当前位置:网站首页 >> 作文 >> 最新机械专业英语论文优秀(五篇)

最新机械专业英语论文优秀(五篇)

格式:DOC 上传日期:2024-06-30 17:57:23
最新机械专业英语论文优秀(五篇)
时间:2024-06-30 17:57:23     小编:xiejingc

人的记忆力会随着岁月的流逝而衰退,写作可以弥补记忆的不足,将曾经的人生经历和感悟记录下来,也便于保存一份美好的回忆。那么我们该如何写一篇较为完美的范文呢?接下来小编就给大家介绍一下优秀的范文该怎么写,我们一起来看一看吧。

机械专业英语论文篇一

题目:mining and geological hazards

系 别 13级地科系 班 级 资源勘查1班 学生姓名

张政 学 号 034130106 指导教师 夏奎菊

mining and geological hazards the rapid economic development and production need to speed up the demand for minerals and consumption, which also brings greater opportunities for the development of mineral mining r due to the rapid development of lax management of small and medium-sized mines, plus the small mines, mining and mineral processing technology is backward, most of the environmental protection measures, exacerbated by the destruction of the environment in the mining area.a marked deterioration in the mining environment and geological disasters in mining issues is becoming more and more serious, potential disaster risks are increasing, and may at any time development of disaster, causing a scrap casualties, equipment and facilities damaged or even the closure of the mine, the waste of resources and serious types of geological hazards in mines there are many different kinds of mine geological disasters, according to the relationship between disaster and time can be spanided into sudden mine geological disasters(such as mine water inrush, gas explosion, rock burst, etc.)and delayed mine geological disasters(such as goaf ground deformation, environmental pollution, etc.).but the most common is the classification of the spatial distribution and genetic relationship of disaster..ation disasters of rock and soil mine ground and goaf collapse mainly occurred in underground mine goaf, if retained pillar insufficient, or because of damage of pillar and lose the ability to support, will cause ground ally those ore bodies buried in shallow, producing a more gentle mining area(such as coal mine), the phenomenon of the ground collapse is more bodies buried at relatively deep underground mining, if not timely backfill and caving it reaches a certain scale will produce the large area of addition, in the karst area, but also because of mine drainage drainage drainage and lead to the collapse of the cave above the subsidence not only destroy arable land, buildings and damaged roads, reservoir, but also a direct result of mines some underground roadway disrepair, or make atmospheric precipitation and surface water along the fracture collapse poured into the pit, causing flooding accident well until slope instability, landslide and rockfall is the main reason is the unreasonable mining, such as mining excessive skin disorders, slope angle caused by steep, the disaster occurred in the open pit mining of non metallic mines and building materials, rock burst pit in the rock burst is also called the mines is because around the pit and the top floor rock, after being subjected to the strong crustal stress and are strongly compressed, once mining hollowed out because of the free surface, may produce rock stress sudden release, resulting in large amounts of rock burst into pieces, and to the pit a considerable amount of spray, decrepitation and mines to bring hazards and induced earthquakes are caused by mining activity, which is caused by the earthquake, the source is shallow, the harm is big, the small magnitude earthquake can cause the underground and the surface of the earth's surface.a library database instability instability is mainly due to the collapse of the tailings dam break and harm caused by the formation of debris gs dam break accident often brings great harm to the life and property of mining area residents, but also cause huge damage and pollution to the environment.2, the underground water level change caused by the disaster mine water bursting water which is the most common mine disasters, sudden, large scale, serious tion process often of mine water inflow estimation problem because of the, mining process through old workings, through permeable fault, sudden encounter water cave or underground river, resulting in groundwater or surface water influx, caused by mine flooded and casualties in mud and sand bursting which is often accompanied with mine water bursting the mining process in sudden encounter water cave, common in the cave filling sediment and debris with groundwater together with the influx of, also some permeable faults and cracks often make shallow quaternary sediments with leakage surface runoff into the result is the tunnel is blocked on the sediment, machines, workers were buried by sediment, serious when even suffered a devastating blow to the mines.2.2.3 environmental pollution is another important form of mine to mining, mineral processing waste material, because of not effectively deal with is discharged into the rivers, lakes and the sea, causing environmental pollution will cause soil erosion, land desertification, salinization, groundwater flow etc..3, the cause of the disaster caused by the ore body the gas explosion and mine fire disaster that is most common in coal e of bad ventilation, the gas accumulation in the explosion, caused by underground operations personnel casualties, destroyed mine;mine fire in addition to found in coal mine, is also found in a number of sulfide e of sulfide oxidation in heat, heat accumulation to a certain extent, the occurrence of spontaneous combustion, causing fires in fire damage is great, but also a serious loss of underground mineral resources, such as some coal mines in the ground has been burning for a hundred years, the amount of resources loss is very huge, so that local climate change, crop and trees, a large number of dead, barren fields, serious environmental the increase of the depth of the exploitation of geothermal, geothermal hazards continue to has a lot of mining depth below 800m, the mining of high sulfur content, mining depth and high, the ground temperature is very geothermal disaster led to poor working conditions of miners, which seriously affected the normal production of the lactico-therapeutic measures according to the geological conditions and terrain features of different mines and the development and utilization of the mine, the distribution characteristics of disaster points are spanided into different levels of prevention and treatment in order to take the corresponding control lly spanided into the focus of prevention and control areas, sub key areas and the general prevention and control area.1, focus on prevention and control measures rational design of slope parameters, to strengthen the monitoring of slope, it is recommended to make retaining wall stability, after excavation, if the crack deformation, it is recommended to do a special engineering geological the existing disaster point, do a good job of slope reinforcement and prevention work, as far as possible to eliminate the mining induced disasters and the hidden dangers of design of the side slope and the slope of the slag field is strictly made, and the design of the retaining wall is made to set up the dam to prevent the debris full and rational use of slag field, is strictly prohibited to discard slag(especially in the road along).for the mining of tunnel, in the trenches must prepare support, so that the mining side edge support and avoid the harm due to the roof of the mine to collapse, roof fall, especially above the tenants to prevent caused by the upper ground for tunnel drainage, to prevent water gushing up monitoring points for monitoring, recording and analysis work, to ensure that in the disaster area to nip in the the mining, the unified planning of the mining area, the planning of mine reclamation work, restore the ecological function of mine.2, second emphasis prevention area prevention measures approach during the construction of highway and mines living area, lots of slope and a certain amount of waste slag formation, may lead to the formation of slope instability, caused landslides and landslides;along the way is not reasonable to leave a residue may cause soil erosion, may form a slope of mud rock flow, the rolling stones and flyrock ific and rational design of the slope parameters, and reasonable support and reinforcement, the top of the slope should be set drainage ditch, do a good job of surface drainage then site management, rational piling dregs, it is strictly prohibited to spoil;in the construction of block stones and stone advantageous location facilities: after the end of the mining, the waste slag field will be covered with soil, planting trees and forests, restoring vegetation.3, the general prevention and control measures in the area of no major building and construction projects, mainly due to the broken surface rock and soil prohibit cross-border exploitation, reducing human disturbance, good vegetation protection and soil and water conservation.4, the geological environment restoration program and measures to prevent soil erosion and restoration of vegetation and landscape, the mine must be planning to carry out mine reclamation work, in order to restore the ecological function of waste residue should not be indiscriminately stacked, must be stacked to the mining boundary beyond the boundaries of the mining waste residue inside, in the process of mining, there are plans to fill the waste to the mined out ll after treatment and then deposited soil and h the above geological environment restoration work, reduce soil erosion, restore the ecological function of mine, achieve the goal of ecological restoration and maintenance of human and environmental harmony.翻译:

矿产开采与地质灾害

经济的快速发展和生产需要加快对矿物的需求和消耗,这也为矿产开采企业带来更大的发展机会。然而由于迅猛发展的中小型矿山疏于管理,加之小型矿山的开采方法和选矿工艺落后,大多无环保措施,加剧破坏矿区环境。开采环境明显恶化,矿山地质灾害问题日趋严重,潜在的致灾隐患不断增多,且随时可能发展成灾,造成人员伤亡、设备报废、设施损毁甚至矿井关闭、资源浪费等严重后果。

矿山地质灾害的主要类型

矿山地质灾害种类繁多,按成灾与时间的关系,可分为突发性矿山地质灾害(如矿坑突水、瓦斯爆炸、岩爆等)和缓发性矿山地质灾害(如采空区的地面变形、环境污染等)。但最常见的是以灾害的空间分布和成因关系分类。岩土体变形灾害

矿山地面和采空区塌陷 地面塌陷主要发生在地下以井巷开采的矿山。在矿山采空区,若保留矿柱不足,或因矿柱受损而失去支撑能力,就会造成地面塌陷。特别是那些矿体埋藏较浅,产状较平缓的矿区(如煤矿),地面塌陷的现象更为常见。矿体埋藏相对较深的地下开采矿山,如果不能及时回填和崩落采空区,当其达到一定规模就会产生大面积塌陷。此外,在岩溶分布区,还会因矿山排水疏干而导致溶洞上方地面塌陷。地面塌陷不仅破坏可耕地资源、建筑物,毁坏道路、水库,还可直接导致矿山某些地下巷道的塌毁,或使大气降水和地表水沿塌陷裂缝灌入坑内,造成淹井事故,直至停工停产。

采矿场边坡失稳、滑坡与岩崩 主要原因是不合理开采如采剥失调、边坡角度过陡等造成,这种灾害多发生在露天开采的非金属矿山和建材矿山。

坑内岩爆 坑内岩爆又称矿山冲击,这是因矿坑周边和顶底板围岩,在受到强大的地壳应力作用而被强烈压缩,一旦因采掘挖空出现自由面,即有可能产生岩石地应力的骤然释放,导致岩石大量破裂成碎块,并向坑内大量喷射、爆散,给矿山带来危害和灾难。

采矿诱发地震 因采矿活动而诱发的地震,震源浅、危害大,小震级的地震即可导致井下和地表的严重破环。

场库失稳 场库失稳主要是由于尾矿坝溃决崩塌继而形成泥石流造成的危害。尾矿坝崩坝事故常给矿区居民生命财产带来巨大危害,同时也给环境造成巨大破坏和污染。

2、地下水位改变引起的灾害

矿坑突水涌水 这是最常见的矿山灾害,突发性强、规模大,后果严重。生产过程中常因对矿坑涌水量估计不足,采掘过程中打穿老窿,贯穿透水断层,骤遇蓄水溶洞或暗河,导致地下水或地面水大量涌入,造成井巷被淹、人员伤亡灾难。

坑内溃沙涌泥 这是常与矿坑突水相伴而生的灾害。当采掘过程中骤遇蓄水溶洞,常见溶洞中充填的泥沙和岩屑伴随地下水一起涌入,另外一些透水断层和地裂缝也常会使浅部第四纪沉积物随下漏的地表径流涌入坑内。其结果是使坑道被泥沙阻塞,机器、人员被泥沙所埋,严重时甚至会使矿山遭受毁灭性的打击。2.2.3 环境污染 环境污染是矿山灾害的另一种重要形式。因采矿、选矿产生的“三废”物质,由于未经有效处理就被排放到江河湖海中,造成环境污染公害事件。采矿还会造成水土流失、土地砂化、盐渍化、地下水断流等。

3、矿体内因引起的灾害

瓦斯爆炸和矿坑火灾 这种灾害最常见于煤矿。由于通风不良,使瓦斯积聚发生爆炸,造成井下作业人员伤亡,矿井被毁;矿坑火灾除见于煤矿外,也见于一些硫化矿床。因硫化物氧化生热,在热量聚积到一定程度时则发生自燃,引发矿山火灾。矿山火灾的危害极大,而且还严重损耗地下矿产资源,如有的煤矿在地下已燃烧上百年,其资源损耗量十分巨大,使当地气候发生改变,农作物和树木大量死亡,田地荒芜,环境严重恶化。

地热 随着开采深度加大,地热危害不断加剧。我国已有许多矿山开采深度达到800m以下,矿山因含硫量高,开采深度又大,地温非常高。矿山地热灾害导致矿工劳动环境恶劣,严重影响了有关矿山的正常生产。

防治措施

根据不同矿山的地质条件和地形特点及矿山的开发利用方案,以及灾点的分布特点划分不同层次的防治区,以便采取相应的防治措施。一般分为重点防治区、次重点防治区和一般防治区。

1、重点防治区防治措施

合理设计边坡参数,加强边坡监测,建议作挡墙稳固边坡,开挖后如果出现开裂变形,建议做专门的工程地质勘察。

对于原有的灾害点,做好边坡加固和预防工作,尽量消除因矿山开采而诱发灾害复发的隐患。

渣场弃渣严格作好方量及边坡坡度的设计,作好挡墙设计,设置拦渣坝,防止泥石流的产生。并充分、合理利用渣场,严禁随意弃渣(特别在公路沿线)。

对于坑道开采,在坑道内一定要作好支护,做到边开采边支护,防止因矿顶坍塌、冒顶等而产生的危害,尤其上方有住户处要预防引起上部地面开裂。

作好坑道的排水设计,以防因矿坑涌水造成危害。

设置监测点,作好监测记录与分析工作,确保在易于发生灾害地段防患于未然。

开采结束后,对矿区进行统一规划,计划进行矿山复垦工作,恢复矿山生态功能。

2、次重点防治区防治措施 在进场公路、矿山生活区建设中,会形成大量的边坡和一定数量的弃渣,可能形成边坡失稳,造成滑坡和塌方;沿途不合理的弃渣可能造成水土流失,可能形成坡面泥石流,可能有滚石和飞石危害。

科学合理设计边坡参数,并进行合理支护和加固,边坡上方应设置排水沟,做好地表挡排水措施。

加强工地管理,合理堆放弃渣,严禁随意弃渣;在险要地段建设拦挡滚石和飞石的设施:

开采结束后,将弃渣场扒平覆土,植树还林,恢复植被。

3、一般防治区防治措施 区内无主要建筑物和工程项目建设,主要可能因地表岩体的破碎而造成水土流失。应严禁越界开采,减少人为扰动,做好植被保护和水土保持。

4、地质环境恢复方案及措施 为防止水土流失和恢复植被和景观,矿山须规划进行矿山复垦工作,以恢复矿山生态功能。开采弃渣切勿胡乱堆放,必须统一堆放到开采境界线以外的矿山弃渣场内,在开采过程中,有计划地将弃渣回填到采空区。弃渣场经处理后再敷表土、植草种树。

通过上述地质环境恢复工作,减少水土流失,恢复矿山的生态功能,达到生态恢复与维护人类与环境和谐的目的。

机械专业英语论文篇二

met基因复制数量的增加赋予单克隆抵抗体抗met的能力并且建立药物依赖性

关键词:met,mv-nv30单克隆抗体,酪氨酸激酶抑制剂,抗性,药物依赖性 【摘要】:被mei原癌基因编码的酪氨酸激酶受体领导了具体抑制剂的发展并在癌症中起很重要的作用,其中现在一些正处于前进的临床试验阶段就以前的经验表明对大多数靶向治疗最主要的限制是抗性的出现。在对met单克隆抗体抗性和抗体对化学抑制剂旁路抗性(反之亦然)一无所知时,酪氨酸激酶抑制剂对met的抗性机制就已经被提出。ebc1型肺癌细胞是met基因扩增的结果,并且这种细胞对met抑制剂非常敏感,包括met单克隆抗体的单机形式在内。我们培养生成抵抗抗体的细胞发现这种抗性是由于met基因大量复制扩增和它的受体显著表达而来。这种过度表达可以使单克隆抗体的“脱落”活动达到饱和,并且能够防止表面的met受体的有效的下调和抑制剂的活化作用。值得注意的是mv-dn30抗体的抗性细胞是met耐受细胞对met酪氨酸激酶抑制剂也很敏感。除此之外,抗体抗性细胞还具有药物依赖性,mv-dn30的去处导致它们死亡是由于它们的过度信号表达。在实验中,对met酪氨酸激酶抑制剂存在抗性的细胞仍然对mv-dn30抗体的作用敏感。结果表明一种不连续的通过抗体和化学激酶抑制剂联合治疗可能会使靶向治疗的临床反应和对met抗体治疗旁路的抗性增加。

缩略语:mv-dn30--单价dn30,tkes—酪氨酸激酶抑制剂,hgf—肝细胞生长因子,mapk—有丝分裂原活化蛋白激酶 1.简介

可以抑制一个特定的目标分子化合物的靶向治疗法开辟了治疗癌症的新道路。与主要杀死扩散细胞为主的传统化疗不同的是靶向药物对肿瘤细胞采取一种更具体的治疗方式。靶向治疗依赖于“癌基因沉瘾”的概念。这就意味着单个基因的抑制或死亡是由于它们的沉瘾,或者至少抑制它们的生长(温斯坦,2002)。临床试验中的特定抑制剂的发展给肿瘤细胞的“achille’s heel”的识别提供支持(温斯坦和乔,2006)。

尽管靶向治疗在一部分癌症患者中取得了较优异的效果,还有重要的一点就是部分癌症病人对药物的选择表达没有起到治疗作用(原发性),除此之外,几乎总是一开始患者反应变成后来对治疗的抵抗和复发(继发性)。因此,最关键的就是要发现对治疗抵抗的机制并且找到绕过它们的方法。

癌基因和人类癌症密切相关,酪氨酸激酶起着决定性作用。这个观察发现许多肿瘤沉溺其中使得蛋白激酶成为了治疗癌症的理想目标(巴塞尔加,2006;gschwind等人,2004)。在临床诊断中主要使用一种较小的激酶抑制剂和单克隆抗体来抑制酪氨酸激酶。酪氨酸激酶抑制剂是一种可以抑制靶蛋白酶活性的小分子物质。它们能有效地瞄准膜结合位点和细胞内的激酶并且很容易在体内扩散。单克隆抗体已被广泛用于临床并取得了可观的成果。这些分子的优点在于它们具有很高的特异性。在癌症治疗中的可以抗癌的rtks单克隆抗体已经被批准在乳腺癌和结肠癌中使用(分别针对her2和表皮生长因子受体)并可作为抗血管增生的药物(针对血管内皮生长因子受体)。除此之外,很多针对于其他目标的单克隆抗体正处与发展和试验阶段。最近,一种作为癌症治疗目标的rtk受到关注,这种rtk是由致癌基因编码的在肝细胞生长因子上的酪氨酸激酶受体。在和肝细胞生长因子结合后,met活化并启动一个复杂的生化程序,这个过程被称作“浸润性上长”。在肿瘤组织中,浸润性生长的增进可以迫使肿瘤细胞从肿瘤组织中分解下来侵蚀基底膜,渗入基质中,甚至定居于新的组织中来实现转移。很多研究结果表明met在人类的许多肿瘤中具有活性,并且它与对直接激酶疗法的持续抗性密切相关。除此之外,还表明细胞显示大量复制(超过8张)和随之而来的过度表达和独立配体的激活都是沉溺于这种致癌基因和抗met药物的应答中。在前期设置得到的基本结果,几种特定的多目标的酪氨酸激酶抑制剂和直接针对于met或者hgf的抗体已经进入了临床试验阶段。在活体和动物模型进行的研究已经表明用tkis长期治疗会导致机体的治疗耐受性。对met tkis的抗性可能是由于一些机制,比如met基因扩增,过度表达,met点突变,met平行路径的激活和kras基因的扩增机制。然而,关于对met的单克隆抗体的再次具有抗性一无所知。

我们以前报道过主要针对细胞外的部分met的抑制性单克隆抗体的研究进展。它的诱导、再结合、达到met脱落阈值的能力使其有抑制活性,剩余的跨膜片段通过蛋白酶体降解途径处理掉。因此,dn-30结合到met后的结果是使其变成可溶性的诱饵met并且蛋白水解酶会讲解met激酶。这促进了met介导的生物活性的抑制作用。设计了这样一个过程就是因为dn-30的结合使得met激酶部分活化并且导致抗体介导的受体同源二聚体化和单价fab片段失去竞争活性的一个过程。

在这个研究中我们表明了不断用mv-dn30来治疗沉瘾癌细胞会使其具有抗性的原因是met基因的大量复制和met的过度表达超过了mv-dn30对其有效下调并使其失去活性的的能力。值得注意的是,mv-dn30抗性细胞还会一直对met tkis产生耐受性和敏感性。有趣的是,它们获得了药物耐受性,当受到mv-dn30的驱除致死它们的是过多的信号表达。我们还表明对met tkis 有抗性的细胞也对mv-dn30敏感,所以,mv-dn30和met tkis 对肿瘤细胞的作用是相互促进的。2.材料与方法 2.1.细胞和试剂

ebc1 细胞从一个患有转移皮肤肿瘤的病人取得,这个患者还患有肺鳞状细胞癌,病例是从日本癌症资料库购买得到。gtl16 是一种实验室里的克隆胃癌细胞系。hek-293t细胞系分离于人类胚胎时期的肾,a549细胞系来源于肺癌,都是从atcc购买来培养的。对mv-dn30有抗性的ebc1细胞可以通过一个逐步的方法培养得到,由sigma tau r&d 提供的通过暴露亲代细胞方法来增加抗met单价单克隆抗体的浓度。亲代细胞用10 mg/ml 的mv-dn30治疗约一个月,直到生成的r10细胞开始产生抗性为止,r10抗性细胞又用逐步增加浓度的mv-dn30治疗。所有的抗体耐受细胞培养在存在mv-dn30并且可以使它们产生耐受性的条件下。大约两个月可以分离到r20抗体抗性细胞,四个月可以分离到r80抗体耐受细胞。ebc1 and gtl16 细胞对met tkis pha-665752(ebc1 rpha 50 nm and gtl16 rpha 150 nm)都有耐受性,并且向描述的那样培养可以一直保持pha-665752的存在。该细胞系的遗传身份通过一个短的串珠状重复序列(str)识别,这段序列在2013年7月再次重复出现。we 我们利用下面的小分子:atp竞争行met tkis pha-665752(tocris bioscience)and jnj-38877605(john-son & johnson)和p38map激酶抑制剂sb203580(merck).和基因组dna的分析

用trizol 试剂提取得到的rna被检测到利用多文士病毒的逆转录酶和随机引物合成,cdna可以用实时的利用电源带动的绿色pcr混合的pcr 技术来实现扩增,根据制造商的说明下面的met和actin特异性引物要用到: hmet ex 19 fw: 50-agtttaccaccaagtcagatgtgt-30;hmet ex 20 rw: 50-gggctcctcttgtcatcagc-3;hactin fw: 50-ggaggagctggaagcagcc-30;hactin rw: 50-gctgtgctacgtcgccctg-30.根据制造商的说明用实时pcr技术来分析用纯化的dna基因组迷你试剂盒分析从细胞中提取到的基因组dna,这种技术是用 taqman基因表达的主要结构和taqman探针met基因和rnasep控制基因的实时定量pcr分析。met的mrna的成倍增加和ebc1中met基因的大量复制以及mv-dn30抗性细胞归一化然后被认可。2.3.蛋白印迹分析和脉冲追踪代谢标记

蛋白提取液(40 mg), 细胞上清液(20 ml)。在细胞裂解前2小时把met tki jnj-38877605加入到指定的地方。免疫印迹法使用了以下的初级抗体:the anti-met intracellular domain(icd)(zymed, #370100)from invitrogen, anti-met ecd(dl21)obtained as described(prat et al., 1991), anti-phospho-tyr1234-tyr 1235met(#3126), anti-akt(#9272), anti-phospho-ser473akt(#4060),anti-p44/42mapk(#9102),anti-phospho-thr202-tyr204p44/42mapk#9101),anti-p38mapk(#8690),anti-phospho-thr180-tyr182-p38 mapk(#9215), from cellsignaling;anti-vinculin(#v9131)from sigma and anti-b-actin(#i-19 sc-1616)from santa cruz ary igg hrp-peroxidase antibodies were from amersham.脉冲追踪实验的1106wt,或mv-dn30抗性的ebc1细胞(r80)都被平铺在60mm的盘里。r80 细胞保存在有或没有抗体(80 mg/ml)存在的条件下,而wt细胞要一直保存在有抗体的条件小16小时。然后,这些细胞在不含l-蛋氨酸但有500mmmcil-甲硫氨酸s35(脉冲)(易标记)的dmem培养基中处理20分钟。在这之后,去处放射性标记的培养基,细胞用1ml磷酸盐缓冲液盐水洗两次然后保存在有2mliscove的培养基中,培养基中加入2%fbs,在mv-dn30(80 mg/ml)存在或不存在脉冲3.6和16小时。之后,用免疫沉淀法(ip)在1ml细胞裂解液中进行测定(裂解缓冲液:1% tritonx-100存在下,20 mm tris-盐酸,5毫米edta,10% v / v甘油,150 mm nacl补充蛋白磷酸酶抑制剂)通过使用抗met icd dq13单克隆抗体,而ip法利用抗met ecd do24单克隆抗体对细胞培养2毫升上清液进行。细胞裂解液和上清液都在有已知抗体的培养基里培养16个小时,抗鼠igg抗体预包被琼脂糖凝胶蛋白珠形成免疫复合物沉淀下来。免疫沉淀物中的蛋白就会被8% sds-page 分开,然后转移到3mm的纸上,80度,48小时后蛋白质的放射性就会在投影膜上留下印记。2.4.生长和可行性分析

用于细胞生长和可行性分析的这些细胞被接种在96孔的培养板上,根据制造商的说明用已知药物在不同时期进行处理然后用细胞滴度发光细胞进行可行性分析。没经过处理的细胞控制在药物载体存在的条件下生长。所有的数据进行归一化到0天的药物治疗。2.5.荧光细胞分析

对结合在ebc1wt,r20,r80细胞质膜上的met进行免疫荧光着色,这些细胞要提前在有或没有mv-dn30存在的条件下培养24小时。荧光性的强度可以通过细胞荧光性分析检测到。用于检测的细胞要在pbs中用2%fbs洗涤并且在室温下用抗met ecd do24 mab(100 ng/ml)着色20分钟。然后在室温下细胞又在pbs中用2%fbs洗涤就会逐步产生抗鼠igg-rpe二抗然后用二脒基苯基吲哚作用20分钟。作为阴性对照,将不含初级抗met抗体的细胞进行染色。质膜结合的蛋氨酸的荧光强度(au为单位),通过使用graphpad prism软件绘制为箱形绘图图表。

2.6.慢病毒载体转导

ebc1 wt 细胞能稳定地在两种不同量的慢性病毒颗粒编码的met cdn转导,包括1mg(metþþ)和1.6mg(metþþþ)的p24病毒抗原,其浓度按说明确定。作为对照,wt细胞用含有空载体病毒颗粒感染。mv-dn30抗性细胞(r20 and r80)只用空载体感染。在感染48小时后接种细胞用于生物化学分析。转导细胞的可行性分析如先前描述的一样进行,让细胞在存在或不存在mv-dn30的条件下上长72小时。如先前所述,met的蛋白印迹分析和磷酸化的met蛋白水平和对感染细胞的mrna的表达水平实时定量pcr分析一样子细胞感染72小时后进行评估。2.7.药物协同作用分析

在抗met抗体mv-dn30和met tki jnj-38877605之间进行药物协同作用分析是对wt ebc1和接种在96孔板上的gtl16细胞在用药物治疗72小时后的细胞活力的研究。如果使用一个药品从药物剂量来说要比混合使用的ic50约高10倍左右,双重增加浓度可以用于单药使用和组合使用。评估细胞活力为前面描述的增效作用的药物效应多种分析研究,采用组合指数(ci)和chou and talalay 方法。使用相互排他性假设计算ci值(药物作用机理的不同,)软件,可上线的网站:http:///,和绘制功能的fa(由这两种药物的组合影响系统分数)。ci值< 1表明两种药物之间的协同作用。2.8.统计分析

同一个实验数据用graphpad prism软件进行两尾t检验分析至少有三种生物学具有统计学显著意义的结果。p值小于0.05被认为是有意义的。3.结果

-dn30耐药细胞株的建立

ebc1 肺癌细胞是met沉瘾细胞,它能放大met的扩增、过度表达和活化过程。met tkis或者mv-dn30对ebc1细胞里的met具有强烈的破坏它们生存和上长的能力的作用(图a~c)。

我们先前培养的ebc1细胞 对不同的ykis有抗性表明了这种抗性可能是由于met基因的进一步扩增。为了产生抗mv-dn30的细胞,我们采用逐步暴露ebc1原代细胞不方法来增加抗体的浓度,并且获得抗不同剂量抗体的细胞系(图1b;约的分步方法详见材料和方法部分)。, 进一步的实验中,我们使用耐20细胞(ebc1 r20)和80(ebc1 r80)毫克/毫升mv-dn30,剂量是分别是前面的约10倍和40倍,然后测这些细胞的抗体ic50(图1a)。在有mv-dn30存在的抗性细胞的生长速度一直和wt细胞差不多(图1c)。

正如前面提到的,mv-dn30发挥它的抑制活性是通过诱导met的结构域蛋白反正溶蛋白裂解,随后又通过蛋白酶体受体介导受体降解。这种反应减少了细胞表面的met的大量表达,抑制了met的活性和受体介导的生物学活性。如图1d所示,事实上,mv-dn30的治疗导致了再ebc1细胞中的met通过酪氨酸酶的磷酸化消除大量减少。与抗性细胞的生化分析相反的是显示了在相同剂量抗体存在的情况下,met也会磷酸化并且在质膜上的大量的met蛋白明显高于保存在相同条件下的wt细胞(图1d,e)。除此,尽管激活的下游目标akt和mapk激酶都被保存在有抗体存在的条件下(图1d)。

所有的数据表明,抗ebc1细胞的mv-dn30并不是通过一种足以消除它的结构的活性的方法来下调met,而是一种允许它的信号转导来调节它的结构磷酸化的方法.3.2.抗性细胞中缺乏mv-dn30抑制活性并不是因为它的活性不足

如图1d,e所示,用mv-dn30处理抗性细胞致使met大量减少这种减少比处于同等条件下观察的wt细胞中的减少更明显。我们想知道在抗性细胞里的抗体受损是否是由于met的结构域ipt4发生突变引起,这个结构域是它的集合位点,但是我们没有发现任何突变(数据显示)。

于是,我们评估了是否是抗性细胞中脱落的met胞外结构域(ecd)对抗体的反应被抑制了。在相同剂量mv-dn30存在的条件下培养了24小时的抗性细胞和wt细胞的上清液中,抗性细胞上清液中含有更丰富的脱落的ecd(图2a)。当对去处抗体24小时后的抗性细胞中met的表达和活化进行评估时,我们观察到met总量强烈增加特别是结合在细胞膜上的形式(图2b和图1)。对抗性细胞再引入mv-dn30细胞会导致上清液中met ecd含量更高,与在同样剂量处理的wt细胞相比,之后细胞内的met同时减少了并返回到平时观察的抗性细胞的一半水平(图2 d)。在脉冲代谢标记实验中也观察到了相似的结果:比起wt细胞,抗性细胞合成更多的met和mv-dn30来促进met ecd 释放并大量增加(图2e)。最后,用更高剂量抗体20 mg/ml(r20)处理ebc1细胞来更好的证明mv-dn30在抗性细胞中是具有活性的。图2f所示在抗性细胞中随着mv-dn30剂量是增加减少了大量met在细胞膜上的表达(图2a)和磷酸化(图2b)。

总之,所有的结果表明ebc1细胞的抗性不是因为mv-dn30活性缺乏,而是由于用它的饱和能力来促进了一种高效的met解离。

图1-抗mv-dn30的ebc1细胞分子表征。(a)在有mv-dn30的递增浓度的条件下培养了72小时的ebc1 wt细胞的细胞活力。对未经过处理的细胞(100%)± s.d.的归一化结果。(b)在指定浓度抗体的条件下培养72小时的ebc1 wt细胞或产生mv-dn30抗性的细胞(r10, r20, r40, r80)。与未经过处理的wt细胞(100%)± s.d归一化结果。(c)在mv-dn30(20 and 80 mg/ml)存在的条件下生长的ebc1 wt细胞ebc1r20和r80细胞的生长活性。与未经过处理的wt细胞(100%)± s.d归一化结果(***p < 0.001)。(d)在有指定剂量mv-dn30抗体存在的条件下处理24小时的ebc1wt ,ebc1r20和r80细胞的蛋白印迹。(e)结合met的在24小时在不存在或存在的血浆膜的荧光强度的箱图mv-dn30 r20和r80生长ebc1 wt细胞(au:任意单位)

图2—细胞耐受性并不是由于失去了对mv-dn30的敏感性。(a)在存在或不存在mv-dn30的环境下培养24小时的ebc1 wtr20和r80细胞的上清液中met ecd的蛋白印迹。(b)在有或没有(24小时去除)的ebc1wtr20和r80细胞中的蛋白(顶部)和蛋氨酸的酪氨酸磷酸化蛋白印迹。纽蛋白作为控制基础(c)在 ebc1 wt, r20 and r80 细胞中有或没有(24小时去除)mv-dn30的条件下在质膜上结合的met的荧光强度的箱图。质膜着色如图e。(d)在用mv-dn30处理(24h)的ebc1wt r20和r80 细胞中和抗性细胞(图2 d)中观察到的met总蛋白水平和met ecd 的蛋白印迹.(e)在有或没有mv-dn30存在下的ebc1wt和r80细胞里的met(来源细胞裂解液,上面)和met ecd(来源与细胞上清液,底部)的用脉冲追踪代谢蛋白标记法的免疫沉淀分析。(f)在递增mv-dn30浓度的环境下的ebc1(左图)和r20细胞(右图)的活性检测。未经过处理的wt细胞(左图)或者用20 mg/ml(100%)处理的r20(右图)统计结果(***p < 0.001, *p < 0.05)。3.3.对mv-dn30的抗性是由于met的扩增和过度表达

如上图所示(图2bed),mv-dn30抗性细胞表达met水平比原代细胞更高。我们怀疑这可能是由于增加的启动子活性或更高的mrna的可用性,因为你微rna的负控制微分表达了。在ebc1wt和抗性细胞的荧光素酶检测结果显示排除这些可能性(数据未显示)。

然后我们评估了基因扩增的情况是因为met大量复制是对激酶抑制剂存在抗性的机制。如图3所示,ebc1抗性细胞显示了met的大量复制(原代细胞的第24代到30代),这大约是二倍体细胞的15倍。当分析met的mrna水平时,我们观察到met的过度表达是wt细胞的2~3倍,达到了met正常表达细胞(a549 and hek-293t)的60~90倍。为了证明这种增加可能是为了维持对mv-dn30的抗性,我们将ebc1wt细胞放在不同量的met cdna条件下转导,通过比较ebc1r20和r80细胞mrna的表达水平来获得(图3)。我们观察到,met的mrna以2~3倍的速度剧增,这与在存在mv-dn30的条件下细胞的活性有关(图3d)。除此,尽管有mv-dn30的存在met保持磷酸化,这就解释了为什么细胞能够存活增加(图3e)。

所有实验结果表明,嗜met的ebc1细胞变得有抗性是因为met的进一步扩增和过度表达从而来阻止有效的抗体介导的对met活性的抑制。图3

3.4.抗mv-dn30的细胞也是嗜met细胞并有药物依赖性

为了证明抗mv-dn30的细胞也是嗜met细胞,我们用一种小分子的激酶抑制剂jnj-38877605来处理细胞。如图4a,b所示,抗mv-dn30的ebc1细胞在有抗体(20 mg/ml for r20 and 80 mg/ml for r80)存在的条件下生长情况显示了当用met激酶抑制剂jnj-38877605(10 nm or 250 nm)处理时,细胞活性的降低和met磷酸化作用的减弱。和亲代ebc1细胞相比,抗性细胞对jnj-38877605的敏感剂量更低,可能是由于在抗性细胞中met的蛋白合成和转运更高效。从抗性细胞的培养基中去除mv-dn30会导致met的表达增加(图2b),我们研究了过度表达的生化效应。抗性细胞培养在不存在mv-dn30的条件下,显示了活性下降(图4c)。这些细胞的蛋白印迹分析表明,随着时间的推移逐渐增加了磷酸化(图4d)。然而,24~48h后,after 24e48 h, p38 mapk的活化清晰可见证明了通常在细胞凋亡反应之前会有一个细胞应激反应。除此之外,在没有mv-dn30存在的条件下培养的抗性细胞中的p38 mapk会受到一种小分子sb203580 的抑制使得细胞活性得以恢复(图3)。这些数据进一步表明,p38 mapk信号对于参与药物依赖是至关重要的.重要的是要记住对于嗜met细胞抗met酪氨酸激酶抑制剂的药物依赖条件和黑色素瘤有获得性的药物依赖性已经被证明。为了证明当去除mv-dn30后过多的met信号使细胞凋亡是正确的,我们用低剂量的met yki处理抗性细胞让其充分减少但不会完全抑制met活性(图4)。事实上,如图4e所示,保存在不含mv-dn30并用 10 nm jnj-38877605(低于ic50浓度)处理的抗性细胞可以恢复它们的活性,并且这种水平类似于保存在有抗体存在的培养条件下的抗性细胞的活性水平。

总之,这些结果表明,mv-dn30抗性细胞都是嗜met细胞并且它们的繁殖和生存都有药物依赖性。图4

3.5.在嗜met细胞中mv-dn30和met tkis的协同作用

met-tkis 和 mv-dn30 都可以有效的抑制ebc1细胞的活性,我们想知道这两种抗met化合物是否表现增强或协同作用。单独或在有非常低剂量的mv-dn30存在的条件下(0.15~2.5毫克/毫升,从10倍以下的ic50开始),我们用逐步增加met抑制剂jnj-38877605的方法来处理ebc1 wt细胞。然后我们分析细胞活力和对药物治疗的两种药物的组合效应的性质,利用多药效果分析。如图5c所示,联合治疗导致的剂量尽可能低为1.25~20 nm jnj-38877605在0.15~2.5毫克/毫升mv-dn30存在活性降低。当在gtl16 wt 胃癌细胞上做这个实验室会得到相似的结果(图5d)。如图5a、b所示,多药效应分析表明了 ebc1 and gtl16 wt细胞的ci值都小于1,从而表明了jnj-38877605和 mv-dn30之间有药物协同作用.所有的这些数据表明用met tki和mv-dn30联合治疗可以有效地减少嗜met细胞的活性,剂量明显低于单独一种药物治疗的药量。图5

4.讨论

临床效应甚至是最有效的靶向治疗都被发展的耐药性所限制。显而易见,这种耐药性机制已经被广泛研究。从癌细胞和抗酪氨酸激酶抑制剂表明,获得性耐药的最常见的机制包括在药物目标本身的二次突变的患者获得的数据,激活下游信号转导或平行的信号转导通路的激活突变。即使对关于癌症是怎样产生耐药性抗体的了解很少,一些现象提示用抗egfr 和抗her2抗体治疗的病人体内有耐药机制的建立。在eger中的二次突变表明了免疫调节药物与egfr的结合受到破坏从而调节了抵抗力。除此之外,最近的研究还证明了egfr或her2的信号转导通路的激活可以分别绕过西妥昔单抗或曲妥单抗的抑制;这些包括egfr配体水平增加,met rtk的扩增或过度表达,下游或平行激活信号转导途径。

在癌症治疗中met受体已经变成了最具关注的目标,因为很多研究表明,met在多种人类肿瘤中具有组成性活性。它的失调可能是由于不同的机制包括过度表达,基因扩增,激活突变和受体介导的刺激自分泌或旁分泌的增加。生殖细胞的激活突变的识别和遗传型肾乳头状癌直接证明了met和人类肿瘤发生有关的概念。met的酪氨酸激酶的结构域中激活突变位点已经在散发肿瘤中确定。然而,在人类癌症中变化频繁的是转录表达的过程,这个过程是由原癌基因激活诱导抑癌基因失活和对特定的为mrna或缺氧刺激的下调过程。在原发性肿瘤中由基因扩增引起的met过度表达是少见的,但在肺癌和结肠癌中变得抗靶向其它rtks治疗的情况更频繁。临床证据表明癌细胞是沉溺在原癌基因中的细胞,在这种细胞中的met具有组织性活性并且它们的抑制结果就是使其致瘤性被破坏。然而,用小剂量的激酶抑制剂延长对嗜met细胞的处理会导致二倍抗性的出现,这种机制可以被维持比如met扩增或突变,kras的扩增或egfr家族成员的活化。在我们的研究中表明,在嗜met细胞中对met特定抗体mv-dn30的抗性获得是由于met复制数量的大量增加。这一现象的机理解释依赖于染色体外的met复制的动态调节,造成了一种癌症对治疗的适应性程序。met上调的增加是由于met基因扩增造成的这种现象并不明显当抗性细胞培养在有抗体(这种抗体介导了met的下调)存在的条件下,但是在没有这种抗体存在的条件却是很明显清晰的。我们观察到蛋白的增加平行下来是metmrna增加的2~3倍。ebc1 原代细胞的metcdna的转导可以达到一个和抗性细胞一样是表达水平,证明了事实上细胞表达更多的met可以减少对mv-dn30抑制活性的敏感性。wt ebc1细胞和大多数嗜met细胞一样可以表达比正常表达细胞的约30倍多的met;因此,在抗性细胞中2~3倍的增加可以引起met水平比那些正常细胞中的met水平高60~90倍。在缺氧的环境下观察a549细胞中met呈3倍增加才能满足它的生化效应,在抗mv-dn30的ebc1细胞中met增加可以解释为什么抗体能够有效地下调met。除此,作为抗性细胞识别增加的脱落的met导致了met ecd在细胞内的累积,并且脱落的ecd可以和细胞膜上的mv-dnd30结合位点结合从而减少抗体的抑制效应。抗性细胞仍然依赖于mei的信号传导来增殖和生存,met可以完全被tkir抑制从而导致它们的增殖受到抑制。有趣的是,当met变得非常活跃的时候,可以通过增加在mv-dn30存在下的met 的表达在这种适宜的有利的环境下来使其对药物的去除效果减弱。我们的结果和报告是一致的都表明了,正常细胞和肿瘤细胞不仅对信号(即该通路被激活的信号)的质量敏感而且对数量也很敏感(这种量就是怎样激活通路)。信号过量可导致细胞应激(在我们的情况下,通过p38 mapk活化)导致细胞死亡。事实上,在抗体缺乏,低剂量的遇到了tki治疗耐药细胞(抑制野生型细胞活力)增加了他们的活力,减少了信号的水平细胞持续强度的可能。das thakur做了一个类似的观察,这个人证明了人类黑色素瘤移植提供的抗药性,药物的去除使耐药肿瘤的肿瘤消退是由于依赖brat信号过量。有趣的是,他还表明不连续的药物剂量,运用耐药细胞在没有药物环境下的劣势来防止耐药性的发作。这在嗜met细胞中也被证明是正确的,无论是抗mv-dn30还是抗tkis的ebc1细胞都表现出药物依赖性并且去除药物会致死细胞。因此,可以想象,为了防止由于癌基因过量用药而产生抗性,间断性用药的机制可能会比连续用药更有效。

此外,我们表明,抗体治疗是活跃的细胞提供的抗酪氨酸激酶抑制剂,相反,tki治疗耐mv-dn30细胞有效。这并不奇怪,因为这两种类型的抗性细胞都是嗜met细胞,因此,依赖met的信号减少导致了它们的死亡。这种发现在临床上受到关注,因为它表明了用抗met的抗体治疗病人可能是没用的,病人的对tkis的抗性是由于met表达的增加或者是它们的毒性限制了tki的剂量。另一个处于我们的观察的结果是mv-dn30和met-tkis之间的协同作用。值得注意的是,尽管是几个实验,在用met tki和mv-dn30治疗时我们并没能过培养出抗性细胞。这些观察的临床意义提出了一点就是两种药物剂量的减少的可能性,结果它们又不利影响当需要保持治疗效应时有可能会降低或延迟。总的来说,在事实的角度评估我们的结果就是它们表明了两种可能会克服或防止对metmabs抗性的治疗策略:(i)一种就是用抗met的mab加上met tki的联合治疗(ii)利用抗性细胞的药物依赖性的定期间断性的节律治疗。

机械专业英语论文篇三

嵌入式系统研究

专业英语期末考查

第1页

嵌入式系统研究

1前言

智能软件agent是能够为用户执行特定的任务、具有一定程度的智能、能够自主的执行部分任务并以一种合适的方式和环境相互作用的软件程序。agent 有自主性、响应性、学习能力和社会性等特性。这使得它适合在高度动态的环境下做出及时的响应。

嵌入式技术和新一代移动通讯网络的发展使得嵌入式智能设备大量的涌现。这些设备的大都具有嵌入式操作系统的支持, 并运行着越来越丰富的应用程序。如何对这些应用程序进行测试,就成为一个需要研究的课题。本文将agent技术引入嵌入式智能设备的测试中,使用目标设备agent, 测试控制agent, 网络环境agent分别模拟和处理测试设备,测试工程师和测试环境的复杂性,利用agent自身具有的特点,提出了一种有效的自动化测试的方法。

2相关的研究及本文的思路

agent 所具有的自主性、响应性、学习能力和社会性等特性,使得它很适合处理复杂测试系统中的问题。将agent技术应用于测试领域已经有一些相关的研究,下面是具体的介绍。

jeongeun choi 和 byoungju choi [1]提出了一个基于agent技术的测试工具,它通过使用用户接口agent来处理和测试者的交互,使用测试用例选择agent来进行测试用例的选择,并使用回归测试agent进行回归测试,从而很好的实现了自动化的软件测试。但是他们提出的测试用例选择技术仅能在大量已有的测试用例中选择最佳的用例,不能减少编写测试用例本身的复杂性。

另外一些研究将agent 技术应用到了某一领域的测试中。yu qi、david hung 和 eric wong [3] 提出了一个基于agent 技术的web 应用程序测试方法。专业英语期末考查

第2页

他们使用agent技术降低了网络应用测试的复杂性。他们的方法不仅仅适用于web应用程序的测试,也适合于嵌入式智能设备的测试。

在实际测试过程中,测试人员很大的一项任务仍然是编写各种测试用例,要真正的提高测试效率,就要提高测试脚本的通用性,减少测试脚本的变化[2] [4]。常见的嵌入式智能设备测试工具(比如testquest)使用图像比对来判断目标设备的状态, 这种方法虽然实现了非侵入性的测试,但是存在两个问题,图片的抓取和传送消耗了大量测试资源,不同手机的用户界面风格变化很大,这使得测试脚本在用来进行新设备的测试时需要对脚本进行维护.然而,实际的设备中,当重要的事件发生时,系统会产生敏感事件来激励相关模块进行处理.如果能够在测试过程中捕获这些敏感事件,就能更加高效的进行测试.并且,只要操作系统相同,敏感事件的捕获方式也是一样,测试用例不会因为界面的变化而变化。本文用目标设备agent抽象和捕获测试过程中的敏感事件,并将敏感事件发送给测试控制agent。而测试控制agent收到敏感事件后,根据自己的知识,采取相应的动作的机制(如异常处理,重新调度测试等)加以处理。这正好可以作为agent的推理规则,用agent的智能性来屏蔽测试过程的复杂性。此外,考虑到目标设备处于复杂的网络环境中,我们利用网络环境agent来控制目标设备所处的网络信号,从而实现对设备所处网络环境的控制。基于agent的测试系统

3.1 总体结构

测试系统的最终目标是实现一个移动数字终端的自动化测试平台,能够对移动数字终端上的系统软件和应用层软件建立模块化、可重用的测试脚本库,提高各种黑盒测试的效率,自动化测试结果的生成,并实现测试结果的回放。

如图1所示:测试平台分为四层,包括用户接口层,测试控制层,通讯层和设备agent层。其中,过程监控模块,测试环境控制模块和设备agent层采用agent的思想进行设计,以更好的支持嵌入式设备的测试。

专业英语期末考查

第3页

用户接口层测试管理与配置脚本编辑器虚拟手机测试控制层测试结果验证测试资源库测试脚步执行测试环境控制测试过程监控agent通讯层设 备agent层synblan agent蓝牙 gprs 3g at视窗的移动agent定制agentat 接口

图1 测试系统的整体架构

3.2 系统基本执行流程

测试过程是对真实用户使用手机时“输入-反馈”模型的一个模拟。系统的基本的使用用例如下,首先用户通过脚本编辑器或者虚拟手机创建测试脚本并进行基本的配置,然后过程监控模块调度脚本开始执行,当脚本解释器解释执行脚本语句时,脚本解释器通常使用通讯模块向手机发送模拟按键,然脚本解释器进入等待状态,目标设备agent从通讯模块得到按键,执行按键动作,截取屏幕并返回给测试控制agent,或者如果手机有敏感世事件的发生(如来电,短信,异常等)也会反馈给测试控制agent,测试控制agent接到数据,再次激励脚本运行,并同时将测试结果输入存入测试资源库。脚本继续运行下面的语句,直到运行结束。3.3 目标设备agent

目标设备agent驻留在被测试的智能设备中,实现对目标设备的建模。本系统中它接收从pc机中接收到的控制命令,然后在智能设备中进行相应的操作,包括模拟键盘事件,截取屏幕并返回给pc,以及根据知识库中的配置的测试目标,通过推理,有所选择的将必需的状态信息主动通知测试宿主机。3.3.1设备agent 依赖的决策规则

系统事件报告决策规则(serd-rule)这个决策规则决定设备agent在获取到状态信息时,是否将状态信息反馈给上层系统。

专业英语期末考查

第4页

异常处理规则(em-rule)

这个决策规则决定了当agent发现测试中出现异常,要采取的处理方式。3.3.2 agent 属性

目标设备agent具有下面的属性: ⑴ 自主性

目标设备agent使得测试用户无需关注设备的细节,它是设备功能和状态的一个很好的抽象,通过目标代理agent,上层测试框架只需要执行相应的虚拟操作,则目标设备agent会自动将这些虚拟操作映射为对手机的实际操作,并且手机的响应和其它状态也能够自动的反馈给客户,这使得上层测试和底层的设备具体操作无关。

⑵ 智能性

当目标设备agent获取到一个变化的被测系统状态或信息时,它会根据推理规则,仅仅把和本次目标相关的信息发送给测试控制agent。目标设备agent还能够根据异常处理规则,合理的处理测试中出现的异常。3.4

测试控制 agent

测试控制agent 实现了对测试过程的建模。它主要实现三个目标: ⑴ 在测试过程中,对测试人员感兴趣的事件进行捕获,当这些敏感事件发生后,系统立刻执行预定义的动作,并为测试提供准确和详尽的日志。

⑵ 通过和脚本解释器交互,实现异步的事件通知和交互测试用例的执行。⑶ 处理测试过程中的异常,使得测试过程可以自我修复,进而多个脚本能够按照预先的调度正常运行.3.4.1测试控制agent的决策规则

⑴ 事件-条件-行动规则(eca-rule)

这是测试控制agent所依据的核心规则,它定义了某个测试所关心的事件,并根据比对条件,采取相应的动作。

⑵ 异常处理规则(em-rule)

测试控制agent也遵守异常处理规则,它能够检测测试过程中发生的异常事件,并执行相应的解决方案,使得测试能够顺利的进行。

专业英语期末考查

第5页

3.4.2测试控制agent 的属性

⑴自主性

自主性使得测试人员无需过分关注测试的细节,测试人员仅仅需要选择测试目标,测试控制agent就能根据知识库中的信息,自动生成eca规则表,并在脚本运行时,按照eca规则,捕捉敏感的事件并执行相应的操作。

⑵智能性

测试控制agent能够根据用户选择的测试目标,自动生成eca规则表,并根据eca规则,进行推理并采取相应的动作。测试控制agent还能根据异常处理规则来处理测试过程中发身的异常,保障测试过程的自动,平稳进行。3.5 网络环境agent 网络环境agent 实现了对网络环境的模拟和控制。为了测试手机的射频性能,通常使用基站模拟系统来提供设备所处的无线网络环境,并且利用编程接口,通过软件对设备的环境进行控制,使得复杂网络环境下对目标设备的测试成为可能。系统评估

为了评价本系统的有效性,我们设计了一个比较实验。试验在信息产业部泰尔实验室真实的测试项目中进行。我们将测试工程师分为两组,第一组使用本文的系统mobiletest进行测试,第二组使用业界著名的testquest pro 进行测试。测试的依据是中国通讯行业标准的数字移动台测试部分。测试的内容是根据这两个系统各自已经建立好的回归测试用例对新的智能手机进行回归测试,从而比较这两个测试工具的测试效率和脚本的可维护性。

实验度量了两个工具在测试不同种类的测试用例时,自动化执行的用例所占的百分比。从表中可见,虽然testquest 在功能测试上有更高的自动化率,在压力测试,多状态测试,多任务测试,临界测试和总计中,mobiletest有更好的测试覆盖率。这是因为在后四种测试中,测试用例需要不断追踪系统的状态,使用图片比对机制的testquest 很难完成这些工作,而mobiletest 却能使用agent返回的敏感事件来进行处理。此外,mobiletest 完成测试任务的时间时15天,比testquest 的测试效率要高。

专业英语期末考查

第6页

5总结

本文提出了一个基于agent技术的嵌入式智能设备的测试方法,它用agent技术对嵌入式智能设备测试过程中的被测试设备,测试者和网络环境进行模拟和控制,很好的屏蔽了嵌入式智能设备的复杂性,提高了测试的效率和脚本的可重用性。将来的研究工作中,我们会进一步拓展整个测试系统,使之能够支持整个测试的生命周期。

本文作者的创新点:本文将软件agent技术引入到嵌入式智能设备的自动化测试中,利用agent的特性,很好的屏蔽了嵌入式智能设备测试中,测试者,待测设备,网络环境的复杂性,提高了自动化测试的效率。

来源于:《 journal of electronic science and technology》

专业英语期末考查

第7页

附:英文原文

embedded system research 1 introduction

intelligent software agent is the ability to perform specific tasks for the user, with a certain degree of intelligence, able to perform some tasks and autonomy in a proper manner and environment interactions software has autonomy, responsiveness, learning and social and other makes it suitable for highly dynamic environment to make a timely ed technology and the development of new generation mobile communication networks makes the emergence of a large number of embedded intelligent of these devices with embedded operating system support, and run an increasingly rich to test for these applications to be a need to article intelligent agent technology into embedded devices test, using the target device agent, test control agent, network agent and treatment were simulated test equipment, test engineers and test complexity of the environment, the use of agent has its own characteristics, proposed an effective automated testing.2 related research and ideas of this article

agent possess autonomy, responsiveness, learning and social and other features, makes it very suitable for handling complex problems in the test technology in the test area will already have some relevant research, the following is a specific un choi and byoungju choi [1] proposed a testing tool based on agent technology, which through the use of agent to handle user interface and test those interactions, the use of agent to carry out the test case test case selection choices, and use the agent for regression testing regression testing, so a good automated software they can only be made in a large number of test selection techniques select test cases has been the best use cases, write test cases can not reduce its complexity.专业英语期末考查

第8页

other studies will agent technology applied to a field qi, david hung and eric wong [3] proposed a web-based agent technology application testing technology to reduce their use of the network application testing method not only for web application testing, but also for the testing of embedded intelligent the actual testing process, testers great task is still the preparation of various test cases, to really improve test efficiency, we must improve the general test scripts, reduce test script changes [2] [4].common test tools for embedded smart devices(such as testquest)using image comparison to determine the status of the target device, although this method to achieve a non-invasive test, but there are two problems, the image capture and transmission consumes a lot of test resources, the different style of phone's user interface has changed dramatically, which makes the test script used for testing new equipment required for maintenance of the r, the actual device, when an important event occurs, the system will generate sensitive events to encourage the relevant module for during the test capture these sensitive matters, will be able to test more , as long as the operating system the same sensitive way to capture the same event, the interface test cases will not this paper, the abstract and the agent target device during the test capture of sensitive events and control of sensitive events are sent to test receives the test control sensitive incident, according to their knowledge, take appropriate action mechanisms(such as exception handling, re-scheduling the test, etc.)to be is precisely the inference rules as agent, with the intelligence of agent to shield the complexity of the testing addition, given the target device is a complex network environment, we use the internet agent to control the target device environment in which the network signal, enabling the network environment in which the control device.3 agent-based test system 3.1 the overall structure

test system is to achieve the ultimate goal of a mobile digital terminal's automated testing platforms to the mobile digital terminal on the system software and 专业英语期末考查

第9页

application layer software build modular, reusable test script library, to improve the efficiency of various black box testing, automation the generation of test results and test results to achieve 1: test platform spanided into four layers, including user interface layer, the test control layer, communication layer and the equipment agent them, the process monitoring module, test equipment, environmental control module and the use of agent agent layer design ideas to better support embedded devices user interface layertesting management and configurationscript editorvirtual cell phone

testcontrol layer test results show testing steps executiontestrepository test environment control testing process monitoring agentcommunications layer set for agent layerbluetooth gprs 3g atsynblan agent windows mobile agentcustomization agentat 接口figure 1 the overall architecture test system 3.2 the basic system implementation process

testing process is a real cell phone users "inputcondition-action rules(eca-rule)

control agent this is a test based on the core rules, which defines a test case of interest, and according to comparison conditions, take appropriate action.⑵ exception handling rules(em-rule)

test control agent also comply with exception handling rules, which occurred during the test can detect abnormal events and to implement appropriate solutions to enable testing to proceed smoothly.3.4.2 test control agent's properties ⑴ autonomy

autonomy to make the tester without too much attention to the details of the test, testers just need to select the test objectives, test control agent information can be based on the knowledge base, automatically generate eca rules table, and run the script, according to eca rules to capture sensitive event and perform the appropriate action.⑵ intelligence

专业英语期末考查

第12页

test control agent to the test objectives based on user selection, automatically generates eca rules table, and according to eca rules, reasoning and take appropriate control agent can exception handling rules based on the testing process to deal with abnormal body fat to protect the testing process automatically and smoothly.3.5 agent network

network agent implements the network environment simulation and order to test the phone's rf performance, usually the base station simulator to provide a device in which the wireless network environment, and use programming interface, the software environment to control the device, making the complex network environment, the target device under test as possible.4 system evaluation

in order to evaluate the effectiveness of the system, we designed a comparative testing laboratory in the ministry of information industry of the test project for will test engineers spanided into two groups, the first group to use this system mobiletest test, the second group uses the industry's leading testquest pro is based on the number of china's telecommunications industry standard part of mobile station content is based on both systems return to their already established on the new test cases for regression testing of smart phones to compare these two test tools, test efficiency and maintainability of the 1 regression test results:

two experimental tools to measure different types of test cases in the test, the automated implementation of the percentage of use be seen from the table, although the functional testing testquest higher automation rates, the stress test, multi-state testing, multi-tasking tests, critical test, and the total, mobiletest better test is because after the four tests, the test case need to constantly track the system state, the use of pictures than on the mechanism of testquest difficult to accomplish these tasks, and mobiletest able to use the agent to return to the treatment of sensitive addition, mobiletest time to complete the test task 15 days, testquest's test efficiency than higher.专业英语期末考查

第13页 conclusions

this paper presents a technique based on embedded intelligent devices agent test method, which uses embedded intelligent agent technology equipment is tested in test equipment, test and simulate and control the network environment, a good shielding of the embedded the complexity of smart devices to improve the test efficiency and reusability of the research work, we will further develop the test system so that it can support the whole testing life innovation of the author: this article introduces the software agent technology to automate testing of embedded intelligent devices, the use of agent's features, nice screen test for embedded smart devices, testers, test device, the complexity of the network environment and increase the efficiency of automated :《 journal of electronic science and technology》

机械专业英语论文篇四

a parallelization cost model for gpu

gpu并行成本模型 2009137127 周幼兰

abstract-using gpu for general computing has become an important research direction in high performance computing r, this is not a lossless optimization to the impact of device initialization cost, data transmission delay, specific characteristics of programs, and other factors, the general computing on gpu may not always achieve the desired speedup, and sometimes results in program execution performance the basis of in-depth analysis of gpu internal processing mechanisms, the main factors affecting gpu implementation performance are pointed out, and a parallel cost model for gpu based on static program analysis is proposed to provide judgement basis for using gpu in general computing.摘要:在高性能计算技术领域,使用gpu执行通用计算已成为一个重要的研究方向。但它并不是一种无损优化方法。由于受设备初始化成本、数据传输延迟、程序本身特征和一些其他因素的影响,基于gup的通用计算不可能总是达到预期的加速,有时还会导致程序执行性能下降。在对gpu内部处理机制进行深度分析的基础上,得到影响gpu执行性能的主要因素,且得出基于静态程序分析的gpu并行成本模型为gpu在通用计算中的使用提供了判断依据的结论。

uction graphics processing unit(gpu)has developed at a speed much faster than the moore’s law in recent years, not only improving image processing, virtual reality, computer simulation, and the development of related applications, but also providing a good running platform for general-purpose computing using gpu beyond graphic application of gpu in general-purpose computing makes a series of new challenges faced by the development of the high performance computing tly, in order to reduce the programming complexity of gpu in general-purpose computing, many gpu manufacturers and research institutions proposed a number of programming languages and programming models close to traditional programming methods, but different styles, such as brook+[1], cuda[2] and opencl[3], r, as gpu has its own specific characteristic of hardware architecture and development, programmers must have a high level of gpu for general-purpose computing, the increased performance achieved in large part depends on the hardware knowledge and programming skills of present, the most studies for the gpu’s parallelism both at home and abroad directly rewrite and transplant programs on the basis of original serial e software programmers often lack a deep understanding of the hardware platform and have no corresponding capability of programming hardware programs, program transplantation lead to the increased effects achieved of all kinds of applications accelerating general-purpose computing using gpu have obvious difference [4-6].program performance analysis technology as a basic method of understanding program behavior, plays an important role for comparing the performance difference between different program implementation, identifying performance bottlenecks of programs, and understanding the hardware resource utilization, and is the important part of development and optimization of high

performance computing programs [7].how to take advantage of program performance analysis technology and combine the architecture characteristics of cpu and gpu to guide the planning and optimization of parallel programs so that a variety of computing resources of cpu and gpu are fully utilized is a problem worthy of study using gpu in general-purpose computing at present.简介:

近几年来,计算机图形处理器(gpu)比摩尔定律发展得更迅猛,这种发展不仅体现在改善图形处理、虚拟现实、计算机模拟以及相关运用方面,还体现在为使用gpu作图形以外处理的通用计算提供了良好的运行平台。

gpu在通用计算方面的运用面临着高性能计算技术发展的一系列新挑战。目前,为了减少通用计算中gpu编程复杂性,许多gpu制造商和研究机构提出了一系列编程语言和编程模式,这些编程模式类似于传统德编程方法,但是具有不同的编程风格,例如brook++、cuda以及opencl等等。然而,当gpu拥有自己独特的硬件结构和发展特征时,与此同时程序员必须拥有较高水平的专业技能。通用计算中使用gpu来提高性能很大程度上取决于程序员的硬件知识和编程技术。迄今为止,国内外对于gpu的平行性研究大多数是直接写入和将程序直接植入到原始串行程序基础上。由于软件程序员往往对硬件平台缺乏深层次的了解,并且没有相应的编写硬件程序的能力,所以程序植入导致了各种各样的运用程序的增加效果有着明显的差异,这些运用程序加速了使用gpu的通用计算。作为一种理解程序行为的基本方法,程序性能分析技术在比较不同程序执行的性能差异、找出程序的性能瓶颈和了解硬件资源的利用率方面扮演着重要角色,而且它还是高性能计算程序的重要组成部分。如何利用程序性能分析技术以及如何结合cpu和gpu的体系特征来引导平行程序的规划和优化以至cpu和gpu的大量计算资源得到充分利用,是目前gpu在通用计算方面一个值得探讨的问题。

sion there are a number of studies on the applications related to using gpu in general-purpose most researches focus on using gpu to improve the execution performance of r, how to measure the costs of gpu at runtime is less the perspective of gpu’s internal operation mechanism, analyze the key factors affecting the gpu implementation performance, and propose a cost test algorithm based on static program results obtained by experiments show that the algorithm proposed can estimate relatively accurate gpu execution performance, and thus provide a useful reference for transplantation of traditional high performance computing to gpu.结论:

与使用gpu作通用计算相关运用的研究实例比比皆是,且大多数研究将使用gpu来提高运用程序的执行性能为研究中心,但是至于怎样衡量gpu运行时的成本却很少有人提及。本论文从gpu内部运行机制出发,分析影响gpu执行性能的主要因素,提出基于静态程序分析的成本测试算法。实验所得结果说明所提算法能够相对精确地评估gpu执行性能从而为传统的高性能计算的在gpu中的移植提供了一个实用性的参考。

comment: cost model has been widely used in the computer field as a way to evaluate whether a program is excellent or quite a number of researchers in computer field has proposed various kinds of cost models for gpu, of which most are under certain this paper give us a new perception of cost model for gpu in general-purpose parallelization cost model for gpu can be generally applied for many application authors attempt to estimate the cost ly they take the gpu initialization cost, transmission of data cost as well as the program execution cost into aspect use a special algorithm to calculate the the cost is measured by the time of each this paper ,we can get through the authors’ idea very well ,because they are well organized in form and shown clearly in graphs, charts as well as in parallelization cost model is more accurate, flexible and portable than models of the we should learn the method they study a is to consider a question in a broad if we keep thinking in this way ,our ability of doing scientific research will be greatly the same time, we should keep close watch on the field of it is such an important processor that it is used widely used on modern is even considered the core graphics processor of it develops faster nowadays as the need rises.

机械专业英语论文篇五

课程论文

院系 物理与电子工程学院专业 电子信息工程班级 电工1111班学生姓名 简东阳学号2011140131任课教师 罗倩倩

2013 年12月26日

switching technology present situation and development trend

jiandongyang

hubei university of arts and sciences

@

abstract:direction in the future, more extensible features will become the important characteristics of a new generation of internet, the exchange of technology, will be as a key technology to host this extensible ing technology in scale, function, performance, safety and service and other aspects have better extensibility features, will be a new generation of internet architecture in the ds:network technology;the internet;switching technologythe present situation of the exchange of technologythe rapid development of network technology, ethernet is always r, with the deepening of the network technology application, the network development scale and speed are only the speed of the lan got improved, gigabit ethernet also gradually became ion to network of high reliability, high performance, easy maintenance and reduced cost, and these factors is dependent on the using kind of networking technology;equipment vendors would on the basis of not harm the interests of the user network functions and pursue the considerable the network, there have been a mature traditional layer 2 switching technology, and the function of the routing layer 3, and a high service level of network layer ing technology of a single traditional layer traditional layer 2 switching technology, is a special single, it contains only the data link layer 2 switching technology is mostly used for small local area network(lan), the machine numbers keep in 20 or 30 sets of the following is the security of the network environment, fast switching function, multiple access port, low price which the three layer 2 switching technology has has solve the problem that the small network users.2.1 the third layer switching technology with routing function

in order to solve the problems of the broadcast domain, for the first time in 1997 the third layer switching technology with routing function 3 switching technology has now become a main force of the construction of multiple business fusion a large local area network(lan), can increase the dangers of broadcast storm, in order to reduce the harm, we must spanide a large local area network(lan)according to the function or the region into multiple small local area network(lan), so that it can reduce the harm of broadcast only use layer 2 switching technology, a large number of visits between subnets cannot be ed by the layer 3 switching technology(layer 3 switches)is very good to solve the , layer 3 switching technology is more and more mature, and also in constant development and innovation, it occupies a more and more important status in the network.2.2 layer 7 switching technology with the function of network service

unlock every layer encapsulates of each data packet, identify the application layer information at the same time, is the functions of layer , many service providers focus gradually shifted to how to make full use of broadband resources and how to manage the internet application, 7 switching technology can handle network application layer data forwarding well, the network service level can be improved and it also can make the network administrators and make the users have a lower cost to optimize the network r it is business to consumer e-commerce, market sales of unmanned automation, on-line customer support, personnel construction and planning, customer service, firewall load balancing broadband and intelligent filter content and so on, can be dabble in by layer 7 switching development trend of switching technology

research in recent years the development of the exchange network architecture and related algorithms, is mainly to study of switching ing network is roughly by single-stage exchange structure and multiple exchange structure of two kinds of -stage exchange in the performance and scale structure is hard to expand and develop, so the new exchange structure instead of a single-stage exchange structure is ed with single-stage exchange structure, multi-level exchange structure has a very big advantage is the extensions is good, if you want to achieve more mass exchange network, multistage switching structure will be the first choice, and it is also considered very system structure of open-ended standardization and data packet based will gradually become the next generation network of the new definition, this is also to develop more and more effective applications and business functions, at the same time can quickly adapt to the e higher performance and greater scale, is the main goal of the studying exchange order to achieve this goal,it is bound to reinforce the research of the project, the developing trends in the future may have the following:

(1)multistage switching structure instead of the single stage exchange structure;

(2)reduce the internal blocking of multistage switching structure;

(3)build more mass exchange application of new technology requires a lot of time to continue to improve and ing to the report, the development of next generation network technology is gradually mature and e that the exchange technology will be developed in network technology and business development of the evolving in the business operation and competition in the future, differential operators will also play an increasingly important sion

high technology development change rapidly, more and more ing technology has become more intelligent,order to reduce the cost, and make the network of high reliability, high performance, easy to maintain and extend the guarantee,switching technology from the initial layer 2 s developed to the layer 3 and now 7 layer,it is still in the continuous development and e that the network intelligent management is not far from gh there is a problem but it will not hinder the exchange of technology application and development, operators and equipment suppliers will make these problems get very good settlement,constantly positive test, unceasingly perfect, eventually there will be a good nces:

[1] feng huibin on the application of modern switching technology course teaching reform research [j].journal of education teaching bbs, 2012(s4).[2] wu next generation network of the soft exchange technology [j].journal of railway signal engineering, 2005(01).

全文阅读已结束,如果需要下载本文请点击

下载此文档
a.付费复制
付费获得该文章复制权限
特价:5.99元 10元
微信扫码支付
已付款请点这里
b.包月复制
付费后30天内不限量复制
特价:9.99元 10元
微信扫码支付
已付款请点这里 联系客服