Assignment Chef icon Assignment Chef

Browse assignments

Assignment catalog

33,401 assignments available

[SOLVED] COMP4038 Coursework 2

COMP4038 Coursework 2 Tips v2024-03-28 A good conceptual model structure for the report looks like this: •    Brief problem statement •    Objectives, including specific constraints/requirements {consider defining one for a simulation experiment and one for an optimisation experiment} •    Any other constraints or requirements {not captured in the objectives} •    Experimental factors (Inputs) {make sure they are related to your objectives} •    Responses (Outputs) {make sure they support you to test if you fulfilled your objectives} •    Content (defining model scope and level of detail) {scope captures all candidate components that could be considered as part of the system (i.e. included and excluded ones); level of detail only considers the components that are within the scope (i.e. included ones) and describes how (at what level of abstraction) these components are going to be considered} {use screen shots of tables to save words} {Scope table requires justification, LOD table comments}   •    Assumptions  (facets of limited knowledge or presumptions) {all assumptions (including the Scope and LOD table ones) should be listed here, including a brief justification} •    Simplifications (facet of the desire to create simple models) {all simplifications (including the Scope and LOD table ones) should be listed here, including a brief justification} •    Graphical representation and short explanation and justification of design decisions {you might want to represent the process flow of the overall system and some details like classes and state charts for agents etc., whatever is related to the design of your system} Building a simpler model •    Your conceptual model can be more ambitious than your actual implementation o You can state that you are implementing a first prototype of the conceptual model where not everything is considered. If you want to do that, add a paragraph at the  end of the conceptual model section, providing some information of what you are  leaving out. o Simplifications listed within the conceptual model should relate to the full model rather than the prototype. Simplifications related to the prototype should be listed in the added paragraph. Objectives •    Simulation: Objectives must be clear and concise (a short sentence stating the objective and related constraints where appropriate). Objective: Ensure that x% of customers are served in y minutes, subject to ... •    Optimisation: Objective includes objective function s.t. constraints (can relate to the definition of the solution space and for filtering the solutions found). Provide a mathematical formulation with a brief explanation of the objective. Objective: The optimisation would … so that … while … Minimise:           Σ … subject to           a ≤ … b ≤ … where a = number of …, b = … •    In AnyLogic they are separated into constraints (checked before a run to define the solution space) and requirements (checked after the run to filter the solutions found) Implementation •    Make sure your model implementation matches your model conceptualisation (either the full version or the prototype). •    In the report: o Please provide a short opening paragraph followed by one (or more) screenshot(s) of your implementation o If your implementation is very complex, you should just provide a summary of the highlights (the things you are proudest about regarding your implementation). o If you have written lots of Java code, it would be good if you say a few words about the Java code you wrote, again focusing on the highlights (and perhaps present the pseudocode for the most relevant algorithm(s)). •    In your simulation model: o Provide some meaningful graphical representation (diagrams) at least of some of your outputs •    When you implement your model, please use the following diagram for help  •    Use AnyLogic Help (tutorials; demo models; example models) before asking us o For defining shift hours, the Schedule element provided in AnyLogic might be very handy; you can find some help in AnyLogic "AnyLogic Help / Defining Model Logic / Schedules"  and here in particular  "Weekly  Schedule"  to define the  schedule and "Schedule API" to access/change schedule variables. Experimentation •    Creating a base case: As we do not have a real world case, you might find it tricky to create a base case (representation the current state of the system) for your simulation experiments. The trick to  run  some  experiments  with  estimated  realistic  data  and  parameter  settings (where realistic means e.g. "time in system" in minutes rather than seconds). Tune data and parameters  until  you  get  a  scenario  that  works   (you  could   use  a   parameter  variation experiment if you want to do it professionally or just trial and error). When you get a scenario that "just" works, break it by changing the parameter settings slightly and you will have a base case of a student service  provider that  is experiencing  some  issues.  If you  only focus on optimisation and are trying to improve a system that is not experiencing any issues, you could skip the last step. •    Varying arrival  rates: Regarding arrival rates, you might want to allow the user to set it up (this could be overall expected arrival rate per week or so). Future customer numbers are very likely to rise (I am sure you could find some evidence for this online) . One might want to test if the system can cope with these rising customer numbers using current staffing levels. •    Interactive simulation: Adding sliders to your classes to vary parameters during  runtime:  If you think there is something a user should have control over in the simulation experiment during runtime you could add some sliders; it is relatively straightforward. It depends on if you want to market your model as an exploratory tool or a predictive tool. •    Number of decision variables:  The PLE edition of AnyLogic only allows 7 decision variables. If you create more, you get an error message when running the optimisation. There are different ways of dealing with this. o Reduce the number of decision variables o Use an external optimiser (e.g. HeuristicLab); we will have a look at this on Thursday o If you like a challenge (I did not try this but my colleague Dario mentioned it as one potential  solution  at  some  point)  you  could  encode  the  solution  as  a  bit  string; different sections of the bit string could represent separate decision variables; this way, a single integer could represent multiple decision variables; however, a decoder would need to be implemented to perform. the conversion from integer to bit string o If you like an even bigger challenge, implement your own optimiser in AnyLogic •    Optimisation experiment running slow: If your optimisation experiments are running extremely slow, you might want to consider using a rapid prototype version of your model for running these. It should have relevant functionality for running the optimisation experiments, but nothing else. You can then submit two models - the full version for getting good marks for presentation and the simplified version for allowing to re-run the optimisation experiments.

$25.00 View

[SOLVED] ENVM3115/7205 Species Distribution Modelling Assessment Task

ENVM3115/7205 Species Distribution Modelling Assessment Task Task: Use a species distribution modelling program (MaxEnt) to predict the current distribution of a single species of mosquito, and the future distribution of the same species of mosquito under two di@erent possible future climate-change situations. Write a short scientific report based on this task. You are able to choose one of the following two possible future climate-change situations to explore: 1.  Compare predicted future distributions of one species of mosquito under di#erent climate change models (BCC vs Can; time window: 2041-2060; SSP: SSP585) or 2.  Compare predicted future distributions of one species of mosquito under di#erent climate change scenarios (SSPs) (SSP1 vs SSP3, or SSP1 vs SSP5, or SSP3 vs SSP5; time window: 2041-2060; model: Canadian Earth System model) Regardless of which option you decide to explore, the outcome of your modelling will be three maps. One map will show the ‘current’ distribution of the species (based on observations and climate data collected before the year 2000). The remaining two maps will show the predicted future distribution for two possible future climate-change situations that you explored. You will need to write and submit a short scientific report based on your research and the results. The report should have the following format: 1.  Title 2.   Introduction 3.   Methods 4.   Results 5.   Discussion 6.   References The report should be between 750 words and 1500 words long (not including references, but including figure captions). You should allocate approximately 1/3 of this word count to the Introduction, 1/3 to the Methods and Results, and 1/3 to the Discussion. What to include in each component of your report: Title Make it ‘snappy’ and informative Introduction You will need to clearly describe the general problem and why it is important. You can use the following questions to guide the content and writing of your introduction: -    Why do we care about species distributions? -    How does climate a@ect species distributions? -    How might we expect climate change to a@ect species distributions? -    Why is it important to understand how climate change a@ects species distributions? -    Why is it important to generate di@erent predictions for the distribution of mosquitos in the future, based on di@erent climate models OR climate-change scenarios? What are these di@erent models or scenarios anyway? Can you provide context? What should a lay person understand about the models/scenarios you are focusing on so that they can be informed and understand the relevance/importance of your study? -    Why do we care about mosquitoes? Why do we care about the distribution of mosquitos? What would the benefits be of knowing how mosquito distributions might change in the future? After you build your argument in your introduction for why your audience should care about your study, the last paragraph of your introduction should have relatively short (e.g. 1-3 sentences) and crystal clear statement of the aims of your study. You should refer to and cite at least five contemporary (e.g. last ten years) published scientific papers to introduce your study. Methods You will need to write a clear and concise description of methods. Answer the following questions to guide the writing of your methods: -    Where did the observational data of mosquito occurrences come from? -    Where did the climate data come from? What climate variables are included in your models? Why might these climate variables be important? -    How was the future climate data generated? From which climate model(s)? For which SSP? For which time frame? -    What species distribution modelling method did you use to generate your current and future predicted distributions? In general terms, how does this method work? In general terms, how does this method turn observations and climate data into a prediction of a species distribution? -    What software did you use to implement your species distribution models? (you do NOT need to go into detail about the particular software settings that you used when implementing the model). Results You will need to write a clear written description of the results. For this, you will need to write a description of the distribution of your species as shown in the maps you produced. In your descriptions you should explicitly include text that describes the broad di@erences between the current and future distributions, and between the two future distributions under the climate-change scenarios/models you explored. Remember, you can describe the distributions and comparisons in broad terms. For example, you can say things like: “The distribution of A. farauti is predicted to significantly contract under SSP8. Moreover, the distribution is predicted to shift from the north-east of Papua New Guinea more towards north-eastern Australia.” (This is a made up description that I am writing just to give you an example of the kind of form. and level of detail required of the results section). You will also need to include, as figure(s) your three maps and you should explicitly refer to these maps at the appropriate points (i.e. when you describe a particular part of the distribution of your species that is visualized by your maps) within the written description of your results. You will also need to include figure caption(s) that allow a reader to fully interpret the figure. Here is an example of a good figure caption: “Figure 2. A map of the predicted future distribution of A. hinesorum for the years 2041-2060 under SSP5 using the Canadian Earth System Model. Colours represent the probability of species occurrence.” Discussion 1. Clearly answer the scientific question /address the stated aims ofthe study. For example, in the opening paragraph of your discussion you might consider including a statement such as: “I found that the distribution of A. farauti_4 is expected to move north with climate change, with stronger e@ects predicted to occur when using the BCC Climate System model when compared with the Canadian Earth System Model.” 2.  Take a paragraph or two to discuss your results with respect to the potential climate change futures you explored. What are the implications of your results for the particular models (experiment 1) or SSPs (experiment 2) you explored?  How large was the di@erence in the predictions between the models/SSPs? Discuss! 3.  Take a paragraph or two to discuss the implications of your results for human health and environmental management. 4.   Use one paragraph to propose a VERY clear and specific direction for future research. We don’t want to see a bland or vague idea for future research. What specifically do you think it would be important to study to improve our understanding of the issues or questions raised by your study? You should refer to and cite at least five contemporary (e.g. last ten years) published scientific papers to support the points raised in your discussion. References -    you should refer to and cite a total of at least five contemporary (e.g. last ten years) published scientific papers to support your arguments in the introduction and the points raised in your discussion. -    provide a formatted list of the references you cite in your document. Any conventional and consistent referencing format is fine. Grading: The report will be worth 20% of the grade for this course. Grading criteria for assessment task will be applied according to the dot points in each   of the following ‘33% sections’ (below). Against each of the dot-pointed criteria you will   be given a grade between 1 (low quality) and 3 (high quality), which will be summed (and scaled by each section, above) for your aggregate score. 33 % of the grade for this report will be allocated to the Introduction, and particularly with respect to the following components: -    description of the background to the problem. What is the general problem you are exploring and why is it important? -    clear statement of aims -    use of references as specified in the task description 33 % of the grade will be allocated to the methods and results, particularly with respect to the following components: -    clear and concise description of methods. Do not include every little detail -    clear written description of the results -    three maps, each with figure captions that fully explain what is being shown in the figures 33 % of the grade will be allocated to the discussion and references, particularly the following points: -    clearly answer the scientific question (i.e. address the aim) -    discuss implications of the results for human health, and for management of the environment and/or public health under future climate change. -    describe one potential direction for future research -    use of references as specified in the task description.

$25.00 View

[SOLVED] ADVT7512 Media Planning and Buying Assessment 2A

ADVT7512: Media Planning and Buying Assessment 2A – AI-Enabled Media Plan Detailed Instructions and Submission Guidelines Type: Project (Group) Weight: 30% Due Date – Week 9. Thursday 1/05/2025 @1:00 pm Learning Objectives Assessed: L01, L02, L03, L04, L05 This assessment is formative and will be due in week 9. Students will use feedback from teaching staff to revise their media plan and prepare their pitch to the client in week 11. Word Count: 2,500 words (10% over/under allowable) Submission: via Turnitin link on Blackboard AI Statement: This assessment task evaluates students' abilities, skills and knowledge alongside their experiences of using generative Artificial Intelligence (AI) to develop their media plan. Students are advised that the judicious use of AI tools for brainstorming and generating ideas is expected. Students are encouraged to keep a log of their feelings and thoughts on the use of AI throughout this project. This log will inform students' AI Disclosure Statement. A detailed template will be provided on Blackboard to guide AI disclosure statement submission. Failure to submit this disclosure along with your media plan may constitute student misconduct. Task Description: 1.   Your assessment task is to create a media plan for one of two client briefs presented in Week 4 seminar. [*Students who fail to address the assessment criteria and create a media plan for one of two client briefs presented will be graded “0” for their submission.] 2.   You will then undertake research into the product/brand and category, select an ideal target audience, set specific media objectives for the campaign and a campaign budget. Based on your media planning strategies you will compile a media plan to advertise the product/brand, addressing the set criteria for this assessment. 3.   Your report will cover the following areas (and a more detailed structure follows): Choose ONE of the following three clients: Choice of Two Clients   Choose ONE of the following: 1.  Queensland Ballet- Queensland Ballet’s The Nutcracker 2025 (Briefing documents are in the assessment folder) 2.   Evie s Editing Services ABN: 702 442 74971 (GST Registered).  (Briefing documents are in the assessment folder) You will be expected to respond to one of the above client briefs and prepare a media plan for the client as part of the brief. The Media Plan should include: 1.   A description of the business, nature and the industry of the business, and the external environment in which it operates 2.   Description of the client s current brand positioning and key business goals (e.g., brand awareness, lead generation, sales increase). 3.   Conduct Market & Audience Research including detailed description of the primary and secondary target audiences based on geographic, demographics, psychographics, and behaviours and media consumption habits of the target audience. 4.   Develop the Media Strategy including selection of the most effective media channels and justification of optimal media mix based on reach, frequency, and engagement goals 5.   Plan Media Buying & Execution and justify decision making, allocate budget across platforms, set media schedule including campaign duration, flighting strategies, and ad placements. 6.   Creative & Messaging Considerations including Alignment creative content with media channels and audience preferences. 7.   Ethical Considerations and Compliance 8.   Measurement & Optimization 9.   Evaluate & Report Findings including ROI and recommendations for future campaigns 10. AI Disclosure Statement Notes: Further details of the media plan including detailed instructions, and a comprehensive marking criteria/rubric for the media plan will be provided in class and on the Assessment folder on the course  Blackboard site. It is expected that a mix of well-justified media will be selected. Note that an over- reliance on one medium - especially when unjustified will result in a significant loss of marks. Detailed Instructions: 1.   The Nature of the Business o  A description of the business, nature and industry of the business, and the product category within the industry in which it fits. o  Determine the key political, economic, social, technological, legal and environment  forces and trends shaping the broader marketing environment in which the business operates. o  Summarise key insights into a strength, weaknesses, opportunities and threats table. 2.   Conduct Market & Audience Research o  Analyze competitor media strategies and industry benchmarks. o  Determine primary and secondary target audiences based on geographic, demographics, psychographics, and behaviours. o  Utilize audience segmentation tools and first-party/third-party data sources – categorize segments into appropriate target market using personas – example templates of personas are provided under learning resources) 3.   Understand the Client’s Brand Positioning and Objectives o  Identify the client’s current brand positioning relative to competitors, and the key business goals (e.g., brand awareness, lead generation, sales increase). o  Identify media consumption habits of the target audience. o  Define key performance indicators (KPIs) and metrics to measure success. 4.   Develop the Media Strategy o  Select the most effective media channels (TV, digital, social, OOH, print, radio, etc.). o  Determine the optimal media mix based on reach, frequency, and engagement goals. o  Establish the role of paid, earned, shared, and owned media in the campaign. 5.   Plan Media Buying & Execution o  Choose between direct buying, programmatic, and real-time bidding (RTB) methods. o  Allocate budget across platforms, considering CPM, CPC, CPA, and other cost structures. o  Set campaign duration, flighting strategies (continuous, pulsed, burst), and ad placements. 6.   Creative & Messaging Considerations o  Align creative content with media channels and audience preferences. o  Ensure messaging consistency across platforms while adapting to channel-specific formats. o  Integrate A/B testing and personalization tactics for performance optimization. 7.   Ethical Considerations & Compliance o  Does the campaign adhere to advertising regulations and industry standards (e.g., ASA, FCC, IAB guidelines)? o  Are any ethical considerations regarding the exclusion or portrayal of individuals or groups or public responsibility messaging? o  How does this campaign’s advertising appeal balance marketing objectives with responsible messaging? o Were there any considerations for inclusivity and diversity in the ad’s execution? o  How did the campaign address concerns related to potential desensitisation or overexposure to client messaging across various platforms? 8.   Measurement & Optimization o  Define key success metrics (e.g., impressions, CTR, conversion rates, brand lift). o  Utilize analytics tools (Google Analytics, Meta Business Suite, Nielsen, etc.) for tracking. o  Adjust strategy based on performance data and optimize in real-time. 9.   Evaluate & Report Findings o  Present campaign performance insights with actionable recommendations. o  Assess ROI, cost efficiency, and audience engagement. o  Suggest improvements for future campaigns based on learning outcomes. Recommended Plan Structure: Please note that the items under each headings are guidelinesonly. You should consider any other key  elements that you think need to be included under each heading. The recommended structure of your media plan should have considered the detailed instructions provided above and organized to include the following sections: Background o Brief background of your chosen Brand. o Identification of your chosen product/service and product category o List the mission statement of your Brand. o State your Brand position and market share o Briefly describe the external environment. Media Objectives o What are the overall Brand and do they align with the media objectives? o What are the chosen product/service objectives? o What outcomes do you expect achieve from your mediastrategy – specify outcomes using the SMART framework Target Audience o Who is your target audience? Clearly identify and briefly describe your target audience (include a consumer persona/profile). o Fit of target audience with the Brand andproduct/service objectives. Key Messages o What are your key messages? o Discuss your key messages and advertising appeal strategy. Creative Ad (include A4 Concept) o Develop and include an A4 Concept of your Ad. o You may wish to include a slogan, colouring, size of printad, relevant hashtags and other relevant elements. o Describe logic and rationale for your Ad decisions. Media Selection and Ethical Considerations o What media is appropriate foryour Brand, your target audienceand to communicate your key messages? o Briefly describe your selected media. o Justify each media selection you have made. o Briefly outline how your media selection will meet yourobjectives and fit your target audience. o Discuss any ethical considerations such as exclusion of or representation of certain groups and how the media mix navigates these consideration Costs, Scheduling, Budget Describe the associated costs with your campaign. o Develop an appropriate schedule for your campaign. o Use a practical tool, such as, a GANTT chart (example below and has been used in workshop exercises). o Briefly discuss any considerations in relation to your campaign. o Include all elements you will need to include in your budget.There is no need to include the actual dollar values here. o The media plan should be for at least 12 months (and can start as directed by Client Brief). o Budget implications should reflect the size and nature of the business. Evaluation and Effectiveness Measures o Discuss and justify how you will evaluate and measurethe effectiveness of your suggested media campaign. Contingencies o What will you do should the evaluation show that a specificstrategy is not working? o What is your Plan B – how will your optimize your strategy?  

$25.00 View

[SOLVED] CSG3309 IT Security Management Assignment 2

CSG3309 IT Security Management Group Assignment Information Security Management Assignment 2: Group Case Study: Pandora WebDev Solutions Unit Value:     40% Page Limit     20 pages (excluding references) Group size     Max 4 Learning Outcomes The purpose of this assignment is to support the following Unit Learning Outcomes (LO) for this unit. 2   Collaboratively analyse and report on information technology security management issues and emergent trends. 3   Propose a solution for information technology security management issues Background Pandora WebDev Solutions (PWDS) is undertaking a security improvement programme. The programme aims to reduce information security risks to PWDS by implementing a range of security measures. • You are to take on the role of an IT Security Management consultant •    PWDS ™ is a Perth based business struggling with IT security. Their business has already seen several security incidents occur. •   The CTO has approached you to help advise on the best way forward as they attempt to establish a security division. You have been provided with the attached background confidential briefing document. Task: Your task is to analyse the security issues with PWDS and create a plan to implement programs and projects to improve the IT Security of the company. You have to work with another security  consultant as a group. •   The specific requirement is to prepare a professional quality risk assessment and recommendation for PWDS. •   The proposed plan must address the IT Security issues and improve their security status both immediately and into the future. •   The report must demonstrate that you have thoroughly analysed and understood the IT security management issues of PWDS. • The report structure and scope of the implementation plan is up to you. •    Include individual contribution statements at the end of the report. In a real work environment, you will not be given explicit details how you should write the report. Quite often, the content of a report will be entirely your discretion; this means you need to carefully consider the scope of your report so that you do not exceed your time or budget (in this case available study hours). Remember: Your goal is to  improve the IT Security  of PWDS by advising the CTO on the best course of action. They ve paid you good money and they want a detailed report outlining the risks to the company and potential remediation strategies. The company also wants to know that if they implement your recommendations, they will get a good return on their security investment. There is no right solution, and the security problems are acknowledged to be significant. Task: Create a detailed response document that will solve the security problems for PWDS. Submit: ONE response document    Maximum 20 pages including all attachments, appendices, diagrams etc. (NOT including, cover pages, table of contents or references) •   Your response document should be a professional report that demonstrates the considerations given by each of your teams. •   Only one team member will submit the document. • ALL team members will submit a peer review (download from canvas) •    Insert at the end of your document, the Change Contribution (file on canvas) •   Word Limit: There is no word limit, moreover a page limit. The document will be marked on quality rather than quantity of words or pages. Keep in mind that only 20 pages of     content will be assessed so be concise and be clear on what you are trying to communicate in every section. Assignment Deliverables and Requirements 1. Risk Assessment: An information security risk assessment (assets, threats, vulnerabilities). The risk assessment should be prioritised to handle the greatest risks to the business first. This task will require: a)  asset identification (Maximum of 30 assets) and; b)  a weighted factor analysis (WFA) to prioritise business assets. You need only perform WFA on 20 assets, BUT select the most obvious information assets for analysis, i.e.,   production servers and critical business machines. c)  justification of your WFA criteria and weightings. The criteria must align with the business model. identification of threats and vulnerabilities for the prioritised asset list d)  assess the risk using some method, i.e., NIST SP 800-30 or some other standard. e)  write up the recommendations for the top 5 risks, i.e., control the risk (defend, mitigate, accept, transfer, terminate). You should have a risk register, preferably in the appendices, that contains the remaining identified risks. You should refer to the risk register where appropriate. Note on assets: Consider all components that are involved in IT Security Management (i.e., People, Procedures, Hardware, Software, Data, IoT, Network. 2. Project Management: Create a Work Breakdown Structure (WBS) to manage the tasks for this project. Note: This is NOT a project management unit, but there are some aspects required for this assignment. It is important that your client understands what work you propose to do. This means you do not need to apply full project management methods to the problem, but you should describe the overall list of tasks/processes (WBS) that will help secure your client. This    will include costs. It is recognised these costs will only be estimates and you may apply a range, i.e., between 10-15,000. 3. Demonstrate understanding of current Industry Standards and Best Practices: Reference the relevant industry standards, benchmarks, whitepapers, or best practices (researched or proposed). For example, if you base any solution, control or program on     standards, reference which standards are used (e.g., ISO27001/2. NIST publications, CIS Controls, ISM). Standards should be referenced throughout the report, not a written section on how good standards are. 4. Policy and Compliance: Address compliance requirements (if any) at the executive level of the business. Consider the following; • Are there specific information security laws / policy governing certain technologies? •    Do you need to create any supporting policy for legal obligations? • Can you use compliance requirements to justify your recommendations to the client? • Consider SIEM software, is it overkill or appropriate? 5. IT Security Programme Implementation: Describe the proposed implementation strategy, i.e., Direct, Phased, Parallel, Direct Changeover. This criterion will form part of a work package and can be addressed in the WBS. It is not necessary to write a section about implementation, however you may want to estimate an approximate timeframe. for the program implementation. 6. Operational security (Recommendations): What security controls would be suitable for the identified risks, list the controls and remediation. This section should closely align with the risk assessment. Note: you are not required to write about every risk assuming you have a minimum of 20, based on the prioritised assets. You should summarise your findings including the top 5 - 10 risks. You can refer the reader to the risk register or some other document in the appendices for the remaining risks (that outlines the controls). Include in the proposal a recommendation for contingency planning.  This need only be an outline of how you propose to address Business Continuity. For example, what plans you recommend for PWDS (IRP, DRP, BCP). The proposal does not need to include these plans, BUT you do need to demonstrate you understand the importance of, and have thought about, contingency planning. 7. Cost/Budget Estimates A draft budget on how much these changes will cost (rough estimates are fine – BUT you must support your numbers if you use them). This could include estimated: • staffing costs •    IT technology costs •   training costs •    hardware costs •   insurances • funding for additional research. Hint: you may include most, if not all, of this information in the WBS. Any supporting documentation to support costing may be included in the Appendices. It is also ok to include a short paragraph when writing the recommendations about the estimated overall cost and time to implement. 8. Ares for future security programmes, research, and improvement: There will undoubtedly be security problems that are out of scope for this proposal, attributed to time and financial constraints, Nonetheless, in concluding, provide a brief overview of future projects that PWDS will need to address in the near future. This can be a written sub section, or table format. This section need not be exhaustive, you do not need to think of every problem imaginable, moreover, describe the problems that are out of scope, i.e., a set of contingency plans or Risks outside the top 10. Future projects will likely include low information security risks derived from the Risk Assessment. You should refer to these risks where appropriate. All your recommendations should be derived from the Risk Assessment. Understandably you     cannot address all of risks, but you need to address at a minimum, the top 5 at a minimum. You will need to use critical thinking to determine what is realistic.  Take into account the business goals, size and structure of the business and the sensitivity of the information this business processes and stores. NOTE: It is UNDERSTOOD that you will need to make guesses and assumptions to complete this assignment. Just make sure these are realistic and well documented as you go. E.g., Find a few reputable online sources for vulnerabilities, equipment, security services or job advertisements – cite these as your sources. You are being assessed on your ability to anticipate and analyse IT security issues and the solutions you create for these issues, not the technology recommended in the solution. However, you should try to keep any technical recommendations realistic and helpful – support your work with citations. To be successful in this assignment you will need to work together. This is a large piece of assessment that can be broken down into smaller very achievable goals. It is recommended you run your OWN project plan to ensure your group delivers on this assignment successfully.   Each week you are given Assignment preparation tasks designed to address one section of the assignment. Please do not ignore them.

$25.00 View

[SOLVED] MN7027SR Business Problem Solving Assessment 2

Master of Business Administration Assignment Submission Form Module Code: MN7027SR Module Title: Business Problem Solving Assessment Title: Assessment 2 - Business Problem Solving Project Proposal Assessment due date: June 2025 Guildhall School of Business and Law Feedback/Feedforward Coversheet MN7027SR Business Problem Solving  Academic Year 2025/26 Assessment: Business Problem Solving Project Proposal (70%) 2,500 words (+/-10%) First Marker: Second Marker: Title of presentation:     Assessment Criteria Tasks 1 Marker 2 Marker   Required content     Executive Summary of the Report (5 marks, 150 words) Write an Executive Summary of the Report by stating: · Who is the client? · Major problem/s faced by the client · Stated objective/s (SMART) for the client · Proposed solution/s to achieve the stated objective/s. · Assess your confidence in achieving the objective/s in the stipulated time period (2-3 years, for example).     The business client and their business problem (10 marks, 250 words)   · Summary and history of client · Situation for client at outset of problem solving · Business problem and set of observations/complications around the situation · Objective (in the form. of a specific, measurable and actionable problem)     Problem structure and components logic tree (20 marks, 500 words) · Initial logic tree (i.e., three-layer factor/lever/component tree) · Fully-referenced commentary of logic tree     Solution drivers and hypothesised solutions logic tree (25 marks, 750 words)   · A more complete logic tree (i.e., four-layer deductive logic, hypothesis or hybrid of the two) of a. solution drivers b. hypothesised solutions · Fully-referenced commentary of logic tree     Prioritisation of hypothesised solutions (20 marks, 500 words) · Full 2x2 prioritisation matrix · Fully-referenced commentary of the prioritisation matrix       Workplan (10 marks, 375 words) · Full Workplan for testing hypothesised solutions · Gantt chart     One-day answer (5 marks, 125 words)   · Complete one-day answer       Presentation (5 marks) · Structure and format · In-text citations and references     Total marks     Areas for Improvements From First Marker Knowledge and understanding   Analysis and evaluation   From Second Marker Knowledge and understanding   Analysis and evaluation   Agreed Marks First Marker’s marks/date: Second Marker’s marks/date:    

$25.00 View

[SOLVED] ELEC/XJEL3430 Digital Communications Additional Practice Questions for Unit 2

ELEC/XJEL3430 Digital Communications Additional Practice Questions for Unit 2 Problem 1: Baseband Binary Communication a)    Repeat Problems 1 and 2 in PSet 4 for different input signals. You can pick any shape for s0 (t) and s 1 (t) and go through the same steps again. b)    In Problem 1 of Pset 4, choose some specific values for A, T, and N0 / 2 , and calculate the BER for that case. If you fancy, you can fix two parameters and change the other one, and calculate the BER in MATLAB. Plot the BER versus your free parameter to see how the amplitude, bit rate and noise power spectral density would affect the BER. Problem 2: BER vs T A polar binary signal is given by a fixed amplitude +1 V for bit 1, and -1 V for bit 0, for the bit duration. Bits 0 and 1 happen with equal probability. Additive white Gaussian noise having two-sided power spectral density of 10 3 W/Hz is added to the signal at the receiver. If the received signal is detected with a matched filter receiver, determine the maximum bit rate that can be sent to satisfy a BER 

$25.00 View

[SOLVED] GPF104 Game Production Foundations Assessment 4 Press Kit

ASSESSMENT BRIEF Subject Code and Title GPF104: Game Production Foundations Assessment Assessment 4 - Press Kit Individual/Group Individual / Group Length Press Kit Learning Outcomes e)   Release and distribute a finished game across websites, development communities and social networks. Submission 12-week Duration: Due by 11:55pm AEST/AEDT, Wednesday of Week 12 6-Week Duration: Due by 11:55pm AEST/AEDT, Wednesday of week 6 Weighting 20% Total Marks 100 marks Context: As your project nears completion, you are required to create a marketing package and use this material to publish your game online. Instructions: Press Kit: You are required to produce an online press kit which could be used to promote and market your game. This kit/page needs to include: •    A short description of your game •    Outline of key features •    Release date, platform, price •    Screenshots and gameplay video •    Additional artwork, logos, banners •    Links to where your game can be accessed online • Contact information •    Personal/company bio The press kit should be formatted as either a single page website (i.e itch.io) or pdf document. Distribution: Your game must be made available to either play online or download. Preferably on your press kit page. You are also required to market and link-back to your completed game across multiple online outlets. •    Create at least 1 Social Media account or page devoted to promoting your game and engaging with its potential audience. These extra marketing streams should link back to your primary distribution source. The quality, context and appropriateness of the provided media materials are very important for a successful press kit. The information you present, the quality of your writing, the presentation of your document and distributed work will be evaluated as per assessment criteria. Submission Guidelines Press kits must be submitted as – •    single .pdf file with ny additional material (images, videos) must be included in a zip file and should be clearly labelled. OR •    links to the game’s distribution platforms and social network pages.

$25.00 View

[SOLVED] FIT5196-S1-2025 Assessment 2

FIT5196-S1-2025 Assessment 2 This is a group assessment and is worth 40% of your total mark for FIT5196. Due date: Friday 23 May 2025, 11:55pm Task 1. Data Cleansing (21/40) For this assessment, you are required to write Python code to analyse your dataset, find and fix the problems in the data. The input and output of this task are shown below: Table 1. The input and output of task 1   Input files Submission Output files Other Deliverables Group_dirty_data.csv Group_outlier_data.csv Group_missing_data.csv branches.csvedges.csv nodes.csv Group_dirty_data_solution.csv Group_outlier_data_solution.csv Group_missing_data_solution.csv Group_ass2_task1.ipynb Group_ass2_task1.py Note1: All files must be zipped into a file named Group_ass2.zip (please use zip not rar, 7z, tar, etc.) Note2: Replace with your group id (do not include ) Note3: You can find all your input files from the folder with your group number here. Using the wrong files will result in zero marks. Note4:  Please strictly follow the instructions in the appendix to generate the .ipynb and .py files. Exploring and understanding the data is one of the most important parts of the data wrangling process. You are required to perform. graphical and/or non-graphical EDA methods to understand the data first and then find the data problems. In this assessment, you have been provided with three data inputs along with 3 additional files: branches.csv, edges.csv and nodes.csv here. Due to an unexpected scenario, a portion of the data is missing or contains anomalous values. Thus, before moving to the next step in data analysis, you are required to perform the following tasks: 1. Detect and fix errors in Group_dirty_data.csv 2. Impute the missing values in Group_missing_data.csv 3. Detect and remove outlier rows in Group_outlier_data.csv ○    (w.r.t. the delivery_fee attribute only) Project Background As a starting point, here is what we know about the dataset in hand: The dataset contains Food Delivery data from a restaurant in Melbourne, Australia.  The restaurant has three branches around the CBD area. All three branches share the same menu but they have different management so they operate differently. Each instance of the data represents a single delivery order. The description of each data column is shown in Table 2. Table 2. Description of the columns COLUMN DESCRIPTION order_id A unique id for each order date The date the order was made, given in YYYY-MM-DD format time The time the order was made, given in hh:mm:ss format order_type A categorical attribute representing the different types of orders namely: Breakfast, Lunch or Dinner branch_code A categorical attribute representing the branch code in which the order was made. Branch information is given in the branches.csv file. order_items A list of tuples representing the order items: the first element of the tuple is the item ordered, and the second element is the quantity ordered for that item. order_price A float value representing the order total price customer_lat Latitude of the customer coming from the nodes.csv file customer_lon Longitude of the customer coming from the nodes.csv file customerHasloyalty? A logical variable denoting whether the customer has a loyalty card with the restaurant (1 if the customer has loyalty and 0 otherwise) distance_to_customer_KM A float representing the shortest distance, in kilometres, between the branch and the customer nodes with respect to the nodes.csv and the edges.csv files. Dijkstra algorithm can be used to find the shortest path between two nodes in a graph. Reading materials can be found here. delivery_fee A float representing the delivery charges of the order Notes: 1.   The output csv files must have the exact same columns as the respective input files. Any misspelling or mismatch will lead to a malfunction of the auto-marker which will in turn lead to losing marks. 2.   In the file Group_id>_dirty_data.csv, any  row can carry no more than one anomaly. (i.e. there can only be up to one issue in a single row.)

$25.00 View

[SOLVED] OPERATIONS STRATEGY ACROSS THE ENTERPRISE ASB 2018 2024-25 Web

BUSINESS SCHOOL OPERATIONS STRATEGY ACROSS THE ENTERPRISE ASB 2018: 2024-25 Individual Assignment: Operations Strategy in a Period of Rapid Change Submission Deadline: Thursday 1st May 2025 – 23.59 UK time You will be required to submit an electronic copy in Blackboard. Weight: 50% of module mark Format: Business Report 2000 words +/- 10%  (1800 – 2200 Words) Context Major changes have happened in the business environment in the last decade, including, but not limited to: the digital revolution, especially artificial intelligence; the worldwide pandemic; climate change and geo-political instability. In some cases, these have required organisations to implement the degree of change that might have taken several years, in a period of months. This challenging period has provided us with a set of live case studies in Operations Strategy and we can now look again at enterprises, assess the changes in operations, evaluate their success and their long-term significance. Task The end product of this assessment will be a business report. Your initial task is to choose a leading company, in one of the following sectors: food production and retailing, fashion clothing, sports goods, construction, consumer electronics, household cleaning and hygiene products. You must choose a company that operates at least at national level in a major economy. This choice will be subject to tutor approval. You will briefly introduce the firm and set out how this firm has responded to the challenges to change their operations. To do this, you will need to use the key content in the module lectures and illustrate the concepts with materials you retrieve and interpret during your research. Your introduction to the company should take no more than 400 words and should focus on their principal activity and on their operations not on marketing activity or financial performance. Your main body of content should cover matters such as: · Sector – main product areas · Manufacturing and processing · Structure – key aspects such as vertical integration · Supply chain · Distribution systems · Principal customers – intermediate and final · Performance monitoring and quality systems · Innovation in products, production and distribution · Digital technologies employed in operations Please note that it is not expected to cover all of these in detail, but to focus on significant changes. Your primary source of information/evidence will be the digital, broadcast and printed media, specialist publications and your support in terms of theory and practice should derive from academic and business journals. As stated above, you need to agree with the tutor which organisation you are to focus on by week four. Further guidance Format: A business report has to start with a good executive summary, a summary of contents, and then the main body should be set out in a logical format, with headings and sub-headings, illustrated with relevant tables and graphs. The text should flow, and all technical reports should be kept in the appendix. It should have a simple and attractive cover page. It should look, read and feel like an article suitable for inclusion in a mainstream business publication, such as Business Week, Management Today or the Economist. Please note that at the level you have now reached, it is not sufficient to merely describe what has happened. You are expected to analyse and evaluate the information you discover in the context of the theory you have been introduced to. The main body should be 1200-1400 words while the executive summary should be no more than one page and preferably about 10 lines. The words used in the executive summary are not included in the wordcount. A conclusion should be provided which summarises the main points and any overall key messages. References, following the Harvard format, should be coming from the Internet, the recommended textbook, journal articles and the press, blogs, etc. Content: At the assignment launch stage and in the timetabled workshop sessions, I will discuss the range of points that you could include and explore. These elements are closely aligned to chapters 1-5 of the recommended textbook (Operations Management, 10th edition, Slack and Brandon-Jones). Earlier editions of this text have much of the same content, but the chapter order may be different and the content less current. One important point to re-emphasise is that the focus must be on operations and not on marketing or financial aspects of the business. Marking Scheme: This is an integrated assignment, and the overall mark will be based on the actual content, the sources retrieved and used, and the format of the report. The expectation is that the theory and models discussed in the module lectures would be used in your report. Ensure work submitted is your own effort – DO NOT PLAGIARISE: You are reminded not to copy material from any sources without properly referencing it, as this constitutes plagiarism: cases of plagiarism will be referred to the Business School Academic Integrity Officer and will be subject to a deduction of marks, which can result in an overall mark of 0%. The copying of material extends to the use of essay mills and AI technology such as ChatGPT. You are reminded that the use of such services to generate work in substitute of your own original contributions contravenes Bangor’s Academic Integrity policy. Any detected attempt to use such tools will also result in referral to the Business School Academic Integrity Officer Module outcomes assessed in this assignment: · Examine and explain the processes and systems used to improve the quality of operations, manage risk and plan effectively for long run effectiveness. · Describe and explain the process of innovation in the context of operations. · Evaluate techniques and processes used in the planning and control of operations.

$25.00 View

[SOLVED] SAT 301 Final Year Project 2024-2025

School of Advanced Technology MODULE HANDBOOK SAT 301 Final Year Project Semester 1&2 2024-2025 SECTION A: Basic Information o Brief Introduction to the Module The final year project (FYP)  is a two-semester long project delivered through the module SAT301 Final Year Project. It accounts for ten credits, which is the largest single  module  currently  and  worth  25%  of the  total  credits  available  for Year 4. Therefore, it is a major contributing component to the BEng final degree classification. The FYP acts as a summative assessment of a student’s attainment in the Program Learning  Objectives,  i.e.  how  good  you  are  as  a  XJTLU  SAT  graduate.  It  is  an opportunity for a student to integrate all the knowledge accumulated through the four years  of  study.  At   the   same  time,   the  student  must  demonstrate  his  or  her competencies   in  joining   the   engineering   professionals   around   the   world;   or demonstrate satisfactory research potentials to further their careers in research. There are three assessment items for FYP including: 1) Interim Progress Report (25%) 2)  Project  Demonstration  (15%)  and  3)  Final Thesis  (60%).  To achieve the most rewarding   FYP   experience,   the   students   are   advised   to   follow   strictly   the assessment/submission  schedule  detailed   in  the   Module  Handbook,  and  check important organisational messages posted on LEARNING MALL with email notices. Regular  meeting and effective communication with the supervisor are  particularly essential to a successful FYP project. o Key Module Information Module name: Final Year Project Module code: SAT301 Credit value: 10 Semester in which the module is taught: S1 and S2 Pre-requisites needed for the module: n/a Programmes on which the module is shared: BEng Computer Science and Technology BEng Digital Media Technology BEng Electrical Engineering BEng Electronic Science and Technology BSc Information and Computing Science BSc Information Management and Information Systems BEng Mechatronics and Robotic Systems BEng Telecommunications Engineering o Delivery Schedule No specific schedule. o Module Leader and Contact Details Name: Pengfei Song Brief Biography: Email address: [email protected] Office telephone number: +86 (0)512 8818 9039 Room number and office hours: EE 318 Preferred means of contact: [email protected] o Additional Teaching Staff and Contact Details All SAT Academic Staff. SECTION B: What you can expect from the module o Educational Aims of the Module To give students the opportunity to work  in a guided  but  independent fashion to explore a substantial problem in depth, making practical use of principles, techniques and methodologies acquired elsewhere in the course. Page 4 of 7 To give experience of carrying out a large piece of individual work and in producing a dissertation. To enhance communication skills, both oral and written. o Learning Outcomes A. Identify and formulate a substantial research problem, and produce a plan to address the problem; B. Produce and follow an appropriate project plan; C. Locate and perform. a review of project related literature; D. Design, implement and test solution(s) to the identified research problem; E. Evaluate in a critical fashion the work done and place it in the context of related work; F. Prepare and deliver a formal presentation with a demonstration of the project using a suitable means; G. Structure and write a dissertation. o Assessment Details Semester 1 - marking guideline attached as appendix Please be noted that the three sub-items of the assessment ‘interim progress report,: a. project specification, b. progress presentation and c. interim progress report will be marked together. The three sub-items combined accounts for total 25% weight. Interim Progress Assessment is a summative assessment for the first semester. The assessment is based on the three student submissions in the first semester: Project Specification, Progress Demonstration and Interim Progress Report. FYP students are expected to submit a project specification report by S1 - Week 5. It is a document specifying the problem statement, expected outcomes, project Gantt chart or project schedule and the budget. Supervisors and Assessor will provide written  feedback  to  the   students   so  that  they   could   adjust   their   plan   and understanding after initiate literature review. The Interim Progress Report should normally not be more than 20 pages. It is a formal report that concludes the achievement during the first semester. This excludes Appendices  and  usually  organized  with  following  sections:  Background, Main body and conclusion. Based on the nature of projects, the detailed contents in the  background  and  main  body  can  be  decided  by  FYP  students  and  their supervisors. The background section should include the  project aims/objectives, a short  literature  review   and   the   industrial   relevance   and   project   motivation.   A main   body   should  include   the   methodology  and   preliminary   results,  with  the critical  thinking  for  the  remained  problems. The  FYP  progress analysis and grant chart for S2,s work should be included in the conclusion part. Semester 2 - marking guideline attached as appendix The   project  demonstration   is   usually   organized  at  S2-Week  8.   It   is   an   oral presentation as well as  hardware/software  demonstration  if  hardware or software   outcomes   are   involved.   It   will   be   assessed   by   a   panel   of at least two academic staffs. It consists of 10-minute presentation plus 5-minute Q&A session   (or total of 15 minutes) for each student. FYP  Dissertation  is the final summative assessment. It should  be  normally  not more than 40 pages excluding appendices. Students  are  referred to  the  separate  document  named “SAT  Final  Year  Project Report Writing” for detailed guidance on the presentation of FYP reports. o Methods of Learning and Teaching In  the  project  we  wish  to  foster  independent  learning,  under  the  guidance  of  a supervisor. There is a review, which provides an opportunity for monitoring progress and giving formative feedback. Supervisors maintain regular contact with students throughout the project to provide direction and advice as needed. Lectures/seminars addressing particular skills are also offered to students. o Syllabus & Teaching Plan Please consult with FYP supervisor. o Reading Materials Mandatory textbook is a required book in either print or electronic format for a module that students are obligated to purchase. Optional textbook is a book in print that students can choose to purchase or not. Reference textbook is a book in print that is considered additional or recommended reading by academic staff and is only purchased for Library’s collection where it can be offered for loan.

$25.00 View

[SOLVED] ECE391 /

CP3.1ECE391: Computer Systems Engineering Spring 2025Machine Problem 3Contents1 Introduction2 Using the Group Repository3 The PiecesCheckpoint 1: Mon April 7 18:00 CDT Checkpoint 2: Mon April 28 18:00 CDT4 Testing5 What to Hand in66Checkpoint 3: Sun May Illinix 3914 21:00 CDT4453.1 Gettingstarted.......................................... 5 3.2 WorkPlan............................................ 55.1 Checkpoint 1: Filesystem and Drivers and Program Loading, (Oh My!)5.1.1 GroupRepository.................................... 6 5.1.2 VIRTIOBlockDevice ................................. 6 5.1.3 Read-OnlyFilesystem ................................. 7 5.1.4 YourFriendlyNeighborhoodMemio ......................... 8 5.1.5 Lockedand... ..................................... 8 5.1.6 ...(ELF)Loaded.................................... 9 5.1.7 CacheMeOutside ................................... 9 5.1.8 ExistingFiles...................................... 10 5.1.9 RunningYourCode .................................. 11 5.1.10 Troubleshooting/Debugging .............................. 11 5.1.11 Checkpoint1Handin.................................. 115.2 Checkpoint2:VirtualMemoryandProcessAbstraction. . . . . . . . . . . . . . . . . . . . 111. . . . . . . . . . . 6 CP3.15.2.1 GivenCode....................................... 11 5.2.2 ViciousVirtualMemory ................................ 12 5.2.3 PeskyProcesses .................................... 13 5.2.4 SuspiciousSyscalls................................... 15 5.2.5 FullyImplementedFilesystem............................. 16 5.2.6 AdditionalModifications................................ 17 5.2.7 Checkpoint2Handin.................................. 185.3 Checkpoint 3: Forks, Preemptive Multitasking, fd Duplication, Pipes, Validation and Shell . 19 5.3.1 FriendlyForking .................................... 19 5.3.2 PerniciouslyMeticulousPreemptiveMultitasking . . . . . . . . . . . . . . . . . . . 19 5.3.3 DeviousDuplication .................................. 20 5.3.4 PervasivePipes..................................... 20 5.3.5 UserInputValidationExtraCredit........................... 20 5.3.6 Welcometo(S)hell................................... 21 5.3.7 Checkpoint3Handin.................................. 236 Grading 247 Appendix A: The File System 257.1 FileSystemOverview...................................... 25 7.2 FileAbstractions ........................................ 27 7.3 BuildingtheFileSystem .................................... 28 7.4 TheBlob ............................................ 298 Appendix B: I/O Devices 308.1 Overview ............................................ 30 8.2 I/OOperations ......................................... 30 8.3 I/ODiagram........................................... 319 Appendix C: The Process Abstraction 329.1 History ............................................. 32 9.2 Overview ............................................ 32 9.3 Context Switching between User-Mode and Supervisor-Mode . . . . . . . . . . . . . . . . 322 CP3.110 Appendix D: RISC-V Paging 3510.1IllinixMappings......................................... 35 10.2Sv39............................................... 3611 Appendix H: Troubleshooting 3711.1Debuggingwithgdb ...................................... 37 11.1.1 DebuggingtheKernel ................................. 37 11.1.2 DebuggingUserPrograms ............................... 38 11.1.3 UsefulgdbCommands................................. 383 CP3.11 IntroductionRead the whole document before you begin, or you may miss points on some requirements.In this machine problem, you collaborate to develop the core of an operating system roughly based on Unix Version 6, with modern concepts peppered in where appropriate. You’ll implement interrupt logic, user threading (a` la MP2), kernel and application paging, initialize some devices and a filesystem with the VIRTIO interface, and create a system call interface to support various system calls. The operating system will support running several tasks (“threads”) spawned by a number of user programs; programs will interface with the kernel via system calls.Don’t worry, these aren’t all “boring” programs—you’ll get to run some cool games, too.The goal for the assignment is to provide you with hands-on experience in developing the software used to interface between devices and applications, i.e., operating systems. You should notice that the work here builds on concepts from the other machine problems. Many of the abstractions used here (e.g., the VIRTIO interface) have been simplified to reduce the effort necessary to complete the project, but we hope that you will leave the class with the skills necessary to extend the implementation that you develop here along what- ever direction you choose, by incrementally improving various aspects of your system.2 Using the Group RepositoryYou should receive access to a shared repository with your group members. Your group has a two-digit group number; your group number should be released in a Piazza post, and your repository should be named something like mp3 group xx, where xx is your number.It is required to run the following commands on each computer that you clone the repository to, in order to make sure the line endings are set to LF (Unix style):git config --global core.autocrlf inputgit config --global core.eol lfSome other tips:As you work on MP3 with your teammates, you may find it useful to create additional branches to avoid conflicts while editing source files. Remember to git pull each time you sit down to work on the project and git commit and git push when you are done. Doing so will ensure that all members are working on the most current version of the sources. It is highly likely that you will benefit from proper usage of the git stashcommand,tocorrectlyretaindesired(local)changeswhendoingapull.When using Git, keep in mind that it is, in general, bad practice to commit broken sources. You should make sure that your sources compile correctly before committing them to the repository. Make sure not to commit compiled ‘*.o’ files, besides what we have given you. You can modify your .gitignore in any way you want.Finally, merge your changes into the main branch by each checkpoint deadline, as this is the only branch we will use for grading.4 CP3.13 The PiecesThe basic OS is provided, but when you first get it, it won’t properly do a lot of the things we expect an OS to do: perhaps most importantly †, it can’t play any cool games!For simplicity, we will stick to text-mode graphics (for the most part), but your OS will, by the end, run the games from previous MPs as well as some new ones. We’ve included a few helpful pieces that will allow you to debug easier, such as kprintf. We highly encourage use of gdb to debug. Print statements can only take you so far. See Appendix H for details.3.1 Getting startedIn order to effectively work on this MP, you will need to develop knowledge of a lot of different and difficult concepts. The documentation on the course website and lectures will give you background information, but the best way to learn is to read and understand the code we have provided. This includes the Makefiles, .ld linker files, and .c/.h source files.This MP is difficult, which is why we do not expect you to work alone. While you cannot share code or discuss details with other groups or anyone outside your group, you should work together with your team to get unstuck and build a common understanding.3.2 Work Plan“Work expands so as to fill the time available for its completion.” - Cyril ParkinsonThis project is somewhat daunting, and will require efforts from all your team members. You should partition the work accordingly to allow independent progress by all team members.Setting up a clean testing interface will also help substantially with partitioning the work, since group mem- bers can finish and test components before your groupmates finish the other parts (yet). The abstractions suggested should allow for some spots where a “working part” can be substituted with a functionally equiv- alent placeholder, so to speak—more on that later.While splitting up the work allows for you to make more progress, it is still crucial that you spend time working together to integrate all parts. You should also be maintaining active communication between group members to make sure you all have an understanding of how all your code works. Even if you did not work on a specific section, we expect you to be familiar with how the code works and be able to explain what it and how it fits into your kernel.Throughout the first part of this semester and in most/all of your previous classes, MPs were more structured. You were given a set of functions to write, and you only modified those functions. One of the goals of this class is to make you into a more confident and thoughtful programmer by having you practice software design. We have deliberately left the implementation of certain sections open-ended. It is up to you and your group to find a way to meet the requirements - as with the real world, there is no “perfect” solution. The only requirement that we impose is that you follow the function interfaces that we have already specified - feel free create your own helper functions or creative implementations.†Some may disagree that this is the most important thing, but who wants no games? 5 CP3.14 TestingFor this project, we strongly recommend that you write and run unit tests with adequate coverage of your source code.As your operating system components are dependent on one another, you may find it useful to unit test each component individually to isolate any design or coding bugs.You should create a main tests.c file and add it to your Makefile. This file should create a kernel image (e.g., test.elf) that you can load into QEMU and run tests with. As you add more components to your operating system, we encourage you to add corresponding tests that verify the functionality of each component at the interface level.Keep in mind that passing all of your unit tests does not guarantee bug free code. However, the test suite provides a convenient means to run your tests frequently without having to re-debug older components as you add new functionality.5 What to Hand in5.1 Checkpoint 1: Filesystem and Drivers and Program Loading, (Oh My!)The primary motivation of this checkpoint is to get 2 test programs, which we’ve given you, to run. hello will print some text to the UART screen, then stop. trek will run the same text-based Star Trek game that you know and love.Rather than do this in a “hacky” way, we want to set up some key infrastructure now which will pay dividends as the project continues on.Note: Please ensure that all the functions that we specify do not induce a kernel panic on an invalid input. You should return an error code (which one is up to you) if possible, otherwise do nothing.For the checkpoint, you must have the following accomplished:5.1.1 Group RepositoryYou must have your code in the shared group repository, and each group member should be able to demon- strate that they can read and change the source code in the repository.5.1.2 VIRTIO Block DeviceAn operating system in general must communicate with external devices. One such device is obviously the real drive/disk (virtual, in this case) which contains programs and other files you want your operating system to have access to.In order to set up this device (and any others down the line), we will need to set up the necessary framework for the VIRTIO block device. Your group must finish the implementation based on the VIRTIO documenta- tion linked on the course website.6 CP3.1You may find it especially helpful to read sections 2.1-2.7, 3.1, 4.2, and 5.2 and recall your implementation of viorng.c. Skip anything related to ”legacy” interface.More information about the functions that you have to write can be found on the Doxygen site linked on the course website.1. void vioblk attach(volatile struct virtio mmio regs * regs, int irqno)2. int vioblk open(struct io ** ioptr, void * aux)3. void vioblk close(struct io * io)4. long vioblk readat(struct io * io, unsigned long long pos, void * buf, long bufsz)5. long vioblk writeat(struct io * io, unsigned long long pos, const void * buf, long len)6. vioblk cntl(struct io * io, int cmd, void * arg)7. vioblk isr(int irqno, void * aux)See Appendix B for more information on the io struct. 5.1.3 Read-Only FilesystemBroadly speaking, your filesystem driver should provide a comfortable interface to open, read and scan through files. In later checkpoints, you will add additional functionality.Your ktfs.c file will need to interact with its backing device with some intermediate cache in cache.c to actually interact with the “physical” (well, virtual) device, so be sure that you understand what’s going on in files related to both the cache and the backing device. Additionally, as this interacts with virtual devices, you should be sure that you use the io struct in the proper way.More information about the functions that you have to write can be found on the Doxygen site linked on the course website.These functions should be written in ktfs.c:1. int ktfs mount(struct io * io)2. int ktfs open(const char * name, struct io ** ioptr)3. void ktfs close(struct io * io)4. long ktfs readat(struct io * io, unsigned long long pos, void * buf, long len)5. int ktfs cntl(struct io * io, int cmd, void * arg)6. int ktfs flush(void)7 CP3.1In order to use the filesystem, we have provided a mkfs ktfs function (see Appendix A) that generates a filesystem image for you. This filesystem image is mounted by QEMU as a drive (using the Makefile we provide) and is accessible through VIRTIO.For every “device” that uses io, you will need to implement “iocntl” IOCTL GETEND and IOCTL GETBLKSZ. Keep in mind that IOCTL GETBLKSZ should not return the filesystem block size, but the “block size” of the file IO object - in this case, 1.(Hint: implement the memio and its related functions to test your KTFS filesystem driver as well as the cache without the vioblk.)See Appendix A for additional details.5.1.4 Your Friendly Neighborhood MemioYou may wonder why we need a memio device if we already have a vioblk device? The memio device is a helper backing device that allows you to test your filesystem and ELF loader without using vioblk. Within your linker script kernel.ld, there is a section from kimg blob start to kimg blob start that you can use to place your whole filesystem image or an ELF file to load (see Appendix A about the blob).More information about the functions that you have to write can be found on the Doxygen site linked on the course website.For better unit testing and debugging, you must implement the memio device “driver” in io.c. The following is a list of functions you need to implement:1. struct io * create memory io(void * buf, size t size)2. int memio cntl(struct io * io, int cmd, void * arg)3. long memio readat(struct io * io, unsigned long long pos, void * buf, long bufsz)4. long memio writeat(struct io * io, unsigned long long pos, const void * buf, long bufsz)5.1.5 Locked and . . .Locks prevent concurrency issues when multiple threads are accessing the same resource. You’ll need to implement the following functions and make modifications to your existing functions in thread.c. You should also modify your current thread struct so that it includes a member called lock list that holds a linked list of all locks held by the thread.Note: In order to prevent deadlocks, an exiting thread must release all held locks.More information about the functions that you have to write can be found on the Doxygen site linked on thecourse website.You should implement the following functions in thread.c:8 CP3.11. void lock init(struct lock * lock)2. void lock acquire(struct lock * lock) 3. void lock release(struct lock * lock)5.1.6 . . . (ELF) LoadedOne of the key roles of the operating system is to be able to run other programs.We want to be able to run many user-level programs, but for now you can focus on hello and trek. While we’ve given you the pre-compiled binary of trek, you’ll have to compile hello using the usr/Makefile. Because of this, you also have access to hello.c. All the binaries are in a format called ELF (Executable and Linkable Format), which has a specific layout — it is the standard for Unix and Unix-like systems, historically, which means it is still very relevant. See the Tools, References, and Links page on the course website for the Linux manual page on ELF. Your loader will only need to deal with the program headers, not sections, so focus on that documentation.Notice that since elf load should support any compliant I/O interface, that we can in general load an ELF from “any source” as long as ioread and ioseek are implemented in the given io (see Appendix B). (Hint: memio)5.1.7 Cache Me Outside“Software gets slower faster than hardware gets faster.” -Wirth’s LawThis semester, you will implement a caching system to cache blocks from a backing interface. As you’ve learned in this course, communicating with devices is extremely slow relative to the CPU’s clock cycle. Previously, you’ve implemented asynchronous communication (condition variables) so that while one thread is waiting on a device response, another thread can run.While this significantly reduces the problem of “wasting” CPU cycles, it does not eliminate the problem of latency - the original thread still must wait a long time for the device’s response. A cache is a commonly used way to reduce this latency.Once you complete this checkpoint, your backing interface will be the VIRTIO block device, but we will refer to it generically as the backing interface in this document. Rather than reading/writing a block directly from/to the backing interface, we first check whether the block exists in the cache. If the block exists in the cache, we access the block via the cache rather than sending a new request to the backing interface. If the block does not exist in the cache, we read it from the backing device into the cache. Note that you may or may not need to evict a block currently in the cache in order to bring in this new block.Your cache may have any level of associativity and may be write-back, write-through, or some other con- coction. Please note that we are intentionally leaving the specific details of the cache vague; this is intended to be a design exercise.Some additional scenarios/specifications for the cache are as follows (these would be good test cases for you to write):9 CP3.1• Initially (when the OS is first started), the cache is empty.• If the cache is initially empty and we read 64 contiguous blocks into it (e.g. 5, 6, 7, ..., 68), all 64 of those blocks must remain in the cache. This means that a read within any of those blocks should not generate a request to the backing device. (Hint: this should indicate to you that your cache capacity must be at least 64 blocks.)• If cache get block() is called and block k is read into the cache, block k should remain in the cache at least until cache get block() is called again (note that block k may remain in the cache for longer). This is to say, if we call cache get block() once and do not call it again, the block that was cached must remain in the cache.More information about the functions that you have to write can be found on the Doxygen site linked on the course website.You will implement the following 4 functions in cache.c:1. int create cache(struct io * bkgio, struct cache ** cptr)2. int cache get block(struct cache * cache, unsigned long long pos, void ** pptr) 3. void cache release block(struct cache * cache, void * pblk, int dirty)4. int cache flush(struct cache * cache)As a reminder, you can also create any other helper functions that you need for your cache implementation.5.1.8 Existing FilesDuring MP2, you worked with the PLIC, UART, and some other devices. You will be re-using that code for this checkpoint. You should add the following files into sys from MP2. They must be fully functional and (besides thread.c) should have the same functionality as a completed MP2. You can collaborate with your MP3 groupmates to choose whose MP2 code to use.• plic.c/.h• rtc.c/.h• uart.c/.h• timer.c/.h • thread.c/.h • thrasm.s• viorng.c10 CP3.15.1.9 Running Your CodeFinally, once you have all of your code completed, you will need to finish sys/main.c to run your program. We’ve left some comments on how to run trek, you may also find it helpful to refer to your MP2 CP3 main function implementation. You can also run hello or another user program that you create.5.1.10 Troubleshooting/DebuggingSee Appendix H for more information about debugging and common issues.5.1.11 Checkpoint 1 HandinFor handin, your work must be completed and pushed to the main branch of your team’s GitHub remote repository by the deadline.For this checkpoint you must complete the following:• Read-write operations on vioblk• Read-only filesystem• Read-write operations on memio• Read-write operations on the cache• ELF Load• LocksCheckpoint 2: Virtual Memory and Process Abstraction5.25.2.1 Given CodeLinked on the course website are some extra files which are needed for the Checkpoint 2 implementation.Add them to your repo before starting Checkpoint 2 development. Files to add to the sys directory:1. memory.c 2. memory.h 3. process.c 4. process.h 5. syscall.c11 CP3.16. heap0.c - This should replace your existing heap0.c and uses your virtual memory functions. trek cp2 - This is a new binary for trek and uses U-mode and system calls. You should place it in yourusr/bin directory.5.2.2 Vicious Virtual MemoryIn operating systems, paging is a memory management technique that allows non-contiguous allocation and efficient use of storage by dividing a process’s address space into fixed-size units called pages. Page tables exist to maintain mappings between physical and virtual memory. When a process accesses a virtual address, the page table is queried to find the corresponding physical address. A page fault occurs when a process tries to access a virtual address that is not mapped to a physical address. If you handle a page fault that occurs within the User-owned virtual memory address space (USER START VMA to USER END VMA) you should allocate a new page and map that address as U-mode accessible. This is known as “lazy allocation” or “demand paging”. For page faults that occur in other virtual memory regions, you should panic.The operating system needs to support both single-page and multi-page allocations. When a process requires memory, the system selects the best-fit chunk from the free page list (the smallest chunk that fits the requested number of pages) to ensure optimal memory utilization. Pages can also be freed individually or in groups to ensure efficient reuse. When memory is no longer needed, in order to prevent security risks and memory leakage, the system must reset. This ensures clearing of non-global pages and freeing the associated memory.Flags are used in memory management to control access permissions for maintaining security and track page usage. They are critical in allocating memory, mapping and unmapping of pages, validating memory access, as well as handling page faults. Access faults occur when a process tries to access a virtual memory address that they do not have permissions to access.Note: This checkpoint will only contain a single memory space. You will not need to create new memory spaces for this checkpoint besides the ”main” memory space.We’ve given you a file, memory.c, where you will implement all the functions declared in memory.h. Keep in mind, many of these functions have overlap and it may be useful to look at the provided helper functions as well as write some of your own. You must write the following functions for this checkpoint:In order to set up virtual to physical page mappings in your kernel, you must have a way to keep track of what physical pages are available to be mapped. To do this, we have created the “free chunk list”. A page chunk is a contiguous region of physical memory addresses. Each page chunk contains a pointer to the next page chunk in the list as well as a size (in pages). Initially, all of the memory from the end of the heap (heap end, which is page-aligned) until the end of RAM (defined in conf.h) are free physical pages. You must modify memory init to place all of these pages (in a single chunk) on the free chunk list.Allocating and freeing physical pages must also interact with the free chunk list. To allocate physical page(s), you should go through the free chunk list and find a chunk that is greater than or equal the number of contiguous physical pages that you need to allocate. If there is no chunk large enough, you can panic. If there is a chunk, you should break off an appropriately-sized piece and provide a pointer to the start of the physical address range that was allocated. To free physical page(s), you can simply place the chunk back on the free chunk list - no need to coalesce chunks together.Extra Credit Opportunity: Implement a more complex memory allocator (coalescing, buddy allocator, 12 CP3.1etc.) and integrate it into your kmalloc function.1. void memory init(void), most of this is given besides the initializing the free chunk list 2. void reset active mspace(void)3. mtag t discard active mspace(void)4. void * alloc phys page(void)5. void * alloc phys pages(unsigned int cnt)6. void free phys page(void * pp)7. void free phys pages(void * pp, unsigned int cnt)8. unsigned long free phys page count(void)9. void * map page(uintptr t vma, void * pp, int rwxug flags)10. void * map range(uintptr t vma, size t size, void * pp, int rwxug flags) 11. void * alloc and map range(uintptr t vma, size t size, int rwxug flags) 12. void set range flags(const void * vp, size t size, int rwxug flags)13. void unmap and free range(void * vp, size t size)14. int handle umode page fault(struct trap frame *tfr, uintptr t vma)Some of these functions may build off of others. Some functions will also be called by functions used toimplement processes (§5.2.3). Your code must meet the functionality requirements outlined in the rubric. Consult Appendix D for more information about virtual memory.5.2.3 Pesky ProcessesThe process abstraction is one of the key abstractions of an operating system. A process can be defined informally as just a ”running user program”. A user often wants to run multiple processes at once which requires common resources like processing power, devices, and memory to be managed.An instance of a process structure contains everything that a process owns and uses internally. Each user process is actually just a wrapper around a kernel thread. What this means is whenever a user process is created, a process struct will have to be initialized to contain the information below:1. An identifier for the current process2. An identifier for the kernel thread related to this process 3. An identifier for the memory space of the process13 CP3.14. A list of I/O interfaces for this process ; remember that an I/O interface can currently represent• A terminal device• An open file• A block device• An in-memory bufferIn this checkpoint, all user processes will share the same memory space, dubbed the ”main” memory space. The execution lifecycle of a process will be as follows1. The kernel launches in S-mode.2. procmgr init is called, creating a process struct around the main thread3. process exec jumps to user mode and starts executing a user program. Effectively turning the main kernel thread into a user process4. When the user process exits, the kernel exitsOur kernel space process API is made up of the functions below. These functions will reside in process.c and should be written by you unless if stated otherwise:1. void procmgr init(void) (Provided)Initializes processes globally by initializing a process structure for the main user process (init). Theinit process should always be assigned process ID (PID) 0.2. int process exec(struct io * exeio, int argc, char ** argv)Executes a program referred to by the I/O interface passed in as an argument. We only require amaximum of 16 concurrent processes.Executing a loaded program with process exec has 4 main requirements:(a) First any virtual memory mappings belonging to other user processes should be unmapped.(b) Then a fresh 2nd level (root) page table should be created and initialized with the default map- pings for a user process. (This is not required for Checkpoint 2, as in Checkpoint 2 any user process will live in the ”main” memory space.)(c) Next the executable should be loaded from the I/O interface provided as an argument into the mapped pages. (Hint: elf load)(d) Finally, the thread associated with the process needs to be started in user-mode. (Hint: An as- sembly function in trap.s would be useful here)Context switching was relatively trivial when both contexts were at the same privilege level (i.e. machine-mode to machine-mode switching or supervisor-mode to supervisor-mode switching), but now we need to switch from a more privileged mode (supervisor-mode) to less privileged mode (user-mode).Doing so requires using clever tricks with supervisor-mode CSRs and supervisor-mode instruc- tions. Here are some tips to consider while implementing a context switch from supervisor-mode to user-mode14 CP3.1i. Considerinstructionsthatcantransitionbetweenlower-privilegemodesandhigherprivilege modes. Can you repurpose them for context switching purposes?ii. If you did repurpose them for context switching purposes, what CSRs would you need to edit so that the transition would start the thread’s start function in user-mode?It’s a useful exercise to try to figure out how such an approach could work with the CSRs and supervisor-mode instructions on your own. However, implementation on its own is a sufficient chal- lenge and we don’t require you to figure this out. You can read Appendix C to find out how you can carry out a context switch between user-mode to supervisor mode.3. void process exit(void)Cleans up after a finished process by reclaiming the resources of the process. Anything that wasassociated with the process at initial execution should be released. This covers:• Process memory space• Open I/O interfaces• Associated kernel threadYou will also have to modify your current threading library to accommodate for processes. To do this you will have to both declare the specified functions in your thread.h file as well as define them in your thread.c file.The following functions will have to be implemented by you:1. struct process * thread process(int tid)2. struct process * running thread process(void)3. void thread set process(int tid, struct process * proc)Youalsowillhavetoaddastruct process * proctoyourthreadstructMore information about the functions that you have to write can be found on the Doxygen site linked on thecourse website.5.2.4 Suspicious SyscallsYou will need to implement a series of system calls (syscalls) for this checkpoint. The user program uses these to request actions from the kernel.The syscalls you must implement for this checkpoint are:1. static int sysexit(void)2. static int sysprint(const char *msg)3. static int sysdevopen(int fd, const char *name, int instno);15 CP3.14. static int sysfsopen(int fd, const char *name)5. static int sysclose(int fd)6. static long sysread(int

$25.00 View

[SOLVED] ITS D005 Database Management and Security 2024

ITS D005 Database Management and Security 25 April 2024 SECTION A Question 1 (a)       Name TWO (2) benefits of storing data in a database, as opposed to a spreadsheet like Microsoft Excel or Google Sheets, noting that in today’s digital age, it is possible to share spreadsheets on cloud services like Google Drive to bypass the data consistency issues they traditionally create.          (6 marks) (b)       What is the difference between data and information? Why is it important for a business to generate information from their data?                 (10 marks) (c)       Demonstrate how the relationship between TEACHER and STUDENT maybe M:N. Draw an ER diagram using Crow’s Feet notation to express this relationship. You may leave out the associative entity and entity attributes if you wish.   (9 marks) Question 2 (a)       What are the TWO (2) conditions for a strong relationship?           (6 marks) (b)       In a database storing employee data, is it recommended to use an employee’s mobile phone number, e.g. +65 91234567, as the primary key? Explain your answers. (10 marks) (c)       Identify all of the steps to convert a table from 0NF to 2NF.            (9 marks) (a)       The following is a snapshot of a database’s AUTHORS table for a famous news site. Leon DeCapriousCakes go bad after25.VillSmithCuckoos are my favouriteanimal.4Ronor MacGregorSecretly a leprechaun.Author ID Email address Post_Title champ4RonorMacGregor[email protected]13Owning [email protected] being bald

$25.00 View

[SOLVED] Analysis Paper Group 3

Analysis Paper Group 3 - Due Apr 20 · Due Sunday by 11:59pm · Points 60 · Submitting a file upload · File Types doc and pdf This assignment section is for students who signed up for Analysis-Paper-Group 3 only.  The due date for this group is Apr. 20th at 11:59 pm.  Please turn on your word count.  Classrooms are not the only places where learning occurs. There are informal learning spaces throughout the community in which people can engage in experiential learning, such as museums, zoos, maker spaces, or other social activities, such as playing games or attending a talk. For this paper, you will experience and write about learning that occurs outside of a traditional classroom environment and analyze your experience through at least two theoretical lenses. To receive the full points, you must write a 1,000-1,300 word report about your informal learning experience that:   1. shows why the space should be considered an informal learning environment, and how it meets (or does not) the four criteria of an informal learning space  2. describes the learning objectives in the space and identifies the key interactive features that contribute to learning (in whatever form. they exist),  3. identifies connections to two main topics from class (with specific definitions and references),  4. and explains your general thoughts about your experience.   You are welcome to use any course readings and must reference at least one academic articles beyond the required readings. Please cite direct quotes and sources (there is no need to cite our class lecture). There will be a variety of perspectives and positions which can be taken when writing these papers, and you may need to think deeply about how to categorize learning. Feel free to check with the instructor if you’re not sure whether a specific learning space or activity is appropriate. The experience MUST occur during this semester; a prior experience will not be allowed. You will be asked to sign up for 1 of 3 due date options to write your paper. The rubric for the analysis paper is available below.  Writing Checklist:  1. Have you BRIEFLY described the space? (This should not take up much space in your paper – a paragraph or two at most.)  2. Have you briefly shown how it meets (or does not) the 4 CRITERIA of an informal learning space? (A sentence for each is sufficient.)  3. Do you explain the space’s learning objectives? (Again, keep this brief and to the point.) 4. Do you address TWO different theories?   5. Do you briefly DEFINE those theories in your own words? (Remember to give credit to key theorists, if applicable.)  6. Do you utilize pertinent TERMINOLOGY and define it (e.g. What is accommodation? What is positive punishment?)?  7. Do you use EXAMPLES from your space to showcase your understanding of the theory? (This should be a big part of your paper, as this is how you can showcase your understanding of the 2 topics in your own unique way, within the context of the informal learning space.)  8. Do you use 1 internal and 1 outside academic articles?  9. Is your paper within the word minimum/maximum?   A “theory” is any topic or theory that is listed in the syllabus each day under the column Topics. Each of the two theories you choose for your paper must be one of the topics listed in this part of the syllabus as a topic for the day. It is recommended, but not required, that you do not choose a theory that we haven’t yet covered in class. You should choose 2 of these possible theories:  - Behaviorism: Classical Conditioning  - Behaviorism: Operant Conditioning  - Social Cognitive Theory  - Individual Constructivism  - Social Constructivism  - Metacognition  - Self-Regulation  - Study Strategies  - Information Processing Theory  - Situated Cognition  - Distributed Cognition  - Embodied Cognition  - Creativity  - Problem Solving  - Identity & Culture  - Motivation & Attributions  - Goals & Mindsets  - Transfer  - Expertise  - Assessment   

$25.00 View

[SOLVED] ELEC9725 Satellite Navigation Systems Signals and Receivers Assignment No3

ELEC9725 Satellite Navigation: Systems, Signals and Receivers Assignment No.3: Individual Investigation Objectives: To investigate a topic related to the course and communicate findings in both a report and presentation. Requirements: In teams of 3, investigate a topic related to GPS receiver design and report on it in a report and then individually students will be assessed in a one-on-one interview. The  interview will be in a 5 minute slot and students will be expected to answer questions about the topic (week 11). The topic must be written up in a technical report, one per  team. A typical report will be about 10-15 pages long (due week 10). You should investigate your topic so you know it well. Then, use ChatGPT or another AI to answer the question. Attach the ChatGPT answer as an appendix to your report. You can expect ChatGPT to i) be wrong in places, and ii) give an incomplete answer. Your task is to correct the wrong information and include what ChatGPT has missed. Focus on the types of areas that have been covered in the lectures. Topics: Topics will be assigned on a “first come, first served” basis, i.e. topics will be assigned once only, to the first who requests that topic. Where the topic says “receiver modifications” it refers to mods required to a standard L1 GPS receiver), i.e. it is assumed that you know how to design a L1 GPS receiver after doing the course, so if you start with that, what changes? Topics are: i)         Receiver modifications for lunar navigation, using LCNS (ESA) ii)        Receiver modifications for lunar navigation, using LNSS (Japan) iii)       Receiver modifications for lunar navigation, using Lunanet (NASA) iv)       Receiver modifications for lunar navigation, using Doppler (unpublished paper Gong and Dempster “Single-Satellite Navigation on Lunar North   Pole”) v)        Receiver modifications for lunar navigation, using Doppler (https://doi.org/https://doi.org/10.33012/2024.19939) vi)       Receiver modifications for LEO signals of opportunity (Kassas method) vii)      Receiver modifications for LEO signals of opportunity (Humphreys method) viii)     Receiver modifications for LEO signals of opportunity (Psiaki method) ix)       Receiver modifications for LEO dedicated positioning (Satelles/Iridium) x)        Receiver modifications for LEO dedicated positioning (Xona) xi)       Receiver modifications for LEO dedicated positioning (Trustpoint) xii)      Receiver modifications for LEO dedicated positioning (ESA’s FutureNAV LEO-PNT IoD) The investigation should discuss the application, note how the signals and systems are different, and either describe what must change from a standard receiver in order to cope with the new signals or clearly describe advantages of one approach over the other. Assessment: Interview: 50% of total mark. These marks will be generated during a five minute interview, with a timetable to be distributed before the day (Monday week 11). Report: 50% of total mark. Guidelines for report writing and a report marking scheme are on the course website. Of the final assessment of the course, this assignment is worth 25%. The approximate minimum investment of student time should be 10-20 hours. Penalties for late submission are described in the course outline. Penalties for plagiarism will be severe. In other words, submissions with sections pasted from e.g. the internet will be marked at a much lower level than they would otherwise.

$25.00 View

[SOLVED] EMET4314/8014 Advanced Econometrics I Semester 1 2025 Assignment 4

Advanced Econometrics I EMET4314/8014 Semester 1, 2025 Assignment 4 (due: Tuesday week 5, 11:00am) Exercises Provide transparent derivations. Justify steps that are not obvious. Use self sufficient proofs. Make reasonable assumptions where necessary. 1. Prove that the OLS estimator βˆOLS for β in the linear regression model is consistent. In your derivation, make use of the op (1) and Op(1) notation! 2. The linear regression model in matrix format is Y = Xβ + e, with the usual definitions. Let E(e|X) = 0 and Notice that as a covariance matrix, Σ is symmetric and nonnegative definite. (i) Derive Var(|X). (ii) Let := C ′Y be any other linear unbiased estimator where C is an N × K-dimensional matrix that is based on X. Following the lecture notes, prove that Var (iii) An oracle tells you Γ. Let and Define the generalized least squares (GLS) estimator This defines the GLS estimator as the OLS estimator of ˜Y on ˜X. Derive Var(|X). How does it compare to Var(|X) from part (ii)?

$25.00 View

[SOLVED] Mgmt 7 Assignment 1 Spring 2025

Mgmt 7 Assignment 1 Spring 2025 Due Saturday April 19 1. Consumer Reports provides overall customer satisfaction scores for AT&T, Sprint, T-Mobile, and Verizon cell phone services in major metropolitan areas throughout the United States. The rating for each service reflects overall customer satisfaction considering a variety of factors such as cost, connectivity problems, dropped calls, static interference, and customer support. A satisfaction scale from 0 to 100 is used with 0 indicating completely dissatisfied and 100 indicating completely satisfied. Suppose that the ratings for the four cell phone services in 20 metropolitan areas are given in the file cellservice a. Consider T-Mobile first. What is the median rating? b. Develop a five-number summary for the T-Mobile service. c. Are there outliers for T-Mobile? Explain. d. Repeat parts (b) and (c) for the other three cell phone services. 2. Chase International provided percent changes in stock markets around the world.  The data shown are percentage changes over the preceding one year period. Country   Percent Change   Country   Percent Change Australia 25.1    Japan   9.3 Austria  -13.4    Luxemburg  7.7 Belgium 9.3    Netherlands  13.9 Canada 8.3    New Zealand  12.6 Denmark 15.3    Norway  -15.4 Europe  10    Pacific   10.3 Finland  -14.5    Portugal  -7.2 France  13.8    Singapore  22.9 Germany 6.3    Spain   11.6 Hong Kong 42.8    Sweden  9.1 Italy  -6.1    United Kingdom 10.6 Ireland  9.6    United States  27.4 a. What are the mean and median percent change among these world markets? b. What are the first and third quartiles? c. Are there any outliers (identify mild and extreme outliers)? d. What percentile would you report for the United States? 3. Time published an article on the academic ability of college athletes.  The article noted that some of the most successful athletics programs have athletes with very good College Board scores. Assume that the following sample data are typical of college board scores for Ohio State football players: 1200, 970, 1040, 1230, 980, 895, 1430, 1050, 970, 950, 1030 a. Compute the mean median and mode. b. Compute the range and interquartile range c. Compute the variance and the standard deviation d. Using Z-scores, state whether or not there are any outliers in this data set. 4. Over the past 40 years, the percentage of homes in the United States with smoke detectors has risen steadily and has plateaued at about 96% as of 2018 (National Fire Protection Association website). With this increase in the use of home smoke detectors, what has happened to the death rate from home fires? The file smokedetectors contains 17 years of data on the estimated percentage of homes with smoke detectors and the estimated home fire deaths per million of the population. a. Do you expect a positive or negative relationship between smoke detector use and deaths from home fires? Why or why not? b. Compute and report the correlation coefficient. Is there a positive or negative correlation between smoke detector use and deaths from home fires? Comment. c. Show a scatter plot of the death rate per million of the population and the percentage of homes with smoke detectors.  What does the plot tell you?

$25.00 View

[SOLVED] HOMEWORK 4 Spring 2025

HOMEWORK #4 Spring 2025 Total Points: 70 Assignment Date: Monday, April 7th. Due Date: Tuesday, April 22nd at 11:59pm (EST). Instructions Read each question carefully and complete all the requirements. While only a subset of the questions may be graded, it is recommended that you attempt all of them. You may discuss homework problems with your peers, but the submitted work must be your own. Identical submissions will receive a zero. Submission Instructions: Submit a PDF file of your solutions to Canvas by the stated deadline. Scanned handwritten solutions in PDF format will be accepted but must be written neatly. It is your responsibility to ensure that the solutions are clear and legible. Late submissions will NOT be accepted! Problem Set Problem 1 (10 points). Let W = (Wt)t≥0 be a Brownian motion and consider the SDEs defining the Geometric Brownian Motion (GBM). S = (St)t≥0, and OU process, X = (Xt)t≥0: dSt = µStdt + σStdWt , S0 = s0, dXt = κ(θ − Xt)dt + σdWt , X0 = x0. Fix ∆t > 0, and let µ = 0.25, κ = 0.2, θ = 1, σ = 0.5 and s0 = x0 = 1.2. From the SDEs we have that: Using this observation, simulate (and plot) 10 paths of the GBM and OU process. You may use any programming language that you are familiar with for this task. Include your code as a separate file in your submission. Problem 2 (10 Points). Let us use the OU process: dXt = κ(θ − rt)dt + σdWt , X0 = x0 ∈ R. where W = (Wt)t≥0 is a P-Brownian motion as a model for the USD/EUR exchange rate. For this purpose download 5 years worth of data from the St. Louis Fed: https://fred.stlouisfed.org/series/DEXUSEU. The coefficients of the OU process can be inferred from a Regression (AR) Model. To be explicit, by letting ∆ = ti+1 − ti a discretization of the OU solution reveals that: where Fit this regression model to the data using a programming language of your choice and report the implied values of κ, θ and σ that you obtain by rearranging the equations for α, β and γ. Then, simulate a few trajectories from your calibrated model and compare them to the original price series. Problem 3 (10 Points). Let W = (Wt)t≥0 be a Brownian motion and let X = (Xt)t≥0 be an Ornstein Uhlenbeck (OU) process; i.e., X satisfies: dXt = κ(θ − Xt)dt + σdWt , X0 = x0. Show that the covariance function of X, c(s, t), is: Problem 4 (15 Points). Compute the mean and variance of the following stochastic integrals. Then, comment on whether or not the integral in ques-tion is normally distributed. Problem 5 (5 Points). Let W = (Wt)t≥0 be a Brownian motion. Argue for the following integration by parts results: Problem 6 (10 points). Let W = (Wt)t≥0 and B = (Bt)t≥0 be Brownian motions with instantaneous correlation ρ. Apply Itˆo’s formula to get the dynamics of: 1. Xt = cos(Wt). 2. Xt = sin(tWt). 3. Xt = (St) p for p > 0 where S = (St)t≥0 is a Geometric Brownian Motion: dSt = µStdt + σStdWt . 4. Xt = exp{Yt} where Y is an OU process: dYt = κ(θ − Yt)dt + σdWt . 5. Xt = StPt where S = (St)t≥0 and P = (Pt)t≥0 are Geometric Brownian Motions: dSt = µStdt + σStdWt , dPt = νPtdt + ηPtdBt . Problem 7 (10 points). Solve the following Stochastic Differential Equations (SDEs): 1. dSt = µ(t)Stdt + σ(t)StdWt where S0 = s0 > 0 and µ(·), σ(·) are deterministic functions of time. 2. dXt = κ(θ(t) − Xt)dt + σdWt where X0 = x0 ∈ R and θ(·) is a deterministic function of time. Hint: Use the same approach as in class for the standard GBM and OU processes.

$25.00 View

[SOLVED] MATH2545 Practical Assignment

MATH2545 Practical Assignment Please read the instructions below carefully. This assignment has 75 marks in total and contributes 15% of your overall module mark for MATH2545. All questions will be given integer marks only. You are asked to use the given Excel spreadsheet template for all calculations. The template file is available on Minerva → Assessment and Feedback.  Before attempting the questions you must • change the Excel file name to lastname firstname studentID.xlsx, • enter your name and student ID into cell B1 and B2 respectively. You can work out the questions in different worksheets inside the template file, but you must collate and clearly state your final answers to all questions (except for the first one) in order on the first worksheet titled “FrontSheet” . You must submit only one Excel file together with a signed academic integrity form. The submission deadline is 17.00 on Friday 02 May 2025.  Late submissions will not be accepted except for mitigating circumstances, which must be filed for before the deadline. Choose two publicly traded stocks and fill in their tickers to cells B3 and B4 in the FrontSheet. For your chosen stocks, work out the following tasks. 1.  On Worksheet Q1, use the function STOCKHISTORY to compute the weekly rates of returns R1, R2  of the chosen stocks S1, S2  over the last 150 weeks.                   [5 Marks] 2. For each stock Si, plot a histogram for its weekly rate of returns Ri.             [10 Marks] 3. For each stock Si, estimate the mean µi  and standard deviation σi  of the weekly rate of returns Ri.  Calculate their correlation ρ .  (If ρ = ±1 choose a different set of stocks and restart.)          [10 Marks] 4. Viewing the histograms as probability mass functions, for each stock calculate the value at risk of the loss  on the rate of returns at confidence level 95%.                   [10 Marks] 5. For the given range of values for the portfolio weight ω1, calculate the expected returns, the standard deviations, and the Sharpe ratios for the corresponding portfolios of the two chosen stocks, and plot the efficient frontier in the µ-σ plane.               [15 Marks] You may adjust the range of values for (ω1,ω2) so that the resulting segment of the efficient frontier in your plot is large enough - it should include the point of the global minimum. 6.  Suppose that a money market account with weekly interest rate 0 .1% is added. Deter- mine the market portfolio and its Sharpe ratio.                  [15 Marks] 7. How does the Sharpe ratio of the market portfolio change if the weekly interest rate decreases? Justify your answer with numerical evidence.                                 [10 Marks]

$25.00 View