Describe what is your domain or area of research

Assignment Help Computer Network Security
Reference no: EM13910360

Proposal each item in details :-

1.0 Introduction

-describe what is your domain or area of research, start from general then focus on the area of research.
-describe the significant/important of your research, why you need to solve this problem?

1.1 Research Background

-First, state the research problem, describe the problem, why it is a problem?

-second, describe on how to solve the problem? (there might be different ways of solving the problem, so elaborate all the solving approach), what are the current researches have done to solve the problem? And why it is not solved? What are the disadvantages or drawback of current approaches.

-third, you need to mention what is the approach that you want to use to solve the problem and the techniques that you will use. Why u want to use this approach and the technique? What are the advantages of your approach?

1.2 Problem Statement

-You need to state the problem again

1.3 Research Objectives

-You need to state the research objectives, normally three objectives.

-(1) To investigate/explore/...... (2) To design/develop... (3) To evaluate...
-You need to relate your objectives with the problem, therefore reader can see the link.

1.4 Research Methodology

-describe on the methodology that you employ to accomplish your research. Normally:
-literature review to understand the problem, looking for a better technique or approach.
-proposing your solution with your chosen technique
-evaluation to evaluate your solution such as by developing a system, interview etc.

1.5 Expected Outcomes

-based on your research what will be your expected outcome.

1.6 Conclusion

-state again your problem, problem with current solutions, your solution, your technique, your methodology in accomplishing you research, your expected outcome, and what will be In the next chapter.

LITERATURE REVIEW

2.0 Introduction

- explain on the objective of your chapter, what will be inside your chapter, what analysis will you do etc.

2.1 Your research problem.
-this will explain details on your research problem. Very details.

2.1.1
2.1.2
2.1.3
2.1.4
2.2 The current solutions on solving the research problem. You need to explain what are the current solutions, advantages and disadvantages.
2.2.1
2.2.2
2.2.3
2.2.4...
- You should end your section with a conclusion that the current solution is still not able to solve the research problem and that is why you are proposing your solution.

2.3 What is your solution and the techniques that you will employ to solve the research problem, justification why you want to use this solution, why you want to use the proposed techniques/methods, the advantages of your solution and your techniques/methods, other techniques that might be used with your solution and why you not use it. (2-5 pages)
2.3.1
2.3.2
2.3.3
2.3.4

2.4 Conclusion - explain on the what the chapter two is all about, your problem details, the weaknesses of current approaches, your solutions and justification, and will be in the next chapter. (1-2 paragraphs)
CHAPTER THREE - THE PROPOSED SOLUTION/METHOD/APPROACH
3.0 Introduction - explain on the chapter objectives, what will be inside the chapters. (1-2 paragraphs)
3.1 Overview of your proposed approach/method, the step by step processes, with figure and brief explanation. (2-4 pages)
3.2 THE FIRST PROCESS IN DETAILS (2-4 pages)
3.2.1, 3.2.2, 3.2.3 etc
3.3 THE SECOND PROCESS IN DETAILS (2-4 pages)
3.3.1, 3.3.2, 3.3.3 etc
3.4 THE THIRD PROCESS IN DETAILS (2-4 pages)
3.4.1, 3.4.2, 3.4.3 etc
3.5 THE FOURTH PROCESS IN DETAILS (2-4 pages)
3.5.1, 3.5.2, 3.5.3 etc
3.6 Conclusion - what chapter three all about and what will be in the next chapter. (1 paragraph)

-everything should be in details for an example if you are using GA in your solution then one of the process is you need to model is your solution using GA. What are the steps in GA? How do you model your solution with GA in every steps. What is your fitness function, how will u do the selection, crossover and mutation?

-normally there is a testing or evaluation process, you need to explain details what is your plan to evaluate your solution. If you do simulation, why you choose simulation? what will you simulate? How? How many times will you simulate? What tools do u use to simulate? What are the parameters that you want to measure during the simulations? What is good performance and what is bad performance?

Reference no: EM13910360

Questions Cloud

The probability that it will take an accountant chosen : ACME has 20 accountants. If the time it takes to complete the end of quarter report is normally distributed with a meanof 30 hours and a standard deviation of 5 hours, the probability that it will take an accountant chosen at random lessthan 27 hours..
Compare the differences between mac and h-mac : In a 2-3 page paper, complete the following: Compare the differences between MAC and H-MAC. Explain why using H-MAC is more secure than MAC?
Source code with detailed comments : Description of program (script) Source Code with detailed comments
Review concept of a industry-wide private industrial network : Why is Elemica described as an example of an industry consortia net marketplace? How does it differ from other types of net marketplaces like ChemConnect?
Describe what is your domain or area of research : Describe what is your domain or area of research, start from general then focus on the area of research - describe the significant/important of your research, why you need to solve this problem?
Cybercrime : Topic: CYBERCRIME I. INTRODUCTION a. Financial Theft
Summarize the purpose of the sql language : Summarize the purpose of the SQL language. Compare and contrast writing SQL commandsand the MS Access graphical interface, including the QBE capabilityto build queries. Describe at least two advantages and two disadvantages with each method. Why do y..
What is it infrastructure : What is IT infrastructure and why it has become an important field of study?
Discuss of swaptions relative to current economic enviroment : Discuss the usefulness of swaptions (swap options) relative to the current economic environment. Give three specific examples of how a bank can use this derivative both for risk management and speculation.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss your rationale for choosing the specific firewall

From the first e-Activity, discuss your rationale for choosing the specific firewall in question, and determine the primary way in which a company could incorporate it into an enterprise network in order to enhance security

  Computer communications are typically classified as either

computer communications are typically classified as either client-server or peer-to-peer. identify a distributed

  Describe the secure communication scenarios

Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best..

  Create and submit a security policy

Create and submit a security policy for McBride Financial Services, located in the Virtual Organizations. Develop a policy based on perceived needs associated within the loan department and issues in implementing online loan applications.

  Describe the crypto dilemma

AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore's requirements as stated above. How would a successful candidate respond?

  What are critical points in determining intention of sandra

Explain what MBT and Sandra could have done to protect against controversy arising - what can be determined about whether Sandra intended to make Janet a gift of $1,000,000? What are the critical points in determining intention of Sandra?..

  Difference between a rainbow table and a hash lookup table

Explain the difference between a rainbow table and a hash lookup table in respect to trying to compromise a computer system's password? What is reduction function, what does it do, and what is its purpose?

  Describe methods for determining if user frustration

Describe methods for determining if user frustration is caused by poor system design

  How system with capabilities as its access control mechanism

In general, do capabilities offer more or less protection against Trojan horses than do access control lists? Justify your answer in light of the theoretical equivalence of ACLs and C-Lists.

  What is the value of the symmetric key

In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?

  What category information is collected by the site

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.

  Decrypt the ciphertext message lfdph lvdzl frqtx huhg which

1 decrypt the ciphertext message lfdph lvdzl frqtx huhg which has been encryptedusing the caesar cipher.2 encrypt the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd