关键词 > COMP2410/COMP6340
COMP2410/COMP6340_Semester 1 Networked Information Systems Semester 1 - End-of-semester, 2018
发布时间:2023-06-08
Hello, dear friend, you can consult us at any time if you have any questions, add WeChat: daixieit
EXAMINATION
Semester 1 - End-of-semester, 2018
COMP2410/COMP6340_Semester 1 Networked Information Systems
Both COMP2410 and COMP6340 students: Answer the following five questions (20 points each; 100% total). Remember to demonstrate your academic communication skills and document your assumptions. All cases are synthetic (yet realistic). Note that marking criteria for the COMP2410 students and COMP6340 students may differ.
1.
Re-imagined Engineering is a Canberra-based company with 30 full-time staff members. It specialises in complex engineering consulting projects. The projects typically involve a team of one or two software engineers, one or two user experience designers, and a project manager who deliver data-intensive analyses and visualisations for companies. Because so much data are needed, the projects are stored and processed on the company’s high-capacity server but may also be moved to the engineers’ workstations for processing and analysis. The company has a staff of twelve engineers (which is expected to grow to twenty over the next five years), eight designers (which is expected to grow to twelve over the next five years), and ten management and clerical employees. The designers, managers, and clerks also need network connections but their needs are less intense.
The company is moving into new offices and wants you to design and justify its the backbone and local area networks (BN and LAN). In this recommendation, your main focus should be on the BN, but you may wish to include some aspects of LANs as well. (approximately 250—300 words and a network diagram)
2.
The Group of Eight (Go8) is a coalition of research-i n t e n s i v e A u s t r a l i a n universities. Its members are as follows: 1) The A u s t r a l i a n Na t i o n a l University in Canberra, 2-3) Monash University a n d U n i v e r s i t y of Melbourne in Melbourne, 4) University of Adelaide i n A d e l a i d e , 5 - 6 ) University of New South Wales and University of Sydney in Sydney, 7) University of Queensland i n B r i s b a n e , a n d 8 ) University of Western Australia in Perth.
Let us consider that the Go8 wants to build virtual team experiences with members from different universities and cities in A u s t r a l i a i n t o t h e i r p r o g r a m s i n s t e a d o f meeting face-to-face. Its partner universities have decided to start with their honours programs, and each has created a required unit that involves its students working with students at the other Go8 universities to complete a major project.
The students will use collaboration software such as email, chat, Google Docs, Dropbox, Skype, Zoom, and WebEx to provide text, audio, and video communication. These tools can be used over the Internet, but to ensure that there are no technical problems, the universities have decided to build a separate private wide area network (WAN) that connects the honours residence halls in Adelaide, Brisbane, Canberra, and Perth (one hall in each city) with the two halls in Melbourne (15 km apart) and the two halls in Sydney (5 km apart). Let us assume that the halls in Sydney are connected by a BN and WAN but the halls in the Melbourne are not.
Compare and contrast two feasible WAN designs (i.e., your top-2 recommendations) for the Go8 residence network by using the possible WAN services of the textbook table above. Specify what services you will use at each location and how the different locations will be connected. Consider the aspects of the data rate, cost, and reliability. Format your answer as a 1-page table and remember to include the WAN diagram(s).
3.
Define and illustrate the following concepts in the context of the Mapping of the Internet of Things article below. A separate answer to each item is fine.
a. Security policy and user training. (1-3 sentences, 2 points)
b. Confidentiality, integrity, and availability of data. (1-3 sentences, 3 points)
c. Firewall, user authentication, and data encryption. (3-7 sentences, 5 points)
d. Risk assessment and controls. (3-7 sentences, 5 points)
e. Disaster recovery plan. (1-3 sentences, 5 points)
4.
Would using VeraCrypt to email your thesis manuscript as an attachment to your thesis examiner be an example of symmetric encryption, asymmetric encryption, or both? Remember to define these encryption methods, give case-relevant examples of them, and include a justification of your answer. (approximately 250—300 words and encryption flowcharts)
5.
Apply the lessons learnt (during this networked information systems unit) in ethics and security to the following case. Please consider the real-life system use in hospitals rather the research stage outlined in the summary below. Remember to identify relevant concepts and analyse them in the context of the case. (approximately 250-400 words)
Machine Learningfor Health Data Analytics
Information flow, defined as channels, contact, communication, or links to pertinent people, is critical in any data intensive field but critical in healthcare. For example, over 10% of preventable adverse events in healthcare are caused by failures in information flow. These failures are tangible in handover (Fig. 1); regardless of good verbal communication, 65%- 100% information is lost after 3-5 shifts if notes are taken by hand, or not at all.
|
Fig. 1. Nursing shift-change handover is a form of clinical narrative, where the documented (written) material is only a small component of the complete information flow. There are multiple approaches to clinical handover at shift change; however, nursing handover typically occurs with a combination of whole-team in a private area, followed by whole-team in the presence of the patient or carer. Best practice in Australian hospital settings recommends verbal handover in the patient’s presence, supplemented with written material.
We studied automated speech recognition (a.k.a. speech-to-text) and text classification (a.k.a. information extraction) as ways to populate health records (Fig. 2) in the context of nursing shift-change handover. Automated speech recognition recognised up to 73% of 14,095 test words correctly. The classifier achieved on 100 test documents the 81% F1 in filtering out irrelevant text and up to 100% in filling out the form headings (38% on macro-average). We also introduced a Web app (Fig. 3) to demonstrate the software design and also released synthetic but realistic clinical datasets.
Fig. 2. Filling out a handover form
|
Fig. 3. Filled out form
Selected References:
Dawson L, Johnson M, Suominen H, Basilakis J, Sanchez P, Kelly B, Hanlen L. A usability framework for speech recognition technologies in clinical handover: A pre-implementation study. Journal of Medical Systems 2014 38(6), 56.
Johnson M, Sanchez P, Suominen H, Basilakis J, Dawson L, Kelly B, Hanlen L. Comparing nursing handover and documentation: Forming one set of patient information. International Nursing Review 2014 61(1), 73-81.
Johnson M, Lapkin S, Long V, Sanchez P, Suominen H, Basilakis J, Dawson L. A systematic review of speech recognition technology in health care. BMC Medical Informatics and Decision Making 2014 14(94).
Suominen H, Johnson M, Zhou L, Sanchez P, Sirel R, Basilakis J, Hanlen L, Estival D, Dawson L, and Kelly B. Capturing patient information at nursing shift changes: Methodological evaluation of speech recognition and information extraction. Journal of the American Medical Informatics Association (JAMIA) 2015 22(e1), e48-66.
Suominen H, Zhou L, Hanlen L, Ferraro G. Benchmarking clinical speech recognition and information extraction: New data, methods and evaluations. JMIR Medical Informatics 2015 3(2), e19.