Create two triangle classes, one where the internal properties are stored on the stack and one where the internal properties are stored on the heap.  Each triangle should have a base, height, and a function that returns the area.

Triangles 1:  Create a vector of triangles where everything is stored on the stack. 

Triangles 2: Create a vector of triangles where everything is stored on the heap.

Triangles 3:  Create a vector where the items in the vector are stored on the stack, but the individual items have some data on the heap.

Triangles 4: Create a vector where the items in the vector are stored on the heap, but the individual items use no dynamic memory.

Note:  Think about what version of the triangle you should use for each scenario and make sure you do not have any memory leaks.

Perform a program written in ASSEMBLY 486, on Linux, with the requirements indicated below

Requirements:
The program should ask the user for the name of the file to be read.
The program opens a text file and performs one of the following operations:
1- Read the contents of the file, change the lowercase to uppercase letters, and print the result on the screen
2-Read the contents of the file, change capitals to lowercase, and print the result on the screen
3-Read the contents of the file, eliminate punctuation characters, and print the result on the screen
4-Read the contents of the file, eliminate the figures, and print the result on the screen
5-Read the contents of the file, eliminate all letters, and print the result on the screen
6-Read the contents of the file, leave only the punctuation marks, and print the result on the screen

The previous options must be displayed on the screen and the user chooses the desired option.
After executing the user’s request, the program again asks for an option.
There must be an option to exit the program.

Objectives:
To install and configure a SIP based IP-telephony server.
To be introduced on some telephony features an IP-PBX can provide.
To gain a basic knowledge on SIP server troubleshooting tools.
Tasks:
1- Install and configure a SIP based open source PBX.
2- Configure, connect and test a SIP based soft phone to the installed PBX.
3- Implement the following features that the PBX can provide:
a- Hunt group in ring all mode with three members.
b- Interactive voice response IVR with two levels menu options.
4- Use the PBX built-in SIP trace to log a completed SIP call trace and a failed SIP
phone registration request.
Submission Requirements:
1- An implementation report listing the, PBX network configuration configured
admin users names and passwords, configured extensions list and ring groups.
Also the report should include the requested SIP trace logs.
2- A live demonstration and presentation on the configured PBX; during this
demonstration an individual evaluation will take place.

Required Tools:
1- TrixBox 2.8.04
Trixbox CE is an easy to install, VOIP phone system based on the Asterisk PBX.
Trixbox is designed for home or office use. Trixbox CE includes CentOS linux,
mysql, and all the tools needed to run a business quality phone system.
Web Link:
ftp://ftp.uk.freesbie.org/sites/downloads.sourceforge.net/a/as/asteriskathome/
trixbox%20CE/trixbox%202.8/
2- Virtual box
VirtualBox is powerful Cross-platform Virtualization Software for x86-based
systems. “Cross-platform” means that it installs on Windows, Linux, Mac OS X
and Solaris x86 computers. And “Virtualization Software” means that you can
create and run multiple Virtual Machines, running different operating systems, on
the same computer at the same time. For example, you can run Windows and
Linux on your Mac, run Linux and Solaris on your Windows PC, or run Windows
on you Linux systems.
Web Link:
https://www.virtualbox.org/wiki/Downloads
3- Zoiper Suggested
It is a SIP based soft phone, different soft phone client can be used.
Web Link:
http://www.zoiper.com/en/voip-softphone/download/zoiper3
4- Putty
It is a free and open-source terminal emulator and serial console. It supports
several network protocols, including SCP, SSH, Telnet, rlogin, and raw socket
connection. It can also connect to a serial port.
Web Link:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
5- Winscp Optional
WinSCP is an open source free SFTP client and FTP client for Windows. Its main
function is the secure file transfer between local and remote computer.
Web Link:
http://winscp.net/eng/download.php

USER – CONTACT
User Contact
Brinda has recently joined a company and she is working as a software engineer. She was associated with a project to work on relationships. To get hold of the topic she starts writing a code where she takes the details of her colleagues and displays them in an ordered way. Let’s help Brinda to complete her code.

Create User class as the parent with the following attributes.

Attribute    Data Type
name    str
age    int
gender    str
contact    Contact
Use __init__() constructor to initialize the variables with respect to class.

Create a class Contact class with the following attributes.

Attribute    Datatype
phone_no    int
email_id    str
address    str
Use the following method to display the details in both class.

Sl.No    Method    Description
1.    __str__()    This method is used to return the string which needs to be printed

Note:
Strictly adhere to the Object-Oriented specifications given in the problem statement. All class names, attribute names, and method names should be the same as specified in the problem statement.

Input Format:
The first line of the input consists of string value corresponding to the name.
The second line of the input consists of Integer value corresponding to age.
The third line of the input consists of string value corresponding to gender.
The fourth line of the input consists of an integer value corresponding to the phone number.
The fifth line of input consists of string value corresponding to the email id.
The sixth line of the input consists of string value corresponding to the address.

Output Format:
Refer sample input-output format for better understanding.

Sample input-output [All lines in bold corresponds to the input]:
Enter Name
Chandan v
Enter Age
22
Enter Gender
Male
Enter Phone Number
8892563578
Enter Email id
[email protected]
Enter Address
Ramakrishna nagar,Mysore.

Name:chandan v
Age:22
Gender:Male
Phone Number:8892563578
Email id:[email protected]
Address:Ramakrishna nagar,Mysore.

I need to have a fully working C program, There are five data (plain text) files, namely, the students.txt, courses.txt, registrations.txt, criteria.txt, and performances.txt that keep information. Student file keeps the information about students such as the student number, name, surname, and department in abbreviated form. Course file keeps the information about courses such as the course code and course title. Criteria file keeps the information about course assessments such as the course code, course credit value, homework, lab, quiz, midterm, and final percentages. Registration file keeps the information about the students registrations such as the student number, academic year, semester, and course code. Performance file keeps the information about the students performances such as the student number, course code, and performances.
Below explanations are given for better understanding of the file formats (contents).
A sample line from the student file is 194162 VIANNEY DUSHIME ECE, where 194162 is the student number, VIANNEY is the student name, DUSHIME is the student surname, and ECE is department name.
A sample line from the course file is ENGL121 ENGLISH I, where ENGL121 is the course code and ENGLISH I is the course title.
A sample line from the registration file is 194162 201920 1 MATH101, where 194162 is the student number, 201920 stands for the 2019-20 academic year, 1 stands for Fall, and MATH101 is the course code.
A sample line from the criteria file is CHEM104 4 25 30 45, where CHEM104 is the course code, 4 is the course credit value, and the rest of the line 25 30 45 stands for 25% lab, 30% midterm, 45% final. To keep assessments simple, there are only three performance measures for all courses. For mathematical courses, there is midterm-1, midterm-2, and final exams. For physics and chemistry, there is a lab, a midterm, and a final. For English language courses, there is a quiz, a midterm, and a final. For COMP courses, it is either lab or homework, midterm and final exam percentages.
A sample line from the performance file is 194234 CHEM104 55 65 75, where 194162 is the student number, CHEM104 is the course code, and the rest of the line 55 65 75 stands for the performances such as 55 for the lab, 65 for the midterm, 75 for the final.
The general letter-grading policy for all courses is given as A (90-100), A- (85-89), B+ (80-84), B (75-79), B- (70-74), C+ (65-69), C (60-64), C- (55-59), D+ (50-54), D (45-49), D- (40-44), and F (0-39). The numerical grades for A-through-F are 4.0, 3.7, 3.3, 3.0, 2.7, 2.3, 2.0, 1.7, 1.3, 1.0, 0.7, and 0.0, respectively.
For instance, the student 194234 above collected 67 in CHEM104 and earned letter grade C+.

I will upload the data files later on.

Tasks: 
1. Download    the    file    cache.c    from    the    Assignment8    drop    box.
2. Implement    code    at    each    comment    containing    TODO:    that    performs    the    operation    described    in    the    comment. 
3. The    code    includes    unit    test    code    that    calls    the    various    cache    management    and    virtual    memory    functions.    Verify    your    code    works    but    using    that    unit    test.

Content: Total word page limit 6-8 pages in IEEE format (you can add 1-2 more pages if you want)
Topic: Federated machine learning
Title: Attractive title on any subtopic related to the topic. (title must include the main topic)
Abstract: Within 6000- 7000 words
Introduction: Broad announcement of the topic, motivation, contribution and organization.
Your Study Report: You should study and report the current state-of-the-art systems and report
for future perspectives. Cite some papers that your claim is backed by evidence. Do not copy
and paste from websites or papers. Turnitin will be used to find plagiarism. Be honest in writing your report. Comparison table must be provided. Also, neat and clean diagrams are expected.
Discussion: You must present a detailed discussion on the selected topic and its future
direction.
Conclusion: You must draw a suitable conclusion.

Reports can be prepared either in Latex or Word. The report should be at par with the scientific standard. You must refer papers from IEEE, ACM, Springer and Elsevier. If you are unable to download the paper from the publisher, then use the link http://libgen.in or http://libgen.li/ . In libgen, you check the option of Scientific articles.

Plagiarism can be 15% at most. The format will be IEEE word or Latex. Deadline: 25 May 2020

Freelancer should be experienced in and aware of:
1. Federated machine learning algorithms
2. Writing computer science research paper in IEEE format

PLEASE EXPLAIN THE FOLLOWING OPERATING SYSTEMS QUESTION AND SOLUTION TO THE QUESTION IF IT IS THE RIGHT SOLUTION.

Consider an index-based file system with the inode containing 64 indexes, 1 indirect index pointing to a disk block containing an array of direct indexes, and 1 2-level index in the usual way. Assume that each index takes 4 bytes.

What is the maximum file size under this arrangement, if a disk block is 1024 bytes? Explain how do you compute this maximum size.

Solution:
An indirect block has 1024 bytes * 1 index/4 bytes = 256 pointers
So a file has at most 64 + 256 + 256*2 blocks and (64 + 256 * 256^2) * 1024 bytes.

How many disk accesses does it take to read one disk block at location 3000321 within a file, assuming no caching. Justify your answer.

Solution:
Block 3000321 is block number 2930, which means we have to read the inode, the 2-level index, a direct index, and the data block. 4 reads.

(i) what is the problem,
(ii) why it is important, (iii) why is it hard, (iv) why older approaches are not enough, (v) what is
key idea and why it works (a list of at least three key points), (vi) what might be missing and how
can we improve this idea (a list of at least three key points), (vi) an evaluation as to whether the
paper supports its claims, and (vii) possible next steps of the work presented in the paper. T