emergingblogkarthiknaidu

Week 12:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  12 DATE:
 
PLANNING Concluding of research work
MILESTONE: PLANNED: ACTUAL: COMMENT:
The entire process is completed. The overall work has been explained and concluded successfully. The advantages and important information are discussed successfully. Closure has been completed.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
 

 

 

     

 

Week 11:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  11 DATE:
 
PLANNING Future work to be researched
MILESTONE: PLANNED: ACTUAL: COMMENT:
In future advanced issues may occur those need to be determined. The technology has been improving so possible threats may raise in different form so still advanced techniques usage need to be predicted. The areas to be improved are identified because there was still room for improvement. Analysis is completed.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
 

 

 

    Yes

 

Week 10:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  10 DATE:
 
PLANNING Result
MILESTONE: PLANNED: ACTUAL: COMMENT:
The outcome is obtained and discussed.

 

The security for the IoT devices are provided is obtained and its accuracy and etc. are to be analyzed. After application of all the process it was tested and its accuracy level is analyzed and highly secure system is obtained. Highly secured method is obtained.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
 

 

 

     

 

Week 9:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  9 DATE:
 
PLANNING Methodology
MILESTONE: PLANNED: ACTUAL: COMMENT:
The overall methodology applied is discussed. After prediction of all the necessary information its application in the project is to be determined. With the help of analysis all the necessary information are gathered and its evolution, application are analyzed and suitable methodology is determined and applied. Methodology is important for the success of research work.
ISSUES During this process there was possibility for occurrence of unexpected issues.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
While application there was possibility for change scope.

 

 

  The aim is concentrated and verified correctly at each stage. Yes

Week 8:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  8 DATE:
 
PLANNING Identifying and resolving the issues
MILESTONE: PLANNED: ACTUAL: COMMENT:
All the issues that are raised in the project are rectified. The issues will affect the outcome of the project so it is determined and to be rectified. While application to the IoT few issue may raise which would affect the outcome of the project so it is analyzed and overcome successfully. The project is free from issues.
ISSUES While applying solution there was possibility for occurrence of new issues.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
If a solution is applied it pertains to new issues which so difficulty is faced.

 

  Its usage in another applied area is analyzed and based upon that it was applied in IoT. Yes

Week 7:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  7 DATE:
 
PLANNING Selection of algorithms or technique
MILESTONE: PLANNED: ACTUAL: COMMENT:
Suitable artificial algorithm is selected for the security to the IoT. The existing algorithms are examined from that required algorithm is to be selected for analysis. The possible related to artificial intelligence are selected which would be helpful for improvising the security features. The desired technique is selected for the project.
ISSUES Certain algorithms leads to further issues while applying.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
Certain methods has both positive and negative cause which need to be predicted properly and applied.   In this case overall functionality of the each and every algorithm need to be predicted and decision need to be taken.  Yes

 

Week 6:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  6 DATE:
 
PLANNING Examining collected papers
MILESTONE: PLANNED: ACTUAL: COMMENT:
Review is carried out and background information is collected. Information from several resources are collected so those need to be analyzed and collect all the important information. Review had been carried out so that merits and demerits discussed are collected. Review provides clear understanding about the overall process.
ISSUES Sometimes there would be presence of unwanted information
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
While reviewing is papers there would be more unwanted information.   Those need to be eliminated and only required information has be collected. Yes

Week 5:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  5 DATE:
 
PLANNING Collection of required information
MILESTONE: PLANNED: ACTUAL: COMMENT:
Before starting the project all the required information are collected. More information are necessary for the project so all the essentials are to be collected properly. Different types of journals and from other resources information related to the artificial intelligence and IoT security are collected. It form basis for the research.
ISSUES More resources need to be collected so it was time consuming.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
Different resources containing all the information need to be collected and it requires more time.

 

  Proper information is required so additional time is spent to collect all the resources. Yes

Week 4:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  4 DATE:
 
PLANNING Predicting the scope and objective
MILESTONE: PLANNED: ACTUAL: COMMENT:
The scope and objective are included in the abstract of the project. The aim of the project and its scope need to be predicted otherwise it will be difficult for continuing the project. After analysis detailed aim of the project is determined which is helpful for continuing the project is correct path. The scope and objective are determined.
ISSUES Accurate determination regarding the security term is difficult.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
The issue is determined and the best technique for overcoming is difficult to predict.

 

  Analysis has been carried out to predict the techniques and then it was completed. Yes

Week 3:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  3 DATE:
 
PLANNING Outlining the project schedule
MILESTONE: PLANNED: ACTUAL: COMMENT:
The overall requirement for the project is determined along with the time period. Since, it consists of several stages so all the stages and requirements need to be planned. After predicting the issues to the overall process, resources, time period etc. are predicted approximately. The project schedule has been completed.
ISSUES Few information are difficult to predict.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
There was possibility for consuming more time than the planning due to unknown of its depth while planning.   Considerable amount of time is allocated for each process in the project. Yes

 

Week 2:

NAME:  
PROJECT TITLE: Role of Artificial intelligence technique in optimizing the security of Internet of Things
WEEK NO:  2 DATE:
 
PLANNING Issue identification
MILESTONE: PLANNED: ACTUAL: COMMENT:
The issue related to the IoT are identified. The internet of things has been facing more issues which are need to be mitigated to improve the security in it. So, all defects present are to be identified. The Internet of things are analyzed and possible drawbacks faced by it in security terms are identified. All the drawbacks which need to be improvised are predicted.
ISSUES In IoT more defects are available so predicting of issue is difficult.
DESCRIPTION: DATE: ACTION/RESULTS: FINISHED (Y/N)
Due to presence of more devices identification of exact issue in the system is difficult. Each and every system are analyzed separately and then drawback is predicted. Yes

 

 

 

 

 

 

 

 

Step 1 of 2
Please sign in first
You are on your way to create a site.