Assignment

1. There are n marble balls, one of which is made of a different material. You have access to a Comparator that can compare two inputs (of an arbitrary number of marble balls) and determine if the two inputs are the same or not. The problem is to find the single marble ball that is different from the others while minimizing the number of times you access the Comparator. Design an efficient algorithm based on prune-and-search to solve the problem. Derive the time complexity of your algorithm.

2. Exercise 14.3-6 (page 354). Use an example to demonstrate your augmented data structure and operations.

(14.3-6 Show how to maintain a dynamic set Q of numbers that supports the operation MIN-GAP, which gives the magnitude of the difference of the two closest numbers in Q. For example, if Q D f1; 5; 9; 15; 18; 22g, then MIN-GAP.Q/ returns 18 15 D 3, since 15 and 18 are the two closest numbers in Q. Make the operations INSERT, DELETE, SEARCH, and MIN-GAP as efficient as possible, and analyze their running times.). This is the exercise question 14.3-6 as mentioned above.

Research Paper Bitcoin Economics

 Articles:  

WALDO, J. (2019). A Hitchhiker’s Guide to the Blockchain Universe. Communications of the ACM, 62(3), 38–42. https://doi.org/10.1145/3303868 

PAVLUS, J. (2018). The World Bitcoin Created. Scientific American, 318(1), 32–37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=126727561&site=eds-live

Question:

This week’s reading centered around Bitcoin Economics.  For this  week’s research paper, search the Internet and explain why some  organizations are accepting and other organizations are rejecting the  use of Bitcoins as a standard form of currency.  Your paper needs to  identify two major companies that have adopted Bitcoin technology as  well as one that has refused accepting Bitcoin as a form of currency. Be  sure to discuss each organization, how they adopted (or why they won’t  adopt) Bitcoin, and what recommendations you have for them to continue  to support Bitcoin (or why they should support Bitcoin). 

Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Power Point presentation as it applies to USB Thumbdrives

Create a PowerPoint presentation, outlining the content of your paper. At a minimum include the following:

Detailed description of the area researched

Technology involved in the area

Future trends in the area

Example companies involved in the area

Regulatory issues surrounding the area

Global implications for the area

References (minimum of 10)

Submission Instructions: A PowerPoint presentation with a minimum of 10 slides [not including title slide and reference slide(s)].

Process Synchronization Using Monitor and Pthreads

 

The purpose of this programming project is to explore process synchronization. This will be accomplished by writing a program to solve the bounded buffer problem using monitor concept. Your program must be written using C or C++ and you are required to use the Pthread libraries. 

Bounded buffer is used to enable multiple producers and consumers processes to share memory. A producer can place items into the buffer only if the buffer has a free memory location to store the item. A producer cannot add items to a full buffer. A consumer can remove items from the buffer if the buffer is not empty. A consumer must wait to consume items if the buffer is empty. The “items” stored in this buffer will be integers. Your producer processes will have to insert random numbers into the buffer. The consumer processes will consume a number. 

Web Development Timeline and/or Cycle COLLAPSE 1 page paragraph

 

Web Development Timeline and/or Cycle
COLLAPSE

No two websites are developed the same, but there are likely timelines and best practices. Phrases I would focus on would be customer-focussed, user-focussed, internal communication, and external communication.

This is NOT you casually talking about topics. 

You should be REPORTING EVIDENCE and EXAMPLES from what you read.

  1. Identify the topic for this week. The title of this discussion board thread lists topics 
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Asymmetric cryptography – Component of cryptography

In the final discussion posting please describe what components of cryptography impacted you the most.

I would prefer about asymmetric cryptography and the math underlying it.  Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 30-35  lines should be good enough.

current and emerging technologies

 Write a scholarly research report on a topic related to Software Engineering  on below topics

 i) Cloud Computing (Intranet, Extranet, and Internet)

ii) Machine Learning

iii) Artificial Intelligence

iv) Internet of Things (IoT)

v) Robotics

vi) Medical Technology

vii) Artificial Intelligence

viii) Business Intelligence

ix) Brain Linked Virtual Reality

x) Nanotechnology 

  

· The research paper must be at least 2,500 words supported by evidence (citations from peer-reviewed sources). 

· A minimum of four (4) peer-reviewed journal citations are required. 

· Formatting should be double-spaced, one-inch boarders, no extra space for headings, no extra white space, no more than two levels of heading, page numbers, front and back matter).

· Extra white space use to enhance page count will negatively affect student grade. 

 

The final submission should include DETAILS of each of following: 

1) Chapter 1 – Introduction

2) Chapter 2 – Literature Review

3) Chapter 3 – Methodology Specifics (comparative analysis)

4) Chapter 4 – Findings and Results

5) Chapter 5 – Conclusion and Future Recommendations

6) References – APA

7) Appendices 

User Training

 

What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.

Assignment should follow all APA rules and include a min. of (1) citation/reference and should be between 2-4 pages long.

CLoud_Computing_Research_paper

 Heartland Payment Systems 

Perform a search in Google or in the school’s online library database for four or five companies that have been victims of cloud-related security breaches AND/OR cloud providers that have been victims of security breaches.

Required:

Minimum 2500 words— (not including Title page, Abstract, TOC, and Reference page). Each group participant is required to write at least 800 words and to label which section below written about.

Include:

I. Company Name- Heartland Payment Systems—type of company—brief history—Industry—Customers (consumer, business, or both)

II. Type of threat

III. What or (who) caused the threat

IV. How the threat was discovered

V. How the threat was resolved

VI. Explain what and how you would have implemented to have prevented the intrusion. Use third person: eg. One may argue; It may be concluded. – THIS IS MY QUESTION TO WORK ON. PLEASE START WRITING ON THIS QUESTION.

VII. Known repercussions from the threat (monetary, reputation, brand, customer loss, etc).

Include:

· Body

· Conclusion

· Reference page

· Minimum 3 references—DO NOT USE Wikipedia!

· USE APA 7.All in-text citations must be represented on the Reference page

· All papers will be checked for plagiarism in SafeAssign—ONLY SafeAssign at or below 20% will be accepted