Understanding Mobile Q&A Usag e

合集下载

自动驾驶地图的数据标准比较研究

自动驾驶地图的数据标准比较研究

E-mail:***********.cn Website: Tel: ************©中国图象图形学报版权所有中国图象图形学报JOURNAL OF IMAGE AND GRAPHICS中图法分类号:P208 文献标识码: A 文章编号:1006-8961(2021)01-0036-13论文引用格式:Zhan J ,Guo C,Lei T T ,Q u Y Q,W u H B and I‘iu J N. 2021. Comparative study on data standards of autonomous driving map. Journaloflmage and (>aPhicS ,26(01):0036-0048(詹骄,郭迟,雷婷婷,屈宜琪,吴杭彬,刘经南.2021.自动驾驶地图的数据标准比较研究.中国图象图形学报,26(01) :0036-0048〉[D 01:10. 11834/jig. 200414]自动驾驶地图的数据标准比较研究詹骄1,郭迟。

2,雷停婷3,屈宜琪4,吴杭彬4,刘经南1I .武汉大学卫星导航定位技术研究中心,武汉430079; 2.武汉大学人工智能研究院,武汉430079;3.武汉大学测绘学院,武汉430079:4.同济大学测绘与地理信息学院,上海200092摘要:作为实现汽车自动驾驶的关键基础设施,自动驾驶地图能够提供大量准确且语义丰富的数据来帮助用户 以更精细的尺度了解周边环境状况,辅助感知、定位、驾驶规划与决策控制,满足智能时代多种高层次的应用需求, 进而切实推动我国自动驾驶相关领域的发展与商业化应用。

自动驾驶地图的数据标准作为自动驾驶地图生产应 用的指导性规范之一,是自动驾驶地图数据标准化的基准。

当前我国自动驾驶相关领域对自动驾驶地图标准化的 需求迫切,地图数据标准化已成为业界共同关注的热点问题。

为解决自动驾驶地图数据标准化问题,切实推动自 动驾驶地图的高效发展,本文对自动驾驶地图的数据标准进行比较研究。

26字母开头的工作英语单词

26字母开头的工作英语单词

26字母开头的工作英语单词英语是当前的国际语言,交流、学习、工作中都需要使用英语,因此掌握一些常用的工作英语单词非常必要。

而英语中的26个字母则是我们组成单词最基本的元素,因此今天我们将围绕“26字母开头的工作英语单词”展开讲解。

一、A类单词1. Account(账户):指在银行或公司开立的资金账户。

2. Application(申请):指申请工作、学校或者某个特定的项目/服务。

3. Advertising(广告):指用于推广产品或服务的一种方式或工具,例如电视广告或社交媒体广告等。

二、B类单词1. Business(商业):指商业领域或公司的日常运营。

2. Budget(预算):指安排预算或开支计划的工作。

3. Bank(银行):负责处理账户和资金交易的金融机构。

三、C类单词1. Communication(沟通):指在不同情境中与人们交流的过程,包括口头和书面沟通。

2. Customer(顾客):指前来购买产品或者使用服务的消费者,是推动商业活动的重要力量。

3. Cash(现金):指以硬币或纸币作为支付方式。

四、D类单词1. Deadline(截止日期):指需要完成一项工作的时限。

2. Database(数据库):指存储和管理数据的系统或工具,例如客户数据库或雇员数据库。

3. Design(设计):指用于创造东西,例如产品、网站或建筑物的设计。

五、E类单词1. Email(电子邮件):指通过互联网发送和接收邮件的电子邮件系统。

2. Event(活动):指聚集人们在一起共同参加某项活动,例如会议、展览会和演出等。

3. Equipment(设备):指用于完成某项工作或操作的物品,例如办公室设备或运动器材。

六、F类单词1. Finance(金融):指用于管理资金或财务的活动或领域。

2. Feedback(反馈):指接收或提供反馈信息的过程,例如员工表现反馈或产品反馈等。

3. Fax(传真):指使用电话线传输图像或文字文件的设备或系统。

Our Mobile Planet 谷歌法国手机行业消费者消费行为调查报告

Our Mobile Planet 谷歌法国手机行业消费者消费行为调查报告

Google Confidential and Proprietary
4
SMARTPHONES ARE INDISPENSABLE
TO DAILY LIFE
Google Confidential and Proprietary
5
Smartphone Penetration is on the Rise
Google Confidential and Proprietary
9
Allowing Users to Stay Fully Connected
Emailing
62%
access the Internet on their smartphones at least once a day
55%
Search Engines
Smartphones are Indispensable to Daily Life Smartphones Have Transformed Consumer Behavior Smartphones Help Users Navigate the World Smartphones Change the Way Consumers Shop Smartphones Help Advertisers Connect with Customers
48%
Social Networking Sites
43%
Video sharing Sites
19%
Base: Private smartphone users who use the internet in general, Smartphone n= 1.000 Google Confidential and Proprietary Q9: Using the scale below, please indicate approximately how frequently you use the Internet in general and specific services and types of websites through your browser or apps on your smartphone? Responses reflect at least once a day.

2021年12月英语六级听力原文和中文

2021年12月英语六级听力原文和中文

2021年12月英语六级听力原文和中文全文共3篇示例,供读者参考篇1I'm sorry, but I am unable to provide verbatim excerpts of copyrighted content such as the original text of the December 2021 English CET-6 listening test. However, I can provide a brief summary of the content and offer tips on how to improve your listening skills for the exam.Summary of the December 2021 English CET-6 Listening Test:The December 2021 English CET-6 listening test consisted of various sections covering different topics such as academic lectures, conversations, news reports, and interviews. The test aimed to assess the test taker's ability to comprehend spoken English in a variety of contexts, including academic and everyday situations. The test included questions on main ideas, details, inferences, and speakers' attitudes or opinions.Tips to Improve Your Listening Skills for the English CET-6 Exam:1. Practice Regularly: Listen to English audio materials such as podcasts, news broadcasts, and academic lectures regularly to improve your listening skills.2. Focus on Understanding Main Ideas: Pay attention to the main ideas and key details in spoken passages rather than getting caught up in every single word.3. Note Taking: Develop the habit of taking notes while listening to improve your retention of key information.4. Predict Answers: Try to anticipate the answers to questions as you listen to the audio passage to focus on relevant information.5. Familiarize Yourself with Different Accents: Listen to a variety of English accents to improve your ability to understand different speakers.By following these tips and practicing consistently, you can improve your listening skills and perform well on the English CET-6 listening test. Good luck with your exam preparation!篇2The 2021 December English Cet-6 Listening Test includes four sections: conversations, talks, news reports, and discussions.Each section contains two to three questions. Now, let's take a closer look at the original English script and the Chinese translation of the listening materials:Section A: Conversations (Questions 1-3)Conversation 1Man: Hey Lisa, are you free this weekend?Woman: Not really. I have a lot of assignments to finish.Man: How about going hiking on Sunday morning? It will be a great way to relax.Woman: That sounds like a good idea. I'll check my schedule and let you know.Conversation 2Woman: Did you hear about the new coffee shop that opened on Main Street?Man: Yes, I did. I heard they have the best cappuccino in town.Woman: Let's go there for a cup of coffee tomorrow morning. What do you say?Man: Sure, I'm in. I could use a good cup of coffee.Section B: Talks (Questions 4-6)Talk 1Speaker: Good morning, everyone. Today, I would like to talk about the importance of time management for students. It's essential for students to prioritize their tasks and allocate their time wisely to achieve academic success. In this talk, I will provide some tips on how to effectively manage your time as a student.Talk 2Speaker: Hello, everyone. In this talk, I will discuss the impact of social media on teenagers' mental health. With the rise of social media platforms, teenagers are exposed to unrealistic beauty standards and cyberbullying, which can negatively affect their self-esteem and mental well-being. It's crucial for parents and educators to be aware of these issues and provide support to teenagers in managing their social media use.Section C: News Reports (Questions 7-9)News Report 1Reporter: In local news, a new community center is set to open next month in the downtown area. The center will offer a variety of recreational activities for residents, including fitness classes, art workshops, and community events. The openingceremony is scheduled for December 15th, and all are welcome to attend.News Report 2Reporter: In international news, a recent study has found that the global economy is rebounding from the impact of the COVID-19 pandemic. Despite ongoing challenges, such as supply chain disruptions and inflation, experts are optimistic about the economic recovery in the coming year.Section D: Discussions (Questions 10-12)Discussion 1Woman: I think we should invest in renewable energy sources to combat climate change.Man: I agree. Solar and wind power are sustainable alternatives to fossil fuels.Woman: It's important to reduce our carbon footprint and protect the environment for future generations.Discussion 2Man: Social media has revolutionized communication, but it also has its drawbacks.Woman: That's true. People need to be mindful of their online interactions and prioritize face-to-face communication.Man: We should strike a balance between technology and human connection.中文翻译:2021年12月英语六级听力测试包括四个部分:会话,讲话,新闻报道和讨论。

新教材2023年高中英语 Unit 1 Section Ⅲ课件 新人教版必修第二册

新教材2023年高中英语 Unit 1 Section Ⅲ课件 新人教版必修第二册

17.___q_u_a_li_ty____ n. 质量;品质;素质;特征 adj. 优质的;高质
量的 →____q_u_a_n_ti_ty___ n. 量;数量
18.___tr_a_d_it_io_n_____ n. 传统;传统的信仰或风俗 →____tr_a_d_it_io_n_a_l____ adj. 传统的 →____tr_a_d_it_io_n_a_l_ly_____ adv. 传统地
Cutting off Internet addiction was a long and painful process for the children.
戒网瘾对孩子们来说是个漫长且痛苦的过程。 The car is in (the) process of repair. 这辆汽车正在修理中。
4.What’s the purpose of sharing digital photos over the Internet? ___D___
A.To make more money by selling them. B.To promote the website about the Mogao Caves. C.To teach people more knowledge about culture. D.To promote people’s interest and call on people to protect cultural relics.
development. ②___In___ the process, the children learn to deal with difficulties. ③This cloth is finally processed ___in_t_o___ a suit. 完成句子 ④The music is ___in__th_e__p_ro_c_e_s_s_o_f___ being written. 这首音乐正在创作中。

Nokia 7250 IXR-10 IXR-6 IXR-s 集成路由器说明书

Nokia 7250 IXR-10 IXR-6 IXR-s 集成路由器说明书

Interconnect routers complement IP edge and core router platforms to deliver enhanced, cost-effective IP network architectures. The 7250 IXR delivers a comprehensive set of IP/MPLS, synchronization and quality of service (QoS) capabilities. Flexible traffic management includes big buffering, per-port queuing, shaping and policing.High-density aggregationThe 7250 IXR is optimized for high-density aggregation, supporting up to 57.6 Tb/s(7250 IXR-10), 28.8 Tb/s (7250 IXR-6) or 1.6 Tb/s (7250 IXR-s) of system capacity, and is equipped with high-performance 100GE (Gigabit Ethernet), 50GE 2, 40GE, 25GE, 10GE and GE interfaces to scale networks to meet evolving traffic demands.Differentiated service supportPer-service, hierarchical queuing features support differentiated QoS, which is ideal for any-Gaggregation and fixed-mobile network convergence. These features also help industrial enterprises attain IT/OT (informational technology/operational technology) convergence by simultaneously carrying both their business and operational traffic.Nokia 7250 IXR-10/IXR-6/IXR-s Interconnect RoutersRelease 20The Nokia 7250 Interconnect Router (IXR) family addresses evolving demands driven by the cloud, 5G and the Internet of Things. The IXR-10, IXR-6 and IXR-s1 routers enable high-scale interconnectivity in data centers and across WANs and aggregation networks in service provider, enterprise and webscale environments.7250 IXR-107250 IXR-s7250 IXR-61 The 7250 IXR-10, IXR-6 and IXR-s are part of the 7250 IXR product family. Additional data sheets are available for other models in this product family.The 7250 IXR10, IXR-6 and IXR-s are referred to collectively as the 7250 IXR throughout this data sheet.2 50GE is a future software deliverable.High availabilityThe 7250 IXR sets the benchmark for high availability. The 7250 IXR-10 and IXR-6 systems support a full suite of 1+1 control, 5+1 fabric,and redundant fan and power configurations.In addition to full hardware redundancy, the robust Nokia Service Router Operating System (SR OS) supports numerous features to maximize network stability, ensuring that IP/MPLS protocols and services run without interruption. These features include innovative nonstop routing, nonstop services and stateful failover. AutomationThe 7250 IXR uses the Nokia SR OS and is managed by the Nokia Network Services Platform (NSP). The Nokia NSP offers a rich set of service management features that automate new service delivery and reduce operating cost.Standards-based software-defined networking (SDN) interfaces enable best-path computation to be offloaded to path computation elements (PCEs) such as the Nokia NSP. The 7250 IXR operates as a path computation client (PCC), collecting and reporting per-link and per-service delay, jitter and loss metrics as well as port utilization levels, for efficient path computation. Software featuresThe 7250 IXR supports, but is not limited to,the following features.Services• Point-to-point Ethernet pseudowires/virtual leased line (VLL)• Ethernet Virtual Private Network (EVPN)–Virtual Private Wire Service (EVPN-VPWS)–Virtual Private LAN Services (EVPN-VPLS):IPv4 and IPv6 support, including VirtualRouter Redundancy Protocol (VRRP)–Multihoming with single active or active/active • Multipoint Ethernet VPN services with VPLS based on Targeted Label Distribution Protocol (T-LDP) and Border Gateway Protocol (BGP)• Routed VPLS with Internet Enhanced Service (IES) or IP-VPN, IPv4 and IPv6• Ingress and egress VLAN manipulation for Layer 2 services• IP VPN (VPRN), Inter-Autonomous System (Inter-AS) Option A, B and C• IPv6 VPN Provider Edge (6VPE)Network protocols• Segment routing–Intermediate System-to-Intermediate System(SR-ISIS) and Open Shortest Path First(SR-OSPF)–Traffic engineering (SR-TE)• MPLS label edge router (LER) and label switching router (LSR) functions–Label Distribution Protocol (LDP)–Resource Reservation Protocol with trafficengineering (RSVP-TE)• BGP - Labeled Unicast (BGP-LU) (IETF RFC 3107) route tunnels• IP routing–Dual-stack Interior Gateway Protocol (IGP)–Multi-topology, multi-instance IntermediateSystem to Intermediate System (IS-IS)–Multi-instance OSPF–Multiprotocol BGP (MP-BGP)–BGP-LU support in edge, area border router(ABR) and autonomous system boundaryrouter (ASBR) roles–Usage-triggered download of BGP labelroutes to Label - Forwarding Information Base(L-FIB)–Accumulated IGP (AIGP) metric for BGP–BGP route-reflector for EVPN and IP-VPNwith VPNv4 and VPNv6 address families (AFs) • Layer 3 Multicast – base routing–Internet Group Management Protocol (IGMP)–Protocol Independent Multicast – Sparse Mode(PIM-SM), Source Specific Multicast (SSM)–Multicast Listener Discovery (MLD)• Layer 3 Multicast - VPRN (7250-IXR-s)–Next-generation multicast VPNs (NG-MVPN)–SSM with multicast LSPv4 (mLDPv4)–IGMP/MLD–IGMP/MLD on Routed VPLS Interface• Layer 2 Multicast–IGMP/MLD snoopingSDN• SR-TE LSPs, RSVP-TE LSPs–PCC initialized, PCC controlled–PCC initialized, PCE computed (7250 IXR-s)–PCC initialized, PCE controlled (7250 IXR-s)• SR-TE LSPs: PCE initialized, PCE controlled(7250 IXR-s)• Topology discovery: BGP-Link State (BGP LS) IPv4 and IPv6• Telemetry: streaming interface, service delay and jitter statisticsLoad balancing and resiliency• Nonstop routing (IXR-10 and IXR-6)• Segment routing topology independent and remote loop-free alternate (TI-LFA and rLFA)• LDP LFA• IEEE 802.3.ad Link Aggregation Group (LAG) and multi-chassis (MC) LAG• Pseudowire and LSP redundancy• IP and MPLS load balancing by equal-cost multipath (ECMP)• VRRP• Configurable polynomial and hash seed shift • Entropy label (IETF RFC 6790)• RSVP-TE Fast Reroute (FRR)• BGP Edge and Core Prefix Independent Convergence (BGP PIC)Platform• Ethernet IEEE 802.1Q (VLAN) and 802.1ad (QinQ) with 9k jumbo frames• Detailed forwarded and discarded countersfor service access points (SAPs) and network interfaces in addition to port-based statistics: per Virtual Output Queue (VoQ) packet and byte counters (7250 IXR-s)• Dynamic Host Configuration Protocol (DHCP) server for IPv4 IES, VPNv4• DHCP relay, IPv4 and IPv6, IES, IP-VPN,EVPN-VPLS• Accounting recordsQoS and traffic management• Hierarchical QoS (7250 IXR-s)–Hierarchical egress schedulers and shapersper forwarding class, SAP, network interfaceor port–Port sub-rate• Intelligent packet classification, including MAC, IPv4, IPv6 match-criteria-based classification • Granular rate enforcement with up to 32 policers per SAP/VLAN, including broadcast, unicast, multicast and unknown policers• Hierarchical policing for aggregate rate enforcement• Strict priority, weighted fair queuing schedulers • Congestion management via weighted random early discard (WRED)• Egress marking or re-markingSystem management• Network Management Protocol (SNMP)• Model-driven (MD) management interfaces–Netconf–MD CLI–Remote Procedure Call (gRPC)• Comprehensive support through Nokia NSPOperations, administration and maintenance • IEEE 802.1ag, ITU-T Y.1731: Ethernet Connectivity Fault Management for both fault detection and performance monitoring, including delay, jitter and loss tests• Ethernet bandwidth notification with egress rate adjustment• IEEE 802.3ah: Ethernet in the First Mile• Bidirectional Forwarding Detection IPv4 and IPv6• Two-Way Active Measurement Protocol (TWAMP), TWAMP Light• A full suite of MPLS OAM tools, including LSP and virtual circuit connectivity verification ping • Service assurance agent• Mirroring with slicing support:–Port–VLAN–Filter output: Media Access Control (MAC),IPv4/IPv6 filters–Local/remote• Port loopback with MAC swap• Configuration rollback• Zero Touch Provisioning (ZTP) capable (7250 IXR-s) Security• Remote Authentication Dial-In User Service (RADIUS), Terminal Access ControllerAccess Control System Plus (TACACS+), and comprehensive control-plane protection capabilities• MAC-, IPv4- and IPv6-based access control lists and criteria-based classifiers• Secure Shell (SSH)Hardware overview7250 IXR-10 and IXR-6 platformsThe 7250 IXR-10 and IXR-6 share common integrated media module (IMM) cards, control processor modules (CPMs) and power supplyunits (PSUs).Each chassis uses an orthogonal direct cross-connect architecture, with IMMs connecting in front and switch fabrics and fans connecting at the rear. The lack of a backplane, midplane or midplane connector system provides a compact chassis design, optimal cooling and easy capacity upgrades. The 7250 IXR supports a 5+1 switch fabric design for full fabric redundancy with graceful degradation. Fans and switch fabrics are separate, ensuring a complete separation of cooling from the dataplane and enabling non-service-impacting fan replacement options. The system uses a complete Faraday Cage design to ensure EMI containment, a critical requirement for platform evolution that will support next-generation application-specific integrated circuits (ASICs).7250 IXR-10 and IXR-6 control plane Control-plane performance is a key requirementin networking. Multicore CPUs with support for symmetric multiprocessing (SMP) provide leading capabilities in task distribution and concurrent processing, leveraging the hardened capabilitiesof the SR OS. This is a capability common to all platforms in the 7250 IXR product series.The 7250 IXR-10/IXR-6 supports dual-redundant CPMs for hot-standby control-plane redundancy and supports a fully distributed control infrastructure with dedicated CPUs per line card. Compared to single monolithic control plane systems, this distributed architecture provides optimized control plane processing without any detrimental impacts to the central CPM during system maintenance, IMM commissioning and heavy data loads. The distributed architecture also improves system security.Power suppliesThe 7250 IXR-10/IXR-6 platforms support 12and 6 PSUs respectively, allowing for full N+M(N is active and M is the number of protecting power supplies) power supply redundancy and full power feed redundancy. In contrast to systems with fewer power supplies, the 7250 IXR provides added headroom for power growth for system enhancements with next-generation ASICs.On the IXR-10/IXR-6, two PSU variants are available: a low-voltage DC PSU (LVDC) and a combined high-voltage DC (HVDC) and AC PSU. The PSUs are fully interchangeable between the chassis variants. The HVDC PSU option enables OPEX and CAPEX savings as a result of the power-supply and infrastructure design.The 7250 IXR-s supports two PSUs with 1+1 redundancy with support for either AC or LVDC power options.Technical specificationsTable 1. 7250 IXR6-10/IXR-6/IXR-s specificationsSystem configuration Dual hot-standby CPMs Dual hot-standby CPMs Single integrated CPM System throughput:Half duplex (HD) IMIXtraffic57.6 Tb/s28.8 Tb/s 1.6 Tb/sSwitch fabric capacity per module: Full duplex (FD) • 5.76 Tb/s• Single-stage fabric with gracefuldegradation• Separate fan tray from switch fabric• 2.88 Tb/s• Single-stage fabric with gracefuldegradation• Separate fan tray from switch fabricIntegratedCard slot throughput:FD per slot3.6 Tb/s 3.6 Tb/s n/aCard slots84n/aService interfaces n/a n/a• 6 x QSFP28/QSFP+100/40GE• 48 x SFP+/SFP 10/1GEControl interfaces Console, management, Synchronous Ethernet (SyncE)/1588, OES, BITS,Bluetooth, USB*, 1PPS, SD slot Console, management, USB, SD slotTiming and synchronization • Built-in Stratum 3E clock• ITU-T Synchronous Ethernet (SyncE)• IEEE 1588v2–Boundary clock (BC), slave clock (SC)–Profiles: IEEE 1588v2 default, ITU-T G.8275.1• Nokia Bell Labs IEEE 1588v2 algorithm• IETF RFC 5905 Network Time Protocol (NTP)• Building Integrated Timing Supply (BITS) ports (T1, E1, 2M) and pulse-persecond (1PPS) timing• Built-in Stratum 3E clock• ITU-T SyncE• ITU-T G.8262.1 eEEC• IEEE 1588v2–BC–Profile: ITU-T G.8275.1• ITU-T G.8273.2 Class B, C**• IETF RFC 5905 NTP• Support for GNSS SFPMemory buffer size Per card (see T able 2)Per card (see T able 2)8 GBRedundant hardware• Dual redundant CPMs• Switch fabric redundancy (5+1)• Power redundancy (M+N)• Fan redundancy (N+1)• Power redundancy (1+1)• Fan redundancy (5+1)Dimensions• Height: 57.78 cm (22.75 in);13 RU• Width: 44.45 cm (17.5 in)• Depth: 81.28 cm (32.0 in)Fits in standard 19-in rack • Height: 31.15 cm (12.25 in);7 RU• Width: 44.45 cm (17.5 in)• Depth: 81.28 cm (32.0 in)Fits in standard 19-in rack• Height: 4.35 cm (1.75 in);1 RU• Width: 43.84 cm (17.26 in)• Depth: 51.5 cm (20.28 in)Fits in standard 19-in rack* Future software deliverable** Class C for noise generation. Future support for RS-FEC.Power• 12 PSUs with N+M redundancy• LVDC (single feed): -40 V DC to-72 V DC• HVDC: 240 V to 400 V• AC: 200 V AC to 240 V AC,50 Hz/60 Hz• Front-bottom mounted • 6 PSUs with N+M redundancy• LVDC (single feed): -40 V DC to-72 V DC• HVDC: 240 V to 400 V• AC: 200 V AC to 240 V AC,50 Hz/60 Hz• Front-bottom mounted• 2 PSUs with 1+1redundancy• LVDC (single feed):-40 V DC/-72 V• AC: 200 V AC to 240 V AC,50 Hz/60 Hz• Rear mountedCooling• 3 trays of 3 ultra-quiet fans• Fan trays separate from switchfabric• Safety electronic breaks on removal• Front-to-back airflow• Fan filter door kit (optional)• 3 trays of 2 ultra-quiet fans• Fan trays separate from switchfabric• Safety electronic breaks on removal• Front-to-back airflow• Fan filter door kit (optional)• 6 trays of 1 ultra-quietfan each• Fan trays separate fromswitch fabric• Safety electronic breakson removal• Front-to-back airflowNormal operatingtemperature range0°C to +40°C (32°F to +104°F) sustainedShipping and storagetemperature-40°C to 70°C (-40°F to 158°F) Normal humidity5% to 95%, non-condensing Note: Throughout this table, n/a = not applicable.Optical breakout solutions available on QSFP28/QSFP+ ports:• 7210 IXR-10, IXR-6: 4 x 10GE and 4 x 25GE• 7210 IXR-s: 4 x 10GETable 2. Nokia 7250 IXR-10 and IXR-6 IMM cards36-port 100GE• 36 x 100GE QSFP28/QSFP+ 100/40GE• MACsec on all ports*• 48 GB packet buffer2-port 100GE + 48-port 10GE • 2 x 100GE QSFP28/QSFP+ 100/40GE • 48 x SFP+/SFP 10/1GE• MACsec on all ports*• 8 GB packet bufferTable 3. Platform density7250 IXR-s• 288 x 100/40GE• 384 x 10/1 GE + 16 x 100/40GE • 144 x 100/40GE• 192 x 10/1GE + 8 x 100/40GE• 6 x 100/40GE•48 x 10/1GE* Future software deliverableStandards compliance3Environmental• ATIS-0600015.03• ATT-TP-76200• ETSI EN 300 019-2-1; Storage Tests, (Class 1.2)• ETSI EN 300 019-2-2; Transportation Tests,(Class 2.3)• ETSI EN 300 019-2-3; Operational Tests, (Class 3.2)• ETSI EN 300 753 Acoustic Noise (Class 3.2)• GR-63-CORE• GR-295-CORE• GR-3160-CORE• VZ.TPR.9205• VZ.TPR.9203 (CO)Safety• AS/NZS 60950.1• CSA/UL 62368-1 NRTL• EN 62368-1 CE Mark• IEC 60529 IP20• IEC/EN 60825-1• IEC/EN 60825-2• IEC 62368-1 CB Scheme Electromagnetic compatibility• AS/NZS CISPR 32 (Class A)• ATIS-600315.01.2015• BSMI CNS13438 Class A• BT GS-7• EN 300 386• EN 55024• EN 55032 (Class A)• ES 201 468• ETSI EN 300 132-3-1• ETSI EN 300 132-2 (LVDC)• ETSI EN 300 132-3 (AC)• FCC Part 15 (Class A)• GR-1089-CORE• ICES-003 (Class A)• IEC 61000-3-2• IEC 61000-3-3• IEC CISPR 24• IEC CISPR 32 (Class A)• IEC 61000-6-2• IEC 61000-6-4• IEC/EN 61000-4-2 ESD• IEC/EN 61000-4-3 Radiated Immunity• IEC/EN 61000-4-4 EFT• IEC/EN 61000-4-5 Surge• IEC/EN 61000-4-6 Conducted Immunity • IEC/EN 61000-4-11 Voltage Interruptions • ITU-T L.1200• KCC Korea-Emissions & Immunity(in accordance with KN32/35)• VCCI (Class A)Directives, regional approvals and certifications • DIRECTIVE 2011/65/EU RoHS• DIRECTIVE 2012/19/EU WEEE• DIRECTIVE 2014/30/EU EMC• DIRECTIVE 2014/35/EU LVD• MEF CE 3.0 compliant• NEBS Level 3–Australia: RCM Mark–China RoHS: CRoHS–Europe: CE Mark–Japan: VCCI Mark–South Korea: KC Mark–Taiwan: BSMI Mark3 System design intent is according to the listed standards. Refer to product documentation for detailed compliance status.7Data sheetAbout NokiaWe create the technology to connect the world. Powered by the research and innovation of Nokia Bell Labs, we serve communications service providers, governments, large enterprises and consumers, with the industry’s most complete, end-to-end portfolio of products, services and licensing.From the enabling infrastructure for 5G and the Internet of Things, to emerging applications in digital health, we are shaping the future of technology to transformthe human experience. Nokia operates a policy of ongoing development and has made all reasonable efforts to ensure that the content of this document is adequate and free of material errors and omissions. Nokia assumes no responsibility for any inaccuracies in this document and reserves the right to change, modify, transfer, or otherwise revise this publication without notice.Nokia is a registered trademark of Nokia Corporation. Other product and company names mentioned herein may be trademarks or trade names of their respective owners. © 2020 NokiaNokia OyjKaraportti 3FI-02610 Espoo, Finland。

2023-2024学年度深中九年级英语第二学期模拟考试答案

2023-2024学年度深中九年级英语第二学期模拟考试答案

2023—2024学年第二学期模拟考试九年级英语答案I.完形填空(每小题1分,共10分)1-5CBDAB6-10CDAACII.阅读理解(共40分)第一节阅读理解(每小题1.5分,共22.5分)11-15BCACD16-20BADAD21-25DCDBB第二节短文填空(每小题2分,共10分)26-30EACDF第三节信息匹配(每小题1.5分,共7.5分)31-35BEACFIII.语法填空(每小题1分,共10分)36.was refused37.an38.fighting39.for40.my41.harder42.but43.successfully44.heroes45.has encouraged IV.书面表达(15分)参考作文:Dear Peter,I’m writing to invite you to attend a lecture.The lecture,which is about the famous Chinese writer Lu Xun,will be held in Room613from3p.m.to5p.m.next Friday.It will focus on Lu Xun’s life,his literary works,and his significant influence on modern Chinese literature and society.Before attending the lecture,it would be helpful to read some of Lu Xun’s works, such as A Madman's Diary and The True Story of Ah Q to gain a better understanding of him.Please remember to turn off your mobile phone and keep silent during the lecture.Besides,food or drinks are not allowed as well.I believe that this lecture will help you know more about Chinese literature and culture.I sincerely hope you can join us in this event.Looking forward to your positive response.Best wishes,Li Hua 评分标准采用整体印象法。

英语调查问卷模板使用手机

英语调查问卷模板使用手机

Introduction:This survey is designed to gather insights into the usage patterns, preferences, and experiences of mobile phone users. Your participation is crucial in helping us understand the evolving landscape of mobile technology. The survey should take approximately 10-15 minutes to complete. All responses will be kept confidential and used for research purposes only.Section 1: General Information1. What is your age?- 18-24- 25-34- 35-44- 45-54- 55-64- 65+2. What is your gender?- Male- Female- Non-binary/Other3. What is your highest level of education?- High School- Some College- Bachelor's Degree- Master's Degree- Doctorate4. What is your primary occupation?Section 2: Mobile Phone Ownership and Usage5. How many years have you been using mobile phones?- Less than 1 year- 1-3 years- 4-6 years- 7-10 years- 10+ years6. How many mobile phones do you currently own?- 1- 2- 3- 4+- I don't own any mobile phones7. What is the primary brand of your current mobile phone?- Apple- Samsung- Huawei- Xiaomi- Other (please specify)8. On average, how many hours per day do you use your mobile phone? - Less than 1 hour- 1-3 hours- 4-6 hours- 7-10 hours- More than 10 hours9. What are the main activities you engage in on your mobile phone?- Social media (e.g., Facebook, Instagram, Twitter)- Messaging (e.g., WhatsApp, Telegram)- Browsing the internet- Reading emails- Shopping online- Gaming- Photography- Listening to music- Watching videos- Other (please specify)10. How important is your mobile phone for staying connected with friends and family?- Not at all important- Slightly important- Moderately important- Very important- Extremely importantSection 3: Mobile Phone Features and Preferences11. Which of the following features do you consider most important in a mobile phone?- Camera quality- Battery life- Storage capacity- Display quality- Performance (speed and processing power)- Operating system- Brand reputation- Price- Other (please specify)12. Do you prefer a physical keyboard or a touchscreen for your mobile phone?- Physical keyboard- Touchscreen- No preference13. How do you typically store and manage your mobile phone's files and apps?- Use a cloud storage service (e.g., Google Drive, Dropbox)- Use an external hard drive or SD card- Manually manage files and apps on the phone- Other (please specify)14. Are you satisfied with the performance of your current mobile phone?- Very satisfied- Satisfied- Neutral- Dissatisfied- Very dissatisfiedSection 4: Mobile Phone Challenges and Concerns15. What are the biggest challenges you face with your mobile phone? - Battery life- Performance- Storage space- Security and privacy- Cost- Other (please specify)16. Are you concerned about the amount of time you。

校园服务智能应答机器人的研究与实现

校园服务智能应答机器人的研究与实现

文章编号:2096-1472(2021)-02-60-03DOI:10.19644/ki.issn2096-1472.2021.02.012软件工程 SOFTWARE ENGINEERING 第24卷第2期2021年2月V ol.24 No.2Feb. 2021校园服务智能应答机器人的研究与实现陈 凤,朱 峰(常熟理工学院信息化办公室,江苏 常熟 215500)***************.cn;************.cn摘 要:随着智能终端和移动互联的流行与发展,移动应用深入人心。

本文基于百度UNIT交互平台,创建了具有本校特点的专用知识库,并通过资源API获取如成绩、课表、消费、打卡和站群内容等动态信息,同时借助微信消息平台实现了信息的搜索与推送,最终构建了校园服务智能应答机器人。

智能应答机器人为学校的师生员工提供各类校内咨询的智能应答,成为校园服务的入口和代言,开创了校园在线参考咨询的服务新模式。

关键词:智能应答机器人;百度UNIT;资源API;微信消息平台;搜一搜中图分类号:TP242 文献标识码:AResearch and Implementation of Intelligent Chatbot for Campus ServicesCHEN Feng, ZHU Feng(Information Office , Changshu Institute of Technology , Changshu 215500, China )***************.cn;************.cnAbstract: As the intelligent terminals and mobile networks finding their ways into people's everyday life, mobile applications are becoming more and more popular. Based on Baidu UNIT (Understanding and Interaction Technology) interactive platform, this paper proposes to create a specialized knowledge base with characteristics of a university. Dynamic information including grades, class schedules, consumption, check-in and station content can be obtained by an API (Application Programming Interface) interface. With the help of WeChat messaging platform, information seeking such as search and push is realized. Finally, an intelligent response chatbot for campus services is built. The intelligent answering chatbot provides services for teachers, students and employees with intelligent answers to various in-school consultations. As entrance and endorsement of campus services, it creates a new service model for campus online consultation.Keywords: intelligent response chatbot; Baidu UNIT; resource API; WeChat message platform; Sou Yi Sou1 引言(Introduction)随着校园信息化建设的高速发展,高校的各类业务系统积累了越来越多的数据。

Understanding_the_Spreading_Patterns_of_Mobile_Phone_Viruses1

Understanding_the_Spreading_Patterns_of_Mobile_Phone_Viruses1

P. Wang, M. Gonzalez, C. A. Hidalgo, A.-L. Barabási,Science 324, 1071-1076 (2009)Supporting Online Material:/Publications/200905-22_Science-Suppl.pdf Understanding the spreading patterns of mobile phone virusesPu Wang1,2, Marta C. González1, César A. Hidalgo1,2,3 & Albert-László Barabási 1,41Center for Complex Network Research, Department of Physics,Biology and Computer Science, Northeastern University, Boston, MA 02115.2Center for Complex Network Research and Department of Physics,University of Notre Dame, Notre Dame, IN 46556.3Center for International Development, Kennedy School of Government,Harvard University, Cambridge, MA 02139.4Department of Medicine, Harvard Medical School, and Center for Cancer Systems Biology,Dana Farber Cancer Institute, Boston, MA 02115.We model the mobility of mobile phone users to study the fundamental spreading patterns characterizing a mobile virus outbreak. We find that while Bluetooth viruses can reach all susceptible handsets with time, they spread slowly due to human mobility, offering ample opportunities to deploy antiviral software. In contrast, viruses utilizing multimedia messaging services could infect all users in hours, but currently a phase transition on the underlying call graph limits them to only a small fraction of the susceptible users. These results explain the lack of a major mobile virus breakout so far and predict that once a mobile operating system’s market share reaches the phase transition point, viruses will pose a serious threat to mobile communications.Lacking a standardized operating system, traditional cellphones have been relatively immune to viruses. Smartphones, however, can share programs and data with each other, representing a fertileground for virus writers (1-4). Indeed, since 2004 more than 420 smartphone viruses have been identified (2, 3), the newer ones having reached a state of sophistication that took computer viruses about two decades to arrive at (2). While smartphones currently represent less than 5% of the mobile market, given their reported high annual growth rate (4) they are poised to become the dominant communication device in the near future, raising the possibility of virus breakouts that could overshadow the disruption caused by traditional computer viruses (5).The spread of mobile viruses is aided by two dominant communication protocols. First, a Bluetooth virus can infect all Bluetooth-activated phones within a distance from 10 to 30m, resulting in a spatially localized spreading pattern similar to the one observed in the case of influenza (3, 6, 7), SARS (8, 9) and other contact-based diseases (10) (Fig. 1A). Second, an MMS virus can send a copy of itself to all mobile phones whose numbers are found in the infected phone’s address book, a long range spreading pattern previously exploited only by computer viruses (11, 12). Thus to quantitatively study the spreading dynamics of mobile viruses we need to simultaneously model the location (13), the mobility (14-17) and the communication patterns (18-21) of mobile phone users. To achieve this we use as input anonymized billing record of a mobile phone provider, providing the calling patterns and the coordinates of the closest mobile phone tower each time mobile subscribers use their phone (but not the coordinate of individual users).The methods we used to track the spreading of a potential Bluetooth and MMS virus are described in the Supporting Online Material(SOM). Briefly, once a phone becomes infected with an MMS virus, after a τ=2min time it sends a copy of itself to each mobile phone number found in the handset’s phone book, approximated with the list of numbers the handset’s user communicated with during a month long observational period. A Bluetooth virus can infect only mobile phones within a distance r=10m. To track this process, we assign to each user an hourly location that is consistent with its travel patterns (13) and follow the infection dynamics within each mobile tower area using the SI model (22). That is, we consider that an infected user (I) infects a susceptible user (S),so that the number of infected users evolves in time as dI/dt=βSI/N, where the effective infection rate is β=µ<k> with µ=1 and the average number of contacts is <k>=ρA=NA/A tower, where A=πr2 represents theBluetooth communication area and ρ=N/A tower is the population density inside a tower’s service area. Once an infected user moves in the vicinity of a new tower, it will serve as a source of a Bluetooth infection in its new location.A cell phone virus can infect only the phones with the operating system (OS) it was designed for (2, 3), making the market share m of an OS an important free parameter in our study. Note that the current market share of various smartphone OSs vary widely, from as little as 2.6% for Palm OS, to 64.3% of Symbian. Given that smartphones together represent less than 5% of all phones, the overall market share of these operating systems among all mobile phones is in the range of m 0.0013 for Palm OS and m 0.032 for Symbian, numbers that are expected to dramatically increase as smartphones replace traditional phones. To maintain the generality of our results, we treat m as a free parameter, finding that the spreading of both Bluetooth and MMS viruses is highly sensitive to the market share of the susceptible handsets (Fig. 2, A and B). Our simulations indicate that given sufficient time, a Bluetooth virus can reach all susceptible handsets, as user mobility guarantees that sooner or later each susceptible handset will find itself in the vicinity of an infected handset. The spreading rate strongly depends, however, on the handset’s market share. For example if the handset’s market share is m=0.01, it takes several months for a Bluetooth virus to reach all susceptible handsets. In contrast, for m=0.30 the Bluetooth virus could infect 85% of susceptible handsets in a few hours and 99.8% in less than a week (Fig. 2A).The most striking difference between Bluetooth and MMS viruses comes in the timescales their spread requires. Indeed, given that it takes approximately two minutes for a typical MMS virus to copy itself on a new handset (23), an MMS epidemic reaches saturation in a few hours in contrast with a few days it requires the Bluetooth virus to infect all susceptible handsets (Fig. 2B). Thus while there is plenty of time to deploy an antiviral software for a Bluetooth virus before it could reach a large fraction of users, it is largely impossible to achieve the same for MMS viruses, given their explosive spread. The good news is that an MMS virus can reach only a small m-dependent fraction of users with a susceptible handset, as indicated by the saturation of the infection curves in Fig. 2B. The origin of this saturation is the fragmentation of the underlying call network. Indeed, in Fig. 1B we show a subset of the real callnetwork and assume for illustration that the handsets can have only two OSs (OS1 and OS2) with market shares m1=0.75 and m2=0.25. While the underlying call network itself is fully connected, the call graph of the users that share the same handset is fragmented into many islands (Fig. 1C). For m1=0.75 we observe a giant component (the largest connected cluster, Fig. 1C) of size G m=0.80, meaning that it contains 80% of the users with the OS1 handset, the rest of the OS1 users being scattered in small isolated clusters. In contrast, for the OS2 handsets the giant component is tiny (G m=0.06). If an MMS virus is released from a single handset, it can only reach the handsets in the cluster where the original handset is located, telling us that an MMS virus can infect at most a G m fraction of all susceptible handsets, which is 80% for OS1 and 6% for OS2 in the example of Fig. 1.We find that the handset based fragmentation of the call graph (Fig. 1, B and C) is governed by a percolation phase transition at the market share m c=0.095 (Fig. 2C) (24). That is, for m<m c the user base is fragmented into many small isolated islands, making a major MMS virus viral outbreak impossible. In contrast, for handsets with m>m c there is a giant component, allowing the MMS virus to reach all handsets that are part of it. The value of m c and G m for m>m c can be calculated using the generating function formalism (25), requiring as input only the network’s degree distribution P(k). Using P(k) charactering our user base, we find a reasonable agreement between the analytical predictions and the direct measurements of the saturation value of the MMS virus spreading in the mobile phone dataset (Fig. 2C), the small systematic deviation being rooted in the fact that the generating function formalism ignores the correlations in the call graph’s structure. The significance of Fig. 2C comes in its ability to explain why we have not observed a significant MMS outbreak so far: currently the market share of the largest OS is less than m 0.03, well under the predicted percolation transition point m c 0.095 (26, 27). For a more detailed discussion on the factors affecting m and m c see the SOM.The differences between MMS and Bluetooth viruses have a strong impact on their spreading dynamics as well. To see this we denote with T(q,m) the latency time, representing the average time necessary for a virus affecting a handset with market share m to reach a q fraction of all susceptible handsets. For a Bluetooth virus T(q,m) is finite for any q and m combination, given that with time the virus can reach all susceptible users (Fig. 2A). We find, however, that the latency time is highlysensitive to m, a dependency well approximated by T(q,m)~m-0.6 (Fig. 2D, R-square>0.99, see SOM for statistical analysis), implying that the smaller a handset’s market share, the longer it will take for a virus to reach a q fraction of susceptible users. The observed divergence at m=0 indicates that for handsets with small market share the spreading process is exceptionally slow, as it takes a very long time for an infected user to come in contact with another user with a similar handset.Once again, the behavior of MMS viruses is qualitatively different: we find that T(q,m) diverges not at m=0 but at a finite m q* value (Fig. 2E), meaning that for handsets with market share m<m q* the virus is unable to reach a q fraction of users. Indeed, an MMS virus can reach at most a G m fraction of eligible handsets (Fig. 2C), implying that G m acts as a critical point for the dynamical spreading process and T(q>G m, m)=∞. To characterize the observed singularity, we note that the maximum amount of time it takes an MMS virus to invade the giant component should be determined by the length of the longest minimal path L max characterizing the susceptible giant cluster (28, 29). As Fig. 2F shows, we find that both L max and the average minimal path length L ave diverge as (m-m*)-αwith α 0.2 (R-square>0.97, see SOM), a singularity that potentially drives the observed divergence of T(q,m) in the vicinity of m q* given by the equation q=G m*. A more detailed measurement indicates, however, aqsystematic q-dependence of α(q) in T(q,m)~(m-m q*)-α(q)in the vicinity of the critical point (see Fig. 2E and the statistical analysis in SOM), hinting that there are factors beyond L max that contribute to the divergence of T(q,m).In Figure 3 we follow the spread of an MMS and Bluetooth infection starting from the same user, illustrating that Bluetooth and MMS viruses differ in their spatial spreading patterns as well: a Bluetooth virus follows a wave like pattern, infecting predominantly users in the vicinity of the virus’s release point, while an MMS virus follows a more delocalized pattern, given that the users’ address book often contains phone numbers of far away individuals. To quantify the observed differences we measured the average distance between the cell phone tower where the first infected user is located and the location of towers servicing the newly infected users. A null model in which the virus always diffuses to the non-infected towers bordering the already infected towers, thus following a classical two-dimensional diffusion process, is used as a reference. As Fig. 3B indicates, the typical source-infection distancesobserved in the local model are significantly smaller than the distances recorded for either Bluetooth or MMS viruses, indicating the impact of a few long-distance travellers that incubate outbreaks in distant cells (13) in the Bluetooth spreading process. The average distance is the highest for MMS viruses, underlying the delocalized pattern charactering its spread. Fig. 3B also shows that the dependence of <D> on N is mainly a function of the spreading technology and appears to be independent m.Bluetooth and MMS viruses have their relative limitations: while the spread of a Bluetooth virus is rather slow due to human mobility, an MMS virus can reach only a small fraction of users due to the fragmentation of the call graph. Both limitations are avoided by hybrid viruses that can simultaneously use both Bluetooth and MMS connections to spread, the first of many such viruses being the “CommWarrior” released in 2005 (2, 3). We find, however, that the spreading dynamics of a hybrid virus also displays a complex market share dependence (Fig. 4, A and B), resulting from a nontrivial superposition of the Bluetooth and the MMS spreading modes. For example for m=0.15, when there is a giant component aiding the MMS spreading mode (Fig. 2C), the early stage of the spreading process is dominated by the rapid invasion of the MMS cluster. Subsequently, the Bluetooth mechanism allows the virus to invade the rest of the independent MMS clusters as well. For m=0.01, however, there is no MMS giant component, thus the spreading is dominated entirely by the Bluetooth capability, resulting in a significantly slower spreading pattern (note the different horizontal axes in Fig. 4, A and B).The relative role of the Bluetooth and the MMS spreading patterns for hybrid viruses is illustrated in Fig. 4, C and D, which show the latency time T(q,m) for q=0.15 and q=0.65. We find that for high m the MMS mechanism dominates the hybrid virus’s spreading pattern. As m decreases below m q* given by q=G m* (Fig. 2E) the giant component becomes smaller than q, so T(q,m) for MMS diverges (green qcurve) and the Bluetooth mechanism starts dominating the spreading rate of hybrid virus. Therefore for small m the latency time of the hybrid virus converges to the latency time of a Bluetooth virus. We find, however, that the phase transition governing the fragmentation of the call graph plays a key role in the spread of hybrid viruses as well, delimiting the rapid MMS dominated and the slow human mobility driven spreading modes.In Fig. 4, E and F we explore the additional infective power of a hybrid virus, defined as the ratio T MMS(q,m)/T H(q,m) (or T BT(q,m)/T H(q,m)) relative to its pure MMS (or BT) counterpart. We find that hybrid viruses are about three times faster than an MMS virus at constant market share for m>m c. The contribution of Bluetooth technology for a hybrid virus dominates for m≤m c, as MMS viruses are unable to spread in this region (T MMS(q,m)=∞). The additional infective power of a hybrid virus compared to a Bluetooth virus achieves its highest value close to m q*, decreasing quickly for m→0 and mildly for m→1, once again underlying the importance of the critical behaviour near m q*.Taken together, our results offer a comprehensive picture of the potential dangers posed by mobile viruses. We find that while a Bluetooth virus can reach the full susceptible user base, its spread is slowed by human mobility, offering ample time for developing and deploying countermeasures. In contrast, MMS viruses can reach most susceptible users within hours. Their spread is limited, however, by the market share driven phase transition that fragments the underlying call graph, allowing us to predict that no major virus breakout is expected for OS with market share under the critical point associated with the user base. Therefore, the current lack of major mobile virus outbreak can not be attributed to the absence of effective mobile viruses, but it is mainly rooted in the fragmentation of the call graph. Given, however, the rapid growth in the number of smartphones and the increasing market share of a few OS, it is not unconcievable that the phase transition point will be reached in the near future, raising the possibility of major viral outbreaks. While the most significant danger is posed by hybrid viruses that take advantage of both Bluetooth and MMS protocols, we find that their spread is also limited by the phase transition: hybrid viruses designed for OS with small market share are forced into the slow Bluetooth spreading mode, offering time to develop proper countermeasures. We believe that the understanding of the basic spreading patterns presented here could help estimate the realistic risks carried by mobile viruses and aid the development of proper measures to avoid the costly impact of future outbreaks.1.Kleinberg, J. The wireless epidemic. Nature 449, 287-288 (2007).2.Shevchenko. A. An overview of mobile device security. (2005).3.Hypponen M. Maleware gose mobile. Scientific American Nov. 70-77 (2006).4.Cheng, J., Wong, S., Yang, H. & Lu, S. SmartSiren: Virus Detection and Alert for Smartphones. Proc. 5th ACM Int.Conf. Mob. Syst. Appl. Serv. (ACM, New York, 2007).5.Zucker, D.F., Uematsu, M. & Kamada, T. Markup-based SmartPhone User Interface using the Web Browser Engine.Proceedings XTech 2005 (2005).6.Colizza, V., Barrat, A., Barthelemy, M., Valleron, A.-J. & Vespignani, A. Modeling the worldwide spread of pandemicinfluenza: baseline case and containment interventions, PLoS Medicine 4, 95-110 (2007).7.Riley, S. Large-scale spatial-transmissions models of infectious disease. Science 316, 1298-1301 (2007).8.Anderson, R.M. et al. Epidemiology, transmission dynamics and control of SARS: the 2002-2003 epidemic. PhilosTrans R Soc Lond B Biol Sci. 359(1447): 1091–1105 (2004).9.Hufnagel, L., Brockmann, D. & Geisel, T. Forecast and control of epidemics in a globalized world. Proc. Natl. Acad. Sci.USA 101, 15124-15129 (2004).10.Eubank, S., Guclu, H., Kumar, V.S.A., Marathe, M.A., Srinivasan, A., Toroczkai, Z. & Wang, N. Modelling diseaseoutbreaks in realistic urban social networks. Nature 429, 180-184 (2004).11.Balthrop, J., Forrest, S., Newman, M.E.J. & Williamson, M.M. Technological networks and the spread of computerviruses. Science 304, 527–529 (2004).12.Pastor-Satorras, R. & Vespignani, A. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 86, 3200-3203 (2001).13.González, M.C., Hidalgo, C.A. & Barabási, A.-L. Understanding Individual Human Mobility Patterns. Nature 435, 779-782 (2008).14.Brockmann, D., Hufnagel, L. & Geisel, T. The scaling laws of human travel. Nature 439, 462-465 (2006).15.Su, J. et al. A Preliminary Investigation of Worm Infections in a Bluetooth Environment. Proc. 5th ACM WorkshopRapid Malcode 9-16 (ACM, New York, 2006).16.Yan, G. et al. Bluetooth Worm Propagation: Mobility Pattern Matters. Proc. 2nd ACM symposium on Information,computer and communications security. (ACM, New York, 2007).17.Mickens, J.W. & Nobel, B.D. Modeling Epidemic Spreading in Mobile Environment. Proc. ACM Workshop WirelessSecurity 77-86 (ACM, New York, 2005).18.Onnela, J.-P. et al. Structure and strengths in mobile communication networks, Proc. Natl. Acad. Sci. USA 104, 7332-7336 (2007).19.Candia J. et al. Uncovering individual and collective human dynamics from mobile phone records. J. Phys. A 41, 224015(2008).mbiotte, R. et al. Geographical dispersal of mobile communication networks. Physica A 387, 5317-5325 (2008).21.Palla, G., Barabási, A.-L. & Vicsek, T. Quantifying social group evolution. Nature 446, 664-667 (2007).22.Andersen, R.M. & May, R.M. Infectious Diseases of Humans: Dynamics and Control. (Oxford Science Publications,1992).23.Bose, A. & Shin, K.G. On Mobile Viruses Exploiting Messaging and Bluetooth Services. In SecureComm, 1-10 IEEE(2006).24.Dorogovtsev, S.N. & Mendes, J.F.F. Giant strongly connected component of directed networks. Phys. Rev. E 64, 025101(2001).25.Callaway, D.S., Newman, M.E.J., Strogatz, S.H. & Watts, D.J. Network Robustness and Fragility: Percolation onRandom Graphs. Phys. Rev. Lett. 85, 5468-5471 (2000).26.Cohen, R., Erez, K., ben-Avraham, D. & Havlin, S. Resilience of the Internet to random breakdowns. Phys. Rev. Lett. 85,4626-4628 (2000).27.Percolation and disordered systems: Theory and applications, edited by Bunde, A. & Havlin, S. Physica A 266 (1999).28.Chen, Y., Gerald, P., Reuven, C., Havlin, S., Borgatti, S.P., Liljeros, F. & Stanley, H.E. Percolation theory applied tomeasures of fragmentation in social networks. Phys. Rev. E 75 046107 (2007).29.Caldarelli, G. Scale-Free Networks: Complex Webs in Nature and Technology (Oxford University Press, 2007).30.We thank D. Brockmann, M. Hypponen, J. Park, Z. Qu, C. Song, A. Vazquez, A. Vespignani and G. Xiao fordiscussions and comments on the manuscript. We also thank M. Hypponen providing us the valuable mobile phone virus records data. This work was supported by the Defense Threat Reduction Agency Award HDTRA1-08-1-0027, the James S. McDonnell Foundation 21st Century Initiative in Studying Complex Systems, the National Science Foundation within the DDDAS (CNS-0540348), ITR (DMR-0426737) and IIS-0513650 programs and the US Office of Naval Research Award N00014-07-C.FIG. 1. The spreading mechanisms of mobile viruses.(A) A Bluetooth virus can infect all phones found within Bluetooth range from the infected phone, its spread being determined by the owner’s mobility patterns. An MMS virus can infect all susceptible phones whose number is found in the infected phone’s phonebook, resulting in a long-range spreading pattern that is independent of the infected phone’s physical location. (B) A small neighbourhood of the call graph constructed starting from a randomly chosen user and including all mobile phone contacts up to fourth degrees from it. The color of the node represents the handset’s OS, in this example randomly assigned such that 75% of the nodes represent OS1, and the red are the remaining handsets with OS2 (25%). (C) The clusters in the call graph on which an MMS virus affecting a given OS can spread, illustrating that an MMS virus can reach at most the number of users that are part of the giant component of the appropriate handset. As the example for the OS shows, the size of the giant component highly depends on the handset’s market share (see also Fig. 2C).FIG. 2. The spreading patterns of Bluetooth and MMS viruses. (A ) The changes in the ratio of infected and susceptible handsets (I/N ) with time in the case of a BT virus affecting for handsets with different market share m . (B ) Same as in panel (A), but for MMS viruses, the saturation in I/N indicating that an MMS virus can reach only a finite fraction of all susceptible phones. (C ) The size of the giant component G m in function of the market share m . The blue symbols correspond to the saturation values measured in Fig. 2B, while the red line is the theoretical prediction based on percolation theory (the deviations are attributed mainly to finite size effects and degree correlations, as the calculation assumed an infinite call graph). (D ) The latency time needed to infect q=0.65 or q=0.15 fraction of susceptible handsets via a Bluetooth virus, approximated with T (q=0.65, m )~-0.630.05 ±m and T (q=0.15, m )~-0.600.04 ±m (continuous lines). (E ) The latency time for an MMS virus for q=0.05, 0.15 and 0.30. The continuous lines correspond to T (q,m )~(m -m q *)-α(q ), where the best fits indicate a systematic q -dependence, i.e. α(0.05)=0.20±0.02, α(0.15)=0.17±0.01, α(0.30)=0.14±0.01. (F ) Log-log plot showing the average minimal path length L ave and the longest minimal path length L max for the largest cluster. The fits correspond to L max ~-0.200.02(*)m -m ± and L ave ~-0.190.02(*)m -m ±. The curves on (A),(B), (D) are obtained from 10 independent simulations and (E), (F) represent average over 100 runs. For more statistical analysis of the fits in (D), (E), (F), please see the detailed discussion in SOM.FIG. 3. Spatial patterns in the spread of Bluetooth and MMS viruses.(A) The virus starts from the same user located at the tower marked by the red arrows. The three panels show the percentage of infected users in the vicinity of each mobile phone tower (denoted by the voronoi cell that approximates each tower’s service area). On the right panel we show the corresponding time dependent infection curves, marking the moments when the spatial distribution was recorded. (B) Average distance between the tower where the infection was originally started and the most currently infected as a function of N (Three red and blue curves correspond to m=0.1, m=0.5 and m=1), denoting the number of towers with at least one infected users, used as a proxy of time. The green line is obtained from a null model which assumes that the virus can only spread from one tower’s service area to its neighbour towers’ service areas. The curves on (B) are obtained from 100 independent simulations.FIG. 4. The spreading patterns of hybrid viruses.(A and B) The time dependent fraction of infected users for a hybrid virus spreading on a handset with (A) m=0.01 and (B) m=0.15 market share handset, compared with the Bluetooth and MMS spreading modes. (C and D) The m-dependence of latency time for hybrid, MMS and Bluetooth viruses for (C) q=0.15 and (D) q=0.65. (E and F) Ratio between the time it takes a Bluetooth or MMS virus to reach (E) 15% and (F) 0.65% of the population divided by the time it takes a hybrid virus to reach the same fraction of the population as a function of the market share m. The curves on (A), (B), (C), (D) are obtained from 10 independent simulations.。

Understanding课件

Understanding课件

Personal Information
• Lived in 17th century • Held an important
rank under King James of England • Not interested in bureaucratic details
Devotion
Worthy search for knowledge
2. Hawking had "ALS" (渐冻人症). After being diagnosed with this disease at
the age of 21, Hawking fell into a depression. Hawking's unfriendly
independeYncoeuanad urnewiellinngnceossutoraacgceeptdhetlpofour hsisedistahbielitiews doisrtadncsed
Devotion
Controversial ideas (proved to be wrong later)
Detailed reading
2. RELATION
Part 3: Mind map (Para. 4-5)
Aristotle/ Galilei/ Bacon
Great men
They _i_n_sp_i_re_d__many great scientists and philosophers.
Tip: find FACTs + find out RELATION college member instead of studying, he was viewed as a lazy and difficult

Our Mobile Planet 谷歌芬兰手机行业消费者消费行为调查报告

Our Mobile Planet 谷歌芬兰手机行业消费者消费行为调查报告

Smartphones are a Central Part of Our Daily Lives
44%
have used their smartphones every day in the past 7 days
Base: Private smartphone users who use the internet in general, Smartphone n= 1.000 Q18: Thinking about the last seven days on how many days were you online with ...?
On the go
56%
In a store
Airport School Doctor's office
Base: Private smartphone users who use the Internet in general, Smartphone n= 1.000 Q16: Where do you use your smartphone? Please select first at which locations you ever use it - even if only seldom.
What role do smartphones play in the shopping process?
How do consumers respond to ads, offline and on mobile?
Google Confidential and Proprietary
3
Agenda
1 2 3 4 5
Our Mobile Planet: Finland
Understanding the Mobile Consumer

英语630核心词汇

英语630核心词汇

英语630核心词汇:Aabsence n.缺席,不在场,缺乏 absorb vt.吸收,使专心abstract a.抽象的 n.摘要 academic a.学院的,学术的access n.接近,通道,入口 accordingly ad.因此,依照account n.记述,解释,帐目 accurate a.准确的,正确无误的accuse vt.指责,归咎于 actor n.男演员actress n.女演员 actual a.实际的,现行的adapt vt.使适应,改编 admire vt.钦佩,羡慕,赞赏admit vt.承认,准许…进入 adopt vt.收养,采用,采取adult n.成年人 a.成年的 advance vi.前进,提高 n.进展attempt vt.尝试,试图 n.企图 attend vt.出席,照顾,护理attitude n.态度,看法,姿势 attract vt.吸引,诱惑audience n.听众,观众 author n.作者,作家available a.可利用的,通用的 average n.平均数 a.平均的award n.奖,奖品,判定 aware a.知道的,意识到的awful a.令人不愉快的Bbadly ad.坏,差,严重地badminton n.羽毛球 baggage n.行李bake vt.烤,烘,烧硬 balance vt.使平衡,称 n.天平ban n. 禁令 vt. 禁止,取缔 band n.乐队,带,波段bar n.酒吧间,条,杆 bare a.赤裸的,仅仅的bargain n.交易 vi.议价,成交 base n.基础,底层,基地basin n.盆子,盆地 basis n.基础,根据blanket n.毯子 bleed vi.流血broad a.宽的,阔的,广泛的 broadcast n.广播,播音broom n. 扫帚 bucket n.水桶,吊桶budget n.预算 burden n.担子,负担,装载量burst vt.使爆裂 vi.n.爆炸 bury vt.埋葬,埋藏bush n.灌木 butcher n. 屠夫,屠户button n.扣子,按钮 vt.扣紧Ccafé n.咖啡馆,小餐厅cage n.笼,鸟笼,囚笼 calculate vt.计算,估计,计划calm a.平静的 candidate n.候选人,投考者carpet n.地毯,毡毯,毛毯 carrot n.胡萝卜cart n.二轮运货马车 case n.情况,事实,病例cash n.现金,现款 castle n.城堡conductor n.售票员,(乐队)指挥 confident n.确信的,自信的confirm vt.证实,肯定,批准 conflict n.争论,冲突,斗争confuse vt.使混乱,混淆 congratulation n. 祝词,贺辞crime n.罪,罪行,犯罪 crop n.农作物,庄稼crossing v. 横越 n. 交叉口 crowd n.群,大众,一伙人cupboard n.碗柜 cure vt.医治 n.治愈curious a.好奇的,稀奇古怪的 curtain n.帘,窗帘,幕(布) cushion n.垫子,坐垫,靠垫 custom n.习惯,风俗,海关customer n.顾客,主顾 cycle n.循环Ddamage vt.损害,毁坏 n.损害 damp a.潮湿的darkness n.黑暗 dawn n.黎明,开端deadline n. 最终期限 debate n.vi.争论,辩论debt n.债务,欠债 declare vt.断言,声明decorate vt.装饰 decrease vi.n.减少deed n.行为,功绩,契约 defeat vt.战胜,击败deserve vt.应受,值得 design vt.设计 n.设计,图样desire vt.相望,要求 n.愿望 destination n.目的地,终点,目标disagree vi.不同意;不一致disappear vi.不见,失踪,消失disappoint vt.使失望disaster n.灾难district n.地区,区域document n.公文,文件donate vt.vi.捐赠dormitory n.集体寝室,宿舍dot n.点,圆点 vt.打点于download n. (从BBS)下装,卸载downtown adv. 在市区,往市区drawing n.绘画drill n.钻头,操练 vi.钻孔drown 溺死drunka.醉的,陶醉的 due a.预期的,应给的dulla.枯燥的,阴暗的 dust n.灰尘dusty a.多灰尘的,灰蒙蒙的;粉末状的;灰色的Eeager a.渴望的,热切的 earn vt.挣得,获得earthquake n.地震 eastern a.东方的,朝东的edit vt.编辑,编纂,校订 effect n.效果,效力elect vt.选举,推选 electricity n.电,电流electronic a.电子的 embarrass vt.使窘迫,使为难emergency n.紧急情况,突然事件 employ vi.雇用endless a.无止境的 engine n.发动机,引擎evidence n.根据,证据,证人 exact a.确切的,精确的extraordinary a.非同寻常的,特别的 extremely ad.极其,非常Ffade vi.褪色,逐渐消失 failure n.失败,失败的人fairly ad.相当,公平地 faith n.信任,信心,信仰false a.不真实的,伪造的 familiar a.熟悉的farther ad.更远地 a.更远的 fasten vt.扎牢,扣住,使固定fault n.缺点,过失,故障 favor n.好感,赞同,恩惠fax n.vt. 传真 feather n.羽毛,翎毛,羽状物federal a.联邦的,联盟的 fee n.费,酬金,赏金frequently ad.时常,频繁地 frighten vt.使惊恐,吓唬fry vt.油煎,油炸,油炒 fuel n.燃料 vt.给…加燃料function n.功能,职务,函数 fur n.软毛,毛皮,裘皮further ad.更进一步Ggain vt.获得,增加 n.增进garbage n.垃圾,污物,废料 gas n.煤气,气体gather vi.聚集,集合 vt.收集 gay a.快乐的,鲜明的generally ad.一般地,通常地 generation n.一代,一代人,产生generous a.慷慨的,宽厚的 gentle a.和蔼的,轻柔的glance vi.看一下 n.一瞥 globe n.地球,世界,地球仪goal n.球门,得分,目的 goods n.货物,商品gradual a.逐渐的,渐进的 gradually ad.逐渐地,逐步地graduate n.大学毕业生 vi.毕业 graduation n.毕业grain n.谷物,谷粒,颗粒 grand a.宏伟的,重大的grasp vt.抓紧,掌握 n.抓 gravity n.重力,引力,严重性greatly ad.大大地,非常地;伟大地,崇高地greet vt.问候,招呼,反应grey n./a.灰色(的) grocer n.杂货商grocery n.杂货店 guide n.导游 vt.指导guilty a.内疚的,有罪的高考必备单词985 (H-Z)Hhaircut n.理发;发型,发式 hammer n.锤子vt.锤击handkerchief n.手帕 handle n.柄,把手 vt.处理happiness n.幸福;满足 harbour n.港hard-working adj. 勤劳 hardship n.艰难,困苦hopeless a.没有希望的,绝望的horrible a. 可怕的,极可憎的,极可厌的host n.主人,东道主 housewife n.家庭主妇humour v. 纵容,迁就 hunger n.饥饿,渴望hunt n.vt.打猎,搜寻Iidentity n.身分,相同 vt.确定身份ignore vt.不顾,不理,忽视 illegal a.非法的immediate a.立即的,直接的 immigrate v.移民import vt.n.输入,进口 importance n.重要性insect n.昆虫 insert vt.插入,嵌入inspire vt.鼓舞,给…以灵感 instant n.瞬间 a.立即的institute n.研究所,学院 instrument n.仪器,工具,乐器insurance n.保险,保险费 intelligence n.智力,理解力,情报intend vt.想要,打算,意指 interpret vt.解释,说明,口译interpreter n.翻译 interrupt vt.打断,打扰,中止Jjam n.果酱 jar n.罐子,坛子,广口瓶jazz n.爵士音乐,爵士舞曲 journalist n.记者,新闻工作者journey n.旅行,旅程 judge n.法官,裁判员jungle n.丛林,密林 junior a.年少的,地位较低的 n.晚辈justice n.正义,公正,司法Kkindergarten n.幼儿园Llack vt.缺乏,不足n.短缺的东西ladder n.梯子 lately ad.最近later ad.后来 latter a.(两者中)后者的lawyer n.律师 league n.同盟,联盟leak vi.漏;泄露n.漏洞 lecture vi.演讲;讲课n.演讲;讲课legal a.合法的 length n.长度less a.更少的ad.更少地 liberate vt.解放,释放librarian n.图书馆馆员 lifetime n.终身lightning n.闪电 likely a.可能的ad.很可能loaf n.一条面包 local a.地方的n.局部loose a.宽松的;自由的 lorry n.卡车loss n.遗失;失败;损失 luggage n.行李,皮箱lung n.肺Mmailbox n.邮箱majority n.多数 male a.男的,雄的mankind n.人类 manner n.方式,态度;礼貌march n.三月 mass n.大量;群众material n.材料,原料;素材a.物质的merchant n.商人 mercy n.仁慈merely ad.仅仅,只不过 merry a.欢乐的,愉快的midday n.中午 midnight n.午夜mild a.温柔的;温暖的 million num.百万mine pron.我的n.矿,矿山;地雷,水雷vt.开采mineral n.矿物a.矿物的 minimum n.最小量a.最小的minister n.部长,大臣 minority n.少数派;少数民族miserable a.痛苦的,悲惨的 misunderstand vt.误解,误会mix vt.使混合;混淆 mobile a.运动的,移动的modest a.谦虚的 moral a.合乎道德的n.道德,品行motor n.发动机,机动车 mountainous adj.多山的mourn vi.哀痛,哀悼 movement n.动作;活动;移动multiply vt.增加;乘 musical a.音乐的Nnail n.钉子;指甲vt.钉 nation n.民族,国家nationality n.国籍,民族 native a.本土的n.本地人navy n.海军 neat a.整洁的;简洁的needle n.针vt.缝补,编织 nephew n.侄子,外甥nest n.巢,窝 net a.净的,纯的n.网,网状物niece n.侄女,外甥女 noble a.高尚的n.贵族noisy a.嘈杂的,喧闹的 noun n.名词novel n.小说a.新奇的,新颖的 nowadays ad.现今,现在n.现今,当今nowhere ad.任何地方都不 nuclear a.原子核的;核心的nut n.坚果 nutrition n.营养Oobey vt.顺从vi.服从 observe vt.观察,注意到obtain vt.获得 obvious a.显而易见的occupation n.占领,占据;职业,工作 occupy vt.占领,占有;忙碌occur vi.发生 official a.官方的n.官员,行政人员onto prep.到…上 opera n.歌剧operate vi.操作;施行手术 opinion n.意见,看法oppose vt.反对,反抗 opposite a.对面的n.对立物optimistic a.乐观的 oral a.口头的orbit n.运行轨道vt.环绕 ordinary a.平常的,平凡的organize vt.组织,安排;筹办 original a.最初的;新颖的n.创新otherwise ad.另外,要不然 ought aux.应该outdoor a./ad.户外的,野外的 outdoors ad.在户外n.户外outer a.外部的,外面的 outline n.轮廓;大纲outstanding a.突出的,杰出的 overcome vt.战胜,克服owe vt.欠;归功于 ox n.公牛oxygen n.氧,氧气Ppack vt.捆扎,打包;挤满n.包 packet n.小包pain n.痛苦;疼痛 painful a.痛苦的painting n.油画;绘画 pan n.平底锅panic n.恐慌,惊慌 paragraph n.(文章的)段,节parcel n.包裹,邮包 parrot n.鹦鹉participate vi.参与,参加 particular a.特殊的,特定的profit n.利润vi.得益 project n.计划;工程;项目vi.伸出vt.设计,规划promote vt.促进,提升;推销 province n.省publish vt.公布,发表;出版,刊印 pump n.泵vt.用泵抽,打气punishment n.惩罚 purchase vt.购买n.购买;赃物pure a.纯洁的 puzzle n.难题;谜vi.使迷惑Qquality n.质量;特性 quantity n.数量;大量quarrel vi.争吵n.争吵,吵架 queue n.队列vi.排队等候quit vt.离开,停止;辞职Rrange vi.变动,变化n.范围rank n.军衔vt.归类于 rate n.比率;速度;价格vt.评价,估价ray n.光线;射线 react vi.反应rob vt.抢劫,劫掠vi.抢劫,劫掠 rocket n.火箭roll vi.滚动,转动n.一卷;名册 roof n.屋顶root n.根(部);根源vi.生根,扎根 rough a.表面不平的;粗略的;大致的rude a.粗野的,残暴的 ruin n.毁灭;废墟vt.毁坏Ssacrifice vt.牺牲,献祭 sailor n.海员,水兵salary n.薪水 satellite n.卫星satisfaction n.满意 scan vt.浏览;扫描scare vt.惊吓vi.受惊 scene n.情景;景色schedule vt.安排n.时间表,计划表 scholarship n.奖学金specific a.特有的;具体的 spit vi.吐唾沫splendid a.壮丽的,显著的 split vt.劈开spoken a. 口头讲的,口语的 vbl. speak的过去分词 sponsor n.发起者vt.发起spot vt.认出,发现n.点,斑点;地点 spy n.间谍,特务vt.侦察,监视stable a.稳定的,安定的n.马厩,马棚 stadium n. 露天大型运动场staff n.全体工作人员 stage n.舞台;阶段,时期stair n.楼梯 stare vi.凝视switch n.开关;转换vt.转换 symbol n.象征;符号sympathy n.同情,同情心 system n.系统;制度Ttailor n.裁缝vt.裁制衣服 talent n.天才,才能tank n.坦克;大容器 tap vt.轻打,轻敲n.塞子,龙头;轻叩,轻拍target n.靶;目标 tax n.税(款)vt.征税tear n.泪滴,眼泪vt.撕开,撕裂 technical a.技术的,工艺的technique n.技巧,技能 teenager n.青少年tight a.紧的;紧身的ad.紧紧地 timetable n.时间表;时刻表tradition n.传统,惯例 transport n.运输vt.运输trap n.陷阱;诡计vt.诱骗 trend vi.伸向;倾向n.倾向trial n.试验;审判 trick n.诡计;窍门vt.哄骗type n.类型vi.打字 typewriter n.打字机typical a.典型的,代表性的 typist n.打字员tyre n.轮胎Uunderline vt.在…下划线;强调understanding n.理解,理解力 unfair a.不公平的uniform a.一样的n.制服 unique a.唯一的unite vi.联合vt.使联合 united adj.一致的;联合的universe n.宇宙,世界 unknown a.未知的,不知名的unusual a.不平常的,独特的 update vt.更新,使现代化n.现代化,更新upset vt.使不适,使心烦n.混乱 upward a.向上的,上升的ad.向上,往上urban a.都市的 urgent a.紧急的usually ad.通常Vvalley n.山谷,流域valuable a.值钱的,有价值的n.贵重物品 variety n.多样化,种类various a.各种各样的 vast a.巨大的,广阔的vehicle n.车辆 verb n.动词victim n.牺牲者,受害者 view vt.看待;看n.见解;风景violent a.猛烈的,狂暴的 virus n.病毒visa n.签证;信用卡 volunteer n.志愿者vt.志愿vote n.选举,投票 voyage n.航海vi.航海,航空Wwage n.工资,报酬 waiter n.侍者,服务员waitress n.女侍者,女服务员 wave n.波,波涛;起伏vi.波动;挥手wild a.野生的;野蛮的n.荒地 willing a.心甘情愿的wind n.风 wipe vt.揩,擦n.揩,擦worst a.最坏的ad.最坏地 worthwhile a.值得的would aux.将;愿意Yyouth n.青春;青年。

产品与技术的英语

产品与技术的英语

产品与技术的英语Product and TechnologyQ: Can you explain the relationship between product and technology?A: Product and technology are closely intertwined and depend on each other. Technology plays a crucial role inthe development of a product. It enables the creation of innovative features, enhances functionality, and improves user experience. On the other hand, a well-designed product can drive technological advancements and push theboundaries of what is possible. Product and technology complement each other in a symbiotic relationship, where advancements in technology drive product innovation, and successful products pave the way for further technological advancements.产品与技术问:你能解释一下产品与技术之间的关系吗?答:产品与技术密切相关且相互依赖。

技术在产品的开发中起着至关重要的作用。

它能够实现创新功能、增强产品的功能性,并改善用户体验。

另一方面,一个设计良好的产品可以推动技术的发展,推动创新的边界。

产品与技术相辅相成,技术的进步推动产品的创新,而成功的产品为进一步的技术发展铺平道路。

Unit 7 Lesson 1 课件-高二英语课件(北师大版2019选择性必修第三册)

Unit 7 Lesson 1 课件-高二英语课件(北师大版2019选择性必修第三册)
Unit 7 Lesson 1 EQ:IQ
What do you know about
EQ and IQ
Which is more important to Q
02 intelligence
03 to be open to new ideas
What is the writing style of the text?
Careful reading: Read and explore
Read paragraphs 1-2. Complete the information about EQ and IQ.
Understanding of EQ and IQ
Exercise
in Lesson 1
EQ is very likely more important than IQ in terms of being successful.
Success comes with a high EQ.
Success is not simply the result of a high IQ.
EQ is as important, if not more important than IQ.
1. Intelligence Quotient 2. determines
4. employed
5. lower
7. to adjust
8. Altogether
10. sure
Homework
Workbook
Dictation
language points
Preview
listening material
Read paragraphs 3–7. Answer the questions.

新视角研究生英语读说写2二单元课后练习答案省名师优质课赛课获奖课件市赛课一等奖课件

新视角研究生英语读说写2二单元课后练习答案省名师优质课赛课获奖课件市赛课一等奖课件

Unit 2: Reading comprehension
5. In paragraph 15, Mead speaks of “the need to define who you are by the place in which you live.” What does she mean?
Reference
Unit 2: Structure of the text
Text Outline
2. Body (Paras. 3–18)
1) The author’s detailed description oft_h_e_d_i_f_fe_r_e_n_t_h_o_m__e_s _s_h_e_h_a_d__li_v_e_d_i_n_w__h_e_n_s_h_e__w_a_s__a_c_h_i_ld__, especially the one at Hammonton. (Paras. 3–14)
Text Outline
1. Introduction (Paras. 1–2)
For many people, moving and traveling are v_e_r_y__d_if_fe_r_e_n_t_. But for the author, moving and staying at home, traveling and arriving are _a_ll_t_h_e_s_a_m__e_.
Reference
To illustrate that for many people, leaving home shouldn’t be anything sad because home is a place to which you come back again and again. But for the fishermen in these islands, it is a different story because they have to face the dangers when they are out to sea. They never know whether they will be able to return to their homes again. Their fate is hard to predict.

手机拉近了人与人之间的距离英语作文

手机拉近了人与人之间的距离英语作文

手机拉近了人与人之间的距离英语作文Smartphones have become an integral part of our daily lives in the modern world. They have revolutionized the way we communicate, access information, and interact with one another. Contrary to the common perception that smartphones have alienated people and created a barrier between them, these devices have, in fact, brought people closer together in various ways.Firstly, smartphones have made it easier to stay connected with friends and family members, regardless of their physical location. With the advent of messaging apps, video calling, and social media platforms, people can now communicate with their loved ones instantly and effortlessly. This has been particularly beneficial for individuals who live far away from their families, as it allows them to maintain strong emotional bonds and stay up-to-date with each other's lives.Moreover, smartphones have facilitated the formation of new social connections. Through various social media platforms, people can easily connect with like-minded individuals, join online communities,and engage in discussions on topics of mutual interest. This has led to the creation of a global network of individuals who might have never had the opportunity to interact with one another in the physical world. These online connections can often translate into real-life friendships and collaborations, further strengthening the bonds between people.In addition, smartphones have played a crucial role in fostering a sense of community and collective action. During times of crisis or social unrest, people can use their smartphones to quickly spread information, organize relief efforts, and mobilize support. The ability to share videos, images, and real-time updates has allowed people to come together and support one another in times of need, regardless of their geographical location.Furthermore, smartphones have enabled people to access a wealth of information and resources that were previously inaccessible or difficult to obtain. Through the use of search engines, educational apps, and online tutorials, individuals can now learn new skills, explore different cultures, and broaden their horizons. This increased access to knowledge and information has the potential to foster cross-cultural understanding and promote empathy, as people can gain a deeper appreciation for the diversity of the human experience.Moreover, smartphones have facilitated the creation of new forms ofentertainment and social interaction. From mobile gaming to live-streaming platforms, these devices have provided people with a wide range of opportunities to engage in shared experiences and build connections with others. Whether it's playing multiplayer games, watching live performances, or participating in virtual events, smartphones have enabled people to come together and enjoy activities in new and innovative ways.It is important to acknowledge that while smartphones have brought many benefits to human relationships, they have also been associated with certain challenges, such as the potential for addiction, the spread of misinformation, and the risk of cyberbullying. However, these issues can be addressed through responsible usage, digital literacy education, and the development of effective policies and regulations.In conclusion, smartphones have played a significant role in bringing people closer together. By facilitating instant communication, enabling the formation of new social connections, fostering a sense of community, and providing access to a wealth of information and resources, these devices have transformed the way we interact with one another. As technology continues to evolve, it is crucial that we harness the power of smartphones to strengthen human relationships and promote greater understanding and connection among people around the world.。

大学生英文简历

大学生英文简历

Name:XXX Gender: femaleAddress: Sichuan UniversityMobile:XXXX-XXXX Email:*****************Educational Background_______________________________________________________________________________ 2008.09-2012.07 Sichuan University Management Bachelor Major: IEMinor courses: Logistics Management, Production control, Quality control management, Human Factors Engineering, Modern manufacturing systems, Systems Engineering, Facilities Planning and Logistics,Methods,Standards,and Work Design.Internship Experiences_______________________________________________________________________________2011.08-2011.09 Sichuan Changhong Electric Co.——As a front-line worker,I have a deeper understanding of Manufacturing and logistics, A better understanding of the importance and breadth of the IE industry in the manufacturing and logistics, as well as IE Ideology2011.03-2012.05 Tutoring company——I’m a Q & A Teacher.The responsibilities of my job is to explain to students the question that they do not understand.This work requires patience.2010.09-2010.12 Western Restaurant——I need to service for foreign customers, sometimes to deal with emergency cases as well.And Inventory daily bills.Qualification Certificates_______________________________________________________________________________CET 4 504 CET 6 448AutoCAD AssociateCampus duties & Rewards_______________________________________________________________________________ 2008.09-2009.06 The Director-General of Youth Volunteers Association, and received the title of outstanding officer2009.09-2010.06 The Director-General of Students' Union Propaganda Department, andreceived the title of outstanding officerOther Information_______________________________________________________________________________●Language skills: fluent in English, Both oral and written●Computer skills: advanced user of Microsoft Office (Excel, PowerPoint)●Character: Good at communication, open minded, Good at team workWillingness to take challenges, ability to take pressure to deliver Good result under urgent time lineGood at planning, following up, paying attention to detailStrong ability to adapt.Optimistic about life, motivated.●Hobbies: movies, sports, reading, travelling and so on。

拒绝手机垃圾的英语作文

拒绝手机垃圾的英语作文

In the modern era, smartphones have become an integral part of our daily lives, providing us with a wealth of information and convenience. However, they also come with a significant downside: the proliferation of mobile phone spam. This essay aims to discuss the reasons behind the prevalence of mobile phone spam and suggest some strategies to combat it.Firstly, the widespread use of smartphones has made it easier for spammers to reach a large audience. With billions of users worldwide, mobile phones have become a prime target for advertisers and scammers alike. The anonymity provided by the internet also allows spammers to send out unsolicited messages without fear of immediate consequences.Secondly, the low cost of sending spam messages contributes to the problem. Unlike traditional advertising methods, which can be expensive, sending a spam message via SMS or email is relatively cheap. This low cost encourages spammers to send out a large volume of messages, hoping that a small percentage of recipients will respond.Moreover, the lack of effective regulation and enforcement against mobile phone spam exacerbates the issue. In many countries, there are either no laws or weak regulations in place to combat spam. This lack of legal framework allows spammers to operate with impunity.To address the problem of mobile phone spam, several measures can be taken. Firstly, users should be educated on how to identify and avoid spam messages. This includes not clicking on suspicious links, not providing personal information to unknown sources, and using spam filters on their devices.Secondly, mobile service providers should take a more proactive role in combating spam. They can implement stricter policies on the sending of unsolicited messages and collaborate with law enforcement agencies to identify and prosecute spammers. Thirdly, governments should establish and enforce strong antispam laws. These laws should include penalties for spammers, as well as provisions for compensation for victims of spam. By creating a legal deterrent, governments can discourage potential spammers from engaging in this activity.In conclusion, mobile phone spam is a growing problem that affects millions of users worldwide. By understanding the reasons behind its prevalence and taking appropriate measures, we can work towards a cleaner and safer mobile communication environment.It is essential for individuals, service providers, and governments to join forces in the fight against mobile phone spam.。

Our Mobile Planet 谷歌挪威手机行业消费者消费行为调查报告

Our Mobile Planet 谷歌挪威手机行业消费者消费行为调查报告

Smartphones are a Central Part of Our Daily Lives
59%
have used their smartphones every day in the past 7 days
Base: Private smartphone users who use the internet in general, Smartphone n= 1.000 Q18: Thinking about the last seven days on how many days were you online with ...?
55%
Search Engines
47%
Video sharing Sites
23%
Base: Private smartphone users who use the internet in general, Smartphone n= 1.000 Google Confidential and Proprietary Q9: Using the scale below, please indicate approximately how frequently you use the Internet in general and specific services and types of websites through your browser or apps on your smartphone? Responses reflect at least once a day.
Smartphones Are Used Everywhere
Place of Use
Home On the go
94% 81% 75% 69% 67% 66% 60% 55% 52% 46% 37%
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Master’s ThesisUnderstanding Mobile Q&A Service Usage: An Ex-ploratory Study and New InterpretationHyanghong KangKnowledge Service EngineeringKAIST2012Understanding Mobile Q&A Service Usage: An Ex-ploratory Study and New InterpretationMKSE 20103022 강향홍. Kang, Hyanghong. Understanding Mobile Q&A Service: Exploratory Study and New Intertation모바일Q&A 서비스이해: 탐험적연구및새로운해석. Depart-ment of Knowledge Service Engineering. 2012. XX p. Advisor Prof. Jussi Kantola. Text in EnglishABSTRACTRecently questioning and answering (Q&A) communities that facilitate knowledge sharing among the people were introduced to the mobile environments such as Naver Mobile Q&A and ChaCha. Mobile Q&A is very different from conventional Q&A sites in that questions and answers are short in length and are ex-changed via wireless communications (e.g., SMS and mobile Internet). While conventional Q&A serviced have been investigated, so far little is known about the mobile Q&A usage. To understand mobile Q&A usage, I ana-lyzed over 2.4 million questions and answers pairs spanning a 13 month period from Naver Mobile Q&A and performed a complementary survey study of 274 active mobile Q&A users. I find that mobile Q&A is deeply wired into users’ everyday life activities - its usage is largely dependent on users’ spatial, temporal, social con-texts - and the key factors of mobile Q&A usage are accessibility/convenience of mobile Q&A, promptness of receiving answers, promptness of posting questions and users’satisficing behavior information seeking. Fur-thermore, I found a unique usage pattern that is asking same questions repeatedly in different from conventional Q&A service, and it have many meaning (e.g., estimating users’ expected time to get answers). This findings reported in this thesis have significant implications on the design of mobile Q&A system.Keywords: Q&A Systems, Online Community, Human FactorsTable of ContentsAbstract (i)Table of Contents (ii)List of Figures (iv)List of Tables (v)List of Terms (vi)Chapter 1. Introduction1.1 Research Background (1)1.2 Motivation and Contribution (2)1.3 Research Purpose (2)1.4 Dissertation Structure (4)Chapter 2. Related Works2.1 Introduction to Q&A Service (5)2.2 Analyses of Popular Q&A Service (6)2.2.1 Conventional Q&A Service (6)2.2.2 Social Q&A Service (7)2.2.3 Mobile Q&A Service (8)2.2 Mobile Web and Web Search Usage (9)2.2 Question Classification (9)Chapter 3. Methodology3.1 Data Collection (10)3.2 Interaction in Naver Mobile Q&A (11)3.3 Analysis for Context (12)3.4 Question Classification (12)3.5 Unique Usage Pattern (14)3.6 Overall Process of Analysis (14)Chapter 4. Result4.1 Why People Use Mobile Q&A (16)4.1.1 Everyday Life Information Seeking (16)4.1.2 Factors of Mobile Q&A Usage (16)4.1.2.1 Accessibility of Mobile Q&A (18)4.1.2.2 Promptness of Posting Questions (19)4.1.2.3 Promptness of Receiving Answers (23)4.1.2.4 Users’ Satisficing Behavior of Information Seeking (24)4.2 Questions in Mobile Q&A (25)4.3 Interactive Behavior: Repeating and Refining Questions (28)4.3.1 Repeating Questions (31)4.3.2 Refining Questions (35)Chapter 5. Conclusion5.1 Summary (38)5.2 Design Implication (39)5.1 Conclusion (40)References (41)List of FiguresFigure 1 Wilson T.D (1999) (3)Figure 2 Extracted data from web page of Naver Mobile Q&A (10)Figure 4 The steps of this thesis (15)Figure 5 The result of survey (17)Figure 6 The result of survey (18)Figure 7 Hourly usage percentage (19)Figure 8 Hourly usage percentage of sports questions in Mobile Q&A (21)Figure 10 Hourly usage percentage of location questions in Mobile Q&A (22)Figure 11 Hourly usage percentage of location questions in Conventional Q&A (22)Figure 12 Response time of Mobile Q&A (23)Figure 13 Topic distribution of CQA and MQA (Total sum of genral and under 14 age) (26)Figure 14 Topic distribution in CQA and MQA (under 14 years) (26)Figure 15 Sceniors of Interactive behavior (28)Figure 16 Users' expected waiting time distribution (30)Figure 17 Topic distribution of repeating and non-repeating question (32)Figure 19 Active Period (Top 20% of users) (34)Figure 20 User distribution of repeating and non-repeating (35)Figure 21 Fraction of repeated/refined questions per user (37)List of TablesTable 1 Top 10 Q&A services (5)Table 2 Classification of mobile Q&A service (8)Table 3 List of categories (genral and under 14) (25)Table 4 Quality analysis of topic (27)Table 5 Independent sample t-test (34)Table 6 Example of situation1 (29)List of TermsTerm MeaningMobile Q&A serviceKind of Q&A service that users can post questions via their phone (e.g.,ChaCha, Naver Mobile Q&A).Conventional Q&A serviceKind of Q&A service that users can post questions via their PC or laptop(e.g., Yahoo! Answers, Ask, Naver Kanowled-In).Repeating questions Behavior that a user posting the same questions repeatedly.Non-repeating questionsBehavior that a user posting questions only once.Response rate Proportion of questions having answers.Response timeGap of time between posting question and answering that question.Chapter 1.Introduction1.1Research BackgroundOver last several years, the number of internet users and the average time spent online have increased rapidly. The high amount of using internet makes it possible that people can communicate with diversity of people even they haven’t met before. These changes enabled the emergence of Q&A services such as Naver Kin, Yahoo Answer---“the place to ask questions and get real answers from real people.” In Korea, it became an integral part of Koreans.In recent years, a mobile version of such Q&A services has been introduced to the market with rise of population of mobile and smart phones such as Naver Mobile Q&A, Jisiklog and ChaCha. Users can post questions by using their mobile phone (sent via SMS or mobile App) and receive answers via their phone. The number of Mobile Q&A services has been increasing over the past several years; e.g., Naver Mobile Q&A was introduced in April 2010, and more than 500,000 people have posted more than 3 million of ques-tions so far. The following are some examples of typical questions:∙What is the result of a baseball game today?∙How much does it cost to take a cab from Seoul station to the city hall?∙Is Homeplus open today?Mobile Q&A services have the same purpose of asking/answering questions as in conventional Q&A services, but there are some different characteristics when they arare compared to conventional Q&A ser-vices:1.Questions are posted more frequently.2.The length of questions is shorter.3.Askers can not search similar questions they want.(1) Using a conventional Q&A service, users can post questions only when they have access to a computer. Mobile Q&A service users can post questions whenever and wherever they want because of the portability and accessibility of mobile phones. Therefore, questions are more frequently posted than on internet Q&A service. (2) Since there are limitations regarding sending messages by using a phone, users can post relative-ly short questions. For example, the maximum length of a question in Naver Mobile Q&A is 150 letters against 1000 letters in Naver Kin; conventional Q&A service. (3) In Mobile Q&A services, users can not search questions that have already been posted before sending their own question. Those characteristic dif-ferences definitely can give implications to serious design issues.1.2Motivation and ContributionConventional Q&A services have received a lot of attention from research community, and signifi-cant amount of research has been conducted about users’ usage pattern, motivation and the design issues of a Q&A service. However, little is known about Mobile Q&A services. With increasing mobile or smart phone usage, the number of Mobile Q&A service users has rapidly increased. So far little is known about who typi-cally uses a Mobile Q&A service, and what kinds of questions are asked. There are several successful Mo-bile Q&A services, and those services have enough data (questions and answers) and users to analyze. In terms of these contexts, I need to understand Mobile Q&A services better, and hopefully this thesis can con-tribute to first suggestion of guidelines for improving the design of Mobile Q&A services. Also this work is the first large scale study on Mobile Q&A service.If the usage pattern of a Mobile Q&A service is different or unique when it is compared to conven-tional Q&A service, I can extract new meaning from the Mobile Q&A dataset. Moreover, it will shed light on improving the existing service.In last, this thesis is not proving specific phenomenon, which have already happened in other do-main. This thesis tries to explore what is going on Mobile Q&A service. It is a first step to understand gen-eral phenomenon, and it should be derive many issues future research in terms of Mobile Q&A service.1.3Research PurposeIn this thesis, I attempt to clarify the differences between conventional Q&A service and Mobile Q&A service, the largest Q&A service in Korea. Naver Mobile Q&A service was recently launched in April2010. In this work, I analyze almost the Q&A data set from June 2010 to July 2011. The data set doesn’t in-clude from April 2010 to May 2010, because there was a special promotion and many people used Naver Mo-bile Q&A to get some reward. I also perform a survey study with 240 active Mobile Q&A users to answer the research questions.Figure 1 is Wilson’s model of information behavior [1]. In briefly, people have a context of infor-mation need, and people have and consider an intervening variable which means constraints. An activating mechanism invokes the explicit risk reward theory and the social learning theory. These theories depend on people’s characteristics: what is their priority motivation? So, an activating mechanism can be related with users. Lastly, people select how to search information under the system that they selected. An information seeking process in a Q&A service can be represented by information of questions, namely topic, posting time, length of questions, and so on. Let’s suppose that a man needs to know how to get to the city hall and there is nothing to consult with. In this context, he considers ‘how urgent this situation is’, ‘where he is’ and any con-straints he has. Once he recognizes his environment around him, then the next process is that he takes an ac-tion to find an answer; e.g., asking people around him, calling the city hall or asking a Q&A service. This pro-cess is largely influenced by his characteristics or previous experiences. If he is too timid to directly ask a question to someone, he may considerer using a mobile Q&A service because a mobile phone is one of the most convenient ways for communications. An activating mechanism process is not the end of an information seeking process because the answer mostly depends on how he asks. He could ask with specific situation or just ask how to get to the city hall. After this process he can get answers and if it is not enough he can repeat a similar process with a different information source.Figure 1 Wilson T.D (1999)This process can be also divided into three concepts. i.e., contexts, users, and questions/answers. In this thesis, I seek answers to the following research questions based on this high level model:Research question1. Why people use mobile Q&A services?Users have their contexts when they have questions, and those contexts are connected to users’ characteristics. Sometimes, those contexts directly connect to questions asked in Mobile Q&A service.Research question 2. What kinds of questions are frequently asked in Mobile Q&A?Since answerers never know what is the context of the askers, there are no direct connection points between askers and answerers. However, questions are connection points between them. Therefore, I study any rela-tions between questions and answers. For example, what types of questions are answered well, and what is the usual latency for receiving answers.Research question3. How do users interact with mobile Q&A to satiate their information needs Interact with Mobile Q&A is should be different because of different characteristics of mobile phones; display size, access to internet and maximum length of questions.1.4Dissertation StructureThis thesis tries to solve conceptual questions to prove future implementation opportunities in the aim of developing practical and effective solutions based on existing theories.The rest of this thesis is organized as follows. In the chapter 2, I first review the related work on conventional Q&A services, social Q&A services (real-time Q&A service) and Mobile Q&A services. In chapter 2, I explain features of Naver Mobile Q&A service that is the data set for analysis. The methodology of data collection and survey study are presented in chapter 3.In chapter 4, the results of analysis are shown according to contexts, users and questions, and I ex-plain the meaning of results in terms of research questions. In chapter 5, I present the design implications based on this work to Mobile Q&A services; which domains will be good for applying Mobile Q&A service and what are the concerns when Mobile Q&A services are launched. And also chapter 5 includes conclude this thesis.Chapter 2.Related works2.1Introduction to Q&A servicesAdamic et al. [2] mentioned that “Everyone knows something” when analyzing Yahoo! Answers, one of the largest Q&A services. A Q&A service is a web service that people use to ask questions, and to seek answers through the Web. The topics in a Q&A service are very diverse. More than hundreds of Q&A sites have been launched so far. Some of the largest Q&A sites are listed in Table 1[3].Table 1 Top 10 Q&A servicesName Website URL Launched in Unique Visitors*M 1996 54 2005 48MM 1999 41.9M 2006 9.9 2003 6.6MM 2003 5.5M 2006 5.2M 2007 4.4M 1998 4.3M 2003 1.4* Monthly unique visitor estimates reported by in 2011.Many researchers have tried to understand these Q&A services; to name a few, what the motivations of users are, what do users ask, what is the usage behavior of users? Especially, Yahoo Answers is analyzed by many researchers [2, 4-7]. The most sites are conventional Q&A services except ChaCha. ChaCha is one of the largest Mobile Q&A services where people can ask questions by SMS. ChaCha focuses on that people’s curiosity occur anytime and anywhere. As a result, more than 6 million people used the service so far. This trend of using a Q&A service also came up (e.g., Naver Knowledge-In, Naver Mobile Q&A, Daum Live and Jisjiklog) in Korea. In particular, Naver Knowledge-In has 16 million users, and this service has been investi-gated by Nam et al. [8].2.2Analyses of Popular Q&A serviceThere are three types of Q&A services, namely conventional Q&A services, social Q&A services, and Mobile Q&A services. Some of the large-scale Q&A services analyzed in the research community include Yahoo! Answer, Naver KiN, Microsoft Live Q&A, Google Answer, and Mahalo. In the following, I review the related work that characterizes the Q&A services.2.2.1Conventional Q&A serviceAdamic et al. [2] showed that in Yahoo! Q&A, interaction among users varies depending on the topic and is highly skewed (via the social network analysis), knowledge sharing patterns across different topic cate-gories (i.e., experts in different domains help one another) exist, and best answers can be predicted based on reply/thread length. In their analysis of Naver KiN, Nam et al. [8] studied the user behavior of answerers and found that the level of participation is highly skewed, answerers’ participation tends to be intermittent, and the expected level of their expertise is lower than that in specialized online forums.Questions in Q&A services are generally classified as soliciting facts, opinions, and suggestions [9]. Harper et al. [10] showed that the types of questions in Q&A services are broadly classified into two catego-ries, namely informational questions (e.g., fact and advice) and conventional questions (e.g., opinion and self-expression). Rodrigues et al. [11] found that Q&A services can be also used for socializing such as chatting and entertainment (puzzles, riddles), and unlike Yahoo Answer, a significant fraction of answers in Microsoft Live Q&A (16.4%) belongs to such a category.In Q&A services, the response time tends to be fairly long. Hsieh and Counts [12] reported that in Mi-crosoft Live Q&A, the average time to receive an answer took 2 hours and 53 minutes, and 20% of the ques-tions never received an answer. Zhang et al. [13] showed that in a specialized Q&A service for Java program language, the average time to receive an answer was around 9 hours.The motivation behind answering questions is largely dependent on a mixture of intrinsic factors (e.g., perceived ownership of knowledge, enjoyment and feelings of gratitude and respect) and extrinsic factors (e.g., monetary rewards, reputation systems) [14]. Online discussion forums such as Usenet groups do not offer any explicit incentive mechanisms and mostly rely on intrinsic factors. In contrast, Q&A services typi-cally employ incentive mechanisms to solicit users’ participation. Nam et al. [8] showed that the motivation of answering in Naver Knowledge-In is due to both intrinsic and extrinsic factors; i.e., altruism is the leading factor, followed by business motives, learning, hobby, and earning points (in its reputation system). When monetary rewards are involved, it is reported that fee-based services elicit better answers than none-fee based services (e.g., Google Answer vs. Yahoo! Answer), and higher quality answers can be acquired by paying more money [10]. Hsieh et al. [12] analyzed Mahalo, a fee-based Q&A service and showed that askers wish to pay when requesting facts and will pay more when asking difficult questions.2.2.2Social Q&A serviceOne of the ways to ask question through the Web is using SNS (Social Networking Service). Teevan and Panovich [15] analyzed what kinds of questions (topic, type) are asked through the Web and the motiva-tion (e.g., trust, answer speed, failed search) of using SNS to solve their curiousity. They surveyed 624 users who are actually using Twitter and Facebook, and organized users’ motivations and type of questions. Thom et al. [16] showed a large scale analysis of emergent question and answer (Q&A) behavior in an enterprise SNS and then described user motivations for social information seeking.2.2.3Mobile Q&A serviceThere was no large-scale analyses of Mobile Q&A service so far, even though there have been already successful Mobile Q&A services. Popular mobile Q&A services include ChaCha and Ask People in the US, AQA in the UK, Jisiklog, Naver Mobile Q&A and Daum Live Q&A in Korea. Mobile Q&A services in the market can be classified based on the following dimensions: (1) whether question posting is limited to mobile devices (i.e., SMS/MMS and mobile App/Web), (2) whether there is a monetary incentive mechanism, and if any, who pays the fees, and (3) whether a mobile Q&A service is mixed with a conventional Q&A service (i.e., presented together). Table 2 summarizes the classification of various mobile Q&A services. Note that those services that only support mobile devices (ChaCha, AQA, Naver Mobile Q&A) have the length limit on questions/answers as SMS/MMS is also used, but a mixed service like Ask People does not have such a con-straint. ChaCha originally accepted questions via SMS only, but this restriction was recently relaxed, and questions can now be posted via the Web. In this thesis, I analyze the usage patterns of Naver Mobile Q&A, a representative mobile Q&A service as it only supports question posting via mobile devices. I believe that this work sheds lights on understanding the overall usage patterns of mobile Q&A systems in general.Table 2 Classification of mobile Q&A serviceInteraction Method Incentive Mixed Naver Mobile Q&A SMS, Mobile App/Web Reputation No ChaCha SMS, Mobile App/Web, Web ChaCha pays -Jisiklog SMS, Mobile App Asker pays -AQA SMS, Mobile App Asker pays - Ask People Mobile App/Web, Web Reputation YesDaum Live Mobile App/Web, Web Reputation No2.3Mobile Web and Web Search UsageThe taxonomy of web tasks is generally classified as information seeking, casual browsing, communications (e.g., chatting), transaction (e.g., bank services) [17]. In their recent study, Cui and Roto [18] reported that in mobile environments, tasks are rather limited to information seeking, communications, and transaction with an additional task of maintaining personal content as a part of personal space extension. The user behavior study about mobile Internet shows that such web tasks are largely dependent on users’ contexts; e.g., personal context (e.g., goals) and environmental context (e.g., distractions, social interactions) [17, 18]. Kamvar and Baluja [19] performed quantitative analysis of mobile web search usage from Google Mobile Search data set in 2004 (connected via mobile Internet). The overall topics are quite consistent with the desktop search statis-tics. Popular topics include adults (e.g., “free porn”), computer and communications (e.g., “free ringtones”), and entertainments (e.g.,“ imdb”). The average number of words per query is 2.3, and that of letters is 15.5. Users tend to perform a series of related queries by refining/repeating previous queries, including automatic spell correction. In their recent study on mobile search pattern evolution, Yi and Maghoul [20] reported that the query topics experienced significant change (consistent with desktop search) when comparing the data set from year 2007 and 2010 (e.g., decrease of entertainment queries, increase of local and commerce queries). In this thesis, I discuss mobile Q&A communities that are very different from traditional web search. This work compliments the prior research on the user behavior of mobile web search in that we use a large-scale mobile Q&A data set supplemented with a survey study of actual users to characterize information seeking behavior with mobile Q&A.2.4Question ClassificationQuestion classification is one of the key points in analyzing Q&A service. Usually, questions in con-ventional Q&A service have their categories classified by askers. Therefore, most of papers [11, 15] directly used those categories. If there were not any benchmark categories, separate question classification is needed. Teevan and Panovich [15] used manual classification in their research. Differently, Zhang and Lee [21] compared among automatic classification method; Nearest Neighbors, Naïve Bayes, Decision Tree, Sparse Network of Windows, and Support Vector Machines.Chapter 3.Methodology3.1Data CollectionTo understand Mobile Q&A service, I gathered data of Naver Mobile Q&A service [22], which is one of the most famous Mobile Q&A services in Korea. More than 5000 questions are usually posted every day. I could extracted total seven fields from the answer pages7 kinds of information as shown in Figure 2.Figure 2 Extracted data from web page of Naver Mobile Q&AThe explanation of data shown in this format:1. Question2. Asker’s ID3. Time that question is posted4. Number of answers5. Answers6. Time that answer is posted7. Answerer’s IDThe crawled data is from 1st June 2010 to 31th July 21, 2011. Naver Mobile Q&A was actually launched in April 2010. However, there was a special promotion from April to May 2010. Since promotion may influence some part of users’ motivation, I decided to omit the data from the promotion period.The total number of questions and answers in the dataset is 2,483,624 and 3,086,365, respectively. The average number of answers per question in the dataset is 1.27. In contrast to conventional Q&A services, the categories of questions are not specified because it allows users to post questions via SMS (short message service). That means GUI can’t be provided to users, so only textual information is exchanged.To compare between Mobile Q&A service and conventional Q&A service, I crawled Naver Knowledge-in (from 2011/10/03 to 2011/10/15) [23]. Naver Knowledge-In is provided by same company of Naver Mobile Q&A.3.2Interaction in Naver Mobile Q&AIn Naver Mobile Q&A, users can post questions only via mobile devices; a list of supported methods of com-munications includes SMS/MMS, Mobile Web, and Naver App. Since it basically uses SMS, there is a strict limit on the length of a question/answer, i.e., 150 letters. For a given question, users can also post the related image using MMS. Registered users of Naver can post the questions on the Web. As shown in Figure 2, a requester’s user ID is revealed along with the delivery method (e.g., SMS, MobileWeb, and Naver App). Nav-er currently restricts that a user can post at most 30 questions a day.The registered users can post answers through the Naver Mobile Q&A Web site as in the conventional Q&A sites (see Figure 2). The front page of the Web site presents a list of 20 most recent questions (in the form of the upper box in Figure 2 stacked). The old lists can be browsed by clicking the next button located at the bot-tom of the page. The questions are ranked on the basis of recency; whenever a new question arrives, the entire rank trickles down by one, and the 20th ranked question on the front page will be placed on the second page. Answerers can pause/resume real-time shuffling of questions using the pause/play button located at the top of the page. Requesters can choose to receive answers via SMS (regardless of whether they posted questions via Mobile Web or Naver App). Due to the financial burden involved, Naver Mobile Q&A only delivers at most three answers via SMS. If more than three answers are made, the rest can be accessed via mobile Web and Naver App. Naver has the point based reputation system of answerers. A user can earn 10 points for each an-swer. The following are the notable differences from the traditional Q&A: (1) a question is expired after 24 hours, and expired questions cannot be answered; (2) users cannot edit the submitted questions/answers; (3) there is no option for selecting the best answer, and (4) there is no predefined question category.3.3Analysis for Understanding ContextsFor the context that people use Mobile Q&A site, I analyze general phenomena such as number of questions per hour (or day), inter-arrival time of posting questions and response time to get answers. The re-sults from this analysis will be compared with people’s common life pattern, as it can explain users’ general context. To better explain the context of question asking, I show the topics of questions in conventional Q&A service and Mobile Q&A service.I surveyed people who are actually using the mobile Q&A service in order to identify the context of Mobile Q&A service users. Total 30,000 Naver Mobile Q&A users are randomly selected from the entire user set, and 274 users answered our survey questionnaire. The first part of the survey asked how users are famil-iar to use mobile phone and their general motivations to a Mobile Q&A service. In the second part of the sur-vey, I showed recent questions which user actually asked, and asked users to describe their specific situations when they post questions. The result of second survey can explain more detail contexts.3.4Question ClassificationFigure 3 The process of question classificationIn contrast to a conventional Q&A service, the categories of questions are not present in Mobile Q&A. To know what kinds of questions are posted in Mobile Q&A service, topic classification is necessary. Teevan and。

相关文档
最新文档