Technical Report Format (MID SEMESTER 2021)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

(A typical Specimen of Cover Page & Title Page)

TITLE OF PROJECT
Capstone Project Report
MID SEMESTER EVALUATION
Submitted by:

(<University Roll Number>)NAME OF THE STUDENT


(<University Roll Number>)NAME OF THE STUDENT
(<University Roll Number>)NAME OF THE STUDENT
(<University Roll Number>)NAME OF THE STUDENT

BE Third Year, CoE/CoSE


CPG No: _____

Under the Mentorship of


Name of Faculty Mentor I
Designation
Name of Faculty Mentor II (if any)
Designation

Computer Science and Engineering Department


Thapar Institute of Engineering and Technology, Patiala
Month 2021
ABSTRACT

Abstract goes here…

ii
DECLARATION

We hereby declare that the design principles and working prototype model of the project entitled
<Title of Project> is an authentic record of our own work carried out in the Computer Science
and Engineering Department, TIET, Patiala, under the guidance of <Mentor Name> and <Co-
Mentor Name> during 6th semester (2020).

Date:

Roll No. Name Signature


101305070 ABC ----
101305071 DEF ----
101305072 GHI ----

Counter Signed By:

Faculty Mentor: Co-Mentor( if any):

Dr. _________________________ Dr. _________________________

Designation Designation

CSED, CSED,

TIET, Patiala TIET, Patiala

iii
ACKNOWLEDGEMENT

We would like to express our thanks to our mentor(s) <Mentor Name> and <Co-Mentor Name>.
He/She has been of great help in our venture, and an indispensable resource of technical
knowledge. He/She is truly an amazing mentor to have.

We are also thankful to <Name of the Department Head>, Head, Computer Science and
Engineering Department, entire faculty and staff of Computer Science and Engineering
Department, and also our friends who devoted their valuable time and helped us in all possible
ways towards successful completion of this project. We thank all those who have contributed
either directly or indirectly towards this project.

Lastly, we would also like to thank our families for their unyielding love and encouragement.
They always wanted the best for us and we admire their determination and sacrifice.

Date:

Roll No. Name Signature


101305070 ABC ----
101305071 DEF ----
101305072 GHI ----

iv
TABLE OF CONTENTS

ABSTRACT………………………………………………………………………………….i
DECLARATION……………………………………………………………………………ii
ACKNOWLEDGEMENT………………………………………………………………....iii
LIST OF FIGURES………………………………………………………………………...iv
LIST OF TABLES…………………………………………………………………………..v
LIST OF ABBREVIATIONS……………………………………………………………...vi

CH APTER………………………………………………………………………………Page No.
1. Introduction 1
1.1 Project Overview (3-4 pages)
1.2 Need Analysis (1 page- mentioning significance of this work)
1.3 Research Gaps (Identify and explain at least five research gaps with references)
1.4 Problem Definition and Scope
1.5 Assumptions and Constraints
1.6 Standards
1.7 Approved Objectives
1.8 Methodology
1.9 Project Outcomes and Deliverables
1.10 Novelty of Work
2. Requirement Analysis
2.1 Literature Survey
2.1.1 Theory Associated With Problem Area
2.1.2 Existing Systems and Solutions
2.1.3 Research Findings for Existing Literature
2.1.4 Problem Identified
2.1.5 Survey of Tools and Technologies Used
2.2 Software Requirement Specification
2.2.1 Introduction
2.2.1.1 Purpose
2.2.1.2 Intended Audience and Reading Suggestions
2.2.1.3 Project Scope
2.2.2 Overall Description
2.2.2.1 Product Perspective
2.2.2.2 Product Features
2.2.3 External Interface Requirements
2.2.3.1 User Interfaces

v
2.2.3.2 Hardware Interfaces
2.2.3.3 Software Interfaces
2.2.4 Other Non-functional Requirements
2.2.4.1 Performance Requirements
2.2.4.2 Safety Requirements
2.2.4.3 Security Requirements
2.3 Cost Analysis
2.4 Risk Analysis
3. Methodology Adopted
3.1 Investigative Techniques (Justify the selected investigative technique for your project,
2-3 pages)
3.2 Proposed Solution (2-3 pages)
3.3 Work Breakdown Structure (along with discussion on workable modules/products)
3.4 Tools and Technology
4. Design Specifications (Sub-sections may vary according to the applicability of diagrams
for student projects)
4.1 System Architecture (Eg: Block Diagram / MVC/ Tier architecture whichever
suits the project)
4.2 Design Level Diagrams
4.3 User Interface Diagrams
4.4 Snapshots of Working Prototype (along with step by step discussion of the
working prototype)
5. Conclusions and Future Scope
5.1 Work Accomplished (Discussion w.r.t. the approved objectives)
5.2 Conclusions
5.3 Environmental (/ Economic/ Social) Benefits
5.4 Future Work Plan
APPENDIX A: References
APPENDIX B: Plagiarism Report

*Note: Diagrams should have a detailed explanation. Do refer figure/table numbers in


the running text also.

vi
LIST OF TABLES

Table No. Caption Page No.


Table 1 Table 1 caption goes here.. 1
Table 2 Table 2 caption goes here.. --

vii
LIST OF FIGURES

Figure No. Caption Page No.


Figure 1 Figure 1 caption goes here.. 1
Figure 2 Figure 2 caption goes here.. --

viii
LIST OF ABBREVIATIONS

ABBR1 Abbreviation 1
ABBR2 Abbreviation 2

ix
INTRODUCTION

1.1 Project Overview


Project Overview goes here…

1.2 Need Analysis


Need Analysis go here…

TABLE 1: Caption of Table 1


Sample Table 1 Sample Table 1 Sample Table 1
Sample Table 1 Sample Table 1 Sample Table 1

FIGURE 1: Caption of Figure 1

1
2.1.3 Sample Table for Literature Survey
S. Roll Name Paper Title Tools/ Findings Citation
No. Number Technology
1 Team Akash Paper Title 1
2 member Paper Title 2
3 1 Paper Title 3
4 Paper Title 4
5 Paper Title 5
6 Paper Title 6
7 Team Sidharth Paper Title 1
8 member Paper Title 2
2

3.1 Investigative Techniques


(Sample Investigative Techniques)
S. Investigative Projects Investigative Techniques Investigative Projects
No. Techniques Description Examples
1 Descriptive An investigation in which Projects based on
scientific questions are designing completely new
investigated and observations of system models, concepts,
phenomenon are recorded and algorithms etc.
catalogued.
2 Comparative Investigations where observations Comparison Based
are made that compare two Projects (Algorithm based,
objects or phenomenon. System based etc.)
3 Experimental An organized investigation that Machine Learning, Deep
includes a control group and is Learning or Artificial
designed to test the hypothesis, Intelligence based Projects
includes independent and etc.
dependent variables

1.5 ASSUMPTIONS AND CONSTRAINTS


(SAMPLE ASSUMPTIONS)
S. No. Sample Assumptions
1 Let us assume that this is a distributed airline management system and it is used in
the following application:
 A request for booking/cancellation of a flight from any source to any
destination, giving connected flights in case no direct flight between the
 specified Source-Destination pair exist.
 Calculation of high fliers (most frequent fliers) and calculating appropriate
reward points for these fliers.
Assuming both the transactions are single transactions, we have designed a

2
distributed database that is geographically dispersed at four cities Delhi, Mumbai,
Chennai, and Kolkata as shown in fig. below.
2 It is assumed that alumni data will be made available for the project in some phase of
its completion. Until the test data will be used for providing the demo for the
presentations. It is assumed that the user is familiar with an internet browser and also
familiar with handling the keyboard and mouse.
Since the application is a web based application there is a need for the internet
browser. It will be assumed that the users will possess decent internet connectivity.

3 A number of factors that may affect the requirements specified in the SRS include:
 The workability of the System modules such as those dealing with process
migration with the scheduling policies provided by the Libra Scheduler is
assumed.
 A basic module of job accounting and payment considerations will be
provided, as they are not the focus of the scheduler.
 Users are assumed to have a fair estimate of job execution times, so that
the decision to accept or reject a job is facilitated.
4 One assumption about the product is that it will always be used on mobile phones that
have enough performance. If the phone does not have enough hardware resources
available for the application, for example the users might have allocated them with
other applications, there may be scenarios where the application does not work as
intended or even at all.
Another assumption is that the GPS components in all phones work in the same way.
If the phones have different interfaces to the GPS, the application need to be
specifically adjusted to each interface and that would mean the integration with the
GPS would have different requirements than what is stated in this specification.

And so on…..

3
REFERENCES

[1] T. Anderson, L. Peterson, S. Shenker, J. Turner. “Overcoming the Internet impasse


through virtualization.” IEEE Computer, vol. 38(4), pp. 34-41, Jan. 26, 2005.

[2] [citing online websites]


M. Duncan. (Author(s)) “Engineering Concepts on Ice.” (Website Name) Internet:
www.iceengg.edu/staff.html (Website URL), Oct. 25, 2000 (Date website updated or
published) [Nov. 29, 2003 (date you last accessed the website)].

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy