ii Systematic Design of a Family of Attack-Resistant Authentication Protocols Systematic De
- 格式:pdf
- 大小:82.30 KB
- 文档页数:28
Chapter 1Introduction1. Define the following terms briefly.(1) linguistics语言学: the scientific or systematic study of language.(2) language语言: a system of arbitrary vocal 任意的声音symbols used for human communication.用于人类交流的任意声音符号系统(3) arbitrariness任意性: the absence of similarity betweenthe form of a linguistic sign and what it relates to in reality,语言符号的形式与现实的关系缺乏相似性e.g. the worddog does not look like a dog.(4) duality双重性: the way meaningless elements of languageat one level (sounds and letters) combine to formmeaningful units (words) at another level.在一个层面上(语言和字母)的无意义的语言元素结合在另一个层次上形成有意义的单位(词)(5) competence语言能力: knowledge of the grammar of alanguage as a formal abstraction and distinct from thebehavior of actual language use作为一种形式抽象的语言的语法知识,区别于实际语言使用的行为, i.e.performance.(6) performance语言运用: Chomsky‟s term for actuallanguage behavior as distinct from the knowledge thatunderlies it, or competence.乔姆斯基对实际语言行为的术语不同于它的知识,或能力。
2024-2025学年广东省深圳市福田区莲花中学七年级上学期期中考试英语试题阅读下面短文,从短文后所给的A、B、C、D四个选项中选出能填入相应空白处的最佳选项,并在答题卡上将相应的字母编号涂黑。
A student always asked himself, “How many friends should a person have —one or many?” One day, he decided to ask his teacher for ________.“It is very simple,” the teacher answered. “Get me that red apple from the highest branch (树枝) of the tree.” The student ________ and said, “It’s too high! I can’t reach it.” “Ask a friend. Maybe he can help.” the teacher suggested. The student called another student and stood on his shoulders (肩膀) to reach the branch. “I still can’t reach it, sir,” said the student ________ after the first day.“Don’t you have more ________?” the teacher smiled. The student asked more of them to come over. They stood on each other’s shoulders, trying to make a ________ pyramid (金字塔), but the apple was so ________ that they couldn’t reach it and the pyramid fell. The student still couldn’t reach the apple. Then one of the friends went home, and brought a ladder (梯子). Finally, they were so ________ to pick the apple.After getting the apple, the teacher asked, “So, do you ________ how many friends a person needs?” “I do,” the student said. “Many, so together we can solve any ________.” “Sounds good,” the teacher said. “Friends can give each other ________. You need as many friends as you can. Among them, there will be at least one person who can think of a good idea, like getting a ladder.”1.A.help B.money C.apples D.branches2.A.looked up B.looked into C.looked down D.looked out3.A.luckily B.loudly C.sadly D.deeply4.A.friends B.teachers C.parents D.sisters5.A.animal B.sand C.human D.wood6.A.high B.big C.small D.hard7.A.peaceful B.glad C.scared D.worried8.A.survey B.realize C.describe D.develop9.A.riddle B.difficulty C.challenge D.problem10.A.respect B.admiration C.courage D.supportSharing our school livesStudents from different countries share what their school day is like.Every morning, I get to school at about 7:15 a.m. After meeting with my friends, we go to our classes. All my classes are 1 hour and 15 minutes long. Between classes, we have a 5-minute break. After the first class, I go to homeroom (年级大教室) for 30 minutes. Then, it’s time fora break! I eat a snack and talk with friends. At 10, I walk to my next class. Then there is thethird class and lunch. At 12:30, I have the last class, and then I take the bus home with my friends Amy.Amelia Gonzalez, 12, The American School Foundation, MexicoMy day starts with my debate practice (辩论练习) at home because I am on my school debate team. The first class starts at 9:45 a.m. Every kid can choose (选择) four to six subjects, like math and music. The children go to different classrooms for the different subjects. In different classes, we can meet different friends in different classrooms. It is great! Our classes in school end at 3:15 p.m. Then I go back home. But you also can go to clubs like drama club (戏剧社) if you like.Chelsea Wang, 13, Barker College, Hornsby, Australia My classes start at 8:30 a.m. Monday through Wednesday, we have four classes in themorning. We go to different classes in different classrooms. At about 12, we have lunch for about an hour. After that, we have two more classes. At 3 p.m, tutorial (辅导课) will start.You can go to any teacher if you have questions. After that, I always go to tennis practice. We only have three classes on Thursdays and Fridays, so we have more time for clubs and sports.Niu Hanliang, 15, Western Boarding Schools Association, US 11. How many classes does Amelia Gonzalez have before her homeroom session?A.1 B.2 C.3 D.412. How does Chelsea Wang feel about her class?A.Angry B.Happy C.Sad D.Tired13. Why do Niu Hanliang’s school have fewer classes on Thursdays and Fridays?A.To allow more time for homework B.To allow more time for clubs and sportsC.To give students a longer weekend D.To give teachers a shorter workweek 14. On Monday, who stays at school for the longest time?A.Amelia B.Amy C.Chelsea D.Niu Hanliang 15. Why did the writer write the passage?A.To show the daily routines of students in different countriesB.To show the classes of students in different countriesC.To show the friendship of students in different countriesD.To show the after-school activities of students in different countriesAre you at a new school? Being a new student can make you worried at first, but if you are afraid of it too much, you can’t live a happy school life. Here are different ways to get along with your classmates, from joining in after-school activities to starting a conversation (交谈) in class. Here are some tips to help you make new friends at school.Introduce yourself to people first. Start by offering your name first. A basic introduction is a great way to put yourself out there. You might also talk about something that you are good at. For example, if you say you are good at playing the piano, someone may want to learn more about the piano.Give a hand to a classmate in need. Helping a classmate is a good way to make friends. You might help someone pick up the notebooks they dropped or let someone borrow a pencil. Being kind is a great way to make friends with others, such as offering part of your lunch to someone who forgot theirs or offering to read textbooks together with someone who forgot to bring theirs.Keep your eye out for classmates with same interests. Look at your clas smates’ interests and activities. Do you see someone reading your favorite book or wearing a T-shirt of your favorite color?These common interests can help you find people you’re more likely to get along with.16. What does the underlined word “it” refer to (指代)?A.Living a happy school life. B.Getting along with your classmates.C.Being a new student at school. D.Starting a conversation in class17. When meeting someone new, how should you start conversations?A.By introducing yourself first. B.By asking about his or her job.C.By talking about the weather. D.By waiting for him or her to speak first18. How can you show your kindness to your classmates?①By picking up their notebooks. ②By buying them a nice pencil③By offering them part of your lunch. ④By sharing textbooks with them.A.①②③B.①③④C.②③④D.①②④19. Which of the following ways can help you find classmates you might get along with?A.Looking at classmates’ hobbiesB.Asking classmates about their gradesC.Reading classmates’ favourite booksD.Wearing same clothes with classmates20. Why did the writer write the passage?A.To share some kinds of after-school activities.B.To teach students the importance of good friends.C.To help students find their interests in their daily life.D.To give some advice on making friends at a new school.Why are the leaves on trees different colors? What makes them change color? Leaves use sunlight, water, and air to make food for the trees. This way of making food is called photosynthesis. Photosynthesis is important to animals as well as plants. Some animals eat plants. Other animals eat these animals.Summer is playtime. For the leaves of many trees, however, it’s work, work, work! The Sun is shining. The leaves are making food for the trees. The trees keep more than enough food deep inside. Leaves are green in summer because they are making food. Leaves also have orange, yellow, or brown colors inside them. During summer, those colors are covered by the green color.Many places get colder in fall with shorter days and longer nights. Trees get less sunlight, so photosynthesis slows down. Over time, leaves stop making the green chemical. The hidden orange, yellow, and brown colors grow when that happens.Once it gets cold enough and ice appears at night, the trees drop their leaves. They do this to keep themselves safe. If the leaves turn to ice while still on the trees, the trees can be hurt. Trees that drop their leaves are bare (光秃秃) in winter. They use the food they save in summer to get through the cold days and nights.Spring comes before long. Ice and snow disappear and the rains come. The Sun shines, and tiny leaves grow from branches. Once again, the leaves use sunlight, water, and air to make food. The cycle (循环) begins again.21. What is photosynthesis according to the passage?A.Away of growing leaves. B.A way of changing colors.C.A way for animals to eat plants. D.A way to make food for plants.22. According to the second paragraph, why are leaves green in summer?A.Because trees are making food for leaves.B.Because they are busy making food for treesC.Because there is no other color inside leaves in summerD.Because summer is playtime for the leaves of many trees.23. What stops leaves from making the green chemical in fall?A.Less air in fall. B.Less time in fall.C.Less water in fall. D.Less sunlight in fall.24. Where are you most likely to read this passage?A.In a science magazine B.In a storybookC.In an art textbook D.In a history book25. Which of the following shows the structure (结构) of the passage? (①=Paragraph 1)A.B.C.D.阅读下面短文,并从下面的六个句子中选择五个还原到原文中,使原文的意思完整、连贯。
语言学复习试题及参考答案I. Mark the choice that can best complete the statement (20 x1)1. Which of the following is not a design feature of human language?A. ArbitrarinessB. DisplacementC. DualityD. Meaningfulness2. According to F. de Saussure, _______ refers to the abstract linguistic system shared by all the members of a speech community.A. paroleB. performanceC. langueD. Language3. The assimilation rule assimilates one sound to another by “copying〞a feature of a sequential phoneme, thus making the two phones ____________.A. identicalB. sameC. exactly alikeD. similar4. Distinctive features can be found running over a sequence of two or more phonemic segments. The phonemic features that occur above the level of the segments are called _______.A. phonetic componentsB. immediate constituentsC. suprasegmental featuresD. semantic features5. The morpheme “vision〞in the common word “television〞is a(n) ______.A. bound morphemeB. bound formC. inflectional morphemeD. free morpheme6. The meaning carried by the inflectional morpheme is _______.A. lexicalB. morphemicC. grammaticalD. semantic7. Phrase structure rules have ____ properties.A. recursiveB. grammaticalC. socialD. functional8. The syntactic rules of any language are ____ in number.A. largeB. smallC. finiteD. infinite9. “We shall know a word by the company it keeps.〞This statement represents _______.A. the conceptualist viewB. contexutalismC. the naming theoryD. behaviourism10. “Alive〞and “dead〞are ______________.A. gradable antonymsB. relational oppositesC. complementary antonymsD. None of the above11. What essentially distinguishes semantics and pragmatics is whether in the study of meaning _________ is considered.A. referenceB. speech actC. practical usageD. context12. __________ is the act performed by or resulting from saying something; it is the consequence of, or the change brought about by the utterance.A. A locutionary actB. An illocutionary actC. A perlocutionary actD. A performative act13. Language change is ______________.A. universal, continuous and, to a large extent, regular and systematicB. continuous, regular, systematic, but not universalC. universal, continuous, but not regular and systematicD. always regular and systematic, but not universal and continuous14. In Old and Middle English, both /k/ and /n/ in the word “knight〞were pronounced, but in modern English, /k/ in the sound /kn-/ clusters was not pronounced. This phenomenon is known as ________. A. sound addition B. sound lossC. sound shiftD. sound movement15. The most distinguishable linguistic feature of a regional dialect is its _____.A. use of wordsB. use of structuresC. accentD. morphemes16. _________ means that certain authorities, such as the government choose, a particular speech variety, standardize it and spread the use of it across regional boundaries.A. Language interferenceB. Language changesC. Language planningD. Language transfer17. Human linguistic ability largely depends on the structure and dynamics of _________.A. human brainB. human vocal cordsC. human memoryD. human18. The most important part of the brain is the outside surface of the brain, called _________.A. the neuronsB. nerve pathwaysC. cerebral cortexD. sensory organs19. The development of linguistic skills involves the acquisition of ____ rules rather than the mere memorization of words and sentences.A. culturalB. grammaticalC. behaviorD. pragmatic20. According to the _______, the acquisition of a second language involves, and is dependent on, the acquisition of the culture of the target language community.A. acculturation viewB. mentalist viewC. behaviourist viewD. conceptualist view得分21. People can utter a sentence he has never heard or used before. In this sense, human language is creative.22. In English both aspirated and unaspirated voiceless stops occur. The voiceless aspirated stopsand the voiceless unaspirated stops occur in the same phonemic context or environment.23. Parameters are syntactic options of UG that allow general principles to operate in one way or another and contribute to significant linguistic variations between and among languages.24. Syntactic movement occurs to all sentences, therefore, the deep structure and surface structure of every sentence look different at its two levels of representation.25. The Anglo-Saxons were migrants from the northern parts of Europe, so the words that they originally used and the words that the English vocabulary has later taken in from other languages are regarded as loan words.26. Paul Grice made a distinction between what he called “constatives〞and“performatives〞.27. Most of the languages of Europe, Persia (Iran), and the northern part of India belong to thesame Indo-European language family. The language, which no longer exists, is called Proto-Indo-European, a term reflecting the earlier linguistic distribution of the speakers of this language family from India to Europe.28. In Black English, when the verb is negated, the indefinite pronouns something, somebody, and some become the negative indefinites nothing, nobody, and none, as in :He don’t know nothing.He don’t like n obody.He ain’t got none.29. The cerebral cortex is the decision-making organ of the body, receiving messages from all the sensory organs and initiating all voluntary actions.30.During the two-word stage of language acquisition, two-word expressions are absent of syntactic or morphological markers.III. Define Six of thefollowing ten terms, illustrate them if necessary (6 x 5).31. allomorph32. bound morpheme33. semantics34. reference35. synonymy,36. predication analysis,37. critical period hypothesis38. linguistic competence39. bilingualism4olinguisticsIV. Answer the following questions as comprehensively as possible, giving examples if necessary ( 4x10 ):1. How do you understand that language is arbitrary?2. How are semantics and pragmatics different from each other?3. Draw a tree diagram for the following statements:1 ) The people live a peaceful life in the countryside.2) He knows that I will come the day after tomorrow.4. According to the ways synonyms differ, how many groups can we classify synonyms into? Illustrate them with examples.参考答案及评分标准I. Mark the choice that can best complete the statement (20 x1) 每题一分1.D2.C3.D4.C5.D6. C7. A8. C9. B 10.C11D 12.C 13.A 14.B 15. C 16.C 17.A 18.C 19.B 20.AII. True or False (10x1) 每题一分21.T 22.F 23.T 24.F 25.F 26.F 27.T 28.T 29.T 30.TIII. Define the following terms, illustrate them if necessary (5x6). 每题五分,能够举例不举例说明的扣二分。
英语六级答案2023年6月英语六级全部答案2023年6月第一套听力答案1.A) She is drawn to its integration of design andengineering .2.D) Through hard work3.C) It is long - lasting .4.A) Computer science .5.B) He is well known to the public .6.D) Serve as a personal assistant .7.D) He has little previous work experience .8.C) He has a high proficiency in several languages .9.A) They have fewer rules and pressures .10.B) They rob kids of the chance to cultivate their courage .11.C) Let them participate in some less risky outdooractivities .12.B) Tech firms intentionally design products to have shortlifespans13.C) List a repairability score of their products .14.D) Take the initiative to reduce e lectronie waste .15.A) It can be solved .16.B) How to prevent employees from cyberloafing .17.C) Cyberloafing may relieve employees of stress .18.A) Taking mini - breaks means better job performance19.D) There were no trees .20.B) He founded a newspaper and used it to promote hisideas .21.C) One million trees were planted throughout Nebraska22.B) They moved out of Africa about 60,000 years ago .23.D) The discovery of two modern human teeth in China .24.A) There must have been some reason for humanmigration .25.D) What path modern humans took to migrate out of Africa英语六级全部答案2023年6月第二套听力答案1.B ) It was warm and comfortable .2.B ) She misses her roommates she used to complain about .3.C ) He had a similar feeling to the woman s .4.A ) Go to see the woman s apartment .5.D ) He has published a book recently .6.C ) It has not prepared young people for the jobi ja market .7.A ) More of the budget should go to science and technology .8.D ) Cultivate better citizens .9. A ) It is quite common .10. B ) Engaging in regular contemplation .11. D ) Reflecting during ones relaxation .12. C ) There existed post offices .13. D ) It kept people in the deserts and plains connected .14. B ) It commissioned private wagons to carry the mail .15. C ) He examined its historical trends with data science .16. A ) Higher levels of anxiety may improve people s memory .17.C ) They measured the participants anxiety levels . SP18. B ) Extreme levels of anxiety can adversely affect cognitive performance .19. D ) They expect to get instantaneous responses to their inquiry .20. C ) Speaking directly to their emotions .21.B ) Keep up with the latest technological developments .22. D )- Friendships benefit work .23. A ) The impact of friends on people s self - esteem .24. D ) They increase people s job satisfaction .25. A ) Allow employees to have a flexible work schedule .英语六级全部答案2023年6月第三套听力答案:待更新2023六月英语六级答案——选词填空(第一套)Imagine sitting down to a big dinner ...26.H indulging27.I innumerable28.J morality29.A attributes30.K odds31.M regulatory32.G inclined33.N still34.E diminishing35.B comprised2023六月英语六级答案——选词填空(第二套)Scientists recently examined studies on dog intelligence ..26.N surpass27.K previously28.O volumn29.M prove30.A affirmed31.G formidable32.D differentiate33.E distinct34.C completely35.I overstated2023六月英语六级答案——选词填空(第三套)You might not know yourself as wellasyouthink ...26.L relatively27.I probes28.A activated29.k recall30.D consecutive31.C assessment32.G discrepancy33.E cues34.J random35.O terminate英语六级全部答案2023年6月信息匹配1答案速查36-40 GDJHB41-45 ICLEN36.【 G 】 With only 26 students ...37.【 D 】I’ve had the priviledge of38.【 J 】 The average tuition at a small ...39.【 H 】" Living in close community ..40.【 B 】 In higher education the trend ...41.【 I 】 Sterling Collegein Craftsbury Common ..42.【 C 】 Tiny Colleges focus not just on mi43.【 L 】 The " trick " to making tiny colleges ...44.【 E 】 Having just retired from teaching at a ...45.【 N 】 The ultimate justification for a tiny college……英语六级全部答案2023年6月信息匹配236-40 CGAIF41-45 KDMBH36【 C 】 Defoe s masterpiece , which is often ..37【 G 】 There are multiple explanations ...38【 A 】 Gratitude may be more beneficiasm39【 I 】 Of course , act of kindness can also ...40【 F 】 Recent scientific studies support .41【 K 】 Reflecting on generosity and gratitude ... 42【 D 】 When we focus on the things ....43【 M 】When Defoe depicted Robinson ...44【 B 】 While this research into ...45【 H 】 Gratitude also tends to strengthens a sense 英语六级全部答案2023年6月信息匹配3答案速查36-40 EAFCH41-45 BIEKG36.【 E 】 Curran describes socilly prescibed .37.【 A 】 When psychologist Jessica Pryor ...38.【 F 】 Perfectionism can , of course , be ...39.【 C 】 What s more , perfectionism ...40.【 H 】 While educators and parents have ...41.【 B 】 Along with other therapists ...42.【 I 】 Bach , who sees many students ....43.【 E 】 Curan describes socially prescribed …44.【 K 】 Brustein likes to get his perfectionist clients to create ...45.【 G 】 Brustein says his perfectionist clients ...2023年6月英语六级翻译答案:公共设施建设随着中国经济的快速发展和人们生活水平的稳步提高,城市居民对环境和生活品质的要求越来越高。
外文原文:Kinematic Synthesis ,Cams and Gears Mechanisms form the basic geometrical elements of many mechanical devices including automatic packaging machinery, typewriters, mechanical toys, textile machinery, and others. A mechanism typically is designed to create a desired motion of a rigid body relative to a reference member. Kinematic design, or kinematic syntheses, of mechanisms often is the first step in the design of a complete machine. When forces are considered, the additional problems of dynamics, bearing loads, stresses, lubrication, and the like are introduced, and the larger problem becomes one of machine design.A kinematician defined kinematics as “the study of the motion of mechanisms and methods of creating them.” The first part of this definition deals with kinematic analysis. Given a certain mechanism, the motion characteristics of its components will be determined by kinematic analysis. The statement of the tasks of analysis contains all principal dimensions of the mechanism, the interconnections of its links, and the specification of the input motion or method of actuation. The objective is to find the displacements, velocities, accelerations, shock or jerk (second acceleration) , and perhaps higher accelerations of the various members, as well as the paths described and motions performed by certain elements. In short, in kinematic analysis we determine the performance of a given mechanism. The second part of definition may be paraphrased in two ways:1. The study of methods of creating a given motion by means of mechanisms.2. The study of methods of creating mechanisms having a given motion.In either version, the motion is given and the mechanism is to be found. This is the essence of kinematic synthesis. Thus kinematic synthesis deals with the systematic design of mechanisms for a given performance. The area of synthesis may be grouped into two categories.1. Type synthesis. Given the required performance, what type of mechanism will be suitable? (Gear trains? Linkages? Cam mechanisms? ) Also, how many links should the mechanism have? How many degrees of freedom are required? What configuration id desirable? And so on. Deliberations involving the number of links and degrees of freedom are often referred to as the province of a subcategory of type synthesis called number synthesis.2. Dimensional synthesis. The second major category of kinematic synthesis is best defined by way of its objective: Dimensional synthesis seeks to determine the significant dimensions and the starting position of a mechanism of preconceived type for a specified task and prescribed performance.Significant dimensions mean link lengths or distances on binary, ternary, and so on, links, angles between axis, cam-contour dimensions and cam-follower diameters, eccentricities, gear rations, and so forth. A mechanism of preconceived type may be a slider-crank linkage, a four-bar linkage, a cam with flat follower, or a more complex linkage of a certain configuration defined topologically but not dimensionally. Thereare three customary tasks for kinematic synthesis: function generation, path generation and motion generation.In function generation mechanisms rotation or sliding motions of input and output links must be correlated. For an arbitrary function )(x f y =, a kinematic synthesis task may be to design a linkage to correlate input and output such that the input moves by x , the output moves by )(x f y = for the range 10+<<n x x x . In the case of rotary input and output, the angles of rotation ϕ and ψ are the linear analogs of x and y respectively. When the input link is rotated to a value of the independent x , the mechanism in a “black box” causes the output link to turn to the corresponding value of the dependent variable )(x f y =. This may be regarded as a simple case of a mechanical analog computer. A variety of different mechanisms cou ld be contained within the “black box”. However, the four -bar linkage is not capable of error-free generation of an arbitrary function and can match the function at only a limited number of precision points. It is widely used in industry because the four-bar linkage id simple to construct and maintain.In path generation mechanism a point on a “floating link” is to trace a path defined with respect to a fixed frame of reference. If the path points are to be correlated with either time or input-link positions, the task is called path generation with prescribed timing. An example of path generation mechanisms id a four-bar linkage designed to pitch a baseball or tennis ball. In this case the trajectory of point p would be such as to pick up a ball at a prescribed location and to deliver the ball along a prescribed path with prescribed timing for reaching a suitable throw-velocity and direction.There are many situations in the design of mechanical devises in which it is necessary either to guide a rigid body through a series of specified, finitely separated positions or to impose constraints on the velocity and/or acceleration of the moving body at a reduced number of finitely separated positions. Motion-generation or rigid-body guidance mechanism requires that an entire body be guided through a prescribed motion sequence. The body to be guided usually is a part of a floating link, of which not only is the path of a point p prescribed, but also the rotation of a line passing through the point and embedded in the body,. For instance, the line might represent a carrier link in a automatic machinery where a point located on the carrier link has a prescribed path while the carrier has a prescribed angular orientation. Prescribing the movement of the bucket for a bucket loader id another example of motion generation mechanisms, the path of tip of the bucket is critical since the tip must perform a scooping trajectory followed by a lifting and a dumping trajectory. The angular orientation of the bucket are equally important to ensure that load is dumped from the correct position.A cam is a convenient device for transforming one motion into another. Thismachine element has a curved or grooved surface which mates with a follower and imparts motion to it. The motion of the cam (usually rotation) is transformed into follower oscillation, translation, or both. Because of the various cam geometries and the large number of cam and follower combinations, the cam is an extremely versatile mechanical element. Although a cam and follower may be designed for motion, path, or function generation, the majority of applications utilize the cam and follower for function generation.The most common cam types according to cam shapes are: disk or plate translating (two-dimensional or planar), and cylindrical (three-dimensional or spatial) cams. Followers can be classified in several ways: according to follower motion, such as translation or oscillation; according to whether the translational (straight-line) follower motion is radial of offset from the center of the cam shaft; and according to the shape of the follower contact surface (e. g. , flat-face, roller, point (knife-edge), spherical, planar curved, or spatial-curved surface).In the case of a disk cam with a radial (in-line) translating roller follower the smallest circle that can be drawn tangent to the cam surface and concentric with the camshaft is the base circle. The tracer point is a point at the center of the roller center and the normal to the pitch curve. The pressure angle is the angle between the direction of the path of the roller center and the normal to the pitch curve through the center of the roller and is the complement of the transmission angle. Neglecting friction, this normal is collinear with the contact force between the cam and follower. As in a linkage, the pressure angle varies during the cycle and is a measure of the ability of the cam to transfer motive effort to the follower. A large pressure angle will produce an appreciable lateral force exerted on the stem of the follower, which, in the presence of friction, would tend to bind the follower in the guide.Numerous applications in automatic machinery require intermittent motion. A typical example will call for a rise-dwell-return and perhaps another dwell period of a specified number of degrees each, together with a required follower displacement measured in centimeters or degrees. The designer’s job is to lay out the cam accordingly. The first decision to be made is to choose the cam follower type. The specified application may dictate the combination of the cam and follower. Some factors that should enter into the decision are: geometric considerations, dynamic considerations, environmental considerations and economic matters. Once a type of cam and follower pair has been selected, the follower motion must be chosen. Therefore, the velocity, acceleration, and in some cases further derivatives of the displacement of the follower are of great importance.Gears are machine elements that transmit motion by means of successively engaging teeth. Gears transmit motion from one rotating shaft to another, or to a rack that translates. Numerous applications exist in which a constant angular velocity ratio (or constant torque ratio) must be transmitted between shafts. Based on the variety of gear types available, there is no restriction that the input and the output shafts need be either in-line or parallel. Nonlinear angular velocity ratios are also available by using noncircular gears. In order to maintain a constant angular velocity, the individual tooth profile must obey the fundamental law of gearing: for a pair of gears to transmita constant angular velocity ratio, the shape of their contacting profiles must be such that the common normal passes through a fixed point on the line of the centers.Any two mating tooth profiles that satisfy the fundamental law of gearing are called conjugate profiles. Although there are many tooth shapes possible in which a mating tooth could be designed to satisfy the fundamental law, only two are in general use: the cycloidal and involute profiles. The involute has important advantages: it is easy to manufacture and the center distance between a pair of involute gears can be varied without changing the velocity ratio. Thus chose tolerances between shafts are not required when utilizing the involute profile.There are several standard gear types. For applications with parallel shafts, straight spur gear, parallel helical, or herringbone gears are usually used. In the case of intersecting shafts, straight bevel of spiral bevel gears are employed. For nonintersecting and nonparallel shafts, crossed helical, worm, face, skew bevel or hypoid gears would be acceptable choices. For spur gears, the pitch circles of mating gears are tangent to each other. They roll on one another without sliding. The addendum is the height by which a tooth projects beyond the pitch circle (also the radial distance between the pitch circle and the addendum circle). The clearance is the amount by which the addendum (tooth height below the pitch circle) in a given gears exceeds the addendum of its mating gear. The tooth thickness is the distance across the tooth along the arc of the pitch circle while the tooth space is the distance between adjacent teeth along the arc of the pitch circle. The backlash is the amount by which the width of the tooth space exceeds the thickness of the engaging tooth at the pitch circle.中文译文:运动的综合,凸轮和齿轮机构是形成许多机械装置的基本几何结构单元,这些机械装置包括自动包装机、打印机、机械玩具、纺织机械和其他机械等。
Design of ExperimentsDesign of Experiments (DOE) is a systematic approach used to investigate and optimize processes or systems. It involves planning, conducting, analyzing, and interpreting controlled experiments to understand the relationship between input variables and output responses. By carefully designing experiments, researchers can identify the most influential factors and their optimal settings, leading to improved performance and efficiency. One perspective on DOE is its importance in scientific research. In many fields, researchers need to understand the cause-and-effect relationships between variables. Traditional one-variable-at-a-time experiments can be time-consuming and may miss important interactions between factors. DOE allows researchers to simultaneously study multiple factors and their interactions, providing a more comprehensive understanding of the system under investigation. This approach accelerates the discovery process and enables researchers to make informed decisions based on reliable data. Another perspective on DOE is its relevance in industrial settings. Manufacturers often face challenges in optimizing their processes to meet quality standards and reduce costs. DOE helps identify the key process parameters and their optimal levels, leading to improved product quality and increased efficiency. By systematically varying the factors of interest, manufacturers can understand their effects on the process outputs and determine the best settings to achieve desired outcomes. This approach minimizes trial and error, saving time and resources. From a statistical perspective, DOE allows for efficient data collection and analysis. By carefully selecting the experimental design, researchers can maximize the information gained from a limited number of experiments. Statistical methods such as analysis of variance (ANOVA) and regression analysis are commonly used to analyze DOE data and quantify the effects of factors. These techniques provide valuable insights into the significance of different factors and their interactions, enabling researchers to make statistically sound conclusions. DOE also offers a practical approach to decision-making under uncertainty. By systematically varying factors and observing their effects, researchers can assess the robustness of their findings and make informed decisions even in the presence of variability. This helps mitigate the risk of relying on a single set of conditions and enhances the generalizability ofthe results. By considering multiple scenarios, researchers can gain a more comprehensive understanding of the system and make more reliable predictions. Furthermore, DOE promotes collaboration and interdisciplinary research. Designing and conducting experiments often require input from experts in different fields, such as statisticians, engineers, and domain specialists. By bringing together diverse perspectives, DOE encourages cross-pollination of ideas and fosters innovation. This multidisciplinary approach can lead to breakthrough discoveries and novel solutions to complex problems. In conclusion, Design of Experiments is a powerful tool that enables researchers and practitioners to systematically investigate and optimize processes or systems. From a scientific perspective, DOE provides a comprehensive understanding of cause-and-effect relationships and accelerates the discovery process. In industrial settings, it helps manufacturers optimize their processes and improve product quality. From a statistical standpoint, DOE allows for efficient data collection and analysis, leading to statistically sound conclusions. Moreover, DOE facilitates decision-making under uncertainty and promotes collaboration and interdisciplinary research. Overall, DOE plays a crucial role in advancing scientific knowledge, enhancing industrial performance, and driving innovation.。
《英语语言学概论》精选试题 11. Which of the following statements about language is NOT trueA. Language is a systemB. Language is symbolicC. Animals also have languageD. Language is arbitrary2. Which of the following features is NOT one of the design features of languageA. SymbolicB. DualityC. ProductiveD. Arbitrary3. What is the most important function of languageA. InterpersonalB. PhaticC. InformativeD. Metalingual4. Who put forward the distinction between Langue and ParoleA. SaussureB. ChomskyC. HallidayD. Anonymous5. According to Chomsky, which is the ideal user's internalized knowledge of his languageA. competenceB. paroleC. performanceD. langue6. The function of the sentence "A nice day, isn't it" is .A. informativeB. phaticC. directiveD. performative7. Articulatory phonetics mainly studies .A. the physical properties of the sounds produced in speechB. the perception of soundsC. the combination of soundsD. the production of sounds8. The distinction between vowels and consonants lies in .A. the place of articulationB. the obstruction of airstreamC. the position of the tongueD. the shape of the lips9. Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description,classification and transcriptionA. PhoneticsB. PhonologyC. SemanticsD. Pragmatics10. Which studies the sound systems in a certain languageA. PhoneticsB. PhonologyC. SemanticsD. Pragmatics11. Minimal pairs are used to .A. find the distinctive features of a languageB. find the phonemes of a languageC. compare two wordsD. find the allophones of language12. Usually, suprasegmental features include ___ ,length and pitch.A. phonemeB. speech soundsC. syllablesD. stress13. Which is an indispensable part of a syllableA. CodaB. OnsetC. StemD. Peak三、判断analyst collects samples of the language as it is used, not according to some views of how it should be used. This is called the prescriptive approach. Ftranscription is normally used by the phoneticians in their study of speech sounds. F台州学院考试题1. Articulatory Phonetics studies the physical properties of speech sounds.2. English is a typical intonation language.3. Phones in complementary distribution should be assigned to the same phoneme.4. Linguistic c__________ is a native speaker’s linguistic knowledge of his language.1. The relationship between the sound and the meaning of a word is a________.2. P ____ refers to the realization of langue in actual use.3. Linguistics is generally defined as the s ____ study of language.1. Which of the following branch of linguistics takes the inner structure of word as its mainobject of studyA. Phonetics.B. Semantics.C. Morphology.D. Sociolinguistics.3. Which of the following is a voiceless bilabial stopA. [w].B. [m].C. [b].D. [p].6. What phonetic feature distinguishes the [p] in please and the [p] in speakB. AspirationC. RoundnessD. Nasality11. Conventionally a ________ is put in slashes.A. allophoneB. phoneC. phonemeD. morpheme13. Language is tool of communication. The symbol “highway closed” serves___.A. an expressive functionB. an informative functionC. a performative functionD. a persuasive function14. Which of the following groups of words is a minimal pairA. but/pubB. wet/whichC. cool/curlD. fail/find16. What are the dual structures of languageA. Sounds and letters.B. Sounds and meaning.C. Letters and meaning.D. Sounds and symbols.19. Which of the following is one of the core branches of linguisticsA. Phonology.B. Psycho-linguistics.C. Sociolinguistics.D. Anthropology.IV. Translate the following linguistic terms: (10 points, 1 point each)A. From English to ChineseB. From Chinese to English1. acoustic phonetics6. 應用語言學2. closed class words4. distinctive featuresVI. Answer the following questions briefly. (20 points)1. Define phoneme. (4 points)2. Explain complementary distribution with an example. (5 points)3. What are the four criteria for classifying English vowels. (4 points)问答答案 1. A contrastive phonological segment whose phonetic realizations are predictable byrules. (4 points) (or: A phoneme is a phonological unit ; it is a unit that is of distinctive value.)2. The situation in which phones never occur in the same phonetic environment. (4 points) . [p] and [p h] never occur in the same position. (1 point)3. the position of the tongue in the mouth(1 point), the openness of the mouth(1 point), the shape of the lips(1 point), and the length of the vowels. (1 point)Chapter 1Introductions to LinguisticsI. Choose the best answer. (20%)1. Language is a system of arbitrary vocal symbols used for human __________A. contactB. communicationC. relationD. Community2. Which of the following words is entirely arbitraryA. treeB. typewriterC. crashD. Bang3. The function of the sentence “Water boils at 100 degrees Centigrade. ”is__________.A. interrogativeB. directiveC. informativeD. Performative4. In Chinese when someone breaks a bowl or a plate the host or the people present are likely to say“碎碎(岁岁)平安”as a means of controlling the forces which they believes feel might affect their lives. Which functions does it performA. InterpersonalB. EmotiveC. PerformativeD. Recreational5.Which of the following property of language enables language users to overcome the barriers caused by time and , due to this feature of language,placespeakers of a language are free to talk about anything in any situationA. TransferabilityB. DualityC. DisplacementD. Arbitrariness6. Study the following dialogue. What function does it play according to the functions of language— A nice day, isn’t it— Right! I really enjoy the sunlight.A. EmotiveB. PhaticC. PerformativeD. Interpersonal7.__________refers to the actual realization of the ideal language user’s knowledge of the rules of his language in utterances.A. PerformanceB. CompetenceC. LangueD. Parole8. When a dog is barking, you assume it is barking for something or at someone that exists hear and now. It couldn’t be sorrowful for some lost love or lost bone. This indicates the design feature of __________.A. cultural transmissionB. productivityC. displacementD. Duality9. __________ answers such questions as how we as infants acquire our first language.linguisticsC. SociolinguisticsD. Applied linguistics10. __________ deals with language application to other fields, particularly education.A. Linguistic theoryB. Practical linguisticsC. Applied linguisticsD. Comparative linguisticsII. Decide whether the following statements are true or false. (10%) 11. Language is a means of verbal communication. Therefore, the communication way used by the deaf-mute is not language. F13. Speaking is the quickest and most efficient way of the human communication systems.14. Language is written because writing is the primary medium for all languages. F15. We were all born with the ability to acquire language, which means the details of any language system can be genetically transmitted. F16. Only human beings are able to communicate. F17. F. de Saussure, who made the distinction between langue and parole in the early 20th century, was a French linguist. F18. A study of the features of the English used in Shakespeare’s time is an example of the diachronic 历时 study of language. F19. Speech and writing came into being at much the same time in human20. All the languages in the world today have both spoken and written forms. FIII. Fill in the blanks. (10%)21. Language, broadly speaking, is a means of __verbal________ communication.22. In any language words can be used in new ways to mean new things and can be combined into innumerable sentences based on limited rules.This feature is usually termed ___ creativity_______.23. Language has many functions. We can use language to talk about itself. This function is __________.24. Theory that primitive man made involuntary vocal noises while performing heavy work has been called the ___ yo-he-ho_______ theory.25. Linguistics is the __ systematic________ study of language.26. Modern linguistics is __________ in the sense that the linguist tries to discover what language is rather than lay down some rules for people to observe.27. One general principle of linguistic analysis is the primacy of __________ over writing.28. The description of a language as it changes through time is a __________ study.29. Saussure put forward two important concepts. __________ refers to the abstract linguistic system shared by all members of a speech community.30. Linguistic potential is similar to Saussure’s langue and Chomsky’s __________.IV. Explain the following terms, using examples. (20%)31. Design feature32. Displacement33. Competence34. Synchronic linguisticsV. Answer the following questions. (20%)35. Why do people take duality as one of the important design features of human language Can you tell us what language will be if it has no such design feature (南开大学, 2004)35.Duality makes our language productive. A large number of different units can be formed out of a small number of elements – for instance, tens of thousands of words out of a small set of sounds, around 48 in the case of the English language. And out of the huge number of words, there can be astronomical number of possible sentences and phrases, which in turn can combine to form unlimited number of texts. Most animal communication systems do not have this design feature of human language.If language has no such design feature, then it will be like animal communicational system which will be highly limited. It cannot produce a very large number of sound combinations, . words, which are distinct in meaning.Chapter 2 Speech SoundsI. Choose the best answer. (20%)1. Pitch variation is known as __________ when its patterns are imposed on sentences.A. intonationB. toneC. pronunciationD. voice2. Conventionally a __________ is put in slashes (/ /).A. allophoneB. phoneC. phonemeD. morpheme3. An aspirated p, an unaspirated p and an unreleased p are __________ of the p phoneme.A. analoguesB. tagmemesC. morphemesD. allophones4. The opening between the vocal cords is sometimes referred to as __________.A. glottisB. vocal cavityC. pharynxD. uvula6. A phoneme is a group of similar sounds called __________.A. minimal pairsB. allomorphsC. phonesD. allophones7. Which branch of phonetics concerns the production of speech soundsA. Acoustic phoneticsB. Articulatory phoneticsC. Auditory phoneticsD. None of the above8. Which one is different from the others according to places of articulationA. [n]B. [m]C. [ b ]D. [p]9. Which vowel is different from the others according to the characteristics of vowelsA. [i:]B. [ u ]C. [e]D. [ i ]10. What kind of sounds can we make when the vocal cords are vibratingA. VoicelessB. VoicedC. Glottal stopD. ConsonantII. Decide whether the following statements are true or false. (10%) 11. Suprasegmental phonology refers to the study of phonological properties of units larger than the segment-phoneme, such as syllable, word and sentence. 12. The air stream provided by the lungs has to undergo a number of modification to acquire the quality of a speech sound.14. [p] is a voiced bilabial stop.15. Acoustic phonetics is concerned with the perception of speech sounds.16. All syllables must have a nucleus but not all syllables contain an onset and a coda.pure vowels or monophthongs are pronounced, no vowel glides take place.18. According to the length or tenseness of the pronunciation, vowels can be divided into tense vs. lax or long vs. short.III. Fill in the blanks. (20%)21. Consonant sounds can be either __________ or __________, while all vowel sounds are __________.23. The qualities of vowels depend upon the position of the __________ and the lips.25. Consonants differ from vowels in that the latter are produced without __________.26. In phonological analysis the words fail / veil are distinguishable simply because of the two phonemes /f/ - /v/. This is an example for illustrating __________.27. In English there are a number of __________, which are producedby moving from one vowel position to another through intervening positions. 28. __________ refers to the phenomenon of sounds continually show the influence of their neighbors.29. __________ is the smallest linguistic unit.IV. Explain the following terms, using examples. (20%)31. Sound assimilation32. Suprasegmental feature33. Complementary distribution34. Distinctive featuresV. Answer the following questions. (20%)35. What is acoustic phonetics (中国人民大学, 2003)36. What are the differences between voiced sounds and voiceless sounds in terms of articulation (南开大学, 2004)VI. Analyze the following situation. (20%)37. Write the symbol that corresponds to each of the following phonetic descriptions; then give an English word that contains this sound. Example: voiced alveolar stop [d] dog. (青岛海洋大学, 1999)(1) voiceless bilabial unaspirated stop(2) low front vowel(3) lateral liquid(4) velar nasal(5) voiced interdental fricative32. Suprasegmental feature: The phonetic features that occur above the level of the segments are called suprasegmental features;these are the phonological properties of such units as the syllable, the word, and the sentence.The main suprasegmental ones includes stress, intonation, and tone.33. Complementary distribution: The different allophones of the same phoneme never occur in the same phonetic context. When two or more allophones of one phoneme never occur in the same linguistic environment they are said to be in complementary distribution.34. Distinctive features: It refers to the features that can distinguish one phoneme from another.If we can group the phonemes into two categories: one with this feature and the other without, this feature is called a distinctive feature.V. 35.Acoustic phonetics deals with the transmission of speech sounds through the air. When a speech sound is produced it causes minor air disturbances (sound waves). Various instruments are used to measure the characteristics of these sound waves.36. When the vocal cords are spread apart, the air from the lungs passes between them unimpeded. Sounds produced in this way are described as voiceless; consonants [p, s, t] are produced in this way. But when the vocal cords are drawn together, the air from the lungs repeatedly pushes them apart as it passes through, creating a vibration effect. Sounds produced in this way are described as voiced. [b, z, d] are voiced consonants.。
Chapter one 学点语言学语言学是对语言的系统研究,对于一个学习英语的人来说,应该懂一点语言学的知识,它可以在理论上对学习语言有指导作用,有助于更好的学习语言。
The Goals for this CourseTo get a scientific view on language;To understand some basic theories on linguistics;To understand the applications of the linguistic theories, especially in the fields of language teaching & learning (SLA or TEFL), cross-cultural communication……;To prepare for the future research work.The Requirements for this courseClass attendanceClassroom discussionFulfillment of the assignmentMonthly examExaminationReference Books戴炜栋,何兆熊,(2002),《新编简明英语语言学教程》,上海外语教育出版社。
胡壮麟,(2001),《语言学教程》,北京大学出版社。
胡壮麟,李战子,《语言学简明教程》,北京大学出版社刘润清,(1995),《西方语言学流派》,外语教学与研究出版社。
Fromkin,V. & R. Rodman, (1998), An Introduction to Language the sixth edition, Orlando, Florida: Holt, Ranehart & Winston, Inc.许国璋先生认为把语言定义成交际工具不够科学,至少不够严谨.他对语言的定义做了如下概括:语言是一种符号系统.当它作用于人与人之间的关系的时候,它是表达相互反应的中介;当它作用于人与客观世界的关系的时候,它是认知事物的工具;当它作用于文化的时候,它是文化的载体.Teaching aims: let the students have the general idea about language and linguistics.Teaching difficulties: design features of language; some important distinctions in linguisticsWhy do we study language?A tool for communicationAn integral part of our life and humanityIf we are not fully aware of the nature and mechanism of our language, we will be ignorant of what constitutes our essential humanity.What can language mean?Language can meanwhat a person says (e.g. bad language, expressions)the way of speaking or writing (e.g. Shakespeare‘s language, Luxun‘s language)a particular variety or level of speech or writing (e.g. language for special purpose, colloquial language)the abstract system underlying the totality of the speech/writing behavior of a community (e.g. Chinese language, first language)the common features of all human languages (e.g. He studies language)a tool for human communication. (social function)a set of rules. (rule-governed)The origins of language---the myth of languageThe Biblical accountLanguage was God‘s gift to human beings.The bow-wow theoryLanguage was an imitation of natural sounds, such as the cries of animals, like quack, cuckoo.The pooh-pooh theoryLanguage arose from instinctive emotional cries, expressive of pain or joy.The yo-he-ho theoryLanguage arose from the noises made by a group of people engaged in joint labour or effort – lifting a huge hunted game, moving a rock, etc.The evolution theoryLanguage originated in the process of labour and answered the call of social need.To sum up:The divine-origin theory: language is a gift of god to mankind.The invention theory: imitative, cries of nature, the grunts of men working together.The evolutionary theory: the result of physical and psychological development.What is LanguageLanguage is a system of arbitrary vocal symbols used for human communication.What is communication?A process in which information is transmitted from a source (sender or speaker) to a goal (receiver or listener).A system----elements in it are arranged according to certain rules. They cannot be arranged at will.e.g. He the table cleaned. (×) bkli (×)Arbitrary----there is no intrinsic (logic) connection between a linguistic form and its meaning.Symbols----words are just the symbols associated with objects, actions, and ideas by convention.V ocal--------the primary medium for all languages is sound, no matter how well developed their writing systems are.Writing systems came into being much later than the spoken forms.People with little or no literacy can also be competent language users.Human ----language is human-specific.Human beings have different kinds of brains and vocal capacity.―Language Acquisition Device‖(LAD)Design features of language 语言的结构特征Design features refers to the defining properties of human language that distinguish it from any animal system of communication.a. arbitrariness----the form of linguistic signs bear no natural relationship to their meaning. The link between them is a matter of convention.E.g. ―house‖ uchi (Japanese)Mansion (French)房子(Chinese)conventionality----It means that in any language there are certain sequences of sounds that have a conventionally accepted meaning. Those words are customarily used by all speakers with the same intendedmeaning and understood by all listeners in the same way.There are two different schools of belief concerning arbitrariness. Most people, especially structural linguists believe that language is arbitrary by nature. Other people, however, hold that language is iconic, that is, there is a direct relation or correspondence between sound and meaning, such as onomatopoeia.(cuckoo; crash)For the majority of animal signals, there does appear to be a clear connection between the conveyed message and the signal used to convey it, And for them, the sets of signals used in communication is finite.b. duality----language is simultaneously organized at two levels or layers, namely, the level of sounds and that of meaning.the higher level ----words which are meaningfulthe lower or the basic level----sounds which are meaningless, but can be grouped and regrouped into words. Dog: woof (but not ―w-oo-f ‖ )This duality of levels is, in fact, one of the most economical features of human language, since with a limited set of distinct sounds we are capable of producing a very large number of sound combinations (e.g. words) which are distinct in meaning.The principle of economyc. Productivity/Creativity----language is resourceful. It makes possible the construction and interpretation of new signals by its users.(novel utterances are continually being created.)non-human signals ,on the other hand, appears to have little flexibility.e.g. an experiment of bee communication:The worker bee, normally able to communicate the location of a nectar source , will fail to do so if the location is really ‗new‘. In one experiment, a hive of bees was placed at the foot of a radio tower and a food source at the top. Ten bees were taken to the top, shown the food source, and sent off to tell the rest of the hive about their find. The message was conveyed via a bee dance and the whole gang buzzed off to get the free food. They flow around in all directions, but couldn‘t locate the food. The problem may be that bee communication regarding location has a fixed set of signals, all of which related to horizontal distance. The bee cannot create a ‗new ‘ message indicating vertical distance.d. Displacement----human languages enable their users to symbolize objects, events and concepts which are not present at the moment of communication.Bee communication:When a worker bee finds a source of nectar and returns to the hive, it can perform a complex dance routine to communicate to the other bees the location of this nectar. Depending on the type of dance (round dance for nearby and tail-wagging dance, with variable tempo, for further away and how far), The other bees can work put where this newly discovered feast can be found. Bee communication has displacement in an extremely limited form. However, it must be the most recent food source.e. Cultural transmission----genetic transmissionYou acquire a language in a culture with other speakers and not from parental genes.The process whereby language is passed on from one generation to the next is described as cultural transmission.f. interchangeability: it means that individuals who use a language can both send and receive any permissible message within that communication system. Human beings can be a producer as well as receiver of messages.g. human vocal tractFunctions of language (3+6+7+3)1. Three main functionsthe descriptive function: the primary function of language. It is the function to convey factual information, which can be asserted or denied, and in some cases even verified.the expressive function: it supplies information about the user‘s feelings, preferences, prejudices and values. the social function:also referred to as the interpersonal function, serves to establish and maintain social relations between people2. The Russian-born structural linguists Roman Jakobson identifies six elements of a speech event and relates each one of them to one specific language function. That is, in conjunction of the six primary factors of any speech event, he established a well-known framework of language functions based on the six key elements of communication in his famous article: Linguistics and PoeticsAddresser—Emotive (intonation showing anger)Addressee—Conative (imperatives and vocatives)Context—Referential (conveys a message or information)Message—Poetic (indulge in language for its own sake)Contact—Phatic communion (to establish communion with others)Code—Metalinguistic (to clear up intentions, words and meanings)3. In the early 1970s the British linguist M.A.K. Halliday found that child language performed seven basic functions, namely, instrumental, regulatory, representational, interactional, personal, heuristic, and imaginative. This system contains three macrofunctions—the ideational, the interpersonal and the textual function.three meta-functions proposed by M. A. K. Halliday(1) The ideational functionTo identify things, to think, or to record information. It constructs a model of experience and constructs logical relations(2) The interpersonal functionTo get along in a community. It enacts social relationships(3) The textual functionTo form a text. It creates relevance to context.What is Linguistics(语言学)Linguistics is a scientific study of language .It is a major branch of social science.Linguistics studies not just one language of any society, but the language of all human society, language in general.A scientific study is one which is based on the systematic investigation of data, conducted with reference to some general theory of language structure.Process of linguistic study:① Certain linguistic facts are observed, generalization are formed;② Hypotheses are formulated;③ Hypotheses are tested by further observations;④ A linguistic theory is constructed.observation------generalization-----hypothesis------tested by further observation------theoryPerson who studies linguistics is known as a linguist.The Scope of LinguisticsGeneral linguistics is the study of language as a whole.Internal branches: intra-disciplinary divisions (micro-linguistics)Phonetics(语音学) is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription.Phonology(音韵学) is the branch of linguistics which studies the sound patterns of languages.Morphology(词法) is the branch of linguistics which studies the form of words.Syntax(句法) is the branch of linguistics which studies the rules governing the combination of words into sentences.Semantics(语义学) is the branch of linguistics which studies the meaning of language.Pragmatics(语用学) is the branch of linguistics which studies the meaning of language in use.External branches: inter-disciplinary divisions (macro-linguistics)Applied linguistics(应用语言学) is the study of the teaching of foreign and second languages. Sociolinguistics is the study of the relationship between language and society.Psycholinguistics is the study of the relationship between language and the mind.Historical Linguistics(历史语言学) is the study of language changes.Anthropological linguistics(人文语言学) uses the theories and methods of anthropology to study language variation and language use in relation to the cultural patterns and beliefs of man.Neurolinguistics(神经语言学) studies the neurological basis of language development and use in human beings. Mathematical linguistics(数学语言学) studies the mathematical features of language, often employing models and concepts of mathematics.Computational linguistics(计算语言学) is an approach to linguistics in which mathematical techniques and concepts(概念) are applied, often with the aid of a computer.Features of linguisticsDescriptiveDealing with spoken languageSynchronicSome Basic Distinctions(区分) in Linguistics1. Speech and WritingOne general principle(原则) of linguistic analysis is the primacy of speech over writing. Writing gives language new scope(范畴) and uses that speech does not have.2. Descriptive(描述性) or Prescriptive(说明性)A linguistic study is descriptive if it describes and analyses facts observed; it is prescriptive if it tries to lay down rules for "correct" behavior.3. Synchronic(共时) and Diachronic(历时) StudiesThe description of a language at some point in time is a synchronic study and The description of a language as it changes through time is a diachronic study.4. Langue(语言) and Parole(言语)This is a distinction made by the Swiss linguist F.De Saussure (索绪尔)early last century. langue refers to the abstract linguistic system shared by all the members of a speech community and parole refers to the actualized(实际的) language, or realization of langue.5. Competence(能力)and Performance(行为)Competence is the ideal language user's knowledge of the rules of his language. Performance is the actualrealization of this knowledge in utterances(发声).6. Potential and Behavior: English linguist Halliday makes another similar distinction in the 1960s, namely the distinction between linguistic potential and linguistic behavior. He approaches language from a functional view and concentrates primarily on what speakers do with language which led to the distinction between linguistic potential (what speakers can do with language) and behavior (what speakers actually do with language). In Halliday‘s distinction between potential and behavior, potential is similar to Saussure‘s ―langue‖and Chomsky‘s competence, and behavior is similar to Saussure‘s ―parole‖ and Chomsky‘s performance.7. Modern linguistics started with the public ation of F. de Saussure‘ s book ―Course in General Linguistics‖ in the early 20th century. So Saussure is often described as ―father of modern linguistics‖.The general approach traditionally formed to the study of language before that is roughly referred to as ―traditional grammar.‖ They differ in several basic ways:Firstly, linguistics is descriptive while traditional grammar is prescriptive. A linguist is interested in what is said, not in what he thinks ought to be said. He describes language in all its aspects, but does not prescribe rules of ―correctness‖.Secondly, modern linguistics regards the spoken language as primary, not the written. Traditional grammarians, on the other hand, tend to emphasize, may be over-emphasize, the importance of the written word, partly because of its permanence.Then, modern linguistics differs from traditional grammar also in that it does not force languages into a Latin-based framework. To modern linguists ,it is unthinkable to judge one language by standards of another. They are trying to set up a universal framework, but that would be based on the features shared by most of the languages used by mankind.Chapter I IntroductionI. Decide whether each of the following statements is True or False:1. Linguistics is generally defined as the scientific study of language.2.Linguistics studies particular language, not languages in general.3. A scientific study of language is based on what the linguist thinks.4. In the study of linguistics, hypotheses formed should be based on language facts and checked against the observed facts.5. General linguistics is generally the study of language as a whole.6. General linguistics, which relates itself to the research of other areas, studies the basic concepts, theories, descriptions, models and methods applicable in any linguistic study.7. Phonetics is different from phonology in that the latter studies the combinations of the sounds to convey meaning in communication.8. Morphology studies how words can be formed to produce meaningful sentences.9. The study of the ways in which morphemes can be combined to form words is called morphology.10. Syntax is different from morphology in that the former not only studies the morphemes, but also the combination of morphemes into words and words into sentences.11. The study of meaning in language is known as semantics.12. Both semantics and pragmatics study meanings.13. Pragmatics is different from semantics in that pragmatics studies meaning not in isolation, but in context.14.Social changes can often bring about language changes.15. Sociolinguistics is the study of language in relation to society.16. Modern linguistics is mostly prescriptive, but sometimes descriptive.17. Modern linguistics is different from traditional grammar.18. A diachronic study of language is the description of language at some point in time.19 Modern linguistics regards the written language as primary, not the written language.20. The distinction between competence and performance was proposed by F. de Saussure.II. Fill in each of the following blanks with one word which begins with the letter given:21. Chomsky defines ― competence‖ as the ideal user's k__________ of the rules of his language.ngue refers to the a__________ linguistic system shared by all the members of a speech community while the parole is the concrete use of the conventions and application of the rules.23.D_________ is one of the design features of human language which refers to the phenomenon that language consists of two levels: a lower level of meaningless individual sounds and a higher level of meaningful units.nguage is a system of a_________ vocal symbols used for human communication.25. The discipline that studies the rules governing the formation of words into permissible sentences in languages is called s________.26. Human capacity for language has a g ____ basis, but the details of language have to be taught and learned.27. P ____ refers to the realization of langue in actual use.28. Findings in linguistic studies can often be applied to the settlement of some practical problems. The study of such applications is generally known as a________ linguistics.nguage is p___________ in that it makes possible the construction and interpretation of new signals by its users. In other words, they can produce and understand an infinitely large number of sentences which they have never heard before.30. Linguistics is generally defined as the s ____ study of language.III. There are four choices following each statement. Mark the choice that can best complete the statement.31. If a linguistic study describes and analyzes the language people actually use, it is said to be ______________.A. prescriptiveB. analyticC. descriptiveD. linguistic32.Which of the following is not a design feature of human language?A. ArbitrarinessB. DisplacementC. DualityD. Meaningfulness33. Modern linguistics regards the written language as ____________.A. primaryB. correctC. secondaryD. stable34. In modern linguistics, speech is regarded as more basic than writing, because ___________.A. in linguistic evolution, speech is prior to writingB. speech plays a greater role than writing in terms of the amount of information conveyed.C. speech is always the way in which every native speaker acquires his mother tongueD. All of the above35. A historical study of language is a ____ study of language.A. synchronicB. diachronicC. prescriptiveD. comparative36.Saussure took a (n)__________ view of language, while Chomsky looks at language from a ________ point of view.A. sociological…psychologicalB. psych ological…sociologicalC. applied… pragmaticD.semantic and linguistic37. According to F. de Saussure, ____ refers to the abstract linguistic system shared by all the members of a speech community.A. paroleB. performanceC. langueD. Language38. Language is said to be arbitrary because there is no logical connection between _________ and meanings.A. senseB. soundsC. objectsD. ideas39. Language can be used to refer to contexts removed from the immediate situations of the speaker. This feature is called_________,A. displacementB. dualityC. flexibilityD. cultural transmission40. The details of any language system is passed on from one generation to the next through ____ , rather than by instinct.A. learningB. teachingC. booksD. both A and B。
2023年3月英语四级真题第1套It's a fantasy that goes back centuries: a message in a bottle, carried ashore from far-off lands. Authors, artists and children ___26___ have dreamed of such a gift from the sea.This time, though, it's not a bottle that washes ashore. It's eggs—thousands of little toy eggs.That's what happened on the German island of Langegoog this week.Lying just off the North Sea coast, it found itself ___27___ by an invasion of colored plastic eggs-much to the ___28___ of local children, because the eggs contained toys.Police ___29___ the eggs came from a freighter that lost part of its cargo during an unusually ___30___ storm, the worst to hit Germany's northeastern coast since 2006.At any rate, what was lost has now been found by many of the community's littlest residents."The surprise eggs have found their way to freedom," said Mayor Uwe Garrels. However, the joy of the moment ___31___ off soon."At first I thought this was a wonder, because everything was so ___32___, but then we realized that this is a huge ___33___ in the end," said the mayor. He also noted the plastic bags and other materials that have washed ashore on the island can cause serious problems for ___34___.Still, all these little eggs contained an extra treat with their toys. They ___35___ notes from afar.There was just one problem for the German children who received them: They were written in Russian.2023年3月英语六级真题第1套Unthinkable as it may be, humanity, every last person, could someday be wiped from the face of the Earth. We have learned to worry about asteroids (小行星) and super volcanoes, but the more likely ___26___, according to Nick Bostrom, a professor of philosophy at Oxford, is that we humans will destroy ourselves.Professor Bostrom, who directs Oxford's Future of Humanity Institute, has argued over the course of several papers that human ___27___ risks are poorly understood and, worse still, ___28___ underestimated by society. Some of these existential risks are fairly well known, especially the natural ones. But others are ___29___ or even exotic. Most worrying to Bostrom is the subset of existential risks that ___30___ from human technology, a subset that he expects to grow in number and potency over the next century.Despite his concerns about the risks ___31___ to humans by technological progress, Bostrom is no luddite (科技进步反对者). In fact, he is a longtime ___32___ of trans-humanism-the effort to improve the human condition, and even human nature itself, through technological means. In the long run he sees technology as a bridge, a bridge we humans must cross with great care, in order to reach new and better modes of being. In his work, Bostrom uses the tools of philosophy and mathematics, in ___33___, probability theory, to try and determine how we as a ___34___ might achieve this safe passage. What follows is my conversation with Bostrom about some of the most interesting and worrying existential risks that humanity might ___35___ in the decades and centuries to come, and about what we can do to make sure we outlast them.2022年12月英语六级真题第1套During the summer, when I was a visiting poet at a residency out of state, an angry, confused woman wandered into my class and said: "I have three guns and I want to use them." We all ___26___. It wasn't clear if she had the guns, but we each know that, when we teach in America, we are already in danger.I was dizzy with fear. The woman, who later turned out to be a schizophrenic (精神分裂症患者) without ___27___ to her medications, was, by some force, wrestled out and ___28___ away, then put in a hospital forobservation, in a step that was actually safer for everyone than any one of us pressing charges. My class went on; we talked about poems. But despite the fact that the rest of our days on campus passed ___29___, I was rattled. I couldn't shake the sense that in this country we always live at ___30___ risk.A few months later, crisis ___31___ again. While my husband was locking his bike to drop off our 3-year-old daughter for her preschool-aged day camp, a different woman approached. Swiftly and for no ___32___ reason, she bent down, picked up our daughter, and began to carry her down the street. It was so fast and confusing that my daughter ___33___ cried. My husband, in a burst of speed, chased the woman and reclaimed our daughter. The woman, clearly confused, retreated into the public library. A ___34___ of homeless people who generally know the other homeless in the area said they did not recognize the woman. The woman was so clearly unwell that when she was taken into custody she was incoherent. Heartbreakingly, she called our daughter by the name of someone else's child. Each part of the episode was haunting as it was ___35___.2022年12月英语六级真题第2套The task of the global strategist of a business is to build a platform of capabilities derived from the resources, experiences and innovations of units operating in multiple locations, to transplant those capabilities wherever ___26___, and then to systematically upgrade and renew them-ahead of the competition.Apple is an outstanding case of a company whose unique capabilities give it a worldwide ___27___ advantage, particularly with respect to its ability to build platforms from a product base that integrates functional and ___28___ design. Apple has been able to leverage and exploit its California-based design andmarketing advantages successfully throughout the world. IKEA is another such case. The do-it-yourself furniture and houseware company first developed a compelling set of capabilities to design, manufacture and ___29___ furniture at low cost and sell it in a novel way in Sweden. Later, IKEA successfully ___30___ this formula in many other countries.By contrast, Telefónica, a Spanish telecommunications company that is now the world's fifth largest telecom by ___31___, first developed its special advantage abroad. In 1989 and 1990, Telefónica had the opportunity to enter Chile and Argentina, countries that shared many institutional and cultural characteristics with its home country but that were ___32___ more rapid market reform. Throughout the 1990s, Telefónica took what it learned in Chile and Argentina about reconstructing former state-owned telecoms to other Latin American countries that were privatizing their state telecoms and deregulating their telecom markets.These examples might lead the reader to believe that creating a global advantage is an easy task. But many other ___33___ of expensive failed experiments suggest that creating a lasting global advantage actually requires a great deal of ___34___ and operational finesse (技巧). Our research suggests that global winners typically create and sustain their international presence through a systematic process of ___35___, renewing and enhancing their core capabilities.2022年12月英语六级真题第3套American colleges and universities are using 64 percent less coal than they did a decade ago, burning 700,000 tons last year, down from 2 million tons in 2008, the U.S. Energy Information Administration (EIA) said in a report ___26___ yesterday.All 57 schools that were burning coal in 2008 are using less now, and 20 have ___27___ coal completely, EIA found.Most universities have turned to natural gas as a ___28___, with state funding backing the fuel switch.While academic institutions use less than 0.1 percent of U.S. coal burned for power, campus coal use has a history dating back to the 1800s when ___29___ to power was scarce.Many universities still operate their own power plants. The Public Utility Regulatory Policies Act of 1978 encouraged more electricity generation by allowing institutions to sell ___30___ power to utilities.But EIA noted many coal-fired universities have signed onto the American College and University Presidents Climate Commitment, which was launched in 2007.About 665 schools are part of the program, which aims to ___31___ greenhouse gas emissions. Thirty percent of the participants have pledged to be carbon ___32___ within 20 years.The Sierra Club's Beyond Coal campaign, which also leads campaigns for universities to withdraw their ___33___ in coal and other fossil fuels, lists 22 schools that have pledged to move "beyond coal," including Clemson University, Indiana University, Ohio University, Penn State University, the University of Louisville and the University of Tennessee, Knoxville.The largest coal use ___34___ at colleges were in Michigan, Missouri, Tennessee and Indiana. Indiana's universities alone cut coal ___35___ by 81 percent between 2008 and 2015.During the same period, Michigan made an 80 percent cut and Tennessee cut back by 94 percent at state。
Systematic Design of a Family of Attack-Resistant Authentication ProtocolsSeptember 1992R. BirdI. GopalA. HerzbergP. JansonS. KuttenR. MolvaM. YungIBM Raleigh, Watson & Zurich LaboratoriesSystematic Design of a Family of Attack-Resistant Authentication ProtocolsR. Bird1I. Gopal2A. Herzberg2P. Janson3S. Kutten2R. Molva4M. Yung2A bstractThe extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities.One-way, password-based authentication techniques are not sufficient to cope with the issues at hand.Modern designs rely on two-way, cryptographic authentication protocols.However, most existing designs suffer from one or more limitations:they require syn-chronization of local clocks, they are subject to export restrictions because of the way they use cryptographic func-tions, they are not amenable to use in lower layers of network protocols because of the size and complexity of messages they use, etc.Designing suitable cryptographic protocols that cater to large and dynamic network com-munities but do not suffer from the above problems presents substantial challenges in terms of ease of use, effi-ciency, flexibility, and above all security.This paper discusses the above challenges, shows how a few simple protocols, including one proposed by ISO, can easily be broken, and derives a series of desirable properties that authentication protocols should exhibit to meet the requirements of future large and dynamic network communities.Then the paper describes a methodology that was developed to systematically build and test the security of a family of cryptographic two-way authentication proto-cols that are as simple as possible yet resistant to a wide class of attacks, efficient, easy to implement and use, and amenable to many different networking environments.It also discusses several concrete examples of protocols of that family that present various advantages in specific distributed system scenarios.1.IntroductionThe extensive use of open networks and distributed systems poses serious threats to the security of end-to-end communications and network components themselves. A necessary foundation for securing a network is the ability to reliably authenticate communication partners and other network entities.One-way, password-based authentication techniques are not sufficient to cope with the issues at hand.Modern designs rely on two-way, cryptographic authentication protocols.However, most existing designs suffer from one or more limitations:they require syn-chronization of local clocks, they are subject to export restrictions because of the way they use cryptographic func-tions, they are not amenable to use in lower layers of network protocols because of the size and complexity of1IBM Corp., Research Triangle Park, NC.2IBM T. J. Watson Research Center, NY.3IBM Zurich Research Laboratory, Switzerland.4Institut Eurecom, Sophia-Antipolis, France.messages they use, etc.Designing suitable cryptographic protocols that cater to large and dynamic network com-munities but do not suffer from the above problems presents substantial challenges in terms of ease of use, effi-ciency, flexibility, and above all security.1.1. Scenario and AttacksConsider two parties A and B that share a key for use with some 'secure' cryptographic ing that key, the two parties may execute over time many instances of some agreed upon cryptographic authentication protocol, where each instance is independent of the others.Several executions may even be carried out in parallel if the two parties want to interact over multiple parallel authenticated connections or communication instances.Whenever one of the parties completes an execution of the protocol, it marks the execution as either accepted (in case of suc-cessful authentication) or rejected.The intention is that executions marked as accepted correspond to runs of the protocol that definitely involved the intended other party.An error-free history of the protocol runs between A and B is one in which all of the executions accepted by both parties (i.e.excluding those rejected and those possibly not yet completed because messages are still in transit) match exactly one-to-one.An attacker of such a protocol can be intuitively described as a third party who has no access to the key.However, it has access to all legitimate protocol executions that were accepted by A and B in the past, and it is able at any time to interfere with on-going or to start new (faked) protocol executions involving A and/or B.The attacker's objective is to cause A or B to erroneously mark one of these perverted protocol executions as accepted, even though it does not match with any execution accepted by the other party.Note that the attacker may adaptively send any message to either party, initiate new executions of the protocol with either party, and intercept messages sent by either party.We do not impose response-time constraints on these actions.Indeed, in real networks, two parties that share a key may often initiate multiple protocol executions simultaneously, and delays and message losses are normal events.It follows that a third party can always act as a simple delaying 'relay' between the two parties without being considered an attacker.Indeed, such delaying is no different and is indistinguishable from what any network switch does in normal operation.In particular, this does not contradict our definition of an accepted protocol instance since both parties are indeed involved and both accept the exchange.In that respect it is the exchange that is authenticated and not the parties through which it is relayed.The third party plays only a passive role with no observable effect to A and B.Even though we will refer to this scenario as a relay attack, it is not a real attack in the sense that it should be prevented.In fact, no authentication protocol, however sophisticated, can prevent this'relay attack' as it corresponds to a scenario that occurs all the time in the normal course of things.Even a third party that removes messages on links between A and B only creates a longer delay in the execution of the protocol, but the authentication will eventually either be rejected (e.g.following a time-out) or be accepted by both parties; the third party cannot conduct a successful attack merely through delaying or dropping messages.The design of a correct and secure authentication protocol should take into account all the above considerations, as well as protect against traditional cryptographic weaknesses of course.1.2. Related Work and Existing DesignsMany designs dealing with authentication in networks or distributed systems combine the issues of authentication with those of key distribution.These designs typically assume that all network parties share a key with a common trusted entity, often called a key distribution center (KDC), from which they can get pair-wise shared keys to carry out mutual authentication protocols.These protocols are called three party authentication protocols, and have been studied extensively e.g.Needham78, Denning81, Bauer83, Otway87, Burrows89, Steiner88, Bellovin90, ISO8732, Stubblebine92“.Most of the corresponding implementations e.g.Steiner88, ISO8732“ require the exchange of long messages, which is no problem for application-layer protocols, but makes them unsuitable for use in lower-layer networking protocols where limited packet sizes are an important consideration.Some require synchronized clocks e.g.Steiner88“ or counters e.g.ISO8732“ that pose system management and initialization issues, as willbe discussed soon.Two-party authentication protocols received less attention in the literature, despite their use in many networks. Some of these use public-key cryptography e.g.Jueneman85, Meyer82, ISO9594, Ianson90“.With a public-key cryptographic system, each party only has to know and verify the public key of the other party, and there is no need to share secret keys.The I SO9594“ protocol also requires large messages that make it unsuitable for use in low-level network protocols.The protocols we discuss in this paper assume shared-key cryptography because it is much more efficient, which is an important consideration for low-level network protocols.However they could also be operated with public key cryptography.The only other published protocol that we are aware of which uses shared keys is the proposed ISO standard I SOSC27“ whose weakness is discussed in this paper.1.3.OutlineThis paper elaborates on the design of a family of secure authentication protocols that was originally discussed inB ird91“.In a first part, starting from the basic principles of cryptographic authentication and looking at existing designs, we show that several simple protocols, including one that was discussed by ISO, are easily broken. Through an examination of the problems encountered in such designs, we derive a set of requirements for defining cryptographic authentication protocols that are at the same time simple and yet resistant to a wide class of attacks, while being easy to use and applicable to many networking environments.Based on the requirements outlined in the first part, the second part of the paper then develops systematically a canonical form of a simple cryptographic two-way authentication protocol.We show that protocols matching this canonical form resist a wide range of attacks, we show a couple of concrete embodiments of the canonical form, and we discuss the properties of such protocols.One of the simple embodiments of the canonical form has been proven secure against any attack under reasonable cryptographic assumptions B ird91“.However this proof extends beyond the scope of the present paper.2. Basic Principles and Possible Attacks2.1. Basic Principles of AuthenticationP asswordsThe authentication method most widely used in network environments today consists of asking users to prove their identity by demonstrating knowledge of a secret they know, typically a password.This widespread but old tech-nique has several weaknesses:Passwords are transmitted in the clear: In most password systems, the password typed by a user is sent in cleartext over the network to the computer that requested it.This means that an intruder equipped withsuitable electro-magnetic tools can tap network lines and spy on passing traffic to collect passwords. Passwords are easy to guess: A relatively low fraction of potential intruders are so dedicated and affluent that they would actually resort to the above electronic wire-tapping.However simpler attacks are also possible.Since users need to memorize their passwords, they typically select passwords that they can easilyremember.Unfortunately, experience has shown that such passwords are selected from within a rela-tively small vocabulary, and are thus easily guessed by potential intruders M orris79, Spafford89“. Authentication is one-way only: Last but not least, password schemes are typically used for one-way authentication only, i.e. computers ask users for their passwords but users never question that they arecommunicating with the right computer, and thus never challenge a computer to provide any password.This is however a serious exposure:when a user sits at a workstation and requests services from someremote computer, there is no proof that a password prompt appearing on the screen is from the rightcomputer; the prompt could be a faked one displayed by another computer or by a corrupted applicationdesigned by an intruder.O ther TechniquesThere exist many alternative techniques to password-based authentication, where users do not have to remember anything so that the risk of an intruder guessing a password is inexistent.For instance, some systems base authentication on recognition of biometric information such as a voice sample, a finger-print, or a hand signature. However, such authentication techniques have reliability problems and require relatively expensive hardware support, so that they are found only in selected high-security environments, not in general-purpose network environ-ments.Besides, they still suffer from the problem that the biometric information is often transmitted in cleartext over network lines that can be tapped, thus allowing replay at a later time.Of all authentication techniques that circumvent the drawbacks of passwords, the most promising ones are those using cryptographic means, whose common use is becoming increasingly feasible thanks to technological progress. With such techniques, users are typically provided with smart cards or chip cards equipped with a processor capable of cryptographic operations.Such cards offer means to communicate either with their owner (through a liquid-crystal display and possibly a numeric keypad) or directly with a computer (through an electronic interface).What-ever the interface details, authentication is based upon using the card to compute or verify cryptographic messages exchanged with the computer.C ryptographic TechniquesThe basic idea of cryptographic authentication consists of challenging the user or communicating party being authenticated to prove its identity by demonstrating ability to encipher or decipher some item with a secret or private key known to be stored inside the smart card (or other secure storage device if the communicating party is a computer).Of course, since the secret or private key stored on the card or secure device changes infrequently, the item to be enciphered or deciphered with it must change for every execution of the authentication protocol, otherwise, even though the secret never flows in cleartext over the network, an intruder could still tap a line, record the cryptic message that flows over it, and play that recording back at a later time without even knowing what it means.To guarantee that the item that gets enciphered (or deciphered), called the challenge, is different for every exe-cution of the authentication protocol, three techniques are used.The challenge may be derived either from a real-time clock reading, in which case it is called a time-stamp, from a counter that is incremented for every protocol execution, or from a random number generator, in which case it is called a nonce.In any case, a new challenge (time-stamp, counter value or nonce) is generated for each protocol run.With time-stamps, the user or entity being authenticated, further referred to as A, enciphers the current reading of its clock and sends the result to the computer or party requesting the authentication, further referred to as B. B then deciphers the received message, and verifies that the time-stamp corresponds to the current real-time.The draw-back of time-stamps is thus immediately apparent. A and B must have synchronized real-time clocks for the verifi-cation to be possible.However, since clocks can never be perfectly synchronized and messages take time to travel across networks anyway, B cannot expect that the deciphered time-stamp received from A will ever be equal to its own real-time clock reading.A's time-stamp at best can (and normally should) be within some limited time window of B's real-time clock.However, as soon as a time window of tolerance is defined, a potential intruder could exploit it to impersonate A by replaying one of A's recent authentication messages within that time window. Preventing this requires putting a limit to the number of authentication protocol runs allowable during the time window, and having B save all the authentication messages within the window.Thus both efficiency and security require pretty good clock synchronization.Achieving such synchronization is often difficult, and making it secure would itself require using some other authentication method not depending on time.With counting challenges, A and B maintain synchronized counters of the number of times they authenticated one another.Every time A wants to communicate with B, it enciphers its counter and sends the result to B, whodeciphers it and verifies that it matches its own counter value, whereupon both parties increment their respective counters for the next time.The drawback of such counting challenges is that both parties must maintain synchro-nized counters, which poses stable storage and counter management problems in the long run.The counters must be long enough to prevent an attacker from waiting for a (deterministic) counter wrap-around; using counters com-plicates resolution of conflicts when both parties want to initiate protocol executions at the same time; after detecting loss of synchronization between two counters, some other method of authentication must be used to securely re-synchronize them; and an undetected error in the counter values may have catastrophic effects.We conclude that both time-stamps and counters techniques, while useful, are not a complete solution, especially for protocols in the lower layers of a network architecture.The best technique for this purpose, and also the simplest one to implement, consists of using nonces.The price for this simplicity is an extra network message. While A can authenticate itself to B with a single message if time-stamps or counters are used, two messages are necessary with nonces.Indeed, it is B and not A who needs to be sure that the nonce was never used before.Thus it is B and not A who must generate it. B must encipher it and send it to A, then A must decipher it and send it back in cleartext for B to authenticate it, which costs a total of two messages.The cost of one more message is usually tolerable, especially since the extra message can often be piggy-backed onto regular traffic or its cost can be amortized over many subsequent messages authenticated with sequence counters.Given these advantages of nonces over time-stamps and counters, the rest of this paper focuses on nonce-based authentication protocols.2.2. Simple-minded Cryptographic AuthenticationA BEa(N)<-----------------------N----------------------->Figure 1. One-way authentication of AFigure1is a simple representation of the nonce-based one-way authentication protocol described in the previous section, where N is a nonce generated by B and Ea(N) is its value enciphered under some key Ka that B knows is associated with A:it may be a secret key shared between A and B or the public key of A.The protocol allows B to authenticate A.A BEb(N)----------------------->N<-----------------------Figure 2. One-way authentication of BA BEb(N1)----------------------->N1<-----------------------Ea(N2)<-----------------------N2----------------------->Figure 3. Two-way authenticationA BEb(N1)----------------------->N1,Ea(N2)<-----------------------N2----------------------->Figure 4. Two-way authentication with three messagesAs suggested earlier, many scenarios in practice require two-way rather than one-way authentication, i.e. A must also authenticate B.This could of course be achieved simply by inverting the roles of A and B in Figure1 on page5, as represented in Figure2 on page5, where Eb(N) stands for the value of N enciphered under a key Kb that is either a secret key shared between A and B or the public key of B.Putting the two protocols together leads to Figure3for a complete two-way exchange.One can then immediately observe that the resulting protocol may be simplified by combining the second and third messages to save one network transmission, as represented in Figure4.With symmetric cryptographic systems, the keys Ka and Kb could be the same, so that Ea and Eb indicate encryption under the same shared secret key.Unfortunately, this simple and elegant two-way authentication protocol, which was derived most naturally by com-bining two instances of the simplest possible one-way protocol, presents a number of undesirable characteristics.In particular, we will show that an intruder may break this protocol by interleaving messages from different executions of it, if the same shared key is used by both parties or if the same key is always used by the party who starts the protocol.One could still argue that the protocol is safe if used with four different keys, however this creates additional overhead and key management issues, as well as migration problems for existing designs.In the next subsection we discuss the problems and the attacks, which will later help explain the issues associated with designing a simple and secure protocol using only one key and symmetric cryptography.2.3. Attacks on Simple Cryptographic AuthenticationThe simple two-way authentication protocol illustrated in Figure4suffers from a number of defects:Known plaintext attacks: A first weakness of the protocol, which is not a real exposure but still an undesirable feature, is its openness to known plaintext attacks.Every enciphered message flowing between A andB is the ciphertext of a bit string (the nonce) that flows in plaintext in a subsequent message between Aand B.This enables a passive wire-tapping intruder to collect two cleartext-ciphertext pairs every timethe protocol is run, which at the very least helps it accumulate encryption tables in the long run, andmay even help it break the scheme and discover the encryption key, depending on the quality of theencryption algorithm used.It is in general desirable that the plaintext of exchanged enciphered mes-sages not be known or derivable by intruders.Chosen ciphertext attacks The situation is in fact worse in the sense that a potential intruder may even turn known plaintext attacks into selected text attacks by playing an active instead of passive role.Pretending thatit is A or B, an intruder may send the other party (B or A) a ciphertext message that it selected itselfand wait for that other party to reply with the deciphered value of that text.Of course the intruder, notknowing the right key, may not be able to complete the third protocol flow.However, it can accumu-late knowledge about cleartext-ciphertext pairs of which it selected the ciphertext itself(or thecleartext, if the challenge was enciphered instead of deciphered).So it may try specific ciphertextstrings such as all zeros, all ones, or whatever else might help it break the key faster, depending on thecryptographic method used.It is in general desirable that an intruder not be able to trick legitimateparties into generating deciphered versions of selected ciphertext messages (or enciphered versions ofselected cleartext) B iham90“.A X BE(N1)----------------------->N1,E(N2)<-----------------------E(N2)<=======================N2,E(N3)=======================>N2----------------------->abandon session<= = = = = = = = = = = =Figure 5. An oracle session attackOracle session attacks: In fact, if A and B use the same key in the simple protocol suggested earlier, the intruder actually can break the authentication without even breaking the key.This is illustrated in Figure5,where the intruder, noted X and posing as A, starts a session with B by sending B some encipherednonce E(N1). B replies with the deciphered value N1 and its own enciphered challenge E(N2).Xcannot decipher N2, but it can take advantage of a selected ciphertext attack on A, using A as an oraclewho will provide the necessary deciphered value N2.X accomplishes this by posing now as B to starta separate 'oracle' session with A, sending E(N2) as the initial message on that session. A will replywith the needed value N2 and some own enciphered nonce E(N3).X then drops the oracle sessionwith A since it cannot and does not care about deciphering N3.But it then turns around, and success-fully assumes its faked identity A with respect to B by sending E(N2) to B.This example exposes one fundamental flaw of the protocol:the cryptographic messages used in eachflow of the protocol must be different from one another in the sense that it must not be possible for anintruder to use messages appearing in the second flow to derive, reconstruct or fake messages neededfor the third one.A BN1----------------------->E(N1),E(N2)<-----------------------N2----------------------->Figure 6. The ISO two-way authentication protocolThis observation was made independently by the designers of an improved authentication protocoldefined by the ISO SC27 I SOSC27“ and represented in Figure6.In this protocol, the challenge to theinitiator of the protocol (A) consists of demonstrating ability to en cipher a given cleartext nonce, whilethe challenge to the responder (B) consists of demonstrating ability to de cipher a given ciphertextnonce.Thus an intruder can no longer misuse one party as an oracle 'decryption server' against theother.Unfortunately, this improved protocol still suffers from a fourth type of defect, also present inthe original protocol, and discussed hereafter.A XN1----------------------->N1<=======================E(N1),E(N2)=======================>E(N1),E(N2)<-----------------------N2----------------------->N2<=======================Figure 7. A parallel session attackParallel session attacks: Another defect commonly found in simple protocols such as those seen above is depicted in Figure7, where the intruder assumes a passive role instead of an active one.It intercepts a callfrom A to B with challenge N1, and, leaving B completely out of the picture, turns A into an oracleagainst itself.Since X cannot answer the challenge N1 by replying E(N1), it simply pretends that it isB trying to start a parallel session with A.Of course it selects to use just the same N1 as the firstchallenge on the original session, thus causing A to provide it with precisely the answer E(N1) neededto complete the first authentication. A also sends its own enciphered challenge E(N2) on the parallelsession.X then replies to the original challenge N1 by sending E(N1) back.With that reply, X mayeven send the same enciphered challenge E(N2) it just got from A. A will then complete the firstauthentication exchange by replying with N2, which is again exactly what X needs to complete thesecond authentication.Thus X has succeeded doubly in posing as B on both the original and theparallel sessions!(It could also have dropped one of these, of course.)Many connection set-up protocols at different layers of different network architectures do not allow thesimultaneous establishment of multiple parallel sessions.However, there also exist many networkingenvironments where such parallel sessions are legal by design.Where they are allowed, it would befeasible to warn implementers to check that the first challenge received on one session is not a replayof a challenge outstanding on another session.However leaving session security up to implementersrather than guaranteeing it by design is bad practice.Furthermore, in typical implementations, sessionparameters are instantiated independently for each session so that it is not possible for one session tocheck on parameters of other sessions.Parallel session attacks illustrate another fundamental flaw of many simple authentication protocols:thecryptographic expression used in the second message must be asymmetric (i.e.direction-dependent) sothat its value in a protocol run initiated by A cannot be used in a protocol run initiated by B.A BN1----------------------->E(N1 XOR B), E(N2)<-----------------------N2----------------------->Figure 8. A more complex and asymmetric two-way authenticationA XN1----------------------->N1 XOR B XOR A<=======================E(N1 XOR B), E(N2)=======================>E(N1 XOR B), E(N2)<-----------------------N2----------------------->N2<=======================Figure 9. An offset attack(through a parallel session)Based on the above observations, i.e.that the cryptographic message in the second flow must be asymmetric (direction-dependent) and different from the one in the third flow, one may be tempted to declare that a protocol such as the one in Figure8should be secure.Here, enciphering N1 has been replaced by enciphering a simple function of N1 (XOR stands for exclusive-or).Beyond the fact that known- and selected-text attacks are still possible, the problem now is that the simple function has not fixed anything:an intruder can still resort to a parallel session attack; it merely needs to use proper offsetting in addition, as illustrated in Figure9.The simple and apparently sound protocol of Figure4 on page6is thus broken in many ways.In the course of our research, we have come across and designed many similarly simple and apparently secure two-way authentication protocols which, upon careful examination, proved to be subject to oracle-session attacks, parallel-session attacks, offset attacks, and/or other types or combinations of attacks that involved replaying messages and functions of challenges observed in other runs of the protocol.We further refer to all such attacks collectively as interleaving attacks. Thus we came to the conclusion that the design of simple protocols that resist such inter-leaving attacks is hard and requires a careful and systematic approach, as explained in the remainder of this paper.。