Smart Mobile Technologies Transportation Systems | Get Solution Now

Smart Mobile Technologies in Intelligent Transportation Systems Emerging smart mobile technologies have the potential to enhance the functionality of transportation systems, improving a community’s livability and quality of life. Cities and counties rely on their transportation systems to enable both work and play. The potential application scenario may include one of the following: • Smart traffic management • Smart parking management • Smart public transportation management • Smart transportation pricing and payment systems • Smart mobility-on-demand systems You are also encouraged to explore and design innovated applications that would be different from the above scenarios. It would potentially be novel and practical ideas to advance the current mobile technologies in intelligent transportation systems.Project Requirements Please choose one application scenario from the above list, and conduct your investigation/research from at least the following five aspects (your project presentation and report should fully cover these aspects): 1. What is it? (e.g., infrastructures, standards, etc.) 2. What are the objectives? What problems are solved? 3. What mobile technologies are employed in it? 4. What types of connectivity/communication technology does it use 5. What are the special challenges in it?

Read more

Big Data & Database Systems | Get Solution Now

Question 1 Read the following example relations carefully and using SQL statements answer the questions that follow: Example Relations LSBU Travel Agents Customer (cust_num, cust_name, dob) Flight (flight_num, from_airport, to_airport, flight_datetime, cost) Reservation (cust_num*, flight_num*, res_datetime, agent_num*) Travel_Agent (agent_num, agent _name, city) NOTE:Primary Keys are indicated by bold underlined text. Foreign Keys are indicated by italic text followed by an asterisk*. Within CUSTOMER dob is Date Of Birth (a) Write SQL statements to create the table structures for each of the relations in the example. Choose appropriate data types and ensure that you enforce key constraints and business rules within the appropriate creation statements. (b) Write SQL insert statements to insert one row of data into each table. (c) Write an SQL query to find the travel agent with the highest number of reservations . Ensure your answer contains the agent’s name and a calculation for the total number of reservations. (d) Write an SQL stored procedure, that accepts and uses TWO input parameters @cityName, @airportName, to find travel agents based in a user specified city with any flights leaving today from a user specified airport. The procedure output must be capable of displaying the appropriate travel agent and flight details. Question 2 (a) Discuss the main driving forces of Data Science. (b) Name three EDA (exploratory data analysis) methods of outlier detection. Choose one of the named methods to explain how it works (c) Produce a diagram to describe the major components of the business intelligence architecture. Write brief notes to explain the specific role of each component.

Read more

Cyber-security Discussion Paper | Get Solution Now

The Chief of Staff will be hosting a working lunch this week for your group of interns. In addition to the usual introductions and “getting to know you” discussions, you’ve been advised that there will be a discussion of the following article. https://securityintelligence.com/seasonal-employee-security-risks-present-danger-proactive-defense/ Each intern has been asked to write and bring a discussion paper containing their written responses to the following questions: 1. Do you agree or disagree with the author’s assertions regarding seasonal employees and cybersecurity risks in the work place? Why? 2. What steps can (should) managers take to reduce security risks associated with hiring seasonal or temporary employees? (Consider whether or not the Secure Computer User training course would be appropriate for these employees.) 3. How can managers show leadership in the area of cybersecurity defenses and best practices? As you write your response, remember to provide examples from the article and other readings for this week. Explain why you agree or disagree and provide examples, if appropriate. Your examples should be relevant to the hospitality industry and hotel operations. Consider the ways in which these types of companies are likely to use seasonal employees and the types of digital assets / information to which these temporary employees may have access. Include information from the Week 1 readings to support your responses / arguments. Remember to cite your sources using a consistent and professional style (APA recommended but not required). https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://www.coranet.com/integrated-cybersecurity-strategy/

Read more

Technical Problems of Operating Systems | Get Solution Now

You will investigate technical problems of operating systems, and provide a written report. Your research should focus on an in-depth topic about theories, algorithms, approaches, mechanisms, or implementation of one of the following fields of operating systems: process management process and thread CPU scheduling synchronization deadlock handling storage management main memory virtual memory file systems mass-storage and I/O protection and security distributed, real-time, and multimedia systems Your topic could come from a sub-problem of cutting-edge research problems discussed in the literature (i.e., investigating a technical problem). Please Pick one of your most confidence topic from the topics section and write a Proposal. To ensure that your topic has adequate depth and coverage, you MUST write a one-page proposal that outlines your area of interest and associated references you will use.  Research Paper Your investigation will be based on recent publications (i.e., published in the past five years) such as journal/conference papers and technical documents, and the applicable software packages (open source preferred). You are encouraged to read some papers about new techniques in operating systems.  SOSP: ACM Symposium on Operating Systems Principles (ACM) ACM SIGOPS Operating Systems Review (ACM) ACM Transactions on Computer Systems (ACM) IEEE Transactions on Computers (IEEE) ACM Computing Surveys (ACM) Communications of the ACM (ACM) IEEE Computer. . . (IEEE) Linux Journal (ACM) Once you have chosen your topic, you need to identify meaningful, feasible outcomes for your research on the topic. Overall, the outcomes should interest and benefit the professional community of operating system research and development. Some possible outcomes: analysis, findings, and discovery of problems. results of your tests, surveys, and comparative analysis. proposals for new or improved methods, algorithms, etc. meaningful implementation plans. insight on future directions. Present the outcomes of your research in a 10- to 15-page paper written in a journal or conference paper format. References should be cited using APA or IEEE Style. Your paper should include the following sections: Title Abstract: no more than 300 words. Introduction/background: motivation for research and introduction to the outcomes, including a literature review and reference citations. Methods: describe the problem and the methods you used to explore or address the problem. Results and findings: research results or exploration findings, including theoretical analysis and any experimental and implementation results you accomplished based on your methods. Related work: summarize related work by others; compare your methods and results with others’ work. Cite your references. Conclusion and future work: conclude your exploration and research, and suggest possible future work on the topic.

Read more

Machine Learning Writing | Get Solution Now

Give some examples of sequential decision making problems. Can you see how buy/sell decisions for a stock or other security might be addressed with reinforcement learning?

Read more

Software Design Specification Document | Get Solution Now

In this assignment, you need to create a Software Design Specification (SDS) document based on the first three phases of this project. Once your SDS is completed your team should be able to move on to system implementation using your designs as a blueprint. To assist you with completing this document, please examine the following example: https://www.slideshare.net/RaviYasas/example-for-sds-document-in-software-engineering Write a Software Design Specification document in which you: 1. Summarize the main points for the first three phases of this project. 2. Create all of the required diagrams from Phase 2 and 3 and fill in any gaps that may have been identified as you have progressed through this course. 3. Demonstrate in your SDS a thoughtful consideration of the ideas and concepts presented in this course by providing new thoughts and insights related to the previous phases. 4. Use at least four quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources

Read more

IoT and Social Media | Get Solution Now

Although uniquely compliant with current law and guidance, is the collection and aggregation of data from the IoT and social media an ethical use of data. explain your opinion with supporting evidence. Make sure to address: How has the IoT and social media been affected by cybersecurity over time? Acceptable Use Policy. Although users agree to the conditions of it, is the data being collected used for entirely ethical purposes? User Agreement. If you use something that is provided for free, how does a company make a profit (e.g., how are free products and services monetized)? If companies build security directly into IoT devices before implementing the hardware into the system, the security would be sounder and could be tested ahead of time, instead of building security around the device as an afterthought. Suppose that you are one of the executive members in the company and face this option. However, the built-in security would cost three times higher than the regular without built-in security. Provide your rationale of the decision in light of the Christian worldview.

Read more

Network Security Consultancy | Get Solution Now

Prompt: ABC Manufacturing has hired you as a security consultant to identify security vulnerabilities, provide recommendations, and implement approved changes. Management at ABC has provided you with access to their server networking environment. When the network was set up, the network technician was unfamiliar with the firewall appliance and may have opened up more ports than necessary. Only web services (HTTP and HTTPs) and map service (SMTP) should be allowed from outside of the network.

Read more

Legal Protection in E-Commerce | Get Solution Now

Please review the following two papers:   Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live   Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6. Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live   Discuss the “Legal Protection for Bitcoin users in E-Commerce.” Provide use cases as examples and citations.   You must do the following:   please discuss “Legal Protection for Bitcoin users in E-Commerce”.      

Read more

Cyber Incidents Review | Get Solution Now

Cyber incidents are a leading global business risk in 2020 and cyber threats are constantly evolving, getting smarter and more sophisticated. Provide your opinion on whether you believe that Malware poses a significant risk from an incident response perspective? Give examples of global Cyber incidents that occurred in the last 6 months that impacted the availability of a service(s)? • Critically assess current trends in Malware with particular focus on the impact of Covid-19 • What specific skills are important to respond to Malware incidents?  • Walkthrough an incident response methodology and describe the 4 phases to respond to a Malware outbreak  Note: Maximum of 4 pages (3000 words) Use IEEE referencing method to reference all sources.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information