1.Question 1
Research on the various design patterns described in Smith (2015) and Gamma et al (1999). Describe how software development productivity can be accomplished by the application of various Creational Design Patterns.
2.Question 2
Refer to the Software Solution Scenario described in Appendix A and also OO Software Design Patterns described in Gamma et al (1995) / Smith (2015 to answer the questions below:
You have been tasked to carry out the development of an online shopping system for iChipKart store. You are currently working on two use cases of the system: Checkout and Compute Price. An extract of the current analysis and design of these use cases are given in Appendix A.
Consider the two software design problems described below.
Design Problem 1 (Compute Price):
During the transition from Analysis to Design phase, you are designing the price computation for ease of incorporating different shipping and handling fees for different locations inthe pricing policies. In your design, you also want to ensure that various policies in pricing computation are encapsulated appropriately for ease of maintenance.
Suggested candidate design patterns (Proxy, Strategy, Template Method)
Design Problem 2 (Checkout):
During the transition from Analysis to Design phase, you are designing the functionality of free gifts for ease of offering and withdrawing the various gifts dynamically and for ease of modifying the price ranges of free gifts.
Suggested candidate design patterns (Chain of Responsibility, Composite, Iterator)
For each of these design problems, answer the following:
a. Choose one of the suggested candidate design patterns that you think best solves the problem. Justify the applicability of your choice. You need to research on various patterns and come up with your choices and justifications.
b. Applying scientific principles identify the participants for incorporating the chosen design pattern and modify the class diagram of the use case to show their relationships.
c. Critically analyze the patterns and list two benefits of incorporating the design pattern, with respect to the problem.
d. Concerns such as design of security properties and domain specific security is addressed while transiting from requirements engineering to design. Choose any two security design patterns of your choice and research their merits and demerits.Appraise you selected security patterns against the following pattern characteristics:
i. Level of Abstraction: Ease with which he pattern can be used in different contexts without redefinition.
ii. Completeness: The security speciation that is correct and complete.
iii. Reusability: The pattern should be easily applied and used in different contexts.
iv. Pattern Composability: The pattern should be easily used with other patterns.
v. Security Composability: The pattern can be used with other patterns without losing any of the security it provides, nor affecting the security provided by the other patterns.
vi. Valid-ability: The patterns’ security properties, as well as their implementation and usage, can be easily validated. This validation would preferably be automated.
3.What to submit:
Questions 1 and 2 and a written essay format. You may use the essay template given on Moodle.
4.Research References:
1) Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design Patterns : Elements of Reusable Object-Oriented Software,Addison Wesley, 1995.
2) Smith, Ben.Object-Oriented Programming. Advanced ActionScript 3. Apress, pp63-69, 2015 .
5.APPENDIX A
Analysis and Design for Object Oriented Software
Online Shopping System for iChipKart
5.1Use Case Model Global View (Partial)
5.2Checkout Use Case
5.2.1 Brief Description
After a buyeradds items to the shopping cart, he/she will check out the purchased items. Items can be Books, Media (CD, hard disks, memory card etc.), TV, computing items and accessories like tablets, thumb drives etc. In order to make their business competitive,iChipKarthas decided to give its buyers one of the following memorabilia items as a free gift during the period 1 October to 15 January. The following describes the policy for these gifts:
(1) If the buyer purchases goods worth =$25 and iChipKart T-Shirt.
(2) If the buyer purchases goods worth =$50 and iChipKart backpack.
(3) If the buyer purchases goods worth =$100, he/she will receive aiChipKart portable hard disk of 1Tb.
Note thatiChipKartmemorabilia items are not for sale.
5.2.2 Flow of Events
This use case is invoked when the buyer chooses the Checkout option from the Purchase Screen.
i. The system invokes the Compute Price use case to compute the subtotal of items price of all purchased items (excluding the shipping, handling and other charges).
ii. The system determines the free gift that the buyer is eligible for this transaction, and adds (if eligible) the memorabilia to the shopping cart (this item is priced at $0.00).
iii. The system invokes Compute Price use case to compute the total price of this transaction, including the shipping, handling and other charges.
iv. The system presents the total price and prompts the buyer for payment details in Payment Screen.
v. Upon verification of the payment details, the system invokes the Print Receipt use case to print the receipt for this transaction.
vi. The system displays completion message.
vii. The buyer acknowledges the completion message and the system returns to the Purchase Screen.
viii. The use case terminates.
5.2.3 Class Diagram
5.2.4 Sequence Diagram(Self research question, 10% bonus)
5.3Compute Price Use Case
Brief Description
This is an abstract use case which will be included in use cases such as Checkout. In this use case, thesubtotal of items andtotal price of the items in the shopping cart will be computed and other charges such as shipping and handling charges will be included as appropriate. The total price will constitute the following:
i.Base price of the items.
ii.Shipping charges.
iii.Handling charges (eg: fragile items will need to be specially packed, surcharge for oversized items, duties for dutiable items depending on country-specific policies, etc).
5.4Flow of Events
This abstract use case is invoked when other use cases want to compute the subtotal of items price of items in the shopping cart, or compute the total price of the items in the shopping cart including the shipping, handling and other charges.
i. The system traverses through the shopping cart items, determines the product price and computes the subtotal of items price of all the items.
ii.If shipping, handling and other charges are not required, the system returns the subtotal of itemsprice to the calling use case. Otherwise the system continues.
iii.Based on the shipping destination, the system computes the shipping charges and adds it to the total price.
iv.Based on the fragility of the items, the system computes the handling charges and adds it to the total price.
v.The system returns the total price to the calling use case.
vi.The use case terminates.
5.5Class Diagram 5.6Sequence Diagram (Compute Price – subtotal of items)
5.7Sequence Diagram (Compute Price – total price)
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Question 1 Research On The Various Design Patterns Described In Smith 2015 And Gam 2819156
/in Uncategorized /by developer1.Question 1
Research on the various design patterns described in Smith (2015) and Gamma et al (1999). Describe how software development productivity can be accomplished by the application of various Creational Design Patterns.
2.Question 2
Refer to the Software Solution Scenario described in Appendix A and also OO Software Design Patterns described in Gamma et al (1995) / Smith (2015 to answer the questions below:
You have been tasked to carry out the development of an online shopping system for iChipKart store. You are currently working on two use cases of the system: Checkout and Compute Price. An extract of the current analysis and design of these use cases are given in Appendix A.
Consider the two software design problems described below.
Design Problem 1 (Compute Price):
During the transition from Analysis to Design phase, you are designing the price computation for ease of incorporating different shipping and handling fees for different locations inthe pricing policies. In your design, you also want to ensure that various policies in pricing computation are encapsulated appropriately for ease of maintenance.
Suggested candidate design patterns (Proxy, Strategy, Template Method)
Design Problem 2 (Checkout):
During the transition from Analysis to Design phase, you are designing the functionality of free gifts for ease of offering and withdrawing the various gifts dynamically and for ease of modifying the price ranges of free gifts.
Suggested candidate design patterns (Chain of Responsibility, Composite, Iterator)
For each of these design problems, answer the following:
a. Choose one of the suggested candidate design patterns that you think best solves the problem. Justify the applicability of your choice. You need to research on various patterns and come up with your choices and justifications.
b. Applying scientific principles identify the participants for incorporating the chosen design pattern and modify the class diagram of the use case to show their relationships.
c. Critically analyze the patterns and list two benefits of incorporating the design pattern, with respect to the problem.
d. Concerns such as design of security properties and domain specific security is addressed while transiting from requirements engineering to design. Choose any two security design patterns of your choice and research their merits and demerits.Appraise you selected security patterns against the following pattern characteristics:
i. Level of Abstraction: Ease with which he pattern can be used in different contexts without redefinition.
ii. Completeness: The security speciation that is correct and complete.
iii. Reusability: The pattern should be easily applied and used in different contexts.
iv. Pattern Composability: The pattern should be easily used with other patterns.
v. Security Composability: The pattern can be used with other patterns without losing any of the security it provides, nor affecting the security provided by the other patterns.
vi. Valid-ability: The patterns’ security properties, as well as their implementation and usage, can be easily validated. This validation would preferably be automated.
3.What to submit:
Questions 1 and 2 and a written essay format. You may use the essay template given on Moodle.
4.Research References:
1) Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, Design Patterns : Elements of Reusable Object-Oriented Software,Addison Wesley, 1995.
2) Smith, Ben.Object-Oriented Programming. Advanced ActionScript 3. Apress, pp63-69, 2015 .
5.APPENDIX A
Analysis and Design for Object Oriented Software
Online Shopping System for iChipKart
5.1Use Case Model Global View (Partial)
5.2Checkout Use Case
5.2.1 Brief Description
After a buyeradds items to the shopping cart, he/she will check out the purchased items. Items can be Books, Media (CD, hard disks, memory card etc.), TV, computing items and accessories like tablets, thumb drives etc. In order to make their business competitive,iChipKarthas decided to give its buyers one of the following memorabilia items as a free gift during the period 1 October to 15 January. The following describes the policy for these gifts:
(1) If the buyer purchases goods worth =$25 and iChipKart T-Shirt.
(2) If the buyer purchases goods worth =$50 and iChipKart backpack.
(3) If the buyer purchases goods worth =$100, he/she will receive aiChipKart portable hard disk of 1Tb.
Note thatiChipKartmemorabilia items are not for sale.
5.2.2 Flow of Events
This use case is invoked when the buyer chooses the Checkout option from the Purchase Screen.
i. The system invokes the Compute Price use case to compute the subtotal of items price of all purchased items (excluding the shipping, handling and other charges).
ii. The system determines the free gift that the buyer is eligible for this transaction, and adds (if eligible) the memorabilia to the shopping cart (this item is priced at $0.00).
iii. The system invokes Compute Price use case to compute the total price of this transaction, including the shipping, handling and other charges.
iv. The system presents the total price and prompts the buyer for payment details in Payment Screen.
v. Upon verification of the payment details, the system invokes the Print Receipt use case to print the receipt for this transaction.
vi. The system displays completion message.
vii. The buyer acknowledges the completion message and the system returns to the Purchase Screen.
viii. The use case terminates.
5.2.3 Class Diagram
5.2.4 Sequence Diagram(Self research question, 10% bonus)
5.3Compute Price Use Case
Brief Description
This is an abstract use case which will be included in use cases such as Checkout. In this use case, thesubtotal of items andtotal price of the items in the shopping cart will be computed and other charges such as shipping and handling charges will be included as appropriate. The total price will constitute the following:
i.Base price of the items.
ii.Shipping charges.
iii.Handling charges (eg: fragile items will need to be specially packed, surcharge for oversized items, duties for dutiable items depending on country-specific policies, etc).
5.4Flow of Events
This abstract use case is invoked when other use cases want to compute the subtotal of items price of items in the shopping cart, or compute the total price of the items in the shopping cart including the shipping, handling and other charges.
i. The system traverses through the shopping cart items, determines the product price and computes the subtotal of items price of all the items.
ii.If shipping, handling and other charges are not required, the system returns the subtotal of itemsprice to the calling use case. Otherwise the system continues.
iii.Based on the shipping destination, the system computes the shipping charges and adds it to the total price.
iv.Based on the fragility of the items, the system computes the handling charges and adds it to the total price.
v.The system returns the total price to the calling use case.
vi.The use case terminates.
5.5Class Diagram 5.6Sequence Diagram (Compute Price – subtotal of items)
5.7Sequence Diagram (Compute Price – total price)
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Read The Elder Research And Unilever Case Studies And Note The Types Of Informatio 2031987
/in Uncategorized /by developer1. Read the Elder Research and Unilever case studies and note the types of information they were able to extract from the text data. (We don’t quite have that amount of information available, or quite that level of software, so your conclusions won’t be quite as detailed.)
a. Elder Research Inc. (2013). Improving customer retention and profitability for a regional provider of wireless services. Retrieved from http://datamininglab.com/images/case-studies/ERI_nTelos_Customer_Retention_Case_Study.pdf
b. Jiffy Lube Uses OdinText Software to Increase Revenue. http://odintext.com/wp-content/uploads/2015/10/odinText-Shell.pdf . There’s also an interesting interview video here: https://www.youtube.com/embed/2Zxmjir8Zwo?autoplay=1
c. These case studies are for inspiration only; there is nothing to turn in from them.
2. Choose a readily available text item which recurred over at least three time periods, spaced some distance apart. You want to make sure you have at least several hundred words of text (approximately one – two pages) for each time period, and you want something which will change noticeably over that time period. Some options could include:
a. The CEO’s letter to shareholders (I do Amazon.com below as an example – you may choose any other company) in three different years.
b. The State of the Union Address (or other political speeches) from three different Presidents, such as those from Woodrow Wilson, Lyndon B. Johnson, and Barack Obama
c. A writeup of something technical (like descriptions of Motor Trend’s Car of the Year and Finalists) from 1950, 1980, and 2010.
d. Some industry writeup (such as PC Magazine’s best new computers for 1979, 1989, and 1999).
3. Match your timeline to the subject. For political speeches, you will get the best results if they are at least 50 years apart. For faster-changing items (such as the cellular phone user’s manual), you can probably get away with things 10 years apart. You will have a much easier time making good graphs if you give yourself good raw data to work with.
4. Select your desired number of time periods. You must have at least three, and can use as many as you like. (i.e. 2000, 2005, and 2010 would be three time periods.)
5. Take your text items for each year and convert them into a text input file.
6. Run a Python program to determine the top X word count for each year. You will need to determine how many words you are going to use in your analysis; you should probably have somewhere between 5 and 30.
a. You will need to make decisions about stop words.
b. Make sure the bulk of your text processing is done in Python, not using the “search/replace” functions in Excel or Word. Part of this class’ skillset is exposure to Python, and this is how you should do it here.
7. Merge your Python word count data into an input file for Tableau. You may find it helpful to use Excel or some other tool for this.
8. Analyze your data. Emphasis here will be placed on visual analysis and text analysis.
9. As part of your analysis, take the top 3 interesting relevant words from your latest time period. (You can use some judgment here; for Amazon, “kindle” would be more interesting than “book” even if “book” had more occurrences.) Trace the trajectory of each of these 3 words over time – for example, at Amazon, the word “kindle” gains tremendously in popularity over time.
10. Create a managerial report outlining your findings.
A successful report will
· Contain a title page and a list of references and pass a plagiarism check in Turnitin
· Begin with a results-filled Executive Summary (half a page to one page)
· Be otherwise 5-10 pages in length (I will stop reading after page 10). So if you have 1 title page, 1 list of references, and 1 page of Executive Summary, you could turn in up to 13 pages of stuff.
· Contain reasonable typeface and margins (12-point Times New Roman with 1-inch margins work just fine).
· Show mastery of the readings in the class to date
· Showcase your data visualization skills in Tableau, with up to 5 graphs (I will not look at a sixth or further graph)
· Contain a list of your top 3 words, with your reasons for choosing them, and trace their trajectory over time
· Analyze anything else you find interesting
· Integrate your charts with your conclusions
· Give a busy executive a clear path to follow in terms of action items and a “to do” list
Please submit:
· All Python code you used (it’s OK if you simply used or modified the code I have here; just ensure the comments reflect your name and what you did.)
· All .txt text input files you used (I imagine you might have one input file for each year)
· All Excel (or other format) input files you used for Tableau, so I can see how your data shaped up
· Your managerial report (ensure the bibliographic reference include the source data; my report should include a reference to the Amazon.com shareholder letter). Name this file “XXXX-text-analysis” where XXXX is your name.
Good luck!
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Related To Checkpoint 4 2 On Page 86 Capital Structure Analysis The Liabilities An 1205474
/in Uncategorized /by developer1. (Related to Checkpoint 4.2 on page 86) (Capital structureanalysis) The liabilities and ownersAc€?c equity for CampbellIndustries is found below:
Accounts payable $ 453,000
Notes payable 248,000
Current liabilities $ 701,000
Long-term debt $1,213,000
Common equity $5,477,000
Total liabilities and equity $7,391,000
What percentage of the firmAc€?cs assets does the firm finance usingdebt (liabilities)? (round to one decimal place)
If Campbell was to purchase a new warehouse for $1.5 million andfinance it entirely with long term debt, what would be the firmAc€?csnew debt ratio?
The fraction of the firmAc€?cs assets that the firm finances usingdebt is ___% (Round to one decimal place).
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Register Organization How Many Registers How Long Is A Register What Special Purpo 2478133
/in Uncategorized /by developer1. Register organization -How many registers? How long is a register? What special purpose registers are available and what is the purpose of each register?
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Repeat The Previous Exercise In Ada 2 Given Two Processes P And Q And A Semaphore 2110649
/in Uncategorized /by developer1. Repeat the previous exercise in Ada.
2. Given two processes p and q, and a semaphore S initialized to 1, suppose p and q make the
following calls:
Describe what will happen for all possible orders of these operations on S.
Q
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Repeat Exercise 1 Where You Discretize M With A 2 Rewrite The Equations In Section 2664280
/in Uncategorized /by developer1. Repeat exercise 1, where you discretize m with a

2. Rewrite the equations in Section 10.6, so that the bet size is determined by a power function rather than a sigmoid function.
3. Modify Snippet 10.4 so that it implements the equations you derived in exercise 6.
exercise 6
Rewrite the equations in Section 10.6, so that the bet size is determined by a power function rather than a sigmoid function.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Retaining Wall Design 25 Marks Design Calculations For Stability Of An Embedded Sh 2839289
/in Uncategorized /by developer1. Retaining Wall Design (25 marks)Design calculations for stability of an embedded sheet pile retaining wall as part of temporary worksto enable the construction of the pile cap for the pile group that will support the Chainage 55 pier.Design the wall to accommodate the external lateral earth (from access causeway fill), river water,groundwater and surcharge pressures (assume 20 kPa surcharge due to piling rig on top of accesscauseway fill), and assume that the retaining wall is internally propped at 0.5 m below river poollevel. Consider a 2.0 m external height of river water and causeway fill to be retained above the riverbed level. Within the cofferdam, assume dewatering is undertaken down to the the river bed level.Neatly sketch the wall in elevation, or, alternatively, you may use CAD. The bridge pile cap (assume1.5 m thick, with base at river bed level) and layered soil profile are to be shown on an elevationsketch. The required embedment depth of the retaining wall below the river bed level is to bedetermined, but structural design of the retaining wall section is not required. Your final retainingwall embedment depth is to be rounded to the nearest 0.5 m.The retaining wall section is to be designed independently of Section 2.
Just need the Retaining Wall Design, do not worry about other part, the design brief is below and the materials you may need is in the zip file. Document Preview:
THE UNIVERSITY OF ADELAIDE SCHOOL OF CIVIL, ENVIRONMENTAL AND MINING ENGINEERING GEOTECHNICAL ENGINEERING DESIGN III M.L. Duthy and B.T. Scott PHASE 3 DESIGN PROJECT, 2018 RETAINING WALL DESIGN; SEEPAGE ANALYSIS; FOOTING DESIGN PHASE 3 REQUIREMENTS The third phase of the geotechnical engineering design project involves the following four tasks: ? Design of a temporary retention system for a cofferdam to permit pile cap construction at the internal bridge pier at Chainage 55 m located within the River Torrens; ? Seepage analysis of the temporary retention system forming the cofferdam and assessment of temporary groundwater control measures; and ? Design of deep footings to support the bridge at the south abutment (Chainage 0 m). ? Design of deep footings to support the internal bridge pier at Chainage 55 m (over water). GEOTECHNICAL MODELS The following geotechnical model is to be used for analysis and design at the south abutment: Depth Below c E ? c’ E’ ?’ ? k u?u u u?’ bulkGround Layer Description 3(kPa) (deg) (MPa) (-) (kPa) (deg) (MPa) (-) (kN/m ) (m/s) Surface (m) FILL 0-2 10 0 5 0.5 1 25 3 0.3 17 1E-7 Sandy Gravelly Clay TORRENS 2-7 ALLUVIUM 0 33 25 0.3 0 33 20 0.3 17 1E-5 Silty Sand and Sand TORRENS 7-11 ALLUVIUM 0 36 80 0.3 0 36 60 0.3 19 1E-3 Sandy Gravel TORRENS 11-12.5 ALLUVIUM 25 0 8 0.5 2 27 5 0.3 18 1E-9 Sandy Clay TORRENS 12.5-15 ALLUVIUM 0 38 100 0.3 0 38 80 0.3 20 1E-3 Sandy Gravel BLANCHE POINT FORMATION +15-20 Gravelly Clay/Silt 0 36 80 0.3 0 36 60 0.3 19 1E-7 and High Strength Siltstone Groundwater stands at a depth of 4.0 m below ground surface.The following geotechnical model is to be used for analysis and design at the internal bridge pier at Chainage 55 m: Depth Below cu ? Eu ?u c’ ?’ E’ ?’ ?bulk k uGround Layer Description 3(kPa) (MPa) (-) (kPa) (MPa) (-) (kN/m ) (m/s) (deg) (deg) Surface (m) TORRENS ALLUVIUM 0-3 5 0 1 0.5 0.5 25 0.5 0.3 16 1E-7 Silty Clay…
Attachments:
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Return To Example 2 1 Let Q 7 Units Plot All Combinations Of The Two Factors That 1792357
/in Uncategorized /by developer1.Return to Example 2.1. Let q = 7 units. Plot all combinations of the two factors that will support production of the 7 units. Limit the first factor to 1 = z1 = 40. Repeat this for q = 9 units. What explains the shape of your curves?
2. construction of cost function
Return to the setting of Example 2.6, where technology is specified by q = vz1z2. Now, however, assume the factor prices are P1 = 2 and P2 = 32.
(a) Initially assume no upper bound on either factor. What is the firm’s cost curve, and what is the corresponding marginal cost curve?
(b) Suppose the market price is 16 per unit. Can you determine the firm’s optimal quantity? What is the source of the difficulty?
(c) Now assume for the rest of the problem that the first factor cannot exceed an upper bound of 25, i.e., 0 = z1 = 25. Determine the firm’s cost curve.
(d) Suppose output sells for a price of 64 per unit. Determine the firm’s optimal plan (output and associated factors). Do this two ways, by focusing directly on profit as in Example 2.2, and then by focusing on revenue less cost as in Example 2.7
(e) Consider specific output levels of q ? {5, 15, 30}. For each of these output levels solve numerically for the firm’s cost (Excel is recommended), and verify your answer with the above determined cost curve. What shadow prices emerge from your solution? How do you interpret them?
(f) Suppose the first factor is fixed at _z1 = 12. Determine the associated short run cost curve. What is the fixed cost?
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Rewrite The Following Infix Expression In Prefix And Postfix Form And Draw The Syn 2110497
/in Uncategorized /by developer1. Rewrite the following infix expression in prefix and postfix form and draw the syntax tree
2. Write a BNF description of (a) postfix arithmetic expressions and (b) prefix arithmetic expressions.
Q
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"
1 Rewrite Exercise 1 Using An Arraylist Write A Program To Test Your Implementation 2041548
/in Uncategorized /by developer1. Rewrite Exercise 1 using an ArrayList. Write a program to test your implementation and compare its performance to that of the array implementation in Exercise 1 using the Timing class.
2. Design and implement a class that uses an array to mimic the behavior of the ArrayList class. Include as many methods from the ArrayList class as possible. Write a program to test your implementation.
"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"