SlideShare a Scribd company logo
1 of 84
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
A seminar on graduation thesis
format and contents for JUST
final year students:
(Guidance, discussion, Q & A)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Thesis contents
Chapter One: Introduction
Chapter Two: Literature Review
Chapter Three: Methodology
Chapter Four: Analysis & Design
Chapter Five: Implementation
Chapter Six: Discussion
Chapter Seven: Conclusion & future work
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Chapter One: Introduction
- Background of the study
- Problem statement
- Research questions
- Objectives
- Significance of the study
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Usually forms the first section of the introduction
to the thesis.
• Provides the overview of the study, establishes its
context.
• Explains why the proposed research is important,
and essential to understanding the main aspects
of the study
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Core Elements:
• A brief discussion of what is known about the
topic.
• Articulation of the research gap.
• What the researcher would like to do or aim to
achieve(research goal).
• The main argument of the research
• The major significance / contribution
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Before writing the background of the study, you have to:
• Conduct a preliminary research on your chosen topic.
• Read a lot of literature and gather relevant information.
• Identify the gap of the proposed research and develop
the research question
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Writing the background of the study:
1. Start by providing a definition of the research key
concepts.
2. Highlight the main developments of the research
topic.
3. Proceed to show the problem or gap of the study.
4. State the main goal of your study
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Problem Statement
• A concise and clear wording of the problem to be solved.
• The problem statement is the foundation and focus of the research
report.
• At minimum, a problem statement should include:
• What is the problem?
• Magnitude of the problem?
• Where is the problem?
• Why is it important to work on this problem?
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Questions - Examples
• A Research Question is a question that a study or
research project aims to answer.
• Is usage of mobile banking services in Somalia directly
related to the educational level?
• Does the level of usage of ICT services by Universities
differ from High Schools in Mogadishu-Somalia?
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• A research objective describes what your research
is trying to achieve.
• Summarize what is to be achieved by the
study.
• Gives an overview of the expected solution to
the problems
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• Should be specific and measurable
• Examples:
• To determine how much time males between the
age 13 to 21 spend playing video games.
• To develop a mobile application that registers the
individuals of rare blood groups
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Some verbs commonly used
in writing objectives
• General Objective:
• Asses
• Describe
• Investigate
• Explore
• Characterize
• Specific Objectives:
• Identify
• Define
• Estimate
• Determine
• Develop
• Demonstrate
• Compare
• Classify
• Measure
• Examine
• Analyze
• Design
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Significance of the Study
• Significance of the study, also called “Rationale” is the
section where the researcher tries to convince an audience
that the research is worth doing and the contributions it may
add.
• Questions to answer:
• Why this work is important?
• What are the implications of doing it?
• How does it stand to inform policy making?
• What use might your study have for others in the field or in general public?
• Who might benefit from it?
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Healthcare
To enable citizens to get
healthcare services on demand
People have to come physical to
hospitals to ask for service
Automating health services using healthcare on-demand
platforms, using mobile and web technologies
Can we improve the healthcare
service provision using IT?
Research Objectives
Save lives, protect vulnerable patients,
easily get health services conveniently
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Education/certifications
To control graduate records and
Identify fraudulent certificates
Some universities issue
certificates for students that do
not exist in their records
Controlling graduate records and
recognizing fraudulent certificates
Can the use of information
Technology help us prevent
certificate falsifications?
Research Objectives
Protect national certificates
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To allow Rikab customers to
share one ride for affordability
Rikab currently accepts only one customer
and is not affordable for most citizens
Rikab service sharing application for better affordability and
customer experience using a mobile flutter application
How can we make Rikab
affordable for low income citizens
Research Objectives
Low income citizens will have
access to Rikab service
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To develop an easy payment
system for the public transport
It takes long time to pay the transportation
fees of public buses
Automating public transport payment using esyPay QRCODE
reader
How can we achieve a smooth and quick
payment for public buses
Research Objectives
Get rid of difficulties in paying
transportation fees
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Government/taxation
To develop a convenient tax paying system
to boost national revenue
Taxpayers face problems to pay
tax
Enhancing revenue collections with a self-service tax
payment portal using mobile technology
Can the use of IT boost the
revenue collection and monitoring
Research Objectives
Ensure a convenient way of payment and
monitoring tax collection service
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Business/Banking
To develop a unified data store for banks to
easily detect bad credit customers/guarantors
Bad credit customers/guarantors do business
in different banks without being noticed
A Unified data store for a local bank for sharing the
guarantor and customer credibility records
Can we help local banks detect
bad customers/guarantors?
Research Objectives
Easily identify defaulters and bad credit
guarantors
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
What is your
contribution?
The Most challenging question
What is your
contribution?
Highlight your contribution
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Literature Review
3/11/2023
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• The review of literature is a summary of the reviews from
various research literatures related to the study carried out by
the researcher
• It helps to discover:
• What is already known about the research problem.
• What more has to be done.
• LR influences the problem and research design and can be
used to compare with the findings of the current study
Literature review
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Explore the area, the topic, the specific problem area.
• Download as many articles as you can about the specific
problem you are solving.
• Extract the needed information from articles
• Import articles into Zotero
• Cite as you write
A convenient Literature review process
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The content of literature Review
Introduction Body Conclusion
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Sources of Literature
1. Journal Articles
2. Conference Proceedings
3. Thesis & Graduation Projects
4. Government & Corporate Reports
5. Text Books
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Resources of Literature
Review- Online Databases
•Thesis
/Conference
Papers
•Research
Reports
/Books
•Electronics
database
•Magazines
Google
scholars
Springer
IEEE
Journals
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: Some CS LR Sources
https://www.scirp.org/journal
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https://ieeexplore.ieee.org/Xplore/home.jsp
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: https://dl.acm.org/
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https:https://link.springer.com/
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://scholar.google.com/)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (core.ac.uk)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://doaj.org/)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Citations & Referencing Tools
3/11/2023
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing
• What is it?
• It is a method used by the researchers to demonstrate
that they have conducted a thorough and appropriate
literature search, and reading.
• To accurately acknowledge other people's work and
ideas, you need to use a referencing style.
• There are many types of referencing style such as
Chicago Style APA, MLA, MPA, IEEE,….
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• The basic citation that you will use most of the
time:
• (Surname, Year)
• Recent research in artificial intelligence
(Ahmed, 2018) has shown that …..
• … as shown in its annual report (WHO,
2016) ….
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• If you have used the name of the author with
the sentence, take it out of the brackets:
• (Year)
• In her recent study, Salma (2019) found
that ….
• …as WFP’s annual report showed
(2020)….
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing Multiple Authors
• Include all names in the in-text citation:
• (surname1 & surname2, Year)
• This important discovery (Ahmed & Asli, 2019)
indicates that ….
• For works with three to five authors, include all names in the
first time, but use et al. for next citations
• (surname1, surname2, & surname3, Year)
• In a survey (Ahmed, Jama & Salad, 2020)….
• Then: (surname1 et al., Year)
• This survey (Ahmed et al., 2020) was later…
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Articles
• Surname, I. (YEAR). Title of the article. Name of the
Journal, Volume(Issue), xx-xx.
• Dumbledore, A. (1943). Twelve uses of dragon blood.
International Journal of Transfiguration, 135(2), 22-47
• You can also add the DOI (Digital Object Identifier) at the
end of the reference.
• Horch, E.P. and Zhou, J. (2012). Charge-coupled device
speckle observations of binary stars. Astronomical
Journal, 136, 312-322. doi: 10.1088/0004-
6256/136/1/312
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Web Page
• Surname, I. (YEAR) Title of the web page.
Retrieved from URL.
• Rowling, J.K. (n.d.) How the wizarding
world works. Retrieved from
https://www.pottermore.com/ collection/jk-
rowling-how-the-wizarding-worldworks
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Reference Management Tools
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Reference management tools
• Tools that help scholars to create and manage their lists of
references for research projects.
• They organize citations into specific formats for the
preparation of manuscripts and bibliographies.
• Many search tools provide ways to download references
into reference management tools.
• It makes it easier to automatically switch to different
citation styles (e.g. Vancouver to MLA or APA)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Software options
Free
Subscription
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Zotero is a free (open source) reference
management tool
• To download and install Zotero go to:
http://www.zotero.org
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Research Methods In
Computer Science
3/11/2023
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research methods in
Computer Science
There are several research methods that can be used in
Computer Science (CS) (Ayash, 2014), including the
following:
Algorithms, Experimental, Framework, Mixed
method, Model, Prototype, Simulation, Case studies,
Survey, Action research
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methods in Computer Science
Theoretical Experimental Simulation
• Conceptual and
formal models
• data models
• Algorithms
• Complexity
• Levels of
abstraction
• Efficiency
• Automatic theorem proving
• Natural language processing
• Vision
• Games
• Neural networks
• Software design/development
• Machine learning
• Complementing theory and
experiment
• Guided by theory as well as
experimental results, while the
computational results often
suggest new experiments and
theoretical models.
• Examples are Solving problems
using Cisco Packet-tracer or
GN3 Simulation software
Sources: (Shneiderman, 2013 & Ayash et Al, 2004 & Petter et. Al 1989 & Peter, 1976)
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Experimental Methods, In Computer
Science/Information Systems
• Using Software development to solve research
problems
• Applying Hardware/Software tools to solve
problems
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
A MULTI PARAMETER PATIENT MONITORING SYSTEM USING IOT,
MOBE AND WEB APPLICATIONS (Abdisamad et al, 2020)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.1 System overview
3.1.1 System Features
3.2 Development Environment
3.3 Development Methodology Requirement
3.3.1 Hardware requirement
3.3.2 Software Requirement
3.4 User Requirement
3.5 Conclusion
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
AVOIDING VOTING ANOMALIES AND INCONVENIENCES IN
JAMHURIYA UNIVERSITY STUDENTS’ASSOCIATION
ELECTIONS USING A MOBILE VOTING SYSTEM (MVS) (Sabrie
et al. 2016)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.0 Introduction
3.1 System Description
3.1.1 System Features
3.2 System Architecture
3.3 Development Methodology Requirement
3.4.1 Hardware requirement
3.4.2 Software Requirement
3.5 User Requirement
3.6 Conclusion
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
System Architecture
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
For Your Research Proposal:
• Research Methodology
Activities
• Research Workplan
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH METHODOLOGY ACTIVITIES
Phase1:
In depth review of current works
Investigate
Phase1:
Identify the gaps to bridge
Identify
Phase2:
Propose solutions to identified gaps
propose
Phase3: Implement proposed solution Using
algorithms
Implement
Phase4:
Analyze the solution, discuss & conclude
Evaluate
• To Review the relevant literature to the
problem under study
• To Identify the existing
gap/problem to solve
• To develop a mobile/web/desktop…
• Or Use IoT or other devices
• To use Machine learning… or algorithm
• Implement the proposed system in the
manner specified
• Analyze the developed solution in
terms of the features proposed
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH WORK PLAN FROM JUNE 2022-JAN 2023
(Your research Proposal should include your work plan)
Your workplan will different
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Analysis & Design
3/11/2023 57
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis
• Systems analysis is a problem-solving method
that involves looking at the wider system,
breaking apart the parts, and figuring out how it
works in order to achieve a particular goal.
• The first step in solving a problem that involves a
system is analyzing that system.
3/11/2023 58
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis includes
• Preliminary investigation.
• The study of the current system.
• The limitations of the current systems
• The proposed system
• How the proposed system solves the current
problems
• Requirement analysis
• Functional & non-functional requirements
3/11/2023 59
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Design
• System design is the process of defining the
components, modules, interfaces, and data for
a system to satisfy specified requirements.
• The proposed system activities Using UML
• Use case diagrams
• Activity Diagrams
3/11/2023 60
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Use case Diagram
3/11/2023 61
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example (Basic vs
alternative flow steps)
3/11/2023 62
Flow Steps
1. The user enters URL to web-browser.
2. The system displays a login form.
3. The user enters authorized Username and
Password and submits it.
4. The system verifies the submitted
information. If it is a valid, the user will be
redirected to the result page.
Alternative flow Steps
1. If the Username and Password are not
matched, the system shows an error
message, and tells the User to enter a valid
Username and Password.
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example
3/11/2023 63
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Database Design
3/11/2023 64
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Welcome
Implementation and Testing
3/11/2023 65
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Implementation
• The purpose of System Implementation Is making
the new system available to a prepared set of users,
and positioning on-going support and maintenance of
the system within the Performing Organization.
• The overall system functions as well as individual
modules should be tested and proven functional.
3/11/2023 66
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe how the implementation lab is set up
showing a graphical model of it.
3/11/2023 67
Implementation environment set up
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe the main logic of system
implementation, showing screenshots,
code snippets, charts, activity models , etc.
3/11/2023 68
Implementation environment set up
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 69
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 70
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 71
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 72
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 73
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 74
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code functionalities
3/11/2023 75
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Discussion
3/11/2023 76
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Discussing the results
• The discussion reviews the findings and puts
them into the context of the overall research. It
brings together all the sections that came before
it and allows a reader to see the connections
between each part of the research paper.
3/11/2023 77
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• First, summarize the key findings from the research
and link them to the initial research question. Seek
to answer this question: What should readers take
away from this paper?
• Second, place the findings in context. This step will
involve going back to the literature review section
and analyzing how the results fit in with previous
research.
3/11/2023 78
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• Third, mention and discuss any unexpected results. Describe
the results and provide a reasonable interpretation of why
they may have appeared. Additionally, if an unexpected result
is significant to the research question, be sure to explain that
connection.
• Fourth, address limitations or weaknesses in the research.
Addressing limitations helps build your credibility as a
writer.
3/11/2023 79
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Conclusion & Future work
3/11/2023 80
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Conclusion
The conclusion of a research paper is where you wrap
up your ideas and leave the reader with a strong final
impression. It has several key goals:
• Restate the research problem addressed in the
paper
• Summarize your overall arguments or findings
• Suggest the key takeaways from your paper
3/11/2023 81
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
3/11/2023 82
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
• The future work section is an important part of a
scientific article. The authors usually discuss how
to extend their current works, approaches or
evaluations in the future work section.
• These future works often contain valuable
research information and give the researchers
hints of new research directions or ideas.
3/11/2023 83
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Mahadsanidiin:
Weydiimo?
Faallooyin,
aragtiyo?
84 3/11/2023

More Related Content

Similar to just research guide seminar 11012023.pptx

KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docxKING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
croysierkathey
 
Applicant Day Course Talk - Electronic and Computer Engineering 2013
Applicant Day Course Talk - Electronic and Computer Engineering 2013Applicant Day Course Talk - Electronic and Computer Engineering 2013
Applicant Day Course Talk - Electronic and Computer Engineering 2013
Brunel University
 
Aed1222 lesson 3 addition
Aed1222 lesson 3 additionAed1222 lesson 3 addition
Aed1222 lesson 3 addition
nurun2010
 
What Is The Innovation Portal?
What Is The Innovation Portal?What Is The Innovation Portal?
What Is The Innovation Portal?
lleverett
 
Kitpatrik model
Kitpatrik modelKitpatrik model
Kitpatrik model
Master Key
 

Similar to just research guide seminar 11012023.pptx (20)

Budd
BuddBudd
Budd
 
Itc544 computer organization
Itc544 computer organizationItc544 computer organization
Itc544 computer organization
 
IIT-India-16-Uplaod
IIT-India-16-UplaodIIT-India-16-Uplaod
IIT-India-16-Uplaod
 
Assessment Workshop, Plenary 2.pptx
Assessment Workshop, Plenary 2.pptxAssessment Workshop, Plenary 2.pptx
Assessment Workshop, Plenary 2.pptx
 
Electronics and communication engineering
Electronics and communication engineeringElectronics and communication engineering
Electronics and communication engineering
 
Information Literacy for Engineering Students
Information Literacy for Engineering StudentsInformation Literacy for Engineering Students
Information Literacy for Engineering Students
 
Doctoral Presentation - June 2023.pptx
Doctoral Presentation - June 2023.pptxDoctoral Presentation - June 2023.pptx
Doctoral Presentation - June 2023.pptx
 
Educause 2011 Bridging The Distance Across Time and Space
Educause 2011 Bridging The Distance Across Time and SpaceEducause 2011 Bridging The Distance Across Time and Space
Educause 2011 Bridging The Distance Across Time and Space
 
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docxKING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
KING’S OWN INSTITUTE Success in Higher Education ICT 20.docx
 
Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...
Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...
Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...
 
Frequency response analysis.pptx
Frequency response analysis.pptxFrequency response analysis.pptx
Frequency response analysis.pptx
 
Doctoral Presentation - May 2023.pptx
Doctoral Presentation - May 2023.pptxDoctoral Presentation - May 2023.pptx
Doctoral Presentation - May 2023.pptx
 
Applicant Day Course Talk - Electronic and Computer Engineering 2013
Applicant Day Course Talk - Electronic and Computer Engineering 2013Applicant Day Course Talk - Electronic and Computer Engineering 2013
Applicant Day Course Talk - Electronic and Computer Engineering 2013
 
Aed1222 lesson 3 addition
Aed1222 lesson 3 additionAed1222 lesson 3 addition
Aed1222 lesson 3 addition
 
Course plan form system analyst
Course plan form system analystCourse plan form system analyst
Course plan form system analyst
 
Capitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptxCapitol Doctoral Presentation -Sept 2023.pptx
Capitol Doctoral Presentation -Sept 2023.pptx
 
What Is The Innovation Portal?
What Is The Innovation Portal?What Is The Innovation Portal?
What Is The Innovation Portal?
 
Kitpatrik model
Kitpatrik modelKitpatrik model
Kitpatrik model
 
Ieee Xtreme Md Telecon August 2009
Ieee Xtreme   Md Telecon August 2009Ieee Xtreme   Md Telecon August 2009
Ieee Xtreme Md Telecon August 2009
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 

Recently uploaded

SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 

just research guide seminar 11012023.pptx

  • 1. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 A seminar on graduation thesis format and contents for JUST final year students: (Guidance, discussion, Q & A)
  • 2. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Thesis contents Chapter One: Introduction Chapter Two: Literature Review Chapter Three: Methodology Chapter Four: Analysis & Design Chapter Five: Implementation Chapter Six: Discussion Chapter Seven: Conclusion & future work
  • 3. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • Chapter One: Introduction - Background of the study - Problem statement - Research questions - Objectives - Significance of the study
  • 4. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Background of the Study • Usually forms the first section of the introduction to the thesis. • Provides the overview of the study, establishes its context. • Explains why the proposed research is important, and essential to understanding the main aspects of the study
  • 5. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Background of the Study • Core Elements: • A brief discussion of what is known about the topic. • Articulation of the research gap. • What the researcher would like to do or aim to achieve(research goal). • The main argument of the research • The major significance / contribution
  • 6. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Background of the Study • Before writing the background of the study, you have to: • Conduct a preliminary research on your chosen topic. • Read a lot of literature and gather relevant information. • Identify the gap of the proposed research and develop the research question
  • 7. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Background of the Study • Writing the background of the study: 1. Start by providing a definition of the research key concepts. 2. Highlight the main developments of the research topic. 3. Proceed to show the problem or gap of the study. 4. State the main goal of your study
  • 8. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Problem Statement • A concise and clear wording of the problem to be solved. • The problem statement is the foundation and focus of the research report. • At minimum, a problem statement should include: • What is the problem? • Magnitude of the problem? • Where is the problem? • Why is it important to work on this problem?
  • 9. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Questions - Examples • A Research Question is a question that a study or research project aims to answer. • Is usage of mobile banking services in Somalia directly related to the educational level? • Does the level of usage of ICT services by Universities differ from High Schools in Mogadishu-Somalia?
  • 10. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Objectives • A research objective describes what your research is trying to achieve. • Summarize what is to be achieved by the study. • Gives an overview of the expected solution to the problems
  • 11. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Objectives • Should be specific and measurable • Examples: • To determine how much time males between the age 13 to 21 spend playing video games. • To develop a mobile application that registers the individuals of rare blood groups
  • 12. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Some verbs commonly used in writing objectives • General Objective: • Asses • Describe • Investigate • Explore • Characterize • Specific Objectives: • Identify • Define • Estimate • Determine • Develop • Demonstrate • Compare • Classify • Measure • Examine • Analyze • Design
  • 13. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Significance of the Study • Significance of the study, also called “Rationale” is the section where the researcher tries to convince an audience that the research is worth doing and the contributions it may add. • Questions to answer: • Why this work is important? • What are the implications of doing it? • How does it stand to inform policy making? • What use might your study have for others in the field or in general public? • Who might benefit from it?
  • 14. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Healthcare To enable citizens to get healthcare services on demand People have to come physical to hospitals to ask for service Automating health services using healthcare on-demand platforms, using mobile and web technologies Can we improve the healthcare service provision using IT? Research Objectives Save lives, protect vulnerable patients, easily get health services conveniently
  • 15. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Education/certifications To control graduate records and Identify fraudulent certificates Some universities issue certificates for students that do not exist in their records Controlling graduate records and recognizing fraudulent certificates Can the use of information Technology help us prevent certificate falsifications? Research Objectives Protect national certificates
  • 16. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Transportation To allow Rikab customers to share one ride for affordability Rikab currently accepts only one customer and is not affordable for most citizens Rikab service sharing application for better affordability and customer experience using a mobile flutter application How can we make Rikab affordable for low income citizens Research Objectives Low income citizens will have access to Rikab service
  • 17. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Transportation To develop an easy payment system for the public transport It takes long time to pay the transportation fees of public buses Automating public transport payment using esyPay QRCODE reader How can we achieve a smooth and quick payment for public buses Research Objectives Get rid of difficulties in paying transportation fees
  • 18. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Government/taxation To develop a convenient tax paying system to boost national revenue Taxpayers face problems to pay tax Enhancing revenue collections with a self-service tax payment portal using mobile technology Can the use of IT boost the revenue collection and monitoring Research Objectives Ensure a convenient way of payment and monitoring tax collection service
  • 19. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Research Topic, Title, Problem, Research Question General Specific Research Area Problem statements Research Questions Research Title Research Significance Business/Banking To develop a unified data store for banks to easily detect bad credit customers/guarantors Bad credit customers/guarantors do business in different banks without being noticed A Unified data store for a local bank for sharing the guarantor and customer credibility records Can we help local banks detect bad customers/guarantors? Research Objectives Easily identify defaulters and bad credit guarantors
  • 20. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 What is your contribution? The Most challenging question What is your contribution? Highlight your contribution
  • 21. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Welcome Literature Review 3/11/2023
  • 22. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • The review of literature is a summary of the reviews from various research literatures related to the study carried out by the researcher • It helps to discover: • What is already known about the research problem. • What more has to be done. • LR influences the problem and research design and can be used to compare with the findings of the current study Literature review
  • 23. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • Explore the area, the topic, the specific problem area. • Download as many articles as you can about the specific problem you are solving. • Extract the needed information from articles • Import articles into Zotero • Cite as you write A convenient Literature review process
  • 24. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 The content of literature Review Introduction Body Conclusion
  • 25. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Sources of Literature 1. Journal Articles 2. Conference Proceedings 3. Thesis & Graduation Projects 4. Government & Corporate Reports 5. Text Books
  • 26. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Resources of Literature Review- Online Databases •Thesis /Conference Papers •Research Reports /Books •Electronics database •Magazines Google scholars Springer IEEE Journals
  • 27. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Electronic Sources: Some CS LR Sources https://www.scirp.org/journal
  • 28. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Electronic Sources: https://ieeexplore.ieee.org/Xplore/home.jsp
  • 29. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Electronic Sources: https://dl.acm.org/
  • 30. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Electronic Sources: https:https://link.springer.com/
  • 31. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Article Sources (https://scholar.google.com/)
  • 32. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Article Sources (core.ac.uk)
  • 33. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Article Sources (https://doaj.org/)
  • 34. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Welcome Citations & Referencing Tools 3/11/2023
  • 35. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Referencing • What is it? • It is a method used by the researchers to demonstrate that they have conducted a thorough and appropriate literature search, and reading. • To accurately acknowledge other people's work and ideas, you need to use a referencing style. • There are many types of referencing style such as Chicago Style APA, MLA, MPA, IEEE,….
  • 36. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Citing & Referencing in APA Style
  • 37. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Citing & Referencing in APA Style
  • 38. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 In-Text Citation in APA • The basic citation that you will use most of the time: • (Surname, Year) • Recent research in artificial intelligence (Ahmed, 2018) has shown that ….. • … as shown in its annual report (WHO, 2016) ….
  • 39. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 In-Text Citation in APA • If you have used the name of the author with the sentence, take it out of the brackets: • (Year) • In her recent study, Salma (2019) found that …. • …as WFP’s annual report showed (2020)….
  • 40. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Citing Multiple Authors • Include all names in the in-text citation: • (surname1 & surname2, Year) • This important discovery (Ahmed & Asli, 2019) indicates that …. • For works with three to five authors, include all names in the first time, but use et al. for next citations • (surname1, surname2, & surname3, Year) • In a survey (Ahmed, Jama & Salad, 2020)…. • Then: (surname1 et al., Year) • This survey (Ahmed et al., 2020) was later…
  • 41. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Referencing Articles • Surname, I. (YEAR). Title of the article. Name of the Journal, Volume(Issue), xx-xx. • Dumbledore, A. (1943). Twelve uses of dragon blood. International Journal of Transfiguration, 135(2), 22-47 • You can also add the DOI (Digital Object Identifier) at the end of the reference. • Horch, E.P. and Zhou, J. (2012). Charge-coupled device speckle observations of binary stars. Astronomical Journal, 136, 312-322. doi: 10.1088/0004- 6256/136/1/312
  • 42. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Referencing Web Page • Surname, I. (YEAR) Title of the web page. Retrieved from URL. • Rowling, J.K. (n.d.) How the wizarding world works. Retrieved from https://www.pottermore.com/ collection/jk- rowling-how-the-wizarding-worldworks
  • 43. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Reference Management Tools
  • 44. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Reference management tools • Tools that help scholars to create and manage their lists of references for research projects. • They organize citations into specific formats for the preparation of manuscripts and bibliographies. • Many search tools provide ways to download references into reference management tools. • It makes it easier to automatically switch to different citation styles (e.g. Vancouver to MLA or APA)
  • 45. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Software options Free Subscription
  • 46. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • Zotero is a free (open source) reference management tool • To download and install Zotero go to: http://www.zotero.org
  • 47. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Welcome Research Methods In Computer Science 3/11/2023
  • 48. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Research methods in Computer Science There are several research methods that can be used in Computer Science (CS) (Ayash, 2014), including the following: Algorithms, Experimental, Framework, Mixed method, Model, Prototype, Simulation, Case studies, Survey, Action research
  • 49. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Research Methods in Computer Science Theoretical Experimental Simulation • Conceptual and formal models • data models • Algorithms • Complexity • Levels of abstraction • Efficiency • Automatic theorem proving • Natural language processing • Vision • Games • Neural networks • Software design/development • Machine learning • Complementing theory and experiment • Guided by theory as well as experimental results, while the computational results often suggest new experiments and theoretical models. • Examples are Solving problems using Cisco Packet-tracer or GN3 Simulation software Sources: (Shneiderman, 2013 & Ayash et Al, 2004 & Petter et. Al 1989 & Peter, 1976)
  • 50. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Experimental Methods, In Computer Science/Information Systems • Using Software development to solve research problems • Applying Hardware/Software tools to solve problems
  • 51. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Examples A MULTI PARAMETER PATIENT MONITORING SYSTEM USING IOT, MOBE AND WEB APPLICATIONS (Abdisamad et al, 2020) CHAPTER THREE: METHODOLOGY 3.0 Introduction 3.1 System overview 3.1.1 System Features 3.2 Development Environment 3.3 Development Methodology Requirement 3.3.1 Hardware requirement 3.3.2 Software Requirement 3.4 User Requirement 3.5 Conclusion
  • 52. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Examples AVOIDING VOTING ANOMALIES AND INCONVENIENCES IN JAMHURIYA UNIVERSITY STUDENTS’ASSOCIATION ELECTIONS USING A MOBILE VOTING SYSTEM (MVS) (Sabrie et al. 2016) CHAPTER THREE: METHODOLOGY 3.0 Introduction 3.0 Introduction 3.1 System Description 3.1.1 System Features 3.2 System Architecture 3.3 Development Methodology Requirement 3.4.1 Hardware requirement 3.4.2 Software Requirement 3.5 User Requirement 3.6 Conclusion
  • 53. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two System Architecture
  • 54. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two For Your Research Proposal: • Research Methodology Activities • Research Workplan
  • 55. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two RESEARCH METHODOLOGY ACTIVITIES Phase1: In depth review of current works Investigate Phase1: Identify the gaps to bridge Identify Phase2: Propose solutions to identified gaps propose Phase3: Implement proposed solution Using algorithms Implement Phase4: Analyze the solution, discuss & conclude Evaluate • To Review the relevant literature to the problem under study • To Identify the existing gap/problem to solve • To develop a mobile/web/desktop… • Or Use IoT or other devices • To use Machine learning… or algorithm • Implement the proposed system in the manner specified • Analyze the developed solution in terms of the features proposed
  • 56. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two RESEARCH WORK PLAN FROM JUNE 2022-JAN 2023 (Your research Proposal should include your work plan) Your workplan will different
  • 57. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Welcome Analysis & Design 3/11/2023 57
  • 58. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 System analysis • Systems analysis is a problem-solving method that involves looking at the wider system, breaking apart the parts, and figuring out how it works in order to achieve a particular goal. • The first step in solving a problem that involves a system is analyzing that system. 3/11/2023 58
  • 59. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 System analysis includes • Preliminary investigation. • The study of the current system. • The limitations of the current systems • The proposed system • How the proposed system solves the current problems • Requirement analysis • Functional & non-functional requirements 3/11/2023 59
  • 60. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 System Design • System design is the process of defining the components, modules, interfaces, and data for a system to satisfy specified requirements. • The proposed system activities Using UML • Use case diagrams • Activity Diagrams 3/11/2023 60
  • 61. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Use case Diagram 3/11/2023 61
  • 62. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Activity Diagram Example (Basic vs alternative flow steps) 3/11/2023 62 Flow Steps 1. The user enters URL to web-browser. 2. The system displays a login form. 3. The user enters authorized Username and Password and submits it. 4. The system verifies the submitted information. If it is a valid, the user will be redirected to the result page. Alternative flow Steps 1. If the Username and Password are not matched, the system shows an error message, and tells the User to enter a valid Username and Password.
  • 63. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Activity Diagram Example 3/11/2023 63
  • 64. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Database Design 3/11/2023 64
  • 65. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Research Methodology Welcome Implementation and Testing 3/11/2023 65
  • 66. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 System Implementation • The purpose of System Implementation Is making the new system available to a prepared set of users, and positioning on-going support and maintenance of the system within the Performing Organization. • The overall system functions as well as individual modules should be tested and proven functional. 3/11/2023 66
  • 67. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • Describe how the implementation lab is set up showing a graphical model of it. 3/11/2023 67 Implementation environment set up
  • 68. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 • Describe the main logic of system implementation, showing screenshots, code snippets, charts, activity models , etc. 3/11/2023 68 Implementation environment set up
  • 69. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present screenshots of main system Interfaces 3/11/2023 69
  • 70. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present screenshots of main system Interfaces 3/11/2023 70
  • 71. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present screenshots of main system Interfaces 3/11/2023 71
  • 72. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present screenshots of main system Interfaces 3/11/2023 72
  • 73. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present Code snippets 3/11/2023 73
  • 74. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present Code snippets 3/11/2023 74
  • 75. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Present Code functionalities 3/11/2023 75
  • 76. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Research Methodology Discussion 3/11/2023 76
  • 77. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Discussing the results • The discussion reviews the findings and puts them into the context of the overall research. It brings together all the sections that came before it and allows a reader to see the connections between each part of the research paper. 3/11/2023 77
  • 78. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 The Structure of the Discussion Section • First, summarize the key findings from the research and link them to the initial research question. Seek to answer this question: What should readers take away from this paper? • Second, place the findings in context. This step will involve going back to the literature review section and analyzing how the results fit in with previous research. 3/11/2023 78
  • 79. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 The Structure of the Discussion Section • Third, mention and discuss any unexpected results. Describe the results and provide a reasonable interpretation of why they may have appeared. Additionally, if an unexpected result is significant to the research question, be sure to explain that connection. • Fourth, address limitations or weaknesses in the research. Addressing limitations helps build your credibility as a writer. 3/11/2023 79
  • 80. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus Two Research Methodology Conclusion & Future work 3/11/2023 80
  • 81. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Conclusion The conclusion of a research paper is where you wrap up your ideas and leave the reader with a strong final impression. It has several key goals: • Restate the research problem addressed in the paper • Summarize your overall arguments or findings • Suggest the key takeaways from your paper 3/11/2023 81
  • 82. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Future Work 3/11/2023 82
  • 83. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Future Work • The future work section is an important part of a scientific article. The authors usually discuss how to extend their current works, approaches or evaluations in the future work section. • These future works often contain valuable research information and give the researchers hints of new research directions or ideas. 3/11/2023 83
  • 84. Faculty of Computer Science & IT- A graduation protect guidance session Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123 Mahadsanidiin: Weydiimo? Faallooyin, aragtiyo? 84 3/11/2023