(2007) On Reducing the Degree of Long-range Dependent Network Traffic Using the CoLoRaDe Algorithm

合集下载

初二物理现象探索英语阅读理解30题

初二物理现象探索英语阅读理解30题

初二物理现象探索英语阅读理解30题1<背景文章>Reflection of LightLight reflection is a phenomenon that occurs when light rays bounce off a surface. When light hits a smooth surface, such as a mirror, the angle at which the light ray approaches the surface is equal to the angle at which it is reflected. This is known as the law of reflection.One of the most common examples of light reflection is seeing our reflection in a mirror. When we stand in front of a mirror, light from our body reflects off the mirror and enters our eyes, allowing us to see our image. Another example is the reflection of light off a still body of water. The smooth surface of the water acts like a mirror, reflecting the surrounding scenery.Reflection of light has many practical applications. In periscopes, for example, light is reflected by two mirrors at 45-degree angles to allow us to see over obstacles. In car headlights, reflectors are used to direct light in a specific direction, improving visibility at night.Now let's look at some questions about light reflection.1. What is light reflection?A. When light passes through a surface.B. When light bends around a surface.C. When light rays bounce off a surface.D. When light is absorbed by a surface.答案:C。

大学英语四级长篇阅读专项强化真题试卷2(题后含答案及解析)

大学英语四级长篇阅读专项强化真题试卷2(题后含答案及解析)

大学英语四级长篇阅读专项强化真题试卷2(题后含答案及解析) 题型有:1.Is it really OK to eat food that’s fallen on the floor?[A] When you drop a piece of food on the floor, is it really OK to eat if you pick it up within five seconds? An urban food myth contends that if food spends just a few seconds on the floor, dirt and germs won’ t have much of a chance to contaminate it. Research in my lab has focused on how food becomes contaminated, and we’ve done some work on this particular piece of wisdom.[B] While the “five-second rule” might not seem like the most pressing issue for food scientists to get to the bottom of, it’s still worth investigating food myths like this one because they shape our beliefs about when food is safe to eat.[C] So is five seconds on the floor the critical threshold (门槛) that separates a piece of eatable food from a case of food poisoning? It’s a bit more complicated than that. It depends on just how many bacteria can make it from floor to food in a few seconds and just how dirty the floor is.[D] Wondering if food is still OK to eat after it’s dropped on the floor is a pretty common experience. And it’s probably not a new one either. A well-known, but inaccurate, story about Julia Child may have contributed to this food myth. Some viewers of her cooking show, The French Chef, insist they saw Child drop lamb on the floor and pick it up, with the advice that if they were alone in the kitchen, their guests would never know.[E] In fact it was a potato pancake, and it fell on the stovetop, not on the floor. Child put it back in the pan, saying, “But you can always pick it up and if you’ re alone in the kitchen, who’s going to see it?” But the misremembered story persists. It’ s harder to pin down the origins of the oft-quoted five-second rule, but a 2003 study reported that 70% of women and 56% of men surveyed were familiar with the five-second rule and that women were more likely than men to eat food that had dropped on the floor.[F] So what does science tell us about what a few moments on the floor means for the safety of your food? The earliest research report on the five-second rule is attributed to Jillian Clarke, a high school student participating in a research project at the University of Illinois. Clarke and her colleagues introduced bacteria to floor tiles (瓷砖) and then placed cookies on the tiles for varying times. They reported bacteria were transferred from the tiles to the cookies within five seconds, but didn’ t report the specific amount of bacteria that made it from the tiles to the food.[G] But how many bacteria actually transfer in five seconds? In 2007, my lab at Clemson University published a study in the Journal of Applied Microbiology. We wanted to know if the length of time food is in contact with a contaminated surface affected the rate of transfer of bacteria to the food. To find out, we introduced bacteria to squares of tile, carpet or wood. Five minutes after that, we placed either bacon or bread on the surface for 5, 30 or 60 seconds, and then measured the number of bacteria transferred to the food. We repeated this exact procedure after the bacteria had been on the surface for 2, 4, 8 and 24 hours.[H] We found that the number of bacteria transferredto either kind of food didn’ t depend much on how long the food was in contact with the contaminated surface—whether for a few seconds or for a whole minute. The overall number of bacteria on the surface mattered more, and this decreased over time after the initial introduction. It looks like what’ s at issue is less how long your food stays on the floor and much more how contaminated with bacteria that patch of floor happens to be.[I] We also found that the kind of surface made a difference as well. Carpets, for instance, seem to be slightly better places to drop your food than wood or tile. When a carpet was contaminated, less than 1% of the bacteria were transferred. But when the food was in contact with tile or wood, 48% -70% of bacteria were.[J] Last year, a study from Aston University in the UK used nearly identical parameters (参数) to our study and found similar results. They also reported that 87% of people asked either would eat or had eaten food fallen on the floor.[K] Should you eat food fallen on the floor then? From a food safety standpoint, if you have millions or more bacteria on a surface, 0. 1% is still enough to make you sick. Also, certain types of bacteria are extremely harmful, and it takes only a small number to make you sick. For example, 10 bacteria or less of an especially deadly strain of bacteria can cause severe illness and death in people with compromised immune systems. But the chance of these bacteria being on most surfaces is very low.[L] And it’ s not just dropping food on the floor that can lead to bacterial contamination. Bacteria are carried by various “media”, which can include raw food, moist surfaces where bacteria have been left, our hands or skin and from coughing or sneezing (打喷嚏). Hands, foods and utensils (器皿) can carry individual bacteria living in communities contained within a protective film. These microscopic layers of deposits containing bacteria are known as biofilms and they are found on most surfaces and objects. Biofilm communities can harbor bacteria longer and are very difficult to clean. Bacteria in these communities also have an enhanced resistance to sanitizers (清洁剂) and antibiotics compared to bacteria living on their own.[M] So the next time you consider eating fallen food, the odds are in your favor that you can eat it without getting sick. But in the rare chance that there is a micro-organism that can make you sick on the exact spot where the food dropped, you can be fairly sure that the bug is on the food you are about to put in your mouth.[N] Research or common sense tells us that the best thing to do is keep your hands, utensils and other surfaces clean.1.A research project found bacteria made their way to the food on the floor in five seconds.正确答案:F解析:该段第二、三句提到,最早关于“5秒钟法则”的研究报告出自吉莉安-克拉克,在研究中克拉克和她的同伴将细菌引入瓷砖,然后将饼干放到地板上停留不同时长。

高一数字世界英语阅读理解25题

高一数字世界英语阅读理解25题

高一数字世界英语阅读理解25题1<背景文章>Artificial intelligence (AI) is rapidly transforming the field of healthcare. In recent years, AI has shown great potential in various aspects of medical care, from diagnosis to treatment and disease prevention.One of the most significant applications of AI in healthcare is in medical imaging. AI algorithms can analyze medical images such as X-rays, CT scans, and MRIs with high accuracy and speed. This helps radiologists detect diseases earlier and more accurately, leading to better patient outcomes. For example, AI can detect signs of cancer in mammograms with a high degree of accuracy, reducing the number of false positives and false negatives.AI is also being used in drug discovery and development. By analyzing large amounts of biological data, AI can identify potential drug targets and predict the efficacy and safety of new drugs. This can significantly reduce the time and cost of drug development and bring new treatments to patients more quickly.Another area where AI is making a significant impact is in personalized medicine. AI can analyze a patient's genetic data, medical history, and lifestyle factors to provide personalized treatmentrecommendations. This can improve the effectiveness of treatment and reduce the risk of adverse reactions.However, the use of AI in healthcare also faces several challenges. One of the main challenges is data privacy and security. Medical data is highly sensitive and must be protected from unauthorized access and use. Another challenge is the lack of transparency and interpretability of AI algorithms. It can be difficult for doctors and patients to understand how AI makes decisions, which can lead to mistrust and resistance.Despite these challenges, the potential benefits of AI in healthcare are enormous. As technology continues to advance, we can expect to see even more innovative applications of AI in the field of medicine.1. What is one of the main applications of AI in healthcare mentioned in the passage?A. Medical research.B. Medical imaging.C. Hospital management.D. Patient care.答案:B。

生物安全防控 英语

生物安全防控 英语

Biological safety is a critical aspect of ensuring the protection of individuals, communities, and the environment from potential risks associated with biological agents. Whether in laboratories, healthcare settings, or natural environments, implementing effective biological safety measures is essential to prevent the spread of infectious diseases, safeguard human health, and maintain the integrity of ecosystems. This comprehensive approach involves risk assessment, stringent protocols, and ongoing monitoring to mitigate potential hazards. In this discussion, we will delve into the key components and strategies for biological safety and control.### **1. Risk Assessment:**Before implementing any biological safety measures, a thorough risk assessment must be conducted. This involves identifying and evaluating potential hazards associated with the biological agents in question. Factors such as the pathogenicity of the organism, transmission routes, and the likelihood of exposure are considered. The risk assessment guides the development of appropriate control measures tailored to the specific characteristics of the biological agent.### **2. Biosafety Levels (BSL):**Biosafety levels categorize laboratories and facilities based on the degree of risk associated with the biological agents they handle. The classification ranges from BSL-1 (lowest risk) to BSL-4 (highest risk). Each level has specific safety requirements, such as facility design, personal protective equipment (PPE), and containment measures. Adhering to the appropriate biosafety level ensures that the handling of biological agents aligns with the potential risks involved.### **3. Personal Protective Equipment (PPE):**The use of personal protective equipment is fundamental in preventing exposure to biological agents. Depending on the risk level, PPE may include gloves, masks, gowns, goggles, or respirators. Proper training on the correct use, removal, and disposal of PPE is crucial to minimize the risk of contamination and protect individuals working with biological agents.### **4. Containment Measures:**Containment measures aim to prevent the accidental release of biological agents into the environment. This includes the use of biological safety cabinets, isolators, and other containment devices in laboratories. Additionally, engineered controls such as ventilation systems and physical barriers help contain biological agents within designated areas, reducing the risk of exposure to laboratory personnel and the surrounding community.### **5. Decontamination Protocols:**Effective decontamination protocols are essential for maintaining a safe environment. Regular cleaning and disinfection of surfaces, equipment, and laboratory spaces help eliminate or reduce the presence of biological agents. Decontamination procedures must be well-established, withconsideration given to the specific characteristics of the agents being handled.### **6. Training and Education:**Proper training and education of personnel working with biological agents are critical components of biological safety. Personnel must be well-versed in the risks associated with specific agents, the correct use of safety equipment, and the implementation of established protocols. Regular training sessions and updates ensure that personnel remain informed about the latest safety measures and protocols.### **7. Surveillance and Monitoring:**Continuous surveillance and monitoring are essential for detecting any deviations from established safety protocols. This includes regular inspections of laboratory facilities, monitoring air and water quality, and implementing surveillance systems to track potential exposures. Early detection allows for prompt corrective actions to prevent the spread of biological agents.### **8. Emergency Response Planning:**Developing and practicing emergency response plans is crucial for effective biological safety. In the event of an accidental release or exposure, personnel should be well-trained on emergency response procedures, evacuation protocols, and communication strategies. Regular drills and simulations help ensure a rapid and coordinated response in emergency situations.### **9. International Collaboration:**Biological safety is a global concern, and international collaboration plays a key role in addressing potential threats. Sharing information, best practices, and research findings across borders enhances the collective capacity to respond to emerging biological risks. Collaboration fosters the development of standardized protocols and guidelines for biological safety on a global scale.### **10. Ethical Considerations:**In the pursuit of biological safety, ethical considerations are paramount. This includes ensuring transparency in research involving potentially hazardous biological agents, obtaining informed consent, and addressing any potential dual-use concerns. Ethical practices contribute to the responsible and acc。

AATCC 194-2006(2007)纺织品在长期测试条件抗室内尘螨性能的测定(英文)

AATCC 194-2006(2007)纺织品在长期测试条件抗室内尘螨性能的测定(英文)

Copyright © 2006 American Association of Textile Chemists and Colorists AATCC Technical Manual/2007TM 194-2006375Developed 2006 by AATCC Committee RA49.1. Purpose and Scope1.1 This test method is for the evalua-tion of the degree of anti-house dust miteactivity in a long-term testing environ-ment for textiles treated at the manufac-turing level for this purpose.2. Principle2.1 Test and control specimens are in-oculated with the test organism and nutri-ents. After six weeks of incubation, suffi-cient time for mite colonies to flourish under optimal conditions, the dust mites are recovered from the specimens by heat extraction. Results are expressed as per cent reduction on the treated sample ver-sus the untreated control.3. Terminology3.1 activity, n.—of an anti-dust mite agent , a measure of the effectiveness of the agent.3.2 anti-house dust mite agent, n.—any chemical which kills (acaricide) or repels house dust mites.4. Safety PrecautionsNOTE: These safety precautions are for information purposes only. The pre-cautions are ancillary to the testing proce-dure and are not intended to be all inclu-sive. It is the user’s responsibility to use safe and proper techniques in handling materials in this test method. Manufac-turers MUST be consulted for specific details such as material safety data sheets and other manufacturer’s recommenda-tions. All OSHA standards and rules must also be consulted and followed.4.1 This test should be carried out bypersons with training and experience in the use of acarological techniques.4.2 CAUTION: Although house dust mites are not considered to be a direct hazard to humans, their fecal pellets have been demonstrated to be a potential po-tent allergen for those susceptible to asthma. Therefore, every necessary and reasonable precaution must be taken to eliminate this risk to the laboratory per-sonnel and to personnel in the associated environment. Where appropriate, wear protective clothing and respiratory pro-tection that prevents penetration by the matter.4.3 All work should be conducted us-ing standard safe laboratory practices.4.4 All chemicals should be handled with care.4.5 An eyewash/safety shower should be located nearby for emergency use.4.6 Exposure to chemicals used in this procedure must be controlled at or below levels set by government authorities (e.g.,Occupational Safety and Health Admin-istration’s [OSHA] permissible exposure limits [PEL] as found in 29 CFR 1910.1000 of January 1, 1989). In addi-tion, the American Conference of Gov-ernmental Industrial Hygienists (ACGIH)Threshold Limit Values (TLVs) com-prised of time weighted averages (TLV-TWA), short term exposure limits (TLV-STEL) and ceiling limits (TLV-C) are recommended as a general guide for air contaminant exposure which should be met (see 13.1).5. Limitations5.1 The method can not be used to de-termine the specific mode of action of a given acaricide treatment.5.2 The method should not be used to predict the performance of a finished arti-cle if the test specimen will go through additional processing steps or represents only a component of the final article.5.3 While this test method provides some insight into the effect of different textile treatments in controlling the abil-ity of mites to successfully establish breeding colonies, direct conclusions can not be made with regard to a treatment re-moving or reducing allergens.5.4 This test method does not allow recovery of house dust mite eggs. How-ever, it does provide a good measurement of the effectiveness of anti-dust mite treatment on a breeding mite colony.6. Test Organisms6.1 Test mites: Dermatophagoides pteronyssinus or D. farinae. Any other species suitable to a given country or re-gion can also be used.7. Maintenance of House Dust Mite Stock Cultures7.1 Dust mite colonies should be main-tained at 25 ± 1°C (77 ± 1°F) and 73-76%relative humidity on one part desiccatedox liver powder: one part dried yeast powder (see 13.2). Before use, the mix-ture should first be ground with a mortar and pestle, then sieved so that the particle size is between 500–750 µm.7.2 Care must be taken to ensure that stock cultures of mites used for testing have not previously been exposed to chemicals or treatments that might have some interaction with the mites.8. Preparation of Specimens8.1 Test Specimens.8.1.1 Prepare a minimum of three test specimens by cutting them to fit snugly in the bottom of a 10 cm diameter glass or polystyrene Petri dish. This can accu-rately be done by tracing around the dish on the sample, or by using of a suitably sized die. For loose fibers, sufficient ma-terial to cover the bottom of the Petri dish should be used.8.1.2 Petri dishes or other test cham-bers of larger or smaller size can be sub-stituted where desired. The size of the test specimen should change accordingly to ensure a snug fit of the sample in the bottom of the dish.8.2 Control specimens.8.2.1 A minimum of three specimens of the same fiber type and construction as the test specimen but containing no anti-mite finish (negative control) should also be prepared.8.2.2 In addition, an internal lab con-trol previously determined to support dust mite colonies should be included for each test. The purpose of this internal control is to provide validation that the mite colony has developed at the ex-pected rate on a known sample over the course of the six weeks test.8.3 Sterilization of Specimens.8.3.1 Specimens may be sterilized when there is potential for fungal growth on the specimen over the test period due to the presence of spores. The method of sterilization used will depend on the sam-ple composition and finish, as well as the particular anti-house dust mite treatment.Report method of sterilization, if used.9. Procedure9.1 Test Setup.9.1.1 Distribute 50 mg of the ground/sieved nutrient mixture on each test specimen. The mixture can be applied through a sieve to enable an even distri-bution of the material.AATCC Test Method 194-2006Assessment of the Anti-House Dust Mite Properties of Textiles under Long-Term Test ConditionsCopyright The American Association of Textile Chemists and Colorists Provided by IHS under license with AATCCLicensee=Hong Kong Polytechnic Univ/9976803100Not for Resale, 03/24/2007 04:07:53 MDTNo reproduction or networking permitted without license from IHS--`````,``````,,``,`,,,```,,``-`-`,,`,,`,`,,`---Copyright © 2006 American Association of Textile Chemists and Colorists 376TM 194-2006AATCC Technical Manual/20079.1.2 To prevent mites from escaping,the sides of the container can be coated with petroleum jelly. A heavy layer ofcoating should be avoided; as it can melt and interfere with mite recovery during the subsequent heat step. Tangle Trap has also been found to provide an effective barrier (see 13.3). However, final recov-ery numbers may be negatively influ-enced due to the numbers of mites be-coming irreversibly trapped on the material. A third option is to place a tex-tile sample that has previously been dem-onstrated to be effective as a mite barrier fabric tightly across the top of the test chamber and fix in place.9.1.3 Close each test chamber and place the test units at 25 ± 1°C (77 ± 1°F)and 73-76% relative humidity for approx-imately 48 h to acclimatize the specimen microenvironment.9.1.4 Place 25 male and 25 female mites from a robust colony on each accli-matized test and control specimen.9.1.5 If possible, use mating pairs to ensure that the females are at a similar stage of oviposition.9.1.6 Close the test chamber and incu-bate the samples at 25 ± 1°C (77 ± 1°F)and 73-76% relative humidity for six weeks.9.2 Mite Recovery.9.2.1 After the six weeks of incubation,remove one test chamber at a time from the incubator. For each plate, pre-cut a sample of nylon mesh material (see 13.4)to fit snugly within the test plate. Cover the mesh with adhesive film so that the sticky side of the tape is in direct contact with the mesh, and the edges of the tape extends beyond the edge of the mesh by approximately 5 mm.9.2.2 Remove the lid from the test chamber and firmly place the tape/mesh combination directly on top of the test specimen, with the sticky side of the tape facing down. Ensure the outer edges of the tape adhere to the sides of the test plate. The mesh should serve to limit the amount of food particles and dead mites that might adhere to the sticky tape dur-ing the subsequent recovery step.9.2.3 Place the plate, minus the lid, di-rectly on a heating plate (see 13.5) set at 50°C (122°F). Place a weight on top ofthe tape/mesh combination to ensure inti-mate contact between the mesh and the test specimen. Use of a pre-cut circle of Styrofoam that will fit in the test plate be-tween the tape/mesh and the weight can aid in evenly distributing the weight, and may also limit moisture buildup on the tape that might otherwise occur.9.2.4 Leave each test chamber on the hot plate for a minimum of 5 h. This should be sufficient for mite recovery from textiles, as well as thicker samples or those with a heavy backing, such as carpets.9.2.5 After the heat exposure, remove the weight and recover the tape/mesh.Cover the second side of the mesh with a clear polyethylene film or a second coat of sticky tape, to secure the mites for sub-sequent counting.10. Evaluation10.1 For each specimen, count the total number of mites recovered on the film using a low power stereo-binocular mi-croscope.10.2 For each set of test and control specimens, calculate the mean and stan-dard deviation.11. Report11.1 Express results as percent reduc-tion versus the control, using the follow-ing formula:where:R =percent reduction of the test spec-imen versus the control.A =the mean number of dust mitesfound on the control specimen.B =the mean number of dust mitesfound on the test specimen.11.2 For a valid test: If a healthy mite colony has been established on the nega-tive control specimens during the six week test period, mites on the internal lab control do not need to be recovered and counted. However, if the mite numbers on the negative controls are lower than expected for a control in this time period,mites from the internal lab control mustR A B–A------------=100×be recovered as outlined in 9.2. Recovery numbers outside of the normal range of mites previously established for each of the internal controls, invalidate the test.11.3 Any deviation from this proce-dure as written must be reported.11.4 The criterion for passing the test must be determined by the interested parties.12. Precision and Bias12.1 Precision. Precision for this test method has not been established. Until a precision statement is generated for this test method, use standard statistical tech-niques in making any comparisons of test results for either within-laboratory or be-tween-laboratory averages.12.2 Bias. Anti-house dust mite prop-erties of textiles under long-term test con-ditions can be defined only in terms of a test method. There is no independent method for determining the true values.As a means of estimating these proper-ties, the method has no known bias.13. Notes and References13.1 Booklet available from Publication Office, ACGIH, 6500 Glenway Avenue,Building D-5, Cincinnati, OH 45211.13.2 Desiccated ox liver powder can be ob-tained from Oxoid Inc., 800 Proctor Avenue,Ogdensburg NY 13669; tel: 800/567-8378;fax: 613/226-3728; e-mail: @.13.3 Tangle Trap can be obtained from The Tanglefoot Company, 314 Straight Avenue S.W., Grand Rapids MI 49504-6485; tel: 616/459-4139; fax: 616/459-4139; e-mail:info@.13.4 A mesh consisting of 447 denier nylon filaments, with 40 × 40 threads /inch, thick-ness of 0.36 mm and with a hole size of 0.63mm has been found effective. This mesh can be obtained from Industrial Textiles Ltd., 62Patiki Rd., Avondale, Auckland 1007 NZ; tel:64 9 828 3188; free fax: 64 9 828 1022; e-mail: info@.13.5 Other means of heating the samples,such as the use of an incandescent light source, can also be used. However, the pro-cess must be optimized to obtain maximum mite recovery for each type of sample before initiation of the test.Copyright The American Association of Textile Chemists and ColoristsProvided by IHS under license with AATCCLicensee=Hong Kong Polytechnic Univ/9976803100Not for Resale, 03/24/2007 04:07:53 MDTNo reproduction or networking permitted without license from IHS--`````,``````,,``,`,,,```,,``-`-`,,`,,`,`,,`---。

07年考研英语阅读理解精读100篇unit49

07年考研英语阅读理解精读100篇unit49

Unit 49 Windsurfers in Hawaii might not seem to have much in common with the geeks who these days tinker with Linux software as part of the open-source movement. But in the late '70s, the surfers freely swapped ideas on how to redesign their equipment right on the beach, and sporting-goods makers were quick to pick up on innovations like foot straps for leaping giant waves. Linux's success is making freely revealed innovation a hot idea again. After decades in which patents closed off innovation, open source has caught the attention of businesses because "it so violated accepted wisdom and so clearly worked," says Yochai Benkler, a Yale scholar. Giants like IBM and HP, and newcomers like Red Hat, have made lots of money on Linux-based services and equipment. Pharmaceuticals represent one new and surprising area where freely shared innovation is catching on. Most industry profits have been made from expensive patented drugs. But now the BioBricks project at MIT is trying to establish standardized tools and processes for research. That way, researchers from everywhere can contribute. Open innovation also makes sense in industries where patents aren't relevant——for example, finding new uses for existing drugs. Eric Von Hippel, MIT's head of innovation and entrepreneurship, is studying FDA applications since 1998 for these so-called off-label uses of patented drugs to see whether, as he suspects, they come mostly from independent researchers rather than the big drugmakers holding the original patents. If they do, it means open-source innovation is already well underway. An open system would also work when the payback is too small to entice Big Pharma, as in the case of tropical diseases. Law professor Stephen Maurer of the University of California, Berkeley, has coauthored a proposal called the Tropical Disease Initiative that could give graduate students, for instance, a chance to work on finding drugs to help fight the likes of malaria. Because discoveries wouldn't be patented, contracts could be awarded to the lowest bidder. Manufacturing prices could be kept down, too, because generic-drug makers could compete as soon as a drug was ready. Plant genetics is another field showing the promise of open innovation. The basic tools for manipulating plant genes, and thereby modifying food, are protected by a thicket of patents largely controlled by multinationals, which means farmers in developing countries don't have access to the techniques. The BIOS Initiative, recently launched by Cambia, an Australian nonprofit, aims to make publicly available an alternative technology. (People would be free to patent any resulting discoveries.) One early aim has been to help farmers find a way to breed their own corn, so they don't need to buy expensive hybrid seeds each year. It's not yet clear just how far this kind of research can be democratized. But in many areas, the open-source option is becoming a serious one. 注:(1)本⽂来⾃Newsweek; 11/1/2004, pE28-E28, 2/3p, 1c 注:(2)本⽂习题命题模仿对象2003年真题text 3 1. The author compares windsurfers in Hawaii with the geeks who these days tinker with Linux software because____________. [A] they loved adventures [B] producers relied on their work [C] they shared their new ideas with other people freely [D] they redesigned their equipments 2. What is businesses' attitude toward Linux's open source? [A] Indifferent [B] Apprehensive [C] Indignant [D] Happy 3. can be inferred from Paragraph 3 that ____________. [A] patented drugs are expensive because they close off innovation [B] independent researchers are more innovative [C] BioBricks allows researchers from the world share their ideas with each other [D] new uses for existing drugs violate patents 4.The word “entice” (Line 1, Paragraph 4) most probably means ___________. [A] satisfy [B] attract [C] repel [D] persuade 5. According to the text, open innovation is promising in the field of plant genetics because ___________. [A] farmers can lower their cost if they know how to breed seeds through open innovation [B] genetically modified food has a bright perspective [C] it can break the monopoly of big companies [D] it is an important part of democracy 答案:C D C B A 篇章剖析: 本篇⽂章是⼀个说明⽂,主要说明开放创意在各个领域所创造的巨⼤价值以及巨⼤潜⼒。

2012年6月英语六级阅读理解备考:真题长难句(5)

2012年6月英语六级阅读理解备考:真题长难句(5)

21.This is especially true in agriculture, where sustainable development is often taken as the sole measure of progress without a proper appreciation of historical and cultural perspectives. (2008年12⽉)【分析】本句为复合句。

主句为This is especially true in agriculture。

where引导的⾮限定性定语从句sustainable…perspectives修饰逗号前⾯的agriculture。

historical and cultural perspectives意为“从历史和⽂化的⾓度”。

【译⽂】这⼀现象在农业领域更是如此。

在农业领域,可持续发展经常被当作进步的标准,但⼈们忽略了从历史和⽂化的⾓度去合理地评价。

22.Although children of Mexican immigrants do better, in terms of educational and professional attainment, than their parents, UCLA sociologist Edward Telles has found that the gains don’t continue.【分析】本句为复杂句。

主句为UCLA sociologist Edward Telles has found that the gains don’t continue。

Although引导让步状语从句。

in terms of意为“在……⽅⾯”,in terms… attainment在句中作插⼊语。

that引导的宾语从句作find的宾语。

【译⽂】尽管墨西哥移民的孩⼦在教育和职业造诣⽅⾯⽐他们的⽗母做得要好,但加利福尼亚⼤学洛杉矶分校的社会学家爱德华•泰勒斯却发现,他们的收⼊没有增加。

大学生英语竞赛 2007 决赛答案

大学生英语竞赛 2007 决赛答案

2007 National English Contest for College Students(Level C - Final)参考答案及作文评分标准Part I Listening Comprehension (25 minutes, 30 points)Section A (6 points)1.B2. C3.A4. C5. C6. BSection B (4 points)7.B 8. C 9. B 10. ASection C (10 points)11.C 12.B 13. A 14.C 15. B 16.C 17. B 18. A 19.C 20. ASection D (10 points)21. generally 22. rival 23. extending 24. in the hands of 25. distinctions26. ineffectively 27. propose 28. attempted 29. desperation 30. surrenderPart II Vocabulary and Structure (10 minutes, 15 points)31.A 32.B 33. B 34.D 35. C 36.A 37. B 38.C 39. C 40. B41. B 42. C 43. B 44.D 45. APart III IQ Test(5 minutes, 5 points)46. C 47.D 48. B 49.A 50. CPart IV Reading Comprehension (25 minutes, 40 points)Section A(6 points)51. C 52. B 53.D 54.B 55.A 56. CSection B(7 points)57.Y 58.Y 59.Y 60.N 61. NG 62.N 63. NSection C(7 points)64.H 65. C 66.E 67. G 68. B 69.A 70. D1 - -Section D(10 points)71. In 1918.72. About 50 million.73. Atlanta, Georgia, USA (in a laboratory).74. Within 6 days.75. A bird flu virus.Section E(10 points)76. bark 77. aspirin 78. classified into 79. set off migraines 80. sensitive to light Part V Cloze(10 minutes, 10 points)81. resolved 82. According to 83. outcome 84. obviously 85. resentment86. involves 87. calm 88. in detail 89. satisfactory 90. preferablePart VI Translation(15 minutes, 20 points)Section A(10 points)91. 它是一枚镀银的铜戒指,长方形的金属底座中间镶着两颗心。

投资练习题(含答案)

投资练习题(含答案)

1、The efficient frontier of risky assets isA)the portion of the investment opportunity set that lies above the global minimum variance portfolio.B)the portion of the investment opportunity set that represents the highest standard deviations.C)the portion of the investment opportunity set which includes the portfolios with the lowest standard deviation.D)the set of portfolios that have zero standard deviation.E)both A and B are true.2、The Capital Allocation Line provided by a risk-free security and N risky securities is ______A) the line that connects the risk-free rate and the global minimum-variance portfolio of the risky securities.B) the line that connects the risk-free rate and the portfolio of the risky securities that has the highest expected return on the efficient frontier.C) the line tangent to the efficient frontier of risky securities drawn from the risk-free rate.D) the horizontal line drawn from the risk-free rate.E) none of the above.3、Consider an investment opportunity set formed with two securities that are perfectly negatively correlated. The global minimum variance portfolio has a standard deviation that is always_____A) greater than zero.B) equal to zero.C) equal to the sum of the securities' standard deviations.D) equal to -1.E) none of the above.4、Which of the following statements is (are) true regarding the variance of a portfolio of two risky securities?A) The higher the coefficient of correlation between securities, the greater the reduction in the portfolio variance.B) There is a linear relationship between the securities' coefficient of correlation and the portfolio variance.C) The degree to which the portfolio variance is reduced depends on the degree of correlation between securities.D) A and B.E) A and C.5、Efficient portfolios of N risky securities are portfolios thatA) are formed with the securities that have the highest rates of return regardless of their standard deviations.B) have the highest rates of return for a given level of risk.C) are selected from those securities with the lowest standard deviations regardless of their returns.D) have the highest risk and rates of return and the highest standard deviations.E) have the lowest standard deviations and the lowest rates of return.6、As diversification increases, the total variance of a portfolio approaches ____________.A) 0 B) 1 C) the variance of the market portfolioD) infinity E) none of the above7、The index model was first suggested by ____________.A) Graham B) Markowitz C) Miller D) SharpeE) none of the above8、.A single-index model uses __________ as a proxy for the systematic risk factor.A) a market index, such as the S&P 500B) the current account deficitC) the growth rate in GNPD) the unemployment rateE) none of the above9、According to the index model, covariances among security pairs areA) due to the influence of a single common factor represented by the market index returnB) extremely difficult to calculateC) related to industry-specific eventsD) usually positiveE) A and D10、In a factor model, the return on a stock in a particular period will be related to _________.A) firm-specific events B) macroeconomic events C) the error termD) both A and B E) neither A nor B11、Which of the following statement(s) is (are) true regarding the selection of a portfolio from those that lie on the Capital Allocation Line?A) Less risk-averse investors will invest more in the risk-free security and less in the optimal risky portfolio than more risk-averse investors.B) More risk-averse investors will invest less in the optimal risky portfolio and more in the risk-free security than less risk-averse investors.C) Investors choose the portfolio that maximizes their expected utility.D) A and C.E) B and C.12、An investor who wishes to form a portfolio that lies to the right of the optimal risky portfolio on the Capital Allocation Line must:A) lend some of her money at the risk-free rate and invest the remainder in the optimal risky portfolio.B) borrow some money at the risk-free rate and invest in the optimal risky portfolio.C) invest only in risky securities.D) such a portfolio cannot be formed.E) B and C13、Portfolio theory as described by Markowitz is most concerned with:A) the elimination of systematic risk.B) the effect of diversification on portfolio risk.C) the identification of unsystematic risk.D) active portfolio management to enhance returns.E) none of the above.14、The measure of risk in a Markowitz efficient frontier is:A) specific risk.B) standard deviation of returns.C) reinvestment risk.D) beta.E) none of the above.15、A statistic that measures how the returns of two risky assets move together is:A) variance. B) standard deviation. C) covariance. D) correlation.E) C and D.16、Rosenberg and Guy found that __________ helped to predict a firm's beta.A) the firm's financial characteristicsB) the firm's industry groupC) firm sizeD) both A and BE) A, B and C all helped to predict betas.17、If a firm's beta was calculated as 0.6 in a regression equation, Merrill Lynch would state the adjusted beta at a numberA) less than 0.6 but greater than zero.B) between 0.6 and 1.0.C) between 1.0 and 1.6.D) greater than 1.6.E) zero or less.18、The beta of Exxon stock has been estimated as 1.2 by Merrill Lynch using regression analysis on a sample of historical returns. The Merrill Lynch adjusted beta of Exxon stock would be ___________.A) 1.20 B) 1.32 C) 1.13 D) 1.0 E) none of the above19、Consider the single-index model. The alpha of a stock is 0%. The return on the market index is 16%. The risk-free rate of return is 5%. The stock earns a return that exceeds the risk-free rate by 11% and there are no firm-specific events affecting the stock performance. Theβ of the stock is _______.A) 0.67 B) 0.75 C) 1.0 D) 1.33 E) 1.5020、Suppose you forecast that the market index will earn a return of 15% in the coming year. Treasury bills are yielding 6%. The unadjusted β of Mobil stock is 1.30. A reasonable forecast of the return on Mobil stock for the coming year is _________ if you use Merrill Lynch adjusted betas.A) 15.0% B) 15.5% C) 16.0% D) 16.8% E) none of the above21、The unsystematic risk of a specific securityA) is likely to be higher in an increasing market.B) results from factors unique to the firm.C) depends on market volatility.D) cannot be diversified away.E) none of the above.22、Which statement about portfolio diversification is correct?A) Proper diversification can reduce or eliminate systematic risk.B) The risk-reducing benefits of diversification do not occur meaningfully until at least 50-60 individual securities have been purchased.C) Because diversification reduces a portfolio's total risk, it necessarily reduces the portfolio's expected return.D) Typically, as more securities are added to a portfolio, total risk would be expected to decrease at a decreasing rate.E) None of the above statements is correct.23、Given an optimal risky portfolio with expected return of 12% and standard deviation of 23% and a risk free rate of 3%, what is the slope of the best feasible CAL?A) 0.64 B) 0.39 C) 0.08 D) 0.35 E) 0.3624、Given an optimal risky portfolio with expected return of 13% and standard deviation of 26% and a risk free rate of 5%, what is the slope of the best feasible CAL?A) 0.60 B) 0.14 C) 0.08 D) 0.36 E) 0.3125、The individual investor's optimal portfolio is designated by:A) The point of tangency with the indifference curve and the capital allocation line.B) The point of highest reward to variability ratio in the opportunity set.C) The point of tangency with the opportunity set and the capital allocation line.D) The point of the highest reward to variability ratio in the indifference curve.E) None of the above.26、The single-index modelA) greatly reduces the number of required calculations, relative to those required by the Markowitz model.B) enhances the understanding of systematic versus nonsystematic risk.C) greatly increases the number of required calculations, relative to those required by the Markowitz model.D) A and B. E) B and C.27、The Security Characteristic Line (SCL)A) plots the excess return on a security as a function of the excess return on the market.B) allows one to estimate the beta of the security.C) allows one to estimate the alpha of the security.D) all of the above. E) none of the above.28、The expected impact of unanticipated macroeconomic events on a security's return during the period isA) included in the security's expected return. B) zero.C) equal to the risk free rate. D) proportional to the firm's beta. E) infinite.29、Covariances between security returns tend to beA) positive because of SEC regulations.B) positive because of Exchange regulations.C) positive because of economic forces that affect many firms.D) negative because of SEC regulationsE) negative because of economic forces that affect many firms.30、One “cost” of the single-index model is that itA) is virtually impossible to apply.B) prohibits specialization of efforts within the security analysis industry.C) requires forecasts of the money supply.D) is legally prohibited by the SEC.E) allows for only two kinds of risk -- macro risk and micro risk.投资组合习题一、单项选择题1、下列不属于投资的战略动机的是()。

2007年考研英语阅读解翻译与解析

2007年考研英语阅读解翻译与解析

2007年全国硕士研究生入学考试英语试题解析文章中心:完型填空的命题理论规定,文章的中心思想一般体现在文章首段的首句;有时首段首句其他段落的首句共同表达文章中心思想。

因此,在选择具体题目答案前,把握文章中心对于理解文章语句,把握逻辑关系,确定语意衔接提供了足够的信息依据。

文章首段主题句叙述到By 1830 the former Spanish and Portuguese colonies had become题目解析:By 1830 the former Spanish and Portuguese colonies had become independent nations. The roughly 20 million 1 of these nations looked 2 to the future.1.[A]natives [B]inhabitants [C]peoples [D]individuals2.[A]confusedly[B]cheerfully [C]worriedly [D]hopefully1. 语意辨析题本题目选择名词,在句子中充当主语。

句子叙述到The roughly 20 millionof these nations looked to the future. “这些国家大概有2000万…对未来…。

”选项A. natives 本地人;B. inhabitant居民;C. peoples 民族;D. individuals个体。

不难发现,选项A. natives 本地人,“这些国家大概有2000万本地人…”,符合句子含“这些国家大概有2000万居民…”,符合句子含义;选项C. peoples 义;选项B. inhabitant居民,民族,“这些国家大概有2000万个民族”,显然有悖于常理,不符合句子含义;选项 D. individuals个体,“这些国家大概有2000万个体…”,不符合句子含义,个体一般用于区分于集体时使用。

007版2012年12月英语六级阅读真题(全三套及答案详解)

007版2012年12月英语六级阅读真题(全三套及答案详解)

2012年12月英语六级第一套深度阅读真题Section BPassage OneQuestions 52 to 56 are based on the following passage.Who's poor in America? That's a question hard to answer. Hard because there's no conclusive definition of poverty. Low income matters, though how low is unclear. Poverty is also a state of mind that fosters self-defeating behavior-bad work habits, family breakdowns, and addictions. Finally, poverty results from bad luck: accidents, job losses, disability.Despite poverty's messiness, we've measured progress against it by a single statistic: the federal poverty line. By this measure, we haven't made much progress. But the apparent lack of progress is misleading for two reasons.First, it ignores immigration. Many immigrants are poor and low-skilled. They add to the poor. From 1989 to 2007, about three quarters of the increase in the poverty population occurred among Hispanics(西班牙裔美国人)-mostly immigrants and their children.Second, the poor's material well-being has improved. The official poverty measure obscures this by counting only pre-tax cash income and ignoring other sources of support, including food stamps and housing subsidies. Although many poor live from hand to mouth, they've participated in rising living standards. In 2005, 91% had microwaves. 79% air-conditioning, and 48% cell phones.The existing poverty line could be improved by adding some income sources and subtracting some expenses. Unfortunately, the administration's proposal for a "supplemental poverty measure" in 2011 goes beyond that. The new poverty number would compound public confusion. It also raises questions about whether the statistic is tailored to favor a political agenda.The "supplemental measure" ties the poverty threshold to what the poorest third of Americans spend on food, housing, clothing, and utilities. The actual threshold will probably be higher thantoday's poverty line. Many Americans would find this weird: people get richer, but "poverty" stays stuck..What produces this outcome is a different view of poverty. The present concept is an absolute one: the poverty threshold reflects the amount estimated to meet basic needs. By contrast, the new measure embraces a relative notion of poverty: people are automatically poor if they're a given distance from the top, even if their incomes are increasing.The new indicator is a "propaganda device" to promote income redistribution by showing that poverty is stubborn or increasing. The Census Bureau has estimated statistics similar to the administration's proposal. In 2008, the traditional poverty rate was %; estimates of the new statistic range up to l7%. The new poverty statistic exceeds the old, and the gap grows larger over time.As senator Daniel Moynihan said, the administration is defining poverty up. It's legitimate to debate how much we should aid the poor or reduce economic inequality. But the debate should not be swayed by misleading statistics that few Americans could possibly understand. Government statistics should strive for political neutrality(中立).This one fails.注意:此部份试题请在答题卡2上作答。

新世纪研究生公共英语教材阅读C课文译文(正确版)

新世纪研究生公共英语教材阅读C课文译文(正确版)

新世纪研究生公共英语教材阅读C课文译文上课篇章:1、3、4、5、7、11、13、14Unit one1.人文学科是否只是一种无用的装饰品,是我们陈旧过时的教育体系中发育不全的附属体?在一个也许更需要强调人文学科的重要性的时代里,是否相反过分强调了技术的重要性?我们究竟该不该在学校里不厌其烦地教授人文学科?这些是常常困扰教育家和理性思想家的问题.让我们在更宽的范国内研究这些问题.因为我们文化遗产的传承在一定程度上取决于对这些问题的回答。

2.人文学科不是一种单纯的工具,也不会促成一般意义上的进步。

无论从广泛的文化意义上还是从狭隘的学术意义上讲。

人文学科的价值更富有个性和永久性。

不管哪一代,总有人会在这世上碰上书籍、音乐、艺术品和剧院,并本能地被这些东西所吸引。

这些人长大后,对他们所喜欢的东西形成了一种根深蒂固的嗜好,也偏爱和他们有着同样爱好的人。

而更多的人,尽管不那么专注,但也时也表现出对艺术活动有相似的爱好。

这两个群体的人已经足以让其他人感受到他们所欣赏的东西在印常生活中的存在。

3.于是,建筑及其装饰艺术,如邮局墙面上的壁饰或是复原的威廉斯堡,强加给了成百上千万人,如果任其自然,这些人就会生活在洞穴或帐篷里面;于是报纸和杂志重现照片,复述历史,评论艺术(不管是古老的还是当代的),批评音乐和书籍,撰写有关艺术家生活和思想的文章——简言之,去迎合少数人的需求,而这少数人以他们奇特的品味影响着我们所有的人。

4.于是,公共图书馆、博物馆、公园音乐会还有餐间广播节目把这些特殊内容的产物(像人们所谓的那样)“提供给所有的人”。

因此,当我们老生常谈地说是科学主宰现代世界的时候,我们必须立即加上这么一句话:是艺术赋予了这同一世界形状和色彩;它最悦耳的声音和意义是由音乐和诗歌赋予的,它的类别、特征、流行口号是由哲学、小说和历史斌予的。

假设所有献身人文学科的人突然隐居到修道院里,随身带走了属于他们自己的全部东西,那么,我们所熟悉的这个日常的世界将会在我们惊愕的面孔前变成一种荒凉、黑暗、死寂的东西,毫无感官魅力,除了现实的需求和通过机械手段满足这些需求以外,就没有任何别的意义了。

2007英语专业四级阅读理解答案及详解(2)

2007英语专业四级阅读理解答案及详解(2)

2007 英语专业四级阅读理解答案及详解(2)TEXT CI am afraid to sleep. I have been afraid to sleep for the last few weeks. I am so tired that, finally, I do sleep, but only for a few minutes. It is not a bad dream that wakes me ; it is the reality I took with me into sleep . I try to think of something else. Immediately the woman in the marketplace comes into my mind.I was on my way to dinner last night when I saw her . She was selling skirts. She moved with the same ease and loveliness I often saw in the women of Laos. Her long black hair was as shiny as the black silk of the skirts she was selling . In her hair, she wore three silk ribbons, blue ,green, and white. They reminded me of my childhood and how my girlfriends and I used to spend hours braiding ribbons into our hair.I don’t know the word for “ribbons”, so I put my hand to my own hair and , with three fingers against my head , I looked at her ribbons and said “Beautiful. ” She lowered her eyes and said nothing.I wasn’t sure if she understood me (I don’t speak Laotian very well).I looked back down at the skirts. They had designs on them: squares and triangles and circles of pink and green silk. They were very pretty. I decided to buy one of those skirts, and I began to bargain with her over the price. It is the custom to bargain in Asia. In Laos bargaining is done in soft voices and easy moves with the sort of quiet peacefulness.She smiled, more with her eyes than with her lips. She was pleased by the few words I was able to say in her language, although they were mostly numbers,and she saw that I understood something about the soft playfulness of bargaining.We shook our heads in disagreement over the price ; then, immediately, we made another offer and then another shake of the head. She was so pleased that unexpectedly, she accepted the last offer I made. But it was too soon. The price was too low. She was being too generous and wouldn’t make enough money.I moved quickly and picked up two more skirts and paid for all threeat the price set ; that way I was able to pay her three times as much before she had a chance to lower the price for the larger purchase. She smiled openly then, and, for the first time in months, my spirit lifted. I almost felt happy.The feeling stayed with me while she wrapped the skirts in a newspaper and handed them to me. When I left, though, the feeling left, too. It was as though it stayed behind in marketplace. I left tears in my throat. I wanted to cry. I didn’t , of course.I have learned to defend myself against what is hard ; without knowing it, I have also learned to defend myself against what is soft andwhat should be easy.I get up, light a candle and want to look at the skirts. They are still in the newspaper that the woman wrapped them in. I remove the paper, and raise the skirts up to look at them again before I pack them. Something falls to floor. I reach down and feel something cool in my hand. I move close to the candlelight to see what I have. There are five long silk ribbons in my hand, all different colors. The woman in the marketplace! She has given these ribbons to me!There is no defense against a generous spirit, and this time I cry, and very hard, as if I could make up for all the months that I didn’t cry.89. According to the writer, the woman in the marketplace ____B____ .A. refused to speak to her.B. was pleasant and attractive.C. was selling skirts and ribbons.D.recognized her immediately.解析:B。

职称英语复习资料理工类C级阅读理解精选(1)2

职称英语复习资料理工类C级阅读理解精选(1)2

⽂章详解: 1. ⾸先解读标题:Electric(这是理⼯类阅读中经常出现的单词,因此含义要记住:电⼦的)Backpack(合成词:back是后背的意思,pack是包、包裹的意思,因此backpack就是背包。

)背包是⼤家⽇常⽣活中很熟悉的东西,但电⼦背包没听说过。

带着⼀份好奇,通读⼀遍原⽂,⼤致了解,电⼦书包除了⼤家知道的普通功能之外,科学家还打算让它具有更多更新的功能。

虽然现在市场上还买不到,但总有⼀天会⾛进我们的⽣活,为我们带来更多便利的。

2.接下来,在正式看⽂章每句话之前,先浏览所设置的问题,这样⼀⽅⾯可以更清楚地了解⽂章的脉络,另⼀⽅⾯⼀会⼉精读时,也⽐较容易在相关段落找到答案。

通过看五个问题,我们知道,它们的答案就出现在⽂章相应的五个段落⾥,⽽且以细节题居多。

所以,我们就看⼀题,针对性地精读⼀段。

先看问题1: 1. Backpacks are convenient because___________. A) They can be very large他们能够⾮常⼤ B) They can hold as many things as you want to carry.你想带多少东西,背包就能装多少东西 C) Your hands are freed to do other things.你的双⼿能够被解放出来⼲其它事情 D) You do not have to carry things with you. 你不⽤随⾝携带东西了。

题⽬的意思是:背包很⽅便,是因为。

标准的细节题形式: ⽂章⼀开头,就提到Backpacks(背包) are convenient.所以,我们⼀起把第⼀段读完:They can hold(装) your books, your lunch, and a change of clothes(换洗⾐服), leaving (留着)your hands free (⾃由的、空闲的)to do other things. Someday(有朝⼀⽇), if(如果) you don’t mind carrying (介意做某事,⼀般⽤mind doing sth)a heavy load(很重的东西), your backpacks might also power(动词,给。

07年“高级英语”课文逐句翻译(11)

07年“高级英语”课文逐句翻译(11)

我为什么写作 Lesson 12: Why I Write 从很⼩的时候,⼤概五、六岁,我知道长⼤以后将成为⼀个作家。

From a very early age, perhaps the age of five or six, I knew that when I grew up I should be a writer. 从15到24岁的这段时间⾥,我试图打消这个念头,可总觉得这样做是在戕害我的天性,认为我迟早会坐下来伏案著书。

Between the ages of about seventeen and twenty-four I tried to adandon this idea, but I did so with the consciousness that I was outraging my true nature and that sooner or later I should have to settle down and write books. 三个孩⼦中,我是⽼⼆。

⽼⼤和⽼三与我相隔五岁。

8岁以前,我很少见到我爸爸。

由于这个以及其他⼀些缘故,我的性格有些孤僻。

我的举⽌⾔谈逐渐变得很不讨⼈喜欢,这使我在上学期间⼏乎没有什么朋友。

I was the middle child of three, but there was a gap of five years on either side, and I barely saw my father before I was eight- For this and other reasons I was somewhat lonely, and I soon developed disagreeable mannerisms which made me unpopular throughout my schooldays. 我像⼀般孤僻的孩⼦⼀样,喜欢凭空编造各种故事,和想像的⼈谈话。

外文翻译--减少美国金融系统的系统性风险

外文翻译--减少美国金融系统的系统性风险

原文:The Reduction of Systematic Risk In The United States FinancialSystemGoing forward, the central problem for financial regulation (defined as the prescription of rules, as distinct from supervision or risk assessment) is to reduce systemic risk. Systemic risk is the risk that the failure of one significant financial institution can cause or significantly contribute to the failure of other significant financial institutions as a result of their linkages to each other. Systemic risk can also be defined to include the possibility that one exogenous shock may simultaneously cause or contribute to the failure of multiple significant financial institutions. This Article focuses on the former definition because proper regulation could have the greatest potential to reduce systemic risk in this area.There are four principal linkages that can result in a chain reaction of failures. First, there are interbank deposits, whether from loans or from correspondent accounts used to process payments. These accounts were the major concern when Continental Illinois Bank almost failed in the mid-1980s. Continental held sizable deposits of other banks; in many cases, the amount of the deposits substantially exceeded the capital of the depositor banks. These banks generally held such sizable deposits because they cleared payments, such as checks or wire transfers, through Continental. If Continental had failed, those banks would have failed as well. Section 308 of the FDIC Improvement Act of 1991 gives the Federal Reserve Board powers to deal with this problem. The Act permits the Board to limit the credit extended by an insured depository institution to another depository institution. Limitation of interbank deposits may be feasible with respect to placements by one bank with another because the amount of credit extended is fixed for a given term. Indeed, it appears that the chain-reaction risk arising from bilateral credit exposures from overnight Federal Reserve funds transactions is quite low: Losses would not exceed one percent of total commercial banking assets as long as loss rates are kept to historically observed levels.Exposures are more difficult to identify with respect to interbank clearing accounts where the amount of credit extended is a function of payment traffic. For example, Bank A may be credited by its correspondent Bank B for an incoming wire transfer of $10 million. Bank A is thus a creditor of Bank B for this amount. If BankB were to fail Bank A is seriously exposed. Without material changes in the payment system, such as forcing banks to make and receive all payments through Federal Reserve rather than correspondent accounts, it would be quite difficult to limit these types of exposures.Second, a chain reaction of bank failures can occur through net settlement payment systems. If one bank fails to settle its position in a net settlement system for large value payments, such as the Clearing House Interbank Payments System (CHIPS) in the United States, other banks that do not get paid may, in turn, fail. This risk was the major systemic risk concern of the Federal Reserve until CHIPS changed its settlement procedures in 2001 to essentially eliminate this risk.Third, a chain reaction of bank failures can occur through imitative runs. When one bank fails, depositors in other banks, particularly those whose deposits are uninsured, may assume that their banks may also fail and so withdraw their funds, exposing these banks to a liquidity crisis and ultimately to failure. This result comes from a lack of information in the market about what specifically caused the first bank to fail.(n15) The Federal Reserve plays the classic role of lender of last resort to stem irrational imitative runs in situations such as this one.Lastly, and especially prominent in the current crisis, a chain reaction of bank failures can occur as a result of counterparty risk on derivative transactions, such as credit default swaps (CDSs). ).Here the concern is that if institution X fails to settle its derivative position with institution Y, both X and Y will fail. If Y in turn cannot settle its positions, other institutions will also fail. This risk proved potentially significant in the failure of the hedge fund Long-Term Capital Management in 1998. Concerns of this type also underlay JPMorgan Chase's assisted acquisition of Bear Stearns and the injection of federal funds into AIG.(n18) This is one area in which the failure of non-banks is a major concern, but the severity of this form of systemic risk and the degree of interconnectedness among financial institutions is currently unknown.(n19) A report by the Special Inspector General for the Troubled Asset Relief Program (SIGTARP) on the government's investments in AIG indicated that Goldman Sachs, a major counterparty, would have been made whole in the event of an AIG default. The report further indicated that the Treasury and Federal Reserve were primarily concerned with losses that would be incurred byinvestors in AIG in the event of a default, including $10 billion of state and local government money, $40 billion in 401(k) plans, and $38 billion in retirement plans. The report's explanation of the government's action also mentioned concern over stemming runs on money market funds, which held $20 billion in AIG commercial paper. Similarly, in their recent testimony on the "Federal Bailout of AIG," Treasury Secretary Timothy Geithner and New York Federal Reserve General Counsel Thomas Baxter also emphasized factors other than derivatives counterparty risk, including the impact that the failure of AIG would have on money market funds, personal savings and retirement plans, and insurance policyholders. If prospective investor losses, rather than the fallout of interconnectedness, were the true basis for the government policy with respect to AIG, it may be that the concern with systemic risk is overstated. Further study and better disclosure from the Treasury and Federal Reserve is needed to support informed estimates of the magnitude of the problem. In any event, gauging the impact of systemic risk is difficult to determine and beyond the scope of this Article.The threat of systemic risk(whether real or imagined) results in both the need for government bailouts at taxpayer expense and in an increase in moral hazard. These results occur because both equity and debt holders, as well as counterparties, may be protected against losses. Of course, the government could decide not to intervene, but this laissez-faire approach could put the entire global economy at risk, an even worse outcome. As the financial crisis has illustrated, banks cannot always count on the government to cut off systemic risk when it occurs. The politics of supplying money to banks are unpopular and unsustainable by the Federal Reserve over the long term without intense public scrutiny and loss of independence.At the outset, it is also worth noting that the"Volcker Rules" and related limitations on bank size announced by the Obama Administration on January 21, 2009 do not have much if any potential to reduce systemic risk. The Volcker Rules would prohibit bank holding companies and all of their subsidiaries from engaging in proprietary trading, as well as from investing in or sponsoring hedge fund and private equity operations. Although President Obama has characterized proprietary trading as trading "unrelated to serving customers," a precise legal standard has not been given.The related size limitations were initially described as straightforward caps on each bank's market share of non-deposit liabilities. As Deputy Treasury Secretary Neal Wolin describes, however, the size limits would not require banks to divest existing operations or restrict organic growth, but would instead limit banks' ability to gain market share through mergers and acquisitions.The Volcker Rules are unlikely to reduce systemic risk for several reasons. First, banks generally engage in relatively little proprietary trading. For example, Wells Fargo and Bank of America, two of the largest deposit-funded banks, are estimated to earn less than 1% of revenues from proprietary trading. Second, activities that threaten the financial system do not occur only in banks. In fact, none of the most prominent failures of the financial crisis--Fannie Mae, Freddie Mac, AIG, Bear Stearns, or Lehman--was a deposit-taking bank. And third, focusing on proprietary trading ignores the real cause of the financial crisis: losses from lending and securitization. Goldman Sachs has estimated that losses from lending and securitization accounted for approximately 80% of overall credit losses incurred by U.S. banks.Nor should we expect reductions in systemic risk to result from the size limitations. An institution does not pose systemic risk because of its absolute size, but rather because of its debt, its derivatives positions, and the scope and complexity of its other financial relationships. Because the problem is not size but interconnectedness, reform should focus on reducing the interconnections so that firms can fail safely. Furthermore, even if size were the right issue, Mr. Wolin's testimony implies that the size limitations would not require any existing bank to shrink. If size is the source of systemic risk, presumably we should be concerned about it whether it is the result of acquisition, organic growth, or otherwise.The draft legislation introduced by Senator Dodd on March 15, 2010 (the Senate draft) contained a modified version of the Volcker Rules and size limitations. Though the Senate draft calls on the Financial Stability Oversight Council to conduct studies of whether these reforms will reduce systemic risk before they are implemented, studies are not needed to confirm that benefits from these reforms will be negligible. Outright restrictions on proprietary trading proposed in the Senatedraft would apply to insured depository institutions, companies that control insured depository institutions, bank holding companies, and all subsidiaries of the foregoing. The Dodd proposal is even more strict than Chairman Volcker recommended. According to Chairman Volcker it would be acceptable for Goldman Sachs to drop its bank charter and continue to engage in proprietary trading. However, under the Senate draft, Goldman would almost certainly be a systematically important nonbank financial company when it dropped its bank charter, and thus would continue to be supervised by the Federal Reserve. While Goldman could, as a non-bank, continue to engage in proprietary trading, it would be subject to Federal Reserve controls, including "additional capital requirements" and "additional quantitative limits."Thus, even if Goldman Sachs were to give up its bank charter, it would be required to hold additional capital against its proprietary trading positions. Because institutions that are systemically important are likely to be more thoroughly regulated than those that are not, this could encourage proprietary trading to shift to less carefully monitored firms, thereby increasing systemic risk. Saddling non-bank financial companies engaged in proprietary trading with additional capital requirements is thus problematic.This Article addresses what I regard as the five most important policies for dealing with systemic risk: the imposition of capital requirements (or limits on leverage), the use of clearinghouses and exchanges for over-the-counter derivatives, the resolution of insolvent institutions, the emergency lending by the Federal Reserve, and the structure of the regulatory system as it affects the control of systemic risk.II. Capital RequirementsEx ante, regulatory capital requirements have been the chief measure to reduce systemic risk. Capital requirements, which have focused principally on banks, are designed to decrease the likelihood of financial institution failure. If institutions do not fail, the problem of systemic risk largely disappears. Capital requirements have been highly regulated for a long time. Since 1988, the requirements have been standardized worldwide by the Basel Committee on Bank Supervision. The United States implemented Basel I and is in the process of implementing Basel II for banks and their holding companies. The SEC had already implemented Pillar I of Basel IIfor securities firms' holding companies before the onslaught of the credit crisis. These capital requirements proved highly inadequate. The SEC's Basel II-based rules permitted the top five major investment banks to achieve leverage of over thirty to one.(Insufficient capital was a significant cause of the failure of Lehman Brothers and Bear Stearns. Insufficient capital also played a major role in forcing Merrill Lynch to sell itself to Bank of America. Indeed, the most intensive and detailed area of regulation, capital, has proven ineffective. This failure demonstrates that more regulation does not necessarily translate into less systemic risk.Source: Scott,Hal S, 2010. “The Reduction of Systematic Risk In The United States Financial System”. Harvard Journal of Law. pp.2-5.译文:减少美国金融系统的系统性风险一、系统性风险减少:核心问题展望未来,中央金融监管问题(指处方的规则,有别于监督或风险评估)是减少系统性风险。

湖北省2007年翻译大赛决赛试题(英专)

湖北省2007年翻译大赛决赛试题(英专)

湖北省第十四届外语翻译大赛英语专业笔译组决赛试题I.下面有十个英语句子,每个句子均提供了三个译文(分别标为A,B,C),请选择你认为最好的一个译文。

(每小题2分,20分)1. It is a long lane that has no turning.A. 只有不会拐弯的巷子才是长巷子。

B. 即使是长巷子也会拐弯。

C. 天无绝人之路。

2. She could get away with anything, because she looked such a baby.A. 她能渡过任何风险,因为她看上去简直还像是个娃娃模样。

B. 她能渡过任何风险,因为她看上去如此的单纯。

C. 因她看上去简直是个娃娃,所以什么麻烦也落不到她头上。

3. A Southwest Airlines Boeing 737 carrying 142 people overshot the runway on landing at Burbank airport on Sunday, hitting a car with a woman and child in it before coming to rest at the edge of a gas station, officials said.A. 官方人士称,一架载有142人的西南航空公司的波音737飞机,星期日在Burbank机场降落时冲出跑道,撞到了一辆准备停在加油站边的小车,车里有一个妇女和一个孩子。

B. 一架载有142人的西南航空公司的波音737飞机,星期日在Burbank机场降落时冲出跑道,撞到了一辆准备停在加油站边的小车,车里有一个妇女和一个孩子,官方人士称。

C.官方人士称,一架载有142人的西南航空公司的波音737飞机,星期日在Burbank机场降落时冲出跑道,撞上了一辆小车,车内有一个妇女和一个孩子。

飞机最后停在一个加油站边上。

4. Casualties, were taken to several hospital in southwestern Georgia, some of which operated on backup generators.A. 伤亡人员被送往佐治亚州西南部的几所医院里,其中有几家医院是靠备用发电机维持运作的。

高中英语单词天天记reduce素材

高中英语单词天天记reduce素材

·reduce·v.[rɪ'djuːs] ( reduces; reduced; reducing )··双解释义·vt.缩减,减少; 降低make less in size, amount, price, degree, etc. ·vi.减轻体重,节食lose weight intentionly; diet·vt.降职make sb lower in rank or status; demote sb·vt.使…陷入某种状态或状况中bring sb/sth into a specified state or condition·vt.将…概括或简化change sth to a more general or basic form·vt.将…还原remove oxygen from or add hydrogen or electrons to (a compound) ·基本要点•1.reduce的基本意思是“减少”,指重量、程度、数目、范围、速度等减少或降低,不仅可以指量的变化,还可以指质的转变。

引申可作“降职”“使…陷入某种状态或状况中”“将…概括或简化”“将…还原”“征服”“攻陷”等解。

2.reduce可用作及物动词,也可用作不及物动词。

用作及物动词时接名词或代词作宾语。

可用于被动结构。

3.reduce偶尔也可接动词不定式作宾语补足语,意思是“使…不得不…”。

4.reduce后常接介词by表示“以某幅度减少”或“以…方法减少”; reduce常接介词to表示“减少到…”或“使陷入…状态”。

5.reduce的过去分词reduced常可用作形容词,在句中作定语。

•·词汇搭配••reduce a person to reason使人服理•reduce the city to a shambles使城市变成瓦砾•reduce the loss of blood to a minimum把失血减少到最低量•reduce the passage to half the number of words把这段字数减少到一半•reduce the size缩小体积••reduce easily容易征服•reduce gradually逐步缩小•reduce greatly大大减少•reduce markedly明显地减少•reduce materially大为减少•reduce necessarily必要地减少•reduce sharply锐减••reduce sth from...to把某物从…降至…•reduce in在…方面减少,在…方面降低•reduce in price削价•reduce oneself into陷入•reduce to使变成…,使陷入•reduce to despair陷入绝望•reduce to slavery沦为奴隶·常用短语•reduce by(v.+prep.)▲reduce sth by sth/v-ing1.使…以(某幅度)减少 make (sth such as an amour or price) lessShe reduced her weight by five kilograms.她把体重减轻了5公斤。

相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Keywords:
Self-similarity, LRD, ACF, HEAF(2), CoLoRaDe.
Introduction
The importance of Long-Range Dependence (LRD) in traffic engineering problems, such as traffic measurement, queuing behaviour and buffer sizing, admission control and congestion control, is vital. The research in [2] shows that the consequences of LRD are packet delays and application level delays that cause a heavy-tailed distribution. TCP estimates the round trip timer values from the peer acknowledgements and as a result congestions appear more frequently while maintaining the impulsive behaviour with increase in load. The influence of LRD properties on the delay performance at packet and application level is reported in [3] and metrics of network performance, such as throughput, packet loss, latency and buffer occupancy levels, are affected by the presence of LRD phenomenon across many types of networks. The work in [3] also claims that packet delay behaviour tends to be more heavy-tailed in the case of LRD traffic while the congestion window size is increased. The impact of LRD on quality of service
(QoS) has been analysed in [4] showing that, the greater the LRD, the lower the QoS.
The LRD property of traffic fluctuations has important implications on the performance, design and dimensioning of the network [5]. A simple, direct parameter, characterizing the degree of long-range dependence, is the Hurst parameter. The Hurst exponent (or Hurst parameter, H), which more than a half-century ago was proposed for analysis of long-term storage capacity of reservoirs [6], is used today to measure the intensity of LRD in network traffic. A number of methods have been proposed to estimate the Hurst parameter. Some of the most popular include the aggregated variance time (V/T) [7], Rescaled-range (R/S) [5, 6], Higuchi method [8], wavelet-based method [9, 10] although there are many others. In all these methods, H is calculated by taking the slope from a log-log plot. Over time, the wavelet-based Hurst parameter has acquired popularity in estimating LRD traffic. However the study [11] explored the advantages and limitations of wavelet estimators and found that a traffic trace with a number of deterministic shifts in the mean rate results in a steep wavelet spectrum, which leads to an overestimate of the Hurst parameter. The intensity of long-range dependence is measured for file size or document size [12], packet counts (number of packets per unit time) [13, 14, 15], inter-arrival time [16, 17], frame size [18], connection size [19], packet length [20], number of bytes per unit time [5], Bit or byte rate [21] amongst others.
2. Self-similarity, Long-range dependence and Autocorrelation Function
Karim Mohammed Rezaul and Vic Grout
Centre for Applied Internet Research (CAIR), University of Wales, NEWI, Wrexham, UK
Abstract
Long-range dependence characteristics have been observed in many natural or physical phenomena. In particular, a significant impact on data network performance has been shown in several papers. Congested Internet situations, where TCP/IP buffers start to fill, show long-range dependent (LRD) self-similar chaotic behaviour. The exponential growth of the number of servers, as well as the number of users, causes the pபைடு நூலகம்rformance of the Internet to be problematic since the LRD traffic has a significant impact on the buffer requirements. The Internet is a large-scale, wide-area network for which the importance of measurement and analysis of traffic is vital. The intensity of the long-range dependence (LRD) of communications network traffic can be measured using the Hurst parameter. A variety of techniques (such as R/S analysis, aggregated variance-time analysis, periodogram analysis, Whittle estimator, Higuchi’s method, Wavelet-based estimator, absolute moment method, etc.) exist for estimating Hurst exponent but the accuracy of the estimation is still a complicated and controversial issue. Earlier research [1] introduced a novel estimator called the Hurst Exponent from the Autocorrelation Function (HEAF) and it was shown why lag 2 in HEAF (i.e. HEAF (2)) is considered when estimating LRD of network traffic. HEAF estimates H by a process which is simple, quick and reliable. In this research we extend these concepts by introducing a novel algorithm for controlling the long-range dependence of network traffic, named CoLoRaDe which is shown to reduce the LRD of packet sequences at the router buffer.
相关文档
最新文档