In this project, your task is to design a user-level file system with the FUSE file system library. In addition, we have provided a test case (test_case.c) to help you debug and guide you as you develop your code. We have also…
In this project, your task is to design a user-level file system with the FUSE file system library. In addition, we have provided a test case (test_case.c) to help you debug and guide you as you develop your code. We have also…
Assume you are building a new startup for cloud infrastructure, Nimbus Systems, a competitor of Amazon Cloud Services. As the CEO, you decide to move the page table and memory allocation to software. In part 1 of this…
Assume you are building a new startup for cloud infrastructure, Nimbus Systems, a competitor of Amazon Cloud Services. As the CEO, you decide to move the page table and memory allocation to software. In part 1 of this…
In this project, you will learn how to implement scheduling mechanisms and policies. In project 1, you used the Linux pThread library for multi-threaded programming. In project 2, you will get a chance to implement a…
In this project, you will learn how to implement scheduling mechanisms and policies. In project 1, you used the Linux pThread library for multi-threaded programming. In project 2, you will get a chance to implement a…
This simple warm-up project will help you recall basic systems programming concepts before tackling the second project. In the first part of this project, you will use the Linux pThread library to write a simple…
This simple warm-up project will help you recall basic systems programming concepts before tackling the second project. In the first part of this project, you will use the Linux pThread library to write a simple…
Introduction In project 3, you will implement a reliable sender using an unreliable UDP socket. There are two programs provided in the project 3 archive: sender.py and receiver.py. You will only…
Introduction In project 3, you will implement a reliable sender using an unreliable UDP socket. There are two programs provided in the project 3 archive: sender.py and receiver.py. You will only…
Introduction In project 2, you will design and implement RU-DNS, a simple protocol mimicking the Domain Name System (DNS) we discussed in class. Rather than relying on the Internet’s DNS, you will build a set of DNS resolvers with private…
Introduction In project 2, you will design and implement RU-DNS, a simple protocol mimicking the Domain Name System (DNS) we discussed in class. Rather than relying on the Internet’s DNS, you will build a set of DNS resolvers with private…
Introduction The goal of this project is to give you some hands-on practice with both Python and the basics of how two programs can talk to each other over a network. Don’t worry if this is your first time writing socket code,…
Introduction The goal of this project is to give you some hands-on practice with both Python and the basics of how two programs can talk to each other over a network. Don’t worry if this is your first time writing socket code,…
MIE1628 Assignment on Azure Cloud Platform PART A: 1. Explain below the 5 components shown in orange boxes. Explain which Azure components you will use where in this big data architecture and why. Raw Data Unstructured Data…
MIE1628 Assignment on Azure Cloud Platform PART A: 1. Explain below the 5 components shown in orange boxes. Explain which Azure components you will use where in this big data architecture and why. Raw Data Unstructured Data…
1. Note: This assignment needs to be done by using the Azure Cloud Platform. In this assignment, you will be working with Azure Data Factory, Azure SQL DB, Blob storage account and ADLS Gen2. Submit a compressed archive (zip, tar, etc.)…
1. Note: This assignment needs to be done by using the Azure Cloud Platform. In this assignment, you will be working with Azure Data Factory, Azure SQL DB, Blob storage account and ADLS Gen2. Submit a compressed archive (zip, tar, etc.)…
Part A: Input Data - kddcup.data_10_percent.gz 10% subset. (2.1M; 75M Uncompressed) from Please read the paper provided with your assignment in the Quercus and answer the following question. 1. What is an Intrusion Detection…
Part A: Input Data - kddcup.data_10_percent.gz 10% subset. (2.1M; 75M Uncompressed) from Please read the paper provided with your assignment in the Quercus and answer the following question. 1. What is an Intrusion Detection…
PART A: Advanced Data Analysis with PySpark or SQL Spark (35 points) 1. Count Odd and Even Numbers o Using the provided integer.txt file, develop a spark script to count the number of odd and even integers. 2. Salary Aggregation with…
PART A: Advanced Data Analysis with PySpark or SQL Spark (35 points) 1. Count Odd and Even Numbers o Using the provided integer.txt file, develop a spark script to count the number of odd and even integers. 2. Salary Aggregation with…
Part 1: Line Counting with MapReduce (20 marks) 1. (15 marks) Implement a MapReduce program to count the number of lines in a large text file (shakespeare.txt). Analyze the performance of your…
Part 1: Line Counting with MapReduce (20 marks) 1. (15 marks) Implement a MapReduce program to count the number of lines in a large text file (shakespeare.txt). Analyze the performance of your…
In this project, you will design a digital multiplier using Verilog, synthesize the design using standard cells from the TSMC 65nm technology, and place & route your synthesized netlist to obtain…
In this project, you will design a digital multiplier using Verilog, synthesize the design using standard cells from the TSMC 65nm technology, and place & route your synthesized netlist to obtain…
Consider a row decoder used to select one word within a 32-word register file, where each word is 64 bits wide. An example of such a decoder, for the case when it uses 4 stages of static CMOS logic…
Consider a row decoder used to select one word within a 32-word register file, where each word is 64 bits wide. An example of such a decoder, for the case when it uses 4 stages of static CMOS logic…
1 Device characterization 1. Use Cadence Composer to generate I-V curves for nMOS and pMOS transistors in the 65nmCMOS process (similar to those in Figures 8.16 and 8.17 in the textbook). Plot the eight curves on a single page for Wp =…
1 Device characterization 1. Use Cadence Composer to generate I-V curves for nMOS and pMOS transistors in the 65nmCMOS process (similar to those in Figures 8.16 and 8.17 in the textbook). Plot the eight curves on a single page for Wp =…
You are to write an implementation of the branch-and-bound partitioning algorithm described in class. It is to take netlist of (equal-sized) blocks and divide it into two…
You are to write an implementation of the branch-and-bound partitioning algorithm described in class. It is to take netlist of (equal-sized) blocks and divide it into two…
You are to write an implementation of a basic analytical placer (AP), with overlap removal (spreading). As described in class, you will formulate the placement problem mathematically as a…
You are to write an implementation of a basic analytical placer (AP), with overlap removal (spreading). As described in class, you will formulate the placement problem mathematically as a…
You are to write an implementation of the FPGA maze router described in class, and study the impact of logic block pin placement on routability. You must have your program display the routing…
You are to write an implementation of the FPGA maze router described in class, and study the impact of logic block pin placement on routability. You must have your program display the routing…
In this programming assignment, you will implement a simple web server to maintain your personal music library. Through this assignment, you will gain experience developing a more complex program that utilizes multiple CPU cores concurrently, implements persistent data…
In this programming assignment, you will implement a simple web server to maintain your personal music library. Through this assignment, you will gain experience developing a more complex program that utilizes multiple CPU cores concurrently, implements persistent data…
In this programming assignment, you are expected to implement a command-line utility that makes HTTP requests, similar in spirit to the curl UNIX utility. This assignment will help you gain more experiences on using external crates in the Rust ecosystem as dependencies,…
In this programming assignment, you are expected to implement a command-line utility that makes HTTP requests, similar in spirit to the curl UNIX utility. This assignment will help you gain more experiences on using external crates in the Rust ecosystem as dependencies,…
In this programming assignment, you are expected to implement a command-line utility that searches for a specific string in one or multiple files, similar in spirit to the UNIX grep command. This assignment will help you practice command-line argument parsing, working…
In this programming assignment, you are expected to implement a command-line utility that searches for a specific string in one or multiple files, similar in spirit to the UNIX grep command. This assignment will help you practice command-line argument parsing, working…
In this programming assignment, you are expected to implement a command-line utility for two human players to take turns and play a Reversi board game. The material you have learned in the first two lectures, including the guessing game example and basic…
In this programming assignment, you are expected to implement a command-line utility for two human players to take turns and play a Reversi board game. The material you have learned in the first two lectures, including the guessing game example and basic…
Question 1 (Classifying MNIST via Basic Shallow RNN) It is not only the XOR computation that could be much easier via RNN. In fact, using RNNs we can perform conventional classification also efficiently with simple NNs. In this…
Question 1 (Classifying MNIST via Basic Shallow RNN) It is not only the XOR computation that could be much easier via RNN. In fact, using RNNs we can perform conventional classification also efficiently with simple NNs. In this…
In this assignment, we are going to implement two target architectures: a plain convolutional neural network (CNN) and a CNN with skip connection. The architecture of each CNN is described below. Both of these NNs perform binary…
In this assignment, we are going to implement two target architectures: a plain convolutional neural network (CNN) and a CNN with skip connection. The architecture of each CNN is described below. Both of these NNs perform binary…
Question 1 (Implementing Deep FNN) In this assignment, we implement a deep FNN for a simple classification task. Read the following test to get familiar with required packages and modules. Required Packages We are going to use…
Question 1 (Implementing Deep FNN) In this assignment, we implement a deep FNN for a simple classification task. Read the following test to get familiar with required packages and modules. Required Packages We are going to use…