Software Dev Student Notes
Software Dev Student Notes
2. PROJECT PRESENTATION
Students are required to present project progress to the supervisor by WEEK ELEVEN (4).
They must get consent and approval from the project Supervisor for the final presentation.
Students are to complete Presentation Approval Form (appendix O). The form will then be
approved and submitted to the Project Coordinator by the Project Supervisor.
5. PROJECT REQUIREMENT
Development Tool:
Any appropriate development tool is acceptable EXCEPT for obsolete development tool such
as Visual Basic (VB). The students MUST clearly state the development tools to be used in
the project proposal.
Simulation Software:
For research/prototype project, students may use a simulation software to model a real
phenomenon to observe an operation without actually performing that operation in real network
environment. Therefore, students MUST clearly state the simulation software to be used in the
project proposal. For example: NS-2, Opnet IT Guru, Riverbed Modeler. Students are NOT
ALLOWED to use just only Network Monitoring tools (for example, PRTG, Wireshark) in
designing their experiment. However, A combination of Simulation software and network
monitoring tools are allowed to design their project experiments.
6. PLAGIARISM
Plagiarism is the attempt to fulfill an academic requirement by using the ideas, words or work
of another person and representing them as one’s own. Academic conventions dictate that
students must acknowledge the source phrases and ideas that are not their own. Many ideas
and phrases are so familiar that they have become the common property of all; these obviously
require no documentation. However, the use of ideas or phrases [or entire works] that are
clearly original with another author requires that the appropriate credit be given to the original
author.
A student shall not plagiarize any ideas, writing, data or invention belonging to another person.
For the purpose of this rule, plagiarism includes:
1.2.3 ACKNOWLEDGEMENT
This sub-section is not compulsory but most reports convey appreciation to those who
have been involved in the study (See Appendix E).
Example:
Reid S. Monaghan. (2010). Booze and the Bible – Walking in the Wisdom of God.
Retrieved March 18, 2012, from
http://www.powerofchange.org/blog/month/january-2010.
Computer Program:
Toon Boom Animate Pro [Computer Software] (2012 – 2014). Montreal, Canada:
Toon Boom Animation Inc.
Conference Proceedings
Asmidar Abu Bakar, Roslan Ismail, J.Jais, J.A. Manan, (2010). Forming Trust in
Mobile Ad Hoc Network. Proceedings from CMC '2009: INTERNATIONAL
CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING.
Kunming: China.
Article in Journal Paginated by Volume
Journals that are paginated by volume begin with page one in issue one, and
continue numbering issue two where issue one ended, etc.
Journals paginated by issue begin with page one every issue; therefore, the issue
number gets indicated in parentheses after the volume. The parentheses and issue
number are not italicized or underlined.
1.4 MARGINS
The text should have the following margins:
Top: 2.0 cm
Right: 2.0 cm
Left: 4.0 cm
Bottom: 2.0 cm
Additional guidelines need to be followed:
- All tables and figures must be placed within the specified margins.
- The last paragraph of the page should contain at least two sentences. If it does
not, the paragraph should begin on the next page.
1.6 SUB-TOPICS
No specific arrangement is required for the numbering of sub-topics but, whatever
arrangement is adopted, it must be consistent.
When using endnotes and footnotes, insert a number formatted in superscript following
almost any punctuation mark. Endnote and footnote numbers should not follow dashes
( — ), and if they appear in a sentence in parentheses, the endnote and footnote numbers
should be inserted within the parentheses.
For example:
Scientists examined—over several years1—the fossilized remains of the wooly-wooly
yak.2 (These have now been transferred to the Chauan Museum.3)
For example:
1
While the method of examination for the wooly-wooly yak provides important
insights to this research, this document does not focus on this particular species.
1.8 TABLES
Tables are printed within the body of the text at the centre of the frame and labeled
accordingly to the chapter in which they appear. Thus, for example, tables in Chapter
3 are numbered sequentially: Table 3.1, Table 3.2, etc. The table title is placed single
space above the table itself and follows the format below:
Table 3.1: Title
Sample table
Alice’s Bit 0 1 1 0 1 0 0 1
Alice’s Basis + + x + x x x +
Alice Polarization
Bob’s Basis + x x x + x + +
Bob’s Measurement
Public Discussion
key 0 1 0 1
If the table contains a citation, the source of the reference should be placed below the
table.
1.9 FIGURES
Figures, like tables are printed within the body of the text at the centre of the frame and
labeled according to the chapter in which they appear. Thus, for example, figures in
Chapter 3 are numbered sequentially: Figure 3.1, Figure 3.2, etc.
Figures, unlike text or tables, contain graphs, illustrations or photographs and the labels
are placed single space at the bottom of the figure rather than at the top.
Sample figure
64-bit 64-bit
Initial Permuted
64 K1 56
Round 1 Permuted Left circular
64 56
K2
56
Round 2 Permuted Left circular
K16 48
32-bit Swap
64
Inverse Initial
64-bit
Figure 2.1: General Depiction of DES Encryption Algorithm [3]
1400
Final Bit Length (bits) 1200 1146
1000
1003
800 702
600 590
521 Atiqah's
400 420 Simulato
200 r
127
98
0
1000 3000 5000 7000
Initital Bit Length (bits)
Figure 4.1:
Final Key Length Benchmarking on BB84 Protocol’s Simulator for No Attack
If the figure contains a citation, the source of the reference should be placed at the
bottom, after the label.