Investigating the feasibility of supply chain-centric business models in 3D chocolate
- 格式:pdf
- 大小:2.32 MB
- 文档页数:12
Southwest university of science and technology 专业英语翻译学院名称:西南科技大学专业名称:建筑环境与能源应用工程学生姓名:学号:指导教师:2015年 12 月论文要求:The final assignment:To translate part of Introduction of an English academic article related to our mayor(refrigeration,heat and mass transfer, fluid dynamic, ventilation, new energy, etc.).Requirements:1.The translation partshould be No less than 300 English words.2. The article should be published in the journals of the periodicals databases of ScienceDirect.(/science/journals).3. The publish year of the article should be no earlier than 2010.4. The article of each student should be different.5. The final assignment includes: the cover page, the first page ofsource article, the translation part and its corresponding Chinese version.打分标准:理解准确,30%语句通顺,30%用词规范专业,40%。
Simulation of electricity generation by marine current turbines at Istanbul Bosphorus Strait∙Hasan Yazicioglu a,∙K.M. Murat Tunc b,∙Muammer Ozbek b, , ,∙Tolga Kara b∙a Technical University of Denmark, Department of Wind Energy, Denmark ∙b Istanbul Bilgi University, Faculty of Engineering and Natural Sciences, TurkeyReceived 9 July 2015, Revised 29 October 2015, Accepted 17 November2015, Available online 24 December 2015doi:10.1016/j.energy.2015.11.038Highlights•Simulations are performed for a 10MW marine turbine cluster located in Bosphorus.•360 different simulations are performed for 15 different virtual sea states.•8 different configurations are analyzed to find the optimum spacing between turbines.•Annual energy yield and cluster efficiency are calculated for each simulation.AbstractIn this work, several simulations and analyses are carried out to investigate the feasibility of generating electricity from underwater sea currents at Istanbul Bosphorus Strait. Bosphorus is a natural canal which forms a border between Europe and Asia by connecting Black Sea and Marmara Sea. The differences in elevation and salinity ratios between these two seas cause strong marine currents. Depending on the morphology of the canal the speed of the flow varies and at some specific locations the energy intensity reaches to sufficient levels where electricity generation by marine current turbines becomes economically feasible.In this study, several simulations are performed for a 10 MW marine turbine farm/cluster whose location is selected by taking into account several factors such as the canal morphology, current speed and passage of vessels. 360 different simulations are performed for 15 different virtual sea states. Similarly, 8 different configurations are analyzed in order to find the optimum spacing between the turbines. Considering the spatial variations in the current speed within the selected region, the analyses are performed for three different flow speeds corresponding to ±10% change in the average value. Foreach simulation the annual energy yield and cluster efficiency are calculated.Keywords∙Renewable energy;∙Marine current turbine;∙Energy yield simulations;∙Cluster/farm optimization;∙Offshore engineering;∙Dynamic interactions1. IntroductionThe growing world population and rapid industrialization seen in developing countries cause a continuous increase in the global energy demand. Today the major source of energy comes from fossil fuels such as oil, coal and natural gas. However, considering the rate of increase in the consumption, it can easily be realized that these limited sources cannot be a long term solution to satisfy the global energy demand and are definitely bound to run out. Besides, using fossil fuels asprimary source of energy has irreversible negative impacts on the environment which force many countries to seek for alternative environmental friendly renewable energy sources.Turkey, as a rapidly growing economy with very limited national hydrocarbon resources, is also heavily dependent on fossil fuels (e.g. natural gas) imported for electricity production[1]. However, some recent political instabilities in the supplier countries, the heavy economic burden of importing these resources and the most importantly, the increasing awareness of environmental issues have been encouraging policy makers to increase the use of renewable energy sources. Indeed, very detailed investigations and analyses were performed to determine the wind, solar and geothermal energy capacity of the country [1]. However, the potential of harnessing some other renewable sources, particularly sea current energy has not been fully realized yet.Compared to the other types of renewable energy such as wind and solar, current energy can still be considered in development phase and is not commercially available in large scales. Existing marine turbine systems are mostly in prototype testing stage. Although initial results are quitepromising [2], [3], [4], [5], [6], [7], [8]and [9]some further verification for long term performance and durability under severe environmental conditions is still required.The average current speed needed for most commercial turbines is approximately 4–5 knots (2–2.5 m/s). Areas that typically experience high marine current flows are in narrow straits, between islands and around headlands. Entrances to lochs, bays and large harbors often also have high marine current flows. Generally the resource is largest where the water depth is relatively shallow and a good tidal range exists [10].The flow in Bosphorus does not originate from tidal currents but the differences in elevation and salinity ratios between two seas and wind and pressure variations [11]. The unique characteristics of the strait enable very high energy intensities to be reached at some locations and sections.This paper aims at investigating the feasibility of generating electricity from the streams at Bosphorus by using marine current turbines. Extensive simulations and analyses are performed for a 10 MW marine turbine farm (10 – SeaGen 1 MW) where several important design parameters such as the size, orientation, depth and spacing of the turbines areoptimized according to the specific morphology and flow patterns seen at Bosphorus.翻译1.引言发展中国家快速增长的人口和工业化进程造成了全球能源需求的持续增长。
1 OverviewIntroduction1.1 The FCA is committed to promoting effective competition in regulated financial services in the interests of consumers. Disruptive innovation is a key part of effective competition, which is why we launched Project Innovate. Project Innovate aims to support innovation that offers new products and services to customers and challenges existing business models. To do this, we engage constructively with innovative businesses, and seek to remove unnecessary regulatory barriers to innovation.1.2 Following recommendations by the Government Office for Science, the FCA was asked by Her Majesty’s Treasury (HMT) to investigate the feasibility of developing a regulatory sandbox for financial services. A regulatory sandbox is a ‘safe space’in which businesses can test innovative products, services, business models and delivery mechanisms without immediately incurring all the normal regulatory consequences of engaging in the activity in question.Case study no.1The FCA recently hosted a forum to discuss automatic advice business models (robo-advice). The attendees noted that it would be very helpful if they could test their algorithms in a regulatory sandbox. A sandbox could allow a firm to make their advice platform available to a limited number of consumers. As a safeguard, once the advice is issued, but before transactions are executed, financial advisers would review the advice. This would allow firms to learn how consumers interact with their advice platform and how their algorithm performs compared to human assessment.1.3 A regulatory sandbox has the potential to deliver more effective competition in the interests ofconsumers by:•reducing the time and, potentially, the cost of getting innovative ideas to market•enabling greater access to finance for innovators•enabling more products to be tested and, thus, potentially introduced to the market, andallowing the FCA to work with innovators to ensure that appropriate consumer protectionsafeguards are built in to their new products and services1.4 We have considered three key questions when investigating the feasibility of a regulatory sandbox:•Barriers –what regulatory barriers do firms face when testing out new ideas? How and to what extent can they be lowered?•Safeguards –what safeguards should be in place to ensure consumers and the financial system are appropriately protected during testing?•Legal framework –what regulatory arrangements are mandated by EU legislation and therefore are not within the gift of the FCA to change?1.5 We believe that it is feasible for the FCA to reduce some of the existing regulatory barriers to firms that are testing new ideas, while also maintaining suitable safeguards. Where the FCA is constrained, we believe solutions are available to industry. There may also be some scope for the Government to consider changes to the legislation that regulates financial services (see Chapter 5 for more details).1.6 This report sets out the FCA’s recommendations for implementing the regulatory sandbox:•The FCA will expand Project Innovate to include a sandbox unit: This team will be responsible for considering sandbox applications and monitoring the testing process.•There will be eligibility criteria for access to the sandbox: The sandbox unit will use consistent criteria to decide which sandbox proposals should be accepted for testing in this framework (see section 3.4).•The FCA sandbox unit will offer a range of options: Firms face different regulatory challenges depending on a range of factors, including regulatory status and type of activity.We have identified a range of available options for helping firms to address some of these challenges while testing in the sandbox (see section 3.5 and following).•The regulatory sandbox should be flexible: Safeguards for consumers and the financial system while testing will be agreed between the businesses and the FCA on a case-by-case basis. This way we can ensure that protections are sufficient but at the same time not unnecessarily burdensome on the businesses considering their sandbox activities (see section 3.14 and following).•The regulatory sandbox should be flexible: Safeguards for consumers and the financial system while testing will be agreed between the businesses and the FCA on a case-by-case basis. This way we can ensure that protections are sufficient but at the same time not unnecessarily burdensome on the businesses considering their sandbox activities (see section 3.14 and following).•We will work with industry to support the development of an industry led virtual sandbox: A virtual sandbox is an environment that enables firms to test their products and services in a virtual space without entering the real market (for example, by testing with publicly available data sets, or with data provided by other firms through the virtual sandbox). We propose to facilitate collaboration between interested parties and provide support when the virtual sandbox is being developed. We will look into providing access to our various systems and to some data sets (see section 4.3).•Private-sector stakeholders acting together should consider setting up a not-for- profit sandbox umbrella company: This company could seek authorisation from the FCA and then allow innovative businesses to act as ‘appointed representatives’for the duration of the trial in question. The FCA would help with setting up the umbrella and provide ongoing support and advice (see section 4.7).•The Government may wish to consider whether changes to legislation may be appropriate (see Chapter 5).1.7 The remaining chapters of this document are as follows:•Chapter 2 sets out the benefits of introducing a sandbox•Chapter 3 describes how a sandbox could be implemented by the FCA•Chapter 4 makes recommendations for the industry to consider•Chapter 5 sets out some options for legislative change for the Government to consider, and •Chapter 6 outlines next stepsWho should read this paper?1.8 This paper will be of particular interest to businesses looking to develop innovative ways to provide financial services. This includes, but is not limited to, innovator firms (both authorised firms and new entrants), accelerators, software firms, and technology companies. It will also beinteresting to their representative bodies, and to professional firms providing support to such businesses.Is this of interest to consumers?1.9 This report will be interesting to consumers who want to engage with new solutions to manage their financial affairs and consumer groups who represent their interests. This report describes the different ways that consumers can participate in testing and what consumer protection will be available.What will we do next?1.10 We intend to open the sandbox unit for testing proposals in spring 2016. Over the course of the next few months we will engage with interested parties to finalise the design of how the unit will operate. As part of this engagement process we have arranged an event in December 2015. Please see https:/// for more information.1.11 We will also start engaging with stakeholders regarding establishing a virtual sandbox and a sandbox umbrella.1.12 We have set up an e-mail address sandbox@ for anyone who would like to provide input into the development of the sandbox unit.2. Why introduce a regulatory sandbox?2.1 In this chapter we set out the potential benefits of introducing the regulatory sandbox.2.2 The FCA wants to promote competition by supporting disruptive innovation. It is estimated that the UK’s FinTech sector generates about £20bn in revenue annually, with a total market of £3.6bn in ‘disruptive’FinTech (small, innovative firms disintermediating incumbent financial services firms with new technology).Half of the promising ‘disruptive’FinTech start-ups in Europe are in the UK. To remain Europe’s leading FinTech Hub, we have to ensure that we continue to be an attractive market with an appropriate regulatory framework.2.3 The potential benefits of a regulatory sandbox could be significant from:•Reduced time-to-market at potentially lower cost: Delays driven by regulatory uncertainty disproportionately affect first-movers and discourage innovators. Evidence from other industries suggests that time-to-market can be increased by about a third in this way, at a cost of about 8% of product lifetime revenue.•Better access to finance: Financial innovation relies on investment, much of it through equity funding. Regulatory uncertainty at a crucial growth stage means that FinTech firms find it harder to raise funds and achieve lower valuations as investors try to factor in risks that they are not well placed to assess. Evidence from other industries suggests valuations may be reduced by about 15% due to regulatory uncertainty 5 ; it is more difficult to estimate the number of firms that fail to achieve any funding at all.•More innovative products reaching the market: Due to regulatory uncertainty, some innovations are abandoned at an early stage and never even tested. As the sandbox framework enables firms to manage regulatory risks during the testing stage, more solutions may be trialled and later potentially introduced to the market.2.4 The benefits the sandbox could provide firms should lead to better outcomes for consumers through, for example, an increased range of products and services, reduced costs, and improved access to financial services.2.5 The sandbox enables the FCA to work with innovators to ensure that appropriate consumer protection safeguards are built in to their new products and services before these reach a mass market.2. Why introduce a regulatory sandbox?2.1 In this chapter we set out the potential benefits of introducing the regulatory sandbox.2.2 The FCA wants to promote competition by supporting disruptive innovation. It is estimated that the UK’s FinTech sector generates about £20bn in revenue annually, with a total market of £3.6bn in ‘disruptive’FinTech (small, innovative firms disintermediating incumbent financial services firms with new technology).Half of the promising ‘disruptive’FinTech start-ups in Europe are in the UK. To remain Europe’s leading FinTech Hub, we have to ensure that we continue to be an attractive market with an appropriate regulatory framework.2.3 The potential benefits of a regulatory sandbox could be significant from:•Reduced time-to-market at potentially lower cost: Delays driven by regulatory uncertainty disproportionately affect first-movers and discourage innovators. Evidence from other industries suggests that time-to-market can be increased by about a third in this way, at a cost of about 8% of product lifetime revenue.•Better access to finance: Financial innovation relies on investment, much of it through equity funding. Regulatory uncertainty at a crucial growth stage means that FinTech firms find it harder to raise funds and achieve lower valuations as investors try to factor in risks that they are not well placed to assess. Evidence from other industries suggests valuations may be reduced by about 15% due to regulatory uncertainty 5 ; it is more difficult to estimate the number of firms that fail to achieve any funding at all.•More innovative products reaching the market: Due to regulatory uncertainty, some innovations are abandoned at an early stage and never even tested. As the sandbox framework enables firms to manage regulatory risks during the testing stage, more solutions may be trialled and later potentially introduced to the market.2.4 The benefits the sandbox could provide firms should lead to better outcomes for consumers through, for example, an increased range of products and services, reduced costs, and improved access to financial services.2.5 The sandbox enables the FCA to work with innovators to ensure that appropriate consumer protection safeguards are built in to their new products and services before these reach a mass market.2.6 Since the sandbox is intended for testing new solutions, in real life situations, the risk of consumer detriment needs to be carefully considered, as does the need to respect binding legal rules. These constraints will limit the flexibility the FCA can offer. However, even with these limits, we believe that it is feasible to develop a sandbox that will be helpful for innovative firms and deliver the above benefits.3 Implementing a regulatory sandbox3.1 In this chapter we set out our plans for implementing a regulatory sandbox: the criteria we plan to use, the options we have available, our approach to safeguards, and the ‘firm journey’.3.2 For dual regulated firms, we will work with the Prudential Regulation Authority (PRA) to agree on the appropriate sandbox options. Where necessary, these will be delivered in consultation orwith the consent of the PRA under the current terms of the Memorandum of Understanding in place between the FCA and the PRA, or under the relevant provisions of the Financial Services and Markets Act 2000 (FSMA). For example, the FCA will consult with the PRA in respect of restrictions or rule waivers applied to dual regulated firms.Criteria for using sandbox3.3 Introducing publicly available criteria that need to be met as a prerequisite for entry into the sandbox will help to ensure that we treat all businesses fairly and transparently, while also ensuring we focus on propositions that are genuinely of benefit to consumers.3.4 We recommend that the sandbox criteria is similar to the criteria for requesting support from the FCA’s Innovation Hub:•Is the firm in scope: Is the planned new solution designed for or supports the financial services industry?•Genuine innovation: Is the new solution novel or significantly different to existing offerings? •Consumer benefit: Does the innovation offer a good prospect of identifiable benefit to consumers? This criterion should continue to be met throughout the period of sandbox testing. •Need for sandbox: What is the objective of testing? Does the business have a genuine need for testing within the sandbox framework?•Background research: Has the business invested appropriate resources in developing the new solution, understanding the applicable regulations, and mitigating the risks?3.5 We engaged with firms, trade bodies and other stakeholders to understand what a sandbox could deliver to be a useful facility for innovative businesses. What we found was that innovators face different challenges depending on a range of factors, including whether they are authorised and what kind of products/services they want to test.3.6 Authorised firms and technology firms that provide outsourced services to such firms are mainly concerned about the FCA’s reaction to new solutions. They are interested in early dialogue, clarity about how to apply rules and the risk of the FCA taking enforcement action at a later date. Unauthorised firms have to incur potentially significant one-off costs and apply for authorisation before they can meaningfully explore consumers’appetite for a product/service or if there are any significant risks posed to consumers.3.7 We have identified a number of options that the FCA can use to address some of these challenges while firms test out their ideas in the sandbox.Option for unauthorised firms3.8 We will set up a tailored authorisation process, similar to the banking mobilisation authorisation process to allow testing by firms who need to become authorised to trial their new products or services. Sandbox firms will first be authorised with restrictions, allowing them to test their ideas but no more (restricted authorisation). Once the firm is able to meet ‘full’requirements restrictions can be lifted.3.9 The restricted authorisation option will allow firms to become authorised in their own right while only having to meet authorisation requirements that are proportionate to testing activities. This process should also be quicker than applying for a ‘full’authorisation. When launching full commercial activity, firms will have to apply to have restrictions lifted in order to carry on relevant regulated activities but they will not have to apply for new authorisation.3.10 This option does have some limitations. Before being able to test, firms still need to become authorised and meet relevant requirements which requires time and resource. Further, EU legislation restricts the flexibility that the FCA has in setting some authorisation requirements (see section 5.5. for an illustrative list of firms that need to be authorised or registered under EU legislation). These requirements may be quite onerous for firms (especially for start-ups). For such firms, we have suggested that the sandbox umbrella option may be a more appropriate option to address the challenges they face in taking innovative products/services to market (see section4.7).3.11 A restricted authorisation and sandbox umbrella will not apply to carrying out activities outside the FSMA: e.g. payment services and e-money. The Payment Services Regulations and Electronic Money Regulations already provide for a lighter registration regime for small payment institutions and small e-money firms and a number of exemptions when these regulations do not apply (e.g. limited network).3.12 For avoidance of doubt, this restricted authorisation option under the sandbox framework will not replace the banking mobilisation authorisation process or extend it to other firms. This option will not be an alternative route for authorisation for all firms. We will only use it to enable firms who meet the sandbox eligibility criteria to test their new products and services.Options for authorised firms and outsourcing arrangements3.13 Authorised firms and technology firms that provide outsourced services to such firms are mainly concerned about the FCA’s reaction to new solutions. The following options help to manage this risk by giving certainty that the FCA will not take enforcement action at a later date in relation to testing activities, provided firms abide by the conditions agreed with the sandbox unit. These options may also be used by technology companies when they find authorised firms that are interested in testing their products or services.•No enforcement action letters (NALs): We could issue a NAL stating that no FCA enforcement action will be taken against testing activities where we are reasonably satisfied that the activities do not breach our requirements or harm our objectives. We think it would be appropriate for the FCA to reserve the right to close the trial. The FCA’s commitment not to take enforcement action applies to the period from the issue of the NAL until the testing is completed or closed by the FCA. The US Consumer Financial Protection Bureau (CFPB) is implementing a similar policy. It is important to note that this only addresses the risk of enforcement action by the FCA and does not limit businesses’liability towards their customers.•Individual Guidance (IG): In addition to NALs, the FCA can issue individual guidance to a firm on the interpretation of applicable rules in respect of testing activities the firm may be carrying out. If the firm acts in accordance with this guidance, it will give them certainty that the FCA would not take action against them.•Waivers: Where it is clear that testing activities do not meet our rules but the firm can meet the waiver test 8 and the rules are within the FCA’s power to waive, the FCA can waive or modify particular rules for sandbox firms. A waiver or modification would allow what would otherwise be a temporary breach of our rules. The FCA is limited in what it can waive by EU legislative requirements. This is not an option for firms not regulated under FSMA (e.g. payment institutions).Safeguards3.14 We believe that the benefits that the sandbox can bring to firms should lead to better outcomes for consumers through, for example, an increased range of products and services, reduced cost, and improved access to financial services. However, there is potential for customer detriment when innovative financial products or services are tested in real life situations. This risk needs to be carefully managed.3.15 There are a number of approaches that the FCA can take to protect customers that participate in sandbox testing (Appendix 4 sets this out in more detail):•Approach 1: As in clinical trials, sandbox firms can only test their new solutions on customers who have given informed consent to be included in testing. Customers are notified of the potential risks and the available compensation.•Approach 2: FCA agrees on a case-by-case basis the disclosure, protection and compensation appropriate to the testing activity.•Approach 3: Customers have the same rights as customers who engage with other authorised firms (e.g. complain to firm, then to the Financial Ombudsman Service (FOS), and have access to the Financial Services Compensation Scheme (FSCS) if a firm fails).•Approach 4: Businesses undertaking sandbox trials are required to compensate any losses (including investment losses) to customers and must demonstrate that they have the resources (capital) to do that.3.16 It is important that the safeguards for customers are appropriate to the sandboxing activity. So we prefer approach 2 –the FCA agrees on safeguard proposals on a case-by-case basis (for example, these could be approach 1, 3, or 4 alone or accompanied by some other safeguards). This approach enables flexibility in setting appropriate customer protection for the testing activities.Case study no 2For testing blockchain based transaction tools, the appropriate safeguards may be limiting testing only to sophisticated customers, using approach 1, and daily monitoring of whether the transactions are executed correctly and on time.3.17 With the proposed tools for sandbox, consumers will have FOS and FSCS protection 9 , provided that the tested solutions fall within their jurisdiction.3.18 The parameters of the sandbox activities will have to take into account that testing should not cause risks to the financial system (i.e. scale of testing has to be limited).3.19 The exact firm journey and the FCA’s involvement will depend on the specific options used, the regulatory status of the firm, the solution being tested and the extent of consumer involvement.4 Recommendations for industry4.1 In this chapter we set out the solutions that can be delivered by industry acting collectively(e.g.financial services firms, software developers, technology companies, accelerators, and so on)to help address the challenges that innovators face when taking a new product or service to market.4.2 In addition to the options that the FCA has, we think there are also solutions that the industry can implement which offer more flexibility. We think there is a potential role for trade bodies in bringing together industry to achieve these solutions.Virtual sandbox4.3 A virtual sandbox could be introduced by industry. This would be an environment to enable firms to test their solutions virtually without entering the real market. A number of large firms already have similar solutions for testing technologies but we understand these operate separately from each other and with data only from the owners of these sandboxes.4.4 The virtual sandbox could be, for example, a cloud-based solution set up and equipped in collaboration between the industry, which businesses then could customise for their products or services, run tests with public data sets or data provided by other firms through the virtual sandbox, and then invite firms or even consumers to try their new solution. In this environment, there is no risk of consumer detriment, risk to market integrity or financial stability while testing.4.5 A virtual sandbox could be used by all innovators regardless of whether they are authorised or not. It will probably be most useful for small start-ups who cannot build their own sandboxes. Technology companies seeking to engage with incumbents may also benefit; being accepted into a virtual sandbox may encourage more incumbents to engage with the new solution. This environment could also allow collaboration between a number of businesses and other interested parties (e.g. academia) to develop innovative solutions quicker and in a more informed way.4.6 We do not think it is necessary for the FCA to set up the virtual sandbox; the industry is well placed to set up a useful virtual testing environment itself. However, we propose to facilitate collaboration between interested parties and provide support when the virtual sandbox is being developed. We will look into providing access to our various systems and to some data sets (provided this does not breach requirements from the Data Protection Act 1998 or section 348 of FSMA). We would be interested in having access to the results of the virtual sandboxing activity.Case study no 3The FCA has committed to identifying ways to support the adoption of technologiesthat facilitate compliance with regulatory requirements (RegTech). Any products developed to address this challenge could be tested in the virtual sandbox and developed further in collaboration between interested parties.Sandbox umbrella4.7 A not-for-profit company could be set up by industry to act as a sandbox umbrella that allows unauthorised innovators to offer their services under its shelter as appointed representatives.The umbrella company would need to be authorised with appropriate permissions and then supervised by the FCA as other authorised firms. The umbrella company would monitor its appointed representatives.4.8 This option would take some time to implement but it would be faster and simpler for innovators to use than the restricted authorisation option outlined in Chapter 3. Innovators would not have to apply for authorisation and meet authorisation requirements in their own right. The umbrella company would assess whether the firms applying to become appointed representatives are ready to test their solutions.4.9 It is worth noting that the appointed representative regime is not available for all regulated activities, so not all innovative businesses would be able to use the sandbox umbrella. For example, this regime does not apply to insurance underwriting and managing investments. Thesefirms would need to use the restricted authorisation option described in Chapter 3 to participate in the sandbox.4.10 We believe that the sandbox umbrella should be introduced by industry. An industry-led umbrella is better equipped to assess and advise sandbox firms and facilitate overall innovation. The FCA would help to set up the umbrella through the Innovation Hub and provide ongoing support and advice. We would also supervise the umbrella to ensure oversight of testing activities.5 Options that require legislative change5.1 In this chapter we set out considerations regarding whether changes to legislation that governs financial services have the potential to better address some of the challenges described above.5.2 We have identified two potential options as feasible:•New Regulated Activity: The Regulated Activities Order 11 could be amended to introduce a new regulated activity of ‘sandboxing’for testing. This option could enable the FCA to create a new sandbox regime (with new authorisation requirements and rules) that is more flexible than the current regime in areas where EU legislation does not apply or where the UK can have additional rules to those that exist under EU legislation. Thus, it could allow for a streamlined authorisation process and potentially less regulatory requirements to comply with when testing. The drawbacks to this option are that firms still need to become authorised before being able to test, and proposed changes need to take into account EU requirements. Further, this option will not apply to activities that are not regulated under FSMA (e.g. payment services and e-money). Thus, this change could have a limited effect.•Amending the waiver test: The FCA’s power to issue waivers is limited in relation to requirements which come from EU legislation and by the current waiver test provided in FSMA. The Government could consider changing the waiver conditions in FSMA to make it easier for the FCA to waive rules for a firm within the sandbox. This could be achieved by introducing a new test for sandbox firms. However, we would not be able to waive rules stemming from EU legislation despite this change.5.3 We recommend considering these options further when we have collected more evidence about the specific needs of innovative firms during the testing of new solutions. This evidence would enable us to understand better which specific rules or legislation firms struggle with when testing innovative solutions and then analyse the effect the above legislative changes could have.5.4 We also analysed the two potential options below:•Amendment to Exemptions Order 12 : The Exemptions Order could be amended to introduce an exemption from authorisation for sandbox firms. The exemption would apply if the firm complies with sandbox conditions and the FCA confirms that it meets sandbox criteria. •Amendment to By Way of Business Order 13 : The By Way of Business Order could be amended to provide that a sandbox activity is not to be regarded as carried out ‘by way of business’, so it would not be a regulated activity. This would apply if the firm complies with sandbox conditions and the FCA confirms that it meets sandbox criteria.5.5 We consider the options in section 5.4 to be unfeasible due to limitations set by EU legislative requirements. For example, subject to a range of exclusions, under a number of different pieces of EU legislation, the following firms must be authorised or registered: credit institutions, some insurance and reinsurance companies, insurance and reinsurance intermediaries, firms who provide ‘investment services or activities’under MiFID, some。
花生研究英文文献Peanuts, scientifically known as Arachis hypogaea, are a legume crop that has gained significant global attention due to their versatility, nutritional value, and economic importance. The study of peanuts, often referred to as "groundnuts," has been a topic of extensive research across various scientific disciplines, including agronomy, plant breeding, food science, and nutrition. This essay will delve into the existing English literature on peanut research, highlighting key findings, advancements, and future directions in this field.One of the primary areas of peanut research focuses on understanding the crop's genetic diversity and the development of improved cultivars. Peanuts are known to exhibit a wide range of genetic variation, which can be leveraged to enhance desirable traits such as yield, disease resistance, and adaptability to different environmental conditions. Researchers have employed various techniques, including traditional breeding methods and modern genomic approaches, to identify and characterize the genetic factors responsible for these traits. For instance, studies have explored the use of molecular markers and quantitative trait loci (QTLs) analysis todissect the genetic architecture of peanut yield components, oil content, and resistance to major diseases like leaf spot and aflatoxin contamination.Another significant aspect of peanut research is the investigation of the crop's nutritional profile and potential health benefits. Peanuts are renowned for their high protein content, as well as their abundance of essential vitamins, minerals, and bioactive compounds. Researchers have conducted extensive studies to evaluate the nutritional composition of different peanut cultivars, examining factors such as fatty acid profiles, antioxidant activity, and the presence of beneficial phytochemicals. These findings have important implications for the development of nutritionally-enhanced peanut products and the promotion of peanuts as a healthy food choice.In the realm of food science, peanut research has focused on exploring the processing and utilization of peanuts in various food applications. Researchers have investigated methods for improving the quality, shelf-life, and safety of peanut-based products, such as peanut butter, roasted peanuts, and peanut oil. This includes studying the effects of different processing techniques, the role of packaging materials, and the mitigation of food safety concerns like aflatoxin contamination. Additionally, researchers have explored the potential for value-added peanut products, such as the developmentof peanut-based protein isolates, flours, and other ingredients for use in the food industry.Peanut research has also addressed the agronomic and environmental aspects of peanut cultivation. Researchers have examined the optimal growing conditions, water management strategies, and nutrient requirements for peanut production, aiming to enhance yield and sustainability. Studies have also delved into the impact of climate change on peanut cultivation, exploring strategies for adapting to shifting environmental conditions and mitigating the effects of drought, heat stress, and other abiotic stresses.Furthermore, peanut research has contributed to the understanding of the crop's role in agricultural systems and its potential for sustainable development. Peanuts are known for their ability to fix atmospheric nitrogen through symbiotic relationships with soil microorganisms, making them a valuable component of crop rotation and intercropping practices. Researchers have investigated the agronomic and environmental benefits of integrating peanuts into diverse farming systems, examining their impact on soil fertility, greenhouse gas emissions, and the overall sustainability of agricultural production.In recent years, the emergence of advanced technologies, such as precision agriculture, remote sensing, and machine learning, hassignificantly enhanced peanut research. These tools have enabled researchers to collect and analyze large-scale data on peanut growth, yield, and environmental interactions, leading to the development of more efficient and data-driven management strategies. Additionally, the application of biotechnology and genetic engineering has opened up new avenues for peanut improvement, including the development of disease-resistant cultivars, the enhancement of nutritional profiles, and the exploration of novel uses for peanut-derived products.Despite the substantial progress made in peanut research, there are still numerous challenges and opportunities that warrant further investigation. For instance, the continued efforts to address the issue of aflatoxin contamination, a major food safety concern associated with peanuts, remain a priority. Researchers are exploring various strategies, such as the development of resistant cultivars, improved post-harvest handling practices, and the use of biological control agents, to mitigate this problem.Another area of growing interest is the exploration of peanut's potential as a sustainable and versatile crop for biofuel production. Peanut oil has been identified as a promising feedstock for biodiesel, and researchers are investigating the feasibility and environmental impacts of using peanut-derived fuels as alternatives to fossil fuels.Furthermore, as consumer preferences and dietary trends evolve, peanut research is also shifting towards the development of innovative peanut-based food products that cater to diverse dietary needs and preferences, such as gluten-free, vegan, and allergen-free options.In conclusion, the existing English literature on peanut research showcases the multifaceted and dynamic nature of this field. From genetic improvement and nutritional analysis to food processing and sustainable agriculture, peanut research has made significant contributions to our understanding of this important legume crop. As the global demand for peanuts continues to grow, the ongoing research efforts in this area will be crucial in addressing the challenges and seizing the opportunities that lie ahead, ultimately enhancing the production, utilization, and sustainability of peanuts worldwide.。
Title: The Feasibility of Suggestions for Industry EnhancementIn the ever-evolving landscape of industry, it is imperative for businesses and sectors to continuously seek ways to enhance their operations, foster innovation, and remain competitive. The implementation of strategic suggestions aimed at industry enhancement is thus a crucial endeavor. However, the feasibility of these suggestions is a crucial factor that must be thoroughly evaluated before embarking on any transformational journey. This essay delves into the various aspects that determine the feasibility of industry enhancement suggestions.Firstly, Market Analysis and Demand Validation:The cornerstone of any feasible suggestion for industry enhancement lies in a thorough market analysis. This involves assessing current market trends, identifying consumer needs and preferences, and evaluating the potential impact of proposed changes. If a suggestion fails to address a genuine market gap or align with consumer demands, its feasibility is inherently questionable. By conducting surveys, focus groups, and market research, businesses can validate the demand for their enhancement suggestions, ensuring that they are not only innovative but also relevant to the market.Secondly, Resource Availability and Allocation:Another critical aspect of feasibility is the availability and allocation of resources. This includes financial capital, human resources, technology, and infrastructure. Implementing significant industry enhancements often requires substantial investments, both upfront and ongoing. Therefore, it is essential to assess whether the necessary resources are available or can be secured. Moreover, efficient resource allocation is key to ensuring that the enhancement efforts do not strain the organization's financial health or disrupt its day-to-day operations.Thirdly, Technical Feasibility:Technical feasibility refers to the practicality of implementing the proposed enhancement from a technological standpoint. This includes evaluating the current technological capabilities of the industry, assessing the availability of necessary technologies, and determining whether the implementation process is technically sound. For instance, a suggestion that relies on cutting-edge technology that is not yet widely accessible or affordable may not be feasible in the short term. Fourthly, Regulatory Compliance:Industry enhancements must also comply with relevant laws, regulations, and standards. Failure to do so can result in legal consequences, reputational damage, and operational disruptions. Therefore, it is crucial to conduct a regulatory analysis to ensure that the proposed suggestions align with all applicable legal frameworks. Thisincludes seeking legal advice, consulting with regulatory bodies, and ensuring that all necessary permits and approvals are in place.Lastly, Stakeholder Engagement and Support:The success of industry enhancement suggestions is heavily influenced by stakeholder engagement and support. Stakeholders, including employees, customers, suppliers, investors, and government agencies, can play a vital role in shaping the implementation process and ensuring its success. It is essential to involve stakeholders early on in the process, communicate the benefits and implications of the proposed enhancements, and address their concerns and suggestions. By building a strong coalition of support, businesses can increase the feasibility and likelihood of success of their enhancement efforts.In conclusion, the feasibility of suggestions for industry enhancement is a multifaceted concept that requires careful consideration of market analysis, resource availability, technical feasibility, regulatory compliance, and stakeholder engagement. By evaluating these aspects thoroughly, businesses can make informed decisions about which enhancement suggestions to pursue, ensuring that their efforts are not only innovative but also practical and sustainable.。
五星级酒店坏账预提和审批英语版流程全文共3篇示例,供读者参考篇1Bad Debt Provision and Approval Process for a Five-Star HotelAs a hospitality student, one of the crucial aspects I've learned about managing a high-end hotel is the importance of effectively dealing with bad debts. In the world of luxury accommodations, where exceptional service and guest satisfaction are paramount, the financial implications of unpaid bills can be substantial. This is where the bad debt provision and approval process comes into play, serving as a safeguard against potential losses while maintaining the hotel's reputation and financial stability.The Bad Debt Provision: A Preemptive MeasureBefore diving into the approval process, it's essential to understand the concept of a bad debt provision. This provision is essentially an accounting practice that recognizes the potential for some accounts receivable to become uncollectible. In other words, it's a preemptive measure taken by the hotel to accountfor the possibility that certain guests may fail to pay their outstanding balances.The bad debt provision is typically calculated as a percentage of the total accounts receivable or based on an analysis of the aging of individual accounts. This percentage is determined by the hotel's management, taking into consideration factors such as historical data on bad debts, current economic conditions, and the overall risk profile of the guest population.The Approval Process: A Multi-Step ApproachOnce the bad debt provision has been established, the approval process kicks in to ensure that any write-offs or adjustments to the provision are thoroughly reviewed and authorized. This process typically involves multiple levels of approval, each serving as a check and balance to maintain transparency and accountability.Step 1: Departmental ReviewThe first step in the approval process involves a thorough review by the respective department responsible for the outstanding debt. This could be the front desk, the banquet department, or any other revenue-generating department withinthe hotel. The department manager will analyze the account in question, gather relevant documentation, and prepare a comprehensive report detailing the circumstances surrounding the unpaid balance.Step 2: Finance Department EvaluationAfter the departmental review, the report and supporting documentation are forwarded to the hotel's finance department. Here, a team of financial analysts and accountants will conduct a detailed evaluation of the case. They will review the efforts made to collect the outstanding debt, verify the accuracy of the information provided, and assess the feasibility of recovering the debt.Step 3: Bad Debt Committee ReviewMany five-star hotels have a designated Bad Debt Committee, comprising representatives from various departments, such as operations, finance, legal, and risk management. This committee convenes regularly to review and discuss the proposed bad debt write-offs or adjustments to the provision.During the committee meeting, each case is presented, and the members scrutinize the details, considering factors such asthe guest's history, the hotel's relationship with the guest, and any potential legal or reputational risks. The committee may request additional information or clarification from the respective departments before reaching a decision.Step 4: Executive ApprovalDepending on the amount of the bad debt and the hotel's internal policies, executive-level approval may be required. This could involve the hotel's general manager, the chief financial officer, or even the board of directors, particularly for larger write-offs or significant adjustments to the bad debt provision.At this stage, the executives will review the committee's recommendations, assess the potential impact on the hotel's financial performance, and evaluate any associated risks or legal implications. Their approval is typically the final step before the bad debt write-off or adjustment can be officially recorded in the hotel's financial statements.Step 5: Documentation and ReportingOnce the necessary approvals have been obtained, the finance department will record the bad debt write-off or adjustment in the hotel's accounting system. Detailed documentation of the entire process, including the committee'sdeliberations, executive approvals, and any supporting documentation, is maintained for audit and compliance purposes.Additionally, the hotel's management may require regular reporting on bad debt levels, trends, and the effectiveness of the collection efforts. This information helps inform future strategies and decision-making processes related to credit policies, guest screening, and overall risk management practices.The Importance of a Robust ProcessThe bad debt provision and approval process may seem complex and time-consuming, but it serves several critical purposes for a five-star hotel. First and foremost, it ensures that the hotel's financial statements accurately reflect its financial position by accounting for potential losses from uncollectible debts.Furthermore, the multi-step approval process promotes transparency, accountability, and effective risk management. By involving various stakeholders and subject matter experts, the hotel can make informed decisions and mitigate potential legal, reputational, or financial risks associated with bad debts.Moreover, a robust approval process helps maintain the hotel's reputation for exceptional service and guest satisfaction. By carefully evaluating each case and considering the guest's history and relationship with the hotel, the management can strike a balance between protecting the hotel's financial interests and preserving valuable guest relationships.ConclusionIn the world of luxury hospitality, the bad debt provision and approval process is a crucial aspect of financial management. It not only safeguards the hotel's financial stability but also contributes to its overall reputation and guest experience. As a student aspiring to work in the hospitality industry, understanding this process and its implications is essential for effective hotel management and maintaining the highest standards of service and professionalism.篇2Bad Debt Provision and Approval Process for Five-Star HotelsAs an aspiring hotelier, understanding the financial intricacies of the hospitality industry is paramount. One crucial aspect that often gets overlooked is the management of baddebts, particularly in the realm of luxury, five-star hotels. These establishments cater to an affluent clientele, but even the most prestigious venues can fall victim to uncollected payments, necessitating a robust system for provisioning and approving bad debt write-offs.At the core of this process lies the recognition that not every outstanding account receivable will be collected. Despite the best efforts of the hotel's billing and collection departments, certain factors may render some debts uncollectible. These factors could range from guests experiencing financial difficulties to disputes over service quality or simple oversight on the part of the customer.The first step in managing bad debts is to establish a comprehensive policy that outlines the criteria for identifying and classifying them. This policy should take into account the age of the outstanding balance, the customer's payment history, and any extenuating circumstances that may have contributed to the non-payment. For instance, a long-standing corporate client with an exceptional payment record may be granted more leeway than a first-time guest with a history of delinquency.Once the criteria for bad debts have been defined, the hotel must implement a systematic approach to monitoring andtracking these accounts. This typically involves maintaining a detailed aging report that categorizes outstanding balances based on the number of days they have been overdue. Accounts that have exceeded a certain threshold, say 90 or 120 days, may be flagged for further review and potential write-off.At this juncture, the hotel's accounting team plays a pivotal role. They are responsible for thoroughly investigating each flagged account, gathering relevant documentation, and assessing the likelihood of collection. This assessment may involve contacting the customer directly, reviewing correspondence or contracts, and consulting with the hotel's legal counsel if necessary.Based on their findings, the accounting team will generate a recommendation for either continuing collection efforts or writing off the debt as uncollectible. This recommendation, along with a detailed justification and supporting documentation, is then submitted to the appropriate level of management for review and approval.The approval process for bad debt write-offs is typically structured in a hierarchical manner, with varying levels of authority based on the monetary value of the debt in question. For smaller debts, the approval may rest with the hotel's financialcontroller or director of finance. However, larger debts or those involving high-profile clients may require the approval of senior management, such as the general manager or even the ownership group.This multi-tiered approval process serves several important purposes. First, it ensures that due diligence has been exercised in exhausting all reasonable collection efforts before resorting to a write-off. Second, it provides a system of checks and balances, reducing the risk of fraud or abuse. Finally, it allows for a more comprehensive evaluation of the potential impact on the hotel's financial performance and reputation.Once a bad debt has been approved for write-off, the accounting team will execute the necessary journal entries to remove the outstanding balance from the hotel's accounts receivable. This process typically involves crediting the accounts receivable account and debiting a bad debt expense account, effectively recognizing the loss on the hotel's financial statements.It is important to note that the bad debt provision and approval process is not a one-time event. Rather, it is an ongoing cycle that requires continuous monitoring and adjustment. The hotel's accounting team should regularly review the aging reportand make recommendations for further write-offs or adjustments to the bad debt provision as needed.In addition to the financial implications, the management of bad debts can also have a significant impact on the hotel's operational efficiency and customer relations. Unpaid balances can tie up valuable resources in collection efforts, diverting attention from more productive endeavors. Furthermore, a failure to effectively manage bad debts can lead to strained relationships with customers, potentially damaging the hotel's reputation and future business prospects.To mitigate these risks, many five-star hotels have implemented proactive measures to minimize the occurrence of bad debts in the first place. These measures may include requiring advance deposits or credit card authorizations for certain types of bookings, as well as implementing strict credit policies for corporate accounts or groups.Moreover, hotels may employ sophisticated revenue management systems that analyze historical data and identify potential risk factors associated with certain booking patterns or customer segments. By leveraging this data-driven approach, hotels can make more informed decisions about extendingcredit or requiring prepayment, thereby reducing their exposure to bad debts.In conclusion, the provision for bad debts and the associated approval process are critical components of financial management for five-star hotels. By implementing a robust system that combines clear policies, diligent monitoring, and a multi-tiered approval structure, these establishments can effectively manage the inevitable occurrence of uncollectible accounts while maintaining financial integrity and operational efficiency. Ultimately, a well-designed bad debt provision and approval process not only safeguards the hotel's bottom line but also protects its reputation as a world-class provider of luxury hospitality services.篇3Bad Debt Provision and Approval Process for a Five-Star HotelAs a student pursuing a degree in hospitality management, understanding the financial aspects of running a luxuriousfive-star hotel is crucial. One of the key areas that caught my attention during my studies was the process of managing bad debts and the corresponding approval procedures. Let me walkyou through this intricate process, providing insights into how these prestigious establishments safeguard their financial interests while maintaining a seamless guest experience.The Concept of Bad DebtsBefore delving into the specifics of the bad debt provision and approval process, it's essential to grasp the concept of bad debts itself. Bad debts, also known as delinquent debts or doubtful debts, refer to outstanding amounts owed by customers that the hotel deems unlikely to be collected. These debts can arise from various circumstances, such as guests leaving without settling their bills, credit card disputes, or bankruptcies.The Importance of Bad Debt ManagementEffective bad debt management is vital for the financial health and sustainability of a five-star hotel. These establishments cater to affluent clientele and often extend credit facilities, making them susceptible to potential non-payments. Failure to properly account for and manage bad debts can result in overstated revenue, cash flow issues, and potential legal complications.The Bad Debt Provision ProcessTo mitigate the impact of bad debts, five-star hotels employ a systematic approach known as the bad debt provision process. This process involves estimating the amount of outstanding debts that are unlikely to be collected and setting aside a portion of revenue to cover these potential losses. Here's a breakdown of the typical steps involved:Accounts Receivable Aging AnalysisThe first step in the bad debt provision process is conducting an accounts receivable aging analysis. This analysis categorizes outstanding customer balances based on the number of days they have been outstanding. Typically, accounts are classified into various aging buckets, such as 0-30 days, 31-60 days, 61-90 days, and over 90 days.Historical Bad Debt Percentage CalculationThe hotel's finance team then analyzes historical data to determine the percentage of outstanding balances that have historically resulted in bad debts for each aging bucket. This historical bad debt percentage serves as a basis for estimating future bad debt provisions.Bad Debt Provision CalculationUsing the accounts receivable aging analysis and the historical bad debt percentages, the finance team calculates the estimated bad debt provision for each aging bucket. The sum of these provisions represents the total bad debt provision for the period.Accounting TreatmentThe calculated bad debt provision is recorded as an expense in the hotel's income statement, reducing the overall revenue and net income for the period. Simultaneously, an allowance for doubtful accounts (a contra-asset account) is created on the balance sheet to reflect the estimated uncollectible amounts.The Bad Debt Approval ProcessWhile the bad debt provision process is crucial for financial reporting purposes, five-star hotels also have a robust approval process in place to ensure proper oversight and control over the write-off of actual bad debts. This approval process typically involves multiple levels of review and authorization, depending on the amount and nature of the bad debt.Initial Review and DocumentationWhen a customer account is identified as a potential bad debt, the hotel's accounting department conducts an initialreview to verify the outstanding balance, gather supporting documentation (such as correspondence with the customer, billing statements, and collection efforts), and prepare a write-off request.Department Manager ApprovalThe write-off request is then submitted to the department manager responsible for the respective revenue stream (e.g., rooms, food and beverage, or other services). The department manager reviews the request, assesses the circumstances surrounding the bad debt, and provides initial approval or rejection.Financial Controller ReviewIf approved by the department manager, the write-off request proceeds to the hotel's financial controller or chief accountant. This individual thoroughly examines the request, ensuring compliance with accounting standards, internal policies, and regulatory requirements. They may request additional documentation or clarification if needed.Executive Committee ApprovalFor significant bad debt amounts or high-risk cases, the write-off request is escalated to the hotel's executive committee,typically comprising the general manager, financial controller, and other senior executives. This committee evaluates the request from a strategic and risk management perspective, considering factors such as the potential impact on the hotel's reputation, legal implications, and long-term financial consequences.Board of Directors Approval (if applicable)In some cases, particularly for extraordinarily large bad debt amounts or cases with potential legal ramifications, the write-off request may require approval from the hotel's board of directors or the parent company's executive leadership. This level of scrutiny ensures proper governance and oversight for significant financial decisions.Continuous Monitoring and AdjustmentThe bad debt provision and approval processes are not one-time occurrences but rather ongoing activities that require continuous monitoring and adjustment. The finance team periodically reviews the accuracy of the bad debt provision estimates by comparing them with actual write-offs. If significant discrepancies are observed, the historical bad debt percentages and provision calculations are adjusted accordingly.Furthermore, the hotel's credit policies and collection practices may be revised based on the analysis of bad debt trends and patterns. This proactive approach helps mitigate future bad debt risks and ensures the financial sustainability of the five-star hotel operation.ConclusionManaging bad debts is a critical aspect of financial management for five-star hotels. The bad debt provision process ensures that the hotel's financial statements accurately reflect potential losses from uncollectible accounts, while the approval process provides a system of checks and balances for writing off actual bad debts. By implementing robust procedures and regularly reviewing and adjusting these processes, five-star hotels can maintain their financial integrity while delivering exceptional service to their discerning clientele.。
J. Radiat. Res., 53, 462–468 (2012)Pretreatment Maximal Standardized Uptake Value of the Primary Tumor Predicts Outcome to Radiotherapy in Patientswith Pharyngeal CancerShih-Chieh LIN1, Chih-Ying LIAO6, Chia-Hung KAO2,3*†, Kuo-Yang YEN2,5,Shih-Neng YANG1,5, Yao-Ching WANG1, Ji-An LIANG1,3and Shang-Wen CHEN1,3,4*†FDG PET-CT/SUV/Pharyngeal carcinoma/Radiotherapy/Tumor volume.This study aimed to investigate whether the combination of clinical information, tumor volume and pretreatment SUVmax at the primary tumors might improve the prognostic stratification in pharyngeal cancer (PC) patients treated with radiotherapy (RT). Sixty-two patients with PC (35 oropharynx; 27 hypo-pharynx) treated with RT were enrolled in this retrospective analysis. All patients received pretreatment FDG- PET or PET/CT. The primary tumor relapse-free survival (PRFS) was calculated according to dif-ferent variables. The median values of the SUVmax for the primary tumors (SUVp-max) and the gross tumor volume (GTVp) were used to divide patients into two groups. Independent prognosticators were identified by the Cox regression analysis. In this study, the median SUVp-max and GTVp was 11 and15.5 ml. Patients having tumors with SUVp-max > 11 had a significantly inferior 2-year PRFS (41% vs.75%, p = 0.003) compared with patients having lower uptake tumors. Multivariate analysis of the PRFS showed two prognostic factors: SUVp-max > 11 (p = 0.04, hazard ratio = 2.67) and GTVp > 15.5 ml (p =0.03, hazard ratio = 2.88). For patients with a GTVp less than 15.5 ml, there was a more significant impactof SUVmax-p on their PRFS compared to that for those with large ones. We disclosed a higher pretreat-ment SUVp-max is a predictor for primary recurrence in PC patients treated with RT, particularly for those with smaller tumor volumes. Patients with a large tumor volume or a higher SUVp-max should be considered for requiring more aggressive treatment approaches.INTRODUCTIONOver the past decade definitive radiotherapy (RT) or con-current chemoradiotherapy (CCRT) has been increasingly employed in organ preservation scheme for oropharyngeal and hypopharyngeal cancers. Despite recent advances in the high-precision delivery of RT, such as intensity-modulated radiotherapy (IMRT), implementation of individualized therapy is limited by a lack of comprehensive knowledge about individual response to a given RT until treatment has been completed. Although the traditional TNM classifica-tion or computed tomogram (CT)- based tumor volume has been used as a predictor of prognosis in head and neck patients,1,2) this parameter may not accurately reflect RT out-come because of the greater variations in the radiosensitivity between tumors, even with the same origins.Several methods for assessing tumor response before RT have been applied; one of the most easily or increasingly used is positron emission tomography and computed tomo-gram (PE T/CT) or PE T scan, which have the potential to improve treatment outcome by providing improved lymph node staging, and perhaps predictive factors. Theoretically, a high SUV value of the tumor probably implies a higher chance of tumor aggressiveness. Based on the results of 17 studies identified; however, the predictive value for head and neck cancer patients treated with RT or CCRT was not*Corresponding author:Phone: 886-4-22052121-7450/7412,Fax: 886-4-22336174,E-mail: vincent1680616@E-mail: d10040@.tw1Department of Radiation Oncology, China Medical University Hospital, Taichung Taiwan; 2Department of Nuclear Medicine and PET Center, China Medical University Hospital, Taichung, Taiwan; 3School of Medicine, College of Medicine School, China Medical University, Taichung, Taiwan; 4School of Medicine, College of Medicine, Taipei Medical University, Taipei, Taiwan; 5Department of Biomedical Imaging and Radiological Science, China Medical University, Taichung, Taiwan; 6Department of Radiation Oncology, Taichung Hospital, Taichung Taiwan.†Contributed equally to this work.Conflicts of Interest: All authors declare there were no actual or potential conflicts of interest in this study.doi:10.1269/jrr.11174Pretreatment Standardized Uptake Value in Pharyngeal Cancer463 conclusive. E ight investigators indicated that the maximalstandardized uptake value (SUVmax) could play a role inpredicting RT/CCRT outcome,3–10) whereas the othersshowed that it does not.2,11–18) These inconsistencies could bea result of the heterogeneity of treatment modalities, the het-erogeneity of tumor sites, the use of several endpoints andthe use of various SUVmax cut-off points.11) Furthermore,substantial numbers of patients in theses studies were treatedwith surgery. In particular, most published studies did notexamine the impact of tumor volume when investigating thepredictive value of the SUVmax. Possibly studies withhomogeneous tumor types, treatment characteristics andstratified for tumor volumes would be able to establish a realrole for an optimal SUVmax cut-off for future treatmentindividualization.This study aimed to investigate whether the combinationof clinical information, tumor volume and pretreatmentSUVmax at the primary tumors might improve the prognos-tic stratification in pharyngeal cancer (PC) patients afterdefinitive RT or CCRT. We hypothesized that a higher pre-treatment SUVmax would adversely affect the local tumorcontrol following RT. By this way, radiation oncologistsmight be able to assess the feasibility of salvage surgery ear-lier, or conduct a dose escalation scheme for those who havegreat probability of local failure.MATERIALS AND METHODSPatient populationBetween Jan 2007 and Dec 2010, a cohort of 62 newlydiagnosed oropharyngeal or hypopharyngeal cancer patients,who would undergo definitive CCRT or RT with IMRT atChina Medical University Hospital, were enrolled in this ret-rospective study (certificate number of local institutionalreview board: DMR99-IRB-010-1). The median age was 51years (range, 37 to 76 years). Fifty-nine patients were maleand 3 were female. They received a pretreatment PE T orPET/CT for pretreatment staging. The interval between the images and the commencement of RT was less than 2 weeks. No patient was known to have a history of diabetes and all had a normal serum glucose level before taking the PET/CT image. Nasopharyngeal cancer was not included in this study because of its relatively higher radiosensitivity and the difference in staging strategy compared to the other pharyn-geal cancers. The characteristics of the 62 patients are listed in Table 1.PET/CT image acquisitionAll patients were asked to fast for at least 4 hours before 18F-FDG PET/CT imaging. Approximately 60 minutes after the administration of 370 MBq of 18F-FDG, images were taken by PET scanner (Advance NXi PET scanner, General E lectric Medical Systems, Milwaukee, WI, USA) before December 2008 or PE T/CT scanner (PE T/CT-16 slice, Discovery STE, GE Medical System, Milwaukee, Wisconsin USA) after December 2008. During the uptake period, patients were asked to rest. The PET/CT workstation provid-ed the quantification of FDG uptake in terms of SUV. Nucle-ar medicine physicians identified the locations and values of SUVmax for all the primary tumors (SUVp-max). Then radiation oncologists reviewed the consistency of PE T/CT images with nuclear medicine physicians. They also recon-firmed the allocated point of the SUVmax within the tumors. This procedure has been addressed in our previous report.19) Delineation of CT-based tumor volumeCT-based tumor volume definition was previously described.20) Briefly, contouring of the tumor volume and normal and critical structures was performed without knowl-edge of the PET results in an effort to reduce bias. Radiation oncologists, who had clinical experiences of more than Table 1.Patient characteristics (totally 62)Characteristic ValueAge (years)37–76 (median, 51) Sex Male 59, Female 3 Smoking Yes: 53, No: 19 Betel nut Yes: 42, No: 20 Alcoholism Yes: 43, No: 19 PathologyW-D/M-D squamous cell carcinoma44P-D squamous cell carcinoma8Unclassified squamous cell carcinoma10Primary lesion site:Oropharynx:35 (56.5%)Hypopharynx:27 (43.5%)AJCC 7th Stage II: 12, III: 20, IV: 30 GTV of the primary tumor (mL)mean ± SD,25.3 ± 24.8median (range)15.5 (2.3–130.2) SUVmax of the primary tumormean ± SD,11.9 ± 4.8median (range)11.0 (3.9–30.5) Concurrent chemotherapy or drugCisplatin-based chemotherapy54Cetuximab4None4Follow up (months)6–80 (median, 24) Abbreviation: W-D = well-differentiated; M-D =moderately-differentiated; P-D = poorly-differentiated; AJCC = American Joint Committee on Cancer; SD: standard deviation.S.-C. Lin et al. 46410 years, delineated the primary gross tumor volume (GTVp) and the metastatic lymph node volume. Neck lymph nodes were considered pathological when their smallest axis diameter was > 1 cm. To reduce inter-observer variations, at least 2 different radiation oncologists carried out the con-touring of the tumors for each patient. An average of the readings was used as the measured volume.TreatmentRT was performed using a sequential IMRT technique as reported previously.20) All patients received 1.8 Gy daily up to a total dose of between 68.4 and 73.8 Gy (median, 70.2 Gy). The clinical target volumes (CTV) were considered to be two regions with different risks: CTV1 encompassed the primary tumor, metastatic lymph nodes, and the regions adjacent to the gross tumor, and CTV2 consisted of the ipsi-lateral or contralateral N0 regions at risk of harboring micro-scopic tumors. The dose delivered to CTV1/CTV2 during the first course was 50.4 to 54 Gy with a further boost of 16.2 to 21.6 Gy to the CTV1 during the second course. Thus, the median cumulative doses to the CTV1 and CTV2 were 70.2 Gy and 54.0 Gy, respectively. The median RT duration was 56 days. Because a phase 3 trial showed a survival ben-efit of CCRT in patients with unresectable head and neck cancers,21) patients with age less than 70 years and suitable renal function were suggested to have CCRT. In all, 54 patients had concurrent chemotherapy. The regimen consist-ed of cisplatin (80–100 mg/m2 on Days 1, 22, 43). Four patients had combined Cetuximab (400 mg/m2 loading dose, then 250 mg/m2 weekly). Four patients received RT alone. Follow-upAfter completion of treatment, all patients were followed up every 1 to 2 months over the first 2 years, and then every 3 to 4 months thereafter. A physical examination and laryn-goscopy were performed during each follow-up examina-tion, and a CT scan of the neck was done every 4 to 6 months over the first 2 years. The follow-up period for all patients ranged from 6 to 80 months (median, 24 months). Following RT, the definition of primary failure was based onTable 2.Patient outcomeOutcome Patient number (totally 62)Alive without evidence of recurrence29 Alive with evidence of recurrence11 Primary relapse alone8 Neck lymph node relapse alone2 Primary relapse with distant metastasis1 Died of cancer18 Primary relapse12 Primary relapse and distant metastasis1 Primary and neck lymph node relapse3 Neck lymph node relapse2 Died of complication without evidenceof recurrent cancer1 Died of concurrent disease3Table 3.The distribution of the SUVp-max and GTVp with respect to T classificationNoMean GTVp ± SD ml(range)Mean SUVp-max ± SD(range)ALL6225.3 ± 24.8 (2.3–130.2)11.9 ± 4.8 (3.9–30.5) T1-22411.4 ± 5.8 (2.3–25.5)9.9 ± 3.6 (3.9–18.7) T31031.5 ± 24.4 (3.6–72.0)12.3 ± 3.9 (6.7–20.1) T42832.4 ± 29.1 (5.1–130.2)13.7 ± 5.4 (5.1–30.5) Abbreviations: GTVp = gross tumor volume of the primary tumor; SD= standard deviation; SUVp-max= maximal standard uptake value of the primary tumor.Table 4.Result of univariate, multivariate analysis and esti-mating hazard ratio of for primary relapse-free survivalVariablesUnivariate Multivariatep value HR(95% CI)p value Age≦51 vs.> 510.03 1.83(0.68–4.92)0.22 smokingyes vs. no0.30 2.72(0.16–40.41)0.38 Betel nutyes vs. no0.220.59(0.14–2.46)0.31 Alcoholismyes vs. no0.030.25(0.03–2.21)0.10 Tumor sitesOPC vs. HPC0.60 1.39(0.52–3.75)0.59 T-stageT1-2 vs. T3-40.001 1.43(0.69–2.93)0.33 T1-3 vs. T40.520.67(0.19–2.37)0.58 N-stageN0-1 vs. N2-30.240.62(0.22–1.77)0.68 GTVp (mL)≦15.5 vs. > 15.50.012 2.88(1.08–6.59)0.03 SUVp-max≦11.0 vs. > 11.00.004 2.67(1.04–6.84)0.04 Abbreviations: HR = hazard ratio; CI = confidence interval; OPC= oropharyngeal cancer; HPC = hypopharyngeal cancer; GTVp = gross tumor volume of the primary tumor; SUVp-max= maximal standard uptake value of the primary tumor.Pretreatment Standardized Uptake Value in Pharyngeal Cancer 465the laryngoscopy results, a CT scan of the neck, or both. The RE CIST criteria were used to assess the follow-up image findings.22) When the patient had a persistent tumor or local recurrence after initial complete remission, salvage surgery was suggested when this was technically feasible and the patient’s condition allowed it.Statistical analysisIn this study, median values for the SUVp-max and the GTVp were used as cut-off points. Because we hypothesized a positive impact of pretreatment SUVmax on local control by RT, the study endpoint simply focused on primary tumor relapse-free survival (PRFS) instead of other parameterssuch as nodal failure. The PRFS was calculated using the Kaplan-Meier method. A successful surgical salvage for any recurrence in primary sites or neck lymph nodes was not tak-en into account when labeling the relapse-free. The log-rank test and the Cox regression were performed to explore the impact of explanatory variables on PRFS. Statistical signif-icance was defined as two-sided, p < 0.05. A correlation test between the SUVp-max and the GTVp was also done using the Pearson’s correlation with significance at 0.01. All cal-culations were performed with SPSS 13.0 for Windows (SPSS Inc, Chicago, IL, USA).RESULTSAt the time of analysis, 29 patients were alive withoutFig. 1. Primary relapse-free survival according to the SUVp-max >11 and ≦ 11.Fig. 2. Primary relapse-free survival according to the GTVp > 15.5 ml and ≦15.5 ml.Fig. 3. Primary relapse-free survival divided by the SUVp-max > 11 and SUVp-max ≦ 11 for patients with GTVp ≦ 15.5 ml.Fig. 4. Primary relapse-free survival divided by the SUVp-max > 11 and SUVp-max ≦11 for patients with GTVp > 15.5 ml.S.-C. Lin et al.466known recurrent disease. E leven patients had primary or nodal relapse but were still alive after salvage or palliative treatment. E ighteen patients had died of tumor recurrence. One had died of complication. Three patients were dead due to metachronous esophageal cancer. Table 2 summarizes the outcome of patients in this study. When initial treatment response was assessed at 1 to 2 month after the completion of treatment, complete remission of the primary tumor was observed in 42 patients (67.7%). With a median follow-up interval of 2 years, 25 patients (40.3%) developed recurrenc-es at the primary site with or without nodal failure. For all patients, the 2-year overall survival and 2-year PRFS were 60% and 57%, respectively.The mean SUVp-max was 11.9 ± 4.8 (median 11.0; range, 3.9 to 30.5), whereas the mean GTVp was 25.3 ml ± 24.8 (median 15.5 ml; range, 2.3 to 130.2 ml). The distribution of the SUVp-max and pGTV with respect to T classification in is shown in Table 3. The correlation test showed there was no obvious association between the GTVp and the SUVp-max values (p = 0.24).The impact of the tumors and the patient-related parame-ters on the PRFS was analyzed by univariate and multivari-ate analyses, and is presented in Table 4. As illustrated in Figs. 1 and 2, patients having tumors with SUVp-max > 11 had a significantly worse 2-year PRFS (41% vs. 75%, p = 0.003) compared with those having lower uptake tumors. Subjects having tumors with GTVp > 15.5 ml had an inferior 2-year PRFS (42% vs. 74%, p = 0.005) compared with those having smaller tumor volumes. Multivariate analysis of the PRFS showed two prognostic factors: SUVp-max > 11 (p = 0.04, hazard ratio = 2.67, 95% CI 1.04–6.84) and GTVp > 15.5 mL (p = 0.03, hazard ratio = 2.88, 95% CI 1.08–6.59). When using the SUVp-max > 11 in predicting primary recurrence at 2 year, the sensitivity, specificity, positive pre-dictive value, negative predictive value and accuracy was 69.2%, 72.0%, 72.0%, 69.2% and 70.6%, respectively.When the PRFS curve was further stratified by the median value of the GTVp, the 2-year PRFS for SUVp-max ≦ 11 and SUVp-max > 11 were 92% and 47% (p = 0.014) for patients with GTVp ≦ 15.5 ml, whereas that for those withlarge volumes were 49% and 37% (p = 0.35), as depicted in Figs. 3 and 4. The predictive value of the SUVp-max did better for patients with smaller tumor volumes.To minimize the confounding variables from the treatment modalities, a subgroup analysis was carried out for 54 patients treated with CCRT. Similarly, multivariate analysis of the PRFS showed SUVp-max > 11 was a predictor with a HR of 5.84 (p = 0.006, 95% CI 1.65 to 20.66).DISCUSSIONIdentification of factors predictive of treatment outcome in cancer patients is of great potential interest, because such research may allow therapy to be tailored to the characteris-tics of individual tumors. The fact that pretreatment tumor volume can be a predictive factor is not novel. Because of variation in the radiosensitivity between tumors, treatment results might be optimized if prognostic factors, such as information from molecular image or other biomarkers could be used to supplement the clinical stage. Our study implement-ed patient- or tumor-related, volumetric and PE T/CT data when investigating the RT outcome in PC patients. All the subjects were treated with a consistent IMRT scheme. Theresult demonstrated that FDG uptake of the primary tumor, as mainly measured by the SUVmax, was associated withworse PRFS in PC patients treated by IMRT. A SUVp-max >11 represents a biological phenotype for predicting recur-rence of primary tumor, particularly for those with the GTVp < 15.5 ml. This finding is consistent with a notion that within a limited tumor burden a higher FDG uptake might represent tumor aggressiveness such as proliferative activity, hypoxia, low apoptosis rate and p53 overexpression as described in some molecular studies.23–25) These charac-teristics could be potentially adverse factors in patients treat-ed with RT/CCRT.Our findings need to be compared with some earlier RTstudies for head and neck cancers. Allal et al .3) showed the SUVmax of the primary tumor remained significant adverse factors, either by considering the median value of 4.76 or the best cut-off of 3.5 in terms of local control or disease-free survival. However, 39.2% (47/120) of the patients were treated with surgery in their study. On the other hand, the investigation by Brun et al .4) is the only study indicating that SUVmax is a prognostic factor in a patient population treat-ed with definitive RT/CCRT. They found that disease-free survival was worse when SUVmax was > 9. Because these studies included some proportion of patients with oral cavitycancers, which are always treated mainly by surgery with or without adjuvant RT, direct comparison might not be straightforward due to the heterogeneity of tumor sites. In addition, both studies analyzed the impact of clinical stage alone without CT-based tumor volumes information. In con-trast, Ohnishi K et al .2) reported an RT study for PC patientswith a combination of comprehensive pretreatment parame-ters. In their study, SUVmax > 12 was significantly associ-ated with local failure in univariate analysis, but only tumorvolume > 10 ml remained an adverse factor in multinivariate analysis. To clarify the predictive value and an optimal cut-off point for SUVmax, previous and our studies highlighted the importance of working out comprehensive in-house data, including patient-related or volumetric information for those institutions using pretreatment FDG uptake as a biomarkerfor RT.Another approach of implementing pretreatment PET/CT as a predictor is the measurement of metabolic tumor vol-ume (MTV). Chung et al .12) has investigated the outcome of RT for PC and suggested the MTV > 40 ml was only a sig-nificant predictor for the disease-free survival. AnotherPretreatment Standardized Uptake Value in Pharyngeal Cancer467study indicated a higher MTV of 9.3 mL is significantly associated with an increased risk of recurrence and death.13) In the two studies, the regions of the MTVs were defined on the pretreatment PE T/CT by a fixed SUV value of 2.5. While the debate between fixed and adaptive threshold still exits despite it has been discussed for a long time. In partic-ular, our previous investigation showed the latter approach could obtain a better match with the presumed tumor vol-umes.19) Also, Schinagl et al.11) conducted a predictive trial of 77 head and neck cancer patients with eligible for defin-itive RT/CCRT. Five PE T segmentation methods were applied: interpreting FDG PET visually, applying an isocon-tour at a SUV of 2.5, using fixed thresholds of 40% and 50% of the maximum FDG activity and applying an adaptive threshold based on the signal-to-background. They conclud-ed there is no role yet for pretreatment FDG PET as a pre-dictor of RT outcome. However, this potential application needs further exploration, focusing both on PE T-based tumor volume and SUVmax of the primary tumor.Despite the limitation, such as short follow-up duration, this study provides a reference value of SUVmax for opti-mizing an organ preservation scheme for PC when both PE T/CT and primary tumor volume become a part of pre-treatment workup. Based on our data, we recommend the best treatment modification, such as dose escalation or con-sideration of adjunctive surgery, should be considered for tumors with a pretreatment SUVp-max more than 11 or with large tumor volumes. Certainly, the results have to be exam-ined further with longer follow-up interval and PC patients could not be classified simply by this model. Nonetheless, some progress of prognostic stratification could be done by this approach and might lead to a more appropriate selection of suitable candidates for organ preservation scheme.CONCLUSIONThe pretreatment SUVp-max > 11 is a predictor for recur-rence of primary tumor in PC patients treated with RT/CCRT, particularly for those with smaller tumor volumes. PC patients with a large tumor volume or a higher SUVp-max should be considered for requiring more aggressive treat-ment approaches, such as RT dose escalation or adjunctive surgery.ACKNOWLEDGEMENTSWe want to thank the grant support of the study projects (DMR-94-080 and DMR-98-052) in our hospital and Taiwan Department of Health, Cancer Research Centers for Excel-lence (DOH100-TD-C-111-005).REFERENCES1.Studer G, et al (2007) Volumetric staging (VS) is superior toTNM and AJCC staging in predicting outcome of head and neck cancer treated with IMRT. Acta Oncol 46: 386–394.2.Ohnishi K, et al (2011) Prediction of local failures with acombination of pretreatment tumor volume and apparent dif-fusion coefficient in patients treated with definitive radiother-apy for hypopharyngeal or oropharyngeal squamous cell carcinoma. J Radiat Res 52: 522–530.3.Allal AS, et al (2004) Prediction of outcome in head-and-neckcancer patients using the standardized uptake value of 2-[18F]fluoro-2-deoxy-D-glucose. Int J Radiat Oncol Biol Phys 59: 1295–1300.4.Brun E, et al (2002) FDG PET studies during treatment: pre-diction of therapy outcome in head and neck squamous cell carcinoma. Head Neck 24: 127–135.5.Halfpenny W, et al (2002) A possible prognostic factor inhead and neck cancer. Br J Cancer 86: 512–516.6.Lee SW, et al (2008) Prediction of prognosis using standard-ized uptake value of 2-[(18)F]fluoro-2-deoxy-d-glucose posi-tron emission tomography for nasopharyngeal carcinomas.Radiother Oncol 87: 211–216.7.Machtay M, et al (2009) Pretreatment FDG-PET standardizeduptake value as a prognostic factor for outcome in head and neck cancer. Head Neck 31: 195–201.8.Minn H, et al (1997) Prediction of survival with fluorine-18-fluoro-deoxyglucose and PET in head and neck cancer. J Nucl Med 38: 1907–1911.9.Roh JL, et al (2007) 2-[18F]-Fluoro-2-deoxy-D-glucose pos-itron emission tomography as guidance for primary treatment in patients with advanced-stage resectable squamous cell car-cinoma of the larynx and hypopharynx. Eur J Surg Oncol 33: 790–795.10.Schwartz DL, et al (2004) FDG-PET prediction of head andneck squamous cell cancer outcomes. Arch Otolaryngol Head Neck Surg 130: 1361–1367.11.Schinagl DAX, et al (2011) Can FDG PET predict radiationtreatment outcome in head and neck cancer? Results of a pro-spective study. Eur J Nucl Med Mol Imaging 38: 1449–1458.12.Chung MK, et al (2009) Metabolic tumor volume of [18F]-fluorodeoxyglucose positron emission tomography/computed tomography predicts short-term outcome to radiotherapy with or without chemotherapy in pharyngeal cancer. Clin Cancer Res 15: 5861–5868.13.Seol YM, et al (2010) Measurement of tumor volume by PETto evaluate prognosis in patients with head and neck cancer treated by chemo-radiation therapy. Acta Oncol 49: 201–208. TH, et al (2009) Metabolic tumor volume predicts forrecurrence and death in head-and-neck cancer. Int J Radiat Oncol Biol Phys 74: 1335–1341.15.Soto DE, et al (2008) Correlation between pretreatment FDG-PE T biological target volume and anatomical location of failure after radiation therapy for head and neck cancers.Radiother Oncol 89: 13–18.16.Suzuki K, et al (2009) Value of fluorodeoxyglucose positronemission tomography before radiotherapy for head and neck cancer: does standardized value predict treatment outcome?Jpn J Radiol 27: 237–242.17.Thorwarth D, et al (2006) Combined uptake of [18F]FDG and[18F]FMISO correlates with radiation treatment outcome inS.-C. Lin et al. 468head and neck cancer patients. Radiother Oncol 80: 151–156.18.Vernon MR, et al (2008) Clinical outcomes of patients receiv-ing integrated PET/CT-guided radiotherapy for head and neck carcinoma. Int J Radiat Oncol Biol Phys 70: 678–684.19.Kao CH, et al (2010) 18F-FDG PE T/CT-based gross tumorvolume definition for radiotherapy in head and neck cancer: a correlation study between suitable uptake value threshold and tumor parameters. Radiat Oncol 5: 76.20.Chen SW, et al (2009) Prognostic impact of tumor volume inpatients with stage III-IVA hypopharyngeal cancer without bulky lymph nodes treated with definitive concurrent chemo-radiotherapy. Head Neck 31: 709–716.21.Adelstein DJ, et al (2003) An intergroup phase III comparisonof standard radiation therapy and two schedules of concurrent chemoradiotherapy in patients with unresectable squamous cell head and neck cancer. J Clin Oncol 21: 92–98.22.Therasse P, et a (2000) New guidelines to evaluate theresponse to treatment in solid tumors. European Organization for Research and Treatment of Cancer, National Cancer Insti-tute of the United States, National Cancer Institute of Canada.J Natl Cancer Inst 92: 205–216.23.Minn H, et al (1995) In vitro comparison of cell proliferationkinetics and uptake of tritiated fluorodeoxyglucose and L-methionine in squamous-cell carcinoma of the head and neck.J Nucl Med 36: 252–258.24.Clavo AC, Brown RS and Wahl RL (1995) Fluorodeoxyglu-cose uptake in human cancer cell lines is increased by hypoxia. J Nucl Med 36: 1625–1632.25.Furuta M, et al (1997) Rapid rise in FDG uptake in an irradi-ated human tumour xenograft. Eur J Nucl Med 24: 435–438.Received on September 8, 2011Accepted on February 7, 2012J-STAGE Advance Publication Date: May 11, 2012。
Dr.Constantine BekasPostdoctoral AssociateComputer Science&Engineering Dept.,University of Minnesota,Twin CitiesResearch Experience and StatementGeneral InterestsMy general research interests are in the area of algorithms in numerical linear algebra,for the solution of large scale problems in computational materials science and in mining of high dimensional data.The computation of eigenvalues and singular values of very large and sparse matrices holds central role in the above setting.The computational framework for these problems involves high performance parallel systems as well as highly and widely distributed networks of computers.I strongly believe that it is necessary to incorporate advances in algorithms for these problems as well as recent innovations in computing hardware and software techniques in user friendly software interfaces.Thus,I consider research in problem solving environments to be of significant importance.Large Scale Eigenvalue&Singular Value ProblemsEigenvalue and Singular value calculations hold a central role in an exceptionally broad spectrum of scientific rge scale eigenvalue problems that involve very sparse and large matrices are very demanding. Even though that thefield has enjoyed significant progress in the last twenty years,we are still far from “black-box”algorithms that can be safely and efficiently used as their counterpart algorithms for smaller, dense matrices(as in the widely used LAPACK library).My research efforts in thisfield involve Krylov subspace methods in the framework of implicitly restarted techniques[9].The immense difficulty of large scale problems,especially when we are interested in the eigenvalues in the interior of the spectrum,call for combining several different techniques.I strongly believe in the importance of unifying algorithmic frameworks,that seamlessly allow for the integration of advances in our theoretical understanding of the problem.A very important new technique,that is totaly different from traditional Krylov methods,is the Au-tomated Multilevel Substructuring method(AMLS)[8].AMLS is a multilevel extension of Component Mode Synthesis methods and has been demonstrated to solve extremely large eigenproblems in Structural Engi-neering,allowing for unprecedented simulations potentially revolutionizing this scientificfield.In the recent paper[5],together with Y.Saad we were able to conduct a purely algebraic analysis of the approximation mechanism of AMLS.This novel understanding has lead to important improvements that greatly increase the convergence properties of the method,thus allowing its use in other applications,such as electronic structure calculations,with more stringent accuracy demands than Structural Engineering.Currently,AMLS is a one-shot algorithm in the sense that certain approximate eigenvectors are built and no further refinements are made.The current framework does not iteratively refine these approximations.I am currently exploring the feasibility of an iterative scheme based on AMLS.Preliminary results([6],[3])indicate that one can devise an AMLS based method that adopts shifting strategies of shift-and-invert Lanczos,resulting in a highly robust method.Ifirmly believe that substructuring techniques for the eigenvalue problem is a very promising line of research with significant potential impact on many application areas.Computational Materials SciencePerhaps one of the greatest achievements of modern science and technology is the ability to master the proper-ties of materials.Indeed,innovative materials have revolutionized many aspects of modern life.Undoubtedly, this dramatic progress could not have happened without the corresponding revolution of computing systems. However,the ever growing needs of humanity for lighter,stronger and cheaper materials will surely push our computing capabilities to their limits.Therefore,new algorithmic techniques that will allow us to attack larger problems in computational materials science are much needed.My main goals in this line of research is to exploit high performance computers for solving large scale problems that arise in modelling of real-life materials,i.e.,materials beyond simple crystals or artificial mod-1els.During my post-doc collaboration with prof.Y.Saad(CS Dept.)and prof.J.Chelikowsky(Chem.Eng. &Materials Science Dept.)we are investigating new algorithms for excited states of various nanostructures. We have focused primarily on methods based on time-dependent density functional theory(TDDFT).My contribution involves a)better eigenvalue algorithms(such as AMLS,see above)and b)methods which avoid eigenvalue problems altogether.Concerning thefirst approach,apart from AMLS we are proposing to exploit the particular structure of density(or occupation)matrices,both in real space and in the Fourier space as well[7].Our preliminary results indicate considerable improvement over standard methods.Concerning the second approach,our research has focused on using expressions of the density matrix in bases other than the eigenbasis,which are much easier to compute than eigenvectors[4].This methodology is similar to the popular Order-N methods but has the potential to yield much better accuracy while at the same time having no applicability restrictions as Order-N methods appear to have.It is very important to stress that research in computational materials science is most likely to benefit from advances in algorithms that are suited for large scale distributed computation.Thus,I consider that in the(near)future enabling wide area parallel calculations(putational GRIDS)in materials science research will be of crucial importance and thus one of my central research goals.Numerical Methods in Mining of High Dimensional DataThe revolution in communications and data acquisition has dramatically increased the volume of available data.However,this wealth of information is useless unless it is properly analyzed.In recent years we have witnessed a significant extension of the application of linear algebra algorithms and techniques in areas such as Information Retrieval,Pattern Recognition and Data tent semantic indexing,support vector machines and principal components analysis are only a few of the many methodologies based on linear algebra.My research interests in thisfield involve new(numerical)algorithms for clustering high dimensional data as well as new efficient techniques for classification.I consider equally important the scalability of the methods in distributed computational environments as well as the development of software environments (problem solving tools–see below)that will provide a user-friendly interface to the back end algorithms,so that practitioners will be able to a achieve a better understanding of the data.Problem Solving Environments and High Performance Parallel&Distributed Computing Advances in algorithmic techniques as well as in mathematical modelling are indeed essential in solving demanding problems.However,in recent years researchers in computer science have recognized the need for software that will allow transparent access to the above theoretical advances,combined with equally transparent access to computational platforms,especially ones that facilitate distributed computation.These problem solving(software)environments(PSEs)enable practitioners to describe problems in an abstract framework.The goal is to free researchers from programming details and thus allow them to concentrate on the problem itself.In addition,such tools should be able to efficiently harness the full potential of the computational infrastructure available.Automatically ensuring scalability and efficiency in a wide range of applications is a particularly exciting and significant problem which is central in modern high performance computing research around the world.My research interests in this important area has so far concentrated on the development of a parallel problem solving environment for pseudospectra computations[1],[2].This tool is based on MATLAB and recent advances that allow Message Passing parallel computing in MATLAB.Through my collaboration with researchers from the Department of Chemical Eng.&Materials Science at the University of Minnesota,I was able to appreciate the potential impact of PSEs in materials science research.The development of such a tool that will combine graphic illustration and molecule design,wealth of models and algorithms with direct access to highly(and widely)distributed computation resources is bound to enjoy great success.PhD Thesis ResearchMy PhD thesis work was in the area of pseudospectra calculation,that is a problem with a well documented extreme computational cost,which is closely related to eigenvalue and singular value calculations of large and sparse(non-normal)matrices.My advisor was prof.Dr. E.Gallopoulos in the University of Patras, Greece.In order to address the problem I have developed parallel geometric path following algorithms as2well as parallel iterative methods for the efficient approximation of the smallest singular value of large and sparse shifted matrices(A−z k I)for many complex shifts z k.(see my C.V.for a complete list of relevant publications).My overall goal was to combine the above approaches in a unifying algorithmic and software framework that will help pseudospectra to become a useful tool for researchers and engineers.Interest in Collaborations&Interdisciplinary ResearchI am particularly interested in continuing my research efforts at an institution that encourages interdisci-plinary collaboration for the solution of a variety of problems of science and engineering.I am especially looking forward to working in an environment that nurtures and rewards scientific achievement.Further-more,Ifind particularly appealing the prospect of working on real world problems that originate from the industry as well as from the life sciences.I plan to establish a research group in the areas of my interest.My goal is to train graduate students in developing state-of-the art(numerical)algorithms and linear algebra techniques on high performance computing platforms for the solution of challenging problems in these research areas.It is my conviction that the computational challenges of our time demand a new breed of scientists that will be able to combine rigorous mathematical modelling with advanced computer science skills.Contact Information:Dr.Constantine Bekas4-192,EE/CS BLD.Computer Science&Engineering Dept.University of Minnesota,Twin Cities200Union St.SE,55455,Minneapolis,USAemail:bekas@WWW:/∼bekasTel:+16126267510Fax:+16126250572References[1]C.Bekas,E.Kokiopoulou,and E.Gallopoulos.The design of a distributed PSE for computing Pseu-dospectra.To appear in Future Generation Computer Systems,Elsevier,2004.[2]C.Bekas,E.Kokiopoulou,I.Koutis,and E.Gallopoulos.Developing a cluster based matlab environmentfor computing pseudospectra.In GRACM Congress on Computational Mechanics,2002.[3]C.Bekas and Y.Saad.Amls,spectral schur complements and iterative computation of eigenvalues.PMAA04,Marseilles,France,2004.[4]C.Bekas and Y.Saad.Avoiding large scale eigenvalue problems in electronic structure calculations.Inpreparation.,2004.[5]C.Bekas and putation of smallest eigenvalues using spectral schur complements.To appearin SIAM put.,2004.[6]C.Bekas and Y.Saad.Accurate computation of eigenvalues via multiple-shift amls.In preparation.,2005.[7]C.Bekas,Y.Saad,and J.Chelikowsky.Exploting structure in large scale eigenvalue problems in electronicstructure calculations.In preparation.,2004.[8]J.K.Bennighof and R.B.Lehoucq.An automated multilevel substructuring method for eigenspacecomputation in linear put.,25(6),2004.3[9]E.Kokiopoulou,C.Bekas,and puting smallest singular triplets with implicitlyrestarted Lanczos bidiagonalization.J.Appl.Num.Math.,49(1):39–61,2004.4。
穿越历史的英语作文英文回答:Throughout the annals of human existence, the allure of traversing the temporal boundaries has captivated the imaginations of countless dreamers, explorers, and storytellers. The concept of time travel, with itstantalizing promise of witnessing momentous events, experiencing bygone eras, and shaping the course of history, has inspired an abundance of literature, art, andscientific inquiry.In the realm of science fiction, time machines have become synonymous with the exploration of temporalfrontiers. From H.G. Wells' seminal "The Time Machine" to Isaac Asimov's intricate "Foundation" series, theseliterary devices have allowed readers to embark on extraordinary journeys through different periods in history. Novels such as "A Connecticut Yankee in King Arthur's Court" by Mark Twain and "Outlander" by Diana Gabaldon havefurther ignited the public's fascination with the possibilities of traveling through time.Beyond the realm of fiction, scientists have long pondered the feasibility of time travel. In the early 20th century, physicist Albert Einstein's theory of special relativity introduced the notion of time dilation, which posits that time flows at different rates for objects moving at different speeds. This concept has led to the development of theories such as the "twin paradox," which suggests that a person traveling at near-light speeds could return to the future having experienced less time than those who remained on Earth.However, the practical realization of time travel remains an elusive goal. The technological challenges are immense, as it would require the manipulation of spacetime, a fabric that has proven to be both complex and enigmatic. Nonetheless, the pursuit of time travel continues toinspire researchers, who are investigating avenues such as quantum mechanics and wormholes as potential pathways to traversing the boundaries of time.中文回答:历史的穿梭。
Investigating Usage Sources for the Legal InformationInstituteA Feasibility StudyLinda Chen, William Goodrich, Ross HousewrightYuan-Fen Kuo, Andrew Richardson, Matthew ThomasThis study concerns a proposed project on behalf of the Cornell Law School’s Legal Information Institute (LII), directed by Tom Bruce, henceforth referred to as “client”. The goal of this project is to take a list of the domains that appear in the access log of the LII web server, associate one or more html files to those domains, and then cluster those html files. The clusters found by this project will not necessarily be meaningful; we are only concerned with presenting Mr. Bruce with information to which he can either assign a meaning to or declare to be meaningless. If the proposed project does result in meaningful clusters, the client hopes to use them to better understand the users of the LII system, with a view to promoting and raising funds for the system.Preliminary Requirement AnalysisThe activities we will need to support fall into three main groups: gathering information representing the users of LII, clustering that information, and allowing our client to examine those clusters. Our current understanding of the client’s requirements for each of these steps is as follows:Information Gathering PhaseThe software produced by this project will need to process an access log that contains on the order of millions of entries. One aspect of this processing will be filtering out IP addresses that are unlikely to be meaningful. Then, the software will attempt to download html files that reside at the remaining addresses. We will need to design the software to allow the client to configure the rules for filtering out IP spaces and to determine how carefully the software searches for html files. The client’s preliminary goal is to associate web pages with 10% of the entries in the access log.Clustering PhaseWe will pass the downloaded html documents into another program that will arrange them into clusters. Again, we will need to write software to allow the client to adjust some of the clustering parameters. Furthermore, we need to make it as easy as possible for the clustering program to be replaced in case either we or the client find a technique that may produce more meaningful clusters.Visualization PhaseFinally, we will provide a user interface to allow the client to explore the clusters of web pages. This user interface will allow the client to make notes about the clusters as he finds meaning in them (or as he decides that they have no meaning). We will also striveto provide some sort of initial, automatically generated summary of document content found within the clusters, and we will try to present the clusters in different levels of resolution, but both of these efforts will depend on the exact capabilities of the clustering program.A key requirement in all of these phases is customizability. Since the value of the eventual clusters is so uncertain, the client wants the ability to modify the process in search of more meaningful information. These modifications may range from changing parameter values to entirely replacing some of the tools we use.Suggested DeliverablesThe deliverables for this project will consist of a modular software package and its documentation. We anticipate that this package will run in a UNIX-type environment, with most of it run from a command-line. Since the client views this project as the first step in an experimental process, we will need to arrange the source code in a modular fashion so that components of the system can be isolated and replaced at a later date if better technology is discovered. In accordance with this design strategy, our documentation will explain the input and output formats of the individual modules of our application. Also, since the client has requested a great deal of customizability in certain parts of the software (e.g. which IP addresses to ignore, words to avoid in the clustering process), our documentation will carefully detail the scope and use of any customization features.We will deliver our full source code and documentation to the client at the end of the semester.Probable Technical RequirementsWe have investigated the more technical parts of the project (associating a web page with an IP address and then clustering the web pages) and have found a combination of software tools that we think should work. One possible approach is detailed in the appendices; here we simply comment on some of the aspects of that plan that may cause issues with the feasibility of the project:Due to our use of UNIX-dependent commands and third party software, we will require that our program be implemented only on UNIX-based systems. In addition, any system on which the program is run will need to have enough space to store all extracted web pages, along with a word frequency matrix, and it will need to have enough free memory to support clustering of all columns of this matrix. Since our software is likely to be run on log files containing millions of entries, we expect that the software may require either hours of operation time or a system more powerful than a standard PC.RisksThe primary risk of this project is that, due to its experimental nature, it may produce results that lack any real value to the client. The client has stated that this is a risk he is prepared to accept. We will create software that will analyze the log data and yield clusters of the web pages identified by this data; we make no guarantee that these clusters will have any meaningful semantic cohesion. To mitigate this risk, we intend to make certain that the software is developed in a modular and iterative fashion. Particularly, we will ensure that the clustering module accepts input data in a well-specified format, and that the visualization software does the same. This will ensure that, if the clustering software turns out to be not as useful as the client would like, the process of substituting in an alternative will be as simple and painless as possible.Another risk comes from the fact that we intend to use third party tools to perform the actual clustering operations; we may be using tools that are not optimally efficient or effective, and may have hidden flaws. In order to minimize this risk, we intend to seek out expert advice on what software to use. The modular design of the overall project should also mitigate this risk, since the clustering module may be swapped out at any time with relatively little effort.As mentioned in technical requirements, the client may find that properly processing the data requires too much time and/or computer resources. In this situation, they must be prepared to either reduce the size of the data set or allow a longer period of time for the process to complete. Two aspects of our plan will help the client deal with this. We will allow the client to customize the initial process of filtering out IP addresses, which should allow him to greatly reduce the amount of data that later parts of the package will have to deal with. In addition, the modular design should allow for interruptions, making it easier to schedule the project to run at times of low system usage.Business IssuesThere are a few legal matters that we wish to address prior to our commencement of work on this project. First, we expect to make use of software packages that are available under the General Public License (GPL, see /copyleft/gpl.html). Because of this, we are required to make any software we may produce which “contains or is derived from” the GPL code also licensed under the GPL. So as to make the licensing as simple as possible, we propose to simply release the entire package under the GPL (including code, documentation, and any other supporting materials). This will allow the client full use of our products, as well as preserve our ability to reuse or revisit our code in the future for other purposes.Because of the nature of the project, an obvious concern is for the privacy of the users of the LII web site. We will take all necessary steps to make certain that our methods of data collection and retention are commensurate with current levels of protection offered by the LII. In order to do this, we will rely on the client’s advice; we will keep him abreast of the methods we plan to use, and we trust that we will be informed when he feels that anyof our methods might be troublesome. In the absence of such advice, we will assume that our proposals are acceptable and will not violate any guarantees of privacy to the users of the LII.In ConclusionAfter a preliminary investigation of potential tools for conducting the various phases of this project, we are confident that we can obtain web pages associated with a reasonable proportion of the visitors to LII’s web site, that we can arrange those web pages into clusters, and that we can provide the client with tools for viewing those clusters. We are not confident, however, that the clusters we will find will be meaningful; the only way to answer that question is to complete the project. However, on the understanding that a negative answer to this question would be considered a satisfactory accomplishment, we propose to proceed with this project.AppendicesProcess to be FollowedFor this project, we plan to complete development in three cycles of iterative refinement, corresponding to our three project presentations. Each cycle will begin with an evaluation of our understanding of the project requirements, after which we will revise our design plan, implement any necessary changes to the software package, and discuss these changes with the client at our weekly meetings. Our final software package will be submitted to the client at the completion of the third iterative refinement cycle.We chose an iterative refinement approach because of the experimental nature of the project. We will need a working version as soon as possible so that we can determine whether or not we need to look for a better clustering algorithm or concern ourselves more with the resources consumed by the project. We also have the benefit of writing our software for a single individual, and the iterative refinement strategy will make it particularly easy to make sure that all components of the software are consistent with the client’s reasonable requirements and expectations.To get the fullest benefit from the iterative process, we plan to develop all program modules (web page extraction, clustering, visualization, etc.) simultaneously; that way we can gain feedback regarding each component of the system in each refinement cycle. To make this possible, we will have to begin by defining each module’s in put and output data structures so the modules can later be integrated. We will also concentrate on giving each module its core functionality in the first iteration, saving extra features and refinements for later iterations.Visibility PlanWe plan to have weekly meetings with the client to report progress and discuss possible refinements on the requirements. We will also hold separate weekly meetings for the team to discuss progress of each project component. Extra meetings will be scheduled when necessary. We will use e-mail as a secondary form of communication for smaller issues. We will use GForge to share any work on the source code and documentation, as well as to store binaries we will need and to report progress and bugs.A Possible SystemOur software package will consist of several sequential and modular components that will cumulatively convert a log file of access information into a coherently-displayed set of website clusters. Here, we provide an outline of the expected phases of data processing, along with our current plan for a feasible technical design for each phase.Phase #1: IP Address Filtering / LookupThe first module of our application will take as input an access log file, which it will parse to create a list of IP addresses of people who have accessed the LII. After we have constructed an initial list of IP addresses, we will remove duplicates from the list and then convert each remaining IP address into a domain name using reverse DNS lookup (via the UNIX “host” command) or WHOIS lookup.Phase #2: Web Page Filtering / ExtractionThe goal of this phase is to convert a list of domain names into a list of web pages. The first step will be to eliminate some of the domain names from the list. For example, we will remove domain names that provide little information, such as domain names belonging to common Internet service providers or search engines. Depending on the overall speed of this process, we may need to remove all subdomains from each entry in order to bypass extraneous information and determine the organization associated with each IP address (for example, “” would be shortened to “”). Finally, we will download the root web page associated with each domain on the list using the “wget” UNIX command.This will probably be one of the most customizable phases, depending on how much time we have after programming core capability. At a minimum, we will allow the user to provide a list of domain names that should not be considered. We may also allow the user to determine what level of subdomains to include. Finally, instead of simply taking the root web page associated with a domain, we may have the program hunt for the most significant web page.Phase #3: Formation of Word Frequency MatrixIn this phase, we will parse the web page documents extracted in the previous phase, in order to form a matrix describing the number of times each word appears in each document. We have found a tool known as “MC”, which claims to create a sparse representation of a word-frequency matrix from a set of documents, but we have not been able to compile this code. We are considering several options for this data-processing stage, including modifying the existing MC code, searching for another application with this functionality, or coding such an application ourselves using a hash table to keep track of word frequencies as documents are parsed.The first three phases of our algorithm, as described above, consist primarily of operations performed on one data unit (IP address or web page) at a time. Thus, we are considering a multi-threading implementation that would increase overall efficiency by allowing multiple data units to be processed simultaneously for parts of these early phases.Phase #4: ClusteringIn this data-processing step, we pass the word-frequency matrix on to a clustering algorithm, w hich will group the columns of the matrix (“document vectors” that correspond to the web pages being processed) into sets of similar vectors. We have identified a tool known as “spkmeans” that takes a sparse matrix of document vectors anduses an optimization algorithm to group the document vectors into a user-specified number of clusters. The spkmeans tool compiles cleanly and produces easily-interpreted output associating each cluster with a list of web pages and a list of words that appear frequently in those pages. We plan to use spkmeans for a first clustering implementation, but are also investigating a similar tool known as “h-spkmeans”, which can be used to place documents in a tree structure of nested clusters and thus would be more suitable for our visualization goals, as described below. We also plan to look into clustering implementations based around latent semantic indexing (“LSI”), which would likely produce more meaningful clusters than spkmeans but would run less efficiently.Phase #5: VisualizationIn this step we will allow the user to search through the list of clusters produced in the previous step, and we will allow him to record comments about the significance of the clusters (or the lack of significance). We will also try to provide tools to help him find that significance. One of those tools will be the ability to “zoom” in or out on the cluster map by adjusting the number of clusters into which the web pages are grouped (or by looking at subclusters of an initial set of clusters, depending on the type of algorithm used). Another may be the ability to view a set of typical web pages and possibly typical words from each cluster. Typical web pages could be determined by comparing each document vector in the cluster against the centroid of these vectors, and a set of typical words in each cluster could be produced by the spkmeans tool described above. One possible choice of tools for our cluster visualization would be to use Java components embedded into HTML in order to allow for easy web page viewing.Outline Plan。
2023 年第 9 卷第 1 期Vol.9, No.1, 2023中西医结合护理Chinese Journal of Integrative Nursing小儿高热惊厥研究进展朱雪姝1, 刘玉平2, 陈萍萍3, 胡莫愁1(1. 湖州师范学院护理学院, 浙江 湖州, 313000;2. 徐州医科大学附属医院 护理部, 江苏 徐州, 221000;3. 浙江省湖州市第一人民医院 肾内科, 浙江 湖州, 313000)摘要: 高热惊厥(FC )是小儿时期最常见的惊厥性疾病,影响患儿及家属的身心健康。
本研究结合近年来国内外相关文献,从临床特征、相关因素、预后及发热管理、抗惊厥管理、父母干预管理等方面进行综述,旨在为FC 的临床管理和后续研究提供参考依据。
关键词: 高热惊厥; 感染; 发热; 癫痫; 健康宣教; 心理干预中图分类号: R 473.72 文献标志码: A 文章编号: 2709-1961(2023)01-0167-04Research progress of febrile convulsions in childrenZHU Xueshu 1,LIU Yuping 2,CHEN Pinging 3,HU Mochou 1(1. School of Nursing Huzhou University , Huzhou , Zhejiang , 313000;2. Department of Nursing , The Affiliated Hospital of Xuzhou Medical University , Xuzhou , Jiangsu , 221000;3. Department of Nephrology , The First People ’ s Hospital of Huzhou , Huzhou , Zhejiang , 313000)ABSTRACT : T he febrile convulsions is a common type of Convulsive disorders in children ,affecting children and their parents physical and psychological health. This paper reviewed the studies about febrile convulsions in children in perspectives of clinical features , influencing fac⁃tors , prognosis and fever management , anticonvulsive management and parental interventions , and provided reference for the clinical management and further studies on febrile convulsions.KEY WORDS : febrile convulsions ; infection ; fever ; epilepsy ; health education ; psychological intervention高热惊厥即热性惊厥(FC )是指排除颅内感染和其他导致惊厥的器质性或代谢性异常后,致使体温高于38.5 ℃,继而导致全身强直性抽搐或局部阵挛性抽搐,并伴有意识障碍。
2024年06月大学英语四级考试真题(第1套)Part I Writing (30 minutes) Directions: Suppose your university is seeking students’ opinions on whether university libraries should be open to the public. You are now to write an essay to express your view. You will have 30 minutes for the task. You should write at least 120 words but no more than 180 words.PartⅡListening Comprehension (25 minutes) Section ADirections: In this section, you will hear three news reports. At the end of each news report, you will hear two or three questions. Both the news report and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A), B), C) and D).Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Questions 1 and 2 are based on the news report you have just heard.1. A) Due to a fire alarm in their apartments.B) Because of the smoke and heat damage.C) Due to the water used to extinguish the flames.D) Because of the collapse of the three-story building.2. A) Investigating the cause of the incident.B) Helping search for the suspect of the crime.C) Rescuing the businessmen trapped in the building.D) Checking town records for the property developer.Questions 3 and 4 are based on the news report you have just heard.3. A) It plays a less important role in one’s health than nutrient intake.B) It impacts people’s health to a lesser degree than sun exposure.C) It is associated with people’s mental health conditions.D) It is linked with older adults’ sympt oms of depression.4. A) It was indefinite. C) It was straightforward.B) It was systematic. D) It was insignificant.Questions 5 to 7 are based on the news report you have just heard.5. A) It has helped solve several murder cases.B) It has become a star police dog in Beijing.C) It has surpassed its mother in performance.D) It has done better than naturally born dogs.6. A) To speed up investigation into criminal cases. C) To cut down training expenses.B) To test the feasibility of cloning technology. D) To reduce their training time.7. A) Cloning is too complicated a process. C) Cloning is ethically controversial.B) The technology is yet to be accepted. D) The technology is too expensive.Section BDirections: In this section, you will hear two long conversations. At the end of each conversation, you will hear four questions. Both the conversation and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A),B),C)and D). Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Questions 8 to 11 are based on the conversation you have just heard.8. A) He read it somewhere online. C) He read an article reviewing it.B) He heard about it from a coworker. D) He watched a TV series based on it.9. A) His publications. C) His address.B) His first book. D) His name.10. A) Collect a lot more data. C) Clarify many new concepts.B) Relax a bit less often. D) Read more reference books.11. A) Find out the show’s most interesting episodes. C) Get an e-copy of the book to read.B) Watch the series together with the woman. D) Check to see when the show starts.Questions 12 to 15 are based on the conversation you have just heard.12. A) To check the prices of his farm produce.B) To ask the way to the Newcastle City Hall.C) To inquire about the vegetarian food festival.D) To seek the man’s help with her work on the farm.13. A) Bakers. C) Vegetarians.B) Vendors. D) Organisers.14. A) The issuing of certificates to vendors. C) The festival they are organising.B) The completion of the baking task. D) The deadline for application.15. A) The closing date of submission. C) The details of the ceremony.B) The website of his company. D) The organiser’s address.Section CDirections:In this section, you will hear three passages. At the end of each passage, you will hear three or four questions. Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked A), B), C) and D). Then mark the corresponding letter on Answer Sheet 1 with a single line through the centre.Questions 16 to 18 are based on the passage you have just heard.16. A) Most scenic sites have been closed. C) Health experts advise going outdoors.B) Access to official campsites is limited. D) People have more time during the summer.17. A) It is strongly opposed by nearby residents. C) It has caused environmental concerns.B) It leads to much waste of public money. D) It has created conflicts among campers.18. A) Look for open land in Scotland. C) Avoid getting close to wilderness.B) Leave no trace of their camping. D) Ask for permission from authorities. Questions 19 to 21 are based on the passage you have just heard.19. A) They outcompete mythical creatures. C) They truly exist in the Amazon region.B) They usually mind their own business. D) They resemble alarmingly large snakes.20. A) Scar tissue from dolphins’ fighting. C) Unhealed wounds from snake bites.B) Skin infection from water pollution. D) Swimming along in seasonal floods.21. A) It has been shrinking at an astonishing pace.B) It has been placed under international protection.C) It has been appealing to both freshwater and sea dolphins.D) It has been abandoned as a battleground for male dolphins.Questions 22 to 25 are based on the passage you have just heard.22. A) About 58% of young adults call parental support the new normal.B) Most adult children enjoy increasing sources of financial support.C) A full 70% of the young adults cannot afford to buy a car by themselves.D) Most early adults cannot sustain their lifestyles without parental support.23. A) It renders them dependent. C) It makes them mentally immature.B) It causes them to lose dignity. D) It hinders them from getting ahead.24. A) It challenges one’s willpower. C) It calls for due assistance.B) It results from education. D) It defines adulthood.25. A) Current lifestyles. C) College loans.B) Poor budgeting. D) Emergency expenses.Part III Reading Comprehension (40 minutes) Section ADirections: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please mark the corresponding letter for each item on Answer Sheet 2 with a single line through the centre. You may not use any of the words in the bank more than once.It’s well known that physical exercise is beneficial not just to physical health but also to mental health. Yet whereas most countries have 26 , evidence-backed guidelines on the type and intensity of exercise 27 for various physical health benefits, such guidelines do not yet exist for exercise and mood.This is 28 due to a lack of necessary evidence. However, a new systematic review brings us usefully up-to-date on the current findings in this area.Before 29 into some of the key take-aways, an important 30 made in the review is between aerobic exercise and anaerobic. The former 31 such things as walking, jogging and cycling and means exercising in such a way that your body is able to use oxygen to burn fat for energy. In contrast, anaerobic exercise—such as lifting heavy weights—is of such 32 intensity that your body does not have time to use oxygen to create energy and so instead it breaks down glucose (葡萄糖) in your blood or muscles.Beginning first with the influence of exercise intensity on the mood benefits of aerobic exercise, the researchers, led by John Chan at Shenzhen University, found 33 results from19 relevant studies. Some favoured higher intensity, others low, while seven studies found that intensity made no 34 to mood benefits.In relation to the intensity of anaerobic exercise, however, the results were far clearer—the optimum (最佳选择) for improving mood is 35 intensity, perhaps because low intensity is too dull while high intensity is too unpleasant.Section BDirections:In this section, you are going to read a passage with ten statements attached to it. Each statement contains information given in one of the paragraphs. Identify the paragraph from which the information is derived. You may choose a paragraph more than once. Each paragraph is marked with a letter. Answer the questions by marking the corresponding letter on Answer Sheet 2.Why Do Americans Work So Much?A)How will we all keep busy when we only have to work 15 hours a week? That was thequestion that worried the British economist John Maynard Keynes when he wrote his short essay “Economic Possibilities for Our Grandchildren” in 1930. Over the next century, h e predicted, the economy would become so productive that people would barely need to work at all. For a while, it looked like Keynes was right. In 1930 the average working week was47 hours in the United States. But by 1970, the number of hours Americans worked onaverage had fallen to slightly less than 39.B)But then something changed. Instead of continuing to decline, the duration of the workingweek remained stable. It has stayed at just below 40 hours for nearly five decades. So what happened? Why are people working just as much today as in 1970?C)There would be no mystery in this if Keynes had been wrong about the power of technologyto increase the economy’s productivity, which he thought would lead to a standard of living “between four and eight times as high as it is today.” But Keynes got that right: Technology has made the economy massively more productive. According to Benjamin M. Friedman, an economist at Harvard, the U.S. economy is right on track to reach Keynes’s eight-fold (八倍) multiple by 2029. That is a century after the last data Keynes would have had access to.D)In a new paper, Friedman tries to figure out why that increased productivity has nottranslated into increased leisure time. Perhaps people just never feel materially satisfied, always wanting more money to buy the next new thing. This is a theory that appeals tomany economists. “This argument is, at best, far from sufficient,” he writes. If that were the case, why did the duration of the working week decline in the first place?E)Another theory Friedman considers is that, in an era of ever fewer settings that provideeffective opportunities for personal connections and relationships, people may place more value on the socializing that happens at work. There is support for this theory. Many people today consider colleagues as friends. But Friedman argues that the evidence for this theory is far from conclusive. Many workers report that they would like to spend more time with family, rather than at work. Furthermore, this theory cannot explain the change in trend in the U.S. working week in the 1970s.F) A third possibility proves more convincing for Friedman. That is: American inequalitymeans that the gains of increasing productivity are not widely shared by everyone. In other words, most Americans are too poor to work less. Unlike the other two explanations Friedman considers, this one fits chronologically (按年代). Inequality declined in America during the period following World War II, along with the duration of the working week.But since the early 1970s it has risen dramatically.G)Keynes’s prediction of a shorter working week rests on the idea that the standard of livingwould continue rising for everyone. But Friedman says that this is not what has happened.Although Keynes’s eight-fold figure holds up for the economy as a whole, it is not at all the case for the median (中位数的) American worker. For them, output by 2029 is likely to be around 3.5 times what it was when Keynes was writing. This is a bit below his four- to eight-fold predicted range.H)This can be seen in the median worker’s income over this time period, complete with a shiftin 1973 that fits in precisely with when the working week stopped shrinking. According to Friedman, between 1947 and 1973 the average hourly wage for normal workers (those who were not in management roles) in private industries other than agriculture nearly doubled in terms of what their money could buy. But by 2013 the average hourly wage for ordinary workers had fallen 5 percent from the 1973 level in terms of actual purchasing power. Thus, though American incomes may have gone up since 1973, the amount that American workers can actually buy with their money has gone down. For most Americans, then, the magic of increasing productivity stopped working around 1973. Thus, they had to keep working just as much in order to maintain their standard of living.I)What Keynes predicted was a very optimistic version of what economists call technologicalunemployment. This is the idea that less labor will be necessary because machines can do so much. In Keynes’s vision, the resulting unemployment would be distributed more or less evenly across society in the form of increased leisure. But Friedman says that, for Americans, reality is much darker. Americans now have a labor market in which millions of people—those with fewer skills and less education—are seeking whatever poorly paid work they can get. This is confirmed by a recent poll that found that, for half of hourly workers, their top concern is not that they work too much but that they work too little. This is most likely not because they like their jobs so much. Rather, we can assume it is because they need the money.J)This explanation leaves an important question. If the very rich—the workers who have reaped above-average gains from the increased productivity since Keynes’s time—can afford to work less, why do they continue to work so much? (Indeed, research has shownthat the highest earners in America tend to work the most.) Friedman believes that for many top earners, work is a labor of love. They are doing work they care about and are interested in, and doing more of it is not necessarily a burden. For them, it may even be a pleasure.These top earners derive meaning from their jobs and work is an important part of how they think of themselves. And, of course, they are compensated for it at a level that makes it worth their while.K)Friedman concludes that the prosperity(繁荣) Keynes predicted is here. After all, the economy as a whole has grown even more brilliantly than he expected. But for most Americans, that prosperity is nowhere to be seen. And, as a result, neither are those shorter working weeks.36. Some people view socializing at the workplace as a chance to develop personal relationships.37. As ordinary American workers’ average hourly pay had decreased despite increasing productivity, they had to work just as many hours as before to keep their living standards.38. American workers’ average weekly working time has not changed for nearly half a century.39. Friedman believes inequality in the U.S. largely explains why increasing productivity has not resulted in reduced working hours.40. Man y economists assume people’s thirst for material things has prevented them from enjoying more leisure time.41. An economist’s prediction about a shorter average working week seemed to be correct fora time in the 20th century.42. In the U.S. labor market, the primary concern of people with less schooling and fewer skills is to secure any employment even if it is low-paid.43. Keynes was right in predicting that technology would make the economy much more productive.44. Many of the highest earners have a keen interest in and love for what they are doing.45. According to Keynes, there would be a shorter working week with everyone’s standard of living continuing to rise.Section CDirections:There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C) and D). You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the centre.Passage OneQuestions 46 to 50 are based on the following passage.Lao Zi once said, “Care about what other people think and you will always be their prisoner.”People-pleasing, or seeking self-worth through oth ers’ approval, is unproductive and an exhausting way to go through life. Why do we allow what others think of us to have so much power over how we feel about ourselves? If it’s true that you can’t please all people all of the time, wouldn’t it make sense t o stop trying?Unfortunately, sense often isn’t driving our behavior. For social beings who desire love and belonging, wanting to be liked, and caring about the effect we have on others, is healthy and allows us to make connections. However, where we get into trouble is when our self-worth is dependent upon whether we win someone’s approval or not.This need to be liked can be traced back to when we were children and were completely dependent on others to take care of us: Small children are not just learning how to walk and communicate, they are also trying to learn how the world works. We learn about who we are and what is expected of us based on interactions with others, so, to a four-year-old, if Mommy or Daddy doesn’t like him or her, there is the danger that they will abandon them. We need to understand that when we desperately want someone to approve of us, it’s being driven by that little kid part of us that is still terrified of abandonment.As you become more capable of providing yourself with the approval you seek, your need for external validation will start to vanish, leaving you stronger, more confident, and yes, happier in your life. Imagine how much time we lose each moment we restrain our authentic selves in an effort to be liked.If we base our worth on the opinions of others, we cheat ourselves of the power to shape our experiences and embrace life not only for others but also for ourselves, because ultimately, there is no difference. So embrace the cliché (老话) and lo ve yourself as it’s highly doubtful that you’ll regret it.46. What can we conclude from Lao Zi’s quotation?A) We should see through other people’s attempt to make a prisoner of us.B) We can never really please other people even if we try as hard as we can.C) We can never be truly free if taking to heart others’ opinion of us.D) We should care about other people’s view as much as they care about our own.47. What will happen if we base our self-worth on other people’s approval?A) Our desire to be loved will be fulfilled.B) Our life will be unfruitful and exhausting.C) Our identity as social beings will be affected.D) Our sense of self will be sharpened and enhanced.48. What may account for our need to be liked or approved of?A) Our desperate longing for interactions with others.B) Our understanding of the workings of the world.C) Our knowledge about the pain of abandonment.D) Our early childhood fear of being deserted.49. What can we do when we become better able to provide ourselves with the desired approval?A) Enjoy a happier life. C) Receive more external validation.B) Exercise self-restraint. D) Strengthen our power of imagination.50. What does the author advise us to do in the last paragraph?A) Embrace life for ourselves and for others. C) See our experiences as assets.B) Base our worth on others’ opinions. D) Love ourselves as we are.Passage TwoQuestions 51 to 55 are based on the following passage.Some people have said aging is more a slide into forgetfulness than a journey towards wisdom. However, a growing body of research suggests that late-in-life learning is possible. In reality, education does an aging brain good.Throughout life, people’s bra ins constantly renovate themselves. In the late 1960s, British brain scientist Geoffrey Raisman spied growth in damaged brain regions of rats through an electron microscope; their brains were forging new connections. This meant brains may change every time a person learns something new.Of course, that doesn’t mean the brain isn’t affected by the effects of time. Just as height usually declines over the years, so does brain volume: Humans lose about 4 percent every decade starting in their 40s. But that re duction doesn’t necessarily make people think slower; as long as we are alive and functioning, we can alter our brains with new information and experiences.In fact, scientists now suspect accumulating novel experiences, facts, and skills can keep people’s minds more flexible. New pathways can strengthen our ever-changing mental structure, even as the brain shrinks.Conventional fixes like word puzzles and brain-training apps can contribute to mental durability. Even something as simple as taking a different route to the grocery store or going somewhere new on vacation can keep the brain healthy.A desire for new life challenges can further boost brainpower. Research about aging adults who take on new enterprises shows improved function and memory as well as a reduced risk of mental disease. Openness—a characteristic defined by curiosity and a desire for knowledge—may also help folks pass brain tests. Some folks are born with this take-in-the-world attitude, but those who aren’t as genetically gifted aren’t necessarily out of luck. While genes can encourage an interest in doing new things, a 2012 study in the journal Psychology and Aging found completing reasoning tasks like puzzles and number games can enhance that desire for novel experiences, which can, in turn, refresh the brain. That’s why brain scientist Richard Kennedy says “It’s not that old dogs can’t learn new tricks. It’s that maybe old dogs don’t realize why they should. ”51. What do some people think of aging adults?A) Their wisdom grows as time goes by. C) They can benefit from late-in-life learning.B) Their memory gradually deteriorates. D) They are likely to have mental health issues.52. What can we conclude from Geoffrey Raisman’s finding?A) Brain damage seriously hinders one’s learning.B) Brain power weakens slower than we imagine.C) Brains can refresh and improve with learning.D) Brains forge connections under new conditions.53. What is one thing that helps maintain the health of our brain even as it shrinks?A) Doing daily routines by conventional means.B) Avoiding worrying about our mental durability.C) Imitating old dogs’ way of learning new tricks.D) Approaching everyday tasks in novel ways.54. What does the author say can contribute to the improvement of brain function?A) Being curious and desiring knowledge.B) Being eager to pass brain tests at an old age.C) Rising to life’s challenges and avoiding risks.D) Boosting immunity to serious mental diseases.55. What is the finding of the 2012 study in the journal Psychology and Aging?A) Wishing to solve puzzles enhances one’s reasoning power.B) Playing number games unexpectedly stimulates one’s memory.C) Desiring new experiences can help to renovate the brain.D) Learning new tricks should not be confined to old dogs only.Part ⅣTranslation (30 minutes) Directions: For this part, you are allowed 30 minutes to translate a passage from Chinese into English. You should write your answer on Answer Sheet 2.四合院(siheyuan)是中国一种传统的住宅建筑,其特点是房屋建造在一个院子的四周,将院子合围在中间。
Test for Unit 3Part I Listening Comprehension (30%)Section ADirections:In this section, you will hear two long conversations. After each question you must choose the best answer from the four choices marked A, B, C and D.Long Conversation 11.What does Tim think of his new job?A. It's going terribly.B. It's going pretty well.C. It's too challenging.D. It's quite boring.2.Which of the following options does not describe his new boss?A. He is unmotivated.B. He is firm and persistentC. He is energetic.D. He understands how to foster a competitive drive among the team members.3.Why does Tim prefer his new boss over his former boss?A. His former boss was always listening to her team members.B. His new boss is more lenient and easy-going.C. His new boss recognizes the skills of team members.D. His new boss is always absent.4.How does Tim feel about his new co-workers?A. They are all difficult to work with.B. They are all quite easy-going.C. They are constantly competing with each other.D. They ignore Tim's presence.5.What does Tim appreciate about working with people from different departments?A. It helps him avoid conflicts.B. It allows him to work independently.C. It helps him appreciate different opinions, especially during conflicts of ideas.D. It makes his work easier and less challenging.Long Conversation 26.What kind of person does the woman want for a flatmate?A. Very considerate and caring.B. Somewhat reserved and quiet.C. Pretty easy-going and straightforward.D. Sociable but also aware of personal space.7. What answer does the woman want to hear when she asks a potential flatmate if they are a tidy person?A. “I’m not very concerned about cleanliness.”B. “Sometimes I clean, and sometimes I don't.”C. “Oh yes, extremely!”D. “I prefer a messy environment.”8. What do we know about the woman's attitude to cleanliness?A .She cares a lot about being neat and tidy.B. She doesn't care whether her flatmate is tidy or not.C. She hopes her flatmate will offer to clean up their room.D. She thinks she should share the cleaning with her flatmate.9. Why does the woman think money is a problem when looking for a flatmate?A. She cannot afford to live alone.B. Her previous flatmate often delayed payments.C. She needs the rent to be paid as soon as possible.D. She thinks reaching a deal regarding rent is difficult.10. What will the woman do to make sure her flatmate can afford the rent?A .Ask them about their work.B. Ask them how much they earn.C. Ask them to pay the rent each month on time.D. Ask them whether they can pay three months' rent in advance.Section BDirections: In this section, you will hear two passages. After each question you must choose the best answer from the four choices marked A, B, C and D.Passage 111. According to the speaker, a/an _________ team would win in a playoff.A. dependentB. pickupC. formal and well-practicedD. pickup and well-practiced12. The speaker studies team because _________.A. many of us have to work todayB. many of us have fast-paced operationsC. many of us shifted crazilyD. many of us have to work with different people13. According to the speaker, to have a stable team is _________ in our daily lives.A. increasingB. not easyC. optionalD. not impossible14. The hospital is a place where _________.A. she has done a research about medicineB. it opens 24 hours for 7 days each monthC. the patients are all differentD. doctors work in complicated ways15. If caregivers cooperate with each other, the result will be that _________.A. they offer patients great careB. they work with 60 or so different peopleC. they have their different study backgroundsD. they live a tragic lifePassage 216.How can we build trust and understanding with our neighbors?A. By visiting them frequently.B. By getting to know each other.C. By organizing parties together.D. By taking family vacations together.17.What should we do if we are likely to cause problems for our neighbors?A. Address problems appropriately when they occur.B. Apologize to our neighbors when problems occur.C. Take action beforehand to avoid potential problems.D Immediately cease activities that may cause problems.18.How should we react if our neighbors are bothering us?A.We should involve the police for help.B.We should wait patiently for their explanations.C. We should express our concerns and discuss solutions together.D. We should involve more family members to address the problem.19.What is the ultimate goal when resolving disputes with neighbors?A. To win the argument.B. To avoid any future communication.C. To live in harmony with them.D. To punish the neighbor causing problems.20.What is the main topic of the passage?A. The importance of family vacations.B. How to handle disputes with neighbors.C. The benefits of borrowing sugar.D. Why property damage occurs. Section CDirections: In this section, you will hear two news reports. After each question you must choose the best answer from the four choices marked A, B, C and D.News 121.Why did the six residents have to find another place to stay?A. Due to a fire alarm in their apartments.B. Because of the smoke and heat damage.C. Due to the water used to extinguish the flames.D. Because of the collapse of the three-story building.22. What does the news report say the NorwalkFire Marshal is doing?A. Investigating the cause of the incident.B. Helping search for the suspect of the crime.C. Rescuing the businessmen trapped in the building.D. Checking town records for the property developer.News 223.What do the researchers’ tests show about the cloned dog?A. It has helped solve several murder cases.B. It has become a star police dog in Beijing.C. It has surpassed its mother in performance.D. It has done better than naturally born dogs.24. What is the scientists’ purpose in cloning police dogs?A. To speed up investigation into criminal cases.B. To test the feasibility of cloning technology.C. To cut down training expenses.D. To reduce their training time.25. Why does the news report say the scientists’ goal is not yet possible?A. Cloning is too complicated a process.B. The technology is yet to be accepted.C. Cloning is ethically controversial.D. The technology is too expensive.Part II Banked Cloze (10* 1=10%)Section ADirections: Fill in each of the blanks in the following sentences with a word or phrase from the box.1. All the reports from the scene of crime______ by the police.2. The government has done a lot to ________ interest rate at a high level and this has been proved to be right.3. Mike is considered as a very aggressive and competitive ________by the staff.4. The ________ of this project was the recovery of the polluted area within three months.5. It’s a great film and it ________ an American actor who is going to be a world star soon.Section BDirections: Fill in the blanks by selecting suitable words from the word bank. You may not use any of the words more than once.The benefits of travel go beyond making memories and meeting new people. Staying away from the 6__________ things of daily life and exploring a new place can have a remarkably positive impact on your emotional well-being and your 7__________ powers.Travel can improve your emotional well-being in two aspects. First, changing your daily routine, for example, taking a trip to a nearby town on a weekend day, can help 8__________ your mind and deal with the daily 9__________ . Second, physical exercise is known to improve emotional well-being and travel offers plenty of opportunities to get active. Getting to know a new destination by 10_______ the great outdoors can boost energy levels and improve your mood.Part III. Reading Comprehension (25%)Directions: Read the following passages and choose the corresponding answer.Passage 1Some people have said aging is more a slide into forgetfulness than a journey towards wisdom. However, a growing body of research suggests that late-in-life learning is possible. In reality, education does an aging brain good.Throughout life, people's brains constantly renovate themselves. In the late 1960s, British brain scientist Geoffrey Raisman spied growth in damaged brain regions of rats through an electron microscope; their brains were forging new connections. This meant brains may change every time aperson learns something new.Of course, that doesn't mean the brain isn't affected by the effects of time. Just as height usually declines over the years, so does brain volume: Humans lose about 4 percent every decade starting in their 40s. But that reduction doesn't necessarily make people think slower; as long as we are alive and functioning, we can alter our brains with new information and experiences.In fact, scientists now suspect accumulating novel experiences, facts, and skills can keep people's minds more flexible. New pathways can strengthen our ever-changing mental structure, even as the brain shrinks.Conventional fixes like word puzzles and brain-training apps can contribute to mental durability. Even something as simple as taking a different route to the grocery store or going somewhere new on vacation can keep the brain healthy.A desire for new life challenges can further boost brainpower. Research about aging adults who take on new enterprises shows improved function and memory as well as a reduced risk of mental disease. Openness-a characteristic defined by curiosity and a desire for knowledge-may also help folks pass brain tests. Some folks are born with this take-in-the-world attitude, but those who aren't as genetically gifted aren't necessarily out of luck. While genes can encourage an interest in doing new things, a 2012 study in the journal Psychology and Aging found completing reasoning tasks like puzzles and number games can enhance that desire for novel experiences, which can, in turn, refresh the brain. That's why brain scientist Richard Kennedy says “It's not that old dogs can't learn new tricks. It's that maybe old dogs don't realize why they should.”1. What do some people think of aging adults?A. Their wisdom grows as time goes by.B. Their memory gradually deteriorates.C. They can benefit from late-in-life learning.D. They are likely to have mental health issues.2. What can we conclude from Geoffrey Raisman's finding?A. Brain damage seriously hinders one's learning.B. Brain power weakens slower than we imagine.C. Brains can refresh and improve with learning.D. Brains forge connections under new conditions.3. What is one thing that helps maintain the health of our brain even as it shrinks?A. Doing daily routines by conventional means.B. Avoiding worrying about our mental durability.C. Imitating old dogs' way of learning new tricks.D. Approaching everyday tasks in novel ways.4. What does the author say can contribute to the improvement of brain function?A. Being curious and desiring knowledge.B. Being eager to pass brain tests at an old age.C. Rising to life's challenges and avoiding risks.D. Boosting immunity to serious mental diseases.5. What is the finding of the 2012 study in the journal Psychology and Aging?A. Wishing to solve puzzles enhances one's reasoning power.B. Playing number games unexpectedly stimulates one's memory.C. Desiring new experiences can help to renovate the brain.D. Learning new tricks should not be confined to old dogs only.Passage 2Virtual reality technology has recently taken the world by storm, with VR headsets becoming a widely welcomed consumer product. While home adoption has largely been driven by the gaming industry, those within other fields, including the travel industry, are increasingly realizing and exploring the technology's potential, especially as a marketing tool.Businesses operating within the travel industry have been especially quick to adopt virtual reality technology and for good reason. Typically, their customers are looking to purchase experiences, rather than products, and virtual reality offers an effective way for marketers to give them a taste of what they can expect.Travel customers usually require lots of information before they book a hotel room. For instance, they need to read descriptions, view images, watch videos, look at customer reviews, or seek opinions on social media. However, this process can be shortened significantly through the intelligent use of virtual reality. One of the best examples of virtual reality in action within the travel industry is using it to provide virtual tours of hotels and hotel rooms. The key benefit is that it allows potential customers to experience what the hotel looks like before they arrive, offering more transparency than words and images.Virtual reality is also offering hotels, travel agents, and other businesses within the tourism industry the opportunity to provide prospective customers with a virtual travel experience. This means that users will be able to sample some of the main attractions that are likely to draw them to a location in the first place. For instance, a hotel in Paris may provide a virtual experience of what it is like at the top of the Eiffel Tower. Similarly, a hotel near a theme park may be able to provide a virtual roller-coaster experience. The primary benefit of this is to sell rooms, flights, and travel products more effectively by focusing on the experiences they can provide.Some companies have taken a step further, using VR to enhance the entire booking process. This innovation allows travelers to visit a destination, search for flights, walk through a plane to select their seats, check out different hotels, and pay for their entire trip –all within a VR environment. These advancements in VR technology offer a more immersive and interactive experience compared to traditional methods.While many exciting developments are happening in virtual reality and the travel and tourism industry, it's essential to approach this technology with a critical eye and use it responsibly. By doing so, we can create a world in which travel is more accessible, more sustainable, and more enriching for all.6. How has virtual reality technology impacted the travel industry?A. It has made travel experiences more expensive.B. It has completely replaced traditional hotel booking methods.C. It has provided a new marketing tool for businesses.D. It has made travel more sustainable.7. Why have businesses in the travel industry been quick to adopt virtual reality technology?A. Because of the desire to reduce travel spending.B. Because of the customers' preference for experiences over products.C. Because of the pressure from the gaming industry.D. Because of the need for more transparency in the booking process.8. What is the primary benefit of offering a virtual travel experience?A. Reduction in the need for customer reviews.B. Replacement of the traditional computer mouse.C. Enhanced ability to sell rooms and travel products.D. Increased reliance on descriptions and videos.9. How does VR technology affect the travel booking experience according to the passage?A. It allows travelers to physically visit destinations before booking.B. It makes the booking process less imaginative and more tiresome.C. It offers a more immersive and interactive booking experience.D. It simplifies payment methods and offers suggestions for activities.10. According to the author, what is essential when approaching virtual reality in the travel industry?A. A critical eye and responsible use.B. Increasing reliance on social media.C. Quick adoption by various industries.D. Integration with traditional booking methods.Part IV. Translation(20%)Directions: Translate the following paragraphs into English.1. 丽江古城坐落在玉龙雪山(Yulong Snow Mountain)脚下,是一座风景秀丽的历史文化名城,也是我国保存完好的少数民族(ethnic minority groups)古城之一。
FEASIBILITY STUDY REPORT ON THE ESTABLISHMENT OF GCI GLOBAL SERVICE Co.,LTD.关于设立广州市杰世国际货代有限公司的可行性报告Guangdong Province,the south of China, approach the South China Sea, adjacent to Hong Kong and Macao. As the forthgoer for China’s ref orm , Guangdong occupy a favorable geographical environment and natural resources. For the moment,the industrial and production in Guangdong has become to the top ten ranking. base on the transportation, communication being coverage abroad, and the customs clearance being efficient, most of International Fair unfolding here as its famous trade board.广东省地处于中国大陆最南端,濒临南海,毗邻港澳。
作为中国大陆改革开放的先行省,广东占据了优厚的地理环境与资源。
目前,广东产业体系完善,工厂生产线已占据全国前十名列。
广东交通运输四通八达,通讯网络覆盖率广,口岸通关高效顺畅。
正因以上优势,物流、会展、金融、信息及旅游行业得以蓬勃发展,广交会、高交会等大型国际性会展驰名中外。
The Business engaged by the Investor is import and export trade of goods, transport industry,and has actively engaged trading activites with the enterprises in China During the pass years.Owing to the high development of China’s economy and the continuing “open-door” policy,our trading revenue has been increased significantly.投资方从事货物进出口贸易、货物运输行业多年,近几来年,投资方积极向中国内地企业开展直接的贸易活动。
课题申请书中的研究的基本内容怎么写When writing the basic content of a research proposal, it is essential to clearly outline the research topic and its significance. This includes providing a detailed explanation of the research problem or question that will be addressed in the study. It is important to clearly articulate why this particular topic is worth investigating and how it contributes to the existing body of knowledge. This section sets the tone for the entire proposal, and it is crucial to make a compelling argument for the importance of the research.在撰写课题申请书的基本内容时,重点是清晰地概述研究课题及其意义。
这包括详细解释研究中将要解决的问题或提出的问题。
清楚地阐明为何这个特定的课题值得研究以及如何有利于现有知识体系的贡献是非常重要的。
这一部分为整个申请书定调,重要的是要就研究的重要性提出一个令人信服的论点。
Furthermore, the basic content of a research proposal should include a literature review that demonstrates the researcher's understanding of the existing research on the topic. This section should summarize key studies relevant to the research question and highlight any gapsor inconsistencies in the literature. By reviewing previous research, the researcher can provide a solid foundation for their own study and demonstrate how their work builds upon and contributes to the existing knowledge in the field.此外,一份研究申请书的基本内容应包括文献综述,以展示研究人员对该课题现有研究的理解。
设计分析英语作文Title: The Art of Design Analysis。
In the realm of design analysis, a multifaceted approach is paramount. It involves dissecting the intricacies of various designs, scrutinizing their components, and understanding the underlying principles that govern their functionality and aesthetics. In this essay, we will delve into the methodology of design analysis and its significance in the creative process.First and foremost, design analysis entails a comprehensive examination of the design's purpose and objectives. Whether it's a product, graphic, architectural structure, or user interface, understanding its intended use and target audience is crucial. This initial step sets the stage for a focused analysis, guiding the evaluator to discern the design's effectiveness in fulfilling its intended function.Moreover, design analysis encompasses an assessment of form and aesthetics. This involves evaluating the visual elements such as shape, color, texture, and composition employed in the design. By scrutinizing these elements, one can discern the harmony, balance, and coherence of the design, as well as its ability to evoke desired emotions or responses from the audience.Furthermore, an in-depth analysis delves into the technical aspects of the design. This includes examining the materials, construction techniques, and manufacturing processes utilized. By evaluating these technical elements, one can gauge the feasibility, durability, andsustainability of the design, as well as its potential for optimization or improvement.In addition to the tangible aspects, design analysis also involves an exploration of the conceptual and theoretical underpinnings of the design. This entails investigating the cultural, historical, and philosophical influences that inform the design's concept and execution. By contextualizing the design within broader cultural andintellectual frameworks, one can gain insights into its significance and relevance in contemporary society.Moreover, design analysis often involves comparative studies, wherein multiple designs are juxtaposed and evaluated against each other. This comparative approach allows for a nuanced understanding of the strengths, weaknesses, and unique attributes of each design, facilitating informed decision-making and iterative improvement.Furthermore, design analysis is not merely a passive observation but an active engagement with the design process. It entails critical thinking, problem-solving, and creative synthesis, as analysts seek to unravel the complexities of the design and propose innovative solutions or enhancements.In conclusion, design analysis is a multifaceted endeavor that encompasses a range of disciplines, methodologies, and perspectives. From discerning thedesign's purpose and aesthetics to evaluating its technicaland conceptual dimensions, design analysis provides valuable insights that inform the creative process and drive innovation. By adopting a systematic and rigorous approach to analysis, designers and evaluators can unlock the full potential of a design, ensuring its effectiveness, relevance, and impact in the ever-evolving landscape of design and culture.。
Crime in the Movies: Investigating the Efficacy of Measures of Both Sex and Gender for Predicting Victimization and Offending in FilmAuthor(s): Sarah Eschholz and Jana BufkinSource: Sociological Forum, Vol. 16, No. 4 (Dec., 2001), pp. 655-676Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at ./page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use.Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at .Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@.Springer is collaborating with JSTOR to digitize, preserve and extend access to Sociological Forum.。
2020-2021学年上海市闵行区交大附中闵行分校高三上学期英语10月月考试卷I. Listening Comprehension(略)II. Grammar and Vocabulary (20分)Section ADirections: After reading the passage below, fill in the blanks to make the passage coherent and grammatically correct. For the blanks with a given word, fill in each blank with the proper form of the given word; for the other blanks, use one word that best fits each blank.Why is the SAT falling out of favor?The University of California’s decision this past week to stop requiring the SAT and ACT tests for admissions (21)________(renew) a debate: Are the tests that were first deployed to diversify the Ivy League (22)________ rich prep schoolers a worthwhile yardstick, or are they, (23)________ one U.S. official put it, “a cloak for privilege”?Those who argue for keeping the tests say colleges need some sort of broad yardstick (24)________ (compare) students across different school districts and states. The tests provide important information beyond assessing achievement.Critics of the tests cite decades of data (25)________(indicate)that they are inherently biased in favor of rich, white and Asian American students. They also say the tests (26)________ (game) too easily by students who can pay thousands of dollars for private coaching and test prep.Advocates/Proponents of (27)________ change say it is fairer to judge students by other measures, such as teacher recommendations. Some studies have suggested that high school grades better measure a student’s likelihood of graduation and cumulative performance in college.John A. Pérez, chairman of the California system’s board of regents, said that college officials in other states had told him privately that they would likely follow suit (28)________California moved to eliminate the test from its admissions requirements. The end of the SAT and ACT in California’s (29)________(famous) public universities will not necessarily mean the end of admissions testing there. University officials said they were studying the feasibility of developing (30)________ own replacement test — with less baggage.Notes:falling out of favor;渐渐失宠renewed a debate;重新引起争论regent;摄政者统治者董事校务委员be first deployed to;被使用regent put it;正如..所说,正如董事所说admissions;承认准入录取录用assessing achievement.; 学术成就Section B (10分)Directions: Complete the passage with the words in the box. Each word can only be used once. Note that there is one word more than you need.When you are frightened or feel endangered, your breathing and your pulse quicken in order to give you a better chance of either running away from the threat or defending yourself against it. When the danger is eliminated, your body returns to its pre-stress state.Psychological stress can also be triggered in response to an external factor, as with a fear of heights or public speaking. However, since it (31) ________ inside our own minds and is strongly tied to our past experiences, psychological stress can also be caused simply by our thoughts about certain events. Just think about a(n)(32) ________event is enough to make some people anxious, even when the event is days away.Experience plays a large role in determining what you consider as stressful. Many reactions to stress are subconscious or (33) ________ and therefore, difficult to prevent. However, while the body’s intial reaction is hard to regulate, the choices you make can play a large role in helping keep psychological stress from going out of control.So, what are some major types of stress?The first type of stress is survival stress. When in fear for your safety, your body prepares to(34) ________ the problem either by facing it or fleeing from it. Your body reacts to this type of stress by sharpening your (35) ________of sight and hearing and increasing your breathing and heart rate.Another type is environmental stress, which is caused by unpleasant things you (36) ________ daily life. Workplace stress, which is often caused by overwork or (37) ________with coworkers, is one common environmental stressor.The third type of stress is internal stress. This type of stress is caused by thinking about stressful situations that occurred in the past or will take place in the future Being stressed is an appropriate reaction to a(n)(38) ________threat, but the same reactions that are helpful in the short term can prove harmful over time. Long-term-stress, known as chronic stress, can cause both mental and physical health problems. For example, many people find preparing for a job interview or to give a speech to be a stressful activity become overwhelming and can (39)______with daily life if they last for days or weeks. With chronic stress, severe health consequences can be caused, including heart disease, depression, excessive weight gain, sleeplessness, and digestive problems. Long-term stress tends to weaken your immune system, making you more likely to (40) _______flu or otherillnesses. Furthermore, it slows down your recovery from these illnessesIII. Reading Comprehension (45 分)Section ADirections: For each blank in the following passage there are four words or phrases marked A, B, C and D. Fill in each blank with the word of phrase that best fits the context.The Commerce Department plans to restrict (41) _______to TikTok and We Chat on Sunday as the Trump administrations executive orders against the two apps are set to take effect.The Department said Friday that as of Sunday, any moves to (42) _______or maintain We Chat or TikTok on an app store will be prohibited. apple and google didn't immediately (43) _______to requests for comment. While users who have downloaded the apps may be able to continue using the software, the restrictions mean updated (44) _______of the apps cannot be downloaded. “The only real change as of Sunday night will be Tik Tok users won't have improved apps, updated apps, upgraded apps or (45) _______,” Commerce Secretary Wilbur Ross said Friday morning on FoX Business.The restrictions targeting We Chat are more (46) _______. Beginning Sunday, it will be illegal to host or transfer internet traffic associated with We Chat, the Department said in a(n ) (47) _______. The same will be true for TikTok as of Nov. 12, it said. (The Trump administration is currently (48) _______a proposal involving Byte Dance, TikTok's Chinese parent, and Oracle, designed to resolve the administration's national security concerns related to TikTok the deadline for a deal is Nov. 12.) Tik Tok said in a statement that it was disappointed by the administration’s announcement. “Our community of 100 million US users love Tik Tok because it's a home for entertainment, self-expression and (49) _______, ” the company said, “and we're (50) _______to protecting their privacy and safety as we continue working to bring joy to families and meaningful careers to those who create on our platform. ”Tencent, We Chat's owner, said it is reviewing the restrictions outlined by the Commerce Department “Following the (51) _______executive order on August 6 we have engaged in many discussions with the US government, and have put forward a(n) (52) _______proposal to address its concerns, Tencent said in a statement." The restrictions announced today are unfortunate, but (53) _______our desire to provide ongoing services to our users in the US- for whom We Chat is an important communication tool---- we will continue to discuss with the government and other stakeholders in the US ways to achieve a long-term solution.”In earlier court filings, the US government suggested that the restrictions on TikTok and WeChat would be limited in scope and not aimed at harming consumers or TikTok's US employees. TikTok employees will still be able to receive salaries and (54) _______and to do their day jobs without running against.In a separate filing on Sept. 15, the US government warned that communication over We Chat might be "impaired" as a result of forthcoming policies, but that "users will not be targeted or (55) _______to penalties.”41. A. entry B. approval C. access D. barrier42. A. distribute B. publicize C. defend D. appreciate43. A. confess B. refer C. adapt D. respond44. A. copies B. visions C. collections D. versions45. A. item B. offering C. maintenance D. quality46. A. dramatic B. extensive C. intense D. prospective47. A. release B. publication C. acknowledge D. issue48. A. adjusting B. weighing C. investigating D. banning49. A. declaration B. approach C. confidence D. connection50. A. opposed B. committed C. attempted D. determined51. A. initial B. advanced C. practical D. critical52. A. compulsory B. idealistic C. comprehensive D. fundamental53. A. considered B. regarding C. given D. thinking54. A. claims B. benefits C. pensions D. insurance55. A. sacrificed B. punished C. entitled D. subjectedSection BDirections:Read the following three passages. Each passage is followed by several questions or unfinished statements. For each of them there are four choices marked A, B, C and D. Choose the one that fits best according to the information given in the passage you have just read.(A)It is hardly necessary for me to cite all the evidence of the depressing state of literacy. These figures from the Department of Education are sufficient: 27 million Americans cannot read at all. and a further 35million read at a level that is less than sufficient to survive in our society.But my own worry today is less that of the overwhelming problem of elemental literacy than it is of the slightly more luxurious problem of the decline in the skill even of the middle-class reader, of his unwillingness to afford those spaces of silence, those luxuries of domesticity and time and concentration, that surround the image of the classic act of reading. It has been suggested that almost 80 percent of America's literate, educated teenagers can no longer read without an accompanyingnoise (music) in the background or a television screen shinning at the corner of their field of perception. We know very little about the brain and how it deals with simultaneous conflicting input, but every common-sense intuition suggests we should be profoundly alarmed. This violation of concentration, silence, solitude (独处的状态) goes to the very heart of our notion of literacy; this new form of part-reading, of part-perception against background distraction makers impossible certain essential acts of comprehension and concentration, let alone that most important tribute any human being can pay to a poem or a piece of prose he or she really loves, which is to learn it by heart. Not by brain. by heart; the expression is vital.Under these circumstances, the question of what future there is for the arts of reading is a real one. Ahead of us lie technical, psychic(心理的), and social transformations probably much more dramatic than those brought about by Gutenberg, the German inventor in printing. The Gutenberg revolution, as we now know it, took a long time; its effects are still being debated. The information revolution will touch every fact of composition, publication, distribution, and reading. No one in the book industry can say with any confidence what will happen to the book as we've known it.56. The picture of the reading ability of the American people, drawn by the author, is__________.A. rather bleakB. fairly brightC. very impressiveD. quite encouraging57. The author's biggest concern is____________________.A. elementary school children’s disinterest in reading classicsB. the surprisingly low rate of literacy in the U.S.C. the musical setting American readers require for readingD. the reading ability and reading behavior of the middle class58. A major problem with most adolescents who can read is________________.A. their fondness of music and TV programsB. their ignorance of various forms of art and literatureC. their lack of attentiveness and basic understandingD. their inability to focus on conflicting input59. The author claims that the best way a reader can show admiration for a piece of poetry or prose is ___________________.A. to be able to appreciate it and memorize itB. to analyze its essential featuresC. to think it over conscientiouslyD. to make a fair appraisal of its artistic value(B)NEWS FROM PENN GSE1. The Educator's Playbook: To Build Community This Fall, Think of Your Class as a TeamMany educators are concerned about building community within their classes this fall. And rightfully so. We know that in-person experiences create opportunities for students to form deep relationships, make personal connections, and build a sense of community. Zachary Herrmann, executive director of Penn GSE's Center for Professional Learning, suggests ways to help- students flourish in a remote or hybrid contextRead more2. Penn GSE Faculty and Students Share Expertise on PodcastsAs podcasts increasingly address current events from racial justice to the pandemics effect on education, Penn GSE faculty, students, and alumni are weighing inRead more3. Michael Gottfried, the Newest Faculty Member of Penn GSE's Education Policy Division, Discusses Returning to PennWhen Michael Gottfried moved from California to Philadelphia this summer, it was a homecoming of sorts. An applied economist, Gottfried was first inspired by the powers of data-driven education policy to improve children's lives when he was a graduate student at Penn in the early 2000s. Fast forward more than a decade, and Penn GSE welcomes Gottfried back to campus as an associate professor.Read More4. Finalists and $iook in Prize Funding Announced for 2020 Milken-Penn GSE Education Business Plan CompetitionThis year's finalists will present their ideas on October 6 in a virtual pitch competition open to the public. The finalists include CloudLabs, Everydae, FulphiL, Literal, Project Invent, SILAS, Third Room,and Weird Enough Productions. The largest competition of its kind, the EBPC features multiple cash prizes totaling over $100,000 each year.Read more5. Homecoming at HomeMark your calendar for November 9-14, 2020 to experience a week of online programming, social media contests, and virtual campus tours. Hear from Penn faculty, alumni, and students on topics ranging from social justice, healthcare, arts and culture, and Penn Athletics. Stay tuned for more details about Penn GSEs programmingLearn More6. Stay in Touch with Our Community on Penn GSE ConnectsProfessional networking is more important than ever if you're navigating the job market during the pander mic. With Penn GSE Connects, Penn GSE students and alumni have an exclusive new platform to build professional relationships.Get ConnectedThis email was sent by Penn GSE’s Office of Development and Alumni RelationsCopyright ©2020 University of Pennsylvania, All rights reserved.Penn GSE Alumni NewsletterOur mailing address is:University of Pennsylvania3700 Walnut StPhiladelphia, PA 19104-6216Add us to your address book60. If one student are really interested in landing a job, the ________news might engage his/her interest a lot.A. 1stB. 3rdC. 4thD. 6th61. What can we learn from the news?A. GSE members are taking a share of capital gains brought by podcast in the marketB. Educators are worried that classmates may not enjoy strong relationship as beforeC. Michael Gottfried returned to his teaching position he was in more than a decade agoD. The first prize winner of Penn GSE EBPC can earn over one hundred thousand dollars62. Where can you probably find the information?A. In Penn GSE official websiteB. In the GSE admission brochureC. In the subscribed email sent by GSE.D. In the school newspaper issued by GSE.(C)Three hundred million children live in areas with extreme air pollution, new research by the United Nation Children Fund (UNICEF)reveals. The air they breathe is more than six times as polluted as what is considered safe. The new study was the first to make a global estimate of pollution exposure. It shows that almost 90 percent of the world's children---2 billion--- live in places where outdoor air pollution levels are dangerously high.UNICEF warmed that these levels of global air pollution have contributed to 600, 000 child deaths a year. Children are far more likely to be harmed by air pollution than adults are, UNICEF said. So, UNICEF urged nations to cut fossil fuel burning rapidly. Fossil fuels, such as coal and gas, are the main source of air pollution. "The danger caused by air pollution is enormous, "said Anthony Lake, UNICEF's executive director. " No society can afford to ignore air pollution. We protect ourchildren when we protect the quality of our air, both of which are central to our future.’’ Air pollution is the world's single biggest environmental health risk, according to the World Health Organization(WHO), and is getting worse, with levels of poisonous air rising 8% in the last five years. More than 3 million people a year die as a result of outdoor air pollution -six every minute on average and this is set to double by 2050 as fast growing cities expand. Indoor air pollution, mainly from wood stoves causes another 3 million deaths a year.Meanwhile, children are especially at risk, the UNICEF report says, because they breathe more rapidly than adults and their lungs take in more pollutant particles. The he tiny particles can also cross the blood-brain barrier, which is less resistant in children. Once they do they can permanently harm brain development. Even the unborn are affected, as the particles taken in by a pregnant woman can injure a child in the womb. Children in poor countries are doubly at risk, scientist Jos said. Their bodies are often already weakened by not getting enough to eat, and available health care is often inadequate. Of the 300 million children exposed to levels of pollution six times above what is considered safe, 220 million live in South Asia India in particular hosts many of the worlds most polluted cities. Moreover, figures reveal a striking disparity in five-year cancer survival rates for children in air polluted areas compared with those from developed countries.UNICEF urged all countries to cut air pollution by reducing fossil fuel burning in power plants and vehicles. It also recommended that schools and playgrounds not be located near sources of pollution, such as busy roads and factories. In addition, it called for the use of less-polluting cooking stoves.63. Which one of the following statements is WRONG according to the text?A. Pollution in the air can pose a threat to children’s brain growthB. Heavy air pollution can even hurt the babies that are still not born.C. A majority of children all across the world cannot breathe clean airD. Through countries' efforts, the situation of air pollution is improving64. What does disparity in paragraph 5 most probably mean?A. distinctionB. disturbanceC. discomfortD. disengagement65. In order to have clean air, UNICEF suggestedA. government should aim for a reduction in power plants and trafficB. careful decisions on the locations and structures of schools are neededC. fossil fuel is an extra feature that is likely to bring along some benefitsD. cooking stoves that contribute little to air pollution should be used66. What can be the title of the passage?A. Air Pollution, a Factor Fatal to LifeB. Efforts to Pull Countries out of PollutionC. Children, More Affected by Air PollutionD. Warnings from UNICEF Against Air PollutionSection CDirections: Read the passage carefully. Fill in each blank with a proper sentence given in the box. Each sentence can be used only once. Note that there are two more sentences than you need.Paleontology is the study of the history of life on Earth. It focuses on fossils, which are the remains of plants, animals and other living things that have been replaced by rock material or whose impressions have been preserved in rock. (67)____________________________________.Individual fossils may contain information about an organism's life and environment. For example, each ring on the surface of an oyster shell shows one year of its life. Studying oyster fossils can help paleontologists discover how long the oyster lived, and in what conditions. If the climate was favorable for the oyster, the oyster probably grew more quickly and the rings would be thicker. If the oyster struggled for survival, the rings would be thinner.(68)____________________________________. Amber(琥珀),for instance, is hardened,fossilized tree resin树脂). As the sticky resin dripped down a tree trunk, it trapped small insects and some organisms as large as frogs and lizards. Paleontologists study amber to observe these complete specimens. Amber can preserve tissue as delicate as dragonfly wings. The behavior of organisms can also be inferred from fossil evidence. For instance, paleontologists suggest that duck-billed dinosaurs called hadrosaurs lived in large numbers. They reached this conclusion after observing a single site with approximately 10,000 hadrosaur skeletons.(69)____________________________________.For instance paleontologists have concluded that whales evolved from land-dwelling animals. Fossils of extinct animals closely related to whales have front limbs similar to front legs. They even have tiny back limbs. Although the front limbs of these fossil animals are in some ways similar to legs, in other ways they also show strong similarities to the fins of modem whales.Modern paleontologists have a variety of tools that help them discover, examine and describe fossils Electron microscopes allow paleontologists to study the tiniest details of the smallest fossils (70)________________________________________.Advanced computer programs can analyze fossil data and reconstruct skeletons. They can be used to visualize the bodies and movements of extinct organisms Paleontologists still make important discoveries with simple tools. Around the world, many are digging away, hoping to shed new light on the evolution of life on Earth.IV. Summary WritingDirections:Read the following passage. Summarize the main idea and the main point(s) of the passage in no more than 60 words. Use your own words as far as possible.The Smell of MoneyFor many years large supermarkets have been encouraging us to spend money by pumping the smell of freshly-baked bread into their stores. Now Dale Air, a leading firm of aroma(芳香) consultants, has been approached by Barclays Bank to develop suitable artificial smells for their banks. Researchers have suggested that surrounding customers with the smell of money will encourage them to feel relaxed and optimistic and give them added confidence in the bank’s security and professionalism.But before a smell can be manufactured and introduced into banks' air conditioning systems it must be identified and chemically analysed, and this has proved to be difficult. The problem is that banknotes and coins tend to pick up the smell of their surroundings. So cash that has been sitting in a cash register at a fishmongers will smell of fish, and banknotes used to pay for meals in restaurants will tend to smell of food.It may be a challenge, but aroma experts have little doubt that the use of artificial smells can be an effective form of subconscious advertising. Lunn Poly, a British travel company, introduced the smell of coconuts into its travel agencies and saw a big increase in spending by holiday makers. Many cafes now have electric dispensers that release the smell of freshly roasted coffee near their entrances, encouraging customers to come in and have a drink or snack. Even car maker Rolls-royce has been spraying the inside f its cars to enhance the smell of the leather seats.‘The sense of smell is probably the most basic of all human senses, explains researcher Jim certain smells stirring memories and feelings in a way that few other stimulants can match. O’Riordan. "There is a direct pathway from the nose to the brain. It is certainly true that most people findphenomenon marketing consultants have long recognized, but until recently have been unable to use.“We’ve made great progress but the technology of aroma production is till in its infancy,’’ says Oriordan. “Who knows where it will take us.”V. TranslationDirections: Translate the following sentences into English, using the words given in the brackets.72.匆匆赶到餐厅,我才发现已经没有位子了。
Investigating the feasibility of supply chain-centric business models in3D chocolate printing:A simulation studyFu Jia a,b,Xiaofeng Wang c,⁎,Navonil Mustafee a,Liang Hao da Business school,University of Exeter,UKb School of Economics and Management,Minjiang University,Fuzhou,Chinac Glorious Sun School of Business and Management,Donghua University,Shanghai,Chinad Advanced Materials and Manufacturing School,University of Exeter,UKa b s t r a c ta r t i c l e i n f oArticle history:Received21January2014Received in revised form17March2015 Accepted28July2015Available online xxxxKeywords:3D chocolate printingCase studySimulationBusiness model innovationSupply chain management 3D chocolate printing provides the technology for manufacturing chocolates layer-by-layer,thus offering customers enhanced product value and personalized consumption experience.As business models in the choc-olate industry are closely associated with the profitability of the supply chain constituents,it seems appropriate to investigate thefinancial viability of these supply-chain centric business models prior to their introduction in the real world.In this paper we present two business models pertaining to the supply chain for3D printed choc-olates;we evaluate thefinancial viability of these innovative models through the use of computer modelling and simulation.The study is based on the commercialization efforts of a UK based3D chocolate printing technology provider(Choc Edge).The results of the study indicate that1)the retailer dominant supply chain model is a po-tentially disruptive business model innovations that are enabled by the3D food printing technology,and as such, may pose a challenge to traditional high end chocolate products;2)the manufacturer dominant model helps manufacturers gain more profits while retailer profits tend to be stagnant.©2015Elsevier Inc.All rights reserved.1.IntroductionTraditional chocolate manufacturers such as Dove,Cadbury,Hershey and Ferrero,capture the most market shares of the confectionary industry by offering standard chocolate bars and gift boxes.In order to deliver more customer value propositions,there are some small and medium sized chocolate manufacturers such as Chocolate Bouquets directly selling handmade chocolates via e-commerce platforms such as eBay or Amazon. Besides,some upscale chocolate manufacturers such as Teuscher(www. )provide highly customized chocolate products in terms of fruits,spices,nuts,confectionery and white/dark cocoa,which allows for more than27billion combinations(). Although the launch of customized chocolate products fulfil the increas-ing requirements for personalization,the mainstream chocolate con-sumers are faced with long order-to-delivery time and prices that are generally2–3times higher than traditional chocolate products.As the market requirement for customized chocolate keeps growing,satisfying customization needs at relatively low costs is a challenge that is faced by many players in this industry.The application of3D printing technol-ogy in the chocolate industry is an innovative approach towards mass customization of chocolates.The prototype3D chocolate printing technology that was developed at the University of Exeter(BBC News,2011;BBC News,2012),repre-sents a revolutionary product innovation and manufacturing approach which can engage consumers to create and produce chocolate gifts lo-cally and share their digitized product design and innovation globally through online communities.Clearly this new technology represents great potential to reconstruct food innovation,production and supply chain in the future,in particular achieving a leagile and low carbon food value chain(Christopher,2011).However,our search of literature in3D food printing using bibliographic databases ISI Web of Knowledge and Scopus retrieved only6and15articles respectively(the keywords used were3D food print*,additive manufacturing,rapid manufacturing, rapid prototyping,solid freeform fabrication,layer manufacturing;search conducted on article title,abstract and keywords;final search was conduct-ed in December,2013).Of these,the relevant articles focused primarily on engineering and automation(e.g.,Millen et al.,2012)and food science (Kim et al.,2012).There is presently little research carried out to date studying the impact of3D food printing on the supply chain of innovative food products and their underlying business models;a possible reason for this is that3D food printing is at its infancy and research in this topic should arguably be preceded by commercialization of this technology and the creation of associated supply chains,both of which are still devel-oping.In the context of3D chocolate printing,to the best of our knowl-edge there is only one technology provider attempting to commercialize operations in the UK:Choc Edge.The company was founded by a co-Technological Forecasting&Social Change xxx(2015)xxx–xxx⁎Corresponding author.E-mail address:xfwang@(X.Wang).TFS-18293;No of Pages12/10.1016/j.techfore.2015.07.026 0040-1625/©2015Elsevier Inc.All rights reserved.Contents lists available at ScienceDirectTechnological Forecasting&Social Changeauthor of this paper and the University of Exeter for commercially exploiting3D chocolate printing(https:///).Robust business models are necessary for ensuring the economic sustainability of3D chocolate printing.It should take into account the profitability aspects of the supply chain constituents,viz.,the manufactur-er and the retailer,and the utility derived by the end user(e.g.,permitting both shape and mix customization of chocolate products).Towards this,we present two business models that are being considered by Choc Edge—the manufacturer-dominant model and the retailer-dominant model.The question now arises as to how we assess the eco-nomic sustainability of business models based on supply chain configu-rations that do not yet exist?This brings us to the next part of the study which has applied computer simulation in the context of supply chains(supply chain simulation).A computer simulation is a quantita-tive technique that uses the power of computers to conduct experiments with models that represent either an existing or a proposed system of interest(Pidd,2004).In this research we use simulation for modelling the supply chain constituents and their profitability functions with the aim of experimentingfinancial viability of the proposed manufacturer-dominant and the retailer-dominant model business models.Due to the nascent nature of the3D food printing technology (Eisenhardt,1989;Yin,2003)a simulation case study is an effective experimentation-based approach to evaluate new business model inno-vations.Such an approach has been used previously in the context of ascertaining thefinancial viability of business models pertaining to tele-communication networks(Bohlin,2007).The contribution of the paper is twofold.First,it outlines two business models for3D printing of chocolates and compares it to the traditional model for the production of standard chocolates.Second,the paper presents a simulation study to assess thefinancial viability of the two pro-posed business models.As discussed earlier in the paper,there is present-ly no literature on3D food printing and its effects on existing food supply chains and business models;and thus the novelty of our contribution.The remainder of the paper is structured as follows.Section2presents a literature review on business models in food supply chains.Section3 then outlines our research methodology which uses computer modelling and simulation.Section4is on business models;it discusses them in re-lation to3D printing-enabled customized chocolate production(the pro-posed manufacturer-dominant and retailer-dominant models)and standard chocolate production(traditional model).Section5presents the simulation logic and the equations that are implemented in the computer model.The simulation results are discussed in section6. Section7presents a discussion on the entrepreneurial challenges faced by Choc Edge as it attempts to commercialize the technology and what adaptations to its business model and strategy might be nec-essary for it to be commercially successful.Section8is the concluding section of the paper.2.Literature reviewTraditional chocolate making is a highly sophisticated process using specialized machinery.The production method may involve moulding (e.g.,pouring moulding),enrobing and roll forming(Aasted,1998; Beckett,2009),among others.Furthermore,different mouldings re-quire different chocolate production machines and lines(Jeffery et al., 1977).These traditional methods of chocolate production focus primar-ily on standard products and mass manufacturing(Akutagawa,1983; Hunter,1927)and capture the majority of the market share.However, they cannot match customer demands for customized chocolates (Beckett,2009).Although traditional methods can manufacture such products,they are expensive and time consuming as they frequently necessitate the manufacture of customized moulds(Aasted,1998).In this section we present a review of literature on business models in food supply chains(Section2.1).Robust business models are necessary for ensuring the economic sustainability of chocolate production,taking into account the profitability aspects of the supply chain constituents.In this paper this is referred to as supply chain-centric business model inno-vations and is further discussed in Section2.2.2.1.A review of business models for food supply chainsFood Supply Chains(FSC)are an example of complex supply chains and consist of several inter-dependent steps,for example,farming,food processing,distribution,retailing and consumer handling(van der Vorst,2000).In between these operations,storage,packaging and trans-port need special considerations due to food safety issues(Jennings, 2005).As a result of the long processflows and food storage,the logistics costs are high.With regard to FSC for chocolates,the chocolate production processes have strict requirements for temperature control,which pushes the cost even higher(Aasted,1998).The main challenges of the tradition-al FSC are how to shorten the food process,reduce logistics and storage costs,and enhance the consumption value of products(Christopher, 2011).Nowadays,supply chain and logistics managers face another chal-lenge and are required to re-evaluate their strategies and tactics to make the food supply chain more sustainable(Flint et al.,2008).The traditional FSC and production lines are more appropriate for mass manufacturing of standard products or for limited customization products;customized products,on the other hand,require expert skills of hand-decoration which are often associated with high labour costs(Berkes et al.,1984).Customization involves seeing each customer as a potential market segment and designing and producing individualized products,and quickly delivering them to each customer(Fitzgerald,1995).Boland (2008)illustrated that there are an increasing number of consumers who require personalized nutrition,and they are willing to pay a premi-um price to buy innovative food(Cohen et al.,2009;Hendry,2010). Personalized nutrition becomes a mainstream in affluent societies (Boland,2008),with a goal of healthy lifestyle(Boland,2008;Martínez et al.,2008).At the same time,customers want to receive products and services with a certain degree of individualization(Gilmore,and Pine, 1997;Franke et al.,2009).As a result of manufacturers'decisions to configure their products to match every customer's individual preferences,the relationship be-tween manufacturers and customers has been enhanced(Wong and Eyers,2011;Simonson,2005).However,the manufacturer's total cost (e.g.,production and logistics)would increase linearly with the number of products available to the market(Banerjee and Golhar,2013). Furthermore,in the midst offierce competition and diversified product offerings in the market,manufacturersfind it difficult to simply expand product ranges,and they do not have enoughflexibility to respond to this rapid change in customer demands(Wang,2011),such as in regards to product designs,colour,sizes and packaging(Childerhouse et al.,2002;Wang,2011).Therefore,it has become a common trend to continuously improve the level of customization in the FSC for pro-ducing standard products in the market(Lyons et al.,2013).Discussing the impact of the customization on the FSC,Wang(2011) proposes a dynamic model,which states that product customization level would be affected by product costs and potential profit margin,in-ventory cost of semi-finished products,shortage costs and inventory costs.Echoing Wang(2011);Wong and Eyers(2011)concentrated on several key factors such as the inventory level,number of product vari-ety,price,and delivery lead-time,which may inhibit or promote the use of a higher level of customization.In addition,producing customized products may create solutions for postponement in FSC.For instance, customized production will not start until manufacturers receive a clear order from customer preference(Periard et al.,2007),thus,the issue of delaying or postponing production of a product can be solved (Banerjee and Golhar,2013;Getschmann,2013).Arguably,the FSC factors which inhibit the large scale adoption of personalized food products will also apply to the supply chains for cus-tomized chocolates.However,it's possible that impact on the latter may be diminished considering that an innovative food processing technology (like3D chocolate printing)may simplify logistics and thereby reduce2 F.Jia et al./Technological Forecasting&Social Change xxx(2015)xxx–xxxinventory cost;further,the promise of co-creation of value together with customers(through design of customized chocolates)has provide a unique Customer Value Proposition and thereby the potential to enhance the company's competitive advantage(van der Vorst,2010).This pre-sents an opportunity for new supply chain-centric business models in 3D chocolate printing.2.2.A critique of business model innovations for3D chocolate printingIn business,innovation is divided into two broad categories:(1)con-tinuous or dynamic evolutionary innovation,which brings about incre-mental advances in technology or processes;and(2)disruptive innovations,which is the emergent or step-function innovation(Yu and Hang,2010).Disruptive innovation is the introduction of new technolo-gy,products or services,as well as the efforts to promote,reform and ob-tain superiority in the competition and mainly includes business-model innovation and technology innovation(Markides,2006).Such innova-tions are an effective way to develop and expand new markets (Govindarajan and Kopalle,2006;Schmidt and Druehl,2008)and they may also have a profound influence on the existing market(Schmidt and Druehl,2008).It is arguable that3D chocolate printing is a disruptive innovation enabled not only by the3D print technology but also by the changes in the underlying supply chain configurations that are necessitated through its use.However,it is important to also consider the level of maturity of this innovation in the food industry.An immature disruptive innovation cannot substitute the traditional business(Yu and Hang, 2010).3D chocolate printing technology requires high quality of raw materials since the chocolate viscosity affects the quality of the end product;such conditions increase the operational problems(Finkel, 1987;Lipton,2010).Accordingly,although3D chocolate printing tech-nology has enormous potentials to change food innovation,it is not a disruptive innovation just yet as it currently is a new and immature technology for manufacturing.The focus of this paper is not on technol-ogy but on supply chain-centric business model innovations that com-plement the use of this technology.puter modelling and simulationComputer simulation enables us to experiment with a computer model and to know more about the system under scrutiny and to evalu-ate various strategies for its operation(Shannon,1998).Computer simu-lations are generally used because they are cheaper than building(and discarding)real systems;they assist in the identification of problems in the underlying system and allow testing of different scenarios in an attempt to resolve them;allow faster than real-time experimentation; provide a means to depict the behaviour of systems under development; facilitate the replication of experiments,among others(Brooks et al., 2001;Pidd,2004).All the aforementioned advantages of computer simu-lation apply to our study.Supply Chains,from their very nature,are complex as they entail all the processes from procurement and manufacturing to sales and support(Stevens,1989).Moreover,modern supply chain management approaches favour a global,holistic view in which the individual eche-lons share information and trust each other,rather than simply trying to optimize their own local processes independently of its neighbours (Chapman and Corso,2005).This is also true of the supply chains for chocolates.Most of these multi-echelon and complex supply chains can benefit from Operational Research(OR)techniques.One such OR technique is simulation;application of this technique to supply chain management is called supply chain simulation(SCS).SCS helps organiza-tions determine the strategies that have the potential to provide the most flexible and profitable operating environment(Huang et al.,2003).SCS differs from the conventional types of simulations(e.g.,traditional manufacturing simulation)because it spans far beyond the confines of a single entity and its goal is to improve thefinancial position of an entire enterprise or a group of trading partners(Bagchi et al.,1998).This partic-ular goal makes the application of this OR technique relevant to our study.Our computer simulation models three supply chain-centric busi-ness models(see Section4).Thefirst model is the traditional model for the production of standard chocolate products that presently exists in the chocolate industry.The remaining two models are the proposed models and are based on,(a)the researchers'observation of business development of Choc Edge,and(b)extensive consultations and semi-structured interviews with food/chocolate production experts including plant managers,R&D managers,marketing managers and supply chain managers of large multinational food corporations based in the UK and China.The objective of carrying out the interviews in both UK and China is that it is realized that the latter,being an emerging economy and in-creasingly thefinancial powerhouse of the world,tends to accept new technologies faster than the developed economies.These interviews were also crucial in providing input data for the models(e.g.,inventory levels maintained by the manufacturer,product cost and retailer selling price).The computer models were implemented using the commercially available ExtendSim()software(Krahl,2009).4.Business modelsIn this section,wefirst present a supply chain model for the tradi-tional chocolate production(Section4.1),then move on to proposing two business models based on the3D chocolate printing technology: manufacturing dominant model and retailer dominant model(Sections 4.2and4.3respectively).The former represents a business model wherein a chocolate manufacturer adopts this technology,with pro-duction taking place at the manufacturers'plants and the manufac-turers then choosing to sell the products through retailers and through e-commerce platforms.The latter scenario is that of a retailer adopting this technology with thefinal production(3D printing)taking place at the retailers'stores with the retailers then selling the products through its stores and its online platform.The novelty of the supply-centric business model innovation is described in Section4.4.4.1.Traditional chocolate production business model(model1)The supply chain strategy for traditional chocolate production is make-to-stock.The supply chain comprises of the suppliers of raw material,the manufacturer,a network of retailers and the end con-sumers.Fig.1shows the materialsflow from right(raw materials provider)to the left(end consumers)and are depicted through arrows. Theflow of information is from the left to the right and is illustrated by dotted arrows.Thisflow can be specific to the customer(demandflow), the retailer(orderflow forfinished goods)or to the manufacturer (orderflow for raw materials).The manufacturer's process is further divided into the inventory for raw material,the production process and the inventory for thefinished product.Similar to the material and informationflow above,there are upstream and downstreamflows be-tween these sub-processes and they are depicted by dotted blue arrows. Thefigure also includes icons for representing inventory and the upstream transportation.Finally,the readers should take note of three variables(D,P and W)included in thefigure;these refer to the variables that will be subsequently used in the simulation.D is the consumer de-mand for the standard chocolate products;P is the price for the tradi-tional chocolates and W is the wholesale price.4.2.Manufacturer-dominant business model for3D chocolate production (model2)The production of customized chocolates will necessitate changes to be made to the traditional supply chain and its underlying business model and should take into account the revised role of the supply chain constituents in fulfilling customer demand.The manufacturer-dominant model is thefirst supply-centric business model innovation3F.Jia et al./Technological Forecasting&Social Change xxx(2015)xxx–xxxpresented in the paper.Here the manufacture is not only responsible for the make-to-stock (as in the traditional model)but also for the custom-ized production of chocolates.The conventional retailer –manufacturer channel for make-to-stock is complemented by processes pertaining to the production of customized chocolates,wherein,(a)customers order personalized chocolates through the retailers,(b)the orders are communicated to the manufacturer,(c)the chocolates manufactured using semi-finished products inventory and 3D chocolate printing ma-chines,(d)the manufacturer transports the customized chocolates back to the retailer,and (e)the customer collects the customized choc-olates from the retailers (Fig.2).The proposed supply-chain structure also includes the customer –manufacturer channel which facilitates communication between the customer and the manufacturer with the objective of ful filling customer demand.The dual channel may be realized through the development of an online e-commerce portal by the manufacturer,wherein (a)the portal enables customers to put for-ward their customizations through the internet,(b)the manufacturer then produces personalized chocolates using 3D printing technology and semi-finished chocolate inventory,and (c)the manufacture delivers the chocolates directly to the customers.In the customer –manufacturer channel the role of the retailer is made redundant.Fig.2shows the cus-tomer demand for finished products (i.e.,standard chocolates)(D f ),the demand for customized chocolates that are ordered and delivered through the retailer channel (D c )and those ordered online and transported directly from the manufacturer (D c ′);the corresponding prices are P f ,P c and P c ′respectively.Finally the variables W f and W c refer to the price the retailer has to pay to the manufacturer for the stan-dard and customizedchocolates.Fig.1.Supply chain of a traditional chocolateproduction.Fig.2.Manufacturer-dominant double-channel supply chain structure.4 F.Jia et al./Technological Forecasting &Social Change xxx (2015)xxx –xxx4.3.Retailer-dominant business model for3D chocolate production(model3)In retailer-dominant supply chain the customized product is created using the3D chocolate printer by the retailer.The customer can either place an online order for such chocolates through the retailer website or can come into a store to place an order;in case of the latter it may be possible to manufacture the personalized chocolate in the presence of the customer(an aesthetic appeal!)or it can be shipped to the cus-tomer,as is the case with online orders.The chocolate is manufactured using semi-finished products which have to be ordered from the manu-facturer.Thus,there exist two inventories in the case of retailer-dominant supply chains-the inventory for standard chocolates and the inventory for semi-finished goods(Fig.3).Compared to the manufacturer-dominant business model wherein the manufacturer has processes pertaining to customized chocolate production,in model3 this is incorporated with retailers'processes.However,the manufacturer will continue to produce and maintain an additional inventory for semi-finished products to fulfil the retailers'demand for the raw materials for customized chocolate production.The variables shown in Fig.3are sim-ilar to those in Fig.2since in both scenarios customer demand exists for standard chocolates(D f),customized chocolates ordered and delivered through the retailer channel(D c)and customized chocolates ordered online(D c′);however,unlike the previous scenario wherein the manu-facturer fulfilled the order,in retailer-dominant model the customer re-ceives the chocolate from the retailer.The price for D f,D c and D c′are P f,P c and P c′respectively.Similarly,the variables W f and W c refer to the price the retailer has to pay to the manufacturer for standard and semi-finished chocolates.For both models2and3there is no inventory subsequent to the process for manufacturing customized chocolates(shown in grey) since this is a make-to-order strategy.Finally,for all the three models presented,there exists an inventory for standard chocolates at both manufacturer and retailers since it is make-to-order.4.4.Contribution to supply chain-centric business model innovationWhy do we consider the manufacturer dominant model a supply-chain centric business model innovation?There are numerous examples of business models that circumvent the retailer,for example,those based on home shopping catalogue,e-commerce and e-business.Business models based on the internet have particularly been disruptive; such models have frequently allowed limited customization of the manufactured good(e.g.,Apple which allows personalization of a gadget through laser engravings)or non-trivial customization(e.g.,make-to-order strategy of DELL computers allows customers to choose CPU,mem-ory,Operating System,and a host of other configurations)—these are ex-amples of Business to Consumer(B2C)business models.Business models offering no customizations may include Customer to Customer(C2C)in-teractions realized through e-Bay and Amazon.Shifting our focus from internet-based business models to traditional and hybrid models,the strategy of augmenting the conventional brick and mortar stores with on-line channels(bricks and clicks)has proved to be an effective strategy among high-street retailers in the UK and elsewhere.For example,John Lewis chain of departmental stores in the UK reported a rise of23%in their brick and click operations as against1.2%for store operations for the2013Christmas sales(BBC News,2014).Again the question arises as to why we consider retailer dominant supply-centric business model as a novel innovation?Complementing the traditional make-to-stock retailer–manufacturer channel(model2)and retailer–customer channel(model3)with make-to-order products and further extending it to the customer–manufacturer channel(model2)is in itself not a novel business model innovation in terms of e-Commerce since Internet is now widely recognized as a dis-ruptive technology.And indeed,with the ubiquity of the Internet,we take this as granted;our argument for the novelty of our business model innovation lies in the3D printing technology.In other words, our business model for customization of chocolates could not be realized without the invention of3D chocolate printing technology;the use of the online e-commerce portal would only assist in the efficient communica-tion of designs(shape customization)and product mix to the manufac-turer.The opposite of this is not true,i.e.,having an online portal for shape and mix-based customization but not the3D printing machine would fail to realize the two supply-chain centric business model inno-vations that have been proposed in the paper for personalization of choc-olates.The value of the3D printing technology is that it enables the adopter of the technology to co-create value with consumers in terms shape design and enhances consumer experience of being involved in the design process offinal chocolate products.5.Choc Edge simulation studyThe Choc Edge engineered3D chocolate printing machines will en-able manufacturers(as in business model2)and retailer(as in business model3)to produce chocolates based on customer preferences;this is especially true for the manufacture of chocolates with shape-customi-zation.In3D chocolate printing,production does not commenceuntil Fig.3.Retailer-dominant supply chain structure.5 F.Jia et al./Technological Forecasting&Social Change xxx(2015)xxx–xxx。