The AgentComponent Approach, Combining Agents And Components
屠呦呦英语作文
Tu Youyou is a renowned Chinese pharmacologist and researcher,who has made significant contributions to the field of medicine.She is best known for her discovery of artemisinin,a drug that has saved millions of lives by effectively treating malaria.Heres an English essay about her life and achievements:Title:The Life and Legacy of Tu YouyouIntroduction:Tu Youyou,born in Ningbo,Zhejiang Province,China,in1930,has become a symbol of dedication and innovation in the scientific community.Her journey from a curious student to a Nobel laureate is a testament to her unwavering commitment to research and the betterment of human health.Early Life and Education:Tu Youyous interest in traditional Chinese medicine was sparked at an early age, influenced by her father,who was a scholar of Chinese classics.She pursued her passion by enrolling at the Peking Union Medical College,where she graduated with a degree in pharmaceuticals in1955.Her education laid a solid foundation for her future work in the field of medicine.Career and Research:After graduation,Tu Youyou joined the China Academy of Chinese Medical Sciences, where she began her research on traditional Chinese herbal medicine.Her focus on finding a cure for malaria led her to explore ancient texts and folk remedies.Through rigorous experimentation and analysis,she discovered artemisinin in1972,a compound derived from the sweet wormwood plant Artemisia annua that proved to be a potent antimalarial agent.Discovery of Artemisinin:The discovery of artemisinin was a breakthrough in the treatment of malaria,a disease that had long plagued humanity.Tu Youyous innovative approach to combining traditional knowledge with modern scientific methods resulted in a drug that is now the standard treatment for malaria worldwide.Recognition and Awards:Tu Youyous work did not go unnoticed.In2011,she was awarded the LaskerDeBakey Clinical Medical Research Award for her contributions to the treatment of malaria.The pinnacle of her recognition came in2015when she was awarded the Nobel Prize in Physiology or Medicine,making her the first Chinese Nobel laureate in physiology or medicine.This award was shared with William C.Campbell and SatoshiŌmura for theirrespective contributions to parasitic disease treatments.Legacy and Impact:Tu Youyous legacy extends beyond her scientific achievements.She has inspired a generation of researchers to delve into traditional medicine with a scientific mindset, fostering a bridge between ancient wisdom and modern medical practices.Her work has saved countless lives and continues to influence the development of new treatments for various diseases.Conclusion:Tu Youyous story is one of perseverance,innovation,and the power of combining different knowledge systems for the greater good.Her life serves as an inspiration to scientists and researchers worldwide,reminding us of the potential that lies in the intersection of tradition and modernity.Final Thoughts:As we reflect on the life and work of Tu Youyou,we are reminded of the importance of curiosity,dedication,and the pursuit of knowledge.Her contributions to medicine will be remembered for generations to come,and her spirit of inquiry will continue to inspire those who seek to improve the human condition.。
优固洁管道疏通剂作用原理
优固洁管道疏通剂作用原理The principle of action of the YOUGUJIE pipeline dredge agent is mainly based on the composition of the product. 优固洁管道疏通剂的作用原理主要是基于产品的成分组成。
The product contains a variety of chemical agents that work together to dissolve and break down the buildup inside the pipes. 该产品含有多种化学成分,这些成分共同作用来溶解和分解管道内的堵塞物。
These agents can include powerful solvents, surfactants, and enzymes that target different types of blockages such as grease, hair, soap scum, and food particles. 这些成分包括强效溶剂、表面活性剂和酶类,可以针对油脂、头发、肥皂渍和食物颗粒等不同类型的堵塞物。
When poured into the pipes, the agents react with the blockages, breaking them down into smaller particles that can be easily flushed out with water. 当倒入管道中时,这些成分会与堵塞物发生反应,将其分解成较小的颗粒,便于用水冲洗排除。
In addition, the agents also have a lubricating effect, which helps to reduce friction and allow for smoother flow of water and waste through the pipes. 此外,这些成分还具有润滑作用,有助于减少摩擦,使水和废物在管道中更顺畅地流动。
抗菌英文专业名词
抗菌英文专业名词Antimicrobial TerminologyAntimicrobial agents are substances that inhibit or destroy the growth of microorganisms such as bacteria, fungi, viruses, and parasites. These agents play a crucial role in the prevention and treatment of infectious diseases, contributing to improved public health and medical outcomes. Understanding the terminology associated with antimicrobials is essential for healthcare professionals, researchers, and the general public to effectively communicate and comprehend the complexities of this field.One of the primary terms in antimicrobial terminology is "antibiotic." Antibiotics are a specific class of antimicrobial agents that are derived from natural or synthetic sources and are effective against bacteria. They work by disrupting various cellular processes in bacteria, such as cell wall synthesis, protein synthesis, or DNA replication, ultimately leading to the death or inhibition of bacterial growth. Examples of commonly used antibiotics include penicillin, cephalosporins, and fluoroquinolones.Another important term is "antiviral," which refers to antimicrobialagents that target and inhibit the replication of viruses. These agents may interfere with various stages of the viral life cycle, such as attachment to host cells, entry, uncoating, replication, or release of new viral particles. Antiviral drugs, such as oseltamivir (Tamiflu) and acyclovir, are used to treat and prevent viral infections, including influenza and herpes simplex virus infections.The term "antifungal" is used to describe antimicrobial agents that are effective against fungi, which are eukaryotic microorganisms. Antifungal agents can target various aspects of fungal biology, such as cell membrane integrity, cell wall synthesis, or ergosterol biosynthesis, which is an essential component of fungal cell membranes. Examples of antifungal drugs include fluconazole, itraconazole, and amphotericin B, which are used to treat fungal infections such as candidiasis and aspergillosis.Another category of antimicrobial agents is "antiparasitic," which refers to agents that target and eliminate parasitic organisms, such as protozoa, helminths, and ectoparasites. These agents may interfere with the life cycle, metabolism, or specific cellular processes of the parasites, leading to their elimination or control. Antiparasitic drugs, such as ivermectin and praziquantel, are used to treat diseases caused by parasitic infections, including malaria, leishmaniasis, and schistosomiasis.The term "antimicrobial resistance" (AMR) is a crucial concept in the field of antimicrobial agents. AMR refers to the ability of microorganisms to withstand the effects of antimicrobial agents, rendering them less effective or even ineffective in treating infections. This phenomenon can arise from various mechanisms, such as the production of enzymes that inactivate antimicrobial agents, the modification of target sites, or the development of efflux pumps that expel the antimicrobial agents from the microbial cells. AMR is a global public health concern, as it can lead to the emergence of untreatable infections and the need for the development of new antimicrobial agents.Another important term is "stewardship," which refers to the responsible and prudent use of antimicrobial agents to optimize their effectiveness, minimize the development of antimicrobial resistance, and ensure the safety of patients. Antimicrobial stewardship programs are implemented in healthcare settings to promote the appropriate use of antimicrobial agents, monitor antimicrobial resistance patterns, and provide guidance to healthcare professionals on the optimal selection, dosing, and duration of antimicrobial therapy.In the context of antimicrobial agents, the term "spectrum of activity" refers to the range of microorganisms that a particular antimicrobial agent is effective against. Broad-spectrum antimicrobial agents areeffective against a wide range of microorganisms, including both Gram-positive and Gram-negative bacteria, as well as some fungi and viruses. In contrast, narrow-spectrum antimicrobial agents are effective against a more limited range of microorganisms, often targeting specific bacterial species or groups.The term "bacteriostatic" is used to describe antimicrobial agents that inhibit the growth and multiplication of bacteria without necessarily causing their death, while "bactericidal" refers to antimicrobial agents that actively kill bacteria. The choice of a bacteriostatic or bactericidal agent depends on the specific clinical situation, the type of infection, and the desired therapeutic outcome.In the field of antimicrobial agents, the term "synergy" is used to describe the enhanced antimicrobial activity that can be achieved by combining two or more antimicrobial agents. Synergistic interactions can lead to increased antimicrobial potency, broader spectrum of activity, or reduced development of resistance. Conversely, the term "antagonism" refers to the reduced antimicrobial activity that can occur when certain antimicrobial agents are used in combination.The concept of "minimum inhibitory concentration" (MIC) and "minimum bactericidal concentration" (MBC) are also important in antimicrobial terminology. The MIC is the lowest concentration of an antimicrobial agent that is able to inhibit the visible growth of amicroorganism, while the MBC is the lowest concentration that is able to kill the microorganism. These values are used to guide the selection and dosing of antimicrobial agents in clinical practice.In conclusion, the terminology associated with antimicrobial agents is vast and complex, reflecting the multifaceted nature of this field. Understanding these terms is crucial for healthcare professionals, researchers, and the general public to effectively communicate, comprehend, and apply the principles of antimicrobial therapy in the prevention and treatment of infectious diseases.。
人工智能英文课件
Supervised learning is a type of machine learning where the algorithm is provided with labeled training data The goal is to learn a function that maps input data to desired outputs based on the provided labels Common examples include classification and regression tasks
Deep learning is a type of machine learning that uses neural networks with multiple layers of hidden units to learn complex patterns and representations from data It is based on biomimetic neural networks and self-organizing mapping networks.
Machine translation is the process of automatically translating text or speech from one language to another using computer algorithms and language data banks This technology has identified the need for human translators in many scenarios
Some challenges associated with deep learning include the requirement for large amounts of labeled data, the complexity of explaining the learned patterns or representations, and the potential for overflow or poor generalization to unseen data
The International Journal of Advanced Manufacturing Technology
Ping LouÆZu-de ZhouÆYou-Ping ChenÆWu AiStudy on multi-agent-based agile supply chain management Received:23December2002/Accepted:23December2002/Published online:5December2003ÓSpringer-Verlag London Limited2003Abstract In a worldwide network of suppliers,factories, warehouses,distribution centres and retailers,the supply chain plays a very important role in the acquisition, transformation,and delivery of raw materials and products.One of the most important characteristics of agile supply chain is the ability to reconfigure dynami-cally and quickly according to demand changes in the market.In this paper,concepts and characteristics of an agile supply chain are discussed and the agile supply chain is regarded as one of the pivotal technologies of agile manufacture based on dynamic alliance.Also,the importance of coordination in supply chain is emphas-ised and a general architecture of agile supply chain management is presented based on a multi-agent theory, in which the supply chain is managed by a set of intelli-gent agents for one or more activities.The supply chain management system functions are to coordinate its agents.Agent functionalities and responsibilities are de-fined respectively,and a contract net protocol joint with case-based reasoning for coordination and an algorithm for task allocation is presented.Keywords Agile supply chainÆMulti-agent systemÆCoordinationÆCBRÆContract net protocol1IntroductionAdvanced technology and management are constantly being adopted to improve an enterpriseÕs strength and competitive ability in order to achieve predominance among hot global competition.In a report on21st century manufacturing strategy development,the author suggests that various production resources,including people,funds,technology and facilities should be inte-grated and managed as a whole;thus optimising the utilisation of resources and taking full advantage of advanced manufacturing technology,information tech-nology,network technology and computer[1].Agile manufacture based on dynamic alliance is coming into being so that enterprises can remain competitive in a constantly changing business environment and is becoming a main competitive paradigm in the interna-tional market.Agility,which has basically two mean-ings:flexibility and reconfigurability,has become a very important characteristic of a modern manufacturing enterprise.Flexibility is an enterpriseÕs ability to make adjustments according to customersÕneeds.Reconfigu-rability is the ability to meet changing demands[2,3].The ability to quickly respond to marketÕs changes, called agility,has been recognised as a key element in the success and survival of enterprises in todayÕs market.In order to keep up with rapid change,enterprises need to change traditional management in this hot competition. Through dynamic alliance,enterprises exert predomi-nance themselves,cooperate faithfully with each other, and compete jointly so as to meet the needs of the fluctuating market,andfinally achieve the goal of win-win[2,3].So how to improve agility in the supply chain, namelyflexibility and reconfigurability,is one of the important factors to win against the competition.Supply chain management(SCM)is an approach to satisfy the demands of customers for products and ser-vices via integrated management in the whole business process from raw material procurement to the product or service delivery to customers.In[4],M.S.Fox et al. describe the goals and architecture of integrated supply chain management system(ISCM).In this system,each agent performs one or more supply chain management functions,and coordinates its decisions with other rele-vant agents.ISCM provides an approach to the real timeInt J Adv Manuf Technol(2004)23:197–203 DOI10.1007/s00170-003-1626-xP.Lou(&)ÆZ.ZhouRoom107,D8Engineering Research Center of Numerical Control System,School of Mechanical Science&Engineering, Huazhong University of Science&Technology, 430074Wuhan,Hubei,P.R.ChinaE-mail:louping_98@Y.-P.ChenÆW.AiSchool of Mechanical Science and Engineering, Huazhong University of Science and Technology, 430074Wuhan,Hubei,P.R.Chinaperformance of supply chain function.The integration of multi-agent technology and constraint network for solving the supply chain management problem is pro-posed[6].In[7],Yan et al.develop a multi-agent-based negotiation support system for distributed electric power transmission cost allocation based on the networkflow model and knowledge query&manipulation language (KQML).A KQML based multi-agent coordination language was proposed in[8,9]for distributed and dy-namic supply chain management.However,the coordi-nation mechanisms have not been formally addressed in a multi-agent-based supply chain.In most industries, marketing is becoming more globalised,and the whole business process is being implemented into a complex network of supply chains.Each enterprise or business unit in the SCM represents an independent entity with conflicting and competing product requirements and may possess localised information relevant to their interests.Being aware of this independence,enterprises are regarded as autonomous agents that can decide how to deploy resources under their control to serve their interests.This paperfirst introduces concepts and characteris-tics of agile supply chains and emphasises the impor-tance of coordination in supply chain.Then,it presents an architecture of agile supply chain based on a multi-agent theory and states the agentsÕfunctions and responsibilities.Finally,it presents a CBR contract net protocol for coordination and the correlative algorithm for task allocation in multi-agent-based agile supply chains.2Agile supply chainA supply chain is a network from the topologic structure which is composed of autonomous or semi-autonomous enterprises.The enterprises all work together for pro-curement,production,delivery,and so on[10].There is a main enterprise in the supply chain that is responsible for configuring the supply chain according to the de-mand information and for achieving supply chain value using fundflow,materialflow and informationflow as mediums.There are three discontinuous buffers to make the materialflowfluently and satisfy the change in the demand.On the one hand,as every enterprise manages inventory independently,plenty of funds are wasted.As the demand information moves up-stream,the forecast is inaccurate and the respond to the change in demand is slow[11].Accordingly,the key method for competi-tiveness is improving and optimising supply chain management to achieve integrated,automated,and agile supply chain management and to cut costs in the supply chain.To optimise supply chain management and coordi-nate the processes for materialflow,fundflow and informationflow,it is necessary to make materialflow fluent,quickly fund turnover and keep information integrated.Prompt reconfiguration and coordination is an important characteristic of agile supply chain according to dynamic alliance compositing and de-compositing(enterprise reconfiguration).Agile supply chain management can improve enterprise reconfiguring agility.The agile supply chain breaks through the tra-ditional line-style organizational structure.With net-work technology an enterprise group is formed by a cooperative relationship which includes an enterprise business centre,a production design centre,a supplier,a distribution centre,a bank,a decision-making centre, etc.It reduces the lead time to the market to satisfy customer demand.Agile supply chain without temporal and spatial limits promptly expands the enterprise scale,marketing share and resource by allied enterprise.So,a key factor of the agile supply chain is to integrate heterogeneous information systems adopted in various enterprises.The integration information system can provide marketing information and supplier details.Feasible inventory, quantity and cycle of replenished stock,delivery,etc.is designed using the shared information.It is evident that agile supply chain is a typical distributed system.A multi-agent system(MAS)which is characterised byflexibility and adaptability is suit-able for an open and dynamic environment.Thus MAS is a good method for agile supply chain man-agement.3The concept of agents and MASSome people define an agent as any piece of software or object which can perform a specific given task.Presently the prevailing opinion is that an agent must exhibit three important general characteristics:autonomy,adapta-tion,and cooperation[8,12,13].Autonomy means that agents have their own agenda of goals and exhibit goal-directed behaviour.Agents are not simply reactive,but can be pro-active and take initiatives as they deem appropriate.Adaptation implies that agents are capable of adapting to the environment,which includes other agents and human users,and can learn from the expe-rience in order to improve themselves in a changing environment.Cooperation and coordination between agents are probably the most important feature of MAS. Unlike those stand-alone agents,agents in a MAS col-laborate with each other to achieve common goals.In other words,these agents share information,knowledge, and tasks among themselves.The intelligence of MAS is not only reflected by the expertise of individual agents but also exhibited by the emerged collective behaviour beyond individual agents.Of course various agents have different functions,but some functions are needed for each agent.A generic structure of agents that includes two parts is presented:agent kernel and function mod-ule.Figure1exhibits the generic structure of agents which is a plug-in model.In Fig.1,the generic agent includes the following components:198The mailbox handles communication between one agent and the other agents.The message handler processes incoming message from the mailbox,orders them according to priority level,and dispatches them to the relevant components of the agent.The coordination engine makes decisions concerning the agent Õs goals,e.g.how they should be pursued,when to abandon them,etc.,and sends the accepted tasks to the planner/scheduler.It is also responsible for coordi-nating the agents Õinteractions with other agents using coordination protocols and strategies.The planner and scheduler plans the agent Õs tasks on the basis of decisions made by the coordination engine and on resources and task specifications available to the agent.If not,a message is sent to the coordination en-gine for finding extra resources.The blackboard provides a shared work area for exchanging information,data,and knowledge among function modules.Every function module is an inde-pendent entity.These function modules execute con-currently by the control of planner/scheduler and collaborate through the blackboard.The acquaintance database describes one agent Õs relationships with other agents in the society,and its beliefs about the capabilities of those agents.The coor-dination engine uses information contained in this database when making collaborative arrangements with other agents.The resource database reserves a list of resources (referred to in this paper as facts)that are owned by and available to the agent.The resource database also sup-ports a direct interface to external systems,which allows the interface to dynamically link and utilise a proprie-tary database.The ontology database stores the logical definition of each fact type—its legal attributes,the range of legal values for each attribute,any constraints betweenattribute values,and any relationship between the attributes of that fact and other facts.The task/plan database provides logical descriptions of planning operators (or tasks)known to the agent.4Multi-agent-based agile supply chain management Multi-agent-based agile supply chain management per-forms many functions in a tightly coordinated manner.Agents organise supply chain networks dynamically by coordination according to a changing environment,e.g.exchange rates go up and down unpredictably,customers change or cancel orders,materials do not arrive on time,production facilities fail,etc.[2,14].Each agent performs one or more supply chain functions independently,and each coordinates his action with other agents.Figure 2provides the architecture of multi-agent-based agile supply chains.There are two types of agents:functional agents and mediator agents.Functional agents plan and/or control activities in the supply chain.Mediator agents play a system coordinator role s by promoting coopera-tion among agents and providing message services.Mediator agents dispatch the tasks to the functional agents or other mediator agents,and then those func-tional or mediator agents complete the tasks by coordi-nation.All functional agents coordinate with each other to achieve the goals assigned by mediator agents.The mediator-mediator and mediator-agent communication is asynchronous,and the communication mode can be point-to-point (between two agents),broadcast (one to all agents),or multicast (to a selected group of agents).Messages are formatted in an extended KQML format.The architecture is characterised by organizational hier-archy and team spirit,simplifying the organisational architecture and reducing the time needed to fulfil the task.The rest of this section briefly describes each of the mediator agents underdevelopment.Fig.1Generic structures of agents199–Customer mediator agent:This agent is responsible for acquiring orders from customers,negotiating with customers about prices,due dates,technical advisory,etc.,and handling customer requests for modifying or cancelling respective orders,then sending the order information to a scheduling mediator agent.If a customer request needs to be re-designed,the infor-mation is sent to a design mediator agent,then to a scheduling mediator agent.–Scheduling mediator agent:This agent is responsible for scheduling and re-scheduling activities in the fac-tory,exploring hypothetical ‘‘what-if’’scenarios for potential new orders,and generating schedules that are sent to the production mediator agent and logis-tics mediator agent.The scheduling agent also acts as a coordinator when infeasible situations arise.It has the capability to explore tradeoffs among the various constraints and goals that exit in the plant.–Logistics mediator agent:This agent is responsible for coordinating multi-plans,multiple-supplier,and the multiple-distribution centre domain of the enterprise to achieve the best possible results in terms of supply chain goals,which include on-time delivery,cost minimisation,etc.It manages the movement of products or materials across the supply chain from the supplier of raw materials to the finished product customer.–Production mediator agent:This agent performs the order release and real-time floor control functions as directed by the scheduling mediator agent.It monitors production operation and facilities.If the production operation is abnormal or a machine breaks down,this agent re-arranges the task or re-schedules with the scheduling mediator agent.–Transportation mediator agent:This agent is responsible for the assignment and scheduling of transportation resources in order to satisfy inter-plant movement specified by the logistics mediator agent.It is able to take into account a variety oftransportation assets and transportation routes in the construction of its schedules.The goal is to send the right materials on time to the right location as assigned by the logistics mediator agent.–Inventory mediator agent:There are three invento-ries at the manufacturing site:raw product inven-tory,work-in-process inventory,and finished product inventory.This agent is responsible for managing these inventories to satisfy production requirements.–Supplier mediator agent:This agent is responsible for managing supplier information and choosing suppli-ers based on requests in the production process.–Design mediator agent:This agent is responsible for developing new goods and for sending the relevant information to the scheduling mediator agent for scheduling,as well as to the customer mediator agent for providing technological advice.5Coordination in a multi-agent-based agile supply chainCoordination has been defined as the process of man-aging dependencies between activities [15].One impor-tant characteristic of an agile supply chain is the ability to reconfigure quickly according to change in the envi-ronment.In order to operate efficiently,functional entities in the supply chain must work in a tightly coordinated manner.The supply chain works as a net-work of cooperating agents,in which each performs one or more supply chain functions,and each coordinates its action with that of other agents [5].Correspondingly,a SCMS transforms to a MAS.In this MAS,agents may join the system and leave it according to coordinating processes.With coordination among agents,this MAS achieves the goal of ‘‘the right products in the right quantities (at the right location)at the right moment at minimalcost’’.Fig.2An architecture of multi-agent based agile supply chain management2005.1Contract net protocol combined withcase-based reasoningThe contract net is a negotiation protocol(CNP)pro-posed by Smith[15].In the CNP,every agent is regarded as a node,such as a manager or a contractor.The manager agent(MA)is responsible for decomposing, announcing,and allocating the task and contractor agent(CA)is responsible for performing the task.This protocol has been widely used for multi-agent negotia-tion,but it is inefficient.For this reason,contract net protocol is combined with case-based reasoning(CBR).In case-based reasoning(CBR),the target case is defined as problem or instance which is currently being faced,and the base case is problem or instance in the database.CBR searches the base case in the database under the direction of the target case,and then the base case instructs the target case to solve the problem.This method is efficient.But at the very beginning,it is very difficult to set up a database which includes all problems solving cases.The cases may be depicted as follows:C¼\task;MA;taskÀconstraint;agentÀset> Here,MA is task manager.Task-constraint repre-sents various constraint conditions for performing the task,depicted as a vector{c1,c2,c3,...,c m}.Agent-set is a set of performing the task as defined below:Agent set¼\sub task i;agent id;cost;time;resource>f gtask¼[ni¼1sub task iIn the supply chain,the same process in which a certain product moves from the manufacturer to the customer is performed iteratively.So,case-based rea-soning is very efficient.Consequently,combining con-tract net protocol with CBR could avoid high communicating on load,thus promoting efficiency.The process can be depicted as follows(Fig.3).5.2The algorithm for task allocation baseon CBR contract net protocolThere are two types of agents in the supply chain, cooperative and self-interested agents.Cooperative agents attempt to maximise social welfare,which is the sum of the agents utilities.They are willing to take individual losses in service of the good of the society of agents.For example,function agents come from the same enterprise.In truth,the task allocation among cooperative agents is combinational optimisation prob-lem.Self-interested agents seek to maximise their own profit without caring about the others.In such a case,an agent is willing to do other agentsÕtasks only for com-pensation[16].Function agents,for example,come from different enterprises.In the following section the algorithm for task allo-cation among self-interested agents based on CBR contract net protocol will be addressed.Before describ-ing the algorithm,there are some definitions that must be clarified:Task—A task which is performed by one agent or several agents together:T=<task,reward,con-straints>,where task is the set of tasks(task={t1,t2,..., t m}),reward is the payoffto the agents that perform the task(reward={r1,r2,...,r m}),and constraints refer to the bounded condition for performing the task(con-straints={c1,c2,...,c n}).Agent coalition(AC)—A group of agents that per-form task T,described as a set AC={agent i,i=1,2,...,n}.Efficiency of agent—Efficiency of an agent i is de-scribed as follows:E i¼rewardÀcostðÞ=costð1Þwhere reward is the payoffto the agent performing task T,and cost refers to that spend on performing the task. If agent i is not awarded the task,then E i=0.Efficiency of agent coalition—E coalition¼rewardÀX micost iÀh!,X micost iþh!ð2Þwhere reward is the payoffof the agent coalition per-forming task T;cost i refers to that spend on performing task t i;and h is the expense on forming coalition,which is shared by the members of the coalition.If the coalition is not awarded task T,then E coalition<=0.6Algorithm:1.After MA accepts the task T=<task,reward,constraint>(task is decomposable),then it searches the database.2.If itfinds a corresponding case,it assigns the task orsubtask to the related agents according to the case, and the process is over3.If no case is found,then the task T is announced toall relevant agents(agent i,i=1,2,...n).4.The relevant agents make bids for the task accord-ing to their own states and capabilities.Thebid Fig.3CBR contract net process201from agent i can be described as follows:Bid i =<agentid i ,T i ,price i ,condition i >,where i ex-presses the bidding agent (i =1,2,...,h );agentid i is the exclusive agent identifier;T i is the task set of agent i Õs fulfilment;price i is the recompense of agent i fulfilling the task T i ;and condition i is the constraint conditions for agent i to fulfil the task T i .5.If [1 i h&T i then the task T can not be performed.Otherwise MA makes a complete combination of the agents,namely to form a number of agent coalitions (or agent sets,amounting to N =2h )1).6.First MA deletes those agent coalitions where no agents are able to satisfy the constraint condition.Next the rest of the coalitions are grouped by the number of agents in coalitions and put into set P (P ={P 1,P 2,...,P h })in order of the minimum re-compense increase of the coalitions,where P i is the set of agent coalitions,including i agents.7.MA puts the first coalition from each group P i(i =1,2,...,h )into set L ,and if L is null then it returns to (10),otherwise it calculates the minimum re-compense of each coalition as follows:Min Pm iprice i ÃT is :t :P h i ¼1T i TP m icondition i constraitThen it searches for the minimal agent coalition AC min from the set L .8.MA sends the AC min to the relevant agents,namely MA requests that these agent fulfil the task to-gether.The relevant agents calculate the E coalition and E i according to Eqs.1and 2.IfE coalition !max miE i ,then all agents in the AC minaccept the proposal to form a coalition to perform the task T together.MA assigns the task to the AC min ,and the process is over.Otherwise it deletes the AC min from P i and returns to (7).9.If the relevant agents accept the task or subtask,then MA assigns the task to them.The process is over.If some agents cannot accept the subtask and the stated time is not attained,then it returns to (3),otherwise it returns to (10).10.The process is terminated (namely the task cannotbe performed).After all processes have been completed,case-based maintenance is required to improve the CBR.Thus efficiency is continuously promoted.6.1An example–A simple instantiation of a supply chain simulation is presented here and the negotiating process among agents is shown.In this supply chain instantiation,thetransportation mediator agent (TMA)has a transporttask T ,in which it has to deliver the finished product to the customer within 15units of time and must pay 1500monetary units for it,that is T =<t ,1500,15>.Four transport companies can perform task T .Each company is an autonomous agent,that is four agents,agent A,agent B,agent C and agent D.So the TMA announces the task T to the four agents.Then the four agents make a bid for the task T as shown in Table 1.–So the four agents can form 24)1coalitions (see Fig.4),which are put into set P .Cooperation between agents in the coalition requires expense and the ex-pense for forming the coalition increases with the growth of in coalition size.This means that expanding the coalition may be non-beneficial.The expense of each agent in forming a coalition h is 100.First,the coalitions in which no agents can satisfy the constraint conditions are deleted from the set P .The rest of the coalitions are grouped by the number of agents in the coalition and ordered according to the recompense of each group that was increased due to the coalition,namely P 1={B},P 2={{A,B},{A,C},{B,C},{A,D},{B,D}},P 3={{A,B,C},{A,B,D},{B,C,D}},P 4={{A,B,C,D}}.Then the cost and efficiency of coalition {B},{A,C}and {A,B,C}are calculated as follows:Price f A ;B g ¼Min ð800x 1þ1200x 2Þs :t :20x 1þ12x 2 15x 1þx 2!1x 1!0:x 2!0Price f A ;B ;C g ¼Min ð800y 1þ1200y 2þ2000y 3Þs :t :20y 1þ12y 2þ5y 3 15y 1þy 2þy 3!1y 1!0:y 2!0;y 3!Fig.4Agent coalition graphTable 1The bids of four agents Agent Id Price Conditions Agent A 80020Agent B 120012Agent C 20005AgentD25003202the following result can be obtained:Price{B}=1200; x1=0.3750,x2=0.6250,Price{A,B}=1050;and y1= 0.3750,y2=0.6250,y3=0.The above result shows that agent B does not attend the coalition{A,B,C},that is both agent B and coalition{A,B}can fulfill the task and satisfy the constraint conditions.According to Eqs.1 and2,E A,E B,E{A,B}:E A=0(because TMA does not assign the task to A.),E B=(1500)1200)/1200=0.25, E{A,B}=(1500)1050)2*100)/(1050+2*100)=0.2can be obtained.Because of E{A,B}<max{E A,E B},agent B does not agree to form a coalition.Therefore,the TMA se-lects agent B to fulfil the task.7ConclusionsIn this paper,the concept and characteristics of agile supply chain management are introduced.Dynamic and quick reconfiguration is one of important characteristics of an agile supply chain and agile supply chain man-agement is one of the key technologies of agile manu-facturing based on dynamic alliances.As agile supply chain is a typical distributed system,and MAS is effi-cient for this task.In the architecture of agile supply chain management, the supply chain is managed by a set of intelligent agents that are responsible for one or more activities.In order to realise the agility of supply chains,coordination amongst agents is very important.Therefore,it can be suggested that contract net protocol should be combined with case-based reasoning to coordinate among agents. Acknowledgement The authors would like to acknowledge the funding support from the National Science Fund Committee (NSFC)of China(Grant No.5991076861).References1.Goldman S,Nagel R,Preiss K(1995)Agile competitors andvirtual organization.Van Nostrsand Reinhold,New York, pp23–32,pp158–1662.Yusuf YY,Sarhadi M,Gunasekaran A(1999)Agile manu-facturing:the drivers,concepts and attributes.Int J Prod Eng 62:33–433.Gunasekaran A(1999)Agile manufacturing:A framework forresearch and development.Int J Prod Eng62:87–1054.Fox MS,Chionglo JF,Barbuceanu M(1992)Integrated chainmanagement system.Technical report,Enterprise Integration Laboratory,University of Toronto5.Shen W,Ulieru M,Norrie DH,Kremer R(1999)Implementingthe internet enabled supply chain through a collaborative agent system.In:Proceedings of agentsÔ99workshop on agent-based decision support for managing the internet-enabled supply-chain,Seattle,pp55–626.Sandholm TW,Lesser VR(1995)On automated contracting inmulti-enterprise manufacturing.Advanced Systems and Tools, Edinburgh,Scotland,pp33–427.Beck JC,Fox MS(1994)Supply chain coordination via medi-ated constraint relaxation.In:Proceedings of thefirst Canadian workshop on distributed artificial intelligence,Banff,Alberta, 15May19948.Chen Y,Peng Y,Finin T,Labrou Y,Cost R,Chu B,Sun R,Willhelm R(1999)A negotiation-based multi-agent system for supply chain management.In:Working notes of the ACM autonomous agents workshop on agent-based decision-support for managing the internet-enabled supply-chain,4:1–79.Wooldridge M,Jennings NR(1995)Intelligent agents:theoryand practice.Knowl Eng Rev10(2):115–15210.Barbuceanu M,Fox MS(1997)The design of a coordinationlanguage for multi-agent systems.In:Muller JP,Wooldridge MJ,Jennings NR(eds)Intelligent agent III:agents theories, architecture and languanges(Lecture notes in artificial intelligence),Springer,Berlin Heidelberg New York,pp341–35711.Hal L,Padmanabhan V,Whang S(1997)The Bullwhip effect insupply chains.Sloan Manag Rev38(4):93–10212.Yung S,Yang C(1999)A new approach to solve supply chainmanagement problem by integrating multi-agent technology and constraint network.HICASS-3213.Yan Y,Yen J,Bui T(2000)A multi-agent based negotiationsupport system for distributed transmission cost allocation.HICASS-3314.Nwana H(1996)Software agents:an overview.Knowl Eng Rev11(3):1–4015.Smith RG(1980)Contract net protocol:high-level communi-cation and control in a distributed problem solver.IEEE Trans Comput29(12):1104–111316.Barbuceanu M,Fox MS(1996)Coordinating multiple agentsin the supply chain.In:Proceedings of thefifth workshop on enabling technology for collaborative enterprises(WET ICEÕ96).IEEE Computer Society Press,pp134–14117.Jennings NR,Faratin P,Norman TJ,OÕBrien P,Odgers B(2000)Autonomous agents for business process management.Int J Appl Artif Intell14(2):145–1818.Malone TW,Crowston K(1991)Toward an interdisciplinarytheory of coordination.Center for coordination science tech-nical report120,MIT Sloan School203。
假肢与矫形器专业词汇英语
假肢与矫形器专业词汇(英语)abdomen anatomical retainer of the intestinesabdominal related to the abdomenabduct to move (a limb) away from the midline of the bodyabducted gait walking with the legs spread away from the midlinemuscleabductor abductingablatio mammae, mastectomy surgical removal of female breastabove elbow (A.E.) prosthesis prosthesis for transhumeral amputationabove the knee (A.K.) prosthesis prosthesis for transfemoral amputation - (AK)abutment counter piece, counter flare, neckacceleration getting continuously fasteracceleration phase sub-phase in the swing phase of gaitinpelvis, receiving the hip jointsocketacetabulum concaveacetone chemical thinner for laquers and paintsAchilles tendon tendon at distal end of calf muscleacrylic resin thermoplastic resin on acrylic basisacute rapid onset or short duration of a conditionadapter device coupling two different endsadduct to move (a limb) toward the midline of the bodyadductor adducting muscleadductor roll medial-proximally located roll oft soft tissue (TF-prosthetics) adhesion contact socket contact socket, type of suction socketadiposity being too large in abdominal and other circumferences, fat ADL's aids for daily livingadolescent juvenile - phase between childhood and adulthoodadultadolescent youngadult “grown up” - beyond adolescenceaetiology reason or factor causing a diseaseAFO ankle-foot-orthosisagonist muscle being active and result-oriented (opposite:antagaonist) aids for daily living (ADL) tools and devices etc.- modified for the disabledair splint orthoses containing an air chamber to customize fitAK (prosthesis) prosthesis after transfemoral amputationAK-socket above knee (transfemoral) socketalignment assembling O&P components referring to a reference system allergy reaction of the immune system against “foreign” matteralloy a mix of metals, changing the specific characteristics aluminum a light metalambulate / ambulation reciprocal walkingambulator a walking frame, supporting a patient's ambulation amputation surgical removal of a body partamputation surgery surgical act of removing a body segment (extremity) analgesia absence of, or insensitivity to pain sensationanalyse, analysis detailed research on components of a wholeanamnesis background of a diseaseanatomical landmarks (bony) prominences, points of importance in O&Panatomy descriptive or functional explanation of the body properties angularity in the shape of an angleangulus sub-pubicus angle of the pubic ramus, important in IC-socketsjointankle tibio-tarsalankle block connector between prosthetic foot and shinankle joint (talus joint) joint connecting foot and shankankle-foot orthosis (AFO) orthosis with functional impact on ankle and footankylosing to unite or stiffen by ankylosisankylosis immobility, posttraumatic fusion of a jointantagonist muscle opposing agonist action, often controllinganterior in front of, the foremostanteversion to bring (a limb) forward, opposite of retroversion anthropometry taking measurements of the human bodyanti… againstanvil block of iron, surface used in forging metalA-P or a-p antero-posterior, from front to backapex top or summit, the highest point, the peakappliance an instrument, O&P: a prosthesis or orthosis, technical aid application making work or connecting to…learning a professionapprentice somebodyapprentice student learning a profession or craft in a structured approach apprentice student learning a profession or craft in a structured approach apprenticeship (course) training course for vocational educationappropriate best (compromise-) solution for a given problem Appropriate Technology technology appropriate (e.g. for the Third World)arch support shell shell-like custom molded medical shoe insertarteries blood vessels transporting oxygenated blood to the periphery arthritis acute or chronic joint inflammationarthrodesis blocking a joint through surgical procedurearthroplasty reconstruction of a joint through surgical procedure arthrosis, osteoarthritis joint disease - degenerating cartilage and joint surfaceGelenkarticulation Articulatio,aseptic not caused by bacterial infectionASIS / A.S.I.S anterior superior iliac spineassessment evaluation, obtaining information (about a condition) athetosis condition of slow withering movementsathletic arch support custom molded medical shoe insert for the athleteatrophy shrinkage, wastage of biological tissueautonomic nervous system independent nerve tissue, not under voluntary controlaxial rotator joint for socket rotation around the vertical axisback posterior component of the trunkbalance condition of keeping the body stabilized in a desired positionball bearing bearing cage containing rollers, making/keeping axes rotatable ball joint (universal joint) tri-axial jointband, strap, cuff suspension aid (small corset)bandages elastic wrapping, light brace, adhesive wrapping etc.bandaging act of applying bandages, tapingbands m-l connection between orthotic side bars (calf band etc.)bars, side-bars uprights, vertical struts in an orthosisbearing, ball bearing bearing cage containing rollers, making/keeping axes rotatable bed sore pressure/shear related skin trauma of bed-bound individuals below elbow amputation (BE-) forearmamputation (below the elbow joint, transradial, transulnar) below elbow, lower arm arm below the elbow jointbelt suspension component, also light abdominal bandagebench workstation,worktablebench alignment static alignment of prosthetic/orthotic componentsbending providing a shape or contour to sidebars, bands etc.bending iron set of two contouring tools for metal bar bendingbending moment the force or torque bending an objectbending, contouring providing a shape or contour to sidebars, bands etc.BE-prosthesis prosthesis after amputation below the elbow jointbevel to brake an edgebig toe halluxbilateral twosided, double..., relating to “both sides”bio-engineering science of engineering related to living structuresbio-feedback internal autoresponse to a biological eventbiological age the "natural age" - dependent on how a person presentsbiology science related to living structuresbio-mechanics science combining biology and mechanicsbipivotal joint joint with two axesBi-scapular abduction bringing both shoulders forward simultaneously (prosthetic control motion)BK below the kneeBK-prosthesis prosthesis after amputation below the kneeBK-socket below the knee socketblister forming vacuum molding plastic sheet material in a frameblock heels wide basis heelsbody the total appearance of a biological beingbody jacket US-American term for symmetrical spinal orthosesbody powered operated by human power (as opposed to outside energy) bolts machine screw and similarbonding agent connective glue, cement etc.bone single part of the skeletal systembone loss syndrome reduction of bony massbone spur a protrusion of bone or fragment of bonebonification, calcification change into bony tissuebony bridge surgical bony fusion between e.g. tibia and fibulabony landmark anatomically protruding bony surfaces (as the fibula head) bony lock (ischial containment) m-l tight locking design in ischial containment sockets bordering providing a smooth trim line or brimbordering, trimming providing a well-rounded trim line or smooth brimBoston Brace spinal orthosis developed in Boston, USA (scoliosis, kyphosis treatment)bouncy mechanism flexion device for limited flexion in prosthetic kneesbow leg genu varum, o-shaped legs, enlarged distance between knees brace, splint, caliper supportive device, old-fashioned for “orthosis”brain, cerebrum main switch board of the central nervous systembrazing heat supported metal solderingbrazing tool, soldering iron tool for heat supported metal solderingbrim proximal socket area, casting tool / templatebrooch / hook hooks holding a lace, closure of shoes etc.buffing creating a shiny surface finishbuild-up (of a material) location of added plaster in modifications of plaster castsburn heat related injurybursa anatomic padding cavity containing liquidby-law (USA: bill) lawCAD CAM Computer Aided Design, Computer Aided Manufacture cadence rhythm of walkingcalcaneus heelbonecalculation doing mathematical operationscalf band m-l connection between side bars (KAFO)calf corset enclosure of calf and shin (in an orthosis)calf muscle, triceps surae plantar flexor of the foot, muscle in the lower legcaliper measuring tool, precision instrumentcaliper, brace, splint old fashioned term for joint stabilizing lower limb orthoses Canadian Hip Disarticulation Pr. external shell prosthesis for hip disarticulationscane walkingstickcap band finishing element of trim lines, brims of corsetscarbon fiber structural reinforcement in plastic compositescardanic two axes, aligned in 90 degrees toward each othercardio-vascular related to heart and blood circulationcarve shaping by taking material off (chipping off, sanding off)cast positive (plaster or similar) moldcast modification functional changing of the shape of a castcast removal removal of plaster bandage from a poured plaster castcast taking act of taking a plaster- or similar impressioncasters freely moving front wheels at a wheel chaircasting and measurement taking getting 3-dimensional body impressions and measurements casting procedures technique of getting 3-dimensional body impressions caudal direction, toward distal end of the vertebral column (tail)c-clamp clamping tool (woodwork)CDH congenital dislocation of the hipcell (biological and technical) smallest living unit; hollow technical unitcellular made up from cellscelluloid one of the first plastic materials availablecement, glue bonding agentcenter of gravity (COG) mathematic-physical mass concentration in one point center of mass calculated concentration of mass (in bio-mechanics) center of mass (COM) mathematic-physical mass concentration in one point centrode graph for the path of the instantaneous centers of rotation cerebral related to the cerebrum, braincerebral palsy loss of neural muscle control by congenital brain damage cerebral paresis dysfunction of muscle tissue related to cerebral trauma cerebro vascular accident vascular bloodclotting in a part of the brainbraincerebrum thecerebrum / cerebral brain / related to the braincervical related to the neckcervical collar (cervical brace) orthosis for the neck (after whiplash syndrome)cervical spine most proximal segment of the spinal columnchairback brace posterior semi-shell trunk orthosischamfer to thin out the edges of a materialCharcot joint rapid progressive degeneration of a joint (foot)check-, or diagnostic socket transparent or translucent socket for diagnosis of fit chiropedist (Canada) medical doctor specialized in foot careChopart amputation tarsal (partial) foot amputation at the Chopart joint line Chopart joint tarsal joint line of several bones in the footchronic long term (disease; opposite of acute)circumduction semi-circular (mowing) forward swing of a leg circumference the measurment around a physical bodyclam shell design longitudinally split socket or shellclosure mechanism used to closeclub foot, talipes varus pes equino varus, a congenital (or acquired) foot deformity CNC Computer Numeric Controlled design and manufacturing CO cervical orthosis, orthosis for neck immobilizationCO - CP - CPO Certified ... Orthotist..Prosthetist..Prosthetist/Orthotist coating surface cover (as plasticising metal surfaces)coccyx Anatomy: the “tailbone”coefficient of friction number determining forces between sliding surfacescollar cervical orthosis, orthosis for neck immobilization collateral ligaments ligaments bridging the side of jointscompatible fitting to each othercompliance measure of willingness to follow a therapeutic ordercomponents single parts of a whole, construction parts, pre-fab partscomposite reinforced plastic component, matrix and fillercompound result of a chemical binding processcompression panty hose orthotic garment to treat varicosisconcave inwardly shaped, hollow (opposite of convex)condyle massive rounded end of bone, basis for forming a joint surfacewithborncongenital beingconstant friction continuous application of a braking forcecontact cushion distal contact padding in prosthetic socketcontact measuring measuring while touching the object measuredcontact pad contact cushion (prosthetics)continuous passive motion (CPM) keeping a joint mobile through passive motion in motorized device contour (the) the outer perimeter of a bodycontour (to) creating a shape by forming, bendingcontour drawing draft of the outer perimeter of a bodycontracture condition of motion limitation in jointsconvex outwardly shaped, bulged (opposite of concave)cork bark of a tree, natural cellular leight weight materialcoronal plane frontal planecorrection, rectification modification (of shapes, designs etc.) in order to improvecorrosion deterioration of materials by chemical influence (as oxdation)corset therapeutic circular enclosement of body segmentscorset, fabric corset lumbar brace made from textile materialcountersinking taking the edge off a drilled hole, creating circular concavitycoupler a connective devicecoxitis/coxarthritis inflammation of the hip jointCPM, continuous passive motion keeping a joint mobile through passive motion in motorized device CPO Certified Prosthetist / Orthotistcraft & trade European (German) vocational structuring systemcranial relating to the headcrossline filing using a handheld file in a 90 degrees offset directioncruciates, cruciate ligaments crossed ligaments at the knee centerCRW Community based Rehabilitation Worker (WHO Geneva)CT, computer tomography a method to take X-rays in "slices"Orthosis CTLSO Cervico-Thoraco-Lumbo-SacralOrthosisCTO Cervico-Thoracocuff, band, strap suspension aid (small corset)cup, connection cup socket connector in prostheticscure (med.) medical therapeutic measurecure (techn.) to set, hardencushion, pad upholstering device, providing soft surfacecustom made made to measurements as a single unitdeceleration to become continuously slowerdeceleration phase sub-phase in the swing phase of human gaitdecree, directive, regulation text in the lawbooks or regulation with law-like characterdeficiency lack of necessary function or ability by physical impairmentdeflector plate a leaf spring design in prosthetic feet, energy return devicedeformity malformation of form, may be influencing functiondegeneration biological wear and tearDelrin a plastic material, used as a flexible, energy returning keeldensity foaming hard foam block on a socket as a connector to componentsdeposit (biological or pathological) storage mechanism, sedimentdermatitis skin disease, infection of the skinderotating orthosis (scoliosis) orthosis for derotation - one of the priciples of scoliosis treatment design construction, functional lay-out and planningdexterity, manual skill skill of creating by hand, craftsman skilldiabetes mellitus carbohydrate metabolism disorder (frequent amputation reason) diabetic gangrene death of tissue caused by diabetesdiagnosis searching and finding a cause and details of diseasediaphysis shaft of a long bonedimension seize as measureddimensional stability keeping the dimensionsdiplegia paralysis, affecting both sides of the bodydirect socket technique manufacture of a prosthetic socket directly on the amputee's limb directive information or order on how to …..directive, regulation, decree text in the lawbooks or regulation with law-like characterdisability handicap, functional loss of abilitydisabled person a person with a disability, handicapdisabled, handicapped handicapped, having a functional loss of ability"amputation"directly through a joint linedisarticulation thedisc, intervertebral disc intervertebral cartilaginous cushioning elementdislocation joint injury resulting in complete discontiuity of joint surfaces dislocation overstretching or rupture of ligaments, also in combination with fracture doff US-colloquial: do - off = take offdoffing a prosthesis taking off a prosthesiscontrollingdominant leading,don US-colloquial: do - on = put ondonning a prosthesis putting on a prosthesisdonning aid aid to don a prosthesis as pull sock, stockinette, silk tie etc.dorsal related to the dorsum = back, posteriorly locateddorsiflexion lifting the forefoot, correct would be “dorsal extension”, lift of footdraft first drawing of a new ideadrawer effect a-p instability of the knee caused by slack cruciatesdrill (to) to machine a holeDS(L)T Direct Socket (Lamination) TechniqueDUCHENNE's disease severe progressive form of muscular dystrophyDUCHENNE's sign trunk bends lateral toward stance leg during stance phaseDUPUYTREN’sche Kontraktur fibrosis, flexion contracture of fingers into palmstiffnessdurometer hardness,duroplastic resin synthetic resin, not thermoplastic after initial curingdystrophy pathologic loss of muscle massCommunityEC Europeanedema, oedema swelling, high concentration of fluids in the soft tissueelastic capable of recovering form and shape after deformation elastic anklet ankle foot orthosiselastic bandage, ACE-bandage stretchable, expandable bandageelastic knee sleeve knee supporting soft orthosis, tt-prosthetic suspensionelbow splint old-fashioned term for: elbow orthosiselectrical stimulation neuromuscular stimulation by electric impulses electromyography recording of electrical activity of a muscleembedding enclosing, encapsulating, (German: socket retainer function) embossing manual shaping of sheet metal by special hammerEMG recording of electrical activity of a muscleendo-skeletal pylon type prosthetic components covered by external cover energy consumption use of energy in physical activitiesenergy expenditure spending of energy in physical activitiesenergy return energy output, achieved by spring-like design in O&PorthosisEO elbowepicondylitis stress related inflammation of the elbow, (tennis)epiphysis dist./prox. End of a bone, zone of longitudinal growth equilibrium keeping of balanceequinovalgus combined drop foot and valgus deformityequinovarus combined drop foot and varus deformityeversion rotation of hand or foot around long axis of the limbeversion turning foot outward and up (opposite of inversion)EWHO elbow wrist hand orthosisexamination, assessment evaluation, obtaining information (about a condition)exo-skeletal prosthetics: external structural components (opposite: modular) extension straightening motion of a jointextension assist strap or other means assisting joint extensionextension moment force (torque) causing extension (straightening) of joints extension stop bumper or other means of extension limitationextensor muscle causing extensionexternal related to the outside (opposite: internal)external fixation outside orthotic fixation (of a fracture or a surgical result) extremity upper or lower extremities: arms or legsfabric corset textile orthosis for the abdomen or trunkfabrication the procedure of mechanically creating a devicefatality mortality, death ratefatigue (material) time-dependent alteration of typical material propertiesfatigue (muscles) time-dependent slow down of muscle actionFederal Trade Association German professional trade associationfeedback return of informationfelt material made up from compressed, interwoven hair or fiber female the woman species in a creature (opposite: male)femoral channel dorso-lateral convex channel in a prosthetic socketfemoral condyles the distal ends (close to the knee joint) of the femurfemur the thigh boneFES functional electrical stimulationfibre glass (fiber glass) glass reinforcement component in compositesfibula calfbone, the lesser of two bones in the calffibular head the proximal thicker portion of the fibulafit compatibility between patient and device in function/comfortflab abundance of soft tissueflaccid paralysis, paresis non-spastic paralysis, loss of voluntary muscle innervationflare even anatomical surface (as the tibial flare)flat evenflat foot foot deformity, loss of medial-longitudinal arch heightflatfoot, talipes planus foot deformity, loss of any medial-longitudinal arch heightflexion joint motion, buckling or bending a jointflexion assist device assisting (joint) flexionflexion moment force (torque) causing flexionflexor muscle creating a flexion motionfloor reaction orthosis orthosis utilizing floor reaction forces for patient stabilizationFO (either) finger orthosis (or) foot orthosisfoam a cellular resin (polyurethane foam hard or soft)foaming act of manual creation of a prosthetic foam connectorchildfoetus unbornfollow-up continuous control and maintenance, aftertreatmentfoot cradel anatomically adapted plantar foot supportfoot deformity misalignment (functional misshape) of the footfoot flat stance phase: sole of the foot getting in complete ground contact foot slap stance phase: uncontrolled quick foot flat motionforce cause or reason for acceleration, deceleration, movementforging non-chipping iron shaping process under the influence of heat fracture traumatic breaking of a boneframe the outer supportive, stiffening elementframe socket the outer supportive, stiff element as a retainer for a flexible socket freehand drawing, draft manual first draft or drawingcounter-acting sliding movement, "rubbing"friction forcefrontal plane, coronal plane reference plane as seen from the frontfulcrum center of a single axis joint, center of rotationfully synthetical man-made (material)functional component i.e. joints etc. (as opposed to structural components)functional level degree of function a disabled patient still achievesfunctional needs component need to satisfy specific needsfundamental of basic importanceambulationgait walking,gait analysis research of gait patterns and time-related specificsgait deviation pathological changes in normal walking patternsgait pattern physiological or pathological walking characteristicsgait trainer somebody teaching how to walkgait training lessons in learning how to walkgalvanization surface protection of metalsgangrene local death of soft tissue due to lack of blood supply gastrocnemii, “gastrocs” double-headed calf musclegauge measuring instrument (measures width / thickness)gear train joint joint components, forcing each other trough toggled connection gel man-made or natural material, consistency similar to gelantine genu kneegenu recurvatum hyper-extended knee joint (frequently seen in poliomyelitis) genu valgum/knock knee knock knees, knees frequently touching each other medially genu varum/bowleg bow legs, knee distance too large (opposite of genu valgum) geometric locking locking systematic of polycentric knee jointsgeometrical stance control locking systematic for the provision of stance stabilitygeriatric elderly, old, aged,glue, cement bonding agentgoniometer instrument (tool) for measuring anglesgrease fat, as lubricant or tissuegrid particle size indication in abrassive materialsgrind surface modification by abrasion, sanding etc.ground reaction force force directed from the ground toward the body Haemo.., haema... related to the bloodhallux, halluces big toeHalo brace cranial/cervical orthoses, ring fixed at proximal cranium hamstrings popliteal tendons, insertion of flexor muscleshand splint old fashioned for hand orthosishard and soft foaming technique of using hard and soft PU-foams in combinationhd extra sturdy version of…..disarticulationHD hipHDPE HighPolyethyleneDensityHD-socket pelvic socket of the hip disarticulation prosthesisheavy metals a specific group of metals (heavy in weight)heel clamp prosthesis a partial foot prosthesis, suspension by a posterior "clamp" heel cup foot orthosis, Berkely cupheel off / heel rise moment in stance phase when the heel risesheel spur bony protrusion at the distal-medial aspect of the calcaneus heel strike moment in stance phase when the heel touches the ground heel wedge heel bumper in foot or length compensation, absorbs shockHelfet’s heel cup foot orthosis, similar Berkely cupremoving the distal half of the bodysurgery,hemicorporectomy amputationhemipelvectomy amputation surgery removing one half of the pelvis hemipelvectomy-prosthesis artificial leg after hemipelvectomyhemiplegia paralysis of one half side of the bodyheredetary congenital by transmission from parent to offspringhernia subcutaneous protrusion of intestinshindfoot posterior 1/3 of the foot (heel and tarsus)hinge simple joint, single axiship dysplasia pathological development of hip socket leading to dislocation hip hiking exaggerated movement (lifting) of the hip joint in gaithip joint, articulatio coxae proximal joint of the leg, leg-pelvis jointhip positioning orthoses a brace controlling functional alignment of the hip jointhip socket concave component of the hip jointhip spica cast applied to pelvis and legHKAFO Hip-Knee-Ankle-Foot-OrthosisHO (either) Hand Orthosis (or) Hip Orthosis (!!)hobby-handicraft hobbyists work also meaning: non-professional resulthook and eyelet closure closure of textile fabric corsetshook and pile closure Closure material with interlocking surfaces (e.g. Velcro)hook and pile, Velcro self-adhesive strap materialhorizontal plane reference plane as seen from the tophosiery, medical hosiery medical compression hosiery (phlebology)humerus bone in the upper armhybrid something having properties of at least two different resources hydraulic joint control cylinder/piston device controlling prosthetic joint motion hyper… more of somethinghyperextension over-stretching (of a joint)hyperextension orthosis a spinal brace serving for reclination of the thoracic spinegrowthhyperplasia increasedhyper-reflexia pathologically exaggerated reflexeshypertonia elevated blood pressurehypertonicity increased muscle tone or muscle tensionhypertrophy growth of tissue by enlargement of cellshypo… less of somethinghypoplasia biological structure significantly diminished in sizehypotonia low blood pressurehypotonicity loss of muscle tone (or tension)ContainmentIC IschialICRC International Committee of the Red CrossICRC Ischial and ramus containmentIC-socket ischial containment socketidiopathic scoliosis adolescent scoliosis without a known causeilium, os ilium the medial or lateral "wing-shaped" bone in the pelvis。
小学上册第10次英语第5单元测验试卷
小学上册英语第5单元测验试卷英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1.We had a _________ (玩具派对) where everyone brought their favorite toys.2.What is the main purpose of a bridge?A. To provide shelterB. To connect two pointsC. To decorate the landscapeD. To provide waterB3.What is the term for a baby horse?A. CalfB. FoalC. KidD. LambB4.I enjoy ______ (baking) cookies with my mom.5. A __________ (花圃) can be a peaceful retreat.6.The ________ (世界地图) shows all countries.7.My dog loves to chase _______ (球).8. A __________ is a landform that rises above the surrounding area.9. A stable atom has an equal number of protons and ______.10.What is the term for a shape with four equal sides?A. RectangleB. SquareC. TriangleD. PentagonB11.Which of these is a flying mammal?A. BatB. SquirrelC. KangarooD. ElephantA12.What do we call the process of taking in oxygen and releasing carbon dioxide?A. InhalationB. RespirationC. PhotosynthesisD. VentilationB13.I want to _______ (去参加) a workshop.14. A fish uses its ______ (鳍) to steer.15.You can find ______ (药草) in the kitchen.16.The _______ (猴子) is very social with its group.17.Rock layers are often studied to understand the history of the ______.18.What is the main ingredient in mashed potatoes?A. RiceB. PotatoC. CornD. BeanB19.The dolphin jumps out of the _______ (水).20.What is 8 - 5?A. 2B. 3C. 4D. 521.What do you call a person who studies the earth and its features?A. GeographerB. GeologistC. BiologistD. Astronomer22.What do you call the process of a caterpillar becoming a butterfly?A. MetamorphosisB. EvolutionC. AdaptationD. Transformation23.What is the main purpose of a thermometer?A. Measure weightB. Measure timeC. Measure temperatureD. Measure distanceC24.I like ________ (collecting) stickers.25.What do you call a person who makes bread?A. BakerB. ChefC. CookD. ButcherA26.The first female Prime Minister of the UK was _______ Thatcher.27.We have a ______ (快乐的) celebration for achievements.28. A _____ is a region of space with a lot of stars.29.My cat loves to catch ______ (小虫) on the floor.30.Which of these is a fruit?A. LettuceB. TomatoC. CarrotD. Potato31.She has a ________ (vision) for the future.32.The __________ (历史的传承价值) is vital for growth.33.What do we call the study of living things?A. BiologyB. ChemistryC. PhysicsD. AstronomyA34.What do you call a series of connected numbers?A. SequenceB. SeriesC. PatternD. ListA35.My cousin is very __________ (活泼的) and full of energy.36.My ______ loves to explore new technologies.37.My aunt lives _____ the city. (in)38.I see a ________ (bird) in the sky.39.My grandpa enjoys fishing with ____.40.The tree has green ______.41.What do you call a young viper?A. KitB. PupC. CalfD. Neonate42.What is the currency used in the United States?A. EuroB. DollarC. YenD. Pound43. A photon is a particle of ______ (light).44.How many months are in a year?A. 10B. 11C. 12D. 13答案:C45.The library has many ______ (books).46.The dog is ___ the kids. (watching)47.The ______ (海豚) is very intelligent.48.The __________ is known for its rich cultural heritage. (埃及)49.Which planet is known as the Red Planet?A. EarthB. MarsC. NeptuneD. SaturnB50.I can ______ (做) many things.51.The ________ loves to chase after balls.52.What is the name of the largest mammal in the ocean?A. SharkB. WhaleC. DolphinD. Seal53.The discovery of fire was an important step in _______ history.54.In a reaction, the limiting reagent is the reactant that is completely _____ first.55.The _____ (采摘) of fruit is a fun activity.56.The ______ (果树) produces apples in autumn.57.My favorite thing to do is ________ (玩游戏) with friends.58.Which of these animals is a reptile?A. FrogB. TurtleC. DogD. Cat59.The ferret is very _________ (好奇).60.How do you say "good night" in French?A. Bonne nuitB. Buenas nochesC. BuonanotteD. Dobranoc61.What do you call a place where animals are kept for public viewing?A. ParkB. MuseumC. ZooD. AquariumC62.What is the opposite of 'hard'?A. ToughB. SoftC. FirmD. Rigid63.The chemical formula for calcium sulfate is ______.64.My _______ (金鱼) swims in circles.65.My favorite vegetable is ________.66.What do we call the frozen form of water?A. SteamB. IceC. RainD. Snow67.The stars are ___ (twinkling) in the sky.68.The bee plays a critical role in ______ (授粉) plants.69.What is the name of the fairy tale character who leaves a glass slipper?A. CinderellaB. Snow WhiteC. Sleeping BeautyD. Red Riding HoodA70.The Earth spins on its ______.71.My family has a ______ (宠物) cat.72.What do we call the process of combining two or more colors?A. BlendingB. MixingC. MergingD. CombiningB73.The _____ (干旱) can challenge plant survival.74. A ______ (生态友好的) approach benefits the planet.75.My mom works as a ______ (我妈妈工作是) teacher.76.Some _______ can be very fragrant.77.What do we call the sport played on ice?A. HockeyB. FootballC. BasketballD. Baseball78.The stars are ______ (not) visible during the day.79.I love to ______ (分享) my experiences with others.80.The Earth's surface is made up of various ______ ecosystems.81.I want to _____ (learn/play) a song.82.What do we call a large animal with antlers?A. DeerB. MooseC. ElkD. All of the above83.What do you call the sound a dog makes?A. MeowB. BarkC. MooD. QuackB84. A ______ is a bird that swims well.85.What is the capital city of South Africa?A. PretoriaB. Cape TownC. JohannesburgD. Durban86.Which animal is known for building dams?A. BeaverB. RabbitC. SquirrelD. FoxA Beaver87.My favorite fruit is ___ (apple/banana).88.I enjoy ______ (聆听) different music styles.89.My mom volunteers at the ____ (animal) shelter.90.The chemical formula for ethyl alcohol is ______.91.The __________ (法国革命) inspired many other revolutions.92.I have a favorite ________ that I bring everywhere.93.The ________ is very wise and observant.94.My uncle is very ________.95.What do we call the organ that pumps blood in the body?A. BrainB. LiverC. HeartD. LungsC Heart96.Greenland is the largest _______ island in the world.97.The children are ___ in the playground. (playing)98.I like to explore the ______ (城市) and discover new places.99.My favorite season is ________ (春天) because I can play outside and enjoy the ________ (阳光).100.Which gas do plants take in during photosynthesis?A. OxygenB. Carbon DioxideC. NitrogenD. HeliumB。
Combining three multi-agent based generalisation models AGENT CartACom and GAEL
Combining Three Multi-agent Based Generalisation Models: AGENT, C ART AC OMand GAELCécile Duchêne, Julien GaffuriIGN, COGIT Laboratory, 2-4 avenue Pasteur, 94165 Saint-Mandé cedex, France.email: {cecile.duchene,julien.gaffuri}@ign.frAbstractThis paper is concerned with the automated generalisation of vector geo-graphic databases. It studies the possible synergies between three existing, complementary models of generalisation, all based on the multi-agent paradigm. These models are respectively well adapted for the generalisa-tion of urban spaces (AGENT model), rural spaces (C ART AC OM model) and background themes (GAEL model). In these models, the geographic objects are modelled as agents that apply generalisation algorithms to themselves, guided by cartographic constraints to satisfy. The differences between them particularly lie in their constraint modelling and their agent coordination model. Three complementary ways of combining these mod-els are proposed: separate use on separate zones, “interlaced” sequential use on the same zone, and shared use of data internal to the models. The last one is further investigated and a partial re-engineering of the models is proposed.Keywords: Automated generalisation, Multi-agent-systems, Generalisa-tion models, Models combination.278 C. Duchêne and J. Gaffuri1. IntroductionIn this paper, we deal with automated cartographic generalisation of topog-raphic vector databases. Cartographic generalisation aims at decreasing the level of detail of a vector database in order to make it suitable for a given display scale and a given set of symbols, while preserving the main charac-teristics of the data. It is often referred to as the derivation of a Digital Car-tographic Model (DCM) from a Digital Landscape Model (DLM) (Meyer 1986). In the DCM, the objects have to satisfy a set of constraints that rep-resent the specifications of the expected cartographic product (Beard 1991; Weibel and Dutton 1998). A constraint can be related to one object (build-ing minimum size, global shape preservation), several objects (minimum distance, spatial distribution preservation), or a part of object (road coales-cence, local shape preservation). Different approaches to automate gener-alisation handle the constraints expression in different ways. For instance, in approaches based on optimisation techniques (Sester 2000; Højholt 2000; Bader 2001), the constraints are translated into equations on the point coordinates.The work presented in this paper relies on an approach of generalisation that is step by step, local (Brassel and Weibel 1988; McMaster and Shea 1988), and explicitly constraint driven (Beard 1991). More precisely, our work is concerned with three complementary models based on this ap-proach, which also rely on the multi-agent paradigm. These three models are respectively dedicated to the generalisation of dense, well-structured data (AGENT model), low density, heterogeneous zones (C ART AC OM model), and to the management of background themes during generalisa-tion (GAEL model). The purpose of this paper is to investigate the possi-ble synergies between the three models.The next section of the paper presents in a comparative way the major aspects of the AGENT, C ART AC OM and GAEL models. In section 3, three complementary scenarios for a combined use of these models are pro-posed, and the underlying technical requirements are identified. One of them is further investigated in section 4, where a partial re-engineering of the models is proposed. Finally, section 5 concludes and draws some per-spectives for on-going work.Combining Three Multi-agent Based Generalisation Models 2792. Comparative presentation of AGENT, C ART AC OM and GAEL2.1. The AGENT modelThe AGENT generalisation model has first been proposed by Ruas (1998,Two levels of agents are considered. A micro agent is a single geographic object (e.g. road segment, building). A meso agent is composed of micro or meso agents that need to be considered together for generalisation (e.g. a group of aligned buildings, a urban block). This results in a pyramidal hierarchical structure where agents of one level are disjoints. Cartographic constraints can be defined for each agent (Figure 1). If a cartographic con-straint concerns several agents it is translated into a constraint on the meso agent they are part of, thus a constraint is always internal to an agent.Fig. 1. The AGENT model: agents and constraintsThe constraints are modelled as objects. A constraint object can be thought of as an entity, part of the “brain” of an agent, in charge of managing one of its cartographic constraints. In terms of data schema (cf Figure 2a), a generic Constraint class is defined, linked to the generic Agent class. The attributes defined on the Constraint class are as follows:• current_value : result of a measure of the constrained property (e.g. area, for the building size constraint). It is computed by the compute_current_value method,• goal_value : what the current value should be,一个constraint 对象可以看成是agent 的大脑的一部分280 C. Duchêne and J. Gaffuri• satisfaction : how satisfied the constraint is, i.e. how close the current value is from the goal value. It is computed by the compute_satisfaction method,• importance : how important it is according the specifications that this constraint is satisfied, on an absolute scale shared by all the constraints, • priority : how urgent it is for the agent to try and satisfy this constraint, compared to its other constraints. It is computed by the compute_priority method depending on the satisfactionTwo additional methods are defined:• compute_proposals : computes a list a possible plans (generalisation algorithms) that might help to better satisfy the constraint, and• re -evaluate : after a transformation assesses if the constraint has changed in a right way (if it has been enough improved, or at least if it has not been too much damaged) ConstraintAgent 1*BuildingSizeConstraint BuildingGranuConstraint RoadCoalescenceConstraint Constraint compute_current_value()compute_satisfaction()priority : integer compute_priority()compute_proposals()reevaluate()current_value : real goal_value : real satisfaction : integer importance : integer *MesoAgent compute_activation_order()BuildingAgent RoadAgent MesoAgent MicroAgent MicroAgent (a) The generic agent and constraint classes (b) Specialisation of the agent and constraint classes Agent1status : integerhappiness : reallife-cycle()trigger_plan()compute_happiness()choose_plan()trigger_agent()give_order()change_goal_value()Fig. 2. AGENT static model : data schemaThe generic Constraint class is specialised into several specific con-straints classes, one for every kind of cartographic constraint (cf Figure 2b). One agent is linked to one constraint object of every specific con-straint class that is relevant to its geographic nature (e.g. for a building, BuildingSizeConstraint, BuildingShapeConstraint, etc.).When a geographic agent is activated, it performs a life-cycle where it successively chooses one plan among those proposed by its constraints, tries it, validates its new state according to the constraints re-evaluation, and so on. The interactions between agents are hierarchical: a meso agent triggers its components, gives them orders or changes the goal values of their constraints (Ruas 2000).The AGENT model has been successfully applied to the generalisation of hierarchically structured data like topographical urban data (Lecordix et al 2007) and categorical land use data (Galanda 2003).Combining Three Multi-agent Based Generalisation Models 281 2.2. The C ART AC OM modelThe C ART AC OM model has been proposed by Duchêne (2004) to go be-yond the identified limits of the AGENT pyramidal model. It is intendedfor data where no obvious pyramidal organisation of the space is present, like topographical data of rural areas. In this kind of situation, it is difficult to identify pertinent disjoint groups of objects that should be generalisedtogether, and constraints shared by two objects are difficult to express as an internal constraint of a meso object.In C ART AC OM, only the micro level of agents is considered, and agentshave direct transversal interactions between each other. C ART AC OM fo-cuses on the management of constraints shared by two micro agents, thatwe call relational constraints. Examples of relational constraints are, for a building and a road, constraints of non overlapping, relative position, rela-tive orientation.The object representation of the constraints proposed in the AGENT model has been adapted to the relational constraints, which are shared by two agents instead of being internal to a single agent (Fig. 3). Two classesinstead of one are used to represent the constraints: Relation and Con-straint. The representation of a relational constraint is split into two parts:•the first part is relative to the objective description of the state of the constrained relation, which is identical from the point of view of bothagents and can thus be shared by them. This description is supported by a Relation object linked to both agents,•the second part is relative to the analysis and management of the constraint, which is different for each agent and should thus be separately described for each of them. This part is described by two Constraint objects: one for each agent sharing the relational constraint.Fig. 3. C ART AC OM static model: agents and constraints282 C. Duchêne and J. GaffuriIn order to improve the state of a relational constraint, in C ART AC OM an agent can use two kinds of “plans”: either apply to itself a generalisation algorithm, like in AGENT, or ask the other agent sharing the constraint to apply an algorithm to itself.When activated, an agent performs a life-cycle similar to the AGENT life-cycle. If AGENT internal constraints have been defined on the agent on top of its C ART AC OM relational constraints, the agent can perform its internal generalisation through a call to the AGENT life-cycle, which is then seen as a black box. In the case where the agent asks another agent to perform an action, it ends its life-cycle with a “waiting” status, and re-sumes action at the same point when it is next activated. The agents are ac-tivated in turn by a scheduler. Sending a message to another agent places it on the top of the scheduler’s stack, i.e. the agents trigger each others by sending messages.The C ART AC OM model has been successfully applied to low density, rural zones of topographical data, where the density is such that few con-textual elimination is necessary (Duchêne 2004).2.3. The GAEL modelThe GAEL model has been proposed by Gaffuri (2007). Its is intended for the management of the background themes like relief or land use, during an agent generalisation of “foreground” topographic themes by means of the AGENT or C ART AC OM model. The background themes differ from the foreground themes in that they are continuous (defined everywhere in the space) instead of being discrete and, from a generalisation point of view, they are more flexible than the foreground themes (thus they can ab-sorb most of the transformations of the foreground themes). Two types of cartographic constraints are considered in the GAEL model: constraints of shape preservation internal to a field theme, and constraints that aim to preserve a relation between a foreground object and a part of a background field (object-field constraint). An example of an object-field constraint is, for a river and the relief, the fact that the river has to remain in its drainage channel.In the GAEL model, a field theme is decomposed into subparts by means of a constrained Delaunay triangulation, like in (Højholt 2000). The field’s shape preservation constraints are expressed as constraints on sub-parts of the triangulations called sub-micro objects: segments, triangles, points (Figure 4a). The object-field constraints are expressed as relational constraints between a field agent and a micro agent of the AGENT or C ART AC OM model (Figure 4b, not represented in the class diagram ofCombining Three Multi-agent Based Generalisation Models 283 Figure 4a), and translated into constraints on sub-micro objects. The points that compose the triangulation are modelled as agents. The sub-micro ob-jects are thus groups of point agents. Each internal or object-field con-straint that concerns a sub-micro object is translated into forces on the point agents that compose it.Fig. 4. GAEL static model : sub-micro level, point agents, sub-micro and object-field constraintsWhen a point agent is activated, it computes and applies to itself a small displacement in the direction that would enable it to reach a balance be-tween the forces resulting from its constraints. Interactions between agents can be hierarchical or transversal. Field agents can trigger their point agents (hierarchical interaction), and point agents can directly trigger their neighbours (transversal interactions). This results in a progressive defor-mation of the field in answer to the deformations of the foreground themes. The GAEL model has been successfully applied (Gaffuri 2007) to the preservation of relations between buildings and relief (elevation) and hy-drographic network and relief (overland flow).2.4. Areas of applications of AGENT, C ART AC OM and GAEL: schematic summaryFigure 5 summarizes the main characteristics of the AGENT, C ART AC OM and GAEL models. AGENT is based on hierarchical interactions between agents that represent single geographic objects or groups of objects. The considered constraints are described as internal to a single agent and man-aged by this agent. This model is best suited for generalising dense areas where density and non-overlapping constraints are prevalent and strong contextual elimination is required. C ART AC OM is based on transversal in-teractions between agents that represent single geographic objects. The considered constraints are described as shared by two agents and managed by both concerned agents. This model is best suited for generalising low284 C. Duchêne and J. Gaffuridensity areas where more subtile relational constraints like relative orienta-tion are manageable. GAEL is based on transversal interactions between agents that represent points of geographic objects connected by a triangu-lation, and hierarchical interactions between these agents and agents that represent field geographical objects. The considered constraints are de-scribed either as shared by a field agent and a micro agent, or as internal to groups of connected point agents, and handled by these point agents. This model is best suited for the management of side-effects of generalisation on the background themes.Fig. 5. AGENT, C ART AC OM and GAEL model: target areas of application and levels at which constraints are described (GAEL object_field constraints are not represented)The three models are best suited for different kinds of situations that are all present on any complete topographic map. Thus they will have to be used together in a complete generalisation process. In the next section, scenarios are proposed for the combined use of the three models.3 Proposed scenarios to combine AGENT, C ART AC OM and GAELIn the subsections 3.1, 3.2 and 3.3, three complementary scenarios for the combined use of the models are studied, in which the synergy takes place at different levels. For each scenario, the underlying technical and research issues are identified.Combining Three Multi-agent Based Generalisation Models 2853.1. Scenario 1: separate use of AGENT, GAEL andC ART AC OM on a spatially and/or thematically partitioned datasetThis first scenario concerns the generalisation of a complete topographical dataset. Such a dataset contains both foreground and background themes (everywhere), and both rural and urban zones. In this scenario, we propose to split the space as shown in figure 5, both spatially and thematically, in order to apply each of the three models where it is a priori best suited: •urban foreground partitions are generalised using AGENT,•rural foreground partitions are generalised using C ART AC OM, •background partitions follow using GAEL.Let us notice that this scenario does not cover the complete generalisa-tion process but only a part of it. It is intended to be included in a larger generalisation process or Global Master Plan (Ruas and Plazanet 1996) that also includes steps for overall network pruning, road displacement us-ing e.g. the beams model (Bader 2001), and generalisation of background themes (on top of letting them follow the foreground themes). Actually, these additional steps would also be applied on either thematically or spa-tially split portions of the space.This scenario first requires adapted methods to partition the data in a pertinent way (here into foreground and background themes, into urban and rural zones). Then, whatever the partitioning, the resulting space por-tions are not independent because strong constraints exist between objects situated on each side of the borders: continuity of roads and other networks at spatial borders, inter-theme topological relations, etc. This interdepend-ence requires mechanisms for the management of side-effects on the data, i.e. to ensure that no spatial inconsistency is created with other portions of the space when applying one model on portion of the space. It also re-quires pertinent heuristics for the orchestration of the process: when to ap-ply which model on which partition.These issues are not new: they have already been discussed by (McMas-ter and Shea 1988; Brassel and Weibel 1988; Ruas and Plazanet 1996) re-garding the design of generalisation process composed of elementary algo-rithms. We are just a step forward here, since now we consider the combination of several generalisation processes based on different models.286 C. Duchêne and J. Gaffuri3.2. Scenario 2: “interlaced” sequential use of AGENT,C ART AC OM and GAEL on a set of objectsThis second scenario concerns the generalisation of a set of objects in-cluded in a single partition of the previous scenario i.e. a portion of either urban foreground space, rural foreground space, or background space. In this scenario, we propose to enable the “interlaced sequential use” of the models, i.e. calling successively two or more of the models on the same objects, possibly several times (e.g. AGENT then C ART AC OM then AGENT again).Indeed, experiments performed with the AGENT and C ART AC OM mod-els show that the previous scenario is not sufficient. The limit between a rural space that should a priori be generalised by C ART AC OM and a urban space that should a priori be generalised by AGENT is not so clear. In some zones of medium density, C ART AC OM enables to solve most of the conflicts while tackling also more subtile constraints like relative orienta-tion, but can locally encounter over-constrained situations. In this second scenario, such locally over-constrained situations can be solved by a dy-namic call to an AGENT hierarchical resolution. Conversely, not all the constraints shared by two objects in an urban zone can easily be expressed as an internal constraint of a group (meso agent) and solved at the group level. Thus, in scenario 1, some of them are given up, e.g. the constraint of relative orientation. Scenario 2 enables punctual use of C ART AC OM inside a urban zone, which could help in solving such subtile relational con-straints for which no group treatment is available. Regarding the thematic split between foreground and background, it seems that this distinction is not so well defined either. This is why in this scenario, some objects can be considered as foreground at one time of the process and background at other times. For instance, buildings are foreground when handling there re-lational constraints with the roads thanks to a C ART AC OM activation; but they are rather background when handling the overlapping constraints be-tween roads, as their behaviour at this time should just be to follow the other feature classes in order to prevent topological inconsistencies.To summarize, in scenario 2 the geographic objects of a dataset are able to play several roles during a generalisation process: an object can be mod-elled as an AGENT, C ART AC OM and GAEL agent at the same time and be successively triggered with an AGENT, C ART AC OM or GAEL behaviour (life-cycle). To be more precise, a same object of the micro level can be modelled and triggered both as an AGENT and C ART AC OM agent, and the points that compose it modelled and triggered as GAEL agents (as the GAEL model operates at the points level).To enable this, some mechanisms are required to detect the need to dy-namically switch to another model. This means, a mechanism is needed detect that the currently used model is unable to solve the situation, and identify the pertinent set of objects that should temporarily be activated with another model. Then, some consistency preservation mechanisms are required, not from a spatial point of view (this has already been tackled in scenario 1), but regarding the data in which an agent stores its representa-tion of the world. For instance, if a C ART AC OM activation is interrupted and an AGENT activation is performed that eliminates some agents, the neighbours of the eliminated agents should be warned when the C ART AC OM activation resumes, so that they can update their “mental state”. Otherwise, they could enter in an inconsistent state, with pending conversations and relational constraints with agents that do no longer exist.3.3. Scenario 3: simultaneous use of AGENT andC ART AC OM data on one objectThis third scenario concerns the generalisation decisions taken by an agent of the micro level (single geographic object) that is both modelled as an AGENT and as a C ART AC OM agent as proposed in scenario 2. Only the AGENT and C ART AC OM models are considered here since only these models operate at a common level (micro level).An agent that is both modelled as an AGENT and as a C ART AC OM agent has knowledge both of its internal constraints and of relational con-straints shared with other agents. But so far, including in scenario 2 above, only the internal constraints are taken into account when it behaves as an AGENT agent, and only the relational constraints are taken into account when it behaves as a C ART AC OM agent (during its C ART AC OM life-cycle, it can perform internal generalisation thanks to a call to the AGENT life-cycle as explained in 2.2, but the AGENT life-cycle is then seen as a “black box”). In this third scenario, an agent is able to consider both kinds of constraints at the same time when making a generalisation decision, be it in a C ART AC OM or in an AGENT activation. This means that, when choosing the next action to try, the agent takes into account both the pro-posals made by its internal and relational constraints (with the restriction that an agent activated by AGENT does not try an action consisting in ask-ing another agent to do something). And, to validate the action it has just tried, the agent takes into account the satisfaction improvement of both its internal and relational constraints. This scenario is not intended to intro-duce more relational constraints in urban zones than in scenario 2. It just proposes that, when such constraints have been defined (like the relativeorientation constraint), they can be taken into account at the same time asthe internal constraints. Provided relational constraints are parsimoniously added, and the relative importances and the relaxation rules of the internal and relational constraints are well defined, this scenario should not resultin over-constrained situations anywhere. And it has multiple advantages: •The aim of an agent activated by C ART AC OM (e.g. a rural building) is still to satisfy both internal and relational constraints, but it can satisfyall of them by trying the actions they suggest, while remaining in its C ART AC OM life-cycle. This is less computationally heavy than calling the AGENT life-cycle as a “black box”.•The aim of an agent activated by AGENT (e.g. a urban building) is still first to satisfy as well as possible its internal constraints. But, if it has relational constraints defined, they can prevent it from applying an internal algorithm that would decrease their satisfaction too much. For example, algorithms that square the angles of a building, or that transform it into a rectangle, can easily break relations of local parallelism between the building (or one of its walls) and another building or a road. (Steiniger, 2007, p. II-C-13) proposes to prevent this by forbidding the use of these algorithms in the parts of urban space classified as “inner city”, because this problem frequently occurs in this kind of area. This scenario 3 enables to avoid this kind of problem in a more adaptive way (only when it really occurs).•An agent activated by AGENT can also try internal actions specifically in order to improve the satisfaction of one of its relational constraints (like a small rotation in order to achieve parallelism with a neighbouring road). This is far less heavy than having to stop the AGENT activation and start a C ART AC OM activation on the whole urban block containing the building.•If micro-agents activated with AGENT cannot cope with some relational constraints because of “domino effects”, another way of solving these constraints can also be that the meso agent above seeks for a global solution by analysing the relational constraints of its components (e.g., in the above case the urban block identifies the buildings that should rotate).To enable this scenario 3, it is necessary to re-engineer the parts of theAGENT and C ART AC OM static models related to constraint representation so that internal (AGENT) and relational (C ART AC OM) constraints can both be handled by an agent within the same methods. Hence, the methods of the “Agent” class that use the constraints have to be modified, both in theAGENT and in the C ART AC OM model, in order to take into account the presence of both internal and relational constraints.4. How to put the proposed scenarios into practice4.1. Technical requirements underlying scenarios 1, 2 and 3: summaryIn sections 3.1, 3.2 and 3.3 we have presented three scenarios where the AGENT, C ART AC OM and GAEL models are used with an increasing de-gree of combination: separate use on separate zones (scenario 1), “inter-laced” sequential use on the same zone (scenario 2), shared use of data in-ternal to the models (scenario 3). The three scenarios are complementary and we intend to put all the three into practice in a medium term. The iden-tified underlying issues are summarized hereafter, starting from the most external elements of the models, to the most internal:1.Define methods to split the map space into relevant partitions, onspatial and/or thematic criteria [scenario 1]2.Define a strategy to know which model to apply when on whichportion of space [scenario 1]3.Define mechanisms to manage the side-effects at borders, whengeneralising one partition with one model [scenario 1]4.Define mechanisms to dynamically identify a set of geographicalobjects that require a temporary activation of another model than the currently active one [scenario 2]5.Define mechanisms to preserve the consistency of data internal to onemodel, when another model is running [scenario 2]6.Re-engineer the representation and management of constraints inAGENT and C ART AC OM so that internal and relational constraints can be handled together [scenario 3]The current status of the issues (1) to (5) is briefly described in the next section. The issue (6) is tackled more in deep in section 4.3.4.2. Status of the technical issues underlying scenarios 1 and 2The issues underlying the scenarios 1 and 2 (issues 1 to 5) in the list above) are part of a research that is currently beginning. However, for some of them we already have some elements of answer. Regarding the。
催化裂化装置再生器跑剂原因分析及对策
日催化剂单耗为 0.9 kg/t。10 月 1 日至 7 日,发现再 生器料位不再上涨,期间催化剂单耗为 1.22 kg/t。
10 月份对再生器旋分线速、外循滑阀开度、各 路主风量、烟机入口调节阀阀位、再生器料位、外 取热循环量等操作参数进行调整,对再生器跑剂 量影响不大,全月自然跑损 1.23 kg/t。再生剂小于 40 µm 的颗粒占 19.61%,比开工初期略有下降,三 旋细粉中大于 40 µm 的颗粒上涨较快,占 21.35%。
的催化剂跑损,而且,对旋分器的线速做的调整, 并未改变催化剂的跑损量[9]。 2.4 检修前后操作参数对比
从操作参数看,除外循滑阀开度、再生器密相 温度、助燃剂加入量随生焦量的变化进行调整外, 其它操作参数都和检修之前变化不大[10]。 2.5 开裂或穿孔
假设再生器 2 级旋分升气管焊道开裂,那么根 据开裂的距离可以计算出开裂的面积,再用开裂 的面积占烟气总流通面积的比例计算出从开裂部 位带走的催化剂。因为 2 级旋分的流通部位中 2 级旋分的升气管截面积最小、压降最大,因此选择 12 个 2 级旋分升气管的总面积作为没有开裂时的 总流通面积。根据升气管开裂的面积和总面积比 值来计算催化剂跑损量[11]。
2021 年 第 3 期
司伟,等 . 催化裂化装置再生器跑剂原因分析及对策
45
颗 粒 占 6.84%,三 旋 细 粉 中 大 于 40 µm 的 颗 粒 占 33.17%。同时,随着三旋细粉加入系统内,在相同 外甩油浆的情况下,油浆固体物含量由 5.5 g/L 左 右开始增加。
2020 年 1 月 15 日至 2 月 15 日,控制新鲜剂单 耗 1.0~1.2 kg/t,加入平衡剂维持再生器料位,加入 三旋细粉控制再生剂中细粉含量,期间自然跑损 2.5 kg/t 左右。再生剂小于 40 µm 的颗粒占 5.12%,
soft actor-critic 简明理解
soft actor-critic 简明理解Soft Actor-Critic: A Concise UnderstandingIntroductionIn the field of reinforcement learning, Soft Actor-Critic (SAC) is an algorithm that has gained significant attention due to its ability to successfully handle both discrete and continuous action spaces. SAC utilizes the actor-critic architecture to simultaneously learn a policy and a value function. This concise article aims to provide a step-by-step explanation of the SAC algorithm, its key components, and its advantages over other reinforcement learning techniques.Step 1: Understanding the Actor-Critic ArchitectureBefore delving into SAC, it is important to grasp the fundamentals of the actor-critic architecture. In reinforcement learning, the actor refers to the policy or the set of actions taken by the agent, while the critic estimates the expected return or value function given a specific state and action. By combining these two components, the actor-critic architecture enables the agent to learn both the optimal policy and value function simultaneously.Step 2: Exploring the Key Components of SAC2.1 Soft ExplorationOne of the key aspects that differentiates SAC from otheractor-critic algorithms is its emphasis on soft exploration. Traditional approaches like deep Q-networks (DQN) often rely on epsilon-greedy exploration, which can be too deterministic. In SAC, soft exploration is achieved by introducing an entropy regularization term that encourages the policy to explore more diverse actions, leading to better exploration and faster learning.2.2 Maximum Entropy Reinforcement LearningAnother crucial component of SAC is maximum entropy reinforcement learning. Instead of focusing solely on maximizing the expected return, SAC also strives to maximize the entropy or randomness of the agent's policy. By doing so, the agent becomes more adaptable and robust, as it learns to explore a wide range of actions and avoids overcommitting to a single action.2.3 Off-Policy LearningSAC adopts an off-policy learning approach, meaning that the agent learns from a different policy than the one used for decision-making. This property allows for efficient use of the collected data, as the agent does not need to update its policy after each interaction. By decoupling the exploration and exploitation phases, SAC is capable of achieving higher sample efficiency and overcoming the exploration-exploitation dilemma.Step 3: SAC Algorithm Workflow3.1 Data CollectionThe SAC algorithm starts with data collection, where the agent interacts with the environment based on its current policy and stores the observed state, action, reward, and next state information. Unlike other algorithms, SAC also records the logarithm of the probability of a certain action, which is essential for entropy maximization.3.2 Updating the Q-NetworkAfter collecting a sufficient amount of data, the critic or Q-network is updated by minimizing the Mean Squared Bellman Error (MSBE). This step involves adjusting the parameters of the value function estimator to better approximate the expected return given a state and action.3.3 Actor and Entropy UpdatesSimultaneously, the actor network is updated using policy gradient techniques like the Trust Region Policy Optimization (TRPO) or Proximal Policy Optimization (PPO). The objective is to maximize the expected return while also maximizing the entropy of the policy.3.4 Target Networks and Soft UpdatesTo stabilize the learning process, SAC employs target networks, which are delayed copies of the actor and critic networks. These target networks are updated periodically in a soft manner by interpolating their weights with the online networks' weights. Soft updates ensure a smoother transition and reduce the risk ofinstability during the learning process.Step 4: Advantages of Soft Actor-CriticSAC has several notable advantages compared to other reinforcement learning techniques:4.1 Handling Continuous Action SpacesSAC is particularly effective in environments with continuous action spaces due to its ability to provide probabilistic policies rather than individual deterministic actions. This allows for more flexible and nuanced decision-making.4.2 High Sample EfficiencySince SAC utilizes off-policy learning and soft exploration, it achieves higher sample efficiency, meaning that it can learn from fewer interactions with the environment. This advantage is especially crucial when working with real-world systems where data collection is often resource-intensive or costly.4.3 Robustness and AdaptabilityBy combining maximum entropy reinforcement learning and soft exploration, SAC learns policies that are both robust and adaptable. The agent becomes less prone to overcommitting to a single action and can effectively explore a wide range of actions, making it suitable for complex and dynamic environments.ConclusionSoft Actor-Critic is a powerful algorithm in the field of reinforcement learning that leverages the actor-critic architecture, soft exploration, and maximum entropy reinforcement learning. It stands out due to its ability to handle both discrete and continuous action spaces, high sample efficiency, and robustness in complex environments. As research in reinforcement learning progresses, SAC continues to be a promising avenue for developing more advanced and intelligent agents.。
A_glimpse_into_the_future_of_ID
a glimpse into the future of idby Tim Bass<bass@>Tim Bass is the CEO and managing director for Silk Road, a consulting business inWashington, D.C. specializing in network design, management, and security.and Dave Gruber<david.gruber@>Dave Gruber, Lt. Col., is the communications squadron commander at Hickam AFB,Hawaii.Cyberspace is a complex dimension of both enabling and inhibiting data flows in electronic data networks. Current-generation intrusion-detection systems (IDSes) are not technologically advanced enough to create the situational knowledge required to monitor and protect these networks effectively. Next-generation IDSes will fuse data, combining short-term sensor data with long-term knowledge databases to create cyberspace situational awareness. This article offers a glimpse into the foggy crystal ball of future ID systems.Before diving into the technical discussion, we ask the reader to keep in mind the generic model of a datagram traversing the Internet. Figure 1 illustrates an IP datagram moving in a store-and-forward environment from source to destination; it is routed on the basis of a destination address with an uncertain source address decrementing the datagram time-to-live (TTL) at every router hop[1]. The datagram is routed through major Internet and IP transit providers.There is a striking similarity between the transit of a datagram on the Internet and an airplane through airspace, between future network management and air traffic control (ATC). At a very high abstract level, the concepts used to monitor objects in airspace apply to monitoring objects in networks. The Federal Aviation Administration (FAA) divides airspace management into two distinct entities. On the one hand, local controllers guide aircraft into and out of the airspace surrounding an airport. Their job is to maintain awareness of the location of all aircraft in their vicinity, ensure properseparation, identify threats to aircraft, and manage the overall safety of passengers. Functionally, this is similar to the role of network controllers, who must control the environment within their administrative domains. The network administrator must ensure that the proper ports are open and that the information is not delayed, that collisions are kept to a minimum, and that the integrity of the delivery systems is not compromised.Figure 1. Network object flow pathThis is similar to the situational awareness required in current-generation ATC. The FAA controls the routes between source and destination (airports), and airport authorities control the airports (as both router and host), maintaining the safety of the payload (passengers) and the transport agent (the airplane). The success of ATC depends on the fusion of data and information from short-term and long-term knowledge sources to create airspace situational awareness. This role is remarkably similar to network operators in future complex internetwork environments. As an example, consider the FAA and the National Weather Service as they monitor the weather. A change in environment can cause the FAA to make changes in air routes and landing criteria. This is similar to service providers keeping an eye out for unfavorable conditions in networks — for example, the loss of a major Internet transit network; severe congestion on major interdomain links; or attacks against routers, computers, and information. The same data-fusion concepts are shared across the airspace management functions and organizations. We expect that a similar fusion paradigm will occur with network management, Internet Traffic Control (ITC), and future intrusion-detection systems. Of course, this will not occur overnight (and may never become as comprehensive as ATC), but the analogy does help provide a glimpse into the future of ID.Figure 2. Hierarchy of IDS data-fusion inferencesFigure 2 illustrates the levels of situational knowledge inference required to support both the air traffic controller and the network manager. Sophisticated electronics must identify objects against a noise-saturated environment, track the objects, calculate their velocity, and estimate the projected threat. These are nontrivial technical requirements.Figure 3. Cyberattack with multiple sources andtargetsFigure 4. Intrusion-detection data fusionExperienced network-security professionals generally agree that current-generation intrusion-detection systems are not technically advanced enough to detect multiple, complex non-signature-based cyberattacks, illustrated in Figure 3. Next-generation cyberspace IDSes require the fusion of data from heterogeneous distributed network sensors, modeled in Figure 4.Historical Intrusion Detection SystemsWe offer a brief review of the state of the art of current-generation ID systems, from our recent ACM paper[2].Internet ID systems historically examine operating-system audit trails and Internet traffic[5, 6] to help insure the availability, confidentiality, and integrity of critical information infrastructures. ID systems attempt to protect information infrastructures against denial-of-service attacks, unauthorized disclosure of information, and the modification or destruction of data. The automated detection and immediate reporting ofthese events are required to respond to information attacks against networks and computers. The basic approaches to intrusion detection today may be summarized as: known pattern templates, threatening behavior templates, traffic analysis,statistical-anomaly detection, and state-based detection. These systems have not matured to a level where sophisticated network-centric attacks are reliably detected, verified, and assessed.[2]Computer intrusion-detection systems were introduced in the mid-1980s to complement conventional approaches to computer security. IDS designers often cite Denning's[5] 1987 intrusion-detection model built on host-based subject profiles, systems objects, audit logs, anomaly records, and activity rules. The underlying ID construct is arules-based pattern-matching system whereby audit trails are matched against subject profiles to detect computer misuse based on logins, program executions, and file access. The subject-anomaly model was applied in the design of many host-based IDSes, among them Intrusion Detection Expert System (IDES)[7]; Network Intrusion Detection Expert System (NDIX)[9]; and Wisdom & Sense (W&S), Haystack, and Network Anomaly Detection and Intrusion Reporter (NADIR) [10]. Other ID systems are also based on the Denning model; an excellent survey of them may be found in Mukherjee et al.[6]. The basic detection algorithms used in these systems include:weighted functions to detect deviations from normal usage patterns qcovariance-matrix—based approaches for normal usage profiling qrules-based expert-systems approach to detect security eventsqThe second-leading technical approach to present-day intrusion detection is themulti-host network-based IDS. Heberlein et al. extended the Denning model to traffic analysis on Ethernet-based networks with the Network Security Monitor (NSM) framework[11]. This was further extended with the Distributed Intrusion Detection System (DIDS), which combined host-based intrusion detection with network-traffic monitoring[6, 8]. Current commercial IDSes such as Real Secure by ISS and Computer Misuse Detection System (CMDS) by SAIC have distributed architectures using either rules-based detection, statistical-anomaly detection, or both.A significant challenge remains for IDS designers to fuse sensor, threat, and situational information from numerous heterogeneous distributed agents, system managers, and databases. Coherent pictures that can be used by network controllers to visualize and evaluate the security of cyberspace is required. Next, we review the basic principles of the art and science of multisensor data fusion applied to future ID systems in Bass[2] and Bass[3] to create highly reliable next-generation intrusion-detection systems that identify, track, and assess complex threat situations.Internet Situational Data FusionIn a typical military command-and-control (C2) system, data-fusion sensors are used to observe electromagnetic radiation, acoustic and thermal energy, nuclear particles, infrared radiation, noise, and other signals. In cyberspace ID systems the sensors are different because the environmental dimension is different. Instead of a missile launch and supersonic transport through the atmosphere, cyberspace sensors observeinformation flowing in networks. However, just as C2 operational personnel are interested in the origin, velocity, threat, and targets of a warhead, network-security personnel are interested in the identity, rate of attacks, threats, and targets of malicious intruders and criminals[2]. Input into next-generation IDSes consists of sensor data, commands, and a priori data from established databases. For example, the system input would be data from numerous distributed packet sniffers, system log files, SNMP traps and queries, signature-based ID systems, user-profile databases, system messages, threat databases, and operator commands. (See Figure 4.)The output of fusion-based ID systems consists of estimates of the identity (and possibly the location) of a threat source, the malicious activity, taxonomy of the threats, the attack rates, and an assessment of the potential severity of damage to the projected target(s). We extrapolated from Waltz[12] to suggest possible generic sensor characteristics of next-generation network fusion systems[2]:Detection Performance is the detection characteristics — false-alarm rate, qdetection probabilities, and ranges — for an intrusion characteristic against agiven network-centric noise background. For example, when detecting malicious activity, nonmalicious activity is typically modelled as noise.Spatial/Temporal Resolution is the ability to distinguish between two or more qnetwork-centric objects in space or time.Spatial Coverage is the span of coverage, or field of view, of the sensor (i.e., the qspatial coverage of a system log file is the computer system processes and system calls being monitored).Detection/Tracking Mode is the mode of operation of the sensor (i.e., scanning, qsingle or multiple network object tracking).Target Revisit Rate is the rate at which a network object or event is revisited by qthe sensor to perform measurements.Measurement Accuracy is the statistical probability that the sensor measurement qor observation is accurate and reliable.Measurement Dimensionality is the number of measurement variables for network qobject categories.Hard vs. Soft Data Reporting is the decision status of the sensor reports. (I.e., can qa command decision be made without correlation, or does the sensor requireconfirmation?)Detection/Tracking Reporting is the characteristic of the sensor with regard to qreporting events. (Does the sensor maintain a time-sequence of the events? type of historical event buffers?)In our fusion model, situational data is collected from network sensors with elementary observation primitives; identifiers, times of observation, and descriptions. The raw data requires calibration and filtering, referred to as Data Refinement (short-term knowledge). Object Refinement is a process that correlates data in time (and space if required); the data is assigned appropriate weighted metrics. Observations may be associated, paired, and classified according to intrusion-detection primitives.Situation Refinement (mid-term knowledge) provides situational knowledge and awareness after objects have been aligned, correlated, and placed in context in an object base. Aggregated sets of objects are detected by their coordinated behavior, dependencies, common points of origin, common protocols, common targets, correlated attack rates, or other high-level attributes.In the interdomain construct of Figure 1, network objects and data flows will be identified and tracked by placing sensors at or between the interdomain gateways. Without going into the details, it can be shown that temporal resolution of the cyberspace situational awareness is directly proportional to the ratio of the transit time of the datagram and the sensory fusion process and inference time.As an analogy we offer the tracking of an object in aerospace — for example, a projectile. If the intercept time of a projectile is greater than the time used by radar or another tracking system and other required processing, then it is not possible to track and react to the object before the projectile hits the target. For example, if the datagram will reach its destination in 30ms, then the decision-fusion process required for network situational awareness must be much less than 30ms. Highly critical situational awareness can be achieved by networking the sensors (and optional command and control links) out-of-band. Current-generation systems use in-band processing, which can only achieve limited temporal resolution.Extensible Threat Taxonomy FusionThe number of IP packets processed by the Internet gateways of Figure 5 is enormous. Gateway sensors acquire and forward proportionally large amounts of data to packet analysis and correlation processes. For example, a router processing 100,000 packets per second on a high-speed interface, logging 14 bytes of information per packet, produces approximately 1.4 MBPS of data per sensor. It is clear that distributed sensors in network-centric IP fusion systems require local processing. Consequently, sensor output data should be reduced at the sensor to minimize central fusion processing and transport overhead costs.Figure 5. Gateway sensors on ID fusion networkWe focus here on the sensor output by outlining an example extensible taxonomy framework of TCP/IP-based threats. Antony[14] discusses database requirements for fusion system and situational knowledge. He states that knowledge is either declarativeor procedural. Declarative knowledge is passive factual knowledge or knowledge of relationships (e.g., files). Procedural knowledge is a special case of declarative knowledge represented as patterns, algorithms, and transformations.Entity relationships are the most fundamental declarative models for sensor data representation. Binaries trees, family trees, and general taxonomies are examples of the elemental database relationships required for situational analysis; the vast majority can be represented by the SQL command[14]:SELECT(attribute) FROM (table) WHERE (condition)With this basic database model and data-selection primitives in mind, we offered a framework TCP/IP threat taxonomy[3]. This framework was offered as an extensible context-dependent TCP/IP threat tree based on the SNMP management information base (MIB) concept. The SNMP MIB concept for representing context-dependent data is well suited for network-centric threats (and countermeasures).Threats to TCP/IP at the physical layer are service disruptions caused by natural disasters such as fires or flooding, cuts to cables, malfunctioning transceivers, and other hardware failures. Threats to the network layer include IP source-address spoofing and route-cache poisoning. An extensible context-dependent framework for this is illustrated in Figures 6, 7, and 8.Figure 6. Example TCP/IP threat subtreeFigure 7. Example IP transport threat subtreeFigure 8. Example TCP transport threat subtreeThree primary data flows (services) exist on the Internet: User Datagram Protocol (UDP), Transmission Control Protocol (TCP), and Internet Control Message Protocol (ICMP)[1]. Domain Name System (DNS) cache poisoning and UDP port-flooding denial-of-service attacks are examples of two vulnerabilities exploited using UDP services. The ping-of-death and ICMP redirect bombs are examples of Internet attacks based on ICMP. TCP vulnerabilities include TCP sequence number and SYN flood attacks, as illustrated in Figure 8.Security threats and countermeasures can be represented using the ASN.1 MIB notation. For example, a TCP SYN flood attack could be represented with the following OBJECT IDENTIFIER (OID):tcpSYNFlood OID ::= { iso 3.6.1.5.1.3.1.1 }Additional sub-object examples for tcpSYNFlood OID could be the source address or the target address of the malicious SYN packet and a counter with the number of SYN floods:tcpSYNFlood.source OID ::= { iso 3.6.1.5.1.3.1.1.1 } tcpSYNFlood.dest OID ::= { iso 3.6.1.5.1.3.1.1.1.2 } tcpSYNFlood.number OID ::= { iso 3.6.1.5.1.3.1.1.1.3 } Developing an extensible TCP/IP security threat MIB is a solid first step on the road to creating Internet ID fusion systems. Other long-term knowledge databases include context-dependent countermeasure, threat profiles, and attack-capabilities databases. ConclusionFuture reliable services that provide long-term threat, countermeasure, and other security-related information to fusion systems are similar to the current state of the art of weather forecasting and threat assessment. Fusion from multiple short-term sensors further processed with long-term knowledge creates short mid-term situational awareness. Situational awareness is required to operate and survive in a complex world with both friendly and hostile activities.All intelligent biological organisms fuse short-term and long-term knowledge to create situational awareness. Humans continually create and redefine systems that help us increase and refine our situational knowledge. These systems include air traffic control, battlefield management, early-warning systems, and robotics. There are strong indications, based on our work in both the Air Force and commercial industry, that future ID systems will shift toward more advanced fusion-based models.Our crystal ball is as foggy as yours, but if the developments in situational awareness systems in air traffic control over the past 40 years are any indication, then Internet traffic-control systems and next-generation intrusion-detection systems have a significant and challenging future in store for all of us.References[1] Stevens, R. TCP/IP Illustrated, Volume 1: The Protocols. Reading, MA:Addison-Wesley, 1994.[2] Bass, T. "Intrusion Detection Systems and Multisensor Data Fusion: Creating Cyberspace Situational Awareness." Communications of the ACM. Forthcoming, 1999.[3] Bass, T. "Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems." 1999 IRIS National Symposium on Sensor and Data Fusion, May 1999.[4] Bass, T.; Freyre, A.; Gruber, D.; and Watt., G. "E-Mail Bombs and Countermeasures: Cyber Attacks on Availability and Brand Integrity." IEEE Network, March/April 1998, pp. 10-17.[5] Denning, D. "An Intrusion-Detection Model." IEEE Transactions on Software Engineering, February 1987, pp. 222-232.[6] Mukherjee, B.; Heberlein, L.; and Levitt, K. "Network Intrusion Detection." IEEE Network Magazine, May/June 1994, pp. 26-41.[7] Denning, D., et al. "A Prototype IDES: A Real Time Intrusion Detection Expert System." Computer Science Laboratory, SRI International, August 1987.[8] Snapp. S. et al. "A System for Distributed Intrusion Detection." Proceedings of IEEE COMPCON, March 1991, pp. 170-176.[9] Bauer, D. and Koblentz, M. "NDIX — An Expert System for Real-Time Network Intrusion Detection." Proceedings of the IEEE Computer Networking Symposium, April 1988, pp. 98-106.[10] Hochberg et al. "NADIR: An Automated System for Detecting Network Intrusion and Misuse." Computers & Security, Elsevier Science Publishers, 1993, pp. 235-248. [11] Heberlein, L. et al. "A Network Security Monitor." Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp.296-303.[12] Waltz, E., and Llinas, J. Multisensor Data Fusion. Boston: Artech House, 1990.[13] Waltz, E. Information Warfare Principles and Operations. Boston: Artech House, 1998.[14] Antony, R. Principles of Data Fusion Automation. Boston: Artech House, 1995.Need help? Use our Contacts page. Last changed: 16 Nov. 1999 mc Issue index;login: indexUSENIX home。
中国生态建设英语作文80字
中国生态建设的绿色篇章In the heart of Asia, China has embarked on a remarkable journey of ecological restoration. From the vast deserts of the north to the lush forests of the south, the country is transforming its landscape with a focus on sustainability. This green revolution is not just a matter of environmental protection; it's an investment in the future of China's economy and its people.Initiated by the government, the Green China program encourages community participation, making every citizen an agent of change. The program Prioritizes reforestation, water conservation, and waste reduction, aiming to create a harmonious co-existence between humanity and nature. The results are visible across the country, with increasing green cover and a decline in pollution levels.This ecological turnaround has brought about multiple benefits. It hasboosted tourism, attracting millions to experience China's natural beauty. It has also fostered economic growth, creating jobs in the sustainable industries. Moreover, it has enhanced the quality of life for the people, who now enjoy cleaner air and water.The success of the Green China program lies in its comprehensive approach, combining policy interventions, technological advancements, and public awareness. It's a testament to China's commitment to sustainable development, not just for its own people but for the global community as well.**中国生态建设的绿色篇章**在亚洲的中心,中国已经踏上了一段非凡的生态恢复之旅。
制药专业英语原文翻译
1、Digitalis is one of the most frequently used medications in the treatment of heart failure and arrhythmia. It increases the contractility of the heart muscle and modifies vascular resistance. It also slows conduction through the atrioventricular node in the heart, making it useful in the treatment of atrial fibrillation and other rapid heart rhythms洋地黄是其中一个最常用的药物治疗心力衰竭和心律失常。
它增加了的心肌收缩血管阻力和修改。
它也减慢传导通过传导节点的心使它有用的治疗房颤和其他快速心律2、The formulation of a parenteral product involves the combination of one or more ingredientswith a medicinal agent to enhance the convenience,acceptability,or effectiveness of the product. Rarely is it preferable to dispense a drug singly as a sterile dry powder unless the formulation of a stable liquid preparation is not possible非肠道用产品的配方涉及一个或者更多组成部分间的结合,这些组成部分(各自)都含有一种用以提高产品方便性、可接受性或者疗效的有效成分。
2025届安徽省皖南八校高三上学期8月摸底考试英语试题
2025届安徽省皖南八校高三上学期8月摸底考试英语试题一、阅读理解The slow approach to travel has never been more important. These following hikes offer a chance to reconnect you with the world.Karhunkierros Trail, FinlandFinnish Lapland is famous as a winter destination, with magical aurora borealis (北极光) and a fascinating ancient Sami culture. It’s also home to the 82-kilometer Karhunkierros Trail, the most well-known long-distance walk in Finland. It’s a route best to explore in summer, when the nights are bright. The path takes four days, depending on the weather.High Tatras Hut-to-Hut Hike, SlovakiaThe High Tatras are the highest mountain range in the Carpathian Mountains, stretching from Northem Slovakia into Southern Poland. Hikers—mostly Slovaks and Czechs—greet with a genuine smile and a cheerful Ahoj or Dobryden. Especially, don’t miss the unique food, potato dumplings with sheep cheese and sweet steamed buns.King Charles III England Coastal Path, EnglandCovering 4,300 kilometers, the England Coast Path was named after the country’s king. The good news is that it can be easily broken down into sections for hiking beginners. Whether taking in the high cliffs and bays of Comwall or deep silence of Suffolk and Norfolk, just a few days on this route will leave anyone refreshed.Vikos Gorge and Mount Gamila, Zagoria, GreeceThe remote and beautiful mountains of Zagoria are Greece’s best-kept secret. They offer great hiking without the crowds. The highlight is the Vikos Gorge. In some places, its cliffs tower 1,350 meters. Wander its dry river bed in summer and keep an eye out for rare wild animals. 1.When is the best time for hikers to explore Karhunkierros Trail?A.Winter B.Summer nights C.Sunny days.D.Any time 2.Which site was called based on a country’s king’s name?A.Karhunkierros Trail.B.High Tatras Hut-to-Hut Hike.C.King Charles III England Coastal Path D.Vikos Gorge and Mount Gamila3.What can people come across in Vikos Gorge and Mount Gamila?A.Some unusual animals B.Tough and deep roads.C.A 1,350-feet mountain D.Crowds from all over the world.For years, a British TV show The Piano has set its sights on finding the next greatest musician by placing pianos in public places for anyone to play. Twenty-two-year-old Brad Kella won the 2024 competition by displaying his extraordinary skills, using the opportunity to also honor those who made it all possible for him.Kella, who is from a suburb of north Liverpool, was placed in a foster care at 7. “I remember hanging on to the railings (栏杆) outside my foster parents, and just didn’t want to go in,” the young musician explained. He had intended to spend only a night with Ev and Frank, but they went on to become his foster parents for over 12 years.When Kella told his foster parents about wanting a piano, they immediately agreed although they had a tight budget, let alone offering him music lessons or paying for a music coach. While Kella couldn’t read music, he taught himself to play the piano. He never thought of giving up when facing challenges.On top of becoming an extraordinary pianist, he learned a lot about himself and the places where he could go through the instrument. Kella said, “I owe it to my foster parents because I had no one there who believed I would be capable of doing such a thing as playing the piano.”For the final concert of the talent competition, Kella had to perform an original composition. To show his thanks to his foster parents, he wrote Ev and Frank. The foster parents were surprised when the young pianist showed the title of his work and could be seen wiping away tears during the moving performance.“I had the best foster parents in the whole world. And they gave me the chance to dream, and to believe that anything was actually possible,” Kella said, “I hope I give kids like me more of a reason to keep trying to achieve their dreams.”4.What happened to Kella the first time he saw his foster home?A.He was unwilling to accept it.B.He only stayed there for one night.C.He missed his previous foster care.D.He hung out with his foster parents. 5.How did Kella learn to play the piano?A.By hiring a music coach.B.By learning it on his own.C.By consulting his foster parents.D.By signing up for music lessons.6.What do we know about Kella’s Ev and Frank.?A.It makes Kella world-famous.B.Its topic is about appreciation.C.It is regarded to be the best original work D.It is aimed to show Kella’s talent for music. 7.Which of the following words can best describe Kella?A.Fortunate and well-off.B.Diligent and confident.C.Wise and committed.D.Determined and inspirational.When we, as humans, get slightly injured, we treat our own wounds. Even sometimes we go to see doctors. But in the wild animal kingdom, medical care is much different. For one Sumatran orangutan (猩猩) , a facial wound maybe lethal because it could cause infection and pain. However, the large orange primate (灵长目动物) found a way to treat himself using a native-growing plant.Rakus, a Sumatran orangutan, lives in Suaq Balimbing, Indonesia. Sumatran orangutans, with only about 14, 613 surviving, are faced with dying out. Biologists study the great apes in their habitats. When they noticed Rakus' wound they paid attention to it. But what happened three days later surprised them. Rakus applied a plant called Akar Kuning to his wound, creating a protective layer over the wound.The plant is known for reducing pain and preventing infection, but it is not a food for the local orangutans.Biologists say, “It is possible that Rakus brought this knowledge from his birthplace. Therefore, it is possible that the behavior is shown by more individuals like him outside the Suaq research area.”Luckily for Rakus, his treatment worked and his wound was cured without incident. While other examples of great apes treating wounds have been recorded, the selective treatment of only the wound and the layering of plant material in different consistencies were marvelous (了不起的) .According to the biologists, this remarkable observation is the first report of active wound management with a biological active substance in a great ape species and provides new insightsinto the existence of self-medication in our closest relatives.8.What does the underlined word “lethal” in Paragraph I probably mean?A.Deadly B.Avoidable C.Curable D.Obvious. 9.What surprised biologists about Rakus during their research?A.It feeds on Akar Kuning-a local plant B.Its habitats has been destroyed wholly.C.It can't deal with its wounds timely D.It uses a native plant to cure itself 10.Which is right about the observation on Sumatran orangutans?A.It focuses on animal protectionB.It first brought in biological active materialsC.It makes for knowing well of self-medication in the speciesD.It makes a big difference to saving apes in danger11.Where is the passage probably taken from?A.A news report B.A science fictionC.A geographic magazine D.A poster about endangered animalsIn a world of ever-present technology, few can agree on how much time children need on their devices. Some suggest kids should spend more time outside instead. For kids in Colorado, a new cooperation has found a way to get kids outside, even if they bring their phones.I’m standing nearby the Dinosaur Hill in Fruita, Colorado. Before I hike, words appear on my phone, “Your adventure is about to begin.” Scrolling down, I select a mission titled “Discover Dinosaurs”. A dinosaur avatar (虚拟化身) appears on the screen. “Hello, I’m Agent AI and inviting you to discover dinosaurs and help the Bureau of Land Management preserve fossils.”All over the state, the Colorado Explorer Campaign offers similar missions for young park visitors to complete. The Discover Dinosaurs mission is meant to educate young explorers on the basics of paleontology (古生物学) and how to preserve fossils. The Agents of Discovery app is generally defined as an interactive experience combining real world input with digitally-accessed content.But what’s the trouble for this activity? In order for the app to work as intended, families have to actually visit the sites their kids want to explore. There is no completing missions from the comfort of your couch.In fact, with the wide use of gamification (游戏化), the cooperation between technology and education grows. Recent studies have found gamification design fully reflects the active status of students in the learning process, which can emphasize the cultivation of students’ independent exploration spirit, form a good habit of learning and thus promote the overall quality of students.The Colorado Explorer Campaign works without Wi-Fi but best with cell service, and is offered for free. Through the Agents of Discovery app, users can identify trees, learn the migratory habits of birds, engage in local history and maybe even find evidence of dinosaurs. This summer, it’s certain that there are more families who take brief road trips and hometown hikes to see what else the program has in store.12.Why did the author mention his experience to the Dinosaur Hill?A.To advise people to go outdoors.B.To tell his love for dinosaurs.C.To disconnect him with digital device.D.To test the new method of enjoying outdoors with phones.13.What should kids’ parents do to make the Agents of Discovery app work smoothly?A.Visit their favorite sites.B.Know their interest in exploration.C.Get involved in the activity personally.D.Lie on their couches to monitor their kids. 14.What can we infer from the last paragraph?A.Wi-Fi is necessary for the app to work.B.The Colorado Explorer Campaign is of great value for exploring nature.C.Families should hike in their hometown together.D.The Agents of Discovery app highlights history culture.15.What would be the best title for the passage?A.More and More Children Are Addicted to PhonesB.An Approach Mixes Outdoor Activities with PhonesC.Colorado Handles Kids’ Phone Problems SuccessfullyD.Gamification Has Enjoyed Great Support among KidsFor many of us, pets are an important part of our family. 16 Here are four things you should do to make sure your pet is ready for air travel.Make sure your pet is vaccinated. 17 But almost every destination requires pets like dogs and cats to have a vaccination. And the vaccination must usually be within less than a year. Be sure to talk to your vet about what other vaccinations your pet might need for your destination.Find out if your pet needs to be microchipped. Many places require pet dogs and cats to be microchipped. The chip is about the size of a grain of rice, and is placed under the skin between the animal’s shoulders. 18Get your pet comfortable with their carrier. Your pet will probably have to travel in a box or carrier while in the air. You should get them used to this environment before you fly, putting them in it regularly. 19 Try putting the carrier in your car to get your pet used to the feeling of traveling in it.20 So they don’t need to go to the bathroom too much, pet product company Chewy recommends not feeding your dog or cat for 4 — 6 hours before flying. This will also help make them less likely to throw up if they get motion sickness.A.Avoid feeding your pet before flying.B.Find ways to keep your pets off sickness.C.Every country has its own rules for visiting animals.D.Thus give them time to fall asleep there if possible.E.And we certainly don’t want to leave them behind when travelling.F.It isn’t easy for pets to get used to their new environment in the air.G.If your pet gets lost, this microchip can be scanned to find your contact information.二、完形填空Rueben, a 15-year-old lion, originally lived in a private zoo in Armenia. But when the zoo closed five years ago, all the other animals were 21 . Sadly, no home was found for Rueben. He spent the last five years living 22 in a concrete cell that didn’t even have enough room for him to exercise.Rueben’s journey to South Africa and his new life in the ADI Wildlife Sanctuary wasn’t 23 sailing. The ADI couldn’t find a 24 for him to make the 5, 200-mile trip from Armenia that had an airplane with large enough cargo doors for his box.But Rueben still has to make a personal 25 . All those years of living in a cell left him 26 and unable to walk. When Rueben arrived in South Africa, he was 27 by Dr Peter Caldwell, who prepared a special course of treatment to help the lion regain 28 and mobility.Rueben’s habitat was specifically 29 with guard rails and ramps (护栏和坡道) to help Reuben regain his 30 which could be a very long process.“If he 31 , he just picks himself up and keeps going. 32 , in just a few days his movement is already improving.” Now, Rueben’s 33 has been astonishing. His movement has improved and he 34 comes for treats. He enjoys spending as much time as possible outdoors. Reuben is 35 so well that he is even getting his roar back as he regains confidence under the African sky. He will never be lonely again.21.A.attended B.relocated C.quoted D.anticipated 22.A.without hesitation B.in vain C.out of breathD.on his own23.A.clear B.typical C.secure D.temporary 24.A.flight B.cage C.shelter D.position 25.A.honor B.journey C.gesture D.presentation 26.A.upset B.unique C.weak D.shameful 27.A.stretched B.respected C.examined D.guaranteed 28.A.confidence B.direction C.fund D.strength 29.A.designed B.interpreted C.commented D.recorded 30.A.memory B.flexibility C.mobility D.disability 31.A.crashes B.falls C.volunteers D.succeeds 32.A.Suddenly B.Generally C.Obviously D.Incredibly 33.A.progress B.mark C.appearance D.experience 34.A.secretly B.shyly C.eagerly D.slightly 35.A.devoting B.adjusting C.educating D.approaching三、语法填空The US $2. 6 billion (2022) bubble tea (珍珠奶茶) market will reach US $6. 2 billion by 2032, according to Brainy Insights’ new report. The bubble tea industry had had huge 36 (grow) throughout the years and is still growing rapidly. The market is expected to increase as a result of factors such as 37 (rise) consumer demand and new product development.Taiwan, China, is where bubble tea was 38 (original) consumed and introduced, and one of the biggest drinkers of bubble tea is Thailand, 39 each person had six cups of bubble tea on average monthly in December 2019. 40 usage of social media by consumers and influencers also increased product demand for bubble tea in the Asia Pacific region.The market for bubble tea has a significant fruit flavor category that 41 (provide) consumers with a variety of delicious choices. Nowadays, strawberries and mango can 42 (mix) for a special flavor and the green tea category is expected to grow 43 the fastest speed. This is because green tea is full of goodness. The new online platforms—like TikTok — make bubble tea business 44 (access) to more consumers and increase sales. For bubble tea business, 45 (establish) a strong online presence is very important.四、书面表达46.假如你是李华,你班上周就“学生是否有必要购买品牌服饰”的话题展开了激烈的讨论。
2022-2023学年湖北省武汉市部分重点中学高二上学期期中联考英语试题
2022-2023学年湖北省武汉市部分重点中学高二上学期期中联考英语试题One trend that has skyrocketed during the COVID-19 pandemic is that many homebuyers have chosen to move to luxury escapes — swapping their inner-city setup for a home office near the water or the bush. Here we’ve gathered four of our favourite properties o n the market right now.Sunshine BayIf the sounds of the ocean have been beckoning(召唤), then look no further than8Beechwood Court, located on Sunshine Cove Beach with fantastic ocean views from almost everybedroom. It has been listed on Airbnb, a website to help travellers find a homestay, so home owners will have the option of using it as an additional income source.Price guide: 2. 6 million-$2. 8 millionAgent: Blackshaw Coastal, Pat Jameson 0405442905MurrumbatemanDelivering contemporary country charm of the Hamptons, this home will make you feel like you’re on a coastal holiday, but on a farm. The home is only a few minutes’ walk to thenearest woodlands and village cafe and a 35-minute drive to the capital.Private saleAgent: HIVE Property, Josh Morrissey 0437 799 234Tura BeachThis award-winning home combines coastal atmosphere with modern living. Only minutes away from Tura Beach, this architect-designed property is spread across two floors with big living and dining areas that stretch over an outdoor area with a spa.Price guide: $1. 5 millionAgent: One Agency Dwyer Properties, David Dwyer 0413 902 702JindabyneThis newly built home is located in the ever-growing Highview Estate in Jindabyne. It has high ceilings throu ghout, plenty of light and a kitchen that’s as stylish as it is functional. With the Snowy River just around the corner, nothing sounds more relaxing than walking alongside the water these holidays.Auction: 3 pm, December 14Agent: Raine &Horne Snowy Mountains, Toni Wheelhouse 0431 486 5881. What’s the special aspect of Sunshine Bay?A.It can be rented out. B.It has the nearest woodlands.C.It’s accessible to the internet.D.It keeps up with the latest style.2. Which property best suits people who are interested in architecture designing?A.Sunshine Bay. B.Murrumbateman. C.Jindabyne. D.Tura Beach.3. What do the four properties have in common?A.They are located in urban regions. B.They are places with ocean views.C.They are an escape from urban life. D.They are close to sand and water.I’ve been in an 18-year love-hate relationship with a black walnut tree.It’s a unique tree. In late September or early October, falling fruits as hard as baseballs threaten the skulls (头骨) of you, your children, your neighbors and those that reside next door to them. Umbrellas in the yard are a must while dining in early August, and as for me, I wear my bike helmet while working in the garden.The black walnut also releases a chemical substance through it s roots as a competitive strategy. It’s poisonous to several common plants. There have been many new plant varieties that I brought home with hopes that maybe the black walnut would accept them, but they failed to flourish.What does work are native plants that naturally grow in the area. Native plants are important to have around since they provide beneficial pollinators (传粉者) like birds, bees and butterflies with seeds and contribute to a healthy and biodiverse environment. Native plants for this area are generally easy to grow, so they experience less stress.Have I thought of getting rid of this giant pain in my tiny backyard? Yes, however, getting rid of this tree standing at 50 feet with an 87-inch trunk is next to impossible. It’s also protected und er the law. Rightfully so. Trees are important to the urban forest and for all of those that inhabit it. Sometimes I think about my life without the black walnut. I can’t imagine a spring without the birds who arrive every year and loudly sing their songs before dawn. I’d miss falling asleep on lazy weekend afternoons as I look up into its leaves.Every spring, I wonder what the season holds: What are the chances of being knocked unconscious while barbecuing? Like any good relationship, I’ll never be pleased. I’m stuck with this tree, so I’ll listen to its needs and give it the space it requires. In return, my walnut offers a habitat for wildlife and a reminder.4. Why does the author wear a bike helmet while working in the garden?A.To protect the injured skull.B.To avoid being hit by the nuts.C.To prevent herself from sunburn.D.To protect herself from getting caught in the rain.5. What is the tree’s survival strategy?A.It accepts new plant varieties.B.It attracts beneficial pollinators.C.It lets out a poison to drive away pests.D.It produces a chemical fatal to some plants.6. What can we learn from the passage?A.The fruits may bring inconvenience.B.The writer finds it challenging to get rid of the tree.C.The writer is accustomed to living without the tree.D.The tree is home to numerous birds and other creatures.7. The author most probably got a reminder from the tree thatA.It’s better to be sure than sorry.B.Constant dropping wears the stone.C.Trees and plants have their own ways to flourish.D.Acceptance instead of resistance is the better way to be.Back in the early 2000s, lots of people couldn’t have imagined life without alarm clocks, CD players, calendars, cameras, or lots of other devices. But along came the iPhone and other smartphones, and they took over the functions of dozens of things we used to think were essential.The smartphone story could even be a model for fighting climate change; not because smartphones use a small part of the energy of all the things they replace-although they do-but because they represent a different approach to design in general. And that approach is to focus on function rather than form. That requires focusing on understanding the underlying problem, and then engineering a wide range of potential solutions. This approach could revolutionize how we think about energy efficiency.Traditionally, improvements in energy efficiency have mostly focused on individual devices, which can be quite fruitful. But focusing on individual devices is like if Apple had spent effort inventing a better alarm clock, a better CD player, a better calendar, and a better camera. Now with an iPhone, we don’t need the standalone devices at all, because it can function as all of them.So when it comes to using energy efficiently, rather than just installing a more efficient heater, some people have focused instead on the desired function: staying warm. They designed and coated their house so well that they could get rid of their heater altogether, letting them heat their house with 99%less energy.In the same way, rather than just making cars more efficient, what if we focus on the desired function-getting where we want when we want-and create an efficient transportation system where we can drive less or get rid of our personal cars entirely?The most energy efficient car or heater is no car, or no heater, while still being able to get around and stay warm. In other words, it’s not thinking efficient, it’s thinking different.8. What makes the iPhone a good example of environmental protection?A.Perfecting individual devices.B.Combining possible functions.C.Adopting a simplest design.D.Reducing the energy consumption.9. According to the passage, what is the core of improving energy efficiency?A.Using recyclable materials.B.Revolutionizing technologies.C.Figuring out various solutions.D.Concentrating on the essential needs.10. What does the author think of traditional practices in energy improvements?A.Conventional. B.Out-of-date. C.Adequate. D.Perfect.11. What can we learn from the passage?A.Think out of the box. B.Differences make it unique.C.Be economical with energy. D.Step out of the comfort zone.Do you enjoy playing computer games? They can be thrilling, especially when you’re competing against others. They involve lots of skill, and offer a chance to switch off from the pressures of real life. But imagine if your gaming talents could actually be put to use in the real world? Well, now businesses are waking up to the skills gamers can bring to the workplace.As an example, the BBC spoke to trainee surgeon Saied Froghi. He played video games like Age of Empires and Halo in his spare time when he wa s at medical school. But this relaxing pastime wasn’t distracting him from his studies—he thinks his time in front of a screen actually helped his surgery skills. He claims it helped him with his concentration, and he compares some of the skills used in keyhole surgery with using a game console (控制台). He says, “Your hands know where the buttons are and how to exactly control the instrument.”Certainly, operating gaming controls help to develop good hand-eye coordination, but there are other abilities you can learn which can be applied to real-life work situations. Start-up company Game Academy told the BBC’s David Molloy that some games involve strategy and resource management, which are good skills for management. It analyses gamers’ habits from their onlin e gaming profile and offers courses in valuable skills that reflect their aptitude. These are skills that can be developed, and if carefully reworded, can be added to resumes.Employers might still need convincing that gamers are not just teenagers wasting their time in their bedrooms without thinking about their career prospects. But business consultant Mia Bennett told the BBC that gaming can help skills like “decision-making, the ability to anticipate and planning…It also helps with meta-skills—learning how to learn, experimentation, and creative thinking.”You might think that the idea of gaming developing transferable skills is like the games themselves—pure fantasy—and a gamer doesn’t want to associate the fun and escapism it provides with work. It ce rtainly doesn’t guarantee you a good job, and you need to be an experienced gamer for your skills to shine. But if so much time is being spent attracted by the challenge of Portal or the strategy of Civilization, why not put those talents to good use?12. Which is not the benefit Saied Froghi get from playing games?A.He can pay more attention to his studies.B.His hands and eyes can cooperate better.C.He can apply his gaming skills to his surgeries.D.His skills for management are greatly developed.13. Why was the surgeon’s example used?A.To show he is an experienced surgeon.B.To show he is experienced in playing games.C.To show his game skills can be applied to his work.D.To show playing games is the same as keyhole surgery.14. Which of the following is the closest in meaning to the underlined word in the third paragraph?A.Character B.Appearance C.Talent D.Thought15. Which might be the best title for the passage?A.Why not put your talents to good use?B.Can playing video games get you a better job?C.Should we be encouraged to play video games?D.Are teenagers wasting their time playing video games?It could happen anywhere at any time. 16 Most people, at one time or another, have been on the receiving end of a random act of kindness. In a sometimes cold world where people can be so focused on what they’re doing, a random act of kindness can make all the difference.17 Hannah Bailey from London, for example, told the Metro newspaper about how she was given her fruit and vegetable shopping for free. The seller did her a small act of kindness when it emerged she didn’t have any change to pay. She was happy about it all day.The city of Nap les has long had a tradition called ‘caffè sospeso’. When buying coffee, a person who has recently been lucky would purchase two cups but only drink one, leaving the second one anonymously (匿名), out of the goodness of their heart, for a poor person to claim for free. 18However, in some cases, these little acts can be a matter of life and death. Take, for example, the unnamed commuter, who in June 2018 fell off a station platform onto an electric railway track in Toronto, Canada. A quick thinking, but even now unknown, bystander selflessly leapt down to pull him to safety.So, why do it? 19 The people never meet again. According to UK charity The Mental Health Foundation, acts like these can “give our lives new purpose, show us other perspectives on ou r own problems and even make us feel content”.20 Hold open a door for someone, deliver a compliment -even give up your seat on a bus. Help someone who is in need. It takes all kinds. It needn’t be anything huge. One day, whether you need it or not, someone might help you in your hour of need.As the new year dawned, I was at one of the lowest points of my life. In the morning, I satin a park and _________ the sorrows of the past year. After so much loss, I felt a need to give myself to the turning of _________ -the snow-covered winter, _________ by the unfolding of new life in spring. As I walked home, my New Year’s resolution (决心) took_________ in my mind. My resolution became “Less grief, more green” and I looked for ways to put it into action. Therefore, I _________ signed up for the Arnold Arboretum training program for volunteer school field guides.Nancy, the program director, provided us with several days of _________ I buried myself into the spring curriculum on pollination (授粉) . The thick notebook was _________ with information and diagrams about how trees and flowers produce the seeds that make sure the species will _________. While in training, I felt like being a student again.After weeks of training, it was time to be a _________. When sixty third-graders __________ off the yellow school bus for the Flowers Change class, I began to provide outdoor learning experiences for them and gave them a day full of information, excitement, and surprises.Throughout my firs t spring of __________“Less grief, more green”, my senses came alive and__________. I moved beyond wonder and astonishment about nature to a better __________ of it. I learned about the workings of a child’s mind along with the workings of trees and flowe rs.I went on to be a proud and enthusiastic Arnold Arboretum field guide for four seasons. I__________ carry all that understanding and curiosity about what I don’t know each time I’m out in __________. And I still look at a flower through the eyes of a third-grader.21.A.stepped awayB.put up with C.made up for D.reflected on from22.A.seasons B.purposes C.directions D.instructions 23.A.proved B.followed C.required D.decided 24.A.effect B.part C.shape D.action 25.A.gladly B.hesitantly C.desperately D.anxiously 26.A.vacation B.meeting C.training D.competition 27.A.burdened B.stuffed C.filled D.decorated 28.A.disappear B.continue C.appear D.return 29.A.teacher B.student C.reporter D.guide 30.A.kept B.showed C.took D.piled31.A.analyzing B.conducting C.reading D.searching 32.A.existed B.expanded C.arose D.remained 33.A.understanding B.experiment C.description D.preparation 34.A.seldom B.never C.ever D.still35.A.class B.school C.nature D.business阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式。
鸡尾酒疗法 英语作文
鸡尾酒疗法英语作文英文回答:Cocktail therapy, also known as combination therapy, is a widely used treatment approach in healthcare,particularly in the field of medicine. It involves administering a combination of different drugs or therapies simultaneously to treat a single medical condition. The main goal of cocktail therapy is to enhance the overall therapeutic efficacy, reduce the risk of resistance, and minimize the occurrence of adverse side effects.There are several reasons why cocktail therapy is employed. First, by combining different drugs with distinct mechanisms of action, it can target multiple pathological pathways involved in a disease. This synergistic effect can result in improved treatment outcomes and a broader spectrum of activity. Second, cocktail therapy can reduce the likelihood of resistance development. When using a single drug, the pathogen or disease-causing agent canpotentially develop resistance over time, rendering the treatment ineffective. However, by combining multiple drugs with different targets, the probability of resistance occurring simultaneously is lower. Third, cocktail therapy can mitigate the risk of adverse side effects. By using lower doses of multiple drugs instead of a higher dose of a single drug, the potential for toxicity and side effects is reduced.Cocktail therapy has been successfully applied in the treatment of various infectious diseases, including bacterial, viral, and parasitic infections. For instance,in the treatment of HIV, a combination of antiretroviral drugs from different classes is used to suppress viral replication and prevent the development of resistance. Similarly, in the treatment of tuberculosis, a combination of antibiotics is typically used to enhance efficacy and reduce the risk of resistance.Moreover, cocktail therapy has also shown promise in the treatment of cancers. By combining multiple anticancer drugs with different mechanisms of action, it can targetvarious cellular pathways involved in tumor growth and metastasis. This approach can lead to improved tumor regression, increased survival rates, and reduced adverse effects compared to single-agent therapies.It is important to note that cocktail therapy is not without its limitations. One major concern is the increased potential for drug-drug interactions. When multiple drugs are used simultaneously, there is a risk of adverse interactions that can affect their efficacy, safety, and tolerability. Careful monitoring and dose adjustments are necessary to minimize this risk. Additionally, cocktail therapy can be more expensive than single-agent therapy, and the increased pill burden and complexity of dosing regimens may affect patient adherence.Overall, cocktail therapy is a valuable treatment approach that can enhance therapeutic efficacy, reduce resistance, and mitigate side effects. However, it should be used judiciously, considering the potential limitations and the need for careful monitoring and patient education.中文回答:鸡尾酒疗法,也称为联合疗法,是医疗保健领域中广泛使用的治疗方法,特别是在医学领域。
农村电子商务外文文献翻译最新译文
农村电子商务外文文献翻译最新译文This article by Maribel P discusses the patterns of rural merce。
The author proposes a nal trade core merce concept that takes into account the characteristics of rural areas。
such as scattered small-scale n。
The concept includes three models: n to n (both A2A)。
area of business (A2B)。
and business to nal (B2A)。
The author explains the meaning of each model and their basic methods。
nally。
the author suggests building an agricultural product supply chain with high benefit value and introduces the rural nal collaborative merce model (ABC)。
The collaborative approach involves combining technology。
data。
and business to achieve synergy。
The article also discusses the key technologies that need to be solved for dynamic planning。
logistics business matching。
puter n technology。
and agricultural knowledge search engine。
International-Human-Resource-Management国际人力资源管理 (1
Corporations
• HRM typically refers to those activities undertaken by an organisation to utilize human resources effectively,
Boxhall and Purcell give a broader definition as ‘human resources management includes the firm’s work system and its employment practices. It embraces both individual and collective aspects of people management’
• HR planning • Staffing (recruitment, selection, placement) • Performance management • Training and development • Compensation (remuneration) and benefits • Industrial relations
International Organisational structure
Chief executive/Headquarters
Production
Marketing
Finance
Personnel
International division
International geographic structure
What changes when HRM goes international?
F-54506 Vandoeuvre-les-Nancy
Swiss Fed. Inst. of Technology EPFL DI, Mantra Group CH-1015 Lausanne
Supelec 2 rue Edouard Belin F-57078 Metz cedex 3
vialle@ese-metz.fr
Stephane Vialle
In this paper, we present several kinds of programs developed in a new parallel language, ParCeL-1. This language is based on autonomous actors that compute concurrently as virtual processors. The applications we present here cover various domains of interest to arti cial intelligence, especially tree search and connectionist programming. We present general methods to develop such kinds of algorithms in ParCeL-1. Then we emphasize several rules that should be followed to write e cient parallel programs. Finally, we give the performances of these applications on two parallel computers.
Abstract
1 Introduction
rtv处理流程
rtv处理流程RTV, or Room Temperature Vulcanizing silicone rubber, is a type of material that cures at room temperature. Its processing involves several key steps that ensure the quality and performance of the finished product.RTV处理流程涉及多个关键环节,确保最终产品的质量和性能。
The first step in the RTV processing flow is the mixing of the RTV components. This typically involves combining a base silicone polymer with a curing agent and other additives. The ratio of these components is carefully controlled to achieve the desired properties in the cured silicone rubber.RTV处理流程的第一步是混合RTV组分。
这通常涉及将基础硅酮聚合物与固化剂和其他添加剂混合。
这些组分的比例经过严格控制,以实现固化硅酮橡胶所需的性能。
Once the components are mixed, the RTV material is ready for application. It can be applied using various techniques, such as brushing, spraying, or pouring, depending on the specific application and desired thickness of the silicone rubber layer.组分混合完成后,RTV材料便准备好进行涂覆。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
The AgentComponent Approach,CombiningAgents,and ComponentsRichard Krutisch,Philipp Meier,and Martin WirsingLudwig-Maximilians-Universtit¨a t M¨u nchen{krutisch,meierp,wirsing}@informatik.uni-muenchen.de Abstract.In this paper we introduce a new approach,the so-calledAgentComponent(AC)approach which combines component and agenttechnology.A multi agent system(MAS)is composed of AC instances,each AC instance consists of a knowledge base,storing the beliefs of anAC instance,of slots,storing the communication partners of an AC in-stance,of a set of ontologies,that represent domain specific languagesfor certain contexts,and of so-called ProcessComponents(PC)represent-ing the behaviours of an AC instance.The AC is a generic componentthat can be reused(instantiated ACs)and parametrized by customizingthe communication partners(slots),the ontologies and the behaviours(PCs)that can be added and removed from any AC instance.Herebywe achieve added value for agents and components.Agents can be eas-ily composed,customized and reused whereas components get enhancedcommunication and interaction facilities from agents.We present thisapproach in detail,show how to construct a component-based MAS bya simple example and present a graphical tool for composing systems ofAgentComponents.1IntroductionSoftware agents and software components are two emergingfields in software development.Each concept has its advantages and disadvantages but both con-cepts are improving the way large scaled software is built.While components focus more on reusability aspects of software,agents(MAS)focus on processing complex tasks as a community.Agents.In agent software development we distinguish basic kinds of agent systems:Reactive systems,MAS(interaction-driven systems)and Belief-Desire-Intention systems.Reactive systems define the simplest form of agent systems. Such systems can easily be described by state machines,that react on events by triggering certain actions.MAS focus mainly on the interaction aspects of a system of agents that collaboratively execute complex tasks.In the BDI model agents have beliefs and plans and can trigger different plans to reach certain defined goals.In this paper we focus on building MAS.And therefore we shortly want to name the properties of agents in such a system[14,13].Agents mustbe able to react on direct events(reactivity),moreover agents must be ableto react on indirect events(proactivity)such as changes in the environment M.Schillo et al.(Eds.):MATES2003,LNAI2831,pp.1–12,2003.c Springer-Verlag Berlin Heidelberg20032R.Krutisch,P.Meier,and M.Wirsingor changes of the plans of an agent.Moreover agents should execute their tasks autonomously(autonomy)i.e.there should not be too much interaction with the user during process/task execution.And of course agents must be able to interact and exchange data and information by using certain protocols and ontologies (interaction,communication,social behaviour).Components.Tofind a common definition for components is quite a big problem[6].And in this paper we only point out the properties of components we think are useful for this approach.In[4]is stated:“Component(in code):A coherent package of software implementation that(a)can be independently devel-oped and delivered,(b)has explicit and well-specified interfaces for the services it provides,(c)has explicit and well-specified interfaces for services it expects from others,and(d)can be composed with other components,perhaps customizing some of their properties,without modifying the components themselves.”Con-sidering components,one of the most important aspects is the reusability of the component in different contexts.And to provide certain functionality even for contexts which were not intended to be contexts for this component.To provide reusability we need to specify properly the components’interfaces,so that we are able to compose and exchange components in a component based software system.The interior of a component can be considered as a blackbox that is invisible for the user.Whereas the interfaces of a component describe, the services/methods a component provides and the services/methods it needs. Moreover it does not matter who a component provides.As long as a compo-nent is well specified it can easily be composed with other components to a more complex system.Combining Agents and Components.Many similarities can be found be-tween agent and component technology[11].But we are more interested in the complementary concepts of these technologies,because these are the concepts that make the profit of combining agents and components.We see the main purpose of agents in the communication ability,which gives us the possibility to process complex tasks by assigning single tasks to different agents.Instead com-ponents focus more on reusability and parametrisation/customization aspects for the deployment of a component in different contexts.In our opinion there exist two different concepts of combining agent and component technology.Thefirst one,we call it“agentifying”,sees component technology as starting point and tries to include agent properties into existing components.The second one,we call it“componentifying”,considers agent technology as starting point and tries to add component features to existing agent technology.Our approach which is based upon the“componentifying concept”combines the main features of agents and components in the so-called AgentComponent(AC).In this way we achieve both:An AC has communication abilities(the agent as starting point)and that can be reused and parametrized(the included component features)for different contexts(see Fig.1).With our approach we want to disburden agent software development.The component technology is a suitable instrument for this task by making certain agent concepts customizable and reusable.Here“reusable”means to have an AC that can be instantiated for every agent we need.AndThe AgentComponent Approach,Combining Agents,and Components3“customizable”means to connect AC instances,add/remove certain ontologies and add/remove behaviours graphically.bination ProfitIn section2we describe the basic concepts of the AC approach,where we give a simple example to illustrate these concepts.In section3we show how to construct AgentComponent Systems(ACS),i.e.systems composed of Agent-Components,and section4presents a graphical tool that helps to construct systems composed of AgentComponents.Finally,section5describes some re-lated work and discusses differences to this approach,and section6concludes the paper.2AgentComponentIn general,the AC has all agent properties like autonomy,reactivity,proactivity and interaction and adds component features like reusability and customizability (according to the“componentifying concept”).An AC is a generic component that describes general services that every agent must provide and so an AC can be instantiated/reused for every agent one wants to build.A user can easily cus-tomize an AC instance for his purpose and for his context in the following ways: (1)Customizing the ACs’communication partners.We introduce so-called slots that hold information about communication partners of AC mu-nication partners can be added to or removed from the slots of AC instances (customization of slots).(2)Customizing the ACs’ontologies.Ontologies can be registered or deregistered from the AC instance.(3)Customizing the ACs’processes.We introduce so-called ProcessComponents(PCs)that implement and describe simple or complex behaviours that can be added to or removed from any AC instance.With these three facilities the appearance and the behaviour of AC instances can be customized.Every AgentComponent includes the following entities for which it has to provide services.A knowledge base,slots(holding communication partners),a set of ontologies and a set of PCs:Knowledge Base.The knowledge base is a basic element of every AC in-stance.An AC provides services to add,remove and get resources from the knowledge base.The following services are provided by an AC for the knowledge base concept:(1)retrieve(getting knowledge from the knowledge base).4R.Krutisch,P.Meier,and M.Wirsing(2)assert(adding knowledge to the knowledge base).(3)retract(removing knowledge from the knowledge base).Ontologies.A well-known agent concept is the ontology concept that agents use to understand the content of the messages that are being sent or received. So for certain contexts ontologies must be provided that can be registered at AC instances.Instances of these ontologies can then be used as common language between AC instances and can also be asserted to,retracted or retrieved from the knowledge base.The following services are provided by the AC for the ontologies concept:(1)addOnto(register an ontology at the AC instance).(2)removeOnto(deregister an ontology from the AC instance).Slots.Slots are entities of AC instances that hold information about com-munication partners(other agents).Communication pathways between AC in-stances can be created w.r.t.customized by connecting and changing slots,in this wayfilling the slots with the required destinations(other AC instances) for communication,and then messages can be sent and received via the created pathways.The following services are provided by the AC for the slot concept:(1)addSlot(adds a slot for communication partners to AC instances).(2)removeSlot(removes a slot from AC instances).(3)connectSlot(fills a slot with destinations).(4)disconnectSlot(removes a destination from a slot).ProcessComponents.A PC represents a certain behaviour that can be added and removed to an AC instance.(1)addPC(adds a PC to an AC instance).(2)removePC(removes a PC from an AC instance).When a PC has been added to an AC instance the PC has full use of all services that the AC provides(see Fig.2).I.e.the PC is able to assert,re-tract,retrieve resources,to send and receive messages and moreover to use all the services listed in the StructuralInterface(see Fig.2).So every PC imple-ments an activity graph that consists of assert-,retract-,retrieve-,send-,receive-, StructuralInterface-or custom activities.In this way a PC defines which input it requires(retrieve,receive)and output it delivers(assert,retract,send,Struc-turalInterface services).By adding or removing PCs from an AC instance a system developer or user can determine the appearance(the structure of an AC instance,see StructuralInterface in Fig.2)and the behaviour of an AC.That a PC determines a part of the behaviour of an AC instance is obvious,because a PC implements a certain workflow,represented by an activity graph.That a PC has the ability to determine the appearance of an AC instance is not so obvious and must be explained.We have mentioned before that a PC can use all the services that are included in the StructuralInterface.All these services define the appearance of an AC instance and are ment to customize the struc-ture of an AC instance.On the one hand we want the user or system developer to do this structural customization graphically and on the other hand the PCs can implement behaviours that customize and determine the structure of an ACThe AgentComponent Approach,Combining Agents,and Components5 instance.And therefore a PC has the ability to determine the appearance of an AC instance by using the StructuralInterface services.Fig.2.AgentComponent ServicesIntra-agent and Inter-agent Workflow.We have not yet talked about how AC instances or better their PCs can work together and define a work-flow.This is important to explain,because we do not provide a workflow control within an AC and leave the workflow and its control to the PC implementor. The PCs themselves are supposed to work autonomously,i.e.PCs describe only their own workflow by defining what they require(receive,retrieve)and what they deliver(send,assert,retract,StructuralInterface services)not caring about the overall workflow.The way a workflow between two or more PCs is handled must be divided into two concepts,the inter-agent and the intra-agent workflow. Obviously the inter-agent workflow between AC instances is handled by send-ing and receiving messages using the pathways between AC instances.These pathways are stored in the slots and can be changed using the“connectSlot”or “disonnectSlot”service.Whereas the assert,retract and retrieve services handle the intra-agent workflow(workflow within an AC),by changing the knowledge base and therefore making resources available for other PCs(of the same AC instance)that wait for these resources.In this way we use the knowledge base as a“shared memory”for input and output variables,that can be used by all added PCs.The following services must be provided by an AC for the inter-agent workflow concept:(1)send(sending messages to other AC instances).(2)receive(receiving messages from other AC instances).Putting all the mentioned concepts together the PC implementor has to provide:6R.Krutisch,P.Meier,and M.Wirsing(1)The implementation of the PC,where all services of the AC can be used to send,receive messages,to retrieve,assert and retract resources from the knowl-edge base and to customize the structure.(2)The PC description,where one must provide:(2.1)The description of all ontologies,that are required by the PC,(2.2)the information about required slots for the inter-agent communica-tion and(2.3)the description of the workflow of the PC(mainly the description of the usage of the services),so that new PC providers understand the activities w.r.t.the behaviour of the PC.Projects and AgentGroups.Agents are loosely coupled entities by na-ture,that communicate using messages and protocols and that are not directly aware of other agents around them(only indirectly via the AMS or the DF). We introduce the term Project as a special case of a PC.A Project normally describes an unspecified task,e.g.an AC instance does not know which other ACs are able to assist in collaboratively executing a task.So this AC has to look for one or more ACs that can handle this task.After this search they will join for this special PC at runtime and split up afterfinishing the Project.Projects are normally described by1:n protocols and have a highly dynamic character. What misses in this highly dynamic environment is the fact that software sys-tems only in some cases need such dynamic character.So,beside the Projects, we see the necessity to be able to connect the ACs directly using the before introduced slots.So we are able to build up an acquaintance net(AgentGroup) with an organization structure according to the pathways described in the slots. System developers or users will be able to create AgentGroups graphically using a tool,whereas Projects normally construct their organization structure and in-formation pathways during runtime.The following services must be additionally provided by an AC for the AgentGroup concept:(1)addAC(adds an AC to the AgentGroup of an existing AC instance).(2)removeAC(removes an AC instance from an AgentGroup).Fig.3.Constructing a Simple AgentGroupThe AgentComponent Approach,Combining Agents,and Components7 Example.To illustrate these basic concepts of the AC approach we describe a very small example.In this example(see Fig.3)we describe the construction of a simple system,assuming that there exists a tool that supports the construction graphically.Furtheron,we assume that three PCs and their information descrip-tion about ontologies,slots and behaviours are available.So we can use the three PCs called P1to P3.P1asserts an ontology object named XY to the knowledge base.P2retrieves an XY ontology object and wants to send it to any AC in-stance available(we do not know to which AC instance we want to send so far, depends on the entries in the used slot).P3receives a message containing an XY ontology object and asserts it to the ACs’knowledge base.P2and P3provide a description for the ontologies and for the slots they need during their workflow. First of all we create two idle AC instances named Richard and Philipp.Before we add any PC to Richard or Philipp we need to customize the structure of the both AC instances to make the intra-agent and inter-agent workflow of the PCs working.I.e.as we want to add P1and P2to Richard and P3to Philipp,Richard and Philipp need the slots and the ontologies according to the PC descriptions. After creating a slot it can befilled with any destinations available,in our case we connect it with Philipp,and hereby Philipp is stored as a destination in a slot of Richard.By adding all this structural information and then adding the PCs as mentioned before we define on the one hand an intra-agent workflow where P2 requires the output(retrieve(XY))of P1(assert(XY)).And on the other hand we define an inter-agent workflow between P2(send(XY))added to Richard and P3(receive(XY))added to Philipp.After adding the PCs their behaviours start immediately and the workflow is executed(see Fig.3).Summary.We have shown an AC that provides three interfaces(Inter-AgentWorkflowInterface,IntraAgentWorkflowInterface and StructuralInterface) including common services every agent requires.System developers do not have to implement the AC,they just need to instantiate the AC as often as they require it.Tofill the ACs with life PCs must be provided by the developers which then can be added to the AC instances.This results in an ACS(Agent Component System-assembled of ACs)which uses customized inter-agent com-munication(achieved by the concept of slots and ontologies)and uses customized intra-agent communication(achieved by the concept of PCs using the knowledge base).3Component-Oriented Development Process for AC-SystemsFor constructing ACS(AgentComponent Systems)we propose a component-based software development process fully based on UML models[9].We extend this process with the AC features and explain how we model these features.Ac-cording to[9]we have four main phases in the AC development process:(1)Requirements,(2)AC Identification,(3)AC Interaction and(4)AC Speci-fication.8R.Krutisch,P.Meier,and M.WirsingWe concentrate in this paper on the construction phase of ACS that mainly takes place in the AC Identification and the AC Interaction phases.As a descrip-tion of all phases would go beyond the scope of this paper we will not describe the AC Specification step,because it is mainly a refinement of identification and interaction using e.g.OCL(object constraint language)to model pre-and post-conditions of PCs.For the same reason we skip the requirements phase,though it is a very important phase,as it delivers the input,like business processes,busi-ness objects,actors and use case diagrams,that we need for the design phases (identification,interaction,specification).Fig.4.Constructing AC InstancesAC Identification.Taking the input of the requirements phase we identify in this phase the agents(AC instances),roles and processes(PCs).We put all this infor-mation together to allocate the PCs to the AC instances and use UML-Use-Case diagrams[7,2]to model each AC instance with its PCs.These tailored Use-Case diagrams show AC instances and their PCs using stereotypes for AgentCompo-nent(•AC¡),ProcessComponent(•PC¡)and Project(•Project¡).In the exam-ple we have identified four AC instances(see Fig.4)named Manager,Buyer, Producer and Seller and added different PCs to these AC instances.In the fol-lowing we explain the Manager.In this small example we expect a Customer to order any Product at the Manager.The Manager itself has the Manager-like PCs added,that will initialize the Buyer to purchase all the parts,initialize the Producer to build any Product and initialze the Seller to sell the Product to the Customer.Particularly the process of identifying the ACs in this example shows the way how ACS can be applied in practice.We start taking a found“real orga-nization structure”(e.g.the organization structure of a certain company)from the requirements phase.ACS can map the“real organization structure”to the virtual organization structure where every organization element(unit,actor)is represented by an AC instance.In the example we have mapped a company structure consisting of four units Manager,Buyer,Producer and Seller to four AC instances with the same name.The AgentComponent Approach,Combining Agents,and Components9 AC Interaction.During this phase we describe the interaction between the AC instances we have found in the AC identification phase.We have following steps to do:(1)Modeling the organization structure,(2)defining the context ontologies and(3)describing the workflow of the identified PCs.anization StructureModeling the organization structure.Here we describe the organization structure in an instantiated component model consisting of AC instances,yellow page services and white page services(see Fig.5).This organization structure describes the acquaintance model(we call it AgentGroup)according to the path-ways(stored in the slots)between the AC instances we have identified.Just to remember,we have identified the PCs before and therefore we have the PC de-scription and the information which structural elements are required.For the organization structure we mainly need the slot information.The required slots must be created andfilled with communication pathways(destinations)and that is what we model in this component diagram.If an AC instance(such as Buyer) includes a Project,that has dynamic behaviour and constructs its acquaintances during runtime,we model this by an association to the yellow or white pages (see Fig.5).Defining the context ontologies.In this step we define a context ontology for the AgentGroup.This ontology must describe all the concepts that the PCs need within their workflow.Fig.6provides an example ontology for purchasing, producing and selling cars modeled by a UML class diagrams.Describing the workflow of the identified PCs.This step models the workflow of the identified PCs using UML activity diagrams[12].In these di-agrams we focus mainly on the WFInterface services assert,retrieve,retract, receive and send that the PCs use during their workflow.To disburden the ac-tivity diagrams we use an additional service named change,that models the change of an ontology instance in the knowledge base.We use one activity di-agram for each PC.The ACs are represented by the swimlanes of the activity ing these swimlanes we model the inter-agent workflow by sending objectflow states from one swimlane to another according to the created and10R.Krutisch,P.Meier,and M.WirsingFig.6.Ontology exampleFig.7.Activity Diagram for PC“purchase”added to AC instance“Manager”connected slots.The intra-agent communication is handled by the asserted,re-tracted,changed and retrieved statements.E.g.a PC waits(retrieve)until a special ontology object has been asserted(assert)by another PC of the same AC instance.4Tool SupportCurrently we are developing the“AgentComponent Tool”(see Fig.8)which allows one to build MAS graphically consisting of ACs as introduced in this paper(see section2).This tool is based upon the JADE[8]framework for MAS and already provides following features:(1)Distributed construction and runtime customization of ACS[15],(2)cstomizing the structure of the AC instances by different users and PCs,(3)setting customizing permissions for different users,(4)creating non-ACs and storing them in the slots of AC instances,(5)using the InterAgent-and IntraAgentWorkflow services during runtime via introspection.The AgentComponent Approach,Combining Agents,and Components11Fig.8.AgentComponent Tool5Related WorkAlthough there exist many development and modeling approaches for agents[1, 3,10],the combination of agents and components is quite a new researchfield in agent technology.In our approach we borrow some concepts from existing works,e.g.the role model from[3],the activity diagram interaction protocols from[10,12](but in contrary to[10]we prefer a component-and model-oriented instead of a view-oriented development method)and different kinds of diagrams from the UML.And moreover we include combined agent and component technology aspects into these concepts.[5]also describes a component-based design method for agents.In contrast to[5]we have no compositional processes and knowl-edge,instead we have autonomously working processes(PCs).Moreover our AC provides infrastructure services but no workflow control for the processes as pro-posed by[5].The AC approach does not focus on certain agent types like weak agents,strong agents or BDI-agents.The PCs can be implemented more or less intelligently,with beliefs,desires and goals or only with normal task execution functionality.6Concluding RemarksAgent technology is a complex software technology.To make this technology easier to understand we need to encapsulate the complex concepts of agent tech-nology in order to disburden the development of agent systems.And we found12R.Krutisch,P.Meier,and M.Wirsingthe component technology as a suitable means to disburden agent software de-velopment by making certain agent concepts customizable(see section2)and reusable(AgentComponent).For this purpose we have defined the AC as a com-ponent that provides certain services(the interfaces of the AC)for every agent. In this way we can instantiate and reuse the AC for every agent we want to build and instantiated ACs can be customized in the following ways:(1)customizing the structural elements of the AC instance(achieved by the services of the Struc-turalInterface),(2)customizing the inter-agent communication(achieved by the concept of slots)and(3)customizing the intra-agent communication(achieved by the concept of PCs using the knowledge base).References1.Agent UML..2.Bernd Oesterreich.Objektorientierte Softwareentwicklung.Oldenbourg,1998.3.David Kinny,Michael Wooldridge,Nicholas Jennings.The GAIA Methodology forAgent-Oriented Analysis and Design.Journal of Autonomous Agents and Multi-Agent Systems3,pages285–312,2000.4.Desmond Francis D’Souza,Alan Cameron Wills.Objects,Components and Frame-works With UML.Addison Wesley,1999.5.Frances M.T.Brazier,Catholijn Jonker,Jan Treur.Principles of Component-BasedDesign of Intelligent Agents.Data and Knowledge Engineering,41:1–28,1998.6.Frank Griffponentware.dpunkt.verlag,1998.7.Grady Booch,James Rumbaugh,Ivar Jacobson.The Unified Modeling LanguageUser Guide.Addison Wesley,1998.8.The JADE Programmers’Guide.http://sharon.cselt.it/projects/jade/.9.John Cheesman,John Daniels.UML Components,A Simple Process for SpecifyingComponent-Based Softfware.Addison Wesley,2001.10.Juergen Lind.The MASSIVE Development Method for Multiagent Systems.InProceedings of the Fifth International Conference on the Practical Application of Intelligent Agents and Multi-Agents(PAAM2000),2000.11.Juergen Lind.Relating Agent Technology and Component Models,2001.12.Juergen Lind.Specifying Agent Interaction Protocols with Standard UML.InProceedings of the Second International Workshop on Agent-Oriented Software En-gineering(AOSE-2001),2222,2002.13.M.Wooldridge and P.Ciancarini.Agent-Oriented Software Engineering:The Stateof the Art.Agent-Oriented Software Engineering.Springer-Verlag Lecture Notes, 1957,2001.14.Nick R.Jennings et al.Agent-Based Business Process Management.ACM SIG-MOD Record27,pages32–39,1998.15.Philipp Meier,Martin Wirsing.Implementation Patterns for Visual Constructionof Multi-Agent-Systems,Technical Report.rmatik.uni-muenchen.de/publications/acpatterns.pdf.。