...4.3.1. Statistical Result of Scenario One: The iPhone is misplaced and needs to be located This was the scenario where the user had misplaced the device at home location and hence the iPhone was needed to be located. The conditions were that the iPhone was at home location but was misplaced and needed to be located. There are now two conditions in the scenario: the iPhone is online and the iPhone is offline. The success rate of the results for this scenario is computed in the following table of statistical result: The iPhone in the offline mode did not seem to respond efficiently when the network was completely available. Out of ten test attempts, five test attempts were a failure. The preceding table explains the same. The iPhone is not efficiently responding when the mobile data connection is not stable in availability. The offline requests made were not successful in reaching the device. Some tests failed by delay in time while some requests din not reach the iPhone at all. 4.3.2. Statistical Result of Scenario Two: The iPhone is lost and needs to be located (not tracking) This was the scenario where the user had lost the device (assumed) at some location, say X, and the user needed to locate the iPhone. The conditions were that the iPhone is at X location and is lost and the user needs the iPhone to be located. The mode that is available to the iPhone in this scenario is online and offline. This scenario is without using the tracking functionality. A custom user message is...
Words: 1870 - Pages: 8
...Unit Five Jerrie Gomez Kaplan University Carrier Sense Multiple Access Both protocols listen for transmission, and Difference Between.com. (2011) explains that CSMA/CA is proactive, and CSMA/CD is reactive. Carrier sense multiple access/collision detection (CSMA/CD) is a protocol that deals with collisions after they occur; once a collision is identified, data transmission is stopped, and then retransmitted once listening to the network proves there is not transmitting data. Carrier sense multiple access/collision avoidance (CSMA/CA) works to detect and prevent collisions before they occur; by listening to the network for any traffic. CSMA/CD is an IEEE 802.3 standardization and CSMA/CA is IEEE 802.11, therefore CSMA/CA is better suited for wireless networks. Collision detection (CD) is easily detected on wired networks, which is why collision avoidance (CA) should be used on wireless networks, as wireless access points cannot accurately detect collisions. Price versus Performance Fast ethernet, introduced in 1995, is capable of carrying data at speeds of 100...
Words: 972 - Pages: 4
...Packet switching more efficiently uses connections over a network. Circuit switching is using its dedicated connection constantly, even if not actually transmitting anything. 5. What is the difference between Error Detecting and Error Correcting Codes. How can Hamming Codes be used to correct burst errors? Error detecting only identifies that an error has occurred in a packet and does nothing to fix the error. It only awaits a resubmission of the packet from the sender which it will check for errors again. Error correcting attempts to not only identify that there is an error, but correct the error. Hamming codes can identify and correct single errors without too much issue. It can also correct a burst error by having the data sequenced into ‘codewords’ that are broken and sent in a fashion that if a burst error occurs can be checked and corrected with Hamming codes when the codewords are re-assembled at the receiver...
Words: 622 - Pages: 3
...DCU OPEN EDUCATION LITERATURE ASSIGNMENT REPORT FORM STUDENT NAME: OVERALL GRADE FOR THIS ASSIGNMENT: SUMMARY OF PERFORMANCE TABLE Performance Components Bands (marks range as a percentage) Excellent (H1) 70-100 Very Good (H2.1) 60-69 Good (H2.2) 50-59 Fair (H3) 40-49 Weak 35-39 Poor below 35 Not applicable Attention to Task Analysis Structure Use of Sources MHRA Referencing Introduction Conclusion Standard of English Presentation This table facilitates the assessment of your performance in selected components of your assignment and is designed to alert you to general areas in your work that are strong or that need improvement. Please note that the components are not equal in terms of contribution to your overall mark which is based on an evaluation of your overall performance, e.g. an excellent assignment on the wrong topic would get a very low mark. Literature students cannot get a high mark if their English is of a poor standard. COMPONENT GRADES (WHERE RELEVANT) Task/Part A B C D E F Grade (1-100) SUMMARY COMMENTS ADVICE FOR FUTURE ASSIGNMENTS ANNOTATED FEEDBACK (Refer to Assignment for the sections relating to the following comments) 1. 2. Part A: My proposal of what is a modernist artefact. After much research and investigation, the artefact that has been chosen to discuss is a poem by Samuel Beckett. The chosen piece is titled Gnome .It was first written in 1932 and...
Words: 1667 - Pages: 7
...Graph 5 illustrates the relationship between the enzyme parameters of the Michaelis–Menten equation. This equation is represented in equation 3 below. The plot was supposed to be a smooth curve but an error occurred, so the velocity of tube 8 was lower than expected. Tube 8 and tube 9 had the same concentration of substrate, so the velocity of tube 8 should have been the same as the velocity of tube 9. The velocity of tube 9 was 26.296μmoles/liter/min. This error could have been due to the wrong about of enzyme or ONPG added to the tube. The wrong amount of ONPG can be easily added to the tube since too many tubes were set up at the same time. Taking time and carefully adjusting the pipet can prevent this error from occur. Other possible errors...
Words: 614 - Pages: 3
...signals. The host must start giving out data into the controller tRC-2 clocks after the controller has acknowledged the WRITEA command from the controller. The controller executes the DQ port to the devices at the middle of the signal of DATAIN port but at two times the speed of transfer rate. The DM inputs are clocked in alliance with the internal clock of the controller. The data is given out to the memory devices on the DQM ports. The operation of the write command is as follows. The user initiates WRITEA along with ADDR and the first write data value is placed on the DATAIN bus with a data masked on DM bus with a particular value. The controller later makes the CMDACK high. This is the acknowledgement of the controller that the operation of write has been started. While this occurs, controller gives out commands to the SDRAM devices side by side. Once the CMDACK is made high, NOP is laid on the CMD on the next clock cycle. tRC-2 is done after the CMDACK is made high by the user itself and the data is masked onto the controller in the DATAIN port for a particular value. The DM is also asserted a particular value at this juncture. Fig. 12. WRITEA timing diagram. A. REFRESH Command The main purpose of the instructor is to perform an AUTO REFRESH command to the SDRAM. The controller will send an acknowledgement to state the fact that the refresh command will be executed with a CMDACK command. A timing diagram shows the working of the whole module. The operations of the REFRESH...
Words: 605 - Pages: 3
...Question 2: What are the foundations of J2EE API? In your answer include the main detail definitions, services, and specifications. J2EE API is used for developing and running enterprise software, including network and web services, and other large-scale, multi-tiered, scalable, reliable, and secure network applications. Specifications : RMI: Distributed Object Communication allows objects to access data and invoke methods on remote objects(non-local memory objects), this process is known as remote method invocation Java Mail: It allows an application component to send Internet mail (notifications. The JavaMail API has two parts: • an application-level interface used by the application components to send mail, and • a service provider interface used at the Java EE SPI level. Java Message Service: JMS is a Message-oriented middleware(MOM) API for sending messages between two or more clients. It provides message standard for an application component based on J2EE to create, send and receive messages. Web Services: The Java API for XML Web Services (JAX-WS) and the Java API for XML-based RPC (JAX-RPC) both provide support for web service calls using the SOAP/HTTP protocol. XML Processing: pull parsingThe Java API for XML Processing (JAXP) provides support for the industry standard SAX and DOM APIs for parsing XML documents, as well as support for XSLT transform engines. The Streaming API for XML (StAX)pull-parsing API for XML. Java EE Connector Architecture: This architecture...
Words: 523 - Pages: 3
...On comparison of the features of each handset, I found S6 Edge to be more superior overall. S6 Edge has features like Fast Charging, Ultra Power Saving mode and Wireless charging which are not in built in the case of iPhone. Customers has to pay extra for these features like they have to buy a case for wireless charging. RAM for S6 edge is 3 GB and for iPhone 6 plus it is just 1 GB. Rear camera and front camera of S6 edge is 16 MP and 5 MP respectively whereas for iPhone 6 Plus it is only 8MP and 1.2 MP. The rear cameras in the S6 Edge have wider apertures. With such superior features and given fact that S6 Edge was released in March, 2015 and iPhone 6 plus in Sep, 2014, Samsung Galaxy S6 Edge should commend more price than iPhone 6 Plus. But the respective prices on Amazon.com are $798.98 and $895 (for 64 GB, unlocked GSM smartphone). The percentage difference is 12%. This clearly highlights the strong role of Apple as a...
Words: 993 - Pages: 4
...Unit 5 Assignment Carlo L. Shaw Capella University Assessment of Addiction and Co-occurring Disorders Marifel is a 19-year-old woman of Filipino decent who was in a boating accident last summer while participating in graduation celebration activities. While celebrating with boating, Marifiel’s boat hit a rock and she lost control, seriously injuring herself and killing one of her friends. As a result, Marifel had to be treated for her injuries and she was given opiates to help control her pain. The opiates worked beyond Marifel’s prescribed treatment and helped to ease the psychological pain of her friend’s death. The orients helped her to act the way she did beyond her accident, psychologically. However,...
Words: 2705 - Pages: 11
...2.1 Intranet: this is a privately accessible infrastructure of cables, routers, and various servers, in most cases it is limited to one company or an organization or a group of companies, like the Internet, an Internet is used to carry a wide range of services. 2.2 Extranet: they too like intranets are privately owned wide area networks, which are generally owned by an organization or a company, however they differ from intranets in the sense that the owner of an extranet charges a specific fee to those who may require access to it or they can access the information provided on the extranet if they are given authorization by an organsiation. Furthermore an extranet, is also used to carry a wide range of services like the Internet. 2.3 Smartphone: this is a mobile phone which has an advanced mobile operating system, to which combines features of personal computer operating system. It has a mobile system environment, connected to the Wi-Fi which is connected to the Internet and has basic computer functions, iOS, some smartphones have a touchscreen display. An environment for applications to be created by an individual user of application developer, the user has a variety of applications that enhance the mobile experience. 2.4 Voice over Internet Protocol (VoIP): this is a service that run on the Internet it is a communication technology, it has been introduced for commercial use. It is a voice which is transmitted over a telephone network, this service runs over any network...
Words: 550 - Pages: 3
...Before the lab began, a box with 2” styrofoam on the bottom and all sidewalls was created. A 2” styrofoam top with a small wooden part for additional cover was added. A lightbulb of unknown wattage was placed inside of the box and was turned on for an unknown time. A small hole was cut into one sidewall in order to place thermocouple probes into at a later time. The first portion of this lab was to set up the initial thermocouple setup, which was described in the apparatus section of this report. Project 7-A: After the apparatus was was set up, thermocouple probe tip voltage was recorded using NI DMM Soft Front Panel software. Voltage relating to ambient temperature was also recorded. Using the provided thermocouple tables and the law of intermediate temperatures, the temperature in the box was found. Project 7-B: The second thermocouple probe was attached to the cold junction compensator, cjc, and temperature reading of the cjc was recorded. Project 7-C: Long banana cables were inserted between the thermocouple probe wires and the amplifier. NI DMM Soft Front Panel voltage reading was recorded, converted to a temperature reading, and compared to the cjc temperature reading. Project 7-D: Ice and water were collected in a beaker and the reference junction, located between the thermocouple wires and the amplifier, was placed in the ice water. NI DMM Soft Front Panel voltage reading was recorded, converted to a temperature reading, and compared to the cjc temperature reading...
Words: 430 - Pages: 2
...Contents P3.1 1 Analyse the functions of a product, e g forces acting on any four engine component, and what kind of material constraints should be taken into account based on various loading factors at its design phase. 1 Camshaft 1 push rod 2 valves springs 3 Piston 3 P3.2 5 Identify the function of the piston, connecting rod , crankshaft and fly wheel. list down and explain the materials and their properties the components which they are made with, along with the processing methods to make these components. 5 Piston 5 Connecting rod 6 Crankshaft 7 Flywheel 8 P3.3 9 Identify and explain the possible limitations, on the processing of piston, connecting rod and crankshaft and flywheel, which is imposed by processing costs, the need to safeguard...
Words: 1745 - Pages: 7
...\textit{(1)} unexpected items; \textit{(2)} expected ones that users re-consumed in the test set; and \textit{(3)} expected items that users did not re-consume. Thus, given the whole training set as input, a good recommender should assign high scores to the re-consumed items. This analysis shows the capability of our heuristics to identify items effectively re-consumed instead of unexpected items potentially relevant. Hence, as the second analysis, we measure how relevant the recommended items might be, considering all users. A good evidence about relevance of an item is the percentage of users who consumed it and re-consumed again after $x$ time units. We assume that the higher this percentage, which we name re-consumption rate (\textit{rerate}), the higher the probability of this item to be a potentially relevant item after $x$ time units. Thus, a good RS of known items should present simultaneously high \textit{recall} and \textit{rerate} levels.\looseness=-1 We evaluate the \textit{recall} of re-consumed items through the following experiment. First, we use the whole training set of each user as input for each proposed heuristic. Then, we retrieve as output recommendations of...
Words: 479 - Pages: 2
...achieved, then each instrument should be as far away as possible from each other. 4. In your recording studio there are DI boxes. What is their main use? How are they powered? (2 marks) Direct input (DI) boxes are used in recording studies to connect an unbalanced output signal to a microphone level balanced input via a XLR cable. They are indispensible for recording electric and bass guitars, putting signal into the mixers microphone input. DI boxes match levels, and are usually used with PA systems and in recording studios. DI boxes require power, supplied either by phantom power (48 volts) from the mixer or an internal 9 volt battery. 5. On a mixer what do the terms PRE and POST on an AUX send output mean? (2 marks) Auxiliary sends are usually used for two purposes. They are used to send signals to an audio processor or FX unit, such as reverb, or to an entirely separate monitor mix for musicians, for example a headphone send. The engineer can manipulate this send either before or after the signal comes through the mixing desk, hence the need for pre and post fade. Pre-fader auxiliary sends are used for the to monitor the mix. When adjustments are made whilst using pre-fader auxiliary sends, the musicians would not hear it, although it would be heard the front-of-house. For example, if an acoustic cello was using pick-up, which needed equaliser (EQ) applied, the cellist would not hear the adjustments through their foldback, although the audience would. Post-fade auxiliary...
Words: 1950 - Pages: 8
...In this section, the five research questions, elaborated in Section 1.2, are discussed. Research question 01 What are the requirements of secure cloud storage service that allows the file sharing and the violation detection of the security properties? The data sharing increase the complexity of a storage solution, requesting schemes to distribute and manage keys and procedures to granting or revoking permissions. The lazy revocation approach is normally used for efficient purposes but it is not a security recommendation. Data sharing is achieved by the access control mechanisms such as Access Control Lists, Proxy Re-Encryption and Attribute-Based Encryption. Besides, these mechanisms normally depend on a third party that cannot access any sensible information. In this research, ACL was chosen due to the suitability to be used together with monitoring and auditing mechanisms as described in related work. The monitoring and auditing mechanisms are used to verify security properties. These mechanisms enable to prove that if the cloud provider is trustworthy or there has been a violation. Then, the main requirements are the non-repudiation of a detected violation and the protection against false accusations. Other aspects of these mechanisms depend on the analyzed security properties and the threats related to them. Research question 02 What are the attacks that violate these properties and what are not detected by existing solutions? Normally, a secure solution protects...
Words: 1285 - Pages: 6