Categories
Technology

Dissertation Chapter 2: literature Review Supporting Evidence Literature review

Dissertation Chapter 2: literature Review
Supporting Evidence
Literature review addresses previous relevant projects and articulates theoretical (practice) orientation.
– Primary Orientation
Provide an introduction to the review of scholarly literature, an argument for conducting the review, and a primary theoretical (and practice) orientation.
– Efforts to Address the Problem
Provide a synthesized review of the scholarly literature to expose, explain, and analyze previous scholarly efforts to address the problem.
– Synthesis of the Evidence
Provide a logically organized and synthesized review and analysis of the literature in close alignment with the topic, problem, and gap.
I am looking for good up-to-date resources (2020 and beyond).
Background info:
Existing research on ICT is primarily descriiptive, survey based, and focused on who is using ICT and how people and organizations are using the tools. Although many organizations have shown interest in using ICT, they often demonstrate uncertainty about the most effective use of ICT tools to serve organizational needs. Distinctly missing from the literature is a framework that can help practitioners in organizations, specifically nursing homes, to understand ICT as a potentially creative and productive tool to guide the organization through its implementation in order to improve performance. The purpose of this generic qualitative inquiry is to explore what factors contribute to the successes and challenges of recent digital gaming implementations in nursing home facilities. The phenomenon being studied is digital gaming implementation successes and challenges. The theoretical framework is the Human Performance Technology (HPT) model. The target population is nursing home facility personnel who have recently participated in the implementation of Information and communications Technology (ICT) in the form of digital gaming. The researcher will use the human performance technology (HPT) model (D. M. Van Tiem, J. L. Moseley, & J. C. Dessinger, Fundamentals of Performance Improvement, 2012) as a framework to appraise those within the nursing environment who are familiar with the use of Digital Gaming in nursing home facilities. The data analysis will determine the extent to which practitioners in nursing homes used key elements of the HPT model (e.g., analysis, design, development, implementation, maintenance, evaluation, and change management) when the organization attempted to adopt Digital Gaming. The researcher may determine that some organizations begin using Digital Gaming tools without thinking through what the impact would be on the organization, workers, and patients. The results of this study could demonstrate that nursing homes were using some components of the HPT model but would likely improve performance outcomes, reliability, and success by more intentionally using the research-based HPT model as a framework for planning and implementation. See less

Categories
Technology

overview with the current development of machine learning and artificial intell

overview
with the current development of machine learning and artificial intelligence, artificial intelligence can explore forms and find meaning from bigdata sets without the interference of humans, machine learning turned the design problems into logical problems to be computed, there for, machine learning and artificial intelligence can be used to recognize the car model by giving it big data sets.
Theory
Using a simple deep learning network to classify images of cars, which is based on principal component analysis, that will be followed with a simple binary hashing to index, that is called principal component analysis network, this model had set new records to classification task, which will help to classification of car model.
Concepts / terms
Classification: is a process related to categorization, the process in which ideas and objects are recognized, differentiated and understood. Classification is the grouping of related facts into classes
Big data: refers to data sets that are too large or complex to be dealt with by traditional data-processing application software. Data with many fields offer greater statistical power, while data with higher complexity may lead to a higher false discovery rate. Big data analysis challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy, and data source.
Machine learning: is a field of inquiry dedicated to understanding and building methods that ‘learn’, that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence. Machine learning algorithms build a model based on sample data, known as training data, in order to make predictions or decisions without being explicitly programmed to do so
Artificial intelligence: is intelligence shown by machines, which is the opposite of the natural intelligence shown by animals and humans. Artificial intelligence has been defined as the field of study of intelligent, which refers to any system that perceives its setting and takes actions that exploit its chance of attaining its goals.
principal component analysis: a very known technique used for analysing big data sets which have a large number of dimensions or features, growing the interpretability of data while conserving the maximum amount of information, and allowing the visualization of multidimensional data.
Focus
The focus of the research will be modelling and understanding the principal component analysis, within the classification of car images to predict its model, the success of the research will reduce the reliance on human resources to identify the car model, which can be used in many instances such as identifying cars with fake number plate using number plate recognition and the issuing authority database of registered cars.

Categories
Technology

Step 1- Review the Title. Come up with a new title (similar to the one in italiz

Step 1- Review the Title. Come up with a new title (similar to the one in italized and bold)
Step 2 – Review the Data Collection Techniques on page 17-19 Make 2 new entries and proof page 17-19

Categories
Technology

Step 1- Review the Title. Come up with a new title (similar to the one in italiz

Step 1- Review the Title. Come up with a new title (similar to the one in italized and bold)
Step 2 – Review the Data Collection Techniques on page 17-19 Make 2 new entries and proof page 17-19

Categories
Technology

For this task, you will use the attached “Healthy Body Wellness Center Case Stud

For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.

Categories
Technology

For this task, you will use the attached “Healthy Body Wellness Center Case Stud

For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.

Categories
Technology

You are the Chief Information Security Officer in your organization. Several mem

You are the Chief Information Security Officer in your organization. Several members of the technology committee of the board of directors were recently informed of the cyberattacks at the University of Calgary (ransomware) and Capital One (breach). Before the next board of directors meeting, they would like a short discussion on lessons from both incidents that can be used to improve the cybersecurity defenses at your chosen organization. Study the information from the sources linked below and others that you may find on both incidents and prepare a concise document answering their questions. Include a perspective on the impact of the incidents on the wider cybersecurity field.
Cohen, Naor, and Catherine Heggerud. “Cyber Attack at the University of Calgary.” Ivey Publishing, 2021.
McLean, Rob. “A Hacker Gained Access to 100 million Capital One Credit Card Applications and Accounts.” CNN Business, July 30, 2019.
– https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
“Capital One Announces Data Security Incident.” Capital One, July 29, 2019.
– https://www.capitalone.com/about/newsroom/capital-one-announces-data-security-incident/
Submission instructions: Your document should be a minimum of 500 words. Save your document as a Word document or a PDF and share it as an attachment in this discussion forum. Read your peers’ contributions and reply to at least one with thoughtful comments to deepen the discussion.

Categories
Technology

You are the Chief Information Security Officer in your organization. Several mem

You are the Chief Information Security Officer in your organization. Several members of the technology committee of the board of directors were recently informed of the cyberattacks at the University of Calgary (ransomware) and Capital One (breach). Before the next board of directors meeting, they would like a short discussion on lessons from both incidents that can be used to improve the cybersecurity defenses at your chosen organization. Study the information from the sources linked below and others that you may find on both incidents and prepare a concise document answering their questions. Include a perspective on the impact of the incidents on the wider cybersecurity field.
Cohen, Naor, and Catherine Heggerud. “Cyber Attack at the University of Calgary.” Ivey Publishing, 2021.
McLean, Rob. “A Hacker Gained Access to 100 million Capital One Credit Card Applications and Accounts.” CNN Business, July 30, 2019.
– https://edition.cnn.com/2019/07/29/business/capital-one-data-breach/index.html
“Capital One Announces Data Security Incident.” Capital One, July 29, 2019.
– https://www.capitalone.com/about/newsroom/capital-one-announces-data-security-incident/
Submission instructions: Your document should be a minimum of 500 words. Save your document as a Word document or a PDF and share it as an attachment in this discussion forum. Read your peers’ contributions and reply to at least one with thoughtful comments to deepen the discussion.

Categories
Technology

After watching the Python video up through 3:36:05 and after reviewing the Pytho

After watching the Python video up through 3:36:05 and after reviewing the Python Module Index, how would you describe functions, classes, and modules within Python?
Your answer should be in your own words, not copied and pasted.
Your answer should be approximately 300 words in length.

Categories
Technology

When we went back to the main room we all presented our answers and it was really fulfilling to listen to every group’s presentation and way of thinking/working.

change completely the paper im sending because this is a friends so it cant look like the one im sending and if you could add some extra info that will be nice :
n this week’s meeting we got to attend a data visualization workshop. It was truly interesting and enlightening to me because I only briefly covered this subject in the past. It helped me understand more about data which is the subject of my current session right now. Meeting new classmates and new professors was really nice as well. Overall the class was very active and participative which is good for students to follow and get into it. Exactly what you expect from a workshop.
We started off by refreshing our minds with some definitions and explanations about data visualization. According to the session, a simple definition of data visualization is the graphical representation of information and data. You can use different tools to present your data such as charts, graphs, and maps. We learned about how important is targeting your audience in data visualization. Knowing your audience and addressing their needs is the step one. It allows the viewers to process and read the data quickly and simply.
I believe that digital information speak more to people than information told with words. In my opinion it is easier and quicker to understand a digital fact. During the class someone even said in the chat “A picture is worth a thousand words” and I found it truly accurate about dashboards.
We ended the class by using Tableau which was totally new for me. We got separated in break rooms in order to complete an exercise. In my group (2) we had to answer questions about Pokemon: what is the strongest Pokémon, what generation has the most types of Pokémon and so on. First of all we realized that we needed to understand the data before moving forward with anything else. We then all tried to figure the information out and give a picture as an answer. Thank you to the teacher who came to the room to save us at some point. The exercise was not an easy feat overall. When we went back to the main room we all presented our answers and it was really fulfilling to listen to every group’s presentation and way of thinking/working. The different skills levels among the students were actually really helpful for people like me for example. It allowed me to understand some things through my classmates as well. I had no experience with Tableau and data visualization but the group cohesion and different levels of experiences worked out well.