Task back to top WHAT TO DO: Tasks 1 and 2 below TASK 1 Annotated Bibliography 20% Write anAnnotated Bibliography for your Capstone Topicwith a collection of12 articlesfollowing a set structure. The...

1 answer below »

Task



back to top


WHAT TO DO: Tasks 1 and 2 below


TASK 1 Annotated Bibliography 20%



  1. Write anAnnotated Bibliography for your Capstone Topicwith a collection of12 articlesfollowing a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.

  2. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers - CSU supports the use ofEndNote. (available on iPad). EndNote is a bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats.

  3. As a CSU student you can download and installEndNote X7for Windows or Mac OS platforms fromhttps://online.csu.edu.au/division/dit/software/core.html

  4. ForGroup Work OPTION teams only: Assessment Item 3 Annotated Bibliography is doneINDIVIDUALLYbyALLstudents.

  5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements foracademic integrity.

  6. You can get help inBuilding and Writing an Annotated BibliographyfromTopic 3Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from:

    1. Study Resources (PDF files to download):http://student.csu.edu.au/study/resources

    2. APA style Referencing fromhttp://student.csu.edu.au/study/referencing-at-csu.

    3. The CSU Library website for LibGuides in Information Technology, Computing and Mathematics athttp://libguides.csu.edu.au/cat.php?cid=66969

    4. EndNoteBibliographic software and tutorials LibGuide athttp://libguides.csu.edu.au/endnote



  7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a12-article Annotated Bibliographyon your topic.

  8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on theCSU Library websiteathttp://www.csu.edu.au/division/library


As an example, the Capstone TopicPRIMOsearch on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic:





Library Resources


Information Technology Journal Databases:http://www.csu.edu.au/division/library/find-info/databases/subject/infotech

Information Technology & Computing LibGuides:http://libguides.csu.edu.au/itc



The following questions may be useful while reviewing the topic:



  1. What is the new technology?

  2. What does it do and what are the special features it has?

  3. When is it coming out in the market and how much will it cost?

  4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).

  5. In your opinion, will the new technology be beneficial to society? Why or why not.

  6. What did you learn from a critical analysis of your sources of information on this new technology?




TASK 2 Self-Evaluation Report on Originality (100-150 words) 5%



  1. Select an800-word sampleof annotations from Task 1 and submit it for testing at eitherTurnitinturnitin.comorSmall SEO Tools Plagiarism Checkerhttp://smallseotools.com/plagiarism-checker/sites.

  2. Save a copy of theoriginality report obtained from the chosen site.

  3. Critically evaluate and interpret theoriginality report, from your context or point of view as your personalSelf-Evaluation Report on Originality(100-150 words).

  4. Append this short evaluation report to the saved copy oforiginality reportfrom the chosen site as Task 2 completed.

  5. Finally submit the combined Tasks 1 and 2 via Turnitin as required.




Turnitin is more than a ‘gotcha’ device – it is an effective learning tool:


Because the sophisticated use of sources involves a complex set of research, critical thinking, and writing skills, you should expect to take several years to master them. Turnitin can be a helpful tool in this developmental process. You should use your originality reports as feedback on a first draft so that you can improve your use of sources before submitting the final draft for marking.


Interpreting the Turnitin Originality Report:


After you submit your draft to Turnitin for self-checking, you should look carefully at the originality report so that you can improve on your use of sources. Your essay will be on the left side of the screen, and the matching colour-coded sources will be listed on the right. Then you can make the necessary changes to your essay before you submit the final draft for marking.


You need to register with Turnitin to create a Student Account under the CSU Turnitin Licence athttp://www.turnitin.com/login_page.asp



Further information on how to use Turnitin can be found through the following link:http://student.csu.edu.au/study/plagiarism/checking


Rationale



back to top


This assessment task will assess the following learning outcome/s:



  • be able to perform literature searches and critically analyse the literature in the chosen topic.

  • be able to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic.


The rationale of this assessment is to test your ability to review, evaluate, critique and support others opinions as well as existing literature, using a scholarly writing style. You will also demonstrate your ability to carry out independently research and locate information from various sources such as journals, conference proceedings, online databases, eBooks and industry magazines.


TheLearning Outcomesbeing assessed in this second task include your ability to perform literature searches and critically analyse the literature in the chosen topic and then to critically reflect on and synthesize complex information, problems, concepts and theories in the chosen topic. As the Annotated Bibliography develops, so will also be demonstrating your advanced communication and academic writing skills in transmitting your capstone experiences and ideas to others.


What does a well constructed annotated bibliography contain?


That is a research topic on its own, however I recommend the list of SIX structural elements below



  1. Interpretation and evaluation of an overview of recent trends in emerging technologies and innovation;

  2. Evidence of literature searches and critical analysis of the literature in the chosen capstone topic;

  3. Critical reflection and synthesis of complex information, problems, concepts and theories in the chosen topic;

  4. Original opinion on the benefits of your capstone project to others;

  5. Reflective comments on what was learnt from a review of the literature;

  6. Use of correct citations and referencing conforming to recognised referencing format.


TheChecklist for the Annotationselements can be used as a quality check as you write:


Content Elements



  • Coverage of topic

  • Depth of discussion

  • Development of argument and reasoning

  • Selection of literature


Writing Style Elements



  • Structure of review

  • Technical competence

  • Use of citations and quotations

  • Referencing


Task 2is designed for you to learn the functions of the Turnitin software.


Marking criteria and standards



back to top


Information and Research Tools and Techniques: Annotated Bibliography 20%


Contains 12 articles on the chosen topic, recognition of research methods used in the articles and synthesis of data, findings and ideas)



Task 2 Turnitin original report
Value 5% (5 marks)
Submission via Turnitin. (2 marks)Q&A section (3 marks)


Presentation



back to top


The Annotated Bibliography should be presented in form of:



  • submit as a PDF file

  • include a References appendix in APA style

Answered Same DayAug 29, 2020ITC571Charles Sturt University

Answer To: Task back to top WHAT TO DO: Tasks 1 and 2 below TASK 1 Annotated Bibliography 20% Write anAnnotated...

Kuldeep answered on Sep 03 2020
159 Votes
Annotated Bibliography
Annotated Bibliography
Annotated Bibliography
Student Name
University Name
Unit Code
Unit Name
Contents
Annotated Bibliography    3
Task 2    12
References    13
Annotated Bibliography
Adas, A. (2011). SCADA Wireless Wide Area Networks. Journal Of King Abdulaziz University-Engineering Sciences, 22(1), 61-39.
In this article, authors studied a digital and wireless network (DWWAN) for surveillance and data acquisition (SCADA) for electricity networks, designed to place 56 nodes (28 links) over the rough mountains. A radio network comprises of a set of the transceivers (stations) that share a co
mmunal radio channel and communicate with each other by utilizing the channel. Every transceiver has geographic area where it can converse with the other transceivers. In the multi-hop DWWAN, communications are sent to a designated node via series of middle transceivers. The authors found an overview of digital widescreen wide area network (DWWAN) outline for tires below ten GHz, because these frequencies have very little rainfall and extended propagation distances. The system is outlined to cover 4 GHz band, covering fifty-six nodes, with 28 links in rough mountains and a longest link of 53.44 Km. When integrated with a SCADA station, WWAN can act as the broadband wireless network. The SCADA network uses a remote terminal unit and a freight distribution centre (LDC) (a large number of processors or supercomputer groups) that provide window management features that cover intricate dynamic system management and data collection. The application of SCADA [12,13] in power system management is required to effect window management and control of intricate dynamic changes, for example, load changes, power switch protection relay, error isolation, generator retrieval, telemetryand remote video transmission. Cover all the parameters of distribution, power generation and safety. An overview of the wireless WAN connects power stations and substations that cover large, rugged mountains.
Article 2: Ma, X., & Yu, X. (2013). Improvement on LEACH Protocol of Wireless Sensor Network.Applied Mechanics And Materials, 347-350, 1738-1742.
In this paper, authors suggest using the two-hop stratification method in the sensor field to improve the efficacy of nodes that decrease quickly during LEACH transmission. By presenting a two-hop technique in data transfer, multi-hoptransmission and short-rangetransmission technique is proposed amid group heads for the remote transmission. By presenting partial multi-hop technique in data transfer, single-hop technique for short-distance transfer methods amid group heads for remote transfer is introduced. The authors found that DL-LEACH, the energy consumption of remote transmission grouping heads, reduced the energy efficacy of sensor nodes by lowering transmission distance as well as make simpler the short-distance transmission procedure. The authors conclude that it is suitable for a wider range of sensors than the general LEACH.
Article 3: Nakayama, Y., Maruta, K., Tsutsumi, T., & Sezaki, K. (2018). Wired and Wireless Network Cooperation for Wide-Area Quick Disaster Recovery. IEEE Access, 6, 2410-2424.
According to authors it is one big challenge for the telecom network operator to restore the communication service in the catastrophe area. To increase the telecommunications service in the affected area, this question paper provides wired as well as wireless networking systems. When wired contact with the optical tree network's wired contact obstructs, the remaining lead nodes leave data packets from the nodes via virus bypass routes. The advantage of this method is faster and higher efficiency, with single-hop wireless bypass routing backed up to the wired network. The best way to wireless links is to solve the binary integer programming problem and calculate it to increase expected throughput. They found that the cost of the holders who were strongly supported by the proposed system was effective because they could be deployed in the optical network's blinking nodes with minimal functionalities. To overcome the limitations of the proposed method, delivery of address nodes is done by extension of request, further recovery nodes might be used to advance the anticipated throughput. The authors have concluded that the numerical simulation of access control access controls, with multiple accesses to carrier sensors, with the avoidance of collision, indicates that proposed technique can attain a higher turnover than the existing bypass method of routing. Top of the wired network topology the deadly beat mode of interrupted wired interaction is an activated accelerator button resumed via Wireless network. Bypass way is set to increase the expected total PHY-level wireless link a throughput. Additionally, the extent of a proposed node extension depends completely on the requirements fixed by additional recovery-required execution.
Article 4: Yoon, J., Sen, S., Hare, J., & Banerjee, S. (2015). WiScape: A Framework for Measuring the Performance of Wide-Area Wireless Networks. IEEE Transactions On Mobile Computing,14(8), 1751-1764.
In this article, the author introduces WiScape, an outline for benchmarking as well as understanding the behaviour of the wide wireless networks, for example, by using a countrywide or nationwide cellular data network with active customer involvement. WiScape's goal is to offer a rough grain version of the wide wireless environment, enabling users and operators to understand the wide range of network performance features. The main finding of this paper is that in WiScape the central controller instructs the customer to collect the smallest measurement samples in an opportunistic manner on time and place. To bound the overall of this dimension framework, WiScape divides the world into regions, has a neighbouring region that is comparable to the user experience, and divides time into region-specific periods, with relatively stable network statistics. For every period in each region, WiScape takes a minimalist performance. It tries to gather small amount or number of the measurement sample to describe customer experience in a particular time zone. This limits the bandwidth and energy overhead that is used for...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here