Describe what is your domain or area of research

Assignment Help Computer Network Security
Reference no: EM13910360

Proposal each item in details :-

1.0 Introduction

-describe what is your domain or area of research, start from general then focus on the area of research.
-describe the significant/important of your research, why you need to solve this problem?

1.1 Research Background

-First, state the research problem, describe the problem, why it is a problem?

-second, describe on how to solve the problem? (there might be different ways of solving the problem, so elaborate all the solving approach), what are the current researches have done to solve the problem? And why it is not solved? What are the disadvantages or drawback of current approaches.

-third, you need to mention what is the approach that you want to use to solve the problem and the techniques that you will use. Why u want to use this approach and the technique? What are the advantages of your approach?

1.2 Problem Statement

-You need to state the problem again

1.3 Research Objectives

-You need to state the research objectives, normally three objectives.

-(1) To investigate/explore/...... (2) To design/develop... (3) To evaluate...
-You need to relate your objectives with the problem, therefore reader can see the link.

1.4 Research Methodology

-describe on the methodology that you employ to accomplish your research. Normally:
-literature review to understand the problem, looking for a better technique or approach.
-proposing your solution with your chosen technique
-evaluation to evaluate your solution such as by developing a system, interview etc.

1.5 Expected Outcomes

-based on your research what will be your expected outcome.

1.6 Conclusion

-state again your problem, problem with current solutions, your solution, your technique, your methodology in accomplishing you research, your expected outcome, and what will be In the next chapter.

LITERATURE REVIEW

2.0 Introduction

- explain on the objective of your chapter, what will be inside your chapter, what analysis will you do etc.

2.1 Your research problem.
-this will explain details on your research problem. Very details.

2.1.1
2.1.2
2.1.3
2.1.4
2.2 The current solutions on solving the research problem. You need to explain what are the current solutions, advantages and disadvantages.
2.2.1
2.2.2
2.2.3
2.2.4...
- You should end your section with a conclusion that the current solution is still not able to solve the research problem and that is why you are proposing your solution.

2.3 What is your solution and the techniques that you will employ to solve the research problem, justification why you want to use this solution, why you want to use the proposed techniques/methods, the advantages of your solution and your techniques/methods, other techniques that might be used with your solution and why you not use it. (2-5 pages)
2.3.1
2.3.2
2.3.3
2.3.4

2.4 Conclusion - explain on the what the chapter two is all about, your problem details, the weaknesses of current approaches, your solutions and justification, and will be in the next chapter. (1-2 paragraphs)
CHAPTER THREE - THE PROPOSED SOLUTION/METHOD/APPROACH
3.0 Introduction - explain on the chapter objectives, what will be inside the chapters. (1-2 paragraphs)
3.1 Overview of your proposed approach/method, the step by step processes, with figure and brief explanation. (2-4 pages)
3.2 THE FIRST PROCESS IN DETAILS (2-4 pages)
3.2.1, 3.2.2, 3.2.3 etc
3.3 THE SECOND PROCESS IN DETAILS (2-4 pages)
3.3.1, 3.3.2, 3.3.3 etc
3.4 THE THIRD PROCESS IN DETAILS (2-4 pages)
3.4.1, 3.4.2, 3.4.3 etc
3.5 THE FOURTH PROCESS IN DETAILS (2-4 pages)
3.5.1, 3.5.2, 3.5.3 etc
3.6 Conclusion - what chapter three all about and what will be in the next chapter. (1 paragraph)

-everything should be in details for an example if you are using GA in your solution then one of the process is you need to model is your solution using GA. What are the steps in GA? How do you model your solution with GA in every steps. What is your fitness function, how will u do the selection, crossover and mutation?

-normally there is a testing or evaluation process, you need to explain details what is your plan to evaluate your solution. If you do simulation, why you choose simulation? what will you simulate? How? How many times will you simulate? What tools do u use to simulate? What are the parameters that you want to measure during the simulations? What is good performance and what is bad performance?

Reference no: EM13910360

Questions Cloud

The probability that it will take an accountant chosen : ACME has 20 accountants. If the time it takes to complete the end of quarter report is normally distributed with a meanof 30 hours and a standard deviation of 5 hours, the probability that it will take an accountant chosen at random lessthan 27 hours..
Compare the differences between mac and h-mac : In a 2-3 page paper, complete the following: Compare the differences between MAC and H-MAC. Explain why using H-MAC is more secure than MAC?
Source code with detailed comments : Description of program (script) Source Code with detailed comments
Review concept of a industry-wide private industrial network : Why is Elemica described as an example of an industry consortia net marketplace? How does it differ from other types of net marketplaces like ChemConnect?
Describe what is your domain or area of research : Describe what is your domain or area of research, start from general then focus on the area of research - describe the significant/important of your research, why you need to solve this problem?
Cybercrime : Topic: CYBERCRIME I. INTRODUCTION a. Financial Theft
Summarize the purpose of the sql language : Summarize the purpose of the SQL language. Compare and contrast writing SQL commandsand the MS Access graphical interface, including the QBE capabilityto build queries. Describe at least two advantages and two disadvantages with each method. Why do y..
What is it infrastructure : What is IT infrastructure and why it has become an important field of study?
Discuss of swaptions relative to current economic enviroment : Discuss the usefulness of swaptions (swap options) relative to the current economic environment. Give three specific examples of how a bank can use this derivative both for risk management and speculation.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Which one best meets the requirements of the core virtues

which one best meets the requirements of the core virtues

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Case study- risk management policy

Case Study- Risk Management Policy, You have just been hired as an Information Security Engineer for a large, multi-international corporation.

  Define social engineering security threats

Select an article relevant to current social engineering threats. Topics could include, but are not limited to, phishing, quid pro quo, or diversion theft. Research and examine current information security systems designed to address social engine..

  Identify two competing security products

Identify two competing security products such as antivirus software, firewall, anti-spyware, or any hardware

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  White-hat hackers to breach systems

Go online and search for information about Operation Eligible Receiver. What details can you find? For example, which government systems were infiltrated? How difficult was it for white-hat hackers to breach those systems?

  Information security vulnerabilities with related threats

Create a list of 50 information security vulnerabilities with related threats relevant to the organization

  Name and explain 4 key security tips you would share with

question 1 name and describe 4 key security tips you would share with your coworkers to keep their data safe their

  Potential logical threats that require attention

Information Systems Security, Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. Determine the impact of at least five (5) potential logical threats that require attention

  Design the layout of users

The topology diagram for the different servers and locations and trust domains. For example, where is the firewalls, and where are the users located in the topology.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd