table-of-english-tenses-pdf

合集下载

服务体验报告英文版

服务体验报告英文版

Executive summary (1)1. Background (1)1.1 Service provider (1)1.2 Negative encounters (1)2. Service delivery process (2)3. Disconfirm action theory (2)3.1 Problem 1: long service hours (2)3.2 Problem 2: Do not follow customer’s request (2)3.3Problem 3: Perm effect is not beautiful (2)3.4 Problem4: Poor after-sales attitude (3)4. Service quality gap model (3)4.1 Supplier gap: listening gap (4)4.2 Supplier gap: service design and standard gap (5)4.3 Supplier gap: quality standard gap (6)4.4 Supplier gap: listening gap (6)5. Conclusion (7)List of reference (8)Executive summary (1)1. Background (1)1.1 Service provider (1)1.2 Negative encounters (1)2. Service delivery process (2)3. Disconfirm action theory (2)3.1 Problem 1: long service hours (2)3.2 Problem 2: Do not follow customer’s request (2)3.3Problem 3: Perm effect is not beautiful (2)3.4 Problem4: Poor after-sales attitude (3)4. Service quality gap model (3)4.1 Supplier gap: listening gap (4)4.2 Supplier gap: service design and standard gap (5)4.3 Supplier gap: quality standard gap (6)4.4 Supplier gap: listening gap (6)5. Conclusion (7)List of reference (8)Service encounter reporter Executive summaryIn this report, we selected a bad haircut experience of our own to analyze, and applied a series of theories to measure and manage this service failure. We expound the service background, apply the service blueprint, analyze the service expectancy disconfirm action theory and the service quality gap model.1.Background1.1 Service providerOufeng mainly covers hairdressing, image design and other fields. The store is moderate, and there are 5 employees. The store is clean and well equipped.1.2 Negative encountersThe customer planned to go to the barber shop to have his hair permed. In the process of cutting hair, the barber suggested that only perm hair without hair color may not look good, and this period of time would not last long.But as it turned out, the service was long and the results were far from what customers wanted or barbers described. The customer complained, but the barber said he would get better the next day. But the next day, the customer's hair went back to the way it was before the perm.The customer immediately contacted the barber, who showed a bad attitude and shirked his responsibility. He did not return part of the fee and even satirized the customer. Eventually the customer complained about it on their complaint platform, and the barber gave me my money back.2. Service delivery process3. Disconfirm action theory3.1 Problem 1: long service hoursCustomer expectations: Two and a half hours.Reality: It took customer more than five hours, from 3:30 p.m. to 9 p.m. Consequence: Much more time was actually spent than was expected. The merchants explicitly promised that they can finish the two processes of perm and hair dye within two and a half hours. However, these two processes were not completed within required time, consumers felt badly and the long waiting time also resulted in dissatisfaction.Customers' negative emotions can also be passed on to other potential customers, and many potential customers disappear.3.2 Problem 2: Do not follow customer’s requestCustomer expectations: The consumer just wanted a perm,Reality: barbers constantly recommended the necessity of hair color in their services, dyeing and cutting customers' hair without informing them. Consequence: The final actual effect was quite different from what customers wanted, and consumers' expectation was not met. The merchant imposed his opinion on the customer in this service, and not only failed to achieve the effect that he recommends, but also failed to meet even the most basic customer expectation. If the merchant fails to properly solve the problem and provide timely service remedy, the customer may spread negative information verbally or seek help from a third party, such as the consumer association.3.3Problem 3: Perm effect is not beautifulCustomer expectation: perm the whole hair.Reality: The barber only gave his hair a partial perm, and still brought about hair upside to distribute qualitative and coarse. Perm failed, because it just finished perm with shape of straight one, against consumer complete and consistent requirement. Consequences: Consumers think barbershop were less likely to use materials, andremained suspicious of the barber's expertise. Finally, consumers will not recommend the store to their friends and relatives, or even advise them not to come to the store. This leads to less buzz and fewer customers.3.4 Problem4: Poor after-sales attitudeExpectation: The seller acknowledges the failure of the service and refunds part of the money.Reality: They did not admit any problem instead, pushing the responsibility to the consumer themselves. In addition, their attitude was also very bad, and rejected the consumer to request the refund.Consequence: Consumers thought the barbershop was cheating on them, and when that happened, customers were sure to settle the matter with a complaint. The store did not strengthen the training of employees' working attitude and human quality, and did not pay attention to consumer experience. This would reduce the store's reputation and reduce customer flow.4. Service quality gap model①knowledge gap: Disagreementbetween the customer and thebarber about who decides the hair4.1 Supplier gap: listening gapThere is disagreement between the customer and the barber about who decides the hair style.Customers expect to be able to determine how their hair will be designed and repaired in accordance with their own requirements and assumptions. However, Oufeng barbershop has too much late intervention in customers' hair design and too much recommendation and free play from barbers.After investigation, it is found that barbers in Oufeng barbershop tend to give consumers more opinions than consumers' original ideas and plans and recommend additional products and services, which often leads to the gap between the final hairstyle and consumers' original expectations.Reasons:4.1.1 Insufficient marketing research orientationConsumers of barbershops often pay more attention to the quality of service and comfort, expect to get the results they want by barber services, therefore, Oufeng barber's research should focus more on the quality of service, service will be subject to the customer's expectations and requirements, the opinions of additional services offered to the right, reasonable, rather than blindly in pursuit of guest unit price to promote sales.4.1.2 Not paying enough attention to relationshipsManagers at Ooufeng barbershop focus more on transactions than relationships, leading barbers to focus on promoting additional products for consumers rather than on consumer expectations and satisfaction, which may lead to relationship breakdown.4.1.3. Inadequate service recovery.Staff at the shop lacks the incentive to listen to customers' complaints and have no mechanism for dealing effectively with service failures. Customers have complained in the process of service, but the barber's first reaction is to avoid the problem rather than try to listen to customers complain and try to deal with and remedy.4.2 Supplier gap: service design and standard gapThere is disagreement between the barbershop and its customers about how to style their hair.Customers have their own expectations and standard to the hair style, and hope the barber shop can design services, according to their own standards, the standard of barber shop and the differences between customer expectations of service design, barber's understanding of customer expectations have no accurate perception and no respond correctly, but is forced to recommend other products, for the customer design and trim the hair without authorization. Instead of designing services according to customers' expectations, barbershop staff provide services according to barbershop standards and their own ideas.Reasons:4.2.1 Lack of customer-driven standardsService providing organizations like barbershops should provide customers with more customer-driven service standards and design services according to customerexpectations.4.2.2 Process management without focus on customer needsCustomers' expectations have not been fully paid attention to, and their real needs have not been paid attention to and met.4.3 Supplier gap: quality standard gapThe customer's expectation on the surface is that the whole hair should be permed, but the reality is that the perm only perms the lower part of the hair, and the perm result is not ideal, there is no shape according to the expectation, which is completely inconsistent with the consumer requirements.The reason:4.3.1 Vague and unclear service designThe barbershop did not set the service design standard for its hairdressing industry before, and did not control the expected effect after perm. The expected effect after perm is not good.As a result, the perm was not satisfactory.4.3.2 No formal process to set service quality objectives and no customer-driven service standardThe result of customer demand is to perm all the hair, but the clerk does not make flexible improvement according to the customer's expectation, the customer-driven service standard is weak, only according to the clerk's own aesthetic or subjective opinion to the customer hairdressing service.The result was a half-permed hair that defied customer expectations.4.4 Supplier gap: listening gapThe customer did not get a better consumption experience in the barbershop, and tried to communicate with the merchant after sales, expecting to get the merchant's understanding and compensation.However, the business not only does not admit its quality problem, more the reason that serves failure shift the blame to the customer.The reason:4.4.1 Lack of encouragement to listen to customers' complaintsWhen customers first raised questions and complaints, the merchants did not think about why customers would complain.When customers offered to return part of the money, the merchants irrationally shirked the responsibility and prevented customers from complaining in an irrational way.4.4.2 The compensation fails after the occurrence of problemsWhen the first communication between the customer and the merchant fails, the barbershop merchant loses a valuable opportunity of service remedy.Customers choose to give up the communication with merchants and turn to the public to evaluate the app platform's demand for help. Customers complain to the platform. It can be seen that the compensation failure will bring greater cost of service failure to merchants and negatively affect their reputation.4.4.3 There is no effective mechanism to deal with service failureCompared with other high-end barbershops, this barbershop has a weak service failure mechanism and only focuses on the transaction rather than the customer relationship.After the occurrence of quality dissatisfaction, only the shop assistants communicate with the customers. However, the communication level of the shop assistants is low, and the shop has no good communication management personnel who can deal with the service failure mechanism.5. ConclusionThis barbershop service failed for many reasons and related to the whole service process. From the perspective of the service gap model, the price, advertising, sales commitment and other factors of barbershops bring customers' service expectations inconsistent with the actual service perception of customers, resulting in a huge customer gap. In the process of providing services for customers, barbershops' perception of customers' expectations is not accurate enough, which also leads to the gap between suppliers in many aspects. In the whole service process, the barbershop failed to make accurate perception of customer expectations, and the management and front-line staff failed to respond effectively to customer expectations to bridge the gap between customers and suppliers. Multiple factors are at work throughout the service process, resulting in this service failure.List of referenceWan, ZY & Lin, F 2012. ‘Research on chain service marketing strategy -- a case study of beauty chain’, Mall modernization, vol 31, pp105-6.Zhu, WH. , Zuo RS & Yu RL 2005. ‘Service marketing strategy based on customer relationship life cycle’. Technology & market, vol 07, pp44-6.Zeng, LQ 2007.’ Service quality gap model and gap bridging ‘, Coastal enterprises and technology, vol 06, pp71-3。

Tense英语时态

Tense英语时态

Tense英语时态Table of English Tensestense Affirmative/Negative/Question Use Signal Words Simple Present A: He speaks.N: He does not speak.Q: Does he speak?action in the presenttaking place once, never orseveral timesfactsactions taking place oneafter anotheraction set by a timetableor schedulealways,every …, never,normally, often,seldom,sometimes,usuallyif sentencestype I (IfI talk, …)Present Progressive A: He is speaking.N: He is not speaking.Q: Is he speaking?action taking place inthe moment of speakingaction taking place onlyfor a limited period of timeaction arranged for thefutureat the moment,just, just now,Listen!, Look!,now, right nowSimple Past A: He spoke.N: He did not speak.Q: Did he speak? ?action in the past taking place once, never or severaltimesactions taking place oneafter anotheraction taking place in themiddle of another actionyesterday, 2minutes ago, in1990, the otherday, last Fridayif sentence typeII (If I talked, …)Past Progressive A: He was speaking. N: He was not speaking.Q: Was he speaking?action going on at acertain time in the pastactions taking place atthe same timeaction in the past that isinterrupted by another actionwhen, while, aslong asPresent Perfect Simple A: He has spoken. N: He has not spoken.Q: Has he spoken?putting emphasis onthe resultaction that is still going onaction that stoppedrecentlyalready, ever,just, never, notyet, so far, tillnow, up to nowfinished action that has an influence on the present action that has taken place once, never or several times before the moment ofspeakingPresent Perfect Progressive A: He has been speaking.N: He has not been speaking.Q: Has he been speaking?putting emphasis onthe course or duration(not theresult)action that recentlystopped or is still going onfinished action thatinfluenced the presentall day, for 4years, since1993, howlong?, thewhole weekPast Perfect Simple A: He had spoken.N: He had not spoken.Q: Had he spoken?action taking place beforea certain time in the pastsometimesinterchangeable with pastperfect progressiveputting emphasis only onthe fact (not the duration)already, just,never, not yet,once, until thatdayif sentence typeIII (If I hadtalked, …)Past Perfect Progressive A: He had been speaking. N: He had not been speaking.Q: Had he been speaking?action taking place beforea certain time in the pastsometimesinterchangeable with pastperfect simpleputting emphasis onthe duration or course of anactionfor, since, thewhole day, alldayFuture I Simple A: He will speak.N: He will not speak.Q: Will he speak?action in the future thatcannot be influencedspontaneous decisionassumption with regard tothe futurein a year,next …,tomorrowIf-Satz Typ I (Ifyou ask her,she willhelp you.)assumption: Ithink, probably,perhapsFuture I A: He is going to speak. ?decision made for the in one year, Simple (going to) N: He is not going to speak.Q: Is he going to speak?futureconclusion with regard tothe futurenext week,tomorrowFuture I Progressive A: He will be speaking.N: He will not be speaking.Q: Will he be speaking?action that is going on ata certain time in the futureaction that is sure tohappen in the near futurein one year,next week,tomorrowFuture II Simple A: He will have spoken.N: He will not have spoken.Q: Will he have spoken?action that willbe finished at a certain time inthe futureby Monday, in aweekFuture II Progressive A: He will have been speaking.N: He will not have beenspeaking.Q: Will he have been speaking?action taking place beforea certain time in the futureputting emphasis onthe course of an actionfor …, the lastcouple ofhours, all daylongConditional I Simple A: He would speak.N: He would not speak.Q: Would he speak?action that might takeplaceif sentencestype II(If I were you,I wouldgo home.)Conditional I Progressive A: He would be speaking. N: He would not be speaking.Q: Would he be speaking?action that might takeplaceputting emphasis onthe course / duration of theactionConditional II Simple A: He would have spoken. N: He would not have spoken.Q: Would he have spoken?action that might havetaken place in the pastif sentencestype III(If I had seenthat, I wouldhave helped.)Conditional II Progressive A: He would have been speaking.N: He would not have beenspeaking.Q: Would he have beenspeaking?action that might havetaken place in the pastputs emphasis onthe course / duration of theactionLegendmoment in time ?action that takes place once, never or several times ?actions that happen one after anotheractions that suddenly take placeperiod of time ?action that started before a certain moment and lasts beyond that momentactions taking place at the same timeResult ?action taking place before a certain moment in time ?puts emphasis on the resultCourse / Duration ?action taking place before a certain moment in time ?puts emphasis on the course or duration of the actionEnglish Tenses – ExamplesExplanation Past Present FutureSimple Past Simple Present Future I Simpleaction that takes place once, never or several times He played footballevery Tuesday.He plays footballevery Tuesday.He will / is going toplay football everyTuesday.actions that happen one after another He played footballand then he wenthome.He plays footballand then he goeshome.He will play footballand then he will gohome.state He loved football. He loves football. He will love football.Past Progressive PresentProgressiveFuture I Progressiveaction going on at that moment He was playingfootball.He is playingfootball.He will be playingfootball.actions taking place at the same time He was playingfootball and she waswatching.He is playingfootball and she iswatching.He will be playingfootball and she willbe watching.Past Perfect Present Perfect Future II SimpleSimple Simpleaction taking place before a certain moment in time; emphasises the result He had won fivematches until thatday.He has won fivematches so far.He will have won fivematches by then.Past PerfectProgressivePresent PerfectProgressiveFuture IIProgressiveaction taking place before a certain moment in time (and beyond), emphasises the duration He had been playing football forten years.He has beenplaying football forten years.He will have been playing football forten years.table of English tenses diagram of English tenses。

TABLE OF CONTENTS

TABLE OF CONTENTS

SCALE-CCV-001, Rev. 1 VERIFICATION AND VALIDATION PLANFOR THESCALE CODE SYSTEMPrepared byB. L. BroadheadNuclear Engineering Applications SectionComputational Physics and Engineering DivisionatOak Ridge National LaboratoryDate Prepared: April 10, 1996Approvals:S. M. Bowman4/15/96SCALE Project Leader DateCecil V. Parks4/15/96W. A. Brooke4/17/96TABLE OF CONTENTSPage1.0PURPOSE AND SCOPE (1)2.0REFERENCES (1)3.0DEFINITIONS AND ACRONYMS (4)4.0ORGANIZATION (5)5.0RESPONSIBILITIES (5)6.0VERIFICATION/VALIDATION PROCEDURES (6)7.0REPORTING (8)8.0SCHEDULE (8)9.0QA RECORDS (8)1.0PURPOSE AND SCOPE1.1The purpose of this plan is to describe the methods to be used for baseline verification andvalidation of the SCALE system in the specific analysis areas defined in 1.2 below, andto establish specific responsibilities for accomplishing the verification and validation tasks.1.2The scope of this plan is limited to establishing a baseline verification and validation ofthe SCALE computer code system as developed and maintained at Oak Ridge NationalLaboratory (ORNL) by the Nuclear Engineering Applications Section (NEAS) underReferences 2.1-2.2. Suitability of the SCALE system for use in performing criticality,shielding, heat transfer, and source generation calculations for a variety of applicationswill be determined. References that demonstrate the validity of the nuclear data, solutiontechniques, and modeling capabilities in the SCALE modules are provided in Section 2.0as References 2.6 through 2.39.1.3Other installations may use the process and results of this baseline verification andvalidation at their discretion as a guide for the verification and validation of their system.1.4The initial baseline work will be performed with a baseline version of the SCALE systemspecified by the SCALE Project Leader. The problems included in this baselineverification and validation will be used, at the direction of the SCALE Project Leader, toestablish the performance of future versions of the SCALE system as maintained anddistributed by ORNL.2.0REFERENCES2.1SCALE-QAP-005, R0, Quality Assurance Plan for the SCALE Computational System.2.2S. M. Bowman, SCALE-CMP-001, Configuration Management Plan for the SCALE CodeSystem.2.3X-QA-8, Quality Assurance for ORNL Computer Software.2.4ESS-QA-19.0, Software-Quality Assurance.2.5SCALE: A Modular Code System for Performing Standardized Computer Analyses forLicensing Evaluation, NUREG/CR-0200, Revision 4 (ORNL/NUREG/CSD-2/Revision4), Volumes I, II, and III (April 1995). Available from Radiation Shielding InformationCenter, Oak Ridge National Laboratory, as CCC-545.2.6N. F. Landers, L. M. Petrie and J. C. Turner, KENO V, Martin Marietta Energy SystemsNuclear Criticality Safety Software Verification Plan SRR-0 (Unpublished).2.7M. B. Emmett, MORSE-SGC, Verification of MORSE-SGC on the Cray UNICOS System,ORNL/NPR-92/5 (March 1992).2.8 C. B. Bryan, K. W. Childs and G. E. Giles, Heating6 Verification, K/CSD/TM-61(December 1986).2.9W. C. Jordan, Validation of SCALE 4.0 - CSAS25 Module and the 27-Group ENDF/B-IVCross-Section Library for Low-Enriched Uranium Systems, ORNL/CSD/TM-287 (February 1993).2.10S. M. Bowman, C. V. Parks and S. R. Bierman, Validation of SCALE-4 for LWR Fuelin Transportation and Storage Cask Conditions, Trans. 1990 ANS Winter Meeting, Washington, D.C., November 11-15, 1990, Volume 62, Page 338 (1990).2.11S. M. Bowman, Validation of SCALE-4 for a Reference Problem Set, ORNL/M-1332(July 1991).2.12 B. L. Broadhead, M. C. Brady, C. V. Parks, Benchmark Shielding Calculations for theNEACRP Working Group on Shielding Assessment of Transportation Packages, ORNL/CSD/TM-272 (November 1990).2.13 C. V. Parks et al., Assessment of Shielding Analysis Methods, Codes, and Data for SpentFuel Transport/Storage Applications, ORNL/CSD/TM-246 (July 1988).2.14 C. O. Slater and D. E. Bartine, Preliminary Analysis of a TSF Experiment on NeutronStreaming Through a Lattice of GCFR-Type Fuel Pins, GCR-76/37 (November 1976).2.15 C. O. Slater and M. B. Emmett, Final Analysis of a TSF Experiment on NeutronStreaming Through a Lattice of GCFR-Type fuel Pins, ORNL-GCR-78/5 (February 1978).2.16 C. O. Slater and M. B. Emmett, "Analysis of a Fuel-Pin Neutron-Streaming Experimentto Test Methods for Calculating Neutron Damage to the GCFR Grid Plate," in Proc. Fifth Int. Conf. Reactor Shielding, pp. 873-880, Science Press, Princeton, NJ (1977).2.17 C. O. Slater and J. R. Knight, Analysis of the TSF GCFR Single-Cell Neutron StreamingExperiment, ORNL/GCR-80-16 (July 1980).2.18 C. O. Slater, S. N. Cramer, and D. T. Ingersoll, "Analysis of the ORNL/TSF GCFR GridPlate Shield Design Confirmation Experiment," Trans. Am. Nucl. Soc. 32, 641 (1979).2.19 C. O. Slater, S. N. Cramer, and D. T. Ingersoll, Analysis of the ORNL/TSF GCFR Grid-Plate Shield Design Confirmation Experiment, ORNL-5551 (August 1979).2.20 D. T. Ingersoll, F. J. Muckenthaler, C. O. Slater, and M. L. Williams, "Grid PlateShield Design Confirmation Experiment," p. 109 ff. in Gas-Cooled Reactor Program Annual Progress Report for Period Ending December 31, 1977, ORNL-5426 (August 1978).2.21 C. O. Slater, S. N. Cramer, D. T. Ingersoll, M. L. Williams, F. J. Muckenthaler,J. J. Manning, and J. L. Hull, "Measurement and Calculation of the Effectiveness of Gas-Cooled Fast Breeder Reactor Grid-Plate Shield,"Nucl. Tech. 52, 354 (1981). 2.22 D. T. Ingersoll and L. R. Williams, Final Analysis of the GCFR Radial Blanket andShield Integral Experiment, ORNL-5756 (April 1981).2.23 D. T. Ingersoll and L. R. Williams, "Analysis of the ORNL-TSF Radial Blanket andShield Integral Experiment,"Trans. Am. Nucl. Soc. 35, 470-472 (1980).2.24 D. T. Ingersoll and S. N. Cramer, Final Analysis of the GCFR Exit Shield IntegralExperiment, ORNL/TM-7839 (July 1981).2.25 B. L. Broadhead, J. S. Tang, R. L. Childs, C. V. Parks and H. Taniuchi, Evaluation ofShielding Analysis Methods in Spent Fuel Cask Environments, EPRI TR-104329 (1994).2.26J. R. Knight, Validation of the Monte Carlo Criticality Program KENO V.a for HighlyEnriched Uranium Systems, ORNL/CSD/TM-221 (1984).2.27M. E. Easter, Validation of KENO V.a and Two Cross-Section Libraries for CriticalityCalculations of Low-Enriched Uranium Systems, ORNL/CSD/T-223, K/HS-74 (1985).2.28 A. M. Hathout et al., Validation of Three Cross-Section Libraries Used with the SCALESystem for Criticality Safety Analysis, NUREG/CR-1917, ORNL/NUREG/CSD/TM-19 (June 1981).2.29M. E. Easter and R. T. Primm, III, Validation of the SCALE Code System and TwoCross-Section Libraries for Plutonium Benchmark Experiments, ORNL/TM-9402 (January 1985).2.30W. C. Jordan, N. F. Landers, and L. M. Petrie, Validation of KENO V.a Comparisonwith Critical Experiments, ORNL/CSD/TM-238 (1986).2.31Standard Problem Exercise on Criticality Codes for Spent LWR Fuel TransportContainers, by a CSNI Group of Experts on Nuclear Criticality Safety Computations, CSNI Report No. 71, OECD, Paris, France (May 1982).2.32Standard Problem Exercise on Criticality Codes for Large Arrays of Packages of FissileMaterials, by a CSNI Working Group, CSNI Report No. 78, OECD, Paris, France (August 1984).2.33S. M. Bowman, R. Q. Wright, H. Taniuchi, and M. D. DeHart, "Validation of SCALE-4Criticality Sequences Using ENDF/B-V Data", Proceedings of 1993 Topical Meeting on Physics and Methods in Criticality Safety, September 19-23, Nashville, Tennessee. 2.34O. W. Hermann, C. V. Parks, J. P. Renier, J. W. Roddy, R. C. Ashline, W. B. Wilson,R. J. LaBauve, Multicode Comparison of Selected Source-Term Computer Codes, ORNL/CSD/TM-251 (April 1989).2.35S. M. Bowman and O. W. Hermann, Reference Problem Set to Benchmark AnalysisMethods for Burnup Credit Applications, ORNL/TM-12295 (1994)2.36J. C. Ryman, O. W. Hermann, C. C. Webster, and C. V. Parks, Fuel Inventory andAfterheat Power Studies of Uranium-Fueled Pressurized Water Reactor Fuel Assemblies Using the SAS2 and ORIGEN-S Module of SCALE with an ENDF/B-V Updated CrossSection Library, NUREG/CR-2397 (ORNL/CSD-90), Union Carbide Corp., NuclearDivision, Oak Ridge National Laboratory (September 1982).2.37O. W. Hermann, C. V. Parks, and J. P. Renier, A Proposed Regulatory Guide Basis forSpent Fuel Decay Heat, Proceedings of the Second Annual International Conference onHigh-Level Radioactive Waste Management, Las Vegas, Nevada, April 12-16, 1992,Volume 2, Page 1662-1669.2.38O. W. Hermann, M. C. Brady, C. V. Parks, Validation of Spent Fuel Isotopics Predictedby the SCALE-4 Depletion Sequence, Trans. Am. Nucl. Soc. 64, 147-149 (1991).2.39O. W. Hermann, J. P. Renier, and C. V. Parks, Technical Support for a Proposed DecayHeat Guide Using SAS2/ORIGEN-S Data, NUREG/CR-5625 (ORNL-6698), MartinMarietta Energy Systems, Inc., Oak Ridge National Laboratory, 1994.3.0DEFINITIONS AND ACRONYMS3.1V&V - Verification and Validation3.2OCRWM - Office of Civilian Radioactive Waste Management at the U.S. Department ofEnergy3.3OECD/NEA - Organization for Economic Cooperation and Development/Nuclear EnergyAgency3.4ORNL - Oak Ridge National Laboratory3.5NEAS - Nuclear Engineering Analysis Section3.6SCALE - Standardized Computer Analyses for Licensing Evaluation code system. SeeReference 2.5.3.7SNF - Spent Nuclear Fuel3.8Validation - Assurance that a model as embodied in a computer code is a correctrepresentation of the process or system for which it is intended. This is usuallyaccomplished by comparing code results to either physical data or a validated codedesigned to perform the same type of analysis.3.9Verification - Assurance that a computer code correctly performs the operations specifiedin a numerical model. This is usually accomplished by comparing code results to a handcalculation, an analytical solution or approximation, or a verified code designed toperform the same type of analysis.44.0ORGANIZATION4.1V&V InterfacesThe verification/validation activities described in this plan shall be conducted by personnelwho are knowledgeable of the code(s) to be analyzed; and who are qualified by education,experience and training to successfully perform their assigned procedures. Education shallinclude a B.S., M.S., or Ph.D. in engineering or related fields (e.g. math, physics, etc.).The personnel selected to perform the verification/validation activities and theirrelationship to the SCALE Computational System are as follows.Project LeaderSCALE Computational SystemVerification and Validation Independent TechnicalTask Leader ReviewerV & V Analysts4.2QualificationsTask Leader - The Task Leader should have at least five years experience as a user of themodule(s) and data for a variety of applications.Technical Reviewer - The Technical Reviewer should have at least five years experiencein one or more of the areas for which the SCALE system is used: cross-sectionprocessing, criticality safety, radiation shielding, heat transfer, or spent fuel and HLWsource characterization. The reviewer should also have similar experience in the use ofthe modules and/or data selected for verification/validation.V&V Analyst - A V&V Analyst should have at least two years experience in the use ofthe SCALE system.5.0RESPONSIBILITIES5.1Project Leader - The person responsible for managing the maintenance, development andverification/validation of the SCALE computational system.5.2Task Leader - The person responsible for the verification/validation of the SCALEmodule(s) and data to be used in the criticality, shielding, heat transfer and sourcegeneration analyses. The Task Leader shall perform the analyses directly or supervise andsubsequently review the analyses as performed by experienced users of the modules anddata.5.3Technical Reviewer - The person responsible for reviewing and checking the analysesperformed under one of the verification/validation tasks in accordance with Section 6.5.5.4V&V Analyst - The V&V analyst that actually performs the V&V activities should nothave been directly involved in the development of the code or data being validated. 6.0VERIFICATION/VALIDATION PROCEDURES6.1Verification/Validation of the SCALE Criticality Analysis Modules - Verification ofSCALE for criticality calculations shall be conducted by performing calculations of criticalbenchmarks previously modeled in an unpublished verification study in Reference 2.6.These calculations will verify the CSAS criticality control module and the associatedfunctional modules BONAMI, NITAWL-II, XSDRNPM, and KENO V.a in SCALE. Theanalysis will be performed using the ENDF/B-IV-based 27-neutron-group cross-sectionlibrary provided in SCALE. Verification shall be accomplished by cross-checking theresults of each module in the sequence with the results obtained from independentmethods. These verification problems are, to the extent possible, exhaustive of thevarious code options. Any areas not covered shall be documented. Further verificationis provided by the sample problems documented by the developers in Reference 2.5 andrun for each module under the SCALE Configuration Management Plan (Reference 2.2).These sample problems are run and kept on file at ORNL as required under the SCALEConfiguration Management Plan. The acceptance criteria for the k and cross sectioneffcomparisons shall be separately established, justified and documented in V&V reports foreach verification activity.The validation effort shall consist of a merging of the various validation projectspreviously reported in References 2.9-2.11 and 2.26-2.33. A combined database ofproblems shall be created and executed with the cross section libraries to be validated onthe current standard computing platform. Consistency with previously reported values andinternal consistency of the combined set with measured values shall be reported. k effacceptance criteria shall be established, justified, and documented in the V&V report foreach validation activity. Limitations of the validation study shall be reported. Otherproblems may be added to the V&V activities in the future as needed.6.2Verification/Validation of the Shielding Analysis Codes - Verification of the SCALE-4shielding modules SAS1 and SAS4 shall be accomplished by performing dose ratecalculations for a benchmark configuration (denoted Problem 1a) as defined by theOECD/NEA working group on shielding assessment of transportation packages (seeReference 2.12). Results from an analysis of problem 1a with both SAS1 and SAS4 usingthe SCALE 27-18 group library are given in Reference 2.13.Concurrence with the results in Table 7.10 of Reference 2.13 should be within 5% (afterconsideration of the standard deviations in SAS4). Internal consistency checks will beused to verify the XSDOSE module which is the only SAS1 module not used by thecriticality codes. Additional SAS4 verification problems are discussed in Reference 2.7and will be included in this work. In addition, the SAS1 and SAS4 documentation (Reference 2.5) contains a series of sample problems prepared by the code developers.These sample problems are run and kept on file at ORNL as required under the SCALE Configuration Management Plan. These verification problems are to the extent possible exhaustive of the various code options. Any areas not covered shall be documented.The shielding validation work shall consolidate a series of results reported in References2.12 - 2.25. A set of representative problems from these references will be collected andexecuted using the cross section libraries to be validated both to determine consistency with previous results and validity as compared to measured values where possible.Reference 2.25 contains descriptions of a number of problems with experimental results available and will be the primary source for the validation problem set. Acceptance criteria shall be established, justified, and documented in the V&V report for each validation activity. Limitations of the validation study shall be reported. Other problems may be added to the V&V activities in the future as needed.6.3Verification/Validation of Heat Transfer Codes - The verification/validation of the heattransfer codes in the SCALE system will generally follow the same procedure as the criticality and shielding procedures. A set of sample problems that test the various functions and options of the code shall be generated and analyzed, comparing the results to an independent procedure. The validation shall consist of analyzing a set of problems with known solutions (either measurements or analytical). The results of such a study for the HEATING6 code is given in Reference 2.8. This study will be updated to the current code version. Some or all of this work will be repeated for subsequent major updates to the code. The verification problems shall be to the extent possible exhaustive of the various code options. Any areas not covered shall be documented. Acceptance criteria for the validation effort shall be established, justified, and documented in the V&V report for each validation activity. Other problems may be added to the V&V activities in the future as needed.6.4Verification/Validation of Source Generation Codes - Verification of the SCALE sourcegeneration module SAS2H shall be accomplished by analyzing a set of Light Water Reactor (LWR) spent fuel problems and cross checking with results from other similar codes. Examples of problems that can be used for verification are given in References2.12-2.13 and 2.34-2.39. In addition, the sample problems included with the codedocumentation exercise a number of options available for use. These problems will be analyzed and included as well as a number of input variations that should further verify the various program options. These verification problems are to the extent possible exhaustive of the various code options. Any areas not covered shall be documented.Validation activities shall include analysis of a number of irradiated LWR nuclear fuel elements whose isotopic contents have been experimentally determined. Reference 2.35 contains the results of such a study. The problem set will be executed using the cross section libraries to be validated and results will be compared with measurements.Acceptance criteria shall be established, justified, and documented in the V&V report for each validation activity. Limitations of the validation study shall be reported. Other problems may be added to the V&V activities in the future as needed.6.5The technical review shall evaluate the verification/validation report and enclosedverification/validation analyses to ensure adequacy of the findings and conclusions. Thereviewer shall indicate concurrence with findings and conclusions via completion of anindependent review sheet (See Appendix A). Any unresolved issues from the technicalreview shall be resolved by the Project Leader.6.6The SCALE system contains a number of utility codes designed to perform formatconversions, editing and plotting of the various SCALE data sets. These codes will notbe verified directly. The format conversion and editing functions are typically used toinstall the code system on the given host machine and are thus verified indirectly when theverification problem sets are executed. Other utility codes are tested via the sampleproblems in the Configuration Management Plan.7.0REPORTING7.1At the conclusion of the verification/validation process the Task Leader shall prepare (orguide preparation of) a report or reports which includes:C Brief description of what was verified/validatedC Summary of the verification/validation activities conductedC Results and findingsC Conclusions and recommendationsC References7.2An independent technical review as cited in Section 6.5 shall be performed prior to reviewand approval by the SCALE Project Leader. The Quality Assurance Specialist at ORNLshall also review the report for conformance to this plan. Review comments shall beresolved by the Task Leader with the reviewers. Unresolved issues shall be elevated tothe Project Leader for resolution.7.3Discrepancies revealed by the V&V activities shall be processed in accordance withReference 2.2.8.0SCHEDULEEach verification and validation activity shall be scheduled and tracked by the SCALE Project Leader.9.0QA RECORDSThe following items shall be maintained as QA records in the SCALE Project QA Records system: !V/V Plan!V/V Report!Electronic Copies of Input Files!Electronic or Microfiche Copies of Output Files!Technical Review Forms!Personnel Qualification Records。

目 录 Table of Contents

目      录            Table of Contents

目录Table of Contents翻译的原则Principles of Translation中餐Chinese Food冷菜类Cold Dishes热菜类Hot Dishes猪肉Pork牛肉Beef羊肉Lamb禽蛋类Poultry and Eggs菇菌类Mushrooms鲍鱼类Ablone鱼翅类Shark’s Fins海鲜类Seafood蔬菜类Vegetables豆腐类Tofu燕窝类Bird’s Nest Soup羹汤煲类Soups主食、小吃Rice, Noodles and Local Snacks西餐Western Food头盘及沙拉Appetizers and Salads汤类Soups禽蛋类Poultry and Eggs牛肉类Beef猪肉类Pork羊肉类Lamb鱼和海鲜Fish and Seafood面、粉及配菜类Noodles, Pasta and Side Dishes面包类Bread and Pastries甜品及其他西点Cakes, Cookies and Other Desserts中国酒Chinese Alcoholic Drinks黄酒类Yellow Wine 白酒类Liquor 啤酒Beer葡萄酒Wine洋酒Imported Wines开胃酒Aperitif 白兰地Brandy威士忌Whisky金酒Gin朗姆酒Rum伏特加Vodka龙舌兰Tequila利口酒Liqueurs清酒Sake啤酒Beer鸡尾酒Cocktails and Mixed Drinks餐酒Table Wine饮料Non-Alcoholic Beverages矿泉水Mineral Water咖啡Coffee茶Tea茶饮料Tea Drinks果蔬汁Juice碳酸饮料Sodas混合饮料Mixed Drinks其他饮料Other Drinks冰品Ice•recipe 配方cookbook 菜谱ingredients 配料cook 烹调raw (adj.)生的cooked (adj.)熟的fried (adj.)油煎的fresh (adj.)新鲜的•cook 烹调bake 烘烤fry 油煎boil 煮沸broil 烤roast 烘烤simmer 炖,煨saute 煎炒•heat 加热cool 冷却freeze - froze 冻结melt 融化burn - burned / burnt 烧焦boil 煮沸•add 掺加include 包括remove 除去replace 代替mix 混合combine 结合stir 搅拌•spread 涂开sprinkle 撒slice切片 dice 切成块chop 剁,切细stuff 充填⏹烹饪方法英语:⏹shallow fry煎, shallow-fried 煎的, stir-fry 炒,deep fry 炸, toasted烤的(如面包),grilled 铁扒烤的,steam (蒸), stew/braise (炖,焖),boil(煮), roast/broil (烤), bake, smoke (熏), pickle (腌), barbecue (烧烤),翻译的原则一、以主料为主、配料为辅的翻译原则1、菜肴的主料和配料主料(名称/形状)+ with + 配料如:白灵菇扣鸭掌Mushrooms with Duck Webs2、菜肴的主料和配汁主料 + with/in + 汤汁(Sauce)如:冰梅凉瓜Bitter Melon in Plum Sauce二、以烹制方法为主、原料为辅的翻译原则1、菜肴的做法和主料做法(动词过去分词)+主料(名称/形状)如:火爆腰花Sautéed Pig Kidney2、菜肴的做法、主料和配料做法(动词过去分词)+主料(名称/形状)+ 配料如:地瓜烧肉Stewed Diced Pork and Sweet Potatoes3、菜肴的做法、主料和汤汁做法(动词过去分词)+主料(名称/形状)+ with/in +汤汁如:京酱肉丝Sautéed Shredded Pork in Sweet Bean Sauce三、以形状、口感为主、原料为辅的翻译原则1、菜肴形状或口感以及主配料形状/口感 + 主料如:玉兔馒头 Rabbit-Shaped Mantou脆皮鸡Crispy Chicken2、菜肴的做法、形状或口感、做法以及主配料做法(动词过去分词)+ 形状/口感 + 主料 + 配料如:小炒黑山羊Sautéed Sliced Lamb with Pepper and Parsley四、以人名、地名为主,原料为辅的翻译原则1、菜肴的创始人(发源地)和主料人名(地名)+ 主料如:麻婆豆腐Mapo Tofu (Sautéed Tofu in Hot and Spicy Sauce)广东点心Cantonese Dim Sum2、介绍菜肴的创始人(发源地)、主配料及做法做法(动词过去式)+ 主辅料+ + 人名/地名 + Style如:北京炒肝Stewed Liver, Beijing Style北京炸酱面Noodles with Soy Bean Paste, Beijing Style五、体现中国餐饮文化,使用汉语拼音命名或音译的翻译原则1、具有中国特色且被外国人接受的传统食品,本着推广汉语及中国餐饮文化的原则,使用汉语拼音。

TABLE OF CONTENTS PREFACE..................................................................

TABLE OF CONTENTS PREFACE..................................................................

Fractal Geometry and Spatial PhenomenaA BibliographyJanuary 1991Mark MacLennan, A. Stewart Fotheringham, and Michael BattyNCGIADepartment of GeographyState University at BuffaloBuffalo, NY 14261Paul A. LongleyWales and South West England Regional Research LaboratoryUniversity of WalesCardiff CF1 3YNNational Center for Geographic Information and AnalysisReport 91-1TABLE OF CONTENTSPREFACE (3)I.GENERAL REFERENCES (4)I.1TEXTS (4)I.2JOURNAL ARTICLES (5)II.MEASUREMENT ISSUES (8)II.1ESTIMATION OF FRACTAL DIMENSION - GENERAL ISSUES (8)II.2ESTIMATION OF FRACTAL DIMENSION FOR CURVES/PROFILES (9)II.3ESTIMATION OF FRACTAL DIMENSION FOR SURFACES (10)II.4SPACE FILLING CURVES (11)III APPLICATIONS (13)III.1CARTOGRAPHIC GENERALIZATION (13)III.2LENGTH ESTIMATES AND SELF-SIMILIARITY OF LINES (14)III.3VISUAL PERCEPTION (15)III.4TERRAIN CHARACTERIZATION (16)III.5METEOROLOGY (20)III.6OCEANOGRAPHY (22)III.7GEOMORPHOLOGY/HYDROLOGY (24)III.8HYDRAULICS AND FLUID MECHANICS (28)III.9EARTH SCIENCES (28)III.10ECOLOGY/LANDSCAPE (34)III.11URBAN STRUCTURES (36)III.12HUMAN GEOGRAPHY (37)III.13REMOTE SENSING (37)III.14IMAGE COMPRESSION (38)III.15IMAGE PROCESSING (40)III.16FRACTAL SYNTHESIS (44)IV. MISCELLANEOUS (47)PREFACEFractal research seems to have permeated most, if not all, areas of research concerned with form, from the micro-level aggregation of water molecules or particles of zinc oxide to the macro analysis of the structure of landmasses and cities. Given that the study of spatial form and its links to spatial processes is one of basic research areas within Geography, it is not surprising that research on fractals can be found in many subfields of the discipline, including geomorphology, climatology, urban and regional analysis, cartography, andremote sensing.Within this working paper, we provide a sample of the growing literature in this area. The emphasis is on references that have appeared in the published literature. The bibliography is arranged in three sections: general references; measurement issues; and applications.Each of these general topics is further subdivided. While we have attempted to be asconsistent as possible in our indexing, there are many references that could be placed in more than one category and in some cases the decision into which category they are placed has been somewhat subjective. To minimize this problem, in some cases where areference clearly spans two or more of our subheadings, we have listed the reference more than once. Additional references of interest but which do not fall into any of thedesignated categories are listed at the end of this bibliography under the heading ofmiscellaneous.The concepts associated with fractal analysis have been discussed at the SpecialistMeetings of Initiatives 1 (The Accuracy of Spatial Data) and 3 (Multiple Representations) and we acknowledge these meetings as a source of inspiration for the development of this bibliography. We would also like to acknowledge the financial support of the National Center for Geographic Information and Analysis under NSF grant (SES-8810917).I. GENERAL REFERENCESI.1TEXTSAharony, A., and J. Feder, editors, (1990) Fractals in Physics. North-Holland, Amsterdam.Barnsley, M. F. (1988) Fractals Everywhere. Academic Press, New York.Barnsley, M. F., and A.D. Sloan, editors, (1986) Chaotic Dynamics and Fractals.Academic Press, New York.Briggs, J., and F. D. Peat (1990) Turbulent Mirror: an Illustrated Guide to Chaos Theory and the Science of Wholeness. Harper and Row, New York.Davies, P. (1989) The New Physics. Cambridge University Press, Cambridge. Devaney, R. (1989) Chaos, Fractals & Dynamics. Addison-Wesley, Reading, Massachusetts.Falconer, K. J. (1985) The Geometry of Fractal Sets. Cambridge University Press, Cambridge.Falconer, K. J. (1990) Fractal Geometry. John Wiley & Sons, New York.Feder, J. (1988) Fractals. Plenum, New York.Fischer, P., and W. R. Smith, editors, (1985) Chaos, Fractals and Dynamics. Marcel Dekker, New York.Fleischmann, M., D. J. Tildesley, and R.C. Ball, editors, (1989) Fractals in the Natural Sciences. Princeton University Press, Princeton, New Jersey.Hideki, T. (1990) Fractals in the Physical Sciences. St. Martin's Press, New York. Holden, A. V., editor, (1986) Chaos. Manchester University Press and Princeton University Press, Princeton, New Jersey.Jullien, R., and R. Botet (1986) Aggregation and Fractal Aggregates, World Scientific, Singapore.Kachigan, S.K. (1991) The Fractal Notion: A Modern Analytical Tool. Radius Press, New York.Kaye, B. H. (1989) A Random Walk Through Fractal Dimensions. VCH, New York.Mandelbrot, B. B. (1975) Les Objets Fractals: Forme, Hasard et Dimension.Flammarion, Paris.Mandelbrot, B. B. (1977) Fractals: Form, Chance and Dimension. W.H. Freeman, San Francisco.Mandelbrot, B. B. (1983) The Fractal Geometry of Nature. 3rd Edition. W.H.Freeman, San Francisco.Peitgen, H.-O., and D. Saupe, editors, (1988) The Science of Fractals. Springer-Verlag, New York.Peitgen, H.-O., and P. H. Richter (1986) The Beauty of Fractals. Springer-Verlag, New York.Pickover, C. A. (1990) Computers, Pattern, Chaos and Beauty: Graphics From an Unseen World. St. Martin's Press, New York.Pietronero, L., editor, (1990) Fractals: Physical Origin and Properties. Plenum Press, New York.Pietronero, L., and E. Tosatti, editors, (1986) Fractals in Physics. North-Holland, Amsterdam.Sholz, C. H., and B. B. Mandelbrot, editors, (1989) Fractals in Geophysics. Birkhäuser Verlag, Basel.Stevens, R. T. (1989) Fractal Programming in C. M&T Books, Redwood City, California.Stevens, R.T. (1990) Advanced Fractal Programming. M&T Books, Redwood City, California.Stevens, R.T. (1990) Fractal Programming and Ray Tracing with C++. M&T Books, Redwood City, California.Stevens, R.T. (1990) Fractal Programming in Turbo Pascal. M&T Books, Redwood City, California.Takayasu, H. (1990) Fractals in the Physical Sciences. Manchester University Press, Manchester.Vicsek, T. (1988) Fractal Growth Phenomena. World Scientific, Singapore.I.2 JOURNAL ARTICLESBak, P., and K. Chen (1989) The physics of fractals, Physica D, 38(1), 5-12. Barcellos, A. (1984) Additional perspectives on fractals, The College Mathematics Journal, 15(2), 115-119.Barcellos, A. (1984) The fractal dimension of Mandelbrot, The College Mathematics Journal, 15(2), 98-114.Batty, M. (1985) Fractals - geometry between dimensions, New Scientist, 105(1540), 31-35.Batty, M. (1985) Questa montagna che non finisce mai, Genius, 10, 26-34.Batty, M. (1989) Geography and the new geometry, Geography Review, 2(4), 7-10. Berry, M. V., and Z. V. Lewis (1980) On the Weierstrass-Mandelbrot fractal function, Proceedings of the Royal Society of London, Series A, 370, 459-484. Bookstein, F. L. (1977) The study of shape transformation after D'Arcy Thompson, Mathematical Biosciences, 34, 177-219.Domb, C. (1989) Of men and ideas (After Mandelbrot), Physica D, 38(1), 64-70. Dyson, F. (1978) Characterizing irregularity, Science, 200, 677-678.Fotheringham, A. S. What's the fuss about fractals? (1990) Environment and Planning A, 22(6), 716-718.Goodchild, M. F. (1980) Fractals and the accuracy of geographical measures, Mathematical Geology, 12(2), 85-98.Goodchild, M. F., and D. M. Mark (1987) The fractal nature of geographic phenomena, Annals of the Association of American Geographers, 77(2), 265-278. Hutchinson, J. (1981) Fractals and self-similarity, Indiana University Mathematics Journal, 30(5), 713-747.Jügens, H., H.-O. Peitgen, and D. Saupe (1990) The language of fractals, Scientific American, 262(8), 60-67.Kadanoff, L. P. (1986) Fractals - where's the physics? Physics Today, 39(2), 6-7. Kolata, G. (1984) Esoteric math has practical result, Science, 225, 494-495.Krantz, S. G. (1989) Fractal geometry, The Mathematical Intelligencer, 11(4), 12-16. La Brecque, M. (1985) Fractal symmetry, Mosaic, 16(1), 10-23.La Brecque, M. (1986/7) Fractal applications, Mosaic, 17(4), 34-48.La Brecque, M. (1987) Fractals in physics, Mosaic, 18(2), 22-37.Maddox, J. (1986) Gentle warning on fractal fashions, Nature, 322, 303.Mandelbrot, B. B. (1978) The Fractal geometry of trees and other natural phenomena, in Lecture Notes in Biomathematics, 23, Springer-Verlag, New York, 235-249. Mandelbrot, B. B. (1981) Scalebound or scaling shapes: A useful distinction in the visual arts and in the natural sciences, Leonardo, 14(1), 45-47.Mandelbrot, B. B. (1982) The many faces of scaling: fractals, geometry of nature, and economics, in Self-Organization and Dissipative Structures, W. C. Shieve andP. M. Allen, editors, University of Texas Press, Austin, 91-109.Mandelbrot, B. B. (1983) On fractal geometry, and a few of the mathematical questions it has raised, Proceedings of the International Congress of Mathematicians, August 16-24,Warsaw, 1661-1675.Mandelbrot, B. B. (1984) Fractals in physics: squig clusters, diffusions, fractal measures, and the unicity of fractal dimensionality, Journal of Statistical Physics, 34:(5/6), 895-929.Mandelbrot, B. B. (1985) Self-affine fractals and fractal dimension, Physica Scripta, 32(4), 257-260.Mandelbrot, B. B. (1986) Self-affine fractal sets, I: The basic fractal dimensions, in Fractals in Physics, L. Pietronero and E. Tosatti, editors, North-Holland, New York, 3-15. Mandelbrot, B. B. (1986) Self-affine fractal sets, II: Length and surface dimensions, in Fractals in Physics, L. Pietronero and E. Tosatti, editors, North-Holland, N.Y., 17-20.Mandelbrot, B. B. (1986) Self-affine fractal sets, III: Hausdorff dimension anomalies and their implications in Fractals in Physics, L. Pietronero and E. Tosatti, editors, North-Holland, N.Y., 21-28.Mandelbrot, B. B. (1989) Fractal geometry - what is it, and what does it do, Proceedings of the Royal Society of London, Series A, 423(1864), 3-16.Mandelbrot, B. B. (1989) Fractals and an art for the sake of science, Leonardo, Computer Art in Context Supplemental Issue, 21-24.Mandelbrot, B. B. (1989) Some 'facts' that evaporate upon examination, The Mathematical Intelligencer, 11(4), 17-19.Mandelbrot, B. B., and J. W. Van Ness. (1968) Fractional brownian motions, fractional noises and applications, SIAM Review, 10(4), 422-437.Mandelbrot, B. B., and R. F. Voss (1983) Why is nature fractal and when should noises be scaling?, in Noise in Physical Systems and 1/f Noise, M. Savelli, G. Lecoy andJ.-P. Nougier, editors, Elsevier, New York, 31-39.McDermott, J. (1983) Geometrical forms known as fractals find sense in chaos,Smithsonian, December, 110-117.Mecholsky, J. J. (1986) Fractals - fact or fiction? Earth and Mineral Sciences, 55(3), 29-33.Peterson, I. (1984) Ants in labyrinths and other fractal excursions, Science News, 125(Jan.21), 42-43.Pool, R. (1990) Fractal fracas, Science, 249, 363-364.Ralston, A. (1986) Discrete mathematics: the new mathematics of science, American Scientist, 74, 611-618.Schechter, B. (1982) A new geometry of nature, Discover, June, 66-68.Sapoval, B. (1987) Natural processes and fractal geometry, Acta Stereologica, 6, supplement 3, parts 1-2, 785-798.Schroeder, M. R. (1989) Self-similarity and fractals in science and art, Journal of the Audio Engineering Society, 37(10), 795-808.Unwin, D. (1989) Fractals and the geosciences: Introduction, Computers & Geosciences, 15(2), 163-166.Voss, R. F. (1989) Random fractals: Self-affinity in noise, music, mountains, and clouds, Physica D, 38, 362-371.West, B. J., and M. Shlesinger (1990) The noise in natural phenomena, American Scientist, 78(Jan./Feb.), 40-45.Wilson, K. G. (1987) Problems in physics with many scales of length, Scientific American, 241(2), 140-157.II. MEASUREMENT ISSUESII.1 ESTIMATION OF FRACTAL DIMENSION - GENERAL ISSUESFox, C. G. (1989) Empirically derived relationships between fractal dimension and power law frequency spectra, Pure and Applied Geophysics, 131(1/2), 1-29.Giorgilli, A., D. Casati, L. Galgani, and L. Sironi (1986) An efficient procedure to compute fractal dimesions by box counting, Physics Letters A, 115(5), 202-206.Halsey, T. C., M. H. Jensen, L. P. Kadanoff, I. Procaccia, and B. I. Shraiman (1986) Fractal measures and their singularities: The characterization of strange sets, Physical Review A, 33(2), 1141-1151.Hunt, F., and F. Sullivan (1986) Efficient algorithms for computing fractal dimensions, in Synergetics, G. Mayer-Kress, editor, Springer Series, 32, Springer-Verlag, NewYork, 74-81.Liebovitch, L. S., and T. Toth (1989) A fast algorithm to determine fractal dimensions by box counting, Physics Letters A, 141(8/9), 386-390.Maragos, P., and F. K. Sun (1989) Measuring fractal dimension - morphological estimates and iterative optimization, Visual Communications and Image Processing,Proceedings of SPIE, 1199, Nov. 8-10, Philadelphia, 416-430.Saupe, D. (1988) Algorithms for random fractals, in The Science of Fractal Images, H.-O. Peitgen and D. Saupe, editors, Springer-Verlag, New York, 71-136.Stein, M. C., and K. D. Hartt (1988) Nonparametric-estimation of fractal dimension, Visual Communications and Image Processing'88, Proceedings of SPIE, 1001, 132-137.Taylor, C. C. (1987) Estimating fractal dimension, Acta Stereologica, 6, supplement 3, parts 1-2, 851-854.Tél, T., A. Fülöp, and T. Vicsek (1989) Determination of fractal dimensions for geometrical multifractals, Physics A, 159, 155-166.Theiler, J. (1990) Estimating fractal dimension, Journal of the Optical Society of America A - Optics and Image Science, 7(6), 1055-1073.Vepsalainen, A. M., and J. Ma (1989) Estimating of fractal dimension and correlation dimension from 2D-images and 3D-images, Visual Communications and ImageProcessing, Proceedings of SPIE, 1199, Nov. 8-10, Philadelphia, 431-439.Voss, R. F (1986) Random fractals: characterization and measurement, Physica Scripta, 33, 27-32.Voss, R. F. (1988) Fractals in nature: From characterization to simulation, in The Science of Fractal Images, H.-O. Peitgen and D. Saupe, editors, Springer-Verlag, New York, 21-70.II.2 ESTIMATION OF FRACTAL DIMENSION FOR CURVES/PROFILES Clark, N. N. (1986) Fractal harmonics and rugged materials, Nature, 319, 6052.Clark, N. N. (1986) Three techniques for implementing digital fractal analysis of particle shape, Powder Technology, 46, 45-52.Creutzburg, R., and E. Ivanov (1989) Fast algorithm for computing fractal dimensions of image segments, in Recent Issues in Pattern Analysis and Recognition, V.Cantoni, R. Creutzburg, S. Levialdi and G. Wolf, editors, Lecture Notes in ComputerScience, 399, Springer-Velag, New York, 42-51.Dubuc, B., J. F. Quiniou, C. Roques-Carmes, C. Tricot, and S. W. Zucker (1989) Evaluating the fractal dimension of profiles, Physical Review A, 39(3), 1500-1512. Gagnepain, J. J., and C. Roques-Carmes (1986) Fractal approach to two-dimensional and three-dimensional surface roughness, Wear, 109(1/4), 119-126.Kennedy, S. K., and W.-H. Lin (1986) FRACT - A fortran subroutine to calculate the variables necessary to determine the fractal dimension of closed forms, Computers & Geosciences, 12(5), 705-712.Longley, P. A., and M. Batty (1989) Fractal measurement and line generalization, Computers and Geosciences, 15(2), 167-183.Longley, P. A., and M. Batty (1989) Measuring and simulating the structure and form of cartographic lines, in J. Hauer, H. Timmermans, and N. Wrigley, editors, UrbanDynamics and Choice Behaviour, Kluwer, New York, 269-292.Longley, P. A., and M. Batty (1989) On the fractal measurement of geographical boundaries, Geographical Analysis, 21(1), 47-67.Matsushita, M., and S. Ouchi (1989) On the self-similarity of various curves, Physica D, 38, 246-251.Malinverno, A. (1990) A simple method to estimate the fractal dimension of self-affine series, Geophysical Research Letters, 17(11), 1953-1956.Peleg, M., and M. D. Normand (1985) Mechanical stability as the limit to the fractal dimension of solid particle silhouettes, Powder Technology, 43, 187-188. Pickover, C. A. (1986) A Monte Carlo approach for Epsilon placement in fractal-dimension calculations for waveform graphs, Computer Graphics Forum, 5, 203-210. Richter, P. H., and H. Peitgen (1985) Morphology of complex boundaries, Berichte Bunsengesellschaft fuer Physikalische Chemie, 89(6), 571-588.Schwarz, H., and H. E. Exner (1980) The implementation of the concept of fractal dimension on a semi-automatic image analyser, Powder Technology, 27, 207-213. Shelberg, M. C., H. Moellering, and N. Lam (1982) Measuring the fractal dimensions of empirical cartographic curves, Proceedings, Fifth International Symposium on Computer-Assisted Cartography (AUTO-CARTO 5), August 22-28, CrystalCity, Virginia, 481-490.II.3 ESTIMATION OF FRACTAL DIMENSION FOR SURFACESClarke, K. C. (1986) Computation of the fractal dimension of topographic surfaces using the triangular prism surface area method, Computers & Geosciences, 12(5), 713-722. Dubuc, B., C. Roquescarmes, C. Tricot, and S.W. Zucker (1987) The variation method - A technique to estimate the fractal dimension of surfaces, Visual Communications and Image Processing II, Proceedings of SPIE, 845, Oct. 27-29, Cambridge,Massachusetts, 241-248.Dubuc, B., S. W. Zucker, C. Tricot, J. F. Quinou, and D. Wehbi (1989) Evaluating the fractal dimension of surfaces, Proceedings of the Royal Society of London A,425(1868), 113-127.Gårding, J. (1988) Properties of fractal intensity surfaces, Pattern Recognition Letters, 8(5), 319-324.Hayward, J., J. D. Orford, and W. B. Whalley (1989) Three implementations of fractal analysis of particle outlines, Computers and Geosciences, 15(2), 199-207. Hough, S. E. (1989) On the use of spectal methods for the determination of fractal dimension, Geophysical Research Letters, 16(7), 673-676.Paumgartner, D., G. Losa, and E. R. Weibel (1981) Resolution effect on the stereological estimation of surface and volume and its interpretation in terms of fractal dimensions,Journal of Microscopy, 121(1) 51-63.Sayles, R. S., and T. R. Thomas (1978) Topography of random surfaces, Nature, 273, 573. Shelberg, M. C., and H. Moellering (1983) IFAS: A program to measure fractal dimensions of curves and surfaces, Proceedings, ACSM-ASP Technical Meeting,Washington, D.C., 483-492.Shelberg, M. C., H. Moellering, and N. Lam (1983) Measuring the fractal dimensions of surfaces, Proceedings, Sixth International Symposium on AutomatedCartography (AUTO-CARTO 6), 2, Oct. 16-21, Ottawa, 319-328.II.4 SPACE FILLING CURVESAbel, D.J. and D.M. Mark (1990) A comparative analysis of some two-dimensional orderings, International Journal of Geographical Information Systems, 4(1), 21-32. Butz, A. R. (1969) Convergence with Hilbert's space filling curve, Journal of Computing Science, 3(5), 128-146.Butz, A.R. (1971) Alternative algorithms for Hilbert's space-filling curve, IEEE Transactions on Computers, 20:4, 424-426.Cole, A. J. (1983) A note on space filling curves, Software Practice and Experience, 13, 1181-1184.Cole, A. J. (1985) A note on Peano polygons and gray codes, International Journal of Computer Mathematics, 18, 3-13.Cole, A. J. (1987) Compaction techniques for raster scan graphics using space-filling curves, The Computer Journal, 30(1), 87-92.Davies, I. M. (1987) Space filling curves and fractals on micros, The Institute of Mathematics and its Applications, 23, 94-99.Fisher, A. J. (1986) A new algorithm for generating Hilbert curves, Software Practice and Experience, 16, 5-12.Goldschlager, L. M. (1981) Short algorithms for space filling curves, Software Practice and Experience, 11(1), 99-100.Goodchild, M. F., and A. W. Grandfield (1983) Optimizing raster storage: An examination of four alternatives, Proceedings, Sixth International Symposium on Automated Cartography (AUTO-CARTO 6), 1, Oct. 16-21, Ottawa, 400-407.Griffiths, J. G. (1985) Table-driven algorithms for generating space-filling curves, Computer Aided Design, 17(1), 37-41.Holbrook, J. A. R. (1981) Stochastic independence and space-filling curves, American Mathematical Monthly, June/July, 426-432.Laurini, R. (1985) Graphics databases built on peano space-filling curves, Proceedings of the Eurographics'85 Conference, September 8-13, Nice, France, 327-338. Laurini, R., and F. Milleret (1987) Les relations de Peano dans les bases de données géographiques, Symposium Proceedings, Geomatics Applied to MunicipalManagement, Nov. 4-6, Montreal, Quebec, 65-78.Mark, D. M., and M. F. Goodchild (1986) On the ordering of two-dimensional space: Introduction & relation to tesseral principles, in Spatial Data Processing UsingTesseral Methods: Collected Papers from Tesseral Workshops 1 and 2, B.Diaz and S. Bell,editors, NERC Unit for Thematic Information Systems, Reading, U.K., 179-192.Matias, Y., and A. Shamir (1988) A video scambling technique based on space filling curves, Lecture Notes in Comptuer Science, 293, 398-417.Medioni, G., and Y. Yasumoto (1984) A Note on using the fractal dimension for segmentation, Proceedings of the Workshop on Computer VisionRepresentation and Control, April 30-May 2, Annapolis, Maryland, 5-30. Nguyen, P. T., and J. Quinqueton (1982) Space filling curves and texture analysis, Proceedings, Sixth International Conference on Pattern Recognition, Oct.19-22, Munich, Germany, 282-285.Null, A. (1971) Space-filling curves, or how to waste time with a plotter, Software Practice and Experience, 1, 403-410.Palmer, J. A. B. (1986) A Fortran procedure for drawing some space-filling curves, Software Practice and Experience, 16, 559-574.Patrick, E. A., D. R. Anderson and F. K. Bechtel (1968) Mapping multi-dimensional space to one dimension for computer output display, IEEE Transactions on Computers,17(10), 949-953.Pendock, N. (1985) Fast classification of image data with large spectral dimension, Proceedings, Nineteenth International Symposium on Remote Sensing of Environment, Oct. 21-25, Ann Arbor, Michigan, 281-285.Platzman, L. K., and J. J. Bartholdi III (1986) Routing and scheduling algorithms based on spacefilling Curves, Proceedings, IEEE International Conference on Systems, Man, and Cybernetics, II, Oct. 14-17, Atlanta, Georgia, 1292-1293.Platzman, L. K., and J. J. Bartholdi III (1989) Spacefilling curves and the planar travelling salesman problem, Journal of the Association for Computing Machinery,36(4), 719-737.Simon, J. C., and J. Quinqueton (1980) On the use of a peano scanning in image processing, in Issues in Digital Image Processing, in R.M. Haralick and J.C. Simon, editors, Sijthoff & Noordhoff, Germantown, Maryland, 357-366.Stevens, R. J., A. F. Lehar, and F. H. Preston (1983) Manipulation and presentation of multidimension Data using the Peano scan, IEEE Transactions on Pattern Analysis and Machine Intelligence, 5(5), 520-526.Wang, C.Y., and J.B. Bassingthwaighte (1990) Area-filling distributive network model, Mathematical Computer Modelling, 13(10), 27-33.Witten, I. H., and B. Wyvill (1983) On the generation and use of space filling curves, Software Practice and Experience, 13(6), 519-525.Yang, K.-M., L. Wu, and M. Mills (1988) Fractal based coding scheme using Peano scan, Proceedings, IEEE International Symposium on Circuits and Systems, June 7-9, Espoo, Finland, 2301-2304.III. APPLICATIONSIII.1 CARTOGRAPHIC GENERALIZATIONArmstrong, M. P., and L. D. Hopkins (1983) Fractal enhancement for thematic display of topologically stored data, Proceedings, Sixth International Symposium onAutomated Cartography (AUTO-CARTO 6), 2, Oct. 16-21, Ottawa, 309-318. Butttenfield, B. P. (1984) Line Structure in Graphic and Geographic Space.Unpublished PhD, Department of Geography, University of Washington, Seattle. Buttenfield, B. P. (1986) Digital definitions of scale-dependent line structure, Proceedings, AUTO-CARTO LONDON, 1, September 14-19, London, 497-506.Buttenfield, B. P. (1989) Scale-dependence and self-similarity in cartographic lines, Cartographica, 26(1), 79-100.Carstensen Jr., L. W. (1989) A fractal analysis of cartographic generalization, The American Cartographer, 16(3), 181-189.Dell'Orco, P., and M. Ghiron (1983) Shape representation by rectangles preserving their fractality, Proceedings, Sixth International Symposium on AutomatedCartography (AUTO-CARTO 6), 2, Oct. 16-21, Ottawa, 299-308.Dutton, G. H. (1980) A fractal approach to the control of cartographic detail, Proceedings, Computer Graphics'80, Brighton, U.K., 371-381.Dutton, G.H. (1981) Fractal enhancement of cartographic line detail, The American Cartographer, 8(1), 23-40.Hill Jr., F. S., and S. E. Walker Jr. (1982) On the use of fractals for efficient map generation, Proceedings, Graphics Interface'82, May 17-21, Toronto, 283-289.Janinski, M. J. (1990) The Comparison of Complexity Measures for Cartographic Lines. NCGIA Technical Report 90-1, Santa Barbara, California.Maguire, D. J. (1986) Generalization, fractals and spatial databases, The Bulletin of the Society of University Cartographers, 20(2), 96-99.Muller, J.-C. (1986) Fractal dimension and inconsistencies in cartographic line representations, The Cartographic Journal, 23(2), 123-130.Muller, J.-C. (1987) Fractal and automated line generalization, The Cartographic Journal, 24(1), 27-34.Muller, J.-C. (1987) Optimal point density and compaction rates for the representation of geographic lines, Proceedings, Eighth International Symosium on Computer-Assisted Cartography (AUTO-CARTO 8), March 29-April 3, Baltimore,Maryland, 221-230.III.2 LENGTH ESTIMATES AND SELF-SIMILIARITY OF LINESBaugh, I. D., and J. R. Boreham (1976) Measuring the coastline from maps: A study of the Scottish mainland, The Cartographic Journal, 13(2), 167-171.Beckett, P. (1977) Cartographic generalizations, The Cartographic Journal, 14(1), 49-50. Biddy, J. (1972) Infinite rivers and Steinhaus' paradox, Area, 4, 214.Bruckstein, A. M. (1990) The self-similarity of digital straight lines, Proceedings, 10th International Conference on Pattern Recognition, 1, June 16-12, Atlantic City, New Jersey, IEEE Computer Society, 485-490.Dorst, L., and A. W. M. Smeulders. (1987) Length estimation for digitized contours, Computer Vision, Graphics and Image Processing, 40(3), 311-333.Ellis, T. J., and D. Proffitt (1979) Measurement of the lengths of digitized curved lines, Computer Graphics and Image Processing, 10(4), 333-347.Galloway, R. W., and M. E. Bahr (1979) What is the length of the Australian coast?Australian Geographer, 14(4), 244-247.Håkanson, L. (1978) The length of closed geomorphic lines, Mathematical Geology, 10(2), 141-167.Håkanson, L. (1981) The length of open geomorphic lines, Zeitschrift für Geomorphologie, 25(4), 369-382.Kappraff, J. (1986) The geometry of coastlines: a study in fractals, Computers and Mathemathics with Applications, 12B(3/4), 655-671.Ling, F. F. (1987) Scaling law for contoured length of engineering surfaces, Journal of Applied Physics, 62(2), 2570-2572.Longley, P. A., and M. Batty (1987) Using fractal geometry to measure maps and simulate cities, Computer Education, 56, 15-19.Longley, P. A., and M. Batty (1988) Measuring and simulating the structure and form of cartographic lines, in Developments in Quantitative Geography, J. Hauer, H.J.P.Timmermans and N. Wrigley, editors, Reidel Publishing, Dordecht.Longley, P. A., and M. Batty (1989) On the fractal measurement of geographical boundaries, Geographical Analysis, 21(1), 47-67.Luk'yanova, S. A., and N. A. Kholodilin (1975) Length of the shoreline of the world ocean and of various types of shores and coasts, Soviet Hydrology, 2, 66-69.Maling, D. M. (1968) How long is a piece of string? The Cartographic Journal, 5(1), 147-156.Mandelbrot, B. B. (1967) How long is the coast of Britian? Statistical self-similarity and fractional dimension, Science, 156, 543-553.Perkal, J. (1966) On the Length of Empirical Curves. Michigan Inter-University Community of Mathematical Geographers, Discussion Paper No. 10, 34 pp. [translated by R. Jackowski]Richardson, L. F. (1961) The problem of contiguity: An appendix to 'Statistics of Deadly Quarrels', in General Systems Yearbook, 6, 139-187.Shelberg, M. C., H. Moellering, and N. Lam (1982) Measuring the fractal dimensions of empirical cartographic curves, Proceedings, Fifth International Symposium on Computer-Assisted Cartography (AUTO-CARTO 5), August 22-28, CrystalCity, Virginia, 481-490.Steinhaus, H. (1954) Length, shape and area, Colloquium Mathematicum, III(1), 1-13. Underwood, J. D. M. (1981) Influencing the perception of contour lines, The Cartographic Journal, 18(2), 116-119.III.3 VISUAL PERCEPTIONCutting, J. E., and J. J. Garvin (1987) Fractal curves and complexity, Perception & Psychophysics, 42(4), 365-370.。

Table of Contents

Table of Contents

ECCO XIX – CO 2006 Joint MeetingFaculty of Engineering University of PortoPorto, PortugalMay 11-13, 2006Table of ContentsWelcome (5)Information for Participants (7)Program Overview (11)Scientific Program Schedule (13)Plenary Sessions Abstracts (19)Parallel Sessions Abstracts (23)List of Participants (55)Maps (61)Notes (65)Sponsored by:EURO—The Association of European Operational Research Societies ECCO—European Chapter on Combinatorial OptimizationAPDIO—Associa¸c˜a o Portuguesa de Investiga¸c˜a o Operacional(Portuguese Operations Research Society)FEUP—Faculdade de Engenharia da Universidade do Porto(Faculty of Engineering of the University of Porto)INESC Porto—Instituto de Engenharia de Sistemas e de Computadores do Porto (Institute for Systems and Computer Engineering of Porto)WelcomeDear Friends,Welcome to the Faculty of Engineering of the University of Porto and to the ECCO XIX—CO2006Joint Meeting,which gathers together the yearly conference of the European Chapter on Combinatorial Optimization(ECCO XIX)and the biennial International Symposium on Combinatorial Optimisation(CO2006).We wish you a pleasant stay at Porto,a city with a rich1,000-year history.Porto Historic Centre has been classified by UNESCO as World Heritage,due to the outstanding universal value of its urban fabric and many historic buildings.Porto is an ancient historical city,with a lot of interesting sites and monuments,leisure facilities,and very good well-known gastronomy (it is also famous for the excellent wines produced in the region,mainly Port wine).Porto is the centre of a culturally and naturally rich region that gathers together history,arts and nature(sea and mountains);it is a perfect starting point for tourist excursions(of various durations andflavours).The ECCO XIX—CO2006Joint Meeting keeps the high quality standards of the previous meetings,showing the diversity and the scientific potential of the Combinatorial Optimization area.In this meeting we will have four plenary sessions,by leading researchers in this area,and a total of59presentations in parallel sessions,grouped under9streams:Routing,Scheduling, General Combinatorial Optimization,Meta-Heuristics,Graphs,Manufacturing,Cutting and Packing,Integer Liner Programming and Location.We hope that this meeting will provide a fruitful exchange of scientific ideas and experiences.Finally we would like to thank our sponsors,the members of the Program and Organizing Committees and the people that helped us with the Meeting organization,in particular Ros´a rio Macedo.Jos´e Fernando Oliveira-Program Committee ChairMaria Ant´o nia Carravilla-Organising Committee ChairAnt´o nio Miguel Gomes-Information Technologies ChairInformation for Conference Participants Meeting VenueThe meeting will take place at Faculdade de Engenharia da Universidade do Porto(FEUP), the School of Engineering of the University of Porto.FEUP is located at the Asprela Campus in the heart of the main research and academic district of Porto.The Asprela Campus is served by the yellow metro line(line D,direction Hospital S˜a o Jo˜a o-station IPO).This line connects the Asprela Campus to the city centre in less than10minutes and the average time between trains is less than10minutes.Please note that not all of the trains will go to the end of line D (Hospital de S˜a o Jo˜a o).Some of the trainsfinish the trip on station P´o lo Universit´a rio.You should look at the train destination before boarding.See Asprela map for details.The campus is also served by several buses lines.Please check the STCP site(http://www.stcp.pt). Accessing FEUP from the conference hotels•City Centre and Albergaria S˜a o Jos´e:walk to any metro station of line D(Trindade, Aliados or S˜a o Bento);if you walk to Bolh˜a o station take the metro to Trindade(lines A,B,C and E,in the opposite direction of Est´a dio do Drag˜a o)and there change to line D(map:City Centre).•Hotel Ibis:walk directly to FEUP(map:Asprela).•Hotel F´e nix and Hotel Tuela:walk to the metro station Casa da M´u sica and take the metro to Trindade(lines A,B,C and E,direction Est´a dio do Drag˜a o)and change to line D(map:Boavista).•Hotel Meridien:take a taxi directly to FEUP or bus21to Casa da M´u sica(it is a20 minutes walk from Hotel Meridien to Casa da M´u sica station)and there take the metro (map:Boavista).Conference RoomsTo access the area where the conference rooms are located,it is necessary to climb the stairs on the right side of the main entrance(see FEUP map for details on rooms locations).Please note:room B120is located on the1st-Floor,while rooms B032and B035have access both from Ground-Floor and1st-Floor.Room B034only has access from the Ground-Floor. Equipment of the Conference RoomsAll rooms are equipped with an overhead projector,video projector and a PC computer with Adobe Acrobat7.0and MS Powerpoint2003(800x600resolution recommended).It is also possible to connect laptops to the video projectors.Authors should check presentations before their sessions.We suggest that you bring your own computer and/or transparencies as a back-up.Length of Presentation20minutes for each talk,including discussion.Please note that we are running on a very tight schedule.Therefore,it is essential that you limit you presentation to the time which has been assigned to you.Session chairpersons are asked to make sure that speakers observe the time limits.LunchesLunches on May11and12(Thursday and Friday)are included in the conference fee.Lunches will be served on FEUP’s canteen(map:Asprela)and it is necessary to present the participants badge at the canteen entrance.Several restaurants offering meals and snacks are available at the shopping center in the Asprela Campus.RegistrationRegistration will be on room B120starting at8:30on Thursday morning.Please arrive early to avoid queues.Coffee BreaksCoffee,refreshments and biscuits will be provided during scheduled coffee breaks on room B120.Cocktail PartyAn informal cocktail party(Porto de Honra)is scheduled to Thursday evening,May11,at 18:00at the meeting venue.Minho Tour and Conference DinnerOn Friday afternoon and evening is scheduled a tour to Minho and the conference dinner. Departure will be at14:30from the conference venue(main entrance)to visit Guimar˜a es,the nation’s“birthplace”.The tour includes a visit to the Ducal Palace and a walking guided tour in the historical centre,ending at Pousada de Santa Marinha for the conference dinner.The buses will return to the conference hotels after dinner.Internet accessFEUP is covered by a wireless network and the use of laptops to access the internet is possible. However the connection is restricted to the http e https protocols(this means surfing the internet with a browser and read email through webmail).To offer a simple and easy access to internet services for all participants,a low security policy has been implemented and we advise the use of the https protocol.Participants should connect to the SSID“guest-e-U”and follow the instructions for conference participants(SSID:guest-e-U;login:ecco;password:eccofeup). There will be also available two PCs on the room B120to access internet.Arriving at the airportThe city of Porto is easily accessible from abroad.Several airlines offer direct service to F.S´a Carneiro International Airport(http://www.ana-aeroportos.pt/ANAIngles/Porto/HomePage .htm),located about12Km from the City Centre.•The AeroBus–The AeroBus(http://www.stcp.pt/en/alugueres/aerobus.htm)is a ser-vice of STCP(http://www.stcp.pt)that assures a fast linking between the Airport and the city centre(Av.dos Aliados),passing by the main Hotels of Porto,and the maximum travel time is40minutes(all hotels served except Hotel Ibis).Just inform the driver ofyour destination.It is convenient,fast and cheap service at the arrivals terminal.There are buses every30min,all week,between7a.m.and8p.m.with specialised drivers and modern busesfitted with air-conditioning.The ticket is just4.00e and can be bought inside the bus,and it is valid on any STCP line until the end of the day.TAP Air Portugal offers this service free of charge to its passengers,just show your boarding card to the Aerobus driver.The trips back to the Airport begin at Av.dos Aliados.Passengers can board the bus at the stop on Av.dos Aliados,but all other stops require prior booking,via Internet or by telephone,so that the AeroBus makes the shortest possible journey•Taxi services–A taxi ride to the conference hotels is around20.00e.Volumes exceeding 55x36x20cm needing to be carried in the luggage compartment are charged1.50e.•Metro–We regret to inform you that the Metro line E which connects the airport to the city centre will not be operating by the time of the meeting.Moving AroundThe metro system is the most convenient way to move around in Porto.Inside the city limits you need a Z2ticket(0.85e for1trip,8.5e for11trips,3.00e for all trips in the following 24h).The ticket,called Andante,is rechargeable,individual and needs to be validated at the entrance of every station(the ticket is valid for one hour).The Andante ticket is also valid on the bus lines marked with the Andante sign.Please check STCP for details.Participants who wish to visit museums should consider the acquisition of the cultural pass ticket(Passe Porto).With this pass you have discounts or free admittance on museums and use all public transports in Porto(metro,bus,...).1day:7.5e;3days:15.5e.Taxis are not very expensive and,within the city limits,the rates charged are those shown in the meter at the end of the ride.For other areas the fare is calculated at0.35e per km after leaving the city limits.Any tolls(round trip)are paid by the client.On Saturdays,Sundays and national holidays,and Monday to Friday between10p.m.and6a.m.,a20%additional rate applies to normal fares. Touristic HighlightsPorto is an ancient historical city,with a lot of interesting sites and monuments,leisure facili-ties,and very good well-known gastronomy(it is also famous for the excellent wines produced in the region,mainly Port wine).Porto is the centre of a culturally and naturally rich region that gathers together history,arts and nature(sea and mountains);it is a perfect starting point for tourist excursions(of various duration’s andflavours).•Historical centre:the old part of the town and the main monuments are classified as World Heritage by UNESCO.•Serralves:Museum of Contemporary Art and Park.•Museu Nacional de Soares dos Reis:Pal´a cio dos Carrancas,sculptures and paintings from the XIX and XX centuries.•Casa da M´u sica:The building,whose name literally means”House of Music”,was de-signed by the Dutch architect Rem Koolhaas.Port wine cellars•Cruises in the Douro River:to see Porto World Heritage or the Douro Valley.MessagesMessages for conference participants and accompanying persons can be left at the conference secretary on:Telephone:+351225081920(Ros´a rio Macedo)Fax:+351225081443Program OverviewScientific Program ScheduleThursday(May11)9:40–10:00Opening Session(B032)10:00–11:00Plenary Session1(B032) Chairperson:Alain HertzCombinatorial Optimization and Green LogisticsRichard Eglese11:30–12:30Session1a:Routing1(B032) Chairperson:Silvano Martello1a.1Exact and Heuristic Approaches for the Aircraft Fleeting and Routing Problem Mohamed Haouari,Najla Aissaoui,Farah Zeghal1a.2A Tabu Search Algorithm for Fleet Size and Mix Vehicle Routing ProblemJos´e Brand˜a o1a.3Vehicle routing problems with two-and three-dimensional loading constraints Silvano MartelloSession1b:Scheduling1(B034) Chairperson:Jorge Pinho de Sousa1b.1Late work minimization in two-machine shop systemsJacek Blazewicz,Erwin Pesch,Malgorzata Sterna,Frank Werner1b.2Scheduling of1-and2-processor UET multiple tasks on dedicated machines with limited avail-abilityKrzysztof Giaro,Marek Kubale1b.3Cyclic SchedulingPeter Brucker,Thomas KampmeyerSession1c:General Combinatorial Optimization1(B035) Chairperson:Jakob Krarup1c.1A software model of combinatorial optimisation problemsCristina C.Vieira,Carlos M.Fonseca1c.2Lower bounds from a natural formulation for the part families with precedence constraints prob-lemL´ıdia Lampreia Louren¸c o,Margarida Vaz Pato1c.3OR Projects:Knowledge Sharing Framework Strategy for Competitive Advantage Ednea Maria Cochrane14:00–15:00Plenary Session2(B032) Chairperson:Vitaly A.StrusevichUnweighted set cover:beat the computer!Jakob Krarup15:10–16:10Session2a:Routing2(B032) Chairperson:Richard Eglese2a.1On a time-dependent formulation for routing problemsM.Teresa Godinho,Lu´ıs Gouveia,Thomas Magnanti,Pierre Pesneau,Jos´e Manuel Pires2a.2A Genetic Algorithm for the Rural Postman ProblemMaria Ros´a rio Moreira,Jos´e Soeiro Ferreira2a.3Multicriteria Selection of Attractions and Hotels for Sightseeing ToursJean-Marc GodartSession2b:Scheduling2(B034) Chairperson:Van-Dat Cung2b.1Universal Scheduling ProblemsHorst W.Hamacher,Marcel T.Kalsch2b.2Lower Bounds for Tardiness Minimization on a Single Machine with Family Setup Times Imed Kacem2b.3Scheduling with Controllable Processing Times to Minimize the Maximum Job Cost Natalia V.Shakhlevich,Vitaly A.StrusevichSession2c:Meta-Heuristics1(B035) Chairperson:El-Ghazali Talbi2c.1Hyper-ellipse landscape approximation for large combinatorial optimization instances Emilia Tantar,Clarisse Dhaenens,El-Ghazali Talbi2c.2Two hybrid methods based on genetic algorithms for decision making in project management applicationsRachid Chelouah,Claude Baron,Samuel Rochet2c.3Ant colony optimization for multi resources allocation problem in project management(with case study)Amir Hossein Meimand Kermani,Hesam Adin Zegordi16:40–18:00Session3a:Graphs(B032) Chairperson:Alain Hertz3a.1On edge orienting methods for graph coloringBernard Gendron,Alain Hertz,Patrick St-Louis3a.2Collective Decisions for Graph AlgorithmsUlrich Pferschy,Christian Klamler3a.3On the k-clique polyhedraJean Francois Maurras3a.4Using Graph Partitioning and Tabu Search to solve the Transit Network Design Problem Nicolas Teypaz,Van-Dat CungSession3b:Scheduling3(B034) Chairperson:Chris Potts3b.1A guaranteed clustering algorithm for large communication delay modelJohnatan Pecero-Sanchez and Denis Trystram3b.2A Tabu Search Algorithm for Job Scheduling on Computational GridsFatos Xhafa3b.3On-line Service SchedulingZhenbo Wang,Wenxun Xing,Bo Chen3b.4On-line Algorithms for Single Machine Scheduling with Family Setup TimesC.N.Potts,V.A.Strusevich,J.D.WhiteheadSession3c:General Combinatorial Optimization2(B035) Chairperson:Carlos M.Fonseca3c.1Combinatorial auctions with transformation in procurementDolores Romero Morales,Reinder B.Lok,Richard Steinberg3c.2New approach for Partial Digest ProblemPiotr Lukasiak,Jacek Blazewicz,Maciej Antczak,Grzegorz Palik3c.3Substitutes and Complements in Network Flows Viewed as Discrete Convexity Kazuo Murota,Akiyoshi Shioura3c.4Two Phase Method with Three Objectives Applied to the Assignment Problem Anthony Przybylski,Xavier Gandibleux,Matthias EhrgottFriday(May12)9:00–10:20Session4a:Meta-Heuristics2(B032) Chairperson:Thomas Stuetzle4a.1Self-tuning of the noising methodsIr`e ne Charon,Olivier Hudry4a.2Attribute Guided SearchIan M.Whittley,George D.Smith4a.3A Relax-and-Cut RAMP Approach for the Linear Ordering ProblemDorabela Gamboa,C´e sar Rego,Fred Glover4a.4F-races:A tool for the automatic configuration of stochastic local search algorithms Mauro Birattari,Thomas StuetzleSession4b:Manufacturing(B034) Chairperson:Maria Ant´o nia Carravilla4b.1Exact Methods for Design of Unit-Head MachinesNikolai Guschinsky,Alexandre Dolgui,Genrikh Levin4b.2Modeling Operations of Electronic Component Placement MachinesEkrem Duman4b.3An interactive heuristic for bicriteria olive oil production planning problemKristina Soric,Visnja V.Rosenzweig,Olivera Koprivnjak4b.4Flexible scheduling in cells of a workshopbane,A.Soukhal,J-C.BilautSession4c:Cutting and Packing1(B035) Chairperson:Rafal Walkowiak4c.1Lower bounds and heuristics for the variable sized bin packing problemMohamed Haouari,Mehdi Serairi4c.2Solving the Variable Size Bin Packing Problem with Discretized Formulations Isabel Correia,Lu´ıs Gouveia,Francisco Saldanha-da-Gama4c.31DBP-parallel metaheuristic approaches to the problemRafal Walkowiak4c.41DBP with different costs and sizes of bins-the ideas and resultsRafal Walkowiak10:50–11:50Session5a:Integer Liner Programming(B032) Chairperson:Catherine Roucairol5a.1Finding the nearest point in a polytope according to any metricJo˜a o Soares5a.2An Integral Basis Method for the Quadratic Assignment ProblemYuusuke Kounoike,Tetsuya Fujie,Yuji Shinano5a.3On lower bounds of the Quadratic Assignment ProblemCatherine Roucairol,Bertrand Le CunSession5b:Scheduling4(B034) Chairperson:Mohamed Haouari5b.1Tight Bounds for the Identical Parallel MachineMohamed Haouari,Anis Gharbi,Mahdi Jammeli5b.2Scheduling Parallel Dedicated Machines with the Speeding-Up ResourceH.Kellerer,V.A.Strusevich5b.3MultiObjective Parallel Machine Scheduling using Memetic AlgorithmsFelipe Baesler,Luis Ceballos,Milton RamirezSession5c:Cutting and Packing2(B035) Chairperson:Hiroshi Nagamochi5c.1A neighbourhood structure,based on visibility graphs,for the two-dimensional packing problem Eduarda Pinto Ferreira,Jos´e Fernando Oliveira5c.2Clustering irregular shaped pieces for lattice packingM.Teresa Costa,A.Miguel Gomes,Jos´e F.Olilveira5c.3An iterated local search algorithm based on nonlinear programming for the irregular strip packing problemTakashi Imamichi,Mutsunori Yagiura,Hiroshi Nagamochi12:00–13:00Plenary Session3(B032) Chairperson:Chris PottsMetaheuristics in Combinatorial Optimization:flexibility and decision supportJorge Pinho de SousaSaturday(May13)9:30–10:50Session6a:Meta-Heuristics3(B032) Chairperson:Laetitia Jourdan6a.1Application of a Structured Multiobjective Evolutionary Algorithm to the Design of Screws for Polymer ExtrusionM.A.Felismino,A.Gaspar-Cunha,C.M.Fonseca6a.2Solving the Combinatorial Optimisation Twin-Screw Design Problem Using Meta-HeuristicsC.Teixeira,R.Faria,J.A.Covas,A.Gaspar-Cunha6a.3Selection of Solutions in a Multi-Objective Environment:Application to Polymer Extrusion and Injection MoldingJ.C.Ferreira,C.M.Fonseca,A.Gaspar-Cunha6a.4Mono and Multi-objective continuous optimization for conducting polymer composites Laetitia Jourdan,Thomas Legrand,El-Ghazali Talbi,Jean Luc WojkiewiczSession6b:Location(B034) Chairperson:Stavros Zenios6b.1Improved Complexity Results for Several Multifacility Location Problems on Trees J¨o rg Kalcsics6b.2Network Flows and Location(FlowLoc):The Source Location ProblemHorst W.Hamacher,Dwi R.Poetranto6b.3The multiple-period,multiple-capacities facility location problem MPMCFLP:background,dif-ferent approaches and challengesMiguel Ortega-Mier,Alvaro Garc´ıa-S´a nchez,Eva Ponce-Cueto6b.4Capacity investment under uncertainty:multiobjective decisions with multiobjective local search Jo˜a o Claro,Jorge P.Sousa11:20–12:20Plenary Session4(B032) Chairperson:Silvano MartelloFinancial Products with Guarantees:Applications,Models and Internet-based servicesStavros Zenios12:20–12:30Closing Session(B032)Plenary Sessions AbstractsPlenary Session1Combinatorial Optimization and Green LogisticsRichard EgleseThefield of logistics has been an area which has generated many hard combinatorial optimization problems of practical importance,such as the Vehicle Routing Problem.Traditional approaches have tended to concentrate on the objective of cost minimization for production,distribution and collection activities.However in recent years there has been a greater emphasis on the environmental impacts of these activities.New problems have emerged from new approaches such as reverse logistics and the increased importance of recycling.Relevant objectives may involve not only minimization of cost,but also minimizing pollution and other environmental measures.The paper will examine some of the new problems that have emerged in this area and the contribution that combinatorial optimization models can make.Plenary Session2Unweighted set cover:beat the computer!J.Krarup,J.VilladsenFor a0-1matrix DELTA=delta ij,column j is said to cover row i if delta ij=1.A cover is a subset of columns covering all rows.Unweighted SET COVER(USC)is the problem offinding a cover containing as few columns as possible.A seemingly innocent brain teaser was published in a Danish journal in2003. Not much reflection is needed to realize that the solution of a highly structured instance DELTA of USC will answer the question posed.The instance DELTA or rather,the family of instances DELTA(n)is a square matrix of size3n,n=1,2,....Provided that DELTA(1)is known,the fractal-like structure of the matrices allows for DELTA(n)to be constructed recursively for any value of n.Let omega(n)be the number of columns in an optimal solution to DELTA(n).Some preliminary investigations have enabled us to determine omega(n),n=1,2,3,4,and to show that omega(5)must be either12or13.12or13? Unfortunately LP-based bounds take us nowhere in this case since the optimum isflat as a pancake.It offers some consolation though that experiments with CPLEX were not too encouraging either.For n= 5,DELTA(5)is a matrix of size243x243.Nothing was returned after24hours CPU time.Eventually, upon an investment of72hours CPU time,CPLEX managed to come up with omega(5)=12.The original problem asks for omega(12),that is,an optimal solution to a square matrix of size531,441. After a week the originator of the problem,using an invalid argument,announced his own answer, omega(12)=512,and cashed the award.We have so far shown that omega(12)is bounded to belong to the interval[210,377].We also need to conclude that no brute force approach such as further experiments with CPLEX is likely to work whereas paper and pencil may suffice in providing thefinal result.————————The text above is a slightly extended version of the abstract used when a few preliminary results for n<6were presented at meetings in2004and2005.State-of-affairs as per today:the transition from patches to tiles in the investigation of feasible solutions has reduced the dimension by a factor of34.Interms of tiles a full-scale verification of the optimal solution found for n=6(729x729)occupies only a single A4sheet.Moreover,n=7has lead to new insight into an important notion called compatibility, to the corresponding STU forms,to the concept of even/odd keys,to the distinction between E-and X-keys,and to the discovery of matching cliques.Furthermore,paper and pencil have been supplemented by a puzzle with pieces of transparent strips showing three or six letters each.Part of the puzzle is readily solvable within a few minutes,for example,on an overhead projector.The puzzle has so far been instrumental in laying bare the unexpected structure of the solution to the n=7(2,187x2,187) instance and is believed to represent a significant step ahead towards the general“n->n+1”(recursive) solution procedure aimed for.Although the lower bounds are provably tight for all n<8we can at most conjecture that this property applies for all values of n.If true,however,omega(12)=210. Disregarding the distant and,for our purpose,largely irrelevant familiarity with the“Coupon Collector Problem”,nothing useful whatsoever has been found in the literature that we are familiar with.Thus, if the nut can be fully cracked,the visible result will presumably become an indeed self-contained paper as reflected by the total absence of references.Plenary Session3Metaheuristics in Combinatorial Optimization:flexibility and decisionsupportJorge Pinho de SousaMetaheuristics have been successfully used in a large range of Combinatorial Optimization problems. This success is partly due to theirflexibility,as they easily incorporate new constraints or objectives, with no need for structural changes in software.Although algorithms such as Simulated Annealing or Tabu Search are quite used in practice,the development of other metaheuristics,as well as their hybridization,is leading to the identification of more fundamental common characteristics and compo-nents that may form a general conceptual framework,useful for the design of new high performance algorithms.This is particular useful in the case of multi-objective metaheuristics.We will analyze some of these features,and present a few practical examples.In fact,recent research on metaheuristics has provided innumerous contributions for the design of software platforms integrating generic components that are easily adaptable and re-usable.These“frameworks”are able to articulate different models and techniques creatingflexible,configurable systems whose architecture can be dynamically changed.This seems to be fundamental for the practical success of this type of approaches,and is potentially the basis for their progressive integration in commercial software.Moreover traditional heuristic procedures are extremely dependent on the instance features,and parameter tuning and algorithm customization is often a rather time consuming task.An important research line is based on this concern,and special approaches have been developed to handle this specific issue.Successful examples of these approaches will also be presented.Finally it should be noted that in practice,these techniques are only meaningful if they are embedded in broader Decision Support Systems.This should also be viewed as a way to overcome the strong limitations of the“optimization paradigm”arising from the limitations of models, from the complexity of real problems and from their lack of structure.Additional strong requirements are also associated to the fact that decision environments are extremely dynamic.That is why a well designed interaction with the decision-maker may play an important role in the process,particularly in what concerns the key issue of dealing with multiple objectives.We will present a couple of practical applications of these ideas,and discuss some related potentially interesting research topics.Plenary Session4Financial Products with Guarantees:Applications,Models andInternet-based servicesStavros Zenios,Andrea ConsiglioEndowments with a minimum guaranteed rate of return appear in insurance policies,pension plans and social security plans.In several cases,especially in the insurance industry,such endowments also participate in the business and receive bonuses from thefirm’s asset portfolio.In this paper we develop a scenario based stochastic optimization model for asset and liability management of participating insurance policies with minimum guarantees.The model allows the analysis of the tradeoffs facing an insurancefirm in structuring its policies as well as the choices in covering their cost.The model is applied to the analysis of policies offered by insurancefirms in Italy and the UK.While the optimized model results are in general agreement with current industry practices,inefficiencies are still identified and potential improvements are suggested.The modeling tools developed for the management of insurance policies are also used to develop a web-based system for individual investors.Investor’s goals and risk profiles are addressed in an integrated fashion.The requirements for real-time modeling by the average investor must be reflected in the model,and this issue will be discussed as well.The practical experience with this model will be discussed.References:A.Consiglio and F.Cocco and S.A.Zenios,“Personal Asset Allocation”,Interfaces,Vol.34(4),pp. 287–302,July–August2004.A.Consiglio,D.Saunders and S.A.Zenios,“Insurance League:Italy ”,Journal of Risk Finance, pp.1–8,Summer2003.A.Consiglio and F.Cocco and S.A.Zenios,“The PROMETEIA model for managing endowments with guarantees”,Handbook on Asset and Liability Management,S.A.Zenios and W.T.Ziemba(eds.), Elsevier ScienceB.V.(forthcoming).A.Consiglio,F.Cocco and S.A.Zenios,“The value of integrative risk management for insurance products with guarantees”,Journal of Risk Finance,pp.1–11,Spring2001.S.A.Zenios et.al.,“Dynamic models forfixed-income portfolio management under uncertainty”, Journal.of Economic Dynamics and Control,22:1517–1541,1998.。

TABLE OF CONTENTS

TABLE OF CONTENTS

Design of High Efficiency Step-Down Switched CapacitorDC/DC ConverterbyMengzhe MaA THESISsubmitted toOregon State Universityin partial fulfillment ofthe requirements for thedegree ofMaster of SciencePresented May 21, 2003Commencement June 2003ACKNOWLEDGEMENTThis thesis could not be developed without the contribution from a lot of people in the last two years. First, I would like to thank my advisors, Dr. Gábor C. Temes and Dr. Un-Ku Moon, for the guidance and support. They gave me a chance to start my education here, and provided a very good environment for my research and study. I would also like to acknowledge the other members of my committee, for taking the time to serve on my defense.I would like to thank Bill McIntyre for guiding me throughout the whole design, and thank all the other people in Grass Valley Group, National Semiconductor, for their helping.All my classmates and colleagues in the Analog Group are always not hesitated to offer their hands to me when I need their help. First, I would like to thank Arun Rao. He offered great help to me from the beginning of my research in school to my chip design in Grass Valley. I would also like to thank José Silva for helping with tools, Pavan, Jipeng, Xuesheng and Mingliang for helpful discussion.Last, I would like to thank my family, my parents, my sister and my brother-in-law. Their love, support and understanding are always an encouragement to me. Another significant person whom I owe thanks is Miaomiao, who brings me happiness and hope.TABLE OF CONTENTSPage 1.INTRODUCION (1)1.1Background (1)1.2Motivation (2)1.3Organization of Thesis (3)2.BASIC CONPECTS OF SWITCHED CAPACITOR ARRAY (4)2.1Structure of Switched Capacitor Array (4)2.2Gain Configurations (6)3.RELATED TECHNIQUES IN CONVERTERS (12)3.1 Pulse Frequency Modulation (12)3.2 Multiple Gains (13)3.3 Gain Hopping (16)4.DESIGN OF A CONVERTER WITH FIXED OUTPUT OPTIONS 1.5V, 1.8VAND 2.0V (17)4.1Design Motivation (17)4.2Design Specification (17)4.3Architecture of Converter (19)4.4Gain Mapping (21)4.5Design of Switched Capacitor Array (25)4.6Circuit Simulation (38)5.INVESTIGATION FOR DESIGN OF A CONVERTER WITH OUTPUT1.2V (48)5.1.Motivation (48)5.2.Converter Architecture and Gain Mapping (49)5.3.Gain Configurations (51)5.4.Simulation Results (56)6.CONCLUSION (60)BIBLIOGRAPHY (61)DESIGN OF HIGH EFFICIENCY STEP-DOWN SWITCHEDCAPACITOR DC/DC CONVERTER1. INTRODUCTION1.1. BackgroundA DC/DC converter is a device that accepts a DC input voltage and produces a DC output voltage. Typically, the output produced is at a different voltage level than input.Portable electronic devices, such as cell phones, PDAs, pagers and laptops, are usually powered by batteries. After the battery has been used for a period of time, the battery voltage drops depending on the types of batteries and devices. This voltage variation may cause some problems in the operation of the electronic device powered by the batteries. So, DC/DC converters are often used to provide a stable and constant power supply voltage for these portable electronic devices.According the components used for storing and transferring energy, there are two main kinds of topologies in DC/DC converters: inductive converters and switched capacitor converters. The inductive converter using inductor as energy storing and transferring component has been a power supply solution in all kinds of applicationsfor many years. It is still a good way to deliver a high load current over 500mA. But in recent years, since the size of portable electronic device is getting smaller and smaller, and the load current and supply voltage are getting lower and lower, the inductorless converters based on switched capacitor are more and more popular in the space-constrained applications with 10mA to 500mA load current. Such converters avoid the use of bulky and noisy magnetic components, inductors. They are available in small packages, operate with very low quiescent current and require minimal external components. They have been the main power supply solution for handheld portable instrumentations.1.2. MotivationFor current handheld instrumentations, such as cell phones and PDAs, the power supply voltage is about 1.8V or lower in the conceivable future, however, their battery voltage variation is from 4.2V to 2.8V for usable range and about 5.0V during being charged. Consequently, step-down DC/DC converters, accepting a high input and providing a low output, are needed.In this thesis, two high efficiency step-down switched capacitor DC/DC converters are designed, and the architecture of converters will be described and the design issues will be discussed.1.3. Organization of the ThesisThe thesis is organized as follows. The basic concepts of switched capacitor array and gain configuration are explained in Chapter 2. The related techniques in switched capacitor DC/DC converters are described in Chapter 3. A switched capacitor DC/DC converter with fixed output options 1.5V, 1.8V and 2.0V is designed and the design issues are discussed in Chapter 4. Another design of switched capacitor DC/DC converter with output 1.2V is investigated in Chapter 5. Conclusions are given in Chapter 6.2. BASIC CONCEPTS OF SWITCHED CAPACITOR ARRAYThe core circuit of switched capacitor DC/DC converters is the switched capacitor array, which is composed of switches and a few capacitors, traditionally called “flying capacitors”, used for storing and transferring energy. By turning on and turning off switches to change the connection of flying capacitors, these capacitors can be charged or discharged and the charges can be delivered to or removed from the output. This topology is called charge pump and the switched capacitor converter is also called charge pump converter. In this chapter, an example of switched capacitor array is given to introduce some basic concepts and explain how the charge pump converter works.2.1. Structure of Switched Capacitor ArrayFigure 2.1 shows a switched capacitor array [1], which is used in converter LM3352, a multiple-gain DC/DC converter designed by National Semiconductor Corporation.For LM3352, there are three flying capacitors, C1, C2 and C3, which are used to deliver charges from the input to the output. Because of their large values, such as 1µF, these capacitors are external to the integrated circuit.Figure 2.1. Switched capacitor array of LM3352S1 through S19 are switches, which are implemented in the integrated circuit using N type or P type MOS transistors. Their gate controlling signals, usually using clock signals, control the connections of the flying capacitors by turning on or turningoff the switches.When the switch is closed, the resistance of switch is called switch-on resistance, which can be described as the equation: Veff LW Cox Ron µ1= [2]. In order to minimize the energy dissipated in the switch-on resistance, the transistors used as switches are designed to have a very large ratio ofLW , where W is the gate width and L is the effective gate length.2.2. Gain Configurations By the operation of switches, the switched capacitor array of LM3352 is capable of providing one common phase and seven gain phases, with the gain being the ratio of the output voltage V out to the input voltage V in . The equivalent circuits of these phases are shown in Figure 2.2 [1].In these configurations, there are three gain configurations referred as boost stages whose gains are greater than 1, three gain configurations referred as buck stages whose gains are less than 1 and one gain configuration referred as unit gain with gain equal to 1. According to the input and the output, the DC/DC converters are divided to two types: step-up or boost converters (V out >V in ) and step-down or buck converters (V out <V in ).Figure 2.2. Common phase and gain phase configurations of LM3352When the converter is clocked and the gain setting is chosen, the switched capacitor array is switched between the common phase and one of seven gain phases to deliver charges from the input to the output to keep a constant output voltage. The gain configuration of 1/2 is used as an example to explain the implementation of gains through the switched capacitor array. The equivalent circuit of gain configuration of 1/2 is shown in Figure 2.3 below. The flying capacitor Cf is used to store and transfer energy, and capacitor Ch is the hold capacitor for the output.Figure 2.3. Equivalent circuit of the gain configuration with gain of 1/2At time nT, the charge pump stays at the end of the gain phase, and the charges in the capacitors Ch and Cf are)(*)(nT Vout Ch nT Qch = (3.1) )(*)(nT Vout Cf nT Qcf = (3.2) At time nT+T/2, the charge pump stays at the end of the common phase, the charges in the capacitors Ch and Cf are)2/(*)2/(T nT Vout Ch T nT Qch +=+ (3.3) )]2/([*)2/(T nT Vout Vin Cf T nT Qcf +−=+ (3.4) According to the theory of charge conversation, we have)()()2/()2/(nT Qcf nT Qch T nT Qcf T nT Qch −=+−+ (3.5) Solving Equation (3.1) (3.2) (3.3) (3.4) and (3.5) results in )()2/(nT CfCh Cf Ch Vin Cf Ch Cf T nT Vout +−++=+ (3.6) )()(**)2/(nT Vout Cf Ch Cf Ch Ch Vin CfCh Cf Ch T nT Qch +−++=+ (3.7) )()(**)2/(nT Vout Cf Ch Cf Ch Cf Vin Cf Ch Cf Ch T nT Qcf +−−+=+ (3.8) At time nT+T, the charge pump is switched back to the gain phase. According to the theory of charge conservation, the total charges in the capacitors Ch and Cf are)2/()2/()(T nT Qcf T nT Qch T nT Qtotal +++=+ (3.9) So the output voltage at time nT+T is)()()()(2)(222nT Vout Cf Ch Cf Ch Cf Ch ChCf Cf Ch Qtotal T nT Vout +−++=+=+ (3.10) Assuming 2)(2Cf Ch ChCf a += and 22)()(Cf Ch Cf Ch b +−=, Equation (3.10) can be rewritten as )(**)(nT Vout b Vin a T nT Vout +=+ (3.11)According to Equation (3.11), we can have)(**)2(T nT Vout b Vin a T nT Vout ++=+)](**[**nT Vout b Vin a b Vin a ++=2*)()1(*b nT Vout b aVin ++= (3.12))2(**)3(T nT Vout b Vin a T nT Vout ++=+]*)()1(*[**2b nT Vout b aVin b Vin a +++=32*)()1(*b nT Vout b b aVin +++= (3.13)From Equation (3.12) and (3.13), we can havek k b nT Vout b b b aVin kT nT Vout *)()...1(*)(12+++++=+−k kb nT Vout bb aVin *)(11*+−−= (3.14)where k = 0, 1, 2, 3 …Since 1)()(22<+−=Cf Ch Cf Ch b , we can have 222)()(11*)(2*1)(lim Cf Ch Cf Ch Cf Ch ChCf Vin b aVin kT nT Vout k +−−+=−=++∞→ (3.15)2Vin=3. RELATED TECHNIQUES IN CONVERTERSIn order to provide a desired constant power supply voltage and improve the conversion efficiency, there are three important techniques to be used in the designed switched capacitor DC/DC converters: pulse frequency modulation (PFM), multiple gains and gain hopping, which will be explained in this chapter.3.1. Pulse Frequency ModulationPulse frequency modulation (PFM) or pulse skipping is one of typical methods to be used to regulate voltages in DC/DC converters. The basic idea is illustrated in Figure 3.1.When the output voltage V out is less than the desired voltage V desired, the skip signal is low, and the switched capacitor array is clocked to deliver charges constantly to the output. Accordingly, the output voltage V out is raised. On the other hand, when V out is greater than V desired, the skip signal is high, the gate clock of switches is disabled and the charge pump stays in the common phase. Accordingly, there are no more charges to be delivered to the output. Then, V out is reduced by the load current. Depending on the charge pump’s running or stopping, the converter stays in one of two modes: the pump mode or the skip mode.Figure 3.1. Waveform of PFM and gain hopping3.2. Multiple GainsAs battery use continues, the battery voltage drops. For example, when a lithium ion (LiIon) battery, a typical battery for cell phones and PDAs, is discharged by a 100mA constant load current, the battery voltage drops from about 4.2V to 2.8V gradually [4]. During the beginning of a battery’s life, the battery voltage may be higher than the desired voltage, so a step-down converter is used to provide the powersupply voltage. During the end of the battery’s life, the battery voltage may be less than the desired voltage, so a step-up converter must be used. For some applications in which the desired power supply voltage is between the battery’s highest voltage and lowest voltage during the battery life, a multiple-gain converter is need. It can change its gain configurations from the buck stage to the boost stage to provide the power supply voltage. Compared to the single-gain converter, the multiple-gain converter extends the usable battery life.Another reason why we prefer the multiple-gain topology to the single-gain buck or boost topology is to improve conversion efficiency. For the same input and output voltage, the average conversion efficiency of multiple-gain converter is higher than that of single-gain converter. The conversion efficiency of single-gain topology may suffer at certain input voltages. Efficiency can be approximated as follows [1]:VinGsc Vout Eff *= (3.16) G sc denotes to the gain of switched capacitor array used in a DC/DC converter. V desired and V in denote the desired output voltage and input voltage, respectively.For example, if the desired output voltage is 2V and the gain of switched capacitor array G sc is 2/3, the efficiency is maximized when V in is 3.0V. However, if V in is greater than 3.0V, then the output voltage provided from the gain of 2/3 isgreater than what is required, thereby reducing efficiency. In order to increase efficiency, other gains that are lower than 2/3 are needed in the converter.Figure 3.2 Efficiency of single-gain converter and multiple-gain converterFigure 3.2 shows all efficiency comparison of a single-gain converter and a multiple-gain converter. The input voltage is from 3.0V to 5.4V and the desired output voltage is 2.0V. For the single-gain converter with a gain of 2/3, the average efficiency is about 78%. For the multiple-gain converter, the gain is set to 2/3 when the input voltage is less than 4.0V, and to 1/2 when the input voltage is larger than 4.0V. Theaverage efficiency of the multiple-gain converter is about 88%, which is 10% higher than that of the single-gain converter.3.3. Gain HoppingFor the multiple-gain DC/DC converter, the minimum gain G min chosen in the charge pump must satisfy the requirement G min*V in>V desired. Otherwise, the converter can not provide a high enough output voltage. For some input voltages, if the load current is so large that the switched capacitor circuit with minimum gain G min still can not deliver enough charges to the output to support a desired output voltage, another higher gain can be used. Under this condition, as discussed before, this higher gain, greater than the gain required (minimum gain), reduces efficiency.To improve the efficiency, for some input voltages and load current, the charge pump is controlled to hop between the minimum gain and a higher gain, so that the charge pump can deliver enough charges to support a large load current at a desired output voltage without reducing the efficiency too much. As shown in Figure 3.1, during the pump mode, the charge pump runs at a lower gain for a few clock cycles, and runs at a higher gain for another few clock cycles. Consequently, the converter keeps hopping between different gains to make the average gain as low as possible to maximize the efficiency.4. DESIGN OF A CONVERTER WITH FIXEDOUTPUT OPTIONS 1.5V, 1.8V AND 2.0VIn this chapter, a high efficiency switched capacitor step-down DC/DC converter will be presented; the simulation results will be given, and some important design issues will be discussed.4.1. Design MotivationCurrently, for handheld portable devices, such as cell phones, pagers and PDAs, the battery voltage usually drops from 4.2V to 2.8V as battery use continues, and it varies to about 5.0V when the battery is charged. However, the power supply voltage for these electronic devices is around 1.8V, so a step-down DC/DC converter with high performance is needed.4.2. Design SpecificationThe switched capacitor step-down DC/DC converter to be designed must efficiently produce a 200mA regulated low-voltage rail from 2.7V to 5.5V inputs. Fixed output voltage options of 1.5V, 1.8V, and 2.0V must be available. Multiplefractional gain configurations are used to maximize conversion efficiency over the entire input voltage and output current ranges.Two 1µF flying capacitors and two 10µF bypass capacitors are all the external components required, and no inductors are needed. It also features short-circuit protection, over-temperature protection and soft-start circuit.The design specifications are listed below:• 2.7V to 5.5V input range•Output voltage options: 1.5V, 1.8V, 2.0V•200mA output current capability•Multi-gain and gain hopping for highest possible efficiency•Two 1µF flying capacitors and two 10µF bypass capacitors are all the external components required, and no inductors•Shutdown supply current 0.1uA•Soft start•Thermal and short circuit protection•Available in an 8-Pin MSOP packageIn our design, a converter with output voltage 1.8V is designed first, and then it is changed for output options 1.5V and 2.0V.4.3. Architecture of ConverterThe architecture of designed converter is shown in Figure 4.1. There are two 1µF flying capacitors C1 and C2, which are external to the chip. On the chip, there are two control loops: pulse frequency modulation (PFM) loop and gain hopping loop.Figure 4.1 Architecture of converterThe PFM loop is composed of a reference generator, a comparator with an output signal skip, an oscillator and the Switch Control block. The reference generatorgenerates a desired output voltage V desired. The comparator with the output signal skip compares the output voltage V out with the desired output voltage V desired. If V out is less than V desired, skip is low and it enables the oscillator to send out the clock signal driving the charge pump to deliver charges to the output. If V out is greater than V desired, skip is high and it disables the oscillator, so the charge pump stops to deliver charges to the output. Then, the output voltage V out is reduced by the load current until V out is less than V desired again. With the operation of PFM loop, the output voltage oscillates around the desired voltage, i.e. V out is regulated to V desired.The gain hopping loop is composed of a reference generator, a comparator with an output signal hop and the Gain Control block. The reference generator generates a hopping voltage V hop, and the comparator with the output signal hop compares V out with V hop. If V out is greater than V hop; hop is low and the charge pump is set to run at the minimum gain that is required. If the V out is less than V hop; hop is high and the charge pump is set to run at a higher gain. The function of gain hopping loop is deciding whether the required minimum gain or a higher gain is to be used.In addition to the signal hop, the gain to be used in the converter is also related to the ratio of the output voltage to input voltage. A resistor string connected to the input and two comparators are used to for the Gain Control block to choose which gains can be used for different input voltages and output voltages.The Switch Control block sets the gate clock signals of the switches in the Switch Array block. The Switch Array block with the two external flying capacitors together can provide three gain configurations with gain of 1/2, 2/3 and 1.The typical circuit application of the converter is shown in Figure 4.2.Figure 4.2. Typical application circuit4.4. Gain MappingAs mentioned before, the minimum gain used in the converter must satisfy the requirement V desired <G min *V in . This requirement divides the entire range of V out and V in into several different gain regions, each having its own minimum gain G min . For the designed converter with three gains, 1/2, 2/3 and 1, the gain regions are shown in Figure 4.3. There are totally three gain regions, which are divided by two lines Vin Vout *21= and Vin Vout *32=.Figure 4.3. Gain regionsFor each gain region, as shown in Table 4.1, there are two gains that can be used, one is the minimum gain G min and the other one is a higher gain denoted by G max . For the gain region 1, theoretically, the maximum gain can be 1, but it is limited to 2/3 in our design because of the efficiency issue. If the gain of 1 is used in the region 1, the efficiency will be very low. As discussed before, the efficiency can be approximated as VinGsc Vdesired Eff *=. For example, if the input voltage is 4V and the desired output voltage is 1.8V, the efficiency will be 67.5% for the gain of 2/3 and 45% for the gain of 1. So, the efficiency of the gain of 1 is 22.5% less than that of the gain of 2/3. In order to improve the efficiency, the gain configuration of 2/3 is designed to support the highest load current for the desired output voltage in the gain region 1 so that the gain of 1 doesn’t have to be used.RegionsG min G max 11/2 2/3 22/3 1 3 11Table 4.1. Gain options for gain regionsFor each gain region, as mentioned before, the hop signal is used to decide which gain (G min or G max) to use. The hopping voltage V hop is set to 1.48V, 1.78V and 1.98V for output options 1.5V, 1.8V and 2.0V, respectively. The gain control logic is shown in Table 4.2.V out>V desired V hop<V out<V desired V out<V hop Skip high low lowHop Low low highGain G min G min G maxTable 4.2. Gain control logicIn order to protect the circuits from being destroyed by the large current during the time of start-up, the converter gradually raises the output voltage from zero to the desired output voltage rather than raise the output voltage as fast as possible. This is referred to as soft-start. In our design, it takes about 600 microseconds for the converter to raise the output voltage from zero to the desired output voltage.4.5. Design of the Switched Capacitor ArrayThe switched capacitor array is one of the most important circuits in the converter. It dominates the performance, such as efficiency, ripple, load current capability and chip area.4.5.1. Structure of the Switched Capacitor ArrayFigure 4.4. Switched capacitor arrayFigure 4.4 shows the switched capacitor array of the designed converter. It is composed of ten switches S1 through S10, and two 1µF external flying capacitors C1 and C2.Figure 4.5 Implementation of the switched capacitor arrayGenerally, the switches which operate near ground level are implemented in the integrated circuit using NMOS transistors, and the switches which operate at more positive voltages are implemented with PMOS transistors. In some conditions, if the switch voltage falls within a very wide range, the switches are implemented by the use of N type and P type transistors connected in parallel and driven by complementary drive signals.The embodiment of the designed switched capacitor array is shown in Figure 4.5. The switches S5, S6 and S10 use NMOS transistors and the other ones use PMOS transistors.4.5.2. Gain ConfigurationsFigure 4.6. Configurations of the common and gain phasesFor the output voltage options 1.5V, 1.8V and 2.0V, the switched capacitor array can provide three gains 1/2, 2/3 and 1. The configurations of the common phase and the gain phases are shown in Figure 4.6.Gain Phase Switch Common Phase G=1/2 G=2/3 G=1 S1 1 0 0 0 S2 0 1 1 1 S3 0 0 0 1 S4 1 0 0 0 S5 0 1 0 0 S6 0 0 1 0 S7 1 0 0 1 S8 0 1 0 0 S9 1 0 0 0 S101 1Table 4.3. Switch states of different phasesThe switch states in each configuration are shown in Table 4.3, which describes the connection of two capacitors through switches. In this table, “1” means that the switch turns on, i.e. it is closed, and “0” means that the switch turns off, i.e. it is open.As mentioned before, when the charge pump is clocked, the switched capacitor array is switched between the common phase and one of the gain phases to deliver charges to the output. The implementation of different gains is explained as follows.For the gain phase of gain of 1/2 shown in Figure 4.6, the external capacitors C1 and C2 are charged to V out as described in the equation belowVout Vc Vc ==21 (4.1)In the common phase, C1 and C2 are connected in series between V in and V out . The voltages of C1 and C2 are now given byVout Vin Vc Vc −==21 (4.2)In steady state, both relations will hold. Combining Equation (4.1) with (4.2) results in:21==Gsc Vin Vout (4.3) For the gain phase of gain of 2/3 shown in Figure 4.6, the capacitors C1 and C2 are connected in series between the output and the ground. By inspection, the voltages of C1 and C2 areVout Vc Vc *2121== (4.4) Combining Equation (4.4) with (4.2) results in:32==Gsc Vin Vout (4.5) As shown in Figure 4.6, the gain of 1 is achieved by reversing the polarity of one of the capacitors. The capacitor C1 is charged and discharged between V in and V out , and the capacitor C2 is disconnected from the output in the gain phase so that the noise feeding back to the input is reduced. In the gain phase, by inspection, the voltage of C1 isVin Vout Vc −=1 (4.6)Combining Equation (4.6) and (4.2) results in1==Gsc VinVout(4.7) The reason why only one of the two capacitors is used to implement the configuration with unit gain is that our circuit simulations show that one capacitor has enough capability to support the load current of the design specification. This saves a switch, which means saving a large chip area since the switches in the charge pump are very big.4.5.3. Voltage Management IssueFigure 4.7 Configuration with gain of 1/2For the application of our converter, there are a wide range of input and output voltages. When the switched capacitor array is switched between the common phase and gain phases, the voltages produced at some nodes in the switched capacitor circuit may fall outside a desired range and cause a large substrate current. To illustrate this problem, the configuration with gain of 1/2 is redrawn in Figure 4.7, in which the resistors represent the switch on-resistances.By inspection of Figure 4.7, if V in=5.5V and V out=1.8V, the capacitors C1 and C2 are full charged to 3.7V in the common phase. When the switched capacitors array is switched from the common phase to the gain phase, it is possible that the voltage V1 will momentarily be at –1.9V before the discharge takes place. Since the switches S5 and S10 are NMOS transistors and 1.9V is more than a forward biased PN junction voltage drop of 0.7V, a large substrate current will be caused.To solve this problem, the circuit of the switched capacitor array must be designed to satisfy the following two voltage management rules.(1) No voltage in the switched capacitor array may exceed the greater of V in by more than a forward biased PN junction voltage drop.(2) No voltage in the switched capacitor array may fall below the ground by more than a forward biased PN junction voltage drop.Usually, the forward biased PN junction voltage drop is assumed to be 0.7V. However, considering that the forward biasing voltage varies with temperature and process, 0.25V is set as the target value for the junction drop in our design.To meet the voltage management rules given above, two techniques are used in our design. These are described below.。

Table of Contents TABLE OF CONTENTS........................................................

Table of Contents TABLE OF CONTENTS........................................................

Web Services Technology Design, Implementation and EvaluationTing LiWeb Services Technology Design, Implementation and EvaluationMaster of Science ThesisTing LiJune 2002Supervisor: Dr. Erik Rongen (IBM)Arjan de Mes (IBM)Prof. Peter Sloot (UvA)Architecture Technology & Innovation,IBM The NetherlandsSection Computational Science,Universiteit van Amsterdam, The NetherlandsTable of ContentsTABLE OF CONTENTS (I)TABLE OF FIGURES (IV)ABSTRACT (V)ACKNOWLEDGEMENTS (VI)CHAPTER 1 INTRODUCTION (1)1.1 Motivation (1)Statement (3)1.2 Problem1.3 Objectives (4)1.4 Organization (5)CHAPTER 2 WEB SERVICES AND RELATED WORKS (6)2.1 What Are Web Services? (6)2.2 Web Services Model (7)2.2.1 Communication Evolution (7)2.2.2 Web Services Component Roles and Operations (8)2.3 Web Services Standards (10)2.3.1 HTTP and XML - eXtensible Markup Language (10)2.3.2 SOAP -- Simple Object Access Protocol (10)2.3.3 UDDI – Universal Discovery Description and Integration (11)2.3.4 WSDL – Web Services Description Language (13)2.3.5 Conceptual Architecture Stack (15)2.4 Web Services Technical Added Values (16)2.4.1 Web Services Advantage (16)2.4.2 Business-to-Business Scenarios (17)2.4.3 Distributed Computing Scenario (17)2.5 Background and Related Work (18)2.5.1 Peer-to-Peer Computing (18)2.5.2 Object-Middleware (19)2.5.3 JINI Technology (21)2.5.4 Grid Computing (21)CHAPTER 3 WEB SERVICES APPLICATION DEVELOPMENT AND PROTOTYPE.223.1 Introduction to Prototype (22)3.1.1 Motivation of A Scenario (22)3.1.2 The Prototype: Travis Theme Trips (23)3.1.3 A User Scenario (24)Activities (25)3.2 Design3.2.1 Conceptual Design (25)3.2.2 Architecture Design (26)3.2.3 Tool Assessment (30)3.2.4 Software and Hardware Development Setup (31)3.3 Implementation (32)3.3.1 System Implementation Overview (32)3.3.2 Development (32)3.3.3 Static Binding vs. Dynamic Binding (34)3.3.4 Process Step-by-Step (36)3.4 Discussion (38)3.4.1 Encoding Styles and Mapping (38)3.4.2 About UDDI Registry (39)3.4.3 Limitations (40)CHAPTER 4 SECURITY (41)4.1 Motivation (41)4.1.1 Seven Aspects of Security (42)4.1.2 Web Services Complexity (42)Requirements (43)4.2 Functional4.2.1 Between Provider and Requester (43)4.2.2 UDDI Interaction (43)4.2.3 Administrative Secure Groups (43)4.3 Related Efforts and Implementation (45)4.4 Web Services Security Model (46)4.4.1 Web Services Security Token Model (46)4.4.2 Static Binding (47)4.4.3 Dynamic Binding (51)Analysis (53)4.5 Gap4.6 Summary and Comments (54)CHAPTER 5 PERFORMANCE TESTING (55)5.1 Motivation (55)5.2 Method (55)5.3 Pre-Analysis of Performance Components (56)5.3.1 Client performance (57)5.3.2 Network performance (57)5.3.3 Server performance (58)5.3.4 Communication overhead (58)5.3.5 Software and Hardware Testbed (58)5.3.6 Performance Test Tool (59)5.4 Testing Result and Discussion (60)5.4.1 “Equilibrium” Test (60)5.4.2 Static Binding Test (61)5.4.3 Dynamic Binding Test (64)5.5 Discussion (68)5.5.1 XML-based Scheme vs. Binary-based (68)5.5.2 Performance Tuning (69)5.5.3 Highlight Issues (69)5.5.4 Improvement (70)CHAPTER 6 WEB SERVICES AND GRID COMPUTING (72)6.1. Grid Computing Overview (72)Services (73)6.2. Grid6.3. What Can Web Services Bring to Grid Computing? (74)6.4. Contribution and Limitation to Scientific Computing (76)Research (77)6.5. FutureCHAPTER 7 CONCLUSIONS AND FUTURE DIRECTIONS (78)7.1 Summary (78)7.2 Conclusions (79)Directions (80)7.3 Future7.3.1 Accounting (80)7.3.2 Composed Web Services (80)7.3.3 Other Security Aspects (81)7.3.4 Performance Enhancement (81)7.3.5 Computing as a Utility (81)APPENDIX A ABBREVIATIONS USED IN THE THESIS (82)REFERENCE (83)Table of FiguresFigure 1: Communication Evolution (7)Figure 2: Web Services Model (8)Figure 3: The UDDI Registry Structure (12)Figure 4: WSDL Documents Types (13)Figure 5: An Overview of the mapping from WSDL to UDDI (14)Figure 6: Conceptual Architecture Stack (15)Figure 7: Theme Selection Panel (23)Figure 8: Travis Prototype Design Flow Diagram (24)Figure 9: Travis Prototype Design Flow Diagram (26)Figure 10: Travis Prototype Architecture Overview (28)Figure 11: Model-View-Controller Design Pattern (29)Figure 12: Web Services Development and Runtime Information Flow (33)Figure 13: Flight Reservation Panel (35)Figure 14: Stage 1 – Statically Bound Web Services Invocation (36)Figure 15: Stage 2 – Dynamic Lookup of Web Services in The UDDI Registry (37)Figure 16: Mapping for a Web Service (38)Figure 17: Web Services Security Token Services Model (47)Figure 18: Web Services Security and Existing Transport Security Mechanism (48)Figure 19: Authentication by Trust Party (48)Figure 20: Firewall Processing SOAP Message (49)Figure 21: Business Policy Enforcement (50)Figure 22: UDDI Operator Node Trust and Policy (51)Figure 23: Dynamic Web Services Security Token Services Model (52)Figure 24: Performance Test Component on Dynamic Web Services (57)Figure 25: Scalability for Static Binding (61)Figure 26: Static Binding Performance Breakdown (62)Figure 27: Partial Breakdown for Static Binding (SOAP, Network, XML, others) (63)Figure 28: Scalability for Dynamic Binding (64)Figure 29: Comparison Static Binding vs. Dynamic Binding (65)Figure 30: Dynamic Binding Performance Breakdown (66)Figure 31: Partial Breakdown for Dynamic Binding (SOAP, UDDI, Network, XML, Others) (67)AbstractWeb Services are an XML based set of standards and technologies to integrate software application systems using Internet technology. Key element is the capability to publish, find and bind Web Services through public or private registries. Web Services are the latest development in distributed computing on the Internet and are a new, pervasive kind of middleware designed to integrate software systems of a very wide variety. The work presented in this paper describes Web Services standards, technologies and related works. It proposes an approach to dynamic integration for applications built using Web Services technology. It realizes this approach with a design, implementation and evaluation of a demonstrated prototype, which integrates multiple, geographically distributed services using both static binding and dynamic binding. The thesis addresses some aspects of security issues and proposes a security token model. It demonstrates some performance issues by measuring scalability, finding bottleneck of Web Services communication, and minimizing the impact on application execution based on the prototype. It discusses Web Services contribution to Grid computing and scientific computing.AcknowledgementsThis thesis describes the result of a Master of Science assignment at IBM. This assignment has been carried out from September 2001 to May 2002 at Architecture Technology & Innovation group in IBM, location in Uithoorn, the Netherlands, by completing the master degree in Computer Science in the Section of Computational Science (SCS) group in Universiteit van Amsterdam (UvA).Parts of the work presented in this thesis (e.g. prototype) have been demonstrated in both IBM internal [68] and external [66] presentations. Parts have been described in a seminar paper [67] and in IBM’s White Paper [4].I am grateful to people who have contributed towards shaping this thesis.At the outset, I would like to express my appreciation to dr. Erik Rongen (IBM) for his advice during my master research endeavor for the past eight months. As my supervisor, he has constantly enforced me to be in focus towards achieving the goal. His observation and comments helped me to establish the overall direction of the research and move forward with investigation in depth. He has been the greatest helping hand and a source of knowledge with real world programming skills specifically in Java!I would like to thank my supervisors drs. Arjan de Mes (IBM) who helped me to start my master research in IBM with a smile. He generously shared his time and knowledge in my work. He plays a major role in making me understand the concept and coaching me on thesis writing.I greatly appreciate my supervisor Prof. Peter Sloot (UvA) for his critical comments and suggestion during the initial phases of thesis work, and for his generous time in proof reading.I would like to thank my colleagues at IBM for the pleasant working environment, for helping me solve various problems and for sharing their knowledge that influenced the work and resulted in a satisfactory result.I acknowledge people at the university and many friends that have made this two-year stay in Amsterdam so gezellig.Last, but not least, I would like to dedicate this thesis to my family in China, for their love, patience, and understanding.Ting LiAmsterdam, June 2002.Chapter 1 IntroductionThis chapter presents the motivation, the objectives, and the structure of this thesis. It identifies the relevance of Web Services and draws attention to the support of Web Services in system integration context.This chapter is further structured as follows: Section 1.1 gives motivation for this research; Section 1.2 examines the research problems; Section 1.3 states the objectives of this thesis and Section 1.4 outlines the structure of this thesis by presenting an overview of the chapters.1.1 MotivationDistributed computing systems have been in widespread use for many years in research, engineering, industrial and commercial environments. The challenge of distributed computing is to take computing resources that are scattered all over the place to integrate, manage and take advantage of them as if they were one huge, virtual computer.In the traditional distributed computing environment, moving data between different applications and systems often involves defining a rigid format that is agreed under the discussion; depending on private networks that connect multiple parties; requiring to fit the new software design to the old development framework; hardly building inter-organizational collaboration; and resulting in duplicate work in different places. This tight coupling requires much agreement and shared context among different applications from different organizations in order to be communicable and reliable. Furthermore, the use of distributed computing systems requires high availability, adaptability, and maintainability, and, in order to remain useful, they have to cope with advances in technology, modifications of their operating environment and ever-changing human needs [25].Current distributed computing technologies do not address the concerns and requirements just listed. For example, current Internet technologies address communication and information exchange among computers but do not provide integrated approaches. Enterprise distributed computer technologies such as CORBA and DCOM enable resource sharing, but most of case implementing only within a single organization [1]. The Open Group’s Distributed Computing Environment (DCE) supports secure resource sharing across sites, but people can easily find it inflexible. Emerging “Distributed Computing” companies seek to harness idle computers on an international scale, but support only highly centralized access to those resource [15, 23, 45, 47]. This comparison will be further discussed in Chapter 2 related work section. In summary, current technology either does not accommodate the range of resource types or does not provide the flexibility and control on sharing relationships needed to establish interoperability [30].Some issues are more important than others are highlighted in the following:• Increasing focus on interconnection.• Complexity of current platforms, capability, implementation and QoS.• Such problems have been for some time a central concern of the developers of distributed systems for science, engineering and business activities.In order to solve the problem, an appropriate solution must be proposed: create an adaptive, dynamic architecture model, which will enable interoperable collaboration, despite geographic and organizational boundaries; provide uniform access to computational resources, services and/or applications such as analytical tools, functional services and raw data; facilitate the within and across organizational application/system integration; expand the services available to all requesters.It is here that Web Services technologies enter the picture. Web Services have emerged as an important new field, distinguished from conventional distributed computing by its focus on a loosely-coupled, self-describing, modular applications that can be published, located and invoked based on a set of Web-enabled standards. Over the last two years, research and development efforts within the Web Services community have produced protocols, services and tools that address precisely the challenges that arise when seeking to build interoperable integration [14, 25]. And considerable progress has been made on the construction of such an infrastructure (e.g., [7, 59, 60, 61, 57]).Because of their focus on dynamic, cross-organizational integration, Web Services technology complement rather than compete with existing distributed computing technologies. The overall aim of the Web Services is to enable interoperability, enhance integrated problem solving in adaptive, dynamic and multi-institutional organizations. It focuses on allowing services, which can be composed of resources, systems, programs, applications, raw data, etc., to be published, found, and invoked by other applications at run-time, as well as design-time, language and operating systems independent [25]. During the process, all services can be encapsulated and provided to one another without knowing the underlying implementation. This facilitates the development of distributed applications by providing distribution transparencies to application developers, and shielding the developer from the heterogeneity of operating systems and communication systems. More detail will be examined in Chapter 1.1.2 Problem StatementThe interoperable collaboration and integration aspects of Web Services listed in Section 1.1 provide the main feature of this new distributed computing model. There are many challenges that have to be met, many of which are related to the open, hostile environment in which they must survive. Key among these challenges, both in scientific and business domain, is the design and development of these services that addresses architecture, discovery, reliability, security, scalability, performance, manageability, and accountability for interactive consistent access. Here are some of the issues that will be examined in the rest of the thesis:• Architecture. Existing integration approaches lack of flexibility because they follow a tight coupling approach. What is the appropriate architecture of Web Services technology? Regarding the discovery issues, how does a Web Service advertise itself for discovery by other services? How does Web Services technology compare to other distributed programming approaches? What are the typical usage scenarios for Web Services?These questions will be answered based on the literature study and related work.• Maturity. How mature is Web Services technology? How to design, develop and implement Web Services in a defined scenario context? How do these Web Services related standards work and communicate? A prototype will be designed and developed in order to discover the feasibility.• Security. What are the different Web Services security aspects? Can current security standards and implementations be used in Web Services model? How does a Web Service authenticate the using party and the other way around? How to keep the services integrity? Some preliminary discussions are addressing these questions.• Performance. When a system is comprised of many Web Services whose location and qualities are potentially dynamic, testing and debugging takes on a whole new dimension.How to achieve predictable response times? Is there any obvious overhead in Web Services? Where is the bottleneck of the entire communication? How about the scalability with respect to multiple user scenarios?• Applicability. Grid computing addresses a lot of attention at this moment in the scientific world. Due to its critical interoperability requirements, grid architectures are moving toward standard protocols and a service-based architecture. How Web Services can contribute to Grid computing? Or in more general, how Web Services can be used in scientific computing? Any limitations?Questions listed above do not cover the entire picture of Web Services, issues as Quality of Services (QoS), administration, accounting/payment, resource management are also very critical, but are out of the scope of this thesis.It should be possible to create a society of Web Services where components collaborate with each other to achieve their own individual goals, with the properties of fault tolerant, massively parallel, distributed, well organized, self-repairing, designed in a layered fashion and designed out of simple components.1.3 ObjectivesThe Web Services problem stated in Section 1.2 may involve all levels (from hardware to the application) and all phases of software development (requirement to implementation).This thesis addresses the architecture of Web Services that run on top of the underlying protocols and infrastructure. More specifically, this thesis focuses on Internet based organizational services interoperability, collaboration and integration with open standards. Its main objectives are:(1) To propose an approach to dynamic integration for applications/systems built using WebServices technology;(2) To realize this approach with the design, implementation and evaluation of a prototypearchitecture, which integrate multiple, geographically distributed services using both static-binding and dynamic-binding;(3) Security and performance issues are addressed that may arise during deployment andminimize the impact on application execution. The requirements imposed on the development process should be minimized;(4) Relating Web Services to Grid computing and furthermore to scientific computing, todiscuss their applicable areas, contributions and limitations.These four objectives are used to answer the stated problems in sequence respectively.In this thesis, rather than focusing on the scientific and technical applications emphasized in [29], the discussion is mainly developed on business applications. This choice is made with believe that the same principles and mechanisms apply in both environments. Web Services should be applicable to a broad class of applications and should support a broad range of scientific research. The investigation of relation between scientific initiative Grid computing and business initiative Web Services has been defined and developed broadly [29]. The related issues will be addressed at the end of the thesis.The purpose of this thesis is to argue that the Web Services concept is indeed motivated by a real and specific problem and that there is an emerging, well-defined Web Services technology base that addresses significant aspects of this problem.This thesis does not focus on the design activities that are undertaken to obtain a running application or on its constituting parts. Neither does it intend to provide tools to support the description, testing and validation of prototype. It rather aims at the activities to be undertaken in order to apply a set of well-defined standards to a running application that proves the maturity of these standards, which enable the interoperability, collaboration and integration.1.4 OrganizationThe sequence of the chapters in this thesis reflects the order in which these issues have been dealt with throughout the research process. This thesis is structured as follows:Chapter 2 is the result of a literature study in the area of Web Services, and introduces some important terminology, definitions and concepts used to discuss about Web Services. Furthermore, it presents some of the current approaches to Web Services and compares these approaches. It also provides some background and discusses related work to Web Services, which discusses recent efforts in developing technologies that enable interoperability, together with the disadvantage and the future challenges.Chapter 3 presents architecture and implementation of the “Travis” prototype, which uses Web Services concept for integrating of multiple geographical distributed services using both static binding and dynamic binding. This prototype is used as a proof-of-concepts and as a platform to run performance experiments.Chapter 4 specifies preliminary problems and requirements of Web Services technology, discusses the current available security standards, which can be integrated and merged into Web Services security model. Furthermore, the gap between the existing security techniques and requirement to secure Web Services is discussed.Chapter 5 describes the performance measurements of the prototype and the existing elements. Different testing is given between static-binding and dynamic binding. The communication is broken down in order to show the bottleneck. The chapter defines the testing approach and presents the results.Chapter 6 addresses the benefits that Web Services can bring to the Grid computing and introduces Grid services concept. Furthermore, in particular, Web Services’ contribution to scientific computing and its limitation are discussed.Finally, Chapter 7 presents conclusions and provides directions for the future work.Chapter 2 Web Services and Related WorksThis chapter presents an overview of Web Services technologies with major emphasis on models and standards. It discusses some of the important technological advances that have led to the emergence of Web Services. It presents the current efforts and related technologies. Briefly followed by a survey of peer-to-peer computing and enterprise computing that address the similar problems and issues.2.1 What Are Web Services?Web Services are an XML based set of standards to integrate software application systems using Internet technology. Key element is the capability to publish, find and bind Web Services through public or private registries. Both business services and the actual electronic integration of software services are described and made operationally available in a highly standardized method. Web Services are stated as the latest development in distributed computing on the Internet and are key in the product strategies of most if not all major software vendors today. Web Services are a new, pervasive kind of middleware designed to integrate software systems of a very wide variety [4].Web Services are independent of specific programming languages or operating systems. Most important, Web Services rely on pre-existing transport technologies (such as HTTP) and standard data formatting techniques (such as XML) for their implementation. Thus this new emerging technology inherits both standards’ advantages and presents a new coupling model that supports loosely coupled collaborations.One of the main ideas behind Web Services is that applications of the future will be assembled from a collection of network-enabled services. As long as equivalent services are able to advertise themselves to the network in a standard and neutral way, an application could theoretically choose among alternative competing services based on its criteria.2.2 Web Services Model2.2.1 Communication EvolutionThe way of how participant computers communicate with each other takes place the following four-stage evolution as illustrated in figure 1.Peer to Peer Point to PointFigure 1: Communication Evolution• Point-to-point communication: namely, one-to-one communication, each single computertalks to another predefined computer;• One-to-many: via a private exchange server, each computer can talk to many othercomputers; this is usually taken place in one organization;• Many-to-many: via a public exchange server, a group of computers can talk to othergroups of computers. In the business domain, this is so-called Marketplace model via a broker.• Peer-to-peer: such as Web Services model where communication is conducted byadvertising themselves to the network, so that individual scattered computing nodes communicate with each under the help of private/public registry.2.2.2 Web Services Component Roles and OperationsThere are three components in the Web Services architecture: service provider, service broker and service requester. These parties perform three fundamental operations: publish, find and bind (see Figure 2) [10]. These concepts are explained as following: (The standards being used in the operations will be explained in details in next section.)Figure 2: Web Services ModelRoles in Web Services architecture:• Service provider. From a business perspective, this is the owner of the service. From an architecture perspective, this is the platform that hosts access to the service.• Service requester. From a business perspective, this is the business entity that requires certain functions to be satisfied. From an architecture perspective, this is the application that is invoking or initiating an interaction with a service. A program or other Web Services can play this role.• Service registry. This is a service description repository where service providers publish their service descriptions and service requester find services and obtain binding information.Operations in Web Services architecture:• Publish. In order to be accessible, a service description needs to be published so that the service requester can find it. The published information can vary from business entity, business description and service description.• Find. The service requester retrieves a service description from the service registry in order to find the required business type. The find operation can be involved in two different phases for service requester: at design time to retrieve the service’s interfacedescription for program development, and at runtime to retrieve the service’s binding and location description for invocation.• Bind. The service needs to be invoked. In the bind operation the service requester invokes or initiates an interaction with the service at runtime using the binding details in the service description.In service-oriented architectures, service descriptions and metadata play a central role in maintaining a loose coupling between service requesters and service providers. The service description, published by the service provider, allows service requesters to bind to the service provider. The service requester obtains service descriptions through a variety of techniques, from the simple “e-mail me the service description” approach to techniques such as Microsoft’s DISCO [10] and sophisticated service registries like UDDI.2.3 Web Services Standards2.3.1 HTTP and XML - eXtensible Markup LanguageResearch and industry has widely accepted HTTP, which is being used everywhere, on almost all platforms. This ubiquity makes HTTP a good choice for an interoperable transport mechanism. XML is becoming as ubiquitous as HTTP. It stands for eXtensible Markup Language, which provides a common language for exchange information. It is designed to provide more flexible and adaptable information identification. XML is actually a “meta-language” -- a language for describing languages -- that lets users design their own customized markup languages for different types of documents. Because XML is just text, any application can understand it as long as the application understands the character encoding in use. This makes XML a good choice for describing method invocations in a platform and language-neutral fashion.Combining HTTP and XML into a single solution gives a whole new level of interoperability. For example, lathered with SOAP that is discussed in next section, clients written in Microsoft Visual Basic can easily invoke CORBA services running on UNIX boxes, JavaScript clients can easily invoke code running on the mainframe, and Macintosh clients can start invoking Perl objects running on Linux. The list goes on. While some interoperability is achieved today through cross-platform bridges for specific technologies, once SOAP becomes standard, these linkage technologies will no longer be necessary.2.3.2 SOAP -- Simple Object Access ProtocolSimple Object Access Protocol (SOAP), also referred as Services Oriented Architecture Protocol (SOAP) is a network-neutral, lightweight protocol for exchanging of information in a decentralized, distributed environment [3]. SOAP is considered as one of the most important standards being used in Web Services for its flexible invoking of methods on servers, services, components and objects in a platform independent manner. SOAP combines the existing practice of using XML and HTTP as a method invocation mechanism. SOAP is a protocol that acts as glue between heterogeneous software components. If developer can agree on HTTP and XML, SOAP offers a mechanism for bridging competing technologies in a standard way. The main goal of SOAP is to facilitate interoperability, so that it is widely viewed as the backbone to a new generation of cross-platform cross-language distributed computing architecture of Web Services. SOAP is not just an alternative to HTTP and XML. It can potentially be used in combination with a variety of other packaging and protocol schemes besides HTTP: MIME packages to support attachments, SMTP for scalable asynchronous messaging without the need for special middleware and many others (e.g., MQSeries, MSMQ, JMS) [51].SOAP consists of three parts: first, an envelope that defines a framework for describing what is in a message and how to process it; second, a set of encoding rules for expressing instances of application-defined data types; and third a convention for representing remote procedure calls and responses. SOAP supports two communication styles: one is Remote Procedure Call (RPC) -- synchronous invocation of operation returning a result, conceptually similar to other RPCs. This style is exploited by many Web Service tools and featured in many tutorials (e.g., [10]). Another。

TableofContents

TableofContents

Group members:(13) Celine Lam(14) Gladys Lam(15) Nicole Lam(16) Kathy Lau(17) Mandy Lau(18) Iris Lee? ?Table of ContentsTheme of Study (2)Objective of Study (2)Scope of Study (3)Background Information (3)Research Design (4)Research Result (5)Result of Face-to-Face Interview (9)Conclusion (10)Suggestions (11)References (12)Appendix (13)Our project title is how China can solve the conflicts of Taiwan’s sovereignty.The conflict between China and Taiwan was started in past since 1949. Kuomintang of China (KTM) was defended by Communist Party of China (CPC) in the civil war. KTM was moved to Taiwan up to nowadays. CPC was stayed in Mainland for many years. Since CPC cannot control KTM as they were a failure. So, they started to have different conflicts between them.Objective of StudyIn the 21st century, Asia is facing many challenges. Politically, we think that the sovereignty of Taiwan is the most interesting topic, because this conflict still cannot be settled in nowadays. We are questioning why China and Taiwan still cannot solve the problem since 1949. Also, we are confused in their relationship. So we want to deeply understand both situation and their governments view points on the sovereignty of Taiwan. Besides, we doubt whether today’s situation is affected by foreign countries standpoints. Thus, we want to find out USA governments’ point of view towards the conflicts too. Lastly, we think that the situation now is also due to how the local people think. That is the reason why we want to find out the will of the citizenry from Taiwan and China.In fact, the answers from above can help us to figure out whether the conflicts can be solved or not. As in our opinion, the conflicts of Taiwan’s sovereignty could never be solved and holding operation is the best method for China. Therefore, after finding out the answers, if the conflicts can be solved, we will f ind out when and the China’s best method to solve the problem. If the conflicts can’t be solved, we will conclude the reason why China could never be unified.Our title of this project is ‘How can China solve the conflicts of Taiwan’s sov ereignty?’ In this project, we would like to know deeper about the conflicts and the relationship between China and Taiwan. We also want to find whether they can solve these problems in the future. We will interview the Mainlanders and Taiwanese to get mor e information about their opinion towards Taiwan’s sovereignty.We have set some questions to do this project:1. How the different ideology of China and Taiwan affect the sovereignty of Taiwan?2. How do the Chinese and Taiwanese residents think of the sovereignty of Taiwan?3. What is the USA point of view on sovereignty of Taiwan?We find out those answers by interviewing the Chinese and Taiwanese (questionnaire), finding the useful information from the Internet or library.Doing this project, we expect that China can get back Taiwan since has tried to improve their relationship with Taiwan in the past few years e.g. China had sent two pandas to Taiwan.Background InformationIn 1945 the Republic of China takes control of Taiwan.Then, in 2000-2005 the President of the Republic of China Chen Shui-bian promotes the concept of One Country on Each Side which made the relationship between China and Taiwan are grim . But in 2008, when Ma became the president of PRC, he stated that there are no promotion of Taiwan independence to have win-win solutions, thus ,the relationship becomes good in his term. Plus,Cross-strait Agreements are signed and a pair of giant pandas from China arrived at the Taipei Zoo in 2008.Sampling methodSimple random samplingMethods of Data Collection●Primary data (survey with Chinese and Taiwanese; face-to-face interviews withteachers)●Secondary data (articles from the internet and books)How the different ideologies of China and Taiwan affect the sovereignty of Taiwan?Reasons for setting up this research question: The different ideologies of China and Taiwan are one of the reasons led the sovereignty problem. We believe if they have the same ideology, their political conflicts could be relieved.Time, place:26th March, 2010, St Paul’s School (Lam Tin)How the Chinese & Taiwanese residents think of the sovereignty of Taiwan? Reasons for setting up this research question: Residents act as a very important role in a country. The thoughts of Chinese and Taiwanese may help to investigate the sovereignty problems.Time, place:1st April, 2010, Victoria Harbour and Avenue of StarsWhat is the USA point of view on sovereignty of Taiwan?Reasons for setting up this research question: Foreign countries viewpoints can interfere in political affairs of China and Taiwan. And USA is a very powerful country, so her view point is important to the sovereignty of Taiwan.Time, place:12th April, 2010, St Paul’s School (Lam Tin)A.The different ideologies of China and TaiwanWe compare the socialism and capitalism in different aspects; we find that they have different ideolog ies. China doesn’t have freedom of speech and voting rights, while Taiwan has.“Their political positions are totally different.” Ms K Yip said in the interview. Also, China practises planned economy but Taiwan practises free economy has respect of ownership. Thus, Taiwanese enjoy capitalism of Taiwan a lot.So they may not satisfy with socialism of China, this may affect the rate of China to be unified. As the result, it will affect the sovereignty of Taiwan.B. The two governments view points on Taiwan’s sovereignty(i) The Chinese government view pointsThe Chinese government refuses to maintain diplomatic relations with the nations that recognize the Taiwanese government. This seems that the Chinese government doesn’t identify Taiwan as a nation. But it regards Taiwan as a breakaway province. So the government really wants China to be unified.(ii) The Taiwan government view pointsThe president Ma of Taiwan government said he would never declare Taiwan to be independence and would not provoke China to attack Taiwan. This seems Taiwan government will promote better relationship with China, and will don’t talk much about the sovereignty of Taiwan. The view point on Taiwan’s sovereignty is neutral.C. How the Chinese & Taiwanese residents think of the sovereignty of Taiwan?Result from our questionnaire: Survey question: Do you support China to be unified? Opinions of both Mainlanders & Taiwanese about the unification of ChinaWe can see that most of Mainlanders and Taiwanese support China to be unified.The main reason of Mainlanders and Taiwanese supporting China to be unified In order to find out why many Mainlanders & Taiwanese supporting China to be unified, we have interviewed 60 Mainlanders (56 of them support) & Taiwanese (51 of them support) by simple random sampling. The results are as follows:Mainlanders ’chart53%3%41The survey results show that● 52% of Mainlanders support it because of nationalism, so support China’sdecision.● 41% of them support it because of some other reasons.● 4% of them support it because it is a shame if China cannot be unified. ● 3% of them support it because Taiwan brings China manpower, resources53%10%0%The survey results show that●53% of Taiwanese support it because they think that huge improvement in the economic partnership between China & Taiwan.● 37% of them support it because Taiwan could get full support from China.● 10% of them support it because fewer conflicts between China & TaiwanDistribution of Chinese & Taiwanese age groups that support China to be unified In order to find out distribution of Mainlanders & Taiwanese age groups supporting China to be unified, we have interviewed 60 Mainlanders (56 of them support, but 30 of them with this reason ) & Taiwanese (51 of them support, but 27 of them with this reason) by simple random sampling. The results are as follows:Mainlanders ’chart7%46%277%The survey results show that● 46% of Mainlanders from 18-25 years old support China to be unified because ofnationalism.● Mainlanders from less than 18 (7%), larger than 60 years old (7%), 26 to 34(13%)and 35 to 59 (27%) support because of nationalism.19%63The survey results show that63% of Taiwanese from 26-34 years old support China to be unified because they think that huge improvement in the economic partnership between China &Taiwan.Taiwanese from less than 18 (7%), above 60 years old (0%), 35 to 59(11%) and 18 to 25(19%) show support because of the above reason.D. The powerful USA point of views on Taiwan’s sovereigntyThe role of USA changed a little bit from past to now. US President Bill Clinton ordered to send ships to the Taiwan Strait in response to the action of China, after China conducted provocative missile tests in 1966 to influence Taiwan’s firs t direct presidential election. From this action, we can see that USA wanted to protect Taiwan from being threatened by China.But two years later, Clinton announced “3 N os” - say no to Taiwan independence, two Chinas and there should be no joining international organizations of Taiwan.Then after Obama becomes the president of USA, he expressed that he will support the “ONE China” policy and concedes Taiwan is part of China. On the other hand, the USA does support Taiwan to be a membership in some international organization, for instance, World Trade Organization. It also keeps on selling defensive military equipment to declare peace and stability in Taiwan. For example on 1st February, the USA sold nearly $6 billion weapons to Taiwan which shows that the USA doesn’t care how China think s.Therefore, the stand point of the USA changes from time to time. But it is still indefinite since the USA thinks holding operation of Taiwan’s sovereignty can benefit her the most.Result of Face-to-Face InterviewLink: /watch?v=qVuIB1lq3O8Inside this video, we have interviewed Ms K Yip, a teacher in St. Paul’s School (Lam Tin) and we have asked her some questions about Taiwan’s sovereignty.In Ms Yip’s opinion, she thinks that Taiwan and China relationship is quite stable now. But if China force Taiwan integrate together now, Taiwan will still not agree with her. Moreover, she said she can’t any particular reason for urging Taiwan to integrate with China.Secondly, she thinks that China and Taiwan cannot solve the conflicts of sovereignty immediately and their present relationship will remain unchange for some time. She mentioned that the conflicts cannot be solved by military force because people from both side will not support as they don’t want to start a war. Besides, she estimated that the conflicts will not change in the following 10 years.On the other hand, she thinks that the fusion of China and Taiwan mainly depends on the development of its economy, people livelihood and political. And it’s not suitable for China to be unified now. She said Taiwa n’s situation is similar to Hong Kong because some Hong Kongers also dissatisfied with some political ideas that made by China’s government. Same as some Taiwanese may also disagree with China’s political decision.In conclusion, she thinks that China can absolutely solve the problem with the help from Taiwan in the future.In this project, we found a lot of infor mation to support our argument, “How can China solve the conflicts of Taiwan’s sovereignty?”The results of the research questions show that the ideologies between China and Taiwan are different. And this may affect the rate of solving the conflicts of Taiwan’s sovereignty because Taiwanese may afraid they will lose their freedom after integrate with China. (Refer to the research question 1)We also interviewed 60 Mainlanders and 60 Taiwanese to find 1st hand information for research question2. From the result, we can see that main reason Mainlanders support China to be unified is because of nationalism. Most of them want to unite so China could become stronger, and even to be the most powerful nation in the world. Besides, the main reason Taiwanese support China to be unified is they think that there will have huge improvement in the economic partnership between China & Taiwan. As if China is unified, these two places can trade more easily. They will have more businesses afterward. Thus, their economy will also be improved because they can balance each other’s trade and many money will be earned too.Furthermore, we found that the standpoint of USA is not so clear since she thinks holding operation situation of Taiwan could benefit her the most, as she has good relationship with both China and Taiwan. If China unified, China may affect the international status of USA.In the result of face-to-face interview, we agree Ms Yip opinion which China can solve the problem together with Taiwan in the future. But China should improve her weaknesses first.The evidence shows China is capable to solve the Taiwan’s sovereignty. Mo st of the young Taiwanese or those in the middle age wish China to be unified. China would not use force to control Taiwan. China does not desire to threaten Taiwan. Besides, we observed China has been making a great improvement no matter in the economy, transportation and communication. China may want to have a preferential treatment for Taiwan.China should keep on giving different special rebates or China and Taiwan carry a closer economic partnership scheme together just like China and Hong Kong. China should not intervene Taiwanese travelling along China and invest their capital in China. They can build up railways along China and Taiwan to keep a good transportation for allowing people to travel China and Taiwan easily. Hence, it may exchange their culture more easily and to mix their culture together. Taiwanese maybe accept China own culture and to ease up their different ideologies.We think that the main reason why Taiwanese do not want to be controlled by China is that China does not permit the freedom of speech. Taiwanese cannot raise their disaffection of the government. Thus, we suggest China reform the freedom of speech. Otherwise, Taiwanese will be threatened by putting into jail in speech.Thus, it produces a good image to Taiwanese and builds their confidence to China. Moreover, China can demonstrate to the world especially for Taiwan that China will treat Taiwan so well if Taiwan rude under China. In addition, it shows China is really wanted to take care of her brother, Taiwan.Some information presents that China may become the strongest country in the world after 30years. China will have strong power no matter in economy, military or even technology.If China keeps a closer relationship with Taiwan, at once she promised to take care of her and gives benefits to her. Taiwan may consider it seriously. Taiwan is not a powerful city, when she turned into a crisis, she is unable to offset it but she needs a help. That is one of the reasons that China could try to convince her.To solve the Taiwan’s sovereignty is not that easy and a short period of work. It might take a long time for China. According to her ability, China is enabling to improve faster if she wants.References●InternetThe most popular search engines are YAHOO! Hong Kong ()●PeopleThe interviewers from China and Taiwan have given us their opinions on the Taiwan’s sovereignty problems.Our Teachers Ms. W.Y Yu and Ms. K. Yip have also given us their opinions and the information on the Taiwan’s sovereignty.●BookWinberg Chai (2007). China A to Z: Everything You Need to Know to Understand Chinese Customs and Culture. England. PlumeAppendix Questionnaire asked during interviewsFor Ms. K. Yip, Teacher in St.Paul’s School ( Lam Tin)1) Do you have any special standpoint?2) Can China solve the sovereignty of Taiwan?3) How long will the situation now stand for?4) Are there any methods for solving Taiwan’s sovereignty?5) Why do you think that Taiwan doesn’t want to be ruled by China?6) Why China can’t be unified now?。

全册要点整理电子版(英语朗文4B)

全册要点整理电子版(英语朗文4B)

全册要点整理电子版(英语朗文4B)Chapter 1 Join Our ClubKey words核心词汇(要求能够正确认读、拼写、互译)戏剧 d_________运动 s_________英语 E_________音乐 m_________ 美术 a_________园艺 g_________宠物 p_________数学 m_________ 社团 c_________最好的 b_______为什么w_______因为b__________ Extension Words拓展词汇(要求能够正确认读、在语篇中理解意思)加入j_______海报p________表演a_______剧本p______十分喜欢 q________ l_________提高i____________学习l__________ 把宠物带学校来b_________ my pet to school真正好的图画a r________ g_______ p_______我喜欢运动胜过园艺。

(better than)______________________________________Key sentences & grammars主要句型和语法(要求能够正确认读、理解,并在相应语境中应用)1. 你为什么想要加入戏剧社团____________________________________________________2. 因为我喜欢戏剧。

______________________________________________________________3. 我喜欢英语、绘画和戏剧。

不过我最喜欢的是戏剧。

________________________________________________________________ _______________4. 我也最喜欢戏剧。

_______________________________________________________________5. 我不喜欢音乐。

Table of Contents

Table of Contents

G.L.A.D. Resource Book(Guided Language Acquisition Design)Table of ContentsSection IFocus and Motivation PagesCognitive Content Dictionary……………………… 3-4Exploration Report…………………………………………. 5-7Observation Chart………………………………………….. 8-10Teacher Made Big Books……………………………… 11-13Inquiry Charts…………………………………………………. 14-16Awards………………………………………………………………. 17-19Section IIInput PagesPictorial Input………………………………………………… 21-24Comparative Input……………………………………….. 25-28Narrative Input……………………………………………... 29-32Section IIIGuided Oral Practice Pages10/2…………………………………………………………………. 34-36T Graph for Social Skills……………………………. 37-40Chants…………………………………………………………… 41-44Sentence Pattern Chart…………………………….. 45-49Section IVReading and Writing PagesCooperative Strip Paragraph…………………… 51-54Team Tasks……………………………………………………. 55-56Process Grid…………………………………………………. 57-61Expert Groups (62)Story Maps…………………………………………………… 63-64G.L.A.D. Strategy descriptions are from the Pasco School District’s G.L.A.D. Website. Strategy photos taken of Main Street Elementary Teachers class work and from the 5-Day and 2-Day G.L.A.D. trainings.Section I Focus and MotivationStrategiesCognitive ContentDictionaryExploration ReportObservation ChartTeacher Made Big BooksInquiry ChartsAwardsCognitive Content Dictionary or Picture DictionaryInvolves students in metacognitionBuilds vocabularyAids in comprehensionPicture dictionary generally for youngerstudentsStep-by-Step1. Teacher selects word from unit vocabulary(This word becomes the signal word for the day/week)2. Later students select word by voting3. Students predict meaning of selected word4. Write or sketch something that will helpthem remember the meaning.5. Use the word in a sentence.6. This activity is done whole class, in teamsand individually4Exploration Report• Provides students with the opportunity for increased team buildingo Consensus of teamo Provides opportunity to negotiate formeaning• A type of inquiry chart• Gives indication of background knowledge• Basis for scaffolding vocabulary and meaning of information for unitStep-by-Step1. Use real photos, in color, if possible2. Choose high interest photos3. Use the Exploration report as the first teamactivity as an introduction to the unit4. Select 2-3 photos for each team5. Each team will then decide on one photo toreport on6. Each team must then decide on anobservation, a question and a prediction that they will report to the class7. The teacher will then ask each team for theirobservation, recording the observation in thecolor that represents each team.8. The teacher will then record each teamsquestion in the representing colors9. The teacher will then record each team’sprediction in the corresponding colors.10. The teacher uses the report to determinebackground knowledge.11. The teacher can revisit the report as the unitprogresses and information is learned.7Observation ChartsA type of inquiry chartStimulate students’ curiosityBuild background information while providing the teacher with a diagnostic toolProvide opportunity for language support from peersStep-by-Step1. Use real photos, in color, if possible.2. National Geographic magazines and the internet are good resources.3. Attach plain white paper.4. Have students work in pairs or teams to discuss the pictures. Only one pencil per group is allowed. They may write:an observationa questiona comment5. Teacher uses the chart to assess background knowledge and students’ interests.6. Revisit the charts to monitor growth.1011 Teacher-Made Big BooksDirectly focus on content standards of the unitImbed important concepts and vocabularyExpose students to comprehensible expository textPatterned text gives access to all studentsStep-by-Step1. Choose key concepts and vocabulary.2. Choose a frame or pattern.The Important BookI Just Thought You Would Like toKnowBrown Bear, Brown BearWhen I Was YoungI Remember When3. Use real pictures and photos.14Inquiry ChartsFrom the inquiry method approach to scienceThink, predict, hypothesizeAssess and activate background knowledge Address misconceptionsTeach revision and learning as a continuous processModel reading and writingThink KWLStep-by-Step1. Record students’ comments using their words.2. Record students' names after their comments. (primary)3. Revisit the inquiry chart often.4. Use a different color marker each time you revisit.5. When revisiting, ask students to site the source of their new information.1516Super Scientist Awards Historian AwardsBehavioral management toolConnected to the standardsIndividual personal standards• Make good decisions• Show respect• Solve problemsStep-by-Step1. Use real pictures/photos related to the unit.2. Label the pictures with unit vocabulary.3. Teacher specifies what the student did to earn the award.4. Enlist the help of student monitors to give awards. Students verbalize the reason for earning awards.19Super Scientist!20 Section IIInputStrategiesPictorial InputComparative InputNarrative InputPictorial Input ChartMake vocabulary and concepts comprehensibleDrawn in front of the students for brain imprintingOrganizes informationBecomes a resource for studentsStep-by-Step1. Use to illustrate unit vocabulary and concepts.2. Resources for pictorials include: textbooks, expository children’s books (Eyewitness Explorers series) websites(), teacher resource books.3. Use an opaque, overhead, or document camera to enlarge the picture and trace on butcher paper in light pencil, including vocabulary words and notes.4. With students present, trace over the pictorial with markers, providing verbal input as you go. Chunk your information in different colors.5. Revisit to add word cards and review information.6. Creates LANGUAGE FUNCTIONAL ENVIRONMENT.7. Allow students to color pictorials.8. At the end of the unit, make a master to use next year, and then raffle the pictorials2324Comparative Input ChartA variation of the pictorialCompares and contrasts two objects, animals, or peopleA pictorial form of a Venn diagramInformation can be comprehensibly presented with the comparative, taken to a Venn diagram, and finally to writingStep-by-Step1. Follow the same procedure as the pictorial, but choose two objects, animals, or characters that lend themselves to compare/contrast.2. Revisit the comparative to add word cards and review information.3. Consider extending the comparative by recording the key points and vocabulary on a Venn diagram.4. Use the comparative and/or Venn diagram as the graphic organizer for a compare/contrast piece of writing.Narrative Input Chart High level, academic language and concepts are used but put into a story or narrative formatThe story format allows for increased comprehension of academic conceptsProvides a visual retelling of the storyStep-by-Step1. Choose concepts and vocabulary that you would like to present via narrative input2. Consider adapting a story that already exists by imbedding standards-based concepts and vocabulary3. Draw or copy pictures for narrative and attach the text to the back4. Laminate the pictures for retelling5. Create a background for the narrative that may be as simple as a laminated piece of butcher paper6. Gather the students close to you and tell the story as you place the pictures on the background7. Revisit the narrative to add word cards and/or speech bubbles3132Section III Guided Oral Practice Strategies10/2T Graph for Social Skills ChantsSentence Pattern Chart10:2Backed by brain researchPresented by Art CostaReinforced by Long, Swain, and Cummins, who state that it is important to allow at least 2 minutes of student processing for every 10 minutes of teacher inputNegotiating for meaningLow-risk environment to try new vocabulary and conceptsStep-by-Step1. Teach students turn and face a partner whenever you indicate it is time for a 10:2.2. Teach students to take turns answering the question you provide.3. Teach students the quiet signal, such as hand in the air, you will use to indicate when it is time to face you again.4. Use 10:2s whenever you are providing input (big books, pictorials, narratives) or for soliciting information from children (sentence patterning, process grid, editing co-op)36T-Graph for Social SkillsStudents identify good behaviorThey verbalize and internalize appropriate behaviorMore meaningful to the students than teacher-imposed rulesSets standards for cooperative groups and develops social skillsAll statements are in positive termsStep-by-Step1. Focus on different social skill for each unit (respect, cooperation, responsibility)2. Brainstorm the meaning of the word with children and record on the web3. Brainstorm what behaviors you would see, and what specific words you would hear if a person were behaving in that way4. Revisit the t-graph often with students to add behaviors that have been observed3940ChantsImbed key concepts and vocabularyAuditory and visual language patterningVocabulary buildingStudents gain familiarity and comfort using academic language in a low-pressure wayChants are revisited often for a variety of purposesStep-by-Step1. Choose key vocabulary and concepts to imbed in chants.2. Choose a frame or existing song to adapt (Bugaloo; Yes Ma’am; Cadence; Here, There, Everywhere; I Know a …).3. When chanting with the students, start by chanting for the rhythm and language patterns first, focus on concepts and vocabulary later.4. Revisit the chants often for different purposes, including highlighting scientific, historic or interesting words.4344Sentence Patterning ChartAdapted from the McCrackensSkill buildingPatterningParts of speechResource for writingStep-by-Step1. Choose a key plural noun from the unit (anoun that is capable of producing action is best)2. Color code the headings (Adjectives-red,Nouns-black, Verbs-green, Adverbs-blue, Prepositional phrases-orange)3. Create and label the grid in front of thestudents4. Use 10:2s to brainstorm words for eachsection5. Refer students to resources in the room,such as pictorials, when necessary6. Choose 2 adjectives for (upper) or 3 adjectives (primary) and one word from each of the other categories, by placing a small post-it note by each7. Have students help you chant to the tune of “The Farmer-in-the Dell”8. Allow students to choose words by placing post-it notes on the charts for subsequent chants50 Section IV Reading and WritingStrategiesCooperative StripParagraphTeam TasksProcess GridExpert GroupsStory Maps。

booktable

booktable

recorderNO书号11395-621995-431412-X40913-451147-361396-471385-981343-391388-3101389-1110676-3121386-7131393-X147-900677-61-5157-900677-57-7161384-0171381-6180408-4190061-7200295-4210447-7220448-5230328-9240655-0250396-9260421-3270284-0280348-9290471-X300248-9310751-4320409-4330744-1340756-5350542-2360176-1370250-4380739-5390057-9400710-5411061-2420636-4431060-2440841-3450758-1460745-X470708-5480939-8490048-X500845-6510452-3520733-6530807-3540829-4560811-1 570148-6 580755-7 590679-0 600763-8 610852-X 620734-4 630741-7 640238-5 650350-0 660169-9 670851-0 680016-1 690451-5 700693-3 710754-9 720736-0 730351-9 740078-1 750743-3 760761-1 770764-6 780732-8 790596-1 800621-6 810824-3 820856-1 830839-1 840796-4 850833-2 860702-1 870869-3 880677-1 890847-2 900788-3 910489-2 920867-7 930035-8 940694-X 950742-5 960576-7 970762-X 980243-1 990759-X 1000885-5 1010019-6 1020919-3 1030948-7 1040979-7 1050912-6 1060928-2 1070914-2 1080980-0 1090837-51110972-X 1120752-2 1130916-4 1140930-4 1150971-1 1160911-8 1170942-8 1180940-1 1190967-3 1200917-7 1210949-5 1220974-6 1230934-7 1240968-1 1250978-9 1260962-2 1270915-0 1280700-X 1290888-X 1300918-5 1311065-5 1320929-0 1330932-0 1341002-7 1351089-2 1361086-8 1371066-3 1381091-4 1391090-6 1401066A1 1411028-0 1421009-4 1431004-3 1441092-2 1451034-5 1460729-8 1471079-5 1481035-3 1490910-X 1501021-3 1511051-5 1521052-3 1531053-1 1540897-9 1551015-9 1561050-7 1571057-4 1581071-X 1591071-1 1601047-7 1611064-7 1620089-7 1631074-4 1640994-01660931-2 1671033-7 1681105-8 1690963-0 1701192-9 1711013-2 1721104A1 1731104-X 1741073-6 1751073A1 1761032-9 1771005-1 1781180-5 1791163-5 1801165-1 1811084A1 1821084-1 1831164-3 1840950-9 1850966A1 1860882-5 1871170-8 1881160-0 1891158A1 1901158-9 1911157-0 1920947-9 1930951A1 1940951-7 1951156A1 1961156-2 1971154-6 1981181-3 1991189-9 2001184-8 2011183-X 2021182-1 2031200-3 2040014-5 2051117-1 2061101-5 2071114-7 2081113-9 2091115-5 2101026-4 2111085A1 2121085-X 2131120-1 2141119-8 2151094-0 2161122-8 2171123A1 2181083-3 2191016-72211103-1 2221025-6 2231027-2 2240012-0 2251083A1 2261137-6 2271121-X 2281037-X 2290959-4 2300960-2 2310961-0 23210825 233100-7 2341059-0 2351102-3 2361110-4 2371134-1 2380846-7 2390141-0 2401131-7 2410785-7 2421142 2431149-X 2441161-9 2451146 2461148-1 2471169-4 2481168-6 2491145-7 2501126 2511140-6 2520015-0 2531167-8 2541118-X 2551210-0 2561127-9 2571118A1 2581213-5 2591209-7 2601076-0 2611011-6 2621056-6 2631191-0 2641010-8 2651143-0 2661190-2 2671208-1 2681152-X 2690398-5 2701286-5 2711193-7 2721186A1 2731305-0 2741186-42761185A1 2771305-0 2781173-2 2791174-0 2801063-9 2811153-8 2821176A1 2831176-7 2841175-9 2851199-6 2861177-5 2871227-5 2881195-3 2891217-8 2901232-1 2911218-6 2921216-X 2931216A2 2941219-4 2951139-2 2961217A1 2971219A1 2980735-2 2990906-1 3001219-4 3011233-X 3021224-0 3031224-0 3041151-1 3051155-4 3061240-2 3071207-0 3081235-6 3091172-4 3101246-6 3111206-2 3121244-5 3131172-4 3141198-8 3151332-8 3161231-3 3171103-1 3181198-8 3191243-7 3201245-3 3211211-9 3221229-1 3231229-1 3240958-4 3250973-8 3261230-5 3270964-9 3280737-9 3291268-23311135-X 3321247-X 3331263-1 3341242-9 3351248-8 3361266-6 3371273A1 3381267-4 3391216A1 3401252-6 3411217-8 3421267-4 3431259-3 3441216-X 3451256-9 3461255-0 3471271-2 3481269-0 3491264-X 3501273-9 3511254-2 3521270-4 3531217A1 3541261-5 3551275-5 3561048-7 3571128-7 3581241-0 3591260-7 3601188-0 3611204-6 3621049-3 3630927-4 3640995-9 3651498 3661332-8 3671308-5 368 3690992-4 3701132-5 3711289-5 3721307-7 3731279-8 374 3751096-5 3761209-7 3771312-3 3781321-2 3791257-7 3801258-5 3811297-6 3821046-8 3831300-X 3843861299-2 3871129-5 3881302-6 3891295-X 3901303-4 3911301-8 3921294-1 3931278-X 3941298-4 3951370-0 3961367-3 3971369-0 3981369-1 3991369-5 4001150-3 4011370-2 4021370-3 4030740-9 4041402-2 4050740-9 4061400-6 4071369-2 4081369-3 4091369-4 4101329-8 411 4121367-1 4131106-6 4141370-1 4151116-3 4161370-0 4171369-0 4181018-3 4191274-7 4201283-6 4211403-0 4221377-8 4231317-4 4241407-3 425 4261417-0 4271324-7 4281382-4 4291379-4 4301405-7 4311404-9 4321404-9 4331392-1 4341409-x 4351377-8 4361360-3 4371446 4381282-8 4394411187-2 4421420-0 4431448 4441372-7 4451380-8 4461384-0 4471453 4481501 4491357-3 4501454 451452453 4541204-6 455 45612021A1 4571236-4 4581287-9 4591288-7 4601212-7 4611334-4 4621201-1 4631322-0 4641296-8 4651327-1 466120A1 4671202-X 4681306-9 4691007-8 4701305-0 4711265-8 4721325-5 4731305-0 4741166-X 4750933-9 4761351-4 4771326-3 4781293-3 4791221-8 4801220-6 4811111-2 4821196-1 4831197-X 4840995-9 4851326-3 4861320-1 4871333-6 4881310-7 4891326-3 4901072-8 4911292-5 4921326-3 4931350-6 4941290-94961330-1 4971355-7 4980999-1 4991249-6 5001097-3 5011098-1 5021311-5 5030957-6 5041330-1 5051250-X 5061337-9 5071012-4 5081328-X 5091250-X 5101144-9 5111346-8 5121147-3 5131336-0 5141291-7 5151339-5 5161313-6 5171348-4 5181338-7 5191341-7 5201138-4 5211253-4 5221345-X 5231340-9 5241347-6 5251318-2 5261194-5 5271354-9 5281272-0 5291332-8 5300946-0 5311228-3 5321372-7 5331001-9 5341372-7 5351374-3 5361372-7 5371112-0 5381076-0 5391315-8 5401331-X 5411331-X 5421331-X 5431335-2 5441363-8 5451373-5 5461372-7 5471390-5 5481314-X 5491282-85511315-8 5521362-X 5531390-5 5541281-X 5551058-2 5561309-3 5570935-5 5581262-3 5591237-2 5601378-6 5611358-1 5621029-9 5631055-8 5641205-8 5651372-7 5661372-7 5671372-7 5681372-7 5690615-1 5701067-1 571 5721088-4 5731365-4 5741391-3 5751320-1 5761376-X 5771234-8 5781376-X 5791359-X 5801398-0 5810780-8 5821361-1 5831366-2 5841367-0 5851368-9 5861045-0 5871367-2 5881387-5 5891470-7 5901471-5 5911469-3 5921468-5 5931474-X 5941461-8 5951497-9 5961502-9 5971421-9 5981435-9 5991528-2 6001455-3 6011533-9 6021518-5 6031397-2 6041227-56061546-0 6071541-x 6081535-5 6091510-X 6101507-X 6111466-9 6121441-3 6131475-8 6141549-5 6151452-9 6161508-8 6171485-5 6181431-6 6191426-X 6201441-3 6211509-6 6221478-1 6231495-2 6241524-X 6251379-4 6261480-4 6271483-9 6281522-3 6291554-1 6301484-7 6311531-2 6321547-9 6331558-4 6341539-8 6351476-6 6361464-2 6371503-7 6381506-1 6391555-X 6401490-1 6411524-X 6421477-4 6431529-0 6441467-7 6451561-4 6461424-3 6471040-X 6481440-5 6491433-2 6501405-7 6511434-4 6521319-0 6531407-3 6541099-x 6551413-8 6561436-7 6571431-6 6581429-4 6591385-96611514-2 6621536-3 6631479-0 6641542-8 6651493-6 6661572-X 6671573-8 6681532-0 6691525-8 6701526-6 6711575-4 6721347-6 6731517-7 6741515-0 6751530-4 6761567-3 6771513-4 6781492-8 6791583-5 6801545-2 6811543-6 6821556-8 6831521-5 6841563-0 6851578-9 6861559-2 6871557-6 6881551-7 6891504-5 6901553-3 6911570-3 6921415-4 6931210-0 6941431 6951430 696 6971421-9 6981210-0 6991396-4 7001371-9 7011410-3 7021394-8 7031371-9 7041349-2 7051438-3 7061445-7071456-1 7081458-8 7091538 7101473-1 7111489-8 7121478-2 7131379-4 7141456-17161466-9 7171482-0 7181439-1 7191428-6 7201442-1 7211449-9 7221032-9 7231584-3 7241674-2 7251544-4 7261585-1 7271544-4 7281527-4 7291516-9 7301562-2 7311672-6 7321650-5 7331678-5 7341664-5 7351131-7 7361598-3 7371655-6 7381636-x 7391680-7 7401687-4 7411698-x 7421313-1 7431010-8 7441720-X 7451629-7 7461684-x 7471677-7 7481693-9 749692-0 7501696-3 7511011-6 7521133-3 7531553-3 7541683-1 7551660-2 7561656-4 7571624-6 7581624-6 7591570-3 7601699-8 7610992-4 7621690-4 7631448-0 7641570-3 7651659-5 7661308-5 7671491-x 7681708-0 7691423-57711700-57721284-47731701-37741320-47751574-67761607-67771567-37781511-87791588-67801615-77811343-37827-81073-329-x 7831589-47841358-17851456-17861247-x7871550-97887-81073-295-1 7897-81073-295-1 7901264-x7911606-87921390-57937-81073-279-X 7941602-57957-81073-393-5 7961548-77971548-77987-81073-331-1 7991582-78001590-88011587-88027-81073-392-3 8031512-68041294-18051055-88061603-38071580-08081378-68091581-98101608-48111055-88121592-48131619-x8141586-x8151366-28161612-28171417-08181366-28191298-48201346-88211592-48221622-x8231592-48241579-78261634-3 8271592-4 8281250-x 8291616-5 8301592-4 8311609-2 8321591-6 8331298-4 8341593-2 8351067-1 8361592-4 8371616-5 8381613-0 8391620-3 8401601-7 8411346-8 8421620-3 8431612-2 8441620-3 8451250-x 8461592-4 8471592-4 8481592-4 8491612-2 8501592-4 8511617-3 8521566-5 8531267-4 8541642-4 8551627-0 8561040-x 8571072-8 8581645-9 859161-6 8601241-0 8611630-0 8621377-8 8631328-X 8641228-3 8651377-8 8661621-1 8671618-1 8681565-7 8691640-8 8701592-4 8711623-8 8721553-3 8731625-4 8741633-5 8751652-1 8761635-1 8771605-x 8781596-7 8790996-78811686-6 8821605-x 8831523-1 8841523-1 8851523-1 8861523-1 8871523-1 8881523-1 8891605-x 8901651-3 8911548-7 8921605-x 8931605-x 8941600-9 8951600-9 8961600-9 8971600-9 8981605-x 8991624-6 9001388-3 9011338-7 9021150-3 9031161-9 9041626-2 9051644-0 9061685-8 9071643-2 9081611-4 9091689-0 9100998-3 9111651-3 9121643-2 9131682-3 9141590-8 9151685-8 9161651-3 9171651-3 9181632-7 9191673-4 9201597-5 9211649-1 9221648-3 9231665-3 9241335-2 9251682-3 9261670-x 9271367-8 9281671-8 9291628-9 9301012-4 9311676-9 9321096-5 9331338-6 9341688-29361338-6 9371657-2 9381367-8 9391661-0 9401367-8 9411367-8 9421367-8 9431684-7 9441285-2 9451691-2 9461662-9 9471050-7 9481604-1 9491610-6 9501338-6 9511405-7 9520785-9 9531234-8 9541679-3 9551679-3 9561679-3 9571679-3 9581547-9 9591669-6 9601240-6 9611398-0 9621540-1 9631638-9 9641646-7 9651663-7 9661697-1 9671590-8 9681187-2 9691187-2 9701639-4 9711675-0 9721681-5 9731740-4 9741730-7 9751732-3 9761497-9 9771730-7 9781227-5 9791440-5 9801635-1 9811667-X 9821731-5 9831706-4 9841666-1 9851279-8 9861668-8 9871721-8 9881730-7 9891338-79911654-8 9921434-0 9931068-X 9941730-7 9951732-3 9961732-3 9971768-4 9981834-6 9991846-6 10001846-x 10011824-9 10021821-4 10031821-4 10041824-9 10051774-9 10061850-8 10071933-4 10081801-X 10091801-X 10101801-X 10111801-X 10121801-X 10131758-7 10141801-X 10151774-9 10161843-5 10171852-4 10181494-4 10191871-0 10201868-0 10211852-4 10221868-0 10231370-0 10241370-0 10251370-0 10261369-7 10271711-0 10281369-7 10291369-7 10301370-0 10311717-X 10321369-7 10331429-4 10341658-0 10351369-7 10361369-7 10371710-2 10381476-6 10391733-1 10401710-2 10411379-4 10421715-2 10431744-7 10441143-010461702-1 10471401-4 10481762-5 10491741-2 10501718-8 10511724-2 10521751-X 10531595-9 10541736-6 10551710-2 10561710-2 10571710-2 10581640-8 10590958-4 10601711-0 10611737-4 10621719-6 10631756-0 10641707-2 10651726-9 10661661-0 1067 10681711-0 10691599-1 10701756-0 10711756-0 10721711-0 10731756-0 10741263-1 10751723-4 10761723-4 10771745-5 10781723-4 10791723-4 10801635-1 10811713-7 10821755-2 10831749-8 10841713-7 10851713-7 10861722-6 10871408-1 10881713-7 10891528-2 10901711-0 10911625-4 10921754-4 10931626-2 10941626-2 10951759-5 10961748-X 10971757-9 10981293-3 10991777-311011780-3 11021775-7 11031355-7 11041743-9 11051763-3 11061790-0 11071410-3 11081723-4 11091773-0 11101771-4 11111769-2 11121764-1 11131770-6 11141772-2 11151711-0 11161743-9 11171511-8 11181793-5 11190847-2 11201725-0 11211808-7 11221796-X 11231793-5 11241712-9 11251712-9 11261712-9 11271796-X 11281796-X 11291822-2 11301797-8 11311794-3 11321797-8 11331809-5 11341809-5 11351808-7 11361808-7 11371808-7 11381808-7 11391809-5 11401797-8 11411797-8 11421797-8 11431809-5 11441789-7 11451796-X 11461804-4 11471796-X 11481727-7 11491350-6 11501750-1 11511728-5 11521779-X 11531767-6 11541705-611561705-6 11571805-2 11581716-1 11591747-1 11601817-6 11611716-1 11621716-1 11631766-8 11641811-7 11651808-7 11661265-8 11671817-6 11681766-8 11691766-8 11701791-9 11711799-8 11721822-2 11731146-5 11741816-8 11751716-1 11761742-0 11771833-8 11781766-8 11791716-1 11801146-5 11811716-1 11821778-1 11831819-2 11841146-5 11851146-5 1186 11871792-7 11881799-4 11891760-9 1190 11911812-5 11921820-6 11931766-8 11941810-9 1195 11961795-1 11971785-4 11981788-9 11991717-5 12001714-5 12011765-X 12021739-0 12031738-2 12041429-4 12051714-5 12061786-2 12071813-3 12081802-8 12091818-412111814-1 12121272-0 12131815-X 12141714-5 12151813-3 12161714-5 12171830-3 12181798-6 12191178-3 12201740-4 12211635-4 12221710-2 12231712-9 12241712-9 12251800-1 12261714-5 12271837-0 12281714-5 12291712-9 12301732-3 12311730-7 12321730-7 12331205-4 12341241-0 12351775-7 12361733-1 12371732-3 12381871-0 12391732-3 12401703-7 12411730-7 12421872-9 12431574-6 12441869-9 12451646-7 12461732-3 12471732-3 12481433-2 12491395-6 12501872-9 12511871-0 12521862-1 12531784-6 12541871-0 12551784-6 12561844-3 12571635-1 12581705-6 12591784-6 12601784-6 12611844-312627-900677-21-6 12631871-0 12641829-X12661705-6 12671560-6 12681764-1 12691410-3 12701839-7 12711806-0 12721871-0 12731871-0 12741515-0 12751871-0 12761831-1 12771872-9 12781872-9 12791730-7 12801866-4 12815612-1126 12825612-0019 12831730-7 12841730-7 12851890-7 12861870-2 12871782-X 12881783-8 12891783-8 12901780-3 12911732-3 12921861-1 12931806-0 12941862-1 12951732-3 12961845-1 12971867-2 12981788-9 12991919-9 13001872-9 13011837-7 13021785-4 13031788-9 13041876-1 13051863-X 13061874-5 13071825-7 13081146-5 13091892-313107-900677-16-X 13111894-X 13121895-8 13131880-X 13141893-1 13151878-8 13161890-7 13171781-113187-900677-17-8 13191830-313207-900677-14-3 13211781-1 13221877-X 13231827-3 13241828-1 13251888-5 13261879-613277-900677-20-8 13281897-4 13291905-9 13301801-X 13311732-3 13321911-3 13331898-2 13341896-6 13351880-X 13361732-3 13371880-X 13381880-X 13391880-X 13401826-5 13411880-X 13421880-X 13431881-8 13441881-8 13451881-8 13461881-8 13471881-8 13481872-9 13491872-9 13501880-X 13511909-1 13521916-4 13531832-X 13541789-7 13551741-2 13561899-3 13571917-2135813591907-5 13601908-3 13611395-6 13621401-4 13631875-3 13641807-9 13651899-0 13661882-6 13671883-4 13681903-2 13691935-0 13701900-8137113721906-7 13731655-6 13741940-713761942-3 13771942-3 13781040-X 13791925-3 13801927-X 13811915-6 13821928-8 13831914-8 13841912-1 13851918-0 13861383-2 13871388-313887-900677-32-1 13891381-6 13901920-213917-900677-32-1 13921468-513937-900677-30-5 13941849-4 13951886-913967-900677-31-3 13971937-7 13981963-6 13991822-2 14001822-2 14011809-5 14021953-9 14031809-5 14041701-3 14051932-6 14061930-X 14071935-0 14081822-2 14091935-0 14101963-6 14111935-0 14121935-0 14131869-9 14141869-9 14151869-9 14161852-4 14171852-4 14181879-6 14191879-6 14201935-0 14211528-2 14221964-4 14231942-3 14241964-4 14251941-5 14261822-2 14271879-6 14281941-5 14291942-314311951-2 14321951-2 14331941-5 14341951-2 14351963-6 14361885-0 14371944-X 14381963-6 14391637-8 14401963-6 14411942-3 14421963-6 14431964-4 14441964-4 14451963-6 14461964-4 14471951-2 14481947-4 14491942-3 14501942-3 14511936-9 14521879-6 14531528-2 14541942-3 14551949-0 14561869-9 14571964-4 14581963-6 14591879-6 14601879-6 14611978-4 14621962-8 14631262-3 14641969-5 14650921-514667-900677-39-3 14671966-0 14681935-0 14691935-0 14701967-9 14711949-0 14721931-8 14731949-014747-900377-51-8 14757-900377-36-4 14767-900377-33-X 14771950-4 14781879-6 14791952-0 14802010-314817-900677-57-7 14827-900677-60-7 14831249-6 14841980-614861994-6 14871997-0 14881988-1 14891232-1 14901354-9 14911939-3 14921904-0 14931921-0 14941146-5 14951146-5 14961146-514977-900677-55-0 14981981-4 14991564-9 15001935-0 15011232-1 15021990-3 15031956-3 15041935-0 15051965-2 15061938-5 15071938-5 15081938-5 15091847-8 15101884-2 15111935-0 15121955-5 15131879-6 15141879-6 15151879-6 15161879-6 15171935-0 15181923-7 15191869-9 15201935-0 15211926-1 15221869-9 15231869-9 15241869-9 15251857-5 15261869-9 15271869-9 15281935-0 15291869-9 15301869-9 15311869-9 15321879-6 15331787-0 15341869-9 15351869-9 15361852-4 15371879-6 15381869-9 15391852-415411852-4 15421869-9 15431852-4 15441869-9 15451852-4 15461852-4 15471879-6 15481869-9 15491879-6 15501879-6 15511869-9 15521973-3 15531979-2 15541972-5 15551961-X 15561118-X 15572007-3 15581977-615597-900677-52-6 15601539-8 15611992-X 15621992-X15637-900677-62-3 15641976-815657-900677-35-6 15660780-8 15670780-8 15681968-7 15691996-2 15702000-6 15711954-7 15721006-X15737-900677-63-1 15747-900677-64-X 15751960-1 15761958-X 15771996-2 15781959-8 15791996-2 15801996-2 15811975-X 15821353-015837-9009677-38-0 15847-900677-54-2 15851974-115867-900677-66-6 15877-900677-59-3 15887-900677-75-5 15891999-715907-900677-70-4 15912002-2 15921385-9 15931986-515947-900677-56-915961989-X 15972004-9 15982045-6 15992004-9 16002009-X 16011860-5 16022006-5 16032005-7 16042005-716057-900677-72-0 16061934-2 16071620-3 16081347-616097-900677-68-2 16107-900677-69-0 16112001-4 16121347-616137-900677-68-2 16147-900677-53-4 16151922-9 16161991-1 16171945-816187-900677-74-7 16191993-8 16201859-1 16212008-1 16221998-9 16231383-2 16241439-1 16251678-5 16261708-016277-900677-76-3 16281855-9 16291338-7 16301752-8 16311853-2 16321853-2 16331702-1 16341957-116357-900677-82-8 16361856-7 16371853-2 16381853-2 16391853-216407-922677-80-1 16411389-1 16421339-516437-900677-88-7 16441853-2 16452042-1 16462072-316477-5612-2118-5 16487-5612-2130-4 16497-900677-86-016507-900677-88-7 16517-900677-84-4 16522053-7 16532027-8 16541854-0 16551557-616567-900677-80-1 16572014-616587-900677-87-9 16597-900677-85-2 16607-89996-138-6 16612015-416627-5612-2146-0 16637-5612-2145-2 16647-5612-1753-6 16657-5612-2152-5 16667-900677-73-9 16672013-8 16682048-0 16692016-2 16702052-916717-900677-93-3 16722059-6 16731566-516747-900677-58-5 16757-900677-81-X 16762039-116777-900677-95-X 16782018-9 16791567-3 16801946-6 16811869-916827-900677-94-1 16832060-X 16842056-1 16852078-2 16862064-2 16872054-516887-900677-99-2 16892055-3 16901336-0 16911301-8 16922069-3 16932069-3 16942006.6 16952033-2 16962090-1 16972085-5 16981985-7 16992098-7 17002074-X 17012077-4 17021935-0 17032062-6 17042068-517052061-817062083-917072086-317087-5612-2103-717097-5612-2111-8 17102021-917117-5612-2096-017127-900701-00-1 17132082-017147-5612-2032-417157-5612-2110-X17167-5612-2115-017177-5612-2113-417187-5612-2114-217197-5612-1901-617207-5612-2095-217217-5612-2124-X17227-5612-2114-2/h.375 17237-5612-2114-2/h.375 1724978-7-5612-2177-8 1725978-7-5612-2179-2 1726978-7-5612-2178-5 1727978-7-5612-2176-1 1728978-7-5612-2175-4 1729978-7-5612-2181-5 1730978-7-5612-2180-8 1731978-7-5612-2182-2 17327-5612-1879-6/d.35 17337-5612-2080-4 1734978-7-5612-2186-0 17357-900701-13-3-1736978-7-5612-2035-1 1737978-7-5612-2022-1 17387-5612-2114-2/h.375 17397-5612-2114-2/h.375 17407-5612-2114-2/h.375 17417-5612-2114-2/h.375 17427-5612-1996-2/h.362 17437-5612-1135-x/o.154 17447-5612-2140-1/f.79 17457-5612-1540-1/g.179 17467-5612-1761-7/g.215 17477-5612-1730-7/g.210 1748978-5612-2170-9 17497-5612-2093-6 1750978-7-5612-2168-6 1751978-7-5612-2167-9 17527-5612-2163-0/tp.534 17537-89996-498-9/tp.093 1754978-7-5612-2034-4 1755978-7-5612-2185-3 1756978-7-5612-2169-3 1757978-7-5612-2174-7 17587-5612-1996-2/h.362 17597-5612-1996-2/h.36217607-5612-1996-2/h.362 1761978-7-5612-2030-6 1762978-7-5612-2036-8 1763978-7-5612-0774-1 1764978-7-5612-2026-X 1765978-7-5612-2157-6 1766978-7-5612-2038-2 1767978-7-5612-2028-3 1768978-7-5612-2071-9 1769978-7-5612-2071-9 1770978-7-5612-2071-9 1771978-7-5612-2071-9 17727-5612-1853-2/h.348 17737-5612-1853-2/h.348 17747-5612-1853-2/h.348 17757-5612-1853-2/h.348 17767-5612-1853-2/h.348 17777-5612-1794-3/h.315 1778978-7-5612-2198-3 1779978-7-5612-2191-4 1780978-7-5612-2037-5 1781978-7-5612-2173-0 1782978-7-5612-2192-1 1783978-7-5612-2125-9 1784978-7-5612-2125-9 1785978-7-5612-2023-8 17867-5612-1741-2/o.247 17877-5612-1754-4/tp.400 17887-5612-1736-6/o.246 17897-5612-1378-6/o.189 17907-5612-2171-617917-5612-1417-0/o.195 17927-5612-1642-4/o.235 17937-5612-1717-x/o.244 17947-5612-1648-3/tm.22 17957-5612-1511-8/tm.22 17967-5612-2111-8/o.289 17977-5612-2109-6/o.286 17987-5612-2135-5/o.292 17997-5612-2110-x/o.287 18007-5612-2106-1/o.286 18017-5612-2166-5/TN.107 18027-5612-2104-5/E.7 18037-5612-2108-8/tm.103 1804978-7-5612-0935-6 18057-5612-2194-4/E.6 18067-5612-1686-6/tp.358 18077-5612-216-9/g.248 18087-5612-1461-8/TN.82 18097-5612-2151-7/F.80 18107-5612-2121-5/TM.33 18117-5612-2126-6/TN.106 18127-5612-2126-6/TN.107 18137-5612-2126-6/TN.108 18147-5612-1240-2/o.16218157-5612-2158-8/TP.530 1816978-7-5612-2184-6 18177-5612-1362-X/TH.62 18187-5612-2312-2/c.8 18197-5612-2153-3/G.251 18207-5612-2100-2/TP.521 18217-5612-1869-9/G.21 18227-5612-2095-2/TP.518 18237-5612-1578-9/TP.294 18247-5612-2026-x/TP.295 18257-5612-2164-9/TP.535 18267-5612-2165-9/TP.536 18277-900701-00-1/TP.76 18287-89995-577-7/TP.146 18297-5612-2085-5/TP.513 18307-5612-2099-5/TP.520 18317-5612-2089-8/TP.516 18327-5612-1343-3/TP.208 18337-5612-2084-7/TP.512 18347-5612-2150-9/TP.535 18357-5612-2019-7/TP.537 183618387-900701-10-918397-900701-14-118407-900701-15-X18417-900701-17-618427-900701-12-5 1843978-7-5612-2195-2 1844978-5612-2202-7 1845978-7-5612-2197-6 1846978-7-5612-2193-8 1847978-7-5612-2203-4 1848978-7-5612-2172-3 1849978-7-5612-2190-7 1850978-7-5612-2199-0 1851978-7-56122156-3 1852978-7-5612-2201-0 1853978-7-900701-21-3 1854978-7-900701-22-0 1855978-7-900701-23-7 1856978-7-5612-2196-9 1857978-7-5612-2209-6 1858978-7-5612-2031-3 1859978-7-5612-2189-1 1860978-7-5612-2212-6 1861978-7-5612-2206-5 1862978-7-5612-1718-4 1863978-7-5612-2200-3 1864978-7-5612-2211-9 1865978-7-56122160-0 1866978-7-5612-2218-8 1867978-7-5612-1935-0 1868978-7-5612-1935-0 1869978-7-56121935-0 1870978-7-5612-1852-41871978-7-5612-1852-4 1872978-7-5612-2105-1 1873978-7-5612-1935-0 1874978-7-5612-2221-8 1875978-7-5612-2217-1 1876978-7-5612-2220-1 1877978-7-5612-1059-8 1878978-7-5612-2081-8 1879978-7-5612-2230-0 1880978-7-5612-2226-3 1881978-7-5612-2229-4 1882978-7-5612-1853-2/h.348 1883978-7-5612-1853-2/h.348 1884978-7-5612-1853-2/h.348 1885978-7-5612-1853-2/h.348 1886978-7-5612-1853-2/h.348 18877-89996-498-91888978-7-5612-2063-4 1889978-7-5612-2228-7 1890978-7-5612-2223-3 1891978-7-5612-2154-9 1892978-7-5612-2237-9 1893978-7-88910-084-7 1894978-7-88910-085-4 1895978-7-5612-2194-5 1896978-7-5612-2138-9 1897978-7-5612-1427-5 1898978-7-5612-1266-0 1899978-7-5612-1996-6 1900978-7-5612-1996-6 1901978-7-5612-1996-6 1902978-7-5612-1996-6 1903978-7-5612-1853书名作者开本最新计算机组装和维护教程编委会16机械设计基础马保洁16中文Windows 2000+五笔字型+Office 2000+Interent实用教程编委会16复合材料细观力学性能乔生儒16编译原理 常见题型解析及模拟题康慕宁16最新网页制作入门与提高编委会16最新中文Windows 2000和Office 2000全面培训教程编委会16计算机基础知识与基本操作编委会16最新中文Office 2000短期培训教程编委会16最新电脑上网操作短期培训教程编委会16计算机辅助设计和制造技术孙文焕16最新中文Windows 2000短期培训教程编委会16新编计算机短期培训教程编委会16中文AUTOCAD 2005标准教程王璞16新编计算机组装维护全新版入门与提高郭玉红16最新中文Word 2000短期培训教程编委会16最新中文Excel 2000短期培训教程编委会16高等教育心理概论鲁克成大32科技德语词组词典张鸿刚32气体保护焊工艺和设备王震澄16德语用法辨析(上)张鸿刚大32德语用法辨析(下)张鸿刚大32电气测试技术李颂伦16动态大系统方法雷树梁16量子物理学汤文及32石膏型精密铸造工艺及理论高以熹32计算机辅助设备管理陈德元16线性代数及其应用张肇炽大32英诗阅读和翻译石磊大32高等飞行动力学何植贷16陀螺稳定装置及其应用郭富强16生活中的幽默和审美趣谈庞耀辉32功能高分子材料蓝立文16热工与气动参数测量林其勋16教书育人导论唐宗焕大32振动测量与信号分析高飞16焊接断裂力学孙志雄16物理化学盛宗淇16高分子物理蓝立文16自动控制基础陈铮16理论力学(下)吕茂烈大32金属疲劳的定理理论(获国家教委优秀学术著作奖)郑修麟大32理论力学(上)吕茂烈大32 CAD/CAM系统的可视化 集成化 智能化 网络化蔡青16全新英语阅读教程杨云峰16动态数据处理的理论与方法——时间序列分析田铮16计算机外部设备李伟华16机床液压传动与控制卢光贤16机械设计教程(修订版)(中学时)濮良贵16铸造工艺学曲卫涛16有色金属及其热处理张宝昌16电子线路与数字电路实验屠元16塑性加工导论李云瑞16线性代数(大专教材)张永曙大32冷冲压与塑性成形加工原理(中专教材)刘建超16偏微分方程逆问题的数值方法及应用苏超伟32冶金传输基础鲁德洋16导弹、航天器结构分析与设计陈集申16飞机噪声基础唐狄毅16三元合金相图胡德林16模拟集成电路应用王秀杰16计算机辅助塑性成形马泽恩16组织行为学刘惠罗32管理工程学基础顾亚声16质量管理学刘惠罗16通信原理冯子裘16金属塑性加工理论与工艺罗子健16计算机操作系统李永锡16冷冲压模具设计与制造张钧16声信号处理及其应用肖国有16线性系统理论阙志宏16计算机软件设计基础李续武16塑料成型机械冯少如16塑料模具设计李秦蕊16高能密度焊刘金合16设备腐蚀与防护秦熊浦16过程计算机控制系统傅信鉴16电子测量学王永生16检测仪器电子电路李永敏16电路基础计算机辅助教学段哲民16水中兵器概论石秀华16鱼雷动力机械制造工艺学李诚人16大学生学习方法导论孙国锟32型腔模设计(中专教材)李学峰16传感器应用技术(中专教材)王之芳16塑料成型工艺邱明恒16信号与系统(大专教材)宁德成16注塑模设计张克惠16钢的热处理(原理和工艺)胡光立16 FORTRAN 77程序设计实用教程吴涵仁16金属学及热处理胡德林16热处理炉曾祥模16机床计算机数控李诚人16数字信号处理俞卞章16金属学原理胡德林16电路辅助设计导论高德远16飞机钣金成形原理与工艺翟平16锻压参数测试技术黄吕权16航空推进系统控制樊思奇16电路分析(大专教材)王曙钊16机械原理教程(修订版)(中学时)孙桓16机床数控原理与系统 (第2版)王润孝16工程力学刘达16工程测试技术(第2版)冯凯方16金属X射线衍射学(第2版)马世良16范德蒙矩阵类的快速算法徐仲大32现代飞机结构设计陶梅贞16计算机会计学高启轩16可编程序控制器原理及应用(中专教材)王丹利16标准分数及其应用刘新平大32大学生能力自我培养范世贵32电子系统计算机辅助设计史浩山16机械设计基础作业集李育锡16声表面波传感器陈明大32科学思维锻炼与消遣姜长英32信号与系统段哲民16实用英汉数学词汇林世明32数据结构高宏宾16如何适应大学的学习生活邹富汉32单片机原理接口与应用黄遵熹16设备管理系统肖保生16应用概率统计方法(第2版)朱燕堂16电工技术、电子技术实验指导朱建堃16理论力学(中学时)蒲致祥16导弹控制系统设计原理杨军16计算机程序设计语言原理高集荣16现代并行计算机原理康继昌16神经网络与神经计算机导论李孝安16会计电算化实用教程吴小伟16板料冲压模具设计张秉璋16英汉插图精解词典(中小学生适用)黄成洲大32广义大系统的分散控制与鲁棒控制张庆灵大32迭代学习控制理论林辉大32现代企业管理李建中16西方人看中国张占荣大32英语语法自测精解张庭季32 WSK(EPT)最新英语水平应试指南——听力侯新民大32英语阅读步步高——阅读与提高王晓红大32英语阅读步步高——实践与技巧杨晓华大32 WSK(EPT)最新英语水平应试指南——听力 音带5盒侯新民大32计算机辅助技术基础何卫平16 FOXBASE数据库系统及应用赵贵祥16计算机仿真技术及应用吴旭光16英语阅读步步高——阅读与欣赏马国友大32卡尔曼滤波与组合导航原理秦永元16气体动力学基础潘锦珊16大学英语精读(1)学习·巩固·提高谢立新16飞行器结构力学王生楠16英语写作范文与练习武力16如何认识人生 再创人生辉煌雷秀雅32大学英语分级阅读2田鹏森32大学英语分级阅读3田鹏森32大学英语分级阅读4田鹏森32考研 概率论与数理统计初步应试强化辅导朱燕堂大32计算机控制系统周雪琴16大学英语分级阅读1田鹏森32考研 英语 阅读高分技巧与实践白靖宇16你会炒股吗?——股票模拟炒作学史忠科16模拟炒作软件史忠科研究生英语读写教程田鹏森16固体物理学陈长乐16机械设计课程设计张富洲16鱼雷总体设计原理与方法张宇文16有机合成化学及近代技术徐家业16工程电磁场与电磁波陈国瑞16计算机视觉研究中的投影理论和方法高满屯大32飞行器结构动力学王尚文16多工位级进模设计王俊彪16 MATLAB语言精要及动态仿真工具SIMULINK施阳16 MATLAB图形技术——绘图及图形用户接口周明16 MATLAB语言工具箱——TOOLBOX实用指南施阳16快速提高四级听力能力 音带4盒贺金安32快速提高四级听力能力贺金安32快速提高四级综合能力(一)陈广信32快速提高四级综合能力(一) 音带2盒陈广信32自适应控制及应用陈新海16水下自主航行器动力学模型吴旭光大32古希腊神话(英汉对照)折鸿雁大32骑士精神折鸿雁大32信息天国折鸿雁大32大学英语听读词库与测试——5000词 音带3盒阎传海32大学英语听读词库与测试——5000词阎传海32匿迹北方折鸿雁大32词汇·改错和文32技巧·训练 音带4盒袁森技巧·训练袁森32现代机电控制系统李诚人16大学英语精读(3)学习·巩固·提高韩晗16模拟题(四级) 音带3盘冯宗祥模拟题(四级)冯宗祥大32写得妙(四级)刘美岩大32阅读·简答寇菊霞32模拟题 音带4盒史燕燕模拟题史燕燕32听得准(四级) 音带5盘白靖宇听得准(四级)白靖宇大32词汇库(四级)阎传海大32与死同生折鸿雁大32新编中学英语语法精讲多练王丽萍大32虚拟现实折鸿雁大32找回夜晚折鸿雁大32人间斗士折鸿雁大32 AutoCAD 2000实用工程绘图凌晖16冲压工艺学吴诗惇16大学英语精读(2)学习·巩固·提高刘蔚铭16计算机集成制造系统(CIMS)严新民16高考 英语词汇速记手册张昊64中考 英语词汇速记手册张昊64概率论与数理统计冯子嘉大32美加风貌(英汉对照)陈德大32大学英语听读词库与测试——8000词 音带3盒王健32大学英语听读词库与测试——8000词王健32 WSK(EPT)最新英语水平应试指南——阅读徐衍大32 WSK(EPT)最新英语水平应试指南——词汇李新梅大32成语典故 (含节目音带2盒)杨玉明大32 WSK(EPT)最新英语水平应试指南——语法·完形·写作王改燕大32 WSK(EPT)最新英语水平考试模拟题集 音带3盒侯新民大32大学英语听读词库与测试——3000词曹勇32大学英语六级词汇测试柳瑾32WSK(EPT)最新英语水平考试模拟题集侯新民大32大学英语四级应试必备词汇手册刘淑颖窄32生活在美国(英汉对照)薛广历大32大学英语六级词汇理解、记忆手册封文和窄32风土人情 (含节目音带2盒)敦建勇大32大学英语听读词库与测试——3000词 音带3盒曹勇32数学 竞赛与考研应试指导龚冬保16 WSK(EPT)最新英语水平应试词汇手册贾超大32英语写作——遣词·造句·组段李晓宝大32 21世纪大学英语进阶阅读——初级本田德新大32 21世纪大学英语进阶阅读——中级本田德新大32 21世纪大学英语进行阅读——高级本田德新大32快速提高四级阅读能力田建国32数据库系统原理李战怀16英语语法精要张庭季32 Toeplitz矩阵类的快速算法徐仲大32大学英语四级词汇应试必读郑建新32合金钢与有色合金铸造郭鸿镇16机械制造工艺学荆长生16奇闻报道 (含节目音带2盒)冯玉屏大32英语词汇举一反三王新国32机械制图(含习题集)(非机类)西工大16高等数学(上、下册)冯振英32大学生法律概论高宝营大32道德与科技道德邹富汉32高等数学作业集(1~4)(第2版)教研室16设备综合管理学梁三星16英语写作——段落·短文(第2版)余宝珠大32多媒体技术基础及应用孙继银16数理统计编写组16线性代数作业集(A)(B)编写组16宏观经济理论白暴力大32名诗欣赏 (含节目音带2盒)黄震大32鱼雷弹道与弹道设计张宇文大32硕士研究生学位课程考试 英语统测试题集白靖宇16材料力学(Ⅰ)(Ⅱ)苟文选大32英美报刊阅读精选(一)王九萍大32硕士研究生学位课程考试 英语统测试题集 音带2盒白靖宇四级英语 短语 速记与自测关峰64 32位微型计算机原理接口技术及其应用史新福16大学英语时文读本(英汉对照)---- 一个笼罩美国的魔影袁行榘大32数字电子技术 常见题型解析及模拟题(第2版)王公望16现代电力电子工程周继华大32大学英语 模式写作——写作技巧·参考范文敦建勇大32模拟电子线路 常见题型解析及模拟题(第2版)张畴先16电路基础 常见题型解析及模拟题(第2版)王淑敏16大学英语 模式写作——议论文·说明文敦建勇大32英语写作——文学评论·作品赏析黄成洲大32译得绝(四级)田艳大32复合材料中的边界元法田宗若大32工程力学(静力学、动力学、运动学)(新编工科力学系列教材)王虎16 GPS在飞行器定位导航中的应用袁建平大32旅游英语听读500句 音带1盒刘葳《高级英语(上册)》 同步训练与仿真试题权培民大32旅游英语听读500句刘葳窄32商贸英语听读500句朱林海窄32商贸英语听读500句 音带1盒朱林海《高级英语(上册)》 同步训练与仿真试题权培民大32读得快(六级)洪卫大32词汇库(六级)张宏伟大32普通化学(第2版)编写组16语法桥(四级)许德发大32听得准(六级) 音带5盒缪菁大32听得准(六级)缪菁大32写得妙(六级)高瑜大32大学英语精读(4)学习·巩固·提高韩晗16模拟题(六级)马刚大32长输管道自动化技术江秀汉16复杂相似组合系统的鲁棒全息控制理论与设计严星刚大32高中英语听力同步训练(高中第二册)(下)余宝珠16模拟电子技术基础实验(含实验报告书)邵舒渊16英语写作——信函·申请·证件余宝珠大32高中英语听力同步训练(高中第一册)(下)余宝珠16高中英语听力同步训练(高中第一册)(下) 音带3盒余宝珠同等学历人员申请硕士学位 英语全国统考题库白靖宇16电工技术(电工学Ⅰ) 常见题型解析及模拟题(第2版)朱建堃16高中英语听力同步训练(高中第二册)(下) 音带3盒余宝珠同等学历人员申请硕士学位 英语全国统考题库 音带3盒白靖宇控制工程导论(修订版)周雪琴16民航维修无损检测与故障诊断朱名铨32同等学历人员申请硕士学位 英语全国统考题库白靖宇16数字电子技术基础实验(含实验报告书)邵舒渊16同等学历人员申请硕士学位 英语全国统考专项训练白靖宇16同等学历人员申请硕士学位 英语全国统考专项训练白靖宇16英美报刊阅读精选(二)常晓梅大32读得快(四级)张奕大32实验力学(新编工科力学系列教材)别永顺16地球村签证——轻松跨越文化鸿沟田德新大32先进控制理论与方法导论章卫国16畅谈英语角(初级本)游晓晔大32线性代数 例题 习题 试题与解答秦静大32鱼雷控制系统计算机辅助分析设计与仿真徐德民16新一代可编程计算机控制器技术齐蓉16畅谈英语角(初级本) 音带2盒游晓晔大32畅游英语角(中级本)游晓晔大32四级词汇 精辨强记董俊虹窄32四级词汇 智能测试刘蔚铭窄32四级词汇 全面记忆刘蔚铭窄32畅游英语角(中级本) 音带2盒游晓晔大32硕士研究生学位课程考试、同等学力人员申请硕士学位英语应试词汇必备朱泽生16导弹引论赵育善16澳新风貌(英汉对照)张前大32西方 文学 名著选读 (下卷)杜瑞清大32西方 文学 名著选读 (上卷)杜瑞清大32考研 数学 常见题型分析及模拟试题(第3版)王寿生16西方 文化 名著选读 (下卷)杜瑞清大32科技英语写作——写作技巧·范文李民权大32西方 文化 名著选读 (上卷)杜瑞清大32数字图像处理导论赵荣椿16最新可编程控制器教程齐蓉16。

TABLE OF CONTENTS 说明书

TABLE OF CONTENTS 说明书

Object and Getting Started 1Mario Party-e Base Set 1Number of Players2Play Areas & Game Terms3Nintendo e-Reader5Game Play 6Your Turn6Hand Card Rules7Winning the Game 7Card T ypes 8Coin Cards & Item Cards8Superstar Cards & Blocker Cards9Search Cards, Chaos Cards & Duel Cards10e-Challenge Cards (11 total)11Free Challenge Cards12Wonder Challenge Cards & Duel Challenge Cards13MINI-GAME INSTRUCTIONS 15Free Challenge15PRINCESS PEACH Card - Cast Away Mario!15GRACEFUL PRINCESS PEACH Card - Mario’s Mallet 16DAISY Card - Daisy’s Rodeo!17YOSHI Card - Fast Feed Yoshi!18Wonder Challenge 19LAKITU Card - Lakitu’s Luck 19BOWSER Card - Spinister Bowser 19Duel Challenge 20BIG BOO Card - Bolt from Boo 20WALUIGI Card - Time Bomb Ticks!21SUPER WALUIGI Card - Waluigi’s Reign 22WARIO Card - Wario’s Bluff 23SUPER WARIO Card - Balloon Burst!24QUESTIONS & ANSWERS 25Be the first player to play a Superstar card.A base set of Mario Party-e cards contains the following:• 24 green Coin cards• 12 purple Item cards (4 Superstar’s Shoes cards,4 Superstar’s Clothes cards, and 4 Superstar’s Hat cards)• 4 rainbow Superstar cards• 5 blue Blocker cards ObjectFor 2 to 4 players / Ages 6 & upGetting StartedMario Party-e Base Set (64 cards total)• 4 pink Search cards • 10 red Chaos cards• 5 yellow Duel cardsThe number of cards used in each game will vary depending on thenumber of people playing.For a two-player game , use 58 cards. Remove 2 each of the Superstar Item cards (Superstar’s Shoes, Superstar’s Clothes, and Superstar’s Hat) from the base set.For a three-player game , use 61 cards. Removing 1 each of the Superstar Item cards (Superstar’s Shoes, Superstar’s Clothes, and Superstar’s Hat) from the base set.For a four-player game , use all 64 cards in the base set. To play with more than4 players, use a second set of Mario Party-e cards. Make sure toremove Superstar Item cards depending on the number of players.The players can decide how many Item cards to play with.Number of PlayersHand CardsThe Hand cards are the cards each player holds in their hands.A player can only have 5 cards before and after their turn. You may look at your Hand cards, of course, but you cannot look atyour opponent’s Hand cards.DeckThe Deck is the face-down pile of cards that have not been played. Each player draws a card from the deck at the beginning of their turn.Discard PileThe Discard Pile is the face-up pile of cards that have been played. Any player can look at the cards in the Discard Pile at any time.Each Player has 4 play areas.In-Play CardsIn-Play cards are the cards that are placed face-up in front of each player. The In-Play cards are either Coin cards or Superstar Item cards.Play Areas & Game Terms1. Shuffle the cards and distribute 5 cards to each player. These cards are called your Hand cards and should be viewed by the player only.2. Place all remaining cards face-down on the center of the table. This will be the Deck.3. The youngest player goes first and play moves clockwise (from left to right).1. Draw a card from the Deck.2. Choose one card to Play or Discard.• If you play a Coin or Item card, place it face-up in front of you. The card is now In-Play.• If you choose any other card, place it face-up on the table and follow the instructions on the card. When the instructions have been followed, place the card face-up in the Discard Pile.• If you don’t have a card that can be played, discard one card face-up in the Discard Pile.3. Play continues clockwise until someone places a Superstar card In-Play to win the game.Game PlayTo get the most out of Mario Party-e, make sure you havea Nintendo e-Reader handy.* Scan e-Challenge cards and test your mettle at all 11 unique Mini-Games. You musthave speed, skill, coordination and evenluck to come out on top.For more detailed information on how to use the e-Reader,consult the instruction booklet that comes withthe e-Reader.*Mario Party-e can be played with or without the e-Reader (sold separately).Nintendo e-ReaderYour TurnWinning the GameTo win the game, be the first player to place a Superstar card In-Play. Before playing a Superstar card, you must haveeach of the 3 different Superstar Item cards In-Play (1 Superstar’sShoes, 1 Superstar’s Clothes, and 1 Superstar’s Hat).Each player can only have 5 cards in their Hand before and after their turn. Each player must Draw a card and Play or Discard a card on every turn.WHEN THE DECK HAS BEEN DEPLETED, RESHUFFLE THE DISCARD PILE AND PLACE FACE-DOWN FOR A NEW DECK.Hand Card RulesThere are three types of Item cards: Superstar’s Shoes, Superstar’s Clothes, and Superstar’s Hat. Each Item card will require 2 Coin cards to be In-Play. Before playing an Item card, you must first place 2 In-Play Coin cards face-up on the Discard Pile.Each of the 3 types of Item cards must be In-Play before a Superstar card can be played to win the game.Some cards require Coin cards to be In-Play before they can be used. The smallcoin icon on the card to be played determines how many In-Play Coin cards are needed. Placethe required In-Play Coin cards face-up on the Discard Pile before playing the card. There is no limit to the number of Coin cards a player can have In-Play.Hint:Coin cards should be the first cards to be placed In-Play.Card T ypesItem Cards (12 total)Coin Cards (24 total)A Blocker card can be used to prevent an opponent from taking your In-Play or Hand cards. All Blocker cards require 1 In-Play Coincard to play.Superstar Cards (4 total)Blocker Cards (5 total)Place this card In-Play to win the game!A Superstar card can also be used to take 1Item card from your opponent’s In-Play cards and add it to your In-Play cards.A Chaos card can be used to take or exchange In-Play or Hand cards with other players. The YOSHI card requires 2 In-Play Coin cards. If you don’t have enough In-Play Coin cards to play, you may play a Free-Challenge Mini-Game on the e-Reader.Search Cards (4 total)Chaos Cards (10 total)A Search card allows you to take cards from the Deck or Discard Pile and exchange them with your Hand cards. All Search cards require In-Play Coin cards to play except for the LAKITU card.Duel Cards (5 total)A Duel card can be used to battle another player in a Mini-Game (using an e-Reader and Game Boy Advance) for In-Play or Hand cards. The SUPER WARIO card and SUPER WALUIGI card require In-Play Coin cards to play. If you don’t have the e-Reader, the duel can be decided by a coin toss.NOTE:The SUPER MARIO,SUPER LUIGI and DONKEY KONG Blocker cards allow the player to make a counter move. Please note,the counter move will cost an additional In-Play Coin card. After playing a Blocker card, draw a card from the Deck to maintain a Hand of 5 cards. A Blocker card can be discarded during your turn without costing a Coin card.Free Challenge cards allow a player to take or exchange cards with another player, or from the Discard or Deck piles depending on the individual card. All Free Challenge cards require the player to use In-Play Coin cards. Youmust first place the required number of Coin cards face-up on the Discard Pile and follow theinstructions on the card. If you do not have the required number of Coin cards but still would like to play your card, you can declare “Free Challenge” and play the Mini-Game on the e-Reader. Turn on the Game Boy Advance, insert the e-Reader, and proceed to the Scan Card screen. Scan both sides of the card and follow instructions on the screen. (Consult your e-Reader instruction booklet for more information). If you win the Mini-Game on the e-Reader, you can play the card following the instructions on the card. If NOTE:If the Player has enough In-Play Coin cards they must use the Coin cards and cannot play the e-Reader Free Challenge.e-Challenge cards allow you to play a Mini-Game on a Game Boy Advance with an e-Reader.There are three types of e-Challenge cards: Free Challenge cards, Wonder Challenge cards and Duel Challenge cards.e-Challenge Cards (11 total)Free Challenge Cards (4 total)See pg.15 for Mini-Game instructionsWonder Challenge cards give the player the opportunity to play roulette with the Game Boy Advance and the e-Reader and take a chance on the outcome. Scan the card and follow the instructions to play. If you don’t have the e-Reader, play the card following the instructions on the card.Duel Challenge cards can be used tobattle another player for In-Play or Hand cards. The player using the Duel card will select any player to duel.NOTE:The SUPER WARIO and SUPER WALUIGI cards require Coin cards to play.The Challenger must first place the required number of Coin cards face-up on the Discard Pile. Follow the instructions on the card after completing the duel.If no player has the e-Reader, the duel can be decided by a coin toss. The player using the Duel card will select an opponent to duel. The player will toss a coin into the air and the opponent will call heads or tails. The side facing up when the coin lands will determine the winner of the duel. Follow the instructions on the card after completing the duel.Wonder Challenge Cards (2 total)Duel Challenge Cards (5 total)See pg.20 for Mini-Game instructionsPRINCESS PEACH cardCAST AWAY MARIO!Description of the Game:Mario must catch the fish that Princess Peach requests without touching the wrong fish. Press the A Button to lower the magic hand. If you touch the wrong fish the game is over. If you catch thefish that Princess Peachrequests, you win the game.How to Play:Press theA Button to lower themagic hand.Free Challenge GRACEFUL PRINCESS PEACH cardMARIO’S MALLETDescription of the Game:Press the A Button when the numbers flash todetermine the number of Goombas to whack. Smash the Goombas asthey emerge from the pipe, being careful not to hit Luigi. Get all theGoombas before the Goombas get the princess!How to Play:Press the A Button to swing the mallet.YOSHI cardFAST FEED YOSHI!Description of the Game:While the Coins and Shy Guys are spinning, use the A Button to lash out at theCoins with Yoshi’s tongue. Get 2 Coins in three or fewer tries to win the game. Time your lash carefully. Some coins are worth double!How to Play:Press the A Button to stick out Yoshi’s tongue.DAISY card DAISY’S RODEO!Description of the Game:Keep Daisy in the saddle of Bowser’s rodeo machine by pressing the L, R, or B Buttons when they are displayed on the screen. Stay on for 10 seconds to win the game. If you miss two times in a row, the game is over.How to Play:Press the displayed Button to keep Daisy in the saddle.BIG BOO cardBOL T FROM BOODescription of the Game:Mario has to get out of the haunted house without being caught by Boo. When Mario runs, Boo chases.When Mario stops, Boo shrinks back. The player that gets closest to the door or the player with the best time wins the game.How to Play:Press theA orB Button repeatedly to make Mario run.1920Duel ChallengeBOWSER cardSPINISTER BOWSERDescription of the Game:Press the A Button to stop the spinning wheel. When it stops, follow the instructions on screen.How to Play:Press the A Button to stop or delay the roulette KITU cardLAKITU’S LUCKDescription of the Game:Press the A Button to stop the spinning wheel. When it stops, follow the instructions on screen.How to Play:Press the A Button to stop or delay the roulette wheel.Wonder ChallengeSUPER WALUIGI cardWALUIGI’S REIGNDescription of the Game:Direct Mario across the screen, collecting coins and avoidingWaluigi’s hammers. You get 1 point for every yellow coin and 5 points for every red coin. Your turn ends when the timer runs out or when Mario gets hit by a hammer. The player with the better score wins.How to Play:Press the + Pad to move Mario.WALUIGI card TIME BOMB TICKS!Description of the Game:Player 1 sets the bomb by pressing the switches in order from 01 to 16. The time it takes to set all 16 switches is registered on the timer.Player 2 must then deactivate all the switches before the clock counts back down to zero. Each wrong numberpressed will cost precious time so be careful! If the bomb explodes, Player 1 wins the game.If the bomb is deactivated, Player 2 wins.How to Play:Press the + Pad to choose the numberand the A Button to push the switch.2122SUPER WARIO cardBALLOON BURST!Description of the Game:Challenger and opponent take turns pumping up a Wario balloon until itexplodes. Get it as big as possible without bursting. Player who pops the balloon loses the game.How to Play:Press and hold the A Button (maximum 3seconds per hold) to fill the balloon.WARIO card WARIO’S BLUFFDescription of the Game:Drive Wario and his car to the edge of the cliff without plunging off.The player that gets closest to the edge is the winner.How to Play: Press the A Button to accelerateand the B Button to brake.2324QUESTIONS & ANSWERS1. When my opponent plays a card that affects all players such as BOB-OMB, can I use a Blocker card? Answer: No.You can only use Blocker cards when your opponent is playing a card directly against you.2. When my opponent plays Duel cards such as SUPER WARIO, can I use Blocker cards such as MARIO and DONKEY KONG even after I lose the duel?Answer: No.You can only use Blocker cards before the duel starts.3. When I tried to take my opponent’s Hand cards, they used a DONKEY KONG Blocker card to counter and took my Hand cards. Could I use SUPER MARIO to take cards from my opponent?Answer: Yes. You can use Blocker cards against Blocker cards.4. My opponent tried to take my In-Play cards, so I am thinking about using SUPER MARIO and adding 1 In-Play Coin card to take my opponent’s Hand or In-Play cards. Can I look at my opponent’s Hand cards first before taking one of his or her In-Play cards?Answer: No.You must declare which cards, In-Play or Hand, you will take when playing the SUPER MARIO card. Once you play the card, you cannot change your choice.5. GRACEFUL PRINCESS PEACH can be used to take a card from the Deck or Discard Pile. Can I take a card from the Discard Pile after checking the Deck?Answer: No.You must declare which cards, Deck or Discard, you will search before playing the GRACEFUL PRINCESS PEACH card. Once you play the card, you cannot change your choice.6. I challenged my opponent to a Mini-Game using the BIG BOO card but they used SUPER MARIO to defend their Coin cards. Additionally, they added 1 In-Play Coin card to take my In-Play card. Can I still play the Mini-Game to prevent them taking my In-Play card?Answer: No.You cannot play the Mini-Game. Your BIG BOO card is no longer in effect because your opponent used a Blocker card. You can only counter with another Blocker card.7. If an e-Reader is being used in the game, can I choose NOT to use it?Answer: No.If an e-Reader is available and has been used once in the game, it must be used for alle-Challenges.8. Can I have the same Item card In-Play more than once?Answer: Yes.Although you only need one of each Item card to win the game, you can have more than one Superstar’s Shoes, Superstar’s Clothes, or Superstar’s Hat In-Play. You may want to have extra Item cards In-Play in case another player takes one.2526Instruction BookletThis official seal is your assurance thatNintendo has reviewed this product and that it has met our standards forexcellence in workmanship, reliability and enertainment value. Always look forthis seal when buyinggames and accessories to ensure complete compatibility with your Nintendo product.All Nintendo products are licensed by sale for use only with other authorizedproducts bearing the Official Nintendo Seal of Quality.producerSATOSHI YAMATO directorTORU OSAWAtechnical supportNOBUHITO KOGANEZAWA DAISUKE TSUJIMURA card game design HITOSHI IMAMOTO HIDEYUKI HASHIMOTO NORIYUKI NIWA e-application director MASANOBU SUZUI e-application planning MITSURU SHINOHARA YU ONODAHIROTAKA WATANABEartworkYOSHITAKA NISHIKAWA NARUHISA KAWANO MOTOKI FUJITAYOSHITOMO KITAMURA AKI OHSUMI YASUHIKO IKEDA translationKEITA NAKAMURA special thanks MAKOTO KANOH SUPER MARIO CLUB executive producer SATORU IWATAe-application design NOBUAKI TANAKA YASUHIRO NAKAMURA GIICHIRO MATSUMOTO e-application programming KEIJI HARA MASARU ARAIMAKOTO NAKAJIMA original characters SHIGERU MIYAMOTO HIROJI KIYOTAKE graphic support YOICHI KOTABE ATSUSHI TEJIMACREDITSALL RIGHT, INCLUDING THE COPYRIGHTS OF GAME, SCENARIO,MUSIC AND PROGRAM, RESERVED BY NINTENDO.。

她吃完晚饭后写作业英语

她吃完晚饭后写作业英语

She finished her dinner and then proceeded to do her homework in English.After enjoying a hearty meal,she cleared the table and made her way to the study area.She took out her English textbook and opened it to the page where her assignment was listed. The task for the evening was to complete a set of exercises focusing on verb tenses and sentence structure.She began by reading through the instructions carefully to ensure she understood what was required.The first exercise involved converting sentences from the present simple tense to the past simple tense.She carefully selected the appropriate past tense forms of the verbs,making sure to consider regular and irregular verbs.Next,she tackled a series of fillintheblank questions where she had to insert the correct form of the verb to complete the sentences.This exercise tested her knowledge of different verb tenses,including the present continuous,past continuous,and future simple. As she progressed through the homework,she moved on to a section that required her to rewrite sentences in the passive voice.She identified the subject,verb,and object in each sentence and rearranged them to create a passive construction.After completing the exercises,she moved on to a reading comprehension task.She read a short passage about Englishspeaking countries and then answered a series of questions about the content.This helped her to improve her reading skills and understanding of English vocabulary.Finally,she worked on a writing task where she had to compose a short essay in English on a given topic.She brainstormed ideas,organized them into a coherent structure,and then wrote the essay,ensuring that her grammar and spelling were correct. Throughout the process,she took breaks when needed to maintain her focus and ensure the quality of her work.By the end of the evening,she had successfully completed her English homework,feeling a sense of accomplishment and readiness for the next days lessons.。

Table of Contents Table of Contents i

Table of Contents Table of Contents i

3 Non-stationary Heat Equation Case 3.1 Statement of the Problem and Result . . . . . . . . . . . . . . . . . . . . . 3.2 Pre-indicator Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 1 Dimensional and Time-independent Case . . . . . . . . . . . . . . . . . . 3.4 1 Dimensional and Time-dependent Case . . . . . . . . . . . . . . . . . . . 3.5 Proof of Runge’s Approximation Theorem Based on Hahn-Banach Theorem
RECONSTRUCTION OF INCLUSIONS FOR THE INVERSE BOUNDARY VALUE PROBLEM OF HEAT EQUATION USING PROBE METHOD
By Yuki Daido
SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN SCIENCE AT HOKKAIDO UNIVERSITY WEST 8, NORTH 10, KITA-KU, SAPPORO, 060-0810, JAPAN MARCH 2006
4 Numerical Realization 4.1 Realization in 1 Dimensional Time-independent Case . . . . . . . . . . . . . . . . . . 4.2 Discrete Scheme for Indicator Function . . . . . . . . . . . . . . . . . . . . . . . . . . Bibliography

Summary+Table+of+Four+Tenses+in+Primary+School+Eng

Summary+Table+of+Four+Tenses+in+Primary+School+Eng

Usage
Use the present continuous tense to talk about actions that are happening right now
Use it to talk about routing or behavioral actions
Use it to talk about actions that are happening at the same time as the conversation or writing
played outside."
To create narratives or stories, such as "Once upon a
time, there was a little girl named Alice."
Example
"I played tennis yesterday."
"They had a pic in the park last month."
Summary Table of Four Tenses in Primary Scho汇报o人l: Eng
2024-01-08
contents
目录
• Present continuous tense • Past tense • Future tense • Perfect tense
01
Present continuous tense
Use it to talk about future plans or arrangements
Example
I am studying English right now (Action happening at the presentation moment)
相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Table of English TensesTenseSignal wordsUseFormExamples affirmative Examples negative Examples interrogative I work . I don't work . Do I work ? He work s . He doesn't work . Does he work ? I go .I don't go .Do I go ?Simple Present orPresent Simpleevery daysometimesalwaysoftenusuallyseldomneverfirst ... thensomething happens repeatedlyhow often something happensone action follows anotherthings in generalafter the following verbs (to love, to hate, to think, etc.)future meaning: timetables, programmesinfinitive he/she/it + -sHe go es .He doesn't go .Does he go ?I'm work ing . I'm not work ing . Am Iwor k ing ? He's work ing . He isn't work ing . Is hework ing ? I'm go ing . I'm not go ing . Am I go ing ? PresentProgressive orPresent Continuousnowat the momentLook!Listen!something ishappening at thesame time of speaking or around itfuture meaning: when you have already decided andarranged to do it (a fixed plan, date) to be (am/are/is) + infinitive + -ing He's go ing .He isn't go ing . Is he go ing ? I work ed .I didn't work . Did I work ? He work ed . He didn't work . Did he work ? I went .I didn't go . Did I go ? Simple Past or Past Simplelast ...... agoin 1990yesterdayaction took place in the past, mostly connected with anexpression of time (no connection to the present)regular:infinitive + -edirregular:2nd column of table of irregular verbsHe went .He didn't go . Did he go ? I was work ing . I wasn't work ing . Was I work ing ? He was work ing . He wasn't work ing . Was he work ing ? I was go ing . I wasn't go ing . Was I go ing ? PastProgressive or Past Continuouswhilean action happened in the middle of another action someone was doing sth. at a certain time (in the past) - you do not know whether it was finished or notwas/were + infinitive + -ing He was go ing . He wasn't go ing . Was he go ing ? I have work ed . I haven't work ed . Have I work ed ? He has work ed .He hasn't work ed . Has he work ed ? I have gone .I haven't gone .Have I gone ?Simple Present Perfect orPresent Perfectjustyetnevereveralreadyso far,up to now,since forrecently you say that sth. has happened or isfinished in the past and it has aconnection to the presentaction started in the past and continues up to the presenthave/has + past participle **(infinitive + -ed ) or (3rd column of table of irregular verbs)He has gone . He hasn't gone . Has he gone ?I have been work ing . I haven't been work ing . Have I been work ing ? He has been work ing .He hasn't been work ing . Has he been work ing ? I have been go ing . I haven't been go ing .Have I been go ing ? Present Perfect Progressive or Present PerfectContinuousall daythe whole dayhow longsince foraction began in the past and has just stoppedhow long the actionhas been happeningemphasis: length of time of an action have/has + been +infinitive + -ingHe has been go ing . He hasn't been go ing .Has he been go ing ? I had work ed .I hadn't work ed . Had I work ed ? He had work ed . He hadn't work ed . Had he work ed ? I had gone . I hadn't gone .Had I gone ?Simple Past Perfect or Past Perfect (Simple)alreadyjustnevermostly when twoactions in a story are related to each other: the action which had already happened is put into Past Perfect, the other action into Simple Pastthe past of the Present Perfecthad + past participle **(infinitive + -ed ) or (3rd column of table of irregular verbs)He had gone .He hadn't gone . Had he gone ?I had been work ing .I hadn't been work ing . Had I been work ing ? He had been work ing .He hadn't been work ing .Had he been work ing ? I had been go ing . I hadn't been go ing . Had I been go ing ? Past Perfect Progressive or Past Perfect Continuoushow longsince forhow long something had been happening before something else happenedhad + been + infinitive + ing He had been go ing .He hadn't been go ing . Had he been go ing ? I 'll work . I won't work . Will I work ? He 'll work . He won't work . Will he work ? I 'll go .I won't go .Will I go ?will - futurepredictions about the future (you think that sth. will happen)you decide to do sth.spontaneously at the time of speaking, you haven't made a decision beforemain clause in type I of the if clauseswill + infinitive He 'll go . He won't go . Will he go ?I 'm going to work .I 'm not going to work .Am I go ing to work ? He 's going to work .He 's not going to work .Is he go ing to work ? I 'm going to go . I 'm not going to go . Am I go ing to go ?going to - futurewhen you havealready decided to do sth. in the futurewhat you think whatwill happenbe (am/are/is) + going to + infinitiveHe 's going to go .He 's not going to go .Is he go ing to go ? I 'll be work ing . I won't be work ing . Will I be work ing ? He 'll be work ing . He won't be work ing .Will he be work ing ? I 'll be go ing . I won't be go ing . Will I be go ing ? Future Progressive or Future ContinuousAn action will be in progress at a certain time in the future. This action has begunbefore the certaintime.Something happens because it normally happens.will + be + infinitive + ing He 'll be go ing .He won't be go ing . Will he be go ing ? I 'll have work ed .I won't have work ed . Will I have work ed ? He 'll have work ed . He won't have work ed .Will he have work ed ? I 'll have gone .I won't have gone . Will I have gone ? Simple Future Perfect orFuture Perfect Simplesth. will already have happened before a certain time in the futurewill + have + past participle **(infinitive + -ed ) or (3rd column oftable of irregular verbs)He 'll have gone .He won't have gone . Will he have gone ? I 'll have been work ing .I won't have been work ing .Will I have beenw ork ing ?He 'll have been work ing .He won't have beenwork ing .Will he havebeenwork ing ? I 'll have been go ing .I won't have been go ing .Will I have beenwork ing ?Future PerfectProgressive or Future PerfectContinuoussth. will already have happened before a certain time in the futureemphasis: length of time of an actionwill + have + been + infinitive + ing He 'll have been go ing .He won't have beengo ing .Will he havebeenwork ing ? I would work .I wouldn't work .Would I work ? He would work . He wouldn't work . Would he work ? I would go . I wouldn't go . Would I go ? Conditional Simplesth. that might happen main clause in type II of the if-clauseswould + infinitive He would go . He wouldn't go .Would he go ?I would be work ing .I wouldn't be work ing . Would I be work ing ? He would be work ing .He wouldn't be work ing .Would he be work ing ? I would be go ing . I wouldn't be go ing . Would I be go ing ? Conditional Progressive orConditional Continuoussth. that might happenemphasis: length of time of an actionwould + be +infinitive + ingHe would be go ing .He wouldn't be go ing .Would he be go ing ? I would have work ed . I wouldn't have work ed .Would I have work ed ? He would have work ed .He wouldn't have work ed .Would he havework ed ? Conditional Perfectsth. that might have happened in the past (It's too late now.)main clause in type III of the if clauseswould + have + past participle **(infinitive + -ed ) or (3rd column of table of irregular verbs)I would have gone .I wouldn't haveWould I havegone. gone?He would have gone. He wouldn't havegone.Would I havegone?I would have been work ing. I wouldn't havebeen work ing.Would I havebeenwork ing?He wouldhave been go ing. He wouldn't havebeen go ing.Would hehave beenwork ing?I would have been go ing. I wouldn't havebeen go ing.Would I havebeen go ing?Conditional Perfect ProgressiveorConditional Perfect Continuous sth. that might havehappened in the past(It's too late now.)emphasis: length oftime of an actionwould + have +been + infinitive +ingHe would have beengo ing.He wouldn't havebeen go ing.Would hehave beengo ing?。

相关文档
最新文档