Date of publication: 2017-08-05 02:49
WSNs are usually randomly deployed (scattered/aerially dropped) and are self-configuring. The nodes discover their neighbours and build the topology distributed algorithms using local knowledge.
Users in different environments may use different smart devices to complete their activities (tasks). This aim of this research is to investigate and develop optimum methods for users to make use of smart devices in their surroundings to accomplish their tasks. This project will require knowledge of device communication and mobile programming.
You can find more information about this course in the programme specification. Module and programme information is indicative and may be subject to change.
The main aim of this project is to enable online right-time data analysis and statistical functions to generate the different reports that are required for collaborative decision making. In a collaborative system, the different users/ organisations that form the collaboration will be able to make on the fly decisions based on the most up-to-date reporting (. in cases such as natural disasters bush fires, tsunami, etc.).
The projects that I offer are suitable to students who have a keen interest in software engineering and software project management. Those who get a good grade in Software Engineering project, or SNM or SRT are encouraged to discuss the potential projects with me.
There is a famous one liner by Donald Rumsfeld. "The unknown unknowns" . One of the big problems faced by designers is "out there" that we don't know about, but is relevant to the design?" That is, what are the unknown unknowns?
Lots of sites I use need several links to display/access very simple information. So, I seem to spend ages linking around hyperspace to see information which would easily fit on one page. Could I build a tool which would allow a user to define a new, single page, that had all the data concerned?
Cryptography helps people to achieve confidentiality, integrity and authenticity while communicating with unknown (or known) people over the unknown network. Intrusion detection System (IDS) is a way to detect intrusion through histories. However, once an attacker hacked into a network or computer, it is necessary to make a thorough study on what information the attackers are looking for and how to collect evidences for prosecution. The process is more OS dependant the process also depends on the software used.
Successful SCS implementation depends upon the designers ability to interpret the spec., and to identify unexpected behaviours implied by that spec. Alternatively, we need to ensure the behaviour is predictable given unexpected inputs. However, since the behaviour/input is unexpected, by definition, the people writing the spec. didn't see either. Is it possible that taxonomies may help with this? Obviously, we need some processes that expose possible fault conditions in terms of an external event that was not foreseen, and hence was not considered or checked.