Difference between revisions of "TEK5530/Group work"

From its-wiki.no
Jump to: navigation, search
(Created page with "== Report requirements == The report is the replacement for the group work in the previous years. It will count 20% in your exam grade and you will get questions related to it...")
 
(Report requirements)
Line 10: Line 10:
  
 
Possible fields:
 
Possible fields:
- Multi-metrics approach in practice, this is the normal group work which was given previously, example: A good (A) delivery from 2016: [[Media:good_example_group_work.pdf]], you are allowed to choose a simpler example.
+
* Multi-metrics approach in practice, this is the normal group work which was given previously, example: A good (A) delivery from 2016: [[Media:good_example_group_work.pdf]], you are allowed to choose a simpler example.
- Security possibilities in Raspberry Pi wireless sensor networks
+
* Security possibilities in Raspberry Pi wireless sensor networks
- Zigbee: analysis of security capabilities, use case home automation
+
* Zigbee: analysis of security capabilities, use case home automation
- A security evaluation of wifi-mains smart plugs
+
* A security evaluation of wifi-mains smart plugs

Revision as of 22:33, 3 February 2019

Report requirements

The report is the replacement for the group work in the previous years. It will count 20% in your exam grade and you will get questions related to it on the exam, so the total will be closer to 50%.

The students are free to come with ideas on the report's topic.

Formal requirements: - at least 6 pages of content (without Table of contents, cover page etc.) - student is free to choose to write in english or norwegian - should contain (but not limited to): introduction, background, description of tasks to be done, presentation of results and conclusion.

Possible fields:

  • Multi-metrics approach in practice, this is the normal group work which was given previously, example: A good (A) delivery from 2016: Media:good_example_group_work.pdf, you are allowed to choose a simpler example.
  • Security possibilities in Raspberry Pi wireless sensor networks
  • Zigbee: analysis of security capabilities, use case home automation
  • A security evaluation of wifi-mains smart plugs