x4*br />

Answer the below questions as instructed. Kindly read the instructions properly before you answer

1. What is an artificial neural network and for what types of problems can it be used?

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial

ones? What aspects are similar?

3. What are the most common ANN architectures? For what types of problems can they be used?

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode

and in an unsupervised mode.

Exercise 6: Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding. (Must be 1 full page) You must specify which 2 papers you considered: so paper full names must be added.

Exercise 7: Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model. (Must be 1 full page)

For 1-4 questions, there is no page restrictions: you can answer accordingly but each question that is answered should have the in-text citation and an APA reference in the Reference Page (No websites/wiki/ending with .com references are considered as Peer Reviewed)

Exercise 6 & 7 must be each 1 full page i.e., 2 pages of content (should have the in-text citation and an APA reference in the Reference Page – No websites/wiki/ending with .com references are considered as Peer Reviewed)

APA Format

No plagiarism

In-text Citations Mandatory

No Spinbot/Synonymic words please

Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help[supanova_question]

Using Pycharm, Complete the questions of the Lab#4 POS (Part of Speech)? Follow the structure bellow for more info? Programming Assignment Help

Complete the code in the included python file.

Answer all 5 questions

pos.py

#1) Why is the training accuracy higher than the testing accuracy?

#2) Why is the training accuracy not perfect (100%)

#3 Why does the accuracy score on the training data not go up but it does on the test data?

#4) Create two new taggers, A BigramTagger that has not backoff and a BigramTagger that user a unigram tagger as backoff. Report the accuracies. Why is one so much lower than the other?

#5) Repeat #4 with a TrigramTagger using a Bigramtagger as backoff

NOTE: Take a screenshot of the codes of each question, AND if the file did not open I attached a word doc that has all the instructor of this task.

[supanova_question]

Macroeconomics assignment Economics Assignment Help

Instructions – PLEASE READ THEM CAREFULLY

  • The Assignment must be submitted on Blackboard (WORD format only) via allocated folder.
  • Assignments submitted through email will not be accepted.
  • Students are advised to make their work clear and well presented, marks may be reduced for poor presentation. This includes filling your information on the cover page.
  • Students must mention question number clearly in their answer.
  • Late submission will NOT be accepted.
  • Avoid plagiarism, the work should be in your own words, copying from students or other resources without proper referencing will result in ZERO marks. No exceptions.
  • All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism).
  • Submissions without this cover page will NOT be accepted.

[supanova_question]

sociology 1 Humanities Assignment Help

In Chapter 3 and Module 4, we learn about various research methods used in sociology, such as survey, interview, participant-observation, ethnography, experiment, content analysis. After reviewing these research methods, as well as information about under what conditions we can generalize from our sample to the population, please consider the scenario below and answer the following two-part question:

There are about 18,000 students enrolled at Pierce this semester. Dr. Chavez is interested in finding out whether Pierce students think that the College is providing them with adequate student support services during the pandemic.

1. What sociological research method should Dr. Chavez use to conduct her study and how can she ensure that her research findings are automatically generalizable to all Pierce students?

In addition, please reply to at least one of our classmates’ posts with thoughtful feedback regarding their answer to these questions. Remember to keep your feedback factual and respectful of your fellow classmates.

[supanova_question]

Please write 500 words on below requirment Computer Science Assignment Help

writing the IT policy for JCP bank

LAN Domain

{Introduction}

{Purpose}

{Scope}

{Policies}

Example

Workstation Domain

The workstation domain includes end-user devices such as desktops, laptops, and mobile devices. There are many considerations for the workstation domain, including DoD requirements and regulations.

Purpose

The purpose of this policy is to identify and implement security controls to help protect information systems resources within the workstation domain.

Scope

The scope of this policy includes all end-user devices used to access any company network or data, including but not limited to: desktops, laptops, and mobile devices. This policy will cover operating systems and locally installed software.

Policies

Antivirus software is required on any device that connects to the DoD network. “The DoD requires Components to implement virus protection such as antivirus tools to prevent and eliminate downloading, installing, and using unauthorized software on DoD networks” (Inspector General, 2016, p. 13).

Operating systems should be kept up-to-date based on the latest DoD recommendations. Workstations are to be hardened by uninstalling unneeded software and drivers, and unneeded services shall be turned off.

Hard drives should be encrypted and all devices protected by multifactor authentication. One report states that “The DoD issued logical access policies, including policies requiring the use of multifactor authentication” (Inspector General, 2016, p. i).

Screen locks shall be enabled on each device to protect devices from unauthorized access. Monitors shall have privacy filters installed to prevent shoulder surfing in susceptible areas.

[supanova_question]

[supanova_question]

Activity: Transportation and Communication Humanities Assignment Help

Background

The telegraph was a bit like the telephone or the internet of its age. Imagine that one day you communicate with someone in a city 300 miles away by sending a letter and waiting several weeks for a response or traveling a week or more on the road in order to visit them. Then the next day, you can communicate by sending a telegraph and receiving a response the following day. You can imagine a similar transformation with the railroads that replaced wagons, horses, and carts; or the steamboats on the Mississippi, Ohio, or Hudson Rivers, the Atlantic coast, or the Great Lakes and how they replaced canoes, barges, and sailing ships. Within a couple of decades, these kinds of trips went from a week or more to a matter of days. Even more dramatic, California and communities along the Pacific Coast in the 1840s could only get information from the east coast by waiting for the mail on ships that sailed around South America. Then in 1861, suddenly they were in direct contact with New York City in a matter of a day or two, and in 1869 they could spend a week or less on a train and get to Chicago, a journey that would have taken months in 1840.

Actually, it would be a couple of decades before Americans routinely used these modes of communication and transportation in their daily lives. Those who took early advantage of the new technologies were business people and businesses. The new technologies opened up markets, created enterprise opportunities, and inspired the development of new products and services in what we call the Market Revolution of the early 19th century. In this problem, you will examine the impact of these technologies on the larger economy and the single individual.

Sources

  1. Railroads, 1830
  2. Railroads, 1860
  3. Waterways, 1825
  4. Waterways, 1860
  5. Telegraph, 1848
  6. Telegraph, 1860
  7. GDP bar graph of 1800, 1830, and 1860
  8. The 8 Largest Cities in 1800
  9. The 8 Largest Cities in 1830
  10. The 8 Largest Cities in 1860
Cities by Rank of Population in 1800, 1830, and 1860
City by Rank 1800 Population 1800
(in millions)
City by Rank 1830 Population 1830
(in millions)
City by Rank 1860 Population 1860
(in millions)
Philadelphia* 81,009 New York 202,589 New York 813,669
New York 60,515 Philadelphia* 188,797 Philadelphia* 565,529
Baltimore 26,514 Baltimore 80,620 Brooklyn 266,661
Boston 24,937 Boston 61,392 Baltimore 212,418
Charleston 18,824 New Orleans 46,082 Boston 177,840
Salem 9,457 Charleston 30,289 New Orleans 168,675
Providence 7,614 Cincinnati 24,831 Cincinnati 161,044
Norfolk 6,926 Albany 24,209 St. Louis 160,733

*(City and County)

Three Fictional Historical Actors

  1. John and Emma Lewis were owners of a business making beef jerky in Chicago. They rented a small store space with a walk-up apartment above and a quarter acre parcel behind it near the southeast side of Chicago, not far from the stockyards. In 1830, the Lewises sold beef jerky wholesale to grocers in the Chicago area and employed themselves and occasionally a hired-in male employee when business picked up. To make the beef jerky, the Lewises needed beef, drying racks made of wood, salt, some spices, and saltpeter (which preserved the jerky.) They also needed wood crates for delivering the product. As a courtesy to their grocer customers, they provided large glass jars in which to display the jerky on countertops. Though they were not sure how much they made on their business because they failed to keep good records, the Lewises thought they sold about $50,000 (US Dollars 2010) of beef jerky per year and kept a 50percent profit.By 1860, Lewis Dried Beef Products was one of the 10 largest beef jerky producers in the United States. Not only did the Lewises sell beef jerky, they also sold a number of other salted products, such as corned beef and ham. They were also experimenting with canned beef products. They had moved the wholesale business further south outside Chicago to a factory of 100 acres a little further from the stockyards. They now employed 70 men and a business staff of five; they employed an attorney and an accounting firm in Chicago. Their grocery trade included 732 stores from St. Louis to Boston to New Orleans and Charleston and they were just beginning to sell mail order dried beef products in 1858. They sold $2,323,415 (US dollars 2010) of product per year and made a profit of 62 percent in 1860. On the advice of their attorney, the Lewises sent an agent to Washington, DC, to try to negotiate a contract to sell beef jerky to the United States Army. If successful, the Lewises intended to borrow about $500,000 (US dollars 2010) from a bank in New York that just opened an office in Chicago in order to build another factory in Chicago and purchase a canning and salting factory in Syracuse, New York, which their son, Lewis Jr., and their nephew, James, would run.
  2. In 1830, Mary Livingston of Cincinnati, Ohio had a small and not very successful dressmaking business which she ran out of her home. Her trade was almost exclusively among women, and there were not that many elite and middle-class women in Cincinnati who would buy more than one dress a year. However, that same year Mary was able to obtain a piecing-out contract (to hem, sew on buttons, decorate with trim, or make other small parts of the clothing) with a successful tailor, Philip Robbins, who was popular in Cincinnati for making a good quality suit at a reasonable price. Robbins was able to keep the price down precisely because he pieced out most parts of the tailoring to local women seamstresses like Mary Livingston. Livingston was responsible for obtaining buttons, special threads, lining fabrics, interfaces, ties, ribbons, etc. which were part of her job costs. Because the special seamstress products came from a few suppliers in Philadelphia, her costs were high. There were months in which Mary’s costs exceeded her contract labor.By 1860, Mary had given up the women’s clothing business. Instead, she had turned the back of her home into a small factory for making men’s working clothes, a business which she and Philip Robbins had founded in 1840. Robbins had provided money (from his own sources and a loan from a Philadelphia bank) to build the extra rooms at the back of Mary’s home and buy the sewing equipment and first two years’ expenses of the factory. Mary hired and supervised the 20 seamstresses in the manufacture of all phases of the men’s working garments; a few were on piecing out contracts but most were working for wages. All of her employees were women because men preferred to work for themselves as tailors rather than work for wages or piecemeal. Robbins sold the men’s clothes to dry goods stores from Boston to Saint Louis to New Orleans and even made a few shipments a year to a store in San Francisco. By 1860, the materials Mary needed for the men’s clothes were easily obtained from suppliers not only in Philadelphia but also Boston, New York, and Baltimore, and they were becoming cheaper with each year as more fabric manufacturers sprung up in the United States. In 1858, Robbins negotiated a small contract for making US Army uniforms. The Robbins label of men’s clothing was making about $200,000 (US dollars 2010) a year and the partners made a 40 percent profit on sales; Robbins received 75 percent of the profit and Livingston the rest.
  3. In 1840, James Kennedy lived in Pittsburgh, Pennsylvania and worked as a puddler in the local iron foundry. The puddler was the aristocracy of the ironworkers’ trade. Puddling required both strength and a lot of experience in the handling of the melted iron ore in the puddling furnace. Kennedy at 6’2″ and 220 pounds and with almost 15 years, half his life, working as a puddler fit the bill. However, the puddler’s life was a short one (average 40 years) due to puddlers’ proximity to the high temperatures of the furnace and the many work accidents. After James’s uncle died in such an accident, James decided that he should take up an opportunity presented to him by a childhood friend, John Jacobs, who had a small inheritance and wanted to start a wrought iron foundry. (Before the Civil War, railroad rails were made of wrought iron, not steel. It was only later in the 1870s that the new Bessemer furnace made steel production cheaper and steel replaced wrought iron.) Jacobs needed James’s knowledge of the furnace, his connections with other puddlers, and his understanding of the working of the foundry to make the business a success. So they set up J K Ironworks in Pittsburgh in 1840.Amazingly, J K Ironworks survived its first two years and began to thrive its third year when Jacobs was able to negotiate a rail contract with the Pennsylvania Company, the largest railroad company in America before the Civil War. By 1850, J K was making 10,000 tons of rail for the Pennsylvania Company for $60 (US dollars 2010) per ton. Its profit was almost 70 percent, Jacobs receiving 60 percent and James 40 percent. Before 1858, J K had a contract with the Pennsylvania Company to ship their iron rails very cheaply via the Pennsylvania’s railcars to the railheads where the construction was going on. However, that same year the Pennsylvania Company decided to double its charge for shipping the rails, cutting severely into J K’s profit. When Jacobs tried to negotiate with other railroads, he found that they had followed the Pennsylvania Company’s practice of charging high rates for shipping; it was a classic “squeeze of the supplier.” In 1859, James died and Jacobs decided to accept an offer from Tom Scott of the Pennsylvania Company to sell J K for $3,000,000 (US dollars 2010). Jacobs retired in Europe and James Kennedy’s sons moved to Nevada to try their hand at silver mining, where they were only moderately successful.

Analyze the Evidence

Questions

  • What potential effect does growth in communication and transportation infrastructure seem to have on the economic lives of individuals?
  • What relationship is there between growth in the communication and transportation infrastructure and overall growth in an economy (as measured by GDP, or gross domestic product)?

Watch the background videos and examine all the maps and the chart at home. Read the 3 fictional historical actors and discuss how the growth in the communications and transportation infrastructure of the early 19th century may have affected the economic behavior of each person.

Complete the Economic Profile Chart by listing 6 facts in these 3 individuals’ economic lives or the growth of their businesses that were linked, directly or indirectly, to a change in communication or transportation as shown on the maps. For example, you might note that John and Mary Lewis were able to go into the salted ham business because they could ship the perishable meat product quickly to the east coast due to the growth of the railway system.

Be prepared to discuss the comparison of these individual cases to the growth in GDP and the centers of urban population growth in the maps and chart.

Economic Profile Chart

John and Ema Lewis

Mary Livingstone

James Kennedy

Activity: Transportation and Communication Humanities Assignment Help[supanova_question]

answer each question in 1 paragraph or more. Writing Assignment Help

(a) Compare Louis Vuitton’s previous and current processes for making a bag. For example,

how many people and days are required, what are the workers’ degrees of specialization, and

what improvements have resulted?

(b) How did Louis Vuitton’s previous process for making bags support the company’s value

proposition?

(c) How have practices from competitors such as Zara changed Louis Vuitton’s view of what its

target customers want? Has Louis Vuitton’s value proposition changed? If so, how well will

the new process support the company’s value proposition?

(d) What performance indicators do you think are critical in evaluating the performance of this

manufacturing operation from the standpoint of customers and the company?

[supanova_question]

Induction Program for Educational Leaders Writing Assignment Help

For this assignment, you will build an induction program to orient
new school leaders. Think about how new leaders will learn about the
nuances of the school environment and what it means to be a member of
that unique community. How will they learn the fundamental core values
of their school? Who are the key stakeholders in this community and how
should they be involved in this process? Who should new leaders talk to
and how should those conversations be facilitated? What tools,
approaches, and strategies should these new leaders deploy to ensure
short- and long-term success. How does a new leader build critical
relationships, foster mentorship, or create think partners? How does a
new leader use trauma-informed responsive techniques when working and
coaching faculty?
Be creative and innovative with your induction program. Be
intentional in the structure of the program. One day or five days? Focus
groups? Parent presentation? Shadowing experiences? Will the new
leaders travel around the community to meet business owners? Will a
local business pay for lunch? Student representatives?

The onboarding process is important for each staff, faculty, and
specialist position within a school system. Orienting a new member of
the school community is essential not only for the new hire but for
their expected contribution to the school’s collective mission, vision,
and success

While onboarding is important for all school personnel, of paramount
concern, is the induction of an educational leader. The leader is
critical to the culture, climate, and operational structure of the
school. Today’s school leaders are not only experts in the execution of
an educational system but also are experts in maximizing human
capital—supporting, nurturing, encouraging, empowering, and healing
all of the adults and children entrusted to their care. Today’s leaders
understand the value of working within a trauma-informed approach to
ensure their school’s success.

[supanova_question]

Implement pass1 and pass2 of a SIC Assembly in C language. Programming Assignment Help

You will implement, using C, pass 1 of an assembler for the machine architecture described in the SIC System Programmer’s guide provided as reference for this course. Your project will accept 1 command-line argument, which is a file that contains a SIC assembler program. Project 1 will create and output a symbol table as a result of analyzing the input SIC assembly file.

Remember that to generate SIC object code, we will need to make two passes through the assembly file. Pass one generates the symbol table and pass two uses the symbol table and op codes to generate the object file. You will be doing pass two via project 2. Think about this in your design.

There are some validation checks which should be done during pass one. You should carefully consider the errors in the SIC assembly file input that can and should be discovered during pass one and when encountered in the source file, generate an appropriate error message and stop the assembly process. There are AT LEAST FOUR errors which pass one should be able to detect and report (all of which should HALT the assembly process and generate an error message).

For example: if an error is found with the input assembly file, you should stop the process of creating the symbol table and output the following:

ASSEMBLY ERROR:

<The contents of the source line of assembly which contains the error><CrLf>

Line <line #> <Description of Error Encountered><CrLf>

If the SIC assembly file is valid, then project 1 should output, its symbol table. For each symbol, there should be one line of output: the symbol name followed by a <tab> character, followed by the hexadecimal address of the symbol, followed by a <CrLf>.

—- Example input —-

COPY START 1000
FIRST STL RETADR
CLOOP JSUB RDREC
LDA LENGTH
COMP ZERO
JEQ ENDFIL
JSUB WRREC
J CLOOP
ENDFIL LDA EOF
STA BUFFER
LDA THREE
STA LENGTH
JSUB WRREC
LDL RETADR
RSUB
EOF BYTE C'EOF'
THREE WORD 3
ZERO WORD 0
RETADR RESW 1
LENGTH RESW 1
BUFFER RESB 4096
RDREC LDX ZERO
LDA ZERO
RLOOP TD INPUT
JEQ RLOOP
RD INPUT
COMP ZERO
JEQ EXIT
STCH BUFFER,X
TIX MAXLEN
JLT RLOOP
EXIT STX LENGTH
RSUB
INPUT BYTE X'F1'
MAXLEN WORD 4096
WRREC LDX ZERO
WLOOP TD OUTPUT
JEQ WLOOP
LDCH BUFFER,X
WD OUTPUT
TIX LENGTH
JLT WLOOP
RSUB
OUTPUT BYTE X'05'
END FIRST

The correct output for this input file would be:

COPY 1000

FIRST 1000

CLOOP 1003

ENDFIL 1015

EOF 102A

THREE 102D

ZERO 1030

RETADR 1033

LENGTH 1036

BUFFER 1039

RDREC 2039

RLOOP 203F

EXIT 2057

INPUT 205D

MAXLEN 205E

WRREC 2061

WLOOP 2064

OUTPUT 2079

You will then implement, using C, pass 2 of an assembler for the machine architecture described in the SIC System Programmer’s guide provided as reference for this course. Your project will accept 1 command-line argument, which is a file that contains a SIC assembler program. Project 2 will create and output an object file in the format described in the SIC Object File Format document.

Remember that to generate SIC object code, we will need to make two passes through the assembly file. Pass one generated the symbol table and pass two uses the symbol table and op codes to generate the object file.

There are some validation checks which should be done during pass two (checks which really cannot be done during pass one). You should carefully consider the errors in the SIC assembly file input that can and should be discovered during pass two and when encountered in the source file, generate an appropriate error message and stop the assembly process. There are errors which pass two should be able to detect and report (all of which should HALT the assembly process and generate an error message).

For example: if an error is found with the input assembly file, you should stop the process of creating the symbol table and output the following:

ASSEMBLY ERROR:

<The contents of the source line of assembly which contains the error><CrLf>

Line <line #> <Description of Error Encountered><CrLf>

If the SIC assembly file is valid, then project 2 should write the appropriate object file

[supanova_question]

Discussion posts should relate the video First, define bureaucracy. Second, post three key ideas that Liane Hornsey gives for HR. Third, what does she say companies are doing wrong and how does Google fight bureaucracy? 200-250 words. Humanities Assignment Help

Video Discussion 5 – HR Tips

2828 unread replies.2828 replies.

First, define bureaucracy. Second, post three key ideas that Liane Hornsey gives for HR. Third, what does she say companies are doing wrong and how does Google fight bureaucracy?

Discussion posts should relate the video to the subject matter BY REFERENCING YOUR TEXTBOOK and provide information, opinions or questions about that subject matter . A substantive initial post should be at 200-250 words. Where its appropriate, please support your assertions with outside sources.

Follow-up posts should be a minimum of 100 words and supported with outside sources where appropriate. Posts like “I agree” or “great post” will not receive credit. Follow-up posts should be designed to continue the conversation BY ADDING A THOUGHT FROM THE TEXTBOOK. A great way to do that is by asking questions for clarification or sharing an example.

Initial posts must be made by Thursday at midnight of each week. Two follow-up posts must be made by Sunday at midnight.

A high-quality Discussion posting should be clear, well-written, and free of typos or sentence fragments. One good way to help with spelling and grammar is to write your post(s) in Word, Google Docs, or another word processing app and then run a spelling and grammar check before copying and pasting it into Canvas.

All sources must be cited in proper APA format.

Best Practice HR Tips from Liane Hornsey, Google VP Operations | MeetTheBoss (Links to an external site.)Best Practice HR Tips from Liane Hornsey, Google VP Operations | MeetTheBoss

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

https://anyessayhelp.com/

[supanova_question]

Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help

Machine-Learning Techniques for Predictive Analytics Business Finance Assignment Help

× How can I help you?