Category: Computer Science

  • Need help with hw problems for corporate financial managemen…

    Complete the hw problems that are circled in the pdf and on the attached slide.

    2. This needs to be done in excel with formula in cell boxes

    Requirements: as long as needed | Javascript

  • 6 d reply

    need to write two the peer reply

    In previous modules, you learned about the importance of process modeling and how UML use case diagrams can be used to represent the different actors and “use cases” for a particular system. Your readings for this module have focused on how to create UML diagrams using CASE tools. In this discussion, you will bring these concepts together by creating a UML use case diagram for the DriverPass project.

    To prepare for your initial discussion post, review the and the business requirements document that you created for Project One. As you review these documents, consider the following questions:

    • Who are the different “actors” in your system design? Consider the different users of the system as well as any outside systems.
    • What are the different “use cases” for your system? Consider the different functionality your system should provide. What do the different users need to be able to do?

    After you have reviewed these documents, begin creating your UML use case diagram using the CASE tool Lucidchart. Download your diagram as a PDF. Be sure to check the “Accessible PDF” box before downloading. Use the Module Six resources to help you with this task.

    In your initial post, be sure to address each of the following:

    • Attach the PDF copy of your completed UML use case diagram for the DriverPass system. Be sure that you used proper UML notation.
    • Describe your UML use case diagram in a few sentences. What use cases did you capture? Who are the different actors? Did you capture all required functionality for the DriverPass system?
    • What challenges, if any, did you experience in using Lucidchart? How did you overcome these challenges?
    • Thinking about the DriverPass system as a whole, what are two technical requirements of your system design?

    For your follow-up posts, you will be reviewing your classmates’ diagrams. Your diagrams will have differencesand that’s okay! There is an element of creativity in system design. In your follow-up posts, address the following:

    • What similarities do you notice between your and your classmate’s designs?
    • What is one difference that you see between you and your classmate’s designs?
    • What would you add to this design? What recommendations would you give to improve the design?

    I am attaching my post

    peer post 1:

    Nathan Vanderpool posted Feb 13, 2026 2:38 AM

    • Who are the different “actors” in your system design? Consider the different users of the system as well as any outside systems.

    .

    The actors in the DriverPass system design, based on the interview transcript, represent the different users and external entities that interact with the system. Here are the key ones identified:

    • Customer (also referred to as Student or User): The primary external user who registers, purchases packages, takes online classes/practice tests, views progress, and manages reservations.
    • Secretary (or administrative staff handling phone/in-person scheduling): Handles customer registrations and appointment scheduling on behalf of customers.
    • Owner (Liam, the “big boss”): Has high-level access, views reports, tracks activity logs, manages overall business data, and disables packages.
    • IT Officer (Ian): Manages user accounts (e.g., reset passwords, block access), maintains the system, and has full administrative privileges.
    • DMV (Department of Motor Vehicles): An external system/actor that provides updates on rules, policies, sample questions, with notifications to DriverPass when changes occur (Liam mentioned connecting to the DMV for compliance updates).
    • Driver/Instructor (implied, as they conduct lessons, leave notes/comments on sessions, and are assigned to reservations with cars): They likely interact to record lesson outcomes/notes, though not explicitly named as a system user in the transcript; they may use the system to view schedules or add driver comments.

    .

    • What are the different “use cases” for your system? Consider the different functionality your system should provide. What do the different users need to be able to do?

    .

    The use cases capture the main functionalities the system must provide, grouped by actor interactions. These are derived directly from the client’s stated needs (online access, reservations, security, tracking, online learning, compliance, etc.). Here’s a comprehensive list of key use cases:

    .

    Customer-related use cases:

    • Register / Create Account (provide personal info, credit card details; can be done by secretary or online)
    • Purchase / Select Package (choose from Package 1, 2, or 3; system should allow disabling packages)
    • Reset Password (automatic self-service if forgotten)
    • View Test Progress (see tests taken, in progress, completed; details like test name, time taken, score, status: not taken/in progress/failed/passed)
    • Take Online Classes / Practice Tests (access content and tests, especially in Package 3)
    • Make Reservation (schedule driving lesson: select day/time, package implications for sessions; online via account)
    • Modify Reservation
    • Cancel Reservation
    • View Driver Notes / Lesson History (see lesson times, start/end hours, driver comments)

    .

    Secretary-related use cases:

    • Create Account / Register Customer (input form for student info: name, address, phone, state, credit card, pickup/drop-off location)
    • Schedule Appointment / Make Reservation (via phone or in-office)
    • (Possibly) Modify or Cancel Reservation on behalf of customer

    .

    Owner-related use cases:

    • View / Download Reports (e.g., activity reports, Excel exports)
    • View Activity Logs / Audit Trail (who made/ modified/ canceled reservations, last modified by whom)
    • Disable Package (prevent new registrations for a package)

    .

    IT Officer-related use cases:

    • Manage User Accounts (reset passwords, block/disable access, full admin rights)
    • Maintain System (general modifications, though specifics deferred)

    .

    DMV-related use cases:

    • Provide Updates / Notify System (external trigger: push notifications or connection for new rules/policies/questions)

    .

    Shared / General use cases:

    • Authenticate / Login (verify credentials for all internal users)
    • Track Changes / Audit (system-wide logging for reservations and modifications)
    • View / Access Data (online from any device; download for offline work, but no offline edits)
    • Contact Support / Contact Student (contact page/form)

    .

    Many use cases involve security/logging (e.g., tracking who did what), cloud-based web access, role-based access control, and flexibility (e.g., disabling packages).

    peer post 2:

    Isaac Malagisi posted Feb 13, 2026 1:17 AM

    Hello everyone,

    For this assignment, I created a UML use case diagram for the DriverPass system that illustrates the system boundary, the different actors, and the major use cases required for system functionality. The primary actors identified include the Student (Customer), Secretary, Instructor (Driver/Trainer), Admin, IT Officer, and the external DMV System. Each actor interacts with the system differently based on their role and responsibilities.

    The use cases captured in the diagram reflect the full scope of the DriverPass system. For account management, use cases include registering a student account, logging in, resetting a password, and managing profile information. Students are able to access online classes, take practice tests, and view test results and progress. Scheduling functionality is a core component of the system and includes scheduling, modifying, canceling, and viewing driving lessons. These scheduling actions include a required <<include>> relationship with matching a driver and vehicle to the lesson to ensure proper resource allocation. Instructors are able to enter driver notes and view lesson history. Administrative functions include generating reports, viewing audit logs, disabling packages, and managing user accounts. The DMV system interacts with DriverPass to provide updates to practice test content and notify administrators of changes.

    I believe I successfully captured all required functionality for the DriverPass system, including user interaction, administrative controls, and external system integration. The diagram clearly shows the system boundary and actor relationships using proper UML notation. One challenge I experienced while using Lucidchart was organizing the use cases in a way that maintained readability while minimizing line crossings between actors and use cases. This seemed to be by far the most nuanced or tedious challenge that I spent much time trying different formats. With many actors interacting with multiple functions, the diagram initially became cluttered. I resolved this by grouping related use cases logically within the system boundary and adjusting spacing to reduce overlapping lines. I also carefully used <<include>> relationships only where necessary to avoid overcomplicating the diagram.

    Two important technical requirements of the DriverPass system design include role-based access control and scheduling accuracy with conflict prevention. Role-based access control ensures that students, instructors, administrators, and IT officers have appropriate permissions based on their responsibilities. Scheduling accuracy is critical to prevent double-booking of instructors or vehicles and to ensure reliable lesson management. I believe these technical requirements support both system security and operational efficiency.

    Attached Files (PDF/DOCX): peer post 1.pdf, peer post 2.pdf, CS 255 Business Requirements Document Template.docx, resources.pdf, CS 255 DriverPass Interview Transcript.docx, Module Six Discussion.docx, CS 255 Thinking Through Technical Requirements.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Computer Science Question

    Assignment 3: Exploring Memory Hierarchy Design in gem5

    Assignment Objectives and Goals

    The memory hierarchy, a crucial aspect of computer architecture, orchestrates the intricate dance between processor and storage. This assignment challenges you to go beyond textbook definitions and delve into the practical implications of memory hierarchy design using the gem5 simulator. You will navigate the landscape of memory technologies, experiment with cache optimizations, and witness the power of virtual memory in action. By the end of this assignment, you will have a deeper appreciation for the tradeoffs and design choices involved in crafting efficient and high-performance memory systems.

    Part 1: Understanding Memory Hierarchy

    1. Introduction to Memory Hierarchy Design:

    Reading Assignment: Read the provided sections on Memory Hierarchy Design, focusing on the key concepts of memory technology, cache optimizations, virtual memory, and design considerations.

    Conceptual Analysis and Discussion

    Write a 2-3 page document that articulates the significance of memory hierarchy design in achieving high-performance computing systems. Your analysis should consider the following key aspects:

    • Memory Technologies
    • Advanced Cache Optimization
    • Virtual Memory and Virtual Machines
    • D Default Cache Configuration
    • Optimizing Cache Parameters
    • Analysis

    Explore the spectrum of memory technologies available today, from fast but expensive SRAM to slower but cost-effective DRAM and beyond. Analyze how the characteristics of these technologies influence their placement within the memory hierarchy and their impact on overall system performance.

    Beyond the basics of cache organization, delve into sophisticated techniques like prefetching, victim caches, and cache partitioning. Explain how these techniques aim to minimize cache misses and improve overall system throughput.

    Unravel the intricacies of virtual memory, including page tables, address translation, and page replacement algorithms. Discuss how virtual memory enables efficient memory management and supports the execution of multiple processes concurrently. Explore the concept of virtual machines and their relationship to the memory hierarchy.

    • Cross-Cutting Issues

    Address the challenges and trade-offs involved in designing memory hierarchies. Consider factors like cost, power consumption, complexity, and the impact of different workloads on performance. Discuss emerging trends and technologies that are shaping the future of memory hierarchy design.

    Part 2: Implementing and Analyzing Cache Configurations in gem5

    Introduction

    In this hands-on section, you will leverage the power of the gem5 simulator to gain practical experience with memory hierarchy design principles. Specifically, you’ll focus on the cache subsystem, which plays a crucial role in bridging the performance gap between the CPU and main memory. By setting up and running simulations, you’ll witness firsthand how various cache configurations can influence system performance. Moreover, you’ll explore the concept of virtual memory, a vital mechanism for efficient memory management in modern systems.

    Setting Up gem5:

    Environment Setup: Follow the instructions to set up gem5, ensuring you have the latest version and necessary dependencies installed.

    Carefully follow the gem5 installation instructions to set up the simulator on your system. Ensure you have the latest version of gem5 installed and all necessary dependencies are met. You may need to consult the gem5 documentation or online resources for guidance specific to your operating system.

    Configuration: Configure gem5 to simulate a system with an x86 architecture. Pay particular attention to the cache subsystem settings, as this will be the focus of your experiments. Refer to the gem5 documentation for details on how to configure cache parameters such as size, associativity, and block size.

    Simulation of Cache Performance:

    Begin by running a simulation using gem5’s default cache settings. This will establish a baseline for comparison. Record essential performance metrics, including cache hit rate, miss rate, and average memory access latency.

    Systematically modify various cache configuration parameters, such as cache size, associativity, and block size. For each modification, rerun the simulation and record the updated performance metrics. Aim to improve the overall cache performance, and carefully document the changes you make and their rationale.

    Compare the performance metrics obtained before and after each optimization. Analyze how each change in cache configuration affected the results. Relate your observations to the advanced cache optimization techniques discussed in the theoretical part of the assignment (e.g., prefetching, victim caches).

    Virtual Memory Exploration:

    4. Virtual Memory Exploration:

    • Virtual Memory Simulation

    Configure gem5 to simulate a system with virtual memory enabled. Experiment with different page sizes and Translation Lookaside Buffer (TLB) configurations.

    • Performance Metrics

    Analyze the performance impact of your virtual memory configuration choices. Focus on metrics such as page fault rate and TLB miss rate, and how these influence overall system performance.

    • Hands-On Discussion

    Reflect on the role of virtual memory in modern operating systems and how TLB configurations can impact system performance. Connect your experimental findings to the theoretical concepts you’ve learned about virtual memory management.

    Remember:

    • Document your experimental setup, including the benchmark program used, gem5 configuration details, and any modifications made.
    • Use clear and well-labeled graphs or tables to present your performance data.
    • Provide insightful analysis, explaining the observed trends and relating them to theoretical principles.
    • Store all files and documents in a private github repository and ensure that your professor is the only person with access to the repository.

    Submission:

    • Deliverables:
    • Discussion on Memory Hierarchy Considerations: Appropriate and detailed Memory Hierarchy Discussion
    • Programming and Development Accuracy: Correct execution of the “Hello World” program in gem5.
    • Screenshots: Report accurately provides screenshots depicting output and each step.
    • Documentation and APA Guidelines: Clarity and completeness of the report.
    • Troubleshooting: Appropriate discussion and documentation on the ability to identify and resolve issues encountered during the process

    Submit appropriate documents for parts 1 and parts 2.

    Include screenshots of your gem5 simulation outputs, configuration files, and any graphs or charts used to present data and a link to your github repository.

    Evaluation Criteria:

    Requirements: 1000 words explaination +code and screesnhots

  • Mitchell_Project4

    use the pictures provided and follow the EXACT FORMAT IN THE TEXT

    Attached Files (PDF/DOCX): Module2EnhancingaPresentationwithPictures2CShapes2CandWordArt.PDF

    Note: Content extraction from these files is restricted, please review them manually.

  • Assignment

    Guidelines for Assignment

    Assignments must be submitted as a word document file.

    If your originality score (plagiarism) is not within a reasonable range, you will receive a zero. If you want to avoid this, make your responses original and do not copy off the Internet.

    To avoid any plagiarism issues, you must use the class lecture Slides to answer the assignments. If you use another source to answer any assignment, you MUST CITE it, or you will get ZERO on the submission.

    Attached Files (PDF/DOCX): Assignment 4.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • need help in editing the IEEE article

    will share the document and instructions once the question is accepted

    Requirements: 10000

  • Assignment #3

    Just need someone to rewrite and proof read my one page code write up about about my timing study

    Timing Study: Linear Search vs. Binary Search

    Purpose

    The purpose of this assignment was to compare the performance of Linear Search and Binary Search as the size of the array (N) increases. Since Binary Search requires a sorted array, Insertion Sort was used before performing Binary Search. The time for sorting was included in the Binary Search timing.

    Method

    For this experiment, arrays of random numbers were generated for different sizes of N. The sizes tested were increasing values such as 100, 500, 1000, 2000, 5000, and 10000.

    For each array, the following steps were performed:

    1. An array of N random integers was created.
    2. A random index between 0 and N-1 was selected.
    3. The value at that index was used as the search target.
    4. Linear Search was performed and timed.
    5. A copy of the array was sorted using Insertion Sort.
    6. Binary Search was performed on the sorted array.
    7. The total time for sorting and Binary Search was recorded.

    The time.perf_counter() function in Python was used to measure execution time.

    Results

    As the value of N increased, the time for Linear Search increased steadily. The time for Binary Search alone is very small, but when combined with Insertion Sort, the total time increased much faster.

    For small values of N, both methods performed quickly. However, for larger values of N, Binary Search with Insertion Sort took significantly longer than Linear Search.

    Analysis

    The results match the expected time complexities of the algorithms. Linear Search has a time complexity of O(n). Insertion Sort has a time complexity of O(n2). Binary Search has a time complexity of O(log n).

    Even though Binary Search is faster than Linear Search by itself, the required sorting step makes the overall process much slower. Since Insertion Sort is O(n2), it dominates the total runtime.

    This explains why Binary Search with sorting became slower than Linear Search for large arrays.

    Conclusion

    This experiment shows that the overall efficiency of an algorithm depends on all steps involved. Although Binary Search is very efficient, the need to sort the array using Insertion Sort makes it less practical for large datasets. Linear Search performed better overall when sorting time was included.

    If a faster sorting algorithm such as Merge Sort (O(n log n)) were used, Binary Search would likely outperform Linear Search for large values of N.

    Attached Files (PDF/DOCX): Timing Study.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Cybersecurity MX project

    i need help in completing my MX Project in Cybersecurity. i have already selected the topic and started the work. i want to complete it and to comply with the Project guidelines. also i want to receive the solution in patches so we can comply to the submissions times

    Requirements: as per the guide

  • SHORT ESSAY

    As you move forward in your doctoral research journey, its time to reflect, decide, and strategize for the successful completion of your capstone project. At this critical juncture, you need to make key decisions about the direction of your research. Heres what to consider:

    Narrow, Revise, or Expand Your Research Plan

    You must evaluate your previously submitted research plan to determine whether to narrow, revise, or expand its scope. Given the time constraints and the need to produce a thorough, high-quality project, adjustments may be necessary to ensure feasibility. Narrowing your focus can make the project more manageable, while revising it may align your study more closely with current goals or available resources. Expanding your research could involve incorporating additional datasets or variables, but this must be carefully weighed against the project timeline.

    To Team Up or Not?

    You can decide whether to work independently or team up with peers who have similar research interests. Teaming up can bring diverse perspectives and shared responsibilities, which might enhance your research outcomes. However, working independently allows for full control over the project direction and execution. Weigh the benefits and challenges of both approaches to decide what best fits your preferences and project goals.

    Ensuring Doctoral-Level Competence

    To demonstrate doctoral-level competence, you must design and execute a research plan that is methodologically sound, critically engaging, and contributes to your field of study. This involves setting clear research objectives, utilizing appropriate methodologies, and presenting your findings in a scholarly manner. Regular consultations with your advisor, staying on track with your timeline, and being adaptable to feedback are essential strategies for maintaining high standards.

    SHORT ESSAY (10 Points)

    You will write a 300-word summary outlining your research goals and the strategies you will use to meet class deadlines and future milestones. This summary will serve as your commitment to your research plan and a blueprint for managing your progress effectively.

    Attached Files (PDF/DOCX): Lesson 1 Overview (1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Need editing for IEEE article

    Hi bro need to edit my document according to the comments attached the template and my document

    Dear Author,

    Please find attached the following corrections to be made in your Manuscript id: 303


    Corrections:

    • Remove Header and footer they are not in correct format,
    • Author affiliation not in standard format,
    • Article is not in ieee standard format correct and send

    Please perform the above corrections as suggested and resend the corrected pdf file after passing through pdf express latest by 15th Feb 2026

    Requirements: 100