A Model-based Methodology for Application Specific Energy Efficient Data Path Design using

合集下载

国际支付与结算课后答案8-13

国际支付与结算课后答案8-13

Chapter Seven1. Fill in the blanks to complete each sentence.(1) completeness, correctness, consistency(2) underlying transaction(3) authorized signatures, test key(4) comply with(5) ISO currency code2. Translate the following terms or sentences into English.(1) 信用证表面的真实性〖the apparent authenticity of the credit 〗(2) 标准国际银行惯例〖international standard banking practice〗(3) 信息交换系统〖data communication network 〗(4) 有足够的资金来支付信用证〖to have sufficient funds to cover the credit〗(5) 买方考虑自己的要求也同样的重要〖It is equally importa nt that the buyer’s own requirements be taken into account.〗3. Decide whether the following statements are true or false.(1) F (2) F(3) F (4) T (5) T(6) T (7) F (8) T (9) F (10) T4. Choose the best answer to each of the following statements(1)-(5) CDCBC (6)-(10) CAADD(11)-(15) ADDABChapter Eight1. Define the following terms:(1) Commercial invoice 〖The commercial invoice is the key accounting document describing the commercial transaction between the buyer and the seller. It is a document giving details of goods, service, price, quantity, settlement terms and shipment. 〗(2) Export license 〖An export license is a document prepared by a government authority of a nation granting the right to export a specific quantity of a commodity to a specified country. 〗(3) Bill of lading 〖A bill of lading is a document issued by a carrier to a shipper, signed by the captain, agent, or owner of a vessel, providing written evidence regarding receipt of the goods, the conditions on which transportation is made, and the engagement to deliver goods at the prescribed port of destination to the lawful holder of the bill of lading. 〗(4) Inspection certificate 〖A document issued by an authority indicating that goods have been inspected prior to shipment and the results of the inspection. 〗(5) Consular invoice 〖A consular invoice is an invoice covering a shipment of goods certified in the country of export by a local consul of the country for which the merchandise is destined. 〗II. Translate the following into English:(1) 战略产品〖strategic commodity〗(2) 普惠制〖General System of Preference〗(3) 有预订的泊位〖with reserved berth〗(4) 多式联运提单〖multi-modal transport bill of lading〗(5) 抽样方式〖sampling methodology〗3. Decide whether the following statements are true or false.(1) F (2) F(3) T (4) T (5) F(6) F (7) F (8) T (9) T (10) F4. Choose the best answer to each of the following statements(1)-(5) ABDAC (6)-(10) CCCDA(11)-(15) DDAAA(16)-(20) ABACDChapter Nine1. Fill in the blanks to complete each sentence.(1) acceptable accounts receivable / non-recourse and notification(2) collection as well as the risk of credit losses(3) the level of sales(4) changes in the world economic structure(5) growing demands(6) purchasing the client’s accounts receivables(7) financial and administration(8) the invoice date / the customer makes his payment(9) market conditions and his assessment of the risks involved in a particular transaction(10) fluctuations in the exchange rate / in the status of the debtor2. Define the following terms(1) Factoring is a form of trade financing that allows sellers to sell their products to overseas buyers essentially on an open account basis. In simple terms, factoring is the purchase of claims, arising from sales of goods, by a specialized company known as factoring company or factor. Factoring is in fact a three-party transaction between the factor and a business entity, i.e. the exporter selling goods or providing services to foreign the importer.(2) Forfaiting is the term generally used to denote the purchase of obligations falling due at some future date, arising from deliveries of goods and services--mostly export transactions--without recourse to any previous holder of the obligation. Simply speaking, forfaiting is the business of discounting medium-term promissory notes or drafts related to an international trade transaction.3. Translate the following terms into English.(1)或有负债contingent liability (2)信用额度credit limit(3)卖方信贷supplier credit (4)无追索权的without recourse(5)信用审定credit approval (6)资本货物capital goods(7)买方信贷担保buyer credit guarantee (8)福费廷融资便利forfaiting facility (9)贸易壁垒trade barrier (10)大宗采购折扣bulk purchase discount 4. Choose the best answer to each of the following statements(1) B (2)A(3) D (4) C (5) DChapter 101. Fill in the blanks to complete each sentence.(1) secure mechanism for payment / default instrument(2) party tendering / the contract has been awarded(3) presentation of the beneficiary’s demand and stipulated documentation(4) issue a guarantee directly to the beneficiary(5) Unconditional bonds(6) withdraw its bid / accept the award of contract in its favor / between 2% and 5%(7) UCP for documentary credits / Uniform Rules for Demand Guarantee.(8) An advance payment(9) borrower (the principal) / the lender (the beneficiary)(10) counter indemnity2. Define the following terms(1) A bank guarantee is an instrument for securing performance or payment especially in international business. It is a written promise issued by a bank at the request of its customer, undertaking to make payment to the beneficiary within the limits of a stated sum of money in the event of default by the principal. It may also be defined as an independent obligation where the guarantor has to make a special agreement with its customer, ensuring that it will be refunded by him for any payment to be effected under the contract of guarantee.(2) A beneficiary is the party in whose favor the guarantee is issued. He is secured against the risk of the principal’s not fulfilling his obligations towards the beneficiary in respect of the underlying transaction for which the demand guarantee is given. He will not obtain a sum of money if the obligations are not fulfilled.(3) An indirect guarantee is a guarantee where a second bank, usually a foreign bank located in the beneficiary’s country of domicile, will be requested by the initiating bank to issue a guarantee in return for the latter’s counter-guarantee.(4) A performance bond is an undertaking given by the guarantor at the request of a supplier of goods or services or a contractor to a buyer or beneficiary, whereby the guarantor undertakes to make payment to the beneficiary within the limit of a stated sum of money in the event of default by the supplier or the contractor in due performance of the terms of a contract between the principal and the beneficiary.(5) A standby letter of credit is a clean letter of credit that generally guarantees the payment to be made for an unfulfilled obligation on the part of the applicant. It is payable on presentation of a draft together with a signed statement or certificate by the beneficiary that the applicant has failed to fulfill his obligation.3. Translate the following terms into English.(1)履约保函performance bond (2)担保书,保函letter of guarantee(3)反赔偿counter indemnity (4)附属保函accessory guarantee(5)备用信用证stand-by letter of credit (6)工程承包engineering contracting(7)基础交易underlying transaction (8)见索即付保函demand guarantee(9)延期付款保函deferred payment bond (10)反担保counter guarantee4. Choose the best answer to each of the following statements(1)-(5) BAADC (6)-(10) BCDBAChapter 111. Fill in the blanks to complete each sentence.(1) collection operations for drafts and for documentary collections(2) all collections / collection instruction(3) all Documentary Credits / Credit(4) all Bank-to-Bank Reimbursements / Reimbursement Authorization.(5) any demand guarantee and amendment thereto / Guarantee or any amendment thereto.(6) documents / goods / terms and conditions(7) codification of rules / banking practice regarding documentary credits(8) international finance, trade, transportation and computer technology(9) quite different from the practice of guarantee / banking and commercial(10) bank-to-bank reimbursements2. Translate the following terms into English.(1)索偿reimbursement claim(2)仲裁书arbitral award(3)银行委员会banking commission(4)多式联运multi-model transport(5)偿付保证reimbursement undertaking(6)银行惯例banking practices(7)集装箱运输containerized traffic(8)非转让运输单据non-negotiable waybill(9)远期托收提示tenor collection presentation(10)国际商会International Chamber of Commerce4. Choose the best answer to each of the following statements.(1) B (2) D (3) C (4) A(5) DChapter 121. Fill in the blanks to complete each sentence.(1) payment information / transfer value(2) confirmation number / confirmation help and notification(3) for procedures and message formats / computer readable(4) information / value / net amount(5) high speed and accuracy(6) access to the system for the settlement of international money transfers(7) faster, more reliable communication / lower transmission costs(8) the international clearing house(9) standardized formats(10) Clearing House Automated Payment System / CHIPS2. Define the following terms(1) A payment system is the means whereby cash value i s transferred between a payer’s bank account and a payee’s bank account.(2) SWIFT (Society for Worldwide Inter-bank Financial Telecommunication) is a computerized international telecommunications system which, through standardized formatted messages, rapidly processes and transmits financial transactions and information among its members around the world.(3) CHIPS (Clearing House Inter-bank Payment System) is a pseudo-wire system in New Y orkCity that handles an enormous volume of cash flow between local financial institutions. CHIPS is a settlement system involving primarily about 135 New Y ork City financial institutions and is operated by the New Y ork Clearing House Association.(4) Clearing House Automated Payments System (CHAPS) is a system of sending and clearing payments on a same-day basis that is available nationwide in Britain and is operated by a number of settlement banks that communicate directly through computers.(5) Fed Wire is a fund-transfer system operated nationwide in the USA by the Federal Reserve System (the Fed, Central Bank of the USA) that handles transfer from one financial institution to another with an account balance held with the Fed.3. Translate the following terms into English.(1) 现金头cash positions(2) 簿记入账bookkeeping entry(3) 金融中介financial intermediary(4) 客户汇款customer transfers(5) 账目核对account reconciliation(6) 联储银行支付系统Fed Wire(7) 非结算银行non-settlement bank(8) 资金调拨系统fund transfer system(9) 次支付体系secondary payment system(10) 储备余额账户reserve balance account(11) 自动票据交换所automated clearing house(12) 银行头寸调拨financial institution transfers(13) 非盈利性合作协会non-profit cooperative society(14) 外汇买卖和存放款foreign exchange deal and loan(15) 票据交换所银行同业清算系统Clearing House Inter-bank Payments System4. Decide whether the following statements are true or false.(1) T (2) T (3) F (4) T (5) F5. Choose the best answer to each of the following statements.(1) B (2)A(3)D (4) B (5) CChapter 131. Fill in the blanks to complete each sentence.(1) purchaser or the holder / replaced(2) clerk or the teller / a small commission(3) the initial signature / the countersignature(4) banking instruments / retailing(5) (assigned) merchant(6) annual income and the credit standing(7) issuance, application and clearing(8) consumer’s credit / current account(9) separate listing of their cheque numbers(10) paying the bill in full / drawing revolving credit2. Define the following terms(1) A traveler’s cheque is a specially printed form of cheque issued by a financial institution,leading hotels, and other agencies in preprinted denominations for a fixed amount to a customer for use when he is going to travel abroad. A traveler’s cheque is actually a draft of a bank or other agency, which is self-identifying and may be cashed at banks, hotels, etc., either throughout the world or in particular areas only.(2) A paying agent is one that undertakes by arrangement with the issuer to pay the latter’s traveler’s cheques when presented by the holder.(3) Credit cards are instruments issued by banks to carefully selected customers with a line of credit ranging from several hundred to several thousand dollars based on the latter’s financial status for use in obtaining, on credit, consumer goods, services and other things when necessary.(4) A cardholder is the customer who has a current account with the card-issuing bank and whose credit is good, and who based on his financial status can obtain, on credit, consumer goods, services and other things when necessary.(5) A merchant is a store, hotel or restaurant that is bound to have a pre-arrangement with the card-issuing bank and is willing to accept the credit card for payment of commodities sold or services rendered3. Translate the following terms into English.(1) 初签initial signature(2) 入会费entrance fee(3) 销售代理selling agent(4) 商户assigned merchant(5) 旅行支票traveler’s cheque(6) 购货收据purchase receipt(7) 往来账户current account(8) 签购单,购物单sales slip(9) 兑付代理人paying agent(10) 会员费membership dues/fee(11) 消费者信贷consumer’s credit(12) 签字印鉴authorized signature(13) 美国运通卡American Express Card(14) 非贸易结算non-trade settlement(15) 零售银行业务retailing banking business4. Decide whether the following statements are true or false.(1) T (2)F (3)T (4) T (5)F5. Choose the best answer to each of the following statements.(1) B (2) D (3) A(4) C (5) BChapter 141. Fill in the blanks to complete each sentence.(1) medium of high-speed digital transactions(2) business-to-business commerce / its breadth of coverage and ease of use(3) Putting up a Web site / luring online shoppers in(4) “e-cash”, “cyber-money”(5) stored-value products and access products (such as a bank A TM card)(6) transfer of financial value(7) advertising purposes(8) phone orders and credit card orders(9) digital signatures(10) debit card account.2. Define the following terms(1) Electronic commerce is the ability to purchase goods and services electronically over the Internet from around the world at any time of day or night.(2) Cyber-payment means the methods that have been implemented to transfer money, new methods of financial transactions as today banks already can transfer money with computers. (3) SET is a single technical standard for safeguarding credit (and in the near future debit) card purchases made over the open networks of the Internet. It is an international protocol that details how credit card (and debit card) transactions on the Internet will be secured using encryption technology and digital certification.(4) A digital signature is a way to encrypt a message so that the recipient can decode it and be certain of the authenticity of the transaction.(5) Smart cards are micro- processor-equipped cards that work with card readers installed in the computers of consumers.3. Translate the following terms into English.(1) 电子支付cyber-payment(2) 电子现金e-cash(3) 信用额度line of credit(4) 数字化货币digital currency(5) 电子钱包electronic wallet(6) 自动出纳机automated teller machine(7) 商务的全球化globalization of commerce(8) 个人身份识别号personal identification number(9) 微芯片埋置式灵通卡microchip-embedded smart card(10) 电子交易安全标准Secured Electronic Transactions Standards(11) 电子商务electronic commerce(12) 加密的磁条encoded magnetic stripe(13) 存取设备access device(14) 借记卡debit card(15) 虚拟指纹virtual fingerprint4. Decide whether the following statements are true or false.(1) F (2) T (3) T (4) F (5)T(6) T (7) T (8) F (9) F (10) F5. Choose the best answer to each of the following statements.(1) A(2) B (3) C (4) D (5) D(6) C (7) B (8) A(9) D (10) B。

英文翻译

英文翻译

A Facial Aging Simulation Method Using flaccidity deformation criteriaAlexandre Cruz Berg Lutheran University of Brazil.Dept Computer ScienceRua Miguel Tostes, 101. 92420-280 Canoas, RS, Brazil berg@ulbra.tche.br Francisco José Perales LopezUniversitat les Illes Balears.Dept Mathmatics InformaticsCtra Valldemossa, km 7,5E-07071 Palma MallorcaSpainpaco.perales@uib.esManuel GonzálezUniversitat les Illes Balears.Dept Mathmatics InformaticsCtra Valldemossa, km 7,5E-07071 Palma MallorcaSpainmanuel.gonzales@uib.esAbstractDue to the fact that the aging human face encompasses skull bones, facial muscles, and tissues, we render it using the effects of flaccidity through the observation of family groups categorized by sex, race and age. Considering that patterns of aging are consistent, facial ptosis becomes manifest toward the end of the fourth decade. In order to simulate facial aging according to these patterns, we used surfaces with control points so that it was possible to represent the effect of aging through flaccidity. The main use of these surfaces is to simulate flaccidity and aging consequently.1.IntroductionThe synthesis of realistic virtual views remains one of the central research topics in computer graphics. The range of applications encompasses many fields, including: visual interfaces for communications, integrated environments of virtual reality, as well as visual effects commonly used in film production.The ultimate goal of the research on realistic rendering is to display a scene on a screen so that it appears as if the object exists behind the screen. This description, however, is somewhat ambiguous and doesn't provide a quality measure for synthesized images. Certain areas, such as plastic surgery, need this quality evaluation on synthesized faces to make sure how the patient look like and more often how the patient will look like in the future. Instead, in computer graphics and computer vision communities, considerable effort has been put forthto synthesize the virtual view of real or imaginary scenes so that they look like the real scenes.Much work that plastic surgeons put in this fieldis to retard aging process but aging is an inevitable process. Age changes cause major variations in the appearance of human faces [1]. Some aspects of aging are uncontrollable and are based on hereditary factors; others are somewhat controllable, resulting from many social factors including lifestyle, among others [2].1.1.Related WorkMany works about aging human faces have been done. We can list some related work in the simulation of facial skin deformation [3].One approach is based on geometric models, physically based models and biomechanical models using either a particle system or a continuous system.Many geometrical models have been developed, such as parametric model [4] and geometric operators [5]. The finite element method is also employed for more accurate calculation of skin deformation, especially for potential medical applications such as plastic surgery [6]. Overall, those works simulate wrinkles but none of them have used flaccidity as causing creases and aging consequently.In this work is presented this effort in aging virtual human faces, by addressing the synthesis of new facial images of subjects for a given target age.We present a scheme that uses aging function to perform this synthesis thru flaccidity. This scheme enforces perceptually realistic images by preserving the identity of the subject. The main difference between our model and the previous ones is that we simulate increase of fat and muscular mass diminish causing flaccidity as one responsible element for the sprouting of lines and aging human face.In the next section will plan to present the methodology. Also in section 3, we introduce the measurements procedure, defining structural alterations of the face. In section 4, we present a visual facial model. We describe age simulation thrua deformation approach in section 5. In the last section we conclude the main results and future work.2.MethodologyA methodology to model the aging of human face allows us to recover the face aging process. This methodology consists of: 1) defining the variations of certain face regions, where the aging process is perceptible; 2) measuring the variations of those regions for a period of time in a group of people and finally 3) making up a model through the measurements based on personal features.That could be used as a standard to a whole group in order to design aging curves to the facial regions defined.¦njjjpVM2.1Mathematical Background and AnalysisHuman society values beauty and youth. It is well known that the aging process is influenced by several parameters such: feeding, weight, stress level, race, religious factors, genetics, etc. Finding a standard set of characteristics that could possibly emulate and represent the aging process is a difficult proposition.This standard set was obtained through a mathematical analysis of some face measurements in a specific group of people, whose photographs in different ages were available [7]. To each person in the group, there were, at least, four digitized photographs. The oldest of them was taken as a standard to the most recent one. Hence, some face alterations were attained through the passing of time for the same person.The diversity of the generated data has led to the designing of a mathematical model, which enabled the acquiring of a behavior pattern to all persons of the same group, as the form of a curve defined over the domain [0,1] in general, in order to define over any interval [0,Į] for an individual face. The unknown points Įi are found using the blossoming principle [8] to form the control polygon of that face.The first step consisted in the selection of the group to be studied. Proposing the assessment of the face aging characteristics it will be necessary to have a photographic follow-up along time for a group of people, in which their face alterations were measurable.The database used in this work consisted of files of patients who were submitted to plastic surgery at Medical Center Praia do Guaíba, located in Porto Alegre, Brazil.3.MeasurementsAccording to anatomic principles [9] the vectors of aging can be described aswhich alter the position and appearance of key anatomic structures of the face as can be shown in figure 1 which compares a Caucasian mother age 66 (left side) with her Caucasian daughters, ages 37 (right above) and 33 (right below) respectively.Figure 1 - Observation of family groupsTherefore, basic anatomic and surgical principles must be applied when planning rejuvenative facial surgery and treating specific problems concomitantwith the aging process.4.Visual Facial ModelThe fact that human face has an especially irregular format and interior components (bones, muscles and fabrics) to possess a complex structure and deformations of different face characteristics of person to person, becomes the modeling of the face a difficult task. The modeling carried through in the present work was based on the model, where the mesh of polygons corresponds to an elastic mesh, simulating the dermis of the face. The deformations in this mesh, necessary to simulate the aging curves, are obtained through the displacement of the vertexes, considering x(t) as a planar curve, which is located within the (u,v ) unit square. So, we can cover the square with a regular grid of points b i,j =[i/m,j/n]T ; i=0,...,m; j=0,...,n. leading to every point (u,v ) asfrom the linear precision property of Bernstein polynomials. Using comparisons with parents we can distort the grid of b i,j into a grid b'i,j , the point (u,v )will be mapped to a point (u',v') asIn order to construct our 3D mesh we introduce the patch byAs the displacements of the vertexes conform to the certain measures gotten through curves of aging and no type of movement in the face is carried through, the parameters of this modeling had been based on the conformation parameter.4.1Textures mappingIn most cases the result gotten in the modeling of the face becomes a little artificial. Using textures mapping can solve this problem. This technique allows an extraordinary increase in the realism of the shaped images and consists of applying on the shaped object, existing textures of the real images of the object.In this case, to do the mapping of an extracted texture of a real image, it is necessary that the textureaccurately correspond to the model 3D of that is made use [9].The detected feature points are used for automatic texture mapping. The main idea of texture mapping is that we get an image by combining two orthogonal pictures in a proper way and then give correct texture coordinates of every point on a head.To give a proper coordinate on a combined image for every point on a head, we first project an individualized 3D head onto three planes, the front (x, y), the left (y, z) and the right (y, z) planes. With the information of feature lines, which are used for image merging, we decide on which plane a 3D-head point on is projected.The projected points on one of three planes arethen transferred to one of feature points spaces suchas the front and the side in 2D. Then they are transferred to the image space and finally to the combined image space.The result of the texture mapping (figure 2) is excellent when it is desired to simulate some alteration of the face that does not involve a type of expression, as neutral. The picture pose must be the same that the 3D scanned data.¦¦¦ mi nj lk n j m i lk k j i w B v B u B b w v u 000,,)()()(')',','(¦¦ m i nj n jmij i v B u B b v u 00,)()(),(¦¦ m i nj n j m i j i v B u B b v u 00,)()(')','(¦¦¦ mi nj lk n j m i lk k j i w B v B u B b w v u 000,,)()()(')',','(Figure 2 - Image shaped with texturemapping5.Age SimulationThis method involves the deformation of a face starting with control segments that define the edges of the faces, as¦¦¦ mi nj lk n j m i lk k j i w B v B u B b w v u 000,,)()()(')',','(Those segments are defined in the original face and their positions are changed to a target face. From those new positions the new position of each vertex in the face is determined.The definition of edges in the face is a fundamental step, since in that phase the applied aging curves are selected. Hence, the face is divided in influencing regions according to their principal edges and characteristics.Considering the face morphology and the modeling of the face aging developed [10], the face was divided in six basic regions (figure 3).The frontal region (1) is limited by the eyelids and the forehead control lines. The distance between these limits enlarges with forward aging.The orbitary region (2) is one of the most important aging parameters because a great number of wrinkles appears and the palpebral pouch increases [11]. In nasal region (3) is observed an enlargement of its contour.The orolabial region (4) is defined by 2 horizontal control segments bounding the upper and lower lips and other 2 segments that define the nasogenian fold. Figure 3 - Regions considering the agingparametersThe lips become thinner and the nasogenian fold deeper and larger. The mental region (5) have 8 control segments that define the low limit of the face and descend with aging. In ear curve (6) is observed an enlargement of its size. The choice of feature lines was based in the characteristic age points in figure 6.The target face is obtained from the aging curves applied to the source face, i.e., with the new control segment position, each vertex of the new image has its position defined by the corresponding vertex in the target face. This final face corresponds to the face in the new age, which was obtained through the application of the numerical modeling of the frontal face aging.The definition of the straight-line segment will control the aging process, leading to a series of tests until the visual result was adequate to the results obtained from the aging curves. The extremes of the segments are interpolated according to the previously defined curves, obtained by piecewise bilinear interpolation [12].Horizontal and vertical orienting auxiliary lines were defined to characterize the extreme points of the control segments (figure 4). Some points, that delimit the control segments, are marked from the intersection of the auxiliary lines with the contour of the face, eyebrow, superior part of the head and the eyes. Others are directly defined without the use of auxiliary lines, such as: eyelid hollow, eyebrow edges, subnasion, mouth, nasolabial wrinkle andnose sides.Figure 4 - Points of the control segmentsOnce the control segments characterize the target image, the following step of the aging process can be undertaken, corresponding to the transformations of the original points to the new positions in the target image. The transformations applied to the segments are given by the aging curves, presented in section 4.In the present work the target segments are calculated by polynomial interpolations, based on parametric curves [12].5.1Deformation approachThe common goal of deformation models is to regulate deformations of a geometric model by providing smoothness constraints. In our age simulation approach, a mesh-independent deformation model is proposed. First, connected piece-wise 3D parametric volumes are generated automatically from a given face mesh according to facial feature points.These volumes cover most regions of a face that can be deformed. Then, by moving the control pointsof each volume, face mesh is deformed. By using non-parallel volumes [13], irregular 3D manifolds are formed. As a result, smaller number of deformvolumes are necessary and the number of freedom incontrol points are reduced. Moreover, based on facialfeature points, this model is mesh independent,which means that it can be easily adopted to deformany face model.After this mesh is constructed, for each vertex on the mesh, it needs to be determined which particularparametric volume it belongs to and what valueparameters are. Then, moving control points ofparametric volumes in 3D will cause smooth facialdeformations, generating facial aging throughflaccidity, automatically through the use of the agingparameters. This deformation is written in matricesas , where V is the nodal displacements offace mesh, B is the mapping matrix composed ofBernstein polynomials, and E is the displacementvector of parametric volume control nodes.BE V Given a quadrilateral mesh of points m i,j ,, we define acontinuous aged surface via a parametricinterpolation of the discretely sampled similaritiespoints. The aged position is defined via abicubic polynomial interpolation of the form with d m,n chosen to satisfy the known normal and continuity conditions at the sample points x i,j .>@>M N j i ,...,1,...,1),(u @@>@>1,,1,),,( j j v i i u v u x ¦3,,),(n m n m n m v u d v u x An interactive tool is programmed to manipulate control points E to achieve aged expressions making possible to simulate aging through age ranges. Basic aged expression units are orbicularis oculi, cheek, eyebrow, eyelid, region of chin, and neck [14]. In general, for each segment, there is an associated transformation, whose behavior can be observed by curves. The only segments that do not suffer any transformation are the contour of the eyes and the superior side of the head.5.2Deformation approachThe developed program also performs shape transformations according to the created aging curves, not including any quantification over the alterations made in texture and skin and hair color. Firstly, in the input model the subjects are required to perform different ages, as previouslymentioned, the first frame needs to be approximately frontal view and with no expression.Secondly, in the facial model initialization, from the first frame, facial features points are extracted manually. The 3D fitting algorithm [15] is then applied to warp the generic model for the person whose face is used. The warping process and from facial feature points and their norms, parametric volumes are automatically generated.Finally, aging field works to relieve the drifting problem in template matching algorithm, templates from the previous frame and templates from the initial frame are applied in order to combine the aging sequence. Our experiments show that this approach is very effective. Despite interest has been put in presenting a friendly user interface, we have to keep in mind that the software system is research oriented. In this kind of applications an important point is the flexibility to add and remove test facilities. 6.Results The presented results in the following figuresrefer to the emulations made on the frontalphotographs, principal focus of this paper, with theobjective to apply the developed program to otherpersons outside the analyzed group. The comparisonswith other photographs of the tested persons dependon their quality and on the position in which theywere taken. An assessment was made of the new positions, of the control segments. It consisted in: after aging a face, from the first age to the second one, through the use of polynomial interpolation of the control segments in the models in the young age, the new positions are then compared with the ones in the model of a relative of older age (figure 5). The processed faces were qualitatively compared with theperson’s photograph at the same age. Figure 5 - Synthetic young age model,region-marked model and aged modelAlso the eyelid hollow, very subtle falling of the eyebrow, thinning of the lips with the enlarging of the nasion and the superior part of the lip, enlargingof the front and changing in the nasolabial wrinkle.7.ConclusionsModelling biological phenomena is a great deal of work, especially when the biggest part of the information about the subject involves only qualitative data. Thus, this research developed had has a challenge in the designing of a model to represent the face aging from qualitative data.Due to its multi-disciplinary character, the developed methodology to model and emulate the face aging involved the study of several other related fields, such as medicine, computing, statistics and mathematics.The possibilities opened by the presented method and some further research on this field can lead to new proposals of enhancing the current techniques of plastic face surgery. It is possible to suggest the ideal age to perform face lifting. Once the most affected aging regions are known and how this process occurs over time. Also missing persons can be recognized based on old photographs using this technique. AcknowledgementsThe project TIN2004-07926 of Spanish Government have subsidized this work.8. References[1] Burt, D. M. et al., Perc. age in adult Caucasianmale faces, in Proc. R. Soc., 259, pp 137-143,1995.[2] Berg, A C. Aging of Orbicularis Muscle inVirtual Human Faces. IEEE 7th InternationalConference on Information Visualization, London, UK, 2003a.[3] Beier , T., S. Neely, Feature-based imagemetamorphosis, In Computer Graphics (Proc.SIGGRAPH), pp. 35-42, 1992.[4] Parke, F. I. P arametrized Models for FacialAnimation, IEEE Computer & Graphics Applications, Nov. 1982.[5] Waters, K.; A Muscle Model for Animating ThreeDimensional Facial Expression. Proc SIGGRAPH'87,Computer Graphics, Vol. 21, Nº4, United States, 1987. [6] Koch, R.M. et alia.. Simulation Facial SurgeryUsing Finite Element Models, Proceedings of SIGGRAPH'96, Computer Graphics, 1996.[7] Kurihara, Tsuneya; Kiyoshi Arai, ATransformation Method for Modeling and Animation of the Human Face from Photographs, Computer Animatio n, Springer-Verlag Tokyo, pp.45-58, 1991.[8] Kent, J., W. Carlson , R. Parent, ShapeTransformation for Polygon Objects, In Computer Graphics (Proc. SIGGRAPH), pp. 47-54, 1992. [9] Sorensen, P., Morphing Magic, in ComputerGraphics World, January 1992.[10]Pitanguy, I., Quintaes, G. de A., Cavalcanti, M.A., Leite, L. A. de S., Anatomia doEnvelhecimento da Face, in Revista Brasileira deCirurgia, Vol 67, 1977.[11]Pitanguy, I., F. R. Leta, D. Pamplona, H. I.Weber, Defining and measuring ageing parameters, in Applied Mathematics and Computation , 1996.[12]Fisher, J.; Lowther, J.; Ching-Kuang S. Curveand Surface Interpolation and Approximation: Knowledge Unit and Software Tool. ITiCSE’04,Leeds, UK June 28–30, 2004.[13]Lerios, A. et al., Feature-Based VolumeMetamorphosis, in SIGGRAPH 95 - Proceedings,pp 449-456, ACM Press, N.Y, 1995.[14]Berg, A C. Facial Aging in a VirtualEnvironment. Memória de Investigación, UIB, Spain, 2003b.[15]Hall, V., Morphing in 2-D and 3-D, in Dr.Dobb's Journal, July 1993.。

哈工大博士英语免试条件

哈工大博士英语免试条件

哈工大博士英语免试条件Harbin Institute of Technology (HIT) is one of the most prestigious universities in China, known for its excellence in engineering and technology. As an internationally renowned institution, HIT offers a wide range of programs for students seeking higher education. One of the most sought-after programs at HIT is the PhD in English, which provides an opportunity for students to pursue advanced research in the field of English language and literature. In this document, we will discuss the requirements and conditions for the HIT PhD in English program.To be eligible for the HIT PhD in English program, applicants must meet certain criteria. Firstly, applicants must hold a master's degree in a relevant field, such as English language, literature, or linguistics. This ensures that students have a solid foundation in the subject matter and are prepared for advanced research in their chosen area of specialization. Additionally, applicants must demonstrate a high level of proficiency in English, as all courses and research activities are conducted in English. This is assessed through standardized English language tests, such as the TOEFL or IELTS.Apart from the academic requirements, there are also certain non-academic criteria that applicants must fulfill. One of these is the submission of a research proposal. The research proposal should outline the applicant's research interests, objectives, and methodology. It should also demonstrate the feasibility and significance of the proposed research project. This is an important component of the application process, as it allows the admissions committee to assess the applicant's research potential and suitability for the program.In addition to the research proposal, applicants are also required to submit their academic transcripts, letters of recommendation, and a personal statement. The academic transcripts provide a record of the applicant's academic performance, while the letters of recommendation offer insights into the applicant's character, abilities, and potential for research. The personal statement allows applicants to express their motivations for pursuing a PhD in English and how the program aligns with their career goals.Once the application materials have been submitted, they undergo a rigorous evaluation process. The admissions committee carefully reviews each application, taking into consideration the academic qualifications, research potential, and overall fit with the program. Shortlisted candidates may be invited for an interview, where they will have the opportunity to further discuss their research interests and goals.It is important to note that the HIT PhD in English program does not require a separate entrance examination. Instead, the admissions committee evaluates the applicants based on their academic qualifications, research potential, and other application materials. This approach aims to provide equal opportunities for all qualified applicants, regardless of their performance in a standardized test.In conclusion, the HIT PhD in English program is a highly competitive and prestigious program that offers students the opportunity to pursue advanced research in the field of English language and literature. To be eligible for this program, applicants must meet certain academic and non-academic criteria, including holding a relevant master's degree, demonstrating proficiency in English, submitting a research proposal, academic transcripts, letters of recommendation, and a personal statement. The application materials undergo a rigorous evaluation process, and shortlisted candidates may be invited for an interview. By meeting the requirements and conditions of the HIT PhD in English program, students can embark on a rewarding academic journey and contribute to the advancement of knowledge in the field of English studies.。

Vibration control of an MR vehicle suspension system

Vibration control of an MR vehicle suspension system
shing Ltd Printed in the UK
0964-1726/09/125010+14$30.00
Smart Mater. Struct. 18 (2009) 125010
S-B Choi et al
stiffness model of an MR damper and they verified it using simulation and experiment. Du et al [6] proposed an Hinfinity control algorithm for a vehicle MR damper and verified its effectiveness using simulation. Shen et al [7] proposed load-leveling suspension with a magnetorheological damper. Pranoto et al [8] proposed a two degrees of freedom (2DOF)type rotary MR damper and verified its efficiencies. Ok et al [9] proposed cable-stayed bridges using MR dampers and verified their effectiveness using a semiactive fuzzy control algorithm. Choi et al [10] manufactured an MR damper for a passenger vehicle and presented a hysteresis model for predicting the field-dependent damping force. Hong et al [11] derived a nondimensional Bingham model for an MR damper and verified its effectiveness through experimental investigation. Yu et al [12] developed a human simulated intelligent control algorithm and successfully applied it to vibration control of vehicle suspension featuring MR dampers. The above review indicates that some works have considered the hysteretic behavior of MR dampers to improve control accuracy while some works have considered the parameter variation of the system to improve control robustness. However, the hysteresis and the parameter variation have been treated independently. Recently, Song et al [13, 14] proposed a nonlinear model-based adaptive control algorithm for an MR suspension system considering both the hysteresis and unknown or/and varying parameters of the system. In their work, the adaptive system stability has been proved by converting the hysteresis of the MR damper to a memoryless nonlinearity. In this work, we propose a different control strategy considering both hysteresis of the MR damper and parameter variation of the suspension system. Especially, we consider the hysteretic behavior of the MR damper due to the applied magnetic field. In other words, we consider the hysteresis in the domain of damping force versus input current instead of damping force versus piston velocity. It is well known that MR fluid itself exhibits the field-dependent hysteresis [15]. Thus this behavior should be accommodated in a control system to achieve more effective vibration control performance. The proposed control algorithm is established by formulating a robust H∞ controller and integrating it with the hysteretic compensator. The H∞ controller is synthesized by adopting the loop shaping design procedure, while the hysteretic compensator is formulated by adopting a Preisach hysteresis model which can be experimentally identified using the firstorder descending (FOD) curves. In order to demonstrate the effectiveness and robustness of the proposed control strategy, the hardware-in-the-loop simulation (HILS) methodology is used which interacts between the vehicle suspension model (software) and the MR damper (hardware). Control responses such as vertical acceleration are evaluated and presented in time and frequency domains.

my model的英语作文

my model的英语作文

When writing an essay in English about My Model,its important to consider the context in which the term model is being used.Here are a few different approaches you might take,depending on the specific meaning of model in your essay:1.A Role Model:Begin by introducing who your role model is and why they are important to you. Discuss the qualities and achievements of your role model that you admire. Explain how their actions or life story has influenced your own life or goals.Example Paragraph:My role model is Malala Yousafzai,a Pakistani activist for female education and the youngest Nobel Prize laureate.Her courage and determination to fight for girls education rights in the face of adversity have deeply inspired me.Malalas story has taught me the importance of standing up for what I believe in,even when it is difficult.2.A Fashion Model:Describe the physical attributes and style of the model.Discuss the impact they have had on the fashion industry or their unique contributions to it.Explain why you find their work or presence in the industry notable.Example Paragraph:Kendall Jenner is a fashion model who has made a significant impact on the industry with her unique style and presence.Her tall and slender physique,combined with her ability to carry off diverse looks,has made her a favorite among designers and fashion enthusiasts alike.I admire her for her versatility and the way she uses her platform to promote body positivity.3.A Model in Science or Technology:Introduce the model as a theoretical framework or a practical tool used in a specific field.Explain the principles behind the model and how it is applied.Discuss the benefits or limitations of the model and its implications in the real world.Example Paragraph:The Standard Model in physics is a theoretical framework that describes three of the four known fundamental forces excluding gravity and classifies all known elementary particles.It has been instrumental in understanding the behavior of subatomic particles and predicting the existence of new particles,such as the Higgs boson.However,the models inability to incorporate gravity or dark matter has led to ongoing research for amore comprehensive theory.4.A Model in Business or Economics:Introduce the business or economic model and its purpose.Explain how the model works and the strategies it employs.Discuss the success or challenges associated with the model and its potential for future growth.Example Paragraph:The subscriptionbased business model has become increasingly popular in recent years, particularly in the software panies like Adobe have transitioned from selling packaged software to offering services on a subscription basis,allowing for continuous revenue streams and a more predictable income.This model has been successful in fostering customer loyalty and providing a steady income,although it requires ongoing innovation to maintain customer interest.5.A Model in Art or Design:Describe the aesthetic or functional qualities of the model.Discuss the creative process or design principles that inform the model.Explain the cultural or historical significance of the model and its influence on contemporary art or design.Example Paragraph:The Eames Lounge Chair,designed by Charles and Ray Eames,is a model of modern furniture that has become an icon of midcentury design.Its elegant form,made from molded plywood and leather,exemplifies the designers commitment to blending comfort with aesthetics.The chairs timeless appeal has made it a staple in both residential and commercial settings,influencing countless furniture designs that followed. Remember to structure your essay with a clear introduction,body paragraphs that develop your points,and a conclusion that summarizes your main e specific examples and evidence to support your claims,and ensure your writing is clear,concise, and engaging.。

A Model-Based Workflow Approach for Scientific Applications

A Model-Based Workflow Approach for Scientific Applications

A Model-Based Workflow Approach for Scientific Applications Leonardo Salayandía, Paulo Pinheiro da Silva, Ann Q. Gates, Alvaro Rebellon The University of Texas at El Paso, Computer Science DepartmentEl Paso, TX, 79902, USA{leonardo, paulo, agates, arebellon}@AbstractProductive design of scientific workflows often depends on the effectiveness of the communication between the discipline domain experts and computer scientists, including their ability to share their specific needs in the design of the workflow. Discipline domain experts and computer scientists, however, tend to have distinct needs for designing workflows including terminology, level of abstraction, workflow aspects that should be included in the design. This paper discusses the use of a Model-Based Workflow (MBW) approach as an abstract way to specify workflows that conciliate the needs of domain and computer scientists. Within the context of GEON, an NSF cyberinfrastructure for Earth Sciences, the paper discusses the benefits of using a Gravity Map MBW generated from an ontology about gravity. The Gravity Map MBW is based on terms derived from the gravity ontology that was developed by geophysicists; it does not include some of the workflow properties that tend to make workflow specifications look too complex for discipline domain experts to understand; and it provides a framework for developing strategies to derive executable Gravity Map workflow encodings with only limited interaction from computer scientists.1IntroductionWorkflows specify the composition of software services, including data and control flow, to achieve a particular result or complete a task. In the case of scientific applications, the design of a workflow typically requires the involvement of at least two domain experts—one from the scientific field of interest (e.g., a geophysicist or biologist) to specify how scientific products (e.g., maps, graphs, data analysis reports) may be derived from datasets and another from a computer scientist, who understands the process of composing a workflow and encoding the derivation in a format that machines can execute.Productive design of scientific workflows often depends on the effectiveness of the communication between the discipline domain experts and computer scientists—in particular, on their ability to clarify and reconcile their specific needs in the design of the workflow. Because domain experts and computer scientists have distinct terminology to describe workflow elements, including requirements, effective communication is a challenge. For instance, domain experts may base their workflow descriptions on objects of complex types that the computer scientist may not know how to translate to primitive types that are supported by executable workflow languages such as OWL-S [1] and MoML [2].A domain expert’s workflow description is often more abstract than a computer scientist’s encodings of a workflow. Additional communication problems arise when the domain expert is expected to understand and further refine workflow specifications prepared by computer scientists. At the same time, computer scientists need to understand the entailments of the domain expert’s abstract workflow if computer scientists (with the help of software systems) are supposed to translate the abstract descriptions into executable workflows. For instance, domain experts may be concerned with the specification of partially ordered sequences ofservices even if such sequences of service do not provide a perfect matching between services’ inputs and outputs. In this case, abstract specifications may require further refinement by computer scientists to be executed, e.g., the workflows may require additional steps such as translation services to match input and output information from services.In this paper we discuss the use of a M odel-B ased W orkflow (MBW) as a means to increase productivity during the design of workflows in support of scientific applications. Following the reasoning from the D omain-S pecific M odeling (DSM) community [3], MBW is also about using a level of abstraction for modeling workflows that is consistent with the target domain, and then using such models (at best) to automatically generate executable workflows, that is, workflow implementations, or (at least) to guide the development of workflow implementations. In this paper we focus on the latter. We present the W orkflow-D riven O ntology (WDO) approach1 to describe the domain and how WDOs can be used to create MBWs. In a scientific domain with the WDO approach in combination with the service-oriented paradigm, we claim that we diminish the intervention of computer scientists on the software development process by providing tools for domain-experts to produce specifications using the expert’s discipline-specific terminology that the computer scientist can employ to create the service-oriented modules necessary to achieve the intended results.The remainder of this paper is organized as follows. Section 2 describes the technologies involved in representing and executing scientific workflows. Section 3 presents our approach for building model-based workflows and is exemplified through a use case. Section 4 discusses further benefits of model-based workflows when compared to approaches to develop scientific workflows. Section 5 summarizes the paper and identifies future work.2BackgroundService Oriented Architectures (SOA), in combination with scientific workflows and ontologies are being used in efforts such as GEON to create cyberinfrastructure [4] that will provide the necessary tools to drive the next generation of scientific research. By developing service-oriented components, the scientific community is developing independent and distributed modules of functionality that are accessible and reusable through the web. Service-orientation enhances the design of low-coupled components by hiding implementation details from users and exposing only an interface specification that serves as a contract between service providers and service users. Ontologies are used first as “an explicit specification of a conceptualization” [6]. Later, they are used to support the composition and matching of services.Scientific workflows are used to specify the composition of such service modules to achieve some complex scientific endeavor. There are many workflow specification languages and execution engines. Here we mention two: MoML and OWL-S. MoML or the Mo deling M arkup L anguage is the language used by the Kepler Scientific Workflow engine [5] and is a simple markup language that allows the specification of workflows that include actors and a director. Each actor carries on the execution of a step in the workflow, and the director gives the semantics of the control flow. With the Semantic Web as its basis, OWL-S [1] is a web service ontology that is based on the O ntology W eb L anguage (OWL). OWL-S provides a service provider with constructs to describe properties and the functionality of a service in an unambiguous manner that is interpretable by a machine. OWL-S is composed of three different parts: the service profile that provides additional information about the services, such as functionality, inputs and outputs; the process model that provides information about 1 /ciminer/wdo/how services are composed into a workflow; and the grounding that presents details about how to access the service.Ontologies are used to describe knowledge about a domain such that its representation can be interpreted and reasoned about by a computer. W orkflow-D riven O ntology (WDO) is an ontology design approach to represent knowledge about scientific domains that thus make them amenable to creating scientific workflows [7]. WDO-specific tools such as the WDO Assistant are used for capturing knowledge. Use cases typically drive the specification of ontologies [8]. In the WDO approach, abstract workflow specifications drive the elicitation and specification of classes and their relationships. For example, domain experts begin the knowledge acquisition process by identifying a product and from the product identify methods that can generate the product. Further, domain experts can identify data that are required as input for the identified methods. We claim that abstract WDO-derived workflow specifications are indeed the use cases for WDOs. Such use cases are the basis to create Model-Based Workflows (MBWs) and these are further described in Section 3.2 below. Furthermore, a WDO is an OWL ontology and as such it can be used to represent knowledge that is not workflow-specific, including domain knowledge.3ApproachOnce a scientist has represented knowledge about a domain of interest by using the WDO approach, the scientist can extract abstract workflow specifications from the WDO that can serve as a guide to implement an application to produce desired information. These abstract workflows are referred to as M odel-B ased W orkflows (MBWs), and are created with the aid of workflow generator assistant software that can interpret the knowledge represented in a WDO. The scientist would identify the information desired from the WDO and the assistant software would then build an MBW to obtain the information based on the concepts and relationships defined in the WDO.The next section discusses a use case that is used to exemplify the approach, followed bya description of an MBW.3.1Use CaseAssume that a geoscientist wants to obtain a Contour Map of Bouguer Anomaly Gravity Data for a given region of interest. The scientist starts by obtaining a WDO that represents knowledge from the geophysics domain; more specifically about “gravity data.” By using assistant software, the scientist identifies Contour Map as the intended information desired, and the assistant software produces as many MBWs as possible from the captured knowledge that identify the abstract steps to produce the map. One of the possible MBWs, referred as the Gravity Map MBW, is shown in Figure 1.To show the relationship to the WDO, the workflow in Figure 1 is divided into two main sections. The left-hand side represents the classes of type Information that are associated with the workflow, and the right-hand side represents the classes of type Method that are involved in the transformation of the information required to achieve the desired outcome, i.e., a contour map. The left-hand side of the diagram is divided further into three sections: Product, Processed Dataset and Data. The distinction between these classes and their intention is explained elsewhere [7].Fig. 1: The Gravity Map MBW generated from the GravityWDO to produce a Simple Bouguer Anomaly Contour Map.The arrows in Figure 1 shows the data flow of the workflow as the information is transformed starting from information of type Simple Bouguer Anomaly Contour Map to Grid, and finally to Contour Map. The information is transformed through the application of the Gridding and Contouring Methods, respectively.3.2Model-Based Workflows (MBWs)MBWs are the resulting specifications obtained from a WDO to produce some information desired by the scientist. They are referred to as MBWs because the specifications use the knowledge represented by an ontology, and as a result, the terminology is based on the target domain, not computer science terminology.Scientific workflows typically involve the sequential transformation of information from a simple information type towards a more complex information type such as an end product. Each step is of the form:Output Info ← Method (Input Info List)Output Info defines the type of the information that will result once the Method of a step finishes execution. When an Output Info type is used as an Input Info type in a subsequent statement, it means that the resulting information from this statement is used as input to the subsequent step. Any Input Info types that are not bound by previously executing steps require that the user inputs the corresponding type when the execution reaches the given step.This simple “type-binding” mechanism illustrates the data flow of the workflow specification. The different types of information that will flow through the workflow are: datasets, products, and any other domain-specific concept defined in the WDO to clarify details about the workflow execution.For example, consider the “Contour Map” use case presented in the previous section. The MBW produced by the assistant software would be as shown in Figure 2. All the concepts inthe workflow specification are derived from the Gravity WDO.Grid ← Gridding (Simple Bouguer Anomaly, Region of Interest);Contour Map ← Contouring (Grid).Fig. 2: Model-Based Workflow specification to createa Simple Bouguer Anomaly Contour Map.Currently we are in the process of formalizing MBW’s as an ontology. It is our intension to utilize OWL as a base framework and to have a tight integration between MBW’s and our concurrent work on WDO’s. The ontology that will be used to represent MBW’s will include constructs to specify basic sequential control flow, as well as concurrent control flow to allow workflow specifications with partial order method execution.4DiscussionA vision of cyberinfrastructure efforts such as GEON [4] is to provide scientists with tools that would allow them to access and use resources to further their research, education, and professional goals. A short term goal and the focus of this work is to allow domain and computer scientists to communicate better to produce the desired software systems required for scientific endeavors in a more efficient manner. The longer term goal is to provide sophisticated tools that would allow scientists to accomplish their tasks with limited interaction with computer scientists, if any.Position1: MBWs provide a base for interaction between domain and computer scientists to facilitate communication towards implementing a workflow.MBWs allow domain scientists to specify their tasks using terminology with which they are familiar, while at the same time assisting computer scientists to understand what needs to be done to implement such specification. After a workflow specification is extracted from the WDO and represented as one or more MBWs, the domain and computer scientists work together to select and refine the MBWs, resulting in an executable specification of a desired system functionality.The conversion process from an MBW to an executable specification is not straightforward, since the MBW is at a higher level of abstraction and, as a result, will lack details necessary for implementation. For instance, in the Gravity Map MBW presented in Section 3.1, the scientist uses the term Region Of Interest as input for the Gridding method. This requires interaction between the domain and computer scientists to map the abstract data type to one or more primitive data types, e.g., Double, Integer, and String. In one context, a scientist may desire to represent the Region Of Interest as two points, i.e., the upper-left and lower-right coordinate values (Latitude/Longitude) of a rectangular area. The computer scientist may decide to represent the coordinate values with a Double primary data type. In a different context, the scientist may decide that the best representation of the Region Of Interest may be the name of a county or state. In this case, the computer scientist may choose to map the Region Of Interest to a String primary data type. In any case, with the help of MBWs, domain experts can specify and refine workflow specifications without specifying a type for the Region Of Interest concept or composing a complex type for this concept from the primitive types of a workflow language. Furthermore, existing implementations of the Gridding method may only handle Region Of Interest represented as a Latitude/Longitude coordinate value and a Radial Distance value. The domain and computer scientists would then have to decide whether to adapt to the existing resource restrictions, or to createadditional resources to convert the current needs to match the signature of the existing resources.Position2: While executable code cannot automatically be generated from MBWs, MBWs guide the code development process.OWL-S is one executable language that can be used to implement workflows from service-oriented components. Like other executable workflow languages, OWL-S is a sophisticated language that a domain scientist may find discouraging to learn, thus emphasizing the importance of Domain-Specific Modeling approaches. The process of creating an OWL-S workflow or composite service consists of 1) identifying the individual service components to be used in the workflow, and 2) creating the composition process for the workflow.OWL-S supports a mechanism to create semantic descriptions for service components through “profiles”. Following the SOA approach, it is the job of the service provider, who has knowledge of the implementation details of the service component, to provide the description “profile” to the service user, who remains unaware of the implementation details. Once the domain and computer scientists have refined the requirements of the service components to be involved in the implementation of the MBW, the identification of service components is done by matching the requirements to profile descriptions of service components.The composition process creation follows directly from the composition of methods involved in the MBW, in addition to any intermediary service components that the domain and computer scientists might have identified through the MBW refinement phase. For example, in the contour map use case, the workflow components are the Gridding and Contouring services, executed sequentially in that order, as described in the MBW.While tools exist that automatically generate executable scientific workflows from models, e.g., Kepler [5] generates MoML code from a graphical model, such tools do not support Domain-Specific Models, and as a result, lack the consequent benefits of DSM.Position3: MBWs open doors to additional work that will eventually result in scientists being able to produce workflows with only limited interaction from computer scientists.Additional complementing work can facilitate the workflow generation process for the scientist. One area that shows promise is preferences [9]. Preferences are useful whenever a user has to make a decision, and is an approach that can be used to filter through potentially many options. Preferences may apply both at the model level, as well as at the implementation level. For example, in the contour map use case, the scientist has to decide what is the best representation of the Region Of Interest for the context at hand. Once this decision is made, it can be documented as a preference to automate a similar decision for future development in the same context. Similarly, preferences can be captured for the decisions made by the computer scientist that map abstract information types to primary data types. The combination of preferences at all levels of abstraction brings the MBW approach closer to the ideal situation of automating code generation from domain-modeling.5SummaryThis paper introduced the use of Model-Based Workflow (MBW) approach to facilitate the design of scientific applications. Derived from Workflow-Driven Ontologies built bydomain experts, MBWs are described in terms that the experts can understand. Thus, domain experts can be more active in the process of improving workflow specifications and less dependent on their ability to communicate to computer scientists. Although MBWs are very abstract with respect to their implementations, they can still be used as a framework for computer scientists to build executable workflows.Previous work on expert systems has dealt with the problem of communicating domain knowledge to computer systems. Liou [10] breaks the expert system development effort into four primary tasks: acquiring knowledge from experts; representing that knowledge in a computer-readable form; implementing a prototype of the system; and verifying and validating the system. Even though our goal is not to develop expert systems but to develop scientific workflows, the tasks involved in expert system development contain some parallelism to our work. Our concurrent work on WDO’s [7] addresses the issues of knowledge acquisition and knowledge representation through the use of OWL ontologies. WDO’s also contemplate validation by allowing domain experts to review and provide feedback about the workflow generation process. The work discussed in this paper deals with prototype building based on the captured domain knowledge. Finally, other work on property specification and runtime monitoring of properties [11] complements the task of verification.6AcknowledgementsThis work is funded in part by the National Science Foundation (NSF) through grant NSF EAR-0225670. The authors would like to thank Dr. Randy Keller from the Geological Sciences Department at the University of Texas at El Paso for his valuable input in developing the gravity data ontology. Finally, the authors would like to acknowledge the recommendations of two anonymous referees.7References[1]“OWL-S: Semantic Markup for Web Services”, The OWL Services Coalition, December, 2003.[2] E.A. Lee, and S. Neuendorffer, “A Modeling Markup Language in XML – Version 0.4”,University of California at Berkley, Technical Report ERL-UCB-M-00-12, March 2000.[3]DSM Forum, /, August 2006.[4]The Geosciences Network: Building Cyberinfrastructure for the Geosciences,/, July 2006.[5] B. Ludäscher, I. Altintas, C. Berkley et al., “Scientific workflow management and the Keplersystem”, Concurrency and Computation: Practice and Experience, Special Issue on Workflow in Grid Systems, 18(10):1039-1065, 2005.[6]T.R. Gruber, “A Translation Approach to Portable Ontology Specification”, KnowledgeAcquisition 5(2):199-220, 1993.[7]L. Salayandia, P. Pinheiro da Silva, A.Q. Gates, and F. Salcedo, “Workflow-Driven Ontologies:An Earth Sciences Case Study”, University of Texas at El Paso, Department of Computer Science, Technical Report UTEP-CS-06-38, August 2006.[8]N.F. Noy, and D.L. McGuinness, “Ontology Development 101: A Guide to Creating Your FirstOntology”, Stanford Knowledge Systems Laboratory Technical Report KSL-01-05, March 2001. [9]M. Bienvenu, and S. McIlraith, “Specifying and Generating Preferred Plans”, SeventhInternational Symposium on Logical Formalizations of Commonsense Reasoning, May 2005. [10]Y.I. Liou, “Knowledge Acquisition: Issues, Techniques, and Methodology”, Proc. 1990 ACMSIGDBP conference on trends and directions in expert systems, pp. 212-236, 1990.[11]A.Q. Gates, S. Roach, I. Gallegos, O. Ochoa, and O. Sokolsky, “JavaMac and RuntimeMonitoring for Geoinformatics Grid Services”, Proc. 10th IEEE International Workshop on Object-oriented Real-time Dependable Systems, February, pp.125–136, 2005.。

高二英语数学建模方法单选题20题

高二英语数学建模方法单选题20题

高二英语数学建模方法单选题20题1. In the process of mathematical modeling, "parameter" means _____.A. a fixed valueB. a variable valueC. a constant valueD. a random value答案:A。

解析:“parameter”常见释义为“参数”,通常指固定的值,选项 A 符合;选项B“variable value”意为“变量值”;选项C“constant value”指“常数值”;选项D“random value”是“随机值”,在数学建模中“parameter”通常指固定的值。

2. When building a mathematical model, "function" is often used to describe _____.A. a relationship between inputs and outputsB. a set of random numbersC. a single valueD. a group of constants答案:A。

解析:“function”在数学建模中常被用来描述输入和输出之间的关系,选项 A 正确;选项B“a set of random numbers”表示“一组随机数”;选项C“a single value”是“单个值”;选项D“a group of constants”指“一组常数”。

3. In the context of mathematical modeling, "optimization" refers to _____.A. finding the best solutionB. creating a new modelC. changing the parameters randomlyD. ignoring the constraints答案:A。

manifold-based method

manifold-based method

manifold-based methodManifold-based methods refer to a class of algorithms used in machine learning and computer vision that aim to capture the underlying structure of high-dimensional data by modeling it as a low-dimensional manifold embedded in a higher dimensional space. These methods have gained popularity in recent years due to their ability to efficiently handle high-dimensional and complex data.One of the main benefits of manifold-based methods is that they can effectively deal with the curse of dimensionality. As the dimensionality of data increases, traditional algorithms may suffer from overfitting and become less efficient in capturing the underlying data structure. Manifold-based methods overcome this limitation by assuming that the data lies on a low-dimensional manifold, allowing for efficient representation and analysis of high-dimensional data.One widely used manifold-based method is manifold learning, which aims to discover the intrinsic geometric structure of the data manifold from the given high-dimensional data points. This approach is particularly useful when dealing with nonlinear and non-Gaussian data distributions. Common manifold learning algorithms include Isomap, Locally Linear Embedding (LLE), and t-Distributed Stochastic Neighbor Embedding (t-SNE).Isomap is a technique that uses geodesic distances to construct a neighborhood graph, allowing for the estimation of the low-dimensional embedding. It preserves the global geometry of the data manifold and is often used for visualization tasks. LLE, on theother hand, focuses on preserving the local structure of the data manifold by reconstructing each data point as a linear combination of its neighbors. It generates a lower-dimensional representation that reflects the intrinsic structure of the data manifold.t-SNE, a more recently developed technique, is particularly useful for visualizing high-dimensional data. It uses a probabilistic approach to construct a lower-dimensional embedding that preserves pairwise similarities between data points. It is widely used in tasks such as visualizing word embeddings in natural language processing and clustering analysis.In addition to manifold learning, manifold-based methods also include other techniques such as manifold regularization and manifold alignment. Manifold regularization aims to incorporate the manifold structure into traditional learning algorithms by adding a regularization term to the objective function. This encourages the learned model to respect the manifold structure and improves generalization performance. Manifold alignment, on the other hand, aims to align multiple data manifolds in different domains by finding a common low-dimensional subspace that captures the shared structure among them.Overall, manifold-based methods provide powerful tools for analyzing high-dimensional and complex data. By leveraging the underlying manifold structure, these methods facilitate efficient representation, visualization, and analysis of data. They have been successfully applied in various domains, including computer vision, natural language processing, and bioinformatics, leading to improved performance in a wide range of machine learning tasks.。

A sampling-based algorithm for multi-robot visibility-based pursuit-evasion

A sampling-based algorithm for multi-robot visibility-based pursuit-evasion

A Sampling-Based Algorithm for Multi-Robot Visibility-BasedPursuit-EvasionNicholas M.Stiffler Jason M.O’KaneAbstract—We introduce a probabilistically complete algo-rithm for solving a visibility-based pursuit-evasion problem in two-dimensional polygonal environments with multiple pur-suers.The inputs for our algorithm are an environment and the initial positions of the pursuers.The output is a joint strategy for the pursuers that guarantees that the evader has been captured.We create a Sample-Generated Pursuit-Evasion Graph(SG-PEG)that utilizes an abstract sample generator to search the pursuers’joint configuration space for a pursuer solution strategy that captures the evaders.We implemented our algorithm in simulation and provide results.I.I NTRODUCTIONThere are many variants of the pursuit-evasion problem. The common theme amongst them is that one group of agents,the“pursuers”,attempts to track members of another group,the“evaders”.This paper considers a specific variant of the pursuit-evasion problem called visibility-based pursuit-evasion, which requires the pursuer(s)to systematically search an environment to locate the evaders,ensuring that all evaders will be found by the pursuers in afinite time.The specific problem we consider is a visibility-based pursuit-evasion problem that utilizes a team of pursuers.The pursuers move through a polygonal environment seeking to locate an unknown number of evaders,which move at afinite but unbounded speed.The pursuers have an omni-directional field-of-view that extends to the environment boundary.The goal is tofind a joint strategy for the pursuers that ensures that all of the evaders are seen.The visibility-based pursuit-evasion problem has an extra layer of complexity beyond the standard motion planning problem because of its capture guarantee.It is not enough to simply select a standard motion planner and attempt to generate a path for each pursuer through the environment. To guarantee that the pursuer strategy does indeed capture an evader if one exists,the planner must also reason about the regions of the environment that are not currently in the pursuers’visualfield-of-view and how these regions interact with one another as the pursuers move within the environment.Two dominant threads of research involve the number of deployable pursuers available to solve the visibility-based pursuit-evasion ing only a single pursuer, there are results that yield complete[4],randomized[8], and optimal[22]solutions,as well as many other variants N.M.Stiffler and J.M.O’Kane are with the Department of Computer Science and Engineering,University of South Carolina,301Main St., Columbia,SC29208,USA.{stifflen,jokane}@ Fig.1:A pursuer strategy generated by our algorithm.Filled circles represent the pursuers’initial positions and open circles represent their goal positions.discussed in Section II.A consequence of using only a single pursuer is that these algorithms are only applicable when the environment can be represented as a simply-connected polygon.The authors considered the multiple pursuer visibility-based pursuit-evasion problem[23]in the past.In that work,we introduced a centralized algorithm for computing a pursuer solution strategy.The general idea is to create a Cylindrical Algebraic Decomposition(CAD)of the pursuers’joint configuration space by using polynomials that capture where critical changes to the regions of the environment hidden from the pursuers occur.Then we compute the adjacency graph for the CAD and construct a Pursuit Evasion Graph(PEG)induced by the adjacency graph.A search through the PEG can produce one of the following outcomes: the search can reach a vertex where the pursuers’motions up to this point ensure that the evader has been captured,or the search terminates withoutfinding a solution and produces a statement recognizing that no solution exists.The drawback of the technique is the computational complexity required to construct the CAD and perform the adjacency test,which is doubly exponential in the number of pursuers.This paper differs from that work in that we no longer discretize the configuration space and maintain a CAD nor compute the adjacency graph.The main contribution of this work is a probabilisti-cally complete algorithm for multiple pursuer visibility-based pursuit-evasion that generates a solution strategy for the2014 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2014) September 14-18, 2014, Chicago, IL, USApursuers to execute(Figure1)through the joint configuration space.Our algorithm creates a graph that maintains the pur-suers’information state,and utilizes a sample generator that we treat as a“black box”to reason about unexplored areas in the pursuers’joint configuration space.Our algorithm has some similarity to the Probabilistic Roadmap(PRM) algorithm[10],but differs in that our algorithm maintains information concerning the areas of the environment where the evader might be.The need for this additional information complicates both the update operations for the graph and the selection of samples.The remainder of this paper is structured as follows.In Section II we discuss related work to our problem.Section III contains a formal problem statement.A formal definition for the area not visible to the pursuers,called shadows,appears in Section IV.This paper makes several new contributions: 1)We introduce a graph that maintains a representation ofthe reachable parts of the pursuers’joint information space and provide details about its construction(Sec-tion V).2)We introduce an algorithm that uses this graph to searchfor a pursuer solution strategy(Section VI).3)We present simulation results(Section VII)that showour algorithm’s ability to generate solution strategies for various sample generators.Discussion and concluding remarks appear in Section VIII.II.R ELATED W ORKThe pursuit-evasion problem was originally posed in the context of differential games[5],[7].The lion and man game and the homicidal chauffeur are two such differential games. In the lion and man game,a lion tries to capture a man who is trying to escape[15],[21].In game theory,the homicidal chauffeur is a pursuit-evasion problem which pits a slowly moving but highly maneuverable runner against the driver of a vehicle,which is faster but less maneuverable,who is attempting to run him over[7],[19].Thefirst recognized instance of pursuit-evasion on a graph is the Parsons problem[17].The idea behind the Parsons problem,also known as the edge-searching problem,is to determine a sequence of moves for the pursuers that can detect all intruders in a graph using the least number of pursuers.A move consists of either placing or removing a pursuer on a vertex,or sliding it along an edge.A vertex is considered guarded as long as it has at least one pursuer on it,and any evader located therein or attempting to pass through will be detected.A sliding move detects any evader on an edge.The visibility-based pursuit-evasion problem was proposed by Suzuki and Yamashita[24]as a geometric formulation of the graph-based problem and can be viewed as an extension of the watchman route problem[1],in which the objective is to compute the shortest path that a guard should take to patrol an entire area populated with obstacles,given only a map of the area.A.Single PursuerThe capture condition for the general visibility-based pursuit-evasion problem[4]is defined as having an evader lie within a pursuer’s capture region.There has been substantial research focused how the visibility-based pursuit-evasion problem changes when a robot has different capture regions. The k-searcher is a pursuer with k visibility beams[14], [24],the∞-searcher is a pursuer with omnidirectionalfield of view[4],[16],and theφ-searcher is a pursuer whosefield-of-view[3]is limited to an angleφ∈(0,2π].Note that all of these approaches consider evaders with unbounded speed. Others have studied scenarios where there are additional constraints,such as the case of curved environments[13],an unknown environment[20],a maximum bounded speed for the pursuer[26],or constraints similar to those of a typical bug algorithm[18].B.Multiple PursuerAs a result of the problem complexity,there is a wide range of literature with differing techniques attempting to solve the multi-robot visibility-based pursuit-evasion prob-lem.One technique organizes the pursuers into teams,whose joint sensing capability are a set of moving lines,each of which is spanned between obstacles.By using these teams of robots as sweep lines,the authors guarantee de-tection of the evaders[12].Other researchers have used a mixed integer linear programming approach to solve a multi-pursuer visibility-based pursuit-evasion problem[25]. Another approach involves maintaining complete coverage of the frontier[2].There are other variants of the pursuit-evasion problem where the pursuers are teams of unmanned aerial vehicles[11].III.P ROBLEM S TATEMENTPortions of this section appear in the authors’prior work[23]and are included here for completeness.A.Representing the environment,evaders,and pursuers1)The environment:The environment is a polygonal free space,defined as a closed and bounded set F⊂R2,with a polygonal boundary∂F.The environment is composed of m vertices.2)The evader:The evader is modeled as a point in F that can translate within the environment.Let e(t)∈F denote the position of the evader at time t≥0.The path e is a continuous function e:[0,∞)→F,in which the evader is capable of moving arbitrarily fast(i.e.afinite,unbounded speed)within F.Note that,by assuming that there is a single evader,we have not sacrificed any generality.If the pursuers can guarantee the capture of a single evader,then the same strategy can locate multiple evaders,or confirm that no evaders exist.3)The pursuers:A collection of n identical pursuers cooperatively move to locate the evader.We assume that the pursuers know F,and that they are centrally coordinated. Therefore,from a given collection of starting positions,the pursuers’motions can be described by a continuous functionFig.2:An environment with two pursuers and three shadows. p:[0,∞)→F n,so that p(t)∈F n denotes the joint configuration of the pursuers at time t≥0.The function p,which our algorithm generates,is called a joint motion strategy for the pursuers.We use the notation p i(t)∈F to refer to the position of pursuer i at time t.Likewise,x i(t) and y i(t)denote the horizontal and vertical coordinates of p i(t).Without loss of generality,we assume that the pursuers move with maximum speed1.Each pursuer carries a sensor that can detect the evader. The sensor is omnidirectional and has unlimited range,but cannot see through obstacles.For any point q∈F,let V(q) denote the visibility region at point q,which consists of the set of all points in F that are visible from point q.That is, V(q)contains every point that can be connected to q by a line segment in F.Note that V(q)is a closed set.B.Capture conditionsThe pursuers’goal is to guarantee the capture of the evader for any continuous evader trajectory.Definition A joint motion strategy is a solution strategy if, for any continuous evader trajectory e:[0,∞)→F, there exists some time t and some pursuer i such that e(t)∈V p i(t) .IV.S HADOWSThe key difficulty in locating our evader is that the pursuers can not,in general,see the entire environment at once.This section contains some definitions for describing and reasoning about the portion of the environment that is not visible to the pursuers at any particular time.Definition The portion of the environment not visible to the pursuers at time t is called the shadow region S(t),and defined asS(t)=F− i=1,...,n V p i(t) .Note that the shadow region may contain zero or more nonempty path-connected components,as seen in Figure2. Definition A shadow is a maximal path connected compo-nent of the shadow region.Notice that S(t)is the union of the shadows at time t.The important idea is that the evader,if it has not been captured, is always contained in exactly one shadow,in which it can move freely.As the pursuers move,the shadows can change in any of four ways,called shadow events.•Appear:A new shadow can appear,when a previously visible part of the environment becomes hidden.•Disappear:An existing shadow can disappear,when one or more pursuers move to locations from which that region is visible.•Split:A shadow can split into multiple shadows,when the pursuers move so that a given shadow is no longer path-connected.•Merge:Multiple existing shadows can merge into a single shadow,when previously disconnected shadows become path-connected.These events were originally enumerated in the context of the single-pursuer version of this problem[4]and examined more generally by Yu and LaValle[28].A.Shadow LabelsFor our pursuit-evasion problem,the crucial piece of information about each shadow is whether or not the evader might be hiding within it.Definition A shadow s is called clear at time t if,based on the pursuers’motions up to time t,it is not possible for the evader to be within s without having been captured.A shadow is called contaminated if it is not clear.That is,a contaminated shadow is one in which the evader may be hiding.Notice that,since the evader can move arbitrarily quickly, the pursuers cannot draw any more detailed conclusion about each shadow than its clear/contaminated status;if any part of a shadow might contain the evader,then the entire shadow is contaminated.Therefore,our algorithm tracks the clear/contaminated status of each shadow.Each time a shadow event occurs, the labels can be updated based on worst case reasoning.•Appear:New shadows are formed from regions that had just been visible,so they are assigned a clear label.•Disappear:When a shadow disappears,its label is discarded.•Split:When a shadow splits,the new shadows inherit the same label as the original.•Merge:When shadows merge,the new shadow is as-signed the worst label of any of the original shadows’labels.That is,a shadow formed by a merge event is labeled clear if and only if all of the original shadows were also clear.Notice in particular that,if all of shadows are clear,then we can be certain the evader has been seen at some point. The result of this reasoning is that we can connect the shadow labels to our goal offinding a solution strategy.A pursuer strategy is a solution strategy if and only if,after its execution,all of the shadows are clear.bel DominanceThe following provides some insight to the hierarchy of preferable shadow rmally,we prefer one shadowlabel to another if in addition to having the same shadows labelled as cleared,there are additional shadows in the label that are also labelled as cleared.This allows us to say that one shadow label dominates another shadow label.Definition Given two shadow labels corresponding to a shadow region S,we say that a label l dominates a label l′if the following condition holds:∀s∈S If l′s=clear then l s=clear This relation is useful because our algorithm discards any shadow labels that are dominated by another shadow label reachable at the same pursuer configuration.V.S AMPLE-G ENERATED P URSUIT-E VASION G RAPH This section introduces the primary data structure used in our algorithm.We begin by describing the graph’s structure and also elaborate on a non-trivial graph operation.A.Graph StructureThe Sample-Generated Pursuit-Evasion Graph(SG-PEG) is a rooted directed graph whose vertices represent joint pursuer configurations.A vertex in the SG-PEG contains1)a joint pursuer configuration(denoted jpc),and2)the set of non-dominated shadow labels reachable byfollowing a path from the root,through the graph,to that configuration.For an edge to exist between any two vertices in the SG-PEG there must be a line segment in F n that connects the joint pursuer configuration at the source vertex with the joint pursuer configuration at the target vertex.Given an arc of the SG-PEG,e=(x,y),the edge stores a mapping from the reachable shadow labels in x to the corresponding shadow labels in y.The operations available to a SG-PEG graph are A DD-V ERTEX and A DD E DGE.These operations differ from the corresponding operations on a standard graph because of the book-keeping needed to keep track of the reachable shadow labels.The A DD V ERTEX operation is trivial,but details concerning the A DD E DGE operation appear in the next section.B.Edge CreationWhen a new connection is established between a source and target vertex in the SG-PEG,the source’s reachable shadow labels are used to update the target’s reachable labels (Algorithm1).In this section we discuss the shadow label update criterion,the update label subroutine,and the process of adding a new reachable label to a vertex.1)Computing a New Label:In the authors’prior work [23],we provided a family of polynomials that capture where critical changes can occur to the region of the environment hidden from the pursuers.Although complete,the quantity and complexity of the polynomials(there are O n3m3 polynomials,where n corresponds to the number of pursuersand m corresponds to the number of environment vertices)in this family makes the task of analytically identifying where Algorithm1A DD E DGE(v,v′)Input:a source vertex v and a target vertex v′1:for each label in v’s reachable set do2:updated←C OMPUTE L ABEL(v.jpc,label,v′.jpc) 3:A DD R EACHABLE(v′,updated)these changes occur computationally expensive.Instead,we update the shadow labels numerically.The general idea is that if we partition the line segment connecting any two joint pursuer configurations in F n into a collection of evenly spaced joint pursuer configurations we can incrementally track the shadow changes.To ensure that all of the shadow events are captured there must be at least one sample capable of capturing each successive shadow event while traversing along the segment.The computation of a new shadow label(Algorithm2) takes as input two joint pursuer configurations,a source and target,and a shadow label corresponding to the shadow region at the source configuration.The output is the shadow label that results from the pursuers moving from the source configuration to the target configuration given the initial shadow label.Figure3illustrates this process.Initially,there are two contaminated shadows.As the pursuers move to the target configuration,a shadow appears as the pursuers move to the right(a cleared shadow).As the pursuers reach the target configuration the central shadow disappears.We begin by partitioning(Algorithm2line2)the segment connecting the source and target configurations in F n into afinite collection of evenly spaced joint pursuer configura-tions.We then loop through this collection of joint pursuer configurations,updating the shadow label along the way, returning thefinal label of the sequence.The process of computing the new shadow labels for our discretized segments appears in Algorithm2lines4-11.The process starts by computing the shadow regions of both the source and target configurations.We initialize the label corresponding to the target configuration as all cleared.We check all of the shadows in the shadow region of the goal configuration for an intersection with contaminated shadows belonging to the shadow region of the source configuration. If an intersection with a contaminated shadow occurs then the corresponding shadow in the target configuration is also labelled as contaminated.2)Adding a Reachable Label:Thefinal step involves adding the newly computed shadow label to the target vertex (Algorithm3).It may also be the case that the individual shadows of the new label are all cleared,in which case a solution has been found.If the target vertex contains a shadow label in its set of reachable labels that dominates the new shadow label,then the new label does not contribute any new information and we return.Similarly,if there are labels in the vertex’s set of reachable labels that are dominated by the new shadow label then those labels are removed.If the new shadow label is not dominated and is not a solution strategy then we add the new shadow label to the vertex’sBefore During AfterFig.3:An illustration of the update step.Initially there are two contaminated shadows(red).After running the U PDATE method,there is a cleared shadow(green)and a contaminated shadow(red).Algorithm2C OMPUTE L ABEL(p,l,p′)Input:a starting configuration p,starting label l,anda goal configuration p′1:label←l2:<p1,...,p k>←D ISCRETIZE(p,p′)3:for each p i,p i+1where i<k do4:oldshadows←S HADOW R EGION(p)5:newshadows←S HADOW R EGION(p′)6:newlabel←0···0⊲initially all cleared 7:for each s′in newshadows do8:for each s in oldshadows do9:if label s=1and s′intersects s then 10:newlabel s′←111:label←newlabel12:return labelAlgorithm3A DD R EACHABLE(v,l)Input:a SG-PEG vertex v and a label l1:function A DD R EACHABLE(v,l)2:if v contains a label that dominates l then return 3:add l to v as a reachable label4:delete labels in v dominated by l5:if A LL C LEAR(l)then6:Output Solution v⊲Is l a solution? 7:for each out in Neighbors(v)do8:newlabel←U PDATE(v.jpc,l,out.jpc)9:A DD R EACHABLE(out,newlabel)reachable set.This label now permeates the graph recursively via the vertex’s outgoing edges.A label is calculated for each of the vertex’s neighbors,and if this label is added to the neighbors reachable set,then the process repeats itself.The process ends when no additional reachable labels are found. Note that if a vertex does not belong to the same connected component as the root vertex then its set of reachable labels is empty.Because of the recursive nature of Algorithm3, a vertex that serves as a bridge between the connected component containing the root vertex and another connected component will cause the reachable data to permeate through the SG-PEG.Algorithm4S OLVE(p,F,A)Input:a starting configuration p,an environment F,and an abstract sampler A1:A DD V ERTEX(p,{0···0})2:while a solution has not been found do3:s←A.G ET S AMPLE()4:x←A DD V ERTEX(s)5:for each y in SG-PEG vertices do6:if(xy⊂F n)andlength(x,y)<maxlength andcycleLength(x,y)>mincycle then7:A DD E DGE(x,y)⊲Digraph edge 8:A DD E DGE(y,x)⊲Digraph edge 9:return E XTRACT S OLUTION(solution)VI.A LGORITHMIn this section we detail how our algorithm uses a SG-PEG to search for a pursuer solution strategy.Our algorithm (Algorithm4)begins by creating a SG-PEG vertex.This vertex’s joint pursuer configuration is the initial joint pur-suer configuration supplied to our algorithm and it’s set of reachable shadow labels contains only a single label whose shadows are all contaminated.This is the root vertex of our SG-PEG.We then proceed by obtaining samples in F n,checking these samples for potential connections with existing vertices in the SG-PEG graph,and update the SG-PEG where necessary when edges are created.A.Abstract SamplerOur main search algorithm uses an abstract sampler to return a joint pursuer configuration(Algorithm4line3). Definition An abstract sampler is a joint probability density function whose continuous random variables are the pur-suers’positions in F.The only functionality that we require an abstract sampler to have is the ability to generate a point in F n.The benefit of using an abstract sampler is that our algorithm is not dependent on a specific sampler to generate a solution strategy.This allows us to choose samplers that efficiently explore F n.Note that the goal of catching the evaders means that the best sampling strategies may differ from those used in traditional motion planning algorithms.However,forour algorithm to be probabilistically complete,the abstract sampler must have a support equal to F n(Section VI-D). We demonstrate the feasibility of using an abstract sample generator in our algorithm by providing simulation results that utilize various sample generators(Section VII).B.Edge CriteriaIn this section we discuss the constraints used in our main algorithm that determine whether an edge should connect two vertices(Algorithm4line6).The three constraints can be categorized as visibility,edge length,and cycle length constraints.1)Visibility Condition:The visibility condition states that for two vertices to share a pair of directed edges,the vertices corresponding joint pursuer configurations must be mutually visible to one another.This corresponds to the i th pursuer of one configuration residing within the visibility region of the i th pursuer in a neighboring configuration.Another way of interpreting this constraint is that only straight line motions are permitted between corresponding pursuers in neighboring vertices.This constraint prevents the generation of strategies in which the pursuers collide with obstacles.2)Edge Length:To limit the amount of time spent computing the reachable data when an edge is added in the SG-PEG we place a constraint on the length of the segment connecting the vertices joint pursuer configurations in F n. The idea is that given two joint configurations that are far apart,requiring multiple intermediary vertices as opposed to a single long connection is preferred.The intermediary vertices provide additional opportunities for any potential subsequent samples to become connected.3)Minimum Cycle Length:To avoid an oversaturation of edges we enforce a minimum cycle length in the SG-PEG.The intuition is that if a large number of samples in F n that are relatively close together,a large amount of resources could potentially be used computing all of the nearby transitions without necessarily revealing any new information.This optimization is aimed at minimizing the number of samples between which no shadow events occur.C.Search for a solution strategyThe intuition is that given an initial joint pursuer configu-ration,we assume that all the shadows in the shadow region are contaminated.We then build a SG-PEG using an abstract sampler to select new points in F n.Since we maintain the reachable shadow labels during the construction of the SG-PEG,we know that a solution strategy exists if we encounter a reachable shadow label that is completely cleared.At that point we use the reachable data stored in the vertices and the shadow label mappings stored in the edges to recover a solution by following those mappings back to the root.This solution should appear as a collection of vertices in the ing the joint pursuer configurations stored in the vertices as intermediary steps that the pursuers need to reach,we will have generated a joint motion strategy that is also a solution strategy.D.Probabilistic CompletenessFinally,we argue that under certain conditions,Algo-rithm4is probabilistically complete.Theorem1:If the abstract sampler has a support equal to F n,and there are no constraints on the edge length and cyclelength,then our algorithm is probabilistically complete.Thatis,the probability of our algorithmfinding a solution,if oneexists,tends to1as the number of samples goes to infinity. Proof Sketch:The argument proceeds in the same fashion as the probabilistic completeness proof for PRM presentedby Kavraki,Kolountzakis,and Latombe[9].The only signif-icant difference is that,instead of considering the clearancebetween a solution strategy and the obstacle boundaries,wemust consider the clearance from the critical boundaries atwhich shadow events that are not part of thefinal solutionstrategy would occur.VII.S IMULATION R ESULTSWe implemented our algorithm in simulation and providesome results for three different environments,using threedifferent sample generators,and three different cycle con-straints.The environments(Figure4)all require at leasttwo pursuers to generate a solution strategy.As such wehave deployed two pursuers to test our algorithm.The threedifferent sample generators have the following behavior:•SG1-Returns a uniform sample in F n.This is a baseline sample generator that produces independentand identically distributed samples in F n.This samplegenerator satisfies the completeness constraint.•SG2-Chooses samples such that no two pursuers are mutually visible.By ensuring that the pursuers can not see one another,we attempt to maximize exploration by generating samples where the pursuers’visibility regions don’t overlap.Note that this sample generator does not satisfy the completeness constraint.•SG3-Selects an existing SG-PEG vertex,and for each pursuer selects a new target position from the pursuer’s current visibility region.This is a local randomized sam-pler.By sampling within an existing SG-PEG vertex’s field-of-view,we are essentially causing the search to “bloom”from the root vertex.This sample generator does not satisfy the completeness constraint.For each combination of environment,sample generator,and cycle constraints we ran10trials,each with a uniquestarting position.The simulations were implemented in C++on a machine running Ubuntu12.0464-bit with an IntelCore2Duo E8400processor and4GB of RAM.Eachsimulation was given a maximum computation time limit of1200seconds.If the algorithm could not generate as solution strategy within the allotted time,we assumed that it failed. The cycle constraints represent the extremes and one intermediary constraint.By not allowing any cycles,the SG-PEG has a tree structure,and may encounter environments where this limitation prevents our algorithm from generating a solution strategy.The other extreme has no constraint on the cycles.This means that if the samples are close together,。

WTO词汇(中英翻译对照)

WTO词汇(中英翻译对照)

关贸总协定,世界贸易组织的前身GATT(General Agreement on Tariffs and Trade)世界贸易组织WTO(World Trade Organization)乌拉圭回合Uruguay Round最惠国待遇(现通常称"正常贸易关系")MFN(most-favored-nation)treatment争端解决机构dispute settlement body《关于争端解决规则与程序的谅解》DSU(Understanding on Rules and Procedures Governing the Settlement of Disputes)《北美自由贸易协定》NAFTA(North American Free Trade Agreement)东盟自由贸易区ASEAN Free Trade Area东部和南部非洲共同市场COMESA(Common Market for Eastern and Southern Africa)反倾销措施anti-dumping measures against…非配额产品quota-free products非生产性投资investment in non-productive projects风险管理/评估risk management/assessment国际收支balance of international payments/balance of payment实行国民待遇grant the national treatment to瓶颈制约"bottleneck"restrictions非洲、加勒比和太平洋国家集团(洛美协定)ACP(African,Caribbean and Pacific Group)(补贴协议)可诉补贴actionable subsidy上诉机构appeal body基础税率base tariff level国际收支条款BOP(Balance-of-payments)Provisions既定日程built-in agenda约束水平bound level(欧盟)共同农业政策Common Agriculture Policy规避circumvention反补贴税countervailing duty交叉报复cross retaliation海关完税价值customs values环保型技术EST(Environmentally-sound technology)出口实绩export performance出口补贴export subsidy粮食安全food security免费搭车者(享受其他国家最惠国待遇而不进行相应减让的国家)free-rider政府采购government procurement灰色区域措施grey area measuresWTO最不发达国家高级别会议HLM(WTO High-level Meeting for LDCs)协调制度(商品名称及编码协调制度)HS(Harmonized Commodity and Coding System)进口许可import licensing进口渗透import penetration最初谈判权(初谈权)INRs(Initial Negotiating Rights)知识产权IPRs(Intellectual property rights)最不发达国家LDCs(Least-developed countries)当地含量local content市场准入market access专门的营销机构market boards(服务贸易)自然人national person国民待遇national treatment(利益的)丧失和减损nullification and impairment(争端解决)专家组panel(《农业协议》中关于反补贴的)和平条款peace clause诸边协议plurilateral agreement(服务贸易)自然人流动presence of natural person生产补贴production subsidy消费膨胀inflated consumption慢性萧条chronic depression进口环节税import linkage tax北美自由贸易区NAFTA(North American Free Trade Area)全球配额global quota祖父条款grandfather clause贸易和投资自由化和便利化TILF(Trade and Investment Liberalization and Facilitation)国际清算international settlement横向兼并horizontal merger垂直兼并vertical merger垃圾融资junk financing申报制度reporting system;income declaration system市场准人的行政管理措施AAMA(Administrative Aspects of Market Access)A2000Agenda2000年议程Abandoned Claims被放弃的诉请Acceding Country申请加入国Acceding Government申请加入的政府Acceptable Level of Risk可接受的风险水平Accession加入Accession Country加入国Accession Package加入一揽子文件Accountancy Disciplines会计准则Accounting Services会计服务Accreditation认可Accreditation and Approval认可和批准Actionable Subsidy(补贴协议)可诉补贴Actual Dumping Margin实际倾销幅度Actual Value实际价值Actuarial Services保险精算服务Actuarial Specialist精算专家Ad valor tariff从价税Ad Valorem Duty从价税Ad Valorem Equivalent从价等量Ad Valorem Subsidization从价补贴Ad Valorem Tariff从价关税Additional Commitments额外承诺Additional Duty额外关税Adjustment Cost调整成本Administered Support Price政府支持价格Administrative Action行政行为Administrative Determinations行政裁定Administrative Revocation行政撤销Advance Deposit for Imports预付进口押金Adverse Effects不利影响Adverse Inferences不利推断Advertising Services广告服务Advisory Opinion咨询性意见Affirmative肯定裁决Affirmative Defense积极抗辩Affirmative Determination肯定性裁定Affirmative Finding肯定性调查结果Afford Adequate Opportunity提供充分机会After Sales Services售后服务Agency Insurance Services保险代理服务Agenda22世纪议程Aggregate measure of support综合支持量Aggressive Multilateralism攻击性多边主义Aggressive Reciprocity攻击性互惠Agreed database各方都同意的数据库Agreed Exclusions议定的例外Agreed Standard From议定的标准格式Agreement on Agriculture农业协定Agreement on Compensation补偿协定Agricultural Integration农业一体化Agriculture Protection Argument农业保护论Air Transport Services空运服务Alleged Dumping被指控的倾销Alleged Injury被指控的损害Alleged Subsidy被指控的补贴Allocation of Quotas配额分配Allowance for Waste损耗Alternative Duty选择税Amber Box Measures(农产品国内支持)黄箱措施Amendments to WTO Agreements协定修改American Selling Price(ASP)美国销售价格Amicus Brief法庭之友的书面陈述Amicus Curiae法庭之友amount of subsidy补贴数额AMS Disciplines综合支持量纪律AMS Methodology综合支持量方法Analogue Country替代国Analytical Index分析索引Ancillary Services空运辅助服务Animal Welfare动物福利Annual bound commitment年度约束水平Anti-Circumvention反规避Anti-Circumvention Action反规避行动Anti-Competitive Practices反竞争做法Anti-Dumping反倾销Anti-Dumping Act反倾销法Anti-Dumping Action反倾销行动Anti-Dumping Agreement反倾销协定Anti-Dumping Code反倾销守则Anti-Dumping Complaint反倾销申诉Anti-Dumping Duty反倾销税Anti-Dumping Duty Order反倾销税令Anti-Dumping Investigation反倾销调查Anti-Dumping Law反倾销法律Anti-dumping measures(AD,A-D)反倾销措施Anti-Dumping Penalty反倾销补偿金Anti-Dumping Policy反倾销政策Anti-Dumping Practice反倾销实践Anti-Dumping Proceeding反倾销程序Anti-Dumping Tribunal反倾销调查裁决机关Anti-Globalization反全球化Anti-Surge Clause反激增条款Appeal(争端解决)上诉Appeals上诉Appellate Body上诉机构Appellate Body Report上诉机构报告Appellate Review上诉审查Appellations of Origin原产地名称Appellee被上诉方Applicant Contracting Party申请缔约方Application Form申请表格Application Procedures申请程序Appraised Value估定价值Appraisement估价Appropriate Compensation适当补偿Appropriate Countermeasures适当反措施Appropriate Schedule适当减让表Arbitration仲裁Arbitration Award仲裁裁决Architectural Services建筑设计服务Archive Services档案服务Arm’s Length Negotiations公平谈判Arm’s Length Price公平价格Arm’s Length Pricing公平定价Arm’s Length Rate公平利润率Arm’s Length Transaction公平交易Artwork工艺Assessment of Risk风险评估Assessment of Tariff Offers评估关税出价Assessment of the Origin原产地预确定Asset Management资产管理服务Assignment转让Assignment Agreement转让协议Assignor转让人Assurance of Conformity合格保证Asymmetrical Comparison非对称比较At-the-Border Barriers边境壁垒Audiovisual Service视听服务Auditing Services审计服务Automatic Import Licensing自动进口许可Automatic Licensing自动许可Autonomous Trade Regimes自主贸易制度Average CIF Unit Value平均到岸价Average Reference Price平均参考价格Award裁决A Reasonable Rate of Increase in Reserves储备增加的合理比率Abuse of Intellectual Property Rights滥用知识产权Access to Confidential Information对机密信息的获取Accident and Health Insurance services意外和健康保险服务Accounting,Auditing and Book-keeping Services会计、审计和簿记服务Acquisition or Maintenance of Intellectual Property Rights知识产权的取得或维持Acts Occurring Prior to Date of Application of Agreement协议适用之日前发生的行为Actual Threat under Agreement on Textile and Clothing纺织品与服装协定中的实际威胁Ad Interim Reduction or Exemption of Customs Duties临时减少或豁免关税Ad Valorem Percentage Criterion从价百分比标准Additional Period of One Year under Multi-Fibre Agreement多种纤维安排中的延期一年Additional Written Memoranda附加书面备忘录Adequate and Enduring Technical Competence适当和持久的技术资质Administration of Trade Regulations贸易法规的实施Administrative Aspects of Market Access(AAMA)市场准入的行政管理措施Aggregate Measurement of Support(AMS)(农产品)综合支持量Administrative Memorandum行政备忘录Administrative Procedures and Remedies行政程序和救济Administrative,Selling and General Costs管理、销售和一般费用Advisory and other Auxiliary Services金融咨询和其他附属服务Advisory,Intermediation Services金融咨询、中介服务Aggregate measurement of support(AMS)(农业)综合支持量Agreement for Protection of International Investment国际投资保护协定Agreement on Textile and Clothing(ATC)纺织品与服装协定Agreement on Trade-Related Investment Measures(TRIMs)与投资有关的贸易措施Agreements and Associated Legal Instruments协定及相关法律文件Agricultural Chemical Products农业化学物质产品Aircraft Repair and Maintenance Services航空器的维修和保养服务Allocation of Shares in the Quota配额中的份额分配Alternative Dispute Resolution争端解决的替代方式American Selling Price System of Valuation美国销售价格估价制度Amicus Submissions by NGOs非政府组织的法庭之友书面陈述Amount for Profit and General Expenses利润和一般费用总额Amount of a Subsidy in Terms of the Benefit to the Recipient以接受者所获利益形式的补贴金额An Inconsistency of a Serious Nature严重不符Andean Community安第斯共同体Annecy Round安纳西回合Annual and Final Bound Commitment Levels年度和最终约束承诺水平Annual Export Subsidy Commitment Levels出口补贴年度承诺水平Anti-Dumping Act of19161916年反倾销法Anti-Dumping Act of19211921年反倾销法Appellate Body Operating Fund(ABOF)上诉机构业务基金Application for Anti-Dumping Action反倾销调查申请Application of International Standards适用国际标准Application of Successive Treaties Relative to the Same Subject-Matter 后续条约的适用Applications Specialist系统应用专家Appropriate Level of Sanitary or Phytosanitary Protection卫生或植物卫生保护的适当水平Arbitrary or Fictitious Customs Values武断或虚构的海关价格Area of Low Pest or Disease Prevalence病虫害低度流行区Arrangements for Consultation and Cooperation磋商与合作安排Article2Exemptions第2条例外Article21.5Panel第21.5款专家组Article22.6Arbitration第22.6款仲裁Assistance for Research Activities研究活动补助Associated Foreign Direct Investment关联外国直接投资Assured Life of the Schedules减让表的有效期Attribution of Serious Damage in ATC纺织品与服装协定中严重损害的归因Audio Visual Service Negotiations in the Uruguay Round 乌拉圭回合中的视听服务谈判Authoritative Interpretation of Provisions适用协定规定的权威性解释Automated System for Customs Date(ASYCUDA)海关数据自动化系统Automatic Import Licensing Procedures自动进口许可程序Auxiliary Financial Services附属金融服务B‘Bottleneck’restrictions瓶颈制约Background and Authority背景与主管机关Balance of payment(BOP)国际收支Base Levels基础水平Base Period基期Base tariff level基础税率Base Total AMS基期综合支持总量Basic Agricultural Product基本农产品Basic Telecommunications基础电信Basket Tariff Quota一揽子关税配额Benchmark Price基准价格Benefit Accruing获得的利益Benefit to the Recipient给予受益人的利益Benefits of Trade贸易利益Bidding Quotation投标报价Bilateral Agreement双边协定配额Bilateral Emergency Basis双边应急基础Bilateral Investment双边投资Bilateral Quota双边配额Bilateral Tax Treaty双边税收条约Bilateral Trade双边贸易Bilateral Trade Agreement双边贸易协定Bilateralism双边主义Binding Commitments约束承诺Binding of Duty Rates关税税率约束Binding of Duty Treatment关税待遇约束Blair House Accord布莱尔宫协定Blue Box蓝箱Blue Box measures(农业国内支持)“蓝箱措施”Blue box policies蓝箱政策Board Tariff Reduction广泛关税减让Bonded Factory保税工厂BOP Provisions国际收支条款Border Measures边境措施Border Tax边境税Border tax adjustments(BTA)边境税调整Bound level约束水平Bound MFN Rate约束最惠国关税率Bound Schedule约束税率表Bound tariff rates约束税率Bounty奖励Breach of Confidence泄密Bretton Woods System布雷顿森林体系Broadband Services宽带服务Broadcasting Organization广播组织Broking Services经纪服务Brussels Declaration布鲁塞尔宣言Building Block System板块系统方法Building Codes建筑法规Building-Cleaning Services建筑物清洁服务Built in agenda既定日程Built-in agenda(WTO)既定议程Built-In Swing调用Burden of Proof举证责任Business Exception商业例外Business Practice商业实践Business Support Services商务支持服务But for Test“若非”标准Buying Commission购买佣金Backdoor Protectionism后门保护主义Balance of Rights and Obligations under ATC纺织品与服装协定下权利和义务的平衡Balance-of-Payments Consultations国际收支磋商Balance-of-Payments Difficulties国际收支困难Balance-of-payments provisions国际收支条款Banking and Related Financial Services银行及相关金融服务Basel Convention《巴塞尔公约》(有关危险废弃物的多边环境协定)Basic Instruments and Selected Documents(BISD)(GATT)《基本文件资料选编》Basic Telecommunication Services基础电信服务Basic Telecommunications Operator基础电信运营商Belgian Family Allowances比利时家庭补助案Berne Convention《伯尔尼公约》(《保护文学艺术作品的伯尔尼公约》)Best Information Available可获得的最佳信息bilateral investment treaties(BIT)双边投资协定Bilateral Trade and Payments Agreements双边贸易与支付协定Board Tariff Cutting Formula划一削减公式Border Enforcement of IPR知识产权的边境执法Bound Free Duty约束免税待遇Branch or Representative Office分公司或代表处Brief Summary of Legal Basis of Complaint申诉的法律根据摘要Brief Summary of Legal Basis of Complaint诉请的法律根据摘要Brussels Definition of Value(BDV)布鲁塞尔对价值的定义Budgetary Commitment Levels预算支出承诺水平Budgetary Outlay Reduction Commitments预算支出削减承诺Burden of Proof in Non-Violation Nullification or Impairment Claims 非违反之诉的举证责任Burden Shifting Where Quantity Exported Exceeds Commitments 举证责任转移Business Confidential Information商业秘密信息CCairns Group凯恩斯集团Cairns Group凯恩斯集团Cancellation注销Cancellation of Registration注销注册Capital Expenditure资本支出Capital Subsidy资本补贴Captive Production内部生产Cargo Handling Services货物装卸服务Carry Forward借用Carry Over留用Cash Deposit保证金Causal Factors因果关系要素Causality因果关系Causation因果关系Cause Shown陈述的理由Ceiling Tax Rate最高税率Certificate of Origin原产地证书Certification Systems认证体系Challenge Procedures质疑程序Channels of Commerce商业渠道Charge费用Chronic depression慢性萧条Circumvention规避Circumvention by Transshipment转运规避Civil Aircraft Products民用航空器产品Claim权利请求Claims诉请Claims Versus Arguments诉请与论据Clothing服装Collective Action集体行动Combined tariff混合税Commencement of Appeal上诉的开始Commercial Considerations商业考虑Commercial Exhibition商业性放映Commercial Exploitation商业性利用Commercial Level商业水平Commercial presence(服务贸易)商业存在Commercial Rental商业性出租Commercial Services商业服务Commission and Brokerage佣金和经纪费Common Agriculture Policy共同农业政策Common Quota共同配额Common Register共同登记机构Communications Services通讯服务Comparable Price可比价格Compensation补偿Compensation Negotiation补偿谈判Compensation Trade补偿贸易Compensatory Adjustment补偿性调整Competition policy竞争政策Compilations of Date数据汇编Complaining Party(解决争端)申诉方Complaint申诉Complaint Procedure申诉程序Compliance符合Compliance Report执行专家组报告Comprehensive全面报告Compulsory Licensing强制许可Computed Value计算价格Computed Value Method计算价格估价方法Computer Programs计算机程序Computer Services计算机服务Concealed Dumping隐蔽倾销Concession Negotiation减让谈判Concurrence同意意见Conditional Appeal附条件上诉Conditions of Competition竞争条件Conduct of Business处事规则Confidential Information机密信息Conflict of Interest利益冲突Conformity Assessment合格评定Consensus协商一致Consensus Minus除了……协商一致Consignment Requirements运输条件Consolidated Notification综合通知书Consolidated Schedules综合减让表Constituent Territories组成领土Constitutional Procedures宪法程序Constructed Export Price推定出口价格Constructed Value推定价值Constructive Remedies建设性救济措施Consular Transactions领事事项Consultation磋商Consultation Procedures磋商程序Consulting Country参与磋商的国家Consulting Member参与磋商的成员方Consumer Preference消费者偏好Consumption Abroad(服务贸易)境外消费Contracting parties(GATT)缔约方Conventional Tariff协定关税Conversion of Duties关税转换Converted Concessions转换的关税减让Copyright版权Copyright Piracy盗版Copyright Protection版权保护Copyright Works版权作品Corrective Measures纠正措施Cost Date成本数据Costs and Charges成本和费用Counsel法庭律师Counter purchase反向购买Counter trade补偿贸易Counterclaim反诉Counter-Complaint反诉诉状Counterfeit Goods假冒商品Counterfeiting假冒Countermeasures反措施Counter-notification反向通知Countervailing Charge反补贴指控Countervailing Duty Action反补贴税行动Countervailing Duty Law反补贴税法Countervailing Duty Order征收反补贴税令Countervailing Duty Rate反补贴税率Countervailing duty(CVD)反补贴税Countervailing Measures反补贴措施Country-of-Origin Marking原产地标记Courier Services快递服务Course of Trade贸易过程Covered Agreements适用协定Criminal Procedures刑事程序Criteria for Patentability授予专利的标准Critical Circumstances危急情况Crop Insurance Scheme农作物保险计划Cross border supply(服务贸易)跨境交付Cross Border Trade跨境贸易Cross check交叉核实Cross Licensing交叉许可Cross retaliation交叉报复Cross-Cutting Issues跨领域议题Cultural exception文化例外Cumulation累积Cumulation of Injury损害积累Cumulative Assessment累积评估Cumulative Indirect Taxes累积间接税Cumulative Injury累积的损害Cumulative Injury Assessment累积损害评估Cumulative Market Disruption累积市场扰乱Cumulative Rules of Origin累计原产地规则Cumulative Subsidies累计补贴Currency Conversion货币换算Currency retention scheme货币留成制度Currency Retention Schemes货币保留方案Current Access Commitments现行准入承诺Current Total AMS(农业)现行综合支持Customary Business Practice传统商业惯例Customary International Law国际习惯法Customs Act海关法Customs Administration海关当局Customs Area海关境域Customs Barriers关税壁垒Customs Bonded Warehouse海关保税仓库Customs Border关境Customs Cooperation海关合作Customs Documentation海关文件Customs Drawback海关退税Customs Duties海关关税Customs Duty关税Customs Duty关税免除Customs Enforcement海关执法Customs Fee海关规费Customs Frontier关税边境Customs House海关Customs Nomenclature海关税则目录Customs Statistics海关统计Customs Supervision and Control海关监管Customs Surveillance Zone海关监管区Customs Tariff海关税则Customs union(CU)关税同盟Customs Valuation海关估价Customs value海关完税价值Customs-Free Area关税自由区Cyclical Dumping周期性倾销Calculation of Aggregate Measurement of Support 综合支持量的计算Calculation of Current Total AMS现行综合支持总量的计算Capable of Industrial Application工业实用性Central Government Authority中央政府当局Central Government Body中央政府机构Central Government Standardizing Body中央政府标准化机构Centrally Planned Economy中央计划经济体Centrally Planned Economy Countries中央计划经济国家Certificate of Origin Form59A原产地证书格式59ACertificate of Origin Form A原产地证书格式AChallenges to Validity对有效性提出异议Change in Relative Shares of the Market市场相对份额的变化Change in Tariff Classification税则归类改变Change of Tariff Classification Criterion税则归类改变标准Charge on the Public Account公共账户的支出Circuit-Switched Data Transmission Services电路交换数据传输服务Circumstances of Extreme Urgency极端紧急情况Circumvention of Anti-Dumping Duty Measures对反倾销征税措施的规避Circumvention of Export Subsidy Commitments规避出口补贴承诺Civil and Administrative Procedures and Remedies 民事和行政程序与救济Clean Report of Findings检验结果清洁报告书Code on Import Licensing Procedures进口许可程序守则Coercive Package Licensing强制的一揽子许可Collegiality Among Appellate Body Members共同决定Combination of Know Design Features已知设计特征组合Commercial Terms and Conditions商业条款和条件Commercially Traded Services商业性服务贸易Commission Agent’s Services佣金代理服务Commitments on National Treatment国民待遇承诺Commitments on Support and Protection支持和保护的承诺Common Agricultural Policy(CAP)(欧盟)共同农业政策Communications with Panel/Appellate Body与专家组或上诉机构的联系Competence of Panel to Hear a Dispute专家组审理争端案件的权限Computer Reservation System Services(CRS)计算机订座系统服务Concession Initially Negotiated最初谈判的减让Concurrence of the Contracting Parties缔约方的同意Conditional Most-Favoured-Nation Treatment有条件的最惠国待遇Conditional National Treatment附条件的国民待遇Conditions and Terms of Sale销售的条件和条款Conditions,Limitations,Exceptions and Reservations 条件、限制、例外和保留Confidential Business Information机密商业信息Confidentiality of Consultations磋商的机密性Confidentiality of Information信息机密性Conformity Assessment Procedures合格评定程序Conformity Assessment Systems合格评定体系Consequences of Treaty Termination条约终止的后果Conservation of Exhaustible Natural Resources保护可用尽的自然资源Consolidated Tariff Schedules综合关税减让表Consolidated Tariff Schedules Database综合关税减让表数据库Construction and Related Engineering Services 建筑及相关工程服务Consular Invoices and Certificates领事发票和证书Consulting and other Business Services咨询和其他商务服务Consumer Subsidy Equivalent(CSE)消费者补贴等值Consumption in Governmental供政府消费使用Contact Point for Information信息咨询点Container Station and Depot Services集装箱堆场服务Contingent Trade Remedy紧急贸易救济Contingent Trade Remedy应急贸易救济机制Continuing Application of GATT Schedules继续适用关税与贸易总协定减让表Contracting Parties Primarily Concerned主要有关缔约各方Contractual Joint Venture契约式合资企业Contractual Trade Regimes契约贸易制度Control,Inspection and Approval Procedures 控制、检查和批准程序Conventional Tariff System协定税则制度Copyright and Related Rights版权与相关权利Cottage Industry Products家庭手工业产品Cotton-Producing Exporting Members产棉出口成员Counterfeit Trademark Goods假冒商标商品Countervailing Duty Determinations关于反补贴税的决定Countervailing Duty Petition反补贴税调查诉请Countervailing Duty Proceedings反补贴税调查程序Country-Specific Derogations某些国家享受的例外Criteria for Eligibility for Protection享受保护的资格标准Criterion of Manufacturing or Processing Operation 制造或加工工序标准Critical Shortages of Foodstuffs粮食的严重缺乏Cross Border Supply of Services跨境提供服务Cross Border Trade in Services跨境服务贸易Cumulative Acquisition of Origin累计取得原产地Cumulative Assessment of Dumping对倾销的累积评估Customs Clearance Services海关清关服务Customs Warehousing Procedure海关保税仓库管理制度DDamage损害Damage Difficult to Repair难于补救的损害Damages损害赔偿De Facto Discrimination事实上的歧视De Facto Specificity事实专向性De Jure法律上的De Jure Discrimination法律上的歧视De Minimis微量允许De Minimis Dumping Margins微量倾销幅度De Minimis Effects微量影响De Minimis Imports微量进口De Minimis Modifications微小修改De minimis provision最低减让条款De Minimis Safeguard Rule保障措施的微量规则De Minimis Standard微量标准De Minimis Subsidies微量补贴Debt Repayment债务偿还Deceptive Practice欺诈行为Decision Tree决策树Decisive Guidance决定性的指导Deductive Method倒扣价格法Deductive Value倒扣价格Deep Amber黄箱政策Defendant(解决争端)被诉方Degree of Tariff Binding关税约束水平Delaying Tactics拖延战术Delivery of a Service服务的提供Denial of Benefits利益的拒绝给予Denial of Entry of Goods拒绝货物入境Dental Services牙医服务Depress Prices(to)压低价格Descriptive Characteristics描述特征Descriptive Part陈述部分Design Work设计Designated Products指定产品Designated Trading指定经营Determination裁决Determination of Dumping倾销的确定Determination of Injury损害的确定Determination of Origin原产地确定Developing Country发展中国家Development开发Development Box发展箱Development Costs开发成本Deviation偏离Differences in Commercial不同商业水平Differential Duties差别关税Differential Export差别出口税Differential Income差别收入税Differential Measures差别措施Diffuse Reciprocity扩散性互惠Dillon Round狄龙回合Direct Discussions直接对话Direct Discussions直接交货Direct Income Support直接收支持Direct Insurance直接保险Direct Investment直接投资Direct payment直接支付Direct Subsidy直接补贴Dirty Tariffication肮脏的关税化Discretionary裁量性立法Discrimination歧视Discriminatory Pricing歧视性定价Discussant引导人Disguised Trade Barriers变相贸易壁垒Dispersed Tariff Rate分散型关税税率Dispute Settlement争端解决Dispute Settlement Officer争端解决官员Dispute Settlement Procedure争端解决程序Dispute Settlement Registrar争端解决登记人Disruptive Effects扰乱性影响Disruptive Imports扰乱性进口Dissent反对意见Distinctiveness显著性Distribution of Trade贸易分配Distribution Services分销服务Diversionary Dumping移转倾销Doctrine of Comparative比较成本说Doha Development Agenda多哈发展议程Doha Work Programme多哈工作计划Domestic Commodities国内商品Domestic Content当地成分要求Domestic Industry国内产业Domestic Law国内法Domestic Price国内价格Domestic production国内生产Domestic Products国产产品Domestic Regulation国内规制Domestic Subsidy国内补贴Domestic support(农产品)国内支持Double Counting重复计算Double Deflation Method双重紧缩方法Double Evart Formula双重偏离公式Double Taxation双重征税Downstream Dumping下游倾销Downstream Product下游产品Downstream Subsidy下游补贴Draft Standard标准草案Drawback Scheme退税方案Dry Cleaning Services干洗服务Dual Pricing双重定价Dual Tariff加重关税Dumped Exports倾销出口产品Dumped Prices倾销价格Dumping倾销Dumping Duties倾销税Dumping Margin倾销幅度Dutiable Value应税价格Duty税收Duty Deferral Programme关税缓征方案Duty Drawback税收返还Duty Free免税Duty Free Goods免税货物Duty Free Quota免税进口配额Duty–Free Treatment免税待遇Dyeing and Colouring Services染色服务EEco-Dumping生态倾销Eco-Duties环境税Eco-Labbeling环境标签Economic Data经济数据Economic Integration经济一体化Economic Needs Test经济需求测试Economic Policies经济政策Economic Quantities经济数量Economies in Transition转型经济体Eco-Packaging环保包装Eco-Protectionism环境贸易保护主义Eco-Standards环境标准Educational Tariff培育关税Elastic Duties弹性关税Electricity Reticulation电力网络Electronic Commerce电子商务Emergency Action紧急行动Emergency Measures紧急措施Emergency Tariff紧急关税Empire Preferences帝国特惠制Enabling Clause授权条款Enabling Clause授权条款End Product Criteria最终产品标准Enforcement Committee执法委员会Enforcement of Monopolies垄断的实施Enforcement Procedures实施程序Engineering Services工程服务Enquiry Point咨询点Entertainment Services娱乐服务Environmental Dumping环境倾销Environmental Programmes环境计划Environmental Services环境服务Environmental Subsidy环境补贴Equitable Treatment公平待遇Escalated Tariff升级关税Escape Clause免税条款Established Quota既定配额Estoppel禁止翻供Evidence证据Ex ante采取措施前Ex Officio Action依职权的行动Ex Parte Communications单方面联系Ex post采取措施后Exception Measures例外措施Exceptions to the Agreement协议例外Exchange Action外汇措施Exchange Dumping外汇倾销Exchange Dumping Duty外汇倾销税Exchange Risk Programmes外汇风险计划Exchange Taxes汇兑税Excise Duty消费税Exclusion Order排除令Exclusive Agents独家代理商Exclusive Economic Zone专属经济区Exclusive Export Rights专属出口权Exclusive Import Rights专属进口权Exclusive Marketing Rights独占行销权Executive Branch执行机构Executive Committee执行委员会Exemption Treatment豁免待遇Ex-Factory Level出厂价水平Exhibits清单Existing Programs现有计划Expiry review到期复审Explicit Consensus协商一致Exploitation of a Patent专利的使用Exploitation of the Works作品的利用Export Competition出口竞争Export Competitiveness出口竞争力Export Contingency出口相倚性Export Credit出口信贷Export Credit Guarantee出口信贷担保Export Credit Insurance出口信贷保险Export Credit Practice出口信贷做法Export Duty出口税Export Performance出口实绩Export Prohibitions出口禁止Export Restrictions出口限制Export Subsidies出口补贴Export Unit Value出口单位价值FFabrics织物Fact and adversarial elements事实和对抗性要素Fact Finding事实认定Fact Versus Law事实与法律Facts Available可获得的事实Factual Abstract事实概要Factual Presentation事实陈述Fair Comparison公平比较False Declarations虚假陈述Favorable Balance of Trade贸易顺差Feasible Methods可行性方法Fees and Formalities规费和手续Fees or other Charges规费和其他费用Fibre Content纤维成分Final Anti-Dumping Duty最终反倾销税Final Anti-Dumping Measure最终反倾销措施Final Countervailing Duty最终反补贴税Final Determination最终裁定Final decision终裁Final Duties最终税Final Liability for Payment最终支付责任Final Panel Report专家组的最终报告Final Provisions最后条款Financial Contribution财政资助Financial Leasing Services金融租赁服务Financial Regulations财务条例Financial Services金融服务Finding of Serious Injury严重损害的认定Findings(争端解决)调查结果Findings and Conclusions调查结果和结论Findings of Facts事实的调查结果First Regionalism第一次区域主义浪潮Fiscal Incentives财政激励Flat Rate Subsidy统一费率补贴Flat Tariff Structure单一关税结构Flexibility Provisions灵活条款Follow-Down Dumping诱发性倾销Food Aid Convention粮食援助公约Food Security粮食安全Food Security Box粮食安全政策Food-Importing Group粮食进口集团Foreign Exchange Arrangements外汇安排Foreign Tax Credit外国税收抵免Foreign Trade对外贸易Foreign Trade Barriers对外贸易壁垒Foreign Trade Financing对外贸易融资Foreign Trade Law对外贸易法Foreign Trade Zones(FTZs)对外贸易区Foreign-Source Income国外来源收入Forestall the Imminent Threat防止紧迫威胁Forfeiture没收Format of Evidence证据的形式Formula Tariff Reductions公式化关税减让Forward Markets远期市场Four Freedoms四项自由Fragmented Industries零散产业Framework Agreements框架协议Franchise Tax特许权税Franchising Services特许经营服务Free and Fair Trade自由和公平贸易Free Imports自由进口货物Free Trade自由贸易Free trade area(FTA)自由贸易区Free Trade Zone(FTZ)自由贸易园区Free-rider免费搭车者(享受待遇而不减让成员)Freight Dumping运费倾销Freight Forwarding Services货代服务Full Contracting Party正式缔约方Fully Grant Form完全捐赠形式Function of Panels专家组的职能Fundamental Fairness基本公正Fundamental Research基础研究Further Processing进一步加工GGATT a La Carte关贸总协定的选择性承诺General Exception一般例外General Expenses一般费用General Safeguard Clause一般保障条款Geneva Round日内瓦回合Geographical Indications(知识产权)地理标志(识)Global Quota全球配额Good Faith善意Good Offices斡旋Governing Body主管机关Government Expenditure政府开支Government Finance政府财政Government Financing政府融资Government Funds财政资金Government Infusion政府参股Government Loan政府贷款Government Procurement政府采购Governmental Assistance政府援助Governmental Services政府服务Graduation Clause毕业条款Grandfather Clause祖父条款Grant back Condition返授条件Granting Authority授予机关Green Box measures(农业国内支持)“绿箱措施”Green Labeling绿色标签Grey-Area Measures灰色区域措施Growth Rates增长率GSP Giving Countries普惠制施惠国GSP Status普惠制地位HHandling Charges作业费Handling Costs处理成本Hard-Core Waiver硬核豁免Harmless Error无害错误Harmonization协调Harmonized Standards协调标准Harmonized System协调制度Havana Charter哈瓦那宪章Headquarters Agreement总部协议Health Insurance Services健康保险服务Health Protection Measures健康保护措施Hearing of the Case案件的审理Herring and Salmon鲱鱼和鲑鱼案Hidden Dumping隐藏性倾销Hidden Subsidy暗补Higher Education Services高等教育服务Highly Indebted Poor Countries重债穷国。

【工程学科英语(整合第二稿)】 参考答案

【工程学科英语(整合第二稿)】 参考答案

Unit OneTask 1⑩④⑧③⑥⑦②⑤①⑨Task 2① be consistent with他说,未来的改革必须符合自由贸易和开放投资的原则。

② specialize in启动成本较低,因为每个企业都可以只专门从事一个很窄的领域。

③ d erive from以上这些能力都源自一种叫机器学习的东西,它在许多现代人工智能应用中都处于核心地位。

④ A range of创业公司和成熟品牌推出的一系列穿戴式产品让人们欢欣鼓舞,跃跃欲试。

⑤ date back to置身硅谷的我们时常淹没在各种"新新"方式之中,我们常常忘记了,我们只是在重新发现一些可追溯至涉及商业根本的朴素教训。

Task 3T F F T FTask 4The most common viewThe principle task of engineering: To take into account the customers ‘ needs and to find the appropriate technical means to accommodate these needs.Commonly accepted claims:Technology tries to find appropriate means for given ends or desires;Technology is applied science;Technology is the aggregate of all technological artifacts;Technology is the total of all actions and institutions required to create artefacts or products and the total of all actions which make use of these artefacts or products.The author’s opinion: it is a viewpoint with flaws.Arguments: It must of course be taken for granted that the given simplified view of engineers with regard to technology has taken a turn within the last few decades. Observable changes: In many technical universities, the inter‐disciplinary courses arealready inherent parts of the curriculum.Task 5① 工程师对于自己的职业行为最常见的观点是:他们是通过应用科学结论来计划、开发、设计和推出技术产品的。

红宝书超纲词 纯英语版

红宝书超纲词 纯英语版
feverish financially flagship flexibility
genetically geneticist genome
headhunter heavily hierarchical
inarticulate
affordable ageing aggressiveness agreed alarmingly allegation allot amendment analyst
megalith
mildly
misguide
molecular
materialism
memorize
militantly
misguided
momentarily
materialistic
mentally
millennial
misinformation monarchy
flexibly foe foreseeable foresight
geographic glamorous gloominess
hindrance holistic homeless
inedible
ancestry announcement antismoking apparently applicant appreciation appreciative approachable archaeological
lawsuit
lender
lifestyle
listener
longstanding
leader
lengthy
light-hearted literate
loser
leakage
leniency
liken
liveliness

adaptive

adaptive

Modeling a tool for the generation of programming environments for adaptive formalismsA.R. Camolesi Departamento de Engenharia de Computação e Sistemas Digitais, Universidade de São Paulo, Brasil Coordenadoria de Informática, Fundação Educacional do Município de Assis, Brasil E-mail: camolesi@.brAbstractThis paper aims to present the logical model that makes up the structure of a tool for the definition of environments for rule-driven adaptive formalisms.1 IntroductionAdaptive applications need resources to adapt themselves to the environment’s momentary needs and to foresee the internal and external demands, thus making up for a complex, robust, and fault-tolerant structure, yet flexible and responsive. Such applications offer modern capacities that are very difficult to be modeled by using present techniques of software development. In order to solve the adaptive applications’ modeling, it was proposed in [1] a generic formalism that allows (underlying) rule-driven non-adaptive devices to be extended to concepts of adaptive mechanisms. Such formalism is based on an Adaptive Mechanism (AM) that involves the kernel of an underlying non-adaptive device (ND). This way, an Adaptive Device (AD) is formally defined by AD = (C, AR, S, c0, A, NA, BA, AA). In this formulation C is the set of all the possible configurations of ND and c0 ∈ C means its initial configuration. S is the set of all possible events that make up AD’s entry chain and set A represents the acceptance configurations for ND. Sets BA and AA are adaptive actions’ sets. NA is a set of all symbols that can be generated with exits by AD, in response to the application of adaptive rules. AR is the set of adaptive rules that define the adaptive behavior of AD and is given by the relationship Ar ⊆ BA × C × S × C × NA × AA in which adaptive actions modify the current set of AR adaptive rules from AD to a new AR set by adding and/or deleting adaptive rules in AR. Based on these definitions, it is proposed in this paper a logical model for the representation of the formalelements shown in [1]. Such model is fundamental to the developing of tools that support a design methodology for adaptive applications. This paper is organized as follows: in section 2, the stages of extensions for adaptive devices and its use will be described. In section 3, the logical representation for adaptive devices is shown, and finally, in section 4, some conclusions and future papers are discussed.2 Stages of extensions for non adaptive rule-driven devices.When extending a formalism of an underlying device to the concepts of adaptive rule-driven mechanisms, a specialist should involve the non adaptive device with an adaptive layer. In order to develop this job, the specialist should possess good knowledge both of the underlying formalism and of the concepts of adaptive mechanisms. On the other hand, a planner that uses a device extended by a specialist does not need a formal knowledge as deep as the one needed by the specialist in extension of devices. The planner needs to know the extended specification language and how to use it in the project of his applications. When extending a non adaptive rule-driven device to support adaptive characteristics there is the need to accomplish 3 stages: the stage of extension of the formal (mathematical) model, the stage of definition of the logical model and the stage of definition of the physical model. Figure 1 illustrates the stages and the existent relationship among them. The stage of extension of the formal model Figure 1(A), offers a view in which a specialist with good mathematical knowledge of underlying formalism accomplishes the conceptual definition of the extended device to the concepts of adaptive mechanisms. In [1] and [2], extensions of underlying devices are presented to the concepts of adaptive devices. In this phase, the junction of the formal concepts of both (underlying and adaptive) formalisms is achieved, thus obtaining a new underlying device extended to concepts of adaptive mechanisms.represented by specification, thus modifying its structure. In [3], a methodology was proposed to give support to the project of adaptive applications by using concepts presented in this paper. In Figure 2, it is shown the design methodology for adaptive applications formed by the following phases: specification phase, transformation specification phase, and validation and specification simulation phase. In the specification phase the application is accomplished by using either a text or a graphic tool. Soon afterwards, the transformation of the produced specification to an intermediate representation (logical model) is accomplished and, based on the obtained representation the planner can inform entry string sequences and evaluate its specification. If mistakes or inconsistencies occur, the planner can make changes in the specification and restart the process.Figure 1. Stages of extension of non adaptive rule-driven devices.After obtaining the adaptive formalism, it is necessary a mapping of its concepts for an intermediate representation, as shown in Figure 1(B). Such stage consists of the definition of the logical structure that represents the formal concepts of the new adaptive device. Such structure is of fundamental importance, because it is part of the information storage structure necessary for the development of tools that will help the planner in designing adaptive applications. In the stage of physical definition, as shown in Figure 1(C), a planner with knowledge of the developed adaptive formalism accomplishes the specification of his application. At this stage, yielded specifications are to be later analyzed and implemented. When performing his work the planner instances the defined objects in the logical stage and he defines the physical elements that represent the behavior of the application. In this phase, it can be observed that the instantiated objects belong to two different classes, i.e., the objects that represent the behavior of the developed application and other objects that represent the adaptive functions and actions responsible for modifications in the behavior of the application in execution. Based on the set of the defined objects in this phase, the presentation, the simulation, the verification and the execution of the projected application are allowed. During the simulation and execution process of specification in the adaptive kernel, adaptive actions can be executed and rules can be added or removed from the behaviorFigure 2. Methodology of Design of Adaptive Applications.The proposed methodology is linked to the need to use tools for helping the planner in the performance of his job. During the specification phase there is the need of a text or graphic tool to aid the planner in the specification of an application. The phase of specification transformation of the application to an intermediate representation can be accomplished in two ways: automatic (generated by the editors at the moment of the edition), or through a translator that makes the transformation process after the specification process. And, finally, tools that allow the visualization, simulation and verification of the projected applications. In this phase, the planner, using an integrated environment informs the values regarding entry chain and submits their specification to the performer of the adaptive kernel. Initially, in case they exist, prior adaptive actions are performed, followed by elementary actions of the underlying device and finally the subsequent adaptive actions. This way, at each step the designer gets a new configuration (state of the system) and a new set of rules (behavior of the application) according to the adaptive actions that wereperformed. The obtained results should be displayed to the user, who can analyze them and, if necessary, make changes and restart the whole process.3 Logical model for adaptive formalismsBased on the concepts shown in [1], a logical model is proposed, so that it allows the construction of tools that help to plan adaptive applications. Such a model is represented by a data structure that gives support to the storage of the intermediate representation and allows the construction of a program that can manage the performance of the resulting specification by using the available facilities from adaptive devices. In [3], a proposal was presented for the logical structuring of the formal definition of the concepts of adaptive devices. Figure 3 shows a diagram of entity relationship of the conceptual model for adaptive devices. Such a diagram is structured by objects of three types: Underlying Kernel (UK), Specification (S) and Adaptive Layer (AL) according to the characteristics they represent. The objects of horizontal hachure (Device, Component Type, Connection Type and Attribute Type) are Underlying Kernel (UK) type and they correspond to the intermediate representation of the basic elements of an underlying device. In this structure, the conceptual elements of the underlying devices formally represented by set C are defined.Figure 3. Diagram of entity relationship intermediate representation.Solid color objects (Project, Attributes, Components, Connections and Variables Environment) are Specification (S) type and aim to represent the specifications yielded by a planner. Each object of this structure corresponds to elements of the formal definition, in which: each rule c that is part of the set of rules NR of an underlying device ND can be represented by the objects in S. The planner, when defining a specification, instances objects of the NS type (elements that constitute the underlying kernel) and defines the behavior of the application. This structure also stores the elements of set A that correspond to the rules of acceptance of an adaptive device and, furthermore, to the information on values ofboth the entry and exit chains in the Variable Environments object. The objects with vertical hachure are Adaptive Layer (AL) type and they aim to provide the necessary resources to support the adaptive layer that involves the underlying kernel. The Adaptive Layer is structured in objects that correspond to the configuration of the adaptive device (Adaptive Action Type), and in objects that correspond to the AR conceptual elements that, in turn, correspond to adaptive functions and actions. When defining the Underlying Kernel of a new device (Petri Nets, Automata, Grammar Free from Context, etc...) the specialist needs to store information related to the name of the device, the creation date and updating, etc… Such information is stored in the Devices object. Information on the types of components (places and transitions of a Petri Net, final states, and non-final states of Automata, etc...) that represent the behavior of an application and that is used by a planner when specifying their application, can be represented by the Component Type object. When specifying a rule that represents the behavior of an application it is necessary to represent the form of the existing connection between its components. The Connection Type object represents the information on the connection type for a device: transition for Automata, Petri Net connections, etc…, while the Attribute Type object contains information on the types of data that are available for attribution to a component of an application behavior. When accomplishing the Specification of an application it is necessary to store information on the description of the specification, on the planner in charge, etc…. Such information is represented by the Projects object. At first, when defining the behavior of a project, one should define the components that constitute the application behavior. Such components are parts of the NR rules and they are represented by the Components object. One can mention the description of the states that constitute a specification of Automata or the description of the places and transitions of a Petri Net, etc… as examples of such components. Following the definition of the components, one defines the rules (set c of the formal representation) that constitute the behavior of an application (formally acted by NR). Such structure establishes the relationship among the defined elements in both Component and Connection Type objects and defines the behavior of an application. The value of each attribute associated to a (Component or Connection) object is represented by the Attributes object. The values of stimulus, and related information to the exit and other necessary information duringexecution are acted by the Environment Variables object. The Adaptive Layer is associated to the elements of specification of an application. This results, at first, in the definition of the information on the type of adaptive action that can occur: consultation action, insert or removal. Such information is stored in the Adaptive Action Type object. When the adaptive mechanism is joined to the underlying kernel it is necessary to define the adaptive functions (the conceptual elements BA and AA) that should be associated to the elements of the Components object. The Adaptive Functions object allows the extension of the underlying kernel to have the features of adaptive mechanisms and it makes the connection between the elements of the underlying kernel and their respective adaptive actions that are represented by the Adaptive Actions object. The Adaptive Actions object represents the set of adaptive actions belonging to AR that has the function of accomplishing changes in the behavior of the projected application. Based on the logical structure, a tool is being developed that will allow a specialist to configure the conceptual elements of a non adaptive device and to accomplish its extension for the adaptive mechanisms. Such tool will also allow a planner, by using a textual language (intermediate representation), to develop the project of their applications. In a second stage other tools will be developed that will allow the specification and display of graphic elements of the extended adaptive devices. The tool development is being made in Java [3] due to the portability and reuse features inherent to this programming language. Figure 3 shows the interface of the tool that is responsible for the definition of the connections of a specification.4 Conclusion.This work aimed to present how to make the extension of a non adaptive device to support the characteristics of adaptive mechanisms. Initially, the general structure of an adaptive mechanism was presented, followed by the stages for the extension of a non adaptive formalism to support the characteristics of adaptive mechanisms. Following, the methodology for the design of adaptive applications was shown by using these concepts. Finally, a logical model was presented for the construction of tools that will give support to a design methodology of adaptive applications. The proposed methodology was used in [2] to modeling of applications that has support the use of graphic interface and tools are being implemented to facilitate specialists and planners in their job with adaptive technology. In relationship the stages of definition of adaptive formalisms several works were accomplished in relation to formal definition and as resulted adaptive formalisms were developed. Such works served as base for the definition of the extension stages for adaptive formalisms and they were to base the proposal of a logical model that it seeks to represent adaptive ruledriven formalisms. The defined logical structure represents the conceptual elements for adaptive formalisms and it constitutes an intermediate representation for the definition of tools that it will support the methodology of design of adaptive applications. As a continuation to this work, it is suggested a deeper study for the validation of the proposed logical model and the definition of a physical model (computational) for the validation of the proposed structure.References[1] Neto J.J.(2001) Adaptive rule-driven devices general formulation and case study, Sixth International Conference on Implementation and Application of Automata, Pretoria-South Africa. [2] Camolesi, A.R. and Neto, J.J. (2004) Modelagem Adaptativa de Aplicações Complexas, XXX Conferencia Latino Americana de Informatica (CLEI), Arequipa, Peru. [3] Camolesi, A.R. e Neto, J.J (2003) An adaptive model for modelling of distributed system, Conference Argentina in la Ciência da Computacion (CACIC), La Plata, Argentina.Figura 4. Interface of an Adaptive Tool System.[4] Programming Language JAVA in (September 2004).。

参比制剂,可以使原研的,也可以的仿制药

参比制剂,可以使原研的,也可以的仿制药

参⽐制剂,可以使原研的,也可以的仿制药今天⽆意中看到RLD(reference listed drug)的翻译,顺便查了下,RLD和RS的区别,分享给⼤家,欢迎⼀起指正学习哦!中⽂版区别解析:017年1⽉,美国FDA发布了题为“Referencing Approved Drug Products in ANDA Submissions”(ANDA申报的参照药品)的新指南草案,在原RLD概念的基础上引⼊了RS概念,并重新区分了RLD与RS的使⽤。

通常情况下,若NDA产品是RLD并且仍在市场销售,那么问题就很直接。

然⽽,若NDA产品可获得性差(⽐如撤市,销售短缺,或可⽤量太少)以⾄于ANDA开发不便,或者ANDA申请者提出其他要求,则情况变得复杂。

考虑到这些情形,FDA在指南草案中对各种ANDA申请情况下如何确定或选择参照药品RLD与RS做了细致的阐述。

在本⽂中,药聚CninMed就该指南草案进⾏简要解析并结合相关案例给予直观说明。

第四部分对照标准制剂(RS)的确认与选择RLD为⼀般为原研制剂, RS为RLD的⼀个或多个规格。

a. 通常情况下,RLD的最⼤规格被指定为RS。

通常RLD包含各个剂量规格,其中最⼤规格被指定为RS,其他规格只是RLD不是RS。

BE试验⽤RS进⾏,其他规格可采⽤体外试验证明等效⽽获得BE豁免。

b. 某些情况下,RLD⾼规格不是RS, 中间规格或低规格被指定为RS。

⽰例7 奥氮平因为副作⽤⼤,以及处于安全性的考虑,FDA没有选⼤规格⽽是选5mg作为RS。

如礼来奥氮平⽚(Zyprexa, NDA020592)有2.5、5、7.5、10、15、20 mg共6个规格都为RLD, 其中中间规格5mg为RS。

再如礼来的奥氮平⼝腔崩解⽚(Zyprexa Zydis, NDA201186)有5、10、15、20 mg共4个规格都为RLD, 其中最低规格5mg为RS。

c. 某些情况下,同⼀个产品有⼀个以上的规格被指定为RS。

英语作文-补贴审批手续申请

英语作文-补贴审批手续申请

英语作文-补贴审批手续申请In the realm of financial aid, the process of subsidy approval is a critical juncture that can significantly impact the implementation of various projects and initiatives. The procedure is often complex, requiring applicants to navigate through a labyrinth of paperwork and criteria to secure the necessary funds. This essay delves into the intricacies of the subsidy approval process, offering insights into the steps involved and providing guidance on how to craft a compelling application.The journey of subsidy approval begins with a thorough understanding of the eligibility requirements. Subsidies are typically allocated for specific purposes, such as promoting research and development, supporting small businesses, or encouraging sustainable practices. Applicants must ensure that their objectives align with the goals of the subsidy program. It is imperative to meticulously review the guidelines provided by the funding body to ascertain the scope of the subsidy and the qualifications needed to be deemed eligible.Once eligibility is confirmed, the next step is to gather all necessary documentation. This includes detailed project proposals, budget plans, and any supporting materials that can substantiate the need for financial assistance. The project proposal should clearly outline the objectives, methodology, expected outcomes, and the significance of the project. It should also demonstrate how the subsidy will contribute to the broader goals of the funding program. The budget plan must be realistic and transparent, providing a breakdown of all costs involved and justifying each expense.The application process often requires applicants to submit a narrative that explains the rationale behind their project. This narrative is a critical component of the application, as it provides the evaluators with a glimpse into the vision and potential impact of the project. It is essential to articulate the narrative with precision and clarity, avoiding jargon and technical language that may obscure the message. The narrative should be engaging, highlighting the unique aspects of the project and its potential to bring about positive change.After the application is submitted, it enters the review phase, where it is scrutinized by a panel of experts or a committee. The review process can be rigorous, with applications being evaluated on various criteria such as feasibility, sustainability, and the overall benefit to the community. It is not uncommon for the review committee to request additional information or clarifications. Applicants should be prepared to respond promptly and comprehensively to any inquiries.If the application is successful, the applicant will receive a notice of approval, which outlines the terms and conditions of the subsidy. This document is crucial, as it specifies the obligations of the recipient, including reporting requirements, timelines for project completion, and the proper use of funds. Recipients must adhere to these stipulations to maintain their eligibility for the subsidy and to ensure the successful execution of their project.In conclusion, the subsidy approval process is a meticulous journey that demands attention to detail, clarity of purpose, and a strong alignment with the objectives of the funding program. By understanding the steps involved and presenting a well-structured application, applicants can increase their chances of securing the financial support they need to bring their projects to fruition. The process, while challenging, offers a pathway to achieving goals that may otherwise be unattainable, making it a vital component in the pursuit of innovation and progress.。

Financial distress, corporate control

Financial distress, corporate control

Financial distress,corporate control,and management turnover∗—A German panel analysis—Philipp Jostarndt†Munich School of Management,andSa¨ıd Business SchoolAugust2006AbstractIn this study we empirically investigate the effect offinancial distress on cor-porate ownership and control.Our analysis is based on a panel of267Germanfirms that suffered from repeated interest coverage shortfalls and steep share pricedeclines between1996and2004.We track eachfirm’s development over the dis-tress cycle with particular attention on corporate ownership,restructuring,andmanagement turnover.Wefind a significant decrease in ownership concentration.Private investors,typically the bulwark in corporate ownership structures in Ger-many,gradually relinquish their dominating role and thereby cease to be an effectivesource of managerial control.By contrast,ownership representation by banks andoutside investors almost doubles.Shareholdings by managers and directors alsosubstantially increase but have no effect on managerial tenure.Forced manage-ment turnover,while clearly exceeding conventional levels of turnover in Germany,is mostly initiated by outside investors and banks and often occurs subsequent todebt restructurings,block investments,and takeovers.Collectively,the results sug-gests thatfinancial distress in Germany provokes substantial shifts from internal toexternal mechanisms of corporate control.Keywords:Corporate control,financial distress,restructuringJEL Classification:G32,G33∗I would like to thank Dietmar Harhoff,Christoph Kaserer,Colin Mayer,Bernd Rudolph,Oren Susman,and Felix Treptow for their detailed and thoughtful comments.Part of this work was written while I was visiting scholar at the Sa¨ıd Business School,University of Oxford.This paper also benefited from conference and doctoral seminar presentations at the2006Annual Conference on Corporate Strategy (ACCS),Berlin,the2006FMA European Conference,Stockholm,the2006EFA Z¨u rich Meeting,the University of Munich,the Technical University of Munich,and the University of Oxford.Part of this research was done while I was visiting scholar at the University of Oxford.Research and Financial support by the German Academic Exchange Service(DAAD Stipend D/05/47437)is gratefully acknowledged.†Philipp Jostarndt,Institute of Capital Market Research and Finance,University of Munich,Schack-strasse4,D-80539Muenchen.Email:philippj@lmu.deFinancial distress,corporate control,and management turnover:A German panel analysisAbstract:In this study we empirically investigate the effect offinancial distress on corporate own-ership and control.Our analysis is based on a panel of267Germanfirms that suffered from repeated interest coverage shortfalls and steep share price declines between1996and 2004.We track eachfirm’s development over the distress cycle with particular attention on corporate ownership,restructuring,and management turnover.Wefind a significant decrease in ownership concentration.Private investors,typically the bulwark in corpo-rate ownership structures in Germany,gradually relinquish their dominating role and thereby cease to be an effective source of managerial control.By contrast,ownership representation by banks and outside investors almost doubles.Shareholdings by man-agers and directors also substantially increase but have no effect on managerial tenure. Forced management turnover,while clearly exceeding conventional levels of turnover in Germany,is mostly initiated by outside investors and banks and often occurs subsequent to debt restructurings,block investments,and takeovers.Collectively,the results suggests thatfinancial distress in Germany provokes substantial shifts from internal to external mechanisms of corporate control.Keywords:Corporate control,financial distress,restructuringJEL Classification:G32,G331IntroductionAccording to corporatefinancial theory,the states offinancial distress,default,and bankruptcy present a fundamental stage in the life-cycle of corporations that provokes substantial changes in the ownership offirms’residual claims and the allocation of rights to manage corporate resources[e.g.Jensen(1988),Wruck(1990)].However,empirical results on how precisely these changes evolve have remained sparse and inconclusive.1For example,neoclassical models onfinancial distress typically suggest that default engenders a wholesale transfer of control to thefirm’s lenders who can costlessly restructure their claims to maximizefirm value[e.g.Haugen and Senbet(1978)].Yet the actual role of creditors in the restructuring offinancially distressedfirms has not been exhaustively scrutinized.Similarly,whilefinancial theory traditionally proposes that managers per-sonally suffer when theirfirms default or go bankrupt[e.g.Ross(1977)],there exists little evidence on what forces actually discipline managers infinancially distressedfirms. Finally,we currently know little about the intricate causes and consequences of control transfers infirms at the cusp of bankruptcy.In this study we seek to address these and related issues.In applying panel data methodology we analyze the impact of sustainedfinancial distress on corporate ownership and management turnover as well as the interaction between these two.A focus is set on the relative weight and effectiveness of internal and external monitoring mechanisms as well as monitoring by bank-lenders.Thereby,we account for the theoretic postulate that the relative effectiveness of alternative ownership and governance structures is mirrored by their ability to replace poorly performing managers[e.g.Fama and Jensen(1983), Franks and Mayer(2001)].One crucial aspect of our study is the explicit consideration of the particularities of German ownership structures,which were traditionally dominated by large family investors and proxy-vote representation by powerful house-banks,but have undergone substantial change in recent years[Gorton and Schmid(2000),K¨o ke(2002)]. Our study thus aims at providing genuine insights into the anatomy of distress in German corporations and seeks to complement as well as challenge previous evidence that is almost exclusively restricted to the anglo-saxon domain.Our analysis is based on a sample of267German corporations that experienced back-to-back interest coverage shortfalls and steep share price declines between1996and2002. 1Most notable previous studies on corporatefinancial distress include Franks and Torous(1989)on reorganization of bankruptfirms under Chapter11,Gilson(1989)on private costs of distress,Gilson (1990)on ownership and board composition offirms in default or bankruptcy,Gilson,John,and Lang(1990)on debt restructuring,and Gilson and Vetsuypens(1993)on CEO compensation.Wruck (1990)and Senbet and Seward(1995)provide surveys of the theoretic as well as empirical strands of literature.This period coincides with the youngest economic crisis and the subsequent convalescence thereof and thus offers the analysis of a sample that was hitherto not obtainable.Our research design follows prior work by Gilson(1990)and Asquith et al.(1990)in that we (i)create a stratified sample offirms that meet a pre-determined distress-criterion at some time during the sampling interval and(ii)track eachfirm’s development over the distress cycle.Firms exit the sample upon bankruptcy orfinancial recovery.Data coverage is censored at the year2004.Our analysis follows a three-step approach.First,we examine the impact offinancial distress on corporate ownership.Wefind that ownership structures undergo substantial changes.Median ownership concentration,measured by a Herfindahl index,significantly declines from26%in year-1to16%in year+4relative to the onset offinancial distress. The decline in ownership concentration is mostly attributable to a systematic retreat of individual and family investors,traditionally the bulwark in corporate ownership struc-tures in Germany.Conversely,ownership representation by banks andfinancial investors almost doubles over the same interval,although both groups of investors only acquire com-paratively small stakes.Ownership by corporate managers,i.e.executives and directors, also significantly increases over the distress interval.Second,we analyze how turnover of key-executives is affected by persisting distress. Wefind that average turnover rates in our sample are almost twice as high as conventional levels of turnover in Germany.Only14%of chief executives and22%of chief directors who hold respective seats at the onset offinancial difficulties are still in office at year+4 in distress time.Third,we perform panel data regressions to investigate the relation between(changes in)corporate ownership and management turnover.After controlling for performance, wefind that turnover is significantly affected by ownership composition and changes therein.For one,increasing insider ownership cannot insulate management from disci-plinary turnover.Also,turnover is not affected by overall ownership concentration or the size of holdings by private investors.Instead,turnover is mostly triggered byfirm outsiders,especially banks andfinancial investors who acquire distressed claims through block investments and takeovers.Banks also replace managers upon defaults and in debt restructurings.Thus,managerial tenure underfinancial distress is more affected by actual shifts in ownership and control rather than by absolute levels of ownership.The results are robust to alternative ownership specifications and definitions of management turnover and are not inflicted by panel attrition problems.Collectively,our results offer strong support for the hypothesis thatfinancial distress provokes a shift from internal to external mechanisms of corporate control.One ancillarycontribution of our study is the revealing that German corporations seem to heavily engage in restructuring prior to actual bankruptcy.While roughly one-third of our sampledfirms ultimately go bankrupt,formal proceedings appear to be protracted as long as possible. This sharply contrasts to previous evidence on distressed U.S.firms who tend to enter formal proceedings under Chapter11prematurely and on their own free will and thus perform a great deal of restructuring under court supervision[Franks and Torous(1989)].2 This national peculiarity makes German data particularly interesting for studying the impact offinancial distress because observed restructuring measures are not distorted by legal or regulatory influence but remain a matter of choice.One principle objection to the generality of our results could be made.Since our sampling period embraces the rise and fall of the technology hype towards the end of the last decade it is not clear ex ante if and how this affects our results.To address this concern,our analyses control for industry and market segment affiliation as well as several time-windows within our sampling period.The results suggest that the allegedly distorting influences are statistically as well as economically small.However,since we provide thefirst empirical study covering this epoch it is yet to be determined whether the obtained evidence is specific to our sample.This study is structured as follows.Section2surveys the relevant theoretic literature as well as related empirical studies and derives testable propositions.Section3provides the details of the sample selection,describes the data,and discusses key measurement issues.The empirical results,their interpretation and robustness checks are contained in section4.Section5concludes with a summary of the study’s mainfindings and a brief plimentary empirical results are contained in the appendix.2Theory and propositions2.1Theory on distress,ownership,and management turnoverFinancial distress may affect corporate control in various ways.Yet there exists no single theoretic framework modelling this relationship.Therefore,our derivation of testable hypotheses must rely on an array of in part conflicting theoretic contributions,related empirical studies as well as anecdotal evidence.In this respect the following analysis will deliberately retain some explorative traits.2Most likely this reflects the more debtor-friendly bankruptcy legislation in the U.S.Franks,Nyborg, and Torous(1996)provide a review of that issue.2.1.1Financial distress and the separation of ownership and controlThe fundamental principle underlying the separation of ownership and control in mod-ern corporations is that managers who act as agents on behalf of thefirm’s claimholders and have no or limitedfinancial interest in thefirm can be made accountable for poor performance.Accountability of managers and thus the required return on investment to financial claimholders in ensured by mechanisms of corporate governance[Shleifer and Vishny(1997)].Perhaps the most apparent indication for the effectiveness of these mech-anisms is the outright replacement of unsuccessful executives.3While managers’actual contribution tofirm value is not directly observable,(adjusted)measures forfirm perfor-mance are usually applied as proxies.The so-postulated inverse relation between stock price or operating performance and management turnover has been confirmed in several previous empirical studies.4Aside from low profits and poor stock returns,several types of corporatefinance and investment decisions seem to be particularly influenced by the personal costs that man-agers incur when theirfirms facefinancial nemesis such as default and bankruptcy.For example,to avoid the negative personal consequences of distress managers might choose less risky(and rewarding)investment projects[Smith and Stulz(1985)]or employ below optimum levels of leverage in thefirm’s capital structure[Ross(1977)].While corpo-rate andfinancial performance are strongly interrelated,empirical evidence by Gilson (1989)suggests thatfinancial distress independently engenders higher rates of manage-ment turnover.For a sample of poorly performingfirms Gilsonfinds that turnover infirms that are alsofinancially distressed exceeds turnover in non-distressed entities almost by a factor of three.Similarly,Franks et al.(2001)argue thatfinancial distress is the only focused and significant force in disciplining poor management.Perhaps surprisingly,the question of who stands behind the disciplining of managers in distressedfirms has so far remained almost entirely disregarded.This is an interesting void tofill.Underfinancial distress,conflicts of interest are pronounced as various classes of claimants dispute about the distribution of thefirm’s waning resources.In such a setting,the allocation of rights to appoint or replace key executives directly reflects the effects of distress on the balance of power within the corporation.In the following we restrict our attention to three non-mutually exclusive sources of corporate control.We distinguish internal monitoring by blockholders and the board of 3Gilson(1989)shows that non-routine turnovers have a sustainably bad influence on the personal wealth of individuals as well as their value on the market for managers.4References include Warner,Watts,and Wruck(1988),Weisbach(1988),and Gibbons and Murphy (1990)for the U.S.,Franks,Mayer,and Renneboog(2001)for the U.K.as well as Te Wildt(1996) and Jostarndt et al.(2005)for Germany.directors,external monitoring by the market for corporate control,and monitoring by creditors.2.1.2Ownership structure and internal monitoringIn Germany,the governance of corporations is organized in a two-tier system.The first tier is the supervisory board(i.e.the board of directors),which appoints the management-executive board,nominates a chief executive,determines managerial com-pensation schemes,and approves the annual accounts as well as thefirm’s long term strategy.Unlike in the anglo-saxon domain,the two tiers in Germany are strictly sep-arated in that no member of the management board simultaneously holds a seat in the supervisory board.5The supervisory board consists of employee and owner representa-tives and is appointed by the general shareholder assembly.Thus,blockholders of voting stock typically exert a strong influence on the board composition and,along with it,on management.Whether or not this influence is appreciable is ambiguous from a theo-retic point of view.In principle,concentrated ownership bears the advantage that large shareholders have the power and the incentive to effectively monitor management and thus overcome the free-riding problem associated with dispersed ownership[Shleifer and Vishny(1986)].On the other hand,powerful blockholders,especially majority owners, may also use their influence to reap private benefits at the expense of minority owners [Bebchuk(1999),Barclay and Holderness(1989)].Concerning the disciplining of poor management,prior empirical studies generally provide evidence in favor of concentrated ownership.For example,Denis,Denis,and Sarin(1997)find a positive relation between ownership concentration and performance related management turnover.6A second dimension of internal monitoring pertains to the type of blockholder.In Ger-many the most powerful owners in listed corporations are private investors(families and individuals)and non-financial corporates[e.g.Gorton and Schmid(2000),K¨o ke(2001)]. Economic theory suggests that monitoring by private blockholders may be more effective because they present ownership at the ultimate level and thus have better incentives to obey theirfiduciary duties.Corporate shareholders,by contrast,are fraught with addi-tional agency conflicts and may therefore be weak monitors[Von Thadden(1990)].In Germany,this discrepancy is pronounced due the traditionally intensive ties between pri-vate shareholders and thefirms they own[e.g.Ehrhardt and Nowak(2003)].For this reason,private investors in Germany are typically assigned the attribute of active“inside”5A more detailed comparison of both governance systems is provided by Edwards and Fischer(1994) and Rudolph(2003).6Similarly Jostarndt,Rudolph,and Thierauf(2005).By contrast,Franks and Mayer(2001)find no relation between ownership concentration and turnover.blockholders[Gray(1998)].7Anecdotal evidence consistent with the argument of more effective monitoring by private investors is provided by Wenger and Kaserer(1998).They find that management errors in German corporations are more likely to be corrected if the supervisory board is dominated by private rather than by corporate blockholders.The effect offinancial distress on blockholder monitoring is somewhat ambiguous.On the one hand,distress and corporate crises increase the need for effective monitoring.Provided that inside blockholders are better informed and represent better monitors,economic the-ory may assert that distress engenders a consolidation of voting stock in the hands of few private blockholders[Gilson(1990)].If,on the other hand,private investors are less diversified and more wealth constrained than,say,institutional investors they may be more hesitant to increase their ownership stakes in distressed targets.Afinal dimension of internal monitoring considered in this study concerns the incentive-based compensation for managers and directors in the form of stock ownership.According to Jensen and Meckling(1976)and Baker,Jensen,and Murphy(1988),the incentive-related virtues of compensating managers and directors withfirm’s stock are greatest when thefirm is distressed.However,the expected impact of stock-based compensation of both groups on management turnover should be directly opposed.We should expect direct holdings by management-executives to reduce irregular turnover.In part,this stems from the fact that managers have better entrenchment possibilities if they hold voting stock in thefirm and thus are more insulated from disciplinary board decisions [Denis,Denis,and Sarin(1997)].In part,however,this is also due to the disciplining effect of granting poor management undervalued stock(other than options),which may serve as substitute to outright replacement.Increasing ownership by directors,in turn, should provoke higher rates of performance related turnover if ownership participation of directors induces them to monitor management more effectively.Throughout this text we will refer to this interaction of ownership concentration, holdings by private investors,and holdings by corporate managers and directors as internal monitoring hypothesis.2.1.3External monitoring and the market for corporate controlWhile monitoring by internal mechanisms largely refers to the scale and nature of own-ership in absolute terms,external monitoring is essentially based on changes in owner-ship involving outside investors[Manne(1965)].Earlier studies on corporate governance 7Ownership representation by private investors in Germany is particularly strong for youngerfirms formerly listed on’Neuer Markt’,in which the founding entrepreneurs and/or family descendants take active roles on thefirm’s supervisory board.in Germany have simplistically assumed ownership structures to be constant over time. However,K¨o ke(2002)shows that ownership structures in fact exhibit considerable vari-ation.Changes in ownership and control may result from two sources.First,outside investors may accumulate stakes through block trades of existing shares following volun-tary disposals of existing owners.Alternatively,new shares may be issued through private or public placements designed to concentrate voting power in new hands thus deliberately diluting holdings of existing owners.8Outside investors may be attracted byfinancial distress for several reasons.First, outside investors may seek to actively contribute to the turnaround process if they dispose of the relevant industry and management experience,which is essential to the rescue of an ailing target.In some cases,this experience may well offset the informational advantage typically enjoyed by inside blockholders such as private investors.Thus,the increased monitoring need prevalent during poor performance may be better executed by outsiders, especially corporates andfinancialfirms.Evidence consistent with this view is obtained by Barclay and Holderness(1991)whofind that engagements of new outside blockholders are associated with abnormal announcement returns of about15%.Alternatively,investors could seek a passive investment strategy if they believe that securities are underpriced or that larger blocks of stock engender a more generous consideration under a likely bankruptcy or debt restructuring plan[Gilson(1990)].Economic theory suggests that changes in ownership and control present bad news for incumbent managers.This follows from considerations that takeovers are most likely to be disciplinary when performance is poor and that different management teams com-pete with each other on the market for managerial talent[Scharfstein(1988),Jensen and Ruback(1983)].The empirical evidence for the U.S.offers strong support for the hypoth-esis that ownership changes,takeovers,and performance related executive replacements are interrelated[Mikkelson and Partch(1997),Denis and Sarin(1999)].While hostile takeovers have remained a rarity in Germany,disciplining ownership changes in the form of minority block trades occur frequently[Jenksinon and Ljungqvist(2001),K¨o ke(2002)]. However,managerial disciplining by outsiders is not restricted to over-the-counter pur-chases of existing share blocks but may also occur when distressedfirms tap the equity market in order to raise new funds[Franks et al.(2001)].Underfinancial distress,equity offerings are likely to occur as a result of creditor pressure since existing owners have little incentive to issue new stock voluntarily[Gertner and Scharfstein(1991)].For example, the recent equity offering by KarstadtQuelle AG was announced as part of a complex re-8Of course,this cannot be completed against the will of existing owners.§186of the German Companies Act grants existing owners subscription rights to any new issues of stock.We will address this issue further below.financing package imposed by the banks and almost collapsed under the heavy appeal by thefirm’s shareholders.9If subscription rights for the new issue are excluded or existing shareholders refuse to go along,this offers an opportunity for new investors to acquire new blocks of shares,often at a steep discount(in the case of KarstadtQuelle40%).In the following,the postulated relation betweenfinancial distress,monitoring by outside blockholders and management turnover is labelled external monitoring hypothesis.2.1.4Financial distress and bank monitoringUnderfinancial distress a third source of managerial control emanates from thefirm’s creditors.Asfirm performance deteriorates equity claims decline in value and contrac-tual claims increasingly participate in thefirm’s underlying business risk.Thus,in the state of crisis,creditors may have incentives to monitor management more actively than shareholders[Jensen(1989)].In the absence of exhaustive bondfinancing,this monitor-ing is mostly attributable to corporate banks,the most prevalent group of lenders in the German domain.According to Gilson(1990),creditors’contribution to corporate control infinancially distressedfirms essentially manifests in two ways,(i)explicit ownership of voting stock and(ii)restrictive covenants enforced through debt restructurings.Bank ownership of voting stock in German corporations is a common phenomenon[e.g.Gorton and Schmid (2000)].Moreover,banks often dispose of considerable proxy-votes that they execute on behalf of individual shareholders.Holdings of distressed equity and swaps of debt into equity,however,are restrictively regulated.For example,according to German legislation prior to1998,banks who take equity in distressedfirms deliberately subordinate their remaining debt claims in thefirm and thus always fare worse than without the swap in case the restructuring attempt does ultimately fail(Concept of Equitable Subordination, or Eigenkapitalersatzregeln).After the enforcement of the German Capital Raising Facili-tation Act(KapAEG)the Concept of Equitable Subordination is eased for debt-to-equity swaps,however,banks still face the risk of a subsequent payment obligation if the value of the equity securities received exceeds that of the debt securities given(Differenzhaftung). Moreover,the incentive to exchange debt into equity is reduced due to unfavorable taxa-tion rules imposed on the debtor.10Nevertheless,banks frequently accept residual claims to resuscitate a distressed debtor,albeit this engagement,at most times,is temporarily and small in size.For example,Westdeutsche Landesbank acquired a minority stake in 9See“KarstadtQuelle einigt sich mit Aktion¨a ren”,in:B¨o rsen-Zeitung,26November2004.10See Finsterer(1999),pp.188-191,and Br¨u chner(1998),pp.156-176for a detailed analysis of these issues.Gildemeister AG in an out-of-court workout in1994and divested the stake upon the firm’s return to sustained profitability in2005.11Banks may also respond to their client’sfinancial distress by claiming(additional)seats in thefirm’s supervisory board,even without disposing of considerable ownership.While it is intricate to exhaustively identify bank affiliation of all board members especially for smallfirms,anecdotal evidence suggests that board representation by senior bankers fortifies in response to distress.For example,Dieter Rampl of HypoVereinsbank took a seat in the supervisory board of Elexis AG in2000,and Alfred Lehner of Bayern Landesbank joined the supervisory board of Walter Bau AG in2001.At that time,both firms experienced severefinancial distress.Most recently,Morgan Stanley announced to delegate a senior banker to head the supervisory board of Borussia Dortmund in order to monitor thefirm’s recapitalization pursuits.12Finally,and perhaps most effectively,banks may influence corporate control through debt restructurings even without explicit ownership or board representation.When a firm defaults on its debt or is likely to default,its pursuit to avoid bankruptcy typically depends on the mercy of its most powerful lenders.By this means,banks gain consider-able control rights and may change the new debt terms in their favor.Consistent with this argument,Gilson(1990)reports that in contrast to ordinary loan agreements rene-gotiated debt covenants often grant banks explicit veto power over capital expenditures, divestitures,or changes in management.However,banks may also make debt concessions contingent on the direct replacement of senior executives.For example,the resignation of KarstadtQuelle’s CEO,Christoph Achenbach,subsequent to thefirm’s recapitalization in2004,was provoked by the leading creditor banks.13In the following,the assertion thatfinancial distress causes banks to get more involved in corporate control and thereby impose a disciplinary effect on incumbent management is referred to as bank monitoring hypothesis.11See“WestLB verabschiedet sich von Gildemeister”,in:Handelsblatt,07September2005.12See“Borussia Dortmund spricht mit Banken¨u ber eine Umschuldung”,in:Handelsblatt,24October 2005.13See“Gl¨a ubigerbanken wollen Vorst¨a nde feuern”,in:Spiegel-online,25November2004.。

高效无源互调建模仿真中的统计方法

高效无源互调建模仿真中的统计方法

第 21 卷 第 7 期2023 年 7 月太赫兹科学与电子信息学报Journal of Terahertz Science and Electronic Information TechnologyVol.21,No.7Jul.,2023高效无源互调建模仿真中的统计方法陈雄1,2,贺永宁3,于明1(1.南方科技大学电子与电气工程系,广东深圳518055;2.香港中文大学电子工程系,香港沙田999077;3.西安交通大学电子信息学部微电子学院,陕西西安710049)摘要:在现代大功率通信干扰问题中,无源器件的非线性杂散干扰机理最为复杂,在现代大功率高密度的通信系统中越来越受到重视。

面对无源器件的典型非线性效应之无源互调(PIM)问题,本文从PIM产生机理、建模角度梳理了近年来国内外普遍的PIM建模方法及关键步骤。

针对几种典型微观界面等效、PIM数值转换方法以及面向工况条件的微波部件建模问题,总结了现有的可行方法。

进一步提出了基于统计方法分析动态PIM区间预测分析方法的思路,该方法同样基于微观统计方法,对接触界面的不可具体量化的界面问题进行建模,最终获得工况条件下接触PIM的统计分布区间及其产物概率,为实际工况条件下微波部件PIM预测提供了一种大样本分析方法,为进一步提高实际微波部件的PIM稳定性提供了参考。

关键词:无源互调;非线性;微观界面分析;PIM统计预测中图分类号:TN98文献标志码:A doi:10.11805/TKYDA2022196Statistics methodology in efficient modeling and simulation ofPassive IntermodulationCHEN Xiong1,2,HE Yongning3,YU Ming1(1.Department of Electronic Electrical and Engineering,Southern University of Science and Technology,Shenzhen Guangdong 518055,China;2.Department of Electronic Engineering,The Chinese University of Hong Kong,Shatin Hong Kong 999077,China;3.School of Microelectronics,Faculty of Electronic and Information Engineering,Xi'an Jiaotong University,Xi'an Shaanxi 710049,China)AbstractAbstract::In modern high power communication distortion problems, the nonlinear mixing distortion effect in passive devices is always the most difficult to investigate, and it has attracted great interests inthe modern high power and high density wireless communication system. Facing the typical nonlineareffect on passive device, Passive Intermodulation(PIM), this work concludes the common modelingmethods and the important steps in PIM mechanism researches in recent years. In particular, targeting tothe typical microscopic contact equivalence, PIM numerical transformation, and PIM prediction method inthe engineered cases, the available methods are concluded for present, while a statistics based PIMprediction method for engineered device with dynamic range is proposed for the first time. This methodcan model the specific contact sources by using statistic strategy. The PIM prediction can be expressed asa statistical interval with the probability of each PIM value. This method can provide a big sample data forthe engineered PIM prediction, and can guide the optimization of the PIM stability by controlling thedetailed parameters.KeywordsKeywords::Passive Intermodulation;nonlinearity;microscopic interface analysis;statistical PIM prediction无源互调(PIM)是指当2个或多个大功率信号通过无源器件时,无源器件自身非线性特性在载波激励下产生新的互调频谱成分,一旦互调成分落入接收通带,尤其以距离信号频点最近的三阶交调信号为主,引起接收通文章编号:2095-4980(2023)07-0864-08收稿日期:2022-09-30;修回日期:2023-04-24基金项目:国家自然科学基金面上资助项目(62271240);国家重点实验室基金2021-JCJQ-LB-006资助项目(6142411122115)第 7 期陈雄等:高效无源互调建模仿真中的统计方法道信号失真的一种现象[1]。

AC_25-24 Sustained Engine Imbalance

AC_25-24 Sustained Engine Imbalance

______________________________________________ Subject SUSTAINED ENGINE IMBALANCE Date: 8/2/00 AC No.: 25-24Initiated by: ANM-100 Change_________________________1. PURPOSE. This advisory circular (AC) sets forth an acceptable means, but not the only means, of demonstrating compliance with the provisions of 14 CFR part 25 related to the aircraft design for sustained engine rotor imbalance conditions. Terms used in this AC, such as “shall” or “must,” are used only in the sense of ensuring applicability of this particular method of compliance when the acceptable method of compliance described herein is used. While these guidelines are not mandatory, they are derived from extensive Federal Aviation Administration (FAA) and industry experience in determining compliance with the pertinent Federal Aviation Regulations (FAR). This AC does not change, create any additional, authorize changes in, or permit deviations from, regulatory requirements.2. RELATED DOCUMENTS.a. Title 14, Code of Federal Regulations (14 CFR) part 25.§ 25.571 Damage-tolerance and fatigue evaluation of structure.§ 25.629 Aeroelastic stability requirements.§ 25.901 Installation.§ 25.903 Engines.b. Title 14, Code of Federal Regulations (14 CFR) part 33.§ 33.74 Continued rotation.§ 33.94 Blade containment and rotor unbalance tests.______________________________________________AC 25-24 8/2/00c. Advisory Circulars (AC).AC 25.571-1C Damage-Tolerance and Fatigue Evaluation of Structure.d. Industry Documents.“Engine Windmilling Imbalance Loads - Final Report,” dated July 1, 1997, Aviation Rulemaking Advisory Committee (ARAC) recommendations to the FAA.“Verification of Methods for Damage Tolerance Evaluation of Aircraft Structures to FAA Requirements,” by Tom Swift, FAA, 12th International Committee on Aeronautical Fatigue, May 25, 1983, Figures 42 and 43.3. DEFINITIONS. Some new terms have been defined for the imbalance condition in order to present criteria in a precise and consistent manner. In addition, some terms are employed from other fields and may not be in general use as defined below. The following definitions apply in this AC:a. Airborne Vibration Monitor (AVM). A device used for monitoring the operational engine vibration levels that are unrelated to the failure conditions considered by this advisory circular.b. Design Service Goal (DSG). The design service goal is a period of time (in flight cycles/hours) established by the applicant at the time of design and/or certification and used in showing compliance with § 25.571.c. Diversion Flight. The segment of the flight between the point where deviation from the planned route is initiated in order to land at an en route alternate airport and the point of such landing.d. Ground Vibration Test (GVT). Ground resonance tests of the airplane normally conducted in compliance with § 25.629.e. Imbalance Design Fraction (IDF). The ratio of the design imbalance to the imbalance (including all collateral damage) resulting from tests of a single release of a turbine, compressor, or fan blade at redline speed (as usually conducted for compliance with § 33.94).f. Low Pressure (LP) Rotor. The rotating system, which includes the low pressure turbine and compressor components and a connecting shaft.g. Well Phase. The flight hours accumulated on an airplane or component before the failure event.28/2/00 AC 25-244. BACKGROUND.a. Requirements. Section 25.901(c) requires that no single failure or malfunction or probable combination of failures in the powerplant installation will jeopardize the safe operation of the airplane. In addition, § 25.903(c) requires means of stopping the rotation of an engine where continued rotation could jeopardize the safety of the airplane, and § 25.903(d) requires that design precautions be taken to minimize the hazards to the airplane in the event of an engine rotor failure.b. Blade Failure. The failure of a fan blade and the subsequent damage to other rotating parts of the fan and engine may induce significant structural loads and vibration throughout the airframe that may damage the nacelles, critical equipment, engine mounts, and airframe primary structure. Also, the effect of flight deck vibration on displays and equipment is of significance to the crew’s ability to make critical decisions regarding the shut down of the damaged engine and their ability to carry out other operations during the remainder of the flight. The vibratory loads resulting from the failure of a fan blade have traditionally been regarded as insignificant relative to other portions of the design load spectrum for the airplane. However, the progression to larger fan diameters and fewer blades with larger chords has changed the significance of engine structural failures that result in an imbalanced rotating assembly. This condition is further exacerbated by the fact that fans will continue to windmill in the imbalance condition following engine shut down. Current rules require provisions to stop the windmilling rotor where continued rotation could jeopardize the safety of the airplane. However, large high bypass ratio fans are practically impossible to stop in flight.c. Shaft Support Failure. Service experience has shown that failures of shaft bearings and shaft support structure have also resulted in sustained high vibratory loads similar to the sustained imbalance loads resulting from fan blade loss.d. Imbalance Conditions. There are two sustained imbalance conditions that may affect safe flight: the windmilling condition and a separate high power condition.(1) Windmilling Condition. The windmilling condition results after the engine is spooled down but continues to rotate under aerodynamic forces. The windmilling imbalance condition results from shaft support failure or loss of a fan blade along with collateral damage. This condition may last until the airplane completes its diversion flight, which could be several hours.(2) High Power Condition. The high power imbalance condition occurs immediately after blade failure but before the engine is shut down or otherwise spools down. This condition addresses losing less than a full fan blade which may not be sufficient to cause the engine to spool down on its own. This condition may last from several seconds to a few minutes. In some cases it has hampered the crew's ability to read instruments that may have aided in determining which engine was damaged.3AC 25-24 8/2/00e. The Aviation Rulemaking Advisory Committee (ARAC) has developed recommendations regarding design criteria and analytical methodology for assessing the engine imbalance event. ARAC submitted those recommendations to the FAA in the report “Engine Windmilling Imbalance Loads - Final Report,” dated July 1, 1997. The information provided in this AC is derived from the recommendations in that report.f. The criteria presented in this AC are based on a statistical analysis of 25 years of service history of high by-pass ratio engines with fan diameters of 60 inches or greater. Although the study conducted by ARAC was limited to these larger engines, the criteria and methodology are also acceptable for use on smaller engines.5. EVALUATION OF THE WINDMILLING IMBALANCE CONDITIONS.a. Objective. It should be shown by a combination of tests and analyses that after partial or complete loss of an engine fan blade, including collateral damage, or after shaft support failure, the airplane is capable of continued safe flight and landing.b. Evaluation. The evaluation should show that during continued operation at windmilling engine rotational speeds, the induced vibrations will not cause damage that would jeopardize continued safe flight and landing. The degree of flight deck vibration should not prevent the flightcrew from operating the airplane in a safe manner. This includes the ability to read and accomplish checklist procedures.This evaluation should consider:(1) The damage to airframe primary structure including, but not limited to, engine mounts and flight control surfaces,(2) The damage to nacelle components, and(3) The effects on critical equipment (including connectors) mounted on the engine or airframe.c. Blade Loss Imbalance Conditions.(1) Windmilling Blade Loss Conditions. The duration of the windmilling event should cover the expected diversion time of the airplane. An evaluation of service experience indicates that the probability of the combination of a 1.0 IDF and a 1-hour diversion is on the order of10-7 to 10 -8 while the probability of the combination of a 1.0 IDF and a 3-hour diversion is 10-9 or less. Therefore, with an IDF of 1.0, it would not be necessary to consider diversion times greater than 3-hours. In addition, the 3-hour diversion should be evaluated using nominal and realistic48/2/00 AC 25-24flight conditions and parameters. The following two separate conditions with an IDF of 1.0 are prescribed for application of the subsequent criteria which are developed consistent with the probability of occurrence:(a) A 1-hour diversion flight.(b) If the maximum diversion time established for the airplane exceeds 1-hour, a diversion flight of a duration equal to the maximum diversion time, but not exceeding 3-hours.(2) Airplane Flight Loads and Phases.(a) Loads on the airplane components should be determined by dynamic analysis. At the start of the windmill event, the airplane is assumed to be in level flight with a typical payload and realistic fuel loading. The speeds, altitudes, and flap configurations considered may be established according to the Airplane Flight Manual (AFM) procedures. The analysis should take into account unsteady aerodynamic characteristics and all significant structural degrees of freedom including rigid body modes. The vibration loads should be determined for the significant phases of the diversion profiles described in paragraphs 5c(1)(a) and (b) above.(b) The significant phases are:1 The initial phase during which the pilot establishes a cruise condition;2 The cruise phase;3 The descent phase; and4 The approach to landing phase.(c) The flight phases may be further divided to account for variation in aerodynamic and other parameters. The calculated loads parameters should include the accelerations needed to define the vibration environment for the systems and flight deck evaluations. A range of windmilling frequencies to account for variation in engine damage and ambient temperature should be considered.(3) Strength Criteria.(a) The primary airframe structure should be designed to withstand the flight and windmilling vibration load combinations defined in paragraphs 1, 2, and 3 below.1 The peak vibration loads for the flight phases in paragraphs 5c(2)(b)1 and 3 above, combined with appropriate 1g flight loads. These loads should be considered limit loads, and a factor of safety of 1.375 should be applied to obtain ultimate load.5AC 25-24 8/2/002 The peak vibration loads for the approach to landing phase in paragraph5c(2)(b)4 above, combined with appropriate loads resulting from a positive symmetrical balanced maneuvering load factor of 1.15 g. These loads should be considered as limit loads, and a factor of safety of 1.375 should be applied to obtain ultimate load.3 The vibration loads for the cruise phase in paragraph 5c(2)(b)2 above, combined with appropriate 1g flight loads and 70 percent of the flight maneuver loads up to the maximum likely operational speed of the airplane. These loads are considered to be ultimate loads.4 The vibration loads for the cruise phase in paragraph 5c(2)(b)2 above, combined with appropriate 1g flight loads and 40 percent of the limit gust velocity of § 25.341 as specified at V C (design cruising speed) up to the maximum likely operational speed of the airplane. These loads are considered to be ultimate loads.(b) In selecting material strength properties for the static strength analyses, the requirements of § 25.613 apply.(4) Assessment of Structural Endurance.(a) Criteria for fatigue and damage tolerance evaluations of primary structure are summarized in Table 1 below. Both of the conditions described in paragraphs 5c(1)(a) and (b) above should be evaluated. Different levels of structural endurance capability are provided for these conditions. The criteria for the condition in paragraph 5c(1)(b) are set to ensure at least a 50 percent probability of preventing a structural component failure. The criteria for the condition in paragraph 5c(1)(a) are set to ensure at least a 95 percent probability of preventing a structural component failure. These criteria are consistent with the probability of occurrences for these events discussed in paragraph 5(c)(1) above.(b) For multiple load path and crack arrest “fail-safe” structure, either a fatigue analysis per paragraph 1 below, or damage tolerance analysis per paragraph 2 below, may be performed to demonstrate structural endurance capability. For all other structure, the structural endurance capability should be demonstrated using only the damage tolerance approach of paragraph 2 below. The definitions of multiple load path and crack arrest "fail-safe" structure are the same as defined for use in showing compliance with § 25.571, "Damage tolerance and fatigue evaluation of structure."1 Fatigue Analysis. Where a fatigue analysis is used for substantiation of multiple load path “fail-safe” structure, the total fatigue damage accrued during the well phase and the windmilling phase should be considered. The analysis should be conducted considering the following:68/2/00 AC 25-24(aa) For the well phase, the fatigue damage should be calculated using an approved load spectrum (such as used in satisfying the requirements of § 25.571) for the durations specified in Table 1. Average material properties may be used.(bb) For the windmilling phase, fatigue damage should be calculated for the diversion profiles using a diversion profile consistent with the AFM recommended operations, accounting for transient exposure to peak vibrations, as well as the more sustained exposures to vibrations. Average material properties may be used.(cc) For each component, the accumulated fatigue damage specified in Table 1 should be shown to be less than or equal to the fatigue damage to failure of the component.2 Damage Tolerance Analysis. Where a damage tolerance approach is used to establish the structural endurance, the airplane should be shown to have adequate residual strength during the specified diversion time. The extent of damage for residual strength should be established, considering growth from an initial flaw assumed present since the airplane was manufactured. Total flaw growth will be that occurring during the well phase, followed by growth during the windmilling phase. The analysis should be conducted considering the following:(aa) The size of the initial flaw should be equivalent to a manufacturing quality flaw associated with a 95 percent probability of existence with 95 percent confidence (95/95).(bb) For the well phase, crack growth should be calculated starting from the initial flaw defined in paragraph 5c(4)(b)2(aa) above, using an approved load spectrum (such as used in satisfying the requirements of § 25.571) for the duration specified in Table 1. Average material properties may be used.(cc) For the windmilling phase, crack growth should be calculated for the diversion profile starting from the crack length calculated in paragraph 5c(4)(b)2(bb) above. The diversion profile should be consistent with the AFM recommended operation accounting for transient exposure to peak vibrations as well as the more sustained exposures to vibrations. Average material properties may be used.(dd) The residual strength for the structure with damage equal to the crack length calculated in paragraph 5c(4)(b)2(cc) above should be shown capable of sustaining the combined loading conditions defined in paragraph 5c(3)(a) above with a factor of safety of 1.0.7AC 25-24 8/2/00TABLE 1 - Fatigue and Damage ToleranceCondition Paragraph 5c(1)(a) Paragraph 5c(1)(b)Imbalance DesignFraction (IDF)1.0 1.0Diversion time A 60-minute diversion The maximum expecteddiversion6Fatigue Analysis1,2 (average material properties) Well phase Damage for 1 DSG Damage for 1 DSG Windmilling phase Damage due to 60 minutesdiversion under a 1.0 IDFimbalance condition.Damage due to the maximumexpected diversion time6 undera 1.0 IDF imbalance condition Criteria Demonstrate no failure7 undertwice the total damage due tothe well phase and thewindmilling phase.Demonstrate no failure7 underthe total damage (unfactored)due to the well phase and thewindmilling phase.Damage Tolerance1,2 (average material properties) Well phase Manufacturing quality flaw5(MQF) grown for 1 DSGManufacturing quality flaw5(MQF) grown for 1/2 DSG Windmilling phase3,4 Additional crack growth for 60minute diversion with an IDF =1.0Additional crack growth for themaximum diversion6 with anIDF = 1.0Criteria Positive margin of safety withresidual strength loads specifiedin 5c(3)(a) for the final cracklengthPositive margin of safety withresidual strength loads specifiedin 5c(3)(a) for the final cracklengthNotes:1 The analysis method that may be used is described in paragraph 5 (Evaluation of the WindmillingImbalance Conditions) of this Advisory Circular.2 Load spectrum to be used for the analysis is the same load spectrum qualified for use in showingcompliance with § 25.571, augmented with windmilling loads as appropriate.3 Windmilling phase is to be demonstrated following application of the well phase spectrum loads.4 The initial flaw for damage tolerance analysis of the windmilling phase need not be greater than theflaw size determined as the detectable flaw size plus growth under well phase spectrum loads for oneinspection period for mandated inspections.5 MQF is the manufacturing quality flaw associated with 95/95 probability of existence. (Reference -‘Verification of Methods For Damage Tolerance Evaluation of Aircraft Structures to FAARequirements’, Tom Swift FAA, 12th International Committee on Aeronautical Fatigue, 25 May 1983,Figures 42, and 43.)6 Maximum diversion time for condition 5c(1)(b) is the maximum diversion time established for theairplane, but need not exceed 180 minutes. This condition should only be investigated if the diversiontime established for the airplane exceeds 60 minutes.7 The allowable cycles to failure may be used in the damage calculations.(5) Systems Integrity.(a) It should be shown that systems required for continued safe flight and landing after a blade-out event will withstand the vibratory environment defined for the windmilling conditions and diversion times described above. For this evaluation, the airplane is assumed to 88/2/00 AC 25-24be dispatched in its normal configuration and condition. Additional conditions associated with the Master Minimum Equipment List (MMEL) need not be considered in combination with the blade-out event.(b) The initial flight environmental conditions are assumed to be night, instrument meteorological conditions (IMC) enroute to nearest alternate airport, and approach landing minimum of 300 feet and 3/4 mile or runway visual range (RVR) 4000 or better.(6) Flightcrew Response. For the windmilling condition described above, the degree of flight deck vibration shall not inhibit the flightcrew’s ability to continue to operate the airplane in a safe manner during all phases of flight.d. Shaft Support Failure. To evaluate these conditions, the low pressure (LP) rotor system should be analyzed with each bearing removed, one at a time, with the initial imbalance consistent with the airborne vibration monitor (AVM) advisory level. The analysis should include the maximum operating LP rotor speed (assumed bearing failure speed), spool down, and windmilling speed regions. The effect of gravity, inlet steady air load, and significant rotor to stator rubs and gaps should be included. If the analysis or experience indicates that secondary damage such as additional mass loss, secondary bearing overload, permanent shaft deformation, or other structural changes affecting the system dynamics occur during the event, the model should be revised to account for these additional effects. The objective of the analyses is to show that the loads and vibrations produced by the shaft support failure event are less than those produced by the blade loss event across the same frequency range.6. ANALYSIS METHODOLOGY.a. Objective of the Methodology. The airplane response analysis for engine windmilling imbalance is a structural dynamic problem. The objective of the methodology is to develop acceptable analytical tools for conducting dynamic investigations of imbalance events. The goal of the windmilling analyses is to produce loads and accelerations suitable for structural, systems, and flight deck evaluations.b. Scope of the Analysis. The analysis of the airplane and engine configuration should be sufficiently detailed to determine the windmilling loads and accelerations on the airplane. For airplane configurations where the windmilling loads and accelerations are shown not to be significant, the extent and depth of the analysis may be reduced accordingly.c. Results of the Analysis. The windmilling analyses should provide loads and accelerations for all parts of the primary structure. The evaluation of equipment and human factors may require additional analyses or tests. For example, the analysis may need to produce floor vibration levels, and the human factors evaluation may require a test (or analysis) to subject the seat and the human subject to floor vibration.9AC 25-24 8/2/007. MATHEMATICAL MODELING.a. Components of the Integrated Dynamic Model. Airplane dynamic responses should be calculated with a complete integrated airframe and engine analytical model. The airplane model should be to a similar level of detail to that used for certification flutter and dynamic gust analyses, except that it should also be capable of representing asymmetric responses. The dynamic model used for windmilling analyses should be representative of the airplane to the highest windmilling frequency expected. The integrated dynamic model consists of the following components:(1) Airframe structural model,(2) Engine structural model,(3) Control system model,(4) Aerodynamic model, and(5) Forcing function and gyroscopic effects.b. Airframe Structural Model. An airframe structural model is necessary in order to calculate the response at any point on the airframe due to the rotating imbalance of a windmilling engine. The airframe structural model should include the mass, stiffness, and damping of the complete airframe. A lumped mass and finite element beam representation is considered adequate to model the airframe. This type of modeling represents each airframe component, such as fuselage, empennage, and wings, as distributed lumped masses rigidly connected to weightless beams that incorporate the stiffness properties of the component. A full airplane model capable of representing asymmetric responses is necessary for the windmilling imbalance analyses. Appropriate detail should be included to ensure fidelity of the model at windmilling frequencies.A more detailed finite element model of the airframe may also be acceptable. Structural damping used in the windmilling analysis may be based on Ground Vibration Test (GVT) measured damping.c. Engine Structural Model.(1) Engine manufacturers construct various types of dynamic models to determine loads and to perform dynamic analyses on the engine rotating components, its static structures, mounts, and nacelle components. Dynamic engine models can range from a centerline two-dimensional (2D) model, to a centerline model with appropriate three-dimensional (3D) features such as mount and pylon, up to a full 3D finite element model (3D FEM). Any of these models can be run for either transient or steady state conditions.108/2/00 AC 25-24(2) These models typically include all major components of the propulsion system, such as the nacelle intake, fan cowl doors, thrust reverser, common nozzle assembly, all structural casings, frames, bearing housings, rotors, and a representative pylon. Gyroscopic effects are included. The models provide for representative connections at the engine-to-pylon interfaces as well as all interfaces between components (e.g., inlet-to-engine and engine-to-thrust reverser). The engine that is generating the imbalance forces should be modeled in this level of detail, while the undamaged engines that are operating normally need only to be modeled to represent their sympathetic response to the airplane windmilling condition.(3) Features modeled specifically for blade loss windmilling analysis typically include fan imbalance, component failure and wear, rubs (blade to casing, and intershaft), and resulting stiffness changes. Manufacturers whose engines fail the rotor support structure by design during the blade loss event should also evaluate the effect of the loss of support on engine structural response during windmilling.(4) Features that should be modeled specifically for shaft support failure windmilling events include the effects of gravity, inlet steady air loads, rotor to stator structure friction and gaps, and rotor eccentricity. Secondary damage should be accounted for, such as additional mass loss, overload of other bearings, permanent shaft deformation, or other structural changes affecting the system dynamics, occurring during rundown from maximum LP rotor speed and subsequent windmilling.d. Control System Model. The automatic flight control system should be included in the analysis unless it can be shown to have an insignificant effect on the airplane response due to engine imbalance.e. Aerodynamic Model. The aerodynamic forces can have a significant effect on the structural response characteristics of the airframe. While analysis with no aerodynamic forces may be conservative at most frequencies, this is not always the case. Therefore, a validated aerodynamic model should be used. The use of unsteady three-dimensional panel theory methods for incompressible or compressible flow, as appropriate, is recommended for modeling of the windmilling event. Interaction between aerodynamic surfaces and main surface aerodynamic loading due to control surface deflection should be considered where significant. The level of detail of the aerodynamic model should be supported by tests or previous experience with applications to similar configurations. Main and control surface aerodynamic derivatives should be adjusted by weighting factors in the aeroelastic response solutions. The weighting factors for steady flow (k=0) are usually obtained by comparing wind tunnel test results with theoretical data.f. Forcing Function and Gyroscopic Forces. Engine gyroscopic forces and imbalance forcing function inputs should be considered. The imbalance forcing function should be calibrated to the results of the test performed under § 33.94.11AC 25-24 8/2/008. VALIDATION.a. Range of Validation. The analytical model should be valid to the highest windmilling frequency expected.b. Airplane Structural Dynamic Model. The measured ground vibration tests (GVT) normally conducted for compliance with § 25.629 may be used to validate the analytical model throughout the windmilling range. These tests consist of a complete airframe and engine configuration subjected to vibratory forces imparted by electro-dynamic shakers.(1) Although the forces applied in the ground vibration test are small compared to the windmilling forces, these tests yield reliable linear dynamic characteristics (structural modes) of the airframe and engine combination. Furthermore, the windmilling forces are far less than would be required to induce nonlinear behavior of the structural material (i.e. yielding). Therefore, a structural dynamic model that is validated by ground vibration test is considered appropriate for the windmilling analysis.(2) The ground vibration test of the airplane may not necessarily provide sufficient information to assure that the transfer of the windmilling imbalance loads from the engine is accounted for correctly. The load transfer characteristics of the engine to airframe interface via the pylon should be validated by test and analysis correlation. In particular, the effect of the point of application of the load on the dynamic characteristics of the integrated model should be investigated in the ground vibration test by using multiple shaker locations.(3) Structural damping values obtained in the ground vibration tests are considered conservative for application to windmilling dynamic response analysis. Application of higher values of damping consistent with the larger amplitudes associated with windmilling analysis should be justified.c. Aerodynamic Model. The dynamic behavior of the whole airplane in air at the structural frequency range associated with windmilling is normally validated by the flight flutter tests performed under § 25.629.d. Engine Model. The model is validated based on dedicated vibration tests and results of the § 33.94 fan blade loss test. In cases where compliance with § 33.94 is granted by similarity instead of test, the model should be correlated to prior experience.(1) Validation of the engine model static structure, including the pylon, is achieved by a combination of engine and component tests that include structural tests on major load path components. The adequacy of the engine model to predict rotor critical speeds and forced response behavior is verified by measuring engine vibratory response when imbalances are added to the fan and other rotors. Vibration data are routinely monitored on a number of engines during the engine development cycle, thereby providing a solid basis for model correlation.12。

药品注册用英语

药品注册用英语

药品注册用英语如今做注册资料经常会触及英语表达,为了使我们写注册资料时的英语更地道,希望各位达人能积极勇跃提供经常触及的英语表达,使我们的注册水平更上一层楼。

我先抛砖引玉CEP:欧洲药典顺应性证书certificate of suitability to monograph of European Pharmacopoeia。

是欧洲药典所收载的原料药的一种认证顺序,用以确定原料药的质量可以用欧洲药典的方法加以控制。

这一顺序适用于消费的和提取的无机或无机物质以及发酵消费的非直接基因产品。

DMF:Drug master File美国药物主文件档案。

是指提交给FDA的用于提供关于人用药品的消费设备、工艺或消费、工艺处置、包装和贮存中运用的物料的详细的和保密的信息。

分为五种类型:I:消费地点、设备、操作顺序和人员II:原料药、原料药中间体、消费原料药和中间体运用的物料和药品III:包装资料IV:赋形剂、色素、调味剂、香料或消费这些物质所用的物料V:FDA接受的参考信息EDMF:European Drug Master File欧洲药物主文件档案。

是指欧洲制剂央求中有关原料药信息的文件,又称原料药主文件档案〔ASMF〕。

EDMF 只要在制剂央求的支持下才干提交。

EDMF分为两局部:1.央求人局部〔AP〕:供制剂央求人运用的非保密信息;2. 限制局部〔RP〕:EDMF持有人以为是保密的信息。

EDMF的运用范围:1. 新原料药2. 的但欧洲药典或其成员国药典没有收载的原料药3. 欧洲药典或成员国药典已收载的原料药ANDA:Abbreviated New Drug Application 美国复杂新药央求。

是FDA规则的仿制药央求顺序。

Generic:仿制的,非特殊的API:Active Pharmaceutical Ingredient 原料药Dossier:文档,档案。

TSE:Transmitting animal Spongiform Encephalopathy agent 传达性植物海绵状脑病体Q7A:ICH〔国际协调会议〕原料药GMP 指南。

“PEP”2024年小学4年级上册第8次英语第六单元测验卷

“PEP”2024年小学4年级上册第8次英语第六单元测验卷

“PEP”2024年小学4年级上册英语第六单元测验卷考试时间:100分钟(总分:120)B卷考试人:_________题号一二三四五总分得分一、综合题(共计100题)1、How do you say "bird" in French?A. OiseauB. PájaroC. VogelD. Uccello2、填空题:I feel ______ when I try something new.3、听力题:I have a ___ (pet/animal) at home.4、填空题:I like to ______ (炫耀) my artwork.5、听力题:The ______ can live a long time.6、听力题:I can ________ (lead) a team effectively.7、What is the sum of 1 + 2 + 3?A. 4B. 5C. 6D. 78、听力题:A ______ is a method for visually representing data.9、What is the name of the first spacecraft to capture images of the far side of the moon?A. Apollo 11B. Luna 3C. Voyager 1D. Mariner 1010、听力填空题:I believe everyone has a story to tell. Listening to others helps us understand different perspectives and cultures. I enjoy hearing stories from my grandparents about their lives.11、填空题:We can _______ a road trip together.12、填空题:The __________ (历史的流动) reflects change.13、What is the capital of Italy?A. VeniceB. RomeC. FlorenceD. Milan14、What do you call the first month of the year?A. FebruaryB. MarchC. JanuaryD. December答案:C15、填空题:I can ______ (保持) a balanced approach to challenges.16、填空题:The __________ (历史的收藏) preserves our legacy.17、What color is a ripe banana?A. GreenB. YellowC. RedD. Brown18、听力题:I like to eat _____ for lunch. (sandwiches)19、What do we call a scientist who studies the history of life on Earth?A. PaleontologistB. ArchaeologistC. BiologistD. Geologist20、填空题:The starfish can regenerate lost ______ (部分).21、听力题:I want to ______ a superhero. (become)22、What is the name of the famous wizard in "Harry Potter"?A. DumbledoreB. GandalfC. MerlinD. Hagrid答案:A23、听力题:The _______ can thrive in both sun and shade.24、选择题:What is the opposite of wet?A. DryB. MoistC. HumidD. Damp25、What is the capital of South Korea?A. SeoulB. BusanC. IncheonD. Jeju26、听力题:The Sun will eventually expand into a ______ star.27、听力题:I want to _____ (become/learn) a teacher.28、听力题:The pH scale measures how acidic or ______ a substance is.29、填空题:My ________ (玩具名称) is a classic toy that never gets old.30、What is the term for the fear of spiders?A. AcrophobiaB. ArachnophobiaC. ClaustrophobiaD. Agoraphobia答案:B31、听力题:I want to ___ a musician. (become)32、What is the capital city of Andorra?A. Andorra la VellaB. Escaldes-EngordanyC. EncampD. Sant Julià de Lòria33、What is the process of water changing into vapor called?A. CondensationB. EvaporationC. PrecipitationD. Infiltration答案: B34、填空题:The __________ (历史的深刻反思) influences decisions.35、听力题:A rabbit has long ______ for jumping.36、What is the opposite of big?A. SmallB. LargeC. HugeD. Giant答案: A37、听力题:I have a ______ (new) bike.38、听力题:The ______ is a large ball of gas in space.39、填空题:The __________ (历史的故事情节) captivate our imagination.40、填空题:The ________ (公路) connects different cities.The ____ has a slender body and is often found in the grass.42、听力题:The chemical symbol for zinc is ______.43、What do we call the natural home of an animal or plant?a. Habitatb. Environmentc. Ecosystemd. Biome答案:a44、听力题:The __________ is a natural feature that changes over time.45、听力题:My favorite book is ________.46、What do you call the process by which plants lose water?A. PhotosynthesisB. TranspirationC. RespirationD. Germination答案:B47、How many continents are there?A. FiveB. SixC. SevenD. Eight48、What is the main ingredient in sushi?A. NoodlesB. RiceC. BreadD. Potatoes答案:B49、听力题:Some _______ can survive in extreme conditions.50、听力题:A _______ is a result of a chemical reaction.The _____ (owl) is hooting.52、填空题:The ______ (植物的生理特征) can reveal much about their needs.53、填空题:My friend is my loyal _______ who always stands by me.54、填空题:My favorite fruit is _______ (西瓜).55、填空题:The panda is black and ________________ (白色).56、听力题:The kitten is ___ (pouncing) on a toy.57、填空题:The _______ (Impeachment) is a process used to remove a president from office.58、填空题:The __________ (历史的教育工具) enhance learning experiences.59、What do we call the process of changing milk into cheese?A. FermentationB. CoagulationC. PasteurizationD. Homogenization60、听力题:My sister plays ________ with her friends.61、What is the name of the famous ancient city in Italy that was buried by a volcanic eruption?A. PompeiiB. RomeC. AthensD. Cairo答案:A62、What do we call the act of developing a strategy?A. PlanningB. OrganizingC. StructuringD. All of the Above答案:D63、Which animal is known as the "king of the jungle"?A. TigerB. ElephantC. LionD. Bear答案:C64、填空题:The ________ was a famous explorer who sailed across the Atlantic.65、What is the process of learning called?A. EducationB. RecreationC. CelebrationD. Communication答案: A66、填空题:The _____ (玩具枪) makes laser sounds.67、听力题:The chemical formula for iron(III) oxide is __________.68、Which of these is not a planet?A. MercuryB. MarsC. SunD. Jupiter答案:C69、What do you call a large natural stream of water?a. Lakeb. Riverc. Oceand. Pond答案:B70、听力题:A reaction that produces a color change indicates a ______ reaction.71、What is the name of the event where people come together to celebrate a holiday?A. GatheringB. FestivalC. PartyD. Event答案: B72、cartographer) creates maps. 填空题:The ____73、听力题:My dad _____ a new car last week. (bought)74、填空题:The _______ (The American Revolutionary War) was fought for independence from Britain.75、听力题:Hydrogen is commonly found in ______ compounds.76、Which insect is known for its ability to build a hive?A. AntB. BeeC. ButterflyD. Mosquito答案:B77、听力题:The chemical symbol for chlorine is ______.78、填空题:I like to watch ______ (音乐视频) for inspiration. They often tell powerful stories through art.79、填空题:My ___ (小仓鼠) loves new toys.80、Which insect can produce light?A. AntB. FireflyC. ButterflyD. Ladybug81、听力题:The chemical formula for sulfuric acid is __________.82、What is the name of the famous mountain in the Alps?A. Mont BlancB. MatterhornC. EigerD. Jungfrau答案:A. Mont Blanc83、填空题:The otter uses rocks to crack open _______ (贝壳).84、听力题:A ______ helps to protect against predators.85、What do you call a person who plays the piano?A. PianistB. GuitaristC. DrummerD. Violinist86、What do we call a story with talking animals?A. FableB. NovelC. BiographyD. Poetry答案:A87、听力题:My sister is a good ________.88、填空题:A ______ (生态园) promotes biodiversity.89、选择题:What is the name of the famous musical composed by Andrew Lloyd Webber?A. Les MisérablesB. CatsC. The Phantom of the OperaD. Rent90、填空题:My brother enjoys __________. (骑自行车)91、听力题:The ______ is known for her support of local charities.92、填空题:The __________ is a famous landmark in India. (泰姬陵)93、What do you call a story that is told in verse?A. NovellaB. PoemC. ProseD. Narrative答案: B94、填空题:In Canada, the official languages are English and ________(在加拿大,官方语言是英语和________).95、填空题:My sister has a pet _________ (仓鼠).96、听力题:Metallic elements tend to lose ______ when they react.97、听力题:The chemical symbol for zinc is _____.98、听力题:We are going to the __________ for dinner.99、填空题:I like reading books about _______ (我喜欢阅读有关_______的书).100、Which fruit is red and often mistaken for a vegetable?A. AppleB. TomatoC. StrawberryD. Cherry答案:B。

相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

A Model-based Methodology for Application Specific Energy EfficientData Path Design using FPGAsSumit Mohanty1,Seonil Choi1,Ju-wook Jang2,Viktor K.Prasanna11Dept.of Electrical Engg.2Dept.of Electronic Engg.Univ.of Southern California Sogang UniversityLos Angeles,CA,90089Seoul,Korea{smohanty,seonilch,prasanna}@ jjang@sogang.ac.krAbstractWe present a methodology to design energy-efficient data paths using FPGAs.Our methodology integrates domain specific modeling,coarse-grained performance evaluation,design space explo-ration,and low level simulation to understand the tradeoffs between energy,latency,and area.The domain specific modeling technique defines a high-level model by identifying various components and parameters specific to a domain that affect the system-wide energy dissipation.A domain is a family of architectures and corresponding algorithms for a given application kernel.The high-level model also consists of functions for estimating energy,latency,and area that facilitate tradeoff analysis.Design space exploration(DSE)analyzes the design space defined by the domain and selects a set of designs.Low-level simulations are used for accurate performance estimation for the designs selected by the DSE and also forfinal design selection.We illustrate our methodology using a family of architectures and algorithms for matrix multi-plication.The designs identified by our methodology demonstrate tradeoffs among energy,latency, and area.We compare our designs with a vendor specified matrix multiplication kernel to demon-strate the effectiveness of our methodology.To illustrate the effectiveness of our methodology,we used average power density(E/AT),energy/(area×latency),as the metric for comparison.For various problem sizes,designs obtained using our methodology are on average25%superior with respect to the E/AT performance metric,compared with the state-of-the-art designs by Xilinx.We also discuss the implementation of our methodology using the MILAN framework. Keywords:energy optimization,embedded system design,reconfigurable computing1.IntroductionField Programmable Gate Arrays(FPGAs)are aflexible and attractive alternative to dedicated signal processing devices such as DSPs and ASICs.The high processing power available in FP-GAs makes them an attractive fabric for implementing complex and compute intensive applications, such as the signal processing kernels used in the mobile devices[11].Mobile devices operate in en-ergy constrained-environments.Thus,in addition to latency and area,energy is a key performance metric.Traditional methods for energy-efficient data path design involve the use of various low-level design tools to perform optimizations at RTL or gate level.Such techniques are time consuming and are not effective as the return in terms of improvements in energy efficiency is usually muchless compared with high-level optimizations.Studies show that optimization of energy dissipation at the algorithmic level has a much higher impact on the total energy dissipation of a system than optimizations at RTL or gate level [17].It is reported that the ratio of impact on energy optimization is 20:2.5:1for algorithmic,register,and circuit level techniques [16].Moreover,a design using FPGAs has to achieve a balance among energy,latency,and area performance.To achieve this balance,a designer has to consider various tradeoffs,such as energy versus latency,energy versus area,and energy versus I/O.There are several challenges that a designer faces while designing energy efficient systems using FPGAs.Flexibility in using FPGAs results in a large design space.It is not feasible to traverse such a large space using time consuming low-level simulations using tools such as Xilinx XPower [18].Our experience shows that simulators running on a 700MHz Pentium III Xeon require an average of 2-3hours to estimate energy dissipation of a simple design for 3×3matrix multiplication.Also,FPGAs do not exhibit a high-level structure like,for example,a RISC processor.If such a high-level structure is available,then it can be exploited to define a high-level model that facilitates algorithm level design,optimization,and analysis.Finally,it is not possible to define a universal high-level model for FPGAs.The model depends on the design to be mapped on to the device.In order to address the above issues,we propose a design methodology that exploits domain specific modeling technique to model a family of architectures and corresponding algorithms to implement an application.The resulting high-level model can be perceived as a virtual parameter-ized data path (Figure 1).Various parameters in such a data path are referred to as the design knobs.For example,operating frequency,memory capacity,bandwidth,and precision are some of the de-sign knobs.Various settings of these knobs provide tradeoffs among energy,latency,and area and allow a system designer to choose an appropriate setting based on the performance requirements.Power functions associated with each component capture the effect of varying the performance knobs on power dissipation of the component.We consider our approach,based on domain specific modeling,top-down,as our design process begins with a high-level abstraction of a domain and applies various algorithm level optimization techniques to optimize the design.Some of the opti-mization techniques are a)identification of an appropriate setting of the knobs and b)architecture modification based on the algorithmic characteristics.Eventually,once an energy efficient design has been identified the resulting virtual data path is implemented usingFPGA.Figure 1.Virtual data path In this paper,“application”refers to kernel oper-ations such as window operations,matrix multipli-cation,FFT,etc.Design space exploration (DSE)refers to traversing the architecture-algorithm space(domain)to evaluate the quality of a design in terms ofenergy,latency,and area.We use performance to sig-nify some measure of energy,latency,and area.Thearea metric depends on the target FPGA.For the Xil-inx Virtex it is measured in terms of the number ofslices used.In our methodology,for a given appli-cation,a family of architectures and algorithms (do-main)is chosen initially by the designer.Next,a high-level model is defined.This model captures variousarchitecture parameters and provides power functions for rapid (coarse)estimation of energy of the data path for the chosen architecture-algorithm pair.The DSE technique is identified by the designer based on the domain and the high-level model.The model is designed to be at a level of abstraction high enough to expose possible algorithm level optimizations (for example,number ofregisters,multipliers,operating frequency,type of multipliers,etc.).Low-level simulations are used to perform off-line simulation of some sample designs in a given domain to accurately estimate the power functions.This paper focuses on an application specific design methodology.More details of the model definition can be found in[3].We also describe how we have configured the MILAN framework[1]to implement the proposed methodology.We compare the designs obtained using our methodology with a vendor specified matrix mul-tiplication kernel to demonstrate the effectiveness of our methodology.Our designs demonstrate tradeoffs among energy,latency,and area.For performance comparison,we define average power density(E/AT)metric.This metric characterizes a domain in terms of average power dissipated per unit area independent of the problem size.This metric assumes that the designs are area and time optimized.Based on this assumption,the smaller the value for E/AT the better.Based on the E/AT metric our designs are on the average25%superior than the state-of-the-art designs provided by Xilinx.The E/AT metric is evaluated as energy/(area×latency).The rest of the paper is organized as follows.The next section discusses related work.Section 3discusses our design methodology.Section4describes the implementation of this methodology using MILAN.Examples illustrating the methodology and comparison of the resulting designs with the state-of-the-art design is presented in Section5.We conclude in Section6.2.Related workSeveral efforts have addressed modeling FPGAs for performance optimization for various signal processing kernels[2,4,8].These efforts focus on latency optimization through efficient data path design.Luk et al.have proposed several techniques to model and optimize time performance of dynamically reconfigurable systems[11].However,we are not aware of any work that addresses energy optimization of FPGA based implementations through high-level modeling.Several efforts have addressed rapid but low-level power estimation and optimization.Wolff et al.proposed a technique that uses pre-computed tables to characterize power and latency of the RTL and Intellectual Property(IP)components[17].This technique achieves energy efficient designs through identification of components with the lowest energy dissipation that meet the given latency requirement.However,it does not exploit the available knobs such as frequency,size of memory,etc.that can be varied to achieve improved energy performance.Nemani et al.proposed a technique that provides rapid power estimates based on the functional description of combinational circuits and their average activity[14].This effort does not address power optimization.However, it can be integrated into our methodology as a tool for power estimation.Garcia et al.discuss a technique to optimize energy through pipeline architectures[6].They demonstrate that increase in area does not necessarily result in higher energy dissipation.Raghunathan et al.have proposed several techniques to estimate power dissipation of different components in an embedded system[16].Their technique estimates power dissipation based on a bottom-up approach.It modifies available low-level measurement techniques to increase the speed of power measurement.Conversely,we address estimation and optimization through a top-down approach.Our approach begins at the architecture-algorithm(abstraction)level and performs algorithmic optimizations to identify an efficient design before implementing the design using low-level tools.Xilinx provides a tool set for designing with Virtex-II Pro FPGAs[18].However,these tools do not provide a high-level abstraction to explore the design space at the algorithm and architecture level.Instead,the Xilinx tools concentrate on gate-level or RT level optimizations.Our methodol-ogy is a complementary effort.A design resulting from our methodology can be further optimized using the Xilinx tools.3.Design methodologyThe aim of the design methodology is to design energy-efficient data paths specific to an applica-tion.To achieve this goal,our methodology presents a set of designs which provide tradeoffs among energy,latency,and area.The designer explores these designs and identifies an appropriate design based on some selection criteria and performance metrics.Our design methodology is illustrated in Figure2.The level of automation for each step will be discussed in Section4.Figure2.Design methodology3.1.Domain selectionFor each kernel there can be several candidate families of architectures.For example,linear array of processors,two-dimensional array of processors,and cache based uniprocessor architectures are some of the widely used families of architectures.Along with each family of architectures there exists several algorithms that implement each kernel.Several past efforts have identified various architecture families[5,10,15],each having different characteristics in terms of I/O complexity,memory requirements,area,etc.Based on the perfor-mance needs and the capabilities and limitations of the target FPGA chip,we identify a suitable architecture-algorithm family.Identification of an appropriate domain ensures that we begin with an efficient design most suitable for the performance requirements and there are various architec-ture parameters that can be varied to achieve tradeoff among energy,latency,and area.This step is a human-in-the-loop process and exploits the designer’s expertise in algorithms and architecture for domain identification.3.2.Domain specific modelingDomain specific modeling facilitates development of a high-level model for a specific domain. Detailed knowledge of the domain is exploited to identify the architecture parameters for the analy-sis of the energy dissipation of the resulting designs in the domain.The high-level model consists of Relocatable Modules(RModule)and Interconnect as the basic structural components.In addition, it contains several architecture parameters such as operating frequency(f),precision(w),size of memory(s),power-states(ps),etc.that are associated with each component and a set of powerfunctions,one for each power state of a component.Domain specific details identify the range of values for each model parameter,thus reducing the design space.For example,the maximum and minimum problem sizes influence several model parameters if a performance constraint such as maximum tolerable latency has to be met.Also for various domains there are several parameters that can not be varied.Therefore,these parameters are excluded during modeling.Another important aspect of the high-level model is the power functions associated with each component.A power function characterizes the power behavior of a component(RModule or In-terconnect).The function captures the effect of variation of model parameters associated with the component on power dissipation.Curvefitting based on sample low-level simulations are used to determine the function.The high-level model also captures functions to evaluate area and latency based on the problem size and possibly other architecture parameters.Finally,the power func-tions and a set of component power state(CPS)matrices are used to derive the system-wide energy function.The CPS matrices are derived from the algorithm description.These matrices capture the power state for all the components in each cycle.Details of domain specific modeling and techniques to estimate power functions and system-wide energy function can be found in[3]. 3.3.Design tradeoff analysisThe high-level model contains several functions such as power functions associated with each component and performance functions for energy,latency,and area.These functions can be ana-lyzed to understand the tradeoffs between different performance metrics(energy,latency,and area). These functions also capture the sensitivity of the performance with respect to various architecture parameters.For example,if a component has some variable parameters then the power function as-sociated with the component can be analyzed to identify the power-sensitivity with respect to these parameters.3.4.Design space exploration(DSE)During DSE the domain specific design space is traversed to identify designs based on designer specified selection criteria.Our methodology does not propose a DSE technique as the technique depends on the domain.For example,select the design with minimum energy dissipation and select the design with minimum area×latency are some of the possible selection criteria.As our domain specific modeling technique constraints the design space to allow only valid designs, it typically does not result in a very large design space.Further,as functions are associated with different performance metrics,it is possible to use a brute-force technique that evaluates all possible designs to identify a set of designs that meet the selection criteria.However,it is also possible for a designer to exploit the nature of various performance and power functions to implement a more efficient technique for DSE.The model parameters and their ranges(as defined by the high-level model)and the functions evaluating various performance metrics are provided as inputs to the DSE phase.In addition,some design selection criteria can also be provided.The output from the DSE is a single design or a set of designs that satisfy the selection criteria.3.5.Low level simulationLow-level simulation is applied to the designs selected by the DSE step.The DSE uses various functions to evaluate the designs.While the estimates are reasonably accurate(as shown in Sec-tion5),we use low-level simulation for two different purposes.Our study shows that the error dueto high-level estimation is typically in the range of±10%.Therefore,low-level simulation is nec-essary to select a design if two candidate designs are within10%of each other for any performance metric.The other use is to verify the performance estimates evaluated using the functions provided in the high-level model.Another application of low-level simulation is to estimate the power functions associated with the high-level model.Detailed description of the use of low-level simulation for power function estimation can be found in[3].4Implementing the methodology using MILANM odel-based I ntegrated Simu LA tio N(MILAN)is a model based extensible framework that fa-cilitates rapid,multi-granular performance evaluation of a large class of embedded systems,by seamless integration of different widely used simulators and design tools into a unified environ-ment[12].MILAN provides a formal paradigm for specification of the structural and behavioral aspects of embedded systems and a unified software environment for system design and simulation. MILAN can be configured for a specific domain to provide a modeling language suitable for that AN is suitable for our design methodology as it can be configured for a specific do-main and it can seamlessly integrate various simulators and tools.However,the use of MILAN is not limited only to the proposed AN provides an easy plug-n-play environment. Simulators and tools(both henceforth referred to as tools)are integrated into MILAN through soft-ware components known as Model Interpreters(MI).Each tool is associated with its own set of MIs.MIs translate the information stored in the models into the format required by the tool.For example,integration of SimpleScalar(a popular cycle accurate simulator targeting MIPS proces-sors)involves a set of MIs to generate a“config”file for SimpleScalar,to generate“C”code for the application,and to provide feed-back to the model by sending the performance results obtained through simulations to the models.More details of the MILAN framework can be found in[1]. We describe how MILAN is configured to implement the design methodology described in Sec-tion3.Thefirst step does not involve MILAN.This step exploits the designer’s expertise in algo-rithm and architecture to identify a suitable domain for the target application.Once a domain has been identified,MILAN is configured to provide a modeling language suitable for domain specific modeling.Once configured,MILAN provides a user interface(UI)through GME2000,a graph-ical modeling tool.The UI consists of representative graphical blocks for basic modules such as registers,multipliers,adders,and SRAMs,that are used to model the candidate domain in the sec-ond step.Each of the architecture parameters are associated with the appropriate range of values obtained through domain AN uses low-level simulation and information provided in the high-level model to automatically estimate the power functions[3].For the third step,MILAN is used to plot various functions for visual inspection by the designer. The details of the high-level model captured in MILAN are available for design space exploration (DSE),the fourth step.DSE tools can be integrated into MILAN and the MIs associated with the tool feed information from the models to the tool.An illustrative DSE using MILAN can be found in[13].The second,third,and fourth step are semi-automatic.These steps involve the designer to provide required inputs such as the details of the high-level model,choice of DSE tool,selection criteria for the DSE,etc.to the MILAN framework.The DSE step(Step5)identifies a set of candidate designs.These designs are stored in the MILAN design database.The designer then invokes appropriate model interpreters that configure the low-level simulator based on the candidate designs to perform low-level simulation.We haveintegrated XPower and ModelSim in to MILAN to perform low-level simulation for power and latency respectively.5.Case study:Data path design for matrix multiplicationWe illustrate our methodology using matrix multiplication(MM),a frequently used kernel oper-ation in signal and image processing.Also,MM is a fundamental operation that has been widely studied by the architecture and algorithm communities and a rich family of architectures and algo-rithms implementing MM is available[9].5.1.Defining a DomainFigure3.Architecture for matrix multiplication,PE organization,and corresponding algorithm For the sake of illustration,we consider the family of linear array of processing elements(PEs)as the candidate architecture family.This family of architectures offers several advantages compared to other architecture families.These architectures have a low I/O-bandwidth requirement and scale as the problem size grows.An optimal family of algorithms for these architectures is known[15]. Each processor in the linear array has afixed storage of size s,1≤s≤n.The architecture can perform n×n matrix multiplication in O(n2)time using n n/s PEs.The number of PEs(pe) varies from n to n2.However,as our target device is an FPGA with limited amount of logic and memory that can be synthesized on it,we consider two related families of architecture-algorithm:•linear array architecture with total storage n2for a n×n matrix multiplication when n is small,and•a block matrix multiply algorithm for N×N matrices using an linear array implementation for a sub-matrix of size n×n,where N is a multiple of n.5.2.A High-level Model for Matrix Multiplication on Linear Array of ProcessorsThe structure of the linear array is shown in Figure3.a.It consists of two components:processing elements(PEs)and busses connecting the adjacent PEs.For the purpose of high-level modeling,we identified the PE as an RModule and the bus between two adjacent PEs as an Interconnect The PE(see Figure3.b)has a MAC of precision w and a memory of size s.The PE has two power states on and off.During the on state the multiplier is on and thus the PE dissipates more energy than the off state when the multiplier is off.The power state of the multiplier is controlled by clock gating.The PE also includes6registers and3multiplexers of w bits.The key parameters affecting energy are precision(w),number of PEs(pe),amount of memory within a PE(s),and power states (ps).We refer to this design as Design1.A matrix multiplication algorithm for linear array architectures is proposed in[15].There are several constraints imposed by the algorithm which are exploited to identify component specific parameters and their ranges.Also,to achieve the minimum latency,the minimum number of PEs needed for a n×n matrix multiplication is n[15].Therefore,the range of s is given by1≤s≤n. To achieve the minimal I/O complexity O(n2),the total amount of memory across all PEs should be n2.Therefore,the total number of PEs(pe)is n n/s .The latency(T)of this design using n n/s PEs and s memory per PE is[15]:1T=Values or ranges1≤s≤n1≤pe≤n n/s8on,offWe implemented the PE using a Virtex-II FPGA operating at f=166MHz and performed simulations to obtain the power functions for the PE and the bus.The power function for the PE are:(2)P E.p.ps= 7.01s+31.04mW,(ps=on)7.01s+14.04mW,(ps=off)The bus has a constant amount of power dissipation of39.74mW.The area of the design can be expressed as:A=A mult×pe+A reg8×(3s+6)×pe+50×n where,A mult is the area for a multiplier and A reg8is the area for a8bit register.This equation is derived based on the design of the PE(see Figure3)and the factor of50is added to account for the other components such as multiplexers present in each PE.5.3.Tradeoff analysisTradeoff analysis involves plotting various functions associated with the high-level model.For example,Figure4shows the effect of variation of number of memory modules(s)on the power dissipation of a PE and effect of variation of number of PEs(pe)on the system-wide energy for a specific problem size(16×16).Based on these curves,the design that consumes the minimum energy is the design with pe=s=n,where n is the problem size.For large size matrix multiplication we use the well known block matrix multiply technique. The performance in terms of energy,latency,and area for16×16matrix multiplication is shownFigure4.Various tradeoffs associated with the two families of architecturesin Figure4.c.For analysis,we have normalized the values for energy,latency,and area in this graph with respect to the maximum value in each category.Thus,depending on the performance requirement,the best block size can be chosen.For example,block size of4is the most efficient with respect to energy.However,if we optimize for latency or area,block size16and2respectively are the optimal designs within the design space defined by the domain.5.4.Design space explorationTable2.Performance comparisonDesign based Performance Size on Xilinx library Improvement T E T E Ecycles nJ cycles nJ% 6x6480207414.80.0050100.0071001935590.65815x1575002076481.50.0052290.0072129642928485.15948x48245760207212385.80.005010For the sake of illustration,we consider“minimum energy dissipation”as our selection criteria for both the domains.Table2shows the energy efficient designs identified for different problem sizes based on the total energy consumed to perform matrix multiplication.We compare these designs with the state-of-the-art design for matrix multiplication provided by Xilinx[18].As our power functions are well-behaved functions with easily determinable minima,we were able to identify the most energy efficient design through visual inspection of the tradeoff curves.We compared the performance of our design with a design for a3×3matrix multiplication provided by Xilinx[18].All the designs were executed at the same clock frequency of166MHz.We used block matrix multiplication to implement larger sized matrix multiplication using the3×3base design.For each problem size,we compared the design provided by Xilinx to the most efficient designs based on our methodology.Table2shows the energy,latency,and area values for these designs for various problem sizes.The improvement in energy dissipation and latency in our designs compared with the Xilinx designs are also shown.On the average our designs performed57%better with respect to system-wide energy dissipation than the Xilinx design.The latency improvement varies from4×to30×.Also,on the average our designs are25%superior in terms of average power density(E/AT).Note that same or similar values for E/AT indicate that a similar design is used for different problem sizes.The energy dissipation for various designs discussed in this section are based on high-level es-timations using the system-wide energy function for the domain.In order to validate our energy estimation technique,we performed the following experiments.For a particular design,we used the system-wide energy function to estimate the total energy dissipation.We compared this result with a complete VHDL simulation of our designs using the Xilinx tools.In the sample simulations, the input data to the components in estimating the power dissipation was randomly generated and its switching activity(sa)was found to be25%.We performed this experiment for various designs for different problem sizes.Table3shows the comparison.Our energy estimations were(on the average)within6.4%of the estimations using low-level simulation tools.In the worst case,the error was7.4%.Table3.Accuracy of our high-level estimation techniqueProblem size3812Energy Estimated21.4159.9399.6590.61,576.94,357.8Error7.4% 5.4%7.1% 6.7% 5.7% 6.2%5.5.Applying our design methodology for energy optimizationOur design methodology facilitates algorithmic optimizations based on the high-level model and tradeoff analysis.These optimizations are performed as a“human-in-the-loop”process.In the following,we illustrate a scenario where a designer uses the energy distribution among various components to improve energy efficiency of the complete design.We consider Design1described in the previous example as the candidate design.As shown earlier,for Design1,s=n results in an energy efficient design within the domain.We illustrate how energy efficiency can be improved further based on the details captured by the high-level model.Figure5shows the distribution of energy dissipation in Design1for s=n and n=3,12.For Design1(Figure3),47%and76%of the energy is dissipated in registers for problems of size3×3and12×12,respectively.Note that the bulk of the energy is dissipated in the registers.Also,it is difficult to reduce energy dissipation in multipliers and I/O ports without increasing latency(hence energy dissipation).We have developed some techniques at algorithm and architecture level to reduce the number of registers used in matrix multiplication.Our techniques reduce the number of registers from2n2+6n to n2+4n[7].For example,two registers(AS.LR and AS.RR)in Design1(Figure3.b)are replaced by one register by feeding elements of matrix A n cycles after feeding those of matrix B.Careful analysis of data movement reveals that only two registers(B.T1and B.T2)are enough to store the elements of B.We refer to this new design as Design2.As shown in Figure5,in Design2,overall energy dissipation is reduced by16%and25%for problems of size3×3and 12×12,respectively.Amount of energy dissipation in registers is reduced from47%and76%to。

相关文档
最新文档