Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

References (literature cited)

Nuclear power | IELTS Practice Tests 1 | Viii Matching operational requirements with considerations of appearance | Artificial Vision Used To Improve Recycling Of Electronic Scrap Metal | Drawing up the project | GRAPHS, DIAGRAMS, FORMULAE | ИЗВЛЕЧЕНИЕ КОРНЯ | Theory revision | Tips for Making a Successful Presentation | How to Make a PowerPoint Presentation |


Читайте также:
  1. Additional references about literature for children
  2. Article 161. Violation of citizens' equality based on their race, nationality or religious preferences
  3. Bibliography and references......................................... 68
  4. Edit] References
  5. GRAMMAR REFERENCES
  6. II. Make your own business card. Roleplay the situation of giving and receiving them according to the cultural preferences.
  7. LIST OF references

There are several possible ways to organize this section. Here is one commonly used way:

1. In the text, cite the literature in the appropriate places:

Scarlet (1990) thought that the gene was present only in yeast, but it has since been identified in the platypus (Indigo and Mauve, 1994) and wombat (Magenta, et al., 1995).

2. In the References section list citations in alphabetical order.

Indigo, A. C., and Mauve, B. E. 1994. Queer place for qwerty: gene isolation from the platypus. Science 275, 1213-1214.

Magenta, S. T., Sepia, X., and Turquoise, U. 1995. Wombat genetics. In: Widiculous Wombats, Violet, Q., ed. New York: Columbia University Press. p 123-145.

Scarlet, S.L. 1990. Isolation of qwerty gene from S. cerevisae. Journal of Unusual Results 36, 26-31.

Exercises

Thetitle is the first thing that the reader will see and this will often determine whether they will read further. You naturally want to capture their attention, so the title needs to succinctly encapsulate the subject of the article. The best way to do that is to use key words. The more specific the information you give in the title, the more likely someone will read your article. On the other hand, avoid long titles that are too ponderous to read.

Think about the titles for the following articles:

a) The North Atlantic Ocean is one of the Earth’s tools to offset natural carbon dioxide emissions. In fact, the ‘carbon sink’ in the North Atlantic is the primary gate for carbon dioxide (CO2) entering the global ocean and stores it for about 1500 years. The oceans have removed nearly 30 per cent of anthropogenic (man-made) emissions over the last 250 years. However, several recent studies show a dramatic decline in the North Atlantic Ocean's carbon sink.

Concerned by this decline, a group of international scientists, including Helmuth Thomas, professor of oceanography at Dalhousie University, spent the last two years investigating the world’s largest carbon sink. They weren’t sure what was causing the decrease, whether it was man-made or natural reasons.

“There were massive changes in the coastal carbon cycle, and it was similar throughout the ocean,” says Dr. Thomas, who wrote about the study in Global Biogeochemical Cycles.

Recent observational studies found that the North Atlantic carbon uptake has decreased by 50 per cent over the last ten years. While many are quick to blame anthropogenic climate change, Dr. Thomas and his colleagues found different results.

They believe the decrease is a natural phenomenon as a result of the North Atlantic Oscillation (NAO), which causes weather patterns to change. “The next phase should once again increase in carbon uptake,” says Dr. Thomas. These natural phenomenons have the potential to mask the effects of anthropogenic climate change.

These findings are crucial in understanding how this natural system is reacting to climate change and dealing with increased man-made carbon emissions. Dr. Thomas says more research must be done; including enhanced observational efforts and developing models for analysis to fully understand the long-term effects, such as how the oceanic sink will deal with increased carbon emissions from humans. However, he hopes the study, reported on in the March edition of Nature, will help all climate change scientists with their research.

“This research is the foundation for research in ocean acidification which has implications on marine life and corals,” explains Dr. Thomas.

He also cautions against misinterpreting the findings. “There are natural systems that deal with and react to natural climate change. We have to understand these to assess how anthropogenic climate change is affecting them.”

b) The Laboratoire d'informatique, de robotique et de microélectronique de Montpellier (LIRMM) (CNRS/Université Montpellier 2) has recently developed a new technology capable of reducing data leakage from integrated circuits during electronic transactions by up to 95% in comparison with conventional logic circuits.

The technology is currently the subject of a collaboration between LIRMM and PSI Electronics, a company that specializes in designing integrated circuits and systems(1), with a view to technology transfer.

Now that hardware attacks(2) have become widespread, crytpology(3) has become an essential part of the design of digital systems that replace paper as information storage media. Such attacks affect the hardware components where programs are executed (such as chips, microprocessors, etc). They are recognized as being the most dangerous kind of attack, since they can be used to obtain, at little cost and without much skill, the keys of encryption algorithms, such as those used in smart cards.

The new logic developed by LIRMM (Secure Triple Track Logic, STTL) is highly effective against hardware attacks and piracy of the integrated circuits in smart cards, SIM cards, processors, etc, that require both data authentication and confidentiality. It enables data leakage from integrated circuits to be reduced by up to 95% in comparison with conventional logic circuits. It does this thanks to two distinctive features: it has constant computation time and keeps the circuit's power consumption regular, two recurrent flaws during hardware attacks which until now had not been overcome.

LIRMM and PSI Electronics are working in partnership towards a transfer to industry of this new technology which originated in the research laboratory. It will be used in the design of integrated circuits and systems. PSI, which is based in the Aix-en-Provence region, has already developed an initial components library(4) which should allow rapid validation on an industrial scale, thus completing its specific competence in secure integrated circuit design.

This work, initially developed at LIRMM, has been carried out for two years as part of the CALISSON(5) project (the French acronym for 'Characterization, Modeling, and Security Specifications of integrated prototype circuits'), funded by the French Ministry of Industry, and approved by the global SCS Competitiveness Cluster in June 2006. As well as PSI, CALISSON's other industrial partners are STMicroelectronics, Gemalto (who manufacture bank cards), and Atmel (who make integrated circuit components), as well as academic partners such as ParisTech, the Ecole des Mines in St Etienne (ENSME), and the French Atomic Energy Agency (CEA).

Notes:

1) Integrated circuits are made up of components or transistors several hundreds of nanometers in size. They are found in smart cards, computer processors, the SIM cards in cell phones, etc. They are used for processing and for computing, video and multimedia applications. All modern communication is dependent on integrated circuits.

2) Hardware attacks, also called 'side channel attacks', are different from software attacks.

3) A technique whereby a message is encrypted in order to make it unintelligible to anyone who does not have the decryption key.

4) Using STTL logic, the LIRMM researchers have developed the framework for a collection of small components (which carry out basic functions), which will be developed and sold to industry by PSI.

5) With support from the SCS Cluster, the CALISSON project has obtained results which are sure to find promising industrial applications (banking transactions, the smart card business, set-top boxes, etc. Decoding devices for pay-TV channels and wifi modems (integrated circuits are central to such devices)).

6) Secured Communicating Solutions.

Having read your wonderful title, the reader will next want to know a little more information without having to wade through a long article to get the “meat.” That is the purpose of an abstract. It briefly (150-350 words) conveys the essential information of your article, including its purpose, the results and conclusion. Although the abstract occurs near the front of the article, it is actually written last. Why? Because you need to select and summarize from the text of your article once it is written. Abstracts seldom contain references to other articles. Above all, they need to be concise and clear.

 

Write abstracts for the following articles:


Дата добавления: 2015-11-16; просмотров: 55 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
LESSONS 31, 32, 33| A) Nano Changes Rise To Macro Importance In A Key Electronics Material

mybiblioteka.su - 2015-2024 год. (0.008 сек.)