|
|
xvii | |
Preface |
|
xxi | |
Author Bios |
|
xxiii | |
|
|
|
Chapter 1 Overview of Research |
|
|
3 | (24) |
|
|
4 | (5) |
|
|
4 | (1) |
|
1.1.2 Creative-Build Something New |
|
|
4 | (1) |
|
1.1.3 Systematic-General Pattern |
|
|
5 | (1) |
|
1.1.4 Increase-Acquire and Contribute |
|
|
6 | (1) |
|
1.1.5 The Stock of Knowledge |
|
|
7 | (2) |
|
|
9 | (1) |
|
1.2 The Process Of Research |
|
|
9 | (3) |
|
1.2.1 Intellectual Discovery |
|
|
11 | (1) |
|
|
12 | (2) |
|
1.3.1 So, What Is Good Research? |
|
|
13 | (1) |
|
|
14 | (2) |
|
1.5 Overview Of The Telehealth Systems |
|
|
16 | (6) |
|
|
22 | (2) |
|
|
24 | (3) |
|
Chapter 2 Research Integrity |
|
|
27 | (24) |
|
2.1 Why Is Research Integrity So Important? |
|
|
28 | (1) |
|
2.2 Be The Whistleblower When You See It |
|
|
28 | (2) |
|
2.3 Fundamental Types Of Research Dilemmas |
|
|
30 | (1) |
|
2.4 Falsification/Fabrication Of Data |
|
|
31 | (1) |
|
2.5 Ownership Of Research Materials And Data |
|
|
32 | (1) |
|
|
33 | (2) |
|
2.6.1 Ignorance Is Not A Valid Excuse For Plagiarism |
|
|
34 | (1) |
|
|
35 | (1) |
|
2.6.3 Summary Of Useful Guidelines For Writing |
|
|
35 | (1) |
|
2.7 Authorship/Assignment Of Credit |
|
|
35 | (2) |
|
|
37 | (1) |
|
2.9 Introduction To Cpu Scheduling In Operating System |
|
|
38 | (8) |
|
2.9.1 Cpu Scheduling: Schedulers |
|
|
38 | (2) |
|
2.9.2 Cpu Scheduling: Dispatcher |
|
|
40 | (1) |
|
2.9.3 Cpu Scheduling: Scheduling Criteria |
|
|
41 | (1) |
|
2.9.4 Scheduling Algorithms |
|
|
42 | (1) |
|
2.9.4.1 First Come First Serve Scheduling |
|
|
43 | (1) |
|
2.9.4.2 Shortest Job First Scheduling |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (4) |
|
Section II Find Your Idea Of Research |
|
|
|
Chapter 3 How To Select Research Topics |
|
|
51 | (20) |
|
|
52 | (1) |
|
3.2 Identify An Area Of Interest |
|
|
52 | (2) |
|
3.3 Browse The Literature |
|
|
54 | (1) |
|
3.4 Pick A Topic And Dive |
|
|
55 | (1) |
|
3.5 Identify A Research Question |
|
|
56 | (2) |
|
3.6 List Of Research Topics And Keywords In Computer Science |
|
|
58 | (5) |
|
3.6.1 Artificial Intelligence |
|
|
58 | (1) |
|
3.6.2 Communications And Media |
|
|
59 | (2) |
|
3.6.3 Computer Science And Engineering |
|
|
61 | (2) |
|
3.7 Dynamic Programming In Research And Problem Solving |
|
|
63 | (6) |
|
3.7.1 An Example For Cost Minimization |
|
|
63 | (3) |
|
|
66 | (2) |
|
3.7.3 Industrial And Research Applications Of Dynamic Programming |
|
|
68 | (1) |
|
|
69 | (2) |
|
Chapter 4 Literature Review And Formulating A Problem |
|
|
71 | (24) |
|
4.1 What Is A Literature Review? |
|
|
72 | (1) |
|
4.2 Types Of Literature Reviews |
|
|
73 | (1) |
|
4.2.1 Stand-Alone Literature Review Articles |
|
|
73 | (1) |
|
|
73 | (1) |
|
4.2.3 Research Report In The Workplace |
|
|
74 | (1) |
|
4.3 Common Structure Of Literature Reviews |
|
|
74 | (1) |
|
4.4 What Is The Literature? |
|
|
75 | (1) |
|
4.5 The "Information Cycle" |
|
|
75 | (2) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
4.7 The Published Literature |
|
|
78 | (1) |
|
|
78 | (1) |
|
4.8 How To Find The Literature |
|
|
79 | (1) |
|
4.8.1 Computer Science Research Databases |
|
|
80 | (1) |
|
|
80 | (1) |
|
4.9 Writing The Literature Review |
|
|
80 | (2) |
|
4.10 Key Points When Writing A Literature Review |
|
|
82 | (1) |
|
4.11 Adaptive Resource Allocation In Cloud Systems |
|
|
83 | (9) |
|
4.11.1 Types Of Cloud Computing |
|
|
84 | (1) |
|
4.11.1.1 Iaas (Infrastructure As A Service) |
|
|
85 | (1) |
|
4.11.1.2 Paas (Platform As A Service) |
|
|
86 | (1) |
|
4.11.1.3 Saas (Software As A Service) |
|
|
87 | (1) |
|
4.11.1.4 Cloud Computing Vs. Traditional Web Hosting |
|
|
88 | (1) |
|
4.11.2 Task Scheduling In Cloud Computing Systems |
|
|
88 | (1) |
|
4.11.2.1 Model Of Task Scheduling |
|
|
88 | (4) |
|
|
92 | (1) |
|
|
93 | (2) |
|
Chapter 5 How To Generate Research Ideas |
|
|
95 | (22) |
|
|
96 | (1) |
|
5.2 Collect Hunches Ready To Be Stitched Together Later |
|
|
96 | (1) |
|
5.3 Connect Your Hunches With The Hunches Of Others |
|
|
97 | (1) |
|
|
97 | (1) |
|
5.5 Make Space For Hunches To Incubate |
|
|
98 | (1) |
|
5.6 Actively Look For The Idea Fits You |
|
|
98 | (8) |
|
5.6.1 Acquire The Ability To Read And Improve Your Taste |
|
|
99 | (2) |
|
5.6.2 Recognize The Trends Associated With The Development Of Research Ideas |
|
|
101 | (4) |
|
5.6.3 Make It A Habit To Think About Research Ideas |
|
|
105 | (1) |
|
5.7 Cyber Security Against Buffer Overflow Attacks |
|
|
106 | (7) |
|
5.7.1 Buffer Overflow Exploits |
|
|
108 | (1) |
|
5.7.2 Buffer Overflow Consequences |
|
|
108 | (1) |
|
5.7.3 Why C/C++ Are More Vulnerable To Buffer Overflows? |
|
|
109 | (1) |
|
5.7.4 Buffer Overflow Attack Examples |
|
|
110 | (2) |
|
5.7.5 How Can We Mitigate Buffer Overflows? |
|
|
112 | (1) |
|
|
113 | (4) |
|
Section III Bring Your Idea To The Reality |
|
|
|
Chapter 6 How To Design Algorithms |
|
|
117 | (20) |
|
|
117 | (1) |
|
6.2 The Importance Of Algorithms In Computer Science |
|
|
118 | (1) |
|
6.3 How People Benefit From Algorithms |
|
|
119 | (1) |
|
6.4 Algorithms Design Techniques |
|
|
119 | (3) |
|
6.5 Questions For Yourself |
|
|
122 | (1) |
|
6.6 The Useful List Of Questions |
|
|
123 | (3) |
|
6.7 Introduction To Heterogeneous Memory Architecture |
|
|
126 | (8) |
|
6.7.1 Introduction And Basic Concepts |
|
|
127 | (2) |
|
6.7.2 Overview Of Scratchpad Memory Management |
|
|
129 | (2) |
|
6.7.3 Basics Of The System Model |
|
|
131 | (3) |
|
|
134 | (2) |
|
|
136 | (1) |
|
Chapter 7 How To Do Experiments |
|
|
137 | (22) |
|
7.1 The Importance Of Experiments In Computer Science |
|
|
138 | (1) |
|
7.2 Experimentation In Computer Science |
|
|
138 | (5) |
|
7.2.1 Empirical Dimensions |
|
|
139 | (1) |
|
7.2.2 Subjects And Topics |
|
|
140 | (1) |
|
|
141 | (2) |
|
7.3 Five Perspectives On Experimentation In Computer Science |
|
|
143 | (3) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
7.4 Machine Learning Experimental Pipelines |
|
|
146 | (3) |
|
7.4.1 How A Machine Learning Model Is Built |
|
|
147 | (2) |
|
7.5 An Adaptive Genetic Algorithm For Memory Allocation |
|
|
149 | (8) |
|
7.5.1 An Adaptive Genetic Solution |
|
|
151 | (2) |
|
7.5.2 Genetic Algorithm Operations |
|
|
153 | (4) |
|
|
157 | (2) |
|
Chapter 8 How To Write A Paper |
|
|
159 | (20) |
|
|
160 | (1) |
|
|
161 | (2) |
|
8.3 General Paper Structure In Computer Science |
|
|
163 | (2) |
|
|
163 | (1) |
|
|
163 | (1) |
|
8.3.3 Main Body Structure |
|
|
164 | (1) |
|
8.4 Effectively Use Tables And Figures To Better Elaborate Your Ideas |
|
|
165 | (5) |
|
|
166 | (1) |
|
|
167 | (1) |
|
8.4.3 Common Errors When Using Tables And Figures |
|
|
168 | (2) |
|
|
170 | (1) |
|
8.6 Set Up Your Personal Deep Learning Environment - Selection Of The Hardware |
|
|
171 | (5) |
|
|
171 | (1) |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
175 | (1) |
|
8.6.9 Final Checking List Before Your Shoping |
|
|
175 | (1) |
|
|
176 | (3) |
|
Section IV Put Your Work Out And Make Impacts |
|
|
|
Chapter 9 Paper Submission And Publication |
|
|
179 | (18) |
|
9.1 Choosing Where To Submit Your Paper |
|
|
179 | (5) |
|
9.1.1 Why Preferring Conferences? |
|
|
182 | (1) |
|
9.1.2 Why Preferring Journals? |
|
|
183 | (1) |
|
9.2 How To Submit A Research Paper To A Journal Or Conference |
|
|
184 | (2) |
|
9.3 How To Write Rebuttals And Replies? |
|
|
186 | (3) |
|
9.4 Set Up Your Deep Learning Environment - Software Level |
|
|
189 | (4) |
|
9.4.1 Install Graphics Drivers |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
9.4.4 Install And Manage Deep Learning Frameworks |
|
|
192 | (1) |
|
|
193 | (4) |
|
Chapter 10 Reference And Research Impact |
|
|
197 | (22) |
|
|
198 | (1) |
|
10.2 Purpose Of Citing References |
|
|
198 | (1) |
|
10.3 Organization Of References |
|
|
198 | (1) |
|
10.4 Citation And Reference Formats |
|
|
199 | (2) |
|
10.5 Authors' Responsibilities |
|
|
201 | (1) |
|
10.6 Tasks Related To References |
|
|
202 | (4) |
|
10.6.1 Choosing References For Citation |
|
|
202 | (2) |
|
10.6.2 Inducting Citations In The Text |
|
|
204 | (1) |
|
10.6.3 Preparing The Reference List |
|
|
205 | (1) |
|
10.7 Machine Learning And Adversarial Learning - The Bug Of Mls |
|
|
206 | (10) |
|
10.7.1 Overview On Ml Models |
|
|
207 | (1) |
|
|
208 | (1) |
|
10.7.3 Adversarial Attacks On Dnns |
|
|
208 | (3) |
|
10.7.4 Existing Defenses For Poisoning Attacks |
|
|
211 | (2) |
|
10.7.5 Existing Defenses For Evasion Attacks |
|
|
213 | (3) |
|
|
216 | (3) |
|
Chapter 11 Resource, Advisor, And Time Management |
|
|
219 | (14) |
|
|
219 | (1) |
|
11.2 General Techniques For Time Managements |
|
|
220 | (4) |
|
11.3 Productivity And Research Writing |
|
|
224 | (1) |
|
11.4 Think Twice Before Accept A Request - How You Can Better Concentrate On Your Main Timeline? |
|
|
225 | (4) |
|
|
229 | (4) |
|
Section V Recap And Conclusion |
|
|
|
Chapter 12 Critical Remarks And Chapters Recap |
|
|
233 | (12) |
|
12.1 Overview Of The Recap |
|
|
233 | (1) |
|
12.2 Introduction To Computer Science Research |
|
|
234 | (1) |
|
12.3 Find Your Ideas For Research |
|
|
235 | (1) |
|
12.4 Bring Your Ideas To The Reality |
|
|
236 | (1) |
|
12.5 Put Your Work Out And Make Impacts |
|
|
236 | (3) |
|
12.6 Homework And Practices |
|
|
239 | (3) |
|
|
239 | (1) |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
12.8 Possible Projects Or Presentations |
|
|
243 | (2) |
Bibliography |
|
245 | (38) |
Index |
|
283 | |