TOPIC 2:�WRITING &�STRUCTURING REPORT
Introduction
Thesis writing – Is it important? Why?
Who going to read my thesis?
My friend?
My supervisor? My examiner?
?
Everybody going to read my thesis So, what should I write?
So, what should I write?
I need to write :
Why do we need to write a thesis?
to put the project into a proper and good documentation.
to share project results with others.
to enhance the knowledge of society.
to obtain some form of degree.
What is a bad thesis?
Title is too long and not clear.
Objectives is not relevant. Don’t use the word ‘to study…’
Objective is not sync with results. Copy other people works - plagiarism.
Methods is not clear.
False data.
Results are not valid & very bad discussed.
Results does not reflect the objectives.
Thesis is too slight (not thick enough). Language and grammar is very bad.
Overall format of thesis is bad.
Please remember..�
Please remember..�
Rules to follow
Rules to follow (cont.)
Present tense should be use when referencing to the work of others.
Avoid jokes and personal asides.
Avoid shortened forms such as ‘isn’t’
�Make sure you know how to use apostrophes (The mark (') used to indicate the omission of one or more letters from a printed word).
Use a spelling and grammer checker using Word Language Tools or other language tools such as RefnWrite, Grammarly, Quillbot
Body of Thesis
divisions :
1. Introduction
2. Literature
Study/Review
3. Methodology
6. Conclusion & Recommendations
5. Results and Discussion
4.Development/
Construction
Writing a thesis is about a story
Introduction: Content
Find problem in related works?
Write a brief account on the current state of the problems.
Explain what you going to solve and your objectives.
Explain your scope / limitation.
End your Introduction by writing a brief information on how your thesis is organized.
Writing a thesis is about a story
(cont.)
2.0 LITERATURE STUDY/ REVIEW
What is Literature Review?
A summary of relevant previous research on a topic.
“The literature” means the major writings - especially scholarly writings - on the topic.
Literature
Depending on field, "the literature" can include all sorts of things: journal articles, books, published essays, government reports, and so on.
"Review" usually means an overview summarizing major parts and bringing them together to build a picture of what's out there.
Review
Literature review: Content
End your Literature Study by summarized the literatures that are closely related to your project.
It can relate in terms of software, data/domain, architecture, algorithm, environment, hardware, method of data collection, etc.
Provide a literature review of similar research in the field - you can start of by giving a general literature review of similar research, then focus on those that more related to your project.
Find previous works that relate with your project.
Structure of the chapter
2.1 Introduction
2.2 Area of interest
2.3 Domain / Problem Area
2.4 Theory
2.5 System Development Model(s)
2.6 Similar Existing Systems
2.7 Implication of Literature Review
2.8 Conclusion
Introduction
Area of interest
Domain / Problem Area
theory
System Development Model(s)
OR�
Similar Existing Systems
Implication of Literature Review
Literature review: Content(cont.)
Paper title | Author(s) | Years | Proceeding/ | Describe | To cite |
| | | Journals | how the | |
| | | | paper relate | |
| | | | to your | |
| | | | project | |
| | | | | |
| | | | | |
Literature review: Content(cont.)
Author
| Mobile Application | M-Learning with integrating by Cloud Computing
| M-Learning without integrating by Cloud Computing
|
M-Learning | |||
Velev (2014) | / | / |
|
Rao (2010) | / | / |
|
Guo and Lu (2014) | / | / |
|
Liu (2015) | / | / |
|
Wang et al (2014) | / | / |
|
Sarrab and Elbasir (2013) | / | / |
|
Butoi,Tomai,and Mocean (2013) | / | / |
|
Stanton and Ophoff ( 2013) | / |
| / |
Mehdipour and Zerehkafi ( 2013) | / |
| / |
Jagušt (2011) | / |
| / |
An example of citing / quoting processes to avoid plagiarism
..............Intrusion can be classified into 2, that are insider and outsider. Insider is an authorized user whereas outsider is an unauthorized user.
3 ways to cite:
References: Mitnick, K (2008). Intrusion – an explanation. Volume I, Journal of Computer Security. ISBN : xxxxxx. http://abc.com.
References
In-Text Citation Principles
Citing Works With the Same Author and Date
Reference
Reference Examples
Journal article
Jerrentrup, A., Mueller, T., Glowalla, U., Herder, M., Henrichs, N., Neubauer, A., & Schaefer, J. R. (2018). Teaching medicine with the help of “Dr. House.” PLoS ONE, 13(3), Article e0193972. https://doi.org/10.1371/journal.pone.0193972
Reference Examples
Magazine articles.
Reference Examples
Newspaper article
Carey, B. (2019, March 22). Can we get better at forgetting? The New York Times. https://www.nytimes.com/2019/03/22/health/memory-forgetting-psychology.html
Harlan, C. (2013, April 2). North Korea vows to restart shuttered nuclear reactor that can make bomb-grade plutonium. The Washington Post, A1, A4.
Stobbe, M. (2020, January 8). Cancer death rate in U.S. sees largest one-year drop ever. Chicago Tribune.
Reference Examples
Book
Jackson, L. M. (2019). The psychology of prejudice: From attitudes to social action (2nd ed.). American Psychological Association. https://doi.org/10.1037/0000168-000
Sapolsky, R. M. (2017). Behave: The biology of humans at our best and worst. Penguin Books.
Svendsen, S., & Løber, L. (2020). The big picture/Academic writing: The one-hour guide (3rd digital ed.). Hans Reitzel Forlag. https://thebigpicture-academicwriting.digi.hansreitzel.dk/
Reference Examples
Blog Post
Ouellette, J. (2019, November 15). Physicists capture first footage of quantum knots unraveling in superfluid. Ars Technica. https://arstechnica.com/science/2019/11/study-you-can-tie-a-quantum-knot-in-a-superfluid-but-it-will-soon-untie-itself/
Reference Examples
Conference Proceeding
//Conference proceedings published in a journal
Duckworth, A. L., Quirk, A., Gallop, R., Hoyle, R. H., Kelly, D. R., & Matthews, M. D. (2019). Cognitive and noncognitive predictors of success. Proceedings of the National Academy of Sciences, USA, 116(47), 23499–23504. https://doi.org/10.1073/pnas.1910510116
//Conference proceedings published as a whole book
Kushilevitz, E., & Malkin, T. (Eds.). (2016). Lecture notes in computer science: Vol. 9562. Theory of cryptography. Springer. https://doi.org/10.1007/978-3-662-49096-9
//Conference proceedings published as a book chapter
Bedenel, A.-L., Jourdan, L., & Biernacki, C. (2019). Probability estimation by an adapted genetic algorithm in web insurance. In R. Battiti, M. Brunato, I. Kotsireas, & P. Pardalos (Eds.), Lecture notes in computer science: Vol. 11353. Learning and intelligent optimization (pp. 225–240). Springer. https://doi.org/10.1007/978-3-030-05348-2_21
Reference Examples
Conference Presentation
Evans, A. C., Jr., Garbarino, J., Bocanegra, E., Kinscherff, R. T., & Márquez-Greene, N. (2019, August 8–11). Gun violence: An event on the power of community [Conference presentation]. APA 2019 Convention, Chicago, IL, United States. https://convention.apa.org/2019-video
Reference Examples
Published Dissertation or Thesis
Kabir, J. M. (2016). Factors influencing customer satisfaction at a fast food hamburger chain: The relationship between customer satisfaction and customer loyalty (Publication No. 10169573) [Doctoral dissertation, Wilmington University]. ProQuest Dissertations & Theses Global.
Zambrano-Vazquez, L. (2016). The interaction of state and trait worry on response monitoring in those with worry and obsessive-compulsive symptoms [Doctoral dissertation, University of Arizona]. UA Campus Repository. https://repository.arizona.edu/handle/10150/620615
Methodology: Content
can divided into several sub-sections
provide a description of the technique or method you proposed (better to use diagrams)
What is Methodology
A software development methodology or system development methodology in software engineering is a framework that is used to structure, plan, and control the process of developing an information system
A wide variety of such frameworks have evolved over the years, each with its own recognized strengths and weaknesses.
One system development methodology is not necessarily suitable for use by all projects.
page 03
Example of
Software development methodology
page 04
Waterfall development methodology
Rapid application development methodology
Agile development methodology
Spiral development methodology
Prototype Methodology
User Centred Design Methodology
Detailed Research Methodology
EXAMPLE 4 1: 1
Detailed Research Methodology
Phase | Activities | Techniques | Deliverables |
Planning |
|
|
|
PHASE 1
Detailed Research Methodology
Phase | Activities | Techniques | Deliverables |
Analysis |
|
|
|
PHASE 2
Detailed Research Methodology
Phase | Activities | Techniques | Deliverables |
Development |
|
|
|
PHASE 3
Detailed Research Methodology
Phase | Activities | Techniques | Deliverables |
Coding |
|
|
|
Testing |
|
| Deliverables:
|
PHASE 4
PHASE 5
Detailed Research Methodology
Jamaliah Taslim
50
Figure 4: Overview of Research Methodology and Approach
Prob. Identification
Req. Gathering
Req. Analysis
Design
Develop
Tool: MS Project
Tool: Rational Rose
objects and their
interactions.
Construct
database.
Tool: Rational Rose,
Oracle Database 10g Workspace Manager
Tool: PHP, Apache (web server), Oracle 10g (database server), Macromedia MX (workspace)
Deliverables:
Deliverables:
Deliverables:
System requirements & requirements model
Deliverables:
Deliverables:
Prototype System
Data Collection and Requirement Gathering
Prototype development to demonstrate the concept of research study
Title: A Development of Oracle 10g Workspace
EXAMPLE 1: 1
Detailed Research Methodology
- Project Planning,
EXAMPLE 3 1: 1
Detailed Research Methodology
Phase | Activities | Deliverable | Objectives to be achieved |
Project Planning | -Conducting a preliminary investigation by interviewing the staff of Non-Resident Management Unit -Identifying the problems, objectives, significance -Conducting a literature review analysis regarding the project - Plan on the procedure to gain requirements -Plan the techniques for both requirements elicitation and prioritization that will be used on the projects -Plan the final outcomes of the projects | -Description of the actual problems faces by UPNR -A full statement of the research objectives ,research significance and research scope of this project -list of compatible methods, procedures and techniques to be used | Not applicable |
PHASE 1
Detailed Research Methodology
Phase | Activities | Deliverable | Objectives to be achieved |
Requirements Elicitation | -Conducting a full interview with The Head of Non Resident unit -Conducting an interview with the student representative of Non-Resident unit (JPNR) -Conducting a document analysis by analyzing the appropriate documents involved in conducting student’s events | -Knowledge on the actual process and data used for application processes | To identify the requirements of the Non-Resident’s Activity Management system by using suitable techniques for requirements elicitation |
PHASE 2
Detailed Research Methodology
Phase | Activities | Deliverable | Objectives to be achieved |
Requirement Analysis And Prioritization | -analyzing the business process -prioritize the requirements using MoScoW -develop a Software Requirement Specification(SRS) | -Business flow model -Activity Diagram -Use case Diagram -Use Case Description -System Sequence Diagram -SRS | To prioritize the requirement using MoSCoW prioritization technique for Non Resident Activity Management System |
PHASE 3 and PHASE 4
Detailed Research Methodology
Phase | Activities | Deliverable | Objectives to be achieved |
Verification | -develop a prototype -conduct a prototype testing | -System prototype | To verify the prioritized requirements for the Non-Resident’s Activity Management System |
PHASE 5
Important part in methodology for CSP650
Design and development
Thank you