How to improve reliability in the virtual environment

How to improve reliability in the virtual environment
Paper 2: Proposal for Your final Researched Proposal (10%)
Write a memorandum addressed to ME (1) describing an actual problem in your office or community that you do not have the authority to correct;(How to improve reliability in the virtual environment) (2) identifying the specific decision maker (by name and position) who can act on a research report you propose to write (as Paper 6) (3) your proposed solution (4) including a list in APA format of at least three of your required six specific sources (not just a litany of generic excuses such as I plan to use articles from the newspaper and the web) and (5) pertinent information from your sources. Use the underlined words/phrases in the numbered list in this paragraph as your five headings in this memorandum to me.
Free Online OCR
Home
OCR API
Contact us
Comments
Free Online OCR Convert JPEG PNG GIF BMP TIFF PDF DjVu to Text
Select pages from 1 to 9
Recognition language(s) (you can select multiple)
Rotate image 0 CCW 90 180 CW 90 Page layout analysis split multi-column text into columns Page of 9
Download
Copy to Clipboard
Google Translate
Bing Translator
Paste Online
Edit Online
Coursework Title: Ca binet Lock Controller Coursework Title: Cabinet Lock Controller Module Name: Microprocessors and Software Module Code: 4002ELE Level: 4 Weighting: 15% Lecturer: J D Cullen Contact: If you have any issues with this coursework you may contact your lecturer. Issue Date: 2oth November 2014 Hand-in Date: 12th January 2015 (changed from 8th January 2015 due to Blackboard maintenance) Hand-in Method: Online (Blackboard) Programmes: BEng. (Hons) Electrical and Electronic Engineering
Download
Google Translate
Bing Translator
Edit Online
Coursework Title: Cabinet Lock Controller
Coursework Title:
Cabinet Lock Controller
Module Name:
Microprocessors and Software
Module Code:
4002ELE
Level:
4
Weighting:
15%
Lecturer:
J D Cullen
Contact:
If you have any issues with this coursework you may contact your lecturer.
Issue Date:
20th November 2014
Hand-in Date:
12th January 2015
(changed from 8th January 2015 due to Blackboard maintenance)
Hand-in Method:
Online (Blackboard)
Programmes:
BEng. (Hons) Electrical and Electronic Engineering
You should submit the following:
Task 1)
Please submit a short report indicating the functionality of your application. Include in this report your
program design.
You should also submit your assembly file (.ASM file) so I can verify its operation in picsim. The assembly
file should include comments and compile successfully using gpasm. If you do not submit this file you
will automatically be awarded 0% out of 50% for the program implementation.
Task 2)
You should submit a short report of 3 pages or less
The completed reports and flow charts should be saved as pdf files
These pdf files along with the commented source code file should be zipped and submitted via
blackboard
Coursework Specification
Scenario
AlockCo the leading cabinet lock maker has hired you as a new development engineer to provide
digital locks for the company to complement their current key locks. They have sourced a Pic
development board the McLab1 which is the same as Board 1 within the PICSIM simulator and wish
for you to develop a lock for the company using this board. You will use the PICSIM software to verify
your code.
The managing director coming from a mechanical engineering does not fully understand the
differences between differing standard realtime and distributed operating systems so has asked for a
report on what these are and how they could be used within the business for future lock
development.
Task 1) 80% split as 30% for program design 50% for program implementation
Create an assembly application for the pic microcontroller to operate a digital lock on a filing cabinet.
You should design your application using an appropriate method (flowchart/pseudo code) and then
implement this on PICSIM board 1. The specification of what is required is as follows:
?
?
?
?
?
?
You will use two buttons (RA1 and RA2) to cycle up and down the 16 codes available and use a
third button (RA3) to select that code. You will display the code as an LED bit pattern on portB
(bits 0:3)
If the code is incorrect you will increase a counter which is also shown on portB (bits 6:7) but
only if the lock is closed if it is already open then you will not increase the counter.
On the third unsuccessful code you will permanently lock the device so your input buttons stop
working. (to restart the lock you will need to use the RESET button)
If the code is OK when selected you will open the lock (shown by turning on the RA0 LED) if
there have been any unsuccessful attempts then this counter will be cleared.
To close the lock you will need to set the correct code then press the OK button again also
turning off RA0.
If the lock is open you can change the code by selecting a new code using the up and down
buttons then pressing RA4.
You should provide the details of any assumptions made.
Task 2) 20%
Provide a short report (maximum 3 pages including references) to the managing director that answers
the following questions:
What are the differences between the following operating systems (max 1.5 pages)
?
?
?
General Purpose Operating System
Real-time Operating System
Distributed Operating System
What advantages would there have been to utilising a Real Time Operating System in this project?
Would there be additional costs resulting from the implementation of Real Time Operating Systems?
In the future the company would like to include computer network connectivity to the lock controller.
What would be the impact of not using operating systems to complete this task?
Marking Scheme or Guide to Assessment Criteria
Task 1 80%
Task 2 20%
See marking grid for detailed mark allocation.
4002ELE Embedded Systems
Grade descriptors and feedback sheet for Cabinet Lock
Assignment 1 (2012/13)
Student Name:
Student Number:
Controller
Lecturer:
Outcome
Below 40%
40 to 49%
diagram details some
requirements but does
not contain correct
formatting
50 to 59%
Satisfactory coverage
of requirements and
mostly uses correct
formatting
60 to 69%
>70%
All requirements are
covered with
satisfactory formatting
Diagram presented in
a professional manner.
Requirements clearly
covered. Formatting is
accurate
Assembly Code Design Does the diagram provide an accurate
representation of the operational requirements? Is the diagram
clear and well structured? Does the annotation of the diagram
follow standards
Diagram fails to
capture the
requirements of the
system.
Assembly Code – Is the code written using a formal notation. Is
the code well written? Does your application meet the
requirements set out in the requirements specification
Application provides
little of the required
functionality there is
little structure and few
comments
Application provides
some of the
functionality required.
Is moderately well
written. With few
comments
Application code
performs most of the
requirements. Little
formal notation and
structure.
Application performs
as per the
requirements. Some
structure and
comments.
Application meets the
requirements is well
written i.e. not
verbose. Makes good
use of comments.
Operating system report Is the report well written does it
address the questions posed?
Discussion is missing
or very limited and
demonstrates that the
student does not have
a clear understanding
of the questions
Discussion is limited
and demonstrates that
the student has only a
basic understanding of
the questions
Discussion is of a
satisfactory standard
and demonstrates that
the student has a clear
understanding of
questions
Discussion is of a high
standard and
demonstrates that the
student has a good
understanding of the
questions external
sources have been
referenced
Discussion is of an
excellent standard and
demonstrates that the
student has a deep
understanding of the
questions a good
range of external
sources have been
used.
Section
Mark
/100
Weight
Weighted
Mark
0.3
0.5
0.2
Final
Mark
Comments:
Please provide descriptive feedback in this section.
Guide to Performance Criteria
70% and above:
Your work must be of outstanding quality and fully meet the requirements of the coursework
specification and learning outcomes stated. You must show independent thinking and apply this to your
work showing originality and consideration of key issues. There must be evidence of wider reading on
the subject.
Key words which may describe a coursework at this level include: appraises compares concludes contrasts
criticizes critiques defends discriminates evaluates explains interprets justifies relates supports.
60% 70%:
Your work must be of good quality and meet the requirements of the coursework specification and
learning outcomes stated. You must demonstrate some originality in your work and show this by
applying new learning to the key issues of the coursework. There must be evidence of wider reading on
the subject.
Key words which may describe a coursework at this level include: categorizes combines compiles creates
devises generates modifies reconstructs identifies illustrates outlines synthesizes.
50% 60%:
Your work must be comprehensive and meet all of the requirements stated by the coursework
specification and learning outcomes. You must show a good understanding of the key concepts and be
able to apply them to solve the problem set by the coursework. There must be enough depth to your
work to provide evidence of wider reading.
Key words which may describe a coursework at this level include: demonstrates changes applies operates
produces predicts shows solves uses translates comprehends converts generalizes.
40% 50%:
Your work must be of a standard that meets the requirements stated by the coursework specification
and learning outcomes. You must show a reasonable level of understanding of the key concepts and
principles and you must have applied this knowledge to the coursework problem. There should be some
evidence of wider reading.
Key words which may describe a coursework at this level include: comprehends defines describes identifies
knows labels lists matches outlines recalls recognizes reproduces selects states rewrites.
Below 40%:
Your work is of poor quality and does not meet the requirements stated by the coursework specification
and learning outcomes. There is a lack of understanding of key concepts and knowledge and no
evidence of wider reading.
Recommended reading
Ramesh S. Gaonkar Microprocessor Architecture Programming and Applications with the 8085 2002
Prentice Hall fifth edition.
Fredrick M. Cady Microcontrollers and Microcomputers 1997 Oxford University Press Inc.
Donald P. Leach and Albert P. Malvino Digital Principles and Applications 1994 McGraw-Hill fifth
edition.
Lin W.C.Microprocessors: Fundamental and Applications
Douglas V. Hall Microprocessors and Interfacing: Programming and Hardware
Extenuating Circumstances
If something serious happens that means that you will not be able to complete this assignment you
need to contact the module leader as soon as possible. There are a number of things that can be done
to help such as extensions waivers and alternative assessments but we can only arrange this if you tell
us. To ensure that the system is not abused you will need to provide some evidence of the problem.
More guidance is available at
http://www.ljmu.ac.uk/corporate/SPR/60399.htm.
Any coursework submitted late without the prior agreement of the module leader will receive 0
marks
Academic Misconduct
The University defines Academic Misconduct as any case of deliberate premeditated cheating
collusion plagiarism or falsification of information in an attempt to deceive and gain an unfair
advantage in assessment. The School takes Academic Misconduct very seriously and any suspected
cases will be investigated through the Universitys standard policy (Academic Misconduct Policy). If you
are found guilty you may be expelled from the University with no award.
It is your responsibility to ensure that you understand what constitutes Academic Misconduct and to
ensure that you do not break the rules. If you are unclear about what is required please ask.
Cheating includes:
(i) any form of communication with or copying from any other source during an examination;
(ii) communicating during an examination with any person other than an authorised member of
staff;
(iii) introducing any written printed or other material into an examination (including
electronically stored information) other than that specified in the rubric of the examination
paper;
(iv) gaining access to unauthorised material in any way during or before an assessment;
(v) the use of mobile phones or any other communication device during an assessment or
examination;
(vi) the submission of false claims of previously gained qualifications research or experience in
order to gain credit for prior learning;
(vii) the falsification of research data the presentation of anothers data as ones own and any
other forms of misrepresentation in order to gain advantage;
(viii) the submission of work for assessment that has already been submitted as all or part of the
assessment for another module without the prior knowledge and consent of the Module Leader
for the subsequent assessments;
(ix) the submission of material purchased or commissioned from a third party such as an essay-writing
service as ones own.
Plagiarism is defined as the representation of the work artefacts or designs written or otherwise of
any other person from any source whatsoever as the students own. Examples of plagiarism may be as
follows:
i) the verbatim copying of anothers work without clear identification and acknowledgement
including the downloading of materials from the Internet without proper referencing of
materials;
ii) the paraphrasing of anothers work by simply changing a few words or altering the order of
presentation without clear identification and acknowledgement;
iii) the unidentified and unacknowledged quotation of phrases from anothers work;
iv) the deliberate and detailed presentation of anothers concept as ones own.
Collusion includes:
(i) the conscious collaboration without official approval between two or more students in the
preparation and production of work which is ultimately submitted by each in an identical or
substantially similar form and/or is represented by each to be the product of his or her
individual efforts;
(ii) collusion also occurs where there is unauthorised co-operation between a student and
another person in the preparation and production of work which is presented as the students
own.
For more information you are directed to following the University web pages:
?
Information regarding academic misconduct:
http://www.ljmu.ac.uk/studysupport/81924.htm
?
Information on study skills:
http://www.ljmu.ac.uk/studysupport/
?
Information regarding referencing:
http://www.ljmu.ac.uk/studysupport/69049.htm
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT

Place New Order
It's Free, Fast & Safe

"Looking for a Similar Assignment? Order now and Get a Discount!

Feeling Lucky?

Enter your email address to spin the wheel for a chance to win exciting offers.