Horizontal and Vertical Side-Channel Attacks
剑11神经美学
READING PASSAGE 3You should spend about 20 minutes on Questions 27-40, which are based on Reading Passage 3 below.NeuroaestheticsAn emerging discipline called neuroaesthetics is seeking to bring scientific objectivity to the study of art, and has already given us a better understanding of many masterpieces. The blurred imagery of Impressionist paintings seems to stimulate the brain’s amygdala, for instance. Since the amygdala plays a crucial role in our feelings, that finding might explain why many people find these pieces so moving.Could the same approach also shed light on abstract twentieth-century pieces, from Mondrian’s geometrical blocks of colour, to Pollock’s seeming ly haphazard arrangements of splashed paint on canvas? Sceptics believe that people claim to like such works simply because they are famous. We certainly do have an inclination to follow the crowd. When asked to make simple perceptual decisions such as matching a shape to its rotated image, for example, people often choose a definitively wrong answer if they see others doing the same. It is easy to imagine that this mentality would have even more impact on a fuzzy concept like art appreciation, where there is no right or wrong answer.Angelina Hawley-Dolan, of Boston College, Massachusetts, responded to this debate by asking volunteers to view pairs of paintings — either the creations of famous abstract artists or the doodles of infants, chimps and elephants. They then had to judge which they preferred. A third of the paintings were given no captions, while many were labelled incorrectly — volunteers might think they were viewing a chimp’s messy brushstrokes when they were actually seeing an acclaimed masterpiece. In each set of trials, volunteers generally preferred the work of renowned artists, even when they believed it was by an animal or a child. It seems that the viewer can sense the artist’s vision in paintings, even if they can’t explain why.Robert Pepperell, an artist based at Cardiff University, creates ambiguous works that are neither entirely abstract nor clearly representational. In one study, Pepperell and his collaborators asked volunteers to decide how ‘powerful’ they considered an artwork to be, and whether they saw anything familiar in the piece. The longer they took to answer these questions, the more highly they rated the piece under scrutiny, and the greater their neural activity. It would seem thatthe brain sees these images as puzzles, and the harder it is to decipher the meaning, the more rewarding is the moment of recognition.And what about artists such as Mondrian, whose paintings consist exclusively of horizontal and vertical lines encasing blocks of colour? Mondrian’s works ar e deceptively simple, buteye-tracking studies confirm that they are meticulously composed, and that simply rotating a piece radically changes the way we view it. With the originals, volunteers’ eyes tended to stay longer on certain places in the image, but with the altered versions they would flit across a piece more rapidly. As a result, the volunteers considered the altered versions less pleasurable when they later rated the work.In a similar study, Oshin Vartanian of Toronto University asked volunteers to compare original paintings with ones which he had altered by moving objects around within the frame. He found that almost everyone preferred the original, whether it was a Van Gogh still life or an abstract by Miro. Vartanian also found that changing the composition of the paintings reduced activation in those brain areas linked with meaning and interpretation.In another experiment, Alex Forsythe of the University of Liverpool analysed the visual intricacy of different pieces of art, and her results suggest that many artists use a key level of detail to please the brain. Too little and the work is boring, but too much results in a kind of‘perceptual overload’; according to Forsythe. What’s more, appealing pieces both abstract and representational, show signs of ‘fractals’ — repeated motifs recurring in different scales. Fractals are common throughout nature, for example in the shapes of mountain peaks or the branches of trees. It is possible that our visual system, which evolved in the great outdoors, finds it easier to process such patterns.It is also intriguing that the brain appears to process movement when we see a handwritten letter, as if we are replaying the writer’s moment of creation. This has led some to wonder whether Pollock’s works fe el so dynamic because the brain reconstructs the energetic actions the artist used as he painted. This may be down to our brain’s ‘mirror neurons’, which are known to mimic others’ actions. The hypothesis will need to be thoroughly tested, however. It migh t even be the case that we could use neuroaesthetic studies to understand the longevity of some pieces of artwork. While the fashions of the time might shape what is currently popular, works that are best adapted to our visual system may be the most likely to linger once the trends of previous generations have been forgotten.It’s still early days for the field of neuroaesthetics — and these studies are probably only a taste of what is to come. It would, however, be foolish to reduce art appreciation to a set of scientific laws. We shouldn’t underestimate the importance of the style of a particular artist, their place in history and the artistic environment of their time. Abstract art offers both a challenge and the freedom to play with different interpretat ions. In some ways, it’s not so different to science, where we are constantly looking for systems and decoding meaning so that we can view and appreciate the world in a new way.Questions 27-30 Choose the correct letter, A, B, C or D.27 In the second paragraph, the writer refers to a shape-matching test in order to illustrateA the subjective nature of art appreciation.B the reliance of modern art on abstract forms.C our tendency to be influenced by the opinions of others.D a common problem encountered when processing visual data.28 Angelina Hawley-Dolan’s findings indicate that peopleA mostly favour works of art which they know well.B hold fixed ideas about what makes a good work of art.C are often misled by their initial expectations of a work of art.D have the ability to perceive the intention behind works of art.29 Results of studies involving Robert Pepperell’s pieces suggest that peopleA can appreciate a painting without fully understanding it.B find it satisfying to work out what a painting represents.C vary widely in the time they spend looking at paintings.D generally prefer representational art to abstract art.30 What do the experiments described in the fifth paragraph suggest about the paintings ofMondrian?A They are more carefully put together than they appear.B They can be interpreted in a number of different ways.C They challenge our assumptions about shape and colour.D They are easier to appreciate than many other abstract works.Questions 31-33 Complete the summary using the list of words, A-H, below.Art and the BrainThe discipline of neuroaesthetics aims to bring scientific objectivity to the study of art. Neurological studies of the brain, for example, demonstrate the impact which Impressionist paintings have on our 31 __________. Alex Forsythe of the University of Liverpool believes many artists give their works the precise degree of 32 __________ which most appeals to the viewer’s brain. She also observes that pleasing works of art often contain certain repeated 33__________ which occur frequently in the natural world.A interpretationB complexityC emotionsD movementsE skillF layoutG concernH imagesQuestions 34-39Do the following statements agree with the views of the writer in Reading Passage 3?YES if the statement agrees with the views of the writerNO if the statement contradicts the views of the writerNOT GIVEN if there is no information on this34 Forsythe’s findings contradicted previous beliefs on the function of ‘fractals’ in art.35 Certain ideas regarding the link between ‘mirror neurons’ and art appreciation requirefurther verification.36 People’s taste in paintings depends entirely on the current artistic trends of the period.37 Scientists should seek to define the precise rules which govern people’s reacti ons to worksof art.38 Art appreciation should always involve taking into consideration the cultural context inwhich an artist worked.39 It is easier to find meaning in the field of science than in that of art.Question 40 Choose the correct letter, A, B, C or D.40 What would be the most appropriate subtitle for the article?A Some scientific insights into how the brain responds to abstract artB Recent studies focusing on the neural activity of abstract artistsC A comparison of the neurological bases of abstract and representational artD How brain research has altered public opinion about abstract art神经美学一种称为神经美学的新兴学科正试图将科学的客观性引入艺术研究,并且已经带给我们对很多名作更好的理解。
抖音里的英语句子
抖音里的英语句子导读:1、做一个简单的人,看得清世间繁杂却不在心中留下痕迹。
To be a simple person, you can see the complexity of the world without leaving traces in your heart.2、请不要在我真正离开的时候,才抓紧我的手。
Please don't hold my hand until I really leave.3、等待不可怕,可怕的是不知道什么时候是尽头。
It's not terrible to wait. It's terrible not to know when the end is.4、不要对别人轻易许诺,因为很多话,只有听的人会记得。
Don't make promises to others easily, because many words are remembered only by those who listen to them.5、当你越来越优秀的时候,才会遇见越来越好的人。
When you become better and better, you will meet better and better people.6、你所知道的不要全说,你所听到的不要全信。
Don't say everything you know, don't believe everything you hear.7、不管明天多遥远,不管信念曾改变,相爱的心,会陪你勇敢。
No matter how far tomorrow is, no matter what faith haschanged, love will accompany you bravely.8、风雅,就是发现存在的美,感觉已经发现的美。
Elegance is to discover the beauty of being and feel the beauty that has been found.9、好像突然有了铠甲,也突然有了软肋。
离心风机布置标准
1401 North Plano Road, Richardson, Texas 75081Phone: 972-234-3202Fax: 972-497-0468AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor PositionDrive ArrangementsAMCA Standards 99-2404-03, 99-2410-03 (see pages 2,3 and 7). These pages illustrate the usual fan arrangements with their proper numbers. When ordering fans, or when requesting data or prices, the required fan arrangement MUST always be indicated.Inlet Box Positions For Centrifugal FansStandard 99-2405-03 (see page 4 and 8). This page shows proper designations for inlet box positions, in degrees. When ordering fans with inlet boxes this information is required.Designations For Rotation & Discharge Of Centrifugal FansAMCA Standard 99-2406-03 (see page 5). Proper terminology is clearly indicated on this page. When ordering equipment, or when requesting certified prints,always be sure to include this information. No order will begin fabrication without it, if in doubt as to proper designation, draw a sketch. In the event that an angular discharge is required that is NOT at 45º, be sure to clearly state what is required, such as “top angular down 30º from horizontal” or “bottom angular up 20º from horizontal.” Here again, draw a sketch if in doubt.Motor Positions For Belt Drive Centrifugal FansAMCA Standard 99-2407-03 (see page 6). This page indicates standard nomenclature for properly locating the motor in reference to the drive side of the fan. It is fully accepted by the industry and vibration base manufacturers as well. If a bare fan without motor or drive is ordered this information is not needed; but whenever a drive or vibration base is to be included this information is absolutely necessary. Please note that motor position is always determined from the drive side of the fan, and has no reference whatsoever to fan rotation or discharge.Printed in the USA Jan 2005ED 16002Data contained in this issue should be thoroughly understood, as it is important in properly choosing, applying, pricing and ordering centrifugal and axial fans of all types. The terminology contained is a standard with the Air Movement and Control Association (AMCA) and has been adapted by the industry as a whole. It should be a part of your everyday language when considering fans.Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position2PENNBARRY1401 North Plano Road, Richardson, Texas 75081Phone: 972-234-3202Fax: 972-497-0468Drive Arrangements For Centrifugal Fans AMCA Standard 99-2404-03NOTES:SW - Single Width DW - Double Width SI - Single InletDI - Double InletArrangements 1, 3, 7 and 8 are also available with bearingsmounted on pedestals or base set independent of the fan housing.For designation of rotation and discharge, see page 5.For motor position, belt or chain drive, see page 6.For designation of position of inlet boxes, see page 4.ARR. 1 SWSI - For belt drive or direct connection. ImpellerARR. 3 DWDI - For belt drive or direct connection. One bearing on each side and supported by fan housing.ARR. 7 DWDI - For belt drive or direct connection. Arrangement 3plus base for prime mover.ARR. 10 SWSI - For belt drive.Impeller overhung, two bearings,with prime mover inside base.ARR. 3 SWSI - For belt drive or direct connection. One bearing on each side and supported by fan housing.ARR. 7 SWSI - For belt drive or direct connection. Arrangement 3plus base for prime mover.ARR. 9 SWSI - For belt drive.Impeller overhung, two bearings,with prime mover outside base.direct connection. Impeller overhung. Bearings in bracket supported by fan housing.ARR. 4 SWSI - For direct drive.Impeller overhung on prime mover shaft. No bearings on fan. Prime mover base mounted or integrally directly connected.ARR. 8 SWSI - For belt drive or direct connection. Arrangement 1 plusextended base for prime mover.Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position PENNBARRY 31401 North Plano Road, Richardson, Texas 75081Phone: 972-234-3202Fax: 972-497-0468Drive Arrangements For Centrifugal Fans AMCA Standard 99-2404-03NOTES:SW - Single Width DW - Double Width SI - Single InletDI - Double InletFor designation of rotation and discharge, see page 5.For motor position, belt or chain drive, see page 6.For designation of position of inlet boxes, see page 4.ARR. 1 SWSI With Inlet Box - For belt drive or direct connection. Impeller overhung, two bearings on base. Inlet box may be self-supporting.ARR. 3 SWSI With Inlet Box and Independent Pedestals - For belt drive or direct connection fan.Housing is self-supporting. One bearing on each side supported by independent pedestals with shaftextending through inlet box.ARR. 3 SWSI With Independent Pedestal - For belt drive or direct connection fan. Housing is self-supporting. One bearing on each sidesupported by independent pedestals.ARR. 3 DWDI With Independent Pedestal - For belt drive or direct connection fan. Housing is self-supporting. One bearing on each sidesupported by independent pedestals.ARR. 8 SWSI With Inlet Box - For belt drive or direct connection.Impeller overhung, two bearings on base plus extended base for prime mover. Inlet box may be self-supporting.ARR. 3 DWDI With Inlet Box and Independent Pedestals - For belt drive or direct connection fan.Housing is self-supporting. One bearing on each side supported by independent pedestals with shaftextending through inlet box.Inlet Box PositionsFor Centrifugal FansAMCA Standard 99-2405-83NOTES:1.Reference line is the top vertical axis through center of fan shaft.2.Position of inlet box and air entry to inlet box in determined from DRIVE SIDE OF FAN.3.Position on inlet box is designated in degrees clockwise from top vertical axis as shown,and may be any intermediate angle as required.4.Positions 135° to 225° in some cases interfere with floor structure.Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position4PENNBARRY 1401 North Plano Road, Richardson, Texas 75081 Phone: 972-234-3202Fax: 972-497-0468Designations For Rotation & Discharge Of Centrifugal Fans AMCA Standard 99-2406-03Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position PENNBARRY 51401 North Plano Road, Richardson, Texas 75081Phone: 972-234-3202Fax: 972-497-0468NOTES:1.Direction of rotation is determined from drive side of fan (see Note 2 and 3).2.On single inlet fans, drive side is always considered as the side opposite fan inlet (even when driven through fan inlet).3.On double inlet fans with drives on both sides, drive side is that with the higher powered drive unit.4.Direction of discharge is determined in accordance with diagrams. Angle of discharge is referred to the vertical axis of fanand designated in degrees from such standard reference axis. Angle of discharge may be any intermediate angle as required.5.For fan inverted for ceiling suspension, or side wall mounting, direction of rotationand discharge is determined when fan is resting on floor.Down Blast CW 180Bottom Angular DownCW225Bottom HorizontalCW270Bottom Angular UpCW315Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position6PENNBARRY 1401 North Plano Road, Richardson, Texas 75081 Phone: 972-234-3202Fax: 972-497-0468Motor Positions For Belt Or Chain Drive Centrifugal FansAMCA Standard 99-2407-03NOTE:Location of motor is determined by facing the drive side of fan and designating the motor positions by letters W, X, Y or Z asthe case may be.Engineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position PENNBARRY 7Phone: 972-234-3202Fax: 972-497-0468Drive Arrangements For Tubular Centrifugal Fans AMCA Standard 99-2410-03ARRANGEMENT 1For belt drive. Impeller overhung on a shaft supported by bearings mounted within casing. Motor mounted independent of casing.horizontal discharge.ARRANGEMENT 4For direct drive. Impeller overhung on motor shaft. Motor supported within casing. For horizontal and vertical discharge. Duct mounting shown.ARRANGEMENT 9For belt drive. Impeller overhung on a shaft supported by bearings mounted within casing. Designed for mounting of motor on outside of casing in one of the standardEngineering Data 16002AMCA Standards On Fan Arrangements, Rotation, Discharge & Motor Position8PENNBARRY 1401 North Plano Road, Richardson, Texas 75081 Phone: 972-234-3202Fax: 972-497-0468Inlet Box Positions For Centrifugal Fans AMCA Standard 99-2405-03NOTE:All fan orientations may be horizontal or vertical.between bearings that are on integral supports.Drive through inlet.For direct connection. Impeller overhung on motor shaft.No bearings on fan. Motor on internal supports.between bearings that are on integral supports.Drive through inlet.No bearings on fan. Motor on internal supports.Motor on casing or on integral base. Drive through belt fairing.。
CommScope FiberGuide 光纤管理系统产品说明书
DATA SHEETFiberGuide ® systemHorizontal and vertical straight sections Downspouts Cut-in T transitional sectionExpandable straight sectionJunctionsSupport hardware Flex vertical kitsHorizontal and vertical elbowsCommScope’s FiberGuide ® fiber cable management system is a trough system designed to protect and route fiber-optic patch cords, multi-fiber cable assemblies, and intra-facility fiber cable (IFC) to and from fiber splice enclosures, fiber distribution frames, and fiber-optic terminal devices. The FiberGuide system is designed to ensure that a 2-inch (5-cm) minimum bend radius is maintained throughout the system. This document provides an overview of the strengths of the FiberGuide system, and key questions to ask when comparing FiberGuide to other fiber cable management systems.The FiberGuide system is available in a variety of sizes:•2x2— Ideal for smaller installations or vertical routing of a maximum of 821 2-mm patch cords. All 2x2 FiberGuide products are shipped with cover.•2x6—Designed for height-restricted environments with a maximum capacity of 2,687 2-mm patch cords. •4x4—Maximum trough capacity to support 3,509 2-mm patch cords, 4.8 lbs/ft. •4x6—Maximum trough capacity to support 5,151 2-mm patch cords, 7.1 lbs/ft. •4x12—Maximum trough capacity to support 10,080 2-mm patch cords, 14.2 lbs/ft.•4x24 —Maximum trough capacity to support 19,937 2-mm patch cords.Basic components include:The FiberGuide advantage•Easy on-site raceway reconfigurations system: Cut-in T, Express Exit™ and expandable straight section.•Guaranteed 2-in (5-cm) bend radius•Express Exit™ offerings•Covers available for each systemFollowing are a few questions to ask when comparing FiberGuide to other fiber cable management systems.Snap-Fit junction is seismic tested and certified to NEBS zone 4.Downspout dropavailable in many different sizes. No cutting of the FiberGuide system is required. Installation by simply securing an Express Exit™ to the sidewall of any FiberGuide systems.Low-profile Express Exit™ designed for low-ceiling or height-restricted environment.Resin is colored yellow or black, not painted. Scratching will not affectTechnical service support without an additional chargeCommScope offers a rich history of technical assistance and customer service. We provide global technical assistance to meet our customers’ needs and timelines. A representative is available 24/7 to assist in emergency situations concerning CommScope products.Technical Assistance Centers (TACs) are staffed throughout the world with experienced telecom engineers ready to answer any network, product, or application question. There are three Connectivity TACs for passive products—Brussels, Belgium; Minneapolis, Minnesota; and Singapore —to serve you.LET’S GET STARTED.Visit our website or contact your local CommScope representative for more information.© 2023 CommScope, Inc. All rights reserved. CommScope and the CommScope logo are registered trademarks of CommScope and/or its affiliates in the U.S. and other countries. Foradditional trademark information see https:///trademarks. All product names, trademarks and registered trademarks are property of their respective owners.。
计算机专业英语句子
1.Bad file name or command. 错误的文件名或命令。
2.Abort, Retry, Ignore? 中止,重试或取消?3.Please read the f ollowing license agreement. 请认真阅读下列授权协议书。
4.It is reco mme nded y ou exit all theother applications before continuingwiththis installation. 建议安装前先关闭其他所有的应用程序。
5.Press OK to c ontinue installation of this software. 请单击【OK】按钮继续安装。
6.Press F1 for Help. 按 F1 键请求帮助。
7.Restart your computer and f inish setup. 重启你的计算机,完成安装。
8.Write protected disk i n drive. 磁盘写保护。
9.Are yo u sure yo u wan t to c o ntin ue[Y/N]?确认继续吗?(是按Y/不是按N键)10.Not enough memory. 内存不足。
11.Set the front of your monitor to face the east if possible. 如果可能,请把您的显示器的面板朝东。
12.When cleaning the outside of your monitor and picture tube, use a damp cloth or a cloth with a recommended detergent, please. 要清洁显示器的外表和显像管,请用湿布或蘸有推荐洗涤剂的布。
13.Connect the power cord f or your monitor to t he power port o n the back ofthe monitor. 把你的显示器的电源线连接到显示器背面的电源端口。
飞机部件英语翻译对照
1 飞机及其主要部件 AIRCRAFT AND MAIN COMPONENTS飞机 aircraft, airplane1.1飞机类型 AIRCRAFT TYPE民用飞机 civil aircraft干线机 trunk aircraft, trunkliners支线机 regional aircraft, commuter商用飞机 commercial aircraft客货两用机 combination aircraft旅客机 passenger aircraft运输机 transport aircraft宽体飞机 wide fuselage aircraft窄机身飞机 narrow-bodied aircraft大型运输机 large transport aircraft货机 cargo aircraft, airfreighter, freight aircraft公务机/行政勤务飞机 business/executive aircraft, administrative aircraft 公务喷气机 business jet aircraft, corporate jet aircraft通用飞机 general-purpose aircraft私人飞机 private owner airplane适航飞机 airworthy aircraft全天候飞机 all-weather aircraft后掠翼飞机 swept back wing airplane喷气式飞机 jet airplane燃气涡轮式飞机 turbine-engine aircraft涡轮风扇式飞机 turbofan aircraft涡轮喷气式飞机 turbojet airplane 双喷气发动机飞机 twin-jet aircraft 亚音速飞机 subsonic aircraft 中程飞机 medium-range aircraft 中短程飞机 short/medium aircraft 远程飞机 long-distance aircraft 半硬壳式飞机 semimonocoque aircraft 前(后)三点飞机 aircraft with nose (tail) wheel 原型机,样机 prototype aircraft, mockup 试验型飞机 development aircraft 基本型飞机 basic aircraft 改型飞机 modified aircraft 批生产飞机mass-produced aircraft1.2 飞机主要部件及其结构AIRCRAFT MAIN COMPONENTS AND STRUCTURAL MEMBERS1.2.1 机身 FUSELAGE机体 airframe, body 机头 nose 机身 fuselage 前机身 forward fuselage 中机身 mid fuselage 中后机身 mid-aft fuselage 后机身 aft fuselage 机身下部 lower fuselage 机身中上部 mid-upper fuselage 机身上部 upper fuselage 增压机身 pressurized fuselage 机身结构 fuselage structure 机体结构 airframe structure 半硬壳式机身 semimonocoque fuselage 半硬壳式结构 semimonocoque structure 主要结构primary structure次要结构,辅助结构 secondary structure,auxiliary structure 基本结构 basic structure复合材料结构 composite material structure 胶结蜂窝结构 honeycomb bonded structure金属胶结结构 metal-to-metal adhesive bonded structure 加强结构 reinforced structure 梁肋结构 spar-and rib structure 机身蒙皮 fuselage skin隔框 bulkhead (BHD), frame 机身隔框 fuselage frame 圆形隔框circumferential frame 机身与机翼对接隔框 fuselage-wing frame 翼梁固定隔框 spar frame 前梁固定隔框 front spar frame 后梁固定隔框 rear spar frame 气密隔框 pressure bulkhead 防火隔板(墙) fire bulkhead 机身桁梁(大梁) longeron 横梁 transverse beam 纵梁 longitudinal beam 长桁 stringer,longeron 角形桁条 angle stringer “Z”型桁条 "Z"section stringer “Π”型桁条"hat-section" stringer加强桁条 heavy stringer 龙骨梁 keel beam 龙骨 keel 地板 floor panel 地板梁 floor beam 座椅滑轨 seat track 气密地板pressure floor 整流片(带,包皮)fillet机身机翼接合整流带(翼根整流带) fuselage-to-wing fillet, wing-root fillet 整流罩 fairing机身整流罩 fuselage fairing机身机翼整流罩 fuselage-to-fairing雷达天线罩 radome天线整流罩 antenna fairing搭接板 splice机身搭接板 fuselage splice纵向搭接板 longitudinal splice长桁搭接板 stringer splice加强板(双搭接板) double splice机身站位 station (STA) 站位线 station line机身横截面 fuselage cross section水平线 water line (WL)纵剖线(横向站位线) buttock line (BL)中心线 center line (CL)机身气密包线 fuselage pressure envelope分离面 break工艺分离面 production break, manufacturing break主舱地板 main deck 货舱地板 cargo deck驾驶舱地板 flight compartment floor纵向加强件 intercostal转折梁 crease beam尾锥 tailcone化纤蒙皮 chemical-milled skin 1.2.2机翼 WING ·机翼类型 WING TYPE基本翼 basic wing 中央翼 center wing 中外翼(翼)inboard wing外翼 outboard wing 翼尖 wing tip上单翼 upper-monowing 下单翼 lower-monowing上反角机翼 anhedral wing, positive dihedral wing 下反角机翼 negative dihedral wing 带盒形梁的机翼 box-spar wing 双梁式机翼 double-spar wing 整体油箱机翼 fuel-tight wing 有襟翼的机翼 flapped wing 后掠机翼 sweptback wing 前缘开缝机翼 nose-slot wing 翼梢小翼 winglets·机翼主要结构 PRIMARY WING STRUCTURE 前缘 leading edge 后缘 trailing edge 翼尖整流罩 wing-tip fairing 翼根整流带 wing-root fillet 翼根整流罩 wing-root fairing 翼梁 wing spar 盒形翼梁 box spar 前梁 front spar 后梁 rear spar 纵墙(假梁) false spar 副翼翼梁 aileron spar辅助梁 secondary spar, auxiliary spar 展向梁 spanwise beam腹板式翼梁 plated-web spar, web-type spar 整体式翼梁 one-piece spar 后缘翼梁 trailing edge beam起落架支撑梁landing gear (support) beam 机翼辅助梁(机翼纵墙) wing web (W/W) beam 翼盒 wing box 中央翼盒 center wing box 扭力盒 torsion box 机翼整体油箱 integral fuel tank 翼肋 wing rib 油箱端肋 tank end rib 加强肋 reinforced rib梁间加强肋intercostal,reinforced rib整体肋 one-piece rib 腹板 web 缘条 chord,flange 支柱,加强件 stiffener 长桁 stringer上长桁 upper stringer ER 下长桁 lower stringer 机翼蒙皮 wing skin 蒙皮壁板 skin panel 铝合金蒙皮 alumium skin 蜂窝结构蒙皮 honeycomb skin 双层蒙皮 double skin 轻合金蒙皮 light-alloy skin 抗拉蒙皮 tension skin 加强蒙皮 reinforced skin 蒙皮 inner skin 外蒙皮 outer skin 上蒙皮 upper skin 下蒙皮 lower skin 翼剖面(翼型) airfoil襟翼滑轨整流罩 flap track fairing 根部(三叉)接头 terminal fitting ·襟翼 WING FLAP 侧襟翼 inboard flaps 外侧襟翼 outer flaps 前缘襟翼 leading-edge flap 后缘襟翼 trailing-edge flap襟翼滑轨安装接头 flap track attachment fitting ·缝翼 SLAT前缘缝翼 leading-edge slat 可操纵缝翼 movable slat ·副翼 AILERON 扰流板 spoiler 减速板 airbrake 减升板 lift dumper 调整片 tab, adjustable tab 副翼调整片 aileron trim tab 铰头 hinge fitting 作动器接头 actuator fitting 1.2.3 尾翼TAIL, EMPENNAGE安定面 STABILIZER水平安定面 horizontal stabilizer水平尾翼 horizontal tail垂直安定面 vertical stabilizer垂直尾翼 vertical tail,vertical fin全动垂直尾翼 all-movable vertical tail,all-movable fin操纵面,舵面 control surface舵面锁 gust lock, control lock方向舵 rudder升降舵 elevator背鳍 dorsal fin翼尖 wing tip补偿装置 COMPENSATOR迎角补偿器 angle-of-attack compensator配平装置 trimmer调整片 trim tab, adjustable tab升降舵调整片 elevator trim tab方向舵调整片 rudder trim tab固定调整片 fixed trim tab操纵调整片 control tab方向舵操纵装置 rudder control unit偏航阻尼器 yaw damper安定面结构 STABILIZER STRUCTURE前缘 leading edge (LE) 固定前缘 fixed leading edge 可卸前缘 removable leading edge 前梁 front spar 后梁 rear spar 扭力盒 torque box 长桁 stringer 肋rib安定面配平致动螺杆 stabilizer trim jack screw配重 balance weight, counter balance, mass balance 整体壁板 intergral panel 中梁 middle spar 中央盒板 center section 外伸段 outer section 1.2.4 舱门 DOORS ·舱门 DOORS 登机门entry door旅客门 passenger door 旅客登机门 passenger entry door 驾驶舱门 crew door 货舱门 cargo door行舱门 baggage door, luggage door 应急门(出口) emergency door (exit) 服务舱门 service door 检修门 access door 厨房门 galley door 盥洗室门 lavatory door 登机梯门 airstair door 电气设备舱门 electrical door 电子设备舱门 electronics door 起落架舱门 landing gear door驾驶舱应急出口 escape hatch, overhead hatch 辅助动力装置舱门 APU(Auxiliary Power Unit) access door 电子/电气舱门 E&E compartment door 冲压空气涡轮舱门 RAT compartment door 前起落架舱门 nose landing gear door 主起落架舱门 main landing gear door ·门结构 DOOR STRUCTURE 门框 door frame, door-case 门梁 door beam 门加强肋 door stiffening rib 门上/下托架 upper/lower carriage 门的衬板 door lining 门槛 doorsill门操纵机构 door control mechanism(door operation mechanism) 手操纵 manual control 电操纵 electrical control 门手柄 door handle 门把手 door-knob 辅助手柄 assist handle 应急手柄 emergency handle 应急起动手柄 emergency trigger lever 选择手柄 selector lever 门锁 door lock 门锁闩 door latch 锁闩杆 latch rod 锁闩滚轮latch rolle门操纵杆 door control rod 门扭力管(管轴) door torque tube锁稍lock pin, latch pin, catch pin 门锁定装置(闸柄) trigger门锁杆机构 girt bar mechanism 开锁杆 open lock release rod (锁杆)啮合 engagement (锁杆)分离 detachment 手摇把 crank 推拉杆 push-pull rod 凸轮板 cam plate锁住曲柄滚轮 latching crank roller 开关曲柄推杆 cocking crank pushrod 门导轨 door track 门导轨小齿轮 door track pinion 门导轨齿条 door track rack 导轨导向滚轮 track guide roller 导向臂 guide arm 导向稍 guide pin 导向凸轮 guide cam 凸轮导轨 cam track 凸轮轴 camshaft 凸轮随动装置 cam follower摇臂 bellcrank, rocker铰链臂 hinge arm半径连杆 radius link门作动器 actuator作动器离合器 actuator clutch齿轮箱 gearbox齿条齿轮传动 rack and pinion drive角传动装置 angle drive软轴 flex shaft横传动轴 cross drive shaft门止动块 door stop门止动块接头 door stop fitting卡爪 pawl门打开定位卡销 door open detent偏心弹簧卡销 overcenter spring detent偏心衬套 eccentric bushing齿形板 serrated plate轴钩 pivot hook后部垫块 heel pad安装支架 support bracket, mounting bracket防磨板 wear plate抗剪销 shear pin门警告系统 door warning system门传感器 door sensor锁闩传感器 latch sensor门锁开关 door lock switch门位置开关 door position switch门速度限制器 door speed limiter平衡器 counterbalance减震器,缓冲器 snubber应急撤离系统 emergency evacuation system单通道撤离滑梯 single channel evacuation slide 滑梯充气瓶 slide inflation cylinder抽气管(器) aspirator护罩 shroud滑梯包装板 pack board喷射器带条 ejector strap释放钢索 release cable滑梯收进装置 slide retractor触点接头 stop fitting1.2.5 窗 WINDOWS驾驶舱窗 flight compartment (deck) windows旅客舱窗 passenger compartment (cabin) windows旅客登机门窗 passenger entry door windows服务门窗 service door windows检查/观察窗 inspection/observation windows双层玻璃窗 double-glazed window电热防冰窗 electrically antiiced window加温玻璃窗 heated windows客舱舷窗 cabin window机头窗 nose window, forward-view window后视窗 rear-view window固定客舱舷窗 fixed cabin windows滑动窗 sliding windows风挡 windshield防鸟撞风挡 withstand bird impact windshield, bird-proof windshield 防弹玻璃风挡 armor glass windshield电阻丝加热风挡 electrically heated windshield热气加温风挡 hot-air windshield双层玻璃风挡 twin-pane windshield三层风挡 tri-layer windshield多层风挡 laminated windshield金膜风挡玻璃 gold film windshield窗玻璃 windowpane强化玻璃 tempered glass外层薄强化玻璃层 outer thin-tempered glass layer 中间隔层 interlayer丙烯酸有机玻璃 arcylic glass导电涂层 conductive coating层玻璃 inner pane中层玻璃 middle pane外层玻璃 outer pane风挡雨刷 windshield wiper风挡的安装 windshield installation风挡框 windshield frame窗槛 windowsill窗帘 window curtain, curtain安装环 mounting ring丙烯酸垫圈 acrylic spacer橡胶模压密封件 rubber molded seal气动校平器 aerodynamic smoother窗加热控制 window heat control汇流条 bus bar汇流条接头 bus bar terminal电源接头 power terminal温度控制传感器 temperature control sensor温度调节器 heat controller加热元件 heating elements加温模块 heat module过热开关 overheat switch过热温度自动调节器 overheat thermostat过热指示灯 overheat indicator light备用传感器 spare sensor旅客舱窗的安装 passenger cabin window installation 窗固定接头 window retainer fitting锯齿形板 serrated plate弹簧卡子 spring clip密封隔板 seal diaphragm放密封隔板槽口 diaphragm notch密封垫环 seal spacer ring支承卡子 backup clip窗框半边槽 reveal通气孔 vent hole窗周缘密封件 peripheral seal防磨涂层 anti-fretting coating检查和观察设备 inspection and observation equipment 货舱观察窗 cargo compartment viewer宽角度观察窗 wide angle viewer1.2.6 短舱/吊挂 NACELLE/PYLON ·类型 TYPE发动机短舱 engine nacelle涡轮喷气发动机短舱 turbo-jet engine nacelle涡轮风扇发动机短舱 turbofan engine nacelle后机身发动机短舱 aft fuselage mounted engine nacelle 可卸短舱 removable nacelle ·结构 STRUCTURE进气道 air inlet风扇段舱门 fan cowl door反推力装置 thrust reverser吊挂前缘整流罩 pylon leading-edge fairing吊挂后缘整流罩 pylon trailing-edge fairing吊挂前梁 pylon front spar吊挂后梁 pylon rear spar封闭肋 closing rib辅助梁 auxiliary spar主承力结构 main frame防火墙 fire wall肋 rib整流罩 fairing腹板 web拼接板 splice plate连接条(片) connection strap加强板 doubler。
形位公差中英文对照
1ቤተ መጻሕፍቲ ባይዱ
1
几何特性符号
使用参考基准 不用 公差类型 形状 直线度 平面度 圆度 圆柱度 有时用 常用 轮廓 方向 线轮廓度 面轮廓度 倾斜度 垂直度 平行度 位置 位置度 同轴度 对称度 跳动 圆跳动 全跳动
ALWAYS
Geometric Characteristic Symbols
符号
USED A DATUM REFERENCE NEVER TYPE OF TOLERANCE FORM STRAIGHTNESS FLATNESS
标有x的符号为新的符号或原y145m1982标准修订而来的术语符号特性控制框直径球径最大实体原则最小实体原则独立原则none延伸公差带自由状态fprojectedtolerancezone切面tfreestate统计公差半径r控制半径cr球的半径sr基本尺寸基准特征基准目标目标点x尺寸源位置数量8x沉孔埋头孔深度正方形整个圆周非比例尺寸150圆弧长度之间斜度commoncommoncommoncommonsymbolssymbolssymbolssymbolsshownbelowarethemostcommonsymbolsthatareusedwithgeometrictolerancingandotherrelateddimensionalrequirementsonengineeringdrawingsthesymbolsmarkedwithanxarenewofrevisedfromthepreviousy145m1982standardtermsymbolfeaturecontrolframediametersphericaldiametermaximummaterialconditionleastmaterialconditionregardlessoffeaturesizenoneftangentplanetstatisticaltoleranceradiusrcontrolledradiuscrsphericalradiussrbasicdimensiondatumfeaturedatumtargettargetpointxdimensionoriginnumberofplaces8xcounterborespotfacecountersinkdepthdeepsquareallarounddimensionnottoscale150arclengthbetween圆锥度包容原则noneimplied3slopeconicaltaperenvelopeprinciplenoneimplied3术语和定义termstermstermstermsandandandanddefinitionsdefinitionsdefinitionsdefinitionsactualactualactualactuallocallocallocallocalsizesizesizesize实际局部尺寸形体任意横截面上
(完整版)克鲁格曼国际经济学答案
Chapter 61.For each of the following examples, explain whether this is a case of external or internaleconomies of scale:a.Most musical wind instruments in the United States are produced by more than adozen factories in Elkhart, Indiana.b.All Hondas sold in the United States are either imported or produced in Marysville,Ohio.c.All airframes for Airbus, Europe’s only producer of large aircraft, are assembled inToulouse, France.d.Hartford, Connecticut is the insurance capital of the northeastern United States.External economies of scale: Cases a and d. The productions of these two industries concentrate in a few locations and successfully reduce each industry's costs even when the scale of operation of individual firms remains small. External economies need not lead to imperfect competition. The benefits of geographical concentration may include a greater variety of specialized services to support industry operations and larger labor markets or thicker input markets.Internal economies of scale: Cases b and c. Both of them occur at the level of the individual firm. The larger the output of a product by a particular firm, the lower its average costs. This leads to imperfect competition as in petrochemicals, aircraft, and autos.2.In perfect competition, firm set price equal to marginal cost. Why isn’t this possiblewhen there are internal economies of scale?Unlike the case of perfectly competitive markets, under monopoly marginal revenue is not equal to price. The profit maximizing output level of a monopolist occurs where marginal revenue equals marginal cost. Marginal revenue is always less than price under imperfectly competitive markets because to sell an extra unit of output the firm must lower the price of all units, not just the marginal one.3.It is often argued that the existence of increasing returns is a source of conflict betweencountries, since each country is better off if it can increase its production in those industries characterized by economies of scale. Evaluate this view in terms of both the monopolistic competition and the external economy models.Both internal economies of scale (which may lead to monopolistic competition) and external economies of scale could lead to increasing returns.By concentrating the production of each good with economies of scale in one country rather than spreading the production over several countries, the world economy will use the same amount of labor to produce more output.In the monopolistic competition model, the concentration of labor benefits the host country.The host country can capture some monopoly rents. But the rest of the world may hurt and have to face higher prices on its consumption goods.In the external economies case, such monopolistic pricing behavior is less likely since imperfectly competitive markets are less likely.4.Suppose the two countries we considered in the numerical example on pages 132-135were to integrate their automobile marker with a third country with an annual market for 3.75 million automobiles. Find the number of firms, the output per firm, and theprice per automobile in the new integrated market after trade.15.8n X 1c P c AC 2=⇒==−−→−+=+==nS Fb S n bn X F AC P However, since you will never see 0.8 firms, there will be 15 firms that enter the market, not16 firms since the last firm knows that it can not make positive profits. The rest of the solution is straight-forward. Using X=S/n, output per firm is 41,666 units. Using the price equation, and the fact that c=5,000, yields an equilibrium price of $7,000.5.Evaluate the relative importance of economies of scale and comparative advantage incausing the following:a.Most of the world’s aluminum is smelted in Norway or Canada.b.Half of the world’s large jet aircraft are assembled in Seattle.c.Most semiconductors are manufactured in either the United States or Japan.d.Most Scotch whiskey comes from Scotland.e.Much of the world’s best wine comes from France.a. The relatively few locations for production suggest external economies of scale in production. If these operations are large, there may also be large internal economies of scale in production.b. Since economies of scale are significant in airplane production, it tends to be done by a small number of (imperfectly competitive) firms at a limited number of locations. One such location is Seattle, where Boeing produces.c. Since external economies of scale are significant in semiconductor production, semiconductor industries tend to be concentrated in certain geographic locations. If, for some historical reason, a semiconductor is established in a specific location, the export of semiconductors by that country is due to economies of scale and not comparative advantage.d. "True" scotch whiskey can only come from Scotland. The production of scotch whiskey requires a technique known to skilled distillers who are concentrated in the region. Also, soil and climactic conditions are favorable for grains used in local scotch production. This reflects comparative advantage.e. France has a particular blend of climactic conditions and land that is difficult to reproduce elsewhere. This generates a comparative advantage in wine production.6.There are some shops in Japan that sell Japanese goods imported back from the UnitedStates at a discount over the prices charged by other Japanese shops. How is this possible?The Japanese producers employ price discrimination across United States and Japanesemarkets, so that the goods sold in the United States are much cheaper than those sold in Japan. It may be profitable for other Japanese to purchase these goods in the United States, incur any tariffs and transportation costs, and resell the goods in Japan. Clearly, the price differential across markets may lead to such profitable chance.7.Consider a situation similar to that in Figure 6-9, in which two countries that canproduce a good are subject to forward-falling supply curves. In this case, however, suppose that the two countries have the same costs, so that their supply curves are identical.a.What would you expect to be the pattern of international specialization and trade?What would determine who produces the good?QP,CD AC AC External Economics and SpecializationSuppose two countries that can produce a good are subject to forward-falling supply curves and are identical countries with identical curves. If one country starts out as a producer of a good, i.e. it has a head start even as a matter of historical accident, then all production will occur in that particular country and it will export to the rest of the world.b.What are the benefits of international trade in this case? Do they accrue only to thecountry that gets the industry?Consumers in both countries will pay a lower price for this good when externaleconomies are maximized through trade and all production is located in a single market. In the present example, no single country has a natural cost advantage or is worse off than it would be under autarky.8.It is fairly common for an industrial cluster to break up and for production to move tolocations with lower wages when the technology of the industry is no longer rapidly improving—when it is no longer essential to have the absolutely most modern machinery, when the need for highly skilled workers has declined, and when being at the cutting edge of innovation conveys only a small advantage. Explain this tendency of industrial clusters to break up in terms of the theory of external economies.External economies are important for firms as technology changes rapidly and as the“cutting edge” moves quickly with frequent innovations. As this process slows, manufacturing becomes more normal and standard and there is less advantage brought by external economies. Instead, firms look for low cost production locations. Since external economies are no longer important, firms find little advantage in being clustered and it is likely that low-wage locations will be chosen.chapter 81.The import demand equation, MD , is found by subtracting the home supply equation from the home demand equation. This results in MD = 80 - 40 x P. Without trade, domestic pricesand quantities adjust such that import demand is zero. Thus, the price in the absence of trade is 2.2.a.Foreign's export supply curve, XS , is XS = -40 + 40 x P. In the absence of trade, the price is 1.b.When trade occurs export supply is equal to import demand, XS = MD . Thus, using theequations from problems 1 and 2a, P = 1.50, and the volume of trade is 20.3.a.The new MD curve is 80 - 40 x (P+t) where t is the specific tariff rate, equal to 0.5. (Note: in solving these problems you should be careful about whether a specific tariff or ad valorem tariff is imposed. With an ad valorem tariff, the MD equation would be expressed as MD =80-40 x (1+t)P). The equation for the export supply curve by the foreign country is unchanged. Solving, we find that the world price is $1.25, and thus the internal price at home is $1.75. The volume of trade has been reduced to 10, and the total demand for wheat at home has fallen to 65 (from the free trade level of 70). The total demand for wheat in Foreign has gone up from 50 to 55.b.andc. The welfare of the home country is best studied using the combined numerical andgraphical solutions presented below in Figure 8-1.P T =1.7550556070QuantityPrice P W =1.50P T*=1.25where the areas in the figure are:a: 55(1.75-1.50) -.5(55-50)(1.75-1.50)=13.125b: .5(55-50)(1.75-1.50)=0.625c: (65-55)(1.75-1.50)=2.50d: .5(70-65)(1.75-1.50)=0.625e: (65-55)(1.50-1.25)=2.50Consumer surplus change: -(a+b+c+d)=-16.875. Producer surplus change: a=13.125. Government revenue change: c+e=5. Efficiency losses b+d are exceeded by terms of trade gain e. [Note: in the calculations for the a, b, and d areas a figure of .5 shows up. This is because we are measuring the area of a triangle, which is one-half of the area of the rectangle defined by the product of the horizontal and vertical sides.]4. Using the same solution methodology as in problem 3, when the home country is very small relative to the foreign country, its effects on the terms of trade are expected to be much less. The small country is much more likely to be hurt by its imposition of a tariff. Indeed, this intuition is shown in this problem. The free trade equilibrium is now at the price $1.09 and the trade volume is now $36.40.With the imposition of a tariff of 0.5 by Home, the new world price is $1.045, the internal homeprice is $1.545, home demand is 69.10 units, home supply is 50.90 and the volume of trade is 18.20. When Home is relatively small, the effect of a tariff on world price is smaller than when Home is relatively large. When Foreign and Home were closer in size, a tariff of .5 by home lowered world price by 25 percent, whereas in this case the same tariff lowers world price by about 5 percent. The internal Home price is now closer to the free trade price plus t than when Home was relatively large. In this case, the government revenues from the tariff equal 9.10, the consumer surplus loss is 33.51, and the producer surplus gain is 21.089. The distortionary losses associated with the tariff (areas b+d) sum to 4.14 and the terms of trade gain (e) is 0.819. Clearly, in this small country example the distortionary losses from the tariff swamp the terms of trade gains. The general lesson is the smaller the economy, the larger the losses from a tariff since the terms of trade gains are smaller.5. The effective rate of protection takes into consideration the costs of imported intermediate goods. In this example, half of the cost of an aircraft represents components purchased from other countries. Without the subsidy the aircraft would cost $60 million. The European value added to the aircraft is $30 million. The subsidy cuts the cost of the value added to purchasers of the airplane to $20 million. Thus, the effective rate of protection is (30 - 20)/20 = 50%.6. We first use the foreign export supply and domestic import demand curves to determine the new world price. The foreign supply of exports curve, with a foreign subsidy of 50 percent per unit, becomes XS= -40 + 40(1+0.5) x P. The equilibrium world price is 1.2 and the internal foreign price is 1.8. The volume of trade is 32. The foreign demand and supply curves are used to determine the costs and benefits of the subsidy. Construct a diagram similar to that in the text and calculate the area of the various polygons. The government must provide (1.8 - 1.2) x 32 = 19.2 units of output to support the subsidy. Foreign producers surplus rises due to the subsidy by the amount of 15.3 units of output. Foreign consumers surplus falls due to the higher price by7.5 units of the good. Thus, the net loss to Foreign due to the subsidy is 7.5 + 19.2 - 15.3 = 11.4 units of output. Home consumers and producers face an internal price of 1.2 as a result of the subsidy. Home consumers surplus rises by 70 x .3 + .5 (6 x.3) = 21.9 while Home producers surplus falls by 44 x .3 + .5(6 x .3) = 14.1, for a net gain of 7.8 units of output.7. At a price of $10 per bag of peanuts, Acirema imports 200 bags of peanuts. A quota limiting the import of peanuts to 50 bags has the following effects:a.The price of peanuts rises to $20 per bag.b. The quota rents are ($20 - $10) x 50 = $500.c. The consumption distortion loss is .5 x 100 bags x $10 per bag = $500.d. The production distortion loss is .5 x50 bags x$10 per bag = $250.。
卡梅伦液压数据手册(第 20 版)说明书
iv
⌂
CONTENTS OF SECTION 1
☰ Hydraulics
⌂ Cameron Hydraulic Data ☰
Introduction. . . . . . . . . . . . . ................................................................ 1-3 Liquids. . . . . . . . . . . . . . . . . . . ...................................... .......................... 1-3
4
Viscosity etc.
Steam data....................................................................................................................................................................................... 6
1 Liquid Flow.............................................................................. 1-4
Viscosity. . . . . . . . . . . . . . . . . ...................................... .......................... 1-5 Pumping. . . . . . . . . . . . . . . . . ...................................... .......................... 1-6 Volume-System Head Calculations-Suction Head. ........................... 1-6, 1-7 Suction Lift-Total Discharge Head-Velocity Head............................. 1-7, 1-8 Total Sys. Head-Pump Head-Pressure-Spec. Gravity. ...................... 1-9, 1-10 Net Positive Suction Head. .......................................................... 1-11 NPSH-Suction Head-Life; Examples:....................... ............... 1-11 to 1-16 NPSH-Hydrocarbon Corrections.................................................... 1-16 NPSH-Reciprocating Pumps. ....................................................... 1-17 Acceleration Head-Reciprocating Pumps. ........................................ 1-18 Entrance Losses-Specific Speed. .................................................. 1-19 Specific Speed-Impeller. .................................... ........................ 1-19 Specific Speed-Suction...................................... ................. 1-20, 1-21 Submergence.. . . . . . . . . ....................................... ................. 1-21, 1-22 Intake Design-Vertical Wet Pit Pumps....................................... 1-22, 1-27 Work Performed in Pumping. ............................... ........................ 1-27 Temperature Rise. . . . . . . ...................................... ........................ 1-28 Characteristic Curves. . ...................................... ........................ 1-29 Affinity Laws-Stepping Curves. ..................................................... 1-30 System Curves.. . . . . . . . ....................................... ........................ 1-31 Parallel and Series Operation. .............................. ................. 1-32, 1-33 Water Hammer. . . . . . . . . . ...................................... ........................ 1-34 Reciprocating Pumps-Performance. ............................................... 1-35 Recip. Pumps-Pulsation Analysis & System Piping...................... 1-36 to 1-45 Pump Drivers-Speed Torque Curves. ....................................... 1-45, 1-46 Engine Drivers-Impeller Profiles. ................................................... 1-47 Hydraulic Institute Charts.................................... ............... 1-48 to 1-52 Bibliography.. . . . . . . . . . . . ...................................... ........................ 1-53
英文版电容式触摸屏
Motorola Palm Pilot appear In 1997. resistive touch screen, inaccurate, importing by touch pen
Initial LG rolled out Parada in March development In 2007.multi-point capacitive of capacitive touch screen. touch screen
Projected capacitance (Inductive capacitance)
A plurality of horizontal and vertical electrodes are formed by using one or more carefully designed ITO layer which is decayed.
Capacitive touch screen: Introductቤተ መጻሕፍቲ ባይዱon
(1)self-Capacitive Technology :
Self-capacitive induction detect the change of sensing electrode and fingers in order to calculate the position of a finger touch by detecting Sensing electrode capacitance with respect to ground. When finger touch sensing electrodes, it attached a finger capacitance equivalent CF. Therefore, when finger touch sensing electrodes, the self-capacitance will increase.
胶片电影术语中英文对照表
胶片电影术语中英文对照表AA &B Cutting: A method of assembling original material in two separate rolls, allowing optical effects to be made by double printing (A and B Printing).A和B剪接法∶一种将拍摄后的底片装到两种分离的卷轴上的方法,通过用双印片(A和B 印片)得到光学效果。
A Wind: When you hold a roll of 16 mm or other single-perf film so that the film leaves the roll from the top and toward the right, the perforations will be along the edge toward the observer.A 卷(绕)片: 当您手持一盘16mm或者其他单齿孔的胶片,使胶片前端向右时,齿孔会在朝向观察者的一边Abrasion Marks: Scratches on film caused by dirt, improper handling, grit, emulsionpile-ups, and certain types of film damage (e.g., torn perforations).刮痕:由污物、不正确的处理、砂砾、乳剂堆积和特定类型的胶片损伤导致的胶片刮伤(例如:齿孔磨损)。
Academy Aperture: In projection the aperture cutout that was specified by the American Academy of Motion Picture Arts and Sciences that provides for a screen-image aspect ratio of approximately 1.37:1; also called ‘sound aperture.’学会标准片格(标准银幕片窗):在放映过程中,按照美国电影艺术和科学学会的标准,该学会为银幕影像提供大约1.37:1的比例,也叫做“有声片窗“。
新视野大学英语第三版读写教程第二册-U逆天、7-课后题答案
Unit 7 – Section A●Language Focus – Words in Use1. It was essential to (harness) science and technology, not just for the economy but for environmental protection as well.2. Language is the (symbolic) representation of a people, and it combines their historical and cultural backgrounds, as well as their approach to life.3. Because of the effective and helpful method, I was (disposed) to answer all the questions I could, and I never worried about making mistakes.4. It can be inferred from the passage that the commercial prosperity in Cambridge is due to hi-tech IT companies whose business has been (flourishing) .5. You will need to prove that the noise (violated) the regulations, that your neighbor was causing the noise, and that you attempted to have him stop.6. Most universities will guarantee your (accommodation) , at least during your first year, but you are likely to share a kitchen and bathroom with other students.7. We may (infer) from the report that hackers from outside of the company present a more serious threat to their security systems.8. She frowned at the business report, making an effort to (compose) herself before she talked to the employees at the upcoming meeting.9. A crucial factor is that one witness' evidence, though (plausible) , may be rejected because it is contradicted by another witness whose evidence is already proved correct.10. Windsor Middle School has been famous for zero (tolerance) to violence and emphasis on respect for its students and rules.●Word Building1.fate2.horizon3.mechanic4.occasion5.proportion6.logical7.denymercial9.relative10.prior11.continue12.actual1.fatal2.horizontal3.mechanical4.occasional5.proportional6.logic7.denialmerce9.relativity10.priority11.continuity / continual12.actuality1. In (actuality) , it was the poor peasants and blue-collar workers who complained louder about and suffered more from the current tax policy.2. The purchase insurance covers (mechanical) breakdown for one year, which is stated in the insurance policy form.3. The salesperson's emotional state will influence the customer, and the customer's buying decisions are first emotional and then are justified with (logic) .4. I don't appreciate his reply as it was in part a(n) (denial) of the criticism and in part an attempt to change the issue.5. (Occasional) gunshots can still be heard in the district though no one seems to know who fires the guns and if anyone is hit.6. The boss was undecided as to what to do since his decisions can have severe and (fatal) consequences to all the employees and the company.7. Mike is well over 40 now and is much worried about how to maintain (continuity) between his youthful past and his middle-aged present.8. All notions about the well-known theory of (relativity) seem to have been coming from Einstein's general theory of relativity.9. Social fund officers are expected to give high (priority) to requests for loans for the repairs in public places like schools.10. With the increase of (commerce) in the 21st century, investment in money rather than in land has become the most convenient and popular form.11. The insurance fee charged by the company is directly (proportional) to the compensation its clients try to claim from their cases.12. As construction progresses, workers check (horizontal) and vertical levels to ensure that both walls are exactly up to the design requirements.●Banked ClozeIt's obvious that women have come a long way as successful professionals. Women in the workplace are (1) (flourishing) as an increased number of women have made their presence felt in many industries and professions. The sector of the female workforce has (2) (expanded) with more and more strength and thus has its (3) (genuine) importance in the professional world.Whether they like it or not, men have to accept that women are marching up the management ladder confidently and (4) (diplomatically). Women used to be much more "quiet and passive" due to the relatively small number of female employees in (5) (comparison) to males. Women today, on the other hand, have begun seeking their (6) (administrative) positions by using all their powers of intelligence.Men are hierarchical and (7) (jealous) of the "beauty power" that allows women to get certain things based on their physical assets. Even though there is a(n) (8) (dispute) whether many professional females got into positions of power by using their appearance to their advantage, the (9) (valid) fact is the majority of women have worked hard to achieve their desired success. Women were considered as (10) (bystanders) in the workplace for many years and it was believed that the only jobs that they could handle were those of teachers or secretaries, but today's women can not only hold their own positions in the workplace, but they also have the dual task of raising their families.●Language Focus – Expressions in Use1. I surely know it's a good opportunity for us to invest in this housing project, but it all (comes down to) money in the end; that is, how much money we can afford to invest.2. Many people (take exception to) this report because it may imply that women generally havea weaker character and are less responsible for their behavior.3. There have been big strikes all over the country due to the recent tax reform, but the Prime Minister has made it clear that he won't (make concessions to) the strikers.4. What surprised me was that she stared at me for a moment and then (burst into) laughter suddenly.5. He would never (feel at ease with) the French: He will never wear the right clothes, and he will never feel well on goose and red wine.6. Having expected that she would become the mistress of the household and have much more freedom after her marriage, she was now disappointed (on both counts) .7. Carl (took over) the duties and responsibilities of his father in running a manufacturing factory from an early age.8. Bob was popular with local soccer fans, but his popularity also (stemmed from) the fact that he made or scored vital goals when they were needed.●Translation●英译汉The color and style of a wedding gown can depend on the religion and culture of the wedding participants. For example, in Western cultures brides often choose a white wedding dress, while in China the traditional wedding dress is in red. Though white has become the most preferred color for wedding gowns across the world today, this was not a widespread trend before the Victorian era. White became a popular option in 1840, when Queen Victoria wore a white gown at her wedding. The official wedding photograph was widely published, and many brides chose white to become the followers of the Queen. Many people believed that the color white symbolized virginity, though this was not the original intention. As far as the style is concerned, wedding dresses were once typically short in the front with a longer train in the back. This tendency continued until the late 1960s, when it became popular to revert to long, full-skirted designs.婚纱礼服的颜色和款式可取决于婚礼参与者的宗教和文化。
专业英语-道路设计
Horizontal and Vertical Alignment水平和竖直定位1 Background1背景One definition of a visually attractive and unobtrusive highway is the degree to which the horizontal and vertical alignments of the route have been integrated into its surrounding natural and human environments. This takes careful planning and design, as noted in the AASHTO Green Book: Coordination of horizontal alignment and profile should not be left to chance but should begin with preliminary design, during which adjustments can readily be made ... The designer should-study long, continuous stretches of highway in both plan and profile and visualize the whole in three dimensions.一条引人注目的公路和一条不引人注目的公路的区别在于这条公路的水平和竖直定位融入到周围自然和人文环境的程度。
这需要认真的规划和设计,就像AASHTO Green一书中提到的:“水平面的位置和分布的协调不应该由机遇决定,而应该是由很容易做调整的初步设计决定……”设计者应进行长时间的研究,并具有把整个不断延伸的公路的平面和剖面三维化的能力。
测绘工程专业英语翻译Unit4
Unit 4 Angle and Direction Measurement (角度和方向测量)Horizontal and vertical angles are fundamental measurements in surveying.(水平角和竖直角是测量的 基本测量工作)It is necessary to be familiar with the meanings of certain basic terms beforedescribing angle and direction measurement.(在描述角度和方向测量之前,有必要熟悉【be familiar with 熟悉】几个【certain 某些】基本术语的含义【meaning 】)The terms discussed here have reference to the actual figure of the earth.(这里讨论的这些术语与地 球的真实形状有关【have reference to 与……有关】)Basic Terms (基本术语)A vertical line at any point A vertical line at any point on the earth’s surface is the line that follows the direction on the earth’s surface is the line that follows the direction of gravity at that point.(地球表面任一点的垂线是指这点上沿着重力的方向的线【可译为:地球表面任一点的垂线方向 是过该点的重力方向】)It is the direction that a string will assume if a weight is attached at that point and the string is suspended freely at the point. (如果在这点上用线悬挂一个重物,当线自由【即无干扰】静止【suspended 暂停的、悬浮的】时,这条线所呈现【assume 呈现】的方向即重力方向。
暖通专业英语单词
七、专业英语ahu air hundling unit 空调箱air conditioning load 空调负荷air distribution 气流组织air handling unit 空气处理单元air shower 风淋室air wide pre.drop 空气侧压降aluninum accessaries in clean room 洁净室安装铝材as-completed drawing 修改竣工图ayout 设计图blass stop valve 铜闸阀canvas connecting termingal 帆布接头centigrade scale 摄氏温度chiller accessaries 水冷柜机排水及配料chiller asembly 水冷柜机安装工费chiller unit 水冷柜机基础clean bench 净化工作台clean class 洁净度clean room 洁净室无尘室correction factor 修正系数dcc dry coll units 干盘管district cooling 区域供冷direct return system 异程式系统displacement ventilation 置换通风drawn No.图号elevation 立面图entering air temp 进风温度entering water temp 进水温度fahrenheit scale 华氏温度fan coil unit 风机盘管ffu fan filter units 风扇过滤网组final 施工图flow velocity 流速fresh air supply 新风供给fresh air unit 新风处理单元ground source heat pump 地源热泵gross weight 毛重heating ventilating and air conditioning 供热通风与空气调节hepa high efficiency pariculate air 高效过滤网high efficiency particulate air filters 高效空气过滤器horizontal series type 水平串联式hot water supply system 生活热水系统humidity 湿度hydraulic calculation 水力计算isometric drawing 轴测图leaving air temp 出风温度 leaving water temp 出水温度lood vacuum pump 中央集尘泵mau make up air hundling unit schedule 外气空调箱natural smoke exhausting 自然排烟net weight 净重noise reduction 消声nominal diameter 公称直径oil-burning boiler 燃油锅炉one way stop peturn valve 单向止回阀operation energy consumption 运行能耗pass box 传递箱particle sizing and counting method 计径计数法Piping accessaries 水系统辅材piping asembly 配管工费plan 平面图rac recirculation air cabinet unit schedule 循环组合空调单元ratio controller 比例调节器ratio flow control 流量比例控制ratio gear 变速轮ratio meter 比率计rational 合理性的,合法的;有理解能力的rationale (基本)原理;原理的阐述rationality 有理性,合理性rationalization proposal 合理化建义ratio of compression 压缩比ratio of expansion 膨胀比ratio of run-off 径流系数ratio of slope 坡度ratio of specific heat 比热比raw 生的,原状的,粗的;未加工的raw coal 原煤raw cotton 原棉raw crude producer gas 未净化的发生炉煤气raw data 原始数据raw fuel stock 粗燃料油raw gas 未净化的气体 real gas 实际气体realignment 重新排列,改组;重新定线realm 区域,范围,领域real work 实际工作ream 铰孔,扩孔rear 后部,背面,后部的rear arch 后拱rear axle 后轴rear-fired boiler 后燃烧锅炉rear pass 后烟道rearrange 调整;重新安排[布置]rearrangement 调整,整顿;重新排列[布置]reason 理由,原因;推理reasonable 合理的,适当的reassembly 重新装配reaumur 列氏温度计reblading 重装叶片,修复叶片recalibration 重新校准[刻度]recapture 重新利用,恢复recarbonation 再碳化作用recast 另算;重作;重铸 receiving basin 蓄水池receiving tank 贮槽recentralizing 恢复到中心位置;重定中心;再集中receptacle 插座[孔];容器reception of heat 吸热recessed radiator 壁龛内散热器,暗装散热器recharge well 回灌井reciprocal 倒数;相互的,相反的,住复的reciprocal action 反复作用reciprocal compressor 往复式压缩机reciprocal feed pump 往复式蒸汽机reciprocal grate 往复炉排reciprocal motion 住复式动作reciprocal proportion 反比例reciprocal steam engine 往复式蒸汽机reciprocate 往复(运动),互换reciprocating 往复的,来回的,互相的,交替的reciprocating ( grate ) bar 往复式炉排片reciprocating compressor 往复式压缩机reciprocating condensing unit 往复式冷冻机reciprocating packaged liquid chiller 往复式整体型冷水机组reciprocating piston pump 往复式活塞泵reciprocating pump 往复泵,活塞泵reciprocating refrigerator 往复式制冷机recirculate 再循环recirculated 再循环的recirculated air 再循环空气[由空调场所抽出,然后通过空调装置,再送回该场所的回流空气]recirculated air by pass 循环空气旁路recircilated air intake 循环空气入口recirculated cooling system 再循环冷却系统recirculating 再循环的,回路的recirculating air duct 再循环风道recirculating fan 再循环风机recirculating line 再循环管路recirculating pump 再循环泵recirculation 再循环recirculation cooling water 再循环冷却水recirculation ratio 再循环比recirculation water 再循环水reclaim 再生,回收;翻造,修复reclaimer 回收装置;再生装置reclamation 回收,再生,再利用reclamation of condensate water 蒸汽冷凝水回收recombination 再化[结]合,复合,恢复recommended level of illumination 推荐的照度标准reconnaissance 勘察,调查研究record drawing 详图、大样图、接点图recording apparatus 记录仪器recording barometer 自记气压计recording card 记录卡片recording facility 记录装置recording liquid level gauge 自动液面计recording paper of sound level 噪声级测定纸recording pressure gauge 自记压力计recording water-gauge 自记水位计recoverable 可回收的,可恢复的recoverable heat 可回收的热量recoverable oil 可回收的油recoverable waster heat 可回收的废热recovery plant 回收装置recovery rate 回收率relief damper 泄压风门return air flame plate 回风百叶Seat air supply 座椅送风Shaft seal 轴封Shaft storage 搁架式贮藏Shake 摇动,抖动Shakedown run 试车,调动启动,试运转Shake-out 摇动,抖动Shakeproof 防振的,抗振的Shaker 振动器Shaking Shaking Shaking Shallow 摇[摆,振]动grate 振动炉排screen 振动筛浅层,浅的,表面的Shank 柄,杆,柱体,轴Shape 造[成]型,形状[态]模型。
测绘工程专业英语翻译
UNIT1Data acquisitiontechniques include field surveying, global positioning system(GPS), satellitepositioning, and remotely sensed imagery obtained through aerial photographyand satellite imagery.(数据获取技术包括普通野外测量,GPS测量,卫星定位和遥感图像获取,通过航空摄影和卫星成像)It also includes theacquisition of database material scanned from older maps and plans and datacollected by related agencies.(它还包括数据库资料的获取――通过扫描就有地图和设计图,还有有关机构收集的数据。
)Data management andprocess are handled through the use of computer programs for engineeringdesign, digital photogrammetry, image analysis, relational data basemanagement, and geographic information systems (GIS). (通过计算机程序,数据管理和处理应用于工程设计,数字摄影测量【digitalphotogrammetry】,图像分析,相关资料库的管理和GIS。
)Dataplotting(presentation) is handled through the use of mapping and otherillustrative computer programs; the presentations are displayed on computerscreens(where interactive editing can occur) and are output on paper fromdigital plotting devices.(数据成图【数字成图】是通过制图和其他直观的计算机程序【illustrative直观的、说明性的】进行的;其表达显示在计算机屏幕上(交互式编辑处理),也可以通过数字绘图仪输出到纸上。
横向与纵向方向 英语
In the study of English, it is important to understand the concepts of horizontal and vertical directions. These concepts are not only relevant in terms of spatial orientation but also have significance when it comes to language usage and comprehension. In this document, we will delveinto the meaning and application of these directions in the English language.Let's begin by exploring the concept of horizontal direction. In English, horizontal direction refers to the left-to-right or right-to-left movement. It is how we read or write a sentence, as we move from oneside to the other. Whether we are reading a book, writing an essay, or sending a message, we predominantly use the horizontal direction in English. Understanding the horizontal direction allows us to effectively communicate through written language.On the other hand, vertical direction in English pertains to the top-to-bottom or bottom-to-top movement. This direction is often associatedwith the organization of ideas or information in a hierarchical structure. When we write an outline, for example, we start with a main topic at the top and list subtopics underneath. This vertical arrangement helps us present information in a clear and logical manner. Vertical direction is also evident when we read graphs or charts, as we interpret the data from top to bottom or vice versa.It is important to note that both horizontal and vertical directionsplay a crucial role in various aspects of English language learning. For instance, in grammar, we utilize horizontal direction when constructing sentences with subject-verb-object order. Meanwhile, vertical direction is utilized when parsing sentences into phrases and clauses. By understanding these directions, language learners can greatly enhance their comprehension and production of English sentences.In conclusion, the concepts of horizontal and vertical directions are integral to the study of the English language. The horizontal direction is associated with the left-to-right or right-to-left movement,essential for reading and writing. The vertical direction, on the other hand, pertains to the top-to-bottom or bottom-to-top movement, important for organizing ideas and interpreting hierarchical information. Understanding and applying these directions are crucial for effective communication and language proficiency in English.Note: This document is created for the purpose of fulfilling the given task requirements. It focuses solely on the topic of horizontal and vertical directions in the English language. There is no intent to promote any commercial content or include irrelevant information.。
横向的英语单词
横向的英语单词单词:horizontal1.1 词性:形容词1.2 释义:水平的;横向的1.3 英文释义:Parallel to the plane of the horizon; at right angles to the vertical.1.4 相关词汇:horizontally(副词),horizontality(名词),vertical (反义词,垂直的)---2 起源与背景2.1 词源:源自拉丁语“horizontem”,意为“地平线”。
2.2 趣闻:在古代建筑中,确定建筑物的水平方向至关重要,工匠们会利用一些简单的工具如水平仪的雏形来确保墙壁、地面等结构是水平的,这与“horizontal”所表达的概念紧密相关,而不准确的水平定位可能会导致建筑结构不稳定甚至倒塌。
---3 常用搭配与短语3.1 短语:- horizontal line:水平线例句:Draw a horizontal line on the paper.翻译:在纸上画一条水平线。
- horizontal position:水平位置例句:The book is in a horizontal position on the table.翻译:书在桌子上呈水平放置。
- horizontal axis:水平轴例句:The data is plotted along the horizontal axis.翻译:数据沿着水平轴绘制。
---4 实用片段(1). “Look at that painting. The artist has used a lot of horizontal lines to create a sense of calm and stability.” I sa id to my friend as we stood in the art gallery.翻译:“看那幅画。
画家运用了许多水平线来营造一种平静和稳定的感觉。
XM-60多轴校准仪说明书
1Process foundationComponent quality is dependent on machine performance. Without understanding a machine’s error profile it is impossible to have confidence that your components will fall within specification during manufacture.Periodic measurement of a machine’s performance capability is the foundation of process control, providing a known, stable environment in which the process is to be performed. Quantifying process capability reduces costs and improves efficiency.3Why do you need an XM-60 multi-axis calibrator?The machine tool industry is developing quickly. Initiatives to improve efficiency, and reduce scrap and production costs have created the need to understand manufacturing processes better than ever before. Knowing machine capability before metal cutting is the foundation of any machining process.Laser interferometry, the globally recognised approach for machine calibration, offers the ultimate in accuracy. However, measuring one error per set-up is time consuming for users who wish to measure more than linear errors. With complex machine structures and more intricate components being manufactured, measuring linear performance alone is not enough. Frictional effects and other faults in the axis construction can cause the axis to rotate as it moves, creating a differencebetween the indicated and actual positions of machine elements. These ‘angular’ and ‘straightness’ effects can cause significantfeature position errors, or profile and surface deviation, resulting in out-of-tolerance components.The position of any object in space is defined by six degrees of freedom, similar to the relationship between a cutting tool and a workpiece inside a machine tool. Errors within each machine axis cause deviations in the parts produced. Only by measuring all the errors can an assessment of the process capability be made. Directly measuring all the errors simultaneously not only saves time but allows the true picture of a machine’s performance to be assessed.XM-60 measures all six degrees of freedomfrom a single set-up. Thishighlights problems beforethey affect productivity .Angular deviation of a machine axisThe effect of angular errors on a componentRapid measurement of all six degrees of freedom errors in any orientation.5XM-60 provides users with powerful machine diagnostic capability through the measurement of all degrees of freedom from a ‘single shot’. By capturing six degrees of freedom, users can discover the source of their errors, rather than the effect which is often seen when performing linear measurement alone.Reducing measurement uncertainties is important for any user. The XM-60 has been designed to measure machine errors directly, by aligning the laser beams with a machine axis. This reduces the inaccuracies which can result from complexmathematics used in alternative measurement techniques. Direct measurement makes comparison before and after machine adjustments a quick and simple task.Operation in any orientationThe pure optical system in the XM-60 allows operation in any orientation. The launch unit can be mounted on its side, upside down and on its back, useful for vertical axis testing, slant-bed lathes and more complex machine structures.Reducing measurement uncertaintiesis important for any user61. XM-60 launch unit System overviewKey features and benefits:• Quick – linear, pitch, yaw, roll, horizontal and verticalstraightness measurement in the same time as a singlemeasurement with conventional laser techniques.• Simple – easy set-up, familiar to users of otherinterferometric systems. Automatic sign detection andgraphical alignment minimise human errors.• Reassuring – measuring all errors directly allows the userto see results as the test is in progress.• Capable – unique optical roll measurement systemprovides roll measurement in any orientation.4. XC-80 environmental compensator2. XM-60 receiver1. Laser / launch unit• Flexible – a separate laser unit enables the use of a remote compact fibre optic launch unit. This gives more flexible mounting options and minimises the impact on measurement volume.• Thermal stability – the laser heat source is located outside the machine environment. The use of an external laser source reduces thermal effects on the measurement optics and on the machine under test.2. Receiver• Wireless communication – the roll and straightness data is communicated wirelessly back to the laser unit via an integrated wireless connection.• No cables – powered by rechargeable batteries avoiding trailing cables during machine moves.• Lightweight – designed to minimise the load on the machine spindle.3. CARTO software suite• Intuitive – guides the user through the workflow ofthe measurement process. The Capture and Explore applications provide data capture and analysis forXM-60.4. XC-80 environmental compensator• Reliable – XC-80 environmental compensator minimises the effect of the operating environment.• Accurate – maintains full measurement accuracyfrom 0 °C – 40 °C.5. System case• Portable – robust Peli™ storm system case designedto provide safe storage and transportation of thelaser system, with space for accessories and XC-80 compensator kit.1. Laser unit3. CARTO software suite9Precision engineeredEngineered by RenishawRenishaw laser measurement systems are manufactured to provide high performance and long operational lives. The aluminium substructure provides lightweight yet strong construction, designed to give the smallest package to fit onto machine tools. The combined weight of the launch andreceiver is only 2.5 kg.Thermal designThe XM-60 employs thermal breaks between the magnetic mount and the product housing. This ensures changes in machine thermals do not affect the device and temperature variation in the XM-60 does not affect machine performance.Roll detectionThe XM-60 provides a highly accurate laser system that incorporates unique technology with a patented optical roll measurement and fibre optic launch system. The compact launch unit is remote from the laser unit, reducing heat effects at the point of measurement. It can be mounteddirectly to the machine on its side, upside down and even on its back, which is particularly beneficial in areas with difficult machine access.10Precision engineeredFour-beam systemEasy, flexible set-up using any of the four beams duringvisual alignment. The only four-beam system on the marketmatching interferometric accuracy of angular and linearmeasurement with the simplicity of Position Sensitive Device(PSD) straightness measurement. Allows a greatly reducedpackage size.Proven performanceThe laser tube in the XM-60 is developed from technologyused in Renishaw’s RLE20 laser encoder system, producedfor over 10 years, and found in the most demandingapplications in the semiconductor industry.Attention to detailThe standard XM-60 kit is supplied with a set of magneticconduit clamps to tidy and control the conduit during a test.A comprehensive user guide is available in multiplelanguages for local support. The whole system can betransported in a portable ‘wheelie-case’ with an attachablefixturing kit.Our compact, optical rolldetection solution is atthe heart of the system’scapability.1113CARTO softwareThe CARTO software suite guides the users through the workflow of the XM-60 measurement process, from setting up a test to analysing the data. Building upon customer feedback and years of calibration experience, the intuitive user interface and the flow of the software matches the easy set-up of the XM-60 multi-axis calibrator.The CARTO suite is made up of two applications;• Capture to collect laser measurement data.• Explore to provide powerful analysis to international standards.CARTO features a database system which automatically stores and organises data for the user. This simplifies operation and allows users to quickly and easily compare data across multiple machines over time.The CARTO user interface can easily be configured to suit user preferences, with the ability to change themes and customise displays. It is tablet-friendly and has expandable menu sections for ease of use on compact screens.Test methods are automatically saved, so users conducting repeat tests can simply recall an earlier test.CaptureGuides the user step-by-step through the data capture processSoftware that thinks for the userWhen a new test method is created, CARTO can provide defaults from previous set-ups. Fields such as dwell time areautomatically populated based on the averaging that the user has chosen, saving the user test and set-up time.Automatic triggering for all channelsAlways having a linear position channel with XM-60 enables automatic triggering for all tests, even if the user is only interested in the angular measurement. There is never the need to manually trigger the laser.Elegant, simple alignmentThe straightness measurement from XM-60 is also used to align the system. CARTO graphically displays the alignment of the system making set-up simple and easy to understand.Part program generationCapture features a part program generator, supporting Fanuc 30, Heidenhain 530, Mazak Matrix and Siemens 840Dcontrollers, with more to follow.‘Free-run mode’Allows users to capture data immediately, without having to define the positions, or even the number of targets. The softwaredisplays straightness (horizontal and vertical), pitch, yaw and roll errors against linear position. T riggering can be manual(with a keypress), automatic (based on stability of position) or continuous (captured during motion at a user-defined interval).1415Analysis standardsDifferent companies need to comply with different standards, therefore each measurement (linear, pitch, yaw, roll andstraightness) can be displayed with all supported analysis standards. To make it easier for the user, these can also be sorted, enabled or hidden from view.PDF printingIn order to generate reports quickly, individual measurement data, test information, environmental conditions and error compensation can all be saved directly to pdf.TaggingAs the analysis browser fills up with a large quantity of tests, finding the data you need can take time. Explore has made this simple by allowing the user to assign a tag to any test saved in the database. All the data can then be filtered by a tag or multiple tags.CompareEven after a report has been printed, we don’t stop there. Explore features a handy comparison tool, allowing users to look through the history of their test records and see the effect that numerous factors have on six channels of error.Error compensationCreate linear error compensation files to improve machine performance. Error plots from before and after compensation can beadded to a comparison graph to verify the improved machine performance.ExploreRapid analysis and reporting of results17Magnetic mountingThe integral switchable magnetic base on the XM-60 launchunit allows quick attachment to the machine. An internalprotection device ensures the magnet is only activated whencorrectly installed on the machine, preventing damage.90 degree bracketThe 90 degree bracket enables users to switch the orientationof the XM-60 with ease. Guide pins assist the location of theXM-60 until the magnetic base is activated, making accuratepositioning simple. The 90 degree bracket can also be usedto mount the unit off the edge of the machine bed.Standard clamp block mountThe XM-60 receiver uses a clamp block and pillar method forsimple attachment to the machine. The standard kit containsfour pillars and two clamp blocks which gives even moreflexibility in mounting options.Custom fixture interfaceFor specialist fixture applications the clamp block can beeasily removed for the user to attach custom fixturing to theback of the receiver, using the tapped holes directly.Fixturing kitThe fixturing kit simplifies and extends the options formounting the XM-60 into the working volume of a machinetool. Applications that previously were too complex tomeasure can now easily be catered for. The kit contains aseries of extrusions that can be easily assembled.This supports users in:• measuring the full axis of travel for:• linear extension from the bed of the machine• vertically mounting beside the machine bed• mounting the XM-60 onto a chuck for lathe or machiningcentre applications•mounting the receiver extended from the spindleVersatile fixturing90 degree bracketFixturing kit mounting plate18Service and qualityTrainingRenishaw offers an established range of comprehensive operatortraining courses either on-site or at a Renishaw training centre.Our experience in metrology allows us to teach not just about ourproducts, but also underlying scientific principles and methods ofbest practice.This enables our customers to get the most out of theirmanufacturing processes.Our ongoing commitment to service and quality provides our customers with the complete solution19SupportOur products enhance quality and productivity, and we strive for total customer satisfaction through superior customer service and expert knowledge of potential product applications. When you purchase a laser or ballbar system from Renishaw, you are buying into a worldwide support network that understands machine metrology and the service of production equipment. Renishaw calibrations in the UK are traceable to the National Physical Laboratory, a signatory of the CIPM MRA. Calibration facilities worldwide can provide local laser calibration traceability.Design and buildNot only does Renishaw have comprehensive in-house design capability, its extensive manufacturing capacity allows it to produce nearly all components and assemblies in-house. This gives us the ability to fully understand and control our design and build process.The performance of Renishaw lasers has been independently verified by the National Physical Laboratory (UK) and the Physikalisch-Technische Bundesanstalt (Germany).21Renishaw’s innovation has transformed industrial metrology Renishaw offers a range of calibration solutions for machine tools, CMMs and other applications:XL-80 laser measurement system• The ultimate in traceable, versatile motion system analysis• ±0.5 ppm certified linear measurement accuracyXR20-W rotary axis calibrator• Measurement accuracy of ±1 arc second• Totally wireless operation for quick and easy set upQC20-W ballbar• The most widely used system for machine tool performance verification• Reduces machine down-time, scrap and inspection costsRenishaw laser encoder with RSU10• Linear axis measurement for fixed installations in a compact package• Compatible with Renishaw calibration software packagesMachine checking gauge• Volumetric measurement performance for CMMs• Verification of volumetric accuracy to BS ISO 10360-2AxiSet™ Check-Up• Rapid on-machine measurement of rotary axis performance•Accurate detection and reporting of errors in rotary axis pivot pointsXM-60 system informationIntegral USB comms, no seperate interfacePlease contact your local Renishaw office for further details at /contact23RENISHAW HAS MADE CONSIDERABLE EFFORTS TO ENSURE THE CONTENT OF THIS DOCUMENT IS CORRECT A T THE DATE OFPUBLICATION BUT MAKES NO WARRANTIES OR REPRESENTATIONS REGARDING THE CONTENT . RENISHAW EXCLUDES LIABILITY ,HOWSOEVER ARISING, FOR ANY INACCURACIES IN THIS DOCUMENT .© 2017 Renishaw plc. All rights reserved.Renishaw reserves the right to change specifications without notice.RENISHAW and the probe symbol used in the RENISHAW logo are registered trade marks of Renishaw plc in the United Kingdom and other countries.apply innovation and names and designations of other Renishaw products and technologies are trade marks of Renishaw plc or its subsidiaries.All other brand names and product names used in this document are trade names, trade marks or registered trade marks of their respective owners.About RenishawRenishaw is an established world leader in engineering technologies, with a strong history of innovation in product development and manufacturing. Since its formation in 1973, the company has supplied leading-edge products that increase process productivity, improve product quality and deliver cost-effective automation solutions.A worldwide network of subsidiary companies and distributors provides exceptional service and support for its customers.Products include:• Additive manufacturing and vacuum casting technologies for design, prototyping, and production applications• Dental CAD/CAM scanning systems and supply of dental structures• Encoder systems for high-accuracy linear, angle and rotary position feedback• Fixturing for CMMs (co-ordinate measuring machines) and gauging systems• Gauging systems for comparative measurement of machined parts• High-speed laser measurement and surveying systems for use in extreme environments• Laser and ballbar systems for performance measurement and calibration of machines• Medical devices for neurosurgical applications• Probe systems and software for job set-up, tool setting and inspection on CNC machine tools• Raman spectroscopy systems for non-destructive material analysis• Sensor systems and software for measurement on CMMs• Styli for CMM and machine tool probe applicationsFor worldwide contact details, visit /contactPart no: L-5103-4038-01-A Issued: 10.2017*L-5103-4038-01-A T +44 (0) 1453 524524F +44 (0) 1453 524901E ***************Renishaw plcNew Mills, Wotton-under-EdgeGloucestershire, GL12 8JRUnited Kingdom。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations Aur´e lie Bauer,Eliane Jaulmes,Emmanuel Prouff,and Justine WildANSSI,51,Boulevard de la Tour-Maubourg,75700Paris07SP,Francefi@ssi.gouv.frAbstract.Since the introduction of side-channel attacks in the nineties,RSA implementations have been a privileged target.A wide variety ofcountermeasures have been proposed and most of practical attacks arenowadays efficiently defeated by them.However,in a recent work pub-lished at ICICS2010,Clavier et al.have pointed out that almost all theexisting countermeasures were ineffective if the attacks are performedwith a modus operandi called Horizontal.Such attacks,originally intro-duced by Colin Walter at CHES2001,involve a single observation tracecontrary to the classical attacks where several ones are required.To de-feat Horizontal attacks,the authors of the ICICS paper have proposed aset of new countermeasures.In this paper,we introduce a general frame-work enabling to model both Horizontal and classical attacks(calledVertical)in a simple way.This framework enables to enlighten the sim-ilarities and the differences of those attack types.From this formalism,we show that even if Clavier et al.’s countermeasures thwart existingattacks,they do not fully solve the leakage issue.Actually,flaws areexhibited in this paper and efficient attacks are devised.We eventuallypropose a new countermeasure.1IntroductionSide-Channel Analysis(SCA)is a cryptanalytic technique that consisting in ex-ploiting the side channel leakage(e.g.the power consumption,the electromag-netic emanations)produced during the execution of a cryptographic algorithm embedded on a physical device.It uses the fact that this leakage is statisti-cally dependent on the intermediate variables that are processed.Some of these variables are sensitive in the sense that they are related to secret data,thus reaching information on them enables efficient key recovery attacks[3,9,15]. Since the publication of thefirst attacks,many papers describing either counter-measures or attack improvements have been published(see[3,4,16]for example). Among these improvements,higher-order SCA are of particular interest.They extend the initial concept by considering a set of several instructions instead of a single one and circumvent many countermeasures proposed in the literature (e.g.[4,10]).Another significant improvement has been proposed initially by Walter[19]and then studied more deeply by Clavier et al.in[5].Essentially, it consists in a new modus operandi called Horizontal,in which sensitive infor-mation is extracted from a single measurement split into several parts.It differs from the classical Vertical mode where information is obtained from different al-gorithm executions.Horizontal mode applies when the same guessable sub-part of a secret is involved in many internal operations during the overall algorithmprocessing.This is particularly the case for RSA implementations where the ex-ponentiation is composed of small multiplications that all depend on the same secret exponent sub-part.As noticed in[5,19],a striking point is that classical countermeasures(e.g.the exponent or the message blinding techniques),efficient in the Vertical context,turn out to be almost ineffective in the Horizontal one. This makes the construction of new appropriate countermeasures a real issue for the security of embedded implementations of RSA and similar algorithms. An attempt to design such countermeasures thwarting both types of attacks has been done in[5].Actually,we show in this paper that these countermeasures (Sections4and5)do not completely remove the leakage,even if they thwart some attacks.To exhibit theflaws and,eventually,to propose new countermea-sures(Section6),wefirst introduce a framework enabling to formally study the resistance of an implementation against side channel attacks in both Horizontal and Vertical modes(Sections2and3).This framework could be used to further analyse the security of other algorithms’implementations than RSA ones.On the other hand,the countermeasure proposed in this paper is afirst step towards an efficient and effective security against Horizontal attacks.The definition of alternative countermeasures is a new open avenue for further research.2A Comprehensive Study of Side-Channel AnalysesIn the following,a general framework is introduced which enables to describe most of the existing attacks in a similar way and to identify their core differences (actually the leakage pre-treatment,the leakage model and the statistical test).2.1A General Framework for Side-Channel AnalysesNotations.A realization of a random variable X is referred to as the corre-sponding lower-case letter x.A sample of observations of X is denoted by(x)or by(x i)i when an indexation is needed.In this case,the global event is sumed up as(x)← X.The i th coordinate of a variable X(resp.x),viewed as a vector, is denoted by X[i](resp.x[i]).As usual,the notation E[X]refers to the mean of X.For clarity reasons we sometimes use the notation E X[·]to enlighten the variable over which the mean is computed.All the attacks below target a variable Z(k,X)defined as the output of a specific computation(e.g.a multiplication)performed by the device and parametrized by a secret sub-part k and a public variable X1.In the following,we shall use Z instead of Z(k,X)if there is no ambiguity on k and X.To recover information on k,the attacks are performed on a sample of obser-vations related to the processing of Z by the device.Each of those observations, such as power consumption,electromagnetic emanations,and so on,is usually composed of several physical measurements corresponding to leakages at differ-ent times t i.It can hence be viewed as a realization of a multivariate random variable L whose coordinates L[i]satisfy:L[i]=ϕiZ+βi,(1)1We shall sometimes need to consider the known value as a pair of variables:in this case we will use the notation(X,Y)instead of X.where ϕi only depends on the device behaviour at time t i during the processing of Z and βi is an independent Gaussian noise with zero mean and standard deviation σi .The function ϕi is a priori unknown.The index i will be sometimes omitted.In this case,it is assumed that the same function is associated to all the time indices.An SCA is based on the Hypothesis Testing principle [13].To make this test,a set of prediction values h j are deduced from each hypothesis ˆkon k and from the sample of implementation inputs (x j )corresponding to the observations.This step involves a leakage model function m that must have been priorly chosen by the attacker (for instance based on its knowledge on the attacked device architecture).With this model function,the prediction values h j are built s.t.h j =m (z (ˆk,x j )).Eventually,the adversary uses a distinguisher ∆to compare the h j with the observations l j ← L |X =x j .The overall set of SCA is usually split in two subclasses.The first one,called simple Side-Channel Analysis ,contains all attacks where observations only need to be done on a single value of the public input parameter (this implies that all the x j are equal to a same value,say x ).This set contains S-PA [14],S-EMA[8,18]or S-TA (Timing Analysis)[14].The second subclass,called advanced Side-Channel Analysis ,includes attacks where observations of the targeted internal processing must be done for several public input parameters.In particular,it contains univariate SCA attacks such as DPA [15],CPA [3]or MIA [9]and multivariate SCA attacks such as HO-DPA [15,17]or HO-MIA [1].We give hereafter a more formal description of those two subclasses.Simple SCA.The class of simple SCA includes all Vertical or Horizontal SCA where the adversary makes observations for a single algorithm input.Table 1provides a description of a simple Side-Channel Analysis 2.1.Choose a value x for X .2.Measure a sample (l j )j ← (L |X =x )of N leakages.3.Select a distinguisher ∆and choose a model function m .4.For each hypothesis ˆk on k ,compute h =m (z (ˆk,x )).5.For each ˆk,compute ∆[ˆk ]=∆ (l j )j ,h .6.Deduce from ∆[·]information on k .Table 1.Simple Side-Channel AnalysisRemark 1.In theory,simple SCA may be conducted with a single observation.In practice however,it is often necessary to use several observations of the pro-cessing for the same variable x in order to reduce the noise impact.In this case,the statistical distinguisher ∆may for instance involve a preliminary step consisting in averaging the observations sample.2In contexts where the adversary is not allowed to choose the algorithm input but knows it,the first step just aims at fixing the input value for the rest of the attack.Advanced SCA.All the attacks where observations must involve different inputs belong to the advanced SCA category.This kind of attacks follows the outlines given in Table 2.1.Get N measurements (l j ,x j )j ← (L ,X ).2.Select a distinguisher ∆and choose a model function m .3.For each hypothesis ˆk on k build a set of predictions h j such that h j =m (z (ˆk,x j )).4.For each ˆk ,compute ∆[ˆk ]=∆ (h j )j ,(l j )j5.Deduce from ∆[·]information on k .Table 2.Advanced Side-Channel AnalysisRemark 2.Depending on the statistical treatment processed by the distinguisher,the latter one may include a particular leakage post-processing E .This post-treatment may be used to select some particular points in the leakage traces and,possibly,to combine them.For instance,in a second-order advanced SCA involving the mutual information as distinguisher,the function E can be defined such that E L = L [p ],L [q ] for some constant indices (leakage times)p and q .In a second-order advanced SCA involving the correlation coefficient as distin-guisher,E may be defined such that E L =(L [p ]−E (L [p ]))·(L [q ]−E (L [q ])).Moreover,the choice of the model function must be done in accordance with the distinguisher (see e.g.[17]and [9]).2.2Leakage Measurements and ObservationsIn the literature,two main ways have been defined to get the observations l j during the first step of the attacks in Tables 1and 2.The first method sim-ply consists in executing the implementation several times (with the same input in simple SCA or with several ones in advanced SCA)and in defining l j as the observation related to the j th algorithm execution.Those attacks are called Ver-tical .The second method refers to attacks where a single execution is needed and where each l j corresponds to the observation of a processing at a different time period during this execution.In this case,the index j refers to the time period.The underlying assumption is that all the observations rely on the same internal calculus of Z (k,X ),parametrized by a same secret k and different known values x j in advanced SCA,or a constant one x in simple SCA.Attacks corresponding to this modus operandi are called Horizontal .Figure 1illustrates the notations and the differences between the two modus operandi .All the attacks discussed in Section 2.1can be either Vertical or Horizontal 3.Even if the Horizontal or Vertical characteristic of an SCA has no impact on 3Possibly,the observations acquisition phase may mix horizontal and vertical tech-niques.In this case,the attack will be termed Rectangle .Vertical SCA Horizontal SCAFirst executionSecond executionN +1th execution1s tp e r i o d 2n d p er i o dN +1t hp e r i o d...l 0← L |X =x 0leakagevaluestime l 1← L |X =x 1l 1[i ]← L [i ]|X =x 1t il N ← L |X =x Nl N [i ]← L [i ]|X =x Nt il 0←L |X =x 0l N L |X =x N...Fig.1.Vertical and Horizontal SCAthe attack steps themselves (as described in Tables 1and 2),it impacts the implementation security analysis.Indeed,we will see in Section 4that a coun-termeasure may become ineffective when going from one category of attacks to another one.We illustrate this in the context of secure RSA implementations.2.3TaxonomyBased on the discussions conducted in previous sections,we propose here a general taxonomy for simple and advanced side-channel attacks.To name an attack we propose to use the convention [XXX]-[YYY]-[ZZZ]where:–XXX equals either S for simple SCA or is a reference to the statistical tool for advanced SCA (e.g.C for Correlation,MI for Mutual Information,ML for Maximum Likelihood,LR for Linear Regression,etc.).In case of multivariate SCA,we propose to pad the order/dimension followed by O at the left of the distinguisher letter.–YYY is an acronym referring to the leakage type;PA for Power Analysis,EMA for Electromagnetic Analysis,TA for Timing Attacks,etc.–ZZZ is optional and may be used to specify if the attack is profiled or not.In this case,ZZZ is replaced by P (for Profiling)or UnP (for UnProfiling).For instance,Template attack is a ML-PA-P attack.Of course,all those attacks can be applied either on a Vertical or Horizontal mode.Figure 2illustrates the taxonomy for some existing attacks.YYYFig.2.Side-Channel AttacksIn the following sections,we focus on Horizontal SCA in the RSA context.We will recall the existing attacks and will discuss about the effectiveness of the Vertical SCA countermeasures against Horizontal SCA.3RSA Context 3.1Operation Flows in RSA ExponentiationsThe execution flow of an RSA implementation is usually viewed as the succession of only two different operations:a modular squaring and a modular multiplica-tion respectively denoted by O 0and O 1.For convenience,we will assume that both operations are bivariate and defined such that O i (X,Y )=X i Y ¯i ·Y .For instance,the left-to-right Square and Multiply algorithm parametrized by a d -bit long secret k (the most significant bit is assumed to be equal to 1)and a public modulus n ,operating on a message X can be associated to the following sequence:Y ←O f (0)(X,Y ),Y ←O f (1)(X,Y ),···,Y ←O f (N )(X,Y ),(2)where Y is the updated intermediate result (initially set to 1),N denotes the value d +HW(k )and the binary function f is defined as:f (j )= j ,if j =0,1f (j −1)·k d −1− j −2i =0f (i ) ,otherwise.(3)The operations’flow in (2)is illustrated on Figure 3.To defeat simple SCA against RSA implementations,a classical countermea-sure is to insert dummy multiplications in order to have a regular algorithm.This leads to the definition of the so-called Square and Multiply Always algo-rithm which may be associated with the sequence below where each square is followed by a multiplication whatever the secret k :Y 1←O 0(X,Y 1),Y k [d −1]←O 1(X,Y 1),Y 1←O 0(X,Y 1),Y k [d −2]←O 1(X,Y 1),···,Y 1←O 0(X,Y 1),Y k [0]←O 1(X,Y 1),(4)with Y 0denoting a garbage variable and Y 1a working register initially set to 1(and playing the same role as Y in (2)).O f (0)=O 0O f (1)=O 1O f (2)=O 0O f (3)=O 1O f (4)=O 0 O f (5)=O 1k [d −3]=0O f (5)=O 1k [d −3]=1k [d −2]=0O f (3)=O 1O f (4)=O 0O f (5)=O 1k [d −3]=0O f (5)=O 1k [d −3]=1k [d −2]=1k [d −1]=1O denotes a dummy operationFig.3.First Loops of Square and Multiply Always algorithmRemark 3.An improved version of the Square and Multiply Always algorithm,based on the Montgomery Ladder trick [11],is often preferred as it is more resistant to the so-called Safe-Error attacks [20].In this version,there is no garbage variable and Y k [i ]is used in the subsequent operation even if k [i ]is equal to 0.We point out here that this version and the Square and Multiply Always algorithm have exactly the same vulnerabilities with respect to advanced SCA.Indeed,in both cases,each loop iteration in the exponentiation processes the same operations and only the memory manipulation is different.The granularity of the sequence descriptions in (2)and (4)is not fine enough to investigate advanced SCA.Those attacks indeed require the identification of intermediate results depending on small sub-parts of the input parameters.To enable such an identification,the execution flows must be rewritten as a succession of operations on ω-bit words 4.Let us assume that modular squarings and multiplications are implemented with the schoolbook multiplication called Long Integer Multiplication (LIM for short)followed by a Barrett reduction (for self-contentedness we recall the LIM algorithm in Appendix A).The variables X and Y are then represented as base-2ωvectors 5(X [a ])0≤a ≤t and (Y [b ])0≤b ≤twith t = log 2(X )ω .After this rewriting,we get the following decomposition of an operation O i ,where we only exhibited the intermediate base-2ωmultiplications Z [a,b ]←X [a ]i Y [a ]¯i ·Y [b ]:3.2Attacks TargetsWhen applied against the operations’sequences (2)or (4),advanced SCA aim at recovering all the bits of k one after another from the left to the right.Here,we assume that the most significant bit of k is 1and we show in this section and 4The value ωtypically depends on the device architecture and is usually equal to 8,16or 32.5Without loss of generality,we assume that X and Y have the same length t .This possibly implies that the binary representation of one of them has been left-padded with 0s.Z[0,0]←X[0]i Y[0]¯i·Y[0],Z[0,1]←X[0]i Y[0]¯i·Y[1],···,Z[0,t]←X[0]i Y[0]¯i·Y[t] Z[1,0]←X[1]i Y[1]¯i·Y[0],······,Z[1,t]←X[1]i Y[1]¯i·Y[t].. ..........Z[t,0]←X[t]i Y[t]¯i·Y[0],······,Z[t,t]←X[t]i Y[t]¯i·Y[t].Fig.4.Decomposition of the operation O i(X,Y)=X i·Y i·Ythe next one how advanced SCA succeed in recovering the value of k[d−2].The attacks may further be repeated to fully recover k.To simplify the notations, we denote the secret bit k[d−2]by s.In a classical left-to-right Square and Multiply algorithm,s is involved for thefirst time in the operation O f(3).In this case,one can develop the operands of O f(3)in terms of s and X.Actually, according to(3)we have f(3)=s,which means that O f(3)corresponds to the processing X2·X2−s(i.e.Y=X2in Figure4).In a left-to-right Square and Multiply Always algorithm,the value s impacts on thefifth operation.Indeed, depending on s,the result of the fourth operation has either been put into the working register or in the garbage register.As a consequence,thefifth operation (which is always a squaring O0)corresponds to the processing X2+s·X2+s (i.e.Y=X2+s in Figure4).Eventually,depending on the algorithm we deduce that the elementary base-2ωmultiplications Z[a,b]satisfy6:–Square and Multiply(operation O f(3)in(2)):Z[a,b]=X2[a]·X2−s[b].(5)–Square and Multiply Always(fifth operation in(4)):Z[a,b]=X2+s[a]·X2+s[b].(6) Equations(5)and(6)show that each intermediate result Z[a,b]depends on s. This implies that the observation L a,b related to the manipulation of Z[a,b]by the device leaks information on s.To exploit this leakage in a vertical advanced SCA,the pair of indices(a,b)isfixed and the observations are measured for different values x← X of the algorithm input.In an Horizontal advanced SCA,the observations are performed for a single value x← X but different pairs of indices(a,b)∈[0;t]×[0;t](in the latter case,a and b are viewed as random variables and will be denoted by capital letters).3.3Horizontal AttacksIn this section,we are interested in Horizontal analyses such as the Big Mac attack[19]and the Horizontal Correlation Analysis[5].For afixed value x← X but various pairs(a,b),we assume that the adversary observes the device behavior l a,b during the processing of the intermediate results z[a,b].6We alert the reader on the fact that,in this paper,we make a distinction between the notations X i[a]and(X[a])i:thefirst one denotes the(a+1)th coordinate of the base-2ωrepresentation of the value X i,whereas the second one denotes the rising at the power i of the(a+1)th coordinate of the base-2ωrepresentation of the value X.Big Mac Attack.This attack is a Collision Analysis ,designed in the case of the Square and Multiply algorithm when the adversary does not known the exponentiation input x .The principle consists in recovering the secret key k from the most significant bit to the least significant one.According to Equation(5),elementary operations involved in O f (3)during the modular exponentiation can be either of the shape x 2[a ]·x 2[b ]when s equals 0,or of the form x 2[a ]·x [b ]when s equals 1.As a consequence,if the attacker is able to determine whether the leakage traces l a,b ,involved in this operation,correspond to multiplications by x 2[b ]or by x [b ],then the value of s will easily be recovered.In order to make this distinction,the adversary performs a collision attack between the traces l a,b corresponding to O f (3)and the traces l a,b related to another multiplication involving x as operand (e.g.the operation O f (1)which defines the multiplication of 1by the input x in the Square and Multiply algorithm).To this purpose,the attacker uses for instance the average leakages (1t +1 a l a,b )b and (1t +1 a l a,b )b ,and after selecting a distinguisher ∆,e.g.the Euclidean Distance ,computes the value ∆((1t +1 a l a,b )b ,(1t +1 a l a,b )b )in order to validate or invalidate the hypothesis s =1.As explained before,the Big-Mac attack has originally been described as a Collision Analysis for unknown exponentiation inputs and a non-regular Square and Multiply algorithm 7(see bold notations on right-hand sided leaf in Figure 5).H-CPA Regular H-CPA Non Regular X known Big Mac Regular Big MacNon RegularX unknownFig.5.Big-Mac attack and Horizontal CPA classificationHorizontal C-PA.Contrary to the previous attack,this one has been described in the context of Atomic Square and Multiply implementations,and also applies to the Square and Multiply Always algorithm (Sequence (4))when the input x is known to the adversary.To recover the key-bit s corresponding to the variables Z [a,b ]defined in (6),the attacker involves a well-chosen model function (e.g.the Hamming weight)and for each key-bit hypothesis ˆs ∈{0,1},computes the set of predictions h a,b =m (Z [a,b ])(where s is replaced by ˆs in (6)).Eventually,the Pearson coefficient ρis chosen as distinguisher and the discrimination is done by processing ρ[(h a,b )a,b ,(l a,b )a,b ].The applicability of this attack has been illustrated on Figure 5,see bold notations for the original description of the attack.7This principle can be extended to Sliding Windows implementations,see Walter’s original paper [19].Extension of these attacks.Even if the Big Mac Attack has been initially introduced for unknown exponentiation inputs,it can of course be adapted to known entries.Indeed,another way to proceed consists in using the model func-tion m :a,ˆs →1t +1 a ˆϕ(x 2[a ]·x 1+ˆs [b ])where ˆϕis chosen according to the device specificities (e.g.ˆϕequals to the Hamming weight function).In the framework proposed in Section 2,the Big Mac Attack can thus become an Horizontal ED-PA (with ED standing for Euclidean Distance ).This could be illustrated on Figure 5by adding Big Mac in each leaf of the left hand-sided sub-tree.In addi-tion,one can also use Big Mac attack to target regular implementations,such as modular exponentiations using the Square and Multiply always algorithm.In-deed,Equation (6)shows that operation O f (4)is either x 2[a ]·x 2[b ]when s equals 0,or x 3[a ]·x 3[b ]when s equals 1.In that case,the attacker can average on the second multiplications operands instead of the first one (as done in the previous attacks).This leads to the computation of the values (1t +1 b l a,b )a coming from operation O f (3)(which corresponds to x 2[a ]·x [b ])and (1t +1 b l a,b )a issued from O f (4).From that point and as before,the attacker evaluates a distinguisher ∆(e.g.the Euclidean Distance)to determine whether the multiplication has been performed with x 2[a ]or with x 3[a ],which leads to recover s .Eventually,the same process can be applied to guess the following remaining bits of the secret key k .This extension of the Big Mac attack is illustrated on Figure 5by the grey-dotted box.Applying Horizontal C-PA from the Square and Multiply always implemen-tation to the non-regular one is obvious (see also the grey-dotted box on the scheme).As seen in this section,the Big Mac attack and the Horizontal C-PA can both be applied not only in their original contexts but against Square and Multiply and Square and Multiply always implementations.Their success indeed does not depend on the structure of the exponentiation algorithm.They can moreover be applied in both known input and unknown input modes.In the sequel,we use those observations to argue that the countermeasures proposed to defeat Horizontal C-PA,are in fact sensible to Big Mac like attacks.4Existing CountermeasuresThe most popular countermeasures against Vertical advanced SCA is the ex-ponent blinding and the multiplicative/additive message blinding (e.g.[6,14]).The first countermeasure implies that all the observations in the adversary hands correspond to different secrets/exponents.The second countermeasure implies that no intermediate variable depends on the algorithm input.In the two cases,it becomes impossible to make predictions and the Vertical first-order advanced SCA fail.The exponent blinding countermeasure perfectly illustrates that the effec-tiveness of a countermeasure may totally change when passing from Vertical to Horizontal contexts.Indeed,when the exponent randomization is applied,all the variables Z [a,b ]defined as in (5)or (6)will depend on the same masked bit ˜s .As a consequence,the Horizontal advanced SCA described in Section 3will succeed in recovering it.As the knowledge of the blinded exponent provides the adversary with the same capabilities as knowing s itself (e.g.it can produce thesame signatures)the attack may be considered as successful.In [5],the authors also argue that message blinding thwart Horizontal attacks only if the bit-length λof the random value R is greater than 32bits.For smaller values of λ,an efficient attack is indeed exhibited.As a consequence of the exponent blinding ineffectiveness and of the message blinding inefficiency,there is a real lack of countermeasures against Horizontal attacks.This led Clavier et al.to propose the following three countermeasures [5]:–Blind Operands in LIM.The first countermeasure proposed in [5]consists in applying a full blinding on the words X [a ]and Y [b ],i.e.to substitute in the LIM algorithm the operation X [a ]·Y [b ]by (X [a ]−R 1)(Y [b ]−R 2)+R 1·Y [b ]+R 2·X [a ]−R 1·R 2,where R 1and R 2are two ω-bit random values.For efficiency reasons,the authors propose to compute once the values R 1·Y [b ],R 2·X [a ]and R 1·R 2and to store them.The complexity of this countermeasure is (t +1)2+2(t +1)+1ω-bit multiplications (the unprotected LIM requires (t +1)2multiplications)and 4log 2(n )+2ωbits of additional storage,where n is the RSA modulus.–Randomize One Loop in LIM and Blind.The second countermeasure in [5]starts from the first one and mixes it with a randomization of the order in which the words X [a ]are involved in the LIM.This method consists in using a permutation vector applied to the words X [a ]and in masking the words Y [b ].This countermeasure requires (t +1)2+t +1ω-bit multiplications and 2log 2(n )bits of additional storage.–Randomize the Two Loops in LIM.This countermeasure is a variant of the second one.In this case,the authors fully randomize the order of the process-ings of the Z [a,b ]variables.As an advantage no operand in the LIM needs to be blinded anymore.However,the drawback is that two random permu-tation vectors have to be stored.No extra ω-bit multiplication compared to the unprotected LIM is needed here.In the next section,we argue that the three countermeasures below do not fully hide the first-order leakage and we exhibit efficient attacks.5Attacks Against Horizontal SCA CountermeasuresThe attacks presented in this section are described in the Square and Multiply Always setting but are straightly applicable in the classical Square and Multiply setting.Blind Operands in LIM.In this case,the variable Z [a,b ]in (6)becomes:˜Z [a,b ]=(X 2+s [a ]−R 1)·(X 2+s [b ]−R 2).(7)According to (1),the observation l a,b of the ˜Z [a,b ]processing satisfies l a,b ← ϕa,b ˜Z [a,b ] +βa,b ,where it can be checked that a ˜Z [a,b ]depends on X2+s [b ],and hence on s .This dependency can be exploited in a Horizontal C-PA by correlating the means ¯l ·,b =1t +1 a l a,b with the predictions:h b =1t +1 a m a,b X 2+ˆs [a ]·X 2+ˆs [b ] ,(8)。