Representing and Executing Agent-Based Systems

合集下载

布卢姆认知目标过程维度分类完整版

布卢姆认知目标过程维度分类完整版

布卢姆认知目标过程维度分类标准化管理处编码[BBX968T-XBB8968-NNJ668-MM9N]布鲁姆认知目标过程维度分类布卢姆认知目标知识维度分类二维分类框架运用举例教育目标(educationalobjectives)同教育目的或宗旨(aim,purposesandgoal)关系密切,在课程改革中又紧紧地同内容标准(contentstandards)或课程标准(curriculumstandards)联系在一起。

但不管我们怎么称呼,教育目标在系统设计教学中是至关重要的。

简单的说,我们希望学习者学会的东西,既是教学的预期结果,也就是教学的目标;而教学活动,像阅读教材,做实验,参观旅行等都是达到这一目标(的)的手段。

所以,教学活动不是目标。

同理,测验本身也不是目标。

教育目标分类学是对教育目标作出分类。

修订的认知目标分类学坚持以学习者为取向,基于学习,重视了外部表现和可评价等特点,以此要求对预期的认知结果能作出陈述和评价。

一个教育目标的陈述包括了动词和名词。

动词一般说明预期的认知过程;名词则一般说明期望学习者所获得或建构的知识。

请看这样一个实例:"学习者将学会区分(认知过程)政府体制中立法,司法和行政机构如何做到分工明确各司其职(知识)"。

其中,"区分"是属于认知过程中"分析"的一个具体类别;名词短语"政府体制中立法,司法和行政机构如何做到分工明确各司其职"为预期学习的知识类型提供了线索――"体制"是一个概念性知识。

所以,根据二维矩阵表,我们可以得出结论:这一目标就落在"分析"和"概念性知识"相交的方格内。

既然知识维和认知过程维构成了一个二维矩阵,矩阵内每一个具体结合就是教育目标指导教学实践的用武之地。

用最简明的话来说,布卢姆认知目标修订的框架旨在帮助教师教学,学习者学习和评价者评价。

英文版个人授权委托书

英文版个人授权委托书

英文版个人授权委托书Personal Authorization Letter in EnglishDear [Recipient's Name],I, [Your Full Name], hereby authorize and appoint [Authorized Person's Full Name], residing at [Authorized Person's Address], to act on my behalf in all matters related to [Specify the purpose of the authorization, such as financial transactions, legal matters, or any other specific tasks].As my authorized representative, [Authorized Person's Full Name] is permitted to undertake the following actions on my behalf:1. Conducting financial transactions, including but not limited to withdrawing or depositing funds, issuing and endorsing checks, and managing my bank accounts.2. Signing and executing legal documents, contracts, agreements, and any other legally binding instruments, including real estate transactions and loan applications.3. Accessing and managing any of my digital or online accounts, including email, social media, and online banking platforms, for the purpose of communication, maintenance, or administration.4. Collecting or receiving any correspondence, documents, or other materials addressed to me, and responding to any inquiries or requests made in my name.5. Representing me in any legal proceedings, including filing claims, attending hearings, and engaging in negotiations or settlements, should the need arise.This authorization also includes the power to delegate any or all of the aforementioned responsibilities to another individual, at the discretion of [Authorized Person's Full Name], provided that the delegate is trustworthy and capable of fulfilling the assigned tasks.I confirm that this personal authorization letter is valid as of [Effective Date] and remains in effect until further notice. I reserve the right to revoke this authorization in writing at any time, should the circumstances change.By signing this letter, I acknowledge that I fully understand the implications and consequences of granting this authority, and I hold [Authorized Person's Full Name] harmless from any liabilities or claims arising from actions taken in good faith and within the scope of this authorization.Please find attached a copy of my identification document [Attach a copy of your identification document, such as a passport or driver's license] for your reference and verification.Thank you for your prompt attention to this matter. I trust that [Authorized Person's Full Name] will fulfill their responsibilities diligently and in my best interest.Yours sincerely,[Your Full Name][Your Contact Information]。

基于BERT的短文本相似度判别模型

基于BERT的短文本相似度判别模型

基于BERT的短文本相似度判别模型方子卿,陈一飞*(南京审计大学信息工程学院,江苏南京211815)摘要:短文本的表示方法和特征提取方法是自然语言处理基础研究的一个重要方向,具有广泛的应用价值。

本文提出了BERT_BLSTM_TCNN模型,该神经网络模型利用BERT的迁移学习,并在词向量编码阶段引入对抗训练方法,训练出包括句的语义和结构特征的且泛化性能更优的句特征,并将这些特征输入BLSTM_TCNN层中进行特征抽取以完成对短文本的语义层面上的相似判定。

在相关数据集上的实验结果表明:与最先进的预训练模型相比,该模型在有着不错的判定准确率的同时还有参数量小易于训练的优点。

关键词:词向量模型;自然语言处理;短文本相似度;卷积神经网络;循环神经网络中图分类号:G642文献标识码:A文章编号:1009-3044(2021)05-0014-05开放科学(资源服务)标识码(OSID):Short Text Similarity Discrimination Model based on BERTFANG Zi-qing,CHEN Yi-fei*(Nanjing Audit University,Nanjing211815,China)Abstract:Short text representation methods and feature extraction methods are an important direction of basic research in natural language processing,and have a wide range of applications.This paper proposes the BERT_BLSTM_TCNN model.The neural net⁃work model uses BERT's transfer learning and introduces an adversarial training method in the word vector encoding stage to train sentence features that include the semantic and structural features of the sentence and have better generalization performance,and combine these The feature is input into the BLSTM_TCNN layer for feature extraction to complete the similarity determination on the semantic level of the short text.The experimental results on the relevant data set show that:compared with the most advanced pre-training model,this model has a good judgment accuracy rate and also has the advantages of small parameters and easy train⁃ing.Key words:word embedding model;natural language processing;short text similarity;convolutional neural networks;recurrent neu⁃ral networks近些年来随着个人计算机的普及和各种网络信息技术的快速进步,数字化的文本数量也随之呈现爆炸式的增长。

java英文参考文献

java英文参考文献

java英⽂参考⽂献java英⽂参考⽂献汇编 导语:Java是⼀门⾯向对象编程语⾔,不仅吸收了C++语⾔的各种优点,还摒弃了C++⾥难以理解的多继承、指针等概念,因此Java语⾔具有功能强⼤和简单易⽤两个特征。

下⾯⼩编为⼤家带来java英⽂参考⽂献,供各位阅读和参考。

java英⽂参考⽂献⼀: [1]Irene Córdoba-Sánchez,Juan de Lara. Ann: A domain-specific language for the effective design and validation of Java annotations[J]. Computer Languages, Systems & Structures,2016,:. [2]Marcelo M. Eler,Andre T. Endo,Vinicius H.S. Durelli. An Empirical Study to Quantify the Characteristics of Java Programs that May Influence Symbolic Execution from a Unit Testing Perspective[J]. The Journal of Systems & Software,2016,:. [3]Kebo Zhang,Hailing Xiong. A new version of code Java for 3D simulation of the CCA model[J]. Computer Physics Communications,2016,:. [4]S. Vidal,A. Bergel,J.A. Díaz-Pace,C. Marcos. Over-exposed classes in Java: An empirical study[J]. Computer Languages, Systems & Structures,2016,:. [5]Zeinab Iranmanesh,Mehran S. Fallah. Specification and Static Enforcement of Scheduler-Independent Noninterference in a Middleweight Java[J]. Computer Languages, Systems & Structures,2016,:. [6]George Gabriel Mendes Dourado,Paulo S Lopes De Souza,Rafael R. Prado,Raphael Negrisoli Batista,Simone R.S. Souza,Julio C. Estrella,Sarita M. Bruschi,Joao Lourenco. A Suite of Java Message-Passing Benchmarks to Support the Validation of Testing Models, Criteria and Tools[J]. Procedia Computer Science,2016,80:. [7]Kebo Zhang,Junsen Zuo,Yifeng Dou,Chao Li,Hailing Xiong. Version 3.0 of code Java for 3D simulation of the CCA model[J]. Computer Physics Communications,2016,:. [8]Simone Hanazumi,Ana C.~V. de Melo. A Formal Approach to Implement Java Exceptions in Cooperative Systems[J]. The Journal of Systems & Software,2016,:. [9]Lorenzo Bettini,Ferruccio Damiani. Xtraitj : Traits for the Java Platform[J]. The Journal of Systems & Software,2016,:. [10]Oscar Vega-Gisbert,Jose E. Roman,Jeffrey M. Squyres. Design and implementation of Java bindings in OpenMPI[J]. Parallel Computing,2016,:. [11]Stefan Bosse. Structural Monitoring with Distributed-Regional and Event-based NN-Decision Tree Learning Using Mobile Multi-Agent Systems and Common Java Script Platforms[J]. Procedia Technology,2016,26:. [12]Pablo Piedrahita-Quintero,Carlos Trujillo,Jorge Garcia-Sucerquia. JDiffraction : A GPGPU-accelerated JAVA library for numerical propagation of scalar wave fields[J]. Computer Physics Communications,2016,:. [13]Abdelhak Mesbah,Jean-Louis Lanet,Mohamed Mezghiche. Reverse engineering a Java Card memory management algorithm[J]. Computers & Security,2017,66:. [14]G. Bacci,M. Bazzicalupo,A. Benedetti,A. Mengoni. StreamingTrim 1.0: a Java software for dynamic trimming of 16S rRNA sequence data from metagenetic studies[J]. Mol Ecol Resour,2014,14(2):. [15]Qing‐Wei Xu,Johannes Griss,Rui Wang,Andrew R. Jones,Henning Hermjakob,Juan Antonio Vizcaíno. jmzTab: A Java interface to the mzTab data standard[J]. Proteomics,2014,14(11):. [16]Rody W. J. Kersten,Bernard E. Gastel,Olha Shkaravska,Manuel Montenegro,Marko C. J. D. Eekelen. ResAna: a resource analysis toolset for (real‐time) JAVA[J]. Concurrency Computat.: Pract. Exper.,2014,26(14):. [17]Stephan E. Korsholm,Hans S?ndergaard,Anders P. Ravn. A real‐time Java tool chain for resource constrained platforms[J]. Concurrency Computat.: Pract. Exper.,2014,26(14):. [18]M. Teresa Higuera‐Toledano,Andy Wellings. Introduction to the Special Issue on Java Technologies for Real‐Time and Embedded Systems: JTRES 2012[J]. Concurrency Computat.: Pract. Exper.,2014,26(14):. [19]Mostafa Mohammadpourfard,Mohammad Ali Doostari,Mohammad Bagher Ghaznavi Ghoushchi,Nafiseh Shakiba. Anew secure Internet voting protocol using Java Card 3 technology and Java information flow concept[J]. Security Comm. Networks,2015,8(2):. [20]Cédric Teyton,Jean‐Rémy Falleri,Marc Palyart,Xavier Blanc. A study of library migrations in Java[J]. J. Softw. Evol. and Proc.,2014,26(11):. [21]Sabela Ramos,Guillermo L. Taboada,Roberto R. Expósito,Juan Touri?o. Nonblocking collectives for scalable Java communications[J]. Concurrency Computat.: Pract. Exper.,2015,27(5):. [22]Dusan Jovanovic,Slobodan Jovanovic. An adaptive e‐learning system for Java programming course, based on Dokeos LE[J]. Comput Appl Eng Educ,2015,23(3):. [23]Yu Lin,Danny Dig. A study and toolkit of CHECK‐THEN‐ACT idioms of Java concurrent collections[J]. Softw. Test. Verif. Reliab.,2015,25(4):. [24]Jonathan Passerat?Palmbach,Claude Mazel,David R. C. Hill. TaskLocalRandom: a statistically sound substitute to pseudorandom number generation in parallel java tasks frameworks[J]. Concurrency Computat.: Pract.Exper.,2015,27(13):. [25]Da Qi,Huaizhong Zhang,Jun Fan,Simon Perkins,Addolorata Pisconti,Deborah M. Simpson,Conrad Bessant,Simon Hubbard,Andrew R. Jones. The mzqLibrary – An open source Java library supporting the HUPO‐PSI quantitative proteomics standard[J]. Proteomics,2015,15(18):. [26]Xiaoyan Zhu,E. James Whitehead,Caitlin Sadowski,Qinbao Song. An analysis of programming language statement frequency in C, C++, and Java source code[J]. Softw. Pract. Exper.,2015,45(11):. [27]Roberto R. Expósito,Guillermo L. Taboada,Sabela Ramos,Juan Touri?o,Ramón Doallo. Low‐latency Java communication devices on RDMA‐enabled networks[J]. Concurrency Computat.: Pract. Exper.,2015,27(17):. [28]V. Serbanescu,K. Azadbakht,F. Boer,C. Nagarajagowda,B. Nobakht. A design pattern for optimizations in data intensive applications using ABS and JAVA 8[J]. Concurrency Computat.: Pract. Exper.,2016,28(2):. [29]E. Tsakalos,J. Christodoulakis,L. Charalambous. The Dose Rate Calculator (DRc) for Luminescence and ESR Dating-a Java Application for Dose Rate and Age Determination[J]. Archaeometry,2016,58(2):. [30]Ronald A. Olsson,Todd Williamson. RJ: a Java package providing JR‐like concurrent programming[J]. Softw. Pract. Exper.,2016,46(5):. java英⽂参考⽂献⼆: [31]Seong‐Won Lee,Soo‐Mook Moon,Seong‐Moo Kim. Flow‐sensitive runtime estimation: an enhanced hot spot detection heuristics for embedded Java just‐in‐time compilers [J]. Softw. Pract. Exper.,2016,46(6):. [32]Davy Landman,Alexander Serebrenik,Eric Bouwers,Jurgen J. Vinju. Empirical analysis of the relationship between CC and SLOC in a large corpus of Java methods and C functions[J]. J. Softw. Evol. and Proc.,2016,28(7):. [33]Renaud Pawlak,Martin Monperrus,Nicolas Petitprez,Carlos Noguera,Lionel Seinturier. SPOON : A library for implementing analyses and transformations of Java source code[J]. Softw. Pract. Exper.,2016,46(9):. [34]Musa Ata?. Open Cezeri Library: A novel java based matrix and computer vision framework[J]. Comput Appl Eng Educ,2016,24(5):. [35]A. Omar Portillo‐Dominguez,Philip Perry,Damien Magoni,Miao Wang,John Murphy. TRINI: an adaptive load balancing strategy based on garbage collection for clustered Java systems[J]. Softw. Pract. Exper.,2016,46(12):. [36]Kim T. Briggs,Baoguo Zhou,Gerhard W. Dueck. Cold object identification in the Java virtual machine[J]. Softw. Pract. Exper.,2017,47(1):. [37]S. Jayaraman,B. Jayaraman,D. Lessa. Compact visualization of Java program execution[J]. Softw. Pract. Exper.,2017,47(2):. [38]Geoffrey Fox. Java Technologies for Real‐Time and Embedded Systems (JTRES2013)[J]. Concurrency Computat.: Pract. Exper.,2017,29(6):. [39]Tórur Biskopst? Str?m,Wolfgang Puffitsch,Martin Schoeberl. Hardware locks for a real‐time Java chip multiprocessor[J]. Concurrency Computat.: Pract. Exper.,2017,29(6):. [40]Serdar Yegulalp. JetBrains' Kotlin JVM language appeals to the Java faithful[J]. ,2016,:. [41]Ortin, Francisco,Conde, Patricia,Fernandez-Lanvin, Daniel,Izquierdo, Raul. The Runtime Performance of invokedynamic: An Evaluation with a Java Library[J]. IEEE Software,2014,31(4):. [42]Johnson, Richard A. JAVA DATABASE CONNECTIVITY USING SQLITE: A TUTORIAL[J]. Allied Academies International Conference. Academy of Information and Management Sciences. Proceedings,2014,18(1):. [43]Trent, Rod. SQL Server Gets PHP Support, Java Support on the Way[J]. SQL Server Pro,2014,:. [44]Foket, C,De Sutter, B,De Bosschere, K. Pushing Java Type Obfuscation to the Limit[J]. IEEE Transactions on Dependable and Secure Computing,2014,11(6):. [45]Parshall, Jon. Rising Sun, Falling Skies: The Disastrous Java Sea Campaign of World War II[J]. United States Naval Institute. Proceedings,2015,141(1):. [46]Brunner, Grant. Java now pollutes your Mac with adware - here's how to uninstall it[J]. ,2015,:. [47]Bell, Jonathan,Melski, Eric,Dattatreya, Mohan,Kaiser, Gail E. Vroom: Faster Build Processes for Java[J]. IEEE Software,2015,32(2):. [48]Chaikalis, T,Chatzigeorgiou, A. Forecasting Java Software Evolution Trends Employing Network Models[J]. IEEE Transactions on Software Engineering,2015,41(6):. [49]Lu, Quan,Liu, Gao,Chen, Jing. Integrating PDF interface into Java application[J]. Library Hi Tech,2014,32(3):. [50]Rashid, Fahmida Y. Oracle fixes critical flaws in Database Server, MySQL, Java[J]. ,2015,:. [51]Rashid, Fahmida Y. Library misuse exposes leading Java platforms to attack[J]. ,2015,:. [52]Rashid, Fahmida Y. Serious bug in widely used Java app library patched[J]. ,2015,:. [53]Odeghero, P,Liu, C,McBurney, PW,McMillan, C. An Eye-Tracking Study of Java Programmers and Application to Source Code Summarization[J]. IEEE Transactions on Software Engineering,2015,41(11):. [54]Greene, Tim. Oracle settles FTC dispute over Java updates[J]. Network World (Online) [55]Rashid, Fahmida Y. FTC ruling against Oracle shows why it's time to dump Java[J]. ,2015,:. [56]Whitwam, Ryan. Google plans to remove Oracle's Java APIs from Android N[J]. ,2015,:. [57]Saher Manaseer,Warif Manasir,Mohammad Alshraideh,Nabil Abu Hashish,Omar Adwan. Automatic Test Data Generation for Java Card Applications Using Genetic Algorithm[J]. Journal of Software Engineering andApplications,2015,8(12):. [58]Paul Venezia. Prepare now for the death of Flash and Java plug-ins[J]. ,2016,:. [59]PW McBurney,C McMillan. Automatic Source Code Summarization of Context for Java Methods[J]. IEEE Transactions on Software Engineering,2016,42(2):. java英⽂参考⽂献三: [61]Serdar Yegulalp,Serdar Yegulalp. Sputnik automates code review for Java projects on GitHub[J].,2016,:. [62]Fahmida Y Rashid,Fahmida Y Rashid. Oracle security includes Java, MySQL, Oracle Database fixes[J]. ,2016,:. [63]H M Chavez,W Shen,R B France,B A Mechling. An Approach to Checking Consistency between UML Class Model and Its Java Implementation[J]. IEEE Transactions on Software Engineering,2016,42(4):. [64]Serdar Yegulalp,Serdar Yegulalp. Unikernel power comes to Java, Node.js, Go, and Python apps[J]. ,2016,:. [65]Yudi Zheng,Stephen Kell,Lubomír Bulej,Haiyang Sun. Comprehensive Multiplatform Dynamic Program Analysis for Java and Android[J]. IEEE Software,2016,33(4):. [66]Fahmida Y Rashid,Fahmida Y Rashid. Oracle's monster security fixes Java, database bugs[J]. ,2016,:. [67]Damian Wolf,Damian Wolf. The top 5 Java 8 features for developers[J]. ,2016,:. [68]Jifeng Xuan,Matias Martinez,Favio DeMarco,Maxime Clément,Sebastian Lamelas Marcote,Thomas Durieux,Daniel LeBerre. Nopol: Automatic Repair of Conditional Statement Bugs in Java Programs[J]. IEEE Transactions on Software Engineering,2017,43(1):. [69]Loo Kang Wee,Hwee Tiang Ning. Vernier caliper and micrometer computer models using Easy Java Simulation and its pedagogical design features-ideas for augmenting learning with real instruments[J]. Physics Education,2014,49(5):. [70]Loo Kang Wee,Tat Leong Lee,Charles Chew,Darren Wong,Samuel Tan. Understanding resonance graphs using Easy Java Simulations (EJS) and why we use EJS[J]. Physics Education,2015,50(2):.【java英⽂参考⽂献汇编】相关⽂章:1.2.3.4.5.6.7.8.。

英文授权委托书

英文授权委托书

英文授权委托书[Your Name][Your Address][City, State, Zip Code][Eml Address][Phone Number][Date]Letter of Authorization[Recipient's Name][Recipient's Address][City, State, Zip Code]Dear [Recipient's Name],Subject: Authorization for [Authorizee's Name] to Act on My BehalfI, [Your Name], residing at [Your Address], hereby authorize [Authorizee's Name], residing at [Authorizee's Address], to act on my behalf for the following matters:1. Financial Transactions:- [Specify the types of financial transactions the authorizee is allowed to carry out on your behalf,including but not limited to banking transactions, investment decisions, and tax-related matters.]2. Legal Matters:- [Specify the types of legal matters the authorizee is allowed to handle on your behalf, such as signing and executing legal documents, representing you in court, and engaging in legal negotiations.]3. Property Management:- [Specify the properties the authorizee is authorized to manage on your behalf, including rental agreements, property mntenance, and sale or purchase ofreal estate.]4. Health Care Decisions:- [Specify if the authorizee is authorized to make health care decisions on your behalf, including medical treatments, hospital admissions, and consent to medical procedures.]5. Personal Affrs:- [Specify any specific personal affrs the authorizee is authorized to handle on your behalf, such as managing social media accounts, handling correspondence, and attending events or meetings on your behalf.]Duration of Authorization:This authorization is valid from [Start Date] to [End Date], unless revoked by me in writing earlier. The authorizee shall have full power and authority to act on my behalf within the scope mentioned above during the stated period.Terms and Conditions:1. The authorizee shall exercise due diligence and act in my best interest while handling the authorized matters.2. The authorizee shall keep me informed of any actions taken on my behalf and provide periodic reports upon request.3. This authorization does not absolve me from anylegal or financial obligations or liabilities arising from the actions of the authorizee on my behalf.Termination of Authorization:I reserve the right to terminate this authorization at any time by providing a written notice to the authorizee. Upon termination, all powers conferred under this authorization shall cease immediately.I understand the implications of granting this authorization and confirm that I fully trust [Authorizee's Name] to act on my behalf according to the terms and conditions mentioned herein.Please find attached the following documents referred to in this letter:1. [List the attached documents]Legal Terms and Explanations:1. [Legal Term 1] – [Explanation]2. [Legal Term 2] – [Explanation]3. [Legal Term 3] – [Explanation][Provide explanations for any legal terms or phrases used in the document.]Should you require any further information or clarification, please do not hesitate to contact me at [Your Phone Number] or eml me at [Your Eml Address].Thank you for your attention to this matter.Yours sincerely,[Your Name]Enclosure(s): [List the attachments]Legal Terms and Explanations:1. [Legal Term 1] – [Explanation]2. [Legal Term 2] – [Explanation]3. [Legal Term 3] – [Explanation][Provide explanations for any legal terms or phrases used in the document.]。

agent based modeling建模 -回复

agent based modeling建模 -回复

agent based modeling建模-回复什么是Agent-Based Modeling(ABM)?Agent-Based Modeling(ABM)是一种基于代理的计算模型,用于模拟和分析自然、社会和经济系统。

在ABM中,系统被建模为由个体智能代理组成的网络。

这些个体代理基于一组规则和策略进行行动,并与其他个体代理进行互动。

通过观察多个个体代理的行为和互动,可以了解系统整体的行为和性质。

为什么使用ABM?ABM具有多种优势,使其成为分析和研究复杂系统的有效工具。

首先,ABM能够处理非线性和动态系统。

由于ABM模型中个体代理的行为和互动非常复杂,因此可以模拟和分析那些不适合传统数学建模方法的系统。

其次,ABM是一种强大的探索性工具,可以帮助我们理解系统内部的微观交互。

通过观察个体代理的行为和决策过程,我们能够深入了解系统的演变和变化。

此外,ABM还能够模拟不完全信息和不确定性的系统,并通过敏感性分析和模拟实验进行情景分析。

如何构建ABM?构建ABM通常包括以下步骤:1. 定义目标:首先,我们需要明确研究的目标和问题。

这将有助于我们创建一个合适的模型来回答这些问题。

2. 设计代理:下一步是设计个体代理的属性和行为。

代理可以是个人、组织、物体等。

我们需要确定哪些因素会影响代理的行为和决策。

这些属性可以包括位置、状态、能力等。

3. 规定规则:我们需要确定模型中个体代理的行动规则和策略。

这些规则可以是基于个体的目标、感知、学习等因素。

同时,我们还需要定义代理之间的互动方式,以及它们如何相应环境变化。

4. 构建模型:在这一步中,我们将具体的代理和规则转化为计算机程序。

这涉及到编程和建模工具的使用,例如NetLogo、Repast等。

通过编写代理的行为规则和系统演化规则,我们可以构建一个可以模拟系统行为的模型。

5. 进行模拟实验:模型构建完成后,我们将进行一系列模拟实验来观察系统的行为和性质。

这些实验可以通过调整模型参数、初始条件等来探索不同情景和假设。

布卢姆教育目标分类学

布卢姆教育目标分类学
2、原理与概括的知识(knowledge of principles
and generalizations)
这类知识是在大量的事实和事件集合的基础上,对类别和分类的内在过程与关系作出说明,对各种所观察的现象作出抽象和总结,十分有助于描述,预测,说明或确定最适宜的最相关的行动及其方向。
3、理论,模式与结构的知识(knowledge of theories,
(四)分析
(analyze)
分析是指将材料分解为其组成部分并且确定这些部分是如何相互关联的。这一过程包括了区分,组织和归属。虽然有时候也将分析作为独立的教育目标,但是往往更倾向于将它看成是对理解的扩展,或者是评价与创造的前奏。
1、区分(differentiating)
这是指学习者能够按照其恰当性或重要性来辨析某一整体结构中的各个部分。区分同比较之间是有所不同的。前者要求在整体的框架下看待部分,例如苹果和桔子被放在"水果"这一更大的认知结构中加以区分时,颜色和形状都是无关特征,只有"果核"是相关特征。比较则被要求关注苹果的所有三个特征。区分的替换说法可以是"辨别"(discriminating),"选择"(selecting),"区别"(distinguishing)和"聚焦"(focusing)。
5、评价
6、创造
A.事实性知识
B.概念性知识
C.程序性知识
D.元认知知识
3.1
(一)事实性知识
事实性知识(factual knowledge)是学习者在掌握某一学科或解决问题时必须知道的基本要素。
1、术语知识(knowledge of terminology)

殷保群教授个人简历范文

殷保群教授个人简历范文

以下是为⼤家整理的关于殷保群教授个⼈简历范⽂的⽂章,希望⼤家能够喜欢!殷保群,男,教授,博⼠⽣导师。

中国科学技术⼤学教授。

1962年2⽉⽣,1985年7⽉毕业于四川⼤学数学系基础数学专业,随后考⼊中国科学技术⼤学基础数学研究⽣班,1987年7⽉毕业,并留校任教。

1993年5⽉在中国科学技术⼤学数学系应⽤数学专业获得理学硕⼠学位,1998年12⽉在中国科学技术⼤学⾃动化系模式识别与智能系统专业获得⼯学博⼠学位,现在中国科学技术⼤学⾃动化系任教。

长期从事随机系统、系统优化以及信息络系统理论及其应⽤等⽅⾯的研究⼯作,⽬前感兴趣的主要⽅向为Markov决策过程、络建模与优化、络流量分析、媒体服务系统的接⼊控制以及云计算等。

在国内外主要学术刊物上发表学术论⽂100余篇,其中SCI收录10余篇,EI收录30余篇,出版学术专著1部。

曾于2004年4⽉⾄12⽉在⾹港科技⼤学做访问学者。

第xx届(2006年)何潘清漪优秀论⽂获奖者。

⽬前感兴趣的主要研究⽅向:1、离散事件动态系统; 2、Markov决策过程; 3、排队系统; 4、信息络论⽂著作主要著作殷保群,奚宏⽣,周亚平,排队系统性能分析与Markov控制过程,合肥:中国科学技术⼤学出版社,2004.期刊论⽂Yin, B. Q., Guo, D., Huang, J., Wu, X. M., Modeling and analysis for the P2P-based media delivery network, Mathematical and Computer Modelling (2011), doi:10.1016/j.mcm.2011.10.043. (SCI 收录, JCR II 区) Yin, B. Q., Lu, S., Guo, D., Analysis of Admission Control in P2P-Based Media Delivery Network Based on POMDP, International Journal of Innovative Computing, Information and Control, 2011, 7(7B): 4411-4422. (SCI收录, JCR II 区) Kang, Yu, Yin, Baoqun, Shang, Weike, Xi, Hongsheng, Performance sensitivity analysis and optimization for a class of countable semi-Markov decision processes, Proceedings of the World Congress on Intelligent Control and Automation (WCICA2011), June 21, 2011 - June 25, 2011, Taipei, Taiwan. (EI收录20113614311870) Li, Y. J., Yin, B. Q., Xi, H. S., Finding Optimal Memoryless Policies of POMDPs under the Expected Average Reward Criterion, European Journal of Operational Research, 2011, 211(2011): 556-567. (SCI 收录, JCR II 区) 江琦,奚宏⽣,殷保群,事件驱动的动态服务组合策略在线⾃适应优化,控制理论与应⽤,2011, 28(8): 1049-1055. (EI收录20114214431454) Jiang, Q., Xi, H. S., Yin, B. Q., Adaptive Optimization of Timeout Policy for Dynamic Power Management Based on Semi-Markov Control Processes, IET Control Theory and Applications, 2010, 4(10): 1945-1958. (SCI收录) Tang, L., Xi, H. S., Zhu, J., Yin, B. Q., Modeling and Optimization of M/G/1-Type Queueing Networks: An Efficient Sensitivity Analysis Approach, Mathematical Problems in Engineering, 2010, 2010: 1-20. (SCI收录) Shan Lu, Baoqun Yin, Dong Guo, Admission Control for P2P-Based Media Delivery Network, Proceedings of the 29th Chinese Control Conference, July 29-31, 2010, Beijing, China, 2010: 1494-1499. ( EI收录20105113504286) ⾦辉宇,康宇,殷保群,局部Lipschitz系统的采样控制,Proceedings of the 29th Chinese Control Conference, July 29-31, 2010, Beijing, China, 2010: 992-997. ( EI收录20105113504436) 江琦,奚宏⽣,殷保群,络新媒体服务系统事件驱动的动态服务组合,Proceedings of the 29th Chinese Control Conference, July 29-31, 2010, Beijing, China, 2010: 1121-1125. ( EI收录20105113504230) Dong Guo, Baoqun Yin, Shan Lu, Jing Huang, Jian Yang, A Novel Dynamic Model for Peer-to-Peer File Sharing Systems, ICCMS, 2010 Second International Conference on Computer Modeling and Simulation, 2010, 1: 418-422. ( EI收录20101812900175) Jing Huang, Baoqun Yin, Dong Guo, Shan Lu, Xumin Wu, An Evolution Model for P2P File-Sharing Networks, ICCMS, 2010 Second International Conference on Computer Modeling and Simulation, 2010, 2: 361-365. ( EI收录20101712882202) 巫旭敏,殷保群,黄静,郭东,流媒体服务系统中⼀种基于数据预取的缓存策略,电⼦与信息学报,2010,32(10): 2440-2445. (EI 收录20104513372577) 马军,郑烇,殷保群,基于CDN和P2P的分布式络存储系统,计算机应⽤与软件,2010,27(2):50-52. Bao, B. K., Xi, H. S., Yin, B. Q., Ling, Q., Two Time-Scale Gradient Approximation Algorithm for Adaptive Markov Reward Processes, International Journal of Innovative Computing, Information and Control, 2010, 6(2): 655-666. (SCI收录, JCR II 区) Jiang, Q., Xi, H. S., Yin, B. Q., Dynamic File Grouping for Load Balancing in Streaming Media Clustered Server Systems, International Journal of Control, Automation, and Systems, 2009, 7(4): 630-637. (SCI收录) 江琦,奚宏⽣,殷保群,动态电源管理超时策略与随机型策略的等效关系,计算机辅助设计与图形学学报,2009, 21(11): 1646-1651. (EI 收录20095012535449) 唐波,李衍杰,殷保群,连续时间部分可观Markov决策过程的策略梯度估计,控制理论与应⽤,2009,26(7):805-808. (EI 收录20093712302646) 芦珊,黄静,殷保群,基于POMDP的VOD接⼊控制建模与仿真,中国科学技术⼤学学报,2009,39(9):984-989. 李洪亮,殷保群,郑诠,⼀种基于负载均衡的数据部署算法,计算机仿真,2009,26(4):177-181. 鲍秉坤,殷保群,奚宏⽣,基于性能势的Markov控制过程双时间尺度仿真算法,系统仿真学报,2009,21(13):4114-4119. Jin Huiyu; Yin Baoqun; Ling Qiang; Kang Yu; Sampled-data Observer Design for Nonlinear Autonomous Systems, 2009 Chinese Control and Decision Conference, CCDC 2009, 2009: 1516-1520. ( EI收录20094712469527) ⾦辉宇,殷保群,⾮线性采样系统指数稳定的新条件,控制理论与应⽤,2009,26(8):821-826. (EI 收录20094512429319) Yin, B. Q., Li, Y. J., Zhou, Y. P., Xi, H. S., Performance Optimization of Semi-Markov Decision Processes with Discounted-Cost Criteria. European Journal of Control, 2008, 14(3): 213-222. (SCI收录) Li, Y. J., Yin, B. Q. and Xi, H. S., Partially Observable Markov Decision Processes and Performance Sensitivity Analysis. IEEE Trans. System, Man and cybernetics-Part B., 2008, 38(6): 1645-1651. (SCI收录, JCR II 区) Tang, B., Tan, X. B., Yin, B. Q. , Continuous-time hidden markov models in network simulation, 2008 IEEE International Symposium on Knowledge Acquisition and Modeling Workshop Proceedings, Wuhan, China, DEC 21-22, 2008: 667-670. (EI收录20092812179753) Bao, B. K., Yin, B. Q., Xi, H. S., Infinite-Horizon Policy-Gradient Estimation with Variable Discount Factor for Markov Decision Process. icicic,pp.584,2008 3rd International Conference on Innovative Computing Information and Control, 2008. ( EI收录************) Chenfeng Xu, Jian Yang, Hongsheng Xi, Qi Jiang, Baoqun Yin, Event-related optimization for a class of resource location with admission control, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on Neural Networks, 1-8 June 2008: 1092 – 1097. ( EI收录************)JinHuiyu;KangYu;YinBaoqun; Synchronization of nonlinear systems with stair-step signal, 2008. CCC 2008. 27th Chinese Control Conference,16-18 July 2008: 459 – 463. ( EI收录************)JiangQi;XiHongsheng;YinBaoqun;XuChenfeng;Anevent-drivendynamicload balancing strategy for streaming media clustered server systems, 2008. CCC 2008. 27th Chinese Control Conference, 16-18 July 2008: 678 – 682. ( EI收录************)⾦辉宇,殷保群,唐波,⾮线性采样观测器的误差分析,中国科学技术⼤学学报,2008, 38(10): 1226-1231. 黄静,殷保群,李俊,基于观测的POMDP优化算法及其仿真,信息与控制,2008, 37(3): 346-351. 马军,殷保群,基于POMDP模型的机器⼈⾏动的仿真优化,系统仿真学报,2008, 20(21): 5903-5906. (EI 收录************)江琦,奚宏⽣,殷保群,动态电源管理超时策略⾃适应优化算法,控制与决策,2008, 23(4): 372-377. (EI 收录************)徐陈锋,奚宏⽣,江琦,殷保群,⼀类分层⾮结构化P2P系统的随机切换模型,控制与决策,2008, 23(3): 263-266. (EI 收录************)徐陈锋,奚宏⽣,殷保群,⼀类混合资源定位服务的优化模型,微计算机应⽤,2008,29(9):6-11. 郭东,郑烇,殷保群,王嵩,基于P2P媒体内容分发络中分布式节点的设计与实现,电信科学,2008,24(8): 45-49. Tang, H., Yin, B. Q., Xi, H. S., Error bounds of optimization algorithms for semi-Markov decision processes. International Journal of Systems Science, 2007, 38(9): 725-736. (SCI收录) 徐陈锋,奚宏⽣,江琦,殷保群,⼀类分层⾮结构化P2P系统的随机优化,系统科学与数学,2007, 27(3): 412-421. 蒋兆春,殷保群,李俊,基于耦合技术计算Markov链性能势的仿真算法,系统仿真学报,2007, 19(15): 3398-3401. (EI收录************)庞训磊,殷保群,奚宏⽣,⼀种使⽤TCP/ IP 协议实现⽆线传感器络互连的新型设计,传感技术学报,2007, 20(6): 1386-1390. Niu, L. M., Tan, X. B., Yin, B. Q. , Estimation of system power consumption on mobile computing devices, 2007. International Conference on Computational Intelligence and Security, Harbin, China, DEC 15-19, 2007: 1058-1061. (EI收录************)Jiang,Q.,Xi, H. S., Yin, B. Q., Dynamic file grouping for load balancing in streaming media clustered server systems. Proceedings of the 2007 International Conference on Information Acquisition, ICIA, Jeju City, South Korea, 2007:498-503. (EI收录************)徐陈锋, 奚宏⽣, 江琦, 殷保群,⼀类分层⾮结构化P2P系统的随机优化,第2xx届中国控制会议论⽂集,2007: 693-696. (EI收录************)Jiang,Q.,Xi,H.S.,Yin,B.Q.,OptimizationofSemi-MarkovSwitchingState-spaceControl Processes for Network Communication Systems. 第2xx届中国控制会议论⽂集,2007: 707-711. (EI收录************) Jiang, Q., Xi, H. S., Yin, B. Q., Adaptive Optimization of Time-out Policy for Dynamic Power Management Based on SMCP. Proc. of the 2007 IEEE Multi-conference on Systems and Control, Singapore, 2007: 319-324. (EI收录************)Jin,H. Y., Yin, B. Q., New Consistency Condition for Exponential Stabilization of Smapled-Data Nonlinear Systems. 第2xx届中国控制会议论⽂集,2007: 84-87. (EI收录************)江琦,奚宏⽣,殷保群,⽆线多媒体通信适应带宽配置在线优化算法,软件学报, 2007, 18(6): 1491-1500. (EI收录************)Ou,Q.,Jin,Y.D.,Zhou,T.,Wang,B.H.,Yin,B.Q.,Power-law strength-degree correlation from resource-allocation dynamics on weighted networks, Physical Review E, 2007, 75(2): 021102 (SCI收录) Yin, B. Q., Dai, G. P., Li, Y. J., Xi, H. S., Sensitivity analysis and estimates of the performance for M/G/1 queueing systems, Performance Evaluation, 2007, 64(4): 347-356. (SCI收录) 江琦,奚宏⽣,殷保群,动态电源管理的随机切换模型与在线优化,⾃动化学报,2007, 33(1): 66-71. (EI收录************)Zhang,D.L.,Yin,B.Q.,Xi,H.S.,Astate aggregation approach to singularly perturbed Markov reward processes. International Journal of Intelligent Technology, 2006, 2(4): 230-239. 欧晴,殷保群,奚宏⽣,基于动态平衡流的络赋权,中国科学技术⼤学学报,2006, 36(11): 1196-1201.殷保群,李衍杰,周亚平,奚宏⽣,可数半Markov控制过程折扣代价性能优化,控制与决策,2006, 21(8): 933-936. (EI收录************)江琦,奚宏⽣,殷保群,动态电源管理的随机切换模型与策略优化,计算机辅助设计与图形学学报,2006, 18(5): 680-686. (EI收录***********)代桂平,殷保群,李衍杰,奚宏⽣,半Markov控制过程基于性能势仿真的并⾏优化算法,中国科学技术⼤学学报,2006, 36(2): 183-186. 殷保群,李衍杰,唐昊,代桂平,奚宏⽣,半Markov决策过程折扣模型与平均模型之间的关系,控制理论与应⽤,2006, 23(1): 65-68. (EI收录***********)江琦,奚宏⽣,殷保群,半Markov控制过程在线⾃适应优化算法,第2xx届中国控制会议论⽂集,2006: 1066-1071. (ISTP收录BFQ63) Dai, G. P., Yin, B. Q., Li, Y. J., Xi, H. S., Performance Optimization Algorithms based on potential for Semi-Markov Control Processes. International Journal of Control, 2005, 78(11): 801-812. (SCI收录) Zhang, D. L., Xi, H. S., Yin, B. Q., Simulation-based optimization of singularly perturbed Markov reward processes with states aggregation. Lecture Notes in Computer Science, 2005, 3645: 129-138. (SCI 收录) Tang, H., Xi, H. S., Yin, B. Q., The optimal robust control policy for uncertain semi-Markov control processes. International Journal of System Science, 2005, 36(13): 791-800. (SCI收录) 张虎,殷保群,代桂平,奚宏⽣,G/M/1排队系统的性能灵敏度分析与仿真,系统仿真学报,2005, 17(5): 1084-1086. (EI收录***********)陈波,周亚平,殷保群,奚宏⽣,隐马⽒模型中的标量估计,系统⼯程与电⼦技术,2005, 27(6): 1083-1086. (EI收录***********)代桂平,殷保群,李衍杰,周亚平,奚宏⽣,半Markov控制过程在平均准则下的优化算法,中国科学技术⼤学学报,2005, 35(2): 202-207. 殷保群,李衍杰,奚宏⽣,周亚平,⼀类可数Markov控制过程的平稳策略,控制理论与应⽤,2005, 22(1): 43-46. (EI收录***********)Li,Y.J.,Yin,B.Q.,Xi,H.S.,Thepolicygradientestimationofcontinuous-timeHiddenMarkovDecision Processes. Proc. of IEEE ICIA, Hong Kong, 2005. (EI收录************)Sensitivity analysis and estimates of the performance for M/G/1 queueing systems, To Appear in Performance Evaluation, 2006.Performance optimization algorithms based on potential for semi-Markov control processes. International Journal of Control, Vol.78, No.11, 2005.The optimal robust control policy for uncertain semi-Markov control processes. International Journal of System Science, Vol.36, No.13, 2005.A state aggregation approach to singularly perturbed Markov reward processes. International Journal of Intelligent Technology, Vol.2, No.4, 2005.Simulation optimization algorithms for CTMDP based on randomized stationary policies, Acta Automatics Sinica, Vol. 30, No. 2, 2004.Performance optimization of continuous-time Markov control processes based on performance potentials, International Journal of System Science, Vol.34, No.1, 2003.Optimal Policies for a Continuous Time MCP with Compact Action set, Acta Automatics Sinica, Vol. 29, No. 2, 2003. Relations between Performance Potential and Infinitesimal Realization Factor in Closed Queueing Networks, Appl. Math. J. Chinese Univ. Ser. B, Vol. 17, No. 4, 2002.Sensitivity Analysis of Performance in Queueing Systems with Phase-Type Service Distribution, OR Transactions, Vol.4, No.4, 2000.Sensitivity Formulas of Performance in Two-Server Cyclic Queueing Networks with Phase-Type Distributed Service Times, International Transaction in Operational Research, Vol.6, No.6, 1999.Simulation-based optimization of singularly perturbed Markov reward processes with states aggregation. Lecture Notes in Computer Science, 2005.Markov decision problems with unbounded transition rates under discounted-cost performance criteria. Proceedings of WCICA, Vol.1, Hangzhou, China, 2004.排队系统性能分析与Markov控制过程,合肥:中国科学技术⼤学出版社,2004.可数半Markov控制过程折扣代价性能优化. 控制与决策,Vol.21, No.8, 2006.动态电源管理的随机切换模型与策略优化. 计算机辅助设计与图形学学报,Vol.18, No.5, 2006.半Markov决策过程折扣模型与平均模型之间的关系.控制理论与应⽤,Vol.23, No.1, 2006.⼀类可数Markov控制过程的平稳策略. 控制理论与应⽤,Vol.22, No.1, 2005.G/M/1排队系统的性能灵敏度分析与仿真.系统仿真学报,Vol.17, No.5, 2005.M/G/1排队系统的性能优化与算法,系统仿真学报,Vol.16, No.8, 2004.半Markov过程基于性能势的灵敏度分析和性能优化. 控制理论与应⽤,Vol.21, No.6, 2004.半Markov控制过程在折扣代价准则下的平稳策略. 控制与决策,Vol.19, No.6, 2004.Markov控制过程在紧致⾏动集上的迭代优化算法. 控制与决策,Vol.18, No.3, 2003.闭Jackson络的优化中减少仿真次数的算法研究,系统仿真学报,Vol.15, No.3, 2003.M/G/1排队系统的性能灵敏度估计与仿真,系统仿真学报,Vol.15, No.7, 2003.Markov控制过程基于性能势仿真的并⾏优化,系统仿真学报,Vol.15, No.11, 2003.Markov控制过程基于性能势的平均代价策略. ⾃动化学报,Vol.28, No.6, 2002.⼀类受控闭排队络基于性能势的性⽅程.控制理论与应⽤,Vol.19, No.4, 2002.Markov控制过程基于单个样本轨道的在线优化算法.控制理论与应⽤,Vol.19, No.6, 2002.闭排队络当性能函数与参数相关时的性能灵敏度分析,控制理论与应⽤,Vol.19, No.2, 2002.M/G/1 排队系统的性能灵敏度分析,⾼校应⽤数学学报,Vol.16, No.3, 2001.连续时间Markov决策过程在呼叫接⼊控制中的应⽤,控制与决策,Vol.19, 2001.具有不确定噪声的连续时间⼴义系统确保估计性能的鲁棒Kalman滤波器,控制理论与应⽤,Vol.18, No.5, 2001.状态相关闭排队络中的性能指标灵敏度公式,控制理论与应⽤,Vol.16, No.2, 1999.科研项⽬半Markov控制过程基于性能势的优化理论和并⾏算法,2003.1-2005.12,国家⾃然科学基⾦,60274012隐Markov过程的性能灵敏度分析与优化,2006.1-2008.12,国家⾃然科学基⾦, 60574065部分可观Markov系统的性能优化,2005.1-2006.12,安徽省⾃然科学基⾦, 050420301宽带信息运营⽀撑环境及接⼊系统的研制――⼦课题: 流媒体服务器研究及实现, 2005.1-2006.12, 国家863计划,2005AA103320离散复杂系统的控制与优化研究,2006.9-2008.8,中国科学院⾃动化研究所中国科学技术⼤学智能科学与技术联合实验室⾃主研究课题基⾦络新媒体服务系统的建模及其动⼒学⾏为分析研究,2012.01-2015.12,国家⾃然科学基⾦;⾯向服务任务的快速机器视觉与智能伺服控制,2010.01-2013.12,国家⾃然科学基⾦重点项⽬;新⼀代业务运⾏管控协同⽀撑环境的开发,2008.07-2011.06,国家863计划;多点协作的流媒体服务器集群系统及其性能优化,2006.12-2008.12,国家863计划;获奖情况第xx届何潘清漪优秀论⽂奖联系信息办公室地址:电⼆楼223 实验室地址:电⼆楼227 办公室电话:************。

agent-based

agent-based

M-UML:an extension to UML for the modeling of mobileagent-based software systemsKassem Saleh *,Christo El-MorrDepartment of Computer Science,American University of Sharjah,P.O.Box 26666,Sharjah,United Arab EmiratesReceived 30December 2002;revised 29June 2003;accepted 22July 2003AbstractThe Unified Modeling Language (UML)is a language for the specification,visualization,and documentation of object-oriented software systems [The Unified Modeling Language User Guide,1998].However,UML cannot describe in an explicit manner the mobility requirements needed for modeling mobile agent-based software systems.In this paper,we present M-UML,our proposed extension to UML covering all aspects of mobility at the various views and diagrams of UML.The use of M-UML is illustrated using a simple mobile voting system example.q 2003Elsevier B.V.All rights reserved.Keywords:Language extension;Mobile agents;Mobility requirements;Unified Modeling Language1.IntroductionThe agent mobility paradigm became feasible due to the advances in process migration,remote evaluation,distrib-uted object computing and mobility [2].Mobile agents are mobile objects or programs that carry executable code and data within themselves.They have several features that help them achieving their goals or business functions such as negotiating,and ordering.Intelligent agents deal with new situations for automatic problem solving and learn from past experience.They present several advantages since they are persistent and continuously running.They also reduce traffic on the network significantly since computation,encoded in the mobile agent,is brought to data rather than data to computation.In fact,there are very clear and obvious benefits of mobile agents such as offloading the network communi-cations links,freeing local computing resources,and achieving fault-tolerance by migrating to different network nodes.However,to achieve mobility,there were many important problems to address,such as,among other things,trusting agent software,trusting remote software andenvironment,the degree of autonomy we give them,fault-tolerance vis-a `-vis node failures,agent failures or com-munication failures.In electronic business,the use of modeling tools to describe business processes has a decisive impact on the success of the business implementation.Furthermore,mobile agents are very useful for performing electronic business functionalities [3]making the need for mobile agents modeling tool,like UML,crucial and highly beneficial.Studies on the use of UML in the modeling of mobile agents are rare and limited in extent.Klein et al.[4]proposed an extension to UML for mobile agents.However,their approach is limited to a specific agent platform and to specific class of mobile agent applications.Moreover,they do not provide mobility description for all views and aspects of systems,hence not covering all UML diagrams.Bauer et al.[5]introduce Agent UML for specifying multiagent interactions.In Agent UML,a new diagram type called protocol interaction diagram is developed.However,this agent-based extension did not include aspects of mobility.Also,Baumeister et al.[6]introduce an extension to the Activity Diagram (ACD)to model mobile systems.Their extension includes the introduction of two variants of ACDs for modeling mobility:a responsibility-centered variant that focuses on the actor performing the action,and a location-centered variant that focuses on the topology of locations at0950-5849/$-see front matter q 2003Elsevier B.V.All rights reserved.doi:10.1016/j.infsof.2003.07.004*Corresponding author.Tel.:þ971-6585555;fax:þ971-65858581.E-mail address:ksaleh@aus.ac.ae (K.Saleh).which actions are taking place.In this paper,we present a complete extension of UML1.4standard(M-UML)to deal with all UML diagrams:Use Case,Class,Object,Statechart, Sequence,Collaboration,Activity,Component,and Deployment diagrams.We also use this model to specify a mobile electronic voting system as an example.In this work,we do not describe a methodology for using our proposed extension,however,we only provide a simple example for illustrative purposes.The development of such methodology is the subject of our future research.The rest of the paper is organized as follows.Section2 provides some preliminary background on the Unified Modeling Language(UML),and on mobile software agents and their applications.In Section3,we introduce the Modified UML and we illustrate its use to model a simple mobile agent application.In Section4,we conclude and outline our future work.2.BackgroundIn this section,we provide some background information on the Unified Modeling Language(UML1.4)standardized by the Object Management Group(OMG),and mobile software agents and their applications in various domains.2.1.UML in briefThe UML is a de facto software industry standard modeling language for visualizing,specifying,constructing, and documenting the elements of systems in general,and software systems in particular[1].UML has a well-defined syntax and semantics.It provides a rich set of graphical artifacts to help in the elicitation and top–down refinement of object-oriented software systems from requirements capture to the deployment of software components.In UML,systems can be modeled by considering three aspects,namely,the behavioral,structural and architectural aspects.Each aspect is concerned with both the static and dynamic views of the system.The static view represents a projection onto the static structures of the complete system description.However,the dynamic view represents a projection onto the dynamical behavior of the system. Finally,views are communicated using a number of diagrams containing information emphasizing a particular aspect of the system.In the following,we describe the various aspects,views and diagrams,and their relationships.2.1.1.AspectsThree aspects of systems can be recognized,namely,the behavioral,structural and architectural aspects.The beha-vioral aspects involve the functionalities provided by the system(static behavioral aspects)and their associated interactions,their timings and their orderings(dynamic behavioral aspects).The structural aspects involve the class structures of the object-oriented software and their interrelationships(static structural aspects),and the algo-rithmic details of objects life cycles and their interactions (dynamic structural aspects).Finally,the architectural aspects are related to the deployment and distribution of software and hardware across the various distributed system components.2.1.2.ViewsAspects of systems are covered by various static and/or dynamic views,namely,the use case,design,process, implementation and deployment views.The Use Case view focuses on the behavioral aspects of a system.Primarily,it reflects the user’s concerns and requirements.This view considers the system as a ually,users,testers and requirements analysts are interested in this view.The Design and Process Views are the concern of the development team including the analysts,designers and implementors.They describe both the static and dynamic structural aspects of the system.The Design View is concerned with objects,classes and collaborations,while the Process View is concerned with software architecture issues such as concurrency,multithreading,synchroniza-tion,performance and scalability issues.The Implementation View describes thefiles and components needed to assemble and release the system.Finally,the Deployment View describes the ways to distribute,deliver and install the system components and files across the distributed nodes of the system.2.1.3.DiagramsA diagram contains model elements such as classes, objects,nodes,components,and relationships,described by graphical symbols.Moreover,a diagram can be used to describe certain system aspects at different levels of abstraction.For example,a state diagram can describe system-level input/output interactions,and can also be used to show state changes of a particular system object across multiple use cases.The nine diagrams in the UML are briefly described below.(1)Use Case Diagram(UCD):This diagram describes the functions of a system and its users.It shows a number of external actors and their connection to the use cases representing the services provided by the e cases can be inherited by another use case,allowing reusability of use cases.Also,use cases can be associated using‘use’relationship,allowing the modularization of use cases.Similarly,use cases can be associated with the ‘extend’relationship to deal with certain exceptional or abnormal conditions or situations.This diagram is used to model the static behavioral aspects of the use case view of the system to model.(2)Class Diagram(CLD):This diagram shows the static structure of classes and their possible relationships(i.e. association,inheritance,aggregation and dependency)inK.Saleh,C.El-Morr/Information and Software Technology46(2004)219–227 220the system.This diagram is used to model the static structural aspects of the Design and Process Views of the system to model.(3)Object Diagram(OBD):This diagram is a variant of a CLD and uses almost identical notation.An OBD can be an example of a CLD that shows possible instantiations of classes during system execution.This diagram is used to model the static structural aspects of the Design and Process Views of the system to model.(4)Statechart Diagram(STD):This diagram describes the possible behavior of an object using state changes.It can also be used as a system level diagram showing system state changes during the operation of the system.Therefore,this diagram can be used to model both the dynamic behavioral aspects of the use case view,and the dynamic structural aspects of the Design and Process Views of the system tomodel.(5)Sequence Diagram(SQD):This diagram shows the interactions between number of objects and their time ordering.In other words,this diagram describes a scenario involving various interacting objects.This diagram can be used to model the dynamic behavioral aspects of the use case view if the interacting objects are interface objects or actors.However,if the interacting objects are internal ones, this diagram would be then used to model the dynamic structural aspects of the design view of the system to model.(6)Collaboration Diagram(COD):This diagram shows the objects and the messages they exchange.Messages are numbered to provide a time ordering of the message.Similar to SQDs,a COD can be used to model both the dynamic behavioral aspect of the use case view,in addition to the dynamic structural aspect of the process view of the system to model.It is worthwhile to mention here that one can easily produce a SQD from the COD and vice versa.Both sequence and CODs are also referred to as interaction diagrams.(7)Activity Diagram(ACD):This diagram shows a sequential or concurrentflow from activity to another activity.An ACD consists of action states,activity states and transitions between them,and usually spans more than one use case(or functionality).This diagram uses symbols from petri nets,flowcharts andfinite state machines.Similar to interaction diagrams,an ACD can be used to model both the dynamic behavioral aspect of the use case view,in addition to the dynamic structural aspect of the design view of the system to model.(8)Component Diagram(CPD):This diagram shows the physical structure of the code in terms of code component.A component can be a source code,a binary,or executable component.A component contains information about the logical class or classes it implements,thus creating a mapping from the Design View to the Component View.A component diagram is used to model the static architectural aspects of the implementation view of the system to model.(9)Deployment Diagram(DPD):This diagram shows the physical architecture and distribution of the hardware and software components in the system.A DPD is used to model the static architectural aspects of the deployment view of the system to model.Table1summarizes the aspects,views and their supporting diagrams in UML.For a complete tutorial on UML the reader can refer to Refs.[1,7].2.2.Mobile software agentsSoftware agents and their use in various application areas such as electronic commerce have been studied extensively in the literature[8–10].These agents are personalized, continuously running and semi-autonomous programs to which people or other programs may delegate a task automating part of a business process of varying complex-ities and application domains.Mobile agents possess many characteristics,for example they are autonomous since they can chart their working plans and decide when to leave a given computer and where to go next.They are also persistent or temporarily continuous since their lifetime may extend beyond that of their creator.Intelligent agents are adaptive and able to learn from their past experiences,i.e.from the user demands, choices and tastes.In addition they areflexible,as the user can personalize them to meet his/her own criteria and preferences,therefore their working plans(behaviors and actions)are not scripted(i.e.hardcoded).Also,agents are reactive,in fact they respond in a timely fashion to new conditions,incoming requests or changes in their environ-ment.In addition to being reactive,they are active/proac-tive;they have a mission to accomplish and are task-oriented.Finally they are mobile;they are able to move from one node to another on a network until they fulfill their prescribed mission.Such agents are used in electronic commerce where they play different functions;for instance shopping agents do price comparison between shopping portals,while other agents learn examines consumer behavior and deliver personalized services accordingly,some auction sites use intelligent agents,and some other agents were proposed to Table1Aspects,views and supporting diagrams in UMLAspects/views Static view Dynamic viewBehavioral(functional)aspects:Use Case ViewUse CaseDiagramsSequence Diagrams,Collaboration Diagrams,Statechart Diagrams,Activity Diagrams Structural(design)aspects:Designand Process ViewsClass Diagrams,Object DiagramsSequence Diagrams,Collaboration Diagrams,Statechart Diagrams,Activity Diagrams Architectural aspects:ImplementationView,Deployment ViewComponentDiagrams,DeploymentDiagramsK.Saleh,C.El-Morr/Information and Software Technology46(2004)219–227221assist in bartering[11].In fact,intelligent agents help in the different purchasing decisions in electronic commerce[3,9]: need identification,product brokering,merchant brokering, negotiation,purchase and delivery,and product/service evaluation.In addition,mobile agents are used in network management,load balancing,among other distributed systems applications.The growing use of mobile agents necessitated the introduction of tools for modeling and developing mobile agent applications.Mobility is considered one of the important and advanced elements of the object model,such as the one existing in the Java programming language[12,13].3.Mobile UML by exampleIn this section,we describe the extensions made in each of the UML diagrams to allow the explicit representation of the mobility aspect.Wefirst introduce informally our mobile system we want to model.Then we introduce our modifications to the UML.3.1.Example:a mobile voting systemA mobile voting system(MVS)consists of three interacting agents,the Vote Collector(VC),the Vote Manager(VM)and the Voters.The VC is a mobile agent mandated by a stationary VM agent to collect votes from stationary voting agents(VOs).The system can be expanded to have more VMs and more VCs dealing with one VM. First,VOs have to register themselves with their assigned VM and should instantiate their stationary agent with their voting choice after receiving the list of candidates from the VM.On election time,the VCs will contact their respective VMs to get a list of voters.Each VC will then log this list with a stationary logger agent and then visit the VOs on their list to get their votes.Once done,the VCs will return back to their base station reporting to the VM the results of the vote.For simplicity,we are not dealing here with reliability and security issues.For a reference on issues of security in mobile agent systems,the reader can refer to Ref.[10].Parts of the MVS is specified in the following section to illustrate the use of M-UML.3.2.M-UMLIn this section,we describe M-UML by going through each of the UML diagrams and explaining the modifications and extensions needed to describe the mobility aspects of the example voting system to model;Table2summarizes mobility extensions proposed in this section.e Case DiagramA UCD encapsulates actors and use cases.Actors are external entities interacting with the system to model Table2Summary of M-UML Diagrams(a)K.Saleh,C.El-Morr/Information and Software Technology46(2004)219–227 222through use cases.An actor can be a software agent interacting with the system.A mobile actor is a mobile software agent that may interact with the system while at a platform away from the one at which the agent was created (i.e.the base platform).The functionality of a system or subsystem to model is described by a group of use cases.A Use Case represents a functional requirement that may involve one or more interacting actors.A mobile Use Case represents a functional requirement that involves one or more mobile actors.Therefore,at least one mobile actor is involved in a mobile use case.A mobile agent-based software system contains both mobile and non-mobile use cases.Fig.1shows a UCD of the MVS containing one mobile actor and three mobile use cases.In thisfigure,we have a mobile actor Vote Collector and a non-mobile actor Voting Manager both interacting through the mobile use case GetVotersList.Similarly,the VC is interacting with the VO through the mobile use case GetVote.Also,the VC is interacting with the Logger through the mobile use case LogList.3.2.2.Statechart DiagramAn STD is a UML diagram that consists of states and transitions linking pairs of states.Normally,an STD describes the behavior of an actor in terms of state change. An actor or object can be in a particular state at a given time.A mobile state is a state reachable while the actor or object is away from its base platform.A mobile state carries a box (M).A unidirectional link emanating from one state,the source state,and reaching another state,the sink state,is called a transition.A mobile transition is a transition linking two states that are reachable by an agent while at two different platforms.Therefore,we may have a non-mobile transition linking two mobile states,a mobile transition linking a mobile state to a non-mobile state or vice versa, and a mobile transition linking two mobile states.Mobile transitions carry a box(M).However,if an agent can reach a state while it is either at its base or away,that state will carry a dashed box(M).Similarly,if a mobile agent reaches a state while interacting remotely with another agent,the transition will carry box(R).Finally,a transition is labeled with the stereotype p agentreturn q if it corresponds to the return of the agent to its base while changing its state.Fig.2shows a STD containing both types of states and transitions in different combinations.Thefigure shows a part of the state behavior of the VC mobile agent/actor.At its base platform,the agent receives the message StartVo-tingProcess and moves from the state ReadyToMove(RTM) to the state VotingManagerReached(VMR),at which the agent is already at a different platform.At VMR,the agent sends a remote Log message to the Logger and then sends a GetVotersList message to the VM and moves to the WaitForList(WFL)state.Both VMR and WFM states are mobile states,and the transition from RTM to VMR states is a mobile transition.At WFL,the VC receives from VM the message VotersList and moves to the platform of thefirst Fig.2.Statechart Diagram of the VC.K.Saleh,C.El-Morr/Information and Software Technology46(2004)219–227223VO on the voters list while,changing its state to WaitForVote(WFV).3.2.3.Sequence DiagramAn SQD is one kind of interaction diagrams that shows the interactions among agents while time progresses.Time is represented by a vertical timeline for each agent.An interaction is represented by an arrow starting from the initiating agent directed to the receiving agent.If the initiating agent is interacting while not at its base platform, the timeline from the time this interaction occurs to the timethe agent returns to its platform will befilled with‘M’.An interaction emanating from that agent’s timeline is called a mobile interaction.A mobile interaction that implies two agents located on the same platform is labeled with the stereotype p localized q.However,a mobile interaction that implies a mobile agent and the two interacting agents are not located on the same platform will hold a box(R)at the intersection between the timeline of the initiating agent’s platform and the interaction.A dashed line on the SQD is used to trace the source platform of a mobile agent initiating either a localized or remote interaction.This means that mobile interactions need not be co-located(i.e. labeled with p localized q).For example,a mobile agent may move to a remote platform and starts to interact with other remote agents.Finally,the return of the agent to its base is represented by a directed arrow stereotyped with p agentreturn q.Fig.3shows a SQD involving mobile and both p localized q and remote interactions.The VC sends a local message GetVotersList to the VM.Once VC received the voters list,it sends a remote log message to a remote logger agent.Then the VC moves from the VM platform to a Voter(VO)agent platform on its voters list.The mobile VC sends a local message GetVote and moves on to the next voter after receiving the vote.Finally,after getting the vote from the last VO agent,VC returns to its base platform.3.2.4.Collaboration DiagramA COD is one kind of interaction diagrams that shows the behavior of interacting objects using a sequence of exchanged messages.The static relationship among objectsis well defined.Therefore,a COD shows both structural andbehavioral properties of inter-object interactions.A CODcontains objects(or class instances)and lines connectingpairs of interacting objects or agents.Each interaction islabeled by the message sequence number,the messageidentifier,and an arrow indicating the direction of themessage.Functionally,both collaboration and SQDs areequivalent.Consequently,given a SQD,we can derive theequivalent COD and vice versa.If a mobile objectparticipates in the interaction,a box(M)will be added tothe object.If the interaction is occurring at the sameplatform,the interaction line will carry the stereotypep localized q.However,if the interaction involves two remote agents while one or both are away fromtheir base platform,the interaction line will carry thebox(R).A self-loop interaction line carrying the stereotypep agentreturn q at a mobile object represents the return of the mobile object to its originating platform in the particular order given by the sequence number attached also to the interaction.Fig.4shows a COD involving mobile agents,both inremote and localized interactions.Thefirst and secondinteractions are localized interactions.The third interactionin the diagram shows that at VM’s platform,the VC,amobile object,is remotely interacting with the logger.ThisCOD is equivalent to the SQD in Fig.3.The fourthinteraction shows the VC moving to VO’s platform tointeract locally with a voter VO.Finally,thefifth interactionshows the VC returning to its originating platform.3.2.5.Activity DiagramAn ACD shows the controlflow between actions orcomplex actions called activities.It is basically a blend offinite state machines/statecharts and petri nets syntax andsemantics.However,unlike a statechart,the states repre-senting the activities in an ACD may normally span morethan one object/agent.An ACD is able to model both thesequential and parallelflow among actions and activitiesinvolved in the modeling of a use case.Moreover,an actionis a basic atomic computational step,unlike an activitywhich can be further described by another ACD hencecreating a hierarchy of ACDs.Swimlanes can also be usedto show the agent involved in performing the actionorFig.4.Collaboration Diagram.K.Saleh,C.El-Morr/Information and Software Technology46(2004)219–227224activity.A mobile action or activity involves at least one mobile agent executing at a different platform than its originating platform.A mobile use case involves one or more mobile actions or activities.If the action/activity is executed by an agent outside its originating platform,then this mobile action/activity is represented by an oval with a box (M)attached to its top left corner.Also,if the action is triggered (requested)by a mobile agent,this mobile action will carry a dashed box (M).However,if this mobile action/activity interacts with a remote agent,it will carry the box (R)instead.The return of an agent to its originating platform is represented by a mobile action stereotyped with p agentreturn q .Finally,to explicitly specify the location at which a mobile or remote action performed by a mobile agent is occurring,the action is stereotyped with p location ¼agent q .For example,both the remote action RequestLogList and the mobile action RequestList carry the stereotype p location ¼Manager q .In sum-mary,the diagram will show,in addition to the sequencing of actions/activities,the relative placement of the agents while performing those actions/activities.This extension to the ACD blends both the location-centered and the responsibility-centered extensions proposed in Ref.[6].Fig.5shows the ACD involving mobile actions/activities that are partially or completely performed by mobile agents.For example,The RequestList activity is occurring at VM’s platform and is mobile since it involves one mobile agent (the VC).Similarly,the activity CollectVotes occurring at VO’s platform is also a mobile activity.The LogListRequest activity is a remote activity since it is occurring at the VM’s platform after the VM processes VC’s request.Finally,the activity ProvideVotersList is also a mobile activity since it involves the mobile VC agent who is receiving the voters list and will carry a dashed (M). 3.2.6.Class DiagramA CLD shows the static structure of the system’s software classes and describes all relationships among those classes,including the association,aggregation and generalization relationships.A mobile class is a class from which mobile objects/agents are created.A class inheriting from a mobile class inherits its mobility feature.Classes that are part of another mobile class (in aggregation relationship)are not necessarily mobile classes.Similarly,classes associated with a mobile class are not necessarily mobile classes themselves.Classes from which mobile objects are instantiated are shown with a box (M)at the top left.However,other classes that contain behavior (methods)that is affected (communicating with)by mobile objects are shown with a dashed box (M).Moreover,a class containing behavior affected by a remote mobile agent is shown with a dashed box (R).Therefore,methods invoked by a mobile agent are labeled with either (M)or (R),depending on the location of the calling mobile agent.If a class contains methods of both types,it will carry both dashed boxes (M)and (R).Fig.6shows a CLD involving mobile and non-mobile classes.In this figure,class VM includes the method GetVotersList ðÞwhich is invoked by the mobile agent of class VC,and an object instantiated from VM is not a mobile object.This is also the same for the VO,which instances are not mobile.The class hierarchy shows the association relationships between VO,VC and the VM objects.Finally,the Logger class is associated with the VC class and carries a dashed box (R)since it contains the method logList ðÞinvoked remotely by a mobile object of class VC.This occurs by default when displaying the complete class hierarchy,showing non-mobile classes associated with mobile classes.3.2.7.Object DiagramAn OBD shows objects and links among them.An OBD is derived from a CLD and is based on the static structure of the model,but also shows multiple instances of some objects as illustrations or scenarios of the association relationships Objects made from a mobile class are mobile objects.Those mobile objects a considered themobileFig.5.ActivityDiagram.。

授权委托书(PowerofAttorney)中英文

授权委托书(PowerofAttorney)中英文

授权委托书(PowerofAttorney)中英文授权委托书(Power of Attorney)中英文模板授权委托书本人李成效(姓名)系河南省路桥建设集团有限公司(投标人名称)的法定代表人,现委托杨玫(姓名)为我方代理人。

代理人根据授权,以我方名义签署、澄清、说明、补正、递交、撤回、修改前锋农场至嫩江公路伊春至嫩江段建设项目伊春至北安段土建工程及北安至五大连池景区段桥梁工程(项目名称)A1、A5标段施工投标文件、签订合同和处理有关事宜,其法律后果由我方承担。

委托期限:自投标人提交投标文件截止日期起计算90天代理人无转委托权。

附:法定代表人身份证明投标人:河南省路桥建设集团有限公司法定代表人:职务:总经理、董事长身份证号码:412301************委托代理人:杨玫职务:经营部职员身份证号码:******************2015年12月15日Power of AttorneyI, (name), am the legal representative of Henan Road & Bridge Construction Group Co., Ltd. (the bidder name), hereby appoint Yang Mei (name) as our agent. The agent is granted to sign, clarify, explain, supplement, submit, withdraw and amend the bidding documents sections (project name). The agent is also responsible for signing the contract and dealing with relevant matters in the name of our party, and we shall bear the legal consequences.Commission Period: 90 days from the expiration date for thebidding documents submitted by the bidderWe don’t authorize our agent to appoint a sub-agent with the said power to act on our behalf.Attachment: Certificate of Identity of the Legal RepresentativeBidder: Henan Road & Bridge Construction Group Co., Ltd. (Seal) Legal Representative: Li Chengxiao (Signature)Post: General Manager, Chairman of the BoardID card No.: 412301************Entrusted Agent: Yang MeiPost: Staff of Operating DepartmentI.D.cardNo.*******************December 15, 2015授权委托书(中英文)2016-05-13 18:29 | #2楼在法律英语中,Power of Attorney和Proxy 均可用作表示授权的委托书,区别在于Power of Attorney所指的被委托人应为律师,即具有律师身份,而Proxy则无此种要求,即被委托人一般不需具备律师身份。

基于平衡概率分布和实例的迁移学习算法

基于平衡概率分布和实例的迁移学习算法

㊀第52卷第3期郑州大学学报(理学版)Vol.52No.3㊀2020年9月J.Zhengzhou Univ.(Nat.Sci.Ed.)Sep.2020收稿日期:2019-09-25基金项目:河南省高校科技创新团队支持计划项目(17IRTSTHN013)㊂作者简介:黄露(1994 ),女,河南驻马店人,硕士研究生,主要从事智能控制理论㊁机器学习研究,E-mail:1751037268@;通信作者:曾庆山(1963 ),男,湖北武汉人,教授,主要从事智能控制理论㊁复杂系统的建模研究,E-mail:huanglulu823@㊂基于平衡概率分布和实例的迁移学习算法黄㊀露,㊀曾庆山(郑州大学电气工程学院㊀河南郑州450001)摘要:在联合匹配边缘概率和条件概率分布以减小源域与目标域的差异性时,存在由类不平衡导致模型泛化性能差的问题,从而提出了基于平衡概率分布和实例的迁移学习算法㊂通过基于核的主成分分析方法将特征数据映射到低维子空间,在子空间中对源域与目标域的边缘分布和条件分布进行联合适配,利用平衡因子动态调节每个分布的重要性,采用加权条件概率分布自适应地改变每个类的权重,同时融合实例更新策略,进一步提升模型的泛化性能㊂在字符和对象识别数据集上进行了多组对比实验,表明该算法有效地提高了图像分类的准确率㊂关键词:迁移学习;平衡分布;类不平衡;实例更新;领域自适应中图分类号:TP3㊀㊀㊀㊀㊀文献标志码:A㊀㊀㊀㊀㊀文章编号:1671-6841(2020)03-0055-07DOI :10.13705/j.issn.1671-6841.20194390㊀引言我们正处在一个飞速发展的大数据时代,每天各行各业都产生海量的图像数据㊂数据规模的不断增大,使得机器学习的模型能够持续不断地进行训练和更新,从而提升模型的性能㊂传统的机器学习和图像处理中,通常假设训练集和测试数据集遵循相同的分布,而在实际视觉应用中相同分布假设很难成立,诸如姿势㊁光照㊁模糊和分辨率等许多因素都会导致特征分布发生改变,而重新标注数据工作量较大,且成本较高,也就形成了大量的不同分布的训练数据,如果弃之不用则会造成浪费㊂如何充分有效地利用这些不同分布的训练数据,成为计算机视觉研究中的一个具有挑战性的问题㊂而迁移学习是针对此类问题的一种有效解决方法,能够将知识从标记的源域转移到目标域,用来自旧域的标记图像来学习用于新域的精确分类器㊂目前,迁移学习已经成为人工智能领域的一个研究热点㊂其基本方法可以归纳为4类[1],即基于特征㊁基于样本㊁基于模型及基于关系的迁移㊂其中基于特征的迁移学习方法是指通过特征变换的方法,来尽可能地缩小源域与目标域之间的分布差异,实现知识跨域的迁移[2-8]㊂文献[2]提出迁移主成分分析(transfercomponent analysis,TCA),通过特征映射得到新的特征表示,以最大均值差异(maximum mean discrepancy,MMD)作为度量准则,将领域间的边缘分布差异最小化㊂由于TCA 仅对域间边缘分布进行适配,故而有较大的应用局限性㊂文献[3]提出的联合分布自适应(joint distribution adaptation,JDA)在TCA 的基础上增加对源域和目标域的条件概率进行适配,联合选择特征和保留结构性质,将域间差异进一步缩小㊂基于样本的迁移方法通常对样本实例进行加权[9-10],以此来削弱源域中与目标任务无关的样本的影响,不足之处是容易推导泛化误差上界,应用的局限性较大㊂基于模型的迁移方法则是利用不同域之间能够共享的参数信息,来实现源域到目标域的迁移㊂而基于关系的迁移学习方法关注的是不同域的样本实例之间的关系,目前相关方面的研究较少㊂本文提出的基于平衡概率分布和实例的迁移学习算法(balanced distribution adaptation and instance basedtransfer learning algorithm,BDAITL)是一种混合算法,结合了上述的基于特征和样本实例这两种基本的迁移算法㊂在多个真实数据集上进行的多组相关实验表明,BDAITL 算法模型泛化性能良好㊂郑州大学学报(理学版)第52卷1㊀问题描述迁移学习就是把源域中学习到的知识迁移到目标域,帮助目标域进行模型训练㊂领域和任务是迁移学习的两个基本概念㊂下面从领域和任务的定义方面,对要解决的问题进行描述[1]㊂定义1㊀领域D 是迁移学习中进行学习的主体,由特征空间χ和边缘概率分布P (X )组成,可以表示为D ={χ,P (X )},其中:特征矩阵X ={x 1,x 2, ,x n }ɪχ㊂领域与领域之间的不同一般有两种情况,特征空间不同或边缘概率分布不同㊂定义2㊀给定一个领域D ,任务T 定义为由类别空间Y 和一个预测函数f (x )构成,表示为T ={Y ,f (x )},其中类别标签y ɪY ㊂问题1㊀给定一个有完整标注的源领域D s ={x i ,y i }nsi =1和源任务T s ㊂一个没有任何标注的目标领域D t ={x j }n tj =1和目标任务T t ㊂假设D s 和D t 有相同的特征空间和类别空间:即χs =χt ㊁Y s =Y t ;以及不同的分布:即边缘概率分布P (X s )ʂP (X t )㊁条件概率分布P (y s /x s )ʂP (y t /x t )㊂迁移学习最终的目标是,迁移D s 和T s 中的知识以帮助D t 和T t 训练预测函数f (x ),提升模型的性能㊂2㊀基于平衡概率分布和实例的迁移学习算法BDAITL 算法从特征和样本实例两个层面进行知识的迁移㊂首先,使用基于核的主成分分析法(Kernelprincipal component analysis,KPCA),采用非线性映射将源域与目标域的高维数据映射到一个低维子特征空间㊂然后,在子空间内采用MMD 方法联合匹配域间的边缘分布和条件分布㊂与JDA 直接忽略两者之间重要性不同的是,BDAITL 算法采用平衡因子来评估每个分布的重要性[4]㊂另外,JDA 在适配条件分布时,由于目标域无标签,无法直接建模,采用了类条件概率来近似㊁隐含地假设每个域中该类的概率是相似的,而实际应用中通常是不成立的㊂而BDAITL 算法在适配条件分布时,充分考虑类不平衡问题,采用加权来平衡每个域的类别比例,得出了更为稳健的近似㊂最后,考虑源域中并不是所有的样本实例都与目标任务的训练有关,采用L 2,1范数将行稀疏性引入变换矩阵A ,选择源域中相关性高的实例进行目标任务模型的训练㊂BDAITL 算法的具体过程在下文介绍㊂2.1㊀问题建模首先,针对源域和目标域特征维数过高的问题,对其进行降维重构,最大限度地最小化领域间的分布差异,从而利于判别信息从源域到目标域的迁移㊂记X =[X s ,X t ]=[x 1,x 2, ,x n ]ɪR m ˑn 表示源域和目标域的所有样本组成的矩阵,中心矩阵表示为H =I -(1/n )1,其中:m 表示样本维数;n =n s +n t 表示样本总数;1ɪR nˑn表示元素全为1的矩阵㊂PCA 的优化目标是找到正交变换V ɪR m ˑq ,使样本的协方差矩阵XHX T最大化,即max tr(V T XHX T V ),s.t .V T V =I ,(1)其中:q 为降维后特征子空间基向量的个数;新的特征表示为Z =V T X ㊂本文使用KPCA 方法对源域和目标域数据降维㊂利用KPCA 方法,应用核映射X ңΨ(X )对PCA 进行非线性推广,获取数据的非线性特征,相应的核矩阵为K =Ψ(t )T Ψ(t )ɪR n ˑn ,对式(1)进行核化后可得max tr(A T KHK T A ),s.t .A T A =I ,(2)其中:A ɪR nˑq是变换矩阵;核化后的特征表示为Z =A T K ㊂其次,平衡概率分布㊂迁移学习需要解决的一个主要问题是减小源域与目标域之间的分布差异,包括边缘分布和条件分布,将不同的数据分布的距离拉近㊂本文采用MMD 方法来最小化源域与目标域之间的边缘分布P (X s )㊁P (X t )以及条件分布P (y s /x s )㊁P (y t /x t )的距离㊂即D (D s ,D t )=(1-μ) P (X s )-P (X t ) +μ P (y s /x s )-P (y t /x t ) =(1-μ)MMD 2H (P (X s ),P (X t ))+μMMD 2H (P (y s /x s ),P (y t /x t )),(3)其中:μɪ[0,1]是平衡因子㊂当μң0时,表示源域和目标域数据本身存在较大的差异性,边缘分布更重65㊀第3期黄㊀露,等:基于平衡概率分布和实例的迁移学习算法要;当μ=0时,即为TCA;当μң1时,表示域间数据集有较高的相似性,条件分布适配更为重要;当μ=0.5时,即为JDA㊂也就是说,平衡因子根据实际数据分布的情况,来动态调节每个分布的重要性㊂源域与目标域边缘概率分布的MMD 距离计算如下,M o 是MMD 矩阵,MMD 2H(P (X s ),P (X t ))= 1n s ðns i =1A T k i -1n t ðn s +nt j =n s +1A Tk j 2H=tr(A T KM o K T A ),(4)M o (i ,j )=1/(n s )2,x i ɪD s ,x j ɪD s ,1/(n t )2,x i ɪD t ,x j ɪD t ,-1/n s n t ,其他㊂ìîíïïïï(5)适配源域与目标域的条件概率分布时,采用加权来平衡每个域的类别比例㊂具体为P (y s x s)-P (y t x t) 2H = P (y s )P (x s )P (x s y s)-P (y t )P (x t )P (x t y t) 2H= αs P (x s y s)-αt P (x t y t) 2H ,(6)其中:αs ㊁αt 表示权值㊂故源域与目标域条件概率分布的MMD 距离计算为MMD 2H(P (y s x s),P (y t x t))=ðCc =1αc sns(c )ðx i ɪD s(c )A Tk i -α(c )tn t(c )ðx j ɪD t(c )A Tk j 2H=ðCc =1tr(ATKM c K T A ),(7)其中:c ɪ(1,2, ,C )表示样本类别;D (c )s ㊁D (c )t 和n (c )s ㊁n (c )t分别表示源域和目标域中属于类别c 的样本集合和样本数;M c 为每一类别的加权MMD 矩阵,M c (i ,j )=P (y (c )s )/n (c )s n (c )s ,x i ɪD (c )s ,x j ɪD (c )s ,P (y (c )t )/n (c )t n (c )t ,x i ɪD (c )t ,x j ɪD (c )t ,-P (y (c )s )P (y (c )t )/n (c )s n (c )t ,x i ɪD (c )s ,x j ɪD (c )t 或x i ɪD (c )t ,x j ɪD (c )s ,0,其他㊂ìîíïïïïïï(8)综合式(2)㊁式(3)㊁式(7)和式(8),可得源域和目标域的平衡概率分布D (D s ,D t )=(1-μ)tr(A TKM o K TA )+μðCc =1tr(A T KM c K T A )=(1-μ)tr(A T KM o K T A )+μtr(A T KW c K T A ),(9)其中:W c =ðCc =1M c㊂最后,实例更新㊂源域中通常会存在一些特殊的样本实例,对于训练目标域的分类模型是没有用的㊂由于变换矩阵A 的每一行都对应一个实例,基于它们与目标实例的相关性,行稀疏性基本上可以促进实例的自适应加权,实现更新学习㊂故本文对变换矩阵中与源域相关的部分A s 引入L 2,1范数约束,同时对与目标域相关的部分A t 施加F 范数约束,以保证模型是良好定义的㊂即A s 2,1+ A t 2F ㊂(10)㊀㊀通过最小化式(10)使得式(2)最大化,与目标实例相关(不相关)的源域实例被自适应地重新加权,在新的特征表示Z =A T K 中具有更大(更少)的重要性㊂综上所述,可得本文的最终优化目标min (1-μ)tr(A T KM o K T A )+μtr(A T KW c K T A )+λ( A s 2,1+ A t 2F )㊀s.t.A T KHK T A =I ,(11)其中:λ是权衡特征匹配和实例重新加权的正则化参数,能够控制模型复杂度并保证模型正定㊂2.2㊀目标优化式(11)所示目标函数是一个带有约束的最优化问题,利用Lagrange 法进行求解,记L =(1-μ)tr(A T KM o K T A )+μtr(A T KW c K T A )+λ( A s 2,1+ A t 2F )-tr((I -A T KHK T A )Φ)为式(11)的Lagrange 函数,Φ为Lagrange 乘子㊂∂L /∂A =(K ((1-μ)M o +μW c )K T +λG )A -KHK T AΦ,令∂L /∂A =0可得,(K ((1-μ)M o +μW c )K T +λG )A =KHK T AΦ㊂由于在零点并不是平滑的,故子梯度的计算为∂( A s 2,1+ A t 2F )/∂A=2GA ,其中:G 是一个子梯度矩阵,且75郑州大学学报(理学版)第52卷G ii =1/(2 a i),x i ɪD s ,a i ʂ0,0,x i ɪD s ,a i =0,1,x i ɪD t ,ìîíïïïï其中:a i 是矩阵A 的第i 行㊂这样将求解变换矩阵A 归结为求解特征分解,得到q 个最小的特征向量㊂3㊀实验结果及分析3.1㊀实验数据集为了研究和测试算法的性能,在不同的数据集上进行测试实验㊂USPS 和MNIST 是包含0~9的手写数字的标准数字识别数据集,分别包含训练图像60000幅和7291幅以及测试图像10000幅和2007幅,示例如图1所示㊂office 由3个对象域组成:amazon (在线电商图像)㊁webcam (网络摄像头拍摄的低解析度图像)㊁DSLR(单反相机拍摄的高清晰度图像),共有4652幅图像,31个类别㊂caltech-256是对象识别的基准数据集,共有30607幅图像,256个类别,示例如图2所示㊂图1㊀MINST 和USPS 数据集图片示例Figure 1㊀Example of MINST and USPSdataset图2㊀office 和caltech-256数据集图片示例Figure 2㊀Example of office and caltech-256dataset㊀㊀本文实验采用文献[5]中的方法预处理数据集MNIST 和USPS,以及文献[6]中方法的预处理数据集office 和caltech-256㊂其统计信息如表1所示,数据子集M 和U 分别作为源域和目标域,可构建M ңU ㊁U ңM 两个跨域迁移学习任务㊂数据子集A ㊁W ㊁D 和C 中任意两个作为源域和目标域,可构建12个跨域迁移学习任务,记为:D ңW ㊁D ңC ㊁ ㊁A ңC ㊂表1㊀实验数据子集的统计信息Table 1㊀Dataset used in the experiment数据集样本数特征维数类别数子集MNIST 200025610M USPS180025610Uoffice +caltech-256253380010A ,W ,D ,C3.2㊀实验结果分析实验验证环节,将BDAITL 方法与用于图像分类问题的6种相关方法进行了比较,即最近邻算法(nea-rest neighbor,NN)㊁主成分分析法(principal component analysis,PCA)㊁TCA㊁基于核的测地流形法(geodesicflow kernel,GFK)㊁JDA 以及转移联合匹配方法(transfer joint matching,TJM)㊂评价准则是目标域中的样本分类准确率(accuracy ),具体计算为accuracy =x :x ɪD t ɘy ^(x )=y (x )/x :x ɪD t,其中:x 表示目标域中的测试样本;y (x )表示其真实标签;y ^(x )表示其预测标签㊂实验结果如表2所示,分别设置q =40㊁λ=1㊁迭代次数t =10㊂如表2所示,BDAITL 算法的分类准确率相较于传统方法NN 和PCA 有明显的提升㊂与经典迁移学习算法TCA㊁GFK㊁JDA㊁TJM 相比,BDAITL 算法的分类准确率在大部分的跨域学习任务中有较大幅度的提高,85㊀第3期黄㊀露,等:基于平衡概率分布和实例的迁移学习算法㊀㊀表2㊀7种算法在14个迁移任务中的平均准确率Table2㊀Accuracy comparison of7algorithms on14cross-domain tasks数据集平均准确率/%NN PCA TCA GFK JDA TJM BDAITLDңW63.3975.9386.4475.5989.4985.4291.19 DңC26.2729.6532.5030.2830.9931.4333.57 DңA28.5032.0531.5232.0532.2532.6134.76 WңD25.8477.0785.9980.8989.1789.7392.99 WңC19.8626.3627.1630.7231.1730.1933.93 WңA22.9631.0030.6929.7532.7829.2633.51 CңW25.7632.5436.6140.6838.6437.9744.41 CңD25.4838.2245.8638.8545.2243.3146.50 CңA23.7036.9544.8941.0242.9046.6646.87 AңW29.8335.5937.6338.9837.9740.7443.05 AңD25.4827.3931.8536.3139.4942.1746.50 AңC26.0034.7340.7840.2538.3639.4541.23 MңU65.9466.2254.2867.2262.8962.3776.00 UңM44.7044.9552.2046.4557.4552.2563.05其中在任务MңU中较其最佳基准算法(GFK)提高了8.78%,这表明BDAITL算法在适配条件概率时采用加权来平衡每个域的类别比例对算法的性能提升是有效的,是平衡域之间不同类别分布的有效方法㊂同时实例的更新学习也能够削弱一些不相关实例的影响,一定程度上提升了算法的性能㊂3.3㊀参数分析在本文的BDAITL算法的优化模型中,设置了3个参数,即平衡因子μ㊁正则化参数λ以及子空间纬度q㊂实验中通过保持其中两个参数不变,改变第3个参数的值来观察其对算法性能的影响㊂平衡因子μ可以通过分别计算两个领域数据的整体和局部的分布距离来近似给出㊂为了分析μ在不同的取值下对BDAITL算法性能的影响,取μɪ{0,0.1,0.2, ,0.9},实验结果如表3所示㊂从表中可以看出,不同的学习任务对于μ的取值敏感度不完全相同,如DңW㊁WңD㊁CңD㊁MңU㊁UңM分别在0.6㊁0.4㊁0.6㊁0.2㊁0.3时取得最大的分类准确率,μ值越大说明适配条件概率分布越重要㊂它表明在不同的跨领域学习问题中,边缘分布自适应和条件分布自适应并不是同等重要的,而μ起到了很好的平衡作用㊂表3㊀μ的取值对BDAITL算法准确率的影响Table3㊀Influence ofμon the accuracy of the BDAITL algorithm数据集准确率/%μ=0μ=0.1μ=0.2μ=0.3μ=0.4μ=0.5μ=0.6μ=0.7μ=0.8μ=0.9DңW89.1590.8590.5190.5190.1790.5191.1990.8590.8590.53 DңC32.3232.2832.2432.6832.7732.5933.5732.8632.6832.41 DңA32.9933.6134.3434.6634.6634.7634.2433.6133.5133.19 WңD89.8190.4591.0892.3692.9992.3691.7291.0890.4589.17 WңC34.7334.6434.2833.9333.7533.5733.2133.1333.4833.84 WңA31.5232.0532.2531.9432.5732.4632.7833.0933.0933.51 CңW39.3238.6438.9840.3442.0342.3743.7344.4143.3943.05 CңD42.6842.6843.3143.3143.9543.9546.5043.9543.9543.31 CңA45.8245.8245.7245.9346.3546.4546.6646.5646.8746.87 AңW41.6941.3641.3642.0342.7143.0542.3741.0240.6840.00 AңD46.5045.8644.5943.9543.9544.5946.5045.8645.2244.59 AңC41.1441.2340.6941.0541.0540.8740.7840.3440.5240.61 MңU62.1774.6176.0075.2874.7273.8973.4472.5673.1173.28 UңM49.9561.5062.7063.0561.8061.6561.8561.6061.4561.20㊀㊀表4是q分别取20㊁40㊁60㊁80㊁100㊁140㊁180㊁220㊁260㊁300时,BDAITL算法的分类准确率的变化情况㊂从表中可以看出,不同的迁移学习任务在达到最优性能时,所对应的q是不同的,即不同任务的最优子空间纬度是不同的,如DңW㊁WңD㊁CңD㊁MңU㊁UңM的最优子空间纬度分别是80㊁100㊁80㊁60㊁60㊂95郑州大学学报(理学版)第52卷表4㊀q的取值对BDAITL算法准确率的影响Table4㊀Influence of q on the accuracy of the BDAITL algorithm数据集准确率/%q=20q=40q=60q=80q=100q=140q=180q=220q=260q=300DңW89.1591.1992.5492.8892.2090.1789.8389.4989.1589.15 DңC33.0433.5733.2133.6633.3932.3232.8632.5032.0631.97 DңA35.1834.2432.4633.4032.1532.7832.5732.4632.2532.05 WңD89.1791.7291.0889.1792.3691.7291.0890.4588.5487.26 WңC32.9533.2132.5932.5033.3032.5033.2132.7732.0631.52 WңA33.0932.7833.5132.9934.1333.0932.4633.9234.3433.92 CңW41.6942.3740.6840.3439.3239.6639.6640.3440.0039.66 CңD47.7746.5047.1348.4145.8645.2247.1345.2245.2244.59 CңA45.5146.6645.8247.1847.6046.3545.6244.5744.4743.95 AңW46.4442.7139.6638.9839.3237.2936.9535.5936.2735.25 AңD42.6846.5036.3133.7632.4835.0335.6737.5838.2236.94 AңC41.1440.7840.6939.5439.3639.1839.2739.0839.0038.82 MңU73.2273.4475.4475.0674.9475.0675.1175.0075.1775.22 UңM59.8561.8562.1561.9561.7061.6561.9061.8061.2561.50㊀㊀正则化参数λ取值为λɪ{0.001,0.01, ,100}时,对BDAITL算法性能的影响如表5所示㊂可以看出,由于不同的迁移任务中源域与目标域的样本实例相差较大,导致不同的迁移学习任务在λ的不同取值下得到最优分类性能,其中部分任务如DңW㊁WңD㊁CңD㊁MңU㊁UңM分别是在0.1㊁10㊁0.1㊁1㊁1时取得最优性能㊂表5㊀λ的取值对BDAITL算法准确率的影响Table5㊀Influence ofλon the accuracy of the BDAITL algorithm数据集准确率/%λ=0.001λ=0.01λ=0.1λ=1λ=10λ=100DңW84.4187.8092.8892.5490.1790.51 DңC31.6131.9733.3033.2132.1531.52 DңA36.1233.9231.4232.4631.8431.94 WңD82.1785.3588.5491.0892.3689.81 WңC30.2830.9929.3932.5932.4131.88 WңA33.0932.8831.2133.5130.1729.54 CңW30.8534.5837.2940.6841.0240.34 CңD40.7643.9547.7747.1344.5942.04 CңA42.1744.7848.3345.8246.3546.03 AңW34.9236.2737.2939.6640.6840.68 AңD31.8536.3140.7646.5043.9543.31 AңC39.1840.8741.9440.7839.7239.54 MңU72.1771.9473.0675.4474.3367.44 UңM60.0059.8061.1562.1558.2552.754㊀总结本文提出基于平衡概率分布和实例的迁移学习算法,融合了特征选择和实例更新两种策略㊂它采用平衡因子来自适应地调节边缘和条件分布适应的重要性,使用加权条件分布来处理域间的类不平衡问题,然后融合实例更新策略,进一步提升算法的性能㊂在4个图像数据集上的大量实验证明了该方法优于其他几种方法㊂但参数优化方面仍有改进的空间,在下一步的研究中将着重探索多参数优化方法,以期进一步提高算0616㊀第3期黄㊀露,等:基于平衡概率分布和实例的迁移学习算法法的性能㊂未来将继续探索迁移学习中针对类不平衡问题的处理方法,在传递式迁移学习和多源域迁移学习方向进行深入研究㊂参考文献:[1]㊀PAN S J,YANG Q.A survey on transfer learning[J].IEEE transactions on knowledge and data engineering,2010,22(10):1345-1359.[2]㊀PAN S J,TSANG I W,KWOK J T,et al.Domain adaptation via transfer component analysis[J].IEEE transactions on neuralnetworks,2011,22(2):199-210.[3]㊀LONG M S,WANG J M,DING G G,et al.Transfer feature learning with joint distribution adaptation[C]ʊIEEE InternationalConference on Computer Vision.Sydney,2013:2200-2207.[4]㊀WANG J D,CHEN Y Q,HAO S J,et al.Balanced distribution adaptation for transfer learning[C]ʊIEEE International Confer-ence on Data Mining.New Orleans,2017:1129-1134.[5]㊀LONG M S,WANG J M,DING G G,et al.Transfer joint matching for unsupervised domain adaptation[C]ʊIEEE Conferenceon Computer Vision and Pattern Recognition.Columbus,2014:1410-1417.[6]㊀GONG B Q,SHI Y,SHA F,et al.Geodesic flow kernel for unsupervised domain adaptation[C]ʊIEEE Conference on Comput-er Vision and Pattern Recognition.Providence,2012:2066-2073.[7]㊀TAHMORESNEZHAD J,HASHEMI S.Visual domain adaptation via transfer feature learning[J].Knowledge and informationsystems,2017,50(2):585-605.[8]㊀ZHANG J,LI W Q,OGUNBONA P.Joint geometrical and statistical alignment for visual domain adaptation[C]ʊIEEE Confer-ence on Computer Vision and Pattern Recognition.Honolulu,2017:5150-5158.[9]㊀赵鹏,吴国琴,刘慧婷,等.基于特征联合概率分布和实例的迁移学习算法[J].模式识别与人工智能,2016,29(8):717-724.ZHAO P,WU G Q,LIU H T,et al.Feature joint probability distribution and instance based transfer learning algorithm[J].Pattern recognition and artificial intelligence,2016,29(8):717-724.[10]戴文渊.基于实例和特征的迁移学习算法研究[D].上海:上海交通大学,2009:8-23.DAI W Y.Instance-based and feature-based transfer learning[D].Shanghai:Shanghai Jiaotong University,2009:8-23.Balanced Distribution Adaptation and Instance Based TransferLearning AlgorithmHUANG Lu,ZENG Qingshan(College of Electrical Engineering,Zhengzhou University,Zhengzhou450001,China) Abstract:Aim to deal with the poor generalization ability caused by class imbalance of jointly matching the marginal probability and conditional probability distribution to reduce the domain difference,a bal-anced distribution adaptation and instance based transfer learning algorithm was proposed.The feature in-stances were mapped to the subspace with the kernel principal component analysis.In this subspace,the marginal and conditional probability distribution were jointly matched with dynamically adjusting the dif-ferent importance of each distribution by a balance factor and adaptively changing the weight of each class.Thus,the difference between the source domain and target domain was reduced.Meanwhile,the instance update strategy was merged and the generalization ability of the model obtained by transfer learn-ing was improved further.Experimental results on the digital and object recognition datasets demonstrated the validity and efficiency of the proposed algorithm.Key words:transfer learning;balance distribution;class imbalance;instance update;domain adapta-tion(责任编辑:王浩毅)。

选择班长英语作文

选择班长英语作文

Choosing a Class President: Responsibilities, Qualities, and ProcessesIn the academic world, the class president is not just a title but a position of great responsibility. It requires someone who is not only academically excellent but also possesses the leadership skills and interpersonal abilities to guide a group of diverse individuals towards common goals. The selection of a class president is a crucial task that involves careful consideration of various factors.Firstly, the responsibilities of a class president are immense. They are expected to be the voice of the class, representing their needs and concerns to the teachers and school administration. They must also ensure that the class runs smoothly, handling any issues or conflicts that arise. Additionally, they are responsible for planning and executing class events and activities, promoting classunity and spirit, and encouraging academic excellence among their peers.Secondly, the qualities of a good class president are diverse. They must possess strong leadership skills, including the ability to motivate and inspire others, makedecisions, and delegate responsibilities effectively. They should also have excellent communication skills, both verbal and written, to convey their ideas clearly and confidently. Additionally, they need to be organized, responsible, and dependable, with the ability to manage their time effectively and handle pressure well.Lastly, the process of selecting a class president should be thorough and inclusive. It should involve a nomination process where interested candidates can put forward their names. Then, there should be a period of campaigning where the candidates can present their platforms and ideas to the class. Finally, there should be a voting process where the class members can cast their votes for their preferred candidate. The whole process should be fair and transparent, ensuring that everyone has an equal opportunity to participate.In conclusion, choosing a class president is a momentous decision that requires careful consideration of responsibilities, qualities, and processes. It is important to select someone who is not only academically excellent but also possesses the leadership skills and interpersonalabilities to effectively fulfill the role. By following a thorough and inclusive selection process, we can ensure that we choose the best person for the job, who will lead our class towards success and prosperity.**班长之选:责任、品质与流程**在学术世界中,班长不仅是一个头衔,更是一个充满责任感的职位。

法律英语委托书范本

法律英语委托书范本

以下是一篇法律英语委托书范本,供您参考:To Whom It May Concern:I, [Your Name], residing at [Your Address], do hereby appoint and constitute [Attorney-in-Fact Name] as my attorney-in-fact (hereinafter referred to as the "Attorney-in-Fact") for and in my name, place and stead, and in every capacity, to do and perform all such acts, matters and things as are necessary or incidental to the handling, management, negotiation, settlement, and closing of the legal matter(s) set forth below, with full power to take all actions and to execute all documents and to do all other things necessary or proper to be done in connection therewith, and to bind me thereby, all powers being vested in the Attorney-in-Fact, and the powers being coupled with an interest, and to continue in force until [Date].1. Legal Matter(s)The legal matter(s) in connection with which the Attorney-in-Fact is granted authority to act on my behalf are as follows:[List the specific legal matter(s) for which the Attorney-in-Fact is authorized to act, e.g., a lawsuit, a real estate transaction, a business agreement, etc.]2. Specific PowersThe Attorney-in-Fact is granted the following specific powers to act on my behalf:[List the specific powers granted to the Attorney-in-Fact, e.g., negotiating and entering into contracts, settling disputes, representing me in legal proceedings, etc.]3. General PowersIn addition to the specific powers granted above, the Attorney-in-Fact is also granted general powers to act on my behalf in connection with the legal matter(s) set forth above, including but not limited to:[List the general powers granted to the Attorney-in-Fact, e.g., making decisions, executing documents, representing me in communications, etc.]4. Representation and WarrantyThe Attorney-in-Fact represents and warrants that he/she has the knowledge, expertise and experience necessary to handle, manage, negotiate, settle and close the legal matter(s) set forth above. I hereby confirm that the Attorney-in-Fact is authorized to act on my behalf and to bind me thereby in connection with the legal matter(s) set forth above.5. Governing Law and JurisdictionThis Power of Attorney shall be governed by and construed in accordance with the laws of [Jurisdiction]. Any disputes arising out of or in connection with this Power of Attorney shall be subject to the exclusive jurisdiction of the courts of [Jurisdiction].6. RevocationThis Power of Attorney shall remain in full force and effect unless and until it is revoked by me in writing. I hereby confirm that this Power of Attorney cannot be revoked by the Attorney-in-Fact.IN WITNESS WHEREOF, I have hereunto set my hand and seal on this [Date] day of [Month], [Year].[Your Signature][Your Name][Your Address][Your Contact Information]Note: This is a sample template and should be customized according to your specific needs and requirements. It is advisable to consult with a legal professional before using this template.。

前台、中台、后台 英语

前台、中台、后台 英语

前台、中台、后台英语Front Office, Middle Office, and Back Office: A Detailed Look at Their Functions and Importance.In the corporate world, the terms "front office," "middle office," and "back office" are often used to refer to different departments or functions within a company. While these terms are often used interchangeably, they actually refer to distinct areas with unique responsibilities and functions.Front Office.The front office is typically the face of the company, dealing directly with customers and clients. It is responsible for generating revenue and building relationships with customers. The front office includes departments like sales, marketing, and customer service.Sales Department.The sales department is responsible for identifying and attracting potential customers, converting leads into sales, and maintaining relationships with existing customers.Sales representatives are the frontline workers of thefront office, representing the company and its products or services. They need to have strong communication skills, a deep understanding of the company's offerings, and theability to build trust and rapport with customers.Marketing Department.The marketing department is responsible for creatingand executing marketing strategies that raise awareness of the company's brand, products, and services. Marketing professionals research market trends, identify target audiences, create marketing collateral, and monitor the effectiveness of marketing campaigns. They work closelywith the sales department to ensure that marketing efforts are aligned with sales goals.Customer Service Department.The customer service department is responsible for providing support and assistance to customers. Customer service representatives handle inquiries, complaints, and other issues that arise during the customer's journey. They need to have excellent communication skills, empathy, and the ability to resolve problems quickly and efficiently. Customer service is often considered a key differentiatorin today's competitive market, as it can significantly impact customer satisfaction and loyalty.Middle Office.The middle office serves as the bridge between thefront and back offices, providing support and coordination for both. It is responsible for risk management, compliance, and operations. The middle office includes departments like risk management, compliance, operations, and finance.Risk Management Department.The risk management department is responsible foridentifying, assessing, and mitigating risks faced by the company. They develop and implement risk management strategies to protect the company from financial losses, legal liabilities, and reputational damage. Risk managers need to have a deep understanding of the company's business model, operations, and the external environment to effectively identify and manage risks.Compliance Department.The compliance department is responsible for ensuring that the company adheres to all relevant laws, regulations, and ethical standards. They develop and implement compliance programs, monitor compliance with regulations, and conduct audits and investigations as needed. Compliance professionals need to have a thorough understanding of the relevant regulations and the ability to interpret and apply them to the company's operations.Operations Department.The operations department is responsible for managingthe company's day-to-day operations. They oversee the production, distribution, and delivery of products or services, manage inventory, and ensure that the company's processes and procedures are efficient and effective. Operations managers need to have strong leadership skills, the ability to manage multiple projects simultaneously, and a keen eye for detail.Finance Department.The finance department is responsible for managing the company's financial affairs. They track and analyzefinancial data, develop budgets and financial plans, and ensure that the company adheres to financial regulationsand best practices. Finance professionals need to have a strong understanding of accounting principles, financial analysis, and strategic planning.Back Office.The back office supports the front and middle officesby handling administrative, technical, and analytical tasks.It is often considered the "behind-the-scenes" part of the company, performing vital functions that keep the business running smoothly. The back office includes departments like human resources, information technology, and accounting.Human Resources Department.The human resources department is responsible for managing the company's workforce. They handle recruitment, training, performance management, and employee relations. HR professionals need to have a deep understanding of labor laws, best practices in human resource management, and the ability to build and maintain positive employee relations.Information Technology Department.The information technology department is responsiblefor managing and maintaining the company's technology infrastructure. They develop and implement systems and solutions that support the company's operations, including databases, networks, and software applications. IT professionals need to have strong technical skills, theability to innovate and adapt to rapidly changing technology landscapes, and the ability to communicate effectively with non-technical stakeholders.Accounting Department.The accounting department is responsible for recording, reporting, and analyzing the company's financial transactions. They ensure that the company's financial statements are accurate and comply with relevant accounting standards. Accountants need to have a strong understanding of accounting principles, financial reporting requirements, and tax regulations.In conclusion, the front office, middle office, and back office each play crucial roles in the operation and success of a company. They work together to generate revenue, manage risk, ensure compliance, optimize operations, and support the workforce. Understanding the functions and responsibilities of each office can help companies operate more efficiently and effectively, driving growth and profitability.。

学校宣传大使英语作文

学校宣传大使英语作文

School Ambassador: A Bridge to the World In the dynamic landscape of global education, the role of a school ambassador stands tall as a symbol of pride, passion, and commitment. As a student ambassador, I am not just a representative of my institution, but also a messenger of its values, vision, and achievements. My journey as a school ambassador has been enriching, challenging, and incredibly rewarding.My duties as an ambassador are diverse and demanding. I am responsible for promoting the school's brand, highlighting its unique features, and fostering a sense of belonging among the student community. This involves creating engaging content for social media platforms, interacting with prospective students and their parents, and representing the school at various events and forums. One of the most significant aspects of my role is the opportunity to engage with a diverse audience. Interacting with students from different cultures and backgrounds has broadened my perspective and enhanced my understanding of the globalized world. Through these interactions, I havelearned to appreciate the value of diversity andinclusivity in creating a vibrant learning environment.As a school ambassador, I am also involved in planning and executing events that showcase the school's achievements and foster a sense of community. These events range from cultural festivals to academic competitions, and each one requires meticulous planning and execution. The process of organizing these events not only hones my organizational skills but also allows me to collaboratewith peers and faculty members, fostering a sense of teamwork and camaraderie.Moreover, being a school ambassador has given me the opportunity to advocate for the school's values and mission.I am proud to be part of an institution that is committedto providing an excellent education while also fostering a culture of respect, inclusivity, and innovation. Representing such a school is an honor that I cherish deeply.In conclusion, being a school ambassador has been an enriching experience that has allowed me to grow both personally and professionally. It has taught me theimportance of teamwork, communication, and leadership skills while also providing me with a platform to make a positive impact in the lives of others. As I continue to fulfill my duties as an ambassador, I am excited about the opportunities that lie ahead and the impact that I will make as a bridge between the school and the world.**学校宣传大使:通往世界的桥梁**在全球教育的动态景观中,学校宣传大使的角色高耸而立,象征着骄傲、热情和承诺。

英语京剧讲座作文模板范文

英语京剧讲座作文模板范文

英语京剧讲座作文模板范文Lecture on Peking Opera。

Peking Opera, also known as Beijing Opera, is a traditional Chinese art form that has a history of over 200 years. It is a comprehensive performing art that combines singing, acting, and acrobatics, and is known for its elaborate costumes, makeup, and unique vocal style. In this lecture, we will explore the history, characteristics, and significance of Peking Opera.History of Peking Opera。

Peking Opera originated in the late 18th century during the Qing Dynasty. It was developed from a combination of various regional opera styles, including Kunqu, Yiyangqiang, and Luantan. Peking Opera was initially performed in teahouses, marketplaces, and temples, and was popular among the common people. Over time, it gained the patronage ofthe imperial court and became a highly respected art form.During the early 20th century, Peking Opera underwent significant changes and modernization. It was influenced by Western theater and underwent reforms in its music, costumes, and stage design. Despite these changes, Peking Opera has managed to preserve its traditional essence and remains an important cultural heritage of China.Characteristics of Peking Opera。

代为签字授权委托书英文

代为签字授权委托书英文

代为签字授权委托书(英文)To Whom It May Concern,I, [Your Name], residing at [Your Address], am writing this letter to authorize [Authorized Person's Name], with address at [AuthorizedPerson's Address], to act as my proxy and sign documents on my behalffor a specific matter.I am currently unable to attend the [Event/Meeting/Transaction] scheduled for [Date] due to [Reason for absence], and therefore, I require the assistance of a trusted individual to represent my interests.I have full confidence in [Authorized Person's Name] and believe that they will exercise sound judgment and act in my best interests.[Authorized Person's Name] is authorized to sign all necessary documents, give instructions, and make decisions on my behalf related to the aforementioned matter. This authorization is valid from the date of this letter until [Expiration Date].The scope of authorization includes, but is not limited to, thefollowing responsibilities:1. Representing me at the [Event/Meeting/Transaction] and executing any related agreements or contracts.2. Negotiating terms and conditions, and ensuring that my interests are well-represented.3. Providing any required information or documentation to the relevant parties.4. Taking any other actions deemed necessary to accomplish theobjectives related to the matter.I hereby affirm that this authorization is given under my free will and that I am capable of understanding the consequences of my actions. I understand that [Authorized Person's Name] is not legally bound to actin my best interests and is not responsible for any losses or damagesthat may arise from their actions.I also acknowledge that this authorization can be revoked at any time by providing written notice to [Authorized Person's Name] and to any relevant parties. In the event of my death or incapacity, this authorization shall automatically expire.Please direct any questions or concerns regarding this authorization to [Your Contact Information]. I appreciate your understanding and cooperation.Sincerely,[Your Name][Your Signature]Date: [Date]。

基于过程数据的问题解决能力测量及数据分析方法

基于过程数据的问题解决能力测量及数据分析方法

心理科学进展 2022, Vol. 30, No. 3, 522–535 © 2022 中国科学院心理研究所 Advances in Psychological Science https:///10.3724/SP.J.1042.2022.00522522 ·研究方法(Research Method)·基于过程数据的问题解决能力测量及数据分析方法*刘耀辉1 徐慧颖1 陈琦鹏1 詹沛达1,2(1浙江师范大学教师教育学院心理学系; 2浙江省智能教育技术与应用重点实验室, 金华 321004)摘 要 问题解决能力是指在没有明显解决方法的情况下个体从事认知加工以理解和解决问题情境的能力。

对问题解决能力的测量需要借助相对更复杂、更真实、具有可交互性的问题情境来诱导问题解决行为的呈现。

使用虚拟测评抓取问题解决的过程数据并分析其中所蕴含的潜在信息是当前心理计量学中测量问题解决能力的新趋势。

首先, 回顾问题解决能力测量方式的发展:从纸笔测验到虚拟测评。

然后, 总结对比两类过程数据的分析方法:统计建模法和数据挖掘法。

最后, 从非认知因素的影响、多模态数据的利用、问题解决能力发展的测量、其他高阶思维能力的测量和问题解决能力概念及结构的界定五个方面展望未来可能的研究方向。

关键词 问题解决能力, 过程数据, 虚拟测评, 计算机化测验, 高阶思维能力分类号 B841 1 引言 “在现代社会里, 所有生活都是问题解决(In modern societies, all of life is problem solving)” (p.13, OECD, 2014)。

Mayer (1990)将问题解决(problem solving)定义为在没有明显解决方法的情况下, 将一个给定情境转换为目标情境的认知加工过程。

基于此, OECD (2013)将问题解决能力(problem-solving competence)1定义为在没有明显解决方法的情况下个体从事认知加工以理解和解决问题情境的能力; 同时包括个体参与问题解决的意愿。

个人委托书范本英文

个人委托书范本英文

Personal Power of Attorney Template in EnglishI, [Your Name], a resident of [Your Address], do hereby constitute and appoint [Agent's Name], a resident of [Agent's Address], as my attorney-in-fact (hereinafter referred to as the "Agent") to act in my name and on my behalf for and in respect of the following matters (hereinafter referred to as the "Authorized Matters"):1. Financial and Property Matters: The Agent shall have the authority to manage, handle, and make decisions regarding my financial and property matters, including but not limited to the following:a. Accessing and managing my bank accounts, including the power to withdraw, deposit, transfer, and invest funds;b. Operating my investments, such as stocks, bonds, mutual funds, and other financial instruments;c. Managing my real estate properties, including the power to rent, sell, purchase, or mortgage properties; andd. Handling any other financial and property-related matters as required.2. Legal and Business Matters: The Agent shall have the authority to represent me and make decisions on my behalf in legal and business matters, including but not limited to the following:a. Representing me in legal proceedings, lawsuits, or disputes;b. Signing and executing contracts, agreements, and other legal documents on my behalf;c. Making decisions regarding my business interests, including managing and operating my business enterprises; andd. Handling any other legal and business-related matters as required.3. Personal and Health Care Matters: The Agent shall have the authority to make decisions on my behalf regarding my personal and health care matters, including but not limited to the following:a. Making medical decisions on my behalf in the event I am unable to communicate or make decisions for myself;b. Accessing and managing my health records and medical information;c. Consulting with healthcare professionals and making decisions regarding my treatment and care; andd. Handling any other personal and health care-related matters as required.The authority granted to the Agent under this Power of Attorney shall commence immediately and shall continue until the earlier of thefollowing events:1. The death of the principal (me);2. The revocation of this Power of Attorney by the principal (me);3. The termination of the Agent's authority by a court order or judgment; or4. The Agent's incapacity to perform their duties.I hereby acknowledge that the Agent is authorized to act on my behalfand make decisions in respect of the Authorized Matters. I understandand agree that the Agent's authority is broad and encompasses various aspects of my personal, financial, and legal affairs.This Power of Attorney may be revoked by me at any time and for any reason by executing a written revocation instrument. until therevocation is effective.IN WITNESS WHEREOF, I have hereunto set my hand and seal on this [Date]._________________________[Your Name][Your Signature][Witness's Name][Witness's Signature]Note: This is a sample personal power of attorney template and should be customized according to your specific needs and the laws of your jurisdiction. It is advisable to consult with a legal professional before executing a power of attorney.。

法人代表授权英文委托书

法人代表授权英文委托书

法人代表授权英文委托书(最新版)编制人:__________________审核人:__________________审批人:__________________编制单位:__________________编制时间:____年____月____日序言下载提示:该文档是本店铺精心编制而成的,希望大家下载后,能够帮助大家解决实际问题。

文档下载后可定制修改,请根据实际需要进行调整和使用,谢谢!并且,本店铺为大家提供各种类型的经典范文,如委托书、承诺书、保证书、合同协议、报告总结、讲话稿、演讲稿、工作计划、作文大全、其他范文等等,想了解不同范文格式和写法,敬请关注!Download tips: This document is carefully compiled by this editor.I hope that after you download it, it can help you solve practical problems. The document can be customized and modified after downloading, please adjust and use it according to actual needs, thank you!In addition, this shop provides you with various types of classic sample essays, such as power of attorney, commitment letter, guarantee, contract agreement, report summary, speech draft, speech draft, work plan, essay encyclopedia, other sample essays, etc. I want to learn about different sample essays Format and writing, stay tuned!法人代表授权英文委托书法人代表授权英文委托书怎么写呢?下面是本店铺为大家分享有关法人代表授权英文委托书,欢迎大家阅读与学习!【法人代表授权英文委托书一】The Letter of Authorization (Power of Attorney)I, the undersigned Mr. /Ms. _____representing ___________(company name), a corporation duly established by and existing under the law of_________(region) and having its office at _________(address), hereby constitute and appoint the below-mentioned persons Mr./Ms. ______, to represent us with regard to the notifications, communication or demand required or permitted under the general frame cooperation agreement between _________ (company name)and __________(company name).Hereby warrant and certify that the signatory, whose signature appears below are genuine and authentic, has been and is on the date set forth below, duly authorized by all necessary and appropriate action to execute the agreement.[Signature to be authorized] [Date][Print signature in English] [Print E-mail address][Print full title of authorized Peron] [Print Tel Number][Print name of Company] [Company chop/seal as applicable] By [Signature] [Date][Print signature in English] [Print E-mail address][Print full title of executing officer] [Print Tel Number] [Print address]兹全权委托 X X X 先生(女士)和 X X X 先生(女士)代表本公司与贵公司签署货物买卖合同事宜,其代表本公司签署的合同、订单以及其他文件,本公司确认其法律效力。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Representing and Executing Agent-Based SystemsMichael FisherDepartment of ComputingManchester Metropolitan UniversityManchester M15GDUnited KingdomM.Fisher@Abstract.In this paper we describe an approach to the representation and imple-mentation of agent-based systems where the behaviour of an individual agent isrepresented by a set of logical rules in a particular form.This not only provides alogical specification of the agent,but also allows us to directly execute the rules inorder to implement the agent’s behaviour.Agents communicate with each otherthrough a simple,and logically well-founded,broadcast communication mech-anism.In addition,agents can be grouped together.This not only restricts theextent of broadcast messages,but also provides a structuring mechanism withinthe agent space.The purpose of this paper is threefold:to motivate the use of our particular com-putational model;to show that a logic-based approach is both possible and poten-tially very powerful;and to assert that by narrowing the gap between the agenttheory and the agent programming language,we are able to bring the prospect offormal specification and verification of multi-agent systems nearer.1IntroductionMulti-Agent Systems are being developed and applied in a variety of contexts,from traditional AI,through Operating Systems and concurrent programming languages,to Robotics and Artificial Life.In spite of this,not only is there little agreement on what the core attributes of a general computing agent should be,but also there is,as yet, little evidence of an engineering approach to the development of multi-agent systems. For example,both development methods and verification techniques for multi-agent systems are rare.In fact,the definitions of agents are often so difficult to understand that they(a)cannot be effectively analysed by humans,and(b)are too complex for verification purposes.In this paper,we outline an approach to the representation,development and imple-mentation of multi-agent systems that we are developing.This is based upon the notion of concurrent object-based systems where each object executes a temporal specifica-tion of its behaviour whilst communicating with other objects using a form of broadcast message-passing.In this paper we will address some issues relating to our approach,in particular:–we will motivate the use of our particular computational model,by showing how the combination of executable specifications,broadcast message-passing and objectgrouping is able to represent a range of behaviours of both individual agents and multi-agent systems;–we show that the use of a logic-based language in the description and implement-ation of agents is not only desirable but,as we use a temporal logic,is also poten-tially very powerful,particularly since the logic contains simple elements that are fundamental to the representation of dynamic behaviour;–we outline how this work,combining executable specifications within a powerful logical framework,not only narrows the gap between the theory and implement-ation of multi-agent systems,but also provides a further step towards the goal of formal specification,verification and development of such systems.In§2and§3we describe our approach to the modelling of individual agent behaviours and agent communication and grouping respectively.In§4,we give a brief outline of an implementation mechanism for these logic-based descriptions.Applications of this approach are indicated in§5,while the work towards the formal development of multi-agent systems is described in§6.Finally,in§7,we summarise the general utility of our approach and comment on related work.2Representing Agent BehaviourIn this section,we will motivate our approach to the representation of behaviour within individual agents.This will encompass both an outline of the advantages of a general logic-based approach and a more specific description of the benefits of using temporal logic as as a notation for representing dynamic activity.First of all,however,we will outline the context in which we view individual agents.2.1Agents as ObjectsAn‘agent’is typically described as“an encapsulated entity with‘traditional’AI capab-ilities”.We take the view that the distinction between an object,as used in concurrent object-based systems,and an agent,as defined above,is so vague andflexible to be useless.Hence,we believe that a multi-agent system is simply a system consisting of concurrently executing objects.Although some researchers,for example Maruichi et. al.[17],have attempted to distinguish agents from objects by stating that agents have control over their own execution(i.e.,have meta-level capabilities)while objects do not,we take the view that everything is an object and,while many objects have some degree of meta-level control,there is nothing special that distinguishes an‘agent’from any other object.However,for the sake of this discussion,we will refer to objects that exhibit some form of‘intelligence’as‘agents’(although we must recall at certain times that the system is not able to distinguish between‘intelligent’and‘dumb’objects—they are all treated the same).2.2Requirements for Agent Description LanguagesIn representing the internal behaviour of an individual agent,it can be argued that we require a notation satisfying some,if not all,of the following criteria.–It should be high-level,yet concise,consisting of a small range of powerful con-structs.–It should possess a semantics that is both intuitive and,if possible,obvious from the syntax of the language.–It should be able to represent not only the static,but the dynamic,behaviour of agents.–It should impose as few operational constraints upon the system designer as pos-sible(for example,concurrent activities within a single agent should be able to be defined).In representing an individual agent’s behaviour,we choose to utilise a formal logic. One of the advantages of following such an approach is that the notation has a well-defined,and usually well understood,semantics.The use of a formal logic language also allows us to narrow the gap between the agent descriptions and the agent theory in that the semantics of an agent is close to that of its logical description.This allows for the possibility of employing both specification and verification techniques based upon formal logic in the development of multi-agent systems.2.3Representing Dynamic Behaviour Using Temporal LogicWhile a general logic-based approach satisfies many of the above criteria,we choose instead to use temporal logic as the basis of our formal description of agent behaviour. Temporal Logic is a form of non-classical logic where a model of time provides the basis of the system.In our case,a simple discrete,linear sequence of states is used as the basic temporal model.Each state in this temporal sequence can be thought of as a model for classical logic.Such a temporal logic is more powerful than the cor-responding classical logic and is useful for the description of dynamic behaviour in reactive systems.As such,it has many advantages as a description technique for agents in multi-agent systems,some of which we outline below.–The discrete linear model structure that is the basis of the logic is very intuitive matching,as it does,steps in an execution sequence with an identified starting state and an infinite execution.–The logic contains the core elements for describing the behaviour of basic dynamic execution.For example,it contains three main descriptive elements:•a declarative description of the current state;•an imperative description of transitions that might occur between the currentand the next states;•a description of situations that will occur at some,unspecified,state in the future.Thus,using this logic,we are able to describe the behaviour of an agent now,in transition to the next moment in time and at some time in the future.–This basic set of concepts is sufficient as more complex temporal properties can be translated into a normal form consisting of these concepts[13].Thus,a general temporal specification can be given and transformed into a set of rules of this basic form.Of particular importance,both in the representation of dynamic behaviour and in the execution of such temporal formulae,is the simplicity of the logic.In spite of this simplicity,it contains three core elements that are characteristic of general computation: the state of the agent at the current moment;the transitional constraints upon an agent as it moves forward to the next moment in time;and temporally indeterminate properties which must become true at some point in the agent’s future.Thus,we can think of these three core elements as expressing the current state of an agent,what it can do next,and what it’s longer term goals are.We will not provide a detailed description of the temporal logic used,nor of the exact rules used in our approach(for a more detailed description,see[9]).Rather,we will present a simplified version as follows.The behaviour of an agent,both static and dynamic,is represented by a set of temporal rules.Each rule is of the form‘formula about the present’⇒‘formula about the future’Simple examples include(p∧q)⇒¬rrepresenting the rule that if both p and q are true in the present state,then r must be false in the next state,and,s⇒trepresenting the rule that if s is true now,then t must be true at some time in the future.The form of these rules is such that any formula in the logic can be rewritten into a set of rules consisting of initial constraints(which are true at the start state)and rules of one of the following two forms[13].mi=1p i⇒nj=1q jmi=1p i⇒rHere,p i,q j and r are simply literals.Note that,since any formula of the logic can be rewritten as a set of rules in this form,this does not represent a restriction of the logic such as Temporal Horn Clauses[1]—the full power of temporal logic can be utilised.Although we will see later that some additional operational constraints are used,the simple form of the rules means that the behaviour of the system is usually obvious from its description.Finally,the temporal rules themselves can be seen to capture a mixture of both declarative and imperative aspects of the system.They comprise a declarative descrip-tion of the state of the agent(classical logic),an imperative description of allowable transitions between states(e.g.‘’)and a declarative description of things that must happen at some time in the future(e.g.,‘’).3Agent CommunicationWe now turn to the representation of communication between agents.As we have ar-gued above,multi-agent systems should be essentially based upon a form of concur-rent object-based system.Thus,the key attributes of our system are those of objects (or agents)and message-passing.However,though most concurrent object-based sys-tems employ point-to-point message-passing as the basic communication mechanism, we will argue below that such an approach restricts the power of multi-agent systems. In particular,we advocate a combination of agent grouping structures and broadcast message-passing in order to achieve communication that is bothflexible and adaptable, yet is not prohibitively inefficient.3.1Point-to-point Message-PassingPoint-to-point message-passing is widely used in concurrent object-based systems,for example in actor systems[2].Messages are sent to a specific address(the‘receiver’) which must be known by the sender.The advantages of this approach are:–an agent‘knows’where a message is being sent to;–security controls are easily introduced as an agent can ensure that important in-formation is never sent to the‘wrong’agents;–this style of message-passing is both common and efficiently implemented in con-current object-based systems.The disadvantages of this simple form of message-passing are:–an agent must‘know’where a message is to be sent to;–in such a framework,it is hard to model open systems,for example the disappear-ance of the message recipient is usually problematic.Afinal disadvantage,more specific to logic-based approaches,is that this form of com-munication does notfit naturally into the view of computation as a limited form of theorem-proving.Thus,we have examined other approaches to communication in an attempt tofind a mechanism that is both more natural and moreflexible than point-to-point message passing.3.2Broadcast Message-PassingBroadcast message-passing is a natural mechanism to consider as it not only matches the logical view of computation that we utilise,but it is becoming more widely used in distributed computer systems.Broadcast message-passing involves sending a message, not to a specific address,but to all agents at once.It’s advantages are:–it is compositional in that a particular agent in a system can be replaced by another agent having observationally equivalent behaviour and the behaviour of the system as a whole will be unchanged(even though the name/address of the agent has changed);–it is ideal for systems where tasks are announced and agents either compete or cooperate for the‘contract’,for example Contract Nets[21];–it is widely used in adaptable and fault-tolerant systems,for example in distributed operating systems,agents that‘die’can be replaced by‘shadows’allowing the system to continue even if certain processors fail[5].In spite of these advantages,for many years broadcast message-passing has been avoided due to its perceived disadvantages:–broadcast is not secure—any agent can examine the contents of any message;–in a distributed system,broadcast has been perceived as prohibitively inefficient;–it is perceived as being difficult to program with.3.3Agent Groups and Multicast Message-PassingAn obvious way to avoid some of the perceived problems of broadcast,and one that has been developed both within distributed operating systems and DAI is that of structuring the agent space into groups.Thus,each agent is a member of at least one group and if that agent broadcasts a message,it will be sent to all members of one or more(depending on the system)of the agent’s groups.In such a way,full broadcast message-passing is replaced by multicast message-passing.In distributed operating systems,such an approach,called process groups is used to ensure replication and fault-tolerance[6], while in DAI it is used,for example in the organisational model,as a method for structuring and organising agents[17].Thus,by utilising a form of group structuring,together with broadcast message-passing,we are able to retain many of the advantages of full broadcast while avoiding its major drawbacks.A bonus is that,in recent years,low-level mechanisms for efficient broadcast have been developed in many computer systems[4].Further,not only is broadcast one of the basic communication mechanisms on local area networks[19],but also the advent of novel parallel architectures(e.g.data parallelism[14,15])has meant that more powerful programming techniques based upon broadcast communication are beginning to be developed.4Implementing Agent BehaviourHaving considered both the representation of behaviour within individual agents,and the communication mechanism between agents,we will now describe how these beha-viours are implemented is our system.Whilst using a logic-based language gives us a clear link between the agent theory and the agent description language,we may not be certain that the language is implemented according to the semantics of the logic.One way to ensure this is to directly execute the logical statements.This move towards ex-ecutable logic specifications further narrows the gap between the actual implementation of the language and the theory underlying the system.Unfortunately,one particular problem with executable logics in general is that as the expressiveness of logic being used increases,so the execution mechanism becomes correspondingly more expensive to implement.This is one of the reasons that the morepopular logic-based languages,such as P ROLOG,restrict both the logic and the oper-ational model so that the full power of the logic is not available and the execution remains relatively efficient.4.1Executing Logical DescriptionsThe basis for the execution of logical statements is to construct a model for the set of statements.This,in general,involves theorem-proving.For example,in P ROLOG, the model constructed represents a particular refutation constructed through SLDNF-resolution.Unfortunately,in representing agent behaviours concisely,we must often use forms of logic more expressive still than Horn Clauses.Even in P ROLOG,decidab-ility is not a property of the executable logic.When more expressive logics are used, completeness is also lost!Thus,we advocate the use of logic-based languages for representation of agent behaviours,together with the direct execution of these languages,but with the following provisos.–In abstract,the execution of a formula is just an attempt to build a model for that formula.–We want to avoid full theorem-proving–it is often too expensive.Although we might use theorem-proving like mechanisms in the model construction process, operational constraints are also imposed in order to make the execution more effi-cient.–Some formal properties of the logic are lost,not only through the operational re-strictions,but also through the power of the logic used.For example,completeness and decidability might both be lost.Similarly,although execution of a formula is analogous to model construction for that formula,we might be unable to construct afinite model.Again,in these,more expressive,logics execution is the process of attempting to construct a model.More important than the formal logical properties of the language are its pragmatic attributes.For example,although the execution mechanism should be sound,it should also be(relatively)efficient.Most importantly,the core logical features of the language must be both concise and applicable.Given that we wish to directly execute the set of logical rules representing an agent’s behaviour,we must decide what particular execution mechanism to employ.In the next section,we outline the approach we adopt,contrasting it with the predominant approach to the execution of logical formulae,namely logic programming.4.2Execution within an AgentWhilst we advocate the use of logic languages as agent descriptions and the direct exe-cution of these languages in order to provide agent behaviour,we argue that the standard logic-programming model is inappropriate for executing general agent behaviours,for the following reasons.–In many cases,we require programs to be non-terminating.In such cases,we cannot expect the execution mechanism to return afinite object(a model).This leads us away from standard logic programming towards,if necessary,concurrent logic languages.–More importantly,agents often want to specify,and thus attempt to achieve,several simultaneous goals.It is difficult,if not impossible,to represent this directly in a (single)goal directed framework such as logic programming.–Horn Clauses,or similar classes of formulae often required for logic programming, may be too restrictive.–In representing and executing agent descriptions where interaction with an environ-ment is required,we must certainly disallow backtracking over observable actions.However,we would like to have some backtracking within agents.The execution mechanism we employ is both natural for the style of logic we advocate (temporal logic)and avoids many of the above problems.The essential features of this execution mechanism are as follows.–It is based upon forward chaining from the initial constraints through the set of temporal rules representing the agent’s behaviour.–This execution is constrained by the execution of eventualities.Thus,when a for-mula such as e is executed,e becomes an eventuality that must be made true at some point in the future.If e cannot be satisfied immediately,it is added to the list of outstanding eventualities.When the execution mechanism has a non-deterministic choice(for example,when it has to execute a disjunction),the outstanding eventu-alities constrain this choice such that the execution mechanism attempts to satisfy the eventualities as soon as possible,with the oldest outstanding eventuality being attemptedfirst.Thus,in terms of agents,these eventualities can be seen as goals that the agent attempts to satisfy as soon as it can.–Each agent is an independent asynchronously executing object.In order to imple-ment communication in a natural(and logical)way,the predicates in each agent’s rules are split into three categories:environment,internal and component.Envir-onment predicates are under the control of the agent’s environment,while the other categories of predicate can be made true or false by the agent itself.Thus,when an agent’s execution mechanism makes an internal predicate true,it just records the fact in its internal memory,while when it makes a component predicate true,it also broadcasts this predicate to all other agents.Finally,if an environment predicate is to be executed,the agent must wait for the predicate’s value to be provided by the environment(i.e.,by broadcasting its value).This allows agents to synchronise with other agents on selected messages.–Agents are allowed to backtrack.As the agent’s execution mechanism has a range of non-deterministic choices,it can,if itfinds a contradiction,backtrack to a previous choice point and continue executing but on the basis of a different choice.However,as agents are part of an open object-based system,we do not allow an agent to backtrack past the broadcast of a message.Thus,once an agent has broad-cast a message,it has effectively committed its execution to that choice.This allowsagents to carry out search through backtracking internally,but avoids the problem of attempting to rollback actions in a distributed system.Having discussed and motivated the execution and communication mechanisms for individual agents in our system,we now give aflavour of one of the aspects currently under development,namely the addition of grouping into this framework.4.3Implementing Agent GroupsRecall that a group is essentially a set of agents.These are used to restrict the extent of broadcast communication and thus to structure the agent space.The basic properties we require of groups are that agents should be able to–send a message to a group,–add an agent to a group,–ascertain whether a certain agent is a member of a group,–remove a specified agent from a group,and,–construct a new subgroup.There are other properties that might be useful,such as the ability to list the members of a group,but they are not essential.Two alternative approaches to the implementation of groups of agents within C ON-CURRENT M ETA TE M are currently being investigated.While these will not be describedin great detail,we provide an outline of them in order to show a little of the range of representations that are available.These simple mechanisms allow us to represent a group of agents either1.as a set of named agents,e.gmanager,solver1,solver2,worker,...2.or as a set construction formula,where any agent satisfying the formula is con-sidered as a member of the group,e.gagent(X)∧solver(X)The former involves generating the group from the bottom up,the latter from the top down(by using a declarative description).Note,however,that we are able to carry out both forms using the more expressive second style,e.g.agent(manager)∨agent(solver1)∨agent(solver2)∨... Thus,this formula is true for any of the members of the group explicitly represented in(1)above.Similarly,we can either add an agent to the group by adding a disjunct, e.g,‘∨agent(added)’to the defining formula,or remove an agent from the group by adding a negated conjunct,e.g.,‘∧¬agent(removed)’to the formula.However,checking whether a particular agent is in the group is slightly more diffi-cult in the second case as it involves some logical manipulation,rather than just string matching.Further,if we ask the group object to give us a list of its members,this ismuch more difficult using the second approach as there is no explicit representation of the agents within the group,simply a statement of what properties group members must have!The discussion of which particular technique is most appropriate continues.The two approaches to group computation described above are being evaluated at present, both for their practical efficiency and for their logical consistency.5Applications in Multi-Agent SystemsIn this section,we briefly indicate how our approach can be applied in a variety of dif-ferent agent-based scenarios.These cover both the representation and implementation of single agents,and of societies of dynamically interacting agents.As the applications of our language have been presented elsewhere,we will only give an indication of how it can be applied.The purpose of this section is to indicate to the reader that not only does our ap-proach have some logical merit,but it can also be applied in a range of simple multi-agent scenarios.Further,the two main elements of the system,namely the executable temporal specifications and the communication/grouping mechanism,can often be ap-plied separately.Thus,the communication/grouping mechanism is useful for structur-ing the agent space,while the temporal logic is useful for representing and executing dynamic behaviour in individual objects.5.1Dynamic ObjectsBy utilising the power of temporal logic,we are able to specify the internal beha-viour of dynamic objects.In particular,we can represent agents whose internal state changes over time,whilst interacting with its environment.Rather than giving a range of examples here,we refer the reader to our survey of C ONCURRENT M ETA TE M applic-ations[9].5.2Reaction versus DeliberationThere seems to be a continuing debate about the relative merits of reactive architectures versus deliberative architectures(typically based upon planning).Rather than arguing for one approach or the other,we take the view that both types of behaviour should be possible within agents.In particular,we argue that,in allowing concurrent activities within an individual agent,we are able to represent behaviour that is both reactive and deliberative.Agents can react immediately to certain stimuli,but can be carrying out a longer term planning process in the background.For example,an agent can contain a range of transition rules representing reactive situations,such asstimuli1⇒response1stimuli2⇒response2Note that a response occurs here in the next step of the agent and so a variety of imme-diate responses can be represented.As well as being useful for reactive architectures in DAI,such rules can be used as part of more traditional applications,such as process control[8].We are also able to represent typical deliberative activities such as planning,for example byproblem⇒planplan⇒broadcast(plan)which states that at some time in the future the agent will have generated a plan to solve a particular problem and,when it does,the agent will broadcast this plan.There are two ways in which the agent might construct the plan,as follows.e plan,as above,but add rules constraining the production of the plan,forexample¬pre1⇒¬plan¬pre2⇒¬planwhich states that the plan cannot be achieved until the preconditions pre1and pre2 have been achieved.These subgoals can in turn be solved by adding the rulesproblem⇒pre1problem⇒pre2Thus,we can attempt to utilise the deductive and backtracking aspects of the system in order to achieve the construction of the plan.2.An alternative approach is to plan without backtracking.Here,we use a continuation-based approach to represent the rest of the search space.This approach is more expensive,but safer(see below).However,such a planner would have to be built on top of C ONCURRENT M ETA TE M—it would not directly exploit the execution mechanism of the system.There is a general problem with thefirst approach in that it may be difficult to mix reactive and deliberative aspects within the same agent.This is because,if the planning process depends upon backtracking of some sort,the reactive rules might be such that they broadcast a message at some point thus effectively committing the execution to a certain path and stopping the system backtracking past this point.The simplest solution to this problem is,when we require an agent that has both planning and reactive cap-abilities,to spawn a separate‘planning’agent which carries out the planning activity in parallel with the original agent.The original agent acts reactively to its environ-ment,having spawned the planning agent,but once the planning agent has succeeded in producing a plan the original agent is at liberty to act upon it.This type of behaviour leads us on to other examples of multi-agent systems where cooperative problem-solving can occur.。

相关文档
最新文档