Assignment Chef icon Assignment Chef

Browse assignments

Assignment catalog

33,401 assignments available

[SOLVED] Project 4 part 2 Prolog

Project 4 part 2 This project concerns reaction-diffusion equations and the approach can be used to model pattern formation in biology and chemical reactions. The pattern formations in biology include butterfly wing patterns, animal coat markings, fish and shell pigmentation. Pattern formation has also been observed in chemical reactions such as the chlorite-iodide-malonic acid starch reaction. The mathematical problem is a set of nonlinear partial differential equations and they are given by pt  = Dp Δp + p2  q + C -(K+1) p                                                                                                           (1) qt  = Dq Δq - p2  q + K p                                                                                                                       (2) The coupled partial differential equations include the functions p(x,y,t) and q(x,y,t) and we are considering solutions on the square formed by x andy being between 0 and 40. The square is [0, 40] * [0, 40]. The Laplacian is given by Δ . The time derivatives are given by pt  = dp/dt and qt  = dq/dt. The positive diffusion   coefficients are given by Dp  and Dq, respectively. The two other parameters C, K are both larger than zero. We have the following boundary conditions: p(x,y,0) = C + 0.1 for all (x,y) belonging to the square 10 

$25.00 View

[SOLVED] Further Topics in Probability 2nd teaching block 2025 R

Homework set 1- non-assessed Convolutions Further Topics in Probability, 2nd teaching block, 2025 Problems with • ’s are to be handed in. These are due in Blackboard before noon on Thursday 30 January. Please show your work leading to the result, not only the result. Each problem worth the number of • ’s you see right next to it. Hence, for example, Problem 1.1 worth three marks. Random variables are defined on a common probability space unless otherwise stated. 1.1 ••• Determine the mass function of the sum of the numbers shown by two fair four-sided (tetrahedron) dice after rolling them. 1.2 ••• Let X be a discrete uniform. random variable on the set {0, 1, . . . , n − 1} (that is, it takes on any of these values with probability 1/n). Argue that if n is not a prime number then the distribution of X can be written as the convolution of two integer-valued distributions. 1.3 Show analytically that ∗ rGeom(p) = NegBinom(r, p). HINT: Can use induction on the sum of binomial coefficients that emerges. 1.4 ••• Let X ∼ Poisson(λ) and Y ∼ Uniform(0, 1) be independent random variables. Find the distribution function of the random variable Z : = X + Y . 1.5 •••• A man takes the train and then transfers to the bus when commuting to work each day. It takes two minutes for him to walk from the train to the bus at the transfer station. In principle the train arrives at 7:30am, and the bus leaves at 7:37am. The fact is that the train arrives at a normally distributed random time, having mean 7:30am and standard deviation 4 minutes. Independently, the bus leaves at a normally distributed random time with mean 7:37am and standard deviation 3 minutes. What is the probability that our man misses his bus at most once on the five working days of the week? HINT: Use what you know about the sum of independent normal variables. 1.6 (This is not convolution, just a bit of outlook.) Let X and Y be iid. Uniform. random variables on the interval (0, 1). Find the density of their product XY . 1.7 •••• Let X and Y be iid. random variables, each with density f(x) = 3x 2 · 1{x ∈ [0, 1]} (1 stands for the indicator function here). Determine the density of the random variables a) U : = X + Y ; b) V : = X − Y . 1.8 Let X1, X2, . . . , Xn, . . . be iid. random variables, each of Uniform(0, 1) distribution. Denote by fn(x) the density of the random variable Sn := Pnk=1Xk. Prove Plot, using a computer, for n = 1, 2, . . . , 10. What do you see? 1.9 Let X1, X2, . . . , Xn, . . . be iid. random variables, each of distribution P{Xi = 0} = P{Xi = 1} = 2/1 . Let Y : = P∞n=1 2 −nXn. Argue that Y is uniformly distributed on the real interval [0, 1]. HINT: It is enough to show that probabilities of Y falling in intervals agree with those of the uniform. distribution. The two ends of an interval can be approximated by numbers in the base 1 2 number system. 1.10 Let X1, X2, . . . , Xn, . . . be iid. random variables, each of distribution P{Xi = 0} = p = P{Xi = 1} = 1 − p. Let Y : = P∞n=1 2 −nXn. Argue that Y is singular w.r.t. the uniform. distribution on the interval [0, 1], that is, ∀ε > 0 ∃A ⊂ R : P{Y ∈ A} ≥ 1 − ε, P{U ∈ A} ≤ ε, where U is uniformly distributed over (0, 1). (In fact, A has to be Borel measurable, but don’t worry about this.) HINT: Again, think in the base 1 2 number system. The Weak Law of Large Numbers says that the probability that the average of the first n Xi ’s is off from p by more than δ converges to zero as n → ∞. Homework set 2- first assessed homework Gamma distribution Problems with • ’s are to be handed in. These are due in Blackboard before noon on Thursday 6 February. Please show your work leading to the result, not only the result. Each problem worth the number of • ’s you see right next to it. Random variables are defined on a common probability space unless otherwise stated. 2.1 Prove that if ξ is a Cauchy random variable with density f(x) = π 1 1+ 1 x2 , then X : = 1/ξ, Y : = 2ξ/(1 − ξ 2 ), and Z : = (3ξ − ξ 3 )/(1 − 3ξ 2 ) are also Cauchy distributed. HINT: use the trigonometric identities: if ξ = tan(α), then 1/ξ = tan( π 2 −α), 2ξ/(1−ξ 2 ) = tan(2α), and (3ξ − ξ 3 )/(1 − 3ξ 2 ) = tan(3α). 2.2 Let X be a Cauchy random variable with density f(x) = π 1 1+ 1 x2 . We know that E|X| = ∞, but E(|X| 1−ε ) < ∞ for any ε > 0. Determine the limit lim ε↘0 εE(|X| 1−ε ). HINT: Split the integral at a well chosen point. 2.3 Let X and Y be iid. standard Normal random variables. Determine the joint density of the pair U = X, V = X/Y . Then use it to show that X/Y has the standard Cauchy distribution. 2.4 We are given a biased coin that shows Heads with probability p and Tails with probability 1−p. The coin initially shows Heads, and at time moments given by a Poisson(λ) process we flip the coin again and again. What is the probability that the coin shows Heads at time t? 2.5 •••• (With a good understanding of stuff, you can solve this problem without any compu-tation.) Let X1, X2, . . . be iid. random variables each with density 1 2 x 2 e −x for x > 0 and 0 otherwise. Let S0 = 0 and Sn : = X1 + · · · + Xn, and N(t) : = max{n : Sn < t}. a) Determine the density of the random variable S2. b) Find the mass function of the random variable N(t). 2.6 Show, using the convolution formula, that Gamma(α, λ) and Gamma(β, λ) convolve to Gamma(α + β, λ) for any positive reals α, β, λ. Along the way there will be a tricky integral, which doesn’t have to be explicitly calculated as long as you can scale out its dependence on the important variable. You can then use the fact that Gamma densities are normalized (thus proving a representation of Beta functions this way). 2.7 ••• Find the density of the sum of an Exponential(λ) and an independent Exponential(µ) random variable (λ = µ). What happens when µ → λ? 2.8 •••• Are the following functions generating functions of non-negative integer probability distributions? 2.9 ••• Let X be a non-negative integer-valued random variable with generating function P(s). Find the generating function for the distribution of Y : = X + 2 and the one for Z : = 3X. 2.10 ••• Let X1, X2, X3, . . . be iid. random variables with common distribution function F. Let ν ≥ 1 an independent, integer-valued variable with generating function P, and define Y : = max{X1, X2, X3, . . . , Xν}. Show that Y has distribution function P  Homework set 3- non assessed Generating functions Problems with • ’s are to be handed in. These are due in Blackboard before noon on Thursday 20 February. Please show your work leading to the result, not only the result. Each problem worth the number of • ’s you see right next to it. Random variables are defined on a common probability space unless otherwise stated. 3.1 Let X1, X2, . . . be iid. Optimistic Geometric(p1) random variables, and Z an independent Optimistic Geometric(p2) random variable. Prove, using generating functions, that Give a probabilistic interpretation of this fact. 3.2 •••• The distribution of a random variable X is called infinitely divisible, if for every n ≥ 1 integer there exist Y1 (n) , . . . , Yn (n) iid. random variables such that a) Is the Poisson distribution infinitely divisible? Why or why not? b) Is the Binomial distribution infinitely divisible? Why or why not? c) Prove that for every 0 < p < 1 there exists a probability mass function p1, p2, . . . and λ > 0 with which P Z i=1 Xi ∼ Pessimistic Geometric(p), where X1, X2, . . . are iid., for k ≥ 1 P{Xi = k} = pk, and Z is an independent Poisson(λ) random variable. d) Show, with the help of c), that the Pessimistic Geometric distribution is infinitely divisible. 3.3 a) In a branching process P(s) = as2 + bs + c where a > 0, b > 0, c > 0, P(1) = 1. Compute π. Give a condition for sure extinction. b) Little Johnny is salesman in a store where servicing a customer takes exactly 1 minute. Under this time, with probability 0.6 two new customers arrive in the queue, with probability 0.2 one new customer arrives, with probability 0.2 no new customers appear. Little Johnny can have his coffee if the queue empties out. What is the probability that this ever happens after the first customer steps in the store? Explain. 3.4 ••• In a branching process let X = P ∞ n=0 Zn be the number of individuals that ever existed. You can use, as we saw in class, that its generating function Q satisfies Q(s) = sP(Q(s)). a) Find Q(s) when the distribution of the number of children of an individual is Bernoulli(p). b) Find Q(s) when the distribution of the number of children of an individual is Pes-simistic Geometric(p). c) Find EX in both cases. 3.5 •••• Car traffic of a street is modeled by a) dividing the time into unit seconds; b) assuming that with probability 0 < p < 1 a car passes in a given second; c) events (of cars passing or not) in different seconds are independent of each other. A pedestrian wants to cross this street, and she can do so if no cars come in two consecutive seconds. (We assume that the pedestrian sees enough of that street to decide if she can cross safely.) Find the generating function and expectation of the time the pedestrian spends on waiting for the street to clear enough so that she can cross. 3.6 A monkey repeatedly types in any of the 26 letters of the English alphabet independently with equal chance. Let T be the number of letters typed in when the word “DAD” first appears. Find the generating function and the expected value of T. 3.7 ••• Little Johnny regularly speeds with his car, and police regularly stop him. Every such instance he pays ↔ 100 or ↔ 500 with probability 1/2-1/2, independently of everything else. Moreover, Johnny handles such situations in a very bad manner, and the blustering fellow he is, every such occasion also results in his driving licence being revoked with probability p. Find the generating function, expectation and standard deviation of the total amount of fines paid by Johnny. 3.8 A Skip Free Negative Random Walk. Suppose {Xn, n ≥ 1} is independent, identi-cally distributed. Define S0 = X0 = 1 and for n ≥ 1 Sn = X0 + X1 + · · · + Xn. For n ≥ 1 the distribution of Xn is specified by P{Xn = j − 1} = pj , j = 0, 1, . . . where (The random walk starts at 1; when it moves in the negative direction, it does so only by jumps of −1. The walk cannot jump over states when moving in the negative direction.) Let N = inf{n : Sn = 0}. If P(s) = Es N , show P(s) = sf(P(s)). (Note what happens at the first step: Either the random walk goes from 1 to 0 with probability p0 or from 1 to j with probability pj .) If f(s) = p/(1 − qs) corresponding to a geometric distribution, find the smallest solution. 3.9 Consider the simple random walk that starts from the root of a rooted tree of degree d ≥ 3. That is, in each step the walker picks independently any of the d neighbors of a vertex to step on with equal chance. Compute the generating function of a) the hitting time of a given neighbor of the root; b) the generating function of the first return time to the origin; c) the generating function of the last return time to the origin. 3.10 ••• For a simple random walk {Sn} let u0 = 1 and for n ≥ 1, let un = P{Sn = 0}. Compute by combinatorics the value of un. Find the generating function in closed form. To get this in closed form. you need the identity The binomial coefficient for general α ∈ R and positive integer k is defined as With this definition and assuming |x| < |y|, the Binomial Theorem holds:

$25.00 View

[SOLVED] FIT2094 Databases Assignment 1 - Database Design SQL

FIT2094 Databases Assignment 1  - Database Design Caring Hands Hospital (CHH) Purpose Given the provided case study, students will be asked to transform. the information provided into a sound database design and implement it in Oracle. This task covers learning outcomes: 1.   Apply the theories of the relational database model. 2. Develop a sound relational database design. 3. Implement a relational database based on a sound database design. Your task This is an open-book, individual task.   The output for this task will be an initial conceptual model as a PDF document and  a logical model implemented in the Oracle RDBMS Value 40 % of your total marks for the unit Due Date Wed, 5th Feb 2025 at 4:30 pm Submission ● Via Moodle Assignment Submission. ●    FIT GitLab check-ins will be used to assess the history of development Assessment Criteria ●    Using the supplied case study description, prepare a conceptual model identifying the required entities, attributes and relationships. ●    Normalise the supplied case study forms/s and integrate the resultant relations into a logical model derived from the identified conceptual model. ●    Depict the data requirements expressed in the case study via a relational database logical model. ●    Generate a schema that meets the case study data requirements from the logical model produced ●    Consistent use of industry-standard notation and convention Late Penalties ●    5% of the marks available for the task (-5 marks) deduction per calendar day or part thereof for up to one week ●    Submissions over 7 calendar days after the due date will receive a mark of zero (0), and no assessment feedback will be provided. Support Resources See Moodle Assessment page Feedback Feedback will be provided on student work via: ● general cohort performance ●    specific student feedback ten working days post-submission ● a sample solution Case Scenario Caring Hands Hospital treats patients who are identified by a unique patient id. When a patient is admitted to the hospital, the hospital records the patient's first and last name, address, date of birth and emergency contact number (if they are not already on the system). They also record the date and time of admission. The system needs to maintain a record of all admissions for a particular patient. When a patient is discharged, the date and time of their discharge for this admission is recorded. While in the hospital patients are located in a bed within a ward. Each ward is identified by a ward code. Beds located in a ward are assigned a bed number within that ward - thus, for example, each ward has a bed number 1. The bedside telephone number and bed type are  also recorded. During a stay in the hospital patients may be moved from one bed to another (this might involve a change of wards). On admission each patient is assigned one doctor (identified by a doctor id) as their supervising doctor. If a patient has multiple admissions they may be assigned a different supervising doctor with a different admission. A patient's supervising doctor may be in charge of many admissions. The hospital records each doctor's first and last names and phone number. During their admission, patients are prescribed procedures as part of their care by doctors (a procedure can only be prescribed by a doctor). Procedures consist of tests such as "X-Rays", "Blood Tests" etc, they also include medical procedures which might be required such as "Shoulder Replacement". A patient may have procedures prescribed by their supervising doctor or any other doctor working in the hospital. A procedure is identified by a procedure code. Each procedure has a name (such as "Wrist X-Ray") and includes a description of what the procedure involves, the time required for the procedure and the current standard patient cost for this procedure. When a particular procedure is prescribed during a patient’s admission, the date and time when the procedure is carried out is also recorded. For a given patient, a particular procedure is completed before any further procedures are run (two procedures cannot occur simultaneously for the same patient). A doctor may require procedures on different patients which are carried out at the same time. Some procedures, such as blood tests are carried out by technicians, more complex procedures may require a doctor to perform. the procedure. If a procedure is carried out by a technician the hospital does not record the details of the technician who completed the procedure. If a doctor carries out the procedure, the doctor who completes the procedure is recorded (the doctor who completes the procedure may be different from the doctor who prescribes it). If a team of doctors is involved in the procedure, only one doctor (the doctor in charge) is recorded as completing the procedure. Caring Hands Hospital only records the details of a procedure carried out on an admission after the procedure has been completed. The patient cost for the procedure is recorded, this may be different to the standard procedure cost. Not all admissions require a procedure to be carried out. Procedures may require "extra" items such as syringes or swabs. Each item held in stock is assigned an item code. The item description, current stock and price are recorded. REMEMBER to keep up to date with the Moodle Ed Assignment 1 forum, where further clarifications may be posted (this forum is to be treated as your client). To view Assignment 1 only posts, select the Assignment and then the Assignment 1 forum from the Categories list in the left panel. Once selected, you can Filter the posts via the Filter option at the top of the list of posts: Please be careful to ensure you do not publicly post anything that includes your reasoning, logic, or any part of your work to this forum. Doing so violates Monash plagiarism/ collusion rules and carries significant academic penalties. Use private posts to raise questions that may reveal part of your reasoning or solution. You are free to make assumptions if needed however they must align with the details here and in the assignment forums and must be clearly documented (see the required submission files). Normally such assumptions would only relate to minimum cardinality where not expressed in the case study. GIT STORAGE Your work for these tasks MUST be saved in your Assignment 1 folder of your local repository and regularly pushed to the FIT GitLab server to build a clear history of the development of your model. TASKS to be Completed TASK 1 Caring Hands Hospital Conceptual Model [15 Marks] Based on the case scenario on pages 2 and 3 of this document prepare a CONCEPTUAL model for Caring Hands Hospital. In preparing this model you must only use the description provided on pages 2 and 3. Your model must be saved in a file named chh_conceptual.pdf Your development history as pushed to Git Lab must clearly show the steps you have been taught: ●    Step 1: entities and keys ●   Step 2: relationships, and ● Step 3: non-key attributes The PDF file of your model must have at least three pushes (remember all pushes must be of a file with the same name - chh_conceptual.pdf). Please note that three pushes are a minimum; you are free to make more (and we would expect more, in which case you will have more than one commit/push for each step). You must regularly check that your pushes have been successful by logging in to the FIT Git Lab server's web interface; you must not simply assume they are working. Do not forget to check that your Git Lab author details are correct for every push. Before submission via Moodle, you must log in to the Git Lab server's web interface and ensure your final submission files are present. GIT automatically maintains a history of all files pushed to the server. You do not need to, and MUST not, add a version name to your various versions. Please ensure you use the  same name (chh_conceptual.pdf) for all versions of your solution. The steps to complete this task: Using LucidChart, prepare a FULL conceptual model (Entity Relationship Diagram) using crow’s foot notation for Caring Hands Hospital (CHH)  as described above. ●    For this FULL conceptual model (ERD), include: ○    identifiers (keys) for each entity ○   all required attributes, and ○   all relationships. Cardinality (min and max) and connectivity for all relationships must be shown on the diagram. ● Surrogate keys must not be added to this model. Your model must conform. to the unit ERD standards listed in the Applied 3: Conceptual Modelling (A3-2) lesson on ed. Your name must be shown on your diagram and it must be created as an A4 page. TASK 2 Caring Hands Hospital Normalisation [15 marks] The document shown on the next page is printed when a patient is about to be discharged from the hospital and contains all the procedures that have been carried out during their admission. Perform. normalisation to 3NF for the data depicted in the supplied sample document. This normalisation must be based only on the depicted forms content - you must not introduce attributes not shown on the document. The approach you must use is shown in the normalisation applied class solutions. you must begin by representing the document you are working on as a single UNF relation and then move through 1NF, 2NF, and 3NF. No marks will be awarded if you use a different approach. During normalisation, you must: ○ Not add surrogate keys. ○ Include all attributes shown on the from (you must not remove any attribute as derivable) ○          Clearly show UNF, 1NF, 2NF and 3NF. ○          Clearly show all candidate keys for each relation in 1NF. ○ Identify the Primary Key in all relations by underlining the PK attribute/s. ○ Identify all dependencies at the various normalisation stages (Partial at 1NF, Transitive at 2NF and Full at 3NF). You should use the same notation as depicted in the normalisation sample solutions, for example: attr1 -> attr2, attr3 If none exist, you must note this by stating: No partial dependencies present and/or No transitive dependencies present ○ Carry out attribute synthesis if required. The relation and attribute names used throughout your normalisation and those on your subsequent logical model must be the same. Your normalisation must be carried out in either an MS Word or Apple Pages or Google document with a filename of chh_normalisation. If you are using MS Word or Pages (preferred) place the source document inside your local assignment 1 Git Lab repo. As you develop your normalisation the source document must be regularly saved and pushed to Git Lab. If you are using a Google document, you must regularly download the normalisation as a file called chh_normalisation.pdf and push it to Git Lab. Your normalisation must have at least three pushes (remember all pushes must be of a file with the same name - chh_normalisation ) to GitLab. The file extension for chh_normalisation will depend on which software you choose to use. Ensure that your name is shown on every page of the normalisation. TASK 3 Caring Hands Hospital Logical Model [55 marks] Caring Hands Hospital have supplied some further information to guide your modelling: ● For accounting purposes, each item is assigned to a unique cost centre, such as Pharmacy,  Radiography or Patient Aids. A cost centre is identified by a cost centre code, your design must also record the cost centre's title (such as Pharmacy) and the manager's name. CHH wishes to be able to add new cost centres as needed. They    wish the manager's name to be treated as as simple attribute ie. not be decomposed. ●    Beds at CHH are classified (their bed type) as either fixed or adjustable. Not all beds are supplied with a bedside telephone. CHH wish to be able to identify the date and  time a patient is assigned to a particular bed. ●    Doctors titles must be one of: Mr, Mrs, Ms, Dr, AProf, or Prof - this range of titles will not be extended and will be stored as listed (not abbreviated further). 1.    Prepare a logical level design for the Caring Hands Hospital database based on your Task 1 Conceptual model, the normalisations you carried out in Task 2 above and further details supplied here in Task 3. ●       The logical model must be drawn using the Oracle Data Modeler. Information engineering or Crow’s foot notation must be used to draw the model. Your logical model must not show data types. You must create a new empty folder, in your local repo, in the Ass1 folder, called chh_model, and then place your model inside this folder naming the saved model as chh_logical. ●       All relations depicted must be in 3NF. Candidate keys are possible natural keys; you must ensure your model protects all candidate keys to maintain the business rules. ●       You must add at least one surrogate key to your design (you are free to select the most appropriate relation to make this change in). You must explain why you added the surrogate key to your chosen relation as part of your assumptions. We have a unit rule about requiring a surrogate key if the relation has a composite key with more than two attributes, but this is not the only reason you might add a surrogate. You may add surrogate keys to multiple relations if you wish. ●       All attributes must be commented in the database (i.e., the comments must be part of the table structure, not simply comments in the schema file). ●       Check clauses/look-up tables must be applied to attributes where appropriate. ●       You MUST include the legend in your model. Please edit the legend panel to show your name and ID number. ● Please carefully check the slide "Overall Design Process - checklist" from the Topic 5 Workshop and ensure you follow the steps listed. ●       Your GIT repository must indicate your development history with multiple commits/pushes as you work on your model. A minimum of six pushes is required for your logical model, as it is developed, so as to show this history. You are free to make more pushes/commits and are encouraged to do so. 2. Generate the database schema in Oracle Data Modeler and use the schema to create the database in your Oracle account. The only edit you are permitted to carry out to the generated schema file is to add header comment/s containing your details and the commands to spool/echo your run of the script. (as illustrated in Applied 6 Logical Modelling). In generating your schema file,  ensure you: ●       Capture the output of the run of your schema statements using the spool command. ●       Ensure your script. includes drop table statements at the start of the script. ●       Name the schema file as chh_schema.sql. Please note when working with your model, ensure that you NEVER select any export options from the Data Modeler menu: such actions can fill your Oracle account space and render it unusable. Tasks 1, 2 and 3 - Use of Modeling Standards/Meeting Submission Requirements and Git usage [15 marks] See the Marking Guide section of this document for further details. Use of Generative AI tools In this assessment, you can use generative artificial intelligence (AI) in order to assist with design decisions only. Any use of generative AI must be appropriately acknowledged (seeLearn HQ) Submission Requirements The following seven files are to be submitted and must also exist in your FITGit Lab server repo: ● A single-page pdf file containing your full final conceptual model.  Name the file chh_conceptual.pdf. This file must be created via File - Export (or Download As) -    PDF from LucidChart (do not use screen capture) and must be able to be accessed with a development history via GIT. You can create this development history by downloading your PDFs (don't forget to use the same name chh_conceptual.pdf - DO NOT use version 1 etc) and committing/pushing to GIT as you work on your model. In exporting from LucidChart, please select a page size of A4. ● A PDF document showing your full normalisation of the sample "Admission Procedure Charge Sheet" document showing all normal forms (UNF, 1NF, 2NF and 3NF). Name the file chh_normalisation.pdf ●  A single-page PDF file containing the final logical Model you created in Oracle Data Modeler. Name the file chh_logical.pdf. This pdf must be created via File - Data Modeler - Print Diagram - To PDF File from within Data Modeler, do not use screen capture. ●  A zip file containing your Oracle Data Modeler project (when zipping these files, be sure to include the .dmd file and the folder of the same name). Name the zip file chh_model.zip. Part of the assessment of your submission will involve your marker extracting your    model from this zip, opening it in Data Modeller, and engineering to a new Relational model. From this, your marker will generate a schema, which will then be compared  with your submitted schema (they must be the same for your schema to be accepted). For this reason, your model must be able to be opened by your marker and contain your complete model (i.e. both your logical and relational models) otherwise, your submission will not be able to be fully marked, resulting in significant loss of marks. You MUST carefully check that your model   is complete - ensure you take your submission archive, copy it to a new temporary folder, extract your submission parts, extract your model and ensure it opens correctly before submission. Please view the video on Ed under the lesson "A6 Oracle Data Modeler Support Videos", which demonstrates this process. ●   A schema file (CREATE TABLE statements) generated by Oracle Data Modeler. Name the file chh_schema.sql ●   The output from the Oracle spool command showing the tables have been created. Name the file chh_schema_output.txt ● A PDF document containing any assumptions you wish to make your marker aware of. Name the file chh_assumptions.pdf. If you have made no assumptions, submit the document with a single statement saying, "No assumptions made". Your assignment MUST show a status of "Submitted for grading" before it will be marked. If your submission shows a status of "Draft (not submitted)", it will not be assessed and will incur late penalties after the due date/time.

$25.00 View

[SOLVED] INMR77 Business Intelligence and Data Mining 2024-25R

Module Code and Title INMR77 Business Intelligence and Data Mining Academic Year 2024-25 1. Submission details Submission deadline Friday 7/02/2025 Submission point Blackboard Turnitin File type PDF Word □ Excel □ Other: Enter text here Formatting guidelines (in MS Word) Structure (e.g. required sub- sections) See coursework specification Size of assessment (word limit or length) and penalty applied A 20-page or 5,000-word (with a variation of 10%) report - see coursework specification for question and specific details Referencing style Harvard ooo

$25.00 View

[SOLVED] RSM 219 CLASS 1 TUTORIAL Introduction to Financial ReportingR

RSM 219 | CLASS 1 - TUTORIAL: Introduction to Financial Reporting QUESTION (17 marks) Tesla Inc. describes itself as follows: We design, develop, manufacture, sell and lease high-performance fully electric vehicles and energy generation and storage systems, and offer services related to our products. … Our mission is to accelerate the world’s transition to sustainable energy. (Source: Tesla 2023 annual filing, also called “10-K” filing, in the US) Tesla’s online FAQ notes: Tesla has never declared dividends on our common stock. We intendon retaining all future earnings to finance future growth and therefore, do not anticipate paying any cash dividends in the foreseeable future. PART 1 (6 marks) REQUIRED: Use Tesla’s balance sheet and income statement information. Determine the missing numbers. ROW /COLUMN: A B C D E 1 Balance Sheet, as at ($m USD) Dec. 31, 2023 Dec. 31, 2022 Dec. 31, 2021 Dec. 31, 2020 Dec. 31, 2019 2 Assets 3 Cash 16,398 16,253 17,576 19,384 6,268 4 Non-cash assets A4 66,085 44,555 32,764 28,041 5 Total assets A5 82,338 62,131 52,148 34,309 6 Total liabilities 43,009 36,440 30,548 28,418 26,199 7 Equity: 8 Contributed equity 34,895 32,180 29,806 27,261 12,737 9 Retained earnings (deficit) A9 12,885 329 (5,399) (6,083) 10 Other equity and items 832 833 1,448 1,868 1,456 11 Total Equity A11 45,898 31,583 23,730 8,110 13 14 Income Statement, for fiscal year ($m USD) Dec. 31, 2023 Dec. 31, 2022 Dec. 31, 2021 Dec. 31, 2020 Dec. 31, 2019 15 Revenues 96,773 81,462 53,823 31,536 24,578 16 Cost of revenues A16 60,609 40,217 24,906 20,509 17 Gross profit A17 20,853 13,606 6,630 4,069 18 Other expenses and items 2,663 8,297 8,087 5,909 4,931 19 Net income attributable to Tesla shareholders 14,997 12,556 5,519 721 (862) A4: Non-cash assets on Dec. 31, 2023 A5: Total assets on Dec. 31, 2023 A9: Retained earnings on Dec. 31, 2023 A11: Total equity on Dec. 31, 2023 A16: Cost of revenues for year ending Dec. 31, 2023 A17: Gross profit for year ending Dec. 31, 2023 PART 2 (2 marks) REQUIRED: Use Tesla’s financial information (including from previous page) to calculate the two key ratios for 2023. Ratio Dec. 31, 2023 Dec. 31, 2022 Dec. 31, 2021 Dec. 31, 2020 Dec. 31, 2019 Debt-to-Equity ratio 0.79 0.97 1.20 3.23 Return on Equity ratio 32% 20% 5% -12% Debt-to-Equity ratio on Dec. 31, 2023: Return on Equity ratio for year ending December 31, 2023: PART 3 (4 marks) REQUIRED: How are Tesla’s assets financed, and how has this changed overtime? What do you expect going forward? PART 4 (5 marks) REQUIRED: Classify Tesla’s 2023 cash transactions below as operating, investing, or financing. Write “+” (if cash is increasing) or “-” (if cash is decreasing) in the correct column. Transaction Operating Investing Financing Tesla paid $19.1 billion to purchase financial investments (e.g., shares of other companies) Tesla paid $8.9 billion to purchase property and equipment Tesla borrowed $3.9 billion in debt Tesla repaid $1.4 billion in debt Tesla received $12.5 billion from sale and maturities of financial investments

$25.00 View

[SOLVED] Event Staffing Budget Development an Annual Operating Budget SQL

Event Staffing Budget Development & an Annual Operating Budget Scenario You have been hired as the assistant director of a new 10,000-seat arena in New City, Ohio. The venue will be a full-service, multi-purpose arena with a projected event schedule that includes the following events (with projected attendance figures and event length): · 38 home minor league hockey games (average attendance, 5,500) (3.5 hours / game) · 20 home Division 1 college basketball games (average attendance, 8,500) (3 hours / game) · 5 Disney On Ice performances (average attendance, 6,500 per performance) (2.5 hours / performance) · 6 Ringling Brothers Barnum & Bailey Circus performances (average attendance, 7,500 / performance) (2 hours / performance) · 1 The Original Harlem Globetrotters event (projected attendance, 8,000) (1.5 hours / show) You have been asked to put together an estimated staffing budget based on the following formulas: · 1 usher (per 250 attendees) at $8.00 hr · 1 usher supervisor (per 10 ushers) at $10.00 hr · 1 peer security guard (per 300 attendees) at 8.50 hr · 1 peer security supervisor (per 15 peer security guards) at $11.00 hr · 1 ticket seller (per 1,500 attendees) at $9.00 hr · 1 ticket taker (per 1,000 attendees) at $8.50 hr · 1 event coordinator (per 3,000 attendees) at $18.00 hr · 1 police officer (per 2,000 attendees) at $30.00 hr · 1 EMT (per 3,000 attendees) at $23.00 hr Assignment  1. Based on the information above, a. Create an Excel spreadsheet with appropriate formulas to serve as a template for calculating your staffing expenses for each event. Use this tool to calculate the total projected event staff expenses for each event type and then the event staffing budget for the first year of the new arena. b. How many attendees do you welcome annually? 2. Analyze the attached annual operating budget. Look at the revenue streams, expense categories and the costs. a. What is the yearly result of their operations? b. How many events contribute to the overall rent revenue? c. How do you understand Commissions as a revenue category? d. What can you say about the food service? Are they profitable? Are they provided in-house or using an outside provider?   e. On average, how much money do you make from concessions per event? 

$25.00 View

[SOLVED] CHEM191 Practice Test 2 Java

CHEM191 Practice Test 2 Quiz instructions Question 1 4 pts What is the difference between an exothermic reaction and an endothermic reaction. Explain how the temperature of the surroundings changes with an exothermic and endothermic reaction Question 2 3 pts The following picture shows the reaction of zinc metal with and aqueous solution of hydrochloric acid to produce hydrogen gas. Provide TWO ways that the reaction components could be changed in order to make the reaction produce the gas at a faster rate. Justify your answer using collision theory. Question 3 3 pts Explain, what a catalyst is and how does it speed up a reaction Question 4 1 pts Identify the type of reaction is shown below? Displacement Exchange Decomposition Combination Question 5 1 pts The following pairs of aqueous solution are mixed, which WILL result in the formation of a precipitate? zinc sulfate + sodium chloride lead nitrate + calcium chloride ammonium sulfate + sodium nitrate lithium oxide + sodium chloride Question 6 3 pts Explain why the following equaton below forms Fe(OH)3 as a solid precipitate and an aqueous soluton of NaCl. Justfy your answer by referring to the solubility rules and identfy the spectator ions. Question 7 1 pts What is the oxidation number of each iron atom in Fe2O3 ? +6 -2 +3 -3 Question 8 2 pts In the balanced redox equation below, which species is the oxidant and reductant (respectively)? Mg + H2SO4 → MgSO4 + H2 Mg, H2SO4 H2, MgSO4 Mg, H2 H2SO4, Mg Question 9 1 pts Which of the following is a correct expression for the equilibrium constant K for the equilibrium reaction below? A B C D Question 10 1 pts The equilibrium constant for the reaction, What is the equilibrium constant for the reaction shown below under the same conditions? 600 4.95 49 0.0408 Question 11 1 pts In the reaction below, which one of the sets below constitutes an acid-conjugate base pair? H2O, H3O+ H2PO4 - , H2O H2PO4 - , H3O+ H2PO4 - , HPO4 -2 Question 12 2 pts Explain, using the definitions of strong and weak acids, why the picture below for Solution 3 represents a strong acid and that for Solution 2 represents a weak acid. Question 13 2 pts Identify the functional groups marked (i) to (iv) in the molecular structure given below. Question 14 4 pts Give the systematic name for the following three organic compounds Question 15 1 pts Identify the type of reaction occurring below: Substitution Oxidation Addition Esterification Question 16 1 pts Identify the type of reaction occurring below: Substitution Oxidation Addition Elimination Question 17 2 pts Identify the reagents A and B required to carry out the following reactions Question 18 1 pts What do these hazard lables represent? Ecotoxic, Flammable Corrosive, Flammable Toxic, Oxidiser Ecotoxic, Oxidiser Question 19 1 pts It is important to remove the funnel from a burette because: It might hinder the reading of the burette. It might add impurities to the solution It might add a drop of solution and change the reading It might cause the burette to tip over. Question 20 35 pts You should write your answers out, scan them to make a pdf file and then upload your file. This will need to be completed within the given time frame. a .Calculate the value of ∆ H of reaction for (show your working): Using the bond enthalpies, Δ H (kJ mol ): C-C +346 C-H +414 H-H +436 CtriplebondC = +839 b .Calculate the energy (kJ) absorbed when 250 g of carbon monoxide decomposes to produce carbon and oxygen. M(CO) = 28 gmol-1 c. Balance the following redox equations using the half equation method d.The production of methane gas (CH ) from carbon and hydrogen gas is an equilibrium reaction. Describe the effect of each of the following changes on the equilibrium concentration of methane (increase, decrease, stay the same). Justify your answers using Le Chatelier’s principles i. H2 gas is removed ii. Decreasing the temperature of the reaction mixture iii. The pressure of the system is increased e. A solution of sulfuric acid, H SO (aq), has concentration of 0.0056 mol L-1. Calculate the following: i. the [OH ] concentration Kw = 1.00 x 10-14 ii. the pH and indicate if it is acidic or basic f. Draw the structural formula of the following organic compounds i.1-chloro-1-methylcyclohexane ii.2-methylbutanoic acid iii. 4-ethylhexan-3-ol g. Draw the strutural monomer form. which this polymer could make h.The molecule pent-2-ene, CH CH=CHCH CH , can exist as geometric isomers. i.Draw the cis and the trans isomers . ii. Explain why the molecule pent-2-ene has geometric isomers. i. Write the structural formulae for Compounds 1 and 2, and give the names or formulae for Reagents, X, Y and Z. j. Three 20.00 mL portions of sodium hydroxide, NaOH, were titrated with aqueous hydrochloric acid, HCl (aq), with concentration 0.1045 mol L-1. The following titres were obtained: 20.26 mL, 20.27 mL and 20.32 mL. Calculate the concentration of the sodium hydroxide solution.

$25.00 View

[SOLVED] INMR77 Business Intelligence and Data Mining 2025 R

INMR77 Business Intelligence and Data Mining 1. The Case Opportunities and Challenges of Sharing Economy: Airbnband InsideAirbnb Airbnb - Holiday Lets, Homes, Experiences & Places Airbnb (Airbnb.co.uk) is an online marketplace for arranging or offering short-term rental/lodging i.e. temporary accommodation, primarily homestays, or tourism experiences. It was founded in August 2008 by Brain Chesky and friends, and it currently has 6,300 employees as in 2021. Airbnb went public with a valuation of over $100 billion on December 10, 2020, making it one of the largest IPOs (Initial Public Offerings) of 2020.  It is reported that Airbnb capital market was  more  than  the  top  three  largest  hotel  chains  (Marriott,  Hilton,  and  Intercontinental) combined. Though some are calling over evaluation, the company lacks traditional mortgages, employee  fees,  and  maintenance  fees  which  burden  hotels.  Airbnb  hosts  pay  their  own mortgage and clean their apartments, leaving the company much freer of debt, thus making it far more valuable. Airbnb service overview Airbnb provides a platform for hosts to accommodate guests with short-term lodging and tourism-related activities. Guest can search for accommodation using filters such as location, price,  specific  types  of  home.  Before  booking,  users  must  provide  personal  and  payment information.  Some   hosts  also   require  a  scan  of  government-issues   identification  before accepting a reservation. Hosts provide prices and other details for their rental or listing e.g. number of guests included in the price, type of property, type of room, number of bathrooms, number of bedrooms, number of beds and type of bed, and minimum number of nights for a reservation, and amenities. In addition, Airbnb provides a guest review system where hosts and guests can leave reviews about  their  experience,  and  rate  each  other  after  a  stay.  However,  the truthfulness  and impartiality  of  reviews  may  be  adversely  affected  by  concerns  of  future   stays   because prospective hosts may refuse to host a user who generally leaves negative reviews. Besides, the company's policy requires users to forego anonymity, which may also detract from users' willingness to leave negative reviews. Criticism of Airbnb Airbnb has attracted criticism for increasing housing/residential rental prices in cities where it operates and creating nuisances and security issues etc for those living near leased properties and has negatively affects the quality of life in residential areas, and housing crisis around city in the UK, USA and Europe. The company has attracted regulatory attention from cities such as San Francisco, New York City, and the European Union over the past number years. It has also faced challenges from the hotel industry and other, similar companies. Airbnb has made a quarter (25%) of its global workforce redundant in 2020 due to the global pandemic. But the news was welcome by some campaigners who were fighting for soaring rents in cities with large number of Airbnb hosts. The number of longer-term rental properties (i.e.  residential as  opposed  to short-term/holiday lets) in  central  Dublin  was  up  71%  on comparable period last year, as landlords abandoned short-term lets through Airbnb. Inside Airbnb – Adding Data to the Debate (insideairbnb.com) Inside Airbnb (insideairbnb.com) is an independent, non-commercial set of tools and data that allows individual to explore how Airbnb is really used in cities around the world. It was set up by Murray Cox and John Morries in 2016. Airbnb claims to be part of the “sharing economy” and disrupting the hotel industry by offering short-term rental/lodging. However, data shows that most Airbnb listings in most cities are entire homes, many of which are rented all year round (i.e. illegal listings)– disrupting housing and communities. Most recently, New York City’s plans to crackdown on illegal listings which could remove as many as 10,000 Airbnb listing is sparking fierce debates about housing, hotels, the tourist market and residents’ rights. By  analysing  publicly  available  information  about  a  city’s  Airbnb’s  listings,   Inside  Airbnb provides filters and key metrics so users can see how Airbnb is being used to compete with the residential housing market. With Inside Airbnb, user can ask fundamental questions about Ainbnb in any neighbourhood, or across the city as a whole, such as: •    how many listings are in my neighbourhood and where are they? •    how many houses and apartments are being rented out frequently to tourists and not to long-term residents? •    how  much  are  hosts  making  from  renting  to  tourists  (compare  that  to  long-term residential rentals)? •    which host are likely running a business with a multiple listings and where are they? These questions (and the answers) get to the core of the debate for many cities around the world, with Airbnb claiming that their hosts only occasionally rent the homes in which they live. In addition, many cities or state legislation or ordinances that address residential housing, short term or vacation rentals, and zoning usually make reference to allowed use, including: •    how many nights a dwelling is rented per year •    minimum nights stay •    whether the host is present •    how many rooms are being rented in a building •    the number of occupants allowed in a rental •    whether the listing is licensed Inside Airbnb is a mission driven project that provides data and advocacy about Airbnb's impact on residential communities with a vision where communities are empowered with data and information to understand, decide and control the role of renting residential homes to tourists. The  Inside  Airbnb  tool  or  data  can   be  used  to  answer  some  of  these  questions.  Some understanding of how the Airbnb platform is being used will help clear up the laws as they change. 2.   Coursework requirements The sharing economy has brought opportunities and challenges to homeowners, society, residents, communities and governments. One of the biggest issues with Airbnb is whether hosts are sharing the primary residence in which they live "occasionally" (i.e. genuine short- term rentals) or are renting out residential properties permanently as hotels. Airbnb could easily answer this question but instead it is up to us to shape our communities and solve our urgent need to house tourists, housing shortage/crisis, and to address the nuisances, security and safety issues etc for those living near leased properties by Airbnb. In this assignment, you are required to carryout data mining tasks using data of Airbnb listings of London, UK, from InsideAirbnb, and report your findings as a result your data mining/analysis. 2.1 The DATA The data is available to download from InsideAirbnb (http://insideairbnb.com/get-the-data) as shown in Figure 1 below. A copy of the data, for the purpose of this assignment, is also provided and available to download on the blackboard. http://insideairbnb.com/get-the-data (Search for London) Figure 1: London Data compiled by InsideAirbnbason 6 September 2024 As shown in Figure 1: 1) Listings.csv.gz contains detailed listing data of London. The data was compiled on 6 September 2024. Each row of the data represents a single listing and contains information about the host of the property, the property’s characteristics and overall rating of the property and its features by guests. There are 96,182 listings and 60+ variables in the data set. Listing can be deleted in the   Airbnb platform. The data presented is a snapshot of listings available at a particular of time as on and up to 6 September 2024. 2) Reviews.csv.gz contains the detailed reviews data for each listing. The data was used for a number of derived variables in the detailed listing data e.g. number_of_reviews, number_of_review_ltm, first_review, last_review, and reviews_per_months. 3) Calender.csv.gz contains detailed calendar data i.e. the availability calendar for 365 days in the future for each listing. In addition 4) A data dictionary – can be viewed and downloaded from https://docs.google.com/spreadsheets/d/1iWCNJcSutYqpULSQHlNyGInUvHg2Bo UGoNRIGa6Szc4/edit#gid=1322284596 2.2. Your tasks You are required to use the detailed listing data (listings.xslx) to find meaningful pattens and rules of whether hosts London are renting out residential properties as hotels/business or genuinely sharing the primary residence in which the live “occasionally” . You are expected to conduct literature search for the problem domain, and conduct data   exploration, data preparation, and model building using relevant methods and techniques introduced during the module. 2.2 What to deliver You are required to produce a report of 20 pages of A4 OR 5,000 words (+/- 10%), including tables and diagrams but excluding references and appendices. An appendix can be used to    include support materials to backup main body points where necessary. You are also required to submit the supplementary materials of your work using SAS Enterprise Miner and/or other files/evidences on blackboard by the specified deadline. The total of 100 marks will be allocated to the following aspects of the report, which should also be used as a guideline to structure the report. 1.    Introduction – Background and Data Mining goal (15%) Critically discuss with examples of problem and issues of Airbnb in the context of sharing economy, and a clear statement of the data mining goal. Use literature to support your    statements. 2.    Data Understanding (15%) In this section, you are expected to conduct exploratory data analysis e.g. summaries statistics and data visualisation, using suitable techniques and methods and report your key findings, including variables and measurement identified for your subsequent data preparation tasks. 3.    Data Preparation (15%) In this section, you are expected to take the variables  identified  in the  previous  step  and prepare them for your model building. This should include: a)    data cleaning e.g. missing data handling b)   data transformation e.g. creating new derive variables c)    data reduction (e.g. correlation analysis) You are expected to justify the approaches taken backup by relevant literature/sources. Make sure to include figures and tables (screenshot) to support your analyses and findings. 4.    Cluster Analysis and Results Interpretation (15%) In this section, you are expected to conduct cluster analysis i.e. identifying clusters/segments of listings based a combination set of variables e.g. host’s characteristic, listings/property’s characteristics and availability, and reviews from guests etc. This should include, a)    list of variables and clustering techniques used with reasoning for your cluster analysis b)   result interpretations and comments on the characteristics of the clusters/segments obtained. Make sure to include figures and tables (screenshots) to support your findings and analysis. Supplement materials can be provided at the appendix section. 5.    Classification Model Building and Model Evaluation (15%) In this section, you are expected to build a classification model based on the results obtained from  your  cluster   analysis.  Since  this   information  would   be   most  likely  to   be  used  to differentiate  those  listings/hosts  that  are   likely  to   be renting  out  residential properties permanently as hotels, it would be more meaningful to select segment/cluster(s) i.e. the target variable that would likely be defined as such or viceversa in your classification model. You should: a)    Conduct further data preparation and justify the variables used for your model building. b)    Model building and model evaluation – classification methods used and provide your reasoning. Make sure to include figures and tables (screenshots) to support your model buildings, analyses and findings. Supplement materials can be provided at the appendix section. 6.    Conclusion, critical reflection, and suggestion for improvements (15 marks) In this section, you should conclude the outcomes of your findings in relation to the data mining goal. Reflect your learning and discuss the limitations of your data mining process, this might include the assessment of the suitability of data and variables, methods and techniques used, assumptions made, and provide suggestion for model improvements. In addition, there are 10 marks allocated to the structure (clarity of organisation and structure - addresses all components of the assignment brief with appropriate weighting across each component, logical structure to the overall argument that is easy to follow), and presentation (e.g. effective use of tables and diagrams, proper use of citation and referencing in an Author-Year e.g., Harvard, APA format, length/page limit).

$25.00 View

[SOLVED] POL 2103 D INTRODUCTION TO INTERNATIONAL RELATIONS AND GLOBAL POLITICS Winter 2025 Python

INTRODUCTION TO INTERNATIONAL RELATIONS AND GLOBAL POLITICS POL 2103 D Winter 2025 Official Course Description Study of international relations and the dynamics within global order with an emphasis on key concepts, theories and analytic frameworks.  Analysis of contemporary issues and their impact on globalization and global relations. Course Learning Outcomes General Course Learning Outcomes · Appreciate the historical evolution of the international system of states · Identify the major theoretical undercurrents of international relations · Concretely apply theories of international relations · Recognize trajectories of change Specific Course Learning Outcomes · Identify the institutions underpinning international relations · Understand the strengths and limitations of mainstream and critical theories of international relations · Read, write, and communicate arguments more effectively Teaching Methods This course is organized into two 80-minute lectures per week.  Lectures are synchronous and they are not recorded.  To access the live lecture through MS Teams, students are strongly recommended to install the MS Teams app.  If the app is not installed, students will be prompted to download it when they click on the link for the lecture, which is available on the Brightspace course page.  If students do not have the MS Teams app, then the link must be opened using Chrome, Microsoft Edge, or Safari and the associated third party plugins must be accepted when prompted.  Students must contact uOttawa IT if they encounter any problem with MS Teams.  Class attendance and completing the required readings are necessary for success in this course. Completing the required readings prior to each class is critical for fully understanding lectures for the two are complementary.  Furthermore, the quality of the experience depends in large part on your preparation. Students who are unable to attend a lecture are responsible for obtaining notes on their own from their peers.  E-mails requesting notes from the course instructor or assistance with contacting other students to obtain notes will be told to refer to the syllabus on this matter. Interactions between the professor and students are an important part of this course.  Students are especially encouraged to contribute to lectures in a constructive manner by raising thoughtful questions in a respectful manner about the issues, ideas, concepts, etc. that are being raised during a lecture.  Often, such interactions help to clarify complexities and nuances. Individual meetings with the professor are an integral part of the learning process.  As such, students are urged to contact the professor using Skype during office hours in order to receive feedback on their progress in the course, to discuss their essay, and so on. Students are kindly asked to ensure that their microphones are muted when they join the lectures given that the background noise is distracting.  As well, students are under no obligation to turn on their cameras during the lectures and keeping them off is preferred given that not everyone has access to a reliable Internet service provider and/or unlimited bandwidth. Assessment Strategy Evaluation format Weight Due Date Final Date to Submit a Late Assignment Section I Test 20% February 7, 2025, 8:30-9:30 N/A Section II Test 15% March 12, 2025, 10:00-10:45 N/A Final Essay, 8-10 pages (double-spaced) 35% February 3, 2025, by 23:59 February 6, 2025 by 23:59 Final Exam 30% Held in-person during the Winter 2025 examination period N/A

$25.00 View

[SOLVED] Listening to Music MUZA99H3S Assignment 2 Brief Listening Investigation Winter 2025 SQL

Assignment #2: Brief Listening Investigation Listening to Music (MUZA99H3S) Winter 2025 Assignment Details General Description This assignment applies the elements of music we have learned thus far to a song of your choice.  The pedagogical goal of this assignment is to increase your retention of course content by making the content more relevant to your life. Specific Tasks Choose any piece of music that you like (EXCEPT a piece on the listening list for this class). Please identify the piece of music using the title, artist name (or composer name),and year (the year in which the recording was released). Discuss your chosen piece of music in relation to each of the following four musical elements: 1.   Genre 2.   Instruments 3.   Rhythm (and Time) 4.   Metre When you discuss each element, make sure to use two or more sub-concepts from the lectures. These sub-concepts should be terms discussed in the lectures in relation to the four musical elements above. Some examples of potential sub-concepts: Genre •  Genres (e.g. classical, hip-hop, jazz, pop, R&B) and subgenres (e.g., Baroque period, bebop, Bossa Nova, Motown) •  Common instruments in the genre (e.g., guitar, piano, voice) •  Common ensembles in the genre (e.g., band, choir, jazz big band, orchestra) •  Common forms in the genre (e.g., 12-bar blues, AABA, sonata allegro, verse-chorus) Instruments •  Orchestral families (woodwinds, brass, percussion, strings) •  Hornbostel-Sachs categories (aerophone, idiophone, membranophone, chordophone) •  Performance techniques (e.g., staccato, arpeggio, riff, pizzicato, strumming, walking bass) •  Instrument construction (e.g., valve, bell, mallet, drum set, fretboard) Rhythm/ Time •  Tempos (e.g., adagio, moderato, presto) •  Tempo changes (e.g., accel., rit.) •  The beat/ pulse •  Notes vs. rests (e.g., different note and rest values) •  Phrases (e.g., phrase lengths) •  Swing rhythm •  Arhythmic *Note that ‘rhythm and time’ is considered one musical element for the purposes of this paper; only two total sub-concepts must be used for rhythm and time together. Metre •  Metres (e.g., 2/4, 3/4, 4/4, 5/4, 6/8); including duple/ triple/ quadruple, and simple/ compound •  Bars/ measures •  Downbeat •  Upbeat (is there an upbeat?) •  Backbeat (is there a backbeat?) •  Syncopation (is there syncopation?) •  Mixed metre •  Ametric Using Concepts ‘Accurately’ Make sure you use the musical elements and relevant sub-concepts accurately. This means that you will need to demonstrate your understanding of the concepts by using them in contexts in  which they make sense. For example, if you incorrectly identify the genre or metre of your piece, or use a sub-concept wrong, you will not receive points for using those terms. You are welcome to do your own research in order to check that you have correctly applied course concepts to your chosen song. Length of Answers You should discuss the four musical elements for approximately 1-3 paragraphs each. Make sure to separate the elements clearly so that theTA grading your assignment knows that you have responded to all four elements. For example, you can start the paragraph on rhythm/ time by saying “I am now going to discuss my song in relation to rhythm/ time” and then go on to mention the rhythm/ time in your chosen song. In total, the document should include approximately 750 words. *Additional Requirement — Include Link to Recording* Please make sure to include a link to your chosen audio recording within your assignment. This  should be a link to either YouTube or Spotify ONLY (i.e., no other streaming services). You can add the link by copying and pasting the web address directly into your assignment, or creating a hyperlink in your word processor. If you do not provide a link to your chosen piece, the grader may have difficulty finding a recording, which could result in a lower grade. Prompts to Get You On the Right Path Starting Your Assignment You can start your assignment by stating the title, artist name, and year of your chosen piece of music, and providing a link to the recording. Then you can talk a bit about why you chose this piece of music. Is it your favourite song? Is it a piece of music which has been meaningful to you for some time? Discussing the Genre of Your Chosen Song Identify the genre and potentially also the subgenre of your song, then see if you can identify other elements related to the genre. What is the ensemble? Is this the typical ensemble in this genre? How does the date of this recording compare to other recordings in the genre? Discussing the Instruments of Your Chosen Song Try to identify some of the instruments heard in your chosen piece of music. What are the families/ categories of these instruments? Are there any special performance techniques being used? Discussing the Rhythm/ Time of Your Chosen Song What is the tempo of your chosen song? Does it stay the same throughout, or does it change at all during the piece? What are the phrase lengths (i.e., how many bars per phrase)? Is swing rhythm    used at all? Is any part of your song arhythmic? Discussing the Metre of Your Chosen Song What is the metre of your chosen piece of music? Is there an upbeat? A backbeat? Syncopation? If it does feature an upbeat, a backbeat, or syncopation, how are these concepts used in the song?    Is any part of your song ametric? Ending Your Assignment No special ending is required here, but you may wish to tie your investigation together by mentioning what you learned about your chosen song through this assignment, and how you might apply these concepts to other music you listen to in the future. Grading Rubric Category Description Point Calculation Points Discussing Genre The student accurately discussed the genre of their chosen piece of music, mentioning two relevant sub- concepts. 1 point is awarded for each   genre-related sub-concept     discussed accurately, up to a maximum of 2 points. *Note that genre and subgenre count as 1 point; these are not separate sub-concepts. 2 Discussing  Instruments The student accurately discussed the instruments used in their chosen piece of music, mentioning two relevant sub-   concepts. 1 point is awarded for each instrument-related sub-concept discussed accurately, up to a maximum of 2 points. 2 Discussing Rhythm and Time The student accurately discussed rhythm/ time in relation to their chosen piece of music, mentioning two relevant sub-concepts. 1 point is awarded for each     rhythm or time-related sub-     concept discussed accurately, up to a maximum of 2 points. 2 Discussing Metre The student accurately discussed the metre of their chosen piece of music, mentioning two relevant sub- concepts. 1 point is awarded for each   metre-related sub-concept     discussed accurately, up to a maximum of 2 points. 2 Using Complete Sentences and    Paragraphs The student wrote their assignment using complete sentences, grouped appropriately into paragraphs. 1 point is deducted if the     assignment is not written in complete sentences and paragraphs. 1 Writing ~750 Words The student wrote a total of approximately 750 words. 1 point is deducted if there are fewer than 650 total words or   more than 850 total words. 1

$25.00 View

[SOLVED] Mechanics-1 Short Laboratory Reports Matlab

Mechanics-1: Short Laboratory Reports Overview The aim of the short laboratory reports to be submitted for LC Mechanics-1 is to outline the main sections and content expected from a professional laboratory report. These reports are intentionally short, and should be easily completed within 1 week. While reports, and even theses, in future years of your degree may contain much more detailed explanation, they will likely contain a similar generic structure and sections. Presentation The report should be composed of a 3-page report and a 1-page appendix containing sample calculations. Two additional pages are allowed: a title page, and a references page. Thus, no report should exceed 6 pages. Submission of all lab reports will be via CANVAS. The report should: •    be word processed and submitted as a pdf file; •    not exceed 4 A4 pages including the 3-page report and 1-page of calculations (i.e. 6 pages when including a title page and a references page); •    have margins set at 2.54 cm, top, bottom, left and right;              be    written using an Arial font, point size 11; •    use single line spacing for the text. Note, for each formatting rule broken your overall marks will be capped: 1 rule = 70% maximum, 2 rules = 60% maximum, 3 rules = 50% maximum, 4 rules = 40% maximum Late submissions will have a penalty applied of 5% per day late. Quality of Written English A report must meet the following standards to pass: •     The work is written / spoken to an acceptable standard of English •     Spelling, punctuation, vocabulary, sentence construction, and textual coherence is of an acceptable standard. A report that does not reach the above standard or falls into the categories below will fail: •     Poor standard of written / spoken English, making it difficult to understand the points being made. •     Weaknesses of writing / speaking are so frequent or serious that they impede communication. The format should include the following components: Title Page As minimum, the lab title and number, date of experiment, and your lab group number (e.g. A1, C2, etc.) should be included on a title page. Executive Summary (150 words) This section should not exceed 150 words and should summarise the report, including the study aim, methods used, results obtained and key conclusion(s). Introduction and Background (½ page including Aim & objectives) This section introduces the reader to the background of the experiment and explains the purpose/value of the study. Reference to the literature may be used to provide context. Aim and Objectives This section should provide a concise statement of the overall aim of the experiment, and the objectives to be completed to achieve this aim. Methods (¾ of a page) This  should  include  an  explanation  of  the  methodology  used,  including  any  data analysis and equations used for calculations. SI units should be used throughout. This section should not read like a lab-manual (e.g., it should not use comments such as,   “First we lifted the lid, then we placed the masses in the slots”; instead it should state, “Two masses, 0.05 kg each, were placed 50 mm from the centre of rotation…”). Results (¾ of a page) This section should report the key results obtained, and any important observations. The results should be presented clearly, in tabular or graphical form. Commentary should be included which aids the reader in interpreting the findings, this narrative should refer to the Tables and Figures presented. Discussion (½ a page; including Conclusion) The discussion should emphasize the main findings from the study, and place these findings within  the  context  of  the  literature.  The  key  sources  of  error  should  be highlighted and, where possible, the magnitude of any errors should be estimated. Conclusion The main findings from the study should be outlined, consistent with the initial study aim. This section should not exceed 3 lines of text; in-essence, it should provide the    ‘take-home message’ from the study performed. References References to textbooks should include: Authors, title, edition, place of publication, publisher, year of publication and page numbers, such as: Gere JM, and Timoshenko SP. Mechanics of materials. 4th SI ed. Cheltenham: Stanley Thornes Ltd, 1999, p. 27-37. Further styles, for book chapters, journal papers, and other material can be found at: https://studysites.uk.sagepub.com/repository/binaries/pdf/SAGE_Vancouver_r eference_style.pdf    

$25.00 View

[SOLVED] STATS 101/108 - Chapter 10 Distribution Tuari Task Java

STATS 101/108 - Chapter 10 Distribution | Tuari: Task Introduction In the Chapter 9 task, you investigated the difference in age of New Zealand companies of different industries. In this task we return to New Zealand business but we are going to investigate a different aspect of businesses. In the early days of the internet, businesses that wanted to attract New Zealand traffic to their website often chose the .co.nz domain extension. Search engines like Google tend to rank websites with local domain extensions higher when a search is done in a given country. Since 2013, a new domain extension was created .nz (without the .co ) and this is increasingly used by newer businesses. More global oriented Kiwi businesses, on the other hand, may opt for international domains, such as .com or .net . Watch this short clip about reasons for New Zealand businesses to choose a local domain extension. In this task, we will explore the distribution of domain extensions for New Zealand business web addresses from different industries. Q1 For this question, you need to explain why distributions may be different using contextual information. Similar to Task 9, for this investigation you will collect data using an app that takes random samples of businesses from different industries. The data was collected from the NZBN website, a website that stores key information for New Zealand businesses, such as the address, website, industry and when the business was first registered. Industries are defined as the following: Accommodation and Food Services Administrative and Support Services Agriculture, Forestry and Fishing Arts and Recreation Services Construction Education and Training Electricity, Gas, Water and Waste Services Financial and Insurance Services Health Care and Social Assistance Information Media and Telecommunications Manufacturing Mining Other Services Professional, Scientific and Technical Services Public Administration and Safety Rental, Hiring and Real Estate Services Retail Trade Transport, Postal and Warehousing Wholesale Trade In Q2 you will collect data using an app that takes random samples of businesses from three different industries. Note that the app will only sample registry entries that contain a web address. If a business has several websites in the register, we will consider only the first one. You need to decide which three industries you will investigate. Select three industries from the list above. You may use the same industries you investigated in Chapter 9 or choose other industries. Write down the three industries. Identify one industry that you have a hunch may have a higher proportion of .co.nz websites than the other two industries. Write one sentence explaining why you think this industry has a higher proportion of .co.nz websites than others. Go to the NZBN website (nzbn.govt.nz) and search for companies that have something related to the industry in the name. For example, searching “school” or “university” may allow you to find business in the “Education and Training” sector. Click through to some of the businesses in your search results and check the domain extension of their Website(s), i.e., what their website type. Is it .co.nz or something else, like just .nz , .com , .io ? Write one sentence about whether the information you found on the website supports your hunch. The three industries you will investigate: The industry you think will tend to have a higher proportion of .co.nz websites: Your sentence explaining why you think businesses from your selected industry may have a higher proportion of .co.nz websites: Your sentence explaining whether or not your hunch was supported: Q2 For this question, you need to write suitable hypotheses for a hypothesis test. The research question for this investigation is: Does website type change with industry? One of the variables you will use for this investigation is called website_type and has two levels: uses .co.nz and doesn't use .co.nz . The other variable you will use is called industry (based on the three industries you selected in Q1). Write down a suitable null hypothesis and alternative hypothesis for your investigation in context. The null hypothesis: The alternative hypothesis: Q3 For this question, you need to compare two sample proportions for website types between three different industries. Use the three industries from Q1 in the Mind your business app to generate data. The app will give you the website types of a random sample of 80 businesses from each of your chosen industries from the NZBN website. Copy the link to your data in iNZight Lite. Use the link to import the data into iNZight Lite. Generate a plot displaying the distribution of website type. Copy a screenshot of this plot. Generate a second plot that shows the distribution of website type by industry. Copy a screenshot of this plot. Identify the two industries that have the biggest difference in proportions of .co.nz website types. Find the sample proportions from the Summary tab and write one sentence comparing the two sample proportions for these industries. This needs to include words like “higher” or “lower”. The link to the data in iNZight Lite: The screenshot of the plot for the website type: The screenshot of the plot for the website type by industry: The sentence comparing the two sample proportions: Q4 For this question, you need to carry out and interpret an appropriate hypothesis test. Use the Inference tab in iNZight Lite to carry out a Chi-square test. Take a screenshot of the output, ensuring the p-value is included. Copy and paste this image into your answers. Summarise what you have learned by writing one sentence that answers the research question from Q2 by interpreting the p-value. A screenshot of the inference output from iNZight Lite: One sentence answering the research question: Q5 For this question, you need to consider how data could be used to compare risks, and explain a limitation of this approach. The NZBN register contains much more data, such as whether a business is currently in receivership because it failed to pay its debt. Consider how this data could be used in order to compare the risk of receivership for businesses in the three industries you investigated. Explain a limitation of using a risk estimate because it is based on sample data. Write two or three sentences. Construct your answer using the following structure. Copy and paste it into the template and complete your answers accordingly. Your answer: Q6 For this question, you need to reflect on the learning focus for this chapter (Distribution). Describe in your own words ONE important idea from this topic. Do not just copy one of the learning objectives or something from the notes or other learning resources. One sentence is enough, but you must write about your own personal reflection.

$25.00 View

[SOLVED] Programming FundamentalsJava

Diploma in Information Technology Programming Fundamentals Instruction for CA3 Group Assignment January 2025 Semester Assessment This assessment is over 100 marks. It constitutes 40% of the overall assessment. The group assignment will cover 30% and the group presentation will cover 10%. Rationale of Group Project The rationale of the group project is to enable collaborative learning with your peers and learning to work as a team, which is commonplace in workplace environment. Students learn to apply theories taught in class and textbooks to real world situations. In line with this objective, students are not allowed to reuse old assignments, or submit projects from previous semesters or copy largely from sources, particularly from the internet. Forming Group Students are to form. groups of 4 to 5 students per group. As this a group project, each member is expected to put in his/her fair share of the effort into the  project.  It is essential that groups manage their group effectively to complete this project. Students should resolve group dynamics issue and may seek the mediation through the  lecturer  as  early  as  possible.  Last  minute  mediation  will  not  be  entertained. Students may request for peer evaluation as a final resort if all mediation fails. Finally, the lecturer reserves the right to assign a mark to an individual student different from the rest of the group if that student is deemed not to have put in his/her fair share of effort into the project. The Group Task: You and your group members have been assigned to develop a  Cake Ordering System in Java that provides functionality for managing cakes, customers, and order information to a cake shop. The application should be able to: 1.  allow the cake shop staff to create, update, delete and view cakes. 2.  allow the cake shop staff to add, edit, remove and view customers. 3.  allow the cake shop staff to make and cancel orders. 4.  allow the cake shop staff to generate reports of orders by date, cake and customer. 5.  allow the cake shop staff to generate reports of total number of orders. 6.  provide error handling for any invalid inputs from the cake shop staff. Project Requirement With what you  have learned from the module, you  are task to develop the Java application with the following: 1.  Design a class called Cake to represent a cake that can be ordered for a Customer. Include attributes such as: -    Cake code (e.g. C001) -    Cake name (e.g. Chocolate cake) -    Cake price (e.g. 62.00) Include methods where appropriate. 2.  Design a class called Customer to represent a customer who orders a Cake. Include attributes such as: -    Customer ID (e.g. 1001) -    Full name (e.g. Jackie Chan) -    Contact number (e.g. 91111111) -    Delivery address (e.g. 123 Clementi Road, Singapore 599123) Include methods where appropriate. 3.  Design a class called Order to represent a cake order. Include attributes such as: -    Order ID (e.g. 50001) -    Order date (e.g. 29/01/2025) -    Cake -    Customer Include methods where appropriate. 4.  Design  a  class  called  CakeOrderingSystem  to  coordinate  the  overall application functionality. Include attributes such as: -    Cakes (ArrayList) -    Customers (ArrayList) -    Orders (ArrayList) Include methods to: -    Manage Cakes -    Manage Customers -    Manage Orders -    Generate reports Note: This would be the main class. You are to use all classes and methods created to  achieve  the  following  options  that  the  application  can  perform. Should you require additional methods to support the options, you are allowed to do so. 5.  Implement Error Handling where appropriate. 6.  Illustrate UML Class Diagrams for all classes. 7.  Aside from the Java program, your group is to write a Reflection word document not exceeding 3000 words. The reflection may contain the following pointers: -    Things you have learnt through doing the assignment. -    Challenges faced in programming or group work. -    Screenshot and explanation on unresolved/unachievable requirements. You are required to satisfy all requirements mentioned above. You are free to add more appropriate fields and methods to the any of the above Java classes. You need to handle all possible errors that will occur during the program execution. You may also refer to a sample command output shown in Appendices B, C, D, E and F. (Note: You do not need to follow the exact output. They are some guides to show the essence of the Cake Ordering System) Assessment Topics Topics 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17

$25.00 View

[SOLVED] Thermal Processing and Quality Optimisation for Juice Pasteurisation C/C

Assignment: Thermal Processing and Quality Optimisation for Juice Pasteurisation Scenario You have been hired as a consultant by a juice manufacturing company to design an optimal pasteurisation system for a new juice product. The company’s goals are to ensure microbial safety (achieving a 6-log reduction) while maintaining the desired taste quality, with a minimum Cook Value (Cv). They are also concerned about operational efficiency, fouling risks, and exploring the integration of biotechnology in juice processing. Assignment Objectives By completing this assignment, you will: 1. Perform. microbial inactivation and quality calculations. 2. Recommend an appropriate heat exchanger type and fouling management strategies. 3. Evaluate biotechnological advancements in juice processing. 4. Reflect on the key trade-offs in designing a food processing system. Assignment Tasks Task 1: Microbial Safety and Quality Retention (60%) The factory manager has provided data on microbial counts at various temperatures and times for the juice being processed. They have also specified that the desired taste quality requires a minimum Cook Value (Cv). Raw Data for Microbial Inactivation: Time Microbial Count Microbial Count Microbial Count Microbial Count (min) (CFU/ml) at 65°C (CFU/ml) at 70°C (CFU/ml) at 75°C (CFU/ml) at 80°C 0 1,000,000 1,000,000 1,000,000 1,000,000 1 500,000 250,000 125,000 62,500 2 250,000 62,500 15,625 7,812 3 125,000 15,625 1,953 488 4 62,500 3,906 244 30 5 31,250 977 31 2 6 15,625 244 4

$25.00 View

[SOLVED] CS6035 binary exploitation steps/scripts 2025 100%

Step 0:Welcome to the Binary Exploitation (BinExp) project for CS6035! We’re excited to have you with us for this effort.Binary exploitation is a really interesting and challenging domain within cybersecurity. It rests at the intersection of many sub-disciplines, including reverse engineering, low-level programming, operating systems, code review, etc. As such, you’ll be expected to draw upon a variety of subjects matter in approaching and working through the challenges of this project.Step 1:Before diving in, let’s ensure that our project work environment is appropriately configured.Below is a brief summary of the project’s contents:https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/00_intro.html      1/2 1/27/25, 12:54 PM             Flag 00 – Intro | CS 6035In all of the projects’ binaries, your goal is to have the binary read from /proc/flag! Most of the time, this is via a system() call like: system(“cat /proc/flag”);However, sometimes it’s not that simple – carefully analyze your source code within each challenge to figure out how the binary is meant to read from /proc/flag.Step 2:Enter into /home/binexp/binexp/00_intro and run the flag binary located there. Note the GTID it outputs to verify that the binary is reading the correct value from step 1, above. If so, copy the supplied hash and write it to the appropriate value in project_binexp.json.Finally, try submitting the project_binexp.json file to Gradescope to verify that the hash is correct. Remember, you have unlimited submission attempts for this project, so be sure to submit early and often.NOTE: Still confused? Try heading over to the corresponding Ed Discussion megathread and see if someone else asked a similar question. If not, pose your question there and a TA will respond as soon as they are able.(watch the intro video first please)This is a test on using GDB to read a few things that would be difficult to calculate (you can if you want to), but the main point of this task is to try running a few things in gdb and get comfortable with it first.cd ~/binexp/01_bb_steps/ gdb flagyou will be met with a pwndbg prompt which waits for you to run the program (or set breakpoints, etc) which we’ll do now: b mainsets a breakpoint at the first executable statement of the main() function. rruns the program and you will be met with some text/blocks showing various things like stack traces, register printouts, code prints, etc. Now next you will want to run the STEP command to go into the functionsAfter that, you will notice we are now in the bb_steps() function and can traverse all the code with the NEXT commandnWhich will execute each following instruction. This is useful if you don’t want to go into every single function call, and rather want to just execute those calls/instructions. https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/01_bb_steps.html              1/2 Pay attention to the register window which will show each register value as the instructions are executed.At the end of the ASM instructions, you will be prompted to enter in the answers for the two registers RBX and R15. You can enter these into GDB if you want to, however to get the official/valid flag for submission you will have to save your answers for the two registers, and then enter them into the non-debug binary run, e.g.:binexp@cs6035:~/binexp/01_bb_steps$ ./flag What value is currently in RBX?: 0xdeadbeefUpon correctly answering the questions, you will see your flag printed out, which you can copy into the json file! https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/01_bb_steps.html                                                                      2/2 (watch the intro video first please)This task is a very simple buffer overflow that, upon inspection, will check if a variable is non-zero. Using the information you have gathered from reading and the videos, it is your task to get this program to get to the call_me() function, and get the flag printed.Here are some steps I suggest you follow for the remainder of the project, that will set yourself up for success when debugging/analyzing/reverse engineering the binaries.Note: you are free to use GDB if you need to for this project but you need to run the program on the command line (i.e. ./e.py) in order to get the real flag for submission and submit it! https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/01_buffer_overflow_1.html                                                        1/1 In this task you will learn details about binaries compiled from C code (with gcc) in a Linux environment, and how some basic things can be exploited such as process redirection or control flow hijacking. The steps in this flag are discussed in-depth in the intro video.In this directory you have an executable binary named ‘flag’ which is vulnerable to a buffer overflow in one of its functions. We will be using an exploitation library called pwntools to automate some of the overflow techniques and get the binary to call a function it otherwise wouldn’t have. This function called ‘call_me’ generates a key using your Gradescope User ID to get a valid flag that will pass the autograder.Now we will run the binary just to see what the program is doing by running the executableWe see the binary is asking for a string, input any text you want or just press enter, and you’ll see that the program does nothing and just exits. That’s just to simplify the code so we can focus on the exploit.The binary is statically linked to a shared object which has a lot of methods that construct the key and has a simple function called ‘call_me()’ which will print out your key.This is where we will start learning about binary file formats. Without going into a deep dive about program structure, operating systems, compilers, assembly language, machine code, etc. you will still be able to understand that there are two aspects that are key in binary exploitationThese are logical locations the computer understands.A buffer overflow occurs when too much data is fed into an unprotected (or poorly protected) data buffer. The way that 64-bit C programs work is, a few bytes before the start of the stack frame (this is the function entry point), there is an address stored in memory called the Return Address. This Return Address is read into a register upon function return (when the function ends and intends to return to its caller), andthen process redirection to that address happens. If we override this location with another valid address, we can manipulate the control flow of the program and have it execute arbitrary (or otherwise unintended) code, with a well-formed attack. Starting off easy, we are going to modify e.py and learn a few basics of the pwntools library, which will build up into a successful attack at the end.Open e.py with your favorite text editor and analyze the content and comments.Once you understand what they do, proceed to fill in the cyclic size (this number is up to you, based on your understanding of the program and what would break it) to get a segmentation fault message by running$ ./e.py dbgThis will open up a gdb terminal with a breakpoint set at main()Type ‘c’ to continue from the breakpointWe see the program received an interrupt signal for a SEGMENTATION FAULT (SIGSEV, or an invalid access to memory). This happens when the program tries to access memory at a certain location that it either isn’t allowed to access, or doesn’t exist. In this case the return address for the function was overwritten by cyclic()’s data in the form of long strings of characters. Pay attention to the bottom of the screenshot where the instruction pointer is currently trying to ‘ret’ (return) to 0x6561……616b which is just a string of ascii characters in hexadecimal form. Now we know how to break the binary, let’s figure out how to purposefully break it. Using a pwntools method called‘cyclic_find()’ we enter in the bottom 32 bits (4 bytes) of the return string (in this example is 0x6561616b) which will give the number of characters before reaching that value. This is important because we are now going to reach our first step of control flow hijacking by overflowing enough data that we can place a value and change the course of the program’s normal path.In e.py, on the commented line below your cyclic command, we are now going to use cyclic_find() which will automate our buffer length calculation, and feed that number into cyclic(). Place in your 4 character bytes (preceded by a 0x, like 0x6561616b). Uncomment either of the lines beneath our original cyclic() call (one uses hex value and the other uses the ASCII values), and fill in the hex or ascii value described above This will fill the buffer with our calculated buffer length, appended by the ASCII byte equivalent of the variable by using another pwntools method p64(number). After you have done that, rerun./e.py dbgAnd hit ‘c’If done correctly, you should see something like this screenshot, where if you check the ‘ret’ instruction, we are now failing on an invalid access to our dummy address.Stepping away from the pwntools library for a moment, we now need to find something usable within the binary that will allow us to actually call a function or do something other than just crashing the program.Now we will use a linux command ‘objdump’ which takes a binary file and will output a dump of the binary which will give some key information about the binary. The -D flag will output binary addresses, machine code, and assembly code of the binary into a file. objdump -D flag > flag.asmThen open flag.asmYou will see a bunch of (likely) confusing information that at a high level translates to the code that you can see in the ‘flag.c’ file. You aren’t going to have to go through this file in any extreme expanse (unless you want to?) we are just going to focus on finding an address within the binary file that holds the machine code responsible for making a function call to ‘call_me()’.Search for the string ‘call_me’ in flag.asm and keep looking until you find the assembly instruction:call Note down the highlighted address showing the call (it will be different in your binary):With the hexadecimal value of the address above (prepend 0x to the value highlighted)Now run ./e.py again from the command line (without dbg) and check the terminal output.Did you get it? Awesome! Submit your first flag to gradescope (follow APPENDIX for more details) If not, retrace your steps in this task and also make sure you used the call call_me address in the earlier step and not the address of the actual function call_me() This flag shows a communication between a server and a client. The client binary (flag) will send data to the server, and the server appends some (very conveniently structured) data to that message and sends it back to the client. Your goal for this task is to have the server return the ideal data to overwrite the instruction pointer with the data that is returned from the server.Follow the same steps in previous tasks (buffer_overflow_2, more specifically) to break the program in gdb, and then figure out your buffer size, and try to fill in the response to correctly hit this function call!If you use the pwntools e.py file, it will start the server for you so there is no need to explicitly start the server.If you are running the program on the command line to experiment, then you must start the server each time you run the binary. You can either open a new terminal, and run ./server Or in the same terminal, each time you run the binary, run./server &Your task is to figure out the breaking point, and heavily inspect the last bytes that are returned from the server in order to get the right return and get the flag! This task will get you to determine which series of assembly instructions will direct the code flow into constructing a call to call_me(). Analyze the different instructions and look up the usage/behavior of them to figure out which combination will get you there.There is a small twist, however:In your earlier buffer overflow exercises, you made a concerted effort to jump precisely into the address of a particular instruction. This is for good reason; generally speaking, jumping into an instruction mid-way is not advised as it can result in unexpected behaviors. However – as may often be the case in exploit development – unexpected is not necessarily undesirable (and may even potentially work out in our favor!). While we should try and avoid “splitting” instructions where possible, we shouldn’t rule out testing such outcomes.You can use objdump or gdb to find the address of call_me() and figure out how you calculate it.For debugging, we highly recommend using gdb, setting a breakpoint on the gadget function, and stepping through the options once you think you know the correct path to get to the function call.(FYI:: you don’t have to use pwntools for this one)https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/02_assemble_the_assembly.html      1/2 1/27/25, 12:54 PM Flag 02 – Assemble | CS 6035https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/02_assemble_the_assembly.html                                              2/2 This Program (very conveniently) leaks out part of the libc base address this address is randomized via ASLR so it will change a little bit every time the program is launched run the program a few times and notice what bytes are different and which ones aren’tNext step will be analyzing the C file and see what we are comparing against in order to get to call_me – system() is a libc function, use GDB to get the address of system using command p system –run ./flag multiple times, it will ask you for input and your goal is to guess an address. Put in any random guess and try it a few times to see if you can notice a pattern versus what is leaked and what is being expected.Fortunately there’s only one byte that is missing from our formula, so we can do some scripting in python to try out the remaining values.Your task is going to be: – get the value leaked from the program – modify it with the offset of the system() function – fill in the remaining byte with a random value – send to the process – (repeat until you get a flag) note: i recommend using recvall() after you send in each payload, and write your loop logic around the output (see other flags for what kind of string output you can expect) to see if you got the right value! https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/02_bad_rand0.html 1/2https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/02_bad_rand0.html                                                                   2/2Task 02_p4s5w0rdSTRINGS!Now it’s time to learn a really useful technique to find all the available strings in a program.And by strings, we mean any collection of printable characters that exist in the binary. So things like variable names, hardcoded paths, debug messages, or eeeeevenn…. passwords? Hopefully not in a real program but you would be surprised.This binary has zero debugging information and you do not have the source code available, but guess what? The program is written terribly and is very unsafe, with passwords stored in plain text that can easily be dumped/searched in the binary!I would recommend running the program once or twice to see what it’s doing (checking a series of responses to questions) and if you get every question right, then you will get the flag!To get the strings for the program, run the command:$ strings flagThis will output it all to the terminal which isn’t super helpful, so would suggest redirecting output to a file like:$ strings flag > flag_strNow you will be able to grep/search/navigate the file in a new terminal and will (hopefully) be able to figure out what the correct responses would be for the given questions.(hint, strings are stored in the binary in the order that they’re written in the C code, might be a good idea to search for the questions they’re asking and it should be pretty easy to determine the answer from there!) Good luck!Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/02_p4s5w0rd.html                                                                     2/2Time to rev up those Reverse Engineering motors, because you need to unravel the logic that this program is checking against in order to get to the call_me() function!No buffer overflow this time, you just ‘simply’ need to input the right values that will correctly decode the logic and pass the checks.If you’re unfamiliar with C operators, this TUTORIAL has all the necessary operations detailed.Suggest pen and paper for this one to work through the logic by hand, or do a ton of experimentation to get the right value!XOR TRUTH TABLEXOR Operations are REVERSIBLE, meaning that performing the same XOR operation on a number twice will end up with the original number!Example:0b11110000 ^ 0b00001111 = 0b11111111=>0b11111111 ^ 0b00001111 = 0b11110000https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/03_XORbius.html              1/2 1/27/25, 12:55 PM             Flag 03 – XORbius | CS 6035 in Hex notation0xF0 ^ 0x0F = 0xFF=>0xFF ^ 0x0F = 0xF0Some students have likewise found it helpful to try and break down some of the elements of the binary within their own toy code; below is an example of such an effort using Programmiz.com:Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/03_XORbius.html                                                                      2/2 We see there is an unsafe() function which has some checks for different local variables. The positioning of these variables is important because they are declared before the input buffer which means that a buffer overflow will cause data to be overwritten.This program is a Buffer Overflow, however you will not be changing the control flow to a specific binary address (i.e. overwriting ret), rather you will need to enter in the right values to trick the pointer arithmetic logic and get to the call_me() function.Some students have likewise found it helpful to try and break down some of the elements of the binary within their own toy code; below is an example of such an effort using Programmiz.com:Disclaimer: You are responsible for the information on this website. The content is subject to change at any time.https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/03_pointy_pointy_point.html                                                      1/1You’ve made it! You are now on your final task. In this directory is the entire contents of /usr/bin, a collection of binary files that make up a lot of common linux uses. One of these files has been overwritten by our vulnerable flag program. It is your task to figure out which one.NOTE: just to make it explicitly clear, you will not find a binary named “flag” in this directory. There IS a binary compiled from the flag.c source code present, but it is renamed to something else, overwriting/replacing that binary.To help sort out what’s going on, we’ve supplied you with a checksums file. Inside the checksums file is – as you might guess – a list of known good checksums generated by the linux shasum command. You should leverage this checksums file to figure out which binary present is the vulnerable one; you are free to do this however you would like.NOTE: we suggest skipping over the ‘checksums’ file itself (as well as any additional files you might introduce during your hunt).Once you find the file it is time to begin our exploit. This is a bit more complex than the other flags and will require a full ROP (return oriented programming) exploit to chain calls together, and we will also need a new tool called Ropper to find a ‘gadget’ in order to supply a function argument and pass a specific check.In 64-bit programs, the function gets arguments through registers, in the case of intel architecture the RDI register supplies the first function argument.So we need to find a gadget (a piece of code that we can override the instruction pointer with, that will perform a certain action and then continue with the control flow hijack) that will pop a value from the stack into the RDI register.Let’s use ropper like this$ ropper –file flag | grep ‘pop’https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/03_hunt_then_rop.html      1/2 1/27/25, 12:55 PM             Flag 03 – Hunt/ROP | CS 6035This will give you all gadgets within the binary that have a keyword ‘pop’ (spoiler, there’s a LOT of them). An objective for this task is to figure out what gadget will likely work best to get the required argument passed into the function you are trying to call. This Writeup is a helpful reference to understand how calling convention works for x86_64 cpu’sNote the addresses that are output for each gadget. Once you find a gadget you think will work, we will need that as our first override value in pwntoolsPictorially, this is what our crafted exploit needs to look like (remember stack grows down)Now we will need to supply the argument, which will be on the stack immediately after our pop gadget, figure out what that value needs to be, and add it as p64() after the pop gadgetThen we need to put the address of the function as the next call, use objdump or gdb to find the addresses (you should probably get the second function address while you’re at it). The call to our pop gadget will ‘ret’ and then hit this second function call to enter one of the unsafe functionsFinally, we need to finish our execution chain by calling the second function which will allow for exploitation. Append that address to your chain and see if you get a flag!https://github.gatech.edu/pages/cs6035-tools/cs6035-tools.github.io/Projects/BinExp/03_hunt_then_rop.html                                                              2/2

$25.00 View

[SOLVED] Csci 4230 – assignment 7

For this assignment you must write the following predicates in Prolog. For the first six problems you can assume that the predicates parent, male, and female have already been defined. I have provided a file called assign7data.pl containing these definitions.1. Write a predicate mother(Mother, Child) that succeeds if Mother is the mother of Child. 2. Write a predicate father(Father, Child) that succeeds if Father is the father of Child. 3. Write a predicate sibling(Sibling1, Sibling2) that succeeds if Sibling1 and Sibling2 are siblings. Note that a person can not be their own sibling.4. Write a predicate first_cousin(Cousin1, Cousin2) that succeeds if Cousin1 and Cousin2 are first cousins. 5. Write a predicate ancestor(Ancestor, Descendant) that succeeds if Ancestor is an ancestor of Descendant. You will need to define this one recursively. 6. Write a predicate common_ancestor(Ancestor, Person1, Person2) that succeeds if Ancestor is an ancestor of both Person1 and Person2.7. Write a predicate do_reverse(List, Reverse) that succeeds if Reverse contains the elements of List in reverse. You may not use the built-in predicate reverse. 8. Write a predicate insert_item(Item, List, Result) that succeeds if Result contains the elements of List with Item inserted and both List and Result are sorted. You do not have to verify that List is sorted, you may assume that it is instantiated with the value of a sorted list. 9. Write a predicate insertion_sort(List, SortedList) that uses insert_item to sort List by first recursively sorting its tail, then inserting the head into the result to get SortedList. You may not use the built-in sort predicate.10. Write a predicate is_union(Set1, Set2, Union) that succeeds if Union is the union of Set1 and Set2, where Set1 and Set2 are unsorted lists of unique items. You may not use the built-in union predicate, but you may use the built-in member predicate. 11. Write a predicate is_intersection(Set1, Set2,Intersection) that succeeds if Intersection is the intersection of Set1 and Set2, where Set1 and Set2 are unsorted lists of unique items. You may not use the built-in intersection predicate, but you may use the built-in member predicate.What to Hand In Implement all of the functions described above in a source file called yourlastnameAssign7.pl with your actual last name. Make sure to put your name, CSCI 4230, and Assignment 7 in the comments (comments in Prolog start with % and go to the end of the line. Upload the source file to D2L to the dropbox called Assignment 7.

$25.00 View

[SOLVED] Csci 4230 – assignment 3

For this assignment you must write the following functions in Scheme: 1. Write a function called slope that takes two arguments, both pairs of numbers representing points, and calculates the slope of the line between those two points. 2. Write a predicate called square? that takes one argument, a number, and returns #t if that number is the square of two integers.3. Write a function called replace-first that takes two arguments, an item and a list, and returns a version of the list with its first element replaced by the item. If the list is empty (you can use the null? predicate to determine this) return the empty list.4. Write a function called replace-first! that takes the same arguments as replace-first but modifies the list itself using set-car!. 5. Write a recursive predicate called all-odd? that takes a list as an argument and returns #t if every number in a list is odd, and returns #f if any number in the list is even. If the list is empty, return #t.6. Write a recursive function called filter-odd that takes a list as an argument, and returns a list containing only the odd numbers in the original list. If the list is empty, return the empty list. 7. Write a recursive function called product that takes a list of numbers as an argument and returns the result of multiplying them all together. If the list is empty, return 1.8. Write a recursive function called smallest that takes a list of numbers as an argument and returns the smallest number in the list. The function does not need to work on the empty list. 9. Write a recursive function called remove-first that takes a number and a list of numbers as arguments and returns a list consisting of the items in the original list with the first occurence of the number removed. If the list is empty, return the empty list.10. Write a recursive function called selection-sort that takes a list of numbers as an argument and uses smallest and remove-first to perform a selection sort on the list. If the list is empty, return the empty list.What to Hand In Implement all of the functions described above in a source file called yourlastnameAssign3.scm with your actual last name. Upload the source file to D2L to the dropbox called Assignment 3.

$25.00 View

[SOLVED] Csci 4230 – assignment 5

For this assignment you must write the following functions in OCaml: 1. Write a function called quadratic that takes three arguments representing the three coefficients a, b, and c of a quadratic equation and uses the quadratic formula to calculate the two roots of the equation. If the discriminant b 2 − 4ac is negative, raise an exception called No_Real_Roots. Otherwise return a tuple containing the two roots, even if the roots are identical.2. Write a function called third that returns the third element of a tuple containing three items. 3. Write a recursive function called reverse that takes a list as an argument and returns a list containing the items in the original list in reverse order. You may not use any built-in list functions to do this, but you may use the @ operator to append two lists.4. Write a recursive function called member that takes an item and a list as arguments and returns true if the item is in the list and false otherwise. Use pattern matching to determine if the list is empty or not. You may not use any built-in list functions.5. Write a recursive function called union that takes two lists as arguments and returns a list containing all items that appear in either list with no duplicates. You may assume that each or the arguments contains no duplicates, but there may be items that appear in both lists. You may use the member function defined in the previous problem, but you may not use any built-in list functions.6. Write a recursive function called intersect that takes two lists as arguments and returns a list containing all items that appear in both lists with no duplicates. The same assumptions and restrictions apply as the previous problem.7. Write a recursive function called partition that takes a pivot item and a list as arguments, and returns a tuple containing a list of items from the list that are less than the pivot and a list of items from the list that are greater than or equal to the pivot. If the original list contains duplicate items then the partitions should also contain duplicate items. If the original list is empty, both of the partitions should be empty. You may not use any built-in list functions.8. Write a recursive function called quicksort that takes a list and sorts it by using the first item in the list as a pivot, partitioning the remaining items using that pivot, sorting the partitions, and appending the first partition to the pivot and the second partition. You may use the partition function from the previous problem, but you may not use any built-in list functions.What to Hand In Implement all of the functions described above in a source file called yourlastnameAssign5.ml with your actual last name. Make sure to put your name, CSCI 4230, and Assignment 5 in the comments (comments in OCaml start with (* and end with *)). Upload the source file to D2L to the dropbox called Assignment 5.

$25.00 View