
solve for the computer science questions below The second string is of the same length as the first and is different at only a single positioncontaining the unique symbol C. The first string can be described concisely as “AB 17times.” However, the second string has a single position corresponding to the symbol C.Therefore, the second string can no longer be described as concisely. In other words, thepresence of the symbol C somewhere in the string increases its minimum description length.It is also easy to see that this symbol corresponds to an outlier. Information-theoretic modelsare based on this general principle because they measure the increase in model size requiredto describe the data as concisely as possible.Information-theoretic models can be viewed as almost equivalent to conventionaldeviation-based models, except that the outlier score is defined by the model size for afixed deviation, rather than the deviation for a fixed model. In conventional models, out-liers are always defined on the basis of a “summary” model of normal patterns. When adata point deviates significantly from the estimations of the summary model, then thisdeviation value is reported as the outlier score. Clearly, a trade-off exists between the sizeof the summary model and the level of deviation. For example, if a clustering model is used,then a larger number of cluster centroids (model size) will result in lowering the maximumdeviation of any data point (including the outlier) from its nearest centroid. Therefore, inconventional models, the same clustering is used to compute deviation values (scores) forthe different data points. A slightly different way of computing the outlier score is to fixthe maximum allowed deviation (instead of the number of cluster centroids) and computethe number of cluster centroids required to achieve the same level of deviation, with andwithout a particular data point. It is this increase that is reported as the outlier score in theinformation-theoretic version of the same model. The idea here is that each point can beestimated by its closest cluster centroid, and the cluster centroids serve as a “code-book”in terms of which the data is compressed in a lossy way.Information-theoretic models can be viewed as a complementary version of conventionalmodels where a different aspect of the space-deviation trade-off curve is examined. Virtu-ally every conventional model can be converted into an information-theoretic version byexamining the bi-criteria space-deviation trade-off in terms of space rather than deviation.The bibliographic notes will also provide specific examples of each of the cases below:1. The probabilistic model of Sect. 8.3 models the normal patterns in terms of genera-tive model parameters such as the mixture means and covariance matrices. The spacerequired by the model is defined by its complexity (e.g., number of mixture com-ponents), and the deviation corresponds to the probabilistic fit. In an information-theoretic version of the model, the complementary approach is to examine the size ofthe model required to achieve a fixed level of fit.2. A clustering or density-based summarization model describes a data set in terms ofcluster descriptions, histograms or other summarized representations. The granularityof these representations (number of cluster centroids, or histogram bins) controls thespace, whereas the error in approximating the data point with a central element ofthe cluster (bin) defines the deviation. In conventional models, the size of the model(number of bins or clusters) is fixed, whereas in the information-theoretic version, theThe project team wants to run multiple pilot migrations of non-production applications and has tasked you with creating a migration assessment and target architecture for one of their legacy applications. The project team doesn’t have any preference for a preferred treatment and is open to any of your recommendations, as long as they factor in the cost and operational readiness.Technical Details and RequirementsThe company has invested heavily in VMware and most of the applications are running on virtualized hardware. Hardware appliances are used as load balancers. The three-tier pilot application was developed in-house and consists of multiple Windows servers for the web-based frontend and application servers. The database itself is MS SQL which is maintained by a dedicated database team. For the application team, the database is represented as an endpoint, they are not aware of the infrastructure supporting the DB. The application stores 15TB of customer records in PDF format on two Windows file servers. The application team is not managing any of the app related infrastructure currently and the on-premises infra team has limited cloud exposure.A suitable landing zone in AWS and a 3 node (i3) VMC on AWS cluster has been deployed by the project team already and all network links between on-premises and cloud are in place. The application team is excited to assist during the migrations, but their time is limited and wouldn’t allow for significant changes to the application stack if your design would require this.Image transcription textProblem 1: Given an unsorted array ofintegers, we want to find the length ofthe longest subsequence… Show more… Show moreImage transcription textLet X and Y be two jointly distributedrandom variables with a joint pdfgiven by fx.x (x, y) -00 &l… Show more… Show moreImage transcription text2. Let 0< b3 1+x/5, $1 = %, and wn+1=b$n(1?n), n2 1. 1. When 0 < b g 1,prove that {53"} monotoni... Show more... Show moreDeliverablesA technical architecture proposal no greater than six pages long (including any coversheets/appendixes), written in narrative format that clearly and succinctly presents an analysis of the projects' requirements and the proposed migration treatment plan and target architecture. Clearly state all assumptions made during the design and explicitly state references used in creation of the document for the client to be able to do further reading. The audience will be the Project leader, but you can assume she will pass it to the CTO.Engineering & TechnologyComputer ScienceCOMPUTER S COMPUTER
Get a plagiarism-free order today we guarantee confidentiality and a professional paper and we will meet the deadline.