Problem StatementThis assignment involves an extension to the single source - single destination shortest path problem. 1. Open the text file "ass3.txt". (Note: "ass3.txt" should be a hardcoded as a constant.) 2. Read a graph from the file. 3. Find the shortest path between the start and goal vertices specified in the file. 4. Print out the vertices on the path, in order from start to goal. 5. Print out the length of this path...
TaskThis homework, on the other hand, requires you to perform an empirical analysis of algorithmic alternatives. Furthermore this homework is also intended to give you greater familiarity with recursion (divide-and-conquer), the use of heaps, and finally, more practice with debugging and constructing good test cases. If you are not fully familiar with mergesort yet, read section 2.3 in the textbook first! Mergesort is a good algorithm. It ru...
TaskTo demonstrate your ability and understanding in the following tasks:1.To design and implement a simple class.2.To write a test program to create instances of your class and demonstrate its behaviour.3.To collect output from the test program runs, and comment on it.4.To conform to Java coding conventions, including documentation style comments.You must create a general design for a class. Design, implement, test and document this class. Yo...
CapitalizeThis assignment is an exercise in validating user input and using string manipulation to edit and reformat input into a preferred format. Some fields have patterns, some expect numeric values … possibly with limits. Some fields are required (and cannot be just spaces), some are optional or conditionally optional, some will cause abends if null is not expected. Some strings need to be trimmed of leading and trai...
Task 1 - Simple InheritanceXanadu Multi-Access System-XMAS The Xanadu Corporation manages a number of luxury recreational facilities which it calls “domes”. Each dome has a network of “pleasure caverns” with a range of delights for users to experience. Part of the experience is exploring the network of caverns to see what is available. Xanadu require a system which both controls access to each cavern and keeps track ...
Course Elements and Final Course GradeUse the weighted grade distribution located in the assessment section of the syllabus You should have a cell for the 3 monthly tests, quizzes and the final. Then generate a formula cell that computes the final course grade based on the grades of the tests and the assignments. You may presume that you will get between a 90 and 100 for your portfolio. Now obviously you don't have a finals grade or a gra...
AbstractAbstractOpen Banking is a brand new, secure way for consumers including small businesses to share information, allowing new and existing companies to offer super-fast payment methods and innovative banking products. Due to the fintech revolution caused by Open Banking which was adopted in the United Kingdom as a result of the implementation of the Revised Payment Services Directive (PSD2) which unleashed a transformation in how financ...
Question 1: Limitations of Traditional Models for Evaluating Transport SustainabilityBriefly discuss the limitations of using models such as Equation 1 for estimating environmental sustainability of the transport system. Discuss the role transportation systems management and operations, and the supporting ITS can play in reducing emissions. What ITS applications might you choose to investigate for use in Marford to address environment,...
Part APart A All of part A should be contained inside one script.1. We have taken measurements of the activity of 2 genes for 25 patients. In order to store this data, you must create a 2x25 component matrix. Each row of this matrix will correspond to the measurements of the activity of a single gene. Each column of this matrix will correspond to a different patient. Populate this matrix with the data for GeneA in the first row and the...
Adding a Goal (10 marks)Introduction You work with the given project haunted Castle Start.This is yet another variant of the game of Zuul that is described in Chapter 8 of the module text book. This variant uses a different scenario, namely a haunted castle. You will extend the project towards a more interesting game. Note the difference in class structure. There is a split between the classes Game and GameMain. The latter is the textual user...
Factors to consider when designing a parallel programComputers were designed in the beginning to have only one processor and algorithms been designed to be sequential. But modern computers have more than one processing element (either multiple CPU cores or GPU). The introduction of parallel architectures can improve program performance to alleviate the throughput of sequential programs that sometimes need to process the instructions one by one...
InstructionsPlease submit your solutions on Blackboard in a single PDF file that includes all math and numerical results. Only the contents of this PDF will be graded. For control purposes, please also provide any code you write to solve the questions in one of the following ways:1. Include all of your code in the PDF as an appendix.2. In the PDF provide a link to your online code repo where the code resides. Â This is a graded a...
Question: Learning Outcomes This assignment is designed to assess students’ knowledge and skills related to the following learning outcomes: 1. Conduct effective and efficient inspections2. Design and implement comprehensive test plans3. Apply a wide variety of testing techniques in an effective and efficient manner.4. Assess a software process to evaluate how effective it is at promoting quality. Questions Problem-1: (25 Marks) Yo...
TaskThere are two items of coursework for the module, that are collectively worth 100% of your module mark. They are CW1, a security analysis, and CW2, a software development. 1. The security analysis, which will also require a software modification, is for 40% of your module mark and it will test the following module level outcomes: •Have a thorough understanding of the main attack vectors commonly used to attack software and be ab...
TasksModeling of an Application Summary This is an individual coursework worth 60% of the total module mark. It requires developing a software application which simulates the behaviour of a digital circuit performing integer addition and writing a report to describe the model, algorithm, data structures needed as well as the program developed. Â 1. Construct a model (represented by a picture) of a byte adder assembled using elect...