Other Engineering Answers

Questions: 881

Answers by our Experts: 418

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Choose any 5 design patterns(grasp,gof patterns in ooad), for each pattern do the following
1)describe it
2) provide a case study example
3) for the same example write class diagram
4) write it's implementation code(either is C++ or JAVA or C#)
There are N nodes in a graph. The graph is unidirectional with M edges. Of these N nodes in the graph, there are K nodes which are important nodes. Given initial position I, within this graph, the task is to find out, if all K nodes are reachable without travelling a distance greater than V from I.

Input Format:

Input consists of:
First line starts with N, M, I, K and V
Next M lines follow; each contains (Source, Destination, and Distance).
Next line contains K spaced important nodes

Output Format:

Print "Yes" if all K nodes are reachable without travelling a distance greater than V else print "No"

Constraints:
1<=N<=350

1<=M<=N*(N-1)

1<=K<=N

1<=I<=N

0<=V<=500

1<=Source<=N

1<=Destination<=N

1<=Distance<=200


Sample Input and Output

SNo. Input Output
1
3 3 1 2 10
1 2 5
2 3 5
1 3 12
2 3


Yes
We have suddenly invented a new kind of music: “18-tone music”, that requires
a keyboard with 180 keys. How would we have to change the MIDI standard to
be able to play this music?
Design a real time system to update a real time database. The data needs to be consistent and atomic transactions need to be performed serially.
a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
A system contains the following periodic tasks: T1 = (5, 1), T2 = (7, 1, 9), T3 = (10, 3), and
T4 = (35, 7).
a. If the first frame size constraint is ignored, what are the possible frame sizes?
b. Use the largest frame size you have found in part (a),
1. Show how you would encode the following token stream using zero length
suppression and run length encoding:
ABC000AAB00000000DEFAB00000
Design a real time system for raising an emergency alert in a building.
The hazards could be fire, accidents in foundry, current shock, etc. . (model, algorithm and Cheddar implementation)
1. Design a real time system for a bank which also acts as a security system for intruder detection and alert. Identify what would be the prerequisites for the same. Explain the algorithm and scenario for the same. (model, algorithm and Cheddar implementation).Identify the basic tasks required.
Explain what type of system it is i.e. either HARD /SOFT OR FIRM and justify your answer.
Also mention what type of scheduling algorithm can be used and justify your answer.
Also say whether it is online or offline scheduler and justify your answer.
Suppose that a data warehouse consists of four dimensions customer, product, sales person and sales time, and the three measures Sales Amt (in rupees), VAT (in rupees) and Payment_type (in rupees). Draw the different classes of schemas that are popularly used for modeling data warehouses.
What is a priority inversion? How can exclusive access to resources causepriority inversion to occur?
Compare and contrast the Basic Priority-Inheritance Protocol and theBasic Priority-Ceiling Protocol in terms of their scheduling, allocation,and priority-inheritance rules. Explain using tasks.
LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS