F21SC: Industrial Programming CW2: Data Analytics (35%) 2019/20
Assessed Coursework 2 — Data Analysis of a Document Tracker
1 Overview
The aim of this coursework is to develop a simple, data-intensive application in Python 3.
This is an pair project, and you will have to identify the contributions of each group member in the
report. Each group member needs to contribute a substantial implementation task to the project.
The learning objective of this coursework is for students to develop proficiency in advanced program-
ming concepts, stemming from both object-oriented and functional programming paradigms, and to apply
these programming skills to a concrete application of moderate size. Design choices regarding languages,
tools, and libraries chosen for the implementation need to be justified in the accompanying report.
This coursework will develop personal abilities in using modern scripting languages as a “glueware” to
build, configure and maintain a moderately complex application and deepen the understanding of integrating
components on a Linux system.
The report needs to critically reflect on the software used for implementing this application, and discuss
advantages and disadvantages of this choice. The report should also contain a discussion, contrasting soft-
ware development on Windows and Linux systems and comparing software development in scripting vs.
systems languages (based on the experience from the two pieces of coursework).
2 Lab Environment
Software environment: You should use Python 3 as installed on the Linux lab machines (EM 2.50) for
the implementation. This installation also provides the pandas, tkinter, and matplot libraries.
If you want to develop the software on your own laptop you need to install the above software. Both
Python and the libraries are available for download at: https://www.python.org/download.
For each of the chosen technologies, the report should discuss why it is the most appropriate choice for
this application, and possible alternatives should be mentioned.
3 Data Analysis of a Document Tracker
In this assignment, you are required to develop a simple Python-based application, that analyses and displays
document tracking data from a major web site.
The issuu.com platform is a web site for publishing documents. It is widely used by many on-line
publishers and currently hosts about 15 million documents. The web site tracks usage of the site and makes
the resulting, anonymised data available to a wider audience. For example, it records who views a certain
document, the browser used for viewing it, the way how the user arrived at this page etc. In this exercise,
we use one of these data sets to perform data processing and analysis in Python.
The data format is described on this web site http://labs.issuu.com/dataset spec.html (see also this local
page for the data spec). Familiarise yourself with the details of the data representation before you start
implementation. The initial (small) dat ...
Fifth part of the Course "Java Open Source GIS Development - From the building blocks to extending an existing GIS application." held at the University of Potsdam in August 2011
Performance Of The Google Desktop, Arabic Google Desktop and Peer to Peer App...ijseajournal
The Arabic language is a complex language; it is different from Western languages especially at the
morphological and spelling variations. Indeed, the performance of information retrieval systems in the
Arabic language is still a problem. For this reason, we are interested in studying the performance of the
most famous search engine, which is a Google Desktop, while searching in Arabic language documents.
Then, we propose an update to the Google Desktop to take into consideration in search the Arabic words
that have the same root. After that, we evaluate the performance of the Google Desktop in this context.
Also, we are interested in evaluation the performance of peer-to-peer application in two ways. The first one
uses a simple indexation that indexes Arabic documents without taking in consideration the root of words.
The second way takes in consideration the roots in the indexation of Arabic documents. This evaluation is
done by using a corpus of ten thousand documents and one hundred different queries.
Fifth part of the Course "Java Open Source GIS Development - From the building blocks to extending an existing GIS application." held at the University of Potsdam in August 2011
Performance Of The Google Desktop, Arabic Google Desktop and Peer to Peer App...ijseajournal
The Arabic language is a complex language; it is different from Western languages especially at the
morphological and spelling variations. Indeed, the performance of information retrieval systems in the
Arabic language is still a problem. For this reason, we are interested in studying the performance of the
most famous search engine, which is a Google Desktop, while searching in Arabic language documents.
Then, we propose an update to the Google Desktop to take into consideration in search the Arabic words
that have the same root. After that, we evaluate the performance of the Google Desktop in this context.
Also, we are interested in evaluation the performance of peer-to-peer application in two ways. The first one
uses a simple indexation that indexes Arabic documents without taking in consideration the root of words.
The second way takes in consideration the roots in the indexation of Arabic documents. This evaluation is
done by using a corpus of ten thousand documents and one hundred different queries.
Flow Documents are designed to optimize readability and it dynamically reflows and adjusts the contents based on runtime requirements such as window size device resolution etc.
Advanced Virtual Assistant Based on Speech Processing Oriented Technology on ...ijtsrd
With the advancement of technology, the need for a virtual assistant is increasing tremendously. The development of virtual assistants is booming on all platforms. Cortana, Siri are some of the best examples for virtual assistants. We focus on improving the efficiency of virtual assistant by reducing the response time for a particular action. The primary development criterion of any virtual assistant is by developing a simple U.I. for assistant in all platforms and core functioning in the backend so that it could perform well in multi plat formed or cross plat formed manner by applying the backend code for all the platforms. We try a different research approach in this paper. That is, we give computation and processing power to edge devices itself. So that it could perform well by doing actions in a short period, think about the normal working of a typical virtual assistant. That is taking command from the user, transfer that command to the backend server, analyze it on the server, transfer back the action or result to the end user and finally get a response if we could do all this thing in a single machine itself, the response time will get reduced to a considerable amount. In this paper, we will develop a new algorithm by keeping a local database for speech recognition and creating various helpful functions to do particular action on the end device. Akhilesh L "Advanced Virtual Assistant Based on Speech Processing Oriented Technology on Edge Concept (S.P.O.T)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33289.pdf Paper Url: https://www.ijtsrd.com/computer-science/realtime-computing/33289/advanced-virtual-assistant-based-on-speech-processing-oriented-technology-on-edge-concept-spot/akhilesh-l
Computer Software Ultimate History and BenefitsTyler Aaron
Computer software is a couple of directions, data, or programs applied to use pcs and perform specific tasks. It is the alternative to equipment, which explains the bodily aspects of a computer. Actually, Computer software is just a universal term applied to reference purposes, texts, and programs that run using a device
For more details Please visit our Website
https://csubmit.com/
Data mining model for the data retrieval from central server configurationijcsit
A server, which is to keep track of heavy document traffic, is unable to filter the documents that are most
relevant and updated for continuous text search queries. This paper focuses on handling continuous text
extraction sustaining high document traffic. The main objective is to retrieve recent updated documents
that are most relevant to the query by applying sliding window technique. Our solution indexes the
streamed documents in the main memory with structure based on the principles of inverted file, and
processes document arrival and expiration events with incremental threshold-based method. It also ensures
elimination of duplicate document retrieval using unsupervised duplicate detection. The documents are
ranked based on user feedback and given higher priority for retrieval.
A Study of Software Size Estimation with use Case Pointsijtsrd
Estimates for cost and schedule in software projects are based on a prediction of the size of the system. Software size estimation is the most important role in software cost estimation. Use Case Point method can provide software size estimation at the early stage of the development process. Software size estimation is based on the high level speciation of Use Case. This paper describes a simple approach to software size estimation base on use case models the "Use Case Points Method. This model is imported into an estimating tool. To get software size with Use Case Point, the needed factors are the number of use cases and their complexity, the number of actors and their complexity, technical complexity factors TCF , and environmental complexity factors ECF . The system computes unadjusted use case points UUCP , adjusted use case points UPC , and the total effort in staff hours. Aye Aye Seint "A Study of Software Size Estimation with use Case Points" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26531.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26531/a-study-of-software-size-estimation-with-use-case-points/aye-aye-seint
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docxlmelaine
Jan 18, 2013 at 2:17pm
No unread replies.
No replies.
Post your definition of the apostrophe as you derived it from the section on the apostrophe in LB pages 316 - 322. What surprised you about the apostrophe? Give at least 2 examples of correct usage of the apostrophe from your own writing. Give examples of badly used apostrophes you have seen in public writing. Indicate the rule that determines correct usage
.
Jan 10, 20141.Definition of law A set of rules and proced.docxlmelaine
Jan 10, 2014
1.
Definition of law:
A set of rules and procedures usually intended to regulate some aspect of society.
(
Joanne B, H. (2010).
Introduction to law
. (4th ed., Vol. Edition). (Page 2)
2.
What are some historical origins of a civil law legal system?
3.
Identify the historical origin of a common law legal system.
4.
What is the difference between a civil law legal system and a common law legal system?
5.
What is meant by jurisprudence?
6.
Describe three major philosophical theories of law.
This is the 1st weeks assignment....will send the rest by the week until week 7 also Midterm and Final.
.
More Related Content
Similar to F21SC Industrial Programming CW2 Data Analytics (35) 20192.docx
Flow Documents are designed to optimize readability and it dynamically reflows and adjusts the contents based on runtime requirements such as window size device resolution etc.
Advanced Virtual Assistant Based on Speech Processing Oriented Technology on ...ijtsrd
With the advancement of technology, the need for a virtual assistant is increasing tremendously. The development of virtual assistants is booming on all platforms. Cortana, Siri are some of the best examples for virtual assistants. We focus on improving the efficiency of virtual assistant by reducing the response time for a particular action. The primary development criterion of any virtual assistant is by developing a simple U.I. for assistant in all platforms and core functioning in the backend so that it could perform well in multi plat formed or cross plat formed manner by applying the backend code for all the platforms. We try a different research approach in this paper. That is, we give computation and processing power to edge devices itself. So that it could perform well by doing actions in a short period, think about the normal working of a typical virtual assistant. That is taking command from the user, transfer that command to the backend server, analyze it on the server, transfer back the action or result to the end user and finally get a response if we could do all this thing in a single machine itself, the response time will get reduced to a considerable amount. In this paper, we will develop a new algorithm by keeping a local database for speech recognition and creating various helpful functions to do particular action on the end device. Akhilesh L "Advanced Virtual Assistant Based on Speech Processing Oriented Technology on Edge Concept (S.P.O.T)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33289.pdf Paper Url: https://www.ijtsrd.com/computer-science/realtime-computing/33289/advanced-virtual-assistant-based-on-speech-processing-oriented-technology-on-edge-concept-spot/akhilesh-l
Computer Software Ultimate History and BenefitsTyler Aaron
Computer software is a couple of directions, data, or programs applied to use pcs and perform specific tasks. It is the alternative to equipment, which explains the bodily aspects of a computer. Actually, Computer software is just a universal term applied to reference purposes, texts, and programs that run using a device
For more details Please visit our Website
https://csubmit.com/
Data mining model for the data retrieval from central server configurationijcsit
A server, which is to keep track of heavy document traffic, is unable to filter the documents that are most
relevant and updated for continuous text search queries. This paper focuses on handling continuous text
extraction sustaining high document traffic. The main objective is to retrieve recent updated documents
that are most relevant to the query by applying sliding window technique. Our solution indexes the
streamed documents in the main memory with structure based on the principles of inverted file, and
processes document arrival and expiration events with incremental threshold-based method. It also ensures
elimination of duplicate document retrieval using unsupervised duplicate detection. The documents are
ranked based on user feedback and given higher priority for retrieval.
A Study of Software Size Estimation with use Case Pointsijtsrd
Estimates for cost and schedule in software projects are based on a prediction of the size of the system. Software size estimation is the most important role in software cost estimation. Use Case Point method can provide software size estimation at the early stage of the development process. Software size estimation is based on the high level speciation of Use Case. This paper describes a simple approach to software size estimation base on use case models the "Use Case Points Method. This model is imported into an estimating tool. To get software size with Use Case Point, the needed factors are the number of use cases and their complexity, the number of actors and their complexity, technical complexity factors TCF , and environmental complexity factors ECF . The system computes unadjusted use case points UUCP , adjusted use case points UPC , and the total effort in staff hours. Aye Aye Seint "A Study of Software Size Estimation with use Case Points" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26531.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/26531/a-study-of-software-size-estimation-with-use-case-points/aye-aye-seint
Jan 18, 2013 at 217pmNo unread replies.No replies.Post yo.docxlmelaine
Jan 18, 2013 at 2:17pm
No unread replies.
No replies.
Post your definition of the apostrophe as you derived it from the section on the apostrophe in LB pages 316 - 322. What surprised you about the apostrophe? Give at least 2 examples of correct usage of the apostrophe from your own writing. Give examples of badly used apostrophes you have seen in public writing. Indicate the rule that determines correct usage
.
Jan 10, 20141.Definition of law A set of rules and proced.docxlmelaine
Jan 10, 2014
1.
Definition of law:
A set of rules and procedures usually intended to regulate some aspect of society.
(
Joanne B, H. (2010).
Introduction to law
. (4th ed., Vol. Edition). (Page 2)
2.
What are some historical origins of a civil law legal system?
3.
Identify the historical origin of a common law legal system.
4.
What is the difference between a civil law legal system and a common law legal system?
5.
What is meant by jurisprudence?
6.
Describe three major philosophical theories of law.
This is the 1st weeks assignment....will send the rest by the week until week 7 also Midterm and Final.
.
Jam
e
s River
J
ewe
l
ry
Proje
c
t
Qu
e
s
t
i
o
n
s f
o
r
Ch
a
p
t
e
r
6
The
J
a
m
es
R
i
ver
Je
w
elry
d
atab
a
se
d
esi
g
n
that
was
u
s
e
d
in
the
Ja
m
e
s
Riv
e
r
J
e
we
lr
y
P
r
o
ject Qu
e
sti
on
s
f
o
r
C
hap
ter
3
in
t
h
is A
p
p
en
d
ix
was:
CU
S
TO
M
ER
(
C
u
st
o
m
e
rI
D
,
L
a
st
N
a
me,
Fi
r
s
t
N
a
me,
P
hone
,
Em
ai
l)
PUR
C
H
ASE
(
I
n
v
o
i
c
e
N
u
mb
e
r
,
I
n
v
o
i
c
e
D
a
te,
Pr
e
T
a
x
Am
o
un
t,
C
u
st
o
me
r
I
D
)
PUR
C
H
ASE
_
I
T
EM
(
I
n
v
o
ic
e
N
u
m
b
e
r
,
I
tem
Nu
m
b
e
r
,
R
e
t
a
ilP
r
i
c
e
)
ITEM
(
Ite
m
N
u
mb
e
r
,
De
s
c
ri
p
t
i
on
,
C
o
s
t,
A
r
t
is
t
N
a
me)
The re
f
erential
integ
r
i
t
y
co
n
strai
n
ts
ar
e
:
C
u
st
o
me
r
ID
in
P
U
R
C
H
ASE
must
e
x
i
st
in
C
u
st
o
me
r
ID
i
n
C
U
S
TO
M
E
R I
n
v
o
i
c
e
N
u
mb
e
r
i
n
PU
R
CH
AS
E_I
T
EM
m
u
st
e
x
i
st
in
I
n
v
o
i
c
e
N
u
mb
e
r
in
PU
R
C
H
ASE Ite
m
N
u
mb
e
r
in
P
U
R
C
H
AS
E
_
I
TEM
m
u
st
e
x
i
st
in
I
tem
N
u
mb
e
r
i
n
I
T
EM
J
ames
Ri
v
er
J
e
welry
has
m
o
d
if
i
ed the
data
b
ase
by
a
d
d
i
n
g
two
tab
l
e
s
—
O
W
N
ER
a
n
d
JEWE
L
R
Y_IT
E
M
—
as
shown
be
l
o
w:
O
W
NER
(
O
w
ne
rI
D
,
L
a
st
N
a
me, F
i
rs
t
N
a
me,
Ph
o
ne
,
E
ma
il,
Am
oun
tOw
e
d
)
J
EWELRY
_I
TEM
(
It
e
m
N
u
m
be
r
,
D
a
teR
e
c
e
i
v
ed
,
D
a
te
S
o
l
d
,
N
e
g
o
t
i
a
te
dSa
l
e
s
P
r
i
c
e
, A
c
t
u
a
l
Sa
l
e
sP
r
i
c
e
,
C
o
m
m
i
s
s
i
on
Perc
en
t
a
g
e
,
Ow
n
e
r
I
D
)
where
Own
e
r
I
D
i
n
JE
W
EL
R
Y_
I
T
E
M
m
u
st
e
x
ist
in
O
w
ne
r
I
D
i
n
O
W
NER
Ite
m
N
u
mb
e
r
in
JE
W
E
L
RY
_I
TEM
m
u
st
e
x
i
st
in
I
te
m
N
u
mb
e
r
i
n
I
TEM
The tab
l
e
s are
used
t
o
r
e
co
rd
data and
m
ai
n
tain
o
wn
e
r data a
b
o
u
t j
e
wel
r
y a
c
cep
t
ed
o
n
c
o
n
si
g
n
ment.
J
EWEL
R
Y_I
T
EM
(w
h
ich
is
a
su
b
ty
p
e
o
f I
T
E
M
—
n
o
te
t
h
e
refe
r
ential
integ
r
i
ty
c
o
n
s
t
r
ai
n
t) is
u
sed
to
re
c
o
rd the ne
g
o
tia
t
ed sales
pr
i
ce,
the
c
o
m
miss
i
o
n
pe
r
centa
g
e,
a
n
d
t
h
e
act
u
al
sales pr
i
c
e for
each
i
t
e
m
o
f
c
o
n
si
gn
ed j
e
wel
r
y.
Ass
u
me
t
h
at
o
ff
i
c
e
p
er
s
o
n
n
el at J
a
mes
Ri
v
er
J
e
wel
r
y
u
se
a data
b
a
se
a
pp
l
i
c
a
ti
o
n
t
o
r
e
c
o
rd
c
o
n
si
g
n
ment
d
ata. When an
i
t
e
m
is
re
c
ei
v
ed
o
n
c
o
n
si
gn
m
ent,
o
wn
e
r data are
s
t
o
red in
OWN
E
R if t
h
e
o
wner is
ne
w
;
o
the
r
wise
exi
s
ti
n
g
o
wner
d
ata are
u
sed.
N
e
w
IT
E
M a
n
d
JEWE
L
R
Y_I
T
EM
r
o
ws
a
r
e
creat
e
d
. In
I
TE
M
, Ite
m
N
u
m
b
er a
n
d
De
s
cri
p
t
i
o
n
are
re
c
o
r
d
ed,
C
o
s
t is
s
et
to
$
0.
0
0, and
if t
h
ere
i
s an
artist as
s
o
ci
a
ted
with the pie
c
e,
A
r
ti
s
tN
a
m
e is
e
n
tered.
F
o
r JE
W
EL
R
Y_IT
E
M,
d
ata are
st
o
red
f
o
r all
c
o
l
u
m
n
s
e
xc
e
p
t
D
a
te
S
o
ld a
n
d
Actua
l
S
a
le
s
Price.
J
a
m
e
s Ri
v
er
J
e
welry
per
s
o
nn
el
r
efer
t
o
these
act
i
o
n
s as
an
Accepta
n
ce Tra
n
.
Jacob claims the employer violated his rights. In your opinion, what.docxlmelaine
Jacob claims the employer violated his rights. In your opinion, what are the legal rights of the employer and the employee in this situation? Explain. Is Jacob correct in his allegations? Why or why not?
Since Jacob believes he was wrongfully terminated and various rights were violated, he plans to consult with a lawyer and sue Cranes. What are Jacob's options with regards to resolving his claims through the court or ADR?
Jacob claims the state troopers violated his rights. Do you agree?
Has Brianna committed any offenses? Why or why not?
Did Lucy violate intellectual property laws? If yes, how? If no, why not?
Has Jacob committed any violations in his Internet postings concerning his former company? Why or why not?
What are the ethical issues related to this scenario?
Support your responses with examples.
Cite any sources in APA format.
.
Ive been promised A+ papers in the past but so far I have not seen .docxlmelaine
I've been promised A+ papers in the past but so far I have not seen better than a C. Is there anyone out there that can do this and seriously get an A or atleast a B. I would greatly appreciate :)
In a 1-2 page Microsoft Word document, discuss the following case study:
When Alexander and Deborah married, Alexander owned a duplex in a community property state. They lived in one side of the duplex. They saved their money and bought a lake lot as tenants by the entirety. Deborah failed to pay the loans she took out from Savings Bank prior to her marriage to pay for college. The bank claimed the duplex, the lake lot and their savings.
Discuss the likelihood of success on the bank's claims against the properties.
.
It’s easy to dismiss the works from the Dada movement as silly. Cons.docxlmelaine
It’s easy to dismiss the works from the Dada movement as silly. Consider the art that was popular at the time, however. These “silly” works were a violent protest to the realism and impressionism of the day. Check out “Entr' acte", 1924, directed by Rene Clair” on YouTube, if you can, for an excellent example of Dada.
www.youtube.com/watch?v=NMaXF-4MMGA
The pointlessness of the action is the point! I still crack up at the end even seen it hundreds of times.
Think: what does Dada do that realism cannot? What’s the value of a movement that breaks all the rules? What did Dada contribute to the progress of art and film?
Remember, post before WEDNESDAY and three times during the week because you must contribute three postings over the week for full credit. Please write more than 50 words for your first response to my question.
Posted by William Ousley at 06/17/13 11:24
What Dada can do that realism cannot is make humorous, chaotic assemblage of events. The value of a movement that breaks all the rules is a non-traditional valued movement. The Dada anti-art movement had a strong negative and destructive element. Dada writers and artists were concerned with shock, protest, and nonsense. Dada contributed to assemblage, collage, photomontage and the use of ready-made objects. The inclusion of sound in art, the incorporation of found objects in a work of art, and the concept of improvising as a performance options were all substantially important to not only the development of music, but more specifically the development of electronic music.
(1)
Posted by Anya Walker at 06/20/13 03:10
William
The art of film is very dynamic. Dada was a great way to show how it was used. I know watching the film showed so many scenes and object so, it made it very helpful to understand the meaning of Dada.
Posted by Anya Walker at 06/18/13 05:59
Dada is hilarious to watch. The artist is able to show realism by having creative scenes that was part of the anti-war movement era. The objective of using a technique called collage was used by combining different type of scraps that was part of illustration to be viewed in different scenes. Dada contributes to the art of film by having music being played while watching the film. Also, surrealism was introduced to show a type of chaotic way of using humorous scenes in film.
(2)
Posted by William Ousley at 06/18/13 09:55
Anya
Very well written. For some reason I read and read the article on Dada in the book and couldn't quite get it. So I read a few articles from the Internet to fully understand what the Dada movement was. Even with breaking all the rules they were able to contribute to the art.
Posted by Byron Stival at 06/21/13 06:05
Anya-
It is fun to watch this video. Some of it was funny but I also had a hard time watching all of it. I like the first introduction to the music. I love music and love to think of what the person was thinking and feeling when they wrote the music. It baffles my mind that someone ca.
Its meaning is still debated. It could be a symbol of the city of Fl.docxlmelaine
Its meaning is still debated. It could be a symbol of the city of Florence (and by association of the Medici's identification with the city of Florence) or it could be a metaphor for the nature of love. Choose one of these meanings and elaborate on that meaning. Be sure to talk about the story of David, how he is portrayed in the statue, its location, etc.
.
Jaffe and Jordan want to use financial planning models to prepar.docxlmelaine
Jaffe and Jordan want to use financial planning models to prepare a projected (pro forma) financial statement to determine the profitability and financial health of the business for next year, ending Dec 31, 2021. Use the pro forma financial statement below to answer the following questions:
PRO FORMA INCOME STATEMENT
($millions)
Total operating revenues
82
Less expenses
27
Less depreciation
9
Earnings before interest and taxes
46
Less interest
4
Net income before taxes
42
Less taxes @ 23.8%
10
Net income
32
PRO FORMA BALANCE SHEET
Assets:
Cash
19
Other current assets
28
Net Fixed Assets
40
Total Assets
87
Liabilities and Equities:
Accounts payable
12
Long-term debt
28
Stockholders' Equity
47
Total Liabilities & Equities
87
a. What is the
estimated profit
of the business for 2021?
b. Compute the following
profitability ratios
and explain to Jaffe and Jordan whether the business looks profitable relative to the performance of the industry.
i. Profit margin
ii. Return on assets
iii. Return on equity
iv. calculate and explain operating cash flow
The industry ratios are as follows:
Industry ratios
Profit margin
32.80%
Return on assets
34.00%
Return on equity
42.50%
c. Assuming you project a 25% increase in
operating revenue
(sales) per year what will be the anticipated operating revenue in 2022?
d. If net income is projected to increase by 20% per year, what will be the
profit margin
in 2022?
e. What will be the estimated
earnings per share
(EPS) in 2022 if 1,000,000 shares are issued?
.
Ive got this assinment due and was wondering if anyone has done any.docxlmelaine
I've got this assinment due and was wondering if anyone has done anything similar?? If so can easily change around information and will make it much easier to do it a second time round.
Please read this extremely carefully!
THIS NEEDS TO BE DONE OVER A 7-10 DAY PERIOD!!! please do not message me unless you UNDERSTAND exactly what needs to be done, and the extent of needing to bring in other scholars and research! THIS ASSIGNMENT NEEDS SOMEONE WHO'S ENGLISH IS PERFECT!! when messaging let me know what you believe needs to be done, so I can see you understand the brief. Let me know if you have any questions, I will be helping you out along the way!!
Content Analysis
Due: 11pm Friday 19 September
Weighting: 30%
This assignment assesses your ability to critique two culturally divergent global television news services by analysing their online news content.
Length: 1500 words.
Carry out a content analysis of Internet television of two reputable news organizations, one Western and one non-Western by studying elements such as language, pictures and headlines in the reporting of international events.
From the data gathered write a comparative analysis of news content focusing on the news agenda, sources and predominant news values.
Do the following:
• Over a 2-week period gather data from the website looking at the news agenda i.e. the top 5 stories covered by subject (i.e. politics, business/economics, conXict, human interest, celebrity) and geographical interest (i.e. North America, Europe, Asia, Latin America, PaciWc)
• Who are the experts quoted? (i.e. their cultural, political or social orientation) Are they from an elite or non-elite country or group?
• From what cultural/national perspectives are the stories being reported?
• Who is the target audience?
• What are the predominant news values?
Your insights and analysis should be supported by examples from the evidence gathered as well as course readings and other literature.
Attach samples of your page views as an appendix to your analysis for each website (no more than 4 pages).
Examples of global news networks your may choose:
• BBC
• Al Jazeera
• CNN
• CCTV
• France24
• Xinhua News Agency
• ABC News World
• TimesNow.tv
Submit your analysis and samples as one document to Turnitin by 11pm Friday 19 September, 2014.
Students will be assessed on their ability to:
• Clearly articulate the aim and method of their research.
• Present robust data, using evidence to build an argument.
• Draw connections from diVerent forms of evidence.
• Structure the essay in a clear, logical and engaging way.
• Provide a strong argument through interpretation of data and reference to relevant
concepts.
• EVectively integrate cited material, with complete and appropriate referencing.
• Write clearly, concisely and directly, without spelling or grammatical errors.
Unit guide ICOM201 International Television and Beyond
This Assessment Task relates to the following Learning Outcomes:
• Demonstrate unde.
It is thought that a metabolic waste product produced by a certain g.docxlmelaine
It is thought that a metabolic waste product produced by a certain group of prokaryotic organisms made possible the evolution of the eukaryotic cell. Name the metabolic waste product and the group of prokaryotic organisms that produce it. Name the metabolic reaction that leads to this waste product being produced. Discuss two ways that the build-up of this waste product helped pave the way for the evolution of higher organisms (plants and animals).
.
it is not the eassay it is about anwering the question with 2,3 pa.docxlmelaine
it is not the eassay it is about anwering the question with 2,3 paragraph.
there is 4 questions
1. Explain how imperialism has changed over time(each catagory need 1,2 sentence description )-
(1) From the early period of Spanish and Portuguese dominations
(2)Through the rise of the Atlantic system,
(3)to the New imperialism of the mid-to-late 19th century,
(4)up to the era of Neo-colonization of the late 20th and 21th century
2. What are the main characteristics of each period?
3. What changed over time?
4. What did not change?
5. In your opinion which system/era was easiest to resist and why?
Write it with easy word.
.
It is now time to select sources and take some notes. You will nee.docxlmelaine
It is now time to select sources and take some notes. You will need to use the Cornell method of note taking to complete your notes. Remember, the more detailed your notes are, the easier it will be to write your paper.
As you take notes, keep track of the sources from where you borrow ideas. Be sure you write down all of the information you will need to cite later in the Works Cited page, in
MLA format
. If you come across a source that you are not sure how to cite, please contact your instructor. Even if you write the information in your own words, it can be considered plagiarism if not cited properly.
Cornell Notes
Topic:
Page ___ of ____.
Name:
Course:
Teacher:
Date:
Main Idea:
Notes:
Summary/Questions:
.
Its a linear equations question...Neilsen Media Research surveys .docxlmelaine
It's a linear equations question...
Neilsen Media Research surveys TV-watching habits and provides a list of the 20 most-watched TV programs each week. Each rating point in the survey represents 1,102,000 households. One week "60 Minutes" had a rating of 11.0. How many households did this represent?
.
itively impact job satisfactionWeek 3 - Learning Team Paper - Due .docxlmelaine
itively impact job satisfaction
Week 3 - Learning Team Paper - Due Day 7
Learning Team Assignment:
Job Satisfaction Paper
Use
the University of Phoenix Library, and/or other resources, to conduct research concerning the concept of job satisfaction.
Prepare
a 1,050 to 1,400-word paper in which you address the following items:
Introduction and Define
job satisfaction
.
·
Explain the impact that organizational socialization has on job satisfaction.
·
Provide an example of how an organization can use organizational socialization to positively impact job satisfaction. -
·
Describe the relationship between organizational commitment and job satisfaction.
·
Provide an example of how an organization can use organizational commitment to positively impact job satisfaction.
My portion
·
Conclusion -
.
It is not an online course so i cannot share any login details. No d.docxlmelaine
It is not an online course so i cannot share any login details. No detailed instructions were given to complete this assignment. The professor indicated that he wants a 3-4 page paper with a topic of my choosing. It needs to be about civilization as a whole though. The two topics i showed to the professor that he agreed were good for the paper were the following:
Discuss the death sentence and how it has been changed over the years morally.
Discuss the use of physical torture and how it has changed over the years morally.
These papers are discussing time periods ranging from the spanish inquisition, all the way up to present day. How were these used in the past and how did our civilization change to accept it the way it is today?
.
IT Strategic Plan, Part 1Using the case provided, analyze the busi.docxlmelaine
IT Strategic Plan, Part 1
Using the case provided, analyze the business environment described to develop Part 1 of an IT Strategic Plan. Identify the business’ strategic objectives, develop an IT mission and vision for the organization, describe an appropriate governance process, and provide an inventory of the organization’s current IT projects. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s space is used on any given night. Dispatchers have a goal to turn freight around.
It should be in API format.Research paper should be on Ethernet .docxlmelaine
It should be in API format.
Research paper should be on
Ethernet Networking
related to my specific subject which is
Telecommunications and networking.
It should be 17-20 pages in length. It should be a complete, polished artifact containing all of the main elements of the final product.
It should be plagiarism free.
It should contain Contexts, abstract, introduction, main body , conclusion and references. And if needed can use graphs or diagrams.
.
IT Strategic Plan, Part 2Using the case provided, build on Part .docxlmelaine
IT Strategic Plan, Part 2
Using the case provided, build on Part 1 of your IT Strategic Plan, and develop Part 2. Develop IT strategies to align to the business strategies, complete a roadmap of the current IT projects, propose a new IT project to support the IT strategies, identify risks associated with the IT projects, and explain the steps required to develop a business continuity plan for the most important IT systems. Your analysis will be presented in a short paper that follows the outline provided, using Microsoft Word, or in a format that can be read using MS Word.
Case Study: Wobbly Wheels (WW) Distribution Company
Overview
WW is a regional transportation and distribution company in operation for over 60 years. The company serves major cities in the Mid-Atlantic region. They are headquartered in Wilmington, Delaware and have a staff of 400 employees including truck drivers. There are 6 distribution terminals (Philadelphia PA, Baltimore MD, New York City, Washington DC, Newark NJ and Wilmington DE) for consolidating freight, and 100 delivery vehicles including 20 tractor/semi-trailer units, 40 box trucks and 40 panel vans.
The company operates in a highly competitive business environment. Growth has been stagnant because of a slow economy. John, the president of the company, would like to see growth at 5% per year. He would also like to see expenses cut by 5% to help fund new initiatives. Current revenue is about $39 million a year with profit running at 4%.
Current Business Operations
WW operates 24 hours a day, 7 days a week. Sales personnel (12 people, two per terminal) visit prospective customers to outline company capability, services provided and costs. When a customer decides to use WW they call the dispatch office with shipment information. Usually they FAX a copy of the bill (s) of lading to a terminal with information such as origin, destination, product description, weight and number of packages.
A dispatcher at a terminal makes a list of freight pickups and sends a truck to get the freight. To do this they use the routing system to determine the sequence of pickups by zip code. They use local maps within a zip code to map out the specific order of pickups since there may be several in a zip code area. They have a performance goal of 98% of freight picked up within 24 hours of availability.
A driver follows the dispatch order for pickups. Many of the drivers complain that the pickup order is not efficient. When they pick up an order they sign for receipt and either load the freight or guide the customer’s forklift operators to arrange it properly in the truck.
After freight is picked up it is brought to the terminal where it is unloaded and sorted by destination. A dispatcher then prepares a delivery ticket (again using the routing system) that is used to load a truck in the proper sequence for delivery. Some trucks take freight from one terminal to another while others make local deliveries. About half of a terminal’s sp.
It seems most everything we buy these days has the label made in Ch.docxlmelaine
It seems most everything we buy these days has the label “made in China”. China has become the second largest world economy, and one of the fastest growing in the world. Discuss the factors that have allowed China to become such a large economy, and the challenges China is likely to face in the near future.
250 words and cited with in .
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
F21SC Industrial Programming CW2 Data Analytics (35) 20192.docx
1. F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
Assessed Coursework 2 — Data Analysis of a Document
Tracker
1 Overview
The aim of this coursework is to develop a simple, data-
intensive application in Python 3.
This is an pair project, and you will have to identify the
contributions of each group member in the
report. Each group member needs to contribute a substantial
implementation task to the project.
The learning objective of this coursework is for students to
develop proficiency in advanced program-
ming concepts, stemming from both object-oriented and
functional programming paradigms, and to apply
these programming skills to a concrete application of moderate
size. Design choices regarding languages,
tools, and libraries chosen for the implementation need to be
justified in the accompanying report.
This coursework will develop personal abilities in using modern
scripting languages as a “glueware” to
build, configure and maintain a moderately complex application
and deepen the understanding of integrating
components on a Linux system.
The report needs to critically reflect on the software used for
2. implementing this application, and discuss
advantages and disadvantages of this choice. The report should
also contain a discussion, contrasting soft-
ware development on Windows and Linux systems and
comparing software development in scripting vs.
systems languages (based on the experience from the two pieces
of coursework).
2 Lab Environment
Software environment: You should use Python 3 as installed on
the Linux lab machines (EM 2.50) for
the implementation. This installation also provides the pandas,
tkinter, and matplot libraries.
If you want to develop the software on your own laptop you
need to install the above software. Both
Python and the libraries are available for download at:
https://www.python.org/download.
For each of the chosen technologies, the report should discuss
why it is the most appropriate choice for
this application, and possible alternatives should be mentioned.
3 Data Analysis of a Document Tracker
In this assignment, you are required to develop a simple Python-
based application, that analyses and displays
document tracking data from a major web site.
The issuu.com platform is a web site for publishing documents.
It is widely used by many on-line
publishers and currently hosts about 15 million documents. The
web site tracks usage of the site and makes
the resulting, anonymised data available to a wider audience.
For example, it records who views a certain
3. document, the browser used for viewing it, the way how the
user arrived at this page etc. In this exercise,
we use one of these data sets to perform data processing and
analysis in Python.
The data format is described on this web site
http://labs.issuu.com/dataset spec.html (see also this local
page for the data spec). Familiarise yourself with the details of
the data representation before you start
implementation. The initial (small) data set used for this
exercise is available online here:
http://www.macs.hw.ac.uk/˜hwloidl/Courses/F21SC/issuu
cw2.json. For testing use this tiny sample data
file at http://www.macs.hw.ac.uk/˜hwloidl/Courses/F21SC/issuu
sample.json.
The application needs to run on an up-to-date Linux platform
(Ubuntu 18.04). The application should
be developed in Python 3, using appropriate libraries for input,
data processing and visualisation. Possible
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
https://www.python.org/download
issuu.com
http://labs.issuu.com/dataset_spec.html
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/dataset_spe
c.html
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/dataset_spe
c.html
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/issuu_cw2.
json
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/issuu_samp
le.json
4. F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
choices are the json library for parsing, the pandas library for
processing the input data (optional), the
tkinter library for GUI functionality and the matplot library for
visualising the results. You need to
identify the advantages of your choice of libraries.
The application must provide the following functionality:
1. Python: The core logic of the application should be
implemented in Python 3.
2. Views by country/continent: We want to analyse, for a given
document, from which countries and
continents the document has been viewed. The data should be
displayed as a histogram of countries,
i.e. counting the number of occurrences for each country in the
input file.
(a) The application should take a string as input, which uniquely
specifies a document (a document
UUID), and return a histogram of countries of the viewers. The
histogram can be displayed
using matplotlib.
(b) Use the data you have collected in the previous task, group
the countries by continent, and
generate a histogram of the continents of the viewers. The
histogram can be displayed using
matplotlib.
3. Views by browser: In this task we want to identify the most
popular browser. To this end, the
5. application has to examine the visitor useragent field and count
the number of occurrences
for each value in the input file.
(a) The application should return and display a histogram of all
browser identifiers of the viewers.
(b) In the previous task, you will see that the browser strings
are very verbose, distinguishing
browser by e.g. version and OS used. Process the input of the
above task, so that only the
main browser name is used to distinguish them (e.g. Mozilla),
and again display the result as
a histogram.
4. “Also likes” functionality: Popular document-hosting web
sites, such as Amazon, provide informa-
tion about related documents based on document tracking
information. One such feature is the “also
likes” functionality: for a given document, identify, which other
documents have been read by this
document’s readers. The idea is that, without examining the
detail of either document, the informa-
tion that both documents have been read by the same reader
relates two documents with each other.
Figure 1 gives an example of this functionality. In this task, you
should write a function that generates
such an “other readers of this document also like” list, which is
parametrised over the function to
determine the order in the list of documents. Display the top 10
documents, which are “liked” by
other readers.
To achieve this task you will need to do the following:
(a) Implement a function that takes a document UUID and
6. returns all visitor UUIDs of readers of
that document.
(b) Implement a function that takes a visitor UUID and returns
all document UUIDs that have been
read by this visitor.
(c) Using the two functions above, implement a function to
implement the “also like” functionality,
which takes as parameters the above document UUID and
(optionally) visitor UUID, and addi-
tionally a sorting function on documents. The function should
return a list of “liked” documents,
sorted by the sorting function parameter. Note: the
implementation of this function must not fix
the way how documents are sorted, and use the sorting function
parameter instead.
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
(d) Use this function to produce an “also like” list of
documents, using a sorting function, based on
the number of readers of the same document. Provide a
document UUID and visitor UUID as
input and produce a list of top 10 document UUIDs as a result.
5. “Also likes” graph: For the above “also like” functionality,
generate a graph that displays the re-
lationship between the input document and all documents that
have been found as “also like” docu-
7. ments (and only these documents). Highlight the input
document and user by shading in that graph,
and use arrows to capture the “has-read” relationship (i.e. arrow
from reader to document). In the
graph shorten all visitor UUIDs and document UUIDs to the last
4 hex-digits. As an example, the
graph below uses document b4fe and reader 6771 as input
(shaded green) and displays 7 “also like”
documents, together with the readers that relate these
documents with the input document (download
.dot source file and .ps output file):
Readers
Documents
Size: 1m
6771
b4fe
d38c
e16e 2bb587c4 9da6
1b2b
90c2 56e3 a2c8
Hint: Use the .dot format as graph representation. Use the
graphviz package with the dot tool to
translate the .dot into a .ps format (and then optionally in .pdf
format). For a detailed description
see this dot User Manual. You can install the graphviz package
on an Ubuntu machine by typing
8. (in a terminal window): sudo apt-get install graphviz
As an example of graphviz/dot usage, you can generate the
above graph from the dot source
code and view it like this:
% wget
http://www.macs.hw.ac.uk/˜hwloidl/Courses/F21SC/1m_3.dot
% dot -Tps -o 1m_3.ps 1m_3.dot
% evince 1m_3.ps
6. GUI usage: To read the required data and to display the
statistical data, develop a simple GUI based
on tkinter that reads the user inputs described above, and with
buttons to process the data as
required per task.
7. Command-line usage: The application shall provide a
command-line interface to test its functionality
in an automated way, like this:
% cw2 -u user_uuid -d doc_uuid -t task_id -f file_name
to check the results of implementing task task_id using inputs
user_uuid for the user UUID and
doc_uuid for the document UUID; file_name is the name of the
JSON file with the input data.
The task ids should be: 2a, 2b, 3a, 3b, 4d, 5, 6, matching the
tasks above (task id 6
should run Task 5 and then automatically launch a GUI showing
the resulting also-likes graph).
4 Submission
You must submit the complete project files, containing the
source code, a stand-alone executable, and
9. the report (in .pdf format) as one .zip file no later than 3:30 PM
on 5th of December 2019. Addition-
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/1m_3.dot
http://www.macs.hw.ac.uk/~hwloidl/Courses/F21SC/1m_3.ps
http://www.graphviz.org/content/dot-language
http://www.graphviz.org/
http://www.graphviz.org/Documentation/dotguide.pdf
F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
ReadersDocuments
Input
Also read ...
Top result (most also readers)
Other results
Figure 1: Example of identifying also-likes documents. Starting
from the current reader and document
(green), all readers are identified, who have also read the input
document (blue). From the other documents,
read by these readers, the top 10 documents, counted by number
of readers are identified and displayed.
In this example the red document is top of this list, and the two
pink documents are also on the result list.
The automatically generated graph should display all three
result documents, but doesn’t have to distinguish
10. between “best” and “others” by shading. The unused, black
users and documents shouldn’t be shown in that
graph.
ally, a screencast or video of running the application, with an
explanation as voice-over audio needs to be
submitted to Vision. This is mandatory, and without the
screencast or video the submission is incomplete
and may be marked as 0 points. The standard penalty of -30% of
the maximum available mark applies to
late submissions. No submissions will be accepted after 5
working days beyond the submission deadline.
The main function driving the application should be called cw2,
as discussed in “Command-line Usage”
above. Submission must be through Vision, submitting all of the
above files in one .zip file. Additionally,
an electronic submission of report, sources and application by
email is recommended. This coursework is
worth 35% of the module’s mark.
You are marked for your application, the structure, code and
comments used, your testing, your report
and the screencast/video of demonstrating the running of your
application. The marking scheme for this
project is attached.
5 Report Format
The report should have between 10–20 pages and use the
following format (if you need space for additional
screenshots, put them into an appendix, not counting against the
page limit, but don’t rely on the screenshots
in your discussion):
1. Introduction: State the purpose of the report, your remit and
any assumptions you have made during
11. the development process.
2. Requirements’ checklist: Here you should clearly show which
requirements you have delivered and
which you haven’t.
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
3. Design Considerations: Here you should clearly state what
you have done to your application to
make it more usable and accessible.
4. User Guide: Use screen shots of the running application
along with text descriptions to help you
describe how to operate the application.
5. Developer Guide: Describe your application design and main
areas of code in order to help another
developer understand your work and how they might develop it.
You may find it useful to supplement
the text with code fragments.
6. Testing: Show the results for testing all cases and prove that
the outputs are what are expected. If
certain conditions cause erroneous results or the application to
crash then report these honestly.
7. Reflections on programming language and implementation:
Based on your experience in imple-
menting this application, reflect which language features and
12. technologies have been most helpful,
identify limitations of your application and suggest ways how to
overcome this limitations. Also re-
flect on the usability of the (kind of) language (either system or
scripting language) for this application
domain, and on its wider applicability.
8. What did I learn from CW1? A short discussion on lessons
learnt from the feedback given on CW1
and a discussion how you integrated this feedback into CW2.
Cover both coding and report writing,
possibly more (project management, preparing for interview
style questions etc).
9. Conclusions: Reflect on what you are most proud of in the
application and what you’d have liked to
have done differently.
10. A final section should contain the main references used in
this report and in the implementation. These
references need to be cited in the report to indicate where the
reference has been used in the report or
implementation.
Marking Scheme
Criteria Marks
Meeting system requirements 45
Report Quality 20
Content and communication (Design Considerations, Reflec-
tions, User guide & Developers guide, Testing)
The Application 15
Code quality, secure coding, sufficient comments, sensible vari-
able/object names, good code/class/method design, use of ad-
vanced lang. features.
Initiative, innovation, professional conduct, creativity and ef-
13. forts above & beyond the call of duty
15
Screencast/Video of running the application with explanation as
voice-over audio.
5
Total marks 100
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
F21SC: Industrial Programming CW2: Data Analytics (35%)
2019/20
Professional Conduct and Plagiarism
This is a pair project, and you will have to identify the
contributions of each group member in the report.
Each group member needs to contribute a substantial
implementation task to the project. Where external
resources have been use, these need to be clearly identified and
referenced.
Plagiarism:
This project is assessed as an pair project. You will work with
your partner on the implementa-
tion and should split up tasks in a reasonable way to arrive at a
complete implementation of the
specification. You will have to identify the contributions of
each group member in the report. You
can discuss general technical issues related to this work with
14. other students, however, you must
not share concrete pieces of code or text. Readings, web sources
and any other material that you
use from sources other than lecture material must be
appropriately acknowledged and referenced.
Plagiarism in any part of your report will result in referral to
the disciplinary committee, which may
lead to you losing all marks for this coursework and may have
further implications on your degree.
For details see this link
Late Submission Policy
The standard penalty of -30% of the maximum available mark
applies to late submissions. No submissions
will be accepted after 5 working days beyond the submission
deadline.
Deadline: 3:30PM (Edi) / 12:00PM (Dubai) on 5th of December
2019; (pair project)
https://www.hw.ac.uk/students/studies/examinations/plagiarism.
htmOverviewLab EnvironmentData Analysis of a Document
TrackerSubmissionReport FormatReserved Comments to
Instructors:Reflection on previous instances of the course:
9 cases
· SOLVE THE 8 CASES IN DETAILS. DETAILS ARE
NECESSERY IN THIS ASSIGMNET. ALSO, DON’T FORGET
TO SLOVE QUESIOTNS #9
· DO NOT MISS ANY QUESTIONS. OTHERWISE YOU WILL
GET 0
15. · Here are disease to think of while solving these cases: Viral
Hepatitis and Measles, Vaccines and Hospital-Acquired
Infections (HAI), Middle East Respiratory Syndrome (MERS),
Meningitis and Rabies, Vector-borne and Emerging Infections,
Hantavirus and Nipah, Foodborne and Waterborne Diseases,
Ebola, Clostridium difficile, and Necrotizing Fasciitis, Acute
Respiratory Infections and MRSA, Influenza and Avian and
Swine Flu, Tuberculosis, Polio, Candida auris, and more…
· NOTE: These diseases may and may not be the disease you’re
working on. You need to search. These just to give you an idea.
Answering the questions are the most important.
CASE #1
1. Today is December 2nd. The local hospital has reported ten
cases of a mysterious infectious disease among children. The
children have suffered from nausea, diarrhea (profuse and
watery), abdominal pain, and fever, primarily. Each of the
children has vomited at least twice in the past 24 hours. All of
the children are between the ages of 7 and 11 and reportedly
have been to Franklin Park Mall in the past three days.
Specifically, the play area and cars near the food court. Using
your infectious disease knowledge, what would you do to try to
identify the agent? What other public health actions should you
take to prevent more cases from occurring? What do you think
is the likely agent and why? What are the potential fomites in a
shopping mall and how would these be assessed? (20 points)
Some clues: All the children at the McDonald’s at the food
court on November 28th or November 29th. The same
employees worked at McDonald’s on both days, though Jenny
had been ill from November 24th – 26th, suffering similar
symptoms as the children. She rotates duties at McDonald’s and
is often on her phone while at work, responding to texts at 867-
5309. The equipment and storage units at McDonald’s have
16. been inspected and are clean. Bathroom is clean but some
employee’s, like Jenny, do not wash their hands. All the
employees rotate between food service, cash register operation,
and drinks replacement, table cleaning, and utensil replacement.
Nine of the ten children played at the play area on the 27th or
28th. Five of them sat on Santa’s lap and told him what they
want for Christmas. The play area includes a ball pit, bounce
house, Merry-Go-Round, and toys in the middle of the mall
(fenced off, but parents are with the kids).
CASE #2
2. Bioterrorism can occur in a variety of ways and may or may
not include Category A agents. What makes agents like Bacillus
anthracis both a “good” biological weapon and a “bad” one? Do
the same for Yersinia pestis. Are either of these transmissible
person-to-person? Why must epidemiologists be involved with
the aftermath of suicide bombing events? Explain why
infectious agents, with varying levels of potential morbidity and
mortality, could be a real problem after a bombing. Who needs
to be fully examined and treated and why? (15 points)
CASE #3
3. A 45-year old man visits the emergency department at
University of Toledo Medical Center on November 30th. He
says he has been very weak the entire weekend; had a fever of
101 degrees Fahrenheit; joint pain in his wrists, knees, and
ankles; and muscle pain (myalgia). He also has a maculopapular
rash on his back and thighs. You ask about his recent activity
history and he informs you he has been assisting in the relief
17. and recovery efforts in Puerto Rico following the hurricanes (he
was there from November 16th – November 28th). He works for
Doctors Without Borders and was there with seven of his
colleagues. He said one of his colleagues has similar symptoms
but although he is a doctor, is too stubborn and will not get
treatment unless it gets “really serious”.
A physical exam reveals numerous mosquito bites, which the
patient says has been itching for the past five days. What
further questions do you ask the patient as an epidemiologist as
well as a health care provider? What tests would you run to
determine the agent? What do you think is the likely agent
based on this detective work and what treatment needs to be
performed on the patient? What should you do about his
colleagues who were with him? (15 points)
CASE #4
4. Mandy comes to the Parkview Medical Center Emergency
Room in Pueblo, Colorado with her boyfriend, Kyle. Mandy is
complaining of a headache, has a fever of 100.4 Fahrenheit, and
chills. Initial physical examination reveals swollen lymph
glands and a small ulcer on her right shoulder. She does not
recall being bitten by any of their animals but does state there
are plenty of insects around. The initial headache started two
days ago, but once the fever and chills started, they came to the
hospital.
They live on a farm and raise goats, rabbits, sheep, and
chickens. They also grow vegetables (carrots, kale, lettuce,
tomatoes, peppers). Mandy is often doing the gardening and
takes care of the chicken eggs, while Kyle focuses on the other
animals and hunting deer for an additional supply of winter
food. They have a freshwater pond on their property where they
enjoy swimming and playing in. Geese have been known to
spend their mornings around the pond, nibbling on the grass and
18. defecating.
What additional information would you ask of Kyle and Mandy?
What is/are the potential infectious agent(s) responsible and
why? How would you treat this case? Do you do anything for
Kyle and if so, what do you do? (15 points)
CASE #5
5. Bob (age 36) is a builder and contractor. His company, Bob
the Builder, Inc., is in charge of constructing new landscape to
the outside of the Bellagio Hotel and Casino in Las Vegas,
Nevada. During this process, they have had to uproot some palm
trees, tear down a fountain, and re-construct a swimming pool.
Every day, he comes home tired and usually covered with dirt
and debris. His wife, Anne (40), is a dentist. They have two
kids, Leonard (13) and Penny (10). Leonard is a seventh-grade
student at CalTech Prep and a talented cellist. Penny is a 4-H
fair all-star, winning many awards for her goats, rabbits, and
pigs.
Bob and two of his fellow employees have been sore for days,
not surprising for such strenuous work. However, all of them
are now suffering from headaches, have fevers, and are
coughing a lot, sometimes coughing up blood with their sputum.
Additionally, Penny has has a fever of 101 Fahrenheit currently,
and was complaining of chills the night before. Her mom
noticed that Penny’s lymph glands around her arms appear
swollen and Penny says they hurt.
Based on the scenario provided, what additional questions do
you need to ask of Bob, Penny, and Anne? List all of them and
provide a rationale as to why you are asking these questions.
Is there anyone else you need to interview and if so, why? Is
19. this a public health emergency and if so, why?
What infectious agents appear to be the culprits here and why?
Provide a rationale for your differential diagnosis. Then, list the
steps you need to follow, in order, to treat everyone affected.
Specify which authorities must be contacted throughout the
process and indicate who is providing what
medications/vaccines/treatments. (20 points)
CASE #6
6. A 47 year-old man went to the emergency department after
ten days of pain and progressive numbness in the left hand and
arm and pain in is lower neck and upper back. He had sought
treatment from a chiropractor for the past week but only helped
his back pain, as his numbness and tingling had worsened and
he was experiencing weakness in his left hand and arm. A
neurologic examination revealed normal strength and sensation
of his lower extremities. His right arm showed normal strength,
but the left hand showed no grip, and the patient could only lift
his left arm a few inches. The patient was afebrile, and his
blood pressure was normal when he arrived at the emergency
department.
You ask about any contact with animals and pets, especially out
of the ordinary. He informs you that he had been awakened,
20. eight months earlier, by a bat on his left arm, but he did not
seek medical attention. Rather, he killed the bat with a tennis
racquet and disposed of it in his outdoor trash can. He is
married to his wife (Mary, age 42) and has two daughters (Jane
16, Mandy 11). His wife and kids report no symptoms but do
say they never contacted a pest control specialist to inspect
their home for any nests.
What additional questions do you ask the man? The family?
Tests that you could run? Based on what they may tell you,
what do you think may be the infectious disease and why? What
is the man’s prognosis? (20 points)
CASE #7
7. Pam (age 40) presents to the emergency department with
droopy eyelids, blurred vision, difficulty speaking, and
difficulty breathing. Her family (husband Jack (41), and son
Tyler (10) brought her to the emergency department. Neither
appears to be symptomatic.
Jack informs the healthcare providers that they are part of a
farm co-op and raise livestock (pigs, sheep, cows, goats), raise
bees for which they make honey and beeswax candles. They
make their own cheese and smoked meats, along with the honey,
candles, and even organic soap that they take to local markets to
sell. Pam does take medical marijuana for pain but Jack does
not think that has to do with her current situation.
Pam has had difficulty defecating. Jack suspects this is due to
her recent lack of appetite. She cannot seem to eat anything.
Prior to the lack of appetite, she had some nausea, vomiting,
and diarrhea. Now, she moves slowly, talks slowly, and breathes
slowly.
What questions would you ask Pam? Her family? What tests
21. could you run? Would you communicate anyone else regarding
the local markets (e.g. staff, customers, news stations)? What do
you think is the infectious disease and why? (15 points)
CASE #8
8. On December 1st, a 47-year-old African-American man, a US
Postal Service employee who worked in the District of
Columbia mail distribution center came to the emergency
department with mild nonproductive cough, nausea, vomiting,
and stomach cramps. A less-than-thorough examination was
provided and he was given some antibiotics and sent home.
Later in the day, he arrived back at the emergency department
complaining of vomiting and profuse sweating. His past medical
history included asthma and renal calculi. Therapy for asthma
had not recently included corticosteroids. He was afebrile and
had orthostatic hypotension.
He informed the physicians that on December 1st, one of the
envelopes had a white substance, resembling talcum powder,
leaking out it. He did not think anything of it and continued
working. He also said that some of his co-workers had been
feeling ill and they were going to other hospitals in the area for
treatment. What would you do at the post office? What samples
would you take from the post office? From the employee(s)?
What do you think is the infectious agent (and why) and what
would you do in terms of preventing additional cases and
potentially identifying new cases as soon as possible?
(20 points)
22. QUESTION #9
9. Let us finish off with some potpourri. List all of the Category
A agents. Why are they considered to be in this category? Of
these agents, which one is considered to be the most lethal and
why (provide evidence)? Why might some of the diseases here
be misdiagnosed at the initial healthcare encounter? Which
agent has three major types of entry/disease? Which agent is
often thought to be associated with honey and what are other
ways this agent could be acquired? (15 points)