1. Introduction 3 Moving Cast Shadow Detection

1. Introduction 3 Moving Cast Shadow Detection
1. Introduction 3 Moving Cast Shadow Detection

3

Moving Cast Shadow Detection

Wei Zhang 1, Q.M. Jonathan Wu 1 and Xiangzhong Fang 2

University of Windsor 1, Shanghai Jiao Tong University 2

Canada 1, China 2

1. Introduction

Moving shadow detection is an important topic in computer vision applications, including

video conference, vehicle tracking, and three-dimensional (3-D) object identification, and

has been actively investigated in recent years. Because, in real world scenes, moving cast

shadows may be detected as foreground object and plauge the moving objects

segmentation. For example, in traffic surveillance situation, shadows cast by moving

vehicles may be segmented as part of vehicles, which not only interfere with the size and

shape information but also generate occlusions (as Fig. 1 illustrates). At the same time,

moving cast shadow detection can provide reference information to the understanting of the

illumination in the scenes. Therefore, an effective shadow detection algorithm can greatly

benefit the practical image analysis system.

Fig. 1. Examples of moving cast shadows. Source:Vision Systems:Segmentation and Pattern Recognition,ISBN 987-3-902613-05-9,

Edited by:Goro Obinata and Ashish Dutta,pp.546,I-Tech,Vienna,Austria,June 2007

O p e n A c c e s s D a t a b a s e w w w .i -t e c h o n l i n e .c o m

Vision Systems - Segmentation and Pattern Recognition

48Fig. 2. Illumination model of moving cast shadows: the umbra, penumbra, and geometric

relationship.

Essentially, shadow is formed by the change of illumination conditions and shadow

detection comes down to a problem of finding the illumination invariant features. From the

viewpoint of geometric relationship, shadow can be divided into umbra and penumbra

(Stander et al., 1999). The umbra corresponds to the background area where the direct light

is almost totally blocked by the foreground object, whereas in the penumbra area, the light is

partially blocked (as Fig. 2 illustrates). From the viewpoint of motion property, shadow can

be divided into static shadow and dynamic shadow. Static shadow is cast by static object

while dynamic shadow is cast by moving object. In video surveilance application, static

shadows have little effect on the moving objects segmentation. Therefore, we concentrate on

the detection of dynamic/moving cast shadows in the image sequence captured by static

camera in this chapter.

2. Illumination property of cast shadow

For an image acquired by camera, the intensity of pixel f(x,y)can be given as:

f(x,y)= i(x,y)×r(x,y) (1) where i(x,y) represents the illumination component and r(x,y) represents the reflectance

component of object surface. i(x,y) is computed as the amount of light power per receiving

object surface area and can further be expressed as follows (Stander et al., 1999).

-? °???° ˉa p a p a +c cos(j) ;+t(x,y)c cos(j) c illuminated area i(x,y)=c penumbra area

c umbra area

(2)

where

-c p intensity of the light source;

-ǘangle enclosed by light source direction and surface normal;

-c a intensity of ambient light;

-t transition inside the penumbra which depends on the light source and scene geometry,

and 0 t(x,y) 1.

Many works have been put forward in the literature for moving shadow detection. From

Moving Cast Shadow Detection 49 the viewpoint of the information and model utilized, these methods can be classified into three categories: color model, textural model, and geometric model. Additionally, statistical model is used to tackle the problem. Most of the state-of-the-art are based on the reference image and we consider it has been acquired beforehand. Let the reference image and shaded image be B and F, respevtively. In the following part of this chapter, we introduce each categories of methods for moving cast shadow detection.

Fig. 3. The distribution of the background difference and background ratio in HSV color space: shadow pixels and foreground pixels.

3. Colour/Spectrum-based shadow detection

The color/spectrum model attempts to describe the color change of shaded pixel and find the color feature that is illumination invariant. Cucchiara et al. (Cucchiara et al., 2001; Cucchiara et al., 2003) investigated the Hue-Saturation-Value (HSV) color property of cast

Vision Systems - Segmentation and Pattern Recognition 50shadows, and it is found that shadows change the hue component slightly and decrease the saturation component significantly. The distribution of F V (x, y)/B V (x, y), F S (x, y)-B S (x, y), and |F H (x, y)-B H (x, y)| are given in Fig. 3 for shadows pixels and foreground pixels, respectively. It can be found that shadow pixels cluster in a small region and have distinct distribution compared with foreground pixels. The shadows are then discriminated from foreground objects by using empirical thresholds on HSV color space as follows.

V S S H H S H V F (x,y))F (x,y)-B (x,y)))F (x,y)-B (x,y))B (x,y)

(α≤ ≤β ((≤τ (≤τAND AND (3) By using above method, the shadow pixels can be discriminated from foreground pixels effectively. This method has been included in the Sakbot system (Statistical and Knowledge-Based Object Tracker).

Salvador et al. (Salvador et al. 2004) proposed a normalized RG B color space, C 1C 2C 3, to segment the shadows in still images and video sequences. The C 1C 2C 3 is defined as follows.

123R(x,y)C (x,y)=arctan

;max(G(x,y),B(x,y))

G(x,y)C (x,y)=arctan ;max(R(x,y),B(x,y))

B(x,y)C (x,y)=arctan ;max(R(x,y),G(x,y)) (4) After integrating the intensity of neighbouring region, the shadow is detected as the pixels change greatly in C 1C 2C 3 colour space. Considering the shadow decrease the intensity of RGB component in a same scale, it can be found that C 1C 2C 3

is illumination invariant.

Fig. 4. A scatter plot in the color ratios space of a shaded pixels set. The line corresponds to the equal ratio in RGB components.

Moving Cast Shadow Detection 51 Siala et al. (Siala et al., 2004) consider the pixel’s intensity change equally in RG B colour components and a diagonal model is proposed to describe the color distortion of shadow in RG B space. The color distortion is defined as (d R=F R/B R, d G=F G/B G, d B=F B/B B), and the color distortion of shaded pixel is distributed near the line d R=d G=d B (as show in Fig. 4), which does not hold for foreground objects. Therefore, the shadow pixels are discriminated from foreground objects according to the distance between pixel’s color distortion and the line d R=d G=d B

.

Horprasert et al. (Horprasert et al., 1999) proposed a computational color model which separates brightness from the chromaticity component using brightness distortions (BD) and chromaticity distortions (CD), which are defined as follows.

(5) CD(x,y)

Vision Systems - Segmentation and Pattern Recognition 52In which (μR , μG , μB ) and (ǔR ,ǔG ,ǔB ) are the arithmetic means and variance of the pixel's red, green, and blue values computed over N background frames. By imposing thresholds on the normalized color distortion (NCD) and normalized brightness distortion (NBD), the pixels are classified into original background, shaded background, highlight background, and moving foreground objects as follows.

CD alo a1a2Foreground : ?CD >ǖ OR ?BD <ǖ, else Background :?BD <ǖ??D ?BD <ǖ, else Shadow :?BD <0, else Highlight :otherwise

-°°? °°ˉ (6) The strategy used in Eq. (6) is depicted in Fig. 5.

Nadimi, S. & Bhanu, B (Nadimi, S. & Bhanu, B., 2004) employed a physical approach for moving shadow detection in outdoor scenes. A dichromatic reflection model and a spatio-temporal albedo normalization test are used for learning the background color and separating shadow from foreground in outdoor image sequences. According to the dichromatic reflection model, pixel value F(x,y) in the outdoor scene can be represented as follows.

12(x,y),1(x,y),1(x,y),2(x,y),1????F(x,y)=

K L (?)f(l,e,s)d ?+K L (?)d ?;33 (7)

in which the first and second items correspond to the intensiy caused by the sun and sky; K (x,y), 1 and K (x,y), 2 are the coefficient of reflectances due to sun and sky; L (x,y), 1 and L (x,y), 2 are intensity of the illumination sources of sun and sky; f(l,e,s) is geometric term; l is the incident angle of illumination; e is the angle for viewing direction; s is the angle for specular reflection. The spatio-temporal albedo H between pixel F(x,y) and its neighboring pixel (take F(x+1,y) as example) is defined as follows.

1212t+1t t+1t 12t+1t t+1t R -R ?(F(x,y),F(x +1,y)) =

;R +R F (x,y)-F (x,y)F (x +1,y)-F (x +1,y)R =;R =;F (x,y)+F (x,y)F (x +1,y)+F (x +1,y) (8) Pixel F(x,y) and F(x+1,y) is assumed to have the same reflectance if the following condition is satisfied:

1 if ?(F(x,y),F(x +1,y))

- ?ˉ (9) Cavallaro et al. (Cavallaro et al., 2005) detected shadow by exploiting color information in a selective way. In each image the relevant areas to analyze are identified and the color components that carry most of discriminating information are selected for shadow detection.

Color model has shown its powerfulness in shadow detection. Nevertheless, the foreground objects may have similar color with the moving shadows, and it becomes not reliable to detect moving shadows by using only the color information of the isolated points.

Moving Cast Shadow Detection 53 4. Texture-based shadow detection

The principle behind the textural model is that the texture of foreground objects is different with that of the background, while the texture of shaded area remains the same as that of the background.

In (Xu et al., 2005), several techniques have been developed to detect moving cast shadows in a normal indoor environment. These techniques include the generation of initial change detection masks and canny edge maps, the detection of shadow region by multi-frame integration, edge matching, conditional dilation, and post-processing (as Fig.6 illustrates).

Fig. 6. Moving cast shadow detection by using the edge information.

McKenna et al. (McKenna et al., 2000) assumed cast shadow results in significant change in intensity without much change in chromaticity. Each pixel’s chromaticity is modeled using its means and variances, and each background pixel’s first-order gradient is modeled by using gradient means and magnitude variances. The moving shadows are then classified as background if the chromaticity or gradient information supports their classification. Leone et al. (Leone et al., 2006) represented textural information in terms of redundant systems of

Vision Systems - Segmentation and Pattern Recognition

54

functions, and the shadows are discriminated from foreground objects based on a pursuit

scheme by using an over-complete dictionary. Matching Pursuit algorithm (MP) is used to

represent texture as linear combination of elements of a big set of functions, and MP selects

the best little set of atoms of 2D Gabor dictionary for features selection. Zhang et al. (Zhang

et al., 2006) used the normalized coefficients of the orthogonal transformation for moving

cast shadow detection. Five kind of orthogonal transforms (DCT, DFT, Haar Transform,

SVD, and Hadamard Transform) are analyzed, and their normalized coefficients are proved

to be illumination invariant in a small image block. The cast shadows are then detected by

using a simple threshold on the normalized coefficients (as Fig.7 illustrates).

Zhang et al. (Zhang et al., 2006) use the ratio edge for shadow detection, which are defined

as follows.

Fig. 7. Moving cast shadow detection based on the normalized coefficients of orthogonal

transformation.

?(x,y)={F(x+i,y+j)| 0

(i,j) : F(i,j)?(x,y)

; F(i,j) F(x,y)

R(x,y)=

| (11) According to the illumination model in Eq. (2), the ratio edge is proved to be illumination

Moving Cast Shadow Detection 55invariant. The shadow are then detected by imposeing a threshold on the ratio edge difference R D (x,y) defined as follows.

B S 2

D B(i,j)?(x,y)(i,j) : F(i,j)?(x,y)-;B(i,j)F(i,j)B(x,y)F(x,y)R (x,y)=∈∈§·¨??1|

(12)

Fig. 8. The textural property of ratio edge.

in which ?B (x,y) and ?S (x,y) are the neighoring region of B(x,y) and F(x,y), respectively. The ratio edge of Eq. (12) is given in Fig.8, it can be seen that ratio edge can represent the quanlity of the texture in the neighboring region.

Fung et al. (Fung et al., 2002) analyzed the characteristics of cast shadows in the luminance, chrominance, gradient density, and geometry domains, and a combined probability map is

obtained which is called as shadow confidence score (SCS), as shown in Fig. 9.

Fig. 9. Moving cast shadow detection based on shadow confidence score.

From the edge map of the input image, each edge pixel is examined to determine whether it belongs to the vehicle region based on its neighboring SCSs. The cast shadows are identified as those regions with high SCSs, which are outside the convex hull of the selected vehicle’s edge pixels.

Textural model may be the most promising technique for shadow detection, whereas the state-of-the-art of textural model are intricate in implementation. Moreover, in the

56

Vision Systems - Segmentation and Pattern Recognition homogeneous regions of the images, the textural information of the scenes may be very faint and cannot be captured by traditional methods.

5. Geometry-based shadow detection

G eometric model makes use of the camera location, the ground surface, and the object geometry, etc., to detect the moving cast shadows.

Fig. 10. The G aussian geometric shadow model used for the detection of pedestrian’s shadow.

In (Hsieh et al., 2003), G aussian shadow model was proposed to detect the shadows of pedestrian. The model is parameterized with several features including the orientation, mean intensity, and center position of a shadow region (as Fig.10 illustrates), with the orientation and centroid position being estimated from the properties of object moments. Hsieh et al. (Hsieh et al., 2004; Hsieh et al., 2006) proposed a histogram-based method to detect different lane dividing lines from traffic video sequence. According to these lines, a line-based shadow modeling process is applied to eliminate the shadows of vehicles. Two kinds of lines are used, including the ones parallel and vertical to lane directions, which can be used to eliminate shadows in the different positions of vehicles. Yoneyama et al. (Yoneyama et al., 2003; Yoneyama et al., 2005) proposed joint 2D vehicle/shadow models to suppress the moving shadows of vehicles. The proposed 2D vehicle/shadow models are classified into six types (as Fig.11 illustrates) and the parameters of these models can be estimated by fitting the segmented vehicles with these models.

Moving Cast Shadow Detection

57Fig. 11. Six vehicle model types with the corresponding cast shadow.

All these methods of geometric model strongly depend on the geometric relationships of the objects in the scenes, and when these geometric relationships change , these methods become ineffective.

6. Statistical inference for shadow model

Another useful tool for shadow detection is statistical model, which can further improve the performance of different shadow model. Most of these methods are based on the noise shadow model:

B 2a p a p F(x,y)=?(x,y)(x,y)+?(x,y); ?(x,y)~N(0,ǔ);

c +t(x,y)c cos(j)

?(x,y)=; 0?(x,y)1;c +c cos(j)???≤≤? (13)

in which t(x,y), c p , and c a are ones defined in Eq. (2).

Toth et al. (Toth et al., 2004) use the quantity given in Eq. (14) for shadow detection, which is normally distributed with variance (1+1/?2)ǔ2.

B B

B 11(x,y)-F(x,y)=?(x,y)-?(x,y);?(x,y)?(x,y)(x,y)=(x,y)+?(x,y);?? (14)

Each moving pixel is then classified into foreground object or shadow by performing a significance test. Wang et al. (Wang et al., 2003) modeled the background, shadow, and edge information as Gaussian distributions which are updated adaptively. A Bayesian framework

Vision Systems - Segmentation and Pattern Recognition 58is then utilized to describe the relationships among the segmentation label, background intensity, and edge information. Markov random field (MRF) is used to improve the spatial connectivity of the segmented regions. Nicolas et al. (Martel-Brisson, N. & Zaccarin, A., 2005) introduce Gaussian mixture model (GMM) for the detection of moving cast shadows. The proposed algorithm consists of identification the distributions that could represent shadows, modification the learning rates of the distributions to allow them to converge within the G MM, and build of a G MM for moving shadows by using identified distributions. Mikic et al. (Mikic et al., 2000) model the shadow pixel as a G aussian distribution with (μS,R , μS,G , μS,B ,ǔS,R ,ǔS,G ,ǔS,B ) being the mean and variance, while the illuminated pixel is also model as a Gaussian distribution with (μL,R , μL,G , μL,B ,ǔL,R ,ǔL,G ,ǔL,B )being the mean and variance. Let D=diag(d R ,d G ,d B ) being the camera response for the same point when it is shadowed. Therefore, we have the following relationships.

S,R R L,R S,G G L,G S,B B L,B S,R R L,R S,G G L,G S,B B L,B μ=d μ,μ=d μ,μ=d μ;

ǔ=d ǔ,ǔ=d ǔ,ǔ=d ǔ;

(15)

Fig. 12. Histogram of the normalized ratio edge difference for moving cast shadows and foreground, and comparison with Chi-square distribution.

The distribution of foreground objects is assumed to be uniform distribution. A maximum posteriori probability (MAP) is then used to classify the pixel into background(C 1),shadow(C 2), and foreground(C 3) according to its color vector ǎ:

i i i j j

j=1,2,3

p(ǎ|C )p(C )p(C |ǎ)=;p(ǎ|C )p(C )??| (16) In (Zhang et al., 2006), the distribution of the normalized background difference of ratio edge in shaded background area is also analyzed and is approximated to be a chi-square distribution. Therefore, a significance test can be used for automatic shadow detection. The distribution of R D (x,y) in Eq.(12) is depicted for moving shadows and foreground objects in Fig. 12. It can be found that ratio edge difference of moving shadows has much different distribution compared with that of foreground objects. The distribution of R D (x,y) of moving

Moving Cast Shadow Detection 59 shadows is also compared with Chi-square distribution in Fig. 12 and we can see that a good fitting can be reached.

7. Conclusion

In this chapter, we have provided a brief overview of the works about moving cast shadow detection. The state-of-the-art methods have been categories into color model, textural model, and geometric model according to the information and model utilized, which have been disscussed systemically. Furthermore, all kinds of statistical models have been employed to tackle the problem, which are also analyzed in detail. From the results, we can see that different method is fit for different situation and it is very hard to get a method in common use. Therefore, the future work may be the fusion of different information by statistical model to realize robust shadow detection.

8. References

Chien, S-Y., Ma, S-Y. & Chen L-G. (2002). Efficient moving object segmentation algorithm using background registration technique. IEEE Transactions on Circuits and Systems

for Video Technology, vol. 12, pp. 577-586.

Cucchiara, R., Grana, C., Piccardi, M. & Prati, A. (2003). Detecting moving objects, ghosts, and shadows in video streams. IEEE Transactions on Pattern Analysis and Mach ine

Intelligence. vol. 25, no. 10, pp. 1337-1342.

Cucchiara, R., G rana, C., Piccardi, M., Prati, A. & Sirotti, S. (2001). Improving Shadow Suppression in Moving Object Detection with HSV Color Information. Proceeding of

IEEE International Conference on Intelligent Transportation Systems, pp. 334-339. Fung, G. S. K., Yung, N. H. C., Pang, G. K. H. & Lai, A. H. S. (2002). Effective moving cast shadow detection for monocular color traffic image sequences. Optical Engineering,

vol. 41, no. 6, pp. 1425-1440.

Haritaoglu, I., Harwood, D. & Davis, L. S. (2000). W4: Real-Time Surveillance of People and Their Activities. IEEE Transactions Pattern Analysis and Machine Intelligence. vol. 22,

no. 8, pp. 809-830.

Horprasert, T., Harwood, D. & Davis, L.S. (1999). A Statistical Approach for Real-Time Robust Background Subtraction and Shadow Detection. Proceeding of IEEE

International Conference on Computer vision FRAME-RATE Workshop.

Hsieh, J-W., Hu, W-F., Chang, C-J. & Chen, Y-S. (2003). Shadow elimination for effective moving object detection by Gaussian shadow modeling. Image and Vision

Computing, vol. 21, pp. 505-516.

Hsieh, J-W., Yu, S-H., Chen, Y-S. & Hu, W-F. (2004). A shadow elimination method for vehicle analysis. Proceeding of IEEE International Conference on Pattern Recognition,

vol. 4, pp. 372-375.

Hsieh, J-W., Yu, S-H., Chen, Y-S. & Hu, W.-F. (2006) Automatic traffic surveillance system for vehicle tracking and classification. IEEE Transactions on Intelligent Transportation

Systems, vol. 7, no. 2, pp. 175-187.

Leone, A., Distante, C. & Buccolieri, F. (2006). A shadow elimination approach in video-surveillance context. Pattern Recognition Letters, vol. 27, no. 5, pp. 345-355.

60

Vision Systems - Segmentation and Pattern Recognition Martel-Brisson, N. & Zaccarin, A. (2005). Moving cast shadow detection from a G aussian mixture shadow model. Proceeding of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 2, pp. 643-648.

McKenna, J. S., Jabri, S., Duric, Z., Rosenfeld, A. & Wechsler H. (2000). Tracking Groups of People. Computer Vision and Image Understanding, vol. 80, pp. 42-56.

Mikic, I., Cosman, P. C., Kogut, G. T. & Trivedi, M. M. (2000). Moving shadow and object detection in traffic scenes. Proceeding of IEEE International Conference on Pattern

Recognition. vol. 1, pp. 321-324.

Nadimi S. & Bhanu B. (2004). Physical models for moving shadow and object detection in video. IEEE Transactions on Pattern Analysis and Mach ine Intelligence, vol. 26, pp.

1079-1087.

Prati, A., Mikic, I., Trivedi, M. M. & Cucchiara R. (2003). Detecting moving shadows: algorithms and evaluation. IEEE Transactions on Pattern Analysis and Mach ine Intelligence, vol. 25, pp. 918-923.

Salvador, E., Cavallaro, A. & Ebrahimi, T. (2004). Cast shadow segmentation using invariant color features. Computer Vision and Image Understanding, vol. 95, pp. 238-259. Siala, K., Chakchouk, M., Chaieb, F. & Besbes, O. (2004). Moving shadow detection with support vector domain description in the color ratios space. Proceeding of IEEE

International Conference on Pattern Recognition. vol. 4, pp. 384-387.

Stander, J., Mech, R. & Ostermann, J. (1999). Detection of moving cast shadows for object segmentation.IEEE Transactions on Multimedia, vol. 1, pp. 65-76. Thongkamwitoon, T., Aramvith, S. & Chalidabhongse, T. H. (2004). An adaptive real-time background subtraction and moving shadows detection. Proceeding of IEEE

International Conference on Multimedia and Expo. vol. 2, pp. 1459-1462.

Toth, D., Stuke, I., Wagner, A. & Aach, T. (2004). Detection of moving shadows using mean shift clustering and a significance test. Proceeding of IEEE International Conference

on Pattern Recognition, vol. 4, pp. 260-263.

Wang, Y., Tan, T. & Loe, K-F. (2003). A probabilistic method for foreground and shadow segmentation. Proceeding of IEEE International Conference on Image Processing, vol. 3,

pp. 937-940.

Xu, D., Li, X., Liu, Z. & Yuan, Y. (2005). Cast shadow detection in video segmentation.

Pattern Recognition Letters, vol. 26, pp. 91-99.

Yoneyama, A., Yeh, C. H. & Kuo, C-C. J. (2003). Moving cast shadow elimination for robust vehicle extraction based on 2D joint vehicle/shadow models. Proceeding of IEEE

International Conference on Advanced Video and Signal Based Surveillance, pp. 229-236. Yoneyama, A., Yeh, C-H. & Kuo, C-C. J. (2005). Robust vehicle and traffic information extraction for highway surveillance. EURASIP Journal on Applied Signal Processing.

vol. 2005, pp. 2305-2321.

Zhang, W., Fang, X. Z. & Xu, Y. (2006). Detection of moving cast shadows using image orthogonal transform. Proceeding of IEEE International Conference on Pattern Recognition, vol. 1, pp. 626-629.

Zhang, W., Fang, X. Z. & Yang, X. K. (2006). Moving cast shadows detection based on ratio edge. Proceeding of IEEE International Conference on Pattern Recognition, vol. 4, pp.

73-76.

1 Introduction On

On choice-o?ering imperatives Maria Aloni? 1Introduction The law of propositional logic that states the deducibility of either A or B from A is not valid for imperatives(Ross’s paradox,cf.[9]).The command (or request,advice,etc.)in(1a)does not imply(1a)(unless it is taken in its alternative-presenting sense),otherwise when told the former,I would be justi?ed in burning the letter rather then posting it. (1) a.Post this letter!? b.Post this letter or burn it! Intuitively the most natural interpretation of the second imperative is as one presenting a choice between two actions.Following[2](and[6])I call these choice-o?ering imperatives.Another example of a choice-o?ering imperative is (2)with an occurence of Free Choice‘any’which,interestingly,is licensed in this context. (2)Take any card! Like(1a),this imperative should be interpreted as carrying with it a permission that explicates the fact that a choice is being o?ered. Possibility statements behave similarly(see[8]).Sentence(3b)has a read-ing under which it cannot be deduced from(3a),and‘any’is licensed in(4). (3) a.You may post this letter.? b.You may post this letter or burn it. (4)You may take any card. In[1]I presented an analysis of modal expressions which explains the phe-nomena in(3)and(4).That analysis maintains a standard treatment of‘or’as logical disjunction(contra[11])and a Kadmon&Landman style analysis of‘any’as existential quanti?er(contra[3]and[4])assuming,however,an in-dependently motivated‘Hamblin analysis’for∨and?as introducing sets of alternative propositions.Modal expressions are treated as operators over sets of propositional alternatives.In this way,since their interpretation can depend on the alternatives introduced by‘or’(∨)or‘any’(?)in their scope,we can account for the free choice e?ect which arises in sentences like(3b)or(4).In this article I would like to extend this analysis to imperatives.The resulting theory will allow a uni?ed account of the phenomena in(1)-(4).We will start by presenting our‘alternative’analysis for inde?nites and disjunction. ?ILLC-Department of Philosophy,University of Amsterdam,NL,e-mail:M.D.Aloni@uva.nl

1.introduction

Introdution

Mike Jian

INTRODUCTION ?Section A: ?Comprises 8 two mark and 4 one mark multiple choice questions. ?Section B: ?Four 10 mark questions. ?Two 20 mark questions.

INTRODUCTION The examination is a three hour paper with 15 minutes reading and planning time. All questions are compulsory. Some questions will adopt a scenario/case study approach. All those questions will require some form of written response although questions on planning or review may require the calculation and interpretation of some basic ratios.

1.Which TWO of the following should be included in an audit engagement letter? ①Objective and scope of the audit ②Results of previous audits ③Management’s responsibilities ④Need to maintain professional scepticism A.① and ② B.① and ③ C.② and ④ D.③ and ④ (2 marks)

外文翻译关于Linux的介绍(Introduction to Linux)

毕业设计说明书 英文文献及中文翻译 学 专 指导教师: 2014 年 6 月

Introduction to Linux 1.1 History 1.1.1 UNIX In order to understand the popularity of Linux, we need to travel back in time, ab out 30 years ago... Imagine computers as big as houses, even stadiums. While the sizes of those com puters posed substantial problems, there was one thing that made this even worse: eve ry computer had a different operating system. Software was always customized to ser ve a specific purpose, and software for one given system didn't run on another system. Being able to work with one system didn't automatically mean that you could work w ith another. It was difficult, both for the users and the system administrators. Computers were extremely expensive then, and sacrifices had to be made even after th e original purchase just to get the users to understand how they worked. The total cost of IT was enormous. Technologically the world was not quite that advanced, so they had to live with t he size for another decade. In 1969, a team of developers in the Bell Labs laboratories started working on a solution for the software problem, to address these compatibility issues. They developed a new operating system, which was simple and elegant written in the C programming language instead of in assembly code able to recycle code. The Bell Labs developers named their project "UNIX." The code recycling features were very important. Until then, all commercially av ailable computer systems were written in a code specifically developed for one system . UNIX on the other hand needed only a small piece of that special code, which is now commonly named the kernel. This kernel is the only piece of code that needs to be ad apted for every specific system and forms the base of the UNIX system. The operating system and all other functions were built around this kernel and written in a higher pr ogramming language, C. This language was especially developed for creating the UNI

自我介绍(self-introduction)

自我介绍(self-introduction) ??? 1. Good morning. I am glad to be here for this interview. First let me introduce myself. My name is ***, 24. I come from ******,the capital of *******Province. I graduated from the ******* department of *****University in July ,2001.In the past two years I have been preparing for the postgraduate examination while I have been teaching *****in NO.****middle School and I was a head-teacher of a class in junior grade two. Now all my hard work has got a result since I have a chance to be interview by you . I am open-minded ,quick in thought and very fond of history.In my spare time,I have broad interests like many other youngsters.I like reading books, especially those about *******.Frequently I exchange with other people by making comments in the forum on line.

大学英语第一章

Chapter 1 A Brief Introduction to the United Kingdom I.Decide whether the following statements are true (T) or false (F). 1.Great Britain includes 3 constituent countries: England, Scotland, and Wales. 2.When people outside the UK talk about England, they mistake it as Britain sometimes. 3.Most people in Scotland speak the old Celtic language, called “Gaelic”. 4.The stereotype of the English gentleman never applied the majority of the British people. 5.The title of Prince of Wales is held by a Welsh according to tradition. 6.“Ulster”, referring to Northern Ireland, was once an ancient Irish Kingdom. 7.The majority of Irish people were descendants of the original Celtic people inhabited British Isles before the Romans arrived 2000 years ago. 8.Most British people are Protestants while most Irish people are Catholics. 9.Sinn Fein is a legal political party in Northern Ireland. 10.The Anglo-Irish Agreement of 1985 guaranteed the loyalist Protestant community their right to decide their future in Northern Ireland. II.Fill in the blanks. 1.Britain is now a ______ society which produces a population of which 1 in 20 are of ______ ethnicity. 2.Britain is a country with a history of invasions. In 43 AD Britain was invaded by ______ in the late 8th century they experienced raids from Scandinavia and in the 11th century they suffered invasions from ______. 3.Charles the First, king of Britain, was executed, because he attempted to overthrow ______ in the English Revolution. https://www.360docs.net/doc/0118865273.html, two Scottish cities which have ancient and internationally respected universities: ______ and ______. 5.Although Wales is the smallest of the three nations on the mainland, it’s good at getting ______ from abroad, particularly Japan and ______. 6.To pursue Irish independence, the most spectacular event in the Irish history was

加拿大介绍Canada Introduction

Canada Introduction Canada has a population just less than 30 million people in a country twice the area of the United States. The heritage of Canada was French and English; however, significant immigration from Asia and Europe's non-French and English countries has broadened Canada's cultural richness. This cultural diversity is considered a national asset, and the Constitution Act prohibits discrimination against individual citizens on the basis of race, color, religion, or sex. The great majority of Canadians are Christian. Although the predominant language in Canada is English, there are at least three varieties of French that are recognized: Quebecois in Quebec, Franco-Manitoban throughout Manitoba and particularly in the St. Boniface area of Winnipeg, and Acadian. The Italian language is a strong third due to a great influx of Italian immigrants following W.W.II. Canada's three major cities are distinctively, even fiercely different from one another even though each is a commercially thriving metropolitan center. Montreal, established in the 17th century and the largest French city outside France, has a strong influence of French architecture and culture. It is a financial and manufacturing center

第一章 翻译概述

Chapter I Introduction to Translation Studies Contents 1. Definitions of Translation 2. The Chinese Translation History 3. Western Translation History 1. Definitions of Translation Q: What is Translate? Its Etymology The word translation derives from the Latin translatio (which itself comes from trans- and fero, the supine form of which is latum, together meaning "to carry across" or "to bring across"). The Ancient Greek term for translation, μετ?υρασι?(metaphrasis, "a speaking across"), has supplied English with metaphrase (a "literal," or "word-for-word," translation) —as contrasted with paraphrase ("a saying in other words", from παρ?υρασι?, paraphrasis).[8] Metaphrase corresponds, in one of the more recent terminologies, to "formal equivalence"; and paraphrase, to "dynamic equivalence."[9] Strictly speaking, the concept of metaphrase —of "word-for-word translation" —is an imperfect concept, because a given word in a given language often carries more than one meaning; and because a

Chapter 1 Introduction to English Lexicology

Chapter 1 Introduction to English Lexicology I. Introduction 1. What is language? Language is a system of arbitrary vocal symbols used for human communication. It is a specific social action and a carrier of information. 2. What is linguistics? ?Generally speaking, linguistics can be defined as the scientific study of language. Major branches of linguistics phonetics (the study of the characteristics of speech sounds), phonology (the study of the sound patterns of languages), morphology (the study of the form of words), lexicology (the study of the vocabulary of a given language), syntax (the study of the rules governing the combination of words into sentences), semantics (the study of the meaning of language), pragmatics (the study of meaning in context of use) …… 3. What is lexicology? ?To put it simple, lexicology is a science of words. ?To be more exact, lexicology is a branch of linguistics concerned with the study of the vocabulary of a given language. It deals with words, their origin, development, history, structure, formation, meaning and usage (or application). II. Lexicology and Words 1. The connection of lexicology with other branches of Linguistics Morphology, Semantics, Etymology and Lexicography 2. What is a word? It can be defined as (Jackson and Amvela 2000): ? A word is an uninterruptible unit of structure consisting of one or more morpheme. Uninterruptible means that words are 'Internally stable', namely, a word, as a unit of structure can not be interrupted by other modifier elements. Or: A word is a minimal free form of a language that has a given sound, meaning and syntactic function.

英语口语集锦-介绍(introduction)

英语口语集锦-介绍(introduction) making introductions 给人作介绍 1. jane, tom. tom, jane. 2. jane, this is tom, tom, this is jane. 3. jane, i’d like you to meet my friend tom. 4. jane, have you met tom? 5. jane, do you know tom? 6. look, tom’s he re. tome, come and meet jane. 7. jane, this is tom. he’s a friend from college. 8. jane, tom is the guy i was telling you about. 9. do you know each other? 10. have you two met ? 11. have you two been introduced? 12. allow me to introduce professor linda ferguson of harvard university. 13. let me introduce our guest of honor, mr.david morris. 14. if you want to be introduced to the author, i think i can arrange it.

making a self-introduction 作自我介绍 1. may i introduce myself 2. hello, i’m hanson smith. 3. excuse me, i don’t think we’ve met. my name’s hanson smith. 4. how do you do? i’m hanson smith. 5. i’m david anderson. i don’t believe i’ve had the pleasure. 6. first let me introduce myself. i’m peter white, production manager. 7. my name is david. i work in the marketing department. after being introduced. 被介绍与对方认识后. 1. i’m glad to meet you. 很高兴认识你. 2. nice meeting you. 很高兴认识你. (平时用得最多的是nice to meet you ) 3. how nice to meet you. 认识你真高兴. 4. i’ve heard so much about you. 我知道很多关于你的事儿. 5. helen has told me all about you. 海伦对我将了好多你的事儿. 6. i’ve been wanting to meet you for some time.

英语自我介绍(self-introduction)模板

英语自我介绍例文模板: Sample1 My name is ________. I am graduate from ________ senior high school and major in ________. There are ________ people in my family. My father works in a computer company. And my mother is a housewife. I am the youngest one in my family. In my spare time, I like to read novels. I think reading could enlarge my knowledge. As for novels, I could imagine whatever I like such as a well-known scientist or a kung-fu master. In addition to reading, I also like to play PC games. A lot of grownups think playing PC games hinders the students from learning. But I think PC games could motivate me to learn something such as English or Japanese. My favorite course is English because I think it is interesting to say one thing via different sounds. I wish my English could be improved in the next four years and be able to speak fluent English in the future. Sample2: I am . I was born in . I graduate from senior high school and major in English. I started learning English since I was 12 years old. My parents ha ve a lot of American friends. That’s why I have no problem communicating with Americans or others by speaking English. In my spare time, I like to do anything relating to English such as listening to English songs, watching English movies or TV programs, or even attending the activities held by some English clubs or institutes. I used to go abroad for a short- term English study. During that time, I learned a lot of daily life English and saw a lot of different things. I think language is very interesting. I could express one substance by using different sounds. So I wish I could study and read more English literatures and enlarge my knowledge. Sample3: My name is . There are 4 people in my family. My father is a Chemistry teacher. He teaches chemistry in senior high school. My mother is an English teacher. She teaches English in the university. I have a younger brother, he is a junior high school student and is preparing for the entrance exam. I like to read English story books in my free time. Sometimes I surf the Internet and download the E- books to read. Reading E- books is fun. In addition, it also enlarges my vocabulary words because of the advanced technology and the vivid animations. I hope to study both English and computer technology because I am interested in both of the subjects. Maybe one day I could combine both of them and apply to my research in the future. Sample4: My name is . I am from . There are people in my family. My father works in a computer company. He is a computer engineer. My mother works in a international trade company. She is also a busy woman. I have a older sister and a younger brother. My sister is a junior in National Taiwan University. She majors in

用英语Introduction 介绍

Introduction 介绍 Making introductions 给人作介绍 1. Jane, Tom. Tom, Jane. 2. Jane, this is Tom, Tom, this is Jane. 3. Jane, I'd like you to meet my friend Tom. 4. Jane, have you met Tom? 5. Jane, do you know Tom? 6. Look, Tom's here. Tome, come and meet Jane. 7. Jane, this is Tom. He's a friend from college. 8. Jane, Tom is the guy I was telling you about. 9. Do you know each other? 10. Have you two met ? 11. Have you two been introduced? 12. Allow me to introduce Professor Linda Ferguson of Harvard University. 13. Let me introduce our guest of honor, Mr.David Morris. 14. If you want to be introduced to the author, I think I can arrange it. Making a self-introduction 作自我介绍 1. May I introduce myself 2. Hello, I'm Hanson Smith. 3. Excuse me, I don't think we've met. My name's Hanson Smith. 4. How do you do? I'm Hanson Smith. 5. I'm David Anderson. I don't believe I've had the pleasure. 6. First let me introduce myself. I'm Peter White, production manager. 7. My name is David. I work in the marketing department. After being introduced. 被介绍与对方认识后 1. I'm glad to meet you. 很高兴认识你。 2. Nice meeting you. 很高兴认识你。 3. How nice to meet you. 认识你真高兴。 4. I've heard so much about you. 我知道很多关于你的事儿。 5. Helen has told me all about you.

希腊罗马神话1. Introduction

1 Introduction Greco-Roman mythology is the cultural reception of myths from the ancient Greeks and Romans. Along with philosophy and political thought, mythology represents one of the major survivals of classical antiquity throughout later Western culture. Greek mythology is the body of myths and legends belonging to the ancient Greeks, concerning their gods and heroes, the nature of the world, and the origins and significance of their own cult and ritual practices. They were a part of religion in ancient Greece and are part of religion in modern Greece and around the world as Hellenismos. Modern scholars refer to, and study the myths in an attempt to throw light on the religious and political institutions of Ancient Greece, its civilization, and to gain understanding of the nature of myth-making itself. Roman mythology is the combination of the beliefs, the rituals, and the observances of supernatural occurrences by the ancient Romans from early periods until Christianity finally completely replaced the native religions of the Roman Empire. The religion of the early Romans was so changed by the addition of numerous and conflicting beliefs in later times, and by the assimilation of a vast amount of Greek mythology, that it cannot be ever reconstructed precisely. This was because of the extensive changes in the religion before the literary tradition began. Most of the Greek deities were adopted by the Romans, although in many cases there was a change of name. Much of what became Roman mythology was borrowed from Greek mythology at a later date, as Greek gods were associated with their Roman counterparts. Greek mythology is embodied, explicitly, in a large collection of narratives, and implicitly in Greek representational arts, such as vase-paintings and votive gifts. Greek myth attempts to explain the origins of the world, and details the lives and adventures of a wide variety of gods, goddesses, heroes, heroines, and mythological creatures. These accounts initially were disseminated in an oral-poetic tradition; today the Greek myths are known primarily from Greek literature. The oldest known Greek literary sources, the epic poems Iliad and Odyssey, focus on events surrounding the Trojan War. Two poems by Homer's near contemporary Hesiod, the Theogony and the Works and Days, contain accounts of the genesis of the world, the

相关文档
最新文档