psm presentation & submission briefing · pdf file · 2014-12-18chapter 5: (s)...
TRANSCRIPT
![Page 1: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/1.jpg)
PROJECT SARJANA MUDA (Undergraduate Final Year Project)
SCR/SCJ/SCV/SCD/SCB
PSM Presentation &
Submission Briefing
By : Dr. Siti Hajar Othman
Session : 20142015-1
CCNA Teaching Lab, N28
11 December 2014 (Thursday)
![Page 2: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/2.jpg)
Today’s Briefing Agenda
A) PSM Presentation - i) Schedule
- ii) Report Draft
- ii) What to include in Your Presentation
- iii) Proposal/ Final Report Submission
B) PSM Evaluation Scheme
C) What to do After Presentation
D) PSM 2 – Final Thesis Submission
E) PSM 2 – Further Study Opportunity by
TDA
![Page 3: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/3.jpg)
![Page 4: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/4.jpg)
Refer PSM
Handbook
![Page 5: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/5.jpg)
A) PSM PRESENTATION
![Page 6: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/6.jpg)
Presentation Schedule
Schedule for Project Presentation for all
courses (SCJ/SCV/SCR/SCD/SCB)
Will be published through e-Learning,
PSM Board or emailed by PSM 1 or 2
department coordinator
![Page 7: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/7.jpg)
![Page 8: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/8.jpg)
FC PSM Committe 2014
![Page 9: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/9.jpg)
Presentation Time Duration
PSM 1
(20 minutes)
Oral: 15 minutes
Q&A: 5 minutes
PSM 2
(30 minutes)
Oral: 15 minutes
Q&A & Demo:
15 minutes
or
Oral + Demo:
20 minutes
Q&A: 10 minutes- Reserves time for a Question and
Answer (Q&A) session is tremendously
IMPORTANT
- Prepare your slide accordingly to the
times given. Don’t exceed as it will
![Page 10: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/10.jpg)
PSM 2 DEMO
![Page 11: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/11.jpg)
Tips and Advice
Limit the use of text in your slides.
Include more figures, pictures, charts, etc.
Present your work to the audience, not the wall
Dress well
Speak clearly. Do not mumbling.
Control the time. If you presented your slides too long
and missed the Q&A session, you won’t get mark for that.
So practice beforehand.
Make sure there is no spelling error in your slides
Do not forget to thank the audience for listening
And the most important thing is, arrive early for your
presentation and know your presentation place.
![Page 12: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/12.jpg)
PSM 1 Submission Place:
(as set by) PSM 1 Coordinator
Time: (as set by) PSM 1 Coordinator
Perdana Student (SCSR):
18 Dec (12 -1pm)
UNSRI Student on
23 Dec (3 - 4pm)
DATE FOR REPORT SUBMISSION
for presentation
PSM 2 Submission Place:
(as set by) PSM 1 Coordinator
Time: (as set by) PSM 1 Coordinator
15 Dec 2014
!!! IMPORTANT (always alert with new info from PSM 1/2 Coordinator)
![Page 13: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/13.jpg)
PSM 1
Perdana:
21-23 Dec 2014
UNSRI:
8 Jan 2015
(Thur)
PRESENTATION DATE**
PSM 2
On Study Week
23 Dec 2015
(Tuesday)
** Regarding PSM schedule, please always refer to your PSM department/course
coordinator. They in charge for this
![Page 14: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/14.jpg)
![Page 15: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/15.jpg)
Front Cover Report PSM 1 & PSM 2
(for Presentation Submission)
Undergraduate Final Year Project 1
Proposal Report
PROJECT TITLE
STUDENT
FAKULTI KOMPUTERAN
UNIVERSITI TEKNOLOGI MALAYSIA
SEMESTER/SESI
Supervisor :
Examiner 1:
Examiner 2:
Undergraduate Final Year Project 2
Final Report
PROJECT TITLE
STUDENT
FAKULTI KOMPUTERAN
UNIVERSITI TEKNOLOGI MALAYSIA
SEMESTER/SESI
Supervisor :
Examiner 1:
Examiner 2:
PSM 1 PSM 2
![Page 16: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/16.jpg)
SUBMISSION FOR PRESENTATION
PSM 1
3 copies of Project Proposal
Report
Two for Examiners
One for Supervisor
1 copy of Project Proposal Report
Submission Form - (PSM.CI.05)
1 copy of PSM1 Evaluation Form -
(PSM.BI.01) for Supervisor
2 copies of PSM1 Evaluation Form
-(PSM.BI.01) for Examiners
1 copy of Chairperson Comment
Form – (PSM.CI.06)
1 copy of PSM Log Book –
(PSM.CU.01) for Supervisor
PSM 2
3 copies of Project Final Report
Two for Examiners
One for Supervisor
1 copy of Report Submission
Form - (PSM.CII.05)
1 copy of PSM2 Evaluation Form -
(PSM.AII.03) for Supervisor
2 copies of PSM2 Evaluation Form
-(PSM.AII.03) (for each examiner)
1 copy of Chairperson Comment
Form - (PSM.CII.06)
1 copy of the PSM Log Book
(PSM.CU.01) (for supervisor)
![Page 17: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/17.jpg)
THESIS copy 1
(SUPERVISOR)
a) 1 PSM Evaluation
Form
b) 1 Student Log Book
WHAT TO SUBMIT ?
THESIS copy 2
(Examiner 1)
a) 1 PSM Evaluation
Form
b) 1 Chairperson
Comment Form
THESIS copy 3
(Examiner 2)
a) 1 PSM Evaluation
Form
For PSM 1 Coordinator during submission:1) 1 copy of the Report Review and Approval Form (PSM.AI.02)
2) 1 copy of the Project Proposal Report Submission Form (PSM.CI.05)
Supervisor : Dr. A [√]
Examiner 1: Dr. B
Examiner 2: Dr. C
Supervisor : Dr. A
Examiner 1: Dr. B [√]
Examiner 2: Dr. C
Supervisor : Dr. A
Examiner 1: Dr. B
Examiner 2: Dr. C [√]
For PSM 2 Coordinator during submission:1) 1 copy of Report Review and Approval Form (PSM.AII.02)
2) 1 copy of Report Submission Form (PSM.CII.05)
![Page 18: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/18.jpg)
Correct Format
2.5 cm
4 cm
![Page 19: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/19.jpg)
Abstract
2.5 cm
Abstract
4 line
spacing
![Page 20: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/20.jpg)
Writing Style
Font: Times New Roman size 12
Spacing: 1.5
New paragraph start: 1.27 cm or 0.5 inch
Print your draft/proposal by using Laser printer or any printer with a same quality
For Binding
◦ Ring bind with Frontpage using PINK colour paper
Undergraduate Final Year Project 2
Final Report
PROJECT TITLE
STUDENT
FAKULTI KOMPUTERAN
UNIVERSITI TEKNOLOGI MALAYSIA
SEMESTER/SESI
Supervisor :
Examiner 1:
Examiner 2:
![Page 21: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/21.jpg)
Gaya penulisan
Nama jadual/rajah/lampiran bermula dengan
Huruf Besar sama ada pada teks atau tajuk
◦ Contoh Jadual 2.1, Rajah 3.2
◦ Nombor sebelum titik perpuluhan adalah
menunjukkan bab
◦ Nombor selepas titik perpuluhan adalah jujukan
nombor bermula dari 1 bagi setiap bab.
Nama jadual ditempatkan di atas jadual
Nama rajah ditempatkan di bawah rajah
![Page 22: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/22.jpg)
Bind Thesis Structure Muka kosong
Borang pengesahan Status Tesis (tiada m/s)
Surat mengenai status klasifikasi Tesis (tiada m/s) - optional
Pengakuan Penyelia (tiada m/s)
Pengakuan kerjasama – optional (tiada m/s)
Muka tajuk (tiada m/s tetapi dikira m/s roman)
Pengakuan keaslian dan sulit (m/s roman)
Dedikasi – optional (m/s roman sambung)
Abstract (English) (m/s roman sambung - (i,ii,iii,iv,v,vi…)
Abstrak (Bahasa Melayu) (m/s roman sambung)
Isi Kandungan (m/s roman sambung)
Senarai jadual (m/s roman sambung)
Senarai rajah (m/s roman sambung)
Senarai simbol/singkatan/notasi/terminologi (m/s roman sambung)
Senarai lampiran (jika ada m/s roman sambung)
Teks (m/s arabic)
Rujukan (m/s arabic sambung)
Lampiran (m/s arabic sambung)
![Page 23: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/23.jpg)
CHAPTER 1: Introduction
CHAPTER 2: Literature Review
CHAPTER 3: Methodology
CHAPTER 4:
(S) PSM 1 - Proposed System Design / PSM 2 - System Development
(R) PSM 1 - Experimental Setup / PSM 2 - Experimental Result
CHAPTER 5:
(S) PSM 1 - Conclusion / PSM 2 - System Testing & Discussion
(R) PSM 1 - Conclusion / PSM 2 - Result/ Testing & Discussion
CHAPTER 6:
(S) PSM 1 - not applicable / PSM 2 - Conclusion
(R) PSM 1 - not applicable / PSM 2 - Conclusion
REFERENCES
APPENDIXES
* (S) - System development-based project
* (R) - Research-based project
Report Draft:
Thesis Content Structure
![Page 24: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/24.jpg)
What to include in your Presentation:
Powerpoint Slide
1. Introduction
Title of the project
Student Name
Supervisor Name
![Page 25: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/25.jpg)
2. Structure of the presentation
Presentation Slide
![Page 26: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/26.jpg)
3. Problem statements that cover
main points in your Chapter 1
The problem statement
The aim of the project
The objectives to achieve
The scope of the project
The importance of your project
Presentation Slide
![Page 27: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/27.jpg)
4. Literature Review
Tell the audience what have you done in
order to come out with better system
specifications
Literature review on the problem domain
Literature review on the existing
methods/systems
Literature review on the techniques that
you proposed to develop the system
Presentation Slide
![Page 28: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/28.jpg)
5. Collecting/Gathering user
requirements
Tell the audience if you have visited
organizations, conducted interviews, etc.
to gather the user requirements of your
proposed system
Presentation Slide
![Page 29: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/29.jpg)
6. Research Methodology
Describe your research methodology
Mention how each step in the chosen
research methodology is applied in your
research, not describing the phases as in
the text books.
Present summary of your research plan.
What you have done in PSM 1 and what
you are planning to do in your PSM 2
Presentation Slide
![Page 30: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/30.jpg)
7. Hardware and Software
Requirements / Research Techniques
Briefly discuss hardware and software that
are required in your system development or
your research
Summarize the basic requirements such as
PC and the operating system but focus on
the important hardware and software that
make your system differs than the existing
(system)
Presentation Slide
![Page 31: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/31.jpg)
8. Initial Design (PSM 1) Discuss everything you have achieved/designed so
far, which might include:
System requirements that you have identified
(based on literature review, existing system
investigation, and user requirements)
System design
Flow chart of the system processes/work flow
Use case diagram
Sequential diagram
Early interface design
Database design
Presentation Slide
![Page 32: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/32.jpg)
8. Detailed Design (PSM 2) Discuss everything you have achieved/designed so
far, which might include:
System requirements that you have identified
(based on literature review, existing system
investigation, and user requirements)
System design
Flow chart of the system processes/work flow
Use case diagram
Sequential diagram
Real interface design
Database design
Presentation Slide
![Page 33: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/33.jpg)
9. Future work (Gantt Chart) (PSM 1)
Outline your plan for PSM 2
Presentation Slide
![Page 34: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/34.jpg)
9. Future work (PSM 2)
Continuation and suggestion of your project
Presentation Slide
![Page 35: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/35.jpg)
What to Include in Your
Presentation …
10.Conclusion
Summarize what you have discussed in the
presentation
Again, mention why your project is
important
For PSM 2 – What you have achieved
based on the objectives as mentioned in
Chapter 1
![Page 36: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/36.jpg)
B) PSM EVALUATION
![Page 37: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/37.jpg)
What we evaluate ??
For PSM 1, there are 6 criteria:
1) Supervision
2) Progress Report Phase 1
3) Progress Report Phase 2
4) Final Report
5) System Design (System development
based project) or Problem
Formulation and Research Design
(Research based project)
6) Presentation
![Page 38: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/38.jpg)
What we evaluate ??
For PSM2, there are 7 criteria:
1) Supervision
2) Progress Report
3) Demo 1
4) Demo 2
5) Final Report (System Development-
based project / Research-based
project)
6) System or Research Output
7) Presentation
![Page 39: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/39.jpg)
Marks for PSM
Supervisor : +-60%
Panel of Examiner (Two examiners): +-40%
At least minimum 6 times meeting
◦ Common practice student meeting with their
supervisor once every 2 weeks
Fulfilled meeting frequency
![Page 40: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/40.jpg)
Make sure - use the updated form !!!
![Page 41: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/41.jpg)
![Page 42: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/42.jpg)
![Page 43: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/43.jpg)
PSM Log Book
![Page 44: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/44.jpg)
Course Element in PSM Projecte.g.: Network & Security (SCSR)
System-based
(Field: Network)
a) Online system – Payroll system, shopping online, MPJBT payment
system or etc. (manage to show process complexity of the system –
has clear modules, users and need to embed with some network or
security element onto it such as:
a. Has system integration (at least connect to server and cannot
show local host)
b. Must have client server (during demo can show server process
and clients process)
c. Intranet /internet (subsidiary)
b) Project concentrate on certain devices, client server is not
compulsory, but local host is still acceptable such as fingerprint, RFID
–reader-writer, mobile apps, biometric, barcode reader). Mr. Zahari
has some of these equipment.
![Page 45: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/45.jpg)
c) If system use SMS (need to use SDK, emulator can be used during
development but during presentation student is advised to use real
device)
d) Voice recognition (need to use SDK) with the system
e) Mobile apps (Android OS, iPhone - Apple) – there is web server
element, e.g.: put in Google play and make it public (sharing
calendar) and not only standalone (calendar)
(Field: Security)a) Anything to do with the security of an automated system (security
ATM machine, security on mobile phone, RFID reader)
b) Has Access Control List (ACL), password
c) Confidentiality, Integrity, Authentication concepts
d) Cryptography, Steganography,
e) Web defacement, Malware, Network package
Course Element in PSM Project
![Page 46: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/46.jpg)
Research 1) Must have analysis experiment
Course Element in PSM Project
![Page 47: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/47.jpg)
C) WHAT TO DO AFTER
PRESENTATION
![Page 48: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/48.jpg)
After correction for PSM 1
a) Student submits to the PSM 1 Coordinator:
ONE copy of Report Correction and
Resubmission Form – (PSM.CI.07)
Collects the certified PSM Log Book –
(PSM.CU.01) from a supervisor and continues use the
log for reporting the PSM 2’s progress.
by 29 Dec 2014 (for Perdana)
by 12 Jan 2014 (for UNSRI)
![Page 49: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/49.jpg)
After correction for PSM 2
a) Student submits to the PSM 2 Coordinator:
ONE copy of Report Correction and
Resubmission Form – (PSM.CII.07)
By 1 January 2015
Next slide FINAL THESIS SUBMISSION
![Page 50: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/50.jpg)
D) PSM 2 – FINAL THESIS
SUBMISSION
![Page 51: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/51.jpg)
a) Submission to the Academic
Office:
1) ONE Hardbound Thesis
2) ONE copy of CD
b) Submission to the
Department Coordinator
1) ONE Hardbound Thesis
2) ONE copy of CD
c) Submission to the Supervisor
1) ONE Hardbound Thesis
2) ONE copy of CD
d) Student copy (Optional)
1) ONE Hardbound Thesis
2) ONE copy of CD
PSM 2 FINAL SUBMISSION
(4 Thesis, 4 CDs)
![Page 52: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/52.jpg)
THESIS BINDING
![Page 53: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/53.jpg)
PSM GRADE RELEASE for senate
meetingPSM 1
a) Grade from Supervisor – Examiners
b) ONE copy of Report Correction and Resubmission
Form – (PSM.CI.07) for PSM 1 Coordinator
PSM 2
a) Grade from Supervisor – Examiners
b) ONE copy of Report Correction and Resubmission
Form – (PSM.CII.07) for PSM 2 Coordinator
c) Thesis Hard Bind to Academic, Faculty, Coordinator
d) CD Burn consist of FYP_Template
If not Grade receive TS (Tak Selesai) !!!!
![Page 54: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/54.jpg)
FYP_One Page synopsis- University Requirement (Compulsory)
- Burn in CD for thesis submission
![Page 55: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/55.jpg)
Final year project competition
ICT Innovation and Exhibition (IDEAS 2014)
![Page 56: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/56.jpg)
IDEAS 2014 NOMINATION GUIDELINES:
Nominations can be made by the supervisor, but if a student wants to
nominate their own projects, nominations must be made through their
supervisor.
There are two (2) main categories for this competition: i) System
development-based and 2) Research-based project.
The selected projects will also be chosen from projects that come from
different domains: (Security & Networking, Information System,
Bioinformatics, Software Engineering and Graphics & Multimedia).
The degree of completeness of the project for the nomination should be
between 80% - 100% complete.
Projects nominated must have innovative features such as oriented
Emerging Software Technology, Human Computer Interaction, Mobile
Functionality, Software Hardware Interaction, Intelligent, Cloud, New
Media, Recognition, Positioning; Community Interaction.. These features are
subject to the discretion of the supervisor to select it.
The project has commercial value.
Winning Price: Certificate / Money / Gifts and etc
![Page 57: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/57.jpg)
You can speak well if your tongue
can deliver the message of your
heart.
All the best to all of you…
![Page 58: PSM Presentation & Submission Briefing · PDF file · 2014-12-18CHAPTER 5: (S) PSM 1 ... Use case diagram ... (ACL), password c) Confidentiality, Integrity, Authentication concepts](https://reader033.vdocuments.net/reader033/viewer/2022051722/5aa4b3c37f8b9a1d728c3588/html5/thumbnails/58.jpg)
E) SPECIAL SESSION FOR PSM 2 FURTHER STUDY OPPORTUNITY
BY FC TDA
Bachelor
Degree
Master
PhD
Post-
Doctoral