May2010Final 9996

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 6

SECTION 1

The “VA for Smart Cameras” project has a requirement for experimenting on optimising the
developed algorithms using the latest Quad-Core and Dual-Core Processors technologies in the
configured at least 8 PCs during the algorithms’ code deployment in the TI DSP by the
Research Scientists of the Company’sR&D Department.

The usual IEEE 802.11 Wi-Fi Internet and Email Services using the existing Company’s
network infrastructure must be supported by all 9 configured machines.

The suggested way for presenting the final selections of the configured PCs will be in a Table
Format where the PCs parts’ (items) selections are clearly shown with an additional column of
brief item’s properties, e.g. 1 TB HDD, RAID 0,1 support etc.

SECTION 2

(a) Investigate the different Operating Systems that can be used in the configured PCs. TI
DaVinci Series DSP runs on an embedded Linux OS and it is programmed using
Eclipse IDE for Linux OS. Though there is no specific demand for a Linux version,
e.g. Red Hat Enterprise, Ubuntu, OpenSUSE, investigate the different versions and
discuss your choice based on, for example, the Drivers availability, Technical Support
and Technical Forums existing for each version. However, the VA development will
be done using Matlab vR2010a under Windows environment. Make the appropriate OS
choices discussing and explaining the reasons of your selections.

(b) Discuss your selected hardware choices for the configured PCs.

(c) Make suggestions on additional Application Software required by the R&D Department
Scientists, e.g. Ulead/Corel Video Studio software package for Video editing; other
Video and Image Processing software packages etc.

Part of the project will be a remote-based Graphical User Interface (GUI) for the Smart
Cameras which the R&D Department will develop in Java and Visual Basic
programming languages as well as in XML. Make suggestions on Java and Visual
Basic IDEs and XML editor required for the development of the GUI.

Explain the reasons of your selected Application Software and briefly describe each
Application Software Package and Tool.

Visit TI main website:

http://focus.ti.com/paramsearch/docs/parametricsearch.tsp?
family=dsp&sectionId=2&tabId=1852&familyId=1300

©ICTM 1
and make suggestions on other possible Software Tools offered in the website and may
be needed for the TI DaVinci DSP development and programming.

SECTION 3
(a) Investigate the Security issues needed to be addressed during the project’s R&D.

Discuss different physical and logical Security measures, e.g. login accounts, levels of
access rights, network Firewall etc., and make specific suggestions on the different
Application Software Tools to be installed in the configured PCs for achieving
autonomously managed protectin AGAINST Virus, Hacking (Spyware), and Third
Party system Intrusion (Adware).

Discuss the possibilities of network Data Encryption Software.

(b) Investigate and discuss software and hardware Testing methodologies for the
configured PCs i.e. White-Box and Black-Box Testing for hardware and software

(c) Suggest and discuss possible Backing Up Systems and Backup Rotation Schemes that
can be used during the R&D of the project.

Relevant Information

1. Outcome of the Units




2. Grading Criteria of this coursework (overall)

3. Section related specific guidelines for Pass/Merit/Distinction

Pass Merit Distinction


(P1, P2, P3, P4) (M1, M2, M3, M4) (D1, D2, D3, D4)

Section 1  Use the Authorised  Pass criteria met.  Pass and Merit criteria
Suppliers by the  Present in Table met.
Company’s Sales & Format ALL the  Configure
Orders Department on- different parts of the CORRECTLY and
line Websites (Dell or required Computer adequately to match
Viglen) to configure System(s) together ALL the Project
the different parts of with brief description Scenario’s
©ICTM 2
the required Computer on some properties of requirements the
System(s). each part in a different Computer
 Present in Table separate Table Systems. Present in
Format you’re your Column. Table Format ALL the
selected Computer different parts of the
System items (parts). configured Computer
Systems together with
brief but clear
description on related
to the Scenario required
properties of each
selected part in a
separate Table Column.

Section 2  Investigate the different  Pass criteria met.  Pass and Merit criteria
OS that can be used in  Make the appropriate met.
the configured PCs. OS choices for the  Apply critical thinking
 Explain your choices configured PCs. in explaining and
for the different Explain and discuss discussing the reasons
hardware parts of the the reasons of your comparatively of your
configured PCs. OS selections. hardware parts choices
 Explain and discuss for the configured PCs.
your choices for the Apply critical thinking
different hardware in explaining and
parts of the discussing the reasons
configured PCs. comparatively of your
 Make suggestions on OS choices for the
any additional configured PCs in
Application Software respect to the Project
Packages and Tools Scenario’s
required by the R&D requirements.
Department to be  Explain and discuss
installed in the your selections of the
configured PCs. additional Application
Software Packages and
Tools required by the
R&D Department to be
installed in the
configured PCs. Give
brief description of
each selected Software
Package and Tool.
 Visit TI main website
and make suggestions
on other Software
Tools needed for the
programming and
development of the TI
DaVinci DSP.
Section 3  Investigate the different  Pass criteria met.  Pass and Merit criteria
Security issues needed  Discuss different met.
©ICTM 3
to be addressed during physical and logical  Discuss different
the R&D of the Security measures. physical and logical
Company’s new Make specific Security measures.
Project. suggestions on the Make specific
 Investigate and discuss different Application suggestions and explain
different software and Software Tools to be the use of each of the
hardware Testing installed in the different Application
methodologies for the configured PCs for Software Tools to be
configured PCs i.e. achieving installed in the
White-Box and Black- autonomously configured PCs for
Box Software and managed protection achieving
Hardware Testing. against Virus, autonomously managed
Hacking (Spyware) protection against
and Third Party Virus, Hacking
Intrusion (Adware). (Spyware) and Third
 Investigate different Party Intrusion
Backing Up Systems (Adware).
that can be used.  Discuss different
network Data
Encryption Software
packages that can be
used.
 Apply critical thinking
in making specific
suggestions on different
Backing Up Systems
that can be used taking
advantage the 9th
configured PC as a
Backup Server.
Discuss the different
Backup Rotation
Schemes that can be
used for the Company’s
new project.
Section 4  User Documentation:  Pass criteria met.  Pass and Merit criteria
List all the Application  In the User met.
Software Packages and Documentation, list  Investigate and discuss
Tools installed in the ALL the Application any Health & Safety
configured PCs Software Packages issues need to be
including the Security and Tools installed in considered during the
Software Tools and any the configured PCs dispatch and
usual text editors and including the Security installation in the two
spreadsheets. Tools and any usual Laboratories of the
 Investigate any Health text editors and configured PCs; discuss
& Safety issues need to spreadsheets. what are the Health &
be considered during Explain briefly their Safety protection
the dispatch and properties and use. policies to ensure are
installation in the two  Investigate and followed during
Laboratories of the discuss any Health & electrical and electronic
configured PCs. Safety issues need to equipment, i.e. PCs
©ICTM 4
be considered during including Monitors, use
the dispatch and in the Laboratories
installation in the two where the configured
Laboratories of the PCs will be dispatched
configured PCs. and installed.
 Discuss what are the  Apply critical thinking
maintenance needs in investigating and
for the configured discussing what
PCs and installed possible User Support
software i.e. issues may arise
hardware and currently and in future
software maintenance during the use of the
of the PCs. configured PCs and
installed System and
Application Software.

4. Preparation guidelines of the Coursework Document


a. All coursework must be word processed.
b. Document margins must not be more than 2.54 cm (1 inch) or less than 1.9cm (3/4 inch).
c. Font size must be within the range of 10 point to 14 point including the headings and body
text.
d. Standard and commonly used type face such as Times new Roman or Arial etc should be
used.
e. All figures, graphs and tables must be numbered.
f. Material taken from external sources must be properly refereed and cited within the text
using a Harvard standard
g. Word limit must be strictly followed.

5. Plagiarism
Any act of plagiarism will be seriously dealt with according to the regulations. In this context
the definition and scope of plagiarism are presented below:

Plagiarism is presenting somebody else’s work as your own. It includes copying information
directly from the Web or books without referencing the material; submitting joint coursework
as an individual effort; copying another student’s coursework; stealing coursework from
another student and submitting it as your own work. Suspected plagiarism will be investigated
and if found to have occurred will be dealt with according to the college procedure. (For
details on Plagiarism please see the student hand book) a copy of the question in between the
cover page and the answer.

7. Good practice

©ICTM 5
©ICTM 6

You might also like