This document provides information about referencing and citations using the IEEE style. It discusses the importance of referencing, avoiding plagiarism, and collecting citation details from different sources like books, journals, websites. It explains when citations are needed and describes the numeric citation style used in IEEE. Examples are given of citing references in text and providing the full references in a reference list, including different source types like books, articles, websites and more. Formatting guidelines are outlined for the different reference list entries.
The Open Source Library: It's Free As in PuppyTiffany Garrett
At the University of Texas at Tyler Libraries we went from relying on proprietary software to implementing an open source ILS, ERM, and IR in less than two years. We did this without extra staff, money, or time. We shared our experiences learning from our mistakes and the community with attendees at the 2013 ER&L Conference.
Work in progress on "reading avoidance".
Goal is to present use cases at Beyond the PDF: https://sites.google.com/site/beyondthepdf/workshop-papers/supporting-reading
Draws inspiration from Renear & Palmer. 2009. “Strategic Reading, Ontologies, and the Future of Scientific Publishing.” Science 325:828-832.
The Open Source Library: It's Free As in PuppyTiffany Garrett
At the University of Texas at Tyler Libraries we went from relying on proprietary software to implementing an open source ILS, ERM, and IR in less than two years. We did this without extra staff, money, or time. We shared our experiences learning from our mistakes and the community with attendees at the 2013 ER&L Conference.
Work in progress on "reading avoidance".
Goal is to present use cases at Beyond the PDF: https://sites.google.com/site/beyondthepdf/workshop-papers/supporting-reading
Draws inspiration from Renear & Palmer. 2009. “Strategic Reading, Ontologies, and the Future of Scientific Publishing.” Science 325:828-832.
Academic Social Networks and Researcher RankingAmanyalsayed
Open science and web scholarly communication
Using Web 2.0 to increase researcher’s ranking
Academic Social Networks (types, services)
Question & Answer service
Sharing your research output through ASN
Researcher measurement (h-index, RG score)
ASN and researchers’ concerns
this defines the importance of e-resource, types of e-resources in libraries, advantages/ disadvantages of e-resources discuss the selection, acquisition of e-resources in libraries.
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
VIVO conference Aug 2011: The VIVO platform and ORCID in the scholarly identi...Gudmundur Thorisson
A major challenge facing VIVO is the retrieval of published works associated with specific authors from participating institutions, and automated disambiguation & identification of authors and scholarly works. VIVO thus shares many of the same goals as the Open Researcher and Contributor ID not-for-profit organization (ORCID: http://www.orcid.org). ORCID is working to solve the long-standing name ambiguity problem in scholarly communication globally, not only for researchers affiliated with academic institutions, but for contributors to scholarly works of all kinds. The aim of this mini-grant collaborative project is to explore how VIVO and ORCID could interact in the scholarly identity ecosystem, by way of small-scale implementation work and technology evaluation&review. The presentation will provide a brief introduction to ORCID and a background to the project, summarize the technical development undertaken thus far and outline the work remaining, and discuss some possilities for future work beyond this specific short-term project.
How researchers need and use libraries through their careers. From an EMALINK one-day conference 'Supporting the research agenda' 21st January 2009. Presenter Jo Webb. Based on collaborative work with Moira Bent and Pat Gannon-Leary
Research into the ‘Digital University’ necessitates decidedly digital methodologies. However, much of the recent discussion surrounding digital methods in education, including Higher Education, places more emphasis on quantitative approaches and the affordances of learning analytics (e.g. Sclater et al., 2016). There therefore remains a need to theorise and problematise the use and usability of new and digital methods to augment qualitative and ethnographic approaches to research. I argue that this is particularly pertinent for research on writing activities.
In this paper I discuss how my research team approached the study of the writing and knowledge producing work of academics. I reflect upon how we conducted in situ observations of the writing practices of our participants as part of a broader ethnographic and multi-method study. I argue that our theoretical and methodological ideas have the potential to open up new possibilities and opportunities for writing research in the contemporary university environment.
Teaching digital citizenship through the inquiry process DLPmels
Research in the classroom is an ideal time to introduce digital citizenship. Teaching students about the ethical use of information is an integral part of both information literacy and digital citizenship.
Envisioning Social Applications of Library Linked DataUldis Bojars
This talk discusses two streams of innovation on the Web--the Social Web and Linked Data--and explains how bringing them together can move library services to the 21st century.
The core of the presentation will look at a few of the envisioned social use cases for library linked data: Social Annotation, Peer-to-Peer Bookswapping and Social Recommendations.
The goal is to create interest in combining new technologies and to start a discussion about how to bring these and similar use cases to fruition.
Presented at the ELAG-2012 conference: http://www.elag2012.com/
It is not out of place to be scared with the boring job of having to manage several references in your thesis or paper or post. MS Word Reference Manager provides you with easy-to-use module of collecting, managing and presenting your references no matter how many or vast.
Academic Social Networks and Researcher RankingAmanyalsayed
Open science and web scholarly communication
Using Web 2.0 to increase researcher’s ranking
Academic Social Networks (types, services)
Question & Answer service
Sharing your research output through ASN
Researcher measurement (h-index, RG score)
ASN and researchers’ concerns
this defines the importance of e-resource, types of e-resources in libraries, advantages/ disadvantages of e-resources discuss the selection, acquisition of e-resources in libraries.
#mytweet via Instagram: Exploring User Behaviour Across Multiple Social NetworksBang Hui Lim
We study how users of multiple online social net- works (OSNs) employ and share information by studying a common user pool that use six OSNs – Flickr, Google+, Instagram, Tumblr, Twitter, and YouTube. We analyze the temporal and topical signature of users’ sharing behaviour, showing how they exhibit distinct behaviorial patterns on different networks. We also examine cross-sharing (i.e., the act of user broadcasting their activity to multiple OSNs near-simultaneously), a previously unstudied behaviour and demonstrate how certain OSNs play the roles of originating source and destination sinks.
VIVO conference Aug 2011: The VIVO platform and ORCID in the scholarly identi...Gudmundur Thorisson
A major challenge facing VIVO is the retrieval of published works associated with specific authors from participating institutions, and automated disambiguation & identification of authors and scholarly works. VIVO thus shares many of the same goals as the Open Researcher and Contributor ID not-for-profit organization (ORCID: http://www.orcid.org). ORCID is working to solve the long-standing name ambiguity problem in scholarly communication globally, not only for researchers affiliated with academic institutions, but for contributors to scholarly works of all kinds. The aim of this mini-grant collaborative project is to explore how VIVO and ORCID could interact in the scholarly identity ecosystem, by way of small-scale implementation work and technology evaluation&review. The presentation will provide a brief introduction to ORCID and a background to the project, summarize the technical development undertaken thus far and outline the work remaining, and discuss some possilities for future work beyond this specific short-term project.
How researchers need and use libraries through their careers. From an EMALINK one-day conference 'Supporting the research agenda' 21st January 2009. Presenter Jo Webb. Based on collaborative work with Moira Bent and Pat Gannon-Leary
Research into the ‘Digital University’ necessitates decidedly digital methodologies. However, much of the recent discussion surrounding digital methods in education, including Higher Education, places more emphasis on quantitative approaches and the affordances of learning analytics (e.g. Sclater et al., 2016). There therefore remains a need to theorise and problematise the use and usability of new and digital methods to augment qualitative and ethnographic approaches to research. I argue that this is particularly pertinent for research on writing activities.
In this paper I discuss how my research team approached the study of the writing and knowledge producing work of academics. I reflect upon how we conducted in situ observations of the writing practices of our participants as part of a broader ethnographic and multi-method study. I argue that our theoretical and methodological ideas have the potential to open up new possibilities and opportunities for writing research in the contemporary university environment.
Teaching digital citizenship through the inquiry process DLPmels
Research in the classroom is an ideal time to introduce digital citizenship. Teaching students about the ethical use of information is an integral part of both information literacy and digital citizenship.
Envisioning Social Applications of Library Linked DataUldis Bojars
This talk discusses two streams of innovation on the Web--the Social Web and Linked Data--and explains how bringing them together can move library services to the 21st century.
The core of the presentation will look at a few of the envisioned social use cases for library linked data: Social Annotation, Peer-to-Peer Bookswapping and Social Recommendations.
The goal is to create interest in combining new technologies and to start a discussion about how to bring these and similar use cases to fruition.
Presented at the ELAG-2012 conference: http://www.elag2012.com/
It is not out of place to be scared with the boring job of having to manage several references in your thesis or paper or post. MS Word Reference Manager provides you with easy-to-use module of collecting, managing and presenting your references no matter how many or vast.
This presentation aims at providing key aspects of referencing, citing, plagiarism, referencing styles (esp. the Harvard style), and reference management software.
Social media as a tool for terminological researchTERMCAT
Social media as a tool for terminological research
Anita Nuopponen - University of Vaasa
Niina Nissilä - University of Vaasa
VII EAFT Terminology Summit. Barcelona, 27-28 november 2014
Patterns in scholarly publications online: Erdős and beyondJonathan Bowen
Developing and monitoring communities has become increasingly easy on the web as the number of interactive facilities and amount of data available about communities increases. It is possible to view connections and patterns on social and professional networks in the form of mathematical graphs. It is also possible to visualise connections between authors of academic papers. For example, Google Scholar, Microsoft Academic Search, and Academia.edu, etc., now have large corpuses of freely available information on publications, together with author and citation details, that can be accessed and presented in a number of ways. In mathematical circles, the concept of the Erdős number has been introduced in honour of the Hungarian mathematician Paul Erdős, measuring the "collaborative distance" of a person away from Erdős through links by co-author. Similar metrics have been proposed in other fields. The possibility of exploring and improving the presentation of such links online in computer science and other fields will be presented as a means of improving the outreach and impact of academic publications. Some practical guidance on what is worthwhile in presenting publication information online will be given.
Library training given to the Social Development Honours students, specifically looking at the library databases, referencing and plagiarism, finding information and using the UCT Library.
Presentation made at the faculty Development programme on 29 June 2020 organised by Amity Law School, Noida. This presentation covered some Reference Management Tools which can be used by research scholars for managing references.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Securing your Kubernetes cluster_ a step-by-step guide to success !
Referencing mudcd it_id
1. “WORKSHOP ON REFERENCING”
IEEE STYLE
13th April, 2012
Organized by
Department of Information Technology
Manipal University, Dubai
Presented by
M I Jawid Nazir
Department of Information Technology
3. Assignments and Reports
• Read widely and analyze the work of others
• Use as many sources as you can (books, journals,
newspapers, reports, web etc.)
• Read at an appropriate academic level
• Use good quality sources
4. Why Referencing
It’s good academic practice and improves presentation
It allows you to:
• acknowledge the work of others
• allows your tutor to differentiate between your own work and the work of others
and to locate the sources you have used
It allows you to demonstrate that:
• You have gathered evidence to support your ideas/ arguments
• You have used credible, good quality sources
• Have read widely
• AND have read at an appropriate academic level
5.
6. Plagiarism
• If you do not cite + ref ideas or quotes from other authors you may be
accused of plagiarism!
•
• Plagiarism is defined as presenting someone else’s work as your
own.
• It’s academic theft!
• To avoid plagiarism you MUST always note accurately and fully the
details of all the sources you use
7. Collect details and mention in your work
Books
• Author(s)/ editor(s) name(s)
• Book title
• Publication date
• Edition (if not the first)
• Place of publication
• Publisher name
• Page numbers used
Journal articles
• Name(s) of article author(s)
• Title of the article
• Title of the journal
• Date when journal was published
• The page number(s) of journal article
• Volume and issue numbers
• Page number’s used
Electronic resources
• Web address/DOI(digital object identifier)
• Author/ title of source used
• Date of publication (if available)
• Page numbers used (if available)
• Date accessed
• Is it an e-book, e-journal, e-mail,
discussion list, blog etc.?
Conferences
• Author(s)/ editor(s)/ corporate author of
conference proceedings
• Title of conference proceedings
• Title of conference paper
• Author of conference paper
• Page numbers of conference paper
• Page number’s used
8. Cite and ref styles
• IEEE Style ( numeric)
• Harvard style (author/ date)
• American Psychological Assoc. (author/ date)
• Modern Language Assoc. (author/ date)
• Modern Humanities Research Assoc. (author/ date)
• Chicago, Vancouver & Footnote (all numeric)
**ask your tutor which system you should use**
9. When must I provide a citation?
• Quote directly: use another person’s ideas in their words
• Paraphrase: present another person’s ideas in your words
• Summarise: express another person’s ideas in fewer words
• Use ideas, theories, facts, experiments, case studies, from a source
• Adopt another person’s research method, survey or experiment design
• Use statistics, tables, diagrams etc. – not just words! (see reference list handout)
10. Numeric style
Citation
• According to Myers[1] the reason for….
The reference is presented as a footnote at the bottom of the
page or at the end of your work:
[1] Myers, D. (2008) Construction economics: a new approach, 2nd ed.,
London: Taylor and Francis, p.159
11. No citation required
• Your own ideas, theories, arguments, conclusions
• Surveys and experiments designed and carried out by you
• Your own research method
• Very basic common knowledge: i.e. Dubai in UAE
BUT
• Dubai is in the UAE and has a population of 530,000 (cite source!)
12. IEEE Style uses a notational method of referencing when referring to a source of information within
the text of a document.
In its simplest form, a citation is given in the text, consisting of a number enclosed by square brackets:
The full details of the source are given in a numerical reference list at the end of the
document:
13. Citation
1."...end of the line for my research [13]."
2."The theory was first put forward in 1987 [1].“
3."Scholtz [2] has argued that......."
4."Several recent studies [3, 4, 15, 16] have suggested that..."
5."For example, see [7]."
14. Referencing List
• [#] A. A. Author/editor, Title: Subtitle (in italics), Edition(if not the first), Vol.(if a
multivolume work). Place of publication: Publisher, Year, page number(s) (if
appropriate).
Single author
[1] W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.
[2] S. M. Hemmington, Soft Science. Saskatoon: University of Saskatchewan Press, 1997.
Edited work
[3] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.
More than one author
[6] T. Jordan and P. A. Taylor, Hacktivism and Cyberwars: Rebels with a cause? London: Routledge, 2004.
[7] U. J. Gelinas, Jr., S. G. Sutton, and J. Fedorowicz, Business processes and information technology. Cincinnati:
South-Western/Thomson Learning, 2004.
Three or more authors
Note: The names of all authors should be given in the references unless the number of authors is greater than
six. If there are more than six authors, you may use et al. after the name of the first author.
[8] R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations, Strategy, and Technology: Pursuing the
competitive edge. Hoboken, NJ : Wiley, 2005.
15. Referencing List
Conference (complete conference proceedings)
• [11] T. J. van Weert and R. K. Munro, Eds., Informatics and the Digital Society: Social, ethical and
cognitive issues: IFIP TC3/WG3.1&3.2 Open Conference on Social, Ethical and Cognitive Issues of
Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.
Manual
• [13] Bell Telephone Laboratories Technical Staff, Transmission System for Communications, Bell
Telephone Laboratories, 1995.
Thesis or dissertation
• [19] H. Zhang, "Delay-insensitive networks," M.S. thesis, University of Waterloo, Waterloo, ON, Canada,
1997.
• [20] M. W. Dixon, "Application of neural networks to solve the routing problem in communication
networks," Ph.D. dissertation, Murdoch University, Murdoch, WA, Australia, 1999.
Journal articles
• [1] E. P. Wigner, "Theory of traveling wave optical laser," Phys. Rev., vol. 134, pp. A635-A646, Dec. 1965.
• [2] J. U. Duncombe, "Infrared navigation - Part I: An assessment of feasability," IEEE Trans. Electron.
Devices, vol. ED-11, pp. 34-39, Jan. 1959.
• [3] G. Liu, K. Y. Lee, and H. F. Jordan, "TDM and TWDM de Bruijn networks and shufflenets for optical
communications," IEEE Trans. Comp., vol. 46, pp. 695-701, June 1997.
16. Referencing List
E-Book
• [1] L. Bass, P. Clements, and R. Kazman. Software Architecture in Practice, 2nd ed.
Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.
• [2] T. Eckes, The Developmental Social Psychology of Gender. Mahwah NJ: Lawrence
Erlbaum, 2000. [E-book] Available: netLibrary e-book.
Article in online encyclopedia
• [3] D. Ince, "Acoustic coupler," in A Dictionary of the Internet. Oxford: Oxford University
Press, 2001. [Online]. Available: Oxford Reference Online, http://www.oxfordreference.com.
[Accessed: May 24, 2005].
• [4] W. D. Nance, "Management information system," in The Blackwell Encyclopedic
Dictionary of Management Information Systems, G.B. Davis, Ed. Malden MA: Blackwell,
1999, pp. 138-144. [E-book]. Available: NetLibrary e-book.
17. Referencing List
Journal article in a scholarly journal (published free of charge on the internet)
• [4] A. Altun, "Understanding hypertext in the context of reading on the web: Language
learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online].
Available: http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2004].
Journal article in electronic journal subscription
• [5] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots with smoothed densities,"
Bioinformatics, vol. 20, no. 5, pp. 623-628, March 2004. [Online]. Available:
www.oxfordjournals.org. [Accessed Sept. 18, 2004].
Newspaper article from online database
• [6] J. Riley, "Call for new look at skilled migrants," The Australian, p. 35, May 31, 2005.
Available: Factiva, http://global.factiva.com. [Accessed May 31, 2005].
Newspaper article from the Internet
• [7] C. Wilson-Clark, "Computers ranked as key literacy," The West Australian, para. 3, March
29, 2004. [Online]. Available: http://www.thewest.com.au. [Accessed Sept. 18, 2004].