Atjaunināt sīkdatņu piekrišanu

Research and Technical Writing for Science and Engineering [Hardback]

(Pace University, New York City, New York, USA), ,
  • Formāts: Hardback, 318 pages, height x width: 234x156 mm, weight: 571 g, 60 Line drawings, black and white; 60 Illustrations, black and white
  • Izdošanas datums: 28-Feb-2022
  • Izdevniecība: CRC Press
  • ISBN-10: 0367687844
  • ISBN-13: 9780367687847
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 145,75 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Hardback, 318 pages, height x width: 234x156 mm, weight: 571 g, 60 Line drawings, black and white; 60 Illustrations, black and white
  • Izdošanas datums: 28-Feb-2022
  • Izdevniecība: CRC Press
  • ISBN-10: 0367687844
  • ISBN-13: 9780367687847
Citas grāmatas par šo tēmu:
"Engineering and science research can be difficult for beginners because scientific research is fraught with constraints and disciplines. Research and Technical Writing for Science and Engineering breakdowns the entire process of conducting engineering and scientific research. This book covers those fascinating guidelines and topics on conducting research, as well as how to better interact with your advisor. Key Features: advice on conducting a literature review, conducting experiments, and writing a good paper summarizing your findings. provides a tutorial on how to increase the impact of research and how to manage research resources. By reflecting on the cases discussed in this book, readers will be able to identify specific situations or dilemmas in their own lives, as the authors provide comprehensive suggestions based on their own experiences"--

Engineering and science research can be difficult for beginners because scientific research is fraught with constraints and disciplines. Research and Technical Writing for Science and Engineering breakdowns the entire process of conducting engineering and scientific research.

List of Figures
xvii
Preface xxi
Author Bios xxiii
Section I Introduction
Chapter 1 Overview of Research
3(24)
1.1 What Is Research?
4(5)
1.1.1 Definition
4(1)
1.1.2 Creative-Build Something New
4(1)
1.1.3 Systematic-General Pattern
5(1)
1.1.4 Increase-Acquire and Contribute
6(1)
1.1.5 The Stock of Knowledge
7(2)
1.1.6 Summary
9(1)
1.2 The Process Of Research
9(3)
1.2.1 Intellectual Discovery
11(1)
1.3 Classifying Research
12(2)
1.3.1 So, What Is Good Research?
13(1)
1.4 Research Methods
14(2)
1.5 Overview Of The Telehealth Systems
16(6)
1.6 Keyword Explanation
22(2)
1.7 Summary
24(3)
Chapter 2 Research Integrity
27(24)
2.1 Why Is Research Integrity So Important?
28(1)
2.2 Be The Whistleblower When You See It
28(2)
2.3 Fundamental Types Of Research Dilemmas
30(1)
2.4 Falsification/Fabrication Of Data
31(1)
2.5 Ownership Of Research Materials And Data
32(1)
2.6 Plagiarism
33(2)
2.6.1 Ignorance Is Not A Valid Excuse For Plagiarism
34(1)
2.6.2 Paraphrasing
35(1)
2.6.3 Summary Of Useful Guidelines For Writing
35(1)
2.7 Authorship/Assignment Of Credit
35(2)
2.8 Confidentiality
37(1)
2.9 Introduction To Cpu Scheduling In Operating System
38(8)
2.9.1 Cpu Scheduling: Schedulers
38(2)
2.9.2 Cpu Scheduling: Dispatcher
40(1)
2.9.3 Cpu Scheduling: Scheduling Criteria
41(1)
2.9.4 Scheduling Algorithms
42(1)
2.9.4.1 First Come First Serve Scheduling
43(1)
2.9.4.2 Shortest Job First Scheduling
44(2)
2.10 Keyword Explanation
46(1)
2.11 Summary
47(4)
Section II Find Your Idea Of Research
Chapter 3 How To Select Research Topics
51(20)
3.1 Overview
52(1)
3.2 Identify An Area Of Interest
52(2)
3.3 Browse The Literature
54(1)
3.4 Pick A Topic And Dive
55(1)
3.5 Identify A Research Question
56(2)
3.6 List Of Research Topics And Keywords In Computer Science
58(5)
3.6.1 Artificial Intelligence
58(1)
3.6.2 Communications And Media
59(2)
3.6.3 Computer Science And Engineering
61(2)
3.7 Dynamic Programming In Research And Problem Solving
63(6)
3.7.1 An Example For Cost Minimization
63(3)
3.7.2 Greedy Vs. Dynamic
66(2)
3.7.3 Industrial And Research Applications Of Dynamic Programming
68(1)
3.8 Summary
69(2)
Chapter 4 Literature Review And Formulating A Problem
71(24)
4.1 What Is A Literature Review?
72(1)
4.2 Types Of Literature Reviews
73(1)
4.2.1 Stand-Alone Literature Review Articles
73(1)
4.2.2 Research Proposal
73(1)
4.2.3 Research Report In The Workplace
74(1)
4.3 Common Structure Of Literature Reviews
74(1)
4.4 What Is The Literature?
75(1)
4.5 The "Information Cycle"
75(2)
4.5.1 Primary Sources
76(1)
4.5.2 Secondary Sources
77(1)
4.5.3 Tertiary
77(1)
4.6 Working Backwards
77(1)
4.7 The Published Literature
78(1)
4.7.1 Peer Review
78(1)
4.8 How To Find The Literature
79(1)
4.8.1 Computer Science Research Databases
80(1)
4.8.2 Footnote Chasing
80(1)
4.9 Writing The Literature Review
80(2)
4.10 Key Points When Writing A Literature Review
82(1)
4.11 Adaptive Resource Allocation In Cloud Systems
83(9)
4.11.1 Types Of Cloud Computing
84(1)
4.11.1.1 Iaas (Infrastructure As A Service)
85(1)
4.11.1.2 Paas (Platform As A Service)
86(1)
4.11.1.3 Saas (Software As A Service)
87(1)
4.11.1.4 Cloud Computing Vs. Traditional Web Hosting
88(1)
4.11.2 Task Scheduling In Cloud Computing Systems
88(1)
4.11.2.1 Model Of Task Scheduling
88(4)
4.12 Keyword Explanation
92(1)
4.13 Summary
93(2)
Chapter 5 How To Generate Research Ideas
95(22)
5.1 Be Patient
96(1)
5.2 Collect Hunches Ready To Be Stitched Together Later
96(1)
5.3 Connect Your Hunches With The Hunches Of Others
97(1)
5.4 Diverse Minds
97(1)
5.5 Make Space For Hunches To Incubate
98(1)
5.6 Actively Look For The Idea Fits You
98(8)
5.6.1 Acquire The Ability To Read And Improve Your Taste
99(2)
5.6.2 Recognize The Trends Associated With The Development Of Research Ideas
101(4)
5.6.3 Make It A Habit To Think About Research Ideas
105(1)
5.7 Cyber Security Against Buffer Overflow Attacks
106(7)
5.7.1 Buffer Overflow Exploits
108(1)
5.7.2 Buffer Overflow Consequences
108(1)
5.7.3 Why C/C++ Are More Vulnerable To Buffer Overflows?
109(1)
5.7.4 Buffer Overflow Attack Examples
110(2)
5.7.5 How Can We Mitigate Buffer Overflows?
112(1)
5.8 Summary
113(4)
Section III Bring Your Idea To The Reality
Chapter 6 How To Design Algorithms
117(20)
6.1 Overview
117(1)
6.2 The Importance Of Algorithms In Computer Science
118(1)
6.3 How People Benefit From Algorithms
119(1)
6.4 Algorithms Design Techniques
119(3)
6.5 Questions For Yourself
122(1)
6.6 The Useful List Of Questions
123(3)
6.7 Introduction To Heterogeneous Memory Architecture
126(8)
6.7.1 Introduction And Basic Concepts
127(2)
6.7.2 Overview Of Scratchpad Memory Management
129(2)
6.7.3 Basics Of The System Model
131(3)
6.8 Keyword Explanation
134(2)
6.9 Summary
136(1)
Chapter 7 How To Do Experiments
137(22)
7.1 The Importance Of Experiments In Computer Science
138(1)
7.2 Experimentation In Computer Science
138(5)
7.2.1 Empirical Dimensions
139(1)
7.2.2 Subjects And Topics
140(1)
7.2.3 Activities
141(2)
7.3 Five Perspectives On Experimentation In Computer Science
143(3)
7.3.1 Feasibility
143(1)
7.3.2 Trial
144(1)
7.3.3 Field
144(1)
7.3.4 Comparison
145(1)
7.3.5 Controlled
146(1)
7.4 Machine Learning Experimental Pipelines
146(3)
7.4.1 How A Machine Learning Model Is Built
147(2)
7.5 An Adaptive Genetic Algorithm For Memory Allocation
149(8)
7.5.1 An Adaptive Genetic Solution
151(2)
7.5.2 Genetic Algorithm Operations
153(4)
7.6 Summary
157(2)
Chapter 8 How To Write A Paper
159(20)
8.1 Research You Topic
160(1)
8.2 Drafting Your Essay
161(2)
8.3 General Paper Structure In Computer Science
163(2)
8.3.1 Title
163(1)
8.3.2 Abstract
163(1)
8.3.3 Main Body Structure
164(1)
8.4 Effectively Use Tables And Figures To Better Elaborate Your Ideas
165(5)
8.4.1 Using Tables
166(1)
8.4.2 Using Figures
167(1)
8.4.3 Common Errors When Using Tables And Figures
168(2)
8.5 Revise Your Paper
170(1)
8.6 Set Up Your Personal Deep Learning Environment - Selection Of The Hardware
171(5)
8.6.1 Gpus
171(1)
8.6.2 Cpus
172(2)
8.6.3 Rams
174(1)
8.6.4 Motherboard
174(1)
8.6.5 Storage
174(1)
8.6.6 Power Supply Unit
174(1)
8.6.7 Cooling
175(1)
8.6.8 Case
175(1)
8.6.9 Final Checking List Before Your Shoping
175(1)
8.7 Summary
176(3)
Section IV Put Your Work Out And Make Impacts
Chapter 9 Paper Submission And Publication
179(18)
9.1 Choosing Where To Submit Your Paper
179(5)
9.1.1 Why Preferring Conferences?
182(1)
9.1.2 Why Preferring Journals?
183(1)
9.2 How To Submit A Research Paper To A Journal Or Conference
184(2)
9.3 How To Write Rebuttals And Replies?
186(3)
9.4 Set Up Your Deep Learning Environment - Software Level
189(4)
9.4.1 Install Graphics Drivers
191(1)
9.4.2 Install Cuda
191(1)
9.4.3 Install Cudnn
192(1)
9.4.4 Install And Manage Deep Learning Frameworks
192(1)
9.5 Summary
193(4)
Chapter 10 Reference And Research Impact
197(22)
10.1 Introduction
198(1)
10.2 Purpose Of Citing References
198(1)
10.3 Organization Of References
198(1)
10.4 Citation And Reference Formats
199(2)
10.5 Authors' Responsibilities
201(1)
10.6 Tasks Related To References
202(4)
10.6.1 Choosing References For Citation
202(2)
10.6.2 Inducting Citations In The Text
204(1)
10.6.3 Preparing The Reference List
205(1)
10.7 Machine Learning And Adversarial Learning - The Bug Of Mls
206(10)
10.7.1 Overview On Ml Models
207(1)
10.7.2 Overview Of Dnns
208(1)
10.7.3 Adversarial Attacks On Dnns
208(3)
10.7.4 Existing Defenses For Poisoning Attacks
211(2)
10.7.5 Existing Defenses For Evasion Attacks
213(3)
10.8 Summary
216(3)
Chapter 11 Resource, Advisor, And Time Management
219(14)
11.1 Introduction
219(1)
11.2 General Techniques For Time Managements
220(4)
11.3 Productivity And Research Writing
224(1)
11.4 Think Twice Before Accept A Request - How You Can Better Concentrate On Your Main Timeline?
225(4)
11.5 Summary
229(4)
Section V Recap And Conclusion
Chapter 12 Critical Remarks And
Chapters Recap
233(12)
12.1 Overview Of The Recap
233(1)
12.2 Introduction To Computer Science Research
234(1)
12.3 Find Your Ideas For Research
235(1)
12.4 Bring Your Ideas To The Reality
236(1)
12.5 Put Your Work Out And Make Impacts
236(3)
12.6 Homework And Practices
239(3)
12.6.1 Homework One
239(1)
12.6.2 Homework Two
240(1)
12.6.3 Homework Three
241(1)
12.7 Final Project
242(1)
12.8 Possible Projects Or Presentations
243(2)
Bibliography 245(38)
Index 283
Meikang Qiu received the BE and ME degrees from Shanghai Jiao Tong University and received the PhD degree of Computer Science from University of Texas at Dallas. Currently, he is the Department Head and tenured full professor of Texas A&M University Commerce. He is an ACM Distinguished Member and IEEE Senior member. He is also the Highly Cited Researcher in 2021 from Web of Science and IEEE Distinguished Visitor in 2021-2022. He is the Chair of IEEE Smart Computing Technical Committee. His research interests include Cyber Security, Big Data Analysis, Cloud Computing, Smarting Computing, Intelligent Data, Embedded systems, etc.

Han Qiu received the BE degree from Beijing University of Posts and Telecommunications and received the ME degree and PhD degree in Computer Networks from Telecom-ParisTech. He is currently an assistant professor in the Institute for Network Sciences and Cyberspace at Tsinghua University. His research interests include AI Security, Big Data Security, Internet of Things, Cloud Computing, etc. He won the best paper awards of the ICA3PP 2020 and SmartCom 2019. He has published 40+ peer-reviewed journal and conference papers. He served as the program chair for the KSEM 2021 and the IEEE ISPA 2021.

Yi Zeng is a first-year PhD student in Computer Engineering at Virginia Tech. He earned his BE in Electronic and Information Engineering from Xidian University and his MS in Machine Learning and Data Science from the University of California, San Diego. His research interests include trustworthy machine learning, AI security, and the reliable data market for ML. He received the best paper award at the ICA3PP 2020.