EGME 205
Programming Project
Names of the Members:
-Naser Alazmi
- Anas Alqasoumi
- Abdulaziz Alshatti
- Yasr Aljaafri
Professor:
-Hossein Moini
Introduction: Our project goal will be focusing on how to build a program to coordinate the Traffic signal timing
Project Goal:
Our project goal is to design a system for managing the time of traffic signal that located in the intersection between Yorba Linda Blvd and Associated Rd with taking into considerations decreasing the average travel time through an intersection and improving overall safety for all types of vehicles entering an intersection.
We went to the location and throughout the observation, we found an engineering problem that the timing of each path could be developed to reduce the amount of waiting and stay at high safety level for all type of vehicles especially the bicycles as we read a lot of shocking statistics about running over the bicycles on the intersections. The first step to improve that system is collecting the data, such as the number of cars of each path and their directions, and the waiting time. This data were taken from 6:30pm to 8:00pm from Monday to Thursday for ensuring more quality of the performance new system. The new system has less than 120 seconds wait for each path to meet our requirement.
The project takes from us a number of hours from getting the data to end up by formatting the program. We firstly scheduled the first meeting to see how we started the project and chose Naser Alazmi as a leader. Then, we chose our period from 6:30 pm to 8:00pm and have four of us to go there and having the data from Monday to Thursday.
The activities were started by doing a meeting in the library and have a plan how to start and chose Nassir Alazmi as a leader for our group. Then, we went to the location and collecting the data (the number of cars from each path and their directions, the waiting time of each path, and the total time of the circle of the traffic signal) The data were taken from the period between 6:30pm to 8:00pm. After that, we had more meetings in the library to study the problems and find solutions.
Abstract:
In this project we are firstly going to write a program to conduct traffic in the intersection of Yorba-Linda Blvd. and Associated Rd.
By observation, we found an engineering problem, which is timing of each path. The timing could be improved by using some mathematics calculations that considered the number of cars of each path and their directions. By this way, we could make a new system that is more efficient and safe as well.
After we have arranged the meetings and divided the tasks between us, we chose the period between 6:30pm to 8:00pm to examine the efficiently of the currant system and try to develop it by our own method. Our method is decreasing the waiting for each path in less than 120 seconds for each path.
We began by starting to figure out appropriate time for all of us to get the data of the ...
EGME 205Programming ProjectNames of the Members-Naser Al.docx
1. EGME 205
Programming Project
Names of the Members:
-Naser Alazmi
- Anas Alqasoumi
- Abdulaziz Alshatti
- Yasr Aljaafri
Professor:
-Hossein Moini
Introduction: Our project goal will be focusing on how to build
a program to coordinate the Traffic signal timing
Project Goal:
Our project goal is to design a system for managing the time of
traffic signal that located in the intersection between Yorba
Linda Blvd and Associated Rd with taking into considerations
decreasing the average travel time through an intersection and
improving overall safety for all types of vehicles entering an
intersection.
2. We went to the location and throughout the observation, we
found an engineering problem that the timing of each path could
be developed to reduce the amount of waiting and stay at high
safety level for all type of vehicles especially the bicycles as we
read a lot of shocking statistics about running over the bicycles
on the intersections. The first step to improve that system is
collecting the data, such as the number of cars of each path and
their directions, and the waiting time. This data were taken from
6:30pm to 8:00pm from Monday to Thursday for ensuring more
quality of the performance new system. The new system has less
than 120 seconds wait for each path to meet our requirement.
The project takes from us a number of hours from getting the
data to end up by formatting the program. We firstly scheduled
the first meeting to see how we started the project and chose
Naser Alazmi as a leader. Then, we chose our period from 6:30
pm to 8:00pm and have four of us to go there and having the
data from Monday to Thursday.
The activities were started by doing a meeting in the library and
have a plan how to start and chose Nassir Alazmi as a leader for
our group. Then, we went to the location and collecting the data
(the number of cars from each path and their directions, the
waiting time of each path, and the total time of the circle of the
traffic signal) The data were taken from the period between
6:30pm to 8:00pm. After that, we had more meetings in the
library to study the problems and find solutions.
Abstract:
In this project we are firstly going to write a program to
conduct traffic in the intersection of Yorba-Linda Blvd. and
Associated Rd.
By observation, we found an engineering problem, which is
timing of each path. The timing could be improved by using
3. some mathematics calculations that considered the number of
cars of each path and their directions. By this way, we could
make a new system that is more efficient and safe as well.
After we have arranged the meetings and divided the tasks
between us, we chose the period between 6:30pm to 8:00pm to
examine the efficiently of the currant system and try to develop
it by our own method. Our method is decreasing the waiting for
each path in less than 120 seconds for each path.
We began by starting to figure out appropriate time for
all of us to get the data of the location. We chose the time
period between 6:30pm to 8:00pm to examine the system and
collect the data at that period. We kind of face a problem at that
time not all of us are available to come in in that time, we
decided to make a schedule that ensure there are three at least
available from Monday to Thursday at the time period that we
chose.
Then, we calculated the time of each path and examine the
efficiency. Also, we have collected how many cars of each path
and their directions and comparing the number of car with the
time is given. After that, we figured out the timing could be
better by rearrange it by using some mathematics calculations
that leads to minimize the waiting for all the paths.
We also have met the requirement
, It was hard to get all the group members at the same time
because some of us had a morning classes only and the others
had only night classes.
It was an obstacle because we wanted to get the data at a
specific time of the day. We found the time 6:30pm to 8:00pm
is the most convenient time for all of us. Moreover, it was not a
4. rush hours which was one of the requirements. In the next day
we had another problem which is the weather was rainy. It made
it hard on us to collect data and write on a wet papers. we
struggled until we got the data at the
CMGT/430 Week 1 QUIZ Questions
Faculty: Vijay Jonnalagadda
Question #
Question
Your Answer
1
Wk 1
Chapter1
Following is not one of the vital roles played by the Information
systems in business.
A. support an organization’s business processes and operations
B. support an organization’s business decision making
C. support an organization’s business risk management and
philosophy
D. support an organization’s strategic competitive advantage
2
Wk 1
5. Chapter1
Which of the following is a correct statement
A. Data and Information are synonyms, they mean same
B. Data is processed into Information by adding context to it
C. Both data and Information depend on the context and
perspective of the user
D. All these are correct
E. None of the above are correct
3
Chapter 1
Business Intelligence (BI) systems support what business
function?
A. Business Decision Making
B. Marketing
C. Data Security
D. Smoother Business operations and Processes
4
Chapter 1
What system(s) support(s) Business operations
A. Transaction Processing
B. Process Control
C. Enterprise Collaboration
6. D. All of the above
E. None of the above
5
Chapter 1
Match the
A. Intranet
B. Extranet
C. Internet
D. Company Network
Following
1. enterprise and its trading partners
2. inside the enterprise
3. Enterprise Servers
4. Open to all enterprises and individuals
6
Wk 1
Chapter 8
A cross-functional enterprise system that helps a business
integrate and automate many of its internal business processes
and information systems
7. A. ERP
B. CRM
C. SCM
D. Intranet Portals
7
Wk 1
Chapter 8
A cross-functional inter-enterprise system that helps a business
manage its network of relationships and processes with its
business partners
A. ERP
B. CRM
C. SCM
D. Intranet Portals
8
Chapter 8
Helps with enterprise-wide communications, collaboration, and
centralizing information resources.
A. ERP
8. B. CRM
C. SCM
D. Intranet Portals
9
Wk 1
Chapter 8
The automatic exchange of electronic business documents
between the networked computers of business partners
A. E-mail communications
B. EDI
C. Extranet Portals
D. SCM
10
Chapter 8
Better functioning of Customer facing systems (fill in the
blanks): _____________________
11
Chapter 13
Following is not one of the principle of Technology Ethics
A. Technology must achieve more good than the harm
9. B. Benefits and burdens of Technologies must be distributed
fairly
C. Maintain secrecy of new Technologies
D. Those affected by the technology must be informed
E. Risks associated with technology must be avoided as much as
you can
12
Chapter 13
Following is the percentage of employers that have fired their
workers for using the Internet violating the company policy
A. 25%
B. 33%
C. 50%
D. None of the above
13
Wk 1
Chapter 13
A piece of malicious code that must attach itself to another file
to replicate itself is known as:
A. A virus
B. A worm
10. C. A logic bomb
D. A Trojan
14
Chapter 13
Zombie computers are used in what kind of attacks
A. DoS
B. DDoS
C. Bruteforce attack against encrypted systems
D. All of the above
15
Wk 1
Chapter 13
The presence of documentation that allows a transaction to be
traced through all stages of information processing.
A. Data Trace
B. TPM – Transaction Processing Systems
C. System security monitor
D. Audit Trail
11. 16
Wk2
Chapter 4
How are the actual Practices connected to Policies?
A. Practices are set of procedures written based on policy
B. No they are not connected
C. Practices are detailed steps of instructions developed to meet
the standards and those standards were built based on the
policies
D. Policies are influenced by the Practices.
17
Wk 2
Chapter 4
Following kind of security policy provides guidance to all the
members of the organization
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
18
Wk 2
12. Chapter 4
Following kind of security policy set a strategic direction to all
security efforts in the organization and is guided by the vision
statement of the organization.
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
19
Wk 2
Chapter 4
This security policy tries to explain why a particular technology
can or cannot be used in an organization.
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
20
Wk2
Chapter 4
Disaster Recovery (DR) plan comes under what kind of risk
strategy
13. A. Avoidance
B. Transference
C. Mitigation
D. Acceptance
21
Chapter 8
Risk management consists of following steps
A. Identification
B. Assessment
C. Risk Control
D. Organizational Business processes restructuring
E. All of the above
22
Chapter 8
Following is not one of the risk controls that you can apply.
A. Policies
B. Ensure Laws relevant to the organizational business are
implemented
14. C. Programs
D. Technical controls
23
Chapter 8
Types of Access Controls
A. Discretionary
B. NonDiscretionary
C. Mandatory
D. All of the above
E. None of the above
24
Chapter 9
Which risk control is understanding the risk you are facing and
do nothing about it
A. Avoidance
B. Acceptance
C. Mitigation
D. Transference
15. 25
Chapter 9
Which risk control aims to preempt the damage caused by the
risk you identify
A. Avoidance
B. Acceptance
C. Mitigation
D. Transference
26
Chapter 9
The amount and kinds of risks that organizations accept after
evaluating the balance between Security and accessibility and
applying the controls, is called
A. Residual Risk
B. Risk Mitigation
C. Risk Appetite
D. Any of the above
27
Chapter 11
Determining that you are who you say you are, is called
16. A. Authorization
B. Authentication
C. Non-repudiation
D. Identification
E. All of the above
28
Chapter 11
Process to ensure that the message was sent by the Sender and
was received by the receive , is called
A. Authorization
B. Authentication
C. Non-repudiation
D. Identification
E. All of the above
29
Chapter 11
A software program that looks like a useful utility program, but
actually does malicious things such as tracking your password
key strokes and sending to someone
A. Virus
17. B. Worm
C. Bot
D. Trojan Horse
30
Chapter 11
A software program that needs a host software to attach itself
and propagate
A. Virus
B. Worm
C. Bot
D. Trojan Horse
31
Wk2
Chapter 4
In practice it is almost impossible to safeguard any asset 100
percent, however valuable that may be. Hence, no asset has zero
risk. The amount of risk not covered by any known safeguards
is known as
A. Residual Risk
B. Risk Tolerance
18. C. Acceptable risk
D. All of the above
E. None of the above
EGME 205 (Section 3) - Fall 2014
COLLABORATIVE PROGRAMMING PROJECT
Project: Traffic Signal Timing
Due Date:
December 16, 2014 at 5 PM.
Submit your report to [email protected]
Project Goal :
You are required to develop a comprehensive
plan for appropriate timing of traffic signals at a
pre-selected intersection. The results of your
project must be submitted in a formal report
based on the required report format.
General Description:
19. The timing of a traffic signal is an important
engineering problem. Its solution can benefit
everyone to reach his/her destination faster. The
traffic signal programming (1) decreases average
travel time through an intersection, and (2)
improves overall safety for all types of vehicles
entering an intersection.
Required Tasks for the Team:
1. Meeting with the team members and selecting a team leader
2. Evaluation and collection of data for the intersection at
Yorba-Linda Blvd. and Association Rd.
3. Distribution of project activities equally among all the team
members
4. Studying the Appendix E of the textbook for understanding
the parameters and requirements
involved in the programming of traffic signals.
5. Conducting a literature survey for understanding how others
have solved a similar problem
6. Presenting the problem statement in the most concise manner
using graphs, data, and charts
7. Developing a detailed and flexible flowchart which presents
your approach and traffic requirements
8. Developing a computer program based on the flowchart
9. Comparison of the results from your program with the data
collected from the selected intersection
Specifications, Outcomes, and Requirements:
20. multiple times, consistently, on a certain day
of the week and at a certain time of the day other than the rush
hours.
-turn lanes and
allow for all types of vehicles.
variable timing for changing the color of
the traffic lights.
intersection.
Important Information:
textbook, the information that you collect through
a literature search, and the common-sense knowledge that you
have gained as a commuter.
solving an engineering problem
Internet, you may find the following
keywords, among many others, useful for collecting additional
information to complete your project:
Traffic Signal Timing; Webster’s Method; Highway Capacity;
Traffic Congestion
21. EGME 205
Required Format for Collaborative Programming Project Report
Each team must submit a report for its collaborative
programming project. The report should include the
following topics/sections:
1. Title Page
2. Abstract (Description of the engineering problem, tasks
performed, and requirements met) (5 Points)
3. Introduction
(10 Points)
• Project goal (Brief and concise description of the problem;
The requirements to be met)
• Literature review of publicized solution concepts (Review of
articles, books, on-line resources)
• List of activities for this project and distribution of work
among team members
4. Proposed Approach for Solving the Problem (15 Points)
• Description of the proposed solution approach and
corresponding mathematical formulations
• Presentation of the programing steps by using flowcharts,
graphs, drawings, etc.
22. • Specification of the input required and output delivered by the
proposed solution
• Verbal description of how your MATLAB program functions
in order to generate a solution
5. Program Implementation of the Proposed
Solution
Approach & Algorithms (25 Points)
Complete set of MATLAB program statements, with detailed
comments, grouped as:
o General information and introductory comments
o Inputs
o Calculations
o Outputs
6. Verification of the Program (Show How the Requirements
Are Met) (15 Points)
•