Evaluation of a ln tan integral arising in quantum field theory
质疑学术权威的英语作文
质疑学术权威的英语作文As an AI language model, I do not possess personal emotions or opinions. However, I can provide a response to the topic based on commonly expressed perspectives.There is a growing trend of skepticism towards academic authority and expertise in various fields. This phenomenon has been fueled by the rise of alternative sources of information, the spread of misinformation, and the increasing accessibility of knowledge through the internet. While it is healthy to question and critically evaluate established knowledge, the outright dismissal of academic authority can have detrimental effects on the pursuit of truth and the advancement of human knowledge.One of the main reasons for questioning academic authority is the perception of bias and conflicts of interest within the academic community. Critics argue that academic research and knowledge production are often influenced by funding sources, institutional affiliations,and personal agendas. This perceived lack of objectivity has led to doubts about the credibility and reliability of academic findings. In some cases, high-profile scandals involving academic misconduct have further eroded public trust in the integrity of the academic establishment.Moreover, the exclusivity and elitism associated with academic institutions have contributed to the skepticism towards academic authority. The traditional hierarchical structure of academia, with its emphasis on credentials, tenure, and peer review, has been criticized for creating barriers to entry and perpetuating a culture ofintellectual elitism. This has led to the perception that academic experts are out of touch with the concerns and perspectives of the general public, leading to a disconnect between academic knowledge and real-world issues.In addition, the democratization of information through the internet has empowered individuals to challenge established academic narratives. With the proliferation of online platforms and social media, anyone can present themselves as an authority on a given topic, regardless oftheir qualifications or expertise. This has led to the spread of misinformation and the blurring of lines between credible academic research and unverified claims, further eroding public trust in academic authority.However, it is important to recognize the value of academic expertise and authority in advancing human knowledge and understanding. Academic institutions serve as the foundation for rigorous research, critical inquiry, and the peer review process, which are essential for ensuring the quality and reliability of knowledge production. While it is crucial to question and scrutinize academic findings, it is equally important to acknowledge the expertise and dedication of scholars who have devoted their careers to the pursuit of knowledge.Furthermore, the peer review process, which is a cornerstone of academic research, serves as a mechanism for quality control and validation of scholarly work. While it is not without its flaws, peer review helps to ensure that academic research meets rigorous standards of evidence and methodology, contributing to the overall credibility ofacademic authority.In conclusion, while it is natural to question and challenge established authority, it is important to recognize the value of academic expertise in advancing human knowledge and understanding. The skepticism towards academic authority should not lead to the wholesale rejection of scholarly research and expertise, but rather to a critical evaluation of knowledge claims and a commitment to upholding the integrity of academic inquiry. By fostering a culture of open dialogue, transparency, and accountability, we can work towards restoring public trust in academic authority and promoting the pursuit of truth and knowledge.。
Contents
CCP3SURF ACESCIENCENEWSLETTERCollaborative Computational Project3on Surface ScienceNumber26-January2000ISSN1367-370XDaresbury LaboratoryContents1Editorial1 2Scientific Articles2 3SRRTNet-a new global network124High performance computing164.1Cluster-Computing Developments in the UK (16)4.2New HPC Support Mechanisms (22)5Reports on visits256Meetings,Workshops,Conferences296.1Reports on Bursaries (29)6.2Reports from Meetings (32)6.3Upcoming meetings (34)7Abstracts of forthcoming papers37 8Surface Science Related Jobs40 9Members of the working group43 Contributions to the newsletter from all CCP3members are welcome and should be sent to ccp3@eful Links:CCP3Home Page /Activity/CCP3CCP3Program Library /Activity/CCP3+896 SRRTNet /Activity/SRRTNetDLV /Activity/DLVCRYSTAL /Activity/CRYSTALCASTEP /Activity/UKCPMany useful items of software are available from the UK Distributed Computing Support web site,DISCO /Activity/DISCOEditors:Dr.Klaus Doll and Dr.Adrian Wander,Daresbury Laboratory,Daresbury, Warrington,WA44AD,UK1EditorialThe renewal of CCP3,which is due in the summer,is on all our minds,and this edition of the newsletter reminds us of our aims and achievements.Theflagship project supported by the post-doc is at the heart of the CCP–new programs can be developed which would not get offthe ground otherwise.Over the last three years CCP3has been very lucky to have had Klaus Doll working on the development of analytic gradient methods for the CRYSTAL electronic structure package.This will lead to much more efficient structure optimization,of particular benefit to surface scientists where surface relaxation and reconstructions are so important.Klaus’achievements so far are described in thefirst article,and it is most satisfactory that tests on the CO molecule and bulk MgO have proved successful.The next step is to build in symmetry,to achieve greater computational efficiency,and then the new code can be released.As theflagship in the renewal proposal,the working group has chosen the development of methods to study the electronic structure and physical properties of large clusters.These clusters themselves possess surface-like properties, but at the same time it is proposed to study their interaction with surfaces.Such systems are a topic of active research for several of the members of the working group,both theoretical and experimental,and it is expected that their expertise will contribute greatly to the success of the project.Having Adrian Wander as a permanent member of staffat Daresbury supporting CCP3will lead to very welcome support for the synchrotron radiation community in the development of new surface program packages.In this newsletter he describes developments in SRRTNet,originally an American collaboration for providing sup-port for surface scientists using synchrotron radiation,which is likely to develop into an international collaboration based on the CCP model.Adrian is also in discussion with the Daresbury-based X-ray community with a view to developing new codes for the analysis of near-edge spectra in a wider range of systems than can be tackled at the moment,using the improved self-consistent electron potentials available for complex materials.This work would be based at Daresbury,and will form part of the CCP3collaboration.This issue contains short articles on our visitor programme,and by Ally Chan (Nottingham)and Yu Chen(Birmingham)who received student bursaries for participating in ECOSS-18.Please continue to apply for CCP3support!It is interesting to read in the pieces by Ally and Yu what most impressed them at ECOSS–I was struck by Ally’s comment that surface science has broadened to include nanoparticles and nanowires.Just what we thought in our choice offlagship project next time round.John Inglesfield12Scientific ArticlesAnalytical Hartree-Fock gradients for periodic systemsK.Doll,V.R.Saunders,and N.M.HarrisonCLRC,Daresbury Laboratory,Daresbury,Warrington,WA44AD,UKWe report on the progress of the implementation of analytic gradients in the program package CRYSTAL.The algorithm is briefly summarised and tests illustrate that highly accurate analytic gradients of the Hartree-Fock energy can be obtained for molecules and periodic systems.IntroductionComputational materials science has been a fast growingfield in the last years. This is mainly because methods which were developed earlier(density functional theory,molecular dynamics,Hartree-Fock and correlated quantum chemical meth-ods,Monte Carlo schemes,the GW method,etc)can now be applied to demanding realistic systems due to the increase in computational resources(faster CPUs,par-allelisation,cheaper memory and diskspace).CCP3is a collaboration in the area of surfaces and interfaces where progress de-pends on an interaction between experimental and theoretical approaches.There-fore,codes which provide a better theoretical understanding are important.One of the key issues in surface science is the determination of surface structure and adsorption energetics.From the computational point of view,a fast structural optimisation must be possible.Availability of numerical or analytical gradients facil-itatesfinding a minimum energy structure,and availability of analytical gradients can make optimisation algorithms more efficient.As a rule of thumb,analyticalgradients are about N3times more efficient than numerical gradients(with N beingthe number of variables).Also,for future developments such asfinding transition states,gradients are essential.Analytical gradients in quantum chemistry were pioneered by Pulay who did the first implementation for multicentre basis sets[1].In many molecular codes based on quantum chemistry methods,analytical gradients are now implemented and gradient development has become an important task in quantum chemistry[2,3,4,5].Simi-larly,in solid-state codes such as CASTEP,WIEN,or LMTO,analytic gradients are available.Analytic Hartree-Fock gradients have already been implemented in a code for systems periodic in one dimension[6].CRYSTAL[7,8]was born in Turin and is now jointly developed in Turin and Daresbury.CRYSTAL was initially designed to deal with the exact exchange in and to solve the Hartree-Fock equations for real systems.With the modern versions of the code,density-functional2calculations or calculations using Hybrid functionals such as B3LYP with the ad-mixture of exact exchange are also possible.The target of this project,which began in October1997,was the implementation of analytical gradients in CRYSTAL and in autumn1999,thefirst test calculations on periodic systems were performed.In this article,we try to outline the theory and implementation of analytical gra-dients.We try to keep the mathematics at a minimum;a more formal publication is intended in the near future[9].A very comprehensive summary of the theory underpinning CRYSTAL will appear in the future[10].Total energyFirst,we want to briefly summarise how the total energy is obtained.The total energy consists of•kinetic energy of the electrons•nuclear-electron attraction•electron-electron repulsion•nuclear-nuclear repulsionCRYSTAL,similar to molecular codes such as GAMESS-UK,MOLPRO(Stuttgart and Birmingham),GAUSSIAN,TURBOMOLE,etc,solves the single particle Schr¨o dinger equation and a wavefunction is calculated.The wavefunction is based on crystalline orbitalsΨi( r, k)which are linear combinations of Bloch functionsΨi( r, k)= µaµ,i( k)ψµ( r, k)(1) with the Bloch functions constructed fromψµ( r, k)= gφµ( r− Aµ− g)exp(i k g)(2) g are direct lattice vectors, Aµdenotes the coordinate of the nuclei.φµare the basis functions which are Gaussian type orbitals.For example,an s-type function centred at R a=(X a,Y a,Z a)is expressed asφ(α, r− R a,n=0,l=0,m=0)=φµ( r− R a)= Nexp(−α( r− R a)2).In molecular calculations,no mathematical problem arises from any of the interac-tions.In periodic systems,however,there are several divergent terms which have to3be dealt with:for example,in a one dimensional periodic system with lattice con-stant a and n being an index numerating the cells,the electron-electon interaction per unit cell would have contributions like:∞n=1e2na(3)This sum is divergent(similarly in two and three dimensions).Therefore,an indi-vidual treatment of this term is not possible.Instead,all the charges(nuclei and electrons)are partitioned and a scheme based on the Ewald method is used to sum the interactions[11].The Hartree-Fock equations are solved in terms of Bloch functions because the Hamiltonian becomes block-diagonal(i.e.at each k-point the equations are solved independently).The wavefunction coefficients aµ,i are optimised due to this procedure and the total energy can be evaluated.For the computation of gradients,the dependence of the total energy on the nuclear coordinates must be analysed.There are three dependencies of the total energy on the nuclear coordinates:•nuclear-nuclear repulsion and nuclear-electron attraction:obviously,the coor-dinates of the nuclei enter•wavefunction coefficients(or density matrix):we will obtain a different solution with different density matrix when moving the nuclei•basis functions:the basis functions are centred at the position of the nu-clei and therefore moving the nuclei will change integrals over the basis func-tions.These additional terms are called Pulay forces.They are missing when the Hellmann-Feynman theorem is applied and therefore Hellmann-Feynman forces often differ substantially from energy derivative forces in the case of a local basis set(see[1]and references therein).Density matrix derivatives are difficult to evaluate.However,for the solution of the Hartree-Fock equations,this problem can be circumvented and instead a new term is introduced,the so-called energy-weighted density matrix which is easily evaluated [12].However,this is only strictly correct for the exact Hartree-Fock solution. In practice,convergence is achieved up to a certain numerical threshold(e.g.a convergence of10−6E h of the total energy corresponding to27.2114×10−6eV).For very accurate gradient calculations,it may be necessary to make this threshold even lower.The remaining main problem is to generate all the derivatives of the integrals. In a second step,these derivatives have to be mixed with the density matrix.4Evaluation of integralsIn this section we summarise the types of integral which occur.The simplest type is the overlap integral between two basis functions at two centres:Sµν R k R l= φµ( r− R k)φν( r− R l)d3r(4) Obviously we can shift R k to the origin,and suppressing 0in the notation,we obtain:Sµν R i= φµ( r)φν( r− R i)d3r(5) with R i= R l− R k.A kinetic energy integral has the form:Tµν R i= φµ( r)(−12∆ r)φν( r− R i)d3r(6) the nuclear attraction integral has the form:Nµν R i= φµ( r)Z c| r− A c|φν( r− R i)d3r(7) and the electron-electron interaction has the form:Bµν R iτσ R j = φµ( r)φν( r− R i)φτ( r′)φσ( r′− R j)| r− r′|d3rd3r′(8)These integrals are in principle sufficient to deal with molecules.In the case of periodic systems,new types of integrals appear(e.g.multipolar integrals,integrals over the Ewald potential and its derivatives)[11,13,14].The fast evaluation of integrals is one of the main issues in the development of quan-tum chemistry codes.CRYSTAL uses a McMurchie-Davidson algorithm[15].Its idea is to map a product of two Gaussian type orbitals at two centres in an expan-sion of Hermite polynomials at an intermediate centre.This algorithm has proven to efficiently evaluate integrals,although in recent years progress in this specialised field of quantum chemistry has been made(see for example the introduction in[16] or two recent reviews[17,18]).The expansion[15,14]looks like:5φ(α, r− A,n,l,m)φ(β, r− B,n′,l′,m′)= t,u,v E(n,l,m,n′,l′,m′,t,u,v)Λ(γ, r− P,t,u,v)(9)withγ=α+βand P=α A+β Bα+β.Λis a so-called Hermite Gaussian type function Λ(γ, r− P,t,u,v)= ∂∂P x t ∂∂P y u ∂∂P z v exp(−γ( r− P)2)(10)The start value E(0,0,0,0,0,0,0,0,0)=exp(−αβ( B− A)2)can be verified by inserting it in equation9.It can be derived from the Gaussian product rule[19,20]:exp(−α( r− A)2)exp(−β( r− B)2)=exp −αβα+β( B− A)2 exp −(α+β) r−α A+β Bα+β 2(11) General values E(n,l,m,n′,l′,m′,t,u,v)are obtained from recursion relations[15, 14].The E-coefficients depend on the distance( B− A),but not on P or r.All the integrals can be expressed in terms of E-coefficients[15,14,11,13].Evaluation of gradients of the integralsOne of the issues of the gradient project is to generalise the algorithms used to generate the energy integrals to obtain the gradients of the integrals.This madea new implementation of recursion relations necessary which are used to obtainthe coefficients G in the expansion of the gradients of the integrals in Hermite polynomials.∂Φ(α, r− A,n,l,m)Φ(β, r− B,n′,l′,m′)∂A x= t,u,v G A x(n,l,m,n′,l′,m′,t,u,v)Λ(γ, r− P,t,u,v)(12)Once the coefficients are known,the integration can be performed.The integrationfor the case of gradients of integrals is similar to the case of integrals for the total energy.The only difference is that,instead of the coefficientsE(n,l,m,n′,l′,m′,t,u,v)which enter the energy expression,the gradient coefficientsG A x(n,l,m,n′,l′,m′,t,u,v),G A y,G A z,G B x,G B y,and G B z6are used.The coefficients G B x can efficiently be obtained together with the coeffi-cients G A x[21].For example,the evaluation of the overlap integral is done as follows:Sµν R i = φµ( r)φν( r− R i)d3r=t,u,v E(n,l,m,n′,l′,m′,t,u,v)Λ(γ, r− P,t,u,v)d3r=E(n,l,m,n′,l′,m′,0,0,0)Λ(γ, r− P,0,0,0)d3r=ME(n,l,m,n′,l′,m′,0,0,0)From thefirst line to the second,we have used the McMurchie-Davidson scheme, from the second to the third we exploited a property of the Hermite Gaussian type functions:all the integrals of the type Λ(γ, r− P,t,u,v)d3r with t=0or u=0or v=0vanish because of the orthogonality of these functions.The integration(fromthe third to the fourth line)is trivial.M is a normalisation constant. Calculating the gradient is easy once we know the new expansion:∂Sµν R i ∂A x =∂∂A xφµ( r)φν( r− R i)d3r=∂ t,u,v E(n,l,m,n′,l′,m′,t,u,v)Λ(γ, r− P,t,u,v)∂A x d3r=t,u,v G A x(n,l,m,n′,l′,m′,t,u,v)Λ(γ, r− P,t,u,v)d3r=G A x(n,l,m,n′,l′,m′,0,0,0)Λ(γ, r− P,0,0,0)d3r=MG A x(n,l,m,n′,l′,m′,0,0,0)This way,all the derivatives can be calculated!There are some integrals which involve three centres(for example nuclear attraction)where we exploit translational invariance:∂∂C x =−∂∂A x−∂∂B x(13)because the value of the integral is invariant to a simultaneous uniform translation of the three centres.Four centre integrals can be reduced to a product of two integrals over two centres which makes the calculation of gradients straightforward.As a whole,the calculation of gradients of the integrals is closely related to calcu-lating the integrals itself.This means that most of the subroutines can be used for7the gradient code.One of the main differences is that array dimensions need to be changed-dealing with gradients is similar to increasing the quantum number(a derivative of an s-function is a p-function,and so on).However,the task of adjusting the subroutines should not be underestimated.After obtaining the derivatives of the integrals,we mix them with the density ma-trix just like in the energy calculation.We have to take into account the new term which arose because we did not calculate a density matrix derivative—the energy weighted density matrix.Again,coding this additional term can be done by modi-fying existing subroutines.After this,wefinally obtain the forces on the individual atoms.Results from test calculationsIn this section,we summarise results from test calculations.We have considered the CO molecule which was arranged as a single molecule,as a molecule which is peri-odically reproduced with a periodicity of4˚A in one spatial direction(”polymer”), periodically reproduced with a periodicity of4˚A in two spatial directions(”slab”), and periodically reproduced with a periodicity of4˚A in three spatial directions (”solid”).Because of the large distance of4˚A,the molecules can be considered as nearly independent and the forces are quite similar.Still,the calculation of energy and gradient is completely different and therefore this is an important test of Ewald technique and multipolar expansion.The results are given in table1.The results agree in the best case to at least6digits which is the numerical noise and in the worst case up to4digits.The difference between analytic and numerical gradi-ents in periodic systems mainly originates from an approximation made within the evaluation of the integrals[22]and from the number of k-points which affects the accuracy of the energy-weighted density matrix.In table2,we display results from a MgO solid with one oxygen atom slightly distorted from the symmetrical position.Again,the forces agree well up to5digits with numerical derivatives.Future developments and ConclusionThe present version of the code is able to calculate Hartree-Fock forces for periodic systems up to a precision of4and more digits.There is no extra diskspace needed and the additional memory usage is moderate.This code will certainly be useful for structural optimisation and for future program development towards molecular dynamics or the calculation of response functions.The present version,however,is not yet ready for a release.Instead,the following steps are necessary:Firstly,the usage of symmetry must be implemented.This is of highest importance to make the code fast enough so that it can be used for practical optimisations.We expect8Table1:Force on a CO molecule with a carbon atom located at(0˚A,0˚A,0˚A)and an oxygen atom located at(0.8˚A,0.5˚A,0.4˚A).In the periodic case,the molecule is generated with a periodicity of4˚A.This means,that in one dimension,for example,there would be other molecules with a carbon atom at(n×4˚A,0˚A,0˚A)and an oxygen atom at((n×4+0.8)˚A,0.5˚A,0.4˚A),with n running overall positive and negative integers.Forces are given in E h,with E h=27.2114eVand a0=0.529177˚A.Higher ITOLs means a lower level of approximation in the evaluation of the integrals[22].ITOLs) k-points) numerical force0.3769140.37660(0.37664)0.376310.37566(0.37566) analytical force0.3769130.37663(0.37665)0.376330.37588(0.37578))on the atoms of an MgO solid.The MgO solid was chosen Table2:Forces(in E ha0to have an artificially high lattice constant of6.21˚A to make the calculation faster. Coordinates are given in fractional units,e.g.the second Mg is at0˚A,0.5×6.21˚A,0.5×6.21˚A.A normal fcc lattice would be obtained if the sixth atom(Oxygenat0.53,0,0)was at(0.5,0,0).Moving this atom from its normal position has ledto the nonvanishing forces.Mg(0.00.00.0)-0.03018-0.03019Mg(0.00.50.5)-0.00314-0.00314Mg(0.50.00.5)0.008950.00895Mg(0.50.50.0)0.008950.00895O(0.50.50.5)-0.00379-0.00379O(0.530.00.0)0.004290.00430O(0.00.50.0)0.007460.00746O(0.00.00.5)0.007460.00746that a version of the present code with symmetry will already be fast enough to compete with numerical derivatives.Further developments will be the coding of the bipolar expansion(a method to evaluate the electron-electron repulsion integrals faster),and sp-shells(s and p shells are often chosen to have the same exponentsto make the evaluation of integrals faster).Also,the newly written subroutines arenot yet optimal and they will certainly go through a technical optimisation(moreefficient coding).In later stages,the code should be made applicable to metals (there is an extra term coming from the shape of the Fermi surface[23]which is notyet coded)and to magnetic systems(unrestricted Hartree-Fock gradients).Finally, pseudopotential gradients and density functional gradients should be included. References[1]P.Pulay,Mol.Phys.17,197(1969).[2]P.Pulay,Adv.Chem.Phys.69,241(1987).[3]P.Pulay,in Applications of Electronic Structure Theory,edited by H.F.Schae-fer III,153(Plenum,New York,1977).[4]H.B.Schlegel,Adv.Chem.Phys.67,249(1987).[5]T.Helgaker and P.Jørgensen,Adv.in Quantum Chem.19,183(1988)[6]H.Teramae,T.Yamabe,C.Satoko,A.Imamura,Chem.Phys.Lett.101,149(1983).[7]C.Pisani,R.Dovesi,and C.Roetti,Hartree-Fock Ab Initio Treatment of Crys-talline Systems,edited by G.Berthier et al,Lecture Notes in Chemistry Vol.48(Springer,Berlin,1988).[8]V.R.Saunders,R.Dovesi,C.Roetti,M.Caus`a,N.M.Harrison,R.Orlando,C.M.Zicovich-Wilson crystal98User’s Manual,Theoretical Chemistry Group, University of Torino(1998).[9]K.Doll,V.R.Saunders,N.M.Harrison(in preparation)[10]V.R.Saunders,N.M.Harrison,R.Dovesi,C.Roetti,Electronic StructureTheory:From Molecules to Crystals(in preparation)[11]V.R.Saunders,C.Freyria-Fava,R.Dovesi,L.Salasco,and C.Roetti,Mol.Phys.77,629(1992).[12]S.Bratoˇz,in Calcul des fonctions d’onde mol´e culaire,Colloq.Int.C.N.R.S.82,287(1958).[13]R.Dovesi,C.Pisani,C.Roetti,and V.R.Saunders,Phys.Rev.B28,5781(1983).[14]V.R.Saunders,in Methods in Computational Molecular Physics,edited by G.H.F.Diercksen and S.Wilson,1(Reidel,Dordrecht,Netherlands,1984).[15]L.E.McMurchie and E.R.Davidson,put.Phys.26,218(1978).[16]R.Lindh,Theor.Chim.Acta85,423(1993).[17]T.Helgaker and P.R.Taylor,in Modern Electronic Structure Theory.Part II,World Scientific,Singapore,725(1995)[18]P.M.W.Gill,in Advances in Quantum Chemistry,edited by P.-O.L¨o wdin,141(Academic Press,New York,1994)[19]S.F.Boys,Proc.Roy.Soc.A200,542(1950).[20]R.McWeeny,Nature166,21(1950).[21]T.Helgaker and P.R.Taylor,Theor.Chim.Acta83,177(1992).[22]The integrals Bµν R iτσ R j =Bτσ R jµν R iwhich should have the same value,are notnecessarily evaluated within the same level of approximation—this is nearly inevitable for periodic systems,as enforcing this symmetry would require a much higher computational effort and much more data storage.The derivation of the equations for the analytic gradients,however,relies on these integrals be-ing equivalent.Therefore,the introduced asymmetry will lead to inaccuracies in the gradients.This can be controlled with the ITOL-parameters(tolerances as described in the CRYSTAL manual[8])which control the level of approx-imation.Higher ITOLs lead to a higher accuracy in the forces.However,the defaults appear to give forces with an accuracy up to4digits which should be good enough for most purposes.[23]M.Kertesz,Chem.Phys.Lett.106,443(1984).3SRRTNet-a new global networkFrascati’99-Birth of a NetworkScientific MeetingFrom the23rd to the25th September1999,a workshop on Theory and Computation for Synchrotron Radiation was held at the laboratory in Frascati just outside Rome, Italy.This was the third in an ongoing series of meetings on various aspects of synchrotron radiation,and follows meetings on Theory and Computation for Syn-chrotron Applications held at the Advanced Light Source in Berkeley in October 1997and Needs for a Photon Spectroscopy Theory Center held at the Argonne National Laboratory in August1998.This was an excellent meeting,featuring a variety of high quality scientific pre-sentations from both experimental and theoretical participants.Thefirst day was devoted to presentations concentrating on resonant x-ray processes and orbital or-dering effects,particularly in V2O5.The second day then moved on to discussions of photoemission,photoelectron diffraction and holography,and studies of high T c superconductors.This day was concluded with an excellent conference dinner which finished rather late!Thefinal day then concluded with discussions of EXAFS,and x-ray spectroscopies.The overheads used in all the presentations can be viewed on line at http://wwwsis.lnf.infn.it/talkshow/srrtnet99.htmSRRTNet DiscussionsThe Friday programme also included a two hour session devoted to the idea of forming a global network concentrating on theory for synchrotron radiation re-search based research.The session began with a talk from Michel Van Hove of the Lawrence Berkeley National Laboratory who outlined the purposes and function of the proposed network.This was then followed by presentations by John Rehr of the University of Washington who highlighted moves to extend the synchrotron radia-tion research theory network(SRRTNet)in North America,by Maurizio Benfatto of the INFN Frascati,who presented the European perspective,by Kenji Makoshi of Himeji Institute of technology who discussed the Japanese efforts and by Adrian Wander of the Daresbury Laboratory who presented CCP3as a possible model of how the network could be run.The concept of establishing a global network was received with enthusiasm from all present.OutcomeGiven the support of the meeting for the concept of global network of this sort,it was decided to extend SRRTNet into the global arena.The aims of the network are:•To provide a central repository for information of relevance to synchrotron radiation research•To develop theoretical methods pertaining to the experiments performed on synchrotron facilities•To provide state of the art and user friendly software for the analysis and interpretation of experiments•To provide training in the use of relevant software through workshops and site visits•To host visiting scientists•To hold periodic workshops for the dissemination of new results and method-ologiesThe directors of the network are Michel Van Hove and John Rehr.As afirst step in the development of the network,Daresbury has agreed to host the web pages, and theoretical groups have been contacted and ask to provide input to this central web hub of what will grow into a globe encompassing network.If you are interested in contributing to the network and missed our e-mail announcement,the invitation letter follows;Dear Colleague,You may know of the recently established Synchrotron Radiation Research Theory Network(SRRTNet).We are contacting you to invite you,and all theorists inter-ested in this topic,to actively participate in the next phase of the network. SRRTNet aims to provide theory for experiments that use synchrotron radiation,by means of a global,web-based network linking theoretical and experimental research groups.The driving philosophy is to promote interactions between theory and exper-iment for mutual benefit,by means of web-based information,workshops,exchange of theoretical methods and computer codes,as well as establishing visiting scientist programs.At the last SRRTNet workshop,conducted at Frascati near Rome in September1999, it was decided to strengthen the global character of this network by establishing a cen-tral,web-based source of information.Daresbury Laboratory is hosting this web site with Dr.Adrian Wander acting as editor.It is anticipated that all synchrotron facilities will provide direct links for their users to this web site,and consequently we expect this site to grow into an essential resource for synchrotron radiation re-searchers.An importantfirst function of the web site will be to provide information about theorists’research interests and links to relevant web pages.The network will be all the more valuable as this coverage becomes complete:it will thus allow theorists and experimentalists alike tofind the best sources of information about the various methods for solving specific scientific problems.The purpose of this message is to ask you to provide such information and links about your group.You may visit the new web site/Activity/SRRTNetand see not only an overview of the network in general,but also the beginnings of such information about specific theoretical groups.The idea is to put a list of your research topics on the SRRTNet web site,while providing links to your own web site for more detailed and up-to-date information. If you prefer,the SRRTNet site can itself host a more complete web page covering your activities.The information we wish to present(or link to)includes as many as possible of the following items:•your topics of scientific activity related to synchrotron radiation(directly or by methodology);•your computer codes,with their capabilities and availability;•your publications,such as abstracts,papers,databases and web-presentations;•how to contact you or your group.。
教资评估方式英语作文
教资评估方式英语作文In the ever-evolving landscape of education, the methods by which we assess the competencies of our educators have become increasingly sophisticated. The traditional pen-and-paper exams have given way to a plethora of innovative techniques designed to gauge a teacher's potential in a more holistic and practical manner. One cannot help but marvel at the ingenuity of these modern approaches, which include classroom observations, peer reviews, and self-assessments that provide a multifaceted view of a teacher's skills and knowledge.The use of technology has also revolutionized the way we evaluate teaching capabilities, with digital portfolios and online assessments becoming the norm. These platforms not only offer a convenient way to document a teacher's professional development but also allow for real-time feedback and collaboration among educators. Moreover, the integration of simulations and virtual classrooms in the assessment process offers a safe and controlled environment for teachers to demonstrate their classroom management and instructional strategies.Furthermore, the emphasis on continuous professional development has led to the inclusion of reflective practices in teacher assessment. This self-reflective component encourages educators to critically analyze their teaching methods, identify areas for improvement, and set personalgoals for growth. It is this introspective journey that ultimately shapes a teacher's pedagogical philosophy and enhances their ability to adapt to the diverse needs of their students.In addition to these, the involvement of stakeholders such as students, parents, and community members in the assessment process ensures that the evaluation of a teacher's performance is not only comprehensive but also aligned with the expectations of the educational community. This participatory approach fosters a sense of sharedresponsibility and commitment to the quality of education provided.Ultimately, the evolution of teacher assessment methods reflects a deeper understanding of the complexities involved in the teaching profession. It is a testament to our commitment to ensuring that our educators are not only well-equipped with the necessary skills but also possess the adaptability and resilience to thrive in the ever-changing world of education. As we continue to refine these assessment tools, we are not just evaluating teachers; we are investing in the future of our students and the legacy of our educational system.。
TIMIT
5 Output from T¯ I MIT 5.1 Hydrostatic Quantities . . . . . . . . . . . . . . . 5.1.1 The format of the hydrostatic output . . 5.2 Time Domain Hydrodynamic Quantities . . . . . 5.2.1 Format of the time domain hydrodynamic 5.3 Frequency Domain Hydrodynamic Quantities . . 5.3.1 Format of the frequency domain output .
T¯ I MIT
A panel-method program for transient wave-body interactions.
VERSION 4.0: For zero and forward speed analysis of a single body with any number of waterlines, arbitrary wave heading, generalized modes, and infinite or finite depth.
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
The development of T¯ I MIT has been supported by the Office of Naval Reseach, the Joint Industry Project “Wave Effects on Offshore Structures”, the Consortium for Numerical Analysis of Wave Effects on Offshore Structures, and the Naval Ship Warfare Center.
怎么表达评估的英语作文
怎么表达评估的英语作文Title: Techniques for Evaluating English Compositions。
Assessing English compositions requires a comprehensive approach that encompasses various aspects of writing, including grammar, vocabulary usage, coherence, and creativity. In this essay, we will explore several techniques commonly used to evaluate English compositions without disclosing the specific prompt.1. Grammar and Syntax Evaluation: One of the fundamental aspects of evaluating English compositions is assessing grammar and syntax. This includes examining the accuracy of sentence structures, subject-verb agreement, tense consistency, and proper use of punctuation marks. Evaluators look for grammatical errors such as run-on sentences, fragments, and agreement issues.2. Vocabulary and Language Use: A rich and varied vocabulary enhances the quality of writing. Evaluatorsassess the writer's choice of words, appropriateness of vocabulary for the context, and usage of synonyms to avoid repetition. They also consider the sophistication and precision of language employed in conveying ideas.3. Coherence and Organization: A well-structured composition is easy to follow and understand. Evaluatorslook for coherence in ideas and logical progression of arguments or narrative elements. They assess the effectiveness of transitions between paragraphs and sections, ensuring smooth flow and connection of thoughts throughout the composition.4. Content and Relevance: The content of thecomposition should be relevant to the given topic or prompt. Evaluators examine the depth of understanding demonstrated by the writer, the accuracy of information presented, and the extent to which the writer stays focused on the main theme or argument.5. Creativity and Originality: Originality adds valueto a composition. Evaluators appreciate creative approachesto expressing ideas, unique perspectives, and innovative solutions proposed by the writer. They assess the level of creativity demonstrated in the choice of language,narrative techniques, and presentation style.6. Critical Thinking and Analysis: Strong compositions often demonstrate critical thinking skills. Evaluators look for evidence of analytical thinking, ability to evaluate arguments, and capacity to support claims with relevant examples or evidence. They assess the depth of analysis and the writer's ability to draw meaningful conclusions.7. Audience Awareness and Tone: Effective communication requires consideration of the audience and appropriate tone. Evaluators assess whether the writer adapts the tone and style of writing to suit the intended audience. They lookfor evidence of awareness of cultural nuances, sensitivityto the reader's perspective, and engagement with the audience.8. Revision and Editing Skills: Lastly, evaluators consider the writer's ability to revise and edit their work.They look for evidence of careful proofreading, correctionof errors, and improvements made in response to feedback or self-reflection. Strong compositions often demonstrate attention to detail and a commitment to refining the writing.In conclusion, evaluating English compositions involves assessing multiple dimensions of writing, including grammar, vocabulary, coherence, content, creativity, critical thinking, audience awareness, and revision skills. By employing these techniques, evaluators can provide constructive feedback to help writers improve their writing proficiency.。
Contour integral calculations for generalised creep laws within Abaqus
Contour integral calculations for generalised creep laws within abaqusYun-Jae Kim *British Energy Generation Ltd,Structural Integrity Branch,Barnett Way,Barnwood,Gloucester GL43RS,UKReceived 4June 2001;revised 1September 2001;accepted 4September 2001AbstractThis paper reports time-dependent C t -integral calculations for generalised creep laws using the user subroutine CREEP within the general-purpose FE code,abaqus [abaqus Version er's Manual (1999)].The evaluation of the strain energy density rate function is emphasised.As examples,the external circumferential cracked cylinder subject to mechanical loading and combined mechanical and thermal loading was considered for two different generalised creep laws,the u -projection creep law and a secondary±tertiary creep law.The resulting abaqus C t -integral results were then compared with the results from another FE code,bersafe [bersafe User's Guides (1990)],to check reliability of the abaqus calculations.Excellent agreement between these results provides con®dence in the abaqus C t -integral calculation for generalised creep laws.q 2001Published by Elsevier Science Ltd.Keywords :abaqus ;Creep;C p -integral;C t -integral;Finite element;Generalised creep law1.IntroductionFinite element (FE)computations of contour integrals are of increasing importance in defect assessment of cracked structures.Very often such contour integrals can be easily obtained from commercial FE programs such as abaqus [1].For instance,for time-independent elastic±plastic problems,abaqus offers an ef®cient and robust routine to compute the J -integral using a domain integral method.Even for arbitrary stress±strain laws,calculation of the J -integral is straightforward,requiring only tabulated stress±plastic strain data.For defect assessment of components operating at high temperatures (in the creep regime),calculation of the C t -integral is needed.Within abaqus ,evaluation of the C t -integral is straightforward only for idealised creep laws such as the power law and the hyperbolic-sine law.However,creep-deformation properties of typical materials do not follow such idealised laws,but follow rather complex laws such as the u -projection law [3].Within abaqus ,calculation of the C t -integral for such generalised creep laws requires the user subroutine,and thus needs special care.This paper describes calculation of the time-dependentC t -integral for generalised creep laws using abaqus .The de®nition of the C t -integral is given in Section 2.Section 3brie¯y describes the C t -integral calculation for generalised creep laws within abaqus .Section 4provides numerical examples and comparison with the results from another FE code,bersafe [2].2.De®nition of contour integral,C tThe C t -integral is de®ned by a line integral [4]C tZG !0_Wd y 2T i 2_u i 2xd s1where the notation G !0is used to denote that the integral must be evaluated on a contour near the crack tip which is vanishingly small,to the extent that elastic strain rates are negligible compared with creep strain rates.In Eq.(1),T i are components of the traction vector;u i are the displacementrate vector components;and _Wis strain energy rate density (SERD)and is given by _W;Z _1cs d _1c2where s and _1c denote the equivalent Mises stress and the creep strain rate,respectively.Under wide-spread creep (steady state creep;t !1)conditions,the C p -integral,International Journal of Pressure Vessels and Piping 78(2001)661±6660308-0161/01/$-see front matter q 2001Published by Elsevier Science Ltd.PII:S0308-0161(01)00080-1/locate/ijpvp*Present address:School of Mechanical Engineering,SAFE Research Centre,Sungkyunkwan University,300Chunchun-dong,Jangan-gu,Suwon,Kyonggi-do 440-746,South Korea.Tel.:182-31-290-7459;fax:182-31-290-5276.E-mail address:kimy@nppsafe.skku.ac.kr (Y.-J.Kim).can be de®ned as C t !1 C pZ G_Wd y 2T i 2_u i 2xd s3which is independent of the path G when elastic strain rates are negligible throughout the body,by analogy between steady state creep and plasticity.It is well-known that the C t or C p parameters characterise the amplitude of the crack tip stress and strain ®elds under transient and steady state creep conditions,respectively.Although the notation C p is popularly used for steady state creep,the notation C t is used in the present work to cover not only transient creep but also steady state creep for consistency.3.abaqus creep calculations for generalised creep law Within abaqus ,for creep laws other than the power (Norton)law and hyperbolic-sine law,the user subroutine,CREEP,should be provided by the user to calculate the C t -integral.The CREEP subroutine requires coded infor-mation on the creep-deformation law,integration pro-cedures (such as strain-hardening law or time-hardening law)and other relevant information (such as Jacobians forimplicit calculations).More importantly,SERD,_W;de®ned in Eq.(2),should be provided by the user.For power lawcreep materials,_W can be analytically determined as _Wns _1c4where n is the strain exponent.For generalised creep laws,however,a correct estimate of _Wis not straightforward,and thus determination of _Wis given below.Integration by parts of Eq.(2)gives _W;Z _1cs d _1c s _1c2Z s_1cd s5The second term in Eq.(5)can be easily integratednumerically,if an explicit expression for _1c is available as a function of s .In general,the creep strain rate is not only a function of stress but also a function of either time (time-hardening)or creep strain (strain-hardening).Then integration of the second term in Eq.(5)should be performed either for a constant time or for a constant creep strain,depending on the hardening law.However,it should also be noted that,for generalised creep laws,a closed-form expression is likely to be available only for the time-hardening law.Noting that ef®ciency of the numerical integration strongly depends on whether a closed form expression is available or not,and that the contribution of the second term in Eq.(5)to the C t -integral would be generally small,the time-hardening expression can be used for numerical integration,even when the strain-hardening law is used to determine the creep strain rate.For such a case,however,the correct time resulting from the strain-hardening law should be used.4.Numerical examples and comparison with the bersafe results 4.1.Creep lawsTwo generalised creep laws were considered in the present work,the u -projection creep law and the secondary±tertiary creep law,which are described below.The u -projection constitutive law is described by1c u 1 12e 23600u 2t 1u 3 e 3600u 4t 21 ;log 10u i a i 1b i T 1c i s 1d i s T ;i 1±46where 1c is creep strain in absolute units,s is the applied stress in MPa,t is time in hours and T is temperature in Kelvin.Values of u i used in the present work are for typical Cr±Mo±V ferritic steels at 5658C [3]:a 1 28:736;b 1 0:004604;c 1 20:04489;d 1 0:6814£1024a 2 223:46;b 2 0:02225;c 2 0:02195;d 2 20:1951£1024a 3 21:869;b 3 20:002034;c 3 20:05497;d 3 0:799£1024a 4 216:43;b 4 0:009149;c 4 20:04723;d 4 0:719£1024(7)The secondary±tertiary creep law,on the other hand,isdescribed by1c A s n t 1B s n t p A 1:908£10217;B 7:43£10224;n 5:4;p 2:3648where s is in MPa and t in hours.In Eq.(8),the ®rst term represents the secondary creep part,whereas the second term is the tertiary creep part.Y.-J.Kim /International Journal of Pressure Vessels and Piping 78(2001)661±666662Fig.1.The geometry considered in the present work,ECCC with a =t 0:125:The ®gure also shows the temperature distribution for the thermal load.4.2.abaqus elastic-creep FE analysisAn external circumferential cracked cylinder (ECCC)with the crack length to pipe thickness,a =t 0:125;was considered,as shown in Fig.1.Relevant dimensions used in the present calculation are as follows.The outside radius and inside radius of the pipe,R o and R i ,are 600and 500mm,respectively,giving the ratio of the mean radius to the thickness,R m =t 5:5:Elastic-creep analyses of the FE model were performed using the small geometry change option within abaqus [1].A combined explicit and implicit integration scheme was used for the creep calculations for computational ef®ciency.Reduced integration 8node elements (CAX8R)were used within abaqus .At the crack tip,a focused mesh was used for all cases.Fig.2depicts the FE mesh used for the present abaqus calculation.The u -projection and the secondary±tertiary creep constitutive laws,described in Section 4.1,were implemented into the user subroutine CREEP based on the strain hardening law for the u -projection law and based on the time hardening law for the secondary±tertiarycreep law.The SERD _Wwas estimated according to the procedure given in Section 3,using the ®ve-point Gaussian quadrature scheme.For instance,for the u -projection law,described by Eq.(6),Eq.(5)was used to evaluate _Wwith the equivalent Mises stress s ,determined from the FE calculation,and the creep strain rate _1c as_1c 3600b u 1u 2e 23600u 2t 1u 3u 4e 3600u 4t c9As the strain-hardening law was used to determine the creep strain rate for the present case,the time t in Eq.(9)was determined according to the strain-hardening law.For the secondary±tertiary creep law,Eq.(8),a similar approach was taken with _1c A s n 1Bp s n t p 21 10with the time t ,determined according to the time-hardening law.Both mechanical loading and combined mechanical and thermal loading were applied to investigate the effect of the loading type on C t -integral calculations.For mechanicalY.-J.Kim /International Journal of Pressure Vessels and Piping 78(2001)661±666663Fig.2.A FE mesh used in the present work.Table 1Summary of problems for abaqus elastic-creep calculations (the thermal load case consists of an axial temperature gradient (constant through thickness)varying linearly from 15008C at the crack tip to 08C at the top edge (see Fig.1))Case Creep lawLoad a Geometry/load type Designation 1u -projection lawM ECCC axial (P 14:95MN)QP-A502M 1T ECCC axial(P 14:95MN)1Thermal QP-AT503Secondary±tertiary lawM ECCC axial (P 14:95MN)ST-A504M 1TECCC axial(P 14:95MN)1ThermalST-AT50aM:mechanical;M 1T:combined mechanical and thermal.loading,a constant axial load of P 14:947MN was applied at the end of the pipe at time t 0:The load was then held constant and a subsequent time-dependent creep calculation was performed.On the other hand,for combined mechanical and thermal loading,the axial temperature gradient,shown in Fig.1,was superimposed on the mechanical (axial)load of P 14:947MN at t 0:Then these loads were held constant and a subsequent time-dependent creep calculation was performed.The thermal expansion coef®cient a 1:432£1026is used,which gives a ratio of the total stress intensity factor (SIF)to the mechanical SIF equal to 2,K t =K m 2;at the time t 0:These two loading conditions were applied for both theu -projection law and the secondary±tertiary creep law,thus giving a total of four cases,summarised in Table 1.The time-dependent C t -integrals can be easily extracted from the abaqus FE results,as a function of time t .Prior to steady state creep conditions (under transient creep condi-tions),the C t -integral from abaqus exhibits signi®cant path-dependence,and should be extrapolated to zero radius,corresponding to a contour shrunk onto the crack tip or crack front,according to its de®nition,see Eq.(1).As the steady state creep condition is reached,the abaqus C t results are almost path-independent.4.3.bersafe elastic-creep FE analysisTo check the reliability of the abaqus C t -integral calcu-lations for the generalised creep laws,the results should be compared with reference results.However,no result has yet been reported on such calculations using abaqus ,as far as the author's knowledge.In this context,the Nuclear Electric FE code,bersafe [2],is worth noting.Extensive validation for calculating the C t -integral for generalised creep laws using the bersafe code (see e.g.Ref.[5])has provided suf®cient con®dence in its contour integral results.Brief descriptions on the C t -integral calculation within bersafe are given below.bersafe actually calculates the D T -integral,proposed by Atluri [6],which is the general path-independent integral including ®nite deformation,material acceleration,and arbitrary traction and displacement conditions on the crack faces.It is clear that the C t -integral (or C p -integral)is included in D T as a special case [7].Within bersafe ,the values of the D T -integral are calculated using a domain integral approach.For the problems given in Section 4.2,Linkens [8]has already performed elastic-creep calculations using bersafe .Con®dence in the bersafe contour integral results was gained from the fact that the calculated values of D T (or equivalently the C t -integral)were almost path-independent (within 1%for eight contours)for all cases at all times (even under non-steady creep conditions)[8].These results were extracted directly from Linkens [8].4.4.ResultsTo normalise the results,the redistribution time,t red ,for the generalised creep laws is de®ned as1c s ref ;t reds ref E;s ref PP L sy 11where the reference stress s ref is determined by the plasticlimit load P L using the limiting stress of s y .The expression of P L for the present problem was taken from [9]:P L s y p b R o 2a 22R 2i c12Noting that P L is linearly dependent on s y ,evaluation of s ref does not depend on s y ,as can be seen from Eq.(11).Y.-J.Kim /International Journal of Pressure Vessels and Piping 78(2001)661±666664Table 2Values of the estimated reference stress s ref and t red for generalised creep laws,and the corresponding C B t t red Designation s ref (MPa)t red (h)C B t t red (N/mm/h)QP-A505064007:13£1025ST-A505081006:5£1025parison of the abaqus C t -integral results with the bersafe results [9]for the u -projection law:(a)under axial (mechanical)load,and (b)under combined axial (mechanical)and thermal load.According to the de®nition of t red in Eq.(11),it depends only on the mechanical load,not on the thermal load.Although t red will be in fact affected when thermal stresses are present, such effect is not considered in the present paper,and values of t red are determined based only on the mechanical load.The values of s ref and t red for the present problems are given in Table2.The C t values are normalised with respect to the C t values at t t red;determined from bersafe,C B t t red ;which are also given in Table2. Fig.3compares the abaqus C t results with the bersafe results[8]for the u-projection law under axial(mechanical) load,and under combined axial(mechanical)and thermal load.Excellent agreement between the abaqus results and the bersafe results can be seen for both cases,not only in steady state creep but also in non-steady state creep.Fig.4 provides corresponding results for the secondary±tertiary law,which again shows excellent agreement.One notable point in Figs.3and4is that the steady state values of C t (i.e.the values of C t for t q t red)do not remain constant,but change with time.The notion that the steady state values of C t (or C p)are constant for t q t red is valid only for case where the creep strain rate does not depend on time,such as for the power-law creep materials.For the u-projection creep law and the secondary±tertiary creep law,considered in the present work,the creep strain rate does depend on time,and thus the steady state values increase with time,due to the effect of the tertiary creep part.It is well-known that,for creep laws with separable functions of stress and time such as Eq.(8),there is a steady state stress distribution,and thus C p or C t varies simply according to the time variation in the creep strain law in the steady state.Thus for Eq.(8),C t will behave for long times asC pC p S11Bpt p21A13where C p S denotes the steady state(constant)C p value for the secondary creep part.In Fig.4,Eq.(13)is compared with the present FE results and the bersafe results,and good agreement is obtained.5.Concluding remarksThis paper reports time-dependent C t -integral calcula-tions for generalised creep laws using the user subroutine CREEP within the general-purpose FE code,abaqus. Emphasis is made on the evaluation of the strain energy density rate function.As examples,the ECCC subject to mechanical loading and combined mechanical and thermal loading was considered for two different generalised creep laws,the u-projection creep law and a secondary±tertiary creep law.The resulting abaqus C t -integral results were then compared with the results from another FE code, bersafe,to check reliability of the abaqus calculations. Excellent agreement between these results provides con-®dence in the abaqus C t -integral calculation for generalised creep laws.The present results are very useful in future development of defect assessment methods for components operating at high temperatures(in the creep regime),incorporating realistic creep-deformation data.AcknowledgementsThis paper is published by permission of British Energy Generation Ltd.References[1]abaqus er's manual.RI:Hibbitt,Karlsson&SorensenInc.,1999.[2]bersafe users guides,vols.1±9.Nuclear Electric,1990.[3]Evans RW,Wilshire B.Creep of metals and alloys.London:Instituteof Metals,1985.[4]Riedel H.Fracture at high temperatures.Berlin:Springer,1987.[5]R5:assessment procedure for the high temperature response ofstructures(Issue2).British Energy Generation Ltd,1999.[6]Atluri SN.Path-independent integrals in®nite elasticity andinelasticity,with body forces,inertia,and arbitrary crack-face conditions.Engng Fract Mech1982;16:341±69.Y.-J.Kim/International Journal of Pressure Vessels and Piping78(2001)661±666665[7]Stonesifer RB,Atluri SN.On a study of the(D T)c and C p integrals forfracture analysis under non-steady creep.Engng Fract Mech 1982;16:625±43.[8]Linkens D.Non-steady creep of externally circumferentially crackedcylinder(ECCC,a=w 1=8),u-projection creep law.WSAtkins Engineering Sciences Report M1670/R01,1992.[9]Miller AG.Review of limit loads of structures containing defects.Int JPressure Vessels Piping1998;32:191±327.Y.-J.Kim/International Journal of Pressure Vessels and Piping78(2001)661±666 666。
作文阅卷仲裁 阈值
作文阅卷仲裁阈值英文回答:As an essay scorer, the threshold for arbitration in essay grading is an important consideration. The threshold refers to the minimum score a student must achieve in order to pass or meet the criteria for a particular level of proficiency. It serves as a benchmark to ensure consistency and fairness in the grading process.In the context of essay grading, the threshold is often determined by the specific requirements and rubrics provided by the examination board or educational institution. These requirements outline the key elements and criteria that essays should address in order to receive a passing score. They may include factors such as content, organization, language proficiency, and critical thinking skills.When it comes to arbitration, the threshold plays acrucial role in determining whether an essay should be re-evaluated or given a higher score. If an essay is on the borderline of meeting the criteria, the arbitrator will carefully review the content and language proficiency to make a fair judgment. This ensures that students are not unfairly penalized or rewarded based on slight variationsin scoring.In some cases, the threshold may be adjusted based on the difficulty level of the prompt or the overall performance of the test-takers. For example, if the prompt is particularly challenging, the threshold may be lowered to account for the increased difficulty. On the other hand, if the majority of test-takers perform exceptionally well, the threshold may be raised to maintain a certain level of rigor.Overall, the threshold for arbitration in essay grading is a crucial aspect of ensuring fairness and consistency in the evaluation process. It helps maintain the integrity of the scoring system and provides students with a fair opportunity to demonstrate their skills and knowledge.中文回答:作为一名作文评分员,阈值在作文评分的仲裁中是一个重要的考虑因素。
批判质疑能力量化评估作文
批判质疑能力量化评估作文英文回答:Critical Considerations in Quantifying Argumentative Writing:Validity, Reliability, and Generalizability:Quantifying argumentative writing faces challenges in ensuring the validity, reliability, and generalizability of assessments. The selection of criteria for evaluation, the subjectivity of raters, and the limited scope of quantifiable aspects of writing can lead to concerns about the accuracy and consistency of scoring.Reductionism and Oversimplification:Quantifying argumentative writing runs the risk of reducing its complexity to a set of numerical measures, potentially oversimplifying the multifaceted nature of thepersuasive process. By focusing on quantifiable elements, important qualitative aspects, such as the writer's voice, rhetorical strategies, and impact on the reader, may be overlooked or devalued.Contextual Factors and Individuality:Quantified assessments often fail to account for contextual factors that influence argumentation, such as the audience, purpose, and rhetorical situation. This can lead to unfair or inaccurate evaluations that overlook the unique strengths and weaknesses of individual writers.Impact on Writing Instruction:A focus on quantifying argumentative writing can have unintended consequences for writing instruction. By emphasizing measurable criteria, educators may prioritize these aspects at the expense of fostering creativity, critical thinking, and the development of a nuanced understanding of argumentation.Limitations of Current Practices:Current methods for quantifying argumentative writing often rely on superficial measures, such as word count or sentence length, which provide limited insight into the quality of the writing. More sophisticated approaches are needed that capture the complexity of argumentation.中文回答:论证性写作量化评估的批判。
价值评价 英文作文
价值评价英文作文Title: Evaluating Values。
In a world inundated with diverse perspectives and beliefs, the task of evaluating values becomes increasingly complex. Values serve as guiding principles that shape individuals' behaviors, decisions, and interactions with the world around them. However, the criteria by which we evaluate these values can vary greatly, influenced by cultural, social, and personal factors. This essay explores the intricacies of value evaluation, examining different approaches and their implications.One prominent framework for evaluating values is through the lens of morality. Morality encompasses principles of right and wrong, guiding individuals' actions towards what is perceived as virtuous or ethical. Within this framework, values are often assessed based on their alignment with moral principles such as fairness, compassion, and justice. For example, a value promotingequality may be highly regarded in societies thatprioritize fairness and social justice.Another approach to value evaluation revolves around their impact on individual well-being and societal progress. Values that contribute to personal fulfillment, happiness, and the advancement of society are often esteemed. For instance, the value of education is highly valued in many cultures due to its positive effects on personal growth and societal development.Moreover, the context in which values are applied plays a crucial role in their evaluation. What may be considereda valuable trait or principle in one context may not holdthe same significance in another. For instance, the valueof collectivism may be cherished in cultures that emphasize community cohesion, while individualism may be prioritizedin societies that value personal autonomy and achievement.Furthermore, the dynamic nature of values necessitates ongoing evaluation and adaptation. As societies evolve and confront new challenges, the relevance and significance ofcertain values may shift. For example, the growing awareness of environmental issues has led to an increased emphasis on values such as sustainability and environmental stewardship.Individuals also play a key role in the evaluation of values, as their beliefs, experiences, and priorities shape their perception of what is valuable. Personal values often stem from a combination of cultural upbringing, life experiences, and individual reflection. Therefore, two individuals may assess the same value differently based on their unique perspectives and circumstances.In addition to personal beliefs, external influences such as media, education, and peer groups can also shape value evaluation. For instance, media portrayals of certain lifestyles or behaviors can influence individuals' perceptions of what is desirable or admirable. Similarly, educational institutions play a crucial role in instilling values such as tolerance, empathy, and critical thinking in future generations.Ethical considerations also come into play when evaluating values, particularly in instances where conflicting values arise. For example, the value of freedom of expression may clash with the value of protecting marginalized communities from harm. In such cases, individuals and societies must navigate complex moral dilemmas and weigh the consequences of their choices.In conclusion, evaluating values is a multifaceted process influenced by moral principles, societal norms, individual beliefs, and contextual factors. While there is no one-size-fits-all approach to value evaluation,fostering open dialogue, critical thinking, and empathy can facilitate meaningful discussions about the values that shape our lives and societies. By engaging in thoughtful reflection and respectful discourse, we can strive towards a shared understanding of what is truly valuable in our increasingly interconnected world.。
英语作文阅卷仲裁 阈值
Part 1:As an English language teacher, one of the most challenging tasks is to grade essays and provide feedback to students. In order to maintain fairness and consistency in grading, teachers often use a system of threshold marking, or a set of criteria that determine the grade a student will receive. This threshold marking system ensures that students are assessed objectively and fairly, without any bias or subjectivity.The threshold marking system typically consists of a set of criteria that are used to evaluate the quality of a student's writing. These criteria may include grammar, vocabulary, organization, coherence, clarity, and overall argumentation. Each criterion is assigned a certain weight or value, and the student's essay is evaluated based on how well it meets these criteria.For example, in evaluating a student's grammar, the teacher may look at the use of verb tenses, subject-verb agreement, sentence structure, and punctuation. If the student's essay has multiple errors in grammar, it may receive a lower grade compared to an essay that is free from grammatical errors. Similarly, in evaluating the student's vocabulary, the teacher may consider the range of vocabulary used, the appropriateness of word choice, and the use of academic language. A student whouses a rich and varied vocabulary may receive a higher grade compared to a student who uses repetitive or inappropriate language.In addition to these criteria, the threshold marking system may also consider the overall coherence and structure of the essay. A well-structured essay that presents a clear argument, supports its claims with evidence, and has a logical flow of ideas may receive a higher grade compared to an essay that lacks coherence and organization.One of the benefits of using a threshold marking system is that it allows for consistency in grading across different teachers and classes. By providing clear criteria for evaluation, teachers can ensure that all students are assessed using the same standards, regardless of who is grading their essays. This helps to eliminate any potential bias or subjectivity in grading, and ensures that students are evaluated fairly based on their writing skills.However, it is important to note that the threshold marking system is not without its limitations. In some cases, students may fall just below the threshold for a higher grade, even if their writing is of a relatively high quality. This can be frustrating for students who feel that their efforts have not been adequatelyrecognized. Additionally, the threshold marking system may not account for the individual strengths and weaknesses of each student, as it is based on a set of general criteria.In conclusion, the threshold marking system is an effective tool for assessing student writing in a fair and objective manner. By providing clear criteria for evaluation, teachers can ensure that all students are assessed using the same standards, and that grading is consistent across different classes and teachers. While the system may have its limitations, it is a valuable tool for promoting fairness and consistency in the assessment of student writing skills.Part 2:Essay: English Composition Scoring and ThresholdsWhen it comes to grading English compositions, teachers and examiners often struggle to determine the most appropriate threshold for scoring. Some believe that a strict threshold is necessary to maintain high standards and ensure that students are challenged to reach their full potential. Others argue that a more lenient threshold is needed to account for individual differences and provide a fair opportunity for all students to succeed. In this essay, we will explore the pros and cons ofdifferent scoring thresholds and examine how they can impact the assessment of English compositions.One of the arguments in favor of a strict threshold for scoring English compositions is that it pushes students to strive for excellence and produce high-quality work. When students know that they will only receive a high score if their writing meets certain criteria, they are encouraged to put in the effort and attention to detail necessary to meet those standards. This can lead to better writing skills, improved language proficiency, and a deeper understanding of the subject matter being studied. In addition, a strict threshold can help to maintain consistency in grading and ensure that all students are held to the same high standards.On the other hand, a lenient threshold for scoring English compositions can also have its benefits. A more flexible scoring system allows for a greater range of writing styles and abilities to be recognized and valued. It can also provide students with the opportunity to showcase their unique qualities and perspectives, rather than conforming to a rigid set of criteria. A lenient threshold can help to foster creativity, critical thinking, and independent expression in students, encouraging them to take risks and explore new ideas in their writing. Furthermore, a moreforgiving scoring system can be more inclusive and equitable, giving all students a fair chance to demonstrate their skills and knowledge.Ultimately, the ideal threshold for scoring English compositions will depend on the goals of the assessment and the needs of the students being evaluated. In some cases, a strict threshold may be necessary to maintain high standards and challenge students to excel. In other situations, a more lenient threshold may be appropriate to encourage creativity, diversity, and individual expression. Regardless of the scoring threshold chosen, it is important for teachers and examiners to be transparent about their criteria and communicate clearly with students about how their work will be evaluated.In conclusion, scoring English compositions is a complex and multifaceted process that requires careful consideration of the threshold used for assessment. Both strict and lenient thresholds have their advantages and drawbacks, and the best approach will depend on the specific context and objectives of the evaluation. By considering the needs and abilities of students, teachers and examiners can determine the most appropriate threshold for scoring English compositions and provide meaningful feedback that supports learning and growth.Part 3:Title: English Essay Scoring and Arbitration ThresholdAs an English language teacher, I have experienced numerous occasions where I have had to grade essays written by my students. Grading essays can sometimes be a subjective task, but there are certain criteria that we as teachers use to ensure fairness and consistency in our grading. One of the key factors that come into play when scoring essays is the arbitration threshold.The arbitration threshold is the point at which an essay is considered to be either above or below a certain standard. When grading essays, teachers often use a set of criteria to determine whether an essay meets the expected level of proficiency. These criteria can vary depending on the type of essay and the grade level of the student. However, the arbitration threshold is the minimum level of proficiency that an essay must meet in order to receive a passing grade.For example, when grading a persuasive essay, teachers may look for elements such as a clear thesis statement, logical arguments, and use of persuasive language. If an essay fails tomeet these criteria, it may fall below the arbitration threshold and receive a lower grade.On the other hand, if an essay exceeds the expectations set by the arbitration threshold, it may receive a higher grade. This could be due to factors such as well-developed arguments, sophisticated language use, and a thorough analysis of the topic.The arbitration threshold is an important tool for English teachers as it helps to ensure fairness in grading. By having a clear standard of proficiency, teachers can make more objective judgments about the quality of the essays they receive. This can help to prevent bias and ensure that all students are graded on a level playing field.In addition, the arbitration threshold can also help students understand what is expected of them when writing essays. By knowing the minimum level of proficiency required to pass, students can work towards meeting and exceeding that standard. This can help to motivate students to improve their writing skills and strive for excellence in their work.Overall, the arbitration threshold plays a crucial role in the grading of English essays. By providing a clear standard of proficiency, it helps to ensure fairness and consistency in grading, as well as motivating students to reach their full potential. AsEnglish teachers, it is important for us to be aware of the arbitration threshold and to use it effectively in our grading practices.。
英语作文阅卷仲裁 阈值
英语作文阅卷仲裁阈值As an English essay grader, setting the threshold for evaluating writing is not a simple task. (作为英语作文阅卷者,设定评判写作的阈值并不是一件简单的任务。
) There are multiple factors to consider when determining the threshold for evaluating English essays. (确定英语作文评判的阈值时需要考虑多个因素。
)First and foremost, language proficiency is a key factor in setting the threshold for English essay grading. (首要的是,语言水平是设定英语作文评分阈值的关键因素。
) The ability to effectively convey ideas, articulate thoughts, and utilize a wide range of vocabulary and grammatical structures is essential for a high-quality English essay. (有效传达思想,表达思路,以及运用丰富的词汇和语法结构对于优质英语作文至关重要。
) Therefore, the threshold for language proficiency should be set at a level that reflects a strong command of the English language. (因此,语言水平的阈值应该设定在反映对英语语言有很强的驾驭能力的水平上。
)In addition to language proficiency, content and organization play a significant role in determining the threshold for evaluating Englishessays. (除了语言水平,内容和组织在确定英语作文评分阈值上也起着重要的作用。
对成绩有疑问该英语作文
对成绩有疑问该英语作文In the academic world, grades are often seen as the ultimate measure of a student's performance and success. They are used to determine academic standing, eligibility for scholarships, and future opportunities. However, there are times when a student may have doubts or questions about the grades they have received. This can be a challenging situation, as it requires the student to navigate the complex process of addressing their concerns and advocating for themselves.One of the primary reasons a student may question their grades is if they feel that the assessment or grading process was not fair or accurate. This could be due to a variety of factors, such as the instructor's grading criteria being unclear, the instructions for an assignment being ambiguous, or the student feeling that their work was not properly evaluated. In such cases, it is important for the student to approach the situation with a calm and rational mindset, and to gather evidence to support their concerns.Another reason a student may question their grades is if they believethat their performance on an assignment or exam did not accurately reflect their true understanding of the material. This can be particularly frustrating for students who have put in a significant amount of effort and believe that their grade does not adequately reflect their knowledge and skills. In these situations, the student may need to carefully review their work, seek feedback from the instructor, and potentially request a re-evaluation of their assignment or exam.Regardless of the specific reasons for questioning a grade, it is important for students to approach the process with professionalism and respect. This means carefully reviewing the grading criteria, gathering any relevant evidence or documentation, and scheduling a meeting with the instructor or academic advisor to discuss the concerns. During the meeting, the student should be prepared to articulate their concerns clearly and objectively, and to listen to the instructor's perspective with an open mind.In some cases, the instructor may be able to provide additional feedback or clarification that helps the student understand the reasoning behind the grade. In other cases, the instructor may agree to re-evaluate the student's work or to provide an opportunity for the student to demonstrate their understanding in a different way. Ultimately, the goal should be to arrive at a fair and accurate assessment of the student's performance, and to ensure that thegrade they receive is a true reflection of their learning and abilities.It is important to note that the process of questioning a grade can be stressful and emotionally challenging for some students. They may feel that they are being confrontational or that their concerns will not be taken seriously. However, it is important for students to remember that advocating for themselves is a valuable skill that can serve them well throughout their academic and professional careers.One way for students to approach the process of questioning a grade with confidence is to familiarize themselves with the institution's policies and procedures for addressing grade disputes or concerns. Many schools have established protocols for students to follow, which can help to ensure that their concerns are addressed in a fair and transparent manner. Additionally, students may want to seek support from academic advisors, tutors, or other resources on campus that can provide guidance and assistance throughout the process.In conclusion, questioning a grade can be a complex and challenging process, but it is often necessary to ensure that a student's performance is accurately and fairly assessed. By approaching the situation with professionalism, objectivity, and a willingness to engage in constructive dialogue, students can advocate for themselves and work towards a resolution that is satisfactory for allparties involved. Ultimately, the ability to question and advocate for oneself is a valuable skill that can serve students well throughout their academic and professional careers.。
关于大学审核评估的英语作文
The Importance and Challenges of UniversityAudit and EvaluationIn the modern era of higher education, university audit and evaluation have become crucial processes that not only assess the quality of education but also ensure the institution's compliance with national and international standards. This paper aims to explore the significance of university audit and evaluation, the challenges it faces, and the potential solutions to these challenges.The significance of university audit and evaluationlies in its ability to provide a comprehensive overview of an institution's academic, administrative, and financial performance. Through rigorous audits, universities can identify areas of excellence that require further development and areas that need improvement. This process not only helps universities maintain their quality standards but also enhances their reputation and attracts potential students and researchers.Moreover, university audit and evaluation contribute to the development of a transparent and accountable higher education system. By making the evaluation processtransparent, universities can demonstrate their commitment to quality education and good governance. This, in turn, builds trust among stakeholders, including students, parents, governments, and funding agencies.However, despite its significance, university audit and evaluation face several challenges. One of the primary challenges is the complexity of the evaluation process. University audits often involve multiple stakeholders with varying interests and expectations, making it difficult to achieve a consensus on evaluation criteria and standards. Another challenge is the resource constraints faced by universities. Conducting audits and evaluations requires significant financial and human resources, which may be limited for institutions with limited funding. This can lead to compromised evaluation processes or the exclusion of important areas from the evaluation scope.To address these challenges, universities can adopt a number of strategies. Firstly, they can involve all stakeholders in the evaluation process, ensuring that their voices and interests are heard and considered. This canhelp build consensus and trust among stakeholders, making the evaluation process more inclusive and effective.Secondly, universities can leverage technology to improve the efficiency and effectiveness of their audit and evaluation processes. For instance, they can use data analytics tools to identify patterns and trends in evaluation data, enabling them to make informed decisions and allocate resources more efficiently.In conclusion, university audit and evaluation are crucial processes that play a pivotal role in ensuring the quality and accountability of higher education institutions. While they face numerous challenges, universities can overcome these by involving stakeholders, leveraging technology, and allocating sufficient resources to the evaluation process. By doing so, universities can maintain their standards, enhance their reputation, and contributeto the development of a transparent and accountable higher education system.**大学审核评估的重要性与挑战**在现代高等教育时代,大学审核评估已成为至关重要的过程,它不仅评估教育质量,还确保机构符合国家和国际标准。
不定积分英语文献
不定积分英语文献Indefinite Integration: An Overview。
Indefinite integration is a fundamental concept in calculus that involves finding antiderivatives or primitives of functions. It plays a crucial role in various areas of mathematics and has numerous applications in physics, engineering, economics, and other fields. In this article, we will explore the concept of indefinite integration, its significance, and some common techniques used to evaluate indefinite integrals.To begin with, let's understand what an indefinite integral represents. An indefinite integral, also known as an antiderivative, is the reverse process of differentiation. It involves finding a function whose derivative is equal to the given function. The symbol used to represent an indefinite integral is ∫, and the function to be integrated is written after the symbol.Indefinite integration is closely related to definite integration, which involves finding the area under a curve between two points. However, unlike definite integration, indefinite integration does not have any specific limits of integration. Instead, it gives a family of functions that differ by a constant value known as the constant of integration.The constant of integration arises due to the fact that the derivative of a constant is always zero. When we integrate a function, we obtain a family of functions that differ only by a constant value. This constant represents the arbitrary additive constant that can be added or subtracted from the antiderivative without affecting its derivative.Now, let's discuss some common techniques used to evaluate indefinite integrals. One of the most basic techniques is the power rule, which states that the integral of x^n is (x^(n+1))/(n+1), where n is any real number except -1. This rule is derived from the reverse process of differentiating monomials.Another important technique is integration by substitution, also known as u-substitution. It involves substituting a variable within the integral to simplify theexpression. The choice of the substitution variable depends on the complexity of the integrand. By selecting an appropriate substitution, we can transform the integral into a simpler form that can be easily evaluated.Integration by parts is another commonly used technique in indefinite integration. It is based on the product rule of differentiation and involves splitting the integrand into two parts and applying the formula ∫(u dv) = uv ∫(v du), where u and v are functions of the variable being integrated. This technique is particularly useful when the integrand consists of a product of functions.Trigonometric substitution is another powerful technique used to evaluate integrals involving trigonometric functions. It involves substituting trigonometric identities to simplify the integral and express it in terms of basic trigonometric functions such as sine and cosine.Apart from these techniques, there are several other methods, such as partial fractions, improper integrals, and numerical methods, that are used to evaluate indefinite integrals depending on the nature of the function.In conclusion, indefinite integration is a fundamental concept in calculus that involves finding antiderivatives of functions. It is widely used in various fields and has numerous applications. By understanding the concept of indefinite integration and mastering the techniques to evaluate indefinite integrals, one can solve a wide range of problems in mathematics, physics, and engineering. So, embrace the power of indefinite integration and unlock the doors to a deeper understanding of the mathematical world.。
数学不合格给予建议英语作文
IntroductionMathematics, a subject that embodies the principles of logic, precision, and abstraction, is an integral part of any educational curriculum. However, encountering difficulties in math is not uncommon, with many students struggling to meet the desired academic standards. This essay provides a comprehensive analysis of factors contributing to math underachievement and offers constructive guidance to address these challenges, ensuring a multi-faceted and high-quality approach towards improvement.1. Understanding the Root Causesa. Conceptual Misunderstandings: A fundamental reason behind math underachievement lies in the lack of a solid grasp of core mathematical concepts. Students may struggle with topics such as fractions, algebraic expressions, or geometry due to inadequate initial explanations or insufficient practice, leading to a weak foundation upon which subsequent learning is built.b. Fear and Anxiety: The 'math phobia' phenomenon is pervasive, often stemming from negative experiences, societal stereotypes, or the perception of math as an inherently difficult subject. This psychological barrier can significantly impede learning, as stress hampers cognitive processing and memory retention.c. Inadequate Study Habits: Effective study habits, such as regular review, self-testing, and time management, are crucial for math success. Students who lack these skills may struggle to retain information, comprehend complex problems, or manage the workload efficiently.d. Insufficient Teacher Support: Teachers play a pivotal role in fostering math proficiency. Inadequate teaching methods, limited individual attention, or a lack of enthusiasm for the subject can negatively impact students' engagement and understanding.e. Limited Exposure to Real-World Applications: Math is often taught in isolation, devoid of meaningful connections to real-life situations. This canhindering their motivation and performance.2. Multi-Faceted Approach to Improvementa. Strengthening Conceptual Understanding: Emphasize the importance of building a strong foundation by revisiting and solidifying core concepts. Encourage the use of visual aids, analogies, and real-world examples to enhance understanding. Additionally, promote active learning strategies like group discussions, problem-solving sessions, and peer tutoring, which facilitate deeper comprehension and retention.b. Addressing Math Anxiety: Foster a positive attitude towards math by highlighting its practical applications, emphasizing that everyone can learn math with persistence and appropriate support. Implement stress-management techniques, such as mindfulness exercises and growth mindset interventions, to help students overcome anxiety. Also, encourage a supportive classroom environment where mistakes are seen as opportunities for learning rather than failures.c. Developing Effective Study Habits: Teach students essential study skills, such as summarizing key concepts, creating concept maps, and using flashcards for memorization. Promote self-assessment through regular practice tests and quizzes. Also, emphasize time management strategies, like prioritizing tasks, setting realistic goals, and allocating dedicated study time.d. Enhancing Teacher Support: Invest in teacher professional development programs focusing on innovative teaching methodologies, effective communication, and strategies to cater to diverse learning styles. Encourage teachers to provide individualized feedback, monitor progress closely, and maintain open lines of communication with students and parents.e. Bridging the Gap between Theory and Practice: Integrate real-world problems and applications into math lessons, showcasing the subject's relevance in fields like engineering, economics, and environmental studies. Organize field trips, invite industry professionals for guest lectures, or engage students in project-based learning activities to foster a tangible connection with math.3. Utilizing External Resourcesa. Online Learning Platforms: Leverage digital resources, such as Khan Academy, Coursera, or Mathway, which offer interactive tutorials, adaptive practice exercises, and instant feedback, allowing students to learn at their own pace and revisit challenging topics.b. Tutoring and Mentoring: Engage professional tutors or peer mentors who can provide personalized guidance, address specific weaknesses, and instill confidence in students. Online tutoring platforms and community-based mentoring programs can be valuable resources.c. Parental Involvement: Encourage parents to participate in their child's math education by discussing schoolwork, monitoring progress, and providing a conducive home environment for studying. Parent-teacher conferences, workshops, and resource materials can empower parents to support their children effectively.ConclusionAddressing math underachievement necessitates a holistic approach that encompasses understanding the root causes, implementing targeted interventions, utilizing external resources, and fostering a collaborative effort among educators, students, and parents. By adopting these strategies, we can pave the way for students to overcome their challenges, develop a genuine appreciation for mathematics, and ultimately achieve academic success in this vital subject. While transforming math performance is a multifaceted and ongoing process, the rewards – enhanced critical thinking, problem-solving abilities, and career prospects – are invaluable.(Word count: 974)Please note that the word count exceeds the specified limit due to the comprehensive nature of the topic and the requirement for a detailed analysis and guidance. If necessary, the content can be condensed or tailored to fit the desired length while maintaining its essence and effectiveness.。
Estimates for singular integrals along surfaces of revolution
arXiv:0809.3315v1 [math.CA] 19 Sep 2008
SHUICHI SATO
Abstract. We prove certain Lp estimates (1 < p < ∞) for non-isotropic singular integrals along surfaces of revolution. The singular integrals are defined by rough kernels. As an application we obtain Lp boundedness of the singular integrals under a sharp size condition on their kernels. We also prove a certain estimate for a trigonometric integral, which is useful in studying non-isotropic singular integrals.
∆∞
where Z denotes the set of integers. We define h
= h
L∞ (R+ ) ).
2000 Mathematics Subject Classification. Primary 42B20, 42B25. Key Words and Phrases. Non-isotropic singular integrals, extrapolation, trigonometric integrals.
A Needed Narrowing Strategy
1
Introduction
Declarative programs are more abstract than equivalent imperative programs. Declarative languages replace pointers with algebraic data types, split complex computations into small, easily parameterizable units and avoid the manipulation of an explicit state through assignments. These features promise to ease some difficult essential tasks of software development. For example, they simplify reasoning about programs (verification of non-executable specifications), promote freedom of implementation (use of parallel architectures), and reduce both development time and maintenance efforts (code is compact and easier to read and understand). All these advantages stem from various factors—the most important being the solid mathematical foundations of declarative computing paradigms. Currently, the field of declarative programming is split into two main paradigms based on different mathematical formalisms: functional programming (lambda calculus) and logic programming (predicate logic). This situation has a negative impact on teaching, research and applications. Usually there are different courses on functional programming and logic programming, and students do not perceive the similarities between them. In terms of research, each field has its own community, conferences, and journals, and sometimes similar solutions are developed twice. Each field also has its own application areas and some effort has been devoted to show that one paradigm can cover applications of the other paradigm [71] instead of showing the advantages of declarative programming in various application fields. Each paradigm, of course, has its own advantages. Functional programming offers nested expressions, efficient evaluation by deterministic (often lazy) evaluation, and higher-order functions. Logic programming offers existentially quantified variables, partial data structures, and built-in search. On the other hand, functional and logic languages have a common core and can be seen as different facets of a single idea. Consequently, the interest in integrating functional and logic programming has grown over the last decade and resulted in various proposals of integrated functional logic languages that combine the advantages of both paradigms (see [31] for a survey). Functional logic languages extend both functional languages and logic languages. Functional languages are extended with facilities such as function inversion, partial data structures, and logic variables [65]. Logic languages are extended with nested expressions, a more efficient operational behavior [30], and less need for impure control features such as the Prolog “cut. ” This paper concerns narrowing. Narrowing is a computation model of considerable importance both for declarative programming in general and for functional logic languages in particular. We explain why using an example. Example 1 Consider the following rules defining the concatenation of lists (as an infix operator ++) where we use the Prolog syntax for lists, i.e., [] denotes the empty list and [E |R] denotes a non-empty list consisting of a first element E and a remaining list R: [] ++ L → L [E |R] ++ L → [E |R ++ L] In a functional language, this definition is used to concatenate two lists, e.g., [a, b] ++[c, d] evaluates to the list [a, b, c, d]. It is understood that (the value of) the arguments of ++ must be known in order to apply a rule. Narrowing extends the use of ++ without altering its definition in a remarkable way. Even if all or part of either argument of ++ is unknown, (i.e., is an uninstantiated variable), narrowing keeps computing. In principle, this is not difficult—a value is assigned to the unknown parts of an argument—but the technical details that make this approach practical (sound, complete, and as efficient as the best functional computation when the arguments are fully known) 2
英文作文电脑判分
4. 深入的语言分析,计算机评分系统可以进行深入的语言分析,评估语法、词汇、句法和连贯性等方面。这种全面的评估有助于教育者和学生更好地理解语言能力的优势和需要改进的地方。
5. 适应性学习,AI驱动的评分系统可以适应个体学习者的需求。通过分析学习者的写作模式和进步,它们可以提供定制化的反馈和练习,促进个性化的学习体验。
Adaptive Learning: AI-driven scoring systems can adapt to the individual learner's needs. By analyzing the learner's writing patterns and progress, they can provide tailored feedback and exercises, facilitating personalized learning experiences.
英文作文电脑判分
英文回答:
The advent of artificial intelligence (AI) has brought about significant advancements in various fields, including language processing. Computer-based scoring systems, powered by AI algorithms, have become commonplace for evaluating written text, offering numerous advantages.
An Involution for the Gauss Identity
William Y. C. Chen Center for Combinatorics, LPMC Nankai University, Tianjin 300071, P. R. China Email: chenstation@ Qing-Hu Hou Center for Combinatorics, LPMC Nankai University, Tianjin 300071, P. R. China Email: contact@ Alain Lascoux CNRS, Institut Gaspard Monge, Universit´ e de Marne-la-Vall´ ee 77454 Marne-la-Vall´ ee Cedex, France and Center for Combinatorics, LPMC Nankai University, Tianjin 300071, P.R. China scoux@univ-mlv.fr AMS Classification: 05A19, 05A17, 05A30, 11L05 Abstract. We present an involution for a classical identity on the alternate sum of the Gauss coefficients in terms of the traditional Ferrers diagram. It turns out that the refinement of our involution with restrictions on the height of Ferrers diagram implies a generalization of the Gauss identity, which is a terminating form of the q -Kummer identity. Furthermore, we extend the Gauss identity to the p-th root of unity. Keywords: involution, Ferrers diagram, Gauss identity, Gauss coefficients, q -Kummer identity.
The Evaluation of the Efficient Prepaid Scheme TICA
The Evaluation of the Efficient Prepaid Scheme TICA for All-IP Networks and Internet ServicesAbstract—Future all-IP networks will support a variety of high-value IP-based services including the upcoming integration of today’s non-IP services offered by mobile telecommunication pro-viders. Besides postpaid charging, prepaid charging will play an important role in all-IP environments due to the financial control of providers and customers, thus determining effective economic management means for Internet services. Since existing prepaid charging solutions do not meet imposed all-IP requirements, a novel approach—TICA (Time Interval Calculation Algorithm)—with three variants has been presented recently in [14,16].To prove its optimized performance for many service mixes fore-seen, this paper performs a thorough evaluation based on differ-ent scenarios. Additionally, comparing TICA’s overall perfor-mance with existing online charging solutions shows TICA’s promising results in terms of way smaller quantity of credit checks required and smaller financial risks for providers to be achieved. Finally, the three TICA variants reveal a clear sensitiv-ity to defined input parameters. These findings indicate that a numbers of suitable settings can be used by service providers.Keywords: Prepaid Charging, Economic Management, Perfor-mance Evaluations, All-IP Networks, Internet ServicesI.I NTRODUCTIONPrior to the introduction of the World Wide Web (WWW), the Internet had the status of a scientific and non-commercial network. The commercialization of IP-based services shifted this status and today the Internet is an important global eco-nomic domain. However, the IP-based Internet is not (yet) the basis for all communication networks—especially for mobile environments, where non-IP mobile telecommunication net-works represent an anti pole to the IP-world. As opposed to the Internet, mobile telecommunication networks were always eco-nomic driven, which led to a dense global penetration [3].Typically, service providers were used to set the focus for offering their services in either of these two domains. However, since a small number of years, this situation is changing and service providers start to serve both domains. But for service providers this coexistence of non-IP and IP-based networks causes many technical and economic issues. A concept to har-monize these two worlds is the so-called “All-IP Approach”, [19,6]. Although all-IP sounds like wrapping the IP-world around the non-IP, instead from a conceptual point of view all-IP means to merge the most sophisticated features and func-tionalities from both worlds [20]. One particular and wide-spread feature of non-IP mobile telecommunication networks is that service providers aim to port their services to IP and apply economically important charging schemes, especially prepaid charging. Since its introduction in 1995, Mobile Network Op-erators (MNO) apply the prepaid charging option widely for their circuit-switched services and the global average penetra-tion has reached more than 50% in 2005 [3]. The customer de-mand for the prepaid charging option will also be present in an all-IP environment. Therefore, a flexible and efficient prepaid charging solution is a precondition to enter all-IP markets for service providers.For the classical circuit-switched services, the telecommu-nication market is already close to complete saturation. The only way to stabilize or even increase the Average Revenue Per User (ARPU), is for MNOs to increase the revenue made with packet-switched—i.e. IP-based—services. The customers’ fa-vor for prepaid charging will carry over to IP-based services. Therefore, in the telecommunications market, MNOs must of-fer the prepaid charging option for IP services in order to satis-fy and serve the prepaid customer market segment. To increase the added value, future IP services will be more sophisticated than simple “Internet Access”. However, existing prepaid charging systems in IP-based networks and particularly prepaid charging systems for traditional non-IP mobile telecommunica-tion services give too few support to high-value and QoS-en-abled IP-services. Therefore, the novel approach TICA has been proposed [14].While current prepaid approaches suffer from a large over-head of credit checks, the first of the key advantages of TICA is the reduction of real-time credit checks during prepaid service consumption. Every real-time credit check consumes resources of the provider’s network and represents a considerable cost-driver of the total service costs. Traditional prepaid systems re-duce the number of credit checks at the cost of an increased risk of revenue loss due to overuse of credits. However with TICA, the number of credit checks is reduced, while minimizing the risk of revenue loss. In order to prove TICA’s applicability in all-IP environments, this paper performs thorough evaluations based on different scenarios.The second key advantage is TICA’s support for sophisti-cated and flexible tariff functions. A flexible and user-incentive pricing is an important instrument allowing MNOs to maxi-mize their ARPU and to differentiate from competitors. Such novel pricing schemes are also important to minimize churn:Pascal Kurtansky1,Peter Reichl2,Burkhard Stiller1,31Computer Engineering and Networks Laboratory TIK, ETH Zurich, 8092 Zurich, Switzerland 2Telecommunications Research Center, ftw. Vienna, Austria3Department of Informatics IFI, University of Zurich, Binzmühlestrasse 14, 8050 Zürich, Switzerland E-mail:Kurtansky@tik.ee.ethz.ch,Peter.Reichl@ftw.at,Stiller@ifi.unizh.chWith the prepaid charging option, it is much easier for custom-ers to switch to another MNO compared to postpaid customers with long-term contractual bindings with their MNO. One pos-sibility to strengthen the relationship between MNOs and their prepaid customers, is to apply a pricing scheme including a so-called loyalty bonus [3]. For instance, a loyalty bonus system following “the more you call, the cheaper it gets” marketing strategy, can be elegantly and efficiently implemented with TICA, e.g., by using a logarithmic tariff function.The remainder of this paper is organized as follows. While Section II presents additional background information, Section III shortly introduces TICA and its variants. Evaluation scenarios and settings are outlined in Section IV. All key re-sults are split between Section V, where TICA is compared to existing solutions and Section VI, where the three TICA ver-sions are evaluated. Finally Section VII draws conclusions.II.B ACKGROUNDPublications for mobile telecommunication and IP-based networks each define their own terminology with respect to charging and its associated processes. Table I correlates the all IP-based terminology used in this paper—based on [13] and [15]—with the terminology used in mobile telecommunication networks—based on [8].A.Service ChargingService providers are offering their services to end costum-ers based on so-called Service Level Agreements (SLA). From the charging point of view, service tariff definitions and the ser-vice charging options are the most important parts of an SLA. The service tariff function maps accounting data to monetary units, e.g., 1 Swiss Franc (CHF) per Megabyte (MB). The way how an MNO defines the service tariff functions is covered by the term pricing or tariffing. Pricing directly reflects an MNO’s marketing policy. Charging options define how customers are charged. The most important and widespread charging options are, (1) postpaid, (2) hot billing and (3) prepaid.The postpaid charging option is used throughout the whole Internet and telecommunication market and makes the custom-er pay after his service usage. Hot billing [17] is a hybrid solu-tion between post- and prepaid charging options: There is no re-al-time charging, instead it is performed at a certain point of time, e.g., once within 24 hours, or after service usage. In the period between successive points of time, the customer’s bal-ance may become negative—i.e. fraud for an MNO. With the prepaid charging option, the customer’s balance needs to ex-ceed a predefined threshold in order to allow the start of service usage. For session-based services, the customer’s balance has to be checked periodically during service consumption and de-pending on the amount of remaining credits, further service us-age may be denied.Charging options are implemented either with an online or offline charging mechanism. With online charging the charge calculation has to be performed in real-time. For offline charg-ing no strict time constraints are defined. Full prepaid credit-control requires online charging, but the technical overhead due to online charging is one of the major challenges with this com-bination. To reduce the technical overhead, credit (re-)checks are only performed near real-time. However, moving away from online to offline mechanisms, increases the possible risk of fraud. Using pure offline charging mechanisms to implement prepaid charging is also possible—i.e. hot billing. Combining online with postpaid charging is not useful, due to the real-time overhead of online charging.B.Existing Prepaid Charging SolutionsPrepaid charging is far more common in mobile telecom-munication than in IP-based networks. This dominance is re-flected also in the number of solutions for prepaid charging: While mobile telecommunication standards treated post- and prepaid charging, research on charging in IP networks focussed clearly on postpaid charging. A survey on state of the art pre-paid charging for IP services has been presented recently [15] and thus, only a summary is presented here.For third generation mobile networks (3G), 3GPP [1] and 3GPP2 [2] are the specifications-setting projects, focussing on UMTS and CDMA2000 standards respectively. For the support of high-value IP-based services and end-to-end QoS, 3GPP in-troduced the IP Multimedia Subsystem (IMS) [9]. For IMS ser-vices, prepaid charging is implemented by the Online Charging System (OCS) [10] with the IETF based DIAMETER Credit Control Application (CCA) [11]. In IP-based networks, two open standards are dealing with prepaid charging, namely DIAMETER CCA and RADIUS extensions for prepaid [12]—used by 3GPP2. Apart from differences in the protocol messag-es, the two standards handle prepaid charging similarly.The main issue with these existing prepaid charging solu-tions is that they do not or only partially meet requirements im-posed by a future all-IP environment: First, support for flexible and user-incentive tariff functions is required, e.g., a non-linear tariff function depending on several QoS-parameters. Second, the technical overhead of real-time charging should be mini-TABLE I.C OMPARISON OF CHARGING-RELATED T ERMINOLOGYAll IP-based Networks Mobile Telecommunication Networks Metering Collecting Charging InformationAccounting ChargingAccounting Data Charging Data Records (CDR) Pre-/Postpaid Charging Pre-/Postpay Billing Charging Option Billing Arrangement Charging Mechanism Charging Mechanism Tariff Function Tariff FunctionPricing/Tariffing Pricing/Tariffingmized while—third—keeping the operator’s risk of fraud mini-mal. Fourth, support for multiple services, i.e. service bundles,is necessary. These requirements represent the key criteria of prepaid charging, including TICA, cf. Table II. TICA minimiz-es the number of real-time credit check, while implicitly mini-mizing the possible revenue loss, too. Existing solutions—if at all—try to optimize only either of it. Apart from optimization issues, existing solutions support only linear tariff function with one parameter per service. TICA allows basically any ar-bitrary tariff function. The introduced service bundle concept of TICA facilitates the support of multiple prepaid services.III.T ICAThe details of the core approach of TICA and its basic ver-sion has been presented in [14], while its extensions were intro-duced in [16]. To enable the basic understanding of those key concepts and its subsequent detailed evaluation the required ba-sic features are summarized below briefly. A.Core ApproachTICA introduces the concept of service bundles which are composed of n different services labeled s 1, s 2, ..., s n . Every s i is associated with a service tariff function f i (.). The tariff func-tions depend on one or more variables and must meet the re-quirements listed in [14]. If m denotes the total number of dif-ferent variables per service bundle, then f i (.) is defined as:In Eqn. (1), the input—vector x —represents accounting da-ta, like bandwidth, connection time etc., and the output is the charge to be paid. For consecutive time intervals, TICA esti-mates the maximum resource consumption of vector x and hence the maximal charges to be paid. The time is divided into time intervals [t j , t j+1] with length t j as shown in Eqn. (2):Borders of time intervals—t j and t j+1—are associated with the according values of x —x j and x j+1. The real resource con-sumption in the j th time interval is denoted as Δx j , cf. Eqn. (3):To perform resource estimation, TICA defines time-depen-dent functions modeling the resource consumption over time and incorporates them into Δmax (t). The estimated resource con-sumptions of the j th time interval is denoted as, Δmax.j (t j ) and the corresponding maximal charge to be paid is given as f i (Δmax.j (t j )). TICA calculates the maximal charge for all n ser-vices of the service bundle in the same fashion, yielding to the total maximal charge per service bundle in the j th time interval.If a certain amount of remaining credits from a user’s bal-ance is set to the maximal charge per service bundle, TICA cal-culates the corresponding time interval. Thus, with TICA, only the length of the calculated time interval needs to be observed during service consumptions. Existing prepaid solutions use an independent real-time monitoring for each of the m variables of vector x . Therefore, TICA reduces significantly necessary monitoring overhead for prepaid charging.B.Applying TICA in all-IPTICA consists of a client and server component, residing on the according network elements, depending on the actual all-IP architecture. For the chosen all-IP architecture from the Daida-los project [7], TICA’s client component is located on the Ac-counting Gateway (AG) and TICA’s server component on the A4C server (A uthorization, A uthentication, A ccounting, A udit-ing, and C harging). When the AG forwards a prepaid service request to the A4C, TICA checks first, if sufficient credits are left to grant service usage. Then TICA calculates a time inter-val based on the estimated maximum resource consumptions for the whole service bundle [14]. Being above a minimal threshold, the time interval is communicated to the AG, which grants service usage. The AG observes the time interval and upon its expiry, requests a new one, which is calculated on the basis of the real consumed resources of the past interval. C.Basic Version: TICA 1.0TICA 1.0 determines a “worst case” estimation in terms of resource consumptions in the upcoming interval, i.e. it assumes that all services in the bundle will be used during the whole du-ration of the upcoming interval. The maximum resource con-sumption must lead to the maximal charge, thus, TICA 1.0 is a prepaid solution guaranteeing zero fraud while minimizing cost intensive credit checks. Note that for TICA 1.0, the calculation of the length of the upcoming time interval—t j+1—does not de-pend on the calculated length of the current time interval—t j .Depending on real service consumptions, TICA’s 1.0 esti-mation may be too conservative in the sense that real service consumptions may lie below TICA’s 1.0 estimation. Or, to put it differently, real service charges may lay below TICA’s 1.0 es-timated charges. Thus, TICA 1.0 suffers from overestimation of service consumptions and their service charges. The effect of such overestimations is that the calculated time intervals are shorter than they actually could have been. Since every expira-tion of a time interval causes a credit check, credit checks do al-so occur more often. The dimension of TICA’s 1.0 overestima-TABLE II.K EY C RITERIA OF P REPAID C HARGING COMPARED WITH TICACriterion CCA/Radius Extension Traditional 2G/3G TICA Number of Checks Very high High Low Optimization: Cost of checks and revenue loss No, none.Yes, both; but only for single services.Yes, both; for any service.Tariff functions Only linear Only linear Arbitrary Tariff parameters One per ServiceOne per ServiceArbitrary Multiple ServicesLimitedLimitedSupported(1)(2)(3)f i (x )x ∈R m f i :R m R,i =1,...,n t j =t j +1−t j and [t j ,t j +1]∀j ∈N :t j <t j +1Δx j =x j +1−x jΔx j ∈R mtion depends on the real service usage. If services are used more intensively, then the dimension of overestimation is smaller, than if services are used only rarely. D.Statistical Prediction: TICA 1.1Compared to TICA 1.0, TICA 1.1 uses a better estimation for resource consumption in the upcoming interval, such that the effect of overestimation is smaller. For the prediction of the resource consumption of the upcoming interval, TICA 1.1 uti-lizes the mean and the standard deviation of resource consump-tions from the current interval.To calculate these statistical values, the metering system needs to keep all probes of the current interval. Existing meter-ing systems have a lower bound of the probe interval they are able to support. On expiry of a probe interval, the metering sys-tem returns a probe vector, which has the same dimension as the resource vector, i.e. m . For the j th time interval, p j denotes the number of probes taken. The mean value and the standard deviation of the p j probes in the j th interval is denoted as an m -dimensional vector μj and σj respectively. For TICA 1.1, re-sources of the upcoming j+1th time interval are thus calculated as shown in Eqn. (4), with β ≥ 0:Note that the product p j μj is equal to Δx j —the resource con-sumption of the j th interval—and that the square root expression is due to the additive property of the standard deviation. Refer to [16] for a complete analysis of the statistical properties of Eqn. (4). With TICA 1.1 there exists the possibility for an over-and underestimation of resources in the upcoming interval. An underestimation means also an underestimation of charges: real service charges are higher than expected ones. Thus, in such an underestimation case, an MNO may lose revenue.E.Learning from the Past: TICA 1.2While TICA 1.1 bases its estimation on the current interval only, TICA 1.2 uses all of the preceding intervals. For its esti-mations, TICA 1.2 applies an exponential averaging approach both for the mean and the standard deviations, Eqn. (5):The parameter 0 ≤ α ≤ 1 controls the weight of the contri-butions of past intervals on the estimation of the upcoming in-terval. Note that for α = 1, Eqn. (5) reduces to Eqn. (4) and for α = 0, the estimations for all upcoming intervals stay with the initial values. With TICA 1.2 there exists also the possibility of over- and underestimations of the resource consumptions.TICA’s 1.2 misestimations are controlled by setting the parameters αand βaccordingly. For TICA 1.1 and 1.2, ini-tial values for Δx and σ are crucial. One possibility is to use TICA’s 1.0 estimations for the first intervals. Another possibil-ity is to use historic data or traffic patterns for a given user or a given customer group.IV .E VALUATION S CENARIO S ETTINGSTo perform key evaluations, the three versions of TICA were implemented with Matlab [18]. The first part of the evalu-ations compares TICA with real-time charging solutions, and the second part performs sensitivity analyses of the three TICA versions. The evaluation scenarios have been chosen after dis-cussions with representatives of different European MNOs.A.Service Bundle DefinitionOne of the main advantages of TICA is the service bundle concept, supporting an unlimited number of services per bun-dle. However, in the short-term future, service bundles will more likely consist of a view services, as discussions with ex-isting MNOs revealed or marketing studies show [3]. Services chosen for the evaluation bundle are, thus, service s1—V oIP and service s2—web access (surfing the Internet). These two services represent today’s most common marketed IP services and their bundling is a reasonable marketing strategy. The VoIP service is based on the G.711 codec with constant bitrate (CBR) encoding of 64kbps per channel. In addition to the user data rate, a 16.5kbps signalling traffic per channel is needed. An analytical model had to be chosen to artificially generate the traffic pattern, since it was not possible to get real traces. Note that traces of single users would have been needed and not aggregated traffic traces of n users. The traffic of s1 is using a different QoS-class compared to s2—for instance in GPRS the conversational QoS-class is used.Service s2—web access—represents the classical Internet surfing, including browsing the web, handling emails etc. Com-pared to s1, s2’s network traffic is treated with low priority and without any QoS guarantees, e.g., for bandwidth or delay. Net-work traffic of s2 is treated like best-effort, and for instance in GPRS, the background QoS-Class is used. Of course, it is also possible to use a V oIP application within service s2 or any other applications that would require strict QoS guarantees. At this point, the decision is left to the customer, which level of (per-ceived) QoS he would like to have, i.e. whether he is choosing service s1 or s2.In the evaluations, it is assumed that the—wired or wire-less—access network reserves enough bandwidth to serve ser-vice s1 and the elastic s2 traffic is “squeezed” to fit in the re-maining available bandwidth. Therefore, services s1 and s2 can be used simultaneously. A further assumption is that all net-work traffic (i.e. volume) is allocated correctly to either s1 or s2by the metering and accounting system. B.Tariff functionsWithin this evaluation, simple tariff functions for service s1and s2 were chosen. The reason for this selection is that current(4)(5)Δmax.j +1 t j +1 =t j +1t j p j μj +β√p j σj Δx j =αΔx j +(1−α)Δx j −1σj =ασj +(1−α)σj −1Δmax.j +1 t j +1=t j +1t jΔx j +σj β√p jonline charging systems support only linear tariff functions de-pending on one parameter. If tariff functions were more com-plex, a direct comparison between TICA and online charging systems would not be possible. TICA’s support of more sophis-ticated tariff functions has been shown in [14,16].However, with the evaluation of this paper, TICA’s suprem-acy compared to existing solutions shall be shown even for simple tariff function to allow for an optimal comparison with existing schemes. For service s1—V oIP—every minute is charged with 10 cents. For service s2—web access—every KB is charged with 0,1 cent—such that 1MB is 1CHF. Note that the user is charged for down- and upstream volume.C.Traffic TracesThe analytical model chosen for the V oIP service assumes that call holding times are Erlang distributed and intercall thinktimes are Pareto distributed, like in the SURGE model [4]. In the evaluation, different parameter settings of the Erlang and Pareto distribution are used to generate traffic patterns with dif-ferent characteristics. The characteristics include heavy/low us-age and irregular/regular usage distinction, totalling four differ-ent characteristics.For the web access service, real traffic traces are used. Trac-es were not artificially generated by traffic generators, instead they were gathered on a voluntary basis by customers. The cap-tured traffic traces contain different usage characteristics—e.g., heavy user—and different access technologies—WLAN and UMTS R99, cf. Table III.Individual traces for the web access service—i.e. session—of volunteers have variable length, depending on their daily us-age. Consecutive sessions were conceptually connected togeth-er to simulate web access on per user basis. To give an impres-sion of traffic characteristics, Fig.1 depicts an example of a traffic trace for s1 and s2 for the WLAN scenario, where the traffic pattern of s1 belongs to the combination low/irregular1.V.TICA VS.O NLINE C HARGINGThe aim of this first evaluation is to compare the perfor-mance of TICA1.x against existing prepaid charging solutions using the online charging approach.A.Online Charging SettingsIn online (i.e. real-time) charging, credit checks are being done after a certain threshold is reached. Depending on how online charging is implemented, thresholds have different char-acteristics.In online charging systems based on CCA these thresholds for credit checks can be any kind of measurable units. Accord-ing to the CCA standard, there is only one kind of units per ser-vice allowed to be monitored in real-time. It is, therefore, the most natural way to choose that kind of unit, which is used by service tariff function. For instance, for a time-based tariff, one would choose to monitor time (units) in real-time. Note that the CCA standard does not support tariff functions depending on more than one accounting parameter. Thus, to be able to com-pare TICA with CCA-based systems, each of the two tariff functions depends only on one parameter. For s1 it is a linear time-based tariff and for s2, a linear volume-based tariff. Hence, CCA monitors the call-duration for service s1, while monitoring the volume for service s2. For the evaluation, three different settings were chosen as listed in Table IV.Another way to represent the threshold of credit checks, is to use a fixed time interval. This interval must not be confused with the ones calculated by TICA. A credit check is taking place independent of the actual service usage. Credit checking is initiated after the customer has requested the first prepaid service—i.e. s1 or s2 within this evaluation. When a time inter-val has expired, the accounting system pushes the accumulated accounting data of all currently running prepaid services to the charging system which performs then the actual credit check. For this kind of online charging, three different settings were defined as listed in Table V.The Online_d setting represents the typical shortest possi-ble interval that existing prepaid charging systems are able to support. Online_e/f settings represent common intervals used.TABLE III.S ERVICE U SAGE C HARACTERISTICSScenario Service s1Service s2WLAN Low HeavyUMTS R99Heavy Low1Erlang:μ = 180 s, σ = 81 s; Pareto: μ = 900 s, σ = 150 sTABLE IV.T HRESHOLDS FOR C REDIT C HECKS PER S ERVICE Setting Name s1: Time-based s2: Volume-based Online_a5s10KB Online_b10s100KB Online_c30s500KBThe online charging settings as shown in Table IV and Table V define non-monetary thresholds for credit checks. For the online_a through online_c settings, Table VI shows the corre-sponding monetary thresholds for credit checks with the giventariffs for s1 and s2. For the online_d through online_f settings, monetary thresholds are difficult to calculate, since they de-pend on the actual service usage.B.TICA SettingsWhen TICA is applied, several parameters have to be set. The first parameter t max represents the maximal duration of a time interval. This upper bound is determined by the re-authen-tication/-authorization interval of a running service session. For prepaid service sessions, credit check is compulsory while per-forming re-authentication/-authorization. For the chosen Daid-alos all-IP architecture, the longest supported re-authentica-tion/-authorization interval is half an hour. The parameter t c is the maximal time it takes to perform a credit check. Typically, t c is determined as the sum of the maximum values for: (1) the RTT between the AG and A4C server, (2) the message process-ing times, (3) the time it takes to perform a credit check includ-ing the calculation of the time interval. The chosen value of 5 seconds is the upper bound with regard to the Daidalos all-IP architecture. The third parameter—t probe_int—represents the shortest possible probe interval the metering system is able to support. The chosen value of 5 seconds is determined by the CMS of the Daidalos all-IP architecture.Values of three parameters—t max, t c, t probe_int—are set to same values for all TICA versions and are based on the Daidal-os all-IP architecture. The parameter settings for TICA1.1 and 1.2 represent values according to [16]. All chosen parameter values are summarized in Table VII.C.Credit Checks Analysis for WLAN ScenarioTo compare the number of credit checks between TICA and existing online charging solutions, 1000 experiments were run. In each experiment, a starting point within the traffic traces was randomly chosen with a uniform distribution. From the selected starting point, the traces were traversed to simulate consecutive web-access and V oIP sessions. Traversing the traces corre-sponds to consuming services and hence involves certain ser-vice charges. These charges were subtracted continuously from the initial credits on the user’s balance. Every experiment start-ed with the initial credits of 20CHF, since this amount repre-sents a typical value for prepaid cards in Switzerland. With the selected tariff functions, initial credits and traffic traces, the possibility of looping through the traces more than once was avoided. With the chosen settings, the traces were traversed un-til the initial credits were exhausted. Because it was assumed that user’s who have bought prepaid value cards would eventu-ally use them up.For the given TICA settings according to Table VII and the online charging settings from Table IV and Table V, the num-ber of credit checks for the WLAN scenario with the initial credits fixed to 20CHF is shown in Fig.2. The fluctuations with regard to credit checks over the 1000 experiments is due to the fact that for every experiment a starting point within the traces was randomly chosen. In addition to Fig.2, In Fig.3, the number of credit checks are compared against the initial amount of credits. For every initial credit step, 1000 experi-ments were run. For a reasonable and typical amount of initial credits—i.e. after 20CHF—TICA performs much better thanTABLE V.F IXED T IME I NTERVAL S ETTINGSSetting Name s1 and s2: Time-basedOnline_d5sOnline_e20sOnline_f30sTABLE VI.M ONETARY T HRESHOLDS FOR C REDIT C HECKS IN C ENTS Setting Service s1Service s2Online_a0.83 1.00Online_b 1.6710.00Online_c 5.0050.00TABLE VII.P ARAMETER S ETTINGS FOR TICA1.XTICA Version Parameter ValueTICA 1.x t max1800st c5st probe_int5sTICA 1.1β1TICA 1.2α0.3β1Figure 2.WLAN scenario. Credit checks over 1000 experiments.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
a r X i v :0801.0272v 1 [m a t h -p h ] 1 J a n 2008Evaluation of a ln tan integral arising in quantumfield theoryMark W.Coffey Department of Physics Colorado School of MinesGolden,CO 80401(Received 2007)August 27,2007AbstractWe analytically evaluate a dilogarithmic integral that is prototypical ofvolumes of ideal tetrahedra in hyperbolic geometry.We additionally obtain new representations of the Clausen function Cl 2and the Catalan constant G =Cl 2(π/2),as well as new relations between sine and Clausen function values.Key words and phrasesClausen function,trigamma function,polygamma function,dilogarithm function,Hurwitz zeta functionAMS classification numbers33B30,33B15,11M351Introduction and statement of resultsIn this paper,we provide a closed form evaluation of the integralI7≡247 π/2π/3ln tan t+√tan t−√(7n+1)2+1(7n+3)2+1(7n+5)2−1number theory.In the rest of this Introduction,we present two Lemmas,state our main result,and provide some background relations on the particular Clausen function Cl 2.It seems worth while to note some of the numerous alternative expressions for the value L −7(2)and its companion Clausen value combination.We haveLemma 1.Let ψ′be the trigamma function and ζ(s,a )the Hurwitz zeta function (e.g,[1]).(a)We haveL −7(2)=17+ψ′27+ψ′47−ψ′6492ψ′17−ψ′37+csc22π7(1.3b )=27+ψ′27+csc 23π49ζ2,17−ζ2,37−ζ2,57(1.4)=−10(1+u −u 2+u 3−u 4−u 5)(1+u +u 2+u 3+u 4+u 5+u 6)ln u du=1−10u (1+u −u 4−u 5)7+Cl 24π7=178ψ′17−ψ′314+2csc23π7+csc23π7+csc25π7.(1.6)3In Proposition1we make use of some of the representations for Cl2given in the followingLemma2.Let a be a real number and setθ=cos−1 1−a2u−a dua∞ j=1(−1)j(2j+1)(1.9a)=cot−1a(2ln2+γ−2)+1aln 1+1a∞ j=1(−1)j(2j+1).(1.9b)(c)We have the integral representationCl2(θ)=2cot−1a ln2+2a ∞1[y cot−1ay−cot−1a]y.(1.10) As an immediate consequence of Lemma2(b)at a=1we obtain a harmonic number series representation for the Catalan constant G=Cl2(π/2)=1−1/32+ 1/52−1/72+...≃0.9159655941:Corollary1.We haveG=π(2j+1)H j.(1.11)This expression has been previously obtained in the very recent Ref.[6].4Let θ±=±tan −1(√7+√√3,ω±=tan −1r 73sin θ±3−√7−2π3−√5,andω+−ω−=−2ω+=−2cot −1(2√7).(1.12b )Proposition 1.We haveI 7=247Cl 2(θ+)+12dt =1tan −1x sin θx=−sin θ1ln xn 2.(1.14)When θis a rational multiple of πit is known that Cl 2(θ)may be written in terms of the trigamma and sine functions[10,8].As we shall find useful,the imaginary part of the dilogarithm function Li 2of complex argument may be written in terms of Cl 2:Im Li 2(re iθ)=ωln r +11−r cos θ.(1.16)5Besides being periodic,Cl2(θ)=Cl2(θ+2π),the Clausen function satisfies the du-plication formula1(7j+p)q =17 =(−1)q(q−1)!ψ(q−1)p7+csc22π7=8.(2.3)For Eq.(1.5),we use the integral representationζ(s,a)=1e t−1dt,Re s>1,Re a>0,(2.4)6whereΓis the Gamma function,and change variable to u=e−t/7.For part(b)of Lemma1,wefirst apply for p even and q odd,with q≥3the formula[8](p.329)Cl2 pπ4q2q−1 k=1 ψ′ 1−k2−k qπ.(2.5) We then obtainCl2 2π7 −Cl2 6π56√14 +ψ′ 114 +ψ′ 214 −ψ′ 37 +ψ′97 +ψ′ 117 −ψ′ 137+sin4xπ7=±√2,(2.7)for x=1,...,6and the−sign holds on the right side for x=3,5,and6.In regard to Eq.(2.7),we observe that±sin(2π/7),±sin(4π/7),and±sin(6π/7) are the nonzero roots of the Chebyshev polynomial T7(x).Indeed,if we write the cubic polynomialsp1(x)= x−sin2π7 x+sin6π777 x+sin2π7 =x3+√2x2−√8,(2.8b)we then have the factorization p1(x)p2(x)=T7(x)/64x.7We next repeatedly apply the duplication formula2ψ′(2x)=12 (2.9)and the reflection formula(2.2)in order to reduce the dozen trigamma values in Eq.(2.6)to only three independent function values.In particular,we have the relationsψ′ 17 +ψ′ 37,(2.10a)ψ′ 37 +ψ′ 27,(2.10b) andψ′ 57 +ψ′ 17+4π2csc22π14+csc2π14+csc22π14+csc23πn =(n2−1)/6−[1+(−1)n]/4(e.g.,[11],p.260).Indeed,there are at most two independent trigamma values involved in either part(a)or(b)of Lemma1.As follows from the multiplication formula for the polygamma functions,we have[1](p.260)ψ′(mx)=1m ,(2.12)so that we have the additional relationζ(2)=ψ′(1)=17 .(2.13) 8For part(a)of Lemma2,we consider the integrals∞a ln n u+a1+u2=2a v2+2 a2−1u−a du(1+a2)10ln n y dy1−ay dy1−z =2z2F1 12;z2 ,(2.17)where2F1is the Gauss hypergeometric function.Changing variable again to w=a2y2 and expanding the factor(1+y2)−1as a geometric series we haveCl2(θ)=1a2j 10w j2F112;w dw.(2.18)Performing the integration term by term,we have10w j2F1 12;w dw=∞ ℓ=01(2ℓ+1)(j+ℓ+1)=1where the partial fractions form of the digamma function was used.Sinceψ(j+1)+γ=H j,(2.20) we have found the representation(1.9a).For Eq.(1.9b)we use the functional equation of the digamma function,ψ(j+1)=ψ(j)+1/j.The absolute convergence of integrals such as in Eq.(2.9)justifies the interchange of integration and summation above and throughout this paper.For Eq.(1.10),we use an integral representation of the digamma function[9](p. 943)to write∞ j=1(−1)j2j+1[ψ(j+1)+γ]=∞ j=1(−1)j2j+1 10(t j−1)√√t,we arrive at the integral representation(1.10).Remarks on the Catalan constant.We have noted that Corollary1directly follows from Lemma2(b).Another means tofind the result(1.11)is to use the integral relationG=π2 10ln(1+u)√(1+u)=∞ n=1(−1)n H n u n,(2.23)returns Eq.(1.11).10Another form of the Catalan constant may be found by expanding in the integrand of Eq.(2.22)to writeG=π2∞ j=0(−1)j 10ln(1+u)u j−1/2du.(2.24)Omitting the details,we determineG=−π2∞ j=0(−1)j2+32+1a du1+u2du.(2.27)We next have Lemma3.We haveG=−1(1−x/2)dx1−x2(2.28a)=ππ2jΓ(j+3/2) ψj+3π(j+1/2)(2j−1)!!,andG=π2)dy2−y2.(2.28c)11For obtaining Eq.(2.28a)we apply Eqs.(18)and(21)of Ref.[14].For Eq.(2.28b)we expand the integrand factor1−x/2as geometric series,writingG=−12j 10x j lnx√2jΓ(j+3/2)=12j(3/2)j=√z 10dt1+a2t2dt,(2.32)givingG=π1+t2dt.(2.33)This last equation may also be obtained by combining two formulas in Ref.[9](p. 555).By expanding(1+a2t2)−1as a geometric series in Eq.(2.32)we obtain the series representationCl2(θ)=cot−1a ln a+[ln(a2+1)−2ln a]tan−1a−∞ j=0(−1)j a2j2 +γ .(2.34)12We have also determined a BBP-type formula for the Catalan constant[2],as wellas for a trilogarithmic constant.We haveLemma4.(a)We have the expression for G=Cl2(π/2)G=116j 4(8j+4)2−1(8j+6)2−π28ln2,(2.35)(b)Re Li3 1+i48ln32−564ζ(3),(2.36) and(c)8∞ j=01(8j+1)3−2(8j+5)3−12ln2+14ζ(3)+32Im Li3 1+i2)dy32,(2.38) and the summatory relation∞ j=01(8j+k)2+ln216j120x k−12 0x k−14∞ j=01(8j+k) ln22+4ln2(8j+k)2 .(2.40)13We then form the sums8∞ j=01(8j+1)3−2(8j+5)3−116j 4(8j+4)2−1(8j+6)2+ln22∞ j=01(8j+1)−2(8j+5)−12)dy3i ln32−52 +141+52 =∞ n=1n m=0n4m+4 − n4m+2 1Im Li3 1+i2n n3,and that it may be possible to reach Eqs.(2.36)and(2.37)from them.We mention an extension of Lemma4for BBP-type formulas for other polyloga-rithmic constants.These may be developed by using the integralsJ n=2n+12)dy√(8j+k)n+1Γ n+1,110+sin3xπ10+sin9xπ5,0},(2.44)for x=1,...,20,the−sign holds on the right side for x=11,...,20,and the result is zero when(x,10)=1,i.e.,when x is not co-prime with10.Here and within the rest of this remark the notation on the right side of the equation indicates that the expression on the left takes the values within the set indicated.Furthermore,we have the sine sumssin xπ12+sin7xπ12={±√for x=1,...,24and the result is zero when(x,12)=1,sin 2xπ11+sin6xπ11+sin10xπ1115+sin4xπ15+sin14xπ155+sin2xπ5+sin4xπ5±2√5−sin2xπ5+sin4xπ5∓2√8+sin3xπ8= ±110±√√8+sin5xπ8= ±110±√√8±sin7xπ8±sin5xπ8+sin7xπProof of Proposition 1Rather than restrict attention to I 7,we consider the more general integralsI (n )≡ π/2π/3ln ntan t +√tan t −√3ln n u +√u −√1+u 2.(3.1)By splitting the integral and performing further changes of variable we haveI (n )=I (1)(n )+I (2)(n )= √3ln n √√1+u 2+ ∞√77du7(2v 2−3v +2)+∞1ln n v dv2√4∞r 73ln n v dv8∞r 73ln n vdv8(v +−v −)∞r 731v −v −ln n v dv,(3.5)where v ±=(3±i√2√8(v +−v −)1/r 73ln n y∞ℓ=01v ℓ+1+dy2√8(v +−v −)∞ℓ=01v ℓ+1+Γ[n +1,−(ℓ+1)ln r 73]We next use the property for n≥0an integerΓ(n+1,x)=n!e−xn m=0x m2√8(v+−v−)∞ ℓ=1 1vℓ+ rℓ73m!ln m 17/2.We now specialize to n=1,wherebyI(1)(1)7=1vℓ−−1ℓ2−ln r73∞ ℓ=1 1vℓ+ rℓ738(v+−v−)Li2 r73v+ −ln r73ln 1−v−r731−v+r73 =−2i tan−113+√2√4√Discussion and additional results√Since our result for I7involves angles other thanθ7=2tan−1(4.2)n2qbe the generalized Clausen function.Then,for instance,from Eq.(2.7)we haveCl q 2π7 −Cl q 6πq,27 +ζ q,47 −ζ q,6 77 +ζgeneralized Clausen functions.From Eq.(3.9)we haveI (1)(n )=(−1)niv −−Li n +1r 73v −−Li nr 73j !Li n −j +1r 73v ++...+lnn −1(1/r 73)v −−Li 2r 732ln n (1/r 73)ln1−v −r 73n 2r +1.(4.5)Similarly,the integrals I (2)(n )and I (n )may be evaluated.Also following the method of Proposition 1we may make the following extensionof Eq.(1.8).Let θ+=−tan −1(√1−b 2/(a +b )].Then we haveProposition 2.For real a ≥0and |b |<1we have I (a,b )≡∞aln y dy211−b2[Cl 2(2ω+)−Cl 2(2ω++2θ+)+Cl 2(2θ+)](4.6)=1√1−b 2and tan θ2=(1/a +b )/√(y +−y −)1/aln v1(1−y −v )dv1−b 2=exp(iθ±).We then proceed similarly as in the proof ofProposition 1.Of course Eq.(4.6)may be rewritten with the aid of the duplication formula (1.17).20For Eq.(4.7),we integrate an equality with respect to a and then determine theconstant of integration that may depend only upon b.By the use of the chain rule,the relationdθ21−b21−b2.Having determined the integral I(a,b)by two different methods,we have found a relation among Clausen function values.Corollary2.Withθ+,ω+,θ1,andθ2as in Proposition2,we haveCl2(2ω+)−Cl2(2ω++2θ+)+Cl2(2θ+)=Cl2(2θ2−2θ1)−Cl2(π−2θ1)+Cl2(π−2θ2).(4.10) This relation seems to reflect the property tan−1x+cot−1x=tan−1x+tan−1(1/x)=π/2for x>0.From Proposition2we recover many known special cases.In particular,we have I(0,b)=0,whenω+=−θ+.In turn,we haveCorollary3.We have for c>0and0<t<π∞0ln x dx c tDue to the presence of the parameter b in Proposition2,we may obtain expressions for integrals of the form∞a y j ln y dy2j j!∂j I(a,b)References[1]M.Abramowitz and I.A.Stegun,Handbook of Mathematical Functions,Na-tional Bureau of Standards(1972).[2]D.H.Bailey,A compendium of BBP-type formulas for mathematical constants,/∼dhbailey/dhbpapers/bbp-formulas.pdf(2004).[3]D.H.Bailey et al.,Experimental Mathematics in Action,A.K.Peters,Wellesley,MA(2007).[4]D.H.Bailey and J.M.Borwein,Computer-assisted discovery and proof,preprint/∼dhbailey/dhbpapers/comp-disc-proof.pdf(2007).[5]J.M.Borwein and D.J.Broadhurst,Determination of rational Dedekind-zeta invariants of hyperbolic manifolds and Feynman knots and links, arxiv:hep-th/9811173(1998).[6]J.M.Borwein,I.J.Zucker,and J.Boersma,The evaluation of character Eulerdouble sums,to appear in Ramanujan J.(2007).[7]D.J.Broadhurst,Massive3-loop Feynman diagrams reducible to SC∗primitivesof algebras of the sixth root of unity,Eur.Phys.J.C8,311-333(1999).[8]P.J.de Doelder,On the Clausen integral Cl2(θ)and a related integral,-put.Appl.Math.11,325-330(1984).23[9]I.S.Gradshteyn and I.M.Ryzhik,Table of Integrals,Series,and Products,Academic Press,New York(1980).[10]C.C.Grosjean,Formulae concerning the computation of the Clausen integralCl2(θ),put.Appl.Math.11,331-342(1984).[11]E.R.Hansen,A table of series and products,Prentice Hall(1975).[12]L.Lewin,Polylogarithms and associated functions,North Holland(1981).[13]L.Lewin,ed.,Structural properties of polylogarithms,American MathematicalSociety(1991).[14]F.A.Lunev,Evaluation of two-loop self-energy diagram with three propagators,Phys.Rev.D50,7735-7737(1994).It appears that in Eq.(18),the integrand factor(1−λy)should read(1−λx).[15]L.C.Maximon,The dilogarithm function for complex argument,Proc.RoyalSoc.A459,2807-2819(2003).24。