[SOLVED] Strategies for Landmark Selection

1. In this example you will implement the algorithm for approximating distances in networks. First, you will select ?? landmarks ?? = {??1, ??2, … ????} and then compute distances from each of these landmarks to all other nodes in the network. Using the upper bound on the distance you will approximate the distances for all pairs of nodes ?? and ?? by:?????,?? = ??????????? {???,???? + ???,???? }.To practically evaluate different strategies for selecting landmarks you will work with the network from the Les Misarables book. On the course web site you can find the network and a simple python code (https://courses.isds.tugraz.at/dhelic/websci/websci1.zip) showing you how to work with the network analysis library networxs (https://networkx.github.io/). This network has ?? = 77 nodes (76 nodes are in the giant component and you should work only with the giant component) and for each experiment you will select ?? = 10 landmarks. Implement these three strategies for landmark selection:(a) uniform random selection of landmarks, (b) random selection of landmarks proportional to the nodes degree, (c) random selection of landmarks inversely proportional to the nodes degree.To evaluate the strategies compute distances exactly for all pairs of nodes. Than compute absolute error for each pair of nodes ?? and ??:????,?? = |????,?? ? ?????,??|. Plot the histogram of absolute errors for all three strategies, together with the mean absolute error and the sample standard deviation of the error. Label the axes of your plots and provide a descriptive title for the plots. Include the mean and the standard deviation in the title of the plot. For all computations, plots, etc. you can either implement the code yourself or find an appropriate networxs function. For plotting use matplotlib and seaborn, which provides ready to use functions for various kinds of plots. In your report submit only the plots with a short discussion of what you see in the plots and which strategy worked best in your opinion. If your results are inconclusive you can repeat the selection of landmarks many times (e.g., 1000 times) and look at the averages over the landmark selections. In case of repetitions optimize your code by e.g., computing distances in a preprocessing step. You do not need to submit the code. For creating the report you can use the provided tex file to compile to PDF or create a PDF with any other tool that you like.

Read more

[SOLVED] Rewriting a Program

#include #include #include using namespace std; #include “afxwin.h” #include #include “Net.h” //void printdata(CStringList& lastnamelist, double number[6][6]); //void printtotals(double totalarrays[]); void printheading(); void printreport(Net* person[]); void printhighest(Net* person[]); void getsearch(Net* person[]); void getsort(Net* person[]); void processgroup(Net* person[]); void compute(Net* person[]); #pragma unmanaged int main() { system(“cls”); system(“Color 70”); CString Connection; CDatabase database; CString username; CString password; username = “DESKTOP-LG37VVR\SQLEXPRESS\jcswa”; Connection = _T(“Driver={SQL Server Native Client 11.0};Server=DESKTOP-LG37VVR\SQLEXPRESS;Database=MonthEndBalanceSQL;Trusted_Connection=Yes;Uid=”) + username + _T(“;Pwd=”) + password + _T(“;”); database.OpenEx(Connection, CDatabase::useCursorLib); const int size = 10; Net* person[size]; int i = 0; CString query = “SELECT LastName, PreviousBalance, Payments, Charges FROM MonthendTable”; CRecordset recordset(&database); CString temp, record; recordset.Open(CRecordset::forwardOnly, query, CRecordset::readOnly); CString lastname; CStringList lastnamelist; CString spreviousBalance, spayments, scharges, snewbalance, sfinancecharge, smonthendbalance; double previousBalance, payments, charges, newbalance, financecharge, monthendbalance; //double number[6][6]; int col = 0, row = 0; while (!recordset.IsEOF()) { record = _T(“”); register int len = recordset.GetODBCFieldCount(); recordset.GetFieldValue(“LastName”, lastname); recordset.GetFieldValue(“PreviousBalance”, spreviousBalance); recordset.GetFieldValue(“Payments”, spayments); recordset.GetFieldValue(“Charges”, scharges); //lastnamelist.AddHead(lastname); col = 0; previousBalance = atof(spreviousBalance); payments = atof(spayments); charges = atof(scharges); person[i++] = new Net(lastname, previousBalance, payments, charges); row = row + 1; recordset.MoveNext(); } processgroup(person); compute(person); printheading(); printreport(person); printhighest(person); getsort(person); getsearch(person); cout << endl << endl; cout << "Program end" << endl; cin.get(); while (cin.get() != 'n'); return 0; } void processgroup(Net* person[]) { int num = Net::getcount(); Net* temp = person[0]; for (int x = 0; x < num; x++) { temp->copydatatogroup(person[x]); } } void printheading() { cout << endl << endl; cout << setw(12) << "Last Name" << setw(18) << "Previous Balance" << setw(18) << "Payments" << setw(18) << "Charges" << setw(18) << "New Balance" << setw(18) << "Finance Charge" << setw(18) << "Month End Balance" << endl; cout << endl; } void compute(Net* person[]) { int col = 0; int num = Net::getcount(); Net* object = person[0]; for (int row = 0; row < num; row++) { object->compute(person[row], row, col); } person[0]->addcolumns(); } void printreport(Net* person[]) { Net* object = person[0]; person[0]->printdata(); } void printhighest(Net* person[]) { int num; num = Net::getcount(); Net* top = person[0]; for (int st = 1; st < num; st++) { if (*top > person[st]) top = top; else top = person[st]; } cout << "nPerson with the highest month end balance: " << endl; cout << top; } void getsearch(Net* person[]) { int num, index = 0; char name[20]; CString namsearch; cout << "nEnter the name to search "; cin >> name; namsearch = (CString)name; bool found = false; num = Net::getcount(); int x = 0; while ((found != true) && (x < num)) { if (*person[x] == namsearch) { cout << person[x]; found = true; } x++; } if (found == false) cout << "Object not found " << endl; } void getsort(Net* person[]) { Net* object = person[0]; object->sortdata(); }

Read more

[SOLVED] Cloud Adoption Policy

The following is project 1: Final Cloud Adoption Policy AddendumI have completed this assignment already. However, my professor wants me to review it and correct it or I will fail the class. It needs to be done no later than 11 May 2021. I’m attaching a Zip with the instruction, resources, and completed project that needs to be corrected.The following is my professor’s Feedback. PLEASE follow and correct what he asks:You have a well-written and well-organized paper, but it only covers about 60% of what is required. It appears that you followed the template almost exactly, which is a sure path to failing the project because it leaves out many of the competencies. I gave you credit for the competencies addressed, however, the remaining competencies listed below were not addressed at all or very little.I did not find any information related to the liability issues associated with cloud adoption. This is required competency as listed in 8.1. You will have to add in that content and re-submit.I did not find any information related to a plan for cloud implementation/migration. This is required competency as listed in 9.1. You will have to add in this content and re-submit.I did not find any information related to a documentation strategy to support cloud operation. This is required competency as listed in 9.3. You will have to add in this content and re-submit.I did not find any information related to a Disaster Recovery plan. This is required competency as listed in 11.7. You will have to add in this content and re-submit.You need to read (or re-read) my announcements on the requirements for this project and also my announcement on “The Quickest way to Fail”

Read more

[SOLVED] Comparing Software Development

Comparing Software Development WorkloadsEstimating the cost of developing software in terms of work load is difficult since it is a challenge to quantify the size and complexity of a software system. The article Analysis of Size Metrics and Effort Performance Criterion in Software Cost Estimation provides an overview of different metrics used to assess size and complexity (Malathi & Sridhar, 2012). The metrics include counts of lines of code, function point counts, and operation counts. Function point counts are often utilized because they can be estimated based on project design specifications.The dataset pointworkload.cvs contains data collected from 104 programming projects at AT&T between 1986 and 1991 (Matson & Huguenard, 2005). This dataset include number of work hours for each project, the function point count for each project, and identifiers for operating system, data management system, and programming language utilized. In this application, you will investigate whether operating system, data management system and programming language impact the number of work hours per function point for a project.Open the dataset pointworkload.csv in Excel. Create a new column that calculates the number of work hours per function point for each project. Save the file with this new data column.

Read more

[SOLVED] Interactive Computer Graphics

Run all the HTML programs in Canvas folder – Week 5 – Chapter 4Look at the image from different “views”Write your observation for- translation- rotation- Model view- Camera view

Read more

[SOLVED] Wall Street Journal

Wall Street Journal (WSJ) Posting: The purpose of this assignment is to stay current with business and world events. MBA students need to be aware of the events affecting the business world nationally and internationally.Please read a current WSJ article (must not be older than 3 months) and provide the following:1. Post the name of your WSJ Article in the Subject Line. Once an article has been chosen, another must be selected. I do NOT allow posting of the same article. The WSJ is available at The University Library.2. Provide a summary of the article and list three questions for the discussion of the article by Wednesday. Please select articles concerning business topics.3. Provide your reference for the WSJ article using APA format.4. Provide the link to access the article. Due to plagiarism and copyright laws, please do NOT post the article, only post the link to access the article.5. Reply to two other student posts by Sunday.

Read more

[SOLVED] Applied Computer Science

Besides computers constructed from electronic components what are the three other technologies that have been considered as future ways to fabricate computers

Read more

[SOLVED] Cyber Defense Solution

WEEKLY DISCUSSIONThinking back over all of the research that you have read during this course, identify one emerging or leading technology that you believe has the most potential as a cybersecurity or cyber defense solution.Write a one page (300 word) recommendation for this technology. Include in your recommendation three or more cybersecurity or cyber defense related benefits that you believe will be realized by companies who adopt this technology.Your audience for this recommendation is the CEO of a large company that is interested in finding and funding further research into promising cybersecurity related technologies.Post your recommendation paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.You must start a thread before you can read and reply to other threads.Three references required

Read more

[SOLVED] Cybersecurity Related Technologies

Thinking back over all of the research that you have read during this course, identify one emerging or leading technology that you believe has the most potential as a cybersecurity or cyber defense solution.Write a one page (300 word) recommendation for this technology. Include in your recommendation three or more cybersecurity or cyber defense related benefits that you believe will be realized by companies who adopt this technology.Your audience for this recommendation is the CEO of a large company that is interested in finding and funding further research into promising cybersecurity related technologies.Post your recommendation paper as a reply to this topic. Remember to cite your sources and include a reference list at the end of your posting.You must start a thread before you can read and reply to other threads.Three references required

Read more

[SOLVED] Digital Forensics Data Acquisitions

Discussion 2.1Name and describe the three formats for digital forensics data acquisitions.Discussion 2.2You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?Discussion 3.1What are the functions of data run’s field components in an MFT record?Discussion 3.2What’s the advantage of a write-blocking device that connects to a computer through a FireWire or USB controller?

Read more
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

We now help with PROCTORED EXAM. Chat with a support agent for more details