留学准备--专业研究项目的陈述

2012-04-17 18:05:29 admin 申请人专业
编者按:在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述...

在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述来证明其有足够的学术研究实力和坚实的理论基础从而进行更高深层次的学习与研究。
具体来讲,这部分的材料准备起来有一定的难度,因其专业性强,不能妄加杜撰,所以要求申请人仔细准备,不能疏忽怠慢。以下以一篇IT方面(网络安全)研究的陈述为例,在此介绍一下写作此类材料的一般过程。

通常来讲,第一步,简单介绍自己的研究方向和基本内容:

例如,

My research orientation is security of New Generation Network(the following is called NGN for short)and Internet Information Exchange。

As an open network structure,NGN allows different network and different devices to join NGN network,because of which,the network security is easily threatened。 Therefore,the security problem must be settled for NGN carrier—Internet carrier,which mainly include electromagnetism security,equipment security,link security,end-point security,security of network business,security of network resources,network size and equipment capacity,confidentiality and integrality of information transferring and the authentication of user ID and charge with the emerging of the soft end-point。

第二步,提出问题:

例如,

Threat:
I。 Network Attack on Lower Layer Protocol(e。g。 TCP,UDP or SCTP),Influencing on a lot of network devices

II。 Attack on Higher Layer Specific Target Protocol(e。g。 SIP,H。323,MEGACO and COPSNGN protocol)

In addition,some common attacks such as refusing to serve,listening in,pretending and amending information still exist。

接着,指出自己的探索及可能解决问题的方法:

例如,

Thoughts of relieving the threats:
I。 Network Deployment
Board Access Controller can be installed at the joint point of Internet to provide with firewall and other protection functions consisting of verifying the validity of device joined and prevent illegal users from joining;shielding the topological structure of internal network;NAT and service penetration;distribution and assurance of network resources;keeping away from attack of service refusal from the lower and higher layers。

II。 Safe Transmission
In order to avoid an unentitled entity making use of control information protocol(H。248,MGCP,SIP and H。323)to set up illegal call or interfere in legal call,MD5 arithmetic is adopted to encrypt and transmit the key parameters and soft switch is used to authenticate the terminal connection via key parameters。 H。248 and MGCP offer security protection for protocol transmission via IPSec protocol,but additional burden is imposed on communication device。 By means of encrypting RTP package,the users is able to prevent the media information between them from being bugged。 MD5 can be used to encrypt the users’ authentication information。

Besides,to solve the problems of security administration of interactive system is far more influential to the network security than to solve that of techniques。

最后,多为就此问题的前景展望以及自己对这一领域的理解与预测:

例如,

The advanced security techniques and equipment will break down without effective administration;in the meantime,the perfected administration would diminish the unfavorable factors brought in by the undeveloped techniques。 Hence as for network security,the administration is even more significant than techniques。 The administration here mentioned ought to involve the administrative system,the emergency system,regulations for running and maintaining,employees’ training,key distribution,security system and so on。

分享
qqQQ
qzoneQQ空间
weibo微博
《留学准备--专业研究项目的陈述.doc》
将本文的Word文档下载,方便收藏和打印
下载文档

热门关注

瑞典留学申请材料清单 去瑞典留学要准备哪些材料

瑞典留学申请

俄罗斯本科留学要提交的材料有哪些

俄罗斯本科入学材料

申请芬兰研究生都需要什么材料2021

芬兰研究生材料

新西兰研究生申请材料清单

新西兰读研申请材料

马来西亚博士留学申请材料

马来西亚博士材料

英国留学个人陈述和简历要如何准备

英国留学

美国研究生留学的材料准备

美国留学读研

意大利研究生留学材料要准备哪些

意大利申请材料

新加坡艺术留学读研究生需要准备哪些材料

新加坡留学读研

出国留学读艺术专业怎样准备作品集

出国艺术留学

热门问答

付费下载
付费后无需验证码即可下载
限时特价:4.99元/篇 原价10元
微信支付

免费下载仅需3秒

1、微信搜索“月亮说故事点击复制

2、进入公众号免费获取验证码

3、输入验证码确认 即可复制

4、已关注用户回复“复制”即可获取验证码

微信支付中,请勿关闭窗口
微信支付中,请勿关闭窗口
×
温馨提示
支付成功,请下载文档
咨询客服
×
常见问题
  • 1、支付成功后,为何无法下载文档?
    付费后下载不了,请核对下微信账单信息,确保付费成功;已付费成功了还是下载不了,有可能是浏览器兼容性问题。
  • 2、付费后能否更换浏览器或者清理浏览器缓存后下载?
    更换浏览器或者清理浏览器缓存会导致下载不成功,请不要更换浏览器和清理浏览器缓存。
  • 3、如何联系客服?
    如已按照上面所说方法进行操作,还是无法复制文章,请及时联系客服解决。客服微信:ADlx86
    添加时请备注“文档下载”,客服在线时间为周一至周五9:00-12:30 14:00-18:30 周六9:00-12:30
编者按:在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述...

在准备留学的过程中,如若申请专业性较强或层次较高的专业,根据国外不同院校的要求,有的申请人需提供自己的专业研究经历的陈述来证明其有足够的学术研究实力和坚实的理论基础从而进行更高深层次的学习与研究。
具体来讲,这部分的材料准备起来有一定的难度,因其专业性强,不能妄加杜撰,所以要求申请人仔细准备,不能疏忽怠慢。以下以一篇IT方面(网络安全)研究的陈述为例,在此介绍一下写作此类材料的一般过程。

通常来讲,第一步,简单介绍自己的研究方向和基本内容:

例如,

My research orientation is security of New Generation Network(the following is called NGN for short)and Internet Information Exchange。

As an open network structure,NGN allows different network and different devices to join NGN network,because of which,the network security is easily threatened。 Therefore,the security problem must be settled for NGN carrier—Internet carrier,which mainly include electromagnetism security,equipment security,link security,end-point security,security of network business,security of network resources,network size and equipment capacity,confidentiality and integrality of information transferring and the authentication of user ID and charge with the emerging of the soft end-point。

第二步,提出问题:

例如,

Threat:
I。 Network Attack on Lower Layer Protocol(e。g。 TCP,UDP or SCTP),Influencing on a lot of network devices

II。 Attack on Higher Layer Specific Target Protocol(e。g。 SIP,H。323,MEGACO and COPSNGN protocol)

In addition,some common attacks such as refusing to serve,listening in,pretending and amending information still exist。

接着,指出自己的探索及可能解决问题的方法:

例如,

Thoughts of relieving the threats:
I。 Network Deployment
Board Access Controller can be installed at the joint point of Internet to provide with firewall and other protection functions consisting of verifying the validity of device joined and prevent illegal users from joining;shielding the topological structure of internal network;NAT and service penetration;distribution and assurance of network resources;keeping away from attack of service refusal from the lower and higher layers。

II。 Safe Transmission
In order to avoid an unentitled entity making use of control information protocol(H。248,MGCP,SIP and H。323)to set up illegal call or interfere in legal call,MD5 arithmetic is adopted to encrypt and transmit the key parameters and soft switch is used to authenticate the terminal connection via key parameters。 H。248 and MGCP offer security protection for protocol transmission via IPSec protocol,but additional burden is imposed on communication device。 By means of encrypting RTP package,the users is able to prevent the media information between them from being bugged。 MD5 can be used to encrypt the users’ authentication information。

Besides,to solve the problems of security administration of interactive system is far more influential to the network security than to solve that of techniques。

最后,多为就此问题的前景展望以及自己对这一领域的理解与预测:

例如,

The advanced security techniques and equipment will break down without effective administration;in the meantime,the perfected administration would diminish the unfavorable factors brought in by the undeveloped techniques。 Hence as for network security,the administration is even more significant than techniques。 The administration here mentioned ought to involve the administrative system,the emergency system,regulations for running and maintaining,employees’ training,key distribution,security system and so on。

一键复制全文