Still study late in night?
Get homework done with less stress
CS3342 Organization of Programming Languages - Assignment 3: Operators and Functions
CS3342Organization of Programming LanguagesRacketFunctional Programming
Consider the logical operators: ¬, ∧, ∨, →, ↔, ⊕. If all are implemented in a programming language, explain how short-circuit evaluation would work for those operators for which it is suitable.
CS3342 Organization of Programming Languages - Assignment 4: Prolog
CS3342Organization of Programming LanguagesPrologKnights and Knaves puzzles
Knights and Knaves puzzles: You are on an island where every inhabitant is either a knight or a knave. Knights always tell the truth, and knaves always lie. Implement the following puzzles in a Prolog program, kk.pl, which finds the correct answer
CS1315 Computer Programming Assignment One - Cheapest Payment
CS1315Computer ProgrammingC++
Your task is to find out the cheapest payment amount given the corresponding prices, discount settings and headcounts. The numbers are always in the valid range stated in page 1 (no checking is needed) but the numbers are not necessarily realistic
CMPSC461 Fall-2024 Programming Language Concepts - Assignment-4 (Function and Parameter Passing)
CMPSC461Programming Language ConceptsFunction and Parameter PassingPythonJava
For each of the cases below, write down the values of x, y, and z after the following calls to foo(). If necessary, assume that output arguments are copied back to parameters in the left-to-right order.
COMP4161 T3/2024 Advanced Topics in Software Verification - Assignment 2: Block Representation of Binary Numbers
COMP4161Advanced Topics in Software VerificationIsabelle
In this assignment, we consider one representation of binary numbers where the bits in a number is segmented into alternating sequences (or blocks) of 1s or 0s. For instance, ”1110011” consists of ”three 1s, two 0s, and two 1s”.
SEHH2241 Discrete Structures 2024–2025 Semester One Individual Assignment One
SEHH2241Discrete Structures
Write a truth table for the statement below. Then, determine whether the statement is a tautology, contradiction or contingency. You are required to complete the three main connective columns of the truth table in the answer sheet.
CS480 Operating Systems - Assignment 02 Free Response Questions
CS480Operating SystemsL1 CacheScheduler
A run-time profiling tool shows that a machine with more CPU cores often has better cache hit rate (i.e., more effective caching) than the one with less CPU cores, this is particularly true when running many applications concurrently
COMPSYS 705 Formal Methods for Safety Critical Software Test
COMPSYS 705Formal Methods for Safety Critical Software
Consider two processes P,Q shown in Figure 1. Are these processes bisimilar, weakly bisimilar, similar or there is no relationship between them? Justify your selection mat- hematically by either finding the corresponding relation or showing the absence of any such relation.
Database Principles 31061 - Assignment 5: Database Project
Database Principles3106132606DatabaseSQLPostgreSQL
Your choice of database should demonstrate some initiative, and be something that is largely your own idea. It must not resemble closely any database you found in the textbook, or any other book, and it must not resemble closely any database built by a student in a previous semester.
COMP2022 Models of Computation - Assignment 3: Turing Machine and Morphett notation
COMP2022Models of ComputationTuring MachineMorphett notation
Consider the following deterministic Turing Machine M over input alphabet Σ = {a, b}: (5 marks) State five strings that are in L(M), and five that are not. The strings should be over Σ. (5 marks) Provide a low level description in Morphett notation of a (1-tape deterministic) Turing Machine for the language that has time complexity at most 5n + 5.
ICT340 Application Analysis and Design - Assignment: Drone Service application
ICT340Application Analysis and DesignUML
DroneTech is a technology company that develops numerous unmanned aerial vehicles, called drones for many purposes. DroneTech invests heavily on research and development of its drone products. A new Drone Service application is required to allow clients to request and receive drone services.
COMP4500/7500 Advanced Algorithms and Data Structures - Assignment 2
COMP4500COMP7500Advanced Algorithms and Data StructuresJava
You are in charge of managing a venue for k consecutive days from day 0 to day k − 1 (inclusive), where k ≥ 1. There are n different configurations, c0, c1, . . . cn−1, that the venue can be in, where n ≥ 1. The venue must be in exactly one of the n different configurations at any one time, and is in configuration c0 on day 0.
FIT9137 Introduction to computer architecture and networks - Assignment 2: An Enterprise Network Design Report
Introduction to computer architecture and networksEnterprise NetworkWired LANsWireless LANsBackbone Network
A public transport company requires its office buildings to be connected over a wired LAN and Wireless LAN (WLAN). You have been asked to respond to the following excerpt from their RFP (Request For Proposals) in the newspaper. Scope of The Work At present, the total number of office employees in Melbourne is 230. Each office worker is provided with an office space or cubicle with a multimedia desktop PC having a wired network connection. Owing to a business acquisition, the number of employees in Melbourne is expected to increase substantially
Major Assignment 2: Probability & Hypothesis Testing Case Study
Probability & Hypothesis Testing Case StudyStatisticsHypothesis TestingProbability ModelingInferential Statistical Modeling
You are the manager of a well-established supermarket chain with multiple business operations, including a popular retail store and a factory that produces essential goods. As part of your role, you regularly analyse business data to make informed decisions and optimise performance, leveraging statistical tools and insights.
COMP4161 T3/2024 Advanced Topics in Software Verification - Assignment 1: Syntactic Conventions, Reduction, Type Derivation, Propositional logic and higher-order logic
COMP4161Advanced Topics in Software VerificationSyntactic ConventionsReductionType derivation treePropositional Logic
Simplify the term $(pq)(\lambda p\cdot(\lambda q\cdot(\lambda r\cdot(q(rp))))))))$ syntactically by applying the syntactic conventions and rules. Justify your answer
Computer Organization HW 0: Environmental Setup
RISC-VProxy kernel
This document can guide you through the process of preparing the experimental environment required by the programming assignments (HWs) in the Computer Organization course. In particular, to build the experimental environment, we will show the procedures to install: 1. GNU toolchian for RISC-V (commit hash 59ab58e), 2. RISC-V ISA simulator (Spike; commit hash a22119e), and 3. Proxy kernel (commit hash f036859).
CS6027 Advanced Computer Networking - Introduction to Network Simulator 2 (NS2)
KennesawCS6027Advanced Computer NetworkingComputer NetworksNS2
The purpose of today’s lab is to familiarize yourself with the network simulation tool: “Network Simulator (Version 2)”, widely known as NS2 that is an open-source event-driven simulator designed specifically for research in computer communication networks. NS2 contains modules for numerous network components such as routing, transport layer protocol, application, mobility, etc.
SOFTENG 752 Formal Specification and Design Assignment #1: Formal Modelling
SOFTENG 752Formal Specification and DesignB Specification and System Property ModellingFormal Modelling
You will be required to use the B formal modelling language to specify the design of a software system in an exact and unambiguous way. You must also use the associated tool, i.e., the ProB model checker, to validate and analyse the design, checking for consistency, completeness, and correctness. It helps in providing evidence that the design accurately represents the intended behaviour of the system, and it helps in uncovering any hidden errors or inconsistencies.
ECOS3010: Monetary Economics: Assignment 1: Monetary equilibrium
ECOS3010Monetary EconomicsMonetary equilibriumLatexMonetary policy
What is the condition that represents the clearing of the money market in an arbitrary period t? Determine the real return of fiat money in a monetary equilibrium. How does the percentage of holding endowment affect the real return of fiat money?
Machine Learning Fundamentals Group Assessment: Model comparison
Machine LearningRMSEFeature EngineeringKNNRegression
Background Information Kevin is a professional real-estate manager. In the past, he relied on using a few important features for home valuation. His boss recently asked him to take the initiative to learn to use big data and machine learning algorithms to value home prices in order to better communicate with customers.
CS200 Concepts for Advanced Computer Usage - Assignment 9 - FileMaker
CS200Concepts for Advanced Computer UsageFileMakerSQLDatabase
This assignment may be done independently or with a partner. If you do work with a partner, please add both or your names, usernames and Student ID numbers to the footer of each layout in the files and name the files with both usernames (username1_username2).
COMP643 Advanced Database Management Assignment 2: Transaction Management and Concurrency Control
COMP643Advanced Database ManagementTransaction ManagementConcurrency ControlDatabase Performance TuningQuery Optimisation
Using the two-phase locking protocol, create a chronological list of locking, unlocking and data manipulation activities that would occur during the complete processing of the transaction described in Q1a.
COS20019 Cloud Computing Architecture - Assignment 02 Scalable Cloud Computing Architecture
COS20019Cloud Computing ArchitecturePythonScalable Cloud Computing Architecture
In the cloud project of Assignment 1, you have learnt how to deploy a Photo Album Web Application on a VPC, actually in a EC2 running as a Web Server. However, this is not a highly available environment. In case there are some hardware failure related to that particular EC2 instance running the Web Server. The whole Web Applicaiton will be down and hence cannot be used by the public users.
EPPD1063: Computer Application LAB TEST 1: Excel
EPPD1063Computer ApplicationExcelWord
By using the formula available in Microsoft Excel, please find the largest and smallest marks for each of the Q, A, M and F columns. Please add new rows in the table with appropriate title for the answer.
Project 3: Explore 1 of the given datasets: Breast Cancer, Global IQ Data and Natural Disasters
Data AnalysisMachine LearningR
In Week 9, briefings will be given by your tutors in your Lab class, and then a Video Briefing by your lecturer is in the first ten minutes of the Week 10 Lecture. See a guide to writing a nice report here Download here .
Acquired Intelligence and Adaptive Behaviour 2024 Coursework No 2: Technical report
G6042Acquired Intelligence and Adaptive BehaviourAgentsAdaptation mechanismsGenetic AlgorithmBackpropagation
You have to write a technical report describing an investigation related to the topics covered in class. For choosing the specific topic of investigation, you have to make a number of choices described below.
FIT1047 Introduction to computer systems, networks and security - S1 2024 Assignment 3 - Networks
FIT1047Introduction to computer systemsComputer SecurityComputer Networks
Students will record data from a real-world wireless network and demonstrate that they can analyse it, identify its properties and potential issues. Students also need to analyse Internet traffic and identify servers, clients and protocols used.
BISM7202 Information Systems for Management - Excel Assignment
BISM7202Information Systems for ManagementExcel
This assignment requires you to create a professional business application using Microsoft Excel 2019 / Microsoft Excel 365. The purpose of this assignment is to test the student’s ability to operate and manage business data in spreadsheets.
MATH4063 Case Studies in Mathematical Modeling - Group Project: Jet Lag
MATH4063Case Studies in Mathematical ModelingJet LagThe Best HospitalBoarding and Disembarking a Plane
Organizing international meetings is not easy in many ways, including the problem that some of the participants may experience the effects of jet lag after recent travel from their home country to the meeting location which may be in a different time-zone, or in a different climate and time of year, and so on. All these things may dramatically affect the productivity of the meeting.
MTH5001: Introduction to Computer Programming - Final Report Project: Arc Diagrams
MTH5001Introduction to Computer ProgrammingArc DiagramsPython
In this project you will investigate properties of arc diagrams, particularly so-called crossings and nestings.
KXO206 Database Management Systems - Assessment Task 1 - Database Maintenance Report
KXO206Database Management SystemsDatabase MaintenanceSQL
The Shanghai Council for the Promotion of International Trade, founded in November 1956, serves as the oldest local branch of the China Council for the Promotion of International Trade (CCPIT).
COMP1047 Systems and Architecture - Coursework Part-2: Computer Networks
COMP1047Systems and ArchitectureComputer NetworksTCPUDP
This project provides insights on analyzing network performances such as delay, throughput, and packet drops of your designed network. It presents an experimental methodology to obtain an estimate of average delay, throughput, and packet drops for packets of variable payload size. You are required to use the TWO transport layer protocols, the TCP and UDP as we studied in Week-3 class.
Algorithmic Game Theory Summative Assignment: Nash equilibria and Auction
Algorithmic Game TheoryAuctionLoad Balancing
Two players, Player 1 and Player 2, take turns removing 1 or 2 cards from a stack of 6 cards, i.e., each of them, every time their turn comes, pick 1 or 2 cards to remove. Player 1 starts the game. Whoever picks the last card wins 1 unit of payo↵ from the other player
CSE233 DATABASE THEORY - Problem Set #2: Relational calculus
CSE233DATABASE THEORYRelational calculusSQL
Recall the movie database in Problem 1 of the previous home- work, and the query List the theaters showing only movies by Hitchcock. Express this query in nr-Datalog
BX2019 Accounting Information Systems - Assignment - MYOB Project
BX2019Accounting Information SystemsMYOBGST
In this assignment, you are to create a business profile and record day to day transactions including GST and payroll transactions by using MYOB Business EssentialsTM. This project also involves the preparation of common financial statements and a GST return.
160.212 Discrete Mathematics Assignment 2
160212Discrete Mathematics离散数学Partial OrderPermutation
Let N be the set of all divisors of 60, and let P ={a∈N|4≤a≤30}. Let ≼ be the partial order defined by a ≼ b if and only a divides b. (a) Draw the Hasse diagram of (P, ≼). (b) For every pair (a,b) of numbers in P evaluate the least upper bound, lub(a,b), or say it does not exist (DNE). Present the values in the form of a table. (c) Use your answer to (b) to explain why (P, ≼) is not a lattice.
BISM 7255 - UML ASSIGNMENT - SEMESTER 1-2024 A Digital Solution for Dance Academy Sydney
BISM7255A Digital Solution for Dance Academy SydneyBusiness Information Systems Analysis and DesignUML
The Dance Academy Sydney is a studio in Sydney that provides adults of any age a place to experience dance in a positive environment. In a term, different dance workshops are offered every week covering a range of different styles, Jazz, Ballet, Contemporary, and Tap. A workshop is a two-and-half-day or three-day course focused on a particular dance style.
COS20019 Cloud Computing Architecture Assignment 1 - Part B Photo Album website
COS20019Cloud Computing ArchitecturePhoto Album websiteAWSPHP
Creating and deploying Photo Album website onto a simple AWS infrastructure
ST117 Introduction to Statistical Modelling 2024 Final project assignment for WR
ST117Introduction to Statistical ModellingEDAexploratory data analysisR
Your written report will be a summary of a real-world data analysis project using the UK ECN repository introduced in the last lecture in Week 10 of Term 2. The assignment is released in two phases. The first phase (released along with Log3) is detailed below. The second phase will be released along with Log4.
INFO5001 Application Modeling and Design Assignment 7 Reports
INFO5001Application Modeling and DesignJava
Create a SupplierReport and SupplierSummary classes and add implement a report with the following columns: - Supplier Name, - Total Sales, - Loyalty score (Number of different customers who picked suppliers products divided by number of all customers)
1DV721 System Administration Assignment #1 Flow Analysis
1DV721System AdministrationComputer Networks
You have been hired by LNU. Co. Ltd. as a System Administrator for doing a network re- design. They already have a network that is operational with around one thousand users. You will start with performing several analyses in the existing network depicted
DTS205TC High Performance Computing - Assessment 2 - Lab Report
DTS205TCHigh Performance Computing
In a hierarchical storage system, the cache hit rate has a significant impact on program performance. Different cache strategies will result in different cache hit ratios. Now, we have recorded 2 datasets, containing CPU access requests to memory for a period of time.
INFT2060: Applied AI Assessment Item 2: You Only Look Once (YOLO)
INFT2060Applied AIYou Only Look Once
Student groups research a specific AI model and document their findings in form of a written report.
CS 440: Programming Languages Assignment: Big-step semantics
CS 440Programming LanguagesRacketBig-step semantics
We wish to add Boolean negation to IMP, via the ! operator. Write down inference rules to describe the big-step semantics of this operator
CS 440: Programming Languages Assignment: Axiomatic Semantics
CS440Programming LanguagesAxiomatic SemanticsRacket
Derive the weakest precondition P such that the Hoare triple { P } C { x > 0 } is valid. You must show your work in steps, deriving the weakest assertion required before each step of the program. Use relational, logical, and arithmetic operators as needed.
CS 440: Programming Languages Assignment: Lambda Calculus
CS 440Programming LanguagesLambda Calculus
For each of the following lambda calculus expressions, (a) draw the corresponding abstract syntax tree – following the conventions used in lecture, and (b) circle all the free variables in the AST.
160212 Discrete Mathematics Assignment 1
160.212Discrete MathematicsTruth tableBinary Relation
Use the known equivalences listed in Table 1.6 of page 7 of the Study Guide to show p → (q ∨ ∼r) and ∼p ∧ r ∧ ∼qare logically equivalent
CS275 Automata and Formal Language Theory Coursework Part 2
CS275Automata and Formal Language TheoryFormal LanguageJava
Use the powerset construction to find a deterministic automaton accepting the same language as the following non-deterministic one. Do not include unreachable states or dead ends
COMP9334 Capacity Planning of Computer Systems and Networks Assignment
COMP9334Capacity Planning of Computer Systems and NetworksMarkov chain
Assuming that you are the administrator of an interactive computer system. The computer system consists of a 2-core CPU1 and a disk. During an observation time of 1800 seconds, you obtained the following measurements from the system
Software Architecture & Design Assignment 5: Software Design
Software Architecture & DesignSoftware DesignUML
To create your design, you should follow the same approach that we present in the P3L2 lesson. That is, analyze the requirements (provided above) to identify and refine (1) classes, (2) attributes, (3) operations, and (4) relationships in your design.
ACP Assignment 2 Specifications (Essay)
ACPJava
This assignment has been designed to see your understanding of overall patterns, technology, and application in the microservice / cloud area.
CS6501 Cloud System Reliability - Project
CS6501Cloud System Reliability
As a core component of this course, each student is required to complete a mini course project. The project offers students the opportunity to delve deeper into a specific topic related to cloud system reliability, applying the theories and principles learned in class to a practical situation in real-world.
NET1014 NETWORKING PRINCIPLES Group Assigment: LAN topology
NET1014NETWORKING PRINCIPLESLAN topologyComputer Networks
This assignment aim is to allow students to design and configure a LAN topology by applying basic principles of wired and wireless network, together with configuration of network devices (including routers & switches) by using Cisco Packet Tracer simulation tool. Students are also expected to be able to design their IP addressing scheme with subnetting to segment their network.
CNET 600 Enterprise Networking - FINAL PROJECT: Network topologies
CNET 600Enterprise NetworkingComputer Networks
Consider an Ethernet network with three hosts, Host A, Host B, and Host C as shown in Figure 1. No machine is configured as an IP router, and there is no IP router on this network. Assume that the IP addresses and subnet masks are as shown in the figure
INFR09051 Informatics Large Practical (ILP) CW2 Specifications (Essay)
Informatics Large PracticalINFR09051ILPPizzaDronz
Your experience implementing the requirements either defined in CW1 or additional ones discovered later during implementation for the PizzaDronz app. This is supposed to be a classical “Lessons Learned” phase most projects have and is usually used to reflect on what was easy, good, hard and worth improving
DDA4210 Advanced Machine Learning - Assignment 1: Bias-variance decomposition, gradient boosting and recommendation systems
DDA4210Advanced Machine LearningBias-variance decompositiongradient boostingrecommendation systemsPCA
Derive the bias-variance decomposition for the squared error loss function. That is, show that for a model fS trained on a dataset S to predict a target y(x) for each x
COMP201: Software Engineering I - Assignment 1.1: Requirements Engineering
COMP201Software Engineering IRequirements Engineering
This assignment is mainly about “Requirements Engineering” and will consist of various stages to produce parts of a requirements document for a given scenario based on a “proposed building security system” detailed on page 2.
MATH60005 Optimisation - Coursework 1: Unconstrained Optimisation
MATH60005MATH70005Optimisation
Find the stationary points of f and classify them according to whether they are saddle points, strict/nonstrict local/global minimum/maximum points
FA23 CSGY6083B Principles of Database Systems - Assignment 2: CLEAR and FEEL
CSGY6083BPrinciples of Database SystemsCLEARFEEL
CLEAR ( Continuous Learning of Education and Administration Research) of a university has undertaken a project to consolidate people’s data from Human Resources and Students Affair departments. In this effort, CLEAR is developing a database design with following considerations,
COSC2500 Numerical Methods in Computational Science 2013 Projects
COSC2500Numerical Methods in Computational Sciencemathematical modelling
A typical project would involve the mathematical modelling of some system of interest, the numerical solution of the mathematical model, and discussion of the results (for example, what the results mean, comparison with experimental results, other computational results, and so on).
CS 6290: High-Performance Computer Architecture Project 3: cache coherence and performance of multi-core processors
CS 6290High-Performance Computer ArchitectureParallel ApplicationIPC
This project is intended to help you understand cache coherence and performance of multi-core processors. As with previous projects, for this project you will need VirtualBox and our project virtual machine
EECS595: Natural Language Processing Homework 4: Probabilistic Context Free Grammar and Dependency Parsing
EECS595Natural Language Processing
This exercise is to get you familiar with dependency parsing and the Stanford CoreNLP [1] toolkit. You may also need to consult the inventory of universal dependency relations. You have two options to complete this exercise.
FIT9137 Introduction to computer architecture and networks - Assignment 3: Core network emulation
FIT9137Introduction to computer architecture and networksComputer Networks
For this assignment you will use the core network emulator to complete a series of tasks on an individual core configuration file that is generated for you
BUS 440 Database Management - Project 1: Tucker Electronics
BUS 440Database ManagementSQL
Tucker Electronics, LLC. needs to keep track of their office, electronic, and computer inventory to reduce costs, manage reorder points, and better track item locations within their facilities. They need to track which buildings contain what products and be able to contact the manager of each building to verify inventory and reorder products, when necessary
ITECH2004 DATA MODELLING - Assignment 2 Advanced Database Design and Implementation
ITECH2004DATA MODELLINGSQLDatabase
The company for whom you are developing this system wants people to visit local walks that are considered to have touristic appeal. For instance in Melbourne there are several tourism guide books and websites that detail walks that interested tourists can use to explore sites of local interest.
EBUS3030 Business Intelligence - Assignment: Best Salesperson
EBUS3030Business IntelligenceBest Salesperson
This assignment is not just about the data – it is HOW the data resulting from your analytics will support the business, i.e., provide intelligence to the business to help management (your client) make strategic and operational decisions.
IAB320 Business Process Improvement - Assignment 2 Analysis of Business Processes
IAB320Business Process ImprovementAnalysis of Business Processes
Working in groups of at most four (4) students, you are asked to redesign the Health Insurance Claims Handling process of 360-Degree Insurance as described in Section 3 and verify if the redesign will be beneficial
FIT9132 Introduction to Databases - Assignment 2A: Creating, Populating and Manipulating Database - TimeShare Australia
Monash UniversityFIT9132Introduction to DatabasesDatabaseTimeShare AustraliaSQL
Your task for this assignment is to create, populate and manipulate a database which can be used to support the activities of a holiday timeshare system - TimeShare Australia. If you are unfamiliar with time sharing, this link will provide some background.
CS 536: Science of Programming - HW 3: Syntax, Operational Semantics, Denotational Semantics, Runtime Errors
IITIllinois Institute of Technology States Satisfaction State Updates spPropositional & Predicate Logic
Translate the program below into our programming language. a. m=x=0;y=1;while(m++<n){y=++x;y*=x;};m=m*m b. m=n;p=y=1;while(––m<n){p=p*(y++);}
Database Systems Lab 9: B+ Tree and SQL
SQLB+ Tree
Theory Consider the following B+-tree on a relation R. Each block can hold up to 3tuples of R; alternatively, each block can hold a combination of up to 4keys of Rand 5pointers.
EEE112 Integrated Electronics and Design - NMOS IC Design Project
Integrated Electronics and DesignUKThe University of Sheffield
This project aims to provide students with an experience of designing a simple integrated circuit at the silicon layout level, as well as offering an insight into the manufacturing process flow.
EEE229 Electrical Energy and Conversion - Coursework: A three-phase induction machine
Electrical Energy and ConversionUKThe University of Sheffield
A three -phase induction machine is designed to operate at a near constant speed for the compressor of an environmental control system of an aircraft. The power system to which it is connected is a standard 400Hz, 115 Vrms (phase voltage) sinusoidal AC supply.
Lab 3: Reasoning with Bayesian networks
SamIam
Lisa is given a fair coin C1and asked to flip it eight times in a row. Lisa also has a biased coin C2with a probability .7 of landing heads. All we know is that Lisa flipped the fair coin initially (the first flip), then she intends to switch to the biased coin, and that she tends to be 40% successful in performing the switch (per attempt).
Full Stack Application Development and Software Workshop 2 - Assignment 3: Fantasy base building game
University of BirminghamFull-Stack Application DevelopmentDatabaseSQL
For this Assignment you will be designing and developing a Database for a fantasy base building game. One example of such a game is Townsmen. For this Assignment you do not need to worry about implementing the game at all, we are just focusing on the database.
Theories of Computation: Summative Assignment 3: CLIQUE problem and polynomial bounds
CLIQUE problemCLIQUE ReductionSAT
An undirected graph G consists of vertices and edges, and its sizeis the number of vertices. For example, here are two undirected graphs of size 4. A clique in G is a set of vertices with any two distinct vertices appearing in the list are related by an edge.
351/751 Database Systems Lab 07: Transactions, Deadlocks and Crash Recovery
COMPSCI 751COMPSCI 351Fundamentals of Database SystemsNew ZealandUniversity of Auckland
Transactions, Phenomena. Say for each of the following schedules: does the schedule contain phenomena or any other violation of the locking rules of the common scheduler?
Comp2022/2922 A2 - CFLs and non-regularity
Comp2022Comp2922Models of ComputationCFLs and non-regularity
You’re honing your skills for the world championship of popular card game Magic: the Gathering. Your goal is to draw through all the cards in your deck, and to this end, you’ve included lots of cards that help you draw more cards. However, if you get unlucky, with some deck orderings you’ve found that this is impossible. You’re interested in determining which deck orderings can be won, and which can’t.
MA1608 Midterm Assignment
Elements of Applied MathematicsUKBrunel University London
An isosceles triangle ABC with the base BCis inscribed into a downward parabola. The vertex A coincides with the parabola vertex, and the vertices BandCare located at the opposite branches of the parabola
FIT3175 2023 S1 Assessment 2 Brief: Storyboarding
PrototypeAustraliaMonashFIT3175Usability
Designing and developing an application or website can be costly in terms of time and money. To avoid wasting a lot of these resources on a final product that does not meet the user’s needs or has usability problems, it is worth creating storyboards and low-fidelity prototypes
Gestión de Tráfico y Calidad de Servicio
Computer Networks
Se tiene un tipo de fuente generadora de paquetes en tiempo discreto para la que p = [p0 , p1 , p2 , p3 , p4 , p5 ] = [0.25, 0.4, 0.2, 0.1, 0.05, 0], donde pi es la probabilidad de que la fuente genere i paquetes en una ranura. La duración de una ranura es de 4 ms y lalongitud del paquete 800 bits.
Assignment 1: Kaggle and the Catalogue of US Cybersecurity Breaches
KaggleCybersecurity Breaches
Kaggle is a remarkable web-based, data science resource which contains a a huge number of different data sets and tutorials on tools. (Highly recommended.) One particular data set is the Catalogue of Cyber Security Breaches
At-Home Activity 4: Joining Spatial Data using QGIS
Spatial Data
It is sometimes necessary to combine data from different tables into one, for mapping, analysis or querying. In standard databases, this is called a join, and involves specifying a column in a table that the two tables to be joined have in common. In this activity, you will use QGIS to do attribute joins as for a standard database, and you will also do spatial joins.
COMP3910 – Combinatorial Optimisation - Coursework 2: Modelling Strong Formulations
Combinatorial OptimisationModellingStrong FormulationsUKUniversity of Leeds
Present an ILP, without explaining how it is derived. If the model uses some numbers which are calculated based on the problem input, then present the formulae (no need to explain).
CPSC 418 Homework 3: Bitonic sequences, Oddly Bitonic, Work-Span and Dynamic Programming, Bisection Width
Oddly BitonicWork-Span and Dynamic ProgrammingBisection WidthCPSC 418CS418Parallel Computation
In class, we presented the bitonic sorting algorithm, and made the simplifying assumption that N , the number of values to sort was a power of two. What if N is some other integer?
EECS116/CS122A Introduction to Data Management - Homework 7 - MySQL
CS122AIntroduction to Data ManagementMySQLSQLUSUCI
In this homework, we are going to create a database and tables using MySQL, and import the data into tables.
CS 4163/6523: Introduction to Database Systems - Project 1: Using SQL to create, populate, and query a database
CS 6523Introduction to Database SystemsSQLUniversity of TulsaUS
You will use a MySQL DBMS, installed on our university server, to create, populate and query a relational database.
COMPSCI 351 : Fundamentals of Database Systems S1 C – Lab 01: Three-Schema Architecture, DDL and SQL
University of AucklandCOMPSCI 351Fundamentals of Database SystemsThree-Schema Architecture DDLSQL
What are the advantages of using a database solution as compared to the traditional file storage mechanism? What is the role of DBMS to a database system?
Mini-Project 2: Network Address Identification, Network Summary, Interesting Security Findings, Identifying External Shadow IT
NCSUNetwork Address Identification Network Summary Interesting Security Findings Identifying ExternalIPv6
The goal of this project is to learn how to perform an audit on a network with the intention to discover interesting characteristics and phenomena.
COMP8410 Data Mining - Essay on the ethics and social impact of a data mining project
COMP8410Data Miningethics and social impact of a data mining projectEssay
You are to write a well-researched essay that critically evaluates the ethics and social impact of a data mining project.
COMP6741: Algorithms for Intractable Problems - Assignment 2: Nonblocker
UNSWCOMP6741Algorithms for Intractable ProblemsNonblocker
This assignment is an individual assignment. For the solutions to this assignment, you may rely on all theorems, lemmas, and results from the lecture notes.
COMPSCI 351 : Fundamentals of Database Systems S1 C - Lab 02: MySQL DBMS
University of AucklandCOMPSCI 351Fundamentals of Database Systems DDLPython
In this question, we use a programming interface to directly access the created databases of the MySQL DBMS.
Computer Science 350 Automata and Formal Languages Assignment 1: Automata
CS350Automata and Formal LanguagesAutomata
Automata and Formal Languages
COMP9334 Capacity Planning of Computer Systems and Networks - Assignment: CPU Throughput, Markov Chain, Database
Markov Chain DatabaseCOMP9334Capacity Planning of Computer Systems and NetworksAustraliaUNSW
Assuming that you are the administrator of an interactive computer system. The computer system consists of a multi-core CPU and a disk. During an observation time of 1800 seconds, you obtained the following measurements from the system
COMP3310 Computer Networks - Assignment 1- The Last Mile
Network DesignLast Mile NetworkAustraliaANUCOMP3310
This assignment is to develop a (short) technical report that deals with a variety of network design aspects relating to building a last-mile network, with the last section making a specific design recommendation for a semi-fictitious rural setting.
EventLite: From requirements to mock-ups
MockFlowUKUniversity Of Manchester
We are going to build EventLite, a web application to create, list, search and manage events that are going on in Manchester.
COMM048 Information and Network Security - Coursework
SYN Flooding AttackDigital CertificationKerberosWEPSnortcomputer worm
Make use of two virtual machines one of which plays the role of the target server and the other one the role of the attacker. Use scapy to craft a TCP SYN packet and let the attacker send it to the target server.
IT Assignment: Income data analysis for a Sino-foreign company
ExcelIncome data analysisHong KongUIC Hong Kong
If you are given 10000 RMB to do a budget plan on buying some software and hardware for the server in the computer lab, please do some investigations and work out a detailed solution.
Assignment #05 Infrastructure as Code w/Terraform
Infrastructure as CodeUSNEUNortheastern UniversityCloud ComputingDB Security
In this assignment, you will update the Terraform template for the application stack to add the following resources
Assignment #04: Building Custom Application AMI using Packer
MySQLVPCInfrastructure as CodeUSNEUNortheastern University
Use Amazon Linux 2 as your source image to create a custom AMI using Packer.
COMP2123 Data Structures and Algorithms - Assignment 1 s1 2023
The University of SydneyCOMP2123Data Structures and Algorithms
We want to build a stack for elements having a colour attribute (e.g., blue, red, orange, etc). We say that a bunch of consecutive positions in the array for a monochromatic stretch if all the elements stored in those positions have the same colour.