Heuristic for survivable capacity sharing between IP and wavelength services sharing of capacity for
- 格式:doc
- 大小:201.50 KB
- 文档页数:8
S C H E D A E I N F O R M A T I C A E1The research is partially supported by Polish State Committee for Scientific Research (KBN)grant No.4T11C00624.126the other hand,new variants of minimization methods requiring all the prime implicants are still being developed[8,10,11].And there are a lot of other applications of a method of prime implicants generation.For example,calcu-lation of the complement of a Boolean function(in DNF),or transformation of a Boolean equation from CNF to DNF.And vice versa–as far as due to the Morgan’s laws transformation from DNF to CNF can be performed by transformation from CNF to DNF.One more application is detecting dead-locks and traps in a Petri net,which can be performed by solving logical equations[13,14].Generally,solutions of a logical equation can be easily obtained from prime implicants of its left part,if the right part is1.Also there are tasks,which can be solved by calculating the shortest prime implicant or prime implicants satisfying certain conditions.In[5]several of such logical design tasks are discussed.Covering problems,both unate and binate covering,can be easily represented as logical expressions in CNF and are usually solved by one of two approaches:BDD-based[1]or branch and bound,for which the shortest prime implicant would correspond to an optimal solution[2].The same is true for some graph problems,such as decyclisation of graphs[4].Task of detecting deadlocks in FSM networks can be reduced to task of generating a subset of prime implicants.The approach discussed in this paper can be applied(directly or with some modifications) to the whole range of mentioned problems.For generation of prime implicants several algorithms are known.The method of Nelson[9],probably historicallyfirst such method for CNF,is based on straightforward multiplying the disjunctions and deleting the prod-ucts that subsume other products.Such transformation is very time-and memory-consuming.More efficient methods are known:an algorithm based on a search tree,proposed by B.Thelen[12],and a recursive method de-scribed in[8].Comparison of those two methods is beyond the scope of our paper;the paper is dedicated to heuristics allowing to accelerate Thelen’s method.Execution time of this algorithm depends remarkably on the order of clauses and literals in the expression.Hence we may suppose that some reordering of the expression will increase efficiency of the algorithm.As far as the search tree in Thelen’s method is reduced by means of certain rules (described below),it is difficult to evaluate a priori effects of different variants of reordering.So it is reasonable to use a heuristic approach and to verify the heuristics statistically.Some of such heuristics are described in[5,6].The article describes some new heuristics,their analysis and comparison with known heuristics.Experiments are performed by using the randomly generated samples;the optimal combination of the heuristics is formulated on the basis of experimental results.127 2.Thelen’s algorithmThelen’s prime implicant algorithm is based on the method of Nelson[9],who has shown,that all the prime implicants of a Boolean function ina conjunctive form can be obtained by its transformation into a disjunctive form.Nelson’s transformation is performed by straightforward multiplying the disjunctions and deleting the products that subsume other products. Such transformation is very time-and memory-consuming,because all the intermediate products should be kept in memory,and their number grows exponentially.Thelen’s algorithm transforms CNF into DNF in a much more efficient way.It requires linear memory for transformation and additional memory for calculated prime implicants.The subsuming products are not kept in memory.A search tree is built,such that every level of it corresponds to a clause of the CNF,and the outgoing arcs of a node correspond to the literals of the disjunction.Conjunction of all the literals corresponding to the arcs at the path from the root of the tree to a node is associated with the node.Leaf nodes of the tree are the elementary conjunctions being the prime implicants of the expression or the implicants subsuming the prime implicants calculated before.A sample tree is shown in Fig.1.The tree is searched in DFS order,and several pruning rules are used to minimize it.The rules are listed below.R1An arc is pruned,if its predecessor node-conjunction contains the com-plement of the arc-literal.R2An arc is pruned,if another non-expanded arc on a higher level still exists which has the same arc-literal.R3A disjunction is discarded,if it contains a literal which appears also in the predecessor node-conjunction.The rules above are based on the following laws of Boolean algebra:a∧a=aa∨a∧b=aa∧a=1(3)a∨1=1(4)a∧1=a(5)128Rules R1and R3follow immediately from(2)and(3).Rule R2provides that the implicants associated with the leaf nodes,if they are not prime, subsume the implicants calculated before.That means that thefirst calcu-lated implicant is always simple.An arc at level k with arc-literal x,such that there is a non-expanded arc with the same arc-literal at level l higher than k,is pruned by it.An implicant obtained by expanding the mentioned arc would be at least one literal shorter than the implicant which would be obtained without applying rule R2.As far as the path two times comes through literal x(at the levels k and l),according to(1),(2)the longest of those two implicants subsumes the shortest one.Hence thefirst calculated implicant cannot subsume the implicants calculated later,but it can be sub-sumed by them.So,applying rule R2allows to check whether an implicant is simple immediately after its calculation.It is enough to compare it with all the implicants calculated before.Due to this property the algorithm is less memory-consuming,because only prime implicants are kept.Fig.1.An example of the tree for Boolean formula:(a∨129 R4An arc j is pruned,if another already expanded arc k with the same arc-literal exists on a higher level v and if rule R2was not applied in the subtree of arc k with respect to arc p on level v which leads to arc j.But using this rule complicates the algorithm remarkably,because addi-tional information on applying rule R2has to be kept.Additional reduction reduces probability of appearing the non-prime implicants at the leaf nodes. But there is no guarantee that such implicants will not appear,and still it is necessary to perform checking,the same as in the case of tree built with using only3pruning rules.The next expression is an example for which non-prime implicants still appear even if all4rules are used:(x∨y)y(y∨z)z(x∨z) (Fig.3).3.Heuristics for Thelen’s methodOne of the possibilities of reducing the search tree is sorting the disjunc-tions by their size in ascending order.Heuristic1(Sort by Length[5]).Choose disjunction D j with the small-est number of literals.Effect of this heuristics can be illustrated with a complete search tree (without arc pruning).Its size(number of nodes)can be calculated accordingto the formula:|V|=1+ni=1ij=1L j(6)where L j is the number of literals in clause number j.Let a formula consist of5clauses,each having a different number of literals,from2to6.If they are sorted from maximal to minimal length,the complete search tree will contain1237nodes;if sorted from minimal to maximal the tree will contain only873nodes.In the second case it is30%smaller.So sorting of clauses influences the tree size remarkably.Of course for the reduced search trees relation may differ.Now let us turn to the pruning rules.Note that every rule can be imple-mented only if the disjunction under consideration contains the same vari-ables as the disjunctions corresponding to the predecessor nodes.That means that if the next disjunction considers the variables which appear in the pre-vious disjunctions,there are possibilities of reduction at that level;and there is no possibility of reduction for the new variables.So we may suppose that130sorting of the clauses according to the variables also may lead to the tree reduction.Here the similar effect is used as in the case of sorting by length: disjunctions containing many repeating variables allow to reduce the tree re-markably,and if such reduction can be performed not far from the root,the tree will be growing slower.So the following heuristics reorder the disjunc-tions in such a way that minimal number of new variables appears at every next level of the search tree.Heuristic2a(Sort by Literals).Choose disjunction D j with the smallest number of literals that do not appear in the disjunctions chosen before.Heuristic2b(Sort by Variables).Choose disjunction D j with the small-est number of variables that do not appear in the disjunctions chosen before.The only difference between these two variants is that heuristic2a com-pares clauses according to literals and heuristic2b according to variables. This means that131Fig.2.An example of the tree,in which effects of heuristic4and rule R4are the sameappearing non-prime implicants at the leaf nodes.As far as due to rule R2an implicant can subsume only the implicants calculated before,if the implicants calculated later are in most cases shorter than those calculated earlier,then chance of subsuming is small.The next heuristic is a reversion of heuristic3.Heuristic4(Reordering Literals).Choose literal v i with the minimum frequency in the non-expanded part of the expression.In many cases(but not always)effects of rule R4and heuristic4are very similar.Rule R4prunes an arc,if at a higher level there is a non-expanded arc with the same arc-literal(let it be a).That means that at the level k literal a is not the last literal in the clause.Let literalb there is a path to the node under consideration at level l.If literal a would be the last in the clause, instead of R4the rule R2would be applicable with the same effect(Fig.2).We may also state that if literal a appears at level k and also at a lower level l(that means in clauses D k oraz D l(k>l)),then if b does not appear in the clauses with numbers greater than k,after applying heuristic4in the clause D k literal b will appear before a and R2will be applicable instead of R4.But if b appears in the clauses with numbers greater than k,such an effect will not always occur.Here is example of heuristic4:(a∨c∨d)After applying the heuristic:(c∨d)132Such ordering of literals causes that the arc leading to non-prime impli-canta∨b∨c)(a∨c∨d)(b,appearing in clause2,appear in the next clauses with the same frequency,and without applying rule R4the algorithm will generate a non-prime implicantP H1H4R4 N N T%N T%N 14463361296752217.80702 1.739620x2677559504122.6420259633.50426855.0 121502459942.1028319.9020x2224863166127.431970228.2070228.2 70317125143547.5073824.4020x21134667149.98433324.7033324.7 3637748157536.2065415.0020x23265066024.95688133.2088133.2 1174064064181122.30113933.3025x31512752603050.84895636512.40637412.4 14490265401770 3.204380.87225x32632342282636.162264170 6.604170 6.6 91288288410960.1097014.230 Avg:133Fig.3.An example of the tree,in which there are differences between heuristic4 and rule R4implicants.But rule R4is more difficult for implementation and increases a necessary memory amount.So it seems that applying heuristic4is more reasonable because allows obtaining a similar effect with less effort.Results of computer experiments are summarized in Tab.1.For the tests the randomly generated Boolean expressions were used.In thefirst column number of variables and the number of clauses of an expression are given(e.g. 20x18).T denotes the tree size(number of nodes);P denotes the number of prime implicants;N denotes the number of non-prime implicants,being the leaves of the search tree.A column‘%’shows for every heuristic the percentage of the tree size in respect of the size in the case when no heuristic is used.The experiments show that it is best to sort disjunctions according to heuristic2a,and literals in the disjunctions according to heuristic4.1344.Conclusion and further workThe presented heuristics,according to the experimental results,allow to generate all the prime implicants of a logical expression represented in the conjunctive normal form more quickly,than it can be done by using Thelen’s method with the heuristics known before.Besides of that,the presented heuristics reduce remarkably the number of the leaf nodes in the search tree corresponding to non-prime implicants.A prospective direction of future work is evaluation of efficiency of the proposed heuristics for solving problems mentioned in Introduction,for which Thelen’s algorithm can be applied.That may require taking into account ad-ditional optimization parameters and modification of heuristics.One more direction is comparison between Thelen’s approach and the BDD-based ap-proach to solving problems such as covering problems.5.References[1]Brayton R.K.et al.;VIS:A System for Verification and Synthesis,in:The Pro-ceedings of the Conf.on Computer-Aided Verification,August1996,Springer Verlag,1102,pp.332–334.[2]Coudert O.,Madre J.K.;New Ideas for Solving Covering Problems,DesignAutomation Conference,1995,pp.641–646.[3]Coudert O.,Madre J.K.,Fraisse H.;A New Viewpoint on Two-Level LogicMinimization,Design Automation Conference,1993,pp.625–630.[4]Karatkevich A.;On Algorithms for Decyclisation of Oriented Graphs,in:Pro-ceedings of the International Workshop DESDes’01,Zielona G´o ra,Poland, 2001,pp.35–40.[5]Mathony H.J.;Universal logic design algorithm and its application the synthesisof two-level switching circuits,IEE Proceedings,136,3,1989,pp.171–177. [6]Mathony H.J.;Algorithmic Design of Two-Level and Multi-Level Switching Cir-cuits,(in German),PhD thesis,ITIV,Univ.of Karlsruhe,1988.[7]McGeer P.C.et al.;Espresso-Signature:A New Exact Minimizer for LogicFunctions,Design Automation Conference,1993,pp.618–624.[8]De Micheli D.;Synthesis and Optimization of Digital Circuits,Stanford Univ.,McGraw-Hill,Inc.,1994.135 [9]Nelson R.;Simplest Normal Truth Functions,Journal of Symbolic Logic,20,2,1955,pp.105–108.[10]Rudell R.,Sangiovanni-Vincentelli A.;Multiple-valued Minimization for PLAOptimization,IEEE Transactions on CAD/ICAS,Sept.1987,CAD-6,5,1987, pp.727–750.[11]Rytsar B.,Minziuk V.;The Set-theoretical Modification of Boolean FunctionsMinimax Covering Method,in:Proceedings of the International Conference TCSET’2004,Lviv–Slavsko,Ukraine,2004,pp.46–48.[12]Thelen B.;Investigations of algorithms for computer-aided logic design of digitalcircuits,(in German),PhD thesis,ITIV,Univ.of Karlsruhe,1981.[13]W¸e grzyn A.,W¸e grzyn M.;Symbolic Verification of Concurrent Logic Con-trollers by Means Petri Nets,in:Proceedings of the Third International Con-ference CAD DD’99,Minsk,Belarus,1999,pp.45–50.[14]W¸e grzyn A.,Karatkevich A.,Bieganowski J.;Detection of deadlocks and trapsin Petri nets by means of Thelen’s prime implicant method,AMCS,14,1,2004, pp.113–121.Received March8,2004。
海外文献推荐-第一期参考文献:[1] I-Cheng Yeh, Che-Hui Lien, Tao-Ming Ting, 2015, Building multi-factor stock selection models using balanced split regression trees with sorting normalisation and hybrid variables, Foresight and Innovation Policy, V ol. 10, No. 1, 48-74[2] Eugene F.Fama, KennethR.French, 2015, A Five-factor Asset Pricing Model, Journal of Financial Economics 116, 1-22[3] Achim BACKHAUS, Aliya ZHAKANOV A ISIKSAL, 2016, The Impact of Momentum Factors on Multi Asset Portfolio, Romanian Journal of Economic Forecasting XIX (4), 146-169[4] Francisco Barillas, Jay Shanken, 2016, Which Alpha? Review of Financial Studies海外文献推荐-第二期参考文献:[1] PRA VEEN KUMAR, DONGMEI LI, 2016, Capital Investment, Innovative Capacity, and Stock Returns, The Journal of Finance, VOL. LXXI, NO. 5, 2059-2094[2] Houda Ben Mabrouk, Abdelfettah Bouri, 2013, New insight on the CAPM: a copula-based approach Tunisian and international evidence, Accounting and Finance, Vol. 4, No. 1, 35-62 [3] FERHAT AKBAS, 2016, The Calm before the Storm, The Journal of Finance, VOL. LXXI, NO. 1,225-266海外文献推荐-第三期参考文献:[1] Yufeng Han, Guofu Zhou, Yingzi Zhu, 2016, A trend factor: Any economic gains from using information over investment horizons? Journal of Financial Economics 122, 352-375[2] Andrea Frazzini, LasseHeje Pedersen, 2014, Betting against beta, Journal of Financial Economics 111, 1-25[3] Doron Avramov, Si Cheng, and Allaudeen Hameed, 2016, Time-Varying Liquidity and Momentum Profits, JOURNAL OF FINANCIAL AND QUANTITATIVE ANAL YSI, Vol. 51, No. 6, 1897-1923[4] Nicholas Barberis, Abhiroop Mukherjee, Baolian Wang, 2014, Prospect Theory and Stock Returns: An Empirical Test, Review of Financial Studies海外文献推荐-第四期参考文献:[1] Brad M. Barber, Xing Huang, Terrance Odean, 2014, Which risk factors matter to investors? Evidence from mutual fund flows, Review of Financial Studies[2] MICHAEL J. COOPER, HUSEYIN GULEN, & MICHAEL J. SCHILL. (2008). Asset growth and the cross‐section of stock returns. Social Science Electronic Publishing, 63(4), 1609–1651.[3]Bollerslev, T., Li, S. Z., & Todorov, V. (2016). Roughing up beta: continuous versus discontinuous betas and the cross section of expected stock returns. Journal of Financial Economics, 120(3), 464-490.[4]Baker, M., Wurgler, J., & Yuan, Y. (2012). Global, local, and contagious investor sentiment ⋆. Journal of Financial Economics, 104(2), 272-287.海外文献推荐-第五期参考文献:[1] Nicole Choi, Mark Fedenia, Tatyana Sokolyk, 2017, Portfolio Concentration and Performance of Institutional Investors Worldwide, Journal of Financial Economics[2]Cronqvist, H., Siegel, S., & Yu, F. (2015). Value versus growth investing: why do differentinvestors have different styles? ☆. Journal of Financial Economics, 117(2), 333-349.[3]Rapach, D. E., Ringgenberg, M. C., & Zhou, G. (2016). Short interest and aggregate stock returns . Journal of Financial Economics, 121(1), 46-65.[4]Novy-Marx, R. (2013). The other side of value: the gross profitability premium ☆. Journal of Financial Economics, 108(1), 1-28.海外文献推荐-第六期参考文献:[1] Suk Joon Byun, Sonya S. Limy, and Sang Hyun Yun, 2012, Continuing Overreaction and Stock Return Predictability, Journal of Financial and Quantitative Analysis[2]Eugene F. Fama, & Kenneth R. French. (2016). International tests of a five-factor asset pricing model. Journal of Financial Economics, 123.[3]Keloharju, M., Linnainmaa, J. T., & Nyberg, P. (2016). Return seasonalities. Journal of Finance, 71(4), n/a-n/a.[4]Seasholes, M. S., & Wu, G. (2007). Predictable behavior, profits, and attention. Journal of Empirical Finance, 14(5), 590-610.[5]PA VEL SAVOR, & MUNGO WILSON. (2016). Earnings announcements and systematic risk. The Journal of Finance, 71(1).海外文献推荐-第七期参考文献:[1] Cary Frydman and Colin Camerer, 2016, Neural Evidence of Regret and its Implications for Investor Behavior, Review of Financial Studies 29, 3108-3139[2] Haghani, V., & Dewey, R. (2016). A case study for using value and momentum at the asset class level. Journal of Portfolio Management, 42(3), 101-113.[3] Tarun, C., Amit, G., & Narasimhan, J. (2011). Buyers versus sellers: who initiates trades, and when?. Journal of Financial & Quantitative Analysis, 51(5), 1467-1490.[4] Hartzmark, M. S. (2015). The worst, the best, ignoring all the rest: the rank effect and trading behavior. Review of Financial Studies, 28(4), 1024.[5] Daniel, K., & Moskowitz, T. J. (2016). Momentum crashes. Journal of Financial Economics, 122(2), 221-247.海外文献推荐-第八期参考文献:[1]Hua, R., Kantsyrev, D., & Qian, E. (2012). Factor-timing model.Journal of Portfolio Management,39(1), 75-87.[2]Leshem, R., Goldberg, L. R., & Cummings, A. (2015). Optimizing value.Journal of Portfolio Management,42(2).[3]Chemmanur, Thomas J., Gang Hu and Jiekun Huang, 2015, Institutional Investors and the Information Production Theory of Stock Splits,Journal of Financial and Quantitative Analysis50(3), 413–445.海外文献推荐-第九期参考文献:[1]Penaranda, F. (2016). Understanding portfolio efficiency with conditioning information. Economics Working Papers, 51(3), 985-1011.[2]Cederburg, S., & O'Doherty, M. S. (2016). Does it pay to bet against beta? on the conditional performance of the beta anomaly. Journal of Finance, 71(2), 737-774.[3]Lindsey, R. R., & Weisman, A. B. (2016). Forced liquidations, fire sales, and the cost of illiquidity. Journal of Portfolio Management, 20(1), 45-57.海外文献推荐-第十期参考文献:[1] Easley, D., Hvidkjaer, S., & O'Hara, M. (2010). Factoring information into returns. Journal of Financial & Quantitative Analysis, 45(2), 293-309.[2]Babenko, I., Boguth, O., & Tserlukevich, Y. (2016). Idiosyncratic cash flows and systematic risk. Journal of Finance, 71(1).[3]Chow, V., & Lai, C. W. (2015). Conditional sharpe ratios. Finance Research Letters, 12, 117-133.海外文献推荐-第十一期参考文献:[1] Mladina, P. (2017). Illuminating hedge fund returns to improve portfolio construction. Social Science Electronic Publishing, 41(3), 127-139.[2] Choi, N., Fedenia, M., Skiba, H., & Sokolyk, T. (2016). Portfolio concentration and performance of institutional investors worldwide. Journal of Financial Economics.[3] Martijn Boons, 2016, State variables, macroeconomic activity, and the cross section of individual stocks, Journal of Financial Economics 119, 489-511海外文献推荐-第十二期参考文献:[1] Blanchett, D., & Ratner, H. (2015). Building efficient income portfolios. Journal of Portfolio Management, 41(3), 117-125.[2] Özde Öztekin. (2015). Capital structure decisions around the world: which factors are reliably important?. Journal of Financial & Quantitative Analysis, 50(3).[3] 2015, Does the number of stocks in a portfolio influence performance? Investment Sights海外文献推荐-第十三期参考文献:[1]Glushkov, D., & Statman, M. (2016). Classifying and measuring the performance of socially responsible mutual funds.Social Science Electronic Publishing,42(2), 140-151.[2]KLAUS ADAM, ALBERT MARCET, & JUAN PABLO NICOLINI. (2016). Stock market volatility and learning.The Journal of Finance,71(1), 419–438.[3]Miller, K. L., Li, H., Zhou, T. G., & Giamouridis, D. (2012). A risk-oriented model for factor timing decisions.Journal of Portfolio Management,41(3), 46-58.海外文献推荐-第十四期参考文献:[1]Feldman, T., Jung, A., & Klein, J. (2015). Buy and hold versus timing strategies: the winner is ….Journal of Portfolio Management,42(1), 110-118.[2]Eric H Sorensen, Nicholas F Alonso. The Resale Value of Risk-Parity Equity Portfolios[J]. Journal of Portfolio Management, 2015, 41(2):23-32.海外文献推荐-第十五期参考文献:[1]Barroso, P., & Santa-Clara, P. (2015). Momentum has its moments ☆.Journal of Financial Economics,116(1), 111-120.[2]Bender, J., & Nielsen, F. (2015). Earnings quality revisited.Social Science Electronic Publishing,39(4), 69-79.海外文献推荐-第十六期参考文献:[1]Greenberg, D., Abhilash, B., & Ang, A. (2016). Factors to assets: mapping factor exposures to asset allocations. Journal of Portfolio Management, 42(5), 18-27.[2]Goyal, A., Ilmanen, A., & Kabiller, D. (2015). Bad habits and good practices. Journal of Portfolio Management, 41(4), 97-107.海外文献推荐-第十七期参考文献:[1]Vermorken, M. A., Medda, F. R., & Schröder, T. (2012). The diversification delta: a higher-moment measure for portfolio diversification. Journal of Portfolio Management, 39(1), 67-74.[2]Asl, F. M., & Etula, E. (2012). Advancing strategic asset allocation in a multi-factor world.Journal of Portfolio Management,39(1), 59-66.海外文献推荐-第十八期参考文献:[1]Chakrabarty, B., Moulton, P. C., & Trzcinka, C. (2016). The performance of short-term institutional trades. Social Science Electronic Publishing, 1-26.[2]Stubbs, R. A., & Jeet, V. (2015). Adjusted Factor-Based Performance Attribution. USXX.海外文献推荐-第十九期参考文献:[1]Copeland, M., & Copeland, T. (2016). Vix versus size. Journal of Portfolio Management, 42(3), 76-83.[2]Kritzman, M., & Turkington, D. (2016). Stability-adjusted portfolios. Journal of Portfolio Management, 42(5), 113-122.海外文献推荐-第二十期参考文献:[1]Benos, E., Brugler, J., Hjalmarsson, E., & Zikes, F. (2016). Interactions among high-frequency traders. Journal of Financial & Quantitative Analysis, 52, 1-28.[2]Richardson, S., Sloan, R., & You, H. (2011). What makes stock prices move? fundamentals vs. investor recognition. Financial Analysts Journal, 68(2), 30-50.海外文献推荐-第二十一期参考文献:[1]Bogousslavsky, V. (2016). Infrequent rebalancing, return autocorrelation, and seasonality. Journal of Finance, 71(6), 2967-3006.[2]Marcos, L. D. P. (2015). The future of empirical finance. Journal of Portfolio Management, 41(4), 140-144.海外文献推荐-第二十二期参考文献:[1] Fabian, H., & Marcel, P. (2016). Estimating beta. Journal of Financial & Quantitative Analysis, 51(4), 1437-1466.[2] Christopher Cheung, George Hoguet, & Sunny Ng. (2014). Value, size, momentum, dividend yield, and volatility in china’s a-share market. Journal of Portfolio Management, 41(5), 57-70.海外文献推荐-第二十三期参考文献:[1]Mclean, R. D., & Zhao, M. (2014). The business cycle, investor sentiment, and costly external finance.Journal of Finance, 69(3), 1377–1409.[2]Kaniel, R., & Parham, R. (2017). The impact of media attention on consumer and mutual fund investment decisions. Journal of Financial Economics, 123, págs. 337-356海外文献推荐-第二十四期参考文献:[1]Chang, X., Chen, Y., & Zolotoy, L. (2017). Stock liquidity and stock price crash risk. Journal of Financial & Quantitative Analysis.[2]Bisetti, E., Favero, C. A., Nocera, G., & Tebaldi, C. (2013). A multivariate model of strategic asset allocation with longevity risk. Ssrn Electronic Journal.海外文献推荐-第二十五期参考文献:[1] Lou, X., & Shu, T. (2013). Price impact or trading volume: why is the amihud (2002) measure priced?. Social Science Electronic Publishing.[2]Lins, K. V., Servaes, H., & Tamayo, A. (2017). Social capital, trust, and firm performance: the value of corporate social responsibility during the financial crisis. Journal of Finance, 72.海外文献推荐-第二十六期参考文献:[1] Golez, B., & Koudijs, P. (2014). Four centuries of return predictability. Social Science Electronic Publishing.[2]Ledoit, O., and Wolf, M. (2017). Nonlinear shrinkage of the covariance matrix for portfolio selection: Markowitz meets Goldilocks. The Review of Financial Studies, 30(12), 4349-4388.海外文献推荐-第二十七期参考文献:[1]Ray Dalio, Bob Prince, Greg Jensen (2015), our thoughts about risk parity and all weather, Bridgewater Associates, LP[2]Thierry, R. and Guillaume, W. (2013). Risk Parity Portfolios with Risk Factors. MPRA Paper No. 44017.海外文献推荐-第二十八期参考文献:[1] Golubov, A., & Konstantinidi, T. (2015). Where is the risk in value? evidence from a market-to-book decomposition. Social Science Electronic Publishing.[2] Moreira, A., and Muir, T. (2017). Volatility‐Managed Portfolios. Journal of Finance, 72(4).海外文献推荐-第二十九期参考文献:[1]Wahalab S. Style investing, comovement and return predictability ☆[J]. Journal of Financial Economics, 2013, 107(1).[2]Pástor Ľ, Stambaugh R F, Taylor L A. Do funds make more when they trade more?[J]. The Journal of Finance, 2017, 72(4): 1483-1528.海外文献推荐-第三十期参考文献:[1] K Hou, C Xue, L Zhang, Digesting Anomalies: An Investment Approach, NBER Working Papers, 2015, 28(3)[2]Berk, J. B., & Binsbergen, J. H. V. (2013). Measuring skill in the mutual fund industry. Journal of Financial Economics, 118(1), 1-20.海外文献推荐-第三十一期参考文献:[1]Klein, Rudolf F. and V. K. Chow. "Orthogonalized factors and systematic risk decomposition." Quarterly Review of Economics & Finance 53.2(2013):175-187.[2]Sorensen E H, Hua R, Qian E E. Contextual Fundamentals, Models, and Active Management[J]. Journal of Portfolio Management 32.1(2005):23-36.海外文献推荐-第三十二期参考文献:[1] Hong, H. Torous, W. & Valkanov, R. (2007). Do industries lead stock markets? Journal of Financial Economics,83 (2), 367-396.[2]Dhillon, J. Ilmanen, A. & Liew, J. (2016). Balancing on the life cycle: target-date funds need better diversification. Journal of Portfolio Management, 42(4), 12-27.海外文献推荐-第三十三期参考文献:[1]Kenneth Froot and Melvyn Teo, Style Investing and Institutional Investors, JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS V ol. 43, No. 4, Dec. 2008, pp. 883–906.[2]Israel R, Palhares D, Richardson S A. Common factors in corporate bond returns[J]. Social Science Electronic Publishing, 2015.海外文献推荐-第三十四期参考文献:[1] DM Smith, N Wang, Y Wang, EJ Zychowicz, Sentiment and the Effectiveness of Technical Analysis: Evidence from the Hedge Fund Industry,Journal of Financial & Quantitative Analysis, 2016 , 51 (6) :1991-2013[2]Ronen Israel, Sarah Jiang, and Adrienne Ross (2018). Craftsmanship Alpha: An Application to Style Investing. Journal of Portfolio Management.海外文献推荐-第三十五期参考文献:[1] Huang J. The customer knows best: The investment value of consumer opinions [J]. Journal of Financial Economics, 2018.[2]Alberg J, Lipton Z C. Improving Factor-Based Quantitative Investing by Forecasting Company Fundamentals, Time Series Workshop at the 31st Conference on Neural Information Processing Systems (NIPS 2017). 2017.海外文献推荐-第三十六期参考文献:[1] Davis, J. H., Aliagadiaz, R. A., Ahluwalia, H., & Tolani, R. (2017). Improving U.S. stock return forecasts: a 'fair-value' cape approach.Social Science Electronic Publishing.海外文献推荐-第三十七期参考文献:[1] Fama, E. F., & French, K. R.(2018). Choosing factors. Journal of Financial Economics, 128: 234–252.[2] Bruder, Benjamin, Culerier, Leo, & Roncalli, Thierry. (2013). How to design target-date funds?. Ssrn Electronic Journal.海外文献推荐-第三十八期参考文献:[1] David Aboody, Omri Even-Tov, Reuven Lehavy, Brett Trueman. (2018). Overnight Returns and Firm-Specific Investor Sentiment. Journal of Financial and Quantitative Analysis.[2] Arnott R, Beck N, Kalesnik V, et al. How Can 'Smart Beta' Go Horribly Wrong?[J]. Social Science Electronic Publishing, 2017.海外文献推荐-第三十九期参考文献:[1] CS Asness, A Frazzini, LH PedersenDM, 2013,Quality Minus Junk,Social Science Electronic Publishing[2] Stein, M, & Rachev, S. T. (2011). Style-neutral funds of funds: diversification or deadweight? Journal of Asset Management, 11(6), 417-434.海外文献推荐-第四十期参考文献:[1] Li Y, Sun Q, Tian S. The impact of IPO approval on the price of existing stocks: Evidence from China[J]. Journal of Corporate Finance, 2018.[2] Jennifer Bender,Xiaole Sun,Ric Thomas,V olodymyr Zdorovtsov, The Journal of Portfolio Management , 2018 , 44 (4) :79-92海外文献推荐-第四十一期参考文献:[1] Yi Fang & Haiping Wang (2015) Fund manager characteristics and performance, Investment Analysts Journal, 44:1, 102-116.[2] Roni Israelov, Harsha Tummala. An Alternative Option to Portfolio Rebalancing. The Journal of Derivatives Spring 2018, 25 (3) 7-32海外文献推荐-第四十二期参考文献:[1] Robert Capone, Adam Akant, (2016), Trend Following Strategies in Target-Date Funds, AQR Capital Management.[2] Loh, R. K., & Stulz, R. M. (2018). Is sell‐side research more valuable in bad times?. Journal of Finance, 73(3): 959-1013.海外文献推荐-第四十三期参考文献:[1] Asness, C. S., Frazzini, A., Israel, R., & Moskowitz, T. J. (2015). Fact, fiction, and value investing. Final version published in Journal of Portfolio Management, V ol. 42, No.1[2] Gu, S., Kelly, B. T., & Xiu, D. (2018). Empirical asset pricing via machine learning. Social Science Electronic Publishing.海外文献推荐-第四十四期参考文献:[1] David P. Morton, Elmira Popova, Ivilina Popova, Journal of Banking & Finance 30 (2006) 503–518海外文献推荐-第四十五期参考文献:[1] Lleo, S., & Ziemba, W. T. (2017). A tale of two indexes: predicting equity market downturns in china. Social Science Electronic Publishing海外文献推荐-第四十六期参考文献:[1] Alquist, R., Israel, R., & Moskowitz, T. J. (2018). Fact, fiction, and the size effect. Social Science Electronic Publishing.[2] Kacperczyk M, NIEUWERBURGH S V A N, Veldkamp L. Time-varying fund manager skill[J]. The Journal of Finance, 2014, 69(4): 1455-1484.海外文献推荐-第四十七期参考文献:[1] Tom Idzorek, 2008, Lifetime Asset Allocations: Methodologies for Target Maturity Funds, Ibbotson Associates Research Paper,29-47[2] Da, Z., Huang, D., & Yun, H. (2017). Industrial electricity usage and stock returns. Journal of Financial & Quantitative Analysis, 52(1), 37-69.海外文献推荐-第四十八期参考文献:[1] Clifford Asness and Andrea Frazzini, 2013, The Devil in HML’s Details, The Journal of Portfolio Management, volume 39 number 4.[2] Carvalho, R. L. D., Xiao, L., & Moulin, P. (2011). Demystifying equity risk-based strategies: a simple alpha plus beta description.Journal of Portfolio Management,38(3), 56-70.海外文献推荐-第四十九期参考文献:[1]Jordan Brooks, Diogo Palhares, Scott Richardson, Style investing in fixed income, Journal of Portfolio Management.[2] R Ball,J Gerakos,JT Linnainmaa,V Nikolaev,2015,Deflating profitability,Journal of Financial Economics, 117 (2) :225-248海外文献推荐-第五十期参考文献:[1] Padmakar Kulkarni, Abhishek Gupta, Stuart Doole, 2018, How can Factors be Combined, MSCI.[2] Hsieh, C. C., Hui, K. W., & Zhang, Y. (2016). Analyst report readability and stock returns. Journal of Business Finance & Accounting, 43(1-2), págs. 98-130.海外文献推荐-第五十一期参考文献:[1] Cici G, Rosenfeld C. A study of analyst-run mutual funds: The abilities and roles of buy-side analysts [J]. Journal of Empirical Finance, 2016, 36:8-29.[2] U-Wen Kok, CFA, Jason Ribando, CFA, and Richard Sloan Facts about Formulaic Value Investing Financial Analysts Journal. V olume 73, Issue 2海外文献推荐-第五十二期参考文献:[1] Morningstar Manager Research.(2018)Target-Date Fund Landscape. 7 May 2018[2] Yong Chen, Gregory W. Eaton, Bradley S. Paye, Micro(structure) before Macro? The Predictive Power of Aggregate llliquidity for Stock Returns and Economic Activity, Journal of Financial Economics (2018), doi: 10.1016/j.jfineco.2018.05.011海外文献推荐-第五十三期参考文献:[1]Arnott R D, Chaves D B, Chow T. King of the Mountain:, Shiller P/E and Macroeconomic Conditions[J]. Social Science Electronic Publishing, 2015, 44(1):55-68.[2]Risk Parity Portfolio vs. Other Asset Allocation Heuristic Portfolios [J]. The Journal of Investing. 2010 December海外文献推荐-第五十四期参考文献:[1]Cliff's Perspective, Our Model Goes to Six and Saves Value From Redundancy Along the Way,AQR Capital Management, December 17, 2014[2]D Avramov,S Cheng,A Schreiber,K Shemer,2017,Scaling up Market Anomalies,Social Science Electronic Publishing,26 (3) :89-105海外文献推荐-第五十五期参考文献:[1]Aurélien Philippot,Analysts’ reinitiations of coverage and market underreaction,Journal of Banking and Finance , 94 (2018) 208–220海外文献推荐-第五十六期参考文献:[1]Michael W. Brandt, Earnings Announcements are Full of Surprises,Social Science Electronic Publishing, January 22, 2008[2]Sujin Pyo, Jaewook Lee,Exploiting the low-risk anomaly using machine learning to enhance the Black–Litterman framework: Evidence from South Korea,Pacific-Basin Finance Journal,51 (2018) 1–12[3]Robert F Engle and Andrew J Patton,What good is a volatility model?,Robert F Engle and Andrew J Patton海外文献推荐-第五十七期参考文献:[1]Nic Schaub, The Role of Data Providers as Information Intermediaries,Social Science Electronic Publishing, 2015 :1-34海外文献推荐-第五十八期参考文献:[1]Binu George and Hardik Shah, ESG: Improving Your Risk-Adjusted Returns in Emerging Markets,GMO White Paper, Mar 2018海外文献推荐-第五十九期参考文献:[1]Campbell R. Harvey and Yan Liu. Backtesting. Journal of portfolio management, 2015海外文献推荐-第六十期参考文献:[1]Mclean R D, Pontiff J. Does Academic Research Destroy Stock Return Predictability?[J]. Journal of Finance, 2016, 71(1)海外文献推荐-第六十一期参考文献:[1]Israelov R, Tummala H. Which Index Options Should You Sell?[J]. Social Science Electronic Publishing, 2017海外文献推荐-第六十二期参考文献:[1]Eric H. Sorensen, Keith L. Miller, and Chee K. Ooi,2000,The Decision Tree Approach to Stock Selection,The Journal of Portfolio Management,42-52海外文献推荐-第六十三期参考文献:[1]Donangelo A, Gourio F, Kehrig M, et al. The cross-section of labor leverage and equity returns[J]. Journal of Financial Economics, 2018海外文献推荐-第六十四期参考文献:[1]Qang Bu. Do Persistent Fund Alphas Indicate Manager Skill? [J]. Journal of Wealth Management,2017,20(2)82-93海外文献推荐-第六十五期参考文献:[1]Miguel A. Lejeune A VaR Black–Litterman model for the construction of absolute return fund-offunds [J] Quantitative Finance · January 2009海外文献推荐-第六十六期参考文献:[1]Fan J H, Zhang T. Demystifying Commodity Futures in China [J]. Social Science Electronic Publishing, 2018海外文献推荐-第六十七期参考文献:[1]Jon Hale, Sustainable Funds U.S. Landscape Report. Morningstar Research, 2018.海外文献推荐-第六十八期参考文献:[1]Sun Z, Wang A, Zheng L. Only Winners in Tough Times Repeat: Hedge Fund Performance Persistence over Different Market Conditions[J]. Journal of Financial and Quantitative Analysis, 2018.海外文献推荐-第六十九期参考文献:[1] A´LVARO CARTEA,SEBASTIAN JAIMUNGAL. RISK METRICS AND FINE TUNING OF HIGH-FREQUENCY TRADING STRATEGIES [J]. Mathematical Finance, V ol. 00, No. 0 (xxx 2013), 1-36.海外文献推荐-第七十期参考文献:[1] Dopfel, Frederick E. , and L. Ashley . "Optimal Blending of Smart Beta and Multifactor Portfolios." The Journal of Portfolio Management 44.4(2018):93-105.海外文献推荐-第七十一期参考文献:[1] Avraham Kamara, Robert Korajczyk, Xiaoxia Lou and Ronnie Sadka,2018,Short-Horizon Beta or Long-Horizon Alpha?, The Journal of Portfolio Management,45(1),96-105海外文献推荐-第七十二期参考文献:[1] Masulis, Ronald W., and Emma Jincheng Zhang. "How valuable are independent directors? Evidence from external distractions." Journal of Financial Economics (2018).海外文献推荐-第七十三期参考文献:[1] Hunter D, Kandel E, Kandel S, et al. Mutual fund performance evaluation with active peer benchmarks[J]. Journal of Financial economics, 2014, 112(1): 1-29.海外文献推荐-第七十四期参考文献:[1]Michael Stein and Svetlozar T. Rachev. Style Neutral Funds of Funds: Diversification or Deadweight? [J]. Journal of Asset Management, February 2011, V olume 11, Issue 6, pp 417–434海外文献推荐-第七十五期参考文献:[1] Elisabeth Kashner, 2019.01.31, Bogle led this investing Fee War, ;[2] Cinthia Murphy,2017,03.31, how to launch a successful ETF, ;[3] Drew V oros, 2019.01.23, how a small ETF Issuer Competes, ;[4] 2019.01.04, Invesco focusing on scale,海外文献推荐-第七十六期参考文献:[1] Shpak I , Human B , Nardon A . Idiosyncratic momentum in commodity futures[J]. Social Science Electronic Publishing, 2017.海外文献推荐-第七十六期参考文献:[1] Ehsani S , Linnainmaa J T . Factor Momentum and the Momentum Factor[J]. Social Science Electronic Publishing, 2017.海外文献推荐-第七十七期参考文献:[1] Iuliia Shpak*, Ben Human and Andrea Nardon. 2017.09.11, Idiosyncratic momentum in commodity futures. ResearchGate海外文献推荐-第七十八期参考文献:[1] Joel Hasbrouck. High-Frequency Quoting: Short-Term V olatility in Bids and Offers. JOURNAL OF FINANCIAL AND QUANTITATIVE ANALYSIS海外文献推荐-第七十九期参考文献:[1] Tarun Gupta and Bryan Kelly. Factor Momentum Everywhere. Institutional Investor Journals海外文献推荐-第八十期参考文献:[1] MICHAEL A. BABYAK , P H D. What You See May Not Be What You Get: A Brief, Nontechnical Introduction to Overfitting in Regression-Type Models. S T A T I S T I C A L C O R N E R海外文献推荐-第八十一期参考文献:[1] Eric Jondeau , Qunzi Zhang , Xiaoneng Zhu. Average Skewness Matters.海外文献推荐-第八十二期参考文献:[1] JOHN A. HASLEM. Morningstar Mutual Fund Measures and Selection Model. THE JOURNAL OF WEALTH MANAGEMENT海外文献推荐-第八十三期参考文献:[1] EUGENE F. FAMA and KENNETH R. FRENCH. Luck versus Skill in the Cross-Section of Mutual Fund Returns. THE JOURNAL OF FINANCE海外文献推荐-第八十四期参考文献:[1] How Transparent Are ETFs?[2] Lara Crigger. Nontransparent Active: Next ETF Revolution?.海外文献推荐-第八十五期参考文献:[1] Olivier Rousse and Benoît Sévi. Informed Trading in Oil-Futures Market. Fondazione Eni Enrico Mattei (FEEM)海外文献推荐-第八十六期参考文献:[1] Ari Levine and Lasse Heje Pedersen. Which Trend is Your Friend?。
2025年全国大学英语CET四级考试模拟试卷及答案指导一、写作(15分)Writing (30 points)Part A (10 points)Directions: For this part, you are allowed 30 minutes to write an essay on the topic “The Impact of Technology on Education”. You should write at least 120 words and base your essay on the outline given below:1.Briefly describe the role of technology in modern education.2.Discuss the positive effects of technology on education.3.Present some challenges faced by technology in education.4.Give your own opinion on how to effectively integrate technology into education.Example:The Impact of Technology on EducationIn the 21st century, technology has become an indispensable part of our lives, and its influence on education is no exception. Technology has transformed the way we learn and teach, bringing both benefits and challenges.Firstly, technology has significantly enhanced the role of education. Withthe advent of the internet, students can access a vast amount of information from all over the world, which broadens their horizons and deepens their understanding of various subjects. Moreover, educational technology tools, such as online learning platforms, virtual classrooms, and interactive software, have made learning more engaging and personalized.The positive effects of technology on education are numerous. For one, it allows for flexibility in learning, as students can study at their own pace and schedule. Additionally, technology can help students with special needs, such as those with disabilities, by providing customized learning materials and resources.However, technology in education also poses challenges. One major concern is the digital divide, where students from low-income families may not have access to the necessary technology. Another challenge is the potential for technology to distract students from their studies, leading to decreased focus and productivity.In my opinion, to effectively integrate technology into education, schools should ensure that all students have equal access to technology resources. Moreover, teachers should be trained to use technology appropriately to enhance learning outcomes. Additionally, parents and students should be educated on the responsible use of technology to avoid its negative consequences.Part B (20 points)Directions: For this part, you are allowed 30 minutes to write a letter.Suppose you are Zhang Wei, a student of English at a university. You have just won a scholarship to study in the UK for one year. Write a letter to your friend Li Hua, who is planning to apply for the same scholarship. In your letter, you should:1.Congratulate Li Hua on his success in the application.2.Share your experiences and advice for applying for the scholarship.3.Express your hopes for Li Hua’s success in the future.Example:Dear Li Hua,I hope this letter finds you well. I am writing to share some exciting news with you. I have just won a scholarship to study in the UK for one year, and I couldn’t be more thrilled!I want to start by congratulating you on your success in the application process. It’s fantastic to see that you have achieved such a commendable goal.I am sure that your hard work and dedication have paid off.Now, I would like to share some of my experiences and advice for applying for the scholarship. Firstly, it’s essential to thoroughly research the scholarship program and ensure that your application meets all the requirements. Secondly, make sure to highlight your achievements, skills, and experiences that are relevant to the scholarship. Thirdly, be prepared for the interview process, as it is often a crucial step in securing the scholarship.I am confident that you will do exceptionally well in your application. Yourpassion for learning and your determination to excel make you a perfect candidate for this opportunity. I hope that you will follow in my footsteps and achieve great success.Lastly, I wish you all the best in your future endeavors. I am looking forward to hearing about your success story soon.Best regards,Zhang Wei二、听力理解-短篇新闻(选择题,共7分)第一题新闻内容:A new study conducted by the National Institute of Health has found that regular exercise can significantly improve the cognitive function of elderly individuals. The study involved 1,500 participants aged 60 or over, who were divided into two groups. The first group was asked to engage in at least 30 minutes of moderate-intensity aerobic exercise, such as walking or cycling, three times a week. The second group was asked to maintain their current lifestyle with no additional exercise. After one year, the study found that the group participating in regular exercise showed a 30% improvement in their cognitive scores, compared to the group that did not exercise.The researcher, Dr. John Smith, explained that the improvement was particularly noticeable in areas such as memory and problem-solving skills. Headded that the benefits were consistent regardless of the type of exercise performed, as long as the participants adhered to a regular routine.题目:1、What was the main finding of the study conducted by the National Institute of Health?A)Regular exercise can improve the cognitive function of elderly individuals.B)Walking and cycling have different effects on cognitive function.C)The benefits of regular exercise are only seen in people under 60.答案:1、A) Regular exercise can improve the cognitive function of elderly individuals.第二题News Item OneThe popular cartoon character, Tom and Jerry, might soon become a major player in the movie industry. According to a recent report, a new live-action film adaptation of the classic cartoon series is in the works. The movie is expected to be a blend of animated and live-action sequences, with well-known actors set to voice the iconic characters. The producers announced that they have s ecured a major deal with a top Hollywood studio to finance the film’s production. The film is scheduled for release in the fall of 2023.Questions:1、Who will voice the iconic characters in the upcoming live-action film adaptation of Tom and Jerry?A) Unknown actorsB) Well-known actorsC) Famous singersD) Rising stars2、What will the new live-action Tom and Jerry film be a blend of?A) Live-action and animated sequencesB) entirely live-action sequencesC) entirely animated sequencesD) live-action and silent sequences3、When is the movie set for release?A) winter of 2023B) summer of 2023C) fall of 2023D) spring of 2024Answers:1.B2.A3.C三、听力理解-长对话(选择题,共8分)第一题听力原文:M: Hi, Linda, how was your vacation in Beijing?W: It was fantastic! I visited the Forbidden City, the Great Wall, and the Summer Palace. The architecture was amazing.M: Really? I’ve heard the Great Wall is a must-see. Did you go there?W: Yes, I did. It was quite an experience. The wall is so long and the scenery along the way is stunning.M: Did you take any photos?W: Of course. I took a lot of photos, but the best one was the view of the wall from a distance.M: That sounds great. I hope to visit Beijing one day. It’s such a historic city.W: You sh ould definitely go. It’s a place you won’t forget.选择题:1、What is the main topic of the conversation?A) The woman’s vacation in BeijingB) The woman’s favorite place in BeijingC) The man’s plan to visit BeijingD) The architecture of Beijing2、Which place did the woman visit first during her vacation?A) The Forbidden CityB) The Great WallC) The Summer PalaceD) The man’s house3、How did the woman feel about the Great Wall?A) She was boredB) She was disappointedC) She was amazedD) She was afraid4、W hat does the woman suggest about the man’s plan to visit Beijing?A) He should wait until next yearB) He should bring a cameraC) He should go on a guided tourD) He should not expect it to be as memorable as the woman’s trip答案:1、A2、A3、C4、D第二题Directions:In this section, you will hear six dialogues. Each dialogue will be spoken only once. After each dialogue, you will be asked a question about what was said. The dialogues and questions will be spoken two times. Choose the best answer from the four choices marked A, B, C and D.DialogueWoman: Hi, Tom. Do you like the new restaurant we went to last night? Man: Yes, I do. The food was great and the atmosphere was perfect. Woman: Did you see the girl at the corner table with long curly hair? Man: Yes, I did. She was very attractive, wasn’t she?Woman: Yes, what a nice dress she was wearing!Man: And I think her date was a bit rough around the edges.Woman: Poor guy. I heard he works in IT, but he seems to have a rough disposition. Man: Hey, what time is it? I have to catch the last train back to our college. Woman: It’s a quarter to ten. We have plenty of time, don’t worry.Questions1、What activity were they discussing?A、A new store opening in the area.B、A movie they watched together.C、A meal they had at a restaurant.D、A book they read recently.2、What can we learn about the girl from the dialogue?A、She came with a friend who had a difficult personality.B、She arrived late and missed the train.C、She worked in IT.D、She preferred to sit at the corner table.3、What is the man’s concern?A、They need to finish their homework.B、They have limited time to meet their friends.C、They need to get back to their college.D、They need to buy something for a party.4、What does the woman imply about the man?A、He has a strong will.B、He is quite friendly.C、He is a bit rushed.D、He is considerate.Answers1、C、2、A、3、C、4、C、四、听力理解-听力篇章(选择题,共20分)第一题Title: The Story of the Great Wall of ChinaIntroduction:The Great Wall of China is one of the most remarkable architectural achievements in human history. Stretching over 21,196 kilometers, it was built to protect the Chinese empire from invasions. Its construction began over 2,200 years agoand was completed over a period of several centuries.Text:In the 7th century B.C., warlords built the initial wall to safeguard their kingdoms. However, it was Emperor Qin Shi Huang who initiated the expansion of the wall into the grand structure it is today. Over two million workers, including soldiers, convicts, and local people, contributed to its construction. The wall is made up of bricks, tamped earth, and wood, depending on the region. It is equipped with watchtowers, camps, and signal stations to allow for communication and quick military response.Despite its defensive purpose, the Great Wall has also been a symbol of strength and unity for China. Over the centuries, it has faced numerous challenges, including natural erosion, human vandalism, and relentless weathering by wind and rain.Questions:1、What is the primary purpose of the Great Wall of China?A. It served as a toll road.B. It was constructed for military protection.C. It was built as a monument to the emperor.D. It served as a trade corridor.2、Who initiated the expansion of the wall into the grand structure it is today?A. The warlords of the 7th centuryB.C.B. Emperor Qin Shi HuangC. Local peopleD. Soldiers3、According to the passage, what material primary composed the Great Wall?A. StoneB. Brick, tamped earth, and woodC. Iron and steelD. Wood and leatherAnswers:1、B. It was constructed for military protection.2、B. Emperor Qin Shi Huang3、B. Brick, tamped earth, and wood第二题Passage OneYou probably know that the Great Wall of China is the most famous ancient architectural wonder in the world. It is also one of the longest man-made structures ever built. The Great Wall was built over a period of more than 2,000 years. It was originally constructed to protect the Chinese Empire from invasions by various nomadic groups from the north.The construction of the Great Wall began in the 7th century BC, during the Warring States period. It was mainly built of earth and stone. Over time, different dynasties added their own sections to the wall, which resulted in thevarious styles and designs we see today.1、What was the primary purpose of building the Great Wall?A) To serve as a tourist attraction.B) To protect the Chinese Empire from invasions.C) To expand the territory of the Chinese Empire.D) To store food and water for the soldiers.2、When did the construction of the Great Wall begin?A) During the Han Dynasty.B) During the Warring States period.C) During the Tang Dynasty.D) During the Qing Dynasty.3、What materials were mainly used in the construction of the Great Wall?A) Iron and wood.B) Marble and glass.C) Earth and stone.D) Concrete and steel.Answers:1、B) To protect the Chinese Empire from invasions.2、B) During the Warring States period.3、C) Earth and stone.第三题Listening Comprehension - PassagePassage: During the early years of World War II, a British civilian, named John Smith, found himself stationed in a British base in the Middle East. He was assigned to a group tasked with providing support to soldiers. One day, he heard about an opportunity to provide intelligence support to Allied forces by secretly gathering and delivering intelligence to allied bases. Initially, John was skeptical about the proposal, but when he learned that the information could significantly impact the war effort, he decided to take a risk. John was given a cipher machine and instructed to deliver intelligence to a nearby allied camp located in a remote area. The camp was known to be under constant surveillance, making the mission dangerous. Despite the risks, John felt a strong sense of duty and embarked on his mission.1、Why did John Smith initially hesitate to take the opportunity to provide intelligence support?A)He was unsure about the safety of the mission.B)He thought the information was not useful.C)He was concerned about the complexity of the cipher machine.D)He was skeptical about the proposal.Answer: D2、What was the primary motivation for John Smith to accept the mission?A)He wanted to prove his bravery.B)He thought it would bring him fame.C)He was afraid of being assigned to a menial task.D)He felt a strong sense of duty.Answer: D3、What made John Smith’s mission to the allied camp particularly dangerous?A)The remote location of the camp.B)The constant surveillance of the camp.C)The high level of security at the British base.D)The complexity of the cipher machine.Answer: B五、阅读理解-词汇理解(填空题,共5分)第一题Reading PassageThe modern office environment is a product of the Industrial Revolution. With the advent of machines, employees were no longer required to perform manual labor. They were now expected to multitask, communicating with colleagues, managing emails, and using a variety of technologies. This shift in the nature of work required employees to develop new skills and adapt to a more dynamic work environment. As a result, companies began to emphasize the importance of education and training for their employees. Today, the office environment is characterized by the presence of diverse technology, increasing workloads, and the need for continuous professional development.Vocabulary Understanding1、The shift in the nature of work required employees to_________to a moredynamic work environment.a.adhere tob.adapt2、The Industrial Revolution led to the_________of machines, which changed the way employees worked.a.manifestationb.development3、Employees in the modern office environment are expected to_________multiple tasks, such as communicating and using technology.a.reflectb.multitask4、One of the reasons companies began to emphasize education and training is because they wanted their employees to_________the new skills required in the modern work environment.a.acquireb.maintain5、The office environment today is characterized by the presenceof_________technology, diverse workloads, and the need for professional development.a.variedb.advanced第二题The following passage is followed by some questions or unfinished statements, each with four suggested answers. Choose the one that fits best according tothe passage.The Internet has become an integral part of our daily lives. From shopping and banking to communication and entertainment, we rely on it for a variety of purposes. However, along with its benefits, the Internet also brings along some challenges that we need to be aware of.1、( ) 1. The word “integral” in the first se ntence can be best replaced by:a) indispensableb) occasionalc) occasionald) occasional2、( ) 2. The phrase “a variety of purposes” in the second sentence can be replaced by:a) many different usesb) limited usesc) common usesd) single use3、( ) 3. T he word “challenges” in the second paragraph can be defined as:a) opportunitiesb) problemsc) benefitsd) solutions4、( ) 4. The sentence “However, along with its benefits, the Internet also brings along some challenges” suggests that:a) the Internet has no negative aspectsb) the Internet is purely beneficialc) the Internet has both positive and negative aspectsd) the Internet is a source of frustration5、( ) 5. The word “aware” in the last sentence can be best replaced by:a) knowledgeableb) indifferentc) unawared) uninterestedAnswers:1、a) indispensable2、a) many different uses3、b) problems4、c) the Internet has both positive and negative aspects5、a) knowledgeable六、阅读理解-长篇阅读(选择题,共10分)First QuestionReading PassageMachine Learning: Tackling the Big Data DilemmaWith the rapid growth of data generation due to the increasing use of smartphones, the Internet of Things (IoT), and social media, industries face a major challenge in managing and analyzing this Big Data. Traditional data processing methods are no longer sufficient to handle the sheer volume of data being generated. Machine learning (ML) provides a solution by allowing computers to learn from data without explicit programming, enabling them to make predictions, recognize patterns, and improve their performance over time.One of the most prevalent applications of ML is in recommendation systems, used by social media platforms and e-commerce websites to suggest content or products to users. This system analyzes user behavior and preferences, then recommends items that might be of interest. Another application is in healthcare, where ML can be used to predict patient outcomes and identify potential health issues before they become serious.However, ML also has its challenges. One of the major issues is the need for large amounts of high-quality data, which can be time-consuming and expensive to gather. Additionally, ML models are often opaque, making it difficult for users to understand how their data is being used and what insights are being extracted from it. Ethical concerns also arise, such as the potential for biased predictions based on flawed or biased training data.1、Which of the following is the main idea of the passage?1、The role and challenges of machine learning in data analysis2、The importance of data quality in machine learning3、The ethical concerns surrounding machine learning4、The applications of machine learning in various industriesAnswer: 1、2、What is one of the major challenges of using machine learning in data analysis?2、The need for high-quality data3、Lack of transparency in the decision-making process4、Ethical concerns5、The cost of data storageAnswer: 2、3、Which application of machine learning is mentioned in the passage?3、Recommendation systems4、Image recognition5、Fraud detection6、Speech recognitionAnswer: 3、4、What is a potential problem with machine learning models as described in the passage?4、They require large amounts of data5、They are difficult to develop6、They are too transparent7、They are ineffective in large datasetsAnswer: 4、5、What does the passage suggest as a key challenge for using machine learning in healthcare?5、The need to predict patient outcomes6、The potential for biased predictions7、The difficulty in gathering patient data8、The complexity of healthcare dataAnswer: 6第二题Many factors contribute to the high rate of childhood obesity in the United States. One significant factor is the environment in which children live and grow. This passage discusses various aspects of the environment that contribute to childhood obesity and proposes some solutions.Structured neighborhoods without sidewalks, playgrounds, or safe routes to school discourage physical activity and increase the likelihood of obesity. Children spend more time sitting in front of screens, playing video games or watching television, rather than engaging in active play. Access to fast food restaurants is abundant, making it easy for families to choose high-calorie, low-nutrition m eals. Finally, parental involvement in children’s activities has decreased, leading to a lack of guidance and监督 in healthy lifestyles.Solutions to address childhood obesity involve a multi-faceted approach.For example, communities could redesign their neighborhoods to include more parks and playgrounds, sidewalks, and safe walking routes to schools. School districts could promote physical education and after-school sports programs to encourage children to be active. Additionally, parents can be involved in creating healthy eating environments by planning family meals, setting a healthy menu, and limiting screen time.Reading the passage, answer the questions below:1、What is one of the factors contributing to childhood obesity according to the passage?A、Lack of physical activityB、Excessive screen timeC、Parental involvementD、High-calorie fast food2、How does the environment in which children live contribute to obesity?A、It encourages physical activity and leads to healthier lifestyles.B、It discourages physical activity and increases the likelihood of obesity.C、It provides access to healthy food and exercise facilities.D、It promotes healthy eating and physical exercise through community programs.3、What is one solution proposed to address childhood obesity?A、Designing neighborhoods with more parks and playgrounds.B、Reducing the number of fast food restaurants.C、Increasing parental involvement in children’s activities.D、Strengthening physical education programs in schools.4、What is the author’s view on the role of parents in their children’s healthy lifestyles?A、Parents have no influence on their children’s lifestyle choices.B、Parents should strictly regulate their children’s screen time.C、Parents play a crucial role in creating and maintaining a healthy home environment.D、Parents should prioritize physical education over other extracurricular activities.5、Which of the following statements is NOT mentioned in the passage as a factor contributing to childhood obesity?A、Lack of physical activityB、Increased screen timeC、Healthy school meal programsD、Reduced parental involvementAnswer Key:1、A2、B3、A4、C5、C七、阅读理解-仔细阅读(选择题,共20分)第一题Reading Passage 1Questions 1 to 5 are based on the following passage.In the United States, the four-year college degree is the most common form of higher education. However, in recent years, there has been a growing interest in alternative forms of higher education. One of these alternatives is the two-year community college, which provides a less expensive and more flexible option for students.Community colleges offer a variety of courses, from basic academic subjects to vocational training. Many students choose to attend community colleges because they are less expensive than four-year institutions. Additionally, community colleges often have more flexible schedules, which allow students to work or take care of family responsibilities while pursuing their education.Despite the benefits of community colleges, there are some challenges associated with them. One of the main challenges is the lack of resources compared to four-year colleges. For example, community colleges may have fewer faculty members, smaller libraries, and less advanced technology. This can make it difficult for students to receive the level of education they desire.Another challenge is the perception that community colleges are less prestigious than four-year colleges. This perception can make it difficult for students to transfer to four-year institutions after completing their two-yearprograms. However, many community colleges have agreements with four-year colleges that allow students to transfer easily and continue their education.The following questions are based on the above passage.1、What is the main topic of the passage?A. The importance of a four-year college degreeB. The growing interest in alternative forms of higher educationC. The challenges faced by students attending community collegesD. The benefits of attending a community college2、Why do many students choose to attend community colleges?A. They offer advanced technologyB. They provide a less expensive and more flexible optionC. They have prestigious faculty membersD. They have larger libraries3、Which of the following is a challenge associated with community colleges?A. They have more faculty members than four-year collegesB. They offer vocational trainingC. They have fewer resources than four-year collegesD. They have more flexible schedules4、What is one way community colleges are trying to overcome the perception of being less prestigious?A. They are increasing their tuition feesB. They are improving their technologyC. They are entering into agreements with four-year collegesD. They are offering more academic courses5、What can be inferred about the future of community colleges from the passage?A. They will become more expensive and less flexibleB. They will become less common and more prestigiousC. They will continue to grow in popularity and importanceD. They will merge with four-year collegesAnswers:1、B2、B3、C4、C5、C第二题PassageThe world of technology is rapidly evolving, and artificial intelligence (AI) is at the forefront of this change. AI has a wide range of applications in different fields, including healthcare, finance, manufacturing, and transportation. One of the most significant areas of AI development is natural language processing (NLP), which allows machines to understand and process human language in a more sophisticated and nuanced way. This has led to the creationof virtual assistants, chatbots, and language translators that can assist businesses and individuals in diverse ways. However, with the rapid development of AI, concerns about ethics and privacy have also risen.1、Which of the following fields is NOT mentioned as an application area of AI in the passage?A、HealthcareB、FinanceC、ManufacturingD、EducationAnswer: D2、What does NLP allow machines to do?A、Understand and process human language in a sophisticated and nuanced way.B、Create visual images.C、Perform physical tasks.D、Drive autonomous vehicles.Answer: A3、What kind of assistance can virtual assistants and chatbots provide?A、Technical support for computer problems.B、Assistance in diverse ways for businesses and individuals.C、Financial management.D、Medical diagnosis.Answer: B。
Hilton WorldwideRevenue Management Standards – The Americas Updated: 2009Table of ContentsFinancial Review (7)Actual Monthly Performance (7)Systems Balancing (7)Weekly Forecast (8)Group Forecast Development Standards (8)Transient Forecast Development Standards (8)Exporting the Forecast (9)Forecast Accuracy (9)Market Conditions / Competition Analysis (10)Determining Competitive Set for STAR Reports (10)Value Assessments (10)Strengths, Weaknesses, Opportunities, Threats Analysis (SWOT) (10)Competitive Factors/ Assessment (11)Competitive Shopping Tools (11)Competitive Pressure Calendar (11)Pricing Strategy (12)Best Available Rates (BAR) (12)Seasonality (12)Length of Stay Controls (12)Price Resistance - Denials (13): Best Rate Strategy (13)SRP Placement (14)Best Rate Guarantee (14)Packages and Promotions – Administration/ Analysis (15)Premium Room Type Strategy (16)Distressed and Holiday Strategy (16)Inventory Management - (18)SRP Build and Auditing procedures (18)SRP Build- Cut-off Date Procedures (18)SRP Build- Room Types (19)SRP Build- SRP Types (19)Room Type Consistent Availability (19)53rd Week Controls (20)Overbooking (20)Hhonors- Inventory Management and reimbursement procedures (20)Rate Override (20)Validating Qualified Rates (20)Night Audit Activity -Market Category Audit (21)Kiosk Configuration (21)Revenue Management Business Practices (22)Revenue Management Meeting (22)Toolkit use (22)Toolkit Use- Minimum Tool Usage (22)Checklists (23)Document Retention (23)Report Usage- Systems (23)Booking Pace (23)OnQ RM Usage- (23)Revenue Management Support (24)Negotiated Account Review (24)Loaded and Bookable in the GDS and CRS (24)Account Evaluation Standards for renewal of existing accounts (24)Hotelligence- (24)Group Revenue Management (26)RM Training for Sales Managers (26)Communication with the Sales Department (26)Inventory Management- SRP Setup (28)Inventory Management Audit Systems Delphi vs. CRS (28)Group Complimentary and Staff Rooms (29)Inventory Management- Group Block (30)Cut-off dates procedures (30)Group Pick-up Meeting (31)eEvents (32)Group Rates/Selective Sell Guideline Rates (SSG)- (33)Transient Protected- (34)Displacement Analysis- Group MCATs (34)Displacement Analysis – Permanent, Contract or Extended Stay (35)Distribution-Channel Management (36)Voice Reservations - Selling Protocol- (36)Voice Reservations-Booking Messages (36)Voice Reservations - Shop Calls (37)Voice Reservations-Training and Communication with HRCC (37)Voice Reservations-Call Volume Statistics and Conversion Reports (38)City/Convention Visitors Bureau Web Sites (CVB) (38)PiM –Property Information Manager (39)Internet- Brand Web Sites (39)Internet – Approved Web Sites (39)Internet- 3rd Party Merchant Sales (40)Internet - Tracking Standards (40)Internet- Hotwire (41)Internet- Priceline (41)Internet - Online Channel Analysis & SRP Standards/ Settings Audits (41)TRAIL (42)Staffing Guidelines- (42)Staffing Guidelines Continued (43)Succession Planning (43)Microsoft Office Products (43)OnQ RM (Revenue Management System) (43)Delphi - DMPE (44)OnQ FM -DRM (44)OnQ FM- Other RM personnel (44)Key Hotel Marketing Reports (44)RMU (44)Using the Revenue Management Standards TemplateThis template is a document Revenue Management personnel and various members of the hotel team can use to understand what the required business practice is for all Revenue Management functions. Listed below are the subject headers and definitions contained within the standards template. Any items that may not be familiar to you can be found by selecting the Revenue Management glossary by.CategoryA ll standards are grouped together into 9 sections. The sections are as follows:1. Distribution Channel Management2. Financial Review3. Forecast Process4. Group Revenue Management5. Inventory Management6. Market Conditions / Competitive Analysis7. Negotiated Account Review8. Pricing Strategy9. Revenue Management Business Practices10. Training & DevelopmentTopicEach category will contain topics for review. In all there are over 100 topics for your review.Revenue Management StandardThe standard is the required business practice for each topic as well as the party responsible for its execution.FrequencyEach Revenue management standard will have an associated timeline for completion. Some are weekly others monthly and still others (such as training) as needed.Instructions, Reports and Tools to useThis last column provides links to tools and reports in efforts to assist RM personnel and other hotel team members in standard implementation efforts. Attention: for all links defined in this document to access the web pages you must have your Internet Explorer Browser open prior to clicking on the links.CategoryTopic Revenue Management Standard Frequency Instructions, Reports and Tools to useFinancial Review ActualMonthlyPerformanceDRM to analyze actual room night, rate, revenue and key indicatorperformance by market category compared to last year, the Budget,and the Monthly Forecast. Prepare Executive Summary critiquingforecast variances and forecast accuracy if accuracy is in the redzone. This analysis should also include STAR performance anddescribe reasons for past performance and address strategies forincreasing RevPAR Index.Monthly Reports to facilitate this analysis include: the OnQ FMActuals and OnQ FM Mix of Sales Reports as compared tothe Monthly, Budget and Last Year Performance orequivalent systems where ONQ FM is not offered. MonthlySTAR report, Hotelligence Report, market demandinformation; Key Hotel Marketing Reports, Sales ProgressSummary Report, Group Plug and group booking paceinformation from Delphi.Financial Review SystemsBalancingBy the 10th of each month the following should occur:1)Balancing Delphi actuals to OnQ FM actuals - monthlyevaluation to ensure these two systems match. If they do not,the hotel has not successfully linked all groups in OnQ FM.2)DRM to ensure the Front Office balances the month to theGeneral Ledger and then the DRM to close OnQ FM.As indicated inStandardOnQ FM balancing information can be found by selecting thefollowing link:OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page, selectthe OnQ FM User Guide under OnQ FM- Rooms. Balancingprocedures located on page 25.Category Topic Revenue Management Standard Frequency Instructions, Reports and Tools to useForecast Process Weekly ForecastThe DRM should complete an operational forecastweekly and provide to operational departments.This forecast should include month-endprojections.Weekly Reports to use are the transient booking pace reportsprepared weekly by the DRM/Revenue Analyst, competitorshop reports, Group Rooms Control Log (GRC), SRP trendreports found in OnQ FM or equivalent system where OnQFM is not offered.The 14-Day Weekly Forecast and the Transient BookingPace tools are found in Revenue Management Toolkit byfollowing the path below.OnQ Insider >Departments >Revenue Management >ToolkitForecast Process Group ForecastDevelopmentStandardsGroup Forecast - DOSM is responsible for theproduction of the Group Forecast day by day inOnQ FM and be able to provide supportingdocumentation. This includes reviewing the GroupDemand Report inside OnQ FM as well as theSales Progress Summary Report and completingthe Group Forecast Analysis Tool.Ensure thatOnQ FM and Delphi group forecasts for definitegroup bookings match. DRM is responsible forvalidation of the group forecast.Monthly Reports to use are: Post Event Reports, Group Pick-upManager or pace equivalent by group, historical plug trendanalysis, Sales Progress Report and OnQ FM DemandReports. Group shop calls and Lost Business Reportslocated in Delphi or kept manually for non-Delphi hotels canalso be reviewed.The Group Pick Up Manager Tool can be found in theRevenue Management Toolkit by following the path below.OnQ Insider >Departments >Revenue Management >Groupand Catering.Forecast Process TransientForecastDevelopmentStandardsTransient Forecast - DRM is responsible for theproduction of the transient forecast at the SRPlevel ** in OnQ FM, day by day by market category,including other and non-revenue market categoriesand provide supporting documentation. DRM tocoordinate the total hotel rooms forecast once allchanges have been communicated.** When MCAT room nights represent 5% or moreof overall transient business, SRPs that represent20% or more within that MCAT must be forecasted.Monthly Reports to use to assist in forecasting are: OnQ RM DailyDetail Merge Tool, Transient Booking Pace Report, OnQ RM-SRP evaluations, SRP Category Reports and the MonthlyForecast Comparison Report, competitive shop information,historical actuals, compression calendar, economic trendpredictions, demand analysis reports found in OnQ RM orOnQ FM, future denials and OnQ FM reports.The Transient Booking Pace and Daily Detail Merge tools arelocated in the Revenue Management Toolkit by following thepath below.OnQ Insider >Departments >Revenue Management >ToolkitCategory Topic Revenue Management Standard Frequency Instructions, Reports and Tools to useForecast Process Exporting theForecastOnce a monthly and rolling forecast have beenpublished in OnQ FM, the forecast should beexported to OnQ RM and HLBFS. If for any reasonthe forecast is changed in HLBFS (which shouldnever happen), OnQ FM must be updated so bothsystems match.Weekly/Monthly Instructions on how to export forecasts to these systems canbe found in the OnQ FM Users Guide by following the pathbelow.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page, selectthe OnQ FM User Guide under OnQ FM- Rooms. Then,select On FM Administration and exporting procedureslocated on page 1.Forecast Process ForecastAccuracyThe total hotel room revenue forecast should bewithin 3% accurate. Green zone = within 3%;Yellow zone = within 5% and Red Zone= more than5%.Absolute variance of actual revenue forecast vs.rolling forecast revenue taken from HLBFS andPeoplesoft from the prior month.Monthly Reports to assist in accurate forecasting include:Transient Booking Pace Reports, OnQ RM- SRP evaluations,competitive shop information, historical actuals, group plugreports, compression calendar, economic trend predictions,demand analysis reports found in OnQ RM or OnQ FM,future denials and OnQ FM reports where available.Category Topic Revenue Management Standard Frequency Instructions, Reports and Tools to useMarket Conditions / Competition Analysis DeterminingCompetitive Setfor STAR ReportsCompetitive set should be the 5-8 hotels which thecustomer would choose if our hotel were notavailable. Hotels are determined and comp set’schanged based on Market segmentation, SWOTanalysis, Value Assessment, proximity to thecustomers desired location/area attractions/airport,customer surveys and Competitive Set ValidationTool. Customer Survey samples should total atleast 100 to be statistically significant. HiltonFamily of Brands cannot represent more than 40%of total rooms in the competitive set (no more than3 hotels in the family, excluding your hotel). DRM isresponsible for facilitating this process with a cross-functional team and report findings to RMcommittee, RDRM, RDSM and AVP, especiallywhen the findings show a sister hotel in the familyof brands should be included in the competitive set.Annual or inconjunction withSupply Change(Qualitative orQuantitative)Reports to use: Infrastructure Competitive Analysis-Supplyscreen from InFocus, Value Assessments, shop callreports, all monthly and weekly available STAR reports,competition collateral, trend publications indicating newconstruction or changes, and the Competitive SetValidation Tool and SWOT Analysis found in the RevenueManagement Toolkit by following the path below.OnQ Insider >Departments >RevenueManagement >ToolkitMarket Conditions / Competition Analysis ValueAssessmentsA detailed Value Assessment by market segmentvs. competitors in each segment, (regardless ifthey are on the hotels STAR Report), is critical forunderstanding and identifying what attributescontribute to hotel’s success and what areas needto be a focus to improve RevPAR performance. Anannual physical inspection of the competitorsshould take place and DRM is responsible forfacilitating this process with the DOSM and across- functional team and report findings to RMcommittee, RDRM and RDSM. Upon completion,have Sales Dept add to InFocus.Pricing should beevaluated once peryear or inconjunction withsupply change orsignificant pricingchanges in themarket.Reports to use: Shop call reports, competition collateral,Group Lost Business Reports, customer surveyinformation, and the SWOT analysis.The Value Assessment Tool is located in the RevenueManagement Toolkit by selecting the following path.OnQ Insider >Departments >RevenueManagement >ToolkitMarket Conditions / Competition Analysis Strengths,Weaknesses,Opportunities,Threats Analysis(SWOT)Upon completion of the Value Assessment, adetailed SWOT analysis should be completed withsame cross functional team that completes theValue Assessment. This analysis is critical tounderstanding, improving,and l everaging yourcompetitive advantages and minimizing yourdisadvantages within your market.Upon completionof the ValueAssessmentReports to use: Value Assessment, shop call reports, allmonthly and weekly available STAR reports, competitioncollateral, CVB information, Group Lost Business Reports,customer survey information, and trend publicationsindicating new construction or changes.The SWOT and Value Assessment Tool can be found inthe Revenue Management Toolkit by following the pathbelow.OnQ Insider >Departments >RevenueManagement >ToolkitCategory Topic Revenue Management Standard Frequency Instructions, Reports and Tools to useMarket Conditions/ Competition Analysis CompetitiveFactors/AssessmentUnderstand the competitive set in terms offacilities, pricing, appearance on hotels site andrecommend changes for your hotel based on thisinformation.Seasonally andannually at aminimum.The Competitive Assessment/Factors Form can be foundby following the path below:OnQ Insider >Departments >RevenueManagement >Library. Double click on Library >Doubleclick on RM Resource Center >Transient Pricing.Market Conditions / Competition Analysis CompetitiveShopping ToolsHotels will subscribe to Market Vision Shop CallReports as these reports are integrated with OnQRM. Hotel to also receive training in how to usethe on-line shopping tool to query reports outsidethe reports that are emailed weekly.Review shops dailywithin the bookingwindow.Weekly- for highdemand dates anddistressed datesfor 365 days.Information regarding how to subscribe to Market VisionReports, how to request/change reports and to receivetraining for the on-line tool, can be found by following thepath below:OnQ Insider >Departments >RevenueManagement >Library. Double click on Library >Doubleclick on RM Resource Center >Transient Pricing. Go toMarket Vision Announcement and Release Notes.For information on how to set up and view shop call andexception reports in OnQ RM, follow the path below.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Maintenance and go topage 5.Market Conditions / Competition Analysis CompetitivePressureCalendarEvery DRM should have a document outliningdemand drivers and daily competitive pressure fora minimum of 1 year from arrival. This shouldinclude groups at the competitive set hotels thatcould increase demand for your hotel. Forconvention hotels, this should be created for aminimum of 3 years from arrival. Placing holidays,special events and noteworthy groups in OnQ FMis optional.Completedmonthly for aminimum of a yearor as long as thehotels longestgroup bookingwindow.Reports to understand demand are: OnQ RM Reports,CVB Information, Lost Business Reports, GRC (GroupRooms Control) Log from Delphi, historical actuals fromOnQ FM and the OnQ FM Daily Transient DemandAnalysis report.Instructions on how to place events in OnQ FM can befound in the OnQ FM Users Guide by following the pathbelow.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page go tothe OnQ FM User Guide inside OnQ FM- Rooms. Thenselect “How Does OnQ FM work” and go to page 18.Adding Special Events in OnQ RM can be foundOnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Maintenance and go topage 14.Category Topic Revenue Management Standard Frequency Instructions, Reports and Tools to usePricing Strategy Best AvailableRates (BAR)Nine BAR Rate Levels will exist for each season.Rate Level 0 will be the highest possible price pointand RL8 the lowest. Price points will be indicativeof rates the customers are willing to pay based onthe competitive environment. Most of the bookingswill normally occur in Rate Levels 3-5.The Best Available Rate found on each hotelsbrand website is controlled by the SRPs (DJ/DJ1)and is equal to BAR. No lower unqualified ratesshould be offered to customers. All hotels MUSThave this SRP available (DJ/DJ1 SRPs) in order tohave BAR rates available for sale on .Annually and moreoften as dictatedby yourperformancemeasurementsReports to use to validate rate strategies and view dailyrates are: OnQ RM Daily Detail Merge Tool, Market Visionshop call reports, OnQ RM recommendation screen whereall rates from Market Vision appear, transient bookingpace reports, transient demand, GRC log, competitivepressure calendar, Value Assessment and Key HotelMarketing Reports.To understand more about Hilton’s Pricing Principles andPractices can be found by following the path below:OnQ Insider >Departments >RevenueManagement >Library. Double click on Library > RMResource Center > go to Hilton Full Service PricingStrategy.Pricing Strategy SeasonalityHotels will determine their need for multipleseasons by evaluating hotel monthly and marketRevPAR. If there is a sustained RevPARdifferential (driven by occupancy or ADR) or specialevent, then multiple seasons should beestablished.Annually andadjusted moreoften as neededReports used to validate seasonality are: STAR Reports(Trend), ResMAX information, historic demand informationfrom OnQ FM, OnQ RM reports, market history andhistorical shop call information.Pricing Strategy Length of StayControlsAll hotels should utilize full pattern length of staypricing (Min/Max controls for DT Hotels)consistently in conjunction with 9 BAR to targetdifferent market segments by selling multiple rateson a single arrival date based on a guest’s lengthof stay.Daily review withinthe transientbooking windowand for periods ofhigh demand.Weekly for entire365 day windowCompetitive set shop calls should be reviewed by arrivaldate and length of stay as well as understanding marketdemand and the hotels own internal compression prior tosetting LOS controls.The BAR Pricing Length of Stay Worksheet can assist RMpersonnel in learning to use LOS controls and can befound in the Revenue Management Toolkit by following thepath below.OnQ Insider >Departments >RevenueManagement >ToolkitInformation on how to set Length of Stay Controls in OnQRM can be found in the OnQ RM User Guide by followingthe path below.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Recommendations andgo to page 25.Category Topic Revenue Management Standard Frequency Instructions, Reports and Tools to usePricing Strategy Price Resistance -DenialsDRM must review the 6-week rolling average asindicated in Booking Pace Tool or ensure theyhave this data if using another tool. DRM shouldanalyze current 7-Day variance of transient roomssold compared to rate denials for 120 future daysand compare to 6-week rolling average by DOW. Ifweek over week trends indicate higher / lower priceresistance for a day of week in question, the DRMmust investigate underlying reasons . marketdemand, multi-hotel groups, competitor rates) andmake any necessary changes to maximizerevenues, including pricing changes if appropriate.Daily for bookingwindow andweekly for 365 daywindowReports to use: OnQ RM Daily Detail Merge Tool, OnQRM Alternate Daily Detail Report, OnQ RM CompetitiveException Reports, transient booking pace analysis, OnQFM Daily Transient Demand Analysis, and OnQ FM End ofMonth-Demand analysis.For further detail on using competitive exception reports,follow the path below.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Recommendations andgo to page 5.The booking pace analysis and Daily Detail Merge toolsare found in the Revenue Management Toolkit by followingthe path below.OnQ Insider >Departments >RevenueManagement >ToolkitPricing Strategy : Best RateStrategyThe Best Available Rate found on each hotelsbrand website is controlled by the SRPs (DJ/DJ1)and is equal to BAR. No lower unqualified ratesshould be offered to customers. All hotels MUSThave this SRP available (DJ/DJ1 SRPs) in order tohave BAR rates available for sale on .Ongoing Reports to understand bookings are: OnQ RM SRPevaluations/SRP Category Reports, OnQ FM actuals,Market Vision shop call reports, Competitor brand sites, 3rdParty web sites, Mix of Sales through eMix On-lineChannel Analysis Tool, Booking Pattern Reports found inKey Hotel Marketing Reports.The eMix On-line Channel Tool is found in the RevenueManagement Toolkit by following the path below.OnQ Insider >Departments >RevenueManagement >ToolkitCategory Topic Revenue Management Standard Frequency Instructions, Reports and Tools to usePricing Strategy SRP PlacementSRP’s can be placed in levels that have logicalprice points with respect to the best available ratein each rate level. For example: if the BAR in RateLevel 4 is $150 and the BAR for Rate Level 5 is$125, a non-LRA negotiated account priced at$140 would be placed in Rate Level 4. However,you must consider your selling strategy withrespect to the SRPs and rates in each rate levelalong with the hotel's projected occupancy levelwhen assigning quali fied SRP’s to rate levels. Oneoption for Hilton Hotels is to use the SRP exceptionfield, which allows the SRP to stay in the rate levelthat corresponds to the Best Available Rate butfollow RL0 restrictions.Quarterly, whenBAR price pointschange and whenany SRP ratechangesReports to use: SRP Mapping screen/report in OnQ RMfor select dates; SRP evaluation/SRP Category Reportsfor Rate Levels 0-8 and all SRPs, SRP Quick List listing allrate level assignments which can be requested byemailing. For further detail on this topic, follow the pathbelow.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Menu/Screens and goto page 3.Explanation of OnQ RM rate functionality can be found byfollowing the path below.OnQ Insider >Departments >RevenueManagement >Systems. Once on the Systems page,select the OnQ RM User Guide under OnQ RevenueManagement. Then select On RM Menu/Screens and goto page 5.Pricing StrategyBest Rate At no time will hotels allow rates to be sold throughany non-Hilton website or any other channelOngoing Parity with can be validated by reviewing the OnQ RMMarket Vision Shops, OnQ RM Competitive ExceptionGuarantee (including 3rd Party resellers/wholesalers, MerchantModel Websites, GDS) that are lower than thosedispl ayed in the brand’s reservation system andhotel site. This is to ensure that the consumer canalways find the lowest online rate through thebrand web sites, and to drive that online customerto our web site rather than those 3rd partychannels to which we provide wholesale rates andavailability. Reports.The Internet Pricing Tool located on the Revenue Management Toolkit can also assist DRMs when managing channels on 3rd party sites when an extranet is involved.OnQ Insider >Departments >Revenue Management >ToolkitCategory Topic Revenue Management Standard Frequency Instructions, Reports and Tools to usePricing Strategy Packages andPromotions –Administration/AnalysisAll promotions and packages must adhere to HiltonHotels Corporation Core Pricing Strategy and usethe approved SRP codes. "Rate only non-fenced"packages/promotions are not acceptable. Allpackages/ promotions must have an appropriatefence or feature. The definition of a properlyfenced qualified package or promotion is a bookingvehicle designed to generate incremental revenuewithout creating net trade down or displacement ofthe existing customer base. Hotels must completethe web based Package/Promotion form. Once thepackage/promotion has been approved by theRDRM, they will send to GDM for loading in theapplicable booking channels. All new Transientpackage rates need to be built as limit room typeand total for the Hilton brand. Must conduct pre-promotion breakeven analysis and post profitanalysis to justify/analyze cost of any promotions.Ensure the package rates reflect a roomdistribution equal to BAR.As SRP's are builtin the CRSThe Package/Promotion Form is located on the GDMwebsite and found by following the links below.OnQ Insider >Departments >Global Distribution Services.Double click on Global Distribution Services >GlobalDistribution Management > Under the options list selectGDM Forms >select your hotel brand and go to thePackage/Promo form..。
NETWORK STORAGE SOLUTIONData SheetA powerful, affordable, easy-to-use, cloud-ready storage solutionfor small businesses with up to 50 usersThe Seagate® WSS NAS 4-bay network storage solution offers native cloudintegration and connectivity to the Microsoft ecosystem. For small businesses andhome offices with up to 50 users and devices, the WSS NAS runs Windows StorageServer 2012 R2 Essentials. The WSS NAS 4-bay simplifies the setup experiencewith an intuitive management interface while still incorporating Microsoft’s powerfulserver technologies.Backing up critical business data is essential to the health of any business. WindowsStorage Server 2012 R2 Essentials automates Windows PC Backup to everyconnected computer. For users familiar with Windows 8, File History detects filechanges and creates a copy on the WSS NAS 4-bay. Never worry about accidentallydeleting a file because with File History your files are continuously protected.With integrated connectivity to cloud services like Windows Azure™ and MicrosoftOffice 365™, the WSS NAS 4-bay gives small businesses the flexibility they need tochoose the best environment for their data storage.1 Administrators only need tocreate one user, and the Essentials server will sync passwords, creating a simple,clean sign-on experience even when users are accessing cloud-based resources orthe local WSS NAS 4-bay.Windows Storage Server 2012 R2 Essentials has domain server capabilities, soyou can now use the WSS NAS 4-bay as the primary server in your multi-serverenvironment. Save time managing users and directories with seamless ActiveDirectory integration, giving your business the enterprise-class services without theenterprise-class cost.Manage your data easily with the WSS NAS 4-bay and Storage Spaces. StorageSpaces allows you to simply group hard drives into a storage pool without limitingfuture capacity expansion. This makes data protection, scalability and redundancysimple, without having to worry about RAID.Make the most of your storage and efficiently manage the amount of data on eachdisk with data deduplication. Not only will deduplication free space and maximizestorage, but it also saves time because there is less data to backup or transfer.1 Add-ins required for Office 365 and Azure backup integrationNETWORK STORAGE SOLUTION1 One terabyte, or TB, equals one thousand billion bytes when referring to drive capacity.AMERICASSeagate Technology LLC 10200 South De Anza Boulevard, Cupertino, California 95014, United States, 408-658-1000 ASIA/PACIFIC Seagate Singapore International Headquarters Pte. Ltd. 7000 Ang Mo Kio Avenue 5, Singapore 569877, 65-6485-3888 EUROPE, MIDDLE EAST AND AFRICASeagate Technology SAS 16–18, rue du Dôme, 92100 Boulogne-Billancourt, France, 33 1-4186 10 00© 2015 Seagate Technology LLC. All rights reserved. Printed in USA. Seagate, Seagate Technology and the Spiral logo are registered trademarks of Seagate Technology LLC in the United States and/or other countries. All other trademarks or registered trademarks are the property of their respective owners. When referring to drive capacity, one gigabyte, or GB, equals one billion bytes and one terabyte, or TB, equals one trillion bytes. Your computer’s operating system may use a different standard of measurement and report a lower capacity. In addition, some of the listed capacity is used for formatting and other functions, and thus will not be available for data storage. Complying with all applicable copyright laws is the responsibility of the user. Seagate reserves the right to change, without notice, product offerings or specifications. DS1846.2-1504 AMERIncluded in the populated versions of the WSS NAS 4-bay are industry-leading Seagate NAS HDD drives. Seagate NAS HDD drives are the core of any high-capacity storage solution, and Seagate delivers a specialized drive specifically for NAS systems. Seagate NAS HDD drives are engineered to run 24×7 to deliver the performance needed by various businessapplications, yet run cooler than other drives on the market. Furthermore, NAS HDD drives are rated for higher reliability than a standard desktop drive, offering more protection for your business’s sensitive and critical files.。
仓容及倾覆力矩计算英文The Calculation of Cargo Capacity and Righting MomentThe efficient and safe transport of goods is a critical aspect of modern logistics and supply chain management. One crucial factor in ensuring the successful delivery of cargo is the accurate calculation of cargo capacity and righting moment. These calculations are essential in determining the maximum load a vessel or vehicle can safely carry, as well as its stability and ability to withstand external forces. In this essay, we will delve into the intricacies of cargo capacity and righting moment calculations, exploring their significance and the methodologies employed.Cargo Capacity CalculationCargo capacity refers to the maximum amount of cargo that a vessel, vehicle, or container can safely accommodate. This measure is crucial in ensuring that the load does not exceed the design limitations of the transportation mode, which could lead to structural damage, reduced efficiency, or even catastrophic failure. The calculation of cargo capacity involves several factors, including the available space, weight limitations, and the characteristics of the cargo itself.To calculate the cargo capacity, the first step is to determine the available space. This can be done by measuring the dimensions of the cargo hold, container, or vehicle bed, and then subtracting the space occupied by fixed structures, such as walls, floors, and internal components. The resulting volume represents the maximum space available for cargo.Next, the weight limitations must be considered. Each mode of transportation has a maximum weight capacity, which is determined by factors such as the structural integrity of the vehicle, the load-bearing capacity of the tires or suspension system, and regulatory requirements. The cargo capacity is then calculated by dividing the maximum weight capacity by the average density of the cargo.It is important to note that the type of cargo can also affect the cargo capacity calculation. Some cargo, such as heavy machinery or dense materials, may require more space per unit of weight, while lighter and more voluminous cargo, such as textiles or plastics, may allow for a higher weight-to-volume ratio. Careful consideration of the cargo characteristics is essential to ensure accurate cargo capacity calculations.Righting Moment CalculationRighting moment, also known as the overturning moment, is a crucial factor in determining the stability of a vessel or vehicle. Itrefers to the force that acts to restore the equilibrium of a tilted or overturned object, preventing it from capsizing or rolling over. Accurate calculation of the righting moment is essential in ensuring the safe operation of transportation modes, particularly in the face of external forces such as wind, waves, or sudden maneuvers.The righting moment is calculated by multiplying the weight of the cargo and the transportation mode by the distance between the center of gravity and the point of rotation (also known as the metacenter). The center of gravity is the point at which the weight of the cargo and the transportation mode is concentrated, while the metacenter is the point around which the vessel or vehicle would rotate if it were to tilt or capsize.To calculate the righting moment, the first step is to determine the center of gravity of the loaded cargo and the transportation mode. This can be done through a combination of measurements, calculations, and empirical data. The distance between the center of gravity and the metacenter is then measured, and the righting moment is calculated by multiplying the total weight by this distance.It is important to note that the righting moment can be affected by several factors, including the distribution of the cargo, the shape and design of the transportation mode, and the environmental conditions. Careful consideration of these factors is essential inensuring the accurate calculation of the righting moment and the overall stability of the transportation system.ConclusionThe accurate calculation of cargo capacity and righting moment is a critical aspect of modern logistics and supply chain management. These calculations ensure the safe and efficient transport of goods, preventing structural damage, reducing the risk of accidents, and optimizing the use of transportation resources. By understanding the methodologies and factors involved in these calculations, transportation professionals can make informed decisions, improve the reliability of their operations, and contribute to the overall success of the supply chain.。
基本词汇库存现金 Cash on hand银行存款 Bank deposit应收账款 Accounts receivable预收账款 Advance from customers应收利息 Interest receivable应收股利 Dividend receivable应收票据 Notes receivable其他应收款 Other receivables坏账准备 Bad debt provision存货 Inventory存货跌价准备Provision for decline in value of inventories合同资产Contract asset固定资产 Fixed assets固定资产减值准备Provision for impairment of fixed assets在建工程 Construction in progress累计折旧 Accumulated depreciation固定资产清理 Disposal of fixed assets投资性房地产Investment property债权投资 Debt investment其他债权投资 Other debt investment交易性金融资产 Held-for-trading financial assets 其他权益工具投资Other equity instrument investment长期股权投资 Long-term equity investment长期应收款 Long-term receivable递延所得税资产 Deferred tax assets持有待售资产/处置组Assets (or disposal groups) held for sale应付账款 Accounts payable预付账款 Prepaid accounts应付职工薪酬 Employee compensation payable 应付利息 Interest payable 应交税费 Taxes payable其他应付款 Other payables合同负债 Contract liability短期借款 Short-term loans长期借款 Long-term loans应付债券 Bond payable可转换公司债券 Convertible bond长期应付款 Long-term payable递延所得税负债 Deferred tax liabilities实收资本 Paid-in capital股本 Share capital股份期权 Share options股本/资本溢价 Share/Capital premium资本公积 Capital reserve其他资本公积 Other capital reserve盈余公积 Surplus reserve其他综合收益 Other comprehensive income营业收入 Revenue营业成本 Cost of goods sold税金及附加 Taxes and surcharges营业利润 Operating profit财务费用 Financial expenses销售费用 Selling expenses管理费用 General and administrative expenses 其他收益Other income营业外收入 Non-operating income营业外支出 Non-operating expenses所得税费用 Income tax净利润 Net profit利润分配 Profit appropriation法定盈余公积 Statutory surplus reserve任意盈余公积 Discretionary surplus reserve未分配利润 Undistributed profit基本每股收益 Basic earnings per share稀释每股收益 Diluted earnings per share预计负债 Estimated liabilities或有负债Contingent liabilities经营租赁 Operating lease融资租赁 Financing lease承租人 Lessee出租人 Lessor租赁收入 Rental income未实现融资收益 Unrealized financing income 未确认融资费用 Unsettled financing expenses 记账本位币 Functional currency会计估计 Accounting estimates会计差错更正 Correction of accounting errors 货币计量 Currency measurement 调整事项 Adjusting events非调整事项 Non-adjusting events追溯调整 Retrospective adjustments年初余额 Balance at the beginning of year 年末余额 Balance at the year end持续经营 Going concern终止经营discontinued operations资本化 Capitalization/Capitalized债务重组 Debt restructuring披露 Disclosure分部报告 Segment reporting关联交易 Related party transactions计税基础 Tax basis暂时性差异 Temporary differences递延收益 Deferred income资产减值 Impairment of Assets当企业资产的可收回金额低于其账面价值时,即表明资产发生了减值,企业应当确认资产减值损失,并把资产的账面价值减记至可收回金额。
ASSESSING THE PERFORMANCE OF A COMPUTERIZED ACCOUNTING SYSTEM作者: Danciu, RaduAbstract: The study aims to present the criteria for assessing the performance of a computerized accounting system starting with completeness, ergonomics, information integration, flexibility, adaptability, accessibility, adaptability, accessibility, adaptability, safety and security in the operations. The study's conclusions formulate a set of minimum requirements for the creation, implementation and use of a computerized accounting system. Key words: computerized accounting system, ergonomics, information integration, flexibility, adaptability, accessibility, operational safety1. IntroductionThe deliverance of an independent opinion, by a group of specialists, referring to the informational system used for organizing and conducting the accounting is one of the modern business management goals. Among the objectives that must be considered in the process of assessing the financial and accounting system we can mention:* checking the operating system's correctness, completeness, flexibility, adaptability, cost of maintenance, ergonomics and operational safety* expressing an opinion on the computerized accounting system's usage facilities and efficiency (computing and software), as well as on the business's place in the informational economic environments, before and after its purchase/creation.* formulating some proposals regarding the achievement of the objectives, the informatics system's development and the elimination of the deficiencies consigned in the assessment reports.In order to be able to quantitatively and qualitatively asses the computerized accounting system one must answer at least the following questions:What is the system's degree of flexibility?Is the system ergonomic and accessible?Is the system adaptable?Is the system complete? Does it cover the information management needs of the enterprise?What kind of operational safety does the system offer?Do the programming language and the databases satisfy the requirements of an enterprise's dynamic modelling system?What are the mutations produced by such a system in the financial and accounting management?After the acquisition or creation of a computerized accounting system and its implementation, the system must undergo an audit to determine the weaknesses in the system's usage.The auditing of the information systems is a very complex operation and it involves the auditor expressing his opinion on real time data processing, database management, system integration, the work with computer networks, etc. The claims for an audit of the computerized accounting system are very high, which involves the implication of some specialists in accounting and in the field of applications design and implementation. Computerized systems audit should include the general examination of the computerized accounting systemand the analytical examination of each application individually.Among the objectives of the computerized accounting system's general examination we may include :* assessing the completeness of the information system, therefore the coverage degree of the accounting needs for organization and management* assessing the integration degree of the system's applications, of the way they communicate* assessing the flexibility and adaptability* assessing the accessibility, reliability and security* assessing the way the minimum conditions to be met by the computerized systems are being respected* assessing the delimitation procedure for the attributions and responsibilities of the people involved in the computerized systems management* assessing the way the computerized system complies with the accounting principles and methods* assessing the system's ergonomics.Among the objectives of the computerized accounting system's analytical examination we may include :* assessing each application's architecture* assessing the integrity and the integrality of the system's main functions and of their usage possibility* assessing the effects of using the application functions and of every function's usage degree* detecting function overlaps in the accounting's implementation* establishing and evaluating the application's additional functions* assessing the automation degree of accounting projects* assessing the degree of detail in the information description, namely the adequacy or inadequacy of the informational attributes necessary to identify the transactions, events and objects* assessing the menus of data collection and validation* assessing the fairness of the data processing and systematization procedures* assessing the manner of creating, consulting and printing the accounting reports as well as their informational content* assessing the manner of database presentation and consultation* assessing the level of maintenance and system administration functions accomplishmentTo facilitate the discovery of an answer for the questions formulated above and to detail the objectives of the computerized accounting system's general and analytical examination, the system's main characteristics will be described: flexibility, adaptability, ergonomics, accessibility, reliability, integration and operational safety.2. Qualitative characteristics of the computerized accounting system2.1. Flexibility and adaptabilityThe flexibility of the computerized applications refers both to the multitude of options available to create a function, as well as to the possibility of going behind some commands or application functions without altering the collected, processed and archived databases. All the application's functions must be characterized byflexibility, namely:User-defined sort keys should provide the opportunity to choose attributes ordering information by seeking data from a database or a table.* The data collecting function should provide at least the following facilities:* accessing auxiliary databases in order to choose data when collecting it through a control key / a command button. For example, when collecting an account, the user, by pressing a key / button control should be able to access the chart of accounts in order to select the desired account* allowing the user, when using the key / command button, to add new items to auxiliary databases or modify existing ones when the data he is searching for is not there* displaying the processed and stored data, useful in the collection process, such as: displaying the quantity available on stock and the stock's output unit price or showing the invoices to be paid to suppliers at the moment when the payment data is being collected, etc.* the data collection function should allow deletion or modification of not validated data* ensure the possibility of operating or de-operating data at a document's level* multi-criteria search and selection of data in order to choose the data by multiple informational attributes combined with mathematical operators: equal "=" lower "<", higher ">", lower and equal "<=", higher and equal ">=", including "$" different "#".* the multiple classification of data by one or more informational attributes, for example: in the case of stock entries sorting can be done by input document type, document number and date, etc. There are two types of ordering keys for flexible applications:- ordering keys defined by software- user defined ordering keys.The user defined ordering keys must provide him with the opportunity to choose the informational attributes based on which he wants the ordering of data from a database or a table to be made.* the generating, consulting and listing function for the financial and accounting statements must offer at least the following facilities:* obtaining accounting reports for any period of time by indicating the starting and closing dates for information to be included in the report* obtaining accounting reports both in foreign currencies and in lei when indicating a different currency than the domestic one* getting full reports or only for a list of indicated entities / objects , such as: accounts, distributors, partners, stock items, etc.* displaying in screen mode all the financial and accounting statements made before listing* listing of the reports with the following options type of printer (local or În network/printer name)- type of printing ( normal or reversed )- first page- final page- document's margins, etc.* the processing or auxiliary database consultation function must at least provide the following facilities:* prohibiting additions, changes and deletion from processed and archived* multi-criteria search and selection of data* enabling the listing of selected data* the application's parameterization and management function should provide at least the following facilities:* saving / restoring data and software from multiple drives. Thus, before performing these operations, the choice of the magnetic disk drive to / from which the backup / restore of data or software will be performed must be leftup to the user* facilitating the access to data belonging to any processing period by simply pointing it out* the possibility to update the readymade applications without intervention from the producer, based on the new software package provided, by using the software update option.The lack of options listed above leads to the creation of a system which is rigid and cumbersome in use. The existence of functions / options is not the only one important, but also the programmer's and analyst's tenacity in putting them into the right place , the control keys / control buttons having to be easy to remember, and to be the same for the same function / option in all applications.In fact, achieving a high flexibility of an integrated computerized system is the result of combining the accounting science with the computer science, which is easier to accomplish when the analyst and the programmer is the same person.The adaptability of the computerized accounting system to the specific conditions of accounting organization and management within an enterprise has two aspects, namely:a. adaptation and integration in the enterprise's computerized economic systemb. adjusting to the accounting's organization and management requirements.In order to express an opinion regarding the adaptation degree of a computerized system to the company's concrete conditions, we must analyze the types of computerized systems, namely:* the self created computerized system which has the following characteristics:* the enterprise's integration in the computerized system is easy to achieve as the computerized accounting system is compatible with other specific applications* the system's design will be made to match the information management requirements and the enterprise's management strategy* system implementation and user education is easier* the system creation in an economists-comp team leads to attachment and loyalty towards the created system, any improvement of the system being easily achievable* the system's production time is long, the system's analysis must be very careful, the making process involving high costs and a higher skilled workforce* the readymade computerized system with the following features:* the user can choose the applications package that meets the utmost of his requirements* the system's architecture and documentation is more comprehensive and complete, because it answers the requirements of many users, many times being updated according to their requirements* regular updating and software maintenance is done at much lower cost than independent upgrading and maintenance* the purchase price of the readymade software is smaller than that of the software developed by themselves, because of the competition on the accounting computerized applications market, and the fact that the development cost is distributed to more buyers* these computerized systems are usually closed systems in terms of analyst and programmer, being directly addressed to the accounting user* this type of software, frequently do not integrate in an enterprise's activity, so, very often the acquiring company's needs do not find themselves in the purchased applications, requiring a working style review, which may or may not have beneficial effect on the economic activity* the applications packages having a high degree of generalization do not have the same efficiency as their own software packages* the company providing readymade software can interrupt it's activity or stop doing business, which is a major impediment for updating and maintaining computer applications while the sources for software and system analysis are not owned by user* the pre-ordered computerized system which has the following characteristics:* the user, according to the delivered command can work under their individual data processing and information systematization requirements* costs may be lower than those for software developed with own forces* it integrates easily into the enterprise's computerized system* the user can take possession of sources and system analysis which helps making it easy to do future changes and updates, even if we are facing an interruption / termination of relationships with companies and program analysis that was used originally.To ensure continuity of he management and information integration principles of the financial and accounting computerized system, the best readymade computer system, completed and adapted where the enterprise information management require it.2.2. Ergonomics, accessibility and reliabilityFor the computerized accounting system to be ergonomic and accessible its component application must stand in line with the following requests:* using the same principles in developing and using the data collection models in all computer applications* using the same combinations of keys / command buttons to collect and access the data* using some information functions on the status and the content of the data in the system, namely:- showing the record statistics which displays the number of basic documents, the number of secondary documents and number of records for each database separately- displaying the selected records number that shows the number of basic documents, the number of secondary documents and the number of records for the database selection- displaying the document type and accounts names, allocators and other elements encoded in the recording where the cursor is positioned- generating at the user's request the list / report with full data / seected from the database- enabling access to explanations on the role and functioning of the application's functions /options. All the explanations given for each feature / option are enrolled in the system's user manual- the existence of a function to perform simple calculations on data, such as adding values in column / selected area- the option of displaying and distributing an account balance with the structure: Account, distribution, money. This function will provide data on:- Opening balance debtor / creditor- Aggregate debit and credit turnover- Monthly debit and credit turnover- Total debit and credit amounts- Final balance debtor / creditor- the option of calculating an expression for the user's need, in order to do some calculations outside offered the information management system- the option of duplicating the content of some information attributes previously collected designed to pick up data from the user common data for two consecutive records in a table.The system's availability refers to setting access levels for each worker individually, ensuring a certain degree of data confidentiality and to limit the rights of changing data collected by other operators or data from auxiliary databases.An accessible computerized system must provide the highlighting of the information by various technical means like:* colour differentiation* differentiation by font size* flashy markings* sound markings* grouping data in boxes* highlighting important data* displaying messages during work time* displaying short explanations for each system function / option.Moreover, a complex computerized system must alert the operator or the user of its abnormal operation, indicating where necessary the system's errors and defects.Particularly important in assessing ergonomics, accessibility and reliability of a computerized system is the tracking of its behaviour in use, at least in terms of the following aspects:* in terms of the system's operational tenacity which also considers the cases and reasons for computerized applications failure* in terms of user requirements, which means assessing the degree of weariness caused to the user after a longer work period and its causes* in terms of work speed, that is the extent to which the system responds to user commands and the reaction times* in terms of accuracy, that is the manner of fulfilling the system's displayed and executed functionsIn the making of an ergonomic and accessible computerized system there are also other important factors:* the creation of some menus with high intelligibility by using short names with intelligibility, logical grouping of data, etc* facilitate the consultation of multiple databases* achieving at least the following reporting features, data collection models, consulting data bases and their associate functions / options:- the high level of information synthesis- information's timeliness- information's completeness- data correctness- data accessibility.The computerized accounting system's reliability refers to the probability that this system will continue to function for a certain amount of time according to the designed and implemented standards. Regarding the reliability assessment of a computer programme, E. Yourdon in the paper "Decline &Fall of the American Programmer" (Oprea, 1999), addresses a number of indicators like:* average time between two failures* average time to remediate troubles* the area affected by failures* the error rate per hour, day, week or month* the error rate on the basic software components* the opportunity of the answer to the errors or the time granted to their remedy* the beneficiary's satisfaction about the quality of the intervention to remedy softdefectsThe system's reliability analysis by using these indicators leads the user to establishing of the software's place, both in the enterprise and comparatively with other software.2.3 Operational safetyThe system's safety includes its security and its capacity to function continuously with no malfunctions, and if malfunctions come up it need to have its own models of remediating them.The system's security is a complex problem, especially when using computer networks for data processing. The main objective of a computerized system's security is represented by insuring the data's confidentiality and integrity. The data confidentiality must be done by:* precisely determining the people who have access to the computer applications* precisely determining the applications and databases the operators and users have access to* precisely determining the access passwords for each person* regularly changing the access passwords and communicating them in maximum confidentialityTo achieve data confidentiality one must establish a Register regarding the use of computer applications inside the computerized accounting system. The structure of this register could present itself as follows:* Ist option considering the person as a benchmark, comprises:- the person - name and position- the computer application or parts of application he has access to- access password- the date of granting / modifying access- acknowledgement signature- observations* IInd option considering the computer application as a benchmark comprises:- the computer application- the people - name and position - having access to the application- access passwords- the date of granting / modifying access- acknowledgement signature- observationsThe data integrity aims to maintain and preserve the collected data, without altering them by data processing and the safe preservation of the processed data, any subsequent intervention being forbidden (change, deletion, mergers, etc.).The system's functioning security must also take into consideration the failure possibility, for them to be able to repair themselves. Some examples of interventions for the maintenance and repairing of the computerized system could be:*for the system's maintenance* database reorganization related to re-indexing them by the index keys defined when the application was created* setting the printing systems used for listing the accounting statements on paper* checking the integrity of the databases that ensure control over the existence of all databases and of their associated indexes* checking the databases structure which ensures the control over the database's structural updates occurring when new versions of the computer applications are created* the database and software saving / restoring, option which provides the saving/restoring of databases on/from floppy disks, local or central hard disks, CD-s, DVD-s, etc.*for the repairing of damaged data* recovery of destroyed database structures* recovery of the system's menus and functions* recovery of archived/saved data, previous to the incidentThe technical methods for carrying out the computerized system's security are:* the physical security which is designed to limit the physical access to the computer system by:- introduction of access codes and installation of alarm systems where the technical items are located- enclosing the microcomputers in protection cabinets or in a protective wrapper- installing a secured mechanism for connecting to the electrical network- storing the data saved on external magnetic devices in maximum security places: safes, safe deposit boxes, etc.* the softsecurity by password access to computers and computer applications, using encryption software for long distance transmitted data, by password access to created data archives, in order for them to only be accessible through the same applications that generated them, by using hidden files and secret file names, etc. If in the case of compute application functions, their completeness must be ensured as well as a wide variety of working options, in the case of features an optimum balance must be achieved, for the computerized system to be able to reach its objectives in the best conditions reported to the highest standards.3. ConclusionsThe introduction and use of a computerized financial and accounting system must ensure reconciliation between the individual vision and the collective network organization, along with the collection, processing, administration and delivery of information in terms of maximum speed and security conditions. For the creation of a computerized information system we may propose the compliance with the following requirements:* the computerized applications must be consistent with any type of computer and created in a performing operating system and programming language with perfecting perspectives* it should have the highest possible accessibility level, so that the level of computer knowledge the user needs to hold to be minimized* it should have a high flexibility degree, therefore to allow changes, deletions, searches, returning to current data, creation of extra reports defined by the user, returning to previous data collections, saving and restoring data collections, etc.* it should be ergonomic, therefore the organizing of the working menus should follow the same principles for all the applications and to be based on simplicity and intuition* to offer operational safety* to ensure data security and privacy by restricting the access to information* the user-computer relationship related to data collection should be as easy as possible and it should comprise explanations regarding every element of information* the mathematical and accounting relations used for validating and calculating the data collected in the system should comply with rules, regulations and laws* it should have a high working speed and data storage capacity* it should protect itself in case of major incidents ( fault of electric current, application failure, etc.) ensuring data preservation.Adapting the experience's effect theory (it comprises: learning effect, innovation effect and the mechanization, automation and robotization effects) to the computerized systems, theory which was elaborated by Boston Consulting Group (B.C.G.), one can say that as the number of financial and accounting computerized products has increased, the tendency of using them has become predominant, using them leads to the discovery of deficiencies and their removal generates the product improvement by eliminating redundant functions, cumbersome models, unnecessary work modules, etc. Perfecting the computer products is not sufficient, the consequences of their use must be insisted on and some accounting areas need to be improved, such as:* developing the accounting standards in line with information's processing and administration in the computerized environments; the financial and accounting computerizes systems must not be treated only as data processing systems, because they are financial and accounting data management systems as well* adapting the common and the special forms regarding the financial and accounting activity to the processing and administration need of the information in the computerized environment* completing the rules on creating and using financial and accounting software with a set of minimum informational attributes required in managing financial and accounting objects, transactions and events* developing a national standard on financial and accounting information processing and management in the computerized environment including:* architectural elements of the computerized system* main functions and characteristics of the computer applications* aspects related to the management of financial and accounting objects, transactions and events* The start of some national research programmes on the changes produced by the use of computerized informational systems and their effects on the accounting science.References1. Danciu, R.;(1994); Computerized accounting systems, Dacia, Cluj-Napoca2. Oprea, D.; (1999); Analysis and design of economic information, Polirom, Iasi3. Tugui, Al.;(2003); Products generalized accounting information, CECCAR, Bucharest4. ***, Manual of Use Systems ERP SAP FICO, MicrosoftDynamics Navision, Clarvision, WinMentor, Siveco Applications 2020, BAAN ERP。
Research highlights► Foreign chemical firms in China in part depend on networks with pre-existing customers. ► JV firms rely on state-controlled distribution networks organized through Chinese partners. ► Networks with intermediaries or traders do not inv olve direct user contact or regular feedback. ► Producer–user interaction provides few incentives for interactive learning and innovation . ► A mix of “bonding” and “bridging”, as well as local and trans -local, producer –user linkages is lacking.72Key technologies of new malicious code developments and defensive measures in communicationnetworks Original Research ArticleThe Journal of China Universities of Posts andTelecommunications , Volume 17, Issue 4, August 2010, Pages 69-73Peng LI, Ru-chuan WANG, Wei ZHANGClose preview | Related articles | Related reference work articlesAbstract | ReferencesAbstractThis article is focused on analyzing the key technologies of new malicious codeand corresponding defensive measures in the large-scale communicationnetworks. Based on description of the concepts and development of themalicious code, the article introduces the anti-analysis technology, splitting andinserting technology, hiding technology, polymorph virus technology, and autoproduction technology of the malicious code trends with intelligence, diversityand integration. Following that, it summarizes the security vulnerabilities ofcommunication networks from four related layers aspects, according to themechanisms of malicious code in the communication networks. Finally, itproposes rapid response disposition of malicious code attacks from fourcorrelated steps: building up the network node monitoring system, suspiciouscode feature automation analysis and extraction, rapid active malicious coderesponse technique for unknown malicious code, and malicious code attackimmunity technique. As a result, it actively defenses against the unknownPurchasemalicious code attacks and enhances the security performance of communication networks.73A qualitative investigation into the usefulness andimpact of the performance intervention zone systemused in the diagnostic assessment of internationallyeducated massage therapists Original Research ArticleJournal of Bodywork and Movement Therapies, In Press, Corrected Proof, Available online 4 August 2010Paul Finch, Amanda BaskwillClose preview | Related articles |Related reference work articlesAbstract | Figures/Tables | ReferencesSummaryPurposePrevious work (Finch, 2008) reported on the development and implementationof a safety oriented system of performance intervention zones (PIZ), which wasused in the assessment of internationally educated massage therapists. Thestudy reported in this paper explores the usefulness and impact of the system as experienced by the evaluators involved in the diagnostic assessment.MethodThis exploratory research was of a qualitative design in which data werecollected during a series of individual semi-structured interviews with evaluatorswho used the performance intervention zone system during the diagnosticassessment of internationally educated massage therapists in Ontario. Afterobtaining informed consent, interviews were taped, transcribed and analyzed,resulting in identification of a number of themes and recommendationsregarding future use and development of the system.ResultsPurchaseAnalysis revealed four themes within the data. These were that the performance intervention zone system 1) enhanced the confidence of examiners in their ability to conduct the comprehensive clinical examination effectively, 2) assisted and improved examiner decision making during the examination, 3) was a useful aid to communication regarding candidate performance, and 4) could be improved by clarifying the nature of intervention and implementing more extensive examiner training prior to the examination.ConclusionThe performance intervention zone system was found to be useful in orienting examiners to the evaluation process, in supporting decision making during the comprehensive clinical evaluation and as an aid to communication in thepost-examination review of candidate performance. The system could be improved through implementation of a pre-examination workshop focused on use of the PIZ and by delineation of levels of examiner intervention during the examination.Article OutlineIntroductionMethodDesign and proceduresParticipantsData analysis and resultsEnhanced confidenceImproved decision makingAid to communicationLevels of Intervention and Examiner Training:Summary and conclusionLimitations Financial support Conflict of interestReferences74Development of n-in-p silicon planar pixel sensors andflip-chip modules for very high radiationenvironments Original Research ArticleNuclear Instruments and Methods in Physics ResearchSection A: Accelerators, Spectrometers, Detectors andAssociated Equipment, In Press, Corrected Proof,Available online 8 January 2011Y. Unno, Y. Ikegami, S. Terada, S. Mitsui, O. Jinnouchi, S.Kamada, K. Yamamura, A. Ishida, M. Ishihara, T. Inuzuka,K. Hanagaki, K. Hara, T. Kondo, N. Kimura, I. Nakano, K.Nagai, R. Takashima, J. Tojo, K. YoritaClose preview | Related articles |Related reference work articlesAbstract | Figures/Tables | ReferencesAbstractIn this paper we present R&D of n-in-p pixel sensors, aiming for a very highradiation environment up to a fluence of 1016 n eq/cm2. To fabricate thesesensors, two batches with different mask sets were employed: the first resultedin pixel sensors compatible with the ATLAS pixel readout frontend chip calledFE-I3, and the second in FE-I3 and a new frontend chip, FE-I4, compatiblesensors; small diodes were employed to investigate the width from the activediode to the dicing edge and the guard rings. Tests involving the diodes showedthat the strong increase of leakage current was attributed to the edge currentwhen the lateral depletion zone reaches the dicing edge and the lateraldepletion along the silicon surface was correlated with the …field‟ width. Theonset was observed at a voltage of 1000 V when the width was equal to400 μm. The pixel sensors that were diced at a width of 450μm couldsuccessfully maintain a bias voltage of 1000 V. Hybrid flip-chip pixel modulesPurchasewith dummy and real chips were also fabricated. Lead (PbSn) solder bump bonding proved to be successful. However, lead-free (SnAg) solder bump bonding requires further optimization.Article Outline1. Introduction2. R&D of n-in-p sensors3. Results3.1. Slim-edge diodes3.2. Guard rings3.3. FE-I4 double-chip compatible pixel sensor3.4. Irradiation4. Bump bonding of pixel sensors at HPK4.1. PbSn solder bump bonding4.2. AgSn solder bump bonding4.3. Bumpless bonding at HPK5. SummaryAcknowledgementsReferences75Design of a mixed-signal digitalCMOS fuzzy logic controller(FLC) chip using new currentmode circuits Original ResearchArticleAEU - International Journal ofElectronics and Communications,Volume 65, Issue 3, March 2011,Pages 173-181Gh. Yosefi, S. Aminifar, Sh. Neda,M.A. DaneshwarClose preview | Related articles | Relatedreference work articlesAbstract | Figures/Tables | ReferencesPurchaseAbstractPresented in this paper is design of a new FLC chip with mixed-signal (analog and digital) inputs and digital outputs. This work is based on a new strategy in which analog advantages such as low die area, high speed and simplicity are added to the system advantages, whose output is digital considering unchanged digital system properties. For implementing this idea, a new programmable Fuzzifier circuit based on mixed-signal input and generation of three different current membership functions including Gaussian, Trapezoidal and Triangular shapes are proposed. To contribute antecedents in inference block, three new integrated circuits for implementing Min–Max operators are proposed. We improved and designed a Multiplier/Divider circuit and a current mode Analog to Digital (A/D) converter with 7bit resolution to complete and implement Defuzzifier block. The proposed controller circuit which consists of two inputs, four membership functions for each one, sixteen rules and one output designed less than0.1 mm2 area in 0.35 m CMOS standard technology. The systematical simulation results of MATLAB software was compared tothe HSPICE simulation results using extractedcircuit layout. The inference speed of thecontroller is about 16.6 MFLIPS.Article Outline1. Introduction2. Proposed FLC chip2.1. Main block diagram of system2.2. Fuzzifier2.3. Min and Max blocks2.3.1. Min circuit design2.3.2. Max circuit design2.4. Defuzzifier block2.4.1. Analog Multiplier/Divider2.4.2. Current mode A/D3. System simulations4. Control surfaces, layout and controlleroutputs5. ConclusionsAcknowledgementsReferencesVitaeresults 51 - 757,895 articles found for: pub-date > 2009 and tak(((Talents into) or cost or basic or technology or research or development or maintain or innovation or optimization or company or processes or continue or advance or toward or goal or luck) and (CWDM or DWDM or Expert or communications or optical or module or technology or company or telecommunications or network or equipment) and (doctorate or active or passive or "electro-optical" or industry orinternationally or renowned or professional or research or development or optical or chips or overseas) and (growth or photonic or integrated or circuit or design or WDM or PON or 20G or 100G or DPSK or key or modules or (WSS data communications) or (network。