This guide describes how to explain your research in a persuasive, well-organized paper, avoiding plagiarism, tips to improve your academic English writing
This short note provides step-by-step guidelines to write a review article or a book chapter. I explain in particular a
convenient method to build the abstract by writing short conclusions at the end of article sections. I also give
general writing advices.
Digital strategies to find the right journal for publishing your researchSC CTSI at USC and CHLA
Date: Apr 3, 2019
Speaker: Duncan Nicholas, Former Development Editor at international academic publisher Taylor and Francis Group, and now Director of DN Journals research publishing consultancy, and Senior Consultant for Enago Academy.
Overview: This webinar will provide an overview of digital tools and initiatives that help researchers select the right journal for their manuscript to ensure the best chance of article acceptance.
This short note provides step-by-step guidelines to write a review article or a book chapter. I explain in particular a
convenient method to build the abstract by writing short conclusions at the end of article sections. I also give
general writing advices.
Digital strategies to find the right journal for publishing your researchSC CTSI at USC and CHLA
Date: Apr 3, 2019
Speaker: Duncan Nicholas, Former Development Editor at international academic publisher Taylor and Francis Group, and now Director of DN Journals research publishing consultancy, and Senior Consultant for Enago Academy.
Overview: This webinar will provide an overview of digital tools and initiatives that help researchers select the right journal for their manuscript to ensure the best chance of article acceptance.
How to write a research paper: How to write a research paper?
The research paper can be considered as the living thing which grows and changes as the student explores, interprets and evaluates sources related to a specific topic. Steps to write a research paper:
• Choose your topic.
• Begin your search.
• Making an outline.
• Write your paper.
These slides are related to our last event at the Sapienza University of Rome for the graduate students. Please follow our website: https://www.facebook.com/psa.sapienza
How to write a research paper: How to write a research paper?
The research paper can be considered as the living thing which grows and changes as the student explores, interprets and evaluates sources related to a specific topic. Steps to write a research paper:
• Choose your topic.
• Begin your search.
• Making an outline.
• Write your paper.
These slides are related to our last event at the Sapienza University of Rome for the graduate students. Please follow our website: https://www.facebook.com/psa.sapienza
Writing for Publishing in Technology Enhanced Learning ResearchIain Doherty
This is a presentation that I gave for the Write-TEL 2 (http://www.napiereducationexchange.com/pg/groups/12872/writetel-2/) writing workshop series. I provided a perspective on writing to get published in the area of technology enhanced learning. The basic thrust of the presentation is that good research naturally leads to a good research paper.
How do you write a master's thesis? Prof. Laura Black guides students from the Master of Advanced Studies in Humanitarian Logistics and Management through the process.
OBJECTIVES:
To understand the importance of publication and its challenges.
To increase the visibility and accessibility of published papers.
To increase the chance of getting publications cited.
To disseminate the publication by using “Research Tools” effectively.
To increase the chance of research collaboration.
1Week 5Critiquing Research Articles to Prepare an Annotated B.docxfelicidaddinwoodie
1
Week 5:Critiquing Research Articles to Prepare an Annotated Bibliography
As mentioned, one component of becoming an independent scholar is learning how to provide an evaluative critique of the work of other scholars. A critique of scholarly work requires your ability to use high level critical thinking skills. In addition, you must be able to write constructively and communicate your ideas well with clear and focused writing.
The purpose of this assignment is two-fold. First, you are to demonstrate your ability to clearly and precisely summarize and critically evaluate specific information from peer-reviewed resources. Secondly, you are to demonstrate your ability to clearly present that evaluative information in writing that meets academic and professional expectations. These skills will be invaluable as you go on to develop your literature review and in your journey to become an independent scholar.
The result of this activity is produce annotated bibliographies based on the two peer-reviewed journal articles related to your chosen topic (you are welcome to include more articles for practice and feedback). Use the sections and questions below to help you critique each article. You do not need to answer every single question as some questions might not apply. The questions are listed as a means to help you generate ideas as you work on critiquing each article. You might also consider using this template in the future when critically analyzing articles.
Please REMOVE the instructions and questions listed below for your paper and submit an annotated bibliography for each article.
Link to peer reviewed article one:
http://intqhc.oxfordjournals.org/content/19/6/341
1) APA reference for article #1
2)Introductionand core study elements
· Give an overview of the purpose of the study and the problem or issue discussed.
· Consider whether the problem is clearly described. Did the author(s) document and support the existence of the problem with scholarly sources and data? Were the sources credible and relevant (as defined by the readings you’ve done for this course)?
· What were the research questions?
· What were the key findings and conclusions of the study?
3) Evaluate literature reviewed
· Examine the literature reviewed by the author(s). How relevant is the) cited literature? Do certain ideas or concepts appear to be over/underemphasized? Was there any bias in language or tone of the writing? What discussions need elaboration or could be more concise? What is missing?
4) Evaluate theoretical framework
· What theoretical or conceptual framework was used as the basis for the study? What are the key variables and from which theories do they originate? Are variables well-defined? What alternative theories might support this study?
5) Evaluate methods
· What research method and designs are used in this study?
· How well are the methods described (could a reader duplicate the research process if needed)?
· Do the m ...
DefinitionThe goal of a research proposal is to present and justif.docxpetehbailey729071
Definition
The goal of a research proposal is to present and justify the need to study a research problem and to present the practical ways in which the proposed study should be conducted. The design elements and procedures for conducting the research are governed by standards within the predominant discipline in which the problem resides, so guidelines for research proposals are more exacting and less formal than a general project proposal. Research proposals contain extensive literature reviews. They must provide persuasive evidence that a need exists for the proposed study. In addition to providing a rationale, a proposal describes detailed methodology for conducting the research consistent with requirements of the professional or academic field and a statement on anticipated outcomes and/or benefits derived from the study's completion.
Krathwohl, David R.
How to Prepare a Dissertation Proposal: Suggestions for Students in Education and the Social and Behavioral Sciences
. Syracuse, NY: Syracuse University Press, 2005.
How to Approach Writing a Research Proposal
Your professor may assign the task of writing a research proposal for the following reasons:
Develop your skills in thinking about and designing a comprehensive research study;
Learn how to conduct a comprehensive review of the literature to ensure a research problem has not already been answered [or you may determine the problem has been answered ineffectively] and, in so doing, become better at locating scholarship related to your topic;
Improve your general research and writing skills;
Practice identifying the logical steps that must be taken to accomplish one's research goals;
Critically review, examine, and consider the use of different methods for gathering and analyzing data related to the research problem; and,
Nurture a sense of inquisitiveness within yourself and to help see yourself as an active participant in
the process of
doing scholarly research.
A proposal should contain all the key elements involved in designing a completed research study, with sufficient information that allows readers to assess the validity and usefulness of your proposed study. The only elements missing from a research proposal are the findings of the study and your analysis of those results. Finally, an effective proposal is judged on the quality of your writing and, therefore, it is important that your writing is coherent, clear, and compelling.
Regardless of the research problem you are investigating and the methodology you choose, all research proposals must address the following questions:
What do you plan to accomplish?
Be clear and succinct in defining the research problem and what it is you are proposing to research.
Why do you want to do it?
In addition to detailing your research design, you also must conduct a thorough review of the literature and provide convincing evidence that it is a topic worthy of study. Be sure to answer the "So What?" question.
How are you going to do it?
.
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
Feature selection (FS) is a challenging problem that attracted the attention of many researchers. FS can be considered as an NP hard problem, If a dataset contains N features then 2N solutions are generated with each additional feature, the complexity doubles. To solve this problem, we reduce the dimensionality of the feature by extracting the most important features. In this paper, we integrate the chaotic maps in the standard butterfly optimization algorithm to increase the diversity and avoid trapping in local minima in this algorithm. The proposed algorithm is called Chaotic Butterfly Optimization Algorithm (CBOA). The performance of the proposed CBOA is investigated by applying it on 16 benchmark datasets and comparing it against six meta-heuristics algorithms. The results show that invoking the chaotic maps in the standard BOA can improve its performance with an accuracy more than 95% .
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Abstract:
Breast cancer is the most common cancer among women in the world. It is estimated that one in eight women, all over the wide, would develop breast cancer during her life. Breast cancer is considered one of the first-leading causes of cancer deaths among women. The early detection of breast cancer could save many women's life. Mammogram is one of the most imaging technology used for diagnosing breast cancer. Although mammogram has recorded a high detection and classification accuracy, it is difficult in imaging dense breast tissues, its performance is poor in younger women, it is harmful, and it couldn’t detect breast tumor that less than 2 mm. To overcome these limitations, it was found that there is a relation between the temperature and the presence of breast cancer. Utilizing this fact, infrared thermography could be a good source of breast images to study and detect cancer at the early stages which is crucial for cancer patients for increasing the rate of breast cancer survival.
This talk aims to give an overview of the thermal imaging technology, its possible applications in the medical field, focusing on its opportunities and challenges for the early detection of breast cancer and highlighting the state-of-the-art of this point.
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
To learn how to use Google Scholar to find similar papers (related work) to your class or graduation projects
Step by step supported with screenshot to teach undergraduate students to know how find a research paper
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
Presentation Outlines
The Writing Process
Pitfalls in the Process
Project Thesis outlines
What should the abstract include?
What Should the Conclusion include?
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
To give a brief overview about Public Key Infrastructure and Digital Signature with simple example
Lecture Outlines
Why En/Dec by itself is NOT enough?
What is PKI and how does it work?
What is Digital Signature and how it is work
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
Lecture Objectives
1- To learn Caesar encryption as an example of symmetric encryption techniques
2- To learn RSA encryption as an example of asymmetric encryption techniques
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
Integer Wavelet Transform for Thermal Image
Authentication
Agenda
Introduction
Problem Definition
Research Aim
Proposed Method
Results and Discussion
Conclusion and Future Works
Introduction
Problem Definition
the Internet is a popular communication channel for messages and images transmission which need protection and authentication in different scenarios.
Two ways main ways to achieve such protection
Cryptography: making a message unreadable
Steganography: concealing a message inside another
Problem Definition
The data hiding-based steganography is used by application where parties need to exchange messages through images while preserving visual fidelity of the image.
A well-known steganography methods are
the one based on the least significant bit (LSB) technique.
Other methods enable hiding a variable length of bits in each byte according to the characteristics of the human visual system.
Problem Definition
Thermal imaging is a technique which converts an invisible radiation pattern of an object into visible images for feature extraction and analysis.
This technique was first developed for military purposes but later gained a wide application in various fields such as medicine, veterinary, security surveillance and others.
Aim
The aim of this research is:
Designing a thermal image authentication technique integrating the Integer Wavelet Transform (IWT) with a hash function.
Proposed Approach
The Proposed Method
In this method,
the thermal images were used as cover images
bits from secret data (images) were then hidden in the cover images.
This was achieved by using
the hash function and
IntegerWavelet Transform (IWT).
1, 2 and 3 bits per bytes have been hidden in both horizontal and vertical components of wavelet transform.
The Proposed Method
Results
Used Dataset
10 thermal images (.ppm) were used as cover images
They have been taken by different cameras and collected from the Internet.
These images are 512x512 pixel in dimension
The secret image that is used to be embedded in the cover images is 128128 pixel in dimension.
Used Dataset
Experimental Results
Experimental Results PSNR and IF
Experimental Results
Comparison with Related Work
Conclusion and Future Works
Hash based thermal image authentication technique using the Integer Wavelet Transform (IWT) was proposed
The performance of the proposed technique was evaluated using MSE, PSNR, and IF analysis and they have shown good performance for the proposed technique
A comparison with the most related work showed that our technique obtained a better performance
In the future, more analysis will be done to provide countermeasures to possible attacks.
Thanks and Acknowledgement
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
Lecture Outlines
Why Security is Important for WSN
WSNs have many applications e.g.:
military, homeland security
assessing disaster zones
Others.
This means that such sensor networks have mission-critical tasks.
Security is crucial for such WSNs deployed in these hostile environments.
Why Security is Important for WSN
Moreover, wireless communication employed by WSN facilitates
eavesdropping and
packet injection by an adversary.
These mentioned factors require security for WSN during the design stage to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.
Algorithms to achieve security services
Symmetric Encryption
Asymmetric Encryption
Hash Function/Algorithm
Digital Signature
Why Security is Complex in WSN
Because of WSNs Characteristics:
Anti-jamming and physical temper proofing are impossible
greater design complexity and energy consumption
Denial-of-service (DoS) attack is difficult
Sensor node constraints
Sensor nodes are susceptible to physical capture
Deploying in hostile environment.
eavesdropping and injecting malicious message are easy
Using wireless communication
Why Security is Complex in WSN
Because of WSNs Characteristics:
maximization of security level is challenging
Resource consumption
asymmetric cryptography is often too expensive
Node constraints
centralized security solutions are big issue
no central control and constraints, e.g. small memory capacity.
Cost Issues
Overall cost of WSN should be as low as possible.
Typical Attacks to WSN
Physical Attacks
Environmental
Permanently destroy the node, e.g., crashing or stealing a node.
Attacks at the Physical Layer
Jamming: transmission of a radio signal to interfere with WSN radio frequencies.
Constant jamming: No message are able to be sent or received.
Intermittent jamming: Nodes are able to exchange messages periodically
Jamming Attack Countermeasure
Physical Attacks
Node Capture Attacks
routing functionalities
Countermeasure
tamper-proof features
Expensive solution
Self-Protection
disable device when attack detected
Attacks on Routing
Sinkhole attack
attacker tries to attract the traffic from a particular region through it
Solution:
Watchdog Nodes can start to trace the source of false routing information
Attacks on Routing
Sybil attack (Identity Spoofing)
attacker claims to have multiple identities or locations
provide wrong information for routing to launch false routing attacks
Solutions:
Misbehavior Detection.
Identity Protection
Privacy Attacks
Attempts to obtain sensitive information collected and communicated in WSNs
Eavesdropping
made easy by broadcast nature of wireless networks
Traffic analysis
used to identify sensor nodes of interest (data of interest),
WSN Privacy Issues Cont.
WSN Privacy Issues Attack
Trust and reputation in WSN
WSN Traditional Security Techniques
Cryptographic primitive
Sift based arabic sign language recognition aecia 2014 –november17-19, addis ...Tarek Gaber
SIFT-based Arabic Sign Language Recognition (ArSL) System
By
Alaa Tharwat1,3
And
Tarek Gaber2,3
1Faculty of Eng. Suez Canal University, Ismailia, Egypt
2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt
3Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University
Scientific Research Group in Egypt
Introduction: Why ArSL
Introduction: Aim of the work
What is ArSL?
Translating ArSL to spoken language, i.e. translate hand gestures to Arabic characters
Sign Language hand formations:
Hand shape
Hand location
Hand movement
Hand orientation
Introduction: Types of ArSL
Proposed Method: General Framework
Proposed Method: General Framework
Training phase
Collecting all training images (i.e. gestures of Arabic Sign Language).
Extracting the features using SIFT
Representing each image by one feature vector.
Applying a dimensionality reduction (e.g, LDA) to reduce the number features in the vector
Proposed Method: Feature Extraction
Proposed Method: Feature Extraction
Proposed Method: Feature Extraction
Proposed Method: Classification Techniques
We have used the following classifiers assess their performance with our approach :
SVM is one of the classifers which deals with a problem of high dimensional datasets and gives very good results.
K-NN: unknown patterns are distinguished based on the similarity to known samples
Nearest Neighbor: Its idea is extremely simple as it does not require learning
Experimental Results: Dataset
We have used 210 gray level images with size 200x200.
These images represent 30 Arabic characters, 7 images for each character).
The images are collected in different illumination, rotation, quality levels, and image partiality.
Experimental Scenarios
To select the most suitable parameters.
To understand the effect of changing the number of training images.
To prove that our proposed method is robust against rotation
To prove that our proposed method is robust against occlusion.
Experimental Results
Experimental Results
Experimental Results
Experimental Results
Experimental Results
Conclusions
Our proposal approach for ArSL Recognition
Achieve an excellent accuracy to identify ArSL from 2D images
Robust against to rotation images with different angels and occluded images horizontally or vertically.
Robust against many previous ArSL approaches.
Performance of this approach is measured by
Using captured images with Matlab implementation
Comparison with related work
Future Work
Improving the results of in case of image occlusion
Increase the size of the dataset to check its scalability.
Identify characters from video frames and then try to implement real time ArSL system.
Thanks
Fair and Abuse-free Contract Signing Protocol Supporting Fair License Reselling
By
Tarek Gaber
PhD Candidate: School of Computer Science
The University of Manchester, Manchester, UK
Introduction
DRM (Digital Rights Management):
Content owners
Persistent protection
Prevent unauthorized access
Managing usage rights (i.e. license)
E.g. expiration date, device restriction, etc.
Protect their monetary interests
Consumers
Purchase licenses (from a License issuer (LI)) to access corresponding digital contents.
But can NOT resell their licenses
Reselling Deal (RD) Method[1]
Current Contract Signing Protocols
Introduction
Gradual-release protocols
Optimistic contract signing
Introduction: Contract Signing Protocol
Introduction: Contract Signing Protocol
Properties of Contract Signing
Gradual-release Protocols
Dividing signatures to N verifiable parts
Exchanging the signatures part-by-part
Disadvantages
Not practical
Involved entities should have equal computational power
Inefficient
Many messages flows
High computational cost
Make each part verifiable
Prove that each part is correct
Optimistic Contract Signing (1 of 3)
Signers (A and B) optimistically sign a contract themselves
Optimistic Contract Signing (2 of 3)
If there is a problem, a TTP is only involved (e.g. A does not send M3)
Optimistic Contract Singing (3 of 3)
TTP is only involved if there is a problem
Disadvantages
Performance bottleneck
Decrease efficiency
Number of Message flow between TTP and signers
Increase transaction cost
Difficult to find
TTP and Reselling Deal (RD) Method[1]
Concurrent Signatures (CS) Scheme[3]
A digital signature scheme:
Non-binding or ambiguous signatures exchange, and
Releasing secret key called a keystone
Concurrently full binding signatures
Either the two exchanged signatures become binding, or none becomes.
Advantages:
No TTP
No equivalent computational power
CS Scheme Problems
CS and our Protocol
Can we utilize the CS advantages (i.e. no TTP, and no restriction of computational power) and overcome its problems?
Design considerations of the RDS protocol:
Fairness
Either both signers get a signed contract or none gets anything useful
Abuse-freeness
Inability to prove to an outside entity that a signer is able to control the output of a protocol.
Non-repudiation
No party could deny having generated his signature (NOO: Non-repudiation of Origin)
No party could deny having received a signature from the other signer (NOR: Non-repudiation of Receipt)
No dedicated TTP
RDS Protocol Assumptions
License Issuer (LI)
Trustworthy, issues licenses, and facilitates license reselling. It is already there in existing license distribution infrastructure
Reselling Permission of a license (RPLic)
It is issued with a resalable license
It is of the from [Lic||f||SignLI(Lic||f)], where f is the hash value of the keystone ks
Each license is issued with a unique ks
Channels
Drm digital rights managment-june2014-tarek gaberTarek Gaber
Digital Rights Management
Dr. Tarek Gaber
Faculty of Computers & Informatics
Suez Canal University , Ismailia, Egypt
and
SRGE (www.scienceegypt.net)
Email: tmgaber@gmail.com
Digital Content and its Characteristics
Before the digital era, one's ability to do various things with content were limited.
The Internet (digital age) makes it possible to nearly do anything with digital content.
Digital Content and its Characteristics
Digital contents, e.g. Music, Movies, documents, are:
very easy and cheap to copy
Essentially no “resistance” from duplication
This led to:
Loss of billion dollars a year for world trade.
Solutions
Cryptographic Techniques could help but not enough
DRM and Copyright Protection
Can content be protected even after its decryption?
Copying by persistent pirate would always be succeed.
Current technology can potentially minimize the scale of copying:
“keeping honest people honest”
Digital Rights Management (DRM) technologies can be help in this issue.
What is DRM?
It is a set of technologies (encryption, watermarking, hash function, signature, etc.) enabling content owners to identify and control:
the access to their content and
the conditions under which this access is given.
What is DRM? Cont.
DRM includes:
Persistent Protection: License to be always checked before using a content
Access tracking: Capability of tracking access to and operations on content
Rights licensing: Capability of defining specific rights to content and making them available by contract
Who Could Use DRM?
DRM System Framework
DRM Benefits
DRM Benefits
DRM can be integrated with content management (collection, managing, and publishing of information in any form or medium) to ensure:
Proper business practices
Implementation of new business models
Compliance with regulatory requirements in industries such as financial services, healthcare, and government
Control Access During Workflow by DRM
The process of drafting a law is circulated among committee members (e.g. judges and lawyers).
Using DRM technology, this becomes a closed circulation.
Also, the drafting law is in a tamper-proof format, with
print-only user-rights,
limited to a pre-determined timeframe, after which the draft is withdrawn and replaced by the final law.
The judges and lawyers can
withdraw, alter, or grant permissions related to the content at any time.
Modification of Rights Over Time by DRM
Systems should be able to update rights and usage as needed to accommodate new distribution models,
E.g. allowing content to be accessed by to 2, 3, or 5 devices
Otherwise cost a lot of money and be a disincentive to customers.
DRM, in such case, can facilitate
collaboration, by creating the ‘trusted environment’
by persiste
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
A Novel Approach to Allow Multiple Resales of DRM-Protected Contents
Tarek Gaber
Dept. of Computer Science,
Faculty of Computers and Informatics,
Suez Canal University
Member of the Scientific Research Group in Egypt (SRGE)
http://www.egyptscience.net
Prof.Aboul Ella’s Group
Agenda
Introduction
Research Problem
Existing Solutions
Drawbacks of the existing solutions
Our vision
Proposed approach
Contributions
Future work
Introduction I
Cryptographic Techniques could help but not enough
Introduction II
DRM (Digital Rights Management):
Content owners
Persistent protection
Prevent unauthorized access
Managing usage rights (i.e. license)
E.g. expiration date, device restriction, etc.
Protect their monetary interests
Consumers
Purchase licenses (from a License issuer (LI)) to access corresponding digital contents.
But can NOT resell their licenses
DRM System
Research Problem
Existing Solutions
Hardware-based solutions
Trusted devices are used
Fair reselling addressed using offline TTP-based approach
Software-based solutions
Online service is used
Fair reselling is NOT addressed using
Did not address multiple resales of one license
Problems in Existing Solutions
Our Vision
Designing a license reselling solution such that:
Supporting reselling
No additional hardware
Play/view content offline
Not compromising content owners’ rights
Secure
Non-repudiation
Fairness
Abuse-free
Additional attractive features
Support market power
Proposed Approach
LI Verifications
Re-salablity Check
Contributions
Novel approach allowing resale of a DRM-Protected content multiple times.
The underlying security mechanism already built into existing DRM systems.
The approach enables a buyer to make sure that a license he is about to purchase is indeed resalable and has not yet resold.
Contributions
The analysis of the approach has shown that it satisfies the specified security requirements.
The approach also can thwart potential threats and attacks that could be mounted by either a buyer or a reseller.
Future Work
Doing a prototype for this approach to assess its performance
Thanks
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
تطبيق محمول للصم والبكم يحول الاشارات الى صوت
د/ طارق محمد عبدالهادي جابر
مدرس بكلية الحاسبات و المعلومات
بجامعة قناة السويس
عضو بالمجموعة البحثية المصرية (SRGE)
http://www.egyptscience.net
Email: tmgaber@gmail.com
Prof.Aboul Ella’s Group
مقدمة
تقريبا قد يصاب أحدنا باحد اعضاء جسمه بشكل مؤقت أو دائم في يوم من الايام
لذا يمكن القول بأن الإعاقة جزء لا يتجزأ من الحالة الإنسانية
لمحة عن الوضع في العالم
نحو مليار شخص معاق من إجمالي 7.5 مليار نسمة
عدد هائل يكابدون الفقر
عدد كبير للغاية منهم يعانون من الانعزال الاجتماعي،
يحرم الكثير منهم من التعليم، والتوظيف والرعاية الصحية، ونظم الدعم الاجتماعي والقانوني.
80% يعيشون في الدول النامية
لمحة عن الوضع في مصر
من واقع بيانات وزارة الاتصالات المصرية:
يوجد حوالي 6% من المصرين ذو إعاقة بصرية،
وحوالي 3 ملاين من المصرين ذو اعاقة سمعية
الأمم المتحدة و ذوي الإحتياجات الخاصة
عقد اجتماع في الأمم المتحدة في شهر اكتوبر 2013 حول دمج ذوي الإعاقة في عمليات التنمية الشاملة وكان من أهم التوصيات:
ان يكون ذوي القدرات الخاصة أعضاء منتجين في مجتمعاتهم وبلادهم
ضرورة وجود التزام عالمي جديد إزاء أصحاب الإعاقة لإشراكهم في النشاط الاقتصادي بمختلف البلدان
ضرورة إتاحة تكنولوجيا المعلومات لذوي الإحتياجات الخاصة في جميع أنحاء العالم.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
UK Case Study
40% of deaf people could experience mental health problem at some stages in their lives, compared with 25% in the hearing community,
The fact that callers and advisers can see each other and communicate directly using British Sign Language allowing a much more good conversation.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
Breathing Space
It is a free, confidential phone and web based service for deaf people in Scotland experiencing low mood, depression or anxiety.
People who are feeling down or depressed will be able to contact the advisers via web cam and use British Sign Language to discuss their concerns in confidence.
تطبيقات تكنولوجيا المعلومات لذوي الإحتياجات الخاصة
SignVideo
It
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Writing a Successful Paper (Academic Writing Engineering)
1. Academic Writing Engineering
Tarek Gaber
Suez Canal University, Egypt
University of Salford, UK
SRGE, Egypt
Slides of the Invited Talk at the SRGE (http://egyptscience.net/) Workshop on Academic Writing Skills
Venue: Zoon Online
Writing a Successful Paper
(Academic Writing Engineering)
27 March 2021
2. • This guide describes how to explain your
research in a persuasive, well-organized paper
Aim
2
3. • A research paper places your idea in context helping
readers to understand:
• why the study was undertaken,
• what others have done in this same area, and
• the important question (hypothesis) that you examined.
• Your paper allows you to convince the readers that
your conclusions and recommendations, backed by
your evidence, are sound.
Why We Publish?
3
4. Persuasive:
Someone or something that is persuasive is likely to
persuade a person to believe or do a particular
thing.
Convincing:
If you describe someone or something as convincing,
you mean that they make you believe that a particular
thing is true, correct, or genuine.
What is Persuasive and Convincing Writing?
4
5. • Your reviewers/readers are expecting a
specific Structure of your paper to be
convinced.
• They are expecting specific questions to be
answered as they read papers:
• Why is this work important (motivation/introduction)?
• What others have done in this same area (literature review)?
• How was it done (methods)?
• What were the results (results)?
• What do those results mean (discussion)?
Meeting Readers’ Expectations
5
8. Iterative Writing
8
• Writing the 1st draft, read
each section of your draft
to determine how well it
answers these questions.
• Next, revise the draft so
that it is clear, complete,
and concise.
• The abstract, which
appears first in publication,
should be written last, and
advice about it appears
after information on the
conclusion.
10. • A paper’s introduction is a form of formal
invitation to your readers by:
• providing background information necessary for
understanding your research.
• Th first few sentences should
• highlight the focus of your paper and
• engage the reader’s attention,
Introduction
10
11. Once the reader’s attention is engaged, the paper
introduction is usually structured to smoothly move from
• what is known about the topic to what is not known, and then to
• the specific question that your research is trying to answer.
As you write, include references to credible, peer-reviewed
sources to support your claims.
So, what are the main items which should be in an
introduction?
Introduction Cont.
11
12. • Your introduction should answer the following
questions:
• What question did you answer, or what problem did you solve?
• Why is this question or problem important?
• How have others answered this question or solved this problem in the
past? Why have these approaches been tried? To what extent are the
approaches adequate?
• What was your specific hypothesis (i.e., what did you expect to happen)?
• How did you test this hypothesis?
• What insights does your paper reveal (i.e., why is your specific approach
useful)?
• What is the structure of the rest of the paper?
Introduction Cont.
12
13. • This section aims to discuss and critically assess the
current state of the art in the area of your paper.
• This often leads to the problem statement.
• The literature review section should be connected to
the your main aim of the paper.
• The literature review section aims to answer:
• Do you present evidence that you know why you are doing this
piece of research?
• Do you have an idea of the larger picture?
State of the art or literature review
Academic Writing Engineering 13
14. • This section tells how you conducted your project.
• It should be detailed enough to guide someone who
wants to reproduce your study.
• The section aims to answer the following questions:
• Is the approach/method clearly described?
• Can you outline the steps or summarize the approach/method?
• Does the work address the problem stated earlier in the paper?
• Does the approach seem to require unreasonable amounts of human
guidance? Can the method be replicable?
• What other specific characteristics are worth noting for this study?
Methods ( proposed Algorithm/method)
Academic Writing Engineering 14
15. • Provide representative examples that illustrate trends or outcomes that are
important to your hypothesis or aim or research question.
• However, the focus, most of your time, should be on the analysis of the
results and what they reveal about the proposed method/algorithm you are
studying or proposing.
• Make your data readable and understandable in tables and graphs, using
colors, shading, or other means to highlight the points you plan to make.
• To capture the interest of “skimmers,” ensure that your figures highlight
your key findings and phrase the captions so that readers can follow your
argument.
• Use informative titles that enable a reader to make sense of the figure
without reading the paper’s text.
• In addition to employing informative captions, explain all your tables,
diagrams, and figures in the text.
Results / Discussion
Academic Writing Engineering 15
16. • The analysis of the results is the most important part of your paper
because it presents your original work and explains its significance.
• Your analysis confirms or denies your study’s basic hypothesis,
• Your interpretation of your numerical results is very important as it
demonstrates how they answer the questions you set out in the
introduction or how well you have achieved your objectives.
• The analysis must support your conclusions.
Results / Discussion Cont.
Academic Writing Engineering 16
17. Try to think about what your reader wants to know about your results. Here are some
questions to guide you:
• What, specifically, did you learn from doing this study (proposing a new algorithm or
improving an old one)?
• What do your results say about the problem or question you were investigating?
• Was your hypothesis confirmed or disproved?
• Are the results what you expected?
• If you obtained anomalies or other unexpected results, can you explain them? If not, how
could you set about in the future to identify what caused them?
• How do your results compare to past findings? Are they consistent? Different? Why?
• How would you respond to objections or questions that other researchers might have about
your methods, results, or interpretations?
Results / Discussion Cont.
Academic Writing Engineering 17
18. • The conclusion answers the readers’ question: “So what?”
• It should give your readers points to “take home” from your paper.
• It should state clearly what your results demonstrate about the
hypothesis you were testing in the paper.
• It should also generalize your findings, perhaps suggesting how
others can use them in future research.
• All generalizations should be supported by your data, however;
the discussion should have proved these points, so that when the
reader gets to the conclusion, the statements are logical and
seem self-evident.
• No new evidence should be introduced in the conclusion.
Conclusion
Academic Writing Engineering 18
19. • Readers should be able to read only the abstract and still understand your primary points. Your abstract
should briefly answer the following questions:
• What question did you answer or what problem did you solve?
• Why is testing a hypothesis about this question or problem important (why should your readers care about the
work you conducted)?
• What methods did you select? Why did you select these particular approaches?
• What results did you obtain?
• What is the significance of the results?
• Was your hypothesis confirmed?
• Are there any surprises or anomalies in the results and, if so, how might you explain them?
• What other interpretations might be considered?
Abstract (is very important for assessor)
Software Quality Management 19
20. What is the relation between the writing
process and plagiarism avoidance?
Writing process and plagiarism avoidance
20
21. • “the act of taking the writings of another person and passing them off
as ones own”.
• “It is an act of forgery, piracy, and fraud and is stated to be a serious
crime of academia”.
• It is “the use of others’ published and unpublished ideas or words (or
other intellectual property) without attribution or permission and
presenting them as new and original rather than derived from an
existing source.”
• “Plagiarism ranges from the unreferenced use of others’ published
and unpublished ideas including research grant applications to
submission under new authorship of a complex paper, sometimes in a
different language. It may occur at any stage of planning, research,
writing or publication; it applies to print and electronic versions.”
What is Plagiarism?
21
Dhammi, I. K., & Haq, R. U. (2016). What is plagiarism and how to avoid it?. Indian Journal of Orthopaedics, 50(6), 581.
22. Verbatim plagiarism: When one submits someone else's words verbatim in
his/her own name without even acknowledging him publically. Copy and
paste from a published article without referencing is a common form of
verbatim plagiarism. Most commonly, it is seen in introduction and
discussion part of manuscript
Mosaic plagiarism: In this type of plagiarism each word is not copied but it
involves mixing ones own words in someone else's ideas and opinions.
This is copying and pasting in patchy manner
Paraphrasing: If one rewrites any part/paragraph of manuscript in his/her own
words it is called paraphrasing. Paraphrasing is a restatement in your own
words, of someone else's ideas. Changing a few words of the original
sentences does not make it your writing. Just changing words cannot
make it the property of borrower; hence, this should be properly
referenced. If it is not referenced, it will amount to plagiarism
Forms of Plagiarism
Academic Writing Engineering 22
Dhammi, I. K., & Haq, R. U. (2016). What is plagiarism and how
to avoid it?. Indian Journal of Orthopaedics, 50(6), 581.
23. Self plagiarism: “Publication of one's own data that have already been
published is not acceptable since it distorts scientific record.” Self-
plagiarized publications do not contribute to scientific work; they just
increase the number of papers published without justification in
scientific research.
Duplicate publication: When an author submits identical or almost identical manuscript (same data, results, and
discussion) to two different journals,
Text recycling: If the author uses large portions of his/her own already published text in his/her new manuscript,
Cyber plagiarism: “Copying or downloading in part or in their entirety
articles or research papers and ideas from the internet and not giving
proper acknowledgement is unethical and falls in the range of cyber
plagiarism”
Forms of Plagiarism Cont.
Academic Writing Engineering 23
Dhammi, I. K., & Haq, R. U. (2016). What is plagiarism and how
to avoid it?. Indian Journal of Orthopaedics, 50(6), 581.
24. Writing process and plagiarism avoidance
24
Source: https://ericdrown.uneportfolio.org/
25. 1. Reading the literature
• This builds up your vocabulary
2. Critically summarize what you read
• This improve your writing and vocabulary too.
• Critical Writing Template (attached)
3. Use phrase bank https://www.phrasebank.manchester.ac.uk/
4. Peer review: review your colleagues papers
How I can improve my English writing?
Academic Writing Engineering 25
26. 1. https://ericdrown.uneportfolio.org/2020/08/14/academic-success-
the-transition-to-college/
2. Dhammi, I. K., & Haq, R. U. (2016). What is plagiarism and how
to avoid it?. Indian Journal of Orthopaedics, 50(6), 581.
3. A Guide to Writing a Successful Paper:
https://www.owlnet.rice.edu/~cainproj/courses/comp482/comp482PaperGuide_F
07.pdf
4. Amanda Stent, How to Read a Computer Science Research
Paper: https://people.cs.pitt.edu/~litman/courses/cs2710/papers/howtoreadacspaper.pdf
5. Academic Phrasebank
https://www.phrasebank.manchester.ac.uk/
References and Useful Resources
26
27. Thank You
Tarek Gaber
Suez Canal University, Egypt
University of Salford, UK
SRGE, Egypt
Email: tmgaber@gmail.com
Academic Writing Engineering 27