Minggu, 10 Agustus 2014

WRITING AND ANALIZING AN ARTICLE




WRITING AND ANALIZING AN ARTICLE


Database Security: What Students Need to Know

Executive Summary
 

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an understanding of the issues and challenges related to database security and must be able to identify possible solutions.
 

At its core, database security strives to insure that only authenticated users perform authorized activities at authorized times. While database security incorporates a wide array of security topics, not with standing, physical security, network security, encryption and authentication, this paper focuses on the concepts and mechanisms particular to securing data. Within that context, database security encompasses three constructs: confidentiality or protection of data from unauthorized disclosure, integrity or prevention from unauthorized data access, and availability or the identification of and recovery from hardware and software errors or malicious activity resulting in the denial of data availability.
 

In the computing discipline curricula, database security is often included as a topic in an introductory database or introductory computer security course. This paper presents a set of sub-topics that might be included in a database security component of such a course. Mapping to the three constructs of data security, these topics include access control, application access, vulnerability, inference, and auditing mechanisms. Access control is the process by which rights and privileges are assigned to users and database objects. Application access addresses the need to assign appropriate access rights to external applications requiring a database connection. Vulnerability refers to weaknesses that allow malicious users to exploit resources. Inference refers to the use of legitimate data to infer unknown information without having rights to directly retrieve that information.
 

Database auditing tracks database access and user activity providing a way to identify breaches that have occurred so that corrective action might be taken.


A. INTRODUCTION
a. Talking about the general description
Description (Database Design)
Reports (Taken from other sources: books,….)
Conclusion
b. Talking about the purpose
The purpose (Data base)
Other sources talk about the purposes
The Conclusion of purpose
c. Limit the purpose of your article
  1.
  2.
  3.
d. Present sub-topics will discuss further
  1.
  2.
  3.
 
B. Sub-topic 1 (Access Control)
Purpose
Characteristics
Providing the examples
Conclusion or review the next sub-topic
 
C. Sub-topic 2 (Procedure)
First,…………………………………………(provide with the picture and describe the picture in detail.
Second, (provide with the picture and describe the picture in detail.
Third, (provide with the picture and describe the picture in detail.
Finally, (provide with the picture and describe the picture in detail.
 
D. Conclusion
General description
Facts
Purpose
Benefits
Suggestion
Recommendation

DIRECT CITATION & INDIRECT CITATION

DIRECT CITATION

Gupta and Herath (2005: 19) says that “in a 2002 survey of 60 ASPs in 13 Asia-Pacific countries, IDC found that 77% of ASPs are targeting specific industries including retail, discrete manufacturing and financial services”.

Susarla et al., (2000: 13) expresses that “ASPs enable SMEs to assess to best technology, improve IT support, rapid implement of IT applications, integrate IT systems, access to IT experts, increase systems uptime, and reduce IT budgets that would otherwise only be in the hand of large corporations”.

 “The Garner Group has predicted that most enterprises will rent software or use software services rather than purchase software and implement it in-house in the next ten years” (Terdiman et al., 2003: 23).


INDIRECT CITATION

In addition, there is not much research on IT outsourcing to ASPs and particularly in small and medium-sized enterprises, SMEs (Dibbern et al., 200: 24; Ekanayaka et al., 2003: 75).

Key advantages to e-sourcing include the ability to reduce service and administration costs, and shorten time-to- market cycles (Aberdeen Research 2002; Travis 2000).

Even though NSPs usually do not focus on applications, at present they are moving towards the role of owning relationship with the SMEs (Ekanayaka et al., 2003).

 ANSWER
DIRECT CITATION
 
Based on a 2002 survey of 60 ASPs in 13 Asia-Pacific countries, IDC reported that 77% of ASPs are focusing specific industries i.e. retail, small companies, and financial services Gupta and Herath (2005: 19).

ASPs support SMEs to assess to best technology of IT such as Improving application and supports, Integrating the system, updating, accessing to IT experts, and reducing the budgets Susarla et al., (2000: 13).

The Garner Group believes that most firms prefer rent software and use its services to buy software and install in the firms for the next ten years (Terdiman et al., 2003: 23).

ENGLISH LANGUAGE TASK - JOURNAL PARAPHRASE



ENGLISH LANGUAGE TASK
JOURNAL PARAPHRASE
DIGITAL IMAGE PROCESSING TECHNIQUES FOR THE DETECTION AND REMOVAL OF CRACKS IN DIGITIZED






DEWI RAHMAWATI
12650054






DEPARTMENT OF INFORMATICS
FACULTY SCIENCE AND TECHNOLOGY
ISLAMIC STATE UNIVERSITY  OF MALANG
2014

 
DIGITAL IMAGE PROCESSING TECHNIQUES FOR THE DETECTION AND REMOVAL OF CRACKS IN DIGITIZED
Ioannis Giakoumis, Nikos Nikolaidis, Ioannis Pitas
Department of Informatics
Aristotle University of Thessaloniki
54124 Thessaloniki, Greece
tel/fax: +302310996304
e-mail: fnikolaid,pitasg@zeus.csd.auth.gr

1.      A system that is capable of tracking and interpolating cracks is presented in [1].
Paraphrase :
Digital Image Processing is a system that can be used for tracking a line and interpolating cracks (M. Barni, F. Bartolini, V. Cappellini - 2000 )

2.      A method for the detection of cracks using multi-oriented Gabor filters is presented in [2].
Paraphrase :
A linear filter used for edge detection called multi-oriented Gabor Filters is a methods for discover a cracks of images (F. Abas, K. Martinez - 2002 )

3.      Crack detection and removal bears certain similarities with methods proposed for the detection and removal of scratches and other artifacts from motion picture films [3], [4], [5].
Paraphrase :
Steps for detection and removal that use for repairing cracks have a resemblance with step for repairing scratches and other artifacts from motion picture films (L. Joyeux, O. Buisson, B. Besserer, S. Boukir - 1999 )

4.      Different approaches for interpolating information in structured [6], [7], [8], [9], [10] and textured image areas [11] have been developed
Paraphrase :
For implied imformation in structured and textured image areas that have been growth is needed a different approaches (  M. Bertalmio, G. Sapiro, V. Caselles, C. Ballester -  2000 )


5.      A technique that decomposes the image to textured and structured areas and uses appropriate interpolation techniques depending on the area where the missing information lies has also been proposed [12].
Paraphrase :
Precisely technique for repaired a cracks in images by using separates image to textured and structured areas and interpolation technique that depending on the area where missing information lies has also been proposed. ( M. Bertalmio, L. Vese, G. Sapiro, S. Osher – 2003 )

6.      The methodology is an extension of the crack removal framework presented in [13].
Paraphrase :
A methodology for the restoration of cracks on digitalized image is an expansion from crack removal framework. (I. Giakoumis, I. Pitas - 1998. )

7.      A crack detection procedure based on the so-called top-hat transform [14] is proposed in this paper.
Paraphrase :
Top-Hat transform is an operation that extracts small elements and details from given images which is to use for procedure based on crack detection ( F. Meyer – 1979 )

8.      An effective way to interpolate the cracks is to apply median or other order statistics filters [15] in their neighborhood.
Paraphrase :
Crack filling based on order statistics filters is effective way to interpolate the cracks. (I. Pitas, A.N. Venetsanopoulos - 1990. )


9.      This separation can be achieved by classification using a Median Radial Basis Function (MRBF) neural network, which is a robust, order statistics based, variation of Radial Basis Function (RBF) networks [16].
Paraphrase :
Separation of the cracks can be succesful by getting classification using a median radial basis function (MRBF) neural network, which is a robust, order statistics foundation and variation of Radial Basis Function (RBF) networks (A. G. Bors, I. Pitas - 1996 )

10.  RBFs are two-layer feedforward neural networks [17], that model a mapping between a set of input vectors and a set of outputs.
Paraphrase :
Radial Basis Function (RBF) is model for mapping about a set of input vectors and a set of outputs which is have a two layer feedforward neural networks. ( S. Haykin, Neural Networks – 1999 )