科技英语阅读课文翻译及部分课文摘要Unit1-10

合集下载

科技英语课文翻译

科技英语课文翻译

Unit 1大规模研究发现:地球的“健康”每况愈下有史以来对地球进行的最大规模的科学分析结果表明,地球上的许多生态系统都达不到标准。

由联合国主持的《千年生态系统评估综合报告》指出,由于不可持续的使用,地球上将近三分之二的用来维持生命的生态系统(包括干净的水源、纯净的空气以及稳定的气候)正遭受破坏。

以上大部分的破坏都是人类在过去的半个世纪里造成的。

据报告分析,随着人类对食物、淡水、木材、纤维以及燃料等资源的需求日趋激增,环境发生了极大的变化,引发了诸如滥伐森林、化学污染等问题。

因此,该报告的作者警告说,照此下去,本已岌岌可危的生态环境将会在21世纪的上半叶进一步恶化。

这项历史性的研究由来自世界95个国家的政府部门以及民间组织的1,300多位科学家共同完成。

四年来,他们考察了地球上许多生物的生长环境、物种以及将他们联系起来的生态体系。

联合国环境规划署对该报告进行了编辑整理并于昨天在中国北京公布了研究结果。

在公布该报告的新闻发布会上,联合国秘书长科菲·安南指出:“只有了解环境及其运作过程,我们才能制定出必要的措施加以保护它。

”他还说,“只有珍惜所有宝贵的自然资源和人类资源,我们才有希望去建设一个可持续发展的未来。

”对社会经济的影响该报告对自然界的大部分生物多样性持悲观态度,地球上可能有10%—30%的哺乳动物,鸟类以及两栖动物濒临灭绝。

这次大规模生态调查是根据安南的《千年发展目标》展开的,该发展目标是由联合国发起的,旨在2015年之前大幅减少饥饿与极度贫困等社会经济问题。

总部位于内罗毕的联合国环境规划署执行主席克劳斯·托普弗说:“从某些方面来说,《千年生态系统评估综合报告》让我们首次认识到生态系统服务功能的经济价值,并使我们对尊重和保护地球生命维护系统有了新的见解。

”目前由于人类社会对地球环境的开发利用,食物供应不断增加,然而增长的速度仍然太慢,难以完成联合国制定的在2015年之前消除全球一半饥饿人口的目标。

科技英语课文翻译和课后习题翻译

科技英语课文翻译和课后习题翻译

第一张机器人走进千家万户(1)比尔﹒盖茨设想一下:在一个新的产业诞生之际, 你目睹见证了这一切! 这个产业是在前所未有的新技术基础上发展起来的, 其中包括一些实力雄厚企业销售的高度专业化商务设备, 还有越来越多的新兴公司生产的新奇玩具、为玩具藏家青睐的机巧装置, 以及其他一些奇特有趣的特殊产品。

但同时, 这还是一个缺乏行业标准和平台的、尚不成规模的产业。

项目复杂, 进步缓慢, 实际应用更是少之有少。

事实上, 尽管对这个产业的未来充满热情和希望,但是没有人能明确地说出什么时间- 或究竟是否有可能-它能取得关键性的规模发展。

但是,若真能实现发展, 那么,它很可能改变整个世界。

当然, 上述描述可算是上世纪70 年代中期计算机产业的写照, 也就在那时, 保罗·艾伦和我成立了微软公司。

当时,部分大企业、政府部门和其他一些机构都在使用笨重、昂贵的主计算机进行后台运算。

知名大学和大型工业实验室的研究人员正试图建造出最基本的构件, 以使信息化时代的到来成为可能。

当时因特尔公司刚刚推出他们的8080 微处理器,安他利公司正在销售一款流行电子游戏Pong 。

而在一些自发组成的计算机俱乐部里,热忠于此的人们急切地努力探索这种新技术带来的好处究竟是什么。

但当时我脑海中所萦绕的则是更具前瞻性的问题:机器人产业即将作为一项新兴的产业而崛起,其当时的发展同30 年前计算机的发展如出一辙。

想想看, 目前汽车组装线上使用的制造型机器人已替代了昔日的主计算机。

这个产业其他的典型产品包括可进行外科手术的机器手, 在伊拉克和阿富汗用于路边及地面排雷的侦察机器人, 以及可以进行地板吸尘的家用机器人。

电子产品公司还推出了可模仿人类、或是狗、恐龙等的机器人玩具, 而玩具收藏者们正迫不及待地想要猎取一套乐高公司生产的最新机器人系列玩具。

与此同时, 世界尖端科技人员正试图解决机器人技术中最棘手的难题, 诸如视觉识别、远程操控、以及学习型机器等问题, 而且他们正在不断获得成功。

科技英语阅读翻译

科技英语阅读翻译

1all elements are composed of scattered units called atoms,which are the smallest particles than show the characteristics of the element. atoms are tiny units of matter composed of positively charged protons, negatively charged elements ,and electrically neutral neutrons. protons and neutrons, which have almost the same mass,are clustered in the nucleus in the middle of the atom. electrons,which are tiny in comparison to the other units, move around the nucleus at high speed. atoms that have the same number of electrons and protons are electrically neutral. those that have got or lost electrons,and therefor are positively or negatively charged, are called ions.所有的元素都称为原子的散射单元,这是比显示的元件的特性的最小的颗粒组成。

原子是微小单位的物质组成的带正电的质子,带负电荷的元件和电中性的中子。

质子和中子,它们具有几乎相同的质量,聚集在细胞核内的原子在中间。

的电子,这在其他单位相比是微小的,围绕原子核高速移动。

具有相同的电子和质子数的原子是电中性的。

研究生科技英语阅读课文翻译(1-10).

研究生科技英语阅读课文翻译(1-10).

Unit 1 Genetically modified foods -- Feed the World?If you want to spark a heated debate at a dinner party, bring up the topic of genetically modified foods. For many people, the concept of genetically altered, high-tech crop production raises all kinds of environmental, health, safety and ethical questions. Particularly in countries with long agrarian traditions -- and vocal green lobbies -- the idea seems against nature.如果你想在某次晚宴上挑起一场激烈的争论,那就提出转基因食品的话题吧。

对许多人来说,高科技的转基因作物生产的概念会带来诸如环境、健康、安全和伦理等方面的各种问题。

特别是在有悠久的农业生产传统和主张环保的游说集团的国家里,转基因食品的主意似乎有悖自然。

In fact, genetically modified foods are already very much a part of our lives. A third of the corn and more than half the soybeans and cotton grown in the US last year were the product of biotechnology, according to the Department of Agriculture. More than 65 million acres of genetically modified crops will be planted in the US this year. The genetic is out of the bottle.事实上,转基因食品已经成为我们生活重要的一部分。

科技英语阅读翻译(张敏)

科技英语阅读翻译(张敏)

Unlocking the Climate Puzzle解开气候之谜(1)Life has prospered on this planet for nearly four billion years. In that time, climate had fluctuated drastically, from ice ages lasting tens of thousands of years to epochs of steamy heat. With each change, sundry species have benefited and flourished.Others adapted, faltered, or died. Now, many experts believe, humans are imperiling their own ecological niche with the threat of global warming. The vaporous by—products of civilization, in the form of greenhouse gases such as carbon dioxide (C0₂), have trapped enough heat in the atmosphere to raise Earth's average surface air temperature a half degree Celsius (one degree Fahrenheit) during this century. If the trend continues, it could alter climate patterns worldwide-thawing glaciers, boosting sea level, scorching plains into deserts, and shifting vegetation zones。

科技英语课文句子翻译Unit1-10

科技英语课文句子翻译Unit1-10

Sentence TranslationUnit 1Text A1.However, the volume of business done on the Internet is growing rapidly, as people orderbooks and other products to make money transactions.但是,因特网上的交易数量急速增长,人们从网上购书和其他的产品,进行资金交易。

2.They use them to prowl the Internet, looking for ways to break into computers systems runby banks, telephone companies and even government departments.他们用电脑上网,寻找能够进入银行电脑系统、电话公司的电脑系统、甚至是政府的电脑系统的方式。

3.The first indication of a security breach may be when a customer discovers a fraudulentmoney transaction on a credit card account.当顾客发现信用卡的帐号上出现了来历不明的消费时,这可能就是安全受到了破坏的第一个标志。

4.The use of credit cards to buy things on the Internet converts the issue of Internet securityinto one of general security.用信用卡在网上购物使网络安全变成了大众所普遍关注的安全的一种5.Few people think twice about giving a credit card number over the phone and many areequally careless about what happens to the carbon copy when completing a transaction over the counter.很多人会在电话里随意报出自己的信用卡号码,同样地,也有很多人不留意交易完成后放在银行柜台上的副本。

科技英语阅读1-10篇原文word版

科技英语阅读1-10篇原文word版

科技英语阅读1-10篇word版I - 1 Safe Sex[1] for Your ComputerI hate to sound preachy[2], but if you come down a computer virus, it's probably your own fault. Dodging most of these electronic infections isn't very hard.The creations[3] of a small coterie of malicious hackers who invent toxic software for the sheer deviltry of it[4], viruses are short strings of software code that have three properties: First, they conceal themselves in legitimate files or programs; second, they replicate like bacteria to spread from machine to machine; and third, they do things to your computer that make you want to tear your hair out[5]. Viruses have been around[6] longer than PCs, and are not without a certain mathematical and[7] scientific interest. Indeed, not all viruses are malignant. Used properly[7] , viral techniques are a valuable programming tool. Used improperly, they are pestilentially destructive.There's no perfect cure. Like the flu, computer viruses evolve. Last year's immunization isn't any good for this year's disease because every time[8] someone invents a new medication, someone else invents a new malady. Nonetheless, a few simple precautions will buffer you against all but[9] the cleverest hacker.Rule one: Use good virus-checking software. Outfits like Network Associates-McAfee[10] and Symantec sell strong virus medicine, keeping their cures up-to-date by posting revisions at their Web sites[11]--which you should check often. Further, there are more than a dozen public domain virus checkers[12] that you can download for free. is a good place to find them. You can also get virus repellents from services like America Online[13]. But a word of caution[14]: Not every program fixes every virus, and when a new bug hits, the remedy takes a while to reach the market[15]. Rule: Back up[16] your data. Anyone who doesn't have a backup drive is begging for trouble[17]--and not just because of viruses. I keep a square 6.2-gigabyte disk drive hooked to my PC, religiously saving redundant copies of everything--but only after performing a virus check Storage is cheap, and I'd rather be safe than sorry[18]. Rule three: Whenever you load a new file or application software onto your computer, immediately pass it through antivirus software. Most viruses aren't activated--and will not spread --until you use the stuff in which they're hiding. You can catch them and kill them before they do any harm. Rule four: Don't take candy from strangers--or careless friends. These days most viruses and their cousins[19], network-infecting worms[20], are spread through files attached to e-mail or downloaded from the Web. If you receive mail with a file hooked to it from someone you don't know, then do not open that file. (If your e-mail program automatically opens attachments, get a new e-mail program.) Instead, do what I do: Write a polite note to the sender saying you don't accept downloads, but will be more than happy[21] to look at a plain-text version[22] of the document he or she is trying to send you. Slightly more risky, you can open a file as plain ASCII text[23]; most executable commands within it simply become hieroglyphics on your screen. By the same token[24], avoid downloading anything from dubious sites. Even the most innocuous-seeming document can be a viral carrier. But don't be paranoid, either; Web sites run by reputable outfits (especially the ones that certify they've checked material for downloading with a well-known antivirus program) generally can be trusted.Rule five: Postpone that upgrade[25]. New versions of the most popular operating systems and application software attract virus writers like[26] sugar attracts flies. I haven't upgraded my e-mail program since 1995 or my word processor since 1996; they work just fine and are too old to attract hackers.Last role: Don't panic. If you get zapped by a virus[27] and don't have an uncorrupted spare hard drive to reboot from[28], then use a friend s computer to search the Web[29] for a cure.Odds are, if the virus has exploited a weakness in a major software vendor's product, that vendor will have a remedy at its Web site[30].Where viruses are concerned, what grandma used to tell you is extremely relevant: An ounce of prevention is worth a pound of cure[31].I - 2 Caught iii[32] the Web of the InternetIt's[33] the equivalent of inviting sex addicts to a brothel or holding an Alcoholics Anonymous[34] (AA) meeting at the pub. Intemet addicts tired of[35] their square-eyed, keyboard tapping ways[36] need look no further than[37] the Web for counseling. There is now an online counseling service at for Intemet obsessives. Just e-mail the details of your Intemet-induced crisis and help comes direct to your inbox. The new breed of cybertherapists see nothing strange about offering help through the very medium that is swallowing their clients' free time and splitting their marriages.Sue Hine, of Relationship Services, says: "Intemet obsession has become a more noticeable problem over the last 18 months. At least this[38] is an area addicts are familiar with and they'll be able to use it as a tool to overcome their obsession." Nor do experts worry that the Relate Website[39] might become a favourite--a place to spend hours online in the name of Intemet therapy. Dependency is always a risk with any form of counseling[40]. There are various strategies we can adopt to keep that in perspective[41], says Hine.Though some may regard Intemet addiotion as another dubious ailment dreamed up to keep therapists in work[42], Relationship Services says the problem is real.Intemet usage is up to four-and-a-half hours on the Web each week, compared to three-and-a-half hours a year ago. Therapist Robin Paul says there tend to be two scenarios[43]. Some people meet through chatrooms and fall in love. It's like having an affair[44], then they meet and it's like a whirlwind honeymoon. It's devastating for the person left behind[45] and quite often it has no real foundation."I saw one couple who were still together but it was very rocky[46]. He met someone on the Net and went overseas to meet the woman. Then he left his wife and children to be with her. In another case I saw recently, a man left his three children to be with a woman (who was) leaving her four children. It's terribly hard on the kids[47] when this happens.""The second scenario is that a person starts spending more and more time on the Net. They may not meet someone else but they don't spend any time with their partner and of course the relationship suffers."Such stories may appear to be almost urban legends, so ashamed are Intemet addicts and their partners[48]. After all, who wants to admit they have a 100 a day habit (e-mails, that is) or are somehow less alluring than a piece of hardware? But in America, which has long had a love affair with[49] both therapy and the Net, these stories are common.A recent survey of 17,251 Intemet users found nearly 6 per cent had some sort of addiction to the medium[50]. They revealed that their online habit contributed to disrupted marriages, childhood delinquency, crime and overspending.Tap into online addiction sites and[51] you'll find messages such as: "Hello, my name is Bob and I'm a Webaholic."Witness the plight of Ohio woman Kelli Michetti, who literally became a computer hacker because of her husband's constant online chatting. When she crashed a meat cleaver[52] through her husband's computer terminal that[53] solved the problem, although naturally it led to difficulties with the police.Or take the classic Intemet addiction story of Ingrid Parker, a woman who became such a slave to the Intemet--especially chat rooms--that it took over her life[54]. She made do[55] with two hours' sleep a night, had marathon weekend computer sessions[56] of up to 17 hours and fell in love with a married man in the US state of Oregon.Her computer dream turned to nightmare when she sold up and moved to be with her cyberpal (who had just left his wife), only to be told[57] a week later that the couple were getting back together.The heart-breaking turn of events gave her the motivation to control her addiction--and write the book Caught in the Web.Dr Kimberly Young, who set up The Center for Online Addiction[58] () in America, studied 396 people whom she considered were psychologically dependent on the Net. They ranged in age from 14 to 70 and spent an average of 38.5 hours a week on the Web.Her study, backed by further research in Britain, found that women were more likely to become addicts. So while the old stereotypical addict was a young man who spent hours playing games, downloading software or reading messages on newsgroups, the new image is of a youngwoman who fritters away hours e-mailing friends, buying books and CDs online, talking in chatrooms and looking for information for next year's holiday[59]"I guess I was a typical example of someone hooked on the Intemet," says Parker, who now spends just an hour a day online. "I was coming home at lunchtime to get on the computer. At 6 p.m., I'd feed my son and put him to bed but all the time I was going backwards and forwards to the computer. Then I'd stay up until 5 a.m. or 6 a.m., typing away[60] 'chatting' on my computer screen all night.""I learned from my experience with romance on the Net that people aren't always what they seem. The guy I met, for example, was very nice but also quite mixed up[61]. The trouble is you get[62] lonely housewives talking to someone and they think, 'This guy sounds nice compared to what I've got."[63]But I don't think anyone who is married or in a sound relationship should really be spending hours talking to someone else and ignoring their nearest and dearest. While Parker provided her own therapy by putting her experiences down on paper, she recommends others take up the online counseling offer, or log off from the Worldwide Web gradually."It is like smoking. It's not a good idea to suddenly go cold turkey[64]. People often e-mail me about the problem and I tell them to gradually wean themselves off and not to switch to a scheme where you pay per hour for online time[65]. If they break their resolution, all[66] they end up with then is the same old problem plus money difficulties for the long hours they have spent log ged in to[67] the Intemet."Computer whizz Steve Phillips grins at the mention of[68] Intemet Addiction Disorder (IAD)[69]--he's been there, done that[70] Now 28, and a seven-year veteran on the Intemet[71], he spends a mere 10 to 15 hours "for entertainment" on the Web each week. A few years ago, when he was in the grip of his addiction[72], that was the amount of time--10 to 15 hours--he spent online each day."I'd go to polytechnic and log on[73] at 9 a.m. and sometimes I'd stay online until 9 at night. Then I'd go home and plug in the laptop and stay online until 4 or 5 a.m.," says the Intemet systems maintenance expert.You always hear about Intemet addicts being isolated but in fact the Web was very social. I wasn't addicted to the/Net. I was addicted to the social side of meeting and talking to people every day."While other Intemet junkies spend their hours searching for nuggets[74] of information or downloading MP3 music programmes, the lure for Phillips was the chat service Intemet Relay Chat."I was doing a computer course and a lot of people on the Net at the time were in computing[75] It helped a lot."It didn't help enough, however, for him to pass all his tests. He cheerily admits he failed exams two years in a row because of his Intemet addiction. Later, he also lost a girlfriend who felt the computer was his first love."I justified it by saying I was building up a business[76], but in fact I was just too keen on the Intemet."The habit started hitting hard[77] when he finished his studies in the big city and moved back home. Without the support of a school paid computer, he racked up hundreds of dollars in ntemet-related toll bills[78]. The huge expense, followed by a few months offiine while he searched for a job, was the wake-up call he needed."When I got access again it didn't have the same appeal any more. Now I use it more as a tool, but I would say a lot of my friends are addicts. One friend was talking about a deal with a set rate for 200 hours of Intemet access a month. He said that wouldn't be enough. I end up counseling people about it because I've been through it. It definitely isn't worth neglecting real-life relationships for romances on the Net[79]. Often they don't work out." [80] Phillips should know. A few years ago he became heavily involved with an American woman he had spent a couple of years chatting to. Wisely, they decided not to make any commitment to marriage until they had met face-to-face. Phillips spent a month in the United States before they agreed the relationship wouldn't work. "Because I've been on the Net so long I've got some good friends that I've been chatting to for years. I occasionally meet people I'vetalked to online at the pub, and I could certainly travel through America on a budget[81] know so many people there.""The Intemet is definitely addictive but if you can keep it in control it has.advantages, too. Using it can be a steep learning curve so it helps you become very quick at learning. Also there is a huge demand for people in the field of Information Technology (IT) and hours on the Intemet are great training."[82]I - 3 Why Cloning of Humans Must Forever Be Seen as UnethicalIn February 1997, my colleagues and I announced the arrival of Dolly the sheep, the first mammal cloned from an adult cell. The reaction of the scientific community was, on the whole, friendly, if[83] somewhat incredulous. In contrast, the public's reaction was extremely negative, primed partly by a media weaned old a diet of cloning scare stories and pulp fiction [84].The issue was not that this new technology created an abomination, a freak animal; after all, Dolly was,and remains, a rather handsome sheep. It[85] was the fear that the techniques could, and some said would, be applied to humans that provoked the//enzied debateThe first old chestnut[86] raised was that there would be the clomng of dictators, followed by[87] these possibilities,positive and negative: celebrity cloning,self-cloning,the pre-selection of citizens by the state with its echoes of[88] Aldous Huxley's futuristic novel Brave New World,the reincamation of dead loved ones, treatment for infertile couples, a route to avoid parental genetic disease being passed on to children and a way to cure terminal illness.Enough time has passed since Dolly's arrival for[89] a sober, thorough reassessment of the prospects for human cloning and what it is about such cloning that causes people fear and concern[90].Many people had a genuine gut.reaction to[91] news of Dolly, and that apparently remains undiminished in its intensity. An affront to nature, a blasphemy, man playing God--such comments were often made. But we should recognize that human reproduction is a sensitive topic and a new method that has an impact on human reproduction will always be greeted with fear and revulsion by the majority who have no problems procreating[92].The techniques of donor sperm insemination and in vitro fertilization, introduced in the 1950s and 1970s respectively, were met with great hostility and threats of criminal legislation[93] in some countries.That hostility moderated over the years as some early fears evaporated, and great joy was brought to some couples. But controversy remains in the very low success rates in IVF, and in the disputes that can arise over legal paternity between a child's biological and non-biological parents[94]. Although human cloning would further complicate the legal issues, this is not grounds for banning it.Charges that Man is "playing God" by controlling Nature are easily dismissed because, for as long as[95] he has been able to intervene in nature, Man has been "playing God." Medical practice is just one example.As to the cloning of dictators and celebrities, or the manufacture of a "super race," we all understand that genetic identity does not guarantee identical personality and behaviour. These uses, along with the cloning of dead loved ones, are unethical: they inevitably diminish the new individual's sense of esteem and identity[96] because may consider themselves to be the product of an assembly line.I would argue that human cloning denies an individual's right to inherit a unique set of genes; unique because that particular permutation has not appeared before. It is inherently unfair that we should be able to choose the genetics of our offspring. Admittedly, already, through our own genotypes, and by our choice of mate[97], we limit the gene pool[98] available to each child.Cloning removes the chance element from the lottery of reproduction[99]. A cloned child would be born with a baggage of unrealistic expectations and hopes for his or her development and future achievements. Most parents have hopes for their children, but here the parents' aspirations would be press-ganged by what had transpired in the line of the original clone[100].Human cloning is unsafe. The process that led to Dolly began with the transfer of the nucleus of an adult cell[101] to an unfertilized egg taken from a donor animal[102] by a process known ascell fusion. The "reconstructed" embryo is cultured[103] and eventually returned to the womb of a foster mother[104] and brought to term[105].From more than 430 attempted fusions, 277 reconstructed embryos were made in this way; of these[106], only 29 survived to the stage that they could be returned to foster mothers, and only one survived to term. In other experiments, some of the lost fetuses were abnormal. Just think of the huge waste of material and human suffering such a low success rate would imply.As well, there are grounds for believing that, as we get older, our cellular DNA gradually accumulates mutations and suffers other changes, which account for why we are increasingly likely to develop cancer as we get older. A person cloned from an adult cell might have a higher risk of cancer or premature aging[107], but we wouldn't know that for years[108]. Is society prepared to take that risk?Not all uncertainties can be wiped from the system by animal experiments. There are too many differences between mammals and their reproductive physiology and embryology to be sure that[109] no deformed foetus or infant would be bom. No doctor could take that risk. Cloning would join the unsafe drug Thalidomide in the teratogenic hall of infamy[110]. All new medical advances are potentially unsafe, and no progress would be made if safety alone were the issue[111].But risk-to-benefit ratios[112] are always considered before new treatments are sanctioned. Their application to new productive treatments is particularly problematic because whose risk are we talking about--that of the egg donor, womb donor or the unborn child?Perhaps the only reasonable case for human cloning is when the prospective mother suffers from a genetic disease not attributable to main body of genes found in the nucleus, but to genes elsewhere in the cell. With all existing methods of conception, both natural and assisted, all children of such women would inherit the disease causing genes[113].A case[114] has been made for such women conceiving[115] normally and then allowing a cell from the doomed embryo to be fused to the fertilized egg from a healthy human egg donor. If successful, this would result in a child free from the disease which has a unique genetic blueprint and oneIH61 made up from equal contributions from the original couple. Using such an early donor cell might avoid the risk, of accumulated DNA damage. Even so, with[117] a frequency of mitrochrondrial disease of one in 20,000[118], the procedural risk greatly outweighs the benefit.So human cloning is, and will, I hope, continue, to be unethical. A child so "manufactured" could be a 21St-century circus actIl 191. Even if the child's uniqueness is not compromised[120], the technique is unsafe and inefficient and the risks greatly outweigh any marginal benefit.The question of whether the research should have been done is often asked. The answer has to be an unequivocal "yes." There is an immense potential for non-human cloning work to provide insight and benefit for the human condition[121]I - 4 The Ancient History of the InternetThe Intemet seems so information-age[122], that[123] its devotees might find the circumstances of its birth hard to grasp. More than anything else, the computer network connecting tens of millions of users stands as a modem--albeit unintended--monument to military plans for fighting three wars. Specifically, the Net owes its existence to Allied battle strategies[124] during World War II, to the geopolitical pressures of the Cold War, and to preparations for the postapocalypse of nuclear holocaust[125] (the never-fought "final war" with the Soviet Union).As with[126] most great advances in the history of ideas, there was no one defining[127] Intemet event. It began with a modest[128]. analytical system, devised early in World War II, that set the stage for[129] the supportive research environment and the key technical developments that produced today's global network.The analytical system, called operations research[130] (O.R.), applied scientific modeling principles to military planning. The first O.R. was done for the Allies by military scientists and civilian technologists. These boffins conducted statistical studies of antisubmarine tactics that showed how the Allies could increase the U-boat kill rate[131] by setting the charges to explode a t a different depth.Following the victories in Europe and Japan, American military planners turned attention to their new Cold War adversaries, primarily the Soviet Union but also China (known then as Red China). The three U.S. military services[132] contracted out[133] O.R. work to universities and nonprofit corporations. This produced, among others, the Center for Naval Analysis, administered by the Franklin Institute, in Philadelphia, Pennsylvania; the Army-backed Operations Research Office, run by Johns Hopkins University in Baltimore, Maryland; and, perhaps the most effective of all, the RAND Corporation[134], the Air Force's principal advisory organization. The Defense Department created yet another O.R. group, the Advanced Research Projects Agency, and charged it with[135] doling out high-tech research funds.Among ARPA's first priorities were projects[136] on command, control and communication, known among war planners as C3. The Defense Department wanted to use computers not only in the Pentagon but also in the field. Bulky, balky[137] mainframes of the era were ill suited for the battlefield, so ARPA sought a communications solution. For signals sent from a battlefield terminal to reach a headquarters-based computer[138], they would have to be translated from wire to radio to satellite and back. Nothing like it had ever been done before. In fact, most computer time-sharing[139] then involved transportation rather than communication: Computer scientists keyed their jobs onto paper tapes or punch cards and then shipped them to the closest computing center.At the same time, America's command posts[140] were burrowing underground in the name of C3/nd "nuclear survivability." NORAD[141], the air defense headquarters, carved a control center into the side of a Colorado mountain[142]. In Washington, nuclear-war plans called for evacuating the president and key officials to supersecret reinforced shelters in the Catoctin Mountains in nearbyMaryland, while all 535 members of Congress were supposed to hold up in an elaborate complex under the grounds of the Greenbrier Hotel in White Sulphur Springs, West Virginia. From these subterranean hideouts, federal officials would govern the nation--that is, the parts that survived.The war-planning needs of the military and the research interests of computer scientists began to converge. The Pentagon asked RAND to analyze how the military could communicate (by voice telephone as well as data hookups) after a nuclear war. The existing phone network seemed far too fragile for such a task.RAND's solution, developed by Paul Baran on an Air Force contract, was a network that could route around damageI1431 and continue to communicate. In such a system, Baran wrote, "there would be no obvious central command and control point, but all surviving points would be able to re-establish contact in the event of an attack on any one point" through a "redundancy of connectivity." The key to creating this survivable grid[144] was what later came to be called packet switching[145].Baran, at RAND, did the basic research on packet switching, but many of his reports were classified. Donald Davies of the National Physical Laboratory in Britain independently outlined the same general concept and contributed the word "packet" for the message components[146]. Other researchers also began to focus on the idea of a packet-switching architecture.It[147] was an idea that appealed to ARPA, particularly its Command and Control Research Office, headed by a computer scientist named J. C. R. Licklider.As part of its research support, ARPA agreed to fund an experimental computer network. The network, ARPA officials hoped, would demonstrate the feasibility of remote computing from[148] the battlefield as well as test the potential of a post-World War IH military communications network. In addition, the network would enable widely dispersed researchers to share the few supercomputers of the era, so that the Defense Department would not have to buy one for every contractor. In 1968, ARPA solicited bids for[149] an expandable network linking four sites already conducting ARPA research: the University of California campuses at Los Angeles (UCLA) and Santa Barbara (UCSB), the Stanford Research Institute (SRI) in Stanford, California, and the University of Utah (Salt Lake City).The ARPAnet construction contract was awarded to Bolt Beranek & Newman (BBN), a research finn based in Cambridge, Massachusetts, which had close ties to MIT. BBN shipped the new communications software in August 1969 to UCLA and then to SRI in October. At a November demonstration the two California machines exchanged data. The first long-distancepacket-switching network was in operation. By the end of the year, all four nodes were online.At this point, the striking figure of[150] Vinton Cerf, the computer scientist The New York Times called the father of the Intemet[151], begins to take a leading role in the narrative[152] Born in 1943 in New Haven, Connecticut, Cerf turned his back on Yale University to do his undergraduate work in mathematics at Stanford University and to get his master's and doctorate in computer science from UCLA. In 1969, Cerf was a graduate student working at UCLA's Network Measurement Center, observing how the new four-node ARPAnet was functioning--and what it would take to make it malfunction.Soon he was collaborating with Robert Kahn, an MIT math professor on leave to work at BBN[153]. Cerf and Kahn developed a set of software "protocols" to enable different types of computers to exchange packets, despite varying packet sizes and computer clock speeds. The result[154], TCP/IP was released in 1973 (by which[155] time Cerf was teaching at Stanford). TCP--Transmission Control Protocol--converts messages into packet streams and reassembles them. IP --Intemet Protocol--transports the packets across different nodes, even different types of networks. Cerf credits[156] many people, "thousands by now," for helping create the computer-network communications system we have come to know.In 1977, having left Stanford for ARPA (then called DARPA, the D for "Defense" added in 1972), Cerf worked on a different sort of interconnectivity. From a van cruising along a San Francisco Bay Area freeway, a computer sent messages that traveled, by packet radio, satellite, and landlines, a total of 94,000 miles (150,400 km). "We didn't lose a bit!" Cerf later recalled. The project demonstrated that computers could communicate to and from the battlefield.Cerf has suffered severely impaired hearing since birth and has worn a hearing aid since he was 14. It is serendipitous but fitting, then, that his TCP/IP made possible[157] the textbased Net communications systems so popular today, including electronic mail (e-mail), discussion lists, file indexing and hypertext. E-mail, of course, is the most widely used of the Net services, the most convenient and the most functional.By the mid-1980s, TCP/IP was linking ARPAnet to other networks, including the NSFnet of the National Science Foundation, another federal agency, and Usenet, a network created by graduate students at the University of North Carolina and Duke University, also in North Carolina. The result was first called ARPA-Intemet and then simply the Intemet. ARPAnet split in two, with military communications going onto MILNET and the computer researchers finally taking over ARPAnet in name as well as in practice. ARPAnet shut down in 1990, and NSFnet went off-line last April, the most heavily traveled routes of the information superhighway now are in private hands. Nearly all the various networks used the TCP/IP language. "I take great pride in the fact that the Intemet has been able to migrate itself on top of[158] every communications capability invented in the past twenty years," Cerf told Computerworld in 1994. "I think that's not a bad achievement."I - 5 The World of E-Books Is HereAlan Brooker and Loren Teague are authors who have a book due out[159] soon. You probably won't find their titles on the shelves of your local book store. Their prose is published in computerized, digital bits. They are authors publishing e-books (short for "electronic books" or[160] books published only on the Intemet, and not in paper form).They're not getting big fat advances[161] from publishers. Not even a small cheque. Instead, Brooker will get 35 per cent of each e-book sold[162], and Teague will get 30 per cent. That's way[163] above what either could expect in royalties[164] if their titles were published in the familiar book format, as beautifully bound bits of trees[165].The usual author royalty is anywhere between ten and fifteen percent of a book's selling price. But the large percentage royalty for an e-book will come from a much smaller price--e-books sell online for somewhere between $ US 2.50 and $ US 7 a copy, compared to the bookstore retail price of between $ US 10 and $ US 90 depending on the size and quality of the publication.But how many e-book copies can authors expect to sell in an electronic market which is。

研究生科技英语阅读课文翻译(1-10)

研究生科技英语阅读课文翻译(1-10)

Unit 1 Genetically modified foods -- Feed the World?If you want to spark a heated debate at a dinner party, bring up the topic of genetically modified foods. For many people, the concept of genetically altered, high-tech crop production raises all kinds of environmental, health, safety and ethical questions. Particularly in countries with long agrarian traditions -- and vocal green lobbies -- the idea seems against nature.如果你想在某次晚宴上挑起一场激烈的争论,那就提出转基因食品的话题吧。

对许多人来说,高科技的转基因作物生产的概念会带来诸如环境、健康、安全和伦理等方面的各种问题。

特别是在有悠久的农业生产传统和主张环保的游说集团的国家里,转基因食品的主意似乎有悖自然。

In fact, genetically modified foods are already very much a part of our lives. A third of the corn and more than half the soybeans and cotton grown in the US last year were the product of biotechnology, according to the Department of Agriculture. More than 65 million acres of genetically modified crops will be planted in the US this year. The genetic is out of the bottle.事实上,转基因食品已经成为我们生活重要的一部分。

《科技英语》翻译

《科技英语》翻译

Unit 1 Text科学的方法解释我们知道的事实是科学家的事情。

当他能解释的时候,他选择对照试验。

如果他想找到光对于植物的影响,他将会取许多尽可能相像的植物,时而他在阳光下,时而在阴影中,时而在黑暗中,所有的时间保持其他所有的条件(温度,养分)相同。

以这种方式,通过保持其他条件恒定,然后只改变光,光对植物的影响能够被清晰的看到。

使用控制变量的这种方法与研究铁生锈一定要有一定的湿度和哪种豆类一季的产量最高是不同的。

在探究的过程中,科学家发现对于一个现实中增长的数字,他所想的是普通的解释。

如果这个解释能持续适应变化的现实,就被称作假设。

如果一个假设一直满足着无数实验的测试并且不动摇,它就成为定律。

这个科学中的定律与国家法律是不同的。

首先,一个科学定律在任何时候都是需要修改的。

当发现一个事实使人感到与该定律应得出的预期结果相矛盾的时候,就会发生这种情况。

事实上,有的定律也许不得不被放弃。

第二,一个科学定律说“这个可能是这样解释的”或者“这解释了关于它们的众所周知的事实”。

但是一个国家的法律说“你必须。

”或者“你禁止。

”。

科学的定律没有道德上的力量;它既不结合人类的行为,也不被人类的道德支持或反对。

科学家总是最欣慰于发现很多现象潜在的解释,表明它证明可能性的变化,没有费周折。

通过适当的被安排的决定性的实验,表明了他所拥有的假设的准确性。

如果他们的解释是正确的,指出设计用来解答新问题的实验,他们也会很欣慰。

科学家的好奇心是永远不会满足的。

证据表明,宇宙的广阔和结构的复杂度正在以一个惊人的速度增长。

每一项新的发现说明“已经知道的”和“可以被知道的”之间的差距不但没有缩小,反而还在增大。

新鲜的,未开发的领域永远开放着。

在19和20世纪,科学知识的迅速增加容易给学生和教师们留下这样的印象——一个问题刚刚阐述,答案就揭晓了。

一个更细节化的对于科学历史的研究纠正了“基本发现是在戏剧性的意外中产生的”的印象。

甚至是在我们当代,将放射能的发现从对于第一个原子弹的解释之中分离出来不少于五十年。

科技英语翻译unit10

科技英语翻译unit10

科技英语翻译unit10第一篇:科技英语翻译unit10第十单元寻找生命课文A天体生物学到目前为止我们还没有人见过外星生物,对于天体生物学来说这似乎是个问题。

但在过去的20多年中,科学家们已经发现了一些蛛丝马迹,显示宇宙间生命或许并不罕见。

许多科学家充满希望,认为不久将能找到外星生命的有力证据。

其中的一些线索来自陆地生命。

生物学家们发现了多种嗜极生物,即可以在极端环境(如碱性湖泊和地下深处的岩石缝隙)中蓬勃生长的微生物。

生命可能起源于海底的地热口或火山口附近,这可能是其他行星和卫星的共同特点。

在陨石撞击地球并造成晚期宇宙大爆炸之后不久,在地球的岩石中出现了新陈代谢活动留下的化学痕迹,这意味着生命的起源或许是个快速、简单的过程。

来自火星的陨石不时地撞击地球。

尽管面临着低温和强烈的辐射,陨石上的细菌及其孢子很有可能在这种空间之旅中存活下来,这意味着原始生命有可能一度被太阳系的行星携带到四面八方,这一理论被称为胚种论。

火星微生物1996年,有一组科学家声称一颗代号为ALH84001的火星陨石含有火星的化石纳米细菌。

虽然他们的多数证据已被证实并不可信,但对此持有怀疑的人也无法充分解释在ALH84001号火星陨石中为什么会有磁晶体,因为它们与地球细菌产生的晶体十分相似。

虽然火星曾一度被认为是个干燥、贫瘠的星球,但来自欧洲航天局的火星特快飞船、美国国家航空航天局的月球车以及“勇气号”和“机遇号”火星车的最新证据表明,火星表面或接近表面的部分有液体水存在的迹象。

看来数十亿年前火星曾有过一段短暂的温暖、湿润的时期,甚至在今天火星表面仍可能不时有水流动。

也许火星表面以下存在一个更适于微生物栖身的“港湾”,因为那里永久存在着液态水,而且危险的太阳紫外线辐射也无法穿透表层照射到那里。

最近还发现在火星大气中存在着甲烷,这可能是生活在深层的细菌产生的副产品。

科学家已制定了一系列计划来寻找更明确的生命迹象,其中包括制造新的飞船以取代失踪的比格II号,并最终完成美国太空取样重返地球的宏伟计划。

科技英语原文及简单翻译

科技英语原文及简单翻译

How ASIMO WorksIntroduction to How ASIMO WorksWant a robot to cook your dinner, do your homework, clean your house, or get your groceries? Robots already do a lot of the jobs that we humans don't want to do, can't do, or simply can't do as well as our robotic counterparts.Honda engineers have been busy creating the ASIMO robot for more than 20 years. In this article, we'll find out what makes ASIMO the most advanced humanoid robot to date.The Honda Motor Company developed ASIMO, which stands for Advanced Step in Innovative Mobility, and is the most advanced humanoid robot in the world. According to the ASIMO Web site, ASIMO is the first humanoid robot in the world that can walk independently and climb stairs.Rather than building a robot that would be another toy, Honda wanted to create a robot that would be a helper for people -- a robot to help around the house, help the elderly, or help someone confined to a wheelchair or bed. ASIMO is 4 feet 3 inches (1.3 meters) high, This allows ASIMO to do the jobs it was created to do without being too big and menacing.ASIMO's Motion: Walk Like a HumanHonda researchers began by studying the legs of insects, mammals, and the motion of a mountain climber with prosthetic legs to better understand the physiology and all of the things that take place when we walk -- particularly in the joints. For example, the fact that we shift our weight using our bodies and especially our arms in order to balance was very important in getting ASIMO's walking mechanism right. The fact that we have toes that help with our balance was also taken into consideration: ASIMO actually has soft projections on its feet that play a similar role to the one our toes play when we walk. This soft material also absorbs impact on the joints, just as our soft tissues do when we walk.ASIMO has hip, knee, and foot joints. Robots have joints that researchers refer to as "degrees of freedom." A single degree of freedom allows movement either right and left or up and down. ASIMO has 34 degrees of freedom spread over different points of its body in order to allow it to move freely. There are three degrees of freedom in ASIMO's neck, seven on each arm and six on each leg. The number of degrees offreedom necessary for ASIMO's legs was decided by measuring human joint movement while walking on flat ground, climbing stairs and running.ASIMO also has a speed sensor and a gyroscope sensor mounted on its body. They perform the tasks of:∙sensing the position of ASIMO's body and the speed at which it is moving ∙relaying adjustments for balance to the central computerThese sensors work similarly to our inner ears in the way they maintain balance and orientation.ASIMO also has floor surface sensors in its feet and six ultrasonic sensors in its midsection. These sensors enhance ASIMO's ability to interact with its environment by detecting objects around ASIMO and comparing gathered information with maps of the area stored in ASIMO's memory.To accomplish the job our muscles and skin do in sensing muscle power, pressure and joint angles, ASIMO has both joint-angle sensors and a six-axis force sensor.Unless you know a lot about robotics, you may not fully grasp the incredible milestone it is that ASIMO walks as we do. The most significant part of ASIMO's walk is the turning capabilities. Rather than having to stop and shuffle, stop and shuffle, and stop and shuffle into a new direction, ASIMO leans and smoothly turns just like a human. ASIMO can also self-adjust its steps in case it stumbles, is pushed, or otherwise encounters something that alters normal walking.In order to accomplish this, ASIMO's engineers had to find a way to work with the inertial forces created when walking. For example, the earth's gravity creates a force, as does the speed at which you walk. Those two forces are called the "total inertial force." There is also the force created when your foot connects with the ground, called the "ground reaction force." These forces have to balance out, and posture has to work to make it happen. This is called the "zero moment point" (ZMP).To control ASIMO's posture, engineers worked on three areas of control:∙Floor reaction control means that the soles of the feet absorb floor unevenness while still maintaining a firm stance.∙Target ZMP control means that when ASIMO can't stand firmly and its body begins to fall forward, it maintains position by moving its upper body in the direction opposite the impending fall. At the same time, it speeds up its walking to quickly counterbalance the fall.∙Foot-planting location control kicks in when the target ZMP control has been activated. It adjusts the length of the step to regain the right relationship between the position and speed of the body and the length of the step.ASIMO's Motion: Smooth MovesASIMO can sense falling movements and react to them quickly; but ASIMO's engineers wanted more. They wanted the robot to have a smooth gait as well as do something that other robots can't do -- turn without stopping.When we walk around corners, we shift our center of gravity into the turn. ASIMO uses a technology called "predictive movement control," also called Honda's Intelligent Real-Time Flexible Walking Technology or I-Walk, to accomplish that same thing. ASIMO predicts how much it should shift its center of gravity to the inside of the turn and how long that shift should be maintained. Because this technolgy works in real time, ASIMO can do this without stopping between steps, which other robots must do.Essentially, with every step ASIMO takes, it has to determine its inertia and then predict how its weight needs to be shifted for the next step in order to walk and turn smoothly. It adjusts any of the following factors in order to maintain the right position:∙the length of its steps∙its body position∙its speed∙the direction in which it is steppingWhile reproducing a human-like walk is an amazing achievement, ASIMO can now run at speeds up to 3.7 miles per hour (6 kilometers per hour). In order to qualify as a true running robot, ASIMO must have both feet off the ground for an instant in each step. ASIMO manages to be airborne for .08 seconds with each step while running.Honda engineers encountered an entirely new set of challenges while trying to give ASIMO the ability to run. They gave ASIMO’s torso a degree of freedom to aid in bending and twisting so that the robot could adjust its posture while airborne. Without this ability, ASIMO would lose control while airborne, possibly spinning in the air or tripping when landing.In order to make turns smoothly while running, the engineers enhanced ASIMO's ability to tilt its center of gravity inside turns to maintain balance and counteractcentrifugal force. ASIMO could even anticipate turns and begin to lean into them before starting the turn, much like you would if you were skiing or skating.ASIMO如何工作介绍如何工作。

科技英语课文翻译及课后答案

科技英语课文翻译及课后答案

第一单元自动化第二部分阅读A自动化的含义“自动化”已经是,而且现在仍然是,一个被大量滥用的词。

但是,人们对其确切的意义以及所包括的内容,正在逐渐地有了较为正确的了解。

如果不是下一个定义的话,我也许可以尝试作些解释,把自动化说成是一个概念。

运用这个概念,人们通过对机器装置的性能进行充分的测量、观察和控制,从而使其以最高的效率运转。

这需要对这种装置的功能有一个详细而连贯性的了解,以便需要时便能运用最佳的矫正操作。

自动化按其确切的意义,只有全面运用通信、计算和控制三个主要组成部分(“三C" )才能完全实现。

我认为,确保人们对合为一体的三个组成部分对我们的社会所蕴含着的某些意义有所认识和了解,是很有必要的。

首先,我们不妨考虑工业部门之一的炼钢工业。

在炼钢工业中,自动化已经开始成型。

到过钢厂的人都会知道从高炉开始的各种工艺流程的一些情况,成品条钢或板钢生产出来之后,再准备送往制造工艺车间或汽车厂,这些工艺流程是相互链接的。

为了使工厂中各个车间充分发挥效率,可以使用计算机来控制每个车间。

在此之前,计算机工作所需要的一切资料均输入机内。

就高炉来说,需要给计算机提供装人高炉的原料的信息、高炉工作温度的信息和处理各种各样配料的最好方法等方面的资料。

钢厂的高炉操作是一项复杂而要求技术熟练的作业,需要大量的知识和大量的综合信息,并迅速地做出判定选择,以便确保高炉工艺流程中的下一阶段的有效工作。

计算机对所有这一切都了解得很透彻,能够做出非常大量的中间判定,并且能够把全部信息立刻和不间断地提供给管理人员,以使他们做出高效管理这个工厂所需要的最后决定。

由此产生的信息数据和判定要进行处理,然后转送到下一个工序。

在这里,对操作的一些专门细节再次进行整理,提出最佳和最终的判定,然后对这些信息再一次进行处理并输送给下一道工序。

同时,当信息数据从生产单元的一道工序输送到下一工序并完全结合成为一项新的操作时,每次变化的结果反馈到最初阶段,而且,不断地做进一步的调整,结果是整个工厂的工艺流程便能够高效率地进行下去。

科技英语阅读课文翻译

科技英语阅读课文翻译

第一单元什么是罗素悖论?约翰·T·鲍德温,奥利弗·莱斯曼撰胡志国译罗素悖论是建立在这样的实例基础之上的:想象有一群理发师,他们(给所有,而且)只给不给自己刮胡子的人刮胡子。

假设这个集体中有一个理发师,他不给自己刮胡子,那么,按照这个集体的定义,他就必须给自己刮胡子。

但这个集体中的任何理发师都不能给自己刮胡子。

(否则,他就是在给自己刮胡子的人刮胡子了。

)伯特兰·罗素1901年发现的这个悖论是对他的一位数学同行的打击。

十九世纪晚期,戈特洛布·弗雷格试图通过符号逻辑为所有的数学建立一个基础。

他在形式表达式(如x=2)和数学特征(如偶数)之间建立了一种对应关系。

在他的推导中,人们可以随意使用任何特征为后来的特征定义。

罗素在他1903年出版的《数学原理》中公布了自己的悖论,证明了弗雷格系统存在根本缺陷。

在今天看来,这类系统最好通过所谓的集的结构式用集合的概念来描述。

例如,对于由数字4、5、6组成的集体,我们可以描述为:x是一个整数的集体,若用字母n表示这些整数,则n大于3小于7。

对这一集合的描述,在形式上我们写作x={n: n为整数,3<n<7}。

集合的对象不一定是数字。

我们可以设y={x:x为美国男性居民}。

很明显,对x的任何描述都可以填入冒号后的区域。

但罗素(恩斯特·策梅洛也独立地)发现,x={a: a不属于a}会导致矛盾的结论,就像对理发师集体的描述一样。

x自身是否属于x?无论是与否,结论都是矛盾的。

罗素发现这一悖论之后,弗雷格马上认识到他的系统被全盘推翻了。

即便如此,他无法解决这个悖论,而为了绕开这个悖论,人们在二十世纪做了许多尝试。

罗素本人对这一悖论的回答是他的“类型论”。

他分析道,之所以会产生悖论,是因为我们混淆了对数的集合的描述与对数的集合的集合的描述。

于是罗素引入了对象的分级系统:数,数的集合,数的集合的集合,等等。

这个系统曾被作为手段用于对数学基础的第一次形式化,并且在今天的某些哲学研究和计算机分支学科中仍有运用。

科技英语课文段落翻译

科技英语课文段落翻译

科技英语课文段落翻译1、p16第1段第四行P r o g r a m s u s u a l l y r e s i d e……,a n d s p e e d.Programs usually reside within the computer and are retrieved and processed by the computer’s electronic, and the program results are stored or routed to output devices ,such as video display monitors or printers. Computers are used to perform a wide variety of activities with reliability ,accuracy, and speed.程序通常贮存在计算机中,计算机的电子器件会对其进行检索和处理,程序结果会被存起来或传给输出装置,如视频显示器或打印机。

人们运用计算机进行各种各样的活动,它可靠,准确而且快捷。

2、p17第5段L a p t o p c o m p u t e r s a n d P C s....t o d i s p l a y i n f o r m a t i o n(倒数第三行)Laptop computers and PCs are typically used in businesses and at home to communicate on computer networks, for word processing ,to track finances ,and to play games. They have large amounts of internal memory to store hundreds of programs and documents. They are equipped with a keyboard; a mouse, trackball, or other pointing device; and a video display monitor or liquid crystal display(LCD)to display information.典型情况下,商务上和家庭中使用膝上电脑和个人电脑在计算机网络上进行通信,进行文字处理,跟踪金融行市以及玩游戏。

科技英语阅读 第十单元原文英汉互译 大学英语

科技英语阅读 第十单元原文英汉互译 大学英语

Nuclear Power Worldwide:Status and Outlook全球核能:现状和前景Nuclear power’s prominence as a major energy source will continue over the next several decades,核能的突出作为主要的能源来源将继续在未来几十年according to new projections made by the International Atomic Energy Agency(IAEA), which has just published a new report, Energy, Electricity and Nuclear power for the period up to 2030.根据新的预测由国际原子能机构(IAEA)刚刚公布了一份新的报告、能源、电力、核能年期间。

The IAEA makes two annual projections concerning the growth of nuclear power, a low and a high. The low projection assumes that all nuclear capacity that is curently under construction or firmly in the development pipeline gets completed and attached to the grid, but no other capacity is added. In this low projectoin, threr would be growth in capacity from 370GW(e) at the end of 2006 to 447GW(e) in 2030.(A gigawatt=1000 megawatts =1 billion watts).国际原子能机构使两个年度预测关于核能的增长,低或高的。

科技英语课文翻译

科技英语课文翻译

Unit 1大规模研究发现:地球的“健康”每况愈下有史以来对地球进行的最大规模的科学分析结果表明,地球上的许多生态系统都达不到标准。

由联合国主持的《千年生态系统评估综合报告》指出,由于不可持续的使用,地球上将近三分之二的用来维持生命的生态系统(包括干净的水源、纯净的空气以及稳定的气候)正遭受破坏。

以上大部分的破坏都是人类在过去的半个世纪里造成的。

据报告分析,随着人类对食物、淡水、木材、纤维以及燃料等资源的需求日趋激增,环境发生了极大的变化,引发了诸如滥伐森林、化学污染等问题。

因此,该报告的作者警告说,照此下去,本已岌岌可危的生态环境将会在21世纪的上半叶进一步恶化。

这项历史性的研究由来自世界95个国家的政府部门以及民间组织的1,300多位科学家共同完成。

四年来,他们考察了地球上许多生物的生长环境、物种以及将他们联系起来的生态体系。

联合国环境规划署对该报告进行了编辑整理并于昨天在中国北京公布了研究结果。

在公布该报告的新闻发布会上,联合国秘书长科菲·安南指出:“只有了解环境及其运作过程,我们才能制定出必要的措施加以保护它。

”他还说,“只有珍惜所有宝贵的自然资源和人类资源,我们才有希望去建设一个可持续发展的未来。

”对社会经济的影响该报告对自然界的大部分生物多样性持悲观态度,地球上可能有10%—30%的哺乳动物,鸟类以及两栖动物濒临灭绝。

这次大规模生态调查是根据安南的《千年发展目标》展开的,该发展目标是由联合国发起的,旨在2015年之前大幅减少饥饿与极度贫困等社会经济问题。

总部位于内罗毕的联合国环境规划署执行主席克劳斯·托普弗说:“从某些方面来说,《千年生态系统评估综合报告》让我们首次认识到生态系统服务功能的经济价值,并使我们对尊重和保护地球生命维护系统有了新的见解。

”目前由于人类社会对地球环境的开发利用,食物供应不断增加,然而增长的速度仍然太慢,难以完成联合国制定的在2015年之前消除全球一半饥饿人口的目标。

科技英语阅读原文及翻译(李健版,单元1-7)

科技英语阅读原文及翻译(李健版,单元1-7)

Unit 1 EnvironmentEarth’s Health in Sharp Decline, Massive Study Finds大规模研究发现:地球的“健康”每况愈下The report card has arrived from the largest ever scientific Earth analysis, and many of the planet’s ecosystems are simply not making the grade.有史以来对地球进行的最大规模的科学分析结果表明,地球上的许多生态系统都达不到标准。

The UN-backed Millennium Ecosystem Assessment Synthesis Report found that nearly two-thirds of Earth’s life-supporting ecosystems, including clean water, pure air, and stable climate, are being degraded by unsustainable use.由联合国主持的《千年生态系统评估综合报告》指出,由于不可持续的使用,地球上将近三分之二的用来维持生命的生态系统(包括干净的水源、纯净的空气以及稳定的气候)正遭受破坏。

Human has caused much of this damage during the past half century. Soaring demand for food, fresh water, timber, fiber and fuel have led to dramatic environmental changes, from deforestation to chemical pollution, the report says. The already grim situation may worsen dramatically during the first half of the 21st century, the report’s authors warn.以上大部分的破坏都是人类在过去的半个世纪里造成的。

科技英语阅读课文翻译及部分课文摘要Unit1-10

科技英语阅读课文翻译及部分课文摘要Unit1-10

科技英语阅读1-10单元译文:Unit 1罗素悖论的提出是基于这样的一个事例:设想有这样一群理发师,他们只给不给自己理发的人理发。

假设其中一个理发师符合上述的条件,不给自己理发;然而按照要求,他必须要给自己理发。

但是在这个集合中没有人会给自己理发。

(如果这样的话,这个理发师必定是给别人理发还要给自己理发)1901年,伯特兰·罗素悖论的发现打击了他其中的一个数学家同事。

在19世纪后期,弗雷格尝试发展一个基本原理以便数学上能使用符号逻辑。

他确立了形式表达式(如:x =2)和数学特性(如偶数)之间的联系。

按照弗雷格理论的发展,我们能自由的用一个特性去定义更多更深远的特性。

1903年,发表在《数学原理》上的罗素悖论从根本上揭示了弗雷格这种集合系统的局限性。

就现在而言,这种类型的集合系统能很好的用俗称集的结构式来描述。

例如,我们可以用x 代表整数,通过n来表示并且n大于3小于7,来表示4,5,6这样一个集合。

这种集合的书写形势就是:x={n:n是整数,3<n<7}。

集合中的对象并不一定是数字。

我们也可让y={x:x是美国的一个男性居民}。

表面上看,似乎任何一个关于x的描述都有一个符合要求的空间。

但是,罗素(和策梅洛一起)发现x={a:a不再a中}导致一个矛盾,就像对一群理发师的描述一样。

x它本身是在x的集合中吗?否定的答案导致了矛盾的出现。

当罗素发现了悖论,弗雷格立即就发现悖论对他的理论有致命的打击。

尽管这样,他还不能解决这个问题,并且上世纪有很多的尝试,去解决这个问题(但没有成功)。

罗素自己对这个悖论的回答促进了类型理论的形成。

他解释说,悖论的问题在于我们混淆了数集和数集的集合。

所以,罗素介绍了对象的分级系统:数、数集、数集的集合等等。

这个系统为形式化数学的形成奠定了基础,至今它还应用于哲学研究和计算机科学分支。

策梅洛对于罗素悖论的解决方法用新的公理:对于任意公式A(x)和任意集合b,都会有一个集合满足y={x:x既在b中又满足A(x)}取代了以前的公理:对于任意公式A(x),都会有一个集合满足y={x:x满足A(x)}。

科技英语阅读课文翻译

科技英语阅读课文翻译

脸谱网有一个重要的隐私人员,但是我怀疑他将从现在存在10年。

那不是因为脸谱不顾一切去掉隐私保护,但由于脸谱和其他社交网站的普及促进了共享个人的一切事物,消除了从公共分离出私事的结点。

由于共享的个人信息的范围扩展到,几个朋友一起归入脸谱的许多杂项的个人的“朋友”标签中,披露的事情成为很常态和私人的事情变得古怪和不合时宜。

脸谱的年轻成员,是那些高中生或者大学生,以及脸谱开始出现在校园里的时候那些舒适共享任何东西分应届毕业生。

它的老成员是仅仅在2006年打开网络工作场所后加入的。

任何人都调整到一个新的善于自我表达超过沉默的价值体系。

脸谱表示它有1.75亿会员,是世界上最大的社会网络。

但在美国,大多数成员都还比较年轻。

脸谱提供广告给 5440万成员的目标,且不分年龄人人共享。

但是,如果广告客户想缩小它的目标观众到那些25岁或更老的,数量就会下降到2880万。

它缩小到30或以上岁数的人,脸谱只有仅仅提供2030万。

许多超过30 岁的人尚未注册,因此脸谱有一个惊人的增长机会。

每个星期,新成员是在美国以百万和全球范围内以5百万增加的。

30岁以上的群体是其增长最快的人口。

成员也都变得更合群。

根据该公司的发言人,在12月,每名成员的“朋友”,在全球范围内,平均人数为100。

如今,它已跃升至120。

在成员之间,一部和蔼包容性的法律似乎是在揭示:随着时间的推移,许多最简单的途径是,定期接受“好友请求”决定。

当一个成员的旨在作为另一个脸谱网的朋友,是完成一个结果的开始。

换句话说,他们简单地定义“朋友”为:去成为传达希望的脸谱会员。

会员和个人网络的增长,似乎不受公司在其短暂的五年历史的失态的影响。

其中的一个实例是在二月,当它与它的服务条款拨弄时。

新的语言似乎断言脸谱“不可撤销”的权利是去保留和使用一个成员的个人信息。

即使成员已经关闭了他或她的脸谱帐户,也应该多一点编辑。

这个强烈抗议是大声的,仅仅一些成员需要增加他们的声音去创建一个喧嚣声,然后脸谱恢复旧的语言。

科技英语翻译unit10

科技英语翻译unit10

第十单元寻找生命课文A天体生物学到目前为止我们还没有人见过外星生物,对于天体生物学来说这似乎是个问题。

但在过去的20多年中,科学家们已经发现了一些蛛丝马迹,显示宇宙间生命或许并不罕见。

许多科学家充满希望,认为不久将能找到外星生命的有力证据。

其中的一些线索来自陆地生命。

生物学家们发现了多种嗜极生物,即可以在极端环境(如碱性湖泊和地下深处的岩石缝隙)中蓬勃生长的微生物。

生命可能起源于海底的地热口或火山口附近,这可能是其他行星和卫星的共同特点。

在陨石撞击地球并造成晚期宇宙大爆炸之后不久,在地球的岩石中出现了新陈代谢活动留下的化学痕迹,这意味着生命的起源或许是个快速、简单的过程。

来自火星的陨石不时地撞击地球。

尽管面临着低温和强烈的辐射,陨石上的细菌及其孢子很有可能在这种空间之旅中存活下来,这意味着原始生命有可能一度被太阳系的行星携带到四面八方,这一理论被称为胚种论。

火星微生物1996年,有一组科学家声称一颗代号为ALH84001的火星陨石含有火星的化石纳米细菌。

虽然他们的多数证据已被证实并不可信,但对此持有怀疑的人也无法充分解释在ALH84001号火星陨石中为什么会有磁晶体,因为它们与地球细菌产生的晶体十分相似。

虽然火星曾一度被认为是个干燥、贫瘠的星球,但来自欧洲航天局的火星特快飞船、美国国家航空航天局的月球车以及“勇气号”和“机遇号”火星车的最新证据表明,火星表面或接近表面的部分有液体水存在的迹象。

看来数十亿年前火星曾有过一段短暂的温暖、湿润的时期,甚至在今天火星表面仍可能不时有水流动。

也许火星表面以下存在一个更适于微生物栖身的“港湾”,因为那里永久存在着液态水,而且危险的太阳紫外线辐射也无法穿透表层照射到那里。

最近还发现在火星大气中存在着甲烷,这可能是生活在深层的细菌产生的副产品。

科学家已制定了一系列计划来寻找更明确的生命迹象,其中包括制造新的飞船以取代失踪的比格II号,并最终完成美国太空取样重返地球的宏伟计划。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

科技英语阅读1-10单元译文:Unit 1罗素悖论的提出是基于这样的一个事例:设想有这样一群理发师,他们只给不给自己理发的人理发。

假设其中一个理发师符合上述的条件,不给自己理发;然而按照要求,他必须要给自己理发。

但是在这个集合中没有人会给自己理发。

(如果这样的话,这个理发师必定是给别人理发还要给自己理发)1901年,伯特兰·罗素悖论的发现打击了他其中的一个数学家同事。

在19世纪后期,弗雷格尝试发展一个基本原理以便数学上能使用符号逻辑。

他确立了形式表达式(如:x =2)和数学特性(如偶数)之间的联系。

按照弗雷格理论的发展,我们能自由的用一个特性去定义更多更深远的特性。

1903年,发表在《数学原理》上的罗素悖论从根本上揭示了弗雷格这种集合系统的局限性。

就现在而言,这种类型的集合系统能很好的用俗称集的结构式来描述。

例如,我们可以用x 代表整数,通过n来表示并且n大于3小于7,来表示4,5,6这样一个集合。

这种集合的书写形势就是:x={n:n是整数,3<n<7}。

集合中的对象并不一定是数字。

我们也可让y={x:x是美国的一个男性居民}。

表面上看,似乎任何一个关于x的描述都有一个符合要求的空间。

但是,罗素(和策梅洛一起)发现x={a:a不再a中}导致一个矛盾,就像对一群理发师的描述一样。

x它本身是在x的集合中吗?否定的答案导致了矛盾的出现。

当罗素发现了悖论,弗雷格立即就发现悖论对他的理论有致命的打击。

尽管这样,他还不能解决这个问题,并且上世纪有很多的尝试,去解决这个问题(但没有成功)。

罗素自己对这个悖论的回答促进了类型理论的形成。

他解释说,悖论的问题在于我们混淆了数集和数集的集合。

所以,罗素介绍了对象的分级系统:数、数集、数集的集合等等。

这个系统为形式化数学的形成奠定了基础,至今它还应用于哲学研究和计算机科学分支。

策梅洛对于罗素悖论的解决方法用新的公理:对于任意公式A(x)和任意集合b,都会有一个集合满足y={x:x既在b中又满足A(x)}取代了以前的公理:对于任意公式A(x),都会有一个集合满足y={x:x满足A(x)}。

究竟是什么样的努力使数学逻辑基础得以发展?现在数学家认识到这个领域可以用所谓的策梅洛-弗兰克尔集合论来定义。

形式化的语言包含符号,例如e表示“其中一个数”,=表示等于,□代表集合中没有任何元素。

那么可以写下一个公式B(x):如果如果y e x,而y是空集。

在集的结构式中我们可以这样书写:y={x:x=□},或者更简单y={□}。

罗素悖论就成这样:y={x:x不在x中},那么y是否在y中?Unit2暗能量是用来命名一种未能给出解释的,与万有引力的作用相反,以一种极快的速度将各个星系拉开的力量。

暗能量与反重力有些相似。

万有引力在局部的水平上把事物聚集到一起,然而,暗能量以一种更宏大的规模把事物拉开。

它的存在并未被证明,但是暗能量是很多科学家在解释宇宙正在不断加速膨胀时的这一令人费解的观察时的最佳猜想。

专家始终还是不知道是什么在驱动这种力量,但是对于想更多的了解暗能量的这种需求始终是宇宙学家的首要任务。

令人惊讶的预言暗能量如何被发现的故事是科学领域由令人惊讶的预言而演变而来的一个经典案例。

在20世纪90年代中叶,天文学家开始测算宇宙膨胀的速度。

因为万有引力使质量集中,大多数的专家希望发现万有引力能够减慢宇宙气球般膨胀的速度,或者停留在大约相同的速率上。

“这个数据并没有显示出我们所期待的结果。

很多人发出了紧张的笑声”,堪培拉的澳洲国立大学的Brian Schmidt说——他独自领导了一个小组在约翰·霍普金斯大学的天体物理学家Adam Riess的帮助下于1998年发现了暗能量。

这些证据是建立在对明亮的正在爆炸的恒星——被称作超新星——常被天文学家用于追踪距离的标杆——的测量的基础上的。

通过往更深层次的观察,科学家能够回顾从前,因为这些发自超新星的光要数十亿年才能被肉眼看到。

科学家观察了处于不同距离的很多超新星去确定它们到底正在以多快的速度远离我们。

他们测量出观察对象的红移,或者说是由于多普勒效应导致它们发出的光发生的改变,多普勒效应是当物体靠近我们或者远离我们运动时发生波的压缩或膨胀所产生的一种效应。

一种类比是救护车的汽笛声会改变音高——当它朝你行驶,然后通过你身边接着朝另一个方向去了的时候——他的声波首先是压缩的,接着伸长这些测量给了天文学家一个关于宇宙在不同历史点的膨胀速度的图景。

研究人员还发现宇宙如今正在以前所未有的速度在膨胀。

“一开始我们不情愿相信我们的结果,”加州大学伯克利分校的劳伦斯伯克利实验室的天体物理学家Saul Perlmutter说,他领导的一个竞争性的小组发现了和Schmidt以及Riess 相同的结果。

“但是我们越分析它,它越不会改变多少。

”为了解释这些令人迷惑的发现,一些科学家接受了被爱因斯坦所摒弃为错误的旧思想:真空中存在着一种(活动不活跃的)(与万有引力相排斥的)但能加速宇宙膨胀的能量。

爱因斯坦把这个思想叫做宇宙常数,并且把它认作自己的最大的错误。

如今,宇宙常数已经是用于解释为何宇宙在以前所未有的速度像一个气球一般膨胀的主要理论之一。

暗物质暗能量有时候会与同样神秘的暗物质相混淆,尽管它们两是不同的事物。

暗物质是一种假想的物质,它对光不起反应(不反射光),因此它不可见。

天文学家通过它能干扰星体发出的引力推论出它的存在。

把两者加在一起,暗物质和暗能量似乎占据了宇宙的绝大部分质量(由于爱因斯坦的著名的质能公式E=m*c*c,物质和能量被视作同一事物的两种形式)。

暗能量被认为构成宇宙的百分之74,而暗物质占据了另外的百分之22,而普通的,可见的物质只占次要的百分之4。

似乎暗能量的发现并不是足够异常,它已经引出一大堆其他的问题。

例如,暗能量为多重宇宙论的支持者火上浇了一把油,我们自身的存在只是无数的常量和条件是不同的世界。

也许存在别的宇宙,在它之中暗能量并不存在,而且它的膨胀是在减速——宇宙学家如是说。

也许这就是我们的宇宙如此独特的原因。

Unit3脸谱有一个重要的私人管理者,但我怀疑它能否在此后的十年继续存在。

这并不是因脸谱不顾一切抛开对个人隐私的保护,而是因为脸谱和其它社交网址的流行提倡分享个人的所有情况,溶解把个人从公众分离的界限。

随着分享个人信息的范围从几个朋友扩大到各种各样在脸谱里被标注为朋友的人,泄露成为规范而隐私变得不合时宜了.脸谱年轻的成员——高中或大学生以及那些来自脸谱开始在大学里兴起的近期毕业生——愿意分享任何事。

它年长的成员——那些只有在2006年脸谱先把它的成员籍公开给工作场所网络,然后是当时任何人都可能加入——正在适应鼓励个人表现超过沉默的新价值体系。

. 脸谱是世界最大社交网络,有1.75亿个成员。

但在美国它大多数会员仍然是相对年轻的人。

脸谱为广告客户提供一个有伍仟四百四十万来自各个年龄阶段的狩猎目标。

但是如果广告客户想把它的目标缩小到25或更年长的,那么数目会下降到俩仟八百八十万。

缩小到30或更年长的,脸谱就只能向俩仟零三十万会员提供。

许多超过30岁胡须半白的人已经注册,因此脸谱有一个惊人的发展机会。

每个周,在美国有一个百万新的成员加入,在全球范围有500万的新成员加入;它增长最快的群体是三十岁和更年长的人。

成员们也在变得更擅于社交。

在十二月,在全世界范围内,每个成员的“朋友”平均数是100。

据一个公司发言人所说它现在已跳转到120。

成员中平易近人的包容象在揭示它本身:随着时间的推移,许多正在认为:当成员寻找其它人作为自己的一个脸谱朋友时完成一序列的事中首先应按常规接受“朋友要请”,这是最简单的路径。

换句话说,他们把脸谱网中任何一个有意向的人简单地定义为“朋友”。

在公司短暂的五年发展历史中,会籍和个人的网络的发展似乎不受失礼的影响。

其中一个例子是在二月它摆弄它的服务条款。

那个似乎断言脸谱的“不可撤销的”权去保留和使用成员的个人信息即使后来成员已经关闭了他或她的脸谱帐户的新语言值得更多的编辑。

抗议声很大——只有一小部分成员的需要提高他们的语音来制造吵闹—-,脸谱恢复旧语。

几天后,它为公司提供一个关于的原则的草案和另一个批准会籍有关权利和义务的草案。

脸谱为成员提供许多私人的选择。

我认为43个设置可能被调整,其中不包括那些可被脸谱朋友安装的应用软件看见的限制信息。

在一定程度上脸谱的默认设置新帐户可以保护用户。

例如,个人协议规范信息被限制于朋友和其它在他学校,工作地,或者地域网络的人。

朋友的朋友是无权访问的。

但脸谱对于第三方软件可以在一个网络的朋友群中看见的默认设置较少的限制。

成员不可能察觉那除非他们改变默认隐私设置,该默认隐私设置是一个由朋友安装的可以清空和存储许多类成员私人信息的应用。

大卫。

埃文斯,一个弗吉尼亚大学计算机科学副教授,说他愿首先脸谱给那些外面软件开发者可得到的情报设定更好的限制。

对15的19信息类别,脸谱设置一个“分享”的默认设置,这个意为这些信息可以被退出脸谱并被服务器储存在它的控制下。

这些15个类别包括活动,利益,照片与关系地位。

他说:“脸谱可以设置默认错误值保护隐私而不是让你的信息外漏”。

克里斯,脸谱的首席隐私官,捍卫它的当前设置,说它“给用户广泛控制就他们选择接合的应用”。

他也说脸谱已经消除了被“数以千计”成员认为靠不住的应用。

然而,教授埃文斯看来,恶意软件的驱逐来得太晚了:“一旦应用得到了资料,它获得并储存在别人的机器上。

默认十分重要,因为几乎没有用户陷入调整的设置的麻烦中。

被问到有多少成员曾经改变一个隐私定。

KELL Y先生说百分之20。

脸谱让成员创建朋友的自定义的子集。

成员可以选择性限制访问一些项目,例如照片像片簿和视频。

然而通过多次点击为这个或那个定制权限,不符合一个人的快乐时光的理念。

对很多成员来说,现在“朋友”意味不伦不类的真正朋友的,先前的朋友,朋友的朋友,非朋友;越来越年轻亲戚;同事,即使被一个或贰个爱管闲事的老板咒骂。

所有人都被接受由于每个“朋友”获得同一访问权。

当一个人为数不多的密友和许多非密友之间的区别变得模糊不清时,区分私人和公共似乎无意义。

Unit4远程控制的代理机器人可以为您参加今后的会议它可能看起来像装在一个真空吸尘器落地灯,但实际上它是Anybots公司最新的代理机器人的QB。

QB 的设计是被用于当你不在场时可以作为你的眼睛、耳朵并能够替你发声,更棒的是,它的移动是依靠两轮辊像罗丝(从《杰森一家》),并通过网络和远程无线网为其导航. 远程办公人员和旅游高管都可以用QB(所以命名是因为它是公司的原型QA bot下一代产品)作为自己的一个虚拟扩展,允许他们参加会议、查看旅游设施或呈现房地产市场走势,所有这些都是依靠电脑键盘来操控机器人完成Anybots公司在周二正式首次展示遥控机器人并计划在年底开始销售QB机器人。

相关文档
最新文档