Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Research Methods and Project Design

Purpose of the assessment (with ULO Mapping)

At the completion of these assessments, students will be able to:

a. Develop and apply research methods and analytical, technical, managerial and time-management skills to the analysis and design of a capstone project.

b. Identify and evaluate project management concepts and apply them to a realistic business problem

c. Research, adapt and apply the knowledge and skills acquired over the core units to plan a substantial capstone project

d. Demonstrate effective communication skills in relation to client, ethical and professional behaviour

e. Work effectively and efficiently in a team, and exercise coordination within a team Assignment-1:Project Requirements Analysisand Specification:

Sections Description

1. Introduction Is the topic introduced appropriately, and is there an overview of the report given in this section?

2. Problem domain and research questions Is there a specific research problem identified? Are the research questions relevant?

3. Background and Project Objective

Clear aim and objectives of the project.

Has literature review been conducted wellon the chosen topic (such as quality of the papers, variety of publications, including journals and conferences)?

Is the summary of the literature review clear, specific and does it capture the essence of the literature review conducted?Is the summary of all papers reviewed included in Appendix II: Literature Review Summary?[Each student should refer minimum of 6 (three journals, three conferences) peer-reviewed papers]

Does this section specify objectives of the project in a clear and concise manner?

4. Project Requirements Analysis and Specification Does this section include details requirements specifications?

Does it include a list of project requirements: Are there clear project requirements such as hardware, software, etc?

References Are citations and references given correctly in IEEE style?

Assignment - 2: Project plan and preliminary design.

Summary of the updates according to the assignment 1 feedback/comments that are provided by supervisors/unit lecturer in Appendix III.

5. Project plan and preliminary design

- Table of weekly activities
- Roles & responsibilities of each team member (in detail)
- Gantt chart appropriate to the project

- High level Project Design with diagram
- Project Design Approach of NLTK: Project with block diagrams step by stepand how NLTK work in this project (you can use UML/Use cases/flow charts). Negative marks will be given for inclusion of any software engineering or project management methodologies such as waterfall, agile, scrum, SDLC etc. Design approaches should be technical specific including techniques/technology/algorithms etc.
- Budget with references (detailed budget with specifications) - include hardware, software, human resources, etc.Project Description

Project Title: Cognitive Compliance processor

Project Definition

Background and Rational for the project

Data compliances and regulation requirements such as General Data Protection Regulation (GDPR) will be a new regulation in EU which will come into effect in May 2018. This new regulation applies to those organizations, including those outside EU, which collect and process personal data. It aims to give more control to individuals over usage of their personal data.

Right to forget - Under the new GDPR, organizations around the world must not only protect personal data but also forget personal data on request from individuals.

When a customer requests that all his or her personal data be deleted, then an organisation needs to identify all the documents where the customer's personal data reside.

Attachment:- Project Privacy Data Compliance.zip

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M93096622
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Per capita income of winterfell is 15000 with a growth rate

Per capita income of Winterfell is $15,000 with a growth rate of 4%. Per capita income of King's Landing is $25,000 with a growth rate of 0%. How long until per capita income is the same in both locations?

It networking assignment -major lab scenario -assessment

IT Networking Assignment - Major Lab Scenario - Assessment Requirements: Subnet an address space with given requirements. Assign appropriate addresses to interfaces and document them in the address table. Build the netwo ...

Wireless sensor networks wsn let users to access servers

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays c ...

Metasoft ltd is a software development company which works

MetaSoft Ltd is a software development company which works across Australia and New Zealand. The company is considering the following strategic proposal: - They plan to close down the Melbourne data centre rather than up ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

Suppose that third national bank has reserves of 20000 and

Suppose that Third National Bank has reserves of $20,000 and check able deposits of $200,000. The reserve ratio is 10 percent. The bank sells $20,000 in securities to the Federal Reserve Bank in its district, receiving a ...

Security risk assessment executive summarya detailed

SECURITY RISK ASSESSMENT Executive Summary A detailed Information security risk assessment was carried out on Fiji Directories Limited (FDL) during October 15th 2018 to October 24th 2018. FDL, an ATH group company, is a ...

Research assignmentproduce a formal 2000 word report in the

Research Assignment Produce a formal 2000 word report, in the format described in the supplied "Reports format and style" document, examining the various "Transition from IPv4 to IPv6". You are to research and compare th ...

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As