An adaptive information discovery framework for computational grids
- 格式:pdf
- 大小:1.03 MB
- 文档页数:14
2024年普通高等学校招生全国统一考试英语试卷养成良好的答题习惯,是决定成败的决定性因素之一。
做题前,要认真阅读题目要求、题干和选项,并对答案内容作出合理预测;答题时,切忌跟着感觉走,最好按照题目序号来做,不会的或存在疑问的,要做好标记,要善于发现,找到题目的题眼所在,规范答题,书写工整;答题完毕时,要认真检查,查漏补缺,纠正错误。
本试卷共12页。
考试结束后, 将本试卷和答题卡一并交回。
注意事项: 1. 答题前, 考生先将自己的姓名、准考证号码填写清楚, 将条形码准确粘贴在考生信息条形码粘贴区。
2. 选择题必须使用2B 铅笔填涂; 非选择题必须使用0.5 毫米黑色字迹的签字笔书写, 字体工整、笔迹清楚。
3. 请按照题号顺序在答题卡各题目的答题区域内作答, 超出答题区域书写的答案无效; 在草稿纸、试卷上答题无效。
4. 作图可先使用铅笔画出, 确定后必须用黑色字迹的签字笔描黑。
5. 保持卡面清洁, 不要折叠, 不要弄破、弄皱, 不准使用涂改液、修正带、刮纸刀。
第一部分听力(1—20 小题)在笔试结束后进行。
第一部分听力(共两节,满分30分)做题时,先将答案标在试卷上。
录音内容结束后,你将有两分钟的时间将试卷上的答案转涂到答题卡上。
第一节(共5小题;每小题1.5分,满分7.5分)听下面5段对话。
每段对话后有一个小题,从题中所给的A、B、C三个选项中选出最佳选项。
听完每段对话后,你都有10秒钟的时间来回答有关小题和阅读下一小题。
每段对话仅读一遍。
例: How much is the shirt?A. £19.15.B. £9.18.C. £9.15.答案是C。
1. What did the woman do yesterday evening?A. She watched TV.B. She went shopping.C. She attended a show.2. What is the man's suggestion?A. Taking a rest.B. Going for a coffee.C. Having a snack.3. What are the speakers mainly talking about?A. A weekend plan.B. A wedding invitation.C. A business deal.4. Where is Barbara going tonight?A. To a gym.B. To her grandma's.C. To the doctor's.5. What is Alex doing?A. He's having breakfast.B. He's feeding a cat.C. He's reading a book.第二节(共15小题;每小题1.5分,满分22.5分)听下面5段对话或独白。
洞察趋势英语作文模板英文回答:Insight Generation Framework。
Introduction。
In the fast-paced business landscape, identifying and leveraging trends is crucial for organizations to achieve competitive advantage and drive growth. An effectiveinsight generation framework provides a systematic approach to uncover meaningful patterns and derive actionable insights from data.Step 1: Data Gathering。
Qualitative Data: Conduct interviews, surveys, focus groups, and observe customer behavior.Quantitative Data: Collect data from sales, marketing,customer service, and financial records.Step 2: Data Analysis。
Data Cleansing: Prepare the data by removing inconsistencies, duplicates, and outliers.Exploratory Data Analysis: Explore the data using techniques such as data visualization and statistical analysis to identify initial patterns and trends.Pattern Recognition: Apply algorithms and techniques like clustering, regression, and anomaly detection to uncover hidden patterns in the data.Step 3: Insight Generation。
An adaptive algorithm for image restorationusing combined penalty functionsDaan Zhu *,Moe Razaz,Mark FisherSchool of Computing Sciences,University of East Anglia,Norwich NR47TJ,United KingdomReceived 20February 2005;received in revised form 8January 2006Available online 20March 2006Communicated by M.A.T.FigueiredoAbstractIn this paper,we present an adaptive gradient based method to restore images degraded by the effects of both noise and blur.The approach combines two penalty functions.The first derivative of the Canny operator is employed as a roughness penalty function to improve the high frequency information content of the image and a smoothing penalty term is used to remove noise.An adaptive algo-rithm is used to select the roughness and smoothing control parameters.We evaluate our approach using the Richardson–Lucy EM algo-rithm as a benchmark.The results highlight some of the difficulties in restoring blurred images that are subject to noise and show that in this case an algorithm that uses a combined penalty function is able to produce better quality results.Ó2006Elsevier B.V.All rights reserved.Keywords:Gradient descent;Penalized likelihood;Combined penalty function;Image restoration;Regularization1.Introduction and previous workWhen an image passes through an optical system it appears blurred.This process can be modelled by convolv-ing the image with the impulse response of the system.The image acquisition process also introduces noise which is often modelled as either a Gaussian or Poisson process depending on the type of image sensor and associated elec-tronics (Pratt,2003).Many linear and nonlinear algorithms have been developed in the literature to restore such noisy and blurred images,but both removing noise and sharpen-ing the image remains a very challenging problem.A par-ticular problem is that approaches aimed at restoring the effects of blur may in fact amplify the noise and introduce other unwanted image artifacts.Constrained algorithms are quite a popular approach with many papers published concerning methods forblurred image restoration,which at the same time suppress the noise (see for example Carasso,1999;Razaz et al.,1997).There are two difficulties in implementing a con-strained equation.One is in selecting the penalty function and the other lies in finding the Lagrange parameter.Some recently published work has proposed various constrained maximum likelihood algorithms to reduce ringing effects(Lante´ri et al.,2002a )or distortions introduced by iterative approaches (Heijden and Glasbey,2003).A popular pen-alty term is a positivity constraint which is used to ensure that negative pixel values do not occur in the maximum solution that is in turn obtained by an expectation maximi-zation (EM)algorithm (Lante´ri et al.,2001;Lante ´ri et al.,2002b ).Vogel and Oman (1998)approach restoration of noisy and blurred images by a Tikhonov regularization with a modified total variation function.In this paper,we focus on the problem of selecting a penalty function and finding an optimum Lagrange parameter.A regularized equation can be expressed as (Katsaggelos and Kang,1992)C ðl ;^f Þ¼C 1ð^f ÞþlC 2ð^f Þð1Þ0167-8655/$-see front matter Ó2006Elsevier B.V.All rights reserved.doi:10.1016/j.patrec.2006.01.009*Corresponding author.Fax:+4401603593345.E-mail addresses:d.zhu@ (D.Zhu),mr@ (M.Razaz),mhf@ (M.Fisher)./locate/patrecwhere C1and C2are the deconvolution and constraint parts,^f is a guess image and l a Lagrange parameter.A number of techniques have been presented aimed at select-ing parameters.Razaz et al.(1997)developed a projection onto convex sets(POCS)method which uses a Newton–Raphson algorithm to estimate the Lagrange parameter. Recently,Chojnacki et al.(2004)discussed a constraint parameter estimator for image processing applications. Katsaggelos and Kang(1992)employed constraint least squares(CLS)to estimate the Lagrange parameter and Kang and Kastsaggelos(1995)implemented a function to find the noise control parameter.Thompson et al.(1991) used minimization of the total predicted mean squared error(TPMSE)and generalized cross-validatory(GCV) to calculate the Lagrange parameter.Iba´n˜ez and Simo´(2003)estimated a constraint parameter based on a Markov randomfield(MRF)model.The above methods are based on the estimation of the smoothing term of a noise control parameter.However, in practice,wefind that after introducing a smoothing parameter,noise can be removed but high frequency information in the image,due to edges,is blurred as well.Recently attempts to address this problem have focused on the selection of a roughness function.Typical approaches include Good’s roughness regularization(Joshi and Miller,1993),edge-preserving regularization(Mach-ado et al.,2003)and k-means clustering(Charbonnier et al.,1997).In(Zhu et al.,2002)Zhu and Razaz present an adaptive algorithm based on the Cannyfilter to com-pensate for the loss of high frequency information.The Cannyfilter(Canny,1986)is a well known algorithm for edge extraction which is robust to background noise in an image.In this work we employ Canny enhancement as the roughness parameter to enhance high frequency information.A classical method for solving the likelihood equation is the Richardson–Lucy algorithm which uses expectation maximization(EM)(Katsaggelos and Lay,1991). Although EM is an efficient method for solving an uncon-strained likelihood equation the solution may not be opti-mally convergent when subject to constraints(Hebert and Lu Keming,1995).In this paper,we use a gradient descent algorithm(GDA)to solve the penalized likelihood equa-tion.This approach exhibits better convergence properties and noise removal performance than the Richardson–Lucy algorithm.Additionally,the GDA can also handle the problem of an image degraded by a spatially variant blur operator.2.Mathematical modelingThe likelihood of image pixel intensity in an observed image,assuming a Poisson noise distribution,can be repre-sented asPðg j fÞ¼YiðHfÞg iig i!eÀðHfÞið2Þwhere i denotes the number of events in unit time,H thedegradation matrix,g the noisy and blurred observed im-age and f the source image.The log-likelihood becomesTðfÞ¼logðPðg j fÞÞ¼logYiðHfÞg iigi!eÀðHfÞi"#ð3ÞthenTðfÞ¼Xg i logðHfÞiÀXlogðg i!ÞÀXðHfÞið4ÞUsing Stirling’s formula to expand log(g i!)and droppingthe independent terms f from T(f)thenCðfÞ%X MNi¼0½g iÀðHfÞiÀX MNi¼0gilog g iðHfÞið5Þwhere M and N denote the width and height of the originalimageCðfÞ¼X MNi¼0½g i logðHfÞiÀðHfÞið6ÞEq.(6)represents the formula for an unconstrained C func-tion.By introducing a smoothing penalty term into Eq.(6),Hudson and Lee(1998)show that noise in the degradedimage can be reduced,but high frequency componentsare also suppressed.We introduce both a roughness pen-alty term(Zhu et al.,2002)and a smoothing term givingUð^fÞ¼X NMi¼0½ðHfÞiÀg i logðHfÞiþa Sð^fÞþb Cð^fÞð7Þwhere Sð^fÞand Cð^fÞrepresent the smoothing and rough-ness penalty terms.The minimum solution of Uð^fÞis theoptimal solution under constraints S and C.2.1.Smoothing term selectionThe penalty smoothing term,Sð^fÞ,which is used to sup-press noise,is chosen to be equal to k R^f k22,where R is thefollowing diagonal matrix:R¼1À0:75À0:250ÁÁÁ00À0:751À0:75À0:25ÁÁÁ00À0:25À0:751À0:75ÁÁÁ000.........ÁÁÁ0..................À0:75À0:2500...À0:25À0:751À0:7500...0À0:25À0:751B BB BB BB BB BB BB BB@1C CC CC CC CC CC CC CC AThe selection of R depends on the noise properties.Due tothe characteristics of the imaging system the noise in anyone pixel is only related to the intensity in a small numberof neighboring pixels.A more detailed discussion of coeffi-cient matrix R is given in(Zhu et al.,2005;Hanke et al.,2000).D.Zhu et al./Pattern Recognition Letters27(2006)1336–134113372.2.Roughness term selectionPreviously Charbonnier et al.(1997)proposed an edge-preserving regularization(EPR)algorithm with applica-tions in computed imaging.In our algorithm we choose the roughness penalty term Cð^fÞto be thefirst derivative of the Cannyfilter(Zhu et al.,2002).A Canny enhance-ment was chosen as it is a robust edge enhancement operator that combines enhancement,non-maximal sup-pression and a hysteresis threshold.ThusCð^fÞ¼rðG ^fÞkr G ^f kr Gð8ÞThe symbol in Eq.(8)denotes convolution and G is a Gaussianfilter for removing the background noise.The lo-cal maximum in the direction perpendicular to the edge,re-ferred to as non-maximal suppression,is calculated from (Canny,1986)o2o n2G ^f¼0ð9Þ2.3.Parameter calculationKang and Kastsaggelos(1995)find the range of the Lagrange parameter to be a positive value from zero to one.In this paper,we have chosen a based on a smoothing parameter at high frequencies(Katsaggelos and Kang, 1992)such asa¼eE¼k gÀHf k22k Df k22ð10Þwhere D is a high passfilterD¼0À10À14À10À10B@1C AFor images with large signal-to-noise ratio(SNR),theresidual k gÀH^f k22is initially quite small and as the itera-tion proceeds a should eventually tend to zero.On the other hand for images with low SNRs,the residual is ini-tially large but it gradually decreases ultimately converging to a very small positive value.In this way a adapts depend-ing on the noise present in the image at each stage of the iteration.We have chosen the coefficient of the roughness term to be adaptive asb^ fðkÞ¼mÁk Rð^fðkÞÞk22k gÀH^fðkÞk2ð11Þwhere m is an adaptive scalar controlling the convergence of b.The selection of m depends on the estimated SNR (m=SNR).For Poisson distributed noise an estimate of the SNR can be obtained by van Kempen(1999)SNR¼10log10EcðI0þVI bÞð12Þwhere E is the image power,c is the conversion factor which determines the number of photons,V the image vol-ume and I b the constant background intensity.I0is the average number of photons acquired at the pixel with pix-els intensity P,I0=P/c.For images,we can estimate the bandwidth of an imaging system from the system optical transfer function(i.e.the Fourier transform of the point spread function).As the iteration progresses b is adaptively changed according to Eq.(11)eventually converging to a small constant value.For images that exhibit a high SNR,b is initially small to ensure that high frequency noise is not amplified in the early iterations.The adaptive scalar m in Eq.(11)is re-estimated based on the noise model at each iteration.In the Fourier domain,noise and sharp transi-tions in an image are represented as high frequency compo-nents.Recently Palmer(2004)used a log-half-frequency energy measure to estimate the image noise.Here,the SNR is estimated by comparing energy in the frequency domain.Energy related to the structural image data,i.e. signal energy,is identified by low-passfiltering the FFT magnitude spectrum of the image.Thus the SNR is esti-mated usingSNR¼10log10E sE nð13Þwhere E s is the signal energy and E n is the higher-frequency energy attributed to noise.The distribution of energies in an image is identified by defining a cut-offbandwidth. We choose the half-maximum bandwidth which is equal to the frequency at with the magnitude spectrum of the log-scaled FFT drops to50%of its peak value.This is illus-trated in Fig.1(a)and(b)for a typical degraded image. In this case the test image is a blurred image with30dB Gaussian noise(see Fig.1(b)).The half-maximum band-width has been empirically determined to provide an appropriate division between signal and noise energies. 2.4.Iterative solutionThe traditional approach used for solving the likelihood Eq.(6)is byfinding its maximum solution(Katsaggelos and Lay,1991;Mumcogˇlu et al.,1994).For the penalized likelihood Eq.(7),first we multiply both sides of the equa-tion byÀ1,and thenfind its minimum(rather than maxi-mum)solution using a gradient descent algorithm as^fðkþ1Þ¼^fðkÞÀg r C^fð14Þwhere g is an iterative scaler and controls the convergence bining Eqs.(7)and(14)we obtain^fðkþ1Þ¼^fðkÞÀg d Cd^fþa0d Sð^fÞd^fþb0d Cð^fÞd^f!ð15Þwhere a0and b0are thefirst derivation of a and b with respect to^f.The fully expanded equation is then1338 D.Zhu et al./Pattern Recognition Letters27(2006)1336–1341^fðk þ1Þ¼^f ðk ÞÀH TðH ^f ðk ÞÞÀg diag ðH ^fðk ÞÞ"#Àa 0^f ðk Þ½R T R ^f ðk Þ Àb 0^f ðk Þr C ^fð^f ðk ÞÞð16ÞThe initial value for iteration is set to the blurred and noisy image ^fð0Þ¼g .We have selected g =1;this is consistent with Katsaggelos and Kang (1992).3.Experimental resultsTo assess the performance of our algorithm we have applied it to a number of test images with different noise levels and point spread functions (PSF).We have also com-pared our algorithm with the Richardson–Lucy EM (RL-EM)algorithm.Here we present typical results.A typical test image is shown in Fig.2(a).This image is convolved with a constant circle point spread function and then Pois-son noise is added to give the images shown in Fig.2(b)and (c).Figs.3and 4allow us to visually compare the restored images after 100iterations.Fig.3shows that the combined adaptive penalty terms used by our algorithm are able to deal with image noise and blur more effectively than the Richardson–Lucy EM approach (Fig.4).For example,if the blurred image exhibits a low SNR,this produces a higher smoothing penalty parameter a to suppress back-ground noise.In the meantime,any loss of high frequency information is compensated by the roughness penalty parameter b .However for low SNRs,this compensation is also sensitive to sharp grey level gradients (seeFig.2(c)).In Fig.5,we plot the variation of Resi ð^fÞ,C ð^fÞ,a ð^f Þand b ð^f Þagainst the iteration number.Obvi-ously,Resi ð^fÞfor both the RL-EM and our combined pen-alty EM approach converge to a small value after 100iterations (Fig.5(a)).However,the rate of convergence of our penalized EM approach is faster than for the RL-EM algorithm.This is especially noticeable when the blurred image contains more noise.Fig.5(b)shows that C ð^fÞfor the combined penalty EM approaches its mini-mum value instead of the maximum value in the RL-EM.Figs.5(c)and 5(d)show the convergent plots of the penalty parameters a and b .For the blurred image with a low SNR,the adaptive function intelligently gives a heavier smoothing penalty parameter (a )and weaker roughness parameter (b )than that for the image with a higher SNR.D SNR (i.e.the improvement in the signal to noise ratio)can be used to assess the noise performance of each approach.This can be estimatedfromFig.1.FFT visualization using blurred and noisy image:(a)log-scaled FFT of image;(b)plot of central line from FFT in(a).Fig.2.Original image,its blurred and noisy images:(a)original image;(b)30dB SNR blurred image;(c)20dB SNR blurredimage.Fig.3.Restoration results by our algorithm:(a)restoration of image in Fig.2(b);(b)restoration of image in Fig.2(c).Fig. 4.Restoration results by Richardson–Lucy EM algorithm:(a)restoration of image in Fig.2(b);(b)restoration of image in Fig.2(c).D.Zhu et al./Pattern Recognition Letters 27(2006)1336–13411339D SNR ¼10log 10PMN i ¼1ðf i Àg i Þ2P MNi ¼1ð^f iÀf i Þ2()ð17Þwhere ^f,f and g are restored,source and noisy blurred images,respectively.Fig.6shows computed values of D SNR for both algorithms.Although the best D SNRforFig.7.Restoration by RL-EM and our algorithm:(a)original image;(b)blurred image,SNR =15dB;(c)RL-EM restoration;(d)our restoration.1340 D.Zhu et al./Pattern Recognition Letters 27(2006)1336–1341the Richardson–Lucy algorithm occurs at iteration3and6 for20dB and30dB SNR degraded images,respectively, more iterations are needed to reduce the effects of blur (see Fig.5(a)),and these amplify the image noise.If D SNR is compared after Resið^fÞfalls to a small value(100itera-tions)then the advantage of the combined penalty ap-proach becomes clear.The CPU processing time needed to restore the image of Fig.1using the different algorithms are listed in Fig.6.All the algorithms were executed on a Pentium IV,Red hat8.0Linux workstation running at 2.2GHz with1Gb memory.The CPU time listed in Fig.6is the time for one iteration.Fig.7shows another test image which is blurred with 15dB SNR Poisson noise.Fig.7(c)and(d)compare the restoration results after100iterations.The residuals for the two algorithms are4.6À5and2.3·10À5,respectively.4.ConclusionIn this paper we presented a new adaptive algorithm which uses combined penalty terms to restore images degraded by noise and blur artifacts.We compared our algorithm with the Richardson–Lucy EM algorithm and showed that our approach outperforms the latter.Earlier work by Kang and Kastsaggelos(1995)used a function to estimate the Lagrange parameter and restricted its range to ensure convergence.However,this is a non-adaptive method and does not always converge.In this paper,an adaptive method is used to estimate the smooth-ing and roughness parameters.The experimental results presented show that our approach is able to remove noise whilst at the same time restoring the high frequency image information due to edges.ReferencesCanny,J.,1986.A computational approach to edge detection.IEEE Trans.Pattern Anal.Machine Intell.8,679–698.Carasso,A.S.,1999.Linear and nonlinear image deblurring:a docu-mented study.SIAM J.Numer.Anal.36,1659–1689. Charbonnier,P.,Blanc-Fe´raud,L.,Aubert,G.,Barlaud,M.,1997.Deterministic edge-preserving regularization in computed imaging.IEEE Trans.Image Process.6,298–311.Chojnacki,W.,Brooks,M.,Hengel, A.,Gawley, D.,2004.A new constraint parameter estimator for computer vision application.Image Vision Comput.22,85–91.Hanke,M.,Nagy,G.J.,Vogel,C.,2000.Quasi-Newton approach to nonnegative image restorations.Linear Algebra Appl.316,223–236. Hebert,T.J.,Lu Keming,S.,1995.Expectation-maximization algorithms, null spaces,and MAP image restoration.IEEE Trans.Image Process.4,1084–1095.Heijden,G.,Glasbey, C.,2003.Calibrating spectral images using penalized likelihood.Real-Time Imag.9,231–236.Hudson,H.M.,Lee,T.C.M.,1998.Maximum likelihood restoration and choice of smoothing parameter in deconvolution of image data subject to Poisson put.Statist.Data Anal.26,393–410.Iba´n˜ez,M.V.,Simo´,A.,2003.Parameter estimation in Markov random field image modeling with imperfect observations.A comparative study.Pattern Recognition Lett.24,2377–2389.Joshi,S.,Miller,M.I.,1993.Maximum a posteriori estimation with good’s roughness for optical sectioning microscopy.Opt.Soc.Amer.A10, 1078–1085.Kang,G.M.,Kastsaggelos,K.A.,1995.General choice of the regulari-zation functional in regularized image restoration.IEEE Trans.Image Process.4,594–602.Katsaggelos,A.,Kang,G.M.,1992.Iterative evaluation of the regular-ization parameter in regularized image m.Image Repres.3,446–455.Katsaggelos,K.A.,Lay,K.T.,1991.Maximum likelihood blur identifi-cation and image restoration using the EM algorithm.IEEE Trans.Signal Process.39,729–733.Lante´ri,H.,Roche,M.,Cuevas,O.,Aime,C.,2001.A general method to devise maximum-likelihood signal restoration multiplicative algo-rithms with non-negativity constraints.Signal Process.81,945–974. Lante´ri,H.,Roche,M.,Gaucherel,P.,Aime,C.,2002a.Ringing reduction in image restoration algorithms using a constraint on the inferior bound of the solution.Signal Process.82,1481–1504.Lante´ri,H.,Roche,M.,Aime,C.,2002b.Penalized maximum likelihood image restoration with positivity constraints:multiplicative algo-rithms.Inverse Problem18,1397–1419.Machado,W.,Mascarenhas,N.,Costa,J.,(2003).Restoration of Solar Radio images using adaptive regularization techniques.In:16th Brazilian Symp.on Computer Graphics and Image Processing. Mumcogˇlu,E.U¨.,Leahy,R.,Cherry,S.R.,Zhou,Z.,1994.Fast gradient-based methods for Bayesian reconstruction of transmission and emission PET images.IEEE Trans.Medical Imag.13,687–701. Palmer,A.,(2004).Adaptive image restoration algorithms using intelli-gent techniques.Ph.D.Thesis,University of East Anglia,2004. Pratt,W.K.,2003.Digital Image Processing.John Wiley and Sons Publication.Razaz,M.,Lee,R.A.,Shaw,P.J.,1997.Restoration of3D real images using projection onto convex setsImage Processing:Mathematical Methods and Applications.Oxford University Press,pp.145–159. Thompson,A.,Brown,J.,Kay,J.,Titterington,D.,1991.A study of methods of choosing the smoothing parameter in image restoration by regularization.IEEE Trans.Pattern Anal.Machine Intell.13,326–339. van Kempen,G.M.P.,1999.Image Restoration in Fluorescence Micro-scopy.Delft University Press,Netherlands.Vogel, C.R.,Oman,W.E.,1998.Fast,robust total variation-based reconstruction of noisy,blurred images.IEEE Trans.Image Process.7,813–824.Zhu,D.,Razaz,M.,Lee,R.A.,2002.Adaptive penalty likelihood for image restoration and roughness parameter selection based on canny enhancement.In:Internat.Conf.on Recent Advances in Soft Computing2002,pp.488–493.Zhu,D.,Razaz,M.,Lee,R.A.,2005.Adaptive penalty likelihood for reconstruction of multidimensional confocal microscopy images.Comput.Med.Imag.Graphics29,319–331.D.Zhu et al./Pattern Recognition Letters27(2006)1336–13411341。
小学上册英语第5单元期末试卷(含答案)英语试题一、综合题(本题有100小题,每小题1分,共100分.每小题不选、错误,均不给分)1.My sister plays the _____ (钢琴).2.The __________ is known for its colorful coral reefs. (大堡礁)3. A __________ is a diagram that shows different layers of soil.4. A horse can run fast on the ________________ (田野).5.The teacher is _____ (kind/strict) to us.6.The process of changing from a liquid to a gas is called __________ (蒸发).7.The tortoise hides in its ______ (壳).8.__________ (科学传播) is essential for public understanding of chemistry.9.She enjoys _____ (running/walking) in the mornings.10.The chemical symbol for tungsten is _______.11.The chemical symbol for platinum is ______.12.Herbs are often grown in ______ (窗台) pots.13.__________ (化学危险性) must be assessed before handling reagents.14.________ (植物生态观察) leads to discoveries.15.I like to play outside with my _______ (我喜欢和我的_______在外面玩).16.What do we call the person who tells stories?A. AuthorB. ChefC. TeacherD. Doctor答案: A17.The bison roams the ____.18.I want to learn how to ________ (打篮球) better.19.My teacher is very _____. (nice/quick/slow)20.I like _____ (eating/cooking) new dishes.21.The phone is ringing in the ___ (kitchen/living room).22.What is the name of the event where people come together to celebrate a birthday?A. PartyB. GatheringC. CelebrationD. Event答案: A23.Glass is an example of a(n) _______ material.24. A ______ is a geographical feature that attracts scientists.25.I enjoy exploring nature and going on ______ (远足) with my family. We see beautiful ______ (风景) along the way.26.I have a _____ (小提琴) that I practice playing every day. 我有一把小提琴,每天练习演奏。
Chapter 3:Gathering Information and Scanning the Environment GENERAL CONCEPT QUESTIONSMultiple Choice1. The major responsibility for identifying significant marketplace changes falls to the________.a. U.S. Department of Laborb. company’s marketersc. American Marketing Associationd. industry lobby groups found in Washington, D.C.e. marketing research industryAnswer: b Page: 72 Level of difficulty: Easy2. Marketers have extensive information about how consumption patterns vary acrosscountries. On a per capita basis within Western Europe, the ________ smoke the most cigarettes.a. Swissb. Greeksc. Irishd. Austrianse. FrenchAnswer: d Page: 72 Level of difficulty: Hard3. All of the following questions EXCEPT ________, would be considered to be formsof information needs probes.a. What decisions do you regularly make?b. What information do you need to make decisions?c. What data analysis programs would you want?d. What magazines and trade reports would you like to see on a regular basis?e. What products would be most closely matched to consumer needs?Answer: e Page: 73 Level of difficulty: MediumChapter 3: Gathering Information and Scanning the Environment 4. ________ consists of people, equipment, and procedures to gather, sort, analyze,evaluate, and distribute needed, timely, and accurate information to marketing decision makers.a. A marketing information systemb. A marketing research systemc. A marketing intelligence systemd. A promotional campaigne. A marketing databaseAnswer: a Page: 73 Level of difficulty: Medium5. The company’s marketing information system should be a cross between whatmanagers think they need, what managers really need, and ________.a. what the marketing research department is able to dob. what consumers are willing to sharec. what the competition is doingd. what is acceptable industry practicee. what is economically feasibleAnswer: e Page: 73 Level of difficulty: Medium6. Marketing managers rely on internal reports. By analyzing this information, they canspot ________.a. micro-marketsb. opportunities and problemsc. macro-marketsd. competitive strategiese. consumer demographic unitsAnswer: b Page: 73 Level of difficulty: Easy7. The heart of the internal records system is the ________.a. databaseb. asset acquisition processc. order-to-payment cycled. service consideratione. information liquidity ratioAnswer: c Page: 73 Level of difficulty: Hard8. When a marketer “mines” his or her company’s database, fresh insights can be gainedinto neglected customer segments, ________, and other useful information.a. recent customer trendsb. long-term competitive trendsc. possible new inventionsd. possible new technologiese. new primary data possibilitiesAnswer: a Page: 74 Level of difficulty: MediumPart 2: Capturing Marketing Insights9. The internal records system supplies results data, but the marketing intelligencesystem supplies ________ data.a. concurrentb. secondaryc. researchd. happeningse. premiumAnswer: d Page: 74 Level of difficulty: Medium10. A ________ is a set of procedures and sources managers use to obtain everydayinformation about developments in the marketing environment.a. marketing research systemb. marketing information systemc. product management systemd. marketing intelligence systeme. vertical systemAnswer: d Page: 74 Level of difficulty: Medium11. A company can take several steps to improve the quality of its marketing intelligence.If the company purchases competitive products for study, attends open houses and trade shows, and reads competitors’published reports and stockholder information, the company is using ________ to improve the quality of its marketing intelligence.a. sales force surrogatesb. intermediariesc. external networksd. advisory panelse. customer feedback systemsAnswer: c Pages: 74–75 Level of difficulty: Hard12. All of the following would be considered to be steps to improve the quality ofmarketing intelligence in a company EXCEPT ________.a. a company can train and motivate the sales force to spot and report newdevelopmentsb. a company can use guerrilla tactics such as going through a competitor’s trashc. a company can motivate intermediaries to pass along important informationd. a company can network externallye. a company can purchase information from outside suppliersAnswer: b Pages: 74–76 Level of difficulty: EasyChapter 3: Gathering Information and Scanning the Environment 13. The 2000 U.S. census provides an in-depth look at the population swings,demographic groups, regional migrations, and changing family structure of 281+ million people. Which of the following steps to improve the quality of company marketing intelligence system would be most closely associated the above illustration?a. A company can purchase information from outside suppliers.b. A company can take advantage of government data sources.c. A company can use online customer feedback systems to collect data.d. A company can network externally.e. A company can use its sales force to collect and report data.Answer: b Page: 76 Level of difficulty: Easy14. There are four main ways that marketers can find relevant online information oncompetitors’products and weaknesses, and summary comments and overall performance rating of a product, service, or supplier. ________ is(are) a type of site that is concentrated in financial services and high-tech products that require professional knowledge.a. Independent customer goods and service reviewsb. Distributor or sales agent feedback sitesc. Combo-sites offering customer reviews and expert opinionsd. Customer complaint sitese. Shopping bot service sitesAnswer: c Page: 77 Level of difficulty: Hard15. A ________ is “unpredictable, short-lived, and without social, economic, and politicalsignificance.”a. fadb. fashionc. trendd. megatrende. styleAnswer: a Page: 77 Level of difficulty: Medium16. A ________ is a direction or sequence of events that has some momentum anddurability; the shape of the future is revealed and many opportunities are provided.a. fadb. fashionc. trendd. megatrende. styleAnswer: c Page: 77 Level of difficulty: HardPart 2: Capturing Marketing Insights17. ________ have been described as “large social, economic, political and technologicalchanges [that] are slow to form, and once in place, they influence us for some time—between seven and ten years, or longer.a. Fadsb. Fashionsc. Trendsd. Megatrendse. StylesAnswer: d Page: 77 Level of difficulty: Medium18. Which of the following minority groups in the United States has been associated withone of the ten megatrends shaping the consumer landscape?a. African Americansb. Asian Americansc. European Americansd. Hispanic Americanse. Middle Eastern AmericansAnswer: d Page: 78 Level of difficulty: Medium19. The beginning of the new century brought a series of new challenges. All of thefollowing would be considered to be among those challenges EXCEPT ________.a. a deterioration of innovative ideasb. steep decline of the stock marketc. increasing unemploymentd. corporate scandalse. the rise of terrorismAnswer: a Page: 78 Level of difficulty: Medium20. With the rapidly changing global picture, the firm must monitor six major forces. Allof the following would be among those forces EXCEPT ________.a. demographicb. economicc. social-culturald. naturale. promotionalAnswer: e Page: 78 Level of difficulty: Easy21. The main demographic force that marketers monitor is(are) ________.a. suppliersb. competitorsc. communication (such as advertising)d. government reports dealing with birth ratese. populationAnswer: e Page: 79 Level of difficulty: EasyChapter 3: Gathering Information and Scanning the Environment 22. The population explosion has been a source of major concern. Unchecked populationgrowth and consumption could eventually result in all of the following EXCEPT ________.a. insufficient food supplyb. depletion of key mineralsc. overcrowdingd. restrictions on competitione. pollutionAnswer: d Page: 79 Level of difficulty: Easy23. One impact of explosive population growth is illustrated by the case of China. TheChinese government passed regulations limiting families to one child. One consequence of these regulations is that ________.a. the children are so fussed over and spoiled that they become “little emperors”b. school enrollments are droppingc. the fledgling automotive business in China will not have customers in a few yearsd. open rebellion is being preachede. “child-oriented businesses” have few customersAnswer: a Page: 80 Level of difficulty: Medium24. A significant fact about population growth and population shifts is that in 2004 or2005, ________.a. the youth market will exceed that of the adult marketb. people over the age of 60 will outnumber those under five years of agec. baby boomers will be eclipsed by Gen X young adultsd. most age group segments will be about equale. Gen Y young adults will surpass the baby boomers as the largest age segment Answer: b Page: 80 Level of difficulty: Hard25. Which of the following age groups is thought to control three-quarters of thecountry’s wealth?a. 0–20 age segmentb. 60+ age segmentc. 20–30 age segmentd. 30–40 age segmente. 40+ age segmentAnswer: e Page: 81 Level of difficulty: HardPart 2: Capturing Marketing Insights26. At one time the United States was called a “melting pot”society because of thenumber of different cultures that were integrated into the U.S. culture. Today, the United States is described as a ________ society because many ethnic groups are maintaining their ethnic differences, neighborhoods, and cultures.a. “boiling pot”b. “salad bowl”c. “banana split”d. “doubled up”e. “non-communicative”Answer: b Page: 81 Level of difficulty: Medium27. According to the 2000 census, the U.S. population of 276.2 million was 72 percentwhite and ________ percent African American. The remainder consisted of Hispanic Americans and other minorities.a. 20b. 18c. 15d. 13e. 11Answer: d Page: 81 Level of difficulty: Hard28. Diversity goes beyond ethnic and racial markets. More than ________ millionAmericans have disabilities, and they constitute a market for home delivery companies (and others).a. 50b. 40c. 30d. 20e. 10Answer: a Page: 83 Level of difficulty: Hard29. Which of the following countries is known for having 99 percent of its populationliterate?a. Englandb. Germanyc. Franced. United Statese. JapanAnswer: e Page: 83 Level of difficulty: MediumChapter 3: Gathering Information and Scanning the Environment 30. The ________ household consists of a husband, wife, and children (and sometimesgrandparents).a. “traditional”b. “extended”c. “diversity”d. “modern”e. “revised”Answer: a Page: 83 Level of difficulty: Medium31. Married couple households—the dominant cohort since the formulation of the UnitedStates—has slipped from nearly 80 percent in the 1950s to around ________ percent today.a. 70b. 60c. 50d. 40e. 35Answer: c Page: 83 Level of difficulty: Hard32. The twenty-first century saw ________ markets grow more rapidly again due to ahigher birth rate, a lower death rate, and rapid growth from foreign immigration.a. suburbanb. urbanc. rurald. coastale. secondaryAnswer: b Page: 84 Level of difficulty: Medium33. The movement by population to the ________ has lessened the demand for warmclothing and home heating equipment and increased demand for air conditioning.a. Grainbeltb. Pacific Northwestc. Sunbeltd. Mid-Coastal arease. HeartlandAnswer: c Page: 84 Level of difficulty: EasyPart 2: Capturing Marketing Insights34. Marketers look at where consumers are gathering. Almost one in ________ peopleover the age of five (120 million) moved at least one time between 1995 and 2000, according to a Census 2000 brief.a. twob. threec. fourd. fivee. tenAnswer: a Page: 85 Level of difficulty: Hard35. In which of the following economies would we expect to find few opportunities formarketers?a. Industrializing economies.b. Land-locked economies.c. Raw-material-exporting economies.d. Industrial economies.e. Subsistence economies.Answer: e Page: 86 Level of difficulty: Easy36. According to information presented in the text, which of the following countries issurprisingly a very good market for Lamborghini automobiles (costing more than $150,000) because of the number of wealthy families that can afford expensive cars.a. Greeceb. Switzerlandc. Hollandd. Russiae. PortugalAnswer: e Page: 86 Level of difficulty: Hard37. Over the past three decades in the United States, the rich have grown richer and themiddle class has ________.a. stayed about the sameb. shrunkc. increased slightlyd. matched the rich in terms of relative growthe. been ignored because of problems with the poorer classesAnswer: b Page: 86 Level of difficulty: Medium38. ________ shapes the beliefs, values, and norms that largely define the tastes andpreferences.a. Marketingb. The mass mediac. Governmentd. Production innovation and engineeringe. SocietyAnswer: e Page: 87 Level of difficulty: MediumChapter 3: Gathering Information and Scanning the Environment 39. If a consumer lives the lifestyle of a “pleasure seeker” or goes on a “self-realization”quest, he or she is expressing what is called ________.a. views of othersb. views of societyc. views of themselvesd. views of organizationse. views of the universeAnswer: c Pages: 87–88 Level of difficulty: Easy40. According to the information found in the social-cultural environment, with respect toviews of others, ________ are considered to be things that allow people who are alone to feel they are not (e.g., television, home video games, and chat rooms on the Internet).a. social surrogatesb. subliminal fantasiesc. relationship avoidanced. primary productse. secondary productsAnswer: a Page: 88 Level of difficulty: Medium41. Today, corporations need to make sure that they are good corporate citizens and thattheir consumer messages are honest. Such a view would be consistent with which of the following views?a. Views of others.b. Views of organizations.c. Views of themselves.d. Views of the universe.e. Views of society.Answer: b Page: 88 Level of difficulty: Easy42. People vary in their attitudes toward their society. ________ usually live morefrugally, drive smaller cars, and wear simpler clothing.a. Makersb. Escapersc. Seekersd. Changerse. DevelopersAnswer: d Page: 88 Level of difficulty: Hard43. People vary in their attitudes toward society and react accordingly. ________ are amajor market for movies, music, surfing, and camping.a. Makersb. Preserversc. Escapersd. Changerse. DevelopersAnswer: c Page: 88 Level of difficulty: Easy44. All of the following have been cited by the text as being among Americans’corevalues EXCEPT ________.a. they believe in workb. they believe in getting marriedc. they believe in giving to charityd. they believe in being honeste. they believe in sexual permissivenessAnswer: e Page: 88 Level of difficulty: Easy45. Which of the following would be the best illustration of a secondary belief or value?a. Belief in work.b. Belief in giving to charity.c. Belief in getting married.d. Belief in getting married early.e. Belief in being honest.Answer: d Page: 88 Level of difficulty: Medium46. Which of the following is by far the most popular American leisure activity in that itis preferred by 59 percent of adults who participate in such activities?a. Gardening.b. Walking for exercise.c. Swimming.d. Photography.e. Jogging or running.Answer: b Page: 89 Level of difficulty: Medium47. Each society contains ________, groups with shared values emerging from theirspecial life experiences or circumstances.a. demographic segmentsb. cliquesc. consumer bundlesd. subculturese. behavioral nichesAnswer: d Page: 89 Level of difficulty: Medium48. Which of the following would be the best illustration of a subculture?a. A softball team.b. A university alumni association.c. Teenagers.d. A Boy Scout troop.e. Frequent flyers.Answer: c Page: 89 Level of difficulty: Medium49. All of the following EXCEPT ________ have been found to influence young peopletoday and cause a shift of secondary cores values for this group.a. U2’s Bono.b. Elvis Presley.c. The NBA’s LeBron James.d. Golf’s Tiger Woods.e. Skateboarder Tony Hawk.Answer: b Page: 89 Level of difficulty: Easy50. Although core values are fairly persistent, cultural swings do take place. ________caused such a swing in the 1960s.a. Ford Motor Companyb. George McGovernc. G.I. Joe action charactersd. The infomerciale. The BeatlesAnswer: e Page: 89 Level of difficulty: Medium51. Marketers need to be aware of threats and opportunities associated with four trends inthe natural environment. All of the following are among those trends EXCEPT ________.a. the shortage of raw materialsb. the increased cost of energyc. near 90 percent corporate support for “green causes”d. increased pollution levelse. the changing role of governmentsAnswer: c Page: 90 Level of difficulty: Easy52. With respect to the shortage of raw materials, air and water are classified as________ resources. However, as we know, problems are beginning to plague both our air and water quality.a. infiniteb. near finitec. finite renewabled. finite nonrenewablee. absoluteAnswer: a Page: 90 Level of difficulty: Medium53.One finite nonrenewable resource, ________, has created serious problems for theworld economy. Because of anticipated shortages, investment and commodity markets have had wild swings.a. waterb. airc. sugard. coffeee. oilAnswer: e Page: 90 Level of difficulty: Easy54. From a branding perspective, “green marketing”programs have not been entirelysuccessful. ________ has been cited as one of the obstacles that must be overcome for “green marketing” programs to be more successful.a. Overexposure and lack of credibilityb. High costc. Poor promotionsd. Resistance by the youth segment in the marketplacee. Lack of support by governmental agencies and concernsAnswer: a Page: 91 Level of difficulty: Hard55. Which of the following countries is noted for their “green movement” and supportwithin its government for environmental quality enhancement?a. Mexicob. Chinac. Germanyd. Englande. ItalyAnswer: c Page: 91 Level of difficulty: Medium56. The marketer should monitor the following trends in technology, EXCEPT ________,if progress is to be made in business.a. the pace of changeb. the difficulties found in sharing informationc. the opportunities for innovationd. varying R&D budgetse. increased regulationAnswer: b Page: 92 Level of difficulty: Hard57. According to some industry analysts and inventors, ________ will eventually eclipsethe PC as our most important technological device.a. iPodb. HDTVc. holographic televisiond. the mobile phonee. solar-powered carAnswer: d Page: 92 Level of difficulty: Medium58. All of the following will most likely be among the advantages for a society thatembraces telecommuting as an employment/communication alternative EXCEPT ________.a. reduction of auto pollutionb. bringing the family closer togetherc. increased bonuses and compensation perksd. creating more home-centered shoppinge. entertainment centered on the home environmentAnswer: c Page: 92 Level of difficulty: Medium59. ________ legislation has as its purposes to protect companies from unfaircompetition, to protect consumers from unfair business practices, and to protect the interests of society from unbridled business behavior.a. Businessb. Consumerc. Bi-partisand. Activiste. GlobalAnswer: a Page: 94 Level of difficulty: Easy60. An important force affecting business is the ________—a movement of citizens andgovernment organized to strengthen the rights and powers of buyers in relation to sellers.a. lobbyist movementb. consumerist movementc. environmental movementd. self-rights movemente. ethical reform movementAnswer: b Page: 95 Level of difficulty: MediumTrue/False61.The major responsibility for identifying significant marketplace changes falls to thecompany’s marketers.Answer: True Page: 72 Level of difficulty: Easy62. Today, most firms are rather sophisticated about gathering information.Answer: False Page: 72 Level of difficulty: Medium63. A marketing information system is developed from internal company records,marketing intelligence, and promotional models supplied by the marketing department.Answer: False Page: 73 Level of difficulty: Medium64. The heart of the internal records system is the bar code.Answer: False Page: 73 Level of difficulty: Medium65. According to principles found in database construction and usage, a “carpet bombing”mail out of a new offer is usually the most successful strategy.Answer: False Page: 74 Level of difficulty: Medium66. The internal records system supplies results data, but the marketing intelligencesystem supplies happenings data.Answer: True Page: 74 Level of difficulty: Easy67. If a company were pursuing a policy of networking externally it might collectcompetitors’ ads or look up news stories about competitors.Answer: True Page: 75 Level of difficulty: Medium68. One of the ways to find relevant online information on competitors’ strengths andweaknesses might be to frequent distributor or sales agent feedback sites. Answer: True Page: 76 Level of difficulty: Medium69. A style is unpredictable, short-lived, and without social, economic, and politicalsignificance.Answer: False Page: 77 Level of difficulty: Medium70. A megatrend has been described as being what follows all fads that stay on themarket at least one year.Answer: False Page: 77 Level of difficulty: Medium71. One of the ten significant megatrends that will impact marketing efforts in the futureis delayed retirement.Answer: True Page: 78 Level of difficulty: Medium72. Microenvironmental forces have been labeled as being “uncontrollable.”Answer: False Page: 78 Level of difficulty: Medium73. The main demographic force that marketers monitor is population.Answer: True Page: 79 Level of difficulty: Medium74. If the world were a village of 1,000 people, it would consist of 520 men and 480women.Answer: False Page: 79 Level of difficulty: Medium75. A growing population always means a growing market.Answer: False Page: 80 Level of difficulty: Medium76. Japan has one of the world’s oldest populations.Answer: True Page: 80 Level of difficulty: Medium77. According to population studies, Gen X (numbering 72 million) is almost the samesize as the huge baby boomer market.Answer: False Page: 81 Level of difficulty: Medium78. At present the largest minority in the United States is the Latinos with 13 percent ofthe total population.Answer: False Page: 81 Level of difficulty: Medium79. In the United States, 10 to 15 percent of the population may be functionally illiterate. Answer: True Page: 83 Level of difficulty: Medium80. Based on research done in England, a conclusion drawn about families is that “friendsare the new family.”Answer: True Page: 83 Level of difficulty: Hard81. According to studies of minority markets, the disabled market is ten times more likelyto be in a professional job, almost twice as likely to own a vacation home, eight times more likely to own a notebook computer, and twice as likely to own individual stocks as compared to the general population.Answer: False Page: 84 Level of difficulty: Medium82. Urban markets are once again growing because of higher birth rates, a lower deathrate, and rapid growth from foreign immigration.Answer: True Page: 84 Level of difficulty: Medium83. The small office—home office segment of our society has grown to nearly 40million; thereby, boosting the sales of electronic conveniences and ready to assemble furniture.Answer: True Page: 85 Level of difficulty: Medium84. Almost one in two people over the age of five (120 million) moved at least one timebetween 1995 and 2000, according to a Census 2000 brief.Answer: True Page: 85 Level of difficulty: Medium85. Available purchasing power in an economy depends on mainly one facet—supply anddemand.Answer: False Page: 85 Level of difficulty: Easy86. A good illustration of a raw-material exporting economy is Egypt.Answer: False Page: 86 Level of difficulty: Hard87. Conventional retailers who offer medium-priced goods are the most vulnerable to thegrowing trend in the United States called a two-tier market.Answer: True Page: 86 Level of difficulty: Hard88. Through outsourcing, companies can feasibly cut between 20 to 70 percent of theirlabor costs.Answer: True Page: 87 Level of difficulty: Easy89. “Pleasure seekers” of the 1970s had their beliefs, values, and norms shaped by viewsof others.Answer: False Pages: 87–88 Level of difficulty: Medium90. If a single person has a home entertainment system that is rich in televisioncapabilities and home video games, he or she may be using such a system as a “social surrogate.”Answer: True Page: 88 Level of difficulty: Medium91. In recent years, because of a tough job market, there has been an increasing amountof organizational loyalty among most employees.Answer: False Page: 88 Level of difficulty: Medium92. If a young college student decides to join the military to defend the principles of hisor her country, the student would be classified as a “changer.”Answer: False Page: 88 Level of difficulty: Medium93. Most Americans still believe in getting married as a core belief.Answer: True Page: 88 Level of difficulty: Easy94. Teenagers would be a good example of a culture in the United States.Answer: False Page: 89 Level of difficulty: Medium95. Marketers need to be aware of the threats and opportunities associated with the trendtoward increased pollution levels.Answer: True Page: 90 Level of difficulty: Medium96. Research studies have shown that consumers as a whole may not be willing to pay apremium for environmental benefits.Answer: True Page: 91 Level of difficulty: Easy97. Every new technology is a force for “creative destruction.”Answer: True Page: 92 Level of difficulty: Easy98. Virtual reality is giving consumers what they dream about.Answer: False Page: 93 Level of difficulty: Medium99. One of the major trends in the political-legal environment is the trend toward thegrowth of special interest groups.Answer: True Page: 93 Level of difficulty: Easy。
2024年1月浙江省首考普通高等学校招生全国统一考试英语试题一、阅读理解Tom Sawyer Play Is an AdventureA 35-minute hand-clapping, foot-stomping musical version of a Mark Twain favorite returns with this Tall Stacks festival.“Tom Sawyer: A River Adventure” has all the good stuff, including the fence painting, the graveyard, the island and the cave. It is adapted by Joe McDonough, with music by David Kisor. That’s the local stage writing team that creates many of the Children’s Theatre of Cincinnati’s original musicals, along with the holiday family musicals at Ensemble Theatre.This year Nathan Turner of Burlington is Tom Sawyer, and Robbie McMath of Fort Mitchell is Huck Finn.Tumer, a 10th-grader at School for Creative and Performing Arts, is a familiar presence on Cincinnati’s stages. He is a star act or of Children’s Theatre, having played leading roles in “The Legend of Sleepy Hollow” and “The Wizard of Oz,” and is fresh from Jersey Production “Ragtime”.McMath is a junior at Beechwood High School. He was in the cast of “Tom Sawyer” when it was first performed and is a Children’s Theatre regular, with five shows to his credit. This summer he attended Kentucky’s Governor’s School for the Arts in Musical Theatre.Note to teachers: Children’s Theatre has a study guide demonstrating how math and science can be taught through “Tom Sawyer.” For downloadable lessons, visit the official website of Children’s Theatre.1.Who wrote the music for “Tom Sawyer: A River Adventure”?A.David Kisor.B.Joe McDonough.C.Nathan Turner.D.Robbie McMath.2.What can we learn about the two actors?A.They study in the same school.B.They worked together in ”Ragtime“.C.They are experienced on stage.D.They became friends ten years ago.3.What does Children’s Theatre provide for teachers?A.Research funding.B.Training opportunities.C.Technical support.D.Educational resources.【答案】1.A 2.C 3.D【解析】1.根据第二段中的“It is adapted by Joe McDonough, with music by David Kisor.(本剧由乔·麦克多诺改编,大卫·基索作曲。
2025年全国大学英语CET四级考试复习试题及解答参考一、写作(15分)Part I Writing (30 points)Directions: For this part, you are allowed 30 minutes to write a short essay on the topic “The Impact of Artificial Intelligence on Daily Life.” You should start your essay with a brief introduction to the topic, then give specific examples to illustrate your point, and finally, provide a conclusion with your personal view. Your essay should be about 120 to 150 words but no less than 100 words.Writing Sample:The advent of artificial intelligence (AI) has revolutionized our daily lives in numerous ways. From smart homes to advanced medical diagnosis, AI has become an integral part of modern society.In smart homes, AI systems like voice assistants and smart security cameras enhance our convenience and safety. These systems learn from our habits and preferences, making our homes more comfortable and efficient. Moreover, in the healthcare sector, AI algorithms are being used to analyze medical images and identify potential diseases at an early stage, which can significantly improvepatient outcomes.However, the rise of AI also brings challenges. For example, job displacement is a major concern, as AI can perform certain tasks more efficiently than humans. Additionally, there are ethical questions about privacy, data security, and the potential misuse of AI technology.In conclusion, while AI has brought substantial benefits to our daily lives, we must also address its challenges to ensure a balanced and ethical integration of AI into our society.Writing Analysis:•Introduction: The essay starts with a clear introduction to the topic of AI and its impact on daily life, providing a broad perspective.•Body Paragraphs: The body of the essay presents two distinct impacts of AI:•The positive impact of AI in smart homes and healthcare.•The negative impacts of job displacement and ethical concerns.•Conclusion: The essay concludes with a balanced view, acknowledging both the benefits and challenges of AI, and emphasizing the need for ethical considerations.•Structure and Coherence: The essay has a clear structure and is well-organized, making the flow of ideas easy to follow.•Length: The essay meets the required word count, with 120 words, demonstrating the writer’s ability to convey the main points concisely.二、听力理解-短篇新闻(选择题,共7分)第一题News:In recent years, global attention has been drawn to the rapid development of electric vehicles (EVs). According to a recent report by the International Energy Agency (IEA), the number of electric vehicles on the roads worldwide reached 13 million in 2021, up from just 2 million in 2015. The report also indicates that by 2030, the number of electric vehicles is expected to surpass 145 million.Question 1:What has the number of electric vehicles on the roads reached as of 2021 according to the recent report by the IEA?A) 1 millionB) 13 millionC) 2 millionAnswer: BQuestion 2:How many years is it mentioned from 2015 to 2021 in the report?A) 5 yearsB) 6 yearsC) 7 yearsAnswer: BQuestion 3:What is the expected number of electric vehicles by 2030 according to the report?A) 13 millionB) 2 millionC) 145 millionAnswer: C第二题News Item 1:A new study reveals that the global use of electric scooters has increased significantly in recent years. These scooters are becoming a popular form of transportation in cities around the world. However, the study also highlights the environmental and safety concerns associated with the rapid growth in electric scooter usage.Cities are faced with the challenge of managing the increased demand for parking spaces, as well as the potential risks of accidents involving these scooters. Improved infrastructure and regulations are being considered to address these issues.Questions:1、What is the primary topic of the news item?A. The decline of traditional scootersB. The environmental impact of electric scootersC. The safety concerns of using electric scootersD. The rise in global use of electric scooters2、“These scooters are becoming a popular form of transportation in cities around the world.” Which of the following is true regarding the use of electric scooters?A. They are only popular in developed countries.B. They have no environmental impact.C. They are causing a decrease in car usage.D. They have become a common mode of transportation globally.3、“Improved infrastructure and regulations are being considered to address these issues.” What is the implied issue that needs to be addressed?A. The overuse of public transportation.B. The need for more parking spaces for cars.C. The decline in bicycle usage.D. The potential safety risks and management challenges posed by electric scooters.Answers:1.D2.D3.D三、听力理解-长对话(选择题,共8分)First QuestionConversationA: Hey, Sarah! Did you finish listening to the podcast this morning?B: Yeah, I did. It was quite fascinating. Have you checked the transcript on their webpage?A: Not yet. I plan to review what we heard today after work. By the way, I was thinking it would be nice to form a study circle this semester.B: That sounds like a good idea. Could you host a meeting this weekend?A: Sure, I can. I’ll prepare some questio ns for us to discuss, and you can bring in your notes. It’ll make our learning more productive.B: Great! Should we stick to the topics in the podcast or choose something else?A: Let’s talk about the topics in the podcast first. That way, it’ll help us understand the context better.B: Sounds perfect. I have a couple of questions for you. How long have you been listening to podcasts?A: Since about a year now. I find it’s a great way to learn English while doing something productive.B: I agree. What’s your favorite podcast?A: Hmm, I really like “The Economist Briefing.” It covers current events and history, which are topics I find interesting.B: Nice choice. I’m a fan of “TED Talks Daily.” It’s a bit different from “The Economist Briefing” but still educational.A: That’s true. We can switch up the topics as we like. What are youstudying?B: I’m majoring in international relations. The podcast really helps me get more insights into what I’m studying.A: That’s awesome. What about yo ur plans for the future?B: I hope to travel around Europe for my study abroad program next year, so I’m trying to learn more European languages. It would be a great opportunity to practice my English as well.A: That sounds exciting! This weekend, let’s m eet for an hour at my place, okay?B: Sure, that works for me.Q1. What is one reason Sarah likes listening to this podcast?a)To practice her English.b)To pass CET-4.c)To prepare for a trip.d)To learn her major subject.Answer: aQ2. How long has the speaker been listening to podcasts?a)One yearb)Two yearsc)Three yearsd)Half a yearAnswer: aQ3. Who does the speaker admire for choosing “TED Talks Daily”?a)Sarahb) A friendc) A professord)Another studentAnswer: aQ4. What will they do this weekend?a)Meet for an hour at the speaker’s place.b)Join a club activity.c)Go to a coffee shop.d)Attend a lecture on English.Answer: aQuestion 2:Why does Liu feel a bit nervous about the exam?A) He is preparing for it for too long.B) He hasn’t studied hard enough.C) His friends are also enrolled in CET-4 course classes.D) He needs to take a break soon.Answer: AQuestion 3:What advice does Amy give to Liu?A) Enroll in a CET-4 course class.B) Review the past papers.C) Study every day.D) Take a break.Answer: BQuestion 4:What can be inferred about Liu from the conversation?A) He is confident about the exam.B) He has been preparing for the exam for a long time.C) He is ready for the upcoming exam.D) He doesn’t like studying hard.Answer: B四、听力理解-听力篇章(选择题,共20分)第一题Directions: In this section, you will hear a passage. Listen carefully and answer the questions that follow.Passage:In today’s fast-paced digital world, it has become increasingly important for businesses to adopt technologies that improve their efficiency and customer satisfaction. The rise of artificial intelligence (AI) and machine learning (ML) has led to significant advancements in the field of business operations. Companies are now exploring various ways to integrate these technologies to enhance their processes.1、What aspect of business operations has seen significant advancements dueto AI and ML integration?A) Customer serviceB) LogisticsC) Financial managementD) A2、Why is the adoption of AI and ML technologies regarded as important for businesses?A) To reduce operational costsB) To improve customer satisfactionC) To increase operational efficiencyD) C3、Which of the following is NOT an example of how businesses can integrate AI and ML?A) Enhancing predictive analyticsB) Automating routine tasksC) Increasing manual data entryD) C第二题Passage 1The globalization of the economy has brought about significant changes in the world, and one area that has been heavily affected is the sports industry. In this essay, we will explore how globalization has impacted the sports industry,focusing on the growth of international sports events and the role of sports in global culture.1、Why is globalization having a profound impact on the sports industry?A) Because it allows sports to be practiced anywhere in the world.B) Because it has led to the growth of international sports events.C) Because it has changed the way people culture around the world.D) Because it has increased the salaries of professional athletes.2、Which of the following is not mentioned as a change brought about by globalization in the sports industry?A) The increase in cross-cultural interactions.B) The decline in local sports teams.C) The rise of regional sports leagues.D) The increase in global fan bases for various sports.3、What is the main argument made by the essay about the role of sports in global culture?A) Sports have a单一 focus on winning and losing.B) Sports help to foster national pride and identity.C) Sports have become a way for countries to cooperatively compete.D) Sports have lost their relevance due to increased commercialization.Answer Key:1、B2、BThird Question: Listening Comprehension - Listening PassagePassage:Welcome to our final research trip to India. We are in a small village in the state of Kerala, known for its rich cultural heritage and scenic beauty. The village, named Paravoor, has a population of approximately 15,000. Today, we focus on the local economy, which is largely dependent on farming, tourism, and small-scale industries. Currently, the village is facing several challenges, including water scarcity and lack of proper infrastructure. The government plans to implement a new irrigation project, which will provide a significant boost to the agricultural sector. In addition, the village is promoting eco-tourism to diversify its economic base. However, these initiatives require support and investment from both the government and the local community.1、Which of the following is NOT a challenge facing Paravoor Village?A、Water scarcityB、Lack of proper infrastructureC、Dependence on large-scale industriesD、C、2、What is the villagers’ plan to diversify their economic base?A、Developing new industriesB、Promoting eco-tourismC、Increasing agricultural production3、Which of the following is a potential benefit of the new irrigation project?A、It will help diversify the local economy.B、It will improve the infrastructure.C、It will provide water to the entire state.D、C、五、阅读理解-词汇理解(填空题,共5分)第一题Reading PassageAlice, receiving a ring, was extremely pleased. Her father promptly asked, “Have you made up your mind, my dear?” “Not quite,” said Alice ominously, stepping out of her ring. “But I will do so directly,” she declared.With a faint shiver of delight, the father experienced her civil but firm decision and then together they went to bet {?1?} her little servant girl a seventeen-pound horse. While they were thus occupied, the children saw their disagreement. The richest and keenest-uprisinguchepest, perfectly struck their fancy, and though their(Game) competitive position was, by no means, satisfactory, they had no objection to feel very sorry for the seller.1、civil A. 非常高兴的B. 礼貌的;文明的C. 无数的;无休止的D. 非常出色的2、competititive A. 竞争性的;竞赛的B. 嫉妒的;充满敌意的C. 令人厌恶的;讨厌的D. 无能的;不称职的3、keen A. 苦涩的;尖利的B. 明锐的;敏锐的C. 高兴的;愉快的D. 枯燥的;乏味的4、Ominous A. 不吉利的;不祥的B. 温和的;文雅的C. 欢快的;愉快的D. 兴奋的;激动的5、shiver A. 战栗;发抖B. 淡水C. 快速降雨D. 柔软的动物答案:1、B2、A3、B4、A5、A第二题Directions: Read the following text and complete the sentences below. There is one word or phrase missing in each sentence. Choose the most appropriate word or phrase from the options given below each sentence.Reading Passage:The rapid growth of technology has profoundly transformed our social fabric. From the emergence of the internet to the advent of smartphones, our daily interactions and work routines have been fundamentally altered. These technological advancements have not only facilitated instant communication but also expanded our access to information. However, this shift comes with its own set of challenges. For instance, while the internet provides a vast array of resources, it also exposes us to misinformation and the need for digital literacy is increasingly important. Moreover, the reliance on technology in the workplace has raised concerns about job security, as automation and artificial intelligence continue to evolve and change the nature of work.1、The word “fabric” (Line 1) most closely r elates to the following word: _[Options: a) fabric b) structure c) society d) clothing_]•1、c) society2、The phrase “emergence of the internet” (Line 3) can be replaced with which of the following: _[Options: a) the start of the internet b) the appearance of the internet c) the deployment of the internet d) the invention of the internet_]•2、b) the appearance of the internet3、The word “instant” (Line 4) is synonymous with: _[Options: a) immediate b) brief c) quick d) rapid_]•3、a) immediate4、The challenge mentioned in the passage regarding the internet is: _[Options: a) accessing information b) exposure to misinformation c) maintaining digital literacy d) balancing physical and digital interactions_]•4、b) exposure to misinformation5、The phrase “nature of work” (Line 7) refers to: _[Options: a) the quality of work b) the purpose of work c) the essence of work d) the value of work_]•5、c) the essence of work六、阅读理解-长篇阅读(选择题,共10分)第一题Reading Passage OneIt is widely accepted that education is of great importance to all people. However, there are many arguments on its necessity. While some people believe it is important to receive an education, others argue that education is not essential in one’s life.One of the main arguments for education is that it offers opportunities for personal development. With a good education, individuals can acquire the knowledge and skills needed to succeed in life. They can also improve theircritical thinking abilities and make informed decisions. Furthermore, an education can help individuals become more adaptable and flexible, enabling them to thrive in a changing world.Opponents of education argue that people can succeed without it. They cite examples of successful individuals who dropped out of school, such as Steve Jobs and比尔·盖茨. They believe that talent and opportunities can compensate for a lack of formal education.In the following passage, there are some statements about education. Choose the most suitable answer for each of the following questions.Questions 1-51、Which of the following is the main issue discussed in the reading passage?A. The benefits of educationB. The drawbacks of educationC. The importance of personal developmentD. The relationship between education and success2、What do the proponents of education believe about the role of education in personal development?A. Education hinders personal growth.B. Education does not contribute to skill acquisition.C. Education improves critical thinking and decision-making skills.D. Education makes individuals less adaptable.3、What is the main argument against education mentioned in the passage?A. Education limits personal development.B. Successful individuals can compensate for a lack of education.C. Education stifles creativity and innovation.D. Education takes away opportunities for self-betterment.4、Which of the following does the reading passage NOT mention as a reason for supporting education?A. Increased opportunities for employment.B. Enhanced critical thinking abilities.C. Improved adaptability and flexibility.D. Theernenment in international cooperation.5、What is the author’s attitude towards the debate on education?A. The author believes that education is unnecessary.B. The author supports the idea that education is essential for personal development.C. The author prefers talent and opportunities over education.D. The author is neutral on the issue of education.Answer Key:1、A2、C3、B4、D5、B第二题Passage:The concept of cloud computing has been discussed for decades, but it has only recently become a practical solution for businesses and individuals. Itall began with the idea of using the Internet as a transmission medium for data and applications. As technology advanced, the costs of storage and bandwidth became more affordable, making cloud computing a viable option. Today, cloud services range from simple file storage to complex application delivery, and they are accessible via web browsers or special software applications.The benefits of cloud computing are numerous. First, there is no need for costly hardware or maintenance. Cloud providers handle all the backend operations, ensuring that the service runs smoothly without requiring any intervention from users. Second, cloud services are highly scalable, meaning they can handle sudden increases in demand without additional investment. Third, cloud computing encourages collaboration and mobility, as users can access data and applications from anywhere with an internet connection. Finally, cloud services often come with robust security features, which are continuously updated, minimizing the risk of data breaches.However, cloud computing also comes with challenges. Security remains a significant concern, as data is stored remotely and vulnerable to cyberattacks. Additionally, there is the issue of data sovereignty, where data stored outside a country’s borders may be subject to the laws of that country. Furthermore, some companies may be hesitant to switch to cloud services due to the lack of control over their data, a common concern known as “control issues.”Questions:1、What is the main idea of the passage?a) The history of cloud computing.b) The benefits and challenges of cloud computing.c) The security concerns of cloud computing.d) The scalability of cloud computing.2、Why did cloud computing become practical recently?a) Because of the decreased costs of storage and bandwidth.b) Because of the widespread availability of the Internet.c) Because of the advancement in technology.d) Because of the decreasing demand for hardware.3、What are the benefits of cloud computing mentioned in the passage?a) No need for costly hardware, scalability, collaboration and mobility, and robust security features.b) High scalability, easy maintenance, and data sovereignty.c) Low costs, easy access, and increased data security.d) Remote access, data availability, and decreased bandwidth requirements.4、Which of the following is a challenge of cloud computing?a) The lack of mobility.b) The high costs of hardware.c) The security risks associated with remote data storage.d) The limited availability of web browsers.5、What is the common concern known as “control issues” mentioned in the passage?a) Users have no control over their data.b) Users have control over their data, but it is stored remotely.c) Data stored outside a country’s borders may be subject to the laws of that country.d) Users can choose to control their data through special software applications.Answers:1、b) The benefits and challenges of cloud computing.2、a) Because of the decreased costs of storage and bandwidth.3、a) No need for costly hardware, scalability, collaboration and mobility, and robust security features.4、c) The security risks associated with remote data storage.5、a) Users have no control over their data.七、阅读理解-仔细阅读(选择题,共20分)First Reading Comprehension Part AReading PassageThe following is a passage about the importance of exercise for mental health and productivity. This passage is followed by some questions to which the answers can be found in the passage.In today’s fast-paced world, stress has become an integral part of our lives. It’s essential to find ways to manage and reduce stress to maintain both our mental and physical health. One effective way to combat stress is through regularexercise. Research has consistently shown that physical activity can have a profound impact on our mental well-being and productivity.1.Physical activity has been found to:A) improve mental healthB) enhance productivityC) both improve mental health and enhance productivityD) have no effect on mental health2.The passage primarily discusses:A) the negative impact of stress on mental healthB) the benefits of exercise in reducing stressC) the effectiveness of various stress management techniquesD) the effects of different types of stress on the body3.It is mentioned that physical activity can have a “profound impact” on our:A) attention spanB) moodC) ability to sleepD) All of the above4.The word “integral” in the first paragraph most closely means:A) essentialB) foundationC) simpleD) occasional5.According to the passage, what is one effective way to combat stress?A) Avoiding situations that cause stressB) Seeking professional helpC) Regular physical activityD) Meditating for a few minutes dailyOptions:1、C2、B3、D4、A5、C第二题阅读下面的文章,然后回答问题。
What is the main purpose of the author's writing the passage?A. To introduce a new technology.B. To discuss the impact of social media.C. To analyze the causes of climate change.D. To promote a healthy lifestyle.The underlined word "it" in Paragraph 3 refers to _____.A. the bookB. the museumC. the exhibitionD. the artworkWhich of the following statements is TRUE according to the text?A. The new policy has been widely criticized.B. The project will be completed next year.C. The company has faced financial difficulties.D. The research has led to significant breakthroughs.The tone of the author in the last paragraph can be best described as _____.A. sarcasticB. optimisticC. pessimisticD. indifferentThe phrase "in the long run" in the passage means _____.A. eventuallyB. quicklyC. recentlyD. suddenlyWhat is the author's attitude towards online education?A. Supportive.B. Skeptical.C. Neutral.D. Disapproving.The main idea of the second paragraph is that _____.A. exercise is essential for physical healthB. mental health is as important as physical healthC. stress can be easily managedD. sleep patterns affect productivityThe word "ubiquitous" in the sentence "Smartphones have become ubiquitous in our daily lives" means _____.A. rareB. expensiveC. everywhereD. outdatedWhich of the following is NOT mentioned as a benefit of reading in the passage?A. Improving vocabulary.B. Reducing stress levels.C. Enhancing creativity.D. Increasing social activities.。
Endeca® Platform ServicesInstallation GuideContents Preface (7)About this guide (7)Who should use this guide (7)Conventions used in this book (7)Contacting Endeca Customer Support (8)Chapter 1:Installation for the Endeca Platform Services (9)Before you install (9)Overview of the Endeca Platform Services package (9)System requirements (10)Required Endeca components (10)Required reading (11)Installer file names (11)Installing the Endeca Platform Services (12)Windows installation procedures (12)UNIX installation procedures (19)Package contents and directory structure (21)After you install (23)Installing the Endeca Document Conversion Module (23)Installing the Corda software (24)Controlling the HTTP Service (28)What's next (28)General Endeca documentation (28)MDEX Engine documentation (28)IAP Workbench documentation (29)Platform Services documentation (29)Content Acquisition System (CAS) documentation (30)Rapid Application Development (RAD) Toolkits documentation (31)Documentation for other packages (32)Accessing documentation on EDeN (33)Endeca environment variables and port usage (33)Endeca environment variables (33)Endeca ports (35)Uninstalling Platform Services and the Document Conversion Module (37)Uninstalling Platform Services on Windows (37)Uninstalling Platform Services on UNIX (37)Uninstalling the Document Conversion Module on Windows (38)iiiCopyright and disclaimerProduct specifications are subject to change without notice and do not represent a commitment on the part of Endeca T echnologies, Inc.The software described in this document is furnished under a license agreement.The software may not be reverse engineered, decompiled, or otherwise manipulated for purposes of obtaining the source code.The software may be used or copied only in accordance with the terms of the license agreement. It is against the law to copy the software on any medium except as specifically allowed in the license agreement.No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the express written permission of Endeca T echnologies, Inc.Copyright © 2003-2008 Endeca T echnologies, Inc. All rights reserved. Printed in USA.Portions of this document and the software are subject to third-party rights, including:Corda PopChart® and Corda Builder™ Copyright © 1996-2005 Corda Technologies, Inc.Outside In® Search Export Copyright © 1991, 2007 Oracle.Rosette® Globalization Platform Copyright © 2003-2005 Basis T echnology Corp. All rights reserved. Teragram Language Identification Software Copyright © 1997-2005 Teragram Corporation. All rights reserved.TrademarksEndeca, the Endeca logo, Guided Navigation, MDEX Engine, Find/Analyze/Understand, Guided Summarization, Every Day Discovery, Find Analyze and Understand Information in Ways Never Before Possible, Endeca Latitude, Endeca Profind, Endeca Navigation Engine, and other Endeca product names referenced herein are registered trademarks or trademarks of Endeca Technologies, Inc. in the United States and other jurisdictions. All other product names, company names, marks, logos, and symbols are trademarks of their respective owners.The software may be covered by one or more of the following patents: US Patent 7035864, US Patent 7062483, US Patent 7325201, Australian Standard Patent 2001268095, Republic of Korea Patent 0797232, and European Patent EP1459206B1.Endeca Platform Services Installation Guide • October 2008 • Rev AvPrefaceThe Endeca® Information Access Platform is the foundation for building applications that help people understand complex information, fostering discovery and improving daily decision-making.These applications instantly summarize data and content for users -- even for unanticipated requests.The Guided Summarization™ experience leads to unexpected insights in millions of everyday decisions, increasing revenue, decreasing costs, and accelerating operations.The Endeca Information Access Platform is powered by MDEX Engine™ technology, a new class of database designed for exploring information, not managing transactions.The MDEX Engine is supported by:•The Information T ransformation Layer that unites and enriches disparate sources of informationwhile maintaining, augmenting, and even creating structures across the data and content.•An adaptive application component library that enables the rapid development of information access applications that automatically adapt to changes in the data and content.•A Web-based management suite that empowers managers to highlight the right information at the right time to end users through adaptive presentation rules and dynamic pages.These essential capabilities are delivered as an enterprise-class platform, with the scalability, reliability, and security that leading organizations demand.About this guideThis guide contains installation instructions for setting up Endeca Platform Services on Windows, Linux, and Solaris.Who should use this guideThis guide is intended for developers who are building applications using the Endeca Information Access Platform, as well as for system administrators managing the Endeca Information Access Platform on Windows, Solaris, or Linux.Note: Unless otherwise indicated, whenever this document specifies UNIX, it applies to Linuxand Solaris.Conventions used in this bookThis book uses the following typographical conventions:Code examples, inline references to code elements, file names, and user input are set in monospace font. In the case of long lines of code, or when inline monospace text occurs at the end of a line, the following symbol is used to show that the content continues on to the next line:¬When copying and pasting such examples, ensure that any occurrences of the symbol and thecorresponding line break are deleted and any remaining space is closed up.Contacting Endeca Customer SupportThe Endeca Support Center provides registered users with important information regarding Endeca software, implementation questions, product and solution help, training and professional services consultation as well as overall news and updates from Endeca.Y ou can contact Endeca Standard Customer Support through the Support section of the Endeca Developer Network (EDeN) at .Endeca ConfidentialEndeca ® Platform Services Installation Guide | Preface8Chapter 1Installation for the Endeca PlatformServicesThis section contains instructions for installing the Endeca Platform Services.Before you installThis section provides an overview of Endeca Platform Services, system requirements, and other information you need to know before installing.Overview of the Endeca Platform Services packageThe Endeca Platform Services package consists of a number of components that are used to build Endeca applications in support of the Endeca MDEX Engine.Two of the major components of the Endeca Platform Services package are the Endeca Information Transformation Layer (which includes Forge and other Data Foundry components) and the Endeca Application Controller (EAC).The following table lists the components that are available in the Platform Services installation package.Endeca ComponentDescriptionEndeca Application Controller (EAC)The EAC components consist of the EAC Central Server (whichcoordinates the command, control, and monitoring of all Agentsin an Endeca implementation), the EAC Agent (which controlsthe work of an Endeca implementation on a single host machine)and the EAC command-line utility, eaccmd.Consists of the Forge program and its related components, such Data Foundryas record adapters, record manipulators, dimension servers,property mappers, and so on.The Content Adapter DevelopmentKit (CADK) is also installed. Note that the Dgidx program is notpart of this package, but is available in the MDEX Engineinstallation package.Presentation and Logging APIsAPIs to the Endeca MDEX Engine and Log Server.The EndecaPresentation API must be installed on the machine that hosts theWeb/ application server.Description Endeca ComponentThe Log Server and Report Generator, which (together with theLogging API) make up the Endeca Logging and ReportingSystem.Logging and Reporting System Sample Endeca applications that include a sample DeveloperStudio project (including source data and instance configurationfiles), as well as JSP and .NET UI (front-end) applications.Reference Implementations A utility that lets you transfer your Endeca implementation froma staging environment that uses IAP Workbench to the productionenvironment that uses IAP Workbench.emgr_update The Endeca Job Control Daemon (JCD) and the ControlInterpreter.These components control and administer the EndecaEndeca Control SystemInformation Access Platform running on one or multiple hostmachines.The Endeca Control System should be installed onthe machine that hosts the Endeca Platform Services. Note thatthe Control System is deprecated, and is not installed by default.System requirementsThe Endeca Platform Services package has the following requirements:Supported operating systemsThe Endeca Platform Services software supports the following 64-bit operating systems running on servers with x64 or SPARC processor capabilities:•Red Hat Enterprise Linux AS (version 4 for x64) running on x64 processors •Red Hat Enterprise Linux ES (version 4 for x64) running on x64 processors •Red Hat Enterprise Linux Server (version 5 for x64) running on x64 processors •Red Hat Enterprise Linux Advanced Platform (version 5 for x64) running on x64 processors •Windows Server 2003 x64 running on x64 processors •Solaris 10 running on 64-bit SP ARC processors32-bit operating systems are not supported in a production environment. However, if you are only doing application development, you can use the 32-bit versions of Windows Server 2003 or Windows XP Professional.Hardware requirementsFor all supported OS platforms, an 80 GB hard drive is the minimum recommended size.Required Endeca componentsEndeca Platform Services does not require any other Endeca components to be previously installed.Y ou can install the Endeca MDEX Engine and Endeca IAP Workbench packages either before or after you install the Platform Services package.Note that the Endeca Document Conversion Module does require that Endeca Platform Services be installed.Endeca Confidential Endeca ® Platform Services Installation Guide Installation for the Endeca Platform Services | Before you install10Required readingBefore installing, Endeca recommends that you read the following documents for important information about the release.Quick Start GuideThe Endeca Quick Start Guide gives an overview of Endeca components and includes information about configuration scenarios. After installing all the components in your Endeca deployment, read this guide for information on verifying your installation.Y ou can download the Endeca Quick StartGuide from the Downloads section of the Endeca Developer Network (EDeN) at .Release NotesRefer to the Endeca release notes (README.txt ) for information about new features, changed features,and bug fixes for this release. After installation, release notes are also available in the following location:•Windows:%ENDECA_ROOT%\README.txt•UNIX:$ENDECA_ROOT/README.txtOn Windows, it is also available from Start > All Programs > Endeca > Platform Services > Release Notes .Note that you can also download the release notes from the Knowledge Base section of the Endeca Developer Network (EDeN) at .Migration GuideRefer to the Endeca Migration Guide for information about migrating your implementation from a previous version of Endeca software. After installation, the Endeca Migration Guide is also available in the following location:•Windows:%ENDECA_ROOT%\doc\MigrationGuide.pdf•UNIX:$ENDECA_ROOT/doc/MigrationGuide.pdfOn Windows, it is also available from Start > All Programs > Endeca > Platform Services > Migration Guide .Note that you can also download the Endeca Migration Guide from the Knowledge Base section of the Endeca Developer Network (EDeN) at .Installer file namesEndeca installation packages and executables are named according to a common convention.The installer file names follow the format:componentname _version _arch-OS For example:mdex_601_x86_64pc-linux.shThe componentname is the component identifier for the component being installed. In the example installer, mdex is the identifier for the Endeca MDEX Engine.11Installation for the Endeca Platform Services | Before you installThe version is the release version, without periods. In the example installer, 601 identifies MDEX Engine version 6.0.1.The arch-OS is the architecture and operating system identifier for the component being installed. In the example installer, x86_64pc-linux identifies the file as an installer for the 64-bit Linux platform.The following table lists the arch-OS identifiers and their platforms:Installation platform arch-OS identifierLinux running on 64-bit Intel processors x86_64pc-linuxSolaris running on 64-bit Sparc processors sparc_64-solarisWindows running on 64-bit Intel processors x86_64pc-win32Windows running on 32-bit Intel processors (for development use only)i86pc-win32Note: Not all platforms may be supported by all Endeca components. For more details aboutplatform support, see the System Requirements section of the appropriate Installation Guide.Installing the Endeca Platform ServicesThis section contains the Platform Services installation procedure and describes the contents of the installation directory.Windows installation proceduresThis section contains the Platform Services installation procedures for Windows.Creating a user for the Endeca services on WindowsY ou must run the Endeca services as a specified user, for which you can control permissions.Y ou are asked to provide information about this Endeca services user during the installation process on Windows. Endeca recommends that you create a user account called endeca that has the proper file and directory permissions to access all necessary files for your application, and that you set up your Endeca HTTP Service to run under this account. However, you can use any user that you prefer,as long as it meets these requirements.To create the user endeca:1.Ensure that you have administrator privileges on the local machine.2.From the Windows Control Panel, select Administrative Tools and then select ComputerManagement .3.In the tree pane of the Computer Management window, expand Local Users and Groups .4.Right-click Users and select New User .5.In the New User dialog box, do the following:a)Enter endeca for both the User name and the Full name.b)Optionally, enter a description.c)Set a password for user endeca .Installation for the Endeca Platform Services | Installing the Endeca Platform Services12Note:The user must have a non-blank password, because the installer will not accept ablank password for the services user.d)Uncheck User must change password at next logon .e)Select Password never expires .6.Click Create to create the new user, and then Close to exit the dialog box.7.Close the Computer Management window, but do not exit Administrative Tools.8.From Administrative T ools, do the following:a)Open Local Security Settings .b)Go to User Rights Assignments > Log on as a Service .c)Add user endeca to the list of users that can register a process as a service.d)Close the dialog box and exit Administrative T ools.9.Restart your computer to ensure that the changes take effect.Installing Platform Services on WindowsY ou install the Platform Services on Windows by using the installation wizard.Use the following prerequisites before installing:•Ensure that you have administrator privileges on the local machine.•The user name that is used to start the Endeca services must exist and have a non-blank password.•Close all running programs.To install the Endeca Platform Services on Windows:1.In your local environment, locate the Endeca Platform Services installation package that youdownloaded from the Endeca Developer Network (EDeN) site.The name of the installation file is as follows:•For 32-bit Windows:platformservices_601_i86pc-win32.exe •For 64-bit Windows:platformservices_601_x86_64pc-win32.exe2.Double-click the installer file to start the wizard.3.When the Endeca Platform Services Setup Wizard screen appears, click Next to begin theinstallation process.4.Read the copyright information and click Next .5.In the Endeca License Agreement screen, select I accept the terms in the license agreementand then click Next .6.In the Destination Folder screen, select an installation location or accept the defaultC:\Endeca\PlatformServices installation directory.Keep in mind that you cannot install the Endeca software in a directory with spaces in its name.Note: If you do not use the default location, and you are installing more than one Endecaproduct on the same machine, ensure that you install each product to a separate location.7.In the Custom Setup screen, select the program features you want to install, then click Next . Notethat some items have sub-items. By default, all of the items are selected for installation.13Installation for the Endeca Platform Services | Installing the Endeca Platform ServicesContents FeatureData Foundry components, such as Forge and theCADKEndeca Platform Services EAC Central Server and AgentEndeca Application Controller Server and AgentEAC Agent only Endeca Application Controller AgentEAC command-line utility (eaccmd)Endeca Application Controller UtilityJava and .NET APIs for Endeca MDEX Engine andLog ServerEndeca Presentation and Logging APIs Endeca Log Server and Report GeneratorEndeca logging and reporting components Sample source data project and JSP/.NET UI references Endeca Reference ImplementationThis guide, Migration Guide , Licensing Guide DocumentationEndeca Control Interpreter (not installed by default)Endeca Control System The wizard displays the required disk space for the selected features.The entire Platform Services installation requires approximately 370 MB of disk space.8.In the Endeca Services Information screen, enter the user name, domain name, and passwordto use when launching the Endeca HTTP Service, then click Next .This user must already exist. For details on creating the user account, see the previous topic,"Creating a user for the Endeca services on Windows".9.In the Endeca Application Controller Service Information screen, enter the following informationand then click Next .•The port on which the Endeca HTTP Service will listen (default is 8888).•The shutdown port of the Endeca HTTP Service (default is 8090).•The location (an absolute path) of the MDEX Engine root directory (for example,C:\Endeca\MDEX\6.0.1). Note that the installer does not verify the existence of the directory;this allows you to install the Platform Services package before the MDEX Engine package.10.In the Ready to Install the Program screen, confirm the settings you selected in previous screens,then click Install .11.When the installation is complete, click Finish to exit the wizard.12.When you exit the wizard, you are prompted to restart your computer.Y ou may do so now, or waituntil later.Note that you must restart your computer to set the Endeca environment variables correctly and to start the Endeca HTTP Service.After the computer restarts, the Endeca environment variables (such as ENDECA_ROOT ) are available for use and the Endeca HTTP Service starts up.Depending on your application needs, you may have to perform two post-installation tasks:•If you did not specify the MDEX Engine root directory (at Step 9), the com.endeca.mdexRoot setting (in the EAC eac.properties configuration file) will have a blank value.The file is located in the %ENDECA_CONF%\conf directory. If you later install the MDEX Engine on your system, you must edit the file and add the absolute path of the MDEX Engine root directory in the setting. For more information on this file, see the Endeca Application Controller Guide .Installation for the Endeca Platform Services | Installing the Endeca Platform Services14•If you have installed the Endeca Control System, you should manually add ENDECA_MDEX_ROOT as a system environment variable so that the JCD Service starts with this variable in its environment.Y ou can add this variable before or after you install the MDEX Engine package. For details on adding this environment variable and on starting the JCD Service, see the Endeca Control System Guide.Configuring silent installation on WindowsThe silent installer for Windows reads the necessary input from command-line properties.Silent installations are installations that use the /s switch to run without a user interface.The responses to the Windows installer prompts are supplied with command-line properties and provide the same answers that an interactive user would provide.The basic syntax for a silent installation on Windows is:platformservices_601_x86_64pc-win32.exe /s /v" /qn endeca_properties "The Endeca properties are described below. Note that this is the asynchronous version.To run the command synchronously, preface the installer executable with the start /wait command (especially useful in automated scripts).If you want the installer to create a log, use the /l switch as part of the /v arguments; for example:/s /v"/l* install.log /qn endeca_properties "Note that the Endeca HTTP Service, when installed, does not start automatically, though it is set to automatically start on system startup (it will be started upon the next reboot).Endeca PropertiesThe following properties, when passed to the silent installer, provide configuration information for the installation.MeaningEndeca Property Name Required. Specifies the absolute path to the directory toinstall Platform Services (e.g.,INSTALLDIRC:\Endeca\PlatformServices).The path should be inescaped quotes. Keep in mind that you cannot install theEndeca software in a directory with spaces in its name.Note: If you do not use the default location, andyou are installing more than one Endeca producton the same machine, ensure that you install eachproduct to a separate location.Required for features that install the HTTP Service.Theuser name to use when launching the Endeca HTTPENDECA_USER_NAME Service. Note that the user must already exist and thename should be specified in escaped quotes.Required if the user name is specified.The password forthe Endeca HTTP Service user. Note that the passwordshould be in escaped quotes.ENDECA_USER_PASSWORD15Installation for the Endeca Platform Services | Installing the Endeca Platform ServicesMeaningEndeca Property Name Required if the user name is specified. Confirms thepassword for the Endeca HTTP Service user. Note thatthe password should be in escaped quotes.ENDECA_PASSWORD_CONFIRM Optional.The Windows domain for the Endeca HTTPService user. Note that the domain name should be in_USERDOMAIN escaped quotes.The default is the domain the currentuser is logged in to.Optional.The port on which the Endeca HTTP Servicelistens.The default is 8888.ETOOLS_HTTP_PORT Optional.The shutdown port for the Endeca HTTP Service.The default is 8090.ETOOLS_SERVER_PORT Optional.The port on which the Endeca JCD Servicelistens.This service is not installed by default.The defaultis 8088.JCD_PORT Optional. Specifies which features to install (see the nextsection for the feature names). If omitted, all features(except the Endeca Control System) are installed.ADDLOCALEndeca Installable FeaturesThe ADDLOCAL property specifies which Endeca features to install.The features correspond to the list on the Custom Setup screen in the interactive installer. If the ADDLOCAL property is omitted, all features are installed, except for the Endeca Control System.Y ou can specify multiple features by using a comma-delimited list.MeaningProperty Value Data Foundry directories and components, includingForge and the CADK. Use IAP_X64_Bin for the 64-bitEndeca_Platform_Services •IAP_X64_Bin version of the binaries and IAP_X86_Bin for the 32-bit•IAP_X86_Binversion. Note that Forge is a 32-bit program regardlessof the specified feature.EAC Central Server and AgentEndeca_Application_Controller_Serv¬erEAC Agent onlyEndeca_Application_Con¬troller_Agent EAC command-line utility (eaccmd)Endeca_Application_Controller_Util¬ityEndeca Log Server and Report Generator Endeca_Logging_and_ReportAPIs for Endeca MDEX Engine and Log Server. Use Java_APIs for the Java version of the APIs and/or NET_APIs for the .NET version.Endeca_Presentation_and_Log¬ging_APIs•Java_APIs•NET_APIs Installation for the Endeca Platform Services | Installing the Endeca Platform Services16Meaning Property ValueSample references, consisting of the sample wine project with source data and JSP and .NET UI front-end references.Endeca_Reference_Implementation•Sample_data•JAVA_jsp_Implementation•_Implementation Endeca Control Interpreter. Use JCD_X64_Bin for the 64-bit version of the binaries and JCD_X86_Bin for the 32-bit versions.Endeca_Control_System•JCD_X64_Bin•JCD_X86_Bin This guide, Migration Guide , Licensing Guide Endeca_DocumentationCommon ConfigurationsThe following are some configurations for building specific types of servers. Note that the command examples are wrapped for ease of reading.Development Server:•Installs the entire Platform Services package (except for the Endeca Control System)The command line would be similar to this example, which omits the ADDLOCAL property:platformservices_601_x86_64pc-win32.exe /s /v"/qn INSTALLDIR=\"C:\Endeca\PlatformServices\"ENDECA_USER_NAME=\"endeca\" ENDECA_USER_PASSWORD=\"endeca\"ENDECA_PASSWORD_CONFIRM=\"endeca\"ETOOLS_HTTP_PORT=8888 ETOOLS_SERVER_PORT=8090"MDEX Engine Server:•EAC Agent•EAC Utility•Presentation and Logging APIsThe command line is identical as the Development Server, with the addition of this ADDLOCAL property:ADDLOCAL=Endeca_Application_Controller_Agent,Endeca_Application_Controller_Utility,Endeca_Presentation_and_Logging_APIs,Java_APIs,NET_APIsITL Server:•EAC Server •EAC Utility •Forge (including the CADK)•Reference implementations •Log Server and Report GeneratorThe command line is identical as the Development Server, with the addition of this ADDLOCAL property:ADDLOCAL=Endeca_Application_Controller_Server,Endeca_Application_Controller_Utility,Endeca_Platform_Services,IAP_X64_Bin,Endeca_Reference_Implementation,Sample_data,JAVA_jsp_Implementation,_Implementation,Endeca_Presentation_and_Logging_APIs,Java_APIs,NET_APIs17Installation for the Endeca Platform Services | Installing the Endeca Platform Services。
how to interpret and evaluateinformation 英文解释Here is an essay on the topic "How to Interpret and Evaluate Information" with more than 1,000 words, written in English without any additional titles or unnecessary punctuation marks.Interpreting and evaluating information is a critical skill in today's information-rich world. With the vast amount of data and content available at our fingertips, it is essential to develop the ability to discern the reliability, relevance, and significance of the information we encounter. This essay will explore the key steps and considerations involved in effectively interpreting and evaluating information.The first step in interpreting and evaluating information is to understand the source. It is important to consider the credibility and authority of the source providing the information. Is the source a reputable and well-established organization, a respected expert in the field, or a peer-reviewed academic publication? Alternatively, is the source an unknown or unverified individual, a partisan organization, or a website with a clear agenda? Assessing thesource's credibility can provide valuable insight into the reliability and objectivity of the information being presented.In addition to the source, it is crucial to consider the context in which the information is presented. What is the purpose of the information? Is it intended to inform, persuade, or entertain? Understanding the context can help identify any potential biases or agendas that maybe influencing the way the information is presented. It is also important to consider the timeliness of the information – is it up-to-date and reflective of the current state of knowledge, or is it outdated and potentially no longer relevant?Another key aspect of interpreting and evaluating information is to examine the evidence and reasoning used to support the claims or conclusions. Is the information backed by credible data, research studies, or expert opinions? Are the arguments logically sound and well-reasoned, or are they relying on fallacies, anecdotal evidence, or emotional appeals? Carefully scrutinizing the evidence and the logic behind the information can help determine its validity and reliability.It is also important to consider the perspective and potential biasesof the information source. Every individual and organization has their own unique experiences, beliefs, and agendas that can shape the way they interpret and present information. By recognizing and accounting for these biases, we can better understand the underlyingmotivations and limitations of the information being provided.Furthermore, it is essential to compare and contrast multiple sources of information on a given topic. By examining different perspectives and approaches, we can gain a more comprehensive and balanced understanding of the issue at hand. This process of cross-referencing and critical analysis can help us identify discrepancies, inconsistencies, or potential misinformation, and ultimately arrive at a more informed and well-rounded conclusion.In addition to evaluating the content and sources of information, it is also important to consider the broader context and implications of the information. How does the information fit into the larger societal, political, or cultural landscape? What are the potential consequences, both positive and negative, of accepting or rejecting the information? By considering the broader context, we can better assess the significance and relevance of the information to our own lives and decision-making.Finally, it is crucial to maintain a critical and open-minded approach to interpreting and evaluating information. We should be willing to challenge our own assumptions and biases, and remain receptive to new evidence and perspectives that may challenge our existing beliefs. This process of continuous learning and re-evaluation is essential for developing a nuanced and informed understanding ofthe world around us.In conclusion, interpreting and evaluating information is a multifaceted and complex process that requires a combination of critical thinking, analytical skills, and a willingness to engage with diverse perspectives. By considering the source, context, evidence, biases, and broader implications of the information we encounter, we can develop the necessary tools to navigate the vast and often overwhelming landscape of information in the digital age. Ultimately, the ability to effectively interpret and evaluate information is a crucial skill for making informed decisions, forming well-reasoned opinions, and engaging in meaningful discourse on the pressing issues of our time.。
PIVOT:An adaptive information discovery framework forcomputational gridsGuiyi Wei a ,Yun Ling a ,Athanasios V.Vasilakos b ,*,Bin Xiao c ,Yao Zheng da College of Computer Science and Information Engineering,Zhejiang Gongshang University,Hangzhou,PR ChinabDepartment of Computer and Telecommunications Engineering,University of Western Macedonia,Kozani,Greecec Department of Computing,Hong Kong Polytechnic University,Hong Kong,PR Chinad School of Aeronautics and Astronautics,Zhejiang University,Hangzhou,PR China a r t i c le i nf o Article history:Received 22November 2008Received in revised form 21July 2010Accepted 26July 2010Keywords:Computational grid Information discovery Resource scheduling Adaptiveness Scalability Distributed cooperationa b s t r a c tIn a traditional computational grid environment,the owners of resources usually provideinformation about their resources extracted by pre-configured information services orweb services.However,such information is not sufficient for the scheduler in the high-performance distributed computing.To solve this problem,we propose a scalable gridinformation service framework,named PIVOT (adaPtive Information discoVery framewOrkfor compuTational grid).By using deadline-constrained flooding collector disseminationand P2P-like information collection schemes,PIVOT provides an active mechanism tocollect application-specific resource information.In particular,PIVOT provides a resourceinformation service for application-specific schedulers.The best-effort performance onoverhead traffic and communication latency during information discovery is guaranteedby two new distributed cooperative algorithms.The experimental results in the simula-tions and real computational grid platform demonstrate that PIVOT has a high level ofadaptability for application-specific resource information discovery,and also improvesthe accuracy of resource allocation and the efficiency of executing parallel tasks in tradi-tional information services.Ó2010Elsevier Inc.All rights reserved.1.IntroductionAs the grid becomes a viable and cheap high-performance computing tool,more and more experimental platforms in sci-entific and engineering domains are transferred to computational grid environments.However,it is hard for a grid comput-ing system to achieve the same performance as that of the supercomputer with the same computing capability.In practice,most across-organization grid systems are unable to provide good QoS (quality-of-service)for large-scale distributed com-putational tasks.There are two main reasons for this issue:resources allocation and task scheduling.Resources allocation:In grid systems,the across-organization resources are loosely,and most of them are autonomously controlled by their owners.However,the state of the resources,such as the task queue,free memory and communication capacity,is highly dynamic.This conflict results a challenge to allocate the across-organization resources to grid tasks that have diverse QoS requirements.0020-0255/$-see front matter Ó2010Elsevier Inc.All rights reserved.doi:10.1016/j.ins.2010.07.022*Corresponding author.E-mail addresses:weigy@ (G.Wei),yling@ (Y.Ling),vasilako@ath.forthnet.gr (A.V.Vasilakos),csbxiao@.hk (B.Xiao),yao.zheng@ (Y.Zheng).4544G.Wei et al./Information Sciences180(2010)4543–4556Task scheduling:Due to the requirement of more resource information,scheduling multiple dependent subtasks of the same parallel grid task on the loosely organized resources is more challenging than scheduling single or multiple inde-pendent tasks.Till now,many scheduling algorithms,general-purpose or specialized,have been proposed to resolve the problem;and most of them are based on the assumption that all needed resource information is given.However,this assumption cannot hold in the across-organization grid system as described above.With regard to a scheduling algorithm in the grid system,we should know what resource information it needs,how much information it needs,and how it obtains the information from the dynamic resource network.The answers to these ques-tions are determined by the requirements of the task and the underlying scheduling algorithm.However,the requirements of tasks in the grid system are generally diverse.For example,computation-intensive applications,such as Monte-Carlo sim-ulations,involve high-speed computing power;I/O-intensive applications,such as distributed data sharing systems,involve large-capacity storage;while communication-intensive applications,such as computationalfluid dynamic simulations,in-volve a large bandwidth and low latency.Thus,an effective resource monitoring framework and efficient resource informa-tion discovery approaches are very important for a grid system.As we know,information services in most current grid computing middlewares,such as Globus[7],Legion[14],UNICORE [31],SGE[11],Condor[8],GLORIAD[12],PRAGMA[39],and CROWN[18],work in a passive mode and provide unified re-source information to the schedulers or resource brokers.The owner autonomously determines what resource information is to be shared,and then periodically sends this information to the schedulers or brokers who are involved.For the most part, the information is static and pre-configured.Hence,it is not sufficient for scheduling algorithms to get optimal results.In this paper,we propose an adaPtive Information discoVery framewOrk for compuTational grid(PIVOT)that can actively discover customized resource information from a dynamic resource network.As part of our project,PIVOT is implemented in our grid environment MASSIVE(Multidisciplinary ApplicationS-oriented SImulation and Visualization Environment)[36].It utilizes grid security infrastructure(GSI)to securely control over autonomous resources.Our experiments demonstrate that PIVOT improves the scalability and adaptability of grid information services and the effectiveness of resource utilization in traditional information services.Our contribution can be summarized as follows:1.PIVOT provides insight into the design of effective methods of monitoring grid resources and information discovery.2.The across-organization resource network in PIVOT is treated as a dynamic random graph.Based on a spanning tree of thegraph,customized information collectors are disseminated and the needed resource information is sent back.3.Two distributed algorithms are designed to achieve a best-effort performance on overhead traffic and communicationlatency in the information collection process.4.PIVOT improves the effectiveness and efficiency of scheduling algorithms for parallel tasks in computational grids.This is,to the best of our knowledge,thefirst attempt in the literature to solve the problem of dynamic information discovery using the active mode in grid computing.5.By applying the BIP(Binary Integer Programming)model to schedule communication-intensive parallel grid tasks,wedevelop a deadline and budget constrained cost-time optimization algorithm for scheduling parallel and dependent tasks.2.Related workLarge-scale grid applications are usually required to manage large amounts of related rmation services of grid systems are used to address the challenging problems of announcing and discovering resources.Monitoring and Data Service(MDS version2)was used in most grid systems such as LCG(Large hadron collider Comput-ing Grid)[2],OSG(Open Science Grid)[17],TeraGrid[21],and NorduGrid[20],although it has been deprecated by Globus Alliance.Globus MDS4[25]does not run information providers on demand,but only atfixed intervals.Furthermore,it needs a central index server to make customized indexes and periodic caching.One of its well-known implementations is TeraGrid. However,both MDS2and MDS4suffer from problems of scalability and stability in their information cache mechanism.Similar to MDS,BDII(Berkeley Database Information Index)was introduced into the LCG project to replace MDS in the front end of information service.BDII uses a registry of sites and caches information every two minutes.The main shortcom-ing of BDII is that the index size of a site’s BDII grows too quickly while queries in other sites’BDIIs increase.To improve the information retrieval performance,Sun et al.[34]proposed a Resource Category Tree(RCT),which organizes resources based on their primary characteristics.RCT adopts a structure of a distributed AVL tree,and the method that each node represents a specific range of primary attribute values.To address the problems in uncooperative distributed information retrieval environments,Paltoglou[27]proposed an integral-based source selection algorithm.The algorithm models each source as a plot.Then,it uses the relevance score and the intra-collection position of the sampled documents by referring to a centralized sample index.RGMA(Relational Grid Monitoring Architecture)[5]uses a relational database to store information from diverse ers can retrieve information via SQL queries.Similarly,NAREGI(National Research Grid Initiative)[16]uses an object manager to distribute information about computing rmation is aggregated to a relational database.It is implemented as a grid ser-vice by the use of the Globus service OGSA–DAI(Open Grid Services Architecture-Data Access and Integration).However, when using a database,the connection time and overhead workload are excessive during the retrieval process.In addition,aG.Wei et al./Information Sciences180(2010)4543–45564545 central server(database server[5,16]or information index server[27])is needed.Thefixed aggregation point(central server) constrains the scalability of the information service.It is also difficult to handle the conditions of large numbers of tasks simultaneously.To provide distributed information service,Grimoires(Grid RegIstry with Metadata Oriented Interface:Robustness,Effi-ciency,Security)[13]and gLite[9]use web service framework to implement information discovery and retrieval.Service (resource information)discovery issues are compounded by a variety of different types of service directories.By using web service framework,Pastore[19,28]proposed UDDI(Universal Description,Discovery and Integration)solutions by means of a UDDI registry deployed in an existing Globus-based grid.Pastore took into consideration the benefit of using pri-vate and secure UDDI nodes in grid environments for indexing,searching,and retrieving services.However,the web service framework does not support dynamical and variational information demands.To improve the scalability of information service,the peer-to-peer(P2P)technology is introduced into grid resource infor-mation discovery[23,30,35].Cai and Hwang[3]proposed a scalable grid monitoring architecture that builds distributed aggregation trees(DAT).By leveraging Chord topology and routing mechanisms[33],the DAT trees are implicitly con-structed from native Chord routing paths without the need to maintain membership.Marzolla et al.[24]proposed two P2P systems:tree-shaped and two-level hierarchical networks.Both systems are based on routing index.Shen[32]proposed a P2P-based intelligent resource discovery(PIRD)mechanism that weaves all attributes into a set of indices by using locality sensitive hashing,and then maps the indices to a structured P2P overlay.PIRD incorporates the Lempel–Ziv–Welch algo-rithm to compress attribute information for higher efficiency.Some researchers also evaluate the performance of informa-tion discovery mechanisms.Paunovski[29]evaluates the performance of a selective discovery mechanism in a distributed bio-inspired multi-agent community.In[29],the open distributed network is treated as a fully decentralized biologically inspired environment.The combination and aggregation of information are also studied in distributed environments to re-duce the traffic of information discovery[10].After analyzing the state-of-the-art studies in grid information service,wefind that above proposed methods are passive for resource information demanders.Since various scheduling algorithms are adopted by applications in multidisciplinary4546G.Wei et al./Information Sciences180(2010)4543–4556services.The architecture of MASSIVE is constructed with multiple layers,as illustrated in Fig.1.The bottom layer is the hardware that includes various heterogeneous distributed resources.The second layer is the security layer,GSI.The third layer has the basic grid services provided by the grid middle-ware.The fourth layer contains services that are the visually re-capsulated services of the third layer.PIVOT resides in the third layer in order to provide scalable information services. Thefifth layer consists of composite services that integrate application-oriented libraries.The top layer contains three envi-ronments that respond to the steps of multidisciplinary problem solving.MASSIVE supports the application-oriented service composition.It provides(1)the functionality of remote execution and monitoring for grid users;(2)some specialized services for the CFD and CSM applications,such as collaborative visualization, exploration,and analysis of the numerical results;(3)an interface to a meshing service;(4)the visualization capability of the meshes that are created.To minimize the risks of the remote execution of simulations,MASSIVE makes it possible for the user to keep the codes and data in a local machine,and to transfer them to a remote machine only when the time is right for execution.After the execution,all of the codes and data are erased from the remote site[22].4.PIVOT information discovery framework4.1.Problem modelingMost wide-area distributed systems contain a variety of networked devices including computer-based ones(CPU,memory, disk),network components(hubs,routers,gateways)and specialized data sources(embedded devices,sensors,data-feeds).In a grid,all of the shared resources form an ad hoc overlay network for grid applications.Each shared resource provides grid ser-vice dynamically with guaranteed quality,although he can join and leave the network freely without violating the service pol-icy.Since no resource is privileged over any other resources,no hierarchy or centralized point of failure exists in this resource network.To optimize resource allocation and task scheduling on this resource network,grid users or resource brokers always need to collect the real-time information of the shared resources.In the context of a computational grid,the resource infor-mation usually needs to be customized by a demander or scheduler to fulfill application-specific requirements.For example, scheduling communication-bounded grid applications requires the collection of bandwidths and communication latency among resource nodes.The process of information collection is different from thefile block lookup in P2P networks and the data query in distributed storage/database systems.In general,the process of information collection consists of two steps:first, the customized information collector is disseminated(The collector is a program or query that can execute in multiple plat-forms and retrieves specialized resource information with a privacy guarantee mechanism);second,information is collected from the covered resource nodes.The main challenges of designing a collection mechanism include(1)provisioning scalability and adaptability of the resource information discovery on the resources network according to the users’requirements,and(2) supporting the measurable efficiency and cost of the overhead traffic and query/response latency.To model the problem,we denote N as the total number of the shared resources in the network,m as the number of actu-ally needed resources of the demander/scheduler,and n as the number of the covered resources of a collection,where N>n>m.In the context of a dynamic network,N is unknown to all resource nodes included the demander/scheduler. The demander/scheduler is one of the N resources.The parameter n and m is designated by the demander/scheduler,where m is irrelative to the process of information discovery.In traditional passive mechanisms of collecting information,such as the GIIS(Grid Index Information Service)of MDS and UDDI of Web Service technology,the overlay resource network is tree-structured.In this paper,PIVOT exploits a P2P-like collector dissemination and information collection scheme based on a random graph overlay(a decentralized,unstructured P2P network).Hence,it supports pure peer infrastructures.Since each resource node acts as a peer of a decentralized,unstructured P2P network,the intuitive resilience and decentralization en-hances the scalability of the PIVOT framework.The information collection algorithms for disseminating application-specific collector information can adaptively adjust the coverage of the collector by tuning the parameters hops-to-live(HTL)or the number of needed resources n.The HTL is used to limit the maximum number of hops,which is positively related to the latency of a collection.The performance of information collection keeps relatively constant,while shared resources join and leave the network dynamically.The collector(or query)dissemination begins from a random-selected start node.First,the collector(or query)is dissem-inated to the start node.Then,the covered nodes forward the collector to their neighbored nodes that have not been covered. This process continues until either n nodes are covered or the HTL limit is exceeded.Every deployed collector retrieves appli-cation-specific resource information and returns information back to the sending node.The information collection process looks similar to theflooding query/response of a decentralized P2P network.The main difference between them is that the information collection process of PIVOT will always be successful in obtaining the resource information from the covered resource nodes;however,a P2P query may fail to get a valuable response in a peer node that does not have the involved contents.Without loss of generality,we assume that covered resources do not leave the network during the procedures of information collection and task execution.This is guaranteed by the resource sharing policy.In addition,the coverage of P2Pflooding is restrained only by HTL,while information collection is limited by both HTL and n.To avoid multiple col-lections with same parameters from a demander covering relatively the same range of the resource network,a random-walk approach is designed to select the start point of a collectionflooding.In fact,the demander can save and reuse the start points of those historical collections that he appreciates.4.2.Overhead traffic and communication latencyTo evaluate the main metrics (overhead traffic and latency),we assume that:(1)resource nodes only have knowledge of their immediate neighbours;(2)the coverage of n nodes is an undirected random graph G (V ,E )with a maximum vertex de-gree d ,the order of this graph j V j =n ;and (3)the communication latency between a pair of neighboring nodes (one hop la-tency)is constant,denoted as l .We let T (n )denote the overhead traffic of the collection.There are four main types of traffic of a collection:(1)the col-lector disseminates from the demander to n nodes,denoted as T d (n );(2)the retrieved information on real-time resources is returned to the demander,denoted as T r (n );(3)each covered node broadcasts the covered state to its immediate neighbors,denoted as T b (n );and (4)the resource node sends the number of its uncovered neighbors back to the start node s and re-ceives the command from s to decide whether or not to continue flooding,denoted as T f (n ).Then,T (n )=T d (n )+T r (n )+T b (n )+T f (n ).Let B d denote the size of the collector and B m denote the sizes of the message in T b (n )and T f (n ).According to the spanning tree of the n covered nodes,T d (n )=(n À1)B d ,T b (n )’(nd Àn +1)B m ,and T f ðn Þ’2B m P v 2V 0height ðv Þ¼nB m P hÀ1i ¼1i 2i À1,whereV 0is the intermediate nodes set of the spanning tree and height (v )is the height of node v .Since information on all of the re-sources is isomorphic in a collection,the intermediate resources nodes can aggregate the information from its upstream nodes in the information return path to reduce the traffic T r (n ).In general,the resource information is of a relatively small size.We assume that the return traffic of all edges of the spanning tree derived from G (V ,E )are of approximately equal size or that their differences in size are negligible with respect to information aggregations in the intermediate nodes.We denote the information size B r .Then,T r (n )’j E j B r ’(n À1)B r .Therefore,T ðn Þ’ðn À1ÞB d þðn À1ÞB r þðnd Àn þ1ÞB m þnB mX h À1i ¼1i 2’n ðB d þB r ÞþndB m þ1þn Xh À1i ¼1i 2i À1Àn!B m ÀðB d þB r Þ:In addition,we let L (n )denote the latency of the collector’s dissemination of the n node discovery.Intuitively,L (n )is deter-mined by the maximum eccentricity of the start node,i.e.,the greatest distance or hops from an arbitrary covered node to the start node s .Let dist (v ,s )represent the number of hops from node v to s .Then,L (n )=l Á(2Ámax u 2V {dist (u ,s )}À1).The n nodes construct a d -ary spanning tree of G (V ,E )with root node s ,16deg (u )6d for all u 2V .With respect to graph theory,the height of the spanning tree max u 2V {dist (u ,s )}is lower-bounded by h low =d log d n +log d (d À1)À1e .According to the de-mander’s latency deadline (HTL),denoted as H ,the height of the spanning tree is upper-bounded by h up =H .Thus,l Áh low 6L (n )6l Áh up .In practice,the two constraint conditions may lead to the following conflicts:(1)the HTL is too small to guarantee that the collection can cover n nodes before the number of hops of the query exceeds the HTL,and (2)the HTL is too large,i.e.,the maximum number of hops is still far from HTL when the collection has covered n nodes.The collection is considered to have failed when the former case occurs.For the latter case,flooding hops should be controlled accurately and the hops h must satisfy P hÀ1i ¼0j V i j <n 6P h i ¼0j V i j ,where V i is the set of nodes with a distance of i hops to the start node s .rmation collection algorithmsIn a collection,the start node and other n À1nodes cooperate to achieve the best effort performance of overhead and latency.The start node (1)accepts the requirements (or original parameters)from the demander/scheduler,(2)disseminates and deploys the collector,and (3)collects and returns the aggregated resources information back to the demander/scheduler with the cooperation of other resource nodes.The Distributed Cooperative Algorithm for collecting resource information in Start node (DCA-S)is described with descriptive pseudo-codes in Table 1.The normal node accepts the collector and param-eters from the node that precedes it,and returns aggregated information to that node.The Distributed Cooperative Algo-rithm in the Normal nodes (DCA-N)is described in Table 2.Since the start node is randomly chosen by the resource demander/scheduler,each resource node in the grid should have the two algorithms.5.An exampleA simple computational grid,whose hypothetic topology is illustrated in Fig.2,is used as an example.In Fig.2,the vertex represents a resource,and the edge represents the bidirectional connection between two resources.Resources A,B,and C constitute organization 1,while resources C,D,and E belong to organization 2.A resource can participate in one or more virtual organizations or be independent (not belong to any organizations).In this example,the resources F,G,and H are inde-pendent.Obviously,the total number of the shared resources N =9includes the demander,and the maximum vertex degree d =4.In the collection,HTL =2and n =8.Fig.3illustrates the process of collector dissemination.All of the covered resource nodes construct an overlay network in a logical way that looks like a peer-to-peer information sharing system.Fig.4illus-trates the covered nodes sending back their retrieved information by an inverse path to that of their collector disseminations.It is noticeable that the node F is not covered,since the collector dissemination constrains the number of hops.G.Wei et al./Information Sciences 180(2010)4543–45564547The process of collecting information from resources is defined as formula (1).Deployment :¼ðCollector ;Result ;Rules ;HTL ;n Þð1Þ Deployment.Deployment denotes the process of a procedure to collect information from resources.It is named with a fixed format,<domain:sequenceNumber >.For example,the string ‘‘:3201”denotes that it is an information col-lector deployment issued by the host whose network domain name is ‘‘:3201”and identified number is ‘‘3201.”Collector.The parameter Collector is the name of the information collector.A grid information demander may have diverse information collectors for its various scheduling objectives.In general,we name all of the Collectors with their executable file name.A Collector consists of an executable program,runtime environments (such as OS type,OS version,and neces-sary library)and the program version,denoted as formula (2).Collector :¼ðExecutable ;En v ;Ver Þð2ÞTable 1DCA-S algorithm.Input:C :the information collector or query,which is disseminated to retrieve application-specific resource information;H :hops-to-live (HTL),the deadline hops of a collection for delivering the collector,H P 1;n :the number of resources that the demander/scheduler wants the collection to cover,n >1.Output:I :the final aggregated resource information of n nodes including start node s ;T :total overhead traffic of the collection;L :total communication latency of the collection.Dcas (C ,H ,n ){//InitializationN 0=1;//N i denotes the needed number of covered nodes till the i th hop;floodingFlag =True;//used to control the collector dissemination of its child-nodes;T =0;L =0;I =u ;B d =sizeOf (C );B m =sizeOf (controlMessage );Begin {L =L +1;N L =N L À1+j getValidNeighbors (s )j ;//function getValidNeighbors (s )returns the neighbor nodes set of node s ,in which allnodes have sufficient service time and are not covered;if N L P n {//Accomplish collection in one hopfloodingFlag =False;Choose n À1nodes randomly from the neighbors;Disseminate C to the n À1nodes;Wait for the resource information from the n À1nodes;I ¼getInfo ðs ÞÈI 1ns ;==the function getInfo (s )returns the resource information of node s ,I i ns represents the information set of thecovered i th hop nodes,operator Èmeans information aggregation or data fusion;T =T +(n À1)B d ;Return I ,T ,L ;}//end of if//Collector dissemination with nodes coverage constrained by H and nDisseminate C to the L th hop nodes;T =T +j getValidNeighbors (s )jÁB d ;While (L 6H )and (N L <n ){Wait for the L th hops nodes to send back the number of their immediate neighbors;N L þ1¼N L þP v 2L j getValidNeighbors (v )j ;//duplicated neighbors account for 1in the sum operation.If N L +1<n floodingFlag =True else floodingFlag =False;//s allows L -th hop nodes to send C to (L +1)th hop nodes while floodingFlag =TrueDisseminate floodingFlag to the L th hop nodes;T =T +2L Á(P v 2L j getValidNeighbors (v )j )ÁB m ;L =L +1;}//end of whileIf (L >H )and (N L <n )return À1;//failed due to the conflict between H and n ;//Collect resource informationWait for the returning resource information and traffic,which are aggregated in the 1th hop nodes;I ¼getInfo ðs ÞÈI 1ns ;//after all of the information has arrived.T ¼T þP k j ¼1B r ðj Þ;//k =j getValidNeighbors (s )j ,j represents the j th neighbor of s,and B r (j )is the aggregated traffic of thereturning information in node j ;return L ,T ,I ;}//end of begin}//end of Dcas4548G.Wei et al./Information Sciences 180(2010)4543–4556。