ECE Novelty Handout

advertisement
Researchers use four basic moves to show their work is
innovative and worth implementing.1
1. Establish the Significance
Explain why someone would care about this topic. You audience for this statement should
always be broader than the target audience of your paper. If possible, it should be apparent why
the general public should care
2. Describe the “Status Quo”
Describe the practices that are currently used. The status quo often contains two parts: 1) an
existing problem and 2) an existing (but flawed) solution used in current practices
3. Identify a “Gap”
Show that the current practices (i.e. “status quo”) are unsatisfactory, incomplete, or
otherwise problematic. A common way to signal the gap is the word “however.”
4. Fill that Gap with your Solution
Show how your current research is a necessary or innovative solution to fill the existing gap.
Examples and Exercises
1. Although plastic has revolutionized modern life, the environmental impact of traditional
petroleum plastics is staggering. Bioplastics may provide a sustainable alternative to
petroleum plastics because they use fewer fossil fuels in production and reduce
greenhouse gas emissions as they biodegrade. One particularly promising bioplastic is
polylactic acid (PLA)… PLA resembles traditional plastic and can be processed on
equipment already used for petroleum plastics. However, the commercial viability of
PLA is currently limited because it is only compostable in industrial facilities and cannot
be mixed with other recyclable materials [1, 2]. To make PLA more commercially viable,
we propose a device that composts PLA and other bioplastics within a home composting
environment [3]. Such a device, we argue, would encourage the production of more
sustainable and economic bioplastics.2
1
These moves are adapted from John Swale’s Genre Analysis: English in Academic and Research Settings.
Cambridge: Cambridge UP, 1990.
2
Created by the Global Communication Center
2. Transmitter Identification (TxID, or transmitter fingerprinting) technique is used to
detect, diagnose and classify the operating status of radio transmitters. Due to an everincreasing number of transmitters, the need for transmitter identification is becoming an
urgent issue since it enables the broadcast authorities and operators to identify the source
of in-band interference. The transmitters, which share a single broadcast channel,
naturally interfere with one another in some coverage overlapped areas. Unwanted strong
multipath distortion may be generated by neighboring transmitters in an SFN [6].
However, traditional techniques, like the estimation of the direction of arrival using
antenna array, can only give the multipath information from all transmitters. It is difficult
to identify the source of each particular interference path, since the carrier frequency and
DTV signals are all identical within the SFN. Therefore, a new transmitter identification
technique capable of identifying multiple transmitters and weak interference sources and
independent of the DTV reception is highly desired.
This project describes a new transmitter identification technique based on….3
3. Malicious activities and alterations in integrated circuits have raised serious concerns to
government agencies and semiconductor industry. These malicious alterations, known as
hardware "Trojans," pose great detection and isolation challenges. Currently, Trojans are
detected by physical inspection, which is labor intensive and requires deconstructing the
hardware board. This project attempts to discover if Trojans can be detected by
incremental, exhaustive testing in order to reveal the presence of unexpected
functionality. 4
This example is based on: Wang, Xianbin, Yiyan Wu, and Bernard Caron. “Transmitter Identification Using Embedded
Pseudo Random Sequences.” IEEE Transactions on Broadcasting 50.3 (2004): 244-252.
4
This example is based on an ECE research project conducted by CMU students, available on the CMU website.
3
Identify the moves for introducing new ideas in the following abstracts (A and B) and then decide
which version is stronger; be prepared to explain why.
A. The long-term goal of this project is to analyze neural signals collected from human brain and
eventually use these signals to build a brain computer interface (BCI). BCI aims to provide a direct
control pathway from brain to external devices such as a computer. It is a radically new
communication option for those with neuromuscular impairments that prevent them from using
conventional augmentative communication methods. In this project, I will develop an application
programming interface (API) to extract electroencephalography (EEG) signals collected by a
commercial headset.
B. Many different disorders can disrupt the brain’s neuromuscular channels making communication
impossible for those afflicted. One radically new communication option for those with
neuromuscular impairments is the brain computer interface (BCI). BCI aims to provide a direct
control pathway from electroencephalography (EEG) signals in the brain to external devices such as
a computer. Currently no programming tools exist to aid researchers in encoding and interpreting
commands embedded in EEG signals. Thus, the goal of this project is to develop an application
programming interface (API) for translating EEG signals into specific commands that can assist
researchers in developing BCIs.5
Identify the moves for introducing new ideas in the following abstracts (C and D) and then decide
which version is stronger; be prepared to explain why. 6
C. Land-use management agencies are in the role of identifying changes to land use that can contribute
to environmental hazards, affect species diversity, and affect local and regional economies. One
useful tool in monitoring land-use changes is digital elevation modeling. Digital elevation models
(DEM) are three-dimensional representations of terrain, depicting the topography of the region with
exacting detail. DEM allows researchers to estimate vegetation height and biomass, which are
important factors in land-use management. However, the accuracy of DEM declines in forest-type
territories, due to the difficulty of mapping forestial structures. When canopy is dense, such as in a
forest, the error of DEM increases. This paper attempts to correct for the error in DEM by
combining it with data from radar and lidar datasets. This new information can lead to improved
estimates in a variety of terrains.
D. Digital elevation models are three dimensional representations of terrain, depicting the topography
of the region with exacting detail. However, the accuracy of the models declines in forest-type
territories, due to the difficulty of mapping forestial structures. Using radar and lidar data, the aim is
to improve 3D rendering of terrain, including digital elevation models (DEM) and estimates of
vegetation height and biomass in a variety of forest types and terrains. The 3D mapping of
vegetation structure and the analysis are useful to determine the role of forest in global warming
5
This example is based on an ECE research project conducted by CMU students, available on the CMU website.
This example is based on: Liskovich, Diana and Marc Simard. “Radar and Lidar Remote Sensing of Forests.” Caltech
Undergraduate Research Journal. (Winter 2011-2012): 26-35. Available at www.curj.caltech.edu
6
(carbon cycle), in providing habitat and as a provider of socio-economic services. This in turn will
lead to potential for development of more effective land-use management.
Unscramble the introduction below by putting the sentences in the correct order. 7
7
A
CSMA algorithms are attractive because they incur low computational complexity and
low communication overhead and can be shown to achieve optimal capacity under
certain assumptions.
B
In this paper, we propose a new algorithm, called Virtual-Multi-Channel (VMC-) CSMA
that can dramatically reduce delays without sacrificing the high capacity and low
complexity of CSMA.
C
CSMA algorithms have recently received a significant amount of interest in the
literature for designing efficient wireless control algorithms.
D
However, it has also been observed that CSMA algorithms suffer from the starvation
problem, incurring large delays that may grow exponentially with the network size
This example is based on ECE technical report from Purdue University, available on the Purdue University website.
Download