...PRG/211 – Week 5 Team B – Algorithm Planning Visual Logic CALORIE MANAGEMENT PROGRAM Week 2 Algorithm Planning Week 3 Program Variables for Calorie Management Week 4 Verification & workaround for Calorie Management Week 5 Learning Team Assignment ****************************************************** About the Assignment Imagine that your team of software developers won a contract to develop a program that will identify whether a person is balancing calories consumed with those being expended or burned by taking the following into account: The balance of calories is calculated daily. Calories are consumed in both food and beverages. Calories can be identified from both product labeling and calorie counters located on the Internet. Calories are burned daily in both daily living and exercise. Calories expended or burned can be calculated using calorie calculators located on the Internet. The balance of calories may be displayed in either calories or pounds and ounces. The following are examples of the information that might be provided: Calories are in balance. _ _ _ more calories are consumed than expended. _ _ _ more calories are expended than consumed. No pounds/ounces were gained or lost. _ pounds _ _ ounces may have been gained. _ pounds _ _ ounces may have been lost. Use the following computation: One pound equals 3500 calories. THE PLAN Identify the criteria TEAM B will need to develop the required software. To do this, Team B must...
Words: 1400 - Pages: 6
...E-COMMERCE (TIT-501) UNIT I Introduction What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce, Inter Organizational E-Commerce Intra Organizational E-Commerce, and Consumer to Business Electronic Commerce, Architectural framework Network Infrastructure for E-Commerce Network Infrastructure for E-Commerce, Market forces behind I Way, Component of I way Access Equipment, Global Information Distribution Network, Broad band Telecommunication. UNIT-II Mobile Commerce Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application Protocols, WAP Technology, Mobile Information Devices, Web Security Introduction to Web security, Firewalls & Transaction Security, Client Server Network, Emerging Client Server Security Threats, firewalls & Network Security. UNIT-III Encryption World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption, Public Key Encryption, Virtual Private Network (VPM), Implementation Management Issues. UNIT - IV Electronic Payments Overview of Electronics payments, Digital Token based Electronics payment System, Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments, Home Banking, Online Banking. UNIT-V Net Commerce EDA, EDI Application in Business, Legal requirement in E -Commerce, Introduction to supply Chain Management, CRM, issues in Customer Relationship Management. References: 1. Greenstein and Feinman, “E-Commerce”, TMH 2. Ravi Kalakota, Andrew Whinston...
Words: 2913 - Pages: 12
...PROGRAM DESIGN TOOLS Algorithms, Flow Charts, Pseudo codes and Decision Tables Designed by Parul Khurana, LIECA. Introduction • The various tools collectively referred to as program design tools, that helps in planning the program are:– Algorithm. – Flowchart. – Pseudo-code. Designed by Parul Khurana, LIECA. Algorithms • An algorithm is defined as a finite sequence of instructions defining the solution of a particular problem, where each instruction is numbered. • However, in order to qualify as an algorithm, every sequence of instructions must satisfy the following criteria: Designed by Parul Khurana, LIECA. Algorithms • Input: There are zero or more values which are externally supplied. • Output: At least one value is produced. • Definiteness: Each step must be clear and unambiguous, i.e., having one and only one meaning. • Finiteness: If we trace the steps of an algorithm, then for all cases, the algorithm must terminate after a finite number of steps. Designed by Parul Khurana, LIECA. Algorithms • Effectiveness: Each step must be sufficiently basic that it can in principle be carried out by a person using only one paper and pencil. – In addition, not only each step is definite, it must also be feasible. Designed by Parul Khurana, LIECA. Formulation of Algorithm • Formulate an algorithm to display the nature of roots of a quadratic equation of the type: ax2 + bx + c = 0 provided a ≠ 0 Designed by Parul Khurana, LIECA. Formulation...
Words: 914 - Pages: 4
...call System Analysis and Design programmers do to understand a problem. Many diagrams including "Work Break Down Structure", "Workflow Diagram" and "Class Diagrams" are some of the most common ones are used. Question 2. What is Pseaudocode? Pseudocode is an informal high-level description of the operating principle of a computer program or other algorithm. It uses the structural conventions of a programming language, but is intended for human reading rather than machine reading. Pseudocode typically omits details that are not essential for human understanding of the algorithm, such as variable declarations, system-specific code and some subroutines. The programming language is augmented with natural language description details, where convenient, or with compact mathematical notation. The purpose of using pseudocode is that it is easier for people to understand than conventional programming language code, and that it is an efficient and environment-independent description of the key principles of an algorithm. It is commonly used in textbooks and scientific publications that are documenting various algorithms, and also in planning of computer program development, for sketching out the structure of the program before the actual coding takes place. Question 3 computer programmers normally perform what 3 steps? 1. Input is received. 2. Some process is performed on the input. 3. Output is produced. Question 4 What does user friendly mean? 2. user friendly" means...
Words: 330 - Pages: 2
...1. Explain what software you used to create your game To create my game, a software called “Scratch was used. Scratch is a software that is downloadable on most PC’s, people can use this program to share interactive media. This is includes self-made games as well as animations. 2. Explain what an algorithm is An algorithm is a process, or a set of rules to be followed in calculations or other problem-solving operations, especially by a computer. However, algorithms are used in our day to day life, whether you notice or not. For example; a daily routine, or a cooking recipe. 3. Explain what an if statement is An if statement is a “block” or a piece of code that when one thing happens, it will do that, but if another happens, it will do something else. For example, when...
Words: 653 - Pages: 3
...Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Ref Page Chapter 11: Planning the Computer Program Slide 1/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Learning Objectives In this chapter you will learn about: § Programs must be planned before they are written § Algorithm § Flowchart § Pseudocode § Plan the logic of a computer program § Commonly used tools for program planning and their use Ref Page 183 Chapter 11: Planning the Computer Program Slide 2/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Purpose of Program Planning § To write a correct program, a programmer must write each and every instruction in the correct sequence § Logic (instruction sequence) of a program can be very complex § Hence, programs must be planned before they are written to ensure program instructions are: § Appropriate for the problem § In the correct sequence Ref Page 183 Chapter 11: Planning the Computer Program Slide 3/44 Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Computer Fundamentals: Pradeep K. Sinha & Priti Sinha Algorithm § Refers to the logic of a program and a step-by-step description of how to arrive at the solution of a given problem § In order to qualify as an algorithm, a sequence of instructions must have following characteristics: § Each and every instruction...
Words: 3284 - Pages: 14
...Multiple-product & Various Truck Capacities Cross-docking Problem Introduction Customer demands are getting more complicated and even harder to be satisfied nowadays. It is highly needed for the company to have such flexibility, agility and reliability in terms of answering the demand requests from their customers. But their limitations in improving customer satisfaction might be a big problem for them and the operation of single company can have a bad impact on those of the other companies in the supply chain, meaning that if one company fails to fulfill the demands required, it will affect the related companies and obviously will put them in jeopardy in terms of customers trust and the cost they would have to spend. Therefore, improving supply chain management is really attractive for those companies looking to efficiently improve their customer satisfaction. Apte and Viswanathan (2000) stated that distribution process is responsible for 30% of an item price and this is the reason why there are a lot of companies trying their very best to develop new distribution strategies in order to manage their product flow in efficient manner. Cross docking is definitely one of those strategies people believe to be an efficient strategy to minimize inventory and to reduce cycle times. Apte and Viswanathan (2000) also defined cross docking as the continuous process to the final destination through the cross-dock storing products and materials in the distribution center. When cross-docking...
Words: 1829 - Pages: 8
...limitations, type of output obtained, and some other general characteristics. Quantitative and computer-based models will sometimes produce odd layout shapes. For this reason, optimization models and computer programs designed to plan facility layouts, based on optimizing certain objectives, can be useful only for determining some guidelines for the planners. While these models can be used for planning alternative layouts, considerations of qualitative and personnel factors should be given during the layout finalization phase. INTRODUCTION One of the tasks in layout planning is assigning relative locations to a set of facilities. The best layout plan is often the one that results in the highest overall effectiveness of transactions between the facilities. Cost considerations can be a major factor in choosing a given alternative layout plan for implementation. The problem of facility layout is well covered in the literature. Some models are based on the analysis of the relative location of facilities. A graphical approach, a quantitative procedure and a quadratic assignment algorithm were developed by Buffa[1], Wimmert[2] and Hillier & Connors[3], respectively. A large mixed-integer goal-programming model...
Words: 3517 - Pages: 15
...1. Analyze: Define the problem. Be sure you understand what the program should do-that is, what the output should be. Have a clear idea of what data are given and the relationship between the input and the desired output. 2. Design: Plan the solution to the problem. Develop the algorithm (the logical sequence of precise steps that solve the problem). All detail, including obvious steps, should seem in the algorithm. Translate the algorithm into a logic plan using any of the popular methods that is flowcharts, pseudo code, top down charts. These design tools help the programmer break a problem into an order of small tasks the computer can perform to rectify the problem. Planning also includes using representative data to test the logic of...
Words: 451 - Pages: 2
...Scheme and Syllabus of B.E. (Computer Science and Engineering) 3 rd th TO 8 Semester 2014-2015 University Institute of Engineering and Technology, Panjab University, Chandigarh DEPARTMENT: COMPUTER SCIENCE AND ENGINEERING VISION: To be recognized as an international leader in Computer Science and Engineering education and research to benefit society globally. MISSION: · · · · To move forward as frontiers of human knowledge to enrich the citizen, the nation, and the world. To excel in research and innovation that discovers new knowledge and enables new technologies and systems. To develop technocrats, entrepreneurs, and business leaders of future who will strive to improve the quality of human life. To create world class computing infrastructure for the enhancement of technical knowledge in field of Computer Science and Engineering. PROGRAMME: B.E. CSE (UG PROGRAMME) PROGRAMME EDUCATIONAL OBJECTIVES: I. Graduates will work as software professional in industry of repute. II. Graduates will pursue higher studies and research in engineering and management disciplines. III. Graduates will work as entrepreneurs by establishing startups to take up projects for societal and environmental cause. PROGRAMME OUTCOMES: A. Ability to effectively apply knowledge of computing, applied sciences and mathematics to computer science & engineering problems. B. Identify, formulate, research literature, and analyze complex computer science & engineering problems reaching substantiated conclusions...
Words: 23989 - Pages: 96
...MIZAN TEPI UNIVERSITY, Ethiopia From oct,18,2010… to till date Key strengths include: Curriculum & Development Backward Design Unit Planning Student Evaluation & Assessment Progress Monitoring Honors & College Readiness Practical based instruction Content oriented Classroom Management Program Development College-to-career Connection EDUCATION & CERTIFICATION: B.Sc., (Computer Science and IT) with 3.25 GPA at Wollega University, Ethiopia. TECHNICAL PROFILE: Programming Languages Database Technologies GUI Tools Web Technologies Operating System Packages Multimedia Application Professional Experience: Presently working as Assistant Lecturer in Mizan-Tepi University, Ethiopia for B.Sc(CS & IT) and I have delivered Courses Introduction to Computer Science, Fundamentals of Programming I and II, Professional Ethics In computing, Fundamentals of Database Systems, Data Structures and Algorithms, Computer Organization and Architecture, Data Communication and Computer Networking, Object Oriented Programming, Operating Systems, Internet Programming I ,Advanced Database System, Internet Programming II, Unix System Administration, System Analysis and Design, Event Driven Programming, Information Retrieval, Software Engineering, Formal Language Theory, Logic for Computer Science, Computer Graphics, Analysis of Algorithms, Introduction to : : : : : : : C, C++,VB-5,6,VB.net ,C#, Java,python MySQL,Oracle 9i, 10 and 11g, MS SQL Server 7.0,weka DreamWeaver,Developer2000...
Words: 506 - Pages: 3
...PRG/211 Algorithm Planning for Calorie Management Algorithm Planning for Calorie Management 1. We need to analyze the program. By determining the information we are given and what results we need to get. What information do we need to calculate the calories daily. What calories are in the food and beverages. How many calories are burned daily. What is the required balance per person. 2. Design a program to solve the program. The heart of the program development process. 3. Code the program. Write statements in a computer language that will design what we need in the program. 4. Test the program. Make sure the program solves the given problem. Make sure we are able to calculate the user's daily calorie balance. Determine the modules that will be needed in the program. User Intake – Breakfast, Lunch, Dinner, Snacks, Drink User Activity – Sedentary, Light Active, Moderate Active, Very Active, and Extremely Active Pseudocode for Calorie Management Input Data Module Write “What was your daily meal calorie intake?” Input calorieIntake Write “Select your daily activity” Input dailyActivity Calorie Caluctions Module Set Totalcalories = calorieIntake- dailActivity Output Module Write “Your total calorie intake is: `` + Totalcalories End This a simple pseudocode for the calorie management program. The key variable are calorieintake the...
Words: 372 - Pages: 2
...Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES Now a days, technologies become usually a part of our daily life. Research has become increasingly important for the field of business today. Company or Institution must base their statements on verified facts. In addition one might be able to absorb and learned this research study. The literature and studies cited in this chapter tackle the prospects of Company and Institution, as well as the process of Computer monitoring system. FOREIGN LITERATURE AND STUDIES There has been a significant amount of previous work done in the monitoring of computer hardware device. In particular, Mohammed EL Shobaki conduct a study, “On-chip Monitoring for Non-Intrusive Hardware/Software Observability” bears the most similarity to this work. In this thesis work the authors propose a solution to the problem where the monitoring and troubleshooting of computer hardware device become important part in maintaining observability of the computer system. He stated that today’s computer-based products are complex and require extensive efforts to design and test. They are complex because they comprise many components, complex software and hardware, and features a lot of functionality. This is a trend which is clearly seen in the consumer electronics market, and in state-of-the-art industrial systems. The development of these products tends to be as challenging as it is increasingly time consuming, expensive, and error-prone. Therefore, the developers...
Words: 1551 - Pages: 7
... 4. 5. 6. CSE411 CSE461 CSE412 CSE462 CSE414 CSE464 Subject Title Scheme of Teaching L 3 0 3 0 3 0 T 1 0 1 0 1 0 P 0 3 0 3 0 3 Hours 4 3 4 3 4 3 Credit 4 2 4 2 4 2 University External Marks 50 50 50 CSE361 CSE313 CSE363 AS301 EC316 EC366 EC317 EC367 Data Structures (Practical) Peripheral Devices & Interfaces Hardware Lab (Practical) Engineering Mathematics – III Digital Electronics Digital Electronics (Practical) Microprocessors Microprocessors (Practical) 0 3 0 3 3 0 3 0 15 0 1 0 1 1 0 1 0 5 3 0 2 0 0 2 0 2 09 3 4 2 4 4 2 4 2 29 2 4 1 4 4 1 4 1 25 50 50 50 50 250 Internal Total Sessional Marks 50 50 50 50 50 50 50 50 50 450 100 50 100 50 100 100 50 100 50 700 7. 8. Total ASC405 CSE 415 Analysis & Design of Algorithms Analysis & Design of Algorithms (Practical) Database Management System Database Management System (Practical) Object Oriented Programming Object Oriented Programming (Practical) Cyber Law & IPR Computer Architecture & Organization Internal Total Sessional Marks 50 100 50 50 50 50 50 50 100 50 100 50 3 3 15 0 1 4 0 0 9 3 4 28 3 4 25 50 50 250 50 50 400 100 100 650 2 Scheme of Examination of B.E. in Computer Science & Engineering Third Year - Fifth Semester Sr. Paper Subject Title Scheme of Teaching Univesity Internal Sessional Code External L T P Hou Credit Marks Total Marks rs s 1. CSE511 Operating System 3 1 0 4 4 50 50...
Words: 14784 - Pages: 60
...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...
Words: 15250 - Pages: 61