History of AI at Edinburgh

advertisement
МИНИСТЕРСТВО ОБРАЗОВАНИЯ И НАУКИ РЕСПУБЛИКИ КАЗАХСТАН
СЕМИПАЛАТИНСКИЙ ГОСУДАРСТВЕННЫЙ УНИВЕРСИТЕТ ИМЕНИ ШАКАРИМА
КАФЕДРА ТЕОРИИ И ПРАКТИКИ ПЕРЕВОДА
УЧЕБНО-МЕТОДИЧЕСКОЕ ПОСОБИЕ
ПО РЕФЕРИРОВАНИЮ И АННОТИРОВАНИЮ ТЕКСТОВ
НА АНГЛИЙСКОМ ЯЗЫКЕ
Семей - 2010
ИбраеваА.А.,
Мухатова
А.Д.
Учебно-методическое
пособие
реферированию и аннотированию текстов на английском языке.
СГУ имени Шакарима. – 2010 г. – 69 с.
по
Рецензенты:
Джамбаева Ж.А., кандидат филологических наук, доцента
кафедры русской и иностранной филологии СГПИ
Кадыров А.К., кандидат филологических наук,
Доцент кафедры казахской филологии
Тогузбаева Г.М., старший преподаватель кафедры
теории и практики перевода
Данное учебно-методическое пособие предназначено для студентов
старших курсов специальности «Переводческое дело».
Целью
пособия
является
совершенствование
навыков
информационного свертывания текстов, расширения лексического запаса в
области научной терминологии.
Предисловие
Целью пособия является совершенствование навыков реферирования и
перевода.
Реферирование иноязычной научной литературы является
прекрасным способом обучения, который вырабатывает активный
поисковый характер восприятия речи, формирует установку на смысловой
анализ содержания, ускоряет темп чтения, воспитывает внимание к
языковым средствам текста. Свойственный реферированию способ приема и
переработки
информации
развивает
творческие
способности,
совершенствует навыки самостоятельной работы с научной литературой.
Кроме того, реферирование является важным звеном в профессиональной
подготовке студентов, поскольку оно имеет большую познавательную и
образовательную ценность в углублении знаний по изучаемому предмету, в
расширении лексического запаса терминами и конструкциями научного
стиля речи, составляющими основу научного текста.
Пособие состоит из трех частей. Первая содержит обучающую статью, в
которой дается определение реферирования и рекомендации по
составлению реферата.
Все методы реферирования построены на смысловой компрессии текста,
которая предусматривает устранение избыточности в тексте, т. е. элементов,
которые дублируют друг друга.
Во второй части представлены тексты для реферирования,
сопровождаемые вокабуляром, заданиями и образцами реферирования.
В зависимости от поставленной перед читающими, цели различают
следующие виды чтения:
1.Ознакомительные: а) конспективные, б) реферативные;
2. Просмотровые: а) поисковые, б) обзорные, в) ориентирoвочные;
3. Изучающие: а) филологические; б) критические; в) углубленные.
Целью просмотрового чтения является получение общего представления
о
содержании
текста
или
поиск
нужной
информации.
Полученная в результате такого чтения информация может быть оформлена
в виде аннотации.
Ознакомительное чтение – это более внимательное чтение текста без
словаря (словарь здесь может оказаться нужным только для того, чтобы
узнать значение нескольких ключевых слов). Его цель – полностью понять
содержание текста, не переводя его. Зафиксированным результатом такого
чтения является реферат.
Изучающее чтение нацелено на полноценное усвоение прочитанного,
на расширение словаря и расшифровку языковых форм текста. Такое чтение
может быть оформлено в виде перевода текста со словарем.
Третья часть включает аутентичные тексты современной зарубежной
периодики, может быть использован как для аудиторной, так и для
самостоятельной работы студентов.
Оглавление
Предисловие.........................................................................................................3
Часть
1.
Теоретические
основы
реферирования
и
аннотирования......................................................................................................4
Этапы аналитико-интетической переработки
информации (АСПИ)
…………………………….. ..................................6
Аннотация ...........................................................................................................8
Реферат ………………………………………………………………….............9
Типизация рефератов …………………………………………...........................10
Методика реферирования ………………………………………………….......13
Структура реферата ……………………………………………………………15
Модель реферата научной статьи ……………………………………………..16
Речевые клише для написания рефератов и аннотаций………………………18
Часть 2. Практические задания ……………………………….........................21
Часть 3. Тексты для реферирования …………………………………………58
Использованная литература……………………………………………………………………... 66
ЧАСТЬ I Теоретические основы реферирования и аннотирования
В середине ХХ века стало заметно возрастание объема информации,
значительно выросли документные потоки и массивы. В развитии общества
наступил период, в качестве характеристики которого стали называть
информационный взрыв (кризис). Все чётче проявляются противоречия
между ограниченными возможностями человека по восприятию и
переработке информации и существующими мощными потоками и
массивами разнообразных документов. Кроме того, в мире существует
большое количество документов, не несущих в себе нового. Так возникают
экономические,
политические
и
другие
социальные
барьеры,
препятствующие распространению новых знаний. В данных условиях
возрастает значение документов, созданных в результате аналитикосинтетической переработки значительного количества источников. В
результате производится новое знание на основе переработки имеющейся
информации.
Совокупность
операций
аналитико-синтетической
переработки
документальной информации, преследующих цель создания вторичных
документов, или выражение содержания исходного текста в более
экономичной форме при сохранении или некотором уменьшении его
информативности в производном тексте, называют информационным
свертыванием.
Для сферы общения (информационных коммуникаций), в качестве
основного средства которой выступает естественный язык, характерны две
тенденции – стремление к избыточности (развертыванию), обеспечивающей
надежность восприятия сообщений, и стремление к недостаточности,
экономии речевых средств (свертыванию), обеспечивающей повышение
«пропускной способности» информационных каналов.
`Свертывание (развертывание) в сфере информационных коммуникаций
рассматривается как информационное свертывание. Оно сводится к
определению и использованию необходимого и достаточного объема
речевых средств при описании некоторой ситуации, обеспечивающих
оптимальные условия общения, т.е. понимание сообщения без его
избыточности.
Можно сказать и так: свертывание – это процедура определения уровня
необходимой и достаточной информативности сообщения в зависимости от
стоящей коммуникативной задачи. При этом свертывание сопровождается
уменьшением физического объема сообщения, а развертывание –
соответственно его увеличением.
Информационное свертывание (развертывание) может быть семантическим
и лексическим.
- Семантическое связано с изменением информативности сообщения.
- Лексическое оставляет смысл сообщения без изменений, но преобразует
его знаковую форму.
Такое деление несколько условно, поскольку семантическое свертывание
сопровождается обычно лексическими преобразованиями; с другой
стороны,
сокращение иногда только одного слова, выступающего в качестве
определения, переводит текст на более высокий уровень обобщения.
Пример: (рекомендательная) библиография – библиография.
Семантическое свертывание в языке – это стихийный процесс
терминообразования, в ходе которого возникают понятия более краткие,
чем их синонимичные предшественники.
Пример: компьютер > электронно-вычислительная машина.
При лексическом свертывании производится преобразование знаковой
формы сообщения при сохранении его информативности. Различают три
способа лексического свертывания:
1)
опущение, при котором то или иное место в предложении,
предназначенное для определенных повторяющихся или не повторяющихся
в тексте языковых единиц, остается пустым, но может быть заполнено этими
единицами благодаря опоре на сохраняющиеся в предложении элементы;
2)
совмещение, при котором два или несколько предложений,
некоторые элементы которых тождественны, накладываются друг на друга,
образуя сокращенную конструкцию, где тождественный компонент
употреблен только однажды, но сохраняет самостоятельные связи с
неотождествленными частями совмещенных предложений;
3)
замещение, при котором повторяющийся или неповторяющийся
отрезок текста замещается другим, более кратким, с сохранением в
последнем необходимого уровня смысла первого (например, замена
местоимением слова или выражения, применение более кратких
синонимичных вариантов).
К перечисленным видам лексического свертывания можно добавить
также применение аббревиатур, условных сокращений, перевод в иную
знаковую систему (употребление формул, графиков, кодов и т.п.).
Понятия «свертывание информации» и «свертывание документа» не
синонимичны.
В случае свертывания (развертывания) информации мы имеем дело с
текстом, сообщением, не ограничиваемым рамками определенного
документа. Текст преобразуется тем или иным способом с целью
уменьшения (или увеличения) его физического объема с оставлением в нем
необходимых «смысловых вех».
При свертывании (развертывании) документа получается новый документ
(в общем случае вторичный). Операция свертывания информации при этом
может быть не единственной операцией аналитико-синтетической
переработки документа наряду с дословным извлечением (или опущением),
сокращением, либо, наоборот, добавлением фраз или фрагментов,
изменением логической структуры документа и др.
Свертывание в сфере информационного обслуживания является частным
случаем информационного свертывания. Специфика лишь в том, что если
при информационном свертывании в качестве объекта выступает, как
правило, мыслительный образ некоторой непосредственной реальной
ситуации, то при свертывании в сфере информационного обслуживания та
же ситуация, но опосредованная документом автора (отправителя
информации). И в том, и в другом случае рождаются новые тексты.
Можно выделить два подхода
метаинформативный и информативный.
к
свертыванию
информации:
Метаинформативное свертывание предполагает создание ряда документов,
основная цель которых в той или иной степени раскрыть тему и содержание
других документов. Такой ряд называется библиографическим. К нему
относятся не только традиционные виды вторичных документов –
библиографические описания, аннотации, библиографические обзоры, но и
авторефераты диссертаций, предисловия и введения к книгам, программы
учебных курсов, справочные аппараты изданий и др. Во всех этих документах
содержится «информация об информации».
Информативное свертывание предполагает создание ряда документов,
основная цель которых служить непосредственным источником информации
при решении определенных задач. Этот ряд называется фактографическим.
Он может включать в себя как первичные, так и вторичные документы
различного уровня свертывания.
Так, ряд фактографических первичных документов образует, например,
цепочки: отчет, статья, краткие сообщения, информационный листок;
фактографический ряд вторичных документов – рефераты типа экспрессинформация, информационные журналы типа реферативного журнала
Всероссийского института научной и технической информации (ВИНИТИ),
самостоятельные фрагменты текстов, цитаты, фактографические справки,
реферативные обзоры и другие документы, использование которых, как
правило, не вызывает для определенной категории потребителей
информации необходимости обращения к первоисточнику.
Этапы аналитико-синтетической переработки информации (АСПИ).
Чтение документа
АСПИ начинается с чтения документа и извлечения информации,
зафиксированной в нем. Чтение – вид умственной деятельности, который
требует своей организации труда. Общепризнанно, что оно включает
процессы восприятия, внимания, мышления, памяти. Все кто связан с
документами, информацией по роду своей профессиональной деятельности,
должны быть профессиональными читателями, обладающими следующими
умениями:
1) гностическими или познавательными, т.е. выделять главное в тексте, связи
между явлениями, использовать «свернутые» записи (заметки, тезисы,
конспекты), библиографические и справочные издания, пользоваться
приемами скорочтения, производить анализ, синтез, обобщение на
материале изучаемого текста;
2) проектировочными, т.е. формулировать цели чтения,
самостоятельной работы, задачи, темп и ритм чтения и т.п.;
своей
3) конструктивными, т.е. умениями конспектировать, аннотировать,
реферировать, составлять планы, тезисы;
4) коммуникативными, т.е. активно воспринимать устные сообщения,
анализировать их и участвовать в обсуждении, высказывать собственное
отношение к прочитанному и т.д.;
5) организаторскими, т.е. организовывать свое время и читательскую
деятельность, рабочее место, контролировать зрение, движение глаз,
утомляемость, организовывать накапливаемую в процессе чтения
информацию таким образом, чтобы по окончании чтения ею можно было
воспользоваться.
Анализ текста документа
АСПИ предполагает тщательную работу с текстом документа.
Текст – это линейная последовательность знаков, обладающая смыслом.
В качестве текста может выступать как отдельное предложение, так и их
совокупность, в которой одни предложения выражают предмет речи
(текстовый субъект), а другие – информацию об этом предмете (текстовый
предикат) (элементы текста II лингвистического уровня), сложные
синтаксические целые (элементы текста III лингвистического уровня).
Читая документ, следует обращать внимание на его структуру, выделять
основные составляющие текста, анализировать содержащуюся в нем
информацию.
Рабочая запись о прочитанном
Восприятие, осмысление и закрепление прочитанного отражаются в
соответствующих записях. Записи необходимо вести, чтобы лучше запомнить
и усвоить прочитанный документ. Запись способствует лучшему пониманию
текста: удлиняется процесс восприятия мыслей автора, как бы повторяя ее,
прочнее запоминается. Записи дают возможность быстро восстановить в
памяти забытое. Они являются средством поддержания внимания на
содержании текста, помогая сосредоточиться, и, наконец, запись текста
своими словами развивает письменную речь. Различные варианты записей
используются при создании аннотаций, рефератов, обзорной информации.
Запись о прочитанном бывает нескольких типов – план, выписки, цитаты,
пометки на полях (маргиналии), тезисы, аннотации, резюме. Выбор формы
зависит от индивидуальных особенностей человека, его образования,
свойств памяти, назначения записи.
Тезисы
Тезисы – это
произведения.
сжатое
изложение
основных
мыслей
прочитанного
Их особенность – утвердительный характер. В переводе с греческого «тезо»
значит «утверждаю». В тезисах сосредотачивается наиболее важное из
текста, выводы и обобщения. В них, как правило, нет доказательств,
иллюстраций и пояснений. Они не повторяют дословно текст, но достаточно
близки к нему.
При этом можно воспроизводить некоторые характерные выражения
автора, в которых отражается ход его мыслей, и которые помогают понять
содержание произведения.
Тезисы создаются после предварительного ознакомления с текстом или при
повторном чтении. Текст разбивают на ряд отрывков и создают план. В
каждом фрагменте выделяется главное, уясняется суть и формулируется
тезис. Каждый тезис «вытекает» из другого, и в окончательном варианте
тезисы могут иметь нумерацию. Часть тезисов может быть записана в виде
цитат. Данный метод применяют для сравнения разных точек зрения.
Аннотация
Аннотация – краткая характеристика документа, раскрывающая его
назначение, содержание, форму и другие особенности.
Происходит от латинского слова «annotatio» – замечание. Составляется
аннотация после прочтения произведения.
Аннотирование
–
процесс
аналитико-синтетической
переработки
информации, целью которого является получение обобщенной
характеристики документа, раскрывающей его логическую структуру и
наиболее существенные стороны содержания. В результате данного
процесса создается аннотация.
К аннотации предъявляются следующие требования:
- учет характера и тематики аннотируемого документа;
- содержательность;
- объективность;
- полнота;
- краткость;
- понятность.
Информационный работник должен раскрыть в аннотации основные,
существенные элементы документа. Она должна быть конкретна и точна в
передачи содержания. Аннотация должна отличаться полнотой
(представлять сведения о теме документа,
особенностях изложения
материала, его назначении, идейной направленности и т.п.) и краткостью.
Краткость есть сжатое представление сведений в аннотации в пределах
заданного объема (объем минимизируется стандартами). Средним объемом
считается 500 печатных знаков. С полнотой тесно связано требование
объективности изложения информации.
Требование содержательности ассоциируется с понятием краткости.
Резюме
Резюме – сжатое изложение основных положений, выводов какого-либо
научного произведения (или доклада)
Оно происходит от французского глагола «rezumer» – излагать вкратце. Если
аннотация кратко характеризует документ, то резюме характеризует выводы,
главные итоги, содержащиеся в данном документе.
Данный вид записи используется при анализе именно выводной части,
содержащейся в документе. Кроме того, в различных работах создается
резюмирующая часть, подводящая итоги исследования. Поэтому знания и
умения создания резюме необходимы каждому студенту. С резюме можно
столкнуться в научных журналах, где оно выделяется специально и может
приводиться на двух языках: русском и, как правило, на английском.
Конспект
Конспект – наиболее совершенная форма записей. Происходит от
латинского слова «conspectus», что означает обзор, изложение. В нем
отражается самое основное в изучаемом произведении, сосредоточено
внимание на наиболее существенном; в кратких, четких формулировках
обобщены важнейшие теоретические положения.
Составление конспекта требует вдумчивой работы, затраты времени и
усилий. Конспектирование способствует глубокому пониманию и усвоению
изучаемых источников, помогает вырабатывать навыки правильного
изложения в письменной форме и умения четко формулировать и ясно
излагать.
Конспектирование
считается
одним
из
эффективных
способов
использования литературы. Конспект – многофункционален: он заменяет сам
источник; выступает как дополнительный блок памяти – накопитель
наиболее ценных фактов; является фрагментом будущего произведения
(например, обзора).
При конспектировании больших трудов или книг, сложных для восприятия,
сначала составляют план (конспекты содержат не только основные
положения и выводы, но и факты доказательства, примеры, иллюстрации).
Реферат
Реферирование является одним из важнейших видов аналитикосинтетической переработки информации, заключающийся в анализе
первичного документа и извлечении из него наиболее важных в смысловом
отношении сведений, основных положений, фактических данных,
результатов, выводов.
Реферирование представляет собой сложный процесс, сопряженный со
значительными интеллектуальными и временными затратами.
Цель реферирования – сокращение физического объема первичного
документа при сохранении его основного смыслового содержания.
Реферат - краткое точное изложение содержания документа, включающее
основные фактические сведения и выводы, без дополнительной
интерпретации или критических замечаний автора реферата.
Реферат выступает в качестве объекта стандартизации ОСТа 29-130-97
«Издания. Термины и определения», где он определяется как
«произведение, содержащее краткое изложение содержания какого-либо
произведения или издания (его части) с основными фактическими
сведениями и выводами».
Если в аннотации приводится лишь краткий перечень вопросов,
рассматриваемых в документе, то в реферате излагается сущность вопросов,
приводятся фактические данные и важнейшие выводы.
Рефераты применяются в издательской, библиографической, научноинформационной деятельности, связанной с оповещением о выходе
различных публикаций, с поиском, передачей и использованием
информации. Они помещаются в реферативных журналах, сборниках и т.д.
Реферат
часто
служит
основным
исходным
документом
в
автоматизированных информационных системах.
Реферат отвечает на вопрос: «Что именно сообщается в первичном
документе». Главное его свойство – информативность – способность кратко
передать смысл первичного документа.
Информативность является наиболее существенной и отличительной
чертой реферата, важная задача которого состоит в передаче информации
фактографического характера (о реальных событиях, изделиях, материалах,
технологических процессах, конкретном производственном опыте) или
концептографического характера (о теориях, гипотезах, методах).
Объектами реферирования являются научные статьи (теоретические,
экспериментальные, методические, описательные и т.д.), главы из книг
(монографий, сборников
депонированные рукописи.
трудов
и
т.д.),
патентные
документы,
Не подлежат реферированию: стандарты, технические условия,
инструкции,
прейскуранты,
каталоги
оборудования,
справочные,
информационные
и
библиографические
издания,
тезаурусы,
классификационные схемы и т.п.
Текст реферата должен отличаться:
- ясностью;
- конкретностью;
- четкостью;
- лаконизмом.
Основные функции реферата:
- информативная,
- поисковая.
Реферат представляет информацию о документе и устраняет
необходимость чтения полного текста в случае, если он представляет для
читателя второстепенный интерес. Он используется в информационнопоисковых, в том числе автоматизированных системах, для поиска
документов и информации.
Типизация рефератов
По признаку принадлежности к определенной области знания можно
выделить рефераты по общественным, гуманитарным, естественным,
точным, техническим и прикладным наукам; отраслям экономики.
По способу характеристики первичного документа различают общие
рефераты или рефераты-конспекты, последовательно излагающие в общем
виде содержание всего первичного документа; специализированные или
проблемно-ориентированные рефераты, акцентирующие внимание читателя
на отдельных темах или проблемах первичного документа.
По признаку составительства различают авторский реферат, где
приводится обобщенная характеристика содержания статьи, указываются
основные аспекты, излагаются результаты, референтский
составленный специалистом, редакторский, машинный и др.
реферат,
По
количеству
источников
реферирования
выделяют
монографические (составленные на один первичный документ), рефератыфрагменты (составленные на отдельную часть первичного документа),
обзорные или сводные, групповые рефераты.
По форме изложения это текстовые, табличные, иллюстративные или
смешанные рефераты.
По объему или глубине свертывания – краткие (не более 850 печатных
знаков) и расширенные рефераты (объем может составлять 10-15% от
объема первичного документа) в зависимости от его ценности, новизны и
доступности.
По степени формализации реферирования рефераты дифференцируют
на интеллектуальные (составленные человеком на основе его интуитивных
представлений о значимости содержащейся в первичном документе
информации)
и
формализованные
(составленные
на
основе
формализованных методик).
По функции и глубине отражения содержания источника различают
индикативные и информативные рефераты.
Из данной классификации наиболее часто используется последний вариант.
Индикативный (указательный) реферат указывает на основные
аспекты содержания первичного документа. Он дает, как правило, четкое
представление об объекте документа, об основных вопросах,
рассматриваемых в документе, о полученных результатах, выводах.
Основная цель индикативного реферата - уведомить потребителя о
появлении соответствующей информации, дать потребителю возможность
решить, представляет ли данный документ для него ценность или интерес.
Индикативный реферат (как промежуточный вторичный документ
между аннотацией и информативным рефератом) используется в некоторых
информационных службах. Обращение к нему диктуется рядом причин:
отсутствием кадров референтов требуемой специальности и квалификации;
специфическими особенностями некоторых видов первичных документов монографий, учебников, сборников статей, указателей литературы и др.
Часто индикативный реферат представляет собой перечисление основных
объектов, рассмотренных в первичном документе.
Своеобразная разновидность индикативного реферата сложилась в
рамках автоматизированных ИПС. Такие рефераты характеризуются четкой
структурой, включающей в себя три основных элемента: библиографическое
описание, список ключевых слов, индикативные признаки.
Список ключевых слов – это перечень слов или словосочетаний на
естественном языке, выражающих основное смысловое содержание
первичного документа и извлекаемых, в основном, из текста самого
документа.
Индикативные признаки – это сжатый текст, являющийся
дополнением к библиографическому описанию и списку ключевых слов и
имеющий целью раскрыть наиболее важные формальные и содержательные
аспекты первичного документа.
Индикативные рефераты, которые составляются на вводимые в
систему документы, фигурируют многократно: из них формируется
информационный массив, они вводятся в машину и определенные их части
(ключевые слова) образуют поисковый массив; они же по завершению
поиска выводятся из машины и распечатываются в виде индивидуальных
списков, адресуемых конкретным потребителям.
Информативные рефераты – наиболее распространенная и наиболее
изученная форма рефератов. Информативный реферат доносит до
потребителя конкретную информацию, извлеченную из документа, в нем
наиболее полно отражается содержание первичного документа, основные
идеи и фактические данные. В них излагаются основные цели исследования
или разработки, исходные данные, выводы, полученные результаты.
Сфера применения информативных рефератов – это главным образом
реферативные журналы. Ориентация именно на этот тип рефератов в РЖ
вызывается многими соображениями, среди которых наиболее существенны
следующие:
1) такие рефераты позволяют донести до читателя информацию из
документов, хранящихся у разных, а иногда и единичных держателей;
2) информативные рефераты – одно из средств снижения потерь
информации, связанных с рассеянием публикаций;
3) такие рефераты являются средством преодоления языковых барьеров;
4) публикации информативных рефератов – средство значительного
повышения оперативности донесения информации до потребителя.
Подготовка информативного реферата достаточно сложный и трудоемкий
процесс, который требует от референта глубокого смыслового анализа
текста, дифференцированного подхода к различным составным частям
первичного документа и квалифицированного синтеза информации в новом,
вторичном документе.
Информативный реферат составляется по следующему плану:
- тема, предмет исследования, характер и цель работы;
- методы проведения работы;
- конкретные результаты работы;
- выводы (оценки, предложения), принятые и отвергнутые гипотезы,
описанные в первичном документе;
- область применения.
Одна из сложностей реферирования состоит в том, что, анализируя текст,
референт не всегда может синтезировать важную информацию, строго
следуя
тому плану, по которому составлен первичный документ. Это возможно
лишь при условии, что первичный документ имеет отработанную структуру
(например, автореферат диссертации). Чаще же референт должен составлять
новый план изложения, полностью перестраивая структуру первичного
документа.
Методика реферирования
Методика реферирования представляет собой своеобразную
технологию анализа и обобщения, систему способов, правил и приемов,
используемых при составлении реферата.
Процесс реферирования начинается с анализа, оценки и отбора
информации. Затем следует обобщение выявленных сведений и, наконец,
сжатое концентрированное изложение информации в виде текста реферата.
Изучение первичного документа следует начинать со знакомства с
заглавием, рубрикацией, выводами и резюме. Это позволяет четко
представить содержание документа в целом, получить сведения оценочного
характера. Необходимо установить фактическое соответствие содержания
рассмотренного круга вопросов и выводов заглавию документа (особенно
для зарубежного источника).
При повторном чтении рекомендуется в тексте выделять абзацы или
другие логически акцентированные части, содержащие сведения,
соответствующие запросу. В результате анализа первоисточника референт
должен получить четкое представление об объекте работы, его свойствах,
преимуществах и недостатках; цели работы; методах; основных результатах
и выводах автора; реализации и области применения сведений из
первоисточника. После просмотра первоисточника референт должен
принять решение о виде реферата, который необходимо составить.
Одна из серьезных задач референта – суметь правильно начать
реферат, а именно с изложения сущности работы; заглавие и сведения,
имеющиеся в библиографическом описании, не должны повторяться в
тексте. Реферат должен давать верное отражение смыслового содержания
оригинала; недопустимо, чтобы второстепенные вопросы освещались в
реферате наравне с главными.
Все, что в первичном документе не заслуживает внимания потребителя,
должно быть опущено. В реферат НЕ включаются:
- общие выводы, не вытекающие из полученных результатов;
- информация, не понятная без обращения к первоисточнику;
- общеизвестные сведения;
- второстепенные детали, избыточные рассуждения;
- исторические справки;
- детальные описания экспериментов и методик;
- сведения о ранее опубликованных документах и т.д.
Содержание реферата должно передаваться объективно. Как правило,
референту не следует давать собственную оценку материала или вступать
в полемику с автором реферируемого источника. (Рефераты по
общественным наукам могут содержать критическую оценку содержания
источника). Все названные приемы составления реферата позволяют
обеспечить соблюдение основных методических принципов реферирования
- адекватность, информативность, краткость и достоверность.
Процесс составления реферата включает шесть этапов:
1 этап. Ознакомительное
реферируемого документа.
чтение
и
предварительный
анализ
2 этап. Внимательное чтение и углубленный анализ. Цель – исключение
несущественных сведений или сведений, не относящихся к основному
содержанию документа. В результате референт должен получить четкое
представление об объекте работы, его свойствах, преимуществах и
недостатках, о цели работы, применявшихся методах, об основных
результатах и выводах автора, о степени реализации и области применения
сведений из первоисточника. Необходимо отметить противоречивые и
недоказанные положения, высказанные автором первичного документа.
В ходе анализа текста первичного документа осуществляется оценка
значимости составляющих его элементов с точки зрения целесообразности
отражения их в реферате.
Выделяются:
- элементы, которые обязательно должны быть отражены в реферате;
- новые идеи и гипотезы, экспериментальные данные, новые методики,
оригинальные конструкции машин и механизмов, качественно новые
явления, процессы и т.д.;
- сведения, не являющиеся принципиально новыми: традиционные
методы, формульный, цифровой материал и т.п. (отражаются в реферате
избирательно);
- аргументы, пояснения, примеры и другая информация разъяснительноиллюстративного характера (как правило, либо не включается в реферат,
либо представляется в аннотированном виде).
3 этап. Определение вида реферата – расширенный или краткий, общий
или специализированный. Выбор вида реферата зависит от вида
реферируемого произведения, целей и задач процедуры свертывания.
4 этап. Определение структуры реферата в зависимости от его вида, выбор
соответствующих языковых и стилистических средств.
5 этап. Синтез информации, компоновка текста в соответствии с
требованиями к структуре и стилю реферата. В ходе синтеза обеспечивается
последовательное краткое изложение основного смыслового содержания
первичного документа, достигается связность и логичность представления
информации. С этой целью проводится процедура редактирования текста
реферата.
14
6 этап. Оформление реферата в соответствии с требованиями ГОСТ 7.9-95.
Структура реферата
Независимо от вида реферат состоит из трех основных частей:
1. заголовочной части,
2. собственно реферативной части
3. справочного аппарата.
Заголовочная часть реферата - это заглавие реферата и
библиографическое описание документа, составленное в соответствии с
требованиями ГОСТ 7.1-2003, ГОСТ 7.80-2000, ГОСТ 7.82-2001 и ГОСТ 7.9-95.
При работе с заголовочной частью приходится уделять основное
внимание заглавию реферата. По-видимому, ни в одном документе заглавие
не играет такой большой роли и не имеет специфических особенностей, как в
реферате, где оно является по существу органическим элементом текста и
вместе с тем способно самостоятельно выполнять часть функций реферата.
С семантической точки зрения заглавие обязано адекватно передавать
содержание реферата (как, впрочем, и всякого документа). Наряду с этим,
оно должно отвечать требованию удобного, быстрого и безошибочного
документального информационного поиска по предметным признакам.
Поэтому в заглавии нужно стремиться полнее отражать основные смысловые
аспекты содержания документа.
Заглавие
также
выполняет
адресную
функцию.
Однако
самостоятельно оно не в состоянии решать такую задачу целиком, так как
полными адресными признаками обладает лишь вся заголовочная часть.
Практикой подтверждается, что с точки зрения потребителя заглавие
реферата выполняет прежде всего сигнальную и информативную функции.
Вместе с тем оно служит сокращенным поисковым образом документа, и,
по-видимому, нигде так не проявляются смысловые аспекты, отраженные в
заглавии, и его семантическая адекватность и эквивалентность содержанию
документа, как в процессе информационного поиска.
Эксперименты по машинному поиску научно-технических документов,
поисковые образы которых были составлены на основе заглавий, говорят о
том, что точность поиска в таких случаях равняется 20-25%.
Было также выявлено, что в зависимости от характера запросов
потребителей информации, от объема и тематики фонда поисковый образ
документа целесообразно составлять либо только по заглавию, либо по
заглавию и начальной части реферата, либо по реферату в целом.
Строго говоря, заглавие не должно было бы содержать неключевых
слов, так как сами по себе они не отражают смысловых аспектов. Но
поскольку заглавие является связанным текстом, неключевых слов в нем не
избежать, следовательно, реальная задача состоит в том, чтобы свести их
количество к минимуму.
При объединении в единое целое выявленной в ходе анализа первичного
документа информации рекомендуется использовать основные способы
реферативного изложения текста, а именно:
- цитирование, т.е. дословное воспроизведение фрагментов первичного
документа;
- перефразирование, которое предполагает частичное изменение
(сокращение, объединение, замену, группировку и т.п. процедуры)
отдельных фрагментов текста первичного документа;
- замещение – замену фрагмента текста (предложения в целом, его части,
словосочетания или слова).
Модель реферата научной статьи
1. Вводная часть реферата
В статье "...", помещенной в журнале "..." №... за ... год, рассматриваются
вопросы (проблемы, пути, методы)
Автор статьи - известный ученый...
Статья называется (носит название..., под названием..., озаглавлена..., под
заголовком.., опубликована в...)
2. Тема статьи, ее общая характеристика
Тема статьи -... ( Статья на тему..., Статья посвящена теме (проблеме,
вопросу)...)...
Статья представляет собой обобщение (изложение, описание, анализ,
обзор).
3. Проблема статьи
В статье речь идет... (о чем?), (говорится (о чем?), рассматривается (что?),
дается оценка (чему?, чего?), анализ (чего?), изложение (чего?).
Сущность проблемы сводится... (к чему?), заключается (в чем?), состоит (в
чем?).
4. Композиция статьи
Статья делится на … части (-ей) (состоит из ... частей, начинается (с чего?),
заканчивается (чем?)...).
5. Описание основного содержания статьи
Во введении формулируется ...(что?) (дается определение ...(чего?) )
В начале статьи определяются (излагаются) цель(цели, задачи)...
Далее дается общая характеристика проблемы (глав, частей), исследования,
статьи...
В статье автор ставит(затрагивает, освещает) следующие проблемы,
(останавливается (на чем?) касается (чего?)...)
В основной части излагается (что?), приводится аргументация ( в пользу чего?
против чего?), дается обобщение (чего?) (научное описание (чего?)...
В статье также затронуты такие вопросы, как...
6. Иллюстрация автором своих положений
Автор приводит (ссылается на) пример(ы) (факты, цифры, данные),
подтверждающие, иллюстрирующие его положения...
В статье приводится, дается...
7. Заключение, выводы автора
Автор приходит к выводу(заключению), что... (подводит нас к..., делает
вывод, подводит итог)
В конце статьи подводятся итоги (чего?)
В заключение автор говорит, что, (утверждает, что)...
В заключение говорится, что... (о чем?)
Сущность вышеизложенного сводится к (следующему)...
8. Выводы и оценки референта
В итоге можно (необходимо, хотелось бы) сказать (подчеркнуть, отметить)...
Таким образом, в статье нашло отражение... (убедительно доказано...,
получили
исчерпывающее освещение...)...
Оценивая работу в целом, можно утверждать...
Безусловной заслугой автора является...
Заслуга автора состоит (заключается) (в чем ?)...
Основная ценность работы состоит (заключается) (в чем ?)...
Достоинством работы является...
Недостатком работы является...
К достоинствам (недостаткам) работы относятся...
С теоретической (практической) точки зрения важно (существенно)...
Вызывают возражения (сомнения)...
Нельзя (не) согласиться с...
Существенным недостатком работы можно считать... В статье под заглавием
"...", помещенной в журнале "...", № ... за ... год, излагаются взгляды
(проблемы,
вопросы)...
Предлагаемая вниманию читателей статья (книга, монография) представляет
собой детальное (общее) изложение вопросов...
Рассматриваемая статья посвящена теме (проблеме, вопросу...)
В статье рассматриваются вопросы, имеющие важное значение для...
Актуальность рассматриваемой проблемы, по словам автора, определяется
тем,
что...
Тема статьи (вопросы, рассматриваемые в статье) представляет большой
интерес...
Основная тема статьи отвечает задачам...
Выбор темы статьи (исследования) закономерен, не случаен...
В начале статьи автор дает обоснование актуальности темы (проблемы,
вопроса, идеи)...
Затем дается характеристика целей и задач исследования (статьи).
Рассматриваемая статья состоит из двух (трех) частей.
Автор дает определение (сравнительную характеристику, обзор, анализ)...
Затем автор останавливается на таких проблемах, как (касается следующих
проблем, ставит вопрос о том, что...) ...
Автор подробно останавливается на истории возникновения (зарождения,
появления, становления)...
Автор излагает в хронологической последовательности историю...
Автор подробно (кратко) описывает (классифицирует, характеризует) факты...
Автор доказывает справедливость (опровергает что-либо)...
Автор приводит доказательства справедливости своей точки зрения.
Далее в статье приводится целый ряд примеров, доказывающих
(иллюстрирующих) правильность (справедливость)...
В статье дается обобщение ..., приводятся хорошо аргументированные
доказательства...
В заключение автор говорит о том, что...
Изложенные (рассмотренные) в статье вопросы (проблемы) представляют
интерес не только для..., но и для...
Надо заметить (подчеркнуть), что...
Несомненный интерес представляют выводы автора о том, что...
Наиболее важными из выводов автора представляются следующие...
Это, во-первых..., во-вторых..., в-третьих..., и, наконец...
Речевые клише для написания рефератов и аннотаций
Большое внимание следует уделить обработке специальных клише,
характерных для жанра реферата и аннотации. Клише – это речевой
стереотип,
готовый
воспроизводимого
оборот,
используемый
в
качестве
легко
в определенных условиях и контекстах стандарта. В научном изложении
имеется ряд подобных речевых стереотипов. Они облегчают процесс
коммуникации,
реферанта-
экономят
усилия,
мыслительную
энергию
и
время
переводчика и его адресата. Для выработки автоматизма у реферантапереводчика необходима классификация основных клише. Удобная
классификация построена на понятийной основе. В соответствии с ней клише
группируются в зависимости от общего понятия с ним связанного, внутри
которого рассматриваются более мелкие группировки. Например, на
английском языке:
1. Общая характеристика статьи: Thepaper (article) underdiscussion
(consideration) is intended (aims) to describe (explain, examine, survey) …
2. Задачи, поставленныеавтором: The author outlines (points out, reviews,
analyses)…
3. Оценка полученных результатов исследования: Theresultsobtainedconfirm
(lead to, show)…
4. Подведениеитогов, выводовпоработе: The paper summarizes, in summing
up to author, at the end of the article the author sums up...
Образцы клишированных аннотаций на английском языке
The article deals with …
As the title implies the article describes ...
The paper is concerned with…
It is known that…
It should be noted about…
The fact that … is stressed.
A mention should be made about …
It is spoken in detail about…
It is reported that …
The text gives valuable information on…
Much attention is given to…
It is shown that…
The following conclusions are drawn…
The paper looks at recent research dealing with…
The main idea of the article is…
It gives a detailed analysis of…
It draws our attention to…
It is stressed that…
The article is of great help to …
The article is of interest to …
….. is/are noted, examined, discussed in detail, stressed, reported, considered.
Образцы клишированных рефератов на английском языке
The paper is devoted to (is concerned with) ….
The paper deals with ….
The investigation (the research) is carried out ….
The experiment (analysis) is made ….
The measurements (calculations) are made ….
The research includes (covers, consists of) ….
The data (the results of …) are presented (given, analyzed, compared with,
collected)
….
The results agree well with the theory ….
The results proved to be interesting (reliable) ….
The new theory (technique) is developed (worked out, proposed, suggested,
advanced) ….
The new method (technique) is discussed (tested, described, shown) ….
This method (theory) is based on ….
This method is now generally accepted ….
The purpose of the experiment is to show ….
The purpose of the research is to prove (test, develop, summarize, find) ….
Special attention is paid (given) to ….
Some factors are taken into consideration (account) ….
Some factors are omitted (neglected) ….
The scientists conclude (come to conclusion) ….
The paper (instrument) is designed for ….
The instrument is widely used ….
A brief account is given of ….
The author refers to …
Reference is made to ….
The author gives a review of ….
There are several solutions of the problem ….
There is some interesting information in the paper ….
It is expected (observed) that ….
It is reported (known, demonstrated) that ….
It appears (seems, proves) that ….
19
It is likely (certain, sure) ….
It is possible to obtain ….
It is important to verify ….
It is necessary to introduce ….
It is impossible to account for ….
It should be remembered (noted, mentioned) ….
ЧАСТЬ II
Практические задания
SINGLE WORDS
A single word can sometimes replace a phrase. For example, the sentence in 1 can
be written as 2.
He has a high opinion of himself.
He is conceited.
TASK 1
Find single words for the phrases in italics and rewrite the sentences making
appropriate changes where necessary. To help you with this task, the first letter
of
the word has been given. The first one has been done for you.
1 He is never late and always arrives on time.
(p__ __ __ __ __ __ __)
2 When the bus started skidding, the woman started screaming with
uncontrollable emotion and fear.
(h__ __ __ __ __ __ __ __ __ __ __)
3 My cousin is someone who is very social and enjoys the company of other
people.
(g __ __ __ __ __ __ __ __ __)
4 The company buys compressors from other countries.
(i __ __ __ __ __ __)
5 A camel is often used to cross a great stretch of dry, sandy land.
(d __ __ __ __ __)
6 Do you think he is incapable of making a mistake?
(i__ __ __ __ __ __ __ __ __)
Finally, even people who thought the worst would happen, were convinced that
they would survive.
(p__ __ __ __ __ __ __ __)
8 Scrooge never thought of treating his clerk with kindness and sympathy.
(c__ __ __ __ __ __ __ __ __ __ __ __)
ADJECTIVES and ADVERBS
Often, an adjectival or adverbial phrase can be replaced with a single adjective or
adverb.
Study the sentence 1a and lb.
1a. He wore a hat made of fur.
1b. He wore a fur hat.
The phrase made of fur has been replaced with the adjective fur.
Similarly, the phrase at any time in your life in sentence 2a below can be replaced
with the adverb ever in sentence 2b.
2a. Have you been to New York at any time in your life? 2b. Have you ever been
to New York.
TASK 2
Replace the phrases in italics with a single word ; {adjective or adverb) and
rewrite the sentences making appropriate changes.
1 In ancient times barbers usually wore aprons that had stripes on them.
_____________________________________
2 Amitabh Bachchan normally uses his left hand..
_____________________________________
3 I have seen him in the park many times before.
______________________________________
4 He could believe that he had finally been chosen for the University team only
with difficulty.
_______________________________________
5 We got a vacation that lasted for two months.
_______________________________________
CLASS WORDS
At times, we can avoid long lists by using class words or generic terms. Study the
sentences 1 a and 1b here.
1a. There were many tables, chairs, beds and dressers in the room.
1 b. There was a lot of furniture in the room.
Notice that furniture is a generic term or a class word that helps to make the
sentences brief.
TASK 3
Choose the generic term/class word for the sets of words in 1-10.
fish, virtues, public institutions, epics cutlery, diseases, weapons, linen
crockery, mammals
1 diphtheria, typhoid, cholera, chickenpox.
2 schools, hospitals, courts, prisons
3 gun, sword, spear, lance
4 Iliad, Ramayana, Mahabharata
5 cup, saucer, plate, bowl
6 salmon, trout, plaice, sturgeon
7 spoon, knife, fork
8 elephant, whale, bear, monkey
9 sheet, pillow-case, tablecloth, napkins
10 honesty, kindness, sincerity, modesty
Focus ON FACTS (FIGURATIVE LANGUAGE)
Writers at times use figurative language to make a description or narration more
vivid. However, while summarizing we focus on the fact behind the figurative
language.
For example,
1a. It is as plain as the nose on your face that they
are in love.
1 b. It is obvious that they are in love.
2a. I'm feeling a bit out of sorts today.
2b. I'm not feeling very well today.
The message expressed using figurative language in 1a and 2a is conveyed in plain
language in 1b and 2b.
TASK 4
Shorten the sentences below by replacing the phrases in italics with an
appropriate phrase or word and rewrite them.
1
Miss Mason looked as if she had seen a ghost.
………………………………………………………………………..
2
Sajad was black and blue all over after he fell off his bike.
………………………………………………………………..
3
The Director gave Mohsin the cold shoulder at the party.
……………………………………………………………….
4 After the bell rang, the children entered the class like a stampeding herd of
elephants.
………………………………………………………………………………..
5 We'll need to get a move on if we don't want to miss our bus.
…………………………………………………………………..
6 After his son's death, he felt there was no point in going on living.
………………………………………………………………………………..
7 There were no clouds in the sky and the sun beat down pitilessly.
………………………………………………………………………………..
8 Mr Darcy could have bitten his tongue off for making those remarks.
…………………………………………………………………………
Summarizing Paragraphs
To summarize a paragraph, we need to identify the topic sentence or the main
point of the paragraph. Study the paragraph below. What do you think is the main
idea?
Everyone is in a great hurry nowadays. Cars speed down roads, trains whizz past
stations and jets roar across continents and seas. Their speed keeps increasing.
Why? Because people are in a tearing hurry to reach their destination.
The main idea which is expanded with examples in the paragraph is: Everyone is
in a hurry nowadays. Sometimes, the main idea is not very obvious. You then
need to read this paragraph carefully to arrive at the main idea.
TASK 5
Read the paragraph below. Then determine which of the four options summarizes
the paragraph the best.
For years Indians lived by the weatherproof maxim of Rahim:'
Tloatbepaonpasariyejitti iambi saur (Stretch your legs such that your legs don't
stick out of the blanket). Very simply, Akbar's poet-minister advocated living
within means. So India had among the highest savings rates, conspicuous
spending was frowned upon and assets were created either out of savings or
inheritance. Would-be grooms were, and still are, screened on the basis of
personal habits and personal debt. To be in debt, in short, was to mortgage the
future - among the worst curses one could invite. For many, it also meant the
good things in life either came too late or never happened, leaving them longing
wistfully for that dream home, that car ride or that home theatre system.
IndiaToday
17 November 2003
a. Indian society has disapproved the credit culture.
b. Indians have always spent money carefully.
c. Indians live by the maxims of wise men.
d. Many Indians cannot afford luxuries.
Note: Newspaper headlines generally summarize the article that follows. Study
the news item here and determine whether the headline truly conveys the
content.
Man swallows 99 nails, dies
A man who swallowed 99 nails to ward off evil spirit died in a hospital in Rourkela
on Saturday. Akliyay Kumar Mohanry, 40, who was admitted to Ispat General
Hospital here after he complained of severe stomach ache, told surgeons that he
had swallowed 99 nails to ward off evil spirit. Nails four inches each in length
were found in Mohanty's stomach, duodenum and colon.
Occam Herald . Sunday, 22 February 2004
TASK 6
Given below is another extract. Write a headline that summarizes the news item.
Seven tropical community groups, including one from India, have been
awarded prizes by the United Nations for their work to reduce poverty and
conserve biological wealth, PTI reports from United Nations.
The Genetic Research, Energy, Ecology and Nutrition (GREEN) Foundation of
India, which works with agricultural communities, especially women in Karnataka,
is among the seven groups which have been awarded the prestigious United
Nations Equator Prize for 2004. The winners were announced at an awards
ceremony in the Malaysian capital of Kuala Lumpur on Thursday.
Decern Herald Saturday, 21 February 2004
Types of Summaries
There are two types of summaries - whole passage summary or precis, and
selective summary. In a precis, the passage is usually reduced to one-third its
length. In selective summaries, on the other hand, only such details that are asked
for or needed are taken from the passage and summarized.
TASK 7
The passage below presents the process of digestion. Read the whole passage and
write a summary of the process of digestion in not more than forty words.
Food and digestion
Digestion is when food is broken down into smaller particles. This happens so
that food can be absorbed into the bloodstream. Dr. Beaumont proved that
part of this process happens in the stomach.
The food in the stomach is mixed with gastric juice. This is very acidic. It contains
lots of hydrochloric acid. Gastric juice helps the enzymes in the stomach to break
down the food.
Dr Beaumont also found that the digestive enzymes work best at body
temperature, which is 37° C. They still work at lower temperatures, but they work
more slowly.
…………………………………………………………………………………..
…………………………………………………………………………………..
…………………………………………………………………………………..
……………………………………………………………………………………
……………………………………………………………………………………
Answer to Task 7
Digestion happens in the stomach. Digestion is breaking down food into simpler
substances that can be absorbed into the blood. The food is broken down by
gastric juices. Digestive enzymes work best at body temperature.
(35 words)
TASK 8
Here is a passage about oil and gas. Read it carefully and then write a summary in
not more than forty words on one of the two topics. Give your summary an
appropriate heading.
Ұ The uses of crude oil
Ұ The growing need for fossil fuel
Oil and Gas
Petroleum is the proper name for 'crude oil' that is found underground. There is
more petroleum on Earth than any other liquid, except for water. Crude oil and |
natural gas are often found together. The natural gas is dissolved in the liquid oil.
Crude oil provides two-thirds of the world's energy supplies. Oil and gas are
non¬renewable sources. Our use of these has increased so much that we worry
about how long they will last. The supplies will probably run out this century.
Crude oil is not a pure substance. It contains many different materials. Petrol,
paraffin, kerosene (for aeroplane fuel), diesel fuel, engine oil and bitumen (road
tar) are all
found in crude oil.
People have used substances from crude oil for thousands of years. Some oil finds
its way naturally up to the Earth's surface. Here it evaporates and leaves behind
bitumen - the tarry part of the crude oil. This has been used for thousands of
years as a waterproofing agent for plumbing, boat building and brickwork.
The history books talk about bitumen being used as a coating for Moses' basket.
Noah's Ark was waterproofed inside and out with it. The Native Americans
collected crude oil to use in medicines. The American settlers learned to collect it
to use as fuel in their lamps.
Crude oil became valuable in the nineteenth century. The whaling industry did
not provide enough whale oil to light the lamps of the world and a new source
was needed. The first oil well was drilled in August 1859.
The uses for oil increased as the supply grew. The car engine meant that the
petrol from the oil mixture was needed for transport. Then the invention of
aeroplanes needed more inch which had to be supplied form oil. In the 1940s
man-made materials (such as nylon and polythene) made from oil were invented.
It is no wonder that oil was called 'black gold' and that discovery of oil and gas
could mean riches beyond belief.
Oil is a fossil fuel. When we burn it we are releasing energy captured from the Sun
millions of years ago by prehistoric plants and animals - the remains of these
microscopic plants and tiny animals settled on the seabed. They were buried by
sand the years went by. I he layers built up and the living things turned into oil.
Some of this oil was trapped underground, not as a 'lake' but in the sandy rock
itself.
An oil well is drilled to look for pockets of porous rock that contains crude oil.
When a pocket is found, water is pumped down to push the oil to the surface. "I
he crude oil is then taken to a refinery. At the refinery, oil is separated into its
parts by fractional distillation.
(Heslop et al Hodder Science Gold (Pupils Book B) Hodder Murray 2002)
TASK 9
Given below is a passage from James Forbes'book Oriental Memories that was
written in the nineteenth century. Read Hand write a thirty-word summary on
Kashmiri shawls in the nineteenth century. Give a title to your summary.
Surat is also a considerable market for shawls, one of the most delicate fabrics vet
brought from the loom: they are not indeed manufactured at Surat, not m any of
the southern provinces, being chiefly the produce of Cachemire, that 'paradise
nations,' where Acber, and many of the imperial princes retired from the cares of
government: encircled by their favourite courtiers, and in the bosom of their
family, they enjoyed in that mild climate the picturesque scenery of the
surrounding mountains, and the rural beauties of the delicious valley, watered by
the celebrated Hydaspes, and refreshed by many other streams from its lofty
boundaries. The shawls manufactured in Cachemire, from the delicate silky wool
of a goat peculiar to Thibet, are an elegant article of luxury, too well known in
Europe, to need a particular description: this manufacture is
not confined to Cachemire, but all others are deemed of an inferior quality: their
prime cost is from twenty to five hundred rupees a shawl, according to j the size,
texture, and pattern: some, perhaps, may be more valuable.
(written in 1812)
Summarizing Longer Passages
To summarize longer passages or full chapters, we follow the same techniques we
used to summarize paragraphs - we make a note of all the main points.
TASK 10
Read the passage below from Bom Free by Joy Adamson. In not more than fifty
words state how the truck was taken across.
We packed up camp and arrived early in the morning at the ford to find that the
water had risen considerably during the night and was still going up; we decided
that it was still just fordable by cars. George unhitched the trailer from the
Landrover and removed the fan belt to prevent water from splashing over the
ignition system, then it crept into the river and crossed successfully.
Next my truck entered with Elsa, as usual, sitting in the back. The water rushed
past at alarming speed, carrying debris. The truck got bravely into the middle,
then the engine spluttered and died. Nothing would make it start again. We
released Elsa at once; she plunged into the water, splashed about and tried to
retrieve the drift-wood, as though we had arranged all this for her amusement.
Indeed she had such fun ducking the men I who were wading shoulder-high
carrying { the loads across that we were finally obliged to tie her up. When at last
the truck was empty, we tried to tow it, but it leant alarmingly to one side and the
chains we had brought with us were not I long enough, so we had rapidly to
improvise extensions with buffalo hide. Eventually, all hands pushing and I pulling,
and applauded by the ever- present baboons, we managed to get it across.
Camp had to be pitched on the spot, as it took all the rest of the day to dry out
our kit, medicines, ammunition, books, foods, the engine of the truck, car spares,
bedding rolls and tents. Elsa spent her time sniffing the still life, including
George's tobacco which made her grimace in disgust.
Born Free by Joy Adamson William Collin Sons & CO.
Summarizing Stories
While summarizing stories, we should look for the main incidents and ignore
details that are not important. We should also avoid repeating the figurative
language the author may have used. A technique that can be used is to note
down the main idea in each paragraph and then put them together to make a
summary.
TASK 11
Read the story and write a summary in not more than 120 words. Give your
summary a title.
1 Tired after a long day's travel through
desert land, Ibrahim Bin Adham
pitched his tent on the sands and went to sleep. For some hours he enjoyed a
deep and
dreamless sleep.
2 Then suddenly in the middle of the night he was woken by a bright light
shining inside his tent. At first he wondered if it was already broad daylight. But
sitting up, he saw a remarkable sight: a man wearing radiant white robes stood in
one corner of his little tent! He had a golden book in his hands. The man had
wings on his back and Ibrahim guessed that he was an angel.
3 Ibrahim quietly watched to see what the angel would do. The shining stranger
lifted one arm and instantly a pen appeared in his hand. He concentrated on
writing something in the golden book. Ibrahim could not contain his curiosity any
longer. Although half afraid that the vision would disappear into thin air if he
made it known that he was awake, he very respectfully asked the stranger who he
was.
4 The shining man showed no surprise that Ibrahim was talking to him. He said:
"I am the angel Gabriel, one of God's servants."
5 Ibrahim asked him what he was writing in his golden book. "In this book I am
writing down the names of those men, women and children who are friends of
God," explained Gabriel.
6 "Is mine one of the names you are writing in your book?" asked Ibrahim.
7 "Oh no, Ibrabim ," said the angel in a pitying voice. "You are not one of the
friends of God."
8 "Yes," agreed Ibrahim humbly. "But Gabriel, have you another book in which to
list the names of people who, like myself, are friends of those who are the friends
of God?"
9 Gabriel shook his head. He looked at Ibrahim for a long moment. At last he said,
holding up the open book: "Ibrahim, a friend of man is a friend of God. Look,
though I have not written your name, God Himself has written it in this book!"
10 Sure enough. Right at the top of the page, in letters of shining gold, were the
words: "Ibrahim Bin Adham"
DebjaniChatterjee: Sufi Stories HarperCollins Publishers, India, 1997
Notes
Para 1: tired -journey - thro' a desert - Ibrahim Bin Adham slept-tent.
Para 2: woken up - light - shining from angel.
Para 3:
Summarizing Spoken Texts
We are constantly summarizing conversations in real life. Read the telephone
conversation in the box and then read the summary about Shirin's son that
follows.
Telephone Conversation
Shirin: Hello, may I speak to Ayesha?
Ayesha: Ayesha speaking. Is chat Shirin?
ShirinrYes. How are you Ayesha?
Ayesha: Fine, thank you. How are you?
Shirin: Fine, too!
Ayesha: How's your son? I heard that he's in hospital
Shirin: Yes. He was in an accident. He broke his leg.
Ayesha: Oh, dear! How long will he be in hospital?
Shirin: He'll be discharged on Friday, I hope!
Ayesha: I'll come over on Saturday. Is that OK?
Shirin: It's fine. See you on Saturday.
Ayesha: See you. 'Bye. Take care
Shirin: You too. 'Bye.
SUMMARY: Shirin's son broke his leg in an accident. He's in hospital and will be
home on Friday.
TASK 12
Here is a piece of conversation taken from a short story. Read it and do one of the
summaries.
Ұ Summarize the whole passage in about forty words.
Ұ Summarize the cures proposed for a cold in 30 words.
-"What are you doing for your cold and fever?"
-"Well, my doctor has prescribed a course of antibiotics. He says that's the only
way I can manage to take classes."
-"Antibiotics? Oh no! That's the last thing to have. Have you tried drinking a glass
of warm milk with a pinch of haldi? It really helps."
-"The best remedy is ginger. Nothing like ginger. Just soak some whole ginger in a
glass of water and strain it and then..."
-"I think honey is much better. A spoonful of honey in lime juice, every morning."
-"My sister-in-law had a very interesting cure for blocked noses. She used to burn
one end of a turmeric root and take in the fumes. It worked each time, she said."
-"I think some positive thinking can work wonders. Just tell yourself you are
absolutely fine and you will be."
PoileSengupts: Roll Call Rupa& Co., 2003
Summarizing Speeches
Speeches are easier to summarize as the speakers usually prepare speeches
carefully. However, you might notice that since it is in the spoken form, speakers
often repeat a phrase or ideas, expand a single idea with many examples and at
times use sentences that will catch the attention of the listener. Remember to
identify the main idea(s) conveyed in the speech. Then combine the main ideas to
arrive at the identity summary of the speech.
TASK 13
Given below is an extract from a talk that was broadcast on the BBC. Read it and
identify the topic in each section.
All our courses will be for honours. Most English universities have a pass course
which is less rigorous than the honours course, and is followed mainly by students
who, at the end of their first year, are thought not to be of honours caliber. It is
primarily a course for casualties. Often it consists of bits and pieces taken in
several departments and lacks cohesion as well as depth. In Essex, all students
will read for honours, although someone who, in the final examination, is not
good enough to be awarded third class nor bad enough to be failed outright may
be awarded a pass. There
will obviously be an occasional student who will find the course too demanding
and will not complete it. But the advantage for the weaker students of continuing
with the honours course is that, as well as following an integrated scheme, they
are working together with all their original colleagues. They can be helped by
contact with them
and they do not bear the stigma of inferior status.
A word about examinations. Only systematic research can show how far the
British system really measures intellect and originally, and not simply the ability to
pass examinations. At this stage we propose no radical change. But we shall vary
the circumstances under which a student is assessed; have some short
examinations and some long, allow students m certain subjects to make use of
textbooks and reference books, and take into account research projects. The
student of physics, for example, will be required in his final year to study and
report on at least one specialized topic, either experimental or theoretical, and
the class of his final degree will be determined in part by" this individual research
project. It will thus reflect the student's ability to practise science.
Albert E. Sloman: ‘A University in the Making'
Topic 1:.......................................
Topic 2: .......................................
Now write a summary of the talk in about fifty words.
TASK 14
Given below is an excerpt from a speech by John Ruskin, delivered more than a
hundred years ago at the Working Men's institute at Camberwell. It was
subsequently published in The Crown of Wild Olives.
Read the first three paragraphs and summarize it in 3 sentences. Make notes as
you read.
WORK
All wise work is mainly threefold in character. It is honest, useful and cheerful.
I hardly know anything more strange than that honesty is recognized in play and
not in work. In your lightest games you have always some one to see what you
call 'fair play'. In boxing, you must hit fair; in racing, strat fair. Your English
watchword is fair-play, your English hatred, foul-play. But your prize-merchant
gains his match by foul selling, and no one cries out against that. You drive a
gambler out of the gambling-room who loads dice, but you leave a tradesman in
flourishing business, who loads scales! All dishonest dealing is loading scales.
What does it matter whether I get short weight, adulterate substance, or
dishonest fabric? The fault in the fabric is incomparably the worse of the two.
Give me short measure of food and I only lose by you; but give me adulterated
food, and I die by you. Here, then, is the chief duty of all
workmen and
tradesmen to be true to themselves and to others. Without honesty all these
suffrages, all reforms, all free-trade measures and ail institutions of science,, are
in vain. It is useless to put your heads together if you can't put your hearts
together.
No man minds, or ought to mind, his work being hard, if only it comes to
something. But when it is hard and comes to nothing, when all his bees' business
turns to spiders'; and for honeycomb we have only resultant
away by the next breeze,
cobweb, blown
that is the cruel thing for the worker. Of all wastes, the greatest waste that you
can commit is the waste of labour. You perhaps think "to waste the labour of men
is not to kill them". Is it not? I should like to know how you could kill them more
utterly - kill them with second deaths, seventh deaths, hundredfold deaths?
Sentence 1:…………………………………………………………………….
Sentence2:………………………………………………………………………
Sentence 3:……………………………………………………………………..
Now do the same for the last three paragraphs. Notice how the first sentence in
each paragraph sets out what the speaker's topic is going to be.
Wise work is cheerful, as a child's work is. The first character of right childhood is
Modesty. A well-bred child does not think I it can teach its parents, or that it
knows I everything. It is always asking questions I and wanting to know more.
Well, that is the first character of a good and wise man at his work: To know that
he knows very little; to perceive that there are many above him wiser than he;
and to be always asking questions, wanting to learn, not to teach.
The second character of right childhood is Faith. Perceiving that its father knows
best what is good for it, when it has tried its own way against his, that he was
right and it was wrong, a noble child trusts him at last wholly, gives him its hand,
and will walk blindfold with him, if he bids it. And that is the true character of all
good men also, as obedient workers, or soldiers under captains. They must trust
their captains; they are bound for their lives to choose none but those whom they
can trust. Then, they are not always to be thinking that what seems strange to
them, or wrong, is strange or wrong. Without such trust and faith in captainship
no great deed, no great salvation is possible to man.
The third character of right childhood is to be Loving and Generous. It loves
everything near it, would hurt nothing, would give the best it has away, always, if
you need it; does not lay plans for getting everything in the house for itself, and
delights in helping people. And because of all these characters, the child is
Cheerful. Putting its trust in its father, it is careful for nothing - being full of love to
every creature, it is happy always, whether in its play or its duty. Well, that's the
great worker's character also. Lovely human play is like the play of the Sun.
There's a worker for you. He, steady to his time, is set as a strong man to run his
course. See how he plays in the morning, with the mists below, and the clouds
above, with a ray here and a flash there and a shower of jewels everywherethat’s the Sun’s play, and great human play is like his- all various-all full of light
and life, and tender, as the dew of the morning.
Sentence 1:.....................................................................
Sentence 2:......................................................................
Sentence 3:......................................................................
TASK 15
Now expand each of the sentences above into a paragraph of twenty words.
What details will you include ? What details will you exclude?
………………………………………………………………………………………………
……………………………………………………………………………………………..
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
……………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
………………………………………………………………………………………………………………………………
…………………………………………………
TASK 16
Read the text and do exercises to it.
FOG
Fog is simply a cloud on the ground, composed, like any cloud, of tiny droplets of
water or, in rare eases, of ice crystals, forming an ice fog. Ice fogs usually occur
only in extremely cold climates, because the water drop¬lets in a cloud are so tiny
they do not solidify until the air temperature is far below freezing, generally 30
degrees below zero Celsius or lower.
The droplets of fog are nearly spherical; they vary in diameter between two
and 50 microns and in concentra¬tion between 20 and 500 droplets per cubic
centimeter of air. The transparency of a fog depends mainly on the
con¬centration of droplets; the more droplets, the denser the fog. A wet sea fog
may contain a gram of water per cubic meter.
Since water is 800 times denser than air, investigators were long puzzled as
to why fogs did not quickly disappear through fallout of the water particles to the
ground. To explain the persistence of fogs many early investigators concluded
that the droplets must be hollow (that is bubbles). It turns out, however, that the
droplets are fully liquid and do fall at the predictable rate, but in fog-creating
conditions they either are buoyed up by rising air cur rents or are continually
replaced by new droplets condensing from the water vapor in the air.
The atmosphere always contains some water vapor, supplied by evaporation
from different bodies of water, vegetation and other sources . The droplets
condense on tiny particles of dust in the air called condensation nuclei. These are
hydroscopic particles which because of their affinity for water vapor, initiate
condensation atsubsaturation humilities-sometimes as low as 65 percent.
The nucleus on which the water condenses, which may be a soil particle or a grain
of sea salt, a combustion product or cosmic dust, usually dissolves in the
droplet. Because the saturation point is lower in .solution that it is for
pure wafer, the droplets of solution tend to condense more water vapor on them
and
grow in size.
Given suitable conditions of temperature and humidity, the density of a fog and
its microphysical properties will depend on the availability of condensation nuclei
and their nature. Fogs become particularly dense near certain industrial plants
because of the high concentration of hydroscopic combustion particles in the
air.
WORD-ORDER
When
WHO
who
WHAT
how
act ion
what
when
which
where
0
1
2
3
4
Exercises
I. Arrange the words to form a sentence.
1. the atmosphere, some water vapor, contains, 2. near industrial plants, fogs, are
rare. 3, occur, in cold countri¬es, ice fogs. 4, a cloud, is, fog, on the ground. 5.
conden¬se, the droplets, in the air, on tiny particles of dust. 6. become,
particularly dense, logs, near industrial plants.
II. Answer these questions in short simple sentences. Your answers must follow
each other so that all your sentences will form a complete paragraph. Your
paragraph wilt be a precis of the piece,
1. What do we call fog? 2 What is the shape of the droplets of fog? ,3. What
does the transparency of a fog depend upon? 4. Why does not fog disappear
through fal¬lout of the water particles? 5. What is the water vapor of atmosphere
supplied by? 6. Where do the droplets con¬dense? 7. What happens with the
nucleus on which the water condenses? 8, Why do droplets of solution grow in
size? 9. What does the density of a fog depend upon? 10. Where are fogs
particularly dense?
///. Explain the meaning of the italicized words and phrases as they are used in
the pass age.
IV, Join the following sentences using the connecting words in brackets. Omit the
words in italics.
I. Ice fogs usually occur only in extremely cold cli¬mates. The water droplets in a
cloud solidify only if the air temperature is far below freezing, (because). 2. The
droplets in fog-creating conditions are buoyed up by ri¬sing air currents. The
droplets are continually replaced by new droplets condensing from the water
vapor in the air (either ... or). 3. The saturation point is lower in solution than it
is for pure water. The droplets of solution tend to condense more water vapor on
them and grow in size, (because). 4. Fog is a cloud on the ground composed of
tiny droplets of water. Fog is a cloud on the ground, com¬posed of ice crystals,
(either ... or). 5. The water droplets in a cloud do not solidify. The airtemperature is far below freezing, (until). 6. Water is 800 times denser than air.
The droplets-of wafer fall at the predictable rate, (since). 7. The nucleus on
which the water condenses may be a soil particle. The nucleus may be a
grain of sea salt. (either ... or).
V, Instead of saying: Fog is a cloud on the ground which is composed of tiny
droplets of water.
We can say: Fog is a cloud on the ground composed of tiny droplets of water.
Change the following sentences accordingly.
1. The atmosphere contains some water vapor which is supplied by evaporation
33
from different bodies of water.
2. The droplets of water condense on tiny particles of dust us the air which are
called condensation nuclei, 3. Ice fog is a cloud on the ground which is composed
of ice crys¬tals.
Complete the following sentences.
1. A cloud on the ground composed of ... is called fog. 7. Water vapour supplied
by ... forms a part of the at¬mosphere. 3. Tiny particles of dust called ... initiate
con¬densation at subsaturationhumidities.
VI.
Study the form of these sentences,
1. The more droplets the denser the fog. 2. The higher the humidity of the air the
denser the fog. 3, The lower the temperature the faster the solidification of water
droplets.
Write sentences using: the more ... the less; the hig¬her ... the slower; the better
... the faster.
VII.
Explain the meaning of "since" in these sentences.
1. Since water is 800 times denser than air it seemed strange why fogs did not
disappear through fallout of the water particle to the ground. 2. Ice fogs occur in
cold climates since the water droplets in a cloud solidify only if the air
temperature is far below freezing. 3. Fogs have become particularly dense since
autumn,
VIII. Study the form of this sentence.
Given suitable conditions of temperature and humidity
the density of a fog will depend on the availability of
condensation nuclei and their nature.
Complete the following.
Given suitable air temperature... Given suitable condi¬tions of atmosphere...
Given "suitable conditions of humidity …
IX.
Write sentences beginning with: It turns out that...
X.
Instead of saying: the salt of the sea.
We can say: sea salt.
Change the following in the same way.
Particles of combustion; droplets of water; temperature of the air; point of
saturation; particles of soil; crystals of ice.
TASK 17
Read the text and do exercises to it.
TSUNAMIS
Exceptional disturbances of ocean water occur during and after earthquakes,
landslides or volcanic eruptions in and around the ocean basins. These produce
waves several hundreds miles in length, with periods of up to half an hour,
precediant velocities of up to 800 km/hr across the deep oceans. They are barely
perceptible in mid-ocean but on entering shallow coastal waters they build
up into giant "tidal waves" which may attain heights of more than 30 m by
the time they reach the coast. The term "tidal waves" is misleading, for
they are not tidal in origin, and the scientific term for them is the
Japanese word "tsunami". They are most common in the Pacific Ocean,
which is bordered by zones of crustal instability, and they are responsible for
occasional catastrophic flood¬ing and erosion of Pacific coasts, often with
much de¬vastation and loss of life far from the originating disturbance.
In April 1946 a tsunami was initialed by an earth¬quake off the Aleutian Islands,
and waves travelling south¬wards arrived in the Hawaiian Islands, 3700 km away,
in less than five hours, having moved at an average speed of 750 km/hr. The town
Hilo in Hawaii was hit by wa¬ves rising 9m, and at one point a wave reached 16.8
m. Beaches were swept away, and the waves carried reef debris, including large
blocks of coral, on to the coast, and eroded hollows on hillsides far above normal
high tide level. giant waves were recorded at many other places around the
Pacific Ocean.
It is now realized that tsunamis are not necessarily “dumped down”, by
distances; The magnitude of waves received depends, partly on offshore
topography, the waves being higher where the offshore zone is gently shelving;
and partly on the orientation of a coast, in relation to the source of the
disturbance. An earthquake along a fault line is likely to produce higher waves on
coasts facing and parallel to the fault than on coasts which run obli¬quely to it;
the greatest effects of the I960 tsunami off the coast of Chile were on parts of the
Japanese coast pa¬rallel to the line of disturbance of the Chilean earthquake.
Wave heights are much reduced where coral reefs border the coast, where there
is deep water close inshore, or where the waves have been refracted round
reefs, shoals or islands of intricate configuration.
Exercises
/. Arrange the words to form a sentence.
1. tsunamis, in the Pacific Ocean, are most common. 2. a tsunami, in April 1946,
was initiated, off the Aleutian Islands, by an earthquake. 3. carried, the waves,
reef debris, on to the coast. 4. were recorded, giant waves, at many places,
around the Pacific, 5. are barely perceptible, waves, in mid ocean.
//. Answer the questions in short simple sentences. Your paragraph should not
exceed 100 words.
1. When do tsunamis occur? 2. When do tsunamis attain exceptional heights? 3.
Where are tsunamis most common? 4. What are tsunamis responsible for? .
What does the magnitude of waves depend on? G. Where are wave heights
reduced?
///. In not more than 10 words describe the 1946 tsuna¬mi. Use your own words
as far as possible.
IV .Explain the meaning of the italicized- words and phrases as they are used in
the passage.
V. Join the following sentences using the connecting words in brackets. Omit the
words in italics.
1. On entering shallow coastal waters the waves build up into giant "tidal waves".
35
These waves may attain heights of more than 30 m. (which). 2. The term "tidal
waves" is misleading. They are not tidal in origin, (for). 3. Tsunamis are most
common in the Pacific Ocean. The Pacific Ocean is bordered by zones of crustal
instability, (which). 4. Tsunamis occur during and after earthquakes in the ocean
basins. Tsunamis occur during and after earthquakes around the ocean basins.
(both ... and). 5. Wave heights are much reduced where there is deep water close
inshore. Wave heights are much reduced where coral reefs border the coast,
(both ... and).
VI. Instead of saying: The waves carried reef debris . which included large blocks
of coral.
We can say: The waves carried reef debris including large blocks of coral.
Change the following sentences in the same way.
1. On coasts which face the fault an earthquake .is likely to produce4 higher
waves. 2. The town of Hilo in Hawaiian Islands was high by waves which rose 9
m. 3, On. entering shallow coastal waters the waves build up into giant "tidal
waves" which attain tremendous heights. 4. Waves which travelled southwards
arrived in the Ha¬waiian Islands in less than five hours. 5. An earthquake along
the fault line is likely to produce lower waves on coasts which run obliquely to
the fault.
Complete the following,
I. Waves travelling ... arrived in the Hawaiian Islands in less than five hours. 2.
Disturbances of ocean wavesoc¬curring ... produce giant waves. 3. Waves
entering ... build up info giant "tidal waves".
VII.
Compare these two sentences.
instead of saying: When students turn to the passage they learn that tsunamis are
most common in the Pacific Ocean.
We can say: On turning to the passage the students learn...
Write these sentences again so that each one begins with "On...
1. When the waves arrived in the Hawaiian Islands they hit the town of Hilo. 2.
When tsunamis enter shallow coastal waters they build up into giant waves. 3.
When tidal waves reach the coastal waters They attain heights of more than 30 in.
VIII. Compare these two sentences.
Instead of saying: When the students finish the work they go home.
We can say: Having finished the work the students go home.
Change the following sentences in I he same way,
I. When tsunamis attain heights of more than 30 m they hit the coast. 2. When
tsunami waves hit the coast they erode hollows far above normal high tide level.
3. When tsunami waves reach the coast they sweep away the beaches.
IX.
Study the following sentence.
An earthquake along the fault line is likely to produce higher waves on coasts
facing the fault than on coasts which run obliquely to it.
Com plete the following.
Waves heights are likely to be reduced where... 2. Tsunamis are likely to occur
after,.. 3. Great waves are likely to erode... 4, Tsunamis are likely to be
responsible for.
TASK 18
Read the text and do exercises to it.
Why Italians don’t Make Babies?
ONCE upon a time, the Anglo- Saxon cliche held that Italy stood for love
and passion; frequent and
frenzied sex, without, of course, contraception;
and, as a result, big weddings, big families and loads of children. How times –
and images – change. Italians have stopped making babies; the nation is ageing
fast; and, according to the country's chief statistical body, Italy has the lowest
fertility rate in the world. Women now bear 1,2 babies apiece. Only the Spaniards,
in Western Europe, are as unproductive. At last count, in 1996, deaths had
outpaced births for four years in a row. If Italy's population is slightly up, it is
thanks to the 178 000 immigrants who took up legal residence two years ago.
Why? No explanation is definitive. Ever more Italian women work, so have
less time for bambini. North European women work just as much, but mothers
get more help: public nurseries, finance, holidays, husbands who (more often
than in Italy) help in the house. But
there are anomalies. The region of Emilia Romagna, for instance, has some of the
best nurseries in the world but also Italy's lowest baby- making rate. Perhaps the
dearth is due to late-coming feminism: the region is also Italy's most left-wing.
Ida Magli, an anthropologist, has come up with another reason:
childlessness no longer bears a stigma, and the social pressure to marry and have
children is much weaker. That applies even in the Mezzogiorno (Italy's poor and
ultra-traditional south), where women are choosing to have fewer babies.
In any event, the notion that impetuous Italians have unprotected sex is
false. It is some time since most Italians, even the good Catholics among them,
eschewed contraception.
One more possible explanation? Young Italians discovered yuppiedom later than
their American or French counterparts. But many of them do now want to go
dancing, travel and have a good time for many more years than before. Marriage
and babies can wait. And the two are still more closely linked than
in most other countries in Europe: only6 % of Italian babies are born out of
wedlock. But less than a third of women now become mothers before they are
28. One Italian habit still survives, and may also inhibit baby- making: the,
"mammoni-phenomenon". A lot of young adults – perhaps even more than
before – still live with their parents, partly because they cannot afford to live so
comfortably on their own. Living
with parents, however open-minded they
are, does tend to make you behave a bit more demurely with friends of the other
sex. And there is still, even in Italy, a connection between sex and babies.
1. Vocabulary notes:
1) frenzied – бешеный, яростный, темпераментный
2) fertility – воспроизведение потомства
3) dearth – недостаток, нехватка (продуктов)
4) stigma – пятно позора, стигма
5) eschew – избегать, сторониться
6) yuppiedom – светская жизнь
7) inhibit – мешать, препятствовать, сдерживать
8) demurely – скромно, сдержанно
9) impetuous – порывистый, темпераментный
2. Answer the following questions.
1) Does the title of the text “Why Italians don’t make babies” express its main
idea?
2) What are the consequences of Italians have stopped making babies?
3) Can Italian women employment be considered as a definitive explanation?
4) Is childlessness still believed to be shameful?
5) Do Italians postpone marriage and babies because of their wish to have a good
time?
6) What is “mammoni-phenomenon”?
3. Summary.
TASK 19
Read the text and do exercises to it.
Doctored
In any list of die great names in the history of economics, there is sure to be more
than a sprinkling of Britons – from Adam Smith to Ricardo, Marshall, Keynes and
Hicks.But British economics dons are asking themselves an uncomfortable
question: where are their successors coming from? And who is going to teach
them?
The number of Britons taking master's degrees-generally regarded as the
minimum qualification for professional economists – is holding up. But the
number going on to doctorates is falling. Andrew Oswald, an economics professor
at Warwick University, says that the top ten economics departments in Britain
now average only one new British doctoral student a year.
In 1997 the Economic and Social Research Council (ESRC), which finances
the studies of about a quarter of PhD economics students, handed out 33 awards.
British students took only 16 – the rest went to students from the European
Union. The British share of applications awards also fell below half for the first
time, from 58 out of 100 in 1995 to 31 out of 84 in 1997. In Keynes's day, none of
this would have
mattered – the great man had but one degree, in mathematics. But the ESRC is
sufficiently concerned about all this to be planning a study of why the number of
would-be PhDs is falling.
The obvious answers is pay. The starting salary for a university
lecturer, with a doctorate in economics, is, at best, ?20 000 ($32 400) a year.
Yet in the City of London, economists with only master's degrees can expect to
start
38
on nearer to ?30 000- and comfortably more than that if they have a few years’
experience in the Bank of England or the Treasury. Indeed, a PhD usually adds
nothing to an economist's earning power in a City firm, unless it is in a soughtafter area such as econometrics (high-powered number-crunching).
The growth of economic consultancy has provided another career path, drawing
economists away from academe. Behind this, says Simon Gaysford of London
Economics, a consultancy, lie two things. One is privatisation, which in effect
forced companies to hire experts on economic regulation. AS privatisation has
spread across the world, so British economists have found that expertise gained
at home is highly marketable. Second, because antitrust cases "how turn on
economic as well as legal arguments, companies are paying big fees to
economists as well as lawyers.
Besides the pay gap, academic life is less secure than it used to be: staff
who would once have had tenure are as sackable as anybody else. Also, says
Dieter Helm – who is an Oxford don as well as director of «Oxera», a consultancy
– the burden of paperwork and lack of research funds are extra reasons not to
become an academic . The market for economists works far better outside the
universities than it does inside them. The scarcity of top professors, says
Professor Oswald, is now driving their salaries up; but the cartel of university
bosses has succeeded in keeping the lid on junior dons' pay. Meanwhile, the City
and the consultancies pay up. This may be lucrative for the current generation or
economists. Who will educate the next generation though, is an unanswered
question.
1. Vocabulary notes:
1) sprinkling – посыпание, уснащение
2) PhD (= Doctor of Philosophy) – докторфилософии
3) master’sdegree – степень магистра
4) soughtafter – популярный, модный
5) econometrics – эконометрика (наука, изучающая конкретные количественные связи между экономическими объектами и
процессами)
6) expertise – специальные знания, компетенция
7) tenure – зд. срок пребывания в должности
8) scarcity – недостаток, нехватка, редкость
9) tokeepthelidon – держать в секрете
10) lucrative – прибыльный, доходный, выгодный
2. Answer the following questions.
1) What uncomfortable question are British economics dons asking themselves? Why?
2) Which fact from the article proves the unpopularity of scientific activity among
British students?
3) What is the obvious explanation of the fact the number of would be PhDs is
falling?
4) What is the role of the growth of economic consultancy?
5) Which two things make economic expertise highly marketable?
39
6) What does it mean “academic life is less secure than it used to be”?
7) What is the author’s conclusion?
TASK 20
Read the text and do exercises to it.
Write on
Just as the introduction of the printing press in Europe in the late 15th century led
many scribes of the time into a state of unemployed despair, so the more recent
spread of the computer – whose typefaces can reproduce
calligraphic designs of enormous variety – has made many latter-day scribes
redundant Nevertheless, calligraphy as an art is still alive – both in its three
traditional forms, based on Chinese, Roman and Arabic scripts, and in
experimental new departures.
For most people in the West, pride in penmanship is rare nowadays; however, in
eastern countries good handwriting is still steadfastly taught in schools. China's
Chairman Mao aspired to write out his own mediocre poems in a jagged script.
And modern calligraphic masterpieces in Japan can sometimes fetch as much as a
small Picasso painting.
Oriental calligraphers (who work with the brush rather than the pen) study and
copy the output of their great forerunners and work within the same rigorous
limits. Varying effects are created by holding the brush at different angles, and no
mistakes can be altered or erased.
After Mao's death in 1976, however, a new generation in China dared to use
calligraphy in avantgarde as well as traditional ways. And in Japan, at least one
modern Japanese master, Ogawa Toshu, has also rejected the old limits. One of
his calligraphic drawings, using' the characters for "Nesting Crane", depicts eyes
at the heart of an ink storm; the artist says that it represents a mother crane who
is protecting her young in a blizzard.
Western and Arabic calligraphy is based on the pen (though the brush was
employed for illuminating manuscripts). Medieval Christian monks preferred to
use a quill, made from goose or swan feathers, and modern secular calligraphers
often use the same antiquarian tool. Islamic calligraphers preferred pens cut from
dried reeds, as they still do today.
Later Christian craftsmen were usually clerks whose business was to make copies
of the Bible in acceptable, workmanlike fashion.
Islamic calligraphy, on the other hand, has always been perceived as a meditative,
even mystical exercise; the scribe has to make himself or herself (many Arabic
calligraphers have been women) ritually pure before they set about transcribing
from the Koran.
The best 20th-century calligraphers in the West are powerfully painterly. And
their inspiration, as in the case of Mark Tobey, an American Expressionist who
studied calligraphy at a Zen monastery in Japan, is usually oriental and
(sometimes) Islamic.
40
Hans-Joachim Burgert, a German master, believes that calligraphy is now free to
discover its own underlying, primitive forms. His spirited brushwork in English of
the words "Unknown Branches", in which the letters tumble and sway like a tree
in a tempest, hovers provocatively on the borders of llegibility.
1. Vocabulary notes:
1) scribe – писец, переписчик
2) despair – отчаяние, источникогорчения, безысходность
3) typefaces – печатные литеры
4) departure – отклонение, направление, курс
5) penmanship – каллиграфия, чистописание
6) steadfastly – упорно, прочно
7) rigorous – строгий, точный, неукоснительный
8) “NestingCrane” – «Журавль, вьющий гнездо»
9) blizzard – метель, буран, буря
10) quill – птичье (гусиное) перо
11) secular – зд. светский, нецерковный
12) reed – тростник, камыш
13) workmanlike – искусно
14) meditative – созерцательный
15) painterly – живописный, относящийся к живописи
16) underlying – лежащий в основе, основной
18) spirited – смелый, задорный, выразительный
19) tumble – валяться, метаться, кувыркаться
20) sway – качаться, раскачиваться
21) tempest – буря
22) hover – парить, зависать, болтаться
2. Answer the following questions.
1) What is the article about?
2) In what countries can one be taught modern calligraphy?
3) What calligraphic styles does the author of the article mention?
4) Can we say that the art of calligraphy has been developing?
5) What does the author tell us about the best modern calligraphers?
Task 21
Read the text and do exercises to it.
Dyed in the Womb
A lesbian's sexual identity seems to be established before her birth. Men and
women blink differently when startled . That simple and well-established
observation has led QaziRahman of the University of East London, in England, and
his colleagues to evidence supporting the idea that homosexuality is a
characteristic which people are born with, rather man one they acquire as they
grow up .The team's research, just
41
published in Behavioral Neuroscience, shows that lesbians blink like heterosexual
men. That, in turn, suggests that the part of their brain that controls this reflex
has been masculinised in the womb.
Anyone who is startled by an unexpected noise tends to blink. If,
however, the startling noise is preceded by a quieter sound, this blink is not so
vigorous as it would otherwise have been. It is this lack of vigour which differs
between the sexes. Men blink less vigorously than women when primed in this
way.
Given such a clear and simple distinction, testing the responses of homosexuals to
noise seemed an obvious experiment to do. So DrRahman and his colleagues did
it. Their subjects, men and women, gay and straight, were sat down one by one in
a dimly lit room. The muscles that cause blinking were wired up with recording
electrodes, and the subjects were fitted with headphones through which the
sounds
(sometimes a single startling noise, and sometimes a combination of
soft and loud) were fed.
In the latter case, as compared with the former, straight men had blinks
that were 40 % less vigorous. In the case of straight women the drop was 13 %.
Lesbians dropped 33 % which, statistically, made them more similar to straight
men than straight women. Gay men were also intermediate, although in their
case the difference was not statistically significant. Even in this apparently trivial
matter, it seems,lesbianshave male-like brains. So what is going on? By default,
people are female. Without influence of testosterone in the womb, a fetus will
develop into a girl. The way testosterone acts to turn a fetus male is still poorly
understood. It seems likely, though, that different organs respond independently
to the hormone, and may do so at different times. Hormonal surges at critical
moments could thus cause particular organs in an otherwise female body to
become "male". (A lull in hormone products might have the opposite effect.) If
the organ concerned is the brain, the result is more male-like behaviour including,
possibly, male-type sexual preferences. Previous research has provided some
evidence for this idea. Lesbians, for instance, are more accurate throwers of
objects such as darts than straight women. In this they resemble straight men in a
way that has nothing to do with sexual preference. And tissues other than the
brain's may be affected,too. On average, lesbians ring fingers that are longer than
their indexfingers, a feature that is typical of men but not of heterosexual women.
In that context, a difference in the blink of an eye is no surprise at all.
1. VocabularyNotes:
1) blink – мигать, закрывать глаза
2) startle – пугать, поразить
3) masculine – мужской, мужеподобный
4) vigour – сила, мощь, живость, энергичность
5) prime – зд. воздействовать
6) wireup – связывать, соединять
7) straightandgay – гетеросексуальные люди и гомосексуалисты
8) default – бездействие, пассивность, неявка, отсутствие
9) fetus – плод, зародыш
42
10) surge – скачок, колебание
11) lull – перерыв, затишье
12) tissue – биол. ткань
13) ringfinger – безымянный палец
14) index finger – указательныйпалец
2. Answer the following questions.
1) What observation has made some East London specialists support the idea
that homosexuality is an inborn characteristic rather than acquired one?
2) What exactly differs between the sexes startled by an unexpected noise?
3) What experiment was waged by Dr. Rahman and his colleagues ?
4) What way does testosterone act?
5) What features are lesbians and straight women characterized by?
3. Make up a summary of the text.
Task 22
Read the text and do exercises to it.
Are the Rules being Bent Again?
A judge says an accused terrorist can call the witnesses he wants. No, he
can’t…
A federal judge has ruled that prosecutors may not seek the death penalty
against Zacarias Moussaoui, the only person in the United States to have been
charged so far in connection with the September 11th terror attacks. Nor may
they present any evidence linking this so-called "20th hijacker" with the planning
or execution of the attacks.
The ruling, by a district judge, Leonie Brinkema, came after the federal
government refused to allow Mr. Moussaoui to question al-Qaeda suspects who,
he claims, could prove his innocence. The government says it will appeal . Mr.
Moussaoui, a 35-year-old French man of Moroccan descent, was first arrested in
the United States in August 2001 on minor immigration charges. It was not until
after the
suicide hijackings the next month that investigators began to take a keener
interest in the Muslim trainee pilot being held in a Minnesota jail. Three months
later Mr Moussaoui was charged on six counts of conspiracy – four of them
punishable by death – to commit acts of terrorism, aircraft piracy, use of weapons
of mass
destruction, destruction of aircraft, murder of government employees and
destruction of government property.
Although he admitted being a member of al-Qaeda, Mr. Moussaoui claimed
he knew nothing about the attacks until after they had осcurred. In an attempt to
prove his innocence, he sought to question hree key al-Qaeda prisoners, including
Khalid Sheikh Mohammed, the alleged mastermind of 9/11, and Mustafa Ahmed,
its alleged financier.
In two rulings earlier this year, Judge Brinkema ordered that he should be
allowed to question by satellite link the three men, all being held at secret
locations outside the United States. The government has refused to comply,
arguing that national security could be jeopardised by the disclosure of
confidential information.
43
In her latest ruling, delivered on October 2nd, Judge Brinkema said the
government could not "maintain this capital prosecution while simultaneously
refusing to produce witnesses who could, at a minimum, help the defendant
avoid a sentence of death". But she refused to take the widely expected step of
dismissing all charges against Mr.
Moussaoui, who could face life imprisonment if convicted of the charges still
pending. Her desire to keep the case under civilian jurisdiction appears to have
been among her reasons for wishing to continue with a truncated trial. "This case
can be resolved in an open and public forum," she declared.
Among the options now facing the government is the possibility of
transferring the trial to a military tribunal whose rules, including the right to
extensive hearings behind closed doors, would be likely to help the prosecution.
But this would attract widespread criticism. The government is already under
attack for its treatment of some 660 al-Qaeda and Taliban suspects held at
Guantanamo Bay, an American naval base in Cuba, where they are supposed to
be awaiting trial before special
military courts. Although some have now been detained for over 21 months, no
charges have yet been brought. Nor have any of the prisoners, who include
citizens of some of America's closest allies, had access to a lawyer or a consular
official.
Despite the criticism, the American government insists the Guantanamo
Bay detainees are not prisoners of war but "enemy combatants", who are being
held outside strictly-defined United States territory (the Guantanamo base is
leased in perpetuity from Cuba) and therefore have no rights under either the
Geneva Conventions or the American constitution. Last month Donald Rumsfeld,
the secretary of defence, seemed to confirm suspicions that the government does
not
wish to bring these prisoners to trial. "Our interest," he said, "is not in trying them
and letting them out. Our interest is in-during this global war on terror-keeping
them off the streets, and so that's what's taking place." But that war could go on
for a very long time, perhaps for decades.
The government insists the Guantanamo prisoners are being treated
"humanely". All now have individual indoor cells, proper beds, washing facilities
and toilets. In July six of them, including two Britons and an Australian, were said
to be eligible for trial. But, since then, nothing. No charges have been brought and
no trial date set.
1. Vocabularynotes:
1) rule – постановлять, решать (в судебном порядке)
2) prosecutor – обвинитель
3) hijacker – воздушный пират, бандит
4) suspect – зд. подозреваемый
5) alleged – предполагаемый, обвиняемый
6) mastermind – руководитель, вдохновитель
7) comply – подчиняться, уступать
8) defendant – подсудимый, обвиняемый
9) pending – предстоящий, ожидающий решения
44
10) treatment – обращение, обхождение
11) detain – арестовывать, содержать под стражей
12) try – зд. допрашивать, привлечь к суду
13) eligible – подходящий, приемлемый
2. Statements for discussion.
1. Al-Oaeda is a very potent, well-financed, militant organization, responsible for
a lot of suicide hijackings.
2. An accused terrorist can’t call the witnesses he wants because of threat to the
US national security, caused by possible disclosure of confidential information.
3. Military court provides detainees with less rights than civilian court.
4. Keeping some 660 al-Qaeda and Taliban suspects at Guantanamo Bay may be
“Solomon’s decision” of the American Government.
5. Prisoners of all kinds should be treated humanely.
3. Give a summary of the text.
Task 23
Read the text and do exercises to it.
Breathe or be Strangled
If Eskimos have dozens of words for snow, Germans have as any for
bureaucracy. The most popular is Amtsschimmel, a word of obscure origin that
translates roughly as “the office horse”. The government declares that it is bent
on chasing these clodhoppers out of Germany. But has it any more chance of
success than in the past? The Institute for the German Economy, the research arm
of the country’s business associations, hopes so, if only because the economy
might be strangled to death unless red tape is loosened. Germans are fed up
with forms and rules. Pollsters at the Allensbach Institute say that as many as 90
% of Germans have had rows with bureaucrats, up from 64 % in 1978. Bild,
Germany’s biggest tabloid,
recently sent out a reporter in search of ridiculous rules. One example: a tailor
who had to put up a sign saying “fire extinguisher” next to (guess what) her fire
extinguisher, to produce a thick folder with all regulations relevant to her
business, to raise her work table by ten centimeters, to buy a special emergency
kit, and to check if her only employee was allergic to nickel – at a cost of Ҳ400
($428).
Germany is, in short, one of the most rule-bound countries in the world.
And that is bad news for the economy, particularly for entrepreneurs hoping to
set up in business.A new World Bank study, “DoingBusiness in 2004”, illustrates
the problem . The study shows that it takes an average of 45 days to register a
new firm in Germany, compared with 18 in Britain and only four in America. The
process is also cheaper in America, Britain, Canada and France than in Germany.
The government has launched a “masterplan for reducing bureaucracy”,
listing dozens of cases where archaic rules should be scrapped or simplified.
45
It recently brought in a bill to do away with such workplace regulations as where
to put light switches or the shape of rubbish bins. The government has also
chosen three regions where some laws will be suspended while local and federal
agencies try out
alternatives.
Yet it will take years for Germany to match America and Britain. Germans
may inveigh against bureaucrats, but they have a soft spot for state
mollycoddling. In any case, over a third of the members of the federal parliament
are former civil servants, hardly likely to be in the forefront of a campaign to cut
bureaucracy. Even some businessmen are ambivalent, for regulation can be
useful barrier to competition. The supposedly free market opposition has
attacked government plans to loosen laws protecting guilds of architects and
craftsmen from competition.
The language of officialdom hardly helps. A recent example of cutting red
tape was a law to speed up approval for building roads. Its name:
VerkehrswegeplanungsbeschleunigunVerkehrsweggsgesetz.
1. Vocabulary notes:
1) red tape – волокита, бюрократизм
2) skirmish – схватка, столкновение
3) strangle – подавлять, душить
4) clodhopper – увалень, неповоротливый
5) pollster – лицо, проводящее опрос общественного мнения
6) folder – папка, проспект
7) scrap – выбрасывать (за ненадобностью)
8) inveigh – выступать против
9) softspot – уязвимое место
10) mollycoddle – баловать, нежить
11) ambivalent – двойственный
12) officialdom – чиновничество, бюрократический аппарат
2. Statements for discussion.
1) Germans are fed up with forms and rules much more than Russians are.
2) Too many rules is bad for any economy.
3) It is easy to do business in Germany in a civilized way, for business culture has
had long history there.
4) Germans are ambivalent concerning cutting their bureaucracy. Prove that.
5) Red tape in Russia. Could you give some examples?
6) Business culture in Russia. Has it made any progress recently?
3. Give a summary of the text.
46
Task 24
Read the text and do exercises to it.
Spying on the Spies
Throughout the 1990s, Peru’s National Intelligence Service was
synonymous with VladimiroMontesinos, the sinister spy chief who spun a web of
corruption and intimidation from the heart of the authoritarian government of
Alberto Fujimori. Since July 2001, Peru has been governed democratically under
President Alejandro Toledo, and Mr. Montesinos is now in jail. But the intelligence
service remains in turmoil-just when once again Peru needs one.
Last month, Mr. Toledo sacked the service’s head, Alfonso Panizo, a retired
admiral, the fourth man to hold the job in two years. His departure came after it
had emerged that one of the president’s phone calls had been tapped, and the
tape of the call given to a scandal-hungry television programme. Another
television show then accused the intelligence service of spying on several
awkward journalist. Mr. Panizo denied the charges; his agents were simply trying
to discover who has leaking secrets to the media, he said.
The new intelligence chief is Daniel Mora, a retired general but also a
member of Mr. Toledo’s Peru Possible party (its secretary for ethics, no less). His
appointment has stirred controversy: opponents say that the intelligence service
should serve the state, rather than the governing party. But the bigger problem is
that the service needs thorough reform.
Mr. Montesinos still casts a long shadow. He turned the service from a
small group of academics and analysts into a lavish outfit packed with military
men engaged in dirty tricks. Sophisticated monitoring equipment, some donated
by America’s Central Intelligence Agency to fight drugs, was diverted to political
and commercial use. Mr. Montesinos routinely tapped the phones of politicians,
journalists, top businessman and judges; he even surreptitiously recorded some
of
Mr. Fujimori’s private meetings.
Mr. Toledo’s government has slashed the service’s budget and personnel
(though in it still overstaffed). The perverse result is that most of the monitoring
equipment now seems to be in the hands of private security companies, some run
by former army cronies of Mr. Montesinos. In effect, telephone-tapping has been
privatized; the results are leaked to pursue political vendettas.
Apart from poisoning politics, all this is bad for public safety. Peru has real
security threats that need watching. Drug exports are rising, as is kidnapping.
Though nothing like the threat they used to be, small groups of Shining Path
guerrillas roam remote areas. The country need spies – but honest ones.
1. Vocabulary notes:
1) sinister – зловещий, темный
2) spin (spun, spun) – плести, составлять
47
3) intimidation – запугивание, шантаж
4) turmoil – беспорядок, смятение
5) tap – зд. подслушивать
6) controvercy – спор, полемика
7) lavish – расточительный
8) divert – отвлекать, уводить в сторону
9) surreptitiously – исподтишка
10) slash – зд. урезать, сократить
11) crony – близкий, закадычный друг
12) guerrilla – партизан
13) roam – скитаться, бродить
2. Statements for discussion.
1) VladimiroMontesinos is known to have been a master of the dark arts.
2) The appointment of the new intelligence chief Daniel Mora has been approved
unanimously in Peru.
3) Donated by America’s Central Intelligence Agency sophisticated equipment to
fight drugs was used perversely.
4) Public safety in Peru is reported to be far from normal state.
5) Each country should have spy web to provide security for its citizens.
3. Give a summary of the text.
48
Часть III Текстыдляреферирования
Task 1 Read the texts and study the summaries to the text
Text1
Laser lidar
Laser-based lidar (light detection and ranging) has also proven to be an
important tool for oceanographers. While satellite pictures of the ocean surface
provide insight into overall ocean health and hyperspectral imaging provides
more
insight, lidar is able to penetrate beneath the surface and obtain more specific
data,
even in murky coastal waters. In addition, lidar is not limited to cloudless skies or
daylight hours.
“One of the difficulties of passive satellite-based systems is that there is watersurface reflectance, water-column influence, water chemistry, and also the
influence
of the bottom”, said Chuck Bostater, director of the remote sensing lab at Florida
Tech
University (Melbourne, FL). “In shallow waters we want to know the quality of the
water and remotely sense the water column without having the signal
contaminated by
the water column or the bottom”.
A typical lidar system comprises a laser transmitter, receiver telescope,
photodetectors, and range-resolving detection electronics. In coastal lidar studies,
a
532-nm laser is typically used because it is well absorbed by the constituents in
the
water and so penetrates deeper in turbid or dirty water (400 to 490 nm
penetrates
deepest in clear ocean water). The laser transmits a short pulse of light in a
specific
direction. The light interacts with molecules in the air, and the molecules send a
small
fraction of the light back to telescope, where it is measured by the
photodetectors.
Abstract (Summary)
Laser lidar. “Laser Focus World”, 2003, v 46, №3, p45.
The text focuses on the use of laser-based lidar in oceanography.
The ability of lidar to penetrate into the ocean surface to obtain specific data in
murky coastal waters is specially mentioned.
Particular attention is given to the advantage of laser-based lidars over passive
satellite-based systems iN obtaining signals not being contaminated by the water
column or the bottom.
A typical lidar system is described with emphasis on the way it works.
This information may be of interest to research teams engaged in studying
shallow waters.
49
Text 2 A Spy with my flying eye
A little lateral thinking has transformed the prospects for tiny robot planes
1. A TINY, pilotless spy plane that can be fired from a cannon is under
development at the Massachusetts Institute of Technology. The minuscule
aircraft is designed to emerge from the case of an artillery shell and fly over
enemy territory, sending back both video pictures of the target and its
coordinates.
2. Trials this summer showed that the pane, called the Wide Area Surveillance
Projectile (WASP), is airworthy and could survive being blasted out of a cannon,
says
John Deyst, professor of aeronautics and astronautics at MIT and principal
investigator on the research project. So the team is continuing to work on it.
3. The WASP is the latest twist in the development of expendable drones that can
fly over enemy territory. Some are already in use, but they have to be launched
from a runway some distance behind the front line, taking up to an hour to rich
their target. What’s unique about the WASP, says Deyst, is that it will – hopefully
– be cheap, have a fast response time, and be controlled by a local commander.
4. The aircraft is meant to be packed into an artillery shell case that has a
diameter of 12.7 centimeters. Its wings, stabilization fins and propeller fold back
into its fuselage.
5. The shell could be fired from an artillery piece or a naval gun. When it is over its
target – which could be as far as 20 kilometers away – a parachute will emerge,
yanking the craft out of the shell (see Diagram).The spring-loaded wings then
extend to a span of about a meter, at which point a diesel engine switches on.
The plane will hold enough fuel for about half an hour’s flying. It will send back
video images of the target, along with its coordinates, obtained from Global
Positioning System satellites.
6. Deyst’s team faced two major technical challenges: one was to design a plane
that could fold into a shell and still operate after surviving the huge acceleration
of being fired from a gun. The other was to make the plane airworthy.
7. The team tackled the two problems separately. An unpowered model has now
survived simulated firings. And a lightly larger has been tested for airworthiness.
Deyst says the next challenge is to build a single model that survives both tests.
The main emphasis now is on developing electronic components that are robust
enough to survive the firing forces, he says.
8. Work on the WASP project has been carried out over the past two years with
funding from MIT and the Charles Stark Draper Laboratory in Cambridge,
Massachusetts. Now, Deyst says, he is looking for more funding from the USA
Army, Navy, or the Defense Advanced Research Projects Agency to continue
developing the drone.
9. The MIT team is not alone thinking along these lines: Science Applications
International of San Diego, California, is working on a similar project, with the aim
of carrying a bomb or other payload. Since the aircraft are designed to be
expendable, one key factor is keeping the cost down to about $20 000, says Mark
Roth, one of the researchers.
KurtKleiner
50
Аннотация
[Разведка с помощью беспилотного самолета]. I spy with my flying eye. Kleiner
K. «NewScientist», 1998, 19/XI, vol. 159, №2152, 22 (англ.).
Сообщается о разработке нового небольшого самолета-шпиона в
Массачусетском технологическом институте (США). Приводятся особенности
конструкции, технические характеристики и преимущества по сравнению с
известными аналогами. Кратко отмечаются технологические трудности
создания опытной модели лабораторного аппарата.
Abstract
The article describes a tiny, pilotless spy plane under development at
Massachusetts Institute of Technology (USA). The design features, principle of
operation, flight performance and its advantages over expendable drones already
in use are presented. Twpmajortechnicalchallengesarebrieflytouchedupon.
Реферат
Кратко описана конструкция нового небольшого самолета-разведчика
Массачусетского технологического института (MIT, США). Летательный
аппарат предназначен для передачи видео изображения целей и точных
координат противника со спутника системы GPS. Аппарат располагают внутри
артиллерийского снаряда диаметром 12,7 см и выстреливают из сухопутной
или морской пушки на дистанцию до 20 км. Над целью снаряд
освобождается от снаряда при помощи парашюта, срабатывают пружинные
механизмы раскрытия крыльев и пропеллера, включается дизельный
двигатель. Максимальный размах крыльев составляет около 1 м, запас
топлива рассчитан на работу двигателя в течение получаса. Команда
разработчиков столкнулась с двумя техническими проблемами –
обеспечением прочности конструкции при запуске, особенно электронной
аппаратуры, и габаритов. Ориентировочная стоимость составит 20 000$.
Илл. 2.
Б. Иванов
Text 1
Artificial Intelligence at Edinburgh University: a Perspective
Jim Howe
Revised June 2007.
Artificial Intelligence (AI) is an experimental science whose goal is
tounderstand the nature of intelligent thought and action. This goal is shared with
anumber of longer established subjects such as Philosophy, Psychology
andNeuroscience. The essential difference is that AI scientists are committed
tocomputational modelling as a methodology for explicating the interpretative
processeswhich underlie intelligent behaviour, that relate sensing of the
environment to actionin it. Early workers in the field saw the digital computer as
the best device available tosupport the many cycles of hypothesizing, modelling,
simulating and testing involvedin research into these interpretative processes.
They set about the task of developing aprogramming technology that would
enable the use of digital computers as anexperimental tool. Over the first four
decades of AI's life, a considerable amount oftime and effort was given over to
the design and development of new special purposelist programming languages,
tools and techniques. While the symbolic programmingapproach dominated at
the outset, other approaches such as non-symbolic neural netsand genetic
algorithms have featured strongly, reflecting the fact that computing ismerely a
means to an end, an experimental tool, albeit a vital one.
The popular view of intelligence is that it is associated with high level
problemsolving, i.e. people who can play chess, solve mathematical problems,
make complexfinancial decisions, and so on, are regarded as intelligent. What we
know now is thatintelligence is like an iceberg. A small amount of processing
activity relates to highlevel problem solving, that is the part that we can reason
about and introspect, butmuch of it is devoted to our interaction with the
physical environment. Here we aredealing with information from a range of
senses, visual, auditory and tactile, andcoupling sensing to action, including the
use of language, in an appropriate reactivefashion which is not accessible to
reasoning and introspection. Using the termssymbolic and sub-symbolic to
distinguish these different processing regimes, in theearly decades of our work in
Edinburgh we subscribed heavily to the view that tomake progress towards our
goal we would need to understand the nature of theprocessing at both levels and
the relationships between them. For example, some ofour work focused primarily
on symbolic level tasks, in particular, our work onautomated reasoning, expert
systems and planning and scheduling systems, someaspects of our work on
natural language processing, and some aspects of machinevision, such as object
recognition, whereas other work dealt primarily with tasks at thesub-symbolic
level, including automated assembly of objects from parts, mobilerobots, and
machine vision for navigation.
Much of AI's accumulating know-how resulted from work at the symbolic
level,modelling mechanisms for performing complex cognitive tasks in restricted
domains,for example, diagnosing faults, extracting meaning from utterances,
recognisingobjects in cluttered scenes. But this know-how had value beyond its
contribution tothe achievement of AI's scientific goal. It could be packaged and
made available foruse in the work place. This became apparent in the late 1970s
and led to an upsurge ofinterest in applied AI. In the UK, the term Knowledge
Based Systems (KBS) wascoined for work which integrated AI know-how, methods
and techniques with know-how, methods and techniques from other disciplines
such as Computer Science andEngineering. This led to the construction of
practical applications that replicatedexpert level decision making or human
problem solving, making it more readilyavailable to technical and professional
staff in organisations. Today, AI/KBStechnology has migrated into a plethora of
products of industry and commerce, mostlyunbeknown to the users.
History of AI at Edinburgh
The Department of Artificial Intelligence can trace its origins to a
smallresearch group established in a flat at 4 Hope Park Square in 1963 by Donald
Michie,then Reader in Surgical Science. During the Second World War, through
hismembership of Max Newman's code-breaking group at Bletchley Park, Michie
hadbeen introduced to computing and had come to believe in the possibility of
buildingmachines that could think and learn. By the early 1960s, the time
appeared to be ripeto embark on this endeavour. Looking back, there are four
discernible periods in thedevelopment of AI at Edinburgh, each of roughly ten
years' duration. The first coversthe period from 1963 to the publication of the
Lighthill Report by the ScienceResearch Council in l973. During this period,
Artificial Intelligence was recognizedby the University, first by establishing the
Experimental Programming Unit in January1965 with Michie as Director, and then
by the creation of the Department of MachineIntelligence and Perception in
October 1966. By then Michie had persuaded RichardGregory and Christopher
Longuet-Higgins, then at Cambridge University andplanning to set up a brain
research institute, to join forces with him at Edinburgh.
Michie's prime interest lay in the elucidation of design principles for the
construction of intelligent robots, whereas Gregory and Longuet-Higgins
recognized that computationalmodelling of cognitive processes by machine
might offer newtheoretical insights into their nature. Indeed, Longuet-Higgins
named his researchgroup the Theoretical Section and Gregory called his the
Bionics ResearchLaboratory. During this period there were remarkable
achievements in a number ofsub-areas of the discipline, including the
development of new computational tools andtechniques and their application to
problems in such areas as assembly robotics andnatural language. The POP-2
symbolic programming language which supported muchsubsequent UK research
and teaching in AI was designed and developed by RobinPopplestone and Rod
Burstall. It ran on a multi-access interactive computing system,only the second of
its kind to be opened in the UK. By 1973, the research in roboticshad produced
the FREDDY II robot which was capable of assembling objectsautomatically from a
heap of parts. Unfortunately, from the outset of theircollaboration these scientific
achievements were marred by significant intellectualdisagreements about the
nature and aims of research in AI and growing disharmonybetween the founding
members of the Department. When Gregory resigned in 1970 to go to Bristol
University, the University's reaction was to transform the Departmentinto the
School of Artificial Intelligence which was to be run by a SteeringCommittee. Its
three research groups (Jim Howe had taken over responsibility forleading
Gregory's group when he left) were given departmental status; the
BionicsResearch Laboratory's name was retained, whereas the Experimental
ProgrammingUnit became the Department of Machine Intelligence, and (much to
the disgust ofsome local psychologists) the Theoretical Section was renamed the
TheoreticalPsychology Unit! At that time, the Faculty's Metamathematics Unit,
which had beenset up by Bernard Meltzer to pursue research in automated
reasoning, joined theSchool as the Department of Computational Logic.
Unfortunately, the high level ofdiscord between the senior members of the
School had become known to its mainsponsors, the Science Research Council. Its
reaction was to invite Sir James Lighthillto review the field. His report was
published early in 1973. Although it supported AIresearch related to automation
and to computer simulation of neurophysiological andpsychological processes, it
was highly critical of basic research in foundational areassuch as robotics and
language processing. Lighthill's report provoked a massive lossof confidence in AI
by the academic establishment in the UK (and to a lesser extent inthe US). It
persisted for a decade - the so-called "AI Winter". Since the new School structure
had failed to reduce tensions between seniorstaff, the second ten year period
began with an internal review of AI by a Committeeappointed by the University
Court. Under the chairmanship of Professor NormanFeather, it consulted widely,
both inside and outside the University. Reporting in1974, it recommended the
retention of a research activity in AI but proposedsignificant organizational
changes. The School structure was scrapped in favour of asingle department, now
named the Department of Artificial Intelligence; a separateunit, the Machine
Intelligence Research Unit, was set up to accommodate Michie'swork, and
Longuet-Higgins opted to leave Edinburgh for Sussex University. The
newDepartment's first head was Meltzer who retired in 1977 and was replaced by
Howewho led it until 1996. Over the next decade, the Department's research was
dominatedby work on automated reasoning, cognitive modelling, children's
learning andcomputation theory (until 1979 when Rod Burstall and Gordon
Plotkin left to join theTheory Group in Computer Science). Some outstanding
achievements included thedesign and development of the Edinburgh Prolog
programming language by DavidWarren which strongly influenced the Japanese
Government's Fifth Generation
Computing Project in the 1980s, Alan Bundy's demonstrations of the utility of
metalevel reasoning to control the search for solutions to maths problems, and Howe's
successful development of computer based learning environments for a range of
primary and secondary school subjects, working with both normal and
handicapped
children.
Unlike its antecedents which only undertook teaching at Masters and Ph.D.
levels, the new Department had committed itself to becoming more closely
integrated
with the other departments in the Faculty by contributing to undergraduate
teaching as
well. Its first course, AI2, a computational modelling course, was launched in
1974/75. This was followed by an introductory course, AI1, in 1978/79. By 1982, it
was able to launch its first joint degree, Linguistics with Artificial Intelligence.
There
were no blueprints for these courses: in each case, the syllabuses had to be
carved out
of the body of research. It was during this period that the Department also agreed
to
join forces with the School of Epistemics, directed by Barry Richards, to help it
introduce a Ph.D. programme in Cognitive Science. The Department provided
financial support in the form of part-time seconded academic staff and
studentship
funding; it also provided access to its interactive computing facilities. From this
modest beginning there emerged the Centre for Cognitive Science which was
given
departmental status by the University in 1985.
The third period of AI activity at Edinburgh begins with the launch of the Alvey
54
Programme in advanced information technology in 1983. Thanks to the increasing
number of successful applications of AI technology to practical tasks, in particular
expert systems, the negative impact of the Lighthill Report had dissipated. Now,
AI
was seen as a key information technology to be fostered through collaborative
projects
between UK companies and UK universities. The effects on the Department were
significant. By taking full advantage of various funding initiatives provoked by the
Alveyprogramme, its academic staff complement increased rapidly from 4 to 15.
The
accompanying growth in research activity was focused in four areas, Intelligent
Robotics, Knowledge Based Systems, Mathematical Reasoning and Natural
Language
Processing. During the period, the Intelligent Robotics Group undertook
collaborative
projects in automated assembly, unmanned vehicles and machine vision. It
proposed a
novel hybrid architecture for the hierarchical control of reactive robotic devices,
and
applied it successfully to industrial assembly tasks using a low cost manipulator. In
vision, work focused on 3-D geometric object representation, including methods
for
extracting such information from range data. Achievements included a working
range
sensor and range data segmentation package. Research in Knowledge Based
Systems
included design support systems, intelligent front ends and learning environment.
The
Edinburgh Designer System, a design support environment for mechanical
engineers
started under Alvey funding, was successfully generalised to small molecule drug
design. The Mathematical Reasoning Group prosecuted its research into the
design of
powerful inference techniques, in particular the development of proof plans for
describing and guiding inductive proofs, with applications to problems of program
verification, synthesis and transformation, as well as in areas outside
Mathematics
such as computer configuration and playing bridge. Research in Natural Language
Processing spanned projects in the sub-areas of natural language interpretation
and
generation. Collaborative projects included the implementation of an English
language
front end to an intelligent planning system, an investigation of the use of
language
generation techniques in hypertext-based documentation systems to produce
output
tailored to the user's skills and working context, and exploration of semiautomated
editorial assistance such as massaging a text into house style.
In 1984, the Department combined forces with the Department of Lingistics and
the Centre for Cognitive Science to launch the Centre for Speech Technology
Research, under the directorship of John Laver. Major funding over a five year
period
was provided by the AlveyProgramme to support a project demonstrating realtime
continuous speech recognition.
By 1989, the University's reputation for research excellence in natural language
computation and cognition enabled it to secure in collaboration with a number of
other
universities one of the major Research Centres which became available at that
time,
namely the Human Communication Research Centre which was sponsored by
ESRC.
During this third decade, the UGC/UFC started the process of assessing research
quality. In 1989, and again in 1992, the Department shared a "5" rating with the
other
departments making up the University's Computing Science unit of assessment.
The Department's postgraduate teaching also expanded rapidly. A master’s
degree in Knowledge Based Systems, which offered specialist themes in
Foundations
55
of AI, Expert Systems, Intelligent Robotics and Natural Language Processing, was
established in 1983, and for many years was the largest of the Faculty's taught
postgraduate courses with 40-50 graduates annually. Many of the Department's
complement of about 60 Ph.D. students were drawn from its ranks. At
undergraduate
level, the most significant development was the launch, in 1987/88, of the joint
degree
in Artificial Intelligence and Computer Science, with support from the UFC's
Engineering and Technology initiative. Subsequently, the modular structure of the
course material enabled the introduction of joint degrees in AI and Mathematics
and
AI and Psychology. At that time, the Department also shared an "Excellent" rating
awarded by the SHEFC's quality assessment exercise for its teaching provision in
the
area of Computer Studies.
The start of the fourth decade of AI activity coincided with the publication in
1993 of "Realising our Potential", the Government's new strategy for harnessing
the
strengths of science and engineering to the wealth creation process. For many
departments across the UK, the transfer of technology from academia to industry
and
commerce was uncharted territory. However, from a relatively early stage in the
development of AI at Edinburgh, there was strong interest in putting AI
technology to
work outside the laboratory. With financial banking from ICFC, in 1969 Michie and
Howe had established a small company, called Conversational Software Ltd (CSL),
to
develop and market the POP-2 symbolic programming language. Probably the
first AI
spin-off company in the world, CSL's POP-2 systems supported work in UK
industry
and academia for a decade or more, long after it ceased to trade. As is so often
the
case with small companies, the development costs had outstripped market
demand.
The next exercise in technology transfer was a more modest affair, and was
concerned with broadcasting some of the computing tools developed for the
Department's work with schoolchildren. In 1981 a small firm, Jessop
Microelectronics, was licensed to manufacture and sell the Edinburgh Turtle, a
small motorised cart that could be moved around under program control leaving
a trace of its path. An excellent tool for introducing programming, spatial and
mathematical concepts to young children, over 1000 were sold to UK schools
(including 100 supplied to special schools under a DTI initiative). At the same
time, with support from Research Machines, Peter Ross and Ken Johnson reimplemented the children's programming language, LOGO, on Research Machines
microcomputers. Called RM Logo, for a decade or more it was supplied to
educational establishments throughout the UK by Research Machines.
As commercial interest in IT in the early 1980s exploded into life, the Department
was bombarded by requests from UK companies for various kinds of technical
assistance. For a variety of reasons, not least the Department's modest size at
that time, the most effective way of providing this was to set up a separate nonprofit making organisation to support applications oriented R&D. In July 1983,
with the agreement of the University Court, Howe launched the Artificial
Intelligence Applications Institute. At the end of its first year of operations, Austin
Tate succeeded Howe as Director. Its mission was to help its clients acquire knowhow and skills in the construction and application of knowledge based systems
technology,
56
enabling them to support their own product or service developments and so gain
a competitive edge. In practice, the Institute was a technology transfer
experiment: there was no blueprint, no model to specify how the transfer of AI
technology could best be achieved. So, much time and effort was given over to
conceiving, developing and testing a varietyof mechanisms through which
knowledge and skills could be imparted to clients. A ten year snapshot of its
activities revealed that it employed about twenty technical staff; it had an annual
turnover just short of ?1M, and it had broken even financially from the outset.
Overseas, it had major clients in Japan and the US. Its work focused on three subareas of knowledge-based systems, planning and scheduling systems, decision
support systems and information systems.
Formally, the Department of Artificial Intelligence disappeared in 1998 when
the University conflated the three departments, Artificial Intelligence, Cognitive
Science and Computer Science, to form the new School of Informatics.
A gift of tongues
Troy Dreier
PC MAGAZINE July 2006.
Jokes about the uselessness of machine translation abound. The
CentralIntelligence Agency was said to have spent millions trying to program
computers totranslate Russian into English. The best it managed to do, so the tale
goes, was to turnthe Famous-Russian saying "The spirit is willing but the flesh is
weak" into "Thevodka is good but the meat is rotten." Sadly, this story is a myth.
But machinetranslation has certainly produced its share of howlers. Since its
earliest days, thesubject has suffered from exaggerated claims and impossible
expectations.
Hype still exists. But Japanese researchers, perhaps spurred on by
thelinguistic barrier that often seems to separate their country's scientists and
techniciansfrom those in the rest of the world, have made great strides towards
the goal ofreliable machine translation—and now their efforts are being imitated
in the West.
Until recently, the main commercial users of translation programs have beenbig
Japanese manufacturers. They rely on machine translation to produce the
initialdrafts of their English manuals and sales material. (This may help to explain
thebafflement many western consumers feel as they leaf through the instructions
for theirvideo recorders.) The most popular program for doing this is e-j bank,
which wasdesigned by Nobuaki Kamejima, a reclusive software wizard at AI
Laboratories in Tokyo. Now, however, a bigger market beckons. The explosion of
foreign languages(especially Japanese and German) on the Internet is turning
machine translation into amainstream business. The fraction of web sites posted
in English has fallen from 98%to 82% over the past three years, and the trend is
still downwards. Consumer software,some of it written by non-Japanese software
houses, is now becoming available tointerpret this electronic Babel to those who
cannot read it.
Enigma variations
Machines for translating from one language to another were first talked aboutin
the 1930s. Nothing much happened, however, until 1940 when an
Americanmathematician called Warren Weaver became intrigued with the way
the British hadused their pioneering Colossus computer to crack the military
codes produced byGermany's Enigma encryption machines. In a memo to his
employer, the RockefellerFoundation, Weaver wrote: "I have a text in front of me
which is written in Russianbut I am going to pretend that it is really written in
English and that it has been codedin some strange symbols. All I need to do is to
strip off the code in order to retrievethe information contained in the text."
The earliest "translation engines" were all based on this direct, socalled"transformer", approach. Input sentences of the source language were
transformeddirectly into output sentences of the target language, using a simple
form of parsing.
The parser did a rough/analysis of the source sentence, dividing it into subject,
object,verb, etc. Source words were then replaced by target words selected from
a dictionary,and their order rearranged so as to comply with the rules of the
target language.
It sounds simple, but it wasn't. The problem with Weaver's approach
wassummarized succinctly by Yehoshua Bar-Hillel, a linguist and philosopher
whowondered what kind of sense a machine would make of the sentence "The
pen is inthe box" (the writing instrument is in the container) and the sentence
"The box is inthe pen" (the container is in the[play]pen).
Humans resolve such ambiguities in one of two ways. Either they note thecontext
of the preceding sentences or they infer the meaning in isolation by
knowingcertain rules about the real world—in this case, that boxes are bigger
than pens(writing instruments) but smaller than pens (play-pens) and that bigger
objects cannotfit inside smaller ones. The computers available to Weaver and his
immediatesuccessors could not possibly have managed that.
But modern computers, which have more processing power arid morememory,
can. Their translation engines are able to adopt a less direct approach, usingwhat
is called "linguistic knowledge". It is this that has allowed Mr. Kamejima
toproduce e-j bank, and has also permitted NeocorTech of San Diego to come up
withTsunami and Typhoon - the first Japanese-language-translation software to
run on thestandard (English) version of Microsoft Windows.
Linguistic-knowledge translators have two sets of grammatical rules—onefor the
source language and one for the target. They also have a lot of informationabout
the idiomatic differences between the languages, to stop them making
sillymistakes.
The first set of grammatical rules is used by the parser to analyze an
inputsentence ("I read" The Economist "every week"). The sentence is resolved
into a treethat describes the structural relationship between the sentence's
components ("I"[subject], "read" (verb), "The Economist" (object) and "every
week" [phrasemodifying the verb). Thus far, the process is like that of a Weaverstyle transformerengine. But then things get more complex. Instead of working to
a pre-arrangedformula, a generator (i.e., a parser in reverse) is brought into play
to create a sentencestructure in the target language. It does so using a dictionary
and a comparativegrammar—a set of rules that describes the difference between
each sentencecomponent in the source language and its counterpart in the target
language.
Thus abridge to the second language is built on deep structural
foundations.
Apart from being much more accurate, such linguistic-knowledge enginesshould,
in theory, be reversible—you should be able to work backwards from thetarget
language to the source language. In practice, there are a few catches
whichprevent this from happening as well as it might - but the architecture does
at least
make life easier for software designers trying to produce matching pairs of
programs.
Tsunami (English to Japanese) and Typhoon Japanese to English), for instance,
sharemuch of their underlying programming code.
Having been designed from the start for use on a personal computer ratherthan a
powerful workstation or even a mainframe, Tsunami and Typhoon use memory
extremely efficiently. As a result, they are blindingly fast on the latest PCs—
translating either way at speeds of more than 300,000 words an hour. Do they
produceperfect translations at the click of a mouse? Not by a long shot. But they
do come upwith surprisingly good first drafts for expert translators to get their
teeth into. Onemistake that the early researchers made was to imagine that
nothing less than flawless,fully automated machine translation would suffice.
With more realistic expectations,machine translation is, at last, beginning to
thrive.
Text 3
IBM promises science 500-fold break-through in supercomputing power
David Stone
PC MAGAZINE March 8, 2005.
Biologists hail SI 00 million project to build a "petaflop" computer as likely to
revolutionize our understanding of cellular biology. The computer, nicknamed
'Blue
Genes', world be around 500 times faster than today's most powerful
supercomputer.
Computer scientists say that the planned machine, details of which were revealed
last:
week, is the first large leap in computer architecture in decades.
IBM will build the programme around the challenge of modeling protein
folding (see below), with much of the research costs going on designing software.
It
will involve 50 scientists from IBM Research's Deep Computing Institute and
Computational Biology Group, and unnamed outside academics.
But Blue Gene's hardware will not he customized to the problem and, if IBM's
blueprint works, it will offer all scientific disciplines petaflop computers. These
will
be capable of more than one quadrillion floating point operations ('flop') per
second around two million times more powerful than today's top desktops. Most experts
have" predicted that fundamental technological difficulties would prevent a
petaflop
computer being built before around 2015.
"It is, fantastic that IBM is doing this," says George Lake, a scientist at the
university of Washington and NASA project, scientist for high-performance
computing in Earth and space science. IBM is showing leadership by ushering in a
new generation of supercomputers, he says.
The biggest-technological constraints to building a petaflop machine have been
latency - increasing the speed with which a chip addresses the memory - and
reducing
power-consumption. A petaflop computer build using conventional chips would
59
consume almost one billion watts of power. IBM reckons Blue Gene will use just
one
million-watts.
Although processor speeds have increased exponentially, the time to fetch dm
from the memory of a supercomputer, 300 nanoseconds, is only slightly less than
half
what it was 20 years ago. Putting more and more transistors on a chip is therefore
unlikely to lead to much greater speed.
"We set out from scratch, completely ignoring history, and thought how can we
get the highest performance out of silicon," says Monty Denneau, a scientist at
IBM's
Thomas J. Watson research center in Yorktown Heights, New York, who is
assistant
architect of Slue Gene.
Arvind, a professor of computer science at Mit who is considered one of the top
authorities on computer architecture, applauds IBM's approach. "It has made very
big
steps in rethinking computer architecture to try to do without the components
that
consume power, it has taken all these research ideas and pulled them together."
Text 4
Antiviruses.Principle of work.Examples of antiviruses.
Antivirus software consists of computer programs that attempt to identify,
thwart and eliminate computer viruses and other malicious software (malware).
Antivirus software typically uses two different techniques to accomplish this:
• Examining (scanning) files to look for known viruses matching definitions in a
virus
dictionary
• Identifying suspicious behavior from any computer program which might
indicate
infection. Such analysis may include data captures, port monitoring and other
methods.
Most commercial antivirus software uses both of these approaches, with an
emphasis on the virus dictionary approach.
Historically, the term antivirus has also been used for computer viruses that
spread and combated malicious viruses. This was common on the Amiga
computer
platform.
Dictionary
In the virus dictionary approach, when the antivirus software looks at a file, it
refers to a dictionary of known viruses that the authors of the antivirus software
have
identified. If a piece of code in the file matches any virus identified in the
dictionary,
then the antivirus software can take one of the following actions:
• attempt to repair the file by removing the virus itself from the file
• quarantine the file (such that the file remains inaccessible to other programs
and its
virus can no longer spread)
• delete the infected file
To achieve consistent success in the medium and long term, the virus dictionary
approach requires periodic (generally online) downloads of updated virus
dictionary
entries. As civically minded and technically inclined users identify new viruses "in
the
wild", they can send their infected files to the authors of antivirus software, who
then
60
include information about the new viruses in their dictionaries.
Dictionary-based antivirus software typically examines files when the computer's
operating system creates, opens, closes or e-mails them. In this way it can detect
a known virus immediately upon receipt. Note too that a System Administrator
can typically schedule the antivirus software to examine (scan) all files on the
computer's hard disk on a regular basis. Although the dictionary approach can
effectively contain virus outbreaks in the right circumstances, virus authors have
tried to stay a step ahead of such software by writing "oligomorphic",
"polymorphic" and more recently "metamorphic" viruses, which encrypt parts of
themselves or otherwise modify themselves as a method of disguise, so as not to
match the virus's signature in the dictionary.
Suspicious behavior
The suspicious behavior approach, by contrast, doesn't attempt to identify
known viruses, but instead monitors the behavior of all programs. If one program
tries
to write data to an executable program, for example, the antivirus software can
flag
this suspicious behavior, alert a user and ask what to do.
Unlike the dictionary approach, the suspicious behavior approach therefore
provides protection against brand-new viruses that do not yet exist in any virus
dictionaries. However, it can also sound a large number of false positives, and
users
probably become desensitized to all the warnings. If the user clicks "Accept" on
every
such warning, then the antivirus software obviously gives no benefit to that user.
This
problem has worsened since 1997, since many more nonmalicious program
designs
came to modify other .exe files without regard to this false positive issue. Thus,
most
modern antivirus software uses this technique less and less.
Other approaches
Some antivirus-software uses of other types of heuristic analysis. For example,
it could try to emulate the beginning of the code of each new executable that the
system invokes before transferring control to that executable. If the program
seems to
use self-modifying code or otherwise appears as a virus (if it immediately tries to
find
other executables, for example), one could assume that a virus has infected the
executable. However, this method could result in a lot of false positives. Yet
another
detection method involves using a sandbox. A sandbox emulates the operating
system
and runs the executable in this simulation. After the program has terminated,
software
analyzes the sandbox for any changes which might indicate a virus. Because of
performance issues, this type of detection normally only takes place during ondemand scans. Also this method may fail as virus can be nondeterministic and
result
in different actions or no actions at all done then run - so it will be impossible to
detect
it from one run. Some virus scanners can also warn a user if a file is likely to
contain a
virus based on the file type.
An emerging technique to deal with malware in general is whitelisting. Rather
than looking for only known bad software, this technique prevents execution of
all
computer code except that which has been previously identified as trustworthy
by the
61
system administrator. By following this default deny approach, the limitations
inherent in keeping virus signatures up to date are avoided. Additionally,
computer
applications that are unwanted by the system administrator are prevented from
executing since they are not on the whitelist. Since modem enterprise
organizations
have large quantities of trusted applications, the limitations of adopting this
technique
rest with the system administrators' ability to properly inventory and maintain
the
whitelist of trusted applications. As such, viable implementations of this
technique
include tools for automating the inventory and whitelist maintenance processes.
Issues of concern
• The spread of viruses using e-mail as their infection vector could be inhibited far
more inexpensively and effectively, without the need to install additional antivirus
software; if bugs in e-mail clients, which allow the unauthorized execution of
code,
were fixed
• User education can effectively supplement antivirus software. Simply training
users in safe computing practices (such as not downloading and executing
unknown
programs from the Internet) would slow the spread of viruses and obviate the
need of
much antivirus software.
• The ongoing writing and spreading of viruses and of panic about them gives the
vendors of commercial antivirus software a financial interest in the ongoing
existence
of viruses. Some theorize that antivirus companies have financial ties to virus
writers,
to generate their own market, though there is currently no evidence for this.
• Some antivirus software can considerably reduce performance. Users may
disable
the antivirus protection to overcome the performance loss, thus increasing the
risk of
infection. For maximum protection the antivirus software needs to be enabled all
the
time — often at the cost of slower performance (see also software bloat).
• It is sometimes necessary to temporarily disable virus protection when installing
major updates such as Windows Service Packs or updating graphics card drivers.
Having antivirus protection running at the same time as installing a major update
may
prevent the update installing properly or at all.
• When purchasing antivirus software, the agreement may include a clause that
your
subscription will be automatically renewed, and your credit card automatically
billed
at the renewal time without your approval. For example, McAfee requires one to
unsubscribe at least 60 days before the expiration of the present subscription, yet
it
does not provide phone access nor a way to unsubscribe directly through their
website.
In that case, the subscriber's recourse is to contest the charges with the credit
card
issuer.
History
There are competing claims for the innovator of the first antivirus product.
Perhaps the first publicly known neutralization of a wild PC virus was performed
by
European Bemt Fix (also Bemd) in early 1987. Fix neutralized an infection of the
Vienna virus. Following Vienna a number of highly successful viruses appeared
including Ping Pong, Lehigh, and Suriv-3 aka Jemsalem. In January 1988,
researchers
in the Hebrew University developed "unvirus" and "immune", which tell users
whether their disks have been infected and applies an antidote to those that
have.
62
From 1988 onwards many companies formed with a focus on the new field of
antivirus technology. One of the first breakthroughs in antivirus technology
occurred
in March 1988 with the release of the Den Zuk viruses created by Denny Yanuar
Ramdhani of Indonesia. Den Zuk neutralized the Brain virus. April 1988 saw the
Virus-L forum on Usenet created, and mid 1988 saw the development by Peter
Tippett
of a heuristic scanner capable of detecting viruses and Trojans which was given a
small public release. Fall 1988 also saw antivirus software Dr. Solomon's AntiVirus
Toolkit released by Briton Alan Solomon. By December 1990 the market had
matured
to the point of nineteen separate antivirus products being on sale including
Norton
AntiVirus and ViruScan from McAfee.
Tippett made a number of contributions to the budding field of virus detection.
He was an emergency room doctor who also ran a computer software company.
He
had read an article about the Lehigh virus were the first viruses to be developed,
but it
was Lehigh that Tippett read about and he questioned whether they would have
similar characteristics to viruses that attack humans. From an epidemiological
viewpoint, he was able to determine how these viruses were affecting systems
within
the computer (the boot-sector was affected by the Brain virus, the .com files were
affected by the Lehigh virus, and both .com and .exe files were affected by the
Jemsalem virus).Tippett's company Certus International Corp. then began to
create
anti-virus software programs. The company was sold in 1992 to Symantec Corp,
and
Tippett went to work for them, incorporating the software he had developed into
Symantec's product, Norton AntiVirus.
Best antivirus soft
NOD32 is an antivirus package made by the Slovak company Eset. Versions are
available for Microsoft Windows, Linux, FreeBSD and other platforms. Remote
administration tools for multiuser installations are also available at extra cost.
NOD32
Enterprise Edition consists of NOD32 AntiVirus and NOD32 Remote Administrator.
The NOD32 Remote Administrator program allows a network administrator to
monitor anti-virus functions, push installations and upgrades to unprotected PCs
on
the network and update configuration files from a central location.
NOD32 is certified by ICSA Labs. It has been tested 44 times by Virus Bulletin
and has failed only 3 times, the lowest failure rate in their tests. At CNET.com, it
received a review of 7.3/10.
Technical information
NOD32 consists of an on-demand scanner and four different real-time monitors.
The on-demand scanner (somewhat confusingly referred to as NOD32) can be
invoked by the scheduler or by the user. Each real-time monitor covers a different
virus entry point:
AMON (Antivirus MONitor) - scans files as they are accessed by the system,
preventing a virus from executing on the system.
DMON (Document MONitor) - scans Microsoft Office documents and files for
macro
viruses as they are opened and saved by Office applications.
IMON (Internet MONitor) - intercepts traffic on common protocols such as POPS
and
HTTP to detect and intercept viruses before they are saved to disc.
63
XMON (MS eXchangeMONitor) - scans incoming and outgoing mail when NODS 2
is running and licensed for Microsoft Exchange Server – i.e, running on a server
environment. This module is not present on workstations at all.
NOD32 Virus Detection Alert
NOD32 is written largely in assembly code, which contributes to its low use of
system resources and high scanning speed, meaning that NOD32 can easily
process more than 23MB per second while scanning on a modest P4 based PC and
on average, with all real-time modules active, uses less than 20MB of memory in
total but the physical RAM used by NOD32 is often just a third of that. According
to a 2005 Virus Bulletin test, NOD32 performs scans two to five times faster than
other antivirus competitors.
In a networked environment NOD32 clients can update from a central "mirror
server" on the network, reducing bandwidth usage since new definitions need
only be
downloaded once by the mirror server as opposed to once for each client.
NOD32's scan engine uses heuristic detection (which Eset calls "ThreatSense") in
addition to signature files to provide better protection against newly released
viruses.
Text 5
What is a virus?
B. Kelley
IOWA STATE UNIVERSITY, PM 1789 Rewised June, 2006.
In 1983, researcher Fred Cohen defined a computer virus as "a program that can
'infect' other programs by modifying them to include a ... version of itself. " This
means that viruses copy themselves, usually by encryption or by mutating slightly
each time they copy.
There are several types of viruses, but the ones that are the most dangerous are
designed to corrupt your computer or software programs. Viruses can range from
an
irritating message flashing on your computer screen to eliminating data on your
hard
drive. Viruses often use your computer's internal clock as a trigger. Some of the
most
popular dates used are Friday the 13th and famous birthdays. It is important to
remember that viruses are dangerous only if you execute (start) an infected
program.
There are three main kinds of viruses*. Each kind is based on the way the virus
spreads.
1. Boot Sector Viruses - These viruses attach themselves to floppy disks and
then copy themselves into the boot sector of your hard drive. (The boot sector is
the
set of instructions your computer uses when it starts up.) When you start your
computer (or reboot it) your hard drive gets infected. You can get boot sector
viruses
only from an infected floppy disk. You cannot get one from sharing files or
executing
programs. This type of virus is becoming less common because today's computers
do
not require a boot disk to start, but they can still be found on disks that contain
other
types of files. One of the most common boot sector viruses is called "Monkey,"
also
known as "Stoned."
2. Program Viruses - These viruses (also known as traditional file viruses)
64
attach themselves to programs' executable files. Usually a program virus will
attach to
an .exe or .corn file. However, they can infect any file that your computer runs
when it
launches a program (including .sys, .dll, and others). When you start a program
that
contains a virus, the virus usually loads into your computer's Memory.
* Three kinds of viruses
1. Boot Sector viruses attach to floppy disks and then copy into the boot sector
of your hard drive.
2. Program viruses attach to a program's executable files.
3. Macro viruses attach to templates.
The truth about viruses
The majority of people believe that the most common source of viruses is the
Internet through e-mail or downloaded files. The truth is however, that the
majority of
viruses spread through shared floppy disks or shared files on internal network.
Even if you are not connected to the Internet you should still be concerned
about viruses. You should also be aware that there are thousands of false rumors
of
viruses (virushoaxes).
65
Использованная литература:
1.
Андронов
О.Г.,
Бойко
Б.Л.
Теоретико-практический
Информационная обработка текстов. - М., 1999.
курс:
2.
Батурина С.А. Сборник текстов для перевода и реферирования.- Омск,
2005
3.
Князева Е.Г. Информационная обработка текстов. Учебное пособие –
М., 2001.
4.
Колодожная Ж.А. Основные понятия
реферировании научных документов.- М.: 2002
об
аннотировании
и
5.
Маркушевская Л.П., Цапаева Ю.А. Аннотирование и реферирование.
(Методические рекомендации для самостоятельной работы студентов) СПб
ГУ ИТМО, 2008
6. Славина Г., Харьковский З., Антонова Е. Аннотирование и реферирование.
Учебное пособие по английскому языку- М.: Высшая школа, 2006
66
67
68
Download