On the unusual effectiveness of Logic in computer science

On the unusual effectiveness of Logic in computer science
On the unusual effectiveness of Logic in computer science

On the Unusual Effectiveness of Logic in Computer Science

Joseph Y.Halpern Robert Harper Neil Immerman Phokion G.Kolaitis

Moshe Y.Vardi Victor Vianu

January2001

1Introduction and Overview

In1960,E.P.Wigner,a joint winner of the1963Nobel Prize for Physics,published a paper titled On the Un-reasonable Effectiveness of Mathematics in the Natural Sciences[Wig60].This paper can be construed as an examination and af?rmation of Galileo’s tenet that“The book of nature is written in the language of mathe-matics”.To this effect,Wigner presented a large number of examples that demonstrate the effectiveness of mathematics in accurately describing physical phenomena.Wigner viewed these examples as illustrations of what he called the empirical law of epistemology,which asserts that the mathematical formulation of the laws of nature is both appropriate and accurate,and that mathematics is actually the correct language for formulating the laws of nature.At the same time,Wigner pointed out that the reasons for the success of mathematics in the natural sciences are not completely understood;in fact,he went as far as asserting that“...the enormous usefulness of mathematics in the natural sciences is something bordering on the mysterious and there is no rational explanation for it.”

In1980,R.W.Hamming,winner of the1968ACM Turing Award for Computer Science,published a follow-up article,titled The Unreasonable Effectiveness of Mathematics[Ham80].In this article,Hamming provided further examples manifesting the effectiveness of mathematics in the natural sciences.Moreover, he attempted to answer the“implied question”in Wigner’s article:“Why is mathematics so unreasonably effective?”Although Hamming offered several partial explanations,at the end he concluded that on balance this question remains“essentially unanswered”.

Since the time of the publication of Wigner’s article,computer science has undergone a rapid,wide-ranging,and far-reaching development.Just as in the natural sciences,mathematics has been highly effective in computer science.In particular,several areas of mathematics,including linear algebra,number theory, probability theory,graph theory,and combinatorics,have been instrumental in the development of computer science.Unlike the natural sciences,however,computer science has also bene?tted from an extensive and continuous interaction with logic.As a matter of fact,logic has turned out to be signi?cantly more effective in computer science than it has been in mathematics.This is quite remarkable,especially since much of the impetus for the development of logic during the past one hundred years came from mathematics.

Indeed,let us recall that to a large extent mathematical logic was developed in an attempt to confront the crisis in the foundations of mathematics that emerged around the turn of the20th Century.Between1900 and1930,this development was spearheaded by Hilbert’s Program,whose main aim was to formalize all of mathematics and establish that mathematics is complete and https://www.360docs.net/doc/e27409008.html,rmally,completeness means that all“true”mathematical statements can be“proved”,whereas decidability means that there is a mechanical rule to determine whether a given mathematical statement is“true”or“false”.Hilbert?rmly believed that these ambitious goals could be achieved.Nonetheless,Hilbert’s Program was dealt devastating blows during the1930s.Indeed,the standard?rst-order axioms of arithmetic were shown to be incomplete by G¨o del in his celebrated1931paper[G¨o d31].Furthermore,A.Turing,A.Church,and A.Tarski demonstrated the undecidability of?rst-order logic.Speci?cally,the set of all valid?rst-order sentences was shown to be undecidable[Chu36,Tur37],whereas the set of all?rst-order sentences that are true in arithmetic was shown to be highly undecidable[Tar35].

Today,mathematical logic is a mature and highly sophisticated research area with deep results and a number of applications in certain areas of mathematics.All in all,however,it is fair to say that the interaction between logic and mathematics has been rather limited.In particular,mathematical logic is not perceived as one of the mainstream area of mathematics,and the“typical”mathematician usually knows little about logic.Along these lines,R.W.Hamming’s judgment[Ham80]is not uncommon,albeit perhaps severe:“...we have had an intense study of what is called the foundations of mathematics...It is an interesting ?eld,but the main results of mathematics are impervious to what is found there.”

In contrast,logic has permeated through computer science during the past thirty years much more than it has through mathematics during the past one hundred years.Indeed,at present concepts and methods of logic occupy a central place in computer science,insomuch that logic has been called“the calculus of computer science”[MW85].Our goal in this article is to illustrate the effectiveness of logic in computer science by focusing on just a few of the many areas of computer science on which logic has had a de?nite and lasting impact.Speci?cally,the connections between logic and computational complexity will be high-lighted in Section2,the successful use of?rst-order logic as a database query language will be illustrated in Section3,the in?uence of type theory in programming language research will be addressed in Section4,the deployment of epistemic logic to reason about knowledge in multi-agent systems will be covered in Section 5,and the connections between logic and automated design veri?cation will be presented in Section6.

2Descriptive Complexity

A fundamental issue in theoretical computer science is the computational complexity of problems.How much time and how much memory space is needed to solve a particular problem?

Let DTIME be the set of problems that can be solved by algorithms that perform at most

steps for inputs of size.The complexity class Polynomial Time(P)is the set of problems that are solvable in time at most some polynomial in.Formally,P DTIME.

Some important computational problems appear to require more than polynomial time.An interesting class of such problems is contained in nondeterministic polynomial time(NP).A nondeterministic compu-tation is one that may make arbitrary choices as it works.If any of these choices lead to an accept state,then we say the input is accepted.

The three-colorability problem—testing whether an undirected graph can have its vertices colored with three colors so that no two adjacent vertices have the same color—as well as hundreds of other well-known combinatorial problems are NP-complete.(See[GJ79]for a survey of many of these.)This means that not only are they in NP,but they are the“hardest problems”in NP:all problems in NP are reducible(in polynomial time)to each NP-complete problem.At present,the fastest known algorithm for any of these problems is exponential.An ef?cient algorithm for any one of these problems would translate to an ef?cient

algorithm for all of them.The P NP question,which asks whether P and NP coincide,is an example of our inability to determine what can or cannot be computed in a certain amount of computational resource: time,space,parallel time,etc.

Complexity theory typically considers yes/no problems.This is the examination of the dif?culty of computing a particular bit of the desired output.Yes/no problems are properties of the input.The set of all inputs to which the answer is“yes”have the property in question.Rather than asking the complexity of checking if a certain input has a property,in Descriptive Complexity we ask how hard is it to express the property in some logic.It is plausible that properties that are harder to check might be harder to express. What is surprising is how closely logic mimics computation:descriptive complexity exactly captures the important complexity classes.

In Descriptive Complexity we view inputs as?nite logical structures,e.g.,a graph is a logical structure

whose universe is the set of vertices and is the binary edge relation. Proviso:We will assume unless otherwise stated that a total ordering relation on the universe()is avail-able.

In?rst-order logic we can express simple properties of our input structures.For example the following says that there are exactly two edges leaving every vertex.

In second-order logic we also have variables that range over relations over the universe.These variables may be quanti?ed.A second-order existential formula(SO)begins with second order existential quanti?ers and is followed by a?rst-order formula.As an example,the following second-order existential sentence says that the graph in question is three-colorable.It does this by asserting that there are three unary relations,Red(R),Yellow(Y),and Blue(B),de?ned on the universe of vertices.It goes on to say that every vertex has some color and no two adjacent vertices have the same color.

Descriptive Complexity began with the following theorem of R.Fagin.Observe that Fagin’s Theorem characterizes the complexity class NP purely by logic,with no mention of machines or time,

Theorem1([Fag74])A set of structures is in NP iff there exists a second-order existential formula, such that.Formally,NP SO.

De?ne CRAM to be the set of properties checkable by concurrent-read,concurrent-write,parallel random-access machines using polynomially many processors in parallel time.FO,the set of?rst-order expressible properties,exactly captures the complexity class CRAM[1],i.e.,constant parallel time.It is possible to increase the power of FO by allowing longer descriptions for longer inputs.Let FO be those properties describable by a block of restricted quanti?ers that may be iterated times for inputs of size.

Theorem2([Imm88])For all constructible1,FO CRAM.

Thus,parallel time corresponds exactly to?rst-order iteration,i.e.,quanti?er-depth.Rather than iterating blocks of quanti?ers,a natural way to increase the power of?rst-order logic is by allowing inductive de?ni-tions.This is formalized via a least-?xed-point operator(LFP).

As an example,the re?exive,transitive closure of the edge relation can be de?ned via the following inductive de?nition,

Equivalently,this can be expressed using the least-?xed-point operator,

LFP

It is exciting that the natural descriptive class FO(LFP)—?rst-order logic extended with the power to de?ne new relations by induction—precisely captures polynomial time.

Theorem3([Imm82,Imm86,Var82])A problem is in polynomial time iff it is describable in?rst-order logic with the addition of the least-?xed-point operator.This is equivalent to being expressible by a?rst-order formula iterated polynomially many times.Formally,P FO LFP FO.

Theorems1and3cast the P NP question in a different light.(In the following we are using the fact that if P were equal to NP,then NP would be closed under complementation.It would then follow that every second-order formula would be equivalent to a second-order existential one.)

Corollary4P is equal to NP iff every second-order expressible property over?nite,ordered structures is al-ready expressible in?rst-order logic using inductive de?nitions.In symbols,P NP FO LFP SO.

The following theorem considers the arbitrary iteration of?rst-order formulas,which is the same as iterating them exponentially,and is more general than monotone iteration of?rst-order formulas.Such iteration de?nes the partial-?xed-point operator.The theorem shows that this allows the description of exactly all properties computable using a polynomial amount of space.

Theorem5([Imm81,Imm82,Var82])A problem is in polynomial space iff it is describable in?rst logic with the addition of the partial-?xed-point operator.This is equivalent to being expressible by a?rst-order formula iterated exponentially.Formally,PSPACE FO PFP FO.

A re?nement of Theorem5shows that the precise amount of space used can be characterized via the number of distinct variables in the relevant?rst-order formula,i.e.,the number of descriptive variables captures space,for,DSPACE V AR,[Imm91].

Combinatorial games due to Ehrenfeucht and Fra¨?ss′e have been used to prove many inexpressibility results.These bounds provide useful insights but they do not separate relevant complexity classes because they are proved without the ordering relation[Ehr61,Fra54,Imm99].No such lower bounds were known for separating the classes corresponding to P and PSPACE.Abiteboul and Vianu showed why,thus proving another fundamental relationship between logic and complexity.In the following,FO(wo)means?rst-order logic without a given ordering relation.

Theorem6([A V91])The following conditions are equivalent:

1.FO(wo)LFP FO(wo)PFP

2.FO LFP FO PFP

3.P PSPACE

Descriptive complexity reveals a simple but elegant view of computation.Natural complexity classes and measures such as polynomial time,nondeterministic polynomial time,parallel time,and space have natural descriptive characterizations.Thus,logic has been an effective tool for answering some of the basic questions in complexity.2

3Logic as a Database Query Language

The database area is an important area of computer science concerned with storing,querying and updating large amounts of data.Logic and databases have been intimately connected since the birth of database systems in the early1970’s.Their relationship is an unquali?ed success story.Indeed,?rst-order logic (FO)lies at the core of modern database systems,and the standard query languages such as Structured Query Language(SQL)and Query-By-Example(QBE)are syntactic variants of FO.More powerful query languages are based on extensions of FO with recursion,and are reminiscent of the well-known?xpoint queries studied in?nite-model theory(see Section2).The impact of logic on databases is one of the most striking examples of the effectiveness of logic in computer science.

This section discusses the question of why FO has turned out to be so successful as a query language. We will focus on three main reasons:

FO has syntactic variants that are easy to use.These are used as basic building blocks in practical languages like SQL and QBE.

FO can be ef?ciently implemented using relational algebra,which provides a set of simple operations on relations expressing all FO queries.Relational algebra as used in the context of databases was introduced by Ted Codd in[Cod70].It is related to Tarski’s Cylindric Algebras[HMT71].The algebra turns out to yield a crucial advantage when large amounts of data are concerned.Indeed,the realization by Codd that the algebra can be used to ef?ciently implement FO queries gave the initial impetus to the birth of relational database systems3.

FO queries have the potential for“perfect scaling”to large databases.If massive parallelism is avail-able,FO queries can in principle be evaluated in constant time,independent of the database size.

A relational database can be viewed as a?nite relational structure.Its signature is much like a relational FO signature,with the minor difference that relations and their coordinates have names.The name of a coordinate is called an attribute,and the set of attributes of a relation is denoted.For example,a “beer drinker’s”database might consist of the following relations:

frequents

Joe Molly’s serves

King’s Bud

The main use of a database is to query its data,e.g.,?nd the drinkers who frequent only bars serving Bass.It turns out that each query expressible in FO can be broken down into a sequence of simple subqueries.

Each subquery produces an intermediate result,that may be used by subsequent subqueries.A subquery is of the form:

where is a literal or,is in the input or is on the left-hand side of a previous subquery in the sequence,and is not in the input and does not occur previously in the sequence.The meaning of such a subquery is to assign to the result of the FO query on the structure resulting from the evaluation of the previous subqueries in the sequence.The subqueries provide appealing building blocks for FO queries.This is illustrated by the language QBE,in which a query is formulated as just described.For example,consider the following query on the“beer drinker’s”database:

Find the drinkers who frequent some bar serving Bass.

This can be expressed by a single query of the above form:

answer frequents serves Bass

In QBE,the query is formulated in a visually appealing way as follows:

answer drinker bar serves

The FO queries turn out to be extremely well-behaved with respect to scaling.Given suf?cient resources,

response time can in principle be kept constant as the database becomes larger.The key to this remarkable

property is parallel processing.Admittedly,a lot of processors are needed to achieve this ideal behaviour

:polynomial in the size of the database.This is unlikely to be feasible in practice any time soon.The key

point,however,is that FO query evaluation admits linear scaling;the speed-up is proportional to the number

of parallel processors used.

Once again,relational algebra plays a crucial role in the parallel implementation of FO.Indeed,the

algebra operations are set oriented,and thus highlight the intrinsic parallelism in FO queries.For example,

consider the projection.The key observation is that one can project the tuples in independently

of each other.Given one processor for each tuple in,the projection can be computed in constant time, independent of the number of tuples.As a second example,consider the join.This can be computed

by joining all pairs of tuples from and,independently of each other.Thus,if one processor is available for each pair,the join can be computed in constant time,independent on the number of tuples in and.

Since each algebra operation can be evaluated in constant parallel time,each algebra query can also be

evaluated in constant time.The constant depends only on the query and is independent of the size of the

database.Of course,more and more processors are needed as the database grows.

In practice,the massive parallelism required to achieve perfect scaling is not available.Nevertheless,

there are algorithms that can take optimal advantage of a given set of processors.It is also worth noting that

the processors implementing the algebra need not be powerful,as they are only required to perform very

speci?c,simple operations on tuples.In fact,it is suf?cient to have processors that can implement the basic

Boolean circuit operations.This fact is formalized by a result due to Immerman[Imm87]stating that FO

is included in AC,the class of problems solvable by circuits of constant depth and polynomial size,with

unbounded fan-in.

In conclusion,logic has proven to be a spectacularly effective tool in the database area.FO provides the

basis for the standard query languages,because of its ease of use and ef?cient implementation via relational

algebra.FO can achieve linear scaling,given parallel processing resources.Thus,its full potential as a query

language remains yet to be realized.

A good introduction to the database area may be found in[SKS97],while[Ull88]provides a more

in-depth presentation.The?rst text on database theory is[Mai83],followed more recently by[AHV95].

The latter text also described database query languages beyond FO,including?xpoint logics.An excellent

survey of relational database theory is provided in[Kan91].The relationship between?nite-model theory

and databases is discussed in[Via].

4Type Theory in Programming Language Research

In the1980’s and1990’s the study of programming languages was revolutionized by a remarkable con?uence

of ideas from mathematical and philosophical logic and theoretical computer science.Type theory emerged

as a unifying conceptual framework for the design,analysis,and implementation of programming languages.

Type theory helps to clarify subtle concepts such as data abstraction,polymorphism,and inheritance.It

provides a foundation for developing logics of program behavior that are essential for reasoning about

programs.It suggests new techniques for implementing compilers that improve the ef?ciency and integrity

of generated code.

Type theory is the study of type systems.Reynolds de?nes a type system to be a“syntactic discipline

for enforcing levels of abstraction”[Rey85].A type system is a form of context-sensitive grammar that

imposes restrictions on the formation of programs to ensure that a large class of errors,those that arise from

misinterpretation of values,cannot occur.Examples of such errors are:applying a function on the integers

to a boolean argument;treating an integer as a pointer to a data structure or a region of executable code;

int bool

true false=if then else

fun(:):is()

true false fun(:):is

The operator ranges over the arithmetic operations,,and.

The variable ranges over numerals for the natural numbers.

The variables and are bound in the expression fun(:):is.

Figure1:Abstract Syntax of MinML

int int

int

true bool

bool

=bool

fun(:):is

===true false

()()

fun(:):is

of distinct concepts.Traditional concepts such as“call-by-reference”parameter passing emerge instead as functions that take values of reference type.Second,type structure can be exploited to reason about program behavior.For example,the technique of logical relations,which interprets types as relations between values, may be used to characterize interchangeability of program fragments.Third,it becomes possible(as outlined above)to give a precise statement and proof of safety properties of a programming language.Moreover,the type annotations on programs form a certi?cate of safety that can be checked prior to execution of the program.Fourth,types may be exploited by a compiler to improve run-time ef?ciency and to provide a “self-check”on the integrity of the compiler itself[TMC96].

5Reasoning about Knowledge

The formal study of epistemic logic was initiated in the1950s and led to Hintikka’s seminal book Knowledge and Belief[Hin62].The1960s saw a?ourishing of interest in the area in the philosophy community.More recently,reasoning about knowledge has been shown to play a key role in such diverse?elds as distributed computing,game theory,and AI.The key concern is the connection between knowledge and action.What does a robot need to know in order to open a safe?What do processes need to know about other processes in order to coordinate an action?What do agents need to know about other agents to carry on a conversation? The formal model used by the philosophers provide the basis for an appropriate analysis of these questions.

We brie?y review the model here,just to show how it can be used.The syntax is straightforward.We start with a set of primitive propositions,where a primitive proposition represents a basic fact of interest like“it is raining in Spain”and a set of agents.We then close off under conjunction and negation,as in propositional logic,and modal operators,,and,where is read“agent knows”,is read“everyone knows”and is read“is common knowledge.Thus,a statement such as says“agent1knows agent2knows,but agent2does not know that1 knows that2knows”.More colloquially:“I know that you know it,but you don’t know that I know that you know it.”

The semantics for this logic,like that of other modal logics,is based on possible worlds.The idea is that,given her current information,an agent may not be able to tell which of a number of possible worlds describes the actual state of affairs.We say that the agent knows a fact if is true in all the worlds she considers possible.We formalize this intuition using Kripke structures.A Kripke structure4for agents is a tuple,where is a set of possible worlds,is a binary relation on—that is,a set of pairs,and associates with each world a truth assignment to the primitive propositions(that is,for each primitive proposition and world). Intuitively,if,in world,agent considers world possible.

We can de?ne,read“is true in world in structure”,by induction on the structure of formulas:

(for a primitive proposition)iff

iff and

iff

iff for all

iff for

iff for,where is de?ned inductively by taking and.

Note how the semantics of captures the intuition that agent knows exactly if is true at all the worlds he considers possible.Clearly is true iff is true for each agent.Finally,is true iff everyone knows,everyone knows that everyone knows,and so on.

What is the appropriate structure for analyzing a complicated multi-agent system?It turns out that a natural model for multi-agent systems can be viewed as a Kripke structure.(The phrase“system”is intended to be interpreted rather loosely here.Players in a poker game,agents conducting a bargaining session,robots interacting to clean a house,and processes in a computing system can all be viewed as multi-agent systems.)Assume that,at all times,each of the agents in the system can be viewed as being in some local state.Intuitively,the local state encapsulates all the relevant information to which the agent has access. In addition,there is an environment,whose state encodes relevant aspects of the system that are not part of the agents’local states.For example,if we are modeling a robot that navigates in some of?ce building,we might encode the robot’s sensor input as part of the robot’s local state.If the robot is uncertain about its position,we would encode this position in the environment state.A global state of a system with agents is an-tuple of the form,where is the state of the environment and is the local state of agent.

A system is not a static entity;it changes over time.A run is a complete description of what happens over time in one possible execution of the system.For de?niteness,we take time to range over the natural numbers.Thus,formally,a run is a function from the natural numbers to global states.Given a run, describes the initial global state of the system in,describes the next global state,and so on.We refer to a pair consisting of a run and time as a point.If,we de?ne ,;thus,is agent’s local state at the point.

The points in a system can be viewed as the states in a Kripke structure.Moreover,we can de?ne a natural relation:agent thinks is possible at if;that is,the agent has the same local state at both points.Intuitively,the local state encodes whatever the agent remembers about the run.An interpreted system consists of a pair,where is a system and associates with each point in a truth assignment to the primitive propositions in some appropriately chosen set of primitive propositions.We can now de?ne truth of epistemic formulas at a point in an interpreted system just as we did for a Kripke structure.That is,an interpreted system can be viewed as a set of possible worlds,with the points acting as the worlds.5In particular,we have

if for all such that.

As an example of how this framework can be used in analyzing distributed protocols,consider the coordinated attack problem,from the distributed systems folklore[Gra78].It abstracts a problem of data recovery management that arises when using standard protocols in database management called commit protocols.The following presentation is taken from[HM90]:

Two divisions of an army are camped on two hilltops overlooking a common valley.In the

valley awaits the enemy.It is clear that if both divisions attack the enemy simultaneously they

will win the battle,whereas if only one division attacks it will be defeated.The generals do not

initially have plans for launching an attack on the enemy,and the commanding general of the

?rst division wishes to coordinate a simultaneous attack(at some time the next day).Neither

general will decide to attack unless he is sure that the other will attack with him.The generals

can only communicate by means of a messenger.Normally,it takes the messenger one hour to

get from one encampment to the other.However,it is possible that he will get lost in the dark

or,worse yet,be captured by the enemy.Fortunately,on this particular night,everything goes

smoothly.How long will it take them to coordinate an attack?

Suppose the messenger sent by General makes it to General with a message saying“Let’s attack at dawn”.Will General attack?Of course not,since General does not know that got the message, and thus may not attack.So General sends the messenger back with an acknowledgment.Suppose the messenger makes it.Will General attack?No,because now General does not know that General got the message,so General thinks General may think that didn’t get the original message,and thus not attack.So sends the messenger back with an acknowledgment.But of course,this is not enough either.

In terms of knowledge,each time the messenger makes a transit,the depth of the generals’knowl-edge increases by one.Suppose we let the primitive proposition stand for“A message saying‘Attack at dawn’was sent by General.”When General gets the message,holds.When gets’s acknowledgment,holds.The next acknowledgment brings us to.Although more acknowledgments keep increasing the depth of knowledge,it is not hard to show that by following this protocol,the generals never attain common knowledge that the attack is to be held at dawn.

What happens if the generals use a different protocol?That does not help either.As long as there is a possibility that the messenger may get captured or lost,then common knowledge is not attained,even if the messenger in fact does deliver his messages.It would take us too far a?eld here to completely formalize these results(see[HM90]for details),but we can give a rough description.We say a system displays unbounded message delays if,roughly speaking,whenever there is a run such that process receives a message at time in,then for all,there is another run that is identical to up to time except that process receives no messages at time,and no process receives a message between times and.

Theorem2:[HM90]In any run of a system that displays unbounded message delays,it can never be common knowledge that a message has been delivered.

This says that no matter how many messages arrive,we cannot attain common knowledge of message delivery.But what does this have to do with coordinated attack?The fact that the generals have no initial plans for attack means that in the absence of message delivery,they will not attack.Since it can never become common knowledge that a message has been delivered,and message delivery is a prerequisite for attack,it is not hard to show that it can never become common knowledge among the generals that they are attacking.More precisely,let attack be a primitive proposition that is true precisely at points where both generals attack.

Corollary3:In any run of a system that displays unbounded message delays,it can never be common knowledge among the generals that they are attacking;i.e.,never holds.

We still do not seem to have dealt with our original problem.What is the connection between common knowledge of an attack and coordinated attack?As the following theorem shows,it is quite https://www.360docs.net/doc/e27409008.html,mon knowledge is a prerequisite for coordination in any system for coordinated attack,that is,in any system that is the set of runs of a protocol for coordinated attack.

Theorem4:[HM90]In any system for coordinated attack,when the generals attack,it is common knowl-edge among the generals that they are attacking.Thus,if is an interpreted system for coordinated attack, then at every point of,we have

Putting together Corollary3and Theorem4,we get the following corollary.

Corollary5:In any system for coordinated attack that displays unbounded message delays,the generals never attack.

This negative result shows the power of the approach as a means of understanding the essence of coor-dination.There are positive results showing how this approach can be used to verify,analyze,and reason about distributed protocols.Of course,this brief discussion has only scratched the surface of the topic.For more details and further references,the interested reader should consult Fagin,Halpern,Moses,and Vardi’s book[FHMV95].

6Automated Veri?cation of Semiconductor Designs

The recent growth in computer power and connectivity has changed the face of science and engineering,and is changing the way business is being conducted.This revolution is driven by the unrelenting advances in semiconductor manufacturing technology.Nevertheless,the U.S.semiconductor community faces a serious challenge:chip designers are?nding it increasingly dif?cult to keep up with the advances in semiconductor manufacturing.As a result,they are unable to exploit the enormous capacity that this technology provides. The International Technology Roadmap for Semiconductors6suggests that the semiconductor industry will require productivity gains greater than the historical20%per-year to keep up with the increasing complexity of semiconductor designs.This is referred to as the“design productivity crisis”.As designs grow more com-plex,it becomes easier to introduce?aws into the design.Thus,designers use various validation techniques to verify the correctness of the design.Unfortunately,these techniques themselves grow more expensive and dif?cult with design complexity.As the validation process has begun to consume more than half the project design resources,the semiconductor industry has begun to refer to this problem as the“validation crisis”.

Formal veri?cation is a process in which mathematical techniques are used to guarantee the correctness of a design with respect to some speci?ed behavior.Algorithmic formal-veri?cation tools,based on model-checking technology[CES86,LP85,QS81,VW86]have enjoyed a substantial and growing use over the last few years,showing an ability to discover subtle?aws that result from extremely improbable events.While until recently these tools were viewed as of academic interest only,they are now routinely used in industrial applications,resulting in decreased time to market and increased product integrity[Kur97].

The?rst step in formal veri?cation is to come up with a formal speci?cation of the design,consisting of a description of the desired behavior.One of the more widely used speci?cation languages for designs is temporal logic[Pnu77].In linear temporal logics,time is treated as if each moment in time has a unique possible future.Thus,linear temporal formulas are interpreted over linear sequences,and we regard them as describing the behavior of a single computation of a system.

In the linear temporal logic LTL,formulas are constructed from a set of atomic propositions using the usual Boolean connectives as well as the unary temporal connective(“next”),(“eventually”), (“always”),and the binary temporal connective(“until”).For example,the LTL formula request grant,which refers to the atomic propositions request and grant,is true in a computation precisely when every state in the computation in which request holds is followed by some state in the future in which grant holds.The LTL formula request request grant is true in a computation precisely if,whenever request holds in a state of the computation,it holds until a state in which grant holds is reached.

LTL is interpreted over computations,which can be viewed as in?nite sequences of truth assignments to the atomic propositions;i.e.,a computation is a function N that assigns truth values to the elements of at each time instant(natural number).For a computation and a point N,the notation indicates that a formula holds at the point of the computation.For example,iff

SIA

,and and iff for some,we have and for all k,,we have .We say that satis?es a formula,denoted,iff.The connectives and can be de?ned in terms of the connective:is de?ned as,and is de?ned as.

Designs can be described in a variety of formal description formalisms.Regardless of the formalism used,a?nite-state design can be abstractly viewed as a labeled transition system,i.e.,as a structure of the form,where is the?nite set of states that the system can be in,is the set of initial states of the system,is a transition relation that indicates the allowable state transitions of the system,and assigns truth values to the atomic propositions in each state of the system.

(A labeled transition system is essentially a Kripke structure.)A path in that starts at is a possible in?nite behavior of the system starting at,i.e.,it is an in?nite sequence of states in such that ,and for all.The sequence is a computation of that starts at. It is the sequence of truth assignments visited by the path,The language of,denoted consists of all computations of that start at a state in.Note that can be viewed as a language of in?nite words over the alphabet.can be viewed as an abstract description of a system,describing all possible“traces”.We say that satis?es an LTL formula if all computations in satisfy,that is, if models.

One of the major approaches to automated veri?cation is the automata-theoretic approach,which un-derlies model checkers such as SPIN[Hol97]and Cadence SMV7.The key idea underlying the automata-theoretic approach is that,given an LTL formula,it is possible to construct a?nite-state automaton on in?nite words that accepts precisely all computations that satisfy[VW94].The type of?nite au-tomata on in?nite words we consider is the one de?ned by B¨u chi[B¨u c62].A B¨u chi automaton is a tuple ,where is a?nite alphabet,is a?nite set of states,is a set of initial states,

is a nondeterministic transition function,and is a set of accepting states.A run of over an in?nite word,is a sequence,where and for all.A run is accepting if there is some accepting state that repeats in?nitely often,i.e.,for some there are in?nitely many’s such that.The in?nite word is accepted by if there is an accepting run of over.The language of in?nite words accepted by is denoted.The following fact establishes the correspondence between LTL and B¨u chi automata:Given an LTL formula,one can build a B¨u chi automaton,where and,such that is exactly the set of computations satisfying the formula[VW94].

This correspondence reduces the veri?cation problem to an automata-theoretic problem as follows [VW86].Suppose that we are given a system and an LTL formula.We check whether models as follows:(1)construct the automaton that corresponds to the negation of the formula, (2)take the cross product of the system and the automaton to obtain an automaton,such that

,and(3)check whether the language is nonempty,i.e.,whether accepts some input.If it does not,then the design is correct.If it does,then the design is incorrect and the accepted input is an incorrect computation.The incorrect computation is presented to the user as a?nite trace,possibly followed by a cycle.Thus,once the automaton is constructed,the veri?ca-tion task is reduced to automata-theoretic problems,namely,intersecting automata and testing emptiness of automata,which have highly ef?cient solutions[Var96].Furthermore,using data structures that enable compact representation of very large state space makes it possible to verify designs of signi?cant complexity [BCM92].

The linear-time framework is not limited to using LTL as a speci?cation language.There are those who prefer to use automata on in?nite words as a speci?cation formalism[VW94];in fact,this is the approach of COSPAN[Kur94].In this approach,we are given a design represented as a?nite transition system and a property represented by a B¨u chi(or a related variant)automaton.The design is correct if

all computations in are accepted by,i.e.,.This approach is called the language-containment approach.To verify with respect to,we:(1)construct the automaton that complements ,(2)take the product of the system and the automaton to obtain an automaton,and(3)check that the automaton is nonempty.As before,the design is correct iff is empty.Thus,the veri?cation task is again reduced to automata-theoretic problems,namely intersecting and complementing automata and testing emptiness of automata.

Over the last few years,automated formal veri?cation tools,such as model checkers,have shown their ability to provide a thorough analysis of reasonably complex designs[Goe97].Companies such as AT&T, Cadence,Fujitsu,HP,IBM,Intel,Motorola,NEC,SGI,Siemens,and Sun are using model checkers increas-ingly on their own designs to reduce time to market and ensure product quality.

7Concluding Remarks

It should be made clear that we are not the?rst ones to single out the effectiveness of logic in computer science.In fact,already back in1988M.Davis wrote an eloquent essay on the In?uences of Logic in Com-puter Science[Dav88],which begins by stating that“When I was a student,even the topologists regarded mathematical logicians as living in outer space.Today the connections between logic and computers are a matter of engineering practice at every level of computer organization.”Davis proceeds then to examine how certain fundamental concepts from logic have found crucial uses in computer science.In particular,Davis adresses the connections between Boolean logic and digital circuits,discusses the in?uence of logic on the design of programming languages,and comments on the relationship between logic programming and automated theorem-proving.More recently,Davis wrote a book titled The Universal Computer[Dav00] in which he presents the fundamental connection between logic and computation by tracing the lives and contributions of Leibniz,Boole,Frege,Cantor,Hilbert,G¨o del,and Turing.

The effectiveness of logic in computer science is not by any means limited to the areas mentioned in here.As a matter of fact,it spans a wide spectrum of areas,from arti?cial intelligence to software engineering.Overall,logic provides computer science with both a unifying foundational framework and a powerful tool for modeling and reasoning about aspects of https://www.360docs.net/doc/e27409008.html,puter science is concerned with phenomena that are usually described as“synthetic”,because for the most part they are a human creation,unlike the phenomena studied in the natural sciences.This difference between computer science and the natural sciences can provide an explanation as to why the use of logic in computer science is both appropriate and successful.Thus,the effectiveness of logic in computer science is perhaps not mysterious or unreasonable,but still quite remarkable and unusual.

Acknowledgments.We are grateful to Susan Landau for suggesting to us the topic of this article.

References

[AHV95]S.Abiteboul,R.Hull,and V.Vianu.Foundations of Databases.Addison-Wesley,Reading-Massachusetts,1995.

[A V91]S.Abiteboul and V.Vianu.Generic computation and its complexity.In Proc.23rd ACM Symp.

on Theory of Computing,pages209–219,1991.

[BCM92]J.R.Burch,E.M.Clarke,K.L.McMillan,D.L.Dill,and L.J.Hwang.Symbolic model checking: states and https://www.360docs.net/doc/e27409008.html,rmation and Computation,98(2):142–170,June1992.

[B¨u c62]J.R.B¨u chi.On a decision method in restricted second order arithmetic.In Proc.Internat.

Congr.Logic,Method.and Philos.Sci.1960,pages1–12,Stanford,1962.Stanford University

Press.

[CES86] E.M.Clarke,E.A.Emerson,and A.P.Sistla.Automatic veri?cation of?nite-state concurrent systems using temporal logic speci?cations.ACM Transactions on Programming Languages

and Systems,8(2):244–263,January1986.

[CF58]H.B.Curry and https://www.360docs.net/doc/e27409008.html,binatory Logic.North-Holland,1958.

[CHS72]H.B.Curry,J.R.Hindley,and https://www.360docs.net/doc/e27409008.html,binatory Logic,Volume2.North-Holland, 1972.

[Chu36] A.Church.A note on the Entscheidungsproblem.J.of Symbolic Logic,1:40–44,1936.

[Cod70] E.F.Codd.A relational model of data for large shared data https://www.360docs.net/doc/e27409008.html,munications of the ACM,13(6):377–387,1970.

[Dav88]M.Davis.In?uences of mathematical logic on computer science.In R.Herken,editor,The Universal Turing Machine:A Half-Century Survey,pages315–326.Oxford University Press,

1988.

[Dav00]M.Davis.The Universal Computer.Norton,2000.

[EF95]H.D.Ebbinghaus and J.Flum.Finite Model Theory.Perspectives in Mathematical Logic.

Springer-Verlag,1995.

[Ehr61] A.Ehrenfeucht.An application of games to the completeness problem for formalized theories.

Fund.Math.,49:129–141,1961.

[Fag74]R.Fagin.Generalized?rst–order spectra and polynomial–time recognizable sets.In R.M.

Karp,editor,Complexity of Computation,SIAM-AMS Proceedings,Vol.7,pages43–73,1974.

[FHMV95]R.Fagin,J.Y.Halpern,Y.Moses,and M.Y.Vardi.Reasoning about Knowledge.MIT Press, Cambridge,Mass.,1995.

[Fra54]R.Fra¨?ss′e.Sur quelques classi?cations des syst`e mes de relations.Publ.Sci.Univ.Alger.S′e r.

A,1:35–182,1954.

[GJ79]M.Garey and https://www.360docs.net/doc/e27409008.html,puters and Intractability:A Guide to the Theory of NP-completeness.W.Freeman and Co.,San Francisco,1979.

[GLT89]J.-Y.Girard,https://www.360docs.net/doc/e27409008.html,font,and P.Taylor.Proofs and Types,volume7of Cambridge Tracts in Theoretical Computer Science.Cambridge University Press,Cambridge,England,1989.

[G¨o d31]K.G¨o del.¨Uber formal unentscheidbare S¨a tze der Principia Mathematica und verwandter Sys-teme I.Monatshefte f¨u r Mathematik und Physik,38:173–198,1931.

[Goe97]R.Goering.Model checking expands veri?cation’s scope.Electronic Engineering Today, February1997.

[Gra78]J.Gray.Notes on database operating systems.In R.Bayer,R.M.Graham,and G.Seegmuller, editors,Operating Systems:An Advanced Course,Lecture Notes in Computer Science,V ol.

66.Springer-Verlag,Berlin/New York,1978.Also appears as IBM Research Report RJ2188,

1978.

[Ham80]R.W.Hamming.The unreasonable effectiveness of mathematics.American Mathematical Monthly,87:81–90,1980.

[Hin62]J.Hintikka.Knowledge and Belief.Cornell University Press,Ithaca,N.Y.,1962.

[HM90]J.Y.Halpern and Y.Moses.Knowledge and common knowledge in a distributed environment.

Journal of the ACM,37(3):549–587,1990.

[HMT71]L.Henkin,J.D.Monk,and A.Tarski.Cylindric Algebras Part I.North Holland,1971.Part II, North Holland,1985.

[Hol97]G.J.Holzmann.The model checker SPIN.IEEE Trans.on Software Engineering,23(5):279–295,May1997.Special issue on Formal Methods in Software Practice.

[How80]William A.Howard.The formulas-as-types notion of construction.In J.P.Seldin and J.R.

Hindley,editors,To H.B.Curry:Essays in Combinatory Logic,Lambda Calculus and Formal-

ism,pages479–490.Academic Press,1980.

[Imm81]N.Immerman.Number of quanti?ers is better than number of tape cells.Journal of Computer and System Sciences,22(3):384–406,1981.

[Imm82]N.Immerman.Upper and lower bounds for?rst-order expressibility.Journal of Computer and System Sciences,25:76–98,1982.

[Imm86]N.Immerman.Relational queries computable in polynomial https://www.360docs.net/doc/e27409008.html,rmation and Control, 68:86–104,1986.

[Imm87]https://www.360docs.net/doc/e27409008.html,nguages which capture complexity classes.SIAM J.on Computing, 16(4):760–778,1987.

[Imm88]N.Immerman.Nondeterministic space is closed under complement.SIAM Journal on Com-puting,17:935–938,1988.

[Imm91]N.Immerman.Dspace[]=var[].In Proc.6th IEEE Symp.on Structure in Complexity Theory,pages334–340,1991.

[Imm95]N.Immerman.Descriptive complexity:a logician’s approach to computation.Notices of the American Mathematical Society,42(10):1127–1133,1995.

[Imm99]N.Immerman.Descriptive Complexity.Springer-Verlag,1999.

[Jac99] B.Jacobs.Categorical Logic and Type Theory,volume141of Studies in Logic and the Foun-dations of Mathematics.Elsevier,Amsterdam,1999.

[Kan91]P.C.Kanellakis.Elements of relational database theory.In J.Van Leeuwen,editor,Handbook of Theoretical Computer Science,pages1074–1156.Elsevier,1991.

[Kri63]S.Kripke.A semantical analysis of modal logic I:normal modal propositional calculi.

Zeitschrift f¨u r Mathematische Logik und Grundlagen der Mathematik,9:67–96,1963.An-

nounced in Journal of Symbolic Logic,24,1959,p.323.

[Kur94]https://www.360docs.net/doc/e27409008.html,puter Aided Veri?cation of Coordinating Processes.Princeton Univ.Press, 1994.

[Kur97]R.P.Kurshan.Formal veri?cation in a commercial setting.The Veri?cation Times,1997.

[LP85]O.Lichtenstein and A.Pnueli.Checking that?nite-state concurrent programs satisfy their linear speci?cations.In Proc.13th ACM Symp.on Principles of Programming Languages,pages97–

107,1985.

[Mai83] D.Maier.The Theory of Relational https://www.360docs.net/doc/e27409008.html,puter Science Press,1983.

[Mit96]J.C.Mitchell.Foundations for Programming Languages.Foundations of Computing.MIT Press,1996.

[ML84]P.Martin-L¨o f.Intuitionistic Type Theory.Studies in Proof Theory.Bibliopolis,Naples,Italy, 1984.

[MW85]Z.Manna and R.Waldinger.The Logical Basis for Computer Programming.Addison-Wesley, 1985.

[Plo81]G.Plotkin.A structural approach to operational semantics.Technical Report DAIMI–FN–19, Computer Science Department,Aarhus University,1981.

[Pnu77] A.Pnueli.The temporal logic of programs.In Proc.18th IEEE Symp.on Foundation of Computer Science,pages46–57,1977.

[QS81]J.P.Queille and J.Sifakis.Speci?cation and veri?cation of concurrent systems in Cesar.In Proc.5th International Symp.on Programming,volume137of Lecture Notes in Computer

Science,pages337–351.Springer-Verlag,1981.

[Rey85]John C.Reynolds.Three approaches to type structure.In TAPSOFT.Springer-Verlag,1985. [Rey98]John C.Reynolds.Theories of Programming Languages.Cambridge University Press,1998. [SKS97] A.Silberschatz,H.Korth,and S.Sudarshan.Database System Concepts.McGraw-Hill,1997. [Tar35] A.Tarski.Der Wahrheitsbegriff in den formalisierten Sprachen.Studia Philosophica,1:261–405,1935.

[TMC96]David Tarditi,Greg Morrisett,Perry Cheng,Chris Stone,Robert Harper,and Peter Lee.TIL:

A type-directed optimizing compiler for ML.In ACM SIGPLAN Conference on Programming

Language Design and Implementation,pages181–192,Philadelphia,PA,May1996.

[Tur37] A.Turing.On computable numbers with an application to the Entscheidungsproblem.Proc.of the London Math.Soc.Ser.3,42:230–265,1936/37.

[Ull88]J.D.Ullman.Principles of Database and Knowledge Base https://www.360docs.net/doc/e27409008.html,puter Science Press, 1988.

[Var82]M.Y.Vardi.The complexity of relational query languages.In Proc.14th ACM Symp.on Theory of Computing,pages137–146,San Francisco,1982.

[Var96]M.Y.Vardi.An automata-theoretic approach to linear temporal logic.In F.Moller and

G.Birtwistle,editors,Logics for Concurrency:Structure versus Automata,volume1043of

Lecture Notes in Computer Science,pages238–266.Springer-Verlag,Berlin,1996.

[Via]V.Vianu.Databases and?nite-model theory.In Descriptive Complexity and Finite Models.

[VW86]M.Y.Vardi and P.Wolper.An automata-theoretic approach to automatic program veri?cation.

In Proc.1st Symp.on Logic in Computer Science,pages332–344,Cambridge,June1986. [VW94]M.Y.Vardi and P.Wolper.Reasoning about in?nite https://www.360docs.net/doc/e27409008.html,rmation and Computa-tion,115(1):1–37,1994.

[Wig60] E.P.Wigner.The unreasonable effectiveness of mathematics in the natural https://www.360docs.net/doc/e27409008.html,m.on Pure and Applied Math.,13:1–14,1960.

on the contrary的解析

On the contrary Onthecontrary, I have not yet begun. 正好相反,我还没有开始。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, the instructions have been damaged. 反之,则说明已经损坏。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, I understand all too well. 恰恰相反,我很清楚 https://www.360docs.net/doc/e27409008.html, Onthecontrary, I think this is good. ⑴我反而觉得这是好事。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, I have tons of things to do 正相反,我有一大堆事要做 Provided by jukuu Is likely onthecontrary I in works for you 反倒像是我在为你们工作 https://www.360docs.net/doc/e27409008.html, Onthecontrary, or to buy the first good. 反之还是先买的好。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, it is typically american. 相反,这正是典型的美国风格。 222.35.143.196 Onthecontrary, very exciting.

恰恰相反,非常刺激。 https://www.360docs.net/doc/e27409008.html, But onthecontrary, lazy. 却恰恰相反,懒洋洋的。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, I hate it! 恰恰相反,我不喜欢! https://www.360docs.net/doc/e27409008.html, Onthecontrary, the club gathers every month. 相反,俱乐部每个月都聚会。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, I'm going to work harder. 我反而将更努力工作。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, his demeanor is easy and nonchalant. 相反,他的举止轻松而无动于衷。 https://www.360docs.net/doc/e27409008.html, Too much nutrition onthecontrary can not be absorbed through skin. 太过营养了反而皮肤吸收不了. https://www.360docs.net/doc/e27409008.html, Onthecontrary, I would wish for it no other way. 正相反,我正希望这样 Provided by jukuu Onthecontrary most likely pathological. 反之很有可能是病理性的。 https://www.360docs.net/doc/e27409008.html, Onthecontrary, it will appear clumsy. 反之,就会显得粗笨。 https://www.360docs.net/doc/e27409008.html,

利用思维导图提高小学生英语绘本阅读能力

龙源期刊网 https://www.360docs.net/doc/e27409008.html, 利用思维导图提高小学生英语绘本阅读能力作者:周志莲 来源:《小学科学·教师版》2018年第06期 小学生的理解能力非常有限,在学习英语、做英语绘本的时候,利用传统的教学方法会非常困难。传统的方法不能让小学生快速地理解和掌握知识,因为传统的方法不能让小学生深入地理解。思维导读的方法是一种新兴的方法,这种方法可以帮助小学生对于知识真正地理解,形成自己对知识的一个独特看法,形成自己的学习框架,进而可以让学生的知识变得系统起来,提高学生的学习兴趣和自主学习的能力。因此,本文分析如何利用思维导图提高小学生的英语绘本的阅读能力。 随着我国教育的发展,国家也越来越重视国民英语能力的提高,这是发展的需要,也是进步的需要。儿童时期是学习和接受语言的关键时期,是语言能力快速发展的时期。因此,现阶段越来越重视小学时期的英语课程。英语作为一门语言,对于它的学习又离不开语言环境和阅读能力。由于我们日常生活中所面临的都是汉语的交流环境,英语的语言环境非常少,从而使得英语的阅读能力变得更加重要。小学时期的英语阅读主要是通过一些绘本、一些色彩斑斓的图片和一些吸引目光的生动的形象来使得小学生更加喜欢阅读,使得阅读更加生活化。但是,仅仅是通过这种绘本,并不能够提高小学生的学习兴趣,因为小学时期的其他书本也有引人注目的图片。因此,这就需要一种非常有效的方法来提高小学生的英语绘本阅读能力。 思维导图是一种通过科学研究而发明出来的方法。这种方法可以有效地提高小学生的英语绘本阅读能力。 一、思维导图的定义 思维导图是由托尼等人在20世纪60年代提出的,思维导图指的是,运用发散性的思维方式,构建一种新型的图物链条来说明事物之间的关系,促进对于关系的理解的一种网络。它可以运用到生活中的方方面面,可以帮助人们理清思路,构建一个理解的框架的方式。在思维导图中,会有很多的分支,很多的主干以及很多的元素和关键词。我们可以使用多种颜色、多种图案,对这些元素和关键词以及连接进行描绘。这是一种符合人类大脑运行方式的工具,可以促进人的思维能力发展。 将思维导图运用到小学生的英语绘本阅读中,可以有效地使小学生构建自己的理解,提高小学生的阅读能力,提高小学生的英语阅读兴趣。 二、思维导图的使用方法 (一)构建英语词汇的思维导图

英语造句

一般过去式 时间状语:yesterday just now (刚刚) the day before three days ag0 a week ago in 1880 last month last year 1. I was in the classroom yesterday. I was not in the classroom yesterday. Were you in the classroom yesterday. 2. They went to see the film the day before. Did they go to see the film the day before. They did go to see the film the day before. 3. The man beat his wife yesterday. The man didn’t beat his wife yesterday. 4. I was a high student three years ago. 5. She became a teacher in 2009. 6. They began to study english a week ago 7. My mother brought a book from Canada last year. 8.My parents build a house to me four years ago . 9.He was husband ago. She was a cooker last mouth. My father was in the Xinjiang half a year ago. 10.My grandfather was a famer six years ago. 11.He burned in 1991

思维导图在小学英语绘本教学中的运用

思维导图在小学英语绘本教学中的运用 发表时间:2019-02-28T14:05:27.833Z 来源:《教育学》2019年2月总第168期作者:彭凡凡 [导读] 最大限度发挥学生学习英语的潜能,有效地培养学生运用记忆、阅读、思维的能力,提升他们的学习能力,以形成创新的思维。安徽宿州市灵璧县教育体育局安徽宿州234200 摘要:在小学阶段,教师运用思维导图的教学方式,对小学生的思维培养有显著提升。通过在小学英语绘本教学中运用思维导图,能够激发学生对英语学习的兴趣,提升学生的英语知识水平,进而提升英语课堂教学效率。本文针对思维导图在小学英语绘本教学中运用的好处进行了分析探讨,希望能引起相关教育者的重视。 关键词:思维导图小学英语绘本教学 思维导图又被称为心智导图,是表达发散性思维的有效图形工具。在小学英语绘本教学中运用思维导图,能让学生充分运用左右脑的机能,最大限度发挥学生学习英语的潜能,有效地培养学生运用记忆、阅读、思维的能力,提升他们的学习能力,以形成创新的思维。 一、思维导图的运用,提升学习兴趣 小学生由于年龄较小,学习的耐心有限,如果英语教材中含有大量的文字而缺少醒目的图片,会极大地降低学生的学习兴趣。大部分小学生都是以形象思维为主,图片的内容、形式、色彩会给他们带来视觉上的冲击,更有助于他们集中注意力。 例如,在教学绘本Magic Tails时,通过讲述小苍蝇借尾巴的故事来展开教学,引出动物尾巴各自起到的作用,让学生自行讨论说一说自己对尾巴作用的想法,再根据书中所说的内容进行划分。 通过思维导图的绘制,将苍蝇借尾巴的故事呈现得更加立体、丰富,便于学生记住新的词汇,提升学生学习的兴趣,锻炼他们集中注意力的能力。除此之外,在英语绘本教学中运用思维导图,将英语与图形相结合,能调动课堂学习的氛围,提升课堂教学的质量与效率。 二、思维导图的运用,形成知识架构 在教学过程中有效运用思维导图,对于学生记忆有很大的帮助。学生学习英语时,由于受到母语思维的影响,常常记不住单词的拼写和含义,导致学习效果不尽人意。通过思维导图的运用,将绘本中的知识点进行有效的整合和梳理,有序地呈现在学生的面前,能帮助学生形成英语知识的架构,增强学生的记忆效果。 例如,在教学绘本The Food Action时,将食物划分为防御者,将猫划分为保护者,将老鼠划分为侵略者,这样更有助于学生记住这些食物和动物的单词。除此之外,思维导图的运用能帮助学生形成英文学习的知识架构,对于英文学习有巨大的提升,也能帮助学生提升在其他学科中的记忆能力。 三、思维导图的运用,培养创新思维 培养学生的创新思维是教育事业的重要任务。通过思维导图的运用,将图片与知识点联系起来,能有效提升学生的发散性思维和联想能力。在小学英语绘本教学中,应用思维导图,能创新课堂教学模式,减少传统枯燥课堂的弊端,创设良好的课堂氛围。 四、思维导图的运用,促进自我学习 绘制一张思维导图需要经过资料的梳理和整合、在原有基础上增加或者删改、对于内容加以修正和完善等操作,从不同的角度拓展思维导图的格局,增强知识点之间的联系效果。 在英语教学中熟练运用思维导图,能帮助学生形成良好的学习习惯和学习方法,促进他们自我学习的能力。 例如在教学绘本I want to Move时,首先让学生明确文章的主题Move,根据书中所讲述的Tom搬家的故事,根据搬家过程的所见所感来进行划分,将tree、web和grass分成三个居住的区域;其次,逐个将三个区域存在的对Tom的危险进行展开,让学生自行绘制本文的思维导图,能从中了解到学生对于本文知识点的掌握情况,更好地进行针对性的教学;最后,让学生自行讲解绘制思维导图时所用的方式和自身的心路历程,能更好地促进学生自主学习的能力,促进学生的全面发展。 综上所述,当前在绘本教学中仍然缺乏思维导图的应用,导致小学生对于英语学习的兴趣不高,课堂效果也不理想。但随着教育改革

绘本阅读第一级

绘本阅读第一级1.午饭 小老鼠,让我看看你的饭盒好吗? 小老鼠的饭真好。 给你一根香肠吧! 小猫咪,让我看看你的饭盒好吗? 小猫咪的饭真好。 给你一条炸小鱼吧! 小兔子,让我看看你的饭盒好吗? 小兔子的饭真好。 给你一块鸡蛋卷吧! 小河马,让我看看你的饭盒好吗? 小河马的饭真好。 给你一个饭团吧! 小熊,让我看看你的饭盒好吗? 我有三明治,抹了好多的蜂蜜呢! 大家一起来吃吧! 真好,真好,大家一起吃午饭真好呀!

妈妈 走走--妈妈拉着手, 跳跳--妈妈拍手笑, 跑跑--妈妈追不着, 飞飞--妈妈快快追。 午饭你小鱼兔子河马猫咪大家我 2.一起睡 熊娃娃要每天揪着妈妈的耳朵才能睡着。他说:“没有妈妈,我可睡不着......” 象宝宝每天用鼻子勾着妈妈才能睡着。他说:“没有妈妈,我可睡不着......” 兔妞妞每天要抱着妈妈做的花枕头才能睡着。她说:“没有妈妈,我可睡不着......” 熊娃娃、象宝宝和兔妞妞上幼儿园啦。 睡午觉的时候到了,可三个小家伙嚷嚷着:“睡不着,睡不着啊......”妈妈不在身边怎么办?

熊娃娃对兔妞妞说:“你的耳朵借我揪一揪吧。”兔妞妞点点头。 兔妞妞对象宝宝说:“你的鼻子借我当花枕头抱抱吧。”象宝宝点点头。 象宝宝急了:“我怎么办?”兔妞妞说:“我的手臂借你当象妈妈的长鼻子吧.” 哈,这下问题全解决了。 在幼儿园和小朋友一起睡真有趣,妈妈不在身边也一样很快乐。 “呼、呼、呼......”宝贝们睡着啦。 瞧,他们睡得多香啊! 小草爱做梦 小草爱做梦,梦是绿绿的; 小花爱做梦,梦是红红的; 露珠爱做梦,梦是圆圆的; 小朋友爱做梦,梦是甜甜的。 幼儿园没有点点头每天宝宝耳朵娃娃快乐

八种基本的思维导图

八种基本的思维导图 思维导图,英文叫Mind Map,也称 Thinking Map ,就是借助图表来分析问题、理清思路。今天介绍的都是思维图的基本款,体现了基础的思维框架。但是每种图都能有无限的延伸,甚至不同种图可以结合起来一起用,可以变得非常复杂。常见的思维图有这八种:Circle Map 圆圈图、Tree Map 树状图、Bubble Map 气泡图、Double Bubble Map 双重气泡图、Flow Map 流程图、Multi-flow Map 多重流程图、Brace Map 括号图,和Bridge Map 桥型图。

1、圆圈图,定义一件事(Circle Maps - Defining in Context ) Circle map 主要用于把一个主题展开来,联想或描述细节。它有两个圆圈,里面的小圈圈是主题,而外面的大圈圈里放的是和这个主题有关的细节或特征。基本形状是这样的: 下面是国外一个幼儿园孩子做的圆圈图练习。左边是一个典型的联想型圆圈图;主题是海滩,可以联想到螃蟹、鱼、遮阳伞、海草、游泳衣、海豚,等等。而右边的图,反过来,从现象、特征(details)让孩子去推断相关的主题是什么?思维练习的开始就是这么简单!

还可以用圆圈图帮孩子理解数学概念,虽然是一个简简单单的10以下数字,也可以让孩子展开很多思考和联想呢!

2、气泡图,描述事物性质和特征(Bubble Maps -Describing Qualities ) 国外很多幼儿园和小学都在用Bubble Map 来帮助孩子学习知识、描述事物,因为这个真的比较简单和管用,最基本的气泡图是这样的: 圆圈图强调的是一个概念的具体展开,而气泡图,则更加侧重于对一个概念的特征描述。比如这个孩子在用气泡图分析一只鹰有哪些特征。看起来有点混,是不是?其实,檩子觉得,大家在实际带孩子分析问题的时候,不必太纠结到底该用哪种图,怎么直观怎么来,就行。

学生造句--Unit 1

●I wonder if it’s because I have been at school for so long that I’ve grown so crazy about going home. ●It is because she wasn’t well that she fell far behind her classmates this semester. ●I can well remember that there was a time when I took it for granted that friends should do everything for me. ●In order to make a difference to society, they spent almost all of their spare time in raising money for the charity. ●It’s no pleasure eating at school any longer because the food is not so tasty as that at home. ●He happened to be hit by a new idea when he was walking along the riverbank. ●I wonder if I can cope with stressful situations in life independently. ●It is because I take things for granted that I make so many mistakes. ●The treasure is so rare that a growing number of people are looking for it. ●He picks on the weak mn in order that we may pay attention to him. ●It’s no pleasure being disturbed whena I settle down to my work. ●I can well remember that when I was a child, I always made mistakes on purpose for fun. ●It’s no pleasure accompany her hanging out on the street on such a rainy day. ●I can well remember that there was a time when I threw my whole self into study in order to live up to my parents’ expectation and enter my dream university. ●I can well remember that she stuck with me all the time and helped me regain my confidence during my tough time five years ago. ●It is because he makes it a priority to study that he always gets good grades. ●I wonder if we should abandon this idea because there is no point in doing so. ●I wonder if it was because I ate ice-cream that I had an upset student this morning. ●It is because she refused to die that she became incredibly successful. ●She is so considerate that many of us turn to her for comfort. ●I can well remember that once I underestimated the power of words and hurt my friend. ●He works extremely hard in order to live up to his expectations. ●I happened to see a butterfly settle on the beautiful flower. ●It’s no pleasure making fun of others. ●It was the first time in the new semester that I had burned the midnight oil to study. ●It’s no pleasure taking everything into account when you long to have the relaxing life. ●I wonder if it was because he abandoned himself to despair that he was killed in a car accident when he was driving. ●Jack is always picking on younger children in order to show off his power. ●It is because he always burns the midnight oil that he oversleeps sometimes. ●I happened to find some pictures to do with my grandfather when I was going through the drawer. ●It was because I didn’t dare look at the failure face to face that I failed again. ●I tell my friend that failure is not scary in order that she can rebound from failure. ●I throw my whole self to study in order to pass the final exam. ●It was the first time that I had made a speech in public and enjoyed the thunder of applause. ●Alice happened to be on the street when a UFO landed right in front of her. ●It was the first time that I had kept myself open and talked sincerely with my parents. ●It was a beautiful sunny day. The weather was so comfortable that I settled myself into the

英文绘本推荐第一级

Books for Beginning Readers Most of the books for beginning readers are found in the Picture Books (E) section. Novice readers possess a range of skills; there are many levels of “easy readers” to fit their abilities. These readers can have just a few words per page up to several paragraphs. The number of sight words used, repetition, and predictability also varies. For the Very Beginning Reader Series (Books can be found by typing in the series title listed below in a “title” search.) Bob Books (Maslan, Bobby) PM Starters (Rigby) Brand New Readers (Candlewick) Real Kids Readers (Millbrook) Early Step Into Reading (Random House) Story Box (Wright Group) My First I Can Read (HarperCollins) Sunshine (Wright Group) My First Reader (Childrens Press) Individual Titles* Armstrong, Jennifer. SUNSHINE, MOONSHINE. Ill. Lucia Washburn. Random House, 1997. Browne, Anthony. I LIKE BOOKS. Random House, 1988. Buck, Nola. SID AND SAM. Ill. G. Brian Karas. HarperTrophy, 1996. Cobb, Annie. WHEELS. Random House, 1996. Cohen, Caron. THREE YELLOW DOGS. Ill. Peter Sis. Greenwillow, 1986. Cousins, Lucy. MAISY GOES TO SCHOOL. Candlewick, 1992. Falwell, Cathryn. WE HAVE A BABY. Clarion, 1993. Fleming, Denise. IN THE TALL, TALL GRASS. Holt, 1991. Ginsburg, Mirra. ASLEEP, ASLEEP. Ill. Nancy Tafuri. Greenwillow, 1992. Hutchins, Pat. ROSIE’S WALK. Macmillan, 1967. Jonas, Ann. NOW WE CAN GO. Greenwillow, 1986. Kalan, Robert. RAIN. Ill. Donald Crews. Greenwillow, 1978. McMillan, Bruce. MOUSE VIEWS: WHAT THE CLASS PET SAW. Holiday, 1993. Raschka, Chris. YO? YES! Orchard, 1993. Rathmann, Peggy. GOOD NIGHT, GORILLA. Putnam, 1994. Shannon, David. NO, DAVID. Blue Sky, 1998. Shaw, Charles. IT LOOKED LIKE SPILT MILK. HarperCollins, 1947. Tafuri, Nancy. WILL YOU BE MY FRIEND? Scholastic, 2000. Ward, Cindy. COOKIE’S WEEK. Ill. Tomie dePaola. Putnam, 1988. Wildsmith, Brian.WAKE UP, WAKE UP! Harcourt, 1996. *See also our Patterned/Predictable Bibliography

英语句子结构和造句

高中英语~词性~句子成分~语法构成 第一章节:英语句子中的词性 1.名词:n. 名词是指事物的名称,在句子中主要作主语.宾语.表语.同位语。 2.形容词;adj. 形容词是指对名词进行修饰~限定~描述~的成份,主要作定语.表语.。形容词在汉语中是(的).其标志是: ous. Al .ful .ive。. 3.动词:vt. 动词是指主语发出的一个动作,一般用来作谓语。 4.副词:adv. 副词是指表示动作发生的地点. 时间. 条件. 方式. 原因. 目的. 结果.伴随让步. 一般用来修饰动词. 形容词。副词在汉语中是(地).其标志是:ly。 5.代词:pron. 代词是指用来代替名词的词,名词所能担任的作用,代词也同样.代词主要用来作主语. 宾语. 表语. 同位语。 6.介词:prep.介词是指表示动词和名次关系的词,例如:in on at of about with for to。其特征:

介词后的动词要用—ing形式。介词加代词时,代词要用宾格。例如:give up her(him)这种形式是正确的,而give up she(he)这种形式是错误的。 7.冠词:冠词是指修饰名词,表名词泛指或特指。冠词有a an the 。 8.叹词:叹词表示一种语气。例如:OH. Ya 等 9.连词:连词是指连接两个并列的成分,这两个并列的成分可以是两个词也可以是两个句子。例如:and but or so 。 10.数词:数词是指表示数量关系词,一般分为基数词和序数词 第二章节:英语句子成分 主语:动作的发出者,一般放在动词前或句首。由名词. 代词. 数词. 不定时. 动名词. 或从句充当。 谓语:指主语发出来的动作,只能由动词充当,一般紧跟在主语后面。 宾语:指动作的承受着,一般由代词. 名词. 数词. 不定时. 动名词. 或从句充当. 介词后面的成分也叫介词宾语。 定语:只对名词起限定修饰的成分,一般由形容

六级单词解析造句记忆MNO

M A: Has the case been closed yet? B: No, the magistrate still needs to decide the outcome. magistrate n.地方行政官,地方法官,治安官 A: I am unable to read the small print in the book. B: It seems you need to magnify it. magnify vt.1.放大,扩大;2.夸大,夸张 A: That was a terrible storm. B: Indeed, but it is too early to determine the magnitude of the damage. magnitude n.1.重要性,重大;2.巨大,广大 A: A young fair maiden like you shouldn’t be single. B: That is because I am a young fair independent maiden. maiden n.少女,年轻姑娘,未婚女子 a.首次的,初次的 A: You look majestic sitting on that high chair. B: Yes, I am pretending to be the king! majestic a.雄伟的,壮丽的,庄严的,高贵的 A: Please cook me dinner now. B: Yes, your majesty, I’m at your service. majesty n.1.[M-]陛下(对帝王,王后的尊称);2.雄伟,壮丽,庄严 A: Doctor, I traveled to Africa and I think I caught malaria. B: Did you take any medicine as a precaution? malaria n.疟疾 A: I hate you! B: Why are you so full of malice? malice n.恶意,怨恨 A: I’m afraid that the test results have come back and your lump is malignant. B: That means it’s serious, doesn’t it, doctor? malignant a.1.恶性的,致命的;2.恶意的,恶毒的 A: I’m going shopping in the mall this afternoon, want to join me? B: No, thanks, I have plans already. mall n.(由许多商店组成的)购物中心 A: That child looks very unhealthy. B: Yes, he does not have enough to eat. He is suffering from malnutrition.

八种基本的思维导图精编版

思维导图,英文叫Mind Map,也称 Thinking Map ,就是借助图表来分析问题、理清思路。今天介绍的都是思维图的基本款,体现了基础的思维框架。但是每种图都能有无限的延伸,甚至不同种图可以结合起来一起用,可以变得非常复杂。常见的思维图有这八种:Circle Map 圆圈图、Tree Map 树状图、Bubble Map 气泡图、Double Bubble Map 双重气泡图、Flow Map 流程图、Multi-flow Map 多重流程图、Brace Map 括号图,和Bridge Map 桥型图。

1、圆圈图,定义一件事(Circle Maps - Defining in Context ) Circle map 主要用于把一个主题展开来,联想或描述细节。它有两个圆圈,里面的小圈圈是主题,而外面的大圈圈里放的是和这个主题有关的细节或特征。基本形状是这样的: 下面是国外一个幼儿园孩子做的圆圈图练习。左边是一个典型的联想型圆圈图;主题是海滩,可以联想到螃蟹、鱼、遮阳伞、海草、游泳衣、海豚,等等。而右边的图,反过来,从现象、特征(details)让孩子去推断相关的主题是什么?思维练习的开始就是这么简单!

还可以用圆圈图帮孩子理解数学概念,虽然是一个简简单单的10以下数字,也可以让孩子展开很多思考和联想呢!

2、气泡图,描述事物性质和特征(Bubble Maps -Describing Qualities ) 国外很多幼儿园和小学都在用Bubble Map 来帮助孩子学习知识、描述事物,因为这个真的比较简单和管用,最基本的气泡图是这样的: 圆圈图强调的是一个概念的具体展开,而气泡图,则更加侧重于对一个概念的特征描述。比如这个孩子在用气泡图分析一只鹰有哪些特征。看起来有点混,是不是?其实,檩子觉得,大家在实际带孩子分析问题的时候,不必太纠结到底该用哪种图,怎么直观怎么来,就行。

base on的例句

意见应以事实为根据. 3 来自辞典例句 192. The bombers swooped ( down ) onthe air base. 轰炸机 突袭 空军基地. 来自辞典例句 193. He mounted their engines on a rubber base. 他把他们的发动机装在一个橡胶垫座上. 14 来自辞典例句 194. The column stands on a narrow base. 柱子竖立在狭窄的地基上. 14 来自辞典例句 195. When one stretched it, it looked like grey flakes on the carvas base. 你要是把它摊直, 看上去就象好一些灰色的粉片落在帆布底子上. 18 来自辞典例句 196. Economic growth and human well - being depend on the natural resource base that supports all living systems. 经济增长和人类的福利依赖于支持所有生命系统的自然资源. 12 1 来自辞典例句 197. The base was just a smudge onthe untouched hundred - mile coast of Manila Bay. 那基地只是马尼拉湾一百英里长安然无恙的海岸线上一个硝烟滚滚的污点. 6 来自辞典例句 198. You can't base an operation on the presumption that miracles are going to happen. 你不能把行动计划建筑在可能出现奇迹的假想基础上.

绘本思维导图软件

俗话说时间就是金钱,我们只有将时间进行好的规划才能在有限的时间中创造出金钱,那在对时间进行规划的道路中我选择使用思维导图来辅助我进行操作,将每天的任务都进行合理的安排之后制作出一个思维导图,按照思维导图中的安排来充实自己每天的生活。 时至今日,思维导图越来越受到人们的喜爱,它是一种实用的思维工具,无论是在事项安排还 是读书笔记方面,都有着出众的表现。MindMaster,即亿图思维导图,是由亿图软件公司独立开发 的一款跨平台、多功能的思维导图软件。软件分为免费版和专业版,解决了思维导图软件好用则价 高,免费则难用的尴尬局面。MindMaster结合了精美的设计元素,预置丰富的主题样式,再配以超 人性化的布局模式和展示模式,使得亿图思维导图软件正努力成为一款真正的效率工具。 二、独特的手写风格,体验原始韵味 软件支持一键切换成手写的风格,整体的思维导图样貌会发生少许改变,原本的直线条产生和 “手写”一样的波纹效果。这种手写风格的思维导图,经打印后还会继续保持该特殊的样貌。手写风 格的功能,是一种思维导图绘图方法的回归,是对思维导图最初模样的重塑,亦是对思维导图创立 者东尼?博赞的致敬。

三、大纲功能,让文本内容一目了然 当思维导图的层级内容较为复杂的时候,需要一个大纲来作明细。MindMaster拥有独立的大纲面板,可以将思维导图里的内容清晰地呈现出来,通过点击小按钮,还可以缩展显示的范围。不仅如此,软件还支持将思维导图的大纲内容导出为PDF、PPT、Excel以及Word格式。 四、丰富的剪贴画,自由添加使用

画思维导图,单凭枯燥的文字说明,也未免太过单调,来一点生动的图片说明,更能吸引读图 者的注意力。亿图思维导图MindMaster传承亿图图示海量素材的特点,同样内置了丰富的剪贴画,可以满足用户在绘制思维导图过程中使用符号素材的需求。 五、打包内容,用外框的方式单独呈现 若是想将思维导图中的某一个区域进行单独划分,单独提炼,就需要用到MindMaster中的外 框功能。这个功能组件能够把内容用线框包围住,并可以对内容样式做自定义的调整。思维导图的 外框可以继续添加下一级的思维导图内容。

英语造句大全

英语造句大全English sentence 在句子中,更好的记忆单词! 1、(1)、able adj. 能 句子:We are able to live under the sea in the future. (2)、ability n. 能力 句子:Most school care for children of different abilities. (3)、enable v. 使。。。能句子:This pass enables me to travel half-price on trains. 2、(1)、accurate adj. 精确的句子:We must have the accurate calculation. (2)、accurately adv. 精确地 句子:His calculation is accurately. 3、(1)、act v. 扮演 句子:He act the interesting character. (2)、actor n. 演员 句子:He was a famous actor. (3)、actress n. 女演员 句子:She was a famous actress. (4)、active adj. 积极的 句子:He is an active boy. 4、add v. 加 句子:He adds a little sugar in the milk. 5、advantage n. 优势 句子:His advantage is fight. 6、age 年龄n. 句子:His age is 15. 7、amusing 娱人的adj. 句子:This story is amusing. 8、angry 生气的adj. 句子:He is angry. 9、America 美国n.

绘本阅读第三级

绘本阅读第三级 1.长大以后 “哇,我终于长大了。”小公主心里想,“长大以后要做什么呢?也许我应该变得不一样。” “但是,我应该变成什么样子呢?” “我可不想变成这样,我最好去问妈妈。” “我长大以后最好变成什么样子呢?”小公主问。 “要仁慈,”她的妈妈说,“就像你的爸爸。” “我长大以后最好变成什么样子呢?”小公主问。 “要有爱心,”她的爸爸说,“就像你的妈妈。” “我长大以后最好变成什么样子呢?”小公主问。 “要爱干净。”大厨师说。 “我长大以后最好变成什么样子呢?”小公主问。 “要勇敢。”大将军说。 “要勇敢,”小公主心里想,“对了,以后我要自己去抓浴缸里的蜘蛛。” “我长大以后最好变成什么样子呢?”小公主问。 “要很会游泳,”海军司令说,“这样,当你的船沉进水里的时候,你才会安全。”

“我长大以后最好变成什么样子呢?”小公主问。 “要变得聪明。”首相说。 小公主去问医生。 “要很健康。”医生说。 “我的天啊!我要仁慈、有爱心、爱干净、勇敢、会游泳、聪明和健康。我的手指头都快不够数了。长大真的好困难。” 于是她去问女仆,女仆说:“我不知道,最重要的是,你最想变成什么样子呢?” “我想要......” “我想要长高。”小公主说。 “可是,你已经很高了耶!”小王子说。 我们的样子 小青蛙,你还记得,小蝌蚪时的样子吗? 小蝴蝶,你还记得,毛毛虫时的样子吗? 小天鹅,你还记得,丑小鸭时的样子吗? 小花朵,你还记得,抽嫩芽时的样子吗? 现在的我正拿着照片,欣赏自己没长牙时的样子呢!

公主安全长大聪明 爱心手指头干净重要 2.小蝌蚪找妈妈 小池塘,长水草;草丛里,青蛙妈妈生了小宝宝。 小宝宝长大了,他们变成了大脑袋、长尾巴的小蝌蚪,他们一起游啊游,每天都很快乐。 一天,他们看见鸡妈妈带着两个鸡宝宝在岸边玩耍。鸡宝宝一口一个好妈妈地叫着。小蝌蚪说:“我们的妈妈在哪里?我们一起去找妈妈。” 小蝌蚪问虾伯伯:“我们的妈妈在哪里?您见过她吗?”虾伯伯回答说:“见过,见过她,她的眼睛大又大,快去那边找找看!” 小蝌蚪一路找妈妈,看见金鱼阿姨眼睛大又大,忙叫:“妈妈,妈妈,好妈妈。”金鱼阿姨说:“认错了,认错了,白肚皮才是你们的妈妈。” 一只大螃蟹,肚皮白又白,他在岸上爬啊爬。小蝌蚪看见了,忙叫:“妈妈,妈妈,好妈妈。”大螃蟹说:“认错了,认错了,四条腿的才是你们的妈妈。” 乌龟妈妈带着小乌龟在游水,小蝌蚪数了数,乌龟妈妈有四条腿,忙叫:“妈妈,妈妈,好妈妈。”小

(完整版)主谓造句

主语+谓语 1. 理解主谓结构 1) The students arrived. The students arrived at the park. 2) They are listening. They are listening to the music. 3) The disaster happened. 2.体会状语的位置 1) Tom always works hard. 2) Sometimes I go to the park at weekends.. 3) The girl cries very often. 4) We seldom come here. The disaster happened to the poor family. 3. 多个状语的排列次序 1) He works. 2) He works hard. 3) He always works hard. 4) He always works hard in the company. 5) He always works hard in the company recently. 6) He always works hard in the company recently because he wants to get promoted. 4. 写作常用不及物动词 1. ache My head aches. I’m aching all over. 2. agree agree with sb. about sth. agree to do sth. 3. apologize to sb. for sth. 4. appear (at the meeting, on the screen) 5. arrive at / in 6. belong to 7. chat with sb. about sth. 8. come (to …) 9. cry 10. dance 11. depend on /upon 12. die 13. fall 14. go to … 15. graduate from 16. … happen 17. laugh 18. listen to... 19. live 20. rise 21. sit 22. smile 23. swim 24. stay (at home / in a hotel) 25. work 26. wait for 汉译英: 1.昨天我去了电影院。 2.我能用英语跟外国人自由交谈。 3.晚上7点我们到达了机场。 4.暑假就要到了。 5.现在很多老人独自居住。 6.老师同意了。 7.刚才发生了一场车祸。 8.课上我们应该认真听讲。9. 我们的态度很重要。 10. 能否成功取决于你的态度。 11. 能取得多大进步取决于你付出多少努力。 12. 这个木桶能盛多少水取决于最短的一块板子的长度。

相关文档
最新文档