R ESEARCH P ROBLEM. A problem in simple words is some difficulty experienced by the researcher in a theoretical or practical situation E.g. What is the.

Slides:



Advertisements
Similar presentations
Ch:8 Design Concepts S.W Design should have following quality attribute: Functionality Usability Reliability Performance Supportability (extensibility,
Advertisements

Introductory Lecture. What is Discrete Mathematics? Discrete mathematics is the part of mathematics devoted to the study of discrete (as opposed to continuous)
Find 8 scholarly articles related to your dependent variable and target population. How does the literature theoretically define your dependent variable?
Deanery of Business & Computer Sciences Research Methods Week 1 Collecting, Processing and Analyzing Data.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
M.A.Doman Model for enabling the delivery of computing as a SERVICE.
Science and Engineering Practices
Business process management (BPM) Petra Popovičová.
1.3 Executing Programs. How is Computer Code Transformed into an Executable? Interpreters Compilers Hybrid systems.
Computational Thinking Related Efforts. CS Principles – Big Ideas  Computing is a creative human activity that engenders innovation and promotes exploration.
Cloud computing Tahani aljehani.
Domain Modeling (with Objects). Motivation Programming classes teach – What an object is – How to create objects What is missing – Finding/determining.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
PRESENTATION START.
WEB DESIGN W HAT I S IT ?. W HAT IS W EB D ESIGN It includes graphic design Interface design Interactivity Using Standardized Programming Language Search.
Mantova 18/10/2002 "A Roadmap to New Product Development" Supporting Innovation Through The NPD Process and the Creation of Spin-off Companies.
Fundamentals of Information Systems, Sixth Edition
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
CS598CXZ Course Summary ChengXiang Zhai Department of Computer Science University of Illinois, Urbana-Champaign.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
R ESEARCH P ROBLEM. A problem in simple words is some difficulty experienced by the researcher in a theoretical or practical situation E.g. What is the.
Developing the Foundation for the PLAAFP
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
Overview of Computing. Computer Science What is computer science? The systematic study of computing systems and computation. Contains theories for understanding.
©Ian Sommerville 2000 Software Engineering, 6th edition. Slide 1 Component-based development l Building software from reusable components l Objectives.
Team Skill 6: Building the Right System From Use Cases to Implementation (25)
Explanation Facility دكترمحسن كاهاني
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Lecture 9: Chapter 9 Architectural Design
DBSQL 14-1 Copyright © Genetic Computer School 2009 Chapter 14 Microsoft SQL Server.
Master Thesis Defense Jan Fiedler 04/17/98
Experimental Research Methods in Language Learning Chapter 16 Experimental Research Proposals.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
Output Design. Output design  Output can be: Displayed on a screen/VDU/monitor. Printed on paper as hard copy. Sound.
Discrete Structures for Computing
University of Catania Computer Engineering Department 1 Educational tools for complex topics: a case study for Network Based Control Systems Prof. Orazio.
Major objective of this course is: Design and analysis of modern algorithms Different variants Accuracy Efficiency Comparing efficiencies Motivation thinking.
Problem Solving Techniques. Compiler n Is a computer program whose purpose is to take a description of a desired program coded in a programming language.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Course grading Project: 75% Broken into several incremental deliverables Paper appraisal/evaluation/project tool evaluation in earlier May: 25%
2007. Software Engineering Laboratory, School of Computer Science S E Web-Harvest Web-Harvest: Open Source Web Data Extraction tool 이재정 Software Engineering.
Evaluation Proposal Defense Observations and Suggestions Yibeltal Kiflie August 2009.
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Problem Paramount to the success of your effort stated precisely address an important question advance knowledge.
Agents that Reduce Work and Information Overload and Beyond Intelligent Interfaces Presented by Maulik Oza Department of Information and Computer Science.
CS 127 Introduction to Computer Science. What is a computer?  “A machine that stores and manipulates information under the control of a changeable program”
Digital Libraries1 David Rashty. Digital Libraries2 “A library is an arsenal of liberty” Anonymous.
Internet Research – Illustrated, Fourth Edition Unit A.
1 Choosing a Computer Science Research Problem. 2 Choosing a Computer Science Research Problem One of the hardest problems with doing research in any.
The Research Problem and Objectives Lecture 6 1. Organization of this lecture Research Problem & Objectives: Research and Decision/Action Problems Importance.
Artificial Intelligence: Research and Collaborative Possibilities a presentation by: Dr. Ernest L. McDuffie, Assistant Professor Department of Computer.
Oman College of Management and Technology Course – MM Topic 7 Production and Distribution of Multimedia Titles CS/MIS Department.
Of An Expert System.  Introduction  What is AI?  Intelligent in Human & Machine? What is Expert System? How are Expert System used? Elements of ES.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Introduction to Machine Learning, its potential usage in network area,
Business process management (BPM)
AP CSP: What is Big Data?.
Fundamentals of Information Systems, Sixth Edition
Research Problem and Proposal
Organization and Knowledge Management
Object-Oriented Software Engineering Using UML, Patterns, and Java,
Business process management (BPM)
Cloud Computing By P.Mahesh
Discrete Mathematics and Its Applications
MANAGING KNOWLEDGE FOR THE DIGITAL FIRM
Objective of This Course
Software models - Software Architecture Design Patterns
Knowledge Sharing Mechanism in Social Networking for Learning
Presentation transcript:

R ESEARCH P ROBLEM

A problem in simple words is some difficulty experienced by the researcher in a theoretical or practical situation E.g. What is the fastest algorithm for multiplication of two n -digit numbers? choice of a suitable problem is difficult

S OURCES TO A R ESEARCH P ROBLEM Know the field Study of Relevant Literature on the Subject Discussions with persons having rich practical experience in the field of study Daily problems Technological changes

S ELECTING A R ESEARCH P ROBLEM Get from Literature and then replicate the research with modifications – population, geography, method, etc Apply an existing technique to a new domain such as borrowing from engineering Population gravity Model from Physics Gravity Model Address Contradiction and Ambiguity Challenge existing Findings

T HINGS TO KNOW ABOUT R. P ROBLEM Is the problem interesting? Is it new? Will it add to knowledge? Is it feasible? Has anyone else a prior claim to it?

G OOD Q UALITIES OF R ESEARCH P ROBLEM Research statement written clearly Problem stated in grammatically complete sentences. Problem has clearly stated limitations Statement has potential for leading to important results. The statement will lead to the analysis of data. The problem is focused enough to lead to an answer with reasonable effort.

C ONT ’ D Be sure that the topic chosen is neither too vague nor too broad in scope. Define any special terms that must be used in the statement of your problem. Problem has been reviewed by someone else who provided feedback.

C ONDITIONS FOR S UCCESSFUL R ESEARCH P ROBLEM Importance Immediate Application Feasibility or Amenability Availability of Data Availability of Other Facilities e.g. laboratory facilities Experience in the Research Problem

E XAMPLE - M OBILE A PPLICATION - HCI Mobile phones have become an unmissable tool in society’s everyday life. According to the study published by Telefonica (European broadband and telecommunications company) [1], nearly 74% of people with an intellectual disability aged own or use a mobile phone. Additionally the number of touch-enabled smartphone devices has increased considerably in recent years [2], as well as the number of existing applications for operating systems.

C ONT ’ D When developers create a new application, it usually follows the basic rules of user interface design, which sometimes implies an accessibility problem, especially for people with intellectual disabilities, due to some specific designs. An Intellectual disability is a broad concept encompassing various intellectual deficits, i.e. individuals who are mentally challenged [3], have specific learning disabilities or suffer from problems acquired later in life through sustained brain injuries or neurodegenerative diseases like dementia [4].

C ONT ’ D One possible cause of this problem might be due to the functional impairment experienced by the class of disabled mobile phone users. The nature of this problem is inherently complex and results in difficulty grasping the underlying problems, which in turn leads to a lack of understanding among mobile phone designers and developers. What are the difficulties that intellectually challenged people face when using mobile phones? What are the characteristics of a disability- friendly mobile interface?

C ONT ’ D --- H YPOTHESIS One possible approach to the problems disabled mobile phone users experience is to add additional requirements to the development of mobile phones. Method ?? The specific set of requirements needed can be found by involving intellectually challenged users in the design process starting at the requirement stage and ideally throughout the entire development phase as well

A NSWER TO Q UESTIONS The proposed set of requirements is described below: Eliminate non-essential images/buttons/functions: Be critical of the purpose of any image/button/function. Is it just there purely for aesthetic purposes or does it convey a practical one? Components like images, buttons or text boxes must be of a suitable size so that they can be easily seen or pressed, e.g. the keyboard display size. Etc ….

R ESEARCH A REAS IN C OMPUTER S CIENCE Program structure -- it evolves from procedural languages, then object oriented programming. Now program structure is represented as a hybrid mixture of loosely typed languages, open source libraries, and decentralized multithreaded cloud architectures over multi-layer data representations. What are the central patterns underlying the optimality of these new architectures? How are open APIs changing the definition of an application?

C ONT ’ D Virtualization -- Time-sharing operating systems and virtual memory were the first attempts at virtualization. Then it was the virtual machine for software execution (e.g. Java VM, Microsoft CLR). Then the virtual machine architecture that enabled cloud computing. How far can virtualization as an approach to abstraction go?

C ONT ’ D Statistical machine learning -- The use of statistics against large data sets has taken over artificial intelligence. This has been proven in industry as well (Google, collaborative filtering, ad targeting, "big data"). This area of math has also taken over theoretical neuroscience, not to mention computer vision.

C ONT ’ D representation of data at scale -- How do you represent data when there is too much to fit in one database and millions of people are accessing it simultaneously? Many hybrid complex data structures have evolved that include clever caching, layers of servers, NoSQL, sharding, inverted text indexes, and cloud base archives. What ties all these patterns together?

C ONT ’ D Computer security -- Computer security is the central contact point at which the irresistible force of openness meets the immovable object of privacy. Whether this is encryption, security layers, permission models, or system integrity techniques, the future is both open and protected. How to achieve both?

C ONT ’ D Network models -- Networks and the graphical models that underlie them have become profoundly complex. Networks now include social networks, computing node networks, web-page link graphs, network data models, and neural networks. Network structures are unwieldly to analyze, but central to the future of computing.

A SSIGNMENTS Browse three research articles in computer science Identify their research problems Why the researchers say they are problems. What justifications they forwarded What was the contribution of each paper for theory and practice What methods they used to solve their research problems