Research methods, Computer Engineering

Building on their knowledge of research methods and their interest in a particular aspect of information technology this assessment enables students to put this knowledge into practice. It will clearly illustrate whether a student is prepared to undertake a substantial research project (dissertation or thesis). It also provides students with the opportunity to gain experience in presenting and defending a proposal in a group setting.

Students will select an issue of interest and will discuss the general topic area with staff involved in the Research Methods paper (this must be done by Thursday 25 September). After selecting a particular research topic, students will determine the aims and objectives of their project. They will indicate its importance and relevance to information technology research and/or practice. A critical assessment of the contemporary research literature on the topic will then be carried out. An appropriate research question should then be identified, together with the proposed research methodology and its constituent methods. Full justification for the chosen methods and methodology must be provided.

Posted Date: 3/25/2013 1:37:26 AM | Location : United States







Related Discussions:- Research methods, Assignment Help, Ask Question on Research methods, Get Answer, Expert's Help, Research methods Discussions

Write discussion on Research methods
Your posts are moderated
Related Questions
Write a program to find the area under the curve y = f(x) between x = a and x = b, integrate y = f(x) between the limits of a and b. The area under a curve between two points can b

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

This boils down to the concept of Binary digits. Take an array size of 64 for example. We begin from 0 and end at 63. We need 6 bits.But, if we were to begin from 1 and end at 64,

Existential Introduction: Now if we have any sentence as, A, and variable, v, that does not occur in A, so then for any ground term, g, such occurs in A, than we can turn A in


What are the advantages of Public Key Cryptography? Advantages of Public Key Cryptography are illustrated in below: a) Increased convenience and security and b) Electro

Explain Virtual Packets. The router can't transfer a copy of a frame from one kind of network to other since the frame formats be different. More significantly, the router cann

Q. How can we use Ordered Lists? Lists having numbered items are termed as ordered lists. They are used when items in the list have a natural order. They can also be used when

draw 4 bit binary to gray code

Explain the technique used in the asymmetric Key Cryptography. Asymmetric or public-key cryptography be different from conventional cryptography in which key material is bound