【正文】
章的條件:與研究工作相關(guān),確實(shí)有了好的想法,不是為了寫而寫;取得了有價(jià)值的成果,對(duì)學(xué)術(shù)界有貢獻(xiàn);實(shí)驗(yàn)成熟,經(jīng)得起檢驗(yàn);已經(jīng)需要記錄下來(lái)和其他人分享。 優(yōu)秀論文的要素:正確選題;合適的切入點(diǎn);簡(jiǎn)潔明了;說(shuō)清自己的貢獻(xiàn);可靠的/可重現(xiàn)的結(jié)果;可重復(fù)的過(guò)程;好的文章結(jié)構(gòu)和邏輯流程;精選的參考文獻(xiàn)。Title要說(shuō)明你的研究?jī)?nèi)容,要有一定吸引力;Abstract包括研究目的,主要研究結(jié)果,得出什么重要的結(jié)論。:最好引用原始文獻(xiàn),不要二次引用;注意文獻(xiàn)編排格式,與你要投的刊物要一致;不要漏和多參考文獻(xiàn)??匆幌履憧赡芤兜目镏械腗aterials and Methods是怎么寫的,你可以參考。 Methods:你在試驗(yàn)中得到的數(shù)據(jù),都要寫出相應(yīng)方法。在Discussion的最后要總結(jié)一下,告訴別人你這個(gè)研究的幾個(gè)主要結(jié)果。但要保證每一段都有一個(gè)主題,即每一段討論一個(gè)主要話題。合理安排你的圖和表,如果可能的話盡可能用圖。,尋找你這個(gè)試驗(yàn)結(jié)果的Key point,一定要保證這個(gè)Key point具有較大的新意,或者說(shuō)一個(gè)到這個(gè)Key point 有一種振奮人心的感覺(jué)。在這個(gè)過(guò)程中盡可能和不同的研究人員探討你的試驗(yàn)結(jié)果,因?yàn)椴煌娜藢?duì)同一張表和圖有不同的看法。驗(yàn)結(jié)束后,立即進(jìn)行總結(jié)數(shù)據(jù),寫文章,主要步驟可參考: 。這樣做出來(lái)的文章一般也能發(fā)在和以上兩篇文章檔次差不多的雜志。例如最近三年有不同作者發(fā)了兩篇文章,一篇報(bào)道因素A對(duì)提高玉米抗逆性有很大影響,第二篇報(bào)道因素B對(duì)小麥抗逆性有很大影響。因?yàn)槟阏J(rèn)為創(chuàng)新的東西可能是人家已經(jīng)做過(guò)的(只是研究失敗,所以沒(méi)有報(bào)道),或者你的思路本身就是錯(cuò)誤的。思路創(chuàng)新有兩種方法:(1)如果你個(gè)人在某領(lǐng)域進(jìn)行了多年研究,你覺(jué)得某些問(wèn)題解決的關(guān)鍵應(yīng)該在于某個(gè)方面的深入研究,如果很少有人注意此方面研究而你首先開(kāi)始,那你的文章就創(chuàng)新。在電腦上看與打印出來(lái)看,效果完全不一樣。12)請(qǐng)?zhí)峁┧凶髡叩?2寸照片,以及60字左右的英文簡(jiǎn)介。9)文章的主要問(wèn)題在于英語(yǔ)表達(dá)上面,如摘要,引言,實(shí)驗(yàn)以及總結(jié)部分是審稿人看得最多的地方,建議在修改稿中提高英語(yǔ)表達(dá)水平。7)文章的長(zhǎng)度不能少于5頁(yè),不長(zhǎng)于15頁(yè)。5)算法描述的偽代碼應(yīng)做成獨(dú)立圖片。2)注意圖片的下標(biāo)(參照模版)3)數(shù)學(xué)符號(hào)應(yīng)重構(gòu)。所有期刊文章必需列出 , , , n是期。請(qǐng)嚴(yán)格按模版排版,任何與模版不一致的地方都會(huì)被出版社退回修改,這點(diǎn)非常重要,請(qǐng)一定要重視 With the advancement in networking and multimedia technologies enables the distribution and sharing of multimedia content the meantime, piracy bees increasingly rampant as the customers can easily duplicate and redistribute the received multimedia content to a large the copyrighted multimedia content is appropriately used has bee increasingly critical [1].Although encryption can provide multimedia content with the desired security during transmission, once a piece of digital content is decrypted, the dishonest customer can redistribute it arbitrarily[2, 3]. original image J01 TemplateWith the advancement in networking and multimedia technologies enables the distribution and sharing of multimedia content the meantime, piracy bees increasingly rampant as the customers can easily duplicate and redistribute the received multimedia content to a large the copyrighted multimedia content is appropriately used has bee increasingly encryption can provide multimedia content with the desired security during transmission, once a piece of digital content is decrypted, the dishonest customer can redistribute it Database speech collection of ManuscriptWith the advancement in networking and multimedia technologies enables the distribution and sharing of multimedia content the meantime, piracy bees increasingly rampant as the customers can easily duplicate and redistribute the received multimedia content to a large the copyrighted multimediaA speech corpus of an about 186 CCTV news, 16M Hz sampling and 16 bit quantization is used to train standard acoustics models and canonical acoustics are 17359 sentences of male announcer and 15931 sentences of female announcer in announcers are Luo Jing, Wang Ning, Zhang Hongmin, Kang Hui and Guo Zhijian, and female announcers are Li Ruiying, Li Xiuping, Xing Zhibin, Hai Xia and Li number of sentences of each announcer lists in table 1.[6] , , Wavelet BasedImages, ieee journal, , , 2006.【期刊 英文文作者】[7] ,