Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Annotated Bibliography Value: 25% Due date: 26-Apr-2018 Return date: 17-May-2018 Length: 2000 words XXXXXXXXXXpages) Submission method options Alternative submission method Task WHAT TO DO: Tasks 1...

1 answer below »
Annotated Bibliography
Value: 25%
Due date: 26-Apr-2018
Return date: 17-May-2018
Length: 2000 words XXXXXXXXXXpages)
Submission method options
Alternative submission method
WHAT TO DO: Tasks 1 and 2 below
TASK 1 Annotated Bibliography 20%
1. Write an Annotated Bibliography for your Capstone Topic with a collection of 12 articles following a set structure. The Annotated Bibliography is a critical examination of the most relevant, recent and scholarly research on the topic area that is not just a summary of the articles you have read on done in Topics 1 to 5.
2. Use the latest online search tools (CSU PRIMO, Google Scholar, Online databases) and efficient bibliographic organisers - CSU supports the use of EndNote. (available on iPad). EndNote is a  bibliographic citation program, allowing references and footnotes to be translated into a variety of standard formats.
3. As a CSU student you can download and install EndNote X7 for Windows or Mac OS platforms from https:
4. For Group Work OPTION teams only: Assessment Item 3 Annotated Bibliography is done INDIVIDUALLY by ALL students.
5. Ensure that the Annotated Bibliography submitted by you is your own work and has not been submitted elsewhere and comply with the University's requirements for academic integrity.
6. You can get help in Building and Writing an Annotated Bibliography from Topic 3 Tutorial Topic in the ITC571 Interact2 site sidebar menu and other study advices and tips from:
1. Study Resources (PDF files to download): http:
2. APA style Referencing from http:
3. The CSU Li
ary website for LibGuides in Information Technology, Computing and Mathematics at http:
4. EndNote Bibliographic software and tutorials LibGuide at http:
7. Review the emerging technology (use internet for journals, conference papers, magazines, news articles, online databases, eBooks) and submit a 12-article Annotated Bibliography on your topic.
8. A good place to start a collection of articles in your annotated bibliography is via the PRIMO search tool located on the CSU Li
ary website at http:
As an example, the Capstone Topic PRIMO search on a topic like "near field communication applications" returned the following list of very recent journals, books, conference proceedings and eBooks related to the Topic:
ary Resources
Information Technology Journal Databases: http:
Information Technology & Computing LibGuides : http: 
The following questions may be useful while reviewing the topic:
1. What is the new technology?
2. What does it do and what are the special features it has?
3. When is it coming out in the market and how much will it cost?
4. What industry will the new technology affect? (Medical, agricultural, computer, business, etc….).
5. In your opinion, will the new technology be beneficial to society? Why or why not.
6. What did you learn from a critical analysis of your sources of information on this new technology?
TASK 2 Originality Report and Questions 5%
1. Generate an originality report and submit this report via EASTS
2. CSU recommends Turnitin at for checking originality of content is assessment tasks as described in the Subject Outline and in the Assessment Task where it is required.
3. For this subject if you or your organisation use another similar tool then that is fine to use, but let me approve it first.
4. One approved alternative to Turnitin is the SEO Tools Plagiarism Checker at http:
. This is used by several institutions, academics and research students as an alternative to
5. Answer the following questions to interpret the originality report. The questions can be found through the following link: http:
6. Submit your question answers via EASTS.
Answered Same Day Apr 20, 2020 ITC571 Charles Sturt University


Shikha answered on Apr 26 2020
136 Votes
Annotated Bibliography
Singh, D. & Reddy, C.K. (2015). A survey on platforms for big data analytics. Journal of Big Data, 2014, Volume 2, Number 1, Page 1. Retrieved from - https:
The main objective of this article is to give better analysis of various platforms that are accessible for performing big data analysis. This article overviews distinctive hardware platforms that are accessible for big information analysis and also surveys the advantages as well as disadvantages of all platforms in view of different measurements like versatility, information I/O rate, fault tolerance, its processing, data size that is upheld as well as iterative support. By analyzing above article, we will get important insights that can be helpful in numerous pragmatic as well as its research innovations. The other imperative direction of research would be to pick the co
ect platform for specific application. In light of the particular application requirements, one can customize some platforms particular factors like the capacity of hard disk, its memory as well as the speed that is required to run the application. This analysis is an initial step to
eak down the adequacy of the stages and particularly the main strength is to take care of real applications.
Win, T., Y. & Tianfield, H. (2018). Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing. IEEE Transactions on Big Data Volume: 4, Issue: 1, March 1 2018. Retrieved from - https:
This article mainly focusses on virtualized infrastructure. Virtualized infrastructure in distributed computing has turned into an alluring focus for cyber attackers to dispatch propelled assaults. This paper mainly analyze the security approach of big information in order to deal with various propelled assaults in virtualized frameworks. System logs and in addition client application logs gathered occasionally from the guest virtual machines (VMs) that are stored in the Hadoop Distributed File System (HDFS). I have chosen this article because extraction of assault highlights is implemented via using graph-based event relationship as well as MapReduce parser based recognizable identification of potential assault strategies. Next, assurance of assault presence is performed by using two-advance machine learning, in particular strategic relapse is connected to compute assault's contingent probabilities regarding the properties, and conviction proliferation is connected to ascertain the faith in presence of an assault in view of them. Tests are led to assess the proposed approach by utilizing well-known malware and in addition in analysis with security procedures that are existing for virtualized infrastructure. The outcomes show that the proposed approach of the writer is powerful in recognizing assaults with negligible performance overhead.
Bhosale, H., S. & Prof. Gadekar, D., P. (2014). A Review Paper on Big Data and Hadoop. International Journal of Scientific and Research Publications, Volume 4, Issue 10, October 2014 1 ISSN 2250-3153. Retrieved from - http:
In this paper, author discussed about Hadoop platform. This article depicts Big Data idea alongside 3 Vs, Volume, Velocity as well as assortment of Big Data. The paper mainly focusses around Big Data processing issues. These specialized challenges need to be tended to for effective as well as quick processing of huge Information. The main challenges incorporate not only the undeniable issues of scale, but rather additionally heterogeneity, absence of structure, e
or handling, security, timelines, provenance, and perception, at all phases of the analysis pipeline from information obtaining to come about translation. These specialized issues are main over a huge assortment of utilization areas, and also its very cost effective to address with regards to one domain alone. The paper depicts Hadoop which is considered as open source programming and is utilized for processing of Big Data. Hadoop is the main platform in order to organize Huge Data and to help with issue of making it valuable for analyzing it.
Raghupathi, W. & Raghupathi, V. (2014). Big data analytics in healthcare: promise and potential. Raghupathi and Raghupathi Health Information Science and Systems 2014, 2:3. Retrieved from - https:
The paper portrays the beginning field of enormous information analysis in medicinal...

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here