You are on page 1of 10

Writing Problem and Hypothesis

Statements for Engineering Research(3)


/

http://www.chineseowl.idv.tw


Setting of work proposal :
? ?
Work problem :
?
Quantitative specification of problem :

?
Importance of problem :
,
?
Project need : ,
?

Work objective : ?
Methodology to achieve objective
: ?
Anticipated results :
?
Contribution to field :
?
()
Mobile phones have pervaded daily life since the end of
2002, as evidenced by the number of subscribers in Taiwan surpassing
the entire population. That percentage increased to 113% by the third
quarter of 2003 with 25,275,000 subscribers island wide, or an average
of 113 mobile phone numbers per 100 individuals.
However, subscribers find it extremely difficult to switch
telecommunication providers owing to the inability to transfer the
original phone number to the new service provider.
A recent survey indicated that two-thirds of 6,000,000 subscribers
dissatisfied with their current service providers want to switch operators.
However, many of those individuals find it impossible to do so given the
inconvenience of changing the original mobile phone number.
The inability to transfer the original mobile phone
number from one telecom provider to another severely restricts
subscribers, creating an unfair advantage for established operators and
extremely difficult for newly established ones to attract customers.
Therefore, a centralized database must be established that
contains all portable mobile phone numbers in Taiwan.
()
A centralized database can be developed
that contains all portable mobile phone numbers in Taiwan.
To do so, specifications can be
established to describe the communication protocol and the
complete architecture. A simulator can then be developed
for operators to test in the early stages. Next, a field trial
can be made with all telecom service providers.
Additionally, the centralized database containing portable
mobile phone numbers can be implemented under the
auspices of the Telecom Technology Center.
()
As anticipated, the proposed centralized database
can enable subscribers to switch telecom providers while
retaining the original phone number. The entire procedure for
subscribers to switch providers can be completed in four working
days. In addition to enabling mobile phone subscribers to freely
select their providers, the proposed centralized database can
pave the way for new telecom operators to increase the quality
of service in the local sector. Importantly, the
proposed database can provide a valuable reference for other
countries without portable mobile phone numbers. (NOTE : Add
2-3 more sentences that describe more thoroughly how the
proposed method contributes to a particular field or sector)
()
Our senior management recently
expressed concern over how to avoid financial loss and
ensure product innovation through electronic data
protection. Despite increasing security
concerns over electronic data and copyright protection,
malicious programs such as viruses can easily compromise
confidential data stored in computers. Computers store
data in unencrypted storage devices, e.g., hard disks,
making it easy to read and modify such data.
Although numerous software data encryption programs
are available, the encryption key is also stored in plan-text
on a storage device, further complicating the data retrieval
process and leaving the data not entirely protected.
()
For instance, statistics over the past
five years indicate that malicious programs and the
tampering of confidential data cost enterprises over 75 US
billion dollars annually. The inability
to resolve this problem will not only to further financial loss,
but also to the diminishing of product innovation given the
inability to ensure copyright protection of electronic data.
Therefore, a tamper-proof scheme with
encryption/decryption capabilities must be developed.
()
A tamper-proof scheme with encryption/decryption
capabilities can be developed. To do so, a security
chip with tamper-proof and crypto capabilities can be designed for
attachment to a computer motherboard. The encryption operation can
then be performed when confidential data must be stored, with the
cipher-text stored in a normal storage device such as a hard disk. Next,
the encryption key can be stored in a tamper-proof storage of a security
chip, making it impossible to retrieve the key without privilege and
alleviating concerns over data compromise. As anticipated,
the proposed tamper-proof scheme can significantly reduce the
incidence of confidential data compromised, thus ensuring copyright
protection of electronic data. Importantly, the proposed
method can contribute to efforts to ensure data protection, making it
highly promising for widespread use. (NOTE : Add 2-3 more
sentences that describe more thoroughly how the proposed method
contributes to a particular field or sector)
Further details can be found at
http://www.chineseowl.idv.tw

You might also like