Demonstrate understanding of software development and software engineering techniques.This coursework will fully or partially assess the following learning outcomes for this module. On completion of the module you will be able to: Demonstrate an understanding of software development using a variety of software engineering techniques. Critically evaluate the quality of a software artefact. Use sources of information to improve your knowledg...
GoalsTo build and understand CPU time-sharing scheduler implementations To gain an insightful experience to the issues of scheduling on multiprocessors To gain some insight to the correlation between scheduling and other parts of the OS (e.g., I/O and memory management) To have an idea what the scheduler wants to achieve you might "verify" that your implementation has achieved those goals. The schedulers that we have discussed so f...
Root PageFor this program you are going to write a program to organize employee payments You should have a root page to your program that is loaded with localhost:8080. All components of your program should be accessible from this page, and all pages should link to this root page though either buttons or hyperlinks. You will have 2 roles (Owner and Employee). You should implement database security in your application (You do no...
Problem 1: Forces and Free-Body Diagrams. A stone of mass 52 g is resting on the ground. (a) List the forces acting on the stone. [1 mark] (b) State the magnitude and direction for each force identified in part (a). [1 mark] (c) By hand sketch a free body diagram of the stone while at rest on the ground. Include the net force on the stone. [2 marks] The stone is then picked up by a young child who then boards a hot-air balloon. Once the balloon ...
Objectives This project is designed to help students to understand the pipelining on a RISC architecture (MIPS), pipeline hazards, and hazards mitigation techniques including forwarding and stalling. Students will gain programming experience in C. Your team of 2 students will build a simulator of a (5-stage pipelined) MIPS in C. This simulator will read a binary executable file containing a sequence of MIPS instructions and simulate their ...
On successful completion of the module students will be able to Critically appraise knowledge-based relating to the use of Internet of Everything, including (passive and active) sensors, actuators, the physical communications layer, communications protocols, programming frameworks, and an understanding of energy and bandwidth constraints. Evaluate design approaches used to design Internet of Everything applications. Design and build a senso...
Problem DescriptionOverviewContinuing with the domain you discussed in the last two assignments (smart buildings), you are now asked to help the contractors install a specialized smart building infrastructure for a company. You are asked to (a) identify and express key quality requirements and make architectural decisions and (b) produce pertinent architectural models.Problem DescriptionOverview The Smart Home contractors âS...
Tables/RelationshipsTASK 2: Application [50%]Using the suggested table structured in Appendix 1, create a database application [PD Games]. Your application should be created in stages and include the following: a) Tables/Relationships [10%] Create the tables identified above. Select appropriate primary keys, field names, data types, descriptions, and field properties, e.g. input masks, validation rules, text etc. Relationship...
Project – WordPress Deployment with Amazon RDS The aim of this project is to deploy WordPress Web Application using external database. WordPress requires a MySQL database to store its data. For this project, students will use Amazon RDS for MySQL to run MySQL database. This will expose students to design, configure and implement WordPress workloads using external database. Database maintenance for your WordPress application is crit...
Task DescriptionAt each of the 12 positions you plan to build one building that is either a quarry, or a factory, or a market. There are three types of resources: gold, diamonds, and jewellery. Every year the same amount of resources are being sent from building to building over the connections. There is a limitation though for each connection: In every year the sum of all resources that are being sent over a connection cannot exceed 165 units...
Task 1 - Find the Largest Memory SizeQuestion: Scenario A series of files have been sent to your program with different memory sizes. The sizes are all in whole numbers of Megabytes (MB) but the number of files are unknown. You have been asked to create a program that will find the file with the largest memory size. Your solution must incorporate good programming practice (indentation, white space, comments, naming conventions). Task 2 — F...
Program DescriptionIn this assignment, you will write two complete C programs to support a client/server model using Linux sockets for a UDP “ping” utility, similar to the ping utility already available on our CSE machines.•ServerThe server program will be called with one command-line argument, the port number being used, such as ./minor4svr 8001. If the user calls the server program with too few or too many arguments, you wil...
GoalGoal1. A decision tree is a data structure on which the classifier runs to make a prediction. Each internal node is attached with a ‘testing attribute’ and the branches are the outcomes for the testing. The leaf nodes are attached with the class labels. The object whose class label is being predicted starts from the root, and is guided at each node by the testing outcome to follow a specific path to a leaf node, where it is ass...
Regulatory Compliance for Machine Learning Systems in HealthcareQuestion 1Dr. Ali, a colleague in the cardiology ward at the UK NHS hospital you work in, is unfamiliar with artificial intelligence. They have hired a specialist company called CleverAI Ltd to develop a machine learning system to predict the length of a patientâs hospital stay (i.e. number of days from admission to discharge). This information may be used to pla...
DescriptionImplement  the  simulation  of  a  process  scheduler  that  is  responsible  for  scheduling  a  given  list  of processes. The scheduler is running on a machine with one CPU. The scheduling policy is a type of non-preemptive roun...