Human-Aware Computer System Design

合集下载

human-agent

human-agent

MokSAF: How should we support teamwork in human-agent teams?Terri L. Lenox†, Terry Payne, Susan Hahn†, Michael Lewis† & Katia Sycara CMU-RI-TR-99-31The Robotics Institute Carnegie Mellon University Pittsburgh, Pennsylvania 15213† University of Pittsburgh School of Information Sciences Dept. of Information Sciences & Telecommunications 135 N. Bellefield Ave. Pittsburgh, PA 15260September 1999© 1999 Carnegie Mellon UniversityThis research has been supported by the Office of Naval Research, ONR grant N-00014-96-1-1222. Views and conclusions contained in the document are those of the authors and should not be interpreted as necessarily representing official policies or endorsements, either expressed or implied, of the Office of Naval Research or the United States Government.KEYWORDSTeams, teamwork, agents, interfaces and planning.1ABSTRACTIn this paper, we describe an interface agent, two different route planning agents and a pilot study which examined whether these agents could support a team planning task. The MokSAF interface agent links an Artificial Intelligence (AI) route-planning agent to a Geographic Information System (GIS). The user specifies a start and an end point and the route-planning agent finds a minimum cost path between the points. The user is allowed to define additional “intangible” constraints (not due to terrain characteristics) corresponding to geographic regions, which can be used to steer the agent’s behavior in a desired direction. A second agent (the naive route planning agent, or Naive RPA) has access to the same knowledge of the terrain and cost functions available to the Autonomous RPA, but uses this knowledge to critique paths specified by the user. We hypothesize that as the complexity of intangible aspects of a planning problem increase, the Naive RPA will improve in relative performance. The reported study found advantages across the board for the Autonomous RPA in a team-planning task.2INTRODUCTIONAs the task environment becomes more complex and uncertain and the time frame for making decisions is shortened, reliance on computer-assisted decision-making by both individuals and teams has increased dramatically. The current trend is towards software that not only retrieves information upon request but also intelligently anticipates, adapts and actively seeks ways to support users [1]. These software agents can reduce the amount of interaction between humans and the computer system and allow the humans to concentrate on other activities such as assessing the situation, making decisions, or reacting to changes in the system [2]. These gains, however, come at the cost of increasing complexity and/or confusion in our relation with software. The management skills of decomposing and delegating tasks and monitoring performance once reserved for human subordinates may become necessary for interacting with sophisticated agents. Conversely, those agents which shield us from complex interactions by quietly looking over our shoulders to anticipate our actions may actually decrease our situational awareness leaving us uncertain as to what is being done on our behalf [3]. These difficulties can be compounded where multiple agents and humans are required to work as a team. Under these conditions, cascading delegation among software agents and unknown silent assistance complicates the already challenging task of cooperating, communicating, and monitoring the task and other team members. Our research focuses on active (agent critiquing) and passive (agent performance) techniques, which enable us to communicate with software agents. While much of the early focus on decision aids has been on supporting the individual [4], we examine the middle ground of individually controlled software agents used in team tasks. Although it is desirable to organize individuals into groups and provide support via software agents, this is not necessarily an easy task. Multiple software agents, working in teams, can autonomously sort through and evaluate the enormous quantities of information available to a team and thus, free it for other crucial tasks. Incorporating software agents into human teams presents many challenges. What roles should agents play in the overall team context? Can these roles be adapted during task performance? What are effective ways for software agents to interact with the human team members and with each other so as to increase team effectiveness? What are the appropriate measures of agent effectiveness within a team context and of team effectiveness?TEAMS AND TEAMWORKCharacteristics of successful teams include self-awareness, within-team interdependence, feedback, performance monitoring, clear communication of intentions, and assisting other team members when necessary. A team can be defined as [9]: “… a distinguishable set of two or more people who interact dynamically, interdependently, and adaptively towards a common and valued goal/objective/ mission, who each have been assigned specific roles or functions to perform, and who have a limited life-span of membership.” Team members must have a shared understanding of the capabilities, goals and intentions of other members in order to function effectively [10]. This shared understanding helps teammates to predict each other’s performance under normal and specific circumstances. Typically, they gain this understanding through experience and training with the system [11]. To contribute to team success, software agents must support these forms of group interaction as well as more task-oriented functions. The potential impact of successful development and deployment of agent technologies to mission critical teams includes:31) Reducing the time to make a decision; 2) Allowing teams to consider a broader range of alternatives; 3) Allowing teams to manage contingencies flexibly by rapidly re-planning; 4) Reducing the time required for a team to form a shared mental model of the situation; 5) Reducing both individual and team errors; 6) Increasing the cohesion among team members; 7) Increasing overall team performance. To be successful, team members must understand how to interact and control the computer technologies. They must know how to gather, summarize and interpret the information necessary to perform the task(s). In addition, team members must understand their role in the task and what information is required by their teammates. Finally, they should be aware of and act in accordance with the strengths and weaknesses of their teammates [5]. We believe that properly designed software agents can alleviate some of the burden from the human members of the team.USING THE INFOSPHERE TO MAKE PLANSHuman decision-makers, particularly military commanders, typically face time pressures and an environment where changes may occur in the task, division of labor, and allocation of resources. Information such as terrain characteristics, location and capabilities of enemy forces, direct objectives and doctrinal constraints are part of the commander’s infosphere. Information within the infosphere has the opportunity for data fusion, situation visualization, and “what-if” simulations. Software agents have access to all information in the infosphere and can plan, criticize, and predict the consequences of actions using the infosphere information at a greater accuracy and finer granularity than the human commanders can. Multiple agents can be designed to use information cooperatively in the infosphere to satisfy specified goals. However, these agents cannot consider information outside the infosphere unless it is captured in physical terms. This extra-infosphere data consists of intangible or multiple objectives involving morale, the political impact of actions (or inaction), intangible constraints, and the symbolic importance of different actions or objectives. Military commanders, like other decision-makers, have vast experiential information that is not easily quantifiable. Commanders must deal with idiosyncratic and situationspecific factors such as non-quantified information, complex or vaguely specified mission objectives and dynamically changing situations (e.g., incomplete/changing/new information, obstacles, and enemy actions). When participating in a planning task, commanders must translate these intangible constraints into physical ones to interact with planning agents. The issue then becomes how software agents should interact with their human team members to incorporate these intangible constraints into the physical environment effectively.TEAM APPROACHESAs the role of teams becomes more important in organizations, developing and maintaining high performance teams has been the goal of several researchers [12,13]. One major question is how to turn a team of experts into an expert team. There are several strategies emerging, including task-related cross training [13] and integrating software agents into human-agent teams, which is the focus of this research. We have developed a framework for examining the different ways that software agents can be deployed in support of team performance: • Support the individual team members in completion of their own tasks;4• •Allocate an agent its own subtask as if we were introducing another member into the team; Support the team as a whole.The first option focuses on the specific tasks that an individual must accomplish as part of the team. For a second option, all the issues associated with communication and coordination among team members become relevant [4,6,7]. The third option involves facilitating communication, allocating tasks, coordinating the human agents, and focusing attention. Specifically the focus is on how software agents can be used to support and promote teamwork. There have been several team models developed by researchers; the one selected for this research is best described by Cannon-Bowers and Salas [5] and Smith-Jentsch, Johnston and Payne [7]. This teamwork model consists of four dimensions that build and maintain situational awareness within the team and hence support effective performance: • • • • Information exchange - exploit all available information sources; disseminate information; provide situation updates; Supporting behavior - prompt correction of team errors; provide and request backup when necessary; Communication - proper terminology; complete internal and external reports; brevity and clarity; Team initiative/leadership - provide feedback to team members; state clear and appropriate priorities.This model focuses on observable, measurable behavior that can be evaluated and used to train teams to be more effective. A basic tenet of this model is that teamwork skills are different from task-based competencies. The performance of teams, especially in tightly coupled tasks, is believed to be highly dependent on these interpersonal skills. In previous studies, we used a low fidelity radar simulation environment called Tandem [8] to examine whether agents should support an individual’s performance or the team’s performance in a target identification task. Three-person teams were provided with one of three different aiding conditions. The first agent, the Individual Agent, aided the individual task and assisted communication among team members by aggregating values. This agent showed all data items available to an individual team member and filled in the values for the data items as the participants selected them from a menu. The second agent, the Team Clipboard Agent, aggregated values from all members and automatically passed values as they were selected from the menu to the appropriate team member. The third agent, Team Checklist, aided team coordination by displaying who had access to what data. Teams were asked to identify a series of targets on the radar screen. These targets varied in how difficult they were to identify. That is, easy targets had no ambiguity on five pieces of identification data; medium targets had ambiguity on one or two data items out of five possible data items; and hard targets were ambiguous on two out of five items. We found that aiding teams helped more than aiding individuals when the team was faced with hard targets.THE PLANNING ENVIRONMENT: MOKSAFA computer-based simulation called MokSAF has been developed to evaluate how humans can interact and obtain assistance from agents within a team environment. MokSAF is a simplified version of a virtual battlefield simulation called ModSAF (Modular Semi-Automated Forces). MokSAF allows two or more commanders to interact with one another to plan routes in a particular terrain. Each commander is tasked with planning a route from a start point to a shared rendezvous point by a certain time. The individual commanders must then evaluate their plans from a team perspective and iteratively modify these plans until an acceptable team solution is developed.5The interface agent that is used within the MokSAF Environment is illustrated in Figure 1. This agent presents a terrain map, a toolbar, and details of the team plan. The terrains displayed on the map include soil (plain areas), roads (solid lines), freeways (thicker lines), buildings (black dots), rivers and forests. The rendezvous point is represented as a red circle and the start point as a yellow circle on the terrain map. As participants create routes with the help of a route-planning agent (see below), the routes are shown in bright green. The second route shown is from another MokSAF commander who has agreed to share a route. The partially transparent rectangles represent intangible constraints that the user has drawn on the terrain map. These indicate which areas should be avoided when determining a route.Start Point (Commander 1) ToolBarTerrain:Soil River Forest Road BuildingsRoutes:Commander 1 Commander 2Details of selected units, available fuel etc.Intangible (dynamic) constraintStart Point (Commander 2)Shared RendezvousFigure 1: The MokSAF Interface AgentROUTE-PLANNING AGENTSTwo different route-planning agents (RPAs) have been developed which interact with the human team members in the planning task. The first agent, the Autonomous RPA, guides the human team members through the route-planning task and performs much of the task itself. This agent acts much like a “black box”. The agent creates the route using its knowledge of the physical terrain and an artificial intelligence planning algorithm that seeks to find the shortest path. The agent is only aware of physical constraints, which are defined by the terrain map and the platoon composition, and intangible constraints, which are specified by the commanders. The second agent, the Naive RPA, analyzes the routes drawn by the human team members and helps them to refine their plans. In this mode, the human and agent work jointly to solve the problem (e.g. plan a route to a rendezvous point). The system was designed so that the workload is shared between the different components (agent or human) according to each component’s relative strengths. Thus, the6commander, who has a privileged understanding of the intangible constraints and utilities associated with the mission, can direct the route around these constraints as desired. However, the commander may not have detailed knowledge about the terrain, and so the agent can indicate where the path is suboptimal due to violations of physical constraints. The commander draws the desired route and requests that the Naive RPA review the route for physical violations or to indicate ways in which the path could be improved. The commander can iteratively improve the plan until a satisfactory solution is reached.EXPERIMENTAL METHODOLOGYIn the MokSAF pilot experiments, a deliberative, iterative and flexible planning task is examined. There are three commanders (Alpha, Bravo and Charlie), each with a different starting point and a common rendezvous point. Each commander selects units for his/her platoon from a list of available units. This list currently contains M60A3 tanks, M109A2 artillery units, M1 Abrams tanks, AAV-7 amphibious assault vehicles, HMMWVs (i.e., hummers), ambulances, combat engineer units, fuel trucks and dismounted infantry. It can be easily modified to add or delete unit types. With the help of one of the RPAs, each commander plans a route from a starting point to the rendezvous point for the specified platoon. Once a commander is satisfied with the individual plan, he/she can share it with the other commanders. Teammates needed to communicate with one another to complete their tasks successfully. Conflicts can arise due to several issues including shared routes and/or resources and the inability of a commander to reach the rendezvous point at the specified time. The mission supplied to the commanders provides them with a final total of vehicles required at the rendezvous point. They must coordinate regarding the number and types of vehicles they are planning to take to the rendezvous point. In addition, the commanders are told that they should not plan a route that takes them on the same path as any other commander and that they should coordinate their routes to avoid shared paths. Materials MokSAF 2.0 was used for this pilot study. It consists of an interface agent that presents the commander with a standard terrain map and markings, a toolbar as seen in Figure 1, a communication window where commanders can send and receive messages and share plans, and a constraint tree. The two different route-planning agents described above were evaluated. Participants Fifteen teams consisting of three-persons were recruited (10 teams who used the Autonomous RPA, and five who used the Naive RPA) from the University of Pittsburgh and Carnegie Mellon University communities. Participants were recruited as intact teams, consisting of friends or acquaintances. Procedures Each team participated in a 90-minute session that began with a 30-minute training session in which the MokSAF environment and team mission were explained. The team was told to find the optimal path between the start and rendezvous points, to avoid certain areas or go by other areas, to meet the mission objectives for numbers and types of units in their platoon, and to avoid crossing paths with the other commanders. After the training session, the team participated in two 15-minute trials. Each trial used the same terrain, but different start and rendezvous points and different platoon requirements. At the conclusion, participants were asked to complete a brief questionnaire. We are measuring individual and team performance with respect to the planning task, and using a cognitive work analysis technique to analyze the interaction among the team members to determine if and how each type of agent supports the team as a whole. One question we hope to answer is which7interface type best supports the overall team performance in this type of task. There are two expected trade-offs between the Autonomous RPA (which acts as an oracle) and the Naive RPA (which acts as a critic): 1) The complexity of intangible constraints and multiplicity of goals; 2) The time and/or quality of the agent-generated solutions (Autonomous RPA) versus the agentcritiqued solutions (Naive RPA).RESULTSWe examined time to share a route for the three commanders and found that the Autonomous RPA had an advantage over the Naive RPA (p <.005 for Alpha, p < .063 for Bravo and p < .006 for Charlie). Groups using the Autonomous RPA spent less time creating their individual plans before sharing them with their teammates (Tables 1 and 2) These results are illustrated in Figure 2.Time to Share RoutesTable 1: Time to Shares Route in Trial 1 Route-Planning Alpha Bravo Charlie Agent Trial 1 Trial 1 Trial 1 Autonomous 5.17 5.2 5.4 Naive 8.69 9.57 6.71086Alpha Scenario 1 Bravo Scenario 1Table 2 : Time to Share Routes in Trial 2 Route-Planning Alpha Bravo Charlie Agent Trial 2 Trial 2 Trial 2 Autonomous 2.9 4.01 4.4 Naive 7.1 6.15 8.7Charlie Scenario 14Alpha Scenario 2 Bravo Scenario 22Charlie Scenario 2Autonomous RPANaive RPAFigure 2 Time to Share RoutesWe also examined the individual path lengths for each commander at two points in each trial - when routes were first shared with the team and at the end of the 15-minute trial (Tables 3 and 4). The ending path lengths for Alpha (p < 0.000), Charlie (p < .000) and combined (p < 0.000) were better using the Autonomous RPA than with the Naive RPA (see Figure 3).Path LengthsTable 3: Ending Path Length in Trial 1 Route-Planning Alpha Charlie Total Trial Agent Trial 1 Trial 1 1 Autonomous 79.7 7.8 181.6 Naïve 153.8 37.8 282.2300200Alpha Scenario 1 Alpha Scenario 2 Bravo Scenario 1 Bravo Scenario 2Table 4: Ending Path Length in Trial 2 Route-Planning Alpha Charlie Total Agent Trial 2 Trial 2 Trial 2 Autonomous 31.1 53.5 114.8 Naïve 77.4 91.6 210.6100Charlie Scenario 1 Charlie Scenario 2 All Paths Scenario 10 Autonomous RPA Naive RPAAll Paths Scenario 2Figure 3: Ending Path Lengths 8It is expected that path lengths between the first time a route was shared and at the end of a trial would vary due to issues related to conflict resolutions among the teammates. There was a significant difference in the change in path lengths from these two points in time (p < .018). Table 5 (and Figure 4) shows Change in Path Lengths 300 that participants using the Naive RPA made more changes in their paths. This change could be due to the state of the route when it was first shared; that is, the routes drawn by the participants may have 200 required additional refinement during the trial. Another possible reason for the change in the paths could be due to interactions with teammates.Table 5: Change in Path Lengths from First Share to End of Trial Route-Planning Agent Trial 1 Trial 2 Autonomous 130.4 37.1 Naïve 222.2 82.8100Scenario 1 0 Scenario 2Autonomous RPANaive RPAFigure 4: Change in Path LengthsParticipants were asked to create optimal routes given certain confounding factors (e.g., avoiding constraints, going to designated areas, and avoiding traveling on the same paths as other commanders). They were also asked to plan as a group numbers and types of units at the rendezvous point. We found that there was no difference in this selection of units in either route-planning agent.DISCUSSIONIn its current form, the Autonomous RPA has been shown to provide better assistance for both individual route planning and team-based re-planning. While the individual plans for Naive RPA users in the Alpha and Bravo roles were not significantly different from Autonomous RPA users in quality, it took them substantially more time to construct their routes. The eventual coordinated routes were uniformly better for each of the individual positions in the Autonomous RPA group and for the team as a whole. Despite this clear superiority, participants in the Autonomous RPA group frequently expressed frustration with the indirection required to arrange constraints in the ways needed to steer the agent’s behavior and often remarked that they wished they could “just draw the route by hand”. Comments on the Naive RPA focused more closely on the minutiae of interaction. In its current form, the user “draws” a route on the interface agent by specifying a sequence of points at the resolution of the terrain database. To do this, the user clicks to specify an initial or intermediate point in the path and then clicks again at a second point. A sequence of points is then drawn in a straight line between these locations. A route is built up incrementally by piecing together a long sequence of such segments. Although tools are provided for deleting unwanted points and moving control points, the process of manually constructing a long route is both tedious and error prone. While interaction with the Autonomous RPA automatically avoids local obstacles such as trees and closely follows curves in roads due to their less costly terrain weights, a user constructing a manual route is constantly fighting unseen obstacles which void her path or line segments which stray a point or two off a road into high penalty terrain. The anticipated advantages of heuristic planning and cooperation among human users were largely lost due to the necessity of focusing on local rather than global features of routes. Rather than zooming in and out on the map to see the start and rendezvous points before beginning to draw, our subjects were forced to work from the first at the highest magnification in order to draw locally correct segments. The resulting problems of maintaining appropriate directions across scrolling segments of a9map are not dissimilar to hiking with a compass. Although you can generally move in approximately the right direction you are unable to take advantage of features of the terrain you might exploit if a more global view were available.Of the lessons learned in this initial test of our agent-based alternatives, the difficulty of creating good interfaces for communicating human intent stands out. The Autonomous RPA, which minimizes the human-communication, was very successful in its initial implementation. The Naive RPA, by contrast, will require substantial revision before it approaches the planner in articulatory directness and fluency. We hope that subsequent refinements to the Naive RPA may allow a more thorough comparison of the effects of agent and human initiative on team planning and re-planning tasks.A CKNOWLEDGEMENTSThis research was supported by an Office of Naval Research grant N-00014-96-1-1222. Special thanks go to Constantine Domashnev, Glenn Lautenbacher and Martin van Velsen for their assistance in the development of this software.R EFERENCES1. Bradshaw, J. M. (1997). “Introduction,” in J. M. Bradshaw (ed.) Software Agents. AAAI Press: Menlo Park, CA, 3-48.2. Zachary, W., Le Mentec, J-C., and Ryder, J. (1996). “Interface agents in complex systems,” In C. A. Ntuen and E.H. Parks (Eds), Human Interaction with Complex Systems: Conceptual Principles and Design Practice, Kluwer Academic Publishers.3. Lewis, M. (1998). “Designing for human-agent interaction,” AI Magazine, Summer 1998, 67-78.4. Roth, E. M., Malin, J. T. and Schreckenghost, D. L. (1997). “Paradigms for Intelligent Interface Design.” In M. Helander, T. K. Landauer, and P. Prabhu (Eds), Handbook of Human-Computer Interaction, Second Edition, 1177 -1201.5. Cannon-Bowers, J.A., and Salas, E. (1998). “Individual and Team Decision Making Under Stress: Theoretical Underpinnings.” In J.A. Cannon-Bowers, and E. Salas (Eds.) Making Decisions Under Stress: Implications for Individual and Team Training. American Psychological Association: Washington, D.C.6. Jones, P. M. and Mitchell, C. M. (1995). “Human-computer cooperative problem solving: Theory, design, and evaluation of an intelligent associate system.” IEEE Transactions on Systems, Man, and Cybernetics. SMC-25(7), 1039-1053.7. Smith-Jentsch, K. Johnston, J. H., and Payne, S. C. (1998). “Measuring team-related expertise in complex environments”. In J. A. Cannon-Bowers and E. Salas (Eds.), Decision Making Under Stress: Implications for Individual and Team Training. Washington, DC: American Psychological Association.8. Lenox, T., Lewis, M. Roth, E., Shern, R., Roberts, L., Rafalski, T., and Jacobson, J. (1998). “Support of Teamwork in Human-Agent Teams.” IEEE Conference on Systems, Man, and Cybernetics, 1341-1346.9. Salas, E., Dickinson, T.L., Converse, S.A., and Tannenbaum, S.I. (1992). “Towards an understanding of team performance and training.” In R. W. Swezey and E. Salas (Eds.), Teams: Their training and performance. Norwood, NJ:Ablex. 3-29.10. Rouse, W.B., Cannon-Bowers, J.A. and Salas, E. (1992) “The role of mental models in team performance in complex systems.” IEEE Conference on Systems, Man, and Cybernetics, 22, 1296-1308.。

以aiandus为主题的英语作文

以aiandus为主题的英语作文

以aiandus为主题的英语作文The world of AI and us is a fascinating and ever-evolving landscape, one that has profoundly impacted our lives in ways we could have scarcely imagined. As we delve deeper into this technological revolution, it becomes increasingly clear that the relationship between artificial intelligence and humanity is one that demands our utmost attention and understanding.At the heart of this symlex lies the notion of AI as a tool to enhance and empower us. From the automation of tedious tasks to the development of groundbreaking medical treatments, AI has become an indispensable part of our daily lives. It has revolutionized the way we work, communicate, and even entertain ourselves. The sheer breadth of AI's applications is staggering, and it is a testament to the ingenuity and creativity of the human mind.However, as with any powerful technology, the advent of AI has also raised a multitude of ethical and philosophical questions. As we cede more and more control to these intelligent systems, we must grapple with the implications of our actions. What are the moral and ethical considerations that we must weigh as we continue to push the boundaries of what is possible? How do we ensure that AI isdeveloped and deployed in a way that benefits all of humanity, rather than serving the interests of a select few?These are not easy questions to answer, and they require us to engage in deep and nuanced discussions. On one hand, the potential benefits of AI are undeniable – from revolutionizing healthcare to unlocking new realms of scientific discovery. Yet, on the other hand, the risks of AI, if not properly managed, are equally profound. The specter of job displacement, the erosion of privacy, and the potential for AI-powered surveillance and manipulation all loom large in our collective consciousness.As we grapple with these complex issues, it is essential that we approach them with a spirit of open-mindedness and collaboration. We must bring together experts from diverse fields – from computer science and ethics to philosophy and sociology – to craft a comprehensive and holistic understanding of the challenges and opportunities that AI presents. Only by working together can we ensure that the development of AI is guided by our shared values of justice, equality, and human flourishing.At the same time, we must also acknowledge the inherent biases and limitations of AI systems. These intelligent algorithms are ultimately products of human design, and they can perpetuate and amplify the biases and prejudices that exist within our own societies. As wecontinue to develop and deploy AI, we must be vigilant in identifying and addressing these biases, ensuring that these systems do not further marginalize already vulnerable populations.Moreover, as AI becomes increasingly sophisticated and autonomous, we must also confront the question of AI consciousness and agency. What does it mean for an artificial system to be self-aware or to possess a sense of autonomy? How do we navigate the ethical and legal implications of AI that can make independent decisions and take actions that impact human lives? These are questions that will only grow in importance as AI continues to evolve.Ultimately, the relationship between AI and us is a complex and multifaceted one, one that demands our constant attention and engagement. As we move forward into this brave new world, we must be guided by a spirit of curiosity, humility, and a deep commitment to the betterment of all humanity. Only by embracing the challenges and opportunities of AI can we truly harness its transformative power and ensure that it serves as a force for good in the world.。

英语作文关于大学生如何利用人工智能

英语作文关于大学生如何利用人工智能

英语作文关于大学生如何利用人工智能全文共3篇示例,供读者参考篇1AI: The Future is Now for College StudentsAs a college student in this day and age, it's hard not to be amazed by the rapid development of artificial intelligence (AI) technology. AI seems to have gone from a far-off concept in science fiction movies to a very real and powerful tool that is transforming how we live, work, and learn. While AI still has a long way to go, I believe it's crucial for my generation to understand and embrace this technology if we want to succeed in the future.Of course, many people have concerns about AI, fearing that smart machines will make human labor obsolete or that advanced AI systems could eventually become a threat to humanity itself. However, I think a lot of that anxiety stems from not fully grasping what AI currently is and is not capable of. Modern AI is incredibly advanced at certain specialized tasks like data analysis, pattern recognition, and language processing. But AI today is what's known as "narrow" or "weak" AI, meaning itcan only excel at specific functions it was trained for. We are nowhere close to achieving artificial general intelligence (AGI) that could replicate the full intellect and reasoning capabilities of the human mind.So rather than be afraid of AI, I believe my generation should focus on learning how to effectively leverage and work alongside these incredibly useful technologies to enhance our productivity and skills. Here are some of the key ways I see AI benefiting college students today:Writing AssistanceLet's face it - writing essays, research papers, and long-form content is one of the biggest pain points for students. AI writing tools can make this process much easier by helping to catch grammar/spelling errors, suggesting better word choices, checking for plagiarism, and even generating rough drafts from an outline. AI won't completely replace human writing anytime soon, but it can streamline the process significantly.Research and Information GatheringThe Internet gives us access to more information than any single human could ever consume. AI search assistants and question-answering bots can help sift through all that data muchmore intelligently and efficiently. Rather than getting lost down Internet rabitholes, AI can quickly surface relevant facts, insights, and sources for research topics.Studying and TutoringThanks to advances in natural language processing, AI tutors can engage in remarkably natural language dialogues to explain complex topics, answer follow-up questions, provide examples, and pinpoint knowledge gaps - all at any time of day at the student's convenience. Some AI tutoring apps篇2Harnessing the Power of AI: A College Student's GuideAs a college student in the rapidly evolving digital age, I can't help but feel both excited and intimidated by the advancements in artificial intelligence (AI). On one hand, AI promises to revolutionize the way we learn, work, and live. On the other hand, the sheer scope of its potential can be overwhelming, leaving many of us unsure of how to harness its power effectively.Before we delve into the practical applications of AI, let's first understand what it is. At its core, AI refers to the simulation of human intelligence processes by machines, particularlycomputer systems. These processes include learning, reasoning, problem-solving, perception, and language processing. AI has already permeated various aspects of our lives, from virtual assistants like Siri and Alexa to recommendation systems on streaming platforms.For college students, AI presents a plethora of opportunities to enhance our academic journeys and future careers. However, it's crucial to approach this technology with a balanced mindset, recognizing both its potential and limitations.Research and Information GatheringOne of the most significant advantages of AI for college students is its ability to streamline research and information gathering. Advanced search algorithms and natural language processing technologies can help us sift through vast amounts of data, identifying relevant sources and extracting key insights more efficiently than traditional methods.AI-powered research assistants can aid in literature reviews, data analysis, and even suggest new avenues for exploration based on existing knowledge. This not only saves time but also enhances the quality and depth of our research endeavors.Personalized Learning ExperiencesAI has the potential to revolutionize education by offering personalized learning experiences tailored to individual needs and learning styles. Adaptive learning platforms can analyze a student's strengths, weaknesses, and progress, adjusting the content and pace accordingly.AI-driven tutoring systems can provide real-time feedback, identify knowledge gaps, and offer targeted support. Furthermore, virtual reality (VR) and augmented reality (AR) technologies, powered by AI, can create immersive learning environments, making abstract concepts more tangible and engaging.Creative Exploration and IdeationContrary to popular belief, AI is not just about crunching numbers or processing data. It can also be a powerful tool for creative exploration and ideation. AI-powered writing assistants, for instance, can help us overcome writer's block, suggest creative prompts, and even generate entire passages based on our input.Similarly, AI can be leveraged in areas like design, music composition, and art, offering new perspectives and inspiring novel creations. By collaborating with AI, we can push theboundaries of our creative potential and explore ideas that may have been overlooked or deemed too complex.Time Management and ProductivityAs college students, we often juggle multiple responsibilities, from classes and assignments to extracurricular activities and part-time jobs. AI can be a valuable ally in managing our time and boosting productivity.Intelligent scheduling assistants can help us optimize our calendars, prioritize tasks, and even suggest productivity techniques based on our habits and preferences. AI-powered note-taking and study aid tools can help us stay organized, streamline our learning processes, and retain information more effectively.Career Exploration and Skill DevelopmentLooking ahead, AI will undoubtedly shape the future job market, creating new opportunities while rendering some traditional roles obsolete. As college students, it's essential to stay ahead of the curve and develop the skills necessary to thrive in an AI-driven workforce.AI can assist us in exploring various career paths, identifying our strengths and weaknesses, and recommending relevantcourses, certifications, or training programs. Online coding platforms and AI-powered tutorials can help us acquirein-demand skills, such as programming, data analysis, and machine learning, preparing us for the jobs of tomorrow.However, amidst these exciting possibilities, it's crucial to approach AI with a critical and ethical mindset. We must be aware of potential biases and limitations within AI systems, as well as the risks of over-reliance on technology.Additionally, we should strive to understand the ethical implications of AI, particularly in areas like privacy, security, and the responsible development and deployment of these technologies. As future leaders and innovators, it's our responsibility to ensure that AI is used in a way that benefits society while upholding our values and principles.In conclusion, AI presents a wealth of opportunities for college students to enhance our learning experiences, boost productivity, and prepare for the future job market. By embracing this technology with a balanced and ethical approach, we can harness its power to unlock new realms of knowledge, creativity, and personal growth.As we navigate the rapidly evolving AI landscape, let us approach it with curiosity, critical thinking, and a commitment tousing it responsibly for the betterment of ourselves and society as a whole.篇3AI and Me: Harnessing the Power of Artificial Intelligence as a College StudentAs a current college student, I can't help but be in awe of the rapid advancements in artificial intelligence (AI) that have taken place in recent years. What once seemed like the stuff of science fiction is now an integral part of our daily lives, from the virtual assistants on our smartphones to the recommendation algorithms that suggest our next Netflix binge. But beyond these consumer-facing applications, AI has the potential to revolutionize the way we learn, study, and approach our academic pursuits. In this essay, I'll explore how college students like myself can harness the power of AI to enhance our educational experience and better prepare for the future.One of the most promising applications of AI in education is its ability to personalize learning. Traditional classroom settings often struggle to cater to the individual needs and learning styles of each student. With AI, however, adaptive learning platforms can analyze a student's strengths, weaknesses, and preferences,and tailor the content and delivery accordingly. Imagine anAI-powered tutoring system that can identify the specific areas where you're struggling and provide personalized explanations, examples, and practice exercises to help you grasp the concepts more effectively. This level of customization has the potential to significantly improve learning outcomes and make the educational experience more engaging and rewarding.Another area where AI can be a game-changer for college students is in the realm of research and information gathering. The sheer volume of information available online can be overwhelming, and sifting through countless sources to find relevant and reliable information can be a daunting task.AI-powered search engines and research assistants can help streamline this process by intelligently filtering and organizing information based on your specific needs and interests. Imagine being able to ask a virtual research assistant a complex question and receive a comprehensive summary drawing from the most authoritative and up-to-date sources. This could save countless hours of manual research and enable us to delve deeper into our areas of study.AI can also be a powerful tool for enhancing our writing and communication skills, which are essential for academic andprofessional success. AI-powered writing assistants can analyze our writing for grammar, style, and coherence, providing valuable feedback and suggestions for improvement. Furthermore, natural language processing (NLP) technologies can help us better understand and communicate in multiple languages, opening up new opportunities for cross-cultural exchange and global collaboration.Beyond these academic applications, AI can also assist college students in navigating the various challenges and responsibilities。

2019-2020学年江苏省徐州市高一(下)期末英语试卷

2019-2020学年江苏省徐州市高一(下)期末英语试卷

2019-2020学年江苏省徐州市高一(下)期末英语试卷第二部分阅读理解(共两节,满分25.0分)第一节(共3小题;每小题2.5分,满分25.0分)阅读下列短文,从每题所给的A、B、C、D四个选项中选出最佳选项.11.(7.5分)Medical Practices in Ancient EgyptLearning from the DeadTo find out why people have died,today's medical examiners perform autopsies(尸体解剖).They cut open the body and study its parts.Ancient Egyptians also performed autopsies to help understand causes of death.In addition,autopsies helped ancient Egyptians study the human body.By comparing the hearts of people who were different ages,for example,Egyptians could determine what a young,healthy heart was supposed to look like.Keeping a Written RecordThe Egyptians not only studied the human body,but they also kept detailed records of what they discovered.They wrote and drew their observations on papyrus,a form of paper.The papyrus records became the medical textbooks of that time.Their observations allowed Egyptian doctors to share their knowledge,including how to treat various diseases.Edwin Smith PapyrusIn 1862,an American named Edwin Smith purchased a medical papyrus in Luxor,Egypt Smith was not a medical expert,but he knew a lot about old documents.He knew that what he had found was valuable.The papyrus turned out to be an ancient textbook on surgery.The papyrus was probably written around 1600 BC,but it was based on information from a thousand years before that.The papyrus presents the information as case studies,including an analysis of how patients survived or died.(1)By performing autopsies,ancient Egyptians could .A.determine the causes of illnessesB.learn about different body partsC.keep detailed records on textbooksD.share what they had discovered(2)The document bought by Edwin Smith was valuable because it was .A.originally written on papyrusB.an ancient medical textbookC.discovered by a medical expertD.written a thousand years before(3)This article is probably from .A.a story bookB.a health leafletC.a medical magazineD.a biology textbook12.(7.5分)You wait 50 years for a flying car,and then three come along at once.First up is Vahana:an airbus project to develop batterypowered,single-seater aircraft,designed to follow predetermined routes,only changing directions to avoid accidents.Propellers(螺旋桨)on the wings will let it take off and land without a runway.Second,Dubai recently announced plans to use self-controlled air taxis as a way to beat the terrible traffic jams.The Volocopter is an electric multi-copter with 18 propellers and a fully self-controlled system.It's essentially a self-controlled aircraft with two seats and up to 30 minutes of flying time.But,if you want something more like the flying cars of 1950s science fiction,try Urban Aeronautics' Fancraft.The Israel-based company wants to realize the dream of "an aircraft that looks like the classic vision of a flying car:doesn't have a wing,doesn't have a propeller that can be seen,and can fly exactly from point to point," says Janina Frankel-Yoeli,Urban Aeronautics' vice president of marketing.Earlier flying cars needed runways to take off and land which was,as Frankel-Yoeli says,"not much better than owning a car and an aircraft." To go from point to point requires vertical take-off and landing,but for many years that could only be done by helicopters or larger aircraft.Urban Aeronautics' solution is to use light but powerful engines,lightweight materials,and a self-controlled system.Their fan design-propellers housed in some special tubes-is powerful but unstable,so the Fancraft would be challenging for a human to fly without any help.Instead,computer-aided control technology takes over the tiny,quick changes required to keep the car stable at speeds of 160km/h or more.But don't be glad too early yet.The main problem to a sky full of flying cars is rules.Not only will every aircraft need to pass strict safety tests,but a new system of air traffic control will be needed to deal with 3-D traffic jams above people who are not aware of what is happening in the sky.NASA is already working on that.Tests have shown that multiple unmanned(无人的)flying cars can communicate with each other to avoid accidents.In the meantime,flying cars will mainly be reserved for emergency services and a few VIPs.(1)Vahana is different from the Volocopter in that .A.it is power-freeB.it is self controlledC.its routes are fixedD.its propellers can be seen(2)The underlined word "vertical" in the third paragraph most probably means .A.going straight up or downB.flying high and fastC.going across back or forthD.flying quietly and safely(3)What can we infer from the last paragraph?A.NASA helps flying cars to communicate.B.There will be no traffic jams if cars can fly.C.Rules for flying cars have already been made.D.It is unusual for ordinary people to use flying cars.13.(10分)In November,a cold,unseen stranger that killed many people came to visit the city.Johnsy lay on her bed,seriously ill.Her friend Sue saw she was looking out the window and counting-counting backward."Twelve," she said,and a little later "eleven";and then "ten" and "nine";and then "eight" and "seven," almost together.Sue looked out the window.An old ivy vine(常青藤),going bad at the roots,climbed half way up the wall.The cold breath of autumn had stricken leaves from the plant until its branches, almost bare(光秃秃的),hung on the bricks."What is it,dear?" asked Sue."Leaves.On the plant.When the last one falls I must go,too.""Oh,what have old ivy leaves to do with your getting well?Try to eat some soup now," said Sue."And,I must call Mister Behrman up to be my model for my drawing.Don't try to move until I come back."Old Behrman was a painter who lived on the ground floor.Behrman was a failure in art.For years,he had always been planning to paint a work of art,but had never yet begun it.He was a fierce(暴躁的),little,old man who protected the two young women in the studio apartment above him.Sue told him about Johnsy and how she feared that her friend would float away like a leaf.Old Behrman was angered at such an idea."This is not any place in which one so good as Miss Johnsy shall lie sick," yelled Behrman."Some day I will paint a masterpiece,and we shall all go away."The next morning,Johnsy and Sue were surprised to find there yet stood against the wall one ivy leaf after the beating rain and fierce wind that blew through the night.It was the last one on the vine.It was still dark green at the center.But its edges were colored with the yellow.It hung bravely from the branch about seven meters above the ground."It is the last one," said Johnsy."It will fall today and I shall go at the same time."But the next morning,the ivy leaf was still there.Johnsy lay for a long time,looking at it. And then she called to Sue,"who was preparing chicken soup.""Something has made that last leaf stay there to show me how badI was.It is wrong to want to die.You may bring me a little soup now." said Johnsy.The next day,the doctor came,and told Sue Johnsy was out of danger.Later that day,Sue came to the bed where Johnsy lay,and put one arm around her."Mr. Behrman died of pneumonia(肺炎)today.He was sick only two days.They found him the morning of the first day in his room downstairs helpless with pain.His shoes and clothing were completely wet and icy cold.They could not imagine where he had been on such a terrible night. And then they found a lantern,still lighted.And a ladder that had been moved from its place. And art supplies and a painting board with green and yellow colors mixed on it.""Look out the window,dear,at the last ivy leaf on the wall.Didn't you wonder why it never moved when the wind blew?Ah,darling,it is Behrman's masterpiece-he painted it there the night that the last leaf fell."(1)In the first paragraph,"a cold,unseen stranger" refers to .A.a personB.an illnessC.a beastD.an object(2)What does Johnsy mean when she says "when the last one falls I must go,too."?A.She will leave the city.B.She will die soon.C.She will fall with the leaf.D.She will recover.(3)Who plays the most important part in helping Johnsy recover?A.Sue.B.The doctor.C.Behrman.D.Johnsy herself.(4)What can be a suitable title for the passage?A.The last leafB.A kind painterC.A deadly diseaseD.The valuable friendship第二节(共1小题;每小题10分,满分10分)阅读下面短文,从短文后的选项中选出可以填入空白处的最佳选项.注意:选项中有两项为多余选项.14.(10分)How to plan the perfect walking holidayAs health and wellbeing is at the forefront of everyone's mind,walking holidays are becoming increasingly popular as an alternative to the beachtrip.(1)Below we have discussed some of the top things to consider to ensure your walking holiday is absolutely perfect.Choose the Right LocationLocation is key for a walking holiday as you'll be spending the majority.of your time in the outdoors.Routes(路线),weather and nearby hotels are all important things to consider and knowing what you want from your holiday will finally decide where you go.(2)Once you've decided on the location you will want the best place to rest,so it's important to get your hotels right.Dorset Holiday Cottages are the perfect place to call home during your trip.Know Your AbilitiesBefore you start walking on your first day it's important that you know your abilities.If you've been training for months for this holiday and are good at map reading,taking to the outdoors may seem like a piece of cake.(3)It is also vital to check the weather before you depart on your days walking to ensure it's clear enough for a safe walk…Pack Carefully(4)Making a list of things needed can really help.Outline the items which are necessary for your overall trip,and the things you may need to take with you in your day bag. Items such as spare clothes,the right footwear,walking sticks and of course food and water for the longer day trips are all necessary.Remember to pack light in your day bag but ensure you have everything you need for a day out of civilization!Relax and EnjoyRemember that this is a holiday and take time out of your day to relax and enjoy the amazing views and wildlife around you.Walking holidays are a fantastic way to spend time in the outdoors and reconnect with nature,whether you're travelling in a big group or going solo.(5)A.But as with any holiday,planning should go first.B.This is also an excellent way to meet new people.C.Remember to take it easy and enjoy every second.D.If you are alone,join up with another group of hikers.E.It is important to carefully consider each item you prepare.F.For example,a calming coastal walk or a tiring mountain climb?G.But for those with little experience,prepare your routes in advance.第三部分语言知识运用(共三节,满分30分)第一节完形填空(共1小题;每小题1.5分,满分30分)阅读下面短文,从每题所给的A、B、C、D四个选项中选出可以填入空白处的最佳选项.15.(30分)Courtney Holmes offers his young customers a little something extra with their haircut."HEY,HOW YOU DOING?I'm Courtney.What (1)are you in?Third?What's your favorite book?Elephant and Piggy?Yeah,I got it." If you thought you'dwalked into a (2)with a greeting like that,you wouldn't be too far off.(3),you've entered the (4)of Courtney Holmes,also known as the Storybook Barber.Two years ago,Holmes began to donate his time and give (5)haircuts to kids from poor families so they'd look (6)on that first day of classes,although Saturday was his (7)haircutting day,"The kids should earn their free haircut by having to read a book to me," Holmes said.The idea was so (8)that he continued it the first.Saturday of every month for the next two years.Five-to-ten-year-old boys would (9)a favorite book,settle into the barber chair,and read aloud (10)Holmes cut hair.After the haircut,they'd review the book-just like in school,but more (11).Holmes,who has two sons,(12)that not every parent has the time to read with their kids."I get it.You have four(13)to look after,and you're working two jobs.You have to clean the house or cook dinner.Sitting down and listening to them read is the (14)thing you have time to do.(15)I say bring your kids in and let them read to me." Holmes admits he,too,(16)from the free cut-and-reads."There was a seven-year-old who had difficulty reading,(17)through his book," said Holmes.He had the boy take the book home and (18).When the child came back a few days later,"He read it with(19)problems.That inspires me.""The world today is one with guns and (20)," he says,"it's a safe place for the kids to come to the barbershop and read books."(1)A.school B.grade C.class D.group(2)A.library B.museum C.park D.supermarket(3)A.On the contrary B.On the whole C.In brief D.In fact(4)A.studio B.bedroom C.workplace D.office(5)A.unusual B.fashionable C.different D.free(6)A.sharp B.secure C.pleased D.academic(7)A.cheapest B.earliest C.busiest D.happiest(8)A.amazing B.fancy C.unique D.popular(9)A.design B.buy C.choose D.pack(10)A.while B.until C.since D.after(11)A.serious B.fun C.difficult D.formal(12)A.announces B.comments C.recognizes D.urges(13)A.tasks B.kids C.houses D.problems(14)A.last B.interesting C.first D.dull(15)A.Or B.And C.So D.But(16)A.learns B.escapes C.evolves D.benefits(17)A.struggling B.glancing C.complaining D.whispering(18)A.quit B.practice C.stare D.play(19)A.true B.other C.some D.no(20)A.weakness B.violence C.darkness D.distance第二节短文填空(共1小题;每小题1.5分,满分15分)阅读下面短文,在空白处填入1个适当的单词或括号内单词的正确形式.16.(15分)The Yellow Crane Tower has (1)very long history.Why was the Yellow Crane Tower built?Due to the ideal location,it was built by Sun Quan as a watchtower for his army. After(2)seemed hundreds of years,its military function was(3)(gradual)forgotten and the tower was enjoyed mainly as a picturesque location.During the Tang Dynasty,many popular poems were written in praise of the Yellow Crane Tower.It was the Yellow Crane Tower poem(4)made the tower so famous and attractive.During the following centuries,it (5)(destroy)and rebuilt several times.The Yellow Crane Tower had different architectural features in different (6)(dynasty).However,the very tower(7)stands today is based on the one (8)(design)during the Qing Dynasty.How tall is the Yellow Crane Tower?It stands 51.4 meters high.The (9)(appear)of the Yellow Crane Tower is the same regardless of the direction it is viewed from.On top of the tower,visitors are treated to a fantastic view of the Yangtze River,its bridge and the (10)(surround)buildings in Wuhan City.Enjoying the fame of "The First Scenery under Heaven",Yellow Crane Tower is one of the most famous towers south of the Yangtze River…第三节单词拼写(共10小题;每小题1.5分,满分15.0分)根据汉语或首字母提示,完成下列句子,在空白处填入1个适当的单词或括号内单词的正确形式.17.(1.5分)During both World War I and II,pigeons were e__________ to carry messages to and from the front lines.18.(1.5分)It is much better to say "I'm sorry,but I think you may be m_______ " rather than "You're wrong!"19.(1.5分)Ads are a good way to make people a______ of the needs of others and the dangers around them.20.(1.5分)In order to keep fit,you should make exercise a part of your daily r______ .21.(1.5分)Trump made American people have the false i______ that they could keep the coronavirus under control.22.(1.5分)The woman was __________ (控告)of stealing in a grocery,but she insisted she was innocent.23.(1.5分)Sales of our Snowman ice cream have ___________(成倍增加)after we gave it a new package.24.(1.5分)Limited supplies of food and water led to kangaroos___________ (竞争)with sheep and cattle.25.(1.5分)Old French made other____________ (贡献)to Middle English as well.26.(1.5分)In the 1950s the Chinese government introduced_____________ (简化)Chinese characters.第四部分写作(共两节,满分10分)第一节简要回答问题(共1小题;每题2分,满分10分)阅读下面的短文,并用英语回答问题.注意:不能引用文中原句;答案不超过10个单词.27.(10分)Sophie and Miles sat on the shore watching their cousin surf.Kerry was a few years older than Sophie and Miles,and she had started surfing almost before they were able to walk.Kerry rode a wave into shore,and then jumped off her board and ran over to where Sophie and Miles were sitting."Are you two ready to give it a try?" she asked.Miles took a deep breathand nodded.He was worried about looking silly in front of his cousin,but he had a feeling he was going to love surfing.He expected it to feel like riding his bike down a hill without using the brakes(刹车)."Don't go out too far!" shouted Mrs.Taylor,and Sophie cheerfully waved back to her parents.Sophie was usually good at the things she tried.She learned quickly and wasn't afraid to dive in,even if she had never done something es admired these characteristics in his sister,but knew he just wasn't as adventurous as she was."Okay," Kerry began,"I'm going to start you two out on longboards.They are easier to handle,especially for beginners." Here are some tips.First,never paddle(划桨,划动)your surfboard out farther than you can swim back without it.Know what weather conditions to expect. Never surf alone,and always remember your limitations.Don't forget that,for the ocean isn't something to take lightly."Kerry paused for a moment and looked at the serious expressions on her cousins' faces."Now for the fun part," Kerry said,"You need to position yourself in the center of your board,between the nose and the tail.When you're positioned the right way,the nose should be a couple of inches above the water's surface.When a wave catches the tail of the board,start paddling.Try to remember the sweet spot on your board,because you'll want to position yourself the same way each time you go out."Sophie smiled widely at Kerry."I had no idea that surfing was so technical.I thought you just catch a big wave and try to ride it without falling off."(1)When did Kerry start surfing?___________(2)Why did Miles take a deep breath?___________(3)What is the difference between Sophie and Miles in character?___________(4)Why did Kerry make her cousins begin with longboards?___________ (5)What conclusion could be drawn from Sophie's words in the last paragraph?___________第二节书面表达(满分15分)28.(15分)假如你是李华,你的英国网友Peter给你发来一封邮件,说他对汉语书法非常感兴趣,想学习但了解太少.请你给Peter回复一封邮件,内容包括:1.汉语书法的特点:1)是中国传统艺术,历史悠久,风格多样;2)看似简单,实则需要很多技巧.2.给予对方鼓励.注意:1.词数100左右;2.可以适当增加细节,以使行文连贯;3.信的开头、结尾已为你写好,不计入总字数.参考词汇:汉语书法Chinese calligraphyDear Peter,I'm delighted to learn that you are very interested in Chinese calligraphy._________Yours,Li Hua答案11.BBC12.CAD13.BBCA14.AFGEC15.BADCD ACDCA BCBAC DABDB16.(1)a(2)what(3)gradually(4)that(5)was destroyed(6)dynasties(7)that(8)designed(9)appearance(10)surrounding.17.mployed18.istaken19.ware20.outine21.mpression22.accused23.multipliedpeting25.contributions26.simplified27.(1)Before Sophie and Miles could/were able to walk.(2)Because he got ready but felt a bit nervous / was lessconfident.(3)Sophie is more eager to try new things than Miles.(4)Because longboards are easier to handle for beginners. /Becauseshe thought it easier for beginners./Because it is easier for beginners.(5)Sometimes things are not as easy as what we assume./It seemseasy but hard to do.。

人工智能的影响1000字作文

人工智能的影响1000字作文

篇一:《人工智能AI的影响英语作文》The Impact of AI on Our LifeIn recent years, AI(artificial intelligence) is ubiquitous, maybe you didn't notice it at all, but recently, Google's AlphaGo defeated Lee Sedol, the World Go Champion. It must cause your attention, meanwhile, the machine's sweeping victories have once again made AI a hot topic. The impact of artificial intelligence on our life is mainly reflected in following aspects.First, the impact of AI on natural science. In many subjects which need computers, AI has an important position, conversely, AI ishelpful to the formation of our own intelligence.Second, the impact of AI on economy. AI into various fields to generate huge benefit, but it also causes the question of employment. As AI replaced the human in many ways, it leads to a huge change in a social framework.The last one is the impact of AI on society, AI provided a new modelto our life, because many developers use AI to develop moreinteresting games, it makes our life colorful.AI is a double-edged sword, because some people expect AI to benefit mankind in more fields, and some others fear that AI will eventually get out of control. But in my view, if we can use it very well, itwill bring moreconveniences to our life, not to lose control. Not only so but also can develop technology.篇二:《人工智能的利弊英语作文》Not long ago,it's a hot topic that the world champion Go Li Shishiwas defeated by AlphaGo owned by Google. It marks the progress of artificial intelligence. But there is a saying gose like this"Every coin has its two sides.".Some people express favourablely receive, others worry about that AI would cause chaos to this,it's not comprehensive enough.Undoubtedly, advanced technology has brought much convenience to some special work environment, AI can help human to get the job , it'slikely to lead to certain unemployment. But it is not said that AIwill replace or even destroy are two reasons to support the view. Tostart with,AlphaGo hinges upon the powerful computing capacity of the computer and repetitive has merely a in-depth study to departed information,and its wisdom only shows in a certain , the superiorityof humans is the expectations and imagination for future, rather than cognitive and learning abilities. We should innovate means of very unusual strategy, one can overcome ,people can understand or convince others by communication. In fact,a good deal of tests show that itcan't persuade the human to do anything. It should be concerned that there might be an outlaw uses the AI to commit crimes in the future.From what has been discussed above, I think we should revere the AI instead of threatened. In the future, humans will cooperate with AIto finish is conducive to promote the development of society more and more quickly and efficiently.篇三:《人工智能对人类的影响英语作文》Recently, Google’s AlphaGo defeated Lee sedol, the World Go champion, 4 to 1 in a five game match. It makes us anxiety .Some people expect AI to benefit mahkind in more fields. Some others fear that AI will eventually get out of control. But I thin k that’s not worry.Firstly, Artificial intelligence is the simulation of information on the process of consciousness, thinking. Artificial intelligence isnot human intelligence ,but can think like people, may also be more than human intelligence. Artificial intelligence has two views, oneis BOTTOM-UP AI, the other is TOP-DOWN AI. BOTTOM-UP AI points outthat it is possible to create a truly intelligent machine that can reason and solve problems, and that such machines can be perceived as conscious and self aware. TOP-DOWN AI could not produce real reason and solve the problem of intelligent machines, these machines but looks like intelligence, but didn't really have a smart, also won't have independent consciousness. In my opinion, TOP-DOWN AI is more realistic, BOTTOM-UP AI is a bit beyond the current level of science and technology. Secondly, Our country will not allow artificial intelligence with independent consciousness, just like you can’t cloning human by cloning technology.Finally, we have to calm the mood, good every day.篇四:《人工智能专业英语作文》Artificial IntelligenceFuture trend in computer science is one of the artificial intelligence. Artificial Intelligence is a new science of researching theories, methods and technologies in simulating or developingthinking process of human beings. It including the research in the field of robotics, speechrecognition, image recognition, Natural language processing andexpert systems.AI is an embranchment of Computer Science, and it is foreland of research field of computer science. The field of AI research was founded at a conference on the campus of Dartmouth College in the summer of intelligence has the impact in natural science. The need of using mathematic computer to solve the problem, AI brings many benefits. Artificial intelligence has the impact in economy, the expert system more depth in all, to bring the great benefit. AI also promoted the development of the computer industry, but at the same time, also brought the problem of employment services.With the development of artificial intelligence and intelligent robot, we have to say, artificial intelligence is advanced research, so it may touch the bottom lines of ethics. I believe that the science of artificial intelligence is waiting for humanity to explore the real connotation.篇五:《英语作文人工智能将如何影响我们的生活》How Will AI Affect Our Life?With the development of economy and science and technology, AI playsa more and more important role in our life.Three months ago,AlphaGo became one hundred million people watching "man-machine war", in the end it depends on the technical advantageof big data and deep learning in a 4-1 winners’ posture tells people, to AI is no longer just the scene in the movie, but in the real has become a hot topic for a while,some people welcome the progress and expect AI to benefit mankind in more fields,on the contrary, some others fear that AI will eventually get out of control.In this regard, my view is that AI will bring us more example, it is fashionable for youngsters to purchase daily essentialson some famous websites, liketaobao, EBay and Alibaba, through many courier addition, Tesla, Google and General Motorsdevelopeddriverless cars. What’smore,in the future, the robot will rescue people from dangerous work and so on.I believe that AI will make our life more beautiful.篇六:《人工智能的价值:生存还是毁灭?》人工智能的价值:生存还是毁灭?2015-01-23人工智能的提出距离今天已经有几十年的时间,经历了四次寒冬,依然能够在今天王者归来并取得实际效果。

科技英语 主编 田文杰 课文翻译

科技英语 主编 田文杰 课文翻译

Unit 1Artificial intelligence is the science and engineering of making intelligent machines,especially intelligent computer programs.人工智能是制造智能机器的科学与工程,特别是智能化的计算机程序。

It is related to the similar task of using computers to understand human intelligence,but AI does not have to confine itself to methods that are biologically observable.这与使用计算机来理解人类智能的类似任务有关,但是人工智能不需要把它局限在生物可观察的方法上。

In this unit,the two passages present a general picture of AI research .在这个单元,两个章节提出了人工智能研究的概况。

Text A briefly introduces the definition of AI,some kinds of architectures of AI system,essential capabilities to AI programs and so on.文章A简要介绍了人工智能的定义,人工智能的系统的几种体系结构、基本功能以及程序等等。

Text B explains a particular area of AI research--natural language processing including its definition and a legendary Turing’s Test.文章A解释特定地区研究人工智能的自然语言处理包括定义和传说中的图灵测试。

半导体常用术语

Fab厂常用术语some phrases and words in FAB cleanroom systemA.M.U 原子质量数ADI After develop inspection显影后检视AEI 蚀科后检查Alignment 排成一直线,对平Alloy 融合:电压与电流成线性关系,降低接触的阻值ARC:anti-reflect coating 防反射层ASHER: 一种干法刻蚀方式ASI 光阻去除后检查Backside 晶片背面Backside Etch 背面蚀刻Beam-Current 电子束电流BPSG: 含有硼磷的硅玻璃Break 中断,stepper机台内中途停止键Cassette 装晶片的晶舟CD:critical dimension 关键性尺寸Chamber 反应室Chart 图表Child lot 子批Chip (die) 晶粒CMP 化学机械研磨Coater 光阻覆盖(机台)Coating 涂布,光阻覆盖Contact Hole 接触窗Control Wafer 控片Critical layer 重要层CVD 化学气相淀积Cycle time 生产周期Defect 缺陷DEP: deposit 淀积Descum 预处理Developer 显影液;显影(机台)Development 显影DG: dual gate 双门DI water 去离子水Diffusion 扩散Doping 掺杂Dose 剂量Downgrade 降级DRC: design rule check 设计规则检查Dry Clean 干洗Due date 交期Dummy wafer 挡片E/R: etch rate 蚀刻速率EE 设备工程师End Point 蚀刻终点ESD: electrostatic discharge/electrostatic damage 静电离子损伤ET: etch 蚀刻Exhaust 排气(将管路中的空气排除)Exposure 曝光FAB 工厂FIB: focused ion beam 聚焦离子束Field Oxide 场氧化层Flatness 平坦度Focus 焦距Foundry 代工FSG: 含有氟的硅玻璃Furnace 炉管GOI: gate oxide integrity 门氧化层完整性Hexamethyldisilazane,经去水烘烤的晶片,将涂上一层增加光阻与晶片表面附着力的化合物,称HCI: hot carrier injection 热载流子注入HDP:high density plasma 高密度等离子体High-V oltage 高压Hot bake 烘烤ID 辨认,鉴定Implant 植入Layer 层次LDD: lightly doped drain 轻掺杂漏Local defocus 局部失焦因机台或晶片造成之脏污LOCOS: local oxidation of silicon 局部氧化Loop 巡路Lot 批Mask (reticle) 光罩Merge 合并Metal Via 金属接触窗MFG 制造部Mid-Current 中电流Module 部门NIT: Si3N4 氮化硅Non-critical 非重要NP: n-doped plus(N+) N型重掺杂NW: n-doped well N阱OD: oxide definition 定义氧化层OM: optic microscope 光学显微镜OOC 超出控制界线OOS 超出规格界线Over Etch 过蚀刻Over flow 溢出Overlay 测量前层与本层之间曝光的准确度OX: SiO2 二氧化硅P.R. Photo resisit 光阻P1: poly 多晶硅PA; passivation 钝化层Parent lot 母批Particle 含尘量/微尘粒子PE: 1. process engineer; 2. plasma enhance 1、工艺工程师2、等离子体增强PH: photo 黄光或微影Pilot 实验的Plasma 电浆Pod 装晶舟与晶片的盒子Polymer 聚合物POR Process of recordPP: p-doped plus(P+) P型重掺杂PR: photo resist 光阻PVD 物理气相淀积PW: p-doped well P阱Queue time 等待时间R/C: runcard 运作卡Recipe 程式Release 放行Resistance 电阻Reticle 光罩RF 射频RM: remove. 消除Rotation 旋转RTA: rapid thermal anneal 迅速热退火RTP: rapid thermal process 迅速热处理SA: salicide 硅化金属SAB: salicide block 硅化金属阻止区SAC: sacrifice layer 牺牲层Scratch 刮伤Selectivity 选择比SEM:scanning electron microscope 扫描式电子显微镜Slot 槽位Source-Head 离子源SPC 制程统计管制Spin 旋转Spin Dry 旋干Sputter 溅射SR Si rich oxide 富氧硅Stocker 仓储Stress 内应力STRIP: 一种湿法刻蚀方式TEOS –(CH3CH2O)4Si 四乙氧基硅烷/正硅酸四乙酯,常温下液态。

新概念英语第三册课文重点精讲解析Lesson49_51

新概念英语第三册课文重点精讲解析Lesson49~51新概念英语第三册课文重点精讲解析Lesson49背熟:If she were alive today she would not be able to air her views on her favourite topic of conversation: domestic servants.air one’s views on sth. / sb. 对......发表意见背熟:lived in that leisurely age when背熟:She was sentimentally attached to this house, for even though it was far too big for her needs, she persisted in living there long after her husband's death.attach to背熟:she persisted in living there long after her husband's death.persist in doing sth.long aftershort afterlong beforeshort beforeeven my uncle's huge collection of books was kept miraculously free from dust.背熟:She always referred to them as 'the shifting population', for they came and went with such frequency that I never even got a chance to learn their names.refer to / regard sb. as背熟:she was extremely difficult to please.背熟:While she always criticized the fickleness of human nature, she carried on an unrelenting search for the ideal servant to the end of her days, even after she had been sadly disillusioned by Bessie.carry onDuring that timeput sb. in charge of 安排某人负责in addition toact the role: play the rolebe absent from: be away fromnot only 位于句首,引导完整的语句,部分倒装below, above常用的修饰词是wellbump into: knock oneself into / onto背熟: reluctantly came to the conclusion that...come to the conclusiondraw a conclusionarrive at conclusionreach conclusionjump to conclusionhave a difficult time doing sth. : have trouble / difficulty in doing sth背熟:They had mysteriously found their way there from the wine cellar!新概念英语第三册课文重点精讲解析Lesson50背熟:The New Year is a time for resolutions.a time forThe spring Festival is a time for gathering.Mentally: at heartWe become illogical when we decide what can be eaten and what can not be eaten.背熟:The same old favorites recur year in year out with monotonous regularity.favourite: resolutionrecur: happen / take placeyear in year out: one year after another / year by yearday by day / one day after another / day in day outresolve to : 下定决心背熟:Past experience has taught us that certain accomplishments are beyond attainment.It is hard for us to attain some certain accomplishmentinveterate: deep rooted背熟:If we remain inveterate smokers, it is only because we have so often experienced the frustration that results from failure.Because we have too often experience the frustration, it means nothing to me.result from : 由 ...... 产生的result in: lead to / causeFailure will result in frustration. 失败会导致挫败心理。

新概念英语第三册课文重点精讲解析Lesson49~51

【导语】为了⽅便同学们的学习,为您精⼼整理了“新概念英语第三册课⽂重点精讲解析Lesson49~51”,希望有了这些内容的帮助,可以为⼤家学习新概念英语提供帮助!如果您想要了解更多新概念英语的相关内容,就请关注吧!新概念英语第三册课⽂重点精讲解析Lesson49 背熟:If she were alive today she would not be able to air her views on her favourite topic of conversation: domestic servants. air one’s views on sth. / sb. 对......发表意见 背熟:lived in that leisurely age when 背熟:She was sentimentally attached to this house, for even though it was far too big for her needs, she persisted in living there long after her husband's death. attach to 背熟:she persisted in living there long after her husband's death. persist in doing sth. long after short after long before short before even my uncle's huge collection of books was kept miraculously free from dust. 背熟:She always referred to them as 'the shifting population', for they came and went with such frequency that I never even got a chance to learn their names. refer to / regard sb. as 背熟:she was extremely difficult to please. 背熟:While she always criticized the fickleness of human nature, she carried on an unrelenting search for the ideal servant to the end of her days, even after she had been sadly disillusioned by Bessie. carry on During that time put sb. in charge of 安排某⼈负责 in addition to act the role: play the role be absent from: be away from not only 位于句⾸,引导完整的语句,部分倒装 below, above常⽤的修饰词是well bump into: knock oneself into / onto 背熟: reluctantly came to the conclusion that... come to the conclusion draw a conclusion arrive at conclusion reach conclusion jump to conclusion have a difficult time doing sth. : have trouble / difficulty in doing sth 背熟:They had mysteriously found their way there from the wine cellar!新概念英语第三册课⽂重点精讲解析Lesson50 背熟:The New Year is a time for resolutions. a time for The spring Festival is a time for gathering. Mentally: at heart We become illogical when we decide what can be eaten and what can not be eaten. 背熟:The same old favorites recur year in year out with monotonous regularity. favourite: resolution recur: happen / take place year in year out: one year after another / year by year day by day / one day after another / day in day out resolve to : 下定决⼼ 背熟:Past experience has taught us that certain accomplishments are beyond attainment. It is hard for us to attain some certain accomplishment inveterate: deep rooted 背熟:If we remain inveterate smokers, it is only because we have so often experienced the frustration that results from failure. Because we have too often experience the frustration, it means nothing to me. result from : 由 ...... 产⽣的 result in: lead to / cause Failure will result in frustration. 失败会导致挫败⼼理。

人类识别系统中的耳生物识别技术(IJITCS-V4-N2-6)

I.J. Information Technology and Computer Science, 2012, 2, 41-47Published Online March 2012 in MECS (/)DOI: 10.5815/ijitcs.2012.02.06Ear Biometrics in Human Identification SystemV.K. Narendira Kumar 1 and B. Srinivasan21Assistant Professor, Department of Information Technology,2Associate Professor, PG & Research Department of Computer Science,Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453,Erode District, Tamil Nadu, India.Email ID: 1 kumarmcagobi@yahoo.co, 2 srinivasan_gasc@Abstract—Biometrics is physical or behavior characteristics that can be used for human identification. We propose the ear as a biometric and investigate it with both 2D and 3D data. The ICP-based algorithm also demonstrates good scalability with size of dataset. These results are encouraging in that they suggest a strong potential for 3D ear shape as a biometric. Multi-biometric 2D and 3D ear recognition are also explored. The proposed automatic ear detection method will integrate with the current system, and the performance will be evaluated with the original one. The investigation of ear recognition under less controlled conditions will focus on the robustness and variability of ear biometrics. Multi-modal biometrics using 3D ear images will be explored, and the performance will be compared to existing biometrics experimental results. Index Terms—Ear, Biometrics, Recognition, Detection and Extraction.I. INTRODUCTIONBiometrics is human identifications by measuring physical or behavior characteristics of a person to verify his identity. Public safety and national security magnify the need for biometric technique, which are amongst the most secure and accurate authentication tools. Ear images can be acquired in a manner similar to face images, and at least one previous study suggests they are comparable in recognition power. Additional work on ear biometrics may lead to increased recognition flexibility and power in such scenarios [3].Many research studies have proposed the ear as a biometric. In fact, the ear may already be used informally as a biometric. For example, the United States Immigration and Naturalization Service (INS) have a form giving specifications for the photograph that indicates that the right ear should be visible. Researchers have suggested that the shape and appearance of the human ear is unique to each individual and relatively unchanging during the lifetime of an adult. No one can prove the uniqueness of the ear, but two studies mentioned in provide empirical supporting evidence. The medical report shows that the variation over time is most noticeable during the period from four months to eight years old and over 70 years old. The ear growth between four months to eight years old is approximately linear, and after that it is constant until around 70 when it increase again. The stretch rate due to gravity is not linear, but it mainly affects the lobe of the ear. Due to its stability and predictable changes, ear recognition is being investigated as potential biometric. Generally, ear images can be acquired in a manner similar to face images, and used in the same scenarios.A biometric system is essentially a pattern recognition system which uses a specific physiological or behavioral characteristic of a person to determine the person’s identification. Therefore, a biometric system can be solved using the methodologies from the pattern recognition research. Researcher considers the use of both 2D and 3D images of the ear, using data [1].The work presented in this proposal is unique in several points. We report results for the largest ear biometrics study to date, in terms of number of persons. Ours is the only work to compare 2D and 3D ear recognition and compare multiple different algorithms for 3D ear recognition. We are applying an ICP-based approach to 3D ear recognition. Only one other work that we are aware of considers 3D ear biometrics, and here we compare the results of that approach to three other approaches for 3D ear biometrics. Because we use a large experimental dataset, we are also able to explore how the different algorithms scale with number of persons in the gallery.II. LITERATURE REVIEWAs the mentioned before, many research studies have proposed the ear as a biometric. Researchers have suggested that the shape and appearance of the human ear is unique to each individual and relatively unchanging during the lifetime of an adult. There are several studies that attempt to solve the question of uniqueness and classification of ears. No one can really prove the uniqueness of the ear, but two studies mentioned in provide empirical supporting evidence. In 1906, Imhofer already found that only 4 characteristics were needed to distinguish a set of 500 ears. The most prominent work is done by Iannarelli. In his work, over 10,000 ears were examined and no indistinguishable ears were found. Iannarelli developed an anthropometric technique for ear identification.Bhanu and Chen presented a 3D ear recognition method using a local surface shape descriptor. The local42Ear Biometrics in Human Identification Systemsurface patches are defined by the feature point and its neighbors, and the patch descriptor consists of its centroid, 2D histogram and surface type. There are four majors’ steps in the method: feature point extraction, local surface description, o_-line model building and recognition. Twenty range images from 10 individuals (2 images each) are used in the experiments and a 100% recognition rateis achieved for their dataset.Researcher implemented their method from the description in. Slight differences were determined experimentally: (1) Due to the noisy nature of range data, the feature points are determined by the shape index type instead of the shape index value. (2) Considering the computation time required, comparison of the two local surfaces was done only when their Euclidean distance was less than 40 pixels. This assumption is valid in the dataset. Using two images each from the first 10 individuals in the dataset, researcher also found a 100% recognition rate. But when researcher increased the dataset to 202 individuals, the performance dropped to 33% (68 out of 202). The computation time required for this technique was also larger than that for PCA-based and edge-based techniques that researcher investigated.III. EAR DETECTIONGiven a still 2D or 3D image, ear detection is defined as the localization of the regions that contain a human ear regardless of its size, orientation and hair occlusion. Ear recognition is either ear identification or ear verification. Both of them assume that the ears have been already extracted from an image or at least have already been localized. So ear detection is the preliminary step in automatic ear recognition systems, and it is essential to recognize the ear correctly and efficiently [2].Similarly, face detection is a challenging task, but has been widely explored. A detailed survey of face detection work can be found in [1]. The challenges associated with face detection are differences in variation among pose, the presence or absence of structural components, facial expression, occlusion, image orientation and image conditions [5]. Among these factors, some are characteristics that only belong to the face. But some factors, like pose, occlusion, image orientation and image conditions also appear in the ear detection problem. Therefore, it will be interesting to apply some face detection algorithms to detect ear.IV. APPROACHESApproaches considered include a PCA (“eigen-ear”) approach with 2D intensity images, a PCA (Principal Component Analysis) approach with range images, Hausdorff matching of edges from the range images, and ICP based matching of the 3D data. Researcher also performed initial experiments with the own implementation of an ear shape matching algorithm due to Bhanu and Chen. But the performance drops dramatically when researcher increased the dataset size from 10 to 202.A PCA (“Eigen-ear”) approach with 2D intensity images, achieving 63.8% rank-one recognition; a PCA approach with range images, achieving 55.3%; and Hausdorff matching of edges from range images, achieving 67.5%. Starting from the general ICP algorithm proposed by, researcher obtained an 84.3% rank-one recognition rate on 3D ear biometrics. The ICP-based approach not only achieves the best recognition performance of the various methods that researcher considered, it also shows good scalability with size of dataset. The promising experimental results of the ICP-based approach suggests the strong potential for 3D ear shape as a biometric, and also encouraged us to investigate the ICP algorithm both for performance and for computational time.V. ICP ALGORITHMThree algorithms have been explored on 2D and 3D ear images, and based on that, three kinds of multi-biometrics are considered: multi-modal, multi-algorithm and multi-instance. Various multi-biometric combinations all result in improvement over a single biometric. Multi-modal 2D PCA together with 3D ICP gives the highest performance. To combine 2D PCA-based and 3D ICP-based ear recognition, a new fusion rule using the interval distribution between rank one and rank two outperforms other simple combinations. The rank one recognition rate achieves 91.7% with 302 subjects in the gallery. In general, all the approaches perform much better when multiple images are used to represent one subject. In the dataset, 169 subjects had 2D and 3D images of the ear acquired on at least four different dates, which allowed us to perform multi-instance experiments. The highest rank one recognition rate was 97% with the ICP approach used to match a two-image-per-person probe against a two-image-per-person gallery. In addition, researcher found that different fusion rules perform differently on different combinations. The min rule works well when combining the multiple presentations of one subject, while the sum rule works well when combining multiple modalities.VI. DATA ACQUISITIONData was acquired with a Minolta Vivid 910 range scanner. One 640x480 3D scan and one 640 x 480 color image are obtained near simultaneously. From 365 people that participated in two or more image acquisition sessions, there were 302 who had good 2D and 3D ear images in two or more sessions. No special instructions were given to the participants to make the ear images particularly suitable for this study, and 823 out of 2,342 images were dropped for various quality control reasons: 265 instances with hair obscuring the ear, 124 cases with artifacts due to motion during the scan, 91 with the person wearing earrings, and 343 cases with poor image quality in either the 3D and / or the 2D. Using the Minolta scanner in the high resolution mode that researcher used may make the motion artifact problem more frequent, as it takes 8 seconds to complete a scan.VII. PREPROCESSINGThe purpose of the preprocessing is to minimize the variation in the acquired image, while keeping the characteristic features of the subject. Different preprocessing methods were applied to 2D intensity data and 3D range data [6].A. 2D Data NormalizationResearcher performed the 2D data normalization in two steps. First is the geometric normalization. Ears were aligned using two manually identified landmark points. The distance between the two points was used for scale, which means that all the extracted ears have the same distance between the Triangular Fossa and the Incisure Intertragica Similarly, the orientation of the line between the two points is used for rotation. After normalization, the line between these two points is vertical in the xy plane. The second step is histogram equalization, which is used to compensate for lighting variation between images. These preprocessing steps are entirely analogous to those standard used in face recognition from 2D intensity images [4] and those used in previous PCA-based ear recognition using 2D intensity images.B. 3D Data NormalizationThe normalization discussed next applies to preparing the range image from the 3D data for the 3D PCA and 3D edge-based approaches. No preprocessing is applied for the 3D ICP.Figure 1: Three points used for plane fitting3D image normalization is more complicated than 2D normalization, due to z-direction rotation, holes and missing data [5]. Three steps of the 3D normalization are 3D pose normalization, pixel size normalization for the range images and whole filling. Normalization of 3D ear pose is required to create the range image for the 3D PCA and Hausdorff edge matching. In this study, the pose of the ear is determined by the orientation of the face plane connected with the ear. Three points are marked near the ear on the z-value image, as shown in Figure 1.C. Landmark SelectionResearchers have investigated three different landmark selection methods. The first is the two-point landmark described in a study of “eigen-ears” with 2D intensity images. The upper point is the Triangular Fossa, and the lower point is the Antitragus, see Figure 2(a). However, researcher found that these two points are not easily detected in all images. For instance, many ears in the study have a small or subtle Antitragus. In order to solve this problem, two other landmark methods were conducted [7]. The second is similar to the first two-point landmark, but researcher used the Incisure Intertragica instead of Antitragus as the second point, as shown in Figure 2(b). The orientation of the line connecting these two points is used to determine the orientation of the ear, and distance between them is used to measure the size of the ear. The third method uses a two-line landmark, shown in Figure 2(c). One line is along the border between the ear and the face, and the other is from the top of the ear to the bottom. Unlike the two-point landmark, the two-line landmark promises to find the most part of the ear.In the experiments, the second method is adopted for further ear extraction in PCA-based and edge-based algorithm, since it is good at blocking out background and avoiding ambiguity. The two-line landmark is used in the ICP-based algorithm, since it is better suited to the ICP algorithm properties. ICP uses the real 3D range data in the matching procedure and the two matching surfaces should overlap. The two-line landmark gives the opportunity to extract the whole ear for matching, but at the same time, it always includes some background, which increases the background variation, and affects the PCA-based and edge-based performance.(a) Landmark 1: Using Triangular Fossa & Antitragus(b) Landmark 2: Using Triangular Fossa and Incisure Intertragica(c) Landmark 3: Using Two LinesFigure 2: Example of ear landmarksD. Ear ExtractionEar extraction is based on the landmark locations on the original images. The original ear images are croppedto (87x124) for 2D and (68x87) for 3D ears. The reason for different ear size for the 2D and 3D data will beexplained later.(a) Mask (b) 2D IntensityEar(c) 3D Depth EarFigure 3: Examples of ear mask and cropped 2D and 3D earThe normalized images are masked to “gray out” the background and only the ear is kept. Figure 3 shows the mask and examples of the cropped 2D and 3D ear images.E. Hausdorff Range Edge MatchingAchermann and Bunke [1] use an extension of the Hausdorff distance matching for the 3D face registration [9]. Instead of using original 2D Hausdorff distance, they introduce a 3-D version of the partial Hausdorff distance. All the computation is based on the 3D space. In the experiment, the matching is between two edge images, therefore, only 2D Hausdorff distance is computed during the procedure. Researcher noticed that the 3D depth data looks much “cleaner” than the 2D intensity data.F. Voxel nearest NeighborsThe most time consuming part of the ICP algorithm is finding the closest point. For each point on the probe surface, the algorithm needs to return the closest point on the gallery surface. By using these pairs of corresponding points, the ICP algorithm iteratively refines the transforms between two surfaces, and finds the translation and rotation to minimize the error distance.VIII. IMPLEMENTATION OF SYSTEM Given a set of source points P and a set of model points X, the goal of ICP is to find the rigid transformation T that best aligns P with X. Beginning with a starting estimate T0, the algorithm iteratively calculates a sequence of transformations Ti until the registration converges. The algorithm computes correspondences by finding closest points, and then minimizes the mean square difference between the correspondences. A good initial estimate of the transformation is required, and all scene points are assumed to have correspondences in the model. The centroid of the extracted ear is used as a starting point in the experiments.The general ICP algorithm requires no extracted features, or curvature computation [3]. The only preprocessing of the range data is to remove the outliers. In a 3D face image, the eyes and mouth are common places to cause holes and spikes. 3D ear images do exhibit some spikes and holes due to oily skin or sensor error, but much less than in the 3D face images. The initial experiment does not have outlier removal. Researcher also considers a version of ICP that does some outlier removal as part of the algorithm.A. Noise RemovalGiven a profile image, it is very difficult to isolate the ear without any background and noise around it. This problem will affect the ICP performance. One observation is that the noise mostly occurs on the top part of the ear. The bottom part of the ear is relatively clean, except when an earring appears. The blue line in the truth writing which goes through the ear top to the bottom, defines the bottom boundary of the ear clearly. Taking advantage of the fact that the ear edge is a continuous curve, researcher start from the bottom point, and use a seed-growing method to trace the ear edge and eliminate the noise.B. Speed LimitationIt is well known that the basic ICP algorithm is effective but time consuming for 3D object registration. In order to make it more practical, it is necessary to speed up the algorithm. Two steps which are intended to make the algorithm faster are considered in this section. One is to control the number of iterations, and the other is to use appropriate data structures to shrink the running time. The number of iterations is initially set as 50, but researcher found the error distance decreases much faster in the first iteration than in the later iterations. So instead of using a fixed number of iterations, researcher measures the drop in the average distance between paired points between two consecutive iterations. Using a threshold of 0.0001 mm, the average of the number of iterations decreases from 50 to 25.74, and the performance stays the same.C. Outlier EliminationBy using the ICP algorithm to align two surfaces, the quality of alignment highly depends on selecting good pairs of corresponding points from two surfaces. When outliers or missing points occur, their corresponding points will distract the alignment and generate the wrong position. For the ear biometric, hair is the most common causes of outliers, and some time the hair-cover is inevitable. Therefore outlier elimination becomes a requirement. An “outlier” match can occur when there is noise in one of the two point sets or when there is a poor match. To improve performance, outlier elimination is added to the original ICP implementation.D. 2D Ear DataTwo gallery/probe datasets with different scaling of the ear sizes are examined on 2D data. One is set as the actual size of the ear, and the other is set at 1.25 times the size of ear (see Figure 4). The performance of 2D regular ear size (Figure 4(a)), shown. The performance is lower than that reported by Chang in his study of 2D “eigen-ears”. Looking closely at the images created from the eigenvectors associated with 3 largest Eigen values (Figure 5(a)), it was apparent that each of them had some space behind the contour of ear.(a) Regular ear size (b) 1.25 times of regularsizeFigure 4.1: Experiments using different 2D ear size This suggested enlarging the ear and so blocking out more background, which potentially causes the variation. After enlarging the ear to 1.25 times the original size (Figure 4(b)), there was no space behind the contour of ear in Figure 5(b). The rank-one recognition rate increased from 66.9% to 71.4% when using 202 subjects.(a) Eigen images of regular ear size(b) Eigen images of enlarged ear sizeFigure 5: Eigen ear images of Eigen vectors associated with 3 largestEigen valuesE. 3D Ear DataDue to the 3D range data preprocessing, the size of aparticular person’s ear in pixels is constant over differentimages of that person. Therefore, no scale process isapplied in the 3D ear extraction. Also, two differentexperiments were conducted on the 3D ear data. One isusing the original ear range data. The other is applyingmean and median filters on the original data to fill theholes of the cropped ear (see Figure 6). The rank-onerecognition rate is improved from 58.4% to 64.8% withhole-filling when using 202 subjects. This is still not verygood in an absolute sense. One possible reason is that theear structure is quite complex, and so using mean andmedian filter alone might not be good enough to fill holesin the 3D range data. Applying whole filling on the 302subjects, the performance stays at 55.3% rank onerecognition rate.(a) Original range data withmissing data.(b) After applying median andmean filters.Figure 6: Hole filling for 3D range dataF. Scaling with Dataset SizeIt has been suggested by that scaling of performancewith dataset size is a critical issue in biometrics. Whenthe gallery size becomes bigger, the possibility to get afalse match increases. Usually, some techniques scalebetter to larger datasets than others. A good algorithmshould keep the performance within a reasonable rangewhen the data size expands. Here researcher focuses oncomparing 2D PCA and 3D ICP. Table 4.5 shows thescalability of the 3D ICP and 2D PCA with differentgallery sizes. When the gallery size is 25, PCA has 92%rank one recognition, and ICP is at 100%. As gallery sizedoubles, there is around a 10% drop in the PCAperformance, and when the gallery has 302 subjects, theperformance decreases to 63.8%. However, ICP shows amuch better scalability. When the gallery size doubles,there is less than 1% drop in ICP performance, and it stillreaches 98.7% rank one recognition rate when the gallerysize is 302 subjects. Checking all the incorrect matchesfor different gallery size, there is one image alwaysmismatched. And of the new incorrect matches appearedin data size 302, two of them are new to all the otherexperiments using different data size, one of them dropsfrom rank one to rank two when the data size increasesfrom 200 to 302 [8].IX. TESTING BIOMETRIC SYSTEMA summary of the more common of these tests isdescribed below:Acceptance Testing: The process of determiningwhether an implementation satisfies acceptance criteriaand enables the user to determine whether or not to acceptthe implementation. This includes the planning andexecution of several kinds of tests (E.Q., functionality,quality, and speed performance testing) that demonstratethat the implementation satisfies the user requirements.Conformity: Fulfillment by a product, process orservice of specified requirements.Interoperability Testing: The testing of oneimplementation (product, system) with another toestablish that they can work together properly.Performance Testing: Measures the performancecharacteristics of an Implementation under Test (IUT)such as its throughput, responsiveness, etc., under variousconditions.Robustness Testing: The process of determining how well an implementation processes data which contains errors.X. BIOMETRIC PERFORMANCE MEASUREMENTS The performance of biometric system is tested usually in terms of False Rejection Rate (FRR), False Acceptance Rate (FAR), and Failure to Enroll Rate (FER), Enrollment Time, and Verification Time. The false acceptance rate is most important when security is a priority whereas low false rejection rates are favored when convenience is the priority [3].The biometric system employed in the flight deck must have a low false acceptance rate since security is the priority. If the false acceptance rate is a low as possible then researcher have better chance of not allowing unauthorized subjects into the system. The point at which the FAR and FRR meet or crossover is known as the equal error rate. This rate gives a more realistic measure of the performance of the biometric system rather than using either the FAR or FRR individually.XI. EXPERIMENTAL RESULTSThe ideas described in the preceding sections have been implemented in C++, and incorporated into the ICP matching program. In order to evaluate the efficiency of this method, researcher compares the performance, space and running time between the original algorithm and the new incorporated ICP matching. Both experiments use ear range data from 302 subjects. For each of the 302 subjects, the earlier 3D images are used for galleries, and the later 3D images are used as probes. All the gallery images use the full resolution, and the probes are sub-sampled by every 4 rows and every 4 columns. In addition, different voxel sizes are tested, and results are presented. The system runs on quad processor Pentium Xeon 2.8GHz machines with 2GB RAM. However, for very large galleries the voxel approach yields an enormous improvement in speed. In a real biometrics application, some or the entire gallery might be kept in memory all the time.XII. CONCLUSIONSThe main contribution of this chapter is the “Pre-computed Voxel Closest Neighbors” strategy to improve the speed of the original ICP algorithm. This technique is aimed at a particular application in human identification. The idea is based on the possibility of computing before the real matching procedure taking place. Different voxel sizes are examined, and the performance and running time are compared with the results from the original ICP algorithm. The experimental results verify the expected feature of the approach. The online matching time drops significantly when researcher use the pre-computed results from the offline computation. The results demonstrate that for very large galleries the voxel approach yields a dramatic improvement in speed. While researcher only address the problem using 3D ear data, it would be interesting to investigate whether the proposed fast ICP-based method is efficient in other applications.By implementing reasonable safeguards, researcher can harness the power of the technology to maximize its public safety benefits while minimizing the intrusion on individual privacy.REFERENCES[1] B. Bhanu and H. Chen, Human ear recognition in 3D. InWorkshop on Multimodal User Authentication, pages 91–98 (2003).[2] M. Burge and W. Burger, Ear biometrics. In Biometrics:Personal Identification in Networked Society, pages 273–286, Kluwer Academic (1999).[3] M. Burge and W. Burger, Ear biometrics in computervision. In 15th International Conference of PatternRecognition, volume 2, pages 822–826 (2000).[4] K. Chang, K. Bowyer and V. Barnabas, Comparison andcombination of ear and face images in appearance-basedbiometrics. In IEEE Trans. Pattern Anal. Machine Intell.volume 25, pages 1160–1165 (2003).[5] K. Chang, K. Bowyer and P. Flynn, Face recognition using2D and 3D facial data. In Workshop on Multimodal UserAuthentication, pages 25–32 (2003).[6] A. Iannarelli, Ear identification. In Forensic identificationseries, Fremont, California, Paramont Publishing Company(1989).[7] B. Victor, K. Bowyer and S. Sarkar, An evaluation of faceand ear biometrics. In 16th International Conference ofPattern Recognition, pages 429–432 (Aug. 2002).[8] K. Pulli, Multiview registration for large data sets. InSecond International Conference on 3-D Imaging andModeling (3DIM ’99), pages 160–168 (October 04-08,1999).[9] D. Huttenlocher, G. Klanderman and W. Rucklidge,Comparing images using the hausdorff distance. In IEEETrans. Pattern Anal. Machine Intell. volume 15(9), pages850–863 (1993).First Author Profile:Mr. V.K. NARENDIRAKUMAR M.C.A., M.Phil.,Assistant Professor, Department ofInformation Technology, Gobi Arts& Science College (Autonomous),Gobichettipalayam – 638 453,Erode District, Tamil Nadu, India.He received his M.Phil. Degree inComputer Science from BharathiarUniversity in 2007. He has authored or co-authored more than 35 technical papers and conference presentations. He is a reviewer for several scientific journals. His research interests are focused on internet security, biometrics, visual human-computer interaction, and multimodal biometricstechnologies.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Human-Aware Computer System Design∗Ricardo Bianchini,Richard P.Martin,Kiran Nagaraja,Thu D.Nguyen,F´a bio Oliveira Department of Computer Science,Rutgers University,Piscataway,NJ08854 {ricardob,rmartin,knagaraj,tdnguyen,fabiool}@ Appears in:Proceedings of the10th Workshop on Hot Topics in Operating Systems(HotOS),June2005AbstractIn this paper,we argue that human-factors studies are critical in building a wide range of dependable systems. In particular,only with a deep understanding of the causes,types,and likelihoods of human mistakes can we build systems that prevent,hide,or at least tolerate hu-man mistakes by design.We propose several research di-rections for studying how humans impact availability in the context of Internet services.In addition,we describe validation as one strategy for hiding human mistakes in these systems.Finally,we propose the use of operator, performance,and availability models to guide human ac-tions.We conclude with a call for the systems commu-nity to make the human an integral,first-class concern in computer system design.1IntroductionAs computers permeate all aspects of our lives,a wide range of computer systems must achieve high depend-ability,including availability,reliability,and security. Unfortunately,few current computer systems can legit-imately claim to be highly dependable.Further,many studies over the years have empirically observed that hu-man mistakes are a large source of unavailability in com-plex systems[7,13,15,16].We suspect that many secu-rity vulnerabilities are also the result of mistakes,but are only aware of one study that touches on this issue[15]. To address human mistakes and reduce operational costs,researchers have recently started to design and im-plement autonomic systems[9].Regardless of how suc-cessful the autonomic computing effort eventually be-comes,humans will always be part of the installation and management of complex computer systems at some level.For example,humans will likely always be respon-sible for determining a system’s overall policies,for ad-∗This research was partially supported by NSF grants#EIA-0103722,#EIA-9986046,and#CCR-0100798.dressing any unexpected behaviors or failures,and for upgrading software and hardware.Thus,human mis-takes are inevitable.In this paper,we argue that human mistakes are so common and harmful because computer system de-signers have consistently failed to consider the human-system interaction explicitly.There are at least two rea-sons for this state of affairs.First,dependability is often given a lower priority than other concerns,such as time-to-market,system features,performance,and/or cost, during the design and implementation phases.As a re-sult,improvements in dependability come only after ob-serving failures of deployed systems.Indeed,one need not look past the typical desktop to see the results of this approach.Second,understanding human-system inter-actions is time-consuming and unfamiliar,in that it re-quires collecting and analyzing behavior data from ex-tensive human-factors experiments.Given these observations,we further argue that de-pendability and,in particular,the effect of humans on dependability should become afirst-class design concern in complex computer systems.More specifically,we be-lieve that human-factors studies are necessary to iden-tify and understand the causes,types,and likelihoods of human mistakes.By understanding human-system inter-actions,designers will then be able to build systems to avoid,hide,or tolerate these mistakes,resulting in sig-nificant advances in dependability.In the remainder of the paper,wefirst briefly consider how designers of safety-critical systems have dealt with the human factor in achieving high dependability.We also touch on some related work.After that,we propose several research directions for studying how human mis-takes impact availability in the context of Internet ser-vices.We then describe how validation can be used to hide mistakes and guidance to prevent or at least mitigate the impact of mistakes.Finally,we speculate on how a greater understanding of human mistakes can improve the dependability of other areas of computer systems.2Background and Related WorkGiven the prominent role of human mistakes in system failures,human-factors studies have long been an im-portant ingredient of engineering safety-critical systems such as air traffic andflight control systems,e.g.,[6,18]. In these domains,the enormous cost of failures requires a significant commitment of resources to accounting for the human factor.For example,researchers have often sought to understand the mental states of human opera-tors in detail and create extensive models to predict their actions.Our view is that system designers must account for the human factor to achieve high dependability but at lower costs than for safety-critical systems.We believe that this goal is achievable by focusing on human mis-takes and their impact on system dependability,rather than attempting a broader understanding of human cog-nitive functions.Our work is complementary to research on Human-Computer Interaction(HCI),which has traditionally fo-cused on ease-of-use and cognitive models[17],in that we seek to provide infrastructural support to ease the task of operating highly available systems.For exam-ple,Barrett et al.report that one reason why operators favor using command line interfaces over graphical user interfaces is that the latter tools are often less trustworthy (e.g.,their depiction of system state is less accurate)[1]. This suggests that HCI tools will only be effective when built around appropriate infrastructure support.Our vi-sion of a runtime performance model that can be used to predict the impact of operator actions(Section5)is an example of such infrastructural support.Further,our validation infrastructure will provide a“safety net”that can hide human mistakes caused by inexperience,stress, carelessness,or fatigue,which can occur even when the HCI tools provide accurate information.Curiously,we envision guidance techniques that may even appear to conflict with the goals of HCI atfirst glance.For example,we plan to purposely add“inertia”to certain operations to reduce the possibility of serious mistakes,making it more difficult or time-consuming to perform these operations.Ultimately however,our tech-niques will protect systems against human mistakes and so they are compatible with the HCI goals.Our work is related to several recent studies that have gathered empirical data on operator behaviors,mistakes, and their impact on systems[1,16].Brown and Patterson have proposed a methodology to consider humans in de-pendability benchmarking[4]and studied the impact of undo,an approach that is orthogonal(and complemen-tary)to our validation and guidance approach,on repair times for several faults injected into an email service[3]. To our knowledge,however,we were thefirst group to publish detailed data on operator mistakes[15].Our work is also related to no-futz computing[8]. However,we focus on increasing availability,whereas no-futz computing seeks to reduce futzing and costs.3Operator MistakesIn order to build systems that reduce the possibility for operator mistakes,hide the mistakes,or tolerate them,we mustfirst better understand the nature of mistakes.Thus, we believe that the systems community must develop common benchmarks and tools for studying human mis-takes[4].These benchmarks and tools should include infrastructure for experiment repeatability,e.g.instru-mentation to record human action logs that can later be replayed.Finally,we need to build a shared body of knowledge on what kind of mistakes occur in practice, what their causes are,and how they impact performance and availability.We have already begun to explore the nature of oper-ator mistakes in the context of a multi-tier Internet ser-vice.In brief,we asked21volunteer operators to per-form43benchmark operational tasks on a three-tier auc-tion service.Each of the experiments involved either a scheduled-maintenance task(e.g.,upgrading a software component)or a diagnose-and-repair task(e.g.,discov-ering a disk failure and replacing the disk).To observe operator actions,we asked the operators to use a shell that records and timestamps every command typed into it and the corresponding result.Our service also recorded its throughput throughout each experiment so that we could later correlate mistakes with their impact on ser-vice performance and availability.Finally,one of our team members personally monitored each experiment and took notes to ease the interpretation of the logged commands and to record observables not logged by our infrastructure,such as edits of configurationfiles.We observed a total of42mistakes,ranging from soft-ware misconfiguration,to fault misdiagnosis,to software restart mistakes.We also observed that a large number of mistakes(19)led to a degradation in service throughput. These results can now be used to design services that can tolerate or hide the mistakes we observed.For example, we were able to evaluate a prototype of our validation approach,which we describe in the next section.We learned several important lessons from this expe-rience:First,although we scripted much of the setup for each experiment,most of the scripts were not fully automated.This was a mistake.On several occasions, we only caught mistakes in the manual part of the setup just before the experiment began.Finding human sub-jects is too costly to risk invalidating any experiment in this manner.Second,infrastructural support for view-ing the changes made to configurationfiles would have been very helpful.Third,we used a single observer forall of our experiments,which in retrospect,was a good decision because it kept the human recorded data as con-sistent as possible across the experiments.However,on several occasions,our observer scheduled too many ex-periments back-to-back,making fatigue a factor in the accuracy of the recorded observations.Fourth,our study was time-consuming.Even seemingly simple tasks may take operators a long time to complete;our experiments took an average of1hour and45minutes each.We also ran6warm up experiments to allow some of the novice operators to become more familiar with our system;these took on average45minutes bining the differ-ent sources of data and analyzing them were also effort-intensive.Finally,enlisting volunteer operators was not an easy task.Indeed,one of the shortcomings of our study is the dearth of experienced operators among our volunteer subjects.Despite these difficulties,our study(along with[1,3]) proves that performing human-factor studies is not in-tractable for systems researchers.In fact,these stud-ies should become easier to perform over time,as re-searchers share their tools,data,and experience with human-factor studies.3.1Open IssuesWhile our initial study represents a significantfirst step, it also raises many open issues.Effects of long-term interactions.The short duration of our experiments meant that we did not account for a host of effects that are difficult to observe at short time-scales.For example,the effect of increasing familiarity with the system,the impact of user expectations,systolic load variations,stress and fatigue,and the impact of sys-tem evolution as features are added and removed. Impact of experience.14of our21volunteer operators were graduate students with limited experience with the operation of computing services;11of the14were clas-sified as novices,while3were classified as intermediates (on a three-tier scale:novice,intermediate,expert). Impact of tools and monitoring infrastructures.Our study did not include any sophisticated tools to help with the service operation;we only provided our volunteers with a throughput visualization tool.Operators of real services have a wider set of monitoring and maintenance tools at their disposal.Impact of complex tasks.Our experiments covered a small range of fairly simple operator tasks.Difficult tasks such as dealing with multiple overlapping compo-nent faults and changing the database schema that intu-itively might be sources of more serious mistakes have not been studied.Impact of stress.Many mistakes happen when humans are operating under stress,such as when trying to repair parts of a site that are down or under attack.Our initial experiments did not consider these high-stress situations. Impact of realistic workloads.Finally,the workload of-fered to the service in our experiments was generated by a client emulator.It is unclear whether the emulator ac-tually behaves as human users would and whether client behavior has any effect on operator behavior.3.2Current and Future Work Encouraged by our positive initial experience,we are currently planning a much more thorough study of opera-tor actions and mistakes.In particular,we plan to explore three complimentary directions:(1)survey and interview experienced operators,(2)improve our benchmarks and run more experiments,and(3)run and monitor all as-pects of a real,live service for at least one year.The surveys and interviews will unearth the problems that af-flict experienced operators even in the presence of pro-duction software and hardware and sophisticated support tools.This will enable us to design better benchmarks as well as guide our benchmarking effort to address areas of maximum impact.Running a live service will allow us to train the operators extensively,observe the effects of experience,stress,complex tasks,and real workloads, and study the efficacy of software designed to prevent, hide,or tolerate mistakes.We have started this research by surveying profes-sional network and database administrators to charac-terize the typical administration tasks,testing environ-ments,and mistakes.Thus far,we have received41re-sponses from network administrators and51responses from database administrators(DBAs).Many of the re-spondents seemed excited by our research and provided extensive answers to our questions.Thus,we believe that the challenge of recruiting experienced operators for human-factor studies is surmountable with an appropri-ate mix offinancial rewards and positive research results.A synopsis of the DBAs’responses follows.All re-spondents have at least2years of experience,with71% of them having at least5years of experience.The most common tasks,accounting for50%of the tasks per-formed by DBAs,relate to recovery,performance tun-ing,and database restructuring.Interestingly,only16% of the DBAs test their actions on an exact replica of the online system.Testing is performed offline,manually or via ad-hoc scripts,by55%of the DBAs.Finally, DBA mistakes are responsible(entirely or in part)for roughly80%of the database administration problems reported.The most common mistakes are deployment, performance,and structure mistakes,all of which oc-cur once per month on average.The current differencesand separation between offline testing and online envi-ronments are cited as two of the main causes of the most frequent mistakes.These results further motivate the val-idation and guidance approaches discussed next.4ValidationIn this section,we describe validation as one approach for hiding mistakes.Specifically,we are prototyping a validation environment that allows operators to validate the correctness of their actions before exposing them to clients[15].Briefly,our validation approach works as follows.First,each component that will be affected by an operator action is taken offline,one at a time.All requests that would be sent to the component are redi-rected to components that provide the same functionality but that are unaffected by the operator action.After the operator action has been performed,the affected compo-nent is brought back online but is placed in a sand-box and connected to a validation harness.The validation harness consists of a library of real and proxy compo-nents that can be used to form a virtual service around the component under validation.The harness requires only a few machines and,thus,has negligible resource require-ments for real services.Together,the sand-box and val-idation harness prevent the component,called masked component,from affecting the processing of client re-quests while providing an environment that looks exactly like the live environment.The system then uses the validation harness to com-pare the behavior of the component affected by the oper-ator action against that of a similar but unaffected com-ponent.If this comparison fails,the system alerts the op-erator before the masked component is placed in active service.The comparison can either be against another live component,or against a previously collected trace. After the component passes the validation process,it is migrated from the sand-box into the live operating envi-ronment without any changes to its configurations. Using our prototype validation infrastructure,we were able to detect and hide66%of the mistakes we ob-served in our initial human-factors experiments.A de-tailed evaluation of our prototype can be found in[15].4.1Open IssuesAlthough our validation prototype represents a goodfirst step,we now discuss several open issues.Isolation.A critical challenge is how to isolate the components from each other yet allow them to be mi-grated between live and validation environments with no changes to their internal state or to external configuration parameters,such as network addresses.We can achieve this isolation and transparent migration at the granularity of an entire node by running nodes over a virtual net-work,yet for other components this remains a concern. State management.Any validation framework is faced with two state management issues:(1)how to start up a masked component with the appropriate internal state; and(2)how to migrate a validated component to the on-line system without migrating state that was built up dur-ing validation but is not valid for the live service. Bootstrapping.A difficult open problem for validation is how to check the correctness of a masked component when there is no component or trace to compare against. This problem occurs when the operator action correctly changes the behavior of the component for thefirst time. Non-determinism.Validation depends on good com-parator functions.Exact-match comparator functions are simple but limiting because of application non-determinism.For example,ads that should be placed in a Web page may correctly change over time.Thus,some relaxation in the definition of similarity is often needed, yet such relaxation is application-specific.Resource management.Regardless of the validation technique and comparator functions,validation retains resources that could be used more productively when no mistakes are made.Under high load,when all available resources should be used to provide a better quality of service,validation attempts to prevent operator-induced service unavailability at the cost of performance.This suggests that adjusting the length of the validation period according to load may strike an appropriate compromise between availability and performance. Comprehensive validation.Validation will be most ef-fective if it can be applied to all system components.To date,our prototyping has been limited to the validation of Web and application servers in a three-tier service.De-signing a framework that can successfully validate other components,such as databases,load balancers,switches, andfirewalls,presents many more challenges.4.2Current WorkWe are extending our validation framework in two ways to address some of the above issues.First,we are ex-tending our validation techniques to include the database, an important component of multi-tier Internet services. Specifically,we are modifying a replicated database framework,called C-JDBC,which allows for mirroring a database across multiple machines.We are facing several challenges,such as the management of the large persis-tent state when bringing a masked database up-to-date, and the performance consequences of this operation. Second,we are considering how to apply validationwhen we do not have a known correct instance for com-parison.Specifically,we are exploring an approach we call model-based validation.The idea is to validate the system behavior resulting from an operator action against an operational model devised by the system designer.For example,when configuring a load balancing device,the operator is typically attempting to even out the utiliza-tion of components downstream from the load balancer. Thus,if we can conveniently express this resulting be-havior(or model)and check it during validation,we can validate the operator’s changes to the device configura-tion.We are currently designing a language that can express such models for a set of components,including load balancers,routers,andfirewalls.5GuidanceIn this section,we consider how services can prevent mistakes by guiding operator actions when validation is not applicable.For example,when the operator is try-ing to restore service during a service disruption,he may not have the leisure of validating his actions since repairs need to be completed as quickly as possible.Guidance can also reduce repair time by helping the operator to more rapidlyfind and choose the correct actions.One possible strategy is to use the data gathered in op-erator studies to create models of operator behaviors and likely mistakes,and then build services that use these models together with models of the services’own behav-iors to guide operator actions.In particular,we envision services that monitor and predict the potential impact of operator actions,provide feedback to the operator before the actions are actually performed,suggest actions that can reduce the chances for mistakes,and even require appropriate authority,such as approval from a senior op-erator,before allowing actions that might negatively im-pact the service.5.1Future WorkOur guidance strategy relies on the system to maintain several representations of itself:an operator model,a performance model,and an availability model. Operator behavior models.To date,operator model-ing has mostly been addressed in the context of safety-critical systems or those where the cost of human mis-takes can be very high.Rather than follow the more complex cognitive approaches that have evolved in these areas(see Section2),we envision a simpler approach in which the operator is modeled using stochastic state ma-chines describing expected operator behavior.Our intended approach is similar in spirit to the Op-eration Function Models(OFMs)first proposed in[12].Like the OFMs,our models will be based onfinite au-tomata with probabilistic transitions of operator actions, which can be composed hierarchically.However,we do not plan on representing the mental states of the opera-tor,nor do we expect to model the operator under normal operating conditions.An important open issue to be considered is whether tasks are repeated enough times with sufficient similar-ity to support the construction of meaningful models.In the absence of a meaningful operator model for a certain task,we need to rely on the other models for guidance. Predicting the impact of operator actions.Along with the operator behavior models,we will need a software monitoring infrastructure for the service to represent it-self.In particular,it is important for the service to moni-tor the configuration and utilization of its hardware com-ponents.This information can be combined with ana-lytical models of performance and availability similar to those proposed in[5,14]to predict the impact of oper-ator actions.For example,the performance(availabil-ity)model could estimate the performance(availability) degradation that would result from taking a Web server into the validation slice for a software upgrade. Guiding and constraining operator ing our operator models,we will develop software to guide operator actions.Guiding the operator entails assisting him/her in selecting actions likely to address a specific scenario.These correspond to what today might be en-tries in an operations manual.However,unlike a manual, our guidance system can directly observe current system state and past action history in suggesting actions.Our approach to guide the operator uses the behavior models,the monitoring infrastructure,and the analytical models to determine the system impact of each action. Given a set of behavior model transitions,the system can suggest the operator actions that are least likely to cause a service disruption or performance degradation.To do so, the system willfirst determine the set of components that are likely to be affected by each operator action and the probability that these components would fail as a result of the action.The system will then predict the overall im-pact for each possible action along with the likelihoods of each of these scenarios.To allow operators to deviate from automatic guidance yet allow a service to still protect itself against arbitrary behaviors,we will need dampers.The basic idea behind the damper is to introduce inertia representing the poten-tial negative impact of an operator’s action in case the action is a mistake.For example,if an action is likely to have a small negative(performance or availability)im-pact on the service,the damper might simply ask the op-erator to verify that he indeed really wants to perform that action.On the other hand,if the potential impactof the operator’s action is great enough,the system may require the intervention of a senior or“master”opera-tor before allowing the action to take place.In a similar vein,Bhaskaran et al.[2]have recently argued that sys-tems should require acknowledgements from operators before certain actions are performed.However,the need for acknowledgements in their proposed systems would be determined by operator behavior models only.6Discussion and ConclusionThe research we have advocated in this paper is appli-cable to many other areas of Computer Science.In this section,we motivate how some of these areas may be im-proved by accounting for human actions and mistakes. In the area of Operating Systems,little or no attention has been paid to how mistakes can impact the system. For example,when adding a device driver,a simple mis-take can bring down the system.Also,little attention has been given to the mistakes made when adding and re-moving application software.Addressing these mistakes explicitly would increase robustness and dependability. In the area of Software Engineering,again historically there has been little direct investigation into why and how people make mistakes.A small body of work exists in examining common types of programming errors,yet lit-tle is understood about the processes that cause there er-rors.An interesting example of work in this direction is [10],in which the authors exploit data mining techniques to detect cut-and-paste mistakes.Finally,in thefield of Computer Networks,the Border Gateway Routing Protocol suffered from severe disrup-tions when bad routing entries were introduced,mostly as a result of human mistakes[11].Again,addressing hu-man mistakes explicitly in this context can significantly increase routing robustness and dependability.In conclusion,we hope that this paper included enough motivation,preliminary results,and research di-rections to convince our colleagues that designers must consider human-system interactions and the mistakes that may result explicitly in their designs.In this context, human-factors studies,techniques to prevent or hide hu-man mistakes,and models to guide operator actions all seem required.Failure to address humans explicitly will perpetuate the current scenario of human-produced un-availability and its costly and annoying consequences. References[1]B ARRETT,R.,M AGLIO,P.P.,K ANDOGAN,E.,AND B AILEY,able Autonomic Computing Systems:the Administrator’s Perspective.In Proceedings of the1st International Conference on Autonomic Computing(ICAC’04)(May2004).[2]B HASKARAN,S.M.,I ZADI,B.,AND S PAINHOWER,L.Coor-dinating Human Operators and Computer Agents for Recovery-Oriented Computing.In Proceedings of the International Con-ference on Information Reuse and Integration(Nov.2004). [3]B ROWN,A.A Recovery-oriented Approach to Dependable Ser-vices:Repairing Past Errors with System-wide Undo.PhD thesis, Computer Science Division-University of California,Berkeley, 2003.[4]B ROWN,A.,AND P ATTERSON,D.A.Including the HumanFactor in Dependability Benchmarks.In Proceedings of the DSN Workshop on Dependability Benchmarking(June2002).[5]C ARRERA,E.V.,AND B IANCHINI,R.Efficiency vs.Portabil-ity in Cluster-Based Network Servers.In Proceedings of the8th Symposium on Principles and Practice of Parallel Programming (PPoPP)(June2001).[6]G OVINDARAJ,T.,W ARD,S.L.,P OTURALSKI,R.J.,ANDV IKMANIS,M.M.An Experiment and a Model for the Hu-man Operator in a Time-Constrained Competing-Task Environ-ment.IEEE Transactions on Systems Man and Cybernetics15,4 (1985).[7]G RAY,J.Why do Computers Stop and What Can Be Done AboutIt?In Proceedings of5th Symposium on Reliability in Distributed Software and Database Systems(Jan.1986).[8]H OLLAND,D.A.,J OSEPHSON,W.,M AGOUTIS,K.,S ELTZER,M.I.,S TEIN,C.A.,AND L IM,A.Research Issues in No-Futz Computing.In Proceedings of the9th Workshop on Hot Topics in Operating Systems(HotOS IX)(May2003).[9]K EPHART,J.O.,AND C HESS,D.M.The Vision of AutonomicComputing.IEEE Computer36,1(Jan.2003).[10]L I,Z.,L U,S.,M YAGMAR,S.,AND Z HOU,Y.CP-Miner:ATool for Finding Copy-paste and Related Bugs in Operating Sys-tem Code.In Proceedings of the USENIX Symposium on Operat-ing Systems Design and Implementation(OSDI’04)(Dec.2004).[11]M AHAJAN,R.,W ETHERALL,D.,AND A NDERSON,T.Under-standing BGP Misconfiguration.In Proceedings of the ACM SIG-COMM’02Conference on Communications Architectures and Protocols(Aug.2002).[12]M ITCHELL,C.M.GT-MSOCC:A Domain for Research onHuman-Computer Interaction and Decision Aiding in Supervi-sory Control Systems.IEEE Transactions on Systems,Man and Cybernetics17,4(1987),553–572.[13]M URPHY,B.,AND L EVIDOW,B.Windows2000Dependability.Tech.Rep.MSR-TR-2000-56,Microsoft Research,June2000.[14]N AGARAJA,K.,G AMA,G.,M ARTIN,R.P.,J R.,W.M.,ANDN GUYEN,T.D.Quantifying Performability in Cluster-Based Services.IEEE Transactions on Parallel and Distributed Systems 16,5(May2005).[15]N AGARAJA,K.,O LIVEIRA, F.,B IANCHINI,R.,M ARTIN,R.P.,AND N GUYEN,T.D.Understanding and Dealing with Operator Mistakes in Internet Services.In Proceedings of the USENIX Symposium on Operating Systems Design and Imple-mentation(OSDI’04)(Dec.2004).[16]O PPENHEIMER,D.,G ANAPATHI,A.,AND P ATTERSON,D.Why do Internet Services Fail,and What Can Be Done About It.In Proceedings of the USENIX Symposium on Internet Tech-nologies and Systems(USITS’03)(Mar.2003).[17]R ASMUSSEN,rmation Processing and Human-MachineInteraction:An Approach to Cognitive Engineering.North-Holland,New York,1986.[18]W ALDEN,R.S.,AND R OUSE,W.B.A Queueing Model of Pi-lot Decisionmaking in a Multitask Flight Management Situation.IEEE Transactions on Systems,Man and Cybernetics8,12(Dec.1978).。

相关文档
最新文档