Embedded Systems ( computer architecture)

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 
Question 3

 Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system? 

Question 5

Is the microprocessor controlling a cell phone an embedded system? 

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer? 

Question 7

List and briefly define the possible states that define an instruction execution. 

Question 8

List and briefly define two approaches to dealing with multiple interrupts. 

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long. 

(a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ? 

(b) Repeat assuming that half of the operands and instructions are one byte long. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Classification of Computers

  • What is the difference between Harvard architecture and Von Neumann Architecture?
  • What two examples of Harvard architecture? 
  • What are two examples of Von Neumann Architecture?
  • Why is Harvard architecture used instead of Von Neumann?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer architecture jan 16

  • What is the difference between Harvard architecture and Von Neumann Architecture?
  • What two examples of Harvard architecture? 
  • What are two examples of Von Neumann Architecture?
  • Why is Harvard architecture used instead of Von Neumann?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer architecture Embedded systems

For each of the following examples, determine whether this is an embedded system, explaining why or why not. 

Question 1 

Are programs that understand physics and/or hardware embedded? For example, one that uses finite-element methods to predict fluid flow over airplane wings? 

Question 2

Is the internal microprocessor controlling a disk drive an example of an embedded system?

 Question 3

Is an I/O drivers control hardware, so does the presence of an I/O driver imply that the computer executing the driver is embedded? 

Question 4

Is a PDA (Personal Digital Assistant) an embedded system?  

Question 5

Is the microprocessor controlling a cell phone an embedded system?  

Question 6

Is the computer controlling a pacemaker in a person’s chest an embedded computer?  

Question 7

List and briefly define the possible states that define an instruction execution.  

Question 8

List and briefly define two approaches to dealing with multiple interrupts.  

Question 9

Consider two microprocessors having 8- and 16-bit-wide external data buses, respectively. The two processors are identical otherwise and their bus cycles take just as long.  (a) Suppose all instructions and operands are two bytes long. By what factor do the maximum data transfer rates differ?  (b) Repeat assuming that half of the operands and instructions are one byte long.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ homework project

(1) Learn to create class structure in C++

(2) Create an array of objects in C++

(3) Search and perform operations on the array of objects

Project Description:

The input csv file for this project consists of rows of data that deals with COVID-19 cases and deaths per day for each county in every state in the United States. Here is an example,

date,county,state,fips,cases,deaths

2020-01-21,Snohomish,Washington,53061,1,0

2020-01-22,Snohomish,Washington,53061,1,0

2020-01-23,Snohomish,Washington,53061,1,0

For the purposes of this project, we will assume that the following are char* data types: date, county, and state. FIPS (unique identifier for each county) along with cases and deaths are int data types. Please note the comma delimiter in each row. You need ­­­to carefully read each field knowing that you will have a comma.

You will use redirected input (more later) to read an input txt file that contains the following:

counts  //number of data entries in the csv file

Filename.csv  //this is the file that contains the covid-19 data

Command  //details of what constitutes a command is given below

Command

Command

….

Your C++ program will read the counts value on the first line of the txt file, which represents the number of data entries in the csv file. (Note – the first line of the csv file contains descriptive variable fields, so there will be a total of [number of data entries + 1] lines in the csv file). Then, on the second line, it will read the Filename.csv and open the file for reading (more on how to do this in C++). After you open the file, you will read the data from each row of the csv file and create a COVID19 object. The COVID19 class is given below. You need to implement all of the necessary methods.

class COVID19 {

protected:

char* date;

char* county;

char* state;

int fips;

int cases;

int deaths;

public:

COVID19 (); //default constructor

COVID19 (char* da, char* co, char* s, int f, 

 int ca, int de); //initializer

display ();

//write all accessors and other methods as necessary

};

After your write the above class you will write the following class:

class COVID19DataSet {

protected:

COVID19* allData;

int count; //number of COVID19 objects in allData

int size; //maximum size of array

public:

COVID19DataSet (); //default constructor

COVID19DataSet (int initSize);

void display ();

void addRow (COVID19& oneData);

int findTotalCasesByCounty (char* county, char* state); 

int findTotalDeathsByCounty (char* county, char* state);

int findTotalCasesByState (char* state);

int findTotalDeathsByState (char* state); 

int findTotalCasesBySateWithDateRange (char* state,

char* startDate, char* endDate);

int findTotalDeathsBySateWithDateRange (char* state,

char* startDate, char* endDate);

~COVID19(); //destructor

//other methods as deem important

};

The structure of the main program will be something like this:

#include <iostream>

using namespace std;

// Write all the classes here

int main () {

int counts; // number of records in Filename.CSV

int command;

COVID19 oneRow;

//read the filename, for example, Filename.csv

//open the Filename.csv using fopen (google it for C++ to find out)

//assume that you named this file as myFile

//read the first integer in the file that contains the number of rows

//call this number counts

COVID19DataSet* myData = new COVID19DataSet (counts);

for (int i=0; i < counts; i++) {

//read the values in each row

//use setters to set the fields in oneRow

(*myData).addRow (oneRow);

} //end for loop

while (!cin.eof()) {

cin >> command;

switch (command) {

case 1: {

//read the rest of the row

(*myData).findTotalCasesByCounty (county, state);

break;

 }

case 2: {

 //do what is needed for command 2

 break;

 }

case 3: {

 //do what is needed for command 3

 break;

 }

case 4: {

 //do what is needed for command 4

 break;

 }

case 5: {

 //do what is needed for command 5

 break;

 }

case 6: {

 //do what is needed for command 6

 break;

 }

default: cout << “Wrong command\n”;

} //end switch

} //end while

delete myData;

return 0;

}

Input Structure:

The input txt file will have the following structure – I have annotated here for understanding and these annotations will not be in the actual input file. After the first two lines, the remaining lines in the input txt file contains commands (one command per line), where there can be up to 6 different commands in any order with any number of entries. The command is indicated by an integer [1 to 6] and can be found at the beginning of each line.

counts // Number of data entries in the csv file 

Covid-19-Data-csv  // Name of the input file that contains the actual Covid-19 data by county and state

1 Cleveland, Oklahoma //command 1 here is for findTotalCasesByCounty

1 Walla Walla, Washington 

1 San Francisco, California

1 Tulsa, Oklahoma

2 Oklahoma, Oklahoma //command 2 here is for findTotalDeathsByCounty

2 Miami, Ohio

2 Miami, Oklahoma

3 Oklahoma //command 3 here is for findTotalCasesByState

3 North Carolina

4 New York //command 4 here is for findTotalDeathsByState

4 Arkansas

5 Oklahoma 2020-03-19 2020-06-06 //5 here is for findTotalCasesBySateWithDateRange

6 New York 2020-04-01 2020-06-06 //6 here is for findTotalDeathsBySateWithDateRange

Redirected Input

Redirected input provides you a way to send a file to the standard input of a program without typing it using the keyboard. To use redirected input in Visual Studio environment, follow these steps: After you have opened or created a new project, on the menu go to project, project properties, expand configuration properties until you see Debugging, on the right you will see a set of options, and in the command arguments type “< input filename”. The < sign is for redirected input and the input filename is the name of the input file (including the path if not in the working directory). A simple program that reads character by character until it reaches end-of-file can be found below.

#include <iostream>

using namespace std;

//The character for end-of-line is ‘\n’ and you can compare c below with this 

//character to check if end-of-line is reached.

int main () {

char c;

cin.get(c);

while (!cin.eof()) {

cout << c;

cin.get(c);

}

return 0;

}

C String

A string in the C Programming Language is an array of characters ends with ‘\0’ (NULL) character. The NULL character denotes the end of the C string. For example, you can declare a C string like this:

char aCString[9];

Then you will be able to store up to 8 characters in this string. You can use cout to print out the string and the characters stored in a C string will be displayed one by one until ‘\0’ is reached. Here are some examples:

0

1

2

3

4

5

6

7

8

cout result

Length

u

s

e

r

n

a

m

e

\0

username

8

n

a

m

e

\0

name

4

n

a

m

e

\0

1

2

3

4

name

4

\0

(nothing)

0

Similarly, you can use a for loop to determine the length of a string (NULL is NOT included). We show this in the following and also show how you can dynamically create a string using a pointer

char aCString[] = “This is a C String.”; // you don’t need to provide

// the size of the array

// if the content is provided

char* anotherCString; // a pointer to an array of

// characters

unsigned int length = 0;

while( aCString[length] != ‘\0’)

{

length++;

}

// the length of the string is now known

anotherCString = new char[length+1]; // need space for NULL character

// copy the string

for( int i=0; i< length+1; i++)

 anotherCString[i] = aCString[i];

 cout << aCString << endl; // print out the two strings

cout << anotherCSring << endl;

delete [] anotherCString; // release the memory after use

You can check http://www.cs.bu.edu/teaching/cpp/string/array-vs-ptr/, other online sources or textbooks to learn more about this.

Output Structure

Stay tuned for the exact format in which the output of your program should be formatted. For now, it is recommended to start working on reading in the input files, storing the data, and accessing the data based on the given commands.

Constraints

1. In this project, the only header you will use is #include <iostream> and using namespace std.

2. None of the projects is a group project. Consulting with other members of this class our seeking coding solutions from other sources including the web on programming projects is strictly not allowed and plagiarism charges will be imposed on students who do not follow this.

Rules for Gradescope (Project 1):

1. Students have to access GradeScope through Canvas using the GradeScope tab on the left, or by clicking on the Project 1 assignment submission button.

2. Students should upload their program as a single cpp file and cannot have any header files. If, there are header files (for classes) you need to combine them to a single cpp file and upload to GradeScope.

3. Students have to name their single cpp file as ‘project1.cpp’. All lower case. The autograder will grade this only if your program is saved as this name.

4. Sample input files and output files are given. Your output should EXACTLY match the sample output file given. Please check the spaces and new lines before your email us telling that the ‘output exactly matches but not passing the test cases’. Suggest using some type of text comparison to check your output with the expected.

5. Students need to have only one header file(iostream) while uploading to GradeScope. You cannot have ‘pch.h’ or ’stdafx.h’.

6. Students cannot have ‘system pause’ at the very end of the cpp file.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java assignment help

This assignment focuses on conjunctive normal form formulas (cnf-formula) and satisfiability.

In this assignment, you must create a Netbeans Java program that:

• prompts the user for the location of a file to load a cnf-formula (use JFileChooser)

• reads a cnf-formula from the file creating a CnfFormula object (see file-format below),

• prompt the user for a variable assignment (see AssignmentView below),

• verifies and displays whether the user’s assignment satisfies the cnf-formula,

• determines whether the cnf-formula is satisfiable and if so, output the assignment,

• as Java comments give the Big-O analysis of the verify and isSatisfiable methods,

• as a separate file, submit the cnf-formula file you “unit” tested on.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Vehicle Insurance management system project(OOAD)

  

The project documentation should include the following sections: 

• Title of the project (with the list of project team members); 

• Executive Summary; 

• Table of Contents; 

• Introduction; 

• Project Plan; 

• Functional Specifications (including descriptions of Actors/Roles; Business Rules; Use-Case 

Diagrams with Use-Case descriptions; Examples of Class Diagrams (related to particular Use 

Cases); Examples of Object Diagrams [related to the selected Class Diagrams]; Examples of 

Sequence Diagrams; Examples of Collaboration or Communication Diagrams; Examples of StateChart Diagrams); 

• Functional Tests Plan; 

• System Design Specifications (including System Architectural [Layered, “Physical”] Design Scheme selected; Package Diagram [populated with interrelated classes]; Database Tables; Entity-

Relational diagrams; Window Navigation Diagrams; Drafts of User Interfaces; and Examples of System-Response Report Forms); 

• Integration Tests Plan; 

• Issues to Future Studies; 

• Conclusion; 

• References; 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

read the attachment and answer the question

1. Download and read attached report: “Metrics for the Second Curve of Health Care”Preview the document. You need to concentrate your reading on contents related to “Strategy 4: developing Integrated Information Systems”.

Write a report to explain

  • what is the Second Curve Health Care? (10 points)
  • why Strategy 4 is important in the transition from the First Curve to the Second Curve (40 points)? Your explanation should be written from the informatics perspective focusing on how the three components of Informatics are involved in this strategy.

If you choose to supplement your writing with resources besides the attached document, you need to include their references in APA format.

Save your report as a Word document and name it as SecondCurve_FL where FL are your first and last name initials. Your Word document should be formatted using Times New Roman font (no smaller than 10 pt but no bigger than 11 pt), single spacing, 1″ margins on all sides, and the report length (2 page minimum,

……………………………………………………………………………………………………………………………………………………………….

2. Download and read a document on Quality Data Model (QDM)Preview the document. Focus your reading on sections 1.1-1.5, and 2.1 – 2.8.

Tasks: Write a report that contains your answer to the following questions:

1. Why a quality data model is needed? Explain QDM’s importance in healthcare information system using examples you have seen or discussed in this Module’s required readings. (10 points)

2. Figure 1 in section 2.5 shows an example QDM element structure on the left. The diagram to the right is an example of QDM element called “Laboratory Test”. Suppose you are member of an interprofessional team working a quality health database project for a hospital. Explain how you would design a database table to store data containing in the ODM element “Laboratory Test”. For example, what is the name of this table? What are the columns to include in this table? (10 points)

3. Suppose the same database contains other tables describing ODM elements such as Doctor, Patient, Medication, Pharmacy, Pharmaceutical Company, etc. Describe ONE scenario where you can use this database to address questions related to QDM element “Laboratory Test”. (40 points)

In order to help you understand this question, please consider the following sample scenario: Doctor A needs to find if any of his/her patients in the age group 35-55 has low HDL so that s/he can recommend them to practice regular aerobic exercise and loss of excess weight to increase the HDL level. Doctor A asks you for help since you are a health informatics analyst. Describe how you would use the database to find the answer. For example, do you need to use the database table representing QDM element “Laboratory Test”? What other tables in this database do you need to use? How will you generate the answer for Doctor A from theses database tables?

Save your report as a Word file and save it as H3_FL2.docx where FL are your first and last name initials.

……………………………………………………………………………………………………………………………………………………………

3. The attached Ethics-III.pdfPreview the document continues the discussion on what other ethical obligations software engineers are under.

Then proceed to answer the questions inside the reading:

  • Questions 5.1 to 5.12

Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones. There are three grade levels for this assignment based on your responses to all the questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

Save your file as Ethics_3_FL where FL is your first and last name initial and Submit.

……………………………………………………………………………………………………………………………………………………………….

4. Answer the following two questions based on what you have learned from “Head First” book Chapter 4 and Chapter 5.

Q1. Describe the usage of the Burn Down chart in the Head First book Chapter 4. Explain how to calculate the value and update it on the chart for any particular day? (Your answer should explain the relationship between the Burn Down chart and the other techniques discussed in Chapter 4 such as the Big Board and the Standup Meeting.) (20 points)

Q2. Suppose that you are asked to add a new event to the iSwoon system: The event is “Party at a friend’s place” and it is only allowed to occur on the 4th date or later. Describe what you would have to do to add this Event to the original iSwoon design(Ch 4) AND the “fixed” iSwoon design (Ch 5) respectively.(10 points)

Give your own evaluation of the latter “fixed” design; does it address the problems of the original design? What problems might the original design have and how might you fix them? (20 points)

Save your file as iSwoon_FL where FL is your first and last name initial and Submit.

………………………………………………………………………………………………………………………………………………………………………….

5. you are going to complete a midterm paper and it’s based on the movie “Office Space”. You choose the way to watch the movie in a comfortable setting.

Write your review in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides, and the paper’s length is no more than 2 pages. Any direct quotes from the movie do not count into the length of the paper.

In the midterm paper, you need to identify at least three problems (problems identified must be from the software engineering perspective, not from the general ethics perspective) that could have been avoided if a good software development method is applied in “Office Space”.

  1. Identify the problems related to software engineering and describe what the consequences of these problems are respectively; (15 points)
  2. Explain what actions you, as a member working on a software project, would have taken in order to avoid those problem respectively; (30 points)
  3. Describe if your actions (described above) are related to any knowledge that you learned from the first 5 modules of this semester. (5 points)

Save your file as Movie_FL where FL is your first and last name initial. Submit your file through the dedicated link under the Submissions tab.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

C++ code

 

Please Upload a source code file for this assignment. Explain your program appropriately using comments the source code.

Check the attached files of “OS Security II,”  for further details of assignment. You are to implement a Dictionary Attack with and without Password Salt program in either C++ or Python.

If you are not familiar with measuring execution time in C++, see the following website:

https://www.geeksforgeeks.org/measure-execution-time-function-cpp/

If you are not familiar with measuring execution time in Python, see the following website:

https://stackoverflow.com/questions/1557571/how-do-i-get-time-of-a-python-programs-execution

See the following steps.

1. Accept a user password of length N as keyboard input to your program. You can determine your own length N.

2. Compute the hash of the password from step 1.

Your hash function H() is simply the checksum. (See Assignment 2)

3. Now you become an attacker and try to find the password of length N.

Try every combination of length N password and for each combination, compute the hash and compare to the hash of the password from step 2.

Measure execution time.

4. Now let’s reinforce our password using the password salt. Accept an arbitrary non-negative integer number as keyboard input to your program.

5. Compute the hash of the concatenated password salt and password from step 4 and step 1. To compute the password salt portion of the checksum, you can treat the entire password salt as EITHER a single integer OR multiple one-byte integers.

6. Now you become an attacker and try to find the concatenated password salt and password.

Try every combination of an arbitrary non-negative integer number and length N password and for each combination, compute the hash and compare to the hash from step 5.

Measure execution time.

NOTE: your program should have separate functions for the checksum and the two dictionary attacks with and without the password salt by the attacker.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case Study Crosby Manufacturing Corporation

 

Read the Case Study Crosby Manufacturing Corporation beginning on page 295 of Case Studies.pdf download

State you analysis of the company’s project scheduling process.  Will it be effective or not?  Why?  Are they missing anything? Are the correct stakeholders involved?

Use a Word or PDF document as submission.  Format should be 12 pt font, double spaced.  There is no word length requirement, but thorough responses are expected.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now