Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


THE STRUCTURE OF THE INTRODUCTION



PREFACE

The textbook aims to develop postgraduate students’ writing skills necessary for science communication helping them to better understand authentic texts in different domains of information technology and report their research findings.

An information technology research paper written for publication in one of International scientific journals, like any other research paper, is supposed to consist of the following sections:

· Title;

· Abstract;

· Introduction;

· Main body;

· Conclusions;

· Acknowledgements;

· References.

However, the number of sections and their names can vary in different journals.

The paper written in English must be well presented at a conference when needed. Thus, some information and advice consistent with appropriate self-study activities are provided for students who are planning their scientific career.

The textbook is structured as follows.

· The Preface gives a review of issues that must be studied when building skills in academic writing in English.

· Part I (Sections 1.1-1.6) presents the structure of a research paper, the knowledge of which is essential for young researchers. Every section gives a full explanation of how to write each part of the scientific paper including both methodological recommendations and a sufficient number of exercises that can be chosen by a teacher depending on students’ language skills, proficiency and syllabus.

· Part II (Sections 2.1-2.3) provides authentic materials from conference announcements. The analysis of a number of Calls for papers boosts students’ vocabulary, which helps them to easily find the right conference, register and submit a paper in accordance with their scientific interests.

 



TITLE AND KEYWORDS

Focus on theory

Every paper starts with the Title, after which one can find the names of the authors, their affiliation, post and e-mail addresses and the institution where research was done. Then goes the Abstract, at the end of which there is a list of keywords.

Every word in the title should be meaningful. The title is supposed to be simple and accurately reflect the investigation in order to attract the right kind of readers. As a matter of fact, it should be short and indicate what is written in the paper itself.

    Usually titles are incomplete sentences but they can be in a question form as well. If the title is an incomplete sentence, no period is placed at the end of the sentence. If the title is a question, which is rather rare, there must be a question mark at the end of it.

    All the words in the title are often capitalized, apart from articles, prepositions and conjunctions. This is always specified in a template. If the title consists of two parts, they are divided by a colon. Remember that the first word after the colon is written with a capital letter no matter what part of speech it may be.

    One important issue is the use of the articles in the title. The title is more often an incomplete sentence (containing nouns, infinitives, gerunds), that is why it should conform to the rules of English Grammar. Consequently you can use either definite or indefinite articles if you need.

    The prepositions that are frequently used in the title are by (how something is done), for (for the purpose of), from (the origin of), in/on (where something is located; what something regards), and of (belonging to, regarding).

Note: The title should consist of 6-10 words and include the words relevant for your research area and attract the reader’s attention.

The keywords are more often nouns. Remember to choose nouns very carefully. Avoid using a string of nouns otherwise clarity might be lost. The adjectives that have been chosen should show the uniqueness of the work.

Exercise 1.1. Read the title and keywords below and answer the following questions.

• How many words does the title consist of?

• What parts of speech does it consist of?

• Are there any keywords in the title?

• What parts of speech are usually capitalized?

• Are there any prepositions? What do they mean?

DOUBLY STOCHASTIC POISSON PROCESS

AND THE PRICING OF CATASTROPHE REINSURANCE CONTRACT

Ji-Wook Jang

Actuarial Studies, The University of New South Wales

Sydney NSW 2052, Australia

Tel.: +61 2 9385 3360, Fax: +61 2 9385 1883, Email: [email protected]

 

KEYWORDS

Doubly stochastic Poisson process. Shot noise process. Piecewise deterministic Markov process theory. Stoploss reinsurance contract. Equivalent martingale probability measure. Esscher transform.

 

Exercise 1.2. Read the title and keywords below and answer the questions.

• Does the title attract the right kind of readers? Why?

• What parts of speech does it consist of?

• Does it have a definite and concise indication of what is written in the paper itself?

• What information about the authors is given? Is it complete or not?

A Cross-Cultural Comparative Study of Users’ Perceptions

of a Webpage: With a Focus on the Cognitive Styles of

Chinese, Koreans and Americans

Ying Dong * and Kun-Pyo Lee

Industrial Design Department, KAIST, Daejeon, Korea

    Keywords – Cross-Cultural Study, Cognitive Style, Webpage Perception, Eye Tracking.

 

Exercise 1.3. Read the information below and answer the questions.

• What keywords for the paper with this title might be?

• What parts of speech are capitalized?

• Are there punctuation marks in the title?

Design pattern recovery through visual language parsing and source code analysis

Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino *, Michele Risi

Dipartimento di Matematica e Informatica, Universita di Salerno, Via Ponte Don Melillo, 84084 Fisciano (SA), Italy

a r t i c l e i n f o

Article history:

Received 23 October 2008

Received in revised form 5 February 2009

Accepted 5 February 2009

Available online 20 February 2009

 

 

ABSTRACT

Focus on theory

A.Wallwork distinguishes four main types of abstracts (Wallwork, 2013). Their function is to summarize the research. That is why they are sometimes called Summaries.

    An unstructured abstract consists of one paragraph (100-250 words) and contains a very brief summary of the paper.

    A structured abstract consists of two or even more paragraphs and also contains a brief summary of the paper. 

    An extended abstract is organized as a full paper (e.g. Introduction, Methods, Discussion...), but much shorter (two to four pages). According to the requirements the abstract is optional.

    A conference abstract is usually an extended abstract (up to 500 words) written for the conference.

           The type of abstract depends on the journal or conference where you are going to submit your paper. The instructions to the authors are always given in a template. 

    It is common practice to write the draft of the abstract. It can be used as a plan of the paper. When the paper has been completed, the abstract is written.  

    In the abstract, the author should describe:

• aim of research;  

• methods of study;

• results of research;

• conclusions and/or recommendations.

    The styles that are used for writing abstracts can be personal or impersonal.

Personal way:  

We discovered that …

The authors discovered that …

Impersonal way:

It was discovered that …

    The most commonly used tenses in abstracts are:

The p r e s e n t   s i m p l e (we show)

The p a s t   s i m p l e (we showed)

The p r e s e n t  p e r f e c t (we have shown)

    The link words are very important in the abstract. The most frequently used are however, otherwise, instead, moreover, also, in this paper, consequently in addition.

The use of keywords

The keywords are of great importance because the readers stick to the keywords in their search for information. That is why the authors must have the keywords not only in the title but in the abstract of the article as well. It is recommended that the keywords should not be repeated more than 3 times in the abstract.

PART A

Exercise 2.1. Read and analyze the Abstract below.

ABSTRACT

Distributed object technology... object oriented programming even more powerful and efficient by making use of the objects that are available on different systems connected on a heterogeneous network, in addition to the locally defined objects. Wide range of hardware platforms and variety of operating systems... inter-connected at the software level and... a more robust and comprehensive solution for today’s Internet driven businesses. Internet itself... an important role as a backbone for this technology. As the scope of the application code... to single source, platform or language, maximum attention... to the security of the applications. The objective of this paper... to give a brief introduction to distributed object technology and an overview of security features available in Microsoft.NET and CORBA. The paper... the architecture of.NET and... some of its key security concepts like Security Policy, Code Access Security, Role Based Security, Verification and Stackwalk. It also... CORBA and its security concepts like CORBA Security Services, Security Specifications, Security Policy, Domain Access Policy and Delegation. The paper... by explaining the way in which some key security concerns... in.NET and CORBA.

Exercise 2.2. Make the abstract complete using the following words: is not restricted, explains (2), makes, are addressed, is, must be paid, can be, covers, plays, deliver, concludes.

Exercise 2.3. Make the list of keywords for the Abstract given above.

Exercise 2.4. Make the heading of the paper using the words given below:

Security Perspective Technology: Object Distributed.

Exercise 2.5. Think of the definitions for the highlighted words in the Abstract.

Exercise 2.6. Fill in the prepositions at of on to (2) in to make word combinations complete.

1. available … different systems

2. inter-connected … the software level

3. … addition … the locally defined objects

4. making use … the objects

5. a brief introduction … distributed object technology

Exercise 2.7. Make up sentences with the word combinations given in Ex. 2.6

Exercise 2.8. Boost your vocabulary with the words from the Abstract.

Noun Verb Adjective Adverb
technology concern heterogeneous locally
programming distribute powerful  
variety define efficient  
backbone restrict available  
scope   robust  
objective   comprehensive  
overview      
feature      
specification      
delegation      

 

PART B

Exercise 2.9. Read and analyze the Abstract below.

Abstract

Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares(k) or more. Simple visual cryptography is insecure because of the decryption process done by human visual system. The secret information can be retrieved by anyone if the person gets at least k number of shares. Watermarking is a technique to put a signature of the owner within the creation.

In this current work we have proposed Visual Cryptographic Scheme for color images where the divided shares are enveloped in other images using invisible digital watermarking. The shares are generated using Random Number.

Exercise 2.10. Make the heading of the paper using the words given below:

Watermarking, by, Enveloping, Cryptography, with, Image, Using, Scheme, Visual, Digital, Number, Color, Random, for

Exercise 2.11. Think of the keywords for the article.

Exercise 2.12. Fill in the appropriate link words (you will not need all of them): firstly, secondly, finally, in addition to, also, moreover otherwise, while, but, consequently, in this paper, herein.

Exercise 2.13. Reproduce the Abstract.

PART C

Exercise 2.14. Read and analyze the Abstract below.

  Abstract

Users increasingly rely/ are relying on mobile applications for computational needs. Google Android is a popular mobile platform, hence the reliability of Android applications became/ is becoming increasingly important. Many Android correctness issues, however, fall outside the scope of traditional verification techniques, as they are due to the novelty of the platform and its GUI-oriented application construction paradigm. In this paper we have presented/present an approach for automating the testing process for Android applications, with a focus on GUI bugs. We first conduct/conducted a bug mining study to understand the nature and frequency of bugs affecting Android applications; our study finds/ found that GUI bugs are quite numerous. Next, we present/are presenting techniques for detecting GUI bugs by automatic generation of test cases, feeding the application random events, instrumenting the VM, producing log/trace files and analyzing them post-run. We show/are showing how these techniques helped to re-discover existing bugs and find new bugs, and how they could be used to prevent certain bug categories. We have believed /believe our study and techniques have the potential to help developers increase the quality of Android applications.

Exercise 2.15. Think of the keywords and heading for the article.

Exercise 2.16. Choose the correct form of the verb in italics.

Exercise 2.17. Fill in the appropriate link words (you will not need all of them): to start with, thereafter, in other words, later, next, as a result, hence, however, in conclusion.

Exercise 2.18. Complete the definitions using the word from the text.

1._________ a program or piece of software designed to fulfil a particular purpose.

2._________ the quality of being new, original, or unusual.

3._________ an error in a computer program or system.

4._________ to keep from happening, especially by taking precautionary action.

5._________ to make or become greater in size, degree, frequency, etc.; grow or expand.

Exercise 2.19. Reproduce the Abstract.

Exercise 2.20. Boost your vocabulary with the words from the Abstract.

Noun Verb Adjective Adverb
reliability rely computational increasingly
verification conduct numerous  
novelty affect certain  
paradigm feed    
frequency      
approach      

 

  Part D

Exercise 2.21. Read and analyze the Abstract below.

  Abstract

Object-Role Modeling (ORM) is/has been a method for modeling and querying an information system at the conceptual level, and mapping between conceptual and logical (e.g. relational) levels. ORM will be coming/comes in various flavors, including NIAM (Natural language Information Analysis Method). This article is providing/provides an overview of ORM, and notes/is noting its advantages over Entity Relationship and traditional Object-Oriented modeling.

Exercise 2.22. What might be the keywords and heading of the article?

Exercise 2.23. Choose the correct form of the verb in bold italics.

Exercise 2.24. What is the weakness of this Abstract?

Exercise 2.25. Reproduce the Abstract using the appropriate link words.

Part E

Exercise 2.26. Read and analyze the Abstract below.

Design pattern recovery through visual language parsing and source code analysis

Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino *, Michele Risi

Dipartimento di Matematica e Informatica, Universita di Salerno, Via Ponte Don Melillo, 84084 Fisciano (SA), Italy

a r t i c l e i n f o

Article history:

Received 23 October 2008

Received in revised form 5 February 2009

Accepted 5 February 2009

Available online 20 February 2009

 

Keywords:

Reverse engineering

Design pattern recovery

LR-based parsing

Source code analysis

Abstract

 In this paper/here we (to propose) an approach for recovering structural design patterns from object-oriented source code. The recovery process (to organize) in two phases. In the first phase, the design pattern instances (to identify) at a coarse-grained level by considering the design structure only and/but exploiting a parsing technique used for visual language recognition. Then/herein, the identified candidate patterns (to validate) by a fine-grained source code analysis phase. The recognition process (to support) by a tool, namely/for example design pattern recovery environment, which allowed us to assess the retrieval effectiveness of the proposed approach on six public-domain programs and libraries.

Exercise 2.27. Choose the appropriate link words and retell the abstract.

Exercise 2.28. Put the verbs in brackets in the correct tense form.

Exercise 2.29. Reproduce the Abstract.

PART F

Exercise 2.30. Read the Introduction below.

 

Автоматизация выделения вариантов использования из SADT – диаграмм.

О.А. Змеев, А.Ю. Малиновский

Введение

В настоящее время развитие программного обеспечения идет в сторону усложнения и укрупнения разрабатываемых информационных систем. Эта тенденция связана, с одной стороны, с тем, что современные компьютеры становятся все мощнее, и это позволяет их пользователям предъявлять повышенные требования к кругу задач, которые решаются с их помощью. В качестве другой причины можно указать все возрастающее использование технологий Интернет, которые за чрезвычайно короткий промежуток времени прошли путь от простого форматированного текста к полнофункциональным мультимедийным приложениям. С другой стороны, существует другая тенденция, согласно которой время, отпущенное на разработку программного обеспечения (ПО), существенно сокращается. В этих условиях одной из центральных проблем индустрии ПО становится проблема организации процесса разработки ПО.

В последнее время в индустрии разработки ПО часто используются процессы, основанные на методологии Унифицированного процесса разработки программного обеспечения (UP). К числу таких процессов относится RUP (Rational Unified Process) [1], появившийся в 1995 году в результате слияния процессов Rational Approach и Objectory Process 3.8, процесс ICONIX [2, 3], разработанный Д. Розенбергом, к числу таких процессов достаточно большое число авторов относит и процесс XP [4]. Полностью теоретические концепции, лежащие в основе UP, изложены в [5], в [6] приведен краткий обзор основных идей, на которых базируется процесс.

 Одной из ключевых концепций UP является понятие варианта использования (use case). Обычно UP характеризуется как управляемый вариантами использования, это означает, что команда разработчиков применяет варианты использования для выполнения полного комплекса работ по проекту, начиная с начального сбора информации и заканчивая тестированием готовой программной системы. К сожалению, вопросы, связанные с формированием модели вариантов использования для построения программных систем, на сегодня являются наиболее сложной и наименее формализованной частью UP.

К тому же достаточно часто проекты, связанные с разработкой и внедрением

различного рода информационных систем, происходят в рамках процедуры реинжиниринга бизнес-процессов организации клиента. Ключевыми артефактами этой процедуры являются так называемые модели «IT IS» и «TO BE», для получения которых бизнес-аналитики чаще всего используют методологию SADT [7, 8].

В настоящей работе предлагается подход, позволяющий использовать для по-

строения первого приближения модели вариантов использования диаграммы, полученные в результате SADT-моделирования. Если методология SADT применялась для разработки функциональной модели целевой организации в целом, то предлагаемый подход позволяет построить первое приближение для модели деловых (бизнес) вариантов использования. Если соответствующая SADT-модель декомпозирует функциональность целевой системы, то в качестве результата может быть получено первое приближение модели вариантов использования в обычном смысле. Такой подход, на наш взгляд, с одной стороны, увеличивает степень повторного использования артефактов процесса реинжиниринга, а с другой – позволяет получить первое приближение модели вариантов использования более высокого качества и за более короткие сроки.

Exercise 2.31. Make the list of keywords.

Exercise 2.32. Write out the Abstract of the paper.

Exercise 2.33. Render the text in English using the appropriate link words.

Exercise 2.34. Translate the following sentences from Russian into English.

1. В этой статье описывается метод трассировки лучей с помощью     которого обновляются пути распространения лучей от стационарного источника к мобильному получателю.

2. Эффективность метода была продемонстрирована при интерактивном акустическом дизайне.

3. Предложен алгоритм для автоматизированной идентификации возможностей перестройки кода.

4. Предложенный метод для автоматизированного рефакторинга вносит вклад в упрощение условных утверждений.

5. Экспериментальные результаты показывают, что предложенная нами схема достигает гораздо лучших характеристик, чем существующие схемы компрессии.

6. Шаблоны дизайна широко используются дизайнерами и разработчиками для построения сложных систем.

7. Поскольку информационные системы обычно реализуются на DBMS в основе которой лежит некая модель логических данных, то объектно-ориентированное моделирование включает процедуры для отображения между концептуальным и логическим уровнями.

8. Для правильности, ясности и применимости информационные системы точно определяются прежде всего на концептуальном уровне, при этом используются концепты и язык, которые доступны пониманию человека.

9. Визуальная криптография – это особый тип техники шифрования для того, чтобы скрыть секретную информацию, представленную в виде изображений, которая может быть расшифрована зрительными органами человека.

10. Каждый пиксель оцифрованного цветного изображения, состоящего из 32 битов, делится на 4 части, а именно: альфа, красный, зеленый и голубой, при этом каждый состоит из 8 битов.

Revision

What do you need to know when writing an Abstract?

Self-study activity Write the Abstract for the research paper of your own.

 

Focus on theory

In the Introduction, the background knowledge is presented. The reader finds the tools for understanding the meaning and motivation of the research carried out by the authors.

In the Introduction, the author introduces:

• The description of the problem or establishing a context;

• The literature review;  

• Research gaps in a certain scientific field;

• The gap the author is going to fill;

• The definition of the purpose;

• The results the author has arrived at;

• The structure of the rest of the paper.

The use of tenses

The present simple is generally used at the beginning of the Introduction in order to describe well-known facts. Then it is reasonable to use the Present Perfect to show how long the problem has been studied. To introduce the completed investigations the Past Simple is used. At the end of the Introduction the Present Simple is usually used to outline the structure of the paper.

PART A

Exercise 3.1. Read and analyze the Introduction using the information given above. Put the verbs in brackets into the correct form.

Introduction

1.1 ORM: what is it and why use it?

Object-Role Modeling (ORM) is primarily a method for modeling and querying an information system at the conceptual level. In Europe, the method...  often  ... (call) NIAM (Natural language Information Analysis Method). Since information systems... typically... (implement) on a DBMS that is based on some logical data model (e.g. relational, object-relational, hierarchic), ORM... (include) procedures for mapping between conceptual and logical levels. Although various ORM extensions...   (propose) for process and event modeling, the focus of ORM is on data modeling, since the data perspective is the most stable and it... (provide) a formal foundation on which operations can be defined.

For correctness, clarity and adaptability, information systems... best... (specify) first at the conceptual level, using concepts and language that people can readily understand. Analysis and design...   (involve) building a formal model of the application area or universe of discourse (UoD). To do this properly... (require) a good understanding of the UoD and a means of specifying this understanding in a clear, unambiguous way. Object-Role Modeling... (simplify) this process by using natural language, as well as intuitive diagrams that can be populated with examples, and by expressing the information in terms of elementary relationships.

ORM... (so-call) because it pictures the world in terms of objects (entities or values) that play roles (parts in relationships). For example, you are now playing the role of reading, and this paper is playing the role of being read. In contrast to other modeling techniques such as Entity-Relationship (ER) and Object-Oriented (OO) approaches, ORM makes no explicit use of attributes. For example, instead of using countryBorn as an attribute of Person, we... ( use) the relationship type Person was born in Country. This... (have) many important advantages. Firstly, ORM models and queries are more stable (attributes may evolve into entities or relationships). For example, if we decide to later record the population of a country, then our countryBorn attribute needs to be reformulated as a relationship. Secondly, ORM models may... conveniently... (populate) with multiple instances (attributes make this too awkward). Thirdly, ORM is more uniform (e.g. we don’t need a separate notation for applying the same constraint to an attribute rather than a relationship).

ORM is typically more expressive than ER or OO. Its role-based notation makes it easy to specify a wide variety of constraints, and its object types... (reveal) the semantic domains that bind a schema together. One benefit of this is that conceptual queries may now... (formulate) in terms of schema paths, where moving from one role though an object type to another role amounts to a conceptual join (see later).

Unlike ORM or ER, popular OO models often... (duplicate) information by wrapping facts up into pairs of inverse attributes in different objects. Moreover, OO notations have weak support for constraints (e.g. a constraint might have to be duplicated in different objects, or even ignored). Unfortunately, OO models are less stable than even ER models when the UoD... (evolve). For such reasons, OO models should  ... (use) only for implementation, not for analysis.

Although the detailed picture provided by ORM is desirable in developing and transforming a model, for summary purposes it is useful to hide or compress the display of much of this detail. Various abstraction mechanisms... (exist) for doing this [e.g. CHP96]. If desired, ER and OO diagrams can also  ... (use) for providing compact summaries, and  ... best... (develop) as views of ORM diagrams. For a simple discussion illustrating the points in this section, see [Hal96].

The rest of this article... (provide) a brief history of ORM, summarizes the ORM notation, ... (illustrate) the conceptual design and relational mapping procedures, and  ... (mention) some recent extensions before concluding.

 

Exercise 3.2. Underline the link words that are used in the paper.

Exercise 3.3. Put the link words into the correct column of the table below.

Reason Contrast Listing points Positive addition Example
         

 

Exercise 3.4. Fill in the prepositions  of (2) on (2) to  in to make word combinations complete.

1. the focus of ORM is … data modeling

2. in contrast … other modeling techniques

3. expressing the information … terms … elementary relationships

4. based … some logical data model

5. instead … using countryBorn as an attribute of Person

Exercise 3.5. Make up your own sentences using the word combinations given in Ex. 3.4.

Exercise 3.6. Summarize the Introduction.

Exercise 3.7. Boost your vocabulary with the words from the Introduction.

Noun Verb Adjective Adverb
query implement hierarchic conveniently
adaptability propose conceptual primarily
variety specify compact  
constraint evolve unambiguous  
path reveal awkward  
  simplify explicit  
  conclude separate  
  populate desirable  
  map various  
  bind recent  

 

PART B

Exercise 3.8. Read and analyze the Introduction given below.

PART C

Exercise 3.15. Read and analyze the Introduction given below.

PART D

Exercise 3.23. Read the Abstract and Introduction given below. Compare the information given in the Abstract and Introduction. Choose the correct form of the infinitive.

Introduction

A design pattern can be seen as a set of classes, related through inheritances, aggregations and delegations, which represents a partial solution to a common non-trivial design problem (Gamma et al., 1995). Design patterns are widely used to separate/to have been separating an interface from the different possible implementations, to wrap/to be wrapping legacy systems, to encapsulate/to be encapsulated command requests, to use/to have been used different platforms, and so on (Gamma et al., 1995). They represent a useful technique in forward engineering since they allow reusing successful practices, to improve communication between designers, and to share knowledge between software engineers. However, patterns can also be used/be using for reverse engineering OO software systems in order to capture/to have been captured relevant information on the design and code, and improve program understanding (Antoniol et al., 2001; Brown, 1996; Niere et al., 2002; Shull et al., 1996; Tsantalis et al., 2006a). As a matter of fact, the use of patterns during the design phases affects the corresponding code, and the extraction of design pattern information from design and code can help the comprehension of the adopted solution for a system. This information can be used to highlight/to be highlighted wished properties of the design model, which can be reused/ reuse whenever a similar problem is encountered. Indeed, as also highlighted in Antoniol et al. (2001) when a software system has been designed using documented and well-known design patterns they can exhibit good properties such as modularity, separation of concerns, and ease of extension. Moreover, the information on the recovered design patterns can improve the system documentation and can guide the restructuring of the system. As a matter of fact, the recovery of design pattern instances from design documents and corresponding source code can be crucial for the identification of traceability links between different software artifacts in order to make/to be made the code easier to maintain and modify. In particular, this information can be profitably exploited to highlight/to have highlighted the rationale of implemented solutions in order to support and simplify the conceptual modeling of the system to be restructured/to have been restructured (Antoniol et al., 2001).

According to (Gamma et al., 1995), design patterns are classified as structural, which concentrate on object composition and their relations in the run-time object structures, creational, which address object instantiation issues, and behavioral, which focus on the internal dynamics and object interaction in the system. In this paper we present an approach torecover/to be recovering structural design patterns from OO source code, which is based on the use of visual language grammars and parsing techniques. A preliminary analysis is carried out to extract/to have extracted the structural information needed to recover design patterns. In particular, the class diagram information, such as the name and type of classes, methods, and fields, inheritance and association relationships, and so on, are stored in a suitable data structure that speeds up the recovery process. The recovery process combines a diagram-level analysis, by using a parser for visual languages, with a source code level analysis. In particular, the recovery process is organized in two phases. In the first phase, design pattern instances are identified based on the design structure only by using a recovery technique based on visual language parsing (Costagliola et al., 2005). The design pattern recovery problem is reduced to the problem of recognizing subsentences in a class diagram, where each subsentence corresponds to a design pattern specified by a grammar. In the second phase the identified candidate patterns are validated by performing a source code analysis, which eliminates false positives and consequently increases the precision (Salton and McGill, 1983) of the recovery approach. To validate/to have been validated the proposed design pattern recovery approach, we have developed a tool, named Design Pattern Recovery Environment (DPRE), which supports the whole recovery process.

In this paper, we extend the work presented in Costagliola et al. (2005); Costagliola et al. (2006); De Lucia et al. (2007) by:

– presenting a recovery technique supporting design pattern definitions that include multi-level inheritance relationships;

– providing a detailed description of the proposed approach, including the visual parsing phase and the source code analysis phase;

– presenting a classification and an analysis of the design pattern recovery approaches proposed in the literature;

– evaluating the approach and tool on six public-domain software systems and libraries of different size, ranging from 8 to 560 KLOC;

– providing a detailed comparison with related approaches that used the same software systems for the evaluation.

The paper is organized as follows. In Section 2, we describe related work on design pattern recovery. Section 3 presents the proposed design pattern recovery process while Section 4 describes the tool DPRE supporting it. The results of the case studies are reported and discussed in Section 5. Conclusion and future work are given in Section 6.

Exercise 3.24. Read the Introduction and state:

• the problem under study,

• the existing solutions (literature),

• the best solution,

• the research gap,

• the goal of research,

• the evaluation of research,

• the structure of the paper.

Exercise 3.25. Put the words in the correct order in each sentence.

1. process, The, two, organized, recovery, is, in, phases.

2. case, the, The, discussed, 5, results, are, in, reported, of, studies, Section, and.

3.   information, design, the, Moreover, the, on, recovered, patterns, can, the, system, improve, documentation.

4.  In, source, recovering, paper, we, approach, structural, for, this, an, design, from, object-oriented, propose, code, patterns.

Exercise 3.26. Match the pairs of synonyms. Retell the Introduction using the link words given below.

However                                   Furthermore

As a matter of fact                   Especially

Indeed                                       Actually

Moreover                             Nevertheless

In particular                           In reality

Exercise 3.27. Boost your vocabulary with the words from the Introduction.

Noun Verb Adjective Adverb
recovery parse structural  
comprehension assess object-oriented  
pattern encapsulate fine-grained  
phase encounter coarse-grained  
instance   legacy  
environment      
retrieval      
inheritance      
rationale      
instantiation      

PART E

Exercise 3.28. Read and analyze the Abstract and Introduction given below. Compare the information given in the Abstract and Introduction. Choose the correct form of the word in bold italics.

Abstract

Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares(k) or more. Simple visual cryptography is insecure because of the decryption process done by human visual system. The secret information can be retrieved by anyone if the person gets at least k number of shares. Watermarking is a technique to put a signature of the owner within the creation.

In this current work we have proposed Visual Cryptographic Scheme for color images where the divided shares are enveloped in other images using invisible digital watermarking. The shares are generated using Random Number.

 

Keywords: Visual Cryptography, Digital Watermarking, Random Number.

Introduction

Visual cryptography is a cryptographic technique where visual information (Image, text, etc.) gets encrypted /decrypted/decryption/cryptography in such a way that the decryption can be performed by the human visual system without aid of computers [1]. Like other multimedia components, image is sensed by human. Pixel is the smallest unit constructing/construct/construction/constructed a digital image. Each pixel of a 32 bit digital color image are divided into four parts, namely Alpha, Red, Green and Blue; each with 8 bits. Alpha part represents /representation/representative/represented degree of transparency.

A 32 bit sample pixel is represented in the following figure [2] [3].

11100111 11011001 11111101 00111110

Revision

What do you need to know when writing an Introduction?

Self-study activity Write the Introduction for the research paper of your own.

 

 

Focus on theory

The main body of the paper presents procedures and theoretical basis of the research. It usually consists of several sections and contains the detailed description of the research process. The main body can be structured in the following way:

• Detailed description of the problem under study and its analysis;

• Related work (optional);

• Solution to the problem;

• Results (the findings: positive and negative if there are some).

    Taking into account a large amount of information given in this part of the paper, independent work of students is implied. The Master students already know the field of their research and the subject matter of their Master thesis has been chosen. Consequently, they have got a lot of literature sources to read on their major.

Exercise 4.1 Take any paper on your major and give a detailed description of its main body. You should describe:

• The problem under study;

• Solution to the problem;

• Results.

Exercise 4.2 Summarize the main body of the paper using the appropriate link words.

Self-study activity Write the Main body for the research paper of your own.

 

 

PREFACE

The textbook aims to develop postgraduate students’ writing skills necessary for science communication helping them to better understand authentic texts in different domains of information technology and report their research findings.

An information technology research paper written for publication in one of International scientific journals, like any other research paper, is supposed to consist of the following sections:

· Title;

· Abstract;

· Introduction;

· Main body;

· Conclusions;

· Acknowledgements;

· References.

However, the number of sections and their names can vary in different journals.

The paper written in English must be well presented at a conference when needed. Thus, some information and advice consistent with appropriate self-study activities are provided for students who are planning their scientific career.

The textbook is structured as follows.

· The Preface gives a review of issues that must be studied when building skills in academic writing in English.

· Part I (Sections 1.1-1.6) presents the structure of a research paper, the knowledge of which is essential for young researchers. Every section gives a full explanation of how to write each part of the scientific paper including both methodological recommendations and a sufficient number of exercises that can be chosen by a teacher depending on students’ language skills, proficiency and syllabus.

· Part II (Sections 2.1-2.3) provides authentic materials from conference announcements. The analysis of a number of Calls for papers boosts students’ vocabulary, which helps them to easily find the right conference, register and submit a paper in accordance with their scientific interests.

 



TITLE AND KEYWORDS

Focus on theory

Every paper starts with the Title, after which one can find the names of the authors, their affiliation, post and e-mail addresses and the institution where research was done. Then goes the Abstract, at the end of which there is a list of keywords.

Every word in the title should be meaningful. The title is supposed to be simple and accurately reflect the investigation in order to attract the right kind of readers. As a matter of fact, it should be short and indicate what is written in the paper itself.

    Usually titles are incomplete sentences but they can be in a question form as well. If the title is an incomplete sentence, no period is placed at the end of the sentence. If the title is a question, which is rather rare, there must be a question mark at the end of it.

    All the words in the title are often capitalized, apart from articles, prepositions and conjunctions. This is always specified in a template. If the title consists of two parts, they are divided by a colon. Remember that the first word after the colon is written with a capital letter no matter what part of speech it may be.

    One important issue is the use of the articles in the title. The title is more often an incomplete sentence (containing nouns, infinitives, gerunds), that is why it should conform to the rules of English Grammar. Consequently you can use either definite or indefinite articles if you need.

    The prepositions that are frequently used in the title are by (how something is done), for (for the purpose of), from (the origin of), in/on (where something is located; what something regards), and of (belonging to, regarding).

Note: The title should consist of 6-10 words and include the words relevant for your research area and attract the reader’s attention.

The keywords are more often nouns. Remember to choose nouns very carefully. Avoid using a string of nouns otherwise clarity might be lost. The adjectives that have been chosen should show the uniqueness of the work.

Exercise 1.1. Read the title and keywords below and answer the following questions.

• How many words does the title consist of?

• What parts of speech does it consist of?

• Are there any keywords in the title?

• What parts of speech are usually capitalized?

• Are there any prepositions? What do they mean?

DOUBLY STOCHASTIC POISSON PROCESS

AND THE PRICING OF CATASTROPHE REINSURANCE CONTRACT

Ji-Wook Jang

Actuarial Studies, The University of New South Wales

Sydney NSW 2052, Australia

Tel.: +61 2 9385 3360, Fax: +61 2 9385 1883, Email: [email protected]

 

KEYWORDS

Doubly stochastic Poisson process. Shot noise process. Piecewise deterministic Markov process theory. Stoploss reinsurance contract. Equivalent martingale probability measure. Esscher transform.

 

Exercise 1.2. Read the title and keywords below and answer the questions.

• Does the title attract the right kind of readers? Why?

• What parts of speech does it consist of?

• Does it have a definite and concise indication of what is written in the paper itself?

• What information about the authors is given? Is it complete or not?

A Cross-Cultural Comparative Study of Users’ Perceptions

of a Webpage: With a Focus on the Cognitive Styles of

Chinese, Koreans and Americans

Ying Dong * and Kun-Pyo Lee

Industrial Design Department, KAIST, Daejeon, Korea

    Keywords – Cross-Cultural Study, Cognitive Style, Webpage Perception, Eye Tracking.

 

Exercise 1.3. Read the information below and answer the questions.

• What keywords for the paper with this title might be?

• What parts of speech are capitalized?

• Are there punctuation marks in the title?

Design pattern recovery through visual language parsing and source code analysis

Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino *, Michele Risi

Dipartimento di Matematica e Informatica, Universita di Salerno, Via Ponte Don Melillo, 84084 Fisciano (SA), Italy

a r t i c l e i n f o

Article history:

Received 23 October 2008

Received in revised form 5 February 2009

Accepted 5 February 2009

Available online 20 February 2009

 

 

ABSTRACT

Focus on theory

A.Wallwork distinguishes four main types of abstracts (Wallwork, 2013). Their function is to summarize the research. That is why they are sometimes called Summaries.

    An unstructured abstract consists of one paragraph (100-250 words) and contains a very brief summary of the paper.

    A structured abstract consists of two or even more paragraphs and also contains a brief summary of the paper. 

    An extended abstract is organized as a full paper (e.g. Introduction, Methods, Discussion...), but much shorter (two to four pages). According to the requirements the abstract is optional.

    A conference abstract is usually an extended abstract (up to 500 words) written for the conference.

           The type of abstract depends on the journal or conference where you are going to submit your paper. The instructions to the authors are always given in a template. 

    It is common practice to write the draft of the abstract. It can be used as a plan of the paper. When the paper has been completed, the abstract is written.  

    In the abstract, the author should describe:

• aim of research;  

• methods of study;

• results of research;

• conclusions and/or recommendations.

    The styles that are used for writing abstracts can be personal or impersonal.

Personal way:  

We discovered that …

The authors discovered that …

Impersonal way:

It was discovered that …

    The most commonly used tenses in abstracts are:

The p r e s e n t   s i m p l e (we show)

The p a s t   s i m p l e (we showed)

The p r e s e n t  p e r f e c t (we have shown)

    The link words are very important in the abstract. The most frequently used are however, otherwise, instead, moreover, also, in this paper, consequently in addition.

The use of keywords

The keywords are of great importance because the readers stick to the keywords in their search for information. That is why the authors must have the keywords not only in the title but in the abstract of the article as well. It is recommended that the keywords should not be repeated more than 3 times in the abstract.

PART A

Exercise 2.1. Read and analyze the Abstract below.

ABSTRACT

Distributed object technology... object oriented programming even more powerful and efficient by making use of the objects that are available on different systems connected on a heterogeneous network, in addition to the locally defined objects. Wide range of hardware platforms and variety of operating systems... inter-connected at the software level and... a more robust and comprehensive solution for today’s Internet driven businesses. Internet itself... an important role as a backbone for this technology. As the scope of the application code... to single source, platform or language, maximum attention... to the security of the applications. The objective of this paper... to give a brief introduction to distributed object technology and an overview of security features available in Microsoft.NET and CORBA. The paper... the architecture of.NET and... some of its key security concepts like Security Policy, Code Access Security, Role Based Security, Verification and Stackwalk. It also... CORBA and its security concepts like CORBA Security Services, Security Specifications, Security Policy, Domain Access Policy and Delegation. The paper... by explaining the way in which some key security concerns... in.NET and CORBA.

Exercise 2.2. Make the abstract complete using the following words: is not restricted, explains (2), makes, are addressed, is, must be paid, can be, covers, plays, deliver, concludes.

Exercise 2.3. Make the list of keywords for the Abstract given above.

Exercise 2.4. Make the heading of the paper using the words given below:

Security Perspective Technology: Object Distributed.

Exercise 2.5. Think of the definitions for the highlighted words in the Abstract.

Exercise 2.6. Fill in the prepositions at of on to (2) in to make word combinations complete.

1. available … different systems

2. inter-connected … the software level

3. … addition … the locally defined objects

4. making use … the objects

5. a brief introduction … distributed object technology

Exercise 2.7. Make up sentences with the word combinations given in Ex. 2.6

Exercise 2.8. Boost your vocabulary with the words from the Abstract.

Noun Verb Adjective Adverb
technology concern heterogeneous locally
programming distribute powerful  
variety define efficient  
backbone restrict available  
scope   robust  
objective   comprehensive  
overview      
feature      
specification      
delegation      

 

PART B

Exercise 2.9. Read and analyze the Abstract below.

Abstract

Visual Cryptography is a special type of encryption technique to obscure image-based secret information which can be decrypted by Human Visual System (HVS). This cryptographic system encrypts the secret image by dividing it into n number of shares and decryption is done by superimposing a certain number of shares(k) or more. Simple visual cryptography is insecure because of the decryption process done by human visual system. The secret information can be retrieved by anyone if the person gets at least k number of shares. Watermarking is a technique to put a signature of the owner within the creation.

In this current work we have proposed Visual Cryptographic Scheme for color images where the divided shares are enveloped in other images using invisible digital watermarking. The shares are generated using Random Number.

Exercise 2.10. Make the heading of the paper using the words given below:

Watermarking, by, Enveloping, Cryptography, with, Image, Using, Scheme, Visual, Digital, Number, Color, Random, for

Exercise 2.11. Think of the keywords for the article.

Exercise 2.12. Fill in the appropriate link words (you will not need all of them): firstly, secondly, finally, in addition to, also, moreover otherwise, while, but, consequently, in this paper, herein.

Exercise 2.13. Reproduce the Abstract.

PART C

Exercise 2.14. Read and analyze the Abstract below.

  Abstract

Users increasingly rely/ are relying on mobile applications for computational needs. Google Android is a popular mobile platform, hence the reliability of Android applications became/ is becoming increasingly important. Many Android correctness issues, however, fall outside the scope of traditional verification techniques, as they are due to the novelty of the platform and its GUI-oriented application construction paradigm. In this paper we have presented/present an approach for automating the testing process for Android applications, with a focus on GUI bugs. We first conduct/conducted a bug mining study to understand the nature and frequency of bugs affecting Android applications; our study finds/ found that GUI bugs are quite numerous. Next, we present/are presenting techniques for detecting GUI bugs by automatic generation of test cases, feeding the application random events, instrumenting the VM, producing log/trace files and analyzing them post-run. We show/are showing how these techniques helped to re-discover existing bugs and find new bugs, and how they could be used to prevent certain bug categories. We have believed /believe our study and techniques have the potential to help developers increase the quality of Android applications.

Exercise 2.15. Think of the keywords and heading for the article.

Exercise 2.16. Choose the correct form of the verb in italics.

Exercise 2.17. Fill in the appropriate link words (you will not need all of them): to start with, thereafter, in other words, later, next, as a result, hence, however, in conclusion.

Exercise 2.18. Complete the definitions using the word from the text.

1._________ a program or piece of software designed to fulfil a particular purpose.

2._________ the quality of being new, original, or unusual.

3._________ an error in a computer program or system.

4._________ to keep from happening, especially by taking precautionary action.

5._________ to make or become greater in size, degree, frequency, etc.; grow or expand.

Exercise 2.19. Reproduce the Abstract.

Exercise 2.20. Boost your vocabulary with the words from the Abstract.

Noun Verb Adjective Adverb
reliability rely computational increasingly
verification conduct numerous  
novelty affect certain  
paradigm feed    
frequency      
approach      

 

  Part D

Exercise 2.21. Read and analyze the Abstract below.

  Abstract

Object-Role Modeling (ORM) is/has been a method for modeling and querying an information system at the conceptual level, and mapping between conceptual and logical (e.g. relational) levels. ORM will be coming/comes in various flavors, including NIAM (Natural language Information Analysis Method). This article is providing/provides an overview of ORM, and notes/is noting its advantages over Entity Relationship and traditional Object-Oriented modeling.

Exercise 2.22. What might be the keywords and heading of the article?

Exercise 2.23. Choose the correct form of the verb in bold italics.

Exercise 2.24. What is the weakness of this Abstract?

Exercise 2.25. Reproduce the Abstract using the appropriate link words.

Part E

Exercise 2.26. Read and analyze the Abstract below.

Design pattern recovery through visual language parsing and source code analysis

Andrea De Lucia, Vincenzo Deufemia, Carmine Gravino *, Michele Risi

Dipartimento di Matematica e Informatica, Universita di Salerno, Via Ponte Don Melillo, 84084 Fisciano (SA), Italy

a r t i c l e i n f o

Article history:

Received 23 October 2008

Received in revised form 5 February 2009

Accepted 5 February 2009

Available online 20 February 2009

 

Keywords:

Reverse engineering

Design pattern recovery

LR-based parsing

Source code analysis

Abstract

 In this paper/here we (to propose) an approach for recovering structural design patterns from object-oriented source code. The recovery process (to organize) in two phases. In the first phase, the design pattern instances (to identify) at a coarse-grained level by considering the design structure only and/but exploiting a parsing technique used for visual language recognition. Then/herein, the identified candidate patterns (to validate) by a fine-grained source code analysis phase. The recognition process (to support) by a tool, namely/for example design pattern recovery environment, which allowed us to assess the retrieval effectiveness of the proposed approach on six public-domain programs and libraries.

Exercise 2.27. Choose the appropriate link words and retell the abstract.

Exercise 2.28. Put the verbs in brackets in the correct tense form.

Exercise 2.29. Reproduce the Abstract.

PART F

Exercise 2.30. Read the Introduction below.

 

Автоматизация выделения вариантов использования из SADT – диаграмм.

О.А. Змеев, А.Ю. Малиновский

Введение

В настоящее время развитие программного обеспечения идет в сторону усложнения и укрупнения разрабатываемых информационных систем. Эта тенденция связана, с одной стороны, с тем, что современные компьютеры становятся все мощнее, и это позволяет их пользователям предъявлять повышенные требования к кругу задач, которые решаются с их помощью. В качестве другой причины можно указать все возрастающее использование технологий Интернет, которые за чрезвычайно короткий промежуток времени прошли путь от простого форматированного текста к полнофункциональным мультимедийным приложениям. С другой стороны, существует другая тенденция, согласно которой время, отпущенное на разработку программного обеспечения (ПО), существенно сокращается. В этих условиях одной из центральных проблем индустрии ПО становится проблема организации процесса разработки ПО.

В последнее время в индустрии разработки ПО часто используются процессы, основанные на методологии Унифицированного процесса разработки программного обеспечения (UP). К числу таких процессов относится RUP (Rational Unified Process) [1], появившийся в 1995 году в результате слияния процессов Rational Approach и Objectory Process 3.8, процесс ICONIX [2, 3], разработанный Д. Розенбергом, к числу таких процессов достаточно большое число авторов относит и процесс XP [4]. Полностью теоретические концепции, лежащие в основе UP, изложены в [5], в [6] приведен краткий обзор основных идей, на которых базируется процесс.

 Одной из ключевых концепций UP является понятие варианта использования (use case). Обычно UP характеризуется как управляемый вариантами использования, это означает, что команда разработчиков применяет варианты использования для выполнения полного комплекса работ по проекту, начиная с начального сбора информации и заканчивая тестированием готовой программной системы. К сожалению, вопросы, связанные с формированием модели вариантов использования для построения программных систем, на сегодня являются наиболее сложной и наименее формализованной частью UP.

К тому же достаточно часто проекты, связанные с разработкой и внедрением

различного рода информационных систем, происходят в рамках процедуры реинжиниринга бизнес-процессов организации клиента. Ключевыми артефактами этой процедуры являются так называемые модели «IT IS» и «TO BE», для получения которых бизнес-аналитики чаще всего используют методологию SADT [7, 8].

В настоящей работе предлагается подход, позволяющий использовать для по-

строения первого приближения модели вариантов использования диаграммы, полученные в результате SADT-моделирования. Если методология SADT применялась для разработки функциональной модели целевой организации в целом, то предлагаемый подход позволяет построить первое приближение для модели деловых (бизнес) вариантов использования. Если соответствующая SADT-модель декомпозирует функциональность целевой системы, то в качестве результата может быть получено первое приближение модели вариантов использования в обычном смысле. Такой подход, на наш взгляд, с одной стороны, увеличивает степень повторного использования артефактов процесса реинжиниринга, а с другой – позволяет получить первое приближение модели вариантов использования более высокого качества и за более короткие сроки.

Exercise 2.31. Make the list of keywords.

Exercise 2.32. Write out the Abstract of the paper.

Exercise 2.33. Render the text in English using the appropriate link words.

Exercise 2.34. Translate the following sentences from Russian into English.

1. В этой статье описывается метод трассировки лучей с помощью     которого обновляются пути распространения лучей от стационарного источника к мобильному получателю.

2. Эффективность метода была продемонстрирована при интерактивном акустическом дизайне.

3. Предложен алгоритм для автоматизированной идентификации возможностей перестройки кода.

4. Предложенный метод для автоматизированного рефакторинга вносит вклад в упрощение условных утверждений.

5. Экспериментальные результаты показывают, что предложенная нами схема достигает гораздо лучших характеристик, чем существующие схемы компрессии.

6. Шаблоны дизайна широко используются дизайнерами и разработчиками для построения сложных систем.

7. Поскольку информационные системы обычно реализуются на DBMS в основе которой лежит некая модель логических данных, то объектно-ориентированное моделирование включает процедуры для отображения между концептуальным и логическим уровнями.

8. Для правильности, ясности и применимости информационные системы точно определяются прежде всего на концептуальном уровне, при этом используются концепты и язык, которые доступны пониманию человека.

9. Визуальная криптография – это особый тип техники шифрования для того, чтобы скрыть секретную информацию, представленную в виде изображений, которая может быть расшифрована зрительными органами человека.

10. Каждый пиксель оцифрованного цветного изображения, состоящего из 32 битов, делится на 4 части, а именно: альфа, красный, зеленый и голубой, при этом каждый состоит из 8 битов.

Revision

What do you need to know when writing an Abstract?

Self-study activity Write the Abstract for the research paper of your own.

 

THE STRUCTURE OF THE INTRODUCTION

Focus on theory

In the Introduction, the background knowledge is presented. The reader finds the tools for understanding the meaning and motivation of the research carried out by the authors.

In the Introduction, the author introduces:

• The description of the problem or establishing a context;

• The literature review;  

• Research gaps in a certain scientific field;

• The gap the author is going to fill;

• The definition of the purpose;

• The results the author has arrived at;

• The structure of the rest of the paper.

The use of tenses

The present simple is generally used at the beginning of the Introduction in order to describe well-known facts. Then it is reasonable to use the Present Perfect to show how long the problem has been studied. To introduce the completed investigations the Past Simple is used. At the end of the Introduction the Present Simple is usually used to outline the structure of the paper.

PART A

Exercise 3.1. Read and analyze the Introduction using the information given above. Put the verbs in brackets into the correct form.


Поделиться:



Последнее изменение этой страницы: 2019-03-30; Просмотров: 246; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.584 с.)
Главная | Случайная страница | Обратная связь