Transcribed Image Text from this Question(2) Write a 1) Create a signal x(n)= 0.4 sin lott) 0 8 sin 300 tt) to calculate 16. DFT/FFT of 281) Send the result to Matlab then compared to the result of at lab_based simulation ? Comments program to calculate to the result of the results in case on DFT/FFT 1/ Create a signal (in Matlab) x(n) = 0.4sin(100nt) 0.8sin(300nt) 2/ Write a CCS (Code Composer Studio) program to calculate 16. DFT/FFT of x(n). Send the result to Matlab then compare to the result of Matlab-based simulation? Comment on the results in case. (Use TMS320C5515 eZdsp USB stick)
QUESTION 3 Is This Argument Valid Or Invalid “A Convertible Car Is Not Fun
Transcribed Image Text from this QuestionQUESTION 3 Is this argument valid or invalid “A convertible car is not fun to drive. Ali’s car is convertible. Therefore, Ali’s car is not fun to drive.” a. Valid b. Not valid QUESTION 4 Is this argument valid or invalid? If you are not in the tennis tournament, you will not meet Ed. If you aren’t in the tennis tournament or if you aren’t in the play, you won’t meet Kelly. You meet Kelly or you don’t meet Ed. It is false that you are in the tennis tournament and in the play. Therefore, you are in the tennis tournament a. Not valid b. Valid
Suppose You Are Given The Following Data (or Measurements), Which Consists Of (x, Y)
Transcribed Image Text from this QuestionSuppose you are given the following data (or measurements), which consists of (x, y) pairs: х 2 4 0 5 6 6 9 9 11 12 15 17 19 8 7 10 12 12 у 6 7 (a) You are asked to estimate the value of y at the point x = 13. Suggest two different methods and apply these methods to perform the estimation. (b) You are asked to estimate the value of y at the point x = 21. Suggest a method and apply this method to perform the estimation
The Input Must Be Read From A .txt File And The Written String In
Transcribed Image Text from this QuestionWrite a C program which performs the following tasks, selectable by the user: 1. Encryption of a message using the classical rail-fence cipher algorithm 2. Encryption of a message using the 2-level rail-fence cipher 3. Decryption of a message using the 2-level rail-fence cipher All tasks you attempt needed to be coded in a single .c file and some kind of user interface designed which can select between them. Your code must include the following functions: void railFence (char *message, char *cipherText, int length, int A); void railFence2 (char *message, char *cipherText, int length, int A, int B, int dir); The function railFence2() accepts an argument dir which controls whether the function performs encryption or decryption. When dir=0 the function should encrypt (ie: read from message  and write to cipherText and when dir-1 it should decrypt (ie: read from cipherText and write to message ). The function should perform any required padding to message  by either declaring a new variable of an appropriately larger size and copying the message over or only creating padding characters when required. Just make sure you don’t try to access message  at an index outside its boundary. The functions above are allowed to call other functions you write. If you do not attempt a feature (eg: decryption of the 2-level rail-fence algorithm) the function prototypes must still be defined as they are above (eg: you must not remove the dir variable).
For This Assignment You Will Write A Program That Reads In Data (imagine It
Computer Science Assignment Writing ServiceFor this assignment you will write a program that reads in data (imagine it is coming from sensors) and stores that data in a special kind of linked list. After reading and storing all of the data your program will generate a report from the data. The “background.txt” file gives a short story that provides some context for where this data is coming from and how it’s being used. Reading the story is just for fun and is optional. The two primary objectives of this assignment are to learn how to implement a specialized linked list and to gain familiarity with using a linked list in solving problems. Using the STL linked list, or any other premade linked list, would not fulfill the purpose of the assignment therefore those are disallowed. Linked lists are extremely common in all software. In some cases the “standard” linked list will suffice but often it is necessary to create a more specialized linked list for solving a specific problem. For this assignment you’ll be creating a “triply-threaded linked list”. More details are provided in a section below. Your program will be evaluated based on both how it runs as well as how it was designed and coded. Pay attention to the “rubric.txt” file to see how it will be evaluated. Along with these instructions, I have provided data files and the EXACT expected output that corresponds to those data files. It is important that your program output matches EXACTLY. This includes spelling, whitespace, and punctuation. The rest of this document provides more details about the assignment. If you have any questions, be sure to post in the discussion group or send me email. Do not wait until the last minute to start this assignment. ================================================================================ ======================================================================== Details The following sections provides details about the requirements for the assignment. ——————————————————————– Sensor Data Each unit of sensor data contains three data items: sector number, exposure value, speed value. The sector number represents the geographic sector that the reading was taken from. The exposure value represents the percentage of exposure to sunlight that the sensor read at the time of the reading. The speed value represents the wind speed (in kh/hr) that the sensor read at that location. Each sector has only one sensor but that sensor takes several readings. Some of the sensors are bad and intermittently produce incorrect data. When this happens, either the exposure or the speed value will be -1. In this case, none of the data from that sensor can be trusted and it must all be discarded. Note that this isn’t just the one bad reading that should be discarded, but ALL data from that sensor. This logic is already captured in process.cpp. As long as you implement addData() and removeSector() correctly, then you don’t have to do anything extra to get rid of bad data. —————————————————- Triply-threaded Linked List As you have learned, a linked list is a list of linked nodes. In its simplest form, this is implemented by a node that holds data and a pointer to the next node in the chain. This pointer is often referred to as the “next pointer”. Sometimes the order of the nodes in the linked list doesn’t matter but other times the order matters and items are inserted into the list in the correct position. That is, while inserting into a linked list, you traverse down the list to find the right place to insert an item and then insert it there. A simple linked list is sometimes sufficient for an application but more often than not a more sophisticated link structure is needed. For this program you will be creating a “triply-threaded linked list”. This is just a linked list that contains three next pointers in each node. One next pointer for the next sequential sector number, one next pointer for the next sequential exposure value, and one for the next sequential speed value. Except for very rare situations, the three next pointers will point to different nodes. Each chain of next pointers of the same type represents a “thread” through all of the nodes ordered according to that type (smallest to largest). You will also need three head pointers in your class since each chain will likely start with a different node. Remember, the first node in a chain represents the smallest value for that type. It is unlikely the the same node contains the lowest sector number, the lowest exposure value, and the lowest windpseed. When you add or remove an item from the linked list, you will need to add or remove it from each thread. IMPORTANT: this is probably the most important detail about a “triply-threaded linked list. For each data item there only ONE node. A “triply-threaded linked list” is not the same thing a three linked lists. With three linked lists you would have a 3n nodes (for n data readings) but for a “triply-threaded linked list” you will have n nodes (for n data readings). ——————————————————- Report Output and Format The report that your program outputs contains the following five sections. Each section is described in more detail below. The example output files that are included with the assignment show the exact format for each. – Data values – Averages per sector – Histogram data for exposure – Histogram data for speed – Bad sectors The “Data values” section lists all of the read in values three times. The first time it displays all of the values in order according to the sector number (smallest to largest). The second time it displays all of the values in order according to the exposure value (smallest to largest). The third time it displays all of the values in order according to the speed value (smallest to largest). Each list is proceeded with a section header that explains what the list is. For example “Data by sector”. Each line that shows the data in a sector shows the sector number, the exposure, and the speed. The format is: Sector: # % exposure, kh/hr windspeed For example: Sector: #1 81% exposure, 17 km/hr windspeed The “Averages per sector” section lists each of the sectors that has data and shows the average exposure and speed for that particular sector. This uses the same line format as the “Data values” section. For example, the following line shows that across all readings, the average exposure in sector #1 was 81% and the average windspeed was 17 km/hr. Sector: #1 81% exposure, 17 km/hr windspeed The two histogram sections are the same format. The first shows the data for exposure and the second for speed. Histogram data is the number of times that a particular value occurs in the dataset. Each line in the histogram data section is a simple value, count pair. The following example is for a value of 81 that occurs once: 81, 1 The “Bad sectors” section lists all of the bad sectors. The list of bad sectors is a comma separated list of sectors with no line breaks. For example: 17, 51, 119, 170, 187, 204, 221, 255, 272, 289, 306, 340, 374, 391, 408, 442, 493 Each section heading consists of a line of 70 dashes, the title of the sections, and then another line of 70 dashes. For example: — … … — Data values — … … — All of the reporting is done on the cleaned version of the data. That is, it doesn’t include any data from bad sectors. ================================================================================ ========================================================================= Design The design of your program is just as important as the functionality of the program. The following sections define the design guidelines and some of the implementation requirements (in additional to what was described above). ————————————————————– Design Guidelines- The most important design decision is to use a separate class for the datalogger, linkedlist, and surveydata classes. – datalogger — This class represents the “business logic” of adding data to the storage. This is the only class that process.cpp knows about and it expects these methods: – addData() — add a data item to the logger – removeSector() — remove all survey data for the given sector – containsSector() — determine if the given sector data is already in the logger – printReport() — print a report – printSectorList() — print a list of all of the sectors in the logger – linkedlist — This class should implement a linked list. This class should be distinct from the datalogger class. – surveydata — This class encapsulates the survey data (sector, exposure, speed). – The datalogger will need to have a linkedlist class member but there should be no “linked list” knowledge in the datalogger. For example, the datalogger must not have access to “nodes” in the linked list or use the “next” pointers. All interaction with the linkedlist list object should be via the linkedlist APIs (that you define) but should hide the mechanics of how a linked list works from the datalogger. You are welcome to create any additional classes that you need. ———————————————————————————————————————– process.cpp ——————————————————————————————- #include #include #include “datalogger.h” using namespace std; void createReport(datalogger
3. (Strings) Write A C Program That Reads The First Name, Last Name, And
Transcribed Image Text from this Question3. (Strings) Write a C program that reads the first name, last name, and grade for a student and displays the results in a table as shown below (the column width is 12 and the text is left-aligned). The first row is the heading. The program asks the user to enter values for the second row. Use getline to read the space in a string correctly. The program tests the validity of the grade (between 0 and 100). You need to include library. Here is a sample run: First Name Last Name Grade Mary Ann LU 85.5 To manipulate text, you may use the following statement (you need to include library): cout << left « setw(12) << "First Name" ; 1. (Math Functions) Write A C Program That Inputs A Number As X, Calculates Transcribed Image Text from this Question1. (Math Functions) Write a C program that inputs a number as x, calculates the following expression k using C mathematical functions, and displays the results with 6 digits after the decimal point. You need to include library. k=e* ve** e-vitesse Here is a sample run: Enter x: 2.0 k = 4.440860 Determine the limitations on input value to ensure valid output values. Your program should test for the validity of the input. To display 6 digits after the decimal point, you may use the following statement (you need to include library). cout << fixed << setprecision (6) << k; What Is The Maximum Length That The Metal Piece Can Have? A) Write Down Transcribed Image Text from this QuestionWhat is the maximum length that the metal piece can have? a) Write down the function that needs to be optimized. b) Optimize the function you have written in (a) using one of the numerical methods you have learned. Explain your solution in detail including initialization and stopping criterion. You may use a table to show your parameters at each iteration. Note 1: If you wish, you may use Matlab/Octave if it is necessary for your method of choice. If you do so, you must also submit your code. Note 2: If you wish, you can also solve the problem analytically and compare with your numerical solution. 2m 3m corridor Q.1) The Control Of An Automatically Moving Vehicle Was Carried Out With 8051. The Q.1) The control of an automatically moving vehicle was carried out with 8051. The vehicle operates as a 10-stop line as a ring. Each time the vehicle arrives at a stop, ‘1’ comes from a sensor to the P1.2 input and ‘0’ comes out of the stop. How long it will stay at each stop is placed in External RAM in seconds from 0000H. Starting and stopping the vehicle is done from pin P1.7. In addition, people getting into the vehicle are detected with a sensor. The sensor produces a pulse for each person. A maximum of 20 people can ride from each stop. If the number of passengers exceeds 20, the vehicle will continue on its way without waiting. Every time you leave the station, the station number and the number of people boarding the vehicle will be sent from the serial port. There is also an emergency button on the vehicle. While the button is in motion, the vehicle will stop as soon as it is pressed. Write the required assembly language program. (Baud rate: 9600, crystal frequency 12MHz). (In assembly programming language)
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more