In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavor...In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.展开更多
This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesi...This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses.展开更多
P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE)...P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability.展开更多
China's splendid achievements and fast development attract the attention of the whole world. The rising of the great power shock the rest countries. More and more people want to know what is happening in this coun...China's splendid achievements and fast development attract the attention of the whole world. The rising of the great power shock the rest countries. More and more people want to know what is happening in this country and what effect it will bring to the world. At the same time, Chinese people have gradually realized the importance of exchanging information with other countries. Under this motivation, the translation of Chinese materials into English becomes necessary and essential. It is an effective way to present China comprehensively. Among all these materials, Government Work Report is one of the most remarkable ones. The translation of it plays a key role to present the image of China to the world. But, compared with State of the Union address, the translation of Government Work Report contains some problems from the perspective of foreignization and domestication theory. This essay will discuss the differences between these two texts at the lexical, syntactic, and discourse level from the angle of foreignization and domestication theory, and give some suggestions to the translation of Government Work Report.展开更多
This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the princip...This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication.展开更多
In America,the 1960s' Civil Rights Movement brought forth a new trend of thought:Political Correctness(PC).The use of PC language is far beyond a single linguistic matter.This paper explores the implication on tra...In America,the 1960s' Civil Rights Movement brought forth a new trend of thought:Political Correctness(PC).The use of PC language is far beyond a single linguistic matter.This paper explores the implication on translation transition in addressing from the semantic perspective and Systemic Functional Linguistics,and finds out the significant cause-that is,the principle of PC pushing behind.展开更多
Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E...Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E technologies maintain end-to-end address transparency between IPvd and IPv6 and support communication initiated by IPv4-only or IPv6-only end systems. Therefore, they are the very critical techniques for the IPv4/IPv6 coexistence and transition.展开更多
In this paper, a model of translation gateway is proposed. The communications between IPv4 network and IPv6 network are realized by using the Microsoft intermediate driver technology in environment of Windows 2000.
Border areas have provided significant new research questions as well as fruitful insights and hypotheses. The cognitive and neuropsychologic study of translation process is a good example of this kind. This paper has...Border areas have provided significant new research questions as well as fruitful insights and hypotheses. The cognitive and neuropsychologic study of translation process is a good example of this kind. This paper has surveyed various researches on translation process. Studies related to "the black box of translation" are divided into two categories, i.e., studies adopting think-aloud protocols, and studies from the physiology and neuroscientific perspectives. It has been noted that those studies on translation process have made some progress in the past years Firstly, the participants have undergone a change from language learners to professional translators or interpreters Secondly, the purposes of the studies have a tendency of gradually becoming specific. Thirdly, more rigorous methodologies have been developed, with more and more new technological approaches being applied展开更多
Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the ...Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.展开更多
Globally,there is a great gulf between medical knowledge and clinical practice.Translating knowledge into clinical decision support(CDS) application has become the biggest challenge faced by evidence based medicine.Th...Globally,there is a great gulf between medical knowledge and clinical practice.Translating knowledge into clinical decision support(CDS) application has become the biggest challenge faced by evidence based medicine.This paper proposed a comprehensive motivation framework to facilitate knowledge translation in healthcare.Based on a unified medical knowledge ontology and knowledge base,the framework provides an infrastructure of fundamental services,such as inference service and data acquisition,to support development of knowledge-driven CDS applications and integration into clinical workflow.The framework has been implemented in a 2600-bed Chinese hospital,and is able to reduce the time and cost of developing typical CDS applications.展开更多
Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.A...Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller.This data processing at the edge nodes reduces the latency and bandwidth requirements.In SDN,the controller is a single point of failure.Several security issues related to the traditional network can be solved by using SDN central management and control.Address Spoofing and Network Intrusion are the most common attacks.These attacks severely degrade performance and security.We propose an edge computing-based mechanism that automatically detects and mitigates those attacks.In this mechanism,an edge system gets the network topology from the controller and the Address Resolution Protocol(ARP)traffic is directed to it for further analysis.As such,the controller is saved from unnecessary processing related to addressing translation.We propose a graph computation based method to identify the location of an attacker or intruder by implementing a graph difference method.By using the correct location information,the exact attacker or intruder is blocked,while the legitimate users get access to the network resources.The proposed mechanism is evaluated in a Mininet simulator and a POX controller.The results show that it improves system performance in terms of attack mitigation time,attack detection time,and bandwidth requirements.展开更多
A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay i...A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks.展开更多
Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge ...Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell.展开更多
文摘In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation.
文摘This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses.
基金Supported by the Nat/onal Science and Technology Support Projects of China(No. 2008BAH28B04) and the National Natural Science Foundation of China _(No..60903218F0208) andthe National High Technology Research and Development Programme of China (No. 2008AA01A317)
文摘P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability.
文摘China's splendid achievements and fast development attract the attention of the whole world. The rising of the great power shock the rest countries. More and more people want to know what is happening in this country and what effect it will bring to the world. At the same time, Chinese people have gradually realized the importance of exchanging information with other countries. Under this motivation, the translation of Chinese materials into English becomes necessary and essential. It is an effective way to present China comprehensively. Among all these materials, Government Work Report is one of the most remarkable ones. The translation of it plays a key role to present the image of China to the world. But, compared with State of the Union address, the translation of Government Work Report contains some problems from the perspective of foreignization and domestication theory. This essay will discuss the differences between these two texts at the lexical, syntactic, and discourse level from the angle of foreignization and domestication theory, and give some suggestions to the translation of Government Work Report.
文摘This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication.
文摘In America,the 1960s' Civil Rights Movement brought forth a new trend of thought:Political Correctness(PC).The use of PC language is far beyond a single linguistic matter.This paper explores the implication on translation transition in addressing from the semantic perspective and Systemic Functional Linguistics,and finds out the significant cause-that is,the principle of PC pushing behind.
文摘Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E technologies maintain end-to-end address transparency between IPvd and IPv6 and support communication initiated by IPv4-only or IPv6-only end systems. Therefore, they are the very critical techniques for the IPv4/IPv6 coexistence and transition.
基金Supported by the Natural Science Foundation of Henan Province(0511011400) Supported by the Natural Science Foundation of Education Department of Henan Province(2004520014)
文摘In this paper, a model of translation gateway is proposed. The communications between IPv4 network and IPv6 network are realized by using the Microsoft intermediate driver technology in environment of Windows 2000.
文摘Border areas have provided significant new research questions as well as fruitful insights and hypotheses. The cognitive and neuropsychologic study of translation process is a good example of this kind. This paper has surveyed various researches on translation process. Studies related to "the black box of translation" are divided into two categories, i.e., studies adopting think-aloud protocols, and studies from the physiology and neuroscientific perspectives. It has been noted that those studies on translation process have made some progress in the past years Firstly, the participants have undergone a change from language learners to professional translators or interpreters Secondly, the purposes of the studies have a tendency of gradually becoming specific. Thirdly, more rigorous methodologies have been developed, with more and more new technological approaches being applied
文摘Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.
基金National High-Tech R&D Program of China(No.2012AA02A601)National Natural Science Foundation of China(No.30900329)
文摘Globally,there is a great gulf between medical knowledge and clinical practice.Translating knowledge into clinical decision support(CDS) application has become the biggest challenge faced by evidence based medicine.This paper proposed a comprehensive motivation framework to facilitate knowledge translation in healthcare.Based on a unified medical knowledge ontology and knowledge base,the framework provides an infrastructure of fundamental services,such as inference service and data acquisition,to support development of knowledge-driven CDS applications and integration into clinical workflow.The framework has been implemented in a 2600-bed Chinese hospital,and is able to reduce the time and cost of developing typical CDS applications.
文摘Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller.This data processing at the edge nodes reduces the latency and bandwidth requirements.In SDN,the controller is a single point of failure.Several security issues related to the traditional network can be solved by using SDN central management and control.Address Spoofing and Network Intrusion are the most common attacks.These attacks severely degrade performance and security.We propose an edge computing-based mechanism that automatically detects and mitigates those attacks.In this mechanism,an edge system gets the network topology from the controller and the Address Resolution Protocol(ARP)traffic is directed to it for further analysis.As such,the controller is saved from unnecessary processing related to addressing translation.We propose a graph computation based method to identify the location of an attacker or intruder by implementing a graph difference method.By using the correct location information,the exact attacker or intruder is blocked,while the legitimate users get access to the network resources.The proposed mechanism is evaluated in a Mininet simulator and a POX controller.The results show that it improves system performance in terms of attack mitigation time,attack detection time,and bandwidth requirements.
文摘A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks.
文摘Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell.
文摘随着微处理器成本逐渐下降、现场仪表智能化程度逐渐上升,全数字化的、双向多变量的通信协议替代原有的4~20 mA模拟信号已成为发展趋势。介绍了可寻址远程传感器高速通道(HART)通信技术的特点及不断创新的应用。自开放式通信协议于1986年推出以来,不断对技术进行创新,除了继续增强4~20 mA的数字通信能力,更发展了WirelessHART、HART-互联网协议(IP)、HART-IP over Ethernet-高级物理层(APL)等全数字通信技术。目前,HART设备在全球安装数量超过4000万台。HART通信协议已成为全球智能仪表普遍使用的工业标准。