Capstone Project Proposal: A Cryptography Tool for Problem Generation Mark Weston CSc 197.

Slides:



Advertisements
Similar presentations
Workplace Presentations 101 for IT Professionals.
Advertisements

L3S Research Center University of Hanover Germany
University of Leeds Project Management Stuart Roberts School of Computing.
Instructional Technology vs. Educational Technology
Using UML, Patterns, and Java Object-Oriented Software Engineering Chapter 1: Introduction.
1. Set up the phase 1 dictionary for this problem and make the first pivot: Maximize X 1 + X X 3 + X 4 subject to -X 1 + X X 4 ≤ -3 -X 1 +
Solving IPs – Cutting Plane Algorithm General Idea: Begin by solving the LP relaxation of the IP problem. If the LP relaxation results in an integer solution,
Software Architectural Design Software Components Instructor Dr. Lawrence Chung.
Systems Analysis, Prototyping and Iteration Systems Analysis.
Chapter 4: Inception is Not the Requirements Phase
Capstone Project Presentation A Tool for Cryptography Problem Generation CSc 499 Mark Weston Winter 2006.
Using UML, Patterns, and Java Object-Oriented Software Engineering Royce’s Methodology Chapter 16, Royce’ Methodology.
Monitoring and Control
1 Multiprocessors. 2 Idea: create powerful computers by connecting many smaller ones good news: works for timesharing (better than supercomputer) bad.
1  1998 Morgan Kaufmann Publishers Chapter 9 Multiprocessors.
1 Software project management (intro) An introduction.
Architectural Challenges in Developing a Web-Based Public Health Reporting System Workshop on Evaluating Software Architectural Solutions May.
1 [prop-038] Proposal to amend APNIC Lame DNS reverse delegation policy Policy SIG 7 Sep 2006 APNIC 22, Kaohsiung, Taiwan Terry Manderson.
1. The Role of the Algorithms in Computer Hsu, Lih-Hsing
Active Set Support Vector Regression
CS 61C L08 Introduction to MIPS Assembly Language: Arithmetic (1) Garcia, Spring 2004 © UCB Lecturer PSOE Dan Garcia inst.eecs.berkeley.edu/~cs61c.
SQM - 1DCS - ANULECTURE Software Quality Management Software Quality Management Processes V & V of Critical Software & Systems Ian Hirst.
August 6, 2003 Security Systems for Distributed Models in Ptolemy II Rakesh Reddy Carnegie Mellon University Motivation.
20 February Detailed Design Implementation. Software Engineering Elaborated Steps Concept Requirements Architecture Design Implementation Unit test Integration.
Storage System: RAID Questions answered in this lecture: What is RAID? How does one trade-off between: performance, capacity, and reliability? What is.
CSC271 Database Systems Lecture # 20.
Introduction to Programming Prof. Rommel Anthony Palomino Department of Computer Science and Information Technology Spring 2011.
Combining Exact and Metaheuristic Techniques For Learning Extended Finite-State Machines From Test Scenarios and Temporal Properties ICMLA ’14 December.
IT Systems Analysis & Design
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
University of Sunderland COM369 Unit 8 COM369 Project Monitoring and Control Unit 8.
Managing Information Systems Enhancing Management Decision Making Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Accelerating Precise Race Detection Using Commercially-Available Hardware Transactional Memory Support Serdar Tasiran Koc University, Istanbul, Turkey.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
ID-10t Consultants Generation Java Software Plan Roger Bacon Science Center, Room 328 September 19, :15 am 09/19/20081 ID-10t Consultants Software.
1. The Role of the Algorithms in Computer Algorithms – 1/2 Algorithm: Any well-defined computation procedure that takes some value, or set of values,
Ch 6. The Evolution of Analytic Tools and Methods Taming The Big Data Tidal Wave 31 May 2012 SNU IDB Lab. Sengyu Rim.
Goal Programming Linear program has multiple objectives, often conflicting in nature Target values or goals can be set for each objective identified Not.
Programming Paradigms
LP Narrowing: A New Strategy for Finding All Solutions of Nonlinear Equations Kiyotaka Yamamura Naoya Tamura Koki Suda Chuo University, Tokyo, Japan.
CSV 889: Concurrent Software Verification Subodh Sharma Indian Institute of Technology Delhi Symbolic Execution.
Repurpose, Compose, Profit— Next Generation SOA Infrastructure William Cox Cox Software Architects LLC Copyright 2008.
Inquiry Refers to the diverse ways in which scientists study the natural world and propose explanations based on the evidence derived from their work.
Wifi Details SSID: RMIT-University Username: s Password: wifi4DLTV
WFD revision – First contribution from the wastewater sector (EU2) EU2 – Milan meeting.
Click to add text Systems Analysis, Prototyping and Iteration.
McGraw-Hill/Irwin Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. Supplement 6 Linear Programming.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
FAIRCONDITIONING ARCHITECTURE TRAINING OF TRAINER WORKSHOP Classroom Teaching Aids.
Chapter 1. The Role of the Algorithms in Computer.
TCSS 342 Autumn 2004 Version TCSS 342 Data Structures & Algorithms Autumn 2004 Ed Hong.
Advanced Higher Computing Science The Project. Introduction Worth 60% of the total marks for the course Must include: An appropriate interface using input.
Presented By:- Himanshu Rajkiran Sudipta.  History  Introduction  System Specification(H/W & S/W)  Feasibility Study  Entity-Relationship Diagram.
Advanced Higher Computing Science
Committee of Experts World Intellectual Property Organization
VP, Institutional Services
Rapid Application Development Model
Algorithms for Big Data Delivery over the Internet of Things
دانشیار دانشکده دندانپزشکی دانشگاه علوم پزشکی شهید صدوقی یزد
Analyzing the Business Case
Informatics 121 Software Design I
MIP Tools Branch and Cut with Callbacks Lazy Constraint Callback
Chapt 2 Iterative Evolutionary Agile.
Associate Professor of Computers & Informatics - Benha University
Proposal Presentation
Construction Engineering Department Construction Project with Resources Constraints By. M. Chelaka, D. Greenwood & E. Johansen, /9/2019.
Branch-and-Bound Algorithm for Integer Program
REFLECTIONS ON THE SUSTAINABILITY OF ARGUS
Presentation transcript:

Capstone Project Proposal: A Cryptography Tool for Problem Generation Mark Weston CSc 197

Problem Definition Where is the need? Where is the need? Idea: Improve MTH121 Problem Generation Idea: Improve MTH121 Problem Generation Current system works, but… Current system works, but… Goals: A faster, flexible, more powerful tool Goals: A faster, flexible, more powerful tool

Requirements Two parts: Two parts: 1. Define problem structure 2. Implement algorithms and processes of that structure to generate problems

More on requirements Implies a modular structure Implies a modular structure Flexibility Flexibility Performance Performance Constraints Constraints

Existing solutions Current system works, but can be improved Current system works, but can be improved Commercial Software vs. Student Work Commercial Software vs. Student Work Trade-offs Trade-offs

So what is it, really Answer: That’s the goal of the research Answer: That’s the goal of the research New problem New problem Replacing human work with a computer Replacing human work with a computer Right now, instead of answers, questions: Right now, instead of answers, questions: 1. What makes a good problem? 2. Can we define a procedure to generate it?

Costs, risks, etc. The good news: This project is zero risk for the client The good news: This project is zero risk for the client The bad news: Catastrophic failure is still possible for the student * The bad news: Catastrophic failure is still possible for the student * Student work is free Student work is free Java is free Java is free IEF grant can buy books if needed IEF grant can buy books if needed Priorities: Linear progression Priorities: Linear progression

Conclusions Is this feasible? Is this feasible? –Could address a relaxed, sub- problem Highlights Highlights –Interesting –Benefits school –New problem

Thanks to: Thanks to: Professor Katherine Lesh Professor Katherine Lesh Professor Almstead Professor Almstead

Questions? Questions?