Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Research Paper

Related terms:

Artificial Intelligence, Patent, Machine Learning, Reinforcement Learning,


Internet of Things, Deep Learning, Networking Function, Blockchain

A New Course on R&D Project Management in


Computer Science and Engineering: Subjects Taught,
Rationales Behind, and Lessons Learned
Veljko Milutinović, ... Danilo Furundzic, in Advances in Computers, 2017

9 Part 8: Learn How to Write SCI Journal Papers of the Research


Type
A research paper is not that easy to generate and definitely not in one semester.
Consequently, only a precise template for writing research papers is elaborated
down to details, and students are asked to bring their previously concluded
research rewritten according to the template just described. Students without
previous research experience are given an opportunity, in a follow-up research-
oriented course, to do a research project and to write a research paper from
scratch.
In the course described here, one can only teach theoretical issues (see Refs.
[9,10]), and one can encourage students, for extra homework credit, to write a
research paper about their research conducted before the course started, using
the formalism taught, step by step. Therefore, homework #8 is optional, for
extra classroom credit.
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/S0065245817300116

Foreword
Barbara Fister, in Engaging First-Year Students in Meaningful Library Research,
2012

The research paper remains the most common writing assignment on college
campuses, more popular than ever (Lunsford, 2008). In the first year, just as
students are encountering the conventions of academic writing, we also hope to
ground them in the mechanics of using a print/digital hybrid library, probably
much larger than any they’ve ever used before, to make informed choices
among possible sources, and extract meaning from them in order to support a
well-organized synthesis or argument. We know they will be asked to do this in
the future, so we try to get them acculturated quickly.

Read full chapter


URL: https://www.sciencedirect.com/science/article/pii/B9781843346401500089

The authors’ editor: working with authors to make


drafts fit for purpose
Joy Burrough-Boenisch, Valerie Matarese, in Supporting Research Writing, 2013

Copy-editing
A research paper destined for submission to a peer-reviewed journal may not
require meticulous copy-editing if the target journal offers this service routinely
for accepted manuscripts. Moreover, some authors prefer that the AE
concentrate on improving language, style and content. Not having to venture
into the copy-editing part of the editing continuum (checking that references,
tables and figures are formatted correctly, for example) certainly saves time and
therefore money, and allows the AE to focus on aspects of the text that are
generally outside the copy editor’s remit. But even if copy-editing is not
specifically requested, the AE should do some formatting. The most elementary
is ensuring a consistent spelling style (either US or UK, not a mix). If the
publisher’s house style is known, the AE should ensure it is followed. And if a
journal has complex instructions to authors, an AE may help authors follow
them (but since this service implies extra time, it is more likely to be offered by
an in-house AE).

Read full chapter


URL: https://www.sciencedirect.com/science/article/pii/B9781843346661500114

Unraveling the research process: social bookmarking


and collaborative learning
Caroline Sinkinson, Alison Hicks, in The Plugged-In Professor, 2013

Instructional purpose
The research paper is a common rite of passage in the academic world. While
students are typically successful at amassing information sources, many grapple
with new conventions of academic discourse and the synthesis of these foreign
concepts into their own writing. Furthermore, research assignment guidelines
that focus on the number or type of sources can lead students to view
information as an object, and to conceive of research as a bounded, static
product rather than grasping the dynamic and collaborative nature of inquiry.
Social bookmarking sites such as Diigo can help shift the focus from a final
product to the experience of inquiry, as well as repositioning research as active
dialog. First, Diigo enables the quick and easy bookmarking of the various
informal conversations that lead to formal scholarship. Students’ exposure to
conversation in context (blogs, tweets, discussion) breaks down academic
barriers by helping their understanding of research as an active conversation.
This focus on the context also means that students can provide much more
purposeful critical evaluation of sources rather than following teacher-imposed
criteria. Second, the participatory nature of social bookmarking in the class
Diigo library mimics the interconnected nature of research and the social
construction of knowledge. By enabling students to work collaboratively and
draw on other students’ work and expertise, research becomes more active and
meaningful. Finally, the social nature of Diigo means that students are curating
a set of topical resources within a community as one would in civic, social, or
academic environments. This provides an audience beyond the teacher, making
research activities more authentic.
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781843346944500053

Public Safety Networks: Enabling Mobility for Critical


Communications
Romain Favraud, ... Thanasis Korakis, in Wireless Public Safety Networks 2, 2016

4.7 Discussion
Some research papers provide insight into full solutions when no backhaul is
available, providing inter-eNB connectivity because of WiFi links and including
D2D communications that were not yet defined by the ProSe specifications of
3GPP studies [GOM 14]. Other technologies are usually used to establish
wireless backhaul supporting fixed LTE networks: PTP RF or free space optics
links and PTMP RF links. In the case of portable BS, satellite backhaul links are
sometimes used. However, it can be easily seen that these wireless solutions are
not adequate for the establishment of a network of BS enabling voice and data
communications in moving cell scenarios.
For instance, Table 4.4 shows the main differentiating criteria. Despite great
performance, PTP and PTMP solutions often require line-of-sight wireless
connectivity with careful network planning, which make them inapplicable to
the moving cell scenarios. Satellite backhauling, on the other hand, provides the
best possible coverage but needs dedicated tracking antennas and suffers from
high cost. More importantly, it has high latency (≥200 ms) that limits voice and
data services [CAS 15]. WiFi solutions using omni-directional antennas are
promising solutions if the higher layers and protocols allow for efficient and
dynamic meshing, similar to the proposed LTE-based solutions (i.e. eUE and
e2NB). However, dedicated equipment and antennas are needed for WiFi
backhauling, thus increasing the cost of BS. In addition, commodity WiFi works
on ISM bands and can thus experience a large interference compared to the
licensed bands used for LTE. To solve this problem, some countries define their
own licensed bands for the PS WiFi. Last but not least, studies on commercial
networks have shown that the WiFi latency is on average slightly higher and has
more jitter than that of LTE, although results might differ for PS networks [HUA
12] and other studies have shown that the WiFi latency is higher than that of
LTE, especially when the traffic load and number of users increase [HUA 13].
Moreover, carrier aggregation and full duplex communications are expected to
tl i LTE l b l th h ti h ht l i lth h
Read more
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781785480522500049

FSMApp: Testing mobile apps


Ahmed Alhaddad, ... Zeinab Abdalla, in Advances in Computers, 2023

2.2.1 MBT and App testing


Sahinoglu et al. [35] present a mapping study of testing mobile applications.
Their paper studies the research issues in mobile application testing and the
most frequent test type and test level of available studies in mobile testing. One
of the categories relates to MBT of Apps. There are only six model-based testing
studies out of 123 studied. This lack of MBT techniques shows that more work
is needed. Here, we focus on the use of a behavioral model such as a state
transition diagram to generate tests. Another systematic mapping study by
Méndez-Porras et al. [9] discusses 83 empirical studies of automated testing of
mobile applications. The categories include Model-based testing,
Capture/replay, Model-learning, Systematic testing, Fuzz testing, Random
testing, and Script based testing. This paper focuses on Black- Box MBT of
mobile applications. Hence, only the first category is relevant to the scope of
this paper. Méndez-Porras et al. [9] cite [10,13,15,36–44] as model-based testing
papers. We exclude a number of papers from this list as they are not in our
scope. This subsection does not discuss white-box testing [13,38] and grey-box
testing [10]. We are also not interested in testing security [40], data-flow analysis
[42] and life cycle testing of the application [44]. Zaeem et al. [37] is not
discussed in this paper because it is related to oracle problems. Wang et al. [15]
identify several difficulties for automating GUI testing and study the high cost
for achieving coverage of the traversal algorithm to generate a GUI tree model.
It extends the crawling technique in Amalfitano et al. [36] to increase GUI
coverage. Amalfitano et al. [39] present a Event-Based Testing approach that
Méndez-Porras et al. [9] classify as MBT. This paper focuses on creating the
model for testing mobile application and we discuss Amalfitano et al. [36] later
as one of the approaches that we will compare to FSMApp.
Several research papers are not included in Méndez-Porras et al. [9]. Zein et al.
[45] present anther mapping study of mobile application testing techniques. The
goal of the mapping study is based on the classification of empirical studies.

Read more
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/S0065245822000821

Switch Fabric Technology


Gary Lee, in Cloud Networking, 2014

Output-queued shared memory designs


Many research papers on switch fabric architectures reference an output-queued
shared memory design as the ideal architecture for high-performance switch
chip implementations. This is because each output acts like a virtual FIFO in
shared memory and all inputs can simultaneously write into this virtual FIFO
without blockage as long as the memory is not full. But due to challenging on-
chip memory performance requirements, many switch chip designers settle for
the IOQ architecture as described above. One successful product line using an
output-queued shared memory design is the Intel® Ethernet switch family.
Figure 3.17 is a conceptual view of the shared memory architecture.
Read more
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9780128007280000035

Writing a research paper


Teresa S. Welsh, Melissa S. Wright, in Information Literacy in the Digital Age,
2010

Research paper format


The research paper format varies according to the discipline and the professor’s
instructions, but below is one example of the required format for an analytical
paper.
[Research paper title page format: an appropriate title for the paper should be
centered with major words capitalized.]
Research Paper Title
 Student Name
 E-mail address
 Course Number
 Date
[Research paper body format: distinguish between topic headings and
subtopics/subheadings; for example, center main topics or headings, left-align
subtopics/subheadings.]
Introduction
Background information about the topic of the study and importance of the
study. (The importance of the study may come at the beginning or the end of
the introduction section.)

Purpose of the study


Clear, concise and focused purpose of the study: the problem statement
including sub-problems.

Research questions or hypotheses


Clearly state the specific research questions or hypotheses. Choose one but not
both. Use the present tense and number appropriately: R1, R2, etc. for research
questions; H1 H2 etc for hypotheses

Read more
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781843345152500123

Theoretical Research
Thomas W. Edgar, David O. Manz, in Research Methods for Cyber Security,
2017

Proofs and Theorems


A theoretical research paper’s results are the proofs and theorems generated.
You should not document every proof; only highlight significant or interesting
proofs as theorems. If it is necessary to build up a theorem then you need to
specify any necessary lemmata. Often the contribution is the development and
explanation of the theory. However, sometimes a theory can be exercised to
produce or highlight results that are worth sharing with the wider audience.
Often this is in the form of a model or simulation; see Chapter 8, Using
Simulation for Research, for further details.
In the results section of your paper, explain what you found after you performed
your analysis. Creating tables to show results is an efficient and effective
method. You can also show pictures of interesting results, that is if a data
anomaly occurred or to display the distributions of the data samples. Regardless
of whether or not you are generating datasets, you should make sure and
explain the impact, implications, and reach of the theoretical research. Are there
any limitations of scope, impact, applicability, and so on.

Read full chapter


URL: https://www.sciencedirect.com/science/article/pii/B9780128053492000078

Lessons learned from nearly 200 cases of KM journeys


by Hong Kong and Asian Enterprises
E. Tsui, in Successes and Failures of Knowledge Management, 2016

Factors for sustaining the use of knowledge management systems


that differ from factors that affect adoption
KM books and research papers cover extensively the topic of knowledge
management systems (KMS) adoption and the factors that influence users to
take up and start using a KM system. While knowing these factors are no doubt
very useful for planning and the deployment of a KM system, it is even more
important to know the factors that lead users to continue their use of the KM
system in a sustained way. Our own research, as well as the knowledge gained
from working with these 200 projects, leads us to believe that the two sets of
factors (ie, for preadoption and postadoption) are different; for example, peer
influence, demonstrated usefulness, personal experience, and personalization
are among factors that make users continue their use of KM systems in a
sustained way.

Read full chapter


URL: https://www.sciencedirect.com/science/article/pii/B9780128051870000061

Recommended publications

Journal of Systems and Software


Journal
Forms that Work
Book • 2009

Journal of Visual Languages & Computing


Journal

Copyright © 2023 Elsevier B.V. or its licensors or contributors.


ScienceDirect® is a registered trademark of Elsevier B.V.

You might also like