Sei sulla pagina 1di 3

1.

Title of Study (Please state the title of your study in a brief and concise manner, as
the title of a thesis or an article.) (Maximum 30 words
Ask yourself; Is there current interest in a certain topic in your field of interest or in a closely
related field?
This can be answered by reviewing published literature.
If Yes, Then download some recent publications about that topic, go through the papers and pay
great attention to Future work/ Recommendation section of each paper.
Is there a gap in knowledge that your study could help to fill or a controversy that it might help
to resolve? If yes, then formulate the title with respect to the gap to be filled.
Example: Detection of Anomalous Behavior of Smartphones using Convolutional Neural
Networks based on the power consumption pattern.
2. The Analysis of the Issue (Please state the subject which you will deal with in your
study and your theory.) (Minimum 75, maximum 300 words)
Establish a context for your study and demonstrate the need for it.
Give the rationale of the study, providing evidence and conditions of the existing situation, this
helps to make the application reader feel the urgency of the problem and the need to study the
problem in order to solve it or contribute to its solution.
You should clearly state: What key debates and (gaps) exist on the subject area to be studied in
terms of the variables (Globally/ Regionally/ Nationally). This requires reading the latest
publications, so that you get to know the state of the art
Note that: A well-written introduction of the Analysis is the most efficient way to hook your
reader and set the context of your proposed study.
Smartphones have become an indispensable part of modern life. Hand-held mobile devices can
practically perform many tasks, including web browsing, internet banking, multimedia
streaming, and connecting people through social media, to name a few. Different applications in
smartphones result in different power consumption patterns.
Even though the power consumed by the application might not be the same every time it is used,
there still remains a similarity in the power consumption pattern. An anomalous behavior on the
smartphone would result in a reduction in the similarity of the power consumption pattern. An
anomalous behavior could be due to different malware attacks, or due to some unknown apps
running on the smartphone.
A number of approaches have been applied in detecting anomalous behavior on smartphones;
these include Signal processing, and machine learning. We propose a deep learning approach to
detecting anomalous behavior on smartphones based on the power consumption pattern.
3. Research Method (Please provide details concerning the methods of research you
are planning to use in this study. For example, in depth interviews, observations,
surveys, trials, etc.) (Minimum 75, maximum 300 words)
Here provide your application reviewer (reader) the information on what procedures will be
followed to come up with the study results.
For example:
A test bench will be established to measure the power consumed by a smartphone in varying test
configurations.
…..
The dataset collected will then be analyzed,
model validation….
4. The General Structure of the Study (Please state the main headings of the study.)
(Minimum 75, maximum 300 words)
Given that we/you’ve already provided Title of Study in question one, I guess he wants the
chapter/ section name that you will consider in your write up
1. Introduction
2. Literature Review
3. Research Method
4. Findings
5. Discussion
6. Conclusions and Recommendations
5. The Academic Contribution of the Study (Please explain what type of contribution
this study will make to the Field in the academic sense.) (Minimum 75, maximum
300 words)
Here they need the Significance of your Study. Indicate who will benefit from the findings of the
study and how.

6. Literature Review (Please state the principal academic resources which have been
written in the field of this study and which you will utilise.) (Minimum 75,
maximum 300 words).
Here you are expected to convey to the reviewer what knowledge and ideas have been
established on a topic, and what their strengths and weaknesses are.
How will your study build on or depart from current and previous studies on the topic?
If there are any areas which you do not consider to be sufficiently clear, or which you believe
need to be clarified, or any points you wish to draw the attention of the assessment committee,
please describe these briefly, in this section
Example:
Recent surveys have reported that global mobile internet penetration is going to increase to 71%
in 2019 from 28% in 2013 [1]. With increased popularity, these devices usually suffer from
quick performance degradation due to unknown malicious activities.
These activities pose a threat to the security of mobile devices. In some cases, they can access
personal data and take full control of the device. The Fsecure labs reported 275 new threat
families on Android based devices [2].
Detection of malware using power traces of applications has generated much research interest
[3]. Power consumption measurements are used in reference [4] for detecting energy-greedy
anomalies and mobile malware variants,
A vast majority of the work for detecting malware using machine learning methodology focus on
data from different applications to extract features. These methods cannot be generalized for all
mobile devices. To address these shortcomings, we propose a model to detect anomalous
behavior on smartphone using Convolutional Neural Networks, a deep learning approach.

References
[1] J. ea Qadri, “A review of significance of energy-consumption anomaly in malware detection in mobile
devices,” International Journal on Cyber Situational Awareness, vol. 1, no. 1, 2016.
2016, pp. 6 860 217:1–6 860 217:6, 2016.
[2] “F-secure mobile threat report q1 2014, 204.”
[3] M. Halilovic and A. Subasi, “Intrusion detection on smartphones,” CoRR, vol. abs/1211.6610, 2012.
[Online]. Available: http://arxiv.org/abs/1211.6610
[4] H. Kim, J. Smith, and K. G. Shin, “Detecting energy-greedy anomalies and mobile malware variants,”
in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, ser.
MobiSys ’08, 2008, pp. 239–252.

Potrebbero piacerti anche