申請資料:如何打造高質量的專業研究項目陳述

  在準備留學的過程中,如若申請專業性較強或層次較高的專業,根據國外不同院校的要求,有的申請人需提供自己的專業研究經歷的陳述來證明其有足夠的學術研究實力和堅實的理論基礎從而進行更高深層次的學習與研究。

具體來講,這部分的材料準備起來有一定的難度,因其專業性強,不能妄加杜撰,所以要求申請人仔細準備,不能疏忽怠慢。以下以一篇it方面(網路安全)研究的陳述為例,在此介紹一下寫作此類材料的一般過程。 

通常來講,第一步,簡單介紹自己的研究方向和基本內容: 

例如, 

my research orientation is security of new generation network (the following is called ngn for short) and internet information exchange。 

as an open network structure,ngn allows different network and different devices to join ngn network,because of which,the network security is easily threatened。 therefore,the security problem must be settled for ngn carrier—internet carrier,which mainly include electromagnetism security,equipment security,link security,end-point security,security of network business,security of network resources,network size and equipment capacity,confidentiality and integrality of information transferring and the authentication of user id and charge with the emerging of the soft end-point。 

第二步,提出問題: 

例如, 

threat: 
i. network attack on lower layer protocol(e.g. tcp,udp or sctp),influencing on a lot of network devices 

ii. attack on higher layer specific target protocol(e.g. sip,h.323,megaco and copsngn protocol) 

in addition,some common attacks such as refusing to serve,listening in, pretending and amending information still exist。

接著,指出自己的探索及可能解決問題的方法: 

例如, 

thoughts of relieving the threats: 
i. network deployment 
board access controller can be installed at the joint point of internet to provide with firewall and other protection functions consisting of verifying the validity of device joined and prevent illegal users from joining;shielding the topological structure of internal network;nat and service penetration;distribution and assurance of network resources;keeping away from attack of service refusal from the lower and higher layers。 

ii. safe transmission 
in order to avoid an unentitled entity making use of control information protocol (h.248,mgcp,sip and h.323)to set up illegal call or interfere in legal call,md5 arithmetic is adopted to encrypt and transmit the key parameters and soft switch is used to authenticate the terminal connection via key parameters。 h.248 and mgcp offer security protection for protocol transmission via ipsec protocol,but additional burden is imposed on communication device。by means of encrypting rtp package,the users is able to prevent the media information between them from being bugged。md5 can be used to encrypt the users’ authentication information。 

besides,to solve the problems of security administration of interactive system is far more influential to the network security than to solve that of techniques。 

最後,多為就此問題的前景展望以及自己對這一領域的理解與預測: 

例如, 

the advanced security techniques and equipment will break down without effective administration;in the meantime,the perfected administration would diminish the unfavorable factors brought in by the undeveloped techniques。 hence as for network security,the administration is even more significant than techniques。 the administration here mentioned ought to involve the administrative system,the emergency system,regulations for running and maintaining,employees’ training,key distribution,security system and so on。