Windy 8-Puzzle Problem in C++ or JAVA

 Windy 8-Puzzle Problem

We consider a variant of the 8-puzzle problem (http://tristanpenman.com/demos/n-puzzle) under

a windy condition. The initial state and the goal state are shown as follows: We assume that the wind.

Please look the instructions in the attachments.

Important: 

 In your report, please provide the screenshots of all outcomes, and the highlighted code segments

and the detailed explanation on how you implement the followings:

ˆ Data structure: priority queue for frontier set and hash table for explored set;

ˆ Calculation of f(n) = g(n) + h(n);

ˆ Adding leaves for expansion;

ˆ Picking the smallest f(n).

Each screenshot should include your usernames and the current time, which show that you did it by

yourselves.

this code from PYTHON

 using this code from PYTHON: Attached you will find a pre-writtenPython program called “Sort Timer” and an Excel spreadsheet called “Sort Compare”. Modify the “Sort Timer” program to collect the data to complete the spreadsheet. Adjust the “size” variable in the program to the sizes indicated in the spreadsheet. Replace the Selection sort method in the program with the code for the other sort methods as needed. REMEMBER, you do not need to write or retype the various sort methods. All of the sort methods except for the Radix sort are provided in the zip file of the sample programs for the book (in the “Getting Started” section of the course). The Radix sort will be developed in the weekly discussion. Round all times to the nearest second.

Create a simple device driver for the keyboard – Linux Kernel C Programming

Demonstrating a simple device driver with Hard IRQ ISR and Tasklet.

In this experiment, we will create a simple device driver for the keyboard.

Create a kernel module that will be our driver.
Call it driver.c

On inserting this driver, an ISR will be attached to the interrupt number associated with our keyboard.
The ISR, whenever executed should schedule a tasklet to be run later on.
The ISR should print ‘Your Name: Caught the IRQ. Urgent work Muhaha’ to dmesg
The tasklet function should print ‘Your Name: Doing the hackey pending work Muhaha’ to dmesg

The end result is that when this module is loaded, from then on pressing any key on your keyboard should print the two messages in dmesg.

Steps to create the handlers inside the module.

You should have two functions that are your ‘work’ – urgent and deferred

static irqreturn_t irq_handler_isr(int, void *);
void tasklet_fn(unsigned long); 

The irq_handler_isr function should print the required message and then create a tasklet_struct, init it and schedule it.

In your module’s init function you should call request_irq() and register the irq_handler_isr function as the ISR for the keyboard’s interrupt number

You can figure out the interrupt numbers that devices are using from the file /procs/interrupts

In your module’s exit function, you should call free_irq() and deregister the irq_handler_isr function.

Create a suitable Makefile, compile your module, insmod the module and enjoy!

Save the program as RunningTheRace.java

  

Instructons
Save the program as RunningTheRace.java
 

Please run the program from the command prompt

You will need to go to the folder where you’ve saved this file then type: 

javac RunningTheRace.java

This will compile the file then type:

java RunningTheRace

This will run the program

 
Write a program that asks for the names of three runners and the time, in minutes, it took each of them to finish the race. The program should display the names of the runners in the order that they finished. 

Final Research Paper

 

Choose a publicly available data visualization. (be sure to provide the link, cite, and reference).

Analyze the visualization within the context of the data visualization workflow.

Create a proposal of enhancements to create a better user/viewer experience.

Use the data visualization workflow as framework for both your analysis and your proposal.

Consider the various roles of the project team as specified by Kirk’s concept of “hats”.

APA compliance required.

References and In-text citations required.

Minimum word count = 1500.

One Page

Your company is writing an end-user security guide for a client.  You have been tasked with writing a User Guide on Physical Defense, Social Vulnerability Defense, or Social Media Vulnerabilities Defense.  Write a user guideline of best practices to defend against attacks by cybercriminals. 

Some Considerations:  vulnerabilities, penatration testing and activities, best practices, networks and systems,  password complexity, social networking, personal and corporate issues and other areas .

(minimum 1 page )