Critically evaluate data analytics techniques

Assignment Help Other Subject
Reference no: EM132462645

CTEC5126 - Pervasive Systems - De Montfort University

Internet of Things Assignment:

Outcome i: Demonstrate understanding and knowledge of IoT key technologies and protocols

Outcome ii: Critically evaluate data analytics techniques and understand how they are applied in IoT

Outcome iii: Critically assess data visualisation technologies and understand how they affect the implementation of IoT systems

Outcome iv: Identify non-technical challenges that affect the development and deployment of IoT systems

Section 1: A simple intrusion detection system

Figure 1 depicts an intrusion detection system composed of a motion sensor, MCU controller, an alarm, a webcam, and an RGB LED light. When a movement is detected, the alarm goes off; the camera switches on; and the light goes red, green, and amber successively.

Problem 1) Build in Packet tracer the system in Fig. 1-a. You must submit the pkt file together with your coursework.

Problem 2) Demonstrate the behaviour of the system using simulation screenshots.

2189_Intrusion detection system.jpg

Fig. 1: A simple intrusion detection system

Section 2: Smart home

Consider the IoT system in Fig. 2. It allows a user to control the IoT devices in their home and their office using a PC at the office or remotely via a smartphone. The IoT devices include a webcam, a motion sensor, a coffee machine and 2 lamps (light). These devices are registered with an IoT server located the cloud. The system enables to monitor and control the IoT devices from a smartphone via a 3G cellular network. Indeed, each of these IoT devices can be turned on/off from a smartphone. In addition, the IoT server is configured so that the webcam and lamp automatically turn on when the motion sensor detects a movement in the home.

2083_Smart home.jpg

Fig. 2: Smart home

Problem 1) Create the IoT system shown in Fig. 2 in Packet Tracer. You must submit the pkt file together with your coursework.

Problem 2) Show by simulation that the user can control the IoT devices from a smartphone and the office PC.

Problem 3) Show by simulation that the webcam and the lamp turn on when the motion sensor detects a movement.

Section 3: Data Analytics and Visualisation

Problem 1) Trend Analytics and content analytics are 2 types of data analytics. Compare their analytics capabilities based on a critical review of the literature, with clear references. 300 words excluding references.

Problem 2) Give critical review of common data visualisation techniques for IoT systems. 300 words excluding references.

Problem 3) Consider a popular football stadium that hosts a derby match for local rivals. It is important that fans are kept safe and the match ends with minimal disruption. The stadium management uses video cameras to capture audio, images, and images in strategic places inside and outside the stadium. The aim is to use the resulting data to identify in a timely fashion, incidents that may lead to disruptions - fights, abuse, or stampedes and notify the stewards.

i) What analytics capabilities are needed to realize the solution?
ii) What analytics type should be implemented?
iii) What combination of tools can be used to implement the solution?

Section 4: Design your own IoT system

Problem 1) Propose your own IoT system for a specific application. This must not be a close version of any of the systems described in this coursework. Give a detailed description of the functionalities of your system.

Problem 2) Give a detailed critical literature review of existing related systems with clear references, and demonstrate the novelty of your proposed system. 600 words excluding references.

Problem 3) Identify and justify the technologies needed for the implementation of the proposed IoT system.

Problem 4) Implement your system in Packet Tracer. You must submit the pkt file together with your coursework.

Problem 5) Give the simulation in Packet Tracer (screenshots) of the main functionalities of your system.

Problem 6) Identify and justify the data analytics and visualisation techniques that apply to your proposed system.

Section 5: Modelling and Analysis

A Simple Infostation-based Communication System

An infostation system is an infrastructural system concept that provides many-time, many- where wireless data services. This case study is a simple context-aware infostation-based system, which allows users to exchange text messages using mobile devices such as laptops, smart phones or tablet computers. Typically, an infostation system comprises one central infostation centre (ISC) and many wireless access points, called infostations (ISs), deployed at key positions to maximise coverage. The ISs are physically connected to the ISC via network cables.

In this example we consider a university that has 2 campuses A and B. Each campus has its own infostation system (with one ISC and many ISs). The ISCs of the 2 campuses are physically connected by cables to a network hub to enable users located at different campuses to exchange messages, as depicted in Fig. 3.

385_communication system.jpg

Fig. 3: An infostation-based communication system

An infostation is aware of any mobile device within its range and is able to interact with the device, e.g. by exchanging messages. A user within the range of an infostation can send or receive text messages using a mobile device. For the sake of simplicity, we assume that a text message has the following format: (sender, recipient, message). E.g. send(bob, alice, hello) means bob is the sender, alice the recipient and hello the message.

Once an infostation receives a text message, it checks if the recipient is within range in which case it forwards the message to the recipient. If the recipient is not within the range of that infostation, the infostation forwards the message to the infostation centre it is connected to.

An infostation centre is aware of all the infostations connected to it and subsequently of all the devices within the ranges of these infostations. However, an infostation centre has direct communications only with the infostations and the network hub connected to it. When an infostation centre receives a text message from an infostation, it looks for the infostation where the recipient is located and forwards the message to this infostation. The infostation where the recipient is located then forwards the request to the recipient mobile device. If the recipient is not found in one campus, the message is forwarded via the network hub to the infostation centres of the other campus for delivery.

When the network hub receives a message from one ISC, it sends the message to the other ISC.

What to Do

You are required to model the Simple Infostation-based Communication System in the Calculus of Context-aware Ambients (CCA) and to analyse this model using the CCA simulator ccaPL. We assume there are four ISs and one ISC in each campus, named as in Fig. 3 (IS1a, IS1b, ...) and two user mobile devices (Bob's and Alice's). Each of these entities and the network hub can be modelled as an ambient in CCA. We say that a user's mobile device is in the range of an infostation IS if the ambient modelling that mobile device is a child ambient of the ambient representing the infostation IS.

Answer the Problems 1) to 8).

Modelling

Problem 1) Give a ccaPL specification of the ambient modelling the infostation IS1a.

Problem 2) Give a ccaPL specification of the ambient modelling the infostation IS2a.

Problem 3) Give a ccaPL specification of the ambient modelling the infostation centre ISC1.

Problem 4) Give a ccaPL specification of the ambient modelling the infostation centre ISC2.

Problem 5) Give a ccaPL specification of the ambient modelling the network hub.

Analysis

Assume Bob is initially in the range of the infostation IS1a in the Campus A. He then moves from IS1a to IS1d, sends a hello message to Alice, and finally moves to IS1c. In the meantime, Alice is in the range of the infostation IS2b in the Campus B, but on the move to IS2c and then to IS2a. She will receive Bob's message at some point during this journey. For simplicity, it is assumed that a single ambient called bob represents Bob and his mobile device. Similarly, Alice and her mobile device are modelled as a single ambient alice.

Problem 6) Give the specification of the ambient representing Bob's mobile device.

Problem 7) Give the specification of the ambient representing Alice's mobile device.

Problem 8) Give the simulation results of the system for the scenario described above. These results must include: (i) the listing of the execution output; (ii) the corresponding communication graph; (iii) the corresponding behaviour graph; and (iv) a clear explanation of the execution output.

Reference no: EM132462645

Questions Cloud

Should contact the audit committee about the cfos act : As part of your duties as the auditor, should you contact the audit committee about the CFO's act? Support your answer by researching
How does your mentor teacher connect instruction : How does your mentor teacher connect instruction to students' backgrounds and interests? How does your mentor teacher differentiate instruction to meet the need
Compute cash collections from customers for each month : Compute cash collections from customers for each month,It is expected that 75% of the sales will be collected in the month of sale, and 25% will be collected
How many units must hohner sell to achieve : How many units must Hohner sell to achieve the same pro?t (in terms of dollar amount) next year as it earned this year? Determine
Critically evaluate data analytics techniques : Demonstrate understanding and knowledge of IoT key technologies and protocols and Critically evaluate data analytics techniques and understand.
Find the dollar value for ending inventory : Required - Using the LIFO method, find the dollar value for Ending Inventory at the end of month of May. Round to the nearest cent
What is the flexible budget for the production and sale : What is the sales volume variance, in terms of operating income?What is the flexible budget for the production and sale of 960 units?
Define due process procedures for a short-term suspension : Are the due process procedures for a short-term and a long-term suspension of a student the same or different? Are these requirements consistent with.
Discuss about the importance of ethics in elderly patients : Based on the video and power point presentations located on the First week Lecture Folder, write a 250 words essay about the Importance of Ethics in Elderly.

Reviews

Write a Review

Other Subject Questions & Answers

  Is the global economic system unfair

Who would you say has benefitted the most and who has benefitted the least from the international economic system that was created at Bretton Woods and after? Why do you suppose that is? Is the global economic system unfair?

  Thoughts and ideas with appropriate resources

Include at least one challenge to treating each type of victim. Support your thoughts and ideas with appropriate resources.

  Working with geographic information systems

Geographers have been working with geographic information systems (GIS) long before there were computers, using overlays and maps, which would seem crude today. Explore the advancement of GIS to its current state by answering the following questio..

  Which phrase best describes the research design of study

A major skill that is learned in this course is how to critically read and critique nursing research articles. The purpose for critiquing an article is to critically evaluate the research process followed by the author(s) of the assigned article...

  Discuss a variety of factors

Cultural differences are based upon a variety of factors including anthropological, geographical

  Summarize the film - mad max fury road

The papers are each worth (60) points and the due dates are included in the class schedule toward the end of this syllabus. The papers all have the same four points for you to answer: Summarize the Film

  Competence of trial juries in white collar crime cases

What is your assessment of the objectivity and likely competence of trial juries in White Collar Crime cases?

  What the terrorists do and what nations such as the us

What the terrorists do and what nations such as the United States do when they drop bombs on enemy nations knowing full well that innocent people will die.

  Explain the role grants play in the human services field

Please explain the role grants play in the human services field. Explain how and when grants are important to a human services program. Are grants more vital to some programs than others?

  A geometric gradient has a positive cash flow

A geometric gradient has a positive cash flow of $1,000 at EOY zero (now), and it increases 5% per year for the following five year. Another geometric gradient has a positive value of $2,000 at EOY one, and it decreases 6% per year for years two thro..

  Explain differences in ethics and ethical perspectives

After reviewing the tutorial and/or podcast in the background section, discuss social contract theory and apply social contract theory to a business situation.

  Identify the variables within your population

What is an interaction? Describe an example and identify the variables within your population (work, academic, etc.) for which you might expect interactions?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd