专业英语翻译 (6)

合集下载

造船专业英语翻译练习题lesson 6

造船专业英语翻译练习题lesson 6

造船专业英语翻译练习题Lesson 6一、汉译英1、单词翻译1)、纵摇pitch2)、横倾heel3)、阻力resistance4)、稳心metacentre5)、浮力buoyancy2、词组翻译1)、正浮floating positively2)、横稳性transversal stability3)、倾斜试验inclination test4)、球鼻艏bulbous bow5)、额定马力the rated horsepower3、句子翻译1)、用干舷来度量的储备浮力就是载重线以上的船体的水密容积。

The reserve buoyancy which is measured by freeboard refers to the watertight volume of hull above load line.2)、我们不必为空气的阻力多伤脑筋,因为与水阻力相比空气阻力要小得多。

We do not bother our brain about air resistance because it is far smaller than water resistance.二、英译汉1、Then, what is the reserve buoyancy? As it is known to all, a ship has to obtain a certain amount of freeboard when she’s sailing at sea. That is to say, to give you a concrete idea, any vessel is to retain some volume above water for the sake of extra buoyancy so that its draft is allowed to increase without a sinking tragedy under particular but rare conditions, such as rough sea or serious flooding due to hull damage.那么什么是储备浮力呢?大家明白,当船只在海上航行时它必须获得一定量的干舷。

电气工程和自动化专业英语第6章6_2翻译

电气工程和自动化专业英语第6章6_2翻译

Section 2 Components of Power Systems 第2节电力系统的组成部分Modern power systems are usually large-scale, geographically distributed, and with hundreds to thousands of generators operating in parallel and synchronously. 现代电力系统通常规模大,地域分布,并与数百名,并同步在数以千计的发电机并联运行。

They may vary in size and structure from one to another, but they all have the same basic characteristics: 他们可能会有所不同的规模和结构从一个到另一个,但它们都具有相同的基本特征:(1)Are comprised of three-phase AC systems operating essentially at constant voltage. (1)是由三个三相交流电压恒定系统经营本质上。

Generation and transmission facilities use three-phase equipment . 发电和输电设施使用三个阶段的设备。

Industrial loads are invariablythree-phase; single-phase residential and commercial loads are distributed equally among the phases so as to effectively form a balanced three-phase system. 工业负荷总是三相,单相负载的住宅和商业之间平等分配的阶段,从而有效地形成一个平衡的三相系统。

《高级英语》课文逐句翻译(6)

《高级英语》课文逐句翻译(6)

lesson6 ⼀个好机会 Lesson Six A Good Chance 我到鸭溪时,喜鹊没在家,我和他的妻⼦阿⽶莉亚谈了谈。

When I got to Crow Creek, Magpie was not home. I talked to his wife Amelia. “我要找喜鹊,”我说,“我给他带来了好消息。

”我指指提着的箱⼦,“我带来了他的诗歌和⼀封加利福尼亚⼤学的录取通知书,他们想让他来参加为印第安⼈举办的艺术课。

” “I need to find Magpie,” I said. “I've really got some good news for him.” I pointed to the briefcase I was carrying. “I have his poems and a letter of acceptance from a University in California where they want him to come and participate in the Fine Arts Program they have started for Indians.” “你知道他还在假释期间吗?” “Do you know that he was on parole?” “这个,不,不⼤清楚。

”我犹豫着说,“我⼀直没有和他联系,但我听说他遇到了些⿇烦。

” “Well, no, not exactly,” I said hesitantly, “I haven't kept in touch with him but I heard that he was in some kind of trouble. 她对我笑笑说:“他已经离开很久了。

你知道,他在这⼉不安全。

他的假释官随时都在监视他,所以他还是不到这⼉来为好,⽽且我们已经分开⼀段时间了,我听说他在城⾥的什么地⽅。

Professional English for Chemical Engineering(化工专业英语)---6

Professional English for Chemical Engineering(化工专业英语)---6

根据学科领域确定词义

同一个词在不同领域表示不同的含义,这 是因为各行各业都尽量采用常用词汇来表 达各自专业的概念。




The lathe should be set on a firm base 车床应该安装在坚实的底座上。 As we all know, a base reacts with an acid to form a salt 众所周知,碱与酸反应生成盐。 A transistor has three electrodes, the emitter, the base and the collector. 晶体管有三个电极,即发射极、基极和集电极 Line AB is the base of the triangle ABC AB线是三角形ABC的底边 Mathematics is the base of all other science 数学是所有其他科学的基础。
词类引申


因为普通词汇在专业英语中往往具有专业含义, 因此,在翻译时需要体现出相应的引申意义。 Whichever way the two two-way switches are left, one of the wires is alive and the other is dead 无论这两个双路开关合在那一边,两个导线中总 有一根式带电的,一根是不带电的。 Such a ring of feed flow is called internal loop reactor 这样的一个原料物流的环路流动就被叫做内循环 反应器。
根据词类确定词义

英语中有些词在不同的句子中属于不同的 词类,词类不同,其词义不同。 例如: Back: 作副词为“回来”;动词为 “支持”,形容词为“过期的”,名词指 “背面”、“背部”等。 因此,对于这类词汇,翻译时应该首先判 明其词性,再进一步确定词义

过程装备与控制工程专业英语翻译6

过程装备与控制工程专业英语翻译6

Reading Material 6Stainless SteelStainless steels do not rust in the atmosphere as most other steels do. The term "stainless" implies a resistance to staining, rusting, and pitting in the air, moist and polluted as it is, and generally defines a chromium content in excess of 11 % but less than 30%. And the fact that the stuff is "steel" means that the base is iron.Stainless steels have room-temperature yield strengths that range from 205 MPa (30 ksi) to more than 1725 MPa (250 ksi). Operating temperatures around 750 C (1400 F) are reached. At the other extreme of temperature some stainless steels maintain their toughness down to temperatures approaching absolute zero.With specific restrictions in certain types, the stainless steels can be shaped and fabricated in conventional ways. They can be produced and used in the as-cast condition; shapes can be produced by powder-metallurgy techniques; cast ingots can be rolled or forged (and this accounts for the greatest tonnage by far). The rolled product can be drawn, bent, extruded, or spun. Stainless steel can be further shaped by machining, and it can be joined by soldering, brazing, and welding. It can be used as an integral cladding on plain carbon or low-alloy steels.The generic term "stainless steel" covers scores of standard compositions as well as variations bearing company trade names and special alloys made for particular applications. Stainless steels vary in their composition from a fairly simple alloy of, essentially, iron with 11% chromium, to complex alloys that include 30% chromium, substantial quantities of nickel, and half a dozen other effective elements. At the high-chromium, high-nickel end of the range they merge into other groups of heat-resisting alloys, and one has to be arbitrary about a cutoff point. If the alloy content is so high that the iron content is about half, however, the alloy falls outside the stainless family. Even with these imposed restrictions on composition, the range is great, and naturally, the properties that affect fabrication and use vary enormously. It is obviously not enough to specify simply a "stainless steel.”Classification the various specifying bodies categorize stainless steels according to chemical composition and other properties. However, all the stainless steels, whatever specifications they conform to, can be conveniently classified into six major classes that represent three distinct types of alloy constitution, or structure. These classes are ferritic, martensitic, austenitic, manganese-substituted austenitic, duplex austenitic ferritic, and precipitation-hardening. Each class is briefly described below.(1) Ferrous stainless steels: This class is so named because the crystal structure of the steel is the same as that of iron at room temperature. The alloys in the class are magnetic at room temperature and up to their Curie temperature (about 750 C; 1400 F). Common alloys in the ferrous class contain between 11% and 29% chromium, no nickel, and very little carbon in the wrought condition.(2)Martensitic stainless steels: Stainless steels of this class, whichnecessarily contain more than 11 % chromium, have such a great hardenability that substantial thickness will harden during air cooling, and nothing more drastic than oil quenching is ever required. The hardness of the as-quenched martensitic stainless steel depends on its carbon content. However, the development of mechanical properties through quenching and tempering is inevitably associated with increased susceptibility to corrosion.(3)Austenitic stainless steels: The traditional and familiar austeniticstainless steels have a composition that contains sufficient chromium to offer corrosion resistance, together with nickel to ensure austenite at room temperature and below. The basic austenitic composition is the familiar l8% chromium, 8% nickel alloy. Both chromium and nickel contents can be increased to improve corrosion resistance, and additional elements (most commonly molybdenum) can be added to further enhance corrosion resistance.(4)Manganese-substituted austenitic stainless steels: The austeniticstructure can be encouraged by elements other than nickel, and the substitution of manganese and nitrogen produces a c1ass that we believe is sufficiently different in its properties to be separated from the chromium-nickel austenitic class just described. The most important difference lies in the higher strength of the manganese-substituted alloys.(5) Duplex austenitic-ferrous stainless steels: The structure of these steels isa hybrid of the structures of ferrite and austenite; and the mechanical properties likewise combine qualities of each component steel type. The duplex steels combine desirable corrosion and mechanical properties, and their use is as a result increasing in both wrought and cast form.(6) Precipitation-hardening stainless steels: Stainless steels can be designed so that their composition is amenable to precipitation hardening. This class cuts across two of the other c1asses, to give us martensitic and austenitic precipitation-hardening stainless steels. In this class we find stainless steels with the greatest useful strength as well as the highest useful operating temperature.Properties In selection of stainless steels, three kinds of properties have to be considered: (1) Physical properties: density, thermal conductivity, electrical resistivity, and so on; (2) Mechanical properties: strength, ductility, hardness, creep resistance, fatigue, and so on; and (3) corrosion-resistant properties. Note that properties of stainless steels are substantially influenced by chemica1 composition and microstructure. Hence specifications include chemical composition, or, more correctly, an analysis of the most important elements (traces of unreported elements also may be present) as well as a heat treatment that provides the optimum structure.Applications Since stainless steels were first used in cutlery industry, the number of applications has increased dramatically. The relative importance of the major fields of application for flat and long stainless steel products is shown in Table 1. Chemical and power engineering is the largest market for both long and flat products. It began in about 1920 with the nitric acid industry. Today, it includesan extremely diversified range of service conditions, including nuclear reactor vessels, heat exchangers, oil industry tubular, components for the chemical processing and pulp and paper industries, furnace parts, and boilers used in fossil fuel electric power plants.Table 1阅读材料 6不锈钢不锈钢就像其他大多数的钢在空气中不会生锈,“不锈的”这个术语暗示了在空气中抵抗污点,生锈和腐蚀,还具有抵抗潮湿和腐蚀。

专业英语(翻译版)

专业英语(翻译版)

FREEWAY TRAFFIC FLOW MODELING BASED ON RECURRENT NEURAL NETWORK AND WAVELET TRANSFORM基于递归神经网络和小波变换的高速公路交通流建模6 Conclusions 结论The highly nonlinear and dynamic characteristics of the macroscopic traffic flow require a modeling approach, which can deal with the complex nonlinear relationships among the speed, flow and density.宏观交通流的高度非线性和动态特性,需要一个建模方法,它可以处理的速度,流量和密度之间的复杂的非线性关系。

At the same time, effective measures have to be taken to eliminate traffic noise and disturbance. In this paper, a method of wavelet denoising and traffic flow modeling by an Elman recurrent neural network is presented.同时,必须采取有效措施来消除交通噪声和干扰。

在本文中,一种小波去噪和交通流的Elman神经网络建模这工作了。

Simulation results show that the wavelet transform can effectively eliminate the noise signal, and that the Elman network can accurately describe the real behavior of freeway traffic flow.仿真结果表明,小波变换可以有效地消除信号中的噪声,和Elman神经网络能够准确地描述高速公路交通流的真实行为。

化学专业英语翻译6

化学专业英语翻译6

06.THE CLASSIFICATION OF INORGANIC COMPOUNDS The Classes of Compounds该类化合物Thousands and tens of thousands of compounds are known to the chemist today. It would be impossible to learn properties and behavior of even a fraction of this number if it had to be done on the basis of individual compounds1. Fortunately, most chemical compounds can be grouped together in a few classes. Then, if we can properly classify a compound .we are at once aware of the general properties of the compound from knowledge of the properties of that class or group of compounds. For example. HCl is classed as an acid. and by becoming familiar with the behavior of acids as a distinct class, we are at once aware of the general properties of the compound2. A great many of the compounds we are to study may be classified as acids, bases, salts, metallic oxides, or nonmetallic oxides. Of these five classes of compounds, the first three —acids, bases, and salts — are by far the most important3…成千上万的化合物是众所周知的今天的化学家。

教育技术学专业英语五六七章课文翻译

教育技术学专业英语五六七章课文翻译

Psychology changed dramatically during the early20th-century as another school of thought known as behaviorism rose to do minance.Behaviorism was a major change from previous theoretical perspectives,rejecting the emphasis on both the conscious and unconscious mind.instead,behaviorism strove to make psychology a more scientific discipline by focusing purely on observable behavior.在早期的心理发生了显著的变化20th世纪中叶作为另一个学校的思想被看作是“行为主义上升到的优势。

行为主义是一个重大的改变从先前的理论观点,拒绝强调了有意识和无意识的想法。

相反,行为主义心理学努力使更科学的学科,其产生的可观察行为集中在纯粹。

Behaviorism had its earliest start with the work of a Russian physiologist named Ivan Pavlov.Pavlov research on the digestive systems of dogs led to his discovery of the classical conditioning process,which demonstrated that behaviors could be learned via conditioned associations Pavlov demonstrated that this learning process could be used to make an association between environmental stimulus and a naturally occurring stimulus.行为主义有其最早开始的工作一个俄罗斯生理学家名叫伊凡巴甫洛夫。

汽车专业英语全文翻译

汽车专业英语全文翻译

汽车工程专业英语全文翻译一当今的汽车一般都由15000 多个分散、独立且相互配合的零部件组成。

这些零部件主要分为四类:车身、发动机、底盘和电气设备。

Body:车身Engine:发动机Brakes:制动器Power train :传动系Steering:转向系Electrical:电器及电子设备Suspension:悬架Layout of a passenger car:乘用车总布置:商用车总布置Layout of a commercialvehicle1.1 车身汽车车身是由车窗、车门、发动机罩和行李箱盖焊接在金属板外壳发动机发动机作为动力装置。

最常见的发动机气缸的排列方式称为发动机配置。

直列式发动机的汽缸呈一列布置。

这个设计创造了一个简单的发动机缸体铸造。

在车辆应用中,汽缸数一般是2-6 缸,汽缸中心线与水平面垂直。

当汽缸数增多时,发动机尺寸和曲轴就成为一个问题。

解决这个问题的办法就是采用V 形(汽缸呈两列布置,且两列气缸之间夹角为V 形)发动机。

这个设计使发动机尺寸和曲轴都变得更短且更坚硬。

前置发动机纵向安装,既可前轮驱动也可后轮驱动。

后置发动机是将发动机安装在后轮后面。

发动机可横置或纵置,一般情况下为后轮驱动。

1.4 电气系统电气系统为起动机、点火系统、照明灯具、取暖器提供电能。

该电平由一个充电电路维护。

1.4.1 充电充电系统为所有汽车电子元件提供电能。

充电系统主要包括:蓄电池,交流发电机,电压调节器,即通常是交流发电机上不可或缺的,充电警告或指示灯和金属丝连成一个完整电路。

蓄电池为起动提供电能 ,然后发动机工作,交流发电机就为所有的电子元件提供电能。

同时也给蓄电池充电即用来使发动机起动。

电压调节器有过充保护作用。

1.4.2 起动起动系统包括:蓄电池、电缆、起动机、飞轮和换向器。

起动时,有两个动作同时运行,该起动机齿轮与飞轮齿圈啮合,并起动电机,然后运行传输到发动机曲轴。

起动机电机将起动机安装在发动机缸体上并由电池供电。

英语专业综合教程第六册翻译练习答案

英语专业综合教程第六册翻译练习答案

1、这家公司是由几名有事业心得年轻人创立的。

This company was started by a couple of enterprising young men.2、那是他唯一一次自己在午夜前睡觉的,因为他实在太累了。

It was the only time when he went to bed of his own accord before midnight,because he was really too tired. 3、经过长时间的仔细酝酿,书才得以完成。

Many hours of meticulous preparation have gone into writing the book..4、她从头到脚穿着一身黑。

She was attired from head to foot in black.5、为攒我们去度假的钱,我节衣缩食整整一年。

I have been scrimping and saving all the year to pay for our holiday.6、我知道他是好意,但我希望他别来管我们。

I know he is well-meaning,but I wish he’d leave us alone.7、当有人指出他犯错误时,他非常生气。

He became very indignant when it was suggested he had made a mistake.8、说了多少次了,安东尼,刀子和叉子要放入中间的抽屉。

I have told you for umpteen th times,Anthony,knives and forks go in the middle drawer.9、缝纫恐怕不是我的专长。

I am afraid sewing is not my forte.10、观众热烈的欢迎使她十分高兴。

She was buoy ed by the warm reception her audience gave her.纽约大学的外国学生来自130多个国家,50%来自亚洲,主要是韩国、日本和中国。

计算机专业英语第6—8单元翻译

计算机专业英语第6—8单元翻译

CHAPTER 619. SYSTEM UNIT (P150)The system unit, also known as the system cabinet, is a container that houses most系统单元该系统的单位,又称系统机柜,是一个容器,里面大部分构成一个计算机系统的电子元件。

所有的计算机系统有一个系统单位。

微型计算机中,有四种基本类型:桌面系统的单位,笔记本电脑系统的单位,平板电脑系统的单位,掌上电脑系统的单位2. SYSTEM BOARD (P153)The system board is also known as the motherboard. The system board is the系统板也被称为主板。

系统板是整个计算机系统的通信媒介。

系统单位的每一个组件连接到系统板上。

它作为一个数据的各个组成部分互相沟通的路径。

外部设备,如键盘,鼠标和显示器无法沟通与系统的单位没有系统板。

21. (P154)Sockets provide a connection point for small specialized electronic parts called套接字提供了一个小的芯片专门的电子零件的连接点。

芯片由微小的电路板蚀刻到硅sandlike材料的平方。

这些电路板可小于指尖。

A芯片也被称为一个硅芯片,半导体,集成电路。

芯片安装在载体上的包。

这些包直接插入系统板上的插座上或卡,然后插入到系统板上的插槽。

插座是用来连接各种不同类型的芯片,包括微处理器和内存芯片的系统板。

22. MICROPROCESSOR (P155)In a microcomputer system, the central processing unit (CPU) or processor is 在微机系统中,中央处理单元(CPU)或处理器包含一个单一的芯片上称为微处理器。

专业英语翻译(9.13.14.15.16.23)

专业英语翻译(9.13.14.15.16.23)

Unit 91、As is found in all phases of polymer chemistry, there aremany exceptions to this categorization.译:正如在高分子化学的各个部分都可以看到的那样,对这种分类方法有很多例外情况。

2、When the molecular chains are ‘straightened out’orstretched by a process of extension, they do not have sufficient attraction for each other to maintain the oriented state and will retract once the force is released. 译:当通过一个拉伸过程将分子链拉直的时候,分子链彼此之间没有足够的相互吸引力来保持其定向状态,作用力一旦解除,将发生收缩。

3、Therefore, a potential fiber polymer will not become a fiberunless subjected to a ‘drawing’process, i.e., a process resulting in a high degree of intermolecular orientation. 译:因此,可以制成纤维的聚合物将不成其纤维,除非经受一个抽丝拉伸的过程,即一个可以形成分子间高度取向的过程。

4、It must be borne in mind that, with the advent ofZiegler-Natta mechanisms and new techniques to improve and extend crystallinity, and the closeness of packing of chains, many older data given should be critically considered in relation to the stereoregular andcrystalline structure.译:必须牢牢记住,随着Ziegler-Natta机理出现,以及随着提高结晶度和提高链的堆砌密度的新方法的出现,对许多过去已得到的关于空间结构和晶体结构旧的资料,应当批判的接受。

测绘工程专业英语翻译Unit 6

测绘工程专业英语翻译Unit 6

Unit 6 Methods of Elevation Determination(高程测量方法)An elevation is a vertical distance above or below a reference datum.(高程是高于或低于一个参考基准的一个垂直距离。

)Although vertical distance can be referenced to any datum, in surveying, the reference datum that is universally employed is that of mean sea level (MSL).(虽然垂直距离可以参考任何一个基准,但是在测量上,这个参考基准一般使用【employ使用、雇佣】的是平均海平面(MSL))MSL is assigned a vertical value (elevation) of 0.000 ft or 0.000 m.(MSL 被赋予【assign】一个 0.000 英尺或 0.000 米的高程)All other points on the earth can be described by the elevations above or below zero.(地球上所有其它点可以用高于或低于 0 的高程来描述)Permanent points whose elevations have been precisely determined (benchmarks)are available in most areas for survey use.(高程精确测出的永久点(水准点)被用于【available 可利用、可用到的】大多数区域的测量工作)In China, 7 years of observations at tidal stations in Qingdao from 1950 to 1956were reduced and adjustedto provide the Huanghai vertical datum of 1956.(在中国,利用青岛验潮站【tidal stations in Qingdao】从 1950 年到 1956 年 7 年的观测数据处理【reduce 处理、分析、减少】和平差,建立了 56 黄海高程系统)In the 1987, this datum was further refined to reflect long periodical ocean tide change to providea new national vertical datum of 1985, according to the observations at tidal stations from 1952 to1979.(1987 年,在依照了【according to】验潮站 1952 到 1979 年的观测资料后,这个基准【56 基准】被进一步精确【refine 精确、精制 v.】——反映长时期海潮变化的 85 国家高程基准建立起来。

专业英语(词组翻译)

专业英语(词组翻译)

Unit 1 Introduction to Semiconductors导体/绝缘体电阻/电导原子/分子/离子本征半导体Resistance/conductivity Atom/molecule/ion Intrinsic senmiconductor Conductor/semiconductor能级共价键金属/晶体/化合物Energy level Covalent bond Metal/crystal/compoundUnit 2 Semiconductor Devices电流电压放大器PN结正向偏置Current V oltage amplifier PN junction Forward bias反向偏置集成电路半导体结型二极管正/负电荷Reverse bias Integrated circuit Semiconductor junction diode Positive/negative chargeUnit 3 Logic Circuit硬件/软件设计真值表无源器件模拟/数字电路Hardware/software design Truth table Passive device Analog/digital circuit饱和模式电压降负载电阻上升/下降时间Saturation mode V oltage drop Load resistance Rise/fall time建立时间PROM RAMRandom Access MemorySet-up time Programmable Read-OnlyMemoryUnit 6 Signal Transform and Spectrum信号分析与综合傅立叶变换傅立叶级数复指数函数Signal analysis and synthesis Fourier transform Fourier Series Complex exponential function 非周期信号DFT FFT 自相关函数Aperiodical signal Discret Fourier Transform Fast Fourier Transform Autocorrelation fuctionUnit 8 The Fundamental of Communications单位抽样信号连续信号离散信号低通滤波器Unit sample signal Continuous signal Discret signal Loss-pass filter抽样间隔时域采样量化噪声模拟-数字转换器Sampling interval Time-domain sampling Quantization noise Analog-digital converterUnit 9 Wave Propagation and Polarization传播速度干涉仪麦克斯韦方程平面波Propagation velocity interferometer Maxwell’s equations Plane wave电磁场双折射折射率波矢量Electromagnetic field Bireferingence Refractive index Wave vector传播常数各向同性介质玻印廷矢量入射/反射/折射Propagation constant Isotropic medium Pointing vector Incidence/reflection/refraction Unit 10 Lasers半导体激光器光子光放大器输出功率控制Semiconductor laser photon Optical amplifier Output power control部分反射的激光器偏置电流外调制器线性调制Partial reflective Laser biased current External modulator Linear modulation受激辐射亚稳态激发光子Stimulated emission Metastable state Excited photonUnit 11 Optic Detectors光探测器光强轻掺杂半导体耗尽层Photodetector Light intensity Lightly doped semiconductor Depletion layer电子/空穴对正/负电极反向偏置P-N结暗电流Electron/hole pair Positive/negative electrode Reverse-biased P-N junction Dark current热噪声光电二极管噪声特性价带Thermal noise photodiode Noise characteristics Valence band耗尽区导带扩散和漂移量子效率Depletion region Conduction band Diffusion and drift Quantum efficiency Unit 12 Optic Fiber Communication and Measurement光纤通信系统点到点传输系统模拟传输系统单模光纤Optic fiber communication system Point-to-point transmissionsystemAnalog transmission system Single-mode fiber多模光纤同轴电缆中继站双绞线Multi-mode fiber Coaxial cable repeater Twisted pairUnit 13 WDM Communication System波分复用串扰调制带宽衰减系数Wavelength DivisionMultiplexingcrosstalk Modulated bandwidth Attenuation coefficient系统级联光子网络波长稳定色散补偿System cascade Photonic network Wavelength stability Dispersion compensation 掺铒光纤放大器Erbium doped fiber ampliferDisplay technology overviewLCD OLED DLP 等离子显示Liquid crystal display Organic light emitting diode Digital light processing Plasma display场发射显示CRT 手持/便携设备配向层Field emission display Cathode Ray Tube Handheld/portable device Alignment layer向列型/近晶型液晶导电电极偏振透镜液晶单元Nematic/smetic liquid crystal Conductive electrode Polarizing lens Liquid crystal cell。

数学专业英语课后翻译

数学专业英语课后翻译

2.1 数学、方程与比例(1)数学来源于人类的社会实践,包括工农业的劳动,商业、军事和科学技术研究等活动。

Mathematics comes from man’s social practice, for example, industrial and agricultural production, commercial activities, military operations and scientific and technological researches.(2)如果没有运用数学,任何一个科学技术分支都不可能正常地发展。

No modern scientific and technological branches could be regularly developed without the application of mathematics.(3)符号在数学中起着非常重要的作用,它常用于表示概念和命题。

Notations are a special and powerful tool of mathematics and are used to express conceptions and propositions very often.(4)17 世纪之前,人们局限于初等数学,即几何、三角和代数,那时只考虑常数。

Before 17th century, man confined himself to the elementary mathematics, i. e. , geometry, trigonometry and algebra, in which only the constants were considered.(5)方程与算数的等式不同在于它含有可以参加运算的未知量。

Equation is different from arithmetic identity in that it contains unknown quantity which can join operations.(6)方程又称为条件等式,因为其中的未知量通常只允许取某些特定的值。

专业英语翻译 (6)

专业英语翻译 (6)

New technique of the computer networkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.Keywords:Internet ; Digital Certificates ; Digital Wallets ;Grid Storage1. ForewordInternet turns 36, still a work in progressThirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and security troubles.All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - nowthe second most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world.Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet's key oversight body, he is trying to defend the core addressing system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video.Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using spoofed addresses.Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.2.Digital CertificatesDigital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions.Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasn‟t been forged or altered in any way.New Uses For Digital CertificatesDigital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning.Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers or cable service providers can use to automatically identify individual modems.This …ast-mile‟authentication not o nly protects the value of existing content and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market.When a certificate is digitally signed by a CA, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access.Identifying information embedded in the certificate includes the holder‟ s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When a user‟s identity is verified by the CA, the certificate uses the holder‟s public encryption key to protect this data.Public keys are also employed by certificates that a Web server uses to confirm the authenticity of a Web site for a user‟s browser. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the server‟s digital certificate to verify its identity.Role of Public-Key CryptographyThe public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates.Public-key cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical value that‟s used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key.A person‟s public key is used by others to enc rypt information meant only for that person. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use itsprivate key to make sure that only it can decrypt confidential information sent to it over the Internet.The Web server‟s certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator.The CA certificate tells users whether they can trust the Web server certificate when it‟s presented to the browser. If the validity of the Web server certificate is affirmed, the certificate‟s public key is used to secure information for the server using Secure Sockets Layer (SSL) technology.Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers.3. Digital WalletsA digital wallet is software that enables users to pay for goods on the Web .It holds credit-card numbers and other personal information such as a shipping address .Once entered,the data automatically populates order fields at merchant sites .When using a digital wallet,consumers don‟t need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatically updated and entered into the order fields across merchantsites .Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code .And merchants benefit by receiving protection against fraud .Digital wallets are available to consumers free of charge,and they‟re fairly easy to obtain .For example,when a consumer makes a purchase at a merchant site th at‟s set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchant‟s own form .At the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases .Users can also acquire wallets at a wallet vendor‟s site .Although a wallet is free for consumers,vendors charge merchants for wallets .Digital wallets come in two main types:client-side and server- side .Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic .Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and install software .A user downloads the wallet application and inputs payment and mailinginformation .At that point,the information is secured and encrypted on the user‟s hard drive .The user retains control of his credit card and personal information locally .With a server-based wallet,a user fills out his personal information,and a cookie is automatically downloaded .(A cookie is a text file that contains information about the user .)In this scenario,the consumer information resides on the server of a financial inst itution or a digital wallet vendor rather than on the user‟s PC .Server-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties .When a party makes a transaction,it presents its certificate to the other parties involved .A certificate is an attachment to an electronic message used to verify the identity of the party and to provide the receiver with the means to encode a reply .Furthermore,the cardholder‟s sensitive data is typically house d at a financial institution,so there‟s an extra sense of security because financial environments generally provide the highest degree of security .But even though wallets provide easy shopping online,adoption hasn‟t been widespread .Standards are pivotal to the success of digital wallets .Last month,major vendors,including Microsoft Corp .,Sun Microsystems Inc .and America Online Inc .announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment .4. Grid StorageDefinition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system.A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they aren‟t constrained by the need for ever-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure.Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and deallocating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes.After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity.What Is Grid Storage?Based on current and proposed products, it appears that a grid storage system should include the following:Modular storage arrays: These systems are connected across a storage network using serial ATA disks. The systems can be block-oriented storage arrays or network-attached storage gateways and servers.Common virtualization layer: Storage must be organized as a single logical pool of resources available to users.Data redundancy and availability: Multiple copies of data should exist across nodes in the grid, creating redundant data access and availability in case of a component failure.Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning.Simplified platform/management architecture: Because common management is so important, the tasks involved in administration should be organized in modular fashion, allowing the autodiscovery of new nodes in the grid and automating volume and file management.Three Basic BenefitsApplying grid topology to a storage network provides several benefits, including the following:Reliability. A well-designed grid network is extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal impact on system availability or downtime.Performance. The same factors that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available offers consistent performance for the entire network.Scalability. It‟s easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using relatively inexpensive storage building blocks.中文翻译新技术的计算机网络摘要:21世纪是信息经济的时代,作为这个时代的代表技术,计算机网络技术,将在非常快的速度发展很快,不断创造性地将进入人们的工作,学习和生活中深。

电气工程及其自动化专业英语第6章6-3翻译

电气工程及其自动化专业英语第6章6-3翻译

Section 3 Operation and Control of Power Systems 第3节操作和控制的电力系统The purpose of a power system is to deliver the power the customers require in real time, on demand, within acceptable voltage and frequency limits, and in a reliable and economic manner. 该系统的目的,权力是为客户提供电力的时间为客户需要实际需求,对,在可接受的电压和频率的限制,在一个可靠和经济的方式。

In normal operation of a power system, the total power generation is balanced by the total load and transmission losses. 在电力系统正常运行的,总发电是平衡的总负荷和传输的损失。

The system frequency and voltages on all the buses are within the required limits, while no overloads on lines or equipment are resulted. 该系统的频率和电压的所有公共汽车都在规定的限额,而没有超载或设备上线造成的。

However, loads are constantly changed in small or large extents, so some control actions must be applied to maintain the power system in the normal and economic operation state. 但是,负载不断变化幅度小或大,所以一些控制行动必须适用于维持在正常和经济运行状态的电力系统。

unit6专业英语的翻译-4(名词的翻译)

unit6专业英语的翻译-4(名词的翻译)
专业英语的翻译-4 名词的翻译
名词的翻译

几乎所有语言都存在一词多义的现象。在英汉 字典中我们往往会查到一个英语单词的多种含 义,因此在翻译科技文章时,必须结合语法知 识和上下文的逻辑关系,尤其是结合所涉及的 专业知识,才会对一个词的具体词义作出准确 的判断。名词也不例外,在不同的专业上下文 中,往往具有不同的汉语翻译方式。例如: cell在生物学中作“细胞”讲,在化工领域可 作“电解槽”讲,在电学中是“电池”的意思;

译:元件技术中起主要作用的因素是半导体元 件。
名词的翻译

IPC took over an immense range of tasks from worker’s muscles and brains. 译:工控机取代了工人大量的体力和脑 力劳动。 The foresight and coverage shown by the inventor of this apparatus are impressing. 译:这种装置的发明者所表现的远见和 渊博学识给人很深的印象。
名词的翻译

All the wit and learning in this field are to be present at the symposium.
译:所有的这一领域的学者都将出席这个科学 讨论会。The wit and learning 智慧和学识 The contributors in component technology have been in the semiconductor components.
名词的翻译

由上例子可以看出,如果翻译正确,决不可能 仅凭借日常生活用语中相对狭窄的知识面和词 汇量,而应结合本专业知识,在字典的帮助下, 熟悉和积累常用英文专业词汇的汉语词义,切 莫随意妄加推断。但字典不可能对每个词所有 搭配的含义和翻译都一一列出,因而在必要时 需要对原文中的词汇做词义引申意译的处理, 以避免译文生硬晦涩,意思含糊,甚至误解。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

New technique of the computer networkAbstractThe 21 century is an ages of the information economy, being the computer network technique of representative techniques this ages, will be at very fast speed develop soon in continuously creatively, and will go deep into the people's work, life and study. Therefore, control this technique and then seem to be more to deliver the importance. Now I mainly introduce the new technique of a few networks in actuality live of application.Keywords:Internet ; Digital Certificates ; Digital Wallets ;Grid Storage1. ForewordInternet turns 36, still a work in progressThirty-six years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the network to reduce spam(junk mail) and security troubles.All the while threats loom: Critics warn that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.Then came e-mail a few years later, a core communications protocol called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web - nowthe second most popular application behind e-mail - in 1990. The Internet expanded beyond its initial military and educational domain into businesses and homes around the world.Today, Crocker continues work on the Internet, designing better tools for collaboration. And as security chairman for the Internet's key oversight body, he is trying to defend the core addressing system from outside threats.He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and stutters now common with video.Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated - a way to cut down on junk messages sent using spoofed addresses.Many features being developed today wouldn't have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.2.Digital CertificatesDigital certificates are data files used to establish the identity of people and electronic assets on the Internet. They allow for secure, encrypted online communication and are often used to protect online transactions.Digital certificates are issued by a trusted third party known as a certification authority (CA). The CA validates the identity of a certificate holder and “signs” the certificate to attest that it hasn‟t been forged or altered in any way.New Uses For Digital CertificatesDigital certificates are now being used to provide security and validation for wireless connections, and hardware manufacturers are one of the latest groups to use them. Not long ago, VeriSign Inc. announced its Cable Modem Authentication Services, which allow hardware manufacturers to embed digital certificates into cable modems to help prevent the pirating of broadband services through device cloning.Using VeriSign software, hardware makers can generate cryptographic keys and corresponding digital certificates that manufacturers or cable service providers can use to automatically identify individual modems.This …ast-mile‟authentication not o nly protects the value of existing content and services but also positions cable system operators to bring a broad new range of content, applications and value-added services to market.When a certificate is digitally signed by a CA, its owner can use it as an electronic passport to prove his identity. It can be presented to Web sites, networks or individuals that require secure access.Identifying information embedded in the certificate includes the holder‟ s name and e-mail address, the name of the CA, a serial number and any activation or expiration data for the certificate. When a user‟s identity is verified by the CA, the certificate uses the holder‟s public encryption key to protect this data.Public keys are also employed by certificates that a Web server uses to confirm the authenticity of a Web site for a user‟s browser. When a user wants to send confidential information to a Web server, such as a credit-card number for an online transaction, the browser will access the public key in the server‟s digital certificate to verify its identity.Role of Public-Key CryptographyThe public key is one half of a pair of keys used in public-key cryptography, which provides the foundation for digital certificates.Public-key cryptography uses matched public and private keys for encryption and decryption. These keys have a numerical value that‟s used by an algorithm to scramble information and make it readable only to users with the corresponding decryption key.A person‟s public key is used by others to enc rypt information meant only for that person. When he receives the information, he uses his corresponding private key, which is kept secret, to decrypt the data. A person's public key can be distributed without damaging the private key. A Web server using a digital certificate can use itsprivate key to make sure that only it can decrypt confidential information sent to it over the Internet.The Web server‟s certificate is validated by a self-signed CA certificate that identifies the issuing CA. CA certificates are preinstalled on most major Web browsers, including Microsoft Internet Explorer and Netscape Navigator.The CA certificate tells users whether they can trust the Web server certificate when it‟s presented to the browser. If the validity of the Web server certificate is affirmed, the certificate‟s public key is used to secure information for the server using Secure Sockets Layer (SSL) technology.Digital certificates are used by the SSL security protocol to create a secure “pipe” between two parties that seek confidential communication. SSL is used in most major Web browsers and commercial Web servers.3. Digital WalletsA digital wallet is software that enables users to pay for goods on the Web .It holds credit-card numbers and other personal information such as a shipping address .Once entered,the data automatically populates order fields at merchant sites .When using a digital wallet,consumers don‟t need to fill out order forms on each site when they purchase an item because the information has already been stored and is automatically updated and entered into the order fields across merchantsites .Consumers also benefit when using digital wallets because their information is encrypted or protected by a private software code .And merchants benefit by receiving protection against fraud .Digital wallets are available to consumers free of charge,and they‟re fairly easy to obtain .For example,when a consumer makes a purchase at a merchant site th at‟s set up to handle server-side digital wallets,he types his name and payment and shipping information into the merchant‟s own form .At the end of the purchase,one consumer is asked to sign up for a wallet of his choice by entering a user name and password for future purchases .Users can also acquire wallets at a wallet vendor‟s site .Although a wallet is free for consumers,vendors charge merchants for wallets .Digital wallets come in two main types:client-side and server- side .Within those divisions are wallets that work only on specific merchant sites and those that are merchant agnostic .Client-based digital wallets,the older of the two types,are falling by the wayside,according to analysts,because they require users to download and install software .A user downloads the wallet application and inputs payment and mailinginformation .At that point,the information is secured and encrypted on the user‟s hard drive .The user retains control of his credit card and personal information locally .With a server-based wallet,a user fills out his personal information,and a cookie is automatically downloaded .(A cookie is a text file that contains information about the user .)In this scenario,the consumer information resides on the server of a financial inst itution or a digital wallet vendor rather than on the user‟s PC .Server-side wallets provide assurance against merchant fraud because they use certificates to verify the identity of all parties .When a party makes a transaction,it presents its certificate to the other parties involved .A certificate is an attachment to an electronic message used to verify the identity of the party and to provide the receiver with the means to encode a reply .Furthermore,the cardholder‟s sensitive data is typically house d at a financial institution,so there‟s an extra sense of security because financial environments generally provide the highest degree of security .But even though wallets provide easy shopping online,adoption hasn‟t been widespread .Standards are pivotal to the success of digital wallets .Last month,major vendors,including Microsoft Corp .,Sun Microsystems Inc .and America Online Inc .announced their endorsement of a new standard called EMCL,or E-Commerce Modeling Language,to give Web merchants a standardized way to collect electronic data for shipping,billing and payment .4. Grid StorageDefinition: Grid storage, analogous to grid computing, is a new model for deploying and managing storage distributed across multiple systems and networks, making efficient use of available storage capacity without requiring a large, centralized switching system.A grid is, in fact, a meshed network in which no single centralized switch or hub controls routing. Grids offer almost unlimited scalability in size and performance because they aren‟t constrained by the need for ever-larger central switches. Grid networks thus reduce component costs and produce a reliable and resilient structure.Applying the grid concept to a computer network lets us harness available but unused resources by dynamically allocating and deallocating capacity, bandwidth and processing among numerous distributed computers. A computing grid can span locations, organizations, machine architectures and software boundaries, offering power, collaboration and information access to connected users. Universities and research facilities are using grids to build what amounts to supercomputer capability from PCs, Macintoshes and Linux boxes.After grid computing came into being, it was only a matter of time before a similar model would emerge for making use of distributed data storage. Most storage networks are built in star configurations, where all servers and storage devices are connected to a single central switch. In contrast, grid topology is built with a network of interconnected smaller switches that can scale as bandwidth increases and continue to deliver improved reliability and higher performance and connectivity.What Is Grid Storage?Based on current and proposed products, it appears that a grid storage system should include the following:Modular storage arrays: These systems are connected across a storage network using serial ATA disks. The systems can be block-oriented storage arrays or network-attached storage gateways and servers.Common virtualization layer: Storage must be organized as a single logical pool of resources available to users.Data redundancy and availability: Multiple copies of data should exist across nodes in the grid, creating redundant data access and availability in case of a component failure.Common management: A single level of management across all nodes should cover the areas of data security, mobility and migration, capacity on demand, and provisioning.Simplified platform/management architecture: Because common management is so important, the tasks involved in administration should be organized in modular fashion, allowing the autodiscovery of new nodes in the grid and automating volume and file management.Three Basic BenefitsApplying grid topology to a storage network provides several benefits, including the following:Reliability. A well-designed grid network is extremely resilient. Rather than providing just two paths between any two nodes, the grid offers multiple paths between each storage node. This makes it easy to service and replace components in case of failure, with minimal impact on system availability or downtime.Performance. The same factors that lead to reliability also can improve performance. Not requiring a centralized switch with many ports eliminates a potential performance bottleneck, and applying load-balancing techniques to the multiple paths available offers consistent performance for the entire network.Scalability. It‟s easy to expand a grid network using inexpensive switches with low port counts to accommodate additional servers for increased performance, bandwidth and capacity. In essence, grid storage is a way to scale out rather than up, using relatively inexpensive storage building blocks.中文翻译新技术的计算机网络摘要:21世纪是信息经济的时代,作为这个时代的代表技术,计算机网络技术,将在非常快的速度发展很快,不断创造性地将进入人们的工作,学习和生活中深。

相关文档
最新文档