Merged Chapter 3 Research Method in CS
Merged Chapter 3 Research Method in CS
The digital library is different from the regular library which is a collection of printed books and
the like, the data in the digital library is located on the computer server that can be placed at a
remote location, but can be accessed by users from a distance using a computer network. Digital
libraries are expected to enhance reading interests and habits as information banks or reading
resources centers
Describes itself as the world's largest technical professional society -- promoting the
development and application of electrotechnology and allied sciences for the benefit of
humanity, the advancement of the profession, and the well-being of our members. The IEEE
fosters the development of standards that often become national and international standards. The
organization publishes a number of journals, has many local chapters, and several large societies
in special areas, such as the IEEE Computer Society. IEEE’s core purpose is to foster
technological innovation and excellence for the benefit of humanity. IEEE will be essential to the
global technical community and to technical professionals everywhere and be universally
recognized for the contributions of technology and of technical professionals in improving global
conditions.
The Association for Computing Machinery (ACM) is a nonprofit trade group based around
computing technologies. Founded over a half-century ago, in 1947, the Association for
Computing Machinery has over 100,000 members and is based in New York City. Association
for Computing Machinery (ACM) is the oldest and largest educational and scientific computing
A software documentation tool helps make creating, managing and distributing important
internal and external documents more efficient. Using a documentation tool makes the process
easier, lowering resistance to creating complete and comprehensive documentation.
Documentation tools also take care of housing and distributing materials to relevant team
members, customers, and stakeholders. It creates a centralized location for individuals to refer
back to whenever they need to find or access a document — cutting down on time spent sifting
through folders or searching their email inbox.
The key benefit of using a documentation tool is productivity. The right tool cuts down on the
amount of time spent creating and finding documents, as well as makes it easier for team
members to do their job.
When team members are all working from the same documentation, processes are completed the
exact same way each time. Your team will be more consistent and professional.
Whether you’re bringing a new team member on or you’re introducing new skills or
responsibilities to existing employees, documentation can improve the onboarding and training
processes. Documentation provides clear instructions that create opportunities for self-service
onboarding and training.
It’s great to have people you can depend on to do the job the right way each and every time —
but if that individual leaves the team or even just takes a day off, does the rest of your team know
how to perform the task correctly? A documentation tool reduces knowledge loss, providing
instruction regardless of experience level.
Documentation tools can be as simple or feature-rich as you need them to be, but there are a few
key features you should consider when looking for a new documentation tool.
Different team members or customers will need access to different documents. Having
permissions or sharing settings will make it easier to ensure everyone can get the information
they need without having access to the information they don’t.
When documenting processes, having the ability to add images or videos can make documents
clearer and easier to follow. Choose a documentation tool that has multimedia capabilities.
Intuitive search. Finding documents needs to be just as easy as creating them. Look for a
documentation tool that has an easy-to-use search feature that delivers accurate results.
A team environment allows individuals to bring their diverse perspectives to problem solving,
which in turn increases their success at arriving at solutions more efficiently and effectively. The
contributions of everyone are more valued when solicited in team meetings. Teamwork is, “The
process of working collaboratively with a group of people in order to achieve a goal. Teamwork
is often a crucial part of a business, as it is often necessary for colleagues to work well together,
trying their best in any circumstance.
3.4. Datasets
A data set is a collection of numbers or values that relate to a particular subject. For example, the
test scores of each student in a particular class is a data set. The number of fish eaten by each
dolphin at an aquarium is a data set. A Dataset is a set or collection of data. This set is normally
presented in a tabular pattern. Every column describes a particular variable. And each row
corresponds to a given member of the data set, as per the given question. This is a part of data
management. Data sets describe values for each variable for unknown quantities such as height,
weight, temperature, volume, etc., of an object or values of random numbers. The values in this
set are known as a datum. The data set consists of data of one or more members corresponding to
each row.
Dataset Meaning
A dataset is a set of numbers or values that pertain to a specific topic. A dataset is, for example,
each student’s test scores in a certain class. Datasets can be written as a list of integers in a
Examples:
From CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth)
columbia/ecsma : for sensor network dataset for enhancing CSMA MAC protocol.
uoi/haggle/imote traceset at CRAWDAD for ONE simulation for MANET at Cambridge
university
Fake News Detection Dataset: It is a CSV file that has 7796 rows with four columns with
four columns
Credit Card Fraud Detection Dataset: (for security)The dataset contains transactions
made by credit cards;
Numerical Datasets
The numerical data set is a data set, where the data are expressed in numbers rather than natural
language. The numerical data is sometimes called quantitative data. The set of all the quantitative
data/numerical data is called the numerical data set. The numerical data is always in the numbers
form, such that we can perform arithmetic operations on it.
Bivariate Datasets
A data set that has two variables is called a bivariate data set. It deals with the relationship
between the two variables. Bivariate dataset usually contains two types of related data.
Example: To find the percentage score and age of the students in a class. Score and age can be
considered as two variables. Delay and accuracy of data transmission of a given algorithm.
Univariate dataset
In case, if you have one set of data alone say. Example temperature.
Is a data set with multiple variables or the dataset contains three or more than three data types
(variables). Or individual measurements that are acquired as a function of three or more than
three variables.
Example1: If we have to measure the length, width, height, volume of a rectangular box, we
have to use multiple variables to distinguish between those entities
Example2: In computing to evaluate algorithm you may develop with variables (parameters),
accuracy, delay overflow, delivery probability, jitter or an algorithm.
Categorical Datasets
Example:
A person’s gender (male or female),
Correlation Datasets
The set of values that demonstrate some relationship with each other indicates correlation data
sets. Here the values are found to be dependent on each other.
Positive correlation –
Two variables move in the same direction (Either both are up or both or down)
Negative correlation –
7|Page Oda Bultum University, Department of Computer
Science Research methods in Computer Science: Compiled
by Shambel Ts.
Two variables move in opposite directions. (One variable is up and another variable is down and
vice versa)
No or zero correlation –
A data set is a structured collection of data points related to a particular subject. A collection of
related data sets is called a database.
Data sets can be tabular or non-tabular. Tabular data sets contain structured data that is organized
by rows and columns. Non-tabular data sets contain unstructured data contained by brackets.
1|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Limitations፡ indicates what the researcher cannot do or factors ( such as time, fund,
equipment, data or participants.
Acknowledgments: it is section that your opportunity to thank those who have helped and
support you personally and professionally during your research.
References: it allows to acknowledge other writers and researchers in your work
Tables and Figures፡ tables and figures helps to illustrate or convey concepts or ideas more
effectively than text.
4.2. What is citation in research?
Citation is references to the source of information used in your research. Any you directly quote,
paraphrase or summarize the essential elements of someone else’s idea in your work. It is the
way you tell your readers that certain materials in your work came from another sources.
Citations must include set of parenthesis. Without parenthesis, one does not have proper in text
citation and can risk being charged with plagiarism. When we use another person's idea in our
research, we must include a brief notation next to that idea to let our readers know who
developed it. This brief notation is called an in-text citation. At the end of our work, we include a
fuller notation, which provides details that allow others to identify and locate the source in which
we found that idea. This fuller notation is referred to as an end-of-paper citation.
Why do we cite the work of others?
To acknowledge the work of other writers and researchers
To demonstrate the body of knowledge on which our own work is based
To enable the reader to trace our sources easily and lead her/him on to further information
To strength your work be providing outside support to your ideas
To keep you from failing a paper, a course or being sued in the real world
When to Cite
A citation is a reference to the source of information used in your research. Any time you
directly quote, paraphrase or summarize the essential elements of someone else's idea in your
work, an in-text citation should follow. An in-text citation is a brief notation within the text of
your paper or presentation which refers the reader to a fuller notation, or end-of-paper citation
that provides all necessary details about that source of information.
Citation style
You can usually choose a citation style based on the discipline you are studying. For example for
technology commonly used style is IEEE style. IEEE citation style includes in-text citations,
numbered in square brackets [ ], which refer to the full citation listed in the reference list at the
end of the paper. The reference list is organized numerically, not alphabetically.
2|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
The IEEE citation style includes the following:
In-text citations, numbered in square brackets […], which refer to the full citation listed.
Its reference list is organized numerically, not alphabetically.
Volume number refers the number of years the publication has been circulated.
Issue number refers how many times that periodically has been published during this year.
Page number refers page numbers you will take ideas from your sources (p or pp)
Examples of IEEE Editorial Style Manual as the following way:
[Ref number]. Authors name, “Title of article”, title of journal in italics, vol number, issue
number, page number, date published.
…for example the improvement of routing in MANET [1].
References
[1]. A. Yan, F. Guan, “improving routing performance of XYZ algorithm in MANET”,
IEEE, vol.54, pp.55-100, Dec 2020
References
What constitutes a good source?
1. Precise location: Sufficient information must be given for a third person to be able to
locate your source
2. Longevity of source: (Journals → Proceedings → Technical Reports → Web sources)
3. Accessibility of source: Completely free → Free subscription → Paid Avoid ‘private
communication’
4. Reputation / Quality of source
5. Originality’: Original paper → secondary paper / translation
6. Language’: If possible, a source should be in the language you write in
7. Readability of source: Well written → badly written
References need to include the following information, with the order and format depending
on the chosen style:
Author(s) or editor(s) responsible for writing/editing the work cited
Title and subtitle of the work
Where the work can be obtained or found
Year the work was created, presented, and/or published
3|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
What information is required about where the work can be obtained depends on its type
Types of work
If Book
Author(s) or editor(s)
Title and subtitle
Edition, if not the first, for example 2nd edition
Series and individual volume number (if any)
Publisher
(Place of publication)
Year of publication
Examples:
A. A. Fraenkel, Y. Bar-Hillel, and A. Levy. Foundations of Set Theory, 2nd revised edition.
Studies in Logic and the Foundat
If Conference proceedings
Editor(s) of proceedings
Name and number of conference
Location of conference (if appropriate)
Time of conference
Title of published work if different from the name of the conference
Series and individual volume number (if any)
Publisher
Place of publication
Year of publication
Example:
D. A. Basin and M. Rusinowitch, editors. Automated Reasoning - Second International Joint
Conference, IJCAR 2004, Cork, Ireland, July 4–8, 2004, Proceedings.
If Conference paper
Author(s) of the paper
Title and subtitle of the paper
All information on the conference proceedings plus
Page numbers of the paper
4|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Example:
Volker Weispfenning. Solving Constraints by Elimination Methods. In D. A. Basin and M.
Rusinowitch, editors. Automated Reasoning – Second International Joint Conference, IJCAR
2004, Cork, Ireland, July 4–8, 2004, Proceedings.
4.3. Making Excellent Presentation
Good presentation your presentation slide should looks like
Titles should be
Put a title on each slide
Titles should be short but descriptive
Ideally, titles on consecutive slides should tell a story all by themselves
Capitalize words consistently
Either always capitalize all words in the title (except for words like ‘a’ and ‘the’), or
always only capitalize the first word in the title/subtitle
The title of the whole presentation should be capitalized
You might want to include it on every slide
Textual contents be
Keep it simple
A typical slide should contain 20 to 40 words, maximum 80
Follow the 10-20-30 rules (10 slides, 20 minutes, 30 font size)
Do not try to fill all the space
Prefer enumerated or itemized lists over plain text
Use at most two levels of ‘sub itemizing’
Keep the number of items in a list low
Highlight important things
Use short sentences
Prefer phrases over complete sentences
Break lines where there is a logical pause
Do not hyphenate (-) words
Punctuate consistently
Complete punctuation in and after complete sentences
Avoid decreasing font size to make more text fit on a slide
Font should be
Aim for your text to be legible even under difficult conditions
5|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Use as few fonts as possible
Use a sans-serif font unless you use a high-resolution LCD projector
Use monospaced and script fonts only for specific purposes
Avoid italics to express emphasis, use colour instead
Colours should be
Use colours sparsely
Avoid bright text on dark background
Maximise contrast
Normal text should be black on (nearly) white background
Avoid bright, light colours on white background
Be aware of what we associate with different colours
Test your presentation on the intended equipment if possible
Colour associations
Red: Danger, aggression, passion, stimulating
Purple: Royalty, religion, calming
Green: Soothing, trustworthiness, nature
Blue: Restful, peaceful, relaxing
Yellow: Well-being
Brown: Nature, practicality, boring, close minded
Slide structure should be as follows
Graphics often convey concepts or ideas more effectively than text
Use graphics as often as possible
Graphics should only contain as much detail as necessary
Graphics always require explanation
Use animations to explain the dynamics of systems, algorithms, . . .
Do not use animations to simply attract attention
Do not use distracting special effects like fancy slide transitions
During presentation Gesture and Body Language
Be aware where you stand (center stage vs side stage)
Do not obscure the screen
Stand tall, keep your head up most of the time
Move from stillness to stillness, walk slowly
Use hand gestures to emphasise points
Use open palm gestures, full arm gestures
6|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Avoid aggressive gestures
Avoid hands in pockets, hands behind your back,
hands clasped in front of your body
Maintain eye contact
Treat everyone equal with your eye
do not look out of the window or on your watch
do not focus too long on a single individual
Your voice should be
Be aware of the acoustics of the room
Speak clearly (do not shout or whisper)
Pause shortly at key points (adds emphasis)
Emphasise the right words, control your breathing
Facial gestures and tone of voice should match your message
Do not rush, or talk deliberately slowly, but vary speed
Do not talk to the screen
Do not turn your back to the audience and talk at the same time
Do not read from a script (cue cards are ok)
Seven Principles of Public Speaking
1. Purpose: Why are you speaking? What do you want audience members to know, think,
believe, or do as a result of your presentation?
2. People: Who is your audience? How do the characteristics, skills, opinions, and behaviors
of your audience affect your purpose?
3. Place: How can you plan and adapt to the logistics of this place? How can you use visual
aids to help you achieve your purpose?
4. Preparation: Where and how can you find good ideas and information? For your speech?
How much and what kind of supporting materials do you need?
5. Planning: Is there a natural order to the ideas and information you will use? What are the
most effective ways to organize your speech in order to adapt it to the purpose, people,
place, etc.?
6. Personality: How do you become associated with your message in a positive way? What
can you do to demonstrate your competence, charisma, and character to the audience?
7. Performance: What form of delivery is best suited to the purpose of your speech? What
delivery techniques will make your presentation more effective? How should you practice?
7|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
4.4. How to Write Good Quality thesis and papers
Note any discussions that seem important to the topic, and try to find an issue that you can focus
your paper around. Use a variety of sources, including journals, books and reliable websites, to
ensure you do not miss anything glaring.
Do not only verify the ideas you have in mind, but look for sources that contradict your point of
view.
Is there anything people seem to overlook in the sources you research?
Are there any heated debates you can address?
Do you have a unique take on your topic?
8|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Have there been some recent developments that build on the extant research?
Your first draft won’t be perfect you can polish later on. Your priorities at this stage are as
follows:
There are four main considerations when it comes to the second draft.
1. Check how your vision of the paper lines up with the first draft and, more importantly,
that your paper still answers the assignment.
2. Identify any assumptions that might require (more substantial) justification, keeping your
reader’s perspective foremost in mind. Remove these points if you cannot substantiate
them further.
3. Be open to rearranging your ideas. Check whether any sections feel out of place and
whether your ideas could be better organized.
4. If you find that old ideas do not fit as well as you anticipated, you should cut them out or
condense them. You might also find that new and well-suited ideas occurred to you
during the writing of the first draft — now is the time to make them part of the paper.
9|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
CHAPTER 5
Research Ethics
Ethics are a personal code of conduct based on respect for one's self, others and surroundings
and is governed by the principles or assumptions underpinning the way individuals or
organizations ought to conduct themselves. Research ethics involves the application of
fundamental ethical principles to research activities which include the design and
implementation of research, respect towards society and others, the use of resources and research
outputs, scientific misconduct and the regulation of research.
Research ethics provides guidelines for the responsible conduct of research. In addition, it
educates and monitors scientists conducting research to ensure a high ethical standard. The
following is a general summary of some ethical principles:
Beside the subject matter objectives research has the following objectives such as:
The first and comprehensive objective – to guard/protect human participants, their dignity,
rights and welfare.
The second objective – to make sure that research is directed in a manner that assists welfares of
persons, groups and/or civilization as a whole.
The third objective – to inspect particular research events and schemes for their ethical
reliability, considering issues such as the controlling risk, protection of privacy and the
progression of informed consent.
Some of ethical principles that have followed in research to make research is good research are:
Honesty:
Honestly report data, results, methods and procedures, and publication status. Do not fabricate,
falsify, or misrepresent data.
Being honest with the beneficiaries and respondents. Being honest about the findings and methodology of the
research. Being honest with other direct and indirect stakeholders.
Objectivity:
Strive to avoid bias in experimental design, data analysis, data interpretation, peer review,
personnel decisions, grant writing, expert testimony, and other aspects of research.
Avoiding bias in experimental design, data analysis, data interpretation, peer review, and other aspects of
research.
Integrity:
Keep your promises and agreements; act with sincerity; strive for consistency of thought and
action.
2|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Ensuring honesty and sincerity. Fulfilling agreements and promises. Do not create false expectations or make
false promises.
Carefulness:
Avoid careless errors and negligence; carefully and critically examine your own work and the
work of your peers. Keep good records of research activities.
Openness:
Share data, results, ideas, tools, resources. Be open to criticism and new ideas.
Be open to sharing results, data and other resources. Also accept encouraging comments and constructive
feedback.
Honor patents, copyrights, and other forms of intellectual property. Do not use unpublished data,
methods, or results without permission. Give credit where credit is due. Never plagiarize.
Confidentiality:
Use of research
Methods which will be used to protect anonymity and confidentiality of the participant
Who to contact if the participant needs additional information about the research.
3|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Responsible Publication:
Publish in order to advance research and scholarship, not to advance just your own career. Avoid
wasteful and duplicative publication.
Responsible Mentoring:
Help to educate, mentor, and advise students. Promote their welfare and allow them to make
their own decisions.
Social Responsibility:
Strive to promote social good and prevent or mitigate social harms through research, public
education, and advocacy.
Non-Discrimination:
Avoid discrimination against colleagues or students on the basis of sex, race, ethnicity, or other
factors that are not related to their scientific competence and integrity.
Avoid discrimination on the basis of age, sex, race, ethnicity or other factors that are violation of human rights
and are not related to the study.
Competence:
Maintain and improve your own professional competence and expertise through lifelong
education and learning; take steps to promote competence in science as a whole. You have to
protect your data from any threats that can attack it.
As a researcher you have to consider all possible sources of harm to participants. Harm can come
in different forms as follows:
Psychological harm: sensitive questions or asks may trigger negative emotions such
shame and or anxiety.
Social harm: participation can involves risks, public embarrassment, or stigma.
Physical harm: pain or injury can result from the study procedures.
4|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Legality:
Know and obey relevant laws and institutional and governmental policies.
Animal Care:
Show proper respect and care for animals when using them in research. Do not conduct
unnecessary or poorly designed animal experiments.
When conducting research on human subjects, minimize harms and risks and maximize benefits;
respect human dignity, privacy, and autonomy.
For subjects:
Possibilities to physical integrity, containing those linked with experimental drugs and
dealings and with other involvements that will be used in the study (e.g. measures used to
observe research participants, such as blood sampling, X-rays or lumbar punctures).
Psychological risks: for example, a questionnaire may perhaps signify a risk if it fears
traumatic events or happenings that are especially traumatic.
5|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Social, legal and economic risks: for example, if personal information collected during a
study is unintentionally released, participants might face a threat of judgment and
stigmatization.
Certain tribal or inhabitant groups may possibly suffer from discrimination or
stigmatization, burdens because of research, typically if associates of those groups are
recognized as having a greater-than-usual risk of devouring a specific disease.
The research may perhaps have an influence on the prevailing health system: for example,
human and financial capitals dedicated to research may distract attention from other
demanding health care necessities in the community.
Resolve on the appropriate ethical action and be willing to deal with divergent point of view.
Plagiarism means submitting others’ works as your own. Although it can be unintentional,
copying someone else work without proper credit amounts to stealing. It is an ethical problem in
research communication because you may benefit by harming others researchers. The
appropriation of another person's ideas, processes, results, or words without giving appropriate
credit.
6|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Plagiarism also define as it is unethical practice of using words or ideas (either planned or
accident) of another author/ researcher or your own previous works without proper
acknowledgement.
Self-plagiarism is when you republish or re-submit part of your own papers or reports without
properly citing your original work. This is problematic because you may benefit from presenting
your ideas as new and original even though they have already been published elsewhere in the
past. You may also be infringing on your previous publisher’s copyright, violating an ethical
code or wasting time and resources by doing so. In extreme cases of self-plagiarism, the entire
datasets or papers are sometimes duplicated. These are major ethical violations because they can
skew research findings if taken as original data.
Guard yourself against plagiarism however accidentally it may be. Here are some guidelines to
avoid plagiarism.
a. Paraphrase your contents: do not copy paste the text any references you have to restate the
idea with your own words and ideas. First understand the idea of references you use and
paraphrase correctly.
b. Use quotations: use quotes to indicate that the text has been taken from another paper.
c. Cites your sources: the best way to avoid plagiarism is by self-checking your documents
using plagiarism checker. Any word or ideas that are not you’re won but taken from
another paper need to proper cited. Also cite your own paper if you use your previous paper
published to avoid self-plagiarism.
7|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Obviously, both falsification and fabrication of data and research are extremely serious forms of
misconduct. Primarily because they can result in an inaccurate scientific record that does not
reflect scientific truth. Additionally, research fraud deceives important stakeholders of the
research, like sponsoring institutions, funders, employers, the readers of the research and the
general public.
Any type of research fraud usually involves publishing conclusions, or even data, that were
either made up or changed. There are two different types of research fraud; fabrication and
falsification. Obviously, they are related. However, they are distinctly different.
8|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.
Honesty
Do not lying in the institution and should not provide falsification documents. Also should
not theft intellectual properties example cheating exam or copying other works as your own
(plagiarism).
Fairness
Do not receiving assistance from any other person or using any source of information not
appropriately authorized. Do not try for prior access in academic
Respect
Avoid inappropriate or disrespectful behavior. Do not interfere with other’s works. Do not
misuse of resources of institution
Responsibility
You have to know the standard and policy of institution. Understand any penalty for
violation of institution’s policy or rules. Do not silence when somebody else violet the policy
Trust
There should be trust between you and institution, you and classmate, you and your
colleagues. Presenting information without deception (cheat)
9|Page
Oda Bultum University, Department of Computer Science,
Research Methods in Computer Science,
Compiled by Shambel Ts.