object oriented programming java

 

Simulate the functioning of a network interface. An interface has a MAC address (a String). Computers (threads) send ethernet frames to the network interface input which is a waiting queue. Computers send frames every 1 second. Each frame contains a message and a destination address.

The network interface controller (thread) gets the frame from the queue and checks if the destination address is the same with the network card address. If they are they are different the packet is dropped. If they are the same the controller displays on the screen “Frame with message was accepted. Every 5 seconds the controller outputs on the screen statistics : how many frames were accepted, how many were dropped.

In main test the program with 100 computers, each sending 10 frames and a network interface card. Solve the concurrent access to shared resources using objects lock, wait and notify.

assignment-10

 Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

Leaflet Challenge- military base data and UFO sightseeing

Before You Begin

  1. Create a new repository for this project called leaflet-challenge. Do not add this homework to an existing repository.
  2. Clone the new repository to your computer.
  3. This homeworks utilizes both html and Javascript so be sure to add all the necessary files. These will be the main files to run for analysis.
  4. Push the above changes to GitHub or GitLab.

Your Task

Level 1: Basic Visualization

Your first task is to visualize an UFO sightseeing data set.

  1. Get your data set : attached
  2. Import & Visualize the Data Create a map using Leaflet that plots all of the UFO sightseeing from your data set based on city and state

Level 2: More Data 

Plot a second data set on your map to illustrate the relationship between military base locations and UFO sightseeing locations. You will need to pull in a second data set and visualize it along side your original set of data. Data on military base locations is attached. 

  • Plot a second data set on our map.
  • Add a number of base maps to choose from as well as separate out our two different data sets into overlays that can be turned on and off independently.
  • Add layer controls to our map.
    • Your data markers should reflect the location of the UFO sightseeing in their size and color. UFO sight seeing with more frequency should appear larger and darker in color.
    • Include popups that provide summary about the UFO sightseeing from the report when a marker is clicked.
    • Create a legend that will provide context for your map data.
    • Your visualization should look something like the map above.

Assessment

Your final product will be assessed on the following metrics:

  • Completion of assigned tasks
  • Visual appearance
  • Professionalism

Good luck!

Discussion: The concept of 3-F Method

Data science

Course: Data Science & Big Data Analy

Due Date – 5 hours

Discussion Question: 3-F Method

The concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics.

Prof. Guidelines 

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the University Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Books and Resources 

L. Zhao, Y. Huang, Y. Wang and J. Liu, “Analysis on the Demand of Top Talent Introduction in Big Data and Cloud Computing Field in China Based on 3-F Method,” 2017 Portland International Conference on Management of Engineering and Technology (PICMET), Portland, OR, 2017,  pp. 1-3. https://doi.org/10.23919/PICMET.2017.8125463

Saiki, S., Fukuyasu, N., Ichikawa, K., Kanda, T., Nakamura, M., Matsumoto, S., Yoshida, S., & Kusumoto, S. (2018). A Study of Practical Education Program on AI, Big Data, and Cloud Computing through Development of Automatic Ordering System. 2018 IEEE International Conference on Big Data, Cloud Computing, Data Science & Engineering (BCD), Big Data, Cloud Computing, Data Science & Engineering (BCD), 2018 IEEE International Conference on, BCD, 31–36. https://doi.org/10.1109/BCD2018.2018.00013

Required Text

“APA Format” 

https://academicwriter.apa.org/6/ 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Please answer this

Develop a Continuity plan for your business or organizations, Ref NIST 800-34. This assignment should meet the essay requirements (i.e. 1,200 word minimum). Must be in APA 7 Format. I have attached NIST 800-34

Discussion

 After reading chapter 6, analyze the structure of advanced encryption standards and why it makes them so strong. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted 

Software Development Company

 

FiveRivers Technologies  has been at the cutting edge of technology since 2003, pioneering Virtualization and Systems Management technology for Enterprise and Embedded systems, developing globally top ranked mobile applications downloaded tens of millions of times and winning international awards for our work. 

About Us

COMPUTER

 

  • This assignment must be in APA format. 
  • The assignment should be in paragraph form using complete sentences and avoiding bullet points and numbered list.
  • Use a Level 1 heading to separate your sections (Page 47 of the APA Publication Manual).
  • Title and reference pages do not count toward the total word or page count. 
  • Textbook and outside sources need to be referenced and cited in the paper.

Essays: (at least 300 words per prompt)

1. How is the Gram stain used to classify bacteria? How do antibiotics inhibit the growth of bacteria? Explain how carriers play an important role in the transmission of pathogens. Jan acquired a MRSA infection during a stay at a rehabilitation facility. Jan’s physician tells her that her MRSA was caused by S. aureus. How would you explain to Jan what S. aureus is and how it can cause diseases?

2. Lou had abdominal surgery. During his stay at the hospital a catheter was inserted into his bladder. After returning home Lou was diagnosed with a nosocomial infection. What are the principle routes of transmission of nosocomial infections? What can be done to prevent nosocomial infections? What are three reasons why rates of nosocomial infections are markedly higher in developing countries? What are five things that increase the risk of nosocomial infection?

3. What is the difference between a neoplasm, benign tumor, and malignant tumor? Identify four chronic infections that may cause cancer, and what cancer the infection might cause. Mr. Brown age 63 and Mrs. Brown age 61, are being seen in for a routine check-up. What cancer screenings should Mr. and Mrs. Brown receive (name at least 3 and why)?

4. In Western societies, why is colorectal cancer the most common cancer, but yet there has been a decline in the incidence and mortality of cervical cancer over the last 40 years? Identify and discuss four nonspecific warning signs of cancer and which cancer the warning sign is linked to. Aaron is a 28-year-old who had an EBV infection during high school. He noticed one of his lymph nodes in his neck is swollen but is not painful. He is also experiencing night sweats. What is a possible diagnosis? Give some possible treatments for this diagnosis?

DISCUSSIONS- Business Intelligence

  

1. Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

NOTES: 1000 WORDS, ZERO Plagiarism & REFERENCE