Communication vs. computation
三、科技英语的翻译
总之,翻译科技英语词汇 时,尤其需要广博的专业知识, 同时应将上述几个方面密切结 合E,va使lua汉tio译n过on来ly.的科技英语词 ted with Aspose.S汇lid既es有fo学r 术.NE味T又3.通5 C俗li易en懂t P,ro既file 5.2 Copyright简20洁04又-2不01至1 产As生po岐se义P,ty 既Ltd切. 中 原文的基本概念又遵循汉语的 词法及理据色彩。 请阅读课本page 28-31。
进行适当的测量、Ev观al察ua和tio控n制o,nly使. 之以最高的效率 ted 运wi转th的As这p样os一e.个Sl概id念es。fo自r 动.N化ET要3求.5不C断li地en详t P细r了ofi解le 5.2
机佳器校C系正o统 措py的 施ri工。gh作从t 2这,0一以04真便-2正在01含一1义有A上必sp来要os看时e可,P立t自y 即动Lt采化d.取只最有
tedthwe itshysAtesmpo, ssoe.Sthlaidtetshefobre.sNtEcTor3re.c5tiCvelieancttioPnrocfailne b5e.2
applieCd opimyrmigehdtia2te0l0y4-2th0e1y1 Absepcoomsee PtnyecLetsds.ary. ⑷
⑴‘Automation’ has been, and still is, a greatly misused
word, but its proper meaning, and therefore its
implications, is gradually becoming better understood.⑵
科技英语翻译
1. Automation in this true sense is brought to full fruition only through a thorough exploitation of its three major elements, communication, computation, and control----the three “Cs”.自动化按其确切的意义,只有全面运用通信、计算和控制三个主要组成部分(“三C" )才能完全实现。
2. In the case of the blast-furnace, the computer would need to be supplied with information about the raw material which goes into the furnace, the temperatures at which the furnace works, and the best way of dealing with the various ingredients.就高炉来说,需要给计算机提供装人高炉的原料的信息、高炉工作温度的信息和处理各种各样配料的最好方法等方面的资料。
3. The operation of this part of the steel plant is a complex and highly skilled operation, requiringa great deal of knowledge, a great deal of integrated information and rapid decision-making, to make sure the furnace operates efficiently in relation to the next stage in the process.钢厂的高炉操作是一项复杂而要求技术熟练的作业,需要大量的知识和大量的综合信息,并迅速地做出判定选择,以便确保高炉工艺流程中的下一阶段的有效工作。
量子测量的基本原理与方法
量子测量的基本原理与方法量子测量是量子力学的核心概念之一,它是通过测量量子系统的某个物理量,从而获得相应物理量的取值。
本文将介绍量子测量的基本原理与方法,以及其在量子信息和量子计算中的应用。
一、量子测量的基本原理量子测量是通过与待测系统相互作用,从而获得待测系统某个物理量的取值。
根据量子力学的理论,量子测量可被描述为一个操作符,被称为测量算符或观察算符。
测量算符在某个测量基下的特征值对应着物理量的取值。
量子测量的结果是以概率形式出现的,这是由于测量后的量子系统会坍缩到某个本征态上。
二、量子测量的方法1. 项目测量(Projective measurement)项目测量是指将待测量系统的态投影到测量基矢上,从而获得测量结果的方法。
在量子力学中,一个完备的测量基由一组正交归一化的矢量构成。
通过选择不同的测量基,可以测量不同的物理量。
例如,测量自旋系统的自旋在某一方向上的分量时,可选取以该方向为轴的两个本征态作为测量基。
而测量位置时,则选取位置算符的本征态作为测量基。
2. 连续测量(Continuous measurement)连续测量是一种对量子系统进行连续监测的方法。
它是通过与待测系统相互作用,而不是一次性地对待测系统进行测量。
连续测量可以获得系统在某一物理量上的演化过程,并得到与时间有关的测量结果。
典型的例子是量子光学中的光子计数器,它可以实时地对光场进行弱测量并得到光子数的信息。
三、量子测量在量子信息与量子计算中的应用量子测量在量子信息与量子计算中发挥着重要的作用,以下简要介绍几个相关的应用:1. 量子态重构(Quantum state reconstruction)量子态重构是通过多次测量,根据测量结果推断出待测系统的态矢量的过程。
利用量子测量的结果,可以重建出复杂的量子态,这对于量子信息的处理和传输至关重要。
2. 量子通信(Quantum communication)量子通信是一种基于量子特性的安全、高效的通信方式。
tion结尾的单词200个
tion结尾的单词200个abbreviation(n)缩写,缩略形式abdication(n)辞职,退位aberration(n)偏差,差错,脱离常规,越轨,变形abnegation(n)放弃,自我克制,否认Abomination(n)憎恶,憎恨abrogation(n)废除,废止acceleration(n)加速acceptation(n)公认的意义,词义acclamation(n)欢呼accommodation(n)住处,和解acculturation(n)文化适应,文化交流accumulation(n)积累accusation(n)指责,控告adaptation(n)改编,适应环境adjuration(n)祈求,命令administration(n)管理,实施,行政部门admiration(n)钦佩,赞赏,羡慕adoration(n)爱慕,崇拜adulation(n)奉承,谄媚,献媚,吹捧adulteration(n)掺假,劣等货,假货,次品adumbration(n)轮廓,预示,阴影affectation(n)做作,虚假affiliation(n)联系,联合affirmation(n)确定,确认agglomeration(n)结聚,一堆,结块aggravation(n)加重,更恶化,恼怒,愈益严重aggregation(n)集合,聚集,群体agitation(n)鼓动,搅动;焦虑,烦恼alienation(n)转让; 让渡alimentation(n)营养allegation(n)宣称,主张,断言,指控,辩解alliteration(n)(诗歌的)头韵allocation(n)分配; 拨款(权)alteration(n)变更;改变;更改altercation(n)争吵; 争辩alternation(n)交替,轮流amalgamation(n)汞齐化, 融合, 合并amelioration(n)改善,改良,改进Americanization(n)美国化amortization(n)摊销; 分期偿还amplification(n)扩大,补充材料amputation(n)截肢animation(n)活泼,有生气;卡通制作annexation(n)并吞,合并annihilation(n)灭绝,湮灭annotation(n)注解Annunciation(n)报喜anticipation(n)预料,期望,盼望appellation(n)名称,称呼application(n)请求;申请;运用,应用程序,用法,涂抹appreciation(n)欣赏;鉴赏;感激;增值approbation(n)称赞,认可appropriation(n)拨款,挪用公款approximation(n)近似值arbitration(n)仲裁,调停articulation(n)发音; 清晰度asphyxiation(n)窒息aspiration(n)雄心,抱负assassination(n)暗杀asseveration(n)断言,誓言assimilation(n)同化; 吸收; 消化association(n)协会,团体;联想;关联attestation(n)证明; 证实; 证据augmentation(n)增加,扩大auscultation(n)听诊authorization(n)授权,认可automation(n)自动化aviation(n)航空工业avocation(n)副业,业余爱好backwardation(n)现货升水;交割延期费calculation(n)计算,估算calibration(n)校准,刻度cancellation(n)取消causation(n)原因,诱因,起因capitalization(n)资本化,资本总额,股本,大写capitation(n)人头税capitulation(n)投降captivation(n)魅力,吸引力carnation(n)康乃馨,淡红;肉色castigation(n)惩罚,苛评categorization(n)分类celebration(n)庆祝会centralization(n)集中;中央集权化cerebration(n)用脑,思考certification(n)证明cessation(n)中止,停止characterization(n)描绘,刻画circulation(n)血液循环,发行量citation(n)引证,引用文,传票civilisation(n)文明,文化,开化,教化civilization(n)文明;文明社会;文明地区clarification(n)澄清,净化classification(n)分类,归类,类别coagulation(n)凝固,凝结coeducation(n)男女同校cogitation(n)思考,苦思cohabitation(n)同居collaboration(n)合作,通敌,勾结collation(n)便餐,整理collocation(n)排列,安排,布置colonization(n)开拓殖民地,殖民coloration(n)着色法,染色法;颜色,色泽combination(n)结合,联合,混合,数字密码commemoration(n)纪念,庆典commendation(n)赞赏,嘉奖,推荐commercialization(n)商品化commiseration(n)怜悯,同情communication(n)通讯;消息;通信工具compellation(n)姓名,头衔compensation(n)补偿,补偿金,赔偿compilation(n)编译; 编辑,选辑complication(n)困难,难题;并发症computation(n)计算,估计computerization(n)计算机化concatenation(n)连结,一连串concentration(n)集中;专注;浓度conceptualization(n)概念化conciliation(n)安慰; 调解; 调停condemnation(n)谴责,定罪condensation(n)冷凝,压缩,液化confederation(n)联邦,同盟configuration(n)轮廓,结构,布局,形状confirmation(n)证实;确认confiscation(n)没收,充公,征发conflagration(n)建筑物或森林大火confrontation(n)对抗;面对;遭遇;对峙,冲突confutation(n)驳倒,驳住conglomeration(n)聚集;凝聚congratulation(n)祝贺congregation(n)集合; 团体; 集合在一起的群众conjugation(n)结合,配合,动词的变化conjuration(n)戏法, 魔法, 施法, 恳求connotation(n)言外之意,含义consecration(n)供献,奉献,神圣化conservation(n)保护,节约,守恒consideration(n)考虑;体贴;原因;照顾;研究consolation(n)安慰,慰问consolidation(n)合并,巩固,团结,加强constellation(n)星座consternation(n)惊愕,惊慌失措constipation(n)便秘consultation(n)咨询;商讨会,磋商,查阅consummation(n)达到极点,完成containerization(n)集装箱化contamination(n)玷污,污染,混淆contemplation(n)默祷,沉思continuation(n)继续,延续conversation(n)会话,谈话convocation(n)召集,会议cooperation(n)合作,协作,配合coordination(n)协调,配合coronation(n)加冕典礼corporation(n)公司,企业correlation(n)相互关系,对射,关联corroboration(n)证实,证据corrugation(n)波浪形状,起皱纹creation(n)创造物,创作;宇宙,世界crimination(n)控告;定罪;责备culmination(n)顶点,结果,高潮,终点cultivation(n)耕种;培养damnation(n)非难, 被罚下地狱, 诅咒decentralization(n)分散,分权管理decertifacation(n)否认代表资格declamation(n)雄辩,高调declaration(n)宣布,宣言;宣称;表白;申报declination(n)倾斜;衰微decoration(n)装饰,装饰品dedication(n)题献;奉献defalcation(n)挪用,盗defamation(n)破坏名誉,中伤,诽谤defecation(n)通便; 排粪deflation(n)紧缩通货deforestation(n)采伐森林deformation(n)损坏;变形;畸形degeneration(n)退化,恶化,堕落degradation(n)降级;退化;堕落;衰退deification(n)神化,崇拜delectation(n)享受,愉快delegation(n)代表团deliberation(n)熟虑,熟思,协议delineation(n)画轮廓,略图,图形demarcation(n)定界线;分开demonstration(n)证明;示范demoralization(n)道德颓废,堕落,士气沮丧denomination(n)宗派,教派;(货币)面额,命名denotation(n)指示,意义denunciation(n)谴责;痛斥,告发depopulation(n)人口减少deportation(n)驱逐,放逐depreciation(n)贬值;蹂躏,折旧depredation(n)劫掠,破坏,蹂躏deprivation(n)缺乏;剥夺,丧失deputation(n)代表,代表团deregulation(n)违反规定,反常;解除管制规定derivation(n)引出;起源,由来derogation(n)毁损,减损,堕落desecration(n)亵渎神圣,污辱designation(n)指定;名称;任命desolation(n)荒凉,凄凉,荒废desperation(n)绝望destination(n)目的地,终点detemination(n)决定deterioration(n)恶化,堕落determination(n)决心,坚决,坚定detestation(n)憎恶,嫌恶,厌恶的人detonation(n)爆炸,爆炸声,引爆devaluation(n)法定贬值devastation(n)毁坏deviation(n)背离,偏离;离经叛道;偏差dictation(n)口授,听写differentiation(n)区别,分化,变异dilapidation(n)破旧,荒废dilation(n)扩大,张大disapprobation(n)不答应, 不赞成, 非难discoloration(n)变色,褪色discrimination(n)辨别;识别力;歧视disinclination(n)不起劲; 不感兴趣; 厌恶; 不愿意disinflation(n)反通货膨胀disintegration(n)分散,解体,瓦解disintermediation(n)金融中介作用削弱dislocation(n)脱节,动乱dispensation(n)分配,施与,配药disputation(n)争论,议论,驳斥disqualification(n)取消比赛资格,不合格dissemination(n)散布,传播,普及dissertation(n)论文dissimulation(n)掩饰,虚伪,装糊涂dissipation(n)浪费,消耗,distillation(n)蒸馏,净化,精华diversification(n)多样化divination(n)占卜; 预测; 预言; 先知documentation(n)文件,文本domestication(n)驯服,教化domination(n)控制,支配,管辖donation(n)捐赠,捐款duplication(n)重复; 复制; 副本duration(n)持续时间,期间edification(n)陶冶,教诲education(n)教育,培养,训练ejaculation(n)突然的叫喊; 绝叫; 失声elaboration(n)详尽阐述,详细说明elevation(n)高地,高处;海拔;立面elimination(n)消灭,排除,消除elongation(n)延伸elucidation(n)阐明; 说明emaciation(n)消瘦,衰弱,憔悴emanation(n)散发,发出emancipation(n)释放,解放,解脱embarkation(n)乘船, 搭机, 装载emendation(n)订正,校订emigration(n)移民,移居emulation(n)竞争; 效法; 仿真enumeration(n)列举enunciation(n)阐明,发表equalization(n)均衡,均等equation(n)方程式,等式;综合体equitation(n)骑术equivocation(n)模棱两可的话,含糊话eradication(n)根除estimation(n)判断,值计,尊重evacuation(n)撤离; 撤退; 疏散evaluation(n)评估,评价evaporation(n)蒸发(作用)exaggeration(n)夸张exaltation(n)得意,高兴examination(n)考试;检查,细查exasperation(n)愤慨,激怒,激化,加剧excavation(n)发掘excitation(n)刺激; 激动; 激发; 鼓舞exclamation(n)感叹;感叹词;呼喊excommunication(n)逐出教会execration(n)诅咒;憎恶exemplification(n)例证,范例;exhalation(n)呼气,蒸发,发出物exhilaration(n)高兴,活跃exhortation(n)劝告,规劝exoneration(n)免罪; 免除; 免除责任; 确定无罪expectation(n)期待,期望,预期experimentation(n)试验;实验法expiation(n)赎罪,补偿expiration(n)期满,终止,呼气explaination(n)解释,说明explanation(n)解释,说明;理由;阐述exploitation(n)开发,开采exploration(n)探险;勘探;探测exportation(n)出口,输出expostulation(n)劝戒;忠告expropriation(n)没收,征用extenuation(n)减轻,酌情减轻extermination(n)消灭,根绝extirpation(n)根除,铲除exultation(n)欢腾; 狂欢; 狂喜; 得意fabrication(n)制造;构造物;捏造falsification(n)窜改fascination(n)入迷,迷恋;魅力federation(n)同盟;联邦;联合;联盟;联合会fermentation(n)发酵fertilization(n)施肥,土地肥沃figuration(n)定形,外形,轮廓filtration(n)过滤,筛选fixation(n)定置,固定,定色flirtation(n)调情,调戏,挑逗fluctuation(n)波动,涨落,起伏fomentation(n)煽动,助长formation(n)创建;形成;编队;形成物formulation(n)配方;构想;表达方法fornication(n)通奸, 乱伦, 婚外性行为fortification(n)防御工事,要塞,筑城foundation(n)基础;地基;基金会;依据frustration(n)挫败,沮丧fulmination(n)抨击,谴责fumigation(n)烟熏,熏仓generalization(n)一般化;概括,归纳generation(n)一代,一代人;产生germination(n)发芽,萌芽,发生gestation(n)怀孕,孕育时期gesticulation(n)姿势,手势,做姿势传达globalization(n)全球化gradation(n)渐变;阶段,等级graduation(n)毕业,刻度gratification(n)满足,喜悦gravitation(n)引力,重力gustation(n)品尝;味觉habitation(n)居住; 住所; 住处; 聚居地hallucination(n)幻觉,幻象hesitation(n)暂停; 犹豫; 口吃; 含糊hibernation(n)冬眠humiliation(n)羞辱; 耻辱; 屈辱; 丢脸hybridization(n)杂交,配种,杂种培殖hyperinflation(n)恶性通货膨胀hypothecation(n)抵押; 担保契约identification(n)识别,鉴定;身份证illumination(n)照明;启发,灯饰,阐明illustration(n)说明,图解;例证imagination(n)想象;想象力;空想imitation(n)仿制品;模仿,赝品immigration(n)外来的移民,移民总称immolation(n)牺牲品,杀戮immunization(n)免疫,免疫作用implementation(n)实施; 贯彻; 实现,落实implication(n)含义,暗示,暗指importation(n)进口,输入品imprecation(n)祈求,诅咒impregnation(n)受胎,受精,注入improvisation(n)即兴创作imputation(n)归罪;诋毁inappreciation(n)不欣赏;不正确inauguration(n)就任,就职incantation(n)咒语,符咒incarceration(n)监禁,监狱incarnation(n)具体化,化身inclination(n)倾向,爱好,斜坡incorporation(n)结合,合并incubation(n)孵卵期;潜伏期indemnification(n)赔偿,赔偿金indentation(n)凹痕; 缩进; 锯齿状; 缺口indication(n)迹象;指示;表示;表明,暗示indignation(n)愤怒,愤慨,义愤indoctrination(n)灌输,教导industrialization(n)工业化infatuation(n)迷恋;热恋;着迷infiltration(n)浸润,渗入,渗透inflammation(n)发炎,炎症,怒火,燃烧inflation(n)通货膨胀information(n)消息,信息;资料inhalation(n)吸入; 吸入药剂initiation(n)开始;启蒙;入会仪式innovation(n)创新,改革;新方法inoculation(n)接种; 预防注射insinuation(n)暗示,暗讽inspiration(n)灵感;灵感来源;鼓舞;妙计installation(n)安装;装置;设施instigation(n)煽动,刺激instrumentation(n)仪表,器乐谱写insulation(n)绝缘;隔离;孤立,隔热integration(n)一体化,联合,结合,综合internationalization(n)国际化interpolation(n)插入; 窜改; interpretation(n)解释,演绎,口译interrogation(n)讯问;审问;疑问句intimation(n)暗示,通知intimidation(n)恐吓; 威胁intonation(n)语调,声调intoxication(n)陶醉,中毒,喝醉inundation(n)泛滥,洪水,淹没invation(n)侵入,侵略,侵犯investigation(n)调查,研究invitation(n)邀请,招待;请柬invocation(n)祈祷,调用irradiation(n)照耀; 发光; 阐明; 启发irrigation(n)灌溉;[医]冲洗irritation(n)愤怒,急躁,刺激isolation(n)隔离,孤立iteration(n)迭代(法); 循环; 重复,新版软件jubilation(n)欢乐,欢庆justification(n)正当理由;合理的解释,辩护laceration(n)撕裂,划伤lamentation(n)悲叹,哀悼laudation(n)赞美,赞赏legation(n)使者的派遣legislation(n)立法,法规legitimation(n)合法,合法化libation(n)奠酒(给神献酒),饮酒liberalization(n)自由化liberation(n)解放limitation(n)限制;限度,局限liquidation(n)清除; 停止营业litigation(n)诉讼,起诉localization(n)定位; 局限; 地方化; 本地化location(n)位置,场所,定位,测量lubrication(n)润滑lucubration(n)刻苦研究machination(n)阴谋,诡计;策划magnification(n)放大; 倍率majorization(n)优化maladministration(n)管理不善manifestation(n)表现,显示,示威运动manipulation(n)操作;操纵;控制;(对账目等的)伪造mastication(n)咀嚼masturbation(n)手淫matriculation(n)大学入学,入学许可mechanization(n)机械化mediation(n)调解,仲裁medication(n)药物治疗;药剂,药物meditation(n)熟虑;(尤指宗教的)默想,沉思;冥想录mensuration(n)测定,测量,测定法migration(n)定期迁移;迁居,迁徙ministration(n)职务,服侍,援助misadministration(n)管理失当misallocation(n)不合理分配miscegenation(n)人种混杂; 混血; 黑白通婚; 杂婚mitigation(n)缓和,减轻,镇静moderation(n)适度;自我节制;稳定,镇定modernization(n)现代化modification(n)缓和;修改;修饰modulation(n)调制; (声音之)抑扬; 变调molestation(n)折磨,干扰,妨害mortification(n)窘迫,屈辱motivation(n)动机,刺激multiplication(n)增加,乘法mutation(n)突变,变异mutilation(n)切断,毁损narration(n)叙述;故事;叙述法natation(n)游泳,游泳术nationalization(n)国有化naturalization(n)归化,移入,移植navigation(n)航行;航海术;导航negation(n)反面;对立面;否定;否认negotiation(n)商议,谈判neutralization(n)中立化,中立状态,中和nomination(n)提名; 指派; 任命normalization(n)正常化,标准化notation(n)符号,注释notification(n)通知;通知单;布告;公布novation(n)更替nullification(n)无效,废弃,取消objurgation(n)叱责,非难oblation(n)供奉,奉献,祭物obligation(n)义务,职责,责任observation(n)注意;观察;观察力occupation(n)占领,占据;职业operation(n)操作;手术;运算ordination(n)授任圣职organisation(n)组织,安排,团体,有机体organization(n)组织;团体,机构orientation(n)取向;定位;方向;任职培训;向东ornamentation(n)装饰;装饰品oscillation(n)振动,动摇,彷徨,振幅ostentation(n)夸示,炫耀overpopulation(n)人口过剩oxidation(n)氧化palliation(n)减轻,掩饰palpation(n)触诊; 扪诊palpitation(n)悸动, 跳动, 心跳participation(n)参加,参与pasteurization(n)巴氏消毒法peculation(n)盗用penetration(n)穿透;渗透;侵入peregrination(n)游历(尤指在国外)perforation(n)穿孔,打眼,贯穿permeation(n)渗透; 弥漫; 充盈permutation(n)排列变化,彻底改变peroration(n)结尾,结论personification(n)典型;化身;拟人化;象征perspiration(n)出汗,汗水perturbation(n)不安,烦扰;扰乱;紊乱plantation(n)种植园;栽植polarization(n)极化pollination(n)授粉population(n)人口;全体居民potation(n)畅饮;饮料precipitation(n)仓促,降雨量predestination(n)预定; 命运predication(n)预报;判断premeditation(n)术前用药,计划,考虑preparation(n)准备,预备,筹备presentation(n)介绍;报告;外观;表演,呈现preservation(n)保存,储藏;保持prestidigitation(n)变戏法,手法敏捷prevarication(n)支吾,搪塞privation(n)贫乏,贫困,丧失privatization(n)私有化probation(n)试用(期);缓刑期proclamation(n)宣布,公布;公告procrastination(n)拖延,担搁procuration(n)代理(权)委托;佣金;获得profanation(n)亵渎神圣,冒犯; 滥用prognostication(n)预知,预言,预测proliferation(n)增殖,分芽繁殖,扩散prolongation(n)延伸, 延长, 延长部分promulgation(n)发布,公布,普及pronunciation(n)发音,发音法propagation(n)繁殖;宣传;传播propitiation(n)安抚,抚慰; 劝解prorogation(n)休会prostration(n)平伏,跪倒,疲劳,虚脱protestation(n)主张,断言,明言provocation(n)激怒,挑拨,刺激publication(n)公布;出版;出版物pulsation(n)脉动,脉搏;悸动punctuation(n)标点符号purgation(n)净化,洗罪purification(n)纯化,净化,提纯,qualification(n)资格;素质,资历;限制条件quotation(n)引用;引文;报价单radiation(n)放射;辐射物,射线ramification(n)衍生物,结果;分叉,分支;支流ratification(n)正式批准,承认ratiocination(n)推理,推论rationalization(n)合理化,有理化realization(n)实现;认识,领会,变卖资产recantation(n)改变论调;改变宗教信仰recapitulation(n)重述要点,概括,摘要reciprocation(n)互换,交往,来往recitation(n)朗诵;背诵;习题课reclamation(n)开垦;改造;(废料等的)回收,教化recommendation(n)推荐,介绍;劝告reconciliation(n)协调,和解recreation(n)娱乐,休闲recrimination(n)相互指责,吵架;反诉;揭丑recitation(n)朗读,逐一列举rectification(n)纠正;改正,校正,提纯;整顿recuperation(n)恢复reflation(n)通货再膨胀reformation(n)改革,改正,改善refrigeration(n)冷藏,冷却,制冷refutation(n)反驳,辩驳regeneration(n)重生,新生regimentation(n)系统化,组织化;团队精神,纪律regionalization(n)区域化registration(n)登记,注册,挂号regulation(n)规则,规章;管理rehabilitation(n)恢复,复员,平反reincarnation(n)再投胎;再生;化身relation(n)关系,联系;家属relaxation(n)放松,缓和,休息relocation(n)迁移,调动,重新安置remediation(n)补救,纠正,整改remuneration(n)报酬,赔偿,补偿renovation(n)翻新;修复;整修,革新renunciation(n)放弃;宣布终止,抛弃reorganization(n)改组,改造,整顿reparation(n)赔偿,补偿,弥补Repatriation(n)遣返replication(n)复制,回答,答辩,拷贝representation(n)描写,描绘;代表reprobation(n)非难,叱责,排斥republication(n)翻版,再发布repudiation(n)拒付,否认,批判,休妻reputation(n)名誉,名声reservation(n)保留,预订resignation(n)辞职,屈从,认输(棋)respiration(n)呼吸restoration(n)恢复,翻新,回归retaliation(n)报复,报仇retardation(n)迟滞,迟钝,阻碍reticulation(n)网目,网状retification(n)批准reunification(n)重新团结revaluation(n)法定升值revelation(n)揭露,显示,启示,新发现revitalization(n)复活,新生,恢复元气reverberation(n)反响,混响,反射revocation(n)废弃,取消rotation(n)旋转,转动;轮流,循环rumination(n)反刍,沉思,默想salutation(n)招呼,致意;(书信开头的)称呼语salvation(n)拯救,救助;救济sanctification(n)神圣化,灵化sanitation(n)卫生,卫生设施satiation(n)充分满足,饱saturation(n)饱和(状态);浸透scintillation(n)火花的迸出,闪烁segregation(n)隔离; 种族隔离sensation(n)感觉,知觉;轰动separation(n)分离,分开;分居sequestration(n)隔离; 退隐,隐遁signification(n)含义,意义,表示situation(n)位置;处境;形势solicitation(n)诱惑;揽货;恳切地要求;游说sophistication(n)老练,精密,尖端specialization(n)特殊化,专门化specification(n)详述;规格;说明书speculation(n)推测,思索,投机spoliation(n)强夺,掠夺,毁灭文件stabilization(n)安定,稳定化stagflation(n)滞胀stagnation(n)停滞,淤塞standardization(n)标准化,规格化starvation(n)饥饿,饿死sterilization(n)消毒,灭菌,绝育stimulation(n)刺激,鼓舞,启发stipulation(n)规定,条款,约定strangulation(n)扼杀,勒死stratification(n)分层subjugation(n)屈服subordination(n)从属,次等,看不起subrogation(n)债权转移suffocation(n)窒息summation(n)总结,概要;总数,合计supplementation(n)补充supplication(n)恳求,哀求,祈愿synchronization(n)同步化tabulation(n)作表,表格taxation(n)征税,税收,税金telecommunication(n)电信;远程通信tempatation(n)诱惑,引诱temptation(n)诱惑,引诱tergiversation(n)搪塞,背叛,变节termination(n)终止,结束toleration(n)宽容,默认,宗教自由Transfiguration(n)变形, 美化, 变容transformation(n)变化;改造;转变translation(n)翻译;译文,译本transmigration(n)轮回transmutation(n)变形,变化transpiration(n)蒸发,发散transplantation(n)移植transportation(n)运输,运送;运输系统;运输工具trepidation(n)恐惧,惶恐tribulation(n)苦难,灾难,考验undulation(n)波动,弯曲,起伏unification(n)统一,一致,联合urbanization(n)城市化usurpation(n)篡夺,霸占,夺取utilization(n)利用,效用utulization(n)利用vacation(n)假期,休假vaccination(n)种痘; 接种疫苗vacillation(n)游移不定,踌躇,不果断valuation(n)评价,估价,价值判断variation(n)变化,变动;变异vegetation(n)植物,草木veneration(n)尊敬;尊崇ventilation(n)通风孔,出口verification(n)确认; 查证; 作证versification(n)诗律, 作诗vexation(n)苦恼,恼火,困扰vibration(n)颤动,振动;摆动vindication(n)洗冤;证实violation(n)违反;冒犯visitation(n)访问; 探望; 正式的视察; 视察visualization(n)可视化,形象化vocation(n)职业;使命,天职。
空调行业英语词汇表 C
compressive load 压缩负荷
compressor accessories 压缩机附件
compressor capacity 压缩机容量
compressor crankcase 压缩机曲轴箱
condensation point 露点,冷凝点
condensation tank 凝结水箱
condensation water 冷凝水
condenser capacity 冷凝器容量
condenser cleaning 冷凝器清洗
condenser cooling surface 冷凝器冷却面积
computation center 计算中心
computation procedure 计算程序
computator 计算机
Computer-Aided Design(CAD) 计算机辅助设计
Computer-Aided Manufacture (CAM) 计算机辅助制造
comparative cost 比(较造)价
compare 比较,对照,参考
compartment 间隔,分隔间;隔板[膜]
compartmentalization 划分,分段,隔开
compartment ceiling 格子顶棚
compass 范围,区域
compatibility 相容性,互换性
condenser started motor 电容器起动电动机
condensing apparatus 冷凝器
condensing pressure regulating valve 冷凝压力调节阀
CONCURRENCY AND COMPUTATION PRACTICE AND EXPERIENCE
CONCURRENCY AND COMPUTATION:PRACTICE AND EXPERIENCEConcurrency Computat.:Pract.Exper.2008;20:315–330Published online13July2007in Wiley InterScience().DOI:10.1002/cpe.1221Towards workflow simulationin service-orientedarchitecture:an event-basedapproachYanchong Zheng,Yushun Fan and Wei Tan∗,†National Engineering Research Center for Computer Integrated ManufacturingSystems,Department of Automation,Tsinghua University,Beijing100084,ChinaSUMMARYThe emergence of service-oriented architecture(SOA)has brought about a loosely coupled computing environment that enablesflexible integration and reuse of heterogeneous systems.On building a SOA for application systems,more and more research has been focused on service composition,in which workflow and simulation techniques have shown great potential.Simulation of services’interaction is important since the services ecosystem is dynamic and in continuous evolution.However,there is a lack in the research of services’simulation,especially models,methods and systems to support the simulation of interaction behavior of composite services.In this paper,an enhanced workflow simulation method with the support of interactive events mechanism is proposed to fulfill this requirement.At build time, we introduce an event sub-model in the workflow meta-model,and our simulation engine supports the event-based interaction pattern at run time.With an example simulated in the prototype system developed according to our method,the advantages of our method in model verification and QoS evaluation for service compositions are also highlighted.Copyright©2007John Wiley&Sons,Ltd.Received23March2007;Accepted1April2007KEY WORDS:service composition;workflow simulation;event;data correlation1.INTRODUCTIONService-oriented architecture(SOA)is gaining increasing momentum in many domains such as enterprise information systems,software architecture and grid computing.SOA promises to∗Correspondence to:Wei Tan,National Engineering Research Center for Computer Integrated Manufacturing Systems, Department of Automation,Tsinghua University,Beijing100084,China.†E-mail:tanwei@Contract/grant sponsor:National Science Foundation of China;contract/grant number:60674080Contract/grant sponsor:China National High Technology R&D project‘Business Coordination System Base on SOA’Copyright2007John Wiley&Sons,Ltd.316Y.ZHENG,Y.FAN AND W.TANprovide a decentralized and loosely coupled environment that enablesflexible,reliable and coordi-nated integration of dynamic applications belonging to different organizations.Furthermore,more and more companies are starting to organize their business processes by means of service aggrega-tion;therefore,the importance of service composition has been widely recognized.Since service compositions can be described as workflow models,it is natural to apply workflow technology to automated service composition in the service-oriented paradigm,and there is much research work on that topic[1–3].Many studies have been devoted to the design,verification and performance analysis issues related to Web service composition.Based on the XML Process Definition Language(XPDL),a model of Web services workflow is proposed[4],thus bringing workflow into the web environment.By employing Web service technology in the interaction,monitoring and control of process execution, Li and Lu[5]proposed a framework for modeling and reusing workflows as sub-workflows in service composition.Business Process Execution Language for Web Services(BPEL4WS)[6] defines an interoperable integration model which facilitates the expansion of automated process integration,and currently BPEL4WS is the de facto standard,supported by major companies in this area.Zhao and Liu[7]studied the modeling of organization centered workflows and their realization in the Web service environment via mapping to BPEL4WS.Particularly,Casati and Shan[8]developed a model and architecture that employed the element of events to achieve dynamic interaction between composite services;Wang et al.[9]proposed an ECA-rule-based method for end users to compose Web services conveniently;Guo et al.[10]introduced Pi-calculus to address the protocol level deadlock in grid workflows;Chandrasekaran et al.[11]explicated the power of simulation as a part of Web service composition and process design;and Chang et al.[12],Song and Lee[13]both utilized simulation techniques to evaluate service composition based on their QoS properties.The research efforts have demonstrated the strength of workflow and simulation techniques in the design and performance analysis of service composition;however,to the best of our knowledge, few of them have made substantial investigations in the implementation mechanisms for simulating the actual behaviors of composite services.In other words,they neglect the interaction of internal service nodes between different services,and this interaction will probably affect the correctness and performance of composite services.In order to address this issue,we proposed an interactive-event-based workflow simulation method in this paper.Our main contribution is that,with profound analysis on the core mechanisms—the internal event interaction and data correlation,we made simulation techniques applicable to a loosely coupled environment like that of service-oriented computing.The rest of the paper is organized as follows.In Section2,a motivating example is presented.In Section3,we give the workflow meta-model which serves as a foundation for performing simulation in a service-oriented environment,and we explain briefly the major components within the meta-model.Then,Section4elaborates on the core mechanisms of the workflow simulation method—the internal event communication and corresponding data correlation,from both the build-time and run-time perspectives.Section5covers the system architecture and relevant application programming interfaces(APIs),and Section6gives important analysis results based on the information we gathered through simulating the motivating example in the prototype system.Finally,conclusions and future research directions are given in Section7.Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeTOWARDS WORKFLOW SIMULATION IN SERVICE-ORIENTED ARCHITECTURE317Figure1.A travel planning example.2.A MOTIV ATING EXAMPLEWithout loss of generality,now consider two service compositions that have internal interaction as shown in Figure1.It depicts a travel planning example including two separate composite service processes that work jointly to accomplish planning requests from customers of the travel agency. Composition1describes the workflow process for itinerary planning,while composition2is the online ticket handling process.When the agency receives initial itinerary from its customer,it will send the customer information to an independent online ticket system to acquire either quotations or bundles,contingent on the customer type specified by the online system.Simultaneously in the agency process,it will follow different procedures for existing or new customers to work out a travel plan.Note that there is plenty of data exchange between the internal service nodes of these two compositions,which will affect the accomplishment of both workflows.For instance,the status of the decision node‘Customer type?’in composition1determines which route to go after the decision node‘Bundles available?’in composition2,as bundles are only applicable to VIP customers of the ticket system.Such control logic can hardly be modeled or simulated with traditional techniques, thus arousing a need for specific supplements to the original meta-model as well as simulation mechanisms.3.THE WORKFLOW META-MODELIn order to ensure the interoperability between heterogeneous workflow systems and the efficient integration with other applications,we establish our workflow meta-model as an extension of the meta-data model presented by the Workflow Management Coalition(WfMC)in its Work-flow Process Definition Interface—XML Process Definition Language(Interface one:XPDL)[14], enabling event communication in service computing environment by incorporating event elements. Figure2shows the static structure of the meta-model via the UML class diagram.Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpe318Y.ZHENG,Y.FAN AND W.TANFigure2.Static structure of the service-oriented workflow meta-model.3.1.Sub-model definitionsThe workflow meta-model is basically composed of four sub-models:the process sub-model,the event sub-model,the participant sub-model and the simulation sub-model,with three different types of relationship between individual elements—Generalization,Association and Aggregation.As the participant sub-model is irrelevant to our topic,we will not discuss it for simplicity.Briefly,we introduce the other sub-models as follows:The process sub-model is composed of the classes Process,Workflow Process,Activity,Subflow, Atomic Activity,Transition,Condition,Relevant Data,and Event Listener.As the semantics of the classes except Event Listener complies with XPDL,we will not give detailed explanation here and readers can refer to the corresponding specification[15].Specially,as an important extension to the XPDL model,we create the class Event Listener as an aggregated class to Workflow Process, Atomic Activity and Subflow,in order to monitor both external and internal run-time events in the lifecycle of workflow simulation,hence supporting the particular message communication patterns in a service-oriented environment.Besides,the attribute‘bCorrelationSet’in the class Relevant Data also plays a significant role in achieving data correlation in a loosely coupled environment. Details regarding these points will be discussed more thoroughly in the next section.The event sub-model comprises the class Event and itsfive inherited classes:Data Event,Status Event,Alarm Event,Exception Event and Custom Event,serving as a fundamental part in the meta-model to achieve the specific interaction pattern in a service-oriented environment.An event is the encapsulation of any message which is transferred from one process/activity instance(or service instance in the service-oriented context)to another in the conversation between these instances. Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeTOWARDS WORKFLOW SIMULATION IN SERVICE-ORIENTED ARCHITECTURE319 Considering the characteristics of an event and its possible influence on the instance that initiates or receives it,we classify events intofive categories,each being represented by the abovefive inherited classes.Data Event is used to specify those events having tight correlation with specific workflow relevant data;Status Event is for those arising from status alteration of the instance;Alarm Event is for those indicating duration or deadline limits for the execution of the instance;Exception Event is for those stemming from faults during the execution of the instance;and Custom Event is employed to provide extensibility for user-defined events.The common attribute‘bInitiation’defined in the superclass Event specifies whether this event is used to initiate an instance for the service receiving it;the attribute‘ValidTime’prescribes the time limit for a service instance to perform instance matching;and the attribute‘Action’designates the specific action incurred by an event,which will be interpreted by the ECA rule parser during workflow simulation and enactment.The simulation sub-model consists of six classes—Simulation Info,Simulation Setting,Simulation Statistics,Simulation Chart and Generator.Simulation Info is the abstract base class for the other five classes,maintaining correlation with the process sub-model and defining commonly owned attributes.Simulation Setting is used to set up simulation scenarios such as the simulation schedule; Generator,a common class for traditional workflow simulation,is used to generate transaction queues based on specific statistical distribution models;Simulation Statistics and Simulation Chart are for presenting simulation results in user-defined formats.3.2.Association definitionsAs indicated before,there are three different kinds of relationship between individual elements in the workflow meta-model:Generalization,Association and Aggregation.Generalization describes the inheritance relationship between a superclass and its sub-classes;Aggregation shows the inclusion relationship between two elements or between an element and itself;and Association establishes the reference relationship between elements.We have assigned a name for each Association so that the relationship can be understood more easily.For example,the Association‘relates with’from the class Process to Relevant Data specifies that certain workflow relevant data might be correlated with an instance of Process,while‘is assigned to’from Participant to Atomic Activity means that necessary resources or application systems must be allocated to activity instances,or service instances in the service-oriented context,to support its execution.Note that the multiplicity of an Association is indicated by the numeric signs near both ends of an Association.Take the Association‘correlates to’for instance,it has the following multiplicity: Data Event/Relevant Data=0...n/1...n,which designates that an instance of Data Event must be correlated to no less than one instance of Relevant Data,while an instance of Relevant Data might not be correlated to any instance of Data Event,or it might be correlated to more than one instance of Data Event.Such multiplicity in an Association defines the quantitative proportion between the two associated classes.4.SIMULATION MECHANISMS BASED ON INTERACTIVE EVENTSIn traditional simulation,individual generators are assigned to each workflow to generate ran-dom transactions independently and essentially,such kind of simulation only deals with single process,i.e.no interaction is incurred between the internal units of different workflows(see Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpe320Y.ZHENG,Y.FAN AND W.TANparison of simulation patterns:(a)traditional simulationand(b)simulation in service-oriented paradigm.Figure3(a)).However,workflow simulation in a service-oriented environment is intrinsically multi-process involved—some service in a workflow may need to interact with a service in another which is simulated simultaneously.In addition,there will also be external events acting on the internal units other than the start node and influencing the simulation process(see Figure3(b)).Under such cir-cumstances,the simulation engine should be modified to support specific mechanisms for external and internal event interactions,which will inevitably involve such issues as data correlation as well as asynchronous communication between different processes and the like.Based on the meta-model presented in the previous section,we will analyze the implementation of these mechanisms in the service computing environment from both the build-time and run-time perspectives in this section.4.1.Build-time analysisAs introduced before,the class Event Listener acts as an event monitor in the model.Through the Association‘monitors’,it contains a referenced attribute‘InternalEvent:Event’,which actually is a queue of received events(at this point,we have counted in the asynchronous property of message communication in a service-oriented environment).Through the Aggregation s to Workflow Process, Atomic Activity and Subflow,an instance of Event Listener is permanently bound to a certain process instance,or activity instance,or sub-flow instance(in the service-oriented context,these are all defined as service instances),so that the events received by this Event Listener can influence the simulation of the corresponding process instance.Now look at the source of the events.Through the Association‘initiates/receives’,the class Event contains two referenced attribute from the class Process(‘Source’and‘Target’),indicating where the events come from and where they would bining the above elements,these classes together with the associations between them provide a foundation for the implementation of internal message conversation during multi-process simulation.Data correlation is a critical issue inherent in internal message communication.In traditional single-process simulation,dataflow within a process and need not cross the boundary between different processes.Thus,the correlation of relevant data with process instances simply by instance IDs works reasonably well.However,the use of such IDs to correlate data would be rather diffi-cult and even somewhat non-sensical when considering internal communication in multi-process Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeTOWARDS WORKFLOW SIMULATION IN SERVICE-ORIENTED ARCHITECTURE321 simulation.In order to solve this problem,we introduce the concept of Correlation Set from BPEL4WS[7]into our meta-model.On one hand,there is a Boolean attribute‘bCorrelation-Set’in the class Relevant Data,with which we could define whether a relevant data would be used as the correlation set.On the other hand,the class Event contains a referenced attribute ‘CorrelationSet:Relevant Data’derived from the Association‘correlates to’with the class Relevant Data.Whenever necessary,this referenced attribute would serve as a combination of all the rel-evant data that is defined to be used as a correlation set,with the attribute‘bCorrelationSet’set as TRUE,so that we could easily correlate relevant data with the right process instance receiving the event.On considering external events,we can simply regard them as random transactions.Therefore, we establish the Association‘binds to’between the classes Event Listener and Generator.The referenced attribute‘ExternalEvent:Generator’relates the instance of Event Listener to a specific instance of Generator,with the latter defining the statistical distribution model of the external events.In this way,we can take into account both internal message communication and external event handling in the design phase of our workflow models.4.2.Run-time analysisWe will explore in this section the event communication behavior of part of the service nodes in the example presented in Section2during the running phase of simulation via the UML sequence diagram shown in Figure4.For the sake of conciseness,we merely depict the situation of one customer in the diagram,and issues relevant to multiple concurrent customers will be rationally inferred later.Generally,each composition has an independent generator to produce random transactions.Once the travel agency received requirement from a customer,i.e.a transaction arrived at the start node of composition1,it created an instance of the globally defined Relevant Data CustomerOrder(specified as‘CustomerOrder[1]’in Figure4)with‘CustomerID’as the Correlation Set.In executing‘Input customer Info’,it transferred the data to subsequent nodes in composition1on one hand,and on the other initiated an instance of the Data Event CustomerInfo(‘DataEvent[1]’in Figure4),which contained part of the data in CustomerOrder and must include the Correlation Set.When the event listener aggregated in‘Login to online ticket system’received‘DataEvent[1]’,itfirst performed instance matching with existing pending transactions through the operation‘InstanceMatch()’, using Correlation Set‘CustomerID’in the data event.Simulation involving other events is similar to thisfirst situation.What if the matching of instance returned a false value regarding every instance in execution? Our solution is that,the activity remains waiting for another instance to come for a predefined period.If the waiting time exceeds the deadline,a timeout exception would be initiated and the simulation engine would refer to the corresponding exception processing module.For this purpose, we include in the class Event an attribute named‘ValidTime’(see Figure2).In most cases during simulation,there may be multiple transactions and events pending at a partic-ular service node at a certain point of time.Under such circumstances,the event listener aggregated in each node would create separate queues for each kind,by the attributes‘InternalEvent:Event’for internal events,‘ExternalEvent:Generator’for external events and‘TransactionQueue’for random transactions,respectively.As mentioned before,when the simulation engine encounters an event, Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpe322Y.ZHENG,Y.FAN AND W.TANFigure4.Simulation sequence diagram of the motivating example.it would perform instance matching via the correlation set with each transaction in the queue until itfinds the right one,or wait for new transactions until a specific deadline if no matching can be achieved with the existing instances.Simulation results regarding performance indicators of these queues should be quite useful to the evaluation of QoS.Moreover,the potential leverage of multi-process simulation in performing model verification for service compositions,apart from the general function of simulation in performance analysis, is shown above.In most situations,two interactive compositions are independent from each other, thus possible error existed in the interaction logic between them can be revealed by examining the simulation trajectory.Such analysis is of great value for designers to compose services more effectively and correctly.Obviously,traditional simulation can never reveal such problems since both compositions are executed independently.5.SYSTEM ARCHITECTUREAs shown in Figure5,the workflow modeling and simulation system based on our meta-model consist of three layers:the user interface layer,the operation logic layer and the persistent storage layer,with the workflow meta-model as the supporting framework.We will elaborate on each of these layers hereinafter.Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeTOWARDS WORKFLOW SIMULATION IN SERVICE-ORIENTED ARCHITECTURE323Figure5.Architecture of the workflow modeling and simulation system.er interface layerThe user interface layer,which is mainly composed of the graphical modeling tool,the simulation monitor and the data analysis interface,helps establish effective communication between users and the system.The modeling tool offers an easy-to-use visual interface for the modelers,who in turn can construct a multi-view enterprise model regarding the function,information,process, organization and resource elements within the company,as well as their inherent relationship.With an access to the model database,modelers can conveniently modify legacy models and create new models as well.The simulation monitor performs real-time interaction with the workflow engine during the process of simulation so as to provide real-time supervision upon some specific objects which the analyzers might be interested in.For instance,we can observe the dynamic utilization of some resource in the whole process of execution,which should be a useful basis for doing further detailed capacity analysis.The data analysis interface equips the analyzers with the ability to customize statistical reports according to multiple objectives,and its connection with the simulation database enables it to retrieve necessary statistics any time.5.2.Operation logic layerThe operation logic layer functions as the core of the whole system,achieving control over the entire data and logicflows,as well as carrying out statistical calculation.Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpe324Y.ZHENG,Y.FAN AND W.TANFigure6.Data types and WAPI definition.Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeThe workflow engine is the kernel component of the operation logic layer,with the participant allocator,the model interpreter,the ECA rule parser and the random number generator as supportive components,and the analysis engine is for building up statistical analysis with respect to the requirements received from the data analysis interface.The workflow engine is basically composed of a logic controller and an event handler,with the former dealing with the navigation of logicflows as well as dataflows in a workflow model,and the latter handling particular events in a service-oriented environment.The message communication and data correlation mechanisms described in the previous sections are realized by the event handler,and pertinent functions are encapsulated in this module.The Workflow Management Application Programming Interface(WAPI)Specification by WfMC [15](Interface2&3)has defined standard APIs which can be supported by workflow man-agement products.These APIs,such as WMCreateProcessInstance,WMAssignActivityInstanceAt-tribute,WMChangeActivityInstanceState,WMTAInvokeApplication,etc.are encapsulated in the logic controller within the workflow engine.According to the conventions of the above specifica-tion,we define several APIs(Figure6)in the event handler module to support event handling and data correlation.Thefirst table in Figure6defines some data types specific to the concepts of Correlation Set as well as Event proposed in this paper,and the second table defines particular WAPIs,which realize the corresponding message communication and data correlation mechanisms.5.3.Persistent storage layerThe persistent storage layer consists of three databases:the model database,the workflow database and the simulation database.The model database is mainly for storing the enterprise models con-structed,as well as the underlying constraints and scheduling rules.The interaction between the model database and the model interpreter in the operation logic layer prepares necessary model information for simulation on one hand,and the interaction with the graphical modeling tool in the user interface layer realizes the creation,modification and storage of the models,and in the meanwhile offers support in the version management as well as the knowledge management during the modeling process.The workflow database is for maintaining the relevant data and the instance data which would be referred to and operated on during the course of simulation.Its communication with the workflow engine ensures that the right data would be transferred at the right time to the right instances.The simulation database is the database for those statistics calculated in simulation, including dynamic real-time statistics as well as static results.This database interacts with both the workflow engine and the data analysis engine,not only giving support in obtaining and recording data in simulation,but also helping produce customized statistical analysis reports.6.ANALYSIS OF THE MOTIV ATING EXAMPLE IN THE PROTOTYPE SYSTEM6.1.A snapshot of the systemFigure7shows the simulation snapshot of the motivating example in our prototype system.Apart from the ordinary controlflows between different elements within each workflow,there are alsoCopyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpeFigure7.A snapshot of the prototype system.explicit eventflows between the two workflows,represented by dotted lines,such as the event flow carrying‘Quotation’information from‘Provide normal quotation’to‘Propose a draft plan’, and the like.Eventflows which have a data annotation nearby transfer data events,while those without notation represent status eventflows.(For alarm events and exception events not included in our example,we assign a clock and an error symbol,respectively,to each type for identification.) Correlation sets formed by global data are passed along the eventflows in order for instance correlation.Different shades of thefigures indicate different states of the elements during simulation, e.g.dark-shaded rectangle means the activity is under execution,while light-shaded rectangle represents that the activity is waiting for necessary resources to perform its tasks.The system is developed on the Microsoft Visual C#platform,with SQL2000as the database.6.2.Structure analysis of service compositionsThe simulation trace for two certain customers in our example is given in Table I.Note that a dead lock occurred in simulating travel planning for C2,when the agency workflow waited at the node ‘Propose a draft plan’for response from the ticket handling workflow,while the latter sent back bundles information to the node‘Select a bunch’.Carefully comparing the simulation tracks of both customers and examining the structure of both compositions,it is not difficult tofind out the radical cause for the dead lock—that is because in our example,the two compositions have distinct criteria for classifying their customers:the agency classifies customers into new or existing ones, while the ticket system categorizes customers into standard ones or VIPs.In the agency workflow, if a customer is new to it,it will never examine whether a bundle is applicable but directly wait for normal quotation from the ticket system so as to propose a draft plan.This logic works well Copyright2007John Wiley&Sons,Ltd.Concurrency Computat.:Pract.Exper.2008;20:315–330DOI:10.1002/cpe。
信息工程专业术语(8)
信息工程专业术语(8)communication processing 通信处理communication processor 通信处理机communication protocol 通信协议communication region 通信区communication satellite 通信卫星communication system 通信系统communication task 通信任务communication task to task 任务间通信communication terminal 通信终端communication theory 通信理论communications computer 通信计算机communications interface 通信接口communications link 数据通道communications network 通信网络communications processor 通信处理机communications queue 通信等侍队列community antenna 共用天线commutation 换向compact disc read only memory 只读存贮型光盘compact disk 光盘compact disk read only memory 光盘只读存储器compact laser 小型激光器compaction 压缩compactness 紧致性comparand word 被比较字comparative value 比较值comparator 比较器comparator check 比较疲验comparator circuit 比较电路compare instruction 比较指令comparer 比较器comparing unit 比较器comparison operator 逻辑算子compatibility 兼容性compatibility mode 兼容方式compatible computer 兼容计算机compatible family 兼容系列compensated semiconductor 补偿半导体compensating action 补偿酌compensating feedback 补偿反馈compensating leads 补偿引线compensating magnet 补偿磁铁compensation 补偿compensation factor 补偿因数compensation method 补偿法competitive intelligence 竞争情报compilation 编译compilation order 编译次序compilation time 编译时间compilation unit 编译单元compile and execute 快速编译和运行compile and go 快速编译和运行compile phase 编译阶段compile time 编译时间compile time check 编译时检查compile time constant 编译时常数compile time diagnostics 编译时诊断compile time error 编译时错误compile time procedure 编译时程序compile time statement 编译时语句compile time variable 编译时变量compiled code 编译代码compiled language 已编译语言compiler 编译程序compiler compiler 编译程序的编译程序compiler diagnostics 编译程序的诊断程序compiler directing statement 编译指示语句compiler directive 编译指令compiler generation program 编译程序的生成器compiler generator 编译程序的生成器compiler level language 编译程序级语言compiler optimization 编译程序优化compiler options 编译程序任选项compiler toggles 编译程序任选项compiling 编译compiling phase 编译阶段compiling program 编译程序compiling routine 编译程序compiling time 编译时间complement code 补码complement gate 补码门电路complement number system 求补系统complement on b 1 反码complement on n n进制补码complement representation 补码表示complementary color 互补色complementary constant current logic 互补恒吝辑complementary mos 互补金属氧化物半导体complementary operation 求反运算complementary operator 求补运算符complementary output 双相输出complementary transistor logic 互补晶体管逻辑complementation 求补运算complementer 补码器complementing bits 补码位complementing flip flop 求反触发器complementing input 补码输入complete carry 完全进位complete failure 完全故障complete graph 完全图complete information 完整信息complete instruction set 完整指令集complete inversion 全反转complete operation 完整的运算complete routine 完整程序completeness 完整性completion code 完成代码complex automatic control system 复杂自动控制系统complex constant 复数型常数complex instruction set computer 复杂指令集计算机complex number 复数complex relocatable expression 复型浮动表达式complexity 复杂性component 元件component density 元件密度component parts 元件部分componentry 元件部分components list 元件表composite attribute 组合属性composite cable 复合电缆composite external symbol dictionary 综合成外部符号词典composite gate 复合门composite hypothesis 复合假设composite line 局内线路composite operator 组合算符composite probability 总概率composite transistor 复合晶体管compound action 复合酌compound command 复合命令compound control action 复合控制酌compound expression 复合表达式compound instruction 复合指令compound proposition 复合命题compound statement 复合语句comprehensive keyboard 综合键盘compression 压缩compressor 压缩机computability 可计算性computation 计算computation center 计算中心computation speed 计算速度computational algorithm 计算算法computational capabilities 计算能力computational costs 计算费用computational geometry 计算几何学computational linguistics 计算语言学computational modeling 计算模型computational problem 算题computational psychology 计算心理学computational resource 计算资源compute mode 计算方式computer 计算机computer aided design 计算机辅助设计computer aided design system 计算机辅助设计系统computer aided engineering 计算机辅助工程computer aided engineering system 计算机辅助工程系统computer aided instruction caicomputer aided manufacturing 计算机辅助制造computer aided programming 计算机辅助程序设计computer aided system 计算机辅助系统computer aided translation 计算机辅助翻译computer application 计算机应用computer architecture 计算机体系结构computer assisted instruction caicomputer code 机弃码computer conference 计算机会议computer conferencing 计算机网络computer configuration 机其置computer control 计算机控制computer controlled laser 计算机控制激光器computer cycle 机栖期computer dead time 计算机停机时间computer dependent language 面向计算机的语言computer development 计算机研制computer education 计算机教育computer facility 计算机设置computer fraud 计算机行骗computer function 计算机功能computer game 计算机博奕computer generation 计算机世代computer graphics 计算机图形学computer graphics metafile 计算机图形元文件computer hardware 计算机硬件computer independent language 机妻关的语言computer industry 计算机工业computer installation 计算机安装computer instruction 机祈误computer integrated manufacturing 计算机一体化制造computer integrated manufacturing system 计算机一体化制造系统computer language 计算机语言computer literacy 计算机文化computer logic 机七辑computer mail 计算机邮件computer managed instruction 计算机管理教学computer manager 计算机经理computer manufacturer 计算机厂家computer market 计算机市场computer micrographics 计算机微制图学computer model 计算机模型computer network 计算机网络computer networking 计算机连网computer operation 机瀑作computer operator 计算机操妆computer oriented language 与计算机相关的语言computer phobia 计算机恐怖症computer printout 计算机打印输出computer program 计算机程序computer programming 计算机程序设计computer run 计算机运行computer schedule 计算机等computer science 计算机科学computer security 计算机安全computer service 计算机服务computer service center 计算机服务中心computer simulation 计算机模拟computer simulator 计算机摸拟程序computer speed 计算机速度computer system 计算机系统computer technology 计算机技术computer time 计算机时间computer user 计算机用户computer virus 计算机病毒computer vision 计算机视觉computer word 计算机字computer zero 计算机零值computerization 计算机化computerized information 计算机化信息computing 计算computing center 计算中心computing device 计算装置computing element 计算元件computing error 运算差computing interval 计算期间computing machine 计算机computing mechanism 计算机构computing power 计算能力computing system 计算系统computing system rpq rpq计算系统computing time 计算时间concatenated data set 链接数据集concatenation 连接concatenation character 连接字符concentrator 集线器集中器concept 概念conceptual design 概念设计conceptual model 概念模型conceptual schema 概念模式concordance 重要语汇她concurrency 并行性concurrency conflict 并发冲突concurrency control 并行控制concurrency mode 并行方式concurrent 并发的concurrent computer 并行计算机concurrent execution 并行执行concurrent input/output 并行输入输出concurrent operation 并行操作concurrent process 并行进程concurrent processing 并行处理concurrent processor 并行处理机condensed deck 压缩卡片组condenser 电容器condensing program 压缩程序condensing routine 压缩程序condition code 条件码condition handler 条件处理程序condition mask 条件掩码condition name 条件名字condition name condition 条件名条件condition prefix 条件词头conditional 条件conditional assembly 条件汇编conditional branch 条件转移conditional branch instruction 条件转移指令conditional breakpoint 条件断点conditional breakpoint instruction 条件断点指令conditional code 条件码conditional compilation 条件编译conditional distribution 条件分布conditional expression 条件表达式conditional go to statement 条件转向语句conditional halt 条件停止conditional implication 条件隐含conditional instruction 条件指令conditional interrupt request 条件中断请求conditional jump 条件转移conditional jump instruction 条件转移指令conditional probability 条件概率conditional statement 如果语句conditional transfer 条件转移conditional transfer of control 控制的条件转移conditional variable 条件变量conditioned air 第的空气conditioned disjunction 条件或conducting paper 导电纸conduction 电导conduction electron 导电电子conductive ink 导电墨水conductivity 电导率conductor 导体conduit 波道conference on data system language 数据系统语言协会confidence interval 置信区间confidence probability 置信概率confidential data 机密数据configuration 配置configuration change 配置改变configuration section 配置节configuring 配置confirmation 确认confirmation signaling 确认信号conflict 冲突conflict resolution 冲突消解congestion 拥挤conjugate complex number 共轭复数conjunction 与运算conjunctive normal form 合取范式conjunctive query 合取查询conjunctive search 按与检索connect time 连接时间connected graph 连通图connecting cable 连接电缆connection box 电缆接线箱connection file 连接文件connection of components 元件连接connection plan 接线图connectionless operation 不连接操作connective 连接词connectivity 连接性connectivity matrix 连接矩阵connector 接插件connector assembly 接插件consecutive bytes 连续字节consecutive sequence computer 串行操灼算机consequent 后项consistency 一致性consistency check 一致性检验consistent compilation 一致编译console 控制台console command processor 控制台命令处理器console debugger 控制台蝶程序console desk 控制桌console file 控制台文件console function 控制台功能console keyboard 控制台键盘console mode 控制台方式console terminal 控制台终端console typewriter 控制台打字机constancy 恒定constant 常数constant area 常数区constant declaration 常数说明constant expression 常数表达式constant ratio code 恒比代码constant voltage regulator 电压稳定器constituent grammar 构成文法constrained optimization 约束优化constraint 约束construction 构造constructional design 结构设计constructive solid geometry 构造实体几何consulting model 咨询模型consumable resource 消耗性资源consumer process 用户进程contact 触点contact hole 接触孔contact pointer 接触指示器contamination 污染content addressable processor 联想处理机content addressed memory 联想存储器content addressed storage 联想存储器contention 竟争contention mode 争用状态contents directory 目录字典context 上下文关系context editing 上下文编辑context editor 上下文编辑程序context free grammar 上下文无关文法context free language 上下文无语言context name 上下文名context sensitive constraint 语义限制context sensitive grammar 上下文有关文法context switching 上下文转接contextual declaration 上下文说明contiguous area 相连区contiguous items 相连项continental code 国际电码continuation card 延续卡片continuation line 延续行continuous control 连续控制continuous control action 连续控制动作continuous control system 连续控制系统continuous duty 连续运行continuous file 连续文件continuous form 连续形式continuous function 连续函数continuous information 连续信息continuous operation 连续运算continuous paper 连续纸continuous process 连续过程continuous processing 连续处理continuous simulation 连续模拟continuous speech 连续语音continuous stationery 连续打印纸continuous variable 连续变量contrast 对比度control 控制control accuracy 控制准确度control action 控制酌control algorithm 控制算法control apparatus 控制装置control bit 控制位control block 控制块control break 控制改变control bus 控制总线control byte 控制字节control card 控制卡片control center 控制中心control change 控制改变control channel 控制通道control character 控制字符control circuit 控制电路control code 控制码control command 控制命令control computer 控制计算机control condition 控制条件control console 控制台control constant 控制常数control counter 控制计数器control criterion 控制准则control cycle 控制周期control data 控制数据control desk 控制面板control device 控制器control dictionary 控制词典control electronics 控制用电子学control element 控制元件control engineering 控制工程control error 控制差错control field 控制字段control flow 控制流control flow computer 控制疗算机control format item 控制格式项control function 控制操作控制功能control hole 标志孔control instruction 控制指令control interval 控制区间control key 控制键control knob 控制旋钮control lag 控制延迟control language 控制语言control level 控制级control line 控制线control logic 控制逻辑control loop 控制环control mark 控制标记control memory 控制存储器control mode 控制方式control module 控制模块control operation 控制操作control panel 控制板control pen 控制笔control performance 控制性能control point 控制点control program 控制程序control punch 穿标志孔control record 控制记录control register 控制寄存器control response 控制响应control routine 控制例程control section 控制段control sequence 控制序列control signal 控制信号control storage 控制存储器control stream 控制流control structure 控制结构control swing 第误差control system 控制系统control system dynamics 控制系统动力学control tape 控制带。
九年级英语艺术大师故事单选题30题
九年级英语艺术大师故事单选题30题1.Leonardo da Vinci spent most of his childhood ______.A.in FlorenceB.in ParisC.in LondonD.in Rome答案:A。
本题考查地点名词。
Leonardo da Vinci 的童年大多在佛罗伦萨度过,“Florence”(佛罗伦萨)是他成长的主要地方。
B 选项“Paris”((巴黎)、C 选项“London”((伦敦)、D 选项“Rome”((罗马)都不是他童年主要生活的地方。
2.Picasso showed his talent for painting ______.A.at the age of eightB.in his eight years oldC.when he was eight year oldD.when he eight years old答案:A。
“at the age of + 数字”表示“在......岁时”,是固定用法。
B 选项表达错误;C 选项应该是“when he was eight years old”;D 选项语法错误。
3.Michelangelo began to learn art ______.A.when he was very youngB.when he was very oldC.after he became famousD.before he was born答案:A。
“when he was very young”表示“当他很小的时候”,符合米开朗基罗开始学习艺术的时间。
B 选项“when he was very old”((当他很老的时候)不符合实际;C 选项“after he became famous”(在他出名之后)逻辑不对;D 选项“before he was born”(在他出生之前)不可能。
4.Van Gogh moved to many places ______ his life.A.duringB.forC.inD.at答案:A。
信息物理融合系统(cps)原理
信息物理融合系统(cps)原理Cyber-physical systems (CPS) are integrated systems of communication and computation that monitor and control physical processes. 信息物理融合系统(CPS)是集成的通信和计算系统,监控和控制物理过程。
These systems are at the forefront of technological innovation, with applications in a wide range of industries, including healthcare, transportation, energy, and manufacturing. 这些系统处于技术创新的前沿,应用于包括医疗保健、交通运输、能源和制造业在内的广泛行业。
One of the key principles behind CPS is the integration of real-time data from physical systems with computational models and algorithms to make intelligent decisions. CPS的一个关键原理是将物理系统的实时数据与计算模型和算法集成,以做出智能决策。
By combining the physical and digital worlds, CPS has the potential to revolutionize the way we interact with the environment, paving the way for more efficient and sustainable processes. 通过结合物理和数字世界,CPS有可能彻底改变我们与环境互动的方式,为更高效、更可持续的过程铺平道路。
《通信工程专业导论》教学大纲
《通信工程专业导论》教学大纲课程编号:开课学院:通信与信息工程学院课程类别:专业基础课学时/学分:16/1课程性质:必修一、课程性质本课程是为电子信息类专业大一学生开设的专业基础课程。
课程贯彻通信系统中“全程全网”的理念,刻画通信工程专业体系中各层各模块(包括无线移动、光纤传输、网络交换和应用服务)的基本概念和关键技术、研究和应用热点,发展趋势以及必备的科学和研究方法等。
二、课程目标本课程的教学目标是:引导学生建立多目标兼容的工程思想和严谨的哲学思维,培养求真务实的科学态度、独立思考的科学精神、团队合作的科学素养,掌握通信系统的基本框架、功能模块和发展趋势。
使学生能够对通信工程专业有清晰的宏观把握,主动地构建自己的知识体系和能力结构,为后续各方向专业课学习奠定基础,并激发学生探索新技术和新应用的兴趣和热情。
(一)思想、素质教育目标目标1.1培养运用科学辩证的立场、观点及方法分析和解决问题的能力。
目标1.2培养学生严谨的科学态度、独立思考与团队合作等科学精神。
目标1.3培养学生了解通信系统中复杂工程问题涉及的工程与社会相关知识。
(二)知识教学目标目标2.1掌握通信系统的基本框架、功能模块和设计原则。
目标2.2了解通信工程专业的培养目标、毕业要求和课程体系。
目标2.3了解基本的科学研究方法和工程设计原则。
目标2.4了解通信系统和通信网络国内外应用现状及发展趋势。
(三)能力教学目标目标3.1具备理解通信系统和通信网络体系结构的能力,并根据各功能模块和分层设计对通信系统和网络具备初步描述和分析的能力。
目标3.2激发学生探索新技术新应用的兴趣和热情,培养学生发现问题、提出问题和解决问题的能力。
目标3.3初步具备基础的科学研究思维并了解初步的工程设计原则。
三、课程教学内容及基本要求本课程是学生本科阶段接触的第一门涉及专业的课程,使大学新生一踏进校门就能够通信工程的全貌有系统清晰的了解。
本课程“浅近而系统”地介绍通信系统组成模块和分层体系、基本功能和设计思想。
工业大数据
自动化 精益化
低成本提高质量
预测型制造 IoT+工业大数据分 析
解决
效率化 质量管理
可见的
不可见的
第2章 工业4.0环境下的大数据 价值创造体系
1、工业大数据分析及应用的三个阶段
工业大数据特征:大数据特征+可见性(Visibility)、价值(Value) 时间 核心技术 问题对象/价值 第一阶段 1990-2000 第二阶段 2000-2010 第三阶段 2010~至今
定制的家居
家居体验分析 与社交网络
已做 可见 用户市场
未做 不可见
第5章 案例与实践
智能装备
高圣(Cosen)带锯机床
智能工厂
Nissan机器人生产线管理
从精益工厂到智能工厂
精益制造推行到一定程 度后,企业提升空间越 来越小,因为精益管理 解决的只是可见的问题 和浪费,却无法去预测 和管理不可见因素造成 的影响。
智能感知层核心功能2
配置层 (Configuration)
网络层(Cyber) 信息挖掘 (Conversion)
故障发生频率
(Cognition)
认知层
状态监控 + 更多的备 件 2 故障报警 + 应激式的 维护政策 3 1 4
设备改进
智能感知层(Connection)
智能感知 + 预测性维 护
制造端
使用端
回收和 改造
根据定制化设计自动 生产出符合用户定制 化需求的产品
生产过程的全透明化、 成本优化、效率提升、 质量保障、流程优化、 供应链管理、人力管 理等协同优化 使用端返回的优质数 据的追踪和生产改善
通过状态监控和预测 性维护提高产品的运 行效率、可用性和可 靠性,降低运行成本 为用户提供运维排程 优化的呢给决策服务, 以及相应的配套服务 使用端数据反馈改善 设计和制造环节
计算机专业常用英语词汇总结
计算机专业常用英语词汇总结计算机专业英语词汇指与计算机硬件、软件、网络等多方面有关的英语词汇,主要包括硬件基础、计算机系统维护、计算机网络基础、软件、程序设计语言、计算机网络技术、IT职场英语等词汇。
店铺为大家总结一些计算机常用词汇:compilation 编辑compilation time 编译时间compilation unit 编译单位compilc 编译compile 编辑compile and go 编译及执行compile phase 编译时间compile time 编译时间compile, machine language 机器语言编译compile-time error 编译时期错误compiled resource file 编译资源文件compilei 编译器compiler 编译器compiler defect report 编译器缺失报告compiler diagnostcs 编译程序侦断compiler directive 编译程序定向compiler generatoi 编译程序产生器compiler interface 编译器界面compiler language 编译器语言compiler manager 偏译器经理compiler options 编译器任选compiler vs. interpreter 编译器对编译器compiler, cobol cobol编译器compiler-complier 编译程序的编译程序compilers 编译器compiling duration 编译期间compiling routine 编译例程compiling time 编译时间complement base 互补基点complement instruction 补码指令complement on n n补码complement on n-1 n-1补码complement, diminished 减少补码complement, nines 九补码complement, noughts 0补码complement, ones 1补码complement, tens 10补码complement, two 2补码complementary 补色complementary bipolar ic 互补双极集成电路complementary metal oxide semiconductor (cmos) 互补式金氧半导体complementary mos(cmos) 互补金属氧化半导体complementary operation 互补运算complementary operations 互补运算complementary operator 互补运算子complementary scr(cscr) 互补硅控整流器complementei 补码器complementing 互补complete carry 完全进位complete object 终衍物件complete operation 完全作业complete routine 完全例程completeness 完整性completeness check 完整检查completeness errors (remote computing sy) 完成误差completion code 整体码complex bipolai 复合双极complex constant 复合常数complex data 复合贫籵complex decision-making simulation 复合决策模拟complex instruction set computer (cisc) 复杂指令集计算机complex instruction set computing (cisc) 复杂指令运算complex number 复数complex relocatable expression 复数可重置表示法complex script 复杂脚本complex-bound 复杂系结compliant 相容compliant naming 适用的名称compnter, first generation 第一代计算器component 组件component address 组件地址component code generator 组件程序代码产生器component density 组件密度component derating 分件降低定额component erroi 组件误差component fail impact analysis, cfia 组件失误撞击分析component gallery 组件展示廊component load balancing 组件负载平衡component name 组件名称component object 组件对象component object model 组件对象模型 (com) component object model (com) 组件对象模型component project 组件项目component registrar 组件登录器component selector 组件选取器component services explorer 组件服务总管component site 组件站台component software 组件软件component stress 组件应力component tray 组件匣component video 成分视讯component wizard 组件精灵component, solide-state 固态组件component-based development 组件式软件开发技术compose 撰写compose buffer 撰写缓冲区composite 合成composite black 合成黑色composite cable 复成电境composite conductoi 复合导体composite console 复合控制台composite control 复合控件composite data servicevendoi 复合数据服务贩责者composite display 合成屏幕composite filter 复合滤波器composite module data set 复合模块数据集composite module library 复合模块数据馆composite modules 复合模块composite moniker 复合型composite operator 复合运算子composite video 复合视讯composite video input 复合视讯输入composited circuit 复成电路compositing 复合composition error 组合误差composition file 复合档composition video signal 复合视频信号compound condition 复合条件compound document 复合文件compound document files 复合文件档案compound file 复合档案compound logical element 多逻辑组件compound-assignment operator 复合设定运算子compoundstatement 复合叙述compress 压缩compressed files 压缩档compressed serial link internet protocol, compressed slip 压缩式串连链接因特网协议compressed video vs. facsimile 压缩视频对传真compression 压缩方式compression algorithm 压缩算法compression format 压缩格式compression scheme 压缩方法compression, data 数据压缩compression, zero 零压缩compression/decompression (codec) 编码/译码compressor 压缩器compromise net 协调网络computation, address 地址计算computation, implicit 隐含计算computational stability 计算稳定度computcr-aided dispatch(cad) 计算器辅助发送compute 运算compute mode 计算型computer 计算机;计算器computer & communications research labs (itri) 工研院计算机与通讯工业研究所computer administrative records 计算器管理记录computer aided logistic support (cals) 计算机辅助后勤支持系统computer aided software engineering (case) 计算机辅助软件工程computer animation 计算器电影制作computer application 电脑应用系统computer architecture 电脑体系结构computer bureau 电脑服务中心computer capacity 计算器容量computer cartography 计算器制图法computer center 电脑中心computer center manager 计算器中心管理人computer circuits 计算器电路computer communications 计算机通信computer communications system 计算器通信系统computer conferencing 电子计算器会议computer configuration 计算器组态computer configuration 计算器组态computer console 计算器控制台computer control 计算器控制computer duplex 计算器双工computer emergency response team 电脑紧急应变小组computer equation 计算器方程式computer equipment operation 电脑设备操作computer generated image (imagery, cgi) 计算机产生的影像computer graphics (cg) 计算机图形;计算器制图法computer graphics (cg) 计算器制图法computer graphics interface (cgi) 计算机图形接口computer graphics technology 计算器制图法技术computer image processing 计算器影像处理computer installation (service) 安装计算机 [ 服务 ]computer instruction 计算器指令computer instruction code 计算器指令码computer instruction code 计算器指令码computer instruction set 计算器指令集computer integrated manufacturing (cim) 计算机整合制造computer interface types 计算器分界面类型computer interface unit (ciu) 计算器界面单位computer language 计算器语言computer language symbols 计算器语言符号computer learning 计算器学习computer letter 计算器信件computer logic 计算器逻辑computer memory 计算机内存computer micrographics 计算器微图形computer name 计算机名称computer network 电脑网络computer network components 计算器网络组件computer numerical control 计算器数值控制computer operating procedures manual 电脑操作程序手册computer operation 计算器运算computer operator 电脑操作员computer output microfilm (com) 计算器输出微胶片computer output microfiche 电脑输出缩微胶片computer output microfilm 电脑输出缩微胶卷computer output microfilmer (com) 计算器输出微影机computer output microform 电脑输出缩微方式computer peripherals 计算器外围设备computer power center (cpc) 计算机动力中心computer program 电脑程式computer program origin 计算器程序原始computer programming language 计算器程序语言computer project 电脑计划computer readable medium 电脑可读媒体computer scicnccs (cs) 计算器科学computer service level requirement 电脑服务水平要求computer service orsanization 计算器服务组织computer simulatoi 计算器仿真器computer site preparation 电脑场地准备工作computer storage 计算器储存器computer stores 计算器商店computer system 电脑系统computer system audit 计算器系统审计computer telephony integration (cti) 计算机语音整合computer terminal 电脑终端机computer time 计算器时间computer utility 计算器公用computer virus 电脑病毒computer vision 计算机视觉computer word 计算器字computer-aided design & drafting (cadd) 计算机辅助设计与绘图computer-aided design (cad) 计算机辅助设计computer-aided education (cae) 电脑辅助教育computer-aided engineering (cae) 计算机辅助工程computer-aided experiment (cae) 计算机辅助实验computer-aided instruction (cai) 计算机辅助教学computer-aided manufacturing (cam) 计算机辅助制造computer-aided publishing 电脑辅助出版computer-aided test (cat) 计算机辅助测试computer-assisted learning (cal)计算机辅助学习computer-assisted management 计算器辅助管理computer-assisted publishing 电脑辅助出版computer-assisted software engineering tool 计算机辅助软件工程工具computer-assisted typesetting 电脑辅助排字computer-based automation (cba) 计算器基准自动化computer-based training (cbt) 计算机辅助训练computer-controlled pattern generator 计算器控制型样产生器computer-generated (cg) 计算机合成的computer-generated map 计算器产生地图computer-independent language 计算器通用语言computer-integrated manufacturing (cim) 计算机整合制造computer-mediated communication (cmc) 计算机媒介沟通;计算机中介传播(沟通)computer-operated memory test system 计算器运算记忆测试系统computer-oriented language 机向语言computerarchitecture 计算机结构computerese 计算机文computerization 电脑化computerization requirement 电脑化需求computerization strategy 电脑化策略computerized foreman 计算机化领班computerized hyphenation 计算机化忠诚computerized numerical control (cnc) 计算机化数字控制computerized patient record (cpr) 电子病历computerized tomography 计算机化断层摄影术computer、communication、consumer electronics (3c) 3c多元化技术整合computex computexcomputing 计算computing amplifier 计算放大器computing element 计算组件computing machinery 计算器械computing power 计算能力computing, multiaccess 多重接达计算computor, sensor-based 传感器为基础的系统comsat 通信卫星con 主控台concatenate 序连concatenate data set 序连资料集concatenated key 串连索引键concatenation 序连concatenation character 序连字符concatenation operator 串连运算子concentrated messages 集中信息concentration 集中concentration, data 资料集中concentrator terminal buffer(ctb) 集讯器终端机缓冲器concept coordination 概念协调conceptual data model 概念数据模型conceptual infrastructure 概念基本建设conceptual level 概念级conceptual modei 概念模式conceptual model 概念模型conceptual modeling 概念模拟conceptual schema 概念模式conceptual system design 概念系统设计concert 音乐会concordance 索引concordance program 索引程序concordant 调和排列concrete 具象的concrete syntax 具体语法concrete syntax of sgml sgml的具体语法concrete syntax parameter 具体语法参数concurrcnt 同作concurrency 并行性concurrency mode 同作模态concurrency, executive-system 执行系统同作concurrency, operations(real-time) 实时同作操作concurrency, real-time 实时同作concurrent connections 同时联机concurrent i/o 同作输出入concurrent operating control 同作作业控制concurrent operation 同作运算concurrent processing 同作处理concurrent real-time processing 同作实时处理concurrent/concurrency 并行。
计算 数学 英语
计算数学英语Here is a 600-word essay on the topic "Computation, Mathematics, and English":Computation, Mathematics, and English are three interconnected fields that have a profound impact on our daily lives and the advancement of human knowledge. Each of these disciplines plays a crucial role in shaping our understanding of the world around us and empowering us to solve complex problems.Computation, the process of performing mathematical and logical operations using a computer or other electronic devices, has revolutionized the way we live, work, and communicate. This powerful tool has enabled us to process vast amounts of data, automate tedious tasks, and develop sophisticated algorithms that can tackle a wide range of problems. From the simple calculations we perform on our smartphones to the complex simulations used in scientific research, computation has become an indispensable part of our lives.At the heart of computation lies mathematics, the language of the universe. Mathematics is the study of patterns, relationships, andabstract concepts, and it provides the foundation for many of the technological advancements we enjoy today. From the basic arithmetic we learn in school to the advanced calculus and linear algebra used in cutting-edge scientific research, mathematics is the backbone of our understanding of the world.The importance of mathematics in computation cannot be overstated. Algorithms, the step-by-step instructions that computers use to solve problems, are built upon mathematical principles. Without a strong grasp of mathematical concepts, it would be impossible to develop the sophisticated software and systems that power our modern world. From the complex algorithms used in financial trading to the machine learning models that drive personalized recommendations, mathematics is the driving force behind the computational technologies that have transformed our lives.Just as computation and mathematics are intertwined, so too is the role of English in these fields. As the dominant language of international communication, English has become the lingua franca of the scientific and technological communities. Researchers, engineers, and developers from around the world collaborate and share their work through publications, conferences, and online platforms, all of which require a proficiency in English.In the realm of computation and mathematics, the ability to communicate effectively in English is crucial. Researchers need to be able to articulate their ideas, present their findings, and engage in discussions with their peers. Software developers must be able to document their code, communicate with stakeholders, and participate in team-based projects. Even in the most technical and specialized fields, the ability to convey complex ideas through clear and concise English is a highly valued skill.Moreover, the language of mathematics itself is often expressed using English terminology. From the names of mathematical operations to the definitions of key concepts, understanding the English-language foundations of these disciplines is essential for anyone seeking to excel in the field of computation or mathematics.In conclusion, computation, mathematics, and English are deeply intertwined and interdependent disciplines that have profoundly shaped our modern world. Computation has transformed the way we live, work, and communicate, and it is built upon the foundations of mathematics. At the same time, the ability to communicate effectively in English has become a crucial skill for anyone working in these fields, as it enables collaboration, knowledge sharing, and the advancement of human understanding. By embracing the synergies between these three disciplines, we can unlock new possibilities and continue to push the boundaries of what is possible.。
计算机专业英语试题及答案(A)2
计算机专业英语试题及答案(A)2湖北职业技术学院2007-2008学年度第⼀学期期末考核试卷考核课程:《计算机专业英语》考试类型:理论考试⽅式:闭卷笔试学⽣所在院系:计科系年级: 2006级试卷: A姓名:班级:学号:⼀、Give out the full names for the following abbreviations(写出下列缩写词的全称)(15%)ROM_______________________________________________CPU_________________________________________________BIOS_________________________________________________IT____________________________________________________WWW_______________________________________________HTML________________________________________________PCI__________________________________________________HR__________________________________________________GUI__________________________________________________MHz__________________________________________________⼆、Match the following words and expressions in the leftcolumn with those similar in meaning in the right)(10%)1. memory unit a. 半导体存储器2. intelligence b. 机制3. semiconductor memory c. 存储单元4. data definition language d. 数据定义语⾔5. mechanism e. 通信6. machine language f. 机器语⾔7. communication g. 智能8. distance education h. 远程教育9. pattern recognition i. 企业资源计划10.enterprise resource planning j. 模式识别1. () 6. ()2. () 7. ()3. () 8. ()4. () 9. ()5. () 10.()三、Translate the following phrases into English(将下列短语翻译成英语)(10%)1. 系统板 ( )2. 算术逻辑运算 ( )3. 机器码 ( )4. 帮助菜单 ( )5. 图形技术 ( )四、For each of the following blanks, four choices are given. Choose the most appropriate one (从下⾯给出的四个选项中选择最恰当的答案)(30 %)1. The basic units of a computer system are as follows: _________A. CPU, memory and diskB. CPU, input and output unitC. CPU, memory and I/O systemD. CPU, memory and ALU2. Today, _________ can give you a music synthesizer, a fax machine, a CD-ROM drive, ect.A. input devicesB. expansion cardsC. output deviceD. joystick*3. The control unit fetches _________ from memory and decodes them.A. dataB. informationC. resultsD. instructions*4. When power is removed, information in the semiconductor memory is ________ .A. reliableB. lostC. manipulatedD. remain*5. Please find the item that is not belong to the DBA _________ . ( )A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL6. _________ is designed to manage large bodies of information.A. a file systemB. a transactionC. a database systemD. a database language7. A characteristic of operating system is _________ .A. resource managementB. memory managementC. error recoveryD. all the above8. Assembly-language instructions are a series of _________ .A. 0s and 1sB. abstract codesC. machine codesD. words9. _______ program also has potential benefits in parallel processing.A. MachineB. AssemblyC. Object-orientedD. Process-oriented10. An advantage of a ring network is that it needs less _________ .A. computerB. networkC. cableD. information11. An ISP supplies a _________ that you can dial from your computer to log on the internet server.A. public keyB. private keyC. service numberD. help file12. To open Internet Explorer, just click Start, point to _________ , and then click Internet Explorer.A. ProgramsB. ViewC. LayoutD. Control Panel13. Electronic bulletin boards are _________ communication platforms.A. one-to-manyB. one-to-oneC. many-to-manyD. all above14. Followings are some image data file formats, which is wrong? _______A.*.TIFB. *.DOCC. *.BMPD. *.GIFC. it can rotate a three-dimensional model.D. it can do all above at the same time.15. By adding _________ to your programs, you can make computers more interesting and much more fun for the user.A. multimediaB. textC. musicD. picture五. To identify the following to be True or False accordingto computer knowledge( 根据计算机知识判别是⾮题)(10%)1. Registers in the control unit are used to keep track of the overall status ofthe program. ( )2. The basic resources of a computer system are software and data. (3. The chipset consists of two parts: North Bridge and South Bridge. ( )4. The *.BMP file can only be used in the IBM system. ( )5. ROM does not have the inputs and writing controls. ( )6. “ADD AX, BX ” is a instruction of machine language. ( )7. A data definition language can be used to define a database schema. ( )8. People can only use the ISP to connect Internet. ( )9. We can use E-mail only as a one-to-one platform. ( )10. Hypermedia is the same as multimedia. ( )六. Reading comprehension(阅读理解)(25%)(⼀) Fill in the blanks with suitable words or expressions from the list givenbelow, and change the form where necessary (从下⾯所列词语中选择合适的词语, 以其适当的形式填空)(10%)high-level language assembly language writtenmachine language notationA programming language, designed to facilitate the communication betweenhuman and computers, is a __________________ for describing computationin readable form. There are 3 levels of programming languages, they are__________________, which can be run directly by computer;__________________and______________. There are different high-levelprogramming languages. Fortunately, most of them have many kinds ofconstruct in common and vary only in the way that these mustbe__________________ . Therefore, first thing to be decided about a task is tochoose which programming language is best suited for the job.Passage AThe central processing unit (CUP) is the heart of the computer systems. Among other things, its configuration determines whether a computer is fast or slow in relation to other computers. The CPU is the most complex computer system component, responsible for directing most of the computer system activities based on the instructions provided. As one computer generation has evolved to the next, the physical size of the CPU has often become smaller and smaller, which its speed and capacity have increased tremendously. Indeed, these changes have resulted in micro-Computers that are small enough to fit on your desk and your lap.The CPU comprise the control unit and the arithmetic/logic unit (ALU).The control unit is responsible for directing and coordinating most of the computer systems activities. It determines the movement of electronic signals between main memory and the arithmetic/logic unit, as well as the control signals between the CPU and input/output devices.The ALU performs all the arithmetic and logical(comparison) functions—that is, it adds, subtracts, multiplies, divides, anddoes comparison. These comparisons, which are basically “less than”, “greater than”, and “equal to”, can be combined into several common expressions, such as “greater than or equal to”. The objective of most instructions that use comparisons is to determine which instruction should be executed next.(⼆) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上⽂的内容判断下列句⼦的正误) (15%)1. With the development of computer, the physical size of the CPU has often become bigger and bigger. ( )2. The movement of electronic signals between main memory and the ALU as well as the control signal between the CPU and input/output devices are controlled by the control unit of the CPU. ( )3. The CPU comprises the control unit and memory. ( )4. The control unit performs all the arithmetic and logical functions. ( )5. The central processing unit (CPU) is the heart of the computer systems. ( )命题教师游彦教研室主任签字【第页共页】湖北职业技术学院2007-2008学年度第⼀学期期末考核试卷参考答案及评分标准考核课程:计算机英语考试类型:理论考试⽅式:闭卷笔试学⽣所在院系:计科系年级: 2006 试卷: A执笔⼈:要求:明确标注每⼩题或每步骤得分点⼀. Give out the full names for the following abbreviations(写出下列缩写词的全称)(15%)( 本题共15分, 每⼩题1.5分)ROM: Read Only MemoryCPU: Central Processing UnitBIOS: Basic Input/Output UnitIT: Information TechnologyWWW: World Wide WebHTML: Hypertext Markup LanguagePCI: Peripheral Component InterconnectHR: Human ResourceGUI: Graphical User InterfaceMHz: Megahertz⼆. Match the following words and expressions in the left column with those similar in meaning in the right column(将左列的词汇与右列相应的汉语匹配)(10%)( 本题共10分, 每⼩题1分)1. ( c ) 6. ( f )2. ( g ) 7. ( e )3. ( a ) 8. ( h )4. ( d ) 9. ( j )5. ( b ) 10.( i )三. Translate the following phrases into English(将下列短语翻译成英语)(10%)( 本题共10分, 每⼩题2分)1. the system board2. Arithmetic logical operations3. machine code4. Help menu5. graphics technology四. For each of the following blanks, four choices are given. Choose the most appropriate one (从下⾯给出的四个选项中选择最恰当的答案)(30 %)( 本题共30分, 每⼩题2分)1. C2. B3. D4. B5. D6. C7. A8. B9. C 10. C 11. C 12. A13. A 14. B 15. A五.To identify the following to be True or False according to computer knowledge( 根据计算机知识判别是⾮题)(10%)( 本题共10分, 每⼩题1分)1. ( T )2. ( F)3. ( T )4. ( F )5. ( T )6. ( F )7. ( T )8. ( F )9. ( F )10. ( F )六.Reading comprehension(阅读理解)(25%)(⼀) Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary (从下⾯所列词语中选择合适的词语, 以其适当的形式填空)(10%)( 本题共10分, 每空2分)notation machine language assembly language high-level language written(3空和4空答案可互换)(⼆) Tell whether the following statements are true(T) or false(F) according to the passage A(根据上⽂的内容判断下列句⼦的正误) (15%)( 本题共15分, 每⼩题3分)1. ( F )2. ( T )3. ( F )4. ( F )5. ( T )1、_b___ refers to the parts of the computer that you can see and touch.A. SoftwareB. HardwareC. HardshipD. Instruction2、primary memory which is stored on chips located _a___.A. on the motherboardB. outsideC. inside the processorD. on the CPUThe display screen is the most common _c___ device used to show you what the computer is doing.A. inputB. printingC. outputD. electronicWindows gives you more control over the __a__ you work.A. operationB. wayC. energyD. powerPlease find the item that is not belong to the DBA ____d_____ .A. storage structure and access method definitionB. schema definitionC. integrity constrain specificationD. DDL(数据定义语⾔)The most important program on any computer is a____.A. Operating SystemB. VirusC. softwareD. O教研室主任签字【第7 页共7 页】。
计算机程序设计并行计算概念及定义全面详解
计算机程序设计并⾏计算概念及定义全⾯详解⽬录1 摘要2 概述2.1 什么是并⾏计算?2.2 为什么要并⾏计算?2.3 谁都在使⽤并⾏计算?科学界和⼯程界:⼯业界和商业界:全球应⽤:3 概念和术语3.1 冯诺依曼体系结构3.2 弗林的经典分类3.3 ⼀些常见的并⾏计算术语3.4 并⾏程序的缺陷和代价复杂性:可移植性:资源需求:可扩展性:4 并⾏计算机的内存架构4.1 共享内存统⼀内存存取(Uniform Memory Access):⾮统⼀内存存取(Non-Uniform Memory Access):4.2 分布式内存4.3 混合分布式-共享内存5. 并⾏计算模型5.1 概述在分布式内存架构上的共享内存模型在共享内存架构上的分布式内存模型5.2 共享内存模型(⽆线程)5.3 线程模型5.4 分布式内存/消息传递模型5.5 数据并⾏模型5.6 混合模型5.7 单程序多数据模型(SPMD)和多程序多数据模型(MPMD)单程序多数据模型(Single Program Multiple Data (SPMD)):多程序多数据模型(Multiple Program Multiple Data (MPMD)):6 并⾏程序设计6.1 ⾃动 vs. ⼿动并⾏化完全⾃动:程序员指令:6.2 理解问题和程序识别程序的关键点 (hotspots):识别程序中的瓶颈 (bottlenecks):6.3 分割 (Partitioning)6.4 通讯 (Communications)通讯开销:延迟 vs. 带宽:通讯可见性:同步 vs. 异步通讯:通讯的范围:通讯的效率:开销和复杂性:6.5 同步 (Synchronization)同步的类型:6.6 数据依赖性 (Data Dependencies)6.7 负载均衡 (Load Balancing)6.8 粒度 (Granularity)计算通讯⽐ (computation / Communication Ratio):细粒度并⾏化 (Fine-grain Parallelism):粗粒度并⾏化 (Coarse-grain Parallelism):6.9 输⼊输出 (I/O)6.10 调试 (Debugging)6.11 性能分析和调优 (Performance Analysis and Tuning)7 并⾏⽰例7.1 数组处理7.2 圆周率计算7.3 简单热⽅程7.4 ⼀维波动⽅程8 参考⽂献和更多信息(本⼈刚刚完成这篇长⽂章的翻译,尚未认真校对。
元宇宙技术与应用智慧树知到答案章节测试2023年中国科学技术大学
第一章测试1.元宇宙的英文Metaverse中,meta的意思是()A:超越B:第一个C:构成元素答案:A2.元宇宙的概念出自什么科幻小说()?A:Snow crashB:流浪地球C:头号玩家答案:A3.有一家元宇宙概念游戏上市后市场飙升超过400亿美元,它是()A:我的世界B:SandboxC:动物森友会D:Roblox答案:D4.关于元宇宙的说法,正确的是()A:元宇宙是互联网技术在宇宙中的应用B:元宇宙是一系列新技术的融合与集成C:元宇宙是一项全新的技术答案:B5.根据英特尔公司高级副总裁Raja Koduri的观点,要想实现类似《头号玩家》中的体验,需要将现在的算力提升至少()倍。
A:10倍B:10000倍C:100倍D:1000倍答案:D6.导致元宇宙爆发的原因有()A:NFT技术为数字资产提供了有力的保障B:疫情推动了更多线上聚集C:新技术发展与融合的必然趋势答案:ABC第二章测试1.“lo”于哪一年发出()A:1982年B:1969年C:1981年D:1989年答案:B2.因特网的前身是()A:EthernetB:DECnetC:NSFNETD:ARPANT答案:D3.1991年,Tim Berners-Lee引入的下列哪一个项目使得互联网成为面向公众开放的信息网(Info)()A:LANB:World Wide WebC:Galactic NetworkD:WAN答案:B4.下列哪项不属于XR Headsets()A:Google GlassB:CLumus DK40C:Atheer ProD:Recon Jet答案:C5.下列哪项可能是面向用户独立的媒体平台()A:云计算B:区块链C:VRD:AI答案:C第三章测试1.在摄像机模拟双目立体视觉中,下列说法正确的是()A:右眼看到更多的左视角画面B:人眼看到的是两个视角画面的叠加C:左眼看到更多的右视角画面D:说法都正确答案:B2.以下属于互补色分色技术的模式的是()A:红蓝(青)B:橙红C:蓝棕D:(品)红绿答案:ACD3.下列不能实现左右画面分离的技术是()A:光栅技术B:偏振光技术C:Stereo Scope分色技术答案:C4.下列不属于红蓝眼镜的缺点的是()A:价格昂贵B:色盲、色弱群体无法使用C:色差D:色觉不平衡答案:A5.以下哪款眼镜实现立体视觉效果时,会使人眼产生“视觉暂留效应”()A:分视区眼镜B:红蓝眼镜C:液晶快门眼镜D:偏振眼镜答案:C第四章测试1.Extended Reality (XR)包含以下哪项内容()A:MRB:ARC:VRD:AV答案:ABC2.下列哪项属于可在AR环境中的实现的活动()A:Script EditingB:Music CourtesyC:Video CourtesyD:都是答案:D3.下列哪项属于小空间AR应用()A:IKEA PlaceB:AR投影辅助外科手术C:基于对图像、物体或空间识别的AR答案:ABC4.下列哪项不属于UWB技术的优点()A:定位精度高B:对信道衰落不敏感C:发射信号功率谱密度高D:截获能力低答案:Cyar手机浏览器的工作流程是()①开启应用程序,自动启动摄像头②陀螺仪判断摄像头所面对的方向③GPS探测到目前所在位置④用户可通过点击切换感兴趣的图层⑤CP自动匹配当前位置内容并各形成一个图层A:①③②⑤④B:②①③⑤④C:①②③⑤④D:②①③④⑤答案:A第五章测试1.基于HRTF(Head Related Transfer Function),用户可以体验虚拟世界中的3D声音()A:错B:对答案:B2.以下哪项理论可用于解释VR晕动症()A:都是B:感官冲突理论C:中毒理论D:姿势不稳定理论答案:A3.下列属于VR晕动症的症状有()A:定向疲劳B:眼疲劳C:恶心D:肺热咳嗽答案:ABC4.以下哪项属于应对VR晕动症的措施()A:提升对VR眩晕的适应性B:都是C:建立预警机制D:减少各感官之间的冲突答案:B5.下列哪项VR运动产品可以用于军事训练和电子赛车()A:RenoB:MateC:Find XD:Nova答案:D第六章测试1.信息物理融合系统(Cyber-physics system,CPS)的核心概念包括()A:都是B:CommunicationC:ControlD:Computation答案:A2.信息物理融合系统(Cyber-physics system,CPS)运用在智能交通中时,不可实现以下哪些智能化管理()A:人车交互语音导航B:定位跟踪C:违章检测D:智能减档答案:D3.以下哪些领域可利用到CPS系统()①健康医疗设备与辅助生活②智能交通控制与安全③先进汽车系统与航空电子④能源储备与基础设施建设⑤环境监控与防御系统⑥加工制造与工业过程控制A:①②③⑤⑥B:①②③④⑥C:①②③④⑤⑥D:①②③④⑤答案:C4.下列关于数字孪生(Digital twin的说法正确的是()A:数字孪生是一种仿真过程B:数字孪生的本质是在物理世界对信息世界的等价映射C:数字孪生在现实世界中完成映射D:数字孪生是一种独立的数字映射系统答案:A5.数字孪生的本质是在物理世界对信息世界的等价映射()A:对B:错答案:B第七章测试1.在《雪崩》中描绘的元宇宙里面,用户以自定义的“Avatar”进行在线活动,这里的Avatar是指()A:阿瓦达B:阿凡达C:化身D:孪生答案:C2.根据梅拉宾(Mehrabian)法则,一个人对他人的印象构成中,肢体动作所占的比例约为:()A:都不是B:55%C:7%D:38%答案:B3.Deepfake是数字人()A:对B:错答案:B4.以下哪项为全球首个对话式AI数字人创建平台()A:Readyplayer.meB:MetaHuman CreatorC:Facegood AvataryD:UneeQ Creator答案:D5.虚拟人的驱动方式有哪些()A:中之人驱动B:手势驱动C:智能驱动D:语音驱动答案:ACD第八章测试1.以下哪个平台向用户出售虚拟地块()A:SuperworldB:Earth2C:DecentralandD:The sandboxE:Cryptovovexls答案:ABCDE2.Cryptovovexls以二维网格的形式组织成元宇宙虚拟地块空间()A:错B:对答案:B3.采用物理世界映射的虚拟房地产,虚拟空间的购买者会获得物理空间的所有权()A:对B:错答案:B4.林登币可以与美元进行兑换,已经实现了在现实世界的流通()A:对B:错答案:B5.下列属于元宇宙经济循环模式的是()A:虚实之间的循环B:外循环C:内循环D:都是答案:D。
信息物理系统的5c
信息物理系统的5c信息物理系统是指将信息技术与物理系统相结合的一种新型系统。
它通过传感器、通信网络和计算机等技术手段,将物理世界中的各种信息进行采集、传输、处理和应用,从而实现对物理系统的智能化管理和控制。
在信息物理系统中,有五个重要的要素,即5C,分别是感知(Collection)、通信(Communication)、计算(Computation)、控制(Control)和协同(Collaboration)。
首先是感知。
感知是信息物理系统的基础,它通过传感器等设备对物理世界中的各种信息进行采集和感知。
传感器可以感知温度、湿度、光照等环境参数,也可以感知物体的位置、速度、加速度等运动参数。
感知技术的发展使得信息物理系统能够获取更加丰富和准确的信息,为后续的通信、计算和控制提供了基础。
其次是通信。
通信是信息物理系统中不可或缺的一环,它通过通信网络将感知到的信息传输到其他设备或系统中。
通信技术的发展使得信息物理系统能够实现远程监控、远程控制等功能,极大地提高了系统的灵活性和效率。
同时,通信技术也为信息物理系统的协同和协作提供了基础。
第三是计算。
计算是信息物理系统中的核心环节,它通过计算机等设备对感知到的信息进行处理和分析。
计算技术的发展使得信息物理系统能够实现智能化的决策和控制,提高系统的自动化程度和智能化水平。
计算技术的应用还可以实现对大数据的处理和分析,为系统的优化和改进提供支持。
第四是控制。
控制是信息物理系统中的关键环节,它通过控制器等设备对物理系统进行控制和调节。
控制技术的发展使得信息物理系统能够实现对物理系统的精确控制和调节,提高系统的稳定性和可靠性。
控制技术的应用还可以实现对物理系统的优化和改进,提高系统的性能和效益。
最后是协同。
协同是信息物理系统中的重要环节,它通过协同机制将各个子系统或设备进行协调和合作。
协同技术的发展使得信息物理系统能够实现多个设备之间的信息共享和资源共享,提高系统的整体效能和协同效应。
高三英语实习活动的体会练习题20题含答案解析
高三英语实习活动的体会练习题20题含答案解析1.I made many friends during my internship. We often communicate and help each other. This shows the importance of _____.A.independenceB.interactionC.intelligencermation答案解析:B。
本题考查名词辨析。
A 选项“independence”独立;B 选项“interaction”互动、交往;C 选项“intelligence”智力;D 选项“information”信息。
在实习中交了很多朋友并经常交流互相帮助,体现了人际交往的重要性,所以选B。
2.In the internship team, we work together to complete tasks. This requires good _____.petitionB.cooperationparisonplaint答案解析:B。
本题考查名词辨析。
A 选项“competition”竞争;B 选项“cooperation”合作;C 选项“comparison”比较;D 选项“complaint”抱怨。
在实习团队中一起完成任务需要良好的合作,所以选B。
3.When working with others in the internship, we should listen to different opinions. This is called _____.A.respectB.replyC.receptionD.reaction答案解析:A。
本题考查名词辨析。
A 选项“respect”尊重;B 选项“reply”回复;C 选项“reception”接待;D 选项“reaction”反应。
在实习中听不同意见是尊重他人的表现,所以选A。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Communication putationPrahladh Harsha1,Yuval Ishai2,Joe Kilian3,Kobbi Nissim4,and S.Venkatesh51Computer Science and Artificial Intelligence Laboratory,MIT,Cambridge,MA02139,USA,prahladh@.2Computer Science Department,Technion,Haifa32000,Israel,yuvali@cs.technion.ac.il.3NEC Laboratories America Inc,Princeton,NJ08540,USA,joe@.4Microsoft Research,SVC.1065La Avenida,Mountain View,CA94043,USA,kobbi@.5Computer Science Department,University of Victoria,Victoria,BC,Canada V8W3P6,venkat@cs.uvic.ca.Abstract.We initiate a study of tradeoffs between communication andcomputation in well-known communication models and in other relatedmodels.The fundamental question we investigate is the following:Is therea computational task that exhibits a strong tradeoffbehavior betweenthe amount of communication and the amount of time needed for localcomputation?Under various standard assumptions,we exhibit boolean functions thatshow strong tradeoffs in the following computation models:(1)two-partyrandomized communication complexity;(2)query complexity;(3)prop-erty testing.For the model of deterministic communication complexity,we show a similar result relative to a random oracle.Finally,we study a time-degree tradeoffproblem that arises in arithmeti-zation of boolean functions,and relate it to time-communication tradeoffquestions in multi-party communication complexity and in cryptography.1IntroductionA Motivating Riddle.Consider the following multi-party communication game.Fix afinitefield F and let M be a n×k matrix over F.The columns of F are assigned to k players so that each player j knows all columns of M except the j th.(This is known as the“input on the forehead”model[CFL83].)The players’goal is to compute the product of the n row sums,namely the functionPS(M)=ni=1kj=1M i,j,by means of simultaneously sending messages to an external referee.This can be easily done by having the entire matrix M sent to the referee(e.g.,letting P1send Research done while the author was at NEC Laboratories America.Research done while the author was at NEC Laboratories America.Research done while the author was at MPI for Informatik,Germany.the second column and P2the remaining columns).The goal is to minimize the communication complexity,measured as the length of the longest message sent.A closely related problem was studied in[BGKL03].When k>n(say,k=n+1) our problem admits the following simple solution,implicit in[BGKL03].Write PS(M)as the sum of k n terms,where each term is a product involving a single entry from each row of M.Since there are more players than rows,for each such term there is a player holding all of its values.Hence,one can assign each term to some player who knows its value,and have each player send the sum of all terms assigned to it.The referee can then recover PS(M)by simply adding up the k field elements it received.While this protocol is very efficient in communication, the combined computation of the players is exponential in n.Note that if one uses the natural greedy strategy of assigning each term to thefirst player to which it can be assigned,then player n+1will need to compute the permanent of an n×n sub-matrix of M,a#P-hard problem.6Thus,a natural question is the following:Does the function PS(M)admit a protocol in which(1)each player only sends a single element of F;and(2)the local computation of each player is polynomial in n?A negative answer seems likely in light of the failure of the natural term assignment strategy.It also seems reasonable that for any valid way of assigning the k n terms to the players,some player will be forced to compute a hard func-tion.Thus,this problem looks like a good candidate for a time-communication tradeoff:it requires little time to compute when there is no limit on the commu-nication complexity,requires little communication when there is no limit on the time complexity,but seems to defy solutions that are simultaneously efficient with respect to both complexity measures.Quite surprisingly,it turns out that the answer to the above question is“yes”. (The impatient reader can skip to Section5for a solution to the riddle.)Thus, this particular problem does not exhibit the time-communication tradeoffthat was initially suspected.However,this question served as the original motivation for this work,which explores the existence of similar kinds of tradeoffs in related contexts.1.1Problem DescriptionLet f:X×Y→Z be an arbitrary function of two inputs.In the two-party communication model of Yao[Yao79],there are two players A and B.A is given x∈X,B is given y∈Y and they need to compute z=f(x,y)by communicating with each other.In any communication protocol designed for f,there are three useful measures of complexity:6Even if F has characteristic2,in which case the permanent can be efficiently com-puted,it is not clear that the computation of(say)the middle player can be made efficient.–Communication complexity:The total number of bits exchanged be-tween A and B;–Time complexity:The amount of time needed by A and B for local com-putation;–Round complexity:The number of messages exchanged by A and B.Given any two of these three complexity measures,it is natural to ask if there are tasks which exhibit a tradeoffbetween them.The question of rounds putation does not arise in the two-party model,as the simple protocol in which A send his entire input over to B is optimal with respect to both mea-sures.7Tradeoffs between round complexity and communication complexity have been well studied(see below).In this paper,we initiate the study of the remain-ing question:proving tradeoffs between communication and local computation. Specifically,our main goal is tofind functions f such that:(1)f can be efficiently computed given both its inputs,i.e.,given no restriction on the communication;(2)f has a protocol with low communication complexity given no restriction on the computation;and(3)there is no protocol for f which simultaneously has low communication and efficient computation.1.2Related workPapadimitriou and Sipser[PS84]first discussed the problem of showing trade-offs between rounds of communication and communication complexity.For any fixed k,they proposed a boolean function p k called the pointer chasing prob-lem that has a k-round protocol with O(log n)bits of communication.They conjectured that its communication complexity is at least linear if only k−1 rounds are allowed.In other words,p k shows a strong tradeoffbehavior between rounds and communication complexity.This conjecture was proved in a series of papers[PS84,DGS87,NW93].Additional complexity measures which are not considered in this work are space complexity and randomness complexity.Tradeoffs between space and com-munication were considered by Beame et al.[BTY94].Tradeoffs between ran-domness and communication were studied by Canetti and Goldreich[CG93]. 1.3Our ResultsOurfirst result is a strong time-communication tradeofffor a boolean function in the two-party randomized communication model.Randomized communication model.Suppose that there is a UP relation R such that the search problem corresponding to R is not in BPTIME[2O(T(n))]. (This would follow from the existence of a one-way permutation secure against 7However,this question does make sense in a cryptographic setting when players need to compute a function of their inputs without revealing their inputs to each other.Such a tradeoffquestion is addressed in Section5.3.a2O(T(n))bounded adversary.)Then,there is an efficiently computable boolean function f R with the following properties.If Alice and Bob are computation-ally unbounded,then there is an O(log n)-bit1-round randomized protocol that computes f R.But if Alice and Bob are computationally bounded,then any ran-domized protocol for f R,even with multiple rounds,will requireΩ(T(n))bits of communication(see Section3).As a corollary we get the following strong separation result.Let F c denote the class of functions f(x,y)∈PTIME such that the randomized communi-cation complexity of f is bounded by c.Similarly,let F polyc be the functionsf(x,y)∈PTIME such that f(x,y)is computable by polynomial-time par-ties with communication c.Then there is an explicit boolean function f in F log n\F polyT(n)for T(n)as above.Deterministic communication model.Obtaining similar tradeoffresults for the deterministic two-party model appears to be much harder.We show a strong tradeoffresult relative to a random oracle.Specifically,let L be a random sparse language.Then,with probability1over choice of L,there is a boolean function f L(efficiently computable relative to L)with the following properties. There is a deterministic communication protocol for f L with,say,O(log2n) bits of communication if both Alice and Bob are computationally unbounded with oracle access to L.However,any protocol in which Alice and Bob are computationally bounded will requireΩ(n)bits of communication,even with oracle access to L.We defer the proof of this tradeoffto the full version of the paper[HIKNV].Query complexity and property testing.Our next results prove trade-offs in related models like the query complexity model and the property testing model.In these models,information is stored in the form of a table and the queries are answered by bit-probes to this table.We view the probes as com-munication between the stored table and the query scheme(or the tester),and the computation of the query scheme(or the tester)as the local computation. We show that:(a)Under a cryptographic assumption,there exists a language L such that,on inputs of length n,a query scheme with unlimited computation makes O(log n)queries while a query scheme with efficient local computation requiresΩ(nε)queries for somefixedε<1;(b)assuming NP⊆BPP,given any ε>0,there exists a property P such that,on inputs of length n,a computa-tionally unbounded tester will require only nεbits to check if the input satisfies the property or is far from satisfying it.On the other hand,a computationally bounded tester will require n1−εbits.We only provide the proof of the tradeoffin the query complexity model(see Section4)and defer the proof of the tradeoffin the property testing model to the full version of the paper[HIKNV]. Natural tradeoffquestions.In addition to proving the existence of tradeoffs in various contexts,we also put forward several concrete natural tradeoffques-tions and relate them to each other.We propose three different tradeoffquestions arising in different contexts:arithmetization of boolean functions,multi-partycommunication,and cryptography.We relate them by showing that a“positive”resolution of thefirst would imply a solution to the second,which in turn would imply a solution to the third.Hence,the cryptographic application may serve as an additional motivation for studying the other two.For want of space,we defer the entire discussion on these natural tradeoffquestions to the full version of the paper[HIKNV].2PreliminariesIn this section,we describe the communication complexity model,a formal def-inition of the problem we consider and the notion of UP relations.2.1The Communication Complexity Model[Yao86]Let X,Y and Z be arbitraryfinite sets and f:X×Y→Z be an arbitrary function.There are two players,Alice and Bob who wish to evaluate f(x,y) for x∈X and y∈Y.However,Alice only knows x and Bob only knows y. To evaluate the function,they communicate with each other according to some fixed protocol P in which they send messages to each other.The cost of a protocol P on an input(x,y)is the number of bits exchanged by Alice and Bob when Alice is given x and Bob is given y.The cost of a protocol P is the worst case cost of P over all inputs(x,y).The(deterministic) communication complexity of f is the minimum cost of a protocol that computes f.If Alice and Bob are allowed access to random coin tosses and their messages depend also on the result of the coin tosses besides their input and the com-munication so far,we say that the protocol P is randomized.The randomized communication complexity of a function f is the minimum cost of a randomizedprotocol that computes f with error at most14on any input(x,y).The error isover the internal coin tosses of the protocol.2.2TradeoffsWe now describe formally our tradeoffproblem in the two-party communication complexity model.Similar definitions can be given for other models we consider. Our goal is tofind a boolean function f:X×Y→{0,1}with the following properties:–f(x,y)can be computed efficiently,that is in polynomial time,if both the inputs x∈X and y∈Y are given.–f has very efficient communication protocols,that is,protocols with com-munication complexity(log n)c for some c.–There is no protocol for f which is simultaneously communication and com-putation efficient.In other words,any protocol in which Alice and Bob use only polynomial time for local computation requires almost linear number of bits of communication in the worst case.2.3UP RelationsDefinition 2.1.A relation R ⊆Σ∗×Σ∗is said to be a UP relation (with witness size n k )if1.there exists a deterministic Turing machine that decides the language {(x,w )|(x,w )∈R }in polynomial time.2.for every x ,there exists at most one w such that (x,w )∈R and furthermore,this w satisfies |w |=|x |k .We denote this w ,if it exists,by w (x ).The search problem corresponding to R is the problem of finding w such that R (x,w )holds,given x .We will assume the existence of UP relations for which the corresponding search problem is very hard.Such an assumption is standard in cryptography since the existence of strong one-way permutations implies the existence of such hard UP relations.More formally,Definition 2.2.We say is that a UP relation R is T (n )-hard if no probabilistic algorithm running in time 2O (T (n ))solves the search problem corresponding to R .3Tradeoffs in the Two-Party Communication ComplexityModelWe start with the definition of the boolean function we consider.Definition 3.1.Let R ⊆{0,1}∗×{0,1}∗be a UP relation with witness size n k .Consider the 2-player (Alice and Bob)boolean functionf R :{0,1}n +n k ×{0,1}n k →{0,1}.Alice’s input:(x,z )∈{0,1}n ×{0,1}n k ;Bob’s input:w ∈{0,1}n kf R ((x,z ),w )= z,w if R(x,w)holds 0otherwise where a,b denotes the inner product of a,b modulo 2.Theorem 3.2.Let R be a T (n )-hard UP reaction.Then,the predicate f R has the following properties.1.f R is computable in polynomial time.2.There exists a randomized protocol that computes f R with O (log n )-bit com-munication.3.If Alice and Bob are computationally bounded,then any randomized protocol for f R ,even with multiple rounds,will require Ω(T (n ))bits of communica-tion.Proof.Observe that f R can be computed efficiently given both its inputs.We just need to check that R(x,w)holds and if so,output z,w .Lemma3.3.If Alice is computationally unbounded,then there exists a random-ized protocol that computes f R with O(log n)-bit communication.Proof.Alice computes the unique w such that R(x,w)holds.Alice and Bob then engage in an“equality”protocol8to check that Bob’s input equals w.If so,she computes and sends Bob the answer z,w .The following lemma demonstrates that such a communication-efficient pro-tocol is unlikely when Alice and Bob are computationally bounded.In fact,it is sufficient for the proof that only Alice is computationally bounded.Bob is allowed to be computationally unbounded.Lemma3.4.Suppose there exists a b(n)-bit communication randomized multi-round protocolΠthat computes f R involving Alice whose running time is at most T A(n),then there exists a randomized algorithm that solves the search problem corresponding to R in time poly(n,2b(n))·T A(n).Proof.For the rest of the argument,we assume that for any x,w is the unique w such that R(x,w)holds,denoted by w(x).Hence,for our purposes,f R((x,z),w)= z,w .Our goal is to relate the search problem of computing w given x to the problem of computing z,w with a low communication protocol.Our approach is to convert a low communication protocol into an efficient oracle that computes z,w with some advantage over random guessing.Given such an oracle,we can then use the Goldreich-Levin reconstruction algorithm to compute a small number of candidates for w.More precisely,we create a“small”set of oracles, one of the oracles computes z,w with some nontrivial advantage.We try each oracle by exhaustive search,and use the fact that we can recognize the correct w.Converting protocols into oraclesLet T be a transcript.For simplicity,we assume Alice outputs f R((x,z),w)as itsfinal bit;this convention increases the size of the transcript by at most2 bits.Thus,T includes a“guess”as to z,w .We define the probabilistic oracle A T(x,z)for computing z,w ,as follows.Algorithm A T(Input:(x,z)∈{0,1}n×{0,1}n k).Simulate the protocolΠfrom Alice’s end.Whenever a message from Bob is required,use the transcript T to obtain the corresponding message.If at any point the message generated by Alice according to the protocolΠdisagrees with the contents of the transcript T,abandon the protocol and output a random bit b.Otherwise,follow the protocol to the end and output the bitb generated by the protocolΠ.8Recall that the randomized communication complexity of equality is O(log n).First we define our notation for the advantage ofΠand A T in guessing z,w . Definition3.5.Let x∈{0,1}n,w=w(x)and z be distributed uniformly.We define adv(Π,x)byadv(Π,x)=Pr[Alice outputs z,w ]−Pr[Alice doesn’t output z,w ],where Alice and Bob runΠwith respective inputs(x,z)and w,and the prob-ability is taken over the choice of z and over the coin tosses of Alice and Bob. We define adv(A T,x)analogously.Fixing x and a transcript T,we define adv(Π,x,T)byadv(Π,x,T)=Pr[T occurs and Alice outputs z,w ]−Pr[T occurs and Alice doesn’t output z,w ].Note that the only contribution to A T’s advantage is by events in which T occurs,hence we do not bother to define adv(A T,x,T).It follows from the definitions that,adv(Π,x)=Tadv(Π,x,T).(1)Since the protocolΠcomputes f R correctly,it holds that adv(Π,x)≥12forevery x.Since there are at most22b(n)possible transcripts T,it follows from Equation(1)that for every x∈{0,1}n,there exists a transcript T∗,adv(Π,x,T∗)≥122b(n)+1(2)Letρw(T)be the probability that Bob’s coins are consistent with T.Note that ρw(T)is independent of z.It can easily be verified from the definitions thatadv(Π,x,T)=adv(A T,x)ρw(T).(3) Since0≤ρw(T)≤1,it follows from Equation(2)thatadv(A T∗,x)≥122b(n)+1.(4)Setε=122b(n)+1.Now we run the Goldreich-Levin algorithm GL(See Theo-rem3.6)with parameters n,ε,oracle access to A T∗(x,.)and predicate R(x,.). Theorem3.6(Goldreich-Levin[GL89]).There exists a randomized algo-rithm GL with oracle access to a function and a predicate satisfying the fol-lowing:Fix u∈{0,1}n.Let h:{0,1}n→{0,1}be a randomized algorithmsuch that h(v)= u,v with probability at least12+εwhere the probability isover choice of v,picked uniformly at random,and the internal coin tosses of h. Let P:{0,1}n→{0,1}be a polynomial time computable predicate such that P(v)=1iffu=v.Then,the randomized algorithm GL with oracle access to hand P satisfiesPr[GL h,P(n,ε)=u]≥3 4Moreover,the running time of GL is at most poly(n,1ε).Theorem3.6guarantees that the algorithm GL computes w in time poly(n,1/ε) with constant probability.However,we do not have the transcript T∗.(Recall that we only know that there exists a transcript T∗that satisfies Equation(4), we do not how to obtain one.)For this purpose,we run the Goldreich-Levin algorithm GL for every possible transcript T with parameters n andε.One of these must succeed.Moreover,we can check which one succeeds by veri-fying that R(x,w)holds.The total time taken by this algorithm is at most 22b·poly(n,22b+1)·T A(n)=poly(n,2b)·T A(n).This proves Lemma3.4. To conclude the proof of the tradeoffresult,we now use the assumption that the search problem corresponding to UP relation R does not have randomized algorithm that run in time2o(T(n))on inputs of length n.Therefore,poly(n,2b)·T A(n)≥2Ω(T(n))and hence b(n)=Ω(T(n))since T A(n)is polynomially bounded in n. Remarks:1.If we make the assumption that there is a search problem in UP that doesnot have sub-exponential time randomized algorithms,we get a very strong tradeoff.Such an assumption is used in cryptography.2.We can prove the same result under a weaker assumption that the classFewP has a relation whose search problem is hard.In this case,we could use the set membership function instead of equality.3.If the search problem corresponding to the relation R had average-case com-plexity at least2Ω(T(n))when x is chosen from the distribution D(instead of worst case complexity),then the same proof as above demonstrates thatf R has average-case communication complexity at leastΩ(T(n))for polyno-mially bounded Alice and Bob when x is chosen from the distribution D,z uniformly and w=w(x).4Communication putation in the Query Complexity ModelWe consider the query complexity model in which a decision procedure D probes its input x choosing to look at some bits,but not others.The query complexity of a predicate P on n-bit inputs is given by min D max x(#probes D makes on x). Here,D ranges over all decision procedures for P and x ranges over all inputs of length n.We can consider the computationally bounded analog of this measure,where D is restricted to run in probabilistic polynomial time.Some subtleties arise in such a definition.For example,D must be quantified before n,since polynomial time is an asymptotic notion,but under this quantification there may be no “best”D for all inputs.Also,we may wish to augment our definitions to allow for an error probability.Fortunately,Theorem4.2establishes a tradeoffthat is clearly resilient to these technical issues.Definition4.1.We say that a one-way permutation p is (n)-lsb hard if no probabilistic polynomial-time procedure,on input x,can compute(simultane-ously)the l(n)least significant bits of p−1(x)with probability non-negligibly greater than2− (n),where x is chosen uniformly from{0,1}n.We note that such permutations exist based on the hardness of computing discrete logarithms over composite integers[SS90,HSS93].Theorem4.2.Let p be (n)-lsb hard.Then there exists a predicateC p:({0,1}n)2 (n)+1−→{0,1}with the following properties:1.C p is computable in polynomial time.2.The query complexity of C p is at most2n.3.No polynomial-time bounded decision procedure Q can compute C p queryingonly2α (n)bits,whereα<1is any constant.In particular,there is a dis-tribution on the inputs so that if Q computes C p with advantageε,then one can compute lsb (n)(x)from p(x)with probabilityΩ(ε2−α (n)).Proof.(Sketch)For notational simplicity,we write instead of (n).We define C p(y,x1,...,x2 )to be1iffthere exists some i,1≤i≤2 ,such that p(x i)=y and lsb (x i)=i(treating i as an -bit string).The predicate C p is computable in polynomial time,since we can run over all the(polynomially-many)possible values of i.To see that C p has query com-plexity at most2n,consider the following(computationally unbounded decision procedure):1.Query y(which is n bits long)pute x=p−1(y)and i=lsb (x).3.Query x i(which is n bits long),and accept iffx i=x.Our proof that no polynomial-time bounded decision procedure exists is by contradiction.Given Q,as above,we construct a polynomial-time algorithm G for guessing lsb (x)from p(x),as follows:1.Given p(x),compute y=p(x)and choose x1,...,x2 uniformly at randomfrom{0,1}n.2.Run Q on input(y,x1,...,x2 ).Define I byI={i:Q queries at least one bit of x i}.3.Choose a random index i from I and output i(as an -bit quantity).We relate the success probability of G to Q’s advantage,εat computingC p(y,x1,...,x2 )under the distribution of inputs obtained as follows:1.Choose x uniformly from{0,1}n,and let y=p(x)and i=lsb (x).2.For j=i,choose x j uniformly from{0,1}n.3.With probability1/2,choose x i=x(the predicate is true).Else,choose x iuniformly from{0,1}n−x(the predicate is false).Clearly,if on a particular run,Q never queries any bit in x i ,it has no ad-vantage in guessing the value of the predicate.It follows that with probability Ω(ε),i ∈I ,where I is defined as above.In this case,choosing from I uniformly will yield i with probability 1/|I |.Since I ≤2α (n ),the theorem follows. Our construction only assumes that p ()is strong against polynomial adver-saries,resulting in any polynomial tradeoff.With stronger assumptions on the simultaneous hardness of bits in p (),we can prove any sub-exponential tradeoff.5Solution to the riddleWe now present the solution to the riddle introduced in the introduction.Let s i denote the sum of the entries in the i th row of M .We show how k =n +1players can communicate PS (M )= n i =1s i to the referee by each sending a single,efficiently computable element of F .(The same solution will work for any larger number of players.)The high-level idea is to first convert the “additive”representation of s i to a degree-1polynomial representation over a sufficiently large extension field,then make each player locally multiply its values of the n polynomials (one for each s i ),and finally project down to the original field.The protocol’s outline is described below.1.Each entry of M is lifted to an extension field F of F such that |F |≥k +1.(This is only a conceptual step and requires no action,since F is a subfield of F .)Let α1,...,αk be distinct nonzero elements of F .2.The players locally process their entries of M ,and each outputs a single ele-ment of F for each row.Let P i,j denote the output of player j corresponding to the i th row.The values P i,j should satisfy the following requirement:for each i ,the k points (αj ,P i,j )lie on a degree-1polynomial over F whose free coefficient is s i .The implementation of this stage will be described below.3.Each player j multiplies its n local outputs P i,j from the previous state,resulting in a single element q j ∈F .Note that the k points (αj ,q j )now lie on a degree-n polynomial whose free coefficient is precisely n i =1s i =PS (M ).Since k >n ,this polynomial can be uniquely determined by interpolation and its free coefficient can be written as k j =1λj q j for some fixed coefficients λj ∈F .Each player j projects λj q j down to the original field using a field homomorphism h :F →F ,and sends the result to the referee.4.The referee outputs the sum of the k field elements it received.It remains to describe the implementation of Step 2.Define a k ×k matrix L over F such that L ,m =1−α αm .For each i ,we let P i,j = k m =1L j,m M i,m .Note that since L j,j =0,player j can compute this sum based on his local input.It remains to argue that the above local computations indeed produce the required degree-1representation of s i .This follows by noting that for any column m of L ,the values (α ,L ,m )lie on a degree-1polynomial whose free coefficient is 1.By linearity,the values (αj ,P i,j )lie on a degree-1polynomial whose free coefficient is k j =11·M i,j =s i .Thus,we have shown:Theorem5.1.The function PS(M)= ni=1kj=1M ij,where k>n,admitsa computationally efficient simultaneous messages protocol in which each player holds all but one column of M and sends a singlefield element to the referee. References[BGKL03]Babai,L.,G´a l,A.,Kimmel,P.G.,and Lokam,munication complexity of simultaneous messages.SIAM Journal of Computing33,1(2003),137–166.(Preliminary Version in12th STACS,1995).[BTY94]Beame,P.,Tompa,M.,and Yan,munication-space tradeoffs for unrestricted protocols.SIAM Journal of Computing23,3(June1994),652–661.(Preliminary Version in31st FOCS,1990).[CG93]Canetti,R.,and Goldreich,O.Bounds on tradeoffs between random-ness and communication putational Complexity3(1993),141–167.(Preliminary Version in31st FOCS,1990).[CFL83]Chandra,A.K.,Furst,M.L.,and Lipton,R.J.Multi-party protocols.In Proc.15th ACM Symp.on Theory of Computing(Boston,Massachusetts,25–27Apr.1983),pp.94–99.[DGS87]Duris,P.,Galil,Z.,and Schnitger,G.Lower bounds on communica-tion rmation and Computation73,1(Apr.1987),1–22. [GL89]Goldreich,O.,and Levin,L.A.A hard-core predicate for all one-way functions.In Proc.21st ACM Symp.on Theory of Computing(Seattle,Washington,15–17May1989),pp.25–32.[HIKNV]Harsha,P.,Ishai,Y.,Kilian,J.,Nissim,K.,and Venkatesh,-munication putation.Technical Report(to be posted in ECCC).Available at /~prahladh/papers/[HSS93]H˚astad,J.,Schrift,A.W.,and Shamir,A.The discrete logarithm modulo a composite hides O(n)bits.Journal of Computer and SystemSciences47,3(Dec.1993),376–404.(Preliminary Version in22nd STOC,1990).[NW93]Nisan,N.,and Wigderson,A.Rounds in communication complexity revisited.SIAM Journal of Computing22,1(Feb.1993),211–219.(Pre-liminary Version in23rd STOC,1991).[PS84]Papadimitriou,C.H.,and Sipser,munication complexity.Jour-nal of Computer and System Sciences28,2(Apr.1984),260–269.(Prelim-inary Version in14th STOC,1982).[SS90]Schrift,A.W.,and Shamir,A.The discrete log is very discreet.In Proc.22nd ACM Symp.on Theory of Computing(Baltimore,Maryland,14–16May1990),pp.405–415.[Yao79]Yao,A.C.-C.Some complexity questions related to distributive comput-ing(preliminary report).In Proc.11th ACM Symp.on Theory of Computing(Atlanta,Georgia,30Apr.–2May1979),pp.209–213.[Yao86]Yao,A.C.-C.How to generate and exchange secrets?(extended abstract).In Proc.27th IEEE Symp.on Foundations of Comp.Science(Toronto,Ontario,Canada,27–29Oct.1986),pp.162–167.。