...Calorie Management by Team A PRG/211 - Algorithms and Logic for Computer Programming June 29, 2015 Calorie Management With rising obesity rates all across the United States of America, the team felt that it was necessary to build a program that could help citizens make healthier decisions and track those decisions on a day-to-day basis. The team set out to create a program that could manage and track a person’s daily calorie expended as it compares to their calorie intake. This program allows the consumers of the application be more conscientious of the choices they make as to how often they workout and what they choose to eat. To better help you as investors understand the proprietary nature of our application along with the ease of use for the end consumer, we will discuss each of these details along with future updates for this application. Not only will this application continue to improve the lives of those who use it, but it will become a social and cultural phenomenon that will contribute to bettering the lives of all those who need it. The mass appeal of this application is that it is not only a weight loss application, but also one for those who are already healthy. It will help to provide a way for the user to maintain his or her already good habits they have learned on their own or through use of the application The Program The program will ask for specific information about the user’s calories consumed, and calories expended. The calories consumed...
Words: 2262 - Pages: 10
...the reduced probability of visual attention returning to a previously attended target (Eysenck and Keane, 2010). The following study uses the Posner paradigm (1980) to study attentional research. The study investigated the effects of CTOA (cue-target onset asynchrony) and validity of cues on the subjects’ RT towards detecting a target. The following study employed a within-subjects design where 56 participants run the experiment on computers using PsychoPy as the experimental software, and they were required to fixate on a point while being aware of the surroundings, then press on the spacebar as soon as they spot a target come up after the cue. Posner and Cohen (1984) found that when the CTOA was longer than 200ms, the participants’ RT will be longer if a target appeared at a cued location. In our experiment, it was revealed that although participants’ results showed the existence of the IOR, however there was no significant difference between both variables and the RT. According to James (1890), attention "is the taking possession of the mind, in clear and vivid form, of one out of what may seem several simultaneously possible objects or trains of thought. It implies withdrawal from some things in order to deal effectively with others." Psychologists have been able to divide the concept of attention into two groups: selective attention and divided attention. And in these two groups, both the auditory and visual attention seem to fall into the selective attention category...
Words: 1644 - Pages: 7
...Work in Progress: Lecture Notes on the Status of IEEE 754 October 1, 1997 3:36 am Lecture Notes on the Status of IEEE Standard 754 for Binary Floating-Point Arithmetic Prof. W. Kahan Elect. Eng. & Computer Science University of California Berkeley CA 94720-1776 Introduction: Twenty years ago anarchy threatened floating-point arithmetic. Over a dozen commercially significant arithmetics boasted diverse wordsizes, precisions, rounding procedures and over/underflow behaviors, and more were in the works. “Portable” software intended to reconcile that numerical diversity had become unbearably costly to develop. Thirteen years ago, when IEEE 754 became official, major microprocessor manufacturers had already adopted it despite the challenge it posed to implementors. With unprecedented altruism, hardware designers had risen to its challenge in the belief that they would ease and encourage a vast burgeoning of numerical software. They did succeed to a considerable extent. Anyway, rounding anomalies that preoccupied all of us in the 1970s afflict only CRAY X-MPs — J90s now. Now atrophy threatens features of IEEE 754 caught in a vicious circle: Those features lack support in programming languages and compilers, so those features are mishandled and/or practically unusable, so those features are little known and less in demand, and so those features lack support in programming languages and compilers. To help break that circle, those features are discussed in these notes...
Words: 18117 - Pages: 73
...Project Part 1: Multi-Layered Security Plan Loren Miller NT2580 Monday PM Introduction: Describe each layer of the Open System Interconnection (OSI) Model. List a security feature of each layer if it applies. List the protocol of each layer if it applies. List types of attacks that are you protecting against in each layer. Your goal is to be able to protect a web hosting company that has a global presence. This web hosting company supports customers in the following industries: Medical, Financial, and Governmental. Physical Layer: The Physical Layer defines the physical properties of the network, such as voltage levels, cable types, and interface pins (Baker). Any attack on the Physical Layer would have to be some type of physical action, like disrupting a power source, changing of interface pins, or cutting the actual cables. Simply tampering with someone’s fuse box outside their office can cause a disruption of service. Faulty power is a problem that can be caused accidentally by the power company, or intentionally by your competitor tampering with the fuse box. A smaller business may consider installing an Uninterrupted Power Supply (UPS) which may help avoid many unrecoverable power associated problems. The addition of a UPS to your critical system will give you time to perform an orderly shutdown when power is interrupted. An abrupt termination of power to any electrical equipment has potential for great damage. Much in the same way you might protect your home...
Words: 1467 - Pages: 6
...Note: achieves a distinction but the report does not fully reflect what was shown at demo] Mobile Devices and Their Impact on the Learning Environment. By Stuart Greig – GT320827 MSc Web Development A project submitted in partial fulfilment of the award of Master of Science In Web Development from Staffordshire University Supervised by Philip Windridge and Alastair Dawes March 2014 Word Count: 14422 For the Attention of Philip Windridge 1|Page Faculty of Computing, Engineering and Sciences Table of Contents Table of Contents 2 Abstract 5 Acknowledgements 6 List of Figures 7 Introduction 8 Chapter 1: Research Methods 9 1.1 Qualitative or Quantitative? 9 1.1.1 Quantitative Research 9 1.1.2 Qualitative Research 10 1.2 Methods to be used 10 1.3 Conclusion 10 Chapter 2: Current Mobile Learning Initiatives 11 2.1 Entrust: Learn Anywhere 11 2.2 Apple in Education 11 2.3 Conclusions 12 Chapter 3: Barriers to E-Learning 14 3.1 Introduction 14 3.2 Attitudes as a barrier to E-Learning and M-Learning 3.3 Financial Barriers to E-Learning and M-Learning 3.4 Conclusions 20 Chapter 4: The Benefits of E-Learning 21 4.1 Distance and Collaborative Learning 21 4.2 Personalised Learning 22 4.3 Increased Interactivity 23 4.4 Additional Resources 23 4.5 Conclusions 24 Chapter 5: Educational Theory 26 5.1 Student Centred Learning (SCL) 26 Chapter 6: Application Development 29 6.1 Initial Web, Database and Application Design 29 6.1.1 Requirements List 29 6.1.2 UML Use Case Diagram and...
Words: 38347 - Pages: 154
...European Business Law 1! ! Introduction to international business law and elements of contract formation! ! ! ! ! Useful for :! • Business relationships depend upon legally binding agreements! • Being aware of contract traps (avoid business troubles)! Law > Contract Law > French contract Law > International Contract Law (comparative law / Unidroit principles / Vienna Convention) > Common Law ! What is a contract law?! 3 main ideas = A contract is act of Freedom / of Willingness / of Foreseeability! 2 main principles = Principle of obligatory force / of good faith! Problems when negotiating a contract :! Is the negotiator empowered?! Severability or not?! Confidentiality or Non-disclosure agreement! ! A Contract is an agreement between 2 or more parties that is binding in law! ! When does a contract come into force? => Agreement on essential terms! ! BEFORE : Elements of contract formation! ! Offer and Acceptance ! ! ! An offer accepted is a contract / A statement of willingness to contract on specified terms! • Express / implied offer! • Adressed to one particular person, a group of persons, or the world at large! • Offer and Invitation difference to treat (= advertising)! Revocation of an offer : ! • Withdrawal of the offer : An offer may be withdrawn at anytime before acceptance! • Lapse of time :! • Where a time-limit : the offer automatically falls on the expiry of that time-limit! • Where no time-limit : An offer only remains open for a reasonable time! • Rejection...
Words: 1251 - Pages: 6
...they will follow that code of ethics. Ethical behavior in business is consistent with the principles, norms, and standards of business practice that have been agreed upon by society. At times, however, an individual decides to go against the code of ethical behavior for personal gain. The term patent usually refers to an exclusive right granted to anyone who invents any new, useful, and non-obvious process, machine, article of manufacture, or composition of matter, or any new and useful improvement thereof, and claims that right in a formal patent application. The additional qualification utility patent is used in the United States to distinguish it from other types of patents (e.g. design patents) but should not be confused with utility models granted by other countries. Examples of particular species of patents for inventions include biological patents, business method patents, chemical patents and software patents. Some other types of intellectual property rights are referred to as patents in some jurisdictions: industrial design rights are called design patents in some...
Words: 4965 - Pages: 20
... A Skeptic's Guide to Computer Models by John D. Sterman This article was written by Dr. John D. Sterman, Director of the MIT System Dynamics Group and Professor of Management Science at the Sloan School of Management, Massachusetts Institute of Technology, 50 Memorial Drive, Cambridge, MA 02139, USA; email: jsterman@mit.edu. Copyright © John D. Sterman, 1988, 1991. All rights reserved. This paper is reprinted from Sterman, J. D. (1991). A Skeptic's Guide to Computer Models. In Barney, G. O. et al. (eds.), Managing a Nation: The Microcomputer Software Catalog. Boulder, CO: Westview Press, 209-229. An earlier version of this paper also appeared in Foresight and National Decisions: The Horseman and the Bureaucrat (Grant 1988). A S KEPTIC'S GUIDE TO COMPUTER MODELS 2 The Inevitability of Using Models........................................................................3 Mental and Computer Models..............................................................................2 The Importance of Purpose..................................................................................3 Two Kinds of Models: Optimization Versus Simulation and Econometrics.......4 Optimization.............................................................................................4 Limitations of Optimization..........................................................5 When To Use Optimization....................
Words: 14261 - Pages: 58
...|Politehnica University of Bucharest | | | | | | | | | | | | | | | |Software Engineering | |MedPulse | |Software Requirements...
Words: 3076 - Pages: 13
...Changing Characteristics of the Workforce There are several trends regarding the future of the American workforce that underscore the challenge and importance of the human resource function (Bernardin 15). The office environment is a microcosm of humanity, there are varying personalities, socioeconomic influences, and cultural differences to name a few. The composition of the workforce is changing drastically, and these changes are affecting HRM policies and practices. It is estimated as of 2010 only 15 percent of the U.S. workforce were native-born white males. Furthermore, nearly 90 percent of growth in the U.S. workforce from 1995 to 2008 came from women, immigrants, African-Americans, and people of Hispanic or Asian origin (Bernardin 15). Consequently, it is now more important than ever, HR professionals and Managers develop skills to manage the diversity of the organization today. One such skill is the development of Emotional Intelligence (EI). (EI) is paramount to managing the changing characteristics of a diverse workforce in the competitive business environment of today. Cultural differences can be a source of conflict in the workplace that can affect productivity and ultimately the bottom line. Much like family that evolves and grows through marriage, or friendships, people are often thrown together with different interests and personalities. The same can be said for the workplace, except that often people are thrown together for no other reason than they...
Words: 2571 - Pages: 11
...Basic Object-Oriented Concepts How People Understand Technology There is an old story of how several blind men set out to understand what an elephant was by examining a live specimen. Each of them explored a different part of the elephant's body. One blind man, falling against the elephant's side, proclaimed that an elephant must be very much like a wall. Another, grasping the elephant's ear, decided that an elephant must closely resemble a leaf. One grabbed the elephant's tail and determined that elephants must resemble ropes. Yet another felt the elephant's leg and came away convinced that elephants are very much like trees. Still another held the elephant's trunk and exclaimed that elephants had much in common with snakes. While there was at least a grain of truth in each blind man's observation, none of them had a complete and accurate understanding of just what an elephant is. We can imagine the many animated debates that these blind men had when they compared notes -- each sure that the others must be wrong. Often, people studying technology are like the blind men in our story. It is very common to focus intently on one facet of one aspect of a technology while ignoring the vast breadth of the same technology. There is nothing wrong with this -- unless a person studying the facet begins to think that he or she has somehow acquired a good grasp of the entire technology. To acquire an in-depth understanding of a technology requires a great deal of research. The sheer...
Words: 5440 - Pages: 22
...TABLE OF CONTENTS Sr. Content Page no No 1. INTRODUCTION 6 1.1 Abstract 1.2 Problem Definition 1.3 Scope of Project 2. REVIEW OF LITERATURE 8 3. SOFTWARE REQUIREMENT SPECIFICATION 18 4. EXISTING SYSTEM 22 5. PROPOSED SYSTEM 26 6. TIMELINE CHART OF PROJECT` 32 7. FUTURE SCOPE 33 8. CONCLUSION 34 9. REFERENCES 35 1. INTRODUCTION 1.1 Abstract Virtual Classroom represents an innovative shift in the field of learning, providing rapid access to specific knowledge and information. It represents an interface between the students and a professor and provides personalized learning materials to the users. It offers a possibility to the attendees to share different resources at once and work with them as if they were at the same place where (real) resources are. In the system design, we use agents as entities that work on different tasks in the system. A set of agents of the same type is responsible for handling different users and their requests. The cooperation among agents is established through the act of exchanging messages. A wide variety of classroom techniques are being advocated to increase learning: active learning, collaboration, integration of assessment...
Words: 7999 - Pages: 32
...CHAPTER ONE INTRODUCTION 1. BACKGROUND OF THE STUDY User authentication for network or internet based environment posed a challenging task for system and network administrator. This statement is true and is still very much applicable till these days as it is a well known fact that authentication is being widely incorporated as part of access control for most systems. Authentication has been the catalyst for business organization in information protection and security. Implementation of access control policies, standards or procedures involves the identification of appropriate authentication mechanism whereby the criticality of the information being protected are being used as justification for having a more refined authentication mechanism as compared to a more simple approach. Without the appropriate authentication mechanism in place, attacker could easily gain access to systems or applications by utilizing personal information, gained through various means, including but not limited to social engineering. Conventional textual passwords are the most common mechanism used in authentication. This method requires a user to enter their username and password, either in alphabet or numeric, or more commonly, a mixture of both forms as authentication tokens to gain access to systems or applications. Two recent surveys have shown that users choose short, simple passwords that are easily guessable, for example, “password”, personal names of family members, names...
Words: 17307 - Pages: 70
...WIRELESS LOCAL AREA NETWORK: SECURITY ISSUES AND COUNTERMEASURES IN ORGANISATION Nor Rasyidah Binti Haminudin2011634444M. Sc. (Information Technology)Faculty Of Computer And Mathematical SciencesUniversity Technology MARA, Malaysianorrasyidah.haminudin@gmail.com | | | ABSTRACT Every organisation today is looking to implement Wireless Local Area Network (WLAN) infrastructure to improve its communication capabilities by providing access anywhere for employees, and more importantly, convenient access for customers and other users. WLAN provides users many benefits such as portability, flexibility, reduced hardware need and lower installation cost. Without a doubt, the benefits of WLAN enhance an organisation’s overall productivity. However, WLAN is not without its own security problems. WLAN infrastructures that are not secured would actually affect the security posture of the LAN environment as well. Having an unsecured WLAN can result in a loss of service, or can be used as a staging area to launch attacks against other networks. The significant challenges faced today in securing wireless LANs are maintaining privacy, data confidentiality, and preventing unauthorized access using proper access control mechanisms. This paper will mainly focus on the wireless access points (APs) as devices that act as a central transmitter and receiver or WLAN radio signals. It will begin by introducing the concept of WLAN. The introductory section gives brief information on the WLAN...
Words: 3541 - Pages: 15
...I. Introduction During the early days of computer industry, the software came integrated with hardware. The issue of intellectual property remained confined to hardware only. All this changed during the sixties when software was unbundled from hardware. This gave rise to independent software vendors (ISVs) and the production of standard and custom operating systems, as well as independent applications software’s. Rapid diffusion of low-cost desktop or personnel computer (PC) in late seventies and eighties opened up huge opportunities for ISVs. The software industry gradually increased in terms of overall trade, production and consumption. In 1990s, the widespread diffusion of the Internet created new channels for low-cost distribution and marketing of packaged software, reducing the barriers to entry into the packaged software industry. It also expanded the possibilities for rapid penetration of markets by packaged software products. This rapid increase in consumption of software and easy penetration of market through Internet resulted in increased software piracy, creating a big market in pirated software. According to estimates the global rate of piracy was 59.9% in the year 2010 that means out of the total software sold worldwide 59.9% was fake. Piracy causes huge losses of revenues to software companies every year. This has made the issue of intellectual property protection for software all the more important. The software is a complex product, which has given rise to a...
Words: 7384 - Pages: 30