80% Assignment Requirements Fulfilled. The program runs correctly.
20% Divided equally among the items in the list below:
Only zipped folders or single files should be submitted to Blackboard. All files require the correct extensions. .py for Spyder IDE files or .ipynb
Zip multiple files in a folder to submit.
All submission folder and file names must include the student’s last name.
All individual files should have self documenting names.
All variables should have self documenting names.
Use of comments, including a comment block at the top of each file with your name and other details.
Include this sentence in the comment block at the top and type in your name:
I certify, that this computer program submitted by me is all of my own work. Signed: Your Name
All sources cited.
Correct spelling and grammar.
Neat, clearly presented code.
The class is likely to have students with different exposures to computer programming. You are not required to have any experience in Python. The important issue is how much you learn during our class. DAT 535 Session 1 Programming Assignment Week 1 & 2
Use one Jupyter Notebook file for all parts of the assignment.
Upload your .ipynb file to MyCourses
Part 1 – 20 points Type in these commands one cell at a time and then run each cell.
import seaborn as sns
sns.get_dataset_names () – This will produce the names of the seaborn datasets.
Choose one dataset to print and load. I chose the tips dataset and used the variable name plot.
plot = sns.load_dataset(‘tips’)
print(plot) Create a scatterplot as demonstrated in the Participation Activity Section 2.1.4
Choose your own x a -nd y values from the dataset column names.
Be sure to add some headings and comments to your code as shown at the end of Chapter 2.1
Part 2 – 20 pointsimport numpy as np
Create a one-dimensional numpy array with 9 integer elements. Use dtype ‘int16’
Print the array.
Print the second element of the array.
Use 10 other built in NumPy functions of your choice on the array and print the results.
Part 3 – 20 pointsImport the necessary modules and read in a csv file. The homes dataset contains 18 features giving the characteristics of 76 homes being sold. The modules will be used with the homes.csv file to perform a linear regression. Linear regression will be covered in a different chapter.
Import the NumPy and pandas packages with the aliases used in this material
Import the function LinearRegression from the sklearn.linear_model package
Read in the csv file homes.csv
Ex: If the csv file homes_small.csv is used instead of homes.csv, the output is:
The intercept of the regression is 249.522The slope of the regression is 36.758
Author: admin
-
DAT 535 Programming Assignment: Seaborn, NumPy, and Linear Regression
-
Title: “Mending the Mind: Healing and Understanding Mental Health” Mental health is a complex and multifaceted issue that affects millions of people worldwide. It encompasses a wide range of conditions, from anxiety and depression to more severe disorders such
NOW – how can we fix a broken mind? What causes it to break – is it really broken or is it just the world that has a problem….
Please provide some examples from your life -
Principled Negotiation in Action: A Case Study of Conflict Resolution in a Healthcare Organization
Module 4 – SLP
PRINCIPLED NEGOTIATION AND PRACTICAL APPLICATIONS
SLP Assignment Expectations
This Module’s SLP is intended to allow you to apply the process of principled negotiation in an experiential way. Using the assigned background readings, as well as some independent research of your own, apply principled negotiation to a real life, practical case. Be sure to use subheadings to show where you are responding to each required item.
Identify an organization (without revealing proprietary information), and explain a specific conflict or issue that was negotiated using principled negotiation. Do not re-use a conflict/situation presented earlier in this course.
How were the four points of principled negotiation used? Be as specific as you can in describing each.
What were the defined interests of each side?
How did the negotiation resolve? Was it successful? What changes could you recommend to improve the process?
What was your side’s BATNA? If one was not needed because of successful resolution, what do you think a valid BATNA for your side would have been? -
Assignment 1: History, Background & Financials of GAP’s Banana Republic Men’s Line Assignment 1: Retailer and Brand Choice
Assignment 1: History, Background & Financials of the Retailer
RETAILER Chosen: GAP
BRAND: Banana Republic
Size Run: Mens
ALL IN TEXT CITATIONS MUST INCLUDE AUTHOR AND PAGE NUMBER!!!
THE ASSIGNMENT MIMIC THE ATTACHED TEMPLATE BUT WITH THE INFO FOR MY CHOSEN RETAILER AND BRAND
ASSIGNED READINGS:
Read Chapter 1: Product Development and the Apparel Supply Chain (LO: 1,3)
Read Chapter 2: Brand Strategy and Business Operations (LO: 2,4,5)
LECTURE NOTES:
Product development is an end-to-end process that includes marketing, merchandising, creative and technical designing, sourcing, production, and the distribution and planning of goods that have a perceived value for a well-defined consumer group. Product development is not just one job or one role in the supply chain. It overlaps and is defined differently in various types of retail and wholesale brands. To be in product development, one may have a design background, a merchandising background, or a business background. It is part creative, part technical, part science, part research, part forecasting, and always an interesting and diverse area of the fashion apparel business. As you will see, hear, and learn, no two product developers’ roles are the same.
Throughout the course, we focus on the new product development process in fashion corporations, from ideation, screening, concept development, physical development, testing, and commercialization of new products through to launch. Technology, sustainability, and global aspects are what make it a new development process.
Yet as fun and creative as fashion can be, it is also a business. A very big one at that, that relies on strategic decision-making regarding the products a company puts out for sale. Fashion needs to be profitable. Product development helps connect the profitability and business functions to the consumer and a product line. It encompasses a big supply chain inclusive of farms, laboratories, manufacturers and factories, and transportation companies that are all managed by a team of professionals.
Brands must differentiate their products to compete. They must know their customers’ wants and values. A brand strategy helps to establish the organization’s reputation. What will the brand excel at: transparency and sustainability such as Everlane? Price and speed as Zara does? Or quality and innovation like Lululemon? This process must be fully realized and managed by the various functional areas of the organization such as the merchandising division, the marketing and sales division, and the IT division to name a few. The benchmarks to success must be very clear.
The Time and Action calendar, the Assortment Plan, and the Line Plan help businesses plan cross-functionally to achieve goals. Sustainable practices must also be considered in today’s customer-driven journey across all functional areas. Businesses must meet the consumer where they are, rather than hoping the consumer will magically come to them. The right product at the right price, the right time, and the right places are all paramount to the product development process and its supply chain members.
This assignment is aligned with the following learning objective(s):
LO1: Build an awareness of the structural organization of apparel companies and their supply chains (CO5)
LO3: Recognize how brands are positioned in the marketplace. (CO4)
LO4: Understand how a brand’s mission, vision, and values shape its strategic plan (CO6, CO2)
For your first assignment, you will be tasked with choosing a company from a provided list within Collaborations. Please be advised that the company you select will be the retailer you will be using for the rest of the semester, please choose wisely! Please follow the directions below.
First, please choose a retailer, a brand, and a product size range from the list provided in Canvas Collaborations.
Course Project: Retailer and Brand Choice
Please go to Collaborations on the course menu to the left.
Open the shared Excel sheet and choose your retailer and brand by the end of the weekly module by filling in your complete name on the approved retailer list.
One student to a brand only on a first-come-first-serve basis.
You will study this Retail Brand for the whole semester so choose one that interests you!
This is the first of six semester-culminating assignments for your final product development project. You will create a presentation that follows the assignment templates, not copy them. In this assignment, you’ll provide a brief history, background, and specific financial information on the chosen retailer and brand.
After choosing your company please read through the template for your first assignment – Assignment 1 template Download Assignment 1 template- please keep in mind that this template is a reference of what your assignment should cover and how many slides, not something to copy exactly. When you are finished creating your assignment slides please submit only PDF or PPT files to Canvas. -
Secure Code Review and Mitigation Plan for a Spring Framework Web Application Addressing Vulnerabilities in Code: A Comprehensive Plan
Overview
Writing code is difficult. Writing secure code can be even more challenging. As the developer, you are responsible for writing secure code. You’ll know your code is secure when you manually search for and identify possible security vulnerabilities. Developing this skill is important because it becomes more challenging as the number of lines and complexity of your code increase.
As you learned in this module, you can follow a workflow. You can also use tools widely accepted in software security and vulnerability assessments. You can focus your manual code inspection and narrow your search for possible security vulnerabilities within your code by following the vulnerability assessment process flow diagram.
Specifically, in this assignment, you will complete the following actions:
Determine relevant areas of security for a software application.
Identify software security vulnerabilities by manually reviewing source code.
Identify potential mitigation techniques that have been used to mitigate vulnerabilities associated with known exploits.
Scenario
You are a senior software developer on a team of software developers. You are responsible for a complex web application that uses the Spring framework. The team has been tasked with implementing an expressive command input function for the application. The team is using version 2.6.5 of the spring-data-rest-webmvc in the Spring framework. You also want to use the Spring Expression Language to accomplish the task.
Review the resources in this module’s Resources section to learn about the Spring framework.
Directions
As the lead person on this application, you are responsible for making certain that the code is secure. You will need to assess potential vulnerabilities in the code and create a mitigation plan for any existing vulnerabilities that the software development team must address.
To begin, see the vulnerability assessment process flow diagram linked in the Supporting Materials section to help guide your code review and mitigation plan.
Specifically, you must address the following rubric criteria:
Areas of Security: Review the scenario and use what you know about the architecture of the web application to identify relevant areas of security that are applicable for a software application:
Provide sufficient detail to address which of the seven areas of security are relevant to assess from the first level of the vulnerability assessment process flow diagram.
Document your findings for the software development team in the Module Two Written Assignment Template linked in the What to Submit section.
Areas of Security Justification: Provide a justification and rationale for why each area of security is relevant to the software application.
Code Review Summary: Once you have identified the relevant areas of security to review from the first level of the vulnerability assessment process flow diagram, work through the second level. At this stage, you should complete the following actions:
Manually inspect the code base provided to identify which vulnerabilities exist. To do this, upload the Module Two Written Assignment Code Base linked in the Supporting Materials section as a new project into Eclipse.
Refer to the Uploading Files to Eclipse Desktop Version Tutorial linked in the Supporting Materials section to learn how to open the code base for review.
Document your findings in detail for the software development team in the Module Two Written Assignment Template.
Mitigation Plan: Once you have manually inspected the code and identified the security vulnerabilities, complete the following actions:
Describe potential mitigation techniques. For example, describe secure software designs that you could use to address the software security vulnerabilities you identified.
Refer to the Module Two Resources section for help with this response.
Document your findings for the software development team in the Module Two Written Assignment Template. The software development team will use this plan to address all vulnerabilities in the code.
What to Submit
Submit a completed Module Two Written Assignment Template as a 1- to 2-page Microsoft Word document.
Supporting Materials
The following resources support your work on this assignment:
Diagram: Vulnerability Assessment Process Flow Diagram
This diagram illustrates the process flow for conducting an architecture review and code review to identify security vulnerabilities in code. Reference this diagram as you complete the assignments for this module.
A text-only version is available: Vulnerability Assessment Process Flow Diagram Text-Only Version.
Code Base: Module Two Written Assignment Code Base
This resource provides the code base needed for the Module Two written assignment.
Tutorial: Uploading Files to Eclipse Desktop Version Tutorial
This tutorial highlights how to upload files to Eclipse. -
Title: Demographics and Leadership in the NYPD: Addressing Community Issues
Discuss the demographics of the NYPD police department (Although you do not have to use where you live because the data may not be available, you are required to use a real police department/area, not a hypothetical area. Choose a city or county that can be researched and show your sources).
Discuss the characteristics of the population in which the department serves.
Identify and discuss a specific problem that is faced by the community (e.g., high rate of property crime, high rate of gang violence)
Discuss the key features of two prominent leadership styles discussed in the lecture and readings.
Of those two styles, recommend which style should be instituted within the department.
Include a justification (backed by scholarly works) regarding why this is the preferred leadership style.
Provide a discussion on how the leadership style implemented can effectively address the problem that you have identified. -
Title: The Role of HSAs in Addressing the Complexities of the American Health Care System
The American health care system is complex. A part of the population has access to health care through Medicare and Medicaid. Another part simply pays for care out of pocket. A substantial proportion of the population uses third-party payers to pay for care.
Payers have reacted to the rising costs of care by introducing various gatekeeper mechanisms. These have not been popular with consumers who see them as restrictive. The American population is aging and the need for care is likely to increase over the next decade.
While the earnings of health care professionals have been increasing, insurance premiums have also increased. Among hospitals, many are non-profit organizations offering substantial charity care. But for-profit and non-profit hospitals alike must show return on investment to remain viable. Providers must also factor reimbursement policies of payers into their decisions, sometimes even clinical decisions. These groups of stakeholders—patients, providers, payers, and the government—have different goals and different responses to the rising cost of care.
Based on your understanding, answer the following:
In your opinion, can HSAs be aligned to the expectations of all these groups?
Do you think HSAs can help improve health care cost, quality, and access? Why or why not? -
“Uncovering the Key Findings: A Professional Presentation on the Main Points of Our Research”
I want to make professional presentation to show this research Highlights the main point in the research
-
“Application of Machine Learning Techniques for Anomaly Detection in Environmental Monitoring: A Case Study of Chemical and Pharmaceutical Pollutants in 2022”
I conducted a study for one-year intervals biweekly from January to December 2022. The data available is a reading of collected samples that were analyzed for the following chemicals: total dissolved solids (TDS), nutrients (Ammonia (NH3-N), total Kjeldahl nitrogen (TKN), total nitrogen (TN), and phosphate (PO4-P)), heavy metals parameters including arsenic (As), cadmium (Cd), chromium (Cr), nickel (Ni), mercury (Hg), iron (Fe), copper (Cu), manganese (Mn), zinc (Zn), lead (Pb) and silver (Ag), In this study also, five pharmaceutical compounds were analyzed including metronidazole, trimethoprim, sulfamethoxazole, paracetamol, and ranitidine. These compounds were analyzed in January, February, April, June, and August 2022.
I want to use these data to conduct a novel research paper that has a very high chance of being published in the Q1 Environmental Journal. This will be done if proper and high-quality scientific writing using these results to write novel research employing machine learning techniques such as R programming to conduct analysis such like Detection of Anomalous Events a. Time Series Analysis: Use R’s time series analysis packages, such as ts, forecast, and anomalies, to detect abnormal fluctuations or spikes in pollutant levels over time. Time series decomposition, seasonal decomposition of time series (STL), and autoregressive integrated moving average (ARIMA) modeling can help identify anomalous patterns and trends in environmental data.
b. Machine Learning Algorithms: Implement anomaly detection algorithms, such as isolation forests, one-class support vector machines (SVM), or autoencoders, using R packages like anomalyDetection, e1071, or keras. These algorithms can identify deviations from normal behavior in multivariate datasets and flag potential pollution incidents or outliers.
c. Statistical Process Control (SPC): Apply SPC methods, such as control charts (e.g., Shewhart charts, cumulative sum charts, or exponentially weighted moving average charts), to monitor pollutant levels and detect unusual variations from expected norms. R packages like qcc and qualityTools provide functions for implementing SPC techniques in environmental monitoring. -
Title: “Aging and Sensory Changes: Nursing Strategies to Support Elderly Patients with Impairments”
How do sensory functions change with aging? Discuss the nursing strategies that can be used to support elderly patients experswnsory impairments.