Evolution and Maintenance of Frequent Pattern Space when Transactions are Removed
GRE阅读高频机经原文及答案:雄性动物养孩子
GRE阅读高频机经原文及答案:雄性动物养孩子想必大家在备考gre考试的时候,最喜欢的就是吸取新鲜的考试真题,这样对自己的能力也是一个考验,最能检验自己目前的能力在什么水平,今天小编为大家带来的就是GRE阅读高频机经原文及答案:雄性动物养孩子!GRE阅读高频机经原文及答案:雄性动物养孩子雄性动物养孩子The main exception to primate researchers’ general pattern of ignoring interactions between males and infants has been the study of male care among monogamous primates. It has been known for over 200 years, ever since a zoologist-illustrator named George Edwards decided to watch the behavior of pet marmosets in a London garden, that among certain species of New World monkeys males contributed direct care for infants that equaled or exceeded that given by females. Mothers among marmosets and tamarins typically give birth to twins, as often as twice a year, and to ease the female in her staggering reproductive burden the male carries the infant at all times except when the mother is actually suckling it. It was assumed by Kleiman that monogamy and male confidence of paternity were essential to the evolution of such care, and at the same time, it was assumed by Symons and others that monogamy among primates must be fairly rare.Recent findings, however, make it necessary to reverse this picture. First of all, monogamy among primates turns out to be rather more frequent than previously believed (either obligate or facultive monogamy can be documented for some 17-20 percent of extant primates) and second, male care turns out to be far more extensive than previously thought and notnecessarily confined to monogamous species, according to Hrdy. Whereas previously, it was assumed that monogamy and male certainty of paternity facilitated the evolution of male care, it now seems appropriate to consider the alternative possibility, whether the extraordinary capacity of male primates to look out for the fates of infants did not in some way pre-adapt members of this order for the sort of close, long-term relationships between males and females that, under some ecological circumstances, leads to monogamy! Either scenario could be true. The point is that on the basis of present knowledge there is no reason to view male care as a restricted or specialized phenomenon. In sum, though it remains true that mothers among virtually all primates devote more time and/or energy to rearing infants than do males, males nonetheless play a more varied and critical role in infant survival than is generally realized.1. The author of the passage mentions the work of Hrdy primarily toA. present an instance of an untenable assumptionB. illustrate a consensus by citing a representative claimC. provide evidence that challenges a beliefD. highlight a corollary of a widespread viewE. offer data that help resolve a debate2. According to the passage, the evolutionary relationship between male care and monogamy isA. incontestableB. immutableC. uncommonD. immaterialE. uncertain3. The author of the passage suggests that it is “appropriateto consider the alternative possibility” because the previous viewA. results in a contradictionB. depends on problematic dataC. appears less definite given certain factsD. conflates two distinct phenomenaE. overlooks a causal relationship between correlated phenomena4. Which of the following statements, if true, would pose the grea test challenge to “the alternative possibility”?A. The number of primate species in which male care of infants is exhibited is greater than the number of primate species that practice monogamy.B. Male care of infants among primates can be seen earlier in the evolutionary record than can monogamy among primates.C. Monogamous relationships among primates can be found in species living in a variety of physical environments.D. Most primate species that practice monogamy do not show any evidence of male care of infants.E. Male care of infants can be observed in some primate species that lack male confidence of paternity.答案:CECAGRE阅读容易被你所忽视的三类词汇perspective 透视画法;观点,方法;前景,远景prospect 前景,景色;前途;勘探,寻找appreciate 理解,认识,意识到;欣赏;感激elaborate v.&adj. 精心制作,详细描述;精心制作的address v.从事,忙于;n. 演讲appropriate v. 拨给(资金),盗用/ adj.合适的strain n. 血统,品系,菌株;紧张,张力;v.扭伤,拉紧article n. 物品,商品intrigue v.&n 激发兴趣;密谋;阴谋intriguing adj. 激发兴趣的assume v. 承担,担任;假装;假设bark n. 树皮;犬吠bill n.议案,法案;鸟嘴;账单champion vt. 支持,拥护;n.冠军aging n.老化,陈酿complex n. 综合体 adj.复杂的concern n. 公司(垄断组织“康采恩”就是它的音译)attribute v.&n 归因于;特征,属性default n.&v. 不履行;违约;拖欠;默认(值)drill vt. 钻(孔);训练,操练exploit v. 开发,利用n. 功绩fair n. 集市,交易会;adj.公平的,美丽的 adv.公平地,直接地fairly adv. 相当地,公平地game n. 猎物,野味fashion vt. 形成,塑造 n.时尚,方式inviting adj. 引人注目的,吸引人的alternate v.&adj. 交替,轮流; 交替的alternating adj.交互的,交替的alternative n.&adj. 可供选择的方案(option);选择性的(optional) GRE阅读如何把握作者写作态度有利于解题1.社会现象.作者反对将社会现象拔高到阶级、政治、意识形态或超人性的高度,反对各种左派思想、革命主张和马克思主义。
高级英语(第三版)第二册 课后答案
高级英语(第三版)第二册课后答案第一课:Exercise 1:1.The discovery of the Rosetta Stone was a significant event in the field of Egyptology.2.The Rosetta Stone played a crucial role in deciphering ancient Egyptian hieroglyphs.3.The discovery of the Rosetta Stone shed light on the history and culture of ancient Egypt.4.The Rosetta Stone is currently on display at the British Museum in London.5.The Rosetta Stone is inscribed with a decree issued6. King Ptolemy V.Exercise 2:1.ancient Egyptian hieroglyphs2.ancient Greek3.the British Museum4.196 BC5.King Ptolemy V6.stone slab7.mysterious symbols8.inscribed message第二课:Exercise 1:1.The Industrial Revolution transformed society2. introducing new manufacturing processes.3.The Industrial Revolution led to urbanization as people moved to cities to find work.4.The Industrial Revolution brought about significant technological advancements.5.The Industrial Revolution had a profound impact on the global economy.6.The Industrial Revolution began in the late 18th century in Britn.Exercise 2:1.manufacturing processes2.urbanization3.technological advancements4.global economyte 18th century6.Britn7.significant impact8.transformed society第三课:Exercise 1:1.The theory of evolution is widely accepted in the scientific community.2.Charles Darwin is credited with developing the theory of evolution.3.Natural selection is an essential component of the theory of evolution.4.The theory of evolution explns how species adapt and change over time.5.The theory of evolution has revolutionized our understanding of the natural world.Exercise 2:1.theory of evolution2.scientific community3.Charles Darwin4.natural selection5.species adaptation6.change over time7.revolutionized understanding8.natural world第四课:Exercise 1:1.Climate change is a pressing global issue that requires immediate attention.2.Human activities, such as burning fossil fuels, contribute to climate change.3.The rise in global temperatures is one of the major impacts of climate change.4.Climate change leads to more frequent and severe natural disasters.5.Mitigation and adaptation strategies are essential inaddressing climate change.Exercise 2:1.pressing global issue2.immediate attention3.burning fossil fuels4.global temperatures5.major impacts6.natural disasters7.mitigation strategies8.adaptation strategies以上是《高级英语(第三版)第二册》的课后答案。
道路桥梁专业 中英文对照---毕业设计论文 外文文献翻译
附录一英文翻译原文AUTOMATIC DEFLECTION AND TEMPERATURE MONITORING OFA BALANCED CANTILEVER CONCRETE BRIDGEby Olivier BURDET, Ph.D.Swiss Federal Institute of Technology, Lausanne, SwitzerlandInstitute of Reinforced and Prestressed Concrete SUMMARYThere is a need for reliable monitoring systems to follow the evolution of the behavior of structures over time.Deflections and rotations are values that reflect the overall structure behavior. This paper presents an innovative approach to the measurement of long-term deformations of bridges by use of inclinometers. High precision electronic inclinometers can be used to follow effectively long-term rotations without disruption of the traffic. In addition to their accuracy, these instruments have proven to be sufficiently stable over time and reliable for field conditions. The Mentue bridges are twin 565 m long box-girder post-tensioned concrete highway bridges under construction in Switzerland. The bridges are built by the balanced cantilever method over a deep valley. The piers are 100 m high and the main span is 150 m. A centralized data acquisition system was installed in one bridge during its construction in 1997. Every minute, the system records the rotation and temperature at a number of measuring points. The simultaneous measurement of rotations and concrete temperature at several locations gives a clear idea of the movements induced by thermal conditions. The system will be used in combination with a hydrostatic leveling setup to follow the long-term behavior of the bridge. Preliminary results show that the system performs reliably and that the accuracy of the sensors is excellent.Comparison of the evolution of rotations and temperature indicate that the structure responds to changes in air temperature rather quickly.1.BACKGROUNDAll over the world, the number of structures in service keeps increasing. With the development of traffic and the increased dependence on reliable transportation, it is becoming more and more necessary to foresee and anticipate the deterioration of structures. In particular,for structures that are part of major transportation systems, rehabilitation works need to be carefully planned in order to minimize disruptions of traffic. Automatic monitoring of structures is thus rapidly developing.Long-term monitoring of bridges is an important part of this overall effort to attempt to minimize both the impact and the cost of maintenance and rehabilitation work of major structures. By knowing the rate of deterioration of a given structure, the engineer is able to anticipate and adequately define the timing of required interventions. Conversely, interventions can be delayed until the condition of the structure requires them, without reducing the overall safety of the structure.The paper presents an innovative approach to the measurement of long-term bridge deformations. The use of high precision inclinometers permits an effective, accurate and unobtrusive following of the long-term rotations. The measurements can be performed under traffic conditions. Simultaneous measurement of the temperature at several locations gives a clear idea of the movements induced by thermal conditions and those induced by creep and shrinkage. The system presented is operational since August 1997 in the Mentue bridge, currently under construction in Switzerland. The structure has a main span of 150 m and piers 100 m high.2. LONG-TERM MONITORING OF BRIDGESAs part of its research and service activities within the Swiss Federal Institute of Technology in Lausanne (EPFL), IBAP - Reinforced and Prestressed Concrete has been involved in the monitoring of long-time deformations of bridges and other structures for over twenty-five years [1, 2, 3, 4]. In the past, IBAP has developed a system for the measurement of long-term deformations using hydrostatic leveling [5, 6]. This system has been in successful service in ten bridges in Switzerland for approximately ten years [5,7]. The system is robust, reliable and sufficiently accurate, but it requires human intervention for each measurement, and is not well suited for automatic data acquisition. One additional disadvantage of this system is that it is only easily applicable to box girder bridges with an accessible box.Occasional continuous measurements over periods of 24 hours have shown that the amplitude of daily movements is significant, usually amounting to several millimeters over a couple of hours. This is exemplified in figure 1, where measurements of the twin Lutrive bridges, taken over a period of several years before and after they were strengthened by post-tensioning, areshown along with measurements performed over a period of 24 hours. The scatter observed in the data is primarily caused by thermal effects on the bridges. In the case of these box-girder bridges built by the balanced cantilever method, with a main span of 143.5 m, the amplitude of deformations on a sunny day is of the same order of magnitude than the long term deformation over several years.Instantaneous measurements, as those made by hydrostatic leveling, are not necessarily representative of the mean position of the bridge. This occurs because the position of the bridge at the time of the measurement is influenced by the temperature history over the past several hours and days. Even if every care was taken to perform the measurements early in the morning and at the same period every year, it took a relatively long time before it was realized that the retrofit performed on the Lutrive bridges in 1988 by additional post-tensioning [3, 7,11] had not had the same effect on both of them.Figure 1: Long-term deflections of the Lutrive bridges, compared to deflections measured in a 24-hour period Automatic data acquisition, allowing frequent measurements to be performed at an acceptable cost, is thus highly desirable. A study of possible solutions including laser-based leveling, fiber optics sensors and GPS-positioning was performed, with the conclusion that, provided that their long-term stability can be demonstrated, current types of electronic inclinometers are suitable for automatic measurements of rotations in existing bridges [8].3. MENTUE BRIDGESThe Mentue bridges are twin box-girder bridges that will carry the future A1 motorway from Lausanne to Bern. Each bridge, similar in design, has an overall length of approximately 565 m, and a width of 13.46 m, designed to carry two lanes of traffic and an emergency lane. The bridges cross a deep valley with steep sides (fig. 2). The balanced cantilever design results from a bridge competition. The 100 m high concrete piers were built using climbing formwork, after which the construction of the balanced cantilever started (fig. 3).4. INCLINOMETERSStarting in 1995, IBAP initiated a research project with the goal of investigating the feasibility of a measurement system using inclinometers. Preliminary results indicated that inclinometers offer several advantages for the automatic monitoring of structures. Table 1 summarizes the main properties of the inclinometers selected for this study.One interesting property of measuring a structure’s rotations, is that, for a given ratio of maximum deflection to span length, the maximum rotation is essentially independent from its static system [8]. Since maximal allowable values of about 1/1,000 for long-term deflections under permanent loads are generally accepted values worldwide, developments made for box-girder bridges with long spans, as is the case for this research, are applicable to other bridges, for instance bridges with shorter spans and other types of cross-sections. This is significant because of the need to monitor smaller spans which constitute the majority of all bridges.The selected inclinometers are of type Wyler Zerotronic ±1°[9]. Their accuracy is 1 microradian (μrad), which corresponds to a rotation of one millimeter per kilometer, a very small value. For an intermediate span of a continuous beam with a constant depth, a mid-span deflection of 1/20,000 would induce a maximum rotation of about 150 μrad, or 0.15 milliradians (mrad).One potential problem with electronic instruments is that their measurements may drift overtime. To quantify and control this problem, a mechanical device was designed allowing the inclinometers to be precisely rotated of 180° in an horizontal plane (fig. 4). The drift of each inclinometer can be very simply obtained by comparing the values obtained in the initial and rotated position with previously obtained values. So far, it has been observed that the type of inclinometer used in this project is not very sensitive to drifting.5. INSTRUMENTATION OF THE MENTUE BRIDGESBecause a number of bridges built by the balanced cantilever method have shown an unsatisfactory behavior in service [2, 7,10], it was decided to carefully monitor the evolution of the deformations of the Mentue bridges. These bridges were designed taking into consideration recent recommendations for the choice of the amount of posttensioning [7,10,13]. Monitoring starting during the construction in 1997 and will be pursued after the bridges are opened to traffic in 2001. Deflection monitoring includes topographic leveling by the highway authorities, an hydrostatic leveling system over the entire length of both bridges and a network of inclinometers in the main span of the North bridge. Data collection iscoordinated by the engineer of record, to facilitate comparison of measured values. The information gained from these observations will be used to further enhance the design criteria for that type of bridge, especially with regard to the amount of post-tensioning [7, 10, 11, 12, 13].The automatic monitoring system is driven by a data acquisition program that gathers and stores the data. This system is able to control various types of sensors simultaneously, at the present time inclinometers and thermal sensors. The computer program driving all the instrumentation offers a flexible framework, allowing the later addition of new sensors or data acquisition systems. The use of the development environment LabView [14] allowed to leverage the large user base in the field of laboratory instrumentation and data analysis. The data acquisition system runs on a rather modest computer, with an Intel 486/66 Mhz processor, 16 MB of memory and a 500 MB hard disk, running Windows NT. All sensor data are gathered once per minute and stored in compressed form on the hard disk. The system is located in the box-girder on top of pier 3 (fig. 5). It can withstand severe weather conditions and will restart itself automatically after a power outage, which happened frequently during construction.6. SENSORSFigure 5(a) shows the location of the inclinometers in the main span of the North bridge. The sensors are placed at the axis of the supports (①an d⑤), at 1/4 and 3/4 (③an d④) of the span and at 1/8 of the span for②. In the cross section, the sensors are located on the North web, at a height corresponding to the center of gravity of the section (fig.5a). The sensors are all connected by a single RS-485 cable to the central data acquisition system located in the vicinity of inclinometer ①. Monitoring of the bridge started already during its construction. Inclinometers①,②and③were installed before the span was completed. The resulting measurement were difficult to interpret, however, because of the wide variations of angles induced by the various stages of this particular method of construction.The deflected shape will be determined by integrating the measured rotations along the length of the bridge (fig.5b). Although this integration is in principle straightforward, it has been shown [8, 16] that the type of loading and possible measurement errors need to be carefully taken into account.Thermal sensors were embedded in concrete so that temperature effects could be taken into account for the adjustment of the geometry of the formwork for subsequent casts. Figure 6 shows the layout of thermal sensors in the main span. The measurement sections are located at the same sections than the inclinometers (fig. 5). All sensors were placed in the formwork before concreting and were operational as soon as the formwork was removed, which was required for the needs of the construction. In each section, seven of the nine thermal sensor (indicated in solid black in fig. 6) are now automatically measured by the central data acquisition system.7. RESULTSFigure 7 shows the results of inclinometry measurements performed from the end ofSeptember to the third week of November 1997. All inclinometers performed well during that period. Occasional interruptions of measurement, as observed for example in early October are due to interruption of power to the system during construction operations. The overall symmetry of results from inclinometers seem to indicate that the instruments drift is not significant for that time period. The maximum amplitude of bridge deflection during the observed period, estimated on the basis of the inclinometers results, is around 40 mm. More accurate values will be computed when the method of determination ofdeflections will have been further calibrated with other measurements. Several periods of increase, respectively decrease, of deflections over several days can be observed in the graph. This further illustrates the need for continuous deformation monitoring to account for such effects. The measurement period was .busy. in terms of construction, and included the following operations: the final concrete pours in that span, horizontal jacking of the bridge to compensate some pier eccentricities, as well as the stressing of the continuity post-tensioning, and the de-tensioning of the guy cables (fig. 3). As a consequence, the interpretation of these measurements is quite difficult. It is expected that further measurements, made after the completion of the bridge, will be simpler to interpret.Figure 8 shows a detail of the measurements made in November, while figure.9 shows temperature measurements at the top and bottom of the section at mid-span made during that same period. It is clear that the measured deflections correspond to changes in the temperature. The temperature at the bottom of the section follows closely variations of the air temperature(measured in the shade near the north web of the girder). On the other hand, the temperature at the top of the cross section is less subject to rapid variations. This may be due to the high elevation of the bridge above ground, and also to the fact that, during the measuring period, there was little direct sunshine on the deck. The temperature gradient between top and bottom of the cross section has a direct relationship with short-term variations. It does not, however, appear to be related to the general tendency to decrease in rotations observed in fig. 8.8. FUTURE DEVELOPMENTSFuture developments will include algorithms to reconstruct deflections from measured rotations. To enhance the accuracy of the reconstruction of deflections, a 3D finite element model of the entire structure is in preparation [15]. This model will be used to identify the influence on rotations of various phenomena, such as creep of the piers and girder, differential settlements, horizontal and vertical temperature gradients or traffic loads.Much work will be devoted to the interpretation of the data gathered in the Mentue bridge. The final part of the research project work will focus on two aspects: understanding the very complex behavior of the structure, and determining the most important parameters, to allow a simple and effective monitoring of the bridges deflections.Finally, the research report will propose guidelines for determination of deflections from measured rotations and practical recommendations for the implementation of measurement systems using inclinometers. It is expected that within the coming year new sites will be equipped with inclinometers. Experiences made by using inclinometers to measure deflections during loading tests [16, 17] have shown that the method is very flexible and competitive with other high-tech methods.As an extension to the current research project, an innovative system for the measurement of bridge joint movement is being developed. This system integrates easily with the existing monitoring system, because it also uses inclinometers, although from a slightly different type.9. CONCLUSIONSAn innovative measurement system for deformations of structures using high precision inclinometers has been developed. This system combines a high accuracy with a relatively simple implementation. Preliminary results are very encouraging and indicate that the use of inclinometers to monitor bridge deformations is a feasible and offers advantages. The system is reliable, does not obstruct construction work or traffic and is very easily installed. Simultaneous temperature measurements have confirmed the importance of temperature variations on the behavior of structural concrete bridges.10. REFERENCES[1] ANDREY D., Maintenance des ouvrages d’art: méthodologie de surveillance, PhD Dissertation Nr 679, EPFL, Lausanne, Switzerland, 1987.[2] BURDET O., Load Testing and Monitoring of Swiss Bridges, CEB Information Bulletin Nr 219, Safety and Performance Concepts, Lausanne, Switzerland, 1993.[3] BURDET O., Critères pour le choix de la quantitéde précontrainte découlant de l.observation de ponts existants, CUST-COS 96, Clermont-Ferrand, France, 1996.[4] HASSAN M., BURDET O., FAVRE R., Combination of Ultrasonic Measurements and Load Tests in Bridge Evaluation, 5th International Conference on Structural Faults and Repair, Edinburgh, Scotland, UK, 1993.[5] FAVRE R., CHARIF H., MARKEY I., Observation à long terme de la déformation des ponts, Mandat de Recherche de l’OFR 86/88, Final Report, EPFL, Lausanne, Switzerland, 1990.[6] FAVRE R., MARKEY I., Long-term Monitoring of Bridge Deformation, NATO Research Workshop, Bridge Evaluation, Repair and Rehabilitation, NATO ASI series E: vol. 187, pp. 85-100, Baltimore, USA, 1990.[7] FAVRE R., BURDET O. et al., Enseignements tirés d’essais de charge et d’observations à long terme pour l’évaluation des ponts et le choix de la précontrainte, OFR Report, 83/90, Zürich, Switzerland, 1995.[8] DAVERIO R., Mesures des déformations des ponts par un système d’inclinométrie,Rapport de maîtrise EPFL-IBAP, Lausanne, Switzerland, 1995.[9] WYLER AG., Technical specifications for Zerotronic Inclinometers, Winterthur, Switzerland, 1996.[10] FAVRE R., MARKEY I., Generalization of the Load Balancing Method, 12th FIP Congress, Prestressed Concrete in Switzerland, pp. 32-37, Washington, USA, 1994.[11] FAVRE R., BURDET O., CHARIF H., Critères pour le choix d’une précontrainte: application au cas d’un renforcement, "Colloque International Gestion des Ouvrages d’Art: Quelle Stratégie pour Maintenir et Adapter le Patrimoine, pp. 197-208, Paris, France, 1994. [12] FAVRE R., BURDET O., Wahl einer geeigneten Vorspannung, Beton- und Stahlbetonbau, Beton- und Stahlbetonbau, 92/3, 67, Germany, 1997.[13] FAVRE R., BURDET O., Choix d’une quantité appropriée de précontrain te, SIA D0 129, Zürich, Switzerland, 1996.[14] NATIONAL INSTRUMENTS, LabView User.s Manual, Austin, USA, 1996.[15] BOUBERGUIG A., ROSSIER S., FAVRE R. et al, Calcul non linéaire du béton arméet précontraint, Revue Français du Génie Civil, vol. 1 n° 3, Hermes, Paris, France, 1997. [16] FEST E., Système de mesure par inclinométrie: développement d’un algorithme de calcul des flèches, Mémoire de maîtrise de DEA, Lausanne / Paris, Switzerland / France, 1997.[17] PERREGAUX N. et al., Vertical Displacement of Bridges using the SOFO System: a Fiber Optic Monitoring Method for Structures, 12th ASCE Engineering Mechanics Conference, San Diego, USA, to be published,1998.译文平衡悬臂施工混凝土桥挠度和温度的自动监测作者Olivier BURDET博士瑞士联邦理工学院,洛桑,瑞士钢筋和预应力混凝土研究所概要:我们想要跟踪结构行为随时间的演化,需要一种可靠的监测系统。
A_Diachronic_Study_of_the_Phenomena_of_Personal_Pr
Journal of Literature and Art Studies, December 2021, Vol. 11, No. 12, 981-989 doi: 10.17265/2159-5836/2021.12.008 A Diachronic Study of the Phenomena of Personal Pronounswith Attributives in Southeast Asia HuayuLU Yue-liSchool of Chinese Language and Literature, Beijing Normal University, Beijing, ChinaBased on the phenomenon of personal pronouns with attributives, this paper investigates the development andevolution of grammar in Southeast Asia Huayu . The results showed that the personal pronouns with attributiveshave shown an upward development trend in the centuries-old Huayu , as evidenced by the increasing number andfrequency of their use, and the expansion of the range of personal pronouns that can carry attributives as well as thetypes of attributives. In addition, investigating the use of this linguistic phenomenon in Huayu , Putonghua, andMandarin in a global perspective, it can be found that the three maintain a greater consistency.Keywords: in Southeast Asia Huayu , personal pronouns, diachronic studyIntroductionThe phenomenon of personal pronouns with attributives is ancient and has been extensively and thoroughly studied by scholars, such as Wang Li (1984, p. 485), Diao Yan-bin (2006, pp. 345-348; 2007, p. 52), He Yang (2008, p. 86), Wei Zhi-cheng (2007) and Zhang Feng-qin and Feng Ming (2004) and Shao Li and Wang Ke-fei (2018), covering such issues as the modifiable personal pronouns, the frequency of use of this structure, and its sources. However, these studies mainly focus on early Mandarin and Putonghua, while the phenomenon of personal pronouns with attributives in Huayu has received little attention, and only Lu Jian-ming (2018, pp. 425-426) has been seen discussing the use of personal pronouns with attributives in Singaporean Huayu . Therefore, the development and changes of the phenomenon of personal pronouns with attributives in centuries-old Huayu are yet to be examined and analyzed in order to form a more objective and comprehensive understanding of this grammatical phenomenon.Saussure (1959) states, “Every part of language is subjected to change. To each period there corresponds some appreciable evolution. Evolution may vary in rapidity and intensity, but this does not invalidate the principle” (p. 140). Although grammar changes more slowly than vocabulary and has a great deal of solidity, it is inevitable that some changes will occur in Huayu , which has been spread and used in Southeast Asia for a hundred years. This paper takes a “historical” look at the evolution of the personal pronouns as attributives in Southeast Asia Huayu , with Singaporean and Malaysian Huayu as the target languages 1. Referring to the historical staging of Huayu by Ser Wue-Hiong (2012) and Liu Xiao-mei (2016), and based on specific linguisticLU Yue-li, Ph.D., School of Chinese Language and Literature, Beijing Normal University.1Singapore and Malaysia are the countries with the largest concentration and number of ethnic Chinese persons among the 11 countries in Southeast Asia, and where Huayuwas first formed.A DIACHRONIC STUDY OF THE PHENOMENA OF PERSONAL PRONOUNS WITH ATTRIBUTIVES IN SOUTHEAST ASIA HUAYU982facts, the article divides the Southeast Asian Huayu into three stages, namely, 1919-1945, 1945-1980, and 1980-present. The corpus of this study consists of two main series: literary corpus and journalistic corpus. The literary corpus mainly comes from representative works in Southeast Asia, such as The Great Series of New Malaysian Literature, Selected Malaysian Literary Works, and The Great Series of Malaysian Literature, etc.; the journalistic corpus comes from more representative newspapers in Southeast Asia, such as Lat Pau, Sin Chew Daily, and Kwong Wah Yit Poh. 3 million words per phase, taking into account the balance of style and time.II. Diachronic Changes of Personal Pronouns with Attributives In the first stage, the use of the personal pronoun with attributives is very common, see examples:(1) 这样环境支配下的我,怎样地过下去呵!(《海丝》, 1927)I, who am under such circumstances, am not sure how I can go on living. (Sea Silk, 1927)(2) 这对于也是几个编者之一的你(君苹),感想是:“半推半就”的,然而却颇有点“沾沾自喜”。
人类简史 英文版 词汇量
人类简史英文版词汇量Human History: An OverviewIntroduction:Human history is a vast tapestry of civilizations, cultures, triumphs, and tragedies, stretching back thousands of years. This article aims to provide an overview of the key events and developments that have shaped the course of human history. It explores the milestones, empires, revolutions, and discoveries that have contributed to our current understanding of the world. By delving into the rich tapestry of human experience, we hope to deepen our appreciation for the complexity and progress of the human story.Prehistoric Era:The first chapter in human history begins in the Paleolithic era, when early hominids started using stone tools and mastering fire. Over time, Homo sapiens emerged as the dominant species, harnessing their unique cognitive abilities to thrive and adapt. The development of language enabled humans to communicate, cooperate, and transmit knowledge, leading to the formation of hunter-gatherer communities. Noteworthy prehistoric sites, such as Stonehenge and Lascaux Cave, provide valuable glimpses into the cultures and rituals of our early ancestors.Ancient Civilizations:1. Mesopotamia and Ancient Egypt: The cradle of civilization emerged in the fertile river valleys of Mesopotamia and Ancient Egypt. These early civilizations laid the foundation for complex social structures, advancedagricultural practices, and monumental architecture. The invention of writing systems, such as cuneiform and hieroglyphics, allowed for record-keeping and the establishment of legal codes. The construction of pyramids and ziggurats showcased the power and grandeur of these early empires.2. Indus Valley Civilization: Flourishing along the banks of the Indus River, the Indus Valley Civilization remains an enigma to historians. Its well-planned cities, impressive drainage systems, and sophisticated trade networks suggest a highly organized society. However, the lack of decipherable written records has left much of its history shrouded in mystery.3. Ancient Greece: Ancient Greece gave birth to democracy, philosophy, and the foundation of Western thought. Philosophers like Socrates, Plato, and Aristotle laid the groundwork for critical thinking and intellectual inquiry. Greek city-states, such as Athens and Sparta, engaged in frequent conflicts but also fostered artistic and cultural achievements that continue to shape our society, including theater, literature, and sculpture.4. Ancient Rome: The rise and fall of the Roman Empire marked a significant turning point in human history. Roman achievements in engineering, law, and governance laid the groundwork for modern civilization. The Pax Romana, a period of relative peace and stability, allowed for the exchange of ideas and cultural diffusion throughout the empire. From the construction of roads and aqueducts to the development of a legal system, Roman contributions continue to impact our daily lives.Medieval and Renaissance Periods:1. The Byzantine Empire: After the fall of the Western Roman Empire, the Byzantine Empire emerged in the east. With its center in Constantinople,it acted as a cultural and economic bridge between the Greco-Roman world and the medieval era. Byzantine art and architecture, characterized by mosaics and domed structures, reflected the empire's rich blend of Roman, Greek, and Eastern influences.2. The Islamic Golden Age: The Islamic Golden Age witnessed a flourishing of knowledge, scientific advancements, and cultural achievements. Scholars from the Islamic world made significant contributions in areas such as mathematics, medicine, astronomy, and literature. Translations of Greek and Roman works preserved classical knowledge and sparked new advancements across Europe.3. The Renaissance: The Renaissance, meaning "rebirth," marked a renewed interest in art, literature, and scientific inquiry in Europe. Artists like Leonardo da Vinci and Michelangelo produced masterpieces that embodied humanism and an appreciation for individual creativity. The invention of the printing press by Johannes Gutenberg revolutionized the spread of knowledge and paved the way for the Scientific Revolution.Modern Era:1. Age of Exploration: The period of European exploration in the 15th and 16th centuries opened up new trade routes, expanded geographical knowledge, and altered the global balance of power. Explorers like Christopher Columbus, Vasco da Gama, and Ferdinand Magellan embarked on ambitious voyages, leading to cultural exchange, colonization, and the Atlantic slave trade.2. Industrial Revolution: The Industrial Revolution, beginning in the late 18th century, brought about significant technological advancements andtransformed societies through mechanization and factory production. Steam power, the rise of the textile industry, and the invention of the steam engine by James Watt heralded a new age of innovation and economic growth.3. World Wars and Global Conflicts: The 20th century witnessed two devastating world wars that reshaped international politics, led to the rise and fall of ideologies, and resulted in widespread devastation. The horrors of World War II and the atrocities committed during the Holocaust prompted the establishment of the United Nations and efforts to promote global cooperation and prevent future conflicts.Conclusion:Human history is a vast tapestry of triumphs, challenges, and progress. From the emergence of early civilizations to the achievements of modern societies, the story of humanity is one of constant evolution and change. Through the lens of history, we gain insight into our collective past and a deeper understanding of the present. It is essential to reflect on our shared history to build a better future and ensure that the lessons learned are not forgotten.。
美国开发出微型合成孔径雷达
1 美国开发出微型合成孔径雷达(miniSAR) 2004年03月15日 08:50 电子工业科技信息中心[本刊2004年2月29日报道]美国家核安全管理局下属的圣地亚国家实验室最新设计出微型合成孔径雷达(miniSAR),并计划在年内进行飞行试验。
这款雷达将用于与模型飞机大小相当的无人机,以后还将用于精确制导武器和空间应用。
微型合成孔径雷达的重量不足13.6千克,重量是"捕食者"无人机现使用的SAR 的四分之一,而体积仅是后者的十分之一。
该雷达具有与大型SAR 许多相同的功能,可以在各种天 气下,在夜间以及沙尘暴中提供高分辨率的(0.1米)图像,唯一不同之处在于大型SAR 由于其天线长、发射机功率高,探测距离可以达到35千米,而与之相比较,微型合成孔径雷达却只有15千米的探测距离,但这一指标已完全满足小型无人机的需求了。
这项新技术中涉及到机械设计、数字小型化、RF 小型化以及导航等关键技术。
微型合成孔径雷达主要由两个子系统组成:天线万向节组件(AGA),为指向系统,包括天线、万向节和发射机,AGA 负责发送和接收电波;雷达电子组件(REA)包括信号产生器、接收机和处理器,REA 是一个电子包,负责生成雷达信号、控制系统、处理数据并将其转换成图像。
研制小组在开发成功超轻的天线,并实现万向节最小化后,AGA 的重量由原27千克降到8.2千克,通过使用最新的数字和射频技术,REA 的重量由原来的27千克降到3.6千克。
未来,在微系统等技术的推动下,微型合成孔径雷达系统重量将降至4.5千克左右。
微型合成孔径雷达主要有两个应用。
第一个应用是作为无人机(如"影子"无人机)的侦察系统。
这种小型无人机可以携带22.7千克的有效载荷,现有的雷达是无法使用的。
因此,目前的小型无人机只能携带视频和红外照相机。
未来,小型无人机在安装了13.7千克的微型合成孔径雷达外,还可安装其他传感器,共同提供一个详细的侦察图像。
运维英文-
运维英文Introduction:In the modern tech-driven world, it’s not much of a surprise that IT departments in businesses are constantly dealing with increasing amounts of pressure to optimize systems, hardware and software for the smooth running of the organization. One of the key areas of IT is operations or more niche category of operations and maintenance (O&M). Operations and maintenance involves the processes that keep systems running smoothly, resolving day-to-day technical issues and maintaining an IT system, so it performs optimally for as long as possible. In this essay, we are going to examine the key concepts, techniques and strategies in IT operations and maintenance.Key Concepts:The key concepts of operations and maintenance involve hardware and system maintenance, software updates, data backup and recovery, user support services, software licensing and regulatory compliance.Hardware and System Maintenance:Hardware and system maintenance is perhaps one of the most important aspects of operations and maintenance. Management of hardware should start with periodic inspection of equipment in the data center or server room for overheating, dust accumulation, reduced voltage, fluctuation in power supply, and so on. It is recommended that have a checklist or schedule of regular checkups to be performed on IT equipment that includes servers,switches, routers, storage units, monitors, and peripherals such as keyboards, mice, and printers.Software Updates:Ensuring that systems are updated with the latest software patches can prove to be difficult but is vitally important. Patching provides new features, fixes bugs, and most importantly, secures your systems from hacking and unauthorized access. In order to minimize disruption to users and to reduce chances of downtime, systems updates should be scheduled during off-hours, or when the least number of users are accessing the system.Data Backup and Recovery:Data is the lifeblood of any business, therefore it is crucial to ensure that all data is backed up regularly and that the recovery process has been tested, automated and optimized in order to minimize downtime resulting from failures, data corruption or disasters. The backup process should be automated and set to run during off-hours to avoid interruptions. In order to reduce data loss occurrences, best practice should be automated with frequent backups to a secure, off-site location.User Support Services:User support services refer to offering technical assistance to users accessing the systems through email, phone, chat or onsite support. The main goal of user support is to maintain a high level of user satisfaction and experience with the system. To ensure that the end user is confident andreliable with the system, support staff should be well-versed in the technology used in the organization.Software Licensing:Software licensing refers to the process of obtaining permission to use software from the vendor or the creator. In order to ensure the organization is in full compliance with regulations and laws, it is important to have software licenses that are current, up to date and apply to only the installed software.Regulatory Compliance:As organizations rely more and more on IT for their day-to-day operations, ensuring regulatory compliance has become a very necessary aspect of IT operations and maintenance. The organization should stay up to date with standards, legal, and regulatory requirements applicable to their industry as well as internal compliance policies.Techniques:The key techniques in IT operations and maintenance are System Monitoring, System Optimization, Performance Management, Scalability, Configuration management, and Root Cause Analysis.System Monitoring:System monitoring is the process of tracking system health and real-time system metrics for identifying problems such as outages, bottlenecks, and other system errors. Depending on the complexity of the IT infrastructure, multiple tools can be used to track different aspects of the IT system. For example a tool like Nagios can be used to monitor open ports, resource usage and uptime, and alert system admins on specific conditions. Use of a range of monitoring tools helps to ensure a comprehensive data set in the event of an issue.System Optimization:System optimization is the process of making adjustments to the system to ensure that it performs optimally. Common examples of optimization include simplifying and condensing configurations, ensuring that hardware is maximally utilized, and that load balancing is applied to prevent excessive strain on any part of the system. Other techniques include adjusting resource allocation such as disk caches and memory utilization to improve overall system response times.Performance Management:Performance management is the process of regularly measuring, evaluating and analyzing system performance to ensure optimal system functionality. By analyzing metrics such as response times, CPU utilization, network bandwidth, system throughput among others, it becomes possible to identify bottlenecks, congestions and other areas of strain. Once identified, you can take the necessary steps to relieve the pressure on the system either by upgrading hardware or reconfiguring system settings.Scalability:Scalability is the ability of the system to handle growing and changing user demands over time. It is important to ensure that adjustments and changes can be easily made to the system without causing disruptions. This can be achieved by setting up infrastructure in a flexible manner that allows for growth, and changing software and hardware requirements over time.Configuration Management:Configuration management is the process of recording and keeping track of all changes and modifications made to the IT system. It is important to maintain detailed records of changes made to the system infrastructure over time, as it helps in problem diagnosis, performance monitoring and legal compliance issues.Root Cause Analysis:This is the process of identifying the fundamental reason why a problem occurred. Root cause analysis is an important aspect of IT operations and maintenance and helps to identify the underlying cause of a problem.Strategies:The key strategies in IT operations and maintenance are Disaster Recovery Planning, Scalability, Capacity Planning, Continuous Improvements, Testing and Automation.Disaster Recovery Planning:Disaster recovery planning involves putting in place contingency plans in the event a disaster strikes. Effective disaster recovery planning requires having robust backup plans in place, detailed recovery procedures documented and tested, and thorough maintenance of system infrastructures, so they don’t fail in the first place.Scalability:Scalability is the ability of the system to adapt and grow without sacrificing performance or availability. Planning for scalability should be a key consideration for any IT system design.Capacity Planning:Capacity planning is the process of estimating the capacity requirements to ensure that adequate resources are provisioned for the IT environment. Proper capacity planning ensures that the IT environment is less likely to become overburdened and helps help minimize performance degradation or downtime.Continuous Improvements:Continuous improvement involves continuous evaluation of the IT systems in place with a view to identifying areas for improvement. This approach encourages flexibility and encourages IT staff to prioritize areas that have the biggest impact on system health.Testing:Testing involves testing and verifying each change made to the system, whether it is software or hardware. The purpose of testing is to ensure that the changes made performed in a manner that doesn’t introduce errors, degrade performance or otherwise compromise the reliability of the system.Automation:Automation has become an increasingly important aspect of operations and maintenance in modern IT systems. Automation helps to minimize human error, reduces downtime resulting from manual errors while making repetitive tasks more efficient.Conclusion:Operations and maintenance is an essential component of IT infrastructure that ensures the smooth running of businesses. By implementing key concepts, employing techniques and utilizing strategies, system administrators can successfully manage hardware and systems, ensure software updates, facilitate data backup and recovery, provide user support services and maintain compliance with regulatory requirements. By managing these areas effectively, IT staff can minimize downtime, ensure optimal system performance, and provide a better user experience.。
书心-CET4-6-翻译
由于通信网络的快速发展,中国智能手机用户数量近年来以惊人速度增长。 这极大地改变了许多人的阅读方式。他们现在经常在智能手机上看新闻和文 章,而不买传统报刊。大量移动应用程序(apps)的开发使人们能用手机读 小说和其他形式的文学作品。因此,纸质书籍的销售受到了影响。但调查显 示,尽管智能手机阅读市场稳步增长,超半数成年人仍喜欢读纸质书。(18.12)
2. 评分标准
先通读整篇译文,据"总体评分"原则,确定其档位;
13-15分
准确表达了原文意思。用词贴切,行文流畅,基本无语言错误, 仅有个别小错。
10-12分 基本表达了原文意思。文字通顺、连贯,无重大语言错误。
7-9分
勉强表达了原文意思。用词欠准确,语言错误相当多,其中有 些是严重语言错误。
4-6分
汉语 (汉藏语系) 意合
短句多
无主语
少连词 动词短语做主宾 名词做谓语; 多并列谓语
3. 翻译策略
英语 (印欧语系) 形合
长句多
要主语
有连词 名词性主宾 动词做谓语;
汉译英
译文句子结构要完整 (主谓宾,性,数,格,时态,语态)
合译 (译为:并列句,同位语,从句,介 词短语,分词短语等)
加主语; 语态转换 (变被动)
华山位于华阴市,距西安120公里。华山是秦岭的一部分,秦岭不仅分隔陕 南与陕北,也分隔华南与华北。与从前人们常去朝拜的泰山不同,华山过去 很少有人光临,因为上山的道路极其危险。然而,希望长寿的人却经常上山, 因为山上生长着许多药草,特别是一些稀有的药草。自上世纪90年代安装 缆车以来,参观人数大大增加。(17.12)
The Yellow River ranks the third longest in Asia and the sixth longest in the world. The word“yellow”describes the color of the muddy water. The Yellow River,one of several rivers for China to live on,originates from Qinghai,flows through nine provinces, and finally pours into the Bohai Sea. The river basin is not only the birthplace of ancient Chinese civilization,but also the most prosperous region in the early history of China. However, due to the frequent devastating floods, it has caused many disasters. In the past few decades, the government has taken various measures to prevent disasters.
学术英语词汇570
The Academic Word ListSublist 1 of the Academic Word List - Most frequent words in familiesThis sublist contains the most frequent words of the Academic Word List in the Academic Corpus. The most frequent members of the word families in Sublist 1 are listed below.analysis分析approach方法area地区领域assessment 评价assume假设authority权威available可提供的benefit好处,受益concept概念consistent一致的constitutional宪法的context 环境contract收缩合同create 创造data 数据definition 定义derived由来,派生distribution 分布economic 经济的environment 环境establish 建立estimate 估计evidence 证据export出口factors 因素financial 金融的formula公式function 功能identified确认的income 收入indicate 指出individual 个人的interpretation理解involved 涉及到issues 问题labour 劳动力legal 合法的legislation 立法major 主要的专业method 方法occur 出现percent 百分之period 时期policy 政策principle 原则procedure 步骤process 过程,处理required 必须的research 研究response 回应role 角色,作用section 部分sector 行业区域significant 重要的similar 相似的source 源头specific 具体的structure 结构theory 理论variables 变量Sublist 2 of the Academic Word List - Most frequent words in familiesThis sublist contains the second most frequent words in the Academic Word List from the Academic Corpus. The most frequent members of the word families in Sublist 2 are listed below.achieve获得acquisition收购获得administration管理affect影响appropriate合适的aspects 方面assistance 协助categories 种类chapter 章节commission委托community社区complex组成的,合成的computer电脑conclusion结论conduct做consequences 后果construction 建设consumer 顾客credit 信用cultural 文化的design 设计distinction 区别elements 元素equation等式evaluation 评价features 特点final 最后的focus 关注impact 影响injury 受伤institute 协会investment 投资items 项目条款journal期刊maintenance 维修normal 正常的obtained 获得participation 参与perceive 认识到positive 积极的potential 潜在的previous 之前的primary 主要的purchase 购买range 范围region 地区regulations 规则relevant 相关的resident 定居者resources 资源restricted 受限security 安全sought 寻找(过去式)select 挑选site 选址strategies 策略survey 调查text 文本1traditional 传统的transfer 转移Sublist 3 of the Academic Word List - Most frequent words in familiesThis sublist contains the third most frequent words of the Academic Word List in the Academic Corpus. The most frequent members of the word families in Sublist 3 are listed below.alternative 可供选择的circumstance 环境comments评论compensatio n 补偿components 组成部分consent同意considerable 大量的constant连续的constraints 限制contribution 贡献convention 准则coordination 协调core 核心的corporate大公司corresponding相应的criteria 标准deduction减除demonstrate证明document文件dominant 主导的emphasis重要性ensure确保excluded排除framework框架funds资金illustrated给…插图immigration移民implies 暗示initial 开始的instance例子interaction互动justification证明正确layer层link连接location地点maximum 最大minorities 少数negative 消极的outcomes 结果partnership合作philosophy 哲学physical 身体的proportion部分比例publish出版reaction 反应registered 登记reliance 依靠removed 移开scheme 计划方案sequence顺序sex 性shift 转换specified具体说明的sufficient足够的task 任务technical 技术的techniques 技术technology 技术validity合法性volume量Sublist 4 of the Academic Word List - Most frequent words in familiesThis sublist contains the fourth most frequent words of the Academic Word List in the Academic Corpus. The most frequent members of the word families in Sublist 4 are listed below.access获得adequate足够的annual年度的apparent明显的approximate近似attitudes 态度attributed 归因于civil国内的code代码commitment承诺communication交流concentration浓度conference会议contrast 对比cycle 循环debate 辩论despite尽管dimensions维度domestic 国内的emerge 出现error 错误ethnic 民族的goals 目标granted 授予hence 因此hypothesis 假说implementation 实施implications 含意暗示imposed 强加integration 结合internal 内部多investigation 调查job 工作2label 标签mechanism机制obvious 明显的occupational 职业的option选择output 产出overall 整体的parallel 平行parameters参数phase阶段predicted预测principal 主要的prior 先前的professional 专业的project项目promote促进regime政权resolution决心retained保留series 系列statistics统计status 地位stress 压力subsequent 紧随其后的sum 总量summary 总结undertaken 承担Sublist 5 of the Academic Word List - Most frequent words in familiesacademic学术的adjustment调整alter 改变amendment修订aware 注意到capacity 能力challenge挑战clause从句compounds混合物conflict 矛盾consultation 咨询contact接触decline 下降discretion谨慎draft 草稿enable 使…能energy能量enforcement 强制执行entities 实物equivalent相等的evolution 进化expansion扩张exposure 接触external 外部的facilitate协助fundamental 根本的generated产生generation 代image图像liberal 开明的licence 执照logic 逻辑marginal 边缘的medical 医学的mental 精神的modified 修改monitoring 监督network 网络notion 概念objective 客观的orientation定位perspective角度precise 精准的prime 主要的psychology 心理学pursue追逐ratio 比例rejected 拒绝revenue 税收stability稳定性styles 风格substitution 代替物sustainable 可持续的symbolic 象征的target 目标transition过度trend 潮流version 版本welfare 福祉whereas却Sublist 6 of the Academic Word List - Most frequent words in familiesabstract摘要accurate 准确的acknowledge承认aggregate 总计allocation分配assigned指派attached粘附author作者bond纽带brief简洁的capable有能力的cite引用cooperative合作的discrimination歧视display显示diversity多样性domain 领域edition版本enhanced提高estate地产exceed超过expert专家explicit明显的federal联邦的fees费用flexibility 灵活性furthermore而且gender 性别ignored忽视incentive 刺激incidence 发生incorporate纳入index 索引inhibition内抑感initiatives 主动性input输入instructions指示intelligence 智力interval间隔lecture 讲座migration 迁徙minimum 最小ministry 部motivation动机neutral 中立的nevertheless然而overseas 海外的precede先于presumption推测rational合理的recovery恢复revealed揭示scope范围subsidiary次要的tapes 带子trace追踪transformation蜕变transport交通underlying潜在的utility实用效用3Sublist 7 of the Academic Word List - Most frequent words in familiesadaptation适应adults成年人advocate支持aid 帮助channel渠道chemical 化学的classical经典的comprehensive全面的comprise由…组成confirmed确定contrary 相反的converted 转换couple 一对decade 十年definite明确的deny否认differentiation区分disposal丢弃dynamic动态的eliminate消除empirical经验主义的equipment设备extract 提取file 文件finite有限的foundation 基础global 全球的grade成绩guarantee保证hierarchical分等级的identical相似的ideology意识形态inferred推断innovation创新insert 嵌入intervention 干预isolate使孤立media媒体mode模式paradigm范例phenomenon 现象priority 优先权prohibited禁止publication 出版物quotation 引用release释放reverse倒退simulation 模仿solely独自的somewhat稍微submit提交successive连续的survive幸存thesis论文topic主题transmission传播ultimately最终地unique独特的visible可见的voluntary自愿的Sublist 8 of the Academic Word List - Most frequent words in familiesabandon放弃accompanied陪伴accumulation积累ambiguous模糊的appendix附录appreciation感激arbitrary武断的automatically自动的bias偏见chart图表clarity清楚conformity遵守commodity商品complement补充contemporary现代的contradiction矛盾crucial 重要的currency货币denote 指示detected察觉deviation偏离displacement位移dramatic戏剧的eventually最后的exhibit展示exploitation充分利用fluctuations波动guidelines指导highlighted强调implicit含蓄的induced引诱inevitably不可避免的infrastructure基础设施inspection检查intensity强度manipulation操控minimised最小化nuclear核offset抵消paragraph段落plus 加practitioners 从业者predominantly主导的prospect前景radical根本的random随意的reinforced加强restore储存revision修订schedule行程表tension紧张termination终结theme主题thereby因此uniform不变的vehicle工具轿车via通过virtually几乎widespread普遍的visual视觉的Sublist 9 of the Academic Word List - Most frequent words in familiesaccommodation住宿analogous类比的anticipated预料assurance确保attained获得behalf为了...的利益bulk 体积ceases停止coherence协调的coincide同时发生commenced开始4incompatible不兼容的concurrent同时发生的confined限制controversy争执conversely相反的device装置devoted投入diminished减少distorted/distortion 扭曲duration 持续erosion腐蚀ethical道德的format布局founded建立inherent内在的insights洞察力integral必需的intermediate中间的manual用手的mature成熟的mediation调停medium媒介military军事的minimal最小的mutual双方的norms惯例overlap重合passive消极的portion比例preliminary基础的protocol惯例qualitative质的refine提炼relaxed放松的restraints 限制revolution革命rigid严格的route线路scenario梗概sphere球面领域subordinate下级的supplementary补充道suspended暂停team团队temporary暂时的trigger 引起unified 统一的violation违背vision视力Sublist 10 of the Academic Word List - Most frequent words in familiesThis sublist contains the least frequent words of the Academic Word List in the Academic Corpus. The most frequent members of the word families in Sublist 10 are listed below.adjacent 比邻的albeit尽管assembly聚集到一起的人collapse倒塌colleagues同事compiled汇编conceived构思convinced使信服depression 萧条降低encountered 面临enormous 巨大的forthcoming 即将到来的inclination倾向integrity完整,诚实intrinsic内在的invoked引起产生levy 征收likewise同样nonetheless 尽管如此notwithstanding尽管odd 古怪的ongoing持续的panel 委员会,小组persistent 坚持不懈的posed形成构成reluctant不情愿的so-called所谓的straightforward 易懂的undergo经受whereby 借56。
电气设备在线检测与故障诊断 中英文版本
2020/4/18
16
绝缘水平监测参量
危险水平 注意水平
破坏点
实施修复
初期
2020/4/18
稳定运行阶段
劣化阶段
设备投运时间 T
图 3 状态维修示意图
注意 阶段
危险阶段
17
随着传感器、计算机、光纤技术等的发展与 引用,一种电力设备的在线监测仪器或系统,由传 感器系统、信号采集系统、分析诊断系统组成。传 感器系统感知所需要的电气参量或非电气参量(温 度、压力、振动、超声等);信号采集系统将传感 器得到的模拟量转换成数字量进行传输;分析诊断 系统利用小波分析技术、神经网络技术对采集信号 进行分析、处理和诊断,得到所测设备绝缘的当前 状况,进行绝缘诊断和寿命估计。
2020/4/18
20
1
The power equipment online monitoring and fault diagnosis technology
2020/4/18
On March 21, 2018, according to the national grid operator of Brazil, a power failure occurred, resulting in the disconnection of the power system and the main network in the north and northeast of Brazil. At least 14 states in the north and northeast of Brazil experienced a major power failure, resulting in power failure of about a quarter of the users in the country.
不背单词app自定义词书 4000高频词 可导入
appear
with
great
frequency
in
a
broad
range
of
academic
texts
The
list
does
not
include
words
that
are
in
the
most
frequent
words
of
English
the
excluded
consent
proportion
demonstrate
reaction
criteria
minorities
technology
philosophy
removed
sex
compensation
sequence
corresponding
the
least
frequent
Group
Practice
test
sector
available
financial
process
individual
specific
principle
estimate
variables
method
data
research
preparing
learners
for
tertiary
level
study
or
used
by
students
working
Summary of this chapter
Chapter from book Effective software Maintenance and Evolution: Reuse-based Approach, Copyright (C) 2007 Stan Jarzabek Chapter 5 Evolution of versions and configuration managementSummary of this chapter:We move on now from the maintenance of the function of the system’s code (considered in Chapters 2 and 3) and of the functionality of the application (considered in Chapter 4) to the evolution of the system’s code and of a sequence of system releases. Software Configuration Management (SCM) is “the discipline of controlling the evolution of complex software systems” [18]. SCM tools [5] are commonly used in industry to manage software changes, in particular to support evolution. SCMs store the history of component versions and their configurations, created in the response to evolutionary changes. Each system release is a configuration of component versions stored in an SCM repository.Software Configuration Management (SCM) tools [5][18] are commonly used in industry to manage software changes, in particular to support evolution. SCMs store the history of component versions and their configurations, created in the response to evolutionary changes. In this Chapter, we go through an example of software evolution with Concurrent Versions System (CVS) (/cvs/). Concurrent Versions System (CVS) is probably the most widely used SCM tool in industry, especially in the development of open source projects [9]. CVS is based on concepts of a pioneering and highly influential RVC [17].We focus on some typical situations that arise during evolution, and try to address them with CVS. We observe that some of the evolution problems, notably explosion of similar component versions, are difficult to avoid as long as evolution is managed in terms of specific component versions.5.1 A working example: FRS evolutionThe example of the Facility Reservation System (FRS) was introduced in Chapter 1. Its functions and multiple versions are now briefly summarized. Facility Reservation System (FRS) helps users reserve facilities such as meeting rooms. FRS users manage (add, delete and modify) their own reservations or reservations requested by others (middleman). We briefly discussed an FRS evolution example in Chapter 1. For ease of reference, we repeat FRS description here, with some more details.The following FRS features are discussed in the evolution example described in this Chapter: •VIEW-RES: reservation viewing methods:-FAC: view reservations by facility-RES-ID: view reservations by reservation ID-DATE: view reservations by date-USER: view reservations by user-USR-PD: view reservations made for only preferred range of dates•BR: block reservation – making reservations in bulk•PAY: charges for reserving facilities•BRD: discount for block reservationsFigure 1 shows the FRS evolution scenario in our study. Circled numbers attached to FRS releases indicate the order in which the releases were implemented. Solid arrows between releases X and Y indicate that X was chosen as a baseline for Y. Dashed arrows between releases X and Y indicate that some features implemented in X were adapted for Y.Figure 1. Stages in FRS evolutionWe illustrate evolution of FRS according to scenario depicted in Chapter X, supported by the evolution history stored in the CVS repository.Stage 1: Suppose one of our customers requests a new feature, to view reservations by date(DATE, for short). Having implemented the required enhancement, we have two versions of the FRS in use, namely the original FRS and the enhanced system FRS DATE.Stage 2: After some time, yet another customer would like to view reservations by user (USER). Having implemented this new enhancement, we have three versions of the FRS in use: the original FRS, FRS DATE and FRS USER.Stage 3: We also realize that the new features may be generally useful for other customersand yet another version FRS DATE,USER may make perfect sense to some of them.Stage 4: Sometimes later, a new customer wants an FRS that supports the concept of paymentfor reservations (PAY). This includes computing and displaying reservation charges (RC),cancellation charges (CC), bill construction (BC) and Frequent Customer Discount (FCD).Name PAY refers to all such payment features. FRS DATE,USER,PAY results from thatenhancement.Stage 5: Another customer would like to make block reservations (BR), as well as support for payment (FRS DATE,USER, PAY,BR)Stage 6: We include block reservation discount (FRS DATE,USER,PAY,BR,BRD).Stage 7: We need an FRS with existing features USER and BR (FRS USER,BR).Stage 8: A customer asks us to customize the USER feature to view reservations made for only preferred range of dates ((FRS USER-PD,BR).Analysis of FRS requirements and implementation revealed the following dependencies among features:•DATE ~i↔USER (mutually implementation-independent features)•PAY ~f↔BR (mutually functionally-independent features)•PAY i↔ BR•PAY iÆ {DATE, USER}•PAY iÆ FRS (meaning that most of FRS components are implementation-dependent on PAY)•{BR, PAY} fÆ BRDAnalysis of FRS requirements and implementation revealed the following dependencies among features:•DATE ~i↔USER (mutually implementation-independent features)•PAY ~f↔BR (mutually functionally-independent features)•PAY i↔ BR•PAY iÆ {DATE, USER}•PAY iÆ FRS (meaning that most of FRS components are implementation-dependent on PAY)•{BR, PAY} fÆ BRD5.2 FRS component architectureA component architecture, design assumptions, implementation technologies as well as underlying platforms (such as J2EE or .NET) define the context within which software is evolved. A software architecture is described by a set of components that interact one with another through well defined interfaces (connectors) to deliver the required system behavior. In this Chapter, we focus on components only, and will address connectors in Chapter X. FRS components are organized into three tiers, namely the user interface, business logic and database tiers, depicted in Figure 2. In the architecture terminology, a ‘tier’ is just a large granularity component that may contain many smaller components. Each tier provides services to the tier above it and serves requests from the tier below. User interface (UI) components allow FRS administrators and reservation requestors to interact with the system to manage users, facilities and reservations. The UI components handle the initialization, display and event-handling for the various Java panels used in reservation, user and facility management. The server, business logic (BL) tier, defines the functionality of the FRS to accomplish various actions. Server components provide the actual event-handling code for the various user interface widgets (e.g., buttons). There are also components that set up and shut down connections with the DBMS component. The database stores data related to users, facilities and reservations. The database tier is responsible for providing data access and storage services to the business logic tier. the database components include tables or databases to store data related to users, facilities and reservations.FRS is implemented in EJB™ and Java, with MySQL as the database server.Figure 2. Tiers and component groups in FRS architectureFRS is structured as follows: FRS consists of subsystems, modules and components to manage reservations (Reservation), facilities (Facility) and users (User). Each module (e.g., ViewRes to view reservations), is implemented by a user interface component (ViewRes-UI), and business logic component (ViewRes-BL).Shaded boxes in Figure 2 denote component groupings in FRS subsystems as follows: Reservation-UI: all the user interface components for the Reservation subsystemReservation-BL: all the business logic components for the Reservation subsystemFacility-UI: all the user interface components for the Facility subsystemFacility-BL: all the business logic components for the Facility subsystemUser-UI: all the user interface components for the User subsystemUser-BL: all the business logic components for the User subsystemTable 1 shows some of modules and components in user interface and business logic tiers.Table 1. FRS component architecture: user interface and business logic tiers Subsystem Modules User interface components Business logic components Reservation ViewRes ViewRes-UI ViewRes-BLCreateRes CreateRes-UICreateRes-BL DeleteRes DeleteRes-UI DeleteRes-BL UpdateRes UpdateRes-UI UpdateRes-BL Facility ViewFac ViewFac-UI ViewFac-BLCreateFac CreateFac-UI CreateFac-BL DeleteFac DeleteFac-UI DeleteFac-BL UpdateFac UpdateFac-UI UpdateFac-BL User ViewUser ViewUser-UI ViewUser-BLCreateUser CreateUser-UI CreateUser-BL DeleteUser DeleteUser-UI DeleteUser-BL UpdateUser UpdateUser-UI UpdateUser-BL5.3 Evolution of FRS with CVSCVS keeps track of versions of source code files, documents and other software artifacts resulting from changes applied to software during evolution. Versions of software artifacts are stored under unique identifiers. Each version of a software artifact may branch into sub-versions, as shown in Figure 3.Figure 3. Version tree of ViewRes-UI FRS componentEach system release is defined as a configuration of specific versions of system components. Besides usual SCM capabilities such as version control, CVS also performs conflict resolution and provides check in/out facilities to assist parallel development. Here, we concentrate only on version control and management of system releases. We store component versions and their configurations that occurred in released systems in a CVS repository. Each such component (or component configuration) accommodates some combination of variant features. Typically, components are files. The following is a development life-cycle for a new system release, S NEW :1. Analyze requirements for S NEW .2. Understand similarities/differences among S NEW and earlier releases.3. Select from the CVS repository configurations of component versions “best matching” S NEW . We call this S NEW component baseline .4.Customize the selected component baseline to fully meet requirements of the S NEW.5.Test and integrate customized components to obtain S NEW.6.Validate S NEW to see if it meets its requirements.We may need to iterate over the above life-cycle, changing component selection or their customization, even revising some of the requirements, until we obtain an acceptable S NEW.In this study, we focus on issues related to component selection (Step 3) and customization (Step 4). These two activities have much impact on productivity of programmers during evolution: The quality of selection determines the follow up customization effort. In sub-sections below, we analyze typical problems developers must solve during these two steps. Our analysis is based on the evolution scenario depicted in Figure 1.5.4 Reuse of features implemented in past releases when building new system releasesReuse of features already implemented in past releases is the main concern when selecting components. Based on CVS release history, selecting components “best matching” a newly built system release is a problem in itself. We must take into account both functionality as well as the follow up customization and integration effort.We start with FRS DATE,USER. We can build FRS DATE,USER by (1) selecting FRS DATE and then customizing it according to FRS USER, or vice versa, (2) selecting FRS USER and then customizing it according to FRS DATE. If we choose scenario (1), the customization effort is a combined effort of:•finding components affected by feature USER in FRS USER, and extracting relevant code, •analyzing the impact of feature USER on FRS DATE ,•implementing feature USER on FRS DATE.Since feature USER has been implemented in FRS USER, we would like to reuse feature implementation in FRS DATE,USER. For illustration, we show steps involved in scenario (1):1.Select a previous version of FRS as a starting point. Here, we choose FRS DATE .2.Retrieve version FRS USER. We make use of this version to update the FRS DATE, rather thanto re-implement USER feature from scratch.3.Extract business logic action to “view reservation by user” from FRS USER and modifyReservationManager component.4.Extract use interface code to “view reservations by user” and code to call the business logic action to “view reservation by user” from FRS USER and modify reservation user interface, Reservation-UI, accordingly.For implementation-independent features, such as DATE and USER, the above steps are quite simple and are accomplished by branch and merge (‘update’ command) facilities of CVS. As all the implications of scenarios (1) and (2) on evolution are the same, we conclude that it makes no difference if we choose (1) or (2).Should scenarios (1) and (2) require different customizations to accommodate the new feature, the logical choice would be to pick components from FRS release(s) in which adding the new feature requires less customization effort. A number of issues may complicate the follow up customization, and therefore, may have impact on the right selection of components. In particular:A)features DATE and USER might have different impact on FRS components; for example,DATE could affect more components and in more complicated ways than USER; or implementation of feature USER might be well documented, while implementation of DATE might be missing,B)DATE might be implementation-dependent on USER, but USER might also beimplementation-independent of DATE,C)DATE might be implementation-dependent on yet other features that are not relevant toUSER,D)feature DATE might have been modified in FRS DATE in a way that is not required for FRS USER.All of the above considerations could affect the customization effort of (1) vs. (2), and should be taken into the account when selecting the component baseline for FRS DATE,USER .We now illustrate point C) above. Suppose, we have already implemented features f1 and f2 in releases FRS f1 and FRS f1,f2, and would like to have feature f1 and new feature f3 in release FRS f1,f3. Intuitively, we would pick FRS f1 as the closest configuration, since for FRS f1,f2, we would have to remove f2 before adding in f3. This would probably be the right selection if f3 and f2 were not similar to each other. However, if f3 was similar to f2, FRS f1,f2 would be a better choice, as it would be easy to turn f2 into f3. We see an instance of this situation when implementing FRS USER, with the initial FRS and FRS DATE as starting points. Since features DATE and USER are similar, we should pick FRS DATE as an FRS USER baseline.The usual situation is that any new system release, say S NEW, may include many features implemented in variant forms in past releases. Variant forms of the same feature stem from implementation dependencies among features. Existing features may be also implementation-dependent on new features required in S NEW. The following example illustrates reuse of features in view of implementation-dependencies among them. In developing FRS USER,BR, we select FRS USER as our baseline and add BR (block reservation) to it. As BR has been implemented only in FRS DATE,USER,PAY,BR previously, we make use of this implementation. The customization of FRS USER includes:1.Finding components affected by feature BR in FRS DATE,USER,PAY,BR, and extracting relevantcode,2.Analyzing the impact of feature BR on FRS USER ,3.Implementing feature BR on FRS USER.In Step 1, the code extracted for BR is inclusive of code to calculate payment for BR. In Step 2, we realize that the code needed for BR here should be independent of code for PAY (payment). This causes a conflict with code extracted in Step 1, as implementation of BR was according to the implementation dependency PAY i↔ BR (payment and block reservation are mutually implementation-dependent) previously. Thus in Step 3, we are unable to reuse BR directly. The parts where PAY was involved in BR need to be removed. If information on modifications made for PAY in BR is not available, implementation becomes more difficult. Upon implementation, a new variant form of BR is produced.Suppose, we have picked a configuration of component versions that we believe make a good baseline for a new release, and removed unwanted features (if any) from that configuration. To add in new features, we fetch the previous version that contains a given feature, and extract the relevant code from that version. Reuse of features is hindered by the fact that thesame feature may be implemented differently in different system releases. The implementation of a feature may span many system components. The process of (possibly) retrieving many versions of feature implementation and extracting correct portions of feature implementation may be tedious and time consuming. Tools such as ‘diff’ and Bonsai [3] are typically used to aid in feature extraction and reuse. However, ‘diff’ shows all the differences between two files, not modifications relevant to a specific feature. If it is too difficult to reuse a feature from a previous version, a feature must be implemented from scratch, increasing redundancy and complexity.The above discussion shows that, at times, the knowledge of already implemented features and of feature similarities may not be readily available from the CVS repository. We can improve the situation by linking logical groupings of detailed changes done to system components to relevant source of change (e.g., a request for a new feature or for a modification of a certain feature in some system release). The concept of a “change set” has been introduced in SCM research [5][13][14], and is available in some SCMs (e.g., Synergy/CM [16]). In CVS, we can do frequent check-in/check-out to avoid intermixing in any single component version multiple changes done for different purposes. This can help in extracting feature implementation. Enumerating “change sets” corresponding to inter-dependent features, especially in the presence of variant ways in which the same feature can be implemented in different system releases, may produce a complicated web of information that may pose nontrivial problems for effective feature reuse and modification. In Part II, we describe an alternative way of addressing these problems, with mixed-strategy mechanisms capable of representing changes and affected components in a unified, generic form, amenable to automation.We also tried to address the above problems with external documentation. For example, we recorded code lines inserted/deleted/modified with respect to a baseline. Such documentation can help when we deal with simple situations such as reusing implementation of feature DATE to build FRS USER, but in other cases, different information may be required. For example, when modifying FRS DATE to accommodate USER feature and build FRS DATE,USER, we would only need to modify the lines that differ between the two, as both DATE and USER are implemented in a similar way. As there are possibly many other different cases to consider, the external documentation complementing the information we can get from the CVS repository would have to vary to cater for those nuances. In addition, there are well-known problems with keeping documentation up to date with evolving programs. A study of software development in two industries [6] showed that, despite the fact that documentation comprised of thousands of pages, selected components often implemented requirements insufficiently or turned out to be incompatible.The process of selecting components to minimize customization effort may be quite complicated. Much information has to be repeatedly extracted but is not explicitly represented in the evolution history stored in the CVS repository. As it is difficult to see all the implications of component selection, often the choice of components for customization is suboptimal, leading to high cost of evolution.Deelstra et al. [6] mention that, using such an approach, “development effort is spent on implementing functionality that highly resembles the functionality already implemented in reusable assets or in previous projects.” In their case studies, it was observed that product derivation at a company comprised the selecting of several hundreds of components, and thisoccasionally led to a situation where components were not found, though they were present. Many of the functionalities, though already implemented in earlier releases, could not be reused and had to be re-implemented all over again.5.5 Adding new features to a system releaseThe new feature is either a completely different from the existing features or it is similar to an existing feature. A completely different feature must be implemented from scratch, as no previous knowledge of that feature exists. This situation was observed when developing FRS DATE,USER,PAY,BR. We selected FRS DATE,USER,PAY as a component baseline for implementing a new feature BR (block reservation). However, PAY (payment feature) and BR are mutually implementation-dependent: PAY i↔ BR. The customization of FRS DATE,USER,PAY includes:1.Implementing the BR feature while adding code to calculate payment for BR,2.Modifying the PAY feature to accommodate specific needs of block reservation.We end up with 2 variant forms for PAY: PAY implemented without BR in FRS DATE,USER,PAY, and PAY implemented with BR in FRS DATE,USER,PAY,BR.We can save effort (and also enhance the clarity of the design) if we implement similar features in a similar way. FRS DATE illustrates a simple case. DATE (view-by-date) is similar to the FAC (view-reservation-by-facility) method implemented in the initial FRS. The customization effort includes:1.Finding components affected by feature FAC in FRS, and extracting relevant code,2.Customizing copied code to obtain DATE .Recognizing similar features based on the information stored in CVS, especially in relation to feature dependencies, is not easy.5.6 Selective propagation of new features to past releasesTo accommodate a new feature into past releases, we must upgrade each release separately, taking into account unique feature dependencies that may exist in different releases.The propagation process is time-consuming, error-prone and contributes to component version explosion.Consider the case of FRS USER-PD,BR. USER-PD (view-by-user for a preferred date) is a slight modification of the USER (view-by-user) reservation method. The feature USER-PD is implemented by simply customizing code for USER. The same modifications must be manually implemented in every other system release that wishes to include PD feature.5.7 The visibility of changes during evolutionThe visibility of changes is hindered by feature dependencies and the fact that implementation of a feature may span many components. To illustrate how implementation-dependencies affect the visibility of changes, we show steps involved in enhancing FRS DATE,USER,PAY with feature BR (features PAY and BR are mutually implementation-dependent: PAY i↔ BR):1.Add an option for selecting block reservations to the reservation user interface menu inReservation-UI components.2.Add options for selecting different block reservation methods (reserving multiple facilitiesor multiple time slots) to the Reservation-UI. Upon selection an option, the user is asked toprovide input needed for that option.3.Add code to call block reservation methods for each option. Add an option to delete blockreservations in the menu of Reservation-UI, and code for deleting block reservations in arelevant business logic component.4.Calculate the payment for block reservation.5.Modify Payment component to accommodate block reservation as follows: add methods tocalculate the total cost of all the block reservations, store the reservation cost in a vector(rather than a single value as it was the case of a single reservation), and store the totalnumber of block reservations.In Step 4, we modify code for BR to deal with payment. In Step 5, we modify code for PAYto accommodate BR. Changes are embedded into the code and we can’t discriminate amongparts of the code in BR that have been modified to accommodate PAY and vice-versa.In FRS DATE,USER,PAY,BR,BRD, block reservation discount is functionally dependent on both blockreservation and payment: {BR, PAY} fÆ BRD, in addition to the implementation dependency mentioned above. Steps to implement this FRS release are as follows:1.Modify code in PAY (payment). For BR (block reservation), different calculations areneeded due to BRD (block reservation discount).2.Modify code in block reservation methods to inform the user that BRD is included, whencalculating payment.As before, it is not clear which modifications relate to a feature in question (BRD, in thiscase). However, the difficulty is more severe now, due to the complicated dependencies. InStep 2, to modify PAY, we must first find code for BR in PAY, and then embed the code forBRD in the midst of it. Similarly, in Step 2, we embed code for BRD into the code for PAY inBR.5.8 Explosion of variant features and feature dependenciesIn studies described in [6] it was observed that even small changes to interfaces led to newcomponent versions. This was also observed in our case study. For example, we created eight1) versions of component Reservation-UI, as each FRS release ( Figurerequired some modifications of that component. Feature dependencies also caused componentversions to multiply. For example, component Payment had three different versions: PAYimplemented alone, PAY implemented with BR, and PAY with BR and BRD.As more variant features are added, the number of component versions explodes. Just addingsix features (DATE, USER, PAY, BR, BRD, USER-PD) to the FRS, produced 22 newcomponent versions.A technique sometimes used to limit version explosion is to add features in a permanent way,and to control their availability in a specific system installation using runtime parameters. Asthis technique addresses the problem at the program implementation rather than at the designlevel, it leads to complex programs. This approach also results in larger resource footprintwith “dead code” which may be undesirable. An example of a solution trying to address thisproblem is Koala [15].The problem of explosion of similar component versions seems to be inherent in object/component technologies [1][2][10][11][12]. While supporting techniques can be used to extract change information from the component history [5], [8], [9], these techniques deal with symptoms rather than attack the root of the problem.summary5.9 AReuse of existing features and propagation of new features in CVS is based on extraction of relevant code from past releases, using the CVS update operation. When a component is modified, only the differences between the original version and a modified one are stored to minimize storage. However, different versions of the same component are treated as different entities in the sense that a change done in version 1 of a component A will not be reflected in version 2 of component A. Therefore, changes meant for many component versions must be manually propagated to versions in question, taking into account possible subtle variations in change implementation across component versions, not to mention the likelihood of making errors. Reuse of existing and new features is therefore tedious, time consuming, and error prone.Table 2. Summary of evolution stagescommentsStage #modFRS DATE 3 SimpleimplementationimplementationFRS USER 3 SimpleFRS DATE,USER 3 Simple code extraction from theprevious versionFRS DATE,USER,PAY35 Implementation is not difficult thoughit affects many componentsFRS DATE,USER,PAY,BR9 Difficult to see where code was addedfor BR in PAY and vice versa.FRS DATE,USER,PAY,BR,BRD 3 Difficult to see relationship betweenfeatures.FRS USER,BR12 Difficulty in extracting the BR codewithout PAYFRS USER-PD,BR 4 Simple customization of USERmethod.Tools such as ‘diff’ and Bonsai [3] are helpful, but ‘diff’ shows all the differences between two files, not modifications relevant to a specific feature. When feature dependencies are involved, the modifications needed may be different in each release, and usefulness of ‘diff’ becomes even more problematic. Propagation of new features to past releases also poses problems. Table 2 summarizes modifications of FRS components at various evolution stages. Consecutive changes affecting code over time are absorbed into the code, and it becomes difficult to see relationships among features. The concept of “change set” makes a significant step towards addressing these problems.It is quite significant that we could observe some very basic difficulties despite the simplicity of our case study. These difficulties must necessarily magnify when we move into deeper waters of evolution.5.10 Related WorkAdvanced SCM features [5][13][14] and commercial tools such as Synergy/CM [16] improve the visibility of information that matters in evolution. So do techniques for extracting a release history stored in an SCM repository [7][8][9]. One of such advanced SCM concepts is。
关于钢笔的英语作文
The fountain pen,a timeless instrument of writing,has been a symbol of elegance and sophistication since its inception.Its history can be traced back to the19th century, and despite the advent of modern technology,the fountain pen remains a cherished tool for many writers and artists.The Origin and Evolution of the Fountain PenThe first patent for a fountain pen was granted to Lewis Edson Waterman in1884.His design was a significant improvement over the quill pens that had been the standard for centuries.The fountain pens selffilling mechanism allowed for a continuous flow of ink, eliminating the need for frequent dipping into an inkwell.Over the years,the design has been refined,with innovations such as cartridge and converter systems making the pen more userfriendly.The Mechanics of a Fountain PenA fountain pen consists of a nib,a feed,and a reservoir for ink.The nib,typically made from gold or steel,is the point where the ink is released onto the paper.The feed,a small channel within the pen,draws ink from the reservoir and regulates its flow to the nib.The reservoir can be filled with ink using an eyedropper,a cartridge,or a converter that draws ink from a bottle.The Art of Writing with a Fountain PenWriting with a fountain pen is an experience that is both tactile and rewarding.The smooth flow of ink and the slight feedback from the nib on the paper provide a connection between the writer and their words that is unmatched by other writing instruments.The choice of nib size and style can also influence the writing experience, with options ranging from fine to broad,and from italic to stub.Caring for a Fountain PenProper care and maintenance are essential for the longevity of a fountain pen.Regular cleaning is necessary to prevent clogging and to ensure a consistent ink flow.It is also important to store the pen with the nib facing upward to prevent ink from drying out within the feed.When not in use,the pen should be capped to protect the nib and to prevent the ink from evaporating.The Cultural Significance of the Fountain PenBeyond its practical use,the fountain pen has a rich cultural history.It has been associated with education,professionalism,and artistry.Many famous authors,such as Ernest Hemingway and George Orwell,were known to use fountain pens,and their choice of instrument is often considered to have influenced their writing style.The Modern Relevance of the Fountain PenIn an age where digital communication is prevalent,the fountain pen stands as a symbol of the enduring value of the written word.It is a tool that encourages mindfulness and reflection,as the act of writing with a fountain pen is often slower and more deliberate than typing.The resurgence of interest in fountain pens among younger generations is a testament to their timeless appeal.In conclusion,the fountain pen is more than just a writing instrument it is a vessel for creativity,a testament to craftsmanship,and a cherished heirloom that can be passed down through generations.Whether for the professional writer,the student,or the hobbyist,the fountain pen offers a unique and rewarding writing experience that continues to captivate users around the world.。
应用升级频繁英语作文
应用升级频繁英语作文Title: Coping with Frequent Application Upgrades。
In today's fast-paced technological landscape, the frequent upgrading of applications has become a common phenomenon. This trend poses both challenges and opportunities for users. In this essay, we will explore the impact of frequent application upgrades and discuss strategies for effectively coping with them.Firstly, let's delve into the reasons behind the frequent upgrades of applications. One primary factor driving this trend is the rapid evolution of technology itself. Developers constantly strive to enhance user experience, introduce new features, and address security vulnerabilities. Consequently, they release updates and patches at regular intervals to ensure that their applications remain relevant and competitive in the market.Moreover, the increasing complexity of software systemsnecessitates ongoing maintenance and improvement. As applications become more sophisticated, developers need to fix bugs, optimize performance, and adapt to changes in operating systems and hardware. Thus, frequent upgrades are essential for ensuring the reliability and stability of applications in an ever-changing environment.While application upgrades bring benefits such as improved functionality and enhanced security, they also present challenges for users. One common concern is the disruption caused by updates, especially if they require manual intervention or result in compatibility issues with other software. Additionally, users may feel overwhelmed by the constant barrage of notifications prompting them to install updates, leading to frustration and annoyance.Furthermore, frequent upgrades can strain limited resources, particularly for organizations managing large-scale deployments across multiple devices. IT departments must allocate time and manpower to test, deploy, and troubleshoot updates, diverting resources from othercritical tasks. This can lead to productivity losses andincreased operational costs, especially if upgrades encounter unexpected complications.So, how can users effectively cope with the challenges posed by frequent application upgrades? Here are some strategies to consider:1. Enable Automatic Updates: Most modern applications offer the option to enable automatic updates, ensuring that you receive the latest patches and improvements without manual intervention. This helps minimize disruption and ensures that your software remains up-to-date with minimal effort.2. Prioritize Updates: Not all upgrades are created equal. Prioritize critical security updates and patchesthat address known vulnerabilities to mitigate the risk of exploitation by malicious actors. Non-essential feature updates can be deferred or scheduled during periods of low activity to minimize disruption.3. Stay Informed: Keep abreast of software releaseschedules and update policies for your commonly used applications. Subscribe to official channels such as newsletters, blogs, or social media accounts maintained by developers to receive timely notifications about new releases and important announcements.4. Test Updates: Before deploying updates in a production environment, conduct thorough testing toidentify any compatibility issues or unexpected behavior. This is particularly crucial for organizations with complex IT infrastructures or custom software configurations. Consider establishing a staging environment to simulatereal-world conditions before rolling out updates to end-users.5. Maintain Backup Systems: In the event that an update causes unforeseen issues or system failures, having robust backup and recovery mechanisms in place can help minimize downtime and data loss. Regularly backup critical data and configurations to ensure resilience against unexpected events.6. Provide User Education: Educate end-users about the importance of keeping their applications up-to-date and the potential risks of neglecting updates. Encourage them to follow best practices for software maintenance and security, such as avoiding the use of outdated or unsupportedsoftware versions.7. Feedback Mechanism: Establish a feedback mechanismto gather user input and address concerns or suggestions related to application upgrades. Soliciting feedback can help developers identify areas for improvement andprioritize features based on user needs and preferences.In conclusion, while frequent application upgrades may present challenges for users, they also offer opportunities for enhanced functionality and security. By adopting proactive strategies such as enabling automatic updates, prioritizing critical patches, and maintaining backup systems, users can effectively cope with the demands of a constantly evolving software landscape. Moreover, fostering communication and collaboration between developers and end-users can facilitate a smoother transition to new versionsand ensure that applications meet the evolving needs of their user base.。
年轻人频繁换工作的原因英语作文
年轻人频繁换工作的原因英语作文The modern job market is characterized by a growing trend of young people frequently changing their jobs. This phenomenon has become a subject of much discussion and analysis, as employers and policymakers grapple with its implications for the workforce and the economy as a whole. In this essay, we will explore the primary reasons behind this trend and examine its potential consequences.One of the key factors contributing to the high job turnover among young professionals is the desire for personal growth and development. Many young people view their early career years as a time to explore different industries, acquire new skills, and find the right fit for their interests and aspirations. The fast-paced nature of the modern economy has created a sense of urgency among young workers to continuously upgrade their capabilities and stay ahead of the curve. As a result, they are often willing to leave their current positions in search of opportunities that offer greater challenges, better learning prospects, or more aligned with their long-term goals.Another significant factor is the shift in work-life balanceexpectations among the younger generation. Millennials and Generation Z have grown up in an era where work-life integration has become increasingly important. They seek employers who can provide a flexible work environment, opportunities for remote work, and a strong emphasis on work-life balance. When these expectations are not met, young employees may be more inclined to seek out alternative job options that better align with their desired lifestyle.The rise of the gig economy and the increasing prevalence of short-term contract work have also played a role in the frequent job changes among young people. The gig economy, which encompasses a range of temporary, freelance, or project-based work, offers young workers the flexibility and autonomy they desire, but it also introduces a level of uncertainty and instability. As a result, many young professionals may find themselves transitioning between various gig-based roles or short-term contracts, rather than settling into a more traditional, long-term employment arrangement.Furthermore, the changing nature of the job market itself has contributed to the trend of frequent job changes. The rapid technological advancements and the evolution of industries have led to the emergence of new job roles and the obsolescence of others. Young workers, who are often more adaptable and open to new challenges, may be more inclined to pursue these emergingopportunities, even if it means leaving their current positions.The desire for higher compensation and better career advancement opportunities is another significant factor. As young people enter the workforce, they are often eager to climb the corporate ladder and achieve financial stability. When their current employers fail to provide adequate growth prospects or competitive salaries, they may be tempted to explore alternative job options that offer better pay and more promising career trajectories.It is important to note that the frequency of job changes among young people is not inherently negative. In fact, it can be argued that this trend reflects a healthy and dynamic job market, where workers are empowered to pursue their professional aspirations and find the best fit for their skills and values. However, the implications of this trend for employers and the broader economy cannot be ignored.From an employer's perspective, the high turnover rate among young workers can be disruptive, as it requires frequent onboarding, training, and knowledge transfer. This can lead to increased costs and a potential loss of institutional knowledge. Employers may need to reevaluate their talent management strategies, offering more competitive compensation packages, robust training and development programs, and a stronger focus on employee engagement and retention.On a broader scale, the frequent job changes among young people may have implications for the overall productivity and economic stability of a country. When workers constantly shift between jobs, it can lead to a fragmented and less efficient labor market, with potential negative impacts on economic growth and innovation. Policymakers may need to consider ways to address this trend, such as promoting more robust vocational training programs, encouraging employer-sponsored professional development initiatives, or exploring ways to provide greater job security and stability for young workers.In conclusion, the trend of young people frequently changing jobs is a complex phenomenon driven by a variety of factors, including the desire for personal growth, work-life balance, the rise of the gig economy, and the changing nature of the job market. While this trend may have both positive and negative implications, it is essential for employers and policymakers to understand and address the underlying issues to ensure a more stable and productive workforce for the future.。
金钻脚轮 英文术语
金钻脚轮英文术语The realm of industrial and commercial equipment has witnessed a remarkable evolution, driven by the relentless pursuit of efficiency, durability, and innovation. At the forefront of this transformation lies the unassuming yet vital component known as the gold diamond caster wheel. These remarkable pieces of engineering have become the unsung heroes, quietly facilitating the seamless movement and transportation of a wide array of goods and materials across diverse industries.Gold diamond caster wheels, with their distinctive golden hue and diamond-like surface, are designed to provide superior performance and longevity in the most demanding of environments. Crafted from premium-grade materials, these wheels are engineered to withstand the rigors of heavy-duty applications, from the bustling warehouses of e-commerce giants to the meticulously organized production lines of manufacturing facilities.One of the primary advantages of gold diamond caster wheels lies in their exceptional load-bearing capacity. Capable of supportingimmense weights with ease, these wheels are the backbone of material handling equipment, ensuring the safe and efficient transportation of even the bulkiest of items. Whether it's a towering stack of pallets or a massive industrial machine, gold diamond caster wheels seamlessly glide across the floor, reducing the strain on both the equipment and the operators.Moreover, the unique diamond-like surface of these wheels offers unparalleled traction and stability, even on the most challenging of surfaces. From smooth concrete to uneven industrial flooring, gold diamond caster wheels maintain their grip, providing the necessary control and maneuverability to navigate through tight spaces and navigate around obstacles with ease. This superior traction not only enhances the safety of the operation but also minimizes the risk of damage to both the equipment and the surrounding environment.One of the standout features of gold diamond caster wheels is their exceptional durability. Crafted with meticulous attention to detail, these wheels are designed to withstand the rigors of constant use, resisting wear and tear with remarkable resilience. Their robust construction and reinforced bearings ensure a long service life, reducing the need for frequent replacements and minimizing the associated downtime and maintenance costs.In the fast-paced world of modern industry, where every second ofoperational time is precious, the reliability of gold diamond caster wheels becomes paramount. These wheels are engineered to provide smooth, effortless movement, enabling equipment to glide across the floor with minimal resistance and maximum efficiency. This translates into faster material handling, improved productivity, and ultimately, a more streamlined and cost-effective operation.Beyond their practical applications, gold diamond caster wheels also possess an undeniable aesthetic appeal. Their gleaming golden finish and diamond-like texture add a touch of sophistication and elegance to the equipment they adorn, complementing the overall design and creating a visually striking impression. This aesthetic value is particularly important in industries where appearance and branding play a significant role, such as high-end retail, hospitality, and specialized manufacturing.The versatility of gold diamond caster wheels is another key factor that has contributed to their widespread adoption across various industries. These wheels can be customized to suit the specific needs of different applications, with options for different sizes, load capacities, and specialized features. From the compact casters used in medical equipment to the heavy-duty variants employed in industrial machinery, gold diamond caster wheels can be seamlessly integrated into a wide range of applications, ensuring a perfect fit for each unique requirement.As the world continues to evolve, the demand for reliable and efficient material handling solutions has only grown stronger. Gold diamond caster wheels have emerged as a crucial component in this ever-changing landscape, providing the foundation for smooth, effortless movement and transportation of goods and equipment. Their exceptional performance, durability, and versatility have made them an indispensable part of the modern industrial landscape, driving productivity, safety, and innovation in countless applications.In conclusion, the gold diamond caster wheel stands as a testament to the power of engineering excellence and the relentless pursuit of improvement. These unassuming yet remarkable components have become the unsung heroes of the industrial world, quietly enabling the smooth flow of goods and materials that underpins the very fabric of our modern economy. As we continue to push the boundaries of what is possible, the gold diamond caster wheel will undoubtedly remain at the forefront of this evolution, paving the way for a more efficient, sustainable, and prosperous future.。
给我找到我的植物棚有玫瑰花的三百字英语作文
给我找到我的植物棚有玫瑰花的三百字英语作文全文共3篇示例,供读者参考篇1Finding Rose Plants in My GreenhouseI've always loved the sweet fragrance and vibrant colors of rose flowers. There's just something so romantic and elegant about them. That's why I was over the moon when I discovered several rose plants had sprouted in my family's greenhouse last spring.Our greenhouse is a modest little structure tucked away in the backyard, surrounded by tall oak trees that provide plenty of shade and privacy. It's my own personal oasis to escape to when I need a break from schoolwork and the stresses of teenage life. From an early age, I found solace in getting my hands dirty, nurturing seedlings, and watching them blossom into mature plants. There's something incredibly rewarding about cultivating life in that way.Most years, I stick to growing basic fruits and veggies - tomatoes, cucumbers, bell peppers, that sort of thing. Practical plants that my family can incorporate into meals. But every oncein a while, I like to mix it up and try my hand at more decorative flora. That was the case last year when my mom brought home a flat of assorted flower seeds from the hardware store. Among the packets were a few varieties of rose seeds.I'll be honest, I didn't have high expectations for the roses. Those delicate, finicky flowers always seemed too fussy and high-maintenance for my casual gardening abilities. I figured it couldn't hurt to give them a try, but I was prepared for failure and disappointment. So you can imagine my surprise when those first tender green shoots emerged from the soil a few weeks later, quickly flourishing into sturdy rose bushes adorned with tightly furled buds.At first, I could hardly believe my eyes. Had I really managed to grow roses from seeds on my first attempt? As the days passed and those buds unfurled into exquisite blooms in shades of yellow, pink, red, and white, the reality finally hit me. There they were, vibrant and aromatic rose plants, right here in my very own greenhouse! I studied them in awe, marveling at each silky petal.From that point on, I checked on those rose bushes every single day, ensuring they received the perfect amount of water, sunlight, and care. I meticulously pruned away dead leaves andspent flowers, determined to keep them looking their best. My devotion paid off as the summer months brought flush after flush of fresh new blooms.My favorite was a pale yellow rose with delicate petals that seemed to glow like captured sunlight. I loved watching it unfurl from a tiny, tightly wrapped bud into a full, open bloom over the course of just a few days. There was something so magical about witnessing that transformation. I couldn't resist burying my nose in those soft yellow petals to drink in their sweet fragrance.Soon, bouquets of my homegrown roses graced every room in our house. I'd proudly present them to my mom, who is also an avid gardener, and she would smile with delight at their beauty. We'd make frequent visits to the greenhouse just to admire them with our own eyes and inhale their heavenly scent. Those roses brought us so much simple joy during the lazy days of summer break.As the seasons shifted toward fall, most of the plants eventually stopped blooming as overnight temperatures cooled. One by one, the final flowers withered away until only bare branches and leaf buds remained. Part of me felt a twinge of sadness watching those last radiant petals flutter to the ground. It was like saying goodbye to beloved friends. But I knew theroses were simply entering their annual dormancy cycle, conserving their energy to dazzle me once again in spring.With winter now upon us, I'm already counting down the days until I can coax those rose bushes back to life with water and warm sunshine. My dreams are filled with visions of lush green foliage and brilliantly colored blooms. I can't wait to lose myself once more in that heavenly rose perfume as I wander among the blossoms.Looking back, successfully growing those rose plants from seed was one of the greatest thrills and proudest accomplishments of my young life so far. It sounds silly, but nurturing something so beautiful and delicate really did feel like a form of magic. Those rose bushes taught me so much about patience, determination, and the quiet rewards that come from dedicating yourself to a humble hobby.More than anything, though, this experience deepened my admiration for the incredible elegance and resilience of the rose itself. To think those towering, lush bushes covered in layers of velvety pink petals first emerged as tiny, unassuming seeds! It's an inspiring reminder that even the smallest, most fragile things can flourish into true beauty when nurtured with care and giventhe chance to blossom. I know I'll carry that lesson with me for the rest of my life.So while last year's rose plants have faded away for now, I eagerly await their imminent return this spring. You can be sure I'll be first in line at the garden store to Buy fresh rose seeds and bulbs to add even more eye-catching variety among my beds of vibrant blooms. Because in my heart, there's no flower quite as enchanting as the classic rose in all its splendor.篇2Finding Roses in My GreenhouseThere's just something about roses that makes my heart flutter every time I catch a glimpse of their velvety petals. Maybe it's the way their sweet fragrance hangs delicately in the air, or how each bloom seems to unfurl with such graceful elegance. Whatever the reason, roses have always held a special place in my heart – and in my greenhouse.You see, my little greenhouse is more than just a place to grow plants; it's a sanctuary of sorts, a verdant oasis where I can escape the stresses of everyday life and lose myself in the simple joys of tending to nature's bounty. It's where I've cultivated everything from juicy tomatoes to fragrant herbs, each plant alabor of love and a testament to the magic that can happen when you combine a little soil, water, and tender care.But of all the plants that call my greenhouse home, none quite captivate me like the roses. From the moment the first delicate buds appear, I find myself checking on them obsessively, eagerly awaiting the day when they'll finally unfurl their petals and reveal their full, radiant glory.I still remember the day I first discovered them, nestled among the vibrant green foliage like hidden treasures waiting to be uncovered. It was early spring, and I had been tending to my other plants when something caught my eye – a flash of deep crimson peeking out from behind a leafy shrub. Curious, I carefully parted the branches and gasped in delight at the sight that greeted me: a single, perfect rose in full bloom, its velvety petals radiating a rich, captivating hue.In that moment, I was utterly entranced. I gently cradled the bloom in my hands, marveling at its exquisite beauty and breathing in its heady, intoxicating fragrance. It was as if I had stumbled upon a rare and precious gem, a fleeting moment of pure, unadulterated beauty in a world that often moves too fast to appreciate such simple pleasures.From that day on, I was hooked. I spent hours researching the different varieties of roses, poring over books and scouring the internet for every scrap of knowledge I could find. I learned about their rich history, dating back centuries to the ancient civilizations of China and Persia, and how they had long been revered as symbols of love, beauty, and even war.Armed with this newfound knowledge, I set about cultivating my own little rose garden within the confines of my greenhouse.I carefully selected a variety of colors and fragrances, from the deep, sensual hues of the Burgundy Iceberg to the delicate, romantic blush of the English Rose. I tended to them with the utmost care, ensuring they had the perfect blend of sunlight, water, and nutrient-rich soil to thrive.And oh, how they thrived. With each passing week, my little rose garden seemed to grow more vibrant and lush, the blooms unfolding in a kaleidoscope of colors that took my breath away. I would spend hours simply sitting among them, losing myself in their intoxicating fragrances and marveling at the sheer beauty of nature's artistry.But it wasn't just their physical beauty that captivated me; it was the way they seemed to embody the very essence of life itself. Each rose was a living, breathing thing, a testament to theresilience and determination of nature to persevere and flourish, even in the face of adversity.I watched in awe as the delicate buds slowly unfurled, their petals stretching and reaching towards the sun, as if seeking out the very essence of life itself. And when the blooms finally opened fully, revealing their innermost depths in a riot of color and texture, I couldn't help but feel a profound sense of wonder and reverence for the natural world.In those moments, it was as if the roses were whispering their secrets to me, sharing the wisdom they had gleaned from eons of evolution and adaptation. They taught me about the cyclical nature of life, how each bloom was but a fleeting moment in a never-ending dance of growth, decay, and rebirth. They reminded me to savor each precious instant, to revel in the beauty of the present while understanding that all things must eventually pass.And yet, even as the petals eventually withered and fell, giving way to the next generation of blooms, there was a sense of hope and renewal that permeated my little greenhouse. For just as the roses had taught me about the impermanence of life, they had also shown me the incredible resilience and persistenceof nature, its ability to continually renew and regenerate itself in an endless cycle of growth and rebirth.As I tended to my roses, carefully pruning and fertilizing them, I couldn't help but feel a sense of kinship with these hardy, resilient plants. We were both survivors, in our own way, navigating the ups and downs of life with a quiet strength and determination that belied our delicate exteriors.And so, each time I step into my greenhouse and catch a glimpse of those beloved roses, I am reminded of the profound lessons they have taught me – about beauty, resilience, and the incredible magic of life itself. They are more than just plants to me; they are living, breathing reminders of the wonders that surround us every day, if only we take the time to pause and appreciate them.In a world that often seems consumed by chaos and turmoil, my little rose garden is a sanctuary, a place where I can find solace and reconnect with the simple joys of nature. And as I inhale the sweet, heady fragrance of those velvety blooms, I can't help but feel a sense of gratitude and wonder for the incredible journey that led me to this moment – a journey that began with a single, crimson rose and blossomed into a lifelong appreciation for the beauty and resilience of the natural world.篇3Finding Roses in My GreenhouseI have a real passion for gardening that started when I was just a little kid helping my grandparents in their vegetable patch. There's something so grounding and therapeutic about getting your hands dirty, tending to living things, and watching them grow and thrive under your care. As I got older, my interests extended beyond basic vegetables and herbs to the wonderful world of flowers.When I was twelve, my parents built me a small greenhouse in our backyard as a birthday present. It was like getting my very own botanical kingdom to rule over! I could experiment with different plants, try my hand at propagation, and indulge my growing obsession with roses. There's just something so romantic and classic about rose bushes with their velvety petals, vibrant colors, and intoxicating fragrances.In those early days, my little greenhouse was mostly filled with easy-to-grow annuals - petunias, marigolds, impatiens. But I had a section dedicated to trying to get rose cuttings and seeds to take root. I studied up on the preferred soil mixtures, temperature ranges, light exposure, and watering schedules. Ifailed more times than I can count, watching sad little stems and sprigs wither away no matter how much I fussed over them.My parents started to wonder if I should move on from the whole rose fixation. "Why don't you try orchids instead?" my dad would suggest. But I was determined. Roses were my white whale that I had to conquer.Finally, after a heartbreaking series of failed attempts one winter, a single tiny root nub appeared on one of my cuttings. I squealed with delight, hardly daring to breathe on it. Slowly but surely, pale green leaves unfurled. Before long, I had a thriving rosebush sprouting up in my little greenhouse!From then on, it was like the seal was broken. I was able to get rose cuttings, seeds, and slips of every variety to take root and blossom under my care. I spent hours lovingly pruning, misting, and admiring their regal blooms. The warm, rosy scent quickly became my happy place.As I got older and my collection grew, my obsession only deepened. I started haunting garden stores, ordering rare hybrid varieties from specialty catalogs, and experimenting with growing techniques to get the most vibrant colors and hardy bushes. I even attended rose growing conventions and seminarsto soak up as much knowledge as I could from fellowrose-addicts.By the time I headed off to university, my parents' backyard greenhouse had expanded into a gorgeous rose paradise with over 50 different cultivars in a rainbow of hues. I would spend hours out there whenever I was home from school, tenderly grooming and marveling at my floral babies. My friends thought I was a bit crazy with my rose mania, but I didn't care. There's an indescribable peace and happiness that settles over me whenever I'm surrounded by those lush, fragrant beauties.Once I graduated and got my first real job and place, the very first thing I did was build myself a huge new greenhouse attached to my little house. I went all out, designing aclimate-controlled conservatory-style space where I could grow roses year-round and indulge my wildest rose fantasies. One whole wall is nothing but a riot of deep crimson hybrid teas. In another section, I have a miniature rose garden filled with tiny, delicate blooms.My friends and family think I'm maybe taking things a bit too far now. "Isn't this getting a bit excessive?" my brother teased when I excitedly gave him a tour. I just smiled serenely andinhaled the heavenly perfumed air. To me, it's absolute paradise on earth, and I regret nothing.Sure, roses are finicky and high-maintenance with their temperature, water, nutrient, and pest demands. But there's something so rewarding about devoting myself wholly to cultivating and caring for these aristocratic flowers. With patience and effort, I can create transcendent beauty right here in my own home. Nothing compares to slowly unfurling those soft petals myself, marveling at each new bloom. It's my greatest passion and source of zen.The journey to find my perfect roses and build this exquisite greenhouse conservatory hasn't been easy. But every moment of struggle and heartbreak has been worth it to stand surrounded by towering, lush rose bushes in raucous Full Bloom. When I breathe in their heady perfume, I know I've found my true happy place and calling. This is just the start of my grand rose adventures! Next up, I'll be experimenting with growing exotic rose hybrids and developing my own genetically-engineered super rose varietals. A rose-filled life for me。
eniac名词解释
eniac名词解释ENIAC (Electronic Numerical Integrator and Computer) is regarded as the world's first general-purpose electronic digital computer. Developed by John W. Mauchly and J. Presper Eckert at the University of Pennsylvania, the ENIAC was completed in 1945 and became operational in 1946. The machine occupied a large room, weighed 30 tons, and consumed vast amounts of electricity. It was used primarily for military calculations during World War II, such as the development of artillery trajectories.ENIAC was a considerable breakthrough in computing technology and served as the foundation for subsequent developments in the field. This article intends to provide a comprehensive explanation of the principles and functionalities of ENIAC, discussing its significance and impact on the evolution of computers.1. Historical Context:Before the emergence of ENIAC, computers were mainly mechanical or electromechanical devices. These machines relied on gears, levers, and other physical components to perform calculations. However, they were extremely slow and prone to errors. The need to expedite numerical calculations to aid scientific research and military operations during World War II prompted the development of electronic computers.2. Components and Structure:The ENIAC consisted of approximately 17,468 vacuum tubes,7,200 crystal diodes, 1,500 relays, 70,000 resistors, 10,000 capacitors, and 6,000 switches. Its computational unit contained twenty function tables, which allowed for the storage and retrievalof instructions. These instructions were implemented using plugboards, where wires could be connected to set up the desired logical operations. Due to its extensive use of vacuum tubes, the ENIAC had a high failure rate, with tubes often burning out and needing replacement.3. Functionality and Operations:ENIAC was programmed using a combination of punched cards and plugboards. Instructions were set manually by connecting the appropriate cables on the machine's plugboards, defining the specific operations that the computer would execute. Data input was performed by manually setting switches and inserting punched cards, and output was obtained using printers or graphical displays.4. Programming Challenges:Programming the ENIAC was a time-consuming and labor-intensive process. Each program required physically rearranging the machine's plugboard connections, making it difficult to modify or create new programs. The constraints of programming the ENIAC led to significant research in programming techniques and the development of high-level languages to simplify the process.5. Speed and Capabilities:The ENIAC performed calculations at speeds significantly faster than previous computing devices. It could perform around 5,000 additions or subtractions, or 385 multiplications, in one second, leading to a substantial reduction in calculation time. Additionally, ENIAC had the ability to store intermediate values during complex calculations, enhancing its overall computational capabilities.6. Impact and Legacy:The development of the ENIAC marked a significant turning point in the history of computing technology. It demonstrated the feasibility of electronic computers and paved the way for subsequent advancements. The success of ENIAC encouraged further research and led to the construction of subsequent computers, such as the EDVAC and UNIVAC, which adopted similar principles but with enhanced capabilities and reliability. 7. Limitations:Despite its accomplishments, the ENIAC had several limitations. Its large physical size and high power requirements made it difficult to relocate or maintain. The constant failures of vacuum tubes were a persistent issue, requiring frequent maintenance and tube replacements. Moreover, the programming process was cumbersome and far from user-friendly, limiting its widespread adoption and usability.8. Conclusion:ENIAC stands as a remarkable achievement in the history of computing technology. Its development heralded the era of electronic computing, providing a foundation for subsequent advancements that shaped the world we live in today. Although the ENIAC had limitations and was eventually overshadowed by more reliable and efficient computers, its impact on the field remains indelible. The lessons learned from designing and using the ENIAC helped inform future generations of computer scientists, setting the stage for further breakthroughs in computing technology.。
新发展研究生英语一答案及翻译完整版
Unit 1 Human ReflectionsBefore Reading Activities1. Fill in the blanks with the words you hear.(1) crush; (2) lifetime; (3) deceive; (4) smile; (5) right; (6) grateful; (7) arrives; (8) assurance; (9) return; (10) contentⅡ. Language FocusVocabularyPart A1. stranded;2. emeritus;3. erode;4. wondrous;5. yearning;6. shackled;7. salvation;8. nibble;9. imperfection; 10. eruptPart B 1. B 2. C 3. A 4. D 5. A 6. B 7. C 8. A 9. D 10. BBank-Cloze(1) bored; (2) affiliate; (3) conducted; (4) valid; (5) ranging(6) fulfilling; (7) revealed; (8) tended; (9) Pressure; (10) toughTranslationPart A1. For some, marriage is the grave of love, while for others, marriage is an effective salvation for those who lead a solitary life.2. Blessed with a great historical responsibility, the Conference is destined to have far-reaching impact on the development of the organization.3. All of these show people’s yearning for a b etter life, so they have been carried forward generation after generation.4. If Congress approved the bill now, the president warned, the fragile peace process that he is trying to keep could fall apart.5. The couple must be tolerant of the little imperf ections in each other’s character, otherwise their marriage may end up in divorce.Part B爱情是一部电话机,渴望它响起时,它却总是悄无声息;不经心留意时,它又叮铃铃地响起。
高中英语新人教版选必四Unit 2 Iconic Attractions逐词英语释义汇总(共64个)
高中英语选必四Unit2逐词英语释义1.iconic: 标志性的,象征性的widely recognized and well-established as a symbol or representation of something2.foundation: 基础,基金会the basis or groundwork of something, an organization established to provide financial or other support for a particular purpose3.political: 政治的relating to the government or the public affairs of a country, involving or concerned with politics4.didgeridoo: 迪吉里杜管a musical instrument of Australian Aboriginal origin, consisting of a long wooden tube that is blown into to produce a deep, resonant sound5.located: 位于,坐落situated in a particular place or position6.equator: 赤道an imaginary line drawn around the Earth equally distant from both poles, dividing the Earth into northern and southern hemispheres7.koala: 竞争者a small, tree-dwelling marsupial native to Australia, known for its round face, large ears, and thick fur8.barbecue: 烧烤a meal or gathering at which meat, fish, or other food is cooked outdoors over an open fire or on a grill9.bakery: 面包店,糕点店a place where bread and cakes are made or sold10.joint: 关节,接合处a point at which two or more parts are joined together11.butcher: 屠夫,肉贩a person who sells meat or prepares it for cooking by cutting or trimming it12.premier: 首席的,总理first in importance, rank, or position, the head of a government or state13.herb: 草本植物,香草a plant or a part of a plant that is used for its flavor, scent, or therapeutic properties14.dim sim: 点心a type of Chinese-inspired dumpling found in Australia and New Zealand, typically filled with meat or vegetables and steamed or deep-fried15.hollow: 空心的,凹陷的having a hole or empty space inside, sunken or concave16.vibrate: 震动,振动move or cause to move continuously and rapidly to and fro17.horn: 角,喇叭a hard permanent outgrowth, often curved and pointed, found on the head of certain animals18.pitch: 音高,场地the quality of a sound governed by the rate of vibrations producing it, an area of ground marked out or used for play in an outdoor team game19.straightforward: 简单明了的,直截了当的uncomplicated and easy to do or understand, honest and frank20.slogan: 口号a short and striking or memorable phrase used in advertising or as a rallying cry21.minister: 部长,牧师a person appointed to a high office in government or church, especially a cabinet minister or a clergyman22.prime minister: 首相,总理the head of a government or state in many countries, usually the leader of the largest party in parliament23.frog: 青蛙a small tailless amphibian with a short body, moist smooth skin, and long hind legs for leaping24.arrow: 箭头,箭a shaft sharpened at one end, shot from a bow as a weapon or for sport25.entitle: 给...权利,给...资格give someone the right to do or have something, qualify (someone) for a particular title or privilege26.getaway: 逃走,度假an act or instance of escaping or going away, a vacation or trip taken to escape from everyday life or routine27.dive: 潜水,跳水plunge head first into water or plunge downward rapidly, participate in an activity involving jumping or falling from a great height28.kayaking: 划独木舟the sport or activity of traveling in a kayak, a small narrow boat propelled by a double-bladed paddle29.peak season: 旺季,高峰期the time of year when the most people go on vacation or engage in a particular activity, the busiest or most popular period30.freedom: 自由,自由权the power or right to act, speak, or think as one wants without hindrance or restraint31.domain: 领域,域名an area of territory owned or controlled by a ruler or government, a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual32.sponsor: 赞助商,发起人a person or organization that provides funds or support for a project, activity, or event33.liberty: 自由,自由权the state of being free within society from oppressive restrictions imposed by authority on one's way of life, behavior, or political views34.golf: 高尔夫球a game played on a large open-air course, in which a small hard ball is struck witha club into a series of small holes in the ground35.strait: 海峡,困境a narrow passage of water connecting two seas or two large areas of water, a difficult situation or position36.sample: 样品,样本a small part or quantity intended to show what the whole is like, a representative selection or specimen for testing or analysis37.monument: 纪念碑,纪念物a statue, building, or other structure erected to commemorate a notable person or event38.kiwi: 几维鸟,猕猴桃a flightless bird native to New Zealand, or a small brown fruit with green flesh and black seeds39.geyser: 间歇泉,喷泉a hot spring that intermittently sends up fountain-like jets of water and steam into the air40.sulphuric pool: 硫磺池a pool or body of water containing sulfur or sulfur compounds41.manuka honey: 曼努卡蜂蜜a type of honey produced in New Zealand from the nectar of the manuka tree, known for its unique flavor and potential health benefits42.bungee jumping: 蹦极跳a recreational activity that involves jumping from a tall structure while connected to a large elastic cord43.a flock of: 一群,一批a group of birds, sheep, or goats, or a large number of people or things44.geothermal park: 地热公园a park or area of land where geothermal activity, such as hot springs45.distribution: 分配,分发the action of sharing something out among a number of recipients, the way in which something is spread or arranged over an area or group of people46.pouch: 小袋,口袋a small flexible baglike container, a pocket or similar receptacle on a garment47.temporary: 暂时的,临时的lasting for only a limited period of time, not permanent48.phase: 阶段,时期a distinct period or stage in a process of change or development, a particular aspect or feature of something49.trunk: 树干,象鼻the main stem of a tree, an elephant's elongated nose and upper lip50.licensed: 有执照的,获得许可的officially authorized or permitted to do something, having obtained a license or official permission to do something51.license: 执照,许可a permit from an authority to own, use, or do something, a legal document giving official permission to do something52.session: 会议,会期a meeting of a deliberative or judicial body to conduct its business, a period devoted to a particular activity53.frequency: 频率,频繁程度the rate at which something occurs over a particular period of time, the fact of being frequent or happening often54.violent: 暴力的,猛烈的using or involving physical force intended to hurt, damage, or kill someone or something, characterized by intense or turbulent motion55.violence: 暴力,暴行behavior involving physical force intended to hurt, damage, or kill someone or something, extreme force or intensity of emotion or an activity56.nest: 巢穴,窝a structure or place made or chosen by a bird for laying eggs and sheltering its young,a place where an animal or insect breeds or shelters57.mammal: 哺乳动物a warm-blooded vertebrate animal of a class that includes humans and all other animals that nourish their young with milk58.biology: 生物学the study of living organisms, including their physical structure, chemical processes, molecular interactions, physiological mechanisms, development, and evolution59.hatch: 孵化,孵出emerge from an egg, develop or cause to develop from an immature to a mature state60.capacity: 容量,能力the maximum amount that something can contain, the ability or power to do, experience, or understand something61.a handful of: 一把,少量的a small number or quantity of people or things that can be held in one hand62.fence: 栅栏,围墙a barrier, railing, or upright structure enclosing an area, typically made of wood or wire and used for protection or privacy63.prison: 监狱,牢房a building in which people are legally held as a punishment for a crime they have committed, a place of confinement or captivity64.grand: 宏伟的,豪华的magnificent and imposing in appearance, marked by a regal formality and stateliness in manner or appearance。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Evolution and Maintenance of Frequent Pattern Space when Transactions are Removed Mengling Feng,1Guozhu Dong,2Jinyan Li,3Yap-Peng Tan,1Limsoon Wong4 1Nanyang Technological University,2Wright State University, 3Institute for Infocomm Research,&4National University of Singapore 1{feng0010,eyptan}@.sg,2guozhu.dong@,3jinyan@.sg,&4wongls@.sgAbstract.This paper addresses the maintenance of discovered frequentpatterns when a batch of transactions are removed from the originaldataset.We conduct an in-depth investigation on how the frequent pat-tern space evolves under transaction removal updates using the conceptof equivalence classes.Inspired by the evolution analysis,an effectiveand exact algorithm TRUM is proposed to maintain frequent patterns.TRUM maintains frequent patterns efficiently by updating only the af-fected equivalence classes.Experimental results demonstrate that ouralgorithm outperforms representative state-of-the-art algorithms.1IntroductionUpdate is a fundamental data management activity.Data updates allow users to remove expired data,to correct data,and to insert new data.Maintenance of a dynamic dataset and its corresponding discovered knowledge is more com-plicated compared to the knowledge discovery of a stable dataset.Updates may induce new knowledge and invalidate discovered information.Re-execution of discovery algorithms from scratch every time when a database is updated causes significant computation and I/O overheads.Therefore,effective algorithms to maintain discovered knowledge on the updated database without re-execution of mining algorithms are very desirable.Databases can be updated in several manners.We focus here on the case whena batch of transactions are removed from the existing database.According to[15],transaction removal is one of the most frequently used operations in DBMS. This operation is very crucial in the applications of sales data,transaction records and clinical data to delete expired data and error records.In this paper,a novel method is proposed to update and maintain discovered frequent patterns[1],an important pattern type in data mining.One major challenge of maintaining frequent patterns is that the pattern space is often huge.E.g.mushroom dataset,which has about8thousands transactions,returns over100K frequent patterns when minimum support is1K.Furthermore,among the enormous frequent pattern space,we have no prior knowledge about which patterns are affected by the transaction removal update.In addition,updatescause various degrees of impacts on different patterns,e.g.some patterns may experience just a change of support values,but some may be removed completely.This paper makes the following contributions:(1)We conduct an in-depth analysis on how the frequent pattern space evolves under transaction removal updates using the concept of equivalence classes.To the best of our knowledge, no previous works have studied this.The evolution analysis inspires us to solve the maintenance problem effectively in a divide-n-conquer manner.(2)An effec-tive and exact algorithm,Transaction Removal Update Maintainer(TRUM),is proposed to maintain frequent patterns when transactions are removed.TRUM maintains the pattern space effectively by updating only the affected equivalence classes.Besides equivalence classes,TRUM can be applied to update closed and key patterns,since they are the borders of equivalence classes.It is worth point-ing out that the maintenance of key patterns has rarely been studied in prior works.(3)Extensive experimental studies are conducted to evaluate the perfor-mance of the proposed algorithm.Experiments show that TRUM has significant performance advantage over some state-of-the-art approaches.2Preliminaries and Previous WorkLet I={i1,i2,...,i m}be a set of distinct literals called“items”.An“itemset”, or a“pattern”,is a set of items.A“transaction”is a non-empty set of items.A “dataset”is a non-empty set of transactions.A pattern P is said to be contained or included in a transaction T if P⊆T.A pattern P is said to be contained in a dataset D,denoted as P∈D,if there is T∈D such that P⊆T.The “support”of a pattern P in a dataset D,denoted sup(P,D),is the number of transactions in D that contain P.A pattern P is said to be frequent in a dataset D if sup(P,D)is greater than or equal to a pre-specified threshold ms.Given a dataset D and a support threshold ms,the collection of all frequent itemsets in D is called the“space of frequent patterns”,and is denoted by F(ms,D).The“space of frequent patterns”can be large.As a result,maximum pat-terns[3,8],closed patterns[7,9],key patterns[12](also known as generators), and borders of equivalence classes[11]have been proposed to concisely represent the space of frequent patterns.Borders of equivalence classes are arguably the mostflexible succinct lossless representation of the frequent pattern space[11]. Conceptually,it partitions the frequent pattern space into equivalence classes that are convex.Then the entire space is represented by the most general and most specific patterns of these equivalence classes.As it turns out,these most general patterns are precisely the key patterns,and these most specific patterns are precisely the closed patterns.The task of frequent pattern maintenance is to update the“space of frequent patterns”according to the updates of the dataset.Incremental maintenance,where new transactions are inserted,has at-tracted intensive research attention.Current incremental maintenance algo-rithms can be categorized into two main approaches:Apriori-based[5,6,2] and sliding windowfiltering(SWF)[4,10].The performance of both Apriori-2based and SW F algorithms is limited by the candidate-generation-eliminationframework,which involves multiple data scans and unnecessary computationson infrequent candidates.To achieve more efficient updates,algorithms are proposed to incrementallymaintain only frequent maximum patterns.ZIGZAG1[13]is one effective repre-sentative.ZIGZAG is inspired by its related work GenMax[8].It incrementallymaintains maximum patterns by a backtracking search,which is guided by theoutcomes of previous maintenance iteration.Decremental maintenance,where old transactions are removed,on theother hand,has not received as much research attention.Zhang et al.[15]pro-posed an algorithm,named DUA,to address the decremental maintenance prob-lem.DUA maintains frequent patterns by a pairwise comparison of original fre-quent patterns and patterns included in the removed transactions.Since thenumber of frequent patterns is usually enormous,the pairwise comparisons causeheavy computations.In addition,algorithms FUP2H[6],Borders[2],ZIGZAG canalso be applied to decremental maintenance with some parameter changes.It is observed that most previous methods are proposed as an extensionof some effective data mining algorithms or data structures.E.g.FUP[5]andBorders[2]are developed based on Apriori,and ZIGZAG is inspired by GenMax.Unlike these previous works,our algorithm is proposed based on an in-depthstudy on the evolution of the frequent pattern space.3Evolution of Frequent Pattern Space3.1Basic Properties of Frequent Pattern SpaceThe space of frequent patterns possesses the nice convexity property,which isvery helpful when it comes to concise and lossless representation and mainte-nance of the space.Definition1.A space S is convex if,for all X,Y∈S such that X⊆Y,it isthe case that Z∈S whenever X⊆Z⊆Y.For a convex space S,we define the collection of all“most general”patternsin S as a“bound”of S,where a pattern X is most general in S if there is noproper subset of X in S.Similarly,we define the collection of all“most specific”patterns as another bound of S,where a pattern X is most specific in S if thereis no proper superset of X in S.We call the former bound the“left bound”of S,denoted L;and the latter bound the“right bound”of S,denoted R.We call the pair of left and right bound the“border”of S,which is denoted by L,R .A space can be concisely represented by its borders without loss of information. Fact2(Cf.[11])F(ms,D)is convex.Furthermore,it can be structurally de-composed into convex sub-spaces—equivalence classes.1We thank Adriano Alonoso Veloso,Professor Srinivasan Parthasarathy and Professor Mohammed J.Zaki for providing the ZIGZAG source code.3{}b, da, c, da, cFig.1.Demonstration of how a space of frequent patterns,which contains9patterns, is decomposed into5frequent equivalence classes.The fact indicates that the space of frequent patterns is a convex space. We found that convex space has an interesting property:it can be decomposed into convex sub-spaces.In the case of frequent pattern space,it can be further decomposed systematically into equivalence classes.Definition3.Let the“filter”,f(P,D),of a pattern P in a dataset D be defined as f(P,D)={T∈D|P⊆T}.Then the“equivalence class”[P]D of P in a dataset D is the collection of patterns defined as[P]D={Q|f(P,D)=f(Q,D), Q is a pattern in D}.Note that under this definition,[Q]D=∅if Q does not appear in D.For convenience in some of our proofs,we also use the traditional notion of an equivalence class,and write it as[P]∗D={Q|f(P,D)=f(Q,D)}.In other words,two patterns are“equivalent”in the context of a dataset D iffthey are included in exactly the same transactions in D.Thus the patterns in a given equivalence class have the same support.So we extend the notations and write sup(C,D)to denote the support of an equivalence class and C∈F(ms,D) to mean the equivalence class is frequent.Figure1presents the frequent pattern space for the sample dataset with ms=2.In addition,it graphically demon-strates how the space of frequent patterns can be structurally decomposed into frequent equivalence classes.Structural decomposition of frequent pattern space inspired us to solve the maintenance problem in a divide-and-conquer manner.Instead of maintaining the pattern space as a whole,which is computationally costly,we attack the problem by maintaining each frequent equivalence pared with the frequent pattern space,an equivalence class is much smaller and easier to update. Moreover,not all the equivalence classes are affected by the updates.If we can efficiently locate only those equivalence classes that are affected by the updates, we can solve the problem effectively by updating only the affected equivalence classes.In addition,a nice property of equivalence classes of patterns is that they are convex and they can be concisely represented by their borders.Fact4(Cf.[11])[P]D is convex,and the right bound of its border is a singleton set.Together with equivalence classes,frequent“closed patterns”and frequent “key patterns”(also called“generators”)have been widely studied in the data4Original Dataset (ms =2)a, b, c, db, da, c, da, cFrequent equivalence classes:{ {a}, {c}, {a, c} } : 3{ {b, d} } : 2Frequent equivalence classes: Updated Dataset (ms =2)a, b, c, d b, d a, c bNotation: {.} : x refers to an equivalence class with x assupport value and consists of patterns {.}.{ {d} } : 3Remove b { {b} } : 3Fig.2.An example to demonstrate how equivalence classes and the frequent pattern space may evolve when a transaction is removed.mining field.We discuss next the relationship between equivalence classes and closed and key patterns.Definition 5.A pattern P is a “key pattern”in a dataset D ifffor every P ⊂P ,it is the case that sup (P ,D )>sup (P,D ).In contrast,a pattern P is a “closed pattern”in a dataset D ifffor every P ⊃P ,it is the case that sup (P ,D )<sup (P,D ).It is discovered in [11]that the right bound of an equivalence class is actually a closed pattern,and the left bound is a group of key patterns.Thus,the corre-sponding closed and key patterns form the border of and define an equivalence class.Following the definition of borders of convex spaces,a key pattern must be most general in its equivalence class.Similarly,a closed pattern must be most specific in its equivalence class.So we have the following alternative equivalent definitions for key and closed patterns.Fact 6A pattern P is a key pattern in a dataset D iffP is a most general pattern in [P ]D .A pattern P is a closed pattern in a dataset D iffP is the most specific pattern in [P ]D .Therefore,to mine or maintain key and closed patterns,it is sufficient to mine or maintain the borders of equivalence classes,and vice versa.3.2Impacts of Transaction RemovalWe investigate in this section how frequent patterns,key patterns,closed pat-terns,equivalence classes and their support values evolve when multiple trans-actions are removed from an existing dataset.We use the following notations:D org is the original dataset,D dec is the set of old transactions to be removed,and D upd −=D org −D dec is the updated dataset.We assume without loss of generality that D dec ⊆D org .5An existing equivalence class can evolve in exactly three ways,as shown in Figure 2.The first way is to remain unchanged without any change in support.The second way is to remain unchanged but with a decreased support.If the sup-port of an existing frequent equivalence class drops below the minimum support threshold,the equivalence class will be removed.The third way is to grow—by merging with other classes,where at most one of the merging classes has the same closed pattern and the same support as the resulting equivalence class and all other merging classes have lower support.In short,after the decremental update,the support of an equivalence class can only decrease and the size of an equivalence class can only grow by merging.In order to have an in-depth understanding of the three ways that an existing equivalence class may evolve,we now provide the exact conditions for each of these ways to occur.The evolution of frequent pattern space under decremental updates are characterized as follows:Theorem 1.For every frequent equivalence class [P ]D org in D org ,exactly one of the 6scenarios below holds:1.P is frequent in D org ,P is not in D dec ,and f (P,D org )=f (Q ,D org )−f (Q,D dec )for all Q in D dec ,corresponding to the scenario where an equivalence class has remained totally unchanged.In this case,[P ]D upd −=[P ]D org ,sup (P,D upd −)=sup (P,D org ),f (P,D upd −)=f (P,D org ),and the closed pattern of [P ]D upd −is the same as that of [P ]D org .The key patterns of [P ]D upd −are the same as that of [P ]D org .2.P is frequent in D org ,P is not in D dec ,and f (P,D org )=f (Q ,D org )−f (Q,D dec )for some Q occurring in D dec ,corresponding to the scenario where the equivalence class of Q has to be merged into the equivalence class of P .In this case,let all such Q ’s in D dec be grouped into n distinct equivalence classes [Q 1]∗D dec ,...,[Q n ]∗D dec ,having representatives Q 1,...,Q n satisfying the condition on Q .Then [P ]D upd −=[P ]D org ∪ i [Q i ]D org ,sup (P,D upd −)=sup (P,D org ),f (P,D upd −)=f (P,D org ),and the closed pattern of [P ]D upd −is the same as the closed pattern of [P ]D org .The key patterns of [P ]D upd −are the most general ones among the key patterns of [P ]D org ,[Q 1]D org ,...,[Q n ]D org .Furthermore,[Q i ]D upd −=[P ]D upd −for 1≤i ≤n .3.P is frequent in D org ,P is in D dec ,and |f (P,D upd −)|<ms ,corresponding to the scenario where the equivalence class is removed.4.P is frequent in D org ,P is in D dec ,and f (Q,D org )=f (P,D org )−f (P,D dec )for some Q that is frequent in D org but not in D dec ,corresponding to the scenario where the equivalence class of P has to be merged into the equivalence class of Q .This scenario is complement to Scenario 2.In this case,the equivalence class,support,key,and closed patterns of [P ]D upd −is the same as that of [Q ]D upd −,as computed in Scenario 2.5.P is frequent in D org ,P is in D dec ,|f (P,D upd −)|>ms ,f (Q,D org )=f (P,D org )−f (P,D dec )for all Q in D org and not in D dec ,and f (P,D org )−f (P,D dec )=f (Q ,D org )−f (Q,D dec )for all Q in D dec and Q ∈[P ]D org ,corresponding to the sit-uation where the equivalence class has remained unchanged but has decreased in support.In this case,[P ]D upd −=[P ]D org ,f (P,D upd −)=f (P ,D org )−f (P,D dec ),sup (P,D upd −)=sup (P,D org )−sup (P,D dec ),and the closed pattern of [P ]D upd −is the same as that of [P ]D org .The key patterns of [P ]D upd −are the same as that of [P ]D org .66.P is frequent in D org,P is in D dec,|f(P,D upd−)|>ms,f(Q,D org)=f(P,D org)−f(P,D dec)for all Q in D org and not in D dec,and f(P,D org)−f(P,D dec)=f(Q,D org)−f(Q,D dec)for some Q in D dec and Q∈[P]D org,corresponding to thesituation where the equivalence classes of P and Q have to be merged.In this case,let all such Q’s in D dec be grouped into n distinct equivalence classes[Q1]∗Ddec ,...,[Q n]∗Ddec ,having representatives Q1,...,Q n satisfying the condition on Q.Then[P]Dupd−=[P]Dorg∪i[Q i]Dorg,sup(P,D upd−)=sup(P,D org)−sup(P,D dec),and f(P,D upd−)=f(P,D org)−f(P,D dec).The closed pattern of[P]Dupd−is themost specific pattern among the closed patterns of[P]Dorg ,[Q1]Dorg,...,[Q n]Dorg.The key patterns of[P]Dupd−are the most general ones among the key patterns of[P]Dorg ,[Q1]Dorg,...,[Q n]Dorg.Furthermore,[Q i]Dupd−=[P]Dupd−for1≤i≤n.Proof.Refer to the Appendix(.sg/home5/feng0010/ appendix.pdf)for the detailed proof.This theorem describes in detail how the space of frequent patterns evolves when a group of transactions are removed.Moreover,it describes how to derive equivalence classes in D upd−from existing equivalence classes in D org,which is an extremely constructive result for the maintenance of frequent patterns.4Proposed Algorithm:TRUMAn algorithm for maintaining the frequent pattern space after some trans-actions are removed from the original database is proposed in Figure3.In the proposed algorithm TRUM,we use notations X.closed to mean the closed pattern of an equivalence class,X.keys to mean the set of keys of an equiv-alence class,and X.sup to denote the support value of an equivalence class. The algorithm addresses the maintenance problem effectively by working on the borders of equivalence classes,instead of the entire pattern space.The proposed algorithm is proved to be correct and complete in the Appendix (.sg/home5/feng0010/appendix.pdf).According to Figure3,the maintenance problem mainly consists of two major computational tasks.Thefirst task is to update the support values of each existing frequent equivalence classes.The second task is to merge equivalence classes that are to be joined together after the decremental update.4.1Implementation TechniquesTRUM is implemented efficiently with a novel data structure—Tid-tree.The Tid-tree is developed based on the concept of Transaction Identifier List,in short Tid-list.The Tid-list is very popular in the literature of data mining[8,13].Tid-lists,serve as the vertical projections of items,greatly facilitate the discovery of frequent itemsets and their support.A new feature of Tid-lists is exploited here.They are utilized as the identifers of equivalence classes.Each frequent equivalence class is associated with a Tid-list,which records all the transactions it appears in.According to the definition of an equivalence class,each equivalence7Input:The set O=O1,...,O n of frequent equivalence classes in D org,represented by their borders—viz.,the corresponding key and closed patterns and supports—and identified by their unique closed patterns,and the set T=T1,...,T m of transactions in D dec,and the minimum support threshold ms.Output:The set O 1,...,O n(if they still exist)of updated frequent equivalence classes in D upd−represented by their borders and identified by their unique closed patterns.Method:1:{Scenario1is default for equivalence classes in D org}2:O1:=O1;...;O n:=O n;3:for all T∈T,O∈O do4:if O.closed⊆T then5:{Scenario5is default for equivalence classes,whose support is decreased due to the decre-mental update.O has already been initialized as per Scenario1.}6:O .sup:=O .sup−1;7:end if8:end for 9:for all Oi ∈{O 1,...,O n}(if they exist)do10:if Oi .sup<ms then11:{Scenario3.The equivalence class is no longer frequent.}12:Remove Oi ,continue;13:end if 14:for all Oj ∈{O i+1,...,O n}(if they exist)do15:if Oi .sup=O j.sup&O j.closed⊂O i.closed then16:{Scenario2&6.Oj merges into O i.}17:Oi .keys:=min{K|K∈O i.keys orK∈O j.keys}18:Remove Oj ;19:end if20:if Oi .sup=O j.sup&O j.closed⊃O i.closed then21:{Scenario4&6.Oi merges into O j.}22:Oj .keys:=min{K|K∈O i.keys orK∈O j.keys}23:Remove Oi ;24:end if25:end for26:end forreturn O 1,...,O n(if they still exist);Fig.3.TRUM:a novel algorithm for maintaining frequent patterns after some trans-actions are removed from the original database.class has a unique Tid-list,and so can be identified by it.This observation forms the foundation of the proposed implementation technique.To construct a Tid-list,we need to assign a unique Tid to each transaction as shown in Part(a)of Figure4.The Tid-tree is a prefix tree of the Tid-lists of equivalence classes.The prefix tree has been used as a concise storage of frequent patterns[9]and closed patterns [7].In this implementation,Tid-tree serves as a concise storage of Tid-lists of the existing equivalence classes.Figure4(b)shows how the Tid-lists of equivalence classes in Figure4(a)can be stored in a Tid-tree.Details of the construction of a prefix tree can be referred to[7].Here,we emphasize two features of the Tid-tree:(1)Each node in the Tid-tree stores a Tid.If the Tid of the node is the last Tid in some equivalence class’s Tid-list,the node points to the corresponding equivalence class.Moreover,the depth of the node reflects the support of the corresponding equivalence class.(2)The Tid-tree has a header table,where each slot stores a linked list that connects all the nodes with the same Tid.8Original Dataset (ms =2)a, b, c, d b, d a, c, d a, c Frequent ECs:EC_5: { {a, d}, {c, d}, {a, c, d} } : 2EC_2: { {b, d} } : 2Notation: EC_i: {.} : x refers to an equivalence class EC_i withx as support value and consists of patterns {.}.EC_3: { {d} } : 3b EC_4: { {b} } : 3TidTransactions 12345(a)(b)(c)Fig.4.A running example of TRUM with Tid-tree implementation.(a)Original dataset with Tids and its frequent equivalence classes (ECs).(b)Tid-tree for the original dataset.(c)Tid-tree after removal of transaction 3.When transactions are removed from the original dataset,the Tid-tree can be updated by removing all the nodes that include the Tids of deleted transactions.This can be accomplished effectively with the help of the Tid header table.As demonstrated in Figure 4,after a node is removed,its children re-link to its parent to maintain the tree structure.If the node points to an equivalence class,the pointer is passed to its parent.When two or more equivalence class pointers collide into one node,they should be merged together.E.g.in Figure 4,equivalence class EC 2and EC 3of the original dataset merge into EC 2’after the update.With the Tid-tree,two major maintenance computational tasks of TRUM are accomplished in one step as we remove Tids from the Tid-tree.Since the Tid linked list can only be removed one by one,the computational complexity of TRUM is O (|D dec |),where |D dec |denotes the size of the decremental dataset.TRUM is much more computationally effective,compared to previous works,like[8,13],whose computational complexity is O (N F P ),where N F P refers to the number of frequent patterns.This is because O (|D dec |) N F P .4.2Limitations and ExtensionsTRUM is developed under the setting where minimum support threshold ms is defined in counts.This definition of ms is used in applications like [14].But in some other applications,ms may be defined in percentages.In such a case,the actual support (in absolute count)of a pattern for satisfying the ms threshold (in percentage)drops after some transactions are removed.Thus new frequent patterns may emerge.So TRUM cannot be directly applied.Nonetheless,this problem can be solved by extending the Tid-tree.9Instead of storing only frequent equivalence classes,whose supports are abovethe percentage threshold x%,we also include equivalence classes,whose supportsare above(x− )%,in the Tid-tree.In this way,we actually build a“buffer”inthe Tid-tree,which contains a group of infrequent equivalence classes that arelikely to become frequent after some transactions are removed.This means that,so long as the total number of deletions does not exceed|D org|× %(|D org|is the size of D org),all the“new”equivalence classes that may emerge are alreadykept in the“buffer”of the extended Tid-tree.With the extended Tid-tree,TRUMcan now be employed for multiple rounds of decremental maintenance,as longas the accumulated amount of deletion is less than|D org|× %.As the amount of deletion gets close to this limit,we re-execute the discovery algorithm and rebuild the buffer.The size of the %buffer can be adjusted based on specific application requirements.5Experimental StudiesExtensive experiments were performed to evaluate the proposed algorithm. TRUM was tested using several benchmark datasets from the FIMI Reposi-tory,http://fimi.cs.helsinki.fi.Due to space constraints,only the results of T10I4D100K,mushroom and gazelle are presented in this paper.These datasets form a good representative of both synthetic and real datasets.We varied two parameters in our experiments:minimum support ms and update interval.For each employed ms,we preformed multiple execution of the algorithm,where each execution employed a different update interval.Moreover, the performance of the algorithm varies slightly when different sets of transac-tions are removed.To have a stable performance measure,for each update inter-val,5random sets of transactions were employed,and the average performance of the algorithm was recorded.The experiments were run on a PC with2.8GHz processor and2GB main memory.To justified the effectiveness of the proposed algorithm,we compared its per-formance against some state-of-art frequent pattern discovery and maintenance algorithms.These algorithms includes ZIGZAG[13],FpClose[9]and GC-growth [11].ZIGZAG is one of the most recently proposed algorithms,which also ad-dresses the maintenance of frequent patterns when transactions are removed.It outperforms most of the previous works.On the other hand,FpClose,according to our knowledge,is the fastest algorithm for closed pattern mining.GC-growth is the only algorithm that generates frequent equivalence classes.Results of the performance comparison is presented in Figure5.We observe that TRUM outperforms ZIGZAG by at least an order of magni-tude over all update intervals.The advantage of the proposed algorithm is most obvious in mushroom dataset.For mushroom dataset,TRUM,on average,out-performs ZIGZAG200times.It is measured that,for both T10I4D100K and gazelle,TRUM achieves around80and20times average speed-up.TRUM is also more effective compared to re-discovering all patterns using FpClose and GC-growth.E.g.TRUM is,on average,30times faster than FpClose10Fig.5.Average run time comparison of ZIGZAG,FpClose,GC-growth and TRUM.Fig.6.Speed-up achieved by TRUM against FpClose over various ms thresholds. and100times faster than GC-growth for T4I10D100K dataset.However,we also observe that as the size of the removed transactions increases,the advantage of TRUM diminishes.This is because,corresponding to the complexity analysis,the execution time of TRUM increases as more transactions are removed.In contrast, due to the shrinkage of data size,the execution time of re-discovery approaches drops when more transactions are bining these two effects,it is logical that the speed-up gained by our maintenance approach diminishes as the size of removed transactions goes up.The performance of the proposed algorithm was also evaluated under different support thresholds ms.The results are presented in Figure6.It demonstrates that TRUM remains effective compared to FpClose over a wide range of minimum support thresholds.Nevertheless,the achieved speed-up drops slightly for higher ms thresholds.When ms is high,the frequent pattern space becomes smaller, which makes the discovery process much easier.As a result,the advantage of TRUM becomes less obvious.6Closing RemarksThis paper has investigated how the space of frequent patterns,equivalence classes,closed and key patterns will evolve when transactions are removed from a given dataset.It was shown that the equivalence classes can evolve in three ways:(1)remain unchanged with the same support value,(2)remain unchanged with decreased support value,and(3)grow by merging with others.Based the evolution analysis,an effective maintenance algorithm TRUM is proposed.TRUM maintains the frequent pattern space in a divide-and-conquer manner using the11。