Computing Research Project | My Assignment Tutor

HND Assignment BriefSession: September 2020/February 2021 Programme titleBTEC Higher National Diploma (HND) in ComputingUnit number and title13Computing Research Project (L5)Assignment number & title1 of 1Computing Research Project (L5)Unit Leader–Assessor (s)Dr Kamran Ali, Dr Barra TourayIssue Date25/09/2020Final assignmentsubmission deadline07 – 12 June 2021/04 – 09 January 2020Late submission deadline14 – 19 June 2021/11 – 16 January 2020The learners are required to follow the strict deadline set by the Collegefor submissions of assignments in accordance with the BTEC level 4 – 7submission guidelines and College policy on submissions.Resubmission deadlineTBAFeedbackFormative feedback will be available in class during the semester. Finalfeedback will be available within 2 – 3 weeks of the assignmentsubmission date. GeneralGuidelines• The work you submit must be in your own words. If you use a quote or anillustration from somewhere you must give the source.• Include a list of references at the end of your document. You must give allyour sources of information.• Make sure your work is clearly presented and that you use readilyunderstandable English.• Wherever possible use a word processor and its “spell-checker”. Internal verifierDr M. J. HasanSignature (IV of thebrief) *mj.jobs@gmail.comDate23/09/2020 Department of Information Technology Page 2 of 6ICON College of Technology and ManagementBTEC HND in ComputingUnit 13: Computing Research Project (L5)Session: September 2020/February 2021CourseworkRecommended maximum words 3,000You are strongly advised to read “Preparation guidelines of the Coursework Document”before answering your assignment.ASSIGNMENTAim & ObjectiveThis coursework is designed to demonstrate the broad understanding and knowledge of themodule, assessing and evaluating the student’s strength and level of analysis; divided into fourlearning outcomes. The coursework should be submitted as one document in a report format infinal submission.Assignment Scenario:The Pearson-set theme for Computing Research Project is.Internet of ThingsThe Internet of Things (IoT) is the term which refers to the ever-growing network of physical objectswith embedded sensors which can connect together via the internet allowing communication to occurbetween these objects and many other Internet-enabled devices and systems.The IoT is quickly becoming a necessary aspect of people’s daily lives. Physical items can now senseand collect data which can be controlled through digital and smart technology. The IoT extendsinternet connectivity beyond traditional devices like desktop and laptop computers, smartphones andtablets to a diverse range of devices that can utilise embedded technology such as security systems,thermostats, cars, electronic appliances, lights, medical equipment etc. These devices, often called“connected” or “smart” devices, can talk to other related devices (machine-to-machine (M2M)communication) and act on the information they get from one another.This assignment will enable students to explore some of the areas of IoT from the standpoint of aprospective computing professional. It will provide the opportunity for students to investigateInternet of Things application and explore the responsibilities and solutions to the problemspresented.Students are to choose their own research topic for this unit. Strong research projects are thosewith clear, well focused and defined objectives. A central skill in selecting a research objective isthe ability to select a suitable and focused research objective. One of the best ways to do this is toput it in the form of a question. Students should be encouraged by tutors to discuss a variety oftopics related to the theme to generate ideas for a good research objective.IoT has many application areas and there are a lot of different components involved in IoT. Thereare enormous research possibilities across any of these lines. Research possibilities arounddifferent component of IoT:• The range of topics discussed could cover the following:• Underpinning security and privacy issues and resolutions: data mining, data processing(e.g. GDPR), encryption (e.g. blockchain)Department of Information Technology Page 3 of 6• Smart homes, smart buildings and smart cities etc and their impact on individuals andsociety.• The future of IoT e.g. automate manufacturing, medicine and healthcare, virtual world, AI,machine learning etc• The IT infrastructure required to support IoT e.g. 5G, proliferation of sensors,interoperabilityAnd many more…The research objective should allow students to broaden their understanding and widen theirperspective of being able to explore, argue, prove, and/or disprove a particular objective. Theresearch objective should be feasible, novel, ethical, relevant and ultimately of interest to thestudent.Students are to submit as evidence for the unit in addition to their project findings, the researchproposal and ethics form. The research proposal sets out the plan for how the students willachieve the intended research objective(s) and shows whether the objective will be feasible, ethicaland achievable in the time scale. It sets out how secondary research supports the researchobjective, how the research will be conducted, how the research will be evaluated. Students willneed to gain ethical approval before commencing their research, this will be discussed with thetutor during the research proposal.Part 1:Consider the development of a methodical, ethical, reliable and valid research proposal as thefoundation for the project. The proposal should be agreed with your tutor prior to undertaking anyresearch. Proposal and ethical forms should also be agreed and completed. An ethics form mustbe submitted prior to completion of research as part of the research proposal.The project topic should reflect personal interest in a specialism and should allow for a sufficientdegree of research through the existence of adequate background materials.The framework of your proposal should address a specific research problem or question. This canbe stated as a research question, objectives or hypothesis.As guidance, a good project proposal and project title should have an existing body of literature orsource material that can be reviewed. In addition, it should extend the current line of learning,lending itself to further rigorous exploration. You should decide on appropriate research methodsand select an appropriate sample. Finally, provide a literature review that identifies the backgroundand conceptualisation of your proposed area of study. This would provide existing knowledge andbenchmarks by which your data can be judged.Part 2:You should conduct your research as outlined in your proposal and keep track of your findings asyou progress.The research methodology and research process, should be considered and clearly defined,demonstrating an understanding of the pitfalls and limitations of the methods chosen and ethicalissues that could be encountered.Department of Information Technology Page 4 of 6Conduct your research, analyse your findings and draw conclusions. Research methods should beapplied to evaluate the data collected from primary research sources. Your research and analysisof your findings should be specific to your original research question, from which conclusions canbe drawn.Reflect on the success of your research project and your performance at the end of the project withthe inclusion of a project evaluation and recommendations. In addition, based on the results ofyour study, what alternative research methodologies would you use in future to improve theresults?AppendicesNote: You should attach all the supporting documents as a separate file in the appendix section ofyour assignment. Without appropriate evidence(s) your assignment will not be marked.• Proposal• Ethic form• Completed questioner (if it is used)• Collected data• Any other document(s) requested by tutorRelevant InformationTo gain a Pass in a BTEC HND Unit, you must meet ALL the Pass criteria; to gain a Merit, you must meetALL the Merit and Pass criteria; and to gain a Distinction, you must meet ALL the Distinction, Merit and Passcriteria.1. Learning Outcomes and Assessment Criteria Learning Outcomes and Assessment CriteriaPassMeritDistinctionLO1 Examine appropriate research methodologies and approaches as part of theresearch processLO1 & 2D1 Critically evaluateresearchmethodologies andprocesses inapplication to acomputing researchproject to justifychosen researchmethods and analysis.P1 Produce a research proposal thatclearly defines a research question orhypothesis supported by a literaturereview.P2 Examine appropriate research methodsand approaches to primary and secondaryresearch.M1 Evaluate different researchapproaches and methodology and makejustifications for the choice of methodsselected based onphilosophical/theoretical frameworks.LO2 Conduct and analyse research relevant for a computing research projectP3 Conduct primary and secondaryresearch using appropriate methods for acomputing research project that considercosts, access and ethical issues.P4 Apply appropriate analytical toolsanalyse research findings and data.M2 Discuss merits, limitations andpitfalls of approaches to data collectionand analysis.LO3 Communicate the outcomes of a research project to identified stakeholdersD2 Communicate Department of Information Technology Page 5 of 6 P5 Communicate research outcomes in anappropriate manner for the intendedaudience.M3 Coherently and logicallycommunicate outcomes to the intendedaudience demonstrating how outcomesmeet set research objectives.critical analysis of theoutcomes and makevalid, justifiedrecommendations.LO4 Reflect on the application of research methodologies and conceptsD3 Demonstratereflection andengagement in theresource processleading torecommended actionsfor futureimprovement.P6 Reflect on the effectiveness of researchmethods applied for meeting objectives ofthe business research project.P7 Consider alternative researchmethodologies and lessons learnt in viewof the outcomes.M4 Provide critical reflection and insightthat results in recommended actions forimprovements and future researchconsiderations. 2. Preparation guidelines of the Coursework Documenta. All coursework must be word processed.b. Avoid using “Text box” in writing your assignment.c. Document margins must not be more than 2.54 cm (1 inch) or less than 1.9cm (3/4 inch).d. Font size must be within the range of 10 point to 14 points including the headings and body text (preferredfont size is 11) in Arial.e. Standard and commonly used type face, such as Arial and Times New Roman, should be used.f. All figures, graphs and tables must be numbered.g. Material taken from external sources must be properly referred and cited within the text using Harvardsystemh. Do not use Wikipedia as a reference.3. Plagiarism and CollusionAny act of plagiarism or collusion will be seriously dealt with according to the College regulations. In thiscontext the definitions and scope of plagiarism and collusion are presented below:Plagiarism is presenting somebody else’s work as your own. It includes copying information directly fromthe Web or books without referencing the material; submitting joint coursework as an individual effort.Collusion is copying another student’s coursework; stealing coursework from another student andsubmitting it as your own work.Suspected plagiarism or collusion will be investigated and if found to have occurred will be dealt withaccording to the College procedure (For details on Plagiarism & Collusion please see the StudentHandbook).4. Submissiona. Initial submission of coursework to the tutors is compulsory in each unit of the course.b. The student must check their assignments on ICON VLE with plagiarism software Turnitin to makesure the similarity index for their assignment stays within the College approved level. A student cancheck the similarity index of their assignment up to five times in the Draft Assignment submissionpoint located in the home page of the ICON VLE.c. All Final coursework must be submitted to the Final submission point into the Unit (not to the Tutor).The student would be allowed to submit only once and that is the final submission.d. Any computer files generated such as program code (software), graphic files that form part of thecoursework must be submitted as an attachment to the assignment with all documentation.e. Any portfolio for a Unit must be submitted as an attachment in the assignment5. Good practicea. Make backup of your work in different media (hard disk, memory stick, etc.) to avoid distress due to lossor damage of your original copy.Department of Information Technology Page 6 of 66. Extension and Late Submissiona. If you need an extension for a valid reason, you must request one using an Exceptional ExtenuatingCircumstances (EEC) form available from the Examination Office and ICON VLE. Please note that thetutors do not have the authority to extend the coursework deadlines and therefore do not ask them toaward a coursework extension. The completed form must be accompanied by evidence such as amedical certificate in the event of you being sick, and should be submitted to the Examination Office.b. Late submission will be accepted and marked according to the College procedure. It should be notedthat late submission may not be graded for Merit and Distinction.c. All late coursework must be submitted to the Late submission point into the unit (not to the Tutor)in the ICON VLE. A student is allowed to submit only once and that is also treated as the finalsubmission.d. If you fail in the Final or Late submission, you can resubmit in the Resubmission window.7. Submission deadlines Formative feedbackWeek 12Final Submission07 – 12 June 2021/04 – 09 January 2020Late submission14 – 19 June 2021/11 – 16 January 2020 Submit to: Online to the ICON VLE onlyGlossary:Analyse: Break an issue or topic into smaller parts by looking in depth at each part. Support each part witharguments and evidence for and against (Pros and cons)Evaluate: When you evaluate you look at the arguments for and against an issue.Critically Evaluate/Analyse: When you critically evaluate you look at the arguments for and against anissue. You look at the strengths and weaknesses of the arguments. This could be from an article you readin a journal or from a text book.Discuss: When you discuss you look at both sides of a discussion. You look at both sides of the arguments.Then you look at the reason why it is important (for) then you look at the reason why it is important (against).Explain: When you explain you must say why it is important or not important.Describe: When you give an account or representation of in words.Identify: When you identify you look at the most important points.Define: State or describe the nature, scope or meaning.Implement: Put into action/use/effectCompare: Identify similarities and differencesExplore: To find out aboutRecommend: Suggest/put forward as being appropriate, with reasons why

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published. Required fields are marked *