Assignment Chef icon Assignment Chef

Browse assignments

Assignment catalog

33,401 assignments available

[SOLVED] CP2414 Assignment 1 Security checklist Web

CP2414 Assignment 1 Security checklist Introduction: This assignment has been divided into two (2) parts: Part I - Identify and analyse threats to a company. Also, research and source appropriate devices/software justifying choices (feasibility, efficiency, etc.). Part II - Design a secured network. Part III – Citation and Referencing. Deliverables: 1.   A single Word document (.docx) – containing all parts. 2.   Font - Calibri 11, Line Spacing 1.5 3.   Use IEEE referencing, see https://libguides.jcu.edu.au/IEEE NOTE: The assignment template can be found at the end of this assignment sheets. Scenario: An Australian mattress in a box company, TheSleepyheads, has grown concerned by the global rise in cybercrime and ransomware. They have asked you to: •   For all branches - Identify and analyse application and networking-based threats to their company; and •   For the Perth branch only - recommend preventative and mitigative technologies and strategies for potential intrusion and attacks on the network. About the company: TheSleepyheads is a growing mattress in a box company consisting of two branches: The Perth (main) branch and the Melbourne branch. Each branch has four departments and there are approximately 40 employees per department. The Perth branch has 1 mail  server, 2 web servers, and 2 database servers. The Melbourne branche is a smaller branch and so it has only 1 mail server and 1 database server. All branches have high-speed networks; however, the traffic can be quite heavy on weekdays. This is especially true for the Perth branch. PartI. Potential Threats You have been provided with a list of complaints from employees about the workstations at TheSleepyheads: • Complaint 1 (Teddy): My computer takes a long longtime to startup and shut down. It seems like there are other programs which I don’t use running when I start my computer as well. • Complaint 2 (Christina): I often get the blue screen of death, my workstation keeps crashing. I found it to be so frustrating. • Complaint 3 (Meredith): It takes forever to download a file from the company servers. It doesn’t even matter what the size or type of the file are. • Complaint 4 (Alex): I’ve got customers and colleagues informing me that I’ve been sending them emails, this is very weird because my job doesn’t really concern sending out emails to my colleagues, let alone customers. • Complaint 5 (Richard): I get a lot of pop-ups on my screen; I have never visited any bad (inappropriate) websites. • Complaint 6 (Joe): The fan in my computer is just so loud. It seems to be spinning really fast and all the time. Even when I am not using it. • Complain 7 (All employees): Difficulty accessing the website, mail and database servers. From the complaints above, you are required to analyse and identify the threat/s (if there are any). You must also make a recommendation on strategies and technologies (i.e. hardware and software) to prevent and mitigate the problems. IMPORTANT NOTE: 1. Your threat analysis and identification should ONLY concern network security and NOT hardware or software. 2. It is possible that the complaints are connected to one another. Part II. Firewall, Honeypot/s, and Other Network Security Technologies Planning and Design for Perth Branch Employing firewalls, honeypots, and other network security technologies can be an effective means of protecting the company networks. As such, you are required to design a network security configuration for the Perth branch of the company. To do this, you will need to consider the existing devices (see  “About  the company”  –  Perth branch ONLY),  the hardware/software solutions you recommended in PartI, and additional honeypot/s. You are required to: 1.   Draw your proposed secure network diagram, including: a.   Firewall/s b.   Other Network Security Technologies (hardware and/or software) c.   Honeypot/s d.   Existing devices (e.g. servers, workstations, router, switches) 2.   Explain and justify the configuration diagram with respect to: a.   The type and placement of each firewall; b.   The honeypot location/s and quantity; c.   The placement and purpose of each piece of hardware/software. Part III. Use correct IEEE referencing style, see https://libguides.jcu.edu.au/IEEE. Suggested Report Structure/Template For the highest marks possible, you should READ THE RUBRIC and submit your report using the following proposed structure: PartI. Potential Threats For each employee complaint: Complaint [number] – [name]: •   Identify the problem/s stated by the employee/s. •    [Identified threat/s] – [Discussion and comprehensive explanation for the identified threat/s] •    Solution – [Recommended solution for threat] Overarching Threat: [If an overarching threat exists you should discuss this here. See IMPORTANT NOTE] Part II. Firewall/s, honeypot/s, and other network security technologies Planning and Design •   Diagram •   Explanation and justification of the proposed configuration.

$25.00 View

[SOLVED] Economics 5850 Labor Economics Spring 2025 Problem set 4

Economics 5850: Labor Economics Spring 2025 Problem set 4 Question 1. Gender Wage Gap – OLS estimation Return to our Project representing Problem Set 1 on the Rstudio cloud computing/collaboration site rstudio.cloud. You used this dataset, and this Project space, for Problem Set 1. (a) Load dataset PS1_data.Rdata as before. This dataset (still) contains more than 20 distinct variables describing the work and demographic characteristics of 31-35 year-old U.S. workers in 2014, as recorded by the National Longitudinal Study of Youth’s 1997 cohort (our nation’s leading panel data resource on young workers, which is developed and maintained by OSU’s own CHRR.) [1 point] Create a subsample containing only women, and a subsample containing only men (recall that self-reported gender categories from this earlier era are narrow). Calculate and report the mean wage among the women workers in our sample and the mean wage among the men workers in our sample. (Note that all sample members in PS1_data work positive hours and have positive wages.) What is the difference between the gender means? (b) Using Ordinary Least Squares, estimate the following Human Capital regression: where outcome Yi represents the ln(wage)) of worker i, Fi is an indicator taking the value 1 if worker i is female and 0 if worker i is male, Si represents the years of schooling of worker i,  and Ei represents the years of work experience of worker i. The final term in (1) is an idiosyncratic error. Subscript. i = 1, … ,n represents the n members of the NLSY97 estimation sample. (This is the Mincer Regression, and has been used to describe the wage returns to schooling and experience by labor economists since Jacob Mincer published this method in the JPE in 1958. But we have modified our Mincer regression to include an indicator for Female.) [1 point] Which coefficient in (1) describes the gender wage gap, controlling for human capital characteristics? [1 point] What is your estimate of this coefficient? Is it significant? Does your estimate of the human capital-controlled gender wage gap favor women or men? By how much? (c) [1 point] Identify the four most common occupations in the dataset, using a tabulation command in Rstudio (or Stata or…). What are they? Re-estimate expression (1) adding controls for occupation. Create four dummy variables. Each dummy variable represents one of the four most common occupations. The dummy is 1 if the    worker has that occupation, and 0 otherwise. Add each of the four dummies to your regression. (What is the omitted occupation in this specification?) [1 point] What is the new gender wage gap coefficient controlling for human capital characteristics and occupation? Is it significant? Does it favor women or men? By how much? 2. Gender Wage Gap – Oaxaca-Blinder Decomposition (a) Return to the datasets you created of female-only and male-only workers. Estimate Human Capital regression (1) in each of these two datasets. (Drop the Fi regressor; its coefficient will  not be identified in a single-gender sample. Now we are estimating the traditional Mincer regression in each gender subsample.) [1 point] Record your estimate of each βcoefficient in the female sample and each β coefficient in the male sample. (b) Calculate the mean of each regressor in expression (1) (schooling, schooling squared, experience squared) for the female-only dataset and for the male-only dataset. [1 point] Record these means. (c) Recall that in the Oaxaca-Blinder decomposition, the: Explained component of the gender wage gap = Unexplained component of the gender wage gap = Using these formulas, and the coefficient estimates and means you recorded above for your female and male worker samples, calculate: [1 point] The explained component of the gender wage gap [1 point] The unexplained component of the gender wage gap. (d) [1 point] What do you think is the most informative estimate of the gender wage gap – the difference in mean wages by gender, as in 1(a)? The gender wage gap controlling for human capital as in 1(b)? Or the gender wage gap controlling for unionization, industry, and occupation – like an expanded version of 1(c)? Why is this your preferred measure?

$25.00 View

[SOLVED] DAT 560G Database Design and Spring 2025 Assignment 4 Part 3

DAT 560G: Database Design and SQL Spring 2025, Mini A Assignment #4: SQL Part 3 Instructions 1. This is an individual assignment. You may not discuss your approach to solving these questions with anyone, other than the instructor or TA. 2. Please include only your Student ID on the submission. 3. The only allowed material is:       a. Class notes       b. Content posted on Canvas       c. Textbook 4. You are not permitted to use other online resources 5. Questions 1 – 6 are auto-graded on Canvas due by 6 am the day of the next lab 6. The other questions are due on Canvas, by the next lab 7. There will be TA office hours. See the schedule on Canvas. Background Renting an apartment with roommates is guaranteed to be a new experience. You’ll make memories with your roommates, learn about their culture and hobbies, and learn how you cope with others in different times. The database here is focused on renting out apartments to people with roommates. The people renting the apartments are one part of the database, but not the important part of it. We are mostly interested in the apartment buildings, and the owners of apartment buildings. An apartment building has information about the date built and the year built. We also maintain information on address, city, and number of apartments in the building. Each apartment may be rented to one, or more, people. Other information we have is the total monthly rent for all tenants and the value of the apartment building, if it were sold. A property manager runs the individual apartment buildings. We also have the gender of the property manager. Buildings (Building, DateBuilt, YearBuilt, Address, City, Apartments, TotalRent, Value, PropertyManager, Gender) The apartment building is owned by a single company, or be several companies. Each company may own one, or more, apartment buildings. They may also only partial ownership of an apartment building. In that case, they would be partners with other companies. The Property attribute in the Ownership relation is identical to the Building attribute in the Buildings relation. (It’s a foreign key.) For each owner we maintain information about what percent of the building that company owns. To give an example, if a building is owned by 3 companies, each with a different share, the ownership fraction for each company could be 33%, or one company may own a larger share. In another case, only 1 company owns the building. In this case, their ownership share would be 100%. Information about the owners includes the city they are in, the number of partners, date the company was founded, and the number of times the partners meet each year. We also have information about the total assets owned by this company (in $M). The company has a manager. The manager’s gender is also kept. Owners (Company, City, Partners, Meetings, DateFounded, Assets, Manager, Gender) For each owner, in each building, we also know the date they purchased their share of the building. (To clarify, each company may have bought their share at a different time.) We also know what percent of their ownership stake has a mortgage on it. In the same building it could be that one owner has a mortgage of 80%, while another does not have a mortgage. Ownership (Property, Company, Percent, PurchaseDate, PurchaseYear, Mortgage) Tenant information in the database includes information about the people renting apartments. Each apartment may have one, or more, tenants. Frequently, roommates rent an apartment together. In addition to the tenants name, gender, and age, we have information about the apartment. This information includes the building name, the apartment number within the building, and the size of the apartment. Information about the lease includes the date this person started to rent the apartment, their monthly rent, and the duration of the lease in months. Since many of the apartments have sublets, renters in the same apartment may have started their lease at different dates. Tenants (Building, Tenant, Gender, Age, Apartment, Size, Rent, LeaseStart, Duration) Database The E/R Diagram for the database is below. Relations: Buildings (Building, DateBuilt, YearBuilt, Address, City, Apartments, TotalRent, Value, PropertyManager, Gender) Owners (Company, City, Partners, Meetings, DateFounded, Assets, Manager, Gender) Ownership (Property, Company, Percent, PurchaseDate, PurchaseYear, Mortgage) Tenants (Building, Tenant, Gender, Age, Apartment, Size, Rent, LeaseStart, Duration) Each of these questions is 10 points. Submit answers to these online on Canvas, by 6 am the day of the lab. They are automatically graded. 1. How many companies have ownership in more than one property? Sort the result by the number of properties in descending order. 2. How many buildings with more than 10 apartments have less than 2 tenants? Sort the result by the number of tenants in descending order. 3. List all tenants whose lease duration is higher than the average duration of all tenants. List the tenant's name, the building they live in, their rent, and duration. Sort the result by tenant name. 4. List the Companies with the letter ‘n’ in their names, whose assets are lower than the average number of assets among all the companies. Sort the result by decreasing order of the assets. 5. Find all the buildings that were built on 04/13/2010. Sort the results by building name and value. 6. List the tenants whose lease started in April 2021. Find the tenant’s name, age, apartment size, and the building name. Sort by the tenant’s name. Each of these questions is 5 points. Submit answers to these on Canvas before the next lab session. They will be graded by TAs. For each question, submit your SQL code and a screen-shot of the results. If the results are too long, partial results are fine. Include relevant attributes for each result, to explain that the result is correct. Do NOT include many unnecessary attributes. Do NOT use SELECT *. 7. List all buildings where both the total rent and the number of apartments are known (not null) and the total rent is higher than twice the number of apartments. Display the building name, city, number of apartments, and total rent. Sort the results in descending order by total rent and show only the top 10 results. DAT 560G – Spring 2025 – Assignment #4: SQL Part 3 8. Find the number of genders and the average size of apartments rented per tenant gender for all buildings except “'Field House'”. Calculate the average size once with AVG function, and once with sum (size)/count. Are they different? Why? 9. Looking for buildings with the letter ‘m’ in their name, find the highest total rent, the lowest total rent, and the difference between these two values. We only want one row with this information. 10. Among buildings with the letter ‘m’ in the file, find the ones with the highest value. Report the building name and value. Also include the city, the built date, and the manager’s name. Use subqueries. 11. For each city, when is the first building built? When is the last building built? How many days passed between the first building built and the last building built in the same city? Sort the results by city name. Do not report Null cities. 12. List all buildings which has part been purchased by a company in 2015 and have a lower value than the average value of buildings with a male property manager. List the building name and its value. Sort the results by descending order of value. 13. For the buildings with more than the average number of tenants, find the owner, city of the owner, and year of founding of the owner company. 14. How much time did you spend on this assignment?

$25.00 View

[SOLVED] EAP111 English Language and Study Skills for Advanced Technology 2024-25

EAP111 English Language and Study Skills for Advanced Technology 2024-25 EAP111 Project: Writing Coursework Task Sheet (Summative) Assignment: Write a Technical Evaluation Report for a Specific Technology (1200+/-10% words) Final Submission Deadline: Semester 2, Semester 2 Week 9 (April 14th), 17:00 Assessment Details •    Assessment Type: Individual •    Learning Outcomes assessed: B, D, E •    Percentage of Module Mark: 20% •    Where to submit: Upload to the designated Dropbox on the EAP111 Learning Mall Page (submission in the wrong drop box will receive a score of 0) •    Academic Integrity Offence: Submission of previously submitted work by yourself or others results in a ‘0’ and an Academic Integrity C, D or E penalty. •    Submissions cannot be changed once the deadline has passed. It is a student’s responsibility to check the correct file is submitted and that it can be opened. Task description In the project section of this module, you will be tasked with demonstrating your in-depth knowledge of a recent technological development by presenting your analysis of one specific example of this development. The writing and research will help you prepare a coherent presentation and enable you to answer interview questions in the speaking coursework assessment. Below are some of the main technological innovations that have emerged in recent years: •     Use of AI in renewable energy systems •     Humanoid robots •     Embodied artificial intelligence •     Space-based solar power •     AR & VR •     Digital twins •     Software-defined networking •     Brain-inspired (neuromorphic) chips Choose one of these areas of technology and analyse a specific example (case, model, etc.). You should ask your teacher to approve your selection before you begin writing. Key Ideas Your report must address the following: 1.    Explain why and how this technology was developed, referencing credible academic literature to support your explanation. This should include the problem it was intended to solve, who developed it and the current state of development. 2.    Describe how a specific example of this technology works through a short, written description of an authentic diagram. 3.    Identify at least two weaknesses/areas for further development within this example of the technology using criteria from the literature. 4.    Provide a conclusion which clearly justifies why this technology is or is not worthy of further development based on your previous analysis, including how difficulties might be overcome Other Important Requirements Failure to follow these will result in points being deducted: Portfolios •    Submit all four relevant portfolio tasks on time in Semester 1 and 2 (see below). Structure •    Include 8 sections: the Introduction, Operating Principles, Critical Evaluation and Conclusion (Key Ideas 1-4 above), with the addition of an Abstract, Table of Contents, Reference List and Source  Integration Chart (as an Appendix); •    write 1200 +/-10% words excluding Abstract, Table of Contents, Reference List and Source Integration Chart; Reference and citation •    Use a minimum of 7 English-language sources with at least 5 being academic; •    Cite and reference all sources using the IEEE referencing style. Formatting All written assessments must use the following formatting requirements: •    File Type: MS Word .DOC or .DOCX •    Filename: EAP111_Technical Report_Student ID (e.g., EAP111_Technical Report_1911111) •    Font Type: Tahoma •    Font Size: 10 - 12 •    Line Spacing: 1.5 Writing Coursework Portfolio: As part of your writing coursework, you are required to complete a portfolio that includes the following four components. Failure to submit all 4 tasks on time (Late Policy does not apply) will result in a 10-point deduction from your writing grade. Together the four parts make up your Project Writing Coursework submission. Portfolio Task 1 (Introduction section): An introduction to the technology and specific example must cite previous research to explain its historic development and current state. This section should: •  explain how and why this technology was developed, what problem it was meant to solve and who was involved in the development; •  outline the specific example you will be analysing and the current state of development (Is the technology in use yet? If so, by whom?); •  cite and reference at least 3 English-language academic sources using the IEEE referencing style; •  have a length of 400 +/-10% words; •  include a detailed Source Integration Chart. Portfolio Task 2 (Operating Principles section): The specific working principles of this example of the technology should be demonstrated visually and in writing. This section should: •  demonstrate the technology’s operating principles using authentic diagram(s) or figure(s) with appropriate captions; •  describe the diagram and any technical terms in language that can be understood by a layman (non-expert); •  provide an explanation of any technical terms used; •  cite and reference at least 1 English-language source using the IEEE referencing style; •  have a length of 150 +/-10% words; •  include a detailed Source Integration Chart. Portfolio Task 3 (Critical Evaluation section): An evaluation of the chosen example of this technology should highlight weaknesses or areas for further development. This section should: •  identify at least two weaknesses/areas for further development within this example of the technology using criteria from the literature. •  provide an explanation of the criteria and any technical terms used; •  identify specific solutions to the problems, or explain why there are no current solutions available; •  include a topic sentencefor each paragraph. •  cite and reference at least 3 English-language academic sources using the IEEE referencing style; •  have a length of 500 +/-10% words. •  include a detailed Source Integration Chart. Portfolio Task 4 (First Draft): This is a complete draft of the technical report and should include all required sections from the Abstract to the Reference List. It should: •  be a complete draft including all 8 sections: Abstract (100 to 150 words), Table of Contents (indicating the page number of each section), Introduction, Operating Principles, Critical Evaluation, Conclusion, Reference List and Source Integration Chart (in Appendix); •  cite and reference a minimum of 7 English-language sources (with a minimum of 5 academic sources) using the IEEE referencing style; •  include a Conclusion of approximately 150 words which clearly justifies why this technology is or is not worthy of further development based on your previous analysis; •  have a total length of 1200 +/- 10% words (excluding Abstract, Table of Contents, Reference List and Source Integration Chart).  

$25.00 View

[SOLVED] COMP3425 Data Mining S1 2025 Undergraduate Assignment 1

COMP3425 Data Mining S1 2025 Undergraduate Assignment 1 Maximum marks 100 Weight 20% of the total marks for the course Minto pass hurdle 30% Length Maximum of 8 pages excluding cover page, bibliography and appendices. Layout A4. At least 11 point type size. Use of typeface, margins and headings consistent with a professional style. Submission deadline 9am, Tuesday 11th March Submission mode Electronic, PDF via Wattle, file-name includes u-number Estimated time 15 hours Penalty for lateness 100% after the deadline has passed First posted: 17 February, 8am Last modified: 17 February, 8am Questions to: Wattle Discussion Forum This assignment specification may be updated to reflect clarifications and modifications after it is first issued. You are required to submit a single report in the form. of a single PDF file with a file-name that includes your University u-number ID.  The first page must have a clearly identified title and author, with both name and university u-number, which may form. a separate cover page. You may also attach supporting information as appendices in the same PDF file. Appendices will not be marked. This is a single-person assignment and must be completed on your own. You must use quality reference material and carefully reference via in-text citations, including material provided to you in the course. Any material that you quote must have the source clearly referenced. It is unacceptable to present any portion of another author's work as your own. Anyone found doing so will be penalised in marks. In addition, ANU plagiarism procedures apply. This course introduces fundamental concepts that could potentially be addressed by certain Generative AI tools (e.g., ChatGPT). Hence, the use of any Generative AI tools is not permitted in graded assessments within this course. You are strongly encouraged to start working on the assignment right away. You can submit as many times as you wish. Only the last submission at the due date will be assessed. Task The Australian Computer Society Code of Professional Conduct 2014 is expected to be applied by all Computing Professionals in Australia.  It sets out six values but stresses the primacy of the public interest as the overriding value. In 2018, the Australian Government Office of the Australian Information Commissioner released the Guide to Data Analytics and the Australian Privacy Principles (APP). In 2022 UNESCO published the Recommendation on the Ethics of Artificial Intelligence (SHS/BIO/PI/2021/1) for voluntary application by Member States. The recommendation is broad in scope and far-reaching in implementation responsibilities over the whole AI system lifecycle. It includes a statement of values and 10 principles that should be respected by all actors in the AI lifecycle, including “ data scientists, end-users, business enterprises, universities and public and private entities” (p10). These three documents must be read and are provided with this assignment specification You must also read the paper, Clarke R. (2018),  “Guidelines for the Responsible Application of Data Analytics” Computer Law & Security Review 34, 3 (Jul-Aug 2018), that is provided with this assignment specification and hereafter referred to as the Guidelines. You must also read the paper, Du, Liu and Hu, (2020) “ Techniques for Interpretable Machine Learning”, Communications of the ACM 63(1) that is also provided with the assignment specification. You are to consider the application of the ACS code of conduct, the 10 UNESCO Principles, Clarke’s Guidelines and Duetal’s Techniques to the following fictitious ad targeting scenario. You may also use the APP guide, where it is helpful. Ad Targeting Scenario (from Clarke R. (2016) “Big Data, Big Risks”, Information Systems Journal 26, 1 (January 2016) 77-90, PrePrint athttp://www.rogerclarke.com/EC/BDBR.html A social media service-provider accumulates avast amount of social transaction data, and some economic transaction data, through activity on its own sites and those of strategic partners. It applies complex data analytics techniques to this data to infer attributes of individual digital personae. It projects third-party ads and its own promotional materials based on the inferred attributes of online identities and the characteristics of the material being projected. The 'brute force' nature of the data consolidation and analysis means that no account is taken of the incidence of partial identities, conflatedidentities, obfuscated identities, and imaginary,fanciful, falsified and fraudulent profiles. This results in mis-placement of a significant proportion of ads, to the detriment mostly of advertisers, but to some extent also of individual consumers. It is challenging to conduct audits of ad-targeting effectiveness, and hence advertisers remain unaware of the low quality of the data and of the inferences. This approach to business is undermined by inappropriate content appearing on childrens' screens, and gambling and alcohol ads seen by partners in the browser-windows of nominally reformed gamblers and drinkers. You must answer the following questions, clearly indicating which question you are answering within your submission. The page lengths suggested for each question here are for guidance only; the given page length limit for the overall assignment is mandatory. Question 1.  (1 page) Consider the ACS code of conduct. For each of the six values, taking account of any relevant sub-parts, discuss whether the value was demonstrated in the scenario and to what extent. If you assess any value as largely irrelevant to the scenario, then a very brief reason for this assessment is sufficient. Question 2. (1/2 page) Consider the 10 UNESCO Principles [S III.2]. Looking closely at Principle Proportionality and Do No Harm [p20], discuss how this principle is applied (or not) in the scenario and identify any potential harm that might have ensued. Question 3.  (2 pages) Consider the numbered guidelines in Table 2 of Clarke’s Guidelines for the responsible application of data analytics. From every segment (1 General, 2 Data Acquisition, 3 Data analysis, and 4 Use of the Inferences) choose one guideline that you consider would have been applied in the scenario. Its application may not be explicit in the scenario description, but it should be relevant and important to the scenario and you can argue that it was applied properly and therefore did not contribute to the negative consequences of the scenario. Explain its role in the scenario including how it would have contributed to positive outcomes. Justify why it is more relevant than everyone of the other guidelines that you consider would have been applied in the same segment. Argue how it is more or less relevant than any guidelines in the same segment that you consider may have been disregarded in the scenario.  Be careful to consider the intention of the guidelines rather than an overly literal interpretation; you may rephrase the chosen guideline for the scenario context where beneficial. For further explanation of this point, see Section 3 in Clarke’s Guidelines. Question 4. (1 page) (a) Choose one, numbered guideline (e.g. guideline 3.3) in Table 2 of the Guidelines that you consider to have been disregarded in the scenario. You may choose any guideline that you did not choose for Question 3.  Discuss how the failure to consider the guideline could have contributed to the negative outcome of the scenario. (b) In addition, identify any other potential consequences that could have occurred due to the failure to consider that same guideline. For this purpose, the consequences you identify are not necessarily explicit within the scenario description.  You might find it helpful to think of this activity as contributing to a risk assessment process prior to your hypothetical involvement in the analysis work of the scenario. Question 5. (1 page) Consider the paper by Duetal, Techniques for Interpretable Machine Learning. Discuss whether and how intrinsic and post-hoc interpretability techniques could be applied to the scenario and what benefits could ensue. General Comments An abstract or executive summary is not required.  A cover sheet is optional and does not contribute to the page count. No particular layout is specified, but you should follow a professional style. and use no smaller than 11 point typeface and stay within the maximum  specified page count.  Page margins, heading sizes, paragraph breaks and so forth are not  specified but a professional style must be maintained. Text beyond the page limit or word   count limit will be treated as non-existent. Appendices maybe used and do not contribute  to the page count, but appendices might be only quickly scanned or used for reference and will not be specifically marked. You must properly attribute the source documents provided for your assignment (but not this assignment specification itself) and any other reference materials you choose to use. You are not required to use additional materials. No particular referencing style is required. However, you are expected to reference conventionally, conveniently, and consistently. Your references should be sufficient to unambiguously identify the source, to  describe the nature of the source, and also to retrieve the source in online and (if possible) traditional publisher formats. An assessment rubric is provided. The rubric will be used to mark your assignment. You are advised to use it to supplement your understanding of what is expected for the assignment and to direct your effort towards the most rewarding parts of the work. Your assignment submission will be treated confidentially, but it will be available to ANU staff involved in the course for the purposes of marking.

$25.00 View

[SOLVED] Earth Atmosphere and Ocean - Chapter 2 - Greenhouse model and Climate sensitivity

ENVST-UA0360 - MATH-UA0228 Earth Atmosphere and Ocean - Chapter 2 - Greenhouse model and Climate sensitivity The homework focuses on energy balance and the greenhouse effect. Feel free to use some of the Jupyter Notebooks used in class, but make sure to explain how you got to your answers. 1. (10pt) The Voyager 1 probe was launched in 1977 and aims at exploring outer space. As it moves further and further away from the Sun, the amount of energy it receives from the Sun decreases as where S0 = 1360W/m2 is the solar constant, rE(= 150e9m) is the distance between the Sun and the Earth, and r is the distance between the Sun and the probe. Assuming that the probe is a sphere of albedo 0.1, determine its temperature as a function of r. 2. (30pt) Consider that the Earth behaves as a leaky greenhouse as in section 2.3.2. (a) Find its surface temperature assuming that the incoming solar radiation is S0 = 1368Wm−2, its albedo is α = 0.3, and the emissivity of the atmosphere is ϵ = 0.7. (b) Consider that the increase in atmospheric carbon dioxide corre-sponds to an additional heating of 4Wm−2 . Find the change in surface temperature necessary to increase the infrared emission at the top of the atmosphere by 4Wm−2 if the emissivity is constant. (c) Under the same condition as above, find the change in surface temperature if the emissivity increases by 0.01 per degree Kelvin. 3. (30pt) In the leaky greenhouse model discussed in class, emissivity is capped at 1. However, some planetary atmospheres, such as that of Venus, are extremely opaque to infrared radiation. To model this, we treat the atmosphere as multiple layers of absorbing greenhouse. We consider the greenhouse effect induced by a ’two-layer’ atmosphere like the one represented on Figure 2.9. of the textbook. The atmosphere is made of two fully absorbing layers, A and B - meaning that each layer absorbs all radiation coming from above and below it. (The lower layer (B) absorbs all the radiation coming from the top layer (A) and the surface. The upper layer (A) absorbs all the radiation from the lower layer.) (a) Write the energy budget from both the atmospheric layer and the surface. (b) Solve these equations to determine the temperature of each layer and for the surface, assuming a solar constant of 2600 Wm−2 and an albedo of 0.75.

$25.00 View

[SOLVED] Systems Engineering Functional Safety WM-984-15

Systems Engineering & Functional Safety WM-984-15 Recorded assessment brief In this assessment, you are asked to develop an engineering project following the System Engineering (SE) V method and SE life cycle. The project is focused on the development of a battery charging system for automotive applications based on renewable energy sources. Following the SE approaches, the project must consist of: · SE methods presentation and analysis; · V-method application presentation and analysis; · Customer needs requirements · Concept development · Global and cascaded requirements to each of the central sub-systems. · Functional analysis. · Pre-development and high-level engineering design. · Interface analysis and design verification Please follow the guidance file SEFS IMA project.pdf available in Moodle.  The input parameters must be specified in the ranges according to the guidance given on page 16. Time limit 15 min (+/- 10%) Expectations for the submission Video format MP4, PowerPoint PPTX. Module learning outcomes (numbered) LO 1. Critically evaluate the Systems Engineering methods and approaches for the entire System Engineering life cycle, showing their application in the Electric Drivetrain systems. LO 2. Evaluate customer needs, interpret the global requirements and cascade requirements to the sub-systems in advanced complex Electric Drivetrain systems. LO 3. Systematically define the concept of operation, functional analysis, high-level and detailed engineering design procedures for Electric Drivetrain systems. LO 4. Systematically define Electric Drivetrain sub-systems assembling, testing and validation procedures, along with risk assessment and risk mitigation techniques. LO 5. Comprehensively apply functional safety principles, HARA and ASIL evaluation in the design of complex Electric Drivetrain systems. LO 6. Demonstrate the V-method application with a specific case study   Learning outcomes assessed in this assessment (numbered) LO1, LO6   Marking guidelines In addition, please consider the following points: · It is important that you present your assignment at sufficient depth to demonstrate your attainment of the Intended Learning Outcomes (ILOs) for this module. · You should expect to spend approximately 60 hours on this assignment (this includes time spent on information gathering, research etc. but is additional to the time spent during the taught week). · Your assignment must be written in a technical/academic style. · You should on a variety of high-quality references to demonstrate learning beyond the taught material. · Specific references to the course notes, aside from the practical activity briefing sheets, is not permissible. · The format of the presentation should be a single, concise document. · Relevant diagrams and calculations should be included. · The assignment will be assessed as a monochrome printout so diagrams and graphs should be labelled accordingly. · An extensive quantity of data tables, spreadsheets or print-outs of models is not appropriate but could be described with concise examples to evidence their use. · Sanitisation of the results, particularly from lengthy or complex calculations, is strongly encouraged.

$25.00 View

[SOLVED] Assessment 1 In-Class Test General Information

Assessment 1: In-Class Test, General Information. Assessment Brief Assessment Details The Task: This is an individual assessment. There will be 4 tests in the semester worth 5 marks each. The test will use multiple choice questions and will be administered during class time as per the teaching schedule outlined in the syllabus. You will have 10 minutes to complete the test. You must be present at the commencement of the test in your enrolled lectorial to receive the password and undertake the test. You should prepare for these by reviewing the materials presented on Canvas, studying your textbook and attempting the practice quizzes provided under the weekly modules. The quiz will be on the topic of the week. Submission Instructions: Assessment must be submitted using electronic submission in Canvas. Hard copy or email submissions will not be accepted. Marking criteria: Knowledge of basic concepts covered in relevant readings and learning materials. Using a range of question styles, you will be assessed on your ability to recall, as well as demonstrate understanding, and application of the theory. Oral feedback will be given in-class following the test. Online feedback will be available after Sunday midnight at the end of the test week. You must do the quizzes during the assigned time period! Instructions: Once you enter the quiz, you will have 10 minutes to answer the 10 questions. After 10 minutes, the test will automatically close. Each question has five choices. You will need to select the most correct answer. Each correct answer is worth 0.5 marks. You have only one attempt. Please ensure your internet connection is stable. Do NOT close your browser until you have finalised your submission.

$25.00 View

[SOLVED] ENVST-UA0360 - MATH-UA0228 Earths Atmosphere and Climate Homework 3Haskell

Homework 3 Earth’s Atmosphere and Climate ENVST-UA0360 - MATH-UA0228 Due: Monday, February 24th The homework focuses on hydrostatic balance and convection - Chapters 3 and 4 in Marshall and Plumb. Show how you obtained your answer. You only need to get numerical answers with 2-digit accuracy. Please submit it through Brightspace. 1. (10pt) Starting from the hydrostatic balance show that the air mass per unit area is given by ps/g, where ps is the surface pressure. Use your answer to estimate the mass of air per unit area and the total mass of the atmosphere. 2. (20pt) Consider an Earth-like atmosphere at a uniform. temperature of 255K in hydrostatic balance and surface pressure of 1000hP a. (a) Consider the level that separates the atmosphere into two equal parts in mass (i.e. half the mass is above and half is below that level). Find the pressure, altitude and air density at that level. (b) Repeat the calculation above, but for a planet where the gravitational acceleration is 3ms−2 and the atmosphere is 100% carbon dioxyde, with a molar mass of 44 grams per mole. 3. (20pt) We consider a column of water where the density is given by We take two liquid parcels of the same volume ∆V , one initially at level z1 and density (z1) and the second at a lower level z2 < z1 and density (z2). (a) Compute the combined geopotential energy of the two parcels (E = mgZ). (b) Compute the combined geopotential energy of the two parcels after they’ve switched positions (i.e., the first parcel moves to z2 and the second to z1). Determine under which values of λ the geopotential energy would decrease after the switch. (c) Compare this to the stability conditions (eq. 4-5) and discuss how these are related to each other. 4. (10 pt) In the absence of heating and moisture, the tempertaure of an air parcel evolves as where g is the gravitational acceleration, Cp is the specific heat at constant pressure (Cp = 1007Jkg−1K−1 for dry air) and w is the vertical velocity. (a) Show that the quantity E = CpT + gZ is conserved during the ascent of an air parcel (i.e. we have  = 0). (b) Consider now an atmospheric column where the temperature profile is given by where Γ is an arbitrary parameter. An air parcel from level z1 and temperature T(z1) is displaced upward by 1 km. Find its new temperature and determine its buoyancy. (c) For which value of Γ is the atmospheric column convectively stable or unstable. Explain your answer based on question 4b.

$25.00 View

[SOLVED] HUMN 305 Spring 2025 Process Paper II Intergenerational Relations

HUMN 305 Spring 2025 Process Paper II: Intergenerational Relations For this second paper,please consider what healthy intergenerational relations feel like for you,and how they might be repaired or healed if damage or harm have occurred. Describe the way intergenerational relations are narrated or described in one of the course readings,and/or draw upon other sources that feels relevant to this question. Some questions to consider as you approach the paper are: ·What have been some of the most inspiring examples of intergenerational relations that I have either witnessed or experienced somehow?How is love and/or care expressed or shown? ·    Are there others who've written or made art or created projects around intergenerational relations that have influenced me?Refer to these sources if so. ● What are the barriers or challenges to having healthy or strong intergenerational relations that sometimes have to be overcome? Papers will be evaluated based on the following criteria: ·    How thoughtful,observant,or insightful is the paper? ·    Is there a good balance between specificity(precise language,examples etc) and attention to general patterns or structures over time? ●  Have you effectively demonstrated your process of learning?This could involve articulating what you've become more conscious of through the process of paying attention to these questions. Please upload your paper on the course website by March  10,2025,or hand in a hard copy in class. This is worth 15%of your grade.Please use MLA format,type in a 12-point font,and double space your essay. Expected length:roughly 1000 words (4 pages)though more is fine. Options: 1.Make a video or an artwork in response to these questions and include a short 2- page artist statement to accompany it.Or write a graphic essay 2.Propose something else you'd like to do that helps you to learn about how to cultivate healthy intergenerational relations.

$25.00 View

[SOLVED] Pre-Approved Software Development Project for COMP693

Pre-Approved Software Development Project for COMP693 If you choose to do this project as an Independent Learning Project for COMP693, you do not need prior approval from the Examiner. Overview COMP693 requires you to use (or develop) highly specialised knowledge, some of which is at the forefront of what is known. You will need to use this knowledge to develop and apply new skills independently to an existing or emerging problem. Your COMP693 project must therefore extend you beyond what have been taught in the Master of Applied Computing and your project must be at a sufficiently advanced level. As an example you might, create a web application as a software solution to a real-life problem. You will apply Agile Methodology, use GitHub for version control, and deploy the application. The project involves planning, designing, building, testing, and deploying. You will learn and apply new technologies and skills. Problem, Context and Scenario You need to determine this yourself. What is the problem that your solution will solve? Describe the context that the problem exists within, and how will your work solve the problem. You can describe a scenario for your solution, so that it can be evaluated in this context. Determine how you will know if your solution will solve the problem presented. Requirements Planning  Requirements Documentation: List of functional and non-functional requirements.  User Stories: A full set of user stories with acceptance criteria, estimation, and prioritisation, loaded onto a Jira Scrum Board. Design  Responsive Design: Ensure the application adapts to different screen sizes.  Wireframes: Create wireframes for all main screens (suggest using a free account on Figma).  Style. Guide: Include fonts and colours. Style. your app based on the Guide.  System Architecture Diagram  Database Design: ERD Diagram & Database Tables and Record Creation Scripts Testing  As a Minimum: o Unit Testing: Write and execute unit tests for individual components or functions of your application. Ensure that key functionality works as intended. o Integration Testing: Test the interaction between different modules or services within your application to ensure they work together correctly. o User Acceptance Testing (UAT): Conduct UAT by involving real users (e.g., fellow students) to validate that the application meets the requirements and is user-friendly. Development  Use GitHub: o We will create a GitHub repository for you (like in COMP639). You must use this provided repository. o Make regular commits (these will be checked). o Include the following in your repository:  All files for the web app.  Deliverable documents.  A requirements.txt file listing all required packages.  Scripts for database creation and record population.  A detailed README file. Deployment  Deploy the application on PythonAnywhere or another hosting platform. if your chosen technology stack is incompatible with PythonAnywhere.  Host your system, including the database.  If using PythonAnywhere, add "lincolnmac" as your "teacher" via the site configuration. Technology Stack Select from these technologies to self-learn and apply, noting that you MUST NOT replicate a COMP639 style. python/flask/MySQL project. You need to level up the complexity from COMP639. Be sure to research compatibility when choosing a combination of technologies, as not all frameworks, databases, languages and deployment platforms work seamlessly together. Database           Frameworks                                                                   Languages MySQL              Laravel, Flask, Spring Boot, Django, Express.js                   PHP, Java, Python, JavaScript. (Node.js) Postgres            Ruby on Rails, Spring Boot, Django, Express.js                   Ruby, Java, Python, JavaScript. (Node.js) MongoDB           Express.js, MEAN/MERN Stack, NestJS, Meteor.js                JavaScript. (Node.js), TypeScript. SQLite               Flask, Django, Kivy, Electron                                              Python, JavaScript. (Node.js), Java You could also learn and apply another programming language, but be aware of its complexity, it may be difficult to manage within the allocated time period. Deliverables  Requirements Documentation  User Stories: Loaded onto a Jira Scrum Board.  Wireframes  Style. Guide  System Architecture Diagram  ERD Diagram  Database Tables and Record Creation Scripts  Source Code: All files for the web app, including a requirements.txt file.  GitHub Repository: Regular commits on the provided repository.  Testing Documentation: Proof of unit testing, integration testing, and user acceptance testing.  Deployment: A deployed version of your application on PythonAnywhere or another hosting platform.  README File: A detailed README explaining how to set up, run, and use the application.

$25.00 View

[SOLVED] SCM330 SS24 Service Sector Summary

Service Sector Summary SCM330: SS24 2025-02-03 Assignment Introduction You will develop a data-driven summary of a service sector.  The deliverables are a written report and a presentation during the last week of class (or finals week). We may also have mini-updates throughout the course as the schedule allows. The purpose of this assignment is two fold: (1) To give you practice scraping internet data and expose you to the inherent challenges of analyzing raw data — most of the rest of your data given to you for cases is clean. (2) To expose the class to the differences between service sectors. To accomplish this, you will summarize a service sector of your choice using (primarily) data from the Beareau of Labor Statistics (BLS). I will provide a survey for you to indicate your preferences as to which service sector you’d like to study.  I will give preference to those who have, are, or will be employed in a specific service sector (below the subsector). The BLS classifies services into the following supersectors and sectors as shown here and listed below (note that you should choose a subsector with a 3 number NAICS code, e.g., Truck Transportation: NAICS 484): • Trade, Transportation, and Utilities – Wholesale Trade (NAICS 42) – Retail Trade (NAICS 44-45) – Transportation and Warehousing (NAICS 48-49) – Utilities (NAICS 22) • Information – Information (NAICS 51) • Financial Activities – Finance and Insurance (NAICS 52) – Real Estate and Rental and Leasing (NAICS 53) • Professional and Business Services – Professional, Scientific, and Technical Services (NAICS 54) – Management of Companies and Enterprises (NAICS 55) – Administrative and Support and Waste Management and Remediation Services (NAICS 56) • Education and Health Services – Educational Services (NAICS 61) – Health Care and Social Assistance (NAICS 62) • Leisure and Hospitality – Arts, Entertainment, and Recreation (NAICS 71) – Accommodation and Food Services (NAICS 72) •  Other Services (except Public Administration) – Other Services (except Public Administration) (NAICS 81) Report Instructions Your analysis report and presentation must be reproducible. That means it must be completed in code (not excel) and you must access the BLS data through the API (see instructions below). This can be done on DataCamp datalab or through an interactive notebook (Rmarkdown, Quarto, Jupyter Notebooks, etc.). I will run your code to and build your analysis from scratch. The minimum requirements — completing all of which will earn an undergraduate a “B” — include: • Identify the primary customer inputs for businesses in this sector and classify them according to the UST •  Download and analyse employment and wage data for your subsector •  Run and interpret at least 1 regression, including assessment of assumptions •  Make at least 1 custom visualization •  Summarize some key recent news or trends in your subsector. If you are a graduate student, you have an additional task to achieve a “B” . • If you are an MSBA student, you must apply an analytical method not discussed in this class. You will explain this method to the class in your presentation. • If you are an MBA student, you must profile at least 1 company in the sector including a summary of their competitive strategy. All students desiring an “A” should bring in additional context using extra data. There many different datasets on the BLS website alone, not to mention other government data.  News articles often cite government data in the captions of figures if you need inspiration.  You also have free access to Statistica and many other data sources because Lehigh pays for them (Note: you probably need to be on Lehigh WiFi or the VPN to gain full access). Other open source data API’s can be found on CRAN/Task Views/OfficialStatistcs. As an example, if studying Accommodation and Food Services sector, you could use data from Statistica to analyse the change in customer satisfaction index scores of Starbucks. TRAC Fellows You are fortunate to have access to TRAC Fellows for this assignment. Since this is a semester long project with some open ended requirements, you can take this many different directions.  The TRAC Fellows are trained to help you with the precise kind of assignment.  Please check the Syllabus for more details about the TRAC program, what the fellows will and will not do, and how to get the most out of your interactions. Example BLS Data Pull I’m going to look at the employment in the Other Services (except Public Administration) sector. To get this data, I first need to install the package. Documentation about the package can be found here. install.packages( ' blsR ' ) I then need to load the package (I’m also loading the tidyverse for analysis purposes). library(blsR) library (tidyverse) Take a look at the instructions for the main function we’ll use to query the BLS API by running the following command: ?get_series_table You’ll notice we need to provide a few pieces of information to the function:  series id, api key, and although optional, start and end years. Lets start by setting our API key for the session. You will need to get your own API key by following this link. # Manually  set API key for session bls_set_key ( "enter_your_key_as a character") One thing to note is that the BLS API limits the number of years within a time series to 20 years. If you try more than 20 years, you’ll get an error. So, if the time series we’re interested in is greater than 20 years, we can build our own function to interactively query the API on 20 year increments by breaking our time series into chunks of start and end years.  We can then compile a cumulative data frame using a function from the purrr package, which is a part of the Tidyverse. # Create function  to  iterate the  API  query bls_query  

$25.00 View

[SOLVED] ITGD2023 V0Hea13 DATABASE DESIGN AND MODELLING

Individual Assignment ASSIGNMENT REQUIREMENT MODULE       : DATABASE DESIGN AND MODELLING COURSE : DICT/DNDFC CODE : ITGD2023 V0Hea13 OVERVIEW In this assignment student will demonstrate their understanding in relational database design and modeling by completing a project assigned. Students will also demonstrate their skills in implementing the design database and perform. data entries, date retrieval and data manipulation using with Structured Query Language (SQL). ASSIGNMENT REQUIREMENT Project: Database Design for Human Resource - Project Management You’re appointed as  Database administrator to Harvest consulting. Your first assignment  is to advise your client on how to manage human resources for projects. Your ideas to include how to analyze the logical database design , physical data model, establish relationship, create tables, and manipulate records using Data definition and data manipulation language You and your team are highly advised to conduct some research and to get better understanding on human resource data in relation to project management. You may refer to advised  reference books in  the course and internet  resources. Below is the Project Management Report, which describes projects being worked upon by employees. Project Management Report Project Code: PR001 Project Title: Human Resource System Project Manager: Alexander Jimskie                                               Project Budget: $200000 EmployeeID               Employee Name              Department No               Department              Hourly Rate E0001                         Clara Miller                       1                                      IT                             $100 E0002                         Sarah Lim                         2                                      Finance                      $50 E0003                         Dorothy Jabines                1                                       IT                             $75 E0004                         Sham Moh                        3                                       HR                            $60 E0005                         Philp Kohler                      3                                        HR                            $50 E0006                         Nancy Vale                       2                                        Finance                      $150 E0007                         Christy John                      1                                       IT                              $120 E0008                         Mary Kone                        1                                        IT                              $200 Task 1 - Convert the Report from un-normal form into third normal form. Provide appropriate name for each Entities and attributes. Find the primary, Foreign and composite keys. 12 Marks Note: .   Find Un-Normalized form data .   Convert un-normalized set to 1NF .   1NF to 2NF .   2NF to 3NF .   In between the process of normalization find out Primary, foreign and Composite keys. .   Discuss the steps of normalization while carrying each NFs. .   Use appropriate  tool to do the task Task 2 25 Marks 1)   Key in appropriate records for all the tables. (Sample, take from the project report given and add further meaningful records in the derived tables. Note: Minimum 20 records in Employee table and other tables any number  of records) 2)   Display Employee Name belongs to department either IT or Finance 3)  Count No of  Employees whose Hourly rate above 50 4)   Find employee names starts with ‘S’ 5) Display Department Name and Sum of Hourly Rate for each Department. Sample Output: Department Name Total Hourly Rate Finance $125 HR $110 IT $175 6)   Display department name with Number of employees less than 5 Numbers 7)   Display Employee name and Department name,  who has maximum and minimum salary 8)   Display No of employees , Department name in each department. 9)  Create a procedure to display Employee Name and Department Name whose Hourly rate is  above 100. 10) Count number of employees deployed for each Project Note: Use SQL software, Do Joins in query wherever applicable. All the tables with data and SQL query along with its output for each task should be provided in word file. Submission procedure: . Submit your work to black board>Assignment  submission  link on or before the due date. . Submit your final work in the word document by following the file name as Student name-Assginment.docx. . Submission to include the  following in the same order: 1)    Cover page included  with Module Name, Module  code, Student Name, signature , Lecturer Name and Due Date 2)    Assignment Question  all pages 3)    Assignment  Answers , clearly indicating  Task Number and answer. Note: Late submission not  acceptable without valid reason.  Everyday late will reduce 5% of total  marks for each day. Plagiarism check will be done by lecturer. If found that the work is copied work from other assignments and internet resources, will be given 0 marks Marking guide Task 1 3 marks for finding data set using Un-Normalized form(3*1=3 Marks) 3 marks for each normalization(1NF,2NF,3NF including Primary and composite keys, 3 * 3=9 Marks) Task 2 Question 1 3 marks Question 2 3 marks Question 3 2 marks Question 4 2 marks Question 5 2 marks Question 6 2 marks Question 7 2 marks Question 8 2 marks Question 9 3 marks Question 10 3 marks Demonstration(5 minutes in Last lesson) 4 marks

$25.00 View

[SOLVED] Time Series Analysis

Time Series Analysis Coursework Handout: Tuesday 25th February 2025. Deadline: Submit electronic copy to the turnitin assignment dropbox on Blackboard before 1pm Wednesday 19th March 2025. This coursework is worth 10% of your mark for Time Series Analysis. There are 2 questions. Together they are worth 40 marks You must write up a report (MS Word, LATEX or a notebook (e.g. Jupyter) is fine), including necessary mathematical derivations and all your code within the main text (not as appendices and no screen shots). You must submit a pdf that can be fully read by Turnitin. Plots and tables should be clear, well labelled and captioned. Comment your code. Up to 5 marks may be deducted from your score for a poorly presented report. For the computational elements, you must use R or Python. It is up to you which you choose. Both are equally valid. You may use any results from the notes you wish, but you must properly cite them. Your report must be no more than 12 pages (not including a cover page). This does not mean you have to use all 12 pages - you should be able to do this in fewer than 12 pages. Put your CID number clearly at the top of your report. NB: Stationarity by itself always means ‘second-order’ stationarity. {∈t} denotes white noise with mean zero and variance σ2∈. Assume {∈t} is Gaussian/normal here. You can assume a sampling interval of ∆t = 1 throughout. Question 1 (a) Simulating time series is an essential component of research, allowing theory to be verified and methodology to be tested and benchmarked. In this question you will write your own code to simulate a sequence X1, . . . , XN from a stationary Gaussian/normal AR(2) process. The tricky thing here is that in order to simulate X1 you need to know X0 and X−1. A stochastic process goes from times −∞ to ∞ so that these three variables must be generated to satisfy the stationarity conditions. Let’s see how we can do this. Consider the covariance matrix for [X0, X−1] T . It takes the form. We can carry out a Cholesky decomposition of D by finding C such that D = CCT where C is a lower triangular matrix. Now consider a vector Y = [Y1, Y2] T where Y1 and Y2 are each standard Gaussian/normal and independent. Then the covariance of the vector CY is CICT = CCT = D, the required covariance structure. Using the above scheme, write your own function AR2(xi,sigma2,N) to simulate N values X = [X1, . . . , XN ] from a zero mean Gaussian AR(2) process parameterised as The input parameters are ξ := (ξ1, ξ2), σ2∈ and N. You may use an inbuilt function to compute the Cholesky decomposition. HINT: You will need the following form. of the autocovariance sequence for a AR(2) process parametrised in this way (p. 94, Brockwell & Davis, Time Series: Theory and methods, Springer-Verlag, 1987) Your answer to this question is your code. [4 marks] (b) Choose N = 6 and ξ1 = 10/9, ξ2 = 2, σ∈2 = 1. Generate M = 100 independent sample vectors X1, . . . , XM using your code from Part (a) and form. an estimate of the symmetric Toeplitz covari-ance matrix of the vector [X1, . . . , X6] T via Let ˆs0, . . . , sˆ5, be the estimated variance and covariances in the first row of Σˆ. The true values are s0, . . . , s5. Calculate the error a = Σ5 j=0(ˆsj − sj )2. Repeatedly simulate these steps (independently) 500 times to get 500 values of a and find the average error, ¯a for M = 100. Do the above also for M = 150 to 500 in steps of 50, so that altogether you have values of ¯a for M = 100 : 50 : 500 and save these. For M = 500 only, compute the average value of Σ over the 500 repeat simulations, and ˆ print it out together with the true Toeplitz covariance matrix [4 marks] (c) Let N = 100. Generate X = [X1, . . . , XN ] T and estimate the variance and autocovariances s0, . . . , s5 via Calculate the error b = Σ5 j=0(ˆsj − sj )2. Repeatedly simulate these steps (independently) 500 times to get 500 values of b and find the average error, ¯b for N = 100. Do the above also for N = 150 to 500 in steps of 50, so that you have values of ¯b for N = 100 : 50 : 500. Plot the values of ¯b against the corresponding number of samples, N, using a dashed line. On the same figure, plot the saved values of ¯a against the corresponding number of samples, M, using a solid line. [4 marks] (d) Given your plots of ¯a and ¯b versus sample size, suggest a reason for the marked difference in estimation error between the two methods for the same sample size. Hint: You might find it informative to rerun Parts (b) and (c) using a white noise process instead of an AR(2). [4 marks] Question 2 You each have your own individual time series x1, ..., x60 which can be retrieved by downloading your time series from this directory. The number of your time series can be found in the accompanying file time series number.pdf. This is 5 years of monthly sales data for a company, from January 2020 to December 2024. For most of this question, you’ll assume it’s the 1st January 2024 and you’ve been tasked with forecasting annual sales for the next 12 months. Therefore you only have the first four years of data x1, ..., x48. You’ll use x49, ..., x60 in Part (h). (a) From inspection, you’ll see the time series has an increasing trend. Write your own function that fits an ARIMA(p, d, 0) model using the least squares method. Recall, this means you will model {Xt (d) } as an AR(p) process. [3 marks] (b) It can be shown that for a stationary Gaussian AR(p) process, the AIC reduces down to AIC = 2p + N ln(ˆσ2∈). For p = 1, 2, ..., 5 and d = 2, 3, 4, fit an ARIMA(p, d, 0) model. Under the assumption of Gaussian-ity, create a 3 × 5 table to neatly display the AIC for each value of p and d. [2 marks] (c) Which order model do you select as being the best fit for your data? Report d, p and the p + 1 estimated parameter values. [1 mark] (d) This model may be the best fit out of those you’ve considered, but it does not mean it’s a good fit. A common approach to determine this is to do a residual analysis. Consider an AR(p) model of the form. Yt − φ1,pYt−1 − ... − φp,pYt−p = ∈t , where {∈t} is a white noise process. Given a time series y1, ..., yN , for a chosen order p and associated set of estimated parameters {φˆ 1,p, ..., φˆ p,p}, the residuals are {ep+1, ..., eN }, where et = yt − φˆ 1,pyt−1 − ... − φˆ p,pyt−p. Should the AR(p) process be a good fit, we would expected {ep+1, ..., eN } to be a an uncorrelated sequence. Conversely, if it is not, we would expect {ep+1, ..., eN } to contain autocorrelation. The Ljung-Box test is used to test for autocorrelation in residuals. It proceeds as follows: • Compute all the residuals. • The null and alternative hypotheses are H0 : ep+1, ..., eN is a sequence of uncorrelated random variables HA : H0 is not true. The test statistic is where n is the number of residuals, h is the number of lags being considered, and ˆρk is the estimate of the autocorrelation at lag-k for the residual sequence. Take ˆρk = ˆsk (p) /sˆ ( 0 p) . Hypothesis H0 is rejected if L > χ2 1−α,h, where χ 2 1−α,h is the (1 − α)-quantile of the χ 2 h distribution. You may use an inbuilt function for computing {ρˆk}, but otherwise, write your own code to apply the Ljunge-Box test for h = 24 (typical for monthly time series) at the α = 0.05 level. Make conclusions about your result. [4 marks] (e) In keeping with notation from the notes, at time t = N, we will let XN (l) represent the l-step ahead forecast of XN+l , and XN (d) (l) represent the l-step ahead forecast for XN (d + ) l . Using the least squares model fitted in part (c), write your own function that computes X48(1), ..., X48(12). Note, you will initially be forecasting the values of X49 (d) , ..., X60 (d) . To get the forecasts for X49, ..., X60, you need to integrate out the values. For example, if d = 2, then we know from the notes that Xt (2) = Xt − 2Xt−1 + Xt−2, and hence Xt = Xt (2) + 2Xt−1 − Xt−2. We therefore form. our forecasts recursively as On a single axes, plot the true trajectory for t = 1, ..., 48 and the predicted trajectory for t = 49 to t = 60. [4 marks] (f) Point forecasts, like this, only have limited use. What is much more useful is supplying an accom-panying prediction interval. This is an interval which has some designated probability of containing the realised trajectory. The 95% prediction interval for YN+l is given as YN (l) ± 1.96σl , where σl is the standard deviation of the l-step forecast distribution. So far in this question you have fit an AR(p) model to a dth differencing of x1, ..., x48. A naive estimator of σl , the standard deviation of the forecast errors for the dth differenced process is ˆσe √ l. Here ˆσe is the sample standard deviation of the residuals. Use this to get the resulting standard deviation of the errors in forecasting X49, ..., X60 . HINT: Consider writing XN (2)(l) = XN (2) +l+ηl , where ηl is the forecast error whose standard deviation is the σl estimated above. Then consider recursively propagating the errors through the integrating step shown in (e) to determine the standard deviation of the forecast error in XN (l). For this, you may assume that η1, ..., η12 are uncorrelated. Add to your plot the upper and lower bounds of your 95% prediction interval for t = 49, ..., 60. [3 marks] (g) Use in-built functions in R or Python to fit an ARIMA or Seasonal-ARIMA (SARIMA) model to your time series. SARIMA models are not covered in the notes, but have a read about them. The recommended packages are forecast in R and statsmodels in python. You can use what-ever automated functionality you like to select the best model, assess the model fit, and forecast X49, ..., X60. Present an additional plot that shows your forecast and prediction intervals. HINT: E.g., if using forecast in R, the functions you might try include: ts(), auto.arima(), Arima(), checkresiduals(), forecast(), plot(). [5 marks] (h) It’s now 1st Janunary 2025 and you have observed x49, ..., x60. Use the root mean squared errors in your forecasts, defined for a total of L steps ahead, as to determine whether the model fit in part (g) performed better at forecasting than the ARIMA(p,d,0) model you used in part (e). [2 marks]

$25.00 View

[SOLVED] Assignment 4 Microsoft Access

Assignment 4: Microsoft Access The goal of this assignment is to take your Entity Relationship Diagram (ERD) from Assignment 3 and turn it into a Microsoft Access Database for your business and create a database form. application for managing your employees. Please carefully read and complete all the parts and steps listed in this document and then submit the required files to OWL. It is important that you closely follow all of the specifications and requirements given in this document and ensure that your database fulfills them correctly. You MUST use Microsoft Access for this assignment. If you are using an Apple (macOS) computer you will need to find a way to run Access such as using MyVLab or using a GenLab computer on campus. Before using MyVLab you must have a good understanding of how to transfer files between your computer and the remote computer and backup your database frequently. Warning for MyVLab Users If you are using MyVLab for this assignment, you MUST save to the H: drive while working on your assignment. The H: drive represents the remote storage on the virtual lab computer. The Z: drive represents your own local computers storage. Saving directly to the Z: drive WILL corrupt your Access database if your internet connection drops. Only copy files to the Z: drive when backing up or submitting your work. Here is the correct process for saving on MyVLab: 1. While working on your Access database save to the H: drive. 2. When you want to backup or submit your work first make sure you save your work and then close Access. 3. Using the file explorer tool on MyVLab COPY (do not move) your Access file from the H: drive to a location on your local computer on the Z: drive. 4. Submit your file to OWL using your local computer (MyVLab cannot access a web browser). Part 1: Correct Your ERD from Assignment 3 Before we begin translating your ERD into a database, we need to ensure that it is correct. On the next page is the solution to Assignment 3. Use this solution to correct your ERD from assignment 3. While correcting your ERD, please keep the following notes in mind: · The ERD shown below is just one example of a correct solution. There are multiple different but correct solutions. For example, you may use different names for the attributes and entities so long as the capitalization scheme is correct. You will also have added a few of your own attributes specific to your business. · The attribute names do not have to match what is shown in the below ERD exactly. For example, “First”, “EmployeeFirstName”, “NameFirst”, etc. would all be acceptable for the “FirstName” attribute in the EMPLOYEE entity. · You were required to add additional attributes to your ERD that make sense for your business. The ERD below does not include these, but you should, and these should become part of your database in Part 2. · Make sure all your foreign keys and relationship attributes are present and in the correct tables. · All entity names should be in ALL UPPERCASE, all relationship entity names in all lowercase, and all attribute names in UpperCamelCase (first letter for each word capitalized). Note that the following attributes are unique: TicketID (in RMA), SIN (in EMPLOYEE), and all primary keys. Also note that the “involves” relationship between PRODUCT and TICKET is one-to-many (1:N). We accepted solutions for Assignment 3 that had this relationship as many-to-many (N:M) as correct, but for assignment 4, please make sure this relationship is one-to-many (this will be important for Part 4). The “” and “” attributes are placeholders for the extra attributes you added in assignment 3. Replace these with your attributes and their correct bullet point. Attribute Names While attribute names like “Name” or “Date” are fine in your ERD, Microsoft Access does not allow field names that conflict with its list of reserved words. These are words that Access uses for other functions and can not be used as field names in a table. Take a look at the list here and change any attribute names in your ERD that conflict. For example, “Name” in the PRODUCT and DEPARTMENT entities would need to be changed to “ProductName”, “DepartmentName”, or something similar. Also remove any spaces in your attribute and entity names. For example, if you had an attribute named “Last Name” change it to “LastName” with the space removed. This will make things easier when we start getting into queries in later weeks. Submit Updated ERD Once you have made the changes to your ERD, save them in a file named: youraccountname_ERD_updated.dia You will be required to submit this file with your assignment. If you find any errors in your ERD while working on Part 2 and 3 or make any changes to the structure of your database while working on these parts, you are required to also make the changes to your ERD. The ERD must match the database you submit. Part 2: Create a Microsoft Access database Using Microsoft Access, create a new database named: youraccountname_yourbusinessname_A4.accdb where youraccountname is your UWO username and yourbusinessname is the name of your business from the past assignments. You are to create a Microsoft Access database based on your ERD from Part 1. There should be exactly one table in your database for every entity shown in your ERD. In addition to the requirements stated in your ERD, your database must also meet the specifications for each table (listed on the following pages). Note that these specifications do not list all fields that need to be in your table, in some cases you may be required to add and correctly set the properties for foreign keys or for fields that are specific to your ERD design (e.g. for the new entity you created in Part 1). It is expected that you set up these fields correctly such that your relationships and database function as expected. a) For the “EMPLOYEE” table use the following specifications: 1) Username – set as primary key, maximum 25 characters, no default value. 2) First Name - maximum 25 characters, no default value. 3) Last Name - maximum 50 characters, no default value. 4) Address – maximum 100 characters, no default value. 5) SIN - stored as a number, must be formatted as xxx-xxx-xxx where each x is a number (use an input mask). User must input all 9 numbers. You must ensure that no two employees can have the same SIN. This field should have no default value. 6) Phone Number – maximum 11 characters, must be formatted as (yyy) xxx-xxxx where each y is an optional number, and each x is a required number (use an input mask). Phone Number is optional and should not have a default value. If the phone number is not provided it should be stored as a null value and not a zero-length string. 7) Active – stored as a Yes/No value based on if this is a current employee (i.e. not retired, etc.). The default value should be Yes. b) For the “PRODUCT” table use the following specifications: 1)  Unique Product ID that acts as the primary key and has a value that is automatically created when a new item is entered. You must format this value such that it starts with your business’s initials and then a number. For example, if your company is named Forest City Ducks, the initials would be “FCD” and your Product IDs should look something like: FCD1 FCD2 FCD13 FCD134 where the “FCD” are the initials, and the numbers are any unique numbers generated by the database automatically when the product record is created (they do not have to match what is shown above or be in order). Note that Product ID will also be used as a foreign key in other tables. When it is used as a foreign key it must be of type Long Integer and the values will only be entered as numbers, for example: the foreign key is 1 where the Product ID is FCD1 the foreign key is 2 where the Employee ID is FCD2 the foreign key is 13 where the Employee ID is FCD13 the foreign key is 134 where the Employee ID is FCD134 2) Title - maximum 150 characters 3) Description – stored as text that can be over 255 characters long. There is no limit to the maximum size. 4) Image URL – stored as a hyperlink. If there is no photo, this will be a null value (no value will be provided). Should not allow zero length strings. 4) Sale Price – stored as currency with 2 decimal places. No default value. In the field description, make it clear what currency it is in (dollars, yen, pounds, etc.). 4) Manufacturing Cost – stored as currency with 2 decimal places. No default value. In the field description make it clear what currency it is in (dollars, yen, pounds, etc.). 5) QuantityInStock – number with no decimal places shown. Default value of zero. 6) Additional Fields – Your two additional attributes that you added in Assignment 3. The field properties are up to you but should be appropriate for the attribute and allow data to be input to your database correctly. c) For the “INVOICE” table use the following specifications: 1) Unique Invoice ID that acts as a text based primary key that is NOT automatically created when a new item is entered. note: this ID must start with ANY alphabetic character followed by 3 digits: the letter MUST be a capital letter examples: K345 F302 X000 Y012 note: it will not necessarily be the same letter each time. Format: LNNN – where N means a number and L means a capital letter - use an input mask. NOTE: - very important: if the Invoice ID is used as a Foreign Key in another table: - that key must be of type Text (String) - the value entered will just be the letter and the number: examples:  Foreign key will be K333 where the Order Number is K333 L090 where the Order Number is L090 P300 where the Order Number is P300 note: make this a reasonable maximum length (for example, not 255). 5) Coupon Code: text value that is four or five characters in length. A coupon code can only contain capital letters and numbers and must be exactly four or five characters in total (you must enforce this with an input mask). 6) Total Price – a currency value with two decimal places. No default value. In the field description make it clear what currency it is in (dollars, yen, pounds, etc.). 6) Payment Method – stores a text value of “Cash”, “Visa”, “MasterCard”, “PayPal”, “Debit”, or “Unpaid”. You do not have to restrict or enforce this field to only having these values but you should set the character length and other field properties appropriately. 7) Foreign Key – Properties must be set correctly to support the purchases relationship. Must be a data type that will work with the primary key of CUSTOMER. Should not have a default value. d) For the “CUSTOMER” table use the following specifications: 1) Must have a unique primary key. If you use a surrogate key such as Customer ID, it must be set up such that the value is automatically created when a new item is entered, and that the new value is guaranteed to be unique. If you use Email as a natural key, it must follow the specification below for the Email field. 2) Email - maximum 255 characters. Unique. No default value. 3) First Name - maximum 25 characters, no default value. 4) Last Name - maximum 50 characters, no default value. 5) Home Address - maximum 100 characters, no default value. 6) Phone - maximum 11 characters, must be formatted as (yyy) xxx-xxxx where each y is an optional number and each x is a required number (use an input mask). Phone Number is optional and should not have a default value. If the phone number is not provided it should be stored as a null value and not a zero-length string. 7) Birthday – date formatted as day-month-year. For example, April 5th, 2024 should be formatted as 05-04-2024. Note that day and month numbers less than 10 should have a leading zero. Hint: You may need to write a custom format pattern for this rather than using a built-in format. 8) Additional Fields – Your two additional attributes that you added in Assignment 3. The field properties are up to you but should be appropriate for the attribute and allow data to be input to your database correctly. e) For the “TICKET” table use the following specifications: 1) Unique Ticket ID that acts as the primary key for the TICKET table. This ID should be an automatically generated (not input by the user) and stored as a whole number. 2) Subject – A short string of text, not longer than 75 characters. Default value of “Unnamed Ticket”. 3) Description - stored as text that can be over 255 characters long. There is no limit to the maximum size and no default value. 4) Status – A text value of “open”, “resolved”, “investigating”, “closed”, or “waiting on customer”. You do not have to restrict or enforce this field to only having these values but you should set the character length and other field properties appropriately. 5) Severity – An integer value representing the severity of the issue described in the ticket. Valid values range from 0 (low severity) to 9 (critical severity). You should ensure only one digit can be input. The default value is 4. 6) Date Created - date formatted as day-month-year (just like Birthday in the CUSTOMER table). 7) Foreign Keys – Properties must be set correctly to support the relationships with the TICKET table. f) For the “RMA” table use the following specifications: 1) Unique RMA ID that acts as the primary key for the RMA table. This ID should be an automatically generated (not input by the user) whole number and does not require any special formatting. 2) Approved – A true or false value. The default value should be false. 3) Return Received - A true or false value. The default value should be false. 4) Replacement Address - maximum 100 characters, no default value. 5) Replacement Sent - A true or false value. The default value should be false. 6) Foreign Key – Properties must be set correctly to support the requests relationship. Must be a data type that will work with the primary key of TICKET. Should not have a default value. g) For the “includes” table use the following specifications: 1) As this is a junction table (all so called an associative table) that represents the includes relationship, you do not need to set a primary key. 2) Quantity – A positive whole number that represents the number of this product involved in the invoice. The default value should be 1. 3) Foreign Keys – Properties must be set correctly to support the relationships with the INVOICE and PRODUCT tables. h) All fields in all tables should have a field description provided that explains what the field is for. For foreign keys, the description should also clearly state that they are foreign keys. You may wish to review Assignment 3 again to see descriptions of what these attributes represent in the ERD. Unless otherwise stated above, zero length should not be allowed for text-based fields. Formatting and input masks are only required if needed to fulfill one or more of the requirements stated above. ALSO: · You MUST include any other fields required to create a working relational database (e.g. foreign keys). · This database must have the same relationships, cardinality, nullability, uniqueness, participation, and entities as specified in the ERD from Part 1. Ensure you set your field properties to fulfill BOTH the specifications above as well as the requirements from the ERD in Part 1. · Hint: There are 7 entities in the ERD from Part 1, so there should be 7 tables in your database. Part 3: Relationships & Data You must build all the relationships described in your ERD. Use the Relationships Database Tool in Access to enforce the relationships as demonstrated in the Access tutorial videos. Make sure the cardinality shown in the Relationship Database Tool for each relationship is correct and consistent with the ERD from Part 1. Fill each table with example data. You should add at least four (4) records for each and every table (you are free to add more than four if you wish). This example data can be made up/fictional but must be related to your company from Assignment 1. Your name (first and last) must be the name of the first employee in your EMPLOYEE table. The username should be your Western username. Do not input a real SIN, address, or phone number (you can just make these up). There will be a mark penalty if your full name and username is not in the first record of the EMPLOYEE table. You are allowed to make up the names of the other EMPLOYEEs, CUSTOMERs, etc. The PRODUCTS should be created to appear valid and should make sense in the context of your other data and your business. But do not spend too much time thinking up data. You are also not required to provide real URLs for your products photo (can be made up). Hint 1: In some cases, it can be easier to input the data before setting up your relationships. However, you must ensure that the values given for foreign keys match up correctly with the corresponding primary key values or you may get an error when enforcing referential integrity. Hint 2: If you get the error “The database engine could not lock the table..." when trying to enforce referential integrity, you need to close your other table tabs/windows before using the Relationships Database Tool. Hint 3: If you get the error "...can't create this relationship and enforce referential integrity." make sure that the data you have input in your databases make sense in terms of foreign key values. A value given for a foreign key must match the value of a primary key in the related table. Hint 4: Ensure that you check that the relationships shown in the Relationship Database Tool make sense and match your ERD. If a One-to-One relationship is showing up as Many-to-One, you may have set the field properties incorrectly for the foreign key.

$25.00 View

[SOLVED] BUSM2562 Assessment 2 Preparation of business materials Processing

Assessment 2: Preparation of business materials Assessment Brief Overview Assume following on from Assessment 1: Job interview, you were successful in securing your simulated new job position at your nominated organisation. (Congratulations!) Working under the instruction and guidance of your new manager, your first project in your new role will be to complete a series of deliverable tasks to compile a report for the up-coming Executive Planning Day that will help the organisation develop a new Strategic Plan. You are required to follow a set of instructions from your manager and complete a series of (7) seven deliverable work tasks. To deliver on the (7) seven tasks you'll need to apply a range of skills and demonstrate competency in: setting up a project plan, sourcing academic articles, summarising findings, preparing diagrams (and interpreting them), providing recommendations, and applying evidence to support arguments. The purpose of this assessment is to introduce you to the world of work. We have replicated the types of tasks and activities that the typical business graduate would be expected to complete. The work tasks you've been assigned in this assessment reflect the nexus between policy and business practice - something which is vital for oganisations operating within the within economy to understand through support they get from employees who are business analysts and understand economic principles. This individual assessment task is the second part of your three-part assessment journey in Understanding the Business Environment. Learning Outcomes The targeted Course Learning Outcomes (CLOs) for this assessment are: CLO2: Design conceptual models to make sense of the environment in which business operate. CLO3: Evaluate the impact of governments and their role in responding to varying domestic and global challenges. CLO4: Apply digital literacy to navigate practical situations in a modern environment. Marking Criteria This assessment will measure your ability to: Design and present a project plan that outlines the project's deliverable work tasks. Source relevant academic articles using Google Scholar, selecting reputable papers and sources that can help inform. strategic discussion. Review academic articles, summarise and apply key findings, while following a word count. Prepare and interpret demand and supply diagrams including the ability to summarise key facts stemming from the application of this simple yet powerful analytical tool. Use evidence to support an argument. For help on how to approach the tasks and preparing your assessment submission, see the Learning Resources tab below. There are several useful videos there. Assessment details - The set of tasks Congratulations! You were successful in your job search and interview and have now secured a paid position within the organisation you targeted in Assessment 1. Your first project with your new employer will be to complete a series of deliverable tasks for the up-coming Executive Planning Day your organisation will be holding shortly. The purpose of the Executive Planning Day is to understand past and current performance of the organisation you now work for, with a focus upon how the business environment is now expected to impact the organization over the next five years. You will be taking instructions and guidance directly from your manager. This is reflected in the description of project tasks outlined in the Assessment Workbook provided below. As such, to get you started your new manager has assigned a series of tasks which you will need to address as requirements for this Assessment. Download the Assessment 2 Workbook , and closely follow the instructions outlining each of the seven (7) compulsory Tasks. Support materials and tips for success When citing and references the selected articles please use RMIT Harvard referencing style. . For Task 3 the article by Tol is accessible to download via the link: Tol, R.S.J., 2009. The economic effects of climate change. Journal of economic perspectives, 23(2), pp.29-51. The Task Workbook is to be submitted electronically using the file naming conventions First_Name_student number_Assessment 2. The assessment file must be submitted in Canvas as either a PDF or Word document. Note: Please take care to ensure all diagrams/graphics are in working order before submission. Corrupted images that markers cannot interpret will be penalised without exception. Please ensure your work is presented in a way that is easy to follow and includes all relevant information including the task name as per the layout provided in the Assessment 2 Workbook. (For Task 1 you may add some design flair, branding and colours to your project plan (Task 1) but remember to keep the presented look and feel professional). To assist you further RMIT Assignment Planner may also be useful. Quick Links Assessment 2 Workbook Submission Details This assessment requires you to submit the Assessment 2 Workbook which contains the following: Task 1: Project plan (prepared in Word OR as a screen grab from what you've prepared using other software. Note: you have freedom to choose the design and layout of your project plan but it must look professional and comply with instructions provided within the Workbook). Task 2: Literature review (source articles and explain their relevance for inclusion). Task 3: Written summary and relevant recommendations of selected article findings. Task 4: Written explanation of the demand and supply diagram with a tax. Task 5: Written reflection on client profit. Task 6: Written summary of negative externalities. Task 7: Written summary of positive externalities.

$25.00 View

[SOLVED] 21-259 Calculus in Three Dimensions Lecture 1 Spring 2025

21-259: Calculus in Three Dimensions Lecture #1 Spring 2025 Three-dimensional Coordinate Systems Definition: The Cartesian product of a set X and a set Y is the set of all ordered pairs (a,b) with a ∈ X and b ∈ Y , i.e., X × Y = {(a,b) | a ∈ X and b ∈ Y}. We have that (a,b) = (c,d) if and only if a = c and b = d. The Cartesian product of a set X with itself is often written as X 2 . The Cartesian product of the sets X1,X2,...,Xn is the set X1 × X2 ×··· × Xn = {(a1,a2,...,an) | ai ∈ Xi , 1 ≤ i ≤ n}. The elements (a1,a2,...,an) are called n-tuples. We use R2 and R3 to represent the set of all ordered pairs and triples in two and three dimensional phys-ical space, respectively. We often use (x, y, z) to represent the coordinate axes in R 3 . The coordinate planes are shown on the left below, while the eight octants that comprise R 3 are show in the two right figures. In Cartesian coordinates, a point P(a,b,c) in R 3 is represented sim-ply by its values along each of the coordinate axes. The Cartesian coordinate system is also called the rectangular coordinate system. The projection of the point P(a,b,c) onto the x y-plane is the point (a,b) in R2. The distance between two points P1(x1, y1, z1) and P2(x2, y2, z2) is given by the formula Example: Determine if the following points lie on a straight line: P(0,−5,5),   Q(1,−2,4),   R(3,4,2) The equation of a sphere with center (h,k,l) and radius ρ is (x −h)2 +(y −k)2 +(z −l)2 = ρ2. Example: Show that the equation x2 + y2 + z2 + 8x − 6y + 2z + 17 = 0 represents a sphere, and find its center and radius. Example: Find an equation of the sphere with center (1,−4,3) and radius 5. What is the intersection of this sphere with the xz-plane? Vectors Definition: A vector is a quantity that has both magnitude and direction. Geometrically a vector is usually represented with an arrow. A (real) vector with n components is an element of the set Rn. Vectors are typically represented using Cartesian coordinates. A scalar is an element of R (i.e., a scalar is a real number). Notation: We typically use boldface letters (v) or an arrow above a symbol (v) to denote vectors. Any two points in R n can be used to define a vector. A vector v = 〈v1, v2,..., vn〉 is determined by its com-ponents v1, v2,..., vn. — If P(x1, y1, z1) and Q(x2, y2, z2) are two points in R3, then the vector is given by 〈x2 − x1, y2 − y1, z2 − z1〉. In this case v represents the displacement from point P to point Q. — Two vectors u and v in R n are equal if and only if ui = vi for all i = 1,...,n. — Vectors are independent of position - this means that two vector with the same components are equal, regardless of where they may be situated in space. Definition: The magnitude or length of a vector v is denoted by |v| and is given by Example 1. Find the magnitude of the vector v = 〈−2,4,1〉. The zero vector 0 = 〈0,0,...,0〉 is the only vector with a magnitude of 0. Scalar Multiplication of a Vector: Let v = 〈v1, v2,..., vn〉 be a vector and let a be a scalar. The scalar multiple av is given by av = 〈av1,av2,...,avn〉. If v is any vector and a is any scalar, then |av| = |a||v|. Two vectors are parallel if they are scalar multiples of each other. Vector Addition: Let u = 〈u1,u2,...,un〉 and v = 〈v1, v2,..., vn〉 be vectors. The sum of u and v is given by u + v = 〈u1 + v1,u2 + v2,...,un + vn〉. Example 2. Let u = 〈4,2〉 and v = 〈−1,−3〉. Compute and draw the vector u + v in the x y-plane. Definition: Let v 1,v 2,...,vm be vectors and let a1,a2,...,am be scalars. The expression a1v 1 + a2v 2 +··· + amvm is a linear combination of the vi and the ai . Definition: A unit vector is a vector with magnitude 1. For any vector v, the vector |v|/v is a unit vector in the same direction as v. Example 3. Given u = 〈2,0,−1〉, v = 〈1,1,1〉, and w = 〈4,2,3〉, find a unit vector in the same direction as v −2u +w. Definition: The standard basis vectors (or elementary basis vectors) are given by ı = 〈1,0,0〉 ȷ = 〈0,1,0〉 k = 〈0,0,1〉 Any vector v in R 3 can be written as a linear combination of the standard basis vectors: v = 〈a1,a2,a3〉 = a1ı + a2 ȷ + a3k. The components of a vector v in R3 are sometimes denoted using a subscript. that represents the vari-able of the direction: v = 〈vx , vy , vz〉. The standard basis vectors give us a way to express any vector as a linear combination of unit vectors. Properties of Vectors: Let u,v, and w be vectors and let a and b be scalars. Then we have 1. u + v = v +u                            (commutativity of +) 2. u +(v +w) = (u + v)+w             (associativity of +) 3. u +0 = u                                  (additive identity) 4. u +(−u) = 0                              (additive inverse) 5. a(u + v) = au + av                     (left distribution of scalar multiplication) 6. (a +b)u = au +bu                       (right distribution of scalar multiplication) 7. a(bu) = (ab)u                              (associativity of scalar multiplication) 8. 1u = u                                        (scalar multiplication identity) Definition: Let P(x, y, z) be a point in R 3 . Then the vector v = xı+y ȷ+zk = 〈x, y, z〉is the position vector of P. Vectors can be used to represent forces acting on an object (particle, rigid body, etc.). When multiple forces act on an ob-ject, the net force or resultant force is the sum of all forces acting on the object. An object that is being acted upon by the forces v 1,v 2,...,v N is said to be in static equilibrium if the net force is zero, i.e., if Example 4. A 100-lb weight hangs from two wires as shown in the figure. Find the tensions (forces) T 1 and T 2 in both wires and their magnitudes. The velocity of an object is a quantity that is often represented by a vector. If the velocity of an object is given by the vector v, then |v| is the speed of the object. The resultant concept can also be applied to objects in motion. For example, consider a plane flying with velocity v through a wind that has a velocity w. Then the true course or track of the plane is the direction of the resultant v +w. The ground speed of the plane is the magnitude of the resultant. The Dot Product Definition: Let u = 〈u1,u2,...,un〉 and v = 〈v1, v2,..., vn〉 be vectors in R n . The dot product of u and v is the scalar quantity Example 5. Compute the following dot products: a) (ı + ȷ +k)·(ı −2ȷ +2k) b) ı · ȷ c) 〈4,−3,1〉· 〈2,2,−2〉 d) 〈1,2,3〉· 〈−1,−2,−3〉 e) 〈1,2,3〉· 〈1,2,3〉 The dot product can be given in terms of the angle θ between two nonzero vectors: u · v = |u||v|cosθ Example 6. Since we know −1 ≤ cosθ ≤ 1, what does that say about the dot product of u and v? — If u and v are unit vectors, u · v = cosθ. — u ·u = |u||u|cos0 = |u|2 so |u| = √u ·u. — cosθ = |u||v|/u · v so θ = cos−1 (|u| v|/u· v). Example 7. Find the angle between the vectors u = √3ı − ȷ and v = −ı + √3ȷ. Example 8. What is the dot product of two vectors that form. a right angle? Definition: The vectors u and v are orthogonal if and only if u · v = 0. Properties of the Dot Product: Let u, v, and w be vectors in R n and let a ∈ R. Then we have: 1. u · v = v ·u                                   (commutativity of ·) 2. a(u · v) = (au)· v = u ·(av)             (associativity of scalar multiplication) 3. u ·0 = 0                                        (orthogonality of 0) 4. u ·(v +w) = u · v +u ·w                  (distributivity of ·) Example 9. If u is orthogonal to v, what is |u + v| 2 ? Example 10. Is the expression u ·(v ·w) meaningful? Why or why not? Is the dot product associative? Definition: The direction angles α, β, and γ of a vector v in R3 are the angles between v and ı, ȷ, and k, respectively. The direction cosines are the cosines of the angles α, β, and γ. The direction cosines are easy to calculate. For example, we have cos α = |v||ı|/v ·ı = |v|/v1. This means we can write v as v = 〈v1, v2, v3〉 = 〈|v|cosα,|v|cosβ,|v|cosγ〉. Thus we have v = |v|〈cosα,cosβ,cosγ〉. Example 11. What is a reasonable range of values that the angles α,β,γ can take on? The dot product can be used to determine how much of a given vector lies in the same direction as another vector. This is known as the projection of a vector onto another. Definition: The scalar projection (or component) of u along v is the signed magnitude of the component of u in the direction of v: The vector projection of u onto v is the component of u along v times the unit vector in the direction of v: Example 12. What is the projection of a vector onto itself? Example 13. Find the component and vector projection of u = 〈3,6,−2〉 onto v = 〈1,2,3〉. Using the vector projection, we can decompose u into a sum of a vector parallel to v and a vector orthogonal to v: Example 14. Write the vector u = 〈2,−1,4〉 as the sum of a vector parallel to v = 〈2,0,1〉 and a vector orthogonal to v. As the dot product gives a quantification of how much of a given vector lies in the direction of another, it is useful in several applications. A classic example of this is the physical concept of work. Definition: Work is the result of the application of a force F across a displacement d. When the force and displacement have the same direction, the work is simply the product of the mag-nitudes, W = |F||d|. However, if the force is applied at a direction that is not the same as d, then a vector projection is used to compute the amount of work done. In this case, the work done is given by the dot product W = F ·d. In the figure on the right, a force in the direction of F is applied to at the upper left corner of a rect-angular object. The force moves the object across a frictionless surface a displacement d. The work done by this action is given by W = F ·d = |F||d|cosθ. Example 15. How much work is performed by pulling an object 50ft across a horizontal (frictionless) floor with a constant force of 50lb at an angle of 30◦ above the horizontal? If instead the 50lb force was being applied horizontally (i.e., if the force was parallel to the floor), how far would the same amount of work move the object?

$25.00 View

[SOLVED] Assignment for Programming and Machine Learning

Assignment for Python Programming and Machine Learning Task 1: (50%) Title: Application of Machine Learning in the Marine Industry: A Sector-Specific Review Question: Machine learning (ML) and artificial intelligence (AI) are transforming various industries, including the marine sector, by enhancing efficiency, optimizing operations, and improving safety. As students enrolled in different maritime disciplines—Shipping and Logistics, Naval Architecture, Marine Engineering, and Offshore Renewable Energy—you are required to conduct a critical review of how ML is applied in your respective subject area. In your essay, you should: 1. Explain the fundamentals of machine learning and its relevance to the maritime industry. 2. Identify and discuss key ML applications within your chosen sector. Provide real-world examples where possible. 3. Analyse the benefits and challenges of ML implementation in your field, considering technical, economic, and environmental factors. 4. Evaluate future trends and potential advancements in ML that could impact your sector in the coming years. 5. Use appropriate references from academic papers, industry reports, and case studies to support your discussion. Your essay should be well-structured, clearly written, and approximately 1,500 words in length. Assessment Criteria: · Depth and clarity of ML concepts (20%) · Relevance and quality of examples (20%) · Critical analysis of benefits and challenges (20%) · Discussion of future trends (20%) · Quality of writing and referencing (20%) Task 2: (50%) Artificial Neural Network (ANN) Model for Predicting Ultimate Strength of Unstiffened Plates Under Uni-Axial In-Plane Compression Machine learning, particularly Artificial Neural Networks (ANNs), is widely used for predictive modelling in engineering applications. In this task, you are required to develop an ANN model to predict the ultimate strength of unstiffened plates under uni-axial in-plane compression based on provided dataset. Your ANN model should follow these specifications: · Architecture: One input layer, one hidden layer, and one output layer. · Input Variables: 1. Plate width 2. Plate thickness 3. Initial imperfection (residual stress and deflection due to welding) 4. Yield stress of the material · Output Variable: Ultimate strength of the plate. Steps to Follow: 1. Preprocess the data: o Load the dataset from the provided spreadsheet. o Handle missing values, normalize the data, and split into training and testing sets. 2. Build the ANN model: o Choose an appropriate activation function for each layer. o Train the model using a suitable optimizer and loss function. o Tune hyperparameters such as the number of neurons in the hidden layer and the learning rate. 3. Evaluate the model: o Use appropriate performance metrics (e.g., Mean Squared Error, R² score). o Perform. validation using unseen test data. 4. Interpret results and discuss limitations: o Analyze the performance of your ANN model. o Discuss how well it predicts the ultimate strength of unstiffened plates. o Identify potential improvements or challenges in applying ANN models in real-world scenarios. Alternative Case Study Selection: Students could possibly choose a case relevant to their subject area (Shipping and Logistics, Naval Architecture, Marine Engineering, Offshore Renewable Energy). The selected case study must be discussed with the lecturer before implementation. Deliverables: · Python script. (Jupyter Notebook or .py file) implementing the ANN model. · A short report (< 500 words) describing the model development, data processing, results, and discussion. · Graphs and tables illustrating model performance and comparisons. Assessment Criteria: · Data preprocessing and handling (20%) · ANN model development and implementation (40%) · Evaluation and interpretation of results (20%) · Quality of report (20%) Submission Format: · The Python code should be submitted as a Jupyter Notebook (.ipynb). · The report should be submitted as a WORD document. · All necessary data and results should be clearly documented.

$25.00 View