文献翻译21

合集下载

科技文献中英文对照翻译

科技文献中英文对照翻译

Sensing Human Activity:GPS Tracking感应人类活动:GPS跟踪Stefan van der Spek1,*,Jeroen van Schaick1,Peter de Bois1,2and Remco de Haan1Abstract:The enhancement of GPS technology enables the use of GPS devices not only as navigation and orientation tools,but also as instruments used to capture travelled routes:assensors that measure activity on a city scale or the regional scale.TU Delft developed aprocess and database architecture for collecting data on pedestrian movement in threeEuropean city centres,Norwich,Rouen and Koblenz,and in another experiment forcollecting activity data of13families in Almere(The Netherlands)for one week.Thequestion posed in this paper is:what is the value of GPS as‘sensor technology’measuringactivities of people?The conclusion is that GPS offers a widely useable instrument tocollect invaluable spatial-temporal data on different scales and in different settings addingnew layers of knowledge to urban studies,but the use of GPS-technology and deploymentof GPS-devices still offers significant challenges for future research.摘要:增强GPS技术支持使用GPS设备不仅作为导航和定位工具,但也为仪器用来捕捉旅行路线:作为传感器,测量活动在一个城市或区域范围内规模。

怎么翻译文献

怎么翻译文献

怎么翻译文献翻译文献需要一定的专业知识和翻译经验,以下是翻译文献的一些建议和步骤:1. 确定文献类型:文献可以包括科学论文、书籍、报告或指南等不同类型。

根据文献类型的不同,翻译的难度和要求也会有所不同。

2. 熟悉领域知识:翻译文献前,需要对文献所涉及的领域有一定的了解和熟悉,包括专业术语、常用表达等。

可以参考相关领域的学术词典、教科书或者专业网站,提前积累相关词汇和知识。

3. 阅读文献:在翻译之前,先通读整篇文献,了解全文的结构和内容,并确定文章的主题和核心要点。

可以将文章分成段落或小节进行阅读,并标注关键词和目标句。

4. 理解文献内容:在阅读过程中,需要理解文献中所用词汇、句子的含义和上下文之间的逻辑关系。

理解文献内容的同时,也要注意作者的观点和论述方式,尽可能准确地表达出来。

5. 选择合适的翻译策略:根据文献的特点和目标读者群体,选择合适的翻译策略,例如直译、意译、注释或者补充解释等。

同时,根据文献的用途和实际需求,进行必要的改写和调整。

6. 保持准确性和一致性:在翻译过程中,要保持准确性和一致性,尽可能准确地表达原文的含义,并保持相同的专业术语和用词风格。

可以参考之前翻译过的文献或专业翻译资料进行对照。

7. 组织文献结构:在翻译文献时,要注意保持原文的结构和逻辑,并进行必要的排版和格式调整。

如果文献中有图表或公式,也需要适当翻译或注解。

8. 校对和修改:完成翻译后,进行校对和修改,检查翻译的准确性和流畅性,同时注意规范和语法错误,并进行必要的修改和润色。

总之,翻译文献需要有相关领域的专业知识和翻译技巧,而且需要耐心和细心对待每一个细节。

通过不断学习和练习,提高自己的翻译能力,才能更好地完成文献的翻译工作。

文献全文翻译

文献全文翻译

文献全文翻译
文献全文翻译
文献翻译是指将一篇文献从一种语言翻译为另一种语言,是传播学术成果的重要手段。

因此,文献全文翻译尤其重要。

在展开翻译前,我们需要考虑到几点。

首先,需要确保翻译时的准确性。

由于学术术语多样,因此在翻译过程中需要确保翻译的准确性,避免造成不必要的误解。

其次,翻译者需要被动学习。

翻译者要掌握文献中存在的相关知识,尤其是语言上的特殊用法。

因此,通过对文献的深度理解有助于提高翻译质量。

此外,翻译者也要注意文献的精神。

翻译过程中要尊重原文精神,避免自行添加或删减任何信息,从而改变原文精神。

同时,文献的翻译过程应该是一个循序渐进的过程。

通常,翻译者首先需要熟练掌握源语言和目标语言,然后完成对源文的翻译、评审和检查。

最终,确保翻译结果比原文更加贴近原文精神,但又保持其正确性和流畅性。

文献全文翻译是一个繁重的任务,需要翻译者具备良好的技能和知识储备。

只有在做到所有规定的要求之后,才能真正实现精准的文献全文翻译。

【计算机专业文献翻译】21世纪的高级编程语言

【计算机专业文献翻译】21世纪的高级编程语言

外文文献阅读与翻译第1章英文原文Scripting: Higher Level Programming for the 21st Century1 IntroductionFor the last fifteen years a fundamental change has been occurring in the way people write computer programs. The change is a transition from system programming languages such as C or C++ to scripting languages such as Perl or Tcl. Although many people are participating in the change, few people realize that it is occurring and even fewer people know why it is happening. This article is an opinion piece that explains why scripting languages will handle many of the programming tasks of the next century better than system programming languages.Scripting languages are designed for different tasks than system programming languages, and this leads to fundamental differences in the languages. System programming languages were designed for building data structures and algorithms from scratch, starting from the most primitive computer elements such as words of memory. In contrast, scripting languages are designed for gluing: they assume the existence of a set of powerful components and are intended primarily for connecting components together. System programming languages are strongly typed to help manage complexity, while scripting languages are typeless to simplify connections between components and provide rapid application development.Scripting languages and system programming languages are complementary, and most major computing platforms since the 1960's have provided both kinds of languages. The languages are typically used together in component frameworks, where components are created with system programming languagesand glued together with scripting languages. However, several recent trends, such as faster machines, better scripting languages, the increasing importance of graphical user interfaces and component architectures, and the growth of the Internet, have greatly increased the applicability of scripting languages. These trends will continue over the next decade, with more and more new applications written entirely in scripting languages and system programming languages used primarily for creating components.1.1 2 Scripting languagesScripting languages such as Perl[9], Python[4], Rexx[6], Tcl[8], Visual Basic, and the Unix shells represent a very different style of programming than system programming languages. Scripting languages assume that there already exists a collection of useful components written in other languages. Scripting languages aren't intended for writing applications from scratch; they are intended primarily for plugging together components. For example, Tcl and Visual Basic can be used to arrange collections of user interface controls on the screen, and Unix shell scripts are used to assemble filter programs into pipelines. Scripting languages are often used to extend the features of components but they are rarely used for complex algorithms and data structures; features like these are usually provided by the components. Scripting languages are sometimes referred to as glue languages or system integration languages.In order to simplify the task of connecting components, scripting languages tend to be typeless: all things look and behave the same so that they are interchangeable. For example, in Tcl or Visual Basic a variable can hold a string one moment and an integer the next. Code and data are often interchangeable, so that a program can write another program and then execute it on the fly. Scripting languages are often string-oriented, since this provides a uniform representation for many different things.A typeless language makes it much easier to hook together components. There are no a priori restrictions on how things can be used, and all components and values are represented in a uniform fashion. Thus any component or value can be used in any situation; components designed for one purpose can be used for totally different purposes never foreseen by the designer. For example, in the Unix shells, all filter programs read a stream of bytes from an input and write a string of bytes to an output; any two programs can be connected together by attaching the output of one program to the input of the other. The following shell command stacks three filters together to count the number of lines in the selection that contain the word "scripting":select | grep scripting | wcThe select program reads the text that is currently selected on the display and prints it on its output; the grep program reads its input and prints on its output the lines containing "scripting"; the wc program counts the number of lines on its input. Each of these programs can be used in numerous other situations to perform different tasks.The strongly typed nature of system programming languages discourages reuse. Typing encourages programmers to create a variety of incompatible interfaces ("interfaces are good; more interfaces are better"). Each interface requires objects of specific types and the compiler prevents any other types of objects from being used with the interface, even if that would be useful. In order to use a new object with an existing interface, conversion code must be written to translate between the type of the object and the type expected by the interface. This in turn requires recompiling part or all of the application, which isn't possible in the common case where the application is distributed in binary form.To see the advantages of a typeless language, consider the following Tcl command:button .b -text Hello! -font {Times 16} -command {puts hello}This command creates a new button control that displays a text string in a 16-point Times font and prints a short message when the user clicks on the control. It mixes six different types of things in a single statement: a command name (button), a button control (.b), property names (-text, -font, and -command), simple strings (Hello! and hello), a font name (Times 16) that includes a typeface name (Times) and a size in points (16), and a Tcl script (puts hello). Tcl represents all of these things uniformly with strings. In this example the properties may be specified in any order and unspecified properties are given default values; more than 20 properties were left unspecified in the example.The same example requires 7 lines of code in two methods when implemented in Java. With C++ and Microsoft Foundation Classes, it requires about 25 lines of code in three procedures (see [7]for the code for these examples). Just setting the font requires several lines of code in Microsoft Foundation Classes:CFont *fontPtr = new CFont();fontPtr->CreateFont(16, 0, 0,0,700, 0, 0, 0, ANSI_CHARSET,OUT_DEFAULT_PRECIS,CLIP_DEFAULT_PRECIS, DEFAULT_QUALITY,DEFAULT_PITCH|FF_DONTCARE, "Times New Roman");buttonPtr->SetFont(fontPtr);Much of this code is a consequence of the strong typing. In order to set the font of a button, its SetFont method must be invoked, but this method must be passed a pointer to a CFont object. This in turn requires a new object to be declared and initialized. In order to initialize the CFont object its CreateFont method must be invoked, but CreateFont has a rigid interface that requires 14 different arguments to be specified. In Tcl, the essential characteristics of the font (typeface Times, size 16 points) can be used immediately with no declarations or conversions. Furthermore, Tcl allows the behavior for the button to be included directly in the command that creates the button, while C++ and Java require it to be placed in a separately declared method.(In practice, a trivial example like this would probably be handled with a graphical development environment that hides the complexity of the underlying language: the user enters property values in a form and the development environment outputs the code. However, in more complex situations such as conditional assignment of property values or interfaces generated programmatically, the developer must write code in the underlying language.)It might seem that the typeless nature of scripting languages could allow errors to go undetected, but in practice scripting languages are just as safe as system programming languages. For example, an error will occur if the font size specified for the button example above is a non-integer string such as xyz. The difference is that scripting languages do their error checking at the last possible moment, when a value is used. Strong typing allows errors to be detected at compile-time, so the cost of run-time checks is avoided. However, the price to be paid for this efficiency is restrictions on how information can be used: this results in more code and less flexible programs.Another key difference between scripting languages and system programming languages is th at scripting languages are usually interpreted whereas system programming languages are usually compiled. Interpreted languages provide rapid turnaround during development by eliminating compile times. Interpreters also make applications more flexible by allowing users to program the applications at run-time. For example, many synthesis and analysis tools for integrated circuits include a Tcl interpreter; users of the programs write Tcl scripts to specify their designs and control the operation of the tools. Interpreters also allow powerful effects to be achieved by generating code on the fly. For example, a Tcl-based Web browser can parse a Web page by translating the HTML for the page into a Tcl script using a few regular expression substitutions. It then executes the Tcl script to render the page on the screen.Scripting languages are less efficient than system programming languages, in part because they use interpreters instead of compilers but also because their basic components are chosen for power and ease of use rather than an efficient mapping onto the underlying hardware. For example, scripting languages often use variable-length strings in situations where a system programming language would use a binary value that fits in a single machine word, and scripting languages often use hash tables where system programming languages use indexed arrays.Fortunately, the performance of a scripting language isn't usually a major issue. Applications for scripting languages are generally smaller than applications for system programming languages, and the performance of a scripting application tends to be dominated by the performance of thecomponents, which are typically implemented in a system programming language.Scripting languages are higher level than system programming languages, in the sense that a single statement does more work on average. A typical statement in a scripting language executes hundreds or thousands of machine instructions, whereas a typical statement in a system programming language executes about five machine instructions (see Figure 1). Part of this difference is because scripting languages use interpreters, which are less efficient than the compiled code for system programming languages. But much of the difference is because the primitive operations in scripting languages have greater functionality. For example, in Perl it is about as easy to invoke a regular expression substitution as it is to invoke an integer addition. In Tcl, a variable can have traces associated with it so that setting the variable causes side effects; for example, a trace might be used to keep the variable's value updated continuously on the screen. Because of the features described above, scripting languages allow very rapid development for applications that are gluing-oriented.To summarize, scripting languages are designed for gluing applications. They provide a higher level of programming than assembly or system programming languages, much weaker typing than system programming languages, and an interpreted development environment. Scripting languages sacrifice execution speed to improve development speed.中文翻译脚本语言:21世纪的高级编程语言1.简介在过去的十五年里,人们编写计算机程序的方法发生了根本的转变。

医药学类文献双语版_汉译英

医药学类文献双语版_汉译英

介导性shRNA能抑制肺癌细胞中livin沉默基因的表达从而促进SGC-7901细胞凋亡背景—由于肿瘤细胞抑制凋亡增殖,特定凋亡的抑制因素会对于发展新的治疗策略提供一个合理途径。

Livin是一种凋亡抑制蛋白家族成员,在多种恶性肿瘤的表达中具有意义。

但是, 在有关胃癌方面没有可利用的数据。

在本研究中,我们发现livin基因在人类胃癌中的表达并调查了介导的shRNA能抑制肺癌细胞中livin沉默基因的表达,从而促进SGC-7901细胞凋亡。

方法—mRNA及蛋白质livin基因的表达用逆转录聚合酶链反应技术及西方吸干化验进行了分析。

小干扰RNA真核表达载体具体到livin基因采用基因重组、测序核酸。

然后用Lipofectamin2000转染进入SGC-7901细胞。

逆转录聚合酶链反应技术和西方吸干化验用来验证的livin基因在SGC-7901细胞中使沉默基因生效。

所得到的稳定的复制品用G418来筛选。

细胞凋亡用应用流式细胞仪(FCM)来评估。

细胞生长状态和5-FU的50%抑制浓度(IC50)和顺铂都由MTT比色法来决定。

结果—livin mRNA和蛋白质的表达检测40例中有19例(47.5%)有胃癌和SGC-7901细胞。

没有livin基因表达的是在肿瘤邻近组织和良性胃溃疡病灶。

相关发现在livin基因的表达和肿瘤的微小分化和淋巴结转移一样(P < 0.05)。

4个小干扰RNA真核表达矢量具体到基因重组的livin基因建立。

其中之一,能有效地减少livin基因的表达,抑制基因不少于70%(P < 0.01)。

重组的质粒被提取和转染到胃癌细胞。

G418筛选所得到的稳定的复制品被放大讲究。

当livin基因沉默,胃癌细胞的生殖活动明显低于对照组(P < 0.05)。

研究还表明,IC50上的5-Fu 和顺铂在胃癌细胞的治疗上是通过shRNA减少以及刺激这些细胞(5-Fu proapoptotic和顺铂)(P < 0.01)。

文献翻译:21 世纪前半叶矿井提升机在深井中的应用

文献翻译:21 世纪前半叶矿井提升机在深井中的应用

英文原文Mine hoisting in deep shafts in the 1sthalf of 21stCenturyAlfred Carbogno 1Key words: deep shaft, mine hosting, Blair winder, rope safety factor, drum sizing, skip factor IntroductionThe mineral deposits are exploited on deeper and deeper levels. In connection with this, definitions like “deep level” and “deep shaft” became more and more popular. These definitions concern the depth where special rules regarding an excavation driving, exploitation, rock pressure control, lining construction, ventilation, underground and vertical transport, work organization and economics apply.It has pointed out that the “deep level” is a very relative definition and should be used only with a reference to particular hydro-geological, mining and technical conditions in a mine or coal-field. It should be also strictly defined what area of “deep level” or “deep shaft” definitions are considered. It can be for example:- mining geo-engineering,- technology of excavation driving,- ventilation (temperature).It is obvious that the “deep level” defined from one point of view, not necessarily means a “deep level” in another area. According to [5] as a deep mine we can treat each mine if: - the depth is higher than 2300 m or- mineral deposit temperature is higher than 38 ºC.It is well known that the most of deep mines are in South Africa. Usually, they are gold or diamonds mines.Economic deposits of gold-bearing ore are known to exist at depths up to 5000 m in a number of South Africa regions. However, due to the depth and structure of the reef in some areas, previous methods of reaching deeper reefs using sub-vertical shaft systems would not be economically viable. Thus, the local mining industry is actively investigating new techniques for a single-lift shaft up to 3500 m deep in the near future and probably around 5000 m afterwards. When compared with the maximum length of wind currently in operation of 2500 m, it is apparent that some significant innovations will be required.The most important matter in the deep mine is the vertical transport and the mine hoisting used in the shaft. From the literature [1-12] results that B.M.R. (Blair Multi-Rope) hoist is preferred to be used in deep mines in South Africa. From the economic point of view, the most important factors are:- construction and parameters of winding ropes (safety factor, mainly),- mine hoisting drums capacity,This article of informative character presents shortly above-mentioned problems based on the literature data [1-12]. Especially, the paper written by M.E. Greenway is very interesting [3].From two transport systems used in the deep shaft, sub-vertical and the single-lift shaft systems, the second one is currently preferred. (Fig.1.) [6]Hoisting InstallationThe friction hoist (up to 2100 m), single drum and the double drum (classic and Blair type double drum) hoist are used in deep shafts in South Africa.Drum windersDrum winders are most widely used in South Africa and probably in the world. Three types of winders fall into this category- Single drum winders,- Double drum winders,- Blair multi-rope winders (BMR).Double drum windersTwo drums are used on a single shaft, with the ropes coiled in opposite directions with the conveyances balancing each other. One or both drums are clutched to the shaft enabling the relative shaft position of the conveyances to be changed and permitting the balanced hoisting from multiple levelsThe Blair Multi-Rope System (BMR)In 1957 Robert Blair introduced a system whereby the advantage of the drum winder could be extended to two or more ropes. The two-rope system developed incorporated a two-compartment drum with a rope per compartment and two ropes attached to a single conveyance. He also developed a rope tension-compensating pulley to be attached to the conveyance. The Department of Mines allowed the statutory factor of safety for hoisting minerals to be 4,275 instead of 4,5 provided the capacity factor in either rope did not fall below the statutory factor of 9. This necessitated the use of some form of compensation to ensure an equitable distribution of load between the two ropes. Because the pulley compensation is limited, Blair also developed a device to detect the miscalling on the drum, as this could cause the ropes to move at different speeds and so affect their load sharing capability. Fig.2 shows the depth payload characteristics of double drum, BMR and Koepe winders.The B.M.R. hoist is used almost exclusively in South Africa, probably because they were invented there, particularly for the deep shaft use. There is one installation in England. Because of this hoist's physical characteristics, and South African mining rules favouring it in one respect, they are used mostly for the deep shaft mineral hoisting. The drum diameters are smaller than that of an equivalent conventional hoist, so one advantage is that they are more easily taken underground for sub-shaft installations.A Blair hoist is essentially a conventional hoist with wider drums, each drum having a centre flange that enables it to coil two ropes attached to a skip via two headsheaves. The skip connection has a balance wheel, similar to a large multi-groove V-belt sheave, to allow moderate rope length changes during winding. The sheaves can raise or lower to equalize rope tensions.The Blair hoist's physical advantage is that the drum diameter can be smaller than usual and, with two ropes to handle the load, each rope can be much smaller. The government mining regulations permit a 5 % lower safety factor at the sheave for mineral hoisting with Blair hoists. This came about from a demonstration by the% permits the Blair hoists to go a little deeper than the other do.On the other hand, the mining regulations require a detaching hook above the cage for man hoisting. The balance wheel does not suit detaching hooks, so a rope-cutting device was invented to cut the ropes off for a severe overwind. This was tested successfully but the Blair is not used for man winding on a regular basis.The B.M.R. hoist has been built in three general styles similar to conventional hoists. The three styles are (Fig. 3 and 4):The gearless B.M.R. hoist at East Dreifontein looks similar to an in-line hoist except that thedrums are joined mechanically and they are a little out of line with each other. This is because each drum directly faces its own sheaves for the best fleet angle. The two hoist motors are fed via thyristor rectifier/inverter units from a common 6.6-KV busbar. The motors are thus coupled electrically so that the skips in the shaft run in balance, similar to a conventional double-drum hoist. Each motor alternates its action as a DC generator or DC motor, either feeding in or taking out energy from the system. The gearless Blair can be recognized by the offset drums and the four brake units. A second brake is always a requirement, each drum must have two brakes, because the two drums have no mechanical connection to each other. Most recent large B.M.R. hoists are 4.27 or 4.57 m in diameter, with 44.5 ÷ 47.6 mm ropes [1].In arriving at a drum size the following parameters have been used:- The rope to be coiled in four layers,- The rope tread pressure at the maximum static tension to be less than 3,2 MPa,- The drum to rope diameter ratio (D/d) to be greater than 127 to allow for a rope speed of 20 m/s.With the above and a need to limit the axial length of the drums, a rope compartment of 8,5 m diameter by 2,8 m wide, was chosen. The use of 5 layers of coiled rope could reduce the rope compartment width to 2,15 m but this option has been discarded at this stage because of possible detrimental effects on the rope life.One problem often associated with twin rope drum hoists is the rope fleeting angle. The axial length of the twin rope compartment drums requires wide centres for the headgear sheaves and conveyances in the shaft. To limit the diameter of the shaft, the arrangement illustrated in Fig. 4 has been developed and used on a hoist still to be installed. Here, an universal coupling or Hooke’s Joint has been placed bet ween the two drums to allow the drums to be inclined towards the shaft center and so alleviate rope fleeting angle problem, even with sheave wheels at closer centres [11].The rope safety factorThe graphs in Fig. 5 illustrate the endload advantage with reducing static rope safety factors. While serving their purpose very well over the years, the static safety factor itself must now be questioned. Static safety factors, while specifically relating to the static load in the rope were in fact established to take account of:a. Dynamic rope loads applied during the normal winding cycle, particularly during loading, pull-away, acceleration, retardation and stopping,b. Dynamic rope loads during emergency braking,c. Rope deterioration in service particularly where this is of an unexpected or unforeseen nature.If peak loads on the rope can be reduced so that the peak remains equal to or less than that experienced by the rope when using current hoisting practices with normal static rope safety factor, the use of a reduced static rope safety factor can be justified. The true rope safety factor is not reduced at all. This is particularly of importance during emergency braking which normally imposes the highest dynamic load on the rope. Generally, the dynamic loads imposed during theskip loading, cyclic speed changes and tipping will be lower than for emergency braking but their reduction will of course improve the rope life at the reduced static rope safety factor. The means, justification and safeguards associated with a reduced static safety factor are discussed in [4,7,9,12].Based on the static rope safety factor of 4, the rope endload of 12843 kg per rope can be achieved. With twin ropes, this amounts to an endload of 25686 kg. With a conveyance based on 40 % of payload of 18347 kg with a conveyance of 7339 kg. There are hoisting ropes of steel wires strength up to Rm = 2300 MPa (Rm up to 2600 MPa [6] is foreseen) used in deep shafts. There are also uniform strength hoisting ropes projected [2,8].ConveyancesThe winding machines made from a light alloy are used in hoisting installations in deep shafts. The skip factor (S) has been defined as the ratio of empty mass of the skip (including ancillary equipment such as rope attachments, guide rollers, etc) to the payload mass. If the rope end load is kept constant, a lower skip factor implies a larger payload – in other words, a more efficient skip from a functional point of view. However, the higher the payload for the same rope end load, the larger the out-of-balance load –implying a more winder power going hand in hand with the higher hoisting capacity. If, on the other hand, the payload is fixed, a lower skip factor implies a lower end load and a smaller rope-breaking load requirement. Under these conditions, an out-of-balance load attributable to the payload would remain the same, but that due to the rope would reduce slightly. The sensitivity of depth of wind and hoisting capacity to skip the factor is illustrated in Fig. 6 and 7. A reduction of skip factor from 0,5 to 0,4 results in a depth gain of about 40 m for Blair winders and 50 m for single-rope winders. The increase of hoisting capacity for a reduction of skip factor by about 0,1 is about 10 %.Typical values for the “skip factor” are about 0,6 for skips and about 0,75 for cages for men and material hoisting. Reducing skip factors to say about 0,5 is a tough design brief and the trade-offs between lightweight skips and maintainability and reliability soon become evident in service.The weight can be readily reduced by omitting (or reducing in thickness) skip liner plates but this could reduce skip life by wear of structural plate leading to the high maintenance cost or more frequent maintenance to replace thinner liner plates. Similarly, if the structural mass is saved by reducing section sizes or changing the material from steel to aluminium for example, the structural reliability is generally reduced and the fatigue cracking becomes more efficient.Some success has been achieved in operating large capacity all – aluminium skips with low skip factors but the capital cost is high and a very real hoisting capacity constrain must exist before the additional cost is warranted. It would appear that the depth and hoisting capacity improvements are better made by reducing the rope factor of safety and increasing the winding speed. The philosophy of the skip design should be to provide robust skips with reasonable skip factors in the range of 0,5 to 0,6 that can be hoisted safely and reliably at high speeds and that are tolerant to the shaft guide misalignment.It should be noted that some unconventional skips have been proposed (but not yet built andtested) that could offer skip factors as low as 0,35.ConclusionsThe first installation of Blaire hoists took place in 1958. From that time we can observe a continuous development of this double-rope, double-drum hoists. Currently, they are used up to the depth of 3 150 m (man/material hoist at the Moab Khotsong Mine, to hoist 13 500 kg in a single lift, at 19,2 m/sec, using 2 x 7400 kW AC cyclo-convertor fed induction motors). The Blair Multi-Rope system can be use either during shaft sinking or during exploitation. The depth range for them is 715 to 3150 m and the maximum skip load is 20 tons.In South Africa in deep shafts single lift systems are preferred.References[1] BAKER. T.J.: New South African Drum Hoisting Plants. CIM Bulletin, No 752, December 1994, p. 86-96.[2] CARBOGNO, A.: Winding Ropes of Uniform Strength. 1st International Conference LOADO 2001. Logistics and Transport. Hotel Permon, High Tatras, June 6th –8th 2001 p.214-217.[3] GREENWAY, M.E.: An Engineering Evaluation of the Limits to Hoisting from Great Depth. Int. Deep Mining Conference: Technical Challenges in Deep Level Mining, Johannesburg, SAIMM, 1990 p.449-481.[4] HECKER, G.F.K.: The Safety of Hoisting Ropes in Deep Mine Shafts. International Deep Mining Conference: Technical Challenges in Deep Level Mining. Johannesburg, SAIMM, 1990 p. 831-838.[5] HILL, F.G, MUDD J,B: Deep Level Mining in South African Gold Mines. 5th International mining Congress 1967, Moscow, p. 1 –20.[6] LANE, N.M: Constraints on Deep-level Sinking –an Engineering Point of View. The Certificated Engineer, vol. 62, No6, December 1989/January 1991 p. 3-9.[7] LAUBSCHER, P.S.: Rope Safety Factors for Drum Winders – Implications of the Proposed Amendments to the Regulations. Gencor Group, 1995 Shaft Safety Workshop. Midrand,Johannesburg, November 1995, paper No 5 p.1-11.[8] MAC DONALD, D.H., PIENAAR, F.C.: State of the Art and Future Developments of Steel Wire Rope in Sinking and Permanent Winding Operations. Gencor Group, Shaft Safety Workshop Magaliesberg, 1994, paper No 13, p. 1-21.[9] MCKENZIE, I.D.: Steel Wire Hoisting Ropes for Deep Shafts. International Deep Mining Conference: Technical Challenges in Deep Level Mining. Johannesburg, SAIMM, 1990 p. 839-844.[10] SPARG, E.N.: Development of SA- Designed and Manufactured Mine Winders. The South African Mechanical Engineer vol.35, No 10, October 1985 p. 418-423.[11] SPARG E,N.: Developments in Hoist Design Technology Applied to a 4000 m Deep Shaft. Mining Technology, No 886, June 1995, p. 179-184.[12] SYKES, D.G., WIDLAKE, A.C.: Reducing Rope Factors of Safety for Winding in Deep Levels Shafts. International Deep Mining Conference. Technical Challenges in Deep Level Mining. Johannesburg, SAIMM, 1990 p. 819-829.中文译文21 世纪前半叶矿井提升机在深井中的应用关键词: 深井,矿井提升机,布莱尔提升机, 钢丝绳安全要素,滚筒尺寸,骤变要素矿物沉淀物在越来越深的水平上被开采。

文献翻译-英文原版

文献翻译-英文原版

Information Geometry and Its Applications:Shun-ichi Amarirmation geometry emerged from studies on invariant properties of a manifold of probability distributions. It includes convex analysis and its duality as a special but important part. Here, we begin with a convex function, and construct a dually flat manifold. The manifold possesses a Riemannian metric, two types of geodesics, and a divergence function. The generalized Pythagorean theorem and dual projections theorem are derived there from. We construct alpha-geometry,extending this convex analysis. In this review, geometry of a manifold of probability distributions is then given, and a plenty of applications are touched upon. Appendix presents an easily under stable introduction to differential geometry and its duality.Keywords:Information geometry, convex function, Riemannian geometry, dual affineconnections, dually flat manifold, Legendre transformation, generalized Pythagorean theorem.1 IntroductionInformation geometry emerged from a study on the invariant geometrical structure of a family of probability distributions. We consider a family S = {p (x, θ)} of probability distributions, where x is a random variable and θis an n -dimensional vector parameter. This forms a geometrical manifold where θplays the role of a coordinate system.We searched for the invariant structure to be introduced in S , and found a Riemannian structure together with a dual pair of affine connections (see Chentsov, 12; Amari and Nagaoka, 8). Such a structure has scarcely been studied in traditional differential geometry, and is still not familiar.Typical families of probability distributions, e.g., exponential families and mixture families, are dually flat together with non-trivial Riemannian metrics.Some non-flat families are curved sub manifolds of flat manifolds. For example,the family of Gaussian distributionswhere μis the mean and σ2 is the variance, is a flat 2-dimensional manifold.However, when σ2= μ2holds, the family of distributionsis a curved 1-dimensional sub manifold (curve) embedded in S . Therefore, it is important to study the properties of a dually flat Riemannian space.A dually flat Riemannian manifold possesses dual convex potential functions,and all thegeometrical structure can be derived from them. In particular, a Riemannian metric, canonical divergence, generalized Pythagorean relation and projection theorem are their outcomes. Conversely, given a convex function, we can construct a dually-flat Riemannian structure, which is an extension and foundation of the early approach by(Bregman, 10) and a geometrical foundation of the Legendre duality. The present paper focuses on a convex function, and reconstructs dually-flat Riemannian structure therefrom. See (Zhang, 28) for details.Applications of information geometry are expanding, and we touch upon some of them. See Appendix for an understandable introduction to differential Geometry.3 Information Geometry of Probability DistributionsLet us consider a family of probability distributions S = { p (x, ξ)} ,where x is a random variable andξis an n-dimensional vector parameter to specify a distribution. This is considered as an n -dimensional manifold, where ξis coordinates,and a pointξis regarded as a probability distribution p (x, ξ).In order to introduce an invariant geometrical structure to M ,we require the following criterion:Invariance Criterion: The geometry should be invariant under coordinate transformations ofξand also under one-to-one transformations of random variable x.When we transform x to y bythe probability density function is changed from p (x, ξ)toThe above criterion requires that the geometrical structure is the same for M ={p (x, ξ)} and¯M = { ¯p (y, ξ)}.Based on the criterion, we have the only invariant Riemannian metric, which is given by the Fisher information matrix (Chentsov, 12). We also have a one-parameter family of invariant affine connections.Theorem 5. The invariant Riemannian metric is given byand the invariant affine connection parameterized by αiswhere [ij ; k ] is the Christoffel symbol calculated from gij Andis an invariant tensor symmetric with respect to three indices.The α-and −α-affine connections are dual, in the sense that the two covariant derivatives ∇αand ∇−αSatisfyfor three vector fields X, Y and Z . We do not go into details here. See Appendix and (Amari and Nagaoka, 8).It is also proved that, when the manifold is flat with respect to one affine connection, it is also flat with respect to the dual affine connection. Hence, we have a dually flat manifold. When a manifold is flat, we have a geodesic coordinate system θin whichSuch a manifold has a convex potential function ψ(θ), by which two tensors are given byWe also have a dual coordinate system, a dual potential function, and an invariant canonical divergence function D (P : Q ). An important family of probability distributions is the exponential family represented in the following form by taking an adequate dominating measure,In this case, the parameter θis called the canonical or natural parameter, and the function ψ(θ) is the cumulant generating function (in physics it is called the free energy), which is convex. The manifold of an exponential family is dually flat, given by the convex function ψ(θ). The dual coordinates are t he expectation parameters, ηWe have the dual structure explained in Section 2.Another important dually flat manifold is a mixture family, which is written aswhere pi(x) are fixed probability distributions.There are many probability distributions which are sub manifolds of an exponential family. They are called curved exponential families. Other families exist which are not embedded in an exponential family. They also have a dual structure.When random variable x is discrete, taking a finite number of values, x =0 , 1 , 2 , ···,n, the set of all such distributions form an exponential family. This is Because we havewhere θi=log pi is the log probability of x = i and δi(x) is the delta functionThis implies any parameterized family of probability distributions over discrete random variables is a curved exponential family, and is hence a sub manifold in a dually flat manifold. This is the reason why a dually flat manifold is important.Procedures of statistical inference, such as estimation and testing statistical hypothesis is well founded in the framework of information geometry.Semipaametric statistical inference has been established in the fibre bundle theory of statistical inference (Amari and Kawanabe, 6).4 Applications of Information GeometryPlenty of applications of information geometry have been widely prevailing in many fields and are growing. Here, we mention only a simple list of applications.1) Applications to statistical inferenceHigher-order evaluation of statistical inference, including estimation and hypothesis testing, is the oldest applications (Amari, 1). Here, both of the primale-curvature and dual m-curvature play a fundamental role. Other applications are given in the area of EM algorithm, semiparametric estimation and robust Estimation.2) Control theory and time series analysisA linear system and a nonlinear system can be identified by the probability distribution of the system output when white noise is applied to its input. This gives one-to-one correspondence of a family of probability distributions and a family of systems. Hence, the geometrical structure of the manifold of systems can be studied by in format ion geometry (Amari, 2).3) Applications to neural networks and systemsOne application is found in multilayer perceptrons, where a set of perceptrons forms a Riemannian space. However, due to the symmetric structure of neurons in the hidden layer, the manifold is singular, and the Riemannian metric degenerates in symmetry regions (Amari, Park and Ozeki, 9). This causes serious difficulty in learning behaviors. We can overcome this difficulty by taking the Riemannian structure into account and modifying a learning algorithm to fit the Riemannian structure (the natural gradient method, Amari, 1998).Another application is analysis of spike trains in a pool of neurons, where their firing is correlated. We can decompose correlated structure orthogonally in a sum of firing rates, pairwise correlations, third-order and higher-order correlations(Nakahara and Amari, 21). Dual geodesic foliations of information geometry plays a fundamental role in this decomposition.4) Machine learningMachine learning deals with stochastic situations and extracts necessary information from examples. In the case of a graphical model, the belief propagation algorithm uses e- and m-projections effectively (Ikeda, Tanaka and Amari, 16).Another application is in the analysis of the boosting method of combining weak learners (Lebanon and Lafferty, 18; Murata et al., 20; Lebanon, 17). We can use the geometric idea of conformal transformation for improving the kernel function in the area of support vector machines (Wu and Amari, 27).5) Convex programmingIn the case of convex programming such as linear programming and semi-definite programming, the inner method can be used effectively. A convex potential function is given from the convexregion as a barrier function from which the dual structure is introduced. The m-curvature plays a fundamental role in evaluating the complexity of the algorithm (Ohara, 23; Ohara and Tsuchiya, 24).6) Signal processing and ICA (independent component analysis)Independent component analysis is a technique to extract hidden signals from their mixtures. Here, the geometry of the manifold of mixing and unmixing matrices plays a fundamental role, together with the manifold of joint probability distributions which includes the submanifold of independent distributions in its inside (Cichocki and Amari, 13).7) Other applicationsWe can find many applications in mathematics, physics and information theory.4.1 ConclusionsInformation geometry, I-projection, and alternative procedure of dual projections are important tools of frequent use. The present review paper constructs a dually flat manifold starting from a convex function. We have elucidated its dualistic differential-geometrical structure without going into details of differential geometry. This is possible because the manifold is dually flat. However, deeper mathematical framework would be required when we go further, and the present paper plays a role of introduction to information geometry.It is also useful to point out the relation of information geometry to affine differential geometry (Nomizu and Sasaki, 22). A potential function ψ(θ)is regarded as an n -dimensional sub manifold defined by θ0= ψin thee x tended space Then, affine differential geometry studies the geometry of this surface, where the space is regarded as an affine space. We may note that the R´enyi entropy (R´enyi, 25) and Tsallis entropy (Tsallis, 26) are closely related to the α-geometry.Applications of information geometry are expanding. One can see some of them in the present monograph, e.g., applications to signal processing, vision analysis, shape analysis and others.ReferencesAmari, S.: Differential-Geometrical Methods in Statistics. Lecture Notes in Statistics,vol. 28. Springer, Heidelberg (1985)Amari, S.: Differential geometry of a parametric family of invertible linear systems-Riemannian metric, dual affine connections and divergence. Mathematical Systems Theory 20, 53–82 (1987) Amari, S.: Information geometry of the EM and em algorithms for neural networks.Neural Networks 8-9, 1379–1408 (1995)Amari, S.: Natural gradient works efficiently in learning. Neural Computation 10, 251–276 (1998)Amari, S.: Information geometry on hierarchy of probability distributions. IEEE Trans-actions on Information Theory 47, 1701–1711 (2001)Amari, S., Kawanabe, M.: Information geometry of estimating functions in semi parametricstatistical models. Bernoulli. 3(1), 29–54 (1997)Amari, S., Kurata, K., Nagaoka, H.: Information geometry of Boltzmann machines.IEEE Transactions on Neural Networks 3, 260–271 (1992)Amari, S., Nagaoka, H.: Methods of Information Geometry. Translations of Mathematical Monographs, vol. 191. AMS & Oxford University Press (2000)Amari, S., Park, H., Ozeki, T.: Singularities affect dynamics of learning in neuromanifolds. Neural Computation 18, 1007–1065 (2006)Bregman, L.M.: The relaxation method of finding the common point of convex sets and its application to the solution of problems in convex programming. USSR Computational Mathematics and Physics 7, 200–217 (1967)。

英文文献翻译中的80个固定搭配

英文文献翻译中的80个固定搭配

文献翻译中的80个常用固定搭配1. 随着经济的繁荣with the booming of the economy2. 随着人民生活水平的显著提高with the remarkable improvement of people's living standard3. 先进的科学技术advanced science and technology4. 为我们日常生活增添了情趣add much spice / flavor to our daily life5. 人们普遍认为It is commonly believed that…6. 我同意前者(后者)观点I give my vote to the former / latter opinion.7. 引起了广泛的公众关注Sth. has aroused wide public concern. / Sth has drawn great public attention.8. 不可否认It is undeniable that…9. 热烈的讨论/ 争论a heated discussion / debate10. 有争议性的问题a controversial issue11. 就我而言/ 就个人而言As far as I am concerned, / Personally,12. 有充分的理由支持be supported by sound reasons13. 双方的论点argument on both sides14. 发挥日益重要作用play an increasingly important role in…15. 对…必不可少be indispensable to …16. 正如谚语所说As the proverb goes:17. 对…产生有利/不利的影响exert positive / negative effects on…18. 利远远大于弊The advantages far outweigh the disadvantages.19. 导致,引起lead to / give rise to / contribute to / result in20. 复杂的社会现象a complicated social phenomenon21. 责任感/ 成就感sense of responsibility / achievement22. 竞争与合作精神sense of competition and cooperation23. 开阔眼界widen one's horizon / broaden one's vision24. 学习知识和技能acquire knowledge and skills25. 经济/心理负担financial burden / psychological burden26. 考虑到诸多因素take many factors into consideration27. 从另一个角度from another perspective28. 做出共同努力make joint efforts29. 对…有益be beneficial to / be conducive to…30. 为社会做贡献make contributions to the society31. 打下坚实的基础lay a solid foundation for…32. 综合素质comprehensive quality33. 致力于/ 投身于be committed / devoted to…34. 应当承认Admittedly,35. 不可推卸的义务unshakable duty36. 满足需求satisfy / meet the needs of...37. 可靠的信息源a reliable source of information38. 宝贵的自然资源valuable natural resources39. 因特网the Internet (一定要由冠词,字母I 大写)40. 方便快捷convenient and efficient41. 在人类生活的方方面面in all aspects of human life42. 环保的材料environmentally friendly materials43. 社会进步的体现a symbol of society progress44. 大大方便了人们的生活Sth has greatly facilitated people's lives.45. 对这一问题持有不同态度hold different attitudes towards this issue46. 在一定程度上to some extent47. 理论和实践相结合integrate theory with practice48. …必然趋势an irresistible trend of…49. 日益激烈的社会竞争the increasingly keen social competition50. 眼前利益immediate interest/ short-term interest51. 长远利益long-tem interest52. …有其自身的优缺点…has its own merits and demerits / pros and cons53. 对…有害do harm to / be harmful to / be detrimental to54. 交流思想/ 情感/ 信息exchange ideas / emotions / information55. 跟上…的最新发展keep pace with / keep abreast with the latest development of…56. …的健康发展the healthy development of…57. 重视attach great importance to…58. 社会地位social status59. 把时间和精力放在…上focus one's time and energy on…60. 扩大知识面expand one's scope of knowledge61. 身心两方面both physically and mentally62. 有直接/间接关系be directly / indirectly related to…63. 导致很多问题give rise to / lead to / spell various problems64. 可以替代think的词believe, claim, maintain, argue, insist, hold the opinion / belief / view that65. 缓解压力/ 减轻负担relieve stress / burden66. 优先考虑/发展…give (top) priority to sth.67. 与…比较compared with…/ in comparison with68. 可降解的/可分解的材料degradable / decomposable material69. 代替replace / substitute / take the place of70. 提供就业机会offer job opportunities71. 反映了社会进步的mirror the social progress/advance72. 增进相互了解enhance / promote mutual understanding73. 充分利用make full use of / take advantage of74. 承受更大的工作压力suffer from heavier work pressure75. 保障社会稳定和繁荣guarantee the stability and prosperity of our society76. 更多地强调put more emphasis on…77. 适应社会发展adapt oneself to the social development78. 实现梦想realize one's dream79. 主要理由列举如下The main / leading reasons are listed as follows:80. 我们还有很长的路要走We still have a long way to go.。

(完整word版)中英互译文献

(完整word版)中英互译文献

外文文献翻译Operational AmplifiersIn 1943 Harry Black commuted from his home in New York City at Bell Labs in New Jersey by way of a ferry. The ferry ride relaxed Harry enabling him to do some conceptual thinking. Harry had a tough problem to solve; when phone lines were extended long distance, they needed amplifiers, and undependable amplifiers limited phone service. First, initial tolerances on the gain were poor, but that problem was quickly solved wuth an adjustment. Second, even when an amplifier was adjusted correctly at the factory, the gain drifted so much during field operation that the volume was too low or the incoming speech was distorted.Many attempts had been made to make a stable amplifier, but temperature changes and power supply voltage extremes experienced on phone lines caused uncontrollable gain drift. Passive components had much better drift characteristics than active components had, thus if an amplifier’s gain could be made dependent on passive components, the problem would be solve. During on e of his ferry trips, Harry’s fertile brain conceived a novel solution for the amplifier problem, and he documented the solution while riding on the ferry.The solution was to first build an amplifier that had more gain than the application required. Then some of the amplifier output signal was fed back to the input in a manner that makes the circuit gain (circuit is the amplifier and feedback components) dependent on the feedback circuit rather than the amplifier gain. Now the circuit gain is dependent on the passive feedback components rather than the active amplifier. This is called negative feedback, and it is the underlying operating principle for all modern day opamps. Harry had documented the first intentional feedback circuit had been built prior to that time ,but the designers ignored the effect.I can hear the squeals of anguish coming from the manager and amplifier designers. I imagine that they said something like this, “it is hard enough to achieve 30kHz gainbandwidth (GBW), and now this fool wants me to design an amplifier with 3MHz GBW. But ,he is still going to get a circuit gain GBW of 30kHz .” Well, time has proven Harry right ,but there is a minor problem. It seems that circuit designed with large pen loop gains sometimes oscillate when the loop is closed. A lot of people investigated the instability effect, and it was prettywell understood in the 1940s, but solving stability problems involved long, tedious, and intricate calculations. Years passed without anybody making the problem solution simpler or more understandable.In 1945 H. W. Bode presented a system for analyzing the stability of feedback system by using graphical methods. Until this time, feedback analysis was done by multiplication and division, so calculation of transfer functions was a time consuming and laborious task. Remember, engineers did not have calculators or computers until the ‘70s, Bode presented a log technique that transformed the intensely mathematical process of calculating a feedback system’s stability into grap hical analysis that was simple and perceptive. Feedback system design was still complicated, but it no longer was an art dominated by a few electrical engineers kept in a small dark room. Any electrical engineer could use Bode’s methods to find the stability of a feedback circuit, so the application of feedback to machines began to grow. There really wasn’t much call for electrical feedback design until computers and transducers become of age.The first real-time computer was the analog computer! This computer used preprogrammed equations and input data to calculate control actions. The programming was hard wired with a series of circuit that performed math operations on the data, and the hard wiring limitation eventually caused the declining popularity of the analog computer. The heart of the analog computer was a device called an operational amplifier because it could be configured to perform many mathematical operations such as multiplication, addition, subtraction, division, integration, and differentiation on the input signals. The name was shortened to the familiar op amp, as we have come to know and love them. The op amp used an amplifier with a large open loop gain, and when the loop was closed, the amplifier performed the mathematical operations dictated by the external passive components. This amplifier was very large because it was built with vacuum tubes and it required a high-voltage power supply,but it was the heart of the analog computer, thus its large size and huge power requirements were accepted. Many early op amps were designed for analog computers, an it was soon found out the op amps had other uses and were handy to have around the physics lab .At this time general-purpose analog computers were found in universities and large company laboratories because they were critical to the research work done there. There was a parallel requirement for transducer signal conditioning in lab experiments, and op amps found their way into signal conditioning applications. As the signal conditioning applications expanded, the demand for op amps grew beyond the analog computer requirements , and even when the analog computers lost favor to digital computers, the op amps survived because of its importance in universal analog applications. Eventually digital computes replaced the analog computers, but the demand for op amps increased as measurement applications increased.The first signal conditioning op amps were constructed with vacuum tubes prior to the introduction of transistors, so they were large and bul ky. During the’50s, miniature vacuum tubes that worked from lower voltage power supplies enabled the manufacture of op amps that shrunk to the size lf a brick used in house construction, so the op amp modules were nick named bricks. Vacuum tube size and component size decreased until an op amp was shrunk to the size of a single octal vacuum tube. Transistors were commercially developed in the ‘60s, and they further reduced op amp size to several cubic inches. Most of these early op amps were made for specific applications, so they were not necessarily general purpose. The early op amps served a specific purpose, but each manufacturer had different specifications and packages; hence, there was little second sourcing among the early op amps.ICs were developed during the late 1950s and early 1960s, but it wasn’t till the middle 1960s that Fairchild released the μA709. This was the first commercially successful IC op am. TheμA709 had its share of problems, bur any competent analog engineer could use it, and it served in many different analog applications. The maj or drawback of theμA709 was stability; it required external compensation and a competent analog engineer to apply it. Also, theμA709 was quite sensitive because it had a habit of self-destruction under any adverse condition. TheμA741 followed theμA709, and it is an internally compensated op amp that does not require external compensation if operated under data sheet conditions. There has been a never-ending series of new op amps released each year since then, and their performance and reliability had improved to the point where present day op amps can be usedfor analog applications by anybody.The IC op amp is here to stay; the latest generation op amps cover the frequency spectrum from 5kHz GBW to beyond 1GHz GBW. The supply voltage ranges from guaranteed operation at 0.9V to absolute maximum voltage ratings of 1000V. The input current and input offset voltage has fallen so low that customers have problems verifying the specifications during incoming inspection. The op amp has truly become the universal analog IC because it performs all analog tasks. It can function as a line driver, comparator (one bit A/D), amplifier, level shifter, oscillator, filter, signal conditioner, actuator driver, current source, voltage source, and etc. The designer’s problem is h ow to rapidly select the correct circuit /op amp combination and then, how to calculate the passive component values that yield the desired transfer function in the circuit.The op amp will continue to be a vital component of analog design because it is such a fundamental component. Each generation of electronic equipment integrates more functions on silicon and takes more of the analog circuit inside the IC. As digital applications increase, analog applications also increase because the predominant supply of data and interface applications are in the real world, and the real world is an analog world. Thus , each new generation of electronic equipment creates requirements for new analog circuit; hence, new generations of op amps are required to fulfill these requirements. Analog design, and op amp design, is a fundamental skill that will be required far into the future.放大器1943年,哈利·布莱克乘火车或渡船从位于纽约市的家去新泽西州的贝尔实验室上班。

中文文献翻译成英文

中文文献翻译成英文

中文文献翻译成英文A Chinese Literature Translation in English (700 words)Title: The Influence of Chinese Traditional Music on Modern Western MusicAbstract:Music is an integral part of every culture, with each having its unique characteristics that reflect the traditions, beliefs, and values of its people. Chinese traditional music has a rich history that spans thousands of years, and it has significantly influenced modern Western music. This paper explores the various ways in which Chinese traditional music has shaped and contributed to the development of modern Western music, particularly in terms of its melodies, instruments, and techniques. By examining specific examples and analyzing the impact of Chinese traditional music, this paper aims to showcase the cultural exchange and mutual influence between China and the West in the realm of music. Introduction:Chinese traditional music has had a profound impact on the development of music worldwide. Its delicate melodies, unique tonalities, and incorporation of traditional Chinese instruments have captivated the attention of composers and musicians in the West. The introduction of Chinese traditional music to the Western world has fostered a cross-cultural exchange and stimulated the innovation of new musical styles and techniques. This paper aims to shed light on the influence of Chinese traditional music on modern Western music, highlighting specific examples and demonstrating the cultural significance of this exchange.Main Body:1. MelodiesChinese traditional music is renowned for its lyrical and expressive melodies, which often convey complex emotions and narratives. The introduction of Chinese melodies into Western music has brought a fresh perspective and expanded the boundaries of composition. For instance, Debussy's famous work "Pagodes" drew inspiration from Chinese melodies and incorporated elements of pentatonic scales, creating a dreamlike ambiance that captures the essence of traditional Chinese music.2. InstrumentsThe unique sounds produced by Chinese traditional instruments, such as the guqin, erhu, and pipa, have attracted Western musicians who sought to incorporate these distinct timbres into their compositions. Through experimentation and exploration, these instruments have found their way into Western orchestras and ensembles, enriching the sonic palette and broadening the horizons of Western music. An example of this is the incorporation of the guqin in John Cage's "Sonatas and interludes," where the Eastern instrument's timbre and techniques are utilized to create a harmonious blend with Western instruments.3. TechniquesChinese traditional music employs a variety of unique techniques, such as sliding, vibrato, and glissando, which have been adopted by Western composers to add new dimensions to their compositions. These techniques help to create a distinct mood and sense of movement in the music. For instance, Ravel's "Daphnis etChloé" features a significant Eastern influence, with the use of glissandos and other techniques borrowed from Chinese traditional music, resulting in a vibrant and dynamic orchestral piece. Conclusion:In summary, Chinese traditional music has significantly influenced modern Western music in terms of melodies, instruments, and techniques. The introduction of Chinese melodies and instruments has brought a new perspective and expanded the creative possibilities of Western composers. The cultural exchange between China and the West has enriched the world of music, fostering mutual understanding and appreciation for different musical traditions. As globalization continues to connect cultures around the world, it is essential to recognize the cultural value of music as a means to bridge gaps and promote cultural diversity.。

外文文献翻译原文+译文

外文文献翻译原文+译文

外文文献翻译原文Analysis of Con tin uous Prestressed Concrete BeamsChris BurgoyneMarch 26, 20051、IntroductionThis conference is devoted to the development of structural analysis rather than the strength of materials, but the effective use of prestressed concrete relies on an appropriate combination of structural analysis techniques with knowledge of the material behaviour. Design of prestressed concrete structures is usually left to specialists; the unwary will either make mistakes or spend inordinate time trying to extract a solution from the various equations.There are a number of fundamental differences between the behaviour of prestressed concrete and that of other materials. Structures are not unstressed when unloaded; the design space of feasible solutions is totally bounded;in hyperstatic structures, various states of self-stress can be induced by altering the cable profile, and all of these factors get influenced by creep and thermal effects. How were these problems recognised and how have they been tackled?Ever since the development of reinforced concrete by Hennebique at the end of the 19th century (Cusack 1984), it was recognised that steel and concrete could be more effectively combined if the steel was pretensioned, putting the concrete into compression. Cracking could be reduced, if not prevented altogether, which would increase stiffness and improve durability. Early attempts all failed because the initial prestress soon vanished, leaving the structure to be- have as though it was reinforced; good descriptions of these attempts are given by Leonhardt (1964) and Abeles (1964).It was Freyssineti’s observations of the sagging of the shallow arches on three bridges that he had just completed in 1927 over the River Allier near Vichy which led directly to prestressed concrete (Freyssinet 1956). Only the bridge at Boutiron survived WWII (Fig 1). Hitherto, it had been assumed that concrete had a Young’s modulus which remained fixed, but he recognised that the de- ferred strains due to creep explained why the prestress had been lost in the early trials. Freyssinet (Fig. 2) also correctly reasoned that high tensile steel had to be used, so that some prestress would remain after the creep had occurred, and alsothat high quality concrete should be used, since this minimised the total amount of creep. The history of Freyssineti’s early prestressed concrete work is written elsewhereFigure1:Boutiron Bridge,Vic h yFigure 2: Eugen FreyssinetAt about the same time work was underway on creep at the BRE laboratory in England ((Glanville 1930) and (1933)). It is debatable which man should be given credit for the discovery of creep but Freyssinet clearly gets the credit for successfully using the knowledge to prestress concrete.There are still problems associated with understanding how prestressed concrete works, partly because there is more than one way of thinking about it. These different philosophies are to some extent contradictory, and certainly confusing to the young engineer. It is also reflected, to a certain extent, in the various codes of practice.Permissible stress design philosophy sees prestressed concrete as a way of avoiding cracking by eliminating tensile stresses; the objective is for sufficient compression to remain after creep losses. Untensionedreinforcement, which attracts prestress due to creep, is anathema. This philosophy derives directly from Freyssinet’s logic and is primarily a working stress concept.Ultimate strength philosophy sees prestressing as a way of utilising high tensile steel as reinforcement. High strength steels have high elastic strain capacity, which could not be utilised when used as reinforcement; if the steel is pretensioned, much of that strain capacity is taken out before bonding the steel to the concrete. Structures designed this way are normally designed to be in compression everywhere under permanent loads, but allowed to crack under high live load. The idea derives directly from the work of Dischinger (1936) and his work on the bridge at Aue in 1939 (Schonberg and Fichter 1939), as well as that of Finsterwalder (1939). It is primarily an ultimate load concept. The idea of partial prestressing derives from these ideas.The Load-Balancing philosophy, introduced by T.Y. Lin, uses prestressing to counter the effect of the permanent loads (Lin 1963). The sag of the cables causes an upward force on the beam, which counteracts the load on the beam. Clearly, only one load can be balanced, but if this is taken as the total dead weight, then under that load the beam will perceive only the net axial prestress and will have no tendency to creep up or down.These three philosophies all have their champions, and heated debates take place between them as to which is the most fundamental.2、Section designFrom the outset it was recognised that prestressed concrete has to be checked at both the working load and the ultimate load. For steel structures, and those made from reinforced concrete, there is a fairly direct relationship between the load capacity under an allowable stress design, and that at the ultimate load under an ultimate strength design. Older codes were based on permissible stresses at the working load; new codes use moment capacities at the ultimate load. Different load factors are used in the two codes, but a structure which passes one code is likely to be acceptable under the other.For prestressed concrete, those ideas do not hold, since the structure is highly stressed, even when unloaded. A small increase of load can cause some stress limits to be breached, while a large increase in load might be needed to cross other limits. The designer has considerable freedom to vary both the working load and ultimate load capacities independently; both need to be checked.A designer normally has to check the tensile and compressive stresses, in both the top and bottom fibre of the section, for every load case. The critical sections are normally, but not always, the mid-span and the sections over piers but other sections may become critical ,when the cable profile has to be determined.The stresses at any position are made up of three components, one of which normally has a different sign from the other two; consistency of sign convention is essential.If P is the prestressing force and e its eccentricity, A and Z are the area of the cross-section and its elastic section modulus, while M is the applied moment, then where ft and fc are the permissible stresses in tension and compression.c e t f ZM Z P A P f ≤-+≤Thus, for any combination of P and M , the designer already has four in- equalities to deal with.The prestressing force differs over time, due to creep losses, and a designer isusually faced with at least three combinations of prestressing force and moment;• the applied moment at the time the prestress is first applied, before creep losses occur,• the maximum applied moment after creep losses, and• the minimum applied moment after creep losses.Figure 4: Gustave MagnelOther combinations may be needed in more complex cases. There are at least twelve inequalities that have to be satisfied at any cross-section, but since an I-section can be defined by six variables, and two are needed to define the prestress, the problem is over-specified and it is not immediately obvious which conditions are superfluous. In the hands of inexperienced engineers, the design process can be very long-winded. However, it is possible to separate out the design of the cross-section from the design of the prestress. By considering pairs of stress limits on the same fibre, but for different load cases, the effects of the prestress can be eliminated, leaving expressions of the form:rangestress e Perm issibl Range Mom entZ These inequalities, which can be evaluated exhaustively with little difficulty, allow the minimum size of the cross-section to be determined.Once a suitable cross-section has been found, the prestress can be designed using a construction due to Magnel (Fig.4). The stress limits can all be rearranged into the form:()M fZ PA Z e ++-≤1 By plotting these on a diagram of eccentricity versus the reciprocal of the prestressing force, a series of bound lines will be formed. Provided the inequalities (2) are satisfied, these bound lines will always leave a zone showing all feasible combinations of P and e. The most economical design, using the minimum prestress, usually lies on the right hand side of the diagram, where the design is limited by the permissible tensile stresses.Plotting the eccentricity on the vertical axis allows direct comparison with the crosssection, as shown in Fig. 5. Inequalities (3) make no reference to the physical dimensions of the structure, but these practical cover limits can be shown as wellA good designer knows how changes to the design and the loadings alter the Magnel diagram. Changing both the maximum andminimum bending moments, but keeping the range the same, raises and lowers the feasible region. If the moments become more sagging the feasible region gets lower in the beam.In general, as spans increase, the dead load moments increase in proportion to the live load. A stage will be reached where the economic point (A on Fig.5) moves outside the physical limits of the beam; Guyon (1951a) denoted the limiting condition as the critical span. Shorter spans will be governed by tensile stresses in the two extreme fibres, while longer spans will be governed by the limiting eccentricity and tensile stresses in the bottom fibre. However, it does not take a large increase in moment ,at which point compressive stresses will govern in the bottom fibre under maximum moment.Only when much longer spans are required, and the feasible region moves as far down as possible, does the structure become governed by compressive stresses in both fibres.3、Continuous beamsThe design of statically determinate beams is relatively straightforward; the engineer can work on the basis of the design of individual cross-sections, as outlined above. A number of complications arise when the structure is indeterminate which means that the designer has to consider, not only a critical section,but also the behaviour of the beam as a whole. These are due to the interaction of a number of factors, such as Creep, Temperature effects and Construction Sequence effects. It is the development of these ideas whichforms the core of this paper. The problems of continuity were addressed at a conference in London (Andrew and Witt 1951). The basic principles, and nomenclature, were already in use, but to modern eyes concentration on hand analysis techniques was unusual, and one of the principle concerns seems to have been the difficulty of estimating losses of prestressing force.3.1 Secondary MomentsA prestressing cable in a beam causes the structure to deflect. Unlike the statically determinate beam, where this motion is unrestrained, the movement causes a redistribution of the support reactions which in turn induces additional moments. These are often termed Secondary Moments, but they are not always small, or Parasitic Moments, but they are not always bad.Freyssinet’s bridge across the Marne at Luzancy, started in 1941 but not completed until 1946, is often thought of as a simply supported beam, but it was actually built as a two-hinged arch (Harris 1986), with support reactions adjusted by means of flat jacks and wedges which were later grouted-in (Fig.6). The same principles were applied in the later and larger beams built over the same river.Magnel built the first indeterminate beam bridge at Sclayn, in Belgium (Fig.7) in 1946. The cables are virtually straight, but he adjusted the deck profile so that the cables were close to the soffit near mid-span. Even with straight cables the sagging secondary momentsare large; about 50% of the hogging moment at the central support caused by dead and live load.The secondary moments cannot be found until the profile is known but the cablecannot be designed until the secondary moments are known. Guyon (1951b) introduced the concept of the concordant profile, which is a profile that causes no secondary moments; es and ep thus coincide. Any line of thrust is itself a concordant profile.The designer is then faced with a slightly simpler problem; a cable profile has to be chosen which not only satisfies the eccentricity limits (3) but is also concordant. That in itself is not a trivial operation, but is helped by the fact that the bending moment diagram that results from any load applied to a beam will itself be a concordant profile for a cable of constant force. Such loads are termed notional loads to distinguish them from the real loads on the structure. Superposition can be used to progressively build up a set of notional loads whose bending moment diagram gives the desired concordant profile.3.2 Temperature effectsTemperature variations apply to all structures but the effect on prestressed concrete beams can be more pronounced than in other structures. The temperature profile through the depth of a beam (Emerson 1973) can be split into three components for the purposes of calculation (Hambly 1991). The first causes a longitudinal expansion, which is normally released by the articulation of the structure; the second causes curvature which leads to deflection in all beams and reactant moments in continuous beams, while the third causes a set of self-equilibrating set of stresses across the cross-section.The reactant moments can be calculated and allowed-for, but it is the self- equilibrating stresses that cause the main problems for prestressed concrete beams. These beams normally have high thermal mass which means that daily temperature variations do not penetrate to the core of the structure. The result is a very non-uniform temperature distribution across the depth which in turn leads to significant self-equilibrating stresses. If the core of the structure is warm, while the surface is cool, such as at night, then quite large tensile stresses can be developed on the top and bottom surfaces. However, they only penetrate a very short distance into the concrete and the potential crack width is very small. It can be very expensive to overcome the tensile stress by changing the section or the prestress。

(完整word版)外文文献及翻译doc

(完整word版)外文文献及翻译doc

Criminal Law1.General IntroductionCriminal law is the body of the law that defines criminal offenses, regulates the apprehension, charging, and trial of suspected offenders,and fixes punishment for convicted persons. Substantive criminal law defines particular crimes, and procedural law establishes rules for the prosecution of crime. In a democratic society, it is the function of the legislative bodies to decide what behavior will be made criminal and what penalties will be attached to violations of the law.Capital punishment may be imposed in some jurisdictions for the most serious crimes. And physical or corporal punishment may still be imposed such as whipping or caning, although these punishments are prohibited in much of the world. A convict may be incarcerated in prison or jail and the length of incarceration may vary from a day to life.Criminal law is a reflection of the society that produce it. In an Islamic theocracy, such as Iran, criminal law will reflect the religious teachings of the Koran; in an Catholic country, it will reflect the tenets of Catholicism. In addition, criminal law will change to reflect changes in society, especially attitude changes. For instance, use of marijuana was once considered a serious crime with harsh penalties, whereas today the penalties in most states are relatively light. As severity of the penaltieswas reduced. As a society advances, its judgments about crime and punishment change.2.Elements of a CrimeObviously, different crimes require different behaviors, but there are common elements necessary for proving all crimes. First, the prohibited behavior designated as a crime must be clearly defined so that a reasonable person can be forewarned that engaging in that behavior is illegal. Second, the accused must be shown to have possessed the requisite intent to commit the crime. Third, the state must prove causation. Finally, the state must prove beyond a reasonable doubt that the defendant committed the crime.(1) actus reusThe first element of crime is the actus reus.Actus is an act or action and reus is a person judicially accused of a crime. Therefore, actus reus is literally the action of a person accused of a crime. A criminal statute must clearly define exactly what act is deemed “guilty”---that is, the exact behavior that is being prohibited. That is done so that all persons are put on notice that if they perform the guilty act, they will be liable for criminal punishment. Unless the actus reus is clearly defined, one might not know whether or not on e’s behavior is illegal.Actus reus may be accomplished by an action, by threat of action,or exceptionally, by an omission to act, which is a legal duty to act. For example, the act of Cain striking Abel might suffice, or a parent’s failure to give to a young child also may provide the actus reus for a crime.Where the actus reus is a failure to act, there must be a duty of care. A duty can arise through contract, a voluntary undertaking, a blood relation, and occasionally through one’s official position. Duty also can arise from one’s own creation of a dangerous situation.(2)mens reaA second element of a crime is mens rea. Mens rea refers to an individual’s state of mind when a crime is committed. While actus reus is proven by physical or eyewitness evidence, mens rea is more difficult to ascertain. The jury must determine for itself whether the accused had the necessary intent to commit the act.A lower threshold of mens rea is satisfied when a defendant recognizes an act is dangerous but decides to commit it anyway. This is recklessness. For instance, if Cain tears a gas meter from a wall, and knows this will let flammable gas escape into a neighbor’s house, he could be liable for poisoning. Courts often consider whether the actor did recognise the danger, or alternatively ought to have recognized a danger (though he did not) is tantamount to erasing intent as a requirement. In this way, the importance of mens rea hasbeen reduced in some areas of the criminal law.Wrongfulness of intent also may vary the seriousness of an offense. A killing committed with specific intent to kill or with conscious recognition that death or serious bodily harm will result, would be murder, whereas a killing affected by reckless acts lacking such a consciousness could be manslaughter.(3)CausationThe next element is causation. Often the phrase “but for”is used to determine whether causation has occurred. For example, we might say “Cain caused Abel”, by which we really mean “Cain caused Abel’s death. ”In other words, ‘but for Cain’s act, Abel would still be alive.” Causation, then, means “but for” the actions of A, B would not have been harmed. In criminal law, causation is an element that must be proven beyond a reasonable doubt.(4) Proof beyond a Reasonable DoubtIn view of the fact that in criminal cases we are dealing with the life and liberty of the accused person, as well as the stigma accompanying conviction, the legal system places strong limits on the power of the state to convict a person of a crime. Criminal defendants are presumed innocent. The state must overcome this presumption of innocence by proving every element of the offense charged against the defendant beyond a reasonable doubt to thesatisfaction of all the jurors. This requirement is the primary way our system minimizes the risk of convicting an innocent person.The state must prove its case within a framework of procedural safeguards that are designed to protect the accused. The state’s failure to prove any material element of its case results in the accused being acquitted or found not guilty, even though he or she may actually have committed the crime charged.3. Strict LiabilityIn modern society, some crimes require no more mens rea, and they are known as strict liability offenses. For in stance, under the Road Traffic Act 1988 it is a strict liability offence to drive a vehicle with an alcohol concentration above the prescribed limit.Strict liability can be described as criminal or civil liability notwithstanding the lack mens rea or intent by the defendant. Not all crimes require specific intent, and the threshold of culpability required may be reduced. For example, it might be sufficient to show that a defendant acted negligently, rather than intentionally or recklessly.1. 概述刑法是规定什么试犯罪,有关犯罪嫌疑人之逮捕、起诉及审判,及对已决犯处以何种刑罚的部门法。

毕业文献翻译

毕业文献翻译

烟雾控制SMOKE CONTROL学生姓名:唐桢敬专业名称:安全工程导师名字:吕建摘要:在建筑火灾情况下,烟雾经常流向偏离火灾的地方,造成威胁生命以及损坏财产影响,同时楼梯间和电梯间经常变成充满烟气的,因此阻碍了撤离和疏散,当今烟雾已经被认为在火灾当中最大的杀手。

在20世纪60年代中后期,利用加压来防止烟雾在楼梯间的渗漏开始吸引了关注,这是由压力挤压模型而想出来,换而言之,就是排出火灾层的空气同时给周围其它的楼层加压,建筑的通风系统经常是用于这个目的的,烟控这个特定用语是为通过使用机械加压来限制烟雾在火灾当中的流动这样一个系统而创造的名字。

澳大利亚、加拿大、英国、法国、日本、美国、西德应经做过了烟控场所的调研,这个调研是由场所测试,大规模的火灾测试,和电脑模型构成的,很多建筑物已经建有了烟控系统,同时很多其它的建筑也为此而加装烟控系统。

关键词:烟囱效应浮力风力烟雾的移动一个烟控系统必须经过设计才能使其不被引起烟雾移动的驱动力所压制,正是因为这个为盈,对烟雾流动和烟雾控制的基本观念的理解是智能烟控设计的前提,最主要影响烟雾流动的驱动力是烟囱效应、浮力、膨胀、风力和热力以及空气流动和空调系统,总的来说,在火灾情况下,烟雾流动是由这些驱动力的相互作用引起的,在任何一种驱动力存在的情况下,它们都将单独发生效应,下面这些部分是对每一种驱动力的讨论。

烟囱效应当外界是冷的时候,在建筑物的通风井内经常有向上流动的气体,例如楼梯井、电梯井、小升降井以及机械井或者运输槽。

这些现象是可以归咎于正常的烟囱效应。

室内的气体都有受到浮力,是因为室内的气体是更热并且密度相对于室外气体更小。

这种浮力引起了气体在建筑物的通风井内上升,对于室外的低温和高高的通风井,普通的烟囱效应的意义是更重大的,然而,普通的烟囱效应也存在于单层建筑当中。

当外界的气体相对于建筑物内的气体时,在通风井内,一股向下的气流是时常存在的,这股向下的气流被称为逆向烟囱效应。

知网文献翻译

知网文献翻译

知网文献翻译知网文献翻译是一项很重要的工作。

随着国际交流日益密切,许多文献和资料需要翻译为本国语言,以便更好地传播和利用。

下面,就从准备、翻译和校对三个步骤来详细介绍一下知网文献翻译的过程。

第一步:准备工作在开始翻译之前,需要先进行一些准备工作。

首先要确定所翻译的文献类型和领域,例如论文、研究报告、专利、技术资料等。

其次,要详细了解所翻译的领域知识和专业术语,确保在翻译过程中能够准确表达原文的意思。

最后,需要安排好翻译的时间和流程,并确定好翻译工具和资料。

第二步:翻译翻译是整个工作的核心环节。

在翻译过程中,需要遵循以下几点:1.准确理解原文的意思在翻译之前,要对原文进行仔细地阅读和理解,确保对原文的意思有一个全面的认识。

这样才能避免在翻译过程中出现误解或错误。

2.采用恰当的翻译方法翻译的方法有多种,如逐字翻译、意译等。

要根据原文的特点和翻译的目的选用合适的翻译方法。

3.保持语言风格的统一性在翻译过程中,要保持语言风格的统一性,以便更好地展示原文的风采和特点。

第三步:校对在翻译完后,需要进行校对工作。

校对的目的是确保翻译的准确性和语言的通顺性。

在校对过程中,需要注意以下几点:1.对照原文进行校对在校对过程中,要对照原文进行校对,以确保翻译的准确性。

同时,要注意措辞和用词,以保持语言的通顺性。

2.检查格式和排版在校对过程中,需要检查格式和排版是否规范,以便更好地展示出翻译的内容和意义。

3.修改翻译错误和不恰当的用词在校对过程中,如发现翻译错误或不恰当的用词,需要及时进行修改,以提高翻译的质量。

总之,知网文献翻译是一项复杂而有意义的工作。

需要有一定的语言能力和专业知识,同时也需要认真实施每个步骤以确保翻译的质量和准确性。

参考文献翻译成英文格式

参考文献翻译成英文格式

References and their Importance in ResearchIntroductionA reference, also known as a citation, is a way to acknowledge and provide evidence of the sources used in a research paper or academic work. By including references, researchers can show their readers where they obtained their information and ideas, enabling others to verify and build upon their work. This article will explore the importance of references in research and discuss how to format them properly.The Importance of ReferencesEnhances Credibility1.References enhance the credibility of a research paper byproviding a solid foundation of existing knowledge on the topic. 2.By citing reputable sources, researchers show that they haveconducted a thorough literature review and considered variousperspectives.3.Proper references help readers evaluate the reliability andvalidity of the research findings.Avoids Plagiarism1.References are essential for avoiding plagiarism, which is the actof presenting someone else’s work or ideas as one’s own.2.By properly citing the sources, researchers give credit to theoriginal authors and acknowledge their contributions.3.Failure to provide proper references can result in seriousacademic consequences and damage the researcher’s reputation.Facilitates Further Research1.References provide a roadmap for further research by directingreaders to related studies and works that have influenced thecurrent research.2.Researchers can build upon existing knowledge and identify gaps inthe literature by following the references provided.3.This helps in developing new research questions and designingstudies that contribute to the advancement of knowledge.Supports Transparency and Replicability1.Including references ensures transparency in the research process,allowing others to verify and replicate the findings.2.If the methodology or results are questioned, references enableothers to critically analyze the sources and determine thesoundness of the research.3.Transparent research supported by proper references increases theoverall trustworthiness of scientific endeavors.Formatting ReferencesAPA Style1.The American Psychological Association (APA) style is a widelyused format for referencing in the social sciences.2.In APA style, references are listed alphabetically by the lastname of the first author.3.The basic format for a journal article reference in APA styleincludes the author’s name, publication year, article title,journal name, volume number, and page range.4.For books, the reference should include the author’s name,publication year, book title, publisher, and location.5.Websites, reports, and other sources have their unique citationformats, and researchers should refer to the APA manual forspecific guidelines.MLA Style1.The Modern Language Association (MLA) style is commonly used inthe humanities.2.In MLA style, the list of works cited is arranged alphabeticallyby the author’s last name or the title if no author is provided.3.The basic format for a book reference in MLA style includes theauthor’s name, book title, publisher, and publication yea r.4.For online sources, the reference should include the author’sname, article title, website name, publication date, and URL.5.MLA style also provides specific guidelines for referencing othersources like journals, newspapers, and films.Harvard Style1.The Harvard style is a popular referencing format used in variousdisciplines.2.In the Harvard style, references are cited within the text bymentioning the author’s name and publication year.3.The complete reference list is then provided at the end of thedocu ment, arranged alphabetically by the author’s last name.4.The basic format for a journal article reference in the Harvardstyle includes the author’s name, publication year, article title, journal name, volume number, and page range.5.For other sources like books, websites, and reports, researchersshould follow specific guidelines provided by the institution orjournal.ConclusionReferences are an integral part of academic research as they provide credibility, avoid plagiarism, facilitate further research, and support transparency and replicability. Properly formatting references based on established citation styles like APA, MLA, or Harvard is crucial to ensure consistency and accuracy. Researchers must understand the importance of references and follow the appropriate formattingguidelines to enhance the quality and impact of their research work.。

英文文献全文翻译

英文文献全文翻译

英文文献全文翻译全文共四篇示例,供读者参考第一篇示例:English literature has a long and rich history, with countless works that have been translated into various languages around the world. From ancient epics like Beowulf and The Odyssey to modern classics like To Kill a Mockingbird and Harry Potter, English literature has captured the hearts and minds of readers for centuries.第二篇示例:The world of academic research is vast and ever-growing, with a wealth of knowledge and information being produced every day. One important aspect of this research is the publication of English-language academic articles. These articles cover a wide range of topics across various fields, from science and technology to social sciences and humanities.第三篇示例:English literature is a treasure trove of human culture and knowledge. The literary works of great writers from around theworld offer insights into the human experience, emotions, and imagination. Through the process of translation, these literary masterpieces are made accessible to a global audience, allowing people from different cultures and backgrounds to connect and appreciate the beauty of language and storytelling.第四篇示例:Abstract:Introduction:English literature holds a prominent position in the field of international academia, with a vast number of research articles, books, and journals being published in English. For researchers and scholars in non-English speaking countries, access to English literature is essential for staying up-to-date with the latest developments in their respective fields. However, understanding and interpreting English texts can present significant challenges due to linguistic, cultural, and contextual differences.Challenges in Translating English Literature:。

中文参考文献转英文

中文参考文献转英文

中文参考文献转英文Title: Translation of Chinese Reference Literature into English (Creation and Expansion of the Corresponding Content) Introduction:Translation plays a crucial role in bridging the gap between different languages and cultures. It allows valuable knowledge and research findings to be shared and understood across borders. In this context, the translation of Chinese reference literature into English opens up new avenues for global academic exchange and understanding. This article aims to explore the challenges involved in translating Chinese reference literature into English and discuss the importance of accurate and culturally sensitive translations.Challenges in translating Chinese reference literature into English:Translating Chinese reference literature into English poses several challenges due to the linguistic, cultural, and contextual differences between the two languages. Some of the main challenges include:1. Linguistic differences: Chinese and English belong to different language families with distinct grammar, vocabulary, and sentence structures. Translators must carefully navigatethese differences to ensure accurate and coherent translations.2. Cultural nuances: Chinese reference literature often contains cultural references, idioms, and expressions that may not have direct equivalents in English. Translators need to consider the cultural context and find appropriate ways to convey the intended meaning without losing the essence of the original text.3. Technical terminology: Reference literature covers a wide range of disciplines, and each field has its specific terminology. Translators need to be well-versed in both the source and target languages' technical vocabulary to ensure accurate and precise translations.Importance of accurate and culturally sensitive translations:Accurate and culturally sensitive translations of Chinese reference literature into English are crucial for several reasons:1. Global academic exchange: English is the lingua franca of academia, and translating Chinese reference literature into English allows researchers, scholars, and students from all around the world to access and contribute to Chinese researchand knowledge.2. Enhancing cross-cultural understanding: Through translation, cultural barriers can be overcome, leading to a better understanding of Chinese culture, history, and society. It promotes dialogue and fosters mutual respect between different cultures.3. Facilitating international collaboration: Accurate translations enable international collaborations and joint research efforts between Chinese and English-speaking researchers, leading to advancements in various fields and the exchange of ideas.Conclusion:The translation of Chinese reference literature into English is a challenging but essential task. It not only facilitates global academic exchange but also promotescross-cultural understanding and collaboration. Translators play a crucial role in bridging the linguistic and cultural gaps, ensuring that the essence and knowledge contained in Chinese reference literature are accurately conveyed toEnglish-speaking audiences.。

医学文献翻译(中英对照)

医学文献翻译(中英对照)

Current usage of three-dimensional computed tomography angiography for the diagnosis and treatment of ruptured cerebral aneurysmsKenichi Amagasaki MD, Nobuyasu Takeuchi MD, Takashi Sato MD, Toshiyuki Kakizawa MD, Tsuneo Shimizu MDKanto Neurosurgical Hospital, Kumagaya, Saitama, JapanSummary Our previous study suggested that 3D-CT angiography could replace digital subtraction (DS) angiography in most cases of ruptured cerebral aneurysms, especially in the anterior circulation. This study reviewed our further experience. One hundred and fifty patients with ruptured cerebral aneurysms were treated between November 1998 and March 2002. Only 3D-CT angiography was used for the preoperative work-up study in patients with anterior circulation aneurysms, unless the attending neurosurgeons agreed that DS angiography was required.Both 3D-CT angiography and DS angiography were performed in patients with posterior circulation aneurysms, except for recent cases that were possibly treated with 3D-CT angiography alone. One hundred sixteen (84%) of 138 patients with ruptured anterior circulation aneurysms underwent surgical treatment, but additional DS angiography was required in 22 cases (16%).Only two recent patients were treated surgically with 3D-CT angiography alone in 12 patients with posterior circulation aneurysms. Most patients with ruptured anterior circulation aneurysms could be treated successfully after 3D-CT angiography alone. However, additional DS angiography is still necessary in atypical cases. 3D-CT angiography may be limited to complementary use in patients with ruptured posterior circulation aneurysms.a 2003 Elsevier Ltd. All rights reserved.Keywords: 3D-CT angiography, cerebral aneurysm, subarachnoid haemorrhage, surgeryINTRODUCTIONRecently, three-dimensional computed tomography (3D-CT) angiography has become one of the major tools for the identification of cerebral aneurysms because it is faster, less invasive, and more convenient than cerebral angiography.1–7 Patients with rupturedaneurysms could be treated under diagnoses based on only 3D-CTangiography.5;6 3D-CT angiography has some limitations for thepreoperative work-up for ruptured cerebral aneurysms, so additionaldigital subtraction (DS) angiography is still necessary, especiallyfor aneurysms in the posterior circulation.8 Our previousstudy suggested that 3D-CTangiography could replace DS angiographyin most patients with ruptured cerebral aneurysms in theanterior circulation.1 This study reviewed our experience oftreating ruptured cerebral aneurysms in the anterior and posteriorcirculations based on 3D-CT angiography in 150 consecutivepatients to assess the current usage of 3D-CT angiography.METHODS AND MATERIALPatient populationWe treated 150 patients, 60 men and 90 women aged from 23 to80 years (mean 57.5 years), with ruptured cerebral aneurysmidentified by 3D-CT angiography between November 1998 andMarch 2002.Managementof casesThe presence of nontraumatic subarachnoid haemorrhage (SAH)was confirmed by CT or lumbar puncture findings of xanthochromiccerebrospinal fluid. 3D-CT angiography was performedroutinely in all patients. DS angiography was performed in patientswith anterior circulation aneurysms only if additional informationwas considered necessary following a consensusinterpretation of the initial CT and 3D-CT angiography by fourneurosurgeons. Patients with ruptured aneurysms in the posteriorcirculation underwent both 3D-CTangiography and DS angiographyexcept for two recent patients with typical vertebral arteryposteriorinferior cerebellar artery (VA-PICA) aneurysm.Typical saccular aneurysms were treated by clipping surgery. Fusiform and dissecting aneurysms were treated by proximal occlusionby either surgery or endovascular treatment with orwithout bypass surgery. Regrowth of bleeding aneurysms wastreated by either surgery or endovascular treatment. Postoperatively,all patients were managed with aggressive prevention andtreatment of vasospasm including intra-arterial infusion of papaverineor transluminal angioplasty.3D-CT angiography acquisition and postprocessingCT angiography was performed with a spiral CT scanner (CT-W3000 AD; Hitachi, Ibaraki, Japan). Acquisition used a standardtechnique starting at the foramen magnum, with injection of130 ml of nonionic contrast material (Omnipaque; Daiichi Pharmaceutical,Tokyo, Japan). The source images of each scan weretransferred to an off-line computer workstation (VIP station;Teijin System Technology, Japan). Bothvolume-rendered imagesand maximum intensity projection images of the cerebral arterieswere constructed. The anterior circulation and posterior circulationwere evaluatedseparately on the volume-rendered images,after a general superior view was obtained. The anterior circulationwas evaluated by first observing the anterior communicatingartery (ACoA) by rotating the view, and then each side of thecarotid system by rotating the image with editing out of thecontralateral carotid artery. The posterior circulation was alsoevaluated by rotating the image but without editing out of anyvessel. Once a possible rupture site was found, the view waszoomed and closely rotated with the other vessels edited out. Theaneurysm size was measured on 3D-CT angiography as the largerof the length of the dome or the width of the neck. Manipulationwas performed by the scanner technician, with a neurosurgeon toprovide editing assistance.DS angiography acquisitionStandard selective three- or four-vessel DS angiograms withfrontal, lateral, and oblique projections were obtained. The 3D-CTangiogram was always available as a guide for possible additionalDS angiography projections. Aneurysm size was measured withDS angiography when the quality of 3D-CT angiography wasinadequate. All patients except elderly patients or patients in severecondition underwent DS angiography postoperatively.Grading of patientsThe clinical conditions of the patients at admission were classifiedaccording to the Hunt and Kosnik grade.9 Clinical outcome wasdetermined at 3 months according to the Glasgow OutcomeScale.10RESULTSThe aneurysm locations and sizes are shown in Table 1. Onehundred sixteen (84%) of 138 cases of aneurysms in the anteriorcirculation were treated after only 3D-CT angiography, and 22cases (16%) required additional DS angiography. Ten of 12 casesof aneurysms in the posterior circulation required both 3D-CTangiography and DS angiography, but two recent cases of typicalVA-PICA aneurysm were clipped after only 3D-CT angiography(Fig. 1). The first 10 of the 22 cases in the anterior circulation,which required additional DS angiography were described previously,1 so the most recent 12 patients are listed in Table 2.These recent cases included some atypical aneurysms. Cases 6and 8 had a fusiform aneurysm of the internal carotid artery (ICA).Additional DS angiography was performed to obtain haemodynamicinformation. ICA trapping with superficial temporal artery-middle cerebral arteryanastomosis was performed in Case 6because the atherosclerotic arteries failed to demonstrate theballoon occlusion test (Fig.2). ICA occlusion by endovasculartreatment was performed in Case 8 because the patient couldtolerate the balloon occlusion test. Cases 4, 9, and 10 sufferedregrowth of bleeding aneurysms after clipping surgery. Clip artifactsprevented evaluation of the ruptured site as well as identificationof de novo aneurysms in these cases (Fig. 3). Surgicalclipping was performed in Cases 4 and 10 and endovasculartreatment in Case 9. Case 11 had an ACoA aneurysm associatedwith an arteriovenous malformation (AVM) (Fig. 4). DS angiographywas performed to evaluate the AVM. Case 12 had a largeICA-posterior communicating artery (PCoA) aneurysm, and additionalDS angiography was performed because the PCoA couldnot be detected by 3D-CT angiography (Fig. 5). Cases 1, 2, 3, 5,and 7 presented with small aneurysms, and DS angiography wasperformed to exclude other lesions as well as to obtain informationabout the proximal ICA for patients with supraclinoid type aneurysms.Table 1 Distribution and size of cerebral aneurysms in 150 consecutivepatientsSiteNo. of patientsAnterior circulation 138ICA (supraclinoid) 3ICA bifurcation 1ICA-OphA 3ICA-PCoA 39 (1)ICA fusiform 2ACoA 50Distal ACA 4MCA 36 (1)Posterior circulation 12PCA1BA tip 3BA-SCA 1BA trunk 1 (1)VA-PICA 3VA dissecting3 (1)Size (mm)<5 42P5 to <12 99P12 9Number in parentheses indicates patients who underwent endovasculartreatment.OphA, ophthalmic artery; ACA, anterior cerebral artery; MCA, middle cerebralartery; PCA, posterior cerebral artery; BA, basilar artery; SCA, superiorcerebellar artery.Table 2 Twelve patients with ruptured anterior circulation aneurysms whounderwent additional DS angiographyCase No. Location Size (mm)1 lt. ICA-PCoA 3.12 ACoA 2.23 lt. ICA supraclinoid 1.64 lt. ICA-PCoA 7.85 lt. ICA supraclinoid 2.46 lt. ICA (fusiform) 11.87 lt. ICA-PCoA 3.28 rt. ICA (fusiform) 18.89 lt. MCA 9.610 lt. ICA-PCoA 10.511ACoA 10.112 lt. ICA-PCoA 18.2The surgical findings correlated well with the 3D-CTangiographyor DS angiography. Table 3 shows the condition on admissionand outcome at 3 months after surgery. Some patientswith good grades on admission died of severe spasm, acute brainswelling, or poor general condition, but these outcomes were notrelated to the preoperative radiological information.DISCUSSIONThe present study of ruptured aneurysms in both anterior andposterior circulations found that the indications for additional DSangiography in the anterior circulation are similar to that foundpreviously, but we experienced some new atypical cases. Treatmentof fusiform aneurysms depends on the haemodynamic information,which could only be obtained by DS angiography. ACoA aneurysm associated with AVM, although the initial CTindicated that the aneurysm had bled, required accurate evaluationof the AVM prior to surgery. Clip artifacts affected 3D-CT angiographyin cases of recurrent SAH after clipping surgery, so 3DCTangiography is not indicated for such cases.3D-CT angiography was only of complementary use in most ofthe 12 cases of posterior circulation aneurysms. Only two cases oftypical VA-PICA aneurysms were treated based on only3D-CTangiography. Typical basilar artery-superior cerebellar artery andVA-PICA aneurysms can be treated surgically after only 3D-CTangiography. DS angiography should always be performed forbasilar tip aneurysms to evaluate the perforating arteries nearby aswell as assess the vessel tortuosity for the possibility of endovasculartreatment. Treatment of VA dissecting aneurysms needsinformation about the true and false lumens of the VA whichrequires DS angiography. The small population of posterior circulationaneurysms in this study indicates that the variation ofaneurysms as well as the treatment choices in the posterior circulationrequire DS angiography in most cases.In our series, most aneurysms measured 5–12 mm, and typicalsaccular aneurysms of that size could be treated after 3D-CTangiography. However, there were problems with some largeaneurysms. DS angiography was not necessary if the neck andnearby arteries of a large aneurysm were clearly detected. DSangiography was necessary in two cases of large aneurysms. Acase of large ophthalmic artery aneurysm was located close to theanterior clinoid process.1 Small PCoA aneurysms may not bedetected by 3D-CT angiography, but the artery would not bedifficult to observe during the operation. In our case of alargePCoA aneurysm, DS angiography was performed because thelarge neck would prevent intraoperative observation of the PCoA.Although not experienced in our series, treatment including bypasssurgery for some large or giant aneurysms will require thehaemodynamic information provided by DS angiography.Some small aneurysms (less than 4 mm) required additionalDS angiography. 3D-CT angiography may be better for detectingsmall aneurysm than DS angiography.11;12 However, we suggestDS angiography is still necessary in the following cases. Firstly,compatibility of the initial CT scan and aneurysm location by 3DCTangiography is important. Patients with ruptured aneurysmand asymmetrical SAH with laterality compatible with the rupturesite present no problem. However, we cannot always depend onthe initial CT scans if the SAH is diffuse or symmetrical, especiallyif ACoA aneurysm or basilar tip aneurysm is not found theresponsible lesion. DS angiography is more useful to excludeother lesions because of the smooth opacification of the vessels.Secondly, cases with small aneurysm located on the supraclinoidportion require proximal ICA control during the operation. DSangiography is necessary to provide informationabout the haemodynamicsincluding the cross circulation. Magnetic resonance (MR) angiography is potentially the onlymodality required for preoperative assessment of ruptured cerebralaneurysms.13 However, MR imaging is time-consuming and accessto MR scanners may be restricted. Patients could be in anunstable condition in the very early period of SAH, so that theemergent condition of the patients could be much easier to managein the CT facility. On the other hand, MR angiography doesreduce the use of contrast medium, so is a safe diagnostic tool.MR angiography may be the best modality for diagnosis in patientswith good grade presenting several days after the onset,because the risk of rerupture falls with time.3D-CT angiography has been used to analyze the anatomicalstructures for surgery.14;15 Information about the venous and arterialstructures near the aneurysm are preferable, but do not always reflectthe findings of DS angiography. Normal anatomical structures, suchas perforating arteries and veins, are likely to be encountered duringsurgery although not detected clearly by 3D-CT angiography.This study of the overall management of ruptured cerebralaneurysms with 3D-CT angiography and additional DSangiographyindicates that more patients with anterior circulation aneurysmswill be treated after only 3D-CT angiography except for thefollowing cases requiring additional DS angiography: Aneurysmsclose to bone structures, such as an ICA-ophthalmic arteryaneurysm; fusiform aneurysms, and large or giant aneurysmsrequiring accurate neck information and haemodynamic informationfor bypass surgery; patients with discrepancies between thedistribution of SAH on CT and the location of the aneurysm, especiallysmall aneurysms, to exclude other lesions; small aneurysmslocated on the supraclinoid portion of ICA, which require informationabout haemodynamics and proximal ICA control; regrowthof aneurysms that leads clip artifacts; and aneurysms associatedwith AVM in related locations. A clear conclusion about patientswith posterior circulation aneurysms cannot be reached because ofthe small population. Typical basilar artery-superior cerebellar arteryand VA-PICA aneurysms can be treated surgically after only3D-CT angiography, but 3D-CT angiography may be limited tocomplementary use for basilar tip aneurysms and other posteriorcirculation aneurysms because of the need for close observation ofnearby perforating arteries and the possibility of endovasculartreatment. Dissecting aneurysm,which is often observed in the VA,requires DS angiography to detect true and false lumens.REFERENCES1. Amagasaki K, Sato T, Kakizawa T, Shimizu T. Treatment of ruptured anteriorcirculation aneurysm based on computerized tomography angiography: surgicalresults and indications for additional digital subtraction angiography. J ClinNeurosci 2002; 9: 22–29.2. Anderson GB, SteinkeDE, Petruk KC, Ashforth R, Findlay JM. Computedtomographic angiography versus digital subtraction angiography for thediagnosis and early treatment of ruptured intracranial aneurysms. Neurosurgery1999; 45: 1315–1322.3. Hsiang JN, Liang EY, Lam JM, Zhu XL, Poon WS. The role of computedtomographic angiography in the diagnosis of intracranial aneurysms andemergent aneurysm clipping. Neurosurgery 1996; 38: 481–487.4. Lenhart M, Bretschneider T, Gmeinwieser J, Ullrich OW, Schlaier J, FeuerbachS. Cerebral CT angiography in the diagnosis of acute subarachnoid hemorrhage.Acta Radiol 1997; 38: 791–796.5. Matsumoto M, Sato M, Nakano M et al. Three-dimensional computerizedtomography angiography-guided surgery of acutely6. Velthuis BK, Van Leeuwen MS, Witkamp TD, Ramos LM, Van Der SprenkelJW, Rinkel GJ. Computerized tomography angiography in patients withsubarachnoid hemorrhage: from aneurysm detection to treatment withoutconventional angiography. J Neurosurg 1999; 91: 761–767.7. Zouaoui A, Sahel M, Marro B et al. Three-dimensional computed tomographicangiography in detection of cerebral aneurysms in acute subarachnoidhemorrhage. Neurosurgery 1997; 41: 125–130.8. Carvi y Nievas MN, Haas E, Hollerhage HG, Drathen C. Complementary use ofcomputed tomographic angiography in treatment planning for posterior fossasubarachnoid hemorrhage. Neurosurgery 2002; 50: 1283–1289.9. Hunt WE, Kosnik EJ. Timing and perioperative care in intracranial aneurysmsurgery. Clin Neurosurg 1974; 21: 78–79.10. Jennett B, Bond M. Assessment of outcome after severe brain ncet 1975; 1: 480–484.11. Hashimoto H, Iida J, Hironaka Y, Okada M, Sakaki T. Use of spiralcomputerized tomography angiography in patients with subarachnoidhemorrhage in whom subtraction angiography did not12. Takabatake Y, Uno E, Wakamatsu K et al. Thethree-dimensional CTangiography findings of ruptured aneurysms hardly detectable by repeatedcerebral angiography. No Shinkei Geka 2000; 28: 237–243 (Jpn).13. Watanabe Z, Kikuchi Y, Izaki K, Watanabe K et al. The usefulness of 3D MRangiography in surgery for ruptured cerebral aneurysms. Surg Neurol 2001; 55:359–364.14. Kaminogo M, Hayashi H, Ishimaru Het al. Depicting cerebral veins bythree-dimensional CT angiography before surgical clipping of aneurysms.AJNR Am J Neuroradiol 2002; 23: 85–91.15. Velthuis BK, van Leeuwen MS, Witkamp TD, Ramos LM, van der SprenkelJW, Rinkel GJ. Surgical anatomy of the cerebral arteries in patients withsubarachnoid hemorrhage: comparison of computerized tomographyangiography and digital subtraction angiography. J Neurosurg 2001;95: 206–212.三维CT血管造影对破裂脑动脉瘤的诊断和治疗的当前应用Kenichi Amagasaki MD, Nobuyasu Takeuchi MD, Takashi Sato MD,Toshiyuki Kakizawa MD, Tsuneo Shimizu MDKanto Neurosurgical Hospital, Kumagaya, Saitama, Japan摘要我们以往的研究表明,3D-CT血管造影破裂脑动脉瘤大多数情况下,可以取代(DS)的数字减影造影,尤其是前循环的动脉瘤。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

多摘要—我们介绍多信源汉明码(HCMSs)作为一个潜在的解决方案,完美的斯莱皮恩-沃尔夫(SW)编码为任意数量的终端。

而且,我们详细的研究了三种信源的例子。

我们提出了一个完美的SW码的必要条件,并标明存在着无限多的HCMSs。

此外,我们表明,对完美的SW码足够长的码长,不同来源的压缩率可以灵活的权衡。

索引术语—斯莱皮恩-沃尔夫编码,分布式信源编码,完美的代码,汉明码I.介绍SW编码是指相关来源的无损分布式压缩。

考虑s个相关来源,X1,X2···Xs。

假设编码只能单独地预形成s个编码器可以看到唯一的s 个信源之一,但压缩的信源和解压的信源联合传送到基站。

令许多他们那个时代的研究人员惊讶的是,斯莱皮恩和沃尔夫表明,在这个对应的情况下[1]和速率没有损失是有可能的。

也就是说,至少在理论上,它有可能在基站无损地恢复信源即使和速率略高于联合熵H(X1,X2···Xs)。

怀纳是第一个意识到以计算校验子作为压缩信源,信道编码能够用于实现SW编码[2]。

这个方法在二十多年以后被普拉丹等重新发现,推广[3]。

实际的以校验子为基础的方案,使用信道编码的SW编码,然后研究[4]—[15]。

然而,大部分的工作仅对应于两种信源的讨论[3]、[16]—[19]除了少数例外[4]、[20]、[21]。

在[21]中,我们描述了一个基于SW 码的广义校验子和扩展包装界限的概念,以及一个完美的码字从有规律的信道编码到具有任意数量信源的SW 编码,当一个例子使得基于被描述[4],[16]的(7,4)汉明码的两个信源的SW 码完美时,这还不清楚一个完美的SW 码有两个以上的信源曾经存在。

此外,虽然有提出一个完美的非不对称的SW 码可以由一个适合于两种信源[4,[16]的完美的不对称的SW 码构建,但尚不清楚这同样适用于两种以上信源的SW 编码。

在本文中,我们表明汉明码可以用来构建完美的SW 码字适于任意数量的信源。

我们成所产生的码为多信源汉明码(HCMSs )。

特别是,我们详细地讨论三个信源的HCMS 。

我们获得了一个完美的SW 码所需的必要条件并表明存在三信源的HCMS 。

更确切地说,HCMS 码存在长度为n 的信源,其中122-=an 和3≥a 。

此外,我们表明对于具有足够长码长的SW ,不同信源的压缩率可以灵活地权衡。

粗略地讲,一个完美的不对称的SW 码的存在将意味着一个完美的非不对称的SW 码的存在,反之亦然。

本文一个有趣的贡献是明确地显示适于三个信源的完美SW 码的一类的存在。

看来,多于两个信源的完美SW 码还没有过文献报道。

本文组织如下。

在下一节,我们将将给出一个基于多信源SW 编码的校验子的一般性定义。

在第三节,我们将提出一个重要的引理,这个引理被用于其它的论文中。

HCMS 主要的结果在第四节中给出。

在第五节中,详细讨论适于三个信源的HCMS 。

完美码的必要条件将会给出,适于三个信源的HCMS 的存在也将会呈现。

II.基于SW 编码的广义校验子我们将以一个基于多信源[21]SW 码的校验子的一般定义开始。

定义1(基于SW 码的校验子)。

一种基于适于s 个相关长度为n 的信源的SW 码的速率()r rr s ,...,,21校验子包含s 个大小分别为n m ⨯1,n m ⨯2,···,n m ⨯s的编码矩阵H1,H 2,···,H S 。

其中n m r i i =,i =1,2,···,s 。

·编码:第i th个编码器压缩长度-n 输入x i 到中x H y i i i =并将其压缩的m i 位(压缩率n m r i i =)发送到基站。

·解码:当收到所有y i 时,基站解码所有的信源,通过输出一个最可能的x ˆ1,x ˆ2,···,x s ˆ,满足y xH i i i =ˆ,i =1,2,···,s 。

如果S 中的任意源元组可以无损地重构,我们会说一套s-终端源元组S 通过SW 码变成可压缩的。

另外,我们说的SW 码可以压缩S 。

显然,一个SW 码可以压缩S 当且仅当其编码映射对应到S 是单射的(或1对1的)。

例如在同一时间,当来自不同终端的所有源比特相同时,我们称不同源之间的相关性为0型相关,在一般情况下,如果所有源比特中除了t 比特之外其它都一样我们称相关性为t 型相关。

对于高度相关的源,我们认为最有可能的源是那些在所有时间n 的情况都是0型相关,其次最有可能的源是那些有1n -个0型相关和1个1型相关的情况。

我们称这些源为长度为n 的s-终端汉明源。

设S 是包含所有长度为n 的s-终端汉明源的集合。

通过简单的计算,集合S 的大小为()21nn s +',其中当2s >时s s =',当2=s 时1='s [21]。

因此,若S 可以通过一个SW 码与表示所有压缩输出的集合C 压缩,我们由()21n n s C +'≥给出一个包装界限。

如果包装界限中的等式成立(即()21n n s C +'=),我们称这种码为完美码。

完美的概念可以推广到任意利益的集合S 以致于当且仅当S C =时一个码是完美的。

换句话说,对应到S 的编码映射是满射(单射也因为S 是可压缩的)。

III.零空间移位对于本文的其余部分包含所有长度为n 的s-终端汉明源集合表示S ,注意到,如果H 1,H 2,···,H S 可以压缩S ,H 1,H 2,···,HS的零空间的交集应只包含所有的零向量。

否则,让x 归属于交集,因此s-元组 ( s x x ,...,)∈S 将有与s 0,...,0S ∈同样的校验子(所有零校验子)这与假设H 1,H 2,···,H S 可以压缩S 相矛盾。

现在,我们引入一个重要的引理,为我们今后的讨论提供了一个功能强大的工具。

简而言之,引理告诉我们,通过将一个编码矩阵的零空间的一部分转移到另一个编码矩阵来权衡不同信源元组的压缩率。

引理1.假设H 1,H 2,···,H S 可以压缩S 且空(H i )=N iK ⊕对所有的i 但不是一个空(H r )=N r 的r ,然后矩阵H '1,···,H s'对所有的i 但不是一个空(H d )=N d 的d 有空(H i ')=N K i ⊕也可以压缩S 。

此外,如果所有的H j '是映射的且(H 1,···,H S )是一个完美的压缩,即若对应到S 的(H 1,···,H S )是双射的,那么(H '1,···,H s ')也是一个完美的压缩。

在证明之前,首先我们注意到的是{}0=K N r 。

否则,H 1,···,HS有共同的非零空矢量,此向量与通过码字被压缩的S 相矛盾。

所以N i K ⊕的记法是有道理的。

证明:如果d r =我们没有什么可以证明。

对于d r ≠,不是一般性我们可以简单地赋以2r =且1=d 。

定义S +为S +S ={}S s s s s ∈+2121,|,注意到:1)(H '1,···,H s ')对应到S 是1—1对应⇔如果()S +∈m m s,...,1且()()0,...,0,...,11=''m H m H s s ,那么()()0,...,0,...,1=m m s 。

所以使()S +∈m m s ,...,1且()()0,...,0,...,11=''m H m H s s 。

通过核对H j '的零空间,我们得到n k m n k m n m i i i +=+==,,22211,其中N n j j ∈且{}K k k ⊂21,。

因此,k n k m 2121+=+,n k m 222=+且n k k k m i i i ++=+22,通过核对H i 的零空间我们发现()m m s ,...,1+()k k 22,...,∈(零H 1,···,零H s )。

由于()k k 22,...,有所有的0相关,()m m s ,...,1+()k k 22,...,也属于S +。

因为对应到S 的(H 1,···,H S )是单射的,通过1),对所有j 我们有k m j 2=。

特别的,n k m 121==表明了{}012=∈K N k 。

也就是说,对于所有的j有02=k 且0=m j 再次由1)得对应到S 的(H '1,···,H s ')是单射的。

对于第二部分,现在对应到S 的(H 1,···,H S )也是满射的,因此每一个(H 1,···,H S )本身也是满射的。

因此,所有的H j 是满秩矩阵。

这意味着所有的H j '也必须是满秩的。

此外,如果所有的H j'是满秩的,目标空间(H '1,···,H s ')=∑=-sj ns 1零()H j'∑=-sj ns 1零H j 的维数等于目标空间(H 1,···,H S )的维数。

由于对应到S 的(H 1,···,H S )是双射的,目标空间(H 1,···,H S )(因此,同样(H '1,···,H s '))的维数是S 。

由于对应到S 的(H '1,···,H s ')已经被证明是双射的,所以它必须也是双射的。

IV.多元汉明编码记m m m s M +++=...21为压缩比特的总数。

那么,我们有2M C =,从而当2>s 时,完美压缩的方程变为()221Mnsn =+。

(1) 由于()21n M sn -=+,显然s 不能为偶数。

另一方面,有费马的Little 定理我们得到对于每一个1>s 的奇素数有()()s s mod 121-=,这对(1)给出了一个无限多的解决方案。

相关文档
最新文档