Get help from the best in academic writing.

Deep learning based 3D Medical Image registration ————-Introduction–Section 1————— 2 Pages 1.1. Convolutional neural network 1.2. Autoencoder 1.3. Recurrent

Deep learning based 3D Medical Image registration

————-Introduction–Section 1————— 2 Pages
1.1. Convolutional neural network
1.2. Autoencoder
1.3. Recurrent neural network
1.4. Reinforcement learning
1.5. Generative adversarial network

————–Literature and Related work ——Section 2————— 6 Pages
Overview of previous work in 3D Medical Image Registration using Deep learning Categorized
into 3 category:

2.1 Deep Iterative Registration
2.1.1 Deep SimilarityBased Registration
2.1.2 Reinforcement Learning-based Registration

2.2 Supervised Registration
2.2.1 Fully Supervised Registration
2.2.2 Weakly Supervised Registration
2.2.3 Dual Supervised Registration

2.3 Unsupervised Registration
2.3.1 Similarity Metric-based Registration
2.3.2 GAN-Based Registration

————–Section 3————— 2 Pages
Explain loss functions used in the following papers by writing formula and explaining each term in your own words

3.1 Voxemorph (https://arxiv.org/pdf/1802.02604.pdf)
3.2 LapIRN (https://arxiv.org/pdf/2006.16148.pdf)
3.3 CLapIRN (https://arxiv.org/pdf/2106.12673.pdf)

Instructions:
1. In section 1 the subsections (1.1 – 1.5) should give general idea about the topic.
Each subsection is Type of neural network architecure. It should be refered from different
research papers. And must be written in Data Sciene and Machine learning architecutre context.

2. All the work must not be plagrized.

3. It should not be a paraphrased copy of the reference paper. None of the content should be a paraphrased version of abstract of the reference paper

4. All subsections (1.1 – 2.3) should have atleast 5 – 6 reference papers.
Almost all sentecnce in a paragraph should be written by referencing a different research paper and should be on your own words since it is related work section.
i.e One paragraph or sub section should not be completly written from one reference paper.

5. In section 2 the subsections(2.1 – 2.3) should be written in terms of Medical Image
Registration. Attached papers will give overview of how it should be written.

6. The paper should be written from Computer Science point of view, therfore the focus should be on Medical Image
Registration algorithms using Deep learning. It should not focus on Doctors, lab-technician, medical expert
and other stake holders point of view.

7. Section 1 should be written for 2 pages (single-spaced, without diagrams and tables)

6. Section 2 Should be written for 6 pages (single-spaced, without diagrams and tables)

8. Section 3 Should be written for 2 pages (single-spaced) with equations provided in reference papers.

Map Set Hydrosphere

Map Set Hydrosphere.

Possible Hazard Topic Ideas include (but are not limited to): Week 4 Map Set Hydrosphere: Snow blizzards Tsunami Sea level Rise Storm Surge Flooding Ground Water Pollution Check out http://earthonlinemedia.com/ebooks/tpe_3e/earth_system/natural_systems.html#earth_system for definitions of the earth “spheres” . You should map the SAME HAZARD data set at three different scales starting with the local scale (shows 1 city), zooming out to a regional scale (shows 1 state or small country), and finally zooming out to a global scale (shows 1-2 continents). Your map set (3 Maps, 3 descriptive paragraphs) should be submitted on ONE single .doc or .pdf. The descriptive paragraphs should explain the hazard pattern (Where is the hazard occurring and not occurring?), process (Why does the hazard occur some places but not others?), and proposed solutions (How dangerous is this hazard? How could this hazard be managed?).

Outside research should be conducted and cited. How will you make an original map set for each sphere? In order to make a map you need a base map, and data. You will use a variety of sources such as NATIONAL MAP, NATIONAL GEOGRAPHIC MAP MAKER, GOOGLE EARTH, to get base maps and data, NOAA, NATIONAL HAZARD VIEWER, HISTORICAL HURRICANE TRACKER, TORNADO HISTORY PROJECT, WATER RISK ATLAS, and WINDYTY. There are 4 steps to this part of the assignment: Choose a free map maker and play around with the available data. Decide which hazard you want to map. Once you have mapped the hazard data, look for patterns at local (1 ctiy), regional (1 state or small country) and global (1-2 continents) scales. If interesting patterns emerge, then you will want to do some research so you can explain the geographic pattern & process. If no patterns emerge, then you may want to map a different data set or look in a different area (zoom in/out or focus on a different area). Finally you will capture an image of your completed map (or just a screen shot) and import it into a word processing program like word where you can add a title, legend, any labels, a paragraph caption and your screencast URL. Your INDIVIDUAL Map Set Should Be original, and cite all outside data and sources Map the week’s sphere hazard at local (1 city or county), regional (1 state or small country) and global (the entire U.S., a continent, or the world) scales. Contain a descriptive paragraph caption (5-10 sentences, college level writing) which describes the hazard patterns, process and proposed solutions. Contain a scale bar (Links to an external site.)Links to an external site., north arrow, legend and descriptive title. Be easy to see and read.

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

Cryptography and other Digital Forensics Challenges

Deep learning based 3D Medical Image registration ————-Introduction–Section 1————— 2 Pages 1.1. Convolutional neural network 1.2. Autoencoder 1.3. Recurrent Cryptography and other Digital Forensics Challenges.

 PROJECT 3- Cryptography and other Digital Forensics Challenges Step 1: Explain Cryptography Basics It is important to lay a foundation for the work that the temp IT workers in the scenario are expected to do. The building blocks of the foundation should be a familiarity with the processes of encryption and decryption, and the meaning of keys. You will need to explain the differences between asymmetric and symmetric key cryptography and the significance of public key infrastructure. It is also important to include a description of encrypted data in terms of randomness and entropy. “Basic Cryptography” will be the first section of your job aid. It should include two parts: A description of the basic elements of cryptography including the following: the roles of encryption and decryption in public and private keys the differences between asymmetric and symmetric key cryptography public key infrastructure the nature of encrypted data regarding randomness and entropy An explanation of the possible significance of this information for the agency; that is, how does an examiner know whether encrypted data is present? What are the examiner’s options for dealing with encrypted data? Prepare a 2-page document organized in bulleted form (APA format). Refer to in-class readings and outside resources for your content. Remember that your audience is composed of temp workers or new hires—that is, nonexperts. Review your summary carefully for accuracy and completeness. You will include it in the job aid to be delivered in Step 6. In the next step, you turn to the question of whether the suspect’s disks and file systems have been encrypted by demonstrating an analysis of partitions. STEP 2: Examine Evidence Partitions (THE PROFESSOR WANTS THIS STEP SUBMITTED BEFORE MOVING TO STEP 3. CAN YOU PUT THIS STEP IN A SEPARATE SUBMISSION TO ME SO THAT I CAN SEND THIS STEP IN SEPARATELY FROM THE PAPER OR CAN YOU PROVIDE ME WITH THIS WHEN YOU ARE DONE). Demonstration and hands-on training are always most effective, so you turn to the former in Step 2. Digital forensic investigators need to understand how to examine evidence partitions. In a case that you are working on currently, the suspect’s computer contains four disk partitions. A disk partition is a portion of a whole disk with its own file system. Access the virtual lab to examine evidence partitions in order to determine whether files on each partition are encrypted, defragmented, securely deleted, or none of these. If they have been encrypted, what process was used: NTFS encrypted file systems, BitLocker, PGP, etc.? After conducting your analysis, you demonstrate how you would document your findings in a formal forensic report. Include descriptions of destruction strategies such as wiping, overwriting, corruption, and degaussing. Make sure these strategies are explained in terms that IT temps, recent hires, and other non-experts can understand in a consistent way. This will be the first section of your investigative report. Share this section of the report with a colleague (your instructor) for review and feedback before continuing to the next step, where you will search for hidden data in files. Make sure to incorporate any suggested changes. This will be the first section of the sample investigative report to be included in the job aid submitted in the final step. Step 3: Search for Hidden Data In the previous step, you demonstrated the examination of partitions for encryption, compression, and wiping. In this step you access the virtual lab to show trainees how to search for hidden data in .jpg files. As you prepare to demonstrate the process, you remind them that the tools you are using are only some examples of the many steganography, forensic tools, and anti-forensic tools that can be used. Multiple tools exist to address any problem, and learning how to select and use the appropriate ones is a valuable skill. After demonstrating the search, you show trainees how to describe findings as you would in a formal forensic report, making sure the findings are in terms that nonexperts can understand. Take special care to indicate the nature of the data, how you found it (including the tools used), and where it is hidden. Review your document carefully for accuracy and completeness. It is the second section of your sample investigative report. You will include it in the job aid to be delivered at the end of this project. Next, you will show trainees how to search for suspicious software on a suspect’s computer.

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/

What are the most frequently occurring health problems of elders?

What are the most frequently occurring health problems of elders?.

The fourth Reflective Reading Blog includes Chapter 8, which is pages 204 through 229 of your textbook, and Chapter 9, which is pages 230 through 254 of your textbook.

The deadline to post 3-2-1 Reflective Reading Blog 2 is Monday, March 4, 2019 No late blogs will be accepted for a grade after the due date.

3-2-1 Reflective Reading Blog – Parts 1 & 2 – up to 20 points

Evidence of critical thinking/quality responses Chapter Review Questions – up to 20 points

The grading rubric for the 3-2-1 Reflective Reading Blogs is included in the syllabus. 

______________________________________________________________________

Writing Assignment Instructions:

After completion of the mandatory readings, students will post their answers to the following questions in complete sentences using proper grammar and upper division critical thinking skills using the Blackboard Blog Tool.  Make sure to answer with sufficient detail to illustrate you completed the assigned readings.  Typical overall length for Parts 1 & 2 should be at least 750-1000 quality words in length to score in the “A” range of 18-20 points. 

Part 1:  Explain three things that you learned from the textbook reading and supplemental materials.  The typical length for this section is 3 to 5 paragraphs.  Make sure to include how you can use the things you learned in your chosen career, how they may impact your life or your family and friends, and find one resource that you could use to find out more information about your favorite thing you learned.

Part 2:  List two things you found interesting and explain why you found them interesting.  The typical length for this section is 2 to 4 paragraphs.  Explain why you chose the topics you did, why you find them interesting, how they may impact your chosen career, how they may impact your life or your family and friends, and find one resource that you could use to find out more information about the topic you found the most interesting.

The first half of your 3-2-1 Reflective Reading Blogs work together to form an overview of the field of Health Education and a review of the textbook from your point of view.  By the end of the class, you will have written a “research paper/analysis paper” over the topics of health education.  The 3-2-1 Reflective Reading Blogs serve as your major writing assignment for the course, just produced in small, manageable chunks throughout the semester.  Please take these writing assignments seriously because they represent a large portion of your overall grade in the course.

Part 3:  Once you have completed Parts 1 & 2 of the 3-2-1 Reflective Reading Blog Assignment, please answer the assigned chapter review questions in detail.  Chapter Review Questions are worth up to 20 points.  You can find the assigned chapter review questions below.

 

Chapter Review Questions – Chapter Eight – Page 227

1.  Why is it important for community and public health workers to be aware of the significant health problems of the various age groups in the United States?

2.  What are the leading causes of death for adolescents and young adults?  For adults?

3.  What are the behaviors that put each of these cohorts at greatest risks?  The cohorts are adolescents, college students, and adults.  Why?

4. What is the Youth Risk Behavior Surveillance System (YRBSS)?  What type of data does it generate?  How is it used in our community?

5.  What is the Behavioral Risk Factor Surveillance System (BRFSS).  What type of data does it generate?  How is it used in our community?  State? On the National Level?

Chapter Review Questions – Chapter Nine – Page 252

1. How do the income needs of people change in retirement?

2.  What are some of the major problems caregivers face?

3.  What is an assisted-living residence?

4.  What are the most frequently occurring health problems of elders?

5.  From what financial sources do elders normally pay for health care?

6.  How do income and health status affect the transportation needs of elders?

7.  What are Area Agencies on Aging?

8.  What is the difference between adult day care and respite care?

 

Essay Help “>Essay Help

Focus on how to improve target HbA1c in African American patients suffering with diabetes type II by promoting education on treatment and diabetes medication compliance in one year.

Focus on how to improve target HbA1c in African American patients suffering with diabetes type II by promoting education on treatment and diabetes medication compliance in one year..

The last paper you did is not graded yet whatever the grade is, you did a good job in it. Keep the good job. I thank you for your assistance. Please read the previous paper you read so the PICOT question can be appropriate. Our focus on how to improve target HbA1c in African American patients suffering with diabetes type II by promoting education on treatment and diabetes medication compliance in one year. Submit a 2-3 page paper that explores the background of your issue. For this paper #1 you will be defining this issue or disease using the literature. It will end with the PICOT question. The parts of your paper should include: • Introduction • Definition • Epidemiology • Clinical Presentation • Complications • Diagnosis • Conclusion with PICOT Question

Essay Help “>Essay Help

https://onlinecustomessaywriting.com/