PAPER Imperfect Singular Solutions of Nonlinear Equations and a Numerical Method of Proving

合集下载

中小板上市公司审计失败案例研究——以众华审计雅百特为例

中小板上市公司审计失败案例研究——以众华审计雅百特为例

摘要中小板市场已然成为我国资本市场不可或缺的重要组成部分,根据深圳证券交易所信息披露,截至2020年5月22日,中小板的上市公司数量共957家,总股本为9461.81亿股,股票总市值为102872.84亿元。

由于多种因素,近年来中小板审计失败案件频发,不但让投资人遭受了重大损失,也损害了注册会计师和会计师事务所的声誉,甚至使注册会计师行业的公信力遭到质疑,不利于中小板市场发展,因此,探究中小板上市公司的审计失败问题、原因,并提出防治建议尤为重要。

雅百特由于具有借壳上市、高科技企业、海外交易等多个标签,造假金额巨大,并且是我国首家因财务舞弊惊动外交部的上市公司,因此雅百特是中小板市场上典型的审计失败案例。

本文首先对国内外审计失败相关研究梳理分析,并将其作为本文研究的相关基础;其次,归纳总结2013年—2019年证监会处罚决定书的内容,剖析会计师事务所和注册会计师因审计中小板上市公司失败的现状,中小板上市公司审计失败的发生源于多种因素,审计失败的问题愈加严重,影响愈加广泛,因此结合中小板上市公司特点,并依据现代风险导向审计理论、委托代理理论等,从注册会计师和会计师事务所、中小板上市公司治理、外部监管三层面分析审计失败的原因:会计师事务所的质量控制薄弱,注册会计师未勤勉尽责保持应有的职业怀疑,对风险识别和评估不到位,并且有意缩减应对风险的审计程序是导致审计失败的直接原因;中小板上市公司持续经营风险较高,内部控制存在缺陷,以及相关法律法规不完善,监管力度弱,处罚力度较轻是导致审计失败的间接原因。

继而本文采用案例研究法,结合雅百特虚造海外工程项目、虚构建材出口贸易和国内建材贸易的财务造假手段,分析导致审计失败的原因:直接原因是注册会计师缺乏足够的职业怀疑态度、对审计风险评估不到位,应对风险的审计程序执行不充足,同时会计师事务所质量控制不严格;间接原因是雅百特主营业务单一和急于融资导致经营风险较大、内部控制环境和监督制度不完善以及中小板监管制度不完善且惩处力度轻。

社会科学研究方法与论文写作智慧树知到期末考试章节课后题库2024年北京第二外国语学院

社会科学研究方法与论文写作智慧树知到期末考试章节课后题库2024年北京第二外国语学院

社会科学研究方法与论文写作智慧树知到期末考试答案章节题库2024年北京第二外国语学院1.What are key components of research design? ()答案:Timeframe.###Sampling Strategy.###Data Collection Methods.2.The following aspects of informed consent that are essential in researchethics include ().答案:Researchers explaining potential risks andbenefits.###Participants being allowed to withdraw from the study.3.When should all authors be included in the in-text citation, according to theAPA style? ()答案:When there are two authors.###When there are three to fiveauthors.4.What are some essential tips for writing an effective abstract? ()答案:Use keywords###Emphasize points differently from thepaper.###Use passive verbs5.Which statements are suggested solutions for improving the Methodologysection? ()答案:Eliminate the use of first-person pronouns.###Provide a clearrationale for the chosen methods.6.What's the difference between methodology and method? ()答案:Methodology encompasses the broader theoretical framework and guiding philosophy of the research process.###Methods encompass the specific techniques and procedures employed for data collection andanalysis.###Methodology is presented as a distinct section in aresearch thesis, explaining the overall approach and rationale.7.What are the downsides of mere listing in a literature review? ()答案:It does not present themes or identify trends.###It often indicatesa lack of critical synthesis.8.The common problems to be aware of in thesis writing include().答案:Excessive reliance on qualitative data###Lack of theoreticalsupport###Failure to integrate theory and practice.###Misuse of tense ponents that are typically embedded in the structure of an academicpaper, especially the journal article, include ()答案:Introduction###Results and Discussion10.Which of the following examples are misconducts? ()答案:Facilitating academic dishonesty.###Unauthorizedcollaboration###Misuse of Patients11.What are the three main elements of a definition, as mentioned in the lecture?()答案:Term, Category, and Features.12.In the Methods section, why is it important to detail the tools or materials fordata collection? ()答案:To explain how instruments to be used to answer researchquestions.13.Which is the method suggested to avoid plagiarism when summarizinginformation from sources? ()答案:Summarize immediately after reading without referring back tothe source.14.The purpose of control variables in research is ().答案:To keep certain factors constant and prevent them frominfluencing the dependent variable.15.What is the purpose of using sampling techniques in research? ()答案:To draw conclusions about the population based on data collected from the sample.16.According to Wallwork’s tips for the final check, what is one way to ensureyour paper is as good as possible before submission? ()答案:Anticipate referees’ comments.17.What does external validity assess? ()答案:The extent to which research findings can be applied orgeneralized to other situations and populations.18.Which of the following expressions are correctly used in the Methods Section?()答案:"We conducted the experiment in a controlled environment."19.Which of the following is NOT a recommended guideline for using tables in aresearch paper? ()答案:Using as many tables as possible to provide comprehensiveinformation.20.What does a structured abstract typically include to make it more readable?()答案:Eye-catching font for the title21.What is the main function of the preparation stage in writing a literaturereview? ()答案:To locate relevant literature and prepare for writing.22.The primary focus of academic integrity is ().答案:Fostering honesty and responsible behavior.23.The act of using someone else’s ideas and writings as your own can beconsidered as ().答案:Plagiarism24.Which step is NOT part of the suggested three-step approach for revisingyour paper? ()答案:Rewrite the entire paper.25.Which is not the reason for an overly broad title being problematic? ()答案:It encourages depth in the study.26. A good thesis or dissertation should tell the reader not just “what I havedone,” but “why what I have done matters.” ()答案:对27.Coherence in academic writing refers to the clarity of the thesis statementand the organization of the paper. ()答案:对28.The research methods section helps readers and reviewers gauge thetransparency, validity, and reliability of the research. ()答案:对29.Research papers are published to share new, original results and ideas withthe academic community. ()答案:对30.Relying solely on secondary sources ensures the originality of researchfindings. ()答案:错31.In introduction writing, it is recommended to delve into an exhaustive reviewof the entire field to provide comprehensive context. ()答案:错32.The Background Method in introduction writing kicks off by presenting aproblem and then addressing the solution. ()答案:错33.Multiculturalism seeks to enhance the self-esteem and identities ofmarginalized groups. ()答案:对34. A Doctoral-level literature review is typically less comprehensive than aMaster's-level literature review. ()答案:错35."Hoaxing" involves deliberately publishing false information with theintention of deceiving others. ()答案:对36.Reflecting on the research process at the end is essential for evaluating itsstrengths and limitations. ()答案:对37. A well-crafted title should engage a wide audience effectively. ()答案:对38.In order to avoid plagiarism, it is suggested to avoid citing references. ()答案:错39.Predicting difficulties and providing countermeasures in a research proposalis essential to show the depth of thinking and enlist expected guidance. ()答案:对40.Conducting a literature review is not necessary when selecting a researchtitle. ()答案:错41.What can authors do to ensure a timely publication in a journal that reviewspapers for job hunting purposes?()答案:Submit the manuscript without checking for errors###Seekinformation from editors about review times###Be efficient in making revisions42.When preparing a manuscript for publication, it is crucial to focus on ethicalstandards.()答案:对43.Why do researchers want to publish their papers?()答案:To share new results and ideas44.How can you identify an appropriate journal for publication? ()答案:Look for journals that publish work similar to your research.45.The editor-in-chief makes the final decision on whether a submitted paper isaccepted or rejected in the review process.()答案:对ing cut and paste extensively is recommended during the final check tosave time.()答案:错47.Exchanging texts with another student for proofreading is encouraged to findcareless errors in your own work.()答案:对48.What is the key idea that should be remembered by the audience from yourtalk?()答案:The key idea of your research49.Why is it important to avoid errors that may distort meaning in your writtenwork? ()答案:To enhance the quality of your writing###To ensure clarity ofcommunication50.What is the main purpose of doing a presentation?()答案:To engage, excite, and provoke the audience51.Making academic writing more tentative involves avoiding over-generalizations and using linguistic hedges and tentative phrases.()答案:对52.What is the purpose of the checklist questions provided for paper revision?()答案:To help improve the writing53.Which of the following are strategies for achieving cohesion in academicwriting? ()答案:Organizing the paper logically###Using transitional words andphrases###Employing reference words54.Redundancy and colloquialisms are considered desirable features ofconciseness in academic writing. ()答案:错55.What should you do when revising your paper writing to improve clarity andspecificity? ()答案:Be self-contained56.What are the characteristics of informative abstracts? ()答案:They may replace the need for reading the full paper###Theycommunicate specific information about the paper###They provide aconcise summary of the paper’s content57.Structured abstracts may have clear subheadings to mark different sections.()答案:对58.What is the recommended maximum word limit for a conference abstract?()答案:250 words59.Which tense is often used when writing an abstract? ()答案:Present tense60.The primary purpose of an informative abstract is to indicate the subjectsdealt with in a paper. ()答案:错61.What are some reasons for using citations in academic writing? ()答案:To show you are a member of a particular disciplinarycommunity###To acknowledge the intellectual property rights ofauthors###To avoid plagiarism62.Self-plagiarism is not considered an ethical concern in academic writing.()答案:错63.What is the primary purpose of citation in academic writing? ()答案:To acknowledge the intellectual property rights of authors64.What is self-plagiarism? ()答案:Presenting one's own previously published work as new65.All sources cited in the text must be documented in the References section.()答案:对66.Which type of conclusion is more common in research papers and theses andfocuses on summarizing research outcomes and aligning them with the initial thesis? ()答案:Thesis-oriented Conclusion67.What are the four sections typically found in the Conclusion section of aresearch paper, according to the material? ()答案:Summary of findings, implications, limitations, further studies68.What is one of the purposes of the conclusions chapter? ()答案:To forestall criticisms by identifying limitations of the research69.Which of the following are types of conclusions discussed in the material? ()答案:Summary type###Field-oriented conclusion###Evaluation type of conclusion###Recommendation type of conclusion70.The conclusion section in academic papers typically follows a uniformstructure across all disciplines.()答案:错71.What is one of the purposes of making comparisons with previous studies inacademic writing? ()答案:To justify the methods or procedures followed72.Which of the following is NOT mentioned as a common type of graphicalfigure in the material? ()答案:Map illustrations73.What can we do in demonstrating our research results in paper? ()答案:Use figures and tables to summarize data###Show the results ofstatistical analysis74.In which field are Qualitative Research methods often used?()答案:Liberal Arts and Social Sciences75.What factors should be considered when choosing research methods for athesis? ()答案:Traditional approaches.###Research questions andobjectives.###Nature of the subject matter.76.What does "Research Design" refer to in the research process?()答案:The overall plan guiding the research study.77.All the following moves are included in the method section except ().答案:Describing the commonly used methods in certain field.78.The research methods section in a thesis is often presented as a distinctsection, separate from the literature review.()答案:对79.What are the two core abilities essential for writing an effective literaturereview? ()答案:Information seeking and critical appraisal.80.Where can a literature review be placed in a research paper or thesis? ()答案:In different places depending on research goals and fieldconventions.81.Which type of literature review focuses on organizing literature aroundspecific research questions?()答案:Question-oriented review.82.The purpose of creating a visual representation, such as a literature map, isto replace the need for drafting concise summaries.()答案:错83.What are the recommended tenses to use when discussing the content of thesources in a literature review? ()答案:Simple Past.###Present Perfect.###Simple Present.84.What is the role of the Problem Statement in the Introduction? ()答案:Justify the importance of the research.85.Which is NOT one of the three methods could be used to write anintroduction? ()答案:Reference Method86.The location and structure of the introduction are standardized across alltypes of research theses. ()答案:错87.In Metadiscourse research, what is the recommended way for a researcher torefer to themselves in the introduction?()答案:Refer to themselves as "this thesis" or a specific section.88.What are the key elements included in Move 2 of the "Create a ResearchSpace" (CARS) framework?()答案:Identifying gaps in prior research.###Indicating a gap.89.What role do Research Grant Proposals play?()答案:Both securing financial support and convincing funding agencies.90.What questions does a research proposal eloquently answer? ()答案:How are you going to do it?###What do you plan toaccomplish?###Why do you want to do it?91.The "Aims/Purposes" section in a research proposal outlines the centralissues to be tackled in the study. ()答案:对92.To whom is a research proposal usually submitted for approval and support?()答案:Funding agencies, academic institutions, or research supervisors.93.What is the purpose of predicting difficulties and providing countermeasuresin the research proposal?()答案:To show the depth of thinking and enlist expected guidance.94.The recency of sources is crucial in research, and older sources are alwayspreferred for their depth.()答案:错95.Which database is specifically mentioned for searching Master's and DoctoralDissertations? ()答案:CNKI96.When conducting a critique of a study, what should be considered about themethods used?()答案:The validity for studying the problem.97.What is the primary characteristic of primary sources in research materialcollection? ()答案:They offer synthesized information from various perspectives. 98.What are common approaches to collecting primary source materialsmentioned in the lecture? ()答案:Surveys and questionnaires###Controlled experiments###One-on-one interviews99.What are potential mistakes in the title selection process? ()答案:Having unclear titles that do not convey the subjectmatter.###Using contemporary language to make the title appearoutdated.100.How does the researcher balance the focus of a research title?()答案:By clearly defining the scope of the study.101.What is the purpose of conducting a comprehensive literature review in the title selection process? ()答案:To identify gaps, controversies, or areas requiring furtherexploration.102.An overly narrow title might limit the potential impact and relevance of the research. ()答案:对103.What is the significance of a well-chosen title? ()答案:It significantly enhances the academic value of the work.104.What are key characteristics of deconstruction in literary theory? ()答案:Highlighting textual undecidability and paradoxes.###Challenging traditional assumptions about language and meaning.###Questioning binary oppositions.105.What distinguishes quantitative data from qualitative data in research? ()答案:Quantitative data are numerical, while qualitative data can bedescribed in words.106.What is the primary goal of case studies in applied linguistics? ()答案:To enhance understanding of a phenomenon, process, person, or group.107.Case studies use a single data source, such as interviews, to explore particular phenomena. ()答案:错108.What are the three types of cultural studies? ()答案:New historicism, postcolonialism, American multiculturalism. 109.The dependent variable in a study investigating the effects of different study methods on exam performance is ().答案:Exam performance110.What role does a moderating variable play in a research study? ().答案:It influences the strength or direction of the relationship between independent and dependent variables.111.External validity assesses the extent to which research findings can be applied to populations, settings, or conditions beyond the specific study. ()答案:对112.How does deduction differ from induction in research? ()答案:Deduction is the process of reasoning from general principles tospecific predictions.113.The purposes of research include ()答案:Solving real-world problems###Testing existingtheories###Meeting graduation requirements###Advancingknowledge114.The potential academic consequences for students who engage in academic dishonesty include ().答案:Monetary fines、Academic suspension and Expulsion from theInstitute115.The three key principles that experimental researchers need to carefully consider and implement before, during and after recruiting researchparticipants are ().答案:Anonymity###Informed consent###Confidentiality116.It is unethical to conduct research which is badly planned or poorly executed.()答案:对117.The primary focus of academic integrity in the context of research ethics is ().答案:Fostering responsibility and trustworthiness in academic work 118.The pillars of academic integrity include all the aspects except ()答案:Excellence119.The primary purpose of literature reviews in research articles is ().答案:To evaluate previously published material120.Methodological articles typically present highly technical materials, derivations, proofs, and details of simulations within the main body of thearticle. ()答案:对121.In a research article, many different sections can be found in empirical studies, including ().答案:Method###Literature review###Introduction###Discussion 122.According to the lecture, which step in the procedures of thesis writing involves drafting a title and abstract? ()答案:Step 1: Choice of Topic123.The primary use of case studies is ().答案:To illustrate a problem or shed light on research needs。

稀疏成像

稀疏成像
0018-9219/$26.00 Ó 2010 IEEE
1006Biblioteka Proceedings of the IEEE | Vol. 98, No. 6, June 2010
Potter et al. : Sparsity and Compressed Sensing in Radar Imaging
through the solution of the computationally tractable ‘1 regularized inverse problem min kf k1 subject to kAf À y k2 2
I . INTRODUCTION
Radar imaging is an inverse scattering problem whereby a spatial map of reflectivity is reconstructed from measurements of scattered electric fields. Imaging techniques to exploit parsimony in sparse or compressible scenes have been proposed throughout the 60-year development of radar processing for suppression of sidelobes and superresolution of scattering locations. Many radar processing tasks can be posed as finding sparse solutions to underdetermined linear equationsVa topic addressed by the emerging field of compressed sensing (CS). The primary interest in compressed sensing research is the inverse problem of recovering a signal f 2 CN from noisy linear measurements y ¼ Af þ n 2 CM [1], [2]. The focus is on underdetermined problems where the forward operator A 2 CMÂN has unit norm columns and forms an incomplete basis with M ( N . The resulting ill-posed inverse problem is regularized assuming 1) that the unknown signal f is K -sparse (i.e., has at most K nonzero entries) or is compressible with K significant coefficients and 2) the noise process is bounded by knk2 G . CS theory provides strong results which guarantee stable solution of the sparse signal recovery problem for a class of forward operators A that satisfies certain properties. One such class of operators is defined by bounding the singular values of the submatrices of A. Specifically, the restricted isometry constant (RIC) K for forward operator A is the smallest 2 ð0; 1Þ such that ð1 À K Þkx k2 2 kAxk2 2 ð1 þ K Þkx k2 2

英语联盟考试试题

英语联盟考试试题

1、Which of the following is NOT a type of verb tense in English?A. Present continuousB. Past perfectC. Future imperfectD. Present simple(答案)C2、Which phrase is used to express possibility in English?A. Must have doneB. Could have doneC. Should have doneD. Would have done(答案)B3、What is the correct pronoun to use when referring to a non-specific person in the third person singular?A. TheyB. He or sheC. OneD. It(答案)C4、Which of the following is an example of a transitive verb?A. SleepB. ArriveC. WriteD. Laugh(答案)C5、Which word is used to indicate a cause-and-effect relationship?A. BecauseB. AlthoughC. HoweverD. Therefore(答案)A6、Which of the following is a coordinating conjunction?A. SinceB. AlthoughC. AndD. Because(答案)C7、Which of these sentences contains a subject complement?A. The cat is sleeping.B. The book is on the table.C. She became a doctor.D. They are happy.(答案)C8、Which of the following is an adverb of manner?A. QuicklyB. YesterdayC. HereD. Beautifully (describing a noun)(答案)A9、Which phrase is used to make a suggestion?A. I thinkB. How aboutC. I believeD. In my opinion(答案)B10、Which of the following is an example of a phrase that functions as a prepositional phrase?A. Running quicklyB. Very fastC. On the tableD. Extremely tired(答案)C。

2007-共因失效和不完全覆盖

2007-共因失效和不完全覆盖

58IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 1, MARCH 2007Reliability Evaluation of Phased-Mission Systems With Imperfect Fault Coverage and Common-Cause FailuresLiudong Xing, Member, IEEEAbstract—This paper proposes efficient methods to assess the reliability of phased-mission systems (PMS) considering both imperfect fault coverage (IPC), and common-cause failures (CCF). The IPC introduces multimode failures that must be considered in the accurate reliability analysis of PMS. Another difficulty in analysis is to allow for multiple CCF that can affect different subsets of system components, and which can occur -dependently. Our methodology for resolving the above difficulties is to separate the consideration of both IPC and CCF from the combinatorics of the binary decision diagram-based solution, and adjust the input and output of the program to generate the reliability of PMS with IPC and CCF. According to the separation order, two equivalent approaches are developed. The applications and advantages of the approaches are illustrated through examples. PMS without IPC and/or CCF appear as special cases of the approaches. Index Terms—Binary decision diagram, common-cause failure, fault tree, imperfect fault coverage, phased-mission reliability.PMS-BDD RAN SA NotationA BDD-based PMS approach [2] Rendezvous And Navigation Solar Arraynumber of phases in the PMS set of all components in all phases of PMS number of CC in phase of PMS total number of CC in PMS, duration of phase of PMS an elementary CC occurring in phase . All CC in phase are indexed by subscript a CCE defined over CC, CCE space: a subset of containing all components that are affected by a group of phase components caused to fail by the same common cause a subset of containing all components in , plus all those components in all later of PMS phases a component in the PMS state indicator variable of in phase modified failure function of in phase used in PMS-BDD evaluation event: 1 or more components fail uncovered event: no component fails uncovered event: PMS fails given that occurs orAcronyms1 ACS BDD CC CCE CCF CCG CDSAttitude Control System Binary Decision Diagram Common Cause CC Event CC Failure CC Group Command and Data handling SystemGPMS-CPR A PMS approach considering IPC [1] HGA High-Gain Antenna if-then-else representation IPC ImPerfect fault Coverage IPCM IPC Model (Fig. 4) MBDD Multi-state BDD MDD Multiple-valued Decision Diagrams MOI Mars Orbit Insertion OS Orbiting Sample PMS Phased-Mission SystemManuscript received June 26, 2006; revised July 25, 2006; accepted August 3, 2006. Associate Editor: J. P. Kharoufeh. The author is with the Department of Electrical and Computer Engineering, University of Massachusetts, Dartmouth, MA 02747 USA (e-mail: lxing@). Digital Object Identifier 10.1109/TR.2006.8909001Theunreliability of PMS ignoring IPC Pr(transient restoration) in the IPCM Pr(permanent coverage) in the IPCM Pr(single point failure) in the IPCM unreliability of PMS unreliability of reduced PMS, i.e.,singular & plural of an acronym are always spelled the same. 0018-9529/$25.00 © 2007 IEEEXING: RELIABILITY EVALUATION OF PMS WITH IMPERFECT FAULT COVERAGE AND COMMON-CAUSE FAILURES59I. INTRODUCTION HE operation of missions encountered in aerospace, nuclear power, and many other applications often involves several different tasks or phases that must be accomplished in sequence. Systems used in these missions are usually called phased-mission systems (PMS). A classic example is an aircraft flight that involves take-off, ascent, level-flight, descent, and landing phases. During each mission phase, the system has to accomplish a specified task, and may be subject to different stresses as well as different dependability requirements. Thus, system configuration, success criteria, and component failure behavior may change from phase to phase [1]. This dynamic behavior usually requires a distinct model for each phase of the mission in the reliability analysis. Further complicating the analysis are -dependencies across the phases for a given component. For example, the state of a component at the beginning of a new phase is identical to its state at the end of the previous phase [2]. The consideration of these dynamics and dependencies poses unique challenges to existing analysis methods. Considerable research efforts have been expended in the reliability analysis of PMS; efficient combinatorial methods (see, e.g., [1]–[4]), state space oriented approaches based on Markov chains or/and Petri nets (see, e.g., [5]–[8]), as well as a modular solution based on binary decision diagrams (BDD) and Markov chains [9] have been developed. PMS, especially those devoted to safety-critical applications such as aerospace, and nuclear power, are typically designed with sufficient redundancies, and automatic recovery mechanisms to be tolerant of errors that may occur. However, the recovery mechanisms can fail, such that the system cannot adequately detect, locate, and recover from a fault occurring in the system. This uncovered fault can propagate through the system, and may lead to an overall system failure, despite the presence of sufficient redundancies. This phenomenon is known as imperfect fault coverage (IPC) [10]. The IPC introduces additional failure modes that must be considered for accurate reliability analysis of fault-tolerant PMS. Specifically, the analysis must allow two failure modes including covered failure, and uncovered failure, as well as an operation mode, rather than the traditional binary designation of failure and operation. At this point, it is relevant to mention that recently more attention has been focused on the study of multi-state systems in which both the system, and its components exhibit multiple performance levels varying from perfect operation to complete failure [11], [12]. Systems with multimode failures (for example, caused by the IPC as described above) are also widely referred to as multi-state systems [13]. Various approaches have been proposed for the analysis of multi-state systems; examples include the universal moment generating function-based methods [14], [15], and the BDD-based method [1], [13], [16]. Xing & Dugan also proposed efficient approaches based on multi-state BDD (MBDD) [17], and multiple-valued decision diagrams (MDD) [18] to the reliability analysis of PMS with multimode failures. It is interesting as future research to study the general multi-state PMS with multiple performance levels using MBDD or MDD methods. The analysis becomes even more complicated when considering components can be subject to common-cause failures (CCF) during any phase of the mission. CCF are multiple dependent component failures within a system that are a directTresult of a common cause (CC) [19], such as extreme environmental conditions, or human errors. It has been shown by many studies that the presence of CCF tends to increase a system’s joint failure probabilities, and thus contributes significantly to the overall unreliability of the system subject to CCF [19]. Therefore, it is crucial that CCF be modeled & analysed appropriately. Considerable research efforts have been expended in the study of CCF for the system reliability analysis; refer to [20] for a discussion of various approaches, their contributions, and their limitations concerning the analysis of non-PMS. We find many of the same limitations in the CCF models developed for the reliability analysis of PMS in the literature; for example, the method presented in [21] allows at most one CC to affect a component, and CCF to exist only among -identical components. In this paper, we seek to address the limitations of existing CCF models by using a more general CCF model which allows for multiple CC that can affect different subsets of system components, and which can occur -dependently. Because failure to consider either IPC or CCF results in overestimated system reliability, it is significant to incorporate both IPC, and CCF into the system reliability analysis. A great deal of work has been done to separately study IPC (see, e.g., [1], [10], [17], [22], [23]), and CCF (see, e.g., [19], [21], [24]–[27]). To the best of our knowledge, little work ([8], [29]) considered both IPC, and CCF in solving reliability problems for non-PMS. Moreover the existing work [28], [29] shares a restricted assumption that a single elementary CC affects all the system components. In this paper, we relax this restriction by employing our general CCF model described in Section II-B. And we present efficient, separable BDD-based approaches for analyzing the reliability of PMS with both IPC, and CCF. The remainder of the paper is organized as follows. Section II presents an overview of the problem to be solved, as well as assumptions. Section III depicts an illustrative example PMS subject to IPC, and CCF. Section IV presents a separable approach to the reliability analysis of PMS with both IPC, and CCF. Section V illustrates the approach through the step-by-step analysis of the example PMS. Section VI presents an alternative approach, and a proof of the equivalence of the two approaches. In the last section, we present our conclusions, as well as directions for future work. II. PROBLEM STATEMENT This paper considers the problem of evaluating the reliability of fault-tolerant PMS subject to both IPC, and CCF. To help make tangible the type of systems for which the proposed approaches are meant as well as the analytical challenges we address in this paper, we present an example of PMS subject to IPC, and CCF (adapted from [20]). Fig. 1 shows the high-level fault tree model of a proposed Mars orbiter mission system, which involves Launch, Cruise, Mars Orbit Insertion (MOI), Commissioning, and Orbit phases. Each mission phase is characterized by at least one major event in which the mission failure can occur. Examples of failure events for this example include: • the launch event during the launch phase; • the deployment of the solar arrays (SA) & high-gain antennas (HGA), and the configuration of the heaters after launch which occur during the cruise phase;60IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 1, MARCH 2007Fig. 1. High-level fault tree model of the Mars orbiter mission system; the triangles are transfer gates to the fault tree for Subsystem F.Fig. 2. Fault tree model of Subsystem F.• the propulsive capture into Mars’ orbit during the MOI phase; and • the release of an orbiting sample (OS), and the inclusion of a rendezvous and navigation (RAN) platform on the orbiter which might induce additional failure modes during orbit [20]. As shown in Fig. 2, Subsystem F of Fig. 1 is decomposed into the Telecom, Power, Propulsion, Command and Data handling System (CDS), Attitude Control System (ACS), and Thermal subsystems. Subsystem F has the same configuration for each mission phase. As described in [20], these subsystems are subject to CCF from two CC: a micrometeoroid attack that can result in the failure of the entire system, and a solar flare which fails the subsystem’s electronics, most notably the CDS in all pre-MOI phases. The subsystems can also be subject to IPC. Consider the fault tree model of the CDS system in Fig. 3; it includes a hot standby system that consists of two -identical subsystems: Side-A, and Side-B. For example, the Side-A is the primary subsystem, and Side-B is the standby subsystem that is automatically switched on upon failure of the primary subsystem Side-A. Under ideal circumstances, the CDS system functions correctly as long as one of the two subsystems, and other components as indicated in Fig. 3, operate correctly. However, in reality, the failure of the primary subsystem Side-A must be detected, and appropriately handled before the standby subsystem Side-B can be used. In other words, an uncovered fault of any component in the subsystem Side-A may lead to the failure of the CDS system, and thus the failure of the entire mission, despite the presence of adequate redundancies (i.e., the subsystem Side-B).Fig. 3. Fault tree model of CDS.As described in the Introduction, the reliability analysis of PMS subject to IPC, and CCF, like the Mars orbiter system, requires the consideration of dynamics & dependencies across different phases including the multiple failure modes introduced by IPC, as well as the multiple dependent component failures caused by CCF. All of them pose a big challenge to the existing analysis methods. In this paper, we propose two equivalent separable approaches to the reliability analysis of PMS with both IPC & CCF as one way to meet the above challenge in an efficient, elegant manner. PMS without IPC and/or CCF will appear as special cases of our methods. The assumptions, and inputs for the problem are listed in the following subsections. A. General Assumptions on PMS 1) Component failures are -independent within each phase. Dependencies arise among different phases, and failure modes. 2) For at least one component, an uncovered fault causes the overall system failure, even in the presence of fault-tolerant mechanisms. 3) Conditional fault occurrence probability for each component for each phase is given either as a fixed probabilityXING: RELIABILITY EVALUATION OF PMS WITH IMPERFECT FAULT COVERAGE AND COMMON-CAUSE FAILURES61Fig. 4. General structure of the IPCM for a component.4) 5)6)7)8)for a specified mission time, or in terms of a lifetime distribution. Phase durations are deterministic. The system fails to achieve the mission if it fails during any one phase. That is, phase-OR requirements are assumed for this paper. Thus, the reliability of a PMS is the probability that the mission successfully achieves its objectives in all phases. The system is not maintained during the mission; once a component transfers from the operation mode to a failure mode (covered or uncovered), it will remain in that failure mode for the rest of the mission time. The system is coherent, which means that each component contributes to the system state, and the system state worsens (at lease does not improve) with an increasing number of component failures [30]. The IPC behavior is described using Dugan et al.’s imperfect coverage model (IPCM) [10]. Within the context of the quantitative reliability analysis, it is required only to refer to the 3 exit probabilities, also known as coverage factors: , , and , where . Each of them is a conditional probability conditioned on a fault occurring to a component, as defined in Fig. 4.Fig. 5. System configuration for the example PMS in the fault tree model.to the same elementary common-cause common-cause group .constitute aB. CCF Model for PMS 1) PMS can be subject to CCF due to different elementary CC occurring within a phase or in different phases. In general, we express the elementary CC existing in a PMS as (Phase 1); (Phase 2); ; (Phase ). denotes the number of elementary CC involved in phase . is the total number of phases in the PMS; thus is the total number of CC to which the PMS is subject. 2) CC are external to the system. Note that the failure of a component within the system may cause simultaneous failure of multiple other components within the system. Such CCF due to internal CC can be dealt with by the functional dependency gate in the dynamic fault trees approach [10]. 3) Different CC, whether from the same phase or from different phases, can be mutually exclusive, -independent, or -dependent. 4) A component may be affected by multiple CC, that is, one single component can belong to more than one common-cause group (CCG). All components that fail dueC. Problem Inputs The following lists all the required input parameters for solving the problem. 1) Mission time. 2) Number of phases: . 3) Duration of each phase : . 4) Failure criteria for each phase, described using the fault tree model. 5) Failure parameters for each component in phase , which are conditioned on the success of in the previous phase (refer to assumption 3 in Section II-A). 6) Fault coverage factors ( , , ) for each component in each phase. 7) Statistical relationship between elementary CC: -independent, -dependent, or mutually exclusive. 8) Occurrence probabilities of elementary CC or conditional occurrence probabilities of CC in case of two CC being -dependent. We recognize that analytical results are strongly influenced by the input parameters, therefore realistic estimates of them are crucial. Fault injection (see, e.g., [31], [32]) is a commonly used technique for estimating values of component failure parameters, and fault coverage factors. The occurrence probabilities of CC, and their statistical relationship may be obtained from available data sources [24], [25]; for example, research into estimating parametric values using failure event data was presented in [26], [27]. In this paper, we consider the above listed parameters as given input parameters of the problem. Follow-up research will include investigation of the sensitivity of results to changes in the input parameter values. III. AN ILLUSTRATIVE EXAMPLE To illustrate the applications & advantages of the proposed approaches, and to perform comparative study with and without IPC/CCF, we consider an example PMS adapted from [1]. As shown in the system fault tree model (Fig. 5), the system consists of 4 types of components that are used in different system configurations over 3 consecutive phases: 1) , : needed for all phases; one of them must be functional during all the three : only needed for Phase 1, and Phase 2; it must phases. 2)62IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 1, MARCH 2007TABLE I INPUT PARAMETERS FOR THE EXAMPLE PMS ( , ARE ALL IN THE COVERAGE FACTOR IS 0 FOR ALL COMPONENTS IN ALL PHASES, ) AND CAN BE OBTAINED USING;. This hypothetical scenario about CCF in the example PMS is general, breaking the assumptions or restrictions usually found in the literature, which include each component belonging to at most one CCG, CC affecting -identical components only, and all CC occurring -independently. IV. ANALYSIS OF PMS WITH IPC AND CCF To analyse the reliability of a PMS with both IPC and CCF, we propose to decompose the original problem into a number of reduced PMS reliability problems that are freed from the concern about CCF. And then we separate the IPC from the combinatorics of the solution to each reduced problem based on the simple, efficient algorithm in [1], [22]. After the above two-step separation process, the set of reduced reliability problems does not have to consider both IPC, and CCF. Thus, existing PMS reliability analysis approaches that ignore both IPC and CCF, such as the PMS-BDD method [1], [2], can be directly applied to solve these reduced problems. Finally, results of all the reduced problems are integrated to obtain the entire phased-mission reliability considering both IPC, and CCF. In the following subsections, we present the details of these four steps: separating CCF, separating IPC, solving reduced problems using the PMS-BDD, and aggregating for final results. We summarize the whole approach at the end of this section. A. Step 1: Separating CCF Our methodology for incorporating CCF into the phased-mission analysis is to decompose a reliability problem with CCF into a number of reduced reliability problems based on the Total Probability Theorem [33]. The set of reduced problems need not consider CCF because the effects of CCF have been factored out. Finally, results of all the reduced reliability problems are aggregated to obtain the reliability measure considering CCF. Specifically, according to the general CCF model described in Section II-B, there exist totally elementary CC in a PMS. The CC partition the event space into the following disjoint subsets, each called a common-cause event (CCE):be functional during these two phases. 3) , : work during Phase 1, and Phase 3; both of them must be functional during Phase 1, and at least one of them must be functional during , , : work during Phase 2, and Phase 3; all of Phase 3. 4) them must be functional during Phase 2, and at least two of them must be functional during Phase 3. Note that some components may not be explicitly used in some phase, although they can still fail & contribute to the system failure. For example, component may suffer an uncovered failure in Phase 3, and thus contribute to the system failure even though its covered failure in Phase 3 does not affect the entire system operation. The failure parameter of each component for the duration of a phase is given as a fixed probability ; or in terms of an exponential distribution with a constant failure rate ; or in terms of a Weibull distribution defined with a scale parameter , and . The coverage factors of each compoa shape parameter nent are given as fixed probabilities. To perform comparative study with and without the consideration of IPC/CCF, we use the same values for the input parameters (including failure parameters, coverage factors, and phase durations) as in [1] (also see Table I). To demonstrate the effects of CCF on the reliability analysis of this example PMS, we propose that the system is sub) ject to CCF from three CC: hurricanes (denoted by during Phase 2, during Phase 1, lightning strikes during Phase 3. A hurricane of sufficient and floods intensity in Phase 1 would cause components and to fail, that is, , where is the in Phase 1, and state indicator variable of component denotes the failure of in Phase 1; serious lightning strikes in Phase 2 would cause , , and to fail, that ; serious flooding in Phase 3 is, to fail, that is, . would cause , and We use the following probabilities in our example (they could be extracted from available weather information; see Section II-C). The probability of a hurricane occurring in Phase 1 ; the probability of a lightning strike occurring is ; the floods often occur in conin Phase 2 is junction with hurricanes, and the -dependency between these two CC can be defined by a set of conditional probabilities conditioned on the state of hurricanes in Phase 1 (occurred or not occurred). The probability that floods occur in Phase 3 conditioned on the occurrence of hurricanes in Phase 1 is denoted ; similarly, by , , andWe build a space called "CCE space" over this set of collectively exhaustive, and mutually exclusive events that can occur . in the PMS, that is, denote the occurrence probability of ; Let , and , then we have . Based on the above CCE space, and the Total Probability Theorem, the unreliability of a PMS with IPC and CCF can be evaluated as(1)XING: RELIABILITY EVALUATION OF PMS WITH IMPERFECT FAULT COVERAGE AND COMMON-CAUSE FAILURES63As we will show through the analysis of an example in Seccan be obtained based on the relationship tion V, between the elementary CC, and the occurrence probabilities of in (1) is a conCC, which are given as input parameters. ditional probability that the PMS fails conditioned on the occur. The evaluation of is actually a reduced rence of reliability problem in which the set of components affected by (represented by ) does not appear. Specifically, in the system fault tree model, each basic event (denoting the will be replaced failure of a component) that appears in by a constant logic value ‘1’ (True). After the replacement, a Boolean reduction can be applied to the PMS fault tree to generate a simpler fault tree in which all the components in do not appear. Most importantly, the evaluation of the reduced fault tree can proceed without further consideration of CCF. Thereby, the overall solution complexity is reduced. In the following subsection, we present an efficient approach for further separating the effects of IPC from the combinatorics in (1). of the solution to each reduced problem B. Step 2: Separating IPC Xing & Dugan [1] proposed a BDD-based algorithm called GPMS-CPR for incorporating the IPC into the analysis of PMS without CCF. The methodology is to separate all component uncovered failures from the combinatorics of the solution based on the simple, efficient algorithm in [1], [22]. We apply this in (1). method to the evaluation of each (1 Consider two mutually exclusive & complete events: (no or more components in the PMS fail uncovered), and component in the PMS experiences an uncovered failure). According to the Total Probability Theorem, for event (meaning ), we haveFig. 6. A PMS BDD branch used in the recursive algorithm.in different must consider the uncovevaluation of ered failures of all components in the system, including those , and thus being removed from the problem affected by . This is due to the fact that an uncovered failure leads to the overall mission failure, even in the presence of adequate are calculated by the same redundancies. Therefore, all the (3). or in (2) is the unreliability of the corresponding perfect coverage system ignoring both IPC, and CCF; . that is, It should be evaluated given that no component experiences an uncovered failure, and that all components from are eliminated. Therefore, before calculating , we need to modify the failure function of each component in each phase to a conditional failure probability , conditioned on there being no uncovered failure during the mission using (13) in [1]. Using these modified component failure functions, we using any approach that ignores both IPC, can calculate and CCF. In this research, we use an efficient approach called , and we brief the basics of PMS-BDD [2] for solving PMS-BDD in the next subsection. C. Step 3: Solving Reduced Problems Using PMS-BDD(2) Because an uncovered failure leads to the overall system failure even in the presence of fault-tolerant mechanisms, the conditional probability in (2) simply equals 1. To which is defined as , and which is calculate defined as in (2), we need to use (9)–(12) in [1] to find the occurrence probabilities of three mutually exclusive before the end of & complete events for each component ( has not failed before the end of phase each phase : ), ( has failed covered before the end of phase ), and ( has failed uncovered before the end of phase ). Let denote the set of all components in PMS, and be the number can be calculated as of phases; then(3) where is the probability that fails uncovered during the mission, and can be calculated using (9) in [1]. Note that theReference [2] presented a five-step algorithm based on BDD for the reliability analysis of PMS without IPC and CCF. The algorithm uses phase algebra [4] to combine each single phase BDD to obtain a final PMS BDD. The PMS unreliability can be obtained through a recursive evaluation of the final PMS BDD. For the 1-edge or 0-edge linking variables of different components, the evaluation method is the same as the ordinary BDD. But for the 1-edge linking variables of the same component, a special treatment is needed due to -dependence between , ( , are phases, and ): , , and and . The following gives the summary of the recursive algorithm for calculating the unreliability from the final PMS BDD. Consider a PMS BDD branch in Fig. 6, the if-then-else [2] representation of the figure is , and . The 1-edge of each node (representing a component in the PMS) is associated with the failure function of the component; the 0-edge is associated with the operation function of the component. The unreliability concerning the sub-PMS BDD can be evaluated using the following recursive algorithm: • If , belong to the same component, then .64IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 1, MARCH 2007Fig. 7. First separate CCF, and then IPC.belong to different components, then . is the unreliability with respect to the current where sub-PMS BDD. Let be the root node of the entire PMS BDD, is the unreliability of the entire PMS. is the then failure function of component . Note that as discussed in ((13) in [1]) must be Section IV-B, to consider IPC, used for computing . The exit condition of this recursive algorithm is , then . • If , then . • If The nature of the BDD ensures that an automatic cancellation of components from earlier phases can be done without additional operations [2]. Thus, there is a considerable reduction in computing and storage requirements over the earlier approaches like the EZ approach [3], and Markov-chain based approaches (see, e.g., [6]) for the PMS analysis. Therefore, we select this in (2) in this research. PMS-BDD algorithm for computing D. Step 4: Aggregating for Final Results After obtaining all the in (2) using the PMS-BDD apwith using (2) proach, we integrate the result of each . And then we aggregate the results of to obtain each with using (1) to obtain the final unreliability of PMS subject to both IPC, and CCF. E. Approach Summary The approach first separates CCF, and then IPC, as summarized in (4). Fig. 7 shows a conceptual overview of the separable approach for analyzing the unreliability of PMS with both IPC, and CCF presented in the preceding subsections.• If,can be implemented in constant time. After the separation of IPC, and CCF from the solution combinatorics, we obtain reduced reliability problems, each of which can be solved using the PMS-BDD method. It has been shown that, in most cases, the BDD-based methods require less memory, and are more efficient in reliability evaluation than other traditional methods [1], [2], [10], [13], [23]. Refer to [34] for the computational & storage complexity analysis of an efficient implementation of the BDD method. Also, given the fact that CCF rarely occur of (i.e., systems are usually subject to a very small number elementary CC), and considering the parallel processing capability of modern computing systems, even though there are reduced problems involved in our approach, the overall solution complexity is still low. In addition, as we will show through the example in Section V, most PMS fault trees after the reduction (i.e., the reduced problems) are trivial to solve. Another advantage offered by our approach is that it allows reliability engineers to use their favorite software package that ignores both IPC, and CCF for computing PMS reliability, and adjust the input, and output of the program to produce the PMS reliability considering both IPC, and CCF. Based on this proposed approach, we present a concrete step by step analysis of the example PMS (Section III) in the next section. V. EXAMPLE ANALYSIS AND RESULTS We present the analysis of the example PMS with both IPC, and CCF (Section III) step by step in the following subsections. A. Step 1: Separating CCF According to the decomposition & aggregation approach to considering CCF (Section IV-A), we first build a CCE space for the example PMS. Because there are 3 elementary common (hurricanes), (lightning strikes), and causes, (floods), the CCE space is composed of CCE, that is, . Each is a distinct, disjoint combination of elementary CC, as defined in the first column of Table II. is the set of As briefly defined in Section IV-A, components that are the only ones affected by the event . In other words, the occurrence of leads to(4) As described in Sections IV-A, and IV-B, the two-step separation process for considering IPC, and CCF is simple, and。

外语系ppt课件

外语系ppt课件
The matter has been complicated as we received a fax on Jan 2 from your company stating that coats had arrived in good condition.
As you are a valued customer of ours, we will do our best to solve the problem. My suggestion is for an expert , which has the service contract in England for our products, to come to your company and inspect. Once we have their report we can then decide what further action to take.
I hope this is satisfactory for you and I look forward to hearing from you soon.
Yours truly Bob Olsen
Notes to the Passage
❖ 1. case 包装箱 ❖ 2. flaw 缺陷 ❖ flawless 完美旳, 无缺陷旳 ❖ 3. dispatch 发货 ❖ 4. in good condition 情况良好 ❖ 5. service contract 服务协议 ❖ 6. I look forward to hearing from you. 切盼回
In your letter you state that the case was damaged and that the coats have some flaws when you opened. You suggested that the goods was not properly packed or tested before dispatch. I can assure you that those coats were packed the same way that all our goods are packed and that in four years we have not had any complaints. All products are checked before dispatch.

(参考资料)拉丁语变格变位表

(参考资料)拉丁语变格变位表

FINITE FORMS
KEY:SINGULAR 1I 2 You (Singular) 3 He, She or It
PLURAL 1 We 2 You (Plural) 3 They
VOICE NUMBER
SUBJUNCTIVE TENSE
INDICATIVE TENSE – Times of Verbs
DEPONENT VERBS Verbs Which Are Active in Meaning but Passive in Form
ACTIVE – x Is Doing / Does SINGULAR – Involves One Person I Do / Am Doing/x-ing etc.
I Would Be Doing/x-ing etc.
I Would Have Done/x-ed etc.
I Would Have Been Done/x-ed etc.
I Would Have Done/x-ed etc.
Latin Has Two Grammatical Numbers; Singular & Plural
Indicates the Subject of a Verb [the x or a/an x ... (is doing/will do/has done ...)] Indicates Direct Address [O x!] Indicates the Direct Object of a Verb [ x is having something done to them] Indicates a Possessor [of x] Indicates the Indirect Object of a Verb (Recipient) [to x, or for x] Indicates Additional Information to the Sentence; [by x, with x, from x, at x, in x & on x] Indicates a Location, Adapting Only Place Names or Places [in x, at x or on x] (The Locative Was a Dying Case Form Even in Classical Times, Has Limited Applications and Is Not Always Found in Declension Tables)

2020年9月英语六级真题及参考答案完整版

2020年9月英语六级真题及参考答案完整版

2020年9月英语六级真题及参考答案【完整版】四六级试卷采用多题多卷形式,大家核对答案时,请找具体选项内容,忽略套数。

无忧考网搜集整理了各个版本(有文字也有图片),仅供大家参考。

【网络综合版】听力:Section ALong Conversation OneM: You are a professor of Physics at the University of Oxford. You are a senior advisor at the European Organization for Nuclear Research. You also seem to tour the global tirelessly, giving talks. And in addition, you have your own weekly TV show On Science. Where do you get the energy?W: Oh, well. 【Q1】I just love what I do. I am extremely fortunate to have this life, doing what I love doing.M: Professor, what exactly is your goal? Why do you do all of these?W: well, as you said, I do have different things going on. But these I think can be divided into 【Q2】two groups: the education of science, and the further understanding of science.M: Don't these two things get in the way of each other? What I mean is, doesn't giving lectures take time away from the lab?W: Not really, no. I love teaching, and I don’t mind spending more time doing that now than in the past. Also, what I will say is, that 【Q3】teaching a subject helps me comprehend it better myself. I find that it furthers my own knowledge when I have to explain something clearly, when I have to aid others understanding it, and when I have to answer questions about it. Teaching at a high level can be very stimulating for anyone, no matter how much expertise they may already have in the field they are instructing.M: Are there any scientific breakthroughs that you see on the near horizon? A significant discovery or invention we can expect soon.W: 【Q4】The world is always conducting science. And there're constantly new things being discovered. In fact, right now, we have too much data sitting in computers.For example, we have thousands of photos of planet Mars taken by telescopes that nobody has ever seen. We have them, yet nobody has had time to look at them with their own eyes, let alone analyze them.Q1: Why does the woman say she can be so energetic?Q2: What has the woman been engaged in?Q3: What does the woman say about the benefit teaching brings to her?Q4: How does the woman say new scientific breakthroughs can be made possible?Section AConversation 2M: Do you think dreams 【Q5】have special meanings?W: No. I don't think they do.M: I don't either, but some people do. I would say people who believe that dreams have special meanings are superstitious, especially nowadays. In the past, during the times of ancient Egypt, Greece or China, people used to believe that dreams could foresee the future. But today, with all the scientific knowledge that we have, I think it's much harder to believe in these sorts of things.W: My grandmother is superstitious, and she thinks dreams can predict the future. Once, 【Q6】she dreamed that the flight she was due to take the following day crashed.Can you guess what she did? She didn't take that flight. She didn't even bother to go to the airport the following day. Instead, she took the same flight but a week later. And everything was fine of course. No plane ever crashed.M: How funny! Did you know that flying is actually safer than any other mode of transport? It's been statistically proven. People can be so irrational sometimes.W: Yes, absolutely. But, even if we think they are ridiculous, 【Q7】emotions can be just as powerful as rational thinking.M: Exactly. People do all sorts of crazy things because of their irrational feelings. But in fact, some psychologists believe that our dreams are the result of our emotions and memories from that day. I think it was Sigmund Freud who said that children's dreams were usually simple representations of their wishes, thingsthey wished would happen. 【Q8】But in adults', dreams are much more complicated reflections of their more sophisticated sentiments.W: Isn't it interesting how psychologists try to understand using the scientific method something as bazaar as dreams? Psychology is like the rational study of irrational feelings.Q5: What do both speakers think of dreams?Q6: Why didn't the woman's grandmother take her scheduled flight?Q7: What does the woman say about people's emotions?Q8: What did psychologist Sigmund Freud say about adults' dreams?Section BPassage 1While some scientists explore the surface of the Antarctic, others are learning more about a giant body of water -- four kilometers beneath the ice pack. Scientists first discovered Lake Vostok in the 1970s by using radio waves that penetrate the ice. Since then, they have used sound waves and even satellites to map this massive body of water. How does the water in Lake Vostok remained liquid beneath an ice sheet? “The thick glacier above acts like insulating blanket and keeps the water from freezing,” said Martin Siegert, a glaciologist from the university of Wales. In addition, geothermal heat from the deep within the earth may warm the hidden lake.The scientists suspect that microorganisms may be living in Lake Vostok, closed or more than two million years. Anything found that off from the outside world f s on the surface of the earth, said Siegert. Scientists ’will be totally alien to what are trying to find a way to drill into the ice and draw water samples without causing ht be the solution. If all goes as planned, a contamination. Again, robots mig shift robot will melt through the surface ice. When it reaches the lake, it -drill will release another robot that can swim in the lake, take pictures and look for ries will shed light on life in outer signs of life. The scientists hope that discove up -space, which might exist in similar dark and airless conditions. Recently closed s moon, Europa, shows signs of water beneath the icy surface. ’pictures of Jupiter ropa to search for life there, Once tested the Antarctic, robots could be set to Eu too.Q9: What did the scientists first use to discover Lake Vostok in the 1970s? Q10: What did scientists think about Lake Vostok?Q11: What do the scientists hope their discoveries will do?Section BPassage 2The idea to study the American Indian tribe – Tarahumaras, came to James Copeland in 1984 when 【Q12】he discovered that very little research had been done on their language. He contacted the tribe member through a social worker who workedwith the tribes in Mexico. At first, the tribe member named Gonzalez was very reluctant to cooperate. He told Copeland that no amount of money could buy his language. But after Copeland explained to him what he intended to do with his research and how it would benefit the Tarahumaras, Gonzalez agreed to help. 【Q13】He took Copeland to his village and served as an intermediary. Copeland says, thanks to him, the Tarahumaras understood what their mission was and started trusting us. 【Q14】Entering the world of Tarahumaras has been a laborious project for Copeland.To reach their homeland, he must strive two and half days from Huston Taxes. He loads up his vehicle with goods that the tribe’s men can’t easily get and gives the goods to them as a gesture of friendship. The Tarahumaras, who don’t believe any humiliating wealth, take the food and share among themselves. For Copeland, the experience has not only been academically satisfying but also has enriched his life in several ways. 【Q15】“I see people rejecting technology and living a very hard, traditional life, which offers me another notion about the meaning of progress in the western tradition,” he says, “I experienced the simplicity of living in nature that I would otherwise only be able to read about.I see a lot of beauty and their sense of sharing and concern for each other.”Q12: Why did James Copeland want to study the American Indian tribe -- Tarahumaras?Q13: How did Gonzalez help James Copeland?Q14: What does the speaker say about James Copeland’s trip to the Tarahumaras village?Q15: What impresses James Copeland about the Tarahumaras tribe?Section CRecording 1What is a radical? It seems today that people are terrified of the term,minority, who are mostly wealthy white males in western society.Feminism is a perfect example of this phenomenon. The women's movement has been plagued by stereotypes, misrepresentations by the media, and accusations of man-hating and radicalism. When the basic foundation of feminism is simply that women deserve equal rights in all facets of life. When faced with the threat of being labelled radical, women back down from their worthy calls and consequently, participate in their own oppression.It has gotten to the point that many women are afraid to call themselves feminists because of a stigma attached to the word. If people refused to be controlled, and intimidated by stigmas, the stigmas lose all their power, without fear on which they feed, such stigmas can only die.To me, 【Q17】a radical is simply someone who rebels against the norm when advocates a change in the existing state of affairs. On close inspection, it becomes clear that the norm is constantly involving, and therefore, is not a constant entity. So why then, is deviation from the present situation such a threat, when the state of affairs itself is unstable and subject to relentless transformation?It all goes back to maintaining the power of those who have it and preventing the right of those who don't. In fact, when we look at the word "radical" in a historical context, nearly every figure we now hold up as a hero was considered a radical in his or her time. Radicals are people who affect change. They are the people about whom history is written. Abolitionists were radicals, civil rights activists were radicals, 【Q18】 even the founders of our country in their fight to win independence from England were radicals. Their presence in history has changed the way our society functions, mainly by shifting the balance of power that previously existed. Of course, there are some radicals who've made a negative impact on humanity, 【Q18】 but undeniably, there would simply be no progress without radicals. That been said, next time someone calls me a radical, I would accept that label with pride.Q16: What usually happens when people are accused of being radical?Q17: What is the speaker's definition of a radical?Q18: What does the speaker think of most radicals in the American history?Recording 2We are very susceptible to the influence of the people around us. For instance, you may have known somebody who has gone overseas for a year or so and has returned with an accent perhaps. We become part of our immediate environment. None of us are immune to the influences of our own world and let us not kid ourselves that we are untouched by the things and people in our life.Fred goes off to his new job at a factory. Fred takes his ten-minute coffee break, but the other workers take half an hour. Fred says, “What’s the matter with you guys?” Two weeks later, Fred is taking twenty-minute breaks. A month later, Fred takes his half hour. Fred is saying “If you can’t be them, join them. Why should I work any harder than the next guy?” The fascinating thing about being human is that generally we are unaware that there are changes taking place in our mentality. It is like returning to the city smog after some weeks in the fresh air. Only then do we realize that we’ve become accustomed to the nasty smells. Mix with critical people and we learn to criticize. Mix with happy people, and we learn about happiness. What this means is that we need to decide what we want from life and then choose our company accordingly. You may well say, "That is going to take some effort. It may not be comfortable. I may offend some of my present company." Right, but it is your life. Fred may say, "I’m always broke, frequently depressed. I’m going nowhereand I never do anything exciting." Then we discover that Fred’s best friends are always broke, frequently depressed, going nowhere and wishing that life was more exciting. This is not coincidence, nor is it our business to stand in judgement of Fred? However, if Fred ever wants to improve his quality of life, the first thing he'll need to do is recognize what has been going on all these years.It’s no surprise that doctors as a profession suffer a lot of ill health, because they spend their life around sick people. Psychiatrists have a higher incidence of suicide in their profession for related reasons. Traditionally, nine out of ten children whose parents smoke, smoke themselves. Obesity is in part an environmental problem. Successful people have successful friends, and so the story goes on.Q19 What does the speaker say about us as human beings?Q20 What does the speaker say Fred should do first to improve his quality of life?Q21 What does the speaker say about the psychiatrists?Section CLecture 3Virtually every American can recognize a dollar bill at a mere glance. Many can identify it by its sound or texture. But 【Q22】few people indeed can accurately describe the world's most powerful, important currency.The American dollar bill is colored with black ink on one side and green on the other;【Q23】 the exact composition of the paper and ink is a closely guarded government secret. Despite its weighty importance, the dollar bill actually weighs little. It requires nearly 500 bills to tip the scales at a pound. Not only is the dollar bill lightweight, but it also has a brief life span. Few dollar bills survive longer than 18 months.The word "dollar" is taken from the German word "taler," the name for the world's most important currency in the 16th century. The taler was a silver coin first minted in 1518 under the reign of Charles V, Emperor of Germany.The concept of paper money is a relatively recent innovation in the history of American currency. When the Constitution was signed, people had little regard for paper money because of its steadily decreasing value during the colonial era.【Q24】Because of this lack of faith, the new American government minted only coins for common currency. Interest-bearing bank notes were issued at the same time, but their purpose was limited to providing money for urgent government crises, such as American involvement in the War of 1812.The first noninterest-bearing paper currency was authorized by Congress in 1862, at the height of the Civil War. At this point, citizens' old fears of devalued paper currency had calmed, and the dollar bill was born. The new green colored paper money quickly earned the nickname "greenback."Today, the American dollar bill is a product of the Federal Reserve and is issued from the twelve Federal Reserve banks around the United States. The government keeps a steady supply of approximately two billion bills in circulation at all times.Controversy continues to surround the true value of the dollar bill.【Q25】American history has seen generations of politicians argue in favor of a gold standard for American currency. However, for the present, the American dollar bill holds the value that is printed on it, and little more. The only other guarantee on the bill is a Federal Reserve pledge of as a confirmation in the form of government securities.Q22: What does the speaker say about the American dollar bill?Q23: What does the speaker say about the exact composition of the American dollar bill?Q24: Why did the new American government mint only coins for common currency?Q25: What have generations of American politicians argued for?参考答案1.A)She can devote all her life to pursing her passion.2.D)Science education and scientific research.3.A)A better understanding of a subject.4.B)By making full use of the existing data.5. B) They have no special meanings.6. C) She dreamed of a plane crash.7. D) They can have an impact as great as rational thinking8. C) They reflect their complicated emotions.9. A) Radio waves.10. B)It may have micro—organisms living in it.11. D)Shed light on possible life in outer space.12. A)He found there had been little research on their anguage.13. D)He acted as an intermediary between Copel and the villagers.14. C)Laborious15. B)Their sense of sharing and caring.16 .A)They tend to be silenced into submission.17. D)One who rebels against the existing social orser.18. C)They served as a driving force for progress.19. B)It is impossible for us to be immune from outside influence.20. D) Recognize the negative impact of his coworkers.21. A) They are quite susceptible to suicide.22. B) Few people can describe it precisely.23. C) It is a well—protected government secret.24. A) People had little faith in paper money.25. C) It is awell—protected government secret.翻译:《水浒传》(Water Margin)是中国文学四大经典小说之一。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1.Байду номын сангаас
Introduction
In this paper, we are concerned with the problem of proving the existence of singular solutions numerically for the following system of nonlinear equations: f (x) = 0, f : Rn → Rn , (1)
where f is sufficiently smooth. Various methods such as Krawczyk’s method have been proposed for calculating the regular solutions of Eq. (1) with guaranteed accuracy [3]. A way of calculating singular solutions is to resolve the singularity. The bordering methods have been proposed in this way. In these methods, extended systems are proposed such that singular solutions of the original systems become regular ones for the extended systems. Thus it is natural to consider that it may be possible to prove the existence of the singular solutions of Eq. (1) by applying Krawczyk’s method to the extended systems. However, in the extended systems additional variables are necessary in order to resolve the singularities. A regular solution of the extended system becomes a singular solutions of Eq. (1) when these additional variables are equal to zero. Usually, it is numerically undecidable whether such variables are equal to zero or not. In this paper, based on this consideration the concept of an imperfect singular solution of Eq. (1) is proposed as an exact solution of the extended system of Eq. (1) whose additional variables have norms of small values. Imperfect singular solution always becomes a true singular solution if additional variables are added to the original equation Eq. (1) as perturbations. This is the motivation why we have introduced a new concept.
Yuchi KANZAWA† and Shin’ichi OISHI† , Members
SUMMARY A new concept of “an imperfect singular solution” is defined as an approximate solution which becomes a singular solution by adding a suitable small perturbation to the original equations. A numerical method is presented for proving the existence of imperfect singular solutions of nonlinear equations with guaranteed accuracy. A few numerical examples are also presented for illustration. key words: numerical computation with guaranteed accuracy, Krawczyk-based interval validation method, imperfect singular solutions extended systems
Manuscript received May 7, 1998. Manuscript revised November 12, 1998. † The authors are with School of Science and Engineering, Waseda University, Tokyo, 169–8555 Japan.
Remark that proving the existence of imperfect singular solutions is not proving one of true singular solutions. In this point of view, it may be no sense proving the existence of imperfect singular solutions. Since we think there never exists methods to prove the existence of singular solutions numerically, we regard the method proposed in this paper as the limit of numerical approach to prove the existence of singular solutions. In the field of engineering, we need proving the existence of singular solutions to avoid them. For example, electrical circuits must be designed to have no singular operating points. We have the case that a real electrical circuit has singular operating points while the equation describing this electrical circuit has no singular solutions because of modeling error. Since there is no way to estimate this modeling error completely, it is safe to avoid the points which become singular operating points by some noise. In this point, we think it is valuable to prove the existence of imperfect singular solutions. The plan of this paper is as follows. In the 2nd section, simple isolated singular solution is defined. Some notations and definitions for interval analysis are introduced. An algorithm is also introduced to enclose the regular solution of Eq. (1). In the 3rd section, an extended system for simple isolated singular solution of Eq. (1) is introduced. We shall define the imperfect isolated simple singular solution of Eq. (1) and shall propose an algorithm to enclose it. We shall also indicate a theorem indicating that the proposed algorithm succeeds for sufficiently good approximate solution of Eq. (1). In the 4th section, we shall treat imperfect singular solutions with higher singularity. Finally, numerical examples are also presented for illustration. 2. Preliminaries
In this section, we shall briefly explain notations and definitions which will be used in this paper. 2.1 Singular Point Regularity of functions is defined as follows: Let D be a bounded open subset of Rn . Let f : D → Rn be C 1 . f is regular at x if the Jacobian matrix fx (x) is regular, otherwise f is singular at x. such a point x is called singular point. y ∈ Rn is
相关文档
最新文档