Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

In an advanced country, a point system is maintained to keep track of erring drivers, and vehicle owners. The objective for this lab is to come up with software to keep track of penalties incurred by the drivers, and help decide those drivers whose driving license should be revoked.

Each driver is assigned an initial score of ten. Every minor offense (parking ticket, over speeding, under speeding, etc.) will be awarded a penalty of -1. Every major offense (drunk driving, reckless driving, and accidents) will be awarded a penalty of -5.  If a driver's score becomes 0 or negative, his/her license will be revoked.

For this problem, it is assumed that the owner of the car is always going to be driving the car. The list of offenses is provided as a text file containing the vehicle number and the nature of offense (Minor, Major). The list of drivers along with their UID and license number is available as input in a file named drivers.txt. A file named owners.txt maps the vehicle number to the UID of the owner. For the sake of simplicity, license number is a 10-digit integer, and vehicle number contains 3 characters followed by 4 digits. UID is a unique identifier provided to every citizen in the country, and it contains 12 digits.

The data structures to be used, the file format for various files and the general step-by-step process for this lab’s task are being stated in the remainder of this document.

 Data structures to be used:

A) Vehicle: This contains the list of all vehicles along with the vehicle number and UID of owners, with UID as the key.  Vehicle is maintained as a dynamic list.

B) Drivers: This represents the dynamic list of the tuples (license number, UID, score).

C) RevokeList: This list contains the current list of revoked drivers in the form of tuple (license number, vehicle number, UID).

File Formats:

The file format for the input files is as follows:

drivers.txt:

 ,

For ex:

182930101222,9929929921

 The file format for owner.txt is as follows:



Note: There is no space between number of items and item name. End Note.

For ex:

182930101222,KLA1512

 The file format for offenses.txt is as follows

 

For ex:

DNA1423 1

KAS1002 0

BEL1923 0

KAS1002 1


Note that 0 indicates Minor offense here, and 1 indicates a major offense.

Step 1: Identify appropriate data structures relevant for the problem and prepare them in Offense.h

Step 2: Design Offense ADT with the following operations (OffenseOps.h). The relevant operations are:

i) populateVehicles: This function reads input from file and populates its content in the Vehicles list in lexicographic order of vehicle numbers. It then returns the populated list.

ii) populateDrivers: This function reads input from file  and populates its content in the Drivers list in non-decreasing order of UIDs. It then returns the populated list.

iii) updateOffenses: This function reads the contents of the file containing offenses. It looks up the Vehicle list to find the UID of owner. Using the UID, it looks up the license number of the driver. It then updates the score in the corresponding tuple in the drivers list.

iv) markRevokedDrivers: This function identifies all drivers whose license needs to be revoked, and puts them in the file named revoke.txt

v) Add prototypes in OffensesOps.h

You might need the following support functions:

a)  insertVehicle: this function inserts a row of vehicle details in order

b)  insertDriver: this function inserts a row of driver details in order

c) lookupUID: search for a UID from the Vehicles list given the vehicle number, and return it.

d)  lookupVehicle: search  for  a vehicle number from the  Vehicle List given the  UID of the owner and return it.

e)  lookupDriverDetails: search  the Drivers list based on UID,   and return the index of the entry containing that UID.

 

Step 3: Implement the above operations in the corresponding c files

·         All relevant code must go to OffensesOps.c

·         All list creations must have filename as a parameter.

 Step 4:  driver file.

Create a simple driver file (revoke.c) that can read multiple input files corresponding to the various input files. The names of input files are passed as command line parameters.  Note that if no input file is passed, the program should attempt to run with drivers.txt, owners.txt and offenses.txt for the relevant input set.

The executable revoke generates output files revoke.txt that will contain the list of drivers (license number, UID, vehicle number) whose license is to be revoked.

For the purposes of testing, you may implement some functions to print the data structures or other test data.

But all such functions must be commented before submission to server.

Deliverables: All relevant header files, OffenseOps.c, revoke.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M986

Have any Question? 


Related Questions in Computer Engineering

A factory makes parts for laptop computers including screws

A factory makes parts for laptop computers, including screws. The screws are required to have the right length. The lengths of the screws obey a normal distribution with mean μ=4.25 millimeters and standard deviation σ=0 ...

Consider the following production function that is already

Consider the following production function that is already written in per worker terms: y = Akαh 1-α where h represents human capital per worker. Suppose we are given the following information: capital per worker in an e ...

Explain the differences between working in the web based

Explain the differences between working in the web based version of Outlook in Office 365 to the desktop application version of Outlook.

Question you are shopping for a new computer you will be

Question: You are shopping for a new computer. You will be using the computer for everything you do, such as school, socializing, gaming, and communicating. Your total budget before tax is $1,000.00. Considerations: • Bu ...

Question cyber attacks on critical infrastructures-a risk

Question: Cyber Attacks On Critical Infrastructures-A Risk To The Nation There has been a great deal of research related to cyber attacks and vulnerabilities and critical infrastructure, but there is an incomplete unders ...

Assignment week 2 documenting the project

Assignment: Week 2 Documenting the Project Lifecycle Well-written project documentation clarifies intent, documents decisions and results, and allows project managers to assess project progress (and report it, as necessa ...

Recall that for a block cipher a key schedule algorithm

Recall that for a block cipher, a key schedule algorithm determines the subkey for each round, based on the key K. Let K = (K0,K1,K2......K55) be a 56-bit DES key. a. List the 48 bits for each of the 16 DES subkeys K1, K ...

Assignment 1 network access controlin a business

Assignment 1: Network Access Control In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Ac ...

Now assume that this market becomes perfectly competitive

Now, assume that this market becomes perfectly competitive. The production process for the good does not change. So, all firms have the same cost curves as the monopolist. Reference from: Q3. A monopolist in the sugar ma ...

Question suppose your corporate commercial website server

Question : Suppose your corporate commercial Website server is located in a demilitarized zone (DMZ) so that potential and existing customers can access it. Explain the steps you would take to secure the Web server and t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As