Week 12:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 12 | DATE: | |||
PLANNING | Concluding of research work | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The entire process is completed. | The overall work has been explained and concluded successfully. | The advantages and important information are discussed successfully. | Closure has been completed. | ||
ISSUES | |||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
|
|||||
Week 11:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 11 | DATE: | |||
PLANNING | Future work to be researched | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
In future advanced issues may occur those need to be determined. | The technology has been improving so possible threats may raise in different form so still advanced techniques usage need to be predicted. | The areas to be improved are identified because there was still room for improvement. | Analysis is completed. | ||
ISSUES | |||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
|
Yes | ||||
Week 10:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 10 | DATE: | |||
PLANNING | Result | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The outcome is obtained and discussed.
|
The security for the IoT devices are provided is obtained and its accuracy and etc. are to be analyzed. | After application of all the process it was tested and its accuracy level is analyzed and highly secure system is obtained. | Highly secured method is obtained. | ||
ISSUES | |||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
|
|||||
Week 9:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 9 | DATE: | |||
PLANNING | Methodology | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The overall methodology applied is discussed. | After prediction of all the necessary information its application in the project is to be determined. | With the help of analysis all the necessary information are gathered and its evolution, application are analyzed and suitable methodology is determined and applied. | Methodology is important for the success of research work. | ||
ISSUES | During this process there was possibility for occurrence of unexpected issues. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
While application there was possibility for change scope.
|
The aim is concentrated and verified correctly at each stage. | Yes | |||
Week 8:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 8 | DATE: | |||
PLANNING | Identifying and resolving the issues | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
All the issues that are raised in the project are rectified. | The issues will affect the outcome of the project so it is determined and to be rectified. | While application to the IoT few issue may raise which would affect the outcome of the project so it is analyzed and overcome successfully. | The project is free from issues. | ||
ISSUES | While applying solution there was possibility for occurrence of new issues. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
If a solution is applied it pertains to new issues which so difficulty is faced.
|
Its usage in another applied area is analyzed and based upon that it was applied in IoT. | Yes | |||
Week 7:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 7 | DATE: | |||
PLANNING | Selection of algorithms or technique | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
Suitable artificial algorithm is selected for the security to the IoT. | The existing algorithms are examined from that required algorithm is to be selected for analysis. | The possible related to artificial intelligence are selected which would be helpful for improvising the security features. | The desired technique is selected for the project. | ||
ISSUES | Certain algorithms leads to further issues while applying. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
Certain methods has both positive and negative cause which need to be predicted properly and applied. | In this case overall functionality of the each and every algorithm need to be predicted and decision need to be taken. | Yes | |||
Week 6:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 6 | DATE: | |||
PLANNING | Examining collected papers | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
Review is carried out and background information is collected. | Information from several resources are collected so those need to be analyzed and collect all the important information. | Review had been carried out so that merits and demerits discussed are collected. | Review provides clear understanding about the overall process. | ||
ISSUES | Sometimes there would be presence of unwanted information | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
While reviewing is papers there would be more unwanted information. | Those need to be eliminated and only required information has be collected. | Yes | |||
Week 5:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 5 | DATE: | |||
PLANNING | Collection of required information | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
Before starting the project all the required information are collected. | More information are necessary for the project so all the essentials are to be collected properly. | Different types of journals and from other resources information related to the artificial intelligence and IoT security are collected. | It form basis for the research. | ||
ISSUES | More resources need to be collected so it was time consuming. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
Different resources containing all the information need to be collected and it requires more time.
|
Proper information is required so additional time is spent to collect all the resources. | Yes | |||
Week 4:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 4 | DATE: | |||
PLANNING | Predicting the scope and objective | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The scope and objective are included in the abstract of the project. | The aim of the project and its scope need to be predicted otherwise it will be difficult for continuing the project. | After analysis detailed aim of the project is determined which is helpful for continuing the project is correct path. | The scope and objective are determined. | ||
ISSUES | Accurate determination regarding the security term is difficult. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
The issue is determined and the best technique for overcoming is difficult to predict.
|
Analysis has been carried out to predict the techniques and then it was completed. | Yes | |||
Week 3:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 3 | DATE: | |||
PLANNING | Outlining the project schedule | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The overall requirement for the project is determined along with the time period. | Since, it consists of several stages so all the stages and requirements need to be planned. | After predicting the issues to the overall process, resources, time period etc. are predicted approximately. | The project schedule has been completed. | ||
ISSUES | Few information are difficult to predict. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
There was possibility for consuming more time than the planning due to unknown of its depth while planning. | Considerable amount of time is allocated for each process in the project. | Yes | |||
Week 2:
NAME: | |||||
PROJECT TITLE: | Role of Artificial intelligence technique in optimizing the security of Internet of Things | ||||
WEEK NO: | 2 | DATE: | |||
PLANNING | Issue identification | ||||
MILESTONE: | PLANNED: | ACTUAL: | COMMENT: | ||
The issue related to the IoT are identified. | The internet of things has been facing more issues which are need to be mitigated to improve the security in it. So, all defects present are to be identified. | The Internet of things are analyzed and possible drawbacks faced by it in security terms are identified. | All the drawbacks which need to be improvised are predicted. | ||
ISSUES | In IoT more defects are available so predicting of issue is difficult. | ||||
DESCRIPTION: | DATE: | ACTION/RESULTS: | FINISHED (Y/N) | ||
Due to presence of more devices identification of exact issue in the system is difficult. | Each and every system are analyzed separately and then drawback is predicted. | Yes | |||