Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

In an advanced country, a point system is maintained to keep track of erring drivers, and vehicle owners. The objective for this lab is to come up with software to keep track of penalties incurred by the drivers, and help decide those drivers whose driving license should be revoked.

Each driver is assigned an initial score of ten. Every minor offense (parking ticket, over speeding, under speeding, etc.) will be awarded a penalty of -1. Every major offense (drunk driving, reckless driving, and accidents) will be awarded a penalty of -5.  If a driver's score becomes 0 or negative, his/her license will be revoked.

For this problem, it is assumed that the owner of the car is always going to be driving the car. The list of offenses is provided as a text file containing the vehicle number and the nature of offense (Minor, Major). The list of drivers along with their UID and license number is available as input in a file named drivers.txt. A file named owners.txt maps the vehicle number to the UID of the owner. For the sake of simplicity, license number is a 10-digit integer, and vehicle number contains 3 characters followed by 4 digits. UID is a unique identifier provided to every citizen in the country, and it contains 12 digits.

The data structures to be used, the file format for various files and the general step-by-step process for this lab’s task are being stated in the remainder of this document.

 Data structures to be used:

A) Vehicle: This contains the list of all vehicles along with the vehicle number and UID of owners, with UID as the key.  Vehicle is maintained as a dynamic list.

B) Drivers: This represents the dynamic list of the tuples (license number, UID, score).

C) RevokeList: This list contains the current list of revoked drivers in the form of tuple (license number, vehicle number, UID).

File Formats:

The file format for the input files is as follows:

drivers.txt:

 ,

For ex:

182930101222,9929929921

 The file format for owner.txt is as follows:



Note: There is no space between number of items and item name. End Note.

For ex:

182930101222,KLA1512

 The file format for offenses.txt is as follows

 

For ex:

DNA1423 1

KAS1002 0

BEL1923 0

KAS1002 1


Note that 0 indicates Minor offense here, and 1 indicates a major offense.

Step 1: Identify appropriate data structures relevant for the problem and prepare them in Offense.h

Step 2: Design Offense ADT with the following operations (OffenseOps.h). The relevant operations are:

i) populateVehicles: This function reads input from file and populates its content in the Vehicles list in lexicographic order of vehicle numbers. It then returns the populated list.

ii) populateDrivers: This function reads input from file  and populates its content in the Drivers list in non-decreasing order of UIDs. It then returns the populated list.

iii) updateOffenses: This function reads the contents of the file containing offenses. It looks up the Vehicle list to find the UID of owner. Using the UID, it looks up the license number of the driver. It then updates the score in the corresponding tuple in the drivers list.

iv) markRevokedDrivers: This function identifies all drivers whose license needs to be revoked, and puts them in the file named revoke.txt

v) Add prototypes in OffensesOps.h

You might need the following support functions:

a)  insertVehicle: this function inserts a row of vehicle details in order

b)  insertDriver: this function inserts a row of driver details in order

c) lookupUID: search for a UID from the Vehicles list given the vehicle number, and return it.

d)  lookupVehicle: search  for  a vehicle number from the  Vehicle List given the  UID of the owner and return it.

e)  lookupDriverDetails: search  the Drivers list based on UID,   and return the index of the entry containing that UID.

 

Step 3: Implement the above operations in the corresponding c files

·         All relevant code must go to OffensesOps.c

·         All list creations must have filename as a parameter.

 Step 4:  driver file.

Create a simple driver file (revoke.c) that can read multiple input files corresponding to the various input files. The names of input files are passed as command line parameters.  Note that if no input file is passed, the program should attempt to run with drivers.txt, owners.txt and offenses.txt for the relevant input set.

The executable revoke generates output files revoke.txt that will contain the list of drivers (license number, UID, vehicle number) whose license is to be revoked.

For the purposes of testing, you may implement some functions to print the data structures or other test data.

But all such functions must be commented before submission to server.

Deliverables: All relevant header files, OffenseOps.c, revoke.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M986

Have any Question? 


Related Questions in Computer Engineering

What is the relationship between increased social

What is the relationship between increased social responsibility and IT at the workplace? Answer in about two paragraphs with reference. Must be 200-400 words and show an understanding and full development of the concept ...

Assume a tcp server is expecting to receive byte 2401 it

Assume a TCP server is expecting to receive byte 2401. It receives asegment with the sequence number 2401 that carries 500 bytes. If the server has no data to send at this moment and has not acknowledged the previous seg ...

Classes such as rectangle2ddouble ellipse2ddouble and

Classes such as Rectangle2D.Double, Ellipse2D.Double and Line2D.Double implement the Shape interface. The Shape interface has a method that returns a rectangle completely enclosing the shape. Consider the method call: Ex ...

Design an algorithm that compares a random and sorted array

Design an algorithm that compares a random and sorted array and establishes the average distance that elements must travel in moving from random to sorted order.

Assume the only computer in the residence uses ppp to

Assume the only computer in the residence uses PPP to communicate with the ISP. If the user sends 10 network-layer packets to ISP, how many frames are exchanged in each of the following cases: Using CHAP for authenticati ...

Compare and contrast benefits and challenges that exist

Compare and contrast benefits and challenges that exist between centralized database management systems and distributed database management systems. Identify potential business environments where each can be properly use ...

1 the stream function for an incompressible two-dimensional

1. The stream function for an incompressible, two-dimensional flow field is For this flow field, plot several streamlines for 2. For the case of a source at the origin with a uniform free stream plot the streamline ψ = 0 ...

Imagine a peer-to-peer network where 1000 users want to

Imagine a peer-to-peer network where 1000 users want to communicate in an authenticated and confidential way without a central Trusted Third Party (TTP). ] 1. How many keys are collectively needed, if symmetric algorithm ...

The performance of typical components has increased

The performance of typical components has increased substantially over time. In this Application you will plan the configuration for a personal computer for your immediate use. You do not have to purchase anything to com ...

Composing and using regular expressionsregular expressions

Composing and Using Regular Expressions Regular expressions became popular with the introduction of the UNIX operating system in 1960s and its text processing tools such as  grep  and  ed . Write a two to three (2-3) pag ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen