Describe what is your domain or area of research

Assignment Help Computer Network Security
Reference no: EM13910360

Proposal each item in details :-

1.0 Introduction

-describe what is your domain or area of research, start from general then focus on the area of research.
-describe the significant/important of your research, why you need to solve this problem?

1.1 Research Background

-First, state the research problem, describe the problem, why it is a problem?

-second, describe on how to solve the problem? (there might be different ways of solving the problem, so elaborate all the solving approach), what are the current researches have done to solve the problem? And why it is not solved? What are the disadvantages or drawback of current approaches.

-third, you need to mention what is the approach that you want to use to solve the problem and the techniques that you will use. Why u want to use this approach and the technique? What are the advantages of your approach?

1.2 Problem Statement

-You need to state the problem again

1.3 Research Objectives

-You need to state the research objectives, normally three objectives.

-(1) To investigate/explore/...... (2) To design/develop... (3) To evaluate...
-You need to relate your objectives with the problem, therefore reader can see the link.

1.4 Research Methodology

-describe on the methodology that you employ to accomplish your research. Normally:
-literature review to understand the problem, looking for a better technique or approach.
-proposing your solution with your chosen technique
-evaluation to evaluate your solution such as by developing a system, interview etc.

1.5 Expected Outcomes

-based on your research what will be your expected outcome.

1.6 Conclusion

-state again your problem, problem with current solutions, your solution, your technique, your methodology in accomplishing you research, your expected outcome, and what will be In the next chapter.

LITERATURE REVIEW

2.0 Introduction

- explain on the objective of your chapter, what will be inside your chapter, what analysis will you do etc.

2.1 Your research problem.
-this will explain details on your research problem. Very details.

2.1.1
2.1.2
2.1.3
2.1.4
2.2 The current solutions on solving the research problem. You need to explain what are the current solutions, advantages and disadvantages.
2.2.1
2.2.2
2.2.3
2.2.4...
- You should end your section with a conclusion that the current solution is still not able to solve the research problem and that is why you are proposing your solution.

2.3 What is your solution and the techniques that you will employ to solve the research problem, justification why you want to use this solution, why you want to use the proposed techniques/methods, the advantages of your solution and your techniques/methods, other techniques that might be used with your solution and why you not use it. (2-5 pages)
2.3.1
2.3.2
2.3.3
2.3.4

2.4 Conclusion - explain on the what the chapter two is all about, your problem details, the weaknesses of current approaches, your solutions and justification, and will be in the next chapter. (1-2 paragraphs)
CHAPTER THREE - THE PROPOSED SOLUTION/METHOD/APPROACH
3.0 Introduction - explain on the chapter objectives, what will be inside the chapters. (1-2 paragraphs)
3.1 Overview of your proposed approach/method, the step by step processes, with figure and brief explanation. (2-4 pages)
3.2 THE FIRST PROCESS IN DETAILS (2-4 pages)
3.2.1, 3.2.2, 3.2.3 etc
3.3 THE SECOND PROCESS IN DETAILS (2-4 pages)
3.3.1, 3.3.2, 3.3.3 etc
3.4 THE THIRD PROCESS IN DETAILS (2-4 pages)
3.4.1, 3.4.2, 3.4.3 etc
3.5 THE FOURTH PROCESS IN DETAILS (2-4 pages)
3.5.1, 3.5.2, 3.5.3 etc
3.6 Conclusion - what chapter three all about and what will be in the next chapter. (1 paragraph)

-everything should be in details for an example if you are using GA in your solution then one of the process is you need to model is your solution using GA. What are the steps in GA? How do you model your solution with GA in every steps. What is your fitness function, how will u do the selection, crossover and mutation?

-normally there is a testing or evaluation process, you need to explain details what is your plan to evaluate your solution. If you do simulation, why you choose simulation? what will you simulate? How? How many times will you simulate? What tools do u use to simulate? What are the parameters that you want to measure during the simulations? What is good performance and what is bad performance?

Reference no: EM13910360

Case study-brain saving technologies

On average, every 45 seconds, someone in the United States suffers a stroke, the third-leading cause of death as well as the leading cause of permanent disability in the nat

Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for the

What is the regulating agency for the sarbanes-oxley act

What is the regulating agency for the Sarbanes-Oxley Act. The stated purpose of the __________ is to develop protocols and guidelines that unify the World Wide Web and ensure

Discuss whether private industry now has a responsibility

Clearly discuss whether private industry now has a responsibility to protect national security through implementing good cybersecurity controls imposed by government regulat

Define security strategies of defense in layered security

You will define security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and

Describe the technical characteristics of the dark web

Describe the technical characteristics of the Dark Web ensuring you explain how it works and its underlying technologies - Discuss the impact of the Dark Web on society. In ad

How to demonstrate that the server is up and running

You have been asked to install an SVN repository on a server. The SVN will be remotely accessed using the svnserve daemon that is supplied with SVN (please note that this is

Write access control policy section of information security

Write the Access Control Policy section of the Information Security Policy. Include the User enrollment, Identification, Authentication, Privileged and special account access

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd