programming and engineering
banner
programmingeng.bsky.social
programming and engineering
@programmingeng.bsky.social
Find the Programming help you need - [email protected]
CSC 340.03+.04+.05 ASSIGNMENT 02 SOLUTION

Method vs. Methodology: Method is the tool. Methodology is the justification/the rationale for using a particular method. A learning outcome of CSC 340 Programming Methodology is we can recognize a problem, diagnose a problem, define a problem, and…
CSC 340.03+.04+.05 ASSIGNMENT 02 SOLUTION
Method vs. Methodology: Method is the tool. Methodology is the justification/the rationale for using a particular method. A learning outcome of CSC 340 Programming Methodology is we can recognize a problem, diagnose a problem, define a problem, and formulate a problem. While solving a problem, we frequently take a step back and evaluate available methods. Assignment 02 is to provide us with another opportunity to practice these skills.
programming.engineering
October 17, 2025 at 10:26 AM
Pacman Capture the Flag Solution

The final project involves a multi-player capture-the-flag variant of Pacman, where agents control both Pacman and ghosts in coordinated team-based strategies. Your team will try to eat the food on the far side of the map, while defending the food on your home…
Pacman Capture the Flag Solution
The final project involves a multi-player capture-the-flag variant of Pacman, where agents control both Pacman and ghosts in coordinated team-based strategies. Your team will try to eat the food on the far side of the map, while defending the food on your home side. On 5PM Wednesday February 28 , we will run an initial test tournament with everyone's dummy submissions (more details below).
programming.engineering
October 14, 2025 at 2:05 PM
Homework 4 TCP/IP Vulnerability Analysis Solution

Overview The learning objective of this homework is for students to gain the first-hand experience on the vulnera-bilities of TCP/IP protocols, as well as on attacks against these vulnerabilities. The vulnerabilities in the TCP/IP protocols…
Homework 4 TCP/IP Vulnerability Analysis Solution
Overview The learning objective of this homework is for students to gain the first-hand experience on the vulnera-bilities of TCP/IP protocols, as well as on attacks against these vulnerabilities. The vulnerabilities in the TCP/IP protocols represent a special genre of vulnerabilities in protocol designs and implementations; they provide an invaluable lesson as to why security should be designed in from the beginning, rather than being added as an afterthought.
programming.engineering
October 14, 2025 at 1:31 PM
Final Project Solution

GaTech Buzzy Bowl The company you work for has been selected to develop a half-time show using UAVs. You need to develop a 3D simulation using MPI and OpenGL to demo the show to the game organizers for their approval. Below is a description of the show that you will be…
Final Project Solution
GaTech Buzzy Bowl The company you work for has been selected to develop a half-time show using UAVs. You need to develop a 3D simulation using MPI and OpenGL to demo the show to the game organizers for their approval. Below is a description of the show that you will be creating with a 3D simulation. The show is made up of 15 UAVs that are placed on the football field at the 0, 25, 50, 25, 0 yard-lines as shown below by the red dots.
programming.engineering
October 14, 2025 at 1:18 PM
Problem Set 2 Solution

This assignment introduces you to some theoretical results that address which neural networks can represent what. It walks you through proving some simplified versions of more general results. In particular, this assignment focuses on piecewise linear neural networks, which…
Problem Set 2 Solution
This assignment introduces you to some theoretical results that address which neural networks can represent what. It walks you through proving some simplified versions of more general results. In particular, this assignment focuses on piecewise linear neural networks, which are the most common type at the moment. The general strategy will be to construct a neural network that has the desired properties by choosing appropriate sets of weights.
programming.engineering
October 1, 2025 at 7:41 PM
Data Structures Assignment 1 Solution

Purpose: To refresh your Java programming skills, to emphasize the object-oriented programming approach used in Java, and to practice working with Java arrays. Specifically, you will work with control structures, class-building, interfaces and generics to…
Data Structures Assignment 1 Solution
Purpose: To refresh your Java programming skills, to emphasize the object-oriented programming approach used in Java, and to practice working with Java arrays. Specifically, you will work with control structures, class-building, interfaces and generics to create and utilize a simple array-based data structure. Goal 1: To design and implement a simple class ArrayDS<T> that will act as a simple data structure for accessing Java Objects.
programming.engineering
October 1, 2025 at 11:35 AM
Algorithm Implementation Assignment#1 Solution

OVERVIEW Purpose: To implement backtracking algorithms and search trees. Task 1: The first task of the assignment is to create a backtracking algorithm that finds one legal filling of the squares of a given crossword puzzle and the score of a filling…
Algorithm Implementation Assignment#1 Solution
OVERVIEW Purpose: To implement backtracking algorithms and search trees. Task 1: The first task of the assignment is to create a backtracking algorithm that finds one legal filling of the squares of a given crossword puzzle and the score of a filling (if a legal filling exists), as specified in detail below. Task 2: The second task is to implement a De La Briandais (DLB) trie and use it to improve the search efficiency in Task 1 and hence to be able to produce a legal filling with the highest score of a given crossword puzzle.
programming.engineering
October 1, 2025 at 11:29 AM
Operating System Pthreads Programming Assignment: Producer-Consumer Problem

Goal Understand how to work in the Linux environment. Understand how multi-thread programming can be done with the pthread library. Description The producer-consumer problem is a classic programming exercise in computer…
Operating System Pthreads Programming Assignment: Producer-Consumer Problem
Goal Understand how to work in the Linux environment. Understand how multi-thread programming can be done with the pthread library. Description The producer-consumer problem is a classic programming exercise in computer science. In this project, you will be given some Items, each Item contains an opcode, a key and a value. The producer and consumer are responsible to perform a transform function on the Item’s value respectively.
programming.engineering
September 29, 2025 at 5:51 PM
Programming Logic and Design, 8th Edition Chapter 4 Solution

Programming Logic and Design, 8th Edition Chapter 4 Review Questions 1.       A _____ expression has one of two values: true or false. a.        Georgian b.       Boolean c.        Barbarian d.       Selective 2.        In a selection,…
Programming Logic and Design, 8th Edition Chapter 4 Solution
Programming Logic and Design, 8th Edition Chapter 4 Review Questions 1.       A _____ expression has one of two values: true or false. a.        Georgian b.       Boolean c.        Barbarian d.       Selective 2.        In a selection, the else clause executes _____. a.       when the tested condition is true b.    when the tested condition is false c.     always d.       only after the if clause executes…
programming.engineering
September 23, 2025 at 11:25 AM
CMPS111 Lab 3 Solution

In this lab you will implement user processes and system calls. As supplied, Pintos is incapable of running user processes and only implements two systems calls. Pintos does, however, have the ability to load ELF binary executable, and has a fully functioning page-based,…
CMPS111 Lab 3 Solution
In this lab you will implement user processes and system calls. As supplied, Pintos is incapable of running user processes and only implements two systems calls. Pintos does, however, have the ability to load ELF binary executable, and has a fully functioning page-based, non-virtual memory management system. There are three parts to this lab; each depends on the previous one.
programming.engineering
September 23, 2025 at 9:10 AM
Laboratory Exercise 4 Solution Using Logic Instructions with the ARM Processor

Logic instructions are needed in many embedded applications. Logic instructions are useful for manipulation of bit strings and for dealing with data at the bit level where only a few bits may be of special interest.…
Laboratory Exercise 4 Solution Using Logic Instructions with the ARM Processor
Logic instructions are needed in many embedded applications. Logic instructions are useful for manipulation of bit strings and for dealing with data at the bit level where only a few bits may be of special interest. They are essential in dealing with input/output tasks. In this exercise we will consider some typical uses. We will use the ARM* processor in the DE1-SoC Computer.
programming.engineering
September 22, 2025 at 7:30 PM
Project 1 – LC-3300 Datapath

Requirements Download the proper version of CircuitSim. The proper version is version 1.9.1 or later. A copy of CircuitSim is available under Files on Canvas. You may also download it from the CircuitSim website ( In order to run CircuitSim, Java must be installed. If…
Project 1 – LC-3300 Datapath
Requirements Download the proper version of CircuitSim. The proper version is version 1.9.1 or later. A copy of CircuitSim is available under Files on Canvas. You may also download it from the CircuitSim website ( In order to run CircuitSim, Java must be installed. If you are a Mac user, you may need to right-click on the JAR file and select “Open” in the menu to bypass Gatekeeper restrictions.
programming.engineering
September 22, 2025 at 4:51 PM
CS 352 (4 Problems and 25 Points Each) Homework 2 Solution

Problem 1: Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are the values in the various…
CS 352 (4 Problems and 25 Points Each) Homework 2 Solution
Problem 1: Consider sending a 2400-byte datagram into a link that has an MTU of 700 bytes. Suppose the original datagram is stamped with the identification number 422. How many fragments are generated? What are the values in the various fields in the IP datagram(s) generated related to fragmentation? Problem 2: (a) Consider a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet…
programming.engineering
September 22, 2025 at 10:00 AM
CS253 Assignment 1: Library Management System in C++

Implement Library Management System in C++ language using Object-oriented programming con-cepts. Implement the system on command line interface. • List of functionalities: 1. Implement Login Logout 2. Professor, Student and Librarian are child…
CS253 Assignment 1: Library Management System in C++
Implement Library Management System in C++ language using Object-oriented programming con-cepts. Implement the system on command line interface. • List of functionalities: 1. Implement Login Logout 2. Professor, Student and Librarian are child classes of User class. – Professor Can see all the books. Can see list of books s/he has. Can check if book is available for issue or not.
programming.engineering
September 22, 2025 at 9:50 AM
Physically-Based Simulation Solution

Overview: Last assignment, we simulated fuzzy phenomena using dense systems of loosely interacting particles that followed some procedural set of rules for how they evolved over time. The goal of this assignment is to simulate various systems that follow…
Physically-Based Simulation Solution
Overview: Last assignment, we simulated fuzzy phenomena using dense systems of loosely interacting particles that followed some procedural set of rules for how they evolved over time. The goal of this assignment is to simulate various systems that follow well-defined physical laws. In the process, you should gain familiarity with different techniques commonly used to animate complex physical phenomena, such as differential equations, numerical integration, and spatial data-structures.
programming.engineering
September 21, 2025 at 5:42 PM
DCP1323 Homework 4 Solution

Part 1: Written Problems 1. If we take the linear congruential algorithm with an additive component of 0, Xn+1 = (aXn) mod m Then it can be shown that if m is prime and if a given value of a produces the maximum period of m-1, then ak will also produce the maximum…
DCP1323 Homework 4 Solution
Part 1: Written Problems 1. If we take the linear congruential algorithm with an additive component of 0, Xn+1 = (aXn) mod m Then it can be shown that if m is prime and if a given value of a produces the maximum period of m-1, then ak will also produce the maximum period, provided that k is less than m and that k and m-1 are relatively prime.
programming.engineering
September 21, 2025 at 9:38 AM
Homework 1: Backpropagation Deep Learning Solution

1 Theory (50pt) To answer questions in this part, you need some basic knowledge of linear algebra and matrix calculus. Also, you need to follow the instructions: Every vector is treated as column vector. You need to use the numerator-layout…
Homework 1: Backpropagation Deep Learning Solution
1 Theory (50pt) To answer questions in this part, you need some basic knowledge of linear algebra and matrix calculus. Also, you need to follow the instructions: Every vector is treated as column vector. You need to use the numerator-layout notation for matrix calculus. Please refer to Wikipedia about the notation. You are only allowed to use vector and matrix. You cannot use tensor in any of your answer.
programming.engineering
September 18, 2025 at 11:28 PM
Pizza Order Solution

Up to this point, all the programs you have written had a sequence structure. This means that all statements are executed in sequence, one after another. Sometimes we need to let the computer make decisions, based on the data. A decision structure allows the computer to decide…
Pizza Order Solution
Up to this point, all the programs you have written had a sequence structure. This means that all statements are executed in sequence, one after another. Sometimes we need to let the computer make decisions, based on the data. A decision structure allows the computer to decide which statement to execute. In order to have the computer make a decision, it needs to do a comparison.
programming.engineering
September 18, 2025 at 11:21 PM
PA-3: Distributed Distance Vector Routing Solution

In this assignment, you will implement distributed distance vector routing (DVR) algorithm. The idea is that you are provided with a sample network (nodes, their connectivity and link weights), and your job is to find the shortest paths from each…
PA-3: Distributed Distance Vector Routing Solution
In this assignment, you will implement distributed distance vector routing (DVR) algorithm. The idea is that you are provided with a sample network (nodes, their connectivity and link weights), and your job is to find the shortest paths from each node to all other nodes using DVR algorithm that we studied in class. Your implementation of DVR should have three important features:
programming.engineering
September 18, 2025 at 11:15 PM
PA-2: Reliable Data Transfer (RDT) Solution

In this assignment, you will be writing the sending and receiving transport-layer code for implementing a simple reliable data transfer protocol. There are two parts in this assignment, the Alternating-Bit-Protocol version and the Go-Back-N version. As…
PA-2: Reliable Data Transfer (RDT) Solution
In this assignment, you will be writing the sending and receiving transport-layer code for implementing a simple reliable data transfer protocol. There are two parts in this assignment, the Alternating-Bit-Protocol version and the Go-Back-N version. As you know GBN forms the basis of TCP, you are actually creating a simulation of TCP in this programming assignment. You have been provided with the programming interface with different routines/functions.
programming.engineering
September 18, 2025 at 11:11 PM
DISPLAYING AND DESCRIBING DISTRIBUTIONS

In this lab assignment, you will use Excel to display and describe observations on a single variable from several groups. In particular, you will use histograms and boxplots to display the data. Also, you will calculate summary statistics for the data like…
DISPLAYING AND DESCRIBING DISTRIBUTIONS
In this lab assignment, you will use Excel to display and describe observations on a single variable from several groups. In particular, you will use histograms and boxplots to display the data. Also, you will calculate summary statistics for the data like the mean, standard deviation, median, and interquartile range. Before you start working on the assignment questions, you should get familiar with the instructions provided in…
programming.engineering
September 18, 2025 at 11:05 PM
Lab 4 Patent Join in PySpark Solution

In this lab, you're going to use PySpark's RDD and DataFrame interfaces to solve the patent join problem. The Patent join problem explained The goal of the patent join problem is to find *self-state patent citations*. You're given two datasets,…
Lab 4 Patent Join in PySpark Solution
In this lab, you're going to use PySpark's RDD and DataFrame interfaces to solve the patent join problem. The Patent join problem explained The goal of the patent join problem is to find *self-state patent citations*. You're given two datasets, `cite75_99.txt.gz` and `apat63_99.txt.gz`. You can download these gzip'd datasets at these links: * * PySpark can automatically uncompress gzip'd files.
programming.engineering
September 16, 2025 at 9:15 PM
Computer Vision PS5 Solution

Download and extract the data from the link data.zip. Place the data folder inside the project folder. Create a conda environment for this assignment as in previous assignments. Follow the instructions below to set up the environment. If you run into import module…
Computer Vision PS5 Solution
Download and extract the data from the link data.zip. Place the data folder inside the project folder. Create a conda environment for this assignment as in previous assignments. Follow the instructions below to set up the environment. If you run into import module errors, try pip install -e . again, and if that still doesn’t work, you may have to create a fresh environment.
programming.engineering
September 16, 2025 at 6:30 PM
Chapter 2 – 13

Chapter 2 How to use MySQL Workbench and other development tools Before you start the exercises… Before you start these exercises, you need to install the MySQL server and MySQL Workbench. The procedures for doing that are provided in appendix A (PC) and B (Mac). In addition, you’ll…
Chapter 2 – 13
Chapter 2 How to use MySQL Workbench and other development tools Before you start the exercises… Before you start these exercises, you need to install the MySQL server and MySQL Workbench. The procedures for doing that are provided in appendix A (PC) and B (Mac). In addition, you’ll need to get the mgs_ex_starts directory from your instructor. This directory contains some script files that you need to do the exercises.
programming.engineering
September 11, 2025 at 10:40 AM
Chapter 14B & Chapter 15 Solution

How to use transactions and locking Exercises 1. Write a script that creates and calls a stored procedure named test. This procedure should include two SQL statements coded as a transaction to delete the row with a customer ID of 8 from the Customers table. To do…
Chapter 14B & Chapter 15 Solution
How to use transactions and locking Exercises 1. Write a script that creates and calls a stored procedure named test. This procedure should include two SQL statements coded as a transaction to delete the row with a customer ID of 8 from the Customers table. To do this, you must first delete all addresses for that order from the Addresses table.
programming.engineering
September 10, 2025 at 6:34 PM