This document summarizes a graduation thesis guidance session presented by Mohamud Ahmed Jimale at the Jimma University of Science and Technology (JUST) campus two on January 12, 2023. It provides guidance on the format and contents of graduation theses for final year JUST students, including recommended chapter outlines and details on what should be included in each chapter, particularly the introduction chapter which establishes the background, problem statement, research questions, objectives and significance of the study. The presentation aims to help students structure their theses and understand the key elements required in each section.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
This document provides an overview of pattern recognition and semi-supervised learning algorithms. It begins with defining key concepts like patterns, features, and pattern recognition. It then discusses machine learning and the need for learning algorithms. The main types of learning are described as supervised, unsupervised, and semi-supervised learning. Semi-supervised learning is explained as combining labeled and unlabeled data during training to improve performance over using only labeled or unlabeled data. The document provides examples to illustrate these concepts and techniques.
Razmi Marzook, an electrical engineer, gave a presentation to St. Clare's Catholic High School students about careers in engineering. The presentation discussed Marzook's own career path and experiences, highlighted the importance of problem solving and creating opportunities for oneself as an engineer. It also provided an overview of the different areas of engineering, guidelines for professional conduct, and two case studies of female engineers currently working in the field. The presentation aimed to inform students about potential routes into an engineering career.
This document outlines the key steps in the scientific research process:
1) Selecting a research topic and ensuring it is narrow enough.
2) Determining if the topic is relevant by asking questions like if the problem can be investigated and if data can be analyzed.
3) Conducting a literature review to learn from past research and help define a research question.
4) Formulating the research problem as a clear hypothesis or question.
5) Designing the research methodology.
6) Analyzing and interpreting the collected data.
7) Presenting the results in a clear and concise manner, noting that one study provides indications rather than proven facts.
2. Forumlating Research Topic and Developing Research Problem.pptxHCCTAndTechnologycom
This document discusses formulating research topics and developing research problems. It provides examples of research topics in different areas, including education/certifications, business/human resources, telecommunication engineering, and power engineering. For each topic, it identifies general and specific research areas, potential problem statements, research questions, proposed research titles and their significance, and objectives. The examples explore using information technology to prevent certificate falsification; studying the effect of IT usage on employee satisfaction; designing microstrip patch antennas with higher bandwidth; and minimizing energy costs while maximizing renewable energy sources and peak load generation.
RSCtv Disseminating Assistive Roles and Technologies DART2 ProjectJisc Scotland
The document summarizes a project called DART2 that aims to disseminate assistive roles and technology in further education colleges. It discusses workshops held on assessment for assistive technology, the assistive technologist role, and hands-on sessions on software and apps. Case studies from colleges that received support describe implementing assessment procedures and assistive technology. Continuing professional development opportunities for assistive technologists are also listed.
1. The document discusses the importance of cyber security for K-12 schools and outlines reasons to pay attention to network security such as protecting data, preventing misuse of resources, and keeping kids safe.
2. It notes the evolution of cyber threats from hobbyists to professionals and increasing difficulty in detecting threats. Legal impacts of data privacy laws are also covered.
3. The document provides guidance on cyber security planning including establishing a leadership team, conducting risk assessments, developing security policies and procedures, and being prepared to respond to security incidents. Regular review and testing of security measures is emphasized.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
This document provides an overview of pattern recognition and semi-supervised learning algorithms. It begins with defining key concepts like patterns, features, and pattern recognition. It then discusses machine learning and the need for learning algorithms. The main types of learning are described as supervised, unsupervised, and semi-supervised learning. Semi-supervised learning is explained as combining labeled and unlabeled data during training to improve performance over using only labeled or unlabeled data. The document provides examples to illustrate these concepts and techniques.
Razmi Marzook, an electrical engineer, gave a presentation to St. Clare's Catholic High School students about careers in engineering. The presentation discussed Marzook's own career path and experiences, highlighted the importance of problem solving and creating opportunities for oneself as an engineer. It also provided an overview of the different areas of engineering, guidelines for professional conduct, and two case studies of female engineers currently working in the field. The presentation aimed to inform students about potential routes into an engineering career.
This document outlines the key steps in the scientific research process:
1) Selecting a research topic and ensuring it is narrow enough.
2) Determining if the topic is relevant by asking questions like if the problem can be investigated and if data can be analyzed.
3) Conducting a literature review to learn from past research and help define a research question.
4) Formulating the research problem as a clear hypothesis or question.
5) Designing the research methodology.
6) Analyzing and interpreting the collected data.
7) Presenting the results in a clear and concise manner, noting that one study provides indications rather than proven facts.
2. Forumlating Research Topic and Developing Research Problem.pptxHCCTAndTechnologycom
This document discusses formulating research topics and developing research problems. It provides examples of research topics in different areas, including education/certifications, business/human resources, telecommunication engineering, and power engineering. For each topic, it identifies general and specific research areas, potential problem statements, research questions, proposed research titles and their significance, and objectives. The examples explore using information technology to prevent certificate falsification; studying the effect of IT usage on employee satisfaction; designing microstrip patch antennas with higher bandwidth; and minimizing energy costs while maximizing renewable energy sources and peak load generation.
RSCtv Disseminating Assistive Roles and Technologies DART2 ProjectJisc Scotland
The document summarizes a project called DART2 that aims to disseminate assistive roles and technology in further education colleges. It discusses workshops held on assessment for assistive technology, the assistive technologist role, and hands-on sessions on software and apps. Case studies from colleges that received support describe implementing assessment procedures and assistive technology. Continuing professional development opportunities for assistive technologists are also listed.
1. The document discusses the importance of cyber security for K-12 schools and outlines reasons to pay attention to network security such as protecting data, preventing misuse of resources, and keeping kids safe.
2. It notes the evolution of cyber threats from hobbyists to professionals and increasing difficulty in detecting threats. Legal impacts of data privacy laws are also covered.
3. The document provides guidance on cyber security planning including establishing a leadership team, conducting risk assessments, developing security policies and procedures, and being prepared to respond to security incidents. Regular review and testing of security measures is emphasized.
Student projects with industry can take several forms, including study groups, MSc programs, internships, and industrial training terms. These projects allow students to gain work experience and skills while addressing real problems faced by industry. Examples provided include using mathematical modeling of crowd dynamics for London Transport and applying graph theory and combinatorics to frequency allocation for BT. Students develop skills in areas like modeling, computation, statistics, and problem solving that are valuable for industry. Close collaboration between academics and industrial partners is needed to define suitable projects and manage expectations on both sides.
This document outlines information for the subject ITC544 - Computer Organisation and Architecture at Charles Sturt University:
- It provides an overview of the subject content which covers topics such as data representation, digital logic, computer memory, and trends in computing technologies.
- The learning outcomes, assessment items, and schedule are described. Students will complete two assignments and an online quiz.
- Resources for study include online modules, lecture notes, tutorials, and the prescribed textbook. Support services from the university such as the library and learning skills support are also mentioned.
The document provides information about IIT-Chicago University and its programs offered in India. It summarizes that IIT-Chicago University has five campuses across the United States and India and offers various master's degree programs online and in-person in India at sites in Bangalore, Chennai, Hyderabad, Mumbai, and Pune. The eligibility for the programs typically requires a first class bachelor's degree in an engineering field. The teaching methodology involves streamed video lectures on the internet with opportunities for video/audio conferences.
Professor Paul Maharg presented on assessment in legal education at a workshop of the Law Society of Ireland. The presentation included:
1. A taxonomy of task analysis for assessments in simulations, ranging from discrete tasks to assessments involving an entire case file and performative skills.
2. Results from a study on using simulated clients for interviewing assessments, which found it to be more reliable and valid than traditional assessment methods.
3. Ways that problem-based learning can be designed to ensure both breadth and depth of learning, and forms of assessment that align with problem-based learning methods like exams involving analysis of new or previously seen case studies.
Electronics and communication engineeringM. Raja Reddy
Electronics and Communication Engineering deals with electronic devices, circuits, communication equipment, integrated circuits, analog and digital transmission and reception. It provides a variety of career opportunities in fields like telecommunications, embedded systems, wireless communication, and more. Studying ECE offers benefits like high paying jobs, intellectual development, financial security, and opportunities to work on projects that benefit society. Students are advised to gain practical skills through internships, focus on fundamentals, understand industry trends, assess their aptitudes, and consider higher education options like MTech in related fields. The document provides an overview of the ECE field and advice for students on how to prepare for careers in it.
Information Literacy for Engineering StudentsJohn Meier
This presentation was developed for a Senior design course in Electrical Engineering as part of the ABET accreditation requirements for engineering graduates. It attempts to teach information literacy concepts and relate them to the engineering curriculum and profession.
Doctoral Presentation - June 2023.pptxCapitolTechU
Slides from a doctoral virtual open house presented by Capitol Technology University on June 11, 2023. Covers doctoral degrees offered by the university, and includes program information, tuition and financial aid, the admissions process and application deadlines.
Educause 2011 Bridging The Distance Across Time and Spaceronfitch
The document summarizes different models for distance learning programs at the University of Minnesota. It discusses the seven steps in each program's process: defining mission and audience; identifying courses; instructional design; production; quality control; delivery; and evaluation. The three programs presented were the College of Continuing Education, College of Pharmacy, and UNITE Distributed Learning. Key aspects like audience, course selection methods, and emphasis on faculty support varied between programs. Common themes included iterative design, aligning with learning principles, and using feedback to improve courses.
Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...Nurkhamimi Zainuddin
This article promotes the use of Moodle as a suitable platform to support the postgraduate open and distance learning (ODL) courses offered by Universiti Sains Islam Malaysia (USIM). Many USIM postgraduate students who take obligatory courses (e.g., research methodology and data analysis) are taught at different venues to facilitate students’ access to high education and enhance quality of lifelong learning. Managing this complex teaching network has called for the adaptation of Moodle platform. This approach meets two relevant requirements, (a) to ensure consistency, compliance, and quality of teaching, (b) to reduce educational costs, which largely depend on the number of peripheral venues for teaching activities. This article analyses the functionalities of Moodle platform and its use among USIM postgraduate students. The data was collected based on content analysis, one non-structured interview with the responsible of the Moodle from USIM and a questionnaire applied to 18 students. The results show that despite Moodle has a great potential, mainly used as a repository of materials. Moreover, students recognize the importance of the use of other functionalities of this platform in order to promote the success of the teaching and learning process
This document summarizes key points about frequency response analysis of motors and generators, research methods, and ethics.
Frequency response analysis uses sinusoidal test signals to measure the frequency response of a transfer function or impedance function. Output frequency signals from motors and generators can be used for maintenance monitoring without disassembly, online monitoring of key parameters, and fault prediction.
The research will focus on experimental study using a laboratory test stand and computer simulation. Methods learned from the research methods course include the research process, planning and managing projects, applying methodology, analyzing findings, and maintaining good research relations. Ethical considerations include safety, intellectual property protection like patents, and avoiding conflicts of interest.
This document provides an overview of the Capitol Technology University Doctoral Program. It discusses the university's history and accreditation. It then outlines the agenda for the presentation, which includes an overview of the doctoral program requirements, application process, financial aid options, and a question and answer session. The presentation provides details on the synchronous and European course models and eligibility requirements. It also reviews recent graduate dissertations and provides information on tuition costs and financial assistance.
Applicant Day Course Talk - Electronic and Computer Engineering 2013Brunel University
This document provides information about the Electronic and Computer Engineering program at Brunel University's School of Engineering and Design. It outlines the program structure and content, including undergraduate and masters degree options across electronic engineering, computer systems engineering, and digital media. It describes the curriculum, modules, teaching approach, support services, placement opportunities, and accreditation. The goal is to produce well-rounded engineers with strong analytical and design skills through a student-centered learning experience.
This document discusses various methods for collecting data in statistics for the built environment, including experiments, interviews, questionnaires, and observation. It provides details on 5 main methods: experiments, face-to-face interviews, telephone interviews, questionnaire surveys, and mail/postal questionnaires. For each method, it outlines the advantages and disadvantages in terms of costs, response rates, accuracy of data, and potential for interviewer bias. The goal is to help researchers determine the most effective approach for obtaining required data at minimum cost.
This 3-sentence summary provides the key information about the course syllabus:
The syllabus outlines a 3-credit, undergraduate course on Information System Development taught on Saturdays from 1-4pm in room B102. The course introduces various tools and techniques for systems analysis and design using object-oriented approaches like the Unified Modeling Language. Assessment is based on a midterm, other activities, and a final exam, and students will complete a group presentation and individual project on a software development methodology.
Slides from a presentation given Sept. 10, 2023 by Capitol Technology University. Covers all doctoral degree programs, tuition, application process and more. All degrees are accredited and offered online.
The Innovation Portal is an online platform that connects businesses with a university's faculty to solve problems through various solutions like student projects, research, and consulting. Businesses can post problems on the portal and the faculty works to match problems with appropriate solutions based on the scope and resources required. This provides opportunities for both students and faculty to engage with real-world issues while helping businesses.
The document describes two studies related to technology use. The first study examined men's and women's attitudes toward computer technology using a 13-item questionnaire with response options ranging from strongly agree to strongly disagree. The second study was an observation tool used to assess how essential technology was to teaching and learning activities, which technologies students used, how technology aligned with technology standards, time spent using technology, and observed learning activities. A third study examined reaction to and learning in an Air Force technical training program as predictors of job performance, using a 5-item questionnaire.
IEEEXtreme is a worldwide contest held annually where teams of students compete over 24 hours to solve programming problems. The top prize is a trip for the winning team. It started in 2006 with 47 teams and has grown significantly. In 2009 there were 146 teams from around the world. The contest aims to expand the scope of benefits for IEEE students and have a global, fun and innovative activity.
This document is a mini project report submitted in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. It describes a project to create a "College Phone Book" application, with the goal of storing contact information for students and faculty at the college. The report includes sections on introduction, literature survey, requirements analysis, implementation, system design, coding, system testing, screenshots, limitations and future enhancements, and conclusion. It was created by four students under the guidance of an associate professor.
Student projects with industry can take several forms, including study groups, MSc programs, internships, and industrial training terms. These projects allow students to gain work experience and skills while addressing real problems faced by industry. Examples provided include using mathematical modeling of crowd dynamics for London Transport and applying graph theory and combinatorics to frequency allocation for BT. Students develop skills in areas like modeling, computation, statistics, and problem solving that are valuable for industry. Close collaboration between academics and industrial partners is needed to define suitable projects and manage expectations on both sides.
This document outlines information for the subject ITC544 - Computer Organisation and Architecture at Charles Sturt University:
- It provides an overview of the subject content which covers topics such as data representation, digital logic, computer memory, and trends in computing technologies.
- The learning outcomes, assessment items, and schedule are described. Students will complete two assignments and an online quiz.
- Resources for study include online modules, lecture notes, tutorials, and the prescribed textbook. Support services from the university such as the library and learning skills support are also mentioned.
The document provides information about IIT-Chicago University and its programs offered in India. It summarizes that IIT-Chicago University has five campuses across the United States and India and offers various master's degree programs online and in-person in India at sites in Bangalore, Chennai, Hyderabad, Mumbai, and Pune. The eligibility for the programs typically requires a first class bachelor's degree in an engineering field. The teaching methodology involves streamed video lectures on the internet with opportunities for video/audio conferences.
Professor Paul Maharg presented on assessment in legal education at a workshop of the Law Society of Ireland. The presentation included:
1. A taxonomy of task analysis for assessments in simulations, ranging from discrete tasks to assessments involving an entire case file and performative skills.
2. Results from a study on using simulated clients for interviewing assessments, which found it to be more reliable and valid than traditional assessment methods.
3. Ways that problem-based learning can be designed to ensure both breadth and depth of learning, and forms of assessment that align with problem-based learning methods like exams involving analysis of new or previously seen case studies.
Electronics and communication engineeringM. Raja Reddy
Electronics and Communication Engineering deals with electronic devices, circuits, communication equipment, integrated circuits, analog and digital transmission and reception. It provides a variety of career opportunities in fields like telecommunications, embedded systems, wireless communication, and more. Studying ECE offers benefits like high paying jobs, intellectual development, financial security, and opportunities to work on projects that benefit society. Students are advised to gain practical skills through internships, focus on fundamentals, understand industry trends, assess their aptitudes, and consider higher education options like MTech in related fields. The document provides an overview of the ECE field and advice for students on how to prepare for careers in it.
Information Literacy for Engineering StudentsJohn Meier
This presentation was developed for a Senior design course in Electrical Engineering as part of the ABET accreditation requirements for engineering graduates. It attempts to teach information literacy concepts and relate them to the engineering curriculum and profession.
Doctoral Presentation - June 2023.pptxCapitolTechU
Slides from a doctoral virtual open house presented by Capitol Technology University on June 11, 2023. Covers doctoral degrees offered by the university, and includes program information, tuition and financial aid, the admissions process and application deadlines.
Educause 2011 Bridging The Distance Across Time and Spaceronfitch
The document summarizes different models for distance learning programs at the University of Minnesota. It discusses the seven steps in each program's process: defining mission and audience; identifying courses; instructional design; production; quality control; delivery; and evaluation. The three programs presented were the College of Continuing Education, College of Pharmacy, and UNITE Distributed Learning. Key aspects like audience, course selection methods, and emphasis on faculty support varied between programs. Common themes included iterative design, aligning with learning principles, and using feedback to improve courses.
Innovative Utilization of The Moodle in Postgraduate ODL Courses at Universit...Nurkhamimi Zainuddin
This article promotes the use of Moodle as a suitable platform to support the postgraduate open and distance learning (ODL) courses offered by Universiti Sains Islam Malaysia (USIM). Many USIM postgraduate students who take obligatory courses (e.g., research methodology and data analysis) are taught at different venues to facilitate students’ access to high education and enhance quality of lifelong learning. Managing this complex teaching network has called for the adaptation of Moodle platform. This approach meets two relevant requirements, (a) to ensure consistency, compliance, and quality of teaching, (b) to reduce educational costs, which largely depend on the number of peripheral venues for teaching activities. This article analyses the functionalities of Moodle platform and its use among USIM postgraduate students. The data was collected based on content analysis, one non-structured interview with the responsible of the Moodle from USIM and a questionnaire applied to 18 students. The results show that despite Moodle has a great potential, mainly used as a repository of materials. Moreover, students recognize the importance of the use of other functionalities of this platform in order to promote the success of the teaching and learning process
This document summarizes key points about frequency response analysis of motors and generators, research methods, and ethics.
Frequency response analysis uses sinusoidal test signals to measure the frequency response of a transfer function or impedance function. Output frequency signals from motors and generators can be used for maintenance monitoring without disassembly, online monitoring of key parameters, and fault prediction.
The research will focus on experimental study using a laboratory test stand and computer simulation. Methods learned from the research methods course include the research process, planning and managing projects, applying methodology, analyzing findings, and maintaining good research relations. Ethical considerations include safety, intellectual property protection like patents, and avoiding conflicts of interest.
This document provides an overview of the Capitol Technology University Doctoral Program. It discusses the university's history and accreditation. It then outlines the agenda for the presentation, which includes an overview of the doctoral program requirements, application process, financial aid options, and a question and answer session. The presentation provides details on the synchronous and European course models and eligibility requirements. It also reviews recent graduate dissertations and provides information on tuition costs and financial assistance.
Applicant Day Course Talk - Electronic and Computer Engineering 2013Brunel University
This document provides information about the Electronic and Computer Engineering program at Brunel University's School of Engineering and Design. It outlines the program structure and content, including undergraduate and masters degree options across electronic engineering, computer systems engineering, and digital media. It describes the curriculum, modules, teaching approach, support services, placement opportunities, and accreditation. The goal is to produce well-rounded engineers with strong analytical and design skills through a student-centered learning experience.
This document discusses various methods for collecting data in statistics for the built environment, including experiments, interviews, questionnaires, and observation. It provides details on 5 main methods: experiments, face-to-face interviews, telephone interviews, questionnaire surveys, and mail/postal questionnaires. For each method, it outlines the advantages and disadvantages in terms of costs, response rates, accuracy of data, and potential for interviewer bias. The goal is to help researchers determine the most effective approach for obtaining required data at minimum cost.
This 3-sentence summary provides the key information about the course syllabus:
The syllabus outlines a 3-credit, undergraduate course on Information System Development taught on Saturdays from 1-4pm in room B102. The course introduces various tools and techniques for systems analysis and design using object-oriented approaches like the Unified Modeling Language. Assessment is based on a midterm, other activities, and a final exam, and students will complete a group presentation and individual project on a software development methodology.
Slides from a presentation given Sept. 10, 2023 by Capitol Technology University. Covers all doctoral degree programs, tuition, application process and more. All degrees are accredited and offered online.
The Innovation Portal is an online platform that connects businesses with a university's faculty to solve problems through various solutions like student projects, research, and consulting. Businesses can post problems on the portal and the faculty works to match problems with appropriate solutions based on the scope and resources required. This provides opportunities for both students and faculty to engage with real-world issues while helping businesses.
The document describes two studies related to technology use. The first study examined men's and women's attitudes toward computer technology using a 13-item questionnaire with response options ranging from strongly agree to strongly disagree. The second study was an observation tool used to assess how essential technology was to teaching and learning activities, which technologies students used, how technology aligned with technology standards, time spent using technology, and observed learning activities. A third study examined reaction to and learning in an Air Force technical training program as predictors of job performance, using a 5-item questionnaire.
IEEEXtreme is a worldwide contest held annually where teams of students compete over 24 hours to solve programming problems. The top prize is a trip for the winning team. It started in 2006 with 47 teams and has grown significantly. In 2009 there were 146 teams from around the world. The contest aims to expand the scope of benefits for IEEE students and have a global, fun and innovative activity.
This document is a mini project report submitted in partial fulfillment of the requirements for a Bachelor of Technology degree in Computer Science and Engineering. It describes a project to create a "College Phone Book" application, with the goal of storing contact information for students and faculty at the college. The report includes sections on introduction, literature survey, requirements analysis, implementation, system design, coding, system testing, screenshots, limitations and future enhancements, and conclusion. It was created by four students under the guidance of an associate professor.
Similar to just research guide seminar 11012023.pptx (20)
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
just research guide seminar 11012023.pptx
1. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
A seminar on graduation thesis
format and contents for JUST
final year students:
(Guidance, discussion, Q & A)
2. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Thesis contents
Chapter One: Introduction
Chapter Two: Literature Review
Chapter Three: Methodology
Chapter Four: Analysis & Design
Chapter Five: Implementation
Chapter Six: Discussion
Chapter Seven: Conclusion & future work
3. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Chapter One: Introduction
- Background of the study
- Problem statement
- Research questions
- Objectives
- Significance of the study
4. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Usually forms the first section of the introduction
to the thesis.
• Provides the overview of the study, establishes its
context.
• Explains why the proposed research is important,
and essential to understanding the main aspects
of the study
5. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Core Elements:
• A brief discussion of what is known about the
topic.
• Articulation of the research gap.
• What the researcher would like to do or aim to
achieve(research goal).
• The main argument of the research
• The major significance / contribution
6. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Before writing the background of the study, you have to:
• Conduct a preliminary research on your chosen topic.
• Read a lot of literature and gather relevant information.
• Identify the gap of the proposed research and develop
the research question
7. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Background of the Study
• Writing the background of the study:
1. Start by providing a definition of the research key
concepts.
2. Highlight the main developments of the research
topic.
3. Proceed to show the problem or gap of the study.
4. State the main goal of your study
8. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Problem Statement
• A concise and clear wording of the problem to be solved.
• The problem statement is the foundation and focus of the research
report.
• At minimum, a problem statement should include:
• What is the problem?
• Magnitude of the problem?
• Where is the problem?
• Why is it important to work on this problem?
9. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Questions - Examples
• A Research Question is a question that a study or
research project aims to answer.
• Is usage of mobile banking services in Somalia directly
related to the educational level?
• Does the level of usage of ICT services by Universities
differ from High Schools in Mogadishu-Somalia?
10. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• A research objective describes what your research
is trying to achieve.
• Summarize what is to be achieved by the
study.
• Gives an overview of the expected solution to
the problems
11. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Objectives
• Should be specific and measurable
• Examples:
• To determine how much time males between the
age 13 to 21 spend playing video games.
• To develop a mobile application that registers the
individuals of rare blood groups
12. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Some verbs commonly used
in writing objectives
• General Objective:
• Asses
• Describe
• Investigate
• Explore
• Characterize
• Specific Objectives:
• Identify
• Define
• Estimate
• Determine
• Develop
• Demonstrate
• Compare
• Classify
• Measure
• Examine
• Analyze
• Design
13. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Significance of the Study
• Significance of the study, also called “Rationale” is the
section where the researcher tries to convince an audience
that the research is worth doing and the contributions it may
add.
• Questions to answer:
• Why this work is important?
• What are the implications of doing it?
• How does it stand to inform policy making?
• What use might your study have for others in the field or in general public?
• Who might benefit from it?
14. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Healthcare
To enable citizens to get
healthcare services on demand
People have to come physical to
hospitals to ask for service
Automating health services using healthcare on-demand
platforms, using mobile and web technologies
Can we improve the healthcare
service provision using IT?
Research Objectives
Save lives, protect vulnerable patients,
easily get health services conveniently
15. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Education/certifications
To control graduate records and
Identify fraudulent certificates
Some universities issue
certificates for students that do
not exist in their records
Controlling graduate records and
recognizing fraudulent certificates
Can the use of information
Technology help us prevent
certificate falsifications?
Research Objectives
Protect national certificates
16. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To allow Rikab customers to
share one ride for affordability
Rikab currently accepts only one customer
and is not affordable for most citizens
Rikab service sharing application for better affordability and
customer experience using a mobile flutter application
How can we make Rikab
affordable for low income citizens
Research Objectives
Low income citizens will have
access to Rikab service
17. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Transportation
To develop an easy payment
system for the public transport
It takes long time to pay the transportation
fees of public buses
Automating public transport payment using esyPay QRCODE
reader
How can we achieve a smooth and quick
payment for public buses
Research Objectives
Get rid of difficulties in paying
transportation fees
18. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Government/taxation
To develop a convenient tax paying system
to boost national revenue
Taxpayers face problems to pay
tax
Enhancing revenue collections with a self-service tax
payment portal using mobile technology
Can the use of IT boost the
revenue collection and monitoring
Research Objectives
Ensure a convenient way of payment and
monitoring tax collection service
19. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Research Topic, Title, Problem, Research Question
General
Specific
Research Area
Problem statements
Research Questions
Research Title
Research Significance
Business/Banking
To develop a unified data store for banks to
easily detect bad credit customers/guarantors
Bad credit customers/guarantors do business
in different banks without being noticed
A Unified data store for a local bank for sharing the
guarantor and customer credibility records
Can we help local banks detect
bad customers/guarantors?
Research Objectives
Easily identify defaulters and bad credit
guarantors
20. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
What is your
contribution?
The Most challenging question
What is your
contribution?
Highlight your contribution
21. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Literature Review
3/11/2023
22. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• The review of literature is a summary of the reviews from
various research literatures related to the study carried out by
the researcher
• It helps to discover:
• What is already known about the research problem.
• What more has to be done.
• LR influences the problem and research design and can be
used to compare with the findings of the current study
Literature review
23. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Explore the area, the topic, the specific problem area.
• Download as many articles as you can about the specific
problem you are solving.
• Extract the needed information from articles
• Import articles into Zotero
• Cite as you write
A convenient Literature review process
24. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The content of literature Review
Introduction Body Conclusion
25. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Sources of Literature
1. Journal Articles
2. Conference Proceedings
3. Thesis & Graduation Projects
4. Government & Corporate Reports
5. Text Books
26. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Resources of Literature
Review- Online Databases
•Thesis
/Conference
Papers
•Research
Reports
/Books
•Electronics
database
•Magazines
Google
scholars
Springer
IEEE
Journals
27. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: Some CS LR Sources
https://www.scirp.org/journal
28. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https://ieeexplore.ieee.org/Xplore/home.jsp
29. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources: https://dl.acm.org/
30. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Electronic Sources:
https:https://link.springer.com/
31. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://scholar.google.com/)
32. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (core.ac.uk)
33. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Article Sources (https://doaj.org/)
34. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Citations & Referencing Tools
3/11/2023
35. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing
• What is it?
• It is a method used by the researchers to demonstrate
that they have conducted a thorough and appropriate
literature search, and reading.
• To accurately acknowledge other people's work and
ideas, you need to use a referencing style.
• There are many types of referencing style such as
Chicago Style APA, MLA, MPA, IEEE,….
36. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
37. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing & Referencing in APA Style
38. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• The basic citation that you will use most of the
time:
• (Surname, Year)
• Recent research in artificial intelligence
(Ahmed, 2018) has shown that …..
• … as shown in its annual report (WHO,
2016) ….
39. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
In-Text Citation in APA
• If you have used the name of the author with
the sentence, take it out of the brackets:
• (Year)
• In her recent study, Salma (2019) found
that ….
• …as WFP’s annual report showed
(2020)….
40. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Citing Multiple Authors
• Include all names in the in-text citation:
• (surname1 & surname2, Year)
• This important discovery (Ahmed & Asli, 2019)
indicates that ….
• For works with three to five authors, include all names in the
first time, but use et al. for next citations
• (surname1, surname2, & surname3, Year)
• In a survey (Ahmed, Jama & Salad, 2020)….
• Then: (surname1 et al., Year)
• This survey (Ahmed et al., 2020) was later…
41. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Articles
• Surname, I. (YEAR). Title of the article. Name of the
Journal, Volume(Issue), xx-xx.
• Dumbledore, A. (1943). Twelve uses of dragon blood.
International Journal of Transfiguration, 135(2), 22-47
• You can also add the DOI (Digital Object Identifier) at the
end of the reference.
• Horch, E.P. and Zhou, J. (2012). Charge-coupled device
speckle observations of binary stars. Astronomical
Journal, 136, 312-322. doi: 10.1088/0004-
6256/136/1/312
42. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Referencing Web Page
• Surname, I. (YEAR) Title of the web page.
Retrieved from URL.
• Rowling, J.K. (n.d.) How the wizarding
world works. Retrieved from
https://www.pottermore.com/ collection/jk-
rowling-how-the-wizarding-worldworks
43. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Reference Management Tools
44. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Reference management tools
• Tools that help scholars to create and manage their lists of
references for research projects.
• They organize citations into specific formats for the
preparation of manuscripts and bibliographies.
• Many search tools provide ways to download references
into reference management tools.
• It makes it easier to automatically switch to different
citation styles (e.g. Vancouver to MLA or APA)
45. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Software options
Free
Subscription
46. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Zotero is a free (open source) reference
management tool
• To download and install Zotero go to:
http://www.zotero.org
47. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Research Methods In
Computer Science
3/11/2023
48. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research methods in
Computer Science
There are several research methods that can be used in
Computer Science (CS) (Ayash, 2014), including the
following:
Algorithms, Experimental, Framework, Mixed
method, Model, Prototype, Simulation, Case studies,
Survey, Action research
49. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methods in Computer Science
Theoretical Experimental Simulation
• Conceptual and
formal models
• data models
• Algorithms
• Complexity
• Levels of
abstraction
• Efficiency
• Automatic theorem proving
• Natural language processing
• Vision
• Games
• Neural networks
• Software design/development
• Machine learning
• Complementing theory and
experiment
• Guided by theory as well as
experimental results, while the
computational results often
suggest new experiments and
theoretical models.
• Examples are Solving problems
using Cisco Packet-tracer or
GN3 Simulation software
Sources: (Shneiderman, 2013 & Ayash et Al, 2004 & Petter et. Al 1989 & Peter, 1976)
50. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Experimental Methods, In Computer
Science/Information Systems
• Using Software development to solve research
problems
• Applying Hardware/Software tools to solve
problems
51. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
A MULTI PARAMETER PATIENT MONITORING SYSTEM USING IOT,
MOBE AND WEB APPLICATIONS (Abdisamad et al, 2020)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.1 System overview
3.1.1 System Features
3.2 Development Environment
3.3 Development Methodology Requirement
3.3.1 Hardware requirement
3.3.2 Software Requirement
3.4 User Requirement
3.5 Conclusion
52. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Examples
AVOIDING VOTING ANOMALIES AND INCONVENIENCES IN
JAMHURIYA UNIVERSITY STUDENTS’ASSOCIATION
ELECTIONS USING A MOBILE VOTING SYSTEM (MVS) (Sabrie
et al. 2016)
CHAPTER THREE: METHODOLOGY
3.0 Introduction
3.0 Introduction
3.1 System Description
3.1.1 System Features
3.2 System Architecture
3.3 Development Methodology Requirement
3.4.1 Hardware requirement
3.4.2 Software Requirement
3.5 User Requirement
3.6 Conclusion
53. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
System Architecture
54. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
For Your Research Proposal:
• Research Methodology
Activities
• Research Workplan
55. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH METHODOLOGY ACTIVITIES
Phase1:
In depth review of current works
Investigate
Phase1:
Identify the gaps to bridge
Identify
Phase2:
Propose solutions to identified gaps
propose
Phase3: Implement proposed solution Using
algorithms
Implement
Phase4:
Analyze the solution, discuss & conclude
Evaluate
• To Review the relevant literature to the
problem under study
• To Identify the existing
gap/problem to solve
• To develop a mobile/web/desktop…
• Or Use IoT or other devices
• To use Machine learning… or algorithm
• Implement the proposed system in the
manner specified
• Analyze the developed solution in
terms of the features proposed
56. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
RESEARCH WORK PLAN FROM JUNE 2022-JAN 2023
(Your research Proposal should include your work plan)
Your workplan will different
57. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Welcome
Analysis & Design
3/11/2023 57
58. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis
• Systems analysis is a problem-solving method
that involves looking at the wider system,
breaking apart the parts, and figuring out how it
works in order to achieve a particular goal.
• The first step in solving a problem that involves a
system is analyzing that system.
3/11/2023 58
59. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System analysis includes
• Preliminary investigation.
• The study of the current system.
• The limitations of the current systems
• The proposed system
• How the proposed system solves the current
problems
• Requirement analysis
• Functional & non-functional requirements
3/11/2023 59
60. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Design
• System design is the process of defining the
components, modules, interfaces, and data for
a system to satisfy specified requirements.
• The proposed system activities Using UML
• Use case diagrams
• Activity Diagrams
3/11/2023 60
61. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Use case Diagram
3/11/2023 61
62. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example (Basic vs
alternative flow steps)
3/11/2023 62
Flow Steps
1. The user enters URL to web-browser.
2. The system displays a login form.
3. The user enters authorized Username and
Password and submits it.
4. The system verifies the submitted
information. If it is a valid, the user will be
redirected to the result page.
Alternative flow Steps
1. If the Username and Password are not
matched, the system shows an error
message, and tells the User to enter a valid
Username and Password.
63. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Activity Diagram Example
3/11/2023 63
64. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Database Design
3/11/2023 64
65. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Welcome
Implementation and Testing
3/11/2023 65
66. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
System Implementation
• The purpose of System Implementation Is making
the new system available to a prepared set of users,
and positioning on-going support and maintenance of
the system within the Performing Organization.
• The overall system functions as well as individual
modules should be tested and proven functional.
3/11/2023 66
67. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe how the implementation lab is set up
showing a graphical model of it.
3/11/2023 67
Implementation environment set up
68. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
• Describe the main logic of system
implementation, showing screenshots,
code snippets, charts, activity models , etc.
3/11/2023 68
Implementation environment set up
69. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 69
70. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system Interfaces
3/11/2023 70
71. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 71
72. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present screenshots of main system
Interfaces
3/11/2023 72
73. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 73
74. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code snippets
3/11/2023 74
75. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Present Code functionalities
3/11/2023 75
76. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Discussion
3/11/2023 76
77. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Discussing the results
• The discussion reviews the findings and puts
them into the context of the overall research. It
brings together all the sections that came before
it and allows a reader to see the connections
between each part of the research paper.
3/11/2023 77
78. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• First, summarize the key findings from the research
and link them to the initial research question. Seek
to answer this question: What should readers take
away from this paper?
• Second, place the findings in context. This step will
involve going back to the literature review section
and analyzing how the results fit in with previous
research.
3/11/2023 78
79. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
The Structure of the Discussion Section
• Third, mention and discuss any unexpected results. Describe
the results and provide a reasonable interpretation of why
they may have appeared. Additionally, if an unexpected result
is significant to the research question, be sure to explain that
connection.
• Fourth, address limitations or weaknesses in the research.
Addressing limitations helps build your credibility as a
writer.
3/11/2023 79
80. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus Two
Research Methodology
Conclusion & Future work
3/11/2023 80
81. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Conclusion
The conclusion of a research paper is where you wrap
up your ideas and leave the reader with a strong final
impression. It has several key goals:
• Restate the research problem addressed in the
paper
• Summarize your overall arguments or findings
• Suggest the key takeaways from your paper
3/11/2023 81
82. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
3/11/2023 82
83. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Future Work
• The future work section is an important part of a
scientific article. The authors usually discuss how
to extend their current works, approaches or
evaluations in the future work section.
• These future works often contain valuable
research information and give the researchers
hints of new research directions or ideas.
3/11/2023 83
84. Faculty of Computer Science & IT- A graduation protect guidance session
Presenter: Mohamud Ahmed Jimale @JUST, campus two, Thursday January 12th 20123
Mahadsanidiin:
Weydiimo?
Faallooyin,
aragtiyo?
84 3/11/2023