Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Abstract data types (ADTs) are very important as they serve as programming tools that enable component reuse and encapsulation. This assignment requires students to create, implement and apply ADTs in an application.The learning outcomes being assessed in this assignment are listed below:

1: Analyze the various implementations of data structures and algorithms in terms of their efficiency (C4, CTPS, A2).

2: Solve programming problems by selecting and applying the use of suitable data structures and algorithms (C4, P3, A2, CTPS, LL).

3; Create abstract data types (ADTs) to represent new ways of organizing data (C5, P3, CTPS, LL).

The effects of climate change have resulted in an increasing amount of climate related disasters such as floods, forest fires, tsunami, cyclonic storms, landslides, epidemics, and haze. A sophisticated disaster management system allows the disaster relief and management team to coordinate the rescue mission in a more efficient and effective manner. It also reduces the risks associated with the disaster and relief the pain caused by it. With this, your team is asked to develop a disaster management system for the disaster relief and management team. Your system should include but not limited to the following modules:

1) Registration of the victims, staffs, food and supply

2) Food and supply management

3) Medical examination management

4) Workload assignment and coordination

Please note that the above criteria are the basic requirements of the assignment. You may show extra efforts such as learning new skills, introducing new ideas or new modules based on your creativity which might lead you to the excellent grade.

Assignment

Project Details

Part 1. Abstract Data Type

Specify the appropriate abstract data types (ADTs) for the respective modules of the system. You are NOT allowed to use any built-in Java API classes, in other words you must define your own ADTs.

Part 2. Implementation of the ADTs
Implement the ADTs from Part 1 using a variation of linked implementation.
- Describe the necessary data fields and how various operations should be implemented.
- Explain how do you ensure the efficiency of the data structure used to represent the ADTs to implement its various operations. Justify your reasons.

You shall consider the appropriate use of Java constructs such as interfaces, classes and generic types. For the ADTs, you are NOT allowed to use any Java API classes.

Part 3. Application that uses the ADTs

Develop the disaster management program (console/GUI), which at least includes the following functionalities:

- Maintain food and supply, such as add new food/supply, update food/supply, remove food/supply, etc.
- Maintain medical services, such as add new patient, update patient's details, remove patient, etc.
- Maintain requests and task assignments, such as add new duty staffs, update request details, remove request, etc.
- Reporting features for manager include:
- Display a list of the victims (details, condition, etc.).
- Display a summary of food and supply list, food assignment, etc.
- Display the latest served patient list, medical records, etc.
- Display a summary of staffs details, task assigned, task completed, etc.
- Sorting can be included to determine the priority in the list if necessary (E.g. food should be provided first to children, then old folks, and lastly to the adults)
- Basic validation features should be included for all functions.
- Additional features needed to improve the efficiency.

Notes:
- The user interface for this application may be console-based or GUI-based.
- The assessment is focused on the implementation of data structures and algorithms. Therefore NO marks will be given for both development platform and user interface.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92070551
  • Price:- $100

Guranteed 48 Hours Delivery, In Price:- $100

Have any Question?


Related Questions in Computer Engineering

Assignmentbullselect two systems in the lab or at home on

Assignment • Select two systems in the lab (or at home on the same LAN) make sure that they you are able to pass messages between them • Establish Wireshark on one of the systems and be sure that you can see all the mess ...

Consider the market for small business loans in the context

Consider the market for small business loans. In the context of this market. How adverse selection impact lenders. How does adverse selection impact borrowers? In the context of this market provide 2 things that a lender ...

Short answer essaygiven a requirement to integrate wdas

Short answer essay Given a requirement to integrate WDAs into an Enterprise Intranet, what are 2 applications that would be candidates for that, and illustrate strategies/methodologies to accomplish that.

Elm industries receives profits from polluting according to

Elm Industries receives profits from polluting according to the formula: (pi=10Q-Q^2) The Damages associated with pollution from this facility are estimated to be: (D=Q^2+2Q) (Q= pollution emitted in tons) , and profits ...

The following table records the number of days the stock

The following table records the number of days the stock market recorded the following outcomes: # of Days NASDAQ Up NASDAQ Down NASDAQ Unchanged DJIA Up 30 15 4 DJIA Down 10 40 3 DJIA Unchanged 3 5 2 What is the probabi ...

Question superfast software inc was founded last year by

Question : Superfast Software Inc. was founded last year by three young programmers. They all dreamed their company would become a really big one and would distribute a large number of software products all over the worl ...

Remember all of the following steps when showing that a

Remember all of the following steps when showing that a problem D is NPcomplete: 1. Show that D is in NP by briefly explaining how to quickly verify a solution to it. 2. Choose another problem Q that is known to be NP-ha ...

Discuss how a successful organization should have the

Discuss how a successful organization should have the following multiple layers of security in place for the protection of its operations: Information security management. Data security Network security

Sectuon 112 build draw binary search tree with the names

Sectuon 11.2: Build draw binary search tree with the names Doc, Grumpy, Happy, Sleepy, a Bashful, Sneezy, Dopey, inserted in the order provided here. Assume that, on future searche of this tree, each name is equally like ...

Question software introduce ability do you have a document

Question : Software introduce ability do you have a document management system to manage business processes. What is the purpose of a document management system?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As