CSCI 4041 Algorithms and Data Structures - Spring 2025 Homework 1 - Asymptotic Runtime Due Date: Friday, February 7, 2025 by 11:59pm. Problem H1.1: Theory - Answer the following questions. You should prove these formally using definitions and theorems (e.g. Definitition of Big-O, Big-Ω, Big-Θ, Asymptotic Limit Theorem, etc...). (a) Prove: ∀a ∈ R, a > 1, loga n = Θ(lg n) (*Practice Problem*) (b) Prove: f = Θ(g) if and only if f = O(g) and f = Ω(g). (*Practice Problem*) (c) Let f(n) = 2n 2 + 7n − 1. Show that f = O(n 3 ). (*Practice Problem*) (d) Prove: + 7n + 3 = Θ(g(n)), for some function g(n). Problem H1.2: Runtime - Give Θ(f(n)) complexity for the following examples. Justify your answers. All lines should be assumed to take constant time including functions like print(...), 3√x, log(...), etc...). (a) i = 1 ( count : 1 = Θ(1)) while i >> A = [1.5 , 2.5 , 3 , 1.1 , 7] >>> print ( closest_pairs (A ,3)) # Output : [[1.5 , 1.1] , [2.5 , 3] , [2.5 , 1.5]] • Example 2 >>> A = [1 , 2 , 3 , 4] >>> print ( closest_pairs (A ,2)) # Possible Output : [[1 , 2] , [3 , 2]] # Possible Output : [[3 , 4] , [1 , 2]] # Possible Output : [[2 , 3] , [4 , 3]] # Many other permutations are valid ... (*Practice Problem*) Analyze the runtime of your algorithm. How might you change your algorithm if you only needed to find the closest pair? (i.e. the k=1 case) Can your new k=1 case be more efficient than the original algorithm?
Practice Quiz #2 Each question is worth 1 point (1) Other things equal, a call option’s value increases as the strike price increases. True False (2) Consider a long forward position and a long European call option position on the same underlying asset with same settlement/maturity and same forward price/strike price. The long forward position will give a higher profit for low values of the underlying asset price. True False (3) The cash flow from a put option (weakly) increases as the price of the underlying asset decreases. True False (4) You buy a European call option with strike $80. On the expiration date the price of the underlying stock is $75. What is your cash flow at expiration? (You will have to input the answer into a box on Canvas) (5) You sell (short) a European put option with strike $80. On the expiration date the price of the underlying stock is $60. What is your cash flow at expiration? (You will have to input the answer into a box on Canvas) (6) You buy a European call option with strike K1 and short a European call option with strike K2 > K1 on the same underlying asset with the same expiration at T. When you set up the position at t, do you receive a cash inflow or a cash outflow? (a) A cash inflow (b) A cash outflow (7) You buy a European put option with strike K1 and short a European put option with strike K2 > K1 on the same underlying asset with the same expiration at T. If ST > K2, do you make an overall pro t? (a) Yes, you make a pro t (b) No, you make a loss (8) Using calls and puts and by borrowing or lending at the risk-free rate, how can you create a synthetic long position in a stock so that you pay St today and get a cash ow of ST at time T? Assume markets do not allow any arbitrage. (a) Buy a call on the stock with strike K which expires at T, short a put on the stock with strike K which expires at T, and lend K. (b) Buy a call on the stock with strike K which expires at T, short a put on the stock with strike K which expires at T, and borrow K. (c) Short a call on the stock with strike K which expires at T, buy a put on the stock with strike K which expires at T, and borrow K. (d) Short a call on the stock with strike K which expires at T, buy a put on the stock with strike K which expires at T, and lend K.
FIN 539 Investment Analysis Spring 2025 Final Team Project Guidelines: ETF-based Super Portfolio 1. Project Objective: The final project requires students to collaborate in teams of 2-3 to create and backtest a “superb” portfolio that consists of a minimum of five ETFs and is expected to outperform. the Nasdaq Index (ETF: QQQ) in terms of Sharpe ratio in the long run. Your backtesting period is 2015-2024. The selected ETFs in your portfolio should not include QQQ or any other similar ETFs that track the Nasdaq index. Backtesting only tells you about the past, which may not be the same as the future. So rationale and thought process are more important than the backtest results. ● Team formation: 4/14 (Mon) to determine your team ● Project preparation: 4/14 – 4/27 ● Team idea presentation: 4/28 (Mon) in class to present your ideas and plans ● Team written report submission: 5/17 (Sat) midnight. 2. Deliverables: Including three parts: ● Part I (Slide deck): Upload your Google slide deck titled “YourTeamNumber + Portfolio Name” to the designated Google drive under module “Week 14 Team Project Idea Presentation.” o Deadline for submission: 4/28 (Monday) 6:00 pm ● Part II (Presentation): Deliver a 5-min presentation with 2-min Q&A to share your idea for feedback from the instructor and peers. o Presentation day (In-person): 4/28 (Monday) 6:30 pm – 9:20 pm ● Part III (Written report): Upload your Word report (3 pages or less excluding the cover page) titled “YourTeamNumber + Portfolio Name” to the submission link under module “Final Team Project Submission.” o Deadline for submission: 5/17 (Sat) midnight o Submission will be scanned by Turnitin, a plagiarism detection software. o Only the team leader (one student) submits the report with all team member names on the cover page. 3. Required Elements in Slides and Presentation (a) Cover Page: Team ID, Portfolio Name, Team Member Names, and Executive Summary ● Name your portfolio to be intuitive, descriptive, unique, and attractive ● Include your team ID and all team members’ names to receive course credit. (b) Your Research and Strategy Ideas ● Share various research and strategy ideas you have gathered and attempt to experiment in your data analysis. Present your strategy ideas in a way that is easy for anyone to understand and follow. You may consider multiple ideas as some of them may not produce good performance in your backtesting. Focus on the rationale and thought process that account for not just the past but also mega trends that are likely to impact the future. 4. Required Elements in Written Report (c) Cover Page: Team ID, Portfolio Name, Team Member Names, and Executive Summary ● Name your portfolio to be intuitive, descriptive, unique, and attractive ● Include your team ID and all team members’ names to receive course credit. ● Provide a 100-word executive summary, which is a concise overview that encapsulates the main points of your strategy and portfolio performance. (d) Your Strategy and Portfolio Performance ● Investment strategy: detail the motivation and methods of portfolio construction. Present your strategy in a way that is easy for anyone to understand and follow. ● Investment performance: present the backtesting results, including tables or graphs to show portfolio performance over time, the summary statistics and Sharpe ratio of the portfolio during the sample period, in comparison to the Nasdaq ETF (QQQ). (e) Risk management Discuss why you expect the portfolio to continue performing well and what are the risk factors that might impact the portfolio performance in the next 1-5 years. (f) Summary Summarize your strategy, portfolio performance, and risk management in less than 150 words. 5. Grading (Max: 20 points) ● Weighting o Slides (5 pts) ▪ Submit your slides by the deadline (3 pts). ▪ Quality of the slides (up to 2 pts) o Presentation (5 pts) ▪ Deliver the presentation (3 pts). ▪ Quality of the presentation (up to 2 pts) o Written report (10 pts) ▪ Instructor assigned grades based on the project quality based on the following elements ✔ Having the required elements (2 pts) ✔ The rationale of your strategy (2 pts) ✔ The quality of research and analysis (2 pts) ✔ The depth of discussion (2 pts) ✔ The overall quality of the report (2 pts) ● Project grades typically represent the following categories: o 9.5 – 10 (Outstanding); 9.0 – 9.4 (Excellent); 8.5 – 8.9 (Good); 8.0 – 8.4 (Pass)
Renewable Energy Technology Design and Appraisal (ABEE4090) Assignment 2: Design/sizing and Assessment of Renewable Energy Systems Introduction This Assignment involves design exercise of three renewable energy systems (a small-scale building integrated wind turbine, a photovoltaic system, and a solar thermal system) for electricity and hot water supply for a typical Care Home for up to 20 residences, at your own choice of location, as follows. 1. The first part includes theoretical analysis involving analytical calculations to assess the Care Home energy requirement, update solar radiation data of the energy resources assessment (Part 1 of the ABEE4090 assignment, given on 14th Feb 2025) and design sizing of three renewable energy systems to meet the required building loads as outlined below. 2. A computer modelling exercise to assess the design completed in section 1, above, and predict the annual energy generation of the renewable energy systems, using a suitable computer simulation program (RETScreen, PVsyst or any appropriate computer model) 3. Carry out a cost appraisal of the system designed in section 1 above, to find out the financial and environmental feasibility. The aims ofthe Course work The project will provide: An opportunity to gain knowledge and develop professional skills on weather data analysis, building load assessment, and exercise design sizing of renewable energy systems to meet the required building energy loads at a given climate location. Project Brief: ABEE4090 Main Assignment Design sizing of three renewable energy systems You are asked to carry out a design study of three renewable energy supply systems based on a solar PV system, a small-scale building integrated-wind turbine for electricity generation, and a solar thermal water heating system for hot water supply for a typical care home at your home village or town. The average number of residences in the care home may be taken as 20 people. The building roof space may be assumed for a building plan to accommodate 20 self-contained rooms, living/seating area, a kitchen, dining area, reception/offices, and visitors, space (See Annex 3). The roof of the building may be considered as flat or tilted roof as appropriate, based on the climate. Task 1.1 Part 1 - Solar radiation data calculations (already completed) You are required to update and use the weather data obtained in ABEE4090 Assignment Part 1 of the coursework for use in the design exercise (BEE4090 Main Assignment). You are also required to provide details of site specifications including solar radiation (from Part 1 CW), ambient air temperature, and wind speed data, along with simple diagrams illustrating the proposed building roof (orientation & tilt) space allocated for the PV and the thermal solar arrays and the surrounding scene for the wind turbine installation accompanied by analysed wind speed data and direction (Wind rose) if available. Task 1.2 Hot water system Under the Health Technical Memorandum, the minimum hot water temperature in the storage for care homes should be between 55 °C, however at the point of use the water should be thermostat controlled using mixed taps to ensure water temperature between 38 and 41 °C for winter and summer respectively, due to the vulnerability of the users. The hot water use for summer and winter may vary between 40 to 50 litres, respectively, for washing and showering, per patient, including the support person,s need, at tap temperature. For other climates, you may adjust these values to suit your climate hot water requirements. For the heating and cooling purposes, you may use any other software to estimate the building heating or cooling load. The main water supply temperature for the water heating part could be assumed constant at 18。C in summer and 8oC in winter. Again, in the case of hot and moderate climates, you may choose a temperature range that suits your location. Typical ambient temperature for summer and winter conditions for cold climates are given in Annex 1, however, you may use any other appropriate data, if necessary, based on your location. These could be downloaded using any appropriate sources and should be properly referenced. You may use a suitable solar collector type for your design suite, but if you would prefer, you may use any suitable solar collector with specifications given in this link: https://www.spftesting.info/data/1.kollektoren/?l=en. 1.2.1 Use an appropriate method to determine the total solar array area required to meet the care home hot water requirement. You may optimise your design either on summer or winter load basis and weather conditions, but you are required to explain how to meet any shortage or how to use the surplus energy as a result of your proposed design requirements. 1.2.2 Size a suitable hot water storage tank and propose a suitable configuration for the solar thermal system; detailing the necessary components required to ensure adequate hot water supply, at a temperature range required by the Health Technical Memorandum. For space heating cooling, these may be determined by the heating and cooling comfort zone of the location. 1.2.3 Calculate the hourly and the total daily energy delivered by the system and the hot water tank temperature profile for winter and summer months of the year (one day for each month), using the daily values of the mid of the month as average values for each month. Task 1.3 Electrical energy systems: For simplicity, you may assume that the daily average electrical loads ofthe care home for the 6 months of October, November, December, January, February, and March are the same. Similarly, you assume that the building electricity load for the other 6 months of the year (April, May, June, July August, and September) are the same. Assuming that the system is grid connected, you are required to estimate the care home building electricity load profile based on the appliances and the daily operating hours under your chosen location. Consider appropriate appliances for your own location. Example may include, but not limited to space lighting, cooling fans, kettles, washing machine, dish washer, televisions, microwave, fridges, mobile chargers, emergency lights, exits lighting, alarms systems. Tasks to perform. include: 1.3.1 Use an appropriate method to determine the total PV array area required to meet the required proportion of the building electrical load. Again, you may base your design either on summer or winter load conditions, but you are required to explain how to meet any shortage or how to use the surplus energy as a result of your proposed PV size. 1.3.2 Select a suitable inverter and any other necessary components for the PV system and propose a suitable configuration for the PV system; detailing specifications of all the components considered for the PV system. 1.3.3 Calculate the hourly and the total daily energy delivered by the system to the load, and the grid import/export profile for the winter and the summer months (one day for each month) of the year, using the daily values of the mid of the month as average values for each month of the year. You may use the characteristics of the PV module given in Annex 2, but you may also choose a suitable commercial PV module for your system, based on the climate. Task 1.4 Wind turbine sizing For the wind turbine sizing - assume that the variation of the coefficient of performance (CP) of the wind turbine with the wind speed is given by the equation: CP = 0. 055U - 0.0032U2 Where Uis the wind speed in m/sec. Assume an appropriate overall efficiency for the generator, i.e., the transmission system and the electronic systems including the AC/DC inverter. You may also use a different value for the coefficient of performance of the wind turbine, based on the wind turbine type that you may choose, if available. 1.4.1 You should use Bins or any other appropriate method to arrange the data in a suitable format that will enable you to calculate the annual wind energy production. An excel spreadsheet which will guide you arranging your wind data, for the calculations of the wind energy generation is also available on the Moodle. Wind speed data for a period of one year are given in an excel file which can be downloaded from the Moodle. 1.4.2 Size a suitable wind turbine that may meet part of the electrical energy load following the design of the PV system. Use the wind data analysed in section 1.4.1 to calculate the wind turbine energy production. This should enable you to adjust the size of the wind turbine in relation to the PV system to deliver the required electrical energy for the Care Home at an appropriate cost. What to calculate for the electrical energy systems? Determine the PV array area, and wind turbine rotor diameter that would enable the Care Home to provide at least 50% of the annual electricity load from the renewable energy systems. Use a suitable combination of PV array and wind turbine which ensures that at least 60% of the renewable energy is provided using the PV system, and the rest by the wind turbine. Use the PV system and wind turbine specifications obtained above, to estimate the daily electrical energy output profile for mid-winter and mid-summer months of the year (using mid- month day values as average for each month), annual energy supplied and also the electricity imported or exported to the grid under these conditions. For the wind turbine generation, assume that the data given starts from 1st January of the year. Although cost may not be the criteria of your design sizing, for the purpose of cost analysis use the current commercial PV and wind turbine costs. Perform a sensitivity analysis of the relative capacity of the PV and the wind turbine that you may propose for the project. Complete the cost analysis and calculate the unit energy cost of the proposed renewable energy systems and compare this with the current energy supply cost for your chosen location. You may perform. a simple life cycle cost analysis to determine the energy cost and the possible payback periods ofthe renewable energy systems. C) Design simulation tools analysis Use a suitable computer design tool (e.g., RETScreen, PVsyst, PVGIS or any other relevant program) depending on the system, to analyse and predict the power of the systems designed above. Estimate the annual energy production of each system designed above using the computer design tool and compare these with the values obtained using the analytical calculations. Discuss and reflect on any discrepancies in the results. For the design tool, generate the data using the facilities provided by the design tools program. If necessary, use data from the nearest meteorological station, or download these from any other appropriate software, e.g., NASA website, PVGIS, Meteonorm, WRDC etc. Final Report You should write up a report that comprises the above tasks, and should be around 4000 words plus any figures, tables, and appendices. You should present the key results inside the text body, and any further complementary data tables should be presented in the appendix. Your report should be submitted electronically to Moodle no later than 3:00 PM on the submission date. This should include the design exercise report and the Excel spreadsheets used for design calculations. Report Structure: The design exercise report should be about 4000 words (excluding table of contents, tables and figures captions, references, and appendices), and should have an appropriate and correct structure, which should include: Cover Page with Student Name and ID Title page which should include the Course Work Title, Student name and ID Abstract -Summarising the work carried out Contents Page including the Figure and Table list. Introduction to the Assignment Aims and objectives ofthe Assignment. Methods and strategies used to achieve the study outcomes. Details of all the tasks completed in the Assignment, with sample calculations Results and discussions Summary specifications ofthe proposed systems. Conclusions summarising the proposed energy system and your own reflections on the design. References Appendix (if any) Plagiarism You are reminded of the need to reference your work appropriately and urged to read the guidance on plagiarism and its avoidance available in the Faculty Postgraduate Student Handbook. Assessment This is an individual assignment and therefore should be of your own work. Other people’s work should be clearly appreciated and appropriately referenced. The report will be assessed according to the following criteria: • Quality of the work in terms of achieving the objectives ofthe assignment. • Evidence of effort made to complete the work, including data search, assumptions made and justifications, calculations, and sample calculations. • Critical thinking, discussion, and reflection on the information presented and their relation to the assignment. • Clarity and justifications ofthe arguments presented. • Showing awareness and understanding of scientific facts relevant to the module and the assignment. • Completion of the tasks assigned in this work. • Ability to structure and present the work carried out professionally. • Appropriate referencing of materials from other people’s works.
QBUS5001 Foundation in Data Analytics for Business (2025, S1) Group Assignment Due date: 11:59pm, Saturday, 24 May 2025 · This group assignment must be completed by a group of 3-4 students, with one designated group leader. · The total marks available for this assignment is 60. · This assignment consists of 2 tasks, and will be graded based on the accuracy of the results and interpretation, as well as the quality of the report. · Page limit is 20, including any tables, graphs, and appendices. References are not required. Task 1 (Random Number Generation from the Exponential Distribution and Verification of the Central Limit Theorem): 15% The PDF and CDF of the exponential Exp(λ) distribution are given by and respectively. We aim to simulate a random sample from the exponential distribution with parameter λ, but this cannot be done directly using the Excel’s Analysis ToolPak. However, the following theorem provides a solution: Theorem: For any continuous distribution, the CDF is a random variable that follows a uniform. U(0,1) distribution. That is, if Y = F(X), then Y ~ U(0,1) Therefore, by simulating a value y* from the uniform. U(0,1) distribution and setting F(x*) = y*, we can generate a random value x* from this continuous distribution For the exponential Exp(λ) distribution, we can solve the equation to obtain In Excel, the Analysis ToolPak can use used to simulate a random sample from the uniform. distribution. Task instructions: 1. Simulate a random sample of size 100 from the exponential Exp(0.2) distribution. 2. Calculate the sample mean for this sample. 3. Repeat the simulation independently 1,000 times in total. 4. Verify the CLT by showing that the sample mean of the exponential distribution can be approximately by a normal distribution. Warning: Excel can be slow in generating random numbers. You have several options to handle this: 1. To avoid generating extremely small or large values, I recommend using the Uniform. U(0.01,0.99) distribution for the simulation. 2. Use other statistical software to generate the data and import them into Excel. 3. Simulate the values in multiple batches in Excel. 4. Use the “rand()” function in Excel to simulate a random value from the U(0,1) distribution is not recommended for this assignment. Task 2 (Waiting Time and Idle Time): 45% A small local bank opens for business from 9am to 4pm, with only one staff available to serve customers upon their arrival. Suppose that customers arrive after the bank opens, and their arrival time in minutes follows a “truncated” exponential Exp(λ1 = 0.1) distribution. They will be served immediately if the staff is idle, or they will join a queue and wait to be served if the staff is busy. Suppose that the service time in minutes follows another “truncated” exponential Exp(λ2 = 0.125) distribution, and it is independent of the arrival time. All customers who arrive before 4pm will be served. To generate a random value x* from a truncated exponential distribution, we simulate y* from a uniform. U(a, b) distribution and then set In this task, set a = 0.25 and b = 0.75. The data for statistical analysis include (1) customer waiting times and (2) staff idle times. These should be recorded over a period of 5 working days. Task 2A: Simulate the customer arrival times and their service times (between 9am and 4pm) for a full week, covering 5 business days. The simulation for Day 1 (Monday) is already completed in the sample Excel file. Record the customer waiting times and staff idle times for analysis. Task 2B: Present the customer waiting times and staff idle times using histograms and descriptive statistics. Describe the distributions of these times. Task 2C: Construct a 95% confidence interval for the mean customer waiting time. Test, at the 5% level of significance, whether the mean waiting time is longer than a specific value (in minutes) of your choice. Task 2D: Construct a 95% confidence interval for the mean staff idle time. Test, at the 5% level of significance, whether the mean idle time is shorter than a specified value (in minutes) of your choice. Task 2E: Test, at the 5% level of significance, whether the mean customer waiting time and the mean staff idle time are equal. Note: Zero values for both waiting time and idle time are excluded before conducting the statistical analysis. Additional information (i) Excel file: A sample Excel file is provided for reference. For Task 2, the simulation for Day 1 has already been completed. (ii) Data generation: For Task 2, it is recommended that each group member simulate the arrival and service times for at least one business day and then calculate the corresponding waiting and idle times for analysis. (iii) Task 2A: You may submit a screenshot of the simulation for Day 2, showing the first 20 rows of your Excel file. (iv) Communication: Present the required information and conclusions using technical terms, but also in layman’s language where appropriate. This ensures the content is understandable for prospective decision-makers or managers. (v) Submission: Submit your report as a PDF file, named as “QBUS5001-Group_xxx.pdf” (vi) Excel Spreadsheet: Submit a well-organised Excel spreadsheet that can be used to confirm your calculations. (vii) Grading: The mark for your report will reflect both the quality of your work and its relative performance compared to other reports. (viii) Possible Grades and Marks: HD 85 – 100 Exceptional (20% expected) D 75 – 84 Very good (30% expected) Expected average mark: 75 C 65 – 74 Good (40% expected) P 50 – 64 Satisfactory (10% expected) F 50 – Unsatisfactory (0% expected) Marking Criteria for Task 1 You will be assessed on your ability to: (i) Correctly simulate random samples from the exponential distribution. (ii) Present the sampling distribution of the sample mean and provide key summary statistics. (iii) Compare the theoretical and empirical values of the mean and standard error of the sample mean. (iv) Conduct an appropriate statistical test on the sample mean values. (v) Correctly use hypothesis testing procedures and draw valid conclusions based on a reasonable level of significance. (vi) Provide clear and detailed descriptions and explanations of your results. (vii) Include relevant and high-quality Excel output in the report to support your findings. Marking Criteria for Task 2 You will be assessed on your ability to: (i) Correctly simulate arrival times and service times from exponential distributions. (ii) Accurately collect staff idle times and customer waiting times for each business day and combine them for analysis. (iii) Apply appropriate descriptive methods to analyse arrival times, service times, idle times, and waiting times. (iv) Conduct appropriate statistical tests, use correct hypothesis testing procedures, and draw valid conclusions based on a reasonable level of significance. (v) Use and correctly interpret inferential statistics. (vi) State the required statistical assumptions and, where relevant, discuss the limitations of your analysis. (vii) Present your results clearly, including relevant graphs and tables, in an appropriate format. (viii) Include relevant and high-quality Excel output in the report to support your findings.
MEDIA 222 Assignment 3 - Comic and panel treatment What you will be handing in This final piece of assessment requires you to produce your own comic. You can use the traditional method of image and text on paper or you can produce a digital comic using an application like Procreate. You are NOT to use AI. AI effectively steals original artwork from unpaid and unrecognised artists in order to model something of its "own". The aim, much like the comic review, is to see how you can use your knowledge of the comics medium and relevant theoretical frameworks to produce a short visual narrative of your own. The comic can be a complete story or a scene (or scenes) from a longer story. In order to prevent those with artistic or graphic design skills from having an advantage, marks will be primarily awarded for the accompanying treatment, although consideration will be given to the qualities and efforts displayed in the production of the actual comic. The treatment will have two components: a short ‘synopsis’ setting out the story and whether or not the story is excerpted or complete, followed by a ‘page and panel commentary’, offering an account of the creative decisions you have made and why (this will be the main part of the treatment). It is required that you provide scholarly support for those decisions in the form. of references to and quotations from the academic material we have read during the course. Length: 4-6 pages (comic), 1500 words (treatment), but there is a 10% leeway. References are included in the word count. Use whichever referencing system you prefer, but use it correctly. Percentage of total mark for the course: 50% Deadline for submission of comic and treatment via Canvas: midnight, 13th June 2025 (submit treatment and scan of comic as one PDF) A sample from a previous year can be found here (https://canvas.auckland.ac.nz/courses/121262/files/14530547?wrap=1) (https://canvas.auckland.ac.nz/courses/121262/files/14530547/download?download_frd=1) . Treatment guide You should think of the treatment as a critical essay on your own work. It is intended to be a critical reflection on the decisions you made in order to realise the story (or excerpt of the story) you are presenting. I want to see that you understand the language and techniques of the comics medium and can put them to good use. This is where marks will be awarded. The treatment should be a critical commentary on the significant aspects of your comic that you wish to discuss. Imagine you are writing a review of how the visual narrative is constructed in a comic, only in this instance it is yours! You should be using a lot of the language we looked at in lectures 3-5, so refer to the lecture slides again and the readings for those weeks, if you need to. I am expecting you to provide short academic quotations that help support or explain your decisions, so the treatment should include a bibliography (included in the word count). You can also refer to other comics where you have seen the technique used and explain why you thought the example was successful. You may add examples as an appendix, if you wish. You are not required to add such an appendix. It's just an option. The treatment should begin with a brief account of the comic. Outline the story and say whether the comic is an excerpt from a longer story. If it is, please explain why you chose to focus on this section of the comic for the assignment. You should then proceed page-by-page explaining what you have done. This is not an exhaustive list. I do not expect you to comment on every technique used or include something from every page, but the elements you might speak about could include: - page layout - number, shape, size and location of panels - panel frames - size, shape, use (or not) of the gutter - use of colour (or not) - use of text; use of text as image - use of speech/though balloons or captions (their position and form) - issues around sequence of narrative - decisions about the double page (possible need to reveal something on the page turn There may be other stuff you wish to talk about, so don’t worry if it’s not on this list. These are only suggestions. If you comment on the number of panels on page 1 and the number is the same on page 2 you are not expected to repeat your decisions. Use the next page of your comic to speak about something else. It is perfectly OK for you to write more about a page in which you use a lot of techniques to express a specific part of the story. We are not expecting an equal amount of writing devoted to each page. You can present it in any way you like. Organise it according to page number, give a little more detail about what is taking place on the page and then explain the technique(s) you have used to express this. For example: Page 1. Person walking to work, starts to day dream. I have used a regular panel structure of 9 panels to suggest the normality and regularity of the day, but as the daydream starts I have changed the border of the panel frame. to a squiggly line to suggest the events are taking place inside the person’s head. As argued by … . this is an important technique. I have also placed an important event in panel 9. As … argues this is a privileged panel on the page and I will also use the ‘rhyming function’ (Groensteen, page) to repeat the element later on page … This is just a guide as to the sort of thing I am expecting, but you can adapt to suit your comic.
Problem Set #3 - ECN 121A, Spring Quarter 2025 Due: May 13, at 11:59pm. Problem sets are to be turned in through Gradescope Note: In order to receive credit, you must show your work. 1. Suppose there are two identical firms in a market. The market demand is given by: Q = 50 − 0.5p Suppose the marginal cost of each firm is $10 per unit and the firms are competing in a Cournot- type setting (set quantities simultaneously). a. Graph the reaction functions of both firms on the same graph. b. What price is the product going to be sold for? What is the equilibrium output and profits for each firm? c. How much would the profits of each firm decrease ifa third firm was added to the industry and they competed in a Cournot-type setting? You may use the following formula whenever there are three or more firms: d. Suppose we are back to two firms in the industry. What would the profits of firm 1 be ifit were to produce one more unit than what you found in part ‘b’ (with firm 2 still producing the same amount you found in part ‘b’)? Why do the profits of firm 1 decrease if it is capturing a larger share of the market? In other words, should there not be a positive relationship between the quantity produced and profits? Briefly explain. 2. We went over a question in class where there were two firms competing in a Cournot-type setting, and the marginal cost of each firm was 20. The market inverse demand curve was: P(Q) = 120 - 20Q The reaction functions of the firms were: q1 = 2.5 − 0.5q2 and q2 = 2.5 − 0.5q1 Suppose the marginal cost of firm 2 increases. What needs to be the new reaction function of firm 2 for it to produce 0 units in equilibrium? Show your work both graphically and numerically. (Hint: Find where the reaction functions need to intersect for q2 to equal 0.) 3. Suppose the inverse demand of a product produced by two firms is given by: P(Q) = 100 - Q The marginal cost of producing the product is 20 and there are no fixed costs. The two firms compete simultaneously with prices (Bertrand model). If the products are identical, what are the prices that each firm will charge? Briefly explain. 4. Suppose there are two firms selling protein bars. Firm one sells ‘AggieBars’ with 10 grams of protein and firm 2 sells ‘DavisBars ’ with 20 grams of protein. Consumers are distributed uniformly over their preferences for grams of protein between 10 and 20. Suppose firm 1 sells AggieBars for $2 and firm 2 sells DavisBars for $3 The ‘cost’ to consumers of deviating from their optimal amount of protein is $0.20 per gram. a. What protein content does the marginal consumer (consumer who is indifferent between AggieBars and DavisBars) prefer? The equation for finding the marginal consumer (when the range of product attribute values is 10) is: V - p1 - txm = V - p2 - t(10 - xm ) b. How would the proportion of consumers buying each product change if the cost to deviation from one’s optimal amount of protein increased (was greater than $0.20 per gram)? 5. Suppose there are two firms in a Cournot type setting (choosing quantity simultaneously). How would an increase in the marginal cost of firm 1 change the equilibrium output of firm 1 and firm 2? Depict your answer graphically with reaction functions and show all of your work.
csec5615 Assignment 2 (100 marks) s1 2025 Problem 1.(15 marks) A cloud provider wants to store a cryptographic secret S securely across n cloud servers using Shamir’s Secret Sharing (SSS). However, each setup has a different risk model affecting the required threshold. For each scenario: 1. Determine the threshold t that ensures security. (1 mark) 2. Find the polynomial’s degree. (1 mark) 3. Choose a polynomial f(x) of the required degree, to share the secret. (1 mark) 4. Compute and distribute shares for x = 1, 2, 3, . . . , n. (2 marks) Scenario 1: A small cloud network with n = 5 servers. 1. The system is secure as long as at most one server is compromised. 2. Secret: S = 10. Scenario 2: A large cloud storage provider with n = 7 servers. 1. The provider assumes that external attackers can corrupt at most 2 servers. 2. Additionally, an insider may compromise 1 additional server. 3. Secret: S = 20. Scenario 3: A blockchain-based cloud storage system with n = 6 servers. 1. The threat model assumes 2 external attackers. 2. Additionally, there is a risk of random crashes on 1 additional server. 3. Secret: S = 25. Problem 2. (5 marks) A financial institution integrates advanced Security-as-a-Service (SECaaS) offerings into its cloud-based infrastructure. Recommend suit-able solutions for the following scenarios: 1. Allow auditing teams to access historical transaction logs without risking data modification or compromise. 2. Provide automated recovery mechanisms to preserve financial data in-tegrity and operational continuity during disruptions. 3. Ensure employees can securely process transactions remotely, using multi-factor authentication. 4. Prevent unauthorized access to customer financial records, ensuring strict encryption and compartmentalized storage. 5. Detect unusual transaction patterns across cloud-based systems, providing real-time alerts to the security team. Provide a one-sentence justification for each recommendation. Problem 3. (10 marks) A company wants to secure its cloud-based web application against Man-in-the-Middle (MITM) attacks using TLS. However, users are reporting security warnings when accessing the site, and attackers are still able to intercept some data. After investigation, the security team finds the following issues: 1. Some users manually bypass certificate warnings in their browsers. 2. The application server accepts outdated encryption algorithms for compat-ibility reasons. 3. An internal system administrator disabled certificate validation on API re-quests for testing. 4. Some API endpoints are accessible without HTTPS, allowing attackers to intercept sensitive data. 5. The company uses self-signed certificates for internal services without proper distribution of trust anchors. (a) Explain how each of these issues could allow a MITM attack despite using TLS. (5 marks, 1 per issue) (b) For each issue, suggest a security measure that could mitigate the risk effectively. (5 marks, 1 per issue) Problem 4. (13 marks) Scenario 1: A streaming platform. offers age-restricted content. Users must prove to a cloud-based age verification system that they are at least 18 years old. 1. Do we need ZK? Where, and why or why not? (1 mark) 2. Irrespective of ZK, what is the soundness guarantee we need and why is it necessary? (1 mark) 3. What is the statement? (1 mark) 4. What is the witness? (1 mark) Scenario 2: A country implements an online cloud-based voting system where users cast private votes that is either a 0 or a 1, and the system must count votes and announce results. 1. If the users encrypt their votes, do they need to add a ZK proof to the vote? Why or why not? (2 marks) 2. Irrespective of ZK, what is the soundness guarantee we need and why is it necessary? (1 mark) 3. What is the statement? (1 mark) 4. What is the witness? (1 mark) Scenario 3: A company provides a cloud-based file storage system. Employees access files based on role-based permissions. The cloud verifies if a user has permission to access a file using a proof that the user gives. 1. Do we need ZK? Why or why not? (1 mark) 2. Irrespective of ZK, what is the soundness guarantee we need and why is it necessary? (1 mark) 3. What is the statement? (1 mark) 4. What is the witness? (1 mark) Problem 5. (15 marks) Scenario: A company stores employee salaries in a cloud database. The salaries stored in the form. (EmpID,sID), where EmpID is the employee ID and sID is the salary for that employee ID. Employee Alice wants to get a pay raise and wants to ask the cloud if her salary is above or below the mean salary of the employees. The company authorizes the cloud to give this service. The cloud must prove that: 1. It correctly computed the median salary from the dataset. 2. It correctly compared the employee’s salary to the mean without revealing any other information about the mean or other salaries. Available Tools: 1. Additively homomorphic encryption (HE) which the cloud can use to en-crypt the salaries and compute on. 2. Zero Knowledge Proofs for correct encryptions: This proof allows the prover to prove that a ciphertext encrypts the correct salary for an asso-ciated employee ID EmpID. That is, the proof proves in zero-knowledge that the ciphertext encrypts sID (the salary of EmpID) without leaking any information about sID. The proof is also sound in that the prover cannot cheat. 3. Zero Knowledge Proofs of correct Encrypted Comparisons: Used to prove that a value v that is given in plain is smaller or larger than the value en-crypted inside a ciphertext, without revealing any other information about the value encrypted. The proof is also sound in that the prover cannot cheat with the comparison. Questions: 1. Design a zero-knowledge proof interaction between Alice and the cloud, where in the end Alice is convinced if her salary is lower or above the mean value. Use the tools provided above and describe the protocol flow in detail. (4 marks) 2. Argue why the design satisfies zero-knowledge, i.e., privacy of others’ salaries is preserved against a malicious Alice. (4 marks) [Hint: Use the privacy properties of the tool one by one.] 3. Argue why the design does not let a malicious cloud cheat Alice into think-ing her salary is higher than the mean, in other words, argue why the design is sound. (4 marks) [Hint: Use the soundness properties of underlying tools used.] 4. In your design, can the cloud use false data for salaries of others? Why or why not? (3 marks) Problem 6. (15 marks) Scenario 1: A cloud-based file storage system uses role-based access control (RBAC) with the following roles: 1. Admin: Full access to upload, download, delete any documents. 2. Manager: Can upload and download documents, but only within their de-partment. 3. Employee: Can only download documents associated with their own user ID. Suppose Alice is an Admin, Bob is a Manager (Department A), and Carol is an Employee (Department A). 1. Can Carol (Employee) upload new documents to the cloud? (1 mark) 2. Can Bob (Manager) download a document uploaded by another Manager in a different department? (1 mark) 3. Can Alice (Admin) delete a document uploaded by any Employee or Man-ager? (1 mark) 4. Who can access (upload, download, delete) a file named ”Depart-mentA Report.pdf” uploaded by a Manager of Department A? (2 marks) Scenario 2: A cloud provider uses RBAC to control access to virtual compute instances: 1. CloudAdmin: Can create, modify, delete, and read all instances. 2. DevTeamMember: Can launch, stop, and restart instances, but cannot delete or modify configuration. 3. DataAnalyst: Can only read system logs and output data generated by instances. Suppose David is a DevTeamMember, Eva is a DataAnalyst, and Frank is a CloudAdmin. 1. Can David (DevTeamMember) launch a new compute instance? (1 mark) 2. Can Eva (DataAnalyst) modify a running instance’s CPU or memory con-figuration? (1 mark) 3. Can Frank (CloudAdmin) read logs generated by an instance running under David’s project? (1 mark) 4. If a DevTeamMember accidentally stops an instance, who can restart it? (2 marks) Scenario 3: A company uses an Identity and Access Management (IAM) sys-tem with RBAC. Users have roles like ”StandardUser” (basic access) and ”Iden-tityAdmin” (privileged to modify user accounts). Password resets are handled by users with the ”HelpdeskUser” role, who can reset passwords but not assign roles. Incident: Emma (StandardUser) forgets her password. Noah (HelpdeskUser) resets her password. After reset, Emma somehow gains ”IdentityAdmin” role and deletes another user account. 1. Was Emma supposed to have permission to delete another user? (1 mark) 2. Identify two possible RBAC misconfigurations that might have caused this issue. (1 mark) 3. Could Noah (HelpdeskUser) have intentionally escalated Emma’s privileges during password reset under correct RBAC rules? (1 mark) 4. After a password reset under proper RBAC enforcement, what should Emma have been able to do? (1 mark) 5. Suggest two best practices to prevent such incidents. (1 mark) Problem 7. (7 marks) TechNova is a cloud-based startup offering collabora-tive software development tools to global teams. The platform. manages access for employees, contractors, and automated systems across engineering, support, and sales departments. Access control is crucial for protecting intellectual prop-erty, customer data, and internal tools. Each situation below needs the most appropriate access control model: Discre-tionary Access Control (DAC), Mandatory Access Control (MAC), Role-Based Access Control (RBAC), or Attribute-Based Access Control (ABAC). For each scenario, choose the best access control model and give a short 1–2 sentence justification. 1. A project lead manually grants and revokes repository access to contribu-tors based on team membership. 2. Access to confidential design documents is restricted by classification labels such as “Internal,” “Confidential,” or “Top Secret,” regardless of employee preference. 3. Engineers are granted access to build tools and deployment systems based on their role in the DevOps team. 4. Contractors can access internal dashboards only if connecting through an enterprise VPN and during assigned hours. 5. Automated testing bots must have access to specific folders but cannot mod-ify source code or push changes. 6. Customer support staff should be able to view customer tickets but not modify billing records, based on their department and task. 7. A security engineer sets permissions on sensitive audit logs and retains full control over who can read or write them. Problem 8.(15 marks) A company stores encrypted user data across multiple cloud providers. To access their data, a user must prove that they hold a valid signing key (for authentication) and demonstrate possession of the cor-responding decryption key—all without revealing any sensitive information. A smart contract oversees the process: if the user’s proofs are valid and the cloud provider publishes the encrypted data on-chain, the smart contract releases the encrypted data (or a decryption token) to the user and compensates the provider, ensuring a fair exchange. Key Requirements: • Privacy: Sensitive data—including key material and authentication de-tails—must remain confidential at every step of the process. • Soundness: Only users who genuinely possess both the signing and de-cryption keys can successfully access their data. • Fairness: The provider receives compensation only when (a) the user ver-ifies their credentials correctly and (b) the provider has published the en-crypted data on-chain. Answer the following questions. 1. Which tools can enable a user to prove possession of both a valid signing key (for authentication) and the corresponding decryption key without re-vealing any sensitive information? Outline the details of these tools. (4 marks) 2. Describe a smart contract based exchange design that meets the require-ments for privacy, soundness, and fairness. Use the the above tools and describe the entire protocol in detail. (6 marks) 3. Discuss how the designed protocol prevents unauthorized data access, pro-tects sensitive key material, and guarantees that neither party can cheat the other. (5 marks) Problem 9. (5 marks) CloudSecure Inc. provides Encryption-as-a-Service (EaaS) for enterprises. As part of a security audit, they need advice on specific inci-dents involving key management. For each case (1 mark each): Identify the key management practice that applies. Give a short 1–2 sentence justification. Situations: 1. A private key used to sign certificates was stored in plain in a shared devel-oper folder. 2. Encryption keys used for protecting temporary customer data are never updated, even after months of operation. 3. After several administrative changes, no clear record exists showing which administrator accessed which encryption keys. 4. A highly sensitive encryption key is currently managed by a single admin-istrator, creating a single point of failure risk. 5. An employee who had access to production keys recently left the company, and the keys remain in use without any change.
Interactive Tactics Pitch (3/4 students) Assessment 2: Interactive Tactics Pitch Due Date: Assessment 2 Video pitch due 25/5/2023 by 11.59 pm (AEST) Assessment 2 Video Pitch Live Q&A: Week 12 in-class (AEST) Weighting: Total 30% Word Count: 5-7 minute pitch Learning Outcomes: 3,4 Marking Criteria: This assessment will measure your ability to: · Translate your understanding of interactive marketing into the identification of relevant interactive marketing tactics (not an entire campaign, just three tactics) that the industry partner might adopt · Provide a clear justification of why one of these tactics is the most likely to be successful for the industry partner · Apply your understanding of interactive marketing through the careful development of a lo-fi prototype/storyboard of one of the identified interactive marketing tactics · Develop a high quality, well-structured, professional and engaging pitch for the industry partner The Task: You are required to identify three relevant interactive marketing tactics (e.g. quiz, game, virtual reality etc) that would be a good opportunity for our industry partner to incorporate into their interactive marketing campaigns and develop one of them into a lo-fi prototype/storyboard. You have to provide a good argument for why that tactic is to be implemented (why you chose to develop that one into a lo-fi prototype) by explaining how each of the tactics will help obtain the company's objective through discussing which interactive engagement practices they belong to, the type of engagement that this element will achieve, and why a consumer would be motivated to engage with that tactic. Then you will develop the tactic that you deem would be the most successful in obtaining the objective (as evidenced by your assessment in terms of engagement type, practice, and motivation) into a lo-fi prototype/storyboard, including visuals, to help the industry partner understand how they would implement this tactic in a potential campaign and what value they would get out of implementing this tactic. Your pitch should: · Present the three identified tactics · Provide a clear reasoning for the choice for one interactive marketing tactic that you will develop by articulating 。What engagement practices category (e.g., talk about the brand) and engagement types (e.g., emotional) the different tactics belong to and how these relate to the objective 。 How those tactics will provide value to the marketer 。 How success is achieved (why will a consumer engage/how are they motivated) · Develop a lo-fi prototype/storyboard of one of the interactive elements that showcases 。At what point in the consumer journey the tactic is to be employed 。What the interaction would look like in detail Make good use of the additional resources provided in each week and the taxonomies, definitions, and templates you have created throughout the course. Use references (either verbally or in the visual design) for key factual information. Group peer evaluation form. NOTE Use the Appendix (extra file upload) to provide evidence of the activities and tools that you used to select and design your tactics for the pitch (such as your consumer journey template filled out for this campaign, the why- and how-ladder(s) you did, the definition you used, the interactive engagement practices taxonomy that you created, the sub objectives that you identified etc). In essence, this appendix will provide the evidence that your offered tactics are original and the result of the work you have done in the activities in class and through using the tools provided. The pitch is to be developed for the company executive team, and as such should be created at a suitable professional level, using terms, concepts, and visuals appropriate to them.
Design and Implementation of an Electronic Circuit ECE5882/6882, Report submission: Week 12, Monday, 4:30 pm Explanation: The goal of this project is to design, simulate and build an electronic circuit for ECE5882/6882. Suggested project examples are: 1- Analog sensing interface circuit for multiple channel reading 2- AM/FM radio design 3- Wireless power/energy transfer circuits 4- PLL circuit for an application 5- Mixer circuit design for an application 6- Radar RF circuit for movement and distance sensing 7- Analog/digital interface circuits 8- Power amplifiers 9- Electronics for power supply control 10- Electronics for sensing applications 11- Your project choice-please discuss with us. This can be a part of project you are already been involved, e.g. final year project General Requirements: • You should identify an application and derive specifications according to the application selected. • Your electronic circuit should work according to the specifications you derived and set to achieve. • The circuit parameters and frequencies should be selected according to the application selected. • Determine the transfer functions where necessary. • You can have a group with two or three members. You should clearly define each member’s contribution in the report. Individual mark will be given to group members. Circuit Requirements: • Your project should contain a minimum of 6 transistors and 2 op-amps. • Design the circuits for optimum performance and achieve stability. Explain and derive equations and parameters that you used to optimise your circuits. • Each individual circuit block should be optimised according to concepts provided in the lectures. • You should show simulation/experimental results both in time and frequency domain to justify that your individual circuit blocks are operating as expected. • Simulation part: Select non-ideal transistors and provide the spice model or detailed model of the transistors used. • If you need to use an IC chip for your project, however clearly mention the reason of using the chip. e.g. input signal generation or processing output signal etc. Design steps: 1- Analytic design (calculations, component values and system level specifications etc.) 2- Circuit-level simulation using LTspice or ADS. 3- Circuit implementation and prototyping on Vero board 4- Altium layout design (Bonus mark: if you fabricate a PCB for your design) Report: You report should not exceed 10 pages (including everything except for the title page). You should submit one report per group. Explain clearly how you derive the component values. Include design considerations and schematics of each individual block. A set of simulation and measurement results could include the following items: Time domain waveforms and frequency domain spectra Plots of gain versus frequency (AC Analysis) if important for your design Power consumption (measured and calculated) Transfer functions (output versus input voltages/currents) Signal quality and noise measurements. You should generate an input signal according to the input specifications defined for your application Other important results that show the performance of your electronics circuit overall Summarise important results in tables and figures. Explain important technical details of your design. Also, compare your circuit simulation/experimental results with those of analytical calculations. Groups: The project should be done in a group of two. Clearly define each member’s contribution in the report. Individual mark will be given to group members. Bonus Marks: You will receive additional 10 points (out of 100) if you fabricate PCB circuit and test it. If you like to fabricate your PCB, please let one of teaching demonstrators know. Grading: See the attached grading sheet at the end of this document. Submission: Submit your report using the submission link in Moodle before Week 12, May 26, Monday, 16:30 pm. Demonstrations: Demonstrations of projects will be in Week 12 during your lab sessions. Demonstration of the project is required for obtaining a project mark for this unit.
App Development Requirements Business Information Systems Analysis and Design (BISM7255) Semester 1 - 2025 Development Brief Brisbane’s Living Heritage Network (BLHN) Context Established in 2001, Brisbane’s Living Heritage Network (BLHN) was formed out of a Brisbane City Council initiative. The vision was to connect Brisbane’s small museums and heritage places within a larger network to support them by promoting and raising awareness of their valuable work. Today there are 90 member organisations in the network including museums, galleries, historic houses and gardens and historical societies. Each heritage site is listed in the Heritage Guide adds. The BLHN seeks to inspire residents and visitors to value, enjoy and share Brisbane’s rich heritage and unique stories. Client COMMUNICATIONS & PROGRAMMING MANAGER NEWSTEAD HOUSE 191a Breakfast Creek Road NEWSTEAD QLD 4006 www.newsteadhouse.com.au Development Project Development of a business application that presents Brisbane’s Living Heritage Network in the digital space. The focus is on transforming the Heritage Guide into a digital app. Requirements 1) Look at the website https://brisbanelivingheritage.org/ 2) Create a home page – start page with branches to Events and Heritage Sites 3) Page that provides information about Brisbane’s Living Heritage 4) Page that lists with Events and their details 5) Page that lists Heritage Sites and their details Example User Stories 'As a user, I want to search for an event, so that I can be informed about the ongoing events.' 'As a user, I want to sign up for an event, so that I can participate in an event.' 'As a user, I want to view an event, so that I can check the event options.' ‘As an admin, I want to delete an event, so that the expired event can be removed.' ‘As an admin, I want to update an existing event, so that the event information is up-to-date.' ‘As an admin, I want to be able to add an event, so that the user can view the event.' ‘As a user, I would like to see information relevant to the team, so that I can reenforce my trust on the app.' ‘As an admin, I would like to add new information about our company and our staff members, so that app users can view our information easier.' ‘As a user, I would like to view a heritage site map, so that use the map as a guide to the location.' ‘As an admin, I would like to upload the map ofa heritage site, so that it can be displayed to app users.' ‘As a user, I would like to search for a heritage site, so that I can find the site and visit there.' ‘As an admin, I would like to delete a heritage site, so that the unavailable sites can be removed.' ‘As an admin, I would like to edit the existing heritage site, so that the site information is up- to-date.' ‘As a admin, I would like to add a new heritage site, so that the users can view all the heritage sites.' ‘As a user, I would like to search for an event, so that I can get a list of events that are currently available.' ‘As an admin, I would like to delete an event, so that the non-valid events can be removed.' ‘As an admin, I would like to edit an existing event, so that the event information is up-to- date.' ‘As an admin, I would like to add an event, so that the users can view a list of events.'
Module code and Title DTS106TC: Introduction to Database School Title School of AI and Advanced Computing Assignment Title Assessment Task 002 (CW) ): Individual Coursework Submission Deadline May 21st ,2025 at 17:00 PM (GMT +8) Final Word Count NA By uploading my assignment onto Learning Mall Online, I formally declare that all of the above information is true to the best of my knowledge and belief. DTS106TC Introduction to Database Coursework- Assessment Task 002 Due: 17:00, June 3rd 2025 Weight: 40% Maximum Marks: 100 The course work will be assessed for the following learning outcomes (LO’s): A. Demonstrate a basic understanding of the design of databases. ( Bloom's Level: Understand (Comprehension)) B. Show a fundamental grounding in the operation and usage of database management systems including "hands-on" experience of a basic database management system. ( Bloom's Level: Apply) C. Demonstrate in-depth knowledge of the database language, SQL. ( Bloom's Level: Remember, Understand, Apply, Analyze, and Evaluate) Individual/Group: Individual Late policy: 5% of the total marks available for the assessment shall be deducted from the assessment mark for each working day after the submission date, up to a maximum of five working days. Risks: l Please read the coursework instructions and requirements carefully. Not following these instructions and requirements may result in loss of marks. l The formal procedure for submitting coursework at XJTLU is strictly followed. Submission link on Learning Mall will be provided in due course. The submission timestamp on Learning Mall will be used to check late submission. l Ensure that each question's answer is written in one place within the coursework. Do not split your response across different sections. Overview: In detail, Step 1 (Q1: ER Diagram) requires students to analyze the provided dataset, identifying data types and draw the ER diagram. Step 2 (Q2: Normalization) is undertaken to mitigate redundancy and dependency, thereby ensuring data integrity and enhancing database performance. Subsequently, Step 3 (Q3: Database Construction, Q4: Querying) illustrates the process of populating/exporting data of the Database Management System and executing manipulations on the Database Management System using SQL. Step 5 (Q5: Reflection Question) helps summarize the learning in class and how it helps understanding and solving different parts of coursework. Lastly, Step 6 (Q6: Reflection Question) helps understand the limitations of relational database. You will be required to write a brief report to answer the questions and note down your process, thoughts, and assumptions made as well as answers. There are the following 5 parts of this coursework 1. ER Diagram ( Marks 15) 2. Normalization ( Marks 15) 3. Database Construction and Data Import ( Marks 25) 4. SQL Queries and Relational Algebra ( Marks 25) 5. Reflection Question on Database Design ( Marks 10) 6. Reflection on Understanding the Limitations of Relational Database Design ( Marks 10) You are required to write a concise report addressing the questions, documenting your thought process, assumptions, and solutions. Ensure that your answers are clearly presented in one cohesive section. Marking Criteria This coursework will be graded out of 100 marks and contributes 40% of the overall credit for the module. There are 6 questions different marks available for every question. Marks will be awarded based on the level of correctness of each answer. For example, 100% for fully correct with required explanation/justification, partial marks based on the level of incorrectness or missing required details. For detail rubrics see at the end of the coursework. DATASET The dataset to be used for this assessment is random generated film database. The dataset contains four .csv files films, people, review, and roles. The dataset / files can be downloaded from LMO under the Assessment 002-Coursework. SETUP You can complete this coursework using PostgreSQL. Q1: ER Diagram (15 Marks) In t his part of t he coursework, you are required to analyze the relationships between the given files (through LMO) . Based on your analysis, draw the Entity-Relationship ( ER) Diagram that represents the relationships and constraints between the tables. 1. Use standard symbols to draw the ER diagram. Identify the entities, their attributes, and describe the relationships between them, including the cardinality (e.g., one-to-many, many- to-many). Additionally, provide a clear explanation of t he ER diagram to ensure better understanding. 2. Explain any constraints (e.g., Weak entity constraints, Attribute constraints, Key constraints etc). Note: Make sure your ER diagram is clear, properly labeled, and shows all the relationships between entities. Explain any assumptions you make . The diagram should provide a comprehensive view of how the tables are interconnected and help understand the structure of the database. Also give a brief explanation of t he ER diagram. You are also required to write and note down your process, thoughts, and assumptions made (if any). See the detail rubrics at the end of the coursework. Q2: Normalization (15 Marks) Given the tables in the film database, evaluate whether they are in a normalized form. If they are not, convert them into Third Normal Form (3NF). 1. Evaluate the Current Structure: Analyze the given table structure and determine if any table violates 1 NF, 2 NF, or 3 NF. If any violations are found, decompose the table into smaller tables that are free from redundancy and dependency issues. 2. Normalization to 3NF: If the tables are not in 3 NF, perform the necessary decomposition or normalization to bring them to 3 NF. 3. Identify and Suggest Improvements: Identify potential issues in the current table design and suggest improvements for achieving better normalization and an optimized database design. 4. Provide Updated Structures: After normalization, provide the updated table structures, ensuring they accurately reflect the correct relationships and attributes for each table. Note: Pay special attention to how data is structured and ensure that all non-key attributes are fully functionally dependent on the primary key. Give brief explanation for each point discussed above. Explain any assumptions you make. Q3: Database Construction and Importing Data into PostgreSQL (25 Marks) In t his part of t he assignment, you are required to create a new database named film_db in PostgreSQL. Once the database is created, you will define and create four tables given (See DATASET) . For each table, you must define appropriate columns that accurately represent the required information. Ensure that each table has the correct data types for each column, and apply constraints such as primary keys, candidate keys, foreign keys, and not null constraints where necessary to maintain data integrity. Once the tables are defined, you will import data into them from CSV files, ensuring that the data aligns with the table structure and the constraints applied in the previous steps. The successful completion of this task will demonstrate your ability to create a well-structured database and import relevant data into it correctly. To verify the successful import of data into the tables, execute the SQL query SELECT * FROM ; for each of the tables you have created. This query will display all the rows and columns from the respective tables, allowing you to confirm that the data has been imported correctly. After running these queries, take screenshots of the results and provide them in your report. The images should clearly show the output of each query, demonstrating that the tables contain the expected data. Additionally, explain the output of each query in your report, highlighting any important details, such as the correctness of the imported data or any discrepancies that may require attention. This step ensures that the data import process has been completed successfully and the tables are correctly populated. Note: Show image of CSV and results generated from the above query side-by-side for comparison. See the detail rubrics at the end of the coursework. Q4: Querying and Relational Algebra (25 Marks) For this question, you need to write SQL queries to perform different operations on a film database that has been imported into a PostgreSQL database. The tasks will test your understanding of SQL functions, grouping, and filtering. Some queries might involve multiple steps, while others will be simpler. Additionally, for two of the queries, you are required to write the corresponding relational algebra expressions. The queries to be performed are as follows: 1. Write a query that calculates the average review score for each film and ranks the films from highest to lowest based on this score. Display the top 5 films with the highest average rating. 2. Write a query that returns a list of films that have received more than 5 reviews. (You will need to use grouping and counting functions to achieve this). 3. Write a query that shows the number of films each actor has appeared in. (You will need to join the Films and Roles tables and count the number of films associated with each actor). 4. For the above Query 1 and Query 2, also write the relational algebra expressions. Explain how relational algebra can be used to represent the operations performed in these queries. For each query you create, please include the output as an image. Additionally, provide a brief explanation of how the SQL query works. Be sure to also share the SQL query file so that it can be reviewed, executed, and verified. You are also required to write and note down your process, thoughts, and assumptions made (if any). See the detail rubrics at the end of the coursework. Q5: Reflection on Database Design (10 Marks) (This question aligns with Learning Outcome A : "Demonstrate a basic understanding of the design of database". It encourages students to reflect on how the knowledge and skills gained during the learning process have enhanced their understanding and ability to apply key concepts in database design.) Reflect on any of the one topic covered throughout the Introduction to Database course, mentioning any in-class activities or practical exercises. How have these concepts contributed to your understanding of database design, querying, or management? In your response, please combine the theoretical knowledge gained with any hands-on experience to explain how you applied these learnings in database design? Additionally, identify which concepts were most challenging or intriguing for you, and explain why they stood out. Provide concrete examples from the class / lab to support your reflections. Provide one example to support your answer. Its important to understand the criteria outlined in the rubric. One key aspect student might be missing is the connection to classroom / lab discussions or class activities / teaching. It is important to ensure that your answer is not simply a random scenario or generic explanation. While online tools and software might help with the answers or provide topic summaries, your response will only be considered correct if it is clearly rooted in the topics and scenarios highlighted /mentioned during our class discussion / sessions or lab activities. Make sure to link your examples directly to the concepts and exercises we’ve worked on in class / lab for a more comprehensive and relevant response. Highlight important points or claims mentioned in your answer for better readability. For the explanation of the question, highlight key points using methods like bolding, italicizing, underlining, or changing the font color. Combine these with bullet points to enhance readability. Ensure the theoretical part remains within 500-600 words or a maximum of one page. Content that surpasses this limit, without a valid and reasonable justification, will not be considered for evaluation. See the detail rubrics at the end of the coursework. Q6: Reflection on Understanding the Limitations of Relational Database Design (10 Marks) (This question aligns with Learning Outcomes A, encouraging students to reflect on their experience with relational database design, and related challenges. It helps assess their learning about database design, flexibility, scalability, and handling different data types) Think about your experience with designing, developing, and querying relational database using SQL in the coursework 1. Reflect on the limitations you encountered while working with simple, structured data (if any) . Consider the challenges you might face when dealing with large volumes of data of varying types, particularly in terms of flexibility, scalability, and handling unstructured data. Reflect on how relational databases manage structured versus unstructured data ? In your opinion, what types of data, especially those with large volumes or diverse formats, would benefit from a different approach to database design ? For the explanation of the question, highlight key points using methods like bolding, italicizing, underlining, or changing the font color. Combine these with bullet points to enhance readability. Ensure the theoretical part remains within 500-600 words or a maximum of one page. Content that surpasses this limit, without a valid and reasonable justification, will not be considered for evaluation. See the detail rubrics at the end of the coursework. In your report, explain any assumptions or decisions you made while performing the assignment. Provide insights on how you approached each example.
Pulse Project Due date: Dec 13 (after exam) Part I Data Cleaning (25 points) 1. You will find your data set in Canvas under the Pulse Project folder. The name of the data set is pulseproject.xlsx. This data set was created in our section of MATH-201 and will be considered a random sample of all MATH-201 students. Read this data set into Statcrunch. 2. It is always a good idea to review your data set for extreme values that might be suspicious. These extreme values can be due to typing errors during data entry or might be legitimate. If we identified an outlier, it might be possible to investigate each specific outlier to see if that person really exists. 3. Create a column of Pulse Differences (AEPL – BEPL). This will provide the change in pulse after 1 minute of exercise. 4. Create boxplots of all the variables (Height, Weight, BMI, Before Exercise Pulse (BEPL), After Exercise Pulse (AEPL), and Pulse Differences. If the boxplots are difficult to interpret, you can also examine the summary statistics for these variables. You do not need to include this information (boxplots and summary statistics) with your submission, but you should use them to identify any unusual data or outliers. 5. If there are any outliers, we won’t be able to identify and investigate the specific person in the data. That is what we would normally do. However, examine those outliers or unusual data and decide whether or not these subjects are legitimate or should be removed entirely from the data. If you decide to remove someone, justify your decision. There should be some basis in fact for the removal other than your feelings or opinion. You should note any outliers and the entries you have deleted under your first report section “Data Cleaning”. Make sure you discuss why any of these entries were removed. 6. Congratulations. Your data is now cleaned and ready for analysis. Part II Research (20 points each question x 3 = 60 points) Assume that the data set we are using represents a random sample of all MATH-201 students. Further assume that the populations are normally distributed (they are). That way we don’t have to worry about normal probability plots if any of our samples are below 25. Thus, we will be basing our inference and conclusions on the population of MATH-201 students. Below you will find three research questions. You can use any statistical method you want (some are much better than others) to answer these questions, but you must outline your methodology (hypothesis testing, some type of graph, confidence interval, regression analysis, etc.). After the “Data Cleaning” section, have a separate section for each research question. State your research question first, followed by your answer to the question. You can then quickly discuss your methodology and provide the StatCrunch output as backup for your analysis and conclusions. Spelling and Grammar (15 points) Spell Checker is a good tool, but you need to look thru your paper for spelling, typos, grammar errors etc. Research Questions (Any testing or inference should be done at 95% Confidence). Also, make certain that you can do any required testing (normality issues, sample size, normal prob plots etc.). If you are not able to answer the question for these reasons, just say so and move on to the next question. 1. (HINT: Chapter 11) It is claimed that due to smaller lung capacity, a female’s heart must beat faster during exercise. Given this information, do females have a higher mean after exercise pulse rate (AEPL) than men? Perform. this test at a 95% level of confidence. 2. (HINT: Chapter 11) It is claimed that one minute of exercise will increase a typical MATH-201 student’s pulse (mean pulse difference) by more than 15 beats per minute. At a 95% level of confidence, evaluate this research objective (mean pulse difference is greater than 15 beats per minute). Final Comments: 3. (HINT: Chapter 4) a. Create a scatter diagram using BMI as the dependent variable and weight as the independent variable. Describe the relationship between BMI and weight. b. Using the fitted line plot function in StatCrunch, find the equation of the least-squares regression line. c. Interpret the slope of the least-squares regression line for this model. d. Interpret the intercept of the least-squares regression line for this model. e. Predict the BMI of a student whose weight is 159 lb. f. Predict the BMI of a student whose weight is 300 lb. I am most interested that you use correct statistical analysis techniques and are able to communicate your results in a clear fashion. Your brief report should be in Microsoft Word and be easy to follow and contain no typos, spelling, or grammar errors. Points will be taken off for poorly written reports. You can use the rubric given on the next page as a guide.
MTH016 2nd SEMESTER 2024/25 COURWEWORK 2 Introduction to Financial Modelling SUBMISSION DEADLINE: 5:00 PM on 16 May 2025 INSTRUCTIONS TO CANDIDATES 1. This coursework must be completed individually and independently. 2. Total marks available are 100. 3. This coursework consists of 9 questions, and each question is worth 11.11 marks. 4. Answer all questions. There is NO penalty for providing a wrong answer. 5. The answers to all questions should be presented in a single workbook. 6. Submit the EXCEL workbook of your answers to Learning Mall Core. Open “Coursework 2.xlsx” and save as “YourGivenName YourFamilyName.xlsx”. You must use your name (e.g. “Youngmin Ha.xlsx”). Switch to the S&P 100 worksheet if needed. 1. Select cell D2, and enter a formula to get the price of symbol in the cell A2 on 2015-04-01 from the Price worksheet. Select cell E2, and enter a formula to get the price of symbol in the cell A2 on 2025-04-01 from the Price worksheet. Format D2:E100 with Accounting format (dollar signs), two decimal places. 2. Select cell F2, and enter a formula to calculate annual return from D2 and E2 (see pp. 207- 208 of the textbook titled “Financial Analysis with Microsoft Excel”). Use the GUESS argument of the RATE function if you get #NUM error for NVDA. Format F2:F100 with Percent format, no decimal places. Check that Excel automatically fill in the range D3:F100. 3. Click in the table area, and insert a PivotTable as a new worksheet. Name the worksheet SectorPT. Switch to the SectorPT worksheet. 4. Create a PivotTable to show both 1) the Average of Annual Return by Sector and 2) the Count of Symbol by Sector. Format the values of Average of Annual Return in Percent format, zero decimal places. Also, apply the data bars. You should make the PivotTable below: Switch to the S&P 100 worksheet. 5. Select cell G2, and enter a formula to calculate outperformance compared to the Average of Annual Return of the corresponding Sector from SectorPT worksheet. For example, the outperformance of AAPL is 1% from the following calculation: 23% (Annual Return of AAPL) - 22% (Average of Annual Return of Information Technology Sector). Format G2:G100 with Percent format, no decimal places. Check that Excel automatically fill in the range G3:G100. Make a copy of the ‘S&P 100’ worksheet, and rename it to ‘S&P 100 Subtotal’. Switch to the new worksheet. 6. Subtotal the data by Sector, 1) averaging the Annual Return column, and 2) counting the Annual Return column. You should follow the four steps (a, b, c, d) of Figure 5.60 Subtotal Rules in the textbook. a. Sort the data first. b. Convert to a range. c. Select the control field. d. Subtotal within Subtotal. Switch to the ‘Advanced Filter’ worksheet. 7. Fill the range A4:?? to form the criteria of Advanced Filter to filter the stocks that satisfy both the conditions: a. Annual Return is less than or equal to 13%, b. and Outperformance is greater than or equal to 0%, in the three sectors: Financials, Health Care, and Industrials. 8. Do an Advanced Filter on the SP_100 table in the ‘S&P 100’ worksheet based on the criteria in the range A4:??. Place the results in A15. 9. Turn the Advanced Filter results into a table. Do a two-level sort by Sector (A to Z) and Annual Return (Largest to Smallest). Autofit the column widths to make names and sectors are visible.
DTS307TC Reinforcement Learning Coursework - Individual Lab Report Due: 23:59, Friday, May 9, 2025 Weight: 40% Maximum score: 40 marks Overview The purpose of this assignment is to gain experience in Python programming and the design of reinforcement leaning algorithms. You are expected to implement an RL algorithm that solves a specific environment and provide an explanation of the algorithm’s methodology. You are expected to analyse your results, including challenges and your solutions. Learning Outcomes Assessed A: Systematically understand the fundamental concepts and principles of reinforcement learning B: Critically analyse real-life problem situations and expertly map them as reinforcement learning tasks. C: Mastery of Monte Carlo Methods and Temporal Difference Learning D: Proficiency in Deep Reinforcement Learning algorithms Late policy 5% of the total marks available for the assessment shall be deducted from the assessment mark for each working day after the submission date, up to a maximum of five working days Avoid Plagiarism • Do not submit work from other students. • Do not share code/work with other students • Do not use open-source code as it is or without proper reference. Risks • Please read the coursework instructions and requirements carefully. Not following these instructions and requirements may result in a loss of marks. • The assignment must be submitted via Learning Mall. Only electronic submission is accepted and no hard copy submission. • All students must download their file and check that it is viewable after submission. Documents may become corrupted during the uploading process (e.g. due to slow internet connections). However, students are responsible for submitting a functional and correct file for assessments. • Academic Integrity Policy is strictly followed. Lab Report (40 marks) The lab reports must include two labs (lab3 and lab4), incorporating your source code, analysis, and supporting evidence. Ensure that screenshots of the outputs and activities are included. Detailed instructions for each lab can be found in the respective lab manuals, and it is crucial that your report strictly follows these guidelines: • Do NOT use Stable-baselines libraries or any other reinforcement learning specific libraries in your code. • Do NOT exceed the word count limit of 3000 words for each report, reference and appendix excluded. • Although you are allowed to use any generative AI tools to assist your work, please keep in mind that you should be using them responsibly. (Good use: Improve your report after writing it and always review its output to ensure that it is correct. Bad use: Copy-pasting an entire report from AI without any effort of your own. ) The distribution of marks is as follows: • The report for Lab3: A2C [20 marks] • The report for Lab4: PPO [20 marks] Submission Requirements Please prepare and submit the following documents: • A cover page featuring your student ID. • A zip file containing all the source codes, which should be named using your full name and student ID in the following format: CW1_Name_ID.zip • Two PDF files that include all your responses for the 2 labs, your reports, and documentation of your lab work. The files should be named in the following format: CW1_Lab3_ID.pdf and CW1_Lab4_ID.pdf Note that the quality of the code, the clarity of your writing, and the format/style. of your report will be taken into consideration during the evaluation. The detailed rubric is outlined below. Rubric Lab3/Lab4 (20 marks) criteria marks Code Performance (3 marks) Code runs without errors and performs tasks as specified. 2-3 Code fails to run/have errors 0-1 Code Quality (3 marks) Code is well-organized, includes meaningful comments, and uses appropriate variable names. 2-3 Code is poorly-organized, fail to include meaningful comments. 0-1 methodology (3 mark) Comprehensive coverage of topics with detailed explanations of approaches and methodologies. 2-3 Result analysis (3 marks) Insightful analysis of results, including challenges faced and solutions applied. 2-3 analysis of results shows no or little insight 0-1 Report Quality (3 Mark) Report is well-structured, formatted, and free of grammatical errors. 2-3 Evidence of Lab Work (2 Marks) All required elements (e.g., screenshots, outputs) are included and correct. 1-2 Fail to include all required elements 0-1 Lab Work Quality (3 marks) Clear documentation and captions for included evidence, explaining relevance and importance. 2-3 Fail to correctly document the evidence. 0-1
FIT3152 Data analytics - 2025: Assignment 2 Your task ● The objective of this assignment is to gain familiarity with classification models using R. ● This is an individual assignment. Value ● This assignment is worth 30% of your total marks for the unit. ● It has 35 marks in total. Suggested Length ● 8 - 10 A4 pages, approximately 1,000 words (for your report) + extra pages as appendix for your R script. ● Font size 11 or 12pt, single spacing. Due Date 11.55pm Friday 16th May 2025 Submission ● Submit a single PDF file and single video presentation file on Moodle. ● Use the naming convention: FirstnameSecondnameID.{pdf, mp4, mov etc.} ● Turnitin will be used for similarity checking of all written submissions. Generative AI Use ● Statement on Generative AI required by the university: In this assessment, you must not use generative artificial intelligence (AI) to generate any materials or content in relation to the assessment task. AI must not be used in any way for producing the assessment task which requires demonstration of individual human capacities/skills/knowledge to meet the related unit learning outcomes. Late Penalties ● 5% (1.75 mark) deduction per calendar day for up to one week. ● Submissions more than 7 calendar days after the due date will receive a mark of zero (0) and no assessment feedback will be provided. Instructions and data The objective of this assignment is to gain familiarity with classification models using R. We want to create models to predict whether or not a particular type of crop (Oats) is being grown on farmland, based on remote sensing data containing various optical and radar features. You will be using a modified version of the Winnipeg crop mapping data, hosted by the UCI Machine Learning Archive https://archive.ics.uci.edu/dataset/525/crop+mapping+using+fused+optical+radar+data+set There are two options for compiling your written report: (1) You can create your report using any word processor with your R code pasted in as machine- readable text as an appendix, and save as a pdf, or (2) As an R Markdown document that contains the R code with the discussion/text interleaved. Render this as an HTML file and save as a pdf. Your video report should be less than 100MB in size. You may need to reduce the resolution of your original recording to achieve this. Use a standard file format such as .mp4, or mov for submission. Creating your data set Clear your workspace, set the number of significant digits to a sensible value. Download “WinnData.csv” and create your individual data using the following code: rm(list = ls()) set.seed(XXXXXXXX) # Your Student ID is the random seed WD = read.csv("WinnData.csv") WD = WD[sample(nrow(WD), 5000, replace = FALSE),] WD = WD[,c(sort(sample(1:30,20, replace = FALSE)), 31)] Questions (9 Marks) 1. Explore the data: What is the proportion of “Oats” (class = 1), to “Other” (class = 0) crops? Obtain descriptions of the predictor (independent) variables – mean, standard deviations, etc. for real-valued attributes. Is there anything noteworthy in the data? Are there any attributes you need to consider omitting from your analysis? (1 Mark) 2. Document any pre-processing required to make the data set suitable for the model fitting that follows. 3. Divide your data into a 70% training and 30% test set by adapting the following code (written for the iris data). Use your student ID as the random seed. set.seed(XXXXXXXX) #Student ID as random seed train.row = sample(1:nrow(iris), 0.7*nrow(iris)) iris.train = iris[train.row,] iris.test = iris[-train.row,] 4. Implement a classification model using each of the following techniques. For this question you may use each of the R functions at their default settings if suitable. (5 Marks) • Decision Tree • Naïve Bayes • Bagging • Boosting • Random Forest 5. Using the test data, classify each of the test cases as “Oats” (class = 1), or “Other” (class = 0). Create a confusion matrix and report the precision, recall, accuracy and F1-score of each model. (1 Mark) 6. Using the test data, calculate the confidence of predicting “Oats” for each case and construct an ROC curve for each classifier. You should be able to plot all the curves on the same axis. Use a different colour for each classifier. Calculate the AUC for each classifier. (1 Mark) 7. Create a table comparing the results in Questions 5 and 6 for all classifiers. Is there a single “best” classifier? Explain your reasoning. (1 Mark) Investigative Tasks (20 Marks) 8. Examining each of the models, determine the most important attributes in predicting “Oats” (class = 1), or “Other” (class = 0) . Which attributes could be omitted from the data with very little effect on performance? Give reasons. (2 Marks) 9. Looking at relative strengths and weaknesses of each model, and consulting relevant references, can you explain why there is a difference in performance between the models? That is, why do some of these models perform better than others on the type of data to be fitted? (2 Marks) 10. Starting with one of the classifiers you created in Question 4, create a classifier that is simple enough for a person to be able to classify “Oats” (class = 1), or “Other” (class = 0) by hand. Describe your model with either a diagram or written explanation. What factors were important in your decision? State why you chose the attributes you used. Using the test data created in Question 3, evaluate model performance using the measures you calculated for Questions 5 and 6. How does it compare to those in Question 4? (4 Marks) 11. Create the best tree-based classifier you can. You may do this by adjusting the parameters, and/or cross-validation of the basic models in Question 4. Show that your model is better than the others using the measures you calculated for Questions 5 and 6. Describe how you created your improved model, and why you chose that model. What factors were important in your decision? State why you chose the attributes you used. (4 Marks) 12. Using the insights from your analysis so far, implement an Artificial Neural Network classifier that is as good or better than those in Question 4. Describe on attributes used and data pre-processing for implementation. How does this classifier compare with the others? Can you give any reasons? (4 Marks) 13. Fit a new classifier to the data, test and report its performance in the same way as for previous models. You can choose a new type of classifier not covered in the course, or a new version of any of the classifiers we have studied. As a starting point, you might refer to James et al. (2021) or look online. When writing up, state the new classifier and package used. Include a web link to the package details. Give a brief description of how your model works. Comment on the performance of your new model. (4 Marks) Report and Video Presentation (6 Marks) Write a brief report (suggested length 8 – 10 pages) summarizing your results. Include your R script, copied and pasted as machine readable text, as an appendix. Use commenting in your R script, where appropriate, to help a reader understand your code. Alternatively combine working, comments and reporting in R Markdown. (2 Marks) Record a short presentation using your smart phone, Zoom, or similar method. Your presentation should be approximately 5 minutes in length and summarise your main findings, as well as describing how you conducted your research, and any assumptions made. Pay particular emphasis to your results for the investigative tasks. (Submission Hurdle and 4 Marks) Software It is expected that you will use R for your data analysis and graphics and tables. You are free to use any R packages you need but please document these in your report and include in your R code. Description of the data Attributes A01:A30 Sensing Data Class The target attribute. Whether the farmland is “Oats” (class = 1), or “Other” (class = 0) References An Introduction to Statistical Learning with applications in R, 2nd Ed, 2021. (Springer Texts in Statistics), James, Witten, Hastie and Tibshirani. (Available on-line from the Monash Library.)
Energy 722 Assignment 4 Integrating Renewable Energy into Transmission and Distribution Grid The objective of this assignment is to consolidate the concepts and issues learnt during the lecture series on electricity grid integration for renewable generation and apply knowledge to realistic case studies, addressing issues that is relevant to New Zealand electricity networks. Wind and solar power grid integration have been chosen for this assignment. You are tasked to write 3 short reports. The first report is around wind farm integration into transmission network. The second report is towards addressing a case study for integrating home based solar PV systems into distribution network. The third report is addressed towards a case study for Solar Farms, several of which have become operational in New Zealand recently. REPORT 1: Part I- Essay on Wind farm integration into transmission network Choose ANY 1 sub-topics (either from a or b) below to analyse wind integration into transmission networks. a. Impact of wind power variability on transmission grid security and reliability, such as: i. wind farm for grid frequency control; or ii. operational reserve requirements for variable wind generation. b. Wind farm protection and coordination requirements for system operation, such as: i. wind farm reactive power management; or ii. wind farm voltage support; or iii. wind farm voltage stability. Marking Rubric: rrectly explained forthewind farmtwork1Integration problem relevant and important to New Zeal lems1.5AssessmentofsolutioninNewZealandcontext1Format (Reference, report structur REPORT 2 – Case study for solar PV integration into Low-voltage distribution network: New Zealand government has set a target of 100% renewable electricity by 2035 during normal hydrological conditions. Working towards the target, the distribution utilities are looking at ways to reduce the consumption of electricity from the grid and increase the electricity generation at distribution level. The local distribution utility has approached a consulting firm and asked for pre- feasibility study to reduce the power consumption from the grid (grid exit point) by 1 MW. As a Graduate Energy Consultant, you are involved in designing a trial project which can be implemented by local distribution utility to help accelerate the solar PV installations in the network. You attend the kick-off meeting with the client (distribution utility) for this project. Following are the questions/issues/ideas raised by the client and your manager: i. The best possible way to have local generation within distribution network is to install grid connected solar PV systems at trial homes. Specific PV panel should be chosen for the project. Total PV panel number and capacity to be identified to achieve 1MW reduction. ii. Choose a suburb in Auckland and find average electricity consumption (Average electricity consumption by residential homes in NZ could be considered). PV system size for each trial house should be identified based on the consumption. Then randomly choose trial homes in chosen suburb and proceed next action. iii. Energy analysis to be conducted. (The yearly energy consumption in that area, the maximum sunny hours in that area – use NIWA app, Feasible electricity production by solar PV system and the overall cost involved.) iv. What are the interconnection standards, earthing standard, and lighting standard (if tall buildings)? Give more emphasis to this question. Write in detail. v. In order to have service continuity (Reliability), battery system may be installed. What would be the energy specification for this battery system- for grid scale and for individual? (MWh required) vi. Analyse all the above and recommend the best solution (If battery required or not). Write a design report which will address the above questions. The marking rubric for this report is as follows: showcalculationof totalPVpanelnumberandcapacity.Re report from which yougotthedataforaverageele consumptionbyresidentialhomesinNZ.Wr estimateswillvaryove map AddressingTaskiiiEnergyanalysisMentionhowyoucalculated the electricity generation Hint:NIWArecordsthesunnyho Calculatetheelectricit solarirradianceCalculateyearlyenergyproduced . require.34. – ke ain thesystem totheclient.36.Professional engineering r bedeductedifthereport professionalCriteriaMarksMajor issues correctlyexplainedforthe So distribution/transmissio land1Properly explained solutions to prob e)0.5ProperexplainationofthetechnicalproblemtothetargetaudienceImportanceor relevanceofthe problem in r implemented overseasSearchofinformationforsolutionsinNewZealandcase
Programme: BSc Computing with Cyber Security Module Code: LD6054 Module Title: Cyber Security Assurance and Governance Distributed on: Via Blackboard; briefing in lecture. Submission Time and Date: To be submitted by 16:00 on [ 15 May 2025 ] Word Limit: 3000 Weighting BSc Computing with Cyber Security Submission of Assessment Electronic Management of Assessment (EMA): Please note if your assignment is submitted electronically, it will be submitted online via Turnitin by the given deadline. You will find a Turnitin link on the module’s eLP site. It is your responsibility to ensure that your assignment arrives before the submission deadline stated above. See the University policy on late submission of work. Please note that assignments are subject to anonymous marking. Instructions on Assessment: In the modern digital era, data is one of the most valuable assets for any organization. Companies operating in technology-driven sectors, such as artificial intelligence (AI) and cybersecurity, are particularly vulnerable to data breaches, information mismanagement, and regulatory non-compliance. To mitigate these risks and ensure operational efficiency, businesses must adopt robust Information Governance (IG) frameworks. This case study focuses on TechNova AI Solutions, a rapidly growing AI and cybersecurity consultancy firm based in Manchester, UK. The company specializes in machine learning, cybersecurity solutions, data engineering, digital risk assessment, and AI-driven automation for various industries, including finance, healthcare, and government agencies. As TechNova AI Solutions expands its operations and gains more high-profile clients, it faces increasing challenges in handling sensitive information. With over 100 enterprise clients and an increasing amount of classified data from government and private sector partners, the company requires a structured IG policy to safeguard its data assets. The aim of Information Governance is not only to provide data confidentiality and protection assurance to TechNova management but to also help individual staff members to understand the importance of data handling procedures. This will assist them to adhere to information assurance, corporate information assurance, information security assurance procedures and perform. their duties ethically to demonstrate duty of care as well as respecting data subject rights while processing their personal data and also to avoid any escalation privileges. Your task is to develop an information governance policy for TechNova AI Solutions and write an accompanying report, which provides justification of policy contents, chosen framework, risk assessment methodologies and strategy to implement strong information governance for the given organisation. The report should outline the need for an effective information governance framework tailored to the organization’s needs, focusing on regulatory compliance, data security, and risk management. Mapping to Programme Goals and Objectives This assignment will assess the following learning outcomes: Knowledge & Understanding: 1. Critically appraise principles of Information security in the context of Governance, Risk and Compliance. Intellectual / Professional Skills & Abilities: 2. Develop a comprehensive Information Security Management System (ISMS) for the given problem context to support business objectives. Personal Values Attributes (Global / Cultural awareness, Ethics, Curiosity) (PVA): 3. Evaluate social, ethical, and legal requirements for an auditor to comply with in a profession manner. Module Specific Assessment Criteria and Grading Description Marks Task 1: Introduction The information security policies should include Introduction, purpose, scope. In addition, you need to make a strong case on the significance of information governance in context to the risks the organization has to address. 15 Task 2: Policy Structure and Contents Identification and allocation of roles and responsibilities, accountable for ensuring legal, regulatory, and contractual obligations in the context of given scenario. 20 Task 3: Framework Information Governance Policy Framework with recommendations of minimum 8 controls to establish Information Security Management System for given context. 35 Task 4: Implementation & Monitoring Implementation plan and monitoring mechanisms to address security threats and mitigate security vulnerabilities in the context of given scenario 20 Task 5: Professional Presentation and Structure Presentation should include appropriate language, referencing, clarity of expression style, format and length. 10 Total 100 Grading Guidance Distinction (70 and above): Excellent in-depth understanding of the risk assessment process, critical appraisal of different Information Governance frameworks and contemporary cyber threats to information assets in the context of given scenario. A robust policy detailing assurance, governance and responsibilities in the context of given scenario, mentioning best practices to adhere with ethical standards. Thorough critical analysis is made to deliver successful implementation of all tasks and justification of choices are made. Commendation (60-69): Very good application and synthesis of successful implementation of all tasks is delivered. Report contents are relevant and original but lack excellence in explanation and would need more academic rigour. The robustness and correctness of the risk assessment is not through. Pass (40-59): Provide basic understanding of the deliverables. Some deliverables are incomplete. There are number of inconsistencies in each task. Inadequate evaluation and incomplete justification of the choices made. Report shows some errors and not detailed. There is limited consideration to implement design and implementation strategies. Fail (less than 40): Provide little or no understanding of the risk process. Incomplete attempt or lacks substantial parts of the deliverables. Fail to demonstrate understanding of the concepts required to implement deliverables. Work lacks serious clarity and detail relevant to the assignment. There are several errors in the submitted report. ASSESSMENT REGULATIONS You are advised to read the guidance for students regarding assessment policies. Academic Misconduct The Assessment Regulations for Taught Awards (ARTA) contain the Regulations and procedures applying to cheating, plagiarism, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct. You are reminded that plagiarism, collusion, the use of Artificial Intelligence (AI) Systems, and other forms of academic misconduct, as referred to in the Academic Misconduct procedure of the assessment regulations, are taken very seriously. Assignments in which evidence of plagiarism or other forms of academic misconduct is found may receive a mark of zero. Late submission of work Where coursework is submitted without approval, after the published hand-in deadline, the following penalties will apply. For coursework submitted up to 1 working day (24 hours) after the published hand-in deadline without approval, 10% of the total marks available for the assessment (i.e.100%) shall be deducted from the assessment mark. For clarity: a late piece of work that would have scored 65%, 55% or 45% had it been handed in on time will be awarded 55%, 45% or 35% respectively as 10% of the total available marks will have been deducted. The Penalty does not apply to Pass/Fail Modules, i.e. there will be no penalty for late submission if assessments on Pass/Fail are submitted up to 1 working day (24 hours) after the published hand-in deadline. Coursework submitted more than 1 day (24 hours) after the published hand-in deadline without approval will be marked as zero but will be eligible for referral. The reassessment should where appropriate, and as determined by the Module Leader, be the same method (e.g. essay) but maybe with a different task (e.g. different essay title) or with the same task (e.g. the same essay title) as indicated in the Module handbook. In modules where there is more than one assessment component, Students are not required to complete all assessment components if an overall Pass Mark (40% UG, 50% PGT) has been achieved. The only permitted exception will be in cases where the University is prevented from doing so by a PSRB requirement. In the case of PSRB requirements, a variation order will be required from the regulations. In modules, where there is more than one assessment component and an overall pass mark has not been achieved, Students will be eligible for a referral* in the individual failed module and/or not attempted component(s) of assessment. These provisions apply to all assessments, including those assessed on a Pass/Fail basis. Word limits The word count is to be declared on the front page of your assignment and the assignment cover sheet. The word count does not include: e.g. appendices, glossary, footnotes, tables Please note, in text citations [e.g. (Smith, 2011)] and direct secondary quotations [e.g. “dib-dab nonsense analysis” (Smith, 2011 p.123)] are INCLUDED in the word count. If this word count is falsified, students are reminded that under ARTA this will be regarded as academic misconduct. For those assessments where students are required to keep to the word limit, it is proposed that they should be informed that the marker will stop reading at the point when they judge that the word limit exceeds the recommended word count by more than 10%. The marker will indicate the point at which they stop reading on the text. Students must retain an electronic copy of this assignment (including ALL appendices) and it must be made available within 24hours of them requesting it be submitted.