Tax Research

Tax Research

https://geniusproessays.com/

Tax Research: ACCT 6356.501 Tax Research – Fall 2022

 

 

 

 

Name __________________

 

 

 

RESEARCH ASSIGNMENT 3

Treasury (IRS) Regulations

 

( Please submit as a Word document by email by 4:00 p.m. next Thursday, 9/15. )

 

 

This assignment is worth up to a maximum of five (5) points. Your answer should be written in your own words without any “cutting & pasting” from the source doc-ument(s) you cite except that very brief quotations are acceptable with proper attribution.

 

Points will be deducted for, among other things, (i) spelling and grammatical er-rors that Word highlighted but you failed to correct and (ii) other egregious errors, including substantive misstatements.

 

Any submissions received after 4:00 p.m. are worth a maximum of three (3) points. Submissions not received by 7:00 p.m. will not be scored (zero points).

 

Consult the Citation Style guide in the Syllabus. Be sure to include your name on your work.

 

* * * *

 

Businesswoman in golden parachute concept

 

 

Your client Ms. Executive was, until a few years ago, the CFO of BigCo. She had worked her way up through the Controller’s organization, then became Tax VP in 2009, then CFO in 2014.

 

Ms. Executive lost her role as BigCo’s CFO for the simple reason that in 2019 BigCo was swallowed up in a merger (an “A” reorganization) by BiggerCo. All of BigCo’s former assets and operations now make up just another one of Bigger’s several divisions.

 

Ms. Executive was fired the day after the merger closed – Bigger had a CFO and didn’t need two. But there was some happy news . . . because Ms. Executive had been smart enough to negotiate for a generous golden parachute provision in her CFO contract. The merger pulled the ripcord on that parachute and she collected a pre-tax lump-sum $4.4 million in September 2019. Can’t be sad about that!

 

“Wow, close call!”, you had said to her at the time. “You almost had to pay that nasty 20% excise tax!”

 

In 2021 Ms. Executive accepted a job in Hawaii and moved. She’d said at that point that although she “love[d] you to death” she felt the need for a local CPA. You agreed that that made sense, and she found one…

 

 

* * *

 

Out of the blue today Ms. Executive called you and she’s really angry. The IRS audited her 2019 return (the audit handled by her new CPA) and no sooner was the IRS finished than they handed Ms. Executive a tax deficiency notice saying “$580,000 excise tax, please.”

 

“You told me that I wouldn’t have pay any excise tax! Now the IRS says that I do owe it. Not happy with you!” (You can’t blame her for being upset, you only wish that you’d been involved in the audit…)

 

The IRS bases its position on Ms. Executive’s alleged miscalculation of her base amount. You had told her that her “base amount” was exactly $1.5 million. The IRS says it actually was only $1,460,000, “so the government wins!” Here are the relevant numbers, Ms. Executive’s salary (net of pre-tax deductions) for the most recent five years before she was fired:

 

2014 : $1,400,000

2015 : $1,450,000

2016 : $1,500,000

2017 : $1,550,000

2018 : $1,600,000

 

But there’s an important footnote to those numbers: Because of some disarray in BigCo’s Japanese subsidiary, Ms. Executive had “volunteered” to transfer and to work out of the Tokyo office (but still as a BigCo employee) in July 2015. She stayed through 2016 and into 2017 before being called back to Dallas. She claimed the § 911 exclusion in full for 2016 and partially for 2015 and 2017.***

 

*** Let’s hypothetically say that the exclusion she qualified for amounted to an aggregate total of $200,000 for those three (two partial plus one whole) calendar years together.

 

The IRS argues that since Ms. Executive didn’t pay FIT on the § 911 exclusion amount, it can’t be included in her base amount calculation. So the government says that her base amount was less than what you’d advised her it was, with the result that her $4.4 million payout was subject to excess tax.

 

* * *

 

You need to develop your response to your angry former client. And then com-unicate it to her in writing.

 

 

8

 

image1.jpeg

Internet Law

Internet Law

https://geniusproessays.com/

Internet Law: Chapter 9 (Internet Law, Social Media, and Privacy)

25. Would federal law preempt state law concerning antispam?

The statute preempts state antispam laws except for those provisions in state laws that prohibit false and deceptive e-mailing practices. The act permits the sending of unsolicited commercial email but prohibits certain types of spamming activities. Prohibited activities include the use of a false return address and the use of false, misleading, or deceptive information when sending e-mail.

 

 

 

 

 

 

 

26. How many states currently prohibit or regulate spam?

Thirty-seven states have enacted laws that prohibit or regulate the use of spam. Many state laws that regulate spam require the senders of e-mail ads to instruct the recipients on how they can “opt-out” of further e-mail ads from the same sources. In some states, an unsolicited e-mail must include a toll-free phone number or return e-mail address that the recipient can use to ask the sender to stop forwarding those emails.

 

 

 

 

27. What is cybersquatting?

Cybersquatting is when a person registers on a domain name that is the same as, or confusingly similar to, the trademark of another and then offers to sell the domain name back to the trademark owner. Apple Inc. has repeatedly sued cybersquatters that registered domain names similar to the names of its products, such as ipods.com.

 

 

 

 

28. Would it be illegal if A registered a domain name that is confusingly similar to the trademark of B if A had bad faith intent to profit from the mark by selling the name to B?

 

 

 

 

 

29. What is typosquatting?

 

 

 

 

 

30. What could a plaintiff recover if it proves the defendant is profiting from a domain name that is confusingly similar to the plaintiff’s trademark?

 

 

 

 

 

31. Be able to recognize an example of A diminishing the quality of B’s domain name. Give an example of your own.

 

 

 

 

 

32. What is trademark dilution?

 

 

 

 

 

33. Is A’s downloading of music into her computer’s random access memory (RAM) without authorization considered copyright infringement?

 

 

 

 

 

 

 

34. Is the Digital Millennium Copyright Act violated if A transfers pirated copies of movies of television programs to an Internet site that permits users to view them without downloading them?

 

 

 

 

 

35. What is a license?

 

 

 

 

 

36. Be able to recognize a fair use exception to the provisions of the Digital Millennium Copyright Act.

 

 

 

 

 

37. Are making and selling devices and services for the circumvention of encryption software a violation of the Digital Millennium Copyright Act?

 

 

 

 

 

38. What is copyright infringement? (2)

 

 

 

 

 

39. What is peer-to-peer (P2P) networking?

 

 

 

 

 

40. What is a distributed network?

 

 

 

 

 

41. What is a business-extension exception under the Electronic Communications Privacy Act?

 

 

 

 

 

42. What is cloud computing?

 

 

 

 

 

43. May an employer discipline and even fire an employee who uses social media in a way that violates her employer’s stated social media policies?

 

 

 

 

 

44. How could an employer violate the Stored Communications Act with respect to its firing of employees who maintain a password-protected social media page to vent about their work?

 

 

 

 

 

 

 

 

 

45. Under the Electronic Communications Privacy Act, is it permissible for an employer to intercept employees’ business communications on devices provided for employees’ use in the ordinary course of its business?

 

 

 

 

 

46. What would cause an Internet Service Provider to have to disclose the identity of those persons who make defamatory statements online about a company’s products?

 

 

 

 

 

47. Can a company which markets its products online use cookies to track individuals’ Web browsing activities?

 

 

 

 

 

48. Are the privacy rights of the users of companies’ Web sites and apps for mobile devices frequently defined by the companies that own the sites and the apps?

Intellectual Property

Intellectual Property

https://geniusproessays.com/

Intellectual Property: QUESTIONS

 

Name: MTMAIL Address:

Type accurate, detailed, and explanatory answers in the spaces below. Email them in Word document to hjohns@mtsu.edu (Do not use D2L). Feel free to email me or call me at 615-292-3030 or 615-585-5353 (leave message if no answer; do not text) if you have any questions.

 

Chapter 8 (Intellectual Property)

 

1. What are some aspects of branding that can be trademarked?

A trademark is a distinctive mark, motto, device, or implement that a manufacturer stamps, prints, or otherwise affixes to the goods it produces so that they can be identified on the market and their origins made known.

 

 

 

 

2. What is trademark infringement?

When registering for a trademark with the U.S. Patent and Trademark office, they give a notice on a nationwide basis that the trademark belongs exclusively to the registrant. The registrant then uses the trademark symbol on their mark to indicate that it belongs to them. Whenever that trademark is copied to a substantial degree, or used in its entirety by another, whether intentionally or unintentionally, the trademark is infringed. In other words, the trademark has been used without authorization. The owner of the mark can take legal action against the infringer by showing that the defendant’s use of the mark created a likelihood of confusion about the origin of the defendant’s goods or services.

 

 

 

 

3. Could a company likely obtain trademark protection for its logo?

Companies such as Rolls Royce, McDonald’s, Starbucks, and Apple, are all logos covered under the Federal Trademark Dilution Act from unauthorized uses. These are known as “distinctive” or “Famous” trademarks. Owners of these can bring suits in federal court for dilution. A company can obtain trademark protection by registering with the state or federal government. This process may take six to thirty months, and registration is postponed until the mark is actually used. During the waiting period, any applicant can legally protect their trademark against a third party who previously has never used the mark nor filed an application for it.

 

 

 

 

4. Under what circumstances is trafficking in labels that bear counterfeit trademarks a crime?

 

 

 

 

 

5. What is the result when Company A uses Company B’s registered trademark without B’s consent?

 

 

 

 

 

6. What is a service mark?

A service mark is a trademark that is used to distinguish the services (rather than the products) of one person or company from those of another. For example, each airline has a specific symbol associated with its name. Titles and character names used in radio and TV are frequently used as service marks. The registration symbol is R instead of T. Service marks can also be slogans for companies. It can sometimes be difficult to distinguish between service marks and trademarks. Mcdonald’s is a restaurant that offers products and services, so a big mac is a trademarked product while providing the fast food is a service mark.

 

 

 

 

7. What is a trade name?

A trade name indicates part or all of a business’s name, whether the business is a sole proprietorship, a partnership, or corporation. A trade name is directly related to a business and its goodwill. A trade name may be protected as a trademark if the trade name is also the name of the company’s trademarked product. For example, the word Safeway, was sufficiently fanciful to obtain protection as a trade name for grocery chain because it is unusual or fancifully used. Therefore, this name is protected.

 

 

 

 

8. Closing down the domain name of a website is effectively used by U.S. officials when there is online sales of what kind of goods?

 

 

 

 

 

9. What is a patent?

A patent is a grant or legal document from the government that gives an inventor the exclusive right to make, use, or sell their invention for a period of twenty years. Patents for designs are given for a fourteen year period. Patents are an important element in encouraging innovation. This grant gives the inventor exclusive rights to their product or design in exchange for a comprehensive disclosure of the invention. Whoever invents or discovers new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement, may obtain a patent and are subject to the conditions and requirements of this title

 

 

 

 

10. What is a license?

A license is an agreement or contract permitting the use of a trademark, copyright, patent, or trade secret for a certain purpose. The party that owns the intellectual property rights and issues the license is the licensor, and the party obtaining the license is the license. A license only grants the rights expressly described in the license agreement. When the license involves internet uses, disputes frequently arise over licensing agreements.

 

 

 

 

11. How long does A have to challenge B’s patent if A believes B has infringed upon A’s previously acquired patent?

 

 

 

 

 

12. What is patent infringement?

Patent infringement is when a firm makes, uses, or sells another’s patented design, product, or process without the patent owner’s permission. Patent infringement may occur even though the patent owner has not put the patented product into commerce, or even though not all features or parts of a product are copied.

 

 

 

 

13. Works that are copyrightable include what?

A copyright is an intangible property right granted by federal statute to the author or originator of a literary or artistic production of a specified type. A copyrightable is the particular way in which an idea is expressed. When an idea and expression are inseperable, the expression can not be copyrighted. Works that are copyrightable include literary works, musical works, dramatic works, pantomimes and choreographic works, pictorial, graphic, and sculptural works, motion pictures and other audiovisual works, and architectural works. Anything that is not an original expression does not qualify for copyright protection. Facts widely known to the public are not copyrightable. Page numbers are not copyrightable because they follow a sequence known to everyone. Mathematical calculations are not copyrightable.

 

 

 

 

14. What must a work be to be protected under the Copyright Act?

In order for a work to be protected under the Copyright Act, a work must be “fixed in a durable medium” from which it can be perceived, reproduced, or communicated. Protection of these items are automatic, and registration is not required. These works include books, records, films, menus, product packaging, computer software, newspapers, musical works, ballets/other forms of dance, cartoons, maps, sound recordings, motion pictures, and many others. It must be an original expression or a fact that is not widely known to the public to be protected.

 

 

 

 

15. What is copyright infringement?

Copyright infringement is when the form or expression of an idea is copied. The reproduction does not have to be exactly the same as the original, nor does it have to reproduce the original in its entirety. If a substantial part of the original is reproduced, the copyright has been infringed.

 

 

 

 

16. What does “fair use” mean as an exception to copyright infringement?

The “fair use” doctrine is an exception to liability for copyright infringement. In certain circumstances, a person or organization can reproduce copyrighted material without paying royalties. According to Section 107 of the Copyright Act, the fair use of copyrighted work, including such use by reproduction in copies or phonorecords for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright. Because the guidelines for fair use is very broad, the courts determine whether a particular use is fair on a case-by-case basis.

 

 

 

 

17. What does the first sale doctrine enable a buyer of a newly copyrighted book to do?

 

 

 

 

 

18. Does federal copyright protection extend to parts of an app that can be read by computers?

 

 

 

 

 

19. Could A bring an action for copyright infringement against its competitor, B, who copied parts of the software that can be read by humans?

 

 

 

 

 

 

20. What is a theft of trade secrets?

A trade secret is information of commercial value, such as customer lists, plans, and research development. A theft of trade secrets is when confidential business data is stolen by industrial espionage, such as by tapping into a competitor’s computer. This is an actionable offense without any contractual violation. The theft of trade secrets is a federal crime.

 

 

 

 

21. What kind of information may be protected as trade secrets? (2)

Trade secrets protect the information of commercial value such as customer lists, plans, and research development. They may also protect pricing information, marketing methods, production techniques, and generally anything that makes a company individually unique. In other words, anything that would have value to the company’s competitor would be protected as trade secrets. Protection of trade secrets extends to both ideas and their expression. Because of this, there is no registration or filing requirements for trade secrets.

 

 

 

 

22. Is an app for an idea that businesses can use to track their revenue, profit, and payroll protected by any federal law?

 

 

 

 

 

23. What is the significance of all signatories of the Berne Convention as it relates to the publishing of a book written by a French citizen first in France and then in the U.S.?

 

 

 

 

 

24. What is the essence of the TRIPS agreement regarding infringement of intellectual property rights?

The TRIPS agreement, otherwise known as the Trade Related Aspects of Intellectual Poverty Rights, is a party to various international agreements relating to intellectual property rights. For example, the Paris Convention of 1883, allows parties in one country to file for patent and trademark protection in any of the other member countries. The TRIPS agreement established the standards for the international protection of intellectual property rights, including patents, trademarks, and copyrights for movies, computer programs, books, and music.

Self-Introduction Speech

Self-Introduction Speech

https://geniusproessays.com/

Self-Introduction Speech: Your first Speech

 

It’s that time!

Self-Introduction Speech Purpose

The objectives of this speech are to introduce yourself to your classmates and to help you become accustomed to presenting, recording, uploading, and submitting a speech.

 

Visual Aid Selection

Select an object that represents a significant aspect of your background, personality, values, ambitions, etc.

The object will be your visual aid for the speech.

Using the object as a point of departure, you should develop a speech that explains how it relates to your life. For example, a journalism major might select a newspaper as a way to explain his or her goals. An avid tennis player might use a tennis racket to illustrate his or her passion for the sport.

 

Speech Requirements

Self-Introduction Speech Guidelines

Speaking Time: 2-3 minutes

Visual Aid: At least 1 visual aid is required

Supporting Material: Supporting material is not required. If supporting material is used, it should be cited within the content of the speech and added to the works cited page.

Outline and Works Cited: Preparation Outline and Works Cited page (if using supporting material) must be submitted to D2L Dropbox by the deadline.

Note Card(s):  Note cards can be used OR a one-page speaking outline. Attire: Casual

Remember that you need to do a self-evaluation prior to this speech

VIDEO rEQUIREMENTS

Video Requirements

You should present and video record your speech. Upload the speech to YouTube.com and post the link to the Discussion Board on the designated forum. For this speech, a live audience is not required. Your classmates and instructor will be your audience. Be sure the quality of the video is such that the sound and visuals are clear. If the sound and video quality are not sufficient for the instructor to view your speech you will be required to resubmit to earn a grade.

You should be standing to present and visible in the video from head to fingertips.

Avoid wearing ballcaps as this can negatively impact eye contact.

 

Start By Selecting A Topic

Some Ideas

Look at my responses to your bio posts. I provided some initial ideas to each of you based on what you shared in your post if you are in an online class. We did a brainstorming in class for the in-person class

Share an experience that has shaped your life

Talk about an item that means a lot to you such as a musical instrument, piece of jewelry, a favorite childhood toy, etc.

Tell us what led you to select your major

These are just a few ideas

Once you have a topic

Consider 2-3 things you could discuss about the topic. These are your main points

Consider how to open the speech with an attention-getter

Consider how you will end your speech with a review and concluding remark

Create An Outline

Attention-Getter

Things You Can Use

Quotes

Videos

Actions

Visual Aids

Stories

Rhetorical Questions

Audience Participation

Startling Facts

What’s Next: After I get Their Attention

Tell the Audience the purpose of your speech

Explain your connection/research on the topic

Preview the main points you plan to discuss

Provide a transitional word of phrase that let’s us know you are going into the Body of the speech

The Body of the Speech

The Body of your speech should contain the same elements in the same order as the preview statement. Also, remember to include transitions.

Let’s Also Discuss How to Close The Speech: Review and Concluding Remark

Presenting the Speech

No gum

Stand up straight

Dress appropriately

No hat

Good eye contact

Don’t sway

Try to incorporate some gestures

Watch the Uhs and Ums and Likes (fillers)

Consider your language

Show Interest in your topic

How Do I Eliminate the Dreaded Fillers?

Getting Rid of Fillers

Practice

Insert Pause (This also helps with the rate, the time, and adds verbal punctuation)

Slow Down

Other Resources to Help

Go to the Content Section, Week 2

Under “Lecture”, you will find 3 videos that will be especially helpful: How to Outline, How to Reduce Speech Anxiety by the Textbook Author, and the “Courtyard Self-Introductory Speech Sample”. In this section, you will also find an Outline Template, Link to Transitional words, A Sample outline.

How Do I Create a Video Link to upload?

Go to the Content Section. You will see a file that says “Uploading An Unlisted video”.

 

Please remember that you want your video “Unlisted”. The Public setting allows everyone to see it that goes to Youtube. The Private setting only allows you to see it and so I cannot see it. Use Unlisted.

image2.png

image3.png

image4.jpg

image5.jpg

image6.jpg

image7.jpg

image8.jpg

image9.jpg

Family Counseling

Family Counseling

https://geniusproessays.com/

Family Counseling: Final Project: Marriage, Couple, and Family Counseling

Families face many challenges in today’s world and marriage, couple, and family counselors (MCF) are the professionals who help families navigate difficult times. Families are a working system and each element of that system impact the operation of the system and the individual members. Issues such as substance abuse, family violence, divorce, mental illness, infidelity, and child abuse present counselors with numerous treatment challenges. As an MCF counselor, will you be ready to address them?

For the Final Project, you will consider the clients in the solution focused YouTube videos you viewed earlier in the course (see: http://www.youtube.com/watch?v=tjdJhdA9mE4&list=PLgswj8XPfriWqAECgkNLXLjG vjUXdfSYQ) For your Final Project, you are to develop an assessment and intervention plan for one of the clients in the videos and present it in an academic paper with scholarly references from the professional literature (e.g., Journal of Family Therapy, Journal of Marital and Family Therapy, The Family Journal, Journal of Marriage and Family Counseling, Journal of Contemporary Family Therapy, Journal of Counseling and Development). Your project should include all of the following sections: 1. Legal and ethical considerations regarding the family circumstances 2. Multicultural considerations 3. Identify any family life cycle considerations 4. Theoretical counseling model you would use in the case with rationale 5. Specific issues facing the family 6. Assessment techniques you would use in the case with rationale 7. Intervention plan for the family 8. Research (at least five references) that support your intervention plan 9. Prognosis for the family 10. A reflection on your learning experience in this course and your preparedness for working as a marriage, couple, and family counselor. Although the Final Project is not to be submitted until Day 7 of Week 12, you should become familiar with the project requirements and have them in mind as you proceed through the course. The Final Project will be evaluated according to the final project rubric. Be sure that the Final Project is written using APA format. Information on scholarly writing may be found in the APA Manual (6th ed.) and at the Purdue OWL Writing Center site (http://owl.english.purdue.edu/owl/). The Final Project is due (in Blackboard AND TK20) on Day 7 of Week 12.

 

Management Strategies

Management Strategies

https://geniusproessays.com/

Management Strategies: Module Four Discussion

Every relationship faces a range of challenges and some relationships have more significant issues than others. As you encounter marriages and couples in your counseling practice, you will discover that many problems stem from how we handle conflict. John Gottman, a noted marriage, couple, and family counselor, claims that conflict in relationships is a normal process. However, Gottman believes that conflict becomes a problem when it is characterized by criticism, contempt, defensiveness, and stonewalling. When couples don’t effectively address these issues, the impact can be profound. Fortunately, there are evidence-based approaches that will help you to address these kinds of issues as a marriage, couple, and family counselor.

For this discussion consider the impact of poor conflict management strategies on couples and how to address these within a counseling relationship. As a counselor you will find that every couple or family relationship is unique. However, there are common factors that can be identified among couples that relate to unhealthy conflict. John Gottman said that criticism, contempt, defensiveness, and stonewalling are the four horsemen of the apocalypse when it comes to relationships. As marriage, couple, and family counselors, it is important to be able to identify these factors and to be able to select effective interventions to address them. In addition to being able to recognize presenting problems, it will also be necessary to understand methods for building intimacy and communication skills.

• Consider how the issues discussed may impact a relationship.

• Perform an academic search in the Lamar University Library and select a scholarly article published in peer-reviewed journals in the last five years that examines a specific issue affecting couples who may enter the counseling setting (e.g., conflict, infidelity, career issues).

• Think about how the issues in the selected article may affect relationships, as well as how Gottman’s four horsemen may relate to these identified issues.

With these thoughts in mind: Post by Day 4 an analysis of the conflict styles identified in the learning resources. Compare the ways in which each of Gottman’s four horsemen could potentially have an impact on a couple’s relationship, using the article you selected to support your evaluation.

CUDA Program

CUDA Program

https://geniusproessays.com/

CUDA Program: Project # 1 – Matrix Addition and Matrix Multiplication

Task 1: Basic Matrix Addition

For this task, you will develop a complete CUDA program for integer matrix addition. You will add two two-dimensional matrices A, B on the device GPU in parallel. After the device matrix addition kernel function is invoked, and the addition result will be transferred back to the CPU. Your program will also compute the sum matrix of matrices A and B using the CPU. Your program should compare the device-computed result with the CPU-computed result. If it matches, then it will print out “Test PASSED” to the screen before exiting.

The pseudo code for matrix addition on the CPU is as follows:

void add_matrix_cpu(int *a, int *b, int *c, int N)

{

int i, j, index;

for (i=0;i<N;i++) {

for (j=0;j<N;j++) {

index =i*N+j;

c[index]=a[index]+b[index];

}

}

}

void main() {

…..

add_matrix(a,b,c,N);

}

The pseudo code for matrix addition on the GPU device is as follows:

CUDA C program

__global__ void add_matrix_gpu(int *a, int *b, int *c, intN)

{

int col =blockIdx.x*blockDim.x+threadIdx.x;

int row=blockIdx.y*blockDim.y+threadIdx.y;

int index =row*N+col;

if( row<N && col <N)

c[index]=a[index]+b[index];

}

void main() {

dim3 dimBlock(blocksize, blocksize,1);

dim3 dimGrid( ceiling (double (N) /dimBlock.x), ceiling (double (N) /dimBlock.y), 1 );

add_matrix_gpu<<<dimGrid, dimBlock>>>(a,b,c,N);

}

Use the following pseudo code for matrix initialization.

int *a, *b, *c;

A=malloc(sizeof(int)*N*N; //N is the size

//then malloc for b and c

Int init =1325;

For (i=0;i<N;i++){

For (j=0;j<N;j++){

Init=3125*init%65536;

A[i][j]=(init-32768)/6553;

B[i][j]=Init%1000;

}

}

Use the following matrix size and thread block size (the number of threads in each block) to test your cuda program.

Matrix Size Size of Thread block
8*8 4*4 (For debugging purpose)
128*128 16*16
500*500 16*16
1000*1000 16*16

Task 2: Matrix Multiplication

For this task, you will develop a complete CUDA program for matrix multiplication. You will multiply two two-dimensional matrices A,B on the device GPU in paralell. After the device matrix multiplication kernel function is invoked, and the multiplication result will be transferred back to the CPU. Your program will also compute the product matrix of matrices A and B using the CPU. Your program should compare the device-computed result with the CPU-computed result. If it matches, then it will print out “Test PASSED” to the screen before exiting.

The pseudo code for matrix multiplication on the CPU is as follows:

void MatrixMulOnHost(int* M, int* N, int* P, int Width)‏

{

for (int i = 0; i < Width; ++i)‏

for (int j = 0; j < Width; ++j) {

int sum = 0;

for (int k = 0; k < Width; ++k) {

int a = M[i * Width + k];

int b = N[k * Width + j];

sum += a * b;

}

P[i * Width + j] = sum;

}

}

void main() {

…..

add_matrix(a,b,c,N);

}

The pseudo code for matrix addition on the GPU device is as follows:

CUDA C program

__global__ void MatrixMulKernel(int* M, int* N, int * P, int Width)

{

int Row = blockIdx.y*blockDim.y+threadIdx.y;

int Col = blockIdx.x*blockDim.x+threadIdx.x;

if ((Row < Width) && (Col < Width)) {

int Pvalue = 0;

for (int k = 0; k < Width; ++k)

Pvalue += M[Row*Width+k] * N[k*Width+Col];

d_P[Row*Width+Col] = Pvalue;

}

}

void main() {

dim3 dimBlock(blocksize,blocksize,1);

dim3 dimGrid( ceiling (double (N) /dimBlock.x), ceiling (double (N) /dimBlock.y), 1 );

add_matrix_gpu<<<dimGrid,dimBlock>>>(a,b,c,N);

}

Use the following pseudo code for matrix initialization.

int *a, *b, *c;

A=malloc(sizeof(int)*N*N; //N is the size

//then malloc for b and c

Int init =1325;

For (i=0;i<N;i++){

For (j=0;j<N;j++){

Init=3125*init%65536;

A[i,j]=(init-32768)/6553;

B[i,j]=Init%1000;

}

}

Use the following matrix size and thread block size (the number of threads in each block).

Matrix Size Size of Thread block
8*8 4*4 (For debugging purpose)
128*128 16*16
500*500 16*16
1024*1024 16*16

Requirements:

1. In order to use the cuda compiler environment installed under the cs unix server, fry.cs.wright.edu, you need to connect to this unix server remotely using a secure shell client, such as putty. You can remotely connect to this unix server, fry.cs.wright.edu, on campus from a Wright State computer or use your own laptop connecting to the WSU wifi network named “WSU-Secure”. Note that you cannot remotely connect to this computer using ssh using computers outside Wright State University without installing VPN or use the campus “WSU_EZ_CONNECT” wifi network. If you want to connect to this server remotely off campus, you need to install VPN on your computer first. If you want to edit your cuda source programs under windows, download notepad++. Then edit your source programs using notepad++. After you finish editing the cuda source programs, using the secure file transfer client (WinSCP, you can download it online, and install it on your personal computer) to transfer your cuda source programs to fry.cs.wright.edu.

2. You must submit an ELECTRONIC COPY of your source program through Pilot before the due date. If for some reason Pilot is unavailable, submit your source code by email to meilin.liu@wright.edu.

3. Submit all your source codes, a README file, a report, and any other required files. It is required that you explain how to compile and run your programs clearly in the README file. In the report, please report whether your programs have all the functionalities required in the project description. In your report, please state clearly any functionalities not implemented in your program. If your program works correctly, please include screenshots in your report. Your submitted file name should use your last name as part of the file name, for example, Liu_Project1.cpp, Liu_Project1_Report, Liu_Project1_ReadMe, etc. All the submitted project files should have: Course Number / Course Title, your name, group member’s name, prof.’s name, date, and the project name. If you did not include these required contents in your submitted files, then 5 points will be deducted.

4. The grader or the instructor will test your programs under CUDA environment, on the linux server, fry.cs.wright.edu. Before you submit your program, please connect to this server using your campus ID to test your program (I have demoed how to compile and execute a cuda program on this server. If you have questions, let me know).

5. The programming assignment is individual. You must finish the project by yourself. If you allow others to copy your programs or answers, you will get the same punishment as those who copy yours.

How to use CUDA on fry.cs.wright.edu

First using putty or other secure shell clients to connect to fry.cs.wright.edu using your campus id (for example, w123abc), then run the following command:

srun -p a100 –gres=gpu:1 –pty bash

This command will request access to a gpu node and launch a bash shell on it.

Then you can compile a cuda program vectadd.cu using the following command under the directory where your source cuda program is located.

nvcc vectadd.cu -o vectadd

Then you can execute vectadd using the following command under the directory where the generated executable file (of your cuda source program), vectadd, is located.

./vectadd

The Colonial Period

The Colonial Period

https://geniusproessays.com/

The Colonial Period: Literary Essays Throughout the course, you will write and submit two literary essays. For each paper, you will analyze the works of an author you choose from an assigned period of American literature. The essays and their due dates are as follows: a. The Colonial Period or The Revolutionary Period (1620-1820) (3 to 5 pages) 1. Your task for your author study will be to discuss what themes your author typically wrote about, how his/her works helped shape the literature of the period, and what makes his/her writing style unique. 2. You will not write a biography of the author. Biographical information, unless it is directly related to his/her literary themes, should be limited to the introductory paragraph. 3. You will not summarize any of the author’s works. You may assume that your reader is familiar with and has read the works you are discussing. 4. The text of your papers must be a minimum of three pages and include no more than five pages. The Works Cited page does not count as part of the text. 5. Each paper must include researched information from at least TWO scholarly sources. Wikipedia is not a scholarly source. High school cheat sites such as SparkNotes, Shmoop, Cliff’s Notes, Gradesaver, etc. are also not scholarly sources. I highly suggest using the library research databases. 6. Each paper must be written in correct MLA (9th Edition) format, which must include proper in-text and/or parenthetical documentation of both primary (author’s work) and secondary (outside) sources. You may use APA format; however, I suggest using it ONLY if you’re both well experienced and comfortable with it. NEVER combine MLA and APA formats in the same paper.

7. Each paper must include a properly formatted Works Cited page (References page with APA) that lists all primary and secondary sources. I must be able to identify where you used each source listed in your text, either by in-text citations or parenthetical documentation. 8. Type each paper double-spaced throughout using with 12-point Times New Roman font. The beginning of each paragraph should be indented with one tab space. There should be no boldface or underscored text. 9. Quotes are acceptable, but long or excessive quotes ruin essays by making them B O R I N G. You also risk being charged with plagiarism when your paper is too heavy on quotes and lacking in personal analysis. When more than 10% of your paper consists of other people’s words, YOU HAVE A PROBLEM and likely a plagiarism charge coming. Use quotes only when absolutely necessary (not to fill up pages), and it’s best to embed parts of them within your own words. Be sure to cite all researched information, both quoted and written in your own words. Refer to the handout “Integrating Sources” to help with summarizing, paraphrasing, and quoting researched information. 10. If you need help with either MLA or APA format or with using the library databases, you may visit or call any of the campus libraries during business hours or visit http://www.lonestar.edu/library/ and use the Chat with the Librarian feature on the LSC Libraries web page. The page includes numerous resources for research and citations. Do not just guess when it comes to formatting and documentation. It can cost you up to 25 points if your documentation and formatting is incorrect. 11. Tutoring is available on all LSC campuses. Online tutoring is also available. 12. Papers must be submitted in the proper D2L Dropboxes by their due dates. You may submit unlimited copies. I will grade only the last copy you submit. 13. See the Grading Rubric for Literary Essays to understand how your essays will be graded. 14. Papers will be graded holistically; however, students may choose in advance to have the paper graded conference style during office hours. Again, when it comes to formatting, NEVER just guess when you are not 100% sure. ALWAYS get help. Formatting errors receive high point deductions and can result in your paper being marked “Not Gradable”. Check the Academic Integrity section syllabus to see what constitutes plagiarism. Copying someone else’s work from books or websites and presenting it as your own—either intentionally or unintentionally—constitutes plagiarism. Submitting an assignment that has already been submitted in another class is an act of

plagiarism, even if you wrote the assignment yourself. NEVER attempt to recycle a paper.

 

Grading Rubric for Literary Essays

1. Content

The essay provides a clear original examination of how the author’s works are both unique and characteristic of his/her literary period. The student presents a thesis-driven essay with strong supporting details, incorporating researched evidence from at least two scholarly secondary sources. The text of the essay meets the three to five page minimum.

2. Format

Correct MLA Format

3. Organization.

The paper shows a thoughtful, logical, and clear layout of concepts. Transition sentences are smooth and quotes and/or researched information is embedded seamlessly into the student’s original writing. The paper is easy to follow.

4. Conventions

Work has been proofread. The essay contains no grammatical or spelling errors that take away from comprehension

5.

Patient’s Health Care

Patient’s Health Care

https://geniusproessays.com/

Patient’s Health Care: Your job for this week is to create a proposal that includes the following:

You have the option of two types of research. Please note that in future weeks you will be asked to source some data that can then be used for charts and analysis. Consider this as you select the technology you want to discuss. Contact your instructor if you have any concerns or questions about your topic. The two options for your research are below.  You only need to pick one of them for your document.

  • Research a medicine, vaccine, or drug that can help with diseases or a patient’s health care. Some examples could be:
    • Cancer
    • Mental Health
    • Infectious diseases
    • Brain disorders
    • HIV/AIDs
    • Etc.
  • Research a technology that can potentially be implemented or is already used in a health care setting. Some examples could be:
    • Virtual Reality
    • Artificial Intelligence
    • Blockchain
    • Internet of Medical Things
    • Innovative medical equipment
    • Etc.

Create a folder under your COMP150 research folder called “Week 3 Draft”. Next, create a new word document and name the file “YourName_COMP150_W3_Assignment.docx”.

You will then write a two to three page draft that discuss the following topics and create a PDF version of your work. If your selected technology has other areas that you would like to discuss, feel free to discuss them as well.

  • Technology, medicine or drug background (what it does, how does it work? etc.)
  • Benefits of a technology, medicine or drug
  • Costs
  • Reasons why it should be considered for implementation
  • Risks and final considerations

Make sure to apply the different formatting and options as provided below

  • All APA guidelines apply to this document except for some requests as detailed below. Please note that these requests may go against the overall APA guidelines but are used to determine your understanding of the concepts explained in the course.
  • The company’s colors are blue and gold. Select and apply a theme that matches these colors.
  • Include a separate cover page with the title of your company (Chamberlain Research Lab). Make sure to apply an effect to the title and change the title’s color to blue.
  • Change the font size to 14 and the font type to “Calibri”.
  • Make the first paragraph spacing 3.0 and add a border around it. The rest should follow APA formatting.
  • Make sure to include at least one list of items (numbered or bullet).
  • Modify the paragraph style options to be size 14 and Calibri type.
  • Change page margins to 0.5 for all sides.
  • Create a header that includes the date and page number.
  • Create a footer that includes your name and the course code COMP150

Student’s Weekly Discussion

Student’s Weekly Discussion

https://geniusproessays.com/

Student’s Weekly Discussion: Make a follow-up of a student’s weekly discussion and respond with your opinion regarding to her post

 

——You don’t have to post this in APA format necessarily, it’s just giving feedback to the student with a paragraph, it doesn’t have to be a lot of text—-

Leticia Blanco

Paragraph one: What would you do as a nurse leader or nurse manager (depending on your last name) if your policy or procedure conflicts with the most recent evidence? Describe your response to this nurse.

As a nurse leader if I was charge when this happened, I would advise my floor nurse to not complete the procedure on the patient until we have clarified with our manager and MD to what best practice is. I always told my nurses that they did not have to do anything they felt would not be the best thing for the patient or for the license. In this case I wouldn’t expect my nurse to put their license or their patient at risk for a procedure that is outdated and not best practice. I would also praise the nurse for doing research and knowing that this procedure is not best practice.

Paragraph two: Why is it important to update policies and procedures? What are the risks if they are outdated?

The biggest concern of needing to updated policies and procedures is simply patient safety. The Joint Commission is responsible for monitoring patient safety and if an outdated policy or procedure is exposed to a patient it may be triggered with inconsistency with the Joint Commission (Irving, 2017). If a nurse performs an outdated procedure and a bad outcome is the result for that patient then the hospital could be liable for the damages. Now to be honest the most important thing is not the fact that the hospital could be liable and have to pay for damages, it’s the fact that the patient endured damage from an outdated procedure. Patient safety should always be the main concern for medical personnel and they should always be aware of the procedures and policies they are using for patients.

Paragraph three: What is your role as a nurse leader or nurse manager (depending on your last name) in assuring policies or procedures are up to date?

My role as a nurse leader is to make sure that my floor nurses have support and a resource to be able to ask questions and express concerns to. When assuring policies and procedures are up to date I need to be knowledgeable in the policies and procedures on my current floor so I can educate when one is not being followed or is out of date. Part of my job as a nurse leader is to make the shift go easier and smoother for my floor nurses. I should be the one making sure what they are doing is best practice because they are busy providing the care and shouldn’t have to worry all day about if what they are doing is best practice. As mentioned in the lesson, nurse leaders are often the forefront of revising procedures to be consistent with current evidence (Huston,2020).

Resources: Where did you find your data?

 

Huston, C. J. (2020). Professional issues in nursing: Challenges and opportunities (5th ed.). Wolters Kluwer.

Irving, A. (2017, January 4). Policies and procedures for healthcare organizations: A risk management perspective. Patient Safety &amp; Quality Healthcare. Retrieved August 28, 2022, from https://www.psqh.com/analysis/policies-and-procedures-for-healthcare-organizations-a-risk-management-perspective/