EECE360 Computer Networks
Web page 1of 8ASSESSMENT COVER SHEETStudent Info:Scholar Title:Scholar ID:Course InformationCourse Code: EECE360C ourse Title:EECE360 _ Laptop Networks College Title: Dr. Hamzah AlkhazalehAssessment Submission InformationTitle of Evaluation: Particular person ProjectAssessment Sort: ProjectNumber of pages: Due Date: 18–April -2021 Date Submitted:All work should be submitted by the due date. If extension is required, scholar should submit official request for late submission. Marks shall be deducted for late submission in accordance with college evaluation coverage.Has an extension been approvedYes NoIf sure, please give the brand new submission datePlease notice that it's scholar’s duty to maintain copies of their assessments.Scholar Declaration:I maintain a duplicate of this evaluation if the unique is misplaced or broken.I hereby certify that no a part of this evaluation has been copied from some other scholar’s work or from some other supply besides the place due acknowledgement is made within the evaluation. I additionally certify that;no a part of the assessmenthasbeen written/produced for me by some other particular person besides the place collaboration has been licensed by the course lecturer/teacher.I'm conscious that this work shall be assessed and checked by the assessor for plagiarism and I perceive the consequencesof such tutorial violation. I acknowledge that I shall be topic to disciplinary rules in case of any plagiarism have been confirmed.Scholar Signature:.......................................... Date: ........................... Vital notice to College students:1.Scholar should connect the marking sheet and evaluation description Sheet together with this evaluation cowl sheet.2.The teacher have the best to not mark the evaluation if the declaration assertion is just not signed and evaluation marking and evaluation description Sheets are usually not connected. Web page 2of 8ProjectDescription Laptop NetworksEECE360Spring 2021Course Credit score Hours: 31.CourseworkInformation:CourseworkTypeProjectCourseworkNumberResponsibilityIndividualLearning Consequence Measured•Describe multi-layer community architectures and protocols, widespread community providers,•transport architectures, routing, media entry, and switching and use trendy software program instruments to preform associated simulations.•Design TCP/IP community architectures, configurations and topologies to fulfill technical and non-•technical parameters, together with financial and safety constraints.•Summarize the important thing skilled and moral points within the subject of knowledge communication and networking in world, financial, and societal context.•Search present and rising technical points in the subject of information communication and networks.CourseworkMark302.Coursework Particulars:CourseworkDescriptionAproject ofpractical and utilized nature that has an oral Testcomponent. On this mission, you're required to:Choose an area Group (Financial institution, College, or Any NetworkVendor)Talk about the background of the Group(Measurement of the group, forms of community they used)Analyze and display the group Community(The community element , hardware , software program)Spotlight the important thing challenges / drawbacks / hurdles / limitationsReflect upon the relevance of this work to the course contents, and define the key classes learnt out of this collective train.College students ought to work individually in the direction of this aim. CourseworkPurposeThis evaluation goals to take a look at the scholar comprehension of design and implementation of knowledge networks. College students shall be tasked to conduct a secondary analysis on one of many newest community tendencies in the UAE and then interview a key stakeholder from one of the main community distributors to debate the next:1)Community Structure 2)Routing and Forwarding3)Information Safety
Project 8 Assignment
Message from the Consulting Director:We have now quite a few points that come up in right now’s society. From the necessity for wearable well being know-how to transmitting information in a safer method. All these points have one widespread denominator- Expertise. Your job is to workforce up together with your classmates (or a workforce exterior of sophistication) and, utilizing technological innovation, resolve an issue. You'll then current the revolutionary resolution to the category. The category will then vote on essentially the most revolutionary venture.Venture AbstractVenture DeliverablesModExercise1Kind a workforce and discover new applied sciences and makes use of of know-how. Resolve on an issue to unravel with know-how.2Outline the issue your workforce want to resolve utilizing revolutionary know-how. Analysis makes an attempt to unravel this drawback. Design an innovation plan.threeDiscover strategies of innovation. Attempt among the strategies.FourPrototype5Remaining Presentation (Slideshow)Module 1Module Title: What Is Innovation?Uncover and outline what's Innovation. You'll then kind a workforce and outline your revolutionary concepts. You'll most likely have to provide you with a number of (or a whole lot) of concepts earlier than you slim it to some. With a view to innovate one thing, you will have an issue to unravel. Analysis what forms of issues are at present dealing with IT customers.Activity 1 Kind a workforce and discover new applied sciences and makes use of of know-how. Resolve on an issue to unravel with know-how.To finish this job:1. Watch:http://www.lynda.com/Enterprise-Enterprise-Expertise-tutorials/What-innovation-Introducing-Systematic-Ingenious-Pondering/153123/176774-Four.htmlhttp://youtu.be/nWXhLUic9IE?listing=UURyDduTg248Rk6ch2WfLzbghttp://prx-stratford.lirn.web/login?qurl=http://library.books24x7.com/library.asppercent3f^B%26bookid= 23606http://prx-stratford.lirn.web/login?qurl=http://library.books24x7.com/library.asppercent3f^B%26bookid=39154http://prx-stratford.lirn.web/login?qurl=http://library.books24x7.com/library.asppercent3f^B%26bookid= 8379%26chunkid=633049804%26rowid=22. Analysis Technological Improvements.Discover by yourself or begin right here: http://www.technologyreview.com/lists/applied sciences/2014/http://www.pinterest.com/search/boards/?q=revolutionary+know-howthree. Brainstorm present issues that might be solved utilizing know-how (carry to dialogue).Four. Kind workforce5. Start your analysis on the issue and resolve it.6. Submit a abstract of who's on the workforce, what issues your workforce is all in favour of innovating, what sources you have got used to analysis the issue(s).Module 2Module Title: The DrawbackModule Description:On this module you'll discover the issue, together with present options to the issue.Activity 2 Outline the issue your workforce want to resolve utilizing revolutionary know-how. Analysis makes an attempt to unravel this drawback. Design an innovation plan.With a view to do that, begin right here:1. Discover Google Glass.http://www.lynda.com/Glass-tutorials/Introducing-Google-Glass/160817-2.htmlhttp://youtu.be/P8GVKqGruOQTake into consideration why it was created. Was there a necessity? Did it resolve an issue? Is it nonetheless revolutionary know-how?2. What's the drawback your workforce needs to unravel? Provide you with a number of concepts, after which slim it down to at least one. Use gamestorming to brainstorm some conceptshttp://www.gamestorming.comthree. Record doable options to your drawback you want to resolve. Use gamestorming to generate conceptshttp://www.gamestorming.com/class/games-for-problem-solving/Four. Analysis how others have tried to unravel this drawback.5. Create a Thoughts Map.(http://www.xmind.web)Activity 2BFocus on the workforce drawback, what has been finished to unravel the issue, what obstacles have arisen.600 phrase minimal and not less than 2 references.Module threeModule Title: Sorts of InnovationModule Description: On this module you'll discover innovate. There are a number of forms of innovation. Attempt a few of these strategies together with your technological innovation.Activity three Discover strategies of innovation. Attempt among the strategies.With a view to do that, begin right here:1. What's Disruptive Innovation? And, how can it assist your workforce?Watch http://www.lynda.com/Enterprise-Enterprise-Expertise-tutorials/Disrupting-Your self/153829-2.html2. What's Open Innovation? And, how can it assist your workforce?Learn Chapter eight Leveraging Social Collaboration to Drive Innovation
hhttp://prx-stratford.lirn.web/login?qurl=http://library.books24x7.com/library.asppercent3f^B%26bookid=52781%26chunkid=297676849%26rowid=247A Information to Open Innovation and Crowdsourcing: Sensible Ideas Recommendation And Examples From Main Consultants In The Area, First Versionhttp://prx-stratford.lirn.web/login?qurl=http://library.books24x7.com/library.asppercent3f^B%26bookid= 42572three. Jugaad, Artistic Commons… And, how can it assist your workforce?Click on by way of this infographic. https://magic.piktochart.com/v/985c9e69-d7de-4bb4-9d74-b1f8f8ac5941Four. What's Crowdsourcing? And, how can it assist your workforce?http://www.lynda.com/Enterprise-Lighting-tutorials/importance-social-media-crowdsourcing/124556/144192-Four.html5. Attempt a number of strategies to innovate your resolution. Every member of the workforce ought to take notes and preserve a visible journal of the method. Submit the visible journal.http://www.lynda.com/Design-Design-Expertise-tutorials/Storytelling-Designers/165645-2.htmlhttp://kellypurkey.typepad.com/its_me_kp/2010/06/april-twentyten-mini.htmlhttps://websites.google.com/web site/digitalstorytellingwiththeipad/apps-for-digital-storytellingActivity 3BShare your innovation journey.600 phrase minimal and not less than 2 referencesModule FourModule Title: PrototypeModule Description: Prototype your know-how innovation.Activity Four 1. Discover your inventive facet. Start by watching this Lynda Videohttp://www.lynda.com/Design-Design-Enterprise-tutorials/Creating-Concepts-Design-Ideas/126121-2.html?srchtrk=index:1percent0Alinktypeid:2percent0Aq:prototypepercent0Apage:1percent0As:relevancepercent0Asa:truepercent0Aproducttypeid:22. What's a prototype?http://residence.howstuffworks.com/home-improvement/building/planning/what-is-a-prototype.htmhttp://youtu.be/Rbjej4A6oRkthree. 3D printinghttp://www.staples.com/sbd/cre/merchandise/140330/33886/index.htmlhttp://www.explainingthefuture.com/3dprinting.htmlFour. Share your prototypeActivity 4BShare your prototype, troubleshoot, talk about.600 phrase minimal and not less than 2 referencesModule 5Module Title: Remaining PresentationModule Description: Powerpoint. The presentation ought to embrace visually interesting documentation of your journey, an outline of the issue, an inventory of previous options to the issue, an outline of how your workforce has innovatively used know-how to unravel the issue, and a prototype demonstration.Activity 5 Create ultimate presentation.http://www.lynda.com/Enterprise-Enterprise-Expertise-tutorials/How-deliver-effective-presentation/126132/196262-Four.html2. Adobe Join Coachinghttp://www.lynda.com/Join-tutorials/Adobe-Join-Important-Coaching/172861-2.html
Cyber Security Managment Essay
Reply every these questions in a paragraph with not less than 5 sentences: Embody the query and quantity your responses accordingly. Present a quotation for every reply.1. what do every of those phrases seek advice from: copyright, patent, trademark, commerce secret?2. Why is mental property entitled to authorized safety?three. Why did copyright legal guidelines turn out to be stricter and extra punishing within the late 20th century?four. What's the Truthful Use doctrine?5. Make an argument for legalizing the copying of music or software program.6. Do I or do not I personal the books on my Kindle? If I personal them, why cannot I switch them? If I do not personal them, what's my authorized proper to them?7. What was the 1984 Sony Supreme Courtroom case about?eight. Was Napster chargeable for the actions of its customers?9. Why did the courtroom discover in favor of Diamond within the Rio case?10. What's Digital Rights Administration?
Digital intelligence has made things easier today by connecting millions of devices worldwide
Digital intelligence has made issues simpler at present by connecting thousands and thousands of units worldwide to the web by including sensors that improve communication with out human involvement. As an example, a wise thermostat, a light-weight bulb and a smartwatch. The IoT has been essentially the most fascinating expertise, particularly in a enterprise because the expertise grows greater. The expertise allows corporations to keep away from challenges, comparable to downtimes and additional operational bills. Different examples of web of issues embody the good dwelling units and the Okay Nearest Neighbour (KNN). Over time, people have needed to inset expertise in houses, which might allow householders to conduct day-to-day actions. Initially, a wise dwelling concerned putting in cameras and sensors to detect motion, which has modified with the adjustments in expertise. Right this moment a wise dwelling can monitor motion, management vitality consumption and the well being and security of homeowners. Monitoring actions of a house have been made simpler by way of the usage of a smartphone system the place the proprietor can monitor the house from anyplace. In accordance with the newest analysis, over twenty billion houses may have linked their units to the web within the subsequent two years. Numerous corporations are growing numerous units and enhancing connectivity, comparable to NEAST, Amazon, Apple, Samsung and Google. Samsung initiatives contain the Household Hub, which makes use of voice programs that can be utilized to reinforce communication between the fridge and the proprietor. Numerous service suppliers are encouraging the usage of controllers, that are sensors that management the actions of the good equipment in houses. The good dwelling expertise includes dwelling safety programs, dwelling leisure programs, washing and cleansing home equipment and environmental management programs, such because the lighting and air-con. The foremost roadblock of adopting the web of issues is safety. With the huge rising expertise, cyber-attacks are growing, particularly the place info is saved in digital devices. The issue begins with how house owners deal with the knowledge saved within the machine, which may compromise the proprietor's privateness and confidentiality. Homeowners are supposed to grasp and be taught numerous vulnerabilities and menace factors within the units. Since most home equipment are linked to a smartphone, the applying used is an enormous space of vulnerability and may appeal to cyber threats. Hackers have developed trendy and superior methods of conducting malicious actions; therefore, intruding right into a cellphone software is simple and sooner. Having all the knowledge in a single smartphone software could also be harmful, resulting in cyber-attacks, which may break a popularity, result in theft and lack of crucial and confidential info. Moreover, communication between the factors of knowledge trade is a website of vulnerability as a result of the units encompass very personal passwords and the proprietor’s id, which may simply be misplaced or leaked with out the proprietor’s data. Growing good dwelling expertise requires one to reinforce the safety system related to the units to keep away from cyber-attacks. Growing safety measures reduces the probabilities of assault and vulnerability. As an example, creating new and sophisticated passwords scale back the probabilities of intrusion. Sensible dwelling expertise must be very personal and confidential and shouldn't be shared or utilized by outsiders. Most individuals have been robbed of a giant sum of money and property by way of unauthorized entry and weak passwords. Contemplating most units use Linux just like computer systems, addressing safety issues is carried out the identical manner as computer systems. At the moment, good dwelling units have clever programs that improve computerized management, comparable to computerized safety alarms, good gentle, door openers and computerized cameras. The automated units don't essentially require the usage of smartphones to present instructions or management the expertise. Intrusion detection programs (IDS) are developed for good dwelling units to cut back and curb assaults directed to the expertise ecosystem. Most good dwelling units are outdated and can't be upgraded as a consequence of an absence of crucial sources available in the market. Subsequently, the units are vulnerable to cyber-attacks and require a complicated safety system. The IDS structure id developed in most houses to mitigate and monitor the actions in a wise dwelling. Since good houses' upkeep has been a problem, the IDS options give attention to offering an answer. The IDS protects the units from inside and outdoors by detecting real-time vulnerabilities and threats. The IDS makes use of information sources type, audit programs, Tracing programs, log recordsdata and different sources comparable to registry entries. The IDS should contemplate the info accumulating mechanism. The detection system points each the host-based and network-based detection programs. Moreover, the IDS technique of detection is essential. The expertise conducts malicious actions, irregular conduct, differentiating regular conduct, and the machine's exercise. The trade of knowledge from completely different units could be monitored utilizing the hybrid IDS, which makes use of the anomaly and signature strategy to observe any intrusion between the OSI layers. Typically, IDS is important within the web of issues in limiting assaults, distributing detection of assault in several dwelling units and detects algorithms.KNN expertise is essentially the most used machine studying classification method the place most people choose studying by way of the Okay-Nearest Neighbors Algorithm. Moreover, most industries use the KNN to categorise points as a result of the expertise can simply web output, predict energy and calculate time. Industries can type pseudo-codes for KNN and create python and R, which can be utilized for studying. The KNN makes use of information offered from the category the place the info is chosen from the closest property within the neighborhood. The outcomes of the KNN relies on the gap used the place the massive query includes what distance to make use of and the measurements. The efficiency of KNN is dictated by the recall, precision and accuracy, which will depend on the gap. Totally different analysis and research have been carried out to research the efficiency of Okay utilizing completely different distances. The KNN classifies, nevertheless, can consider any information, together with noisy information and classifies the info from the take a look at pattern and the coaching information. The research present that distance performs an necessary function in figuring out the ultimate output. The person is meant to conduct a take a look at utilizing completely different distance measures and completely different information units.Community intrusion detection programs have been developed to detect numerous assaults. The massive subject includes the kind of information set utilized in testing the detection mannequin the place KDD99 and NSL-KDD information set are presently not really useful as a result of underlying challenges. Some research have evaluated the usage of the CIDDS-001 dataset utilizing the Okay-Nearest Neibourhood classification, which reveals the accuracy, false-positive and detection charge. Organizations and industries discover it difficult to deploy intrusion detection programs utilizing a practical and appropriate information set. Many of the information units don't cowl completely different assaults; some can't determine the present developments, and a few don't have visitors variety when reflecting the packet payload information. The intrusion detection programs are a significant protection mechanism for many community intrusions. The CICIDS2017 is among the many newest and up-to-date dataset which covers most community assaults. The dataset supplies a visitors evaluation together with options, such because the vacation spot, supply, protocols and assaults. The CICIDS2017 has real looking background visitors, which assists in monitoring individuals's conduct when utilizing HTTP, SSH, HTTPS, and FTP. The factors coated by the dataset embody the entire visitors, full community configuration, full seize utilizing the mirror half, assault variety, out there protocols, heterogeneity and labeled dataset. To seize community visitors utilizing the flow-based and packet-based format, a mirror port is used. The flow-based information encompass metadata from completely different community connections, whereas the packet-based information encompass the payload info. Since 2009, the NSL-KDD dataset has been used over the KDD CUP99 to unravel points of knowledge irregularities. The NSL-KDD is taken into account as a result of it doesn't duplicate information and conducts homogeneous distribution. Moreover, the dataset incorporates necessary options, comparable to server-based visitors options, content material options and time-dependent visitors options. The NSL-KDD dataset goes by way of numerous assaults which might be categorized into DoS, Probe, R2L and U2L. Because of the subject of high-speed community detection programs, Yueai and Junjie got here up with a load balancing mannequin that makes use of two-stage methods. The mannequin includes the online-phase and the offline section, the place the web section captures packets from networks and breaks them into small packets, which permits detection of intrusion in each sensor. The offline-phase is used to create an offline mannequin. The analysis carried out by Yueai and Junjie carried out sampling utilizing SMOTE and AdaBoost for classification. The 2 strategies didn't give any constructive outcomes. Not too long ago, in 2019, the NSL-KDD dataset testC_le was used to confirm numerous algorithms. The algorithms embody the Okay-Nearest Neighbourhood, the choice tree and random forest. The take a look at outcomes concluded that the choice tree was eighty-four p.c correct, and the adaptive algorithm eighty-five p.c; therefore, the adaptive voting algorithm was essentially the most correct because it might improve detection.Since units and sensors have been dropping over time, connecting units to the web has turn into cost-effective and simpler. Advancing sensors and 5G energy machines for incomes will contribute to the expansion of the web of issues sooner or later. Residing and dealing have turn into simpler and sooner, particularly by way of good dwelling expertise. Because of the growing cyber-attacks, the web of issues goes by way of a number of challenges, particularly good dwelling expertise. The underlying subject of cyber-attacks has enhanced the adoption of intrusion detection programs that detect vulnerabilities and threats from inside and outdoors. The usage of detection programs has enhanced safety. Researchers are experiencing a problem in an absence of datasets to evaluate intrusion detection programs' high quality and effectiveness. Most industries use the NSL-KDD and the CICIDS2017 dataset to unravel points associated to information irregularities and an array of options, comparable to server-based visitors, content material and time-dependent visitors. The Yueai and Junjie two-stage methods have enhanced the implementation of IDS, the place the adaptive algorithm strategy is the best in detecting intrusions in comparison with the choice tree and Okay-Nearest neighbor strategy.
Drone Technology
Drone Technology Name InstitutionIntroduction Warzones and unpredictable environments due to weather changes present some of the most extreme regions for humans to access without a significant cost to physical and economic well-being. The need for technology that could access this region and perform tasks at limited economic cost and near-zero human casualties have for many years presented a challenge to societies and motivated investment into the development of existing technologies to realize newer and more capable utilities.Necessity is the mother of all inventions. With the dawn of the first and second world wars, most countries fighting or embroiled in the conflict came to find a greater need for better technology development that could easily allow them to access a variety of regions at lower costs. This need saw the majority of these countries employ a wide range of specialists to define and develop new technologies that would essentially create an avenue for them to attain the upper hand. Need for better technology development became the reason why many countries started hiring specialized experts to develop new technologies. Other countries were not able to develop radar technologies. Instead, they focused on creating more complex systems for surveillance and communication. Countries such as Britain were able to develop radar technologies. In contrast, other countries evaluated the idea of creating even complex technologies for surveying, surveillance, communication, and even performing actual strikes on the enemy. How a Drone Works The drone is one critical invention born of this era of necessity and is heavily based on the preexisting concept of the airplane. However, throughout the 20th and the 21st Century, technology has only grown and attained greater importance due to its wide range of applications. Summarily, the term drone is an umbrella term used to define any unpiloted aircraft. More commonly, drones are used to refer to as Unmanned Aerial Vehicles (UAVs). These are essential crafts that are applied and used to carry out a wide variety of tasks ranging from the delivery of goods and services in the local and global setting to military operations. This wide range also implies that drones can be as small as a mobile phone or as big an aircraft, all relative to the function they are about to perform. Unmanned aerial vehicles are commonly referred to as UAVs. They are small drones that are used to carry out various tasks, such as delivering goods and services in various locations. The following report creates context around drone technology, outlining its pasts and elaborating on its current development and applications. Summarily, this report highlights that the "drone" was created for the military and aviation industry. Still, with increasing technological adaptation, the invention has become more efficient, safer for large-scale human use, dynamic, and easily manipulated to perform a wide variety of functions across essentially becoming a mainstream utility. Drones generally have four users, the military, commercial owners, and recreation tools (mass consumers smaller drones). Drones additionally have four critical components. They include connectivity, rotors (alternatively winged drones), accelerometer, and finally, cameras (in modern drones). Connectivity is a platform that allows drones to be controlled remotely. It consists of an antenna that is connected to a mobile platform or a platform on the ground. A Research Team (2020) indicates in other drones. Users can preprogram GPS coordinates into the drone and plan a flight path. According to Dukowitz (2019), a drone controller in the connectivity platform of the sender sends radio signals from the remote control to the drone. The rotor comprises rotating aerofoils that allow the drone to move in either direction according to commands received from the controller. There are four types of drones (Smith, 2018): drones are generally composed of four individuals: the military, commercial, and recreation tools. They have various critical components such as connectivity, rotors, and cameras. 1. Multi-Rotor Drones- more than one rotor 2. Fixed Wing Drones 3. Single Rotor Helicopter- rotor on the top 4. Fixed Wing Hybrid VTOL-combination of both rotor and fixed-wing The signals contain programmed commands that tell the drone what actions to perform. Radio signals are sent from the radio transmitter in the drone controller and received by the drone's receiver (Dukowitz, 2019). They tell a drone what to do. Military drones are more complex and have more sophisticated systems. Some are larger and have special functions. Research shows that the drone is controlled with a direct data link from a ground control station from takeoff until it exits the line of sight. Then, the ground control station transfers its communication with the drone to a satellite link to control the aircraft. The drone also relays its position using a GPS (Cuadra and Whitlock, 2014). The use of satellites to communicate is applied since the more extensive commercial, and military drones travel a more considerable distance than smaller recreational drones that are usually always in line of sight of the ground control deck. Modern drones have more complex technology, such as the radar positioning and return home feature. Using the dual Global Navigational Satellite Systems (GNSS) such as GPS and GLONASS, drones can fly both using radio and in non-satellite regions and use programmed data to trace their way back home (Corrigan, 2020). Modern drones also have obstacle detection technologies, stabilization tools, and navigation tools to become aware of their surroundings and record vast amounts of information. History of the “Drone” The term drone is synonymously used to refer to UAVs, but this was not always the case. Drones/UAVs were initially referred to as radio-controlled aerial targets and later shifted to a remotely-controlled pilotless aerial vehicle (Budanovic, 2017). The name, while common today, was coined in the 1930s when a remote-controlled aerial vehicle was developed and modeled after De Havilland Tiger Moth biplane trainer. Modern drones have plenty of complex technology, such as GPS and GLONASS, which allow them to fly both in and out of space. They can also use their GPS data to track their way back home. Arguably the drone is an invention that takes a lot of inspiration from the airplane. The first modern drone was developed in 1916 by the British, and it was named the Ruston Proctor Aerial Target 16 years after the Wright brothers had developed the first aircraft (Drone Enthusiast, 2020). The drone had a lot of similarities to the earlier developed manned airplane. This was earlier envisioned as a flying bomb, and it was meant to be used to deliver explosives remotely (Boyne, 2010). The technology was radio-controlled. But after years and years of experimentation on the prototype, the technology never picked and it was scrapped. Later on, the Americans successfully developed the Kettering Bug, which was also to be used for military purposes. During the second world war, drone technology was slightly improved. However, it is not until later on in the late 20th Century when drone technology had become increasingly important and its true potential in warfare became vastly expanded. The available details show that the onset of modern warfare commenced in 1982. This was when Israel used battlefield UAVs to coordinate the manned aircraft and destroy the Syrian fleet while suffering minimal losses. Drones were mainly used to capture the precise target position, jam the communication networks, and act as decoys during the attacks (Drone Enthusiast, 2020). Since then, the technology became increasingly researched and developed and adapted to various areas in life, but the military remains the most significant beneficiary of the product. Application of the Drone Technology As already expressed, drones have a wide range of applications. Their usability is relative to the efficiency, availability, simplicity, and safety they provide. Research indicates that their application in the contemporary spaces include use as radio-controlled toy planes for kids and adult enthusiasts, photography and video (cameras can be attached), delivery of packages by commercial companies or surveillance and reconnaissance in inaccessible regions, and in the military, they are used for virtually the same purposes and more advanced activities such as delivering guided missiles packages. Applications of drones vary depending on their various features and their availability. Some of these include the following: photography and video recording, remote controlled toy planes, commercial projects, and reconnaissance. Future of Drones With the development of technology, the future of drones remains bright. Opportunities in the field are limitless, and they are increasingly becoming commonplace in modern society. Research shows that drones will be employed in agriculture, conservation, delivery and fulfillment, disaster mitigation efforts, logistics, film making, among many other fields (Cal U, nd). In addition, companies in America and China are increasingly investing money in research and development to further advance its usability, with the American online giant retail company Amazon seeking to deploy drones for the delivery of retail packages enmass, and Chinese company ENHANG seeking to develop a drone taxi system (Drone Enthusiast, 2020). Thus, the future of technology remains bright.References Rachmawati, Susan, Arman Syah Putra, Abednego Priyatama, Dudi Parulian, Dona Katarina, Muhammad Tri Habibie, Matdio Siahaan, Endah Prawesti Ningrum, Alsen Medikano, and V. H. Valentino. "Application of Drone Technology for Mapping and Monitoring of Corn Agricultural Land." In 2021 International Conference on ICT for Smart Society (ICISS), pp. 1-5. IEEE, 2021. Boyne. (2010). The Remote Control Bombers - Air Force Magazine. Air Force Magazine. Retrieved from https://www.airforcemag.com/article/1110bombers/. Budanovic, N. (2017). The Early Days Of Drones - Unmanned Aircraft From World War One And World War Two. WAR HISTORY ONLINE. Retrieved from https://www.warhistoryonline.com/military-vehicle-news/short-history-drones-part-1.html. Cal U. Future Drone Technology | Future of Drones | Aircrafts. California University of Pennsylvania. Retrieved from https://www.calu.edu/academics/undergraduate/associate/drone-technology/future-drone-technology-and-uses.aspx#:~:text=In%20the%20future%20farmers%20and,monitor%20and%20spray%20their%20crops.&text=As%20drone%20technology%20advances%2C%20the,also%20be%20delivered%20by%20drone. Corrigan, F. (2020). How Do Drones Work And What Is Drone Technology. DroneZon. Retrieved from https://www.dronezon.com/learn-about-drones-quadcopters/what-is-drone-technology-or-how-does-drone-technology-work/. A Research Team. (2020). Up, Up and Away: How Do Drones Work?. Ctia.org. Retrieved from https://www.ctia.org/news/up-up-and-away-how-do-drones-work. Cuadra, A., & Whitlock,, C. (2014). How drones are controlled. Washington Post. Retrieved 26 May 2021, from https://www.washingtonpost.com/wp-srv/special/national/drone-crashes/how-drones-work/. Drone Enthusiast. (2020). The History Of Drones (Drone History Timeline From 1849 To 2019). Dronethusiast. Retrieved from https://www.dronethusiast.com/history-of-drones/. Duckowitz. (2019). Drone Controllers: A Look at How They Work and Important Terminology. UAV Coach. Retrieved from https://uavcoach.com/drone-controller/#:~:text=A%20drone%20controller%20works%20by,received%20by%20the%20drone's%20receiver. Smith, E. (2018). Types of Drones - Explore the Different Types of UAV's. Electronic Circuits and Diagrams-Electronic Projects and Design. Retrieved from https://www.circuitstoday.com/types-of-drones.
COSC2674/2755 Semester 1, 2020 Assignment 2 Specification
COSC2674/2755 Semester 1, 2020 Task 2 SpecificationMarks allotted: This project can be marked out of 100 and is value 35% of your total mark Deadline: Sunday 17.05.2020 (11:59 pm AEST) Submit by way of: Canvas Work mode: In a gaggle of four (particular person submissions discouraged) Submission format: .zip (No different codecs can be accepted) On-line demo: Week 11 Monday - Friday (No Demoà No marks)zero READ THIS FIRSTThe true-life initiatives that you'll face in Business by no means include crystal clear, direct checklist of directions in a linear method. The truth is, the truth is way from that, the challenge necessities usually are available in bits and items from usually a confused shopper who thinks that they know all the pieces. It's the job of requirement engineers to elicit the necessities. Enterprise Analysts then spend good period of time clarifying these necessities and creating extra wise, doable and negotiable checklist of deliverables. If you learn the specs for this project, you'll realise that among the ones might have a number of methods of implementing them (identical to in actual life software program growth). So as an alternative of blaming it on the specs, make clear the requirement(s) by posting in dialogue board for project 2. Don't begin this project late, you could have 4 weeks to finish it which is greater than sufficient time to do properly and just be sure you use this time judiciously. Beginning work on the final minute will solely result in poor consequence(s).There are specific specs which can push you out of the consolation zone. This has been completed on function. There are specific elements of the project the place you'll need to do selfresearch as you'll not discover solutions in lectures, tute/labs. For those who do job of this project, you may select so as to add it as part of portfolio for future employers. You might be being ready for potential employability prospects.College of Science / CS & ITWeb page 2 of eight1 State of affairsYour workforce has been contacted by a automobile share firm to develop an computerized Automotive Share System. This technique is used to e book, discover and unlock and lock a automobile. As well as, the shopper can report some points with the automobile to assist the corporate to take care of the automobiles. You'll create an software for 4 kinds of customers: buyer, firm supervisor, engineers and system administrator.On this project, For this project, you can be making intensive use of the Google Calendar API (https://builders.google.com/calendar/v3/reference/) to work together with your Raspberry Pi. Additionally, you will be utilizing Google Cloud IoT Platform (https://cloud.google.com/options/iot/).In abstract, the implementation of this project includes the next elements:• Python documentation instruments similar to Sphinx • Observe third social gathering API • Unit testing in Python • Socket Programming • Writing your personal API utilizing Python’s microframework Flask • AI options similar to facial recognition • Programming with Cloud databases • Chosen Software program Engineering Mission Administration/Instruments2 NecessaryYou will need to adhere to the next necessities: a. Raspberry Pi mannequin four or three ought to be used. b. You will need to use Python three.* to finish the duties. Older variations should not be used. c. You will need to use a model management system of some kinds similar to GitHub, Bitbucket, and many others. A personal repository is for use ONLY. d. You will need to keep on with the usual type information on your Python code: (https://www.python.org/dev/peps/pep-0008/) e. You will need to attend a 30 minutes demo session to get the project 2 marked. A schedule and a reserving doc can be revealed later. You will need to submit the project previous to demo. No submission à No demo à No marks.College of Science / CS & ITWeb page three of eightthree Element(s) of CSSthree.1 Excessive stage structure diagram NOTE: The next structure diagram can be used for each Assignments 2 and three.College of Science / CS & ITWeb page four of eightthree.1 CSS options NOTE: It is advisable design the database by dividing the data into tables and turning info gadgets into columns. Future, you additionally want populate some knowledge into the tables to be able to illustrate the system in the course of the demo session. For patrons: The purchasers can register, logging in, search and e book a automobile on the web-based system in MASTER PI (MP).The consumer registration on MP is required for the first-time consumer. Within the dwelling web page of the web-based software supplies solely two choices: - registration - log inUpon registration the small print are saved in cloud database. It's possible you'll use MySQL database.Upon logging in, the consumer is now introduced with one other web page together with following capabilities: - present a listing of automobiles accessible, that you must present the detailed info of automobiles within the checklist similar to Make, Physique Kind, Color, Seats, Location, Price per hour. - seek for a automobile primarily based on physique sort or different options. - e book a automobile primarily based on automobile id, the consumer can be requested to enter reserving particulars. - cancel a reserving - logoutWhen the shopper arrives on the automobile booked, the Agent PI (AP) supplies two choices accessible for unlocking the automobile: - utilizing console-based system which permits them to sort within the consumer credentials or, - utilizing a facial recognition system Upon logging in, the consumer’s credential can be despatched from AP to MP by way of sockets. On the identical time, MP will verify the credential and ship the response message again to AP. The AP will execute the operation in response to the message from MP. As soon as the operation (unlock the automobile) is efficiently executed, the AP must ship a message to close by the system by way of Bluetooth, simulating notification in your sensible telephone. When the shopper leaves the booked automobile, they will lock the automobile by select one possibility: - return the automobile As soon as the “lock automobile” operation is executed, the AP must ship a message to close by the system by way of Bluetooth.When the shopper enters and leaves the booked automobile, the Agent PI (AP) will ship message to MP to be able to change the provision of the automobile.YOU ARE NOT ALLOWED TO USE ANY OTHER PLATFORM WITHOUT PRIOR PERMISSION.College of Science / CS & ITWeb page 5 of eightfour Duties Half A (50 marks)You'll now implement both a web-based system or console menu-based system on MP and a console menu-based system on AP.NOTE: For Duties 1, 2, and 6, you could have a alternative of console menu-based system or web-based system. The online-based system will be troublesome and time consuming whereas a console menu-based system can be simpler and fewer time consuming. For those who select the console menu-based system, you'll rise up to 80% of the complete mark for every activity.1) (5 marks) An choice to register a brand new consumer on MP. The username, password and different mandatory particulars (first title, final title and e mail) should be saved on cloud database. The password should be saved in an encrypted (it's possible you'll hash and salt) format. 2) (2 marks) An choice to login into the system and achieve entry to the appliance on MP.three) (5 marks) Develop and implement a strong enter validation scheme.four) (three marks) Design database primarily based on the necessities.Guarantee that the database is normalized - this implies when you solely have one desk, you'll lose marks. The automobile database is saved on a cloud surroundings particularly the Google’s GCP IoT platform (Google Cloud Platform).5) (5 marks) Create your personal RESTful API to speak to the cloud database.6) (15 marks) As soon as MP receives the login info, the system ought to show a menu which can permit the consumer to entry the reserving system:- view the historical past of my booked automobiles - present all of the accessible automobiles - search a automobile - e book a automobile - cancel a reserving - logoutYOU WILL RECEIVE ZERO for storing knowledge in an area database.All of the automobile associated info is saved in a Cloud-based database hosted on Google Cloud IoT Platform (GCP). It's your obligations to just be sure you don't exceed the free tier restrict on the GCP.View historical past: Have the ability to present a listing of automobiles that present consumer has booked.Search a automobile: Have the ability to search by any of the automobile’s properties and show fields neatly (e.g., column’s aligned) within the console.Ebook a automobile:College of Science / CS & ITWeb page 6 of eightThe makes use of want to pick which automobile they wish to e book and enter the period they wish to use. A automobile that's booked can't be booked once more till returned. Notice when booked an occasion ought to be added to Google Calendar, detailing the automobile, who e book the automobile and the booked period. Google calendar can be tied to the Google login of the consumer.Cancel a reserving: The occasion added to Google Calendar can be eliminated, and the associated info within the database must be modified7) (5 marks) Full documentation utilizing Sphinxeight) (10 marks) Skilled use of• GitHub from day 1 of the event• Trello board for the event cycle Half B (20 marks)1) (three marks) Implement Console-based system on AP, offering the performance for consumer to unlock and return the automobile.2) (5 marks) Sending consumer’s credential from AP to MP by way of sockets. The message wants to incorporate some necessary info, similar to present date and time, username/password, automobile ID.three) (2 marks) MP must verify the credential from AP and in addition ship again the response message by way of sockets. If the credential is appropriate, MP want to change associated details about the automobile in cloud database. four) (5 marks) With the ability to present all of the automobile’s location by utilizing Google Map API. 5) (5 marks) Full documentation utilizing Sphinx, Trello board and Git Hub for this half Half C (15 marks)1) (12 marks) Implement the facial recognition requirement of the system utilizing OpenCV. This is applicable to the purchasers who wish to use facial recognition authentication as an alternative of console-based authentication to unlock the automobile.Notice: If your whole workforce members don't have a USB digicam, beneath an answer for you. You should use the digicam in your sensible telephone to seize the face picture and ship the images to the AP. Because the picture is saved within the AP already, that you must add a menu possibility that makes use of native picture to finish authentication in you console menu-based system. Nonetheless, that you must display that the facial recognition system does work in the course of the demo session.2) (three marks) Full documentation utilizing Sphinx, Trello board and Git Hub for this half.College of Science / CS & ITWeb page 7 of eightHalf D (15 marks): Unit Check1) (15 marks) Full unit take a look at suite for the entire challenge (i.e., A, B, C and D elements). That is the place you may resolve what sort of unit exams are required. 5 Demoa. In previous to your demo, create 10-20 Automobiles by yourself (e.g., 2 Admins, four Engineers, 6 Customers). b. Login to GitHub utilizing your account and present using GitHub in the course of the demo. c. Every workforce member is anticipated to reply any query associated to any activity on this project. Your marker might deduce the mark when you fail to reply a query in a activity. 6 Who does whatPlease embrace the proof of who does what on this project, i.e., embrace a file explaining what particular activity every workforce member did. The proof must be constant to your GitHub and Trello board. If not constant, your maker might deduce marks. Though every member did completely different duties, all of the members ought to know one another’s duties.7 Late submission and Extensiona. A penalty of 10% per day of the whole marks will apply for every day late, together with each weekend and weekdays. b. After 5 days, you'll obtain a zero for the entire project. c. Extension requests ought to solely be emailed to the lecturer. d. Extension provided to a gaggle member(s) doesn't qualify for a worldwide extension for the entire of group. eight PlagiarismAll assignments can be checked with plagiarism-detection software program; any scholar discovered to have plagiarised could be topic to disciplinary motion. Plagiarism consists of • submitting work that's not your personal or submitting textual content that's not your personal • permitting others to repeat your work by way of e mail, printouts, social media and many others. • posting project questions (in full or partial) on exterior technical boards • copying work from/of earlier/present semester college students • sending or passing your work to your mates • posting project questions on technical boards to get them solved • another person writing your code (i.e., contract dishonest) A disciplinary motion can result in • a gathering with the disciplinary committee • a rating of zero for the project • a everlasting document of copying in your private college information and/orCollege of Science / CS & ITWeb page eight of eight• expulsion from the college, in some extreme circumstances All plagiarism can be penalised. There aren't any exceptions and no excuses. You've got been warned.
NIT6120 – Mobile Application Development
NIT6120 – Cell Software Growth An Android App Task 1 – 2020, Semester 1 10% of your remaining mark Due Date: 12th April 2020 - 23:30 Hrs Demonstration: Throughout week 9 Lab Studying outcomes (LO’s) and Graduate Capabilities (GC’s) Addressed - 2, three and 1, 2, three This task will check your Android growth expertise and is value 10% of your general unit mark. That is a person task. The Martial Arts College trains college students in martial arts and grades the scholars to award completely different belts following an examination. These examinations run at completely different instances relying upon the extent. In the course of the examination every scholar is assigned an examiner. The Martial Arts College desires you to develop a grading app for his or her Yellow basis Belt program. The Yellow belt has four levels viz, 1st diploma, 2nd diploma, third diploma and 4th diploma. A Diploma is awarded based mostly on the scores achieved as beneath. 1. 1st diploma – Rating =24 2. 2nd diploma – rating = 25 and =38 three. third diploma – rating = 39 and =59 four. 4th diploma – rating =60 These levels are ranks to be earned earlier than progressing to Crimson Belt. The examiner follows the desk beneath to grade a scholar. At this stage for every criterion, a spread of scores 1 – 5 is given for every of the factors listed within the desk. # Show the next KaeshiWaza(self-defense methods) Rating(1-5) 1 Aggressive handshake 2 Inside wrist grip three Outdoors wrist grip four Each fingers holding wrist 5 Each wrists held 6 Headlock aspect 7 Strangles entrance eight Strangles aspect 9 Strangles rear 10 Bear hugs Behind (over arms) 11 Bear hugs Behind (beneath arms) 12 Bear hugs Entrance (over arms) 13 Bear hugs Entrance (beneath arms) Some Expectations 1. Display 1 - Teacher Login 2. Display 2 - Standards # 1- 6 three. Display three – Standards # 7-13 four. Display four - End result 5. Min API degree to be supported is API 21 6. The consumer enter is secure and won't crash the App. 7. Make sure you embody any pictures you employ in your app ought to be in the identical app Listing. eight. You must check your software on one other machine earlier than submitting. Submission directions • Zip up the complete Task 1 folder, and any sub-folders, through which you have got created your resolution for this task. • Identify the ZIP file Surname_Firstname_studentid_Assignment1.ZIP • Submit the zip file to Drop Field on VUcollaborate Code • The answer should be an Android Studio Venture. Be aware Late submissions will likely be evaluated with a penalty of 5% per day for a max of 1 week. No submission will likely be task assist accepted every week after the due date. For any particular circumstances, please contact the unit convener. Plagiarism THIS IS AN INDIVDUAL PROJECT. • The submitted work should be your individual work. • You could maintain your individual work from different college students. • You could NOT view the code of different college students. • You could talk about the work with instructing employees. • You could talk about the massive image with friends however the remaining design ought to be yours. • You could identify and code attributes and operations by yourself. • There will likely be completely no tolerance of plagiarism. • Any person who presents any work that isn't their very own or is just not correctly referenced will likely be awarded zero marks for the undertaking. Marking Scheme # Standards Max Marks Marks obtained 1 Grading evaluation desk should be introduced with 4 screens 2 marks Diploma awarded (Consequence) ought to be introduced in a brand new display with the achieved rating. 2 marks performance for calculating rating 2 marks structure 2 marks Utilization of widgets (labels, buttons, and so forth.) 2 marks Teacher Login 1 mark 2 retrieve scholar particulars replace scholar information 1 mark 1 mark three retailer/retrieve grading assessments add feedback on every grading assessments 1 mark 1 mark four Use of a number of relational tables to retailer and retrieve all information (grading evaluation, teacher login) from database 1 mark 5 App Demonstration 2 marks 6 Design Venture Report – 500 phrases 2 marks Complete 20 marks
ISY2006 – Object Oriented Programming Name/Code Assessment Type Report
Unit ISY2006 – Object Oriented Programming Identify/Code Evaluation Kind Report Evaluation No 1 Evaluation OOAD Case Research Identify Unit Studying LO 2, LO Three, LO four Outcomes Assessed Due Date and Week 5, Friday 24th April 2020, 5pm Time Weighting 20% (20 Marks) Evaluation Specification: Description You're contacted by a small Membership proprietor who desires you to assist with making a Web site for an internet Reserving System that can assist the membership in managing the bookings for his or her 10 perform rooms. At present, Membership maintains a handbook reserving system that's more and more changing into tough to handle for the workers. The present system is faulty and time taking. Present System: At present, for Reserving a perform Room, a buyer calls or is available in particular person to the membership. The membership admin helps them to decide on the perform room based mostly on varied elements – Day, Time, Variety of hours, Variety of individuals and availability. The workers will then recommend them if the reserving is obtainable and whether it is obtainable then Buyer will have to pay a 10% deposit to verify the reserving. However at the moment, a whole lot of time is spent to discover a appropriate perform Room in addition to to make certain that the perform room is obtainable for the entire time as per the buyer request. The client pays the remainder quantity on the Reserving day after the perform Room has been used. The client can also be liable to pay for any damages (if any) made to the room throughout their event. The primary aims of this New Reserving system are: Ebook for a perform – This technique will assist prospects in making a reserving for a Operate Room. Each perform room has a distinct capability and charges per hour. Operate rooms want a reserving for minimal two hours. Australian Institute of Larger Schooling CRICOS Supplier Code: 03147A Stage Three & four 545 Kent Road Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au On-line Cost - This technique will give an choice to the client for on-line cost for his or her bookings. As soon as the cost is accepted a affirmation e mail is shipped to the client with a Reserving Reference Quantity. Higher Data - This technique will present the client with all the main points of the Operate Room and the map of the room earlier than they affirm their bookings. This can give a chance to the client to arrange for the perform and ensure before-hand and therefore getting a venue in line with their necessities. Scale back Paperwork - As many of the issues might be carried out on-line, it would cut back the utilization of paper for the Membership. Improves Effectivity - This technique will make issues simpler for workers as the entire Reserving system will go surfing and it'll have maps and attainable Digital excursions that can permit prospects to make sure of what they're reserving. Additionally, reserving System will examine for the provision of the room throughout the entire time required. This fashion the workers can spend extra time attending to their prospects who've present bookings with the membership. Improved Buyer Service - The shoppers making a reserving over the brand new On-line Reserving System will have to Register themselves. The shoppers might want to present varied private particulars like First title, Final title, Full Tackle, E-mail Tackle and Telephone Quantity. The shoppers begin incomes loyalty factors when they go ahead with bookings. The brand new System will now work within the following means: 1. A Buyer might want to login/Register to make a brand new Reserving. 2. The Buyer will present the date, time and variety of individuals they wish to e book a room for. Three. The system will then choose up the obtainable rooms as per the Buyer’s requirement. four. The Buyer can browse with the selection offered by the system. 5. Then the Buyer can select the one that's after which proceed with cost. 6. After profitable cost, the Buyer will obtain print or e mail the Reserving affirmation for future reference. Australian Institute of Larger Schooling CRICOS Supplier Code: 03147A Stage Three & four 545 Kent Road Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au Necessities: 1. Create a Use Case for the brand new On-line Reserving System. 2. Create a Area Mannequin for the net Reserving System. Three. Create a Sequence Diagram for the use case Ebook for a perform Room of the On-line Reserving System. four. Create a Class Diagram for On-line Reserving System. Detailed Submission Submit as an MS Phrase or PDF file. Necessities Embrace a canopy sheet that has your title, topic, date, report title and WORD COUNT. 1. You're required to submit a report on this case research that highlights what the case research is about and any two assumptions you will have made for this method. (Please observe: Any assumption you make for this method needs to be in step with the case research given and mustn't contradict the issue definition itself). 2. The report ought to have all of the artefacts talked about within the Necessities part. Three. The report should conclude with a small reflection part that displays on what you learnt by way of this task and any challenges you needed to work on this case research. Referencing and Plagiarism It's important to make use of IN TEXT referencing. If you're utilizing the precise phrases from a reference then you have to use citation marks. You need to use Chicago Fashion referencing with numbers, with a list on the finish of the essay. Microsoft Phrase has an EndNote plugin that makes this fashion very straightforward and clear to observe. (http://www.chicagomanualofstyle.org/tools_citationguide.html ). Alternatively, you should use the extra conventional Harvard fashion, which is extra verbose. http://www.citethisforme.com/harvard-referencing . Keep in mind that it is a Turnitin task and plagiarism might be topic to extreme penalties. Please confer with the AIH Tutorial Misconduct Coverage: http://www.aih.nsw.edu.au/content material/1-home/Eight-more-info-tabs/Three-officialpolicies/academic-misconduct-policy.pdf Australian Institute of Larger Schooling CRICOS Supplier Code: 03147A Stage Three & four 545 Kent Road Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au Standards Marks Marks Acquired 1. Use Case a. Actors 1.zero b. Preconditions zero.5 c. Predominant stream 1.zero d. No less than 2 Various 1.zero flows/Exceptions e. Publish situations zero.5 f. Diagram 1.zero 2. Area Mannequin a. Area lessons 1.zero Recognized b. Area lessons 1.zero related Three. Sequence Diagram a. Actor and varied 1.5 objects within the system b. Lifelines and a couple of.zero messages handed between varied objects and Actors c.. Sequence fragments (possibility, different or loop) 1.5 four. Class Diagram a. Predominant lessons 2.zero recognized b. Relationship 2.zero between foremost lessons recognized 5. Basic a. Task cowl 1.zero web page, title, desk of contents, web page numbers and general format b. Reflection 2.zero c. References 1.zero Australian Institute of Larger Schooling CRICOS Supplier Code: 03147A Stage Three & four 545 Kent Road Sydney NSW 2000 Australia T: +612 9020 8050 W: www.aih.nsw.edu.au
COSC 3360‐Operating System Fundamentals Assignment
Present as of Wednesday, April eight, 2020 1 COSC 3360‐Working System Fundamentals Project #three: The Poorly Ventilated Tunnel  Due Monday, April 27 2020 at 11:59:59 pm  OBJECTIVE This venture will familiarize you with the usage of pthreads, pthread mutexes and pthread situation variables. Your program will earn you no credit score if it makes use of semaphores as an alternative of mutexes and situation variables. THE PROBLEM A automotive tunnel is so poorly ventilated that it has change into vital to limit: 1. The variety of northbound automobiles within the tunnel, 2. The variety of southbound automobiles within the tunnel, three. The overall variety of automobiles within the tunnel. Your project is to write down a C/C++ simulating the enforcement of those restrictions utilizing Pthread mutexes and situation variables. Assignments utilizing semaphores will Your program ought to include 1. A important thread that may fork a tunnel course of and the automotive processes in response to the enter specs. 2. One automotive thread per automotive desirous to cross the tunnel. The enter to your program consists of the utmost variety of northbound automobiles within the tunnel, the utmost variety of southbound automobiles , and the utmost complete variety of automobiles within the tunnel adopted by an ordered checklist of arriving automobiles as in: three // as much as three automobiles at a time 2 //as much as two NB automobiles at a time 2 //as much as two SB automobiles at a time 1 S three // SB automotive arrives at t = 1s // will take 3s to undergo the tunnel 2 N four // northbound automotive arrives 2s after // will take 4s to undergo the tunnel 1 S four // southbound automotive arrives 1s after // will take 4s to undergo the tunnel Your program will terminate when all automobiles have gone by means of the tunnel. YOUR OUTPUT Your program ought to begin by echoing the primary right here strains of enter as in: Most variety of automobiles within the tunnel: 2 Most variety of northbound automobiles: 1 Most variety of southbound automobiles: 1 It ought to print one line of output every time a automotive (a) arrives on the tunnel, (b) enters the tunnel and (c) leaves the tunnel. This line of output ought to determine every automotive by its northbound or southbound sequence quantity as in Southbound automotive # 1 arrives on the tunnel. Southbound automotive # 1 enters the tunnel. Northbound automotive # 1 arrives on the tunnel. Northbound automotive # 1 enters the tunnel. Southbound automotive # 2 arrives on the tunnel. Northbound automotive # 2 arrives on the tunnel. Southbound automotive # 1 exits the tunnel. Southbound automotive # 2 enters the tunnel. On the finish of the simulation, your program must also print a abstract with the overall variety of northbound and southbound automobiles that went by means of the tunnel as effectively as the overall variety of automobiles that needed to wait due to the restrictions. This abstract might appear to be: 2 northbound automotive(s) crossed the tunnel. 2 southbound automotive(s) crossed the tunnel. 2 automotive(s) needed to wait. PTHREADS 1. Remember the pthread embrace: #embrace 2. All variables that shall be shared by all threads should be declared static as in: static int MaxNCarsInTunnel; three. If you wish to cross an integer worth to your thread operate, it's best to declare it void as in: void *automotive(void *arg) // automotive Since most C++ compilers deal with the solid of a void into an int as a deadly error, you will need to use the flag ‐fpermissive. 2 four. To begin a thread that may execute the shopper operate and cross to it an integer worth use: pthread_t tid; int i; … pthread_create(&tid, NULL, automotive, (void *) seqNo); Had you wished to cross a couple of argument to the automotive operate, it's best to have put them in a single array or a single construction. 5. To terminate a given thread from contained in the thread operate, use: pthread_exit((void*) zero); In any other case, the thread will terminate with the operate. 6. If you must terminate one other thread operate, you a lot use: #embrace pthread_kill(pthread_t tid, int sig); Observe that pthread_kill() is a harmful system name as a result of its default motion is to right away terminate the goal thread even when it's in a essential part. The most secure various to kill a thread that repeatedly executes a loop is thru a shared variable that's periodically examined by the goal thread. 7. To attend for the completion of a selected thread use: pthread_join(tid, NULL); Observe that the pthread library has no strategy to allow you to anticipate an unspecified thread and do the equal of: for (i = zero; i < nchildren; i++) wait(zero); Your important thread must hold monitor of the thread id’s of all of the threads of all of the threads it has created: pthread_t cartid[maxcars]; for (i = zero; i < TotalNCars; i++) pthread_join(cartid[i], NULL); PTHREAD MUTEXES 1. To be accessible from all threads pthread mutexes should be declared static: static pthread_mutex_t entry; 2. To create a mutex use: pthread_mutex_init(&entry, NULL); Your mutex shall be mechanically initialized to one. three. To amass the lock for a given useful resource, do: pthread_mutex_lock(&entry); four. To launch your lock on the useful resource, do: pthread_mutex_unlock(&entry); PTHREAD CONDITION VARIABLES 1. The best strategy to create a situation variable is: static pthread_cond_t okay = PTHREAD_COND_INITIALIZER; 2. Your situation waits should be preceded by a profitable lock request on the mutex that shall be handed to the wait: pthread_mutex_lock(&entry); whereas (ncars > maxNCars) pthread_cond_wait(&okay, &entry); … pthread_mutex_unlock(&entry); three. To keep away from unpredictable scheduling habits, the thread calling pthread_cond_signal() should personal the mutex that the thread calling pthread_cond_wait() had laid out in its name: pthread_mutex_lock(&entry); … pthread_cond_signal(&okay); pthread_mutex_unlock(&entry); All applications passing arguments to a thread should be compiled with the –fpermissive flag. With out it, a solid from a void to anything shall be flagged as an error by some compilers.
SENG1110/6110 Programming Assignment
e SENG1110/6110 Programming Task 1 – Semester 1, 2020 Due: By digital submission (Blackboard) by 11:59pm on Fri 1st Could 2020. MUSIC COLLECTION Introduction The target of this task is to implement an object-oriented program utilizing Java, to handle a group of songs. The task 2 shall be an extension of this task. SENG1110 college students - This task may be accomplished in pairs. SENG6110 college students - This task should be accomplished individually.Earlier than you begin Rigorously learn the specification beneath. Ensure you have all the data obligatory to begin writing this system. If you're unsure of one thing, don't make assumptions. Put up your inquiries to the dialogue board discussion board named "task 1" and examine it usually. Attempt to begin the task as quickly as doable. There's a doc “HelpToStartAssign1” and a few Java information on Blackboard, which you need to use as a place to begin. Specification This system will preserve observe of as much as three albums, and as much as four songs every album. When run, this system will show a menu of actions to the consumer, together with one which exits this system. Till the consumer chooses to exit, the menu is displayed once more after every motion is accomplished. This system ought to have the next functionalities: 1. Will permit the consumer to create albums. 2. Will permit the consumer to enter a brand new tune into an album. three. Will forestall the consumer from including a tune in an album if exceeds a sure time restrict (in tune length occasions). four. Will permit the consumer to request a listing of all songs (and the main points of every tune) from an album. 5. Will permit the consumer to request a listing of all albums (together with all of the songs in every album). 6. Will permit the consumer to request a listing of all songs whose length is below a sure time (in minutes). 7. Will permit the consumer to request a listing of all songs of a particular style. eight. Will permit the consumer to delete an album. 9. Will permit the consumer to delete a tune from an album. Your program should give acceptable messages to the consumer on an try and: • create an album that exist already (two albums are an identical if they've the identical title) • create one other album when there isn't any room anymore. • add a tune to an album that's full OR exceed a time restrict OR in an album that doesn't exist. • add a tune that exist already in an album (word that 2 songs are an identical if title, artist, and length are the identical). • delete an album that doesn't exist. • delete tune that doesn't exist. • Request listing of albums/songs below a sure standards (functionalities four,5,6,and seven) and the variety of albums/songs is zero.Program Necessities Your program ought to implement three courses, which retailer the next information: • Music.java – storing the next particulars a few tune. o title – the title of the tune. o artist – the individual/s performing the tune. o length – the size of the tune in seconds o style – the style may be solely “rock”, “pop”, “hip-hop” or “bossa nova” • Album.java – shops as much as four Songs at a time. o title – the title of the Album. o song1, song2, song3, song4 – Music objects o totalTime – the overall taking part in time of all songs saved o MAX_TIME – a relentless which shops the utmost taking part in time for the album, set to a price of 12 (minutes). • SongCollection.java – shops all albums within the system. o album1, album2, album3 – All present Album objects saved within the system. All the information elements of your courses should be personal (which means that you might be making use of the rules of encapsulation). Moreover, your courses have to have strategies that present the performance outlined in the issue description. The solely class which ought to have a essential methodology is SongCollection.java, which ought to create an occasion of the class SongCollection and name the run() methodology which can have code to supply the consumer with a menu to permit them to carry out any of the duties outlined in the issue description. The template for that is beneath. The category SongCollection additionally would be the just one that may obtain inputs and present outputs. public class SongCollection You can not use arrays on this task. SENG1110 college students can select TIO or GUI, and may use solely the courses seen in lectures. Your resolution should be your individual work. Marks shall be awarded for: format, each visible (variable names, indentation) and structural (scope of variables, use of strategies); documentation (feedback); and talent of the submission to carry out as specified. A extra detailed marking schema is accessible. What to submit. It's best to submit the Java program (Music.java, Album.java, SongCollection.java) and the task cowl sheet electronically through the "Task 1" hyperlink on Blackboard. Don't embody .class information in your submission. Add the title of the scholar(s) on the highest of every Java file submitted. If you're finishing the task as a bunch (solely SENG1110 college students), add each names in every Java file AND submit 2 task cowl sheets. Additional Work for SENG6110 college students Your implementation should use GUI utilizing the courses seen in lectures and it's worthwhile to present a UML class diagram of your program. Within the Blackboard you will discover a brand new discussion board within the dialogue board: “assignment1”. Any query in regards to the task 1 you'll be able to publish there. Verify this discussion board usually. Prof Regina Berretta. Mar -2020

Guaranteed 5-30% off for all your orders with us. Try Now!

X