Assignment Guidelines: Task 4 – Reflection on Using Generative AI in Social Media Marketing Overview: The aim of this task is to explore the practical applications and implications of using Generative AI, specifically ChatGPT, in social media marketing for the chosen company. You will create social media content using both ChatGPT and your own creativity. You are required to focus on only one of the following options to complete the task: · Option 1: Social Media Post · Option 2: Managerial Response to an Online Negative Review Option 1: Social Media Post Objective: To compare different approaches to creating a social media post for a chosen company, focusing on the same marketing communication objective. Step 1: Find and document an actual social media post from the chosen company’s platform. Then, using the “Social Media Platform. Messaging Typology” (see Appendix 1 below), identify the primary marketing communication objective of the company’s post (e.g., product awareness, customer engagement). Step 2: Independently draft a social media post for the same company, ensuring your post aligns with the marketing communication objective identified in Step 1 (e.g., if the company’s post was aimed at product awareness, your post should also focus on product awareness). Step 3: Use ChatGPT to generate a social media post. Your prompt should guide ChatGPT to generate content that aligns with the marketing communication objective identified in Step 1. Be specific in your instructions to ensure relevance (refer to Lecture 8 slides, pp. 16-19). Step 4: Compare the social media posts: the company's, your personal, and the ChatGPT-generated posts. Deliverables for Option 1: · A documented example of a company’s social media post (from Step 1). · Your personally created social media post (from Step 2). · The AI-generated social media post using ChatGPT (from Step 3). · Use the following template table to compare the social media posts from the three different sources. Analyse each post based on the aspects listed and note your observations. This comparison will provide insights into the effectiveness of different content creation methods. Template Table for Option 1- Comparison of social media post approaches – company, personal, and AI-Generated: 1. Social media content 2. Marketing communication objective 3. Approach (prompt used, time taken) - 4. Clarity of the social media post 5. Relevance to the audience 6. Engagement potential Instructions for the Comparison Table: 1. Social media content · What to Write: Include the full content of each post. You may use a screenshot to reduce the wordcount. 2. Marketing communication objective · What to write: Identify and note the primary marketing objective of each post. · Reflections: Focus on the main goal each post aims to achieve and how effectively it communicates this objective. 3. Approach (prompt used and time Taken) · What to write (ONLY for your own and the AI-generated posts): Describe the process used to create each post. For your own and the AI-generated post, include the prompt used and the time taken to finalise the post. · Reflections: Reflect on the ease or difficulty of creating each post, and how the chosen approach (including the prompt for the AI-generated post) influenced the final content. 4. Clarity of the social media post · What to write: Assess how clearly each post conveys its message. · Reflections: Consider the language, structure, and readability of each post. Is the message easy to understand at first glance? Are there any ambiguous elements? 5. Relevance to the audience · What to write: Evaluate how relevant each post is to the intended audience. · Reflections: Identify the target audience and assess how each post addresses their interests, needs, or preferences. 6. Engagement potential · What to write: Estimate the potential of each post to engage the audience. · Reflections: Consider factors such as the appeal of the content (e.g., emotional or rational), calls to action, and the likelihood of the post generating likes, shares, comments, or other forms of interaction. Option 2: Managerial Response to an Online Negative Review Objective: To compare different methods of crafting managerial responses to online negative reviews for a chosen company, focusing on maintaining consistency in customer service and reputation management. Step 1: Find and document an actual managerial response from the chosen company to a negative online review. Analyse the response to identify the primary cue used (refer to Appendix 2; e.g., apology, explanation, or facilitation). Step 2: Draft your own response. Create a managerial response to the negative review identified in Step 1. Your response does not need to align with the cues identified in Step 1. Step 3: Generate a response using DeepManager. Use DeepManager to create a managerial response to the negative review identified in Step 1. Step 4: Compare the managerial responses to an online negative review: the company's response, your personal response, and the DeepManager-generated response. Deliverables for Option 2: · A documented example of the company’s managerial response to a negative review (from Step 1). · Your personally created managerial response (from Step 2). · The managerial response generated by DeepManager (from Step 3). · Use the following template table for comparison: Template Table for Option 2 - Comparison of Managerial Responses to an Online Negative Review: Company, Personal, and DeepManager-Generated Aspect for Comparison Company’s response Your response DeepManager-generated response 1. Managerial response content 2. Response cue 3. Approach (prompt used and time taken) - 4. Clarity and directness 5. Relevance to customer concern Instructions for the Comparison Table: 1. Managerial response content · What to write: Include the full content of each response. You may use a screenshot to reduce the wordcount. 2. Response cue · What to write: Identify the primary cues used in each response. · Reflections: Evaluate how effectively each strategy is communicated and its appropriateness for the situation. 3. Approach (prompt used and time taken) · What to write: (ONLY for your own and the AI-generated responses): Describe the process used to create each response. Include the time taken for both your own and the AI-generated responses. For the AI-generated response, explain the prompt used and the refinement process (e.g., adding context, tone adjustments, etc.) to finalise the response. · Reflections: Reflect on the ease or difficulty of creating each response, and how the chosen approach (including the prompt for the AI-generated response) influenced the final content. 4. Clarity and directness · What to write: Assess the clarity, directness, tone, and level of empathy shown in each response. · Reflections: Determine whether the response clearly addresses the concerns raised and provides a straightforward explanation or solution. 5. Relevance to customer concern · What to write: Evaluate how relevant and personalised each response is to the specific customer concern and describe how each response addresses the problem mentioned in the review. · Reflections: Evaluate the effectiveness of the problem-solving approach and its potential to satisfy the customer.
CEG8526: Hydrosystems modelling and management Assignment 2024-2025 Coursework 2 Background The UK water supply industry faces several challenges due to climate change, including increased water scarcity from warmer temperatures, changing rainfall patterns, and more frequent and severe droughts. According to the 3rd UK Climate Change Risk Assessment ‘Future projections of more frequent and intense dry periods lead to concerns around the availability of public water supplies in future, especially in England and parts of Wales. Private water supplies are also at risk. ’ The UK also faces an increased demand for water, particularly in the southeast of England, where demand is already high. Assignment Your overall task is to assess the impacts of climate change on flow regime and water resources on the Derwent catchment (National River Flow Archive ref. no. 28001). You should provide a written summary of your approach and analysis of the future change in catchment flow regime under climate change and the implications for water resources, providing useful planning information to the water resources sector. A) Rainfall simulation You should construct a synthetic time-series of rainfall data using a stochastic time-series model, with statistical properties consistent with the historical rainfall data for the catchment, representing a baseline for the climate change assessment. You should then apply appropriate climate change projections to derive downscaled, perturbed time series of projected future rainfall (we recommend you assume the transition probabilities remain unchanged). You should use these simulations to provide an assessment of changes in rainfall under climate change and its impacts on the catchment’s hydrology and water resources. You should select ONE appropriate product from UKCP18 (e.g. from the probabilistic projections or land projections from an appropriate resolution model), explaining your choice, and then analyse the projected changes for TWO scenarios - RCP8.5 plus one other scenario. You should also quantify the uncertainties in each scenario by exploring the range of climate change projections for each e.g. an upper and lower estimate of change. B) Modelling catchment river flow You should then run your rainfall series (baseline plus future scenarios) through the calibrated SHETRAN catchment model for the Derwent from which you will derive baseline and projected future flows. Using the outputs from the model you should discuss the change in catchment flow regime, for example changes in extreme or low flows. C) Assessment of water resource You should then run the baseline and projected future flows through a Pywr water resources simulation model for the Upper Derwent reservoirs, using the online platform WaterStrategy. Building on your understanding from the projected changes in rainfall and flows, you should then analyse the outputs from the water simulation to evaluate changes in water resource availability, for example in minimum and mean simulated reservoir storage levels. You should describe and explain the projected changes, including an analysis of the uncertainties. Your report should explain your methodology and justify the methodological approach. It should be structured in a logical manner. Your conclusions should summarise your findings in the context of guidance to a water resources planner looking to quantify climate risk to water supplies, along with any methodological limitations and uncertainties in your approach and how you might address these in further work. You should also reflect on additional factors that you might consider important to improve modelling in future assessments and decision-making. A summary of the workflow for this assignment is provided on the last page for your guidance. Formatting and indicative marking schedule Report format: the report should be a maximum of 4,000 words (excluding titles/contents, figure and table captions, and references) and use 11pt font with normal spacing. Marking criteria and schedule: this coursework comprises 65% of the overall module assessment. It will be marked according to the standard SAgE faculty marking criteria (see information provided on Canvas) taking into account the following: • presentation and structure of the report, including clear figures; • ability to investigate a problem using an appropriate experimental approach. Credit will be given for going beyond the taught material, including additional methodological developments; • ability to understand and apply relevant hydro-informatic models to derive appropriate quantitative outputs to support management of water resources; • understanding of the basis for application of outputs from climate models to assess hydrological impacts; • clarity of overall argument, supported by evidence from modelling, and supported by references where appropriate. Marks will be allocated as follows: Item Percent Allocated Introduction 5% Stochastic rainfall model and analysis 15% Hydrological impact analysis 25% Water system impact analysis 40% Conclusion 15% Submission date: Monday 20th January 2025, 2.00pm Summary of workflow and models: A. Stochastic rainfall model Comparison with • Historical rainfall simulation of N years of synthetic data • Climate change rainfall simulation(s) of N years using perturbed synthetic data Observed rainfall statistics for baseline period Simulated rainfall from the baseline period B. Shetran model Comparison with • Climate change baseline simulation No comparison needed, as this is the baseline run (there is no river flow record corresponding to the synthetic rainfall) • Climate change scenario simulations (multiple simulations) Simulated river flow from the climate change baseline run. (Note: you do not need to use the objective functions for these comparisons). C. Pywr water resources model Comparison with • Climate change baseline simulation No comparison needed • Climate change scenario simulations (multiple simulations) Simulated water resource outputs from the climate change baseline run.
Coursework 2 Brief 1. Overview Each student can choose one of the following two topics. 1. System design, or 2. Operation Data Analytics (You only need to do one. Submitting reports for each of the two would not help in your marks) 2. Topic description 2.1 System Design The Lecture 8 will give an example of systems thinking for engineering designs in the example of station development. The workshop at Session 10 would provide an opportunity to further develop your project. The details of the project are shown on Moodle. 2.2 Operation Analysis In the Lecture 4, each student will learn how to analyse the railway operation data. In this stream, the student will use the data of Wales Main Line (but in the same data format). Imagine that you are a consultant. Network Rail (Wales) or a train operating company serving the area is your client. Now, within Wales Suburban Service Improvement project, your client is interested in following issues. · (Variation of) train run times between stations. · Train delays and prediction/forecasting · (These two are just examples and there may be some other points of interest, which could be used for the planning of the new Wales Suburban Service.) In your project, you focus on a specific problem/issue that may be important. This would include. • Demonstrate the overall picture by data (analysis) • Develop a hypothesis or viewpoint (for example, dwell time would change according to the time of the day). • Analyse the problem according to your hypothesis. • Discuss your analysis results. Each student will take responsibility in formulation of the project, whilst we can assist this. Additional data can be provided on request. We plan to have a separate tutorial session in Lecture 10 where a subject tutor is available. You can consult with them. 3. Outputs Each student will produce a report with 1500 words that addresses the question above. Figures, tables, references are outside this word limit. Submission deadline: 17.00 (UK time) of Friday 17 January 2025 Submission: Via Moodle 4. Evaluation Criteria · Clarity of your presentation. The quality of any drawings, graphs, and diagrams used in the presentation. · Originality and depth of your thinking. A presentation which just summarises existing work, reports or other people’s opinions would not attract high marks (this criterion carries a high weight) · How you support your arguments (reference, existing evidence, calculation) · The extent to which the wider contexts is considered. · The extent to which you critically examine the facts and existing work. 5. Finally If you have any question, feel free to put a question on Module Discussion Forum or directly email to Taku. Usually I will run some extra tutorial sessions over Christmas break. This academic year, it would take place · 3.00pm of Fri 20 Dec · 3.00pm of Friday 03 Jan · 2.00pm of Thu 09 Jan · (all the timings are tbc). Online attendance is possible if booked in advance
XMUM.OAA - 100/2/8-V3.0 Page | 3F. Task(s)Consider the graph in Figure 1, each vertex is representing a place to visit and each edge is representing the cost from/to the Adjacent vertex.Figure 1 : The graphXMUM.OAA - 100/2/8-V3.0 Page | 4I. Coding:1. Represent the graph using adjacency matrix.2. Print the sequence the visited places using BFS and DFS (following the cost and start with any place selected by the user).3. Print the sequence of DFS user preference and BFS user preference where, the sequence of visited places starting by any place selected by the user and the next place shall be based on the BDF or DFS traversal. If there is more than one options, ask the user to select one of them then continue until there is no more segregation. Do this process using DFS and BFS separately. So, your welcome screen shall print matrix representation for the graph, then asked the user to select between DFS Basic or BFS Basic or DFS user preference or BFS user preference. Then ask the user to select the start point. If the user chooses the Basic version, show the traversal sequence starting from the start point (selected by the user) based on the cost. If the user chooses the user preference version, you are going to show suggestion what is the next place to visit (or to enqueue) and its cost. If there is more than one suggestion at the same time, allow the user to select one of the possible suggestions and continue until all the places has been visited and there is no more suggestion. At the end, print the traversal order sequence based on the selected method. II. Report:In your report, show the following:1- Show screenshot for the output of your matrix representation of the graph. 2- Show screenshots for two complete examples, one using DFS (User preference) and another one using BFS (User preference). XMUM.OAA - 100/2/8-V3.0 Page | 5Example: (after print the matrix representation)Which method you want to use: 1- DFS sequence (Basic)2- BFS sequence (Basic)3- DFS sequence (User preference) 4- BFS sequence (User preference) User choose: 3Please Select your start point: User choose: KLIAPlease what place you want to visit after KLIA: 1- KLCC (12)2- Melaka (50)3- TBS (10)User choose: 1Output: Based on DFS(User preference) , after visiting KLCC you may visit next: 1- TBS (5)2- Batu Caves (30)3- Aquaria KLCC(2)User input: 2Output: after visiting Batu Caves you may visit next:1- Genting Highland (15)2- Colmar Malaysia (10)…. Until visiting all the places and there is no more suggestion Final Output: The sequence of visited places based on DFS and your preference is:KLIA, KLCC, Batu Caves, ……..XMUM.OAA - 100/2/8-V3.0 Page | 6APPENDIX 1MARKING RUBRICSComponent Title Assignment 2: Graph Percentage (%) 12.5CriteriaScore and DescriptorsWeight (%) Marks Excellent(17-20)Good(14-16)Average(10-13)Need Improvement (6-9)Poor(1-5)Give suggestion Traversing algorithms give suggestion correctly and allow the user to choose if there is more than one suggestion.Traversing algorithms give suggestion correctly and allow the user to choose if there is more than one suggestion with less interaction Traversing algorithms give suggestion correctly without allow the user to choose if there is more than one suggestion or there is minor mistake Traversing algorithms give suggestion incorrectly Traversing algorithms don’t give any suggestion 20Criteria Excellent(10)Good(8-9)Average(6-7)Need Improvement(5-4)Poor(1-3)Quality ofimplementationThe concept is correct. Thecode is error free, runnable and perform the traversecorrectly. Thecode is readable and graph is defined dynamically. The concept is correct. The code is error free, runnable and perform the traverse correctly. But the code is not readable or graph is not dynamic. The concept is correct. The code is error free, runnable but the traversing has minor problem. the function is readableThe concept is correct. The code is error free. But cannot runThe concept is correct. The code has some error and cannot run.10ReportFormatReport is wellwritten withoutgrammar andspellingmistakes. Goodpresentationformat. Allsections present.Report formatadhered to.Grammarmostly sound.All sectionspresent. Somegrammaticalmistakes.Formattingneedsimprovement.Poor format.Plenty ofgrammaticalmistakes.Formatcompletelyignored. 10Effort on the code The code is well organized, readable, have clear comments. all the input possibilities are handled The code is organized and have comments. all the input possibilities are handled The code is organized with a few comments. Not all the input possibilities are handledThe code is mess and comments not clear or copy and paste. Not all the input possibilities are handledThe code is mess and there are no comments or copy and paste. No handling. 10TOTAL 50Note to students: Please include the marking rubric when submitting your coursework.
School of Computing and Information Systems COMP20005 Intro. to Numerical Computation in C Semester 2, 2024 Assignment 2 Due: 4:00 pm Thursday 17th October 2024 Version 1.0 1 Learning Outcomes In this assignment, you will demonstrate your understanding of arrays and structures, and use them together with functions. You will further practise your skills in program design and debugging. 2 The Story... There are over 12 million credit cards in Australia, and the number is over 7 billion worldwide. This is a goldmine for cybercriminals who make unauthorised payments to obtain goods or services (i.e., credit card fraud). In the 2022-2023 financial year, it was estimated that 1.8 million people in Australia experienced card fraud. Banks and credit card companies are strongly motivated to develop anti-fraud technologies. They prevented two-thirds of the attempted card fraud in the UK in 2018, but this is a never-ending war. There are various anti-fraud algorithms. The core of those algorithms are rules and statistics (now advanced machine learning algorithms) to classify whether a transaction is abnormal and likely to be fraudulent. For example, a transaction well beyond the credit limit of a card is likely to be fraudulent, and so are two transactions of the same card issued at almost the same time but from two different cities. 3 Your Task In this assignment, you will write a program to process a list of credit card and transaction records (as exemplified below) and identify fraudulent transactions. You do not need to be an anti-fraud expert. fhlt2p 8000 500 hmqe2v 1000 800 q5g8d8 2000 1000 sqx7pb 20000 5000 swi6ea 250 100 @@@@@@@@@@ s34zzeup6b q5g8d8 2024:09:01:04:52:46 548 lusmddyzp9 fhlt2p 2024:09:03:06:18:22 9198 vd00nc9qb8 fhlt2p 2024:09:07:08:42:03 72 0het8hcrda sqx7pb 2024:09:10:12:10:53 610 toxesmipak q5g8d8 2024:09:10:15:14:54 936 k3hn309eep sqx7pb 2024:09:10:19:51:34 489 slvazil8t5 fhlt2p 2024:09:17:22:37:49 922 wkhispe89i q5g8d8 2024:09:21:23:34:27 2809 yhnxcl0ked hmqe2v 2024:09:26:23:12:08 433 adezmz9pqk swi6ea 2024:09:26:23:17:09 200 The input starts with a list of credit card records sorted by card ID. There are at least 1 and at most 50 cards. Each credit card occupies one line with three fields separated by a single whitespace: unique card ID (6 alphanumeric characters; no upper-case letters), daily limit (the total amount that can be spent in a day), and transaction limit (the amount that can be spent in a transaction). Both limits are positive integers that can be represented by int variables. The transaction limit does not exceed the daily limit. The line “@@@@@@@@@@” indicates the end of credit card records and the start of transactions. The transactions are sorted by date and time. There are at least 1 and at most 100 transactions. Each transaction occupies one line with four fields separated by a single whitespace: unique transaction ID (10 alphanumeric characters; no upper-case letters), card ID (6 alphanumeric characters; no upper-case letters; must have appeared in the card records), transaction date and time (year:month:day:hour:minute:second, four digits for year and two digits for each of the other components), and transaction amount (a positive integer, for simplicity). You may assume that the input data is always in valid format. No input format validity checking is needed. 3.1 Stage 1 - Read the First Credit Card Record (6 Marks) Your first task is to design a struct to represent a credit card record. You will then read in a credit card record from the input data, and output it in the following format (where “mac:” is the command prompt): mac: ./program < test0 .txt Stage 1 ========== Card id: fhlt2p Daily limit: 8000 Transaction limit: 500 You can also read all input data before printing out for Stage 1. You may (and should) add more functions as appropriate. 3.2 Stage 2 - Read the Rest of Credit Card Records (5 Marks) Next, continue to read all credit card records. You need to design a proper data structure to store the records read. An array will do the job nicely. When this stage is done, your program should output: the total number of credit card records read, the credit card with the largest daily limit (if there is a tie, print the card with the smallest ID among the tied ones), and the average transaction limit per card (up to two digits after the decimal point, by using “%.2f” in printf()). The output of this stage based on the sample input is: Stage 2 ========== Number of credit cards: 5 Card with the largest daily limit: sqx7pb Average transaction limit: 1480 .00 3.3 Stage 3 - Read the Transactions (5 Marks) Your third task is to design a struct to represent a transaction, read in the transactions, store them in another array, and output the total number of transactions and the credit card with the largest number of transactions (if there is a tie, print the card with the smallest ID among the tied ones). The output in this stage for the sample input above should be: Stage 3 ========== Number of transactions: 10 Card with the largest number of transactions: fhlt2p You may assume that all credit card IDs in the transactions can be found in the credit card records. 3.4 Stage 4 - Check for Fraudulent Transactions (4 Marks) The next stage is to check whether a transaction maybe fraudulent. You will go through the transactions. For each transaction, you need to check if it exceeds the transaction limit or the daily limit of the corresponding credit card. A sample output given the input example above is (note a final newline character ‘ ’ at the end): Stage 4 ========== s34zzeup6b WITHIN_BOTH_LIMITS lusmddyzp9 EXCEED_BOTH_LIMITS /* 9198 > 8000 and 9198 > 500 */ vd00nc9qb8 WITHIN_BOTH_LIMITS 0het8hcrda WITHIN_BOTH_LIMITS toxesmipak WITHIN_BOTH_LIMITS k3hn309eep WITHIN_BOTH_LIMITS slvazil8t5 EXCEED_TRANS_LIMIT /* 922 > 500 */ wkhispe89i EXCEED_BOTH_LIMITS /* 2809 > 2000 and 2809 > 1000 */ yhnxcl0ked WITHIN_BOTH_LIMITS adezmz9pqk EXCEED_TRANS_LIMIT /* 200 > 100 */ For a challenge, see if you can design an algorithm that only needs to go through the transactions once for completing Stage 4 . Hint: To achieve such an algorithm, you may need to modify the credit card struct to store additional information. 4 Submission and Assessment This assignment is worth 20% of the final mark. A detailed marking scheme will be provided on LMS. Submitting your code. To submit your code, you will need to: (1) Log in to LMS subject site, (2) Nav- igate to “Assignment 2” in the “Assignments” page, (3) Click on “Load Assignment 2 in a new window”, and (4) follow the instructions on the Gradescope “Assignment 2” page and click on the “Submit” link to make a submission. You can submit as many times as you want to. Only the last submission made before the deadline will be marked. Submissions made after the deadline will be marked with late penalties as de- tailed at the end of this section. Do not submit after the deadline unless a late submission is intended. Two hidden tests will be run for marking purposes. Results of these tests will be released after the marking is done. You can (and should) submit both early and often – to check that your program compiles correctly on our test system, which may have some different characteristics to your own machines. Testing on your own computer. You will be given a sample test file test0 .txt and the sample output test0-output .txt. You can test your code on your own machine with the following command and compare the output with test0-output .txt: mac: ./program < test0.txt /* Here ‘
ACTU PS5821 Actuarial Methods - Autumn 2024 Assignment - 2 Assigned 9/13/24, Due 9/21/24 Problem 1. Mortality follows the following survival function S0(x) = 0.1√100 − x, 0 ≤ x ≤ 100 = limiting age Calculate that a new born dies between ages 19 and 36. Problem 2. Mortality follows F0(x) = 1 − 1 + x/1 Calculate (a) p20 (b) 10|5q30 Problem 3. Mortality follows µx+t = 0.002 + 0.001t for 0 ≤ t ≤ 1. Calculate qx. Problem 4. Consider a life currently aged x, let T be the time lived by (x) after the age of x + n. Find the distribution of T Problem 5. A new machine component is assumed to fail at time T, where the force of failure is µt = 4(10 − t)/1, for 0 ≤ t < 10 Derive the density function and the survival function for this distribution
ECE4179 - Neural Networks and Deep Learning Deep Learning and Neural Networks Assignment Calculation Exercises - General Comments For the calculation exercises, ensure that you document any calculations/working-out. You can use a word editor to format your answers properly. You will receive a 0 if you do not provide calculations/working-out. Calculation Exercise 1: Multilayer Perceptron (MLP) 1. Consider the MLP network in Figure 1. Table 1 shows the value of each of the parameters of the network. The activation functions for all neurons are shown in Table 2. The neurons in the input layer, i.e. neuron 1 and neuron 2, do not use any activation function and simply pass in the input to the network. All the neurons in the hidden layer use a ReLU activation function, i.e., a3 (x) = a4 (x) = a5 (x) = ReLU(x) = max(0, x). The neuron in the output layer uses a Sigmoid activation function, i.e., a6 (x) = σ(x) = 1/ (1 + exp(−x)). For cross entropy loss, ensure you use loge. Answer the following questions. Figure 1: An MLP with one hidden layer (Question 1). Table 1: Parameter values of the MLP (Figure 1). Table 2: Activation functions of the MLP (Figure 1). 1.1. [4 points] Compute the output of the network for x = (x1 , x2 )T = (1, 2)T 1.2. [2 points] Assume the label of x = (x1 , x2 )T = (1, 2)T is y = 0. If we use the Binary Cross Entropy (BCE) loss to train our MLP, what will be the value of the loss for (x, y)? 1.3. [2 points] Now assume the label of x = (x1 , x2 )T = (1, 2)T is y = 1. For BCE loss, what will be the value of the loss for (x, y)? Do you expect the loss to be bigger or smaller compared to the previous part? Why? Explain your answer and your observation. 1.4. [6 points] Assume the learning rate of the SGD is lr = 0 .1. For a training sample x = (x1 , x2 )T = (1, 2)T and y = 0, obtain the updated value of w3 ,6 . 1.5. [6 points] Using the assumptions from the previous part (i.e., the learning rate of the SGD is lr = 0.1, the training sample is x = (x1 , x2 )T = (1, 2)T and y = 0), obtain the updated value of w2 ,5 . Calculation Exercise 2: Activation Function 2. [10 points] Consider the following activation function: We stack 1,000 of z, to form. where ◦ denotes function composition. What would be the response of z1000 to x ∈ R? You need to discuss the behaviour of z1000(x) for x ∈ R. We plot the activation function in Equation (1) along with the 45-degree line in Figure 2 for your convenience. Figure 2: Activation function for Question 2. Coding Exercises - General Comments You will code up these exercises with the provided skeleton notebooks. The results and discussions you obtain from the notebook can stay within the notebook without going into a separate PDF. Each task will have its own discussion questions. Linear and Logistic Regression 3. [25 points] You are probably thinking, these models again! Okay you are right, but there will be addi- tional ideas presented here. In the first subtask, you will explore the effects of outliers in your dataset and how that can affect your model performance. You will apply a weighted linear regression model so that the resulting model is more robust. In the second subtask, you will be exploring ways to model non-linearities in the dataset with a linear regression model by transforming your inputs to a linearised space and performing classification in the transformed space with a technique called decay learning rate. Task 1.1. Weighted linear regression In this coding exercise, we study the iterative weighted linear regression model. In some problems, every data point might not have the same importance. Having weights associated to samples will provide us with a principal way to model such problems. Consider a data set in which each data point (xi , yi ), xi ∈ Rn , yi ∈ R is associated with a weighting factor 0 < αi ≤ 1. Define the loss of a linear model with parameters w ∈ Rn as the weighted sum-of-squares error: It can be shown that the optimal weights can be obtained as: Here, X is a matrix of size m × n where every row is one input sample (i.e., row i in X is xi ). Similarly, Y is an m dimensional vector storing yi and A is a diagonal matrix of size mm with A[i,i] = αi. The purpose of this task is to train an iterative linear regression model that will weigh the samples as the model is being trained. You need to develop the mechanism to weigh each sample as the model is being iteratively trained. Here, the diagonal matrix A is updated by using the following equation: where σ is a hyperparemeter you will tune. You are supposed to implement a weighted linear regression model to explain the data. The data for this question has two sets, a training set (X trn , Y trn(no)isy ) and a validation set (X val, Y val ). You are supposed to use only the training set (X trn , Y trn(no)isy ) to train your model. Note that the training set is noisy (i.e., Y trn(no)isy is noisy). You will use the validation set to evaluate your model and as you might have noticed, the validation set is noise free. Since in this case, the weight of each sample is not provided, you need to develop a mechanism to approximate how noisy a sample is. One way of doing this is to first fit a linear regression model to your data and then check and see which samples your model cannot explain well (i.e., the prediction is not good). For such samples, you need to devise a way to assign a reduced sample weight. Once you attain the weights according to the error of your predictions, you can fit a weighted linear regression model and repeat this process a few times till you obtain a model that can explain the validation data well. Implement the aforementioned strategy and report your error on the validation set. For your convenience, a sketch of a possible solution is provided in Algorithm 1. Hints. • You will craft new non-linear features. • The error of the validation set is Here, ˆ(y)i(val) = wxi(v)al is the prediction of your model for a validation sample and m is the number of samples within your validation set. • You have to tune σ yourself. • You have to choose a stopping condition. Algorithm 1: Iterative Weighted Linear Regression Data: The training set X trn ∈ Rm ×n , Y trn(no)isy ∈ Rm Data: The validation set X val ∈ Rp ×n , Y val ∈ Rp Result: The parameters of the optimal model w* ∈ Rn A ← 1; for iter in max-iter do w ← Fit a weighted linear regression model using Xtrn,Y noisy trn , A ; /* Use ?? and note that A is a diagonal matrix keeping the sample weights ai */ yˆi = w⊤x trn i ; /* Evaluate your model on all training samples */ aˆi = exp end w* ← the model with the minimum validation error Task 1.2. Using non-linear features and learning rate decay for better classification You have been given a set of samples x = (x1 , x2 )T ∈ R2 . In this task, you will apply the knowledge you learned from previous labs to train a logistic model via Gradient Descent and try to improve the performance by implementing a decaying learning rate. Decaying learning rate can be simply implemented as: lrnew = (1 − α) * lrold , (6) where 0 < α < 1 is a hyperparameter. In this task, we use α = 0.1% for the learning rate decay. You will follow the standard procedure of first loading in your data and visualising it. From there, you will apply nonlinear transformations to your data via GD. You can then visualise your decision boundary and write a decaying learning rate functino to further improve your model. You can reuse functions sigmoid, compute loss and grad and predict from your previous labs for this task. Plot the decision boundary for above on test data. Compute the accuracy of the resulting model on the test data (X test, y test). Task 2. Denoising autoencoder (DAE) with Face Data Whenever you measure a signal, noise creeps in. Denoising (aka noise reduction) is the process of removing noise from a signal and is a profound and open engineering problem. In this exercise, you will learn and implement a Denoising AutoEncoder (DAE) to remove additive random noise from images. Autoencoders. An autoencoder is a neural model that is trained to attempt to copy its input to its output. Internally, it has a hidden layer z that describes a code used to represent the input. To be precise, an autoencoder realizes two functions/networks, a function fenc to transform the input x ∈ Rn to a new representation z ∈ Rm , followed by a function fdec , which converts the new representation z back into the original representation. We call these two functions the encoder and the decoder (see Figure 3 for an illustration). You may ask yourself if an autoencoder succeeds in simply learning to set fdec (fenc (x)) = xeverywhere, then what is it useful for? The short answer to that is, the new representation z learned by the autoencoder captures useful information about the structure of the data in a compact form that is friendly to ML algorithms. But that is not all. In deep learning, we can borrow the idea of autoencoding and design many useful solutions, denoising being one. DAE. In a DAE, instead of showing x to the model, we show a noisy input as x(˜) = x + ϵ . The noise ϵ is task specific. If you are working with MRI images, this noise should model the noise of an MRI machine. If you are working on speech signals, the noise could be the babble noise recorded in a cafe. What you will ask your DAE to do is now to generate clean samples, i.e. x(ˆ) = x (see Figure 3 for an illustration). So in essence, knowing about the problem and associated noise will enable you to simulate it. This will give you a very task-specific solution, which is in many cases desirable. Figure 3: Top. An autoencoder is comprised of two subnetworks, an encoder and a decoder. In its vanilla form, the goal is to extract useful structure and information about the input. Bottom. In a DAE, you feed the network with a noisy input and train the model to produce clean outputs. 4. [25 points] In this task, you will implement a DAE to reduce the amount of noise within the dataset. Table 3 shows the hyperparameters and network architecture that you will be using. Table 3: Hyperparameters for the DAE model. Note that some of the hyperparameters have been replaced with ” ??? ” You will need to Compute Peak Signal-to-Noise Ratio (PSNR) for test dataset. The PSNR isa commonly used metric to measure the quality of areconstructed or denoised signal or image. The PSNR is calculated as the ratio of the peak signal power to the noise power, typically measured in decibels (dB). PSNR can be defined as Where: • PSNR is the Peak Signal-to-Noise Ratio in dB. • MAX is the maximum possible pixel value (e.g., 255 for an 8-bit image). • MSE is the Mean Squared Error between the original and the reconstructed (or denoised) image. It’s calculated as the average of squared pixel-wise differences between the two images. You will be asked to show the PSNR values for: 1. Between the noisy image and original image 2. Between the reconstructed image and original image We provide you a handy class torchmetrics.image.PeakSignalNoiseRatio for PSNR calculation. Note: To create the noisy data, you will inject random noise into the data samples during the training step within your network. This is shown in the skeleton code. You will also need to reshape the output predictions to visualize the output image. Task 3. Speech Command Recognition 5. [20 points] In this final task of your assignment, you will be loading a speech recognition model from the following options: • Word2Vec2 • Whisper • HuBERT And using it to extract feature representations from audio files. The goal is to train a model that can recognize ten different voice commands, including ”Yes”, ”No”, ”Down”, and more. To accomplish this task, you will follow these steps: • Dataset: You will work with the Speech Commands dataset, which consists of audio recordings of various command words. The dataset is divided into three folders: Train, Validation, and Test. The Train folder contains audio files for training the models, the Validation folder contains audio files for hyperparameter tuning, and the Test folder contains audio files for final predictions. • Preprocessing: You will preprocess the audio data by extracting meaningful features using your model of choice. You can choose a pre-trained model that has been trained on labeled speech data and can effectively capture spoken language patterns and features effectively. The pre-processing model normally comes with the pre-trained model that we have listed above. • Model Training: You will train a simple MLP (Multi-Layer Perceptron) model to predict the labels of the voice commands. The MLP model will take the extracted features as input and learn to classify the voice commands into ten different classes. • Evaluation: You will evaluate the performance of your trained model using accuracy as the eval- uation metric. Accuracy measures the percentage of correctly predicted labels. • Testing: Finally, you will make predictions on the test dataset using your trained model and submit your results to Kaggle (instruction is provided in the notebook). • Marking: – 10/20 points are allocated to the notebook quality. – 10/20 points are allocated to the Kaggle Competition results. You need to achieve at least 85% accuracy on the test set. The competition marks will be linearly awarded from 0 to 5 points according to accuracy from 85% to highest accuracy in this competition. Kaggle Competition: The link to the competition is provided here: https://www.kaggle.com/ competitions/ecse-4179-5179-6179-2024-s-2-assignment-1 • Your student email has been registered for the competition. • You should create aKaggle account with your student email address and then attempt the compe- tition. • You have access to the dataset from Data tab in the Kaggle page. By completing this task, you will gain hands-on experience in speech recognition using the pre-trained speect recognition models and learn how to train a model to recognize voice commands. This skill has wide-ranging applications, including voice-controlled systems for smart home devices, navigation systems, and automotive applications.
ELEC4611 POWER SYSTEM EQUIPMENT LABORATORY EXPERIMENT 5 COMPUTER-BASED ANALYSIS OF ELECTRIC STRESS 1. INTRODUCTION Insulating materials used in power system equipment are subjected to severe electric stress. Breakdown will occur if the stress exceeds the material breakdown strength. Knowledge of the electric field distribution in a given insulating structure is important as it enables determination of the permissible operating voltage and methods of controlling electric stress. This knowledge can be achieved using computer-based numerical methods such as the Finite Element Method (FEM) to solve the Laplace’s or Poisson’s field equations. Note that practical insulating systems usually involve a combination of different insulating materials with different permittivity and also require solving three-dimensional fields with complex boundary conditions. 2. EXPERIMENT This experiment involves the use of computer programs. There are many commercial software programs for field analysis. One such product is the Ansys Maxwell 2D for two- dimensional field analysis (www.ansys.com). The workflow process to solve a field problem involves six steps: create a structure → assign materials → add boundaries → add excitations → setup the solution → solve → post processing. (a) Draw, set up, and solve for the electrostatic field in between two parallel copper plates (1 mm thickness, 15 mm length) at 5 mm apart with an applied voltage of 1 kV. Verify that the electric field is uniform. Starting Maxwell: do one of the following: - Double-click the ANASYS Electronics Desktop icon on Windows Desktop. - Use Start menu to select Programs>ANASYS Electronics Desktop Create a 2D Project: - From the toolbar Maxwell>Maxwell 2D The Project Manager window will appear on the left. To create solution type, do one of the followings: - Choose Maxwell 2D>Solution Type>Electrostatic - Right click on Maxwell2Ddesign1 in Project Manager window, then choose Solution Type and Electrostatic. Note: You need to set the Solution Type to Electrostatic when you insert a new project. Create modeling objects: In order to draw the above structure (parallel plates), you can follow these steps: (a) Design the first plate: - Draw>Line - In status bar, enter 0 in X box and 0 in Y box. - Change the coordinate from Absolute to Relative. - Enter 0 in dX box and 1 in dY box (after this step, you can see a vertical line with length of 1mm will be drawn). - Enter 15 in dX box and 0 in dY box. - Enter 0 in dX box and -1 in dY box. - Enter -15 in dX box and 0 in dY box. - Right click on design window>Done. After this step, the object will be automatically named Polyline1. (b) Design the second plate: - Repeat part (a) above with appropriate coordination start with 0 in X box and 6 in Y box. - The plate will be automatically named Polyline2. (c) Design boundary: - Draw>Rectangle - In status bar, enter -20 in X box and 27 in Y box. - Enter 55 in dX box and -47 in dY box - It will be named Rectangle1 Defining Materials: In this step, the materials as well as their characteristics will be assigned to above created objects. Choose Polyline1 and Polyline2 objects > Modeler > Assign Material. In materials tab, choose copper > OK. Setup Boundaries and Excitation: (a) Choose Polyline1>Maxwell 2D>Excitation>Assign>Voltage>enter 1000 V>OK (b) Choose Polyline2>Maxwell 2D>Excitation>Assign>Voltage>enter 0 V>OK (c) Edit>Selection Mode>Edges. Hold Ctrl + left click on 4 edges of Rectangle1 >Maxwell 2D>Boundaries>Assign>Balloon>OK. Generating a Solution (a) Setup a Matrix Calculation: Maxwell 2D>Parameters>Assign>Matrix>Check Voltage 1 as Signal Line and Voltage 2 as Ground. (b) Setup a Solution: Maxwell 2D>Analysis Setup>Add Solution Setup>Leave these criteria as default. Checking Validity and Run Simulation: (a) Maxwell 2D> Validation Check Make sure all steps are checked. (b) Run simulation: Maxwell 2D>Analyze All. Monitoring electric stress: Choose Rectangle1 >Maxwell 2D>Fields>Fields>Mag_E>AllObjects (b) Consider a right-angled structure as shown in Figure 1: Create a new Maxwell 2D project and obtain the field plot for this structure. Comment of the results. Suggest a minor modification that can be done to the structure to reduce the stress. Redo the plot to verify. Note that: Properly set the solution type. When designing boundary, create a rectangle that is relatively large in order to see the complete field distribution. When drawing the object, choose an origin by yourself (or following the instructions of your lab demo) and work out the relative coordinates for the rest of points. Choose Modeler >Units>cm Figure 1 Note: The thickness of the above electrodes is 1cm, and the distance between two electrodes is 5cm. (c) A cable, shown in Figure 2, has an eccentric core and axial uniformity. There are 100 kilo-volts across the cable and the insulation has a relative permittivity εr = 2.0 and resistivity P = 1013 Ωm (conductivity can be worked out by taking the inverse of resistivity). The geometrical parameters can be determined using the scale provided in Fig. 2. Obtain the field plot for this cable using Maxwell 2D. Determine the stress and voltage at points P1 and P2. Compare simulation results with those obtained using manual field mapping (see Appendix). Identify the region of highest stress and determine its value. Calculate the cable capacitance and insulation resistance (per unit length). Explain why the lower half plot (in Fig.2) is incorrect. If this cable is concentric, redo the field plot and determine the highest stress. This case can also be solved analytically and the electric field at a radius r is given by: where b is the outer radius, a is the inner radius, and Vis the total voltage across the insulation. Compare the results. Also, compare against that of the eccentric core. Note: inner circle (cable core) should be subtracted in order to achieve accurate result. Fig.2: (a) curvilinear squares plot for an eccentric cable of constant cross- section, (b) general curvilinear square and its subdivisions, (c) expanded view of curvilinear square 2 that forms the ends of a curvilinear cell of depth d (m). (d) In many high voltage insulation systems multi-dielectric structures are used with dielectric materials with different relative permittivity in order to provide better use of insulation by reducing the overall insulation thickness and making the field more uniform within the overall layer structure. In other cases, the use of multi-dielectric structures is unavoidable such as in a HV bushing where the small gap between the porcelain insulator and the inner HV conductor is normally filled with insulating oil. Consider the 11 kV model bushing as specified in Experiment 3 with the applied voltage of 20 kV. Obtain the field plot for the case when the gap is air, and determine the highest stress by modelling cross section of bushing Obtain the field plot when the gap is filled with oil, and determine the highest stress by modelling cross section of bushing Comment on the results. 3. REFERENCES 1. E. Kuffel, W.S. Zaengl, and J. Kuffel, High Voltage Engineering: Fundamentals, 2nd ed., Butterworth-Heinemann, 2000. 2. Ansoft Corporation, Getting Started: A 2D Electrostatic Problem, Maxwell 2D Student Version, 2002. 4. APPENDIX - FIELD ANALYSIS BY MANUAL FIELD MAPPING To solve a field problem, we need to obtain the flux or potential distribution. From this, we can obtain the required macroscopic and microscopic properties e.g. R, C, L , J , D , B , E , etc There are three methods of obtaining flux and potential distribution: 1. Solve Laplace’s equation ( ▽2φ= 0) or Poisson’s equation ( ▽2φ= −Pε) analytically or numerically 2. Manual field mapping 3. Numerical iteration Field mapping This technique uses known field properties to draw up a map of the field for a particular configuration. It can give surprisingly accurate results. Field properties: (i) Flux lines and equi-potentials are orthogonal (ii) Surfaces of flux sources are equi-potentials (iii) Flux lines intersect sources and sinks orthogonally. The aim is to divide the field structure into curvilinear squares (assuming there is symmetry in the third dimension) If the element is part of current flow and the current density is J , and electric field E ΔI = J × area = J × ( Δx ) = JΔx ( =1 m) ΔV = EΔy Hence, resistance of the elemental section is: = P if = 1m and Δy = Δx Thus, each curvilinear square of unit depth has resistance P. The total resistance can be obtained by counting squares in the full map. This holds for any field, the only difference being the property relative to the field type, e.g. For an electric field, capacitance of the unit square = ε For a magnetic field, the unit square inductance = μ For a thermal field, the unit square conductance = k e.g. for a current flow field above, if there are n equipotential drops and m flux tubes of current and the resistivity is P, then the total R is: ohms In the above: n = 4, m = 8 → R = ohms If a capacitance: ΔΨ = ΔQ and total Q = mΔQ = 8ΔQ Δφ = ΔV and total V = nΔV = 4ΔV Hence: For flux density and potential gradient, use the appropriate single square and the applicable scale factor of the map: Flux density = ΔΨ Ψm = = Δx Δx Thus if we know total Ψ and φ and get m and n, and Δx (=Δy ) from the map, we can find ΔΨΔx and Δφ Δy .
DSA5102 Programming Assignment 2 Due: 20 October 2024 The goal of this assignment is to get you started on your final project. You should have (or should do so now) identified a potential dataset to work on. Refer to project instructions with data resources if you have trouble deciding on a dataset. Try to find something that’s interesting and unusual! In a Jupyter notebook: 1. Introduce your dataset of choice and perform. basic data visualization (you will improve upon these later in your project) 2. Introduce an unsupervised learning problem statement (dimensionality reduction, clustering, etc) and apply a method to solve the problem (PCA, autoencoders, K-means clustering, etc) 3. Discuss any interesting findings Please use the markdown features of Jupyter to document your steps. You will receive feedback, which will help you with your project. You are allowed to re-use content from this programming assignment in your final project.
LAB TEST 2 MICROSOFT ACCESS May 2015 Semester 2 (2014-2015) 2.5 Hours Lab Test 2 - Microsoft Access Please create Microsoft Access file, named with your Matric Number (example - A123456). Please follow the instruction that being given inside this questions. Please name your "Table", "Query", "Form", "Report" and "Button" with the right and suitable name. Please submit 2 items in the end of the Lab Test, 1) Microsoft Access file, and 2) “Switchboard Drawing” (hand-written). 1) Create 4 "Table" with the given data below: i - Personal ID_A Name ID_B ID_C Address A001 MUHAMMAD FARID ABDUL AZIZ B001 C001 3A-7, Tingkat 4, Blok A, Jalan Perdana, CBD Perdana, 63000 Cyberjaya, Selangor A002 ABDUL MUIZ SHAMSUL BAHARI B002 C001 Lot 133, Jalan Pukal, Kawasan LPJ, Pasir Gudang, 81700 Johor A003 SAIFULLAH MUHAMMAD ALIAS B003 C002 No 8, Jalan SS21/39, Damansara Utama, 47400 Petaling Jaya, Selangor A004 NURUL AIN ABDUL LATIF B001 C002 2790, Jalan Changkat Permata, Taman Permata, 53300 Kuala Lumpur A005 NUR SYAFIQAH MUSTAFFA B002 C003 7A, Jalan TTJ S/A, Taman Tunku Jaafar, 71450 Seremban, Negeri Sembilan A006 CHAN WAI YAN B003 C002 Kg. Padang Panjang, Jalan Bukit Wang, 60000 Jitra, Kedah A007 YUGENDRAN A/L KUMAR B003 C003 No 6, Jalan Panglima 2, Taman Panglima, 75400 Bukit Serindit, Melaka A008 KISHANTRAN A/L MISWARAN B001 C003 Jalan Damai 1, Janda Baik, 28750 Bentong, Pahang A009 MUHAMMAD LUTHFI JOHAN B002 C002 AL 97, Lot 2781, Jalan Kg. Baru, 47000 Sg.Buloh, Selangor A010 SHAFIQ HAIKAL JOHARI B001 C001 Lot 9895, Jalan Kampung Jawa, Seksyen 35, 40470 Shah Alam, Selangor A011 AINA SYUHADA ABDUL GHAFUR B001 C001 No 2, Jalan Astaka U8/84, Seksyen U8, 40150 Shah Alam, Selangor A012 FARAH NATASYA KAMARUL B002 C002 Lot 16, Jalan Sementa 27/92, Seksyen 28, 40000 Shah Alam, Selangor A013 SHAFIRAH AHMAD B003 C003 No 5, Jalan USJ 2/7, UEP Subang Jaya, 47600 Subang Jaya, Selangor A014 MUHD AZROL MOHD ARIFFIN B004 C004 25-32, Jalan Kuala Kurau, 34200 Parit Buntar, Perak A015 SITI SYAKIRAH MUHD KAMAL B001 C001 247, Jalan Pekeliling, 81700 Pasir Gudang, Johor A016 SYARIFAH SHAHIRAH SYED RASUL B002 C002 23, Putera Jaya, Bandar Permaisuri, 22100 Setiu, Terengganu A017 ABDUL HAKIM ABDUL RAHMAN B003 C003 203, Jalan Pasir Puteh, 31650 Ipoh, Perak A018 FAHRIN AHMAD MUHD ZAMREE B004 C004 1528, Jalan Hospital, 15200 Kota Bharu, Kelantan A019 KHAIRUL AZHAR RIDHWAN B003 C004 248, Jalan Pekeliling, 81700 Pasir Gudang, Johor A020 WONG SIEW FANG B004 C004 No. 13, Jalan IM3/7, Bandar Indera Mahkota, 25200 Kuantan, Pahang ii - Income ID_B Salary Allowance1 Allowance2 B001 3000 500 200 B002 2900 250 150 B003 2800 100 100 B004 2700 50 50 iii - Expenses ID_C ID_D Expense1 Expense2 C001 D001 60 60 C002 D002 30 30 C003 D003 15 15 C004 D004 10 10 iv - Addition ID_D Add1 Add2 Add3 D001 40 455 700 D002 35 453 800 D003 49 543 850 D004 99 555 530 2) Build suitable "Relationship" which connects all "Table" that you have created. Please make sure the right “Primary Key” being used. 3) Create 4 "Query" with the details below: i - Full_Data (should have these data: Name, ID_A, ID_B, ID_C, ID_D, Address, Salary, Allowance1, Allowance2, Expense1, Expense2, Add1, Add2 and Add3) ii - Income_Data (should have these data: Name, ID_A, ID_B, Salary, Allowance1 and Allowance2) - should have a suitable “Calculation” for Total_Income iii - Expenses_Data (should have these data: Name, ID_A, ID_C, ID_D, Expense1, Expense2, Add1, Add2 and Add3) - should have a suitable “Calculation” for Total_Expenses iv - Balance (should have these data: Name, ID_A, Total_Income and Total_Expenses) - should have a suitable “Calculation” for Total_Amount 4) Create 4 "Form" with the details below: i - Personal ii - Income iii - Expenses iv - Addition 5) Create 4 "Report" with the details below: i - Full_Data ii - Income_Data iii - Expenses_Data iv - Balance 6) Create "Switchboard" with the details below: i - “Startup Page” (Please make sure your "Startup Page" is functioning) ii - “Main Menu” iii - "Form" (Add Mode) iv - "Form" (Edit Mode) v - "Report"
CENTRE FOR ENGLISH LANGUAGE AND FOUNDATION EDUCATION AUTUMN SEMESTER 2024-2025 ARTFF027 Critical Thinking and Study Skills Assignment Question (30% of total marks) ◆ Pick a topic on the current global issue that is of interest to you. ◆ You must take a clear stand on the issue, clearly state how it has an impact on our lives. ◆ Support your stand (using both inductive and deductive arguments) with relevant evidence from various sources. You also have to clearly state the counter aruguments and refutation. ◆ Please state the title of your essay and also your group number on the cover page. Instructions: • This assignment is to be completed as a group work with 6 members. • You must use size 12 Verdana font with double spacing. • You MUST include both in-text and end-of-text referencing using the Harvard Referencing System. • You MUST verify the content of your report through Turn-it-in and attach the originality report with a similarity index no more than 20% for submission purpose. • Word limit for the report: 1,500 words (+/- 10%), between 1,350-1650 words). The word-count must be indicated at the end of the essay. • This assignment must be submitted electronically through a submission portal on Moodle. Only the one student (group leader) should submit the assignment on moodle for each group. If you are experiencing trouble accessing moodle, please contact IT support and/or your module convenor. • Generally, all group members would receive the same score. However, where the input of one member has been much less than required, the other members are to fill-in the peer assessment form. The form is available on the module moodle page. • The deadline for submission is: Thursday, 17thOctober, 5 pm. Please ensure that you use the cover page that will be available on the module moodle page.
AGRI10051 Quantitative Genetics Assignment Question 1. Explain all the differences between qualitative and quantitative traits. Include specific examples to support your answer. (10 marks) Question 2. For each of the following traits, identify if it is an example of a quantitative or qualitative traits. (5 marks) Crop yields (g) Crop height (cm) Grain shape (roundness) Flower colour (red vs white) Animal weight (kg) Question 3. You have been allocated a data set (see Canvas module) which represents a quantitative trait (grain weight (grams) per cob of corn) for 100 plants. a) Using the Quantitative Genetics Workshop as a guide, create a customised histogram for your data set (insert on Page 2 of this document). (5 marks) and; b) Complete the table on Page 3. (15 marks) Question 4. Two different, homozygous corn varieties were crossed together, and the resultant F1 generation showed greater grain weight (grams)/cob of corn than either parental variety. Why could this occur, and what would you expect to happen if the F1 generation was used to create an F2 generation? (5 marks) Question 3a) Add your customised histogram of data set below. Include axes labels. Question 3b) Table of calculations for the corn cob data set Function How is it calculated/ determined? What does this function mean? Why is it used? Calculated value from your data set Average (Mean) Median Range Minimum Maximum Variance (Sample) Variance (Population) Standard deviation (Sample) Standard deviation (Population)
BUSI4528-E1 A LEVEL 4 MODULE, AUTUMN SEMESTER 2018-2019 QUANTITATIVE RESEARCH METHODS FOR FINANCE AND ACCOUNTING 1. a) A researcher is interested in the factors that affect women’s decision to participate in the labour force. He interviews a total of 753 women in 2000 and collects data on a number of variables as described below: fempart : Variable taking value 1 if a woman participated in the labour force, 0 otherwise faminc : Gross family income in the year 2000, measured in US $ educ : years of schooling, in years age : age, in years exper : years of working experience, in years urban : Variable taking value 1 if the woman lives in the urban area, 0 otherwise kidsunder6 : number of kids under 6 years old (i) Explain how the Logit model is set up and how the researcher should use it to calculate the probability of participating in the labour force for each individual in the data set. [30 marks] (ii) The actual estimation of the Logit model reveals the following output. Calculate the probability of participating in the labour force for a woman who is 36 years old and lives in the urban area. She has completed 14 years of schooling and 5 years working experience. She currently has 2 kids under 6 years old. It is also known that her total family income is US$ 60,000 per annum. Show all your workings. [10 marks] Iteration 0: log likelihood = -514 .8732 Iteration 1: log likelihood =-411 .62085 Iteration 2: log likelihood =-407 .17257 Iteration 3: log likelihood = -407 .1063 Iteration 4: log likelihood =-407 .10628 LRchi6 2===753215.530.0000Loglikelihood=-407.10628PseudoR ]faminc.00001698.06e-062.100.0351.16e-06.0000327educ.1596136.04297953.710.000.0753753.243852age-.1017045.0134487-7.560.000-.1280634-.0753456exper.126727.01335079.490.000.1005601.152894urban-.1671848.1881382-0.890.374-.5359288.2015592kidsunder6-1.421205.1974545-7.200.000-1.808209-1.034201_cons1.431475.73895941.940.053-.01685892.879809
INFOSYS110 INFORMATION SYSTEMS Business Systems SEMESTER TWO 2020 SECTION A: APPLIED MULTIPLE CHOICE QUESTIONS ● Answer ALL questions in this section. ● Some questions in this section are related to the Exam Case at the end of this ● question booklet. Please read it before answering. ● Choose the one answer that you consider to be the best. ● To indicate your answer, use a dark pencil (or a pen) to shade in neatly the matching bubble on the Teleform sheet. 1. With the expanding business at DRNZ, if Jillian and James need an Enterprise Architect, what skills would they be looking for? a. Expertise in business and expertise in information systems b. Expertise in data communication networks and expertise in accounting c. Expertise in programming and expertise in public speaking d. Expertise in mathematical modelling, statistics and the environment e. Expertise in business, expertise in technology, and people skills 2. Dr David Upsdell, the newly hired enterprise architect at DRNZ, claims, “data is our most important asset, because all our recommendations to clients are derived from collecting, storing, and processing data through the activities of the drones. We have solid plans to secure that data” . These plans include, . how to restore our backups after major catastrophes (like major earthquakes or volcano eruptions); . how to restore the data repositories have them fully operational within 2 hours of a catastrophe to continue uninterrupted service to DRNZ clients. DRNZ’s first plan is a , and its second plan is a . a. Information Architecture plan; Backup plan b. Disaster Recovery Plan; Information Architecture plan c. Disaster Recovery Plan; Business Continuity Plan d. Business Continuity Plan; Information Architecture Plan e. Business Continuity Plan; Disaster Recovery Plan 3. DRNZ in the past, used an ACCESS database to store all client, drone, and drone-use data. This database was easy to work with, but as the number of clients grew, it struggled to handle the load generated. They had to upgrade their infrastructure to handle this unexpected large volume of data. In terms of enterprise architecture, DRNZ’s needed to upgrade its infrastructure because they did not initially consider . a. designing for security b. designing for standardisation c. designing for cost d. designing for maintainability e. designing for scalability 4. Businesses are forced to respond to disrupted markets caused by disruptive technologies and business models, as they must continue to be competitive and sustainable. Businesses whose enterprise architectures are founded on the principle(s) of are known to be best able to respond. a. Scalability b. Flexibility and agility c. Speed and quality d. Data security e. Ease of use 5. Decide which of the options is most correct. At DRNZ, managing and maintaining the quality of data can be difficult because: a. Data is inconsistently copied across multiple systems b. Data is frequently stored in numerous locations c. Data is collected by many individuals d. Data collected from multiple, non-uniform sources must be pre- emptively designed to be automatically formatted before storing in the database. e. All options are correct. 6. Decide which of the ordered list of words in the given options is most appropriate to fill in the blanks. The databases at DRNZ store that are analysed to produce that supports recommendations given to DRNZ’s clients about the use of their drones in business. a. Analytical information, transactional information b. Transactional data, analytical information c. Knowledge, wisdom d. Analytical data, transactional information e. Transactional data, operational data 7. The Figure below shows three tables from DRNZ database. Table 1 gives details of customer orders; Table 2 gives details of products; and Table 3 gives details of quantities of products ordered. The customer with a Customer ID of 1000 is Koro. The total number of the Drone z876WIH, ordered by Koro are: a. Between 1 and 19 b. 100200 c. Between 20 and 30 d. More than 21 e. 1000 Table 1: CUSTOMER-ORDER Customer_orderId Customer_order_date Customer_Id 100200 12/06/2020 1000 100201 13/07/2019 1207 100202 13/08/2019 1000 100203 13/09/2019 1207 100204 13/10/2019 1208 100205 13/10/2019 1208 100206 14/10/2019 1209 Table 2: PRODUCT Product_Id Product_description 1 Drone z876WIH 2 Drone APr765H 3 Drone YZrY579 4 Drone Wr102nz Table 3: PRODUCTS IN CUSTOMER ORDER Customer_orderI d Product_Id Quantity_ Ordered 100200 1 9 100201 2 10 100203 4 12 100202 1 12 100204 1 7 100205 1 10 100206 2 8 100200 3 8 8. DRNZ offers New Zealand’s businesses a unique product and service providing customised drones and maintenance. It is hard to replicate as the business is based on specialised technical skills of the owners, and because it has gained a first mover’s advantage over others. According to Porter’s Generic Strategy Model, DRNZ’s competitive advantage is: a. Moderate, because others who have the skills and the capital can set up in similar business. b. Differentiation, because the product it offers are specialty products. c. High, because Mr and Mrs Ciao are in a committed relationship and have complementary skills; they have invested a huge amount of capital in the business to set it up in a niche market and have a first movers’ advantage. d. Broad, because there so many kinds of drones in the market e. Low Cost, because it is easy for others to setup shop selling customised drones 9. Consider the data mining techniques “Cluster Analysis” and “Association” . They are both algorithms that can be used for prediction. a. Sustainable b. Data warehousing c. Data Mining d. Qualitative e. Visualisation 10.The CIO (Jillian Ciao) at DRNZ discovered that many customers who bought drones for restaurant delivery also bought a drone for recreation. Analysis revealed that restaurant purchases were made by young adults. Select which data mining technique would have best enabled Jillian to discover this? a. Anomaly detection b. Association c. Regression d. Classification e. Cluster Analysis 11.As the examiner was typing up the INFOSYS 110 exam questions on her office PC, she was aware of the need to keep the questions a secret as requested by the central examinations office of the University. Therefore, she locked her office door and unplugged the network cables from the office PC when doing this task. In terms of information security, the information about the examination was protected from by locking the door, and from by unplugging the network cables. a. External misuse; internal misuse b. Social engineering attempts; virtual threats c. Paranoia; social engineering attempts d. Physical threats; digital threats e. Intentional misuse; accidental misuse 12.A sustainable business is one that endures in the long-term by: a. providing employment for vast numbers of people in society b. carrying out technological research and development consistently and ethically c. satisfying shareholders by making profits while expanding the business continuously d. fulfilling its vision, supported by all its staff e. carrying out its operations with the least negative impact on society, the environment and the financial situation of the company 13.Which of the following is an example of a project? a. Starting the production run of a new model of smartphones b. Checking random samples from a batch of Strawberry Jam c. Operating as a projectionist in a cinema d. An architect planning to design a customised house for a client e. A software engineer working in creating a mobile application 14.A new computer system was installed at DRNZ. Which following task is beyond the scope of a DRNZ project manager’s responsibilities? a. Handling disputes among personnel b. Managing changes c. Balancing among scope, time, and cost d. Drawing up the project plan e. Training staff about the new hardware 15.What type of technology do Customised Drones fall under? Choose the most appropriate out of those listed below. a. Artificial Intelligence Technology b. Sustaining Technology c. Mobile Technology d. Information Technology e. Social Technology 16.Rather than giving generic recommendations to all customers, DRNZ recommends cost saving advice tailored for each customer’s way of operating the drones. The recommended cost saving advice is derived using AI technologies. In providing these recommendations, relevant and specific for each customer’s business, DRNZ should a. Adhere to new laws that ensure AI technologies are used ethically b. Use large amounts of usage data to train and test the algorithm used by the drone before deployment c. Use well known algorithms from established sources d. Consider using both supervised and unsupervised learning algorithms e. All options are true 17.When a Microsoft Excel worksheet is used to record INFOSYS 110 exam results, Excel acts as a . When the same worksheet is used to generate statistics and graphs to finalise student grades, Excel acts as a _____ . a. Row; Column b. Data store; Data Mine c. Database; Data Warehouse d. Transaction Processing System (TPS); Decision Support System (DSS) e. Spreadsheet; Formula 18.At DRNZ, Jillian receives a report from the marketing team outlining which of their drones has generated the most sales revenue in the last quarter. This report is an example of presenting: a. All options are true b. Transactional Information c. Analytical Information d. Information integration e. Customer Relationship Management 19.Consider the following hypothetical situation: The University of Auckland has a database that records information about each student. A marketing company has approached the university and offered to buy the data in order to market services to the students. Which category of ethical issue does this situation primarily fall into? a. Accessibility b. Property c. Sustainability d. Privacy e. Accuracy 20.Uber officially launched in San Francisco in 2011. However, many users were given access to an early version of the service in Mid-2010, before release. These users could be considered as: a. Beta Testers b. Gamma Testers c. Pilot Testers d. Zero Days e. Pirates SECTION B: SHORT ANSWER QUESTIONS Refer to the Exam Case at the end of this booklet to answer ALL questions in this section. Question 21 A typical shopping process on the ‘DRNZ’ mobile app is described below: i. The customer taps on the “Sales Catalogue” button on the app. A list of all the individual items for sale is displayed. ii. The customer then finds the item(s) they wish to purchase by scrolling through all the items. Upon finding a specific item to purchase, the item is selected for purchase by specifying the quantity needed. iii. If the customer wants to select more items for purchase, the previous step is repeated. iv. If the item selected for purchase is a drone, then the customer then fills a form. to detail the requirements including desired functionality of the drone and the constraints it must operate within. v. Once the customer is finished selecting items for purchase, the customer taps on the “Check out” button to go to the shopping cart screen. vi. All items selected are shown on the shopping cart screen, along with the total price payable. vii. The customer is advised to check the items in the shopping cart before payment is made. viii. The customer may tap the “Pay now” button to proceed, or the “Cancel” button to stop the transaction, which also ends the shopping process. ix. By proceeding with the order, the customer is taken to a new page on the mobile app where credit card details can be entered. x. If the credit card is declined, then an error message is displayed with a message to re-enter the details. xi. If the credit card charge is successful, then the amount paid is credited to the customer’s account, and a payment success message (receipt) is displayed on the customer’s phone. xii. After processing payment for the current order, the ‘DRNZ’ mobile app will display recommendations of further items the customer can purchase, based on known customer-preferences. Such recommendations will be displayed on the screen with an “Add to shopping cart” button for the customer to tap if they are interested. xiii. If the customer chooses to buy something else, then the shopping process restarts, and payment will be requested for newly bought items. Otherwise, the process ends. Process Map Template Question 21 Continued a. Model the shopping process at ‘DRNZ’ as outlined above by filling in the blanks (a to j) in the process map template. You may use the following labels: Item Found? Tap Cancel Find Item Tap Pay Now Recommendations Displayed Tap on Check Out Card Declined? Buy More? Select more items? Fill in a form (5 marks) b. The above process can be improved by streamlining. Suggest one specific way to do it (by identifying a task to eliminate, and describing how it can be eliminated) and describe an associated value added for the customer by such improvement. (3 marks) c. Suggest one potential risk that is specific to the case, once the streamlining improvement in part b is carried out. (2 marks) Question 22 As discussed in class, GIGO stands for “Garbage In, Garbage Out” . GIGO can potentially impact the integrity of YBC and DRNZ’s operations. Two such operations are listed below: 1. YBC’s Ants responding to orders in a just-in-time manner. That is, Ants will not be waiting at the Ant Stops for requests. 2. DRNZ handling orders for drone repairs. For each operation: a. Suggest one specific example of Garbage In, in terms of data/information input, and one specific corresponding example of Garbage Out, in terms of production or information output. (6 marks) b. Suggest a specific valid precaution that YBC and DRNZ can take to prevent such GIGO. (4 marks) Question 23 DRNZ aspires to generate high quality information in the reports they send to their clients after servicing their drones. Such reports may include information such as: ● The client’s name and address ● The jobs carried out on the drone ● The parts required/replaced, and the quantities used ● The number of hours taken and charged ● The costs involved ● The total amount chargeable ● The ID of the technician(s) handling the job(s) The quality of the above information can be measured by the following aspects: ● Accuracy ● Completeness ● Consistency ● Timeliness ● Uniqueness a. Choose three relevant aspects of information quality out of the five listed above, for DRNZ’s service reports. Provide and describe examples (you may make them up according to the context of the case) of quality information from such reports that correspond to each of the three chosen aspects. Marks will be awarded for the relevance of the chosen aspects, and the appropriateness of the examples for each aspect. For example (you may still choose “Accuracy”, but do not use this example as your answer): Aspect : Accuracy Example of quality information : The name of the client is correctly spelt on the report. (6 marks) b. Drones sent in by clients for servicing may contain sensitive and important information. ● Choose two out of the three goals of the "CIA triad of information security": ● Confidentiality ● Integrity ● Availability ● Provide a specific example of data/information stored in the drones, that may be subject to each of the two chosen security goals. The examples should be made up according to the context of the case. ● Suggest one way to properly manage such sensitive information stored in the drones, for each of the two chosen security goals, while the drones are being serviced. (4 marks)
CIBC 5003: Environmental Impact Individual Assessment 3: Sediment Control Total marks: 25 Weightage: 15% Note: This is a summative assessment. All summative type assessments are compulsory unless otherwise approved and notes in the course information Activity Scenario: Sediments are one of the biggest pollutants from construction sites and contribute to deteriorating water quality in New Zealand. This assessment allows you to investigate the various techniques of sediment control that can be used on construction sites to minimise negative impacts on the environment. You have been provided with a site plan on which a new building, car park and improved amenities (park and sports facility, 3 levels, total 6000 sqm floor area) will be constructed at the given address: 56 Wairaka Avenue, Mount Albert. (google map link & plan attached to this assessment) The earthwork is going to start from June 2025 to October 2025 (winter and rainy season). Before the construction can proceed you have to gain earthworks permission from Auckland Council. To get permission, you need to submit a detailed sediment control plan. Check the Auckland Council sediment control guidelines and develop a detailed sediment control plan to ensure that the sediment is contained onsite. To develop and complete the sediment control plan, write a report that includes the following information. 1. Consider the water runoff from the adjacent roads and provide (and explain) a solution to prevent water entering the site from the road. (3 marks) 2. Provide a solution (explain) to stop sediment water entering the cesspit from the road due to construction vehicle movement. Cesspit locations are marked in the drawing. (3 marks) 3. Provide a solution (explain) to stop entering the sediment water into the neighbour’s property. Please check Google Maps to identify the local resident's houses beside the construction site. (3 marks) 4. Provide a solution (explain in detail) to retain the sediment water on your site and discharge the clean water in the estuary and stormwaterline. (8 marks) 5. Provide a solution for the vehicles (such as Trucks) that will come on-site for work and should not take the mud on the road (2 marks) 6. Mark all the sediment control measures implemented on the site plan. (3 marks) Resources: Auckland Council Sediment Control Plan, Resources on Moodle General Requirements: 1) Write a short report of your analysis. Not to exceed 2000 words. 2) Proper referencing should be done: APA 7th format. 3) Due date: Thursday, 31/10/2024, by 5:30 pm. 4) Digital PDF file to be submitted on the Turnitin Dropbox on Moodle. Look under Assessment Submission Centre. Should have a 15% or less similarity index on Turnitin. 5) Late submissions are accepted within 7 days of the due date with a 20% penalty. 6) Marks will be made available via Turnitin within three working weeks. 7) To request an extension, an Assessment Concessions (AC) form. must be submitted. No penalty applies to approved APC applications. Construction Site and Building Footprint Drawing Figure 1: Google Maps (2024) Address: 56-72 Owairaka Avenue, Mount Albert, Auckland Image Link:https://maps.app.goo.gl/YUgqrvp7vqPUz7Cv9 (Construction site area (L=171 m, W=94.8 m) Calculate: 1) = Construction Site. 2) = Building Footprint. 3) = Cesspit (Sump) s Figure 2: Auckland Council Geo Maps (Contour Map 2024) Address: 56-72 Owairaka Avenue, Mount Albert, Auckland Image Link:https://geomapspublic.aucklandcouncil.govt.nz/viewer/index.html For a detailed contour map, please check Auckland GIS Please check Google Maps to identify neighbours/resident houses that could be affected by construction-related sediment water. Marking Schedule Introduction (1 marks) Describes what will be covered in the report 0, 1 Solutions & Analysis (22 marks) Solution to prevent water entering the site from the road 0=not appropriate solution 1= appropriate solution but no description/explanation 2= appropriate solution but poor explanation 3= appropriate solutions and well explanation with the figure 0, 1, 2, 3 Solution to stop sediment water entering the cesspit 0=not appropriate solution 1= appropriate solution but no description/explanation 2= appropriate solution but poor explanation 3= appropriate solutions and well explanation with the figure 0, 1, 2, 3 Solution to stop sediment water entering to the neighbouring site 0=not appropriate solution 1= appropriate solution but no description/explanation 2= appropriate solution but poor explanation 3= appropriate solution and well explanation with figure 0, 1, 2, 3 Solution to retain and clean the sediment-water on-site 0, 1, 4, 8 0=not appropriate solution 1= appropriate solution but no description/explanation 4= appropriate solution but poor explanation 8= appropriate solution and well explanation with figure Mark the sediment control ways on the site plan 0= no drawing 1= drawing is attached but poor presentation 2s= drawing attached and moderate presentation 3= well-presented drawing 0, 1, 2, 3 Provide a solution for the vehicles (such as Trucks) that will come on-site for work. 0= no answer /inappropriate solution 1= appropriate solution and poor explanation 2= appropriate solution and detail explanation with figure, proper in text citation. 0, 1, 2 Conclusion (1 marks) Conclusions are drawn from the discussion, and no new information is added. 0, 1 Report Structure/ Format & References (1 marks) Overall presentation is well-structured with a Table of contents, introduction, body, conclusion and references. Within the word limit. Proper APA 7th referencing has been done and In- text citations are correctly formatted. 0, 0.5 0, 0.5 Total 25 marks Learning Outcomes: On successful completion of this assessment, students will be able to 1. Identify implications of site limitations, including evaluation of existing buildings 2. Analyse the environmental impact of design and construction techniques 3. Evaluate examples of sustainable design and construction practices.
NUT106 Lab 1: Sensory Evaluation Lab Report Guidelines Every week you will be writing a full laboratory report. By the end of the quarter, you should be able to present and analyze data, critically think about the data you generated, and write a report that has a format similar to a scientific manuscript. Presenting and critically thinking about data, as well as writing are important skills for working either in academia or in industry. Practicing these skills, will help you when you join the workforce. Below in bold are the sections of the laboratory report that you must write each week. Pay careful attention to the instructions, as they will change from week to week. If you are unsure about what to do, contact any of the TA’s for the course. Introduction An introduction is the place in a manuscript. where the reasoning behind an experiment is introduced. It often contains a brief synopsis of what is currently known about the subject, which segues into the purpose of the experiment and the hypothesis you had before performing the experiment. Your hypothesis does not need to be correct – it just needs to be testable. You describe whether your hypothesis was correct or not in the Discussion. For this week, you do not need to write a formal introduction in paragraph format. We will discuss how to do that later. For the introduction to this week’s laboratory report, please copy the questions below and answer them in full sentences. As you are writing your introduction, think about how you could have organized it into paragraphs. a) Why would someone perform. a sensory test? b) Describe each of the sensory tests that were performed, and under what circumstances you might use that particular sensory test. c) What will the results of each of the sensory tests tell you about the particular products you are testing? d) Acidity and sweetness are two important characteristics of food. Explain why these are important, and how they maybe measured. e) What is the relationship between acidity and sweetness, and how can that help a food producer ensure a pleasurable experience for the consumer. Purpose, and Hypothesis Based on your introduction, write the purpose of this lab. You can start the sentence with the following: The purpose of this experiment is to ….. Based on what is being tested in this lab, write a sentence describing what you think the outcome will be. You can start the sentence with the following: Ihypothesize that ….. Note that there is more than one purpose and hypothesis for this (and most) labs. For the purpose, it is helpful to think about how you can describe the overall purpose concisely. Note that for this lab, you will have 3 purposes, and for each purpose you will have a hypothesis. Methods Re-read the Procedure for the experiment this week. The guidelines provide you with a set of instructions. A methods section is a description in sentences of what was actually done during the experiment, such that someone could read it and be able to repeat what you did on their own. The methods section contains the essential information for reproducing the results, but is not meant to be an instruction manual or recipe. Write a methods section for this week’slab. You should break it up into sections. The first section should describe the sensory tests you performed. An example of how you might phrase your sensory methods could be: To determine whether subjects could distinguish between Tropicana and Minute Maid orange juices ….. The second section should describe how the analytical measurements (i.e. 。Brix and acidity) were measured. An example of how you might phrase this could be: To determine acidity of each of the juices, the pH was measured as 0.1 N NaOH was added stepwise using …. The last section for this week will be the calculations and statistical analysis section. Here you will describe how you calculated %acidity, if you performed repeated measurements, then how those will be presented (for example, if you calculated average and standard deviation for the Brix measurements). You will also describe any statistical tests and how those were performed. An example of how you might phrase this could be: To determine whether there was a statistical difference in liking in the preference test, … . For this (and subsequent labs), you will need to show the equation you used for each calculation as well as show one example calculation. Here, you will need to perform. an example calculation for the percent acidity of orange juice. See Appendix 1 for information on calculating percent acidity. Results The results section is one of the most important sections of any scientific paper or laboratory report. It is in this section that you present and describe your data objectively. Each week we will provide for you the data you will analyze as well as a list of the Tables and Figures that you need to include in your laboratory report. Once you have made all of your Tables and Figures, you need to refer to them and describe them to the reader in this section. For this week, you need to create the following tables and figures for your report: Tables: 1. For the triangle test, make a table showing the number of judges, the number of correct identifications, and the significance level. 2. For the preference test, make a table showing the number of judges, the number of judges that preferred each soda, and the significance level. 3. For the ranking test, make a table showing the number of judges, the rank sum of each of the juices based on acidity and sweetness, the absolute value of the rank sum difference when comparing each of the juices (note that there should be three comparisons), the significance level, as well as your calculations for %acidity, average Brix, as well as Brix/Acid. Figures: 1. pH and derivative plot for apple juice. Using the data provided for the titration of apple juice and the information in Appendix 1, create a scatterplot of the pH (y- axis) against volume of NaOH added (x-axis). On the same plot, also add the scaled derivative (y-axis) against the volume added (x-axis). Clearly label the equivalence point on your figure. Don’t forget to add appropriate axis labels, and a figure caption. 2. pH and first derivative plot for grape juice. Use the data provided for the titration of grape juice to create the same plot as is described for Figure 1. 3. pH and derivative plot for orange juice. Use the data provided for the titration of orange juice to create the same plot as is described for Figure 1. Note: Include an appropriate title for each of your tables and caption for each of your figures. You will need to reference the document titled “Week 1-Statistical Tables” to determine significance levels for the various sensory tests. Discussion The discussion section is the section where you will interpret your results. For this week, you do not need to write a formal discussion in paragraph format. We will discuss how to do that later. For the discussion for this week’s laboratory report, please copy the questions below and answer them in full sentences. The questions below are provided to guide you to thinking about the data that was collected and its meaning. As you are writing your discussion, think about how you could have organized it into paragraphs to interpret the results of the experiment. 1. Did the results of the triangle test indicate that there is a difference between the two different orange juices? What could lead to sources of bias in the experimental design? 2. Did the preference test indicate an overall preference for either soda? Discuss. 3. Did the judge’s ranking of the samples in the ranking test indicate differences in acidic taste of the juices? What about the sweet taste of the juices? If so, which juices differed and how did they differ? 4. Which juice actually had the most acid? Does the acid data agree with what the judges indicated with regard to taste? Why or why not? 5. Describe potential sources of bias in the ranking evaluation. 6. Provide an example of something you might change in a recipe to make it healthier or accommodate a specific dietary need. What test would you use to evaluate the acceptability of the modification? Justify your answer based on the conclusions that can be drawn from the test. 7. Include an anecdote (~2 sentences) about a food that you have eaten that didn’t conform. to your sensory perceptions of that food. Describe which sensory aspects of that food that you liked or disliked.
Assessment requirement We chose the Museum of Underwater Archaeology (Bodrum, Turkey), But it can still be improved, and we also give the idea of our innovation and marketing strategy below and our task is to present the idea of our innovation and marketing strategy in the form. of a short video, which is a marketing video Video requirement 1. Create a 2-5 minute promotional video 2. Ensure the video is engaging, clear, and effectively promotes the new product experience. 3. Use a mix of live-action footage, animations, or other relevant visuals to bring the concept to life. Innovation Approaches Augmented Reality (AR) Technology: Through AR, visitors can explore underwater archaeology and ancient shipwreck sites interactively and immersively. AR was chosen over VR to provide an engaging experience without significant alterations to the existing museum infrastructure. Integration of Digital and Physical Elements: By combining physical exhibits (like glass floors, ocean sounds, and light effects) with digital interactions (such as 3D reconstructions and AR experiences), the exhibition offers an educational yet immersive experience. Multilingual Support: To enhance the experience for international visitors, future plans include the implementation of multilingual support, making the exhibit more accessible to a broader audience. Modular Technology: Using flexible, scalable AR technology ensures easy future upgrades, maintaining the exhibition's quality and novelty over time. Marketing Approaches Discounts and Promotional Offers: Offering 10% discounts for local residents and students, along with early bird tickets, to attract a diverse audience and ensure inclusivity and affordability. E-Ticketing and Mobile App: Facilitating electronic ticketing through the museum's updated website and international tourism sites (like TripAdvisor and Expedia) while developing a dedicated mobile app for easy ticket purchasing, event updates, and interaction during visits.
INFOSYS110 INFORMATION SYSTEMS Business Systems SUMMER SEMESTER 2020 SECTION A: APPLIED MULTIPLE CHOICE QUESTIONS ● Answer ALL questions in this section. ● There are 20 applied multiple choice questions. Each question is worth 2.5 marks. ● Choose the one answer that you consider to be the best. ● To indicate your answer, use a dark pencil to shade in neatly the matching bubble on the Teleform. sheet. 1. Canvas facilitates by recording which staff member changes a recorded mark. A. Integrity B. Non-repudiation C. Confidentiality D. Authentication E. Access control 2. In New Zealand, if you are 18 years or older, you can enter licensed premises and buy alcohol as long as you can provide an acceptable proof of age identification such as a driver’s license. The driver’s license is an example of: A. Something that is part of the user B. Something the user has C. Something the user knows D. Something the user has, something that is part of the user and something that the user knows E. Something the user has and something that is part of the user 3. Social computing is often associated with crowdsourcing, social networks, and user-generated content. In class we discussed that users are providing businesses with a plethora of data by: A. Posting fake reviews B. Using mobile devices C. Agreeing to their terms and conditions D. Simply using their online systems E. Clicking on advertisements 4. Walmart discovered that many customers bought baby diapers along with cans of beer. Analysis of purchases revealed that they were made by men, on Friday evenings mainly between 6pm and 7pm. Which data mining technique would have enabled the manager to discover this? A. Classification Analysis B. Cluster Analysis C. Regression Analysis D. Outlier Detection E. Association Detection 5. Consider the following snippet of code: On which line(s) is there a bug? A. Lines 3 and 5 B. Line 5 C. There is no bug D. Lines 1 and 5 E. Line 3 6. Consider the Excel Data below: Which formula should be entered in cell E6, in order to look up the price for blueberries? A. =VLOOKUP(D6,$A$2:$B$10,1,FALSE) B. =VLOOKUP(D6,$A$2:$B$10,1,TRUE) C. =B10 D. =VLOOKUP(D6,$A$2:$B$10,2,TRUE) E. =VLOOKUP(D6,$A$2:$B$10,2,FALSE) 7. Which level of the “ Pyramid of Corporate Social Responsibility” would the business be operating in if the business is only concerned with compliance? A. Legal B. Common good C. Ethical D. Economic E. Philanthropic 8. Consider this scenario: You received your test feedback email, and you realised that you did not get a mark for Question 25. In terms of information quality, the test feedback email is lacking in? A. Accuracy B. Uniqueness C. Completeness D. Timeliness E. Consistency 9. Flooding a website with millions of page requests in order to bring it down is known as a attack. A. Swarming bugs B. Denial of service C. Scalability vector D. Cyber flooding E. Trojan Horse 10. A sustainable business is one that is able to endure long-term in: A. Technological research and development B. Being ethical C. Satisfying its shareholders D. Fulfilling its vision E. Providing employment for society 11. For a large business organisation, managing and maintaining the quality of data can be difficult because: A. Data is collected by many individuals using various methods and devices B. Data is inconsistently copied across multiple systems C. All of the options D. Data comes from multiple, non-uniform, sources E. Data is frequently stored in numerous locations, and in different formats 12. From a business’s perspective, a disruptive technology typically affects a market/industry by . On the other hand, from the customer’s perspective, a sustaining technology typically affects a market/industry by _______________________ . A. Destroying sustainability; providing more purchasing options of products B. Lowering the cost of operations; increasing buyer power in the industry C. Redefining the market; providing improved products or services for purchase D. Increasing each of Porter’s five forces; increasing customer intimacy E. Decreasing each of Porter’s five forces; providing improved products or services for purchase 13. Consider the application architecture supporting Facebook.com. You, as a user, use a web browser (such as Google Chrome) to access Facebook. Through the web browser you can receive data stored on Facebook’s computers, such as a friend’s timeline, photos, and videos. You can also use the browser to send data to Facebook’s computers, such as what posts you view and “like” . Based on the description above, the web browser is a(n) and Facebook’s computers are . A. IT infrastructure; architectures B. Software; networks C. Network; hardwares D. Server; clients E. Client; servers 14. In class, we discussed that disruptive technologies “shake up” existing markets and often result in new markets. Businesses in the “shaken up” markets are forced to respond in order to remain competitive and sustainable. Businesses whose enterprise architectures are founded on the principle(s) of are best prepared to respond. A. Data security B. Speed and quality C. Ease of use D. Flexibility and agility E. Scalability 15. Consider this scenario: Farmers are increasingly open to relying on sensors to collect real-time weather data, in order to make better weather predictions. This helps them to save costs and make proactive decisions. For instance, irrigate the farm only when needed. This is an example of putting the Internet of Things to work via: A. Tracking behaviour B. Optimised resource consumption C. Complex autonomous system D. Process optimisation E. Enhanced situational awareness 16. Consider the data mining techniques discussed in class. Cluster analysis and association detection are both algorithms that can be used for prediction. A. Visualisation B. Data warehousing C. Sustainable D. Unsupervised learning E. Qualitative 17. A transport agency decided to terminate an IT project after encountering numerous complexities that had resulted in a budget blowout. They later discovered that multiple inaccurate assumptions were made regarding the business processes, IT capacity, and the business IT infrastructure. These assumptions should have been investigated in the phase of the SDLC. A. Analysis B. Planning C. Testing D. Design E. Development 18. Consider this scenario: A customer wants to re-order her favourite foundation product, but she doesn't remember which shade she ordered last time. In the past, she probably had to log onto the cosmetics website and hunt through her order history to find such information. Today, she can simply ask a bot: "What shade of foundation did I order last?" The bot can then quickly match her identity, find her order history, understand which product she's referring to, and tell her. What's more, she could even ask the bot to re-order it for her. This demonstrates that the AI technology used is an example of: A. Unethical behaviour B. Data mining C. Narrow AI D. Putting the IoT to work E. Broad AI Consider the Exam Case to answer the following questions (19 & 20): 19. The eCare dashboard is primarily a: A. Transaction Processing System B. Database Management System C. Collaboration System D. Supply Chain Management System E. Enterprise Resource Planning 20. According to Porter’s Generic Strategy Model, what is SmartCare’s Source of Competitive Advantage? A. Differentiation B. Customisation C. Broad D. Low Cost E. Narrow SECTION B: SHORT ANSWER QUESTIONS Refer to the Exam Case at the end of this booklet to answer ALL questions in this section. 21. A typical SmartCare Smart Apartment installation process is described below: The installation process begins when a customer order comes through requesting for a smart apartment installation. The receiver then processes the order by sending through a purchase order for the required parts. Once the parts have been received, the next available technician will be assigned to the job. The technician then visits the customer’s home to assess and decide on the appropriate locations for the sensors installations. This is then followed by the installation and configuration of these sensors with the associated components. The technician will then monitor to make sure that all associated parts of the smart home are functioning as is, triggering when needed and are reporting valid measurements. If there are no problems detected, the technician will proceed to sign-off. If there are problems detected, the technician will investigate the potential causes of the problems and communicate the next course of action to the customer. If the customer is happy with the technician’s recommendation, the technician will proceed to fix the problem. Otherwise, the technician will reschedule another visit with better recommendations and log the job as incomplete. As part of fixing the problem, the technician will also identify if additional components are required. If other components are needed, the technician will proceed to order the parts, followed by rescheduling another home visit with the customer. If no additional parts are required, the technician will proceed to fix the problem. After the problem has been resolved, the technician will send a bill to the client’s account and log the job as complete. a. Model the Smart Apartment installation process outlined above with a process diagram. (10 marks) b. Link TWO different specific information systems and TWO departments to the appropriate steps outlined in the above process.(4 marks) 22. Consider the eCare Dashboard from the case. ● Identify ONE example of “Transactional” and “Analytical” information that can be generated from the use of the eCare Dashboard. ● Identify FOUR examples of data inputs for each type of information generated above. ● Suggest what insight SmartCare could gain from the information in order to generate value for its retirement village and/or its residents. (8 marks) 23. IoT ecosystems bring about a number of potential risks. In particular, the issues surrounding the security of SmartCare residents data, where an overabundance of data that are being collected, shared and stored online. a. Looking back to the case, identify one such specific potential risk. b. Referring to the four major risk management responses covered in class, outline the actions that SmartCare could take for each of these responses in order to deal with this potential risk. (8 marks) 24. Consider this scenario: With the immensely positive outcomes seen in the current operation, SmartCare has decided to further invest in establishing another smart retirement village. Honour Moses has been appointed as the project manager to oversee the project. She has been allocated a budget of $200 million and a timeline of 24 months for the new retirement village. With careful planning, Honour is confident that this project is achievable. However, shortly after the start of the project, Honour was told by her manager that her timeline is being reduced to 18 months. Discuss the impact of this decision on the project in terms of the project management triangle with justifications for your answer. (8 marks) 25. For each of the categories of value below, provide an example of how SmartCare’s use of IS/IT generates value for itself or its customers. ● Reduce Cycle Time ● Reduce Costs ● Increase Customer Satisfaction For each example, provide: ● a specific key performance indicator (KPI) to measure that value; and ● a benchmark, which ‘SmartCare’ could compare the KPI against. (12 marks) Exam Case: SmartCare - The Modern Retirement Village Adapted from: https://mapleknoll.org/technology/ As technology becomes an increasingly essential part of our everyday lives, SmartCare, a luxurious continuing care retirement community, is leveraging it to help keep residents in their communities feeling safe, stimulated and healthy. SmartCare knows that retirement looks different to boomers than previous generations, so they are working to create an innovative continuum of care environment where residents can age more independently. Each resident in the retirement village is equipped with a wearable device. This device collects critical data from the residents, including glucose levels, body temperature, food intake, sleep habits, bathroom habits, daily steps, location and heart rate. Such data is then delivered to a central database. Caregivers can then track the residents’ health and spot any changes in behaviour, by accessing “eCare”, a single dashboard app. On eCare, all caregivers can conveniently access reports about the whole picture of each resident’s health. These data and reports are also updated and delivered to their appointed physicians in real-time. Data collected and updated in this manner can assist in generating timely health alerts, which can speed up the detection of health issues and aid the physicians’ and caregivers’ decision-making. This is also shown to reduce the costs of unnecessary or prolonged hospitalisation or long-term care. Late last year, SmartCare decided to partner with Tower Technologies to incorporate more useful technologies to improve the well-being of their residents. Tower specialises in managing solutions such as data centre infrastructure, cybersecurity, data analytics and IoT (Internet of Things) ecosystems. Together, SmartCare and Tower created a Knowledge and Service (KS) lab, catered to SmartCare residents, where they access online and on-site classes on how they can use technologies, for example, Amazon’s Alexa virtual assistant device, Uber rides and Whole Foods Market (to order groceries). They can also learn more about smart home technology and obtain recommendations from in-house staff to find new ways to integrate devices into their daily lives. Residents can then arrange to have new devices and technological services set up in their homes. For example, in a “Smart Apartment” at SmartCare, the IoT system is linked with sensors placed throughout the home. If a resident gets out of bed in the middle of the night, lights on the floor will come on, to reduce the risk of falling and highlight potential hazards. Blinds can be set up to automatically adjust, as can lights and even appliances. Smoke detectors, motion sensors, doorway sensors and more are all carefully selected with the expert input from the Tower team, and are linked to the IoT system. The metrics generated from these sensors are also delivered to eCare, giving caregivers a better picture of their residents’ well-being. The ultimate goal of this new technology is to help residents live healthier, happier lives in a setting they feel most comfortable with. SmartCare believes that this could significantly improve the residents’ quality of life while reducing an increasing cost on the health-care system. The KS lab is part of their effort to stay ahead of this problem, with a dedicated space where new concepts and prototypes of sensors and systems can come to life.