Restoration Algorithms for Virtual Private Networks in the Hose Model

合集下载

鱼眼镜头图像畸变的校正方法(英文)

鱼眼镜头图像畸变的校正方法(英文)
Email:lulijun@
0926002-1
第9期
红外与激光工程
第 48 卷
0 Introduction
In many applications of photography, such as machine vision, security monitoring, medical diagnostics, and the projection reality and so on, an imaging lens with very large field angle is often required. A fisheye lens usually satisfies the demands, since it has the field angle of 180° or even larger, and does not need stitching of several pictures without the blind area. However, very serious image distortion exists. In many applications, it is necessary to correct the image distortion of fisheye lens.
收 稿 日 期 :2019-04-05 ; 修 订 日 期 :2019-05-03 基 金 项 目 : 国 家 自 然 科 学 基 金 (11274223) 作 者 简 介 :吕 丽 军 (1963-) , 男 ,教 授 , 博 士 生 导 师 ,主 要 从 事 真 空 紫 外 、软 X 射 线 光 学 及 超 大 视 场 光 学 系 统 方 面 的 研 究 。
鱼眼侍 业

pattern recognition letter 的写作模板

pattern recognition letter 的写作模板

pattern recognition letter 的写作模板Title: A Comprehensive Overview of Pattern Recognition LetterIntroduction:Pattern recognition is an essential field of study in computer science and artificial intelligence. In this article, we will delve into the intricacies of pattern recognition letter. This comprehensive overview will explore the fundamental concepts, algorithms, challenges, and real-world applications associated with pattern recognition letter.1. Definition of Pattern Recognition Letter:Pattern recognition letter refers to the automatic identification and classification of patterns within a given dataset of letters or characters. It involves extracting meaningful features from the input data, learning the underlying patterns, and making intelligent decisions based on the learned patterns.2. Core Algorithms in Pattern Recognition Letter:a. Feature Extraction: This process involves selecting and extracting relevant features from the input letters, which provide meaningful information for pattern classification. Commonly used feature extraction methods include pixel-based features, shape-based features, and texture-based features.b. Classification Algorithms: After feature extraction, classification algorithms are applied to categorize the input letters into predefined classes. Popular algorithms used in pattern recognition letter include Support Vector Machines (SVM), k-Nearest Neighbors (k-NN), Decision Trees, and Artificial Neural Networks (ANN). These algorithms learn from the extracted features to distinguish between different letter patterns.3. Challenges in Pattern Recognition Letter:a. Variability: Letters can vary in terms of font, size, style, and orientation. Dealing with this variability requires robust feature extraction techniques that can capture the essential characteristics of each letter, regardless of such variations.b. Noise and Distortion: Input letters can be affected by noise, distortion, or occlusion, which can significantly impact recognition accuracy. Researchers are continuously developing techniques to handle these challenges, such as denoising algorithms, image restoration methods, and contour completion techniques.c. Scalability: Pattern recognition letter systems should be able to handle large-scale datasets efficiently. Developing scalable algorithms and optimizing computational resources are crucial in dealing with real-world applications where millions of letters need to be processed.4. Real-World Applications:Pattern recognition letter has numerous applications across various domains, including but not limited to:a. Optical Character Recognition (OCR): OCR systems utilize pattern recognition letter techniques to convert scanned documents into editable and searchable formats, enabling efficient document management and retrieval.b. Handwriting Recognition: Pattern recognition letter algorithms play a vital role in recognizing and interpreting handwritten letters in applications such as postal services, digitized signatures, and biometric authentication.c. Text Mining and Document Analysis: The ability to recognize patterns in textual data enables efficient text mining, information retrieval, and document analysis, including sentiment analysis, text classification, and topic modeling.d. License Plate Recognition (LPR): LPR systems employ pattern recognition letter techniques to extract and recognize the characters on vehicle license plates, aiding in vehicle tracking, law enforcement, and parking management.Conclusion:Pattern recognition letter is a fascinating field that allows computers to understand, interpret, and classify letters or characters in various applications. By leveraging advanced feature extraction techniques and robust classification algorithms, pattern recognition letter continues to revolutionize industries such as document management, handwriting recognition, and automated text analysis. As researchers address the challenges associated with variability, noise, and scalability, the future of pattern recognition letter looks promising and holds great potential for even broader applications in the years to come.。

Automation in Construction

Automation in Construction

The growing diversity of disciplines, participants, tasks, tools and events associated with project management at the design and construction stages, the increasing pressure of costing competition and tighter production deadlines, as well as continually increasing quality requirements and the need for technological enhancements, are the driving force of information modeling and numerical simulation in the construction industry. When choosing the most effective investment project in construction, a major problem associated with the actual demand for resources is underestimated. In order to solve this problem in the most effective way, the application programs, covering virtually every phase of the specific construction product development, e.g. planning, design, cost estimation, scheduling, fabrication, construction, maintenance and facility management were developed and supplemented with the calculation of the demand for resources, comparison of alternatives and determination of the duration of all the stages of the project life. Theoretical principles and practical innovative applications of building information modeling and construction process simulation technique, used to determine the most effective alternative of the project by applying the appropriate multiple criteria evaluation methods, are considered in the article.Article Outline1. Introduction2. New concept in design and construction3. BIM as an approach to building design and management4. Computer-aided evaluation system in design and construction5. The development of virtual construction project6. Determining the most effective project variant7. ConclusionReferencesVariability in production is one of the largest factors that negatively impacts construction project performance. A common construction practice to protect production systems from variability is the use ofbuffers (Bf). Construction practitioners and researchers have proposed buffering approaches for different production situations, but these approaches have faced practical limitations in their application. A multiobjective analytic model (MAM) is proposed to develop a graphical solution for the design ofWork-In-Process (WIP) Bf in order to overcome these practical limitations to Bf application, being demonstrated through the scheduling of repetitive building projects. Multiobjective analytic modeling is based on Simulation–Optimization (SO) modeling and Pareto Fronts concepts. Simulation–Optimization framework uses Evolutionary Strategies (ES) as the optimization search approach, which allows for the design of optimum WIP Bf sizes by optimizing different project objectives (e.g., project cost, time and productivity). The framework is tested and validated on two repetitive building projects. The SO framework is then generalized through Pareto Front concepts, allowing for the development of the MAM as nomographs for practical use. The application advantages of the MAM are shown through a project scheduling example. Results demonstrate project performance improvements and a more efficient and practical design of WIP Bf. Additionally, production strategies based on WIP Bf and lean production principles in construction are discussed.Article Outline1. Introduction2. Research objective3. Research methodology4. Describing WIP Bf in repetitive construction processes5. WIP Bf design approach using Simulation–Optimization5.1. Simulation architecture and modeling assumptions5.2. General Simulation–Optimization approach to design WIP Bf5.3. Evolutionary Strategies in optimization problems5.4. WIP Bf optimization using Evolutionary Strategies in simulation approach6. Multiobjective model to design WIP Bf7. Testing and validation of the Simulation–Optimization approach7.1. Project description7.2. Project A7.3. Project B7.4. Discussion of SO testing and validation8. MAM application9. Conclusions10. NotationReferencesEvaluation and use of the standards in of the technical drawings in the final year project Original Research ArticleProcedia - Social and Behavioral SciencesThe use of a virtual building design and construction model for developing an effective project concept in 5D environment Original Research ArticleAutomation in ConstructionSimulation model incorporating genetic algorithms for optimal temporary hoist planning in high-rise building construction Original Research ArticleAutomation in ConstructionResearch highlightsWe propose a model for temporary hoist planning in high-rise building construction. >The model isconstructed with a discrete-event simulation and genetic algorithms. This model uses a simulation toverify various scenarios for vertical transportation. The GAs assists the planner to search for anoptimal scenario in the solution space. It will support hoist planners while preparing optimal plans with minimal time and effort.建筑/建材/工程环境艺术园林设计规划设计方案、景观设计方案绿植施工图选样及定板工作技术问题5,243 articles found for: pub-date > 2000 and tak(((Construction building materials) or (environmental art) or project or planning or design or (garden design) or (landscape design)) and (Plants or construction or drawings sampling or work or technical or problems or fixed or plate)) Edit this search | Save this search | Save as search alert | RSS FeedConstruction / building materials / environmental art project planning and design garden design, landscape designPlants and construction drawings sampling the work of technical problems fixed plateThe economics of native plants in residential landscape designs Original Research Article Landscape and Urban PlanningMultiobjective design of Work-In-Process buffer for scheduling repetitive building projects Original Research ArticleAutomation in ConstructionYard-scale landscape designs can influence environmental quality through effects on habitat, stormwater runoff, and water quality. Native plant gardens may have ecological benefits, and previous research has shown that yards using these plants can be designed in ways that people find attractive. This study examines whether people are willing to pay more for more ecologically benign designs than for a lawn. A contingent choice survey was conducted in southeast Michigan in which people were presented with four different yard designs (three of which included native plants) in three different settings, with different monthly maintenance costs for each design. Respondents were asked to rank their choices of the yards while considering the maintenance costs they were presented. Results suggest that people are willing to pay more for well-designed yards including native plants than for lawns, and that their increased willingness to pay exceeds any increase in costs associated with the native plantings. These results should encourage homeowners, landscape designers, and the landscape plant industry to work with native plants. In this study, people were willing to pay more for designs that present gains for the environment, without government intervention and without social cost.Article Outline1. Introduction2. Measurement of willingness to pay in theory and practice3. Survey design4. Results5. ConclusionAcknowledgementsAppendix A. Calculation of willingness to pay (WTP)ReferencesVitaeStudy of a historical garden soil at the Grand-Pressigny site (Indre-et-Loire, France): evidence of landscape management Original Research ArticleJournal of Cultural HeritageGarden archaeology is a new discipline in France, which mainly focuses on technical aspects of garden creation. Excavations reveal complex stratigraphic sequences and show that soils are strongly influenced by human activities linked to cultivation, including for aesthetic purposes. The objective of the research was firstly to better understand and explain the complex archaeological deposits of a historical garden, using various techniques such as soil micromorphology, image analysis and soil chemistry. The second objective was to show the composition of remains from one garden. Samples were taken from LeGrand-Pressigny site in Touraine, a French garden dating from the XVIth–XIXth centuries. The analyses of different anthropogenic levels in thin sections, the measurements of carbonate, phosphorus, carbon organic contents and soil porosity (image analysis) provided accurate information about the presence of an earlier garden made up of imported soil. The results also identified spatial changes over time. This study suggests an interesting approach to understanding soil care by early human communities and cancontribute to garden restoration projects considering the technical construction of these sites and historical techniques.Article Outline1. Introduction2. Study site and methods2.1. Study area2.2. Field data and sampling2.2.1. The natural soil2.2.2. The anthropic deposits2.3. Methods3. Results3.1. Micromorphological descriptions3.2. Analytical data3.2.1. Particle size distribution and chemical analyses3.3. Image analysis4. Interpretation and discussion4.1. Interpretation of the characteristics of natural subsoil4.2. Interpretation of the characteristics of anthropic deposits4.3. Imported soil as garden remains5. ConclusionAcknowledgementsReferencesRisk analysis in fixed-price design–build construction projects Original Research Article Building and EnvironmentA case study on the management of the development of a large-scale power plant project in East Asia based on design-build arrangement Original Research Article International Journal of Project ManagementTeaching construction project management with BIM support: Experience and lessons learned Original Research ArticleAutomation in ConstructionEnvironmental factors and work performance of project managers in the construction industry Original Research ArticleInternational Journal of Project Management。

色彩还原度 英语

色彩还原度 英语

色彩还原度英语Color Restoration DegreeThe world we live in is a vibrant tapestry of hues, each color possessing the power to evoke emotions, influence perceptions, and shape our experiences. From the serene azure of a clear sky to the fiery crimson of a sunset, the interplay of colors is a fundamental aspect of our visual landscape. However, in our modern era, where technology has become an integral part of our daily lives, the true essence of color can often become distorted or diminished.The concept of color restoration degree is a crucial consideration in the digital age. As we increasingly rely on electronic devices to capture, display, and share visual information, it is essential to ensure that the colors we perceive accurately reflect the original scene or object. This is where the color restoration degree comes into play, serving as a measure of how faithfully the digital representation of color matches the physical reality.One of the primary challenges in achieving accurate color restoration lies in the inherent limitations of digital imaging and display technologies. Digital cameras, for instance, use sensors that aredesigned to capture light in specific wavelength ranges, which may not always align perfectly with the human visual system. Similarly, computer monitors and other display devices have their own color gamuts, or the range of colors they can reproduce, which may not encompass the full spectrum of colors perceivable by the human eye.To address these challenges, color management systems have been developed to optimize the color reproduction process. These systems employ various algorithms and calibration techniques to ensure that the colors displayed on our screens, printed on our documents, or captured by our cameras closely match the original colors in the physical world.The color restoration degree is a metric that quantifies the success of these color management efforts. It is typically expressed as a percentage, with 100% representing a perfect match between the digital and physical colors. The higher the color restoration degree, the more accurate and true-to-life the color representation will be.Achieving a high color restoration degree is particularly crucial in industries where color accuracy is of paramount importance, such as photography, graphic design, and fine art reproduction. In these fields, even minor deviations in color can have significant consequences, affecting the overall aesthetic, emotional impact, or even the commercial value of the final product.However, the importance of color restoration degree extends beyond professional applications. In our everyday lives, the ability to accurately perceive and reproduce colors can have a profound impact on our experiences and our understanding of the world around us.Consider the case of medical imaging, where accurate color representation can be crucial for the accurate diagnosis and treatment of various conditions. Doctors and healthcare professionals rely on digital imaging technologies, such as X-rays, MRI scans, and endoscopic procedures, to visualize the internal structures of the human body. If the color restoration degree in these images is not high enough, it can lead to misinterpretations or missed diagnoses, with potentially serious consequences for the patient.Similarly, in the realm of education and research, the ability to accurately reproduce color can be essential for the effective communication of scientific concepts, the analysis of data visualizations, and the accurate representation of natural phenomena. Inaccurate color reproduction can hinder the understanding and interpretation of crucial information, ultimately impacting the quality of learning and the advancement of knowledge.Beyond these professional and academic applications, the color restoration degree also plays a role in our everyday aesthetic experiences. The way we perceive and interact with the digital world, from the vibrant hues of our social media posts to the subtle nuances of our favorite films and television shows, can be greatly influenced by the quality of color reproduction.When the color restoration degree is high, we are able to fully immerse ourselves in the visual experiences presented to us, allowing us to appreciate the true essence of the colors and the emotional resonance they evoke. Conversely, when the color restoration degree is low, the disconnect between the digital representation and the physical reality can be jarring, disrupting our sense of engagement and undermining the overall aesthetic impact.In conclusion, the color restoration degree is a critical consideration in the digital age, with far-reaching implications across a wide range of industries and aspects of our lives. By ensuring accurate and faithful color reproduction, we can unlock the full potential of digital technologies, enhance our understanding of the world around us, and enrich our aesthetic experiences. As we continue to navigate the ever-evolving landscape of digital media, the importance of color restoration degree will only continue to grow, serving as a vital bridge between the virtual and the physical realms.。

彩色滤波阵列插值及图像复原算法研究

彩色滤波阵列插值及图像复原算法研究
III
ABSTRACT
ABSTRCT
Image will be inevitably affected by the various factors during the process of acquisition, which results in images with varying degrees of degradation, restoring the true image is critical for later image processing. With the popularity of digital cameras, color images emerge in various fields. Although there are some links between color image and grayscale image, however some kind of corss exist within channels of color imge, there will be some sorts of problems if grayscale image restoration algorithm is applied directly to color image.
摘要
摘要
图像在整个获取过程中,会不可避免地受到各种因素的影响,使得图像质量 出现不同程度的下降,恢复降质图像的本来面目对后续的图像处理至关重要。随 着数码相机的普及,彩色图像在各领域内崭露头角。彩色图像与灰度图像虽有联 系,但是彩色图像的多通道间具有某种交叉性,若将灰度图像的复原算法直接应 用到彩色图像会出现种种问题。
1.1 研究背景及意义................................................................................................................ 1 1.2 国内外发展现状................................................................................................................ 1 1.3 本文组织结构.................................................................................................................... 4 2 彩色滤波阵列插值算法研究....................................................................................................... 7 2.1 图像传感器......................................................................................................................... 7 2.2 Bayer 彩色滤波阵列及去马赛克 ......................................................................................7 2.3 现有的典型插值算法简介 ................................................................................................ 9

5G 主要协议对应的协议号一览表

5G 主要协议对应的协议号一览表

typeTSTSTSTSTSTSTS基本协议TSTSTRTRTRTRTRTR spec num23.50123.50223.50323.52724.50124.50233.50133.84133.84223.73122.82129.89222.82222.82423.724titleSystem Architecture for the 5G SystemProcedures for the 5G SystemPolicy and Charging Control Framework for the 5G System;Stage 25G System; Restoration Procedures; Stage 2Non-Access-Stratum (NAS) protocol for 5G System (5GS);Stage 3Access to the 3GPP 5G Core Network (5GCN) via non-3GPPaccess networksSecurity architecture and procedures for 5G SystemStudy on supporting 256-bit algorithms for 5GStudy on Lawful Interception (LI) service in 5GStudy on enhancement to the 5GC LoCation ServicesFeasibility Study on LAN Support in 5GStudy on User-plane Protocol in 5GCStudy on using Satellite Access in 5GStudy on 5G message service for MIoTStudy on Cellular Internet of Things (IoT) support andevolution for the 5G SystemRemark5GS 的架构5GS 的详细业务流程5GS 的策略计费框架5GS 的恢复流程5GS 的NAS 协议(UE-AMF)通过NON-3GPP 网络接入5GC5GS 的安全架构和流程256 位算法研究LI 研究Location service 研究LAN Support 研究UP 协议研究Staellite Access 研究message service 研究CIoT 研究TRTSTSTSTSTSTSSBA 架构和接口定TS 义TSTSTSTSTSTS 23.72629.50029.50129.50229.50329.50429.50529.50729.50829.50929.51029.51129.51229.513Study on Enhancing Topology of SMF and UPF in 5GNetworks5G System; Technical Realization of Service BasedArchitecture; Stage 35G System;Principles and Guidelines for Services Definition5G System; Session Management Services; Stage 35G System; Unified Data Management Services; Stage 35G System; Unified Data Repository Services; Stage 35G System; Usage of the Unified Data Repository servicesfor Subscription Data; Stage 35G System; Access and Mobility Policy Control Service;Stage 35G System; Session Management Event Exposure Service;Stage 35G System; Authentication Server Services; Stage 35G System; Network function repository services; Stage 35G System; Equipment Identity Register Services; Stage 35G System; Session Management Policy Control Service;Stage 35G System; Policy and Charging Control signalling flows andQoS parameter mapping; Stage 3SMF&UPF 拓扑加强研究SBA 技术实现Service 定义的原理和指南会话管理servicesUDM ServicesUDR ServicesUDR Services接入和挪移的策略控制services会话管理事件开放Services认证服务器ServicesNRF ServicesEIR Services会话管理策略控制Service策略和计费控制信令流以及QoS 参数映射TSTSTSTSTSTSTSTSTSTRTR 切片管理TRTS 29.51429.51829.51929.52029.53129.54029.55129.56129.57228.80028.80128.80228.5465G System; Policy Authorization Service; Stage 35G System; Access and Mobility Management Services;Stage 35G System: Usage of the Unified Data Repository servicefor Policy Control Data and Structured Data; Stage 35G System; Network Data Analytics Services; Stage 35G System; Network Slice Selection Services; Stage 35G System; SMS Services; Stage 35G System; PFD Management Service; Stage 35G System; Interworking between 5G Network andexternal Data Networks; Stage 35G System; Location Management Services; Stage 3Study on management and orchestration architecture ofnext generation networks and servicesTelecommunication management;Study on managementand orchestration of network slicing for next generationnetworkTelecommunication management;Study on managementaspects of next generation network architecture andfeaturesFault Supervision for 5G networks and network slicing;Stage 2 and stage 3策略授权Service接入和挪移管理ServicesUDR ServiceNDA ServicesNSS ServicesSMF ServicesPFD 管理Service5G 和外部DN 间的交互本地管理Services下一代网络和服务的管理和编排架构电信管理,NGN 的网络切片管理和编排电信管理,NGN 架构和特征的管理方面研究5G 网络和切片的故障监管TS TS TS TS TS TS TS TS TS TS 28.55028.55128.55228.55328.53028.53128.53228.53328.54028.541Management and orchestration of networks and networkslicing; Performance Management (PM); Stage 1Management and orchestration of networks and networkslicing; Performance Management (PM); Stage 2 and stage3Management and orchestration of networks and networkslicing; NR and NG-RAN performance measurements andassurance dataManagement and orchestration of networks and networkslicing; 5G Core Network (5GC) performancemeasurements and assurance dataManagement of network slicing in mobile networks;Concepts, use cases and requirementsManagement and orchestration of networks and networkslicing; Provisioning; Stage 1Management and orchestration of networks and networkslicing; Provisioning; Stages 2 and 3Management and orchestration of networks and networkslicing; Management and orchestration architectureManagement and orchestration of networks and networkslicing; NR and NG-RAN Network Resource Model (NRM);Stage 1Management and orchestration of networks and networkslicing; NR and NG-RAN Network Resource Model (NRM);Stage 2 and stage 3网络和切片的编排管理PM网络和切片的编排管理PM网络和切片的编排管理for NR 和NG-RAN网络和切片的编排管理for 5GC挪移网络中切片管理概念,use cases 以及需求网络和切片的编排管理供应网络和切片的编排管理供应网络和切片的编排管理网络和切片的编排管理for NR 和NG-RAN NRM网络和切片的编排管理for NR 和NG-RAN NRMV2X/VRAR/ 网络自动 化等业务 应用TSTS TS TS TS TS TR TRTRTR28.54228.54328.55428.62728.62828.62922.830 23.791 23.79323.786Management and orchestration of networks and networkslicing; 5G Core Network (5GC) Network Resource Model(NRM); Stage 1Management and orchestration of networks and networkslicing; 5G Core Network (5GC) Network Resource Model(NRM); Stage 2 and stage 3Management and orchestration of networks and network slicing; 5G End to end Key Performance Indicators (KPI), performance measurements and assurance dataTelecommunication management; Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); RequirementsTelecommunication management; Self-OrganizingNetworks (SON) Policy Network Resource Model (NRM)Integration Reference Point (IRP); Information Service (IS)Telecommunication management; Self-Organizing Networks (SON) Policy Network Resource Model (NRM) Integration Reference Point (IRP); Solution Set (SS) definitionsStudy on Business Role Models for Network SlicingStudy of enablers for Network Automation for 5GStudy on Access Traffic Steering, Switch and Splitting support in the 5G system architectureStudy on architecture enhancements for EPS and 5G System to support advanced V2X services网络和切片的编排管理for 5GC NRM网络和切片的编排管理for 5GC NRM网络和切片的编排管理 for 5G KPI&PM*数据保 证电信管理, SON 策略 &NRM 整合节点,需求电信管理, SON 策略&NRM 整合节点, IS电信管理, SON 策略 &NRM 整合节点, SS 定 义网络切片的业务角色模 型研究5G 网络自动化研究5GS 的接入流控制,交 换,分离支持的研究V2X 相关TRTRTRTRTSTSTSTRTRTRTRTRTS 计费TS 22.88623.79526.98536.78722.18626.11626.11826.11926.91826.91926.92926.89132.25532.290Study on enhancement of 3GPP support for 5G V2XservicesStudy on application layer support for V2X servicesVehicle-to-everything (V2X) media handling and interactionVehicle-to-Everything (V2X) new band combinationsService requirements for enhanced V2X scenariosTelevision (TV) over 3GPP services; Video profiles3GPP Virtual reality profiles for streaming applicationsQoE parameters and metrics relevant to the Virtual Reality(VR) user experienceVirtual Reality (VR) media services over 3GPPStudy on Media Handling Aspects of ConversationalServices in 5G SystemsQoE parameters and metrics relevant to the Virtual Reality(VR) user experience5G enhanced mobile broadband; Media distributionTelecommunication management; Charging management;5G Data connectivity domain charging; stage 2.Telecommunication management; Charging management;5G system; Services, operations and procedures of chargingusing Service Based Interface (SBI)TV over 3GPP ,video 文件VR 相关eMBB,媒体分发5G 计费相关TSTSTSTSTRTSTSTS部份5GUE/NR 协TS 议TSTSTS 32.29132.29832.29932.42232.89938.101-338.101-438.10438.11338.12438.13338.141-15G system; Charging service, stage 3Telecommunication management; Charging management;Charging Data Record (CDR) parameter descriptionTelecommunication management; Charging management;Diameter charging applicationsTelecommunication management; Subscriber andequipment trace; Trace control and configurationmanagementTelecommunication management; Chargingmanagement;Study on charging aspects of 5G systemarchitecture phase 1NR; User Equipment (UE) radio transmission and reception;Part 3: Range 1 and Range 2 Interworking operation withother radiosNR; User Equipment (UE) radio transmission and reception;Part 4: Performance requirementsNR; Base Station (BS) radio transmission and receptionNR; Base Station (BS) and repeater ElectroMagneticCompatibility (EMC)NR; Electromagnetic compatibility (EMC) requirements formobile terminals and ancillary equipmentNR; Requirements for support of radio resourcemanagementNR; Base Station (BS) conformance testing Part 1:Conducted conformance testing5G UE&NR 相关TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TS 38.141-238.20138.20238.21138.21238.21338.21438.21538.30038.30438.30538.30638.32138.32238.32338.331NR; Base Station (BS) conformance testing Part 2: Radiatedconformance testingNR; Physical layer; General descriptionNR; Services provided by the physical layerNR; Physical channels and modulationNR; Multiplexing and channel codingNR; Physical layer procedures for controlNR; Physical layer procedures for dataNR; Physical layer measurementsNR; Overall description; Stage-2NR; User Equipment (UE) procedures in idle mode and inRRC Inactive stateNG Radio Access Network (NG-RAN); Stage 2 functionalspecification of User Equipment (UE) positioning in NG-RANNR; User Equipment (UE) radio access capabilitiesNR; Medium Access Control (MAC) protocol specificationNR; Radio Link Control (RLC) protocol specificationNR; Packet Data Convergence Protocol (PDCP) specificationNR; Radio Resource Control (RRC); Protocol specificationTS TS TS TS TS TS TS TS TS TS TS TS TS TS TS TR 38.40138.41038.41138.41238.41338.41438.42038.42138.42238.42338.42438.42538.45538.46038.46138.801NG-RAN; Architecture descriptionNG-RAN; NG general aspects and principlesNG-RAN; NG layer 1NG-RAN; NG signalling transportNG-RAN; NG Application Protocol (NGAP)NG-RAN; NG data transportNG-RAN; Xn general aspects and principlesNG-RAN; Xn layer 1NG-RAN; Xn signalling transportNG-RAN; Xn Application Protocol (XnAP)NG-RAN; Xn data transportNG-RAN; NR user plane protocolNG-RAN; NR Positioning Protocol ANG-RAN; E1 general aspects and principlesNG-RAN; E1 layer 1Study on new radio access technology: Radio accessarchitecture and interfacesStudy on new radio access technology Physical layer aspectsStudy on new radio access technology: Radio Frequency (RF) and co-existence aspectsStudy on new radio access technology Radio interface protocol aspects38.80238.80338.804TRTRTR。

光学设计常用术语解释及英 汉对照翻译汇总

光学设计常用术语解释及英    汉对照翻译汇总

第一部分最基本的术语及英汉对照翻译1、时谱:time-spectrumIn this paper, the time-spectrum characteristics of temporal coherence on the double-modes He-Ne laser have been analyzed and studied mainly from the theory, and relative time-spectrum formulas and experimental results have been given. Finally, this article still discusses the possible application of TC time-spectrum on the double-mode He-Ne Iaser.本文重点从理论上分析研究了双纵模He-Ne激光时间相干度的时谱特性(以下简称TC时谱特性),给出了相应的时谱公式与实验结果,并就双纵模He-Ne激光TC时谱特性的可能应用进行了初步的理论探讨。

2、光谱:SpectraStudy on the Applications of Resonance Rayleigh Scattering Spectra in Natural Medicine Analysis共振瑞利散射光谱在天然药物分析中的应用研究3、光谱仪:spectrometerStudy on Signal Processing and Analysing System of Micro Spectrometer 微型光谱仪信号处理与分析系统的研究4、单帧:single frameComposition method of color stereo image based on single fram e image 基于单帧图像的彩色立体图像的生成5、探测系统:Detection SystemResearch on Image Restoration Algorithms in Imaging Detection System 成像探测系统图像复原算法研究6、超光谱:Hyper-SpectralResearch on Key Technology of Hyper-Spectral Remote Sensing Image Processing超光谱遥感图像处理关键技术研究7、多光谱:multispectral multi-spectral multi-spectrumSimple Method to Compose Multi spectral Remote Sensing Data Using BMP Image File用 BMP 图像文件合成多光谱遥感图像的简单方法8、色散:dispersionResearches on Adaptive Technology of Compensation for Polarization Mode Dispersion偏振模色散动态补偿技术研究9、球差:spherical aberrationThe influence of thermal effects in a beam control system and spherical aberration on the laser beam quality光束控制系统热效应与球差对激光光束质量的影响10、慧差:comaThe maximum sensitivity of coma aberration evaluation is aboutλ/25;估值波面慧差的极限灵敏度为λ/25;11、焦距:focal distanceAbsolute errors of the measured output focal distance range from –120 to 120μm.利用轴向扫描法确定透镜出口焦距时的绝对误差在–120—120μm之间。

基于改进遗传算法的继电保护一体化图形拼接厂站最优布局

基于改进遗传算法的继电保护一体化图形拼接厂站最优布局

第43卷第10期电力系统保护与控制V ol.43 No.10 2015年5月16日Power System Protection and Control May 16, 2015 基于改进遗传算法的继电保护一体化图形拼接厂站最优布局高 旭1,杜丽艳1,李雪冬2,孟庆彬2,于 乐2(1.国网冀北电力有限公司,北京 100053;2.北京中恒博瑞数字电力科技有限公司,北京 100085)摘要:继电保护整定计算在电力系统广泛采用分布式整定计算模式,在继电保护整定计算模型拼接中,图形拼接部分存在着接线混乱的问题。

深入研究了一体化继电保护图形拼接的特点,结合厂站电压等级,提出了基于改进遗传算法的继电保护一体化图形拼接方法。

为了提高图形拼接的效率,采用按电压等级分层寻优的方式确定最优厂站布局。

最后通过实际算例验证了该方法的快速性及有效性。

关键词:一体化图形拼接;厂站布局;改进遗传算法Substation locating method in integrated relay graph splicing based onimproved genetic algorithmGAO Xu1, DU Liyan1, LI Xuedong2, MENG Qingbin2, YU Le2(1. State Grid Jibei Power Company Limited, Beijing 100053, China; 2. Beijing Join Bright DigitalPower Technology Company, Beijing 100085, China)Abstract: Distributed protection relay value setting is applied in China. There is a graph chaos problem in protection relay model splicing process. The characteristic of integrated relay splicing is studied deeply, and combined with the substation voltage level, a substation locating method based on improved genetic algorithm is proposed. To enhance the graph splicing, a voltage level based method is applied. At last, a practical example is used to validate the effectiveness of the method.Key words: integrated relay graph splicing; substation locating; improved genetic algorithm中图分类号:TM771 文献标识码:A 文章编号:1674-3415(2015)10-0074-050 引言我国电力系统的继电保护整定计算工作由电网公司各级调度部门负责。

光学设计常用术语解释及英汉对照翻译

光学设计常用术语解释及英汉对照翻译

光学设计常⽤术语解释及英汉对照翻译第⼀部分最基本的术语及英汉对照翻译1、时谱:time-spectrumIn this paper, the time-spectrum characteristics of temporal coherence on the double-modes He-Ne laser have been analyzed and studied mainly from the theory, and relative time-spectrum formulas and experimental results have been given. Finally, this article still discusses the possible application of TC time-spectrum on the double-mode He-Ne Iaser.本⽂重点从理论上分析研究了双纵模He-Ne激光时间相⼲度的时谱特性(以下简称TC 时谱特性),给出了相应的时谱公式与实验结果,并就双纵模He-Ne激光TC时谱特性的可能应⽤进⾏了初步的理论探讨。

2、光谱:SpectraStudy on the Applications of Resonance Rayleigh Scattering Spectra in Natural Medicine Analysis共振瑞利散射光谱在天然药物分析中的应⽤研究3、光谱仪:spectrometerStudy on Signal Processing and Analysing System of Micro Spectrometer微型光谱仪信号处理与分析系统的研究4、单帧:single frameComposition method of color stereo image based on single fram e image基于单帧图像的彩⾊⽴体图像的⽣成5、探测系统:Detection SystemResearch on Image Restoration Algorithms in Imaging Detection System成像探测系统图像复原算法研究6、超光谱:Hyper-SpectralResearch on Key Technology of Hyper-Spectral Remote Sensing Image Processing超光谱遥感图像处理关键技术研究7、多光谱:multispectral multi-spectral multi-spectrumSimple Method to Compose Multi spectral Remote Sensing Data Using BMP Image File⽤BMP 图像⽂件合成多光谱遥感图像的简单⽅法8、⾊散:dispersionResearches on Adaptive Technology of Compensation for Polarization Mode Dispersion偏振模⾊散动态补偿技术研究9、球差:spherical aberrationThe influence of thermal effects in a beam control system and spherical aberration on the laser beam quality光束控制系统热效应与球差对激光光束质量的影响10、慧差:comaThe maximum sensitivity of coma aberration evaluation is about λ/25;估值波⾯慧差的极限灵敏度为λ/25;11、焦距:focal distanceAbsolute errors of the measured output focal distance range from –120 to 120µm.利⽤轴向扫描法确定透镜出⼝焦距时的绝对误差在–120—120µm之间。

基于成像矩阵的物数据求解方法

基于成像矩阵的物数据求解方法

基于成像矩阵的物数据求解方法任智斌;胡佳盛;唐洪浪;金鑫【摘要】提出了一种利用成像矩阵求解物数据的方法.通过对物、像矩阵的一维化处理,构建了二维成像矩阵,将物矩阵卷积点扩散函数矩阵得到像矩阵的卷积运算关系转变为物向量乘以成像矩阵进而得到像向量的乘积运算关系.最后将像向量乘以成像逆矩阵便可求解物向量,实现了从光学系统像数据中对物数据的精确求解,且计算误差为10-12量级.%A method for solving object data based on imaging matrix is proposed.Through one-dimensional processing of the object and image matrixes,a two-dimensional imaging matrix is constructed.T hus,the operation rules of image matrix by convolution of object matrix and point spread function matrix were transformed into the image vector by one of the product of object vector and imaging matrix.Finally,the image vector is obtained by multiplying the vector by the inverse matrix,precise solution of the object data from the image data of optical system is real-ized and the calculation error can reach the order of 10-12.【期刊名称】《应用光学》【年(卷),期】2018(039)001【总页数】5页(P40-44)【关键词】成像矩阵;成像逆矩阵;物向量;像向量【作者】任智斌;胡佳盛;唐洪浪;金鑫【作者单位】哈尔滨工业大学航天学院,哈尔滨150001;哈尔滨工业大学航天学院,哈尔滨150001;哈尔滨工业大学航天学院,哈尔滨150001;哈尔滨工业大学航天学院,哈尔滨150001【正文语种】中文【中图分类】O439;TP751.1引言光学系统成像过程中,由于衍射与像差的存在,物面上的每个点均会在像面成像为一个弥散斑,从而导致成像模糊、成像质量退化。

浙江省浙江大学附属中学2022-2023学年高一下学期期中考试英语试卷

浙江省浙江大学附属中学2022-2023学年高一下学期期中考试英语试卷

浙江省浙江大学附属中学2022-2023学年高一下学期期中考试英语试卷学校:___________姓名:___________班级:___________考号:___________一、阅读理解Amazing Zoos Around the WorldHelsinki ZooThis is a zoo located on an island in Finland—it is the country’s biggest zoo which has amazing animals like deer, Siberian tigers and even bears. What adds to the beauty of this zoo is the natural wildlife that surrounds it on the island. From beautiful rainforests to lots of plant species, Helsinki Zoo should be a destination you won’t regret visiting.Toronto ZooToronto Zoo is home to over 16,000 animals, including tigers, lions, and monkeys. The zoo —has an amazing gorilla (大猩猩) habitat exhibit, and a Discovery Zone for children to learn more about the animals and their natural habitats. Another thing that makes this zoo worth a visit is its protection policy, Toronto Zoo has helped to protect endangered species from all around the world and is one of the very few animal-Friendly zoos in North America.Sao Paolo ZooThe state of Sao Paolo has strict laws about animal cruelty and can actually give out fines (罚款) of up to US $435,000 for animal testing. So it’s no surprise that Sao Paolo Zoo, with its over 3,200 animals, is animal-friendly. They also spend time in protection efforts, focusing on Brazil’s own endangered animals. Here, you’ll see plenty of animals like parrots, wild cats and various birds.Wellington ZooIt is New Zealand’s first and largest zoo and is home to more than 500 different animals and 100 different species. Focusing on wildlife protection, Wellington Zoo has successfully saved endangered animals like the Sun Bear. If you make your way to this zoo, you’ll also find yourself face-to-face with red pandas, monkeys and the country’s official bird, the kiwi. This animal-friendly zoo is also eco-friendly, equipped with solar heating and power. 1.What makes Helsinki Zoo different from Toronto Zoo?A.It has tigers.B.It has lots of animal species.C.It stands on an island D.It is a good zoo to visit.2.What can people enjoy in Toronto Zoo?A.Seeing beautiful rainforests.B.Learning about animals’ natural habitats.C.Watching tiger and lion habitat exhibits.D.Seeing special animals such as Siberian tigers.3.What can we learn from the passage?A.Helsinki Zoo has the most animal species..B.Wellington Zoo has managed to protect the Sun Bear.C.There are many animal-friendly zoos in North America.D.People will not be fined even if they test animals in the state of Sao Paolo.As online technology advanced, web sites, podcasts, and blogs became powerful sources of information that allowed everyone to stay updated on any subject imaginable. Although all of these information sources remain popular, there's a new king of media and it's online video.There are many reasons why online video has increased suddenly over the past few years. The first is increasing data speeds. It wasn't until recently that people everywhere had fast enough online connections to enjoy high-definition (高清)videos. However, once faster Internet speeds were provided, people quickly fell in love with online videos. The second reason why online videos have become so popular is convenience. Watching videos requires less effort and energy than reading through paragraphs of text after a day of hard work. Videos also seem to provide more satisfaction, as people prefer to connect with people they can hear and see, as against the words of some author whom they know little about.Advancing digital technology has also helped, as it has made sharing videos easier and more convenient than ever. High-powered smartphones and more affordable video cameras allow anyone to easily record an event or give a few comments about a scorching topic that is on their mind. Meanwhile, sites like YouTube, Vimeo, and Ustream allow users to quickly upload their videos and share them with friends, family, and the general public if they wish.Last but not least, advertising. Companies have made it easy for people to get rewarded for creating popular videos. Some people with large enough fan bases can even make a very wealthy living by uploading a few videos every week.The future also looks bright for companies who post online video ads. In fact, new software allows them to watch viewers' emotional reactions to their content through the users'webcams (网络摄像机).They'll be able to see whether users laugh, cry, or feel bored during videos, so they can adjust their ads. This should prove extremely helpful, as there will be millions of videos competing for viewers' attention.4.Why do some people prefer watching videos to reading after work?A.It helps them review the news.B.It helps them get information with relative ease.C.It provides them more information.D.It helps them save time.5.What does the underlined word "scorching" in Paragraph 3 mean?A.Unusual.B.Future.C.Hot.D.Social. 6.How will the software mentioned in the last paragraph help companies in the future? A.It will enable them to better understand what customers enjoy.B.It will let more viewers see the advertisements they make.C.It will cause viewers to create more popular videos.D.It will make people like their videos.7.Which of the following can be the best title for the text?A.Online Video:The New King of MediaB.Online Technology is Developing FastC.Online Video: A New Advertising TrendD.Online Technology is Closely Related to PeopleWherever we go, we are surrounded by history. Across the globe, cultural heritage is passed down through the generations. It is in the buildings and structures around us. It is in the arts and artifacts (手工艺品) we treasure. It lives in the languages we speak and the stories we tell. But today, it is under attack as never before. Not only are the damages of time threatening our cultural heritage, but conflicts, climate change, globalization and tourism are all exacting a heavy price. Technology is now the most essential weapon in the battle. Here’s how technology is preserving our cultural heritage.As you can imagine, creating the replicas (复制品) via crowd sourced 2D images is extremely time-consuming. Increasingly, artificial intelligence (AI) algorithms (算法) are being used to do all the required sourcing, allowing millions of images to be stored in a matter of hours. AI will also make restoration and preservation of existing cultural heritagefar easier and vastly superior to previous methods.Virtual reality (VR) technology will play a leading role in preserving our cultural heritage in the coming years. Many of the most important sites and architecture are extremely fragile. Human interaction with these locations is doing a great deal of harm. Wastes accumulate everywhere, causing enormous problems. As more cultural heritage sites and objects are digitally mapped and recorded, VR technology will increasingly become the way that people experience them. We’ll all eventually be able to walk through places, look at (and touch!) artifacts and works of art without ever seeing them with our own eyes.Finally, our cultural heritage will be preserved via technology. Efforts in research, innovation, data sharing and project work will help promote and preserve the cultural heritage of countries all across the world.8.What does the underlined word “exacting” in paragraph 1 mean?A.Paying.B.Cutting.C.Receiving.D.Demanding. 9.What is the advantage of AI in preserving cultural heritage?A.It generates 2D images.B.It makes restoration easier.C.It makes preservation safer.D.It creates replicas in seconds. 10.How does VR help to preserve cultural heritage?A.By recycling huge amounts of waste.B.By reducing human impact on the site. C.By forbidding visitors from touching artifacts.D.By educating people about the sites’ importance.11.What is the author’s attitude towards technology application in preserving the cultural heritage?A.Ignoring.B.Compromising.C.Approving.D.Disagreeing.John Keats was an English poet, whose poetry described the beauty of the natural world and art as the vehicle for his poetic imagination. Regarded as one of the English language’s most naturally gifted poets, John Keats wrote poetry that concentrated on imagination, human nature, and philosophy. Although Keats didn’t receive much formal literary education, his own studies and great interest brought him much success. Besides, his own life situation made a great difference to his poetry.Growing up as a young kid in London in a lower, middle-class family, the young John didn’t attend a private school, but went to public school in Enfield, near his home. Histeachers and his family’s friends regarded him as a positive boy who liked playing and fighting much more than minding his studies. After his father’s death in the early 1800s, followed by his mother’s passing away due to illness, he began to view life differently. He wanted to escape the world and did so by reading anything he could get his hands on.At around the age of 16, John Keats began studying under a surgeon so that he too might become a doctor. However, his love for literature had taken too much of his time, especially with his addiction to the poetry of Edmund Spenser. Within two months in 1817, Keats had written an entire volume (册) of poetry that would be published, but was attacked sharply in Blackwood’s Magazine. However, it didn’t stop him.John Keats’ next work to be published was Endymion, which he wrote in 1817 and was published in May 1818. The story tells a boy who falls in love with the moon goddess and leads him to an adventure of one boy’s hope to overcome the limitations of being human. Following Endymion, he wrote Isabella. His next work was Hyperion that would attempt to combine all he learned. However, an attack of tuberculosis (肺结核) while visiting Italy kept him from his work and took his life in 1821.12.What changed John Keats’ attitude towards life?A.The poetry of Edmund Spenser.B.His early education at school.C.The criticism from a magazine.D.The death of his parents.13.What do we know from the text?A.Keats spent two months writing a poem in 1817.B.Keats hardly received education at school.C.Keats had admiration for Edmund’s poetry.D.Endymion tells of Keats’ love story.14.What can be inferred from the text?A.Edmund Spenser was a famous doctor.B.Hyperion might be incomplete. C.Keats’ family must be very poor.D.Keats rewrote his poem Isabella. 15.What is the text mainly about?A.Popularity of Keats’ poetry.B.Keats’ difficulties in his whole life. C.Other poets’ influence on Keats.D.Keats’ life and his poetry.二、七选五How can teenagers keep themselves from suffering from loneliness? Here are some suggestions for speeding a recovery from loneliness.___16___ A smile and a friendly greeting for the student behind you in line at the cafeteria(餐厅) won't make you best friends. But it will make you both feel good. It also can make it easier to interact the next time, and the time after that.Find a safe place to make connections. If going to the dancing party makes you feel like you just don't belong, try joining a special-interest group. ____17____ Just because you feel left out in one group doesn't mean you'll feel like an outsider in every other one. Look for a group that allows you to feel comfortable gradually.Find other ways of making connections. Lonely people hunger for friendship. Sometimes feeling accepted and liked comes more easily when you do something for others rather than waiting for them to make you feel better. ____18____ Help a child in rending. Take notes for a disabled classmate. You might be surprised at the connections you make.___19___ Loneliness is an absence of quality friendship, not of a particular quantity of friends. That's why it's important to know how to select a friend.You get what you expect, so expect the best. If you expect others to be friendly, you will behave in proper ways that encourage people to be friendlier to you. ____20____ But starting the first step of positive expectations can make all the difference.A.Choose the right people.B.Loneliness won’t last long.C.So consider becoming a volunteer.D.Reach out to others but start small.E.It can be hard work to be positive toward others.F.Maybe it's the drama club or the marching band.G.This harmful attitude can continue into adulthood.三、完形填空progress when we had a flat tire. I got the ____24____ wheel out but realized it was punctured (穿孔) as well.Fortunately, there were a couple of ____25____ where I sought help. I ____26____ a middle-aged man and explained my situation to him. He said he knew a repair centre nearby and gently added, “ Ask your family to wait at the shops. The roads are ____27____ . ”He noticed that our 12-year old daughter couldn’t ____28____ and called a woman to help. Sensing my fear at leaving them alone, he ____29____ to get the puncture fixed. Waiting for what felt like hours, I ____30____ if he would return. The woman told us that he would be back soon.Two hours later, we finally heard the sound of a bike. “ The shop is actually 15 kms away. We didn’t tell you, because that would have ____31____ your worry, ” said our savior (救星). He put the ____32____ in place. I took out a 50 dollar note to pay him but he____33____ . “ Thank you, brother, ” was all I could say. Choked with ____34____ at his kindness, I didn’t even ____35____ to ask his name.21.A.unwilling B.annoyed C.quick D.bored 22.A.drove B.rode C.hiked D.marched 23.A.hardly B.finally C.frequently D.carefully 24.A.abandoned B.spare C.old D.wasted 25.A.shops B.restaurants C.banks D.farms 26.A.passed down B.ran after C.came across D.talked with 27.A.warm B.quiet C.safe D.dangerous 28.A.speak B.eat C.walk D.swim 29.A.prepared B.hoped C.managed D.volunteered 30.A.wondered B.imagined C.promised D.expected 31.A.eased B.added C.lightened D.increased 32.A.bike B.money C.wheel D.car 33.A.watched B.refused C.waited D.accepted 34.A.regret B.admiration C.thankfulness D.amazement 35.A.decide B.need C.hope D.remember四、用单词的适当形式完成短文阅读下面短文, 在空白处填入适当的内容(1个单词)或括号内单词的正确形式。

福建省莆田市2021-2022学年高一下学期期末考试英语试卷(不含音频)

福建省莆田市2021-2022学年高一下学期期末考试英语试卷(不含音频)

莆田市2021-2022学年下学期期末质量监测高一英语第1卷(选择题)和第Ⅱ卷(非选择题)两部分。

注意事项:1. 答题前,考生务必将自己的姓名、准考证号填写在答题卡相应的位置。

2. 全部答案在答题卡上完成,答在本试卷上无效。

第I卷第一部分听力(共两节,满分30分)做题时,先将答案标在试卷上,录音内容结束后,你将有两分钟的时间将试卷上的答案转涂到答题卡上。

第一节(共5小题;每小题1.5分,满分7.5分)听下面5段对话,每段对话后有一个小题。

从题中所给的A、B、C三个选项中选出最佳选项,并标在试卷的相应位置。

听完每段对话后,你都有10秒钟的时间来回答有关小题和阅读下一小题。

每段对话仅读一遍。

例:How much is the shirt?A. £19.15.B. £9.18.C. £9.15.答案是C。

1. What is Estelle doing?A. Watching a TV series.B. Reading a book.C. Seeing a film.2. In which month will the man live in the hotel?A. January.B. March.C. May.3. What will Samuel do next?A. Buy a book.B. Take an exam.C. Have a class.4. Where will Tristan go first tomorrow?A. A car wash.B. An airport.C. A bank.5. What is the probable relationship between the speakers?A. Colleagues.B. Husband and wife.C. Salesperson and customer.第二节(共15小题;每小题1.5分,满分22.5分)听下面5段对话或独白。

Foundry NetIron XMR系列路由器介绍说明书

Foundry NetIron XMR系列路由器介绍说明书

N ET I R ON RONon DSCP Drop Precedence, operators can take advantage of Weighted Random Early Discard (WRED) for differen-tiated packet dropping in case of congestion within a given traffic class.High availability, crucial to converged networks, is ensured through a combination of highly resilient hardware and software design, and advanced failure detection and traffic protection/restoration schemes. The routers feature complete hardware redundancy combined with resilient software featuring hitless failover and hitless software upgrades with OSPF and BGP graceful restart for maximizing router uptime. The Multi-Service IronWare operating system, powering the NetIron XMR routers, offers advanced capabilities for rapid detection and bypass of link/node failures like BFD, UDLD, MPLS FRR, and Hot Standby paths.With security an increasing concern for today’s operators, the NetIron XMR routers offer a powerful set of security mechanisms that allow operators to enhance both infra-structure security and subscriber security. Featuring highly scalable inbound and outbound ACLs, operators can implement security policies for IPv4 and IPv6, as well as Layer 2 through the NetIron XMR Series. These policies can be applied permanently or on demand without impacting normal operations. Receive ACLs further harden platform and infrastructure security, allowing operators to implement strict policies for controlling management traffic and control traffic. To counter IP address spoofing used in many forms of DoS attacks, the NetIron XMR routers offer hardware-based wire-speed Unicast Reverse Path Forwarding (uRPF) for both edge applications (strict mode), and backbone applications (loose mode). uRPF allows the routers to check the packet’s source IP address against the routing table to ensure that the packet came from a valid, and expected, source network.Using the NetIron XMR routers, operators can combine the benefits of SONET/SDH long haul transport and the large cost effective capacity of Carrier Ethernet in many POPs. The routers offer a portfolio of native POS interfaces with speeds ranging from OC-12 (STM-4) to OC-192 (STM-64) allowing for native connectivity to SONET/SDH optical transport equipment or to existing POS routers with distances up to 80 km. Carrier Ethernet interfaces offer distances up to 80 km for 10 Gigabit Ethernet, and up to 150 km for Gigabit Ethernet. In addition, the routers offer operators cost effective 10 Gigabit Ethernet transport over OC-192 (STM-64) links using IEEE standard 10 Gigabit Ethernet WAN PHY.Designed for high-end routing applications, the NetIron XMR Series features Foundry Direct Routing (FDR) technology for full Forwarding Information Base (FIB) programming in hardware, together with hardware-based wire-speed access control lists (ACLs) and policy-based routing (PBR) for robust, high performance IPv4, IPv6, and Layer 3 VPN routing. Complementary to FDR is a full suite of unicast and multicast routing protocols for both IPv4 and IPv6. Supported IPv4 protocols include RIP, OSPF, IS-IS, BGP4, PIM-DM, PIM-SM/SSM, IGMP, BGP-MP for multicast, and MSDP. Supported IPv6 protocols include RIPng, OSPFv3, IS-IS, BGP-MP for IPv6 (BGP4+), PIM-SSM, and MLD. Building on this solid routing architecture, the NetIron XMR routers also provide dual-stack IPv4/IPv6 wire-speed routing to facilitate a seamless migration to IPv6 without sacrificing performance.A comprehensive set of path calculation and signaling capabilities using OSPF-TE, IS-IS-TE, RSVP-TE, CSPF, and LDP allows the creation of both traffic engineered and non traffic engineered infrastructures. Within either infra-structure, the NetIron XMR Series supports IP over MPLS as well as MPLS VPN applications. The NetIron XMR Series supports all three popular MPLS VPN services, Virtual Leased Line (VLL), LDP-Based Virtual Private LAN Service (VPLS), and BGP/MPLS VPN, on all ports at wire-speed.In addition, the NetIron XMR Series offers Multi-VRF Routing for environments where virtual routing is needed without the complexity of MPLS. Using Multi-VRF Routing, backbone operators can create multiple routing protocol instances that peer with each other in completely virtualized domains while sharing the same physical routers and links. The NetIron XMR Series is able to support overlapping IP address spaces through complete separation of the routing tables. Forwarding plane separation issupported through the use of standard 802.1Q VLAN tags.The NetIron XMR Series is also designed for enabling the evolving multi-service and triple-play infrastructures. Built with an innovative view of Virtual Output Queuing (VOQ) architectures, packet buffering, and packet scheduling, the NetIron XMR routers offer non-blocking packet forwarding and large capabilities for handling severe congestion scenarios. Built on that superior foundation, the NetIron XMR routers deliver a comprehensive suite of QoS mechanisms to enable next-generation architectures. Using the NetIron XMR routers, operators can implement eight distinct traffic classes of prioritization with true performance guarantees. Operators can implement those performance guarantees by choosing from different packet scheduling schemes and tweaking the associated configurable parameters. Additionally, by relying2t Service provider-grade IPv4/IPv6/MPLS multi-servicebackbone routerst4-, 8-, 16-, and 32-slot systems for maximumdeployment versatilityt Terabit-scale architecture designed for massive 10 Gigabit Ethernet and OC-192 scalabilityt Performance of competitor multi-chassis routers in a fraction of the rack space– Up to 2 billion pps routing performance withnon-blocking 3.2 Tbps data capacityt Industry-leading port capacity for a single chassis router– 128 10 Gigabit Ethernet / 640 Gigabit Ethernet ports– 64 OC-192 / 256 OC-48 portst Wire-speed dual stack IPv4/IPv6 routingt Wire-speed edge (PE) and core (P) Label Switching Routerst Industry-leading performance for MPLS services providing concurrent IP over MPLS, Virtual Leased Lines (VLLs), Virtual Private LAN Services (VPLSes), and BGP/MPLS VPNs at wire-speedt High-performance, robust routing via Foundry Direct Routing (FDR) for complete programming of the Forwarding Information Base (FIB) in hardwaret Full suite of unicast and multicast IPv4 and IPv6routing protocols– Supported IPv4 protocols include RIP, OSPF, BGP-4, IS-IS, PIM-DM, PIM-SM/SSM, IGMP, BGP-MP formulticast, and MSDP– Supported IPv6 protocols include RIPng, OSPFv3, IS-IS for IPv6, BGP-MP for IPv6 (BGP4+),PIM-SM/SSM, and MLDt Comprehensive MPLS signaling and path calculation algorithms for both traffic engineered and non-trafficengineered applications– OSPF-TE, IS-IS-TE, RSVP-TE, CSPF– LDPt Powerful Multi-VRF Routing supports virtual routing applications over non-MPLS backbonest Industry-leading scalability up to*– 10 million BGP routes and up to 500 BGP peers– 1 million IPv4 routes in hardware (FIB)– 240,000 IPv6 routes in hardware (FIB)– 2,000 BGP/MPLS VPNs and up to 1 millionVPN routes– 32,000 VLLs per system– 16,000 VPLSes and up to 1 million VPLSMAC addresses– 4,094 VLANs and up to 2 million MAC addresses t Superior high-availability design– Redundant management modules– Redundant switch fabrics– Redundant power supplies and cooling system– Hitless Layer 3 and Layer 2 failover with OSPF and BGP graceful restart– Hitless (in-service) software upgrades leveraging graceful restartt Rapid link/node failure detection with advanced traffic protection– BFD for rapid detection of neighbor / adjacency failure – Foundry UDLD and IEEE LFS for fast detection of link problems– MPLS FRR and Hot Standby paths for traffic protection t Distributed, scalable, wire-speed tunneling for IPv4 over GRE, and IPv6 over IPv4t Advanced QoS– Eight distinct priority levels– Weighted Random Early Discard (WRED) support for congestion management and precedence dropping(tunable via configuration)– Support for hybrid queue servicing disciplines: Strict Priority + Weighted Fair Queuingt State-of-the-art policy enforcement and monitoring for enforcing SLAs and implementing security policies– Two rate three color traffic policers– Traffic policer accounting– Layer 3 and Layer 2 ACLs– Granular ACL accounting– Hardware-based packet filtering– Hardware-based policy based routing (PBR)– Unicast Reverse Path Forwarding (uRPF)– Receive ACLs– Extensive sFlow Layer 2-7 traffic monitoring for IPv4, IPv6 and MPLS servicest Combine both Carrier Ethernet and powerful Packet over SONET/SDH– MEF 9 and MEF 14 certified for offering Carrier Ethernet services– Flexible set of POS interfaces with carrier class timing offering internal stratum 3, loop, line, and BITS timingsupportKey F eatures* Scalability limits dependent on configured system parameters, system profile selected, and routing database complexity.FEATURE NETIRON XMR 4000NETIRON XMR 8000NETIRON XMR 16000NETIRON XMR32000 Interface Slots 4 8 16 32Switch Fabric Capacity960 Gbps 1.92 Tbps 3.84 Tbps 7.68 TbpsData Forwarding Capacity400 Gbps 800 Gbps 1.6 Tbps 3.2 TbpsPacket Routing PerformanceFull Duplex240 million pps 480 million pps ~1 billion pps ~2 billion ppsTotal480 million pps 960 million pps ~2 billion pps ~4 billion ppsSwitch Fabric Redundancy 2+1 2+1 3+1 7+1Max 10-GbE Ports 16 32 64 128Max 1-GbE Ports80 160 320 640Max OC-192 (STM-64) Ports 8 16 32 64Max OC-48 (STM-16) Ports 32 64 128 256Height (inches/rack units) 6.96" / 4 RU 12.21" / 7 RU 24.47" / 14 RU 57.71" / 33 RUPower Supply Redundancy M+N M+N M+N M+NAir Flow Side to side Side to side Front to back Front to backIEEE COMPLIANCE– 802.3 CSMA/CD Access Methodand Physical Layer Specifications– 802.3ab 1000BASE-T– 802.3ae 10 Gigabit Ethernet– 802.3x Flow Control– 802.3ad Link Aggregation– 802.1Q Virtual Bridged LANs– 802.1D MAC Bridges– 802.1w Rapid STP– 802.1s Multiple Spanning Trees– 802.1ag Connectivity FaultManagement (C F M)RFC COMPLIANCEBGPv4– RFC 4271 BGPv4– RFC 1745 OSPF Interactions– RFC 1997 Communities & Attributes– RFC 2439 Route Flap Dampening– RFC 2796 Route Reflection– RFC 1965 BGP4 Confederations– RFC 2842 Capability Advertisement– RFC 2918 Route Refresh Capability– RFC 1269 Managed Objects for BGP– RFC 2385 BGP Session Protection viaTCP MD5– RFC 3682 Generalized TTL SecurityMechanism, for eBGP Session Protection– RFC 4273 BGP-4 MIB– draft-ietf-idr-restart Graceful RestartMechanism for BGPOSPF– RFC 2328 OSPFv2– RFC 3101 OSPF NSSA– RFC 1745 OSPF Interactions– RFC 1765 OSPF Database Overflow– RFC 1850 OSPF v2 MIB– RFC 2370 OSPF Opaque LSA Option– RFC 3630 TE Extensions to OSPF v2– RFC 3623 Graceful OSPF RestartIS-IS– RFC 1195 Routing in TCP/IP andDual Environments– RFC 1142 OSI IS-IS Intra-domainRouting Protocol– RFC 2763 Dynamic Host Name Exchange– RFC 2966 Domain-wide PrefixDistributionRIP– RFC 1058 RIP v1– RFC 1723 RIP v2– RFC 1812 RIP RequirementsIPv4 Multicast– RFC 1122 Host Extensions– RFC 1112 IGMP– RFC 2236 IGMP v2– RFC 3376 IGMP v3– RFC 3973 PIM-DM– RFC 2362 PIM-SM– RFC 2858 BGP-MP– RFC 3618 MSDP– RFC 3446 Anycast RP Technical SpecificationsThe S eries a t a G lanceGeneral Protocols– RFC 791 IP– RFC 792 ICMP– RFC 793 TCP– RFC 783 TFTP– RFC 826 ARP– RFC 768 UDP– RFC 894 IP over Ethernet– RFC 903 RARP– RFC 906 TFTP Bootstrap– RFC 1027 Proxy ARP– RFC 951 BootP– RFC 1122 Host Extensionsfor IP Multicasting– RFC 1256 IRDP– RFC 1519 CIDR– RFC 1542 BootP Extensions– RFC 1812 Requirements forIPv4 Routers– RFC 1541 and 1542 DHCP– RFC 2131 BootP/DHCP Helper– RFC 3768 VRRP– RFC 854 TELNET– RFC 1591 DNS (client)QoS– RFC 2475 An Architecture forDifferentiated Services– RFC 3246 An ExpeditedF orwarding PHB– RFC 2597 Assured ForwardingPHB Group– RFC 2698 A Two Rate ThreeColor MarkerOther– RFC 1354 IP Forwarding MIB– RFC 2665 Ethernet Interface MIB– RFC 1757 RMON Groups 1,2,3,9– RFC 2068 HTTP– RFC 2030 SNTP– RFC 2865 RADIUS– RFC 3176 sFlow– RFC 2863 Interfaces Group MIB– Draft-ietf-tcpm-tcpsecure TCP Security – RFC 3074 Ingress Filtering for Multihomed Networks (uRPF)– RFC 2784 Generic RoutingEncapsulation (GRE)– draft-ietf-bfd-base BidirectionalForwarding Detection (BFD)– draft-ietf-bfd-v4v6-1hop BFD for IPv4and IPv6 (Single Hop); for OSPFv2,OSP F v3, IS-ISIPv6 Core– RFC 2460 IPv6 Specification– RFC 2461 IPv6 Neighbor Discovery– RFC 2462 IPv6 Stateless AddressAuto-Configuration– RFC 2463 ICMPv6– RFC 4291 IPv6 Addressing Architecture– RFC 3587 IPv6 Global UnicastAddress F ormat– RFC 2375 IPv6 Multicast AddressAssignments– RFC 2464 Transmission of IPv6 overEthernet Networks– RFC 2711 IPv6 Router Alert Option– RFC 3596 DNS supportIPv6 Routing– RFC 2080 RIPng for IPv6– RFC 2740 OSPFv3 for IPv6– draft-ietf-isis-ipv6 Routing IPv6with IS-IS– RFC 2545 Use of BGP-MP for IPv6IPv6 Multicast– RFC 2710 Multicast Listener Discovery(MLD) for IPv6– RFC 3810 Multicast Listener DiscoveryVersion 2 for IPv6– RFC 4604 IGMPv3 & MLDv2 for SSM– draft-ietf-ssm-arch SSM for IP– RFC 2362 PIM-SM– draft-ietf-pim-sm-v2-new; partialsupport: SSM mode of operationIPv6 Transitioning– RFC 2893 Transition Mechanismsfor IPv6 Hosts and Routers– RFC 3056 Connection of IPv6Domains via IPv4 CloudsMPLS– RFC 3031 MPLS Architecture– RFC 3032 MPLS Label Stack Encoding– RFC 3036 LDP Specification– RFC 2205 RSVP v1 FunctionalSpecification– RFC 2209 RSVP v1 MessageProcessing Rules– RFC 3209 RSVP-TE– RFC 3270 MPLS Support ofDifferentiated Services– RFC 4090 Fast Reroute Extensions toRSVP-TE for LSP Tunnels; partialsupport: detour style– RFC 3812 MPLS TE MIBL3VPN– RFC 2858 Multiprotocol Extensionsfor BGP-4– RFC 3107 Carrying Label Informationin BGP-4– RFC 4364 BGP/MPLS IP VPNs– draft-ietf-idr-bgp-ext-communitiesBGP Extended Communities Attribute– RFC 4576 Using LSA Options Bit toPrevent Looping in BGP/MPLS IP VPNs(DN Bit)– RFC 4577 OSPF as the PE/CE Protocolin BGP/MPLS IP VPNs– draft-ietf-idr-route-filter CooperativeRoute Filtering Capability for BGP-4– RFC 4382 MPLS/BGP Layer 3VPN MIBL2VPN and PWE3– draft-ietf-l2vpn-l2-framework F rameworkfor Layer 2 Virtual Private Networks– draft-ietf-l2vpn-requirements ServiceRequirements for Layer 2 ProviderProvisioned Virtual Private Networks– RFC 4762 VPLS Using LDP Signaling– draft-ietf-pwe3-arch PWE3 Architecture– RFC 4447 Pseudowire Setup andMaintenance using LDP– RFC 4448 Encapsulation Methods forTransport of Ethernet over MPLSNetworks– draft-ietf-pwe3-pw-tc-mib Definitionsfor Textual Conventions and OBJECT-IDENTITIES for Pseudo-WiresManagement– draft-ietf-pwe3-pw-mib Pseudo Wire(PW) Management Information Base5PACKET OVER SONET/SDH– RFC 1661 The Point-to-Point Protocol (PPP)– RFC 1662 PPP in HDLC-like Framing– RFC 2615 PPP over SONET/SDH– RFC 1332 Internet Protocol ControlProtocol (IPCP)– RFC 1377 The PPP OSI Network Layer Control Protocol (OSINLCP)– RFC 2472 IPv6 over PPP– RFC 3592 SONET/SDH Objects– GR-253-CORE SONET Transport Systems: Common Generic Criteria– G.707/Y.1322 Network Node Interface for SDHMEF CERTIFICATION– MEF 9 Certified—Abstract Test Suitefor Ethernet Services at the UNI– MEF 14 Certified—Abstract Test Suitefor Traffic Management Phase 1 NETWORK MANAGEMENT– IronView Network Manager (INM)web-based graphical user interface– Integrated industry standard Command Line Interface (CLI)– sFlow (RFC 3176)– Telnet– SNMP v1, v2c, v3– SNMP MIB II– RMONELEMENT SECURITY OPTIONS– AAA– RADIUS– Secure Shell (SSH v2)– Secure Copy (SCP v2)– HTTPs– TACACS/TACACS+– Username/Password (Challengeand Response)– Bi-level Access Mode (Standard andEXEC Level)– Protection against Denial of Service attacks, such as TCP SYN or Smurf Attacks ENVIRONMENTAL– Operating Temperature: 0 °C to 40 °C(32 °F to 104 °F)– Relative Humidity: 5% to 90%, @40 °C(104 °F), non-condensing– Operating Altitude: 6,600 ft (2,012 m)– Storage Temperature: -25 ºC to 70 ºC(-13 ºF to 158 °F)– Storage Humidity: 95% maximumrelative humidity, non-condensing– Storage Altitude: 15,000 ft(4,500 m) maximumSAFETY AGENCY APPROVALS– CAN/CSA-C22.2 No. 60950-1-3– UL 60950-1– IEC 60950-1– EN 60950-1 Safety of InformationTechnology Equipment– EN 60825-1 Safety of Laser Products—Part 1: Equipment Classification,Requirements and User’s Guide– EN 60825-2 Safety of Laser Product—Part 2: Safety of Optical FibreCommunication SystemsELECTROMAGNETIC EMISSION– ICES-003 Electromagnetic Emission– FCC Class A– EN 55022/CISPR-22 Class A/VCCIClass A– AS/NZS 55022– EN 61000-3-2 Power Line Harmonics– EN 61000-3-3 Voltage Fluctuation& F licker– EN 61000-6-3 Emission Standard(Supersedes: EN 50081-1)IMMUNITY– EN 61000-6-1 Generic Immunityand Susceptibility (Supersedes: EN 50082-1)– EN 55024 Immunity Characteristics( Supersedes:- EN 61000-4-2 ESD- EN 61000-4-3 Radiated, radio frequency,electromagnetic field- EN 61000-4-4 Electrical fast transient- EN 61000-4-5 Surge- EN 61000-4-6 Conducted disturbancesinduced by radio-frequency fields- EN 61000-4-8 Power frequencymagnetic field- EN 61000-4-11 Voltage dips and sags )TELCO NEBS/ETSIDesigned to meet the following specifications(formal testing under way):– Telcordia GR-63-CORE NEBSRequirements: Physical Protection– Telcordia GR-1089-CORE EMCand Electrical Safety– Telcordia SR-3580 Level 3– ETSI ETS 300-019 Physical Protection- Part 1-1, Class 1.1, Partly TemperatureControlled Storage Locations- Part 1-2, Class 2.3, Public Transportation- Part 1-3, Class 3.1, TemperatureControlled Locations (Operational)– ETSI ETS 300-386 EMI/EMCPOWER AND GROUNDING– ETS 300 132-1 Equipment Requirementsfor AC Power Equipment Derived fromDC Sources– ETS 300 132-2 Equipment Requirementsfor DC Powered Equipment– ETS 300 253 Facility RequirementsPHYSICAL DESIGN AND MOUNTING– 19-inch rack mount supporting rackscompliant with:- ANSI/EIA-310-D- ETS 300 119- GR-63-CORE Seismic Zone 4– TabletopENVIRONMENTAL REGULATORYCOMPLIANCE– EU 2002/95/EC RoHS (with leadexemption)– EU 2002/96/EC WEEE6NETIRON XMR SERIES POWER SPECIFICATIONSNETIRON XMR 4000 NETIRON XMR 8000 NETIRON XMR 16000 NETIRON XMR 32000 Maximum DC Power Consumption (W)1,384 2,750 5,572 11,625Maximum AC Power Consumption (W)1,384 2,750 5,572 11,625[100 - 240 VAC]Maximum Thermal Output (BTU/HR)4,724 9,386 19,017 39,670NETIRON XMR SERIES PHYSICAL SPECIFICATIONSDIMENSIONS WEIGHTNetIron XMR 4000 17.45"w x 6.96"h x 22.5"d 44.32w x 17.68h x 57.15d cm 78 lbs 35 kgNetIron XMR 8000 17.45"w x 12.21"h x 22.5"d 44.32w x 31.01h x 57.15d cm 131 lbs 60 kgNetIron XMR 16000 17.45"w x 24.47"h x 25.5"d 44.32w x 62.15h x 64.77d cm 236 lbs 107 kgNetIron XMR 32000 17.45"w x 57.71"h x 24.1"d 44.32w x 146.58h x 61.21d cm approx 478 lbs approx 217 kgNI-XMR-MR 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 2.5 lbs 1134gNI-XMR-32-MR 7.760"w x 1.240"h x 16.134"d 19.7104w x 3.14960h x 40.9804d cm 2.8 lbs 1270 gNI-X-SF1 5.260"w x 1.504"h x 16.134"d 13.3604w x 3.82016h x 40.9804d cm 1.75 lbs 793.79 gNI-X-SF3 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.25 1474.2 gNI-X-32-SF 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.25 1474.2 gNI-XMR-10Gx4 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 4.0 lbs 1814.4 gNI-XMR-10Gx2 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 4.0 lbs 1814.4 gNI-XMR-1Gx20-SFP 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.5 lbs 1587.6 gNI-XMR-1Gx20-GC 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.5 lbs 1587.6 gNI-X-OC192x2 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 5.0 lbs 2268.0 gNI-X-OC192x1 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.25 1474.2 gNI-X-OC48x8 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 4.5 lbs 2041.2 gNI-X-OC48x4 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.5 lbs 1587.6 gNI-X-OC48x2 7.760"w x 1.504"h x 16.134"d 19.7104w x 3.82016h x 40.9804d cm 3.5 lbs 1587.6 g7。

2024届云南省昆明市第一中学与红河州第一中学高三联考一模英语试题(2)

2024届云南省昆明市第一中学与红河州第一中学高三联考一模英语试题(2)

2024届云南省昆明市第一中学与红河州第一中学高三联考一模英语试题(2)一、听力选择题1. What did the woman find difficult?A.The essay section.B.The blank filling questions.C.The multiple-choice section.2.A.He did not attend today’s class.B.His notes are not easy to read.C.His handwriting has a unique style.D.He is very pleased to be able to help.3.A.Looking at a map.B.Going on a diet.C.Attending a party.D.Talking to Mary.4. What color is the blanket?A.Yellow.B.Blue.C.Green.5. What does the man come for?A.A lecture.B.A party.C.A meeting.二、听力选择题6. 听下面一段较长对话,回答以下小题。

1. Who has not given up smoking ?A.Sarah.B.Bill.C.Bill's wife2. Why did Sarah give up smoking?A.Because she took Bill’s advice.B.Because it was bad for her temper.C.Because her husband often became angry with her.3. What happened to Bill and Sarah's husband?A.They never stayed at home.B.They suffered from their wives' bad temper.C.They bought cigarettes for their wives.7. 听下面一段较长对话,回答以下小题。

复杂结构船舶配电系统故障恢复算法

复杂结构船舶配电系统故障恢复算法

正常航行,因此如何快速完成故障诊断并迅速恢复系 统正常运行已经成为相关机构研究的主要课题之一[1]。 复杂结构船舶配电系统故障恢复算法一般分为 2 部 分:故障诊断和故障修复,故障诊断是故障修复的前 提,故障修复是故障诊断的目的。以往故障诊断环节 主要通过遗传算法、支持向量机以及神经网络等 3 种 算法来完成,但是这 3 种算法的误诊率和漏诊率较 高,影响了后续故障恢复效率和准确性,因此本文主 要针对故障修复算法中的故障诊断环节进行研究,以
第 41 卷 第 4A 期 2019 年 4 月
舰船科学技术 SHIP SCIENCE AND TECHNOLOGY
Vol. 41, No. 4A Apr. , 2019
复杂结构船舶配电系统故障恢复算法
程真启 (南通航运职业技术学院 轮机工程系,江苏 南通 206010)
摘 要: 利用遗传算法、支持向量机以及神经网络等传统算法对船舶配电系统故障进行诊断,误诊率和漏诊 率较高,影响了后续故障修复,不利复杂结构船舶配电系统故障恢复。针对上述问题,以模糊 C—均值聚类算法取 代以上 3 种故障诊断算法,解决误诊率和漏诊率高的问题,之后在故障诊断的基础上,实现故障修复,从而完成整 个故障恢复。结果表明:与遗传算法、支持向量机以及神经网络 3 种传统故障诊断算法相比,模糊 C—均值聚类算 法的误诊率和漏诊率均更低(误诊率:1.14%,1.22%,2.00%;漏诊率:1.40%,0.43%,0.34%),说明本算法的诊 断性能更好,更能全面、准确的检测出配电系统发生的故障,保证了后续故障修复的效率和准确性。
关键词:配电系统;故障诊断;故障修复
中图分类号:U672.7 文献标识码:A
文章编号: 1672 – 7649(2019)4A – 0118 – 03

眼见不一定为图片实英语作文

眼见不一定为图片实英语作文

眼见不一定为图片实英语作文Seeing is not always believing in today's digital age. With the rapid advancement of technology, the ability to manipulate and alter images has become increasingly accessible. What we see in a photograph or video may not necessarily reflect the true reality. The adage "a picture is worth a thousand words" has taken on a new meaning as the credibility of visual media has been called into question.One of the primary reasons why seeing is not always believing is the prevalence of photo editing software. Programs like Photoshop, GIMP, and Canva allow users to seamlessly edit and manipulate images. From removing blemishes and enhancing colors to completely changing the background or adding new elements, the possibilities are endless. This has led to a proliferation of digitally altered images that present a distorted version of reality.The rise of social media has further exacerbated this issue. Platforms like Instagram and Facebook have become breeding grounds for carefully curated and edited images. Users often strive to present anidealized version of their lives, carefully selecting and enhancing the photographs they share. This can lead to a skewed perception of reality, as viewers may compare their own lives to the carefully crafted images they see online.Moreover, the use of filters and editing tools on social media has become so commonplace that it has become difficult to discern what is real and what is not. The application of filters can dramatically change the appearance of a person or a scene, making it challenging to determine the true nature of the image.Another factor that contributes to the notion that seeing is not always believing is the existence of deepfakes. Deepfakes are AI-generated media that can convincingly manipulate the appearance and actions of individuals in videos and images. This technology has been used to create false videos of public figures, including politicians and celebrities, saying or doing things they never actually did. The increasing sophistication of deepfake technology has made it increasingly difficult to distinguish between real and fabricated visual content.The proliferation of fake news and misinformation further exacerbates the issue. Doctored images and videos are often used to support false narratives and spread disinformation. In the age of social media, these manipulated visuals can quickly gain traction andbe widely shared, leading to the perpetuation of false beliefs and the erosion of trust in the credibility of visual media.Furthermore, the abundance of stock images and stock footage available online has contributed to the perception that seeing is not necessarily believing. These pre-made visual assets can be used in a variety of contexts, sometimes in ways that do not accurately reflect the reality they portray. The use of stock imagery can create a sense of inauthenticity and undermine the credibility of the visual content.In response to these challenges, there has been a growing emphasis on media literacy and the importance of critical thinking when consuming visual content. Individuals are encouraged to approach images and videos with a skeptical eye, questioning the authenticity and the context in which they are presented. This includes being aware of the potential for manipulation, understanding the capabilities of editing software, and recognizing the use of stock imagery or deepfake technology.Moreover, efforts have been made to develop tools and techniques to detect and identify manipulated visual content. Researchers and organizations are working on developing algorithms and software that can analyze images and videos to identify signs of tampering or digital alteration. This can help in the verification of visual media and contribute to the restoration of trust in the credibility of visualinformation.In conclusion, the notion that seeing is not always believing has become increasingly prevalent in the digital age. The ease of manipulating and altering images, the rise of social media, the existence of deepfakes, and the proliferation of fake news and misinformation have all contributed to the erosion of trust in visual media. As a result, it is crucial for individuals to approach visual content with a critical mindset, to be aware of the potential for manipulation, and to seek out reliable sources of information. By cultivating media literacy and embracing the tools and techniques developed to detect manipulated visual content, we can work towards restoring the credibility of visual media and ensuring that what we see aligns with the truth.。

科技与艺术英语作文短文

科技与艺术英语作文短文

科技与艺术英语作文短文The fusion of technology and art is a symphony of innovation that continues to astound us, transcending the boundaries of what was once thought possible. In the realm where digital algorithms dance with the brushstrokes of creativity, we witness the birth of a new aesthetic, one that is both futuristic and deeply human. The canvas is no longer just a physical surface; it has expanded into the digital ether, where the imagination can run wild, unfettered by the constraints of the tangible world.From the intricate patterns of generative art, crafted by algorithms that learn and evolve, to the immersive experiences of virtual reality that transport us to worlds beyond our own, the intersection of these two domains is a testament to the boundless potential of human ingenuity. We see this in the way augmented reality enhances our perception of the world, overlaying digital information onto our physical surroundings, creating a seamless blend of the seen and the unseen.Moreover, technology has democratized the arts, allowing creators from all walks of life to express themselves without the need for traditional tools or materials. With a smartphone and an app, anyone can compose music, design a sculpture, or paint a masterpiece. This accessibility has led to a renaissance of creativity, where the barriers to entry are lower, and the diversity of voices is richer.As we delve deeper into this union of tech and art, wefind that it is not just about the creation of new forms but also about the preservation of the old. Digital restoration has given new life to ancient artifacts, allowing us to appreciate the craftsmanship of the past with a clarity that was previously unattainable. Similarly, the digitization ofart collections has made them accessible to a global audience, ensuring that the legacy of great artists can be shared and appreciated by all.In conclusion, the marriage of technology and art is nota fleeting trend but a profound evolution in how we perceive and interact with the world around us. It is a journey of discovery, a celebration of human creativity, and a reminder that, as we advance, we can still find beauty in the blend of the old and the new.。

算法的英文怎么说

算法的英文怎么说

算法的英文怎么说关于算法的英文怎么说算法的英文:arithmetic参考例句:Primary algorithm基本算法,初等算法Fundamental algorithm基本算法An unsupported or unknown key algorithm was encountered; the current operation cannot be completed.遇到了不支持的或未知的密钥算法;当前操作无法完成。

algorithm for optimal control最优控制算法Hidden line algorithm隐藏线算法Paged-memory scheme分页内存算法Method of calculating depreciation折旧计算法"There are many variations in the way these two figures are actually calculated,"这两个数目的'计算法是多种多样的。

In this paper the parameter imbedding algorithm is introduced.本文介绍了一种参数插入算法。

This paper establishes convergence properties of a new algorithm.本文论证了一种新算法的收敛性。

arithmetic是意思:n. 算术He is good at arithmetic.他的算术好。

Painting, music, arithmetic, and the like绘画、音乐、算术等等It is useful to have checks against arithmetical errors为防止算术计算中的错误,加以验算是有益的。

He's not very good at arithmetic.他不太擅长算术。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Restoration Algorithms for Virtual Private Networks in the Hose ModelGiuseppe F.Italiano,Rajeev Rastogi,B¨u lent YenerAbstract—A Virtual Private Network(VPN)aims to emulate the services provided by a private network over the shared Internet.The endpoints of a VPN are connected using abstractions such as Virtual Channels(VCs)of ATM or Label Switching Paths(LSPs)of MPLS technologies.Reliability of an end-to-end VPN connection depends on the reliability of the links and nodes in thefixed path that it traverses in the network.In order to ensure service quality and availability in a VPN,seamless recovery from failures is essential.This work considers the problem of fast recovery in the recently proposed VPN hose model.In the hose model bandwidth is reserved for traffic aggregates instead of pairwise specifications to allow any traffic pat-tern among the VPN endpoints.This work assumes that the VPN endpoints are connected using a tree structure and at any time,at most one tree link can fail(i.e.,single link failure model).A restoration algorithm must select a set of backup edges and allocate necessary bandwidth on them in advance, so that the traffic disrupted by failure of a primary edge can be re-routed via backup paths.We aim at designing an optimal restoration algorithm to minimize the total bandwidth reserved on the backup edges.This problem is a variant of optimal graph augmentation problem which is NP-Complete. Thus,we present a polynomial-time approximation algorithm that guaran-tees a solution which is at most16times of the optimum.The algorithm is based on designing two reductions to convert the original problem to one of adding minimum cost edges to the VPN tree so that the resulting graph is2-connected,which can be solved in polynomial time using known algo-rithms.The two reductions introduce approximation factors of8and2, respectively,thus resulting in a16-approximation algorithm with polyno-mial time complexity.I.I NTRODUCTIONTraditionally,a private network(PN)is established by leased-lines connecting the PN sites(e.g.,campuses or branch offices of an enterprise)over a W AN.Since the lines are dedicated, security and bandwidth guarantees are ensured.As the Inter-net becomes a commercial infrastructure,not only the number of endpoints of a PN gets increased but also the endpoints get geographically dispersed.Thus,connecting a large number of dispersed PN sites with dedicated lines becomes expensive.As a result,in recent years there has been much interest in offering Virtual Private Network(VPN)services over the public Internet. The main challenge has been to provide performance guarantees comparable to private W ANs without dedicated leased-lines. Thefirst generation IP-based VPNs technology has mainly fo-cused on security(e.g.,IPSEC[1],and tunneling based routing (e.g.,L2TP[2])and fell short of providing any Quality of Ser-Dipartimento di Informatica,Sistemi e Pro-duzione,Universit`a di Roma“Tor Vergata”,Rome, Italy.Email:italiano@disp.uniroma2.it.URL: .uniroma2.it/¨italiano.Part of this work was done while visiting Columbia University and Bell Laboratories,Lucent Technologies.Partially supported by the IST Programme of the EU under con-tract n.IST-1999-14.186(ALCOM-FT),by the Italian Ministry of University and Scientific Research(Project“Algorithms for Large Data Sets:Science and Engineering”)and by CNR,the Italian National Research Council under contract n.00.00346.CT26.Bell Laboratories,Lucent Technologies600Mountain Avenue,Room Murray Hill,NJ07974,email:rajeev@ Information Sciences Research Center Bell Laboratories,Lucent Technolo-gies600Mountain Avenue,Room2T-314Murray Hill,NJ07974,email: yener@ vice(QoS)guarantees.However,the recent emergence of IP technologies like MPLS[3],Diffserv and RSVP enhances the Internet infrastructure to provide services beyond the traditional best effort.Thus the problem of provisioning VPN services with QoS guarantees has become an active area of research.There are two popular models for providing QoS in the con-text of VPNs-the“pipe”model and the“hose”model[3],[4]. In the pipe model,the VPN customer specifies QoS require-ments between every pair of VPN endpoints.Thus,the pipe model requires the customer to know the complete traffic ma-trix,that is,the load between every pair of endpoints. However,as the number of endpoints grow and as the con-nectivity dynamics increase,it may be difficult to obtain pair-wise statistical bandwidth requirements between the endpoints. Thus,algorithms for establishing VPNs must resort to models with aggregate bandwidth demands such as the“hose”model proposed in[4].In the hose model each VPN site specifies its aggregate ingress and egress bandwidth requests.The ingress bandwidth for an endpoint specifies the incoming traffic from all the other VPN endpoints into the endpoint,while the egress bandwidth is the amount of traffic the endpoint can send to the other VPN endpoints.The hose model is scalable since the cus-tomer manages the allocated bandwidth at perflow basis at the network edge while the VPN provider is concerned with only the flow aggregates inside the network.Several provisioning algo-rithms for VPNs in the hose model have been proposed[3],[4], [5],[6].Provisioning a VPN requires identifying a subgraph to connect the VPN endpoints,and reserving the necessary band-width on the physical links that are used by this subgraph.It is shown that a tree is the optimum topology when the ingress and egress bandwidth requests are symmetrical[5].Failure of any edge in a VPN tree would disrupt the ser-vice unless a backup path was established to reconnect tree.A restoration algorithm selects a set of backup paths and allocates necessary bandwidth on them in advance,so that the traffic dis-rupted by failure of a primary edge can be re-routed via backup paths.This work presents restoration algorithms for maintaining a VPN tree in the hose model with symmetric bandwidth requests under transient link ly,we assume that a link fail-ure in the network is repaired before the next one is presented, which seems realistic in many situations.A naive approach for restoration would be to build a pair of edge-disjoint VPN trees so that if the primary tree gets disconnected then the backup tree would be used.However,this approach would be wasteful un-der a single link failure model since a backup path can be used to recover from the failure of multiple primary links.Thus a restoration algorithm must consider sharing of the backup paths. However,as we show later bandwidth reservation on the backup paths complicates the problem further than simply minimizingthe number of links used in the backup paths.There are several relevant results on the restoration problem in MPLS capable networks.In[7]restoration algorithms for link failures,based on concatenation of shortest paths,are presented.In[8],[9],[10]authors present restoration algorithms for LSPs in MPLS enabled networks.Motivated by the single link failure model their restoration objective is based on backup path sharing.This work complements and advances these results.First,we introduce several cost functions and show the trade-offs among them.The cost functions include minimizing the total band-width reserved on the backup paths,minimizing the disrup-tion in the tree links,minimizing the total additional bandwidth reservation needed in the network.Next,we focus on the objec-tive function to minimize total bandwidth on the backup paths. We call this problem optimal augmentation of a VPN tree and note that it is a variant of the optimal graph augmentation prob-lem which is NP-Complete.Thus we present a polynomial time approximation algorithm which gives solutions that are provably at most16times the optimum.Our approach is based on reducing the optimal augmentation problem to the edge connectivity augmentation problem[11], [12]in two phases.In thefirst reduction,we start from the origi-nal graph and produce a graph which has no complications arising from path sharing.is obtained from by replacing entire backup paths with disjoint backup“edges”:this costs us an approximation factor of8.Finding an optimal augmentation for is still difficult.We then reduce to another graph containing only certain types of non-tree links,and such that the cost of each backup link can be computed more easily:this costs us another approximation factor of2.The remainder of the paper is organized as follows.In Section 2,we define our model and the basic properties of the augmen-tation problem.In Section3,we introduce the restoration algo-rithm and its approximation factor via a sequence of reductions. In Section4we conclude by summarizing the results.II.M ODEL AND D EFINITIONSWe are given an undirected graph with a set of terminals that wish to establish communication among each other.Let and denote the number of nodes and links in.We assume that each terminal has an upper bound on the amount of traffic that can be either sent (egress bandwidth)or received(ingress bandwidth)by at any point,i.e.,for each terminal the ingress bandwidth equals the egress bandwidth.A valid traffic matrix on is an assign-ment of a demand to each pair of terminals that respects the upper bounds:i.e.,for any we have that and .We are also given a VPN tree that is able to support any set of traffic demands respecting those upper ly,each tree edge has a bandwidth reserva-tion such that the demands corresponding to any valid traffic matrix can be routed along.In other words,let be the tree path between terminals and:then Edges in the VPN tree are called primary edges and their re-served bandwidth is called primary bandwidth.In this paper,we address the problem of maintaining a VPN tree in the transient link failure ly,we assume that network links can fail,but a link failure is repaired before the next one is presented.Our approach is based on choosing a set of backup paths to cope with the failure of any primary link. Namely,we wish to select a set of backup paths,and allocate backup bandwidth on those paths,so that when a primary link fails,the traffic demands routed on can be re-routed on the backup paths.Before defining our objectives in more detail,we need a few more definitions.For the sake of clarity,Table1summarizes the notation used throughout the paper.Definition1:Given a tree,and an edge, let and be the two trees obtained after deleting,with and.Let and be the sums of (ingress)bandwidths for the terminals in the two trees,i.e.,and.Then the bandwidth requirement for edge is. Consider Figure2,which depicts a VPN tree having three subtrees(shown as triangles)containing the VPN nodes in. The subtree rooted at node has total10units1of ingress and 10units of egress aggregate bandwidth requirements.The band-width requirement for edge in thisfigure is20which is the minimum of.Similarly the bandwidth needed on edge is14which is the minimum of.Let be an edge in such that. Inserting into will create a fundamental cycle which will include a set of primary edges.Note that deleting an edge in will still induce a new tree connecting nodes in.Thus,if edge is deleted from,then the new tree could be used to route the traffic demands, provided that there is enough bandwidth reservation in.We call as a candidate backup edge for the links in.Since a primary edge can occur in multiple fundamental cycles,it may have multiple candidate backup edges.Thus,an edge becomes a backup edge to cover only a subsetof the edges.For example edge,shown with a dashed line,is a backup edge for the tree edges and.In the more general case a backup path can be used to obtain such a cycle and each edge in the backup path will be a candidate backup edge.In this work we consider how to choose minimum cost backup paths for each,and to reserve backup bandwidth such thatis able to route the demands corresponding to any valid traffic matrix.Next we define this requirement precisely:Definition2:Let be a graph and let be a tree.An augmentation for in is a set of edgessuch that the following is true:is2-edge-connected.if covers(i.e.,),then edges ofhave enough bandwidth reservation so that the demands corresponding to any valid traffic matrix can be routed along.Without loss of generality,the unit of bandwidth is considered to be Mbps and omitted henceforth.Symbol DescriptionGraph with nodes and bidirectional edgesnode and edge set of graph,respectivelyedge that connects nodes andset of VPN nodespairwise traffic matrix such that anda VPN tree that connects the nodes in setsubtrees obtained from deleting primary edgebound on the aggregate bandwidth request of node,total bandwidth in and:andamount of bandwidth reserved on:the unique path on between nodes andthe backup path to connect and if any link failsbackup path for a primary edgebandwidth reservation on the backup pathset of edges in for which is a candidate backup edgeset of edges in for which is a backup edge(i.e.,for)required bandwidth reservation on:new bandwidth reservation needed on edgeforan augmentation of in:optimal augmentation ofcost of backup pathcost of(i.e.,total bandwidth needed by):Fig.1.Notation Used in the PaperFor the sake of notational simplicity,we will omit the subscriptin whenever there is no danger of ambiguity.PATH120Fig.2.The bandwidth requirement of a backup edge is the maximum band-width of the edges that it covers.Fact1:Let be a tree,and let be a graph such thatand.Let be an augmentation for in.Let be an edge in,let be the bandwidth requirement of(i.e.,the bandwidth reservation needed for), and let be the set of tree edges for which is a backup edge.ThenFor example consider the backup path PATH2between nodes and in Figure2that covers the links.To meet the traffic demands,any link in this path will require bandwidth reservation equal to the maximum of the edges in set which is20.A.Cost Function for Augmentation and its VariantsWe now list several cost measures that can be considered for an optimal augmentation.A.1Cost Function CF1One simple special case is to consider an augmentation using the minimum number of links.Then,our optimization problem is an instance of the unweighted2-edge-connectivity problem which is known to be NP-Complete.Khuller and Vishkin[13] provide an algorithm with approximation factor of1.5.A.2Cost Function CF2In this case,we wish tofind an augmentation such that the backup bandwidth reserved on edges in the augmentation is minimum.In other words,we are interested in the optimal aug-mentation which minimizes the quantityNote that this is more difficult than weighted2-edge-connectivity(see Frederickson and Ja’Ja’[14]and Khuller and Thurimella[11]).Indeed,in weighted2-edge-connectivity,the cost of a non-tree edge is given,while here it depends on which edges are covered by,i.e.,on.(b)augmentation with 9 edges without sharing (a)augmentation with 8 edges with sharingFig.3.Cost alternativesA.3Cost Function CF 3We define a more precise cost function for a backup pathwhich has two components:(1)the total bandwidth required on the links of the backuppath (backup edge costs );(2)the total additional bandwidth required on the primaryedges (primary edge costs ).We denote the new total bandwidth reservation needed on a pri-mary edge by.Let be the primary edge cost (i.e.,additional bandwidth required)for.Essentially,is the maximum bandwidth reserved on primary edge in all the trees ,for primary edges .(Note thatdenotes the backup path for edge ).For example,there are two choices in Figure 2to cover the links on the tree path between and .We can choose PATH1,or PATH2and PATH3together.If we choose the former,eachPATH1will have yielding a total cost ofin the backup path.The choice of a backup pathmay require increasing the bandwidth on the primary edges aswell.For example suppose that linkfails.The maximum bandwidth on this link is set to 20which is the total traffic to and from subtree rooted under .The new path to inis via the tree linkseach of which needs additional 20-14=6units of bandwidth.Thus the total bandwidth is 120+18=138.If PATH2and PATH3are used the total cost would be.Thus we can define a cost measure for a backup path as a linear combination of the two components explained above.Definition 3:The cost of an augmentation taking into ac-count bandwidth reservations on both primary as well as backup edges is given by:We remark that there are several trade-offs between these two components,depending on the problem considered.For instance,consider the example in Figure 3which shows twoaugmentation (dashed lines)of the same VPN tree (solid lines)with VPN nodes and their bandwidth requests shown in the parenthesis.Backup path PATH1in Figure 3.a creates a cyclethat includes the links.However,the backup links in this path are used to cover the linksand (i.e.,PATH1,).The cost of the first augmentation iswhere the term in parenthesis is theadditional bandwidth required for the tree links.The second augmentation shown in Figure 3.b uses one less link by shar-ingamong all the augmentation paths and has the same total cost of 145.However suppose that VPN nodes C and D increase their bandwidth request to 10then the cost of augmen-tation without sharing a backup edge would be 155while for the augmentation with sharing it would be 160.Thus,it is not always desirable to share the backup links to obtain an optimal augmentation of a VPN tree.For the sake of succinctness,in the remainder of the paper we will focus primarily on cost function CF 2:i.e.,an augmentationfor whichis minimum over all augmen-tationsof .Our algorithm for cost function CF 2can be extended with more sophisticated techniques to the case of cost function CF 3.Details of these extensions will be presented in the full version of the paper.III.A PPROXIMATION A LGORITHMS FOR AN O PTIMALA UGMENTATION In this section,we present an algorithm to find a 16-approximation to the optimal augmentation problem for cost function CF 2.Our algorithm is based on a sequence of re-ductions.The high-level ideas behind those reductions are as follows.In the first reduction,we start from and produce a graph which has no complications arising from path shar-ing.is obtained from by replacing entire backup paths with disjoint backup “edges”:this will cost us an approxima-tion factor of 8.Finding an optimal augmentation forwill still be difficult:in particular,as we discussed above,the cost ofa backup edge instill depends on the tree edges that are covered by .We will reduceto another graph ,such that the cost of each backup edge is fixed and can be computed more easily:this will cost us another approximation factor of 2.In order to compute the optimal augmentation for in ,we will use the 2-edge-connectivity augmentation algorithm of Khuller and Thurimella [11].We will now see those reductions more in detail.A.Constructing graphWe will start by showing that an optimal augmentation is given by a forest of trees:Lemma 1:Let be a tree,and letbe a graph such that and .Then an optimal augmenta-tion for in is acyclic.Proof:Letbe an optimal augmentation for in .Assume by contradiction that there is a cycle in .Withoutloss of generality,is a simple cycle.For each edge,letbe its bandwidth requirement,and let be the set of tree edges for which is a backup edge.Let,be the edge with minimum bandwidth requirement in ,i.e.,(a)(b)Fig.4.Constructing from.The graph is depicted in(a)and the corresponding graph is shown in(b)..We claim that if is deleted from,then the other edges of can be used as backup paths for without having their bandwidth requirements increased.Indeed,let be any tree edge in,and let be the maximal subpath of containing used by the backup path of in :note that is always nonempty as.Then, after deleting,we can replace by in the backup path of.Since for each,the bandwidth requirement of edges in will not be affected by this change.In summary,is still an augmentation for in,having.This contradicts the optimality of.Lemma1states that the edges in the optimal augmentation induce a forest.Next,we show how to exploit this property for ourfirst reduction.Definition4:Let be a tree,and let be a graph such thatand.Let be defined as fol-lows:and there is an edge in if and only if there is a path from to in(i.e.,a path in avoiding edges of).Let be such that and.Thus,only contains vertices from .Further,each non-tree edge in has a weight which is the number of edges in,the shortest path (i.e.,the path with minimum number of edges)between vertices and in.Figure4.b illustrates the graph constructed for the graph depicted in Figure4.a.In thefigure,the vertices of are shaded and tree edges are drawn using dotted lines.As shown in Figure4.b,only contains vertices from;the weights of non-tree edges in are used to label the edges.An augmentation in consists of non-tree edges that cover all the tree edges;each non-tree edge in can serve as a backup edge for any tree edge in the unique path between and in.Thus,the cost(for CF2)of an augmentation in is given as where is a set of non-tree edges in and.In the remainder of this subsection,we show that there is an augmentation for in whose cost is within a factor of8of the optimal augmentation for in.Let be an optimal augmentation for in.Suppose we assign each edge in to bins as follows.If the bandwidth reserved on satisfies,then edge is assigned to bin.Let denote the set of tree edges assigned to bin. Also,let denote the maximum index for a bin to which a tree edge is assigned;that is,for all tree edges,.We define to be the augmentation consisting of edges in that protect a tree edge in bin.In other words,if for an edge,there exists a tree edge,then.Furthermore,the bandwidth reserved on each backup edge in augmentation is.Clearly,for a tree edge,since contains a backup path for,augmentation must also contain the same backup path for.Also,since and the bandwidth reserved on each edge of is,the backup path in has sufficient bandwidth to protect.Thus,each covers all the edges in ,and the augmentations protect all the tree edges. Note that the cost of is given by. Lemma2:Let be the edges of an optimal augmentation that protect a tree edge in.Then.Proof:Consider an edge.Let be the edge in with the maximum value of.Thus,. Suppose that.Then and can be present only in augmentations(since does not pro-tect edges in,it does not belong to). In each augmentation,,the bandwidth reserved on edge is.Thus,the total bandwidth reserved on in augmentations is given by.Since,it follows that the bandwidth reserved on in is.The lemma follows since the total bandwidth reserved on the edges in augmentations is and.From the above lemma,it follows that the sum of the costs of augmentations is at most.In the follow-ing lemma,we show that for each augmentation in,there exists an augmentation in that protects all the tree edges in and whose cost is within a factor of2of.Lemma3:Let be the edges of an optimal augmentation in that protect a tree edge in.Let be the graph of Definition4:then there is an augmentation that protects edges in in such that.Proof:We show how to use the edges of to identify a collection of edges in that form an augmentation for in,such that.By Lemma1,is a collection of trees(see e.g.,the ex-ample in Figure5.a).Perform a Euler tour on each tree and partition each tour into segments between two nodes in(see Figure5.b).Let be a segment in the Euler tour between vertices and in.Note that corresponds to a path in that does not include any tree edges.Thus,replacing seg-ment with a copy of the shortest path between its endpoints does not affect the2-edge-connectivity between the terminals.So replacing each segment with a copy of the corresponding shortest path in leaves the terminals stillSegments:(a)(b)(A-B) (A-D) (A-E) (B-D) (B-E) (D-E)Fig.5.Example for the first reduction.The forest of is shown in (a)andthe Euler tours to identify the segments are shown in (b)2-edge-connected.Furthermore,if we reserve a bandwidth of on each edge of every shortest path segment,the sum of band-width requirements on all those segments is at most,since each edge ofappears twice in the Euler tours and the bandwidth reserved on each edge of is .Observe that be-cause augmentationcovers all the tree edges in ,the col-lection of shortest path segments also protect all the edges in .Replacing one segment with an edge between its endpoints is equivalent to shrinking a path of degree-two vertices into one edge:once again,this does not affect the 2-edge-connectivitybetween the terminals.So replacing each segmentbe-tween nodesin with the corresponding edge of leaves the terminals still 2-edge-connected.Due to De finition 4,we know that ,the weight of in is equalto the number of edges in.Also,,the set of tree edges for which is a backup edge,consists of all the edges in in the unique path between and in .Thus,the bandwidthrequirement of edge in ,,which can be at most .As a result,,the contribution of edge tois at most the bandwidth requirement of seg-ment,which is equal to times the number of edges in .This yields an augmentation for in ,whosetotal cost is at most.From Lemmas 2and 3above,it follows that there exist aug-mentationsin that protect all edges of and such that.Thus,is an aug-mentation for in whose cost is within a factor of 8of the optimal augmentation for in .Note that,each edgeserves as a backup edge for a tree edge if and only if it serves as a backup edge for in some .Thus,the bandwidth reservedon inis no more than the sum of the bandwidths reserved on it in ,and .We have thus reduced the problem of finding an augmentation for in to that of finding one in ,which is the problem we address in the following ing the algorithm from the next subsection,we will first find an approximate solutionfor an augmentationof in the graph de fined as in De fi-nition 4.We expect this augmentation problem to be easier thanthe original problem,since the edges inbetween vertices of are disjoint,and thus there are no complications arising from path sharing.Let be the approximation factor for this (we willshow later that).Next,we will use this augmentation for to construct an augmentation of in (the original problem).Basically,we will replace each edge in with the correspondingshortest pathbetween nodes and in .Further,each edge inwill be a backup edge for all tree edges in ,the set of edges protected by in .With the help of Lemmas 2and 3,this will give us an approximation factor of.B.Finding an augmentation forIn this section we will show how to obtain a near-optimalsolution to the augmentation problem on .For the sake of brevity,we will only sketch here the main ideas underlying thealgorithm.Recall that,according to De finition 4,consists of tree plus a set of non-tree edges between pairs of vertices in .Further,each non-tree edge has an associatedweight,which is essentially the number of edges in .A non-tree edge can serve as a backup edge for any tree edge in the unique path between and in .Thus,thecost (for CF 2)of an augmentation inis given as whereis a set of non-tree edges in and.Our goal is to compute the augmentation withthe minimum cost.B.1Choosing root for treeBefore presenting our algorithm for computing a near-optimalaugmentation for ,we show that contains a vertexthat satis fies the following property:letbe the sequence of edges in from to any vertex in .Then,.We choose as the root for .Recall from De finition 1that the bandwidth requirement foran edgeis given by .In order to show the above property for node,we construct a directed treefrom by giving a direction to each edge of as follows:If ,then direct the edge towards .If ,then direct the edge towards .If ,then direct the edge towards the component which contains a particular leaf,say,.Clearly,must contain a node whose indegree is 0(other-wise,would contain a cycle)—we choose this node in with no incoming edges as .We show that is indeed unique and satis fies the above-mentioned property using the fol-lowing property ofin the lemma below [5].Lemma 4:Every edge in is directed away from .Proof:Let be an edge in tree such that iscloser tothan in .We show that is directed from to in .Consider the path in from to .We know that the first edge along the path is directed away from。

相关文档
最新文档