major assessment task

major assessment task

The major assessment task for this subject is designed to be submitted in two parts to enable you to benefit from feedback provided on Part A (Assessment task 2). Assessment tasks 2 and 3 relate to the tax affairs of Bill. The information presented in this first task will be relevant, to both Part A and Part B, along with the feedback provided when your submission is returned.

AssignmentTutorOnline

Bill owns and has operated a bicycle shop in a major regional town since 1 July 2011. He lives 15 minutes from town on 5 hectares with his spouse. The property is on two titles. The 4 hectare block has their home and was purchased in joint names. The adjacent 1 hectare has a large shed and workshop/studio apartment that existed when the blocks were purchased and in which they lived while building the house and was purchased only in Bill’s name. Both properties were purchased at the same time, on 1 November 2009, and the home was completed and they moved in on 1 December 2010.

The annual gross turnover from the bicycle shop last year was $1,200,000 and he expects this to increase by around 10% in the current year.

Each year he arranges for the storage of bicycles purchased, if required by customers, in the shed for pick up in the week before Christmas. Generally these start to be stored from July. In addition he has stored some second hand trade-in bikes acquired mostly in February to October which he drops off at the Mens’ Shed every month. These are reconditioned by the Mens’ Shed members and donated to charity. He has undertaken these activities since July 2015.

During the current year he has undertaken an extension to the shop premises which was finished in April costing $200,000. This additional space will discontinue the need for storage away from the shop.  

This assignment has two parts, both must be submitted and your submission should adopt the ILAC decision model. Ensure you note relevant legislation, case law or other supporting information as well as any additional information you may require. The report should follow the style guide below. 

Each part has a different submission date. The Part A response is to be based on the data provided below under the heading Assessment item 2.

Part A Question

As a result of the additional storage space Bill is considering the option to sell the 1 hectare containing the shed and workshop/studio apartment. The property was purchased for $300,000 and Bill has made no improvements during the time he has held the property and while he borrowed 80% of the purchase price he has now repaid 60% of his borrowings. He neighbour who is a Real Estate Agent has indicated he believes he could sell the property for $500,000.

Required

Determine the tax consequences of the sale? (You are NOT required to calculate any possible tax payable but should provide some indication of the amount of any possible assessable component).

Your advice is to take the form of a report (adopting ILAC style) which will form part of the client work papers and should include a recommendation based on the known facts provided above as well as identifying any additional information that should be requested prior to providing any advice to the client (15 marks)

Project Background and Significance

Project Background and Significance

UNIVERSITY OF SOUTH AUSTRALIA

AssignmentTutorOnline

UniSA STEM

Course

Type your Project Title

Student: Type your Name

ID No: Type your ID number

Supervisor: Type your Supervisors’ Name

Type the Year

Abstract

Enter the abstract here.

Disclaimer

I hereby declare that this thesis is my own work and contains no material which has been accepted for the award of any degree or diploma from any tertiary institution. To the best of my knowledge and belief, this thesis contains no material previously written or published by another person, except where due reference is made in the text.

Signed:

Type your name

Type the date

Acknowledgements

Enter your acknowledgements here.

Table of Contents

Chapter One – Project Background and Significance 1

1.1 Introduction 1

1.2 Company Background 1

1.3 Project Background 1

1.4 Project Aim 1

1.5 Project Scope 1

1.6 Expected Outcomes 2

1.7 Thesis Structure 2

1.8 Concluding Remarks 2

Chapter Two – Literature Review and Project Methodology 3

2.1 Introduction 3

2.2 Source of Literature 3

2.3 Review of Literature 3

2.3.1 Overview… 3

2.4 Discussion 3

2.5 Project Methodology 3

2.6 Concluding Remarks 3

Chapter Three – Current System/Operation Analysis 4

3.1 Introduction 4

3.2 Second Heading 4

3.2.1 Subheading 4

3.3 Third Heading 4

3.4 Concluding Remarks 4

Chapter Four – Identification of Possible Approaches, Selection of the Best Solution and Risk Management 5

4.1 Introduction 5

4.2 Second Heading 5

4.2.1 Subheading 5

4.3 Third Heading 5

4.4 Concluding Remarks 5

Chapter Five – Detailed Analysis and Design of Selected Solution 6

5.1 Introduction 6

5.2 Second Heading 6

5.2.1 Subheading 6

5.3 Third Heading 6

5.4 Concluding Remarks 6

Chapter Six – Solution Implementation 7

6.1 Introduction 7

6.2 Second Heading 7

6.2.1 Subheading 7

6.3 Third Heading 7

6.4 Concluding Remarks 7

Chapter Seven – Testing and Evaluation 8

7.1 Introduction 8

7.2 Second Heading 8

7.2.1 Subheading 8

7.3 Third Heading 8

7.4 Concluding Remarks 8

Chapter Eight – Conclusions and Recommended Future Work 10

9.1 Introduction 10

9.2 Second Heading 10

9.2.1 Subheading 10

9.3 Third Heading 10

References 11

Appendix 1: Industry Supervisor Reports 12

Appendix 2: Project Daily Diary 13

RIGHT CLICK ON THE LIST AND GO TO ‘UPDATE FIELD’ TO UPDATE THE TABLE OF CONTENTS

List of Tables

Table 1.1 Insert table title 2

Table 3.1 Insert table title 4

Table 7.1 Insert table title 8

Table 7.2 Insert table title 8

Table 8.1 Insert table title 9

RIGHT CLICK ON THE LIST AND GO TO ‘UPDATE FIELD’ TO UPDATE THE LIST OF TABLES

List of Figures

Figure 1.1 Insert figure title 1

Figure 1.2 Insert figure title 1

Figure 3.1 Insert figure title 4

Figure 7.1 Insert figure title 8

Figure 8.1 Insert figure title 9

RIGHT CLICK ON THE LIST AND GO TO ‘UPDATE FIELD’ TO UPDATE THE LIST OF FIGURES

List of Abbreviations

  1. Chapter One – Project Background and Significance
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Company Background

This is where the reader is introduced to the company and its products and services. Pictures or diagrams are useful to include.

Figure 1.1 Insert figure title

  1. Project Background

This is where the reader is introduced to the background of the project. Provide some justification for the project but the main details are included in Chapter 3.

Figure 1.2 Insert figure title

  1. Project Aim

This is where the aim of the project should be clearly stated.

  1. Project Scope

This is where the project scope is clearly defined (what will be included in the project, and what will be excluded).

  1. Expected Outcomes

This is where the expected outcomes of the project are clearly stated. The outcomes should usually be stated in quantitative terms.

  1. Thesis Structure

This is where thesis structure is outlined, either by text or a diagram.

Table 1.1 Insert table title

  1. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Two – Literature Review and Project Methodology
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Source of Literature

This is where you describe the resources used for information retrieval in literature search and the composition of the body of literature being reviewed.

  1. Review of Literature

This section is to review current work and techniques retrieved from the literature search which are relevant to the focus of the project.

  1. Overview…
  2. Discussion

This section summarises/highlights the current status of literature in the context of the project.

  1. Project Methodology

This section explains to the reader how the project will be carried out.

  1. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Three – Current System/Operation Analysis
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

Table 3.2 Insert table title

Figure 3.3 Insert figure title

  1. Second Heading
    1. Subheading
  2. Third Heading
  3. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Four – Identification of Possible Approaches, Selection of the Best Solution and Risk Management
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Second Heading
    1. Subheading
  2. Third Heading
  3. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Five – Detailed Analysis and Design of Selected Solution
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Second Heading
    1. Subheading
  2. Third Heading
  3. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Six – Solution Implementation
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Second Heading
  1. Subheading
  2. Third Heading
  1. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Seven – Testing and Evaluation
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Second Heading

Table 7.3 Insert table title

Table 7.4 Insert table title

Figure 7.4 Insert figure title

  1. Subheading
  1. Third Heading
  1. Concluding Remarks

This is where the main findings or issues raised in the chapter are summarized and/or highlighted.

  1. Chapter Eight – Conclusions and Recommended Future Work
    1. Introduction

This is where you introduce the reader to the contents of the chapter.

  1. Second Heading
  1. Subheading
  1. Third Heading

References

Harvard format.

Use EndNote or Mendeley for referencing

Appendix 1

analysis of project

analysis of project

Cover page

AssignmentTutorOnline

Module Title or Module Code

student name & ID

Tutor’s name

Executive Summary

  • What are the findings that you have discovered within the report?
  • The executive summary is written at end.
  • picture or snapshot

Table of Content (Description, Page Numbers)

This is something that you have to create at the end.

Introduction

  • What are going to cover in this report?

Task 1-

Create Network diagram.

Explain the critical path activities. Outline description of the critical path,

(You will give reference to your research)

Highlighting the critical activities

Plus what your path for your project

Task 2.

What is stakeholder analysis of project? (Reference to your research)

Clearly identify internal and external stakeholder? (Within your project)

Conducting stakeholder analysis.

Briefly explain the above

(This would include your analysis, interpretation and evaluation of the stakeholders)

Task 3.

Develop a clearly numbered Work Breakdown Structure (WBS)

  • Simply explain that what WBS means (this should be reference through your research)

Hire publicity director

Music

Hire Orcestra

Budget Approval

Dress Rehearsal

Task 4

Risk Analysis

Explain Risk Strategies

(This is something you need to do some research to find, please reference to your research to this)

Risk Category Risk Identification Risk Analysis Risk Proximity.

Organisational

fdfd What do think Medium-High-Low.
Internal

dfsdf
External

dfds
Technological

Task 5

You are required to determine what the quality expectation, acceptance criteria, quality specification, and what measures would be put in place to control the event. In other words you write up in this section must cover these heading

Task 6.

  • To explain key methodologies with reference
  • To explain the key benefit
  • You might think providing a comparison
  • Finally you need to relate that which methodology fits for purpose.

Conclusion

List of References

Appendices

stakeholder analysis of project

stakeholder analysis of project

Cover page

AssignmentTutorOnline

Module Title or Module Code

student name & ID

Tutor’s name

Executive Summary

  • What are the findings that you have discovered within the report?
  • The executive summary is written at end.
  • picture or snapshot

Table of Content (Description, Page Numbers)

This is something that you have to create at the end.

Introduction

  • What are going to cover in this report?

Task 1-

Create Network diagram.

Explain the critical path activities. Outline description of the critical path,

(You will give reference to your research)

Highlighting the critical activities

Plus what your path for your project

Task 2.

What is stakeholder analysis of project? (Reference to your research)

Clearly identify internal and external stakeholder? (Within your project)

Conducting stakeholder analysis.

Briefly explain the above

(This would include your analysis, interpretation and evaluation of the stakeholders)

Task 3.

Develop a clearly numbered Work Breakdown Structure (WBS)

  • Simply explain that what WBS means (this should be reference through your research)

Hire publicity director

Music

Hire Orcestra

Budget Approval

Dress Rehearsal

Task 4

Risk Analysis

Explain Risk Strategies

(This is something you need to do some research to find, please reference to your research to this)

Risk Category Risk Identification Risk Analysis Risk Proximity.

Organisational

fdfd What do think Medium-High-Low.
Internal

dfsdf
External

dfds
Technological

Task 5

You are required to determine what the quality expectation, acceptance criteria, quality specification, and what measures would be put in place to control the event. In other words you write up in this section must cover these heading

Task 6.

  • To explain key methodologies with reference
  • To explain the key benefit
  • You might think providing a comparison
  • Finally you need to relate that which methodology fits for purpose.

Conclusion

List of References

Appendices

begun teaching at a Portsmouth school

begun teaching at a Portsmouth school

Scenario:Scenario: POMPEY ROCKS CLUB  In this scenario you are going to imagine that you are a geology graduate who has recently  begun teaching at a Portsmouth school. You know that the Portsmouth area is particularly  interesting geologically and decide to start a local geology club to encourage people to learn  about the subject. First you need to know how feasible such a club will be.  To do this you will design an electronic questionnaire which can be emailed to various  people and find out their opinions. The data gathered by your questionnaire will then be analysed using Access and Excel and subsequently incorporated into a PowerPoint  presentation given on the opening session of the ‘Pompey Rocks Club’!  Important point: Although your questionnaire should theoretically be capable of being  emailed do NOT actually do this. Instead ‘make up’ your own answers from twenty imaginary  people. This will save time.  Your assignment work will be carried out in four stages, or ‘Tasks’, like this:  Task 1 will gather data about people’s knowledge of geology.  Task 2 will analyse some of the text data that has been gathered.  Task 3 will analyse numerical data.  Task 4 will give a PowerPoint presentation about this analysis.  Here are these four tasks described in detail and showing how your work will be assessed.   Task 1: Microsoft Word  First you will sample ideas using a questionnaire, developed in Microsoft Word, containing  questions similar to these:  Would you like to join the Pompey Rocks Club?  Have you ever studied geology formally?  Would you enjoy field trips to important geological sites?  Do you understand plate tectonics?  Have you ever collected fossils?  Can you place the periods Silurian, Jurassic, Cambrian. and Permian in correct order?  Would you be prepared to buy and wear a club t-shirt?  Include a minimum of 10, and maximum of 15, questions in your questionnaire. Ensure that,  overall, these questions result in both text and numerical data being provided for your  subsequent analysis.  The questionnaire should also be designed so that it could be sent as an email attachment. It  should contain appropriate Microsoft Word controls: option buttons, check boxes, date picker  and drop-down lists.  You generate data from twenty such questionnaires   Task 2: Microsoft Access   You will now design a Microsoft Access database  for the raw data from your questionnaire. The  database will include a table including fields of  appropriate data type. Analysis of the data you have  gathered in Task 1 will then be carried out,  producing a query and a report.   Task 3: Microsoft Excel  Next you will analyse numerical data gathered from your questionnaires using Microsoft  Excel. This analysis will be statistical and include the mean, median and mode of relevant data. The spreadsheet should show that you can calculate standard deviation and perform  correlation between different datasets. In addition you will insert appropriate graphs and charts into your spreadsheet.   Task 4: Microsoft PowerPoint  Using PowerPoint, you will design a presentation of your collection and analysis of data. This  presentation should enable informed and sensible decisions to be made about how viable the  Pompey Rocks Club would be.   IMPORTANT:  All of your tasks will be uploaded to Moodle as a single Word document. You will use screen  capture to show relevant material developed in Access, Excel and PowerPoint.   Please look carefully at the marking criteria in the document uploaded and follow carefullyIn this scenario you are going to imagine that you are a geology graduate who has recently  begun teaching at a Portsmouth school. You know that the Portsmouth area is particularly  interesting geologically and decide to start a local geology club to encourage people to learn  about the subject. First you need to know how feasible such a club will be.  To do this you will design an electronic questionnaire which can be emailed to various  people and find out their opinions. The data gathered by your questionnaire will then be analysed using Access and Excel and subsequently incorporated into a PowerPoint  presentation given on the opening session of the ‘Pompey Rocks Club’!  Important point: Although your questionnaire should theoretically be capable of being  emailed do NOT actually do this. Instead ‘make up’ your own answers from twenty imaginary  people. This will save time.  Your assignment work will be carried out in four stages, or ‘Tasks’, like this:  Task 1 will gather data about people’s knowledge of geology.  Task 2 will analyse some of the text data that has been gathered.  Task 3 will analyse numerical data.  Task 4 will give a PowerPoint presentation about this analysis.  Here are these four tasks described in detail and showing how your work will be assessed.   Task 1: Microsoft Word  First you will sample ideas using a questionnaire, developed in Microsoft Word, containing  questions similar to these:  Would you like to join the Pompey Rocks Club?  Have you ever studied geology formally?  Would you enjoy field trips to important geological sites?  Do you understand plate tectonics?  Have you ever collected fossils?  Can you place the periods Silurian, Jurassic, Cambrian. and Permian in correct order?  Would you be prepared to buy and wear a club t-shirt?  Include a minimum of 10, and maximum of 15, questions in your questionnaire. Ensure that,  overall, these questions result in both text and numerical data being provided for your  subsequent analysis.  The questionnaire should also be designed so that it could be sent as an email attachment. It  should contain appropriate Microsoft Word controls: option buttons, check boxes, date picker  and drop-down lists.  You generate data from twenty such questionnaires   Task 2: Microsoft Access   You will now design a Microsoft Access database  for the raw data from your questionnaire. The  database will include a table including fields of  appropriate data type. Analysis of the data you have  gathered in Task 1 will then be carried out,  producing a query and a report.   Task 3: Microsoft Excel  Next you will analyse numerical data gathered from your questionnaires using Microsoft  Excel. This analysis will be statistical and include the mean, median and mode of relevant data. The spreadsheet should show that you can calculate standard deviation and perform  correlation between different datasets. In addition you will insert appropriate graphs and charts into your spreadsheet.   Task 4: Microsoft PowerPoint  Using PowerPoint, you will design a presentation of your collection and analysis of data. This  presentation should enable informed and sensible decisions to be made about how viable the  Pompey Rocks Club would be.   IMPORTANT:  All of your tasks will be uploaded to Moodle as a single Word document. You will use screen  capture to show relevant material developed in Access, Excel and PowerPoint.   Please look carefully at the marking criteria in the document uploaded and follow carefully

AssignmentTutorOnline

CRYSTALLINITY USING SOLID STATE TECHNIQUES

CRYSTALLINITY USING SOLID STATE TECHNIQUES

Faculty of Engineering and Science

AssignmentTutorOnline

School of Science

ANALYTICAL TECHNIQUES and

QA/QC PRINCIPLES

OMED 0104

DETERMINATION OF CRYSTALLINITY USING SOLID STATE TECHNIQUES-XRPD

Name: CHARMI THAKKAR

ID number: 001143170

Laboratory Group: 11

This submission is part of the Lab component of the OMED0104 module

TITLE:DETERMINATION OF CRYSTALLINITY USING SOLID STATE TECHNIQUES-XRPD

AIM:

INTRODUCTION:

INSTRUMENTS USED: JOEL JNMEZR 400 magnetic fielder.

SOFTWARE USED :Delta V5.3.1

GLASSWARE USED: clean NMR tube, cape, clean glass pipette. Cotton peace

CHEMICAL USED:Dimethyl sulphoxide d6 (DMSO d6), Tetramethyl silane (TMS).

PROCEDURE:

EVALUTION OF RESULT: percentage crystallinity by ratio. = (net area of the crystalline component / net area for the total crystalline + amorphous) * 100

DICUSSION:

CONCLUSION:

QUESTIONS: 1. What is the effect on the diffractogram of changing slit sizes?

2. What is the purpose of water-cooling, and why is it necessary?

3. Explain what the effect of a non-random powder sample would be on the diffractogram?

4. What is the effect on peak shape of crystallite size?

5. How is the n-term in the Bragg equation seen in diffractograms?

6. Why do we use monochromatic radiation as a source?

7. How can you explain intensity ratios in your samples which differ from the ICDD?

8. Which terms in the Bragg equation are the instrumental parameters?

9. What would changing the scan speed achieve, and why may you want to do this?

10 why does a diffractogram of an amorphous phase differ from a crystalline phase?

LEARNING OUTCOMES:

REFERENCE:

[In Process] 63846 – Assignment: Improvements to malware detection

[In Process] 63846 – Assignment: Improvements to malware detection

Assignment: Improvements to malware detection and classification
Machine learning is not all about autonomous vehicles and terminator robots. Techniques such as principle component analysis (PCA) can be combined with other data exploration techniques to help us gain a deeper understanding of the world around us. Many machine learning (ML) techniques aspire to reduce the complexity of data to simplify comparison and classification.
Computational techniques for analysing characteristics of ‘things’ can help to identify patterns and attributes which can be used to identify thing such as which species of plant a cell belongs to, what are the key drivers for business profitability, and what traits are common in certain diseases.
Background
TOBORRM
TOBORRM is a new computer security start-up. They have traditionally worked on hacking and penetration testing but are branching out into machine learning and active network defence systems. TOBORRM has received a grant to research and develop detection technologies for malware.
TOBORRM Data Collection
Early work by TOBORRM saw their development team automate the collection of data from download sites. The team developed a toolkit that could scour the internet for files and download them. TOBORRM used their automated tools to collect the MLDATASET-200000-1612938401 data. This dataset provides 200,000 samples of clean and malicious files which have been classified as ‘Clean’ or ‘Malware’, respectively.
The dataset gathered some basic statistics about file types, download locations and sizes. The programming team also created “CodeCheck” as an internal tool to try to identify some basic file properties (such as if the file is executable, or whether the file contains ‘recognisable text strings’). It is not known whether “CodeCheck” is reliable.
Unfortunately, the TOBORRM team does not understand the intricacies of machine learning models, and have developed the dataset without any consideration for scaling, categorisation of variables, encoding of data etc. The MLDATASET-200000-1612938401 will require significant cleaning and preparation for it to be useful for data visualisation and machine learning.
TOBORRM Dataset Malware Classification
In order to classify malware, TOBORRM used only ‘old’ files that were likely to have been identified by other malware and virus scanners.
1. TOBORRM’s data collector would send the file to virustotal.com
2. files were tagged as “Malicious” if a majority of virustotal.com virus scanners recognised the file as containing malware (see Figure 1)
3. Files were tagged as “Clean” if ALL virustotal.com scanners identified the file as “Clean”. (see
Figure 1)
Figure 1 – VirusTotal.com comparison of confirmed infected vs confirmed clean
As such, the “Actually Malicious” field can be considered to be a generally accurate classification for each downloaded sample.
Initially the security and software development teams believed they would be able to gain insight from various statistical analyses of the dataset. Their initial attempts to classify data lacked sensitivity and had many false positives, the results of TOBORRM’s analysis have been included in the “Initial Statistical Analysis” column of the data set and is provided for your information and comparison only.
SCENARIO
You have been brought on as part of a data analysis team to improve on their malware detection capabilities.
The basic analysis was conducted by TOBORRM staff based on their ‘gut feel’ and some basic statistical understanding. You will be trying to improve their initial statistical analysis by using various machine learning models for analysis and classification.
The raw data for your machine learning analysis is contained in the MLDATASET-200000- 1612938401.csv file.
The variables in the dataset are as summarised in the table below.
Feature Description Data Type
Sample ID ID number of the collected sample Numeric
Download Source A description of where the sample came from Categorical
TLD Top Level Domain of the site where the sample came from Categorical
Download Speed Speed recorded when obtaining the sample Categorical
Ping Time To Server Ping time to the server recorded when accessing the sample Numeric
File Size (Bytes) The size of the sample file Numeric
How Many Times File Seen How many other times this sample has been seen at other sites (and not downloaded) Numeric
Executable Code Maybe Present in Headers ‘CodeCheck’ Program has flagged the file as possibly containing executable code in file headers Binary
No Executable Code Found In Headers ‘CodeCheck’ Program has flagged the file as not containing executable code in the file headers Binary
Calls to Low-Level System Libraries When the file was opened or run, how many times were low-level Windows System libraries accessed Numeric
Evidence of Code Obfuscation ‘CodeCheck’ Program indicates that the contents of the file may be Obfuscated Binary
Threads Started How many threads were started when this file was accessed or launched Numeric
Mean Word Length of Extracted
Strings Mean length of text strings extracted from file using unix ‘strings’ program Numeric
Similarity Score An unknown scoring system used by
‘CodeCheck’ seems to be the score of how
similar the file is to other files recognised by ‘CodeCheck’ Numeric
Characters in URL How long the URL is (after the .com / .net part). E.g. /index.html = 10 characters Numeric
Actually Malicious The correct classification for the file Binary
Initial Statistical Analysis Previous system performance of “FileSentry3000™ v1.0” Binary
Your initial goals will be to
• Clean and prepare the data for data exploration and basic data analysis, and later (for Assignment 2) for ML modelling.
• Perform Principal Component Analysis (PCA) on the data.
• Identify features that may be useful for ML algorithms
• Create a brief report to the rest of the research team that will describe whether a subset of features could be used to effectively identify malicious files.
TASK
First, copy the code below to a R script. Enter your student ID into the command set.seed(.) and run the whole code. The code will create a sub-sample that is unique to you.
#You may need to change/include the path of your working directory
#Import the dataset into R Studio.
dat – read.csv(-MLDATASET-200000-1612938401.csv-, na.strings=–, stringsAsFactors=TRUE)
set.seed(Enter your student ID here)
#Randomly select 500 rows selected.rows – sample(1:nrow(dat),size=500,replace=FALSE)
#Your sub-sample of 500 observations and excluding the 1st and last column mydata – dat[selected.rows,2:16]
dim(mydata) #check the dimension of your sub-sample
You are to clean and perform basic data analysis on the relevant features in mydata, and as well as principle component analysis (PCA). This is to be done using “R”. You will report on your findings.
Part 1 – Exploratory Data Analysis and Data Cleaning
(i) For each of your categorical or binary variables, determine the number (%) of instances for each of their categories and summarise them in a table as follows.
Categorical Feature Category
Feature 1 Category 1 10 (10%)
Category 2 30 (30%)
Category 3 60 (60%)
Feature 2 (Binary) YES 75 (75%)
NO 25 (25%)
… … …
Feature k Category 1 25 (25%)
Category 2 25 (25%)
Category 3 15 (15%)
Category 4
35 (35%)
(ii) Summarise each of your continuous/numeric variables in a table as follows.
Continuous Feature N (%) missing Min Max Mean Median Skewness
Feature 1
Feature2
….
Feature k
….
….
….
….
….
….
(iii) Examine the results in sub-parts (i) and (ii). Are there any invalid categories/values for the categorical variables? If so, how will you deal with them and why? Is there any evidence of outliers for any of the continuous/numeric variables? If so, how many and what percentage are there and how will you deal with them? Justify your decision in the treatment of outliers (if any).
Part 2 – Perform PCA and Visualise Data
(i) Clean your data as you have suggested in Part 1 (iii) to make it usable in “R”.
(ii) Export your “cleaned” data as follows. This file will need to be submitted along with you report.
#Write to a csv file.
write.csv(mydata,-mydata.csv-)
** Do not read the data back in and use them **
(iii) Extract the data for the numeric features in mydata, along with Actually.Malicious, and store them as a data fromtibble. Then, perform PCA using prcomp(.) in R, but only on the numeric features.
– Outline why you believe the data should or should not be scaled, i.e. standardised, when performing PCA.
– Outline the individual and cumulative proportions of variance explained by each of the first 4 components.
– Outline the coefficients (or loadings) for PC1 to PC4, and describe the loadings for the PC1 and PC2 only.
– Outline how many principal components are adequate to explain at least 50% of the variability in your data.
(iv) Create a scree plot and interpret.
(v) Create a biplot with PC1 and PC2 to help visualise the results of your PCA in the first two dimensions. Colour code the points with the variable Actually.Malicious. Write a paragraph to explain what your biplot is showing. That is, comment on the PCA plot, the loading plot individually, and then both plots combined (see Slides 28-29 of Module 3 notes) and outline and justify which (if any) of the features can help to distinguish Malicious and Non- Malicious files.
(vi) Based on the results from parts (iii) to (v), describe
– which dimension (choose one) can assist with the classification of malwares (Hint: project all the points in the PCA plot to PC1, i.e. horizontal axis and see whether there is good separation between the points for malicious and non- malicious files. Then project to PC2,
i.e. vertical axis and see if there is separation between the malware and non-malware, and whether it is better than the projection to PC1).
– the key features in this dimension that can drive this process (Hint: based on your decision above, examine the loadings from part (iii) of your chosen PC and choose those whose absolute loading (i.e. disregard the sign) is greater than 0.3).

What to Submit
1. A single report (not exceeding 5 pages, does not include cover page, contents page and reference page, if there is any) containing:
a. summary tables of all the variables in the dataset;
b. a list of data issues (if any) and how you have dealt with them in the data cleaning process;
c. your implementation of PCA and interpretation of the results, i.e. variances explained, scree plot, and the contribution of each feature for PC1 and PC2;
d. biplot and its interpretation;
e. your explanation of selection and contribution of the features with respect to possible identification of malicious files.
If you use any references in your analysis or discussion outside of the notes provided in the unit, you must cite your sources.
2. The dataset containing your sub-sample of 500 observations, i.e., mydata.
3. A copy of your R code.
The report must be submitted through TURNITIN and checked for originality. The R code and data file are to be submitted separately via a Blackboard submission link.
Note that no marks will be given if the results you have provided cannot be confirmed by your code.
Marking Criteria
Criterion Contribution to assignment mark
Correct implementation of descriptive analysis, data cleaning and PCA in R 20%
Correct explanation and justification in the treatment of missing and/or invalid observations in the data cleaning process 10%
Accurate specification and interpretation of the contribution of principal components and its loading coefficients. 15%
Accurate scree plot, with appropriate interpretation. 5%
Accurate biplot, with appropriate interpretation presented 25%
Appropriate selection of dimension for classification and features that contribute to the identification malicious files with justification 10%
Communications skills – Tables and figures are well presented. Report, analysis and overall narrative is well-articulated and communicated using language appropriate for a non-mathematical audience
15%
Total 100%

Initial Dissertation ProposalTopic: Maritime Strategy

Initial Dissertation ProposalTopic: Maritime Strategy

Initial Dissertation Proposal
Topic: Maritime Strategy and Naval Innovation: Technology, Bureaucracy, and the Problem of Change in the Age of Competition
For the purposes of finalization of the Dissertation Topics, the candidates are required to first submit a 1000 words Dissertation Proposal indicating a proposed Research Scheme. The Research Proposal should contain the following sub-chapters:
?  Introduction of the Dissertation Topic: The researcher is required to introduce the subject and the issue involved in brief. ?
?  Statement of Problem: The researcher is required to explain the debatable issue involved in a research topic. Such issues could be single or multiple. A Statement of Problem is basically a statement that illustrates a clear vision and the overall method that will be used to solve the problem at hand. Usually used when doing research, a problem statement discusses any foreseeable tangible or intangible problems that the researcher may face throughout the course of the project. ?
?  Research Questions: A research question is an answerable inquiry into a specific concern or issue. It is the initial step in a research project. The 'initial step' means after you have an idea of what you want to study, the research question is the first active step in the research project. ?
?  Hypothesis: A research hypothesis is the statement created by researchers when they speculate upon the outcome of a research or experiment. It is an assumption with which the researcher begins its research and throughout the research paper, the researcher should seek to prove or disprove the hypothesis. ?

?  Scope of Study: The researcher is required to identify the broad framework within which the study is designed. The researcher may also highlight the limitations of the study within this segment. ?
?  Objective of Study: The researcher has to identify the aims and objective of the study i.e. what the researcher ?
?  Research Methodology: The method that the researcher adopts to conduct a research i.e. doctrinal or non-doctrinal or empirical. The researcher has to state along with the method the justification of using the method in a research paper / project. Please note that the researcher can use a combination of both the methods as long as the researcher is able to justify the usage of the combined method. ?
?  Literature Review: The researcher has to go through the existing materials (both primary and secondary) and provide a review or assessment of the existing literature. ?
?  Tentative Chapterization: The researcher is required to briefly state how the researcher intends to go about the research. The researcher is required to categorize the paper / project into broad chapter and provide a gist of contents that the researcher intends to include in each chapter. ?Upon scrutinizing the initial dissertation proposal, the course-coordinator will either approve or reject the proposal. In the event of rejection/modification of the proposed Research Proposal, the candidate will have to re-submit another Research Proposal incorporating the suggested changes within a stipulated time fixed by the course-coordinator.

summarize the topic of the reading and the author’s arguments, thereafter, provide your own analysis using these questions as guidelines:

summarize the topic of the reading and the author’s arguments, thereafter, provide your own analysis using these questions as guidelines:

summarize the topic of the reading and the author’s arguments, thereafter, provide your own analysis using these questions as guidelines:

Reading Review: 10% worth 100 points. Due on Wednesday March 24, 2021 via Turnitin. You are responsible for doing a two-page review on one of three assigned readings on U.S-Latin American Relations: 1820s-1930s. Choose ONE (ONLY ONE) of the following three readings found in Canvas Readings:

  • Strong – The Anglo Saxon And the World’s Future
  • Pike – “Wild People Wild Lands”
  • Langley – “Leonard Wood and the White Man’s Burden”

Please summarize the topic of the reading and the author’s arguments, thereafter, provide your own analysis using these questions as guidelines: What was the data and evidence used by the author to support his arguments being made? Was the article it informative why or why not? Was the data or evidence used biased, why or why not? Is there anything about the reading that you agree and/or disagree with? Why do you agree/disagree? Finally, what are your observations on the reading?

Provide as much detail drawn from the article and use quotes to illustrate your discussion on the topic.

Follow the format for written assignments: Put your name, course, professor, date on the assignment. Use Times New Roman Font 12, & Double Space.

Please proof read! Spelling and grammatical errors stunt the power of the arguments made in your paper.

describe in your own words the event, discuss why you find it interesting, how it relates to Latin American Politics and/or International Relations of Latin America

describe in your own words the event, discuss why you find it interesting, how it relates to Latin American Politics and/or International Relations of Latin America

describe in your own words the event, discuss why you find it interesting, how it relates to Latin American Politics and/or International Relations of Latin America

Do a summary of a news event.

  • The event must be related to countries in Latin America and it must be a current news event.
  • For example, if you do an event on the United States it will not count towards the participation grade.
  • However, if the news event is on US-Latin American relations, then the event does count towards this discussion.

Format: The submission should include the: date & title of the news article, news source, and author if listed.

  • Please provide the title of the news article you are referring to & link to the article.
  • This is so that people can read the article for themselves if they are interested in the issue.

Content: Briefly, 1 to 2 paragraphs, describe in your own words the event, discuss why you find it interesting, how it relates to Latin American Politics and/or International Relations of Latin America.

You may submit up to 2 events at 1 pt each per session, for a total of 2pts. You can also post a comment on a colleague’s event for an additional 1 point. Although I do encourage “Liking,” it does not earn any points.

2 Events