Project Report Format AIT 2019
Project Report Format AIT 2019
After completion of the project work, every student will submit a project report which should
contain the following:
REFERENCES
NOTE: Project report must not contain any description of the following except only a relevant
and short mention – technology or platform or OS or tools used or any language details. It must
be more focused on project work carried out and its implementation details without including any
source code.
Details of CD:
CD of the project work is required to be pasted on the back cover of the project report in clear
packet, which should include the following folders and contents:
1. Presentation (should include a PPT about project in not more than 40-50 slides)
2. Documentation (should include a word file of the project report)
3. Source Code (full source code of the project with libraries used)
4. Program (final running copy of the project executable)
5. Support (any third party tools used or runtime environment setups that are required to run
the project)
6. Help (user manual on how to run the project)
NOTE: CD must be checked for any harmful viruses before submission. SourceCode and
Program folders can be combined into single folder Project if it’s a web project etc.
Annexure-1 (A typical Specimen of Title Page)
TITLE OF PROJECT
<Font Size 24><BOLD><Centralized>
A Project Work
<Font Size 14><BOLD><Centralized>
IN
NAME_OF_SPECIALIZED_BRANCH
<Font Size 14><BOLD><Centralized>
Submitted by:
<Font Size 14><BOLD><Centralized>
SUPERVISORS NAME
<Font Size 14>><BOLD><Centralized>
Annexure-2
DECLARATION
<Font size 16><Bold><Centralized>
I, ‘Candidate Names’, student of ‘Bachelor of Engineering in Branch Name’,
session: 2018 - 2019, Apex Institute of Technology, Chandigarh University, Punjab,
hereby declare that the work presented in this Project Work entitled ‘Topic Name’
is the outcome of our own bona fide work and is correct to the best of our knowledge
and this work has been undertaken taking care of Engineering Ethics. It contains no
material previously published or written by another person nor material which has
been accepted for the award of any other degree or diploma of the university or other
institute of higher learning, except where due acknowledgment has been made in the
text.
<Font size 14><Regular><Justified>
(Candidate Name)
Candidate UID: xxxxxxxxxxx
<Font size 14><Bold><Right Alligned>
Date:
Place:
<Font size 12><Bold><Left alligneed>
ii
Annexure-3
CERTIFICATE
<Font Size 16><Bold><Centralized>
This is to certify that the work embodies in this dissertation entitled ‘Topic Name’
being submitted by Candidate’s Name Roll Nos. – 000000000000 for partial
fulfillment of the requirement for the award of Bachelor of Engineering in Branch
Name discipline to Apex Institute of Technology, Chandigarh University, Punjab
during the academic year 2018 - 2019 is a record of bonafide piece of work,
undertaken by him/her the supervision of the undersigned.
Forwarded by
<Font Size 14><Bold><Centralized>
EXTERNAL EXAMINER
<Font Size 14><Bold><Centralized>
iii
Annexure-4 (A typical specimen of table of contents)
Table of Contents
Title Page i
Declaration of the Student ii
Certificate of the Guide iii
Abstract iv
Acknowledgement v
List of Figures vi
List of Tables (optional) vii
Timeline / Gantt Chart viii
1. INTRODUCTION* 1
1.1 Problem Definition 1
1.2 Project Overview/Specifications* (page-1 and 3) 2
1.3 Hardware Specification 3
1.4 Software Specification 4
1.3.1 4
1.3.2
…
2. LITERATURE SURVEY 5
2.1 Existing System 5
2.2 Proposed System 6
2.3 Feasibility Study* (page-4) 7
3. SYSTEM ANALYSIS & DESIGN
3.1 Requirement Specification* (page-2) 9
3.2 Flowcharts / DFDs / ERDs 10
3.3 Design and Test Steps / Criteria 12
3.3 Algorithms and Pseudo Code 16
3.3.1 18
3.3.2 19
3.4 Testing Process 22
… 27
4. RESULTS / OUTPUTS 40
5. CONCLUSIONS / RECOMMENDATIONS 47
6. REFERENCES 49
7. APPENDICES 50
List of Tables
Table Title page
vii
List of Figures
Figure Title page
3.1 Joint in a steel moment resisting frame (a) geometry, and (b) in-plane 11 lateral
distortional shear force on it. Results of analytical study (a)
3.2 Idealised trilinear model used in this study of or RC Frame 11 buildings with masonry
infilled walls; (b) Mean DRF spectra of Uttarkashi earthquake strong motions
records derived for bare and masonry infilled RC frame buildings characteristics
with k=2, =2,and 0.2. The spectra correspond to ductility values of
1,2,3,5,8,10,12 and 15. Dark and dashed lines correspond to bare and infilled
frame buildings respectively.
viii
List of Symbols
Symbol Description
Area of steel reinforcement bars on tension face
Ast Area Of steel reinforcement bars on compression face Area of two
Asc legs of the closed stirrups
Asv Breadth of rectangular beam section
bd Effective depth of rectangular beam section
d’ Effective cover on compression face
fc,ave Average compressive stress in concrete
fsc Stress in steel on the compression side
fy Characteristic strength of steel reinforcement bars Spacing of the
Sv stirrups
xu Depth of neutral axis from compression face
1.1.1
2 LITERATURE REVIEW
Kim et al. [25] proposed VUDDY, which is a scalable approach for detection of vulnerable
code clones. This approach can detect vulnerabilities efficiently and accurately in large
software. They able to achieve extreme level of scalability by using function-level granularity
and a length-filtering techniques that decreases number of signature comparisons. Most
interesting feature of this technique is that it can even detect variants of known vulnerabilities.
To achieve extreme level of scalability, they used function-level granularity and length-filtering
techniques to reduce number of signature comparisons.
2.1 Literature Review Summary
From the literature review, it is observed that studies highlight the need of efficient and scalable
approach for detecting code clones having software vulnerability. The existing techniques are
not able to detect all types of vulnerable code clones. Different approaches suffer from high
false negative rate and not scalable to large software systems due to high time complexity. So
firstly, there is a need........................................ Second same subject systems should be used to
compare the approaches which detect
4
RESEARCH OBJECTIVES
The proposed research is aimed to carry out work leading to the development of an approach
for vulnerable code clone detection. The proposed aim will be achieved by dividing the work
into following objectives:
The following methodology will be followed to achieve the objectives defined for proposed
research work:
This chapter will provide introduction to the concepts which are necessary to understand the
proposed system.
CHAPTER 4: METHODOLOGY
This chapter will cover the technical details of the proposed approach.
6
CHAPTER 5: EXPERIMENTAL SETUP
This chapter will provide information about the subject system and tools used for evaluation
of proposed method.
The major finding of the work will be presented in this chapter. Also directions for extending
the current study will be discussed.
PUBLICATIONS
REFERENCES
REFERENCES
[1] D. Rattan, R. Bhatia, and M. Singh, “Software clone detection: A systematic review,”
Information and Software Technology, vol. 55, no. 7, pp. 1165–1199, Jul. 2013.
[2] J. F. Islam, M. Mondal, and C. K. Roy, “Bug Replication in Code Clones: An
Empirical Study,” in 2016 IEEE 23rd International Conference on Software Analysis,
Evolution, and Reengineering (SANER), 2016, pp. 68–78.
[3] M. R. Islam and M. F. Zibran, “A Comparative Study on Vulnerabilities in Categories
of Clones and Non-cloned Code,” in 2016 IEEE 23rd International Conference on
Software Analysis, Evolution, and Reengineering (SANER), 2016, pp. 8–14.
[4] M. R. Islam, M. F. Zibran, and A. Nagpal, “Security Vulnerabilities in Categories of
Clones and Non-Cloned Code: An Empirical Study,” in 2017 ACM/IEEE International
Symposium on Empirical Software Engineering and Measurement (ESEM), 2017, pp.
20–29.
[5] C. K. Roy, M. F. Zibran, and R. Koschke, “The vision of software clone management:
Past, present, and future (Keynote paper),” in 2014 Software Evolution Week - IEEE
Conference on Software Maintenance, Reengineering, and Reverse Engineering
(CSMR-WCRE), 2014, pp. 18–33.
[6] J. Krinke, “A Study of Consistent and Inconsistent Changes to Code Clones,” in 14th
Working Conference on Reverse Engineering (WCRE 2007), 2007, pp. 170–178.
7
[7] D. Chatterji, J. C. Carver, N. A. Kraft, and J. Harder, “Effects of cloned code on
software maintainability: A replicated developer study,” in 2013 20th Working
Conference on Reverse Engineering (WCRE), 2013, pp. 112–121.
[8] D. Rattan, R. Bhatia, and M. Singh, “An Empirical Study of Clone Detection in
MATLAB/ Simulink Models,” International Journal of Information and
Communication Technology.
[9] D. Rattan, R. Bhatia, and M. Singh, “Detecting High Level Similarities in Source Code
and Beyond,” International Journal of Energy, Information and Communications, vol.
6, no. 2, pp. 1–16, 2015.
[10] D. Rattan, R. Bhatia, and M. Singh, “Detection and Analysis of Clones in UML Class
Models,” International Journal of Software Engineering, IJSE, vol. 8, no. 2, pp. 66–
99, 2015.
[11] D. Rattan, R. Bhatia, and M. Singh, “Model clone detection based on tree
comparison,” in 2012 Annual IEEE India Conference (INDICON), 2012, pp. 1041–
1046.
[12] C. K. Roy and J. R. Cordy, “NICAD: Accurate Detection of Near-Miss Intentional
Clones Using Flexible Pretty-Printing and Code Normalization,” in 2008 16th IEEE
International Conference on Program Comprehension, 2008, pp. 172–181.
[13] M. Mondal, C. K. Roy, and K. A. Schneider, “SPCP-Miner: A tool for mining code
clones that are important for refactoring or tracking,” in 2015 IEEE 22nd International
Conference on Software Analysis, Evolution, and Reengineering (SANER), 2015, pp.
484–488.