Questions
Type a 2-3-page paper discussing your opinion on whether you believe organizations should implement SEIMs on...

Type a 2-3-page paper discussing your opinion on whether you believe organizations should implement SEIMs on their networks.

In: Computer Science

Square-Root Implementation & Performance Comparisons Square root operation is considered difficult to implement in hardware, in...

Square-Root Implementation & Performance Comparisons Square root operation is considered difficult to implement in hardware, in this project, you must Write and test a MIPS assembly language program to implement three algorithms of an 8-bit integer square root. Background: In mathematics, a square root (√) of a number x is a number r such that r 2 = x, or, in other words, a number r whose square (the result of multiplying the number by itself, or r × r) is x. Some of the algorithms for calculating square roots of a positive Integer number N are shown below:

1. Newton Raphson Method The Newton Raphson method was first used in Gray

2. Iterative method starts with an initial (guess) value and improves accuracy of the result with each iteration. Assuming that X the original number the iterative equations for calculating the reciprocal of it's square root is: Yi+1 = Yi (3 – X (Yi)^2) Once Y has been calculated, one can get the square root by multiplying with X. This algorithm has quadratic convergence. In each iteration multiplications and additions or subtractions are needed. In order to speed up the multiplier, there must be a special a algorithm such as Wallace tree to get the partial production and use a carry propagate adder to get the production, because the multiplier requires a rather large number of gates counts, it is not so practical to place many multipliers on FPGA. Also it is hard to get an exact remainder of the square root.

3-The Radix-2 SRT-Redundant and Non-Redundant Algorithm The Radix-2 SRT-Redundant and Non-Redundant method are similar. Since them both based on recursive relation. In each iteration, they will be one digit shift left and addition. The determination of a function is rather complex, especially for high radix SRT algorithm. The implantations are not capable of accepting a square root on every clock cycle. Also notice that these two methods may generate a wrong resulting value at the last digit position.

4- The Non-Restoring Algorithm The operation at each iteration is simple: addition or subtraction based on the result bit generated in previous iteration. The remainder of the addition or subtraction is fed via registers to the next iteration directly even it is negative. At the last iteration, if the remainder is non-negative, it is a precise remainder. Otherwise, we can obtain a precise remainder by an addition operation.

In: Computer Science

You have to perform the following tasks: 1- Write the name of best string matching algorithm...

You have to perform the following tasks:

1- Write the name of best string matching algorithm in terms of time and space complexity.

2- Implement it in (c or c++)

3- Dry run it on following strings:

- String A=aaabaaaabbaaabcaaabd

- String B=aaabd

Deliverable in PDF file:

Code + Dry run + Code execution results using the above given strings.

In: Computer Science

Research the internet for an example of a violation of sensitive information (data breach). Post a...

Research the internet for an example of a violation of sensitive information (data breach). Post a summary of the situation and outcome (as well as the source) and evaluate if controls were adequate to prevent the violation. What would you have done to protect the organization from this type of exposure in the future?

In: Computer Science

Hello, need this answered. thanks ​In IDS, what is the difference between anomaly based monitoring and...

Hello, need this answered. thanks

​In IDS, what is the difference between anomaly based monitoring and signature based monitoring?

In: Computer Science

Hi I'm trying to use a for loop in Matlab to run over the times inside...

Hi I'm trying to use a for loop in Matlab to run over the times inside a vector. For example N = [10 20 30], the for loop should run the first number of the loop 10 times once and then the same loop again 20 times and so on. So the program must run the loop 3 times but with the different numbers of the vector.

In: Computer Science

1.Which one of the following statements about refinement and abstraction is TRUE? Select one: Abstraction and...

1.Which one of the following statements about refinement and abstraction is TRUE?

Select one:

Abstraction and refinement are the same.


The process of describing more detail about how an instruction should be carried out is called abstraction.

Abstraction is the hiding of details that are not currently important.

Stepwise refinement is only possible with algorithms and not pseudocode.

Lower level details of how an abstracted algorithm is carried out never have to be written.

2.

What is the data type of the expression ’True’ ?:

Select one:

floating point

floating point

boolean

string

list

3.Which one of the following about data is FALSE?

Select one:


Data can only be in the form of strings.

Data is information.

Computer programs need data to do anything useful.

All input and output is data.

At a low enough level of abstraction, all data is numbers.

In: Computer Science

1, In the vector space models, you can use concepts or terms as basic vectors. Describe...

1, In the vector space models, you can use concepts or terms as basic vectors. Describe the advantages and disadvantages of these two types of vectors with respect to each other.

2. Consider following two words: {precision, precise}. Shall we cluster them together if we set-up the similarity threshold to be 0.5? Please justify your answer. (Hint: use the dice coefficient to compute the similarity.)

In: Computer Science

Write program numsODD that uses the method to create arrays of odd nums starting 1 of...

Write program numsODD that uses the

method to create arrays of odd nums starting 1 of the given length:

public static int[] getnumsOdd(int length) {}

int[] numbers = getnumsOdd(5);

System.out.println(Arrays.toString(numbers));

output:

[1, 3, 5, 7, 9]

In: Computer Science

Part 3 Write a C++ program that prompts the user for an Account Number(a whole number)....

Part 3

Write a C++ program that prompts the user for an Account Number(a whole number). It will then prompt the user for the initial account balance (a double). The user will then enter either w, d, or z to indicate the desire to withdraw an amount from the bank, deposit an amount or end the transactions for that account((accept either uppercase or lowercase). You must use a nested if statements instead of a Switch construct.

Test Run:

Enter the account number: 1

Enter the initial balance: 5000

SAVINGS ACCOUNT TRANSACTION

(W)ithdrawal

(D)eposit

(Z) to end account transaction

Enter first letter of transaction type (W, D or Z): w

Amount: $1000

Balance for this account is now: $4000.00

SAVINGS ACCOUNT TRANSACTION

(W)ithdrawal

(D)eposit

(Z) to end account transaction

Enter first letter of transaction type (W, D or Z): d

Amount: $500

Balance for this account is now: $4500.00

SAVINGS ACCOUNT TRANSACTION

(W)ithdrawal

(D)eposit

(Z) to end account transaction

Enter first letter of transaction type (W, D or Z): z

No more changes.

Balance for this account is now: $4500.00

Press any key to continue . . .

In: Computer Science

Write a program that uses a structure to store the following data on a company division...

Write a program that uses a structure to store the following data on a company division in c++

  • Division Name (such as East, West, North, or South)
  • First-Quarter Sales
  • Second-Quarter Sales
  • Third-Quarter Sales
  • Fourth-Quarter Sales
  • Total Annual Sales
  • Average Quarterly Sales

The program should use four variables of this structure. Each variable should represent one of the following corporate divisions: East, West, North, and South. The user should be asked for the four quarters’ sales figures for each division. Each division’s total and average sales should be calculated and stored in the appropriate member of each structure variable. These figures should then be displayed on the screen.

Input Validation: Do not accept negative numbers for any sales figures.

In: Computer Science

For this question, you need to implement Java code for the following Modified Ciphertext encryption and...

For this question, you need to implement Java code for the following Modified Ciphertext encryption and attack for known patterns to find the code.

Please read the modified Ciphertext carefully and examples before implementing them.  

Modified Ciphertext is working as follows:

If a plain text (only letters ignore uppercase or lowercase) and sequences of numbers are given, it encrypts the given plain text by shifting each letter in a message the characters based on the given numbers one forward direction and one backward direction in order.

Example: consider the repeating key: 3 1 7 4 2 5 6, and plain text is "Hello World"

The encoded message will be: "Kdshq Ruomw"

H->3 = K, e<-1= d, l->7 = s, l<-4 = h, o->2 = q, W<-5 = R, o->6 = u, r<-3 = o, l->1 = m, d<-7 = w.

First, implement an encryption method:

"String encryption(String message, String code)" method that returns the encoded message according to the given message and code.

Ex: encryption( "Hello World", "3174256 ") will return "Kdshq Ruomw"

Second, implement an attack method:

"String attack(String message, String encoded_message)" method that returns the predicted code without knowing back or forward movements.

You may assume that every digit in the code is distinct.

Ex: attach( "Hello World", " Kdshq Ruomw") will return "3174256"


Please submit a Java code for two methods and JUnit tests that show both methods work for different cases, including exception cases such as non-digit for code or non-plain text.

In: Computer Science

You are required to solve the problem on Terrain Navigatio. Terrain navigation is a key component...

You are required to solve the problem on Terrain Navigatio.

Terrain navigation is a key component in the design of unmanned aerial vehicles (UAVs). Vehichles such as a robot or a car, can travel on land; and vehiches such as a drone or a plane can fly above the land. A UAV system contains an on board computer that has stored the terrain information for the area in which it is to be operated, Because it knows where it is at all times (often using a global positioning system (GPS) receiver), the vehicle can then select the best path to get to a designed spot. If the destination changes, the vehicle can refer to its internal maps and recompute the new path. The computer software that guides these vechicles must be tested over a variety of land formations and topologies. Elevvation information for large grids of land is available in computer databases. One way of measuring the "difficulty" of a lanad grid with respect to terrain navigation is to determine the number of peaks in the grid, where a peak is a point that has lower elevations all around it. For this problem, we want to determine whether the value in grid position [m] [n] is peak. Assume that the values in the four positions shown are adjacent to grid position [m] [n]:

grid [m-1] [n]
grid [m][n-1] grid [m][n]    grid [m][n+1]
grid [m+1] [n]

Write a program that reads elevation data from a data file named grid1. txt. (this file you have to create and name it as grid 1.txt.) data as shown below which represent elevation for a grid that has 6 points along the side and seven points along the top ( the peaks have been highlighted and underlined):

5039 5127 5238 5259 5248 5310 5299

5150 5392 5410 5401 5352 5820 5321

5290   5560    5490 5421 5530 5831    5210

5110 5429 5430 5411 5459 5630 5319

4920 5129 4921   5821 4722 4921 5129

5023 5129 4822 4872 4794 4862 4245

Then prints the number of peaks and their locations. Assume that the first line of the data file contains the number of rows and the number of columns for the grid of information. These values are then followed by the elevation values, in row order. The maximum size of the grid is 25 rows by 25 columns.

Hints:

  1. Define and print the number of peaks and their locations in an elevation grid.
  2. input is a file containing the elevation data and the output is a listing of the location of the peaks.
  3. to specify the location of the peaks, you need to assign an addressing scheme to the data because you are going to implement this solution in c. Therefore, choose its 2D array subscripting notation.
  4. assume the top left corner is position [0][0], the row numbers increase by 1 as move down the page and the column numbers increase by 1 as move to the right.
  5. These peaks then occur at position[2][1], [2][5], and [4][3].
  6. To determine the peaks, compare a potential peak with its four neighbouring points.
  7. if all four neighboring points are less that the potential peak, then the potential peak is a real peak.
  8. the points on the edges of the array or grid cannot be potential peaks because do not have elevation information on all four sides of the points.

please help to answer all

need type answer in c language

In: Computer Science

Write a Java Program to determine if a candidate qualifies for a FHA Mortgage. The qualifications...

Write a Java Program to determine if a candidate qualifies for a FHA Mortgage.

The qualifications given are:
  • Residence: The home must be your primary residence.
  • Down payment: They must have a credit score of at least 563.
The Java Program needs to do the following. This can all be done in the main()  method.
  1. Create a boolean variable to store the Residence requirement.
  2. Prompt the user to "Enter 1 if the Home will be the primary residence, or 0 if not the primary residence". Store the result of step 2 into a byte variable.
  3. Set the boolean variable from step 1 to true or false depending on value in step 2.
  4. Create an int variable to store the credit score.
  5. Prompt for the credit score and store it in the variable created in step 5.
  6. If the residency and credit score qualify, then display "Qualifies for the loan". Otherwise display "Does not qualify for the loan".

This can all be done inside the main() method.

Example Input/Output:

Enter 1 if the Home will be the primary residence, or 0 if not the primary residence: 1

Enter the Credit Score: 500

Does not qualify for the loan.

In: Computer Science

discuss how using VirtualBox and the Linux LAMP server represents cloud computing. And, discuss what a...

discuss how using VirtualBox and the Linux LAMP server represents cloud computing. And, discuss what a cloud consumer needs to know about how virtualization and cloud computing creates value for a business. In addition, for the second part of the discussion, make sure you mention virtualization security.

In: Computer Science