Task: This coursework is based on the heuristic search-based path planning strategy for an autonomous agent and its corresponding control system design. These topics will be introduced to the student during the module. This coursework aims to give the student experience and insights into the workings of an autonomous system. 2. Learning Outcomes1. Critically evaluate autonomous and autonomic systems, their architectures and implementation challe...
Question 1 You are requested to develop a RESTful web service application using JAVA programming language. We provided you with the JAVA class “Basics.java”, this class implements methods to store and retrieve Jason objects from a file. It has more functionally, you are asked to read the source code carefully. The following Jason value pairs needs to be stored on the server sides in a file (you can do so by calling the method &ldquo...
statistic lab report (Psychology) that involves the use of SPSS. The lecturer has provided the dataset based on the research question that we chose, so just have to do the testing of assumptions etc (in the marking rubrics). Research question: Does drinking coffee affect reaction time in a Stroop effect test during the morning and evening time? (2x2 Factorial design, repeated measure ANOVA) 1st IV: Drink coffee (1 cup) vs no coffee (between-subje...
Present a report covering the following areas. The suggested word count serves only as a guide. They are not treated as absolute necessity. Include a TITLE (include topic & site of study) for your Report. a. Background Include a brief summary of the topic and the rationale for this research. The rationale refers to the reasons why your research needs to be conducted. You can consider explaining the problems that spark your interests in this...
Section 2: SSL PKI Threat Modelling & Ethical Considerations The non-technical Requirements are listed as follows: 1. SSL PKI threat model: Identify the threats, attacks arising from the proposed description of the SSL PKI security issues raised in your design/proposal. Create and discuss a taxonomy of those threats relevant to your design and propose suitable mitigation plans with clear references to the literature. You are required to thre...
From the VMware WS 15 main menu select File – New Virtual Machine – Typical. Select Installer disc image file (iso) and click on Browse to locate and select the Fedora 24 Live-x86 ISO you downloaded earlier. Click Next. Specify a VM name (e.g. Fedora 24 server) and click Next. Specify a maximum disk size of 10GB and click Next. Click Finish to create the VM and then follow the steps in lab 1 (first half of the course) to install the F...
Questions: Galba Developments (Galba) is the commercial development entity created by the largest pension fund in Nusquam. It is progressing a project to redevelop a large brownfield site in Cloacarius, a run-down port on the coast of Nusquam. The scheme is extensive and involves the creation of new port facilities, a storage and distribution centre and new housing. In addition, new road and rail links are being created to improve the accessib...
Questions: Project 3: A Simple HTTP Client and a Simple HTTP Server The project requires you to learn a non-trivial, existing network protocol, HTTP, and to thoroughly understand it, at least in the parts that are required by this project. Therefore, you will need to make a lot of efforts to conduct an independent research and self-learning before you can even start to write a single line of code. Once you understan...
Question: Software Design: The Social Ads System Project The case study Online Social Advertisement is a marketing agency that wishes to establish an online system | Social Ads | to host advertisements about businesses’ services: location, o erings, opening hours, promotional deals and updates on their ser-vices. Social Ads is made up of two sub-systems: the advertiser sub- system and the consumer system. Your task for deliverable...
Question: Preface Before you start this project, please be sure that you have completed all of the following activities.Read the project all the way through before starting. For example, there are some suggestions in the last section.Complete all reading and watch all videos for Modules 1, 2, and 3. Ensure that you understand number systems, codes, Boolean logic, and combinational logic circuits and that you are familiar with Logisim.Note the...
Often cybersecurity professionals forget the easiest way to access a system is through the front door and not using a computer from 100 miles away. By creating a castle in which both physical and network security defenses are defined, it holds off intruders. Part 1: Create a digital diagram of a castle, complete with all the necessary components, and include the following: Gateway router Firewall Anti-Virus VPN SIEM Data backup Server IPS DMZ Mul...
Task This essay aims to look at the first scenario regarding the impact of shift work on nurses’ health. The negative impact of shift work on nurses’ health has been well documented in the literature (Chen, Davis, Daraiseh, Pan and Davis (2014), Dall’Ora, Griffiths, Ball, Simon and Aiken (2015) ). There has been a rise in the number of acute areas and wards adopting these 12 hour shift patterns to cover a 24 hour care r...
Question: Learning Outcomes The intended learning outcomes are that on completion of this module the student should be able to: 1. Evidence a critical understanding and application of training needs, training design, training methods and training evaluation;2. Evaluate and critically analyse factors which influence effective training design and delivery;3. Evidence working within ethical guidelines with sensitivity and integrity. ...
Task This assignment gives you an opportunity to practice the use of pivot tables for analyzing data and making decisions. These tables are particularly important for managers because they provide easily accessible business intelligence tools, right at the manager’s desk. If you need help with pivot tables, refer to “(Knowledge Extension) KE4-9: What are Pivot Tables and How Do I Use Them” in the textbook. Microsoft Office also...
Draw a flowchart for all the problems. 1. Design a program that reads the number of credits a student has completed and prints out whether they are a Freshman (0-30 credits), sophomore (31-60 credits), junior (61-90 credits) or senior (> 90 credits). If the number of credits entered is a negative number print an error message. (If then Else Structure) 2. Design a program that gets a single character from the user and writes out a congratulator...
Task Create a network disaster recovery plan (portfolio) along with a full network topology diagram. Context The aim of this assessment is to demonstrate your proficiency in data and networking. In doing so, you will design a network disaster recovery plan for a company in Australia to demonstrate your proficiency with network design. Requirements 1. Create a network disaster recovery plan (portfolio) along with a full network topology d...
Question: Students are required to submit their coursework through JIRA. Only assessments submitted through JIRA will be marked. Any other submission including submission to your study centre in hard copy will be treated as a non-submission. Introduction For this module there is one individual research based assessment which is presented as a ‘Developing Reflexive Practitioner Reflection’. Increasingly there is recognition of th...
Questions: 1. You are requested to design a bandlimited M-ary modulation system over an AWGN channel as shown in the following block diagram using Simulink.The center (or carrier) frequency is set to fc=0Hz for simplicity. The other system parameters such as bit rate (fb), transmission bandwidth. Calculate the required values for your system par...
Questions: OBJECTIVES:To understand the basic characteristics of operational amplifiers.To calculate and measure the gain of an operational amplifier circuit.Design an amplifier circuit and verify its validity using an oscilloscope. MATERIAL REQUIRED:BreadboardDC Power SuppliesGW Instek 1830 D power supplyGW Instek GPS3303 Power Supply or similarDigital Multimeter (DMM)uA741 Op-amp1K-ohm Resistors10 K-ohm resistor Deliverable:The d...
Task Project: Retail chosen: Clothing retail store Background: Choose a retail business that sells products to its customers and create a database to store data and register different daily transactions. Consider the following in your design: 1. The retail business should register information about the products it sells. 2. The details of its customers including their billing and delivery address and the product suppliers. 3. A...
Task: Callister Inc. is new in Manchester and has opened a branch in Cambridge. The company has designed its network, but the design has several security flaws. They have approached Anglia Ruskin University with a consulting contract where brilliant students in MSc in Cyber Security students will design, implement and document a proper security solution that can accommodate the requirements of the company. This document describes the curren...
Questions: Huawei Case Study Chinese Telecommunications Giant Huawei: Strategies to Success Founded in 1987 by Ren Zhengfei, Huawei Technologies Co. Ltd. (Huawei) has transformed from a one-room workshop in Shenzhen, China, to the world’s largest information and communications technology (ICT) solutions and services provider. Over the years, it has developed capabilities across carrier network, enterprise and consumer fields. With a vi...
Questions: Introductions:This case will be done as an individual assignment. Your goal is to demonstrate your knowledge of the appropriate course material and your ability to effectively communicate. This is not to be worked on as a “team effort”. Your primary focus for this case is to evaluate the situation that Sue Knight (owner of Joggers World) finds herself in; identify the core problem and the strategic options that make the most se...
Task Weighting: CW1 30% CW2 70% Introduction You have been appointed as a team of consultants to design a Hotel building complex near the motorway that links an international airport in the UK, Heathrow to the specific. The site of this complex is separated from the motorway by a large fast flowing Stream that flows parallel to the motorway and finally finds its way into the River Thames .This Stream which ...
This Research Practice module is unlike the other modules you have encountered thus far. Your lecturer will be the facilitator and supervisor guiding you through the research process. The format that this will take will be discussed with you in class. Your lecturer will be facilitating the overview and discussion of the research process, but it will be up to you to contextualise this within your own research topic. For each session it is your res...