A spanning tree for an undirected graph is a sub-graph which includes all vertices but has no cycles. There can be several spanning trees for a graph. A weighted undirected graph can have several spanning trees One of the spanning trees has smallest sum of all the weights associated with the edges. This tree is called minimum spanning tree (MST). Find the MST in the following graph using Kruskal Algorithm. V={a, b, c, d, e, f, g, h, i, j} and E={(a, b, 12), (a, b, 3), (a, j, 13), (b, c, 12), (b, d, 2), (b, h, 4), (b, i, 25), (c, d, 7), (c, j, 5), (e, f, 11), (e, j, 9), (f, g, 15), (f, h, 14), (g, h, 6), (h, d, 20), (h, i, 1) }. Note: Numeric value is the weight of the corresponding edge. -A spanning tree for an undirected graph is a sub-graph which includes all vertices but has no cycles. There can be several spanning trees for a graph. A weighted undirected graph can have several span
Multi-object tracking within optical video is a common problem in machine learning. Tracking is extremely difficult in general as the number, sizes, and dynamics of objects can be large. Further, objects can by occluded by other objects and scenery, causing variable time gaps between one detection and the next]
Video Frame
Figure 1: A tracking system that has three active tracks and has received four detections (black boxes) from the Detector. Note that the time intervals between detections assigned to tracks varies, as does the shape of their bounding boxes.
Tracking systems require several key components: • Detector— A model that signals when an object of interest is apparently present, and returns a bounding box in pixel coordinates. • Tracker— Software module that stores information regarding active tracks, and assigns object detections to tracks using a similarity score matrix produced by the Evaluator. Optimally, the Tracker assigns detec-tions to tracks in a manner that maximizes the sum of the similarity scores from each track/detection pair. • Evaluator— Given N active tracks and Al detections, produces a score matrix S E RAIxN such that element sij E S indicates the similarity of detection i to track j under some similarity measure. Note that this definition leaves the actual definition of “track” fairly abstract. In the simplest case, for example, the Evaluator may define su as the Euclidean distance between the center of the final detection within track j and the new detection i. More sophisticated models may uses multiple past detections within a track, or model the dynamics of an objects (e.g., with a Kalman filter). In this problem, assume that you’d like to produce a novel tracking system. The Detector and Evaluator have already been created, and you must now describe the 0-1 integer linear program that the Tracker will solve to assign detections to tracks. Integer linear programs are constraint problems where the variables are restricted to be integers, and are typically NP-hard. In particular, 0-1 integer linear programs restrict the variables further by requiring them to be Boolean (i.e., zero or one). Assume that you are provided with the score matrix S, detections can only be matched to a single track, and that tracks cannot be assigned more than once. (a) [5 points] What do the variables in this problem represent? How many are there? (b) [10 points] Define the objective for this 0-1 integer linear program. (c) [15 points] Define the entire 0-1 integer linear program, including constraints, in standard form. How many constraints are there in the program, total?
Java RMI (Remote Method Invocation, reference Chapter 5 of the textbook and Week-3 lecture)
enables the local invocation and remote invocation use the same syntax to implement a generic
remote server like the Compute Engine example in Week-3 lecture slides. The application
background of such a compute engine is to utilise the compute-power of a high-performance
computer or cluster. That is, a client prepares compute-tasks and submits them to the server for
execution. Java RMI framework needs two HTTP servers to transfer Java classes between an RMI
client and an RMI server at runtime. In addition, Java RMI applications need an RMI Registry to
register or look up the remote objects. In this assignment, you are to implement a remote
invocation framework that is similar to Java RMI but lightweight (note: for this assignment, you
don’t use any Java RMI APIs).
Java TCP streaming, object serialization, multithreading and client/server model are the
fundamental Java components to build distributed applications. These models and components
have been introduced through Week 1 to Week 5 lectures, tutorials and lab projects of this unit.
These models and components are enough to develop such a simplified framework of this
assignment. You will need review these models and components and practise relevant lab
projects of these weeks for this assignment.
Expert courier company (ECC) is a newly created courier service company whose aim is to serve
customers with the courier services that offer a faster and more secure alternative to the usual
mail service. To achieve their goal, ECC has considered developing an automated system using an
efficient and user-friendly interface with an online booking system that would enable their
customers to access the system from their computers as well as mobile devices and to book for
their courier services.
The system should allow the customers to log into their own account and book the services. They
need to be able to enter the pick-up and drop off office location of their choice. The system should
be able to allocate the job to the available delivery agent for fast processing and send the relevant
information to the customer along with the details of calculated cost as well as the approximate
delivery date and time.
Overall the system is required to have the following features for a variety of users.
• Customer Management operations (Creating, deleting, updating, searching customer)
• Shipment Management operations (Checking for available delivery agents, Tracking
detailed information of shipment deliveries)
• Payment processing functions (Processing customer payments, Issuing online receipts)
• Login Management functions (Creating or removing system users)
• Report Generation functionalities (Generating reports of shipments, delivery agents,
customers etc
write some pseudocode to decrypt a substitution cipher only knowing the encrypted text and not the key.
For example the text below
GFS WMY OG LGDVS MF SFNKYHOSU ESLLMRS, PC WS BFGW POL DMFRQMRS, PL OG CPFU M UPCCSKSFO HDMPFOSXO GC OIS LMES DMFRQMRS DGFR SFGQRI OG CPDD GFS LISSO GK LG, MFU OISF WS NGQFO OIS GNNQKKSFNSL GC SMNI DSOOSK. WS NMDD OIS EGLO CKSJQSFODY GNNQKKPFR DSOOSK OIS ‘CPKLO’, OIS FSXO EGLO GNNQKKPFR DSOOSK OIS ‘LSNGFU’ OIS CGDDGWPFR EGLO GNNQKKPFR DSOOSK OIS ‘OIPKU’, MFU LG GF, QFOPD WS MNNGQFO CGK MDD OIS UPCCSKSFO DSOOSKL PF OIS HDMPFOSXO LMEHDS. OISF WS DGGB MO OIS NPHISK OSXO WS WMFO OG LGDVS MFU WS MDLG NDMLLPCY POL LYEAGDL. WS CPFU OIS EGLO GNNQKKPFR LYEAGD MFU NIMFRS PO OG OIS CGKE GC OIS ‘CPKLO’ DSOOSK GC OIS HDMPFOSXO LMEHDS, OIS FSXO EGLO NGEEGF LYEAGD PL NIMFRSU OG OIS CGKE GC OIS ‘LSNGFU’ DSOOSK, MFU OIS CGDDGWPFR EGLO NGEEGF LYEAGD PL NIMFRSU OG OIS CGKE GC OIS ‘OIPKU’ DSOOSK, MFU LG GF, QFOPD WS MNNGQFO CGK MDD LYEAGDL GC OIS NKYHOGRKME WS WMFO OG LGDVS
Is decrypted using the website below without knowing the key.
https://www.boxentriq.com/code-breaking/cryptogram
All I would like is some pseudocode to show the process - i would like it to be generalised, so to decrypt any substitution cipher, not just for the example i have provided.
I do not need the answer to that example, just pseudocode to show the process.
Implement the expectiminimax algorithm and the *-alpha–beta algorithm, which is described by Ballard (1983), for pruning game trees with chance nodes. Try them on a game such as backgammon and measure the pruning effectiveness of *-alpha–beta.
KOI is looking to add IT equipment and facility reservation system to the Library Management System. The system will allow students and staff to be able to
reserve different IT equipment and facilities. Some of the facilities and equipment can only be reserved by staff. All the reservations will require approval by
the library admin. All equipment and facilities have a certain cost associated.
As a system analyst, you are required to analyse and design a reservation system to add to the library system that should be able to perform tasks such as
checking for availability of equipment and resources, calculating the due dates and other booking related transactions. Library admin should be able to add
and remove new equipment and facilities to the system and also be able to change the rates. They should also be able to modify any special conditions
associated with each of them.
You can research on internet to get more information about any similar existing system and consider any relevant features that might be useful for the
proposed system. Make sure you provide appropriate references for the information you provide from the external resources.