Great Deal! Get Instant $25 FREE in Account on First Order + 10% Cashback on Every Order Order Now

MITS5509 Intelligent Systems for Analytics Assignment 1 and 2 Presentation and Research Report MITS5509 Assignment 1 and 2 Copyright © XXXXXXXXXXVIT, All Rights Reserved. 2 NOTE: This Document is used...

1 answer below »
MITS5509
Intelligent Systems for Analytics
Assignment 1 and 2
Presentation and Research Report
MITS5509 Assignment 1 and 2

Copyright © XXXXXXXXXXVIT, All Rights Reserved. 2
NOTE: This Document is used in conjunction with Assessment 1 [Presentation & participation]
and Assessment 2 [Research Report] in the Teaching and Assessment Plan document
[MITS5509_Teaching and Assessment Plan.doc]
Objective(s)
This assessment item relates to the unit learning outcomes as in the unit descriptor. This
assessment is designed to improve student presentation skills and to give students experience in
esearching a topic and writing a report relevant to the Unit of Study subject matter.
INSTRUCTIONS
These instructions apply to both Assignment 1 - Presentation and Assignment 2 Research
Report.
Assignment 1 - Presentation and Participation - 10% (Sessions 5-12) Individual Assignment
For this component you will be required to do a 5-10 minute presentation on a recent academic
paper on a topic related to Intelligent Systems for Analytics or Intelligent Systems. Some
possible topic areas include but are not limited to:
• Intelligent Systems for Data Warehouse systems
• Evolving Intelligent Systems: Methods, Learning, & Applications
• Distance Metric Learning in Intelligent Systems
• Intelligent Systems for Socially Aware Computing
• Data Mining techniques with IS
• frameworks for integrating AI and data mining
• Expert System
• Structure of knowledge Engineering
• IS and Support Vector Machines
• IS and Neural Network Architectures
• Heuristic Search Methods
• Genetic Algorithms and Developing GA Applications
The paper you select must be directly relevant to one of the above topics or another topic and
e related to Intelligent Systems for Analytics. The paper must be approved by your lecturer and
e related to what we are studying this semester in Intelligent Systems for Analytics. The pape
MITS5509 Assignment 1 and 2

Copyright © XXXXXXXXXXVIT, All Rights Reserved. 3
can be from any academic conference or other relevant Journal or online sources such as Google
Scholar, Academic department repositories, or a significant commercial company involved in
esearch such as IBM etc. All students must select a different paper. Thus, the paper must be
approved by your lecturer before proceeding. In case two students are wanting to present on the
same paper, the first who emails the lecturer with their choice will be allocated that paper. Please
note that popular magazine or web-site articles are not academic papers.
A grade of 10% of the Units mark will be awarded for your presentation and your participation in
other student presentations. You are to prepare a set of powerpoint slides for your presentation.
If you do not participate in at least 70% of other student’s presentations you will forfeit a
significant proportion of the marks for this component.
Note: if class numbers are large the presentations may be organized into groups, but students
will still all need to select their own individual paper for assignment 2. In the case where
presentations are a
anged in groups each group can decide which students paper will be used
for the presentation.
The presentations will occur in sessions 5-12 on the academic calendar for the semester and the
order of presentations will be by a
angement, but these will be evenly spread over those
sessions.
What to Submit.
There is no submission for this component, you are allocated marks based on your
presentation and participation
Assignment 2 - Research Report - 10% (Due Session 8) Individual Assignment
For this component you will write a report or critique on the paper you chose from Assignment
1, the Presentation and Participation component above.
Your report should be limited to approx. 1500 words (not including references). Use 1.5 spacing
with a 12 point Times New Roman font. Though your paper will largely be based on the chosen
article, you should use other sources to support your discussion or the chosen papers premises.
Citation of sources is mandatory and must be in the IEEE style.
Your report or critique must include:
MITS5509 Assignment 1 and 2

Copyright © XXXXXXXXXXVIT, All Rights Reserved. 4
Title Page: The title of the assessment, the name of the paper you are reporting on and its
authors, and your name and student ID.
Introduction: Identification of the paper you are critiquing/ reviewing, a statement of the
purpose for your report and a
ief outline of how you will discuss the selected article (one or
two paragraphs).
Body of Report: Describe the intention and content of the article. If it is a research report,
discuss the research method (survey, case study, observation, experiment, or other method)
and findings. Comment on problems or issues highlighted by the authors. Report on results
discussed and discuss the conclusions of the article and how they are relevant to the topics of
this Unit of Study.
Conclusion: A summary of the points you have made in the body of the paper. The conclusion
should not introduce any ‘new’ material that was not discussed in the body of the paper. (One
or two paragraphs)
References: A list of sources used in your text. They should be listed alphabetically by (first)
author’s family name. Follow the IEEE style.
The footer must include your name, student ID, and page number.
Note: reports submitted on papers which are not approved or not the approved paper registered
for the student will not be graded and attract a zero (0) grade.
What to Submit
Submit your report to the Moodle drop-box for Assignment 2. Note that this will be a
turn-it-in drop box and as such you will be provided with a similarity score. This will be
taken into account when grading the assignment. Note that incidents of plagiarism will
e penalized. If your similarity score is high you can re-submit your report, but re-
submissions are only allowed up to the due date. If you submit your assignment after the
due date and time re-submissions will not be allowed.
Please Note: All work is due by the due date and time. Late submissions will be penalized
MITS5509 Assignment 1 and 2

Copyright © XXXXXXXXXXVIT, All Rights Reserved. 5
at the rate of 10% per day including weekends.

Preparation_Instruction
See discussions, stats, and author profiles for this publication at: https:
www.researchgate.net/publication/ XXXXXXXXXX
Blockchain with Internet of Things: Benefits, Challenges and Future
Directions
Article  in  International Journal of Intelligent Systems and Applications · June 2018
DOI: XXXXXXXXXX/ijisa XXXXXXXXXX
CITATIONS
23
READS
5,405
4 authors:
Some of the authors of this publication are also working on these related projects:
Security in Cloud Adoption View project
Cloud Forensic Readiness In Organizations View project
Hany F. Atlam
University of Southampton
27 PUBLICATIONS   274 CITATIONS
SEE PROFILE
Ahmed Alenezi
Northern Borders University, Rafha, Saudi Arabia
18 PUBLICATIONS   164 CITATIONS
SEE PROFILE
Madini O. Alassafi
King Abdulaziz University, University of Southampton,
34 PUBLICATIONS   117 CITATIONS
SEE PROFILE
Gary Wills
University of Southampton
645 PUBLICATIONS   3,459 CITATIONS
SEE PROFILE
All content following this page was uploaded by Hany F. Atlam on 01 June 2018.
The user has requested enhancement of the downloaded file.
https:
www.researchgate.net/publication/325486515_Blockchain_with_Internet_of_Things_Benefits_Challenges_and_Future_Directions?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_2&_esc=publicationCoverPdf
https:
www.researchgate.net/publication/325486515_Blockchain_with_Internet_of_Things_Benefits_Challenges_and_Future_Directions?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_3&_esc=publicationCoverPdf
https:
www.researchgate.net/project/Security-in-Cloud-Adoption?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_9&_esc=publicationCoverPdf
https:
www.researchgate.net/project/Cloud-Forensic-Readiness-In-Organizations?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_9&_esc=publicationCoverPdf
https:
www.researchgate.net/?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_1&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Hany_Atlam?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_4&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Hany_Atlam?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_5&_esc=publicationCoverPdf
https:
www.researchgate.net/institution/University_of_Southampton?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_6&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Hany_Atlam?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_7&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Ahmed_Alenezi3?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_4&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Ahmed_Alenezi3?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_5&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Ahmed_Alenezi3?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_7&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Madini_Alassafi?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_4&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Madini_Alassafi?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_5&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Madini_Alassafi?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_7&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Gary_Wills?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_4&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Gary_Wills?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_5&_esc=publicationCoverPdf
https:
www.researchgate.net/institution/University_of_Southampton?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_6&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Gary_Wills?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_7&_esc=publicationCoverPdf
https:
www.researchgate.net/profile/Hany_Atlam?enrichId=rgreq-d017362b4c6c82343fe5397020d46898-XXX&enrichSource=Y292ZXJQYWdlOzMyNTQ4NjUxNTtBUzo2MzI2NDU2ODM3ODk4MjZAMTUyNzg0NTg5MzM5Mg%3D%3D&el=1_x_10&_esc=publicationCoverPdf
I.J. Intelligent Systems and Applications, 2018, 6, 40-48
Published Online June 2018 in MECS (http:
www.mecs-press.org/)
DOI: XXXXXXXXXX/ijisa XXXXXXXXXX
Copyright © 2018 MECS XXXXXXXXXXI.J. Intelligent Systems and Applications, 2018, 6, 40-48
Blockchain with Internet of Things: Benefits,
Challenges, and Future Directions

Hany F. Atlam
Electronic and Computer Science Dept., University of Southampton, Southampton, UK
Computer Science and Engineering Dept., Faculty of Electronic Engineering, Menoufia University, Menoufia, Egypt
E-mail: XXXXXXXXXX
Ahmed Alenezi, Madini O. Alassafi, Gary B. Wills
Electronic and Computer Science Dept., University of Southampton, Southampton, UK
E-mail: {aa4e15, moa2g15, gbw}@soton.ac.uk
Received: 04 November 2017; Accepted: 09 Fe
uary 2018; Published: 08 June 2018
Abstract—The Internet of Things (IoT) has extended the
internet connectivity to reach not just computers and
humans, but most of our environment things. The IoT has
the potential to connect billions of objects simultaneously
which has the impact of improving information sharing
needs that result in improving our life. Although the IoT
enefits are unlimited, there are many challenges facing
adopting the IoT in the real world due to its centralized
serve
client model. For instance, scalability and security
issues that arise due to the excessive numbers of IoT
objects in the network. The serve
client model requires
all devices to be connected and authenticated through the
server, which creates a single point of failure. Therefore,
moving the IoT system into the decentralized path may be
the right decision. One of the popular decentralization
systems is blockchain. The Blockchain is a powerful
technology that decentralizes computation and
management processes which can solve many of IoT
issues, especially security. This paper provides an
overview of the integration of the blockchain with the IoT
with highlighting the integration benefits and challenges.
The future research directions of blockchain with IoT are
also discussed. We conclude that the combination of
lockchain and IoT can provide a powerful approach
which can significantly pave the way for new business
models and distributed applications.
Index Terms—Blockchain, Blockchain with IoT, Internet
of Things, Centralized, Decentralized.
I. INTRODUCTION
The Internet of Things (IoT) has the ability to connect
and communicate billions of things simultaneously. It
provides various benefits to consumers that will change
the way that users interact with the technology. Using a
collection of cheap sensors and interconnected objects,
information can be collected from our environment that
will allow improving our way of living [1].
The IoT concept is not new. In 1999, Ashton, who is
the founder of MIT auto-identification center has said,
“The Internet of Things has the
Answered Same DayDec 07, 2021MITS5509

Solution

Kuldeep answered on Dec 08 2021
55 Votes
Assignment 2 - Research Report
Student Name:
Unit Name:
University Name:
Date:
Contents
Introduction    3
Body    3
Research method    5
Problems or issues highlighted by the authors    5
Conclusion    7
References    8
Introduction
The paper selected for this report is “Blockchain with IoT: Challenges, Benefits, moreover Future Directions”, by Ahmed Alenezi, Hany F. Atlam, Madini O. Alassafi, and Gary B. Wills. The purpose for this report is to critically review the article [12]. This report includes the content and intention of article. Findings of this article and issues or problems highlighted by authors are discussed in this report. Results discussed as well as discuss conclusion of article or how they are applicable to topic of this Unit of Study are also discussed in this report.
Body
The intention of this article is to provide an overview of integration of block chain with Internet of Things with accent the integration challenges and benefits. Future research direction of the IoT blockchain is discussed. The conclusion of this article is that combination of the IoT and blockchain can provide powerful method that can pave manner for innovative business models as well as distributed application [8]. The IoT extends Internet connectivity to cover not only humans and computers, however also our environmental things. IoT has possible to join billions of items simultaneously, which will improve the demand for Data sharing and thus improve our lives. Although the benefits of the Internet of Things are unlimited, because of its client model / centralized server, such as scalability moreover safety issues caused by too many IoT things in network, the adoption of the Internet of Things in the real world faces many challenge [11].
In order to make all the functions of the IoT fully function in practice, several difficulties must be solved in the process of overcoming obstacles. These include, although are not restricted to, network security, energy consumption, data privacy, and scalability. Decentralized nature of the blockchain or its multifaceted processes provides a helpful mechanism for addressing some of these Internet of Things challenges. Nevertheless, applying block chain protocol to IoT with no considering its enormous computing load, bandwidth and latency overhead will
ing a series of new issues [6].
Both the IoT and block chain technology have many advantages that can be used in combination to get better results. The Internet of Things has unlimited advantages, and decentralized approaches to the Internet of Things will solve many problems, especially security. In the IoT network, a blockchain can also keep immutable records of history of the smart device. This element does not require centralized permissions to enable autonomous functions of the smart device [7]. IoT device data is usually stored securely in the cloud, but it cannot prevent integrity devices from being compromised or tampered with at source.
What's more, centralized architectures of IoT solution requires IoT device owner to belief these associations to ensure their data is secure, to manage their information, and to destroy their data when a hacker attacks a central server. In contrast, a blockchain is raising technologies that help increase the resilience of IoT systems. It can also provide a dispersed ledger to ignore centralized architectural challenges and uses its features to store data in a secure process. Blockchain establishes a trust relationship among IoT devices moreover reduces the threat of the tampering with blockchain...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here