我如何使用路線圖概念來寫我的研究論文? / 創建您的研究論文大綱檢查清單 : 研究生英文出版投稿日報 7/11/2014

研究生英文出版投稿日報:

*我如何使用路線圖概念來寫我的研究論文? (PART A)

*創建您的研究論文大綱檢查清單 (PART C)

*學術英文投稿教學影片 (173) Formatting an Academic Paper to Match APA Style

*避免過度使用It 及 There開頭句 (精確英文寫作) 英文編修訓練 (6 / 10)

*科學英文論文組織寫作 (11) : (第二部分:行動)

Academic publishing news 學術英文出版新聞

我如何使用路線圖概念來寫我的研究論文? (PART A)

*堅持你的研究論文提綱。綱要應該反映你的研究框架。

*在您的研究論文中有邏輯地安排小節的標題。

*在你論文的每一章開始說明目前研究成果小結,以及該章將會完成的研究成果。

*每章的第一段主題句應加強研究的重點,以建立對研究論文的結論。

*每章小節中使用過渡段以為連接。

Guide to Writing Empirical Papers, Papers, Theses, and Dissertations by G. David Garson (p. 35)

創建您的研究論文大綱檢查清單 (PART C)

*請問一個不帶偏見的讀者從你的大綱可以了解你的研究邏輯?

*您按照熟悉的組織原則撰寫您的論文從一般到特殊,或從抽象到具體?

*是否對你的研究論文分列出不同標題級別?

*您的研究論文結論符合論文介紹部分?

*在你的研究論文大綱是否留有空間以討論對論文的相反論證,部分支持,負面性結果,以及最後論文結果?

*你有沒有請同行審查你的論文大綱,並提供反饋?

Guide to Writing Empirical Papers, Papers, Theses, and Dissertations by G. David Garson (p. 32)

學術英文投稿教學影片 (173) Formatting an Academic Paper to Match APA Style
觀看本學術英文投稿教學影片以加強英文寫作投稿能力

避免過度使用It 及 There開頭句 (精確英文寫作) 英文編修訓練 (6 / 10)
使用It 及 There 開頭的句子容易使文章語多累贅及曖昧不清。除非It 指的是先前句子所提特定的名詞,否則完全的避免 It is 的句型。數個由It is 開頭的句型應去除掉,因為他們對句意並沒幫助。如果不能完全省略去除掉這種句型,則應更為精簡的描述全句。

範例一
Original
It is well known that the present computer stores data in the storage device (e.g., Hard disk), without encrypted, in other words, everyone has copies of the data can easily read and modify it, although there has many software programs that can perform the data encryption, but the encryption key is also stored on storage device, so this type of protection only complicates the process of retrieving data, not truly protects the data in essence.

Revised
Computers store data in unencrypted data devices, e.g., hard disks, making it easy to read and modify such data. Despite the availability of numerous software data encryption programs, the encryption key is also stored on a storage device, further complicating the data retrieval process and leaving the data not entirely protected.

範例二
Original
It is shown statistically, in the past five years, the malicious programs and tampering of confidential data create a cost of over 75 billion US dollars every year.

Revised
Statistics over the past five years indicate that malicious programs and the tampering of confidential data cost enterprises over $US 75,000,000,000 annually.

範例(三)
Original
It is noted that the requirement of wireless network is increasing quickly. By wireless communication, information must be transferred more conveniently and comfortably.

Revised
Wireless networks must transform information efficiently and conveniently to comply with consumer demand in wireless communications.

科技英文編修訓練手冊 柯泰德

科學英文論文組織寫作 (11) : (第二部分:行動)

以下為科學英文研究的基本科技論點:

(第二部分:行動)

研究目標 : 研究的目標 ?

達成目標的方法 : 你的計劃中達成目標的步驟?

希望的結果 : 你希望達成的結果?

領域的貢獻: 你的研究的貢獻?

(第二部分:行動)

研究目標 Based on the above, we should grow thermostable cellulases to understand whether streptomyces inside the mutation stub are active for purposes of manufacturing glucose in the food processing sector.

達成目標的方法 To do so, aleatoric mutation can be achieved using the prone error PCR method. Streptomyces can then be sieved by using a culture medium. Next, whether streptomyces can be expressed in vitro can be determined to identify the enzyme activity of thermostable ecllulases by using the DNS method.

希望的結果 As anticipated, analysis results can indicate that the active mutation stub can be sieved, subsequently increasing the enzyme activity by 50%. This mutation stub is highly promising for industrial applications in wastewater treatment and manufacturing glucose for enzyme production.

領域的貢獻 Results of this study can demonstrate that, by using the prone error PCR method, mutation stub can be used to eliminate agricultural waste byproducts.

有效撰寫英文工作提案 柯泰德

Source: 有效撰寫英文工作提案 柯泰德

有效撰寫英文工作提案 柯泰德

密集課程 (柯泰德): Organizing Technical Research Papers(科技研究論文組織寫作)

密集課程 (柯泰德):Developing Copyediting Skills(英文編修訓練)

有效撰寫英文工作提案 柯泰德

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s