SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
Guidelines
For The Preparation of Six weeks Industrial Training Report
Version 1.0
Lovely Professional University Jalandhar – Delhi G. T Road (NH-1),
Phagwara, Punjab, 144402, India
2013
1. INTRODUCTION
This document covers the general rules of format and appearance. It is the
student’s responsibility to read and follow the requirements presented here
and to submit documents of the highest quality. The final copies will not be
accepted with corrections, insufficient margins, or if they are of such poor
quality that reproduced and/or microfilmed copies cannot be made.
The final version of the Training Report must be free from typographical,
grammatical and other errors when submitted as Examination Copy. While
this is the responsibility of the student.
2. REPORT
2.1 The arrangement of parts of Training Report
The sequence in which the training material should be arranged and bound
should be as follows:
1) Cover Page
2) Inside Cover Page
3) Candidate/s Declaration
4) Dedication Page (Optional)
5) Objective of Training or Project
6) Acknowledgements
7) Table of Contents
8) List of Tables
9) List of Figures
10) List of Symbols, Abbreviations or Nomenclature (Optional)
11) Enclosures
12) Chapters
Maximum Number of Chapters are recommended to be five (Chapter one is
Introduction, Chapter two is company profile , Chapter three is Identification
of the training /project , Chapter four is Design Details, Implementation and
Testing and Chapter five is Results, Discussion and conclusion).
13) Appendices
14) References
Minimum References must be 10.
The formats in various headings are given below
Title Page See Annexure 1 (Inside cover page same as cover page)
Dedication page (if any) should not exceed one page
Candidate declaration, see Annexure 2
Objective of Training or Project see Annexure 3 (Abstract should not exceed
two pages (about 600 words))
Acknowledgements should not exceed two pages
Table of Contents see Annexure 4
List of Tables see Annexure 5
List of Figures see Annexure 6
Abbreviations see Annexure 7
Notations see Annexure 8
References see Annexure 9
3. GUIDELINES FOR PREPARATION OF TRAINING REPORT
The training manuscript has three basic parts: the preliminary pages, the text
and the reference materials.
3.1 Preliminaries
The preliminary materials consist of the Title Page, Thesis Certificate,
Abstract, Dedication (optional), Acknowledgements, and Table of contents,
List of Tables, List of Figures and other lists.
Preliminary pages are paginated separately from the rest of the text. The title
page is counted, but it is not numbered. Beginning with the page immediately
following the title page, place page numbers in lowercase Roman numerals
centered at the bottom of the preliminary pages. The Roman numerals are
continued up to the first page of the text. Proper Order of Preliminary Pages
is:
a. Title Page
The title of the Training/project report should be as concise as possible. It
must occur consistently in every respect, including punctuation,
capitalization, and hyphenation, on the abstract and approval forms. On the
title page, the identical title must appear in title case with each line centered
on the page. The month in which the Training is submitted, e.g., May,
August, or January is to be printed at the bottom of the page. The title page is
not numbered, but it is counted. Size of the institute logo should be 3cm x 4
cm.
b. Objective of Training or Project
The Objective should provide a succinct, descriptive account of the
training/project including a statement of problem procedure and method,
results and conclusion. It must not include diagrams and should not include
mathematical formulas unless essential. The Objective should be in the range
of 400 to 600 words with 1.5 line spaced. It should adhere to the same style
manual as the thesis manuscript. A lower-case Roman numeral is used on the
abstract page and number of keywords not more than six.
c. Dedication (optional)
The dedication is brief, single-spaced, and centered on the page. No heading
is used. The word "To" customarily begins the dedication.
d. Acknowledgements
This section begins with the title ACKNOWLEDGEMENTS centered in all
capital letters. This page is used to thank those persons who have been
instrumental to the student in completing the degree requirements.
Acknowledgement of grants and special funding received to support the
Training/Project also may be made on this page.
e. Table of Contents
The Table of Contents must include all Chapter headings, Section headings,
Subsection headings, Appendices (optional if any) and References. Entries
are 1.5 lines spaced. The headings of major sections (i.e., Chapters,
Appendices and References) are written in all capital letters. Table of
contents headings must be identical to those in the text. Page numbers must
be bottom centered and each entry must have leader dots, which connect it to
its corresponding page number. The words TABLE OF CONTENTS must
be centered on the page two inches from the top of the first page only.
f. List of Tables (if tables appear in document)
The heading, LIST OF TABLES, appears centered on the page two inches
from the top of the first page only. All table numbers and captions are listed
exactly as they appear in the text.
g. List of Figures (if figures appear in document)
The heading, LIST OF FIGURES, appears centered on the page two inches
from the top of the first page only. All figure numbers and captions are listed
exactly as they appear in the text.
h. Other Lists (nomenclature, definitions, glossary of terms, etc.)
The appropriate title in all capital letters is centered two inches from the top
of the first page only.
3.2 Text
The text must be divided into a logical scheme that is followed consistently
throughout the document. The larger divisions and more important minor
divisions are indicated by suitable, consistent headings. All headings and
subheadings should be presented in the same way in each chapter, in terms of
capitalization, placement on the page and kind of type used. No headers,
giving the titles of chapters or other sections, are allowed at the top of the
pages. Chapter organization as practiced by the discipline should be
followed. Program code may be placed in the Appendix. The
Student/Research Scholar and the academic department are responsible for
the quality and content of the text. Specific requirements for text presentation
are given below.
a. Section and Subsection
The student may use Section headings and Sub-Section headings to subdivide
the chapter/s, but a consistent sequence of section headings as identified in
the style guide selected must be followed. The Student/Research Scholar do
not change the sequence and style of headings from chapter to chapter. Once
the sequence is chosen, it must be followed consistently throughout the
thesis. Footnotes should be in 10 point character with single spaced lines.
b. Pagination
Lower-case Roman numerals are used to number all pages preceding the text.
Although the preliminary paging begins with the title page, no number
appears on the title page. However, it is counted as i, The page immediately
following the title page is numbered with a lower- case Roman numeral ii.
Beginning with the first page of the text, all pages are to be numbered with
Arabic numerals consecutively throughout the thesis document, including the
appendix and the bibliography or list of references. The page numbers must
be positioned at the bottom centered of the page. Page headers or running
heads may not be used in the thesis. All page numbers must be in the same
font and size.
c. Tables and Figures
The term "table" refers to a columnar arrangement of information, often data
sets, organized to save space and convey relationships at a glance. The term
"figure" refers to graphs, drawings, diagrams, charts, maps, or photographs.
All such details should be inserted in the text near where they are first
mentioned. A table or figure may appear on the same page as the text that
refers to it or on a immediate next page. Each figure or table must be
numbered and have a caption. Captions are placed below figures and pictures
and above tables. Captions may be single spaced.
d. Illustrations
Each illustration must be referred to in the text and it must be placed after,
and as near as possible to, the first reference to it in the text. All illustrative
materials in the thesis must be prepared on paper that is the same weight (or
stronger) and use the same font type as elsewhere in the manuscript. If
illustrations are mounted, dry mounting must be used. Illustrations may not
be mounted with rubber cement, staples, mucilage, or photo-mounting
corners. Illustrative material must be drawn or computer-generated in black.
Material may be laser-printed. Color should be used only if it is essential to
the thesis.
e. Photographs
It is recommended that the student use a high quality, high contrast copying
machine to reproduce photographic material for submission in lieu of
photographs. If original photographs are used, they should be printed on
single-weight, fiber-based paper with a matte finishes. All prints must be
processed for nationally established standards for chemical permanence.
Black-and-white prints are preferable. Photograph page number placement
follows the standard pagination requirements.
f. Appendix
The appendix (or a series of appendices) immediately follows the main text.
The appendix includes material that may be helpful to the reader of the thesis
but may be too long for inclusion in the text or footnotes. The title,
APPENDIX, appears only on the first page of the section, in capital letters
centered two inches from the top. Examples of such material include
questionnaires, letters, original data, sample forms, and derivations.
Reference should be made in the text to the inclusion of these materials in the
appendix. Each appendix is a separate subdivision of the text and must begin
on a separate page. Each appendix must be listed in the
e. Table of Contents.
f. Enclosures: enclose the photo copy of certificate provided by
Industy/Institute.
3.3 References
Referencing style may follow IEEE, Harvard, or Chicago styles. For
referencing you may use font size of 11.
4.1 Chapter and Section format
The title of Chapter one shall be Introduction. It shall justify and highlight the
problem poser and define the topic, aim and scope of the work presented in
the thesis. It may also highlight the significant contributions from the
investigation. Use only Arabic Numerals. Chapter Numbering should be
centered on the top of the page with bold.
Example:
CHAPTER 1
INTRODUCTION
Sections
A chapter can be divided into Sections, Sub-sections and Sub-sub-sections so
as to present different concepts separately. Sections and Sub-sections can be
numbered using decimal points, e.g., 2.2 for the second Section in Chapter 2
and 2.3.4 for the fourth Subsection in third Section of Chapter 2. Use only
Arabic Numerals with decimals. Section numbering should be left justified
using large bold print.
Example:
1.1 BACKGROUND
1.2 GSM
Sub Sections
Use only Arabic Numerals with two decimals. Sub section numbering should
be left justified with bold.
Example:
1.1.1 Block Ciphers
1.1.2 Data Encryption Standards
(Required no. of pages: 2-3 Pages)
CHAPTER 2
COMPANY PROFILE
2.1 INTRODUCTION
2.2 …
This shall normally the Chapter 2 and shall present the detail of the work
done in Company.
(Required no. of pages: 2-3 Pages)
CHAPTER 3
IDENTIFICATION OF TRAINING/PROJECT
3.1 INTRODUCTION
3.2 …
This shall normally the Chapter 3 and shall present the identification of the
training/project.
(Required no. of pages: 2-3 Pages)
CHAPTER 4
IMPLEMENTATION DETAIL
4.1 INTRODUCTION
4.2 …
This shall normally the Chapter 3 and shall present the Design Details,
Implementation and Testing.
(Required no. of pages: 15-20 Pages)
CHAPTER 5
RESULTS AND DISCUSSION
5.1 INTRODUCTION
5.2 …
This shall form the penultimate chapter of the Training/Project and shall
include a thorough evaluation of the investigation carried out and bring out
the contributions from the Training. The discussion shall logically lead to
inferences and conclusions as well as scope for possible future work. Table /
Figure Format As far as possible tables and figures should be presented in
portrait style. Small size table and figures (less than half of writing area of a
page) should be incorporated within the text, while larger ones may be
presented in separate pages. Table and figures shall be numbered chapter –
wise. For example, the fourth figure in Chapter 5 will bear the number figure
5.4 or Fig.5.4. Table number and title will be placed above the table while the
figure number and caption will located below the figure and will be centered
left. Reference for Table and Figures reproduced from elsewhere shall be
cited in the last and separate line in the table and figure caption, e.g. [12].
Text in tables may be in font size of 10.
Table 4.6: Cell values and key sequence
Equations
All the equations should be typed in equation editor/LaTeX and should be
properly numbered.
For Example,
(Required no. of pages: 4-7 Pages)
5. PAGE DIMENSIONS AND MARGIN
The Training/Project should be prepared on good quality white paper.
Standard A4 size (210 mm X 297 mm) paper should be used for preparing
the copies. The final Training/Project should have the following page
margins and the same margins should be used throughout a thesis.
Top edge: 1 inch
Left side: 1.25 inch
Bottom edge: 1 inch
Right side: 1.25 inch
6. TYPE-SETTING, TEXT PROCESSING AND PRINTING
The text shall be printed employing Laserjet and the text having been
processed using a standard text processor. The standard font shall be Times
New Roman of 12 pts with 1.5 line spacing. The text must be 1.5 lines spaced
and printed on only one side of each page
7. BINDING
Spiral Binding
8. FRONT COVERS
The front cover shall contain the following details:
• Full title of thesis in 20 point’s font size properly centered and positioned at
the top.
• Full name of the candidate in 14 point’s font size properly centered at the
middle of the page.
• A 3 x 4 cms size of the Institute emblem followed by the name of the
Institute and the year of submission, each in a separate line and properly
centered and located at the bottom of the page.
Annexure 1
Title of the Training/Project
A Training/project report submitted in partial fulfillment of the requirements
for the award of the degree of
Name of the Student 1 (Registration Number)
Centered, Bold
Font size is 14 pt.
Lovely Professional University Jalandhar – Delhi G. T Road (NH-1),
Phagwara, Punjab, 144402, India
Centered, Bold
Font size is 20 pt.
2013
Centered, Bold , Font size is 18 pt.
Size 3:4
Annexure 2
(Sample)
CANDIDATE/S DECLARATION
I hereby certify that the work, which is being presented in the report/
Training/Project entitled Title of the Report/ Training/Project, in partial
fulfillment of the requirement for the award of the Degree of Bachelor of
Technology submitted to the institution is an authentic record of my/our own
work carried out during the period Month-Year to Month-Year under the
supervision of supervisor(s) name. I also cited the reference about the
text(s)/figure(s)/table(s) from where they have been taken.
Date: Signature of the Candidate
This is to certify that the above statement made by the candidate is correct to
the best of my /our knowledge.
Date: Signature Supervisor
Annexure 3
(Sample)
OBJECTIVE OF TRAINING/PROJECT
The main goal of this work is to
 Plan the installation of BTS through survey,
 Detect areas of the poor signal strength through Drive test and Post
processing of collected data,
 Improve the signal strength of poor coverage areas through
sectorization at BTS.
Annexure 4
(Sample)
TABLE OF CONTENTS
Title Page No.
ABSTRACT .................................................................................................................. v
LIST OF TABLES..........................................................................................................vii
LIST OF FIGURES...................................................................................................... .ix
CHAPTER 1 INTRODUCTION
1.1 General ................................................................................................................... 1
1.2 Objectives................................................................................................................ 2
1.3 Organization of the Report/Thesis…………………………………………..……..3
CHAPTER 2 LITERATURE REVIEW
2.1 Introduction ....................................................................................................…….3
2.2 Vulnerability Scanners………............................................................................... .3
2.3 The nmap port Scanner........................................................................................... 3
2.4 The Nessus Vulnerability Scanner...........................................................................3
2.5 Packet Sniffers………............................................................................................. 4
2.6 Intrusion Detection………….................................................................................. 6
CHAPTER 3 METHODOLOGY
3.1 Introduction……………..........................................................................................7
3.2 Public-key Cryptography
3.2.1 Rivest-Shamir-Adleman Algorithm for public-key Cryptography..................... 7
3.2.2 Proof of the RSA Algorithm ............................................................................... 8
3.2.3 Computational Issues Related to RSA................................................................. 8
3.3 Experimental Procedure .......................................................................................... 9
3.3.1 Emulsion preparation............................................................................................ 9
3.3.2 Extraction process............................................................................................... 10
3.4 Operating Conditions............................................................................................. .11
CHAPTER 4 RESULTS AND DISCUSSION
4.1 Introduction .............................................................................................................39
4.2 Some Mathematical Preliminaries……………………………………….………....39
4.3 Success Probability of the Attack …………………………………………………41
4.3.1 Modelling the Statistical Experiment ……………………………………….…..41
4.3.2 A Simplified Statistical Experiment …………….………………………..……. 45
4.3.3 Towards the Good Distribution ………………………………………..………...47
CHAPTER 5 CONCLUSION AND FUTURE WORK
5.1 Introduction..............................................................................................................54
5.2 Conclusions ............................................................................................................ 64
5.3 Scope for Future Work ........................................................................................... 71
REFERENCES……………………………………………………..……………….…73
APPENDIX…………………………………………………………………………...75
A.1 Name of Appendix 1 ……………………………………………………..…..…...76
A.2 Name of Appendix 2 ……………………………………………………..…..…...77
LIST OF PUBLICATIONS……………………………………………………….…..79
Resume of the Research Scholar (only for Ph.D.)……………………………… .…....80
Annexure 5
(Sample)
LIST OF TABLES
Table No. Title Page No.
1.1 RSA, DL and EC key sizes for equivalent security levels ………..……. 10
2.1 OEF example parameters………………………………………............... 22
2.2 Computational details for inversion inOEFs ……………………………..25
2.3 Computational details for inversion inOEFs ……………………………. 35
2.4 Admissible orders of elliptic curves over F37…………………………… 45
3.1 Isomorphism classes of elliptic curves over F5 …………………………..48
3.1 Operation counts for arithmetic on y2 = x3 −3x +b …………………… .49
3.7 Operation counts for arithmetic on y2 +xy = x3 +ax2 +b…………………50
4.1 Point addition cost in sliding versus window NAF methods ……………..51
4.2 Operation counts for computing kP +lQ ………………………………….55
4.4 Operation counts in comb and interleaving methods ……………………..65
5.1 Koblitz curves with almost-prime group order ……………………………75
Annexure 6
(Sample)
LIST OF FIGURES
Figure No. Title Page No.
1.1 Basic communications model ………………………………………………2
1.5 Symmetric-key versus public-key cryptography …………………………. .4
2.2 Representing prime-field element as an array of words ……………………29
2.3 Depth-2 splits for 224-bit integers (Karatsuba-Ofman multiplication) …….33
3.3 Depth-2 splits for 192-bit integers (Karatsuba-Ofman multiplication) …….34
3.4 Representing binary-field element as an array of words …………………...47
3.5 Right-to-left comb method for polynomial multiplication ……………..…..49
3.6 Left-to-right comb method for polynomial multiplication…………….........49
Annexure 7
(Sample)
LIST OF ABBREVIATIONS
ACM Association for Computing Machinery
ADES Advance Data Encryption Standard
CBC Cipher Block Chaining
CFB Cipher Feedback Mode
DDES Double Data Encryption Standard
DES Data Encryption Standard
ECD Electronic Codebook Mode
IEEE Institute of Electrical and Electronics Engineers
NIST National Institute of Standards and Technology
OFB Output Feedback Mode
OTP One Time Pad
TDES Triple Data Encryption Standard
11575 1 guidelines for preparing training report (2)

Contenu connexe

Tendances

M.tech seminar
M.tech seminarM.tech seminar
M.tech seminarvartika07
 
BUSINESS MANAGEMENT DISSERTATION GUIDELINE
BUSINESS MANAGEMENT DISSERTATION GUIDELINEBUSINESS MANAGEMENT DISSERTATION GUIDELINE
BUSINESS MANAGEMENT DISSERTATION GUIDELINEKudzai Chibarinya
 
Guidelines for thesis preparation 3
Guidelines for thesis preparation 3Guidelines for thesis preparation 3
Guidelines for thesis preparation 3slidenuur
 
Instructions for report final
Instructions for report finalInstructions for report final
Instructions for report finalPratik Poudel
 
Guidelines for making project...........
Guidelines for making project...........Guidelines for making project...........
Guidelines for making project...........viggy vanshi
 
S Y D E 462 Conference Summary Template
S Y D E 462    Conference  Summary  TemplateS Y D E 462    Conference  Summary  Template
S Y D E 462 Conference Summary Templateguest9c68abc
 
Report format project_seminar
Report format project_seminarReport format project_seminar
Report format project_seminarSameer sadalge
 
Radioeng template 2016-ja (1)
Radioeng template 2016-ja (1)Radioeng template 2016-ja (1)
Radioeng template 2016-ja (1)Alumni ECE
 
Sample IEEE Paper Format
Sample IEEE Paper FormatSample IEEE Paper Format
Sample IEEE Paper FormatAanand Kumar
 
Seminar report guidelines1
Seminar report guidelines1Seminar report guidelines1
Seminar report guidelines1Shikhar Patwari
 
2011 engineering general
2011 engineering general2011 engineering general
2011 engineering generalHemacsulb
 
4 year bbs_project_procedures_779816
4 year bbs_project_procedures_7798164 year bbs_project_procedures_779816
4 year bbs_project_procedures_779816Suraj Ghimire
 
Manual2013 pr (1)
Manual2013 pr (1)Manual2013 pr (1)
Manual2013 pr (1)Robin Son
 
Guidelines for Writing a Scientific Paper
Guidelines for Writing a Scientific PaperGuidelines for Writing a Scientific Paper
Guidelines for Writing a Scientific PaperSirwan Hasan
 

Tendances (20)

M.tech seminar
M.tech seminarM.tech seminar
M.tech seminar
 
BUSINESS MANAGEMENT DISSERTATION GUIDELINE
BUSINESS MANAGEMENT DISSERTATION GUIDELINEBUSINESS MANAGEMENT DISSERTATION GUIDELINE
BUSINESS MANAGEMENT DISSERTATION GUIDELINE
 
Guidelines for thesis preparation 3
Guidelines for thesis preparation 3Guidelines for thesis preparation 3
Guidelines for thesis preparation 3
 
Instructions for report final
Instructions for report finalInstructions for report final
Instructions for report final
 
Guidelines for making project...........
Guidelines for making project...........Guidelines for making project...........
Guidelines for making project...........
 
Apa manual chapter 5
Apa manual chapter 5Apa manual chapter 5
Apa manual chapter 5
 
APA manual PPT 2
APA manual PPT 2APA manual PPT 2
APA manual PPT 2
 
Project guidance
Project guidanceProject guidance
Project guidance
 
S Y D E 462 Conference Summary Template
S Y D E 462    Conference  Summary  TemplateS Y D E 462    Conference  Summary  Template
S Y D E 462 Conference Summary Template
 
Report format project_seminar
Report format project_seminarReport format project_seminar
Report format project_seminar
 
Anna University UG Project Report Format
Anna University UG Project Report FormatAnna University UG Project Report Format
Anna University UG Project Report Format
 
Radioeng template 2016-ja (1)
Radioeng template 2016-ja (1)Radioeng template 2016-ja (1)
Radioeng template 2016-ja (1)
 
Internship guidelines
Internship guidelinesInternship guidelines
Internship guidelines
 
Sample IEEE Paper Format
Sample IEEE Paper FormatSample IEEE Paper Format
Sample IEEE Paper Format
 
Seminar report guidelines1
Seminar report guidelines1Seminar report guidelines1
Seminar report guidelines1
 
Pg project format
Pg project formatPg project format
Pg project format
 
2011 engineering general
2011 engineering general2011 engineering general
2011 engineering general
 
4 year bbs_project_procedures_779816
4 year bbs_project_procedures_7798164 year bbs_project_procedures_779816
4 year bbs_project_procedures_779816
 
Manual2013 pr (1)
Manual2013 pr (1)Manual2013 pr (1)
Manual2013 pr (1)
 
Guidelines for Writing a Scientific Paper
Guidelines for Writing a Scientific PaperGuidelines for Writing a Scientific Paper
Guidelines for Writing a Scientific Paper
 

Similaire à 11575 1 guidelines for preparing training report (2)

Assignment DetailsYou are required to submiti) Two (soft .docx
Assignment DetailsYou are required to submiti) Two (soft .docxAssignment DetailsYou are required to submiti) Two (soft .docx
Assignment DetailsYou are required to submiti) Two (soft .docxssuser562afc1
 
[Thesis] thesis guideline
[Thesis] thesis guideline[Thesis] thesis guideline
[Thesis] thesis guidelinePAULKIOI1
 
Proposal format
Proposal formatProposal format
Proposal formatMr SMAK
 
1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist thSantosConleyha
 
1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist thBenitoSumpter862
 
Project Title Final Project Report Submitted a.docx
Project Title Final Project Report Submitted a.docxProject Title Final Project Report Submitted a.docx
Project Title Final Project Report Submitted a.docxbriancrawford30935
 
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docx
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docxNew folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docx
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docxcurwenmichaela
 
Mba project format
Mba project formatMba project format
Mba project formatAmul Raj
 
Inputs to be required for thesis or dissertation
Inputs to be required for thesis or dissertationInputs to be required for thesis or dissertation
Inputs to be required for thesis or dissertationnikhilprasad42
 
Grading Criteria Argument Paper Revised Rough DraftENG200 Vers
Grading Criteria Argument Paper Revised Rough DraftENG200 VersGrading Criteria Argument Paper Revised Rough DraftENG200 Vers
Grading Criteria Argument Paper Revised Rough DraftENG200 VersJeanmarieColbert3
 
Title of Your Research Idea by Your Whole Name
Title of Your Research Idea by Your Whole Name Title of Your Research Idea by Your Whole Name
Title of Your Research Idea by Your Whole Name TakishaPeck109
 
Important Student NotesFollow the guidelines of the CU Resear
Important Student NotesFollow the guidelines of the CU ResearImportant Student NotesFollow the guidelines of the CU Resear
Important Student NotesFollow the guidelines of the CU ResearMalikPinckney86
 
Business Research Methods: Written report guidelines
Business Research Methods: Written report guidelinesBusiness Research Methods: Written report guidelines
Business Research Methods: Written report guidelinesviveksangwan007
 
Thesisformatguide
ThesisformatguideThesisformatguide
Thesisformatguidemqais
 
Appropriate TopicsThe Research Report, select one of the fo.docx
Appropriate TopicsThe Research Report, select one of the fo.docxAppropriate TopicsThe Research Report, select one of the fo.docx
Appropriate TopicsThe Research Report, select one of the fo.docxYASHU40
 
Major project-report-format (1) (1)
Major project-report-format (1) (1)Major project-report-format (1) (1)
Major project-report-format (1) (1)kazilaribullah
 
Parts-of-a-Dissertation-1.pptx
Parts-of-a-Dissertation-1.pptxParts-of-a-Dissertation-1.pptx
Parts-of-a-Dissertation-1.pptxcharmainejornadal
 
1 mime 1650 materials science & engineering spring 2
  1 mime 1650 materials science & engineering spring 2  1 mime 1650 materials science & engineering spring 2
1 mime 1650 materials science & engineering spring 2abhi353063
 
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docx
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docxCMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docx
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docxmccormicknadine86
 
How To Write Your Research Dissertation
How To Write Your Research DissertationHow To Write Your Research Dissertation
How To Write Your Research DissertationChris Jobling
 

Similaire à 11575 1 guidelines for preparing training report (2) (20)

Assignment DetailsYou are required to submiti) Two (soft .docx
Assignment DetailsYou are required to submiti) Two (soft .docxAssignment DetailsYou are required to submiti) Two (soft .docx
Assignment DetailsYou are required to submiti) Two (soft .docx
 
[Thesis] thesis guideline
[Thesis] thesis guideline[Thesis] thesis guideline
[Thesis] thesis guideline
 
Proposal format
Proposal formatProposal format
Proposal format
 
1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th
 
1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th1.  Describe five of the barriers and challenges that may exist th
1.  Describe five of the barriers and challenges that may exist th
 
Project Title Final Project Report Submitted a.docx
Project Title Final Project Report Submitted a.docxProject Title Final Project Report Submitted a.docx
Project Title Final Project Report Submitted a.docx
 
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docx
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docxNew folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docx
New folderfac_lee023_HW06_WR5_FuncDecomp (3).pdfECE380 Pr.docx
 
Mba project format
Mba project formatMba project format
Mba project format
 
Inputs to be required for thesis or dissertation
Inputs to be required for thesis or dissertationInputs to be required for thesis or dissertation
Inputs to be required for thesis or dissertation
 
Grading Criteria Argument Paper Revised Rough DraftENG200 Vers
Grading Criteria Argument Paper Revised Rough DraftENG200 VersGrading Criteria Argument Paper Revised Rough DraftENG200 Vers
Grading Criteria Argument Paper Revised Rough DraftENG200 Vers
 
Title of Your Research Idea by Your Whole Name
Title of Your Research Idea by Your Whole Name Title of Your Research Idea by Your Whole Name
Title of Your Research Idea by Your Whole Name
 
Important Student NotesFollow the guidelines of the CU Resear
Important Student NotesFollow the guidelines of the CU ResearImportant Student NotesFollow the guidelines of the CU Resear
Important Student NotesFollow the guidelines of the CU Resear
 
Business Research Methods: Written report guidelines
Business Research Methods: Written report guidelinesBusiness Research Methods: Written report guidelines
Business Research Methods: Written report guidelines
 
Thesisformatguide
ThesisformatguideThesisformatguide
Thesisformatguide
 
Appropriate TopicsThe Research Report, select one of the fo.docx
Appropriate TopicsThe Research Report, select one of the fo.docxAppropriate TopicsThe Research Report, select one of the fo.docx
Appropriate TopicsThe Research Report, select one of the fo.docx
 
Major project-report-format (1) (1)
Major project-report-format (1) (1)Major project-report-format (1) (1)
Major project-report-format (1) (1)
 
Parts-of-a-Dissertation-1.pptx
Parts-of-a-Dissertation-1.pptxParts-of-a-Dissertation-1.pptx
Parts-of-a-Dissertation-1.pptx
 
1 mime 1650 materials science & engineering spring 2
  1 mime 1650 materials science & engineering spring 2  1 mime 1650 materials science & engineering spring 2
1 mime 1650 materials science & engineering spring 2
 
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docx
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docxCMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docx
CMGT 400 Grading Rubric Individual – Week 1 Threats, Attacks, and Vu.docx
 
How To Write Your Research Dissertation
How To Write Your Research DissertationHow To Write Your Research Dissertation
How To Write Your Research Dissertation
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

11575 1 guidelines for preparing training report (2)

  • 1. Guidelines For The Preparation of Six weeks Industrial Training Report Version 1.0 Lovely Professional University Jalandhar – Delhi G. T Road (NH-1), Phagwara, Punjab, 144402, India 2013
  • 2. 1. INTRODUCTION This document covers the general rules of format and appearance. It is the student’s responsibility to read and follow the requirements presented here and to submit documents of the highest quality. The final copies will not be accepted with corrections, insufficient margins, or if they are of such poor quality that reproduced and/or microfilmed copies cannot be made. The final version of the Training Report must be free from typographical, grammatical and other errors when submitted as Examination Copy. While this is the responsibility of the student. 2. REPORT 2.1 The arrangement of parts of Training Report The sequence in which the training material should be arranged and bound should be as follows: 1) Cover Page 2) Inside Cover Page 3) Candidate/s Declaration 4) Dedication Page (Optional) 5) Objective of Training or Project 6) Acknowledgements 7) Table of Contents 8) List of Tables 9) List of Figures 10) List of Symbols, Abbreviations or Nomenclature (Optional) 11) Enclosures 12) Chapters Maximum Number of Chapters are recommended to be five (Chapter one is Introduction, Chapter two is company profile , Chapter three is Identification of the training /project , Chapter four is Design Details, Implementation and Testing and Chapter five is Results, Discussion and conclusion). 13) Appendices
  • 3. 14) References Minimum References must be 10. The formats in various headings are given below Title Page See Annexure 1 (Inside cover page same as cover page) Dedication page (if any) should not exceed one page Candidate declaration, see Annexure 2 Objective of Training or Project see Annexure 3 (Abstract should not exceed two pages (about 600 words)) Acknowledgements should not exceed two pages Table of Contents see Annexure 4 List of Tables see Annexure 5 List of Figures see Annexure 6 Abbreviations see Annexure 7 Notations see Annexure 8 References see Annexure 9 3. GUIDELINES FOR PREPARATION OF TRAINING REPORT The training manuscript has three basic parts: the preliminary pages, the text and the reference materials. 3.1 Preliminaries The preliminary materials consist of the Title Page, Thesis Certificate, Abstract, Dedication (optional), Acknowledgements, and Table of contents, List of Tables, List of Figures and other lists. Preliminary pages are paginated separately from the rest of the text. The title page is counted, but it is not numbered. Beginning with the page immediately following the title page, place page numbers in lowercase Roman numerals centered at the bottom of the preliminary pages. The Roman numerals are continued up to the first page of the text. Proper Order of Preliminary Pages is:
  • 4. a. Title Page The title of the Training/project report should be as concise as possible. It must occur consistently in every respect, including punctuation, capitalization, and hyphenation, on the abstract and approval forms. On the title page, the identical title must appear in title case with each line centered on the page. The month in which the Training is submitted, e.g., May, August, or January is to be printed at the bottom of the page. The title page is not numbered, but it is counted. Size of the institute logo should be 3cm x 4 cm. b. Objective of Training or Project The Objective should provide a succinct, descriptive account of the training/project including a statement of problem procedure and method, results and conclusion. It must not include diagrams and should not include mathematical formulas unless essential. The Objective should be in the range of 400 to 600 words with 1.5 line spaced. It should adhere to the same style manual as the thesis manuscript. A lower-case Roman numeral is used on the abstract page and number of keywords not more than six. c. Dedication (optional) The dedication is brief, single-spaced, and centered on the page. No heading is used. The word "To" customarily begins the dedication. d. Acknowledgements This section begins with the title ACKNOWLEDGEMENTS centered in all capital letters. This page is used to thank those persons who have been instrumental to the student in completing the degree requirements. Acknowledgement of grants and special funding received to support the Training/Project also may be made on this page. e. Table of Contents The Table of Contents must include all Chapter headings, Section headings, Subsection headings, Appendices (optional if any) and References. Entries are 1.5 lines spaced. The headings of major sections (i.e., Chapters,
  • 5. Appendices and References) are written in all capital letters. Table of contents headings must be identical to those in the text. Page numbers must be bottom centered and each entry must have leader dots, which connect it to its corresponding page number. The words TABLE OF CONTENTS must be centered on the page two inches from the top of the first page only. f. List of Tables (if tables appear in document) The heading, LIST OF TABLES, appears centered on the page two inches from the top of the first page only. All table numbers and captions are listed exactly as they appear in the text. g. List of Figures (if figures appear in document) The heading, LIST OF FIGURES, appears centered on the page two inches from the top of the first page only. All figure numbers and captions are listed exactly as they appear in the text. h. Other Lists (nomenclature, definitions, glossary of terms, etc.) The appropriate title in all capital letters is centered two inches from the top of the first page only. 3.2 Text The text must be divided into a logical scheme that is followed consistently throughout the document. The larger divisions and more important minor divisions are indicated by suitable, consistent headings. All headings and subheadings should be presented in the same way in each chapter, in terms of capitalization, placement on the page and kind of type used. No headers, giving the titles of chapters or other sections, are allowed at the top of the pages. Chapter organization as practiced by the discipline should be followed. Program code may be placed in the Appendix. The Student/Research Scholar and the academic department are responsible for the quality and content of the text. Specific requirements for text presentation are given below. a. Section and Subsection The student may use Section headings and Sub-Section headings to subdivide the chapter/s, but a consistent sequence of section headings as identified in the style guide selected must be followed. The Student/Research Scholar do
  • 6. not change the sequence and style of headings from chapter to chapter. Once the sequence is chosen, it must be followed consistently throughout the thesis. Footnotes should be in 10 point character with single spaced lines. b. Pagination Lower-case Roman numerals are used to number all pages preceding the text. Although the preliminary paging begins with the title page, no number appears on the title page. However, it is counted as i, The page immediately following the title page is numbered with a lower- case Roman numeral ii. Beginning with the first page of the text, all pages are to be numbered with Arabic numerals consecutively throughout the thesis document, including the appendix and the bibliography or list of references. The page numbers must be positioned at the bottom centered of the page. Page headers or running heads may not be used in the thesis. All page numbers must be in the same font and size. c. Tables and Figures The term "table" refers to a columnar arrangement of information, often data sets, organized to save space and convey relationships at a glance. The term "figure" refers to graphs, drawings, diagrams, charts, maps, or photographs. All such details should be inserted in the text near where they are first mentioned. A table or figure may appear on the same page as the text that refers to it or on a immediate next page. Each figure or table must be numbered and have a caption. Captions are placed below figures and pictures and above tables. Captions may be single spaced. d. Illustrations Each illustration must be referred to in the text and it must be placed after, and as near as possible to, the first reference to it in the text. All illustrative materials in the thesis must be prepared on paper that is the same weight (or stronger) and use the same font type as elsewhere in the manuscript. If illustrations are mounted, dry mounting must be used. Illustrations may not be mounted with rubber cement, staples, mucilage, or photo-mounting corners. Illustrative material must be drawn or computer-generated in black.
  • 7. Material may be laser-printed. Color should be used only if it is essential to the thesis. e. Photographs It is recommended that the student use a high quality, high contrast copying machine to reproduce photographic material for submission in lieu of photographs. If original photographs are used, they should be printed on single-weight, fiber-based paper with a matte finishes. All prints must be processed for nationally established standards for chemical permanence. Black-and-white prints are preferable. Photograph page number placement follows the standard pagination requirements. f. Appendix The appendix (or a series of appendices) immediately follows the main text. The appendix includes material that may be helpful to the reader of the thesis but may be too long for inclusion in the text or footnotes. The title, APPENDIX, appears only on the first page of the section, in capital letters centered two inches from the top. Examples of such material include questionnaires, letters, original data, sample forms, and derivations. Reference should be made in the text to the inclusion of these materials in the appendix. Each appendix is a separate subdivision of the text and must begin on a separate page. Each appendix must be listed in the e. Table of Contents. f. Enclosures: enclose the photo copy of certificate provided by Industy/Institute. 3.3 References Referencing style may follow IEEE, Harvard, or Chicago styles. For referencing you may use font size of 11.
  • 8. 4.1 Chapter and Section format The title of Chapter one shall be Introduction. It shall justify and highlight the problem poser and define the topic, aim and scope of the work presented in the thesis. It may also highlight the significant contributions from the investigation. Use only Arabic Numerals. Chapter Numbering should be centered on the top of the page with bold. Example: CHAPTER 1 INTRODUCTION Sections A chapter can be divided into Sections, Sub-sections and Sub-sub-sections so as to present different concepts separately. Sections and Sub-sections can be numbered using decimal points, e.g., 2.2 for the second Section in Chapter 2 and 2.3.4 for the fourth Subsection in third Section of Chapter 2. Use only Arabic Numerals with decimals. Section numbering should be left justified using large bold print. Example: 1.1 BACKGROUND 1.2 GSM Sub Sections Use only Arabic Numerals with two decimals. Sub section numbering should be left justified with bold. Example: 1.1.1 Block Ciphers 1.1.2 Data Encryption Standards (Required no. of pages: 2-3 Pages)
  • 9. CHAPTER 2 COMPANY PROFILE 2.1 INTRODUCTION 2.2 … This shall normally the Chapter 2 and shall present the detail of the work done in Company. (Required no. of pages: 2-3 Pages) CHAPTER 3 IDENTIFICATION OF TRAINING/PROJECT 3.1 INTRODUCTION 3.2 … This shall normally the Chapter 3 and shall present the identification of the training/project. (Required no. of pages: 2-3 Pages) CHAPTER 4 IMPLEMENTATION DETAIL 4.1 INTRODUCTION 4.2 … This shall normally the Chapter 3 and shall present the Design Details, Implementation and Testing. (Required no. of pages: 15-20 Pages) CHAPTER 5 RESULTS AND DISCUSSION 5.1 INTRODUCTION 5.2 … This shall form the penultimate chapter of the Training/Project and shall include a thorough evaluation of the investigation carried out and bring out the contributions from the Training. The discussion shall logically lead to inferences and conclusions as well as scope for possible future work. Table / Figure Format As far as possible tables and figures should be presented in
  • 10. portrait style. Small size table and figures (less than half of writing area of a page) should be incorporated within the text, while larger ones may be presented in separate pages. Table and figures shall be numbered chapter – wise. For example, the fourth figure in Chapter 5 will bear the number figure 5.4 or Fig.5.4. Table number and title will be placed above the table while the figure number and caption will located below the figure and will be centered left. Reference for Table and Figures reproduced from elsewhere shall be cited in the last and separate line in the table and figure caption, e.g. [12]. Text in tables may be in font size of 10. Table 4.6: Cell values and key sequence Equations All the equations should be typed in equation editor/LaTeX and should be properly numbered. For Example, (Required no. of pages: 4-7 Pages)
  • 11. 5. PAGE DIMENSIONS AND MARGIN The Training/Project should be prepared on good quality white paper. Standard A4 size (210 mm X 297 mm) paper should be used for preparing the copies. The final Training/Project should have the following page margins and the same margins should be used throughout a thesis. Top edge: 1 inch Left side: 1.25 inch Bottom edge: 1 inch Right side: 1.25 inch 6. TYPE-SETTING, TEXT PROCESSING AND PRINTING The text shall be printed employing Laserjet and the text having been processed using a standard text processor. The standard font shall be Times New Roman of 12 pts with 1.5 line spacing. The text must be 1.5 lines spaced and printed on only one side of each page 7. BINDING Spiral Binding 8. FRONT COVERS The front cover shall contain the following details: • Full title of thesis in 20 point’s font size properly centered and positioned at the top. • Full name of the candidate in 14 point’s font size properly centered at the middle of the page. • A 3 x 4 cms size of the Institute emblem followed by the name of the Institute and the year of submission, each in a separate line and properly centered and located at the bottom of the page.
  • 12. Annexure 1 Title of the Training/Project A Training/project report submitted in partial fulfillment of the requirements for the award of the degree of Name of the Student 1 (Registration Number) Centered, Bold Font size is 14 pt. Lovely Professional University Jalandhar – Delhi G. T Road (NH-1), Phagwara, Punjab, 144402, India Centered, Bold Font size is 20 pt. 2013 Centered, Bold , Font size is 18 pt. Size 3:4
  • 13. Annexure 2 (Sample) CANDIDATE/S DECLARATION I hereby certify that the work, which is being presented in the report/ Training/Project entitled Title of the Report/ Training/Project, in partial fulfillment of the requirement for the award of the Degree of Bachelor of Technology submitted to the institution is an authentic record of my/our own work carried out during the period Month-Year to Month-Year under the supervision of supervisor(s) name. I also cited the reference about the text(s)/figure(s)/table(s) from where they have been taken. Date: Signature of the Candidate This is to certify that the above statement made by the candidate is correct to the best of my /our knowledge. Date: Signature Supervisor
  • 14. Annexure 3 (Sample) OBJECTIVE OF TRAINING/PROJECT The main goal of this work is to  Plan the installation of BTS through survey,  Detect areas of the poor signal strength through Drive test and Post processing of collected data,  Improve the signal strength of poor coverage areas through sectorization at BTS.
  • 15. Annexure 4 (Sample) TABLE OF CONTENTS Title Page No. ABSTRACT .................................................................................................................. v LIST OF TABLES..........................................................................................................vii LIST OF FIGURES...................................................................................................... .ix CHAPTER 1 INTRODUCTION 1.1 General ................................................................................................................... 1 1.2 Objectives................................................................................................................ 2 1.3 Organization of the Report/Thesis…………………………………………..……..3 CHAPTER 2 LITERATURE REVIEW 2.1 Introduction ....................................................................................................…….3 2.2 Vulnerability Scanners………............................................................................... .3 2.3 The nmap port Scanner........................................................................................... 3 2.4 The Nessus Vulnerability Scanner...........................................................................3 2.5 Packet Sniffers………............................................................................................. 4 2.6 Intrusion Detection………….................................................................................. 6 CHAPTER 3 METHODOLOGY 3.1 Introduction……………..........................................................................................7 3.2 Public-key Cryptography 3.2.1 Rivest-Shamir-Adleman Algorithm for public-key Cryptography..................... 7 3.2.2 Proof of the RSA Algorithm ............................................................................... 8 3.2.3 Computational Issues Related to RSA................................................................. 8 3.3 Experimental Procedure .......................................................................................... 9 3.3.1 Emulsion preparation............................................................................................ 9 3.3.2 Extraction process............................................................................................... 10 3.4 Operating Conditions............................................................................................. .11 CHAPTER 4 RESULTS AND DISCUSSION 4.1 Introduction .............................................................................................................39 4.2 Some Mathematical Preliminaries……………………………………….………....39 4.3 Success Probability of the Attack …………………………………………………41 4.3.1 Modelling the Statistical Experiment ……………………………………….…..41
  • 16. 4.3.2 A Simplified Statistical Experiment …………….………………………..……. 45 4.3.3 Towards the Good Distribution ………………………………………..………...47 CHAPTER 5 CONCLUSION AND FUTURE WORK 5.1 Introduction..............................................................................................................54 5.2 Conclusions ............................................................................................................ 64 5.3 Scope for Future Work ........................................................................................... 71 REFERENCES……………………………………………………..……………….…73 APPENDIX…………………………………………………………………………...75 A.1 Name of Appendix 1 ……………………………………………………..…..…...76 A.2 Name of Appendix 2 ……………………………………………………..…..…...77 LIST OF PUBLICATIONS……………………………………………………….…..79 Resume of the Research Scholar (only for Ph.D.)……………………………… .…....80
  • 17. Annexure 5 (Sample) LIST OF TABLES Table No. Title Page No. 1.1 RSA, DL and EC key sizes for equivalent security levels ………..……. 10 2.1 OEF example parameters………………………………………............... 22 2.2 Computational details for inversion inOEFs ……………………………..25 2.3 Computational details for inversion inOEFs ……………………………. 35 2.4 Admissible orders of elliptic curves over F37…………………………… 45 3.1 Isomorphism classes of elliptic curves over F5 …………………………..48 3.1 Operation counts for arithmetic on y2 = x3 −3x +b …………………… .49 3.7 Operation counts for arithmetic on y2 +xy = x3 +ax2 +b…………………50 4.1 Point addition cost in sliding versus window NAF methods ……………..51 4.2 Operation counts for computing kP +lQ ………………………………….55 4.4 Operation counts in comb and interleaving methods ……………………..65 5.1 Koblitz curves with almost-prime group order ……………………………75
  • 18. Annexure 6 (Sample) LIST OF FIGURES Figure No. Title Page No. 1.1 Basic communications model ………………………………………………2 1.5 Symmetric-key versus public-key cryptography …………………………. .4 2.2 Representing prime-field element as an array of words ……………………29 2.3 Depth-2 splits for 224-bit integers (Karatsuba-Ofman multiplication) …….33 3.3 Depth-2 splits for 192-bit integers (Karatsuba-Ofman multiplication) …….34 3.4 Representing binary-field element as an array of words …………………...47 3.5 Right-to-left comb method for polynomial multiplication ……………..…..49 3.6 Left-to-right comb method for polynomial multiplication…………….........49
  • 19. Annexure 7 (Sample) LIST OF ABBREVIATIONS ACM Association for Computing Machinery ADES Advance Data Encryption Standard CBC Cipher Block Chaining CFB Cipher Feedback Mode DDES Double Data Encryption Standard DES Data Encryption Standard ECD Electronic Codebook Mode IEEE Institute of Electrical and Electronics Engineers NIST National Institute of Standards and Technology OFB Output Feedback Mode OTP One Time Pad TDES Triple Data Encryption Standard