Professional Documents
Culture Documents
MICRO-PROJECT REPORT
Seal of Institute
ACKNOWLEDGEMENT
Title of Micro-Project
Annexure-1
11.0 Action Plan (Sequence and time required for major activity. The following is for Reference, The
Activities can be Added / reduced / Modified)
Name of
Sr. Planned Planned Responsible
Details of activity
No. Week Start Finish Team Members
date date
1 1 &2 Discussion & Finalization of 15/01/2024 17/01/2024 All Members
Topic
2 3 Preparation of the Abstract 20/01/2024 22/01/2024 Sanket kalpande
3 4 Literature Review 25/01/2024 27/01/2024 Sanket kalpande
4 5 Submission of Microproject 29/01/2024 31/01/2024 All Members
Proposal (Annexure-I)
5 6 Collection of information about 01/02/2024 03/02/2024 Shreehari kale
Topic
6 7 Collection of relevant content / 05/02/2024 07/02/2024 Krishna bam
materials for the execution of
Microproject.
7 8 Discussion and submission of 10/02/2024 12/02/2024 All Members
outline of the Microproject.
8 9 Analysis / execution of 20/02/2024 22/02/2024 All Members
Collected data / information and
preparation of Prototypes /
drawings / photos / charts /
graphs / tables / circuits / Models
/ programs etc.
9 10 Completion of Contents of 01/03/2024 03/03/2024 Shreehari kale
Project Report
10 11 Completion of Weekly progress 10/03/2024 12/03/2024 Krishna bam
Report
11 12 Completion of Project Report 01/04/2024 11/04/2024 All Members
(Annexure-II)
12 13 Viva voce / Delivery of
Presentation
12.0 Resources Required (major resources such as raw material, some machining facility,
software etc.)
Micro-Project Report
Format for Micro-Project Report (Minimum 4 pages)
Title of Micro-Project: -
The project's importance lies in addressing the critical need for effective cybersecurity
measures. By leveraging machine learning algorithms for intrusion detection, it enhances
our ability to detect and respond to malicious activities in networks, safeguarding sensitive
information and infrastructure against cyber threats.
Sample: -
1) Intrusion Detection Systems by Rebecca Gurley Bace
2) Network Inrusion Detection : an analyst’s handbook by Stephen Nortcuttsssss
5.0 Actual Methodology Followed (Write step wise work done, data collected and its analysis
(if any). The contribution of individual member may also be noted.)
Give the project a name, such as “”. Right-click on the project and select “New” > “Class”.
Name the first class, for example, “”. Repeat steps 3 and 4 to create another class, such as “Database”.
sr.
Name of Resource/material Specifications Qty Remarks
No.
1 Software tools 2
2 Raw data 4
3 Data set 2
1) IDENTIFYING: identifying the problem and course of problem in the area related and prepare
project proposals before starting the project.
2) SERIVE: Derive different possible solutions creatively.
3) DATA COMMUNICATION: Collect relevant data from different sources (books/the internet/the
market/suppliers/experts and other through survey/interviews).
4) DESIGNING: Designing micro project with minimum required resources (low cost).
5) DEVELOPING: Develop the prototype/model/ of the desired equipment/ machine part etc.
6) TEAMWORK: Learn to work in a team and boost individual confidence.
7) TIME MANAGEMENT: Timely completion of micro project as scheduled.
8) DATA ANALYSIS: Interpretation of data, drawing and analysis of laboratory calculations etc.
9) PROBLEM-SOLVING: Develop good problem-solving skills.
10) SAFETY: Incorporate safety features in products.
11) TECHNICAL WRITING: Prepare a report of the proposed plan and final report.
12) PRESENTATION AND COMMUNICATION SKILLS: Giving working model presentation of
the micro project.
13) CONFIDENCE: Confidently, answer the questions asked about the project.
14) ACKNOWLEDGEMTNT: Acknowledge the help rendered by others in the success of the project.