毕业设计论文外文资料翻译学生用 - 南京理工大学
毕业设计说明书中英文摘要范本--南京理工大学
毕业设计说明书(论文)外文摘要
TitleThree-dimensionalModeling of the Computer Case
Abstract
As scientific technologies and living conditions advance, more and more people use computer to socialize, shop online, and stay tuned to news events. Computers have greatly enriched people’s lives. As an essential component of an operating desktop computer, the computer case not only carries other important components of the computer, but also helps the computer ventilate as well as blocking radiations from reaching the users. This paper discusses the sheet metal forming processes and the calculation of the key process parameters of the computer case as a sheet metal product.By usingSolidWorkssoftware and relevant information regarding sheet metal and 3D modeling, the project designs and assembles case parts on a 3D platform under the premise of ensuring the functionality of the case. The engineering drawings of the design are also produced.
孙庆熘.外文翻译3
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:机械工程及自动化姓名:孙庆熘学号: 100104237外文出处:Engineering Failure Analysis 16(2009)(用外文写)1542-1548附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文仿形线圈造成的发动机连杆螺栓疲劳S. Griza , F. Bertoni, G. Zanon, A. Reguly, T.R. Strohaecker(冶金系,南里奥格兰德州联邦大学,阿雷格里90035190,巴西。
)摘要:研究人员做了一个分析实验,来寻找修正后的汽车柴油发动机在仅仅工作六个月就发生故障的根本原因。
实验过程中监测了连杆螺栓的扭矩分量,并且将断裂的连杆螺栓送到实验室进行断裂分析。
通过对四连杆螺栓中第一个连杆螺栓的疲劳断裂来验证猜想。
然后将剩下的连杆螺栓进行拉伸实验。
在这个过程中,第二个连杆螺栓的疲劳裂纹的扩展表明第一个已经断裂的螺栓没有受到扭矩松弛。
研究人员运用了有限元与断裂力学相结合的分析方法对连杆螺栓进行分析,以判定固紧力和疲劳裂纹扩展之间的关系。
实验得出结论,发动机崩溃是由于连杆螺栓上的连杆槽上的仿形线圈。
最后,为避免今后发生故障,提出几点改进的设计方案:连杆盖与连杆槽之间要预留足够空隙以避免更高应力幅与干涉同时发生;增加组装连杆螺栓的扭矩,以减小应力幅。
关键词:连杆螺栓;疲惫;疲惫分析;设计;仿形线圈1.引言在一个复杂的系统中,螺栓故障会导致灾难性的结果[1]。
即便人们对螺栓力学有广泛的认识,但仍有失败的案例发生。
最常见的造成失效的因素有预紧力小,设计缺陷特别是由于材料的选择不当,热处理不正确或者机械加工误差造成的螺纹牙根半径、螺栓材料或生产制造方面的缺陷[2–6]。
在本实验中,该失效分析是在一个经历了六个月使用后发生故障的6.6汽车柴油发动机上进行的。
研究人员在实验前打开发动机,并更换了一些零件,如密封圈,轴承和连杆螺栓。
车辆工程专业外文翻译
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:车辆工程姓名:学号:外文出处:IEEE Transactions on Energy Conversion 附件: 1.外文资料翻译译文;2.外文原文注:请将该封面与附件装订成册。
附件1:外文资料翻译译文内燃-线性发电集成动力系统的动圈式电机的改进摘要——本文探讨了动圈式线性电机(MCLM)在内燃-线性发电集成动力系统(ICLG) 的使用,这是一个混合动力电动汽车关于分布式发电和应急电源的新颖的解决方案。
根据分析MCLM的基本结构,提出一种改进的管状MCLM配备:准·哈尔巴赫磁化磁铁,这是一个分析等效磁路(EMC)模型。
在EMC模型中测量一个4 kn原型,结果显示良好。
而对比动磁式线性电机(MMLM),该机器的优点是动质量少,响应更快和更好的可控性。
关键词——自由活塞发动机、线性发电机,线性电机,发电机。
I 介绍一个内燃-线性发电集成动力系统(ICLG),也被称为自由活塞能源转换器,是一个集成一个自由活塞发动机和一个线性电机的机器。
这个概念提供了一个解决混合电动汽车、分布式发电、和应急电源供应等问题的新颖的方案。
作为一个单缸ICLG图1所示,无曲轴在可靠性、效率、燃料消费,和排放等方面有好处。
额外的操作能力的具有可变压缩比,允许使用更有前途的、相同质量而费用较低的点火燃烧,更容易过渡到未来燃料。
然而,这要求有严格的控制系统和电气机器,这个概念的主要缺点在电力系统。
图1 ICLG综合电力系统为实现ICLG概念,电机必须有高推力、低移动的大规模、高发电效率、快速响应和高可控性这些特定的苛刻的要求。
这是因为增加的移动质量负面影响了最大频率和转换系统的功率密度。
高效率是这一能量变换器竞争力的重要方面。
快速响应和高可控性是正确计时每个冲程的活塞的往复运动的两个先决条件,避免活塞和腔室头之间的碰撞。
此外,双向可逆控制对达到目的和克服失火也是必须的。
5林晟外文翻译
南京理工大学泰州科技学院毕业设计(论文)外文资料翻译学院(系):商学院专业:会计学姓名:林晟学号: 0706130352外文出处: IGOR FILATOTCHEV. OwnershipConcentration,‘PrivateBenefits of Control’ and DebtFinancing[J].Journal of CorporationLaw,2004,Vol.29.No.4,719-734 附件:1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文审股权集中度,“控制权私人收益”和债务融资IGOR FILATOTCHEV摘要:基于快速成长的'法律和经济’文献,本文分析了主要所有者在以牺牲小股东利益而获取“控制权私人收益”的环境中进行债务融资的公司治理。
这表明,所有权集中是与作为一个公司的负债比率和衡量投资的财政资源的使用效率较低有关,而这并不取决于最大股东的身份,固定的具有支配权的股东可以串通股权持有者进行控股溢价。
这个结论的其中一个可能的结果就是债务市场的企业信贷压缩,这有转型期经济体的证据支持。
关键词:所有权,控制权收益,债务引言有一个大量研究金融经济学和战略管理的文献显示获得控制权私人收益的方式和数量与管理行为和企业业绩有关。
(Gibbs, 1993;Hoskisson et al., 1994;Jensen and Warner, 1988)然而,大多以往的研究集中于大型、公开的在传统的美国/英国公司控制模型的框架范围内分散所有权的上市公司,很少是关于所有权集中的公司治理(Holderness and Sheehan, 1988;Short,1994)。
快速成长的企业所有制结构的优化取决于“控制权私人收益”的水平。
(e.g., Bennedsen and Wol fenzon, 2000; Grossman and Hart, 1988;Harris and Raviv, 1988)。
【机械类文献翻译】CADCAM集成的加工特征提取
南京理工大学泰州科技学院毕业设计(论文)外文资料翻译系部:机械工程系专业:机械工程及自动化姓名:许巧兵学号: 05010247外文出处:Int J Adv Manuf Technol(2004)(用外文写)DOI 10.1007/s00170-003-1882-9附件:1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文CAD/CAM集成的加工特征提取摘要基于特征的CAD/CAM集成是一项在CAD,CAPP和CAM应用中实现零件信息自动传送和转化的技术。
特征是集成中的信息传输媒介。
由于设计下游的生产计划和零件设计者的角度不同,因此,特征转化和特征提取方法用来以设计特征模型为基础创建加工模型。
由于特征是相互关联的,因此生成加工特征的难点之一在于如何保存特征的完整性。
因此,最新的研究把重心放在平面形式的特征转换上。
本文讨论了特征相互作用存在的问题,并且提出了一个从设计特征模型中生成孔系加工特征的方法。
孔系特征是机床上变速箱零件的重要加工特征。
这些特征不能直接从设计特征数据库中获得。
本文进一步阐述了基于约束的方法来详细说明孔系特征模型,该模型从设计数据库提取出来,以几何学和拓扑学信息为基础。
另外,STEP格式文件用来连接已转化了的加工特征模型和下游的CAPP应用。
特征转化系统在一些零件实例中以及开发的一个原型CAPP系统上得到了验证。
关键字CAD/CAM集成约束特征转化特征相互作用基础特征 STEP界面1.引言基于特征的设计和制造系统在机械零件CAD/CAM系统中已经得到了广泛应用。
基于特征的CAD/CAM集成是一项在CAD,CAPP和CAM应用中实现零件信息自动传输和转化的技术[1-4]。
特征是集成系统中信息传输的媒介。
它包含大量工程信息,几何学和非几何学,并且将CAD,CAPP和CAM系统有机地联系起来。
然而,角度不同,对特征的定义也不同。
设计特征是与零件的功能、设计意图和模型构建方法有关的形状特征。
毕业论文外文资料翻译【范本模板】
毕业论文外文资料翻译题目(宋体三号,居中)学院(全称,宋体三号,居中)专业(全称,宋体三号,居中)班级(宋体三号,居中)学生(宋体三号,居中)学号(宋体三号,居中)指导教师(宋体三号,居中)二〇一〇年月日(宋体三号,居中,时间与开题时间一致)(英文原文装订在前)Journal of American Chemical Society, 2006, 128(7): 2421-2425. (文献翻译必须在中文译文第一页标明文献出处:即文章是何期刊上发表的,X年X卷X 期,格式如上例所示,四号,右对齐,杂志名加粗。
)[点击输入译文题目—标题1,黑体小二][点击输入作者,宋体小四][点击输入作者单位,宋体五号]摘要[点击输入,宋体五号]关键词[点击输入,宋体五号]1[点击输入一级标题-标题2,黑体四号][点击输入正文,宋体小四号,1。
25倍行距]1。
1[点击输入二级标题-标题3,黑体小四][点击输入正文,宋体小四,1。
25倍行距]1.1。
1[点击输入三级标题-标题4,黑体小四][点击输入正文,宋体小四,1。
25倍行距]说明:1.外文文章必须是正规期刊发表的。
2.翻译后的中文文章必须达到2000字以上,并且是一篇完整文章。
3.必须要有外文翻译的封面,使用学校统一的封面;封面上的翻译题目要写翻译过来的中文题目;封面上时间与开题时间一致。
4.外文原文在前,中文翻译在后;5.中文翻译中要包含题目、摘要、关键词、前言、全文以及参考文献,翻译要条理清晰,中文翻译要与英文一一对应.6.翻译中的中文文章字体为小四,所有字母、数字均为英文格式下的,中文为宋体,标准字符间距。
7.原文中的图片和表格可以直接剪切、粘贴,但是表头与图示必须翻译成中文。
8.图表必须居中,文章段落应两端对齐、首行缩进2个汉字字符、1.25倍行距。
例如:图1. 蛋白质样品的PCA图谱与8-卟啉识别排列分析(a)或16—卟啉识别排列分析(b).为了得到 b的数据矩阵,样品用16—卟啉识别排列分析来检测,而a 是通过捕获首八卟啉接收器数据矩阵从b 中萃取的.。
毕业设计(论文)外文资料翻译
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:机械工程及自动化姓名:徐华俊学号:100104348外文出处:WASTE FOOD DISPOSAL SYSTEM(3)(用外文写)附件:1.外文资料翻译译文;2.外文原文。
指导教师评语:该生翻译了一篇有关《废弃食物处理系统》的论文,论文内容跟课题的研究领域相关,在将来的课题设计中可以借鉴。
译文语句基本通顺,专业术语正确,标点符号运用无误。
说明该生具备一定的英语水平和翻译能力。
但文中仍有部分语句组织得不够完善,可以进一步修改。
签名:年月日注:请将该封面与附件装订成册。
附件1:外文资料翻译译文垃圾食物处理系统(3)打开功率继电器32的驱动,关闭与其相连的常闭开关118,从而消除了在此之前被施加到定时器单元40的控制终端146的触发信号,并且需要注意的是,功率继电器30的电源开关108供应了一个类似的功能,如本文所述的,启动系统10每天第一次激活功率继电器30的时候,这个功能中断了定时器单元40的控制终端146,即先前追踪的触发信号电路,如本文所述。
进一步,在与功率继电器32相连的开关被关闭的时候,它的驱动被触发的结果是非常明显的,断开常开继电器开关119,为高流量水阀22的电磁阀80建立了一个到地面的备用路径,也就是可以追踪到电源线200;通过导线202;电磁阀80;导线204;导线416和现在被断开的功率继电器32的闭合开关119到地面,如此一来就能明显并且很方便的注意到,与功率继电器30相连的开关109执行同样的功能,通过一个完全可追踪的功率继电器30,而不是功率继电器32,使功率继电器30处于启动状态,所以在任何时期,控制单元12的电动机46可在任意一个方向操作(这取决于功率继电器30或功率继电器32处于激活状态),电磁阀80也将保持通电,来保持高流量水阀22在该段时期内处于闭合状态,这样的话,水流将会在需要大幅率的时候流通,通过管道76和78流到控制单元12,这个控制单元12的机构52正积极粉碎积累废料,并且已经积累或正在采用,接着顺着水流冲到下水道或者通过类似单元12的出口58.你将会很方便的观察到电磁阀74保持通电,并且在控制单元12积极运作期间,低流量水阀20也保持闭合,并且应当在任何特定安装情况下,把阀22的流通能力考虑在内。
毕业设计(论文)外文资料翻译(学生用)
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
毕业设计(论文)外文资料翻译【范本模板】
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械系专业:车辆工程专业姓名:宋磊春学号:070102234外文出处:EDU_E_CAT_VBA_FF_V5R9(用外文写)附件:1。
外文资料翻译译文;2.外文原文.附件1:外文资料翻译译文CATIA V5 的自动化CATIA V5的自动化和脚本:在NT 和Unix上:脚本允许你用宏指令以非常简单的方式计划CATIA。
CATIA 使用在MS –VBScript中(V5.x中在NT和UNIX3。
0 )的共用部分来使得在两个平台上运行相同的宏。
在NT 平台上:自动化允许CATIA像Word/Excel或者Visual Basic程序那样与其他外用分享目标。
ATIA 能使用Word/Excel对象就像Word/Excel能使用CATIA 对象。
在Unix 平台上:CATIA将来的版本将允许从Java分享它的对象。
这将提供在Unix 和NT 之间的一个完美兼容。
CATIA V5 自动化:介绍(仅限NT)自动化允许在几个进程之间的联系:CATIA V5 在NT 上:接口COM:Visual Basic 脚本(对宏来说),Visual Basic 为应用(适合前:Word/Excel ),Visual Basic。
COM(零部件目标模型)是“微软“标准于几个应用程序之间的共享对象。
Automation 是一种“微软“技术,它使用一种解释环境中的COM对象。
ActiveX 组成部分是“微软“标准于几个应用程序之间的共享对象,即使在解释环境里。
OLE(对象的链接与嵌入)意思是资料可以在一个其他应用OLE的资料里连结并且可以被编辑的方法(在适当的位置编辑).在VBScript,VBA和Visual Basic之间的差别:Visual Basic(VB)是全部的版本。
它能产生独立的计划,它也能建立ActiveX 和服务器。
它可以被编辑。
VB中提供了一个补充文件名为“在线丛书“(VB的5。
图书馆框架结构设计外文翻译六
图书馆框架结构设计外文翻译六文档编制序号:[KK8UY-LL9IO69-TTO6M3-MTOL89-FTT688]南 京 理 工 大 学 紫 金 学 院毕业设计(论文)外文资料翻译系: 机械工程系专 业: 土木工程姓 名: 袁洲学 号: 0外文出处: Design of prestressed concrete structures附 件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
(用外文写)附件1:外文资料翻译译文8-2简支梁布局一个简单的预应力混凝土梁由两个危险截面控制:最大弯矩截面和端截面。
这两部分设计好之后,中间截面一定要单独检查,必要时其他部位也要单独调查。
最大弯矩截面在以下两种荷载阶段为控制情况,即传递时梁受最小弯矩MG 的初始阶段和最大设计弯矩MT时的工作荷载阶段。
而端截面则由抗剪强度、支承垫板、锚头间距和千斤顶净空所需要的面积来决定。
所有的中间截面是由一个或多个上述要求,根它们与上述两种危险截面的距离来控制。
对于后张构件的一种常见的布置方式是在最大弯矩截面采用诸如I形或T形的截面,而在接近梁端处逐渐过渡到简单的矩形截面。
这就是人们通常所说的后张构件的端块。
对于用长线法生产的先张构件,为了便于生产,全部只用一种等截面,其截面形状则可以为I形、双T形或空心的。
在第5 、6 和7章节中已经阐明了个别截面的设计,下面论述简支梁钢索的总布置。
梁的布置可以用变化混凝土和钢筋的办法来调整。
混凝土的截面在高度、宽度、形状和梁底面或者顶面的曲率方面都可以有变化。
而钢筋只在面积方面有所变化,不过在相对于混凝土重心轴线的位置方面却多半可以有变化。
通过调整这些变化因素,布置方案可能有许多组合,以适应不同的荷载情况。
这一点是与钢筋混凝土梁是完全不同的,在钢筋混凝土梁的通常布置中,不是一个统一的矩形截面便是一个统一的T形,而钢筋的位置总是布置得尽量靠底面纤维。
首先考虑先张梁,如图 8-7,这里最好采用直线钢索,因为它们在两个台座之间加力比较容易。
外文翻译模板
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:计算机系专业:计算机科学与技术姓名:张蕾学号:070601310外文出处:Russ Basiura. Professional W eb(用外文写)Services [M]. Beijing:Tsinghua UniversityPress, 2002.附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文 和SQL Server 2000是一个统一的Web开发模型,包括以尽可能少量的代码生成企业级Web应用程序所必需的服务。
是.NET Framework的一部分。
当编写应用程序的代码时,您可以访问.NET Framework中的类。
可以使用与公共语言运行库 (CLR) 兼容的任何语言来编写应用程序的代码,包括Microsoft Visual Basic、C#、JScript .NET和J#。
您可以使用这些语言来开发应用程序,能从公共语言运行库、类型安全、继承等这些中收获不少。
包括:∙页和控件框架∙编译器∙安全基础结构∙状态管理功能∙应用程序配置∙运行状况监视和性能特征∙调试支持∙XML Web 服务框架∙可扩展的主机环境和应用程序生命周期管理∙可扩展的设计环境页和控件框架是一种编程框架,它在Web服务器上运行,动态地生成和呈现网页。
可以从任何浏览器或客户端设备请求网页,会向请求的浏览器呈现标记(例如HTML)。
通常,您可以对多个浏览器使用同一个网页,因为会对发出请求的浏览器呈现适当的标记。
然而,您可以以特定浏览器为目的设计网页,例如Microsoft Internet Explorer 6,并充分利用该浏览器的特性。
支持基于Web的设备的移动控件,如手机、掌上电脑和个人数字助理 (PDA)。
网页是完全面向对象的。
在网页中,可以使用属性、方法和事件来处理HTML元素。
页框架排除了基于Web应用程序所固有的客户端和服务器隔离的实现细节,为响应在服务器上运行的代码中的客户端事件提供统一的模型。
毕业设计(论文)外文资料翻译(学生用)
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:计算机专业:计算机科学与技术姓名:沈俊男学号: 060601239外文出处: E. Jimenez-Ruiz,R. Berlanga. The Management(用外文写)and Integration of Biomedical[M/OL].Castellon:Spanish Ministry of Education andScience project,2004[2005-09098]./ftp/cs/papers/0609/0609144.pdf附件: 1.外文资料翻译译文;2.外文原文。
注:请将该封面与附件装订成册。
附件1:外文资料翻译译文管理和集成的生物医学知识:应用于Health-e-Child项目摘要:这个Health-e-Child项目的目的是为欧洲儿科学发展集成保健平台。
为了实现一个关于儿童健康的综合观点,一个复杂的生物医学数据、信息和知识的整合是必需的。
本体论将用于正式定义这个领域的专业知识,将塑造医学知识管理系统的基础。
文中介绍了一种对生物医学知识的垂直整合的新颖的方法。
该方法将会主要使临床医生中心化,并使定义本体碎片成为可能,连接这些碎片(语义桥接器),丰富了本体碎片(观点)。
这个策略为规格和捕获的碎片,桥接器和观点概述了初步的例子证明从医院数据库、生物医学本体、生物医学公共数据库的生物医学信息的征收。
关键词:垂直的知识集成、近似查询、本体观点、语义桥接器1.1 医学数据集成问题数据来源的集成已经在数据库社区成为传统的研究课题。
一个综合数据库系统主要的目标是允许用户均匀的访问一个分布和一个异构数据库。
数据集成的关键因素是定义一个全局性的模式,但是值得指出的是,我们必须区分三种全局模式:数据库模式、概念模式和域本体模式。
首先介绍了数据类型的信息存储、本地查询;其二,概括了这些图式采用更富有表达力的数据模型,如统一建模语言(UML)(TAMBIS和SEMEDA都遵循这个模式)。
外文翻译
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:机械工程及自动化姓名:杜锋学号: 100104109外文出处:Toy development and design basedon the needs of older persons附件:1.外文资料翻译译文;2.外文原文。
指导教师评语:该生翻译了一篇有关《基于老年人需要的玩具开发和设计》的论文,论文内容主要研究使用于老年人的玩具需求、开发设计原则,在将来的课题“儿童玩具设计”中可以借鉴。
译文语句基本通顺,专业术语基本正确。
说明该生具备一定的英语水平和翻译能力。
签名:年月日附件1:外文资料翻译译文基于老年人需要的玩具开发和设计杨光辉摘要:在中国,老龄化和老年人的生活质量已成为当今社会着重关注的问题,如何解决这个问题已经成为了老年人用品发展的一项重要挑战。
现在,随之而来的解决办法多种多样。
例如,设计界已经开始重视老年人用品的开发和设计,但其中有很大一部分是用于医疗的产品。
对健康的人来说,在他们的年纪内大多数的这类设计很少涉及到。
在此,我认为,玩具的功能,关键是强调对老年人身心健康的发展,所以重新考虑老年人玩具的发展也是一种方法。
关键词:老年人玩具,需要设计,人性化的关怀提到的玩具,我们总是不自觉地想到无辜的孩子,仿佛玩具只是孩子们的特权。
但随着生活水平的提高,人们注重玩具的意识不断提高。
为了满足儿童的需要,各种各样设计都带了出来,甚至于奢侈品类的,而玩具也逐渐成为孩子的必需品。
然而,中国玩具协会表明,玩具不再是儿童的唯一特权。
玩具的概念已经延伸,现代玩具的功能和实用范围得到了进一步扩大。
玩具不仅仅启发孩子,同时也成为老年人娱乐产品。
老人们也需要能够满足他们精神需求、能够丰富他们的生活的玩具。
一、老年人玩具设计和开发的状态在中国,老年人玩具仍是一个发展中的行业。
老年人群体作为客户,他们有需求和购买力,但是没有针对性的玩具。
在中国有多达1.3亿名老年人,这将是一个巨大的消费群体,但老年人玩具的研究和开发已经落后发达国家近30年。
机器人英文翻译原文
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:机械工程与自动化姓名:学号:外文出处:Robot Journal of Manufacturing(用外文写)Science and Engineering附件:1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文附件2:外文原文RobotJournal of ManufacturingScience and EngineeringRobot is a type of mechantronics equipment which synthesizes the lastresearch achievement of engine and precision engine, micro-electronicsand computer, automation control and drive, sensor and message disposeand artificial intelligence and so on. With the development of economicand the demand for automation control, robot technology is developedquickly and all types of the robots products are come into being. Thepracticality use of robot products not only solves the problems which aredifficult to operate for human being, but also advances the industrialautomation program. Modern industrial robots are true marvels ofengineering. A robot the size of a person can easily carry a load overone hundred pounds and move it very quickly with a repeatability of+/-0.006 inches. Furthermore these robots can do that 24 hours a day foryears on end with no failures whatsoever. Though they are reprogrammable,in many applications (particularly those in the auto industry) they areprogrammed once and then repeat that exact same task for years.At present, the research and development of robot involves severalkinds of technology and the robot system configuration is so complex thatthe cost at large is high which to a certain extent limit the robot abroaduse. To development economic practicality and high reliability robotsystem will be value to robot social application and economy development.With the rapid progress with the control economy and expanding of themodern cities, the let of sewage is increasing quickly: With thedevelopment of modern technology and the enhancement of consciousnessabout environment reserve, more and more people realized the importanceand urgent of sewage disposal. Active bacteria method is an effectivetechnique for sewage disposal,The lacunaris plastic is an effectivebasement for active bacteria adhesion for sewage disposal. The abundancerequirement for lacunaris plastic makes it is a consequent for the plastic producing with automation and high productivity. Therefore, it is very necessary to design a manipulator that can automatically fulfill the plastic holding. With the analysis of the problems in the design of the plastic holding manipulator and synthesizing the robot research and development condition in recent years, a economic scheme is concluded on the basis of the analysis of mechanical configuration, transform system, drive device and control system and guided by the idea of the characteristic and complex of mechanical configuration, electronic, software and hardware. In this article, the mechanical configuration combines the character of direction coordinate and the arthrosis coordinate which can improve the stability and operation flexibility of the system. The main function of the transmission mechanism is to transmit power to implement department and complete the necessary movement. In this transmission structure, the screw transmission mechanism transmits the rotary motion into linear motion. Worm gear can give vary transmission ratio. Both of the transmission mechanisms have a characteristic of compact structure. The design of drive system often is limited by the environment condition and the factor of cost and technical lever. ''''The step motor can receive digital signal directly and has the ability to response outer environment immediately and has no accumulation error, which often is used in driving system. In this driving system, open-loop control system is composed of stepping motor, which can satisfy the demand not only for control precision but also for the target of economic and practicality. On this basis,the analysis of stepping motor in power calculating and style selecting is also given. The analysis of kinematics and dynamics for object holding manipulator is given in completing the design of mechanical structure and drive system. Kinematics analysis is the basis of path programming and track control. The positive and reverseanalysis of manipulator gives the relationship between manipulator space and drive space in position and speed. The relationship between manipulator’s tip position and arthrosis angles is concluded by coordinate transform method. The geometry method is used in solving inverse kinematics problem and the result will provide theory evidence for control system. The f0unction of dynamics is to get the relationship between the movement and force and the target is to satisfy the demand of real time control. in this chamfer, Newton-Euripides method is used in analysis dynamic problem of the cleaning robot and the arthrosis force and torque are given which provide the foundation for step motor selecting and structure dynamic optimal ting. Control system is the key and core part of the object holding manipulator system design which will direct effect the reliability and practicality of the robot system in the division of configuration and control function and also will effect or limit the development cost and cycle. With the demand of the PCL-839 card, the PC computer which has a. tight structure and is easy to be extended is used as the principal computer cell and takes the function of system initialization, data operation and dispose, step motor drive and error diagnose and so on. A t the same time, the configuration structure features, task principles and the position function with high precision of the control card PCL-839 are analyzed. Hardware is the matter foundation of the control. System and the software is the spirit of the control system. The target of the software is to combine all the parts in optimizing style and to improve the efficiency and reliability of the control system. The software design of the object holding manipulator control system is divided into several blocks such as system initialization block, data process block and error station detect and dispose model and so on. PCL-839 card can solve the communication between the main computer and the control cells and take the measure of reducing the influence of the outer signalto the control system. The start and stop frequency of the step motor is far lower than the maximum running frequency. In order to improve the efficiency of the step motor, the increase and decrease of the speed is must considered when the step motor running in high speed and start or stop with great acc eleration. The increase and decrease of the motor’s speed can be controlled by the pulse freque ncy sent to the step motor drive with a rational method. This can be implemented either by hardware or by software. A step motor shift control method is proposed, which is simple to calculate, easy to realize and the theory means is straightforward. The motor'''' s acceleration can fit the torque-frequency curve properly with this method. And the amount of calculation load is less than the linear acceleration shift control method and the method which is based on the exponential rule to change speed. The method is tested by experiment. A t last, the research content and the achievement are sum up and the problems and shortages in main the content are also listed. The development and application of robot in the future is expected.The purpose of manipulator control is to maintain the dynamic response of a computer-based manipulator in accordance with some prespecified system performance and desired goals. In general, the dynamic performance of a manipulator directly depends on the efficiency of the control algorithms and the dynamic model of the manipulator. The control problem consists of obtaining dynamic models of the physical robot arm system and then specifying corresponding control laws or strategies to achieve the desired system response and performance.Current industrial approaches to robot arm control treat each joint of the robot arm as a simple joint servomechanism. The servomechanism approach models the varying dynamics of a manipulator inadequately because it neglects the motion and configuration of the whole arm mechanism. These changes in the parameters of the controlled system sometimes are significant enough to render conventional feedback control strategies ineffective. The result is reduced servo response speed anddamping, limiting the precision and speed of the end-effector and making it appropriate only for limited-precision tasks. Manipulators controlled in this manner move at slow speeds with unnecessary vibrations. Any significant performance gain in this and other areas of robot arm control require the consideration of more efficient dynamic models, sophisticated control approaches, and the use of dedicated computer architectures and parallel processing techniques.In the industrial production and other fields, people often endangered by such factors as high temperature, corrode, poisonous gas and so forth at work, which have increased labor intensity and even jeopardized the life sometimes. The corresponding problems are solved since the robot arm comes out. The robot arms can catch, put and carry objects, and its movements are flexible and diversified. It applies to medium and small-scale automated production in which production varieties can be switched. And it is widely used on soft automatic line. The robot arms are generally made by withstand high temperatures, resist corrosion of materials to adapt to the harsh environment. So they reduced the labor intensity of the workers significantly and raised work efficiency. The robot arm is an important component of industrial robots, and it can be called industrial robots on many occasions. Industrial robot is set machinery, electronics, control, computers, sensors, artificial intelligence and other advanced technologies in the integration of multidisciplinary important modern manufacturing equipment. Widely using industrial robots, not only can improve product quality and production, but also is of great significance for physical security protection, improvement of the environment for labor, reducing labor intensity, improvement of labor productivity, raw material consumption savings and lowering production costs.There are such mechanical components as ball footbridge, slides, an air control mechanical hand and so on in the design. A programmable controller, a programming device, stepping motors, stepping motors drives, direct current motors, sensor, switch power supply, an electromagnetism valve and control desk are used in electrical connection. The programmable controller output two lines pulses to stepping motors drives to drive the two stepping motors drives on beam and verticalaxis; direct current motors drive the rotation of the base and the hand; sensors send signals of location to the mainframe, and the mainframe sends directive to control the extension and contraction, up and down, moves location; the mainframe send signals to control the opening and closing of the hand to carry objects. Related parameters can be changed according to request of the changes of the objects and movement flow at any time change the relevant parameters in the design, so it has great flexibility and operability.。
【机械类文献翻译】产品模型是造船环境中的核心信息源
南京理工大学泰州科技学院毕业设计(论文)外文资料翻译系部:机械工程系专业:机械工程及自动化姓名:任蕾蕾学号: 05010203外文出处:U.S. DEPARTMENT OF THE NA VY(用外文写)CARDEROCK DIVISION,NA V AL SURFACE WARFARE CENTER附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文产品模型是造船环境中的核心信息源摘要在造船CAD / CAM系统中,产品模型是在设计过程中逐步建立起来的,其中包括几何和非几何信息。
在设计的同时,对模型作进一步扩展增加制造信息(一些国家称其为产品工程信息),如造船生产计划和装配结构的定义。
零件制造所需的信息来自模型,如工程图,零部件明细表和数控设备所需的信息。
当造船生产计划的定义和产品模型相结合时,如零部件清单、装配图等所需要的信息就可以直接从产品模型得到,而不需手工建立。
使用产品模型这个概念建立的系统,以及有组织地实施的方法可以降低成本、提高生产力和竞争力。
引言背景船舶及海上的建筑往往是不成系列的或单件定制的产品。
这种产品的复杂性意味着高强度的设计和规划过程,许多任务必需同时进行。
通常,产品中的一个零件在制造的同时,另一个零件正在进行详细的设计。
对更高的效率和更短的交货时间的要求则意味着重叠进行的工作不断增加而使得整个过程也将变得更加复杂。
除此之外,许多设计中的变更提出得太迟。
一些企业引用一种新的行业术语来形容这种情形:“并行工程”。
尽管这个术语是新的,但对造船业来说,这种状况却不是新的,很多年来工人们已习惯于从事重叠性的工作。
以可控的方式处理重叠工作的能力在很大程度上影响了一个组织的效率。
增加工作的重叠性的关键是对信息流的管理和控制。
在大多数情况下造船厂中详细设计和生产都是在公司内部进行的,并且是在造船厂管理部门直接控制下。
这在某种程度上成为唯一发现有效的处理信息流并把潜在的信息处理问题转化为信息处理技能的一种可能,创造竞争的优势。
外文翻译
南京理工大学泰州科技学院毕业设计(论文)外文资料翻译学院(系):机械工程专业:机械工程及自动化姓名:学号:外文出处:Elsevier Ltd. Procedia Technology14 ( 2014 ) 365 – 371.附件:1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文基于PLC的洗瓶机可循环控制系统的开发摘要在这篇文章中,我们将把循环控制系统融入到洗瓶机中,这是我们整体设计的一个思路。
因为在某些地方,控制好液体流动是非常有用的,比如说在化学和石油工业中,通过对水的控制可以对瓶子进行清洗。
在这里,有三个参数需要控制1、液位2、流量3、压力。
在这些参数之间,存在相互作用关系,想要更好的洗瓶,就得控制压力和流量的大小。
对于这些变量,我们可以使用PLC来控制,使用PLC 可以增加效率和提高响应时间。
我们需要在洗瓶机的输出端装一个阀门,通过这个阀门来对循环系统进行调控。
如今,输入和输出的安全性是行业必须重视的。
所以,安全性也是我们需要考虑的。
对于不同的传感器和阀门,我们都用PLC来直接控制。
因为控制它们的程序不同,PLC就会产生不同的信号。
这种控制方式,同时可以控制液位、流量和压力的大小。
最后,需要连接一个额外的人机界面(HMI),用户可以通过这个控制器来更改设定值。
关键词循环控制压力控制洗瓶机流量控制液位控制循环安全1 引言过程循环系统通常使用在石油、天然气、化工、饮料等工业中。
它保证了气体或液体参数的准确性。
过程循环系统是一种确保制造商在保持工作状态下,在规定范围内,保证最大利润的同时也保证质量和安全。
我们已经设计出一个循环控制系统,这套系统专为洗瓶机而开发的。
洗瓶机大约每小时能够清洗30000到170000瓶。
在这台机器上,我们需要对水、温度和化学成分进行控制,其中对水的控制是最重要的。
因为机器每天将使用数千升的水,我们可以适当的调整,可以循环利用这些水。
如果这些参数不能达到相互平衡,这将直接影响产品的成本。
毕业设计(论文)外文文献原文及译文
毕业设计(论文)外文文献原文及译文Chapter 11. Cipher Techniques11.1 ProblemsThe use of a cipher without consideration of the environment in which it is to be used may not provide the security that the user expects. Three examples will make this point clear.11.1.1 Precomputing the Possible MessagesSimmons discusses the use of a "forward search" to decipher messages enciphered for confidentiality using a public key cryptosystem [923]. His approach is to focus on the entropy (uncertainty) in the message. To use an example from Section 10.1(page 246), Cathy knows that Alice will send one of two messages—BUY or SELL—to Bob. The uncertainty is which one Alice will send. So Cathy enciphers both messages with Bob's public key. When Alice sends the message, Bob intercepts it and compares the ciphertext with the two he computed. From this, he knows which message Alice sent.Simmons' point is that if the plaintext corresponding to intercepted ciphertext is drawn from a (relatively) small set of possible plaintexts, the cryptanalyst can encipher the set of possible plaintexts and simply search that set for the intercepted ciphertext. Simmons demonstrates that the size of the set of possible plaintexts may not be obvious. As an example, he uses digitized sound. The initial calculations suggest that the number of possible plaintexts for each block is 232. Using forward search on such a set is clearly impractical, but after some analysis of the redundancy in human speech, Simmons reduces the number of potential plaintexts to about 100,000. This number is small enough so that forward searches become a threat.This attack is similar to attacks to derive the cryptographic key of symmetric ciphers based on chosen plaintext (see, for example, Hellman's time-memory tradeoff attack [465]). However, Simmons' attack is for public key cryptosystems and does not reveal the private key. It only reveals the plaintext message.11.1.2 Misordered BlocksDenning [269] points out that in certain cases, parts of a ciphertext message can be deleted, replayed, or reordered.11.1.3 Statistical RegularitiesThe independence of parts of ciphertext can give information relating to the structure of the enciphered message, even if the message itself is unintelligible. The regularity arises because each part is enciphered separately, so the same plaintext always produces the same ciphertext. This type of encipherment is called code book mode, because each part is effectively looked up in a list of plaintext-ciphertext pairs.11.1.4 SummaryDespite the use of sophisticated cryptosystems and random keys, cipher systems may provide inadequate security if not used carefully. The protocols directing how these cipher systems are used, and the ancillary information that the protocols add to messages and sessions, overcome these problems. This emphasizes that ciphers and codes are not enough. The methods, or protocols, for their use also affect the security of systems.11.2 Stream and Block CiphersSome ciphers divide a message into a sequence of parts, or blocks, and encipher each block with the same key.Definition 11–1. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach biis of a fixed length. Then a block cipher is a cipher for whichE k (m) = Ek(b1)Ek(b2) ….Other ciphers use a nonrepeating stream of key elements to encipher characters of a message.Definition 11–2. Let E be an encipherment algorithm, and let Ek(b) bethe encipherment of message b with key k. Let a message m = b1b2…, whereeach bi is of a fixed length, and let k = k1k2…. Then a stream cipheris a cipher for which Ek (m) = Ek1(b1)Ek2(b2) ….If the key stream k of a stream cipher repeats itself, it is a periodic cipher.11.2.1 Stream CiphersThe one-time pad is a cipher that can be proven secure (see Section 9.2.2.2, "One-Time Pad"). Bit-oriented ciphers implement the one-time pad by exclusive-oring each bit of the key with one bit of the message. For example, if the message is 00101 and the key is 10010, the ciphertext is01||00||10||01||10 or 10111. But how can one generate a random, infinitely long key?11.2.1.1 Synchronous Stream CiphersTo simulate a random, infinitely long key, synchronous stream ciphers generate bits from a source other than the message itself. The simplest such cipher extracts bits from a register to use as the key. The contents of the register change on the basis of the current contents of the register.Definition 11–3. An n-stage linear feedback shift register (LFSR)consists of an n-bit register r = r0…rn–1and an n-bit tap sequence t =t 0…tn–1. To obtain a key bit, ris used, the register is shifted one bitto the right, and the new bit r0t0⊕…⊕r n–1t n–1 is inserted.The LFSR method is an attempt to simulate a one-time pad by generating a long key sequence from a little information. As with any such attempt, if the key is shorter than the message, breaking part of the ciphertext gives the cryptanalyst information about other parts of the ciphertext. For an LFSR, a known plaintext attack can reveal parts of the key sequence. If the known plaintext is of length 2n, the tap sequence for an n-stage LFSR can be determined completely.Nonlinear feedback shift registers do not use tap sequences; instead, the new bit is any function of the current register bits.Definition 11–4. An n-stage nonlinear feedback shift register (NLFSR)consists of an n-bit register r = r0…rn–1. Whenever a key bit is required,ris used, the register is shifted one bit to the right, and the new bitis set to f(r0…rn–1), where f is any function of n inputs.NLFSRs are not common because there is no body of theory about how to build NLFSRs with long periods. By contrast, it is known how to design n-stage LFSRs with a period of 2n– 1, and that period is maximal.A second technique for eliminating linearity is called output feedback mode. Let E be an encipherment function. Define k as a cryptographic key,(r) and define r as a register. To obtain a bit for the key, compute Ekand put that value into the register. The rightmost bit of the result is exclusive-or'ed with one bit of the message. The process is repeated until the message is enciphered. The key k and the initial value in r are the keys for this method. This method differs from the NLFSR in that the register is never shifted. It is repeatedly enciphered.A variant of output feedback mode is called the counter method. Instead of using a register r, simply use a counter that is incremented for every encipherment. The initial value of the counter replaces r as part of the key. This method enables one to generate the ith bit of the key without generating the bits 0…i – 1. If the initial counter value is i, set. In output feedback mode, one must generate all the register to i + ithe preceding key bits.11.2.1.2 Self-Synchronous Stream CiphersSelf-synchronous ciphers obtain the key from the message itself. The simplest self-synchronous cipher is called an autokey cipher and uses the message itself for the key.The problem with this cipher is the selection of the key. Unlike a one-time pad, any statistical regularities in the plaintext show up in the key. For example, the last two letters of the ciphertext associated with the plaintext word THE are always AL, because H is enciphered with the key letter T and E is enciphered with the key letter H. Furthermore, if theanalyst can guess any letter of the plaintext, she can determine all successive plaintext letters.An alternative is to use the ciphertext as the key stream. A good cipher will produce pseudorandom ciphertext, which approximates a randomone-time pad better than a message with nonrandom characteristics (such as a meaningful English sentence).This type of autokey cipher is weak, because plaintext can be deduced from the ciphertext. For example, consider the first two characters of the ciphertext, QX. The X is the ciphertext resulting from enciphering some letter with the key Q. Deciphering, the unknown letter is H. Continuing in this fashion, the analyst can reconstruct all of the plaintext except for the first letter.A variant of the autokey method, cipher feedback mode, uses a shift register. Let E be an encipherment function. Define k as a cryptographic(r). The key and r as a register. To obtain a bit for the key, compute Ek rightmost bit of the result is exclusive-or'ed with one bit of the message, and the other bits of the result are discarded. The resulting ciphertext is fed back into the leftmost bit of the register, which is right shifted one bit. (See Figure 11-1.)Figure 11-1. Diagram of cipher feedback mode. The register r is enciphered with key k and algorithm E. The rightmost bit of the result is exclusive-or'ed with one bit of the plaintext m i to produce the ciphertext bit c i. The register r is right shifted one bit, and c i is fed back into the leftmost bit of r.Cipher feedback mode has a self-healing property. If a bit is corrupted in transmission of the ciphertext, the next n bits will be deciphered incorrectly. But after n uncorrupted bits have been received, the shift register will be reinitialized to the value used for encipherment and the ciphertext will decipher properly from that point on.As in the counter method, one can decipher parts of messages enciphered in cipher feedback mode without deciphering the entire message. Let the shift register contain n bits. The analyst obtains the previous n bits of ciphertext. This is the value in the shift register before the bit under consideration was enciphered. The decipherment can then continue from that bit on.11.2.2 Block CiphersBlock ciphers encipher and decipher multiple bits at once, rather than one bit at a time. For this reason, software implementations of block ciphers run faster than software implementations of stream ciphers. Errors in transmitting one block generally do not affect other blocks, but as each block is enciphered independently, using the same key, identical plaintext blocks produce identical ciphertext blocks. This allows the analyst to search for data by determining what the encipherment of a specific plaintext block is. For example, if the word INCOME is enciphered as one block, all occurrences of the word produce the same ciphertext.To prevent this type of attack, some information related to the block's position is inserted into the plaintext block before it is enciphered. The information can be bits from the preceding ciphertext block [343] or a sequence number [561]. The disadvantage is that the effective block size is reduced, because fewer message bits are present in a block.Cipher block chaining does not require the extra information to occupy bit spaces, so every bit in the block is part of the message. Before a plaintext block is enciphered, that block is exclusive-or'ed with the preceding ciphertext block. In addition to the key, this technique requires an initialization vector with which to exclusive-or the initial plaintext block. Taking Ekto be the encipherment algorithm with key k, and I to be the initialization vector, the cipher block chaining technique isc 0 = Ek(m⊕I)c i = Ek(mi⊕ci–1) for i > 011.2.2.1 Multiple EncryptionOther approaches involve multiple encryption. Using two keys k and k' toencipher a message as c = Ek' (Ek(m)) looks attractive because it has aneffective key length of 2n, whereas the keys to E are of length n. However, Merkle and Hellman [700] have shown that this encryption technique can be broken using 2n+1encryptions, rather than the expected 22n(see Exercise 3).Using three encipherments improves the strength of the cipher. There are several ways to do this. Tuchman [1006] suggested using two keys k and k':c = Ek (Dk'(Ek(m)))This mode, called Encrypt-Decrypt-Encrypt (EDE) mode, collapses to a single encipherment when k = k'. The DES in EDE mode is widely used in the financial community and is a standard (ANSI X9.17 and ISO 8732). It is not vulnerable to the attack outlined earlier. However, it is vulnerable to a chosen plaintext and a known plaintext attack. If b is the block size in bits, and n is the key length, the chosen plaintext attacktakes O(2n) time, O(2n) space, and requires 2n chosen plaintexts. The known plaintext attack requires p known plaintexts, and takes O(2n+b/p) time and O(p) memory.A second version of triple encipherment is the triple encryption mode [700]. In this mode, three keys are used in a chain of encipherments.c = Ek (Ek'(Ek''(m)))The best attack against this scheme is similar to the attack on double encipherment, but requires O(22n) time and O(2n) memory. If the key length is 56 bits, this attack is computationally infeasible.11.3 Networks and CryptographyBefore we discuss Internet protocols, a review of the relevant properties of networks is in order. The ISO/OSI model [990] provides an abstract representation of networks suitable for our purposes. Recall that the ISO/OSI model is composed of a series of layers (see Figure 11-2). Each host, conceptually, has a principal at each layer that communicates with a peer on other hosts. These principals communicate with principals at the same layer on other hosts. Layer 1, 2, and 3 principals interact only with similar principals at neighboring (directly connected) hosts. Principals at layers 4, 5, 6, and 7 interact only with similar principals at the other end of the communication. (For convenience, "host" refers to the appropriate principal in the following discussion.)Figure 11-2. The ISO/OSI model. The dashed arrows indicate peer-to-peer communication. For example, the transport layers are communicating with each other. The solid arrows indicate the actual flow of bits. For example, the transport layer invokes network layer routines on the local host, which invoke data link layer routines, which put the bits onto the network. The physical layer passes the bits to the next "hop," or host, on the path. When the message reaches the destination, it is passed up to the appropriatelevel.Each host in the network is connected to some set of other hosts. They exchange messages with those hosts. If host nob wants to send a message to host windsor, nob determines which of its immediate neighbors is closest to windsor (using an appropriate routing protocol) and forwards the message to it. That host, baton, determines which of its neighbors is closest to windsor and forwards the message to it. This process continues until a host, sunapee, receives the message and determines that windsor is an immediate neighbor. The message is forwarded to windsor, its endpoint.Definition 11–5. Let hosts C0, …, Cnbe such that Ciand Ci+1are directlyconnected, for 0 i < n. A communications protocol that has C0 and Cnasits endpoints is called an end-to-end protocol. A communications protocolthat has Cj and Cj+1as its endpoints is called a link protocol.The difference between an end-to-end protocol and a link protocol is that the intermediate hosts play no part in an end-to-end protocol other than forwarding messages. On the other hand, a link protocol describes how each pair of intermediate hosts processes each message.The protocols involved can be cryptographic protocols. If the cryptographic processing is done only at the source and at the destination, the protocol is an end-to-end protocol. If cryptographic processing occurs at each host along the path from source to destination, the protocolis a link protocol. When encryption is used with either protocol, we use the terms end-to-end encryption and link encryption, respectively.In link encryption, each host shares a cryptographic key with its neighbor. (If public key cryptography is used, each host has its neighbor's public key. Link encryption based on public keys is rare.) The keys may be set on a per-host basis or a per-host-pair basis. Consider a network with four hosts called windsor, stripe, facer, and seaview. Each host is directly connected to the other three. With keys distributed on a per-host basis, each host has its own key, making four keys in all. Each host has the keys for the other three neighbors, as well as its own. All hosts use the same key to communicate with windsor. With keys distributed on a per-host-pair basis, each host has one key per possible connection, making six keys in all. Unlike the per-host situation, in the per-host-pair case, each host uses a different key to communicate with windsor. The message is deciphered at each intermediate host, reenciphered for the next hop, and forwarded. Attackers monitoring the network medium will not be able to read the messages, but attackers at the intermediate hosts will be able to do so.In end-to-end encryption, each host shares a cryptographic key with each destination. (Again, if the encryption is based on public key cryptography, each host has—or can obtain—the public key of each destination.) As with link encryption, the keys may be selected on a per-host or per-host-pair basis. The sending host enciphers the message and forwards it to the first intermediate host. The intermediate host forwards it to the next host, and the process continues until the message reaches its destination. The destination host then deciphers it. The message is enciphered throughout its journey. Neither attackers monitoring the network nor attackers on the intermediate hosts can read the message. However, attackers can read the routing information used to forward the message.These differences affect a form of cryptanalysis known as traffic analysis.A cryptanalyst can sometimes deduce information not from the content ofthe message but from the sender and recipient. For example, during the Allied invasion of Normandy in World War II, the Germans deduced which vessels were the command ships by observing which ships were sending and receiving the most signals. The content of the signals was not relevant; their source and destination were. Similar deductions can reveal information in the electronic world.第十一章密码技术11.1问题在没有考虑加密所要运行的环境时,加密的使用可能不能提供用户所期待的安全。