0% found this document useful (0 votes)
24 views14 pages

Project Report Format-1 2

The document outlines the seminar, project, dissertation, and thesis format for postgraduate candidates in the Department of Computer Science at the Federal University of Petroleum Resources Effurun. It details the required stages of presentations for PGD/MSc and MPhil/Ph.D. candidates, including preparation, departmental, college, and university presentations, as well as guidelines for proposal writing and the structure of the final report. Additionally, it emphasizes the importance of meeting specific criteria to be considered a 'ready' candidate for presentations.

Uploaded by

Giftnaytan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views14 pages

Project Report Format-1 2

The document outlines the seminar, project, dissertation, and thesis format for postgraduate candidates in the Department of Computer Science at the Federal University of Petroleum Resources Effurun. It details the required stages of presentations for PGD/MSc and MPhil/Ph.D. candidates, including preparation, departmental, college, and university presentations, as well as guidelines for proposal writing and the structure of the final report. Additionally, it emphasizes the importance of meeting specific criteria to be considered a 'ready' candidate for presentations.

Uploaded by

Giftnaytan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1

FEDERAL UNIVERSITY OF PETROLEUM RESOURCES EFFURUN


DEPARTMENT OF COMPUTER SCIENCE
SEMINAR / PROJECT / DISSERTATION / THESIS FORMAT

Instruction to Prospective Candidates


Please read carefully for your action and information. The following instructions below shall be
the new procedures and modalities for PG Graduation from the Department of Computer Science.

1. It is a Prerequisite that for Dissertation and Thesis Reporting, it is a universally accepted


standard that candidates must engage in the following viva-voce presentations namely:

PGD/MSc Candidates - They must be prepared through these stages at the Department:
a. PreField/Synopsis Presentation which is restricted only to the Department
b. PostField Presentation is restricted to the College, whereby the College can either send her
representative to the Department (though I feel it is better, it is organized by the College
and within her walls) so the candidates feel the enormity and importance of what is been
done.
c. SPGS/Final Defense is accomplished at the University who decides with published
references so the University can ascertain if the candidate is worthy of being awarded the
degree in question.

MPhil/Ph.D. Candidates – The candidates must first be prepared through these stages at the
Department namely:
a. Departmental Presentations – There are basically Three (3) presentations in readiness
for College or Faculty Presentation. They include:
i. PreField is Chapter 1-3, usually called Synopsis in which the candidate's title is locked
against the candidate vis-a-vis the proposed major/minor/alternate supervisor(s).
ii. Field Presentation is done when the candidate has retrieved the needed Data to be used.
The presentation is aimed at verifying the volume, veracity, velocity, adequacy and
other feats of the data gathered to support the nature of the work being understudied.
iii. PostField Presentation is the complete work with result findings as discussed and
contributions highlighted. Having been deemed satisfactory, the candidate is approved
for College.

b. College / Faculty Presentation – Here, the candidate makes a representation of the


PostField to all College members for consideration. Where the candidate is deemed
successful, they are approved to advance to SPGS.

c. SPGS / University Presentation – is usually regarded as the final presentation which has
the Vice-Chancellor as its Chairman. Where the VC is not present, s(he) sends a
representative to chair the defense.

2. As seen by these many presentations, there shall be a viva-voce presentation at the Department
Third (3rd) Thursday of every Month for the duration of each Semester (except during the
time of Examinations). Only ready/prepared candidates will be entertained.
2

3. The status of ready/prepared candidate(s) are those whom:


[Link] met their supervisor/mentor and satisfied all requirements therein
[Link] be presented for the viva-voce at the Department only by their supervisor
[Link] effect the corrections so provided, which must be checked by the PG Coordinator and
ascertained as fulfilled - in readiness for the next stage.
d. Have been cleared by the Department as ready for the next stage of defence.

4. For readiness, only the first 5-ready candidates as cleared for presentation through the
Departmental PG Coordinator and approved by the HoD as ready (for the various levels of
PGD, MSc, MPhil and PhD) will be allowed for each viva-voce presentation. A list of ready
candidates will be made available 2weeks prior to enable all stakeholders prepare adequately
in advance for the task. Where no candidate(s) is ready, the Department will not present
anyone for such defense.
3

Proposal
First, Choosing a Topic
Always check the initial feasibility of the title with these 5-Ws and 1-H questions namely:
- What are you going to do/what do intend to achieve? (Aim and Objectives)
- Why is this topic important? (relevance and your contribution)
- Who will you include in your study? (respondents, secondary data, and content)
- Where are you going to carry out your study? (scope and limitations)
- When will you carry out your study? (timeline)
- How will you carry out your research? (Methodology)

The Proposal/Synopsis Format - A proposal is a first view and insight into what the proposed
research should look like. Every proposal must contain the following items

- Executive Summary [1page] gives a little backdrop of the work, clearly states just one or
two issues that motivated the study, clearly and concisely states the methodology to be adopted
for the study (as well as notes if the study is an extension of a previous work), states expected
results to be achieved, and details the cost implication of the study.

- Background of Study [2-3pages] – Describes the topic from various author viewpoint, whom
have earlier written on the topic. Do so chronologically so that you follow the trend and see
the problems previous authors experienced in the past.

- Problem Statement / Study Motivation [1page] – clearly state the problems/issues you
discovered as the reasons for embarking on this study. These forms the focal issues to be
addressed and they must be S.M.A.R.T (i.e. specific, measureable, achievable, reusable and/or
robust, and time dependent).

- Aim / Objectives [1page] – The aim is what the research aims to achieve. The objectives are
specific, achievable outcomes (i.e. milestones) that as you achieve – leads to ultimately,
reaching the aim. They must be measurable.

- Study Justification/Rationale [1page] – clearly states/defines what your research will finally
address and how it will impact on the immediate society – while, having a global perspective.

- Literature Review [2-3pages] – gives a detailed, general description of a topic. So, we must
have atleast 3-sections namely: (a) The conceptual review, (b) Review of related literature as
displayed by Table 2.1 – which shows S.W.O.T (strength, weaknesses, opportunities and
threats) of previous studies you already researched, and (c) Summary of literatures as seen in
Table 2.2. with features, their relevance and gaps on both previous studies and how your
proposed method curb all that.

- Knowledge Gaps Identified [1-2pages] – from the Table 2.1 – the researcher must identify
the various knowledge gaps from the various authors’ standpoint. S(he) must also be able to:
(a) itemize these knowledge gaps explicitly, clearly and concisely, and (b) s(he) must be able
to introduce various technologies, model and framework (features and characteristics) that can
help him/her to resolve the identified gaps from the various knowledge shared therein. That
4

is, s(he) must show what technology, means and the technical procedures needed to support
his/her argument in a bid to resolve the gaps. Thus, going forward, the researcher should be
able to identify and concisely state clearly the features-technologies-systems: (a) to adopt that
will help resolve the gaps found, (b) why they should be adopted, (c) its relevance (i.e. positive
and negative effect these feature(s) will impact on the ongoing research), (d) selection of
feature(s) to ensure that the research adopts/blends all the various strengths gained from the
previous works, with none of its weaknesses.

- Proposed Methodology [2-3pages] – describes the base method your research wishes to
adopt. Your research is said to be a primary research (if you are the first to make such), and
secondary (if you are simply extending or making improvements to what has been done
before. Whichever is the case, you must: (a) describe the existing system stating its structure
via a data-flow diagram, its workings, and bottlenecks experienced in the workings.

- Expected Result [2-3pages] – What does the researcher expects as the intended research
result vis-à-vis or in relation to the stated aim and objectives.

- Work-plan/Time Frame Using Gantt Chart [1page] – see table 1 below


Sample Work-Plan / Time Frame
Time Line from September 2022 to April 2023
Description Sept Oct Nov Dec Jan Feb Mar Apr
Study of Existing System / Data
Collection
Model Development / Programming
In-Sample and Out-Sample
Interpretation of Results
Report Writing

Description: This research will span a period of __ months during which we will: (a) ascertain
goodness of the existing system of traceability – its internal workings and the bottlenecks
therein, (b) collect daily, monthly and yearly data from relevant bodies such as Federal
Ministry of Health FMOH, Federal Ministry of Agriculture and Rural Development FMARD,
Federal Ministry of Environment FME etc and others responsible for safety and traceability
data on food production with specific reference to livestock (beef production and safety
consumption), (c) develop the traceability framework and system for in-sample/out-sample
analysis of data, and (d) interpret finding and compare results to those of other models.

- Budgetary Allocation [1-2pages] – see table 2 below


Sample Budgetary Table
S/N ITEM/OPERATION Number UNIT COST TOTAL (N)
Personnel Cost / Allowances
1.1. Co-Researcher (8-Months) 25,000 200,000
1.2 Programmer (8-Months) 25,000 200,000
1.3 Visual Content Creator (8-Months) 25,000 200,000
1.4 Proof-Reader (4weeks) 50,000-in-all 50,000
Sub-Total N 450,000
5

2.0. Equipment / Tool


2.1. 15” Mac-Air Notebook (spec): 1 $1700 @N480 816,000
Processor 1.7GHz Intel Core i7 with 8GB
1600MHz DDR3
Graphic: Intel HD Graphics 5000 1536 MB
2.2. Laptop Computer (spec.): 1 120,000 120,000
15” HP Laptop computer with Windows 10
(64-bit)
Processor: Intel Core i7, 2.2GHz speed
Screen: 17.3 Inch 1080 x 1920 Resolution,
Wide screen
Graphics: AMD Radeon HD 7690, Intel HD
Graphics 2nd 3000
RAM: 8GB DDR3 and Hard Disk: 1TB. 7200
Rpm
2.3 HP LaserJet printer: All in one (spec): 1 65,000 65,000
HP LaserJet P2055D Printer with 1200x1200
dpi
2.4. Internet Subscription (4G-Lite Smile) (8-months) 10,000 80,000
2.5. Scientific License of MATLAB 2013b 1 $295 @N480 141,600
Sub-Total: N 1,222,600
3.0. Miscellaneous
3.1 Computer Consumables:
Tonner 2 18,000 36,000
Paper rims (80gm) 1 box 6,000 6,000
Pens and Markers NIL 400 400
3.2 Backup Storage Device (Western Digital) 1 N35,000 / 2TB 35,000
3.3 Subscription of 10Core Machine at WestGrid 3weeks 100,000/weekl 300,000
to run ACO y
Sub-Total: N 377,400
GRAND-TOTAL N2,000,000

- References – gives a detailed descriptions of authorities used in the course of reporting this
research. There are various reference styles namely: APA, IEEE, Chicago, MLA etc. Each
researcher must strictly adhere to the reference style adopted by either the Department,
Faculty/College, or Publishing House. Whatever articles are cited in the body of the research
must appear at the references section. And every cited work in the reference must also appear
in the body of the work. The essence is to ensure originality.
6

The Reported Project / Dissertation / Thesis Structure


Abstract is a summary of work done so far. It gives a reader a first (or final) impression of the
study. It can be engaging, or discouraging. A good abstract must summarize these components:
- Introduction into one-opening sentence of the abstract.
- Literature gap on your title – to show that you are not working on something that has been
done already. Your abstract should contain its summary.
- Purpose/Significance: It is not enough to establish a gap. Others may have noticed same gap
and have deemed it insignificant. You need to establish the significance of carrying out the
study. An abstract should contain a summary of the relevance of your work.
- Problem statement must clearly describe the research to broadly capture the challenges in the
system of interest and must describe how your project fills these gap in literature.
- Method used: An abstract should contain a summary of the materials you intend to use and
the procedures you intend to follow to actualize the objectives of the study.
- Expected outcome: Though a proposal describes a work in progress, it is important to make
projections on the possible outcomes of the research. This should be captured in the abstract.
- Concluding statement: This should be a strong concluding sentence which succinctly captures
all aspects of the abstract.

Note: though – the abstract appears first, it is the last to be written last as a clear summary of
the proposal’s content. The length of a proposal depends on guidelines given by your supervisor.

Chapter One: Introduction


- Background of Study – It should describe a topic from various (previous) author viewpoint
– discussing it in a way that shines more light on the aim and objective(s) of the study. While,
it is best to describe the topic from the viewpoint of previous authors chronologically (i.e.
2019 before 2020, then 2021-2022 etc) – it is also good to clearly state the trends,
developments and deficiencies of previous work that authors may have missed or deemed
insignificant. We recommend that the maximum length of a background of study no exceed
three-pages

- Statement of Problem(s) – It must clearly and concisely identifies the current challenges you
have encountered in the existing system that has now become the motivating standpoint you
wish to address in this study. These itemized issues, become the focal point(s) of your study.

A sample statement of the problem is highlighted below:


The Existing Problem – User trust is lowered due to intrusion activities by adversaries
The Ideal – Users need to trust must be sustained over their Use of the Internet irrespective
of the existence of hackers and adversaries
Consequence of Problem – Lowered-user-trust in adoption of Internet-based devices and
technology impacts businesses even with advances in digital revolution
Aim of Research to carry out - In this work, we will examine the user-trust in the adoption
of Internet-based technologies vis-à-vis its impact on businesses with the advances in digital
revolution.
7

Ideal • What is the case


situation supposed to be?

• Reasons for this


The reality
existing • Consequences of
the reality

• The gap to be filled?


Expected • How do i fill that gap?
situation • The result of filling
the gap?

- Aim and Objective(s): The S.M.A.R.T Way


The aim provides the specific mission, goal and overall motive of the study in one sentence.
It is what the study stands to achieve. The objective(s) conversely, are a list of achievable
milestones, which as we reach, take us closer to our AIM. They must be: Specific, Measurable,
Attainable, Relevant, and Time-bound.
Sample objective(s) should include (and more):
a. Understudying the existing system shows system has flaws (namely: 1, 2, 3,..n), which this
study wishes to address by doing this (aim).
b. We propose the Machine-learning heuristics that uses a deep clustering framework
c. We propose the algorithm (name of our proposed algorithm) as decision support model to
support the proposed framework system to help it learn and effect the needed changes
d. We measure the performance of the proposed deep-learning cluster (DeLClustE) algorithm
using specificity, sensitivity and accuracy indicators
e. We benchmark the proposed algorithm using ___ (previous, successfully implemented)
methods to compare generated results (using charts to display and distinguish) between the
existing system and the proposed methodology.

- Hypothesis / Research Question - A hypothesis is an unproven statement or proposition that


can either be refuted or supported by empirical data. Thus, it is known that hypothetical
statements assert a possible answer to a research question. It can also be viewed as a
researcher’s prediction about the relationship between variables of interest. The stated
relationship by a hypothesis must be clearly defined and easily measurable. They are either
True/False via the conduct of a statistical testing on sampled data drawn from a population.
Hypotheses are inevitable if you are working with large statistical data. Research questions
are inspired by: practical/theoretical concerns, personal interests, previous studies, etc. You
must consider availability/access to resources and data, research significance, ability of the
researcher, theoretical background, does the question cover the research scope, and any
external requirements. The difference between a research question and hypothesis – is in
conducting the research. While, the former aims to find the answers to a question; the latter –
seeks to test the hypothesis via appropriate statistical tests.
8

- Purpose/Significance of the Study – Here, we must clearly state why and how the attainment
of the goals in the study is good, and concisely note how it will impact on the immediate
community, and the world at large.

Chapter Two: Literature Review


- Theoretical / Conceptual Review – It enables a researcher to formulate his/her problem(s)
with specific aspects of a general area of interest that has not been so far researched. The
reviews exposes him/her to a larger body of knowledge, and equips him/her with knowledge
to efficiently follow the research process through. It helps him/her to avoid pitfalls or mistakes
made by previous researchers in the area. It grants a researcher better coherence of his study’s
result and that of previous authors. A proper review helps: (a) avoids duplication of previous
work, (b) uncover reported results and what was learned, (c) become familiar with available
methods, (d) understand relevant concepts/theories to be used, (e) understand if there exists
contradictions, controversies and inconsistencies in former findings, (f) understand if there are
unanswered research questions, (g) develop an analytical framework, and (h) consider the
inclusion of variables in his research that he might not otherwise have thought about. The
researcher can choose sub-sections (under the guidance of a mentor or supervisor) to suit the
project/dissertation/thesis as the case may be.

- Review of Related Works – Going forward from the previous authors – whom have worked
on this topical issue or area, the researcher can summarize this section through a Table 2.1
that captures the following in a series of columns namely: (a) authors, date and title of study,
(b) adopted methodology for the study, (c) study’s outcome, (d) strength of the study, and (e)
inherent gaps/weaknesses of the study. The researcher is expected to review previous articles,
recent manuscripts and texts geared towards this area – of no less than 30-authors.
Table 2.1. Review of Related Literatures
N Author(s), Date and Title Research Objectives Methods Used Strengths/Findings Inherent Gaps
1 Shahid et al. (2017). Survey of IDSs and Comparative Pin-point needed areas i. Model cannot be
From Intrusion Detection Intrusion Response Analysis Survey of interest pertaining to implemented to
to an Intrusion Response Systems base on IRS - response time, its establish usefulness
System: Fundamentals, Response option for option selection, attack of IRS extensions.
Requirements, and Future different types of mitigation, alert use, ii. Deep learning was
Directions network attacks. and adaptability never explored
2 Yuancheng et al. (2017). An intrusion detection Online Sequence Supremacy in terms of i. Predictive learning-
Intrusion detection system based on Extreme speed and accuracy as not inclusive
system using Online Online Sequence Learning compared with other [Link] redundancy
Sequence Extreme Extreme Learning Machine (OS- approaches not explored
Learning Machine Machine (OS-ELM) is ELM) with [Link]
(OSELM) in advanced established, Simulation mechanism not
metering infrastructure results utilized
3 Mageswary and K-means algorithm is K-means Dual detection- normal i. Predictive learning-
Karthikeyan (2018). used for detecting the algorithm or Denial of not inclusive.
Intrusion Detection Using normal or Denial of Service(DOS) attack ii. No predictive
Data Mining Techniques Service attack learning was
category accommodated

- Knowledge Gaps Identified


From the Table 2.1 – the researcher must identify the various knowledge gaps from the various
authors’ standpoint. S(he) must also be able to: (a) itemize these knowledge gaps explicitly,
9

clearly and concisely, and (b) s(he) must be able to introduce various technologies, model and
framework (features and characteristics) that can help him/her to resolve the identified gaps
from the various knowledge shared therein. That is, s(he) must show what technology, means
and the technical procedures needed to support his/her argument in a bid to resolve the gaps.
Thus, going forward, the researcher should be able to identify and concisely state clearly the
features-technologies-systems: (a) to adopt to help resolve gap found, (b) why they should be
adopted, (c) its relevance (i.e. positive and negative effect these feature(s) will impact on the
ongoing research), (d) selection of feature(s) to ensure that the research adopts/blends all the
various strengths gained from the previous works, with none of its weaknesses.

- Summary of Literature Review (Bridging the Knowledge Gap)


Creation of a summary Table 2.2 that captures: (a) these identified features/parameters that
promotes a means to resolve the identified gaps, and the methodology explored therein. The
sum of this section being that the researcher seeks to simply highlight, how his/her work
differs from previous reviewed authored studies.

Table 2.2. Summary of Related Literatures


Author(s) Evaluation Features and Components
and Year of Data Rule- Intrusion Data Model Accuracy Evaluation Explored Methods
N Research Set Based Detection Optimize Classification Value method
1 Sampada et Yes No Yes Yes Yes Yes Yes SNORT-
al. (2004) ANN+Fuzzy
inference System
2 Adel et al. Yes No Yes No No Yes No Adaptive Neuro
(2006) Fuzzy Inference
System
3 Mehdi Yes Yes Yes Yes No Yes Yes Naïve Bayes +
(2007) ANN
4 Saurav et al. Yes No Yes No No Yes Yes C4.5, Nave-Bayes,
(2016) DT, Bayesian
Network
..
Proposed Methodology
Author Yes Yes Yes Yes Yes Yes Yes Concisely state the
Name, Date methods explored
and Title of
Proposed
Work

Chapter Three: Materials and Methods


- Description of the Existing System
The researcher must be able to concisely and efficiently describe the workings of the current
and/or existing system being used. In doing so, s(he) must be able to note concern – where the
gaps have been identified. This will effectively help the researcher in the project to know:
a. What changes needs to be made (goal/objective subset)
b. Why does the existing system require/need (urgently) this changes to be made (rationale)
c. How they will be made (methodology)
d. These changes, if and when successfully made – of what significant impact will it denote
and connote for the new system (contributions to knowledge as posited by the research)
10

Since, this is Computing Sciences and Technology – the researcher must be able to use
Data Flow Diagrams (DFD) to pictorially represent and describe to a potential reader, the
working structure and how data flows within the existing system.

- Proposed Experimental Methodology / Framework / Heuristics


Leaning forward from the existing system – the researcher must describe what modifications
his/her proposed method will make to the existing system, and clearly, state the impact of the
revision. S(he) must be describe how the new method (system) will now work. S(he) must do
so via software engineering principles and methods. The type of system proposed – will
determine the software engineering (SE) method to be used. E.g. SE methods include: Agile,
Waterfall, Rapid application, Joint application, Scrum, Prototyping, Spiral, Dynamic system,
Extreme programming, Lean, and DevOps. Researcher must be able to adopt/adapt a specific
style of development, know why s(he) is adopting the one, know its S.W.O.T, and make an
informed choice.
Researcher must be able to use the diagrams below, to describe the workings of the
proposed cum experimental framework and/or system as thus:
a. Use-case diagram
b. Interaction diagram
c. Sequence diagram
d. Activity diagram
e. Behavioral view

All these presents how data will flow from one component to another within the system, how
these data are to be processed, what likely output is expected, and how the various components
in the system will interact with each other.

- Description of Data Collection / Gathering


The researcher will explain: (a) what type of data s(he) requires to make the system work
(since it is a known fact that a Program = Data + Instructions (+Method +System)). S(he) must
concisely and clearly state: (a) the type of data to be collected (i.e. dataset), (b) how/where it
is to be collected from, (c) the contents and makeup of the dataset etc. The researcher should
also be able to show a sample table or format of the data to be used.

Chapter Four: System Implementation, Result Findings and Discussion


- System Specification – The researcher should be able to specify:
a. Input and Output Design – states how the input design for the system will look like
alongside the corresponding output format and how they should look like. There is always
the idea to consider the internal factors (such as throughput, scalability, response time, and
availability/reachability of the system) in relation to the external factors (functionality of
the system, memory capacity of the computer used, size of memory to hold the new system,
and others). These, input (internal) and output (external) factors become the indicators we
will use to measure the performance of the proposed system
11

b. Algorithm – researcher should name proposed algorithm, and clearly list it. It is also note-
worthy to state the Mathematical Expressions here (where applicable). Sample algorithm
named DeLClustE (i.e. Deep-Learning Cluster Ensemble)
Algorithm 2: The DeLClustE Algorithm
Input: Selected Features: Output: Converted Feature Data Type
Initialize DeLClustE with PHMM; states;
K-means cluster fits on k-sub DNNs
For Each Selected Parameter do
Sample states using Forward Filtering
Compute Backward Sampling algorithm on states
Sample each transition parameters: 𝑇𝑖 = 𝑀𝑢𝑙𝑡(𝑛𝑖𝑗 ∖ 𝑇𝑖 ) 𝐷𝑖𝑟 (𝑇𝑖 ∖ 𝑐𝑘 )
End For Each

c. Database Design and Structure (where applicable) – Here, we describe the nature of the
database tables and its structure. We describe the relationship between the database and the
system vis-à-vis using the class-diagrams to show how the database interacts. Here, we will
use the class diagram as in Software Engineering principles to show how the various data
interact with each other in the various tables that holds each data.

d. Data Dictionary (where applicable) – Here, we describe other relevant features of the
collected data.

- System Flowchart
Shows pictorial representation of the proposed system/framework using flowchart symbols

- System Implementation
Using sample results generated from system testing, researcher should be able to detail on the
following:
a. Hardware/Software Requirements
b. Program Development Environment and Choice of Programming
c. System Training / Testing – The researcher must show: (i) a test plan, (ii) comparison of
the expected versus actual/observed test results, and (iii) limitations of the system
d. Discussion of Findings – clarifies implications of the results generated, and how they meet
our stated objectives. It is best to use charts (of the existing versus proposed system) to
show the resultant system.
e. Performance evaluation of the new system using performance indicators such as scalability,
throughput of system, response time, accuracy, sensitivity, specificity and recall rates etc.
f. Benchmarking – seeks to compare the performance of the proposed system in relation to
the successfully implemented existing frameworks. It is best to use charts (of the existing
versus proposed system) to show the resultant system.
g. Security Concerns/Issues, Documentation and System Training Procedures (for new users)
h. System Conversion/Changeover Procedures, and Recommended Changeover Procedure.

Chapter 5: Summary and Conclusion


- Summary
Summarize what each chapter stood for and what each reader is to expect to achieve therein.
12

- Recommendations / Application Areas


Suggest deliverable(s) that the reader will take-away. Where can this study be applied and
how.

- Knowledge Contribution(s)
State clearly if your objectives where met.

- Conclusion
Your way of ending the report

For References – We expect the main references to be from peer-reviewed journals (International/Local)
and Conference proceedings. All references should be to the most pertinent, up-to-date sources. For a
Project (BSc), Dissertation (MSc) and Thesis (MPhil/Ph.D) – we expect a minimum of 40-for BSc, 50-for
MSc and 60-for MPhil/Ph.D references entries. References are written in APA style. Some sample in-text
citation can be done as thus: (Akazue et al., 2022, 2023; Brunton et al., 2020; Crawford et al., 2020;
Divayana, 2021; Eboka & Ojugo, 2020; Eghwerido et al., 2021; Géron, 2017; Haipinge et al., 2022;
Komolafe et al., 2020; Muxtorjonovna, 2020; Obasi, Nwele et al., 2020; Ojugo & Yoro, 2021; Piegat, 2014;
Psaros et al., 2022; Saxena & Rajpoot, 2021; Shahane et al., 2019; Shroff et al., 2021; Toivonen et al., 2009;
Udeze et al., 2022; Yoro, Aghware, Akazue, et al., 2023; Yoro, Aghware, Malasowe, et al., 2023).
- It is very good practice to use articles in referred journals and texts. Please and as much as possible,
refrain from using and making references to in-text citations from newspapers, magazines, Wikipedia
and blogs. These sources have not passed through the required scrutiny.
- Use software such as Mendeley, EndNote, Zotero, X9 to generate the references used in the study for
in-text citations and reference management and formatting, and choose APA style. Please use a
consistent format for references-see examples (10-point):
- Use Grammarly to correct all forms of typos, grammatical spellings and phrases etc
- Use TurnitIn (recommended) or iThenticate (recommended) to reduce the similarity index to an
acceptable rate (between 18-to-20%). This will ensure the originality of the work and study.
- Quillbot Paraphraser – or you can harness your ingenuity to paraphrase your work.
- Acceptable reference styles for Projects, Dissertation and Thesis includes: APA, IEEE, Harvard,

The APA-Referencing Style


Journal/Periodicals – Basic Format:
Author-1, A.B., Author-2, C.D., & Author-3, E.F., (Date). “Title of paper,” Full Title of Journal/Periodical, vol. x
(no. x), pages xxx-xxx, doi: xxx.
Examples
Baier, F., Decker, A.T., Kleickman, T., Klusmann, U., & Kunter, M., (2019). What makes a good teacher? The relative
importance of mathematics teachers’ cognitive ability, personality, knowledge beliefs, and motivations for
instructional quality, British Journal of Educational Psychology, 89(4), 767-786, doi: 10.1111/bjep.12256
Fardel, R., & Nagel, M., (2021). Fabrication of organic light emitting diode pixels by laser-assisted forward transfer,
Applied Physics Letters, 91(6): 54-67, [Link]

Conference Proceedings – Basic Format


Author-1, F., Author-1, & Author-3, M., (Date). Title of the work, In Proceedings of the Name of the Conference,
(Location of the Conference, Country is optional), pages xxx-xxx, doi: xxx
Example:
Baier, F., Decker, A.T., Kleickman, T., Klusmann, U., & Kunter, M., (2019). Importance of mathematics teachers
cognitive ability and motivations for instructional quality, In Proc. of the 12th Conference of British
Association of Educational Psychology, (Minneapolis-Indiana, USA), 767-786, doi: 10.1111/bjep.12256
Fardel, R., & Nagel, M., (2021). Fabrication of organic light emitting diode pixels by laser-assisted forward transfer,
In Proceedings of the World Association of Science and Engineering, (Kwon-loon, Hong-Kong), 154-167,
13

[Link]

Book – Basic Format


Author-1, F., Author-1, & Author-3, M., (Date). Title of Chapter in Book or Title of Published Book, (Name of
Editor(s), x-Edition) Publisher, City of Publisher, pages xxx-xxx
Example
Géron, A. (2017). Hands-on Machine Learning with Scikit-Learn and Tensorflow (D. T. Chu & T. Turner (eds.); 9th
ed.). Wiley-Blackwell.

M. Dissertation ([Link]., [Link].) and Thesis (Ph.D.) – Basic Format:


Author, F.K., (Date). Title of Project/Dissertation/Thesis, BSc Project/MSc. Dissertation/Ph.D Thesis, Department of
X, x-University, State, Country
Example:
Williams, J.O., (2021). Narrow-band analyzer for parametric study on thermal and chemical non-equilibrium nozzle
flow, Ph.D. Thesis, Department of Physics, Federal University of Petroleum Resources, Effurun, Delta State
Nigeria.

References (Sample of Works)


Akazue, M. I., Ojugo, A. A., Yoro, R. E., Malasowe, B. O., & Nwankwo, O. (2022). Empirical evidence of phishing menace among
undergraduate smartphone users in selected universities in Nigeria. Indonesian Journal of Electrical Engineering and
Computer Science, 28(3), 1756–1765. [Link]
Akazue, M. I., Yoro, R. E., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Improved services traceability and management
of a food value chain using block-chain network : a case of Nigeria. Indonesian Journal of Electrical Engineering and
Computer Science, 29(3), 1623–1633. [Link]
Brunton, S. L., Noack, B. R., & Koumoutsakos, P. (2020). Machine Learning for Fluid Mechanics. Annual Review of Fluid
Mechanics, 52(1), 477–508. [Link]
Crawford, J., Butler-Henderson, K., & Rudolph, J. (2020). COVID-19: 20 countries’ higher education intra-period digital pedagogy
responses. Journal of Applied Learning & Teaching, 3(1). [Link]
Divayana, D. G. H. (2021). Aneka-based asynchronous and synchronous learning design and its evaluation as efforts for improving
cognitive ability and positive character of students. International Journal of Modern Education and Computer Science,
13(5), 14–22. [Link]
Eboka, A. O., & Ojugo, A. A. (2020). Mitigating technical challenges via redesigning campus network for greater efficiency,
scalability and robustness: A logical view. International Journal of Modern Education and Computer Science, 12(6), 29–
45. [Link]
Eghwerido, J. T., Nzei, L. C., & Agu, F. I. (2021). The Alpha Power Gompertz Distribution: Characterization, Properties, and
Applications. Sankhya A: The Indian Journal of Statistics, 83(1), 449–475. [Link]
Géron, A. (2017). Hands-on Machine Learning with Scikit-Learn and Tensorflow (D. T. Chu & T. Turner (eds.); 9th ed.). Wiley-
Blackwell.
Haipinge, E., Kadhila, N., & Josua, L. M. (2022). Using Digital Technology in Transforming Assessment in Higher Education
Institutions beyond COVID-19. Creative Education, 13(07), 2157–2167. [Link]
Komolafe, B. F., Fakayode, O. T., Osidipe, A., Zhang, F., & Qian, X. (2020). Evaluation of Online Pedagogy among Higher
Education International Students in China during the COVID-19 Outbreak. Creative Education, 11(11), 2262–2279.
[Link]
Muxtorjonovna, A. M. (2020). Significance Of Blended Learning In Education System. The American Journal of Social Science
and Education Innovations, 02(08), 507–511. [Link]
Obasi, Nwele, J., Amuche N, N., & Elias A., U. (2020). Economics of Optimizing Value Chain in Agriculture Sector of Nigeria
through Mechanised Crop Processing and Marketing. Asian Journal of Basic Science & Research, 02(01), 80–92.
[Link]
Ojugo, A. A., & Yoro, R. E. (2021). Forging a deep learning neural network intrusion detection framework to curb the distributed
denial of service attack. International Journal of Electrical and Computer Engineering, 11(2), 1498–1509.
[Link]
Piegat, A. (2014). Uncertainty of Probability. Proc. 19th Triennial Congr. IEA, 56(October), 201–218.
[Link]
Psaros, A. F., Meng, X., Zou, Z., Guo, L., & Karniadakis, G. E. (2022). Uncertainty Quantification in Scientific Machine Learning:
Methods, Metrics, and Comparisons. [Link]
Saxena, A., & Rajpoot, V. (2021). A Comparative Analysis of Association Rule Mining Algorithms. IOP Conference Series:
Materials Science and Engineering, 1099(1), 012032. [Link]
Shahane, S., Aluru, N. R., & Vanka, S. P. (2019). Uncertainty quantification in three dimensional natural convection using
polynomial chaos expansion and deep neural networks. International Journal of Heat and Mass Transfer, 139(October),
613–631. [Link]
14

Shroff, A., Shah, B. J., & Gajjar, H. (2021). Shelf space allocation game with private brands: a profit-sharing perspective. Journal
of Revenue and Pricing Management, 20(2), 116–133. [Link]
Toivonen, R., Kovanen, L., Kivelä, M., Onnela, J.-P., Saramäki, J., & Kaski, K. (2009). A comparative study of social network
models: Network evolution models and nodal attribute models. Social Networks, 31(4), 240–254.
[Link]
Udeze, C. L., Eteng, I. E., & Ibor, A. E. (2022). Application of Machine Learning and Resampling Techniques to Credit Card Fraud
Detection. Journal of the Nigerian Society of Physical Sciences, 769. [Link]
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack
menace among selected university undergraduates in Nigerian. International Journal of Electrical and Computer
Engineering (IJECE), 13(2), 1943–1953. [Link]
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing
susceptibility amongst students of petroleum resources varsity in Nigeria. International Journal of Electrical and Computer
Engineering, 13(2), 1922–1931. [Link]

Appendix A – Program Listing


Here, we show sample of the program code used as driver to support the algorithm

Appendix B – Sample Output


Here, we show other output generated by the program or system.

Appendix C – Questionnaire Tools Used (where applicable)


Here, we display sample questionnaire tools and others used (where applicable).

_________________________
Arnold Adimabua Ojugo, Ph.D.
PG/Ph.D/20212223

You might also like