You are on page 1of 17

Vit Ting Anh Hc Thut

T chc lp vit bo khoa hc K thut ng trn tp


ch quc t (11)
(Information Engineering, Electrical Engineering)
Kha Thi c
i hc Y Dc TP H Ch Minh Gim c trung tm vit bo khoa hc bng ting
Anh

http://www.chineseowl.idv.tw

Tiu s c nhn
Kha Thi c (Ted Knoy) dy vit ting Anh k
thut trong cc trng i hc i Loan hn hai
mi nm. ng l tc gi ca mi bn cun sch
v vit ting Anh k thut v chuyn nghip. ng
thnh lp mt trung tm vit ting Anh ti trng i
hc Y Yunpei ng thi cng l ging vin ton thi
gian ti trng. ng chnh sa trn 55,000 bi
vit cho vic ng bo nghin cu khoa hc t nm
1989. ng l cng nh bin tp ting anh cho mt s
tp ch v khoa hc, k thut v y hc ca i Loan.

A. Nn tng (Background)

Thit lp cc xut nghin cu (Setting of research proposal): M


t mt xu hng ph bin, pht trin hoc hin tng trong lnh vc ca
bn ngi c c th hiu c bi cnh m bn xut nghin cu
ang c thc hin .

Vn nghin cu (Research problem) : M t cc hn ch chnh hoc


tht bi ca cc nghin cu trc y hoc cc phng php nghin
cu khi gii quyt cc xu hng, pht trin hoc hin tng nu .

c im k thut nh lng ca vn nghin cu (Quantitative


specification of research problem): nh lng hoc a ra mt v d
v vn nghin cu c trch dn trong ti liu tham kho trc .

Tm quan trng ca vn nghin cu (Importance of research


problem) : M t cc hu qu v mt l thuyt v thc t nu khng gii
quyt vn nghin cu.

B. Thc hin (Action)

Mc tiu nghin cu (Research objective) : M t mc tiu ca nghin


cu xut ca bn v bao gm cc c im chnh ring bit ca
nghin cu t c mc tiu nghin cu , iu m khng c
thc hin trong nghin cu trc y ( mt cu )

Phng php t c mc tiu nghin cu (Methodology to


achieve research objective) : M t ba hoc bn bc chnh t
c mc tiu nghin cu ca bn .

Kt qu d kin ( Anticipated results) : M t cc kt qu nh lng


m bn hy vng s t c trong nghin cu ca bn.

ng gp trong lnh vc l thuyt v thc tin (Theoretical and


practical contribution to field) : M t cch thc phng php hoc
kt qu nghin cu xut ca bn s ng gp v mt l thuyt trong
lnh vc nghin cu, quy lut v cng ng gp thit thc trong sn
xut, ngnh cng nghip dch v.

V d 1: Information Engineering
Thit lp cc xut nghin cu Human computer interaction
(HCI) has emulated certain aspect of human-human communication
in the recent decade, opening possibilities for machines to converse
with humans. However, speech recognition schemes have
substantially improved in terms of implementing experimental
spoken dialogue systems (SDS) that function within specific
semantic domains. The dialogue management (DM) module can be
used to control conversation between humans and computers,
subsequently affecting the performance of SDS significantly.
Vn nghin cu However, in addition to only adopting finite
state machine approaches to represent the states of dialogue and
treating each user as a similar conversational behavior, this module
can not learn from various conversational contexts. Moreover, SDS
can not perform as humans do owing to the inability to exploit the
discrepancies between users and a lack of automatic adaptation.

V d 1 (cont.)
c im k thut nh lng ca vn nghin cu
Given the difficulty of evaluating SDS, many evaluation
parameters have been used in previous research, i.e. the
total time of utterances, the number of user/machine
dialogue turns and the transaction success. In the travel
domain, correct responses of SDS would be only around
80%.
Tm quan trng ca vn nghin cu Despite
enhancements, SDS accuracy falls below user
requirements, thus restricting severely the development of
speech applications, i.e. voice portal, and ultimately
incurring a collapse of human-human communication in
HCI.

V d 1 (cont.)
Mc tiu nghin cu Based on the above, we
should develop an efficient SDS scheme that
incorporates user diversity and an evolutionary
model to adapt to various conversational contexts.
Phng php t c mc tiu nghin
cu To do so, a fine-grained user model can be
derived to accurately represent a users situation;
the user model comprises a skill level for the
system, knowledge level on the target domain and
degree of hastiness. The adaptation of SDS can
then be achieved using a reinforced learning
approach.

V d 1 (cont.)
Kt qu d kin As anticipated, the proposed SDS
scheme can increase the response accuracy of air
travel-related problems and response system by 15%.
Additionally, the proposed scheme can contribute to
efforts to further enhance HCI with robustness by
facilitating natural speech dialogic communication with
computers.
ng gp trong lnh vc l thuyt v thc tin
Importantly, given the large discrepancy in individual
behavior or conversation, the proposed spoken
dialogue scheme can also provide a valuable
reference for efforts underway to model the
divergence of users.

V d 2: Information Engineering
Thit lp cc xut nghin cu Constructing and applying intelligent
environments have received considerable interest in industrial and academic
circles. Digital life has also received much interest in recent years, with
identification technology playing a critical role in intelligent environment research.
Many IT manufacturers design and produce various handheld 3C products to gain a
foothold in the emerging digital life market.
Vn nghin cu However, given its focus on home care, home learning, and
home entertainment, digital life applications are limited to the home. Additionally,
radio frequency identification (RFID), i.e. conventionally adopted critical
identification technology, is seldom adopted in digital life studies, thus restricting the
creation of R&D efforts in digital life.
c im k thut nh lng ca vn nghin cu The above fact not only
reflects the inability to integrate various intelligent environments, but also indicates
that only 10% of all 3C products can be used as expected as their prime scenario
due to an unsound intelligent environment.
Tm quan trng ca vn nghin cu Therefore, the promotional efforts in
mobile commerce are not well defined. Moreover, profits from the digital life market
account for only 10% of the entire 3C market.

V d 2 (cont.)
Mc tiu nghin cu Based on the above, we should develop a novel intelligent
architecture, capable of increasing the efficiency of mobile commerce. The
proposed architecture can integrate the applications of several environments, i.e.
home, mini markets, shopping malls and banks.
Phng php t c mc tiu nghin cu To do so, an intelligent infofiltering mechanism for tags reading can be established. The status-management
mechanism of daily commodities can then be presented. Next, a secure settlement
and payment mechanism can be developed as well. Additionally, a practical infointerchange method can be constructed.
Kt qu d kin As anticipated, the proposed architecture can integrate RFID and
context awareness technologies in a ubiquitous environment to increase the
efficiency of mobile commerce. In addition to contributing to research efforts in
digital life, the proposed architecture can also enhance the potential of mobile
commerce and increase profits from the digital life market by up to 30% of that from
the entire 3C market.
ng gp trong lnh vc l thuyt v thc tin Moreover, the proposed
architecture can provide a valuable reference for business models, ultimately
providing opportunities for 3C manufacturers to consume value-added products.

V d 3: Electrical Engineering
Thit lp cc xut nghin cu Time division multiplexing passive optical
network (TDM PON) is a promising solution to remove the bottleneck of
bandwidth provisioning in current mass-deployed access networks. In TDM
PON, traffic is carried by a single wavelength in each division, in which users
share the bandwidth in time domain.
Vn nghin cu Given the increasing availability of bandwidth-intensive
and high-quality services such as HDTV and VoIP, the capacity of current TDM
systems will eventually become exhausted. Wavelength division multiplexing
(WDM) PON is a promising means of upgrading the capacity and performance
of current TDM systems.
c im k thut nh lng ca vn nghin cu However, given the
importance of a competitive component price for end-users in order for PON to
prevail, whether to widely deploy high-priced devices in the user houses and the
distant field remains questionable.
Tm quan trng ca vn nghin cu Whether to use an expensive DWDM
transmitter for a single user is also unknown. Besides, for services requiring
high reliability, e.g., emergency call, a protection scheme is desirable for the
PON system.

V d 3 (cont.)
Mc tiu nghin cu Based on the above, we should develop
a novel hybrid TDM/WDM PON architecture that not only
enables a gradual evolution from cost-effective TDM to a highperforming WDM PON, but also provides 1+1 protection
against fiber cuts.
Phng php t c mc tiu nghin cu To achieve
optimization among cost, upgradability, and system
evolvability, DWDM and CWDM can be adopted for
downstream and upstream traffic, respectively. In the remote
node, a cost-effective and reliable CWDM AWG can then be
used for wavelength routing. Next, two pairs of feeding fibers
can be deployed and connected to various sides of the AWG.
Additionally, two DWA modules can be utilized in a full-grown
system to serve a large number of users, enable protection
from laser failure, and optimize packet latency and jittering.

V d 3 (cont.)
Kt qu d kin As anticipated, the proposed architecture
can enhance the packet latency and jittering more than
TDM PON can. For a comparison of equivalent resource
and background traffic loading, a TDM PON can be
assumed to have a single FL for 16 users; in addition, the
DWA module has 2TLs multiplexed by 100/50(GHz)
interleaver for 32 users.
ng gp trong lnh vc l thuyt v thc tin
Importantly, the proposed hybrid TDM/WDM PON
architecture with protection from fiber cuts and laser failure
can achieve cost-effectiveness. While comprising fast
tunable lasers and interleavers, the OLT DWA module can
outperform the conventional TDM PON one in terms of
packet delay and jitter performance.

V d 4: Information Engineering
Thit lp cc xut nghin cu Network communication systems focus
mainly on providing users with reliable and highly available telecom services.
Vn nghin cu Conventional communication architecture is equipmentbased. If equipment breaks down, telecom services should be curtailed to
replace the telecom equipment. The conventional architecture is proprietary
for each other. Each equipment provider is not compatible with each other.
c im k thut nh lng ca vn nghin cu For a shorter
development schedule, a lower development cost and various network
services, conventional architectures with proprietary hardware and software are
outdated. Users subsequently spend much capital for hardware and software
updated with non-reusable equipment and software. While proprietary
architecture is updated, users spend capital for the newly updated proprietary
architecture as well as purchase a new one. Much capital has been expended
during this process.
Tm quan trng ca vn nghin cu The proprietary architecture creates
a gap between equipment providers. After proprietary architecture is updated,
the older hardware and software have become obsolete to users.

V d 4 (cont.)
Mc tiu nghin cu Based on the above, we should develop a novel
open architecture for telecommunication purposes, as well as for
construction with building blocks.
Phng php t c mc tiu nghin cu To do so, the
communication architecture can be separated by several functional
blocks. Each functional block can then be modularized. Next, each
functional block can be implemented through various providers.
Kt qu d kin As anticipated, for a situation in which telecom
equipment modules break down, the telecom services are not stopped
when replacing equipment modules. Also, high availability can be
achieved by serving with an open architecture, which is an emerging
trend in the generation of telecom communications.
ng gp trong lnh vc l thuyt v thc tin Via the proposed
architecture, service providers can then update equipment by each
module, without an update of all equipment. Such continuity makes
users aware that a breakdown in telecom equipment has occurred.

Ti liu tham kho


Knoy, T (2002) Writing Effective Work
Proposals. Taipei: Yang Chih Publishing

Further details can be found at


http://www.chineseowl.idv.tw

You might also like