WE WRITE CUSTOM ACADEMIC PAPERS

100% Original, Plagiarism Free, Tailored to your instructions

Order Now!

to; -webkit-text-stroke-width: 0px; “>MSc Software Engineering Coursework Specification 2015/16 Module name: Pervasive Systems Module code: CTEC5126 Title of the Assignment: Coursework This coursework item is: Summative This summative coursework will be marked anonymously No The learning outcomes that are assessed by this coursework are:
LO1: evaluate properties and vision of pervasive computing
LO2: apply appropriate technologies to the design of specific pervasive systems
LO3: appraise the different approaches to modelling context-aware systems
LO4: critically review some of the research challenges in pervasive computing. This coursework is: (delete as appropriate) Individual This coursework constitutes 100 % to the overall module mark. Date Set: Monday 19 October 2015 Date & Time Due: To be confirmed after online test. Your marked coursework and feedback will be available to you on:
If for any reason this is not forthcoming by the due date your module leader will let you know
why and when it can be expected. The Head of Studies (headofstudies-tec@dmu.ac.uk )
should be informed of any issues relating to the return of marked coursework and feedback.
Note that you should normally receive feedback on your coursework by no later than four
working weeks after the formal hand-in date, provided that you met the submission
deadline
To be
confirmed When completed you are required to submit your coursework to:
1. Hard copy to Student Advice Centre 0.4a Ground Floor Gateway House. Retain your receipt.
2. Soft copy to Turnitin on the module Blackboard shell. Failure to do this will result in the marking of your
work not being completed.
It is your responsibility to keep a back-up copy (paper or electronic) in case the original is mislaid. Late submission of coursework policy: Late submissions will be processed in accordance with
current University regulations which state:
“the time period during which a student may submit a piece of work late without authorisation and have the
work capped at 40% [50% at PG level] if passed is 14 calendar days. Work submitted unauthorised more
than 14 calendar days after the original submission date will receive a mark of 0%. These regulations apply to
a student’s first attempt at coursework. Work submitted late without authorisation which constitutes
reassessment of a previously failed piece of coursework will always receive a mark of 0%.” Academic Offences and Bad Academic Practices:
These include plagiarism, cheating, collusion, copying work and reuse of your own work, poor referencing or
the passing off of somebody else’s ideas as your own. If you are in any doubt about what constitutes an
academic offence or bad academic practice you must check with your tutor. Further information and
details of how DSU can support you, if needed, is available at:
http://www.dmu.ac.uk/dmu-students/the-student-gateway/academic-support-office/academic-offences.aspx
and
http://www.dmu.ac.uk/dmu-students/the-student-gateway/academic-support-office/bad-academic-practice.aspx Tasks to be undertaken:
Task 1: Section A
Task 2: Section B
Task 3: Section C
Deliverables to be submitted for assessment:
Deliverable 1: Solution to Section A
Deliverable 2: Solution to Section B
Deliverable 3: Solution to Section C How the work will be marked:
Note that you will be expected to attend a viva after submission of your report. The viva allows you to defend
your work to demonstrate to the programme team that you are familiar with the coursework submitted. The
viva has no effect on the module’s mark, but you have to pass the viva to pass the module. Module leader/tutor name: Dr Francois Siewe Contact details: Room: GH5.31, Gateway House
Tel. 01162577938
Email: fsiewe@dmu.ac.uk
Section A: Critical review (25%)
Learning outcomes assessed: LO1 & LO4
Assessment indicators:
• Clarity
• Conciseness
The following article (copy enclosed) reports on the application of pervasive
computing to healthcare.
Varshney, U. (2007) Pervasive Healthcare and Wireless Health Monitoring. Mobile
Network and Applications. 12(2-3). p. 113-127.
Critically review this article and answer the questions A1 to A3.
A1: Give a summary of the contributions of this article (not more than 500 words).
(7%)
A2: Evaluate the technologies used in the application presented in this paper and argue
whether there are better technologies available today that can improve the quality of
this application.(8%)
A3: Discuss the properties of this application with respect to the five key properties of
pervasive systems. (10%)
Section B: Design your own pervasive system (40%)
Learning outcomes assessed: LO1, LO2 & LO4
Assessment indicators:
• Originality
• Creativity
• Clarity
• References
B1: Propose your own pervasive computing system for a specific application. Give a
detailed description of the functionalities of your system. (10%)
B2: Give a detailed critical review of existing related systems and demonstrate the
novelty of your proposed system (900 words). (10%)
B3: Identify and justify the technologies needed for the implementation of the
proposed pervasive computing system . (5%)
B4: Design the architecture of your proposed pervasive system and explain the role of
each component. (10%)
B5: Discuss the properties of your proposed system with respect to the five key
properties of pervasive systems. (5%)
Section C: Modelling and Analysis (35%)
Learning outcomes assessed: LO1 & LO3
Assessment indicators:
• Clarity
• Conciseness
• Correctness
A Simple Infostation-based Communication System
An infostation system is an infrastructural system concept that provides many-time,
many-where wireless data services. This case study is a simple context-aware
infostation-based system which allows users to exchanges text messages using mobile
devices such as laptops, smart phones or tablet computers. Typically, an infostation
system comprises one central infostation centre (ISC) and many wireless access
points, called infostations (ISs), deployed at key positions to maximise coverage. The
ISs are physically connected to the ISC via network cables.
In this example we consider a university that has 3 campuses A, B and C. Each
campus has its own infostation system (with one ISC and many ISs). The ISCs of the 3
campuses are physically connected by cables to a network hub to enable users located
at different campuses to exchange messages, as depicted in Figure 1.
An infostation is aware of any mobile device within its range and is able to interact
with the device, e.g. by exchanging messages. A user within the range of an
infostation can send or receive text messages using a mobile device. For the sake of
simplicity, we assume that a text message contains the following information:
• the sender’s username
• the recipient’s username
• the message content.
Once an infostation receives a text message, it checks if the recipient is within range in
which case it forwards the message to the recipient. If the recipient is not within the
range of that infostation, the infostation forwards the message to the infostation centre
it is connected to.
An infostation centre is aware of all the infostations connected to it and subsequently
of all the devices within the ranges of these infostations. However, an infostation
Figure 1: An infostation-based communication system
centre has direct communications only with the infostations and the network hub
connected to it. When an infostation centre receives a text message from an
infostation, it looks for the infostation where the recipient is located and forwards the
message to this infostation. The infostation where the recipient is located then
forwards the request to the recipient mobile device. If the recipient is not found in one
campus, the message is forwarded via the network hub to the infostation centres of the
other campuses for delivery.
When the network hub receives a message from one ISC, it sends the message to the
other ISCs.
What to Do
You are required to model the Simple Infostation-based Communication System in the
Calculus of Context-aware Ambients (CCA) and to analyse this model using the CCA
simulator ccaPL. We assume there are four ISs and one ISC in each campus, named as
in Figure 1 (IS1a, IS1b, …) and two user mobile devices (Bob’s and Alice’s). Each ofthese entities and the network hub can be modelled as an ambient in CCA. We say thata user’s mobile device is in the range of an infostation IS if the ambient modelling thatmobile device is a child ambient of the ambient representing the infostation IS.Answer the questions C1 to C7.ModellingC1: Give the CCA specification of the ambient modelling the infostation IS1a. (5%)C2: Give the CCA specification of the ambient modelling the infostation centre ISC1.(5%)C3: Give the CCA specification of the ambient modelling the network hub. (5%)C4: Deduce from C1-C3 the specification of the whole system (without Bob’s andAlice’s mobile devices). (8%)AnalysisAssume Bob is willing to send the message hello to Alice. For this communication totake place, their respective mobile devices can be modelled in CCA as follows:• Bob’s mobile device: bob[ @send(bob, alice, hello).0 ]• Alice’s device: alice[ @recv(s, r, msg).0 ]Give the simulation results of the system for the following scenarios. These resultsmust include the listings of the execution output and the interpretation (explanation) ofthe execution output.C5: Scenario 1: Bob and Alice are both in range with the same infostation, IS1b say.(4%)C6: Scenario 2: Bob and Alice are both in Campus B, say; Bob in range with theinfostation IS2a and Alice in range with the infostation IS2d. (4%)C7: Scenario 3: Bob is in range with the infostation IS1a in Campus A while Alice isin range with the infostation IS3a in Campus C. (4%)Marking SchemeModule no.: CTEC5126 Module Title: Pervasive SystemsDate: 19 October 2015This coursework constitutes 100% to the overall module mark.Learning Outcomes Criterion & weighting 0-44 45-49 50-59 60-69 ≥ 70LO1: Evaluate properties andvision of pervasive systemsC1: Evaluation of basicproperties of pervasivesystemsLittle or no understandingof properties of pervasivesystems.Some but weakunderstanding of propertiesof pervasive systems;some inconsistencies.Satisfactory understandingof properties of pervasivesystems; some omissions.Good understanding ofproperties of pervasivesystems; fluent but lessillustrated.Excellent understanding ofproperties of pervasivesystems; with examples,illustrations and adequatereferences.C2: Understanding ofthe vision of pervasivecomputingLittle or no understandingof vision of pervasivesystems.Some but weakunderstanding of vision ofpervasive systems.Satisfactory understandingof vision of pervasivesystems; some omissions.Good understanding ofvision of pervasivesystems; fluent but lessillustrated.Excellent understanding ofvision of pervasive systems;with examples, illustrationsand adequate references.LO2: Apply appropriatetechnologies to the design ofspecific pervasive systemsC1: awareness of recentavailable technologiesLittle or no awareness ofrecent technologies used inthe design of pervasivesystems.Some but weak awarenessof recent technologies usedin the design of pervasivesystems.Satisfactory awareness ofrecent technologies used inthe design of pervasivesystems; some omissions.Good awareness of recenttechnologies used in thedesign of pervasivesystems; fluent but lessillustrated.Excellent awareness ofrecent technologies used inthe design of pervasivesystems; with examples,illustrations and adequatereferences.C2: understanding ofcharacteristics ofrelevant technologiesLittle or no understandingof characteristics ofrelevant technologies usedin the design of pervasivesystems.Some but weakunderstanding ofcharacteristics of relevanttechnologies used in thedesign of pervasivesystems.Satisfactory understandingof characteristics ofrelevant technologies usedin the design of pervasivesystems; some omissions.Good understanding ofcharacteristics of relevanttechnologies used in thedesign of pervasivesystems; fluent but lessillustrated.Excellent understanding ofcharacteristics of relevanttechnologies used in thedesign of pervasivesystems; with examples,illustrations and adequatereferences.C3: appropriate use oftechnologiesLittle or no appropriate useof technologies in thedesign of pervasivesystemsSome but weak appropriateuse of technologies in thedesign of pervasivesystemsSatisfactory appropriateuse of technologies in thedesign of pervasivesystems; some omissions.Good appropriate use oftechnologies in the designof pervasive systems;fluent but less illustrated.Excellent appropriate use oftechnologies in the designof pervasive systems; withexamples, illustrations andadequate references.LO3: Appraise the differentapproaches for modellingcontext-aware systemsC1: awareness of therecent development inthe modelling of contextaware systemsLittle or no awareness ofrecent development in themodelling of context-awaresystems.Some but weak awarenessof recent development inthe modelling of contextaware systems.Satisfactory awareness ofrecent development in themodelling of context-awaresystems; some omissions.Good awareness of recentdevelopment in themodelling of context-awaresystems; fluent but lessillustrated.Excellent awareness ofrecent development in themodelling of context-awaresystems; with examples,illustrations and adequatereferences.C2: understanding of themain features of relevantmodelsLittle or no understandingof main features of relevantmodels.Some but weakunderstanding of mainfeatures of relevantSatisfactory understandingof main features of relevantmodels; some omissions.Good understanding ofmain features of relevantmodels; fluent but lessExcellent understanding ofmain features of relevantmodels; with examples,Learning Outcomes Criterion & weighting 0-44 45-49 50-59 60-69 ≥ 70models. illustrated. illustrations and adequatereferences.C3: ability to producesound specification of asystem in a specificmodelLittle or no ability toproduce soundspecification of a system ina specific model.Some but weak ability toproduce soundspecification of a system ina specific model.Satisfactory ability toproduce soundspecification of a system ina specific model; someomissions.Good ability to producesound specification of asystem in a specific model;fluent but less illustrated.Excellent ability to producesound specification of asystem in a specific model;with examples, illustrationsand adequate references.LO4: Critically review some ofthe research challenges inpervasive computingC1: criticalunderstanding ofresearch challenges inpervasive computingLittle or no understandingof research challenges inpervasive computing.Some but weakunderstanding of researchchallenges in pervasivecomputing.Satisfactory understandingof research challenges inpervasive computing; someomissions.Good understanding ofresearch challenges inpervasive computing; fluentbut less illustrated.Excellent understanding ofresearch challenges inpervasive computing; withexamples, illustrations andadequate references.C2: understanding ofresearch methodologiesLittle or no understandingof methodologies.Some but weakunderstanding of researchmethodologies.Satisfactory understandingof research methodologies;some omissions.Good understanding ofresearch methodologies;fluent but less illustrated.Excellent understanding ofresearch methodologies;with examples, illustrationsand adequate references.C3: knowledge of thecurrent literature inpervasive computingLittle or no knowledge ofthe current literature inpervasive computing.Some but weak knowledgeof the current literature inpervasive computing.Satisfactory knowledge ofthe current literature inpervasive computing; someomissions.Good knowledge of thecurrent literature inpervasive computing; fluentbut less illustrated.Excellent knowledge of thecurrent literature inpervasive computing; withexamples, illustrations andadequate references.

Our Service Charter

  1. Excellent Quality / 100% Plagiarism-Free

    We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
  2. Free Revisions

    We keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
  3. Confidentiality / 100% No Disclosure

    We make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
  4. Money Back Guarantee

    If the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
  5. 24/7 Customer Support

    We have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.

Excellent Quality
Zero Plagiarism
Expert Writers

Instant Quote

Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency (Less urgent, less costly):
Level:
Currency:
Total Cost: NaN

Get 10% Off on your 1st order!