This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesi...This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses.展开更多
SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLi...SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLinkSwitch-TN family of AC- DC power conversion ICs.Designed as a cost-effective replacement for bulky,energy-wasting capacitive droppers and linear transformers,the LinkSwitch-TN family is ideal for use in home applianceand industrial control applications.The addition of展开更多
On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shangh...On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shanghai Securities Exchange Research Center and the Korea Financial Service Commission were invited to share their wisdom on these issues.展开更多
This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the princip...This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication.展开更多
Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day...Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day conference in Beijing on June 3, 1996. The event combined the 8th Academic Congress of CAS and the 3rd Academic Congress of CAE. At the opening ceremony in the same day, Premier展开更多
As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.T...As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain.展开更多
The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its auth...The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its authorities by all means, especially by public speeches. This paper is going to analyze how the Queen and the Prime Minster try to convince their public of a better future in their New Year Addresses through the method of cluster analysis.展开更多
Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the q...Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the quality of addresses locators. There are several methods to collect data. Surveys from the field are essential: GPS and pre-printed maps can be used to achieve this goal. GPS surveys from the field may be a solution, but it remains practical only for limited areas. To insure an accepted accuracy, GPS methods need special considerations that are time and money consuming. For Casablanca’s addressing locators, an alternative approach was adopted to collect 400 000 points. It took two months, 200 operators and 3500 printed maps to cover a study area of1,226 km2. This paper is to develop an optimized approach based on automated procedure for reintegrating printed maps in a geographic information system (GIS). It saves georeferencing time from 5min to just seconds per document. It insures, more importantly, an accuracy that is between20 cmto1 mfor scales that are between 1/500 and 1/2500. It ensures maps’ integration, independently of base map and coordinates system by introducing the notion of Georeferencing Code (GC).展开更多
The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural address...The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural addresses; and secondly, to consider how both parties have faced these problems. To do this, this paper will cover the period from the inaugural address by President Kennedy to that of President Obama. Although a president has repeated a term of government, only the first speech will be taken into consideration.展开更多
The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discours...The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discourse sequences in the text linguistics and discourse analysis(Qi Yucun,1993).With the theoretical framework of Halliday’s theme-rheme theory and the thematic progression patterns coined by Danes and other major scholars,selecting the two addresses made by Xi Jinping and Obama in the APEC CEO Summit in November 9,2014 as the data resource,this article aims to find out the similarities and differences in the choice of Themes and Thematic Progression Patterns and dig out the possible reasons.Since the two addresses are of the same genre but with different languages,new ideas may be provided in the contrastive discourse studies and the theory of contrastive study on Chinese and American addresses will be enriched through this kind of research.展开更多
Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The...Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The American President Barack Obama often utilizes metaphors in his speeches and good at utilizing them. The weekly address is a typical representative of political discourse. This article is intended to analyze the conceptual metaphors used in Obama's weekly addresses on the basis of the conceptual metaphor theory proposed by Lakoff and Johnson.The analysis shows that there are three categories of conceptual metaphors used frequently in Obama's weekly addresses, which can be learned that how Obama uses conceptual metaphors to make speeches more vivid.展开更多
Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional tr...Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional transaction tracing attack cuts through the network layer to directly associate each transaction with the network address that issued it,thus revealing the sender's network identity.But this attack can be mitigated by Bitcoin's network layer privacy protections.Since Bitcoin protects the unlinkability of Bitcoin addresses and there may be a many-to-one relation-ship between addresses and nodes,transactions sent from the same node via different addresses are seen as com-ing from different nodes because attackers can only use addresses as node identifiers.In this paper,we proposed the evicting and flling attack to expose the correlations between addresses and cluster transactions sent from different addresses of the same node.The attack exploited the unisolation of Bitcoin's incoming connection processing mecha-nism.In particular,an attacker can utilize the shared connection pool and deterministic connection eviction strategy to infer the correlation between incoming and evicting connections,as well as the correlation between releasing and flling connections.Based on inferred results,different addresses of the same node with these connections can be linked together,whether they are of the same or different network types.We designed a multi-step attack procedure,and set reasonable attack parameters through analyzing the factors that affect the attack effciency and accuracy.We mounted this attack on both our self-run nodes and multi-address nodes in real Bitcoin network,achieving an aver-age accuracy of 96.9% and 82%,respectively.Furthermore,we found that the attack is also applicable to Zcash,Litecoin,Dogecoin,Bitcoin Cash,and Dash.We analyzed the cost of network-wide attacks,the application scenario,and proposed countermeasures of this attack.展开更多
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called M...The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.展开更多
To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development...To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.展开更多
The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting syste...The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.展开更多
在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点...在分析现有P2P(peer to peer)路由算法的基础上,提出了一种基于二阶矩定位、支持多维资源数据描述的高效资源路由算法——FAN(flabellate addressable network)路由算法.FAN算法将节点映射到统一的多维笛卡尔空间,并以节点相对空间原点的二阶矩作为子空间管理和资源搜索的依据.FAN路由算法具有O(log(N/k))的高路由效率,在节点加入和退出FAN网络时,更新路由信息的代价为O(klog(N/k)).实验结果表明,FAN路由算法具有路由效率高、维护代价小的优点,是一种P2P环境中支持多维资源数据描述的高效结构化资源路由算法.而且,目前部分基于CAN(content-addressable network)网络的改进算法也可以在FAN网络中适用,并获得更好的路由效率和更低的维护代价.展开更多
文摘This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses.
文摘SAN JOSE,Calif.-September 9,2004-Power Integrations,Inc.(NASDAQ:POWI),the leading supplier of high-voltageanalog integrated circuits used in power conversion, todayintroduced LNK302,a new member of the company'sLinkSwitch-TN family of AC- DC power conversion ICs.Designed as a cost-effective replacement for bulky,energy-wasting capacitive droppers and linear transformers,the LinkSwitch-TN family is ideal for use in home applianceand industrial control applications.The addition of
文摘On June 12th,2008,the China-Korea Forum was held in Shanghai to address hot issues in China's nancial sector such as banking reform,securities market and RMB appreciation,Vice Mayor of Shanghai,o cials from Shanghai Securities Exchange Research Center and the Korea Financial Service Commission were invited to share their wisdom on these issues.
文摘This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication.
文摘Meeting jointly for the first time,the country’s 800 academicians from both the Chinese Academy of Sciences (CAS) and the Chinese Academy of Engineering (CAE), as well as five foreign members of CAS,opened a five-day conference in Beijing on June 3, 1996. The event combined the 8th Academic Congress of CAS and the 3rd Academic Congress of CAE. At the opening ceremony in the same day, Premier
基金This work is sponsored by the Natural Science Foundation of Heilongjiang Province of China under Grant No.LC2016024Natural Science Foundation of the Jiangsu Higher Education Institutions Grant No.17KJB520044Six Talent Peaks Project in Jiangsu Province No.XYDXX-108.
文摘As an extension of the traditional encryption technology,information hiding has been increasingly used in the fields of communication and network media,and the covert communication technology has gradually developed.The blockchain technology that has emerged in recent years has the characteristics of decentralization and tamper resistance,which can effectively alleviate the disadvantages and problems of traditional covert communication.However,its combination with covert communication thus far has been mostly at the theoretical level.The BLOCCE method,as an early result of the combination of blockchain and covert communication technology,has the problems of low information embedding efficiency,the use of too many Bitcoin addresses,low communication efficiency,and high costs.The present research improved on this method,designed the V-BLOCCE which uses base58 to encrypt the plaintext and reuses the addresses generated by Vanitygen multiple times to embed information.This greatly improves the efficiency of information embedding and decreases the number of Bitcoin addresses used.Under the premise of ensuring the order,the Bitcoin transaction OP_RETURN field is used to store the information required to restore the plaintext and the transactions are issued at the same time to improve the information transmission efficiency.Thus,a more efficient and feasible method for the application of covert communication on the blockchain is proposed.In addition,this paper also provides a more feasible scheme and theoretical support for covert communication in blockchain.
文摘The United Kingdom are still facing great challenges in all aspects after about half a year's struggle since they had made the decision to Brexit. The authorities are also trying to convince the public of its authorities by all means, especially by public speeches. This paper is going to analyze how the Queen and the Prime Minster try to convince their public of a better future in their New Year Addresses through the method of cluster analysis.
文摘Addresses are important data for urban applications. About 80% of the information local authorities use have a geographic component that is generally related to addresses. Addressing systems efficiency depend on the quality of addresses locators. There are several methods to collect data. Surveys from the field are essential: GPS and pre-printed maps can be used to achieve this goal. GPS surveys from the field may be a solution, but it remains practical only for limited areas. To insure an accepted accuracy, GPS methods need special considerations that are time and money consuming. For Casablanca’s addressing locators, an alternative approach was adopted to collect 400 000 points. It took two months, 200 operators and 3500 printed maps to cover a study area of1,226 km2. This paper is to develop an optimized approach based on automated procedure for reintegrating printed maps in a geographic information system (GIS). It saves georeferencing time from 5min to just seconds per document. It insures, more importantly, an accuracy that is between20 cmto1 mfor scales that are between 1/500 and 1/2500. It ensures maps’ integration, independently of base map and coordinates system by introducing the notion of Georeferencing Code (GC).
文摘The aim of this paper is twofold: firstly, to make an analysis of what have been considered as the most important global problems faced in recent decades as seen by American Presidents through their inaugural addresses; and secondly, to consider how both parties have faced these problems. To do this, this paper will cover the period from the inaugural address by President Kennedy to that of President Obama. Although a president has repeated a term of government, only the first speech will be taken into consideration.
文摘The thematic progression Patterns help to clarify the semantic relationships between the sentences and the method of the development in the texts,and they have been one of the important methods to analyze the discourse sequences in the text linguistics and discourse analysis(Qi Yucun,1993).With the theoretical framework of Halliday’s theme-rheme theory and the thematic progression patterns coined by Danes and other major scholars,selecting the two addresses made by Xi Jinping and Obama in the APEC CEO Summit in November 9,2014 as the data resource,this article aims to find out the similarities and differences in the choice of Themes and Thematic Progression Patterns and dig out the possible reasons.Since the two addresses are of the same genre but with different languages,new ideas may be provided in the contrastive discourse studies and the theory of contrastive study on Chinese and American addresses will be enriched through this kind of research.
文摘Conceptual metaphor plays an important role in delivering political speeches for it can make abstract and complicated political concepts into clear and vivid statements. Therefore, it is often used by politicians. The American President Barack Obama often utilizes metaphors in his speeches and good at utilizing them. The weekly address is a typical representative of political discourse. This article is intended to analyze the conceptual metaphors used in Obama's weekly addresses on the basis of the conceptual metaphor theory proposed by Lakoff and Johnson.The analysis shows that there are three categories of conceptual metaphors used frequently in Obama's weekly addresses, which can be learned that how Obama uses conceptual metaphors to make speeches more vivid.
基金This work was supported by the Key Research and Development Program for Guangdong Province under Grant 2019B010137003the Beijing Natural Science Foundation under Grant M21037.
文摘Bitcoin is a decentralized P2P cryptocurrency.It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer,hiding users'real network identities.Traditional transaction tracing attack cuts through the network layer to directly associate each transaction with the network address that issued it,thus revealing the sender's network identity.But this attack can be mitigated by Bitcoin's network layer privacy protections.Since Bitcoin protects the unlinkability of Bitcoin addresses and there may be a many-to-one relation-ship between addresses and nodes,transactions sent from the same node via different addresses are seen as com-ing from different nodes because attackers can only use addresses as node identifiers.In this paper,we proposed the evicting and flling attack to expose the correlations between addresses and cluster transactions sent from different addresses of the same node.The attack exploited the unisolation of Bitcoin's incoming connection processing mecha-nism.In particular,an attacker can utilize the shared connection pool and deterministic connection eviction strategy to infer the correlation between incoming and evicting connections,as well as the correlation between releasing and flling connections.Based on inferred results,different addresses of the same node with these connections can be linked together,whether they are of the same or different network types.We designed a multi-step attack procedure,and set reasonable attack parameters through analyzing the factors that affect the attack effciency and accuracy.We mounted this attack on both our self-run nodes and multi-address nodes in real Bitcoin network,achieving an aver-age accuracy of 96.9% and 82%,respectively.Furthermore,we found that the attack is also applicable to Zcash,Litecoin,Dogecoin,Bitcoin Cash,and Dash.We analyzed the cost of network-wide attacks,the application scenario,and proposed countermeasures of this attack.
基金supported by the National Key Research and Development Program of China(No.2016YFB0800601)the Key Program of NSFC-Tongyong Union Foundation(No.U1636209)+1 种基金the National Natural Science Foundation of China(61602358)the Key Research and Development Programs of Shaanxi(No.2019ZDLGY13-04,No.2019ZDLGY13-07)。
文摘The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching attacks.To reverse this asymmetric advantage,a new defense idea,called Moving Target Defense(MTD),has been proposed to provide additional selectable measures to complement traditional defense.However,MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability.To overcome this limitation,we go one step beyond and show that the combination of MTD and Deception-based Cyber Defense(DCD)can achieve higher performance than either of them.In particular,we first introduce and formalize a novel attacker model named Scan and Foothold Attack(SFA)based on cyber kill chain.Afterwards,we develop probabilistic models for SFA defenses to provide a deeper analysis of the theoretical effect under different defense strategies.These models quantify attack success probability and the probability that the attacker will be deceived under various conditions,such as the size of address space,and the number of hosts,attack analysis time.Finally,the experimental results show that the actual defense effect of each strategy almost perfectly follows its probabilistic model.Also,the defense strategy of combining address mutation and fingerprint camouflage can achieve a better defense effect than the single address mutation.
基金supported by the National Key R&D Program of China(Project Number:2022YFB2902100).
文摘To ensure the extreme performances of the new 6G services,applications will be deployed at deep edge,resulting in a serious challenge of distributed application addressing.This paper traces back the latest development of mobile network application addressing,analyzes two novel addressing methods in carrier network,and puts forward a 6G endogenous application addressing scheme by integrating some of their essence into the 6G network architecture,combining the new 6G capabilities of computing&network convergence,endogenous intelligence,and communication-sensing integration.This paper further illustrates how that the proposed method works in 6G networks and gives preliminary experimental verification.
文摘The article mainly studies the application strategy of automatic addressable single-lamp control technology in tunnel lighting.It encompasses an introduction to this technology,an analysis of the tunnel lighting system using automatic addressable single-lamp control technology,and outlines the main development direction for this technology in modern tunnel lighting.The aim is to offer insights that can inform the rational deployment of this technology,thereby enhancing the lighting control effectiveness in modern tunnels and meeting their specific lighting requirements more effectively.