Describe what is your domain or area of research

Assignment Help Computer Network Security
Reference no: EM13910360

Proposal each item in details :-

1.0 Introduction

-describe what is your domain or area of research, start from general then focus on the area of research.
-describe the significant/important of your research, why you need to solve this problem?

1.1 Research Background

-First, state the research problem, describe the problem, why it is a problem?

-second, describe on how to solve the problem? (there might be different ways of solving the problem, so elaborate all the solving approach), what are the current researches have done to solve the problem? And why it is not solved? What are the disadvantages or drawback of current approaches.

-third, you need to mention what is the approach that you want to use to solve the problem and the techniques that you will use. Why u want to use this approach and the technique? What are the advantages of your approach?

1.2 Problem Statement

-You need to state the problem again

1.3 Research Objectives

-You need to state the research objectives, normally three objectives.

-(1) To investigate/explore/...... (2) To design/develop... (3) To evaluate...
-You need to relate your objectives with the problem, therefore reader can see the link.

1.4 Research Methodology

-describe on the methodology that you employ to accomplish your research. Normally:
-literature review to understand the problem, looking for a better technique or approach.
-proposing your solution with your chosen technique
-evaluation to evaluate your solution such as by developing a system, interview etc.

1.5 Expected Outcomes

-based on your research what will be your expected outcome.

1.6 Conclusion

-state again your problem, problem with current solutions, your solution, your technique, your methodology in accomplishing you research, your expected outcome, and what will be In the next chapter.

LITERATURE REVIEW

2.0 Introduction

- explain on the objective of your chapter, what will be inside your chapter, what analysis will you do etc.

2.1 Your research problem.
-this will explain details on your research problem. Very details.

2.1.1
2.1.2
2.1.3
2.1.4
2.2 The current solutions on solving the research problem. You need to explain what are the current solutions, advantages and disadvantages.
2.2.1
2.2.2
2.2.3
2.2.4...
- You should end your section with a conclusion that the current solution is still not able to solve the research problem and that is why you are proposing your solution.

2.3 What is your solution and the techniques that you will employ to solve the research problem, justification why you want to use this solution, why you want to use the proposed techniques/methods, the advantages of your solution and your techniques/methods, other techniques that might be used with your solution and why you not use it. (2-5 pages)
2.3.1
2.3.2
2.3.3
2.3.4

2.4 Conclusion - explain on the what the chapter two is all about, your problem details, the weaknesses of current approaches, your solutions and justification, and will be in the next chapter. (1-2 paragraphs)
CHAPTER THREE - THE PROPOSED SOLUTION/METHOD/APPROACH
3.0 Introduction - explain on the chapter objectives, what will be inside the chapters. (1-2 paragraphs)
3.1 Overview of your proposed approach/method, the step by step processes, with figure and brief explanation. (2-4 pages)
3.2 THE FIRST PROCESS IN DETAILS (2-4 pages)
3.2.1, 3.2.2, 3.2.3 etc
3.3 THE SECOND PROCESS IN DETAILS (2-4 pages)
3.3.1, 3.3.2, 3.3.3 etc
3.4 THE THIRD PROCESS IN DETAILS (2-4 pages)
3.4.1, 3.4.2, 3.4.3 etc
3.5 THE FOURTH PROCESS IN DETAILS (2-4 pages)
3.5.1, 3.5.2, 3.5.3 etc
3.6 Conclusion - what chapter three all about and what will be in the next chapter. (1 paragraph)

-everything should be in details for an example if you are using GA in your solution then one of the process is you need to model is your solution using GA. What are the steps in GA? How do you model your solution with GA in every steps. What is your fitness function, how will u do the selection, crossover and mutation?

-normally there is a testing or evaluation process, you need to explain details what is your plan to evaluate your solution. If you do simulation, why you choose simulation? what will you simulate? How? How many times will you simulate? What tools do u use to simulate? What are the parameters that you want to measure during the simulations? What is good performance and what is bad performance?

Reference no: EM13910360

Questions Cloud

The probability that it will take an accountant chosen : ACME has 20 accountants. If the time it takes to complete the end of quarter report is normally distributed with a meanof 30 hours and a standard deviation of 5 hours, the probability that it will take an accountant chosen at random lessthan 27 hours..
Compare the differences between mac and h-mac : In a 2-3 page paper, complete the following: Compare the differences between MAC and H-MAC. Explain why using H-MAC is more secure than MAC?
Source code with detailed comments : Description of program (script) Source Code with detailed comments
Review concept of a industry-wide private industrial network : Why is Elemica described as an example of an industry consortia net marketplace? How does it differ from other types of net marketplaces like ChemConnect?
Describe what is your domain or area of research : Describe what is your domain or area of research, start from general then focus on the area of research - describe the significant/important of your research, why you need to solve this problem?
Cybercrime : Topic: CYBERCRIME I. INTRODUCTION a. Financial Theft
Summarize the purpose of the sql language : Summarize the purpose of the SQL language. Compare and contrast writing SQL commandsand the MS Access graphical interface, including the QBE capabilityto build queries. Describe at least two advantages and two disadvantages with each method. Why do y..
What is it infrastructure : What is IT infrastructure and why it has become an important field of study?
Discuss of swaptions relative to current economic enviroment : Discuss the usefulness of swaptions (swap options) relative to the current economic environment. Give three specific examples of how a bank can use this derivative both for risk management and speculation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze the compliance and regulatory issues

Analyze the compliance and regulatory issues that face U.S. companies with regard to cybersecurity and information technologies and how to address them within the policy framework.

  Security awareness on the internet

Search for security awareness on the internet. Describe the available materials. Choose one of the web sites that might work for security awareness program at your school

  What is utc and why is it used

How they are syncronised and why do they need to be syncronised and what is UTC and why is it used?

  Explain hardware and software used to support personal

Write 700-1050 word paper explaining hardware and software used to support personal, workgroup, and enterprise computing within current organization, an organization.

  What is an information security program?

What is an information security program?

  A detailed description of what worms and trojan horses

a detailed description of what worms and Trojan horses

  Create a personal disaster recovery plan

Locate reviews for at least four tools and create a chart that list describes the tool, features, cost and support available. Which would you recommend if cost was an issue? Which would you recommend if cost were not an issue?

  Prepare research paper on defending against virus attacks

Prepare a research paper on Defending against Virus Attacks - You will create a 6 to 8 page research paper. Please include an introduction, body and conclusion. You need to also include at least eight references with in-text citations.

  Evaluate the extent to which ddos attacks are avoidable

Evaluate the extent to which DDoS attacks are avoidable or inevitable when using the TCP/IP protocol suite.

  Explain in detail the security controls

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..

  Explain access control methods and attacks

Explain access control methods and attacks

  Corporate governance and a company''s cybersecurity posture

Analyze the connection between corporate governance and a company's cybersecurity posture. Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity po..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd