214-Finding_Near_Duplicate_Web_Pages_A_Large_Scale_Evaluation_of_Algorithms

合集下载

如何辨别互联网信息的真假英语作文

如何辨别互联网信息的真假英语作文

如何辨别互联网信息的真假英语作文With the rapid development of the internet, it has become increasingly challenging to discern the truth from misinformation online. The spread of fake news has made it more important than ever to carefully evaluate the credibility of the information we come across.随着互联网的迅猛发展,要辨别出网上信息的真伪变得越来越困难。

虚假新闻的传播使得我们在遇到信息时更加需要仔细评估其可信度。

One way to determine the veracity of internet information is to consider the source. Reputable news outlets and established websites are more likely to provide accurate and reliable information. It is essential to check the credibility of the source before accepting the information as factual.判断互联网信息真实性的一种方法是考虑信息来源。

声誉良好的新闻机构和建立起来的网站更有可能提供准确可靠的信息。

在接受信息为事实前,检查信息来源的可信度是至关重要的。

Furthermore, fact-checking websites can be valuable resources in verifying the accuracy of online information. Platforms such asSnopes, , and PolitiFact are dedicated to debunking misinformation and providing users with verified facts. Consulting these websites can help individuals make informed decisions about the credibility of the information they encounter.此外,事实核查网站可以是验证在线信息准确性的宝贵资源。

Internet+and+friendships 高一英语北师大版(2019)必修第二册

 Internet+and+friendships 高一英语北师大版(2019)必修第二册

Read for details
Choose the correct answer according to the passage. 2. Friendships are built on ___________.
A. the basis of trust B. online communication C. online popularity D. the number of likes
General idea
Supporting details
Supporting details
Supporting details
Read for details
Choose the correct answer according to the passage. 1. What enables us to develop lifelong friendships?
A. Communicating through a screen. B. Social skills developed through direct contact. C. Talking with friends face-to-face. D. Advice from some parenting experts.
Read for details
Read the first blog post again and complete the information on the left side of the diagram.
Argument 1
Topic sentence: Firstly, talking online is no replacement for face-to-face contact. Supporting details: Images really cannot replace a real-life smile or hug. Communication through a screen makes it more difficult for children to concentrate or show kindness to others.

路由器设置指南说明书

路由器设置指南说明书

Installation Guideb. Connect an Ethernet cable fromthe access point to the PC (pointA in the illustration).c. Securely insert the other end ofthe cable into the access pointEthernet port (point B in theillustration).d. Connect the power adapter to theaccess point and verify thefollowing:• Power. The Power LED blinkswhen the access point is firstturned on. After a few seconds it should stay on (steady green). If after 30seconds the Power LED is off or is still blinking, check the connectionsand check to see if the power outlet is controlled by a wall switch that isturned off.• ACTIVE. The ACTIVE LED blinks when there is network traffic.• LAN. The LAN LED indicates LAN speeds; green for 1000 Mbps, amberfor 100Mbps, and no light for 10Mbps.• 2.4G Hz (WLAN).This LED indicates 2.4 G Hz traffic.• 5 G Hz (WLAN). This LED indicates 5 G Hz traffic.2. Configure LAN and wireless accessa. From your PC, configure the access point Ethernet port for LAN access.Connect to the access point by opening your browser and enteringhttp://192.168.0.100 in the address field.b. A login window displays. Whenprompted, enter admin for the username and password for thepassword, both in lower caseletters.The access point user interfacedisplays.NETGEAR CableABWNDAP360Ethernetportc. Select Configuration > System > Basic > Genera l from the menu. Fill inthe Access Point Name field and select your Country/Region of operationfrom the drop-down list.d. Select Configuration > IP > IP Settings from the menu and configure theIP settings for your network.e. If you use DHCP, reserve an IP address (based on the access point’s MACaddress) on the DHCP server. You can then use that address to log in tothe access point.f. Select Configuration > Wireless > Basic > Wireless Settings and selectthe Turn Radio On setting.g. Select Configuration > Security > Profile Settings and configure securityprofiles for your network.See the online help or the Reference Manual for full instructions.3. Test wireless connectivity.Using a PC with a wireless adapter, verify that you can establish a wirelessconnection to the access point.Now that you have finished the setup, you are ready to deploy the access pointin your network. If needed, you can reconfigure the PC you used in step 1 backto its original TCP/IP settings.Deploy the Access Point1. Disconnect the access point and position it where you will deploy it. The bestlocation is elevated such as wall or ceiling mounted, at the center of yourwireless coverage area, and within line of sight of all mobile devices.2. Connect an Ethernet cable from your access point to a LAN port on yourrouter, switch, or hub.3. Connect the power adapter to the wireless access point and plug the poweradapter into a power outlet. The Power and LAN LEDs should go on.Tip: The access point supports Power over Ethernet (PoE). If you havea switch that provides PoE, you do not need to use the power adapterto power the access point. This can be especially convenient when theaccess point is installed in a high location far from a power outlet.ProSafe® Dual Band Wireless-N Access Point WNDAP360Package ContentsUnpack the box and verify the contents:• ProSafe® Dual Band Wireless-N Access Point WNDAP360• Straight through Category 5 Ethernet cable• Power adapter and cord (12V, 1A)• Wall mount kit• Installation Guide• Resource CD, which includes link to the Reference ManualSet Up the Access PointFollow these instructions to set up your wireless access point. Before proceeding with the WNDAP360 installation, familiarize yourself with the contents of the Resource CD. See the Reference Manual for instructions on advanced configuration options.Estimated Completion Time: 3 minutes.Tip: Before mounting the access point in a high location, first set upand test the unit to verify wireless network connectivity.1. Connect the wireless access point to your computer.a. Prepare a PC with an Ethernet adapter. If this PC is already part of yournetwork, record its TCP/IP configuration settings. Configure the PC with a static IP address of 192.168.0.210 and 255.255.255.0 as the subnet mask.February 2011This symbol was placed in accordance with the European Union Directive 2002/96 on the Waste Electrical and Electronic Equipment (the WEEE Directive). If disposed of within the European Union, this product should be treated and recycled in accordance with the laws of your jurisdiction implementing the WEEE Directive.©2011 by NETGEAR, Inc. All rights reserved. NETGEAR, the NETGEAR logo, and ProSafe® are registered trademarks of NETGEAR, Inc. in the United States and/or other countries. Other brand and product names aretrademarks or registered trademarks of their respective holders. Information is subject to change without notice.Verify Wireless ConnectivityUsing a computer with an 802.11b/g/n wireless adapter, verify connectivity by using a browser to connect to the Internet, or check for file and printer access on your network.Note: If you cannot connect, see Troubleshooting Tips in this guide or the Reference Manual .If You Use an External AntennaTo use an external 2.4 GHz antenna:1. Mount the accessory antenna(s).2. Attach the antenna(s) to the connector(s) on the access point rear panel.3. Log into the access point and configure it to use the external antenna. Theaccess point cannot use the internal and external 2.4GHz antennas at the same time.Troubleshooting TipsHere are some tips for correcting simple problems you may have.No LEDs are lit on the access point.The wireless access point has no power.• Make sure the power cord is connected to the wireless access point andplugged in to a working power outlet or power strip.• Make sure you are using the correct NETGEAR power adapter supplied withyour wireless access point.• If using PoE, ensure that the PoE switch is providing power to the access point.The LINK/ACT LED is not on.There is a hardware connection problem.• Make sure the cable connectors are securely plugged in to the access point andto the network device (hub, switch, or router).• Make sure the connected device is turned on. If the Ethernet link is a 10 Mbpslink, then the 10/100/1000 light is off, but the Link/Act light blinks if traffic is present.The WLAN LEDs are off.The wireless connection is not working.• If a Wireless LAN activity LED stays off, disconnect the power adapter from itspower source and then plug it in again.• Log in to the access point and verify that the radio is turned on.• Contact NETGEAR if the Wireless LAN LED remains off.I cannot configure the access point from a browser.Check these items:• The access point is correctly installed, it is powered on, and LAN connectionsare OK. Check that the LAN LED is on to verify that the Ethernet connection is OK.• If you are using the Net BIOS name of the access point to connect, ensure thatyour PC and the access point are on the same network segment or that there is a WINS server on your network.• If your PC uses a fixed (static) IP address, ensure that it is using an IP addressin the range of the access point. The access point default IP address is192.168.0.100 and the default subnet mask is 255.255.255.0. The access point default setting is for a static IP address. If the network where you are connecting it is using DHCP, configure it accordingly. See the Reference Manual for details.I cannot access the Internet or the LAN with a wireless capable computer.There is a configuration problem. Check these items:• You might not have restarted the computer with the wireless adapter to haveTCP/IP changes take effect. Restart the computer.• The computer with the wireless adapter might not have the correct TCP/IPsettings to communicate with the network. Restart the computer and check that TCP/IP is set up correctly for that network. The usual setting for Windows on the Network Properties is set to “Obtain an IP address automatically.”• The wireless access point’s default values might not work with your network.Check the wireless access point default configuration against the configuration of other devices in your network.• For full instructions on changing the default values of the wireless access point,see the Reference Manual .Statement of ConditionsIn the interest of improving internal design, operational function, and/operability, NETGEAR reserves the right to make changes to the product described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.Technical SupportThank you for selecting NETGEAR products.After installing your device, locate the serial number on the label of your product and use it to register your product at /register . Registration is required before you can use our telephone support service. Registration via our web site is strongly recommended.Go to for product updates and Web support. ForWarranty and Regional Customer Support information, see the Resource CD that came with your product.For complete DoC please visit the NETGEAR EU Declarations of Conformity website at: /app/answers/detail/a_id/11621/。

Native Instruments MASCHINE MK3 用户手册说明书

Native Instruments MASCHINE MK3 用户手册说明书

The information in this document is subject to change without notice and does not represent a commitment on the part of Native Instruments GmbH. The software described by this docu-ment is subject to a License Agreement and may not be copied to other media. No part of this publication may be copied, reproduced or otherwise transmitted or recorded, for any purpose, without prior written permission by Native Instruments GmbH, hereinafter referred to as Native Instruments.“Native Instruments”, “NI” and associated logos are (registered) trademarks of Native Instru-ments GmbH.ASIO, VST, HALion and Cubase are registered trademarks of Steinberg Media Technologies GmbH.All other product and company names are trademarks™ or registered® trademarks of their re-spective holders. Use of them does not imply any affiliation with or endorsement by them.Document authored by: David Gover and Nico Sidi.Software version: 2.8 (02/2019)Hardware version: MASCHINE MK3Special thanks to the Beta Test Team, who were invaluable not just in tracking down bugs, but in making this a better product.NATIVE INSTRUMENTS GmbH Schlesische Str. 29-30D-10997 Berlin Germanywww.native-instruments.de NATIVE INSTRUMENTS North America, Inc. 6725 Sunset Boulevard5th FloorLos Angeles, CA 90028USANATIVE INSTRUMENTS K.K.YO Building 3FJingumae 6-7-15, Shibuya-ku, Tokyo 150-0001Japanwww.native-instruments.co.jp NATIVE INSTRUMENTS UK Limited 18 Phipp StreetLondon EC2A 4NUUKNATIVE INSTRUMENTS FRANCE SARL 113 Rue Saint-Maur75011 ParisFrance SHENZHEN NATIVE INSTRUMENTS COMPANY Limited 5F, Shenzhen Zimao Center111 Taizi Road, Nanshan District, Shenzhen, GuangdongChina© NATIVE INSTRUMENTS GmbH, 2019. All rights reserved.Table of Contents1Welcome to MASCHINE (25)1.1MASCHINE Documentation (26)1.2Document Conventions (27)1.3New Features in MASCHINE 2.8 (29)1.4New Features in MASCHINE 2.7.10 (31)1.5New Features in MASCHINE 2.7.8 (31)1.6New Features in MASCHINE 2.7.7 (32)1.7New Features in MASCHINE 2.7.4 (33)1.8New Features in MASCHINE 2.7.3 (36)2Quick Reference (38)2.1Using Your Controller (38)2.1.1Controller Modes and Mode Pinning (38)2.1.2Controlling the Software Views from Your Controller (40)2.2MASCHINE Project Overview (43)2.2.1Sound Content (44)2.2.2Arrangement (45)2.3MASCHINE Hardware Overview (48)2.3.1MASCHINE Hardware Overview (48)2.3.1.1Control Section (50)2.3.1.2Edit Section (53)2.3.1.3Performance Section (54)2.3.1.4Group Section (56)2.3.1.5Transport Section (56)2.3.1.6Pad Section (58)2.3.1.7Rear Panel (63)2.4MASCHINE Software Overview (65)2.4.1Header (66)2.4.2Browser (68)2.4.3Arranger (70)2.4.4Control Area (73)2.4.5Pattern Editor (74)3Basic Concepts (76)3.1Important Names and Concepts (76)3.2Adjusting the MASCHINE User Interface (79)3.2.1Adjusting the Size of the Interface (79)3.2.2Switching between Ideas View and Song View (80)3.2.3Showing/Hiding the Browser (81)3.2.4Showing/Hiding the Control Lane (81)3.3Common Operations (82)3.3.1Using the 4-Directional Push Encoder (82)3.3.2Pinning a Mode on the Controller (83)3.3.3Adjusting Volume, Swing, and Tempo (84)3.3.4Undo/Redo (87)3.3.5List Overlay for Selectors (89)3.3.6Zoom and Scroll Overlays (90)3.3.7Focusing on a Group or a Sound (91)3.3.8Switching Between the Master, Group, and Sound Level (96)3.3.9Navigating Channel Properties, Plug-ins, and Parameter Pages in the Control Area.973.3.9.1Extended Navigate Mode on Your Controller (102)3.3.10Navigating the Software Using the Controller (105)3.3.11Using Two or More Hardware Controllers (106)3.3.12Touch Auto-Write Option (108)3.4Native Kontrol Standard (110)3.5Stand-Alone and Plug-in Mode (111)3.5.1Differences between Stand-Alone and Plug-in Mode (112)3.5.2Switching Instances (113)3.5.3Controlling Various Instances with Different Controllers (114)3.6Host Integration (114)3.6.1Setting up Host Integration (115)3.6.1.1Setting up Ableton Live (macOS) (115)3.6.1.2Setting up Ableton Live (Windows) (116)3.6.1.3Setting up Apple Logic Pro X (116)3.6.2Integration with Ableton Live (117)3.6.3Integration with Apple Logic Pro X (119)3.7Preferences (120)3.7.1Preferences – General Page (121)3.7.2Preferences – Audio Page (126)3.7.3Preferences – MIDI Page (130)3.7.4Preferences – Default Page (133)3.7.5Preferences – Library Page (137)3.7.6Preferences – Plug-ins Page (145)3.7.7Preferences – Hardware Page (150)3.7.8Preferences – Colors Page (154)3.8Integrating MASCHINE into a MIDI Setup (156)3.8.1Connecting External MIDI Equipment (156)3.8.2Sync to External MIDI Clock (157)3.8.3Send MIDI Clock (158)3.9Syncing MASCHINE using Ableton Link (159)3.9.1Connecting to a Network (159)3.9.2Joining and Leaving a Link Session (159)3.10Using a Pedal with the MASCHINE Controller (160)3.11File Management on the MASCHINE Controller (161)4Browser (163)4.1Browser Basics (163)4.1.1The MASCHINE Library (163)4.1.2Browsing the Library vs. Browsing Your Hard Disks (164)4.2Searching and Loading Files from the Library (165)4.2.1Overview of the Library Pane (165)4.2.2Selecting or Loading a Product and Selecting a Bank from the Browser (170)4.2.2.1[MK3] Browsing by Product Category Using the Controller (174)4.2.2.2[MK3] Browsing by Product Vendor Using the Controller (174)4.2.3Selecting a Product Category, a Product, a Bank, and a Sub-Bank (175)4.2.3.1Selecting a Product Category, a Product, a Bank, and a Sub-Bank on theController (179)4.2.4Selecting a File Type (180)4.2.5Choosing Between Factory and User Content (181)4.2.6Selecting Type and Character Tags (182)4.2.7List and Tag Overlays in the Browser (186)4.2.8Performing a Text Search (188)4.2.9Loading a File from the Result List (188)4.3Additional Browsing Tools (193)4.3.1Loading the Selected Files Automatically (193)4.3.2Auditioning Instrument Presets (195)4.3.3Auditioning Samples (196)4.3.4Loading Groups with Patterns (197)4.3.5Loading Groups with Routing (198)4.3.6Displaying File Information (198)4.4Using Favorites in the Browser (199)4.5Editing the Files’ Tags and Properties (203)4.5.1Attribute Editor Basics (203)4.5.2The Bank Page (205)4.5.3The Types and Characters Pages (205)4.5.4The Properties Page (208)4.6Loading and Importing Files from Your File System (209)4.6.1Overview of the FILES Pane (209)4.6.2Using Favorites (211)4.6.3Using the Location Bar (212)4.6.4Navigating to Recent Locations (213)4.6.5Using the Result List (214)4.6.6Importing Files to the MASCHINE Library (217)4.7Locating Missing Samples (219)4.8Using Quick Browse (221)5Managing Sounds, Groups, and Your Project (225)5.1Overview of the Sounds, Groups, and Master (225)5.1.1The Sound, Group, and Master Channels (226)5.1.2Similarities and Differences in Handling Sounds and Groups (227)5.1.3Selecting Multiple Sounds or Groups (228)5.2Managing Sounds (233)5.2.1Loading Sounds (235)5.2.2Pre-listening to Sounds (236)5.2.3Renaming Sound Slots (237)5.2.4Changing the Sound’s Color (237)5.2.5Saving Sounds (239)5.2.6Copying and Pasting Sounds (241)5.2.7Moving Sounds (244)5.2.8Resetting Sound Slots (245)5.3Managing Groups (247)5.3.1Creating Groups (248)5.3.2Loading Groups (249)5.3.3Renaming Groups (251)5.3.4Changing the Group’s Color (251)5.3.5Saving Groups (253)5.3.6Copying and Pasting Groups (255)5.3.7Reordering Groups (258)5.3.8Deleting Groups (259)5.4Exporting MASCHINE Objects and Audio (260)5.4.1Saving a Group with its Samples (261)5.4.2Saving a Project with its Samples (262)5.4.3Exporting Audio (264)5.5Importing Third-Party File Formats (270)5.5.1Loading REX Files into Sound Slots (270)5.5.2Importing MPC Programs to Groups (271)6Playing on the Controller (275)6.1Adjusting the Pads (275)6.1.1The Pad View in the Software (275)6.1.2Choosing a Pad Input Mode (277)6.1.3Adjusting the Base Key (280)6.1.4Using Choke Groups (282)6.1.5Using Link Groups (284)6.2Adjusting the Key, Choke, and Link Parameters for Multiple Sounds (286)6.3Playing Tools (287)6.3.1Mute and Solo (288)6.3.2Choke All Notes (292)6.3.3Groove (293)6.3.4Level, Tempo, Tune, and Groove Shortcuts on Your Controller (295)6.3.5Tap Tempo (299)6.4Performance Features (300)6.4.1Overview of the Perform Features (300)6.4.2Selecting a Scale and Creating Chords (303)6.4.3Scale and Chord Parameters (303)6.4.4Creating Arpeggios and Repeated Notes (316)6.4.5Swing on Note Repeat / Arp Output (321)6.5Using Lock Snapshots (322)6.5.1Creating a Lock Snapshot (322)6.5.2Using Extended Lock (323)6.5.3Updating a Lock Snapshot (323)6.5.4Recalling a Lock Snapshot (324)6.5.5Morphing Between Lock Snapshots (324)6.5.6Deleting a Lock Snapshot (325)6.5.7Triggering Lock Snapshots via MIDI (326)6.6Using the Smart Strip (327)6.6.1Pitch Mode (328)6.6.2Modulation Mode (328)6.6.3Perform Mode (328)6.6.4Notes Mode (329)7Working with Plug-ins (330)7.1Plug-in Overview (330)7.1.1Plug-in Basics (330)7.1.2First Plug-in Slot of Sounds: Choosing the Sound’s Role (334)7.1.3Loading, Removing, and Replacing a Plug-in (335)7.1.3.1Browser Plug-in Slot Selection (341)7.1.4Adjusting the Plug-in Parameters (344)7.1.5Bypassing Plug-in Slots (344)7.1.6Using Side-Chain (346)7.1.7Moving Plug-ins (346)7.1.8Alternative: the Plug-in Strip (348)7.1.9Saving and Recalling Plug-in Presets (348)7.1.9.1Saving Plug-in Presets (349)7.1.9.2Recalling Plug-in Presets (350)7.1.9.3Removing a Default Plug-in Preset (351)7.2The Sampler Plug-in (352)7.2.1Page 1: Voice Settings / Engine (354)7.2.2Page 2: Pitch / Envelope (356)7.2.3Page 3: FX / Filter (359)7.2.4Page 4: Modulation (361)7.2.5Page 5: LFO (363)7.2.6Page 6: Velocity / Modwheel (365)7.3Using Native Instruments and External Plug-ins (367)7.3.1Opening/Closing Plug-in Windows (367)7.3.2Using the VST/AU Plug-in Parameters (370)7.3.3Setting Up Your Own Parameter Pages (371)7.3.4Using VST/AU Plug-in Presets (376)7.3.5Multiple-Output Plug-ins and Multitimbral Plug-ins (378)8Using the Audio Plug-in (380)8.1Loading a Loop into the Audio Plug-in (384)8.2Editing Audio in the Audio Plug-in (385)8.3Using Loop Mode (386)8.4Using Gate Mode (388)9Using the Drumsynths (390)9.1Drumsynths – General Handling (391)9.1.1Engines: Many Different Drums per Drumsynth (391)9.1.2Common Parameter Organization (391)9.1.3Shared Parameters (394)9.1.4Various Velocity Responses (394)9.1.5Pitch Range, Tuning, and MIDI Notes (394)9.2The Kicks (395)9.2.1Kick – Sub (397)9.2.2Kick – Tronic (399)9.2.3Kick – Dusty (402)9.2.4Kick – Grit (403)9.2.5Kick – Rasper (406)9.2.6Kick – Snappy (407)9.2.7Kick – Bold (409)9.2.8Kick – Maple (411)9.2.9Kick – Push (412)9.3The Snares (414)9.3.1Snare – Volt (416)9.3.2Snare – Bit (418)9.3.3Snare – Pow (420)9.3.4Snare – Sharp (421)9.3.5Snare – Airy (423)9.3.6Snare – Vintage (425)9.3.7Snare – Chrome (427)9.3.8Snare – Iron (429)9.3.9Snare – Clap (431)9.3.10Snare – Breaker (433)9.4The Hi-hats (435)9.4.1Hi-hat – Silver (436)9.4.2Hi-hat – Circuit (438)9.4.3Hi-hat – Memory (440)9.4.4Hi-hat – Hybrid (442)9.4.5Creating a Pattern with Closed and Open Hi-hats (444)9.5The Toms (445)9.5.1Tom – Tronic (447)9.5.2Tom – Fractal (449)9.5.3Tom – Floor (453)9.5.4Tom – High (455)9.6The Percussions (456)9.6.1Percussion – Fractal (458)9.6.2Percussion – Kettle (461)9.6.3Percussion – Shaker (463)9.7The Cymbals (467)9.7.1Cymbal – Crash (469)9.7.2Cymbal – Ride (471)10Using the Bass Synth (474)10.1Bass Synth – General Handling (475)10.1.1Parameter Organization (475)10.1.2Bass Synth Parameters (477)11Working with Patterns (479)11.1Pattern Basics (479)11.1.1Pattern Editor Overview (480)11.1.2Navigating the Event Area (486)11.1.3Following the Playback Position in the Pattern (488)11.1.4Jumping to Another Playback Position in the Pattern (489)11.1.5Group View and Keyboard View (491)11.1.6Adjusting the Arrange Grid and the Pattern Length (493)11.1.7Adjusting the Step Grid and the Nudge Grid (497)11.2Recording Patterns in Real Time (501)11.2.1Recording Your Patterns Live (501)11.2.2The Record Prepare Mode (504)11.2.3Using the Metronome (505)11.2.4Recording with Count-in (506)11.2.5Quantizing while Recording (508)11.3Recording Patterns with the Step Sequencer (508)11.3.1Step Mode Basics (508)11.3.2Editing Events in Step Mode (511)11.3.3Recording Modulation in Step Mode (513)11.4Editing Events (514)11.4.1Editing Events with the Mouse: an Overview (514)11.4.2Creating Events/Notes (517)11.4.3Selecting Events/Notes (518)11.4.4Editing Selected Events/Notes (526)11.4.5Deleting Events/Notes (532)11.4.6Cut, Copy, and Paste Events/Notes (535)11.4.7Quantizing Events/Notes (538)11.4.8Quantization While Playing (540)11.4.9Doubling a Pattern (541)11.4.10Adding Variation to Patterns (541)11.5Recording and Editing Modulation (546)11.5.1Which Parameters Are Modulatable? (547)11.5.2Recording Modulation (548)11.5.3Creating and Editing Modulation in the Control Lane (550)11.6Creating MIDI Tracks from Scratch in MASCHINE (555)11.7Managing Patterns (557)11.7.1The Pattern Manager and Pattern Mode (558)11.7.2Selecting Patterns and Pattern Banks (560)11.7.3Creating Patterns (563)11.7.4Deleting Patterns (565)11.7.5Creating and Deleting Pattern Banks (566)11.7.6Naming Patterns (568)11.7.7Changing the Pattern’s Color (570)11.7.8Duplicating, Copying, and Pasting Patterns (571)11.7.9Moving Patterns (574)11.7.10Adjusting Pattern Length in Fine Increments (575)11.8Importing/Exporting Audio and MIDI to/from Patterns (576)11.8.1Exporting Audio from Patterns (576)11.8.2Exporting MIDI from Patterns (577)11.8.3Importing MIDI to Patterns (580)12Audio Routing, Remote Control, and Macro Controls (589)12.1Audio Routing in MASCHINE (590)12.1.1Sending External Audio to Sounds (591)12.1.2Configuring the Main Output of Sounds and Groups (596)12.1.3Setting Up Auxiliary Outputs for Sounds and Groups (601)12.1.4Configuring the Master and Cue Outputs of MASCHINE (605)12.1.5Mono Audio Inputs (610)12.1.5.1Configuring External Inputs for Sounds in Mix View (611)12.2Using MIDI Control and Host Automation (614)12.2.1Triggering Sounds via MIDI Notes (615)12.2.2Triggering Scenes via MIDI (622)12.2.3Controlling Parameters via MIDI and Host Automation (623)12.2.4Selecting VST/AU Plug-in Presets via MIDI Program Change (631)12.2.5Sending MIDI from Sounds (632)12.3Creating Custom Sets of Parameters with the Macro Controls (636)12.3.1Macro Control Overview (637)12.3.2Assigning Macro Controls Using the Software (638)12.3.3Assigning Macro Controls Using the Controller (644)13Controlling Your Mix (646)13.1Mix View Basics (646)13.1.1Switching between Arrange View and Mix View (646)13.1.2Mix View Elements (647)13.2The Mixer (649)13.2.1Displaying Groups vs. Displaying Sounds (650)13.2.2Adjusting the Mixer Layout (652)13.2.3Selecting Channel Strips (653)13.2.4Managing Your Channels in the Mixer (654)13.2.5Adjusting Settings in the Channel Strips (656)13.2.6Using the Cue Bus (660)13.3The Plug-in Chain (662)13.4The Plug-in Strip (663)13.4.1The Plug-in Header (665)13.4.2Panels for Drumsynths and Internal Effects (667)13.4.3Panel for the Sampler (668)13.4.4Custom Panels for Native Instruments Plug-ins (671)13.4.5Undocking a Plug-in Panel (Native Instruments and External Plug-ins Only) (675)13.5Controlling Your Mix from the Controller (677)13.5.1Navigating Your Channels in Mix Mode (678)13.5.2Adjusting the Level and Pan in Mix Mode (679)13.5.3Mute and Solo in Mix Mode (680)13.5.4Plug-in Icons in Mix Mode (680)14Using Effects (681)14.1Applying Effects to a Sound, a Group or the Master (681)14.1.1Adding an Effect (681)14.1.2Other Operations on Effects (690)14.1.3Using the Side-Chain Input (692)14.2Applying Effects to External Audio (695)14.2.1Step 1: Configure MASCHINE Audio Inputs (695)14.2.2Step 2: Set up a Sound to Receive the External Input (698)14.2.3Step 3: Load an Effect to Process an Input (700)14.3Creating a Send Effect (701)14.3.1Step 1: Set Up a Sound or Group as Send Effect (702)14.3.2Step 2: Route Audio to the Send Effect (706)14.3.3 A Few Notes on Send Effects (708)14.4Creating Multi-Effects (709)15Effect Reference (712)15.1Dynamics (713)15.1.1Compressor (713)15.1.2Gate (717)15.1.3Transient Master (721)15.1.4Limiter (723)15.1.5Maximizer (727)15.2Filtering Effects (730)15.2.1EQ (730)15.2.2Filter (733)15.2.3Cabinet (737)15.3Modulation Effects (738)15.3.1Chorus (738)15.3.2Flanger (740)15.3.3FM (742)15.3.4Freq Shifter (743)15.3.5Phaser (745)15.4Spatial and Reverb Effects (747)15.4.1Ice (747)15.4.2Metaverb (749)15.4.3Reflex (750)15.4.4Reverb (Legacy) (752)15.4.5Reverb (754)15.4.5.1Reverb Room (754)15.4.5.2Reverb Hall (757)15.4.5.3Plate Reverb (760)15.5Delays (762)15.5.1Beat Delay (762)15.5.2Grain Delay (765)15.5.3Grain Stretch (767)15.5.4Resochord (769)15.6Distortion Effects (771)15.6.1Distortion (771)15.6.2Lofi (774)15.6.3Saturator (775)15.7Perform FX (779)15.7.1Filter (780)15.7.2Flanger (782)15.7.3Burst Echo (785)15.7.4Reso Echo (787)15.7.5Ring (790)15.7.6Stutter (792)15.7.7Tremolo (795)15.7.8Scratcher (798)16Working with the Arranger (801)16.1Arranger Basics (801)16.1.1Navigating Song View (804)16.1.2Following the Playback Position in Your Project (806)16.1.3Performing with Scenes and Sections using the Pads (807)16.2Using Ideas View (811)16.2.1Scene Overview (811)16.2.2Creating Scenes (813)16.2.3Assigning and Removing Patterns (813)16.2.4Selecting Scenes (817)16.2.5Deleting Scenes (818)16.2.6Creating and Deleting Scene Banks (820)16.2.7Clearing Scenes (820)16.2.8Duplicating Scenes (821)16.2.9Reordering Scenes (822)16.2.10Making Scenes Unique (824)16.2.11Appending Scenes to Arrangement (825)16.2.12Naming Scenes (826)16.2.13Changing the Color of a Scene (827)16.3Using Song View (828)16.3.1Section Management Overview (828)16.3.2Creating Sections (833)16.3.3Assigning a Scene to a Section (834)16.3.4Selecting Sections and Section Banks (835)16.3.5Reorganizing Sections (839)16.3.6Adjusting the Length of a Section (840)16.3.6.1Adjusting the Length of a Section Using the Software (841)16.3.6.2Adjusting the Length of a Section Using the Controller (843)16.3.7Clearing a Pattern in Song View (843)16.3.8Duplicating Sections (844)16.3.8.1Making Sections Unique (845)16.3.9Removing Sections (846)16.3.10Renaming Scenes (848)16.3.11Clearing Sections (849)16.3.12Creating and Deleting Section Banks (850)16.3.13Working with Patterns in Song view (850)16.3.13.1Creating a Pattern in Song View (850)16.3.13.2Selecting a Pattern in Song View (850)16.3.13.3Clearing a Pattern in Song View (851)16.3.13.4Renaming a Pattern in Song View (851)16.3.13.5Coloring a Pattern in Song View (851)16.3.13.6Removing a Pattern in Song View (852)16.3.13.7Duplicating a Pattern in Song View (852)16.3.14Enabling Auto Length (852)16.3.15Looping (853)16.3.15.1Setting the Loop Range in the Software (854)16.4Playing with Sections (855)16.4.1Jumping to another Playback Position in Your Project (855)16.5Triggering Sections or Scenes via MIDI (856)16.6The Arrange Grid (858)16.7Quick Grid (860)17Sampling and Sample Mapping (862)17.1Opening the Sample Editor (862)17.2Recording Audio (863)17.2.1Opening the Record Page (863)17.2.2Selecting the Source and the Recording Mode (865)17.2.3Arming, Starting, and Stopping the Recording (868)17.2.5Using the Footswitch for Recording Audio (871)17.2.6Checking Your Recordings (872)17.2.7Location and Name of Your Recorded Samples (876)17.3Editing a Sample (876)17.3.1Using the Edit Page (877)17.3.2Audio Editing Functions (882)17.4Slicing a Sample (890)17.4.1Opening the Slice Page (891)17.4.2Adjusting the Slicing Settings (893)17.4.3Live Slicing (898)17.4.3.1Live Slicing Using the Controller (898)17.4.3.2Delete All Slices (899)17.4.4Manually Adjusting Your Slices (899)17.4.5Applying the Slicing (906)17.5Mapping Samples to Zones (912)17.5.1Opening the Zone Page (912)17.5.2Zone Page Overview (913)17.5.3Selecting and Managing Zones in the Zone List (915)17.5.4Selecting and Editing Zones in the Map View (920)17.5.5Editing Zones in the Sample View (924)17.5.6Adjusting the Zone Settings (927)17.5.7Adding Samples to the Sample Map (934)18Appendix: Tips for Playing Live (937)18.1Preparations (937)18.1.1Focus on the Hardware (937)18.1.2Customize the Pads of the Hardware (937)18.1.3Check Your CPU Power Before Playing (937)18.1.4Name and Color Your Groups, Patterns, Sounds and Scenes (938)18.1.5Consider Using a Limiter on Your Master (938)18.1.6Hook Up Your Other Gear and Sync It with MIDI Clock (938)18.1.7Improvise (938)18.2Basic Techniques (938)18.2.1Use Mute and Solo (938)18.2.2Use Scene Mode and Tweak the Loop Range (939)18.2.3Create Variations of Your Drum Patterns in the Step Sequencer (939)18.2.4Use Note Repeat (939)18.2.5Set Up Your Own Multi-effect Groups and Automate Them (939)18.3Special Tricks (940)18.3.1Changing Pattern Length for Variation (940)18.3.2Using Loops to Cycle Through Samples (940)18.3.3Using Loops to Cycle Through Samples (940)18.3.4Load Long Audio Files and Play with the Start Point (940)19Troubleshooting (941)19.1Knowledge Base (941)19.2Technical Support (941)19.3Registration Support (942)19.4User Forum (942)20Glossary (943)Index (951)1Welcome to MASCHINEThank you for buying MASCHINE!MASCHINE is a groove production studio that implements the familiar working style of classi-cal groove boxes along with the advantages of a computer based system. MASCHINE is ideal for making music live, as well as in the studio. It’s the hands-on aspect of a dedicated instru-ment, the MASCHINE hardware controller, united with the advanced editing features of the MASCHINE software.Creating beats is often not very intuitive with a computer, but using the MASCHINE hardware controller to do it makes it easy and fun. You can tap in freely with the pads or use Note Re-peat to jam along. Alternatively, build your beats using the step sequencer just as in classic drum machines.Patterns can be intuitively combined and rearranged on the fly to form larger ideas. You can try out several different versions of a song without ever having to stop the music.Since you can integrate it into any sequencer that supports VST, AU, or AAX plug-ins, you can reap the benefits in almost any software setup, or use it as a stand-alone application. You can sample your own material, slice loops and rearrange them easily.However, MASCHINE is a lot more than an ordinary groovebox or sampler: it comes with an inspiring 7-gigabyte library, and a sophisticated, yet easy to use tag-based Browser to give you instant access to the sounds you are looking for.What’s more, MASCHINE provides lots of options for manipulating your sounds via internal ef-fects and other sound-shaping possibilities. You can also control external MIDI hardware and 3rd-party software with the MASCHINE hardware controller, while customizing the functions of the pads, knobs and buttons according to your needs utilizing the included Controller Editor application. We hope you enjoy this fantastic instrument as much as we do. Now let’s get go-ing!—The MASCHINE team at Native Instruments.MASCHINE Documentation1.1MASCHINE DocumentationNative Instruments provide many information sources regarding MASCHINE. The main docu-ments should be read in the following sequence:1.MASCHINE Getting Started: This document provides a practical approach to MASCHINE viaa set of tutorials covering easy and more advanced tasks in order to help you familiarizeyourself with MASCHINE.2.MASCHINE Manual (this document): The MASCHINE Manual provides you with a compre-hensive description of all MASCHINE software and hardware features.Additional documentation sources provide you with details on more specific topics:▪Controller Editor Manual: Besides using your MASCHINE hardware controller together withits dedicated MASCHINE software, you can also use it as a powerful and highly versatileMIDI controller to pilot any other MIDI-capable application or device. This is made possibleby the Controller Editor software, an application that allows you to precisely define all MIDIassignments for your MASCHINE controller. The Controller Editor was installed during theMASCHINE installation procedure. For more information on this, please refer to the Con-troller Editor Manual available as a PDF file via the Help menu of Controller Editor.▪Online Support Videos: You can find a number of support videos on The Official Native In-struments Support Channel under the following URL: https:///NIsupport-EN. We recommend that you follow along with these instructions while the respective ap-plication is running on your computer.Other Online Resources:If you are experiencing problems related to your Native Instruments product that the supplied documentation does not cover, there are several ways of getting help:▪Knowledge Base▪User Forum▪Technical Support▪Registration SupportYou will find more information on these subjects in the chapter Troubleshooting.1.2Document ConventionsThis section introduces you to the signage and text highlighting used in this manual. This man-ual uses particular formatting to point out special facts and to warn you of potential issues. The icons introducing these notes let you see what kind of information is to be expected:This document uses particular formatting to point out special facts and to warn you of poten-tial issues. The icons introducing the following notes let you see what kind of information can be expected:Furthermore, the following formatting is used:▪Text appearing in (drop-down) menus (such as Open…, Save as… etc.) in the software and paths to locations on your hard disk or other storage devices is printed in italics.▪Text appearing elsewhere (labels of buttons, controls, text next to checkboxes etc.) in the software is printed in blue. Whenever you see this formatting applied, you will find the same text appearing somewhere on the screen.▪Text appearing on the displays of the controller is printed in light grey. Whenever you see this formatting applied, you will find the same text on a controller display.▪Text appearing on labels of the hardware controller is printed in orange. Whenever you see this formatting applied, you will find the same text on the controller.▪Important names and concepts are printed in bold.▪References to keys on your computer’s keyboard you’ll find put in square brackets (e.g.,“Press [Shift] + [Enter]”).►Single instructions are introduced by this play button type arrow.→Results of actions are introduced by this smaller arrow.Naming ConventionThroughout the documentation we will refer to MASCHINE controller (or just controller) as the hardware controller and MASCHINE software as the software installed on your computer.The term “effect” will sometimes be abbreviated as “FX” when referring to elements in the MA-SCHINE software and hardware. These terms have the same meaning.Button Combinations and Shortcuts on Your ControllerMost instructions will use the “+” sign to indicate buttons (or buttons and pads) that must be pressed simultaneously, starting with the button indicated first. E.g., an instruction such as:“Press SHIFT + PLAY”means:1.Press and hold SHIFT.2.While holding SHIFT, press PLAY and release it.3.Release SHIFT.Unlabeled Buttons on the ControllerThe buttons and knobs above and below the displays on your MASCHINE controller do not have labels.。

duplicate file detective 密钥 -回复

duplicate file detective 密钥 -回复

duplicate file detective 密钥-回复如何获取、安装和使用Duplicate File Detective的密钥。

Duplicate File Detective是一款功能强大的文件重复检测工具,它可以帮助用户找出电脑或其他存储设备上重复的文件,从而节省存储空间并提高文件管理效率。

在使用Duplicate File Detective之前,我们需要获取并安装相应的密钥。

下面将一步一步回答如何获取、安装和使用Duplicate File Detective的密钥。

第一步,找到合适的来源要获取Duplicate File Detective的密钥,我们需要找到一个可靠的来源。

官方网站是最可靠的选择,我们可以通过搜索引擎查找Duplicate File Detective官方网站并进入官方网站。

第二步,在官方网站查找密钥一旦进入官方网站,我们需要找到与密钥相关的信息。

通常,这些信息会在产品页面的下载或支持部分列出。

我们可以点击相应的链接,查看更多详细信息。

第三步,获取密钥在获取密钥之前,我们可能需要提供一些必要的信息,如邮箱地址、姓名等。

这些信息通常用于注册和验证。

一旦我们提供了所需的信息,我们可以点击获取密钥或类似的按钮,等待系统生成并发送密钥到我们的注册邮箱。

第四步,下载并安装Duplicate File Detective一旦我们获得了密钥,我们可以返回官方网站并下载Duplicate File Detective的安装程序。

在下载过程中,我们可能需要选择适用于我们的操作系统的版本,并确保我们的系统满足最低系统要求。

下载完成后,我们可以运行安装程序。

在安装过程中,我们可能需要接受许可协议并选择安装选项,如目标文件夹和快捷方式等。

一旦安装程序完成,我们就可以运行Duplicate File Detective。

第五步,输入密钥并注册应用程序运行Duplicate File Detective后,我们将看到一个注册或输入密钥的界面。

在网络上查找信息英语作文

在网络上查找信息英语作文

在网络上查找信息英语作文In the age of information technology, the internet has become an indispensable tool for people to search for information. With just a few clicks, we can access a vast amount of information on any topic we are interested in. In this essay, we will explore the benefits and drawbacks of using the internet to search for information.One of the main advantages of searching for information on the internet is the convenience it offers. Unlike traditional methods of research, such as going to the library or consulting experts, the internet allows us to access information from the comfort of our own homes. We can search for information at any time of the day or night, without having to worry about opening hours or travel time. This convenience has revolutionized the way we gather information and has made research much more accessible to people all over the world.Another benefit of using the internet to search forinformation is the speed at which we can find what we are looking for. With search engines like Google, we can quickly locate relevant information on any topic, saving us valuable time that would have been spent sifting through books or journals. This speed and efficiency make the internet an invaluable resource for students, researchers, and professionals who need to find information quickly and accurately.However, there are also drawbacks to relying on the internet for information. One of the main concerns is the reliability of the information we find online. With therise of fake news and misinformation, it can be difficult to determine the credibility of sources on the internet. It is important to critically evaluate the information we find and cross-reference it with other sources to ensure its accuracy and reliability.Another drawback of using the internet to search for information is the overwhelming amount of information available. With so much information at our fingertips, it can be easy to get lost in a sea of data and struggle tofind what we are looking for. This information overload can lead to confusion and frustration, making it difficult to sift through the noise and find the relevant information we need.In conclusion, while the internet has revolutionized the way we search for information, it is important to approach online research with caution. By critically evaluating the information we find and cross-referencing it with other sources, we can ensure that we are accessing accurate and reliable information. The convenience and speed of the internet make it an invaluable tool for research, but we must also be mindful of the drawbacks and challenges that come with using the internet as a source of information.。

我在网上寻找答案的专栏英语作文

我在网上寻找答案的专栏英语作文

我在网上寻找答案的专栏英语作文In today's digital age, the internet has become an indispensable tool for seeking answers to a wide range of questions. Whether it's finding a recipe for a new dish, learning about a historical event, or understanding complex scientific concepts, the internet offers a plethora of information at our fingertips. One of the most popular ways to find answers online is through specialized columns or forums that are dedicated to providing insightful and well-researched responses to users' queries. In this essay, we will explore the phenomenon of seeking answers through online columns, examining its historical background, analyzing different perspectives, and offering a critical evaluation of its benefits and drawbacks.The concept of seeking answers through specialized columns on the internet has its roots in the early days of online forums and bulletin board systems. As the internet evolved, so did the way people sought information and advice. Whatstarted as simple text-based forums has now transformed into sophisticated platforms with dedicated experts and contributors offering in-depth responses to a wide array of questions. This evolution has been driven by the increasing demand for reliable and accessible information, as well as the desire for personalized and expert insights.One of the key historical developments related to this topic is the rise of platforms such as Quora, Reddit, and specialized websites and blogs that cater to specific areas of expertise. These platforms have revolutionized the way people seek answers online, providing a space for individuals to ask questions and receive responses from a diverse range of contributors, including experts in various fields. This has democratized the process of seeking information, allowing individuals to access insights and knowledge that may have been previously inaccessible.From a societal perspective, seeking answers through online columns has both positive and negative implications. On one hand, it provides a valuable resource for individuals seeking information on diverse topics, ranging from academicqueries to practical advice on everyday issues. The accessibility of these platforms means that individuals can benefit from a wide range of perspectives and expertise, leading to a more informed and empowered society. Additionally, the interactive nature of these platforms fosters a sense of community and collaboration, as users can engage in discussions and share their own insights and experiences.However, there are also drawbacks to consider. The democratization of information means that not all responses are equally reliable or accurate. In some cases, misinformation and unsubstantiated claims can spread rapidly, leading to confusion and misinterpretation of facts. Additionally, the anonymity of online platforms can lead to the proliferation of biased or unqualified opinions, potentially undermining the credibility of the information being shared. As such, it is crucial for individuals to approach online columns with a critical mindset, evaluating the credibility of the sources and cross-referencing information when necessary.To illustrate the impact of seeking answers through online columns, let's consider a case study of a student researching a complex scientific concept. In the past, the student may have been limited to consulting textbooks or academic journals for information. However, with the advent of online columns and forums, the student now has access to a wealth of perspectives and explanations from experts and enthusiasts in the field. This not only enriches the student's understanding but also fosters a sense of curiosity and engagement with the subject matter.In evaluating the benefits and drawbacks of seeking answers through online columns, it is important to recognize the potential for both positive and negative outcomes. On one hand, the accessibility and diversity of perspectives can enhance the quality of information available to individuals. On the other hand, the proliferation of misinformation and biased opinions can erode the trustworthiness of online platforms. As such, it is imperative for users to approach onlinecolumns with a discerning eye, critically evaluating the sources and corroborating information when necessary.Looking to the future, it is clear that seeking answers through online columns will continue to play a significant role in how individuals access information and expertise. As technology advances and new platforms emerge, there will be an increasing emphasis on promoting transparency and credibility in online content. This may involve the development of verification systems and quality control measures to ensure that users can rely on the information they find. Additionally, there may be a greater emphasis on fostering a sense of community andcollaboration within online platforms, encouraging users to engage in constructive dialogue and knowledge sharing.In conclusion, seeking answers through online columns has become an integral part of how individuals access information and expertise in the digital age. From its historical roots in early online forums to the diverse and interactive platforms of today, the evolution of online columns has transformed the way people seek answers to their questions. While there are clear benefits in terms of accessibility and diversity of perspectives, there are also challenges related to the credibility and reliability of the information shared. As we look to the future, it is essential to prioritize transparency and collaboration in online platforms, ensuring that individuals can access reliable and well-informed responses to their queries. By doing so, we can harness the full potential of online columns as a valuable resource for knowledge and insight.。

vistanita duplicate finder密钥 -回复

vistanita duplicate finder密钥 -回复

vistanita duplicate finder密钥-回复如何获取Vistanita Duplicate Finder的密钥。

第一步:了解Vistanita Duplicate FinderVistanita Duplicate Finder是一款功能强大的重复文件查找工具,可以帮助用户快速扫描计算机中的重复文件,并提供删除或移动这些文件的选项。

该软件简单易用,可以提高您电脑的整体性能,节省大量的存储空间。

第二步:下载Vistanita Duplicate Finder在您决定获取Vistanita Duplicate Finder的密钥之前,首先需要下载该软件。

您可以通过访问Vistanita Duplicate Finder的官方网站或其他可信的软件下载网站来下载安装程序。

第三步:安装Vistanita Duplicate Finder下载完成后,双击安装程序并按照提示进行安装。

这个过程通常很简单,只需点击“下一步”并接受许可协议即可完成安装。

第四步:运行Vistanita Duplicate Finder安装完成后,您可以在桌面或开始菜单中找到Vistanita Duplicate Finder的快捷方式。

双击该图标以运行该程序。

第五步:注册Vistanita Duplicate Finder当您首次运行Vistanita Duplicate Finder时,您将看到一个注册界面。

在这里,您需要输入注册信息以获取软件的完整功能和访问权限。

要获取Vistanita Duplicate Finder的密钥,您有几个选择:1. 购买正版密钥:访问Vistanita Duplicate Finder的官方网站,并按照购买流程购买正版密钥,以获取完整的使用权限和技术支持。

一旦您完成购买,您将收到一封含有密钥的电子邮件。

2. 使用试用版密钥:如果您不确定是否要购买Vistanita Duplicate Finder,也可以选择使用试用版密钥。

关于旅行的作文英语

关于旅行的作文英语

Travelling is an enriching experience that broadens ones horizons and provides a wealth of memories.Here are some key elements to include when writing an essay about travel:1.Introduction:Start by introducing the topic of travel and its importance in personal growth and cultural understanding.Mention why you enjoy traveling or why you chose the specific destination you are writing about.2.Destination Selection:Explain how you chose your travel destination.Was it a dream location,a place of historical significance,or somewhere youve always wanted to explore?3.Preparation:Describe the preparations you made for the trip.This could include researching the culture,learning basic phrases in the local language,packing essentials, and planning your itinerary.4.Cultural Experiences:Discuss the cultural experiences you had during your travels. This might involve trying local cuisine,attending traditional festivals,or visiting historical sites.5.Adventures and Excursions:Narrate any adventures or excursions you went on.Were there any hikes,boat trips,or city tours that stood out?Describe the sights,sounds,and feelings associated with these experiences.6.Challenges Faced:Every trip has its challenges,whether its language barriers,getting lost,or dealing with unexpected weather.Discuss how you overcame these challenges and what you learned from them.7.Personal Growth:Reflect on how the trip contributed to your personal growth.Did you gain new perspectives,learn to be more adaptable,or develop a deeper appreciation for other cultures?8.Memorable Moments:Share some of the most memorable moments from your trip. These could be interactions with locals,breathtaking views,or unique experiences that made the trip unforgettable.9.Conclusion:Conclude your essay by summarizing the key points and expressing your overall thoughts on the travel experience.Discuss whether it met your expectations and how it has influenced your desire to travel more.10.Recommendations:End with any recommendations for others who might be planninga similar trip.Include tips on what to see,do,and avoid based on your personal experience.Remember to use descriptive language to paint a vivid picture of your travel experiences for your readers.Personal anecdotes and reflections will make your essay more engaging and relatable.。

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)

3GPP TS 36.331 V13.2.0 (2016-06)Technical Specification3rd Generation Partnership Project;Technical Specification Group Radio Access Network;Evolved Universal Terrestrial Radio Access (E-UTRA);Radio Resource Control (RRC);Protocol specification(Release 13)The present document has been developed within the 3rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented.This Specification is provided for future development work within 3GPP only. The Organizational Partners accept no liability for any use of this Specification. Specifications and reports for implementation of the 3GPP TM system should be obtained via the 3GPP Organizational Partners' Publications Offices.KeywordsUMTS, radio3GPPPostal address3GPP support office address650 Route des Lucioles - Sophia AntipolisValbonne - FRANCETel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16InternetCopyright NotificationNo part may be reproduced except as authorized by written permission.The copyright and the foregoing restriction extend to reproduction in all media.© 2016, 3GPP Organizational Partners (ARIB, ATIS, CCSA, ETSI, TSDSI, TTA, TTC).All rights reserved.UMTS™ is a Trade Mark of ETSI registered for the benefit of its members3GPP™ is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational PartnersLTE™ is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners GSM® and the GSM logo are registered and owned by the GSM AssociationBluetooth® is a Trade Mark of the Bluetooth SIG registered for the benefit of its membersContentsForeword (18)1Scope (19)2References (19)3Definitions, symbols and abbreviations (22)3.1Definitions (22)3.2Abbreviations (24)4General (27)4.1Introduction (27)4.2Architecture (28)4.2.1UE states and state transitions including inter RAT (28)4.2.2Signalling radio bearers (29)4.3Services (30)4.3.1Services provided to upper layers (30)4.3.2Services expected from lower layers (30)4.4Functions (30)5Procedures (32)5.1General (32)5.1.1Introduction (32)5.1.2General requirements (32)5.2System information (33)5.2.1Introduction (33)5.2.1.1General (33)5.2.1.2Scheduling (34)5.2.1.2a Scheduling for NB-IoT (34)5.2.1.3System information validity and notification of changes (35)5.2.1.4Indication of ETWS notification (36)5.2.1.5Indication of CMAS notification (37)5.2.1.6Notification of EAB parameters change (37)5.2.1.7Access Barring parameters change in NB-IoT (37)5.2.2System information acquisition (38)5.2.2.1General (38)5.2.2.2Initiation (38)5.2.2.3System information required by the UE (38)5.2.2.4System information acquisition by the UE (39)5.2.2.5Essential system information missing (42)5.2.2.6Actions upon reception of the MasterInformationBlock message (42)5.2.2.7Actions upon reception of the SystemInformationBlockType1 message (42)5.2.2.8Actions upon reception of SystemInformation messages (44)5.2.2.9Actions upon reception of SystemInformationBlockType2 (44)5.2.2.10Actions upon reception of SystemInformationBlockType3 (45)5.2.2.11Actions upon reception of SystemInformationBlockType4 (45)5.2.2.12Actions upon reception of SystemInformationBlockType5 (45)5.2.2.13Actions upon reception of SystemInformationBlockType6 (45)5.2.2.14Actions upon reception of SystemInformationBlockType7 (45)5.2.2.15Actions upon reception of SystemInformationBlockType8 (45)5.2.2.16Actions upon reception of SystemInformationBlockType9 (46)5.2.2.17Actions upon reception of SystemInformationBlockType10 (46)5.2.2.18Actions upon reception of SystemInformationBlockType11 (46)5.2.2.19Actions upon reception of SystemInformationBlockType12 (47)5.2.2.20Actions upon reception of SystemInformationBlockType13 (48)5.2.2.21Actions upon reception of SystemInformationBlockType14 (48)5.2.2.22Actions upon reception of SystemInformationBlockType15 (48)5.2.2.23Actions upon reception of SystemInformationBlockType16 (48)5.2.2.24Actions upon reception of SystemInformationBlockType17 (48)5.2.2.25Actions upon reception of SystemInformationBlockType18 (48)5.2.2.26Actions upon reception of SystemInformationBlockType19 (49)5.2.3Acquisition of an SI message (49)5.2.3a Acquisition of an SI message by BL UE or UE in CE or a NB-IoT UE (50)5.3Connection control (50)5.3.1Introduction (50)5.3.1.1RRC connection control (50)5.3.1.2Security (52)5.3.1.2a RN security (53)5.3.1.3Connected mode mobility (53)5.3.1.4Connection control in NB-IoT (54)5.3.2Paging (55)5.3.2.1General (55)5.3.2.2Initiation (55)5.3.2.3Reception of the Paging message by the UE (55)5.3.3RRC connection establishment (56)5.3.3.1General (56)5.3.3.1a Conditions for establishing RRC Connection for sidelink communication/ discovery (58)5.3.3.2Initiation (59)5.3.3.3Actions related to transmission of RRCConnectionRequest message (63)5.3.3.3a Actions related to transmission of RRCConnectionResumeRequest message (64)5.3.3.4Reception of the RRCConnectionSetup by the UE (64)5.3.3.4a Reception of the RRCConnectionResume by the UE (66)5.3.3.5Cell re-selection while T300, T302, T303, T305, T306, or T308 is running (68)5.3.3.6T300 expiry (68)5.3.3.7T302, T303, T305, T306, or T308 expiry or stop (69)5.3.3.8Reception of the RRCConnectionReject by the UE (70)5.3.3.9Abortion of RRC connection establishment (71)5.3.3.10Handling of SSAC related parameters (71)5.3.3.11Access barring check (72)5.3.3.12EAB check (73)5.3.3.13Access barring check for ACDC (73)5.3.3.14Access Barring check for NB-IoT (74)5.3.4Initial security activation (75)5.3.4.1General (75)5.3.4.2Initiation (76)5.3.4.3Reception of the SecurityModeCommand by the UE (76)5.3.5RRC connection reconfiguration (77)5.3.5.1General (77)5.3.5.2Initiation (77)5.3.5.3Reception of an RRCConnectionReconfiguration not including the mobilityControlInfo by theUE (77)5.3.5.4Reception of an RRCConnectionReconfiguration including the mobilityControlInfo by the UE(handover) (79)5.3.5.5Reconfiguration failure (83)5.3.5.6T304 expiry (handover failure) (83)5.3.5.7Void (84)5.3.5.7a T307 expiry (SCG change failure) (84)5.3.5.8Radio Configuration involving full configuration option (84)5.3.6Counter check (86)5.3.6.1General (86)5.3.6.2Initiation (86)5.3.6.3Reception of the CounterCheck message by the UE (86)5.3.7RRC connection re-establishment (87)5.3.7.1General (87)5.3.7.2Initiation (87)5.3.7.3Actions following cell selection while T311 is running (88)5.3.7.4Actions related to transmission of RRCConnectionReestablishmentRequest message (89)5.3.7.5Reception of the RRCConnectionReestablishment by the UE (89)5.3.7.6T311 expiry (91)5.3.7.7T301 expiry or selected cell no longer suitable (91)5.3.7.8Reception of RRCConnectionReestablishmentReject by the UE (91)5.3.8RRC connection release (92)5.3.8.1General (92)5.3.8.2Initiation (92)5.3.8.3Reception of the RRCConnectionRelease by the UE (92)5.3.8.4T320 expiry (93)5.3.9RRC connection release requested by upper layers (93)5.3.9.1General (93)5.3.9.2Initiation (93)5.3.10Radio resource configuration (93)5.3.10.0General (93)5.3.10.1SRB addition/ modification (94)5.3.10.2DRB release (95)5.3.10.3DRB addition/ modification (95)5.3.10.3a1DC specific DRB addition or reconfiguration (96)5.3.10.3a2LWA specific DRB addition or reconfiguration (98)5.3.10.3a3LWIP specific DRB addition or reconfiguration (98)5.3.10.3a SCell release (99)5.3.10.3b SCell addition/ modification (99)5.3.10.3c PSCell addition or modification (99)5.3.10.4MAC main reconfiguration (99)5.3.10.5Semi-persistent scheduling reconfiguration (100)5.3.10.6Physical channel reconfiguration (100)5.3.10.7Radio Link Failure Timers and Constants reconfiguration (101)5.3.10.8Time domain measurement resource restriction for serving cell (101)5.3.10.9Other configuration (102)5.3.10.10SCG reconfiguration (103)5.3.10.11SCG dedicated resource configuration (104)5.3.10.12Reconfiguration SCG or split DRB by drb-ToAddModList (105)5.3.10.13Neighbour cell information reconfiguration (105)5.3.10.14Void (105)5.3.10.15Sidelink dedicated configuration (105)5.3.10.16T370 expiry (106)5.3.11Radio link failure related actions (107)5.3.11.1Detection of physical layer problems in RRC_CONNECTED (107)5.3.11.2Recovery of physical layer problems (107)5.3.11.3Detection of radio link failure (107)5.3.12UE actions upon leaving RRC_CONNECTED (109)5.3.13UE actions upon PUCCH/ SRS release request (110)5.3.14Proximity indication (110)5.3.14.1General (110)5.3.14.2Initiation (111)5.3.14.3Actions related to transmission of ProximityIndication message (111)5.3.15Void (111)5.4Inter-RAT mobility (111)5.4.1Introduction (111)5.4.2Handover to E-UTRA (112)5.4.2.1General (112)5.4.2.2Initiation (112)5.4.2.3Reception of the RRCConnectionReconfiguration by the UE (112)5.4.2.4Reconfiguration failure (114)5.4.2.5T304 expiry (handover to E-UTRA failure) (114)5.4.3Mobility from E-UTRA (114)5.4.3.1General (114)5.4.3.2Initiation (115)5.4.3.3Reception of the MobilityFromEUTRACommand by the UE (115)5.4.3.4Successful completion of the mobility from E-UTRA (116)5.4.3.5Mobility from E-UTRA failure (117)5.4.4Handover from E-UTRA preparation request (CDMA2000) (117)5.4.4.1General (117)5.4.4.2Initiation (118)5.4.4.3Reception of the HandoverFromEUTRAPreparationRequest by the UE (118)5.4.5UL handover preparation transfer (CDMA2000) (118)5.4.5.1General (118)5.4.5.2Initiation (118)5.4.5.3Actions related to transmission of the ULHandoverPreparationTransfer message (119)5.4.5.4Failure to deliver the ULHandoverPreparationTransfer message (119)5.4.6Inter-RAT cell change order to E-UTRAN (119)5.4.6.1General (119)5.4.6.2Initiation (119)5.4.6.3UE fails to complete an inter-RAT cell change order (119)5.5Measurements (120)5.5.1Introduction (120)5.5.2Measurement configuration (121)5.5.2.1General (121)5.5.2.2Measurement identity removal (122)5.5.2.2a Measurement identity autonomous removal (122)5.5.2.3Measurement identity addition/ modification (123)5.5.2.4Measurement object removal (124)5.5.2.5Measurement object addition/ modification (124)5.5.2.6Reporting configuration removal (126)5.5.2.7Reporting configuration addition/ modification (127)5.5.2.8Quantity configuration (127)5.5.2.9Measurement gap configuration (127)5.5.2.10Discovery signals measurement timing configuration (128)5.5.2.11RSSI measurement timing configuration (128)5.5.3Performing measurements (128)5.5.3.1General (128)5.5.3.2Layer 3 filtering (131)5.5.4Measurement report triggering (131)5.5.4.1General (131)5.5.4.2Event A1 (Serving becomes better than threshold) (135)5.5.4.3Event A2 (Serving becomes worse than threshold) (136)5.5.4.4Event A3 (Neighbour becomes offset better than PCell/ PSCell) (136)5.5.4.5Event A4 (Neighbour becomes better than threshold) (137)5.5.4.6Event A5 (PCell/ PSCell becomes worse than threshold1 and neighbour becomes better thanthreshold2) (138)5.5.4.6a Event A6 (Neighbour becomes offset better than SCell) (139)5.5.4.7Event B1 (Inter RAT neighbour becomes better than threshold) (139)5.5.4.8Event B2 (PCell becomes worse than threshold1 and inter RAT neighbour becomes better thanthreshold2) (140)5.5.4.9Event C1 (CSI-RS resource becomes better than threshold) (141)5.5.4.10Event C2 (CSI-RS resource becomes offset better than reference CSI-RS resource) (141)5.5.4.11Event W1 (WLAN becomes better than a threshold) (142)5.5.4.12Event W2 (All WLAN inside WLAN mobility set becomes worse than threshold1 and a WLANoutside WLAN mobility set becomes better than threshold2) (142)5.5.4.13Event W3 (All WLAN inside WLAN mobility set becomes worse than a threshold) (143)5.5.5Measurement reporting (144)5.5.6Measurement related actions (148)5.5.6.1Actions upon handover and re-establishment (148)5.5.6.2Speed dependant scaling of measurement related parameters (149)5.5.7Inter-frequency RSTD measurement indication (149)5.5.7.1General (149)5.5.7.2Initiation (150)5.5.7.3Actions related to transmission of InterFreqRSTDMeasurementIndication message (150)5.6Other (150)5.6.0General (150)5.6.1DL information transfer (151)5.6.1.1General (151)5.6.1.2Initiation (151)5.6.1.3Reception of the DLInformationTransfer by the UE (151)5.6.2UL information transfer (151)5.6.2.1General (151)5.6.2.2Initiation (151)5.6.2.3Actions related to transmission of ULInformationTransfer message (152)5.6.2.4Failure to deliver ULInformationTransfer message (152)5.6.3UE capability transfer (152)5.6.3.1General (152)5.6.3.2Initiation (153)5.6.3.3Reception of the UECapabilityEnquiry by the UE (153)5.6.4CSFB to 1x Parameter transfer (157)5.6.4.1General (157)5.6.4.2Initiation (157)5.6.4.3Actions related to transmission of CSFBParametersRequestCDMA2000 message (157)5.6.4.4Reception of the CSFBParametersResponseCDMA2000 message (157)5.6.5UE Information (158)5.6.5.1General (158)5.6.5.2Initiation (158)5.6.5.3Reception of the UEInformationRequest message (158)5.6.6 Logged Measurement Configuration (159)5.6.6.1General (159)5.6.6.2Initiation (160)5.6.6.3Reception of the LoggedMeasurementConfiguration by the UE (160)5.6.6.4T330 expiry (160)5.6.7 Release of Logged Measurement Configuration (160)5.6.7.1General (160)5.6.7.2Initiation (160)5.6.8 Measurements logging (161)5.6.8.1General (161)5.6.8.2Initiation (161)5.6.9In-device coexistence indication (163)5.6.9.1General (163)5.6.9.2Initiation (164)5.6.9.3Actions related to transmission of InDeviceCoexIndication message (164)5.6.10UE Assistance Information (165)5.6.10.1General (165)5.6.10.2Initiation (166)5.6.10.3Actions related to transmission of UEAssistanceInformation message (166)5.6.11 Mobility history information (166)5.6.11.1General (166)5.6.11.2Initiation (166)5.6.12RAN-assisted WLAN interworking (167)5.6.12.1General (167)5.6.12.2Dedicated WLAN offload configuration (167)5.6.12.3WLAN offload RAN evaluation (167)5.6.12.4T350 expiry or stop (167)5.6.12.5Cell selection/ re-selection while T350 is running (168)5.6.13SCG failure information (168)5.6.13.1General (168)5.6.13.2Initiation (168)5.6.13.3Actions related to transmission of SCGFailureInformation message (168)5.6.14LTE-WLAN Aggregation (169)5.6.14.1Introduction (169)5.6.14.2Reception of LWA configuration (169)5.6.14.3Release of LWA configuration (170)5.6.15WLAN connection management (170)5.6.15.1Introduction (170)5.6.15.2WLAN connection status reporting (170)5.6.15.2.1General (170)5.6.15.2.2Initiation (171)5.6.15.2.3Actions related to transmission of WLANConnectionStatusReport message (171)5.6.15.3T351 Expiry (WLAN connection attempt timeout) (171)5.6.15.4WLAN status monitoring (171)5.6.16RAN controlled LTE-WLAN interworking (172)5.6.16.1General (172)5.6.16.2WLAN traffic steering command (172)5.6.17LTE-WLAN aggregation with IPsec tunnel (173)5.6.17.1General (173)5.7Generic error handling (174)5.7.1General (174)5.7.2ASN.1 violation or encoding error (174)5.7.3Field set to a not comprehended value (174)5.7.4Mandatory field missing (174)5.7.5Not comprehended field (176)5.8MBMS (176)5.8.1Introduction (176)5.8.1.1General (176)5.8.1.2Scheduling (176)5.8.1.3MCCH information validity and notification of changes (176)5.8.2MCCH information acquisition (178)5.8.2.1General (178)5.8.2.2Initiation (178)5.8.2.3MCCH information acquisition by the UE (178)5.8.2.4Actions upon reception of the MBSFNAreaConfiguration message (178)5.8.2.5Actions upon reception of the MBMSCountingRequest message (179)5.8.3MBMS PTM radio bearer configuration (179)5.8.3.1General (179)5.8.3.2Initiation (179)5.8.3.3MRB establishment (179)5.8.3.4MRB release (179)5.8.4MBMS Counting Procedure (179)5.8.4.1General (179)5.8.4.2Initiation (180)5.8.4.3Reception of the MBMSCountingRequest message by the UE (180)5.8.5MBMS interest indication (181)5.8.5.1General (181)5.8.5.2Initiation (181)5.8.5.3Determine MBMS frequencies of interest (182)5.8.5.4Actions related to transmission of MBMSInterestIndication message (183)5.8a SC-PTM (183)5.8a.1Introduction (183)5.8a.1.1General (183)5.8a.1.2SC-MCCH scheduling (183)5.8a.1.3SC-MCCH information validity and notification of changes (183)5.8a.1.4Procedures (184)5.8a.2SC-MCCH information acquisition (184)5.8a.2.1General (184)5.8a.2.2Initiation (184)5.8a.2.3SC-MCCH information acquisition by the UE (184)5.8a.2.4Actions upon reception of the SCPTMConfiguration message (185)5.8a.3SC-PTM radio bearer configuration (185)5.8a.3.1General (185)5.8a.3.2Initiation (185)5.8a.3.3SC-MRB establishment (185)5.8a.3.4SC-MRB release (185)5.9RN procedures (186)5.9.1RN reconfiguration (186)5.9.1.1General (186)5.9.1.2Initiation (186)5.9.1.3Reception of the RNReconfiguration by the RN (186)5.10Sidelink (186)5.10.1Introduction (186)5.10.1a Conditions for sidelink communication operation (187)5.10.2Sidelink UE information (188)5.10.2.1General (188)5.10.2.2Initiation (189)5.10.2.3Actions related to transmission of SidelinkUEInformation message (193)5.10.3Sidelink communication monitoring (195)5.10.6Sidelink discovery announcement (198)5.10.6a Sidelink discovery announcement pool selection (201)5.10.6b Sidelink discovery announcement reference carrier selection (201)5.10.7Sidelink synchronisation information transmission (202)5.10.7.1General (202)5.10.7.2Initiation (203)5.10.7.3Transmission of SLSS (204)5.10.7.4Transmission of MasterInformationBlock-SL message (205)5.10.7.5Void (206)5.10.8Sidelink synchronisation reference (206)5.10.8.1General (206)5.10.8.2Selection and reselection of synchronisation reference UE (SyncRef UE) (206)5.10.9Sidelink common control information (207)5.10.9.1General (207)5.10.9.2Actions related to reception of MasterInformationBlock-SL message (207)5.10.10Sidelink relay UE operation (207)5.10.10.1General (207)5.10.10.2AS-conditions for relay related sidelink communication transmission by sidelink relay UE (207)5.10.10.3AS-conditions for relay PS related sidelink discovery transmission by sidelink relay UE (208)5.10.10.4Sidelink relay UE threshold conditions (208)5.10.11Sidelink remote UE operation (208)5.10.11.1General (208)5.10.11.2AS-conditions for relay related sidelink communication transmission by sidelink remote UE (208)5.10.11.3AS-conditions for relay PS related sidelink discovery transmission by sidelink remote UE (209)5.10.11.4Selection and reselection of sidelink relay UE (209)5.10.11.5Sidelink remote UE threshold conditions (210)6Protocol data units, formats and parameters (tabular & ASN.1) (210)6.1General (210)6.2RRC messages (212)6.2.1General message structure (212)–EUTRA-RRC-Definitions (212)–BCCH-BCH-Message (212)–BCCH-DL-SCH-Message (212)–BCCH-DL-SCH-Message-BR (213)–MCCH-Message (213)–PCCH-Message (213)–DL-CCCH-Message (214)–DL-DCCH-Message (214)–UL-CCCH-Message (214)–UL-DCCH-Message (215)–SC-MCCH-Message (215)6.2.2Message definitions (216)–CounterCheck (216)–CounterCheckResponse (217)–CSFBParametersRequestCDMA2000 (217)–CSFBParametersResponseCDMA2000 (218)–DLInformationTransfer (218)–HandoverFromEUTRAPreparationRequest (CDMA2000) (219)–InDeviceCoexIndication (220)–InterFreqRSTDMeasurementIndication (222)–LoggedMeasurementConfiguration (223)–MasterInformationBlock (225)–MBMSCountingRequest (226)–MBMSCountingResponse (226)–MBMSInterestIndication (227)–MBSFNAreaConfiguration (228)–MeasurementReport (228)–MobilityFromEUTRACommand (229)–Paging (232)–ProximityIndication (233)–RNReconfiguration (234)–RNReconfigurationComplete (234)–RRCConnectionReconfiguration (235)–RRCConnectionReconfigurationComplete (240)–RRCConnectionReestablishment (241)–RRCConnectionReestablishmentComplete (241)–RRCConnectionReestablishmentReject (242)–RRCConnectionReestablishmentRequest (243)–RRCConnectionReject (243)–RRCConnectionRelease (244)–RRCConnectionResume (248)–RRCConnectionResumeComplete (249)–RRCConnectionResumeRequest (250)–RRCConnectionRequest (250)–RRCConnectionSetup (251)–RRCConnectionSetupComplete (252)–SCGFailureInformation (253)–SCPTMConfiguration (254)–SecurityModeCommand (255)–SecurityModeComplete (255)–SecurityModeFailure (256)–SidelinkUEInformation (256)–SystemInformation (258)–SystemInformationBlockType1 (259)–UEAssistanceInformation (264)–UECapabilityEnquiry (265)–UECapabilityInformation (266)–UEInformationRequest (267)–UEInformationResponse (267)–ULHandoverPreparationTransfer (CDMA2000) (273)–ULInformationTransfer (274)–WLANConnectionStatusReport (274)6.3RRC information elements (275)6.3.1System information blocks (275)–SystemInformationBlockType2 (275)–SystemInformationBlockType3 (279)–SystemInformationBlockType4 (282)–SystemInformationBlockType5 (283)–SystemInformationBlockType6 (287)–SystemInformationBlockType7 (289)–SystemInformationBlockType8 (290)–SystemInformationBlockType9 (295)–SystemInformationBlockType10 (295)–SystemInformationBlockType11 (296)–SystemInformationBlockType12 (297)–SystemInformationBlockType13 (297)–SystemInformationBlockType14 (298)–SystemInformationBlockType15 (298)–SystemInformationBlockType16 (299)–SystemInformationBlockType17 (300)–SystemInformationBlockType18 (301)–SystemInformationBlockType19 (301)–SystemInformationBlockType20 (304)6.3.2Radio resource control information elements (304)–AntennaInfo (304)–AntennaInfoUL (306)–CQI-ReportConfig (307)–CQI-ReportPeriodicProcExtId (314)–CrossCarrierSchedulingConfig (314)–CSI-IM-Config (315)–CSI-IM-ConfigId (315)–CSI-RS-Config (317)–CSI-RS-ConfigEMIMO (318)–CSI-RS-ConfigNZP (319)–CSI-RS-ConfigNZPId (320)–CSI-RS-ConfigZP (321)–CSI-RS-ConfigZPId (321)–DMRS-Config (321)–DRB-Identity (322)–EPDCCH-Config (322)–EIMTA-MainConfig (324)–LogicalChannelConfig (325)–LWA-Configuration (326)–LWIP-Configuration (326)–RCLWI-Configuration (327)–MAC-MainConfig (327)–P-C-AndCBSR (332)–PDCCH-ConfigSCell (333)–PDCP-Config (334)–PDSCH-Config (337)–PDSCH-RE-MappingQCL-ConfigId (339)–PHICH-Config (339)–PhysicalConfigDedicated (339)–P-Max (344)–PRACH-Config (344)–PresenceAntennaPort1 (346)–PUCCH-Config (347)–PUSCH-Config (351)–RACH-ConfigCommon (355)–RACH-ConfigDedicated (357)–RadioResourceConfigCommon (358)–RadioResourceConfigDedicated (362)–RLC-Config (367)–RLF-TimersAndConstants (369)–RN-SubframeConfig (370)–SchedulingRequestConfig (371)–SoundingRS-UL-Config (372)–SPS-Config (375)–TDD-Config (376)–TimeAlignmentTimer (377)–TPC-PDCCH-Config (377)–TunnelConfigLWIP (378)–UplinkPowerControl (379)–WLAN-Id-List (382)–WLAN-MobilityConfig (382)6.3.3Security control information elements (382)–NextHopChainingCount (382)–SecurityAlgorithmConfig (383)–ShortMAC-I (383)6.3.4Mobility control information elements (383)–AdditionalSpectrumEmission (383)–ARFCN-ValueCDMA2000 (383)–ARFCN-ValueEUTRA (384)–ARFCN-ValueGERAN (384)–ARFCN-ValueUTRA (384)–BandclassCDMA2000 (384)–BandIndicatorGERAN (385)–CarrierFreqCDMA2000 (385)–CarrierFreqGERAN (385)–CellIndexList (387)–CellReselectionPriority (387)–CellSelectionInfoCE (387)–CellReselectionSubPriority (388)–CSFB-RegistrationParam1XRTT (388)–CellGlobalIdEUTRA (389)–CellGlobalIdUTRA (389)–CellGlobalIdGERAN (390)–CellGlobalIdCDMA2000 (390)–CellSelectionInfoNFreq (391)–CSG-Identity (391)–FreqBandIndicator (391)–MobilityControlInfo (391)–MobilityParametersCDMA2000 (1xRTT) (393)–MobilityStateParameters (394)–MultiBandInfoList (394)–NS-PmaxList (394)–PhysCellId (395)–PhysCellIdRange (395)–PhysCellIdRangeUTRA-FDDList (395)–PhysCellIdCDMA2000 (396)–PhysCellIdGERAN (396)–PhysCellIdUTRA-FDD (396)–PhysCellIdUTRA-TDD (396)–PLMN-Identity (397)–PLMN-IdentityList3 (397)–PreRegistrationInfoHRPD (397)–Q-QualMin (398)–Q-RxLevMin (398)–Q-OffsetRange (398)–Q-OffsetRangeInterRAT (399)–ReselectionThreshold (399)–ReselectionThresholdQ (399)–SCellIndex (399)–ServCellIndex (400)–SpeedStateScaleFactors (400)–SystemInfoListGERAN (400)–SystemTimeInfoCDMA2000 (401)–TrackingAreaCode (401)–T-Reselection (402)–T-ReselectionEUTRA-CE (402)6.3.5Measurement information elements (402)–AllowedMeasBandwidth (402)–CSI-RSRP-Range (402)–Hysteresis (402)–LocationInfo (403)–MBSFN-RSRQ-Range (403)–MeasConfig (404)–MeasDS-Config (405)–MeasGapConfig (406)–MeasId (407)–MeasIdToAddModList (407)–MeasObjectCDMA2000 (408)–MeasObjectEUTRA (408)–MeasObjectGERAN (412)–MeasObjectId (412)–MeasObjectToAddModList (412)–MeasObjectUTRA (413)–ReportConfigEUTRA (422)–ReportConfigId (425)–ReportConfigInterRAT (425)–ReportConfigToAddModList (428)–ReportInterval (429)–RSRP-Range (429)–RSRQ-Range (430)–RSRQ-Type (430)–RS-SINR-Range (430)–RSSI-Range-r13 (431)–TimeToTrigger (431)–UL-DelayConfig (431)–WLAN-CarrierInfo (431)–WLAN-RSSI-Range (432)–WLAN-Status (432)6.3.6Other information elements (433)–AbsoluteTimeInfo (433)–AreaConfiguration (433)–C-RNTI (433)–DedicatedInfoCDMA2000 (434)–DedicatedInfoNAS (434)–FilterCoefficient (434)–LoggingDuration (434)–LoggingInterval (435)–MeasSubframePattern (435)–MMEC (435)–NeighCellConfig (435)–OtherConfig (436)–RAND-CDMA2000 (1xRTT) (437)–RAT-Type (437)–ResumeIdentity (437)–RRC-TransactionIdentifier (438)–S-TMSI (438)–TraceReference (438)–UE-CapabilityRAT-ContainerList (438)–UE-EUTRA-Capability (439)–UE-RadioPagingInfo (469)–UE-TimersAndConstants (469)–VisitedCellInfoList (470)–WLAN-OffloadConfig (470)6.3.7MBMS information elements (472)–MBMS-NotificationConfig (472)–MBMS-ServiceList (473)–MBSFN-AreaId (473)–MBSFN-AreaInfoList (473)–MBSFN-SubframeConfig (474)–PMCH-InfoList (475)6.3.7a SC-PTM information elements (476)–SC-MTCH-InfoList (476)–SCPTM-NeighbourCellList (478)6.3.8Sidelink information elements (478)–SL-CommConfig (478)–SL-CommResourcePool (479)–SL-CP-Len (480)–SL-DiscConfig (481)–SL-DiscResourcePool (483)–SL-DiscTxPowerInfo (485)–SL-GapConfig (485)。

在图书馆捡到一个电子词典的英语作文

在图书馆捡到一个电子词典的英语作文

在图书馆捡到一个电子词典的英语作文The hushed stillness of the library was broken only by the rhythmic tapping of fingers on keyboards and the soft rustle of turning pages. I navigated the labyrinthine aisles, my eyes scanning the shelves for a specific anthology of Tang Dynasty poetry. Lost in my search, I nearly missed it – a sleek, black electronic dictionary lying abandoned on the floor, tucked away beneath a table. Curiosity piqued, I picked it up, its smooth surface cool against my palm. A wave of empathy washed over me. Losing something, especially in a place dedicated to knowledge and learning, felt like a small tragedy. The dictionary was clearlywell-used, its screen etched with the ghostly outlines of countless searched words, a testament to its owner’s dedication to language. I i magined them frantically retracing their steps, anxiety gnawing at their heart, their studies momentarily derailed by the missing device. Turning it over in my hands, I hoped for some clue, a name scribbled on the back, a personalized case perhaps, anything that might lead me to its owner. But there was nothing, just the smooth anonymity ofthe device. I contemplated handing it over to the librarian, but the thought of it languishing in the lost and found, its owner never knowing its fate, left me uneasy. An idea sparked. I turned the dictionary on, the screen flickering to life. If its owner was a regular library visitor, perhaps they had used the dictionary to search for a specific word, something related to their studies or interests. It was a long shot, but it was the only lead I had. I navigated to the search history, my heart quickening as I saw a list of words, each a potential breadcrumb leading me closer to the owner. The words were a curious mix –“existentialism,” “metamorphosis,” “sonder,” “serendipity.” They spoke of a curious mind, someone who delved into the depths of philosophy and pondered the intricacies of human existence. A smile tugged at my lips as I stumbled upon the most recent search –“bibliophile.” A book lover, just like me. I felt a sudden kinship with this stranger, a connection forged through shared passions and this unexpected encounter. With renewed determination, I started my search. I frequented the philosophy and literature sections, my eyes scanning the tables and carrels for someone who seemed lost in thought, someone who embodied the spirit of those intriguing search words. Days turned into weeks, and just as I was about togive up hope, I saw her. She was sitting by the window, sunlight illuminating her face as she was engrossed in a book. On the table beside her lay a notebook,filled with scribbles and underlined passages, and a pen, poised as if ready to capture a fleeting thought. Mustering my courage, I approached her. “Excuse me,”I began, my voice a littl e hesitant, “did you by any chance lose an electronic dictionary?” She looked up, startled at first, then her eyes widened in recognition. “Yes! I have been looking for it everywhere!” Relief flooded her face, and I felt a warm glow of satisfaction. As I handed her the dictionary, our fingers brushed, and I swear I felt a spark, a connection that transcended the simple act of returning a lost item. We talked for a while, about books, aboutlife, about the serendipitous nature of our meeting. I learned that her name was Anya, and she was a literature student, just as I had suspected. That day, inthe quiet sanctuary of the library, amidst the whispers of turning pages and the scent of old books, I found not only the owner of a lost dictionary but also a kindred spirit. And who knows, perhaps even the beginning of a beautifulfriendship, all thanks to a chance encounter and a shared love of words.。

捡到钥匙找不到英语作文

捡到钥匙找不到英语作文

捡到钥匙找不到英语作文英文:I remember the day I found a set of keys on the sidewalk. It was a sunny afternoon, and I was walking home from the grocery store when I spotted something shiny onthe ground. As I got closer, I realized it was a set of keys, probably dropped by someone passing by.I picked up the keys and looked around to see if anyone was searching for them, but there was no one in sight. I decided to take the keys home with me and try to find the owner. I knew how frustrating it could be to lose your keys, so I wanted to do everything I could to help.Once I got home, I posted a message on the community bulletin board, describing the keys and where I found them.I also asked anyone who might have lost their keys to contact me and provide some details to confirm ownership. I hoped that someone would see the message and come forwardto claim the keys.A few days passed, but no one had contacted me about the keys. I started to feel a bit discouraged, wondering ifI would ever find the owner. Then, one evening, I receiveda call from a woman who said she had lost her keys in the area where I found them. She described the keys in detail and even mentioned a unique keychain attached to them. I was overjoyed to have finally found the owner.I arranged to meet the woman and returned her keys to her. She was incredibly grateful and thanked me profusely for taking the time to find her. I felt a sense of satisfaction knowing that I had helped someone in need.中文:我记得有一天我在人行道上捡到一把钥匙。

如何识别网络真假信息英语作文

如何识别网络真假信息英语作文

How to Distinguish Between Authentic andFake Information OnlineIn the era of the internet, information is accessible at our fingertips. However, with the vast amount of data available, it's crucial to distinguish between authentic and fake information. Fake news and misinformation can have far-reaching consequences, ranging from misleading individuals to causing societal unrest. Therefore, it's essential to develop the ability to identify and verify the credibility of online content.The first step in identifying fake news is to analyze the source. Reputable news organizations often have a track record of publishing accurate and verified information. Checking the credibility of the news outlet can help determine if the content is reliable. Moreover, reading articles from multiple sources and comparing theirreporting can provide a more comprehensive understanding of an event.Another key aspect of identifying fake news is to pay attention to the language and tone of the article. Fake news articles often use sensationalized headlines andexaggerated language to attract readers. They may also omit important details or present facts in a misleading manner. By contrast, authentic news articles are typically written in a more objective and balanced tone, providing a comprehensive overview of the event.Furthermore, it's important to fact-check the information presented in the article. This can be done by searching for additional sources or using fact-checking websites that provide independent verification of claims. Cross-referencing multiple sources can help confirm the accuracy of the information and identify any discrepancies. Additionally, social media platforms play a significant role in the spread of fake news. It's crucial to be skeptical of posts that lack credibility or come from unverified sources. Engaging with verified and reliable news outlets on social media can help filter out false information.Moreover, understanding the motivation behind the publication of an article is crucial. Fake news articles are often published with ulterior motives, such as generating clicks or promoting a particular agenda. Bycontrast, authentic news articles aim to provide accurate and unbiased reporting.In conclusion, distinguishing between authentic and fake information online requires a critical eye and a willingness to verify facts. By analyzing the source, language, tone, and motivation behind the article, as well as fact-checking the information, we can better navigate the vast landscape of online news and avoid being misled by fake news.**如何识别网络真假信息**在互联网时代,信息触手可及。

我关于在网上搜索答案的建议英语作文

我关于在网上搜索答案的建议英语作文

我关于在网上搜索答案的建议英语作文Searching for answers online has become an integral part of our daily lives. Whether it's looking up a recipe, checking the weather forecast, or finding information for a research paper, the internet has made it easier than ever to access a wealth of knowledge at our fingertips. However, with so much information available online, it can be overwhelming and challenging to find accurate and reliable answers. In this essay, I will provide some tips and advice on how to effectively search for answers online.First and foremost, it is essential to use reliable sources when searching for information online. There is a plethora of websites and articles on the internet, but not all of them are credible. It is important to look for information from reputable sources such as government websites, academic journals, and trusted news organizations. Websites ending in .gov, .edu, or .org are generally more reliable than sites ending in .com. Additionally, checking the author's credentials and looking for citations can help determine the credibility of the information.Secondly, it is crucial to be specific in your search queries. Using keywords that are too broad can yield irrelevant results, while using keywords that are too narrow may limit your search. To get more accurate results, try to be as specific as possible withyour search terms. For example, instead of searching for "car repair," try searching for "how to change a tire on a Toyota Camry." This will help narrow down the results and provide more relevant information.Furthermore, utilizing advanced search techniques can help refine your search results. Most search engines have advanced search options that allow you to filter results by date, location, or file type. You can also use quotation marks to search for exact phrases, or use the minus sign to exclude certain keywords from your search. These advanced search techniques can help you find the information you need more efficiently.Another important tip is to fact-check the information you find online. Just because something is published on the internet does not mean it is true. Always verify the information with multiple sources before accepting it as fact. Cross-referencing information from different sources can help validate the accuracy of the information and prevent the spread of misinformation.In addition, it is essential to be aware of bias and misinformation when searching for answers online. Not all websites have your best interests in mind, and some may have a hidden agenda or bias. It is important to critically evaluate the sources of information and consider the author's perspectivewhen interpreting the information. Be cautious of sources that are overly sensationalized or lack evidence to support their claims.Lastly, it is crucial to keep an open mind when searching for answers online. The internet is a vast and diverse space with a wide range of perspectives and opinions. It is important to consider multiple viewpoints and be willing to change your opinion based on new information. Being open-minded and willing to learn from different sources can help you gain a more comprehensive understanding of the topic you are researching.In conclusion, searching for answers online can be a valuable tool for finding information quickly and conveniently. By using reliable sources, being specific in your search queries, utilizing advanced search techniques, fact-checking information, being aware of bias and misinformation, and keeping an open mind, you can effectively find accurate and reliable answers online. By following these tips and advice, you can navigate the vast sea of information on the internet with confidence and ease.。

Opentaps系统界面

Opentaps系统界面
对话
接受来自其他用户的邮件
allpages
对话
所有页面
allpages-summary
对话
allpagesbadtitle
对话
给定的页面标题是非法的,或者具有一个内部语言或内部wiki的前缀。它可能包含一个或更多的不能用于标题的字符。
allpagesfrom
对话
显示从此处开始的页面:
allpagesnext
addsection
对话
+
allarticles
对话
所有文章
allinnamespace
对话
所有页面(属于$1名字空间)
alllogstext
对话
综合显示上传、删除、保护、查封以及管理日志。您可以选择日志类型,用户名或者相关页面来缩小查询范围。
allmessages
对话
系统界面
allmessagescurrent
badretype
对话
你所输入的密码并不相同。
badsig
对话
错误的原始签名;请检查HTML标签。
badtitle
对话
错误的标题
badtitletext
对话
所请求页面的标题是无效的、不存在,跨语言或跨wiki链接的标题错误。它可能包含一个或更多的不能用于标题的字符。
blanknamespace
对话
(主)
autoblocker
对话
因为您与"[[$1]]"共享一个IP地址而被自动查封。$1被封的理由是"$2"。
autoredircomment
对话
正在重定向到[[$1]]
autosumm-blank

missing the point example -回复

missing the point example -回复

missing the point example -回复人们常常会面临各种错失机会的情况。

有时候,我们可能错过了一份理想的工作机会,或者错过了与某个重要的人建立深刻联系的机会。

然而,有时候我们错失的机会并不仅仅是在我们生活中的具体事件上,而是错失了对某种重要概念的理解或者深入思考。

这种情况下,我们往往会以为自己已经完全理解了问题或主题,却实际上忽略了它的真正核心或目的。

这就是所谓的"missing the point",即错失了主题的含义,只看到了表面现象而没有深入理解其本质。

一个经典的"missing the point"的例子是关于福尔摩斯侦破案件的故事。

在这个故事中,福尔摩斯指出,一个警察努力寻找一直古董,而终究都无法得到它。

最后,福尔摩斯告诉他,这个陈列在书房的古董实际上就是他一直在寻找的东西。

这个警察完全错过了主题,只看到了一个平凡的古董,而没有看到其真正的价值和意义。

与这个故事类似,我们在生活中也经常会遇到类似的情况。

比如,在工作中,我们可能会把关注点放在表面的绩效指标上,而忽视了公司文化和团队合作的重要性。

我们可能只追求短期的利益,而忽视了长期的发展和可持续性。

在人际关系中,我们可能只注意到某个人的外貌或者外表,而忽视了他们的内在品质和价值。

一个现实生活中的例子是关于环保意识的重要性。

很多人只注重了节约能源和减少污染的表面行为,比如关闭电器设备或者回收垃圾。

虽然这些行为是很重要的,但实际上它们只是环保意识的冰山一角。

真正的环保不仅仅是表面的行为,还包括对资源和环境的深入认识和理解。

我们需要思考我们的生活方式对环境的影响,以及我们可以做什么来改善这种影响。

我们需要明白环保的本质是为了保护我们共同的家园,而不仅仅是一种个人行为。

因此,"missing the point"是一个常见的问题,它不仅仅发生在我们的个人生活中,也有可能在更广泛的领域中发生。

我在网上寻找答案英语作文

我在网上寻找答案英语作文

我在网上寻找答案英语作文Title: The Value of Seeking Answers Online.In today's fast-paced digital era, the internet has become a ubiquitous tool for seeking answers to an array of questions. From the complexities of scientific research to the nuances of everyday life, the web offers a vast repository of knowledge and information that is accessible to anyone with a computer or a smartphone. This essay explores the significance of seeking answers online, the various avenues it provides, and the challenges that accompany this process.Firstly, the internet has revolutionized the way we access knowledge. In the past, finding answers to questions often required visits to libraries, long hours of research, or relying on the expertise of others. However, with the advent of the internet, information is now available at our fingertips, often with just a few clicks. Search engines such as Google, Bing, and Yahoo! have made it possible toinstantly retrieve vast amounts of data, from academic papers to user reviews, from news articles to online tutorials. This ease of access has not only expedited the process of seeking answers but has also broadened the scope of knowledge we can access.Moreover, the internet provides a diverse range of.。

我在网上寻找答案的意见英语作文

我在网上寻找答案的意见英语作文

我在网上寻找答案的意见英语作文Finding Answers on the Internet: My Online Quest for KnowledgeThe internet is like a vast ocean of information, filled with countless websites and pages that hold secrets and answers to all sorts of questions. As a curious kid, I often find myself diving into this digital sea, eager to discover new things and satisfy my thirst for knowledge.It all starts with a simple question that pops into my mind, like "What is the tallest mountain in the world?" or "How do butterflies get their colorful wings?" At first, I might ask my parents or my teachers, but sometimes their explanations leave me wanting to know more. That's when I turn to the internet, my trusty companion in the pursuit of understanding.With just a few clicks on my computer or tablet, I can access a world of information at my fingertips. I'll head over to my favorite search engine, type in my query, and watch as a list of results appears before my eyes. It's like embarking on a treasure hunt, sifting through the links and websites to find the ones that hold the answers I seek.Some websites are like friendly guides, presenting information in a way that's easy for me to understand. They use simple language, colorful pictures, and even videos to explain complex concepts. Other sites are more like dense encyclopedias, packed with detailed information that can sometimes be a bit overwhelming for a kid like me. But I don't let that discourage me – I'll just keep searching until I find a site that breaks it down in a way that makes sense.As I explore different websites, I've learned to be a bit skeptical too. Not everything on the internet is true, and sometimes people share incorrect or misleading information. That's why I always try to cross-reference what I find with other reliable sources, like educational websites or online encyclopedias. It's like double-checking my answers to make sure I've got the right information.One of my favorite things about searching online is discovering unexpected facts and tidbits of knowledge that I never knew existed. Just the other day, I was looking up information about pandas, and I stumbled upon the fact that they have an extra "thumb" made of bone that helps them grip bamboo stalks. How cool is that?Sometimes, the process of finding answers online can be a bit frustrating. There are times when I search and search, but the information I find is too complicated or doesn't quite address my question. But I've learned that persistence is key. I'll try rephrasing my search, looking for kid-friendly websites, or even asking my parents or teachers for help in finding the right resources.In the end, the sense of accomplishment I feel when I finally find the answers I've been seeking is incredibly rewarding. It's like solving a puzzle or reaching the end of a long adventure. And the best part? The knowledge I gain doesn't just satisfy my curiosity – it also helps me understand the world around me a little bit better.So, the next time you see me with my nose buried in a screen, don't worry – I'm probably just on another quest for knowledge, exploring the vast digital ocean of information and discovering new and exciting things along the way. The internet has opened up a whole new world of learning for me, and I can't wait to see what other fascinating facts and secrets it has in store.。

DBdoctor

DBdoctor
Use prepared statements
Prepared statements can improve query performance by reducing the need to parse and compile SQL statements for each request
Implementation caching
Monitor data changes
02
Track changes to data over time to identify unauthorized
modifications or potential data corruption
Perform regular backups
03
Ensure regular backups are taken to protect against data
Caching frequently accessed data can significantly improve performance by reducing the number of database queries required
Adjusting database configuration parameters
02
Configure I/O operations
Optimize I/O operations by adjusting parameters like disk I/O bandwidth and I/O wait time to improve overall database performance
Fix database errors
Restore from backup
相关主题
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Finding Near-Duplicate Web Pages:A Large-ScaleEvaluation of AlgorithmsMonika HenzingerGoogle Inc.&Ecole F´ed´erale de Lausanne(EPFL)monika@ABSTRACTBroder et al.’s[3]shingling algorithm and Charikar’s[4]ran-dom projection based approach are considered“state-of-the-art”algorithms forfinding near-duplicate web pages.Both algorithms were either developed at or used by popular web search engines.We compare the two algorithms on a very large scale,namely on a set of1.6B distinct web pages.The results show that neither of the algorithms works well for finding near-duplicate pairs on the same site,while both achieve high precision for near-duplicate pairs on different sites.Since Charikar’s algorithmfinds more near-duplicate pairs on different sites,it achieves a better precision overall, namely0.50versus0.38for Broder et al.’s algorithm.We present a combined algorithm which achieves precision0.79 with79%of the recall of the other algorithms.Categories and Subject DescriptorsH.3.1[Information Storage and Retrieval]:Content Analysis and Indexing;H.5.4[Information Interfaces and Presentation]:Hypertext/HypermediaGeneral TermsAlgorithms,Measurement,ExperimentationKeywordsNear-duplicate documents,content duplication,web pages 1.INTRODUCTIONDuplicate and near-duplicate web pages are creating large problems for web search engines:They increase the space needed to store the index,either slow down or increase the cost of serving results,and annoy the users.Thus,algo-rithms for detecting these pages are needed.A naive solution is to compare all pairs to documents. Since this is prohibitively expensive on large datasets,Man-ber[11]and Heintze[9]proposedfirst algorithms for de-tecting near-duplicate documents with a reduced number Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.SIGIR’06,August6–11,2006,Seattle,Washington,USA.Copyright2006ACM1-59593-369-7/06/0008...$5.00.of comparisons.Both algorithms work on sequences of ad-jacent characters.Brin et al.[1]started to use word se-quences to detect copyright violations.Shivakumar and Garcia-Molina[13,14]continued this research and focused on scaling it up to multi-gigabyte databases[15].Broder et al.[3]also used word sequences to efficientlyfind near-duplicate web ter,Charikar[4]developed an ap-proach based on random projections of the words in a doc-ument.Recently Hoad and Zobel[10]developed and com-pared methods for identifying versioned and plagiarised doc-uments.Both Broder et al.’s and Charikar’s algorithm have ele-gant theoretical justifications,but neither has been exper-imentally evaluated and it is not known which algorithm performs better in practice.In this paper we evaluate both algorithms on a very large real-world data set,namely on 1.6B distinct web pages.We chose these two algorithms as both were developed at or used by successful web search en-gines and are considered“state-of-the-art”infinding near-duplicate web pages.We call them Algorithm B and C. We set all parameters in Alg.B as suggested in the liter-ature.Then we chose the parameters in Alg.C so that it uses the same amount of space per document and returns about the same number of correct near-duplicate pairs,i.e., has about the same recall.We compared the algorithms ac-cording to three criteria:(1)precision on a random subset, (2)the distribution of the number of term differences per near-duplicate pair,and(3)the distribution of the number of near-duplicates per page.The results are:(1)Alg.C has precision0.50and Alg.B 0.38.Both algorithms perform about the same for pairs on the same site(low precision)and for pairs on different sites(high precision.)However,92%of the near-duplicate pairs found by Alg.B belong to the same site,but only74% of Alg.C.Thus,Alg.Cfinds more of the pairs for which precision is high and hence has an overall higher precision.(2)The number of term differences per near-duplicate pair are very similar for the two algorithms,but Alg.B returns fewer pairs with extremely large term differences.(3)The distribution of the number of near-duplicates per page fol-lows a power-law for both algorithms.However,Alg.B has a higher“spread”around the power-law curve.A possible reason for that“noise”is that the bit string representing a page in Alg.B is based on a randomly selected subset of terms in the page.Thus,there might be“lucky”and “unlucky”choices,leading to pages with an artificially high or low number of near-duplicates.Alg.C does not select a subset of terms but is based on all terms in the page.Finally,we present a combined algorithm that allows for different precision-recall tradeoffs.The precision of one trade-offis0.79with79%of the recall of Alg.B.It is notoriously hard to determine which pages belong to the same site.Thus we use the following simplified ap-proach.The site of a page is(1)the domain name of the page if the domain name has at most one dot,i.e.,at most two levels;and(2)it is the domain name minus the string before thefirst dot,if the domain name has two or more dots,i.e.,three or more levels.For example,the site of /index.html is . The paper is organized as follows:Section2describes the algorithms in detail.Section3presents the experiments and the evaluation results.We conclude in Section4.2.DESCRIPTION OF THE ALGORITHMS For both algorithms every HTML page is converted into a token sequence as follows:All HTML markup in the page is replaced by white space or,in case of formatting instruc-tions,ignored.Then every maximal alphanumeric sequence is considered a term and is hashed using Rabin’sfingerprint-ing scheme[12,2]to generate tokens,with two exceptions: (1)Every URL contained in the text of the page is broken at slashes and dots,and is treated like a sequence of individ-ual terms.(2)In order to distinguish pages with different images the URL in an IMG-tag is considered to be a term in the page.More specifically,if the URL points to a dif-ferent host,the whole URL is considered to be a term.If it points to the host of the page itself,only thefilename of the URL is used as term.Thus if a page and its images on the same host are mirrored on a different host,the URLs of the IMG-tags generate the same tokens in the original and mirrored version.Both algorithms generate a bit string from the token se-quence of a page and use it to determine the near-duplicates for the page.We compare a variant of Broder et al.’s al-gorithm as presented by Fetterly et al.[7]1and a slight modification of the algorithm in[4]as communicated by Charikar[5].We explain next these algorithms.Let n be the length of the token sequence of a page.For Alg.B every subsequence of k tokens isfingerprinted us-ing64-bit Rabinfingerprints,which results in a sequence of n−k+1fingerprints,called shingles.Let S(d)be the set of shingles of page d.Alg.B makes the assumption that the percentage of unique shingles on which the two pages d and d agree,i.e.|S(d)∩S(d )|1The only difference is that we omit the wrapping of the shingling“window”from end to beginning described in[7].larity computation the m-dimensional vector of minvalues is reduced to a m -dimensional vector of supershingles byfin-gerprinting non-overlapping sequences of minvalues:Let m be divisible by m and let l=m/m .The concatentation of minvalue j∗l,...,(j+1)∗l−1for0≤j<m isfingerprinted with yet anotherfingerprinting function and is called super-shingle.2This creates a supershingle vector.The number of identical entries in the supershingle vectors of two pages is their B-similarity.Two pages are near-duplicates of Alg.B or B-similar ifftheir B-similarity is at least2.The parameters to be set are m,l,m ,and k.Following prior work[7,8]we chose m=84,l=14,and m =6. We set k=8as this lies between k=10used in[3]and k=5used in[7,8].For each page its supershingle vector is stored,which requires m 64-bit values or48bytes.Next we describe Alg.C.Let b be a constant.Each token is projected into b-dimensional space by randomly choosing b entries from{−1,1}.This projection is the same for all pages.For each page a b-dimensional vector is created by adding the projections of all the tokens in its token sequence. Thefinal vector for the page is created by setting every pos-itive entry in the vector to1and every non-positive entry to 0,resulting in a random projection for each page.It has the property that the cosine similarity of two pages is propor-tional to the number of bits in which the two corresponding projections agree.Thus,the C-similarity of two pages is the number of bits their projections agree on.We chose b=384 so that both algorithms store a bit string of48bytes per page.Two pages are near-duplicates of Alg.C or C-similar iffthe number of agreeing bits in their projections lies above afixed threshold t.We set t=372,see Section3.3.We briefly compare the two algorithms.In both algo-rithms the same bit string is assigned to pages with the same token sequence.Alg.C ignores the order of the to-kens,i.e.,two pages with the same set of tokens have the same bit string.Alg.B takes the order into account as the shingles are based on the order of the tokens.Alg.B ignores the frequency of shingles,while Alg.C takes the frequency of terms into account.For both algorithms there can be false positives(non near-duplicate pairs returned as near-duplicates)as well as false negatives(near-duplicate pairs not returned as near-duplicates.)Let T be the sum of the number of tokens in all pages and let D be the number of pages.Alg.B takes time O(T m+Dm )=O(T m).Alg.C needs time O(T b)to determine the bit string for each page. As described in Section3.3the C-similar pairs are computed using a trick similar to supershingles.It takes time O(D)so that the total time for Alg.C is O(T b).3.EXPERIMENTSBoth algorithms were implemented using the mapreduce framework[6].Mapreduce is a programming model for sim-plified data processing on machine clusters.Programs writ-ten in this functional style are automatically parallelized and executed on a large cluster of commodity machines.The algorithms were executed on a set of1.6B unique pages col-lected during a crawl of Google’s crawler.A preprocessing step grouped pages with the same token sequence into iden-tity sets and removed for every identity set all but one page.About25-30%of the pages were removed in this step-we do not know the exact number as the preprocessing was done before we received the pages.Alg.B and C found that between1.7%and2.2%of the pages after duplicate removal have a near-duplicate.Thus the total number of near-duplicates and duplicates is roughly the same as the one reported by Broder et al.[3](41%) and by Fetterly et al.[7](29.2%)on their collections of web pages.The exact percentage of duplicates and near-duplicates depends on the crawler used to gather the web pages and especially on its handling of session-ids,which frequently lead to exact duplicates.Note that the focus of this paper is not on determining the percentage of near-duplicates on the web,but to compare Alg.B and C on the same large real-world data set.The web pages residedon46.2M hosts with an average of36.5pages per host.The distribution of the number of pages per host follows a power-law.We believe that the pages used in our study are fairly representative of the publically available web and thus form a useful large-scale real-world data set for the comparison. As it is not possible to determine by hand all near-duplicate pairs in a set of1.6B pages we cannot determine the recall of the algorithms.Instead we chose the threshold t in Alg.C so that both algorithms returned about the same number of correct near-duplicate pairs,i.e.,they have about the same recall(without actually knowing what it is).Then we compared the algorithms based on(1)precision,(2)the distribution of the number of term differences in the near-duplicate pairs,and(3)the distribution of the number of near-duplicates per parison(1)required human evaluation and will be explained next.3.1Human EvaluationWe randomly sampled B-similar and C-similar pairs and had them evaluated by a human3,who labeled each near-duplicate pair either as correct,incorrect,or undecided.We used the following definition for a correct near-duplicate: Two web pages are correct near-duplicates if(1)their text differs only by the following:a session id,a timestamp,an execution time,a message id,a visitor count,a server name, and/or all or part of their URL(which is included in the doc-ument text),(2)the difference is invisible to the visitors of the pages,(3)the difference is a combination of the items listed in(1)and(2),or(4)the pages are entry pages to the same site.The most common example of URL-only differ-ences are“parked domains”,i.e.domains that are for sale. In this case the URL is a domain name and the HTML page retrieved by the URL is an advertisement page for buying that domain.Pages of domains for sale by the same organi-zation differ usually only by the domain name,i.e.,the URL. Examples of Case(4)are entry pages to the same porn site with some different words.A near-duplicate pair is incorrect if the main item(s)of the page was(were)different.For example,two shopping pages with common boilerplate text but a different product in the page center is an incorrect near-duplicate pair.Number of near-duplicates252.4%320.9%412.3%58.7%6 5.7% Table1:Number of near-duplicate pairs found for each B-similarity value.The remaining near-duplicate pairs were rated undecided. The following three reasons covered95%of the undecided pairs:(1)prefilled forms with different,but erasable values such that erasing the values results in the same form;(2)a different“minor”item,like a different text box on the side or the bottom;(3)pairs which could not be evaluated.To evaluate a pair the pages as stored at the time of the crawl were visually compared and a Linux diff operation was per-formed on the two token sequences.The diff output was used to easilyfind the differences in the visual comparison. However,for some pages the diff output did not agree with visual inspection.This happened,e.g.,because one of these pages automatically refreshed and the fresh page was differ-ent from the crawled page.In this case the pair was labeled as“cannot evaluate”.A pair was also labeled as“cannot evaluate”when the evaluator could not discern whether the difference in the two pages was major or minor.This hap-pened mostly for Chinese,Japanese,or Korean pages. 3.2The Results for Algorithm BAlg.B generated6supershingles per page,for a total of 10.1B supershingles.They were sorted and for each pair of pages with an identical supershingle we determined its B-similarity.This resulted in1.8B B-similar pairs,i.e.,pairs with B-similarity at least2.Let us define the following B-similarity graph:Every page is a node in the graph.There is an edge between two nodes iffthe pair is B-similar.The label of an edge is the B-similarity of the pair,i.e.,2,3,4,5,or6.The graph has 1.8B edges,about half of them have label2(see Table1.)A node is considered a near-duplicate page iffit is incident to at least one edge.Alg.B found27.4M near-duplicate pages. The average degree of the B-similarity graph is abount135. Figure1shows the degree distribution in log-log scale.It follows a power-law with exponent about-1.3.We randomly sampled96556B-similar pairs.In91.9%of the cases both pages belonged to the same site.We thenNear Correct Undecided dups19100.53same site0.340.09(0.04) diff.sites0.860.08(0.01)10320.683890.482400.361430.231060.05All pairsURL only194(32%)Time stamp only119(20%)Combination145(24%)Execution time only114(19%)Visitor count only20(3%)Rest5(1%)Table3:The distribution of differences for correct B-similar pairs.subsampled these pairs and checked each of the resulting 1910pairs for correctness(see Table2.)The overall preci-sion is0.38.However,the errors arise mostly for pairs on the same site:There the precision drops to0.34,while for pairs on different sites the precision is0.86.The reason is that very often pages on the same site use the same boil-erplate text and differ only in the main item in the center of the page.If there is a large amount of boilerplate text, chances are good that the algorithm cannot distinguish the main item from the boilerplate text and classifies the pair as near-duplicate.Precision improves for pairs with larger B-similarity.This is expected as larger B-similarity means more agreement in supershingles.While the correctness of B-similarity2is only 0.24,this value increases to0.42for B-similarity3,and to 0.66for B-similarity larger than3.However,less than half of the pairs have B-similarity3or more.Table3analyzes the correct B-similar pairs.It shows that URL-only differences account for41%of the correct pairs. For pairs on different sites108out of the152B-similar pairs differ only in the URL.This explains largely the high pre-cision in this case.Time stamps-only differences,execution time-only differences,and combinations of differences are about equally frequent.The remaining cases account for less than4%of the correct pairs.Only9%of all pairs are labeled undecided.Table4shows that92%of them are on the same site.Almost half the cases are pairs that could not be evaluated.Prefilled,erasable forms are the reason for41%of the cases.Differences in minor items account for only11%.Next we analyze the distribution of term differences for the1910B-similar pairs.To determine the term difference of a pair we executed the Linux diff command over the two token sequences and used the number of tokens that were returned.The average term difference is24,the mean isSame site78(47%)69(41%)19(11%)1(1%)4A second independent sample of170318near-duplicate pairs confirmed these percentages.1101001000100001000001e+061e+071e+08110100 1000 10000 100000F r e q u e n c yNumber of nodesFigure 3:The degree distribution in the C-similarity graph in log-log scale.duplicate pairs.Alg.B found 1,831M near-duplicate pairs containing about 1,831M ∗0.38≈696M correct near-duplicate pairs.For t =372Alg.C found 1,630M near-duplicate pairs containing about 1,630M ∗0.5=815M correct near-duplicate pairs.Thus,we set t =372.In a slight abuse of notation we call a pair C-similar iffit was returned by our implementation.The difference to before is that there might be some pairs with C-similarity 372that are not C-similar because they were not returned by our implementation.We define the C-similarity graph analog to the B-similarity graph.There are 35.5M nodes with at least one incident edge,i.e.,near-duplicate pages.This is almost 30%more than for Alg.B.The average degree in the C-similarity graph is almost 92.Figure 3shows the degree distribution in log-log scale.It follows a power-law with exponent about -1.4.We randomly sampled 172,464near-duplicate pairs.Out of them 74%belonged to the same site.In a random subsam-ple of 1872near-duplicate pairs Alg.C achieves an overall precision of 0.50with 27%incorrect pairs and 23%unde-cided pairs (see Table 5.)For pairs on different sites the precision is 0.9with only 5%incorrect pairs and 5%unde-cided pairs.For pairs on the same site the precision is only 0.36with 34%incorrect pairs and 30%undecided pairs.The number in parenthesis gives the percentage of pairs out of all pairs that were marked Undecided because of prefilled,but erasable forms.It shows that these pages are the main reason for the large number of undecided pairs of Alg.C.Table 5also lists the precision for different C-similarity ranges.Surprisingly precision is highest for C-similarity be-tween 372and 375.This is due to the way we break URLs at slashes and dots.Two pages that differ only in the URL usually differ in 2to 4tokens since these URLs are frequently domain names.This often places the pair in the range be-tween 372and 375.Indeed 57%of the pairs that differ only in the URL fall into this range.This explains 387out of the 470correct near-duplicates for this C-similarity range.Table 6analyzes the correct near-duplicate pairs.URL-only differences account for 72%,combinations of differences for 11%,time stamps and execution time for 9%together with about half each.The remaining reasons account for 8%.For near-duplicate pairs on the same site only 53%of the correct near-duplicate pairs are caused by URL-only differences,while 19%are due to a combination of reasons and 8%to time stamps and execution time.For pairs on different sites 406of the 479C-similar pairs differ only in the URL.This explains the high precision in that case.Table 7shows that 95%of the undecided pairs are on theNear CorrectUndecided dups18720.27same site 0.360.30(0.25)different site0.900.05(0)1790.37382>C-sim ≥3790.400.23(0.18)5320.27C-sim <3760.620.19(0.12)Table 5:Alg.C:Fraction of correct,not correct,and undecided pairs,with the fraction of prefilled,erasable forms out of all pairs in that row in paren-thesis.Same site676(72%)100(11%)42(4%)41(4%)21(2%)57(6%)5In a second independent random sample of 23475near-duplicate pairs we found 9.4%such pairs.Same site 345(80%)64(15%)21(5%)2(0%)Alg BIncorrect20Undecided53Correct17Table8:The evaluations for the near-duplicate pairs with term difference larger than200.B-similarity2342.44358.960 20040060080010001200150200250300350400N u m b e r o f p a g e sC-similarity"B-similarity=6""B-similarity=5""B-similarity=4""B-similarity=3""B-similarity=2"Figure 5:The C-similarity distribution for various fixed B-similarities.C-similarity 372-3750.22379-3810.32Table 10:For a given C-similarity range the average B-similarity.We also determined the B-similarity for a random sample of 169,757C-similar pairs.Again about 4%of the pairs were B-similar,but for 95%of the pairs the B-similarity was 0.Table 10gives the details for various C-similarity ranges.3.5The Combined AlgorithmThe algorithms wrongly identify pairs as near-duplicates either (1)because a small difference in tokens causes a large semantic difference or (2)because of unlucky random choices.As the bad cases for Alg B showed pairs with a large amount of boilerplate text and a not very small number (like 10or 20)of different tokens that are all consecutive are at risk of being wrongly identified as near-duplicates by Alg.B,but are at much less risk by Alg.C.Thus we studied the follow-ing combined algorithm:First compute all B-similar pairs.Then filter out those pairs whose C-similarity falls below a certain threshold.To choose a threshold we plotted the precision of the combined algorithm for different threshold values in Figure 6.It shows that precision can significantly improve if a fairly high value of C-similarity,like 350,is used.To study the impact of different threshold values on recall let us define R to be the number of correct near-duplicate pairs returned by the combined algorithm divided by the number of correct near-duplicate pairs returned by Alg.B.We chose Alg.B because the combined algorithm tries to filter out the false positives of Alg.B.We randomly sub-sampled 948pairs out of the 1910pairs that were scored for Alg.B,creating the sample S 1.The remaining pairs from the 1910pairs form sample S 2.We used S 1to choose a cut-offthreshold and S 2as testing set to determine the resulting precision and R -value.Figure 7plots for S 1precision versus R for all C-similar thresholds between 0and 384.As ex-0.30.40.50.60.70.80.90 50 100 150200 250 300 350 400P r e c i s i o nC-similarityFigure 6:For each C-similarity threshold the corre-sponding precision of the combined algorithm.0.30.40.50.60.70.80.910.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1P r e c i s i o nPercentage of correct near-duplicate pairs returnedFigure 7:For the training set S 1the R-value versus precision for different cutoffthresholds t .pected precision decreases with increasing R.The long flat range corresponds to different thresholds between 351and 361for which precision stays roughly the same while recall increases significantly.For the range between 351and 359Table 11gives the resulting precision and R-values.It shows that a C-similarity threshold of 353,354,or 355would be a good choice,achieving a precision of 0.77while keeping R over 0.8.We picked 355.The resulting algorithm returns on the testing set S 2363out of the 962pairs as near-duplicates with a precision of 0.79and an R -value of 0.79.For comparison consider us-ing Alg.B with a B-similarity cutoffof 3.That algorithmPercentage of C-similarity correct pairs thresholdreturned0.7540.7630.7680.8253540.8083550.7893560.7840.7840.789Near Correct Un-of correctdedall0.790.06same site0.740.07650.000.97 Table12:The combined Algorithm on the testing set S2:Fraction of correct,incorrect,and undecided pairs and R-value.only returns244correct near-duplicates with a precision of 0.56,while the combined algorithm returns287correct near-duplicates with a precision of0.79.Thus,the combined al-gorithm is superior in both precision and recall to using a stricter cutofffor Alg.B.Note that the combined algorithm can be implemented with the same amount of space since the bit strings for Alg.C can be computed“on thefly”during filtering.Table12also shows that82%of the returned pairs are on the same site and that the precision improvement is mostly achieved for these pairs.With0.74this number is much better than either of the individual algorithms.A further improvement could be achieved by running both Alg.C and the combined algorithm and returning the pairs on different sites from Alg.C and the pairs for the same site from the combined algorithm.This would generate 1.6B∗0.26≈416M pairs one the same site with374M cor-rect pairs and1.6B∗0.919∗0.79≈1163M pairs on different sites with about919M correct pairs.Thus approximately 1335M correct pairs would be returned with a precision of 0.85,i.e.,both recall and precision would be superior to the combined algorithm alone.4.CONCLUSIONSWe performed an evaluation of two near-duplicate algo-rithms on1.6B web pages.Neither performed well on pages from the same site,but a combined algorithm did without sacrificing much recall.Two changes might improve the performance of Alg.B and deserve further study:(1)A weighting of shingles by frequency and(2)using a different number k of tokens in a shingle.For example,following[7,8]one could try k=5. However,recall that28%of the incorrect pairs are caused by pairs of pages in two databases on the web.In these pairs the difference is formed by one consecutive sequence of tokens. Thus,reducing k would actually increase the chances that pairs of pages in these databases are incorrectly identified as near-duplicates.Note that Alg.C also could work with much less space. It would be interesting to study how this affects its per-formance.Additionally it would be interesting to explore whether applying Alg.C to sequences of tokens,i.e.,shin-gles,instead of individual tokens would increase its perfor-mance.As our results show both algorithms perform poorly on pairs from the same site,mostly due to boilerplate -ing a boilerplate detection algorithm would probably help. Another approach would be to use a different,potentially slower algorithm for pairs on the same site and apply(one of)the presented algorithms to pairs on different sites.5.ACKNOWLEDGMENTSI want to thank Mike Burrows,Lars Engebretsen,Abhay Puri and Oren Zamir for their help and useful discussions.6.REFERENCES[1]S.Brin,J.Davis,and H.Garcia-Molina.CopyDetection Mechanisms for Digital Documents.In1995 ACM SIGMOD International Conference onManagement of Data(May1995),398–409.[2]A.Broder.Some applications of Rabin’sfingerprintingmethod.In Renato Capocelli,Alfredo De Santis,andUgo Vaccaro,editors,Sequences II:Methods inCommunications,Security,and Computer Science,1993:143–152.[3]A.Broder,S.Glassman,M.Manasse,and G.Zweig.Syntactic Clustering of the Web.In6th InternationalWorld Wide Web Conference(Apr.1997),393–404. [4]M.S.Charikar.Similarity Estimation Techniquesfrom Rounding Algorithms.In34th Annual ACMSymposium on Theory of Computing(May2002).[5]M.S.Charikar.Private communication.[6]J.Dean and S.Ghemawat.MapReduce:SimplifiedData Processing on Large Clusters.In6th Symposium on Operating System Design and Implementation(Dec.2004),137–150.[7]D.Fetterly,M.Manasse,and M.Najork.On theEvolution of Clusters of Near-Duplicate Web Pages.In 1st Latin American Web Congress(Nov.2003),37–45.[8]D.Fetterly,M.Manasse,and M.Najork.DetectingPhrase-Level Duplication on the World Wide Web.To appear in28th Annual International ACM SIGIRConference(Aug.2005).[9]N.Heintze.Scalable Document Fingerprinting.InProc.of the2nd USENIX Workshop on ElectronicCommerce(Nov1996).[10]T.C.Hoad and J.Zobel.Methods for identifyingversioned and plagiarised documents.Journal of theAmerican Society for Information Science andTechnology54(3):203-215,2003.[11]U.Manber.Finding similarfiles in a largefile system.In Proc.of the USENIX Winter1994TechnicalConference(Jan.1994).[12]M.Rabin.Fingerprinting by random polynomials.Report TR-15-81,Center for Research in ComputingTechnology,Harvard University,1981.[13]N.Shivakumar and H.Garcia-Molina.SCAM:a copydetection mechanism for digital documents.In Proc.International Conference on Theory and Practice ofDigital Libraries(June1995).[14]N.Shivakumar and H.Garcia-Molina.Building ascalable and accurate copy detection mechanism.InProc.ACM Conference on Digital Libraries(March1996),160–168.[15]N.Shivakumar and H.Garcia-Molina.Findingnear-replicas of documents on the web.In Proc.Workshop on Web Databases(March1998),204–212.。

相关文档
最新文档