期刊文献+
共找到968篇文章
< 1 2 49 >
每页显示 20 50 100
On Translation of Chinese Addressing System
1
作者 李艳 《海外英语》 2013年第3X期153-154,共2页
In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavor... In contrast with English,Chinese addressing system is characterized by the great number coupled with cultural connotations,thus adding to the difficulty in Chinese-English translation.In this paper,the author endeavors to locate the source of differences between Chinese & English addressing terms and seek the cultural connotations and pragmatic equivalence of Chinese addressing terms in translation. 展开更多
关键词 CHINESE addressING SYSTEM translation PRAGMATIC EQ
下载PDF
The Meanings of Addresses and Their Proper Translations
2
作者 贾睿 《海外英语》 2011年第3X期126-127,共2页
This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesi... This thesis aims at exploring meanings of different addresses and their correct and suitable translations in both Chinese and English. After the introduction to the definition and meaning of addresses, the whole thesis probes into this problem from two aspects: the reasons which lead to the differences in addresses among relatives in both Chinese and English, and the ways how to translate addresses properly according to the situations. With the exploration, the writer hopes to introduce the cultural differences from the perspective of translations of addresses. 展开更多
关键词 addresses MEANING CULTURAL DIFFERENCE transiation
下载PDF
Network address translation traversal based on Bernoulli laws of large number in P2P streaming system
3
作者 Ren Hao Wang Jinlin 《High Technology Letters》 EI CAS 2011年第4期401-406,共6页
P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE)... P2P streaming application must realize network address translation (NAT) traversal. To handle low success ratio of the existing NAT traversal algorithm, UPnP-STUN (UPUN) and port-mapping sample estimation (PMSE) algorithm are recommended in this paper. UPUN is the combination of UPnP and STUN, and PMSE utilizes port mapping samples added by symmetric NAT for different sessions to estimate regularity of port mapping of symmetric NAT, which takes advantage of the Bernoulli law of large numbers. Besides, for the situation that both peers are behind NAT, and to handle heavy relay server load when many inner peers want to communicate with each other, a peer auxiliary-relay (PAR) algorithm is presented. PAR lets outer peers with sufficient bandwidth act as relay servers to alleviate pressure of real server, which could avoid NAT traversal failure caused by single point failure of relay server. Finally, experiments show that the proposed algorithms could improve the success ratio significantly for NAT traversal in P2P streaming application as well as improve P2P streaming application applicability. 展开更多
关键词 network address translation(NAT) TRAVERSAL sample estimation auxiliary-relay P2P streaming
下载PDF
On the Translation of the Government Work Report —Comparing with the State of the Union Address
4
作者 Linlin Fan 《Journal of Educational Theory and Management》 2017年第1期102-108,共7页
China's splendid achievements and fast development attract the attention of the whole world. The rising of the great power shock the rest countries. More and more people want to know what is happening in this coun... China's splendid achievements and fast development attract the attention of the whole world. The rising of the great power shock the rest countries. More and more people want to know what is happening in this country and what effect it will bring to the world. At the same time, Chinese people have gradually realized the importance of exchanging information with other countries. Under this motivation, the translation of Chinese materials into English becomes necessary and essential. It is an effective way to present China comprehensively. Among all these materials, Government Work Report is one of the most remarkable ones. The translation of it plays a key role to present the image of China to the world. But, compared with State of the Union address, the translation of Government Work Report contains some problems from the perspective of foreignization and domestication theory. This essay will discuss the differences between these two texts at the lexical, syntactic, and discourse level from the angle of foreignization and domestication theory, and give some suggestions to the translation of Government Work Report. 展开更多
关键词 GOVERNMENT Work Report FOREIGNIZATION and DOMESTICATION theory State of the UNION address translation
下载PDF
Chinese-Spanish Translation of International Conference Addresses from the Perspective of Skopos Theory
5
作者 赵雨菡 《海外英语》 2019年第24期128-129,共2页
This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the princip... This paper chooses the Spanish translation of the address to the China-CELAC Forum opening ceremony as a research corpus and adopts Skopos theory and its three basic rules as a theoretical guide to discuss the principles of Spanish translation of the conference address,the features of translation of words and sentences with Chinese characteristics,and the applicability of three rules of Skopos theory to Chinese-Spanish translation of international conference addresses.In Chinese-Spanish translation,the translator should convey the meaning of the source text while meeting the desired needs of the target audience under the guidance of Skopos theory to avert conflict between output content and reader ideology and fulfill cross-cultural communication. 展开更多
关键词 Skopos theory conference addresses Chinese-Spanish translation
下载PDF
“Political Correctness” Implication in Addressing Translation
6
作者 Dan Yang 《中国校外教育》 2010年第8期79-79,共1页
In America,the 1960s' Civil Rights Movement brought forth a new trend of thought:Political Correctness(PC).The use of PC language is far beyond a single linguistic matter.This paper explores the implication on tra... In America,the 1960s' Civil Rights Movement brought forth a new trend of thought:Political Correctness(PC).The use of PC language is far beyond a single linguistic matter.This paper explores the implication on translation transition in addressing from the semantic perspective and Systemic Functional Linguistics,and finds out the significant cause-that is,the principle of PC pushing behind. 展开更多
关键词 美国 民权运动 思维趋势 英语 课外阅读
下载PDF
IVI/MAP-T/MAP-E:Unified IPv4/IPv6 Stateless Translation and Encapsulation Technologies
7
作者 Congxiao Bao Xing Li 《ZTE Communications》 2013年第3期51-55,共5页
Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E... Stateless translation and stateless double translation/encapsulation technologies (IVI/MAP-T/MAP-E) define the address mapping and protocol translation/encapsulation algorithms between IPv4 and IPv6. IVI/MAP-T/MAP-E technologies maintain end-to-end address transparency between IPvd and IPv6 and support communication initiated by IPv4-only or IPv6-only end systems. Therefore, they are the very critical techniques for the IPv4/IPv6 coexistence and transition. 展开更多
关键词 stateless translation address mapping protocol translation
下载PDF
Research on Translation Gateway for IPv4/IPv6
8
作者 CHU Yan-ping WANG Hong-tao 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第3期455-460,共6页
In this paper, a model of translation gateway is proposed. The communications between IPv4 network and IPv6 network are realized by using the Microsoft intermediate driver technology in environment of Windows 2000.
关键词 address conversion protocol translation network driver interface specification
下载PDF
What Is Going on in the Minds of Translators? A Review of Studies on Translation Process
9
作者 WANG Bo MA Yuan-yi 《Sino-US English Teaching》 2015年第4期289-293,共5页
Border areas have provided significant new research questions as well as fruitful insights and hypotheses. The cognitive and neuropsychologic study of translation process is a good example of this kind. This paper has... Border areas have provided significant new research questions as well as fruitful insights and hypotheses. The cognitive and neuropsychologic study of translation process is a good example of this kind. This paper has surveyed various researches on translation process. Studies related to "the black box of translation" are divided into two categories, i.e., studies adopting think-aloud protocols, and studies from the physiology and neuroscientific perspectives. It has been noted that those studies on translation process have made some progress in the past years Firstly, the participants have undergone a change from language learners to professional translators or interpreters Secondly, the purposes of the studies have a tendency of gradually becoming specific. Thirdly, more rigorous methodologies have been developed, with more and more new technological approaches being applied 展开更多
关键词 translation process COGNITIVE think-aloud protocols PHYSIOLOGY neuroscientific
下载PDF
Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense
10
作者 Ghazi Al Sukkar Ramzi Saifan +2 位作者 Sufian Khwaldeh Mahmoud Maqableh Iyad Jafar 《Communications and Network》 2016年第3期118-130,共13页
Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the ... Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way. 展开更多
关键词 address Resolution protocol ARP Spoofing Security Attack and Defense Man in the Middle Attack
下载PDF
A Motivation Framework to Promote Knowledge Translation in Healthcare
11
作者 张寅升 李昊旻 +4 位作者 郑翔 葛彩霞 黄震震 贾峥 段会龙 《Journal of Donghua University(English Edition)》 EI CAS 2015年第2期192-198,共7页
Globally,there is a great gulf between medical knowledge and clinical practice.Translating knowledge into clinical decision support(CDS) application has become the biggest challenge faced by evidence based medicine.Th... Globally,there is a great gulf between medical knowledge and clinical practice.Translating knowledge into clinical decision support(CDS) application has become the biggest challenge faced by evidence based medicine.This paper proposed a comprehensive motivation framework to facilitate knowledge translation in healthcare.Based on a unified medical knowledge ontology and knowledge base,the framework provides an infrastructure of fundamental services,such as inference service and data acquisition,to support development of knowledge-driven CDS applications and integration into clinical workflow.The framework has been implemented in a 2600-bed Chinese hospital,and is able to reduce the time and cost of developing typical CDS applications. 展开更多
关键词 Motivation motivation facilitate ontology challenge facts unified inference faced workflow
下载PDF
Edge-Computing with Graph Computation:A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN 被引量:1
12
作者 Rashid Amin Mudassar Hussain +3 位作者 Mohammed Alhameed Syed Mohsan Raza Fathe Jeribi Ali Tahir 《Computers, Materials & Continua》 SCIE EI 2020年第12期1869-1890,共22页
Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.A... Software Defined Networking(SDN)being an emerging network control model is widely recognized as a control and management platform.This model provides efficient techniques to control and manage the enterprise network.Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller.This data processing at the edge nodes reduces the latency and bandwidth requirements.In SDN,the controller is a single point of failure.Several security issues related to the traditional network can be solved by using SDN central management and control.Address Spoofing and Network Intrusion are the most common attacks.These attacks severely degrade performance and security.We propose an edge computing-based mechanism that automatically detects and mitigates those attacks.In this mechanism,an edge system gets the network topology from the controller and the Address Resolution Protocol(ARP)traffic is directed to it for further analysis.As such,the controller is saved from unnecessary processing related to addressing translation.We propose a graph computation based method to identify the location of an attacker or intruder by implementing a graph difference method.By using the correct location information,the exact attacker or intruder is blocked,while the legitimate users get access to the network resources.The proposed mechanism is evaluated in a Mininet simulator and a POX controller.The results show that it improves system performance in terms of attack mitigation time,attack detection time,and bandwidth requirements. 展开更多
关键词 Software Defined Networking(SDN) edge computing address Resolution protocol(ARP) ARP inspection security graph difference
下载PDF
IP ADDRESS AUTOCONFIGURATION FOR WIRELESS AD HOC NETWORKS
13
作者 Amjad M.T.Said(阿姆贾德) 《Journal of Shanghai Jiaotong university(Science)》 EI 2002年第2期231-237,共7页
A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay i... A novel mechanism was specified by which a node in ad hoc network may autoconfigure an IP address which is unique throughout the mobile ad hoc network. This new algorithm imposes less and constant overhead and delay in obtaining an IP address, and fully utilizes the available addresses space of an ad hoc network, and independent of the existing routing protocol, and less prone to security threats. Moreover, a new Join/Leave mechanism was proposed as an enhancement to the new IP address autoconfiguration algorithm, to support the overall operation of the existing routing protocol of wireless ad hoc networks. 展开更多
关键词 wireless ad HOC networks IP address allocation IP address AUTOCONFIGURATION routing protocols DUPLICATE address detection (DAD)
下载PDF
A Comparative Study of Three Chinese Versions of Gettysburg Address: A Socio-semiotic Approach
14
作者 曹琳 《英语广场(学术研究)》 2011年第Z5期68-71,共4页
《葛底斯堡演说》作为世界上优秀的演讲,已有特色各异的中文译本,并有从不同角度对这些中文译本所进行的研究。然而,几乎没有研究涉及到社会符号学方面。对于翻译研究来说,社会符号学是个相对新颖的研究角度,应当予以重视。本文选取了... 《葛底斯堡演说》作为世界上优秀的演讲,已有特色各异的中文译本,并有从不同角度对这些中文译本所进行的研究。然而,几乎没有研究涉及到社会符号学方面。对于翻译研究来说,社会符号学是个相对新颖的研究角度,应当予以重视。本文选取了三个具有代表性的《葛底斯堡演说》中译本,着力从社会符号学的视角对其进行比较,并提出个人看法,这将有利于推动今后相关研究工作。 展开更多
关键词 翻译 可译性 限度 动名词结构
下载PDF
Content Addressable Memory Using Automatic Charge Balancing with Self-Control Mechanism and Master-Slave Match Line Design
15
作者 Dr. Deepa Jose P. Suganya Dr. Palanichamy Nirmal Kumar 《Circuits and Systems》 2016年第6期597-611,共15页
Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge ... Content Addressable Memory (CAM) is a type of memory used for high-speed search applications. Due to parallel comparison feature, the CAM memory leads to large power consumption which is caused by frequent pre-charge or discharge of match line. In this paper, CAM for automatic charge balancing with self-control mechanism is proposed to control the voltage swing of ML for reducing the power consumption of CAM. Another technique to reduce the power dissipation is to use MSML, it combines the master-slave architecture with charge minimization technique. Unlike the conventional design, only one match line (ML) is used, whereas in Master-Slave Match Line (MSML) one master ML and several slave MLs are used to reduce the power dissipation in CAM caused by match lines (MLs). Theoretically, the match line (ML) reduces the power consumption up to 50% which is independent of search and match case. The simulation results using Cadence tool of MSML show the reduced power consumption in CAM and modified CAM cell. 展开更多
关键词 Content addressable Memory (CAM) Match Line (ML) Master-Slave Match Line (MSML) Charge Balance translation Look-Aside Buffer (TLAB)
下载PDF
基于混合双向LSTM的中间人攻击检测方法
16
作者 郭晓军 梁添鑫 +1 位作者 靳玮琨 孙雨生 《计算机工程与设计》 北大核心 2024年第12期3560-3567,共8页
针对局域网中基于ARP协议的中间人攻击检测准确率低、误报率高、泛化性差的问题,提出一种结合极端随机树分类器(ETC)和改进注意力机制(IAM)的双向长短时记忆网络(BiLSTM)的组合模型。利用ETC提取数据特征,通过改进的注意力机制模块处理... 针对局域网中基于ARP协议的中间人攻击检测准确率低、误报率高、泛化性差的问题,提出一种结合极端随机树分类器(ETC)和改进注意力机制(IAM)的双向长短时记忆网络(BiLSTM)的组合模型。利用ETC提取数据特征,通过改进的注意力机制模块处理中间人攻击流量时间序列信息,将组合特征输入BiLSTM实现对中间人攻击的检测。实验结果表明,在Kitsune数据集中,该模型的中间人攻击检测准确率达99.98%,在自建Ooter数据集中为99.94%。相较于主流的中间人攻击检测算法,该方法具有更高的准确率、更低的误报率及更好的泛化性。 展开更多
关键词 中间人攻击 地址解析协议 深度学习 双向长短时记忆网络 注意力机制 极端随机树分类器 模型融合
下载PDF
基于锐捷仿真实验平台的NAT技术实现
17
作者 滕君华 陈文耿 +4 位作者 梁丽芳 李婵娟 金莹 王莹 林彬 《科技创新与应用》 2024年第21期74-77,共4页
为更加深入认识与了解网络组态,要加强对NAT技术的研究学习。该文通过对NAT技术的背景、原理、实现等方面较为全面地阐述,分析介绍静态NAT、动态NAT、NAPT技术及相关联的ACL技术;同时通过锐捷网络公司的真实验平台,模拟实现公司内网服... 为更加深入认识与了解网络组态,要加强对NAT技术的研究学习。该文通过对NAT技术的背景、原理、实现等方面较为全面地阐述,分析介绍静态NAT、动态NAT、NAPT技术及相关联的ACL技术;同时通过锐捷网络公司的真实验平台,模拟实现公司内网服务器地址的公网映射,分别对不同类别的NAT技术进行实验验证,并进行分析讨论。实验证明,NAT技术在当前仍有很好的应用前景,在企业组网中发挥一定作用。 展开更多
关键词 网络地址转换 动态地址转换 仿真 ACL 网络安全
下载PDF
加强国际动物实验注册平台建设——基于注册计划书的系统调查
18
作者 易少威 王陆军 +11 位作者 阮建华 王浙 丁奉兴 奥琪 任紫钰 刘晏利 吴才志 罗雅婷 牛牧町 赵跃 李朝霞 马彬 《兰州大学学报(医学版)》 2024年第8期72-77,86,共7页
目的详细分析国际动物实验注册平台研究计划书的流行病学特征,为动物实验注册的建设和完善提出有益建议。方法获取荷兰PCT和德国ASR动物实验注册平台截至2023年12月30日注册的动物实验原始计划书并提取信息,采取频数及构成百分比统计描... 目的详细分析国际动物实验注册平台研究计划书的流行病学特征,为动物实验注册的建设和完善提出有益建议。方法获取荷兰PCT和德国ASR动物实验注册平台截至2023年12月30日注册的动物实验原始计划书并提取信息,采取频数及构成百分比统计描述数据。结果共纳入272篇注册计划书,其中PCT平台124篇,ASR平台148篇,来自于31个国家,涉及47个不同的研究领域,共包含11种不同动物;实验设计方法,仍有10.0%(27/272)的研究未提及随机分组,而且即使进行了随机分组的实验(132/272)均未提及隐蔽分组;24.6%(67/272)和35.3%(96/272)的研究未报告干预实施阶段和结局指标测量阶段的盲法应用情况;仅43.3%(97/224)实验在计划书规定时间内完成。结论动物实验的注册作为提高动物实验质量的重要措施,应该得到重视和推广,注册平台与研究者应合作优化注册平台机制,提高计划书质量,增强实验透明度,共同提高动物实验的质量,为动物实验的临床转化提供更可靠的基础。 展开更多
关键词 动物实验 动物实验注册 动物实验转化 注册平台 注册计划书
下载PDF
针对深度学习中不规则内存访问的高吞吐内存管理单元
19
作者 丁峰 李曦 《高技术通讯》 CAS 北大核心 2024年第7期714-725,共12页
人工智能应用的多样化与复杂化导致了算法模型的不规则内存访问,即集中突发的访问请求与稀疏的访问地址,从而给智能应用在内存资源严格受限的移动端设备的部署带来了挑战。这种不规则的内存访问导致了现有架构中内存管理单元(MMU)的地... 人工智能应用的多样化与复杂化导致了算法模型的不规则内存访问,即集中突发的访问请求与稀疏的访问地址,从而给智能应用在内存资源严格受限的移动端设备的部署带来了挑战。这种不规则的内存访问导致了现有架构中内存管理单元(MMU)的地址转换面临低吞吐和长延迟的问题,使其成为系统访存通路的瓶颈。针对上述问题,本文提出了一种新的高吞吐MMU架构方案(HTMMU),通过多流并行,加强冗余请求的过滤,合理地分配有限的片上存储资源等手段,从而能高吞吐、低延迟地处理不规则访问的地址转换,提升系统访存效率。实验结果表明,在处理人工智能算法内突发的稀疏访存时,相较于当前主流MMU设计方案,HTMMU平均获得了2.43倍的性能提升,而平均访问延迟降低为原先的34.1%,同时将额外面积开销控制在3.0%以内。 展开更多
关键词 内存管理单元(MMU) 地址转换 不规则访存 深度学习 高吞吐
下载PDF
不断集成创新的HART通信协议 被引量:1
20
作者 方原柏 王骏 《自动化仪表》 CAS 2024年第3期1-7,共7页
随着微处理器成本逐渐下降、现场仪表智能化程度逐渐上升,全数字化的、双向多变量的通信协议替代原有的4~20 mA模拟信号已成为发展趋势。介绍了可寻址远程传感器高速通道(HART)通信技术的特点及不断创新的应用。自开放式通信协议于1986... 随着微处理器成本逐渐下降、现场仪表智能化程度逐渐上升,全数字化的、双向多变量的通信协议替代原有的4~20 mA模拟信号已成为发展趋势。介绍了可寻址远程传感器高速通道(HART)通信技术的特点及不断创新的应用。自开放式通信协议于1986年推出以来,不断对技术进行创新,除了继续增强4~20 mA的数字通信能力,更发展了WirelessHART、HART-互联网协议(IP)、HART-IP over Ethernet-高级物理层(APL)等全数字通信技术。目前,HART设备在全球安装数量超过4000万台。HART通信协议已成为全球智能仪表普遍使用的工业标准。 展开更多
关键词 通信协议 可寻址远程传感器高速通道 创新 WIRELESSHART HART-互联网协议 HART-IP over Ethernet-高级物理层
下载PDF
上一页 1 2 49 下一页 到第
使用帮助 返回顶部