SlideShare a Scribd company logo
1 of 23
EGME 205
Programming Project
Names of the Members:
-Naser Alazmi
- Anas Alqasoumi
- Abdulaziz Alshatti
- Yasr Aljaafri
Professor:
-Hossein Moini
Introduction: Our project goal will be focusing on how to build
a program to coordinate the Traffic signal timing
Project Goal:
Our project goal is to design a system for managing the time of
traffic signal that located in the intersection between Yorba
Linda Blvd and Associated Rd with taking into considerations
decreasing the average travel time through an intersection and
improving overall safety for all types of vehicles entering an
intersection.
We went to the location and throughout the observation, we
found an engineering problem that the timing of each path could
be developed to reduce the amount of waiting and stay at high
safety level for all type of vehicles especially the bicycles as we
read a lot of shocking statistics about running over the bicycles
on the intersections. The first step to improve that system is
collecting the data, such as the number of cars of each path and
their directions, and the waiting time. This data were taken from
6:30pm to 8:00pm from Monday to Thursday for ensuring more
quality of the performance new system. The new system has less
than 120 seconds wait for each path to meet our requirement.
The project takes from us a number of hours from getting the
data to end up by formatting the program. We firstly scheduled
the first meeting to see how we started the project and chose
Naser Alazmi as a leader. Then, we chose our period from 6:30
pm to 8:00pm and have four of us to go there and having the
data from Monday to Thursday.
The activities were started by doing a meeting in the library and
have a plan how to start and chose Nassir Alazmi as a leader for
our group. Then, we went to the location and collecting the data
(the number of cars from each path and their directions, the
waiting time of each path, and the total time of the circle of the
traffic signal) The data were taken from the period between
6:30pm to 8:00pm. After that, we had more meetings in the
library to study the problems and find solutions.
Abstract:
In this project we are firstly going to write a program to
conduct traffic in the intersection of Yorba-Linda Blvd. and
Associated Rd.
By observation, we found an engineering problem, which is
timing of each path. The timing could be improved by using
some mathematics calculations that considered the number of
cars of each path and their directions. By this way, we could
make a new system that is more efficient and safe as well.
After we have arranged the meetings and divided the tasks
between us, we chose the period between 6:30pm to 8:00pm to
examine the efficiently of the currant system and try to develop
it by our own method. Our method is decreasing the waiting for
each path in less than 120 seconds for each path.
We began by starting to figure out appropriate time for
all of us to get the data of the location. We chose the time
period between 6:30pm to 8:00pm to examine the system and
collect the data at that period. We kind of face a problem at that
time not all of us are available to come in in that time, we
decided to make a schedule that ensure there are three at least
available from Monday to Thursday at the time period that we
chose.
Then, we calculated the time of each path and examine the
efficiency. Also, we have collected how many cars of each path
and their directions and comparing the number of car with the
time is given. After that, we figured out the timing could be
better by rearrange it by using some mathematics calculations
that leads to minimize the waiting for all the paths.
We also have met the requirement
, It was hard to get all the group members at the same time
because some of us had a morning classes only and the others
had only night classes.
It was an obstacle because we wanted to get the data at a
specific time of the day. We found the time 6:30pm to 8:00pm
is the most convenient time for all of us. Moreover, it was not a
rush hours which was one of the requirements. In the next day
we had another problem which is the weather was rainy. It made
it hard on us to collect data and write on a wet papers. we
struggled until we got the data at the
CMGT/430 Week 1 QUIZ Questions
Faculty: Vijay Jonnalagadda
Question #
Question
Your Answer
1
Wk 1
Chapter1
Following is not one of the vital roles played by the Information
systems in business.
A. support an organization’s business processes and operations
B. support an organization’s business decision making
C. support an organization’s business risk management and
philosophy
D. support an organization’s strategic competitive advantage
2
Wk 1
Chapter1
Which of the following is a correct statement
A. Data and Information are synonyms, they mean same
B. Data is processed into Information by adding context to it
C. Both data and Information depend on the context and
perspective of the user
D. All these are correct
E. None of the above are correct
3
Chapter 1
Business Intelligence (BI) systems support what business
function?
A. Business Decision Making
B. Marketing
C. Data Security
D. Smoother Business operations and Processes
4
Chapter 1
What system(s) support(s) Business operations
A. Transaction Processing
B. Process Control
C. Enterprise Collaboration
D. All of the above
E. None of the above
5
Chapter 1
Match the
A. Intranet
B. Extranet
C. Internet
D. Company Network
Following
1. enterprise and its trading partners
2. inside the enterprise
3. Enterprise Servers
4. Open to all enterprises and individuals
6
Wk 1
Chapter 8
A cross-functional enterprise system that helps a business
integrate and automate many of its internal business processes
and information systems
A. ERP
B. CRM
C. SCM
D. Intranet Portals
7
Wk 1
Chapter 8
A cross-functional inter-enterprise system that helps a business
manage its network of relationships and processes with its
business partners
A. ERP
B. CRM
C. SCM
D. Intranet Portals
8
Chapter 8
Helps with enterprise-wide communications, collaboration, and
centralizing information resources.
A. ERP
B. CRM
C. SCM
D. Intranet Portals
9
Wk 1
Chapter 8
The automatic exchange of electronic business documents
between the networked computers of business partners
A. E-mail communications
B. EDI
C. Extranet Portals
D. SCM
10
Chapter 8
Better functioning of Customer facing systems (fill in the
blanks): _____________________
11
Chapter 13
Following is not one of the principle of Technology Ethics
A. Technology must achieve more good than the harm
B. Benefits and burdens of Technologies must be distributed
fairly
C. Maintain secrecy of new Technologies
D. Those affected by the technology must be informed
E. Risks associated with technology must be avoided as much as
you can
12
Chapter 13
Following is the percentage of employers that have fired their
workers for using the Internet violating the company policy
A. 25%
B. 33%
C. 50%
D. None of the above
13
Wk 1
Chapter 13
A piece of malicious code that must attach itself to another file
to replicate itself is known as:
A. A virus
B. A worm
C. A logic bomb
D. A Trojan
14
Chapter 13
Zombie computers are used in what kind of attacks
A. DoS
B. DDoS
C. Bruteforce attack against encrypted systems
D. All of the above
15
Wk 1
Chapter 13
The presence of documentation that allows a transaction to be
traced through all stages of information processing.
A. Data Trace
B. TPM – Transaction Processing Systems
C. System security monitor
D. Audit Trail
16
Wk2
Chapter 4
How are the actual Practices connected to Policies?
A. Practices are set of procedures written based on policy
B. No they are not connected
C. Practices are detailed steps of instructions developed to meet
the standards and those standards were built based on the
policies
D. Policies are influenced by the Practices.
17
Wk 2
Chapter 4
Following kind of security policy provides guidance to all the
members of the organization
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
18
Wk 2
Chapter 4
Following kind of security policy set a strategic direction to all
security efforts in the organization and is guided by the vision
statement of the organization.
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
19
Wk 2
Chapter 4
This security policy tries to explain why a particular technology
can or cannot be used in an organization.
A. EISP - Enterprise Information Security Policy
B. ISSP - Issue Specific Security Policy
C. SSP - System specific Security Policy
D. All of the above
20
Wk2
Chapter 4
Disaster Recovery (DR) plan comes under what kind of risk
strategy
A. Avoidance
B. Transference
C. Mitigation
D. Acceptance
21
Chapter 8
Risk management consists of following steps
A. Identification
B. Assessment
C. Risk Control
D. Organizational Business processes restructuring
E. All of the above
22
Chapter 8
Following is not one of the risk controls that you can apply.
A. Policies
B. Ensure Laws relevant to the organizational business are
implemented
C. Programs
D. Technical controls
23
Chapter 8
Types of Access Controls
A. Discretionary
B. NonDiscretionary
C. Mandatory
D. All of the above
E. None of the above
24
Chapter 9
Which risk control is understanding the risk you are facing and
do nothing about it
A. Avoidance
B. Acceptance
C. Mitigation
D. Transference
25
Chapter 9
Which risk control aims to preempt the damage caused by the
risk you identify
A. Avoidance
B. Acceptance
C. Mitigation
D. Transference
26
Chapter 9
The amount and kinds of risks that organizations accept after
evaluating the balance between Security and accessibility and
applying the controls, is called
A. Residual Risk
B. Risk Mitigation
C. Risk Appetite
D. Any of the above
27
Chapter 11
Determining that you are who you say you are, is called
A. Authorization
B. Authentication
C. Non-repudiation
D. Identification
E. All of the above
28
Chapter 11
Process to ensure that the message was sent by the Sender and
was received by the receive , is called
A. Authorization
B. Authentication
C. Non-repudiation
D. Identification
E. All of the above
29
Chapter 11
A software program that looks like a useful utility program, but
actually does malicious things such as tracking your password
key strokes and sending to someone
A. Virus
B. Worm
C. Bot
D. Trojan Horse
30
Chapter 11
A software program that needs a host software to attach itself
and propagate
A. Virus
B. Worm
C. Bot
D. Trojan Horse
31
Wk2
Chapter 4
In practice it is almost impossible to safeguard any asset 100
percent, however valuable that may be. Hence, no asset has zero
risk. The amount of risk not covered by any known safeguards
is known as
A. Residual Risk
B. Risk Tolerance
C. Acceptable risk
D. All of the above
E. None of the above
EGME 205 (Section 3) - Fall 2014
COLLABORATIVE PROGRAMMING PROJECT
Project: Traffic Signal Timing
Due Date:
December 16, 2014 at 5 PM.
Submit your report to [email protected]
Project Goal :
You are required to develop a comprehensive
plan for appropriate timing of traffic signals at a
pre-selected intersection. The results of your
project must be submitted in a formal report
based on the required report format.
General Description:
The timing of a traffic signal is an important
engineering problem. Its solution can benefit
everyone to reach his/her destination faster. The
traffic signal programming (1) decreases average
travel time through an intersection, and (2)
improves overall safety for all types of vehicles
entering an intersection.
Required Tasks for the Team:
1. Meeting with the team members and selecting a team leader
2. Evaluation and collection of data for the intersection at
Yorba-Linda Blvd. and Association Rd.
3. Distribution of project activities equally among all the team
members
4. Studying the Appendix E of the textbook for understanding
the parameters and requirements
involved in the programming of traffic signals.
5. Conducting a literature survey for understanding how others
have solved a similar problem
6. Presenting the problem statement in the most concise manner
using graphs, data, and charts
7. Developing a detailed and flexible flowchart which presents
your approach and traffic requirements
8. Developing a computer program based on the flowchart
9. Comparison of the results from your program with the data
collected from the selected intersection
Specifications, Outcomes, and Requirements:
multiple times, consistently, on a certain day
of the week and at a certain time of the day other than the rush
hours.
-turn lanes and
allow for all types of vehicles.
variable timing for changing the color of
the traffic lights.
intersection.
Important Information:
textbook, the information that you collect through
a literature search, and the common-sense knowledge that you
have gained as a commuter.
solving an engineering problem
Internet, you may find the following
keywords, among many others, useful for collecting additional
information to complete your project:
Traffic Signal Timing; Webster’s Method; Highway Capacity;
Traffic Congestion
EGME 205
Required Format for Collaborative Programming Project Report
Each team must submit a report for its collaborative
programming project. The report should include the
following topics/sections:
1. Title Page
2. Abstract (Description of the engineering problem, tasks
performed, and requirements met) (5 Points)
3. Introduction
(10 Points)
• Project goal (Brief and concise description of the problem;
The requirements to be met)
• Literature review of publicized solution concepts (Review of
articles, books, on-line resources)
• List of activities for this project and distribution of work
among team members
4. Proposed Approach for Solving the Problem (15 Points)
• Description of the proposed solution approach and
corresponding mathematical formulations
• Presentation of the programing steps by using flowcharts,
graphs, drawings, etc.
• Specification of the input required and output delivered by the
proposed solution
• Verbal description of how your MATLAB program functions
in order to generate a solution
5. Program Implementation of the Proposed
Solution
Approach & Algorithms (25 Points)
Complete set of MATLAB program statements, with detailed
comments, grouped as:
o General information and introductory comments
o Inputs
o Calculations
o Outputs
6. Verification of the Program (Show How the Requirements
Are Met) (15 Points)
•
 EGME 205Programming ProjectNames of the Members-Naser Al.docx

More Related Content

Similar to EGME 205Programming ProjectNames of the Members-Naser Al.docx

Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
rtodd599
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 

Similar to EGME 205Programming ProjectNames of the Members-Naser Al.docx (20)

Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposal
 
E-Police Android APP
E-Police  Android APPE-Police  Android APP
E-Police Android APP
 
MIS Wk-10.ppt
MIS Wk-10.pptMIS Wk-10.ppt
MIS Wk-10.ppt
 
89679962-Online-Cab-Management
89679962-Online-Cab-Management89679962-Online-Cab-Management
89679962-Online-Cab-Management
 
Sad 201 project sparc vision online library-assignment 2
Sad 201  project sparc vision  online library-assignment 2Sad 201  project sparc vision  online library-assignment 2
Sad 201 project sparc vision online library-assignment 2
 
ONLINE VOTING SYSTEM.docx
ONLINE VOTING SYSTEM.docxONLINE VOTING SYSTEM.docx
ONLINE VOTING SYSTEM.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 
System Analysis & Design Report on Summer Training System
System Analysis & Design Report on Summer Training SystemSystem Analysis & Design Report on Summer Training System
System Analysis & Design Report on Summer Training System
 
Latest proposal project info zakat
Latest proposal project info zakatLatest proposal project info zakat
Latest proposal project info zakat
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
Chapter12
Chapter12Chapter12
Chapter12
 
Test automation Anecdotes
Test automation AnecdotesTest automation Anecdotes
Test automation Anecdotes
 
Management information system article,rizki akhbar rahmatullah, bayu aji wibi...
Management information system article,rizki akhbar rahmatullah, bayu aji wibi...Management information system article,rizki akhbar rahmatullah, bayu aji wibi...
Management information system article,rizki akhbar rahmatullah, bayu aji wibi...
 
Artikel Sistem Informasi Kevin Sunjaya, Bagaskoro Sabastian, Bayu Aji Wibison...
Artikel Sistem Informasi Kevin Sunjaya, Bagaskoro Sabastian, Bayu Aji Wibison...Artikel Sistem Informasi Kevin Sunjaya, Bagaskoro Sabastian, Bayu Aji Wibison...
Artikel Sistem Informasi Kevin Sunjaya, Bagaskoro Sabastian, Bayu Aji Wibison...
 
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
 
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
article sistem informasi manajemen ahmad khotib,Bagaskoro Sabastian, Bayu Aji...
 
Artikel sistem informasi manajemen,Rizki Akhbar Rahmatullah, imam rahmat fauz...
Artikel sistem informasi manajemen,Rizki Akhbar Rahmatullah, imam rahmat fauz...Artikel sistem informasi manajemen,Rizki Akhbar Rahmatullah, imam rahmat fauz...
Artikel sistem informasi manajemen,Rizki Akhbar Rahmatullah, imam rahmat fauz...
 
Artikel Sistem Informasi, Ario Darmawan, Kevin Sunjaya, Bagaskoro Sabastian,...
Artikel Sistem Informasi,  Ario Darmawan, Kevin Sunjaya, Bagaskoro Sabastian,...Artikel Sistem Informasi,  Ario Darmawan, Kevin Sunjaya, Bagaskoro Sabastian,...
Artikel Sistem Informasi, Ario Darmawan, Kevin Sunjaya, Bagaskoro Sabastian,...
 
Management information system article, rizki akhbar rahmatullah bayu aji wib...
Management information system article, rizki akhbar rahmatullah  bayu aji wib...Management information system article, rizki akhbar rahmatullah  bayu aji wib...
Management information system article, rizki akhbar rahmatullah bayu aji wib...
 

More from MARRY7

Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docx
MARRY7
 
Part 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docxPart 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docx
MARRY7
 
Part 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docxPart 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docx
MARRY7
 
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxPart 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
MARRY7
 
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxPart 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
MARRY7
 
part 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docxpart 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docx
MARRY7
 
Parent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docxParent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docx
MARRY7
 

More from MARRY7 (20)

Part 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docxPart 1.....InstructionsSelect one of the age groups disc.docx
Part 1.....InstructionsSelect one of the age groups disc.docx
 
Part 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docxPart 1 – Add to Website PlanList at least three .docx
Part 1 – Add to Website PlanList at least three .docx
 
Part 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docxPart 1 True or False Questions. (10 questions at 1 point each).docx
Part 1 True or False Questions. (10 questions at 1 point each).docx
 
Part 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docxPart 11. Why is it so important in system engineering to become .docx
Part 11. Why is it so important in system engineering to become .docx
 
Part 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docxPart 1 Using the internet, search for commercial IDPS systems. What.docx
Part 1 Using the internet, search for commercial IDPS systems. What.docx
 
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docxPart 1- Create an outline of the assignment below thenPart 2-1000 .docx
Part 1- Create an outline of the assignment below thenPart 2-1000 .docx
 
Part 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docxPart 1 Review QuestionsWhat is the difference between criminal la.docx
Part 1 Review QuestionsWhat is the difference between criminal la.docx
 
Part 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docxPart 1 Review QuestionsWhat is the difference between authenticat.docx
Part 1 Review QuestionsWhat is the difference between authenticat.docx
 
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docxPart 1 SQLDatabase workScenarioDevelopment of a relationa.docx
Part 1 SQLDatabase workScenarioDevelopment of a relationa.docx
 
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docxPart 1 Review QuestionsWhat functions constitute a complete infor.docx
Part 1 Review QuestionsWhat functions constitute a complete infor.docx
 
Part 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docxPart 1A persons lifestyle has a significant influence on the p.docx
Part 1A persons lifestyle has a significant influence on the p.docx
 
Part 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docxPart 1 Review QuestionsWhat is the definition of information secu.docx
Part 1 Review QuestionsWhat is the definition of information secu.docx
 
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docxPart 1 Review QuestionsWhat is a security modelWhat are the es.docx
Part 1 Review QuestionsWhat is a security modelWhat are the es.docx
 
Part 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docxPart 1 Listed below are several key Supreme Court decisions that .docx
Part 1 Listed below are several key Supreme Court decisions that .docx
 
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docxPart 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
Part 1 Infrastructure DesignCreate an 8–10-page infrastructur.docx
 
part 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docxpart 1 I attended an international conference on Biotechnology and .docx
part 1 I attended an international conference on Biotechnology and .docx
 
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docxPart 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
Part 1 Chapter 7 Summary plus end of chapter discussion of Alfred.docx
 
Parent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docxParent Involvement Plan This week you will create a Parent Involve.docx
Parent Involvement Plan This week you will create a Parent Involve.docx
 
Parenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docxParenting Practices Over GenerationsGeneration 1 Years children.docx
Parenting Practices Over GenerationsGeneration 1 Years children.docx
 
ParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docxParamsThe interface must be pleasing to look at (a basic form wit.docx
ParamsThe interface must be pleasing to look at (a basic form wit.docx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 

Recently uploaded (20)

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 

EGME 205Programming ProjectNames of the Members-Naser Al.docx

  • 1. EGME 205 Programming Project Names of the Members: -Naser Alazmi - Anas Alqasoumi - Abdulaziz Alshatti - Yasr Aljaafri Professor: -Hossein Moini Introduction: Our project goal will be focusing on how to build a program to coordinate the Traffic signal timing Project Goal: Our project goal is to design a system for managing the time of traffic signal that located in the intersection between Yorba Linda Blvd and Associated Rd with taking into considerations decreasing the average travel time through an intersection and improving overall safety for all types of vehicles entering an intersection.
  • 2. We went to the location and throughout the observation, we found an engineering problem that the timing of each path could be developed to reduce the amount of waiting and stay at high safety level for all type of vehicles especially the bicycles as we read a lot of shocking statistics about running over the bicycles on the intersections. The first step to improve that system is collecting the data, such as the number of cars of each path and their directions, and the waiting time. This data were taken from 6:30pm to 8:00pm from Monday to Thursday for ensuring more quality of the performance new system. The new system has less than 120 seconds wait for each path to meet our requirement. The project takes from us a number of hours from getting the data to end up by formatting the program. We firstly scheduled the first meeting to see how we started the project and chose Naser Alazmi as a leader. Then, we chose our period from 6:30 pm to 8:00pm and have four of us to go there and having the data from Monday to Thursday. The activities were started by doing a meeting in the library and have a plan how to start and chose Nassir Alazmi as a leader for our group. Then, we went to the location and collecting the data (the number of cars from each path and their directions, the waiting time of each path, and the total time of the circle of the traffic signal) The data were taken from the period between 6:30pm to 8:00pm. After that, we had more meetings in the library to study the problems and find solutions. Abstract: In this project we are firstly going to write a program to conduct traffic in the intersection of Yorba-Linda Blvd. and Associated Rd. By observation, we found an engineering problem, which is timing of each path. The timing could be improved by using
  • 3. some mathematics calculations that considered the number of cars of each path and their directions. By this way, we could make a new system that is more efficient and safe as well. After we have arranged the meetings and divided the tasks between us, we chose the period between 6:30pm to 8:00pm to examine the efficiently of the currant system and try to develop it by our own method. Our method is decreasing the waiting for each path in less than 120 seconds for each path. We began by starting to figure out appropriate time for all of us to get the data of the location. We chose the time period between 6:30pm to 8:00pm to examine the system and collect the data at that period. We kind of face a problem at that time not all of us are available to come in in that time, we decided to make a schedule that ensure there are three at least available from Monday to Thursday at the time period that we chose. Then, we calculated the time of each path and examine the efficiency. Also, we have collected how many cars of each path and their directions and comparing the number of car with the time is given. After that, we figured out the timing could be better by rearrange it by using some mathematics calculations that leads to minimize the waiting for all the paths. We also have met the requirement , It was hard to get all the group members at the same time because some of us had a morning classes only and the others had only night classes. It was an obstacle because we wanted to get the data at a specific time of the day. We found the time 6:30pm to 8:00pm is the most convenient time for all of us. Moreover, it was not a
  • 4. rush hours which was one of the requirements. In the next day we had another problem which is the weather was rainy. It made it hard on us to collect data and write on a wet papers. we struggled until we got the data at the CMGT/430 Week 1 QUIZ Questions Faculty: Vijay Jonnalagadda Question # Question Your Answer 1 Wk 1 Chapter1 Following is not one of the vital roles played by the Information systems in business. A. support an organization’s business processes and operations B. support an organization’s business decision making C. support an organization’s business risk management and philosophy D. support an organization’s strategic competitive advantage 2 Wk 1
  • 5. Chapter1 Which of the following is a correct statement A. Data and Information are synonyms, they mean same B. Data is processed into Information by adding context to it C. Both data and Information depend on the context and perspective of the user D. All these are correct E. None of the above are correct 3 Chapter 1 Business Intelligence (BI) systems support what business function? A. Business Decision Making B. Marketing C. Data Security D. Smoother Business operations and Processes 4 Chapter 1 What system(s) support(s) Business operations A. Transaction Processing B. Process Control C. Enterprise Collaboration
  • 6. D. All of the above E. None of the above 5 Chapter 1 Match the A. Intranet B. Extranet C. Internet D. Company Network Following 1. enterprise and its trading partners 2. inside the enterprise 3. Enterprise Servers 4. Open to all enterprises and individuals 6 Wk 1 Chapter 8 A cross-functional enterprise system that helps a business integrate and automate many of its internal business processes and information systems
  • 7. A. ERP B. CRM C. SCM D. Intranet Portals 7 Wk 1 Chapter 8 A cross-functional inter-enterprise system that helps a business manage its network of relationships and processes with its business partners A. ERP B. CRM C. SCM D. Intranet Portals 8 Chapter 8 Helps with enterprise-wide communications, collaboration, and centralizing information resources. A. ERP
  • 8. B. CRM C. SCM D. Intranet Portals 9 Wk 1 Chapter 8 The automatic exchange of electronic business documents between the networked computers of business partners A. E-mail communications B. EDI C. Extranet Portals D. SCM 10 Chapter 8 Better functioning of Customer facing systems (fill in the blanks): _____________________ 11 Chapter 13 Following is not one of the principle of Technology Ethics A. Technology must achieve more good than the harm
  • 9. B. Benefits and burdens of Technologies must be distributed fairly C. Maintain secrecy of new Technologies D. Those affected by the technology must be informed E. Risks associated with technology must be avoided as much as you can 12 Chapter 13 Following is the percentage of employers that have fired their workers for using the Internet violating the company policy A. 25% B. 33% C. 50% D. None of the above 13 Wk 1 Chapter 13 A piece of malicious code that must attach itself to another file to replicate itself is known as: A. A virus B. A worm
  • 10. C. A logic bomb D. A Trojan 14 Chapter 13 Zombie computers are used in what kind of attacks A. DoS B. DDoS C. Bruteforce attack against encrypted systems D. All of the above 15 Wk 1 Chapter 13 The presence of documentation that allows a transaction to be traced through all stages of information processing. A. Data Trace B. TPM – Transaction Processing Systems C. System security monitor D. Audit Trail
  • 11. 16 Wk2 Chapter 4 How are the actual Practices connected to Policies? A. Practices are set of procedures written based on policy B. No they are not connected C. Practices are detailed steps of instructions developed to meet the standards and those standards were built based on the policies D. Policies are influenced by the Practices. 17 Wk 2 Chapter 4 Following kind of security policy provides guidance to all the members of the organization A. EISP - Enterprise Information Security Policy B. ISSP - Issue Specific Security Policy C. SSP - System specific Security Policy D. All of the above 18 Wk 2
  • 12. Chapter 4 Following kind of security policy set a strategic direction to all security efforts in the organization and is guided by the vision statement of the organization. A. EISP - Enterprise Information Security Policy B. ISSP - Issue Specific Security Policy C. SSP - System specific Security Policy D. All of the above 19 Wk 2 Chapter 4 This security policy tries to explain why a particular technology can or cannot be used in an organization. A. EISP - Enterprise Information Security Policy B. ISSP - Issue Specific Security Policy C. SSP - System specific Security Policy D. All of the above 20 Wk2 Chapter 4 Disaster Recovery (DR) plan comes under what kind of risk strategy
  • 13. A. Avoidance B. Transference C. Mitigation D. Acceptance 21 Chapter 8 Risk management consists of following steps A. Identification B. Assessment C. Risk Control D. Organizational Business processes restructuring E. All of the above 22 Chapter 8 Following is not one of the risk controls that you can apply. A. Policies B. Ensure Laws relevant to the organizational business are implemented
  • 14. C. Programs D. Technical controls 23 Chapter 8 Types of Access Controls A. Discretionary B. NonDiscretionary C. Mandatory D. All of the above E. None of the above 24 Chapter 9 Which risk control is understanding the risk you are facing and do nothing about it A. Avoidance B. Acceptance C. Mitigation D. Transference
  • 15. 25 Chapter 9 Which risk control aims to preempt the damage caused by the risk you identify A. Avoidance B. Acceptance C. Mitigation D. Transference 26 Chapter 9 The amount and kinds of risks that organizations accept after evaluating the balance between Security and accessibility and applying the controls, is called A. Residual Risk B. Risk Mitigation C. Risk Appetite D. Any of the above 27 Chapter 11 Determining that you are who you say you are, is called
  • 16. A. Authorization B. Authentication C. Non-repudiation D. Identification E. All of the above 28 Chapter 11 Process to ensure that the message was sent by the Sender and was received by the receive , is called A. Authorization B. Authentication C. Non-repudiation D. Identification E. All of the above 29 Chapter 11 A software program that looks like a useful utility program, but actually does malicious things such as tracking your password key strokes and sending to someone A. Virus
  • 17. B. Worm C. Bot D. Trojan Horse 30 Chapter 11 A software program that needs a host software to attach itself and propagate A. Virus B. Worm C. Bot D. Trojan Horse 31 Wk2 Chapter 4 In practice it is almost impossible to safeguard any asset 100 percent, however valuable that may be. Hence, no asset has zero risk. The amount of risk not covered by any known safeguards is known as A. Residual Risk B. Risk Tolerance
  • 18. C. Acceptable risk D. All of the above E. None of the above EGME 205 (Section 3) - Fall 2014 COLLABORATIVE PROGRAMMING PROJECT Project: Traffic Signal Timing Due Date: December 16, 2014 at 5 PM. Submit your report to [email protected] Project Goal : You are required to develop a comprehensive plan for appropriate timing of traffic signals at a pre-selected intersection. The results of your project must be submitted in a formal report based on the required report format. General Description:
  • 19. The timing of a traffic signal is an important engineering problem. Its solution can benefit everyone to reach his/her destination faster. The traffic signal programming (1) decreases average travel time through an intersection, and (2) improves overall safety for all types of vehicles entering an intersection. Required Tasks for the Team: 1. Meeting with the team members and selecting a team leader 2. Evaluation and collection of data for the intersection at Yorba-Linda Blvd. and Association Rd. 3. Distribution of project activities equally among all the team members 4. Studying the Appendix E of the textbook for understanding the parameters and requirements involved in the programming of traffic signals. 5. Conducting a literature survey for understanding how others have solved a similar problem 6. Presenting the problem statement in the most concise manner using graphs, data, and charts 7. Developing a detailed and flexible flowchart which presents your approach and traffic requirements 8. Developing a computer program based on the flowchart 9. Comparison of the results from your program with the data collected from the selected intersection Specifications, Outcomes, and Requirements:
  • 20. multiple times, consistently, on a certain day of the week and at a certain time of the day other than the rush hours. -turn lanes and allow for all types of vehicles. variable timing for changing the color of the traffic lights. intersection. Important Information: textbook, the information that you collect through a literature search, and the common-sense knowledge that you have gained as a commuter. solving an engineering problem Internet, you may find the following keywords, among many others, useful for collecting additional information to complete your project: Traffic Signal Timing; Webster’s Method; Highway Capacity; Traffic Congestion
  • 21. EGME 205 Required Format for Collaborative Programming Project Report Each team must submit a report for its collaborative programming project. The report should include the following topics/sections: 1. Title Page 2. Abstract (Description of the engineering problem, tasks performed, and requirements met) (5 Points) 3. Introduction (10 Points) • Project goal (Brief and concise description of the problem; The requirements to be met) • Literature review of publicized solution concepts (Review of articles, books, on-line resources) • List of activities for this project and distribution of work among team members 4. Proposed Approach for Solving the Problem (15 Points) • Description of the proposed solution approach and corresponding mathematical formulations • Presentation of the programing steps by using flowcharts, graphs, drawings, etc.
  • 22. • Specification of the input required and output delivered by the proposed solution • Verbal description of how your MATLAB program functions in order to generate a solution 5. Program Implementation of the Proposed Solution Approach & Algorithms (25 Points) Complete set of MATLAB program statements, with detailed comments, grouped as: o General information and introductory comments o Inputs o Calculations o Outputs 6. Verification of the Program (Show How the Requirements Are Met) (15 Points) •