【#第一文档网# 导语】以下是®第一文档网的小编为您整理的《论文的写作流程》,欢迎阅读!

一、在开始写论文之前应该做的准备有:
(1)、对相关领域的知识进行了解,确定自己的研究主题。
(2)、围绕将要研究的主题查阅资料,了解研究的现状并丰富自己的知识。 (3)、准备较充分后列出自己写作进程的详细计划,即制定计划。
(4)、开始写作时首先写草稿,然后随着研究的不断深入和完善对草稿不断进行修改。 (5)、论文完成后要进行检查,检查是否有不完善的地方,例如论文的结构,组织是否合理,是否有语法标点错误等,若发现错误进行修改。 二、论文的构成
论文的组成一般主要包括:标题,作者,摘要与关键词,引言,实验材料及方法,结果,讨论,总结,致谢,参考文献。 我找的这篇论文的结构不是很标准,缺少一些组成部分,现在对我的这篇论文进行一下总结。
(1) Title
一个好的标题应该简明扼要,突出论文的主题。本文的标题为: Security Architecture on the Trusting Internet of Things 突出了本论文的主题为可信安全物联网的构架。
(2) Author
包括作者的姓名职称与工作单位还有联系方式等。本文在标题下只包括的作者的姓名在
文章的最下面有作者的详细的介绍。其格式为: Bing Zhang, Xin-Xin Ma, and Zhi-Guang Qin
B. Zhang is with JiuZhou Co. (e-mail: eitech21@gmail.com).
X.-X. Ma is with 78046 Unit of PLA (e-mail: alexbjc78@uestc.edu.cn).
Z.-G. Qin is with the Department of Computer Science and Engineering,University of Electronic Science and Technology of China (e-mail:qinzg@uestc.edu.cn)
(3) Abstract and Keywords
摘要在一遍论文中占有很重要的地位,摘要应该简明扼要并涵盖文章的主要内容。一般情况下摘要应该包括研究的背景,本文主要研究的方向,研究的方法,结果。 本文的摘要通过
By analyzing existed Internet of Things’ system security vulnerabilities, a security architecture on trusting one is constructed.
提出可信物联网体系的构造。并提出了通过哪些方法可以构造比较安全可信的物联网 An off-line identity authentication ,the proposal of constructing nodes’ authentic
identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes。
(4)Introduction
引言部分一般介绍研究的背景及前期结果,前期研究中存在的问题,本研究的目的与具体内容。
本文的引言首先介绍什么是物联网,及目前物联网中的关键组成部分。原文为 The Internet of Things (IoT) is an integrated part of Internet…….
With the development of the IoT, RFID and the ubiquitous sensor network technology have became two key parts of it.
然后介绍物联网的三层结构及每个层次的作用功能。
In general, the IoT can be divided into three layers: perception layer, network layer, and
application layer.
(5) Materials and Methods
在这部分一般会先说明实验的材料及其准备,实验方法,实验步骤。本论文中的这一部分为并没有进行实验,而是以Security Architecture o f Internet of Things 为题 首先介绍了目前物联网的安全构架中存在的问题及其原因。
However, contrary to the traditional Internet terminal, most equipments on the IoT neither have a uniform execution environment nor have high computational power so it is difficult to implement a unified security strategy based on the fundamental environment of the IoT. Simultaneously, enormous quantities of nodes, existing in cluster-like manner, are available in the IoT, which leads directly to the safety problem among all types of terminal units and communication among them and consequently it will influence the whole IoT’s safety.
然后介绍了物联网的安全构架可以解决的安全问题。然后提出了现在的安全构架存在的问题和改进的方法。
It is important to point out that the current security means and measures for each separate layer in the IoT are independent each other so that it is not sufficient to provide security assurance for the whole IoT application.
Based on the above safety characteristic analysis, it can be derived that
the re-planning of the security architecture of the IoT must be made to bring about security protection measures of improvement in the application process and the development of the IoT. That is to say, security architecture of the IoT based on the creditable is the basis for solving the above problems.
(6)Result and Discussion
在这两部分一般会说明研究的结果,对结果进行分析,提出结果的重要性还可以对未来的研究提出建议。虽然本论文没有进行实验但是通过分析在原文的第三部分得出了可信安全物联网的构架方法。
本文的第三大部分Creditable Security Architecture of IoT 主要介绍了可信安全物联网的构架机制及其可靠性。
To resolve the physical and data security of the terminal ends, an identification-based off-line authentication mechanism is put forward, which is also the core parts of designing the security architecture of the Trusting IoT.
The fundamental approach of constructing the Trusting IoT is to take three layers of perception,
本文来源:https://www.dy1993.cn/O4Vx.html