Professional Documents
Culture Documents
Project Reporting 054630
Project Reporting 054630
PGD/MSc Candidates - They must be prepared through these stages at the Department:
a. PreField/Synopsis Presentation which is restricted only to the Department
b. PostField Presentation is restricted to the College, whereby the College can either send her
representative to the Department (though I feel it is better, it is organized by the College
and within her walls) so the candidates feel the enormity and importance of what is been
done.
c. SPGS/Final Defense is accomplished at the University who decides with published
references so the University can ascertain if the candidate is worthy of being awarded the
degree in question.
MPhil/Ph.D. Candidates – The candidates must first be prepared through these stages at the
Department namely:
a. Departmental Presentations – There are basically Three (3) presentations in readiness
for College or Faculty Presentation. They include:
i. PreField is Chapter 1-3, usually called Synopsis in which the candidate's title is locked
against the candidate vis-a-vis the proposed major/minor/alternate supervisor(s).
ii. Field Presentation is done when the candidate has retrieved the needed Data to be used.
The presentation is aimed at verifying the volume, veracity, velocity, adequacy and
other feats of the data gathered to support the nature of the work being understudied.
iii. PostField Presentation is the complete work with result findings as discussed and
contributions highlighted. Having been deemed satisfactory, the candidate is approved
for College.
c. SPGS / University Presentation – is regarded as the final presentation which has the Vice-
Chancellor as its Chairman. Where the VC is not present, s(he) sends a representative to
chair the defense.
2. As seen by these many presentations, there shall be a viva-voce presentation at the Department
Third (3rd) Thursday of every Month for the duration of each Semester (except during the
time of Examinations). Only ready/prepared candidates will be entertained.
2
4. For readiness, only the first 5-ready candidates as cleared for presentation through the
Departmental PG Coordinator and approved by the HoD as ready (for the various levels of
PGD, MSc, MPhil and PhD) will be allowed for each viva-voce presentation. A list of ready
candidates will be made available 2weeks prior to enable all stakeholders prepare adequately
in advance for the task. Where no candidate(s) is ready, the Department will not present
anyone for such defense.
3
Note: though – the abstract appears first, it is the last to be written last as a clear summary of
the proposal’s content. The length of a proposal depends on guidelines given by your supervisor.
- Statement of Problem(s) – It must clearly and concisely identifies the current challenges you
have encountered in the existing system that has now become the motivating standpoint you
wish to address in this study. These itemized issues, become the focal point(s) of your study.
A sample statement of the problem is highlighted below:
The Existing Problem – User trust is lowered due to intrusion activities by adversaries
The Ideal – Users need to trust must be sustained over their Use of the Internet irrespective
of the existence of hackers and adversaries
Consequence of Problem – Lowered-user-trust in adoption of Internet-based devices and
technology impacts businesses even with advances in digital revolution
The objective(s) conversely, are a list of achievable milestones, which as we reach, take us
closer to our AIM. They must be: Specific, Measurable, Attainable, Relevant, and Time-
bound. Sample objective(s) should include (and more):
a. Understudying the existing system shows system has flaws (namely: 1, 2, 3,..n), which this
study wishes to address by doing this (aim).
b. We propose the Machine-learning heuristics that use the deep clustering framework
c. We propose the algorithm (name of our proposed algorithm) as a decision support model
to support the proposed framework system to help it learn and effect the needed changes
d. We measure the performance of the proposed deep-learning cluster (DeLClustE) algorithm
using specificity, sensitivity and accuracy indicators
e. We benchmark the proposed algorithm using ___ (previous, successfully implemented)
methods to compare generated results (using charts to display and distinguish) between the
existing system and the proposed methodology.
- Purpose/Significance of the Study – Here, we must clearly state: (a) Who will benefit from
this study, (b) Why is it critical and imperative to implement this study, and not abandon it,
and (c) How will the goals of the study be attained and how it will impact on the immediate
community, and the world at large.
5
- Review of Related Works – Going forward from the previous authors – whom have worked
on this topical issue or area, the researcher can summarize this section through a Table 2.1
that captures the following in a series of columns namely: (a) authors, date and title of study,
(b) adopted methodology for the study, (c) study’s outcome, (d) strength of the study, and (e)
inherent gaps/weaknesses of the study. The researcher is expected to review previous articles,
recent manuscripts and texts geared towards this area – of no less than 30-authors.
Table 2.1. Review of Related Literatures
N Author(s), Date and Title Research Objectives Methods Used Strengths/Findings Inherent Gaps
1 Shahid et al. (2017). Survey of IDSs and Comparative Pin-point needed areas i. Model cannot be
From Intrusion Detection Intrusion Response Analysis Survey of interest pertaining to implemented to
to an Intrusion Response Systems base on IRS - response time, its establish usefulness
System: Fundamentals, Response option for option selection, attack of IRS extensions.
Requirements, and Future different types of mitigation, alert use, ii. Deep learning was
Directions network attacks. and adaptability never explored
2 Yuancheng et al. (2017). An intrusion detection Online Sequence Supremacy in terms of i. Predictive learning-
Intrusion detection system based on Extreme speed and accuracy as not inclusive
system using Online Online Sequence Learning compared with other ii.Rule redundancy
Sequence Extreme Extreme Learning Machine (OS- approaches not explored
Learning Machine Machine (OS-ELM) is ELM) with iii.Explanatory
(OSELM) in advanced established, Simulation mechanism not
metering infrastructure results utilized
3 Mageswary and K-means algorithm is K-means Dual detection- normal i. Predictive learning-
Karthikeyan (2018). used for detecting the algorithm or Denial of not inclusive.
Intrusion Detection Using normal or Denial of Service(DOS) attack ii. No predictive
Data Mining Techniques Service attack learning was
category accommodated
framework (features and characteristics) that can help him/her to resolve the identified gaps
from the various knowledge shared therein. That is, s(he) must show what technology, means
and the technical procedures needed to support his/her argument in a bid to resolve the gaps.
Thus, going forward, the researcher should be able to identify and concisely state clearly the
features-technologies-systems: (a) to adopt to help resolve gap found, (b) why they should be
adopted, (c) its relevance (i.e. positive and negative effect these feature(s) will impact on the
ongoing research), (d) selection of feature(s) to ensure that the research adopts/blends all the
various strengths gained from the previous works, with none of its weaknesses.
Since, this is Computing Sciences – the researcher must be able to use Data Flow Diagrams
(DFD) to pictorially represent and describe to a potential reader, the working structure and
how data flows within the existing system.
7
All these presents how data will flow from one component to another within the system, how
these data are to be processed, what likely output is expected, and how the various components
in the system will interact with each other.
b. Algorithm – researcher should name proposed algorithm, and clearly list it. It is also note-
worthy to state the Mathematical Expressions here (where applicable). Sample algorithm
named DeLClustE (i.e. Deep-Learning Cluster Ensemble)
8
c. Database Design and Structure (where applicable) – Here, we describe the nature of the
database tables and its structure. We describe the relationship between the database and the
system vis-à-vis using the class-diagrams to show how the database interacts. Here, we will
use the class diagram as in Software Engineering principles to show how the various data
interact with each other in the various tables that holds each data.
d. Data Dictionary (where applicable) – Here, we describe other relevant features of the
collected data.
- System Flowchart
Shows pictorial representation of the proposed system/framework using flowchart symbols
- System Implementation
Using sample results generated from system testing, researcher should be able to detail on the
following:
a. Hardware/Software Requirements
b. Program Development Environment and Choice of Programming
c. System Training / Testing – The researcher must show: (i) a test plan, (ii) comparison of
the expected versus actual/observed test results, and (iii) limitations of the system
d. Discussion of Findings – clarifies implications of the results generated, and how they meet
our stated objectives. It is best to use charts (of the existing versus proposed system) to
show the resultant system.
e. Performance evaluation of the new system using performance indicators such as scalability,
throughput of system, response time, accuracy, sensitivity, specificity and recall rates etc.
f. Benchmarking – seeks to compare the performance of the proposed system in relation to
the successfully implemented existing frameworks. It is best to use charts (of the existing
versus proposed system) to show the resultant system.
g. Security Concerns/Issues, Documentation and System Training Procedures (for new users)
h. System Conversion/Changeover Procedures, and Recommended Changeover Procedure.
- Knowledge Contribution(s)
State clearly if your objectives where met.
- Conclusion
Your way of ending the report
For References – We expect the main references to be from peer-reviewed journals (International/Local)
and Conference proceedings. All references should be to the most pertinent, up-to-date sources. Sample
agreed number of references are as thus:
- B.Sc. – 50-references and above
- M.Sc. – 80-references and above
- Ph.D. – over 100-references
For a Project (BSc), Dissertation (MSc) and Thesis (MPhil/Ph.D) – we expect a minimum of 40-for BSc,
50-for MSc and 60-for MPhil/Ph.D references entries. References are written in APA style. References can
either be by narration: e.g. Akazue et al., (2022) investigated the food distribution using blockchain
model…etc, or by in-text/parenthesis: e.g. …study is targeted at implementing SmartBeef blockchain to
effective manage the safety and security of the livestock (Akazue et al., 2022, 2023).
Some sample in-text citation can be done as thus: (Akazue et al., 2022, 2023; Brunton et al., 2020; Crawford
et al., 2020; Divayana, 2021; Eboka & Ojugo, 2020; Eghwerido et al., 2021; Géron, 2017; Haipinge et al.,
2022; Komolafe et al., 2020; Muxtorjonovna, 2020; Obasi, Nwele et al., 2020; Ojugo & Yoro, 2021; Piegat,
2014; Psaros et al., 2022; Saxena & Rajpoot, 2021; Shahane et al., 2019; Shroff et al., 2021; Toivonen et
al., 2009; Udeze et al., 2022; Yoro, Aghware, Akazue, et al., 2023; Yoro, Aghware, Malasowe, et al., 2023).
- It is very good practice to use articles in referred journals and texts. Please and as much as possible,
refrain from using and making references to in-text citations from newspapers, magazines, Wikipedia
and blogs. These sources have not passed through the required scrutiny.
- Use software such as Mendeley, EndNote, Zotero, X9 to generate the references used in the study for
in-text citations and reference management and formatting, and choose APA style. Please use a
consistent format for references-see examples (10-point):
- Use Grammarly to correct all forms of typos, grammatical spellings and phrases etc
- Use TurnitIn (recommended) or iThenticate (recommended) to reduce the similarity index to an
acceptable rate (between 18-to-20%). This will ensure the originality of the work and study.
- Quillbot Paraphraser – or you can harness your ingenuity to paraphrase your work.
- Acceptable reference styles for Projects, Dissertation and Thesis includes: APA, IEEE, Harvard,
Example:
Baier, F., Decker, A.T., Kleickman, T., Klusmann, U., & Kunter, M., (2019). Importance of mathematics teachers
cognitive ability and motivations for instructional quality, In Proc. of the 12th Conference of British
Association of Educational Psychology, (Minneapolis-Indiana, USA), 767-786, doi: 10.1111/bjep.12256
Fardel, R., & Nagel, M., (2021). Fabrication of organic light emitting diode pixels by laser-assisted forward transfer,
In Proceedings of the World Association of Science and Engineering, (Kwon-loon, Hong-Kong), 154-167,
https://doi.org/10.1063/1.2759475.
Psaros, A. F., Meng, X., Zou, Z., Guo, L., & Karniadakis, G. E. (2022). Uncertainty Quantification in Scientific Machine Learning:
Methods, Metrics, and Comparisons. http://arxiv.org/abs/2201.07766
Saxena, A., & Rajpoot, V. (2021). A Comparative Analysis of Association Rule Mining Algorithms. IOP Conference Series:
Materials Science and Engineering, 1099(1), 012032. https://doi.org/10.1088/1757-899X/1099/1/012032
Shahane, S., Aluru, N. R., & Vanka, S. P. (2019). Uncertainty quantification in three dimensional natural convection using
polynomial chaos expansion and deep neural networks. International Journal of Heat and Mass Transfer, 139(October),
613–631. https://doi.org/10.1016/j.ijheatmasstransfer.2019.05.014
Shroff, A., Shah, B. J., & Gajjar, H. (2021). Shelf space allocation game with private brands: a profit-sharing perspective. Journal
of Revenue and Pricing Management, 20(2), 116–133. https://doi.org/10.1057/s41272-021-00295-1
Toivonen, R., Kovanen, L., Kivelä, M., Onnela, J.-P., Saramäki, J., & Kaski, K. (2009). A comparative study of social network
models: Network evolution models and nodal attribute models. Social Networks, 31(4), 240–254.
https://doi.org/10.1016/j.socnet.2009.06.004
Udeze, C. L., Eteng, I. E., & Ibor, A. E. (2022). Application of Machine Learning and Resampling Techniques to Credit Card Fraud
Detection. Journal of the Nigerian Society of Physical Sciences, 769. https://doi.org/10.46481/jnsps.2022.769
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack
menace among selected university undergraduates in Nigerian. International Journal of Electrical and Computer
Engineering (IJECE), 13(2), 1943–1953. https://doi.org/10.11591/ijece.v13i2.pp1943-1953
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing
susceptibility amongst students of petroleum resources varsity in Nigeria. International Journal of Electrical and Computer
Engineering, 13(2), 1922–1931. https://doi.org/10.11591/ijece.v13i2.pp1922-1931
_________________________
Arnold Adimabua Ojugo, Ph.D.
PG/Ph.D/20212223