Research methods, Computer Engineering

Building on their knowledge of research methods and their interest in a particular aspect of information technology this assessment enables students to put this knowledge into practice. It will clearly illustrate whether a student is prepared to undertake a substantial research project (dissertation or thesis). It also provides students with the opportunity to gain experience in presenting and defending a proposal in a group setting.

Students will select an issue of interest and will discuss the general topic area with staff involved in the Research Methods paper (this must be done by Thursday 25 September). After selecting a particular research topic, students will determine the aims and objectives of their project. They will indicate its importance and relevance to information technology research and/or practice. A critical assessment of the contemporary research literature on the topic will then be carried out. An appropriate research question should then be identified, together with the proposed research methodology and its constituent methods. Full justification for the chosen methods and methodology must be provided.

Posted Date: 3/25/2013 1:37:26 AM | Location : United States

Related Discussions:- Research methods, Assignment Help, Ask Question on Research methods, Get Answer, Expert's Help, Research methods Discussions

Write discussion on Research methods
Your posts are moderated
Related Questions
E-commerce advance tremendous chance by permitting industrialist to buy Materials at a low price internationally. Also they give companies the opportunity to sell to universal stor

The six several application of stack in computer application is: 1.  Conversion of infix to postfix notation and vice versa. 2.  Evaluation of arithmetic expression. 3.

Q. What do you mean by File? In computer vocabulary, file is a collection of text or data stored on a storage device, such as a Floppy Disk or Hard Disk. If you a fresher to c

Can we include customizing include or an append structure with Pooled or Cluster tables? No.

Benefits of implementing ERP

Enumerate in brief about the Intranet security policy An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situa

The maximum number of nodes in a binary tree of depth 5 is 31 is the maximum number of nodes in a binary tree

Develop a regular expression for Integer and Identifier (i) A regular expression for integer is [+ | -] (d)+ (ii) A regular expression for identifier is l(l | d)*

Explain the Significance of Binary Data Controlled devices generally contain registers that are made up of binary digits (bits). The following illustration shows how these regi

any ideas about senior project topic