Assignment Chef icon Assignment Chef

Browse assignments

Assignment catalog

33,401 assignments available

[SOLVED] ARIN6905 Digital audiences and creators

ARIN6905 Digital audiences and creators Description The essay assignment of 3500 words in this class is a little different from most  essay assignments.In the essay questions you will see that each question contains two parts:a  link to a video,and a set of three  readings which might be journal papers,chapters  from an academic monograph (a single or co-authored  book),or chapters from an edited collection(a book consisting of many essays from many different writers). Please write the question  number,not the full  question text, at the top of your essay. For these essays,your task is to analyse the video via the readings.To give an example of what I mean, here is a sample paragraph I have  written (using invented using fictional references and a fictional topic  that has nothing to do with digital platforms) to demonstrate  what an extremely good(85+,HD level)paragraph of such an essay will look like: The video essay also mostly confrms what the readings have to say about the breeding habits of the  Greater Sydneyfish,although with exceptions.For example,at 10:24 the video states that the Greater Sydneyfish reproduces solely in water with apH level of under 6,just as Bloggs(2022,p.167)states that these fish require slightly acidic water,and Smith (1978,p.661)similarly asserts that these fish arerarely if ever found in alkaline waters.Craig(1999)does not overly comment on the pH level of the water for the  Greater  Sydneyfish,but does say  it  is  rarely  found  in  very  pure  water.Similarly,both  Craig(1999,p.51)and  Smith(1978,p.668)agree  that  in  the  Greater Sydneyfish it is the female who takes the lead in selecting a mate,and this element of the creature's mating habits are noted in the video at various points(05:15,07:14, 35:33,51:31).However,there is a key different between the  video essay and the  workof Bloggs,who states  (2022,p.144)that young  Greater Sydneyfish  remain  close to their parents for up to a full year after being born,whereas the video(17:14)claims that young Greater Sydneyfish spend only a few months near their parents before striking out on their own.Of interest in this comparison is Smith(1978,p.655)who says it was not known,when they were writing,what the behaviour of young Greater Sydneyfish is.Given  therefore the two conflicting claims in the video and Bloggs(2022,p.144),and Smith's(1978,p.655)comment  about  the  uncertainty on thisissue,it appears that even in the present day this question has not been fully established,and further observation would be required to identify the behaviours of young Greater Sydneyfish. As you can see,the key point of this essay is a close comparison between the readings and the video,with regular comparisons between the readings(precisely. cited) and  the  video  presented(precisely  timestamped),as well as analysis about what these comparisons tell us or show us.You should also have a short introductory paragraph of no  more than 200 words in which you list the topics you'll be addressing in your essay,and a short conclusion paragraph (again no more than 200 words)in which you summarise the main points of comparison you have drawn out between the video and the readings,and thus how the readings can help in our understanding of the video.Again,please write the question number,not the full question text,at the top of your essay.

$25.00 View

[SOLVED] MSCI304 Developing Business Information Systems 2024/25

MSCI304: Developing Business Information Systems Individual Assessment Lent Term 2024/25 Assignment Individual assignment (MSCI304) Weighting 40% Due date 15:00 (GMT) Friday, 30th April 2025 Details Read the introduction and Business Process sections carefully and address the tasks accordingly. Make sure your tables and diagrams are professional - clean, clear and neat. Format You must use diagramming software (e.g., draw.io, LucidChart, and MS Visio, etc.). You must use headings to structure your assignment. You must submit the final assignment in PDF format. Introduction Lush Continental is a luxury restaurant chain in the UK that offers luxury continental dishes, with locations mainly in the North of England, such as Manchester, Liverpool and Lancaster. The restaurant sources the  majority of its food produce  locally, that  is, within the  UK, through partnerships with major importers. Lush Continental prides itself as a luxury continental restaurant, attracting mainly customers from the middle class and above. The restaurant has a website listing all the menus, locations and opening and closing hours of Lush Continental’s branches. Customers can make table reservations using the Lush Continental website. Each table reservation is free, but customers must provide their card details, where a fixed amount will be deducted if the customer cancels less than 24 hours before the reservation time. Apart from fine dining, the restaurant usually organises a buffet for corporate organisations, but reservations and payments must be made at least 48 hours in advance. Sales were significantly impacted during COVID-19, as the government rolled out the stay-home and safe distance rule across the UK. Most businesses that require socialisation, such as restaurants and bars, were all shot down as people were advised to stay indoors and work from home.  Lush  Continental  was  one of the  many  businesses  impacted  during  this  period.  It recorded significantly low sales in the first few weeks of the pandemic, before the restaurant was forced to close its doors to customers during the stay-at-home policy. At the peak of the pandemic, the CEO, with the support of the board of directors of Lush Continental, decided to pivot and  start home delivery across the major cities where  the restaurants were located. The CEO employed the service of a small web development company to quickly upgrade the website to an e-commerce site where customers can place orders for food and get it delivered to their address. However, this quickly turned out to be a bad strategy, as many customers complained about the food’s temperature, presentation, and taste. Fine dining restaurants do not usually offer take-out service in most cases due to the same issue experienced by Lush Continental. Therefore, to salvage the brand’s reputation, the company decided to shut down the home delivery service, innovate and re-pivot the business. The company decided to launch Lush Fresh, a grocery company that delivers fresh groceries with instructions on how to prepare some of the Lush Continental’s top and chef choices meals. Lush Fresh established a relationship with food importers and manufacturers in the UK for supply. The new Lush Fresh website allows customers to view, select, buy and pay for groceries, which will be shipped to customers the next day, depending on available delivery slots.  In addition, there is a digital product called Lush Meal on Lush Fresh’s website, where a customer can select a Lush Continental meal, decide on how many persons the meal is to be prepared for, and the website will automatically add the required ingredients and instructions to prepare the meal to the customer’s cart. The Lush Meal was popular and generated a lot of social media buzz, hence the company decided to spend more money to promote Lush Meal. Due to the speed at which the company needed to pivot, the web platform was not integrated with the old restaurant management system – which has been quickly modified to accommodate the new business model. Therefore, the company have to rely on the old systems used for warehouse management, including systems for managing sales, procurement and accounting processes. In the old system, data may be sent between each system using file transfers or manual inputs. All paper documents generated by the systems are pre-numbered and filed in numerical order. Each permanent staff is assigned a unique user ID, so data recorded and documents generated can be traced back to their origin. However, the risk of losing these documents is very high. This is a concern because some approvals must be done on paper, because for some processes, there is no approval workflow within these systems (i.e., no electronic approval). Furthermore, errors in file transfers and high data entry errors could result in data held in different  departmental  systems  not  being  updated  correctly.  Overall,  this  integration  issue creates  organisational  silos  because  departments  do  not  have  adequate  means  to  share information or knowledge. Before the pandemic, they did not feel the need to upgrade as their operations so far have been quite simple, and demands have been relatively stable. Overall, the Lush Fresh pivot was highly successful, and the company have decided to spin it out of the Lush Intercontinental brand, planning to expand to the rest of the UK and establish itself as a fresh grocery company in the UK. Therefore, the new management of Lush Fresh has called on you, as the lead enterprise resource planning system designer for your company, to help develop an enterprise system for the company to manage its grocery delivery process. Lush Fresh aims to have an enterprise system that is not only integrated nationwide but also can be seamlessly integrated with their new Lush Fresh website to handle online grocery sales and delivery efficiently. They need to revamp their processes as well. Currently, all Order-to-Cash (O2C) and Procure-to-Pay (P2P) processes are manual processes that can be automated. For example, all customer orders are downloaded as an  Excel file by the Sales Clerk into the Accounting System, and sales orders are manually reviewed, printed and signed off by the Sales Manager. Every six-hour shift, the Warehouse staff packs goods according to the approved sales orders and processes for delivery.  Processes with other stakeholders, such as suppliers and banks,  are  also  very  manual.  Due  to  the  comparatively  low  number  of  daily  and  weekly transactions during the restaurant era, every morning, the Accounting Clerk manually uploaded bank data downloaded from Internet banking into the Accounting System. In view of these deficiencies, Lush Fresh understands that it will not have the capacity to respond to increased online retail customers and potential market disruptions as the company plans to expand to other cities in the UK. Therefore, Lush Fresh needs an enterprise system that is not only affordable but also agile and scalable so it can adapt to changes should the business expand further to Europe. In your first meeting with Lush Fresh’s CEO, you found out that the company has a Sales Clerk and a Sales Manager in the Sales Department, including a Purchasing Clerk and a Purchasing Manager  in  the  Procurement  Department.  The  company  has  an Accounting  Clerk  and  an Accounting manager dealing with both Accounts Receivable and Payable. One of the owners of Lush Continental is the Finance Director, who is responsible for the finance side of the company. They have four Operations Staff and an Operations Manager in the operations department. In the Warehouse, they have four Inventory Clerks who are responsible for recording and managing the movement of stocks from the receipt of freshly delivered groceries and ten Warehouse Staff who process both incoming and outgoing deliveries. Finally, Lush Fresh has one HR Clerk and one HR Manager, who deals with all HR-related matters, including payroll. During busy seasons, Lush  Fresh  employs casual staff across all departments to  help them deal with  increased business activities. Lush Fresh expects to be able to start its business expansion next year, employ more permanent staff and borrow a large sum of money from the Bank. Consequently, this year, they aim to first improve their enterprise system in preparation for the expansion. Hence the reason for calling on you. Business Process The following systems documentation and narration are given by the Lush Fresh CEO after interviewing relevant employees. As an online fresh grocery retailer, Lush Fresh’s transaction cycles consist of short operations circles that involve the following operations: customer service, inventory management, vendor management, accounting and finance, warehouse operations, and order fulfilment. The  CEO  has  informed  you  that  although  the  company  requires  a  comprehensive  Retail Management  System  (RMS)  that  will  cover  all  their  operations.  However,  at  present,  the company wishes to focus on the digitalisation and automation of its present Order-to-Cash (O2C) and  Procure-to-Pay  (P2P)  processes,  which  contains  a  combination  of  silos  and  manual processes. The CEO states that the new RMS’s O2C process should ensure that once a customer makes a purchase  using  the  Lush   Fresh  website,  the  order  details  should  be  sent  to  the  Order Management system (OMS). The OMS should track the order at each stage of the order’s life cycle and keep the customer informed of order progress, including identifying and attempting to resolve  any  problems  –  e.g.  out-of-stock  items. The  OMS  should  integrate  with  the  order fulfilment system, where warehouse staff are able to access order details in real-time for picking, packaging  and  shipping.  Once  the  items  have  been  packed,  the  invoicing  system  should automatically email the invoice and other details to the customer, such as the expected time of delivery  and  any  changes  to  the  order  –  for  example,  out-of-stock  items  that  have  been exchanged. In addition, once the item is shipped and the invoice sent, the Accounts Receivable department should receive the invoice and payment details. When a customer decides to use the  buy-now-pay-later  option,  the  Payment  Collection  department  should  be  automatically notified to enable them to track and collect payment. Finally, the system should automatically generate a daily report at 12 midnight containing key metrics based on best practices. The CEO further states that the new RMS’s P2P system should consist of tools to help with suppliers' selection, such as analysing  prices,  quality  and freshness  of  produce  based  on customers’ feedback. The system should be capable of automating the process of generating stock requirements based on inventory and sales reports and creating Purchase Requisitions (PR). The procurement manager should be able to review all automated generated requisitions for  approval.  Also,  once  requisitions  are  approved,  a  Purchase  Order  (PO)  should  be automatically generated and sent through an approval loop – consisting of the accounting and finance departments. If the PO is successfully approved, the system should automatically send the PO to the supplier/vendor via email. In addition, The CEO states that the suppliers are expected to deliver within 48 hours, and during the delivery, the Goods Receipt (GR) process should be automated. The system should have a Barcode and/or RFID scanner at the warehouse, where the sealed cartons of fresh produce are scanned, and the codes are automatically matched with the PO’s ID and the different IDs of the products listed in the PO. After the GR process is completed, the system should automatically generate reports on the supplier's performance, which contain information such as quantity delivered vs quantity ordered, etc. When the GRs are approved by the Inventory Managers based on the generated reports, an invoice approval process that matches the purchase order, the vendor’s invoice and GR should be automatically initiated. If there are no discrepancies found, the invoice and approval report should be automatically sent to the Accounting and Finance Managers for approval and payment. Tasks (100 marks) As an enterprise resource planning system designer, your task is to create an RMS for the Lush Fresh grocery business based on the CEO’s narratives. That is, an RMS with a specific focus on digitalising and automating the Order-to-Cash (O2C) and Procure-to-Pay (P2P) processes. You are to conduct more research to ensure there are no process gaps and inconsistencies in the O2C and P2P processes narrated by the CEO. Where there are gaps and/or inconsistencies, you are free to make changes to the requirements but ensure you state your assumptions and rationale. In the process of developing the RMS for Lush Fresh, you are to carry out the following design tasks: 1.   Create an “As Is” Business Process Model for the Lush restaurant’s table reservation and the Lush Meal processes (10 Marks) 2.   Create a Structured Narration Table for the new RMS and state the rationale for your approach (10 marks) 3.   Create a Context Diagram for the new RMS and state the rationale for your design (5 marks) 4.   Create a Level 1 Physical DFD for the new RMS and state the rationale for your design (10 marks) 5.   Create one Level 1 Logical DFD and two Level 2 Logical DFDs for the new RMS and state the rationale for your design (30 marks) 6.   Create the following two System Flowcharts for the new RMS (20 marks): a.   Flowchart 1: “Customer Order life cycle” b.   Flowchart 2: “Goods Receipt process” 7.   Provide a brief reflection on your RMS design (15 marks): a.   highlighting the key challenges you encountered and b.  suggesting improvements you would make if you had the opportunity to revisit the project.

$25.00 View

[SOLVED] Forecasting for Economics and Business

Forecasting for Economics and Business Due 22 May 2025 at 9:00 AM Assignment For this assignment, you will be forecasting Australian interest rates — specifically, the RBA Cash Rate Target. The time series used in your analysis and forecasting can be obtained using the read_rba and read_abs functions from the readrba and readabs packages, respectively (you will need to install those packages first). You will use the former to obtain the interest rate data (series ID: “FIRMMCRTD”) and the latter to obtain inflation data (series ID: “A128478318V”). Note: Interest rate data are available at a daily frequency, going back to the 1990s. Inflation data are monthly, starting from September 2018. For your analysis, in both instances, use monthly series from September 2018 onward. The inflation series currently extends to March 2025, which will suffice for nearly all of your analysis. The only instance where you’ll need April 2025 inflation is when forecasting the May 2025 interest rate using the ARDL model. In that case, assume that April 2025 inflation is equal to March 2025 inflation. Part 1 The first part of the assignment involves: 1. Checking for stationarity in the two time series, observed at a monthly frequency. (Note: you will need to convert the daily interest rate data to monthly by selecting one observation on a later date in the month) Use all available data for this step. In one or two sentences, document your findings. Additionally, present both the interest rate and inflation series in the same figure. 2. Generating a monthly series of one-step-ahead forecasts of the RBA cash rate for an out-of-sample period beginning in January 2022. Use a rolling window forecasting scheme to a range of competing models. Specifically, generate forecasts from the following models: (i) Random walk model (ii) Autoregressive model (select lag order using SIC, allowing up to four lags) (iii) Autoregressive distributed lag (ARDL) model, using only the lags (i.e., do not include contempora-neous values) of inflation as an exogenous variable. Use SIC to determine both autoregressive and distributed lag orders, allowing up to four lags in each case; allow for the possibility of different lag order, that is, in your ARDL(p,q), p doesn’t need to be equal to q. For AR and ARDL models, select the optimal lags only once using the first rolling window, and retain them throughout the forecasting exercise. In one or two paragraphs, describe the model selection process and your rationale. 3. Assessing forecast unbiasedness and efficiency for each of the three models. Use heteroskedasticity- and autocorrelation (HAC) consistent standard errors (hint: use the coeftest and vcovHAC functions from the lmtest and sandwich packages). In one or two sentences, summarize your findings. Present the results of your unbiasedness and efficiency tests in one table. 4. Comparing forecast accuracy across the three models using quadratic loss and the Diebold-Mariano test statistic, again using HAC standard errors. To keep things simple, ignore any nesting between models; that is, do not apply any adjustment term to the loss differentials, even if you believe it may be warranted. Describe your findings in one or two paragraphs. Present the Diebold-Mariano test results in one table. Part 2 The second part of the assignment involves forecasting the May 2025 interest rate. Your point forecast will almost certainly be off, as the RBA typically adjusts rates in standard basis point increments (e.g., the actual value is likely to be 4.10%, 3.85%, or 3.60%, but unlikely to fall in between). Once the RBA announces the May rate (in the afternoon of 20 May 2025), compare the realized value to your forecast. Briefly discuss the size and direction of your forecast error, and any reasons that may explain it. Submission Upload both your report (as a PDF) and the R file with your project code by the due date. The report should include one figure and two tables in addition to the text (which should not exceed 1500 words). The R file must be free of coding errors. Data should be sourced using the read_rba and read_abs functions to ensure full reproducibility of your results.

$25.00 View

[SOLVED] DTS002TC Essential of Big Data Coursework 2

DTS002TC Essential of Big Data Coursework 2 (Individual Assessment) Due: 5:00 pm China time (UTC+8 Beijing) on Sat. 24th. May. 2025 Weight: 50% Maximum score: 100 marks (100 % individual marks) Assessed learning outcomes: E. Demonstrate the ability to write codes to obtain numerical solutions to mathematical problems. F. Demonstrate the ability to display computational results in tabulated or graphical forms. Develop an understanding of the industrial and commercial applications of big data. Late policy: 5%of the total marks available for the assessment shall be deducted from the assessment mark for each working day after the submission date, up to a maximum of five working days. Risks: l Please read the coursework instructions and requirements carefully. Not following these instructions and requirements may result in loss of marks. l Plagiarism results in award of ZERO mark. l The formal procedure for submitting coursework at XJTLU is strictly followed. Submission link on Learning Mall will be provided in due course.The submission time stamp on Learning Mall will be used to check late submission. Overview This coursework aims to provide students with hands-on experience in analyzing and predicting global electricity generation data using Python. Students will be required to perform. data reading, preprocessing, prediction, visualization, and validation of their predictions against real-world data for selected countries. This exercise will help students understand the practical applications of big data analytics in the electricity sector and enhance their skills in data manipulation, visualization, and predictive modeling. Task 1: Data Processing and Analysis (40 marks) 1.1 Data Reading and Preprocessing (15 marks) Using Python, perform. the following tasks: a. Import the necessary libraries (e.g., pandas, numpy).  (3 Marks) b. Load the GlobalElectricityStatistics.csv dataset into a DataFrame. named electricity_data.  (3 Marks) c. Display and check the first and last five rows of the DataFrame.  (3 Marks) d. Show the basic information of the DataFrame, including dimensions, column details, data types, and memory usage.  (3 Marks) e. Handle any missing values or inconsistencies in the data.  (3 Marks) 1.2 Data Visualization (10 marks) Visualize the electricity generation trends for five selected countries (e.g., China, United States, Ireland, South Africa, India) from 1980 to 2021. Using Python, perform. the following tasks: a. Plot line charts for each country showing the electricity net generation over the years. (5 Marks) b. Use appropriate titles, labels, and legends to make the charts readable. (5 Marks) 1.3 Data Aggregation and Summary (15 marks) Using Python, perform. the following tasks: a. Calculate and display the average annual electricity generation for each country from 2000 to 2021. (5 marks) b. Identify and display the country with the highest and lowest average electricity generation during this period. (5 marks) c. Visualize the comparison of average electricity generation among the selected countries using a bar chart. (5 marks) Task 2: Predictive Modeling and Discussion (60 marks) "Net Consumption" refers to the total amount of electricity that is actually used by consumers within a specific area or country over a given period. Net Consumption is calculated by considering the following components: Net Generation: The total amount of electricity generated within the area, minus the electricity used by the power plants themselves (e.g., for plant operations). Imports: The amount of electricity imported from other regions or countries. Exports: The amount of electricity exported to other regions or countries. Distribution Losses: The amount of electricity lost during transmission and distribution. The formula for Net Consumption is: Net Consumption=Net Generation + Imports − Exports − Distribution Losses 2.1 Data Preparation for Prediction (15 marks) Using Python, perform. the following tasks: a. Calculate Net Consumption value for each country a country from 1980 to 2021. (5 marks) b. Select the country with the highest average Net Consumption among all countries from 1980 to 2021. (5 marks) c. Split the Net Consumption data of selected country into training and testing sets (e.g., 80% training, 20% testing). (5 marks) 2.2 Model Building and Prediction (15 marks) Using Python, perform. the following tasks: a. Initialize a suitable predictive model with possible parameters (e.g., linear regression, Naive Bayes). (5 marks) b. Train the model using the Net Consumption training data of selected country. (5 marks) c. Predict the Net Consumption for the years 2022 to 2024 for the selected country. (5 marks) 2.3 Validation Against Real Data (15 marks) a. Use internet resources to find the actual Net Consumption data for the selected country for the years 2022 to 2024 with python. (5 marks) b. Compare the predicted values with the actual values. Calculate the percentage error for each year with python. (5 marks) c. Discuss possible reasons for any discrepancies between the predicted and actual values within 200 words. (5 marks) 2.4 Analysis and Conclusion (15 marks) a. Summarize the findings from the predictive modeling and validation within 150 words. (5 marks) b. Provide insights on how big data analytics can be applied to improve electricity generation planning and management within 150 words. (5 marks) c. Provide insights on how big data analytics can be applied to improve other similar scenarios within 150 words. (5 marks) Submission Format Instructions The assignment must be typed, spell-checked, referenced, and submitted via Learning Mall Online to the correct dropbox. Only electronic submissions are accepted - no hard copies: l A Student_ID.pdf file contains a cover letter with your ID information, and all the task report content. All students must download their file and check that it is viewable after submission. Document uploads may become corrupted during the uploading process (e.g., due to slow internet connections). Therefore, students themselves are responsible for submitting a functional and correct file that needs to be tested after submitting it. Overall Marking Criteria Code Quality and Implementation Results Outstanding (100%): Code is exceptionally well-organized, readable, and well-commented. Implementation results are accurate and demonstrate a deep understanding of the concepts. All tasks are completed with high precision. Appropriate (80%): Code is generally well-organized and readable. Implementation results are accurate and meet the requirements. Most tasks are completed effectively. Needs Improvement (60%): Code is somewhat disorganized or poorly commented. Implementation results are mostly accurate but may have minor errors. Some tasks are incomplete or not fully addressed. Hard to Understand (40%): Code is difficult to follow or lacks clarity. Implementation results are inaccurate or incomplete. Many tasks are not fully addressed or have significant errors. No Submission or Missing Section (0%): No submission or critical sections of the assignment are missing. Data Processing and Analysis (Task 1) Outstanding (100%): Data reading, preprocessing, visualization, and aggregation are performed flawlessly. Results are presented clearly and accurately. All subtasks are completed with high precision. Appropriate (80%): Data processing and analysis are generally well-executed. Results are mostly accurate and meet the requirements. Most subtasks are completed effectively. Needs Improvement (60%): Data processing and analysis show some inaccuracies or inconsistencies. Results are partially accurate but may have minor errors. Some subtasks are incomplete. Hard to Understand (40%): Data processing and analysis are poorly executed. Results are inaccurate or incomplete. Many subtasks are not fully addressed or have significant errors. No Submission or Missing Section (0): No submission or critical sections of the assignment are missing. Predictive Modeling and Discussion (Task 2) Outstanding (100%): Predictive modeling and validation are performed with high precision. Model choice is well-justified, training is accurate, and predictions are reliable. All subtasks are completed with high precision. Appropriate (80%): Predictive modeling and validation are generally well-executed. Model choice is justified, training is accurate, and predictions are mostly reliable. Most subtasks are completed effectively. Needs Improvement (60%): Predictive modeling and validation show some inaccuracies or inconsistencies. Model choice may not be fully justified, training may have minor errors, and predictions may be less reliable. Hard to Understand (40%): Predictive modeling and validation are poorly executed. Model choice is unclear, training is inaccurate, and predictions are unreliable. No Submission or Missing Section (0%): No submission or critical sections of the assignment are missing. Analysis and Conclusion Outstanding (100%): Analysis is thorough and insightful. Conclusions are well-supported by the data and results. Insights are relevant and demonstrate a deep understanding of the topic. Summary and discussion are concise and clear. Appropriate (80%): Analysis is generally thorough. Conclusions are supported by the data and results. Insights are relevant and demonstrate a good understanding of the topic. Summary and discussion are clear. Needs Improvement (60%): Analysis is somewhat superficial. Conclusions may lack full support from the data. Insights are partially relevant. Summary and discussion may lack clarity. Hard to Understand (40%): Analysis is incomplete or unclear. Conclusions are not well-supported by the data. Insights are irrelevant or unclear. Summary and discussion are difficult to understand. No Submission or Missing Section (0%): No submission or critical sections of the assignment are missing.

$25.00 View

[SOLVED] Assignment 2 Design Investigation

Assignment 2: Design Investigation Overview This assignment is an individual design investigation. It involves a study and interpretation of the Ancient Classical – Western landscape tradition. You will examine both a historical and a contemporary precedent and then use those insights to inform. your own conceptual design. The final submission will consist of 20 A3 panels compiled into a single PDF document. Assignment Structure Part A: Historical Precedent (15%) Select one significant Ancient Classical Western landscape or garden, such as those from Ancient Greece or Rome. Your analysis should focus on the design principles, materials, cultural significance, and spatial organization. Suggested content (5-6 A3 panels): - Site name, location, and time period - Historical and cultural context - Site layout, spatial order, geometry, and axes - Use of vegetation, water, and built structures - Visual documentation (photos, drawings, site plans) - Key design principles and their meanings Part B: Contemporary Precedent (15%) Select a modern landscape design that draws upon classical traditions. This may include gardens by designers such as Dan Kiley or Paul Bangay. Explore how classical ideas are adapted for contemporary use. Suggested content (5-6 A3 panels): - Project name, location, date, and designer - Purpose and context of the design - Visual layout and key features - Connection to classical precedents (axes, symmetry, plantings) - Interpretation of classical ideas in a modern context - Comparison with your chosen historical precedent Part C: Design Interpretation (30%) Using insights from both the historical and contemporary examples, develop a conceptual design for a modern site inspired by Ancient Classical principles. You may choose a site such as a public plaza, university courtyard, urban rooftop, or cultural garden. Suggested content (8–10 A3 panels): - Project title and design brief (site type, purpose, users) - Concept statement (design goals and inspiration) - Site plan and spatial arrangement (hand drawn or digital) - Perspective drawings or sketches - Pathways, axes, symmetry, and focal elements - Planting palette (Mediterranean style. olive, cypress, laurel) - Material palette (stone, gravel, terracotta, tiles) - Reference to historical and modern precedents in your design - Reflection and evaluation of the design process Suggested Panel Breakdown (20 A3 Panels) l Cover Page – Title, your name, project name Historical Precedent – Images, diagrams, analysis Contemporary Precedent – Images, analysis, comparison Site Introduction – Site type and user context Concept Statement – Written summary with visuals Site Plan – Drawing with annotations Perspective or Section – Visual representation Spatial Diagrams – Paths, geometry, layout Planting Palette – Species selection and layout Materials Palette – Surfaces, structures, textures Summary and Reflection – What you learned and applied Tools & Support You are not required to use advanced design software. Basic tools such as Canva, PowerPoint, or hand-drawn sketches are acceptable. You may seek assistance from: - Free tools: Canva, Floorplanner, SketchUp Free, Planner5D

$25.00 View

[SOLVED] CIVE 3013 Steel and Timber Design

CIVE 3013 Steel and Timber Design STATE DRILL CORE LIBRARY FACILITY DESIGN BRIEF 1.  PROJECT BACKGROUND The South Australian Drill Core Reference Library hosts geological samples recovered from over  130 years of exploration for minerals and energy resources in South Australia. These irreplaceable samples represent valuable direct records of the geological materials retrieved from the depths of the crust, which will continue to be investigated and analyzed by new generations of geologists in industry, research, education and government. The facility consists of three main areas, that vary in use and their design and construction methods; the hylogger, the library and the administration building.  The facility was constructed in 2015 as part of the Tonsley Redevelopment, Clovelly Park. 2.  PROJECT SCOPE The scope of this project is to design and document some of the main structural roof and floor elements for the Administration Building of the State Drill Core Library Facility. The focus will be on the part of the building located between Grids AB and AE, A4 to A20 on Structural Drawings ST-101, ST-102, ST-302, ST-301, and Architectural Drawings A126 and A127. Firstly, determine the design loads on the building (remember to consider the whole building for wind loads) and then design the structural framing members using steel and timber. The structural elements you will be designing are a roof beam, column, lateral bracing system, and connection detail (for bonus marks). The following items are not in the scope of this project: •   Any concrete elements including the design of the first-floor slab •   Earthquake design •   Fire resistance design •   Ground floor slab or footing design 3.  DESIGN CONSTRUCTION - LIBRARY a)  Ground exterior walls: Lightweight stud wall or glazing with aluminium composite façade panels supported on steel framed fascia trusses. Refer to Architectural drawing A200 for details. b)  Roof: Metal sheeting with insulation under, on steel purlins and rafters as shown on the architectural drawings A300, A301, and section detail drawings (A620, A621, A622 and A623). c)   The ground floor is an industrial raft slab on the ground with pad footings. 4.  PROJECT TEAM For each design, you are required to work in a project team of three (3). Each team will be more effective in their effort to address the project scope in the time duration allowed than an individual. Let your tutor know your preferred group by the end of Week 2. All team members MUST be in the same timetabled design project session. 5.  PROJECT ASSESSMENT This total design project is worth 35 % of the course assessment separated into 3 submissions. Stage 1            Design Loads Stage 2            Steel Member Design Stage 3            Timber Member Design The detail of the elements required to be designed by your team, the allocated marks and suggested completion dates are documented in the tables on the last pages of this brief. 6.  PEER ASSESSMENT At the end of each submission stage of the design project, you are required to assess yourself and    your     group    members     using    the     online     peer    assessment     tool     SPARK. (https://unisa.sparkplus.com.au/login.php)   You  are required to  answer each of the criteria questions and provide written feedback of at least 10 words for EACH group member. The RPF factor from SPARK (along with tutor and lecturer observations) will be used to modify your group’s mark to give you an individual mark for each stage of the design project. 7.  DESIGN METHOD and SOFTWARE USE The calculations should be typed. The calculations MUST be neat, tidy, legible, easy to follow and logically laid out.  You may use spreadsheets to make your calculations clear for repetitive iterations as long as the first iteration including all the formula and workings are typed. You are to use the structural analysis software Spacegass to analyze the roof wind truss ONLY to obtain the design actions including the bending moments, shear forces, and axial loads for the roof wind truss/bracing members.  You must provide detailed calculations for how you arrived at the input data using a cover sheet for any computer output.  The cover sheet will detail all the input you have entered into the software including: -     Dimensional information between grid lines and other setout information -     Dead,  live,  and wind load cases are labeled. Load locations,  directions and values identified -     Labeled member sizes and connection types i.e. pinned, roller, fixed, etc. Spacegass is installed in the computer pools in Buildings F, N, and P. Also, a Spacegass student version can be installed for free on your own laptop/home IBM compatible PC, downloaded from the Spacegass website using this link:  http://www.spacegass.com/student You will need to enter your student details (name and email) to confirm that you are a student. Please put Khoi Nguyen as the lecturer and email address is [email protected] 8.  ADDITIONAL DESIGN INFORMATION Dead Loads For the roof dead load, you will need to determine the self-weight of the sheeting, purlins, insulation, and ceiling.  For the mechanical and electrical services within the ceiling space, allow an additional dead load of 0.5 kPa. This is in addition to the dead load for the self-weight that you have calculated. Tip: Apply the services dead load for the downward case only. Do not add the services dead load in combination with the upward wind load. The exact location of services is unknown; therefore we assume the most conservative loading conditions for both the downward and upward loads. For instance, the maximum dead load for downwards and minimum dead load are added to the upward loads from the wind combination. Wind Loads The building is located adjacent to South Road, Clovelly Park, South Australia.  The facility is located on the side of a hill so use the website NatureMaps to determine if topographic multipliers will affect the wind speed. The wind load will vary according to the geometry of the building. Roof Beams The  roof  sheeting   will  be   fixed  to  purlins  running   along  the  length  of  the  building (approximately north-south for the particular section we are designing).  They will be bolted to cleats (small plates) that are welded to the top flange of the roof beams hence providing lateral restraint to the top flange of these beams. Roof beams can be Universal Beam (UB) or Welded Beam (WB) sections bending about their major X axis. Long-span roof beams may be pre- cambered upwards to balance downward deflection. This should be considered in your design. Columns Structural columns are located at each end of the roof beams.  Columns can be constructed from  rectangular  hollow  sections  (RHS),  square  hollow  sections  (SHS),  or  Universal Beam/Column sections (UB/UC), or Welded Beam/Column sections (WB/WC).  The walls will provide buckling restraint under axial loads for any columns. 9.  RESOURCES and REFERENCES All these resources are available through the course homepage 1.   Australian Standard AS/NZS 1170 Structural Design Actions a.   AS/NZS 1170.0:2002 Part 0: General Principles b.   AS/NZS 1170.1:2002 Part 1: Permanent, imposed and other actions c.   AS/NZS 1170.2:2011 Part 2: Wind actions 2.   Australian Standard AS 4100: 1998 (R2016)  Steel Structures 3.   Australian Standard AS 1720.1:2010 Timber Structures Part 1: Design Method 4.   Structural Drawings 5.   Architectural Drawings 6.  NatureMaps Website 7.   Roof Sheeting Table, purlin and CHS / SHS information Sheets 8.   Hot Rolled and Structural Steel Products - Onesteel 9.   Timber: Standard Sizes Chart Other useful references: Gorenc, B., Tinyou, R. and Syam, A., Steel Designers’ Handbook, 8th  edition, UNSW Press, 2012

$25.00 View

[SOLVED] COMP2120 Computer Organization Assignment 2Python

Department of Computer Science COMP2120 Computer Organization Assignment 2 Due Date: March 11, 11pm Consider  a  simple  32-bit  processor  with  the  data  path  as  shown  in fig.  1. The processor has 32 general purpose registers.  There are 3 buses, S1-bus, S2-bus and D-bus connecting the registers for data movement.  The register files has 2 read ports and 1 write port (i.e. it can perform 2 read and 1 write at the same time). Figure 1: A simplified CPU The processor has instructions which specifies 3 operands explicitly (namely, 2 source and 1 destination operands).  The leftmost byte of the instruction represents the oper- ation to be performed, such as ADD, SUB etc.  For arithmetic and logic operations, the operands must be in registers.  Hence the 3 bytes will give the addresses of operands in the register file. There will be a direct path connecting these 3 bytes in the IR (Instruc- tion Register) to the address of the register file, so that when you perform read/write on register file, the register specified in these bytes will be accessed. If the instruction is LOAD or  STORE to load a word from memory to register,  and vice versa, the source operand (LOAD) or destination operand (STORE) refer to a memory address. How to find this address is specified by Addressing Mode. In this machine, for simiplicity, the memory operand byte (source/destination) will always be 1111  1111 (or in hex 0xff), which means that the actual 32-bit memory address will be given in the word following the instruction (see example program below). The  ALU  has  the  following  operations:   ADD,  SUB,  bitwise  AND,  OR,  and  NOT.  For operations  with  only  one  operand  (e.g.   NOT),  source  operand  1  is  used,  and  source operand 2 is empty. Finally, there is a branch instruction, which performs conditional or unconditional branch as specified in the cc field of the instruction.  The branch address is specified in the word following the instruction, the same as in LOAD/STORE instruction. Instruction Format Arithmetic/Logic Instruction The instruction format of the machine (except LOAD, STORE and BRANCH): The instructions can be categorized into the following types: ● Arithmetic Operations ADD       R1,  R2,  R3   ;  R3   Store instruction: where the addressing mode (how to find the target address) is specified in byte 2 of the instruction. In this machine, only one addressing mode is used, where the target address is given by the word following the LOAD or STORE instruction (Absolute Addressing).  This is specified as 11111111 in that byte. Control Instruction Control flow is by using BRANCH instruction.  There are two types of branch instruction — conditional and unconditional Branch. Branch Instruction Format: cc Conditional branch is based on the result of previous ALU operation, which is store in a flag register.  In this machine, we only use a ZERO flag, which will be set to 1 if the ALU operation results in 0, and set to 0 otherwise.  The target address is specified in the same way as in memory operation.  Similarly, the byte of Addressing Mode is set to 11111111. The condition code is specified as 00000000 BR 00000001 BZ 00000010 BNZ Halt Instruction The HLT instruction is used to stop the program. The other 3 bytes are all 0. Opcodes ADD 00000000 OR 00000100 Bcc 00001000 SUB 00000001 MOV 00000101 HLT 00001001 NOT 00000010 LD 00000110 AND 00000011 ST 00000111 Part I: Example Program The simulator program is given in sim. py.  The code for the SUB and ST instruction is missing.  Study the simulator code carefully, and complete the missing part. Running the simulator program: [python3]  sim. py  [-d] prog If -d option is specified, the program will print out debug information. The simulator obtains input program from the file prog. Test you simulator with the following simple program: LD P0,R4 0000: 0600ff04 0000003c LD P1,R1 0008: 0600ff01 00000040 MOV R1,R2 0010: 05010002 LD P2,R3 0014: 0600ff03 00000044 L:      ADD R4,R1,R4 001C:    00040104 ADD R1,R2,R1 0020: 00010201 SUB R3,R1,R5 0024: 01030105 BNZ L 0028: 0802ff00 0000001c ST R4,P 0030: 0704ff00 00000048 HLT 0038: 09000000 P0: . WORD 0 003C:    00000000 P1: . WORD 1 0040: 00000001 P2: . WORD P:        . WORD A 0044: 0000000a 0048: 00000000 What does this program do? Part II: Hand Assemble Translate the following program into hexadecimal form, and put it in a file named prog2 with the same format as the file prog. Run the simulator by [python3]  sim. py  [-d] prog2 Write down the final result stored in P. What does the program do? LD P0,  R4 LD P1,  R1 LD P2,  R2 LD P3,  R3 L: ADD R4,  R2, R4 SUB R3,  R1, R3 BNZ L ST R4,  P HLT P0: . WORD 0 P1: . WORD 1 P2: . WORD 5 P3: . WORD 4 P: . WORD A working simulator (executable pyc file only, without source code) is given to you, so that you can complete this part using this program, if your simulator in Part I is not working.

$25.00 View

[SOLVED] IFY Biology 2024-25

Assessment Brief Guidance 2024-25 Module: IFY Biology Assessment Type: Illustrative Portfolio Submission instructions: The portfolio assessment brief should be uploaded via the Turnitin submission link on VLE module page. Further information is available on the VLE assessment page. Late submissions will be penalised. (See Assessment Regulations on the VLEhere). If you  believe that you have any mitigating circumstances affecting your ability to submit your work by the deadline, please complete a mitigating circumstances form. Feedback information: Feedback will be available approximately 10 working days after submission (This may be extended to allow time for public holidays). The expected release date will be posted on the VLE in the My Assessment folder area. Assessment task, weighting and wordcount: Illustrative portfolios: Must contain any 3 human physiological systems such as Muscular, Cardiovascular, Respiratory, Endocrine, Digestive, Nervous and Urinary systems, 1950 words (Each system is 650 words, does not include reference list or figures legends) +/- 10% 40% weighting Unit Learning Outcomes Assessed: On successful completion of the module, students will be able to … LO5) Describe the organization, anatomical features, and physiological function of the following body systems (digestive, nervous, neuromuscular, respiratory, cardiovascular, excretory, immune, reproductive, and endocrine) LO6) Summarise knowledge of material and an understanding of a range of biological concepts and principles at a variety of levels (from sub-cellular to whole organisms) LO7) Communicate biological information and principles in an appropriate manner, employing skills of written, oral, and visual communication, numerical analysis, and information technology. Assessment details and instructions: This is your final summative assessment for this module, preparing a 1950-word portfolio (does not include reference list or figures legends). The portfolio must contain an introduction to the systems, the anatomy and physiology of the system with clear explanations and illustrations. The students must use reliable sources for the contents and figures used. You are allowed to use self-illustrated figures in your portfolio. For each system you must include at least 3 references (this can include the core textbooks that are provided below). During this process you will practice key academic skills including, searching for, and reading academic sources and academic writing as well as developing your digital literacy. You will follow the instructions to focus on any of the 3 systems which are provided to you and work independently. You will apply all the knowledge and skills you will be taught in class to generate your individual work. The portfolio is an individual assessment. You will be required to submit a draft (at least 1 system) of the portfolio in week 23, on which you will receive feedback. Your final submission is due in Assessment period. General formatting guidance: • Your portfolio will have a page title informing the reader what the portfolio is about. • Your portfolio content will be a mixture of texts, images, and tables, the size requirement of portfolio will be A3. • Your student ID must be included in the footer. Student name must not be included anywhere in the portfolio. • You will have 3 systems – each is 650 (+/- 10%) words. • You are required doing in text citations • A reference list is required correctly formatted in Harvard style. https://library.leeds.ac.uk/referencing-examples/9/leeds-harvard • Text font should be Arial, 1 spaced and 11 pt. Assessment Support: Each week the assessment workshops will take you through how to do a portfolio, step by step. You can find resources from the assessment workshops in the “Assessment Workshop” folder in the “My Assessments” tab on the module page of the VLE. Please ensure that you attend all the assessment workshops, and complete all activities provided by your tutor, and take notes from lectures. You will have the opportunity to submit a draft portfolio which will include any 1 of the system that you will be submitting for the final portfolio. The draft must be a completed work following all the formats and your tutor will be providing you with feedback within 10 working days. You will find your AES materials invaluable in supporting you in this module. Plagiarism and Academic Integrity: The work submitted must be your own. Ensure that you have completed and signed a cover sheet declaring that the work is yours. All submissions are checked for originality by Turnitin. Any suspected of academic misconduct will lead to referral to the Academic Misconduct Panel.

$25.00 View

[SOLVED] COMP2121 Discrete Mathematics 2024

DEPARTMENT  OF  COMPUTER  SCIENCE COMP2121 Discrete Mathematics Date:May    8,2024 1 Logic and Proofs(19 points) (a)(5  pt)Assume that the following premises are true: It is not sunny this morning and the temperature is lower than yesterday. Agatha goes on a day trip only if it is sunny in the morning. If Agatha does not go on a day trip then she does some gardening that day. If Agatha is not home for dinner then she has not been gardening that day. Show that the above premises lead to the conclusion that Agatha will be  home for dinner that day. (b)(5 pt)A formula where the-operator is only applied to atomic propositions and using connec- tives ^,V is said to be  in negation normal  form.Simplify the following formula to negation normal form.:→Vx[Ny[(x

$25.00 View

[SOLVED] COMP2120 Computer Organization Assignment 1

COMP2120 Computer Organization Assignment 1 Due date Feb 25, 11:00 PM Problem 1 Write down the logic expression P = f(A, B, C) corresponding to the following truth table (simplification of logical expression is not required): Problem 2 Consider a 16-bit 2’s complement representation (a). What is the largest (most positive) value and the smallest (most negative) value in this representation scheme? (b). Write down the bit-pattern repre- senting 18, -18, 25, and -25, respectively. (c). What are the value of above bit pattern if they are treated as unsigned numbers? (d). Add the bit patterns together for the following: (1). 18 + 25 (2). 18 +(-25) (3). (-18)+25 (4). (-18)+ (-25) Problem 3 Prove that the multiplication of an n-bit binary number A and an m-bit binary number B gives a product A × B of no more than n + m bits. Problem 4 Verify the validity of the multiplication of integers (2’s complement) procedure in the lecture note. (Give the proof) Problem 5 Any floating-point representation used in a computer can represent only certain real numbers exactly; all others must be approximated. If A ′ is the stored value approximating the real value A, then the relative error, r, is expressed as Represent the decimal quantity +0.4 in the following floating-point format: base = 2; exponent: biased, 4 bits; significand, 7 bits. What is the relative error? Problem 6 Consider a 40-bit floating point representation with a sign bit S, an exponent E (biased, 11 bits), and a significand f (28 bits). The value is Here E = 11 . . . 1 and 00 . . . 0 don’t have special meanings. (a). Write down the largest positive number that can be represented. (b). Write down the smallest positive number other than zero that can be represented. (c). Write down the bit pattern representing the value 15.3125. (d). Write down the value represented by the bit pattern c06f800000 (hex). (e). If we assign 16 bits and 23 bits for exponent E and significand f, respectively. What is the largest positive number that can be represented ? Discuss what is the relation between range and precision in floating point number representation?

$25.00 View

[SOLVED] SSEES0042 Economics of the Family 2023/24

SSEES0042 Economics of the Family Main Exam Period 2023/24 Essay questions (25 points) Use the concepts studied in class and during the lectures to answer the following questions. Provide structured arguments that show the thinking process you have gone through. Answers are expected to be no more than 200 words. Each question is worth 5 points. 1.  Is there any significant difference in the propensity to use online dating apps among the heterosexual and LGBTQ+ communities?  Explain your answer using the concept of intensive and extensive search costs. 2.  This figure shows statistics on living arrangements over time in the United States. Describe the evolution of one-person households vs married couples. What does this figure suggest about the evolution of gains from marriage? Cite two factors that could help explain this evolution.  3.  In many cases people who have the same profession end up together. Explain some advantages and disadvantages of this match, using the concepts discussed in the class and appropriate economic vocabulary. 4. According to folk knowledge on heterosexual relationships, (i) men tend to prefer younger partner, and (ii) people date within their “leagues” (i.e. based on perceived attractiveness). Does research support the existence of these two patterns? 5.  Becker (1974) was the first economist to make theoretical predictions about assortative mating in heterosexual couples. Jepsen and Jepsen (2002) tested his prediction and extended the test to homosexual couples. Explain Becker’s predictions and Jepsen and Jepsen’s results. Exercise 1 (7.5 points) Each question is worth 2.5 points. 1.  In a heterosexual and monogamous marriage market, men and women seek to match. In the matrix below, the first number gives you men’s ranking of women, the second the women’s ranking of men. Solve for the equilibrium using the Gale-Shapley algorithm,  when men propose.   Anna Betty Christina Dana Eva Frank 4, 5 2, 3 1, 3 3, 5 5, 4 George 5, 4 4, 2 3, 4 2, 1 1, 2 Harry 1, 3 3, 1 5, 5 4, 2 2, 1 Ian 1, 2 5, 5 4, 1 3, 3 2, 3 James 5, 1 2, 4 4, 2 3, 4 1, 5 2.  Solve the same matching problem – but this time with the women proposing. Find the equilibrium when: (i) Anna proposes first, then Betty, Christina, Dana and Eva; (ii) Eva proposes first, then Dana, Christina, Betty and Anna; (iii) Anna proposes first, then Eva, Betty, Dana and Christina. 3.  Is there such a thing as a first-mover advantage in this market? Would you expect a first-mover advantage to happen on a matching market where 5 students and 5 London universities are matched according to the Gale-Shapley algorithm? Why yes or why not? Exercise 2 (7.5 points) Each question is worth 2.5 points. In 2000, a country had a population of 8.07 million. By 2020, the population increased to 8.44 million. Moreover, for 2000 and 2020, the number of women by age and the number of births to women of a given   age is given in the table below (e.g. in 2000, there were 9782 births to the 77880 women aged 25). 1.  Calculate the Crude Birth Rate in 2000 and 2020. 2.  Calculate the Total Fertility Rate in 2000 and 2020. 3.  Why are the two measures not equal when the two rates are supposed to measure the same phenomenon - fertility?

$25.00 View

[SOLVED] COS70008 - Technology Innovation

Innovation Concept COS70008 - Technology Innovation Research and Project Date: 14 April 2025 Innovation Concept Report Executive Summary This paper proposes an intelligent web-based security system that leverages hybrid machine learning to identify and assess cyber threats. The system was created alongside Swinburne University, DFAT, and the Internet of Things Training Academy using behavior-based and data-driven analysis. It aims to fix standard detection methods. Its method is more accurate and adaptive since it uses LSTM to analyze sequential patterns and Random Forest to classify structured data. The system manages real and created datasets to identify known and undiscovered hazards. An interactive online interface lets users download data, analyze projections, and visually monitor hazard indicators. One access level is for system administrators who have full configuration control, while the other is for regular users who focus on analysis and reports. Role-based authentication, JWT-secured access, input validation, and data encryption are crucial. Together, these components ensure safe and compliant data management. To promote transparency and accountability, the system anonymizes sensitive inputs and monitors user actions. The platform. was built to change using cutting-edge technologies and modular architecture. It adapts to new cybersecurity threats, grows across cloud environments, and integrates with other services. This research-backed method can promote danger awareness and resilience in academic and operational settings. Part A Project Overview Demand for smart security systems that can proactively identify and react to harmful actions is rising as cyber threats become more complex and influential. Especially when it comes to examining sophisticated threats aimed at cyber-physical systems (CPS), conventional detection technologies can fall short. Dr. Siva Chandrasekaran heads a joint effort started by the IoT Training Academy, DFAT, and Swinburne University to meet this difficulty. The aim is to create and run a web-based system driven by hybrid machine learning algorithms able to identify, classify, and forecast cyber-attacks in real time. The system integrates two complementing models: Long Short-Term Memory (LSTM) networks, which are appropriate for spotting anomalies in sequences across time, and Random Forest, renowned for its efficacy in structured data processing. These models taken together help to more fully identify harmful conduct across many assault forms. The system's capacity to examine behavior. in CPS settings where any abnormality in device or network activity could indicate a possible threat is a key feature. The technology can provide early alarms and assist quick mitigation efforts by processing live data inputs. Using tools like Flask, React.js, Docker, and MongoDB, the application will be designed with scalability and adaptability in mind. With a simple, safe interface, administrators will control models and system operations while regular users may conduct scans and see results. User role distinction will be supported. Client Requirements Under the direction of Dr. Siva Chandrasekaran, the IoT Training Academy, the Department of Foreign Affairs and Trade (DFAT), and Swinburne University work together to launch the initiative. Using a hybrid machine learning technique, the client's main objective is to build a web-based system able to identify and examine several kinds of harmful cyber behavior. This method is also meant to enable predictive behavioral analysis of cyber-physical systems (CPS) to assist in future threat prevention. The following essential criteria were found to be based on the client's brief, project goals, and the more general consequences of developing a successful security solution, thus fulfilling this vision. 1. Finding and Using Appropriate Datasets: a. Finding and assessing appropriate datasets that can assist malware identification and CPS behaviour analysis is absolutely necessary. The customer anticipates the system to manage real-world or simulated data from trustworthy, publicly available sources. These datasets should include many kinds of cyber-attacks like denial-of-service, phishing, ransomware, and botnets. b. To enable seamless integration into machine learning pipelines, the data should be appropriately prepared and cleansed. Ensuring ethical management of data— any personally identifiable information (PII) should be anonymized or removed—demands attention. This guarantees the system development stays in line with ethical research procedures and data governance ideas. 2. Building Machine Learning Models for Threat Detection: • The development of several machine learning models able to detect and categorize various kinds of harmful attacks is another crucial need. The customer underlines the need of employing a hybrid approach—such as mixing models like Random Forest and LSTM—to enhance detection reliability and adaptability. • Relevant measures—accuracy, precision, recall, F1-score—should guide training and assessment of these models, which should also be tested on known attack types as well as undiscovered patterns. The system should allow multi-class classification and offer obvious, understandable outcomes to help decision-making for technical and non-technical users. 3. Study of Cyber-Physical System Behavior a. Apart from finding malware, the customer wishes the system to be able to track and forecast cyber-physical system activity. This means looking at consecutive events and sensor or protocol-level data to find patterns that could point to unusual or harmful behavior. b. Models like LSTM (Long Short-Term Memory) are preferred for this work since they can learn from time-series data. The system should be able to forecast trends in system behavior. and offer alerts or insights upon detection of anomalies. For real-time applications where early identification can avert significant damage, these predictive characteristics are absolutely vital. 4. Web-Based Application for Real-Time Analysis: a. A responsive and safe web-based platform. will supply the whole detection and prediction engine. This system should provide interfaces for two user groups: administrators and general users. While common users will engage with features including file uploads, scan findings, and real-time threat dashboards, administrators will control system settings, track alarms, and assess model performance. b. The program has to enable safe authentication using session tokens or JWT and apply access control to safeguard sensitive functionality. The UI should be mobile-compatible, user-friendly, and uncluttered. Understanding system performance and identified dangers will depend on visual components like as graphs, charts, and real-time warnings. 5. Ethical Compliance, Privacy, and Security Issues: a. Though not usually expressly stated, the client anticipates the platform. to follow standard practices for security and data protection. These covers adopting safe storage techniques, documenting actions for audit reasons, ensuring appropriate user role segregation, and applying encrypted communications. b. The client also anticipates that the system would follow ethical standards since the project deals with possibly sensitive or mimicked real-world data, hence guaranteeing legal and safe processing of data without endangering people or organizations. 6. Future Enhancements Scalability and Flexibility: a. The client sees this system as a foundation for eventual large-scale implementation or further investigation. It has to be structured, thus, to allow future upgrades such integration of more sophisticated machine learning models, inclusion of external APIs, or cloud platform. deployment including AWS. b. Technologies like as Docker for containerization, Flask for backend functionality, and modular frontend development with tools like React or Tailwind CSS are recommended to remain flexible, simplify updates, and guarantee compatibility with various environments. 7. Research Documentation and Alignment: a. At last, the client wants a methodical approach given the project is in an academic and research-oriented environment. Academic citations and tests should support all technological choices, including model selection and performance assessment. So it may be reused or enhanced in future work, the completed system must be well documented containing installation instructions, system architectural diagrams, and user manuals. Part B Preliminary Design Design Concept Ensuring performance, security, and scalability, the URL-Based Malware Detection System seeks to offer a smooth platform. for spotting malware across several URLs. The design gives a user-friendly experience top priority while preserving technical strength and adaptability for future development. Following best practices in development, it allows effective teamwork and maintainability. A. Repository Structure: The repository will be set up to guarantee obvious separation between the frontend and backend, hence supporting modularity and simple navigation. This company enables teamwork by letting various team members work on separate parts free of interference. Changes will be tracked using Git version control, hence guaranteeing seamless parallel development. B. Coding Standards: The project will use coding standards for Python (Flask backend) and JavaScript. (React.js frontend). Tools such as PEP 8 for Python and ESLint for JavaScript. will guarantee that the code is consistent, clear, and simple to maintain. These guidelines will enable future improvements or debugging to maintain the project simple and scalable. C. Commenting Standard: Consistent commenting techniques will be applied all over the project to enhance readability and cooperation. Comments clarifying the goal and logic will accompany every function or method. Making the code available even to new developers joining the team, this will help future debugging and development. D. Environment Setup: The infrastructure will be set up to facilitate the seamless integration of the frontend (React.js) and backend (Flask). A consistent environment across development, testing, and production will be created using Docker. npm and pip will handle dependencies for the frontend and backend, ensuring all devs work with identical setups to minimize problems. E. Overall Prototype Architecture: Using React.js, the frontend will follow a component-based design guaranteeing modularity and reusability of UI components. Every component, including file upload forms and visualisation charts, will perform. particular functions, hence enabling the system to be scalable and simple to modify. Using a microservice design, the backend will let services like URL analysis, machine learning COS70008 - Technology Innovation Research and Project Group 2 processing, and authentication run separately, hence enabling upgrades or scalability without compromising the whole system. F. Components: Tasks like file uploads and showing malware detection findings will be handled by reusable components making up the frontend. Redux will effectively control state, hence guaranteeing seamless data flow between components. Running machine learning models and processing URL inputs in real-time will be microservices included in the backend. Google Cloud or Amazon S3 will handle file storage; JWT/OAuth will be utilized for safe user authentication. i. Methodology Small, functional components were built, tested, and refined as part of an agile, iterative development process. After establishing fundamental interactions through the creation of user-facing websites, the team proceeded to construct administrative functionality. Development was expedited and visual consistency was guaranteed via a modular codebase with reusable templates. Regular testing of responsiveness and interaction was conducted, and modifications were made in response to user input and usability assessments. In-line documentation of the source made future maintenance simpler. In response to changing requirements, features like a roadmap page were added, emphasizing the project's adaptable, feedback-driven approach. ii. Design Constraints Commercial Constraints: The project has to include only fundamental features under budget and time limitation - oriented on the identification of malware and the administration of users. Compliance Constraints: The system also has to satisfy the criteria in terms of data privacy control so that the personal information is safeguarded. Functional Limitations: To assist in controlling system load and manage handle huge files more quickly, file upload is only permitted where there is a single file to be uploaded in the Admin dashboard. Non-functional Constraints: The system should be able to offer a timely indication of whether the URL is dangerous or not; handling small batches of URL in seconds while bigger ones in a minutes. Ease of use is really important. most current dashboards are created since possible for mere mortal to grasp. Security Limitations: Strict access controls especially ensure the privacy and integrity of data the system has to protect. iii. Specifications The main features of web-based malware detection systems have two dashboards one for Admins and one for Users, each customized to their responsibilities. A hybrid model combining LSTM and CNN aims to deliver correct malware forecasts. Features: • Admin Features: o Login/logout (username/password) o Upload dataset (file upload) o Malware identification o Malware classification (top 5, sorted list) o Behavior/usage prediction o User management (add, delete, update, read) o Notification management (via pop-up message) o View malwares identified in last 7/14/28 days • User Features: o Upload URL o Detect malware (with useful info if detected) o Predictive analysis o Prediction history view o Create account (registered users) o Login/logout (registered users) o Personalized info/pop-up message (registered users) Ensuring both speed and accuracy in predictions, the hybrid model employs CNN for more detailed malware classification and LSTM for probabilistic analysis of URL data. Frontend: • Framework: React.js • UI Library: TailwindCSS • State Management: Redux • Visulization: Chat.js Backend: • Runtime: Flask • Database: MySQL • Authentication: JSON Web Tokens(JWT) • ML Integration: LSTM & CNN (implemented in Python) iv. Vulnerability Analysis Identifying and lowering possible hazards helps to guarantee the system stays steady and safe. Some of the main weaknesses listed below and their solutions are as follows: Validate Input: Users can submit URLs or data with damaging material. Improper system checks on this input could cause code injection among other attacks. All user input has to be carefully vetted before processing to avoid this. Data Protection: User data and prediction results are among the sensitive information that should never go over the network unprotected. The system has to use HTTPS to encrypt all communications and stop illegal access, hence safeguarding this data. Model Prejudice: Inaccurate predictions may result from the machine learning model being trained on an uneven dataset. The model may prefer some results depending on the data it has seen, which explains this. The model should be retrained using a balanced and varied dataset to increase accuracy. Justification of Forecasts: Users should be able to grasp why the algorithm produced a particular forecast. For instance, the CNN model should indicate which elements affected its choice. This increases confidence in the outcomes of the system's malware detection. System Outage: Performance can be greatly affected if the system fails or becomes unavailable during peak use for example, when real-time malware analysis is underway. The system should have failover mechanisms and backup plans to keep it operating effectively even if something goes wrong to manage this. Screen of Prototype: User DashBoard: Admin Dashboard: Design 2 Design Concept This innovative, research-backed tool detects and manages questionable web-based activity. It stresses modular architecture, real-time engagement, and explainable machine learning to increase detection accuracy and system transparency. LSTM analyses behavioural patterns over time and Random Forest classifies structures, balancing accuracy and interpretability. Interactive simulations, real-time monitoring, and role-specific dashboards make it a versatile tool for education, research, and operations for varied users. i. Methodology Guided by the ideas of Design Science Research Methodology (DSRM), this initiative guarantees a systematic, theory-informed, and iterative development approach. It starts with recognizing the need to improve web systems against illegal activities brought on by poor interface validation. The main goal is to create a real-time system that identifies and detects anomalous activities using a hybrid machine learning technique. Built as a functional prototype, the system has an interactive user interface, a strong backend API, and an inference engine for analysis. Simulations are used to examine its efficacy; technical performance criteria and user input help to evaluate it. Detailed papers, user-friendly interfaces, and official presentations help to share the final results, so matching research theory with practical application. ii. Design Constraints The system implementation is created with knowledge of some key limitations. Ethically, all input data is meticulously anonymised to fit institutional ethics policies, hence guaranteeing that no personally identifiable information is saved or handled. Technically speaking, the absence of plenty real-world examples drives the need of simulated and synthetically produced data for testing and development objectives. Legally, the system follows data protection rules by using safe communication methods like TLS and keeping thorough audit logs. It is also designed to operate effectively in low-resource settings, such those offered by academic virtual machines. From a scalability perspective, the design is meant to handle future integration with more sophisticated tools or external services without need significant structural modifications. iii. Specifications The system processes cleaned and organized input data obtained from publically available logs and behavioral traces using a sequence of procedures including labeling, padding, and conversion into vectorized formats appropriate for machine learning models. In the hybrid architecture, feature extraction is customized for each model; the LSTM component uses n gram approaches to capture temporal dynamics via metrics such as request timing gaps, sequence entropy, and tokenized input patterns. The Random Forest model, on the other hand, makes use of structural markers including query composition patterns, atypical length-based behaviors, and frequency distributions of certain parameters. Built with React.js, stylized with Tailwind CSS, the user interface has dynamic Recharts charts for real-time visualisation. A Flask-based API on the backend securely processes requests using JWT-based authentication and rate limitation to avoid abuse. Wrapped in Python for seamless orchestration, the machine learning engine combines Scikit-learn for classification tasks and TensorFlow for sequence modeling. Its adaptable schema design and quick indexing features make MongoDB the data storage choice. Docker containers and GitHub Actions manage continuous integration and deployment, hence guaranteeing compatibility with cloud systems including AWS EC2. Administrators supervising user management, data validation, and model lifespan interact with the system; standard users who can submit input, get categorization results, and monitor system response via a simplified interface. iv. Vulnerability Analysis The system uses smart tools to spot possibly dangerous input behavior. The LSTM model examines timing discrepancies and odd request patterns in circumstances when inputs seek to influence backend queries; the Random Forest model finds strings closely matching database-related syntax. The LSTM warns unanticipated bursts of complicated characters and the Random Forest model finds typical script. indications including tags and event-driven properties for situations involving embedded scripts in form. fields or redirection. The system implements user session controls, uses a two-tiered input filtering technique, and applies IP-based request limiting to improve general defense. Moreover, thorough logging closely controls user rights to guarantee clear and trackable system interactions. Snapshots of Prototype:

$25.00 View

[SOLVED] MG-GY 6303 DIST Operations Management Summer 2025

- Operations Management - Operations Strategy, Process Design, Improvement, Management, Innovation and Growth MG-GY 6303 DIST Summer 2025 Operations Management: Course Overview This course is focused on developing a deeper understanding of the role that operations management plays in determining business strategy and in developing competitive advantage. The primary emphasis of this course will be on how to develop and effectively manage operations in knowledge intensive enterprises. That is, what are the operational design and managerial implications when the emphasis of the operations group is more on knowledge management than on production and facilities management? This takes on even greater importance when one considers the interconnected environment within which most firms operate, where the boundaries of the organization are sometimes both  unclear and continually shifting. Managing the effective integration of technology, people, and operating systems presents critical challenges to business leaders. To achieve competitive advantage, managers must thoroughly understand the complex processes that underlie the development and creation of products and services. At the same time, these underlying processes and systems create distinctive competencies for the organization that require an emphasis on continuous improvement to remain competitive. In this respect, the aim of this course is to develop frameworks and methodologies that will enable managers to develop and refine their ability to make a contribution to their organization’s competitive position. Topics encompass all elements of developing and maintaining an effective operations strategy. More specific objectives of the course include: •    Helping operations managers see the importance of looking at their business as process based. •    Understand the complexities and challenges of customer-centered, process-based management •    Be able to distinguish, operationalize and assess the core value disciplines of product leadership, customer intimacy and operational excellence. •   Translate the understanding of how the customer defines and assesses value and cost into a deeper specific understanding of how the processes of the organization deliver that value •    Be able to develop process maps, value streams and process load charts. Be able to use that skill to define and defend process capacity and lead time improvements •    Be able to create process control charts and calculate the ‘sigma’ of a process. Be able to use that skill to develop recommendations that increase customer satisfaction through better alignment and consistency •    Understand the core tools of Lean/Six Sigma and how to use them to manage and continuously improve operations •    Understand the nature of process innovation and be able to identify and implement innovative opportunities to improve business performance Group assignments focused on 'real-world' experience to develop executive level recommendation on how to implement and sustain process improvement recommendations. Most of your professional career you will either be managing operations or improving them. This course will help you to excel at both. Prerequisites None Instructor: Professor Tom Mazzone is an Industry Professor in Technology Management and Innovation at NYU’s Tandon School of Engineering and is the Academic Director of the Industrial engineering program. He has developed many courses centered on team and leadership development, operations and supply chain management, project delivery, innovation, and strategic change management. Professor Mazzone has had significant international experience in managing large-scale, technology-based transformation programs. His experience is broad and deep and includes working at top-tier consulting firms and Fortune 100 companies. The scope includes leading senior executive vision and strategy sessions, designing and leading business transformation programs, developing enterprise architecture road maps, conducting value stream, process mapping and use case development sessions. Professor Mazzone received his BBA from the University of Notre Dame, his MBA in Strategy, Technology and Innovation from EDHEC  Business School in France and attended a full-time master’s degree  program in International Business and Marketing at the University of Auckland while working for Ernst and Young in New Zealand. He has his CPA certificate from the State of Rhode Island. To see a more detailed description of Professor Mazzone's background please go here Office Hours: By appointment. I am available most days in the morning after 7:00 am EST via Zoom.  I will respond to emails in a timely manner.  Please do not hesitate to contact me if you have any questions or concerns. Please note my email address is [email protected] . My Teaching Assistant is Chetana Sunkugari [email protected] Include Chetana on all emails to ensure a fast response. Course Structure Lecture, class discussions, discussion forum contributions, two quizzes and a series of group presentations culminating in a final presentation summary focusing on a company of the team’s choice. Students will be expected to prepare for class by reading the assigned reading material and reviewing the discussion and group case study questions for that day. There will be 6 discussion forums that students will be expected to   post a contribution and, periodically, comment to fellow classmate's contributions. Students will be assigned to teams and be expected to prepare a series of homework assignments culminating in a final executive summary recommending process improvements using the guidance as set out by the syllabus and the guidance which will be discussed in class. A core component of that final executive summary will be three HW assignments that will be key foundational elements for the final paper. There will be two quizzes as well. The focus being on the ability to apply the material in the 'real world'. Required articles There are no required textbooks . Students will be expected to purchase the course pack assigned for this course and located on the Harvard Business Review website. As well, they will be expected to refer to instructor supplied articles where indicated. .    Operations Management Reading: Process Analysis – HBR* .   Operations Management Reading: Managing Quality with Process Control – HBR* .    Customer Intimacy and other Value Disciplines – HBR* .   The Next Revolution in Productivity – HBR* .   Gaining Advantage over Competitors – McKinsey Quarterly** .    Delivering Value to Customers – McKinsey Quarterly** .   Tools for Inventing Organizations: Toward a handbook of organizational processes - MIT Center for Coordination Science** .   A Revolution in Interactions – McKinsey Quarterly** .   The Next Revolution in Interactions – McKinsey Quarterly** .   Competitive Advantage from Better Interactions – McKinsey Quarterly** Optional Readings .    What is a Business Model – HBR** .   The Adaptable Corporation – McKinsey Quarterly** Source of reading *.     all will be posted in a HBR course pack **    posted by professor to NYU Classes *** other topical articles may be assigned Books of Interest (not required) . The Deming Dimension - Outstanding overview of the philosophy and teachings of W. Edward Deming, the person, most responsible, for helping the Japanese achieve world dominance in operations . The Machine that Changed the World - Excellent introduction to the Toyota Production System with a very good historical perspective on the development of the discipline of operations management . The Goal, It’s Not Luck, The Race, The Choice, The Haystack Syndrome – Selection of books from the author Eliyahu Goldratt the developer of the Theory of Constraints and The Logical Thinking Processes . Toyota Production System: Beyond Large-scale Production – Written by Taiichi Ohno the father of the Toyota Production system . Learning to See: Value Stream Mapping to Add Value and Eliminate MUDA  by John Shook and Mike Rother, Lean Enterprise Institute This is the standard reference guide to value stream mapping and provides a very practical approach to identifying, defining and developing process improvement opportunities.

$25.00 View

[SOLVED] ARBE3309 Measurement 2 Web

ARBE3309 – Measurement 2 ASSESSMENT 2 – PROJECT SCENARIO Following your successful completion of the rushed Ground Works project you completed for Mr. Santos Clawes, your Managing Director, Dr Andrew Quentin Stihlwasser, has informed you that Mr. Clawes was happy with the project and wishes to engage your firm again for another project. As with the previous job, this is urgent and Mr. Clawes needs some specific items measured for a project that is currently underway. A building contract has been signed and they are about to break ground. The measure you have been asked to prepare will be used by the builder to price a variation. The items include some masonry, roofing and finishes trades. Following a meeting with your MD, Mr. Clawes has approved the proposal and provided you with the email below outlining what was agreed. From: Santos Clawes Sent: Monday, 10 March 2025 1:19 PM To: Andrew Quentin-Smith Subject: A. Primary School – Garra Road, Newcastle (URGENT) Good afternoon Andrew, Following on from this mornings meeting, I am keen for you to get your company up and running on our latest project. As you know, the builder is now on site, so time is of the essence. As discussed and agreed I will need the following:- Purpose I need the a detailed BOQ measured for some specific items that we are proposing to amend in the contract via a variation. The builder will need the BOQ measured in accordance with the ANZSMM 2022 and they have requested the work be completed in either Buildsoft Cubit of ITWO Cost X so they have the opportunity to load the files  into their system. Information While the information may be somewhat limited (particularly as some of the requested items are not shown on the current set of drawings), it will be sufficient for our current requirements. As such I have attached the following for your information and use:- 1)   Architectural drawing package; 2)   Civil drawing package; 3)   Structural drawing package. Please note the final specification document is not available at this time, so please make allowances/assumptions as required for the specification of any items that are not specifically noted. If there is any additional information required/you have any queries, I would request that you utilise our preferred document management system “Canvas” and include your request within the nominated ‘Request for Information’ (RFI) section. Required Items In relation to the items required to be measured, I need the following: Masonry •    External face brickwork at ground floor level •    Brick sills to the ground floor windows in masonry (We would like to consider adding these) •    Internal common brickwork at lower ground floor level •    190 thick reinforced concrete blockwork retaining walls •    Reinforcement and core filling to last •    Raking cutting to external face brick walls •    All sundry works associated with the above masonry items. Roofing •    All types of roof sheeting •    Area of FC wall sheeting •    Barge and ridge capping (as applicable) • Flashings wall/roof and roof/roof (as applicable) •    Eaves gutters, box gutters and ancillaries (as applicable) •    All sundry works associated with the above roofing items Finishes •    The area of rooms L.01, L.02 and L.06 are in consideration for an alternate set plasterboard ceiling using furring channels fixed to concrete soffit and the length of the perimeter for a folded metal shadowline trim equal to Rondo P50. •    An alternative ceramic tile splashback (750mm high) above the practical activity benches in G.13 and G.19. •    An alternative ceramic tile skirting 450 high to rooms G.10 and G16 •    Carpet and division strips where shown on the drawings (excluding the proposed changes to L.01 and L.06) •    An alternate Vinyl floor finish to room sL.01, L.05 and L.06 •    Granolithic topping to Stair 1 treads and risers, G.12 to the top of Stair 2, G.20 and the ramp. Deliverables In relation to the deliverables, I will require the following: 1)   A completed BOQ for the requested items completed in accordance with the ANZSMM 2022. 2)   A copy of the .cbx (Cubit) or .exf (Cost X) file Deadline As you are aware, time is money in construction and having a builder onsite is costly. As such I need this work completed in a timely manner, with the builder stating they will not be able to hold off any later than Monday 19th  May 2025. As such, I will require your completed BOQ by 5pm Sunday 18th May 2025 in order to review and issue to the builder on time. Any delays past this time will cause significant costs which are not acceptable.

$25.00 View

[SOLVED] Group Course Project 2025 Web

Group Course Project 2025 Deadline: 23:59, June 5th   2025 Attention:  Students can try to understand the project requirements first, and then work out a workflow of the program, including the main functions, sub-functions. The project needs knowledge from the of reading file which can be found in your textbook and lecture notes. Requirements 1.   In this project, please use A, B, C, … , Sas the matrix names in the program. A well-structured program should include some sub-functions for special purpose, for example: Reshape, Multiply, Add, Activate and SoftMax. (If your program has only one main function, you might  lose some marks for non-functional requirements, but this will not affect marks for functional requirements.) 2.   If a user inputs one image file name (e.g., p1.pgm), then output the file name and the digit after the recognition (e.g., p1.pgm: 9) 3.   If a user inputs more than one image  file names (e.g., p1.pgm, p2.pgm), the program should output each file name and its corresponding digit in the list (e.g., p1.pgm: 5, p2.pgm: 2). 4.   After output is given, there should be a prompt, asking the user if he wants to continue. If he chooses to continue, input Y, otherwise, input N. If the user chooses Y, ask the user to input image file name to repeat the previous work. Sample I/O:  5.   Take the screenshot of the results of each number recognition, and put them in a pdf file, in the same the pdf file should also include the names of the group members, each group only need to submit ONE project! 6.   Use Git and Gitee to collaborate on the project with your team members (

$25.00 View

[SOLVED] STAT3600 LINEAR STATISTICAL ANALYSIS 2022

DEPARTMENT OF STATISTICS AND ACTUARIAL SCIENCE STAT3600 LINEAR STATISTICAL ANALYSIS May 23, 2022 1.     You are given the  following matrices computed  for a regression analysis Y = β0 + β1X1 + β2X2 + ε having normal error with zero mean and variance σ2. The elements of the matrices are properly ordered according to the regression function given above. The total sum of squares is equal to SST = 261.96 (rounded to 2 decimal  places). (a) Find the least squares estimates of β = (β0, β 1, β2)T  [Give 4 significant figures].    [3 marks] (b) An unbiased estimate of σ2 is given as  ^(σ)2 = SSE/(n-p-1), where SSE is the error sum of squares. Rewrite SSE using the matrices YTY, XTY and  β(̂), and hence compute  ^(σ)2  [Give 4 significant figures].            [4 marks] (c) Construct  an ANOVA table  for the regression analysis.  Test whether there is  a regression between the dependent and the independent variables at the 5% level of significance.         [4 marks] If you cannot obtain  ^(σ)2  in (b), you may take  ^(σ)2  =  1.238 as an estimate of σ2  for the following questions. (d) Test at the 5% level of significance, (i)     β 1 = 10 or not. (ii)     β2 = 1 or not.                                                                                         [6 marks] (e) Test at the 5% level of significance, for the hypothesis, H0  : β1 = 10    and    β2 = 1      versus      H1  : H0            is not true, [6 marks]            (f)  Obtain  the joint  Bonferroni  interval  estimates  for β 1   and β2,  using  a  95% joint confidence coefficient. (Some values of tα,df are provided in the table shown below.)             [4 marks]            (g) Compare and comment on the results you obtained in (d) – (f).                    [7 marks] The values of tα,dfare given in the following table. [Total: 34 marks] 2.      A psychologist conducted an experiment to study the effects of the type of training program (Factor A,  1: structured, 2: partially structured, 3: unstructured) and gender (Factor B,  1:  Male,  2:  Female)  of  12 ten-year-old  children with mental retardation syndrome on the time (Y) for completing a specific task. The data (in minutes) are given in the following table. Consider a two-way classification model with interaction. (a) Sketch the line plot of estimated treatment means against gender. (i.e. x-axis is gender). Does it appear that any factor effects are present? Explain your answer.    [6 marks] (b) Part of the ANOVA table for fitting the two-way classification model is given below. Fill in the blanks marked by "?" in theANOVA table.                                  [4 marks] (c) Test at the 5% level of significance whether or not there is a relationship between Y and the two factors.                    [5 marks] (d) Test at the 5% level of significance for the interaction effects between the two factors, irrespective of the findings obtained in (c).                   [2 marks] (e) Test whether or not factor A main effects are present, irrespective of the findings obtained in (c) and (d). Do something similar for factor B. In each case, use the 5% level of significance.          [4 marks] (f)  Obtain a 95% prediction interval of the time for completing the specific task for a ten-year-old female child taking a structured training program.                   [5 marks] (g) Construct a 95% prediction interval for the difference in the time for completing the specific task between two ten-year-old  children taking the unstructured training program, one being a male, while the other being a female. Is it reasonable to construct such an interval? Why or why not?                                                [7 marks] [Total: 33 marks]

$25.00 View

[SOLVED] COMP2017 9017 Systems Programming Assignment 2

COMP2017 9017 Systems Programming Assignment 2 Due: 23:59 20 May 2025 1    Assignment 2 - [ZOIT Docs] - 10% We strongly recommend reading this entire document at least twice.  You are encouraged to ask questions on Ed after you have first searched, and checked for updates ofthis document. If the question has not been asked before, make sure your question post is of type "Question" and is under "Assignment" category → "P2" . Please follow the staff directions for using the question template. Note, your Git commit messages matter.  Make sure you enter informative information into your commit messages as per the accompanying Edstem slide.  Also, use  .gitignore to avoid committing garbage files. There is a guide to both on the accompanying Ed slide titled Git Usage Guideline, with a required formatting guide you must follow. It is important that you continually back up your assignment files onto your own machine, flash drives, external hard drives and cloud storage providers (as private).  You are encouraged to submit your assignment regularly while you are in the process of completing it. Full reproduction steps (seed, description of what you tried) MUST be given if you are enquir- ing about a test failure or if you believe there is a bug in the marking script. 2    Introduction We are developing a new service aimed at revolutionising document editing, with the ambitious goal of outperforming competitors such as Word, Notion and Google Docs.  To achieve this, we must implement a server-client architecture where a central server hosts the document and coordinates all client interactions.  Multiple authorised clients will be able to send commands to the server to edit the document concurrently. The document format will be a modified version of Markdown. Content will be stored as plain text using only ASCII characters, simplifying compatibility and transmission. The server will always maintain the most up-to-date and accurate version of the document. Note that if your data structure is a simple character array, inserting characters into the middle of the document would require shifting all subsequent characters, resulting in inefficiency. Therefore, you are advised to use a more suitable data structure, such as a linked list, to allow for efficient editing operations. The structures and basic operations can be found in the code scaffold You must adhere to the function signatures for the marking script. to correctly assess your code. 3    Task Implement a simulated collaborative document editing system in C, consisting of two pro- grams: 1.  server — the authoritative document host •  Listens for client connections over named pipes. •  Maintains the document in an efficient in-memory structure. •  Applies editing commands (INSERT, DEL, BOLD...)  atomically and in the order received. •  Broadcasts updates to all connected clients. •  Handles client registration, graceful disconnects, and error reporting. 2.  client — a console-based editor •  Connects to the server’s named pipe endpoint. •  Sends user commands to read or modify the document. •  Receives update notifications and applies them to its local view. Deliverables & Constraints •  Source files: server .c, client .c, plus any helpers. •  Must compile on Edstem Linux environment using with no warnings (-Wall  -Wextra). 4    Set-up Client–Server Connection Protocol 1.  Start the server by running it with the following command.  is the time interval in milliseconds at which the versions of the document updates. . /server   2.  The server starts and immediately prints its Process ID (PID) to stdout: Server  PID:   3.  A client joins by invoking: . /client     4.  Upon starting, the client immediately sends SIGRTMIN to the server’s PID and then blocks, waiting for SIGRTMIN+1.  The staff client will timeout after  1 second if no signal is received. Student will not need to handle these conditions. 5.  On receiving SIGRTMIN, the server: 5.1.  Spawns a new POSIX thread to handle that client. 5.2.  Within that thread, creates two named FIFOs to establish bi-directional communi- cation: •  FIFO_C2S_ (Client-to-Server) •  FIFO_S2C_ (Server-to-Client) •  If either already exist, clean them up first and then create them. 5.3.  Sends SIGRTMIN+1 back to the client. 6.  The client, upon receiving SIGRTMIN+1, opens: •  FIFO_C2S_ for writing, and •  FIFO_S2C_ for reading, and writes its username into FIFO_C2S_ . Authorisation and Role Communication 7.  After receiving the client’s username (as a newline-terminated ASCII string), the server must: (1)  Check the provided username against the roles .txt file to determine if the user is authorised and what permission level they possess. (2)  If the username is found, the server will send the following through FIFO_S2C_  : •  The server must send the user’s role (permission) as a single, lowercase ASCII string, terminated by exactly one newline character ( ). The role string must be one of the following exact values: write, or read. •  After sending the role, the server must send the full document contents, fol- lowed immediately by entering the edit-command loop. (3)  If the username is not found: •  The server must send a rejection message: Reject  UNAUTHORISED. •  Wait for 1 second on this thread alone, not blocking the whole process. •  Then close both FIFOs, unlink them (i.e., delete them from the filesystem), and terminate the server thread handling that client. roles .txt Format The roles .txt file must reside in the same directory as the running server executable. Each line of the file contains a username followed by a permission level, separated by one or more spaces or tab characters. The valid permission levels are: •  write — permission to edit the document. •  read — permission to view the document but not modify it. Example format: 1 bob write 2 eve read 3 ryan write Leading and trailing whitespace around usernames and roles must be ignored.  Comparisons must be case-sensitive. Document Transmission Protocol After sending the role string, the server must transmit the full document contents to the client over the named pipe FIFO_S2C_, following these rules: •  The document must be serialised as plain ASCII text, preserving all internal newlines (‘ ‘) exactly as they exist in the server’s current document state. •  The document’s current version will be sent as a newline terminated number, this is guaranteed to be smaller than uint64. •  The document length in bytes will be first send as an integer followed by a newline delimiter. The size of the document in bytes is guaranteed to be smaller than uint64. •  The entire document must be sent as a length prefixed byte stream. •  The document content must be immediately readable by the client. •  Transmission must continue after the entire document content is written to the pipe. Overall example payload: write   //  role 0  //  version  number 34  //  document  length This  is  the  document .  Hello  world . Signal Handling Hints (Optional) Whilst the following functions are not allocated marks, correct behaviour is marked. •  Use sigaction() to register a handler for SIGRTMIN and use sigqueue() for sending signals if you want to include additional data (e.g., client PID). •  Use sigemptyset(), sigaddset(), and sigprocmask() to block SIGRTMIN and SIGRTMIN+1 before creating the thread.  This prevents signal loss during handler setup. •  Use sigwait() in the client to synchronously wait for SIGRTMIN+1—this avoids race conditions and allows clean blocking until the server responds. •  Realtime signals (like SIGRTMIN) are queued by the kernel and not merged, making them safer than standard signals (like SIGUSR1) in high-concurrency environments. 5    Structure Both the server and the client need to store a copy of the document.  The server’s copy will always be the most up-to-date and the "true" state of the document, whilst the client’s copy will be updated as changes are broadcasted from the server. This is necessary to prevent constantly transmitting the entire document over the network, which slows down the app. The following table contains the formatting that is supported by the document. Element                     Markdown Syntax Heading 1                   # H1 Heading 2                   ## H2 Heading 3                   ### H3 Bold                            **bold text** Italic                           *italicised text* Blockquote                   > blockquote Ordered List                 1. First item                                    2. Second item                                    3. Third item Unordered List              - First item                                    - Second item                                    - Third item Code                            `code` Horizontal Rule               --- Link                               [title](https://www.example.com) Table 1: Markdown Syntax Reference Formatting Notes: Note although the following rules must be adhere to when adding format- ting, markdown is just plain text and the added formatting will not be treated differently to plain text. •  Space Requirement for Certain Tags: The following Markdown tags must be followed by a space character (‘   ‘) immediately after the tag to be correctly parsed: –  Heading markers: #, ##, ### –  Blockquote marker: > –  List item markers: 1., 2., 3., - If a space is omitted after these tags, the element will not be recognised as correct for- matting and any of our (hypothetical) markdown renderer would not be able to correctly render it. •  Block-level Elements: The following elements are classified as block-level: –  Headings (Heading 1, Heading 2, Heading 3) –  Blockquotes –  Ordered Lists –  Unordered Lists –  Horizontal Rules •  Newline Requirements for Block-level Elements:  When inserting a block-level ele- ment, the editor must: –  Ensure there is a newline character (‘ ‘) immediately preceding the inserted block element, unless it is inserted at the start of the document. –  If the insertion point is not already at the beginning of a line (i.e., the previous character is not a newline), automatically insert a newline before the block element. –  The horizontal rule must have newline after as well. If one does not exist, automat- ically insert one. •  Inline Elements: Inline elements — specifically Bold, Italic, Code, and Links — do not require preceding or trailing newlines.  They may appear within an existing line of text without requiring structural separation. 6    Client-Server Synchronisation Since both the server and clients maintain a copy of the document state, it is critical to ensure consistent synchronisation of all changes across the system. All modifications to the document must originate as requests from clients, sent to the server in the form. of commands. At intervals, the server will issue a new version of the document. It will broadcast all changes made since the previous version to all connected clients, ensuring synchronisation. To maintain consistency, the server will only accept commands that target the current version of the document. Any command referencing an outdated version will be rejected. It is guaranteed that no two commands will be received at the EXACT same time and operate at overlapping cursor positions. Targeting overlapping cursor positions of the same version of the document is allowed. 7    Functionality 7.1    Part 1: Single Client Commands are issued by the client and sent to the server for processing. Each command affects the document and must specify a cursor position, which is defined as the number of characters from the beginning of the document to the intended location. To simulate user interaction with a GUI, users may type commands directly into the standard input of the client or server. All positions are interpreted on the version they reference, and if valid, changes are reflected in the next broadcasted version.  Once edits are made, future edits will need to have their cursor positions adjusted if necessary. Command Format Constraints All commands transmitted between the client and server must satisfy the following properties: •  The command must be composed exclusively of printable ASCII characters (byte values 32–126), with the exception of the final newline character. •  Each command must be terminated by exactly one newline character ‘ ‘ . •  The total size of the command, including the terminating newline character, must not exceed 256 bytes. •  Commands that do not satisfy these constraints (e.g., missing newline, exceeding 256 bytes, or containing non-ASCII characters) are considered invalid and must be rejected by the receiving side. •  All command arguments are separated by a single space character. •  For commands with a cursor range, end position should not equal to or precede the start position. •  The following commands are all also valid terminal commands. •  INSERT and DEL commands that causes formatting errors or broken formatting can happen but do not need to be handled in any way, you can just accept them. Example: Position 0 is before the first character D. Position 8 is after the last character t. Editing Commands •  INSERT    ; Inserts textual content at the specified cursor position and document version. Newlines are NOT permitted in this command. •  DEL    ; Deletes  characters starting from the specified cursor position. If the deletion flows beyond the end of the document, truncate at the end of the document. Formatting Commands Make sure you adhere to the formatting notes 5! •  NEWLINE  ; Inserts newline formatting at the position. •  HEADING    ; Inserts a heading of the given level (1 to 3) at the speci- fied position. •  BOLD    ;  Applies bold formatting from the  start to end cursor position. •  ITALIC    ; Applies italic formatting from the start to end cursor position. •  BLOCKQUOTE  ; Adds blockquote formatting at the specified position. •  ORDERED_LIST  ; Adds ordered list formatting at the position. Any surround- ing list items will be renumbered appropriately (e.g., 1, 2, 3...). For example, if an ordered list is added to the end, it’ll find the previous number and set the new item to previous number +1. If an ordered list is added in between existing ordered list blocks, it’ll be the previous item + 1 and all list items will also be + 1. You must handle newlines which can break ordered lists into two. Delete that breaks formatting does NOT need to be handled. •  UNORDERED_LIST  ;  Applies unordered list formatting at the  specified loca- tion. •  CODE    ; Applies inline code formatting to the given range. •  HORIZONTAL_RULE  ; Inserts a horizontal rule and newline at the cursor posi- tion. •  LINK      ; Wraps the text between positions in [] and appends the link in  () to create a Markdown-style. hyperlink. 7.1.1    Ordered List Consider a list: 1 .  tomato 2 .  cheese  burger 3 .  asparagus If I send a command ORDERED_LIST targeting the cursor position between cheese and burger, the list becomes: 1 .  tomato 2 .  cheese 3 .  burger 4 .  asparagus Also if I send a NEWLINE command to the same cursor position to the original list, it becomes: 1 .  tomato 2 .  cheese burger 1 .  asparagus If I delete the entire second list item from the original list, the list becomes: 1 .  tomato 2 .  asparagus Sending a NEWLINE command to the cursor position between 2 and . to the first list is NOT permitted. List formatting is guaranteed to not be sent if: •  The target cursor position is at or next to a list formatting 2.   or -  . •  The target is a list item formatted as a different type. For example sending ORDERED_LIST between love and gaming -  I  love  gaming . Nested lists are not allowed and guaranteed to not happen.  DELETE that causes formatting problems do NOT need to be considered. Also note, ordered list numbering is limited 1 to 9. INSERT will not insert anything that looks like ORDERED_LIST formatting. Metadata and Other Commands •  DISCONNECT; Disconnects the client from the server. Client Debugging Commands •  DOC?; Prints the entire document to the client’s terminal. •  PERM?; Requests and displays the client’s current role/permissions from the server. •  LOG?; Outputs a full log of all executed commands in order. Server Responses •  SUCCESS; Indicates that the client’s command was successfully executed. •  Reject  ; Indicates the command was rejected, with a message detailing the reason. See Section 7.4. These responses are NOT sent immediately, but only sent as part of the broadcast message. Server Debugging Commands •  DOC?; Prints the current document state to the server terminal. •  LOG?; Outputs a full log of all executed commands in order. Output Formatting If the command required output onto the terminal, print the output after the newline, for exam- ple: DOC? This  is  the  document This is an example of the LOG? command and its output: LOG? VERSION  1 EDIT      SUCCESS     //  first  command EDIT      Reject       //  second  command EDIT      SUCCESS  //  third  command END VERSION  2 EDIT      SUCCESS     //  first  command EDIT      SUCCESS     //  second  command ... EDIT      SUCCESS  //  nth  command ... END VERSION   ... END Not that the message for each version is the same as the message broadcasted to the clients at that version’s update. 7.2    Part 2: Multiple Client If your collaborative document contains multiple users, multiple edits may occur simultane- ously. To handle this, the server spawns a separate thread for each connected client. Commands are queued within each thread. At the TIME   INTERVAL update interval, the main server will collect all the commands from the thread queues based on timestamp order and process the changes in order. The server adds the timestamp when a command arrives. Handling Deleted Text and Cursor Position Adjustments    All the edits target the broad- casted document, i.e.  what the client was looking at when sending the command.  Generally, no matter the execution order of the commands queued for a version, the final document will look the same. However for commands with overlapping cursors, this is not true and executing the commands in the order of timestamp arrival will be critical. If a section of text is deleted and a future command (from any client) operating on the same version is to run at a cursor position within that deleted region, apply the following rules: •  For commands with a single cursor position, replace the cursor position with the loca- tion where the deletion began. Example: If positions 3 to 9 were deleted in an earlier command on the same version, an insertion at position 5 will now occur at position 3. •  For commands requiring starting and ending cursor positions: –  If both positions fall within the deleted region, it’s a DELETED_POSITION error. –  If only one position is within the deleted region, the cursor position within the deleted region will be adjusted to the closer of the deleted edges to the valid cursor position. If a section of text is formatted or inserted and a cursor region which overlaps this change is deleted by a future command targeting the same version, apply the following rules: •  The deleted will deleted the original intended deletion and the new insertion or formatting is untouched. Consider a sentence: "Hello  world" –  Insert at cursor position 5:  "  beautiful" –  Then delete starting at position 0, deleting 100 characters The final result is: "  beautiful" Example: Basic Insert This example demonstrates a soft insert operation followed by a commit. 1.  A new document is initialized. 2.  Two soft insertions are made at version 0: •  Insert "World" at position 0. •  Insert "Hello  " also at position 0, effectively pushing "World" to the right. 3.  The document is flattened without committing the changes, and it correctly returns an empty string since no version has been committed yet. 4.  After incrementing the version (committing version 0), the document is flattened again and the output is expected to be: Hello  World Example: Basic Delete This example shows how deletions behave before and after a commit. 1.  A new document is initialized. 2.  The string "Hello  World" is inserted at version 0 and committed. 3.  A delete operation is issued at version 1 to remove 6 characters from index 5 (i.e., deleting the substring "  World"). 4.  Flattening the document at version 1 (before committing the deletion) returns: Hello  World 5.  After committing the deletion (incrementing the version), flattening the document again returns: Hello Example: Multiple Insertions Within a Sentence This example illustrates the behavior. of inserting text both within and at the end of an existing sentence. 1.  A new document is initialized. 2.  The string "I  love  COMP2017" is inserted at version 0 and committed. 3.  Two soft insertions are made at version 1: •  Insert "really  " between "I  " and "love", resulting in "I  really  love COMP2017". •  Insert "  so  much", directly after "COMP2017". 4.  Before committing version 1, flattening the document will still return: I  love  COMP2017 5.  After committing the insertions (by incrementing the version), flattening the document will return the final expected sentence: I  really  love  COMP2017  so  much Example: Deleting Items from a Numbered List This example shows how consecutive deletions modify a structured list and how renumbering is reflected in the final output. 1.  A new document is initialized. 2.  The following string is inserted at version 0 and committed: Things  to  buy 1 .  yoyo 2 .  switch 3 .  ps5 4 .  COMP2017  textbook 5 .  gaming  chair 3.  At version 1, two delete operations are performed: •  Delete the line corresponding to 2 .    switch. •  Delete the line corresponding to 3 .    ps5. 4.  Before committing, flattening the document still yields the original list: Things  to  buy 1 .  yoyo 2 .  switch 3 .  ps5 4 .  COMP2017  textbook 5 .  gaming  chair 5.  After committing the deletions (by incrementing the version), the flattened document reflects the updated list with renumbering: Things  to  buy 1 .  yoyo 2 .  COMP2017  textbook 3 .  gaming  chair Versioning System    To address the issue of commands arriving in different orders, a version- ing system is used. This system keeps track of the user’s originally intended edit position and adjusts cursor positions accordingly. •  A new broadcast is issued every TIME   INTERVAL. •  Version numbers start from 0 and increment by 1. •  Version number only increments if at least one edit was made. •  Even if no changes were made, it’ll broadcast just the version number. •  All of the following messages are newline terminated. •  The payload must be closed with an END message. •  The following message is broadcast to all users when a new document version is issued: VERSION   EDIT      SUCCESS     //  first  command EDIT      Reject       //  second  command ... EDIT      SUCCESS  //  nth  command END This ensures every client can sync their local copy of the document to the most up-to-date version. Edit Validation    The server will only accept edits on the current document version.  Any attempt to edit an older version will be rejected.

$25.00 View

[SOLVED] SEJ103 AT4 Design for Bending for a Viewing Platform

AT4 Design for Bending for a Viewing Platform.: •    Individual task (Total of 35%) •    Due date: Week 12 Friday •    Content: Week 1 – 11 Viewing Platform A viewing platform is proposed to be added on the far side of the gorge so tourists who have taken the cable car can view the gorge from the previously difficult to access side. The lifetime of the Viewing platform should  be 30+ years before it needs to be replaced. The viewing platform. will overhang the edge of the gorge by 5m. The viewing platform.  deck area will be 6.0m wide and 11.5m long. The deck will be supported by 2 identical beams as shown in the Figure 1. Figure 1: Support Beam of the viewing platform. The component you are going to investigate is the support beam of the viewing platform. You will need to determine the following: Loads of the viewing platform. and any people who may be using it. Bending Stress, Deflection and Shear Stress in the Support Beam. Using a robust material selection process (selecting level 3 Granta materials or equivalent) you must: •    Considering the location, weather, other local considerations, and 30+ year durability, and select materials for the Viewing  Platform deck, Safety Rails and Support Beam. (Many of these will be similar to A3 considerations) •    Produce a cross section for your Support Beam that can meet the required loads, and will have bending  deflections less than 14mm. •    Because this is going into a National Park, your solution should minimise your environmental impact •    You may incorporate any other key factors you deem appropriate in your beam design solution. You will need to produce an Individual proposal report (approximately 10 pages). You report should  include: •    a brief explanation of the project and scope  or the report. •    a simple free body diagram of the support beam and loads you expect (self weight  of the beam can be approximated  as UDL of 2kN/m). •    a shear force diagram and bending moment diagram of loading on the beams. •    a summary of your research you think relevant to the proposal. •    a clear material selection process taking into account relevant requirements •    A final cross sections of the support  beams and calculations supporting  they can meet bending  stress, shear stress and bending deflection requirements.

$25.00 View