Case - detect excessive shock using phones sensor data

Assignment Help Computer Network Security
Reference no: EM132316533

Objectives

This assessment item relates to the unit learning outcomes as stated in the unit profile.

Enabling objectives
1. Analyse a case study and identify issues associated with the business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business problems;
4. Prepare a document to report your activities using text and multimedia (for example screenshots, videos).

General Information

The purpose of this assignment is to create a cloud based simulating environment which will help to identify/understand the problem stated in the given case study using analysis tools available in IBM Bluemix. In assignment three, you are working individually. By doing this assignment, you will learn to use skills and knowledge of emerging technologies like cloud computing, IoT, to simulate a business scenario to capture operational data and share with a visualization tool. You will acquire a good understanding of smart application design in a cloud environment for efficient application configuration and deployment.

What do you need to do?

The assignment requires you to do the following -

• Choose a case study out of given two below and analyse the case study to understand the business problem and required tasks assigned to you to address the problem.
• Design and develop smart application to execute all required tasks given in your chosen case study.
• Finally prepare a report according to given format and specifications below and submit it in Moodle.

Report format and specifications -

You are required to submit a written report in a single Microsoft Word (.doc or .docx) document. There is no word limit but any unnecessary information included in the report may result in reduced marks.
The report must contain the following content (feel free to define your own sections, as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the IBM Watson IoT Platform and NODERED applications
o Login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report -
o Identify four business improvements that can be addressed by your extended modules.
o Were the collected sensor's data effective to develop required tasks in the extended modules? Why or why not?
o Suggest collection of five new sensor data elements (other than data already collected) which could be helpful to develop extended modules better.
o The step by step process you have followed to configure and deploy the application. You may choose to use screenshots and notes to enrich your report but you must have a video of the process.
o Video link of you working while deploying and configuring
o Difficulties you faced -
o What are the difficulties you have faced during the process of app deployment and data collection?
o How did you address those difficulties?
o How is the application development and management in cloud different than traditional application management?
o Conclusion
o References

Choose a Business Case only for the assignment

Business Case One: Detect excessive shock using phone's sensor data

AB Pty. Ltd is a smart application development organization in which you are a member of a PaaS based smart application development team. Currently, you are working to a project to develop a smart application to detect excessive shock based on accelerometer and orientation data of the phone's sensor. You have already worked on an application in your week 9 activities to collect phone sensors data in IBM Cloudant using Watson IoT Platform and created visualizations. Now, you are assigned to develop extended modules to detect excessive shock using accelerometer and orientation data collected from the phone's sensors. As per the customer's requirement, you need to design to design and develop the followings.

1) An IBM NODERED system to -
• send an email alert to you when the shock is detected,
• display shocks over time using a line graph/chart,
• store excessive shock events in IBM Cloudant database using NODERED flow and
• identify the orientation (upright to a horizontal position only) of the phone to display in debug pane.

2) An IBM Watson IoT Platform dashboard system to
• display shocks over time using a line graph/chart.

Business Case Two: Controlling speed of the conveyor belt

AB Pty. Ltd is a smart application development organization in which you are a member of a PaaS based smart application development team. Currently, you are working on a project to develop a smart application to remotely monitor and control the speed of a conveyor belt. You have already created a simulated application in your week 10 exercise to monitor activities of the conveyor belt and collect sensors data in Watson IoT Platform and created visualizations. Now, you are assigned to develop extended modules to remotely change the speed of the conveyor belt to adjust with the packaging speed of a particular product. As per the customer's requirement, you need to design and develop the followings -

1) An IBM NODERED application to
• Calculate the time of operation between each stop and start,
• store speed change, start and stop events in IBM Cloudant database,
• change the speed of the conveyor belt remotely and

• email alert on speed change over a set speed limit (Choose your own speed limit)

2) An IBM Watson IoT Platform dashboard application to
• display speed change events over time using a line graph/chart and

Note: Only do business case one 

Attachment:- Cloud Computing for Smart Applications.rar

Attachment:- lab.pdf

Verified Expert

In this assignment, we have shared the steps to create an account in IBM Watson with all the screenshots so that it will be easy for the user to follow.

Reference no: EM132316533

Questions Cloud

Discuss the potential implications of kobe steel : Can you discuss the potential implications of Kobe Steel's actions on each stakeholder or stakeholder group? can you give provide examples?
Solving problems and improving organisations : What is the importance of systems both hard and soft in solving problems and improving organisations?
Outline techniques for dealing with customers : Outline techniques for dealing with customers including customers with specific needs.
Submit complete case analysis of case in drucker : Complete and submit your case analysis of Case 2 in the Drucker, Peter F. (2009). Management Cases, Revised ed. New York, NY: Collins Business,
Case - detect excessive shock using phones sensor data : Calculate the time of operation between each stop and start - identify the orientation of the phone to display in debug - Process of app deployment
Determine for the month of march cost per equivalent unit : Alpha Company, on March 1, 2017 has a beginning Work in Process inventory of zero. All materials are added into production at the beginning.
Creating a simple chess program : JAVA Assignment - For this assignment you will start creating a simple chess program. Your program will consist of 11 java files in 3 packages
Discuss the individual reflection assignment : Discuss the Individual Reflection Assignment, Individual Reflection Assignment, Individual reflective journal
Discuss the steps involved in the audit planning process : Explain the incentives, opportunities and attitudes the auditor should be aware of in considering the risk of misappropriation of asset fraud.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Speculate on the implications of improperly documenting

Speculate on the implications of improperly / incompletely documenting the solutions to the network issue provided in Part 1 of the discussion.

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Overview of network security assignment

Identify and report network threats, select and implement appropriate countermeasures for network security - evaluate suitable candidates for this prestigious

  How system shall recover from attacks failures and accidents

Discuss how the system shall recover from attacks, failures, and accidents. Discuss how the system will address User Account Management and related security improvements.

  Pros and cons of very simple plans versus detailed plans

Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the plans that add a level of complexity

  Assignment hi i am need your help in my assignment can you

hi i am need your help in my assignment. can you please help me. the date has already been passed i.e. 249 2014. so i

  Screen element of ms word

A screen element of MS Word that is usually located below the title bar that provides categorized options is known as ?

  Method of establishing compliance of it security controls

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Explain prudent policy to protect datafrom corruption-theft

The opposing require to protect this data (from corruption and theft) which typically means controlling access to much/all of the data? What policy is prudent here?

  Clearly describes the security strategy being proposed

Clearly describes the security strategy being proposed. Strategy covers the confidentiality, integrity and availability. Link Solutions by clearly describes the linkage between each technology and the strategy.

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd