Project Report Format-1 2
Project Report Format-1 2
PGD/MSc Candidates - They must be prepared through these stages at the Department:
a. PreField/Synopsis Presentation which is restricted only to the Department
b. PostField Presentation is restricted to the College, whereby the College can either send her
representative to the Department (though I feel it is better, it is organized by the College
and within her walls) so the candidates feel the enormity and importance of what is been
done.
c. SPGS/Final Defense is accomplished at the University who decides with published
references so the University can ascertain if the candidate is worthy of being awarded the
degree in question.
MPhil/Ph.D. Candidates – The candidates must first be prepared through these stages at the
Department namely:
a. Departmental Presentations – There are basically Three (3) presentations in readiness
for College or Faculty Presentation. They include:
i. PreField is Chapter 1-3, usually called Synopsis in which the candidate's title is locked
against the candidate vis-a-vis the proposed major/minor/alternate supervisor(s).
ii. Field Presentation is done when the candidate has retrieved the needed Data to be used.
The presentation is aimed at verifying the volume, veracity, velocity, adequacy and
other feats of the data gathered to support the nature of the work being understudied.
iii. PostField Presentation is the complete work with result findings as discussed and
contributions highlighted. Having been deemed satisfactory, the candidate is approved
for College.
c. SPGS / University Presentation – is usually regarded as the final presentation which has
the Vice-Chancellor as its Chairman. Where the VC is not present, s(he) sends a
representative to chair the defense.
2. As seen by these many presentations, there shall be a viva-voce presentation at the Department
Third (3rd) Thursday of every Month for the duration of each Semester (except during the
time of Examinations). Only ready/prepared candidates will be entertained.
2
4. For readiness, only the first 5-ready candidates as cleared for presentation through the
Departmental PG Coordinator and approved by the HoD as ready (for the various levels of
PGD, MSc, MPhil and PhD) will be allowed for each viva-voce presentation. A list of ready
candidates will be made available 2weeks prior to enable all stakeholders prepare adequately
in advance for the task. Where no candidate(s) is ready, the Department will not present
anyone for such defense.
3
Proposal
First, Choosing a Topic
Always check the initial feasibility of the title with these 5-Ws and 1-H questions namely:
- What are you going to do/what do intend to achieve? (Aim and Objectives)
- Why is this topic important? (relevance and your contribution)
- Who will you include in your study? (respondents, secondary data, and content)
- Where are you going to carry out your study? (scope and limitations)
- When will you carry out your study? (timeline)
- How will you carry out your research? (Methodology)
The Proposal/Synopsis Format - A proposal is a first view and insight into what the proposed
research should look like. Every proposal must contain the following items
- Executive Summary [1page] gives a little backdrop of the work, clearly states just one or
two issues that motivated the study, clearly and concisely states the methodology to be adopted
for the study (as well as notes if the study is an extension of a previous work), states expected
results to be achieved, and details the cost implication of the study.
- Background of Study [2-3pages] – Describes the topic from various author viewpoint, whom
have earlier written on the topic. Do so chronologically so that you follow the trend and see
the problems previous authors experienced in the past.
- Problem Statement / Study Motivation [1page] – clearly state the problems/issues you
discovered as the reasons for embarking on this study. These forms the focal issues to be
addressed and they must be S.M.A.R.T (i.e. specific, measureable, achievable, reusable and/or
robust, and time dependent).
- Aim / Objectives [1page] – The aim is what the research aims to achieve. The objectives are
specific, achievable outcomes (i.e. milestones) that as you achieve – leads to ultimately,
reaching the aim. They must be measurable.
- Study Justification/Rationale [1page] – clearly states/defines what your research will finally
address and how it will impact on the immediate society – while, having a global perspective.
- Literature Review [2-3pages] – gives a detailed, general description of a topic. So, we must
have atleast 3-sections namely: (a) The conceptual review, (b) Review of related literature as
displayed by Table 2.1 – which shows S.W.O.T (strength, weaknesses, opportunities and
threats) of previous studies you already researched, and (c) Summary of literatures as seen in
Table 2.2. with features, their relevance and gaps on both previous studies and how your
proposed method curb all that.
- Knowledge Gaps Identified [1-2pages] – from the Table 2.1 – the researcher must identify
the various knowledge gaps from the various authors’ standpoint. S(he) must also be able to:
(a) itemize these knowledge gaps explicitly, clearly and concisely, and (b) s(he) must be able
to introduce various technologies, model and framework (features and characteristics) that can
help him/her to resolve the identified gaps from the various knowledge shared therein. That
4
is, s(he) must show what technology, means and the technical procedures needed to support
his/her argument in a bid to resolve the gaps. Thus, going forward, the researcher should be
able to identify and concisely state clearly the features-technologies-systems: (a) to adopt that
will help resolve the gaps found, (b) why they should be adopted, (c) its relevance (i.e. positive
and negative effect these feature(s) will impact on the ongoing research), (d) selection of
feature(s) to ensure that the research adopts/blends all the various strengths gained from the
previous works, with none of its weaknesses.
- Proposed Methodology [2-3pages] – describes the base method your research wishes to
adopt. Your research is said to be a primary research (if you are the first to make such), and
secondary (if you are simply extending or making improvements to what has been done
before. Whichever is the case, you must: (a) describe the existing system stating its structure
via a data-flow diagram, its workings, and bottlenecks experienced in the workings.
- Expected Result [2-3pages] – What does the researcher expects as the intended research
result vis-à-vis or in relation to the stated aim and objectives.
Description: This research will span a period of __ months during which we will: (a) ascertain
goodness of the existing system of traceability – its internal workings and the bottlenecks
therein, (b) collect daily, monthly and yearly data from relevant bodies such as Federal
Ministry of Health FMOH, Federal Ministry of Agriculture and Rural Development FMARD,
Federal Ministry of Environment FME etc and others responsible for safety and traceability
data on food production with specific reference to livestock (beef production and safety
consumption), (c) develop the traceability framework and system for in-sample/out-sample
analysis of data, and (d) interpret finding and compare results to those of other models.
- References – gives a detailed descriptions of authorities used in the course of reporting this
research. There are various reference styles namely: APA, IEEE, Chicago, MLA etc. Each
researcher must strictly adhere to the reference style adopted by either the Department,
Faculty/College, or Publishing House. Whatever articles are cited in the body of the research
must appear at the references section. And every cited work in the reference must also appear
in the body of the work. The essence is to ensure originality.
6
Note: though – the abstract appears first, it is the last to be written last as a clear summary of
the proposal’s content. The length of a proposal depends on guidelines given by your supervisor.
- Statement of Problem(s) – It must clearly and concisely identifies the current challenges you
have encountered in the existing system that has now become the motivating standpoint you
wish to address in this study. These itemized issues, become the focal point(s) of your study.
- Purpose/Significance of the Study – Here, we must clearly state why and how the attainment
of the goals in the study is good, and concisely note how it will impact on the immediate
community, and the world at large.
- Review of Related Works – Going forward from the previous authors – whom have worked
on this topical issue or area, the researcher can summarize this section through a Table 2.1
that captures the following in a series of columns namely: (a) authors, date and title of study,
(b) adopted methodology for the study, (c) study’s outcome, (d) strength of the study, and (e)
inherent gaps/weaknesses of the study. The researcher is expected to review previous articles,
recent manuscripts and texts geared towards this area – of no less than 30-authors.
Table 2.1. Review of Related Literatures
N Author(s), Date and Title Research Objectives Methods Used Strengths/Findings Inherent Gaps
1 Shahid et al. (2017). Survey of IDSs and Comparative Pin-point needed areas i. Model cannot be
From Intrusion Detection Intrusion Response Analysis Survey of interest pertaining to implemented to
to an Intrusion Response Systems base on IRS - response time, its establish usefulness
System: Fundamentals, Response option for option selection, attack of IRS extensions.
Requirements, and Future different types of mitigation, alert use, ii. Deep learning was
Directions network attacks. and adaptability never explored
2 Yuancheng et al. (2017). An intrusion detection Online Sequence Supremacy in terms of i. Predictive learning-
Intrusion detection system based on Extreme speed and accuracy as not inclusive
system using Online Online Sequence Learning compared with other [Link] redundancy
Sequence Extreme Extreme Learning Machine (OS- approaches not explored
Learning Machine Machine (OS-ELM) is ELM) with [Link]
(OSELM) in advanced established, Simulation mechanism not
metering infrastructure results utilized
3 Mageswary and K-means algorithm is K-means Dual detection- normal i. Predictive learning-
Karthikeyan (2018). used for detecting the algorithm or Denial of not inclusive.
Intrusion Detection Using normal or Denial of Service(DOS) attack ii. No predictive
Data Mining Techniques Service attack learning was
category accommodated
clearly and concisely, and (b) s(he) must be able to introduce various technologies, model and
framework (features and characteristics) that can help him/her to resolve the identified gaps
from the various knowledge shared therein. That is, s(he) must show what technology, means
and the technical procedures needed to support his/her argument in a bid to resolve the gaps.
Thus, going forward, the researcher should be able to identify and concisely state clearly the
features-technologies-systems: (a) to adopt to help resolve gap found, (b) why they should be
adopted, (c) its relevance (i.e. positive and negative effect these feature(s) will impact on the
ongoing research), (d) selection of feature(s) to ensure that the research adopts/blends all the
various strengths gained from the previous works, with none of its weaknesses.
Since, this is Computing Sciences and Technology – the researcher must be able to use
Data Flow Diagrams (DFD) to pictorially represent and describe to a potential reader, the
working structure and how data flows within the existing system.
All these presents how data will flow from one component to another within the system, how
these data are to be processed, what likely output is expected, and how the various components
in the system will interact with each other.
b. Algorithm – researcher should name proposed algorithm, and clearly list it. It is also note-
worthy to state the Mathematical Expressions here (where applicable). Sample algorithm
named DeLClustE (i.e. Deep-Learning Cluster Ensemble)
Algorithm 2: The DeLClustE Algorithm
Input: Selected Features: Output: Converted Feature Data Type
Initialize DeLClustE with PHMM; states;
K-means cluster fits on k-sub DNNs
For Each Selected Parameter do
Sample states using Forward Filtering
Compute Backward Sampling algorithm on states
Sample each transition parameters: 𝑇𝑖 = 𝑀𝑢𝑙𝑡(𝑛𝑖𝑗 ∖ 𝑇𝑖 ) 𝐷𝑖𝑟 (𝑇𝑖 ∖ 𝑐𝑘 )
End For Each
c. Database Design and Structure (where applicable) – Here, we describe the nature of the
database tables and its structure. We describe the relationship between the database and the
system vis-à-vis using the class-diagrams to show how the database interacts. Here, we will
use the class diagram as in Software Engineering principles to show how the various data
interact with each other in the various tables that holds each data.
d. Data Dictionary (where applicable) – Here, we describe other relevant features of the
collected data.
- System Flowchart
Shows pictorial representation of the proposed system/framework using flowchart symbols
- System Implementation
Using sample results generated from system testing, researcher should be able to detail on the
following:
a. Hardware/Software Requirements
b. Program Development Environment and Choice of Programming
c. System Training / Testing – The researcher must show: (i) a test plan, (ii) comparison of
the expected versus actual/observed test results, and (iii) limitations of the system
d. Discussion of Findings – clarifies implications of the results generated, and how they meet
our stated objectives. It is best to use charts (of the existing versus proposed system) to
show the resultant system.
e. Performance evaluation of the new system using performance indicators such as scalability,
throughput of system, response time, accuracy, sensitivity, specificity and recall rates etc.
f. Benchmarking – seeks to compare the performance of the proposed system in relation to
the successfully implemented existing frameworks. It is best to use charts (of the existing
versus proposed system) to show the resultant system.
g. Security Concerns/Issues, Documentation and System Training Procedures (for new users)
h. System Conversion/Changeover Procedures, and Recommended Changeover Procedure.
- Knowledge Contribution(s)
State clearly if your objectives where met.
- Conclusion
Your way of ending the report
For References – We expect the main references to be from peer-reviewed journals (International/Local)
and Conference proceedings. All references should be to the most pertinent, up-to-date sources. For a
Project (BSc), Dissertation (MSc) and Thesis (MPhil/Ph.D) – we expect a minimum of 40-for BSc, 50-for
MSc and 60-for MPhil/Ph.D references entries. References are written in APA style. Some sample in-text
citation can be done as thus: (Akazue et al., 2022, 2023; Brunton et al., 2020; Crawford et al., 2020;
Divayana, 2021; Eboka & Ojugo, 2020; Eghwerido et al., 2021; Géron, 2017; Haipinge et al., 2022;
Komolafe et al., 2020; Muxtorjonovna, 2020; Obasi, Nwele et al., 2020; Ojugo & Yoro, 2021; Piegat, 2014;
Psaros et al., 2022; Saxena & Rajpoot, 2021; Shahane et al., 2019; Shroff et al., 2021; Toivonen et al., 2009;
Udeze et al., 2022; Yoro, Aghware, Akazue, et al., 2023; Yoro, Aghware, Malasowe, et al., 2023).
- It is very good practice to use articles in referred journals and texts. Please and as much as possible,
refrain from using and making references to in-text citations from newspapers, magazines, Wikipedia
and blogs. These sources have not passed through the required scrutiny.
- Use software such as Mendeley, EndNote, Zotero, X9 to generate the references used in the study for
in-text citations and reference management and formatting, and choose APA style. Please use a
consistent format for references-see examples (10-point):
- Use Grammarly to correct all forms of typos, grammatical spellings and phrases etc
- Use TurnitIn (recommended) or iThenticate (recommended) to reduce the similarity index to an
acceptable rate (between 18-to-20%). This will ensure the originality of the work and study.
- Quillbot Paraphraser – or you can harness your ingenuity to paraphrase your work.
- Acceptable reference styles for Projects, Dissertation and Thesis includes: APA, IEEE, Harvard,
[Link]
Shroff, A., Shah, B. J., & Gajjar, H. (2021). Shelf space allocation game with private brands: a profit-sharing perspective. Journal
of Revenue and Pricing Management, 20(2), 116–133. [Link]
Toivonen, R., Kovanen, L., Kivelä, M., Onnela, J.-P., Saramäki, J., & Kaski, K. (2009). A comparative study of social network
models: Network evolution models and nodal attribute models. Social Networks, 31(4), 240–254.
[Link]
Udeze, C. L., Eteng, I. E., & Ibor, A. E. (2022). Application of Machine Learning and Resampling Techniques to Credit Card Fraud
Detection. Journal of the Nigerian Society of Physical Sciences, 769. [Link]
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack
menace among selected university undergraduates in Nigerian. International Journal of Electrical and Computer
Engineering (IJECE), 13(2), 1943–1953. [Link]
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing
susceptibility amongst students of petroleum resources varsity in Nigeria. International Journal of Electrical and Computer
Engineering, 13(2), 1922–1931. [Link]
_________________________
Arnold Adimabua Ojugo, Ph.D.
PG/Ph.D/20212223