Homework for my computer science lab

Online tutoring services

Need help with this question or any other Computer security and reliability assignment help task? Click on the button below to to hire an expert cheap.

1.Objective:The objective of this programming project is to examinereadinga file, parsingdata,performingcalculation on data, andsome basics on Date/Time.After completing the project, studentswill have an intermediateunderstanding ofreadingfileand performing calculation ondataand basics of Date/Timefunction in Java.2.Project Specification:2.1.Overall ProgramBehavior:The futuristic smart city will have intelligent transportation systems where every vehicle will be able to communicate with each other. Hence accident will be prevented, and human lives and property will be saved. Also, driving will be much easier, in many cases, no traffic signal will be required.This is the concept of vehicular ad hoc network (VANET).For this project, we are using a dataset from a VANETclustering algorithmfrom here: https://doi.org/10.1007/s12243-021-00881-9. However, weare using a small portion of over one hundredthousanddata. We provided Driver.java and vanetp1data.txt [donot edit these two files]. You are required to create and write necessary classes, methods, etc.to complete the project based on this project description and Driver.java we provided. 2.2 InputFile:In this project wewill perform some basic operations on Date/Time and Stringwhich will be extended in the later projects. Your program isrequired toread thecontent of thefile provided, vanetp1data.txt. You will require some modificationon data to get the VehicleID(s)(vehicleID is the third column asa five-letter codesuch as vehi01, veh02, etc.). There are more than 50 vehicles,but you should declare anarray with a small capacitylike 10 or 20;and expand the capacity of the array when it is full.Also, when you are extracting vehicle ID, you need to convertthe vehicleID into uppercase letter, i.e., veh01 to VEH01.Some data are kept distorted, but do not edit the file, ratheryou shouldedit your content after reading the file.2.3Input Formatin Driver.java:For the first part,that includes Date/Time,pleaselook at the Driver.java filewhere the tasks/outputs have been described.For the second part, we have added a text filewhich contains some data including the vehicleID(vehicleID)in the thirdcolumn.You need to calculate the Hamming distance between the vehicles. The definition of Hamming distance has been described in the next Section.The input format is givenbelowfor illustration purpose only, the actual code on Zylab willbetestedforvarious input setswhich aredifferent than the input given as example.CS2334: Programming Structures and AbstractionProject1String, Date/Timewith VANET OU:CS2334| Project 12Read this description along withDriver.java:If two vehicleIDsare entered, for example, HammingDist hammDist1= newHammingDist("VEH01", "VEH11");System.out.println(hammDist2);Then the output format is as follows:The Hamming distance between VEH00 and VEH01 is 1; between VEH00 and VEH11 is 2.For VEH01: Number of vehicles of Hamming Distance 1: 17.For VEH11: Number of vehicles of Hamming Distance 2: 80.Note: if two inputs are the same, then you shouldreverse the second input, for example, HammingDist hammDist1= newHammingDist("VEH20", "VEH20");Then, reverse the second input VEH20 as 02HEVandperform the calculationas shown above.2.4Description of output: HammingDist hammDist1= newHammingDist("VEH01", "VEH11");System.out.println(hammDist2);The Hamming distance between VEH00 and VEH01 is 1; between VEH00 and VEH11 is 2.For VEH01: Number of vehicles of Hamming Distance 1: 17.For VEH11: Number of vehicles of Hamming Distance 2: 80.First line is showing the Hamming DistancesbetweenVEH00 andthe first input (VEH01), and between VEH00andthe second input (VEH11).Here, the result is 1and 2respectively.The second line is for VEH01:We already got (The Hamming distance between VEH00 and VEH01 is 1) from previous line. Here, you need to calculatethe number of vehiclesin the datasetwhere the Hamming distance is 1from VEH01.In this case, it is 17.The third line is for VEH11: We already got the Hamming distance (between VEH00 and VEH11 is 2) from previous line. Here, you need to calculate the number of vehiclesin the datasetwhere the Hamming distance is 2 from VEH01. In this case, it is 80.A sample output file for the Driver.java is attached so that you can get clear ideaabout the ouput.Print the output in thisspecific format,since Zylab will gradeyouautomatically. OU:CS2334| Project 133.Hamming Distance:The Hamming distance between two strings of equal length is the number of elements(letter or digit)wheretwo strings differ. In other words, it measures the minimum number of substitutions required to change one string into the other, or the minimum number of errors that could have transformed one string into the other. In a more general context, the Hamming distance is the number of positionsthat differsbetween two sequences.The following examples will make the idea clear.Example:“COME”and “GONE” COMEHamming DistanceGONEDifference: 1SameDifference:1Same1+1 = 2Another example:“GONE” and “NONE”GONEHamming DistanceNONEDifference: 1SameSameSame1For more examples, visit: https://en.wikipedia.org/wiki/Hamming_distance4.File names:Filenamesfor thisprojectare as follows:We areproviding: Driver.java, vanetp1data.txt(Don’t modify these two files)You will write:Necessary files

Get Help With a similar task to - Homework for my computer science lab

Login to view and/or buy answers.. or post an answer

Related Questions

Similar orders to Homework for my computer science lab
45
Views
0
Answers
Finding arguements and the value of X
ITN 171 Unix course. It is an introductory course so nothing in depth. Just need 2 multiple choice questions answered and one small script written with a screen capture taken and sent in. Assignment is DUE 12/15/21 by 5pm est...
42
Views
0
Answers
Public key encryption and AES encryption
Consider the following hybrid encryption scheme. Instead of signing and encrypting a file directly using public-key encryption, I generate a random session password, and use that password to encrypt the file in question using a strong secret-key algorithm such as AES. I then sign/encrypt (just) the session password. Finally, I distribute the AES-encrypted file along with the signed/encrypted password. Would this method work for preserving the confidentiality and integrity of the file in question? What are the advantages and disadvantages of this method over using just public-key encryption throughout?...
127
Views
0
Answers
Intro to computer security - threat modeling assignment
The assignment has to do with Threat Modeling for my Intro to Computer Security Course. This assignment will consist of identifying 100 threats to potential security risks for a pretend company called “LB Pharma”. You will be provided with a spreadsheet called Pharma Data which is all that you will need to complete the assignment. Your Job will be to fill out the “Threat findings” spreadsheet with threats to the company's security. You may assume that the staff at the company has no idea what they are doing. You will also be provided a spreadsheet called "Threat Model Info" which will also have helpful tools that will make this assignment much easier, (especially the NIST Cybersecurity framework tab) The grade on this assignment will be determined by the quality of the threat findings you produce. You are being asked to identify 100 legitimate threat findings along with a proper proposed mitigation(s) for the threat. Your job is to identify threats and propose a mitigation to the threats identified for a pretend company. The pretend company will be called "Long Beach Pharma, Inc." and they are a pharmaceutical company. The pharmaceutical company has hired you to ...
109
Views
0
Answers
Two unikernel frameworks and to build simple applications
Two unikernel frameworks and to build simple applications. Implementation of unikenels such as Ocam,includeOS, MirageOS, etc. You can find more information about the unikernels here... http://unikernel.org/projects/ or https://github.com/cetic/unikernels...