Category Archives: Research Papers

TLMT318 B001 Fall 2022

Communication challenges of transporting hazardous materials

 

Transporting hazardous substances poses endless challenges for businesses, making it essential that logistics providers replicate on consideration on splendid route optimization and scheduling software program software from the outset. Moving hazardous hundreds no longer entirely requires top-notch care and caution, then again moreover needs to be meticulously deliberate to meet several safety restrictions limiting free passage.

 

Logistics providers tasked with transporting hazardous objects want to understand the value of a routing and scheduling reply that considers every of the extra few compliance guidelines to aid them in making positively included transportation, properly timed deliveries, and efficaciously utilizing the pool of on-hand drivers. Andrew Tavener, Head of Marketing, Descartes UK, explains how this can no longer entirely assist with the seamless transportation of hazardous goods, on the other hand moreover beautify the common safety, effectivity, and compliance of drivers.

Technical Paper 3: Hypothesis Testing in Finance

We discussed financial hypothesis testing and learned how this economic process is a
tool for confirming a financial or business claim or idea. Hypothesis testing is useful for
investors trying to decide what to invest in and whether the instrument is likely to
provide a satisfactory return.

Direction:
1. Select one of the following financial organization to do market research on:

  1. Private (ex. Publix, Johnson & Johnson)
    b. Public Govt./Non-Profit (ex. Miami Dade County)
    c. Entrepreneurship (ex. Your own business)
  2. Come up with a hypothesis how your organization can provide “added value”
    services. Questions to ask
  3. What is the question I want to answer about your organization?
    b. What is your business case?
    c. Is there a need? How do you know—data?
    d. Are you using sampling—market survey, market studies, market
    experiments
  4. After you come up with a financial hypothesis, you need to collect a sample of
    data to be analyzed. Use the Barry Library link below to find information.
    Depending on the question you’re seeking to answer or investigating, you might
    collect samples through
  5. Market Surveys
    b. Market observational studies, or
    c. Market experiments

 

COP 3502C Programming Assignment # 4 Binary Search Tree

Read all the pages before starting to write your code
Introduction: For this assignment you have to write a c program that will use Binary Search Tree
(BST)
What should you submit?
Write all the code in a single file and upload the main.c file and leak_detector files. Please include the
following commented lines in the beginning of your code to declare your authorship of the code:
/* COP 3502C Assignment 4
This program is written by: Your Full Name */
Compliance with Rules: UCF Golden rules apply towards this assignment and submission.
Assignment rules mentioned in syllabus, are also applied in this submission. The TA and Instructor can
call any students for explaining any part of the code in order to better assess your authorship and for
further clarification if needed.
Caution!!!
Sharing this assignment description (fully or partly) as well as your code (fully or partly) to
anyone/anywhere is a violation of the policy. I may report to office of student conduct and an
investigation can easily trace the student who shared/posted it. Also, getting a part of code from
anywhere will be considered as cheating.
Deadline:
See the deadline in Webcourses. The assignment will accept late submission up to 24 hours after the due
date time with 10% penalty. After that the assignment submission will be locked. An assignment
submitted by email will not be graded and such emails will not be replied according to the course policy.
What to do if you need clarification on the problem?
Write an email to the TA and put the course teacher in the cc for clarification on the requirements. I will
also create a discussion thread in webcourses, and I highly encourage you to ask your question in the
discussion board. Maybe many students might have same question as you. Also, other students can
reply, and you might get your answer faster.
How to get help if you are stuck?
According to the course policy, all the helps should be taken during office hours. There Occasionally,
we might reply in email.
Problem: Almost a Forest
In this assignment you will build many BST trees where each tree has a name. To store the
names of all the trees, you will maintain a binary search tree for the tree names.
After building the trees, you will have to perform a set of operations and queries.
Here is an example. In this example fish, animal, bird, and fruit are part of the name BST.
Each node of the name tree points to a BST of items. Here, the fish node points to a BST that
contains name and count of fishes. Note that all the green colored nodes are of same type of
node structure and all the black colored nodes are of same type of node structure.
Input Specification:
You have to read the inputs from standard input using scanfs (No file I/O). There will many
strings in the inputs and you can assume that all the strings will be lower case letter and the
maximum length of a string is 30 character. For simplicity, use static array of char to store a
string.
The first line of the input contains three integers N, I, and Q, where N represents number of
Tree Names, I represents the total number of items in the list to be inserted to all the trees,
and Q represents the number of queries listed in the inputs.
After the first line, next N lines will contain the list of Names of the trees and you need to
insert them to a Name tree.
Next, I lines will contain the list of items to be inserted in different trees. Each line of the list
contains two strings and one integer. The first string contains the name of that tree, second
string contains the item name, and then the last integer contains the count of that item. You
have to insert the item in the tree with that tree name. You need to use the item name as the
key to the BST. Also note that the item count needs to be added to the node as well.
[Assumption: You can assume that a tree name as well as an item name will not be repeated
in the input]
After the I lines, the next Q lines will contain a set of queries and you need to process them.
Here is the list of queries:
• search: search for a particular item in a given tree and display the count of the item if
it is found. Otherwise, prints item not found. However, if the tree does not exist, then
it prints tree does not exist
o [Example: search fruit avocado should search for avocado in the fruit tree and
then prints the count of avocado. If the fruit tree exists, but the avocado does
not exist, it should print “not found”. However, if fruit tree does not exist, then
it should print tree does not exist.
• item_before: this command counts the items in a given tree coming before a given
item name (alphabetically).
o [For example, if your query is like this item_before animal deer, it should print
4 as cat, bear, alligator, and cow come before deer alphabetically.]
• height_balance: It finds whether a given tree is height balanced or not. In order to do
that, you need to know the height of left sub tree and then height of right sub tree. If
their height difference’s absolute value is more than 1, then we say the tree is
imbalanced. In this assignment, a tree with 1 node, will be consider as height 0, and a
tree with no node will be considered as height -1.
o [Example: height_balance animal, will print, left height 1, right height 3,
difference 2, not balanced]
• count: this command prints the total number of items in a given tree.
o [Example: count animal, should print 142 (as 30 + 20+ 10 +50 +3 + 3 +5 +15
= 142)]
• reduce: this command reduces the count of an item in a given tree. The min value of
the count needs to be >0. So, if it becomes <=0, you need to delete the node]
o [Example: reduce fruit mango 50 will reduce the total mango to 50 from 100.]
o [Another Example: reduce goldfish 50 will delete the node as goldfish is
reduced to 0]
• delete: this command deletes an item from a given tree.
o [Example: delete fruit avocado will delete the avocado node from the fruit
tree]
• delete_name: this command delete the entire tree of a given name.
o [Example: delete_name animal will delete the animal tree as well as animal
node from the name tree]
Sample Input:
4 28 21
fish
animal
bird
fruit
animal cat 30
fish goldfish 50
animal dog 20
bird blackbird 10
animal bear 10
fruit mango 100
animal alligator 50
animal tiger 3
animal lion 3
fish swordfish 10
animal deer 5
animal cow 15
fish garfish 5
fish catfish 55
fish salmon 40
bird crow 20
bird dove 10
bird flamingo 15
fruit apple 50
fruit banana 50
fruit nectarine 10
fruit coconut 10
fruit peach 40
fruit apricot 30
fruit avocado 25
fruit cherry 100
fruit cranberry 100
animal horse 6
search fruit avocado
search fish tilapia
search animal cow
search bird crow
search bird cow
search animal cat
item_before animal deer
height_balance animal
height_balance bird
height_balance fish
search flower rose
count animal
count fruit
delete animal cat
search animal cat
count animal
delete fish swordfish
delete fruit avocado
delete_name animal
reduce fruit mango 50
search fruit mango
Output Specification:
You have to write all the output to an out.txt file as well as to the console. You are allowed
to use a global variable for outfile pointer to simplify your function parameters. However,
note that, if your code does not print in standard console, you may get zero.
After building the tree, you should print the trees in inorder in the specified format shown in
the sample output below.
Sample Output:
animal bird fish fruit
===animal===
alligator bear cat cow deer dog horse lion tiger
===bird===
blackbird crow dove flamingo
===fish===
catfish garfish goldfish salmon swordfish
===fruit===
apple apricot avocado banana cherry coconut cranberry mango
nectarine peach
25 avocado found in fruit
tilapia not found in fish
15 cow found in animal
20 crow found in bird
cow not found in bird
30 cat found in animal
item before deer: 4
animal: left height 1, right height 3, difference 2, not balanced
bird: left height -1, right height 2, difference 3, not balanced
fish: left height 1, right height 1, difference 0, balanced
flower does not exist
animal count 142
fruit count 515
cat deleted from animal
cat not found in animal
animal count 112
swordfish deleted from fish
avocado deleted from fruit
animal deleted
mango reduced
50 mango found in fruit
Implementation Restriction.:
1. You have to use the following structure. You are allowed to modify the structure if needed.
typedef struct itemNode
{
char name[MAXLEN];
int count;
struct itemNode *left, *right;
}itemNode;
typedef struct treeNameNode
{
char treeName[MAXLEN];
struct treeNameNode *left, *right;
itemNode *theTree;
}treeNameNode;
2.In addition to typical functions of tree implementation, you must have to
implement the following functions:
i. createTreeNameNode()
ii. treeNameNode* buildNameTree(…..): Based on the data in the file, it will insert
them to the name tree and then finally return the root of the name tree
iii. traverse_in_traverse(treeNameNode *root): this function takes the root of the name tree
and prints the data of the name tree and the corresponding item trees in the format shown in the sample
output. You can call other function from this function as needed.
iv. treeNameNode * searchNameNode(treeNameNode * root, char treeName[50]): This
function takes a name string and search this name in the name tree and returns that node. This
function will help you a lot to go to the item tree.
v. Note that you might need to crate separate insertion and other functions for name tree and item tree. [I
mean only two insertion function.]
vi. All the numbers and output must be produced from the trees.
Hints:
• Before starting the assignment, make sure you review and have a
clear understanding of the Binary tree topics, insertion and code,
deletion and code, BST practice problems and related codes.
• Always start as soon as possible as they might take time and you
will face various issues during this process.
• Read the complete instruction first. It is always a good idea to
plan it and do some paper work to understand the problem.
• Analyze sample input output and match them with the description and
the tree.
• You can use the uploaded BST code, and practice problem codes. But you
will have to significantly modify them
• Use strcmp() function for string comparison.
• Just start by building the name tree first and see the inorder
traversal of it
• Then gradually build the other trees and test them as you go.
• Create functions to simplify your code and it will be easier to test
your code, disable part of your code, etc.
• Use discussion board for any question, so that others also get
benefited from your question and answer.
• Keep patience and take help from us when you get stuck :)
Your code must compile in codegrade Platform. If it does not compile in codegrade, we conclude that
your code does not compile even if it works in your computer.
Steps to check your output AUTOMATICALLY in repl.it or other command line based compiler:
You can run the following commands to check whether your output is exactly matching with the sample
output or not.
Step1: Copy the sample output into sample_out.txt file and move it to the server (you can make your
own sample_out.txt file)
Step2: compile and run your code using typical gcc and other commands. Your code should produce
out.txt file.
$gcc main.c leak_detector_c.c
$./a.out <in.txt
Step3: Run the following command to compare your out.txt file with the sample output file
$diff -i out.txt sample_out.txt
The command will not produce any output if the files contain exactly same data. Otherwise, it will tell
you the lines with mismatches.
Incase if your code does not match, you can use the following command to see the result in side by side:
$diff -y out.txt sample_out.txt

Week 4 Fundamentals of Project Management

PART ONE: DISCUSSION QUESTION

Taking a step back we know the success of the project depends on the amount of attention given to resource planning. Project budgets and schedules are managed off the careful planning of the resources required to complete the project. One way to assure accuracy of the estimate for resources is to ask the team to figure out the hours.

Respond to one of the following bullet points:

  • How should budgeting, scheduling, and resource loading or leveling be most logically accomplished in terms of their chronological order? How would resource-constrained scheduling help, hinder, or change your recommendation.

PART TWO: PROJECT SCHEDULING AND BUDGETING

  • TASKS:

    • Click here to view the network diagram. Using the diagram, find:
      • The critical path.
      • How long it will take to complete the project?
    • How does simulation determine the probabilities of various project completion times?
    • What is “slack” and why is it important?
    • Why is activity-on-arrow (AOA) or activity-on-node (AON) of significant value to the project manager?
    • How is the uncertainty in project scheduling dealt with?
    • Should the critical path activities be managed differently from noncritical path activities? Explain.
    • Provide your answers in a 3- to 4-page Microsoft Word Document, using APA style.

CSDD1006 – Business Database Systems

Version 1.

 

  1. For the table, Book, populate the table with 50 rows using SQL*Loader ( you can make up data yourself or use https://mockaroo.com/ to generate data). Use a sequence to populate the column, ISBN. Populate any column (other than ISBN) with VARCHAR data type with lower case values.

 

  1. Create a user-defined function that accepts a string data type and converts the string to all upper case. This function should return the string all in upper case.

 

  1. Create a stored procedure that calls the function in step 2 and use the function to convert the columns in the Book table that have VARCHAR data type to upper case. Don’t use the UPDATE command from SQL Developer since this is an exercise for you to use the Oracle PL/SQL procedures and functions.

 

Send me screenshots for each step above as well as your code for the function and procedure and the control file for SQL*Loader.

 

 

Your work will be graded as follows:

 

Use SQL*Loader to Insert Rows                30

Create the User-Defined Function            35

Create the Stored Procedure                     35

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Macro Economics Question

  • At least 4 Pages (APA Style)
  • Evaluate critically, as a Keynesian economist, what caused the 2007 to 2009 financial crisis.
  • Examine the causes that aggravated the financial crisis during the period?
  • Evaluate the actions that the Federal Reserve and the government took during this period. Do you support their actions in both monetary policy and fiscal policy? Why or why not?
  • Recommend an alternative policy or method that could have better resolved the financial crisis if you were a decision maker (of monetary policy or fiscal policy) during the period.
  • Give advice, as a prominent classical or Keynesian economist, to the Federal Reserve and/or federal policy makers to prevent future economic or financial crises.
  • Must use at least five scholarly, peer-reviewed, and/or other credible sources

Assignment 2 MGT403

Assignment Questions

Part 1. Answer in 500-600 Words.

Describe the concept of Communities of Practice. Why are “Communities of practice” Important?

  1. How can organizations cultivate communities of practice? How can these communities of practice contribute towards the knowledge needs of the organization?
  2. Provide a detailed description of major roles and responsibilities in a community of practice.

 

Part 2. Read Chapter 9 and 10 from the book and answer the following questions. Answer in 500-600 Words.

  1. What are the major steps involved in developing a KM strategy? What sorts of information is needed to recommend a KM strategy to an organization? List the major categories of stakeholders who should be involved in the strategy formulation process.
  2. Why is it important to conduct an audit before eliciting stakeholder objectives?
  3. Compare and contrast the three KM metrics of benchmarking, Balanced Scorecard, and house of quality. What are their major advantages and major drawbacks in monitoring progress toward strategic KM and business goals?

 

References: Should Be More than 5 references.

In the mind of a SCOTUS justice – Ketanji Brown Jackson

The last homework before the final exam is to learn more about a specific person who is currently serving on the U.S. Supreme Court. Read the instructions below. Use Oyez or another source to find the names of all the current SCOTUS justices.

The goal of this project is to discover the guiding principles underlying the Justice’s approach to constitutional interpretation. Your written report and analysis should accomplish the following in about 500 words:

  • Describe the training and experience of the Justice prior to his/her SCOTUS appointment.
  • Provide a brief summary of their SCOTUS career to date.
  • Analyze a case they heard on a civil liberty issue.
  • Give their proximate placement on an ideological continuum regarding how they might decide a potential case on a civil liberty issue
  • Ketanji Brown Jackson is my justice choice ( for a $10 tip please complete the bonus justice and complete the same tasks)
  • Ruth Bader Ginsburg is the bonus justice

unit 8 project

Instructions

Use your favorite search engine to locate an article about a company that has decided to outsource a part of its business operations. If you currently work for an organization that outsources or is thinking about outsourcing, you can use that instead. Respond to the following four (4) prompts based on your knowledge from this unit’s material and the article you found.

  1. State the name of the company you chose and your information source (link, employer, and so on). Describe the type of company it is, and explain which area it is planning to outsource or is already outsourcing.
  2. Why did the company consider outsourcing in the first place? Explain in terms of the company’s sustainable income and the quality of its earnings.
  3. Identify the revenues and costs that would be impacted by this outsourcing decision using ratio analysis. Use your best estimate on these revenue/cost values since the actual amounts are most likely not known to the public.
  4. Identify the factors, based on horizonal analysis and vertical analysis, that could impact the company’s decision to outsource this business operation. Make your own assumptions and estimates regarding these factors.

Your project should consist of at least two pages, not counting a title page (if included). APA Style will not be required for this assignment.

Resources

The following resource(s) may help you with this assignment.

simulate (using Matlab program)

  1. in this assignment, you are required to simulate (using Matlab) the respiratory system in the following cases

    a- Normal breathing
    b- Under pressure support ventilation, regular compliance (there is no activity of breathing muscles)
    c- Lung diseases that affect compliance of the lungs (increase and/or decrease)

    in all cases, your output should show the volume of the lungs and other parameters…

So, design Matlab GUI with three axises (one for a), (one for b), (one for c)

Powered by WordPress