Past Cases
SEHH2241 Discrete Structures 2024–2025 Semester One Individual Assignment One
SEHH2241Discrete Structures
Write a truth table for the statement below. Then, determine whether the statement is a tautology, contradiction or contingency. You are required to complete the three main connective columns of the truth table in the answer sheet.
CS480 Operating Systems - Assignment 02 Free Response Questions
CS480Operating SystemsL1 CacheScheduler
A run-time profiling tool shows that a machine with more CPU cores often has better cache hit rate (i.e., more effective caching) than the one with less CPU cores, this is particularly true when running many applications concurrently
COMP3506/7505 - Algorithms and Data Structures - Assignment Two: Bloom Filter, Pathfinding, Chain Reaction
COMP3506COMP7505Algorithms and Data StructuresPriority QueueBloom FilterGraph
The main objective of this assignment is to extend your knowledge from assignment one to build more complex data structures and solve more complex problems
COMP2022 Models of Computation - Assignment 3: Turing Machine and Morphett notation
COMP2022Models of ComputationTuring MachineMorphett notation
Consider the following deterministic Turing Machine M over input alphabet Σ = {a, b}: (5 marks) State five strings that are in L(M), and five that are not. The strings should be over Σ. (5 marks) Provide a low level description in Morphett notation of a (1-tape deterministic) Turing Machine for the language that has time complexity at most 5n + 5.
ITECH3108 Dynamic Web Development - Assessment 1 - Front-end Development
ITECH3108Dynamic Web DevelopmentFront-end DevelopmentForum ApplicationJavascriptDOM
For this assessment task, you will use skills acquired through the first six weeks of material to build an interactive front-end to an API. You will be developing a front-end for a simple forum application, using front-end JavaScript, the Document Object Model, and fetch to connect to a RESTful web API. You will also submit a written reflection on your learning.
COMPSYS 705 Formal Methods for Safety Critical Software Test
COMPSYS 705Formal Methods for Safety Critical Software
Consider two processes P,Q shown in Figure 1. Are these processes bisimilar, weakly bisimilar, similar or there is no relationship between them? Justify your selection mat- hematically by either finding the corresponding relation or showing the absence of any such relation.
ICT340 Application Analysis and Design - Assignment: Drone Service application
ICT340Application Analysis and DesignUML
DroneTech is a technology company that develops numerous unmanned aerial vehicles, called drones for many purposes. DroneTech invests heavily on research and development of its drone products. A new Drone Service application is required to allow clients to request and receive drone services.
CSC343 Introduction to Databases - Assignment 2 - Warmup
CSC343Introduction to DatabasesSQLPostgreSQL
In this assignment, we will work with a database for a veterinary clinic, with a similar but not identical schema to the one you saw in Assignment 1. Keep in mind that your code for this assignment must work on any database instance (including ones with empty tables) that satisfies the schema.
COMP4500/7500 Advanced Algorithms and Data Structures - Assignment 2
COMP4500COMP7500Advanced Algorithms and Data StructuresJava
You are in charge of managing a venue for k consecutive days from day 0 to day k − 1 (inclusive), where k ≥ 1. There are n different configurations, c0, c1, . . . cn−1, that the venue can be in, where n ≥ 1. The venue must be in exactly one of the n different configurations at any one time, and is in configuration c0 on day 0.
FIT9137 Introduction to computer architecture and networks - Assignment 2: An Enterprise Network Design Report
Introduction to computer architecture and networksEnterprise NetworkWired LANsWireless LANsBackbone Network
A public transport company requires its office buildings to be connected over a wired LAN and Wireless LAN (WLAN). You have been asked to respond to the following excerpt from their RFP (Request For Proposals) in the newspaper. Scope of The Work At present, the total number of office employees in Melbourne is 230. Each office worker is provided with an office space or cubicle with a multimedia desktop PC having a wired network connection. Owing to a business acquisition, the number of employees in Melbourne is expected to increase substantially
Major Assignment 2: Probability & Hypothesis Testing Case Study
Probability & Hypothesis Testing Case StudyStatisticsHypothesis TestingProbability ModelingInferential Statistical Modeling
You are the manager of a well-established supermarket chain with multiple business operations, including a popular retail store and a factory that produces essential goods. As part of your role, you regularly analyse business data to make informed decisions and optimise performance, leveraging statistical tools and insights.
COMP4161 T3/2024 Advanced Topics in Software Verification - Assignment 1: Syntactic Conventions, Reduction, Type Derivation, Propositional logic and higher-order logic
COMP4161Advanced Topics in Software VerificationSyntactic ConventionsReductionType derivation treePropositional Logic
Simplify the term $(pq)(\lambda p\cdot(\lambda q\cdot(\lambda r\cdot(q(rp))))))))$ syntactically by applying the syntactic conventions and rules. Justify your answer
CS6027 Advanced Computer Networking - Introduction to Network Simulator 2 (NS2)
KennesawCS6027Advanced Computer NetworkingComputer NetworksNS2
The purpose of today’s lab is to familiarize yourself with the network simulation tool: “Network Simulator (Version 2)”, widely known as NS2 that is an open-source event-driven simulator designed specifically for research in computer communication networks. NS2 contains modules for numerous network components such as routing, transport layer protocol, application, mobility, etc.
SOFTENG 752 Formal Specification and Design Assignment #1: Formal Modelling
SOFTENG 752Formal Specification and DesignB Specification and System Property ModellingFormal Modelling
You will be required to use the B formal modelling language to specify the design of a software system in an exact and unambiguous way. You must also use the associated tool, i.e., the ProB model checker, to validate and analyse the design, checking for consistency, completeness, and correctness. It helps in providing evidence that the design accurately represents the intended behaviour of the system, and it helps in uncovering any hidden errors or inconsistencies.
48730-32548, Cyber Security Week-5 Understanding TCP/IP based Attacks
Cyber SecurityTCP/IPLinuxWiresharkNetwoxNetwork traffic sniffer
In this lab, you need to conduct attacks on the TCP/IP protocols. You can use the Netwox or Netwag, Wireshark, Tshark tools in the attacks. All the attacks are performed on Linux operating systems.
ECOS3010: Monetary Economics: Assignment 1: Monetary equilibrium
ECOS3010Monetary EconomicsMonetary equilibriumLatexMonetary policy
What is the condition that represents the clearing of the money market in an arbitrary period t? Determine the real return of fiat money in a monetary equilibrium. How does the percentage of holding endowment affect the real return of fiat money?
Machine Learning Fundamentals Group Assessment: Model comparison
Machine LearningRMSEFeature EngineeringKNNRegression
Background Information Kevin is a professional real-estate manager. In the past, he relied on using a few important features for home valuation. His boss recently asked him to take the initiative to learn to use big data and machine learning algorithms to value home prices in order to better communicate with customers.
CS200 Concepts for Advanced Computer Usage - Assignment 9 - FileMaker
CS200Concepts for Advanced Computer UsageFileMakerSQLDatabase
This assignment may be done independently or with a partner. If you do work with a partner, please add both or your names, usernames and Student ID numbers to the footer of each layout in the files and name the files with both usernames (username1_username2).
COMP643 Advanced Database Management Assignment 2: Transaction Management and Concurrency Control
COMP643Advanced Database ManagementTransaction ManagementConcurrency ControlDatabase Performance TuningQuery Optimisation
Using the two-phase locking protocol, create a chronological list of locking, unlocking and data manipulation activities that would occur during the complete processing of the transaction described in Q1a.
COS20019 Cloud Computing Architecture - Assignment 02 Scalable Cloud Computing Architecture
COS20019Cloud Computing ArchitecturePythonScalable Cloud Computing Architecture
In the cloud project of Assignment 1, you have learnt how to deploy a Photo Album Web Application on a VPC, actually in a EC2 running as a Web Server. However, this is not a highly available environment. In case there are some hardware failure related to that particular EC2 instance running the Web Server. The whole Web Applicaiton will be down and hence cannot be used by the public users.
EPPD1063: Computer Application LAB TEST 1: Excel
EPPD1063Computer ApplicationExcelWord
By using the formula available in Microsoft Excel, please find the largest and smallest marks for each of the Q, A, M and F columns. Please add new rows in the table with appropriate title for the answer.
Acquired Intelligence and Adaptive Behaviour 2024 Coursework No 2: Technical report
G6042Acquired Intelligence and Adaptive BehaviourAgentsAdaptation mechanismsGenetic AlgorithmBackpropagation
You have to write a technical report describing an investigation related to the topics covered in class. For choosing the specific topic of investigation, you have to make a number of choices described below.
FIT1047 Introduction to computer systems, networks and security - S1 2024 Assignment 3 - Networks
FIT1047Introduction to computer systemsComputer SecurityComputer Networks
Students will record data from a real-world wireless network and demonstrate that they can analyse it, identify its properties and potential issues. Students also need to analyse Internet traffic and identify servers, clients and protocols used.
BISM7202 Information Systems for Management - Excel Assignment
BISM7202Information Systems for ManagementExcel
This assignment requires you to create a professional business application using Microsoft Excel 2019 / Microsoft Excel 365. The purpose of this assignment is to test the student’s ability to operate and manage business data in spreadsheets.
MATH4063 Case Studies in Mathematical Modeling - Group Project: Jet Lag
MATH4063Case Studies in Mathematical ModelingJet LagThe Best HospitalBoarding and Disembarking a Plane
Organizing international meetings is not easy in many ways, including the problem that some of the participants may experience the effects of jet lag after recent travel from their home country to the meeting location which may be in a different time-zone, or in a different climate and time of year, and so on. All these things may dramatically affect the productivity of the meeting.
MTH5001: Introduction to Computer Programming - Final Report Project: Arc Diagrams
MTH5001Introduction to Computer ProgrammingArc DiagramsPython
In this project you will investigate properties of arc diagrams, particularly so-called crossings and nestings.
KIT305 KIT607 Mobile Application Development - Assignment 2 - Android Application
KIT305KIT607Mobile Application DevelopmentKotlinJava
You must create a native Android application (i.e. you cannot use Flutter or other Cross-Platform tools for this assignment). Your native application must be written in Kotlin.
CSCI 572: Information Retrieval and Web Search Engines - HW: LLMs, vectors, RAG
CSCI 572CS572Information Retrieval and Web Search EnginesLLMRAGvector DB
We are going to use vector-based similarity search, to retrieve search results that are not keyword-driven. The (three) steps we need are really simple: install Weaviate plus vectorizer via Docker as images, run them as containers specify a schema for data, upload data/knowledge (in .json format) to have it be vectorized run a query (which also gets vectorized and then sim-searched), get back results (as JSON)
COMP1047 Systems and Architecture - Coursework Part-2: Computer Networks
COMP1047Systems and ArchitectureComputer NetworksTCPUDP
This project provides insights on analyzing network performances such as delay, throughput, and packet drops of your designed network. It presents an experimental methodology to obtain an estimate of average delay, throughput, and packet drops for packets of variable payload size. You are required to use the TWO transport layer protocols, the TCP and UDP as we studied in Week-3 class.
Algorithmic Game Theory Summative Assignment: Nash equilibria and Auction
Algorithmic Game TheoryAuctionLoad Balancing
Two players, Player 1 and Player 2, take turns removing 1 or 2 cards from a stack of 6 cards, i.e., each of them, every time their turn comes, pick 1 or 2 cards to remove. Player 1 starts the game. Whoever picks the last card wins 1 unit of payo↵ from the other player
CSE233 DATABASE THEORY - Problem Set #2: Relational calculus
CSE233DATABASE THEORYRelational calculusSQL
Recall the movie database in Problem 1 of the previous home- work, and the query List the theaters showing only movies by Hitchcock. Express this query in nr-Datalog
KXO206 Database Management Systems - Assessment Task 1 - Database Maintenance Report
KXO206Database Management SystemsDatabase MaintenanceSQL
The Shanghai Council for the Promotion of International Trade, founded in November 1956, serves as the oldest local branch of the China Council for the Promotion of International Trade (CCPIT).
160.212 Discrete Mathematics Assignment 1
160.212Discrete MathematicsTruth tableBinary Relation
Use the known equivalences listed in Table 1.6 of page 7 of the Study Guide to show p → (q ∨ ∼r) and ∼p ∧ r ∧ ∼qare logically equivalent
160.212 Discrete Mathematics Assignment 2
160212Discrete Mathematics离散数学Partial OrderPermutation
Let N be the set of all divisors of 60, and let P ={a∈N|4≤a≤30}. Let ≼ be the partial order defined by a ≼ b if and only a divides b. (a) Draw the Hasse diagram of (P, ≼). (b) For every pair (a,b) of numbers in P evaluate the least upper bound, lub(a,b), or say it does not exist (DNE). Present the values in the form of a table. (c) Use your answer to (b) to explain why (P, ≼) is not a lattice.
BISM 7255 - UML ASSIGNMENT - SEMESTER 1-2024 A Digital Solution for Dance Academy Sydney
BISM7255A Digital Solution for Dance Academy SydneyBusiness Information Systems Analysis and DesignUML
The Dance Academy Sydney is a studio in Sydney that provides adults of any age a place to experience dance in a positive environment. In a term, different dance workshops are offered every week covering a range of different styles, Jazz, Ballet, Contemporary, and Tap. A workshop is a two-and-half-day or three-day course focused on a particular dance style.
ST117 Introduction to Statistical Modelling 2024 Final project assignment for WR
ST117Introduction to Statistical ModellingEDAexploratory data analysis
Your written report will be a summary of a real-world data analysis project using the UK ECN repository introduced in the last lecture in Week 10 of Term 2. The assignment is released in two phases. The first phase (released along with Log3) is detailed below. The second phase will be released along with Log4.
CS5001 Final Project: Puzzle Slider Game
CS5001CS5003Intensive Foundations of Computer SciencePython
Puzzle Slider Game is a combination puzzle where a player must slide pieces vertically or horizontally on a board to establish an end result that matches a solution.
INFO5001 Application Modeling and Design Assignment 7 Reports
INFO5001Application Modeling and DesignJava
Create a SupplierReport and SupplierSummary classes and add implement a report with the following columns: - Supplier Name, - Total Sales, - Loyalty score (Number of different customers who picked suppliers products divided by number of all customers)
1DV721 System Administration Assignment #1 Flow Analysis
1DV721System AdministrationComputer Networks
You have been hired by LNU. Co. Ltd. as a System Administrator for doing a network re- design. They already have a network that is operational with around one thousand users. You will start with performing several analyses in the existing network depicted
COMP3477 Algorithmic Game theory - Summative Assignment: Nash Equilibrium, Strategies and Payoffs
Durham UniversityCOMP3477 Algorithmic Game theoryNash EquilibriumPure Nash EquilibriumStrategies and Payoffs
Exercise 1. A set Nof|N|=nneighbours decide simultaneously and independently from each other, on hand whether to build an extension to their home without getting proper planning permission, and on the other hand which of their neighbours to notify the local authority’s planning department about