Computer architecture

Write a paragraph on examples of abstraction that you encounter in day-to-day life. For examples, driving a car is an example of abstraction, you don’t need to understand how a car works underneath the hood in order to drive one.Your answer cannot be more than 10000 characters.

M/M/K Problems

Fix system utilization at ρ = 0.95. Now increase the number of servers, k, as follows – 1, 2, 4, 8, 16, 32 – adjusting the arrival rate, λ, accordingly. For each number of servers, derive (i) the fraction of customers that are delayed and (ii) the expected waiting time for those customers who are delayed. We are just looking for numerical answers here. Feel free to write a math program to evaluate the needed summations. Explain the trend that you see
Problem2:
Capacity Provisioning to Avoid Loss
In a call center with k operators, all calls that are not immediately answered by an operator are dropped. Calls arrive according to a Poisson process with rate λ and have Exponentially distributed service times with rate μ = 1. For λ in the set {1, 2, 4, 8}, what should k be as a function of λ to ensure that fewer than 1% of calls are dropped? We are just looking for numerical solutions.
Feel free to write a math program to evaluate the needed summations. When
λ doubles, does the needed number of operators double?

MatLab Deep Learning

Using the machine learning MATLAB tutorial:
https://www.mathworks.com/products/demos/machine-learning/cluster_genes/cluster_genes.html
Download your own data set and perform all steps (in the tutorial). Your final document should contain the following:
Cluster diagram (chart)
Hierarchical Cluster Tree
PCA analysis
K-Means analysis
The code in the tutorial might require
some modifications to run on your sample dataset. Your document should
provide detailed explanation of the results, your prestatistical
analysis, and the charts/diagrams described above. In addition to your
document, upload your MATLAB code and dataset. “Please make certain that you upload the .m file (code) and the .mat file
(data). I need both in order to test your programming.”

Grading Rubric

Item

Description

Points

Comments

MATLAB code properly and clearly commented

25

Data Set

Data Set properly explained and each variable is discussed

25

Pre-statistical analysis

Proper pre-analysis conducted to determine if any of the variables are strongly correlated

25

Cluster diagram, PCA, K-Means and Hierarchical tree

Student
clearly demonstrated all 4 concepts, explained MATLAB code that
generated the results, discussed the results and clearly showed results
in graphical format (50 points each)

100

Results

Results are properly explained and graphed using MATLAB charts

50

Format and professionalism

Report is clearly written explaining every every step taken to create the NN. Third party references are used to support work

25

TOTAL
250

It231 Solve 2

These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Logicworks lab: hamming code

The output of the ECC Generator will be the 13-Bit Vector.
2) Construct a 13-bit Data Transmission bus to send the 8-bit binary data and 5 parity bits over to Memory.
3) Construct an ECC Detector at Main Memory that corrects for single bit errors. Generally an interrupt/error handler is used to handle errors from the OS, for this exercise we will use 3 Hex displays, 2 for data and 1 for an error status, for diagnostic purposes:
-In the event that no error has occurred, your design must display the data transferred using the 2 Hex data displays and a “0” as an error status.
-For single-bit transmission errors, your system must correct the error and display the data along with “C” in the 3rd Hex Display. . For 2-bit transmission errors, your design must display “E” in the error status display.
—————-
Please provide the circuits documentation of how it works for steps #1-3 (preferably in Logicworks or any other program that can make circuits)

It yahya 342

These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

IT445 Salim

These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.

Development of meterics

Look at the presentation and the scenario attached to get an idea of what our project is about. After that ANSWER the question below. (the scenario is the steps of what our project builded from, just LOOK AT IT TO GET AN IDEA ABOUT OUR SCOPE)
Part 2: Development of metrics. In this part of the project, groups will take the results of Part 1 and define how performance and mission success will be measured. create 4 slides of each head point and add script to that.
1- What is a metric?
A quantifiable measurement used to track and assess the status of a process or requirement.
Need to be based on a defined benchmark.
Remember: less is more!
2- Attributes of a good metric:
Specific
Measurable
Achievable
Realistic / Relevant
Timely / Time-bound
3- What is a Technical Performance Measure (TPM)?
Used to evaluate system performance and indicate success.
What’s minimum or maximum acceptable value for a given function or feature?
4- Starts with a Business Impact Assessment (BIA)
Identify critical resources
Associated threats?
Vulnerabilities?
Threat exposure?
Potential mitigation strategies
Existing countermeasures
Plan to observe over time

Answer to Questions. All the details are below. Absolutely No PLAGARISM!

. Select from the following list four topics and discuss. Use only 100-words max per topic to discuss and present your answer.
List the security advantages of cloud-based solutions.
List the security disadvantages of cloud-based solutions.
Define and discuss the data wiping process.
Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
Define and discuss hyperjacking attacks.
Define and discuss guest-hopping attacks.
Note: You are required to use at least 4-5 APA style reference sources to answer the above questions.