Software Engineering Answers

Questions: 639

Answers by our Experts: 505

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Design a real time database for banking transactions that would record actions of all transactions credited and debited. The algorithm should raise an alert to the bank manager in case any unauthorized debit is made. (model, algorithm and Cheddar implementation)
Design a soft real time system for a vending machine that provides chocolates. Identify the different tasks and implement the same with a suitable scheduling algorithm. (model, algorithm and Cheddar implementation)
Design a Fire Alarm System? What are the various parameters to be considered in designing a Fire Alarm System?

a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
Design a real time database for banking transactions that would record actions of all transactions credited and debited. The algorithm should raise an alert to the bank manager in case any unauthorized debit is made.

a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
Design a real time system for a bank which also acts as a security system for intruder detection and alert. Identify what would be the prerequisites for the same. Explain the algorithm and scenario for the same.

a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
Design a soft real time system for a car driving video game. Identify the basic tasks required and implement the same with an appropriate scheduling algorithm.
a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
. Design a real time system to track telephone calls.
a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
A system contains four jobs. There are two resources X and Y. The following table shows the job parameters and their execution pattern. The execution pattern describes how each job is executed. [R;t] is read as follows: the job requires the resource R for t time units. Here, job J3 requires no resource for one time unit, the resource Y for two time units and no resource for one further time unit.


(a) Use the basic priority-inheritance protocol to schedule the system of jobs. Give the schedule and show also the current priority of the executing job at all time instants.
(b) Use the basic priority-ceiling protocol to schedule the system of jobs. Give the schedule and show also the current priority ceiling and the current priority of the executing job at all time instants.
Design a real time system for a bank which also acts as a security system for intruder detection and alert. Identify what would be the prerequisites for the same. Explain the algorithm and scenario for the same.
a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
Design a real time database for banking transactions that would record actions of all transactions credited and debited. The algorithm should raise an alert to the bank manager in case any unauthorized debit is made.
a. Identify critical and non-critical tasks.
b. Which scheduling algorithm do you use? Justify the same.
c. Can we apply priority inversion or not? If so identify the tasks.
d. Give the Model
LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS