Assessment item 3IoT Research ProjectValue: 25%Due date: 15-May-2018Return date: 13-Jun-2018Length: 6000 words MaximumSubmission method optionsAlternative submission methodTaskChoose one of the topics...

1 answer below »
Assessment item 3IoT Research ProjectValue: 25%Due date: 15-May-2018Return date: 13-Jun-2018Length: 6000 words MaximumSubmission method optionsAlternative submission methodTaskChoose one of the topics given below and submit a research project, which should not exceed 6000 words.Topics to select from but not limited to:•IoT Security and Privacy Regime/challenges in all domains of IoT•IoT Smart City•IoT Mining Industry•IoT Health Care•IoT Independent Living of Older Generation•IoT for Reducing Food Wastage in Australia•IoT in Finance Industry and Security Challenges• Business Intelligence in IoT•Future of Fog Domain•IoT and Data Analytics•Big Data challenges in IoT and Cloud•Machine Learning for Intelligent Decision Making in IoT•Blockchains/ Common Currency for IoT (eg IoTA) Challenges


If you want to choose other IoT related topics please talk to your lecturer before deciding.
Please use the template from the Student resource folder.
Tasks


1.Analyse the Task -Milestone 1 Due Date 23/03/20018Analyse what is expected of you. This includes careful reading of the assignment task as specified in the Subject Outline. The executive summary of the research project to be written as an Abstract.For Analysis: i.What is the purpose of this report? ii.What is the topic you have chosen for your report? (The topic can be one specified as above, but you can come up with new ideas and topics of your choice in IoT) iii.What is the expected format of the report? (Refer to the format on Interact2) iv.Come up with a Problem Statement based on your topic, note it down and discuss it with your lecturer. v.Write a small executive summary as an abstract


2.Introduce the Problem or Challenges- Milestone2- Due Date 23/04/2018 i.Write the Introduction to the problem and domain. ii.Structure of the report including which section covers what?
3.Do the Research- Literature Review –Milestone 3- Due date 13/05/2018This is the main part of the research project and could take more time. (Referencing should be in APA6 format)i.Review of Literature based on past and current work in your topic (Download from conference proceedings, journal articles - use Primo search to access more articles and journals - Minimum 10 journals or articles)ii.Structure in chronological order and start summarising.iii.Based on the literature, list the requirements for your Project, then choose one or more requirements to work with.iv.Now you can modify your Problem Statement based on the requirements chosen for your project.v.Write the current and past methodologies used to solve your problem, the requirements and Literature Review




4. Write your Report - Final Report - Milestone 4- 20/05/2018Start writing your draft, as you do your research project. (Put it all together)i.Write an executive summary of the report (Purpose, Scope, Method, Results, Recommendation and Conclusion)ii.Write a Review of Literature based on past and current work in your topic (no more than 3 pages)iii.Briefly explain each methodology used in the past and present (5 or more methodology)iv.Compare the above methodologies from your perspective on the efficiency, simplicity, extension into other applications, time saving when used, cost saving when used, feasibility, connectivity, commercialisation issues, etc.v.Explain the methodology which best suits your application/problem based on various factors with proper justifications. This methodology can be one of the above methodologies or a combination of more than one.vi.Include tables and graphs to support your justification and argument.vii.Discuss your research findings with a conclusion.viii.Referencing should be in APA6 format.




RationaleThis assessment covers the following learning outcome:
be able to evaluate a variety of existing and developing architecture technologies for IoT;be able to describe and evaluate different applications of the IoT.Marking criteriaThe following Criteria will be used while assessing each component of this assessment item. NB All your work must be cited (CSU APA), otherwise up to 100% of marks can be deducted. All answers must be written in your own words. Copying sections of text from other sources, even if referenced, is plagiarism and is considered Academic Misconduct.
Good explanation of solution to the problem defined Goodh explanation of solution to the problem definedGood explanation of solution to the problem defined.Enough explanation of solution to the problem defined
CriteriaHDDICRPSEvaluate a variety of existing and developing architecture technologies for IoTIn depth use of a good range of relevant literature to address the points. Clearly defines various components of the IoT, with evidence of synthesis of own research and prescribed reading in topics.Evidence of using relevant literature to address the points. Correctly defines various components of the IoT with evidence of synthesising some external readings and prescribed reading in topics.Use of some relevant literature to address the points. Provides a definition of various components of the IoT. Mostly cited the prescribed text. Synthesised concepts learned from topic readings.Limited evidence of using relevant literature to address the points. Provides a definition of various components of the IoT but little evidence of linkages or connections to topic readings.Describe and evaluate different applications of the IoTIn depth use of a good range of relevant literature to address the points. Clearly defines various applications of the IoT, with evidence of synthesis of own research and prescribed reading in topics.Evidence of using relevant literature to address the points. Correctly defines various applications of the IoT with evidence of synthesising some external readings and prescribed reading in topics.Use of some relevant literature to address the points. Provides a definition of various applications of the IoT. Mostly cited the prescribed text. Synthesised concepts learned from topic readings.Limited evidence of using relevant literature to address the points. Provides a definition of various applications of the IoT but little evidence of linkages or connections to topic readings.Problems/ Solutions Thorough and comprehensive explanation of the solutions, to the problem defined. Good explanation of the solutions to the problem defined. Enough expanation of the solution to the problem definedLimited expanation to the solution of the problem defined.Review of LiteratureThorough and comprehensive research of minimum 10 journals and conference papersGood research of minimum 10 journal and conference papersModerate research of 10 journal and conference papersEnough research of 10 journal and conference papers but not completePossible Marks (%)85 - 10075 - 8465 - 7450 - 641. Abstract -10 marks
2. Introduction- 15 marks
3. Literature Review 40 marks
4. Issues/ Challenges/ Solutions- 10 marks
5. Future Research - 5 marks
6. Advantages and disadvantages- 5 marks
7. Conclusion - 5 marks
8. References and Presentation- 10 marks


PresentationYour assessment should be submitted in either MS Word or PDF format (PDF usually preserves the formatting, MS Word may not - submit ONLY one). Do not submit your assignment in any other format and also do not submit multiple copies of the assessment. Use A4 page size with Times New Roman/Arial/Calibri font and use font size 11 or 12. Please include a title, your student ID and name with your submission. Your name should also be included as a footnote, with page numbers in your document. The Assignment should be submitted on Turnitin.
References - You MUST use the CSU APA referencing style for all cited material you have used in your work (use in-text citations). You must use primary sources (ie Wikipedia is not acceptable, something you thought up yourself, because you think you know better, is also unacceptable - unless it has been published and peer reviewed, but then it would still need to be cited). All answers must be written in your own words. Copying sections of text from other sources, even if referenced, is plagiarism and is considered Academic Misconduct.
RequirementsTo complete this assessment item, you should have completed the Cisco Introduction to Packet Tracer course and read chapters 1 to 8 of the textbook.
Answered Same DayMar 20, 2020ITC560Charles Sturt University

Answer To: Assessment item 3IoT Research ProjectValue: 25%Due date: 15-May-2018Return date: 13-Jun-2018Length:...

Navashree answered on May 13 2020
155 Votes
Topic: Big Data Challenges in IoT
Abstract
Big data is the term used to address the high volume of real-time data being produced by heterogeneous sources. Usually, big data is different than the traditional concept of data. First of all, traditional and structured databases are no longer capable of storing and processing big data. The 3V’s of big data defines the characteristics of big data. The 3V’s are Volume, Velocity and Veracity. That is, big data is usually high volume of data generated from high speed or real-time systems and veracity refers to the diversity of the sources and formats covered by big data. It covers structured, semi-structured and uns
tructured data. On the other hand, cloud computing is a form of distributed computing where all can be stored and processed over a network or the Internet. Cloud computing and big data are complementary technologies and these technologies have accelerated the growth of IoT or the Internet of technologies. It covers the sensory networks, devices and data transmission mechanism that support M2M or Machine to Machine data communications. IoT have its applications in various domains for example, healthcare, transportation, RFID, smart cities, and so on. Most of the IoT infrastructure were not even possible if there were no big data and cloud technologies. The author has discussed the role of big data and cloud computing behind the emergence of IoT in this paper. The paper contains information about these three technologies and how the technologies work together and offers more efficient communication and convenience to the users of the IoT applications. However, the primary focus of the paper is on the security challenges related to the applications of big data and cloud computing in IoT. The first concern is privacy and security of data, protecting data from any kind of unauthorized access and ensuring the information security fundamentals for any IoT infrastructure based on big data and cloud technologies.
Keywords: Big data, IoT, Cloud computing, big data challenges, IoT and Big Data
Introduction
Big data and Internet of Things or IoT, both are emerging domains. However, the technologies are being adapted very rapidly. Wireless Sensor Networks or WSN is one of the primary building block for an IoT infrastructure. The sensors and actuators are used to collect data, transmit the same to some data store for further processing. Without the applications and use of proper analytics, there is no use of these data. But processing such a large volume of real-time data in various formats and coming from various types of sources, is a mammoth task and very challenging too. Hence, big data technologies and analytics are used to find out meaningful insights from the data.
In an IoT infrastructure, millions of sensors and actuators communicate with one another by exchanging information. Such a communication may be automatic and without any human intervention. So, Machine to Machine or M2M communication is a very important requirement for IoT.
In this report, it contains information about the challenges of integrating big data with IoT. So, it needs to study big data and IoT first. Then it has covered detailed description of the challenges related to management of big data on an IoT framework, data processing, data visualization, interoperability of heterogeneous IoT devices, data semantics, data fusion, data quality, data integration, data discovery and data analytics (Barnaghi, Sheth, & Henson, 2013).
The structure of the report has five main parts. The first part covers about the background details about big data and IoT in general, and then how these two are linked together. The second part covers the challenges related to big data in IoT. The third part is focused on summarizing the findings on the solutions to the challenges and problems discussed in the second part. The fifth part will cover the advantages of big data in IoT, and the scope of future research on the current topic.
Big data and IoT, both are very vast domain. Hence, it is not possible to cover each and every aspect of these technologies in this report. The scope of the report is limited to the discussion about the challenges that are related to the integration of these two technologies and notable work done in past to address the challenges.
Big Data
Big data have bridged the gap between raw data and meaningful insights for the business. Big data is the term that refers to an exponentially growing volume of data with a very high frequency of generation of data from various sources. The complexity of the data can’t be managed by the conventional data management and data storage tools, neither these tools are capable of efficiently processing the data. Big data has become an important asset for businesses. Researchers and developers have invented various analytics and information processing tools to find out critical insights from data. These insights are useful for business decision making and for automating various business processes. It has helped the businesses to take part in the digital transformation based on actionable data and various analytics that can work on massive volumes of unstructured data (Manyika et al., 2011).
Categories of Big Data
The three primary categories of big data are, structured, unstructured, and semi-structured data.
· Structured Data
Structured data is mostly stored in relational databases. It follows certain data structures and data models. This is the conventional way to store and process data using relational and other structured database management systems. Examples are the data stored in any relational database management system.
· Semi-structured Data
Semi structured data don’t follow any structural data model like relational databases. It follows some organizational properties to make the data analysis process easier. Some semi structured data can be even stored in relational databases. However, it is not possible to store all. Some examples of semi structured data are JSON and XML documents, data stored in NoSQL databases and so on.
· Unstructured Data
This is the most important category of big data as most of the part of big data is unstructured data. It mainly includes multimedia and text content. Some examples of unstructured data are videos, photos, email messages, word processing documents, web pages, audio files and various other types of business related documents. These files may have some internal structured however, the data does not follow any data model or can’t fit into a database (Chen, Chiang, & Storey, 2012).
IoT based systems mainly uses sensors to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here