Personal Blog : My OUM(Open University Malaysia) journey starting from Jan 2011 till graduate.
Everyone can copy the contents in this blog and please leave some credit or a backlink to me... -Thank You-

Sunday, January 13, 2013

KNOWLEDGE MODELING AND REPRESENTATION


 KNOWLEDGE MODELING AND REPRESENTATION -
ASSIGNMENT (CBKM3103)

(a) In Prolog, list is either empty or it is composed of a first element (head) and a tail, which is a list itself. Empty list can be represented by the atom [] and a non-empty list on the other hand is represented by a term [H|T] where H denotes the head and T denotes the tail. Weekdays is a list of the days such as Monday, etc in a week.

a) Find the last element in weekdays list.
  i.?
  ii.output


b)Find the N'th element in weekdays list. (N=2)
  i. ?
  ii.output


c)Reverse a list.
  i. ?
  ii.output

d)Duplicate the elements in weekdays list.
  i. ?
  ii.output

e)Replicate the elements in a weekdays list with given number of times.(2 times)
  i. ?
  ii.output

f)Drop every N’th element from a weekdays list. (2nd element)
  i. ?
  ii.Output


g)Split weekdays list into two parts, the length of the second part is given. (length of 2nd part is 2)
  i. ?
  ii.output

h)Rotate weekdays list N places to the left. (N=3)
  i.?
  ii.output

i)Remove the N'th element from a list. (2nd element)
  i.?
  ii.output

j)Extract a slice from a list.(position 2 and 4)
  i.?
  ii.output

 
(b) Besides using prolog to perform query, there are also different types of reasoning techniques used in artificial intelligence system. Among those techniques are case-based reasoning, model-based reasoning and rule-based reasoning. Compare and contrast these THREE techniques with relevant examples.

Network Security and Design


Network Security and Design - ASSIGNMENT


JS Enterprise is a books and magazines distributor in Klang Valley. The management would like to expand their business nationwide via e-business. Discuss FOUR Internet security threats to the JS Enterprise’s  e-business. In addition, discuss also the security measures for each threat to protect the organization internet security. In your opinion which security measure is best to be implemented for the company’s e-business. You may use diagrams or examples for discussion.
 

SOFTWARE CONSTRUCTION


SOFTWARE CONSTRUCTION - ASSIGNMENT



GlobalTech Solution is an agency that is dealing with software developments. This agency has produced many applications software in the market. Recently, this agency faced several problems such as late delivery of software, over budget, and providing unreliable software that is expensive to maintain. Moreover, the software produced does not satisfy the requirements of the customer.  As a newly appointed software engineer for this agency, you are required to overcome the software crisis faced by this agency.  Through a feasibility studies, you have found out that problems took place in the requirement analysis and specification stage.


a)     Explain how the requirement analysis and specification stage in the software development can overcome the software crisis that faced by this agency.
b)     Propose a software life cycle model which is suitable for development team at this agency.
 

Table Grade