文档库 最新最全的文档下载
当前位置:文档库 › Implementation of a Generic Autonomic Framework

Implementation of a Generic Autonomic Framework

Implementation of a Generic Autonomic Framework

Radu Calinescu

Computing Laboratory,University of Oxford

Wolfson Building,Parks Road,Oxford OX13QD,UK

Radu.Calinescu@https://www.wendangku.net/doc/c716086324.html,

Abstract—Based on insights from the implementation of commercial products for data-centre resource management,we identi?ed key challenges in the development of cost-effective autonomic solutions,and best practices for overcoming these challenges.In a related paper,we proposed a generic autonomic framework that complies with these best practices,and suggested ways in which existing technologies could be used to realise this framework.In this paper,we describe the actual implementation of our autonomic framework as a service-oriented architecture, and we show how the universal policy engine at its core can be con?gured to manage the allocation of server capacity to services of different priorities.This case study demonstrates the effectiveness of our generic approach to autonomic solution development in an area of great interest for commercial data centres,research laboratories and application service providers.

I.I NTRODUCTION

Today’s economy is characterised by revolutionary transfor-mations to the way in which Information and Communication Technologies(ICT)are used to conduct business and research and to provide services in all sectors of the society[1].The ability to accomplish more,faster and on a broader scale through expert use of ICT is at the core of today’s scienti?c discoveries,newly emerged electronic services and everyday life.Due to unprecedented advances in ICT,business needs are attended to by ever more sophisticated and feature-rich systems and systems of systems[2].Notwithstanding the bene?ts of such developments,the spiralling complexity of these systems led to unsustainable increases in the cost and expertise required for their management.In an attempt to address this problem,autonomic computing was proposed as a technology for delegating the management of complex systems to the machines themselves[3].Over the past few years, signi?cant progress has been made in de?ning what autonomic systems should look like[4],[5],[6]and in successfully implementing domain-speci?c autonomic solutions[7],[8], [9],[10].

Several such solutions[8]were implemented using a com-mercial autonomic system for policy-based resource man-agement that was co-developed by the author[11].Multiple challenges were encountered in this work,including[12]:?The lack of standardisation in ICT resource interfaces.

Despite an increasing trend to add management interfaces to new ICT components and devices,and to make ex-isting interfaces public,autonomic system development is hindered by the broad diversity of architectures and technologies these interfaces are based upon.

?The tendency to hardcode ICT resource metadata within the control component of the autonomic system.Man-agement frameworks are often intended for handling particular types of resources,and the properties of these resource types are hardcoded in the control element of the system.With careful design,complex systems consisting of supported resources can be successfully managed,however adding in support for additional types of resources cannot be achieved in a cost-effective way.?The complexity of business policies.Policy design for au-tonomic solutions is a complex,error-prone and iterative process.A high level of expertise is required to devise and?ne-tune the set of policies for a complete autonomic solution.

?The high scalability expectations.As simple,small ICT systems are easy to manage by low-skilled human op-erators,autonomic solutions are required in areas where the systems to manage are complex and comprise large numbers of resources.

Based on best practices identi?ed while addressing these chal-lenges[12],we proposed a generic autonomic framework for developing cost-effective autonomic solutions,and suggested ways in which existing technologies could be used to realise this framework[13].

In this paper,we describe the actual implementation of our autonomic framework as a service-oriented architecture (SOA),and we show how the universal policy engine at its core can be con?gured to manage the allocation of server capacity to services.A SOA solution was chosen as the target for the prototype implementation of the framework in order to leverage web service technology bene?ts such as platform independence,loose coupling and security support—all of which are of uttermost importance in an autonomic solution. The choice of server capacity allocation for our initial case study was motivated by the importance that this real-world application has had since the release of server-level capacity control APIs such as[14],[15].Additionally,our prior experience with data-centre resource management[11] helped signi?cantly during the implementation of the solution, and in the interpretation of the case study results.

II.R ELATED WORK

The autonomic infrastructure proposed in[16]is retro?tting autonomic functionality onto legacy systems by using sensors to collect resource data,gauges to interpret these data and controllers to decide the“adaptations”to be enforced

on

Fourth International Conference on Autonomic and Autonomous Systems 0-7695-3093-1/08 $25.00 ? 2008 IEEE

DOI 10.1109/ICAS.2008.21

124

the managed systems through effectors.This infrastructure was successfully used to monitor,analyse and control legacy systems in applications such as spam detection,instant mes-saging quality-of-service management and load balancing for geographical information systems[17].Our generic autonomic framework addresses several key areas that are not supported by the approach in[16],[17].By using a system model for the con?guration of its policy engine,our architecture can be used for the autonomic management of heterogeneous types of resources.Moreover,our managed system can include resources beyond the software components handled by the infrastructure in[16].

In[18],the authors de?ne an autonomic architecture meta-model that extends IBM’s autonomic computing blueprint [19],and use a model-driven process to partly automate the generation of instances of this meta-model.Each instance is a special-purpose organic computing system that can handle the use cases de?ned by the model used for its generation.Our general-purpose autonomic architecture eliminates the need for the19-step generation process described in[18]by using a universal policy engine that can be dynamically repurposed to handle any use cases encoded within its system model and policy set.

A number of other projects have investigated isolated as-pects related to the development of autonomic systems out of non-autonomic components.Some of these projects addressed the standardisation of the policy information model,with the Policy Core Information Model[20]representing the most prominent outcome of this work.Recent efforts such as Oasis’Web Services Distributed Management(WSDM)project were directed at the standardisation of the interfaces through which the manageability of a resource is made available to other ap-plications[21].An integrated development environment for the implementation of WSDM-compliant interfaces is currently available from IBM[22].

In a different area,expression languages were proposed for the speci?cation of policy conditions and actions,and used to implement a range of policies[23],[24],[25],[26].In addition to the development of standards and technologies,complete autonomic computing solutions have been produced recently [14],[11],[15],typically for the management of speci?c systems,and with limited ability to function in different scenarios from those they were originally intended for.

III.O VERVIEW OF THE G ENERIC A UTONOMIC

F RAMEWORK

Fig.1depicts the general-purpose autonomic architecture used by our framework.This architecture,originally intro-duced in[13],is designed around a recon?gurable,model-driven policy engine that organises heterogeneous collections of legacy and autonomic ICT resources into self-managing systems.In order to support the great diversity of existing and future ICT resources encountered in real-world applications, the policy engine is capable of handling resources whose types are unknown at implementation and deployment time.This unique(re)purposing capability is achieved through

runtime

Fig.1.General-purpose autonomic architecture.

con?guration:a comprehensive speci?cation(or model)of the system to be managed is supplied to the policy engine for this purpose.The engine will then implement the high-level goals given by a set of user-speci?ed policies that are expressed in a declarative language,and which make reference to the resources de?ned in the system model.The policy engine performs this task by monitoring the state of the managed resources and controlling their con?guration parameters accordingly,while resource-speci?c manageability adaptors ensure that this is achieved without any modi?cation to existing ICT resources.

The generality of the architecture allows the implementation of the engine using different technologies,e.g.,as a software agent running on a data-centre server or a physical device incorporated into a factory automation equipment or a mobile phone.A full description of this novel autonomic framework is provided in[13].

IV.P ROTOTYPE P OLICY E NGINE

The prototype policy engine and the manageability adap-tors enabling its interoperation with legacy resources were implemented as web services in order to leverage the platform independence,loose coupling and security features of this technology.The runtime recon?guration of the policy engine necessitated the extensive use of techniques available only in an object-oriented environment:

?dynamic data type generation was required to support new types of resources when the policy engine was repurposed through con?guration with a new system model;

Fig.2.UML meta-model of a managed system

?runtime generation of web service proxies was required to enable the policy engine to interoperate with new, resource-speci?c manageability adaptors;

?re?ection was heavily used to access the values of the re-source properties,both to read their values once the policy engine obtained them from the manageability adaptors and to set new values for the modi?able properties;?generics were used to encode most of the functionality of manageability adaptors in a base abstract class,and to obtain resource-speci?c manageability adaptors by parameterising this abstract class with the resource data types.

Based on these requirements,J2EE https://www.wendangku.net/doc/c716086324.html, were selected as candidate development environments for the prototype engine,https://www.wendangku.net/doc/c716086324.html, being eventually preferred due to its better handling of dynamic proxy generation and slightly easier-to-use implementation of re?ection.

A model was developed for the system model used to supply a speci?cation of the ICT resources to be managed to the policy engine.As shown in Fig.2,this meta-model of a managed system speci?es a managed system as a named set of resource de?nitions.Each resource de?nition(i.e., resourceDe?nition in the UML diagram)comprises a unique identi?er ID,a description and a set of resource properties with their characteristics.A resource property has a data type (i.e.,propertyDataType),and is associated a unique ID and the metadata repository URL where its de?nition is available.Several other property characteristics are exposed:

?modi?ability—taken from the WS-ResourceMetadata-Descriptor(WS-RMD)1.0speci?cation[27],speci?es if the property is“read-only”or“read-write”;?mutability—the WS-RMD MutabilityType[27]speci?es if the property is“constant”,“mutable”or“appendable”;?subscribeability—speci?es whether a client such as the policy engine can subscribe to receive noti?cations when the value of this property changes;?primaryKey—indicates whether the property is part of the property set used to identify a resource instance among all resource instances of the same type.

The prototype policy engine(class policyEngine in Fig.3) was implemented itself as an instance of a resourceDe?nition from the system meta-model in Fig.2,such that an instance of the engine can be con?gured to manage other policy engine instances.The four properties of the policy engine are:

1)the policy evaluation period(i.e.,’period’);

2)the set of policies to implement(’policySet’);

3)the locations of the resources to manage(’re-

sourceUrls’),which for the current version of the proto-type are set explicitly(the use of a discovery technique

[28]is intended for future versions);

4)the model of the managed system(’system’);note

that the type of the’system’property is precisely our managed-system meta-model(Fig.2).

The prototype supports operators for the manipulation of primitive data types and a few of the more sophisticated operators recommended in[12](e.g.,set comprehension and scheduling).Support for additional operators is added on a regular basis as new case studies are being explored.

The policy engine recon?guration is achieved through an instance of the PolicyEngine class in Fig.3.PolicyEngine is a subclass of ManagedResource<>,a generic abstract class that is the base class for the manageability adaptors in our architecture and which comprises three web methods:?SupportedResource returns the ID of the supported re-source type.

?GetResources returns the list of all available resource instances.The method takes as argument a list of resource property IDs,and only the values of these properties are assessed and returned to the caller,thus preventing unnecessary resource property evaluation.?SetResources takes as argument a list of resources of the supported type,and assigns any new values speci?ed by the caller for the resource properties declared modi?able in the system model.The resources whose properties need to be modi?ed are uniquely identi?ed by the value of the resource properties marked as“primary key”components in the system model.

These three web methods rely on resource-speci?c methods that are declared abstract in ManagedResource<>,and which any of its subclasses(including PolicyEngine)implements:?GetRawResources builds a list of all available resource instances.The values of the resource properties need not

Fig.3.The prototype policy engine—class diagram

be provided by this method.

?GetResourceProperty takes as arguments a resource in-stance and the ID of a resource property,and ensures that the property value is set in the resource object.The method is used by GetResources to ?ll in the required property values after obtaining a “raw”resource list from GetRawResources .

?SetResourceProperties takes a resource object and en-sures that the modi?able properties of the corresponding real-world resource are assigned any new values speci?ed in the resource object.

A web administration client was implemented to set the properties of the prototype policy engine (Fig.4).This client uses the three web methods of PolicyEngine to read and to modify the policy engine parameters.In particular,the SetResources web method is used to (re)con?gure the engine:?Changes to the system model result in a repurposing of the policy engine for the management of new types of ICT resources,which involves the dynamic generation of new data types,and of proxies for the manageability adaptors speci?c to the new resource types.

?Changes to the resource URLs trigger the engine to con-tact the manageability adaptors at the speci?ed locations in order to establish the type of resources they expose.?Policy changes lead to re-analysis of the new policies and to their parsing into an internal format that makes the pe-riodical evaluation of policies computationally ef?cient.?The web client can also be used to alter the policy evaluation period.V.C ASE S TUDY

In a realistic case study,we con?gured the policy engine to allocate the CPU capacity of a server to a set of services of different priority and subjected to variable workloads.The only resource de?ned in the server model was ’service’with the properties:

?name —a string used to distinguish among services;?priority —an integer value;

?cpuAllocation —the percentage of the server CPU allo-cated to the service;

?cpuUtilisation —the amount of CPU utilised by the ser-vice,expressed as a percentage of its CPU allocation.The policy depicted in Fig.4allocates a percentage of the CPU capacity of the server to each ’service’resource,as

selected

Fig.4.Snapshot of the web client used to con?gure the policy engine

by the policy scope.The ’TRUE’policy condition requires that the policy action is applied at all times (i.e.,in line with the policy evaluation period of the engine).The policy action is speci?ed by means of an expression that uses the SCHEDULE (R,ordering,property,capacity,min,max,optimal )operator that

?sorts the resources in R in non-increasing order of the comparable expressions in ordering ;

?in the sorted order,sets the speci?ed resource property to a value never smaller than min or larger than max ,and as close to optimal as possible;

?ensures that the overall sum of all property values does not exceed the available capacity .Accordingly,the policy action

SCHEDULE (service, service.priority ,

service.cpuAllocation,100,15,85,service.cpuAllocation +5?HYSTERESIS (service.cpuUtilisation,55,80))in Fig.4will set the cpuAllocation property of all services to a value between 15%and 100%subject to the overall CPU allocation staying within the 100%available capacity.Opti-mally,the cpuAllocation should be left unchanged if the 55≤

Fig.5.The server manageability adaptor cpuUtilisation≤85,decrease by5(%)if cpuUtilisation< 55and increase by5(%)if cpuUtilisation>85.1

Like the policy engine itself,the manageability adaptor used to interface the engine with the server simulator was implemented as a sub-class of ManagedResource<>—Fig.5. The policy engine was con?gured to manage remotely a server simulator running a high-priority’premier’service and a lower-priority’standard’service.The two services handled simulated user requests with normally-distributed CPU utili-sation and exponentially-distributed inter-arrival time.Fig.6 shows the change in the system parameters when the request inter-arrival time of the two services was varied to simulate different workloads,and the policy engine was con?gured to implement the policy described earlier in this section:

a Both services are lightly loaded(5000μs request inter-

arrival time)and have the minimum amount of CPU allocated(i.e.,15%each).

b The load increases for the standard service,and its allo-

cated CPU is increased by the policy engine accordingly.

c For a brief perio

d of time,th

e standard service uses its

allocated CPU completely;no requests timeout though as its CPU allocation is increased swiftly.

d Th

e premium service workload starts to increase,and the

policy engine grows its CPU allocation.Accordingly,the standard service starts to get less CPU.

e As the workload for the premium service peaks and the

policy engine schedules additional CPU capacity for this service,the standard service is allocated insuf?cient CPU and some of its client requests time out.2

f The inter-arrival time for the premium service increases,

and some of the CPU capacity allocated to it during the previous time interval is re-deployed by the policy engine to the standard service.No more requests time out.

g Under constant workload,the CPU allocation is mostly

stable.

h To explore the role of the hysteresis,we replaced

the hysteresis term in the policy action with HYSTERESIS(service.cpuUtilisation,80,80),

basically eliminating the hysteresis.This led to signi?cant oscillations in the CPU capacity allocated to 1The HYSTERESIS(val,lower,upper)operator used to achieve this behaviour returns-1,0or1if val

2Requests time out after spending T=5s in a service request queue.

the services.The reinstatement of the original policy after this time interval brings the system back into a stable state.

The policy evaluation period was set to3seconds for this experiment,so that the system could self-adapt to the rapid variation in the workload of the two services.This allowed us to measure the CPU overhead of the policy engine,which was under1%with the engine service running on a1.8GHz Windows XP machine.In a real scenario,such variations in the request inter-arrival time are likely to happen over longer intervals of time,and the system would successfully self-con?gure with far less frequent policy evaluations.Note also that since the policy engine service is implemented as a managed resource,its policy evaluation period can be adjusted by another policy engine instance,so that it stays in step with the rate of change in the request inter-arrival time—a scenario that we are in the process of experimenting with.

VI.C ONCLUSION

This paper described the SOA-based implementation of the general-purpose autonomic architecture originally introduced in[13].Based on previous commercial work[11],[12]and on recent advances in autonomic computing[16],[23],[26],our implementation can be used to build policy-based autonomic systems out of non-autonomic ICT resources.Experimental work was carried out to validate the effectiveness of the implementation in an application to allocate server capacity to services of different priorities and varying workloads.The ex-perimental results showed that our general-purpose framework could perform the planned management task successfully,and similarly to a dedicated commercial system for data-centre resource management[8],[11].However,unlike the commer-cial resource-management system,our novel approach has the unique ability to handle resources whose types are unknown at implementation and deployment time,therefore enabling the cost-effective development of autonomic solutions across a broad variety of application domains.

Work is in progress to extend the prototype policy engine with operators supporting the implementation of“utility func-tion”policies[29],and with functionality that takes advantage of the noti?cation mechanism permitted by the system model used for its con?guration.Additional case studies will be carried out to validate the applicability of the framework to a broader spectrum of use cases related to data-centre resource management in the?rst instance,and to other application domains in the longer term.

R EFERENCES

[1]T.Lenard and D.Britton,The Digital Economy Factbook.The Progress

and Freedom Foundation,2006.

[2]Y.Bar-Yam et al.,“The characteristics and emerging behaviors of

system-of-systems,”New England Complex Systems Institute,2004. [3]IBM Corporation,“Autonomic computing:IBM’s perspective on the

state of information technology,”October2001.

[4]J.Kephart and D.Chess,“The vision of autonomic computing,”IEEE

Computer Journal,vol.36,no.1,pp.41–50,January2003.

[5]R.Murch,Autonomic Computing.IBM Press,2004.

Fig.6.Snapshot of a typical server simulation experiment

[6]M.Parashar and S.Hariri,“Autonomic computing:An overview,”in

Unconventional Programming Paradigms,ser.LNCS,vol.3566,2005, pp.257–269.

[7] C.Lefurgy et al.,“Server-level power control,”in Proc.4th IEEE Intl.

Conf.Autonomic Computing,Jacksonville,Florida,June2007.

[8] B.McColl,“Intelligent,policy-driven orchestration of sensors and

effectors across the data center in real-time,”Sychron Inc,”White paper, April2004,https://www.wendangku.net/doc/c716086324.html,/BM042304.pdf.

[9]W.-S.Li et al.,“Load balancing for multi-tiered database systems

through autonomic placement of materialized views,”in Proc.22nd IEEE Intl.Conf.Data Engineering,Atlanta,Georgia,April2006. [10] C.Ghanbari et al.,“Adaptive learning of metric correlations for

temperature-aware database provisioning,”in Proc.4th IEEE Intl.Conf.

Autonomic Computing,Jacksonville,Florida,June2007.

[11]R.Calinescu and J.M.D.Hill,“System providing methodology for

policy-based resource allocation,”July2004,united States Patent Ap-plication no.10/710322.

[12]R.Calinescu,“Challenges and best practices in policy-based autonomic

architectures,”in Proc.3rd IEEE Intl.Symp.Dependable,Autonomic and Secure Computing,Columbia,Maryland,USA,2007,pp.65–74.

[13]——,“Model-driven autonomic architecture,”in Proc.4th IEEE Intl.

Conf.Autonomic Computing,Jacksonville,Florida,June2007. [14]Microsoft Corporation,“Windows System Resource Manager(WSRM)

White Paper,”August2003.

[15]Sun Microsystems,Inc,“Sun T M Grid Compute Utility—Reference

guide,”June2006,https://www.wendangku.net/doc/c716086324.html,/service/sungrid/SunGridUG.pdf.

[16]J.Parekh et al.,“Retro?tting autonomic capabilities onto legacy sys-

tems,”Cluster Computing,vol.9,no.2,pp.141–159,April2006. [17]G.Kaiser et al.,“Kinesthetics extreme:An external

infrastructure for monitoring distributed legacy systems,”in Proc.5th Intl.Active Middleware Workshop,June2003, https://www.wendangku.net/doc/c716086324.html,/ftp/psl/CUCS-019-03.pdf.[18]H.Kasinger and B.Bauer,“Towards a model-driven software engineer-

ing methodology for organic computing systems,”in Proc.4th IASTED https://www.wendangku.net/doc/c716086324.html,putational Intelligence,Calgary,Alberta,Canada,July 2005,pp.141–146.

[19]IBM Corporation,“An architectural blueprint for autonomic computing,”

2004,https://www.wendangku.net/doc/c716086324.html,/autonomic/pdfs/ACBP22004-10-04.pdf.

[20] B.Moore,“Policy Core Information Model(pcim)extensions,”January

2003,iETF RFC3460,https://www.wendangku.net/doc/c716086324.html,/rfc/rfc3460.txt.

[21] B.Murray et al.,“Web Services Distributed Management:MUWS

primer,”February2006,OASIS WSDM Committee Draft.

[22]IBM Corporation,“Autonomic integrated development environment,”

April2006,https://www.wendangku.net/doc/c716086324.html,/tech/aide.

[23] D.Agrawal et al.,“Autonomic Computing Expression

Language(ACEL) 1.2:User’s Guide,”2005,https://www.wendangku.net/doc/c716086324.html,/developerworks/edu/ac-dw-ac-acel-i.html.

[24]R.Anthony,“A policy-de?nition language and prototype implementation

library for policy-based autonomic systems,”in Proc.3rd IEEE Intl.

Conf.Autonomic Computing,Dublin,Ireland,June2006,pp.265–276.

[25]N.Damianou et al.,“The Ponder policy speci?cation language,”in

Policies for Distributed Systems and Networks,ser.LNCS,vol.1995, Bristol,UK,2001,pp.18–38.

[26]IBM Corporation,“Policy Management for Autonomic

Computing,”2005,https://www.wendangku.net/doc/c716086324.html,/technologies/pmac/ PMAC12sdd.pdf.

[27]OASIS,“Web Services Resource Metadata1.0,”November2006.

[28]R.Harbird et al.,“Adaptive resource discovery for ubiquitous com-

puting,”in Proc.2nd Workshop Middleware for Pervasive and Ad-hoc Computing,Toronto,Canada,October2004,pp.155–160.

[29]S.R.White et al.,“An architectural approach to autonomic computing,”

in Proc.1st IEEE Intl.Conf.Autonomic Computing.2004,pp.2–9.

自由贸易协定(FTA)的投资规范与FDI效应

自由貿易協定(FTA)的投資規範與FDI效應 ──兼談雙邊投資協定與原產地原則 台經院國際處副研究員洪財隆2006/12/15 一、前言 全球的的外人直接投資(foreign direct investment, FDI)從1980年代開始即大 大幅增加,成長速度不僅快過全球生產(亦即經濟成長率)與國際貿易,近年來其年平均成長率更屢屢超過三十%,允為全球化最重要的驅力與主要特徵。而晚近自由貿易協定(Free Trade Agreement, FTA)領銜的區域主義之興起,也跟各國(尤其是開發中國家)相互競逐FDI高度相關。1其中FTA代表制度整合,而FDI則為市場整合,其間關係為何確實值得加以探索,尤其是FTA的投資規範,以及FTA所可能引發的FDI效應。 在進入正文之前,首先釐清何謂FTA並簡述其近況。 除了市場驅動(market-driven)的經濟整合之外,在制度性整合(institutional-driven) 1「北美自由貿易協定」(NAFTA)即明文確認以加速區域內FDI流動作為重要目標;而東協自由貿易區(AFTA)或其它進一步的經濟整合措施也都往此方向設計。

方面,以雙邊或區域為基礎的區域貿易協定(Regional Trade Agreement, RTA) ,2主要包括「優惠安排」(Preferential Arrangement)、3自由貿易協定(Free Trade Agreement, FTA),以及關稅同盟(Customs Union)等三大類,從二十世紀90年代以來即日益蔓延。4目前為RTA所涵蓋的貿易量估計已達全球貿易的半數,而其重要性也在2006年七月杜哈談判回合重挫之後更顯得突出,WTO 149個成員只剩下蒙古尚未簽有任何此類協定。5 二、FTA的投資相關規範(含BIT) (一)多邊投資協定(MAI)仍付之闕如 隨著外人直接投資(FDI)的快速增長,國際間針對跨國投資予以規範(或促進)的需求也自然增加。然而,即使經過從二戰以來的多方努力,一個「連貫、實質且具有拘束力」(coherent, substantive and binding)的國際多邊投資協定至今仍尚未產生。6原因除了開發中國家針對投資自由化的國際協定向來排斥之外(投2也有以PTA(preferential trade agreements)來泛稱所有具有差別待遇性質的貿易協定。 3成立要件較為寬鬆,只有開發中國家方能適用的「優惠安排」(preferential arrangement),乃援引GATT「授權條款」(enabling clause, 1979)而來,引起廣泛討論的「東協—中國全面經濟合作架構協定」(Framework Agreement on Comprehensive Economic Cooperation between ASEAN and China)即屬之。此類協定名稱也往往冠以「架構協定」(Framework Agreement),乃為日後雙方的FTA定調,但嚴格來講還不是FTA。也有不少人襲稱誤用。 4截至2006/6/15,正式通報到WTO秘書處的R TA已達197宗,其中FTA高達164宗(商品貿易協定126,服務貿易協定38),關稅同盟則有11起之多,其餘22起則援引「授權條款」而來。資料來源:WTO秘書處資料:https://www.wendangku.net/doc/c716086324.html,/english/tratop_e/region_e/region_e.htm accessed on 2006/11/13. 5但也已分別跟中國、日本與韓國等國尋求洽簽FTA或其他優惠貿易協定,見Bonapace and Mikic (2005)。 6胎死腹中的ITO(International Trade Organization)其實已準備把投資列入,但繼之而起的GATT 則沒有。見於”Trade and Investment”(TRIMS), https://www.wendangku.net/doc/c716086324.html,/WBSITE/EXTERNA L/TOPICS/TRADE/0,,contentMDK:20540644~menuP K:207652~pagePK:148956~piPK:216618~theSitePK:239071,00.html (accessed on 2006/8/29)。嚴格地講,1947年所簽署的GATT,雖對跨國投資訂有不得違反國民待遇及禁止採取數量管制的原

从实践的角度探讨在日语教学中多媒体课件的应用

从实践的角度探讨在日语教学中多媒体课件的应用 在今天中国的许多大学,为适应现代化,信息化的要求,建立了设备完善的适应多媒体教学的教室。许多学科的研究者及现场教员也积极致力于多媒体软件的开发和利用。在大学日语专业的教学工作中,教科书、磁带、粉笔为主流的传统教学方式差不多悄然向先进的教学手段而进展。 一、多媒体课件和精品课程的进展现状 然而,目前在专业日语教学中能够利用的教学软件并不多见。比如在中国大学日语的专业、第二外語用教科书常见的有《新编日语》(上海外语教育出版社)、《中日交流标准日本語》(初级、中级)(人民教育出版社)、《新编基础日语(初級、高級)》(上海译文出版社)、《大学日本语》(四川大学出版社)、《初级日语》《中级日语》(北京大学出版社)、《新世纪大学日语》(外语教学与研究出版社)、《综合日语》(北京大学出版社)、《新编日语教程》(华东理工大学出版社)《新编初级(中级)日本语》(吉林教育出版社)、《新大学日本语》(大连理工大学出版社)、《新大学日语》(高等教育出版社)、《现代日本语》(上海外语教育出版社)、《基础日语》(复旦大学出版社)等等。配套教材以录音磁带、教学参考、习题集为主。只有《中日交流標準日本語(初級上)》、《初級日语》、《新编日语教程》等少数教科书配备了多媒体DVD视听教材。 然而这些试听教材,有的内容为日语普及读物,并不适合专业外语课堂教学。比如《新版中日交流标准日本语(初级上)》,有的尽管DVD视听教材中有丰富的动画画面和语音练习。然而,课堂操作则花费时刻长,不利于教师重点指导,更加适合学生的课余练习。比如北京大学的《初级日语》等。在这种情形下,许多大学的日语专业致力于教材的自主开发。 其中,有些大学的还推出精品课程,取得了专门大成绩。比如天津外国语学院的《新编日语》多媒体精品课程为2007年被评为“国家级精品课”。目前已被南开大学外国语学院、成都理工大学日语系等全国40余所大学推广使用。

新视野大学英语全部课文原文

Unit1 Americans believe no one stands still. If you are not moving ahead, you are falling behind. This attitude results in a nation of people committed to researching, experimenting and exploring. Time is one of the two elements that Americans save carefully, the other being labor. "We are slaves to nothing but the clock,” it has been said. Time is treated as if it were something almost real. We budget it, save it, waste it, steal it, kill it, cut it, account for it; we also charge for it. It is a precious resource. Many people have a rather acute sense of the shortness of each lifetime. Once the sands have run out of a person’s hourglass, they cannot be replaced. We want every minute to count. A foreigner’s first impression of the U.S. is li kely to be that everyone is in a rush -- often under pressure. City people always appear to be hurrying to get where they are going, restlessly seeking attention in a store, or elbowing others as they try to complete their shopping. Racing through daytime meals is part of the pace

RCEP区域自贸区协议全文第1章_中文版

第一章初始条款和一般定义 第一条区域全面经济伙伴关系自由贸易区的建立 本协定缔约方,在与《1994年关税与贸易总协定》第二十四条和《服务贸易总协定》第五条相一致的基础上,特此依照本协定条款建立区域全面经济伙伴关系自由贸易区。 第二条一般定义 就本协定而言,除非本协定另有规定: (一)《反倾销协定》指《WTO协定》附件1A所含《关于实施1994年关税与贸易总协定第六条的协定》; (二)本协定指《区域全面经济伙伴关系协定》; (三)《农业协定》指《WTO 协定》附件1A所含《农业协定》; (四)《海关估价协定》指《WTO协定》附件1A所含《关于实施1994年关税与贸易总协定第七条的协定》; (五)日指日历日,包括周末和节假日; (六)现行指在本协定生效之日有效; (七)GATS指《WTO协定》附件1B所含《服务贸易总协定》; (八)GATT 1994指《WTO协定》附件1A所含《1994年关税与贸易总协定》; (九)GPA指《WTO协定》附件4所含《政府采购协定》; (十)协调制度或者HS指《商品名称及编码协调制度》,包括1983年6月14日订于布鲁塞尔的由世界海关组织通过和

管理的《商品名称及编码协调制度的国际公约》附件规定的归类总规则、类注释、章注释和子目注释,以及缔约方在各自法律框架内修订、采用和实施的归类总规则、类注释、章注释和子目注释; (十一)IMF指国际货币基金组织; (十二)《国际货币基金组织协定》指1944年7月22日订于布雷顿森林的《国际货币基金组织协定》; (十三)《进口许可程序协定》指《WTO协定》附件1A 所含《进口许可程序协定》; (十四)法人根据适用法律组建或组织的任何实体,无论是否以营利为目的,无论属私营所有还是政府所有,包括任何公司、信托、合伙企业、合资企业、独资企业、协会或类似组织; (十五)最不发达国家指联合国指定的、尚未从最不发达国家的类型中毕业的任何国家; (十六)最不发达国家缔约方指属于最不发达国家的任何缔约方; (十七)措施指一缔约方采取的任何措施,包括法律、法规、规定、程序、决定、行政行为或任何其他形式; (十八)缔约方指本协定对其生效的任何国家或单独关税区; (十九)易腐货物指由于其固有特性,特别是在缺乏适当的储藏条件下快速变质的货物; (二十)人指自然人或法人; (二十一)个人信息指与已识别的或可识别的个人相关的任何信息,包括数据; (二十二)《装运前检验协定》指《WTO协定》附件1A 所含《装运前检验协定》;

新视野大学英语第三版第二册课文语法讲解 Unit4

新视野三版读写B2U4Text A College sweethearts 1I smile at my two lovely daughters and they seem so much more mature than we,their parents,when we were college sweethearts.Linda,who's21,had a boyfriend in her freshman year she thought she would marry,but they're not together anymore.Melissa,who's19,hasn't had a steady boyfriend yet.My daughters wonder when they will meet"The One",their great love.They think their father and I had a classic fairy-tale romance heading for marriage from the outset.Perhaps,they're right but it didn't seem so at the time.In a way, love just happens when you least expect it.Who would have thought that Butch and I would end up getting married to each other?He became my boyfriend because of my shallow agenda:I wanted a cute boyfriend! 2We met through my college roommate at the university cafeteria.That fateful night,I was merely curious,but for him I think it was love at first sight."You have beautiful eyes",he said as he gazed at my face.He kept staring at me all night long.I really wasn't that interested for two reasons.First,he looked like he was a really wild boy,maybe even dangerous.Second,although he was very cute,he seemed a little weird. 3Riding on his bicycle,he'd ride past my dorm as if"by accident"and pretend to be surprised to see me.I liked the attention but was cautious about his wild,dynamic personality.He had a charming way with words which would charm any girl.Fear came over me when I started to fall in love.His exciting"bad boy image"was just too tempting to resist.What was it that attracted me?I always had an excellent reputation.My concentration was solely on my studies to get superior grades.But for what?College is supposed to be a time of great learning and also some fun.I had nearly achieved a great education,and graduation was just one semester away.But I hadn't had any fun;my life was stale with no component of fun!I needed a boyfriend.Not just any boyfriend.He had to be cute.My goal that semester became: Be ambitious and grab the cutest boyfriend I can find. 4I worried what he'd think of me.True,we lived in a time when a dramatic shift in sexual attitudes was taking place,but I was a traditional girl who wasn't ready for the new ways that seemed common on campus.Butch looked superb!I was not immune to his personality,but I was scared.The night when he announced to the world that I was his girlfriend,I went along

病毒免疫逃逸和抗病毒应答新机制

病毒免疫逃逸和抗病毒应答新机制 在流感病毒感染中,有细胞毒性潜力的CD4~+T细胞在感染部位分化成熟。这些有细胞毒性潜力的CD4~+T细胞的分化依赖于STAT2依赖性的I型IFNs信号及IL-2/IL-2Rα信号通路,导致转录因子T-bet和Blimp-1的表达。 另外,我们发现在CD4~+T细胞中,Blimp-1能够促进T-bet结合到溶细胞基因的启动子区,而T-bet的结合对于在体外和体内诱导的有细胞毒性潜力的 CD4~+T细胞发挥其细胞毒性功能是必须的。我们的结果揭示了在急性呼吸道病毒感染中调节细胞毒CD4~+T细胞分化的分子机制(1)。 本研究还从病毒特异性体液和细胞免疫水平两个方面对单价pH1N1疫苗接种者、pH1N1流感感染病例、流感患者密切接触者、健康对照4组人群进行了比较,pH1N1流感病毒感染诱发的特异性细胞免疫和体液免疫应答水平及抗体中和能力均高于疫苗接种者。疫苗接种组在诱导产生病毒特异性IgG方面没有比健康人群表现出特别强的优势,但有较高的特异性IgG与血凝抑制水平,和病毒感染后的免疫应答反应相比,其不能诱导产生有效的细胞免疫应答。 2009年甲型H1N1流感流行一年后约70%的健康人群发生了隐性或轻型 pH1N1流感感染(101)。B7-H1是B7家族中一个重要的共抑制分子,能诱导肝细胞内CD8+T细胞的凋亡。 我们发现IFN-γ和TNF-α能协同诱导肝细胞表达B7-H1。二者中,IFN-γ起主要作用,TNF-α起辅助作用,IFN-γ能单独诱导肝细胞表达B7-H1,TNF-α不能,二者在诱导其各自的转录因子STAT1和NF-κB活性上没有协同作用,但STAT1 和NF-κB的激活又是IFN-γ和TNF-α协同诱导肝细胞表达B7-H1所必需的。 在肝细胞中TNF-α和IFN-γ在诱导IRF-1表达上具有协同性,NF-κB和

新视野大学英语读写教程第一册课文翻译及课后答案

Unit 1 1学习外语是我一生中最艰苦也是最有意义的经历之一。虽然时常遭遇挫折,但却非常有价值。 2我学外语的经历始于初中的第一堂英语课。老师很慈祥耐心,时常表扬学生。由于这种积极的教学方法,我踊跃回答各种问题,从不怕答错。两年中,我的成绩一直名列前茅。 3到了高中后,我渴望继续学习英语。然而,高中时的经历与以前大不相同。以前,老师对所有的学生都很耐心,而新老师则总是惩罚答错的学生。每当有谁回答错了,她就会用长教鞭指着我们,上下挥舞大喊:“错!错!错!”没有多久,我便不再渴望回答问题了。我不仅失去了回答问题的乐趣,而且根本就不想再用英语说半个字。 4好在这种情况没持续多久。到了大学,我了解到所有学生必须上英语课。与高中老师不。大学英语老师非常耐心和蔼,而且从来不带教鞭!不过情况却远不尽如人意。由于班大,每堂课能轮到我回答的问题寥寥无几。上了几周课后,我还发现许多同学的英语说得比我要好得多。我开始产生一种畏惧感。虽然原因与高中时不同,但我却又一次不敢开口了。看来我的英语水平要永远停步不前了。 5直到几年后我有机会参加远程英语课程,情况才有所改善。这种课程的媒介是一台电脑、一条电话线和一个调制解调器。我很快配齐了必要的设备并跟一个朋友学会了电脑操作技术,于是我每周用5到7天在网上的虚拟课堂里学习英语。 6网上学习并不比普通的课堂学习容易。它需要花许多的时间,需要学习者专心自律,以跟上课程进度。我尽力达到课程的最低要求,并按时完成作业。 7我随时随地都在学习。不管去哪里,我都随身携带一本袖珍字典和笔记本,笔记本上记着我遇到的生词。我学习中出过许多错,有时是令人尴尬的错误。有时我会因挫折而哭泣,有时甚至想放弃。但我从未因别的同学英语说得比我快而感到畏惧,因为在电脑屏幕上作出回答之前,我可以根据自己的需要花时间去琢磨自己的想法。突然有一天我发现自己什么都懂了,更重要的是,我说起英语来灵活自如。尽管我还是常常出错,还有很多东西要学,但我已尝到了刻苦学习的甜头。 8学习外语对我来说是非常艰辛的经历,但它又无比珍贵。它不仅使我懂得了艰苦努力的意义,而且让我了解了不同的文化,让我以一种全新的思维去看待事物。学习一门外语最令人兴奋的收获是我能与更多的人交流。与人交谈是我最喜欢的一项活动,新的语言使我能与陌生人交往,参与他们的谈话,并建立新的难以忘怀的友谊。由于我已能说英语,别人讲英语时我不再茫然不解了。我能够参与其中,并结交朋友。我能与人交流,并能够弥合我所说的语言和所处的文化与他们的语言和文化之间的鸿沟。 III. 1. rewarding 2. communicate 3. access 4. embarrassing 5. positive 6. commitment 7. virtual 8. benefits 9. minimum 10. opportunities IV. 1. up 2. into 3. from 4. with 5. to 6. up 7. of 8. in 9. for 10.with V. 1.G 2.B 3.E 4.I 5.H 6.K 7.M 8.O 9.F 10.C Sentence Structure VI. 1. Universities in the east are better equipped, while those in the west are relatively poor. 2. Allan Clark kept talking the price up, while Wilkinson kept knocking it down. 3. The husband spent all his money drinking, while his wife saved all hers for the family. 4. Some guests spoke pleasantly and behaved politely, while others wee insulting and impolite. 5. Outwardly Sara was friendly towards all those concerned, while inwardly she was angry. VII. 1. Not only did Mr. Smith learn the Chinese language, but he also bridged the gap between his culture and ours. 2. Not only did we learn the technology through the online course, but we also learned to communicate with friends in English. 3. Not only did we lose all our money, but we also came close to losing our lives.

北美自由贸易协定中文版

北美自由贸易协定中文 版 内部编号:(YUUT-TBBY-MMUT-URRUY-UOOY-DBUYI-0128)

《北美自由贸易协定》美国、加拿大和墨西哥三国签署的《北美自由贸易协定》(NAFTA)自1994年1 月1日起全面生效。该协定的目的是通过在自由贸易区内扩大贸易及投资机会,来促进美、加、墨三国的就业机会和经济增长,增强三国在全球市场的竞争力。自协定生效之日起,美、加、墨在15年的过渡期内全部取消商品、服务及投资领域的所有关税及非关税壁垒。《北美自由贸易协定》是《美加自由贸易协定》的进一步扩大,突破了贸易自由化的传统领域,纳入了服务贸易,并在自由化步伐上迈得更大,在一定程度上成为乌拉圭回合谈判《服务贸易总协定》的范本。《北美自由贸易协定》有关服务贸易规则的主要内容如下:? 1、服务的范围 就服务部门而言,协定覆盖的服务部门相当广泛。第十二章“跨境服务贸易”建立了旨在实现跨境服务贸易自由化的规则和原则框架。协定采用列举“否定清单”方式来规定其适用的服务部门的范围,即如果一个服务部门没有被明确排除在协定调整范围之外,那么该服务部门就会自动地适用。该章明确规定不适用于下列服务和活动: (1)金融服务、与能源或基础石油化工有关的服务; (2)航空服务及其支持服务(除航空器维修服务和特种航空服务之外); (3)跨境劳工贸易、政府采购、政府补贴、成员国政府所进行的与法律执行、收入保障、社会福利和国家安全有关的活动。至于其他部门,允许各成员方作出不同程度、或全部或部分的保留。此外,其他章节和附录还分别就电讯服务、金融服务、陆地运输、专业服务进行专门规定。通过列举“否定清单”的方式,

新大学日语简明教程课文翻译

新大学日语简明教程课文翻译 第21课 一、我的留学生活 我从去年12月开始学习日语。已经3个月了。每天大约学30个新单词。每天学15个左右的新汉字,但总记不住。假名已经基本记住了。 简单的会话还可以,但较难的还说不了。还不能用日语发表自己的意见。既不能很好地回答老师的提问,也看不懂日语的文章。短小、简单的信写得了,但长的信写不了。 来日本不久就迎来了新年。新年时,日本的少女们穿着美丽的和服,看上去就像新娘。非常冷的时候,还是有女孩子穿着裙子和袜子走在大街上。 我在日本的第一个新年过得很愉快,因此很开心。 现在学习忙,没什么时间玩,但周末常常运动,或骑车去公园玩。有时也邀朋友一起去。虽然我有国际驾照,但没钱,买不起车。没办法,需要的时候就向朋友借车。有几个朋友愿意借车给我。 二、一个房间变成三个 从前一直认为睡在褥子上的是日本人,美国人都睡床铺,可是听说近来纽约等大都市的年轻人不睡床铺,而是睡在褥子上,是不是突然讨厌起床铺了? 日本人自古以来就睡在褥子上,那自有它的原因。人们都说日本人的房子小,从前,很少有人在自己的房间,一家人住在一个小房间里是常有的是,今天仍然有人过着这样的生活。 在仅有的一个房间哩,如果要摆下全家人的床铺,就不能在那里吃饭了。这一点,褥子很方便。早晨,不需要褥子的时候,可以收起来。在没有了褥子的房间放上桌子,当作饭厅吃早饭。来客人的话,就在那里喝茶;孩子放学回到家里,那房间就成了书房。而后,傍晚又成为饭厅。然后收起桌子,铺上褥子,又成为了全家人睡觉的地方。 如果是床铺的话,除了睡觉的房间,还需要吃饭的房间和书房等,但如果使用褥子,一个房间就可以有各种用途。 据说从前,在纽约等大都市的大学学习的学生也租得起很大的房间。但现在房租太贵,租不起了。只能住更便宜、更小的房间。因此,似乎开始使用睡觉时作床,白天折小能成为椅子的、方便的褥子。

新视野大学英语第一册Unit 1课文翻译

新视野大学英语第一册Unit 1课文翻译 学习外语是我一生中最艰苦也是最有意义的经历之一。 虽然时常遭遇挫折,但却非常有价值。 我学外语的经历始于初中的第一堂英语课。 老师很慈祥耐心,时常表扬学生。 由于这种积极的教学方法,我踊跃回答各种问题,从不怕答错。 两年中,我的成绩一直名列前茅。 到了高中后,我渴望继续学习英语。然而,高中时的经历与以前大不相同。 以前,老师对所有的学生都很耐心,而新老师则总是惩罚答错的学生。 每当有谁回答错了,她就会用长教鞭指着我们,上下挥舞大喊:“错!错!错!” 没有多久,我便不再渴望回答问题了。 我不仅失去了回答问题的乐趣,而且根本就不想再用英语说半个字。 好在这种情况没持续多久。 到了大学,我了解到所有学生必须上英语课。 与高中老师不同,大学英语老师非常耐心和蔼,而且从来不带教鞭! 不过情况却远不尽如人意。 由于班大,每堂课能轮到我回答的问题寥寥无几。 上了几周课后,我还发现许多同学的英语说得比我要好得多。 我开始产生一种畏惧感。 虽然原因与高中时不同,但我却又一次不敢开口了。 看来我的英语水平要永远停步不前了。 直到几年后我有机会参加远程英语课程,情况才有所改善。 这种课程的媒介是一台电脑、一条电话线和一个调制解调器。 我很快配齐了必要的设备并跟一个朋友学会了电脑操作技术,于是我每周用5到7天在网上的虚拟课堂里学习英语。 网上学习并不比普通的课堂学习容易。 它需要花许多的时间,需要学习者专心自律,以跟上课程进度。 我尽力达到课程的最低要求,并按时完成作业。 我随时随地都在学习。 不管去哪里,我都随身携带一本袖珍字典和笔记本,笔记本上记着我遇到的生词。 我学习中出过许多错,有时是令人尴尬的错误。 有时我会因挫折而哭泣,有时甚至想放弃。 但我从未因别的同学英语说得比我快而感到畏惧,因为在电脑屏幕上作出回答之前,我可以根据自己的需要花时间去琢磨自己的想法。 突然有一天我发现自己什么都懂了,更重要的是,我说起英语来灵活自如。 尽管我还是常常出错,还有很多东西要学,但我已尝到了刻苦学习的甜头。 学习外语对我来说是非常艰辛的经历,但它又无比珍贵。 它不仅使我懂得了艰苦努力的意义,而且让我了解了不同的文化,让我以一种全新的思维去看待事物。 学习一门外语最令人兴奋的收获是我能与更多的人交流。 与人交谈是我最喜欢的一项活动,新的语言使我能与陌生人交往,参与他们的谈话,并建立新的难以忘怀的友谊。 由于我已能说英语,别人讲英语时我不再茫然不解了。 我能够参与其中,并结交朋友。

免疫学 病毒感染与免疫机制

现代免疫学 1.病毒感染之后如何诱发机体产生免疫应答并产生免疫保护作用? 2.同一种病毒再次感染机体,发生的免疫应答有何变化? 病毒是除了类病毒外最简单的生命有机体,由核酸和包裹核酸的蛋白质衣壳组成。病毒完全依靠宿主细胞的生物合成系统来复制病毒蛋白及其遗传物质并进行病毒体组装。他们利用细胞表面受体感染细胞,其中许多与免疫系统有关。病毒成功感染宿主细胞后,其遗传物质暴露于胞质内,并开始指导病毒大分子的合成以及病毒体的组装。少数病毒如CMV能与宿主细胞和平共处,长期寄生,称之为非细胞毒性病毒。多数病毒是细胞毒性病毒,其在胞内的繁殖和寄生很快导致宿主细胞的死亡。 机体针对病毒的防御在3个层次上展开,1)抑制病毒在宿主细胞内的复制与繁殖——IFN和TNF等细胞因子;2)杀伤被病毒感染的宿主细胞——NK细胞和CTL;3)阻断病毒感染细胞的能力——中和抗体。 1.针对病毒感染的固有免疫应答: 在针对病毒入侵的强有力的特有免疫建立之前,固有免疫应答是机体抵御病毒入侵的第一道防线。主要是通过I型干扰素对病毒的抑制和自然杀伤细胞对感染细胞的杀伤来实现的。病毒通过皮肤或黏膜表面进入机体后遇到NK细胞,后者通过细胞裂解作用而将被病毒感染的细胞清除。这是在特异性免疫应答尚未建立的病毒感染早期机体抗病毒感染的主要方式。 病毒双链RNA可以刺激受感染组织细胞、巨噬细胞以及单核细胞等分泌产生IFN-α和β等I型干扰素,以诱导临近细胞进入抗病毒状态。【图:干扰素的抗感染作用:细胞被病毒感染后表达并分泌干扰素-左,干扰素作用与临近细胞,使其进入抗病毒状态-右】干扰素通过与核细胞表面的I型干扰素受体结合,促使细胞产生可抑制病毒复制的酶以达到对病毒的抑制,从而抗病毒感染。I型干扰素还能激活NK细胞,使其更有效地杀伤被感染的宿主细胞,清除病毒赖以藏身和复制的“工厂”。NK细胞大量分泌IFN-γ,发挥免疫调节作用。巨噬细胞受到病毒和IFN-γ的刺激后被活化,分泌IL-1 IL-6 IL-8 IFN-γ和IL-12等细胞因子和趋化因子,促进毛细血管内皮细胞上调粘附分子,以便于中性粒细胞和单核细胞浸润感染局部。 固有免疫对于防控病毒的入侵和感染有着重要的作用,然而病毒一旦已经完成入侵并造成感染,特异性免疫应答,特别是T细胞介导的特异性免疫将发挥消除病毒感染的决定性作用。 2.针对病毒感染的适应性免疫应答: 病毒可借助其表面的受体分子和宿主细胞表面相应分子结合从而感染细胞,机体针对入侵病毒表面分子产生的特异性抗体在防治病毒感染的体液免疫中发挥重要的作用,这些抗体可作用于感染早期体液中的病毒和感染细胞溶解后释放的病毒。 抗体的抗病毒效应体现在以下几个方面:1)中和病毒感染力:抗体与病毒表面蛋白质的结合可以阻断其与细胞表面受体的接触或者干扰病毒向细胞内的侵入,黏膜表面的IgA分子在这方面的作用尤为重要;2)致敏病毒颗粒:抗体结合病毒之后通过激活补体导致病毒颗粒直接被裂解,在此过程中产生的C3a和C5a等补体片段趋化白细胞;3)介导抗体依赖的细胞毒作用——ADCC:有些病毒膜蛋白能够表达于被感染宿主细胞的表面。病毒特异性抗体通过对这些病毒蛋白的识别标记被感染细胞,诱发NK细胞和巨噬细胞对这些细胞的杀伤。

RCEP区域自贸区协议全文第8章_附件1_英文版

ANNEX 8A FINANCIAL SERVICES Article 1: Definitions For the purposes of this Annex: (a) financial institution means any financial intermediary or other juridical person that is authorised to do business and regulated or supervised as a financial institution, under the laws and regulations of the Party in whose territory it is located; (b) financial service means any service of a financial nature offered by a financial service supplier of a Party. Financial services include all insurance and insurance-related services, and all banking and other financial services (excluding insurance). Financial services include the following activities: Insurance and insurance-related services (i) direct insurance (including co-insurance): (A) life; and (B) non-life; (ii) reinsurance and retrocession; (iii) insurance intermediation, such as brokerage and agency; (iv) services auxiliary to insurance, such as consultancy, actuarial, risk assessment, and claim settlement services; Banking and other financial services (excluding insurance) (v) acceptance of deposits and other repayable funds from the public;

新大学日语阅读与写作1 第3课译文

习惯与礼仪 我是个漫画家,对旁人细微的动作、不起眼的举止等抱有好奇。所以,我在国外只要做错一点什么,立刻会比旁人更为敏锐地感觉到那个国家的人们对此作出的反应。 譬如我多次看到过,欧美人和中国人见到我们日本人吸溜吸溜地出声喝汤而面露厌恶之色。过去,日本人坐在塌塌米上,在一张低矮的食案上用餐,餐具离嘴较远。所以,养成了把碗端至嘴边吸食的习惯。喝羹匙里的东西也象吸似的,声声作响。这并非哪一方文化高或低,只是各国的习惯、礼仪不同而已。 日本人坐在椅子上围桌用餐是1960年之后的事情。当时,还没有礼仪规矩,甚至有人盘着腿吃饭。外国人看见此景大概会一脸厌恶吧。 韩国女性就座时,单腿翘起。我认为这种姿势很美,但习惯于双膝跪坐的日本女性大概不以为然,而韩国女性恐怕也不认为跪坐为好。 日本等多数亚洲国家,常有人习惯在路上蹲着。欧美人会联想起狗排便的姿势而一脸厌恶。 日本人常常把手放在小孩的头上说“好可爱啊!”,而大部分外国人会不愿意。 如果向回教国家的人们劝食猪肉和酒,或用左手握手、递东西,会不受欢迎的。当然,饭菜也用右手抓着吃。只有从公用大盘往自己的小盘里分食用的公勺是用左手拿。一旦搞错,用黏糊糊的右手去拿,

会遭人厌恶。 在欧美,对不受欢迎的客人不说“请脱下外套”,所以电视剧中的侦探哥隆波总是穿着外套。访问日本家庭时,要在门厅外脱掉外套后进屋。穿到屋里会不受欢迎的。 这些习惯只要了解就不会出问题,如果因为不知道而遭厌恶、憎恨,实在心里难受。 过去,我曾用色彩图画和简短的文字画了一本《关键时刻的礼仪》(新潮文库)。如今越发希望用各国语言翻译这本书。以便能对在日本的外国人有所帮助。同时希望有朝一日以漫画的形式画一本“世界各国的习惯与礼仪”。 练习答案 5、 (1)止める並んでいる見ているなる着色した (2)拾った入っていた行ったしまった始まっていた

新视野大学英语(第三版)读写教程第二册课文翻译(全册)

新视野大学英语第三版第二册读写课文翻译 Unit 1 Text A 一堂难忘的英语课 1 如果我是唯一一个还在纠正小孩英语的家长,那么我儿子也许是对的。对他而言,我是一个乏味的怪物:一个他不得不听其教诲的父亲,一个还沉湎于语法规则的人,对此我儿子似乎颇为反感。 2 我觉得我是在最近偶遇我以前的一位学生时,才开始对这个问题认真起来的。这个学生刚从欧洲旅游回来。我满怀着诚挚期待问她:“欧洲之行如何?” 3 她点了三四下头,绞尽脑汁,苦苦寻找恰当的词语,然后惊呼:“真是,哇!” 4 没了。所有希腊文明和罗马建筑的辉煌居然囊括于一个浓缩的、不完整的语句之中!我的学生以“哇!”来表示她的惊叹,我只能以摇头表达比之更强烈的忧虑。 5 关于正确使用英语能力下降的问题,有许多不同的故事。学生的确本应该能够区分诸如their/there/they're之间的不同,或区别complimentary 跟complementary之间显而易见的差异。由于这些知识缺陷,他们承受着大部分不该承受的批评和指责,因为舆论认为他们应该学得更好。 6 学生并不笨,他们只是被周围所看到和听到的语言误导了。举例来说,杂货店的指示牌会把他们引向stationary(静止处),虽然便笺本、相册、和笔记本等真正的stationery(文具用品)并没有被钉在那儿。朋友和亲人常宣称They've just ate。实际上,他们应该说They've just eaten。因此,批评学生不合乎情理。 7 对这种缺乏语言功底而引起的负面指责应归咎于我们的学校。学校应对英语熟练程度制定出更高的标准。可相反,学校只教零星的语法,高级词汇更是少之又少。还有就是,学校的年轻教师显然缺乏这些重要的语言结构方面的知识,因为他们过去也没接触过。学校有责任教会年轻人进行有效的语言沟通,可他们并没把语言的基本框架——准确的语法和恰当的词汇——充分地传授给学生。

肿瘤的免疫逃避

肿瘤的免疫逃避 正常机体每天有许多细胞可能发生突变,并产生有恶性表型的瘤细胞,但一般都不会发生肿瘤。对此,Burner提出了免疫监视学说,认为机体免疫系统通过细胞免疫机制能识别并特异地杀伤突变细胞,使突变细胞在未形成肿瘤之前即被清除。但当机体免疫监视功能不能清除突变细胞时,则可形成肿瘤。 然而,尽管机体有如此多样的抗肿瘤免疫效应,但肿瘤仍可在体内发生、发展,并且随着肿瘤的增长,肿瘤细胞能产生一些细胞因子。这些因子可以诱导机体产生一些抑制免疫的细胞,并诱导机体产生体液抑制因子,从而抑制抗肿瘤的免疫功能。肿瘤细胞自身也可以分泌一些具有免疫抑制作用的产物,侵犯局部转移的淋巴结,导致机体局部乃至全身的免疫功能低下。提示肿瘤具有一系列的免疫逃避机制来对抗机体的免疫系统。 1、肿瘤抗原调变作用 在肿瘤免疫过程中,T细胞的免疫功能起着关键性的作用。可溶性肿瘤抗原经抗原提呈细胞(APC)摄入后经加工处理,然后将处理后的抗原提呈给辅助性T细胞,后者通过分泌细胞因子促进杀伤性T细胞增殖,并产生特异杀伤作用。然而许多肿瘤细胞并没有死于机体的免疫杀伤,可以通过多种机制逃逸T细胞的免疫监视作用。 大多数肿瘤抗原的免疫原性很弱,不能诱发有效的抗肿瘤免疫应答。机体对肿瘤抗原的免疫应答导致肿瘤细胞表面抗原减少或丢失,从而肿瘤细胞不被免疫系统识别,逃避了机体的免疫攻击,这种现象称为“抗原调变”(Antigen Modulation)。这一理论在小鼠白血病细胞系中得到证实,该细胞系经抗体、补体处理后,丧失了细胞表面的胸腺白细胞抗原(TL抗原)。抗TL抗原的抗体与肿瘤细胞结合后,细胞表面出现斑点样的抗原分布改变,以后该抗原逐渐消失。在其他实验中也发现抗肿瘤抗体导致肿瘤抗原消失的类似现象。将肿瘤细胞与特异抗体或者细胞毒性淋巴细胞(CTLs)共同培养,也可以迅速诱导肿瘤抗原的丢失。抗原调变这一现象在生长快速的肿瘤普遍存在,抗原调变可由于细胞自身的机制或抗原抗体复合物脱落所致。这种肿瘤细胞表面抗原丢失仅反映肿瘤细胞表型的改变,经调变的细胞再次进入原宿主,抗原将再次出现,并重新诱发抗体产生。

RCEP区域自贸区协议全文第8章_附件3_中文版

第八章附件三 专业服务 一、每一缔约方应当与其领土内相关机构进行协商,以寻求确认两个或两个以上缔约方共同有意就与承认专业资质、许可或注册有关的问题开展对话的专业服务。 二、每一缔约方应当鼓励其相关机构与另外一个或多个缔约方的相关机构开展对话,以期承认专业资质并为许可或注册程序提供便利。 三、每一缔约方应当鼓励其相关机构与另外一个或多个缔约方的相关机构在有共同利益的专业服务部门中相互承 认专业资质,许可或注册方面的任何形式的安排进行谈判。 四、每一缔约方应当鼓励其相关机构在制定与承认专业资质、许可和注册相关的协定时,考虑与专业服务相关的协定。 五、如有可能,一缔约方可以考虑基于外国服务提供者在其本国获得的许可或得到承认的专业机构会员身份,无需进行进一步的书面审查,来: (一)采取步骤,实施临时或针对具体项目的许可或注册制度;或者 (二)如适当,授予此类许可或者注册。 一旦外国服务提供者符合本地适用的许可要求,此类临时或有限的许可制度不得以阻止该外国服务提供者获得本 地许可的方式实行。 六、为便利第一款至第三款所指的活动,每一缔约方应当鼓励其相关机构在共同同意的领域内致力于制定共同可 接受的专业标准和准则,可以包括:

(一)教育; (二)考试; (三)经验; (四)行为和道德规范; (五)专业发展和再认证; (六)执业范围; (七)本地知识;以及 (八)消费者保护。 七、应另一缔约方请求,被请求缔约方应当在可行的情况下,提供与专业服务提供者获得许可和认证的标准和准则相关的信息,或者提供与合适的监管机构或者其他机构相关的信息,使相关缔约方就此类标准和准则进行咨询。 八、每一缔约方应当鼓励其相关机构在适当的情况下,在制定相关专业的一般标准和准则时参考国际框架。 九、缔约方可通过服务和投机委员会定期审议本附件的执行情况。

相关文档
相关文档 最新文档