psm presentation & submission briefing · pdf file · 2014-12-18chapter 5: (s)...

58
PROJECT SARJANA MUDA (Undergraduate Final Year Project) SCR/SCJ/SCV/SCD/SCB PSM Presentation & Submission Briefing By : Dr. Siti Hajar Othman Session : 20142015-1 CCNA Teaching Lab, N28 11 December 2014 (Thursday)

Upload: vandang

Post on 11-Mar-2018

218 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PROJECT SARJANA MUDA (Undergraduate Final Year Project)

SCR/SCJ/SCV/SCD/SCB

PSM Presentation &

Submission Briefing

By : Dr. Siti Hajar Othman

Session : 20142015-1

CCNA Teaching Lab, N28

11 December 2014 (Thursday)

Page 2: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Today’s Briefing Agenda

A) PSM Presentation - i) Schedule

- ii) Report Draft

- ii) What to include in Your Presentation

- iii) Proposal/ Final Report Submission

B) PSM Evaluation Scheme

C) What to do After Presentation

D) PSM 2 – Final Thesis Submission

E) PSM 2 – Further Study Opportunity by

TDA

Page 3: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts
Page 4: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Refer PSM

Handbook

Page 5: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

A) PSM PRESENTATION

Page 6: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Presentation Schedule

Schedule for Project Presentation for all

courses (SCJ/SCV/SCR/SCD/SCB)

Will be published through e-Learning,

PSM Board or emailed by PSM 1 or 2

department coordinator

Page 7: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts
Page 8: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

FC PSM Committe 2014

Page 9: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Presentation Time Duration

PSM 1

(20 minutes)

Oral: 15 minutes

Q&A: 5 minutes

PSM 2

(30 minutes)

Oral: 15 minutes

Q&A & Demo:

15 minutes

or

Oral + Demo:

20 minutes

Q&A: 10 minutes- Reserves time for a Question and

Answer (Q&A) session is tremendously

IMPORTANT

- Prepare your slide accordingly to the

times given. Don’t exceed as it will

Page 10: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PSM 2 DEMO

Page 11: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Tips and Advice

Limit the use of text in your slides.

Include more figures, pictures, charts, etc.

Present your work to the audience, not the wall

Dress well

Speak clearly. Do not mumbling.

Control the time. If you presented your slides too long

and missed the Q&A session, you won’t get mark for that.

So practice beforehand.

Make sure there is no spelling error in your slides

Do not forget to thank the audience for listening

And the most important thing is, arrive early for your

presentation and know your presentation place.

Page 12: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PSM 1 Submission Place:

(as set by) PSM 1 Coordinator

Time: (as set by) PSM 1 Coordinator

Perdana Student (SCSR):

18 Dec (12 -1pm)

UNSRI Student on

23 Dec (3 - 4pm)

DATE FOR REPORT SUBMISSION

for presentation

PSM 2 Submission Place:

(as set by) PSM 1 Coordinator

Time: (as set by) PSM 1 Coordinator

15 Dec 2014

!!! IMPORTANT (always alert with new info from PSM 1/2 Coordinator)

Page 13: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PSM 1

Perdana:

21-23 Dec 2014

UNSRI:

8 Jan 2015

(Thur)

PRESENTATION DATE**

PSM 2

On Study Week

23 Dec 2015

(Tuesday)

** Regarding PSM schedule, please always refer to your PSM department/course

coordinator. They in charge for this

Page 14: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts
Page 15: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Front Cover Report PSM 1 & PSM 2

(for Presentation Submission)

Undergraduate Final Year Project 1

Proposal Report

PROJECT TITLE

STUDENT

FAKULTI KOMPUTERAN

UNIVERSITI TEKNOLOGI MALAYSIA

SEMESTER/SESI

Supervisor :

Examiner 1:

Examiner 2:

Undergraduate Final Year Project 2

Final Report

PROJECT TITLE

STUDENT

FAKULTI KOMPUTERAN

UNIVERSITI TEKNOLOGI MALAYSIA

SEMESTER/SESI

Supervisor :

Examiner 1:

Examiner 2:

PSM 1 PSM 2

Page 16: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

SUBMISSION FOR PRESENTATION

PSM 1

3 copies of Project Proposal

Report

Two for Examiners

One for Supervisor

1 copy of Project Proposal Report

Submission Form - (PSM.CI.05)

1 copy of PSM1 Evaluation Form -

(PSM.BI.01) for Supervisor

2 copies of PSM1 Evaluation Form

-(PSM.BI.01) for Examiners

1 copy of Chairperson Comment

Form – (PSM.CI.06)

1 copy of PSM Log Book –

(PSM.CU.01) for Supervisor

PSM 2

3 copies of Project Final Report

Two for Examiners

One for Supervisor

1 copy of Report Submission

Form - (PSM.CII.05)

1 copy of PSM2 Evaluation Form -

(PSM.AII.03) for Supervisor

2 copies of PSM2 Evaluation Form

-(PSM.AII.03) (for each examiner)

1 copy of Chairperson Comment

Form - (PSM.CII.06)

1 copy of the PSM Log Book

(PSM.CU.01) (for supervisor)

Page 17: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

THESIS copy 1

(SUPERVISOR)

a) 1 PSM Evaluation

Form

b) 1 Student Log Book

WHAT TO SUBMIT ?

THESIS copy 2

(Examiner 1)

a) 1 PSM Evaluation

Form

b) 1 Chairperson

Comment Form

THESIS copy 3

(Examiner 2)

a) 1 PSM Evaluation

Form

For PSM 1 Coordinator during submission:1) 1 copy of the Report Review and Approval Form (PSM.AI.02)

2) 1 copy of the Project Proposal Report Submission Form (PSM.CI.05)

Supervisor : Dr. A [√]

Examiner 1: Dr. B

Examiner 2: Dr. C

Supervisor : Dr. A

Examiner 1: Dr. B [√]

Examiner 2: Dr. C

Supervisor : Dr. A

Examiner 1: Dr. B

Examiner 2: Dr. C [√]

For PSM 2 Coordinator during submission:1) 1 copy of Report Review and Approval Form (PSM.AII.02)

2) 1 copy of Report Submission Form (PSM.CII.05)

Page 18: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Correct Format

2.5 cm

4 cm

Page 19: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Abstract

2.5 cm

Abstract

4 line

spacing

Page 20: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Writing Style

Font: Times New Roman size 12

Spacing: 1.5

New paragraph start: 1.27 cm or 0.5 inch

Print your draft/proposal by using Laser printer or any printer with a same quality

For Binding

◦ Ring bind with Frontpage using PINK colour paper

Undergraduate Final Year Project 2

Final Report

PROJECT TITLE

STUDENT

FAKULTI KOMPUTERAN

UNIVERSITI TEKNOLOGI MALAYSIA

SEMESTER/SESI

Supervisor :

Examiner 1:

Examiner 2:

Page 21: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Gaya penulisan

Nama jadual/rajah/lampiran bermula dengan

Huruf Besar sama ada pada teks atau tajuk

◦ Contoh Jadual 2.1, Rajah 3.2

◦ Nombor sebelum titik perpuluhan adalah

menunjukkan bab

◦ Nombor selepas titik perpuluhan adalah jujukan

nombor bermula dari 1 bagi setiap bab.

Nama jadual ditempatkan di atas jadual

Nama rajah ditempatkan di bawah rajah

Page 22: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Bind Thesis Structure Muka kosong

Borang pengesahan Status Tesis (tiada m/s)

Surat mengenai status klasifikasi Tesis (tiada m/s) - optional

Pengakuan Penyelia (tiada m/s)

Pengakuan kerjasama – optional (tiada m/s)

Muka tajuk (tiada m/s tetapi dikira m/s roman)

Pengakuan keaslian dan sulit (m/s roman)

Dedikasi – optional (m/s roman sambung)

Abstract (English) (m/s roman sambung - (i,ii,iii,iv,v,vi…)

Abstrak (Bahasa Melayu) (m/s roman sambung)

Isi Kandungan (m/s roman sambung)

Senarai jadual (m/s roman sambung)

Senarai rajah (m/s roman sambung)

Senarai simbol/singkatan/notasi/terminologi (m/s roman sambung)

Senarai lampiran (jika ada m/s roman sambung)

Teks (m/s arabic)

Rujukan (m/s arabic sambung)

Lampiran (m/s arabic sambung)

Page 23: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

CHAPTER 1: Introduction

CHAPTER 2: Literature Review

CHAPTER 3: Methodology

CHAPTER 4:

(S) PSM 1 - Proposed System Design / PSM 2 - System Development

(R) PSM 1 - Experimental Setup / PSM 2 - Experimental Result

CHAPTER 5:

(S) PSM 1 - Conclusion / PSM 2 - System Testing & Discussion

(R) PSM 1 - Conclusion / PSM 2 - Result/ Testing & Discussion

CHAPTER 6:

(S) PSM 1 - not applicable / PSM 2 - Conclusion

(R) PSM 1 - not applicable / PSM 2 - Conclusion

REFERENCES

APPENDIXES

* (S) - System development-based project

* (R) - Research-based project

Report Draft:

Thesis Content Structure

Page 24: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

What to include in your Presentation:

Powerpoint Slide

1. Introduction

Title of the project

Student Name

Supervisor Name

Page 25: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

2. Structure of the presentation

Presentation Slide

Page 26: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

3. Problem statements that cover

main points in your Chapter 1

The problem statement

The aim of the project

The objectives to achieve

The scope of the project

The importance of your project

Presentation Slide

Page 27: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

4. Literature Review

Tell the audience what have you done in

order to come out with better system

specifications

Literature review on the problem domain

Literature review on the existing

methods/systems

Literature review on the techniques that

you proposed to develop the system

Presentation Slide

Page 28: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

5. Collecting/Gathering user

requirements

Tell the audience if you have visited

organizations, conducted interviews, etc.

to gather the user requirements of your

proposed system

Presentation Slide

Page 29: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

6. Research Methodology

Describe your research methodology

Mention how each step in the chosen

research methodology is applied in your

research, not describing the phases as in

the text books.

Present summary of your research plan.

What you have done in PSM 1 and what

you are planning to do in your PSM 2

Presentation Slide

Page 30: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

7. Hardware and Software

Requirements / Research Techniques

Briefly discuss hardware and software that

are required in your system development or

your research

Summarize the basic requirements such as

PC and the operating system but focus on

the important hardware and software that

make your system differs than the existing

(system)

Presentation Slide

Page 31: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

8. Initial Design (PSM 1) Discuss everything you have achieved/designed so

far, which might include:

System requirements that you have identified

(based on literature review, existing system

investigation, and user requirements)

System design

Flow chart of the system processes/work flow

Use case diagram

Sequential diagram

Early interface design

Database design

Presentation Slide

Page 32: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

8. Detailed Design (PSM 2) Discuss everything you have achieved/designed so

far, which might include:

System requirements that you have identified

(based on literature review, existing system

investigation, and user requirements)

System design

Flow chart of the system processes/work flow

Use case diagram

Sequential diagram

Real interface design

Database design

Presentation Slide

Page 33: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

9. Future work (Gantt Chart) (PSM 1)

Outline your plan for PSM 2

Presentation Slide

Page 34: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

9. Future work (PSM 2)

Continuation and suggestion of your project

Presentation Slide

Page 35: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

What to Include in Your

Presentation …

10.Conclusion

Summarize what you have discussed in the

presentation

Again, mention why your project is

important

For PSM 2 – What you have achieved

based on the objectives as mentioned in

Chapter 1

Page 36: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

B) PSM EVALUATION

Page 37: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

What we evaluate ??

For PSM 1, there are 6 criteria:

1) Supervision

2) Progress Report Phase 1

3) Progress Report Phase 2

4) Final Report

5) System Design (System development

based project) or Problem

Formulation and Research Design

(Research based project)

6) Presentation

Page 38: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

What we evaluate ??

For PSM2, there are 7 criteria:

1) Supervision

2) Progress Report

3) Demo 1

4) Demo 2

5) Final Report (System Development-

based project / Research-based

project)

6) System or Research Output

7) Presentation

Page 39: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Marks for PSM

Supervisor : +-60%

Panel of Examiner (Two examiners): +-40%

At least minimum 6 times meeting

◦ Common practice student meeting with their

supervisor once every 2 weeks

Fulfilled meeting frequency

Page 40: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Make sure - use the updated form !!!

Page 41: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts
Page 42: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts
Page 43: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PSM Log Book

Page 44: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Course Element in PSM Projecte.g.: Network & Security (SCSR)

System-based

(Field: Network)

a) Online system – Payroll system, shopping online, MPJBT payment

system or etc. (manage to show process complexity of the system –

has clear modules, users and need to embed with some network or

security element onto it such as:

a. Has system integration (at least connect to server and cannot

show local host)

b. Must have client server (during demo can show server process

and clients process)

c. Intranet /internet (subsidiary)

b) Project concentrate on certain devices, client server is not

compulsory, but local host is still acceptable such as fingerprint, RFID

–reader-writer, mobile apps, biometric, barcode reader). Mr. Zahari

has some of these equipment.

Page 45: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

c) If system use SMS (need to use SDK, emulator can be used during

development but during presentation student is advised to use real

device)

d) Voice recognition (need to use SDK) with the system

e) Mobile apps (Android OS, iPhone - Apple) – there is web server

element, e.g.: put in Google play and make it public (sharing

calendar) and not only standalone (calendar)

(Field: Security)a) Anything to do with the security of an automated system (security

ATM machine, security on mobile phone, RFID reader)

b) Has Access Control List (ACL), password

c) Confidentiality, Integrity, Authentication concepts

d) Cryptography, Steganography,

e) Web defacement, Malware, Network package

Course Element in PSM Project

Page 46: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Research 1) Must have analysis experiment

Course Element in PSM Project

Page 47: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

C) WHAT TO DO AFTER

PRESENTATION

Page 48: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

After correction for PSM 1

a) Student submits to the PSM 1 Coordinator:

ONE copy of Report Correction and

Resubmission Form – (PSM.CI.07)

Collects the certified PSM Log Book –

(PSM.CU.01) from a supervisor and continues use the

log for reporting the PSM 2’s progress.

by 29 Dec 2014 (for Perdana)

by 12 Jan 2014 (for UNSRI)

Page 49: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

After correction for PSM 2

a) Student submits to the PSM 2 Coordinator:

ONE copy of Report Correction and

Resubmission Form – (PSM.CII.07)

By 1 January 2015

Next slide FINAL THESIS SUBMISSION

Page 50: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

D) PSM 2 – FINAL THESIS

SUBMISSION

Page 51: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

a) Submission to the Academic

Office:

1) ONE Hardbound Thesis

2) ONE copy of CD

b) Submission to the

Department Coordinator

1) ONE Hardbound Thesis

2) ONE copy of CD

c) Submission to the Supervisor

1) ONE Hardbound Thesis

2) ONE copy of CD

d) Student copy (Optional)

1) ONE Hardbound Thesis

2) ONE copy of CD

PSM 2 FINAL SUBMISSION

(4 Thesis, 4 CDs)

Page 52: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

THESIS BINDING

Page 53: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

PSM GRADE RELEASE for senate

meetingPSM 1

a) Grade from Supervisor – Examiners

b) ONE copy of Report Correction and Resubmission

Form – (PSM.CI.07) for PSM 1 Coordinator

PSM 2

a) Grade from Supervisor – Examiners

b) ONE copy of Report Correction and Resubmission

Form – (PSM.CII.07) for PSM 2 Coordinator

c) Thesis Hard Bind to Academic, Faculty, Coordinator

d) CD Burn consist of FYP_Template

If not Grade receive TS (Tak Selesai) !!!!

Page 54: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

FYP_One Page synopsis- University Requirement (Compulsory)

- Burn in CD for thesis submission

Page 55: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

Final year project competition

ICT Innovation and Exhibition (IDEAS 2014)

Page 56: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

IDEAS 2014 NOMINATION GUIDELINES:

Nominations can be made by the supervisor, but if a student wants to

nominate their own projects, nominations must be made through their

supervisor.

There are two (2) main categories for this competition: i) System

development-based and 2) Research-based project.

The selected projects will also be chosen from projects that come from

different domains: (Security & Networking, Information System,

Bioinformatics, Software Engineering and Graphics & Multimedia).

The degree of completeness of the project for the nomination should be

between 80% - 100% complete.

Projects nominated must have innovative features such as oriented

Emerging Software Technology, Human Computer Interaction, Mobile

Functionality, Software Hardware Interaction, Intelligent, Cloud, New

Media, Recognition, Positioning; Community Interaction.. These features are

subject to the discretion of the supervisor to select it.

The project has commercial value.

Winning Price: Certificate / Money / Gifts and etc

Page 57: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

You can speak well if your tongue

can deliver the message of your

heart.

All the best to all of you…

Page 58: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts

E) SPECIAL SESSION FOR PSM 2 FURTHER STUDY OPPORTUNITY

BY FC TDA

Bachelor

Degree

Master

PhD

Post-

Doctoral