Lecture Note 2 - Stationary Processes
现代操作系统(第三版)答案
MODERNOPERATINGSYSTEMSTHIRD EDITION PROBLEM SOLUTIONSANDREW S.TANENBAUMVrije UniversiteitAmsterdam,The NetherlandsPRENTICE HALLUPPER SADDLE RIVER,NJ07458Copyright Pearson Education,Inc.2008SOLUTIONS TO CHAPTER1PROBLEMS1.Multiprogramming is the rapid switching of the CPU between multiple proc-esses in memory.It is commonly used to keep the CPU busy while one or more processes are doing I/O.2.Input spooling is the technique of reading in jobs,for example,from cards,onto the disk,so that when the currently executing processes arefinished, there will be work waiting for the CPU.Output spooling consists offirst copying printablefiles to disk before printing them,rather than printing di-rectly as the output is generated.Input spooling on a personal computer is not very likely,but output spooling is.3.The prime reason for multiprogramming is to give the CPU something to dowhile waiting for I/O to complete.If there is no DMA,the CPU is fully occu-pied doing I/O,so there is nothing to be gained(at least in terms of CPU utili-zation)by multiprogramming.No matter how much I/O a program does,the CPU will be100%busy.This of course assumes the major delay is the wait while data are copied.A CPU could do other work if the I/O were slow for other reasons(arriving on a serial line,for instance).4.It is still alive.For example,Intel makes Pentium I,II,and III,and4CPUswith a variety of different properties including speed and power consumption.All of these machines are architecturally compatible.They differ only in price and performance,which is the essence of the family idea.5.A25×80character monochrome text screen requires a2000-byte buffer.The1024×768pixel24-bit color bitmap requires2,359,296bytes.In1980these two options would have cost$10and$11,520,respectively.For current prices,check on how much RAM currently costs,probably less than$1/MB.6.Consider fairness and real time.Fairness requires that each process be allo-cated its resources in a fair way,with no process getting more than its fair share.On the other hand,real time requires that resources be allocated based on the times when different processes must complete their execution.A real-time process may get a disproportionate share of the resources.7.Choices(a),(c),and(d)should be restricted to kernel mode.8.It may take20,25or30msec to complete the execution of these programsdepending on how the operating system schedules them.If P0and P1are scheduled on the same CPU and P2is scheduled on the other CPU,it will take20mses.If P0and P2are scheduled on the same CPU and P1is scheduled on the other CPU,it will take25msec.If P1and P2are scheduled on the same CPU and P0is scheduled on the other CPU,it will take30msec.If all three are on the same CPU,it will take35msec.2PROBLEM SOLUTIONS FOR CHAPTER19.Every nanosecond one instruction emerges from the pipeline.This means themachine is executing1billion instructions per second.It does not matter at all how many stages the pipeline has.A10-stage pipeline with1nsec per stage would also execute1billion instructions per second.All that matters is how often afinished instruction pops out the end of the pipeline.10.Average access time=0.95×2nsec(word is cache)+0.05×0.99×10nsec(word is in RAM,but not in cache)+0.05×0.01×10,000,000nsec(word on disk only)=5002.395nsec=5.002395μsec11.The manuscript contains80×50×700=2.8million characters.This is,ofcourse,impossible tofit into the registers of any currently available CPU and is too big for a1-MB cache,but if such hardware were available,the manuscript could be scanned in2.8msec from the registers or5.8msec from the cache.There are approximately27001024-byte blocks of data,so scan-ning from the disk would require about27seconds,and from tape2minutes7 seconds.Of course,these times are just to read the data.Processing and rewriting the data would increase the time.12.Maybe.If the caller gets control back and immediately overwrites the data,when the writefinally occurs,the wrong data will be written.However,if the driverfirst copies the data to a private buffer before returning,then the caller can be allowed to continue immediately.Another possibility is to allow the caller to continue and give it a signal when the buffer may be reused,but this is tricky and error prone.13.A trap instruction switches the execution mode of a CPU from the user modeto the kernel mode.This instruction allows a user program to invoke func-tions in the operating system kernel.14.A trap is caused by the program and is synchronous with it.If the program isrun again and again,the trap will always occur at exactly the same position in the instruction stream.An interrupt is caused by an external event and its timing is not reproducible.15.The process table is needed to store the state of a process that is currentlysuspended,either ready or blocked.It is not needed in a single process sys-tem because the single process is never suspended.16.Mounting afile system makes anyfiles already in the mount point directoryinaccessible,so mount points are normally empty.However,a system admin-istrator might want to copy some of the most importantfiles normally located in the mounted directory to the mount point so they could be found in their normal path in an emergency when the mounted device was being repaired.PROBLEM SOLUTIONS FOR CHAPTER13 17.A system call allows a user process to access and execute operating systemfunctions inside the er programs use system calls to invoke operat-ing system services.18.Fork can fail if there are no free slots left in the process table(and possibly ifthere is no memory or swap space left).Exec can fail if thefile name given does not exist or is not a valid executablefile.Unlink can fail if thefile to be unlinked does not exist or the calling process does not have the authority to unlink it.19.If the call fails,for example because fd is incorrect,it can return−1.It canalso fail because the disk is full and it is not possible to write the number of bytes requested.On a correct termination,it always returns nbytes.20.It contains the bytes:1,5,9,2.21.Time to retrieve thefile=1*50ms(Time to move the arm over track#50)+5ms(Time for thefirst sector to rotate under the head)+10/100*1000ms(Read10MB)=155ms22.Block specialfiles consist of numbered blocks,each of which can be read orwritten independently of all the other ones.It is possible to seek to any block and start reading or writing.This is not possible with character specialfiles.23.System calls do not really have names,other than in a documentation sense.When the library procedure read traps to the kernel,it puts the number of the system call in a register or on the stack.This number is used to index into a table.There is really no name used anywhere.On the other hand,the name of the library procedure is very important,since that is what appears in the program.24.Yes it can,especially if the kernel is a message-passing system.25.As far as program logic is concerned it does not matter whether a call to a li-brary procedure results in a system call.But if performance is an issue,if a task can be accomplished without a system call the program will run faster.Every system call involves overhead time in switching from the user context to the kernel context.Furthermore,on a multiuser system the operating sys-tem may schedule another process to run when a system call completes, further slowing the progress in real time of a calling process.26.Several UNIX calls have no counterpart in the Win32API:Link:a Win32program cannot refer to afile by an alternative name or see it in more than one directory.Also,attempting to create a link is a convenient way to test for and create a lock on afile.4PROBLEM SOLUTIONS FOR CHAPTER1Mount and umount:a Windows program cannot make assumptions about standard path names because on systems with multiple disk drives the drive name part of the path may be different.Chmod:Windows uses access control listsKill:Windows programmers cannot kill a misbehaving program that is not cooperating.27.Every system architecture has its own set of instructions that it can execute.Thus a Pentium cannot execute SPARC programs and a SPARC cannot exe-cute Pentium programs.Also,different architectures differ in bus architecture used(such as VME,ISA,PCI,MCA,SBus,...)as well as the word size of the CPU(usually32or64bit).Because of these differences in hardware,it is not feasible to build an operating system that is completely portable.A highly portable operating system will consist of two high-level layers---a machine-dependent layer and a machine independent layer.The machine-dependent layer addresses the specifics of the hardware,and must be implemented sepa-rately for every architecture.This layer provides a uniform interface on which the machine-independent layer is built.The machine-independent layer has to be implemented only once.To be highly portable,the size of the machine-dependent layer must be kept as small as possible.28.Separation of policy and mechanism allows OS designers to implement asmall number of basic primitives in the kernel.These primitives are sim-plified,because they are not dependent of any specific policy.They can then be used to implement more complex mechanisms and policies at the user level.29.The conversions are straightforward:(a)A micro year is10−6×365×24×3600=31.536sec.(b)1000meters or1km.(c)There are240bytes,which is1,099,511,627,776bytes.(d)It is6×1024kg.SOLUTIONS TO CHAPTER2PROBLEMS1.The transition from blocked to running is conceivable.Suppose that a processis blocked on I/O and the I/Ofinishes.If the CPU is otherwise idle,the proc-ess could go directly from blocked to running.The other missing transition, from ready to blocked,is impossible.A ready process cannot do I/O or any-thing else that might block it.Only a running process can block.PROBLEM SOLUTIONS FOR CHAPTER25 2.You could have a register containing a pointer to the current process tableentry.When I/O completed,the CPU would store the current machine state in the current process table entry.Then it would go to the interrupt vector for the interrupting device and fetch a pointer to another process table entry(the ser-vice procedure).This process would then be started up.3.Generally,high-level languages do not allow the kind of access to CPU hard-ware that is required.For instance,an interrupt handler may be required to enable and disable the interrupt servicing a particular device,or to manipulate data within a process’stack area.Also,interrupt service routines must exe-cute as rapidly as possible.4.There are several reasons for using a separate stack for the kernel.Two ofthem are as follows.First,you do not want the operating system to crash be-cause a poorly written user program does not allow for enough stack space.Second,if the kernel leaves stack data in a user program’s memory space upon return from a system call,a malicious user might be able to use this data tofind out information about other processes.5.If each job has50%I/O wait,then it will take20minutes to complete in theabsence of competition.If run sequentially,the second one willfinish40 minutes after thefirst one starts.With two jobs,the approximate CPU utiliza-tion is1−0.52.Thus each one gets0.375CPU minute per minute of real time.To accumulate10minutes of CPU time,a job must run for10/0.375 minutes,or about26.67minutes.Thus running sequentially the jobsfinish after40minutes,but running in parallel theyfinish after26.67minutes.6.It would be difficult,if not impossible,to keep thefile system consistent.Sup-pose that a client process sends a request to server process1to update afile.This process updates the cache entry in its memory.Shortly thereafter,anoth-er client process sends a request to server2to read thatfile.Unfortunately,if thefile is also cached there,server2,in its innocence,will return obsolete data.If thefirst process writes thefile through to the disk after caching it, and server2checks the disk on every read to see if its cached copy is up-to-date,the system can be made to work,but it is precisely all these disk ac-cesses that the caching system is trying to avoid.7.No.If a single-threaded process is blocked on the keyboard,it cannot fork.8.A worker thread will block when it has to read a Web page from the disk.Ifuser-level threads are being used,this action will block the entire process, destroying the value of multithreading.Thus it is essential that kernel threads are used to permit some threads to block without affecting the others.9.Yes.If the server is entirely CPU bound,there is no need to have multiplethreads.It just adds unnecessary complexity.As an example,consider a tele-phone directory assistance number(like555-1212)for an area with1million6PROBLEM SOLUTIONS FOR CHAPTER2people.If each(name,telephone number)record is,say,64characters,the entire database takes64megabytes,and can easily be kept in the server’s memory to provide fast lookup.10.When a thread is stopped,it has values in the registers.They must be saved,just as when the process is stopped the registers must be saved.Multipro-gramming threads is no different than multiprogramming processes,so each thread needs its own register save area.11.Threads in a process cooperate.They are not hostile to one another.If yield-ing is needed for the good of the application,then a thread will yield.After all,it is usually the same programmer who writes the code for all of them. er-level threads cannot be preempted by the clock unless the whole proc-ess’quantum has been used up.Kernel-level threads can be preempted indivi-dually.In the latter case,if a thread runs too long,the clock will interrupt the current process and thus the current thread.The kernel is free to pick a dif-ferent thread from the same process to run next if it so desires.13.In the single-threaded case,the cache hits take15msec and cache misses take90msec.The weighted average is2/3×15+1/3×90.Thus the mean re-quest takes40msec and the server can do25per second.For a multithreaded server,all the waiting for the disk is overlapped,so every request takes15 msec,and the server can handle662/3requests per second.14.The biggest advantage is the efficiency.No traps to the kernel are needed toswitch threads.The biggest disadvantage is that if one thread blocks,the en-tire process blocks.15.Yes,it can be done.After each call to pthread create,the main programcould do a pthread join to wait until the thread just created has exited before creating the next thread.16.The pointers are really necessary because the size of the global variable isunknown.It could be anything from a character to an array offloating-point numbers.If the value were stored,one would have to give the size to create global,which is all right,but what type should the second parameter of set global be,and what type should the value of read global be?17.It could happen that the runtime system is precisely at the point of blocking orunblocking a thread,and is busy manipulating the scheduling queues.This would be a very inopportune moment for the clock interrupt handler to begin inspecting those queues to see if it was time to do thread switching,since they might be in an inconsistent state.One solution is to set aflag when the run-time system is entered.The clock handler would see this and set its ownflag, then return.When the runtime systemfinished,it would check the clockflag, see that a clock interrupt occurred,and now run the clock handler.PROBLEM SOLUTIONS FOR CHAPTER27 18.Yes it is possible,but inefficient.A thread wanting to do a system callfirstsets an alarm timer,then does the call.If the call blocks,the timer returns control to the threads package.Of course,most of the time the call will not block,and the timer has to be cleared.Thus each system call that might block has to be executed as three system calls.If timers go off prematurely,all kinds of problems can develop.This is not an attractive way to build a threads package.19.The priority inversion problem occurs when a low-priority process is in itscritical region and suddenly a high-priority process becomes ready and is scheduled.If it uses busy waiting,it will run forever.With user-level threads,it cannot happen that a low-priority thread is suddenly preempted to allow a high-priority thread run.There is no preemption.With kernel-level threads this problem can arise.20.With round-robin scheduling it works.Sooner or later L will run,and eventu-ally it will leave its critical region.The point is,with priority scheduling,L never gets to run at all;with round robin,it gets a normal time slice periodi-cally,so it has the chance to leave its critical region.21.Each thread calls procedures on its own,so it must have its own stack for thelocal variables,return addresses,and so on.This is equally true for user-level threads as for kernel-level threads.22.Yes.The simulated computer could be multiprogrammed.For example,while process A is running,it reads out some shared variable.Then a simula-ted clock tick happens and process B runs.It also reads out the same vari-able.Then it adds1to the variable.When process A runs,if it also adds one to the variable,we have a race condition.23.Yes,it still works,but it still is busy waiting,of course.24.It certainly works with preemptive scheduling.In fact,it was designed forthat case.When scheduling is nonpreemptive,it might fail.Consider the case in which turn is initially0but process1runsfirst.It will just loop forever and never release the CPU.25.To do a semaphore operation,the operating systemfirst disables interrupts.Then it reads the value of the semaphore.If it is doing a down and the sema-phore is equal to zero,it puts the calling process on a list of blocked processes associated with the semaphore.If it is doing an up,it must check to see if any processes are blocked on the semaphore.If one or more processes are block-ed,one of them is removed from the list of blocked processes and made run-nable.When all these operations have been completed,interrupts can be enabled again.8PROBLEM SOLUTIONS FOR CHAPTER226.Associated with each counting semaphore are two binary semaphores,M,used for mutual exclusion,and B,used for blocking.Also associated with each counting semaphore is a counter that holds the number of up s minus the number of down s,and a list of processes blocked on that semaphore.To im-plement down,a processfirst gains exclusive access to the semaphores, counter,and list by doing a down on M.It then decrements the counter.If it is zero or more,it just does an up on M and exits.If M is negative,the proc-ess is put on the list of blocked processes.Then an up is done on M and a down is done on B to block the process.To implement up,first M is down ed to get mutual exclusion,and then the counter is incremented.If it is more than zero,no one was blocked,so all that needs to be done is to up M.If, however,the counter is now negative or zero,some process must be removed from the list.Finally,an up is done on B and M in that order.27.If the program operates in phases and neither process may enter the nextphase until both arefinished with the current phase,it makes perfect sense to use a barrier.28.With kernel threads,a thread can block on a semaphore and the kernel canrun some other thread in the same process.Consequently,there is no problem using semaphores.With user-level threads,when one thread blocks on a semaphore,the kernel thinks the entire process is blocked and does not run it ever again.Consequently,the process fails.29.It is very expensive to implement.Each time any variable that appears in apredicate on which some process is waiting changes,the run-time system must re-evaluate the predicate to see if the process can be unblocked.With the Hoare and Brinch Hansen monitors,processes can only be awakened on a signal primitive.30.The employees communicate by passing messages:orders,food,and bags inthis case.In UNIX terms,the four processes are connected by pipes.31.It does not lead to race conditions(nothing is ever lost),but it is effectivelybusy waiting.32.It will take nT sec.33.In simple cases it may be possible to determine whether I/O will be limitingby looking at source code.For instance a program that reads all its inputfiles into buffers at the start will probably not be I/O bound,but a problem that reads and writes incrementally to a number of differentfiles(such as a compi-ler)is likely to be I/O bound.If the operating system provides a facility such as the UNIX ps command that can tell you the amount of CPU time used by a program,you can compare this with the total time to complete execution of the program.This is,of course,most meaningful on a system where you are the only user.34.For multiple processes in a pipeline,the common parent could pass to the op-erating system information about the flow of data.With this information the OS could,for instance,determine which process could supply output to a process blocking on a call for input.35.The CPU efficiency is the useful CPU time divided by the total CPU time.When Q ≥T ,the basic cycle is for the process to run for T and undergo a process switch for S .Thus (a)and (b)have an efficiency of T /(S +T ).When the quantum is shorter than T ,each run of T will require T /Q process switches,wasting a time ST /Q .The efficiency here is thenT +ST /QT which reduces to Q /(Q +S ),which is the answer to (c).For (d),we just sub-stitute Q for S and find that the efficiency is 50%.Finally,for (e),as Q →0the efficiency goes to 0.36.Shortest job first is the way to minimize average response time.0<X ≤3:X ,3,5,6,9.3<X ≤5:3,X ,5,6,9.5<X ≤6:3,5,X ,6,9.6<X ≤9:3,5,6,X ,9.X >9:3,5,6,9,X.37.For round robin,during the first 10minutes each job gets 1/5of the CPU.Atthe end of 10minutes,C finishes.During the next 8minutes,each job gets 1/4of the CPU,after which time D finishes.Then each of the three remaining jobs gets 1/3of the CPU for 6minutes,until B finishes,and so on.The fin-ishing times for the five jobs are 10,18,24,28,and 30,for an average of 22minutes.For priority scheduling,B is run first.After 6minutes it is finished.The other jobs finish at 14,24,26,and 30,for an average of 18.8minutes.If the jobs run in the order A through E ,they finish at 10,16,18,22,and 30,for an average of 19.2minutes.Finally,shortest job first yields finishing times of 2,6,12,20,and 30,for an average of 14minutes.38.The first time it gets 1quantum.On succeeding runs it gets 2,4,8,and 15,soit must be swapped in 5times.39.A check could be made to see if the program was expecting input and didanything with it.A program that was not expecting input and did not process it would not get any special priority boost.40.The sequence of predictions is 40,30,35,and now 25.41.The fraction of the CPU used is35/50+20/100+10/200+x/250.To beschedulable,this must be less than1.Thus x must be less than12.5msec. 42.Two-level scheduling is needed when memory is too small to hold all theready processes.Some set of them is put into memory,and a choice is made from that set.From time to time,the set of in-core processes is adjusted.This algorithm is easy to implement and reasonably efficient,certainly a lot better than,say,round robin without regard to whether a process was in memory or not.43.Each voice call runs200times/second and uses up1msec per burst,so eachvoice call needs200msec per second or400msec for the two of them.The video runs25times a second and uses up20msec each time,for a total of 500msec per second.Together they consume900msec per second,so there is time left over and the system is schedulable.44.The kernel could schedule processes by any means it wishes,but within eachprocess it runs threads strictly in priority order.By letting the user process set the priority of its own threads,the user controls the policy but the kernel handles the mechanism.45.The change would mean that after a philosopher stopped eating,neither of hisneighbors could be chosen next.In fact,they would never be chosen.Sup-pose that philosopher2finished eating.He would run test for philosophers1 and3,and neither would be started,even though both were hungry and both forks were available.Similarly,if philosopher4finished eating,philosopher3 would not be started.Nothing would start him.46.If a philosopher blocks,neighbors can later see that she is hungry by checkinghis state,in test,so he can be awakened when the forks are available.47.Variation1:readers have priority.No writer may start when a reader is ac-tive.When a new reader appears,it may start immediately unless a writer is currently active.When a writerfinishes,if readers are waiting,they are all started,regardless of the presence of waiting writers.Variation2:Writers have priority.No reader may start when a writer is waiting.When the last ac-tive processfinishes,a writer is started,if there is one;otherwise,all the readers(if any)are started.Variation3:symmetric version.When a reader is active,new readers may start immediately.When a writerfinishes,a new writer has priority,if one is waiting.In other words,once we have started reading,we keep reading until there are no readers left.Similarly,once we have started writing,all pending writers are allowed to run.48.A possible shell script might beif[!–f numbers];then echo0>numbers;ficount=0while(test$count!=200)docount=‘expr$count+1‘n=‘tail–1numbers‘expr$n+1>>numbersdoneRun the script twice simultaneously,by starting it once in the background (using&)and again in the foreground.Then examine thefile numbers.It will probably start out looking like an orderly list of numbers,but at some point it will lose its orderliness,due to the race condition created by running two cop-ies of the script.The race can be avoided by having each copy of the script test for and set a lock on thefile before entering the critical area,and unlock-ing it upon leaving the critical area.This can be done like this:if ln numbers numbers.lockthenn=‘tail–1numbers‘expr$n+1>>numbersrm numbers.lockfiThis version will just skip a turn when thefile is inaccessible,variant solu-tions could put the process to sleep,do busy waiting,or count only loops in which the operation is successful.SOLUTIONS TO CHAPTER3PROBLEMS1.It is an accident.The base register is16,384because the program happened tobe loaded at address16,384.It could have been loaded anywhere.The limit register is16,384because the program contains16,384bytes.It could have been any length.That the load address happens to exactly match the program length is pure coincidence.2.Almost the entire memory has to be copied,which requires each word to beread and then rewritten at a different location.Reading4bytes takes10nsec, so reading1byte takes2.5nsec and writing it takes another2.5nsec,for a total of5nsec per byte compacted.This is a rate of200,000,000bytes/sec.To copy128MB(227bytes,which is about1.34×108bytes),the computer needs227/200,000,000sec,which is about671msec.This number is slightly pessimistic because if the initial hole at the bottom of memory is k bytes, those k bytes do not need to be copied.However,if there are many holes andmany data segments,the holes will be small,so k will be small and the error in the calculation will also be small.3.The bitmap needs1bit per allocation unit.With227/n allocation units,this is224/n bytes.The linked list has227/216or211nodes,each of8bytes,for a total of214bytes.For small n,the linked list is better.For large n,the bitmap is better.The crossover point can be calculated by equating these two formu-las and solving for n.The result is1KB.For n smaller than1KB,a linked list is better.For n larger than1KB,a bitmap is better.Of course,the assumption of segments and holes alternating every64KB is very unrealistic.Also,we need n<=64KB if the segments and holes are64KB.4.Firstfit takes20KB,10KB,18KB.Bestfit takes12KB,10KB,and9KB.Worstfit takes20KB,18KB,and15KB.Nextfit takes20KB,18KB,and9 KB.5.For a4-KB page size the(page,offset)pairs are(4,3616),(8,0),and(14,2656).For an8-KB page size they are(2,3616),(4,0),and(7,2656).6.They built an MMU and inserted it between the8086and the bus.Thus all8086physical addresses went into the MMU as virtual addresses.The MMU then mapped them onto physical addresses,which went to the bus.7.(a)M has to be at least4,096to ensure a TLB miss for every access to an ele-ment of X.Since N only affects how many times X is accessed,any value of N will do.(b)M should still be atleast4,096to ensure a TLB miss for every access to anelement of X.But now N should be greater than64K to thrash the TLB, that is,X should exceed256KB.8.The total virtual address space for all the processes combined is nv,so thismuch storage is needed for pages.However,an amount r can be in RAM,so the amount of disk storage required is only nv−r.This amount is far more than is ever needed in practice because rarely will there be n processes ac-tually running and even more rarely will all of them need the maximum al-lowed virtual memory.9.The page table contains232/213entries,which is524,288.Loading the pagetable takes52msec.If a process gets100msec,this consists of52msec for loading the page table and48msec for running.Thus52%of the time is spent loading page tables.10.(a)We need one entry for each page,or224=16×1024×1024entries,sincethere are36=48−12bits in the page numberfield.。
麦克斯韦方程 讲义说明书
•
•
•
•
•
Sources of electromagnetic fields
Differential form of Maxwell’s equation
Stokes’ and Gauss’ law to derive integral form of Maxwell’s equation
Some clarifications on all four equations
)
Moving charge creates magnetic field
- Typically charge and current densities are utilized in Maxwell’s equations
to quantify the effects of fields:
1. Uniform field
Gauss: Integration over closed surface
= ∙ = ∙ = ∙ ∙ []
- angle between field and normal vector
to surface matters
•
ρ = electric charge density – total electric charge per unit volume V
(or =
•
=
)
()
lim electric
→0
(or =
current density – total electric current per unit area S
= 0
µ0 =permeability of free space
Econ 629 Lecturenotes-2
Chapter3Consumer theory3.1Mathematical aside3.1.1Euclidean space and Euclidean distanceA space is a list( , 1,..., )in which thefirst component is a set andthe other components are“tools”that are available to work in the space.Ametric space is a set in which one can measure distances between elements,i.e.,( , )where is a set and : × →ℝis a function,called distance,that has the following properties:(1)for each{ , }⊆ , ( , )≥0,and( , )=0if and only if = ;(2) ( , )= ( , );and(3)for each ∈ ,( , )≤ ( , )+ ( , ).Let be a natural number.The setℝ is the set of lists of real√numbers.For instance(1,b e th3.1.MATHEMATICAL ASIDE31 Definition32.A set ⊆ is open in if for each ∈ there is ∈ℝ++such that ( )⊆ .Definition33.A set ⊆ is closed in if its complement in is open,i.e.,if ∖ is open in .Remark3.A closed set is not necessarily a set that is not open.There are sets that are neither closed,nor open.For instance,(0,1]is not open or closed inℝ.There are sets that are closed and open simultaneously.Could you give an example inℝ ?Definition34.A sequence{ } ∈ℕin is a function fromℕinto .The value of the sequence at ∈ℕis ≡( 1,..., )∈ .Definition35.A sequence{ } ∈ℕin converges to ∈ if for each ∈ℝ++there exists ( )∈ℕsuch that for each ∈ℕ, ≥ ( ), ( , )< . If{ } ∈ℕconverges to we write −→ →∞ and define lim →∞ ≡ . Lemma1.A set ⊆ is closed in if and only if for each convergent sequence −→ →∞ ,such that for Each ∈ℕ, ∈ ,we have that ∈ . Definition36.A set ⊆ × is closed in × if for any two convergent sequences in , −→ →∞ and −→ →∞ such that for each ∈ℕ, ( , )∈ ,we have that( , )∈ .3.1.2Inner product and half spacesDefinition37.Let ≡( ) =1∈ℝ and ≡( ) =1∈ℝ .The inner product between and is defined by:⋅ ≡ 1 1+⋅⋅⋅+ .Definition38.Let ≡( ) =1∈ℝ and ∈ℝ.The hyperplane associated with and is the set:ℎ( , )≡{ ∈ℝ : ⋅ = }.Each hyperplane determines two closed half spaces and two open half spaces:Definition39.Let ≡( ) =1∈ℝ and ∈ℝ.∙The positive closed half-space associated with and is the set:ℎ≥( , )≡{ ∈ℝ : ⋅ ≥ }.32CHAPTER3.CONSUMER THEORY ∙The negative closed half-space associated with and is the set:ℎ≤( , )≡{ ∈ℝ : ⋅ ≤ }.∙The positive open half-space associated with and is the set:ℎ>( , )≡{ ∈ℝ : ⋅ > }.∙The negative open half-space associated with and is the set:ℎ<( , )≡{ ∈ℝ : ⋅ < }.Geometrically, is the vector normal toℎ( , ).Let ∈ℎ( , ).If ′∈ℎ>( , )then ⋅( ′− )>0.If ′∈ℎ( , ),then ⋅( ′− )=0.If ′∈ℎ<( , ),then ⋅( ′− )<0Figure3.1:half spaces.3.2.CONSUMER THEORY I:PREFERENCES333.2Consumer theory I:Preferences3.2.1Alternatives space∙There are ∈ℕcommodities.∙Agents consume bundles of commodities:the generic consumption bundle is a vector ≡( 1,..., )∈ℝ +;for each =1,..., , is the amount of commodity consumed at .Sometimes it will be useful to write a consumption vector in matrix notation as ≡[ 1,..., ] .∙There is a set of agents ≡{1,..., }.∙Each agent ∈ has a consumption space ⊆ℝ +.For simplicity in the presentation we will assume that for each ∈ , ≡ℝ +.Consistently we will usually drop the subindex in the notation and refer to the agent’s consumption space .We will study:(1)consumer preferences,(2)utility representation of consumer preferences,(3)consumer choice,and(4)reveled preference theory in the consumer’s world.3.2.2Consumer preferencesEach agent is represented by a preference relation≿ on .At this stage of the theory we study the behavior of an agent“in isolation.”Thus we omit the subindex in the notation.Definition40.Let≿be a binary relation on ⊆ℝ and ∈ .The upper contour set of≿at is (≿, )≡{ ∈ : ≿ }.The indifference set of≿at is (≿, )≡{ ∈ : ∼ }.The lower contour set of≿at is (≿, )≡{ ∈ : ≿ }.The strict upper and lower contour sets of≿at are (≻, )and (≻, ),respectively.The following are further restrictions that are usually assumed on con-sumer preferences.Desirability assumptionsDefinition41.We use the following notation for vector inequalities:for each{ , }⊆ℝ , ≥ if for each =1,..., , ≥ ; ⪈ if ≥ and = ; ≫ if for each =1,..., , > .Definition42.A binary relation≿on ⊆ℝ is:34CHAPTER3.CONSUMER THEORY ∙strictly monotone if for each{ , }⊆ℝ such that ⪈ ,we have that ≻ (strict monotonicity is also referred to in the literature as “strong monotonicity.”)∙monotone if for each{ , }⊆ℝ such that ≫ ,we have that ≻ .∙weakly monotone if for each{ , }⊆ℝ such that ≥ ,we have that ≿ .∙locally non-satiated if for each ∈ and each ∈ℝ++there is ∈ ( )such that ≻ .Remark4.Weak monotonicity does not imply local non-satiation.For instance let≿be a preference on ≡ℝ +defined by:for each{ , }⊆ , ∼ .Clearly,≿is weakly monotone,but it is not locally non-satiated. Remark5.If≿is transitive,weakly monotone,and locally non-satiated, then≿is monotone.We prove this.Let{ , }∈ℝ +be such that ≫ . We prove that ≻ .Suppose by means of contradiction that¬ ≻ .Since ≫ and≿is weakly monotone,then ≿ .Since¬ ≻ ,then ≿ . Thus, ∼ .We claim that for each ∈ℝ +such that ≤ ≤ , ∼ .To prove this,observe that since≿is weakly monotone,then ≿ ≿ .Since ≿ ,then by transitivity of≿, ∼ .Let ∗≡ + 2. We claim that ( ∗)⊆{ ∈ℝ +: ≤ ≤ }.Seefigure.Figure3.2:Illustrating Remark5.3.2.CONSUMER THEORY I:PREFERENCES35To prove this,let ∈ ( ∗).We claim that ≤ .Suppose by means of contradiction that ≰ .Thus,there is ∈{1,..., }such that < .Since ∗ > ,then∣ ∗ − ∣≥∣ ∗ − ∣≥ .Now,∥ ∗− ∥= (∑ =1( ∗ − )2)136CHAPTER3.CONSUMER THEORY containing , ( ),and an open set containing , ( )such that for each ′∈ ( )and each ′∈ ( ), ′≻ ′.There are two cases.(a)There is ∈ such that ≻ ≻ .Prove the claim is true inthis case.(Yo have to:identify candidates for ( )and ( );prove these sets are open, ∈ ( ),and ∈ ( );prove thatthey satisfy the desired property.)(b)There is no ∈ such that ≻ ≻ .Prove the claim istrue in this case.Hint:let ( )≡{ ′∈ : ′≻ }and( )≡{ ′∈ : ≻ ′}.(Yo have to:prove these sets areopen, ∈ ( ),and ∈ ( );prove that they satisfy the desiredproperty.)Finally conclude that there is a contradiction:what is wrong with the fact that there is an open set containing , ( ),and an open set containing , ( )such that for each ′∈ ( )and each ′∈ ( ), ′≻ ′?(This statement is not trivially contradictory.Your job consists onfinding some consequences of it that are.)Lemma2.A preference relation≿on is continuous if and only if for each ∈ , (≻, )and (≻, )are open.Proposition7.If≿is represented by a continuous utility function,then ≿is continuous.(A function : →ℝis continuous if for each convergent sequence in , −→ →∞ ,we have that ( )−→ →∞ ( ).)Proof.Problem5,Section3.2.3.Parametric and simplicity assumptionsIn applied work it is useful to restrict attention to families of preferences that can be generated by one of its indifference sets.Definition48.A preference relation≿is homothetic if its indifference sets are related by proportional expansion along rays,i.e.,for each pair { , }⊆ such that ∼ and each ∈ℝ+, ∼ .Definition49(Mas-Colell et al.(1995)).The preference relation≿on is quasilinear with respect to commodity1if:≡ℝ×ℝ −1+3.2.CONSUMER THEORY I:PREFERENCES37∙If( 1,..., )∼( 1,..., )then for each ∈ℝ,( 1+ ,..., )∼( 1+ ,..., ).∙For each( 1,..., )∈ and each ∈ℝ++,( 1+ ,..., )≻( 1,..., ).A preference relation≿on ≡ℝ×ℝ −1+is quasilinear with respect tocommodity if the above conditions hold with respect to commodity .Definition50.A preference relation≿on ⊆ℝ2+is a Cobb-Douglas preference if it is represented by a utility function of the form, ≡( 1, 2)∈ → ( )≡ 1 1−2for some ∈(0,1).Definition51.A preference relation≿on ⊆ℝ2+is a CES(Constant Elasticity of Substitution)preference if it is represented by a utility function of the form ≡( 1, 2)∈ → ( )≡( 1 1+ 2 2)138CHAPTER3.CONSUMER THEORY6.Construct a quasilinear preference that is not continuous.7.Notation:for each pair{ , }⊆ℝ2+such that ≤ ,let rec{ , }bethe rectangle that has corners and ,that is,{ ∈ℝ2+: ≤ ≤ }.Let ∈ .Define the sacrifice of agent at a bundle ∈rec{0,Ω}, denoted (≿ , ),as the size of the set of bundles that the agent weakly prefers to and could receive at some feasible allocation,i.e.,(≿ , )≡ ({ ∈ℝ2+: ≤Ω, ≿ }).Formally,the size of a set here is the Lebesgue measure of the set.Your intuition of the size of the set is sufficient for solving the following questions.You should know for instance that if ⊆ , ⊆ , ∩ =∅,and ( )>0,then ( )> ( ).Below there is afigure that illustrates the definition.The sacrifice of≿ at is the size of the shaded area.Consider the following function::ℝ2+→ℝ≡( 1, 2)→ ( )≡− (≿ , ).Prove that if≿ is rational,monotone and continuous,then repre-sents≿ in rec{0,Ω}.That is,for each pair{ , }⊆rec{0,Ω}, ≿ if and only if ( )≥ ( ).3.2.CONSUMER THEORY I:PREFERENCES398.Consider the preferences on[1,2]⊆ℝthat are represented by thefunctions in Figure3.3.((a)((b)Figure3.3:Utility functions in Problem8(a)Is the preference in Figure3.3(a)continuous?Formally supportyour answer.(b)Is the preference in Figure3.3(b)continuous?Formally supportyour answer.9.Suppose that the set of alternatives isℝ+.A preference onℝ+issingle peaked if there is ∗∈ℝ+such that:1∙For each pair{ , }⊆ℝ+such that < ≤ ∗, ,and∙For each pair{ , }⊆ℝ+such that ∗≤ < , .40CHAPTER3.CONSUMER THEORY(a)Show that if is continuous then it can be represented by afunction such that for each ≤ ∗, ( )= .(b)Show that if is not continuous then it may not be representedby a function such that for each ≤ ∗, ( )= .(Here youhave to construct a preference that is single peaked but does notadmit a representation such that for each ≤ ∗, ( )= .)(c)Describe a situation in which it is reasonable to assume that theset of alternatives isℝ+and preferences are single peaked. 10.Let≿be a continuous preference onℝ +.Let{ , }⊆ℝ +and ∈ℝ ++.Show that if ⋅ ≥ ⋅ , ≻ ,and ≿0,then there is ′∈ℝ + such that ⋅ ′< ⋅ and ′≻ .11.Let ≡ℝ +.Let≿be a monotone rational preferencerelation onℝ +.Suppose that≿is such that there is at least one strict preference statement,formally,that there are{ , }⊆ℝ +such that ≻ .(a)Is there a discontinuous utility representation of≿?Justify youranswer.(b)Would your answer change if we do not assume that there is atleast one strict preference statement?Justify your answer.。
随机过程--Chapter 2
customer in (0,t] is t-Si. Adding the revenues generated by all
arrivals in (0,t]
N (t)
N (t )
(t Si ) ,
i 1
E (t Si )
i1
14
2.2 Properties of Poisson processes
Solution:
(a) E[S10]=10/= 10 days
(b) P{X11>2} = e -2 = e-2 0.1333
9
2.2 Properties of Poisson processes
Arrival time distribution
Proposition 2.2 :
The arrival time of the nth event Sn follows a Γ distribution
f (t) e t
each interarrival time {Xn, n1} follows an exponential
distribution with parameter .
8
2.2 Properties of Poisson processes
Example 1 Suppose that people immigrate into a territory at a Poisson
and X1 and X2 are independent
7
2.2 Properties of Poisson processes
Similarly, we obtain: P{ Xn>tXn-1=s} = e-t P{ Xn tXn-1= s} = 1- e-t
托福听力Tpo真题——动物专题
TPO Listening Exercises Subject: Animal SciencesYour Name:Your Class:TPO1 Lecture 412.What is the main topic of the lecture●The types of habitats marmots prefer●Methods of observing marmot behavior●Feeding habits of some marmot species●Differences in behavior between marmot species13.According to the case study, why are marmots ideal for observation●They do not hide from humans●They reside in many regions throughout North America●They are active in open areas during the day●Their burrows are easy to locate14.Drag the appropriate description of each marmot species' behavior to the box below the marmot's nameClick on a phrase. Then drag it to the space where it belongs.One of the phrases will not be usedDisplays aggressive tendencies is family oriented says active during the winterOlympic Marmot Eastern Marmot15.What reason does the professor give for the difference in marmot behaviour patterns?●Type of food available●The size of the population●Interaction with other marmot species●Adaptations to the climate16.Why does the professor say this()●To inform the student that his definition is incorrect●To suggest that the student did not do the reading●To encourage the student to try again●To change the topic of discussion17.Why does the professor say this()●To express a similar concern●To encourage the student to explain what she means●To address the student's concern●To agree with the studentTPO4 Lecture 16. What is the lecture mainly about?A. Method s of observing unusual animal behavior.B. A theory about ways birds attract mates.C. Ways animals behave when they have conflicting drives.D. Criteria for classifying animal behaviors.7. Indicate whether each of the activities below describes a displacement activity.Click in the correct box for each phrase.Yes No An animal attacks the ground instead of itsenemy.An animal falls asleep in the middle of amating ritual.An animal eats some food when confronted byit enemy.An animal takes a drink of water aftergrooming itself.8. What does the professor say about disinhibition?A. It can prevent displacement activities from occurring.B. It can cause animals to act on more than one drive at a time.C. It is not useful for explaining many types of displacement activities.D. It is responsible for the appearance of seemingly irrelevant behavior.9. According to the lecture, what is one possible reason that displacement activities are often grooming behaviors?A. Grooming may cause an enemy or predator to be confused.B. Grooming is a convenient and accessible behavior.C. Grooming often occurs before eating and drinking.D. Grooming is a common social activity.10. Why does the professor mention the wood thrush?A. To contrast its displacement activities with those of other animals species.B. To explain that some animals display displacement activities other than groomingC. To point out how displacement activities are influenced by the environment.D. To five an example of a n animal that does not display displacementactivities.11. Replay: What does the professor mean when she says this?A. She is impressed by how much the student knows about redirecting.B. She thinks it is time to move on to the next part of this lectures.C. The student’s answer is not an example of a displacement activity.D. The student should suggest a different animal behavior to discuss next.TPO7 Lecture 210.what is the lecture mainly about?●How animals emit ultrasonic pulses●How bats use acoustical signals● A comparison of echolocation and radar●Variations among bats in the use of ultrasound11.why does the professor decide NOT to add more information to the diagram on the board?●She wants students to complete the diagram themselves as an assignment●She needs to look up some information in order to complete the diagram accurately●The additional information is not relevant to the topic that she wants to discuss next●Students already have the additional information in their textbook12.According to the professor, what are two ways in which a moth might react when it detects the presence of a bat?Click on 2 answers●The moth might stop beating its wings●The moth might emit high-frequency sounds●The moth might leave the area●The moth might change its color to match its surroundings13.What surprising information did a recent experiment reveal about lesser spear-nosed bats?●They filter out echoes from some types of trees●They can analyze echoes from stationary objects with complex surfaces●They cannot analyze "jagged" echoes●They cannot analyze echoes from certain types of small moving objects.14.According to the professor ,why does a pine tree produce a "smooth" echo?●Because it has a smooth trunk●Because it has large branches spaced at regular intervals●Because it has many small, densely packed needles●Because it remains stationary in all types of weather15.Why does the professor say this()●To answer a question that Carol asked●To correct a statement that Carol made●To praise Carol for an example that she gave●To give an example of a principle that Carol statedTPO8 Lecture 11.What is the main purpose of the lecture?A.To compare active habitat selection with passive habitat selectionB.To show that most habitat preferences in animals are learnedC.To compare the habitat requirements of several bird speciesD.To examine the consequences of habitat selection by animals2.What element of the lover’s habitat in California was threatened?A.The availability of foodB.The availability of waterC.The safety of nests from human activityD.The protection of nests from predatory birds3.What does the professor illustrate with the example of the blue warbler?A.The relationship between human activity and habitat lossB.The relationship between habitat and reproductive successC.The advantages of habitats with low vegetation densityD.The reproductive advantage that young warblers have over olderwarblers4.Why does the professor mention the population density of blackcaps intwo different habitats?A.To explain the similar reproductive rates in the two habitatsB.To explain the relation between a species’ population density and itsnesting behaviorC.To illustrate the advantages of a preferred habitat over a secondaryhabitatD.To illustrate the possible impact of making a poor habitat selection5.According to the professor, why did some blackcaps choose a secondaryhabitat?A.They were following a moving food supplyB.Their preferred habitat was taken over by another bird speciesC.Their nesting sites were disturbed by human activityD.Their preferred habitat became too competitive6.Listening again to part of the conversation. Then answer the question.What can be inferred about the professor when she says this?A.She realizes that she just contradicted a statement she made earlierB.She is about to discuss another aspect of the topicC.She thinks the answer to her question is obviousD.She wants students to recall a case that she has already discussed.TPO10 Lecture 16 What is the lecture mainly about○ Recent fossil evidence connecting whales and the hippopotamus○ Difficulties in the determining the evolutionary history of whales○ Similarities among ancient ancestors of whales○ Similarities between whales and other modern-day animals7 According to the professor, what three aspects of the Ambulocetus fossil make Ambulocetus a likely bridge between land mammals and sea mammals?Click on 3 answers○ It had an elongated skeletal structure○ It strongly resembled a modern hippopotamus○ It had an unusually kind and thin tail for a whale○ It had limbs that could have been used for walking○ Its skull had ear bones characteristic of land mammals8 According to the professor ,what does the discovery of Ambulocetus mean to researchers?○ It fills a gap in the fossil evidence for whale evolution○ It has become less significant since the discovery of Basilosaurus○ It call into doubt the theory that whale evolved from land mammals○It suggests that whales evolved more recently than was previously believed9 What evidence suggests that whale are descendants of the hippopotamus○ Similarities between hippopotamus fossils and the Ambulocetus fossil ○ Similarities in the genes of hippopotamuses and whales○Similarities in the habitats of modern hippopotamuses and ancient whales○ Similarities in the skeletal structures of modern hippopotamuses and ancient whales10 What is the professor's opinion about recent genetic studies relating to whale evolution?○ They solve a long-standing mystery involving fossil evidence○ They contain significant errors○ They present evidence that conflicts with fossil evidence.○The findings of the various studies should not have surprised researchers11.What does DNA evidence indicate about relationships among whales?○ All modern whales descend from sperm whales○Differences among toothed whales are less significant that was previously thought○ Not all toothed whales are closely related○Sperm whale are more closely related to killer whales than was previously thoughtTPO11 Lecture 12.what is the talk mainly about?●Various predators that threaten young birds●Various patterns of growth in young birds●One way that birds protect their young●One way that birds provide food for their young3.according to the lecture, what do birds usually do when putting on a distraction display?Click on 2 answers●They imitate another kind of animal●They fly in circles around their nest●They cover their nest with their wings●They pretend they are sick or injured4.according to the lecture,when do birds put on their most conspicuous distraction displays?●Just before they lay their eggs●Immediately after they have laid their eggs●Just before their young become independent●Immediately after young have left the nest5.why does the professor say this()●To introduce an explanation●To express uncertainty●To point out an error●To emphasize a point that should be obvious6.Why does the professor say this()●To explain the behavior of the predator●To emphasize that predators have excellent hunting skills●To state the purpose of birds' behavior●To emphasize the risks involved in a distraction display7.why does the professor say this()●To describe the behavior of an injured sandpiper●To give an example of a well-performed broken-wing display●To show why some sandpipers fail to distract predators●To distinguish the sandpiper's display from another kind of displayTPO14 Lecture 2Part 31.What is the lecture mainly about?✧Difficulties animals have in regulating their body temperatures✧How people can affect animals’ microclimates✧Ways of identifying different types of microclimates✧The importance of microclimates to some animals2.What two factors does the professor say can affect a microclimate?Click on 2 answers.✧The size of the animal population in the area✧The number of other microclimates in the area✧The elevation of the land where the microclimate is located✧Human activity in the area where the microclimate is located3.What point does the professor make when she mentions squirrels?✧Studying squirrels has helped biologists identify differentmicroclimates.✧Mammals have more than one way of regulating their bodytemperature.✧Smaller animals have more success than larger animals in adapting todifferent microclimates.✧Squirrels do not rely on microclimates as much as other mammals do.4.What does the professor imply the professor imply about reptiles andmicroclimates?✧Microclimates can be both helpful and harmful to reptiles.✧Microclimates are one of the many ways reptiles control their bodytemperature.✧Many reptiles position themselves in microclimates when waiting fortheir prey.✧Many reptiles spend most of their time in one type of microclimate.5.According to the professor, how do decomposing leaves affectmicroclimates?✧Decomposing leaves form layers that prevent sunlight from warmingthe ground below the leaves.✧Decomposing leaves insulate burrows, keeping the burrows cool.✧Decomposing leaves generate heat, creating a warm microclimate.✧Decomposing leaves bring moisture to dry microclimates.6.Listen again to part of the lecture. Then answer the question.Why does the student say this:✧To refer to a well-know misconception about reptiles✧To indicate that he understands the professor’s explanations✧To provide an example that may be an exception to the professor’sstatement✧To indicate that there is more than one explanation for a phenomenonTPO15 Lecture 429. Why does the professor discuss the exploration of hydrothermal vents?To show how the exploration helped researchers to determine the composition of ocean water.To show how the exploration challenged an assumption about biological communities.To compare two competing theories concerning chemosynthesis.To compare the life cycle of underwater plants to the life cycle of underwater animals.30. What are three of the conditions of water near hydrothermal vents that made researchers think they would not find living organisms there? Click on 3 answersExtreme heatExtreme pressureFast currentsLack of mineralsLack of sunlight31. What does the professor imply about the researchers’ reacti on to the biological community discovered on the ocean floor?They were surprised at the large variety of organisms living near hydrothermal vents.They were surprised to find any bacteria living without sunlight.They were disappointed at not finding any animal life.They could not agree on the significance of the data that they collected.32. According to the professor, what is the role of chemosynthesis in biological communities that are found hydrothermal vents?It enables organisms to convert hydrogen sulfide into food.It enables organisms to convert tiny amounts of light into energy.It enables organisms to withstand large amounts of carbon dioxide.It enables organisms to regulate their temperature.33. Why does the professor mention the bacteria that live inside a tube worm?To give an example of organisms that pose a threat to tube worms.To explain what provides the organic material that tube worms use for energy.To give an example of other organisms that can withstand extreme heat.To give an example of organisms that are involved in both chemosynthesis and photosynthesis.34. What does the professor imply when she says thisShe will review information from the assigned chapter.She will present additional information related to the assigned chapter. The quiz on the assigned chapter will be longer than other quizzes. The class has spent too much time on the assigned chapter.TPO16 Lecture 36. What is the lecture mainly about?A. Different foraging strategies among animals.B. Methods beavers use to gather building materials.C. Decisions beavers make about where to live.D. Choices beavers face when foraging.7. What differences between aspen trees and ash trees does the professor point out?A. Aspen trees are easier to transport.B. Aspen trees provide better wood for construction.C. Aspen trees provide less nutrition for beavers.D. Aspen trees have more overall value to beavers.8. What does the professor identify as the two central issues involved in beavers’ behavior? Click on 2 answers.A.How far from home to forage.B.How to cope with competition.C.What size tree to cut down.D.What time of year material for construction is available.9. What does the professor say about the cutting down of large trees?A. Beavers generally prefer cutting down large trees to small trees.B. Beavers generally do not travel long distances to cut down large trees.C. Beavers will not cut large trees of certain species.D. Beavers use large trees mainly for the purpose fo building shelters.10. According to the professor, why do beavers generally forage at night?A. Beavers are safe from predators if they forage at night.B. Foraging at night requires less energy than foraging in the daytime.C. Beavers stay with their offspring during the daytime.D. Beavers face less competition for food from other animals during the night.11. Why does the professor say this?A. To explain her reasoning.B. To indicate why her belief was wrong.C. To give an example of a decision beavers make.D. To explain the reason beavers travel far for wood.TPO17 Lecture 41.What is the lecture mainly about?A.Different kinds of color vision in sea animals.B.Differences in appearance between various species of octopus.C.Ways that octopuses attract their prey.D.Ways that octopuses protect themselves from predators.2.Why does the professor first mention Proteus?A.To explain how the octopus got its scientific name.B.To introduce the octopus’ exceptional abilities.C.To point out that the octopus played an important role in Greek mythology.D.To provide an example of a mythological character that was part animal and part human.3.How does an octopus change color to match the colors in its environment? Click on 2 answersA.By raising its papillae.B.By releasing colored ink.C.By reflecting light from its environment.D.By contracting the muscles around its chromatophores.4.What does the professor say about the function of the papillae?A.They produce dye in different colors.B.They propel the octopus through the water.C.They change the texture of the octopus’ skin.D.They help the octopus contract into a smaller shape.5.What two examples does the professor mention to describe the octopus’ ability to change its shape? Click on 2 answersA.A small round stoneB.The leaves of a plantC. A cloud of ink.D.A piece of coral.6.Why does the professor say this?A.To point out an error.B.To illustrate a point.C.To propose an explanation.D.To correct a misunderstanding.TPO 18 Lecture 429. What is the main purpose of the lecture?To explain the biological advantages of a physical change that occurs in North American wood frogsTo explain why the North American good frog's habitat range has expandedTo describe the functioning of the circulatory system of the North American wood frogTo introduce students to an unusual phenomenon affecting North American wood frogs30. Why does the professor first mention the arrival of spring?To encourage students to look for thawing wood frogsTo point out the time period when frogs begin matingTo explain why the class will soon be doing experiments with wood frogs To emphasize the speed of the thawing process31. What happens to a wood frog as it begins to freeze?Blood is concentrated in the center of its body.Blood stops producing sugarWater moves out of its internal organs.Water from lust beneath the skin begins to evaporate32. What are two points the professor makes about the thawing process of the wood frog? Click on 2 answers.The thawing process is not fully understood.The thawing process takes longer than the freezing process.The frog's internal organs thaw before its outer skin thaws.Thawing occurs when the frog's heart begins pumping glucose through its body.33. What impact does freezing have on some thawed wood frogs?It increases their reproductive success.It decreases their life span.It causes them to be more vocal and active.It reduces their ability to recognize potential mates.34. What does the professor imply when she says this:She wants the student to clarify his question.She wants the student to draw his own conclusions.She thinks the student does not understand how car antifreeze worksShe thinks the student has misunderstood her pointTPO 20 Lecture 412. What is the lecture mainly about?Typical features of the snowshoe hare that do not result from adaptation Various strategies used by snowshoe hares to find food during the winter Characteristics that snowshoe hares have developed in response to their environmentInteractions between snowshoe hares and human populations in the state of Maine13. According to the professor, wh at causes the snowshoe hare’s fur to begin turning white?A decrease in the hours that the Sun is up each dayA sudden drop in temperatureThe increasing amount of snow on the groundThe changing nature of the food supply14. Why might an early snowfall be a particularly dangerous time for the snowshoe hare?Its feet would not yet have grown to resemble snowshoes.Its babies would not yet be able to keep themselves warm.Its chances of being seen by a predator are much higher.It might not be able to locate where it stored its food supply.15. The professor implies that the snowshoe hare has an advantage over other animals because of its unusual feet. What is that advantage?It can reach food in higher locations better than its competitors.It can stay warm in cold weather longer than its competitors.It can outrun its predators in deep snow.It can dig under the snow to hide from its predators.16. The professor explains that the snowshoe hare’s food supply is available year-round. What does the availability of food allow the snowshoe hare to do?Store body fat for the cold monthsRemain lightweight through the winterGive birth during the winterGrow fur quickly during the first year after birth17. Why does the student say this:He wants to support the professor’s point with an example.He is grateful the professor has answered his question.The professor’s explanation contradicts his own experience.The professor may not believe he is telling the truth.TPO 21 Lecture 36. What is the lecture mainly about?Methods of analyzing toxic proteins in snake venomInsights about snake evolution provided by venom analysisHow snake venom differs from lizard venomWhy colubrids are considered nonvenomous snakes7. Why does the professor review information about the classification of snakes that students probably learned in previous courses?To determine whether the students have enrolled in the appropriate courseTo stress the usefulness of the classification system for studentsTo present assumptions that have recently been challengedTo give an example of a method that she will explain in greater detail8. According to the professor, what is a major weakness of the classification system that is based on animals' physical characteristics?It can show the relationships only among a small number of animal species.It requires technology that is not widely available.It cannot account for characteristics that first appeared in the recent geologic past.It cannot determine whether similar characteristics developed in similar ways.9. According to the professor, in what way do colubrid snakes differ from other venomous snakes?Colubrids did not evolve from lizards.Colubrids do not use venom to catch their prey.The front teeth of colubrids are much larger than those of other venomous snakes.Colubrids produce a much stronger type of venom than other venomous snakes do.10. Why does the professor mention the brown tree snake?To support a hypothesis about the evolution of constrictor snakesTo support a hypothesis that venomous snakes evolved from constrictor snakesTo give an example of a snake species that was never venomousTo give an example of a type of snake that can change its color11. What is the professor's attitude toward the results from medical research on snake venom proteins?She is enthusiastic about the drugs that have been tested to date.She is concerned about the side effects of drugs created from snake venom proteins.She doubts that the DNA database will be useful in developing new drugs.She thinks it is too early to tell how successful the research will be.TPO 22 Lecture 323. What is the lecture mainly about'?A proposal to identify all the animals that became extinct dining the Pleistocene epochA strategy for reintroducing native plants to an ecosystemA process for identifying alternative habitats for large animalsA proposal to re-create features of ecosystems of the Pleistocene epoch24. According to the professor, what are the two main goals of Pleistocene rewinding? Click on 2 answersTo restore some evolutionary processes that ended during the Pleistocene epochTo help prevent the extinction of certain species of mega faunaTo increase populations of native animal species in the western United StatesTo create a living laboratory where animal interactions can be observed25. According to the professor, how did the American cheetah influence the pronghorn antelope during the Pleistocene epoch?The cheetah prevented the antelope's population from growing too large.The cheetah was a factor in the development of the antelope's speed.The cheetah dispersed the seeds of plants that the antelope needed to survive.The cheetah caused the antelope to migrate out of the western United States.26. What point does the professor make when she discusses the maclura tree?The feeding habits of large animals could help revive some diminishing plant species.The climate has changed in North America since the Pleistocene epoch Mass extinctions of animals are generally preceded by mass extinctions of plants.The maclura tree has changed very little since the Ice Age.27. Why does the professor say that plants and small animals have continued to evolve since the Pleistocene?To indicate why the western United States is well suited for Pleistocene rewildingTo suggest a way to balance an ecosystem using Pleistocene rewildingTo identify a potential problem with the Pleistocene rewilding conceptTo explain how the idea for Pleistocene rewilding came about28. What does the professor mean when she says this:Pleistocene rewilding has been tried before without successPleistocene rewilding should be tried with just a few speciesPleistocene rewilding has already been thoroughly researchedPleistocene rewilding is another form of human interference.PO 23 Lecture 323. What is the lecture mainly about?Parts of the dolphin’s anatomy that allow it to navigateTwo different types of communication used by dolphinsThe way that dolphins store air while swimming underwaterThe meanings of different signals used by dolphins24. Why does the professor discuss the speed at which sound travels?To describe why sounds made under water can travel long distancesTo show why a person cannot hear a dolphin well when it is under water To compare the speed of two different sounds made by dolphinsTo explain how sound waves behave when crossing from one medium into another25. What is the dolphin's melon?An oval-shaped bone that lets the dolphin hear soundsAn organ made of fat tissue that helps a dolphin send sound wavesAn air-filled cavity that lets the dolphin breathe underwaterAn organ filled with water that helps the dolphin measure depth26. What is the dolphin's jaw able to do?Send rapid clicking sounds into waterIncrease the speed of soundsReceive sound waves that have reflected off objectsForce water through the nasal sacs and out the blowhole27. How does the professor organize the information in the lecture?By describing a phenomenon and the physical structures that make it。
Inhibition_of_Direct_Electrolytic_Ammonia_Oxidation_Due_to_a_Change_in_Local_pH1
Inhibition of Direct Electrolytic Ammonia Oxidation Due to a Change in Local pHHanspeter Zöllig,Eberhard Morgenroth,Kai M.Udert *Eawag,Swiss Federal Institute of Aquatic Science and Technology,Überlandstrasse 133,8600Dübendorf,SwitzerlandA R T I C L E I N F O Article history:Received 31January 2015Received in revised form 17February 2015Accepted 18February 2015Available online 9March 2015Keywords:Iridium dioxide low alkalinity water treatmentNernstian diffusion layer acid-base equilibriumA B S T R A C TElectrochemical ammonia oxidation has gained a lot of attention recently as an ef ficient method for ammonia removal from wastewater,for the use in ammonia-based fuel cells and the production of high purity hydrogen.Thermally decomposed iridium oxide films (TDIROF)have been shown to be catalytically active for direct ammonia oxidation in aqueous solutions if NH 3is present.However,the process was reported to be rapidly inhibited on TDIROF.Herein,we show that this fast inhibition of direct ammonia oxidation does not result from surface poisoning by adsorbed elemental nitrogen (N ads ).Instead,we propose that direct ammonia oxidation and oxygen evolution can lead to a drop of the local pH at the electrode resulting in a low availability of the actual reactant,NH 3.The hypothesis was tested with cyclic voltammetry (CV)experiments on stagnant and rotating disk electrodes (RDE).The CV experiments on the stagnant electrode revealed that the decrease of the ammonia oxidation peaks was considerably reduced by introducing an idle phase at open circuit potential between subsequent scans.Furthermore,the polarization of the TDIROF electrode into the hydrogen evolution region (HER)resulted in increased ammonia oxidation peaks in the following anodic scans which can be explained with an increased local pH after the consumption of protons in the HER.On the RDE,the ammonia oxidation peaks did not decrease in immediately consecutive scans.These findings would not be expected if surface poisoning was responsible for the fast inhibition but they are in good agreement with the proposed mechanism of pH induced limitation by the reactant,NH 3.The plausibility of the mechanism was also supported by our numerical simulations of the processes in the Nernstian diffusion layer.The knowledge about this inhibition mechanism of direct ammonia oxidation is especially important for the design of electrochemical cells for wastewater treatment.The mechanism is not only valid for TDIROF but also for other electrodes because it is independent of the electrode material.ã2015The Authors.Published by Elsevier Ltd.This is an open access article under the CC BY license(/licenses/by/4.0/).1.IntroductionDirect ammonia oxidation at catalytically active surfaces can be used for the electrolytic removal of ammonia from wastewater [1,2].Additionally,the process was suggested for the use in fuel cells where ammonia acts as a substitute for hydrogen [3]and for the production of high purity hydrogen in ammonia electrolyzers [4].In contrast to indirect oxidation with active chlorine species,which is mostly employed for wastewater treatment,direct ammonia oxidation does not produce chlorinated by-products such as chlorate,perchlorate or organic chlorinated substances.Furthermore,direct oxidation usually proceeds at lower anode potentials than chlorine formation.Consequently,a high current ef ficiency and a lower speci fic energy demand can be achievedmaking direct ammonia oxidation attractive for wastewater treatment.Direct ammonia oxidation was shown to be technically feasible on isostatically pressed fine grain graphite without concomitant chlorine formation [5].However,the ammonia removal rate was low in real stored urine (2.9Æ0.3gN Ám À2Ád À1)and mineralization of the graphite electrode occurred as a side reaction.Although the mineralization was slow,the graphite electrode has to be considered a consumable.Corrosion problems were also reported with Ni/Ni(OH)2anodes [6].In order to reduce maintenance and material consumption,it would be desirable to find more stable electrode materials that are suitable for direct ammonia oxidation.The catalytic activity for direct ammonia oxidation was demonstrated for thermally decomposed iridium oxide films (TDIROF,[7])or boron-doped diamond electrodes (BDD,[8]).Both electrodes are stable when they are used as anodes.TDIROF electrodes further have the advantage that they are easy to fabricate and that they have a comparatively low overpotential for*Corresponding author.Tel.:+41587655360;fax:+41587655802.E-mail address:kai.udert@eawag.ch (K.M.Udert)./10.1016/j.electacta.2015.02.1620013-4686/ã2015The Authors.Published by Elsevier Ltd.This is an open access article under the CC BY license (/licenses/by/4.0/).Electrochimica Acta 165(2015)348–355Contents lists available at ScienceDirectElectrochimica Actaj o u rn a l h o m e p a g e :w w w.e l s e v i e r.c o m /l o c a t e /e l e c t a c tadirect ammonia oxidation(Table1).The low overpotential eventually leads to a high selectivity towards direct ammonia oxidation and to low specific energy requirements.However,the costs for the precious metal iridium are a drawback of this electrode.Kapałka et al.[7]found that ammonia oxidation peaks of consecutive cyclic voltammograms decreased dramatically on TDIROF if the lower return potential was above the hydrogen evolution region(HER).The authors interpreted these results as an electrode deactivation through surface poisoning by adsorbed intermediate nitrogen species(NH2,ads,NH ads,N ads)formed during the direct ammonia oxidation process initially proposed by Gerischer and Mauerer[9]for platinum(Pt,Eqs.(1)–(5)).NH3ðaqÞÐNH3;ads(1) NH3;adsÐNH2;adsþHþþeÀ(2) NH2;adsÐNH adsþHþþeÀ(3) NH x;adsþNH y;adsÐN2þðxþyÞHþþðxþyÞeÀ(4) NH adsÐNH adsþHþþeÀ(5) where x,y=1or2.This interpretation is often used to explain the decreasing activity of electrodes during direct ammonia oxidation in aqueous media[10].It is mainly based on thefindings of de Vooys et al.[11] who identified N ads as an electrode poison on transition metal electrodes(such as Ru,Rh,Pd)and who generalized the mechanism of direct ammonia oxidation(Eqs.(1)–(5))to transition metal electrodes.However,deactivation of the electrode by surface poisoning might not be the only process leading to lower ammonia oxidation peaks in cyclic voltammetry(CV).In fact,it has been demonstrated for TDIROF[7]and other electrode materials[5,6,8]that direct ammonia oxidation is highly pH sensitive because the actual reactant is NH3while NH4+cannot be oxidized directly.Apparently, direct ammonia oxidation itself(Eqs.(2)–(4)),but also many other anodic processes such as oxygen evolution(Eq.(6)),release a large number of protons.2H2O!O2þ4Hþþ4eÀ(6) This can lead to a strong pH drop in the Nernstian diffusion layer if the electrolyte is not buffered.The consequence is a shift in the local ammonia speciation according to the acid-base equilibrium, resulting in a low availability of reactive NH3.The hypothesis of this study is that decreasing ammonia oxidation peaks on TDIROF in subsequent scans could be due to a drop of the local pH in the Nernstian diffusion layer caused by acidic anodic reactions.To test this hypothesis,we evaluated the ammonia oxidation peaks of CV experiments with varying lower return potentials in stagnant electrolytes.Furthermore,we employed a rotating disc electrode(RDE)to control the thickness of the Nerstian diffusion layer under well-defined hydraulic conditions.These experiments were complemented with numeri-cal simulations of the ammonia concentration profiles in the Nernstian diffusion layer to show that the proposed mechanism is plausible.2.ExperimentalThe TDIROF electrodes were prepared by thermal decomposi-tion of a precursor solution(0.25molÁLÀ1H2IrCl6(99.9%,ABCR GmbH&Co,Karlsruhe,Germany)in i-propanol(99.8%,Merck KGaA,Darmstadt,Germany))on a titanium substrate(grade2, BIBUS METALS AG,Fehraltorf,Switzerland)as previously reported [7].The titanium was sand blasted,treated in1molÁLÀ1oxalic acid (99.5%,Fluka Chemie GmbH,Buchs,Switzerland)at95 C for one hour,rinsed with nanopure water and dried in an oven at105 C for 5minutes.Several layers were deposited to reach thefinal loading. Each IrO2layer was applied by pipetting the precursor solution onto one side of the substrate and distributing it evenly with a brush.The i-propanol was evaporated in an oven at105 C for 10minutes followed by a tempering of the electrodes at500 C for 10minutes.A pair of rectangular electrodes(5cmÁ4cm)was loaded with0.63Æ0.00mgÁcmÀ2and three RDEs(diameter 15mm)with0.81Æ0.14mgÁcmÀ2.As afinal step,the TDIROF was annealed at500 C for1hour.The electrodes were character-ized using a scanning electron microscope(SEM,Nova NanoSEM 230,FEI,Hillsboro,USA).Elemental analysis was performed with an energy dispersive X-ray(EDX)system(INCA4.15,X MAX80, Oxford,UK)attached to the microscope.Results are provided in the supplementary information in section A.The CV experiments in stagnant electrolyte were performed in a one-compartment cell(50mL)with a three electrode setup.The rectangular TDIROF working electrode was pressed against a hole in the bottom of the cell exposing a geometric surface area of 0.5cm2to the electrolyte.The sealing between the electrode and the cell was made out of a silicon O-ring.The reference electrode (Hg/Hg2SO4/K2SO4(MSE),Ref601,Radiometer Analytical,Villeur-banne,France)was contained in a Luggin capillaryfilled with saturated K2SO4(99%,Fluka).The tip of the Luggin capillary was placed2mm above the working electrode.A Pt-wire(geometric surface area: 1.26cm2)was used as the counter electrode.A potentiostat(PGU10V-1A-IMP-S,Ingenieurbüro Peter Schrems, Münster,Germany)controlled the working electrode potential. The working electrode potential and the current density were recorded with the EcmWin software(EcmWin V2.4,Ingenieurbüro Peter Schrems).The temperature and pH were measured continuously(SenTix41connected to pH196,WTW,Weilheim, Germany)but no temperature control was installed.The same potentiostat and pH meter were used in the CV experiments on a RDE but another one-compartment cell(200mL) with three electrodes was used.The TDIROF-RDE was sealed in a Teflon cylinder exposing a geometric surface area of0.95cm2. The cylinder was plugged on the rotator(Jaissle Rotator,Jaissle Elektronik,Waiblingen,Germany)and inserted into the electrolyte from the top.The reference electrode(MSE,HgE11,Sensortechnik Meinsberg,Waldheim,Germany)was contained in a Luggin capillaryfilled with saturated K2SO4(99%,Fluka).The angled tip of the capillary was placed3mm from the RDE.A Pt-foil(geometric surface area:10.62cm2)was utilized as the counter electrode.Table1Comparison of onset potentials and peak potentials for direct ammonia oxidationon thermally decomposed iridium oxidefilms(TDIROF),isostatically pressedfinegrain graphite and boron-doped diamond(BDD)at pH=9.Electrode Material On-set potential Peak potential[V vs.SHE][V vs.SHE]TDIROF[7]0.9 1.1Graphite[5] 1.0 1.4Ni/Ni(OH)2[6] 1.1 1.3BDD[8] 1.6 2.2H.Zöllig et al./Electrochimica Acta165(2015)348–355349The electrolyte temperature was controlled at25Æ0.1 C with a thermostat(Colora Messtechnik GmbH,Lorch,Germany).All experiments were performed in0.5molÁLÀ1Na2SO4(99%,Merck)+ 0.125molÁLÀ1(NH4)2SO4(99.5%,Merck)dissolved in nanopure water.The pH value was adjusted by dosing NaOH(99%,Merck).3.CalculationsWe developed a dynamic numerical1D-model to simulate pH, NH3and NH4+concentrations in the Nernstian diffusion layer of the working electrode.The Nernstian diffusion layer was divided into segments of uniform thickness in which the concentrations were assumed to be homogeneous.The heterogeneous electrochemical reactions of direct ammonia oxidation and oxygen evolution were assumed to affect only the lowest of these segments which we will call the reaction zone.Oxygen evolution was taken into account according to Eq.(6)and direct ammonia oxidation was assumed to lead exclusively to molecular nitrogen for reasons of simplicity: NH3!0:5N2þ3Hþþ3eÀ(7) The surface specific reaction rate r X(mmolÁcmÀ2ÁsÀ1)of thecompound X was estimated based on the measured current density j(mAÁcmÀ2)according to Faraday’s law:r NH3¼Àj NH3FÁn NH3(8)r O2¼Àj O2FÁn O2(9)r Hþ¼n O2Ár O2Àn NH3Ár NH3(10) where F=96485CÁmolÀ1is the Faraday constant,n O2=4(À)and n NH3=3(À)are the number of electrons transferred according to Eqs.(6)and(7).The current density was allocated to the two electrochemical processes as follows:j NH3¼j NHÀj b if:0:3V<E w<0:68V and j NH3>0mAÁcmÀ2(11)j o2¼j NHÀj b if:0:68V<E w and j O2>0mAÁcmÀ2(12) The subscript NH denotes the current density measured duringCV in0.5molÁLÀ1Na2SO4+0.125molÁLÀ1(NH4)2SO4+NaOH and b denotes the background current density measured in 0.5molÁLÀ1Na2SO4+NaOH.The j b was subtracted to account for non-faradaic currents.E w(V)is the potential of the working electrode.The acid-base equilibrium of ammonia was modeled according to the mass action law in all segments individually and was assumed to be in equilibrium instantaneously.The conditional equilibrium constant(K c)was calculated from K¼10ÀpK a (pK a=9.25[12])with the activity coefficients of NH3(g NH3¼1) and NH4+(g NH4¼0:42)accounting for the ionic strength I c=1.88 molÁLÀ1in the supporting electrolyte.The activity coefficients were estimated in the chemical speciation software PHREEQC[13] using the Pitzer approach with a database extended by Pitzer parameters for ammonium[6].The pK c-value was found to be9.62.The concentration of X was denoted with c X in molÁLÀ1.K C¼KÁgNH4gNH3¼c NH3Ác Hþc NHþ4(13)The massflux J Xi,i+1(mmolÁcmÀ2ÁsÀ1)of species X from segment i to segment i+1was modeled with Fick’sfirst law of diffusion (Eq.(14)).The massflux by migration was neglected because of the high conductivity of the used electrolytes[14].J Xi;iþ1¼ÀD Xðc X;iÀc X;iþ1ÞD y(14)The values of the implemented diffusion coefficients were D NH3=1.5Á10À5cm2ÁsÀ1,D NH4+=1.957Á10À5cm2ÁsÀ1, D H+=9.311Á10À5cm2ÁsÀ1[12]and D y(cm)was the thickness of one segment in perpendicular direction to the electrode surface.When an RDE was used,the thickness of the Nernstian diffusion layer d N(cm)was defined by the hydraulic conditions and could be calculated with Eq.(15)[15]depending on the angular velocity v (sÀ1),the kinematic viscosity of water n=8.93Á10À3cm2ÁsÀ1and the diffusion coefficient of ammonia.d N¼1:6ÁvÀ1=2Án1=6ÁD NH31=3(15)This numerical model was implemented in Berkeley Madonna (Berkeley Madonna Inc.Berkeley,USA,Version8.3.18).4.Results4.1.CV experiments in stagnant and agitated electrolytesThe cyclic voltammograms in Fig.1show a strong inhibition of direct ammonia oxidation on our TDIROF electrodes in immedi-ately consecutive scans confirming thefindings of Kapałka et al.[7]. The ammonia oxidation peak in the forward scans(a1)as well as the ammonia oxidation peak in the backward scans(a2)decreased continuously from thefirst to thefifth scan.The peak a1decreasedFig.1.Five consecutive scans on a TDIROF electrode in0.5molÁL-1Na2SO4+0.125 molÁL-1(NH4)2SO4+NaOH at pH=9.25.Scan rate200mVÁs-1,upper return potential:0.8V vs.MSE,lower return potential:-1.1V vs.MSE,T=25.2 C,counter electrode:Pt-wire.The circles( )at0.3and-0.5V vs.MSE mark the points at which the concentration profiles in Fig.5and Fig.7were calculated.350H.Zöllig et al./Electrochimica Acta165(2015)348–355in five scans by 32%.It is important to note that the scans were performed without interruption;the lag phase was 19seconds between two consecutive ammonia oxidation peaks.Thus,the time for diffusion to equilibrate the reactant and pH gradients in the Nernstian diffusion layer was limited.In compliance with the interpretation of Kapa łka et al.[7],the peak a2appears because ammonia is not oxidized in the OER.It was hypothesized that NH 3oxidation requires the redox couple IrO (OH)2/IrO 2(OH)present at anode potentials of about 0.3to 0.7V vs.MSE.Above potentials of 0.7V vs.MSE,the iridium is completely oxidized to IrO 3which excludes the oxidation of ammonia in the OER.However,the oxidation to IrO 3is reversible and therefore ammonia oxidation restarts in the backward scan.The lower return potential was clearly above the HER in which protons would be consumed according to Eq.(16).2H þþ2e À!H 2(16)As the HER was not reached,the protons released during the anodic reactions of ammonia oxidation (Eq.(2)–(4))or oxygen evolution (Eq.(6))were not consumed by hydrogen evolution during the cathodic polarization of the electrode.This means that the reduction of the peaks a1and a2could very well result from a reactant limitation due to a drop in local pH.Fig.2A shows five immediately consecutive CV scans in which the TDIROF electrode was polarized moderately into the HER (lower return potential -1.5V vs.MSE).The ammonia oxidation peaks a1and a2were nearly identical,just the first scan showed slightly smaller peaks.An even more pronounced difference between the first and the consecutive scans can be seen in Fig.2B presenting the data of an experiment where the electrode was strongly polarized into the HER (lower return potential -1.7V vs.MSE).In this case,the ammonia oxidation peaks of the scans two to five (again all nearly identical)were clearly higher than in the first scan.In contrast to the experiment where the HER was not reached (Fig.1),the polarization of the working electrode into the HER resulted in the consumption of protons according to Eq.(16).The longer the electrode was polarized into the HER,the higher were the ammonia oxidation peaks a1and a2in the following anodicpolarizations.This very likely resulted from a higher NH 3concentration in the reaction zone after strong hydrogen evolu-tion.Compared to the experiment with immediate consecutive scans (Fig.1),a considerably lower reduction of a1and a2was observed if an idle period of 4minutes was inserted between individual scans,even if the lower return potential was kept above the HER (Fig.3).The peak a1decreased by no more than 11%from the first to the ninth scan which is clearly less than with immediately consecutive scans.This finding corroborates our hypothesis of an effect in the diffusion layer.Due to the diffusion of protons,ammonia andFig.2.A:Five consecutive scans on TDIROF in 0.5mol ÁL -1Na 2SO 4+0.125mol ÁL -1(NH 4)2SO 4+NaOH with a lower return potential of -1.5V vs.MSE.B:The same as in A but with a lower return potential of -1.7V vs.MSE.The red solid line marks the 5th scan.Scan rate 200mV Ás -1,upper return potential:0.8V vs.MSE,pH =9.25,T =25.3 C,counter electrode:Pt-wire.Fig.3.Three CV scans on TDIROF in 0.5mol ÁL -1Na 2SO 4+0.125mol ÁL -1(NH 4)2SO 4+NaOH at pH =9.25.An idle period of 4minutes was introduced between each scan during which the electrolyte was stirred.The points (4)at -0.4V and (5)at 0.3V vs.MSE at which the concentration pro files in Fig.6were calculated are indicated with the circles ( ).Scan rate 200mV Ás -1,upper return potential:0.8V vs.MSE,lower return potential:-0.9V vs.MSE,T =23.4 C,counter electrode:Pt-wire.H.Zöllig et al./Electrochimica Acta 165(2015)348–355351ammonium,similar NH3concentrations must have been reached in the reaction zone prior to each anodic polarization which resulted in comparable ammonia oxidation peaks.If the much lower decrease of a1and a2would have resulted from the reduction of poisonous N ads,a reduction peak would have been expected in the backward scans.However,this was neither the case with or without idle periods between the scans(Fig.1and Fig.3,respectively).Also the reduction of N ads during the idle phase was very unlikely because the OCP was almost constant between the scans(mean OCP value of all idle periods-0.413Æ0.003V vs. MSE)and certainly did not reach values below the lower return potential(supplementary information B).In Fig.4we presentfive immediately consecutive cyclic voltammograms recorded on an RDE at an angular velocity of 91rpm.In contrast to the scans in stagnant electrolyte without idle phase,the scans following thefirst scan on the RDE did not result in a strong decrease of the direct ammonia oxidation peaks a1or a2. In fact,the peak a1only decreased by5%from thefirst to the second scan.In the following scans,the decrease of peak a1was small(around0.6%in each scan)resulting in a total peak decrease from thefirst to thefifth scan of7%.Also in this experiment,the lower return potential(-0.9V vs. MSE)was chosen clearly above the HER and even0.2V higher than in the experiment in stagnant electrolyte(Fig.1).The time in which concentration gradients could even out was short(17s)and the protons released during direct ammonia oxidation(Eq.(1)–(4)) and oxygen evolution(Eq.(6))could not be consumed by hydrogen evolution.However,by making use of an RDE we were able to control the hydraulics at the working electrode and therewith to reduce d N.The consequences of this can be shown with our model calculations and are presented in the next section.4.2.Concentration profiles in the Nernstian diffusion layer during CVThe electrochemical measurements all supported our hypothesis but they did not show how the diffusion in the electrolyte proceeded and whether the proposed mechanism would be plausible on the observed special and temporal scale.To get more information about the concentration profiles in the diffusion layer we used the dynamic computer model.The initial conditions of the three state variables were chosen as c NH3¼0:07476and c NHþ4¼0:1752molNÁLÀ1and pH=9.25in all simulations.In Fig.5,simulated concentration profiles are given for the characteristic points of the voltammogram in Fig.1.The concentration profiles show that the time between ammoniaFig. 4.Five consecutive scans on a rotating TDIROF electrode in0.5molÁL-1 Na2SO4+0.125molÁL-1(NH4)2SO4+NaOH at pH=9.25.The circles( )at0.3and -0.5V vs.MSE mark the points at which the concentration profiles in Fig.7were calculated.Scan rate200mVÁs-1,upper return potential:0.8V vs.MSE,lower return potential:-0.9V vs.MSE,T=25.0 C,counter electrode:Pt-foil.Fig. 5.A:Calculated pH profiles in the vicinity of the electrode.B:NH3 concentration profiles in the vicinity of the electrode.The profiles correspond to point(4)just before the ammonia oxidation peaks a1appeared in the experiment presented in Fig.1(immediately consecutive scans,bulk pH=9.25).Fig. 6.A:Calculated pH profiles.B:NH3concentration profiles.The profiles correspond to the points(4)and(5)in thefirst idle phase indicated in Fig.3 (4minutes idle phase between scans,bulk pH=9.25).352H.Zöllig et al./Electrochimica Acta165(2015)348–355oxidation peaks in immediately subsequent scans was too short for the pH gradient to equalize(Fig.5A).Consequently,the regions in the vicinity of the electrode became more and more acidic with every scan.Due to the acid-base equilibrium,the change in pH resulted in a strong shift of ammonia ly,the NH3 concentration dropped considerably(Fig.5B).Thus,the concen-tration of the reactant(NH3)became lower during every anodic scan resulting in smaller direct ammonia oxidation peaks.Figs.6A and B display simulated concentration profiles at the points marked in Fig.3during the experiment where an idle phase of4minutes was inserted between the scans.The profiles at the beginning of thefirst idle phase were calculated at the same point in time since the start of the experiment as the profiles calculated before the second scan in the experiment without an idle phase. These concentration profiles form Fig.5and Fig.6are directly comparable.The profiles in Figs.6A and B were less pronounced because the anodic currents in the foregoing scan were smaller. After thefirst idle phase,just before the second anodic polarization started(point(5)in Fig.3),there still was a small shift of ammonia speciation in the reaction zone(Fig.6B).This explains the small reduction of the ammonia oxidation peaks in the following scan and in all additional cycles until the ninth scan.The idle time between the scans allowed concentrations to equalize almost completely before a new anodic polarization so that comparable ammonia oxidation peaks were measured.In stagnant electrolyte,the Nernstian diffusion layer has no limit and could theoretically expand deep into the bulk liquid. From the concentration profiles in Fig.5A it can be deduced that the maximal d N was close to 1.5mm during the experiment presented in Fig.1.On the RDE,d N was hydraulically controlled and much thinner.With Eq.(15)it was calculated to be d N=0.15mm for the applied rotational speed of91rpm.The consequences were the buildup of distinctly different concentration profiles of H+,NH4+ and NH3compared to the stagnant electrolyte leading to a considerably different diffusion behavior.A comparison of four concentration profiles between thefirst anodic polarization and the second anodic polarization in stagnant electrolyte(A,B,and C)and in agitated electrolyte(D,E,and F)is shown in Fig.7.In the stagnant electrolyte and on the RDE,a speciation shift due to a change in local pH appeared.However, when d N was hydraulically controlled on the RDE the concentra-tion gradients evened out much faster.The reason for this was the more pronounced concentration gradients due to a thinner and limited Nernstian diffusion layer.The result was faster diffusion allowing concentrations to draw level quickly.Consequently,the concentration of NH3in the reaction zone at point4prior to the second anodic polarization was much closer to the one found prior to thefirst scan(compare the profiles4at distance0from the electrode in Figs.7B and E).This is remarkable and demonstrates the importance of d N.It should be noted that the time until point 4was reached in the CV on the RDE was shorter,because the lower return potential was higher than in the experiments with stagnant electrolyte(Fig.1).5.Discussion5.1.Mechanisms inhibiting direct ammonia oxidationGerischer and Mauerer[9]distinguished between a fast and a slow passivation of direct ammonia oxidation on Pt.They found that the fast passivation was reversible by simply letting the working electrode rest at OCP.On the other hand,the slowFig.7.A,B,and C:Calculated concentration profiles during the second scan of the experiment in stagnant electrolyte presented in Fig.1.D,E,and F:Calculated concentration profiles during the second scan of the experiment on the RDE presented in Fig.4during which the Nernstian diffusion layer was hydraulically controlled at d N=0.15mm.The numbers in the plots correspond to the numbers in the Fig.1and Fig.4indicating the point in time at which the profile was calculated.H.Zöllig et al./Electrochimica Acta165(2015)348–355353。
lec2-13经典教材《金融时间序列分析》Ruey S. Tsay 英文第三版高清教材以及最新2013年完整版高清讲义
This is called the mean-reversion of the AR(1) process. The variance of forecast error approaches Var[en( )] = 1 2 σ = Var(rt). a 1 − φ2 1
2 σa . 1−φ2 1
k 6. Autocorrelations: ρ1 = φ1, ρ2 = φ2 1 , etc. In general, ρk = φ1
and ACF ρk decays exponentially as k increases, 7. Forecast (minimum squared error): Suppose the forecast origin is n. For simplicity, we shall use the model representation in (1)
4
(g) Behavior of multi-step ahead forecasts. In general, for the -step ahead forecast at n, we have ˆ n ( ) = φ 1 xn , x the forecast error en( ) = an+ + φ1an+ −1 + · · · + φ1−1an+1, and the variance of forecast error Var[en( )] = (1 + φ2 1 + · · · + φ1 In particular, as → ∞, x ˆ n ( ) → 0, i.e., r ˆn( ) → µ.
Revised lecture notes for Chapter 2
2.4 Other applications of the inverting configuration
2. An inverting integrator
Question?
What happens if we change the two components?
2.4 Other applications of the inverting configuration
Example (Ex2.10) Use the superposition principle to find the output voltage of the circuit shown below.
2.6 Examples of Op Amp Circuits
An analog voltmeter with a high input resistance
and i-
What is the value of v+? Applying the summing point constraint, What is the value of v-? Find expressions for the currents flowing through R1 and R2, i1 and i2, in terms of node voltages.
Applying KCL, find an equation for i1, i2 and i Derive the closed loop voltage gain Av=vo/vi
2.3 The inverting amplifier
2.3 The inverting amplifier
.
2.5 The noninverting amplifier
tpo07听力原文
Section1 conversationListen to a conversation between the student and the professorHi, professor Mason, do you have a minute?Yes, of course, Eric. I think there was something I wanted to talk to you about, too.Probably my late essay.Uh, that’s must to been it. I thought maybe I’d lost it.No, I am sorry. Actually it was my computer that lost it. The first draft of it. and um, well anyway, I found I put it in your mailbox yesterday.Oh, and I haven’t checked the mailbox yet today. Well, I am glad it’s there.I will read it this weekend.Well, sorry again. Say, I can send it to you by email too, if you like.Great, I will be interested to see how all they came out.Right, now, um I just … heard of some graduate students talking, something about the party for Dean Adams?Retirement party, yes, our students are invited. Wasn’t there a notice on the anthropology department’s bulletin board?Uh, I don’t know. But I want to offer the help out with it. You know, whatever you need. Dean Adams, well, I took a few anthropology classes with her, and they were great, inspiring, and I just want to pinch it.Oh, that’s very thoughtful of you, Eric. But it would be pretty low key, nothing flashy, that’s not her style.So there is nothing?No, we will have coffee and cookies, maybe a cake, but actually a couple of the administrative systems are working on that, you could ask them, but I think they’ve got it covered.Ok.Actually, oh, no never mind.What is it?Well, it’s nothing to do with the party, and I am sure there are more exciting ways you could sped your time, but we do need some help with something. We are compiling a database of articles the anthropology … as published. There is not much glory in it, but we are looking for someone with some knowledge of anthropology who can enter the articles. I hesitated to mention it, but I know it’s supposed as something you would…No, that sounds kind of cool. I’d like to see what they are writing about.Wonderful, and there are also some unpublished studies. Did you know Dean Adams did a lot field research in Indonesia? Most of them has not beenpublished yet.No, like what?Well, she is really versatile. She’s just been several months studying social interactions in Indonesia, and she’s been influential in ethnology. Oh, and she is also done work in South America, this closer to biology, especiallyWell, how’s species formed. You know, how two distinct species form from one, like when population is the same, species are isolated from each other, and then develop in two different directions and end up as two distinct species.Interesting.Yes, and while she was there in South America, she collected a lot of linguistic information and songs, really fascinating.Well, I hate to see her leave.Don’t worry, she’ll still be around. She’s got lots of projects that she is still in the middle of.Section 1 lecture 2Listen to part of the lecture in a class on theater history. The professor is discussing the theater of 19th century France.The 19th century was the time of what we call realism, developing the European theater. Um, to understand this, though, we first need to look at an earlier form of drama, known as the well-made play, which basically was a pattern for constructing plays, plays that um, beginning with some early 19th century comedies in France, prove very successful commercially. The dramatic devices used here weren’t anything new, they’ve been around centuries. But the formula for a well-made play, require the certain elements be included I a particular order, and most importantly, that everything in the play be logically connected. In fact, some of these playwrights would start by writing the end of the play, and were backward toward the beginning. Just to make sure each of them led logically from what is gone before.Ok, so what are the necessary elements of a well-made play? Well, uh, the first is logical exposition. Exposition is whatever background information you have to reveal to the audience, so they will understand wha t’s going on. Before this time, exposition might’ve come from actor’s significant speeches. Someone might walk out on the stage and say, “…now, we will lay our scene”, and then tell all about the feuding families of Romeo and Juliet. But, but for the well-made play, even the exposition had to be logical, believable, so for example, you may have two servants gossiping as they are cleaning the house,and one says, “oh, what a shame that the master’s son is still not married”, and the other might mention a rumor about um, a mysterious gentleman who’s just moved into the town with his beautiful daughter. These comments are part of the play’s logical exposition.The next key element of a well-made play is referred to as the in sighting incident. After we have the background information, we need a key moment to get things moving, that really makes the audience interested in what happens to the characters we just heard about. So, for example, after the two servants review all these background information, we meet the young man, just as he first lays eyes on the beautiful, young woman, and immediately falls in love. This is the in sighting incident. It sets off the plot of the play. Now, a plot of a well-made play is usually driven by secrets, that the things the audience knows, but the characters often don’t know. So, for example, the audience learn through a letter or through someone else’s conversation who the mysterious gentleman is, and why he left the town many years before, but the young man doesn’t know about this, and the woman doesn’t understand the ancient connection between her family and his, and before the secrets are revealed to the main characters, the plot of the play proceeds as a series of, sort of, up and down moments. For example, the woman first appears not to even know this young man, and it seems to him like the end of the world, but then he learns that she actually wants to meet him, too. So, life is wonderful. Then he tries to talk with her, maybe her father gets furious for no apparent reason. So, they can’t see each other, but just as the young man has almost lost all hope, he finds out, well, you get the idea, the reversals of fortune continue, increasing the audience’s tension and excitement, making them wonder if everything is going to come out ok or not.Next comes an element known as the obligatory scene, it’s a, it’s a scene, a moment, in which all the secrets are revealed, and generally, things turn on well for the hero or, and others we care about. Unhappy ending of some sort, this became so popular that the playwrights almost had to include it in every play, which is why it’s called the obligatory scene, and that’s followed by the final dramatic element, the dénouement, or the resolution. When all the looses have to be tightened up in a logical way. Remember, the obligatory scene, gives audience emotional pleasure, but the dénouement offers the audience a logical conclusion. That’s the subtle distinction we need to try very hard to keep in mind. So, as I said, the well-made play, this form of play writing, became the basis for realism and drama, and for a lot of very popular 19thcentury plays, and also, a pattern, we find them in the plots of many later plays and even movies that we see today.Section 1 lecture 2Listen to part of the lecture in a biology classelephants use infrasound. Now let’s talk about the other end, sound that’s too high for humans to hear, ultrasound. Ultrasound is used by many animals that detect, and some from sent out very high frequency sounds, so what’s the good example? Yes, Carol?Bats. Since they are all blind, bats have to use sound for, uh, you know, to give blind into things.That’s echo location. Echo location is pretty self-explanatory. Using echoes reflect to sound waves to locate things, as Carol said that’s used for navigation and orientation, and what else? Mike?Well, finding food is always important, and I guess not becoming food for other animals.Right, on both counts. Avoiding other predators, and locating prey, um, typically insects that fly around the night. Now before we go on, let just me respond to something Carol was saying. This idea that bats are blind, actually there are some species of bats, the ones that don’t use echo location, they do rely on their vision for navigation. But it is true for many bats, their vision is too weak to count on. Ok, so, quick some review on how echo location works, the bat emits these ultrasounds like poses, very high pitch sound that we can’t hear. And then, they analyze the echoes, how the waves bounce back. Uh, here, let me finish this diagram I started before class. So, the bat sends out these poses, very focused … sound, and echoes bounce back. You know, I don’t think I need to draw the echoes, your reading ass ignment for the next class, it has a diagram hat shows it very clearly, so anyway, as I was saying, by analyzing these echoes, the bat can determine, say, if there is a wall in the cave that needs to avoid, and how far away it is. Another thing it uses ultrasounds to detect is the size and shape of objects. For example, one echo they quickly identify is the one they associate with moth, which is come and prey for bat, particularly the moth beating its wings. However, moths happen to have major advantage over most other insects. They can detect ultrasound. This means that when a bat approaches, the moth can detect the bat’s presence. So, it has time to escape to safety, or else they can just remain motionless, since, um, when they stop beating their wings, they will be much hard for the bats to distinguish from, um, oh, a leaf, or some other objects. Now we’ve tended to underestimate just how sophisticated the abilities of animalsthat use ultrasound are. In fact, we kind of assume that they were filtering a lot out, um the way a sophisticated radar system can ignore echoes from stationary objects from ground. Radar does this to remove ground clutter, information about hills or buildings that doesn’t need, but bats, we thought they were filtering out this kind of information because they simply couldn’t analyze it. But, it looks as if we were wrong. Recently, there was an experiment with trees and specific species of bats, a bat called bat …. Now, a tree should be a huge acoustical challenge for bats, right? I mean it got all kinds of services with different shapes and angles, so, well, the echoes from the tree are going to be a mass of chaotic acoustic reflections, right? Not like the echo from the moth. So, we thought for a long time that bats stop their evaluation as simply, “that’s a tree”, yet, it turns out that the bat, or at least particular species can not only tell that is a tree, but also can distinguish between, say, a pine tree and a deciduous tree, like a maple or oak tree, just by their leaves. And when I said leaves, I mean pine needles, too. Any ideas on how it would know that? Well, like the moth, could be their shape?You’re on the right track. It actually the echo of all the leaves as a whole that matters. Now, think, a pine tree with all those little densely packed needles, those produce a large number of thin reflections in what’s called as a smooth echo, the way from it is even but they …, which has fewer but bigger leaves with stronger reflections, produces a jag waveform, or what we call a rough echo, and these bats can distinguish between the two, and not just with trees, but with any echo that comes in the smooth or rough shape.Section2-conversionListen to a conversation between the student and the librarianHi, I’ new here, I, um, couldn’t come to the student orientation, and I’m wondering if you can give me a few quick points just about the library? I really appreciate it.Sure, I’d be glad to, what’s your major area of study?Latin American literature.Ok, well, over here is the section where we have language, literature and the arts, and if you go down stairs, you will find the history section, generally, the students who concentrate Latin American literature find themselves researching in the history section a lot.Um, um, you are right. I am a transfer student; I have already done a year in another university, so I know how the research can go. I spent a lot of time in history section. So, how long can I borrow books for?A long period as a month. Oh, I should also mention that we have aninter-library loan service, if you need to get a whole of the book that is not in our library, there is a truck that runs between our library and a few other public and university libraries in this area. It comes around three times a week.Hey, that’s great. In my lat school, it can take a really long time to get the materials I needed, so when I had a project, I had to make a plan wait in advance. This sounds much faster. Another thing I was wondering is, is there a place where I can bring my computer and hook it up?Sure, there is a whole area here on the main floor where you can bring a laptop and plug it in for power, but on top that we also have a connection for the internet at every seat.Nice. So I can do all the research I need to do right here in the library. I will have all the resources, all the books and information I need right here one place.Yup, that’s the idea. I am sure you will need photocopiers, too. They are down the hallway to your left. We have assistance when you have to use the copy cards, so you need to buy a card from the front desk. You insert it into the machine, and you are ready to make copies.How much do you guys charge?7 cents a copy.That’s not too bad. Thanks.Um, where is the collection of rare books?Rare books are upon the second floor. They are in a separate room with temperatures controlled, to preserve the old papers and them. You need to get special permission to access I mean, and then you have to wear gloves to handle them, because the oils on our hands, you know, can destroy the paper, and gloves prevent that, so we have baskets of gloves in the room.Ok, thanks. I suppose that’s all I need to know. You’ve been really helpful. Thanks.Anytime, bye.Bye.Section 2—lecture 1Listen to part of the lecture in an anthropology classSo, we’ve been discussing 16th century Native Americans life, and today we are gonna focus on the … peoples. Um, they live in the north eastern great lakes region of North America. Now, back then, their lives depended on natural resources of the forest, especially the birch tree. The birch tree can grow in many different types of soils and it’s … in that area. Now, um, can anyone here describe about birch tree?Um, they are tall and white, the bark I mean.Yes, the birch has white bark. And this tough protective out of layer of tree is white bark, is waterproof, and this waterproof quality of the bark, oh, it made it useful for making things like cooking containers, and a variety of utensils and if you peel birch bark in the winter, we call it a winter bark, um, another layer, tougher inner layer of the tree, adheres to the bark, producing a stronger material, so the winter bark was used for large utensils as containersUm, I know people are making utensils out of wood, but utensils out of tree bark?Well, birch bark is pliable, and very easy to bend. The native Americans would cut the bark and fold it into any shape they needed, then secured with cords until they dried, and they can fold the bark in many shapes.So if they cooked in bowls made of birch bark, wouldn’t that make the food taste funny?Well, that’s one of the greatest things about birch bark, the taste of the birch tree doesn’t get transfer to the food, so it was perfect for cooking containers. But the most important use of the bark by far was the canoe. Since the north east region of north America is interconnected by many streams and waterways, water transportation by vessels like canoe was most essential, the passed through the woods were often over grown, so water travel was much faster. And here was what the native Americans did, they would peel large sheet of bark from the tree to form light weight yet, sturdy canoes. The bark was stretched over frames made from tree branches, um, stitch together and sealed with resin. You know that, the sticky liquid that comes out of the tree? And when it dries, it’s water tight. One great thing about these birch bark canoe was they could carry a large amount of cargo. For example, a canoe weighting about 50 pounds could carry up to 9 people, and 250 pounds of cargo. Wow, but how far could they travel that way?Well, like I said, the north eastern region is interconnected by rivers and streams and the ocean and the coast, the canoes allowed them to travel over a vast area that today we take a few hours to fly over. You see, the native Americans made canoes of all types, for travel on small streams or on large open ocean waters. For small streams, they made narrow, maneuverable boat, while large canoes they need for the ocean. They could travel throughout these areas, only occasionally, having …, um, to carry the canoe over land at short distance, to another nearby stream. And since the canoe was so light, this wasn’t a difficult task. Now, how do you think this affected their lives?Well, if they could travel so easily over such a large area, they could trade with people from other areas which I guess would leave them to foreign lands? Exactly, having an efficient means of transportation, well, that helped to …form a federation, linked by natural water race, and this federation expanded from, um, what’s it now, southern Canada, all the way south to…river, and this efficiency of the birch bark canoe also made an impression on new commerce of today’s area. French trade in the 17th century modeled their, well, they adopted to the design of …birch bark canoes, an they found they could travel great distances, more than 15 kilometers a month, now, besides the bark, the native Americans also used the wood of birch tree, uh, the young trees we used to support for loggings, with the waterproof bark used to roofing, um, branches we folded it to snow shoes, and the native American people were all adept at running, run very fast over the snow, and in these branch birch snow shoes, which is, if you e ver tried to walk in snow shoes, you know it wasn’t easy.Section 2—lecture2Listen to part of the lecture in a geology classLast time we started to talk about glaciers, and how these masses by form from crystallized snow, and some of you were amazed how huge some of these glaciers are. Now, even though it may be difficult to understand how a huge mass biscuit can move, or flow, it’s another word for it, it’s really known secret that the glaciers flow because of gravity, but how they flow, The way they flow, needs some explaining. Now the first type of glacier flow is called basal slip. Basal slip, or sliding as it’s often called, basically refers to the slipping or sliding of the glacier across rocks, actually across a thin layer of water on top of the …rock.Um, so, this process shouldn’t be too hard to imagine, what happens is that the ice of the base of the glacier is under a great deal of pressure. The pressure coming from the weight of overlying ice, and you probably know that under pressure the melting temperature of water, uh, the ice, I mean, is reduced. So, ice of the base of glacier melts even though below zero degrees Celsius. And this results in the thin layer of water between the glacier and ground. This layer of water reduces friction, it’s like a lubricant and it allows the glacier to slide or slip over the …rock. Ok? Now the next type of movement we will talk about is called deformation.You’ve already know that the ice is brittle, if you hit with a hammer, it will shatter like glass, but ice is also plastic it can change shape without breaking,if you leave, for example, a bar of ice, supported um, only one end, the end, the unsupported end, will deform under its own weight though, kind of flat them out with one end, get stored, deformed.Think deformation as a slow depending on the stresses on the glacier, the ice crystals within it reorganize and during this reorganization, the ice crystal realign in a way that allows them to slide, pass each other. And so the glacier moves down hill without any ice actually melting. Now, there are a couple of factors that affect the mountain deformation to take place, or de-speed of the uh, glacier movement. For example, deformation is more likethat think the ices because of gravity, the weight of the ice. And temperature also plays a part herein that cold ice does not move as easily as the ice that’s close to the melting point. In fact, it’s not too different from the way oil is, thicker at lower temperatures. So, if you have a glacier in a slightly warmer region, it will flow faster than the glacier in a colder region. Ok, um, now let’s touch briefly on extension and compression. Your textbook include these as types as particular type of glacier movement, but you will see that there are as many textbooks that admit it as type of movement as include it. And I might not include it right now, if textbook. But, um, basically, the upper parts of glacier have less pressure on them, so they don’t deform as easily, they tend to be more brittle. And …conform in this upper layers of the glacier, when the glacier comes into contact with …rock walls, or is otherwise under some kind of stress but can’t deform quick enough, so the ice would expand or constricted, and that can cause big ficious, big cracks that form in the service layer of the ice. And that brittle service ice moving is sometimes considered a type of glacier movement, depending on which source you are consulting. Now, as you probably know, glaciers generally move really slowly, but sometimes they experience surges, and during these surges, in some places they can move at speed as high as 7000 meters per year. Now speeds like that are pretty unusual, hundreds of times faster than the regular movement of glacier, but you can actually see the glacier move during these surges, though it is rare.。
英语高考资料
银川一中2021届高三年级第二次月考英语试卷命题人:注意事项:1.答卷前,考生务必将自己的姓名、准考证号填写在答题卡上。
2.回答选择题时,选出每小题的答案后,用铅笔把答题卡上对应题目的答案标号涂黑。
如需改动,用橡皮擦干净后,再选涂其他答案标号。
回答非选择题时,将答案写在答题卡上。
写在本试卷及草稿纸上无效。
3.考试结束后,将本试卷和答题卡一并交回。
第一部分:听力理解(共两节。
满分30分)做题时,先将答案标在试卷上。
录音内容结束后,你将有两分钟的时间将试卷上的答案转涂到答题卡上。
第一节(共5小题:每小题1.5分,满分7.5分)听下面5段对话。
每段对话后有一个小题,从题中所给的A、B、C三个选项中选出最佳选项,并标在试卷的相应位置。
听完每段对话后,你都有10秒钟的时间来回答有关小题和阅读下一小题。
每段对话仅读一遍。
例:How much is the shirt?A.$19.15.B.$9.18C.$9.15答案是C.第一节(共5小题;每小题1.5分,满分7.5分)请听下面5段对话,选出最佳选项。
1.What will Joe probably do before skiing next week?A.Take a training courseB.Wear better equipment.C.Try to help others exercise.2.How does Sophia feel about giving a speech?A.Excited.B.Nervous.C.Proud.3.What are the speakers mainly talking about?A.funny man.B.A car accident.C.A car advertisement.4.Why will Jim go to the city library?A.To practice French.B.To attend a meeting.C.To borrow magazines. 5.What season is it now?A.Summer B.Autumn C.Winter.第二节(共15小题;每小题1.5分,满分22.5分)听下面一段对话,回答第6和第7两个小题6.Who is the woman?A.A policeman.B.A computer engineer.C.A clerk in an airline company.7.Where is Mr.Johnson now?A.In Seattle.B.In New York.C.In Los Angeles.听下面一段对话,回答第8和第9两个小题。
独立增量过程为马氏过程
Ç Ä ð øÄ .
Ý Ð Ç Ä ½Ý :
.
Ç Ǒ èÑ ðÐ ,
0
S
Ý ∀ 0 ≤ t1 < t2 < · · · < tn, ∀ i1, . . . , in ∈ S, n ≥ 3,
á Ä X = {Xt : t ≥ 0}
Ý Ǒ øÄ .
X
,
P{Xtn = in|Xtn−1 = in−1, . . . , Xt1 = i1} = P{Xtn = in|Xtn−1 = in−1}.
111
Stat/219 Math 136 - Stochastic Processes Notes on Markov Processes
1 Notes on Markov processes
The following notes expand on Proposition 6.1.17.
1.1 Stochastic processes with independent increments
The idea of the proof is similar to the proof of Lemma 1.1 above. One further result is: Lemma 1.2 If {Xt, t ≥ 0} is a stationary process and a Markov process then it is homogeneous.
Î ùþ
P{Xtn = in|Xtn−1 = in−1, . . . , Xt1 = i1}
=
P{Xtn = in, Xtn−1 = in−1, . . . , Xt1 = i1} P{Xtn−1 = in−1, . . . , Xt1 = i1}
Lecture 2
3
Point Defects – Vacancy
Vacancy is formed due to a missing atom. Vacancy is formed (one in 10000 atoms) during crystallization or mobility of atoms. • Energy of formation is 1 ev. • Mobility of vacancy results in cluster of vacancies. • Also caused due to plastic defor-mation, rapid cooling or particle bombardment. • •
16
Stress
Stress σij
ΔF = ΔA→0 ΔA lim
– Normal stress σ11, σ22, σ33 – Shear stress σ12, σ13, σ23
⎡σ 11 σ 12 σ 13 ⎤ ⎡σ ij ⎤ = ⎢σ 12 σ 22 σ 23 ⎥ ⎣ ⎦ ⎢ ⎥ ⎢σ 13 σ 23 σ 33 ⎥ ⎣ ⎦
1
Engineering materials
Lecture 2 Imperfections and defects Response of materials to stress
2
Crystalline Imperfections (4.4)
No crystal is perfect. Imperfections affect mechanical properties, chemical properties and electrical properties. • Imperfections can be classified as • •
stochastic-processes
Stochastic ProcessesMartin Sewell20061MotivationWe use stochastic processes to develop important concepts infinance,the mar-tingale(describes an efficient market under risk neutrality),Markov processes (“memoryless”property)and Brownian motion(used in stochastic calculus and option pricing).2A note on probabilityIn distinct contrast from the various“real world”interpretations of probability (classical,frequency,propensity,logical(Bayesian)and subjective(Bayesian)) we use the mathematical probability theory of pure mathematics.The theory was developed by Kolmogorov(1933)and is part of measure theory and more generally analysis.3DefinitionsDefinition1Let A be a set.F is a sigma algebra(orσ-algebra)if and only if:•∅∈F and A∈F•If A∈F then A c∈F•If A i∈F for i=1,2,...theniA i∈F.Intuitively,the collection must include any result of complementations,unions, and intersections of its elements.The effect is to define properties of a collection of sets such that one can define probability on them in a consistent way.Definition2Borel algebra(or Borelσ-algebra)on a topological space X is the minimalσ-algebra containing the open sets of X.Definition3A probability space is a triple,(Ω,F,P),where•Ωis the sample space of all possible outcomes1•F is the event space.Its elements are subsets ofΩ,and it is required to be aσ-algebra•P is a measure on F with P(Ω)=1which is known as the probability measureDefinition4A state space(E,E)is a measurable space.Definition5A random variable is a measurable function from a probability space to some measurable space.Definition6A stochastic process is a family of random variables(X t)t∈I from some probability space(Ω,F,P)into a state space(E,E).The set I is the index set.•discrete time,discrete state space•discrete time,continuous state space•continuous time,discrete state space•continuous time,continuous state spaceThe prices of tradable assets are restricted to discrete values and changes can be observed only when the market is open.However,the continuous time, continuous variable process proves to be the most useful for the purposes of valuing derivative securities.Definition7Given a measurable space(E,E),afiltration is a sequence of sigma-algebras F t:0<t<inf with F t contained in F for each t.Definition8A martingale is a discrete-time stochastic process that satisfies the equality:E[X n+1|X1,...,X n]=X nDefinition9A submartingale is a discrete-time stochastic process that satis-fies the inequality:E[X n+1|X1,...,X n]≥X nDefinition10A supermartingale is a discrete-time stochastic process that sat-isfies the inequality:E[X n+1|X1,...,X n]≤X nDefinition11A Markov process is a stochastic process which satisfies the equality:P(c k|c0,c1,...,c k−1)=P(c k|c k−1)Definition12A L´e vy process is any continuous-time stochastic process that has“stationary independent increments”The increments of such a process are the differences X s−X t between its values at different times t<s.2Definition13A Gaussian process is a stochastic process{X t}t∈T such that everyfinite linear combination of the X t is normally distributed.Definition14A diffusion process is a stochastic process with independent increments where the‘displacement’of the variate(its increment)in time dt follows a normal distribution with variance proportional to dt.Definition15Wiener process/Brownian motion is a continuous-time Gaussian stochastic process with independent increments.The probability distribution of X s−X t is normal with expected value0and variance s−t.Definition16random walk is the discrete equivalent of Brownian motion. That is,Brownian motion is the scaling limit of random walk in dimension 1.4ApplicationsWhich of the above(if any)apply to realfinancial markets?If investors are risk-neutral,markets follow a martingale.In practice,of course,investors are not risk neutral,so the expected future price is always greater than or equal to the current value(presumably as compensation for the time value of money and systematic risk)so that the price of a stock follows a submartingale.In a Markov process the conditional probability distribution of the future price depends only on the current price.This is a very good approximation to real markets.Brownian motion is a very strong condition,and not a good approximation of realfinancial markets.However,Brownian motion is a martingale,a Markov process,a Gaussian process,a diffusion,and a L´e vy process,so is a very important and“generic”stochastic process which is used extensively in stochastic calculus for pricing options.3。
Lecture Notes_02(09)
Reading Material: Hongren, et al. Chapter 3
Dr Allen Huang’s Lecture Notes_02
Management Accounting
LEARNING OBJECTIVES
Explain the features of cost-volume-profit (CVP) analysis Determine the breakeven point and output level needed to achieve a target operating income Understand how income taxes affect CVP analysis Explain CVP analysis in decision making
Assumptions
CVP analysis assumes the following: Constant selling price of product; selling price of product from one unit to next unit does NOT change, so that changes in sales revenue and number of units sold are in direct proportion, a linear function (straight line). Constant variable cost per unit; it does NOT change from one unit to next, so that total variable costs and number of units produced and sold are a linear function. Constant total fixed cost; remain unchanged within the relevant range. Constant sales mix (in multiple-products analysis). Units sold equal units produced.
致用英语听力教程第二版unit6studies
致用英语听力教程第二版unit6studiesUnit 6: StudiesIn this unit, we will discuss various aspects related to studying. Let's explore some key topics, tips, and strategies to improve our study skills.1. Effective Study Habits:- Establish a dedicated study space: Find a quiet and well-lit area where you can concentrate and minimize distractions.- Plan a study schedule: Create a timetable that includes specific time slots for studying different subjects or topics.- Set goals: Clearly define what you want to achieve and break down your study tasks into manageable chunks.- Use active learning techniques: Engage in activities like summarizing information, creating flashcards, or teaching the material to someone else.- Take regular breaks: Allow yourself short breaks every hour or so to rest and recharge your brain.2. Note-Taking Strategies:- Cornell Method: Divide your note paper into three sections - a narrow left column for cues and main ideas, a larger right section for detailed notes, and a bottom space to summarize the main points.- Mind Mapping: Use visual diagrams to connect ideas and concepts, starting with a central topic and branching out into subtopics.- Outline Method: Organize your notes hierarchically, using headings and subheadings to capture the structure of theinformation.- Annotation: Write additional comments, questions, or reactions in the margins of your notes to aid comprehension and stimulate thinking.3. Time Management:- Prioritize tasks: Identify the most important and urgent tasks and tackle them first.- Break tasks into smaller steps: Dividing larger tasks into smaller, more manageable steps can make them less overwhelming.- Use a planner or digital tools: Keep track of assignments, deadlines, and upcoming exams using a planner, calendar app, or other digital tools.- Avoid procrastination: Start early and spread your workload evenly to avoid last-minute cramming and stress.4. Active Reading Techniques:- Preview the material: Skim through the headings, subheadings, and any graphics or illustrations to get an overview of the content. - Highlight key information: Use colored markers or underlining to mark important ideas or concepts.- Take margin notes: Write down questions, thoughts, or summaries in the margins to enhance comprehension and engagement with the material.- Review and reflect: After reading a section or chapter, take a few minutes to review and summarize the main points in your own words.5. Preparation for Exams:- Review your notes regularly: Consolidate your learning byreviewing your class notes and supplementing them with additional resources.- Practice past exams or sample questions: Familiarize yourself with the format and types of questions that could be asked.- Create a study group: Collaborate with classmates to discuss and explain difficult concepts, solve problems, and quiz each other.- Get enough rest: Ensure you have adequate sleep before an exam to enhance concentration and cognitive function.Remember, everyone's study habits and preferences may vary, so it's important to find the techniques and strategies that work best for you. Keep trying different methods and approaches until you find your optimal study routine.。
趋势平稳过程的均值和方差
趋势平稳过程的均值和方差## Definitions of Stationary Processes: ##。
Mean of a Stationary Process: The mean of a stationary process is a constant. This means that the expected value of the process does not change over time.Variance of a Stationary Process: The variance of a stationary process is also a constant. This means that the spread of the process around its mean does not change over time.## Covariance of a Stationary Process: ##。
Covariance of a Stationary Process: The covariance of a stationary process is a function of the time difference between two observations.It measures the degree to which two observations are related. The covariance of a stationary process is constantfor all time differences.## Examples of Stationary Processes: ##。
1. White noise: White noise is a stationary process with a constant mean of 0 and a constant variance. The covariance of white noise is 0 for all time differences.2. Random walk: A random walk is a stationary process with a constant mean of 0 and a variance that is proportional to time. The covariance of a random walk is proportional to the time difference between two observations.3. AR(1) process: An AR(1) process is a stationary process with a constant mean and a variance that is proportional to the squared autocorrelation coefficient. The covariance of an AR(1) process is proportional to the autocorrelation coefficient raised to the power of the time difference between two observations.## Applications of Stationary Processes: ##。
《英语听力教程2》文本6
Unit 6 The Computer: a Necessary Evil?Part ⅠGetting readyA computer is a machine that performs calculations and processes information with astonishing speed and precision. A computer can handle vast amounts of information and solve complicated problems. It can take thousands of individual pieces of data and turn them into more usable information with blinding speed and almost unfailing accuracy.A The following words and phrases will appear in this unit. Listen carefully and study the definitions.1. process: put (information, numbers, etc.) into a computer for examination2. program: supply (a computer) with a list of instructions that must be given to a computer in order to make it perform an operation3. laptop: a computer small enough to be held on one's knees for use4. electronic mail (e-mail): an electronic system which joins a group of computers, allowing people to send messages to each other on their computers5. keyboard: several rows of keys on a computer6. Internet: an international network of computer databases7. World Wide Web (WWW): a popular system that makes it easier for people to find and use information on the Internet8. browser: a computer program that lets you find and use information on the Internet9. silicon ship: a very small piece of silicon containing a set of electronic parts and their connections, which is used in computers10. Integrated Circuit: a very small set of electrical connections printed on a single piece of semiconductor material, such as a chipB You are going to hear a short passage about the different sizes of computers. Write down every word as a dictation. It will be read three times. First reading, read from beginning to end. Second reading, read with pauses. Third reading, read without pauses again. (You may find the following words hard to spell: mainframe computer [主机计算机], microprocessor [微处理器].)C You are going to hear the first part of a conversation between a school headmaster and the chairman of the board of directors of the school. They are arguing about the plan for buying a computer for the school. Write down all the pros and cons.Pros Cons●can be used for storing school●rather pricey (expensive)__________, lists of _________ ●would be __________ to spend theand details of _______________ money on more ________, ________ ●can save the ___________ a lot equipment and __________________of ___________________________ ●just like _____________ machines●children can work out their own●waste children's ____________ on____________________ whichwill ________________________________stimulate their ____________ in ●children won't ________ anything ______________ and help them to from itthe subject better●_______ studies are getting verypopular in the _________ schoolsand ____________________________Part ⅡAirlines are wiring up for travelers"Laptop" is a newly coined word for portable computer. Another word for "laptop" is "notebook". Though laptops are comparatively small in size, they are almost as functional as big ones. You can check your e-mail, and reply to those that require a response. You can send a message of your own to a friend in another city. You might also read a few articles in some of the worldwide discussion groups.A You are going to hear a report on the use of laptop computers in planes. First listen to the topic sentences. Fill in the blanks while listening.1. Ten years ago, it was unusual to see people in a ____________ working on ____________ Now they are ____________.2. It all ____________ when they began to have a consistent policy about the use of ____________ during flight.3. Then came the ____________ phone.4. Finally airlines are starting to offer _________ power sources for_________.5. _________ and _________ -flight facilities at airports have been trying to _________.6. New aircraft will all have a modem point and ____________ at every seat. Ant phones will get __________ satellite links.B Now listen to the whole report. While listening for the first time, add more key words in the left- hand column. After the second listening, decide whetherthe statements are true or false. Put "T" or "F" in the brackets.Statements( ) 1. Now it is very common to see people in a plane working on laptop computers.( ) 2. Today many passengers work on laptops in a plane, but only very few will make phone calls, send faxes, check e-mail or surf the World Wide Web. ( ) 3. As soon as you board a plane, you may begin use of your laptop. ( ) 4. Laptop computers first appeared in scare stories.( ) 5. Passengers are not allowed to use their laptops during take-off.( ) 6. The on-board phone not only allows passengers to make urgentlast-minute calls to the office but also allows full data communications to fax machines, corporate computer networks and the Internet.( ) 7. With in-seat power sources for notebooks, battery life is no longer the biggest challenge for notebook users.( ) 8. Though people can work on laptop computers in a plane, they are forbidden to use them at airports.( ) 9. Using the modem point, people in a plane will be able to write e-mail and send data.( ) 10.It is expected to cost about £700 050 000 to fit the modem links, telephone handsets and modify seats in one aircraft.C Now listen to the report again, and correct all the false statements in activity B.________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Part ⅢTechno-chatThe Internet is the name for a group of worldwide information resources. These resources are so vast as to be well beyond the comprehension of a single human being. Not only is there no one who understands all of the Internet, there is no one who even understands most of the Internet. Using the Internet meanssitting at your computer screen and accessing information. But do you know Internet can sometimes act as a match-maker?A You are going to hear Tom and Jason talking about Internet and techno-chat. While listening for the first time, add more key words in the left-hand column. After the second listening, answer the questions in no more than five words or numbers.Questions1. Where do the beauty and utility of Internet lie?________________________________________________2. What are the two main functions of the Internet according to the conversation?________________________________________________3. What is Internet compared to in the conversation?________________________________________________4. How did one of the speakers meet his girl friend?________________________________________________5. What's the name of the bulletin board?________________________________________________6. How long has it been around?________________________________________________7. How much computer time will one dollar buy?________________________________________________8. Who are you going to talk to on a computer network?________________________________________________9. Is it possible for you to have a private conversation on a computer network?________________________________________________10. What's the main advantage of talking through a computer?________________________________________________11. What are the rush hours for techno-chat program?________________________________________________12. What does Tom mean by saying "Look in the mirror, man."?________________________________________________B Now listen to the conversation again. Complete the following summary about Internet and techno-chat programs by writing in the missing words with the help of the above notes and answers.The Internet is a computer _________. It is the _________ and most_________ achievement in the history of _________. Its _________ and_________ lie in the _________. The Internet _________ millions of people all over the world to _________ and to _________. You communicate by either _________ and _________ electronic mail, or by _________ a connection to someone else's computer and _________ messages _________ and_________ You share by _________ in discussion groups and by _________ the many programs and information _________ that are _________ for free. The techno-chat programs on the Internet allow you to talk to people whom you _______ wouldn't talk to, and let you talk about __________ with __________, without prejudice.Part ⅣMore about the topic: Computer Technology and Individual Computers handle many tasks in business, education, manufacturing, transportation, and other fields. They provide scientists and other researchers with a clearer understanding of nature. They give people who work with words an effective way to create documents. They enable designers and artists to see things that have never been seen before. But sometimes computers are offensive enough to interfere with people's private life.The following short passage is about how individual privacy is affected by modern computer technology. Supply the missing words while listening.Most people agree that modern computer _________ is a very successful way to _________ information. Information that used to take _________ or _________ to find can now be found in a few _________ or at most a few_________ using a computer. Yet computer experts say that this technology has developed so _________ that present _________ do not _________ some basic _________.Now there is _________ about the _________ that computers are being used to gather _________ information about _________. The following story will help _________. The person is not _________, but the story shows what kind of __________ can be gathered. Our story is about a young man named John. John works for a large __________.John likes his __________. He enjoys his __________. He likes the other __________ in his office and he thinks he receives fair __________. John just found out that his company has gathered information about him. He _______ that company officials have all his _________ records for the past __________ years. They also know all the __________ John has ever lived. They know what ___________ he has made. They even know he was _________ when he was only __________ years old. The arrest was a __________, and the_________ against him were dismissed. But the _________ of his arrest still_________.John also discovered the company has gathered information about his_________ and _________. It has his _________ record, his _________ records and _________ records. It also has a list of all the _________ calls John has made for the _________ year. In fact, John discovered that the company has _________ information about him than John has about himself. John was _________.John _________ to his supervisor. The supervisor _________ how John_________, but he said that gathering such information is _________ and there was really _______ John could do.That story is not really true. However it _________ to people like John every day. Many large companies now gather information about their _________. Many companies now _________ all telephone calls made by their workers. Company ___________ want to know if the worker is ________ the telephone only for _______ business. They also record what ___________ or ________ the worker has in his or her _________. If the worker _________ and_________ electronic-mail, the company may want _________. The companies say they want to know if a worker is using __________ computer equipment for _________ than company business. Companies say they are not _________ on their workers. They say they are ___________ their workers are _________. The _________ is: "Does the company have the _________ to seek this kind of information?"Some experts say _________ is the best protection of _________. They say people must learn what kind of information can be gathered _________. And they must develop _________ ways to best _________ themselves against the illegal _________ of their privacy.Part ⅤMemory test: Who Invented the First Computer?Computers are tremendously important in a variety of ways. They simplify many difficult or time-consuming tasks to an extraordinary degree. They provide businesses, governments, individuals, and institutions with an efficient way to manage large amounts of information. Nevertheless, very few people know who invented the first computer and when it was invented.A You are going to hear a short passage about the history of computers. First get familiar with the following names.Alan Turning Blaise PascalCharles Babbage Gottfried von LiebnitzB Now listen to the passage. While you listen, don't forget to add more key words in the notes column. After listening, write down briefly what happened in each year listed below with the help of the notes.2000 years ago: __________________________________1642: ____________________________________________1671: ____________________________________________1834: ____________________________________________1936: ____________________________________________1946: ____________________________________________1960s: ___________________________________________C You are going to hear a monologue about computer systems. Listen carefully and complete the following chart.Part ⅥReminder of key points in this unitVerb & Verb Phrase Noun & Noun Phrase OtherPart Ⅰperform mainframe priceyprocess microprocessor reasonablespare chip in minuteshunt in space invader reassuringwork out electronic gamestimulate cataloguefiling cabinetPart Ⅱcheck laptop computer/notebook oddsurf fax gradualcreak open e-mail consistentfly over World Wide Web (WWW) initiallykeep pace keyboard scarespring up suspicion modestmodify electro-magnetic radiation urgentdata on-boardInternet in-seatpower source built-interminal in the region ofweb browsermodemsatellite linkPart Ⅲshare achievement absolutelyestablish mankind significanttag along industrial revolution impressive participate utility wondrous guarantee techno-chat program available for free match-maker fantasticchat session privatecappuccino sipperinhibitionprejudicePart Ⅳgather concern shocked protect extent (il)legaldismiss individual costlyprotest investmentspy on chargefinancial recordtax recordsupervisorPart Ⅴcompute abacus mathematical add infants' school externalmultiply valve computer internaldivide integrated circuit arithmeticprogram silicon chip logicbreak code RAM / ROM principal input output monitor disc drive floppyscannerjoy stickcomponentlight penCentral ProcessingUnit (CPU)。
词汇学之词义关系
Lexicology (Lecture Ten)2011.11.03Synonymy1. Definition of SynonymySynonymy is a relationship of …sameness of meaning‟ t hat may hold between two words. Synonym: a word that means the same as another.2. Types of synonyms 同义词种类绝对同义词、相对同义词、语体同义词、短语同义词a. Absolute (exact) synonymy绝对同义词: Strict synonyms refer to two words which are identical in meaning in all its aspects. They are interchangeable in all contexts. Strict synonyms are very rare, and some linguists even argue that strict synonyms do not exist.e.g. fatherland, motherland; word-building, word-formationb. relative (partial) synonymy 相对同义词:When we speak of synonymy, we mean …partial‟ or …relative‟ synonymy, where we find not only a significant overlap in meaning between two words, but also some contexts where they cannot be used interchangeably.e.g. beautiful, good-looking, prettylaugh, smile, giggle, grinc. phrase synonyms: words, phrases or idioms can be changeablee.g. to take a hand in something; to interfere in somethingto be in two minds; to be in twenty minds3. Distinguishing synonyms 同义词辨析We often take the following things into consideration when we try to find the differences between synonyms.Different English dialectsDifferent stylistic meaningsDifferent connotative meaningsAntonymy1.Definition of AntonymyAntonymy is a relationship of …meaning opposition‟ that may hold between two words. Antonyms can be defined as words which are opposite in meaning.2. Major types of antonymsa. Gradable antonyms 可分级反义词Gradable antonyms include pairs like the following:beautiful uglyexpensive cheapfast slowhot coldlong shortrich poorwide narrowThese pairs are called gradable antonyms because they represent a more/less relation. Since they are gradable, they allow comparison.b. Contradictory (complementary) antonyms 绝对反义词Contradictory antonyms include pairs like the following:asleep awakedead aliveon offremember forgetwin losetrue falseThese pairs are called contradictory antonyms because they represent an either/or relation. If you permit some behavior, then it is not forbidden.c. Converse antonyms (逆行,关系反义词)The following are examples of converse antonyms:lend borrowhusband wifeabove belowbefore afterbehind in front ofConverse antonyms are relational antonyms, the substitution of one member for the other does not change the meaning of a sentence if it is accompanied by the change of subject and object.Polysemy1.Definition of polysemyWhen a word is first coined, it is always the case (true) that it has only one meaning (monosemic). But in the course of development, the same symbol may be used to express new meanings. The result is polysemy.2. Two processes leading to polysemyThere are two important processes in the development of meaning:Radiation (发散)Concatenation(串联)a. Radiation: a process in which the primary meaning stands in the center, and the derived meanings radiate from it in every direction like rays. All the derived meanings can be traced back to the primary meaning.b. Concatenation:a process in which the meaning of a word moves gradually from its primary meaning by successive shifts, like the links of a chain, until there is no connection between the meaning that is finally developed and the primary mea ning.Homonymy1. DefinitionHomonymy is the relation between two words that are spelled or pronounced in the same way but differ in meaning.Homonymy refers to the two words which may sound-alike or look-alike.2. Classification of English homonymsa. Perfect homonyms: words identical in both sound and spelling, but different in meaningbank: n./ bank: n. cbear: n./ bear: vt.同形异义和多义词之间比较难区分,普遍接受的原则是词源原则,如果两个词来自不同的词源,意义上没有关联,就是同形异义,反之就是同义词。
英语二单词
英语二单词一、New words and expressionsNew words1. critical adj. 有判断力的;判断公正(或审慎)的2. non-fiction n. 纪实文学3. position n. 观点;态度;立场4. statement n. 说明;说法;表态5. question v. 表示疑问;怀疑out of question / out of the question6. evaluate v. 估计;评价;评估7. context n. 事情发生的背景,环境,来龙去脉8. value n. values [pl.]是非标准;价值观valuableinvaluable=pricelessvalueless9. represent v. 描述;表现representative adj./n.10. assertion n. 明确肯定;断言11. sufficient adj. 足够的;充足的sufficiencyinsufficient12. statistic n. statistics [pl.]统计数字;统计资料13. integrate v.(使)合并,成为一体14. authority n.专家;学术权威;泰斗an/the authority on sth.authorize15. compare v. 比较;对比compare A with Bcompare A to B16. subject n. 主题;题目;题材17. consistent adj. 相符的;符合的18. inconsistency n. 不一致19. assumption n. 假定;假设20. case n. 具体情况;事例in casein case of firein case that…a case in pointconfirmed/suspected cases21. directly adv. 直接地;径直地22. identify v. 找到;发现23. valid adj. 符合逻辑的;合理的;确凿的validity n. 有效性,正确(性)invalid24. credible adj. 可信的;可靠的incredible=unbelievable25. landmark n.(标志重要阶段的)里程碑26. relevant adj. 紧密相关的;切题的relevancy n. 关联;恰当irrelevant27. current adj. 现时发生的;当前的28. appropriate adj. 合适的;恰当的inappropriateIt's (not) appropriate that ….29. bias n. 偏见;偏心;偏向30. considerably adv. 非常;很;相当多地considerconsideringconsiderableconsiderateconsideration31. Democrat n. (美国)民主党党员,民主党支持者民32. Republican n. (美国)共和党党员,共和党支持者33. reflect v. 显示;表明;表达34. informed adj. 有学问的;有见识的well-informedill-informedPhrases and Expressions1. apply to 使用;应用2. put forth 提出;产生3. take …into account 考虑到;顾及4. accept/take …at face value 相信表面;信以为真5. with a grain of salt 有保留地;持怀疑态度地二、New words and expressionsNew words1. spill v.(使)洒出,泼出,溢出2. respond v. 作出反应;响应respond to…response3. interview v. (媒体)采访,访问4. creative adj. 创作的5. occur v. 发生;出现It occurred to me that…6. remove v. 拿开;去掉7. refrigerator n. 冰箱8. grip n. 紧握;紧抓9. slippery adj. 滑的;滑得抓不住(或站不稳、难以行走)10. content n. 所容纳之物;所含之物11. veritable adj. 十足的;名副其实的;不折不扣的12. yell v. 叫喊;大喊;吼叫13. lecture n.(冗长的)教训,训斥,谴责14. mess n. 肮脏;杂乱;不整洁15. rarely adv. 罕有;很少;不常rare animals / stampsRarely is he late for class.16. puddle n. 水洼;小水坑17. eventually 最后;终于18. restore v. 使复原;使复位;使复职19. sponge n. 海绵块20. effectively adv. 有效地effectiveineffective注意区分:effective / efficient21. tiny adj. 极小的;微小的22. discover v. 了解到;认识到;查明discovery23. grasp v. 抓紧;抓牢24. lip n.(容器或凹陷地方的)边,边沿25. renowned adj. 有名的;闻名的;受尊敬的26. remark v. 谈论;评论27. opportunity n. 机会;时机28. scientific adj. 科学(上)的;关于科学的sciencescientist例如:The medical science is making great progress in the treatment of cancer.You should provide scientific evidence instead of subjective evidence to prove this theory holds water.Several world-renowned scientists will be invited to attend the forum.29. valuable adj. 很有用的;很重要的;宝贵的Phrases and Expressions1. in this manner 用这种方式2. set…apart from 区别;使与众不同三、New words and expressionsNew words1. reflection n. (关于某主题的)思考,回忆2. loyalty n. 忠诚;忠实;忠心耿耿3. recognize v. 承认;意识到4. betray v. 辜负;对…不忠5. indeed adv. 其实;实际上6. virtue n. 高尚的道德;正直的品性;德行7. trend n. 趋势;趋向;倾向;动态;动向8. befriend v. 做(尤指需要帮助者的)朋友;友善相待9. request v. (礼貌或正式地)请求,要求10. trendy adj. 时髦的;赶时髦的11. multitude n. 众多;大量12. mutual adj. 共有的;共同的mutual respect / understanding辨析:mutual / manual / manure / mature / menu / mental13. term n. 词语;术语:措辞14. site n. 网站;站点15. acronym n. 首字母缩略词16. perish v. 丧失;湮灭;毁灭17. thought n. 想法;看法;主意;记忆18. gossip n. 流言蜚语19. challenge v. 考查…的能力;考验…的技巧20. akin adj. 相似的;类似的21. deposit n. 存款22. account n. 账户accountantcurrent accountdeposit account23. interest n. 利息24. well-being n. 健康;安乐;康乐25. welfare n. (个体或群体的)幸福,安全与健康26. essence n. 本质;实质;精髓27. seek v. 寻找28. notoriety n. 恶名;坏名声notorious 相当于infamous29. premise n. 前提;假定;30. exploit v. 利用(…为自己谋利)31. reconnect v. 再联系;再联络32. virtual adj. (通过计算机软件,如在因特网上)模拟的,虚拟的33. assure v. 使确信;向…保证assure sb. of sth.assure sb. that…34. caution n. 警告;告诫35. lyric n. 歌词36. undisputed adj. 不容置疑的;毫无疑问的;不可争辩的37. generation n. (统称)一代人,同代人,同辈人generation gapfour generations living under the same roofPhrases and Expressions1. stick by 坚持忠于;不离不弃(某人)2. through thick and thin 不畏艰难险阻go through thick and thin3. lead to 导致,造成(后果)4. a multitude of 众多的;大量的5. perish the thought 甭想了;但愿不会如此6. engage in (使)从事,参加7. in essence 本质上8. assure…of…使放心;向…保证9. pay attention to 注意10. warn…of…警告某人某事四、New words and expressionsNew words1. blessing n. 好事;有益之事2. subsistence n. 勉强维持生活;生计3. sugar cane n. 甘蔗4. corn n. 玉米5. hog n. 猪6. cash n. 现金7. dairy adj. 乳品业的;生产乳品的n. 牛奶场;乳制品区分:dairy / diary8. complain v. 抱怨;埋怨;发牢骚complaintcomplain to sb. about sth.complain of a splitting headache9. carpenter n. 木工;木匠10. committed adj. 尽心尽力的:坚信的;坚定的commit an errorcommit a crimecommit suicidecommit oneself to (doing) sth.be committed to (doing) sth.commitment11. brick n. 砖;砖块12. hammer n. 锤子;榔头13. escort n. 护送者;护卫队14. remind v. 提醒;使想起15. victim n. 受害者;牺牲品fall victim to sth.16. ideology n. 意识形态:观念形态17. terrorism n. 恐怖主义18. depression n. 萧条期;经济衰退;不景气depressdepressed 沮丧的;萧条的19. unrest n. 动荡;动乱;骚动20. illegal adj. 不合法的;非法的;违法的il是in的变体,否定前缀,再如:illogicalir, im都是in的变体,如:irregular, irresponsible, imbalanced, impossible, immobile21. immigrant n.(外来)移民;外侨22. trafficking n. 非法交易;非法买卖c结尾的词变形时先加k,如trafficker, panicker, picnicker, trafficking, panicking 23. dealer n. 贩毒者;毒品贩子deal in sth.car / drug dealerdeal with sth.24. gang n. 一帮,一群,一伙(闹事、斗殴的年轻人)25. contribute v. 增加;增进;添加(到某物)26. quit v. 停止;戒掉Phrases and Expressions1. bring in 赚得;挣2. eke out a living 竭力维持生计;勉强度日3. sink in 被完全理解;被充分意识到4. look forward to (高兴地)盼望,期待5. over and over again 多次;反复地;一再6. be prepared for 准备好;有所准备7. believe in 认为某事好(对、可接受)五、. New words and expressionsNew words1. transcend v. 超出,超越(通常的界限)2. incessantly adv. 不停地;持续不断地3. noisily adv. 喧闹地noisenoisy4. subtly adv. 不易察觉地;不明显地;微妙地5. enormity n. 巨大;深远影响;严重性enormous6. burden n. (义务、责任等的)重担,负担7. belief n. 相信;信心believebelievableunbelievabledisbelief8. unique adj. 唯一的;独一无二的;独特的9. affliction n. 折磨;痛苦10. especially adv. 尤其;特别;格外11. tribe n. 部落12. species n. 种,物种(分类上小于属)13. discipline n. 自制力;遵守纪律14. confront v. 处理,解决(问题或困境)15. evoke v. 引起,唤起(感情、记忆或形象)16. grief n. (尤指因某人去世引起的)悲伤,悲痛,伤心17. guilt n. 内疚;悔恨guiltybe guilty ofbe / feel guilty about18. anxiety n. 焦虑;忧虑anxious19. anguish n. 剧痛;极度痛苦;苦恼20. despair n. 绝望21. uncomfortable adj.(使)焦虑的,尴尬的,害怕的,不自在的22. physical adj. 身体的;肉体的;躯体的23. equal v. 比得上;敌得过24. conflict n. 冲突;争执;争论25. engender v. 产生,引起(某种感觉或情况)26. pose v. 造成(威胁、问题等);引起;产生27. distinguish v. 区分;辨别;分清28. wisdom n. 智慧;才智;精明29. mentally adv. 精神上;智力上;思想上30. spiritually adv. 精神上;心灵上31. desire v. 渴望;期望32. deliberately adv. 故意;蓄意;存心33. instruct v. 教授;指导34. dread v. 非常害怕;极为担心Phrases and Expressions1. moan about 抱怨2. a series of 系列;连续3. because of 因为4. as well as 除…之外5. cutting edge (处于某事物发展的)尖端,最前沿,领先阶段6. call forth 引起;使产生六、. New words and expressionsNew words1. stationery n. 文具同音词:stationary2. fare n. 车费;船费;飞机票价3. lump sum n. 一次总付的钱款4. recess n. 课间休息,5. allocate v. 拨(给);划(给);分配(给)6. overspend v. 花钱过多;比(预计的)花得多;超支注意over- / out-的区别:overeat outeatoverdo outdooversleep outliveoverweight outshine7. opt v. 选择;挑选optionoptional8. constraint n. 限制;限定;约束9. budget v. 谨慎花钱;把…编入预算10. overindulge v. 过多地享用(尤指食物或饮料)11. short-sighted adj. 目光溜浅的;没有远见的12. mentality n. 心态;思想状况;思想方法13. sibling n. 兄;弟;姐;妹14. indulge v. 沉湎,沉迷,沉溺(于…)15. rationing n. 定量配给政策;配给制16. principle n. 观念;(行动、思想的)理由,信条同音词:principal17. unnecessarily adv. 没必要地18. differentiate v. 区分;区别;辨别differdifferentdifference19. inculcate v. 反复灌输;谆谆教诲20. resist v. 忍住;抵挡resistantresistance21. temptation n. 引诱;诱惑22. scheme n. 计划;方案;体系;体制23. formation n. 组成;形成24. kindergarten n. 幼儿园25. monthly adj. 按月结算的;有效期为一个月的dailyweeklybiweeklymonthlyquarterlyyearlyPhrases and Expressions1. on a daily basis 每日地2. result in 导致3. pay off 付清;偿清4. within one's means 量入为出5. stand…in good stead (需要时)对某人有用,对某人有利七、New words and expressionsNew words1. inner adj. 内心的;隐藏的2. precisely adv. 准确地;恰好地preciseprecision联想:accurate, accuracy比较:simply, possibly, subtly, truly / definitely, rarely, fortunately, likely / luckily, heavily3. bombard v. 大肆抨击;连珠炮似地质问;提供过多信息,4. dreaded adj. 令人害怕的;可怕的5. small talk n. 寒喧;闲谈;聊天6. hesitation n. 犹豫hesitatehesitanthesitancy / hesitation7. wonder v. 想知道;想弄明白;琢磨n. 奇迹wonder wh-…do / work wonders / miracles8. prompt v. 促使;导致;激起9. complete adj. (用以强调)完全的,彻底的10. upset adj. 难过的;不高兴的;沮丧的11. roll v. (使)翻滚,滚动12. despite prep. 即使;尽管despite / in spite of that fact that …13. feeble adj. 无效的;无力的14. attempt n./ v. 企图;试图;尝试attempted15. wipe v.(用布、手等)擦干净,抹掉16. profusely adv. 大量地;连连地17. address v. 写(收信人)姓名地址;致函18. receptionist n. 接待员19. attach v. 把…固定,把…附(在…上)attach …to…attached 依恋的;附加的;附属的attachment 依恋;附件20. emotion n. 强烈的感情;情感;情绪emotionalemotionless21. contain v. 控制,克制,抑制(感情)22. apparently adv. 据…所知;看来;显然23. overwhelming adj. 巨大的;压倒性的;无法抗拒的overwhelming problemsan overwhelmed person联想:surprised / surprisingexcited / excitingamazed / amazingdisappointed / disappointingfrightened / frighting注意:excited eyes / expressions / looks24. scream v. 高声喊,大声叫Phrases and Expressions1. be lost in one's thought 陷入沉思2. break down 失败3. come up with 找到(答案等);想出4. drop…off (顺路)把…放下5. take one's own life 自杀6. in desperation 在绝望中;走投无路7. care about sb. 关心;关怀8. take a chance 冒险9. make a difference 有作用;产生影响The Great Minds名人名言部分补充make A of BA famous quoteA pessimist makes difficulties of his opportunities; an optimist makes opportunities of his difficulties. ----Harry S. Truman悲观者让机会沦为困难;乐观者把困难铸成机会。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
= 0 for all t = 0, 1, ..., p − 1
implies c1 , ..., cm = 0. Given p independent solutions and p initial conditions x0 , ..., xp−1 we can then solve (1) (p) · · · x0 x0 c1 x0 . . . = . . . . . . . . . xp−1
j =0
(2.1)
in mean square and therefore in probability. It can also be shown that (2.2) holds almost surely. Equation (2.2) is the stationary solution to (2.1). It is called causal because it only depends on past innovations.
Under the stationarity assumption we can see that Ext = φExt−1 + 0 ⇒ Ext = 0 and Ext xt−h = φExt−1 xt−h + E εt xt−h such that By premultiplying equation (2.1) by xt on both sides and taking expectations we also have γ xx (0) = φγ xx (1) + σ2 such that together with γ xx (1) = φγ xx (0) we can solve for γ xx (0) = σ2 /(1 − φ2 ). This now leads to σ 2 φh . γ xx (h) = (1 − φ2 ) This derivation of the form of γ xx (h) is based on solving the Yule Walker equations (2.3). An alternative way to derive this result is to directly calculate the autocovariances based on the solution (2.2). γ xx (h) = φγ xx (h − 1). (2.3)
∞ X j =1
j φj 1 L ).
(2.4)
2.2. Linear Difference Equations We consider solutions {xt } of the p-th order linear difference equation xt + α1 xt−1 + ... + αp xt−p = 0 (2.5) where α1 , ...αp are real constants. In lag polynomial notation we write α(L)xt = 0. A solution then (1) (m) is a sequence {xt } such that (2.5) is satisfied for each t. A set of m ≤ p solutions {xt , ..., xt } are linearly independent if c1 xt + ... + cm xt
Massachusetts Institute of Technology Department of Economics
Time Seeiner
Lecture Note 2 - Stationary Processes In this lecture we are concerned with models for stationary (in the weak sense) processes. The focus here will be on linear processes. This is clearly restrictive given the stylized facts of financial time series. However linear time series models are often used as building blocks in nonlinear models. Moreover linear models are easier to handle empirically and have certain optimality properties that will be discussed. Linear time series models can be defined as linear difference equations with constant coefficients. We start by introducing some examples. The simplest case of a stochastic process is one with independent observations. From a second order point of view this transforms into uncorrelatedness. Example 2.1 (White Noise). The process {εt } is called white noise if it is weakly stationary with E εt = 0 and autocovariance function ½ 2 σ h=0 γ εε (h) = 0 h 6= 0 and we write εt ∼ W N (0, σ 2 ). A special case is {εt } with εt ∼ iid(0, σ 2 ). The white noise process is important because it can be used as a building block for more general processes. Consider the following two examples. Example 2.2 (Moving Average). The process {xt } is called a moving average of order one or MA(1) if {xt } is stationary and xt = εt + θεt−1 and εt is white noise. It follows immediately that γ xx (0) = σ2 (1 + θ2 ), γ xx (1) = θσ2 and γ xx (h) = 0 for |h| > 1. A slightly more complicated situation arises when we consider the following autoregressive process. Example 2.3 (Autoregression). The process {xt } is called autoregressive of order one or AR(1) if {xt } is stationary and satisfies the following stochastic first order difference equation xt = φxt−1 + εt and εt−1 is white noise. By iterating on (2.1) we find xt = εt + φεt−1 + ...φk−1 εt−k+1 + φk xt−k . Pk j 2k 2 2 By stationarity Ex2 t−k is constant and if |φ| < 1 then E (xt − j =0 φ εt−j ) = φ Ext−k tends to zero as k → ∞. Therefore ∞ X φj εt−j (2.2) xt =
p
L has an inverse L−1 such that L−1 Lxt = LL−1 xt = xt . It is also immediate that L is linear Laxt = aLxt = axt−1 . We can use the operator L to define more complex linear operators, the polynomial lag operators. Let φ(L) = 1 − φ1 L − ... − φp Lp then φ(L) is a polynomial of order p in L. It follows that φ(L) is again a linear operator. For p = 1 we can write the AR(1) model in compact form φ(L)xt = εt . In the same way as before φ(L) has an inverse φ(L)−1 such that φ(L)−1 φ(L)xt = φ(L)φ(L)−1 xt = xt . For the case of p = 1 it is easy to find φ(L)−1 in terms of a polynomial expansion. Since L is a bounded operator and if |φ1 | < 1 (1 − φ1 L)(1 + such that φ(L)−1 = (1 +
k X j =1 k+1 k+1 j φj L → 1 as k → ∞ 1 L ) = 1 − φ1