The Turing Machine Assignment Questions

CISC520 Data Engineering and Mining
Task description: The data set comes from the Kaggle Digit Recognizer competition. The goal is to recognize digits 0 to 9 in handwriting images. Because the original data set is large, I have systematically sampled 10% of the data by selecting the 10th, 20th examples and so on. You are going to use the sampled data to construct prediction models using multiple machine learning algorithms that we have learned recently: naïve Bayes, kNN and SVM algorithms. Tune their parameters to get the best model (measured by cross-validation) and compare which algorithms provide a better model for this task. Report structure: Section 1: Introduction Briefly describe the classification problem and general data pre-processing. Note that some data pre-processing steps may be specific to a particular algorithm. Report those steps under each algorithm section. Section 3: Naïve Bayes Build a naïve Bayes model. Tune the parameters, such as the discretization options, to compare results. Section 3: K-Nearest Neighbour method section 4: Support Vector Machine (SVM)Section 4: Algorithm performance comparison Compare the results from the two algorithms. Which one reached higher accuracy? Which one runs faster? Can you explain why?

Advanced Tasks-Turing Test
a) In the appendix to this lab sheet and as support materials on Moodle there are two transcripts of Turing Tests. On the left of each transcripts the interaction between the judge and one hidden entity and on the right is the interaction between the judge and the second hidden entity. These interactions happen at the same time.
Review the two Turing Test transcripts and analyse the question-answer sequences between a human interrogator and two hidden entities in two different simultaneous comparison Turing tests from actual Turing test experiments (Transcript One - 2008 loebner Prize at Reading University; Transcript Two - Turing100 at Bletchley Park in 2012).
Explain if your feel that the hidden entities in these two transcribes meet Turing’s criteria of answering the Interrogators questions in a satisfactory manner. (up to 100 word)
Please explain in up to 50 words whether the hidden entities in these two transcripts being questioned in parallel by the human interrogator, are:
One human and one machine? If so, which is which (left right)? Two humans? Two machines?
b) If you created a Chatbot, what strategy would you use to convince the judge that they are talking to a human? You should give at least 2 example responses to human input based on your strategy. The human inputs could be: “How are you?”, “What year is it?”, “Where are you?”, “Are you a robot?”, Are you human?’ (Up to 50 word)

Show that over one complete cycle, the average value of a sine function squared is 1/2.

 Following with Exercise 8 of Chapter 13 you have downloaded


Following with Exercise 8 of Chapter 13: you have downloaded a stock index at different frequencies, daily, weekly, and monthly. For each frequency, compute the 1-step-ahead volatility forecast by implementing the best (G) ARCH model and compare it to that of MA and EWMA.


Following with Exercise 8 of Chapter 13 you have downloaded

In paralytic squint a. primary deviation > secondary deviation b. primary deviation
Compare what makes you tick with what makes Diondra Jordan tick. Explain how you are like Diondra and how you are different from her
The Website represents an electronic document titled “Standards Organizations” written by William Stallings

The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled “Standards Organizations” written by William Stallings (2009), located at.

Write a three to four (3-4) page paper in which you:

  1. Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
  2. Justify the need of the IEEE 802 standard used in networking.
  3. Evaluate the three (3) standard organizations including, ISO, and ANSI to determine the most important for communication technology.
  4. Take a position on the need for a federal regulating body of standards such as. Include supporting evidence to justify your opinion.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the needs of communication networks in a business environment.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions
A large company with a number of products wants to start selling on the Web. Should it use a merchant server or an electronic suite? Assuming the company elects to establish an electronic storefront, how would you determine whether it should outsource the site or run it itself?

What are some ways that an organization can protect the availability of its information and computer systems in the event of a natural disaster?

realisation written in the format of the Turing Machine simulator is a special state H which means halt. For the given Below is a Turing machine program where each line is a transition written current state, read symbol, new state, write symbol, direction e-d. weans to state 4, write a 1 and move the tape head left. Notice there is a special state a so on the leftmost n marks, write the resulting bit string when the TM reaches the halt state, assuming the tape ,1, < means when in state 3 with read symbol is 0, go e that the underscore character means a blank. The input string is assumed to be 1,0,2,0,> 2,0,2,0,> head starts on the leftmost bit of the input string. is assumed to be preceded and followed by all blanks Resulting bit string when TM halts Input string b) 0 c) 10 d) 001 d) 101 e) 000001 f) 101111 4,0,4,0, realisation written in the format of the Turing Machine simulator is a special state H which means halt. For the given Below is a Turing machine program where each line is a transition written current state, read symbol, new state, write symbol, direction e-d. means to state 4, write a 1 and move the tape head left. Notc there is a special state a so on the leftmost n nanks, write the resulting bit string when the TM reaches the halt state, assuming the tape ,1, 2,0,2,0,> head starts on the leftmost bit of the input string. is assumed to be preceded and followed by all blanks Resulting bit string when TM halts Input string b) 0 c) 10 d) 001 d) 101 e) 000001 f) 101111 4,0,4,0,

During muscle contraction, the I band get smaller and the Z lines get closer together, but the A bands do not change in size.
Describe the special features of transformation and note the importance of plasmids in this process.

How you would recommend the company back up and protect its network data. Your plan must be 1,250 to 1,500 words in length, and your recommendations must be based on the RAID system of data protection. Your plan must also address how the company should protect against natural disasters that might occur in the company€™geographic location.

QUESTION TITLE: - IT 240 Disaster Plan

CIS 505 Assignment 1: Standards Research Due Week 2 and worth 60 points the following Website may be used for reference to complete this assignment. The Website represents an electronic document titled “Standards Organizations€ written by William Stallings (2009), located at http://www.box.net/shared/9dtnzvwys8/1/15730219/164146343/1.Write a three to four (3-4) page paper in which you:1.Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.2.Justify the need of the IEEE 802 standard used in networking.3.Evaluate the three (3) standard organizations including IEEE, ISO, and ANSI to determine the most important for communication technology.4.Take a position on the need for a federal regulating body of standards such as NIST. Include supporting evidence to justify your opinion.5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: · Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. · Include a cover page containing the title of the assignment, the student€™s name, the professor€™s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

You have been asked to help your company s senior management decide whether to outsource security or keep the security function within the firm. Search the Web to find information to help you decide whether to outsource security and to locate security outsourcing services. Then use Microsoft PowerPoint to prepare an electronic presentation for the senior management. Your presentation should contain the following elements: (a) Summarize the arguments for and against outsourcing computer security for your company. (b) Select two firms that offer computer security outsourcing service, and compare their services. (c) Make the case on whether or not your company should outsource computer security. If you believe your company should outsource, identify which security outsourcing service you selected and justify your recommendation.