Professional Documents
Culture Documents
Misspellings use a spell-checker Undefined buzz-words and mnemonics I, you, we, they, us, my, our, their
Project Title
Submitted by, Student Name 1,2, Register No(s). Designation/Dept Degree/Branch/Year College Name
College Name
Objective
This is a couple of paragraphs - no more - which summarizes the content of the report. It must be comprehensible to someone who has not read the rest of the report.
Introduction
The scope of the project, setting the scene for the remainder of the report. Give the introduction about your title and area.
Problem Statement
Existing System
Mention how the existing system is implemented in the paper. Mention the disadvantages in the existing system.
Proposed System
Mention your proposed system. Mention the advantages of your proposed system. A chapter describing possible ways in which your work could be continued or developed. Be imaginative but realistic.
System Architecture
Level 1 Data Flow Diagram (Brief about System ) Level 2 Data Flow Diagram (Interrelationship Between the Modules )
Modules
Mention what are the modules you are going to use in your project. Example Module 1 Module 2 Module 3.
Modules 1 Description
System Specifications
Hardware Requirements Specify the hardware requirements to implement your project. Software Requirements Specify the software(with version) to implement your project.
Screenshots
Conclusion
Future Work
Mention the future work (or) related work that can be done in your paper.
References
[1] A. A. Name, and B. B. Name, Book Title, Place: Press, Year. [2] A. Name, and B. Name, "Journal Paper Title", Journal Name, Vol. X, No. X, Year, pp. xxx-xxx. [3] URL Name
Appendix
Data Mining Web Mining Wireless Networks Image Processing Artificial Intelligence and Knowledge Based Systems Bio-Informatics Pervasive Computing Sensor Networks Network Security MANETs Web Services Middleware Technologies
Sample Titles
An Ontology Engineering Approach for Enhancing Learning Objects Enhancing Learning Objects with an Ontology-Based Memory (Base Paper) A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks Rumor Riding: Anonymizing
Sample Titles
Maintaining Colored Trees for Disjoint Multipath Routing Under Node Failures Internet Traffic Behavior Profiling for Network Security Monitoring Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing DECOR: A Method for the Specification
THANK YOU