Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

1

FEDERAL UNIVERSITY OF PETROLEUM RESOURCES EFFURUN


DEPARTMENT OF COMPUTER SCIENCE
SEMINAR / PROJECT / DISSERTATION / THESIS FORMAT

Instruction to Prospective Candidates


Please read carefully for your action and information. The following instructions below shall be
the new procedures and modalities for PG Graduation from the Department of Computer Science.

1. It is a Prerequisite that for Dissertation and Thesis Reporting, it is a universally accepted


standard that candidates must engage in the following viva-voce presentations namely:

PGD/MSc Candidates - They must be prepared through these stages at the Department:
a. PreField/Synopsis Presentation which is restricted only to the Department
b. PostField Presentation is restricted to the College, whereby the College can either send her
representative to the Department (though I feel it is better, it is organized by the College
and within her walls) so the candidates feel the enormity and importance of what is been
done.
c. SPGS/Final Defense is accomplished at the University who decides with published
references so the University can ascertain if the candidate is worthy of being awarded the
degree in question.

MPhil/Ph.D. Candidates – The candidates must first be prepared through these stages at the
Department namely:
a. Departmental Presentations – There are basically Three (3) presentations in readiness
for College or Faculty Presentation. They include:
i. PreField is Chapter 1-3, usually called Synopsis in which the candidate's title is locked
against the candidate vis-a-vis the proposed major/minor/alternate supervisor(s).
ii. Field Presentation is done when the candidate has retrieved the needed Data to be used.
The presentation is aimed at verifying the volume, veracity, velocity, adequacy and
other feats of the data gathered to support the nature of the work being understudied.
iii. PostField Presentation is the complete work with result findings as discussed and
contributions highlighted. Having been deemed satisfactory, the candidate is approved
for College.

b. College / Faculty Presentation – Candidate makes a representation of the PostField to all


College members for consideration. Where the candidate is deemed successful, they are
approved to advance to SPGS.

c. SPGS / University Presentation – is regarded as the final presentation which has the Vice-
Chancellor as its Chairman. Where the VC is not present, s(he) sends a representative to
chair the defense.

2. As seen by these many presentations, there shall be a viva-voce presentation at the Department
Third (3rd) Thursday of every Month for the duration of each Semester (except during the
time of Examinations). Only ready/prepared candidates will be entertained.
2

3. The status of ready/prepared candidate(s) are those whom:


a.Have met their supervisor/mentor and satisfied all requirements therein
b.Must be presented for the viva-voce at the Department only by their supervisor
c.Must effect the corrections so provided, which must be checked by the PG Coordinator and
ascertained as fulfilled - in readiness for the next stage.
d. Have been cleared by the Department as ready for the next stage of defense.

4. For readiness, only the first 5-ready candidates as cleared for presentation through the
Departmental PG Coordinator and approved by the HoD as ready (for the various levels of
PGD, MSc, MPhil and PhD) will be allowed for each viva-voce presentation. A list of ready
candidates will be made available 2weeks prior to enable all stakeholders prepare adequately
in advance for the task. Where no candidate(s) is ready, the Department will not present
anyone for such defense.
3

The Reported Project / Dissertation / Thesis Structure


Abstract is a summary of work done so far. It gives a reader a first (or final) impression of the
study. It can be engaging, or discouraging. A good abstract must summarize these components:
- One-line opening sentence for Introduction.
- One line on literature to show that you are not working on something that has been previously
accomplished.
- One line of significance to establish the literature gap – noting (if/where) others have noticed
the same gap and deemed it insignificant. You need to establish the significance of carrying
out the study. An abstract should contain a summary of the relevance of your work.
- Problem statement must clearly describe the research to broadly capture the challenges in the
system of interest and must describe how your project fills these gap in literature.
- Method used: An abstract should contain a summary of the materials you intend to use and
the procedures you intend to follow to actualize the objectives of the study.
- Outcome: The results found must be captured in the abstract.
- Concluding statement: This should be a strong concluding sentence that succinctly, captures
all aspects of the abstract.

Note: though – the abstract appears first, it is the last to be written last as a clear summary of
the proposal’s content. The length of a proposal depends on guidelines given by your supervisor.

Chapter One: Introduction


- Background of Study – It should describe a topic from various (previous) author viewpoint
– discussing it in a way that shines more light on the aim and objective(s) of the study. While,
it is best to describe the topic from the viewpoint of previous authors chronologically (i.e.
2019 before 2020, then 2021-2022 etc) – it is also good to clearly state the trends,
developments and deficiencies of previous work that authors may have missed or deemed
insignificant. We recommend that the maximum length of a background of study no exceed
three-pages

- Statement of Problem(s) – It must clearly and concisely identifies the current challenges you
have encountered in the existing system that has now become the motivating standpoint you
wish to address in this study. These itemized issues, become the focal point(s) of your study.
A sample statement of the problem is highlighted below:
The Existing Problem – User trust is lowered due to intrusion activities by adversaries
The Ideal – Users need to trust must be sustained over their Use of the Internet irrespective
of the existence of hackers and adversaries
Consequence of Problem – Lowered-user-trust in adoption of Internet-based devices and
technology impacts businesses even with advances in digital revolution

- Aim and Objective(s): The S.M.A.R.T Way


The aim provides the specific mission, goal and overall motive of the study in one sentence.
It is what the study stands to achieve. Going from the sample above for the Statement of
Problem, we have that the Aim of Research to carry out - In this work, we will examine the
user-trust in the adoption of Internet-based technologies vis-à-vis its impact on businesses
with the advances in digital revolution.
4

The objective(s) conversely, are a list of achievable milestones, which as we reach, take us
closer to our AIM. They must be: Specific, Measurable, Attainable, Relevant, and Time-
bound. Sample objective(s) should include (and more):
a. Understudying the existing system shows system has flaws (namely: 1, 2, 3,..n), which this
study wishes to address by doing this (aim).
b. We propose the Machine-learning heuristics that use the deep clustering framework
c. We propose the algorithm (name of our proposed algorithm) as a decision support model
to support the proposed framework system to help it learn and effect the needed changes
d. We measure the performance of the proposed deep-learning cluster (DeLClustE) algorithm
using specificity, sensitivity and accuracy indicators
e. We benchmark the proposed algorithm using ___ (previous, successfully implemented)
methods to compare generated results (using charts to display and distinguish) between the
existing system and the proposed methodology.

Ideal • What is the case


situation supposed to be?

• Reasons for this


The reality
existing • Consequences of
the reality

• The gap to be filled?


Expected • How do i fill that gap?
situation • The result of filling
the gap?

- Hypothesis / Research Question - A hypothesis is an unproven statement or proposition that


can either be refuted or supported by empirical data. Thus, it is known that hypothetical
statements assert a possible answer to a research question. It can also be viewed as a
researcher’s prediction about the relationship between variables of interest. The stated
relationship by a hypothesis must be clearly defined and easily measurable. They are either
True/False via the conduct of a statistical testing on sampled data drawn from a population.
Hypotheses are inevitable if you are working with large statistical data. Research questions
are inspired by: practical/theoretical concerns, personal interests, previous studies, etc. You
must consider availability/access to resources and data, research significance, ability of the
researcher, theoretical background, does the question cover the research scope, and any
external requirements. The difference between a research question and hypothesis – is in
conducting the research. While, the former aims to find the answers to a question; the latter –
seeks to test the hypothesis via appropriate statistical tests.

- Purpose/Significance of the Study – Here, we must clearly state: (a) Who will benefit from
this study, (b) Why is it critical and imperative to implement this study, and not abandon it,
and (c) How will the goals of the study be attained and how it will impact on the immediate
community, and the world at large.
5

Chapter Two: Literature Review


- Conceptual Review – It enables a researcher to formulate his/her problem(s) with specific
aspects of a general area of interest that has not been so far researched. The reviews exposes
him/her to a larger body of knowledge, and equip him/her with knowledge to efficiently follow
the research process through. It helps him/her to avoid pitfalls or mistakes made by previous
researchers in the area. It grants a researcher better coherence of his study’s result and that of
previous authors. A proper review helps: (a) avoids duplication of previous work, (b) uncover
reported results and what is learned, (c) become familiar with the available body of methods,
(d) understand relevant concepts/theories to be used, (e) understand if there exist in former
researches – contradictions, controversies and inconsistencies in relation to this work, (f) also
understand if there are unanswered research questions, (g) develop an analytical framework,
and (h) consider the inclusion of variables in his research that he might not otherwise have
thought about. The researcher can choose sub-sections (under the guidance of a mentor or
supervisor) to suit the project/dissertation/thesis as the case may be. Here, the researcher is
also expected to: (a) present theories (old and new), (b) state how these theories are relevant
to the study, and (c) reveal (or express mathematically and otherwise) how these theories will
be implemented in the study.

- Review of Related Works – Going forward from the previous authors – whom have worked
on this topical issue or area, the researcher can summarize this section through a Table 2.1
that captures the following in a series of columns namely: (a) authors, date and title of study,
(b) adopted methodology for the study, (c) study’s outcome, (d) strength of the study, and (e)
inherent gaps/weaknesses of the study. The researcher is expected to review previous articles,
recent manuscripts and texts geared towards this area – of no less than 30-authors.
Table 2.1. Review of Related Literatures
N Author(s), Date and Title Research Objectives Methods Used Strengths/Findings Inherent Gaps
1 Shahid et al. (2017). Survey of IDSs and Comparative Pin-point needed areas i. Model cannot be
From Intrusion Detection Intrusion Response Analysis Survey of interest pertaining to implemented to
to an Intrusion Response Systems base on IRS - response time, its establish usefulness
System: Fundamentals, Response option for option selection, attack of IRS extensions.
Requirements, and Future different types of mitigation, alert use, ii. Deep learning was
Directions network attacks. and adaptability never explored
2 Yuancheng et al. (2017). An intrusion detection Online Sequence Supremacy in terms of i. Predictive learning-
Intrusion detection system based on Extreme speed and accuracy as not inclusive
system using Online Online Sequence Learning compared with other ii.Rule redundancy
Sequence Extreme Extreme Learning Machine (OS- approaches not explored
Learning Machine Machine (OS-ELM) is ELM) with iii.Explanatory
(OSELM) in advanced established, Simulation mechanism not
metering infrastructure results utilized
3 Mageswary and K-means algorithm is K-means Dual detection- normal i. Predictive learning-
Karthikeyan (2018). used for detecting the algorithm or Denial of not inclusive.
Intrusion Detection Using normal or Denial of Service(DOS) attack ii. No predictive
Data Mining Techniques Service attack learning was
category accommodated

- Knowledge Gaps Identified


From the Table 2.1 – the researcher must identify the various knowledge gaps from the various
authors’ standpoint. S(he) must also be able to: (a) itemize these knowledge gaps explicitly,
clearly and concisely, and (b) s(he) must be able to introduce various technologies, model and
6

framework (features and characteristics) that can help him/her to resolve the identified gaps
from the various knowledge shared therein. That is, s(he) must show what technology, means
and the technical procedures needed to support his/her argument in a bid to resolve the gaps.
Thus, going forward, the researcher should be able to identify and concisely state clearly the
features-technologies-systems: (a) to adopt to help resolve gap found, (b) why they should be
adopted, (c) its relevance (i.e. positive and negative effect these feature(s) will impact on the
ongoing research), (d) selection of feature(s) to ensure that the research adopts/blends all the
various strengths gained from the previous works, with none of its weaknesses.

- Summary of Literature Review (Bridging the Knowledge Gap)


Creation of a summary Table 2.2 that captures: (a) these identified features/parameters that
promotes a means to resolve the identified gaps, and the methodology explored therein. The
sum of this section being that the researcher seeks to simply highlight, how his/her work
differs from previous reviewed authored studies.

Table 2.2. Summary of Related Literatures


Author(s) Evaluation Features and Components
and Year of Data Rule- Intrusion Data Model Accuracy Evaluation Explored Methods
N Research Set Based Detection Optimize Classification Value method
1 Sampada et Yes No Yes Yes Yes Yes Yes SNORT-
al. (2004) ANN+Fuzzy
inference System
2 Adel et al. Yes No Yes No No Yes No Adaptive Neuro
(2006) Fuzzy Inference
System
3 Saurav et al. Yes No Yes No No Yes Yes C4.5, Nave-Bayes,
(2016) DT, Bayesian
Network
Proposed Methodology
Author Yes Yes Yes Yes Yes Yes Yes Concisely state the
Name, Date methods explored
and Title of
Proposed
Work

Chapter Three: Materials and Methods


- Description of the Existing System
The researcher must be able to concisely and efficiently describe the workings of the current
and/or existing system being used. In doing so, s(he) must be able to note concern – where the
gaps have been identified. This will effectively help the researcher in the project to know:
a. What changes needs to be made (goal/objective subset)
b. Why does the existing system require/need (urgently) this changes to be made (rationale)
c. How they will be made (methodology)
d. These changes, if and when successfully made – of what significant impact will it denote
and connote for the new system (contributions to knowledge as posited by the research)

Since, this is Computing Sciences – the researcher must be able to use Data Flow Diagrams
(DFD) to pictorially represent and describe to a potential reader, the working structure and
how data flows within the existing system.
7

- Proposed Experimental Methodology / Framework / Heuristics


Leaning forward from the existing system – the researcher must describe what modifications
his/her proposed method will make to the existing system, and clearly, state the impact of the
revision. S(he) must be describe how the new method (system) will now work. S(he) must do
so via software engineering principles and methods. The type of system proposed – will
determine the software engineering (SE) method to be used. E.g. SE methods include: Agile,
Waterfall, Rapid application, Joint application, Scrum, Prototyping, Spiral, Dynamic system,
Extreme programming, Lean, and DevOps. Researcher must be able to adopt/adapt a specific
style of development, know why s(he) is adopting the one, know its S.W.O.T, and make an
informed choice.
Researcher must be able to use the diagrams below, to describe the workings of the
proposed cum experimental framework and/or system as thus:
a. Use-case diagram
b. Interaction diagram
c. Sequence diagram
d. Activity diagram
e. Behavioral view (High-level Language – where the research is centered around

All these presents how data will flow from one component to another within the system, how
these data are to be processed, what likely output is expected, and how the various components
in the system will interact with each other.

- Description of Data Collection / Gathering


The researcher will explain: (a) what type of data s(he) requires to make the system work
(since it is a known fact that a Program = Data + Instructions (+Method +System)). S(he) must
concisely and clearly state: (a) the type of data to be collected (i.e. dataset), (b) how/where it
is to be collected from, (c) the contents and makeup of the dataset etc. The researcher should
also be able to show a sample table or format of the data to be used.

Chapter Four: System Implementation, Result Findings and Discussion


- High-Level Language (Optional if research is Software-Based)
Here, the research describes

- System Specification – The researcher should be able to specify:


a. Input and Output Design – states how the input design for the system will look like
alongside the corresponding output format and how they should look like. There is always
the idea to consider the internal factors (such as throughput, scalability, response time, and
availability/reachability of the system) in relation to the external factors (functionality of
the system, memory capacity of the computer used, size of memory to hold the new system,
and others). These, input (internal) and output (external) factors become the indicators we
will use to measure the performance of the proposed system

b. Algorithm – researcher should name proposed algorithm, and clearly list it. It is also note-
worthy to state the Mathematical Expressions here (where applicable). Sample algorithm
named DeLClustE (i.e. Deep-Learning Cluster Ensemble)
8

Algorithm 2: The DeLClustE Algorithm


Input: Selected Features: Output: Converted Feature Data Type
Initialize DeLClustE with PHMM; states;
K-means cluster fits on k-sub DNNs
For Each Selected Parameter do
Sample states using Forward Filtering
Compute Backward Sampling algorithm on states
Sample each transition parameters: 𝑇𝑖 = 𝑀𝑢𝑙𝑡(𝑛𝑖𝑗 ∖ 𝑇𝑖 ) 𝐷𝑖𝑟 (𝑇𝑖 ∖ 𝑐𝑘 )
End For Each

c. Database Design and Structure (where applicable) – Here, we describe the nature of the
database tables and its structure. We describe the relationship between the database and the
system vis-à-vis using the class-diagrams to show how the database interacts. Here, we will
use the class diagram as in Software Engineering principles to show how the various data
interact with each other in the various tables that holds each data.

d. Data Dictionary (where applicable) – Here, we describe other relevant features of the
collected data.

- System Flowchart
Shows pictorial representation of the proposed system/framework using flowchart symbols

- System Implementation
Using sample results generated from system testing, researcher should be able to detail on the
following:
a. Hardware/Software Requirements
b. Program Development Environment and Choice of Programming
c. System Training / Testing – The researcher must show: (i) a test plan, (ii) comparison of
the expected versus actual/observed test results, and (iii) limitations of the system
d. Discussion of Findings – clarifies implications of the results generated, and how they meet
our stated objectives. It is best to use charts (of the existing versus proposed system) to
show the resultant system.
e. Performance evaluation of the new system using performance indicators such as scalability,
throughput of system, response time, accuracy, sensitivity, specificity and recall rates etc.
f. Benchmarking – seeks to compare the performance of the proposed system in relation to
the successfully implemented existing frameworks. It is best to use charts (of the existing
versus proposed system) to show the resultant system.
g. Security Concerns/Issues, Documentation and System Training Procedures (for new users)
h. System Conversion/Changeover Procedures, and Recommended Changeover Procedure.

Chapter 5: Summary and Conclusion


- Summary
Summarize what each chapter stood for and what each reader is to expect to achieve therein.

- Recommendations / Application Areas


Suggest deliverable(s) that the reader will take-away. Where can this study be applied and
how.
9

- Knowledge Contribution(s)
State clearly if your objectives where met.

- Conclusion
Your way of ending the report

For References – We expect the main references to be from peer-reviewed journals (International/Local)
and Conference proceedings. All references should be to the most pertinent, up-to-date sources. Sample
agreed number of references are as thus:
- B.Sc. – 50-references and above
- M.Sc. – 80-references and above
- Ph.D. – over 100-references

For a Project (BSc), Dissertation (MSc) and Thesis (MPhil/Ph.D) – we expect a minimum of 40-for BSc,
50-for MSc and 60-for MPhil/Ph.D references entries. References are written in APA style. References can
either be by narration: e.g. Akazue et al., (2022) investigated the food distribution using blockchain
model…etc, or by in-text/parenthesis: e.g. …study is targeted at implementing SmartBeef blockchain to
effective manage the safety and security of the livestock (Akazue et al., 2022, 2023).

Some sample in-text citation can be done as thus: (Akazue et al., 2022, 2023; Brunton et al., 2020; Crawford
et al., 2020; Divayana, 2021; Eboka & Ojugo, 2020; Eghwerido et al., 2021; Géron, 2017; Haipinge et al.,
2022; Komolafe et al., 2020; Muxtorjonovna, 2020; Obasi, Nwele et al., 2020; Ojugo & Yoro, 2021; Piegat,
2014; Psaros et al., 2022; Saxena & Rajpoot, 2021; Shahane et al., 2019; Shroff et al., 2021; Toivonen et
al., 2009; Udeze et al., 2022; Yoro, Aghware, Akazue, et al., 2023; Yoro, Aghware, Malasowe, et al., 2023).
- It is very good practice to use articles in referred journals and texts. Please and as much as possible,
refrain from using and making references to in-text citations from newspapers, magazines, Wikipedia
and blogs. These sources have not passed through the required scrutiny.
- Use software such as Mendeley, EndNote, Zotero, X9 to generate the references used in the study for
in-text citations and reference management and formatting, and choose APA style. Please use a
consistent format for references-see examples (10-point):
- Use Grammarly to correct all forms of typos, grammatical spellings and phrases etc
- Use TurnitIn (recommended) or iThenticate (recommended) to reduce the similarity index to an
acceptable rate (between 18-to-20%). This will ensure the originality of the work and study.
- Quillbot Paraphraser – or you can harness your ingenuity to paraphrase your work.
- Acceptable reference styles for Projects, Dissertation and Thesis includes: APA, IEEE, Harvard,

The APA-Referencing Style


Journal/Periodicals – Basic Format:
Author-1, A.B., Author-2, C.D., & Author-3, E.F., (Date). “Title of paper,” Full Title of Journal/Periodical, vol. x
(no. x), pages xxx-xxx, doi: xxx.
Examples
Baier, F., Decker, A.T., Kleickman, T., Klusmann, U., & Kunter, M., (2019). What makes a good teacher? The relative
importance of mathematics teachers’ cognitive ability, personality, knowledge beliefs, and motivations for
instructional quality, British Journal of Educational Psychology, 89(4), 767-786, doi: 10.1111/bjep.12256
Fardel, R., & Nagel, M., (2021). Fabrication of organic light emitting diode pixels by laser-assisted forward transfer,
Applied Physics Letters, 91(6): 54-67, https://doi.org/10.1063/1.2759475.

Conference Proceedings – Basic Format


Author-1, F., Author-1, & Author-3, M., (Date). Title of the work, In Proceedings of the Name of the Conference,
(Location of the Conference, Country is optional), pages xxx-xxx, doi: xxx
10

Example:
Baier, F., Decker, A.T., Kleickman, T., Klusmann, U., & Kunter, M., (2019). Importance of mathematics teachers
cognitive ability and motivations for instructional quality, In Proc. of the 12th Conference of British
Association of Educational Psychology, (Minneapolis-Indiana, USA), 767-786, doi: 10.1111/bjep.12256
Fardel, R., & Nagel, M., (2021). Fabrication of organic light emitting diode pixels by laser-assisted forward transfer,
In Proceedings of the World Association of Science and Engineering, (Kwon-loon, Hong-Kong), 154-167,
https://doi.org/10.1063/1.2759475.

Book – Basic Format


Author-1, F., Author-1, & Author-3, M., (Date). Title of Chapter in Book or Title of Published Book, (Name of
Editor(s), x-Edition) Publisher, City of Publisher, pages xxx-xxx
Example
Géron, A. (2017). Hands-on Machine Learning with Scikit-Learn and Tensorflow (D. T. Chu & T. Turner (eds.); 9th
ed.). Wiley-Blackwell.

M. Dissertation (B.Sc., M.Sc.) and Thesis (Ph.D.) – Basic Format:


Author, F.K., (Date). Title of Project/Dissertation/Thesis, BSc Project/MSc. Dissertation/Ph.D Thesis, Department of
X, x-University, State, Country
Example:
Williams, J.O., (2021). Narrow-band analyzer for parametric study on thermal and chemical non-equilibrium nozzle
flow, Ph.D. Thesis, Department of Physics, Federal University of Petroleum Resources, Effurun, Delta State
Nigeria.

References (Sample of Works)


Akazue, M. I., Ojugo, A. A., Yoro, R. E., Malasowe, B. O., & Nwankwo, O. (2022). Empirical evidence of phishing menace among
undergraduate smartphone users in selected universities in Nigeria. Indonesian Journal of Electrical Engineering and
Computer Science, 28(3), 1756–1765. https://doi.org/10.11591/ijeecs.v28.i3.pp1756-1765
Akazue, M. I., Yoro, R. E., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Improved services traceability and management
of a food value chain using block-chain network : a case of Nigeria. Indonesian Journal of Electrical Engineering and
Computer Science, 29(3), 1623–1633. https://doi.org/10.11591/ijeecs.v29.i3.pp1623-1633
Brunton, S. L., Noack, B. R., & Koumoutsakos, P. (2020). Machine Learning for Fluid Mechanics. Annual Review of Fluid
Mechanics, 52(1), 477–508. https://doi.org/10.1146/annurev-fluid-010719-060214
Crawford, J., Butler-Henderson, K., & Rudolph, J. (2020). COVID-19: 20 countries’ higher education intra-period digital pedagogy
responses. Journal of Applied Learning & Teaching, 3(1). https://doi.org/10.37074/jalt.2020.3.1.7
Divayana, D. G. H. (2021). Aneka-based asynchronous and synchronous learning design and its evaluation as efforts for improving
cognitive ability and positive character of students. International Journal of Modern Education and Computer Science,
13(5), 14–22. https://doi.org/10.5815/ijmecs.2021.05.02
Eboka, A. O., & Ojugo, A. A. (2020). Mitigating technical challenges via redesigning campus network for greater efficiency,
scalability and robustness: A logical view. International Journal of Modern Education and Computer Science, 12(6), 29–
45. https://doi.org/10.5815/ijmecs.2020.06.03
Eghwerido, J. T., Nzei, L. C., & Agu, F. I. (2021). The Alpha Power Gompertz Distribution: Characterization, Properties, and
Applications. Sankhya A: The Indian Journal of Statistics, 83(1), 449–475. https://doi.org/10.1007/s13171-020-00198-0
Géron, A. (2017). Hands-on Machine Learning with Scikit-Learn and Tensorflow (D. T. Chu & T. Turner (eds.); 9th ed.). Wiley-
Blackwell.
Haipinge, E., Kadhila, N., & Josua, L. M. (2022). Using Digital Technology in Transforming Assessment in Higher Education
Institutions beyond COVID-19. Creative Education, 13(07), 2157–2167. https://doi.org/10.4236/ce.2022.137136
Komolafe, B. F., Fakayode, O. T., Osidipe, A., Zhang, F., & Qian, X. (2020). Evaluation of Online Pedagogy among Higher
Education International Students in China during the COVID-19 Outbreak. Creative Education, 11(11), 2262–2279.
https://doi.org/10.4236/ce.2020.1111166
Muxtorjonovna, A. M. (2020). Significance Of Blended Learning In Education System. The American Journal of Social Science
and Education Innovations, 02(08), 507–511. https://doi.org/10.37547/tajssei/volume02issue08-82
Obasi, Nwele, J., Amuche N, N., & Elias A., U. (2020). Economics of Optimizing Value Chain in Agriculture Sector of Nigeria
through Mechanised Crop Processing and Marketing. Asian Journal of Basic Science & Research, 02(01), 80–92.
https://doi.org/10.38177/AJBSR.2020.2109
Ojugo, A. A., & Yoro, R. E. (2021). Forging a deep learning neural network intrusion detection framework to curb the distributed
denial of service attack. International Journal of Electrical and Computer Engineering, 11(2), 1498–1509.
https://doi.org/10.11591/ijece.v11i2.pp1498-1509
Piegat, A. (2014). Uncertainty of Probability. Proc. 19th Triennial Congr. IEA, 56(October), 201–218.
https://doi.org/10.13140/2.1.3515.7763
11

Psaros, A. F., Meng, X., Zou, Z., Guo, L., & Karniadakis, G. E. (2022). Uncertainty Quantification in Scientific Machine Learning:
Methods, Metrics, and Comparisons. http://arxiv.org/abs/2201.07766
Saxena, A., & Rajpoot, V. (2021). A Comparative Analysis of Association Rule Mining Algorithms. IOP Conference Series:
Materials Science and Engineering, 1099(1), 012032. https://doi.org/10.1088/1757-899X/1099/1/012032
Shahane, S., Aluru, N. R., & Vanka, S. P. (2019). Uncertainty quantification in three dimensional natural convection using
polynomial chaos expansion and deep neural networks. International Journal of Heat and Mass Transfer, 139(October),
613–631. https://doi.org/10.1016/j.ijheatmasstransfer.2019.05.014
Shroff, A., Shah, B. J., & Gajjar, H. (2021). Shelf space allocation game with private brands: a profit-sharing perspective. Journal
of Revenue and Pricing Management, 20(2), 116–133. https://doi.org/10.1057/s41272-021-00295-1
Toivonen, R., Kovanen, L., Kivelä, M., Onnela, J.-P., Saramäki, J., & Kaski, K. (2009). A comparative study of social network
models: Network evolution models and nodal attribute models. Social Networks, 31(4), 240–254.
https://doi.org/10.1016/j.socnet.2009.06.004
Udeze, C. L., Eteng, I. E., & Ibor, A. E. (2022). Application of Machine Learning and Resampling Techniques to Credit Card Fraud
Detection. Journal of the Nigerian Society of Physical Sciences, 769. https://doi.org/10.46481/jnsps.2022.769
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack
menace among selected university undergraduates in Nigerian. International Journal of Electrical and Computer
Engineering (IJECE), 13(2), 1943–1953. https://doi.org/10.11591/ijece.v13i2.pp1943-1953
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing
susceptibility amongst students of petroleum resources varsity in Nigeria. International Journal of Electrical and Computer
Engineering, 13(2), 1922–1931. https://doi.org/10.11591/ijece.v13i2.pp1922-1931

Appendix A – Program Listing


Here, we show sample of the program code used as driver to support the algorithm

Appendix B – Sample Output


Here, we show other output generated by the program or system.

Appendix C – Questionnaire Tools Used (where applicable)


Here, we display sample questionnaire tools and others used (where applicable).

_________________________
Arnold Adimabua Ojugo, Ph.D.
PG/Ph.D/20212223

You might also like