0% found this document useful (0 votes)
82 views

Guidelines For Project Report: 7. Conclusion & Recommendations

The document provides guidelines for submitting a project report after completing a project. It specifies that the report should include a cover page, title page, declaration, acknowledgements, abstract, table of contents, detailed project description split into chapters, conclusion, recommendations, appendices, and references. It also provides specifications for formatting the report such as font type and size, margins, line spacing, and page numbering. Appendices include sample templates for a title page and declaration. The guidelines aim to help students structure their report in a consistent manner.

Uploaded by

sonu saurav
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views

Guidelines For Project Report: 7. Conclusion & Recommendations

The document provides guidelines for submitting a project report after completing a project. It specifies that the report should include a cover page, title page, declaration, acknowledgements, abstract, table of contents, detailed project description split into chapters, conclusion, recommendations, appendices, and references. It also provides specifications for formatting the report such as font type and size, margins, line spacing, and page numbering. Appendices include sample templates for a title page and declaration. The guidelines aim to help students structure their report in a consistent manner.

Uploaded by

sonu saurav
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Guidelines for Project Report

After completion of the project work, every student will submit a project report which should
contain the following:

1. Cover Page (as per annexure 1)


2. Title page (as per annexure 1)
3. Declaration by the Student (as per annexure 2)
4. Acknowledgement (The candidate may thank all those who helped in the execution of
the project.)
5. Abstract (It should be in one page and include the purpose of the study; the methodology
used and a summary of the major findings.)
6. Table of Contents (as per annexure 3): Detailed description of the project (This should be
split in various chapters/sections with each chapter/section describing a project activity in
totality). This portion of report should contain all relevant diagrams, tables, flow charts,
software programme, print outs, photographs etc., which are properly labeled.
7. Conclusion & Recommendations
8. Appendices (if any)
 Appendices are provided to give supplementary information, which if included in the
main text may serve as a distraction and cloud the central theme.
 Appendices should be numbered using Arabic numerals, e.g. Appendix 1, Appendix 2.
 Appendices shall carry the title of the work reported and the same title shall be listed in
the Contents page also
9. References (The listing of references should be typed 2 spaces below the heading
“REFERENCES” in alphabetical order in single spacing left – justified. It should be
numbered consecutively (in square [ ] brackets, throughout the text and should be collected
together in the reference list at the end of the report. The references should be numbered in
the order they are used in the text. The name of the author/authors should be immediately
followed by the year and other details). Typical examples of the references are given below:

REFERENCES

[1]. Ariponnammal, S. and Natarajan, S. (1994) ‘Transport Phonomena of SmSel – X Asx’,


Pramana – Journal of Physics Vol.42, No.1, pp.421-425.

In addition, following points should be complied with:-


i) Page numbering
ii) Numbering of appendices, figures and tables and their reference in the text.
iii) For general layout of report, any standard text book layout may be referred.
Report Specifications:

1. Project Report’s Cover Type: PDF-File only


2. Number of Copies: 1 per student
3. Paper Size (orientation): A4 (portrait)
4. Margins: 1” top / bottom / right and 1.5” left
5. Font Type: Times New Roman
6. Font Size: 16 bold for chapter names, 14 bold for headings and 12 for normal text
7. Line Spacing: 1.5 throughout
8. Page Numbering: For introductory pages like Acknowledgment, Declaration, List of
Tables, List of Figures, List of Symbols, List of Abbreviations ---Refer to the relevant
Appendices. For the remaining file--- Bottom center of page in the format – Page 1 of
N

NOTE: Project report must not contain any description of the following except only a relevant
and short mention – technology or platform or OS or tools used or any language details. It must
be more focused on project work carried out and its implementation details without including
any source code.
Annexure-1 (A typical Specimen of Title Page)

TITLE OF PROJECT
<Font Size 24><BOLD><Centralized>
A Project Work
<Font Size 14><BOLD><Centralized>

Submitted in the partial fulfillment for the award of the degree of


<Font Size 14><1.5 line spacing><Italic><Centralized>

BACHELOR OF ENGINEERING
<Font Size 16>><BOLD><Centralized>

IN
NAME_OF_SPECIALIZED_BRANCH
<Font Size 14><BOLD><Centralized>

Submitted by:
<Font Size 14><BOLD><Centralized>

NAME OF THE STUDENT


<Font Size 14>><BOLD><Centralized>

University Roll Number


<Font Size 14><BOLD><Centralized>

Under the Supervision of:


<Font Size 14>><BOLD><Centralized>

SUPERVISORS NAME
<Font Size 14>><BOLD><Centralized>

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


APEX INSTITUE OF TECHNOLOGY
<Font Size 16><BOLD><Centralized>
CHANDIGARH UNIVERSITY, GHARUAN, MOHALI - 140413,
PUNJAB
<Font Size 14><BOLD><Centralized>
MONTH & YEAR
<Font Size 12><BOLD><Centralized>
Annexure-2

DECLARATION
<Font size 16><Bold><Centralized>

I, ‘Candidate Names’, student of ‘Bachelor of Engineering in Branch Name’,


session: , Department of Computer Science and Engineering, Apex
Institute of Technology, Chandigarh University, Punjab, hereby declare that the
work presented in this Project Work entitled ‘Topic Name’ is the outcome of our
own bona fide work and is correct to the best of our knowledge and this work
has been undertaken taking care of Engineering Ethics. It contains no
material previously published or written by another person nor material which has
been accepted for the award of any other degree or diploma of the university
or other institute of higher learning, except where due acknowledgment has been
made in the text.
<Font size 14><Regular><Justified>

(Candidate Name)
Candidate UID: xxxxxxxxxxx
<Font size 14><Bold><Right Alligned>
Date:

Place:
<Font size 12><Bold><Left alligneed>

ii
Annexure-3 (A typical specimen of table of contents)

Table of Contents

Title Page i
Declaration of the Student ii
Abstract iii
Acknowledgement iv
List of Figures v
List of Tables (optional) vi
Timeline / Gantt Chart vii

1. INTRODUCTION* 1
1.1 Problem Definition 1
1.2 Project Overview/Specifications* (page-1 and 3) 2
1.3 Hardware Specification 3
1.4 Software 4
Specification 1.3.1 4
1.3.2

2. LITERATURE SURVEY 5
2.1 Existing System 5
2.2 Proposed System 6
2.3 Feasibility Study* (page-4) 7

3. PROBLEM FORMULATION 9

4. OBJECTIVES 16
5. METHODOLOGY 18
6. CONCLUSIONS AND DISCUSSION 19
7. REFERENCES 22
List of Tables
Table Title page

3.1 Quantities of Materials Required in the Designs with Different 10


Grades of Concrete

vii
List of Figures
Figure Title page

3.1 Joint in a steel moment resisting frame (a) geometry, and (b) in-plane 11
lateral distortional shear force on it. Results of analytical study (a)
3.2 Idealised trilinear model used in this study of or RC Frame 11
buildings with masonry infilled walls; (b) Mean DRF
spectra of Uttarkashi earthquake strong motions records derived
for bare and masonry infilled RC frame buildings
characteristics with k= 2, =2,and 0.2. The spectra
correspond to ductility values of 1,2,3,5,8,10,12 and 15. Dark and
dashed lines correspond to bare and infilled frame buildings
respectively.

viii
List of Symbols
Symbol Description

Ast Area of steel reinforcement bars on tension face


As Area Of steel reinforcement bars on compression face Area of two
c
legs of the closed stirrups
As
Breadth of rectangular beam section
vb
Effective depth of rectangular beam section
d
Effective cover on compression face
d’ Average compressive stress in concrete
fc,ave Stress in steel on the compression side
fsc Characteristic strength of steel reinforcement bars Spacing of the
fy stirrups
S Depth of neutral axis from compression face
v Depth of centroid of the compression block in concrete
x
u Shear strength offered by concrete
x

τ c
ix
1 INTRODUCTION

1.1

1.1.1

2 LITERATURE REVIEW

Kim et al. [25] proposed VUDDY, which is a scalable approach for detection of
vulnerable code clones. This approach can detect vulnerabilities efficiently and
accurately in large software. They able to achieve extreme level of scalability by using
function-level granularity and a length-filtering techniques that decreases number of
signature comparisons. Most interesting feature of this technique is that it can even detect
variants of known vulnerabilities. To achieve extreme level of scalability, they used function-
level granularity and length-filtering techniques to reduce number of signature comparisons.
2.1 Literature Review Summary

Table 2.1: Literature review summary

Year and Match


Intermediate Granularity Types of Type of Evaluation
citation Purpose of study detection Data set
representation Level clone vulnerabilities parameters
technique
2010
3 PROBLEM FORMULATION

During software development, clones can occur in software intentionally or unintentionally.


Developers tend to clone fragments of software during development to save efforts
and expedite the development process. ........................................

From the literature review, it is observed that studies highlight the need of efficient and
scalable approach for detecting code clones having software vulnerability. The existing
techniques are not able to detect all types of vulnerable code clones. Different approaches
suffer from high false negative rate and not scalable to large software systems due to high
time complexity. So firstly, there is a need........................................ Second same subject
systems should be used to compare the approaches which detect
4 RESEARCH OBJECTIVES
The proposed research is aimed to carry out work leading to the development of an approach
for vulnerable code clone detection. The proposed aim will be achieved by dividing the work
into following objectives:

1. To understand and explore various types of software vulnerabilities existing in open


source software.
2. To study and analyse various clone detection techniques that are suitable for
vulnerable code clone discovery.
3. To design and develop the technique for vulnerable code clone detection.
4. To verify and validate the proposed system.
5 METHODOLOGY

The following methodology will be followed to achieve the objectives defined for proposed
research work:

1. Detailed study of software vulnerabilities, their types and impact of code cloning
practice on software vulnerabilities will be done.
2. Installation of clone detection tools and hand on experience on existing approaches of
clone detection applicable for software code clone vulnerability will be done. Relative
pros and cons will be identified.
3. Vulnerability database will be created, which corresponds to the C/C++ open source
projects that have some vulnerabilities according to National Vulnerability Database
(NVD) [36] and Open Sourced Vulnerability Database (OSVDB) [51].
4. Different clone detections techniques will be analysed to figure it out which clone
detection technique is appropriate for particular type of vulnerability.
5. An approach will be developed for vulnerable code clone detection.
6. Various parameters will be identified to evaluate the proposed system.
7. Comparison of new implemented approach with exiting approaches will be done.
6 RESULTS AND DISCUSSION
7 REFERENCES
[1] D. Rattan, R. Bhatia, and M. Singh, “Software clone detection: A systematic review,”
Information and Software Technology, vol. 55, no. 7, pp. 1165–1199, Jul. 2013.
[2] J. F. Islam, M. Mondal, and C. K. Roy, “Bug Replication in Code Clones: An
Empirical Study,” in 2016 IEEE 23rd International Conference on Software
Analysis, Evolution, and Reengineering (SANER), 2016, pp. 68–78.
[3] M. R. Islam and M. F. Zibran, “A Comparative Study on Vulnerabilities in Categories
of Clones and Non-cloned Code,” in 2016 IEEE 23rd International Conference on
Software Analysis, Evolution, and Reengineering (SANER), 2016, pp. 8–14.
[4] M. R. Islam, M. F. Zibran, and A. Nagpal, “Security Vulnerabilities in Categories of
Clones and Non-Cloned Code: An Empirical Study,” in 2017 ACM/IEEE
International Symposium on Empirical Software Engineering and Measurement
(ESEM), 2017, pp. 20–29.
[5] C. K. Roy, M. F. Zibran, and R. Koschke, “The vision of software clone management:
Past, present, and future (Keynote paper),” in 2014 Software Evolution Week - IEEE
Conference on Software Maintenance, Reengineering, and Reverse Engineering
(CSMR-WCRE), 2014, pp. 18–33.
[6] J. Krinke, “A Study of Consistent and Inconsistent Changes to Code Clones,” in
14th Working Conference on Reverse Engineering (WCRE 2007), 2007, pp. 170–
178.
[7] D. Chatterji, J. C. Carver, N. A. Kraft, and J. Harder, “Effects of cloned code on
software maintainability: A replicated developer study,” in 2013 20th Working
Conference on Reverse Engineering (WCRE), 2013, pp. 112–121.
[8] D. Rattan, R. Bhatia, and M. Singh, “An Empirical Study of Clone Detection
in MATLAB/ Simulink Models,” International Journal of Information and
Communication Technology.
[9] D. Rattan, R. Bhatia, and M. Singh, “Detecting High Level Similarities in Source
Code and Beyond,” International Journal of Energy, Information and
Communications, vol. 6, no. 2, pp. 1–16, 2015.
[10] D. Rattan, R. Bhatia, and M. Singh, “Detection and Analysis of Clones in UML Class
Models,” International Journal of Software Engineering, IJSE, vol. 8, no. 2, pp. 66–
99, 2015.
[11] D. Rattan, R. Bhatia, and M. Singh, “Model clone detection based on tree
comparison,” in 2012 Annual IEEE India Conference (INDICON), 2012, pp. 1041–
1046.
[12] C. K. Roy and J. R. Cordy, “NICAD: Accurate Detection of Near-Miss Intentional
Clones Using Flexible Pretty-Printing and Code Normalization,” in 2008 16th
IEEE International Conference on Program Comprehension, 2008, pp. 172–181.
[13] M. Mondal, C. K. Roy, and K. A. Schneider, “SPCP-Miner: A tool for mining code
clones that are important for refactoring or tracking,” in 2015 IEEE 22nd
International Conference on Software Analysis, Evolution, and Reengineering
(SANER), 2015, pp. 484–488.

You might also like