diff_months: 21

SHAPE GENERATION SYSTEM for APU Event Management

Download Solution Now
Added on: 2022-08-20 00:00:00
Order Code: 26469_966
Question Task Id: 0

Learning Outcome of the Assignment

Propose a working example of a program in machine level language using any appropriate assembly programming tool (A5, PLO6)

SCENARIO

SHAPE GENERATION SYSTEM for APU Event Management

Mathematics is one of the most important modules in education. It has various types of mathematical areas namely Algebra, Calculus Analysis, Geometry Topology, Logic, Combinatorics, Number Theory and so on. In mathematical geometry there are different types of shapes involved such as square, regular pentagon, right triangle, rectangle and parallelogram etc. Form of shapes may vary based on input values such as radius and perimeter etc. In computer forensics the image steganography plays a prominent role in order to secure confidential data. Usually the phases of software development involve with forward engineering however, cyber security and forensics sectors have been widely using the concept of reverse engineering to bring back the original design of products.

Assume, you are currently working as algorithm designer for APU Event Management Unit and you need to apply an appropriate mathematical logic to design shapes. This will be useful for the APU Event Management Unit to propose new designs in the digital banners or digital arch for the events/festivals. The diagram (Fig.1) below shown as sample of various shapes and its logical design from the main menu.

What is your task?

You, as a programmer in APU Event Management Unit, are required to develop an assembly language program for the above mentioned case study using TASM, TLINK with documentation of image steganography and uses of IDA Pro tool in forensics.

  1. Research and analyse the contribution of assembly programming language in any five (5) recent applications also provide the self-reflections with justification
  2. Evaluate the low level programming language with any three (3) high level programming Languages and justify the importance of assembly language in cyber security/forensics.
  3. Research and analyse the significance of reverse engineering in image steganography and describe the usage of IDA Pro tool.
  4. Design a main menu in your programming and list down the name of above four (4) proposed shapes. When you choose a particular option the system will show the equivalent shape on the screen only by using numbers and any character not allowed to construct the shapes.
  5. You are expected to demonstrate creativity in developing the application using assembly language prototype that can deal with the requirements of the developer as well as addressing (if necessary) any other aspects of control of the main menu of the application
  6. You have to work on the prototype individually.
  7. You are permitted to make assumptions where necessary. These assumptions are expected to be logical and must be appropriate for the situation at hand.
  8. There will be a presentation towards the submission date of the project. You are expected to demonstrate how your system is capable of addressing the requirements of the developer.
  9. The submission of your project should entail the following items:
    • Mainly the documentation highlighting the following:
      1. How the requirements have been addressed by the developing language, uses of low level programming languages nowadays, applications in assembly language and provide the self-reflections with justification?
      2. System Design using flowchart.
    • The user manual or guide that can explain how your system works. This will be based on your system application.
  10. Your completed documentation should meet the following requirements:
    • Table of contents for every detailed section
    • Introduction on Assembly Language
    • Research and Analysis
    • Evaluation
    • System Design using flowchart
    • System Screenshot
    • Source Code
    • Limitation
    • Conclusion
    • Self-Reflection
    • References
    • Appendices if necessary
  • Uploaded By : Katthy Wills
  • Posted on : June 09th, 2022
  • Downloads : 0
  • Views : 189

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more