How to Send Pro Forma Invoice to Your Customers in Odoo 17
just research guide seminar 11012023.pptx
1. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
A seminar on graduation thesis
format and contents for JUST
final year students:
(Guidance, discussion, Q & A)
2. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Thesis contents
Chapter One: Introduction
Chapter Two: Literature Review
Chapter Three: Methodology
Chapter Four: Analysis & Design
Chapter Five: Implementation
Chapter Six: Discussion
Chapter Seven: Conclusion & future work
3. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Chapter One: Introduction
- Background of the study
- Problem statement
- Research questions
- Objectives
- Significance of the study
4. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Usually forms the first section of the introduction
to the thesis.
• Provides the overview of the study, establishes its
context.
• Explains why the proposed research is important,
and essential to understanding the main aspects
of the study
5. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Core Elements:
• A brief discussion of what is known about the
topic.
• Articulation of the research gap.
• What the researcher would like to do or aim to
achieve(research goal).
• The main argument of the research
• The major significance / contribution
6. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Before writing the background of the study, you have to:
• Conduct a preliminary research on your chosen topic.
• Read a lot of literature and gather relevant information.
• Identify the gap of the proposed research and develop
the research question
7. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Writing the background of the study:
1. Start by providing a definition of the research key
concepts.
2. Highlight the main developments of the research
topic.
3. Proceed to show the problem or gap of the study.
4. State the main goal of your study
8. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Problem Statement
• A concise and clear wording of the problem to be solved.
• The problem statement is the foundation and focus of the research
report.
• At minimum, a problem statement should include:
• What is the problem?
• Magnitude of the problem?
• Where is the problem?
• Why is it important to work on this problem?
9. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Questions - Examples
• A Research Question is a question that a study or
research project aims to answer.
• Is usage of mobile banking services in Somalia directly
related to the educational level?
• Does the level of usage of ICT services by Universities
differ from High Schools in Mogadishu-Somalia?
10. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• A research objective describes what your research
is trying to achieve.
• Summarize what is to be achieved by the
study.
• Gives an overview of the expected solution to
the problems
11. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• Should be specific and measurable
• Examples:
• To determine how much time males between the
age 13 to 21 spend playing video games.
• To develop a mobile application that registers the
individuals of rare blood groups
12. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Some verbs commonly used
in writing objectives
• General Objective:
• Asses
• Describe
• Investigate
• Explore
• Characterize
• Specific Objectives:
• Identify
• Define
• Estimate
• Determine
• Develop
• Demonstrate
• Compare
• Classify
• Measure
• Examine
• Analyze
• Design
13. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Significance of the Study
• Significance of the study, also called “Rationale” is the
section where the researcher tries to convince an audience
that the research is worth doing and the contributions it may
add.
• Questions to answer:
• Why this work is important?
• What are the implications of doing it?
• How does it stand to inform policy making?
• What use might your study have for others in the field or in general public?
• Who might benefit from it?
14. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Healthcare
To enable citizens to get
healthcare services on demand
People have to come physical to
hospitals to ask for service
Automating health services using healthcare on-demand
platforms, using mobile and web technologies
Can we improve the healthcare
service provision using IT?
Research Objectives
Save lives, protect vulnerable patients,
easily get health services conveniently
15. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Education/certifications
To control graduate records and
Identify fraudulent certificates
Some universities issue
certificates for students that do
not exist in their records
Controlling graduate records and
recognizing fraudulent certificates
Can the use of information
Technology help us prevent
certificate falsifications?
Research Objectives
Protect national certificates
16. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To allow Rikab customers to
share one ride for affordability
Rikab currently accepts only one customer
and is not affordable for most citizens
Rikab service sharing application for better affordability and
customer experience using a mobile flutter application
How can we make Rikab
affordable for low income citizens
Research Objectives
Low income citizens will have
access to Rikab service
17. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To develop an easy payment
system for the public transport
It takes long time to pay the transportation
fees of public buses
Automating public transport payment using esyPay QRCODE
reader
How can we achieve a smooth and quick
payment for public buses
Research Objectives
Get rid of difficulties in paying
transportation fees
18. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Government/taxation
To develop a convenient tax paying system
to boost national revenue
Taxpayers face problems to pay
tax
Enhancing revenue collections with a self-service tax
payment portal using mobile technology
Can the use of IT boost the
revenue collection and monitoring
Research Objectives
Ensure a convenient way of payment and
monitoring tax collection service
19. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Business/Banking
To develop a unified data store for banks to
easily detect bad credit customers/guarantors
Bad credit customers/guarantors do business
in different banks without being noticed
A Unified data store for a local bank for sharing the
guarantor and customer credibility records
Can we help local banks detect
bad customers/guarantors?
Research Objectives
Easily identify defaulters and bad credit
guarantors
20. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
What is your
contribution?
The Most challenging question
What is your
contribution?
Highlight your contribution
21. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Literature Review
3/11/2023
22. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• The review of literature is a summary of the reviews from
various research literatures related to the study carried out by
the researcher
• It helps to discover:
• What is already known about the research problem.
• What more has to be done.
• LR influences the problem and research design and can be
used to compare with the findings of the current study
Literature review
23. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Explore the area, the topic, the specific problem area.
• Download as many articles as you can about the specific
problem you are solving.
• Extract the needed information from articles
• Import articles into Zotero
• Cite as you write
A convenient Literature review process
24. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The content of literature Review
Introduction Body Conclusion
25. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Sources of Literature
1. Journal Articles
2. Conference Proceedings
3. Thesis & Graduation Projects
4. Government & Corporate Reports
5. Text Books
26. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Resources of Literature
Review- Online Databases
•Thesis
/Conference
Papers
•Research
Reports
/Books
•Electronics
database
•Magazines
Google
scholars
Springer
IEEE
Journals
27. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: Some CS LR Sources
https://www.scirp.org/journal
28. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https://ieeexplore.ieee.org/Xplore/home.jsp
29. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: https://dl.acm.org/
30. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https:https://link.springer.com/
31. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://scholar.google.com/)
32. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (core.ac.uk)
33. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://doaj.org/)
34. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Citations & Referencing Tools
3/11/2023
35. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing
• What is it?
• It is a method used by the researchers to demonstrate
that they have conducted a thorough and appropriate
literature search, and reading.
• To accurately acknowledge other people's work and
ideas, you need to use a referencing style.
• There are many types of referencing style such as
Chicago Style APA, MLA, MPA, IEEE,….
36. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
37. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
38. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• The basic citation that you will use most of the
time:
• (Surname, Year)
• Recent research in artificial intelligence
(Ahmed, 2018) has shown that …..
• … as shown in its annual report (WHO,
2016) ….
39. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• If you have used the name of the author with
the sentence, take it out of the brackets:
• (Year)
• In her recent study, Salma (2019) found
that ….
• …as WFP’s annual report showed
(2020)….
40. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing Multiple Authors
• Include all names in the in-text citation:
• (surname1 & surname2, Year)
• This important discovery (Ahmed & Asli, 2019)
indicates that ….
• For works with three to five authors, include all names in the
first time, but use et al. for next citations
• (surname1, surname2, & surname3, Year)
• In a survey (Ahmed, Jama & Salad, 2020)….
• Then: (surname1 et al., Year)
• This survey (Ahmed et al., 2020) was later…
41. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Articles
• Surname, I. (YEAR). Title of the article. Name of the
Journal, Volume(Issue), xx-xx.
• Dumbledore, A. (1943). Twelve uses of dragon blood.
International Journal of Transfiguration, 135(2), 22-47
• You can also add the DOI (Digital Object Identifier) at the
end of the reference.
• Horch, E.P. and Zhou, J. (2012). Charge-coupled device
speckle observations of binary stars. Astronomical
Journal, 136, 312-322. doi: 10.1088/0004-
6256/136/1/312
42. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Web Page
• Surname, I. (YEAR) Title of the web page.
Retrieved from URL.
• Rowling, J.K. (n.d.) How the wizarding
world works. Retrieved from
https://www.pottermore.com/ collection/jk-
rowling-how-the-wizarding-worldworks
43. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Reference Management Tools
44. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Reference management tools
• Tools that help scholars to create and manage their lists of
references for research projects.
• They organize citations into specific formats for the
preparation of manuscripts and bibliographies.
• Many search tools provide ways to download references
into reference management tools.
• It makes it easier to automatically switch to different
citation styles (e.g. Vancouver to MLA or APA)
45. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Software options
Free
Subscription
46. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Zotero is a free (open source) reference
management tool
• To download and install Zotero go to:
http://www.zotero.org
47. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Research Methods In
Computer Science
3/11/2023
48. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research methods in
Computer Science
There are several research methods that can be used in
Computer Science (CS) (Ayash, 2014), including the
following:
Algorithms, Experimental, Framework, Mixed
method, Model, Prototype, Simulation, Case studies,
Survey, Action research
49. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methods in Computer Science
Theoretical Experimental Simulation
• Conceptual and
formal models
• data models
• Algorithms
• Complexity
• Levels of
abstraction
• Efficiency
• Automatic theorem proving
• Natural language processing
• Vision
• Games
• Neural networks
• Software design/development
• Machine learning
• Complementing theory and
experiment
• Guided by theory as well as
experimental results, while the
computational results often
suggest new experiments and
theoretical models.
• Examples are Solving problems
using Cisco Packet-tracer or
GN3 Simulation software
Sources: (Shneiderman, 2013 & Ayash et Al, 2004 & Petter et. Al 1989 & Peter, 1976)
50. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Experimental Methods, In Computer
Science/Information Systems
• Using Software development to solve research
problems
• Applying Hardware/Software tools to solve
problems
51. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
A MULTI PARAMETER PATIENT MONITORING SYSTEM USING IOT,
MOBE AND WEB APPLICATIONS (Abdisamad et al, 2020)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.1 System overview
3.1.1 System Features
3.2 Development Environment
3.3 Development Methodology Requirement
3.3.1 Hardware requirement
3.3.2 Software Requirement
3.4 User Requirement
3.5 Conclusion
52. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
AVOIDING VOTING ANOMALIES AND INCONVENIENCES IN
JAMHURIYA UNIVERSITY STUDENTS’ASSOCIATION
ELECTIONS USING A MOBILE VOTING SYSTEM (MVS) (Sabrie
et al. 2016)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.0 Introduction
3.1 System Description
3.1.1 System Features
3.2 System Architecture
3.3 Development Methodology Requirement
3.4.1 Hardware requirement
3.4.2 Software Requirement
3.5 User Requirement
3.6 Conclusion
53. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
System Architecture
54. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
For Your Research Proposal:
• Research Methodology
Activities
• Research Workplan
55. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH METHODOLOGY ACTIVITIES
Phase1:
In depth review of current works
Investigate
Phase1:
Identify the gaps to bridge
Identify
Phase2:
Propose solutions to identified gaps
propose
Phase3: Implement proposed solution Using
algorithms
Implement
Phase4:
Analyze the solution, discuss & conclude
Evaluate
• To Review the relevant literature to the
problem under study
• To Identify the existing
gap/problem to solve
• To develop a mobile/web/desktop…
• Or Use IoT or other devices
• To use Machine learning… or algorithm
• Implement the proposed system in the
manner specified
• Analyze the developed solution in
terms of the features proposed
56. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH WORK PLAN FROM JUNE 2022-JAN 2023
(Your research Proposal should include your work plan)
Your workplan will different
57. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Analysis & Design
3/11/2023 57
58. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis
• Systems analysis is a problem-solving method
that involves looking at the wider system,
breaking apart the parts, and figuring out how it
works in order to achieve a particular goal.
• The first step in solving a problem that involves a
system is analyzing that system.
3/11/2023 58
59. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis includes
• Preliminary investigation.
• The study of the current system.
• The limitations of the current systems
• The proposed system
• How the proposed system solves the current
problems
• Requirement analysis
• Functional & non-functional requirements
3/11/2023 59
60. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Design
• System design is the process of defining the
components, modules, interfaces, and data for
a system to satisfy specified requirements.
• The proposed system activities Using UML
• Use case diagrams
• Activity Diagrams
3/11/2023 60
61. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Use case Diagram
3/11/2023 61
62. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example (Basic vs
alternative flow steps)
3/11/2023 62
Flow Steps
1. The user enters URL to web-browser.
2. The system displays a login form.
3. The user enters authorized Username and
Password and submits it.
4. The system verifies the submitted
information. If it is a valid, the user will be
redirected to the result page.
Alternative flow Steps
1. If the Username and Password are not
matched, the system shows an error
message, and tells the User to enter a valid
Username and Password.
63. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example
3/11/2023 63
64. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Database Design
3/11/2023 64
65. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Welcome
Implementation and Testing
3/11/2023 65
66. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Implementation
• The purpose of System Implementation Is making
the new system available to a prepared set of users,
and positioning on-going support and maintenance of
the system within the Performing Organization.
• The overall system functions as well as individual
modules should be tested and proven functional.
3/11/2023 66
67. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe how the implementation lab is set up
showing a graphical model of it.
3/11/2023 67
Implementation environment set up
68. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe the main logic of system
implementation, showing screenshots,
code snippets, charts, activity models , etc.
3/11/2023 68
Implementation environment set up
69. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 69
70. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 70
71. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 71
72. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 72
73. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 73
74. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 74
75. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code functionalities
3/11/2023 75
76. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Discussion
3/11/2023 76
77. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Discussing the results
• The discussion reviews the findings and puts
them into the context of the overall research. It
brings together all the sections that came before
it and allows a reader to see the connections
between each part of the research paper.
3/11/2023 77
78. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• First, summarize the key findings from the research
and link them to the initial research question. Seek
to answer this question: What should readers take
away from this paper?
• Second, place the findings in context. This step will
involve going back to the literature review section
and analyzing how the results fit in with previous
research.
3/11/2023 78
79. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• Third, mention and discuss any unexpected results. Describe
the results and provide a reasonable interpretation of why
they may have appeared. Additionally, if an unexpected result
is significant to the research question, be sure to explain that
connection.
• Fourth, address limitations or weaknesses in the research.
Addressing limitations helps build your credibility as a
writer.
3/11/2023 79
80. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Conclusion & Future work
3/11/2023 80
81. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Conclusion
The conclusion of a research paper is where you wrap
up your ideas and leave the reader with a strong final
impression. It has several key goals:
• Restate the research problem addressed in the
paper
• Summarize your overall arguments or findings
• Suggest the key takeaways from your paper
3/11/2023 81
82. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
3/11/2023 82
83. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
• The future work section is an important part of a
scientific article. The authors usually discuss how
to extend their current works, approaches or
evaluations in the future work section.
• These future works often contain valuable
research information and give the researchers
hints of new research directions or ideas.
3/11/2023 83
84. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Mahadsanidiin:
Weydiimo?
Faallooyin,
aragtiyo?
84 3/11/2023