网络安全与防火墙 英文文献翻译

网络安全与防火墙 英文文献翻译
网络安全与防火墙 英文文献翻译

Research of Network Security and Firewalls Techniques Abstract:

As the key facility that maintains the network security , firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice. In this paper , the computer network security and the techniques of firewalls were mainly discussed, the concept and classification of the firewalls were introduced. It also introduced three kind's of basic implement techniques of the firewalls: Packet filtering , Application Proxy and Monitor model in detail. Finally described the trend of development of the firewalls techniques in Internet briefly.

Key words: network security, firewalls, Packet filtering, monitor

1. Introduction

Now with the computer network and e-commerce used widely, network security has become an important problem that we must consider and resolve. More and more professions. enterprises and individuals surfer from the security problem in different degree. they are looking for the more reliable safety solution . In the defense system adopted by network security at present, the firewalls stand the very important position.

As the key facility that maintains the network security. firewalls take the purpose of establishing an obstacle between trust and trustless network, and put corresponding safety strategy into practice.

All the firewalls have the function to filter the IP address. This task checks the IP packet, makes the decision whether to release or to abandon it according to the source address and destination address of the IP. Shown in Fig.I, there is a firewall between two network sections, an UNIX computer is on one side of the firewall, and the other side is a PC client. While the PC client asks a telnet request for the UNIX computer, the client procedure of telnet in the PC produces a TCP packet and passes the packet to the local protocol stack to prepare to send. The protocol stack fills it in one IP packet. then, sends it to UNIX computer through the path defined by the TCP/IP stack of PC. The IP packet can't reach the UNIX computer until it passes the firewall between the PC and the UNIX computer.

Fig. I Ip Address Filtering

The application firewall is a very efficient means of network security on Internet,it is installed between the trust and trustless network, can isolate the connection between the trust and trustless network, and doesn't hamper people's access to the trustless network at the same time. It can isolate the connection between the risk area (namely there may be a certain risk on Internet) and the safe area (LAN), and doesn't hamper people's access to the risk area at the same time. Firewall can monitor the traffic flowing in and out from the network to finish the task seemingly impossible;it only allows the safe and checked information to enter into, and meanwhile resists on the data that may bring about the threat to enterprise. As the fault and defect of the security problem become

more and more general, the invasion to the network not only comes from the super attack means, but also may be from the lower-level mistakes or improper password selections on the configuration. So, the function of the firewalls is preventing the communication that not hoped and authorized passes in and out of the network protected. forcing the companies to strengthen their own network security policy. The general firewalls can achieve the following purposes: First, restraining others from entering the inside network, filtering the unsafe service and illegal user; Second, preventing the invaders from closing to your defense installation; Third,limiting the user to access the special site; Fourth,providing convenience for monitoring the Internet security.

2. The classification and implement technology of firewalls

An integrated firewalls system usually consists of screening router and proxy server. The screening router is a multi-port IP router. it check the each coming IP packet according to the group regular to judge whether to transmit it. The screening router gets information from the packet. fot example the protocol number. the IP address and port number that receiving and sending massages. the flag of link even some other IP selections. filtering IP packet. The proxy server are server process in the firewall. it can replace the network user to finish the specific TCP/IP function. A proxy server is naturally a gateway of application layer. a gateway of two networks joined specific network application. Users contact with proxy server by one of the TCP/IP application such as Telnet or FTP. the proxy server ask the users for the name of the remote host. which users want to access. After the users have answered and offered the correct users' identities and authentication information, the proxy server communicates the remote host, act as the relay between two communication sites. The whole course can be totally transparent to users.

There are mainly three types in the firewalls: packet filtering. application gateways and state detection.

Packet filtering firewall works on the network layer.it can filter the source address. destination address. source port and destination port of TCP/IP data packet. It has advantages such as the higher efficiency.

transparent to user. and users might not feel the existence of the packer filtering firewall, unless he is the illegal user and has been refused. The shortcomings are that it can't ensure the security to most services and protocols, unable to distinguish the different users of the same IP address effectively,and it is difficult to be configured, monitored and managed. can't offer enough daily records and warning.

The application gateways firewall performs its function on the application layer, it connects with specific middle-joint (firewall) by a client procedure, and then the middle-joint connects with the server actually. Unlike the packet filtering firewall. when using the firewall of this kind. there is no direct connection between the outside networks. so even if the matter has happened in the firewall. the outside networks can't connect with networks protected. The application gateway firewall offers the detailed daily records and auditing function, it improved the security of the network greatly. and provides the possibility to improve the security performance of the existing software too. The application gateways firewall solves the safety problem based on the specific application program. the products based on Proxy will be improved to configure the service in common use and non-standard port. However. so long as the application program needs upgrading. the users based on Proxy will find that they must buy new Proxy server. As a technique of network safety. Firewall combined with proxy server has simple and practical characteristics, can reach a certain security request in case of not revising the original network application system. However. if the firewall system is broken through. the network protected is in having no state of protecting. And

if an enterprise hopes to launch the business activity on Internet and carry on communication with numerous customers. it can't meet the demands. In addition, the firewall based on Proxy Service will often makes the performance of the network obviously drop.

The third generation of firewall takes the detection technique of state as the core, combines the packet filtering firewall and application gateways firewall. The state detection firewall accesses and analyzes the data achieved from the communication layer through the module of state detection to perform its function. The state monitor act as firewall technique. it is best in security perfonnance, it adopts a software engine.

which executes the tactics of network security on the gateways, called the detection module. On the premise of not influencing the network to work normally, detection module collects the relevant data to monitor each of the network communication layers, collects a part of data, namely status information, and stores the data up dynamically for the reference in making security decision afterward. Detection module

supports many kinds of protocols and application program, and can implement the expansion of application and service very easily. Different from other safety schemes, before the user's access reaches the operating system of network gateways, the state monitor should collect the relevant data to analyze, combine network configuration and safety regulation to make the decisions of acceptance, refutation, appraisal or encrypting to the communication etc Once a certain access violates the security regulation, the safety alarm will refuse it and write down to report the state of the network to the system management device. This technology has defects too, namely the configuration of the state monitor is very complicated, and will decelerate the network.

3. New generation technique of firewalls

According to the present firewalls market, the domestic and international manufacturers of firewall can all support the basic function of the firewall well,including access control, the network address transform, proxy, authentication, daily records audit etc. However, as stated before, with the attack to the network increasing, and user's requisition for network security improving day by day, the firewall must get further development. Combine the present experience of research and development and the achievement,some relevant studies point out, according to the development trend of application and technology, how to strengthen the security of firewall, improve the performance of firewall, enrich the function of firewall, will become the problem that the manufacturer of firewalls must face and solve next.

The purpose of the new generation firewall is mainly combining the packet filtering and proxy technology, overcoming the defects in the safety respect of two; being able to exert the omnidirectional control from the layer of data chain to the application layer; implementing the micro-kernel of TCP/IP protocol to perform all the security control on the layer of TCP/IP protocol; based on the micro-kernel above, making the speed to exceed the

traditional packet filtering firewall; Offering the transparent mode of proxy. lightening the configuration work on the client; Supporting the data encryption and decryption (DES and RSA ), offering the strong support to the Virtual Private Network VPN; hiding the Inside information totally; producing a new firewall theory.

The new techniqe of firewalls has not only covered all the functions of traditional packet filtering firewalls, but also has remarkable advantages in opposing overall the attack means of IP deception, SYN Flood, ICMP. ARP, etc. strengthening proxy service, merging it with packet filtering, then adding the intelligence filtering technology to make the security of the firewall rising to another height.

4. Conclusion

Now the firewall has already been widely used on Internet, and because of its characteristic of not limited to the TCP/IP protocol, it has more vitality outside Internet progressively too. To be subjective, the firewall is not the omnipotent prescription of solving the problem of network security, but only a component of the network security policy and tactics. However, understanding the technology of firewall and learning to use it in actual operation, believing that every net friend may be benefited a lot from the network life in the new century.

外文资料翻译译文

摘要:

作为关键设施,维护网络的安全性,防火墙采取建立信任与不可靠的网络障碍的目的,并落实相应的安全策略。在这个文件中,计算机网络安全与防火墙的技术,主要讨论的概念和分类,介绍了防火墙。它还介绍了三种基本的防火墙实现技术:分组过滤,代理服务器和应用详细监测模型的。最后描述对互联网的简单防火墙技术的发展趋势。

关键词:网络安全,防火墙,包过滤,监控

1 介绍

现在,随着计算机网络和电子商务的广泛应用,网络安全已成为一个我们必须考虑和解决的重要问题。越来越多的专业,企业和个人上网的不同程度的安全问题。他们正在寻找更可靠的安全解决方案。在防御系统所采用的网络安全的现状,防火墙占据了非常重要的地位。

作为维护网络安全的关键设施,防火墙采取建立一个障碍在信任和不信任的网络之间,并实施相应的安全策略。

所有的防火墙具有过滤IP地址的功能。这项任务是检查IP数据包,根据源地址和目的IP地址决定是否释放或放弃这个数据包。在图1所示,在两个网段中间有一个防火墙,一侧是UNIX计算机,另一侧是PC客户端。当PC客户端向UNIX 计算机发送远程登陆请求时,PC 里的远程登陆客户端程序产生一个TCP数据包并把此包传递给本地协议栈准备发送。协议栈把它填充在一个IP数据包内,然后通过PC的TCP/IP协议栈中定义的路径发送到UNIX计算机。在它通过PC和UNIX计算机之间的防火墙之前,这个IP包不能送达UNIX计算机。

图1 IP地址过滤

在互联网上防火墙是网络安全的非常有效的手段,它安装在信任和不可靠的网络之间,可以隔离安全区域和风险区域的连接,在同一时间并不妨碍人们进入风险区域。它可以隔离风险区域之间的连接(即有可能是在互联网上一定的风险)和安全区(局域网)上,也不妨碍人们在同一时间进入危险领域。防火墙可以监控进出网络的通信量,从网络来完成这项任务看似不可能的,它只允许安全和通过检查的信息进入,同时阻止那些可能给企业带来威胁的数据信息。由于故障和安全问题的缺陷变得越来越普遍,入侵网络不仅来自高超的攻击手段,也

可能是来自配置上的低级错误或不合适的密码选择。因此,这个防火墙的功能是防止不被希望和未经许可的通讯进出网络保护。。迫使公司加强自己的网络安全策略。一般防火墙可以达到以下目的:第一,制止他人进入内部网络,过滤不安全服务和非法用户;第二,防止关闭安装到你的防御侵略者;第三,限制用户访问特殊站点;第四,提供便利的网络安全监控。

2防火墙技术的分类和实施

一个集成的防火墙系统通常包括筛选路由器和代理服务器。该筛选路由器是一个多端口的IP路由器,它根据定期的小组来检查每个IP数据包,以判断是否将其发送。筛选路由器得到分组信息,例如协议号、IP地址、端口号、甚至IP选择中的标志和联系。代理服务器是防火墙的过程服务器。它可以代替网络用户还结束一个特殊的TCP/IP协议。代理服务器是应用层的入口,也是两个网关连接的特定应用程序。用户通过TCP/IP协议,例如远程登录和FIP协议与代理服务器建立联系。服务器要求用户先声明想要登录的远程主机名。用户输入认证的用户名及密码后,服务器即可为用户和远程主机建立联系,作为两者信息传递的平台,这整个过程对于用户是完全透明的。

主要有三种类型的防火墙:包过滤,应用网关和状态检测。

包过滤防火墙是工作在网络层的,它可以过滤TCP/IP数据包的源地址,目标地址、源端口、目标端口。它具有效率高,对用户透明度高等优势。除非用户是以非法身份登录被拒绝,否则不会感觉到分组过滤防火墙的存在。它的劣势在于不能保证大部分网络服务和协议的安全性,不能有效的区分使用相同IP地址的不同用户,它是很难被设定、监控和管理的。也不能提供足够的日报记录和警告。

应用网关防火墙工作在应用层,它通过特定的客户端程序与防火墙中的几个节点相连接,然后这些节点再与服务器连接。与包过滤防火墙不同的是,当使用这种类型的防火墙时,用户不会与外部网络建立直接的联系。因此,即使有事件发生,外部网络也不会对内部被保护的网络产生影响。这个应用程序提供了详细的防火墙日常记录和审计功能,很大的提高了网络安全性,同时提供了可以现有的安控软件。它解决了基于特定应用程序的安全问题。基于代理服务器的产品也将有可能提高标准和非标准端口的配置与服务。但是,只要应用程序需要升级,基于代理器的用户将会发现他们必须购买新的代理服务器。作为一种网络安全技术,与代理服务相联系的防火墙应该具有简单实用这个特点,可以在不修改原有的网络应用系统的情况下,满足特定的安全要求。如果防火墙遭到破坏,将不在对内部网络具有保护功能。它不能满足企业希望在网与广大客户进行沟通的需要。此外,基于代理服务防火墙通常使对网络性能明显下降。

第三代防火墙以状态监测为核心,结合了分组过滤防火墙和应用网关防火墙。状态检测防火墙通过模块的状态检测履行存取和分析通信层数据的职能。状态监测作为防火墙技术有很好的安全性,它采用安全软件引擎。执行策略的网络安全的入口,称为检测模块。在不影响网络正常工作的情况下,监测模块提取了通信层的数据进行相关网络监控,这些数据中包括状态信息和涉及网络安全的动态信息。检测组件支持多种协议和应用程序,可以方便得增加应用程序及服务。在用户进入网关的操作系统之前,各种安全模式会收集相关的数据进行分析,再结合的网络配置和安全规定作出接受、拒绝、待鉴定或者加密通信等决定。一旦某个进程违反了安全协议,安全报警器会拒绝进行并汇报给系统管理设备。这种技术也有一些缺陷,例如配置的状态监测是非常复杂的,并会减慢网络进程。

3.新一代的防火墙技术

根据目前的防火墙市场、国内外厂商的防火墙都能支持防火墙的基本功能,包括访问控制、网络地址转换、代理服务器、身份验证、每日检查等。但是正如前文所述,随着网络攻击次数的增加,和用户对网络安全要求的日益增加,防火墙技术也随之发展。结合现有技术

及成果,一些相关研究表明随着应用技术的发展,如何增强防火墙安全性,提高防火墙性,增加防火墙功能成为许多厂家必须面对的问题。

新一代防火墙主要是想要结合包过滤防火墙和代理服务技术,克服两者在安全性上的缺陷,能够发挥从数据链路层到应用层的全方位控制,实行TCP/IP微内核协议去执行所有TCP/IP协议层的安全控制;在微内核的基础上,使之速度超越传统的包过滤防火墙,提供代理服务器的透明模式。闪电配置工作程序;提供数据加密和解码,支持虚拟专用网络,隐藏内部信息。这将成为一种新的防火墙理论。

这种新的防火墙技术不仅可以提供传统的包过滤技术提供的全部功能,而且对于防止各种网络袭击有明显优势,加强代理服务、包过滤技术与智能过滤技术相结合,可以使安全防火墙的上升到另一个高度。

4 结论

现在该防火墙已被广泛应用于互联网,由于它不受TCP / IP协议限制的特点,使它在英特网之外也有更多的活力。防火墙不是解决网络安全的主观方法,只是网络安全策略的一个组成部分。我们要在实际应用中学习和了解防火墙技术,相信每一个朋友都可以在新世纪的网络生活中获益良多。

化工英文文献翻译

Heavy Oil Development Technology of Liaohe Oilfield Han Yun (Scientific Research Information Department Exploration&Development Research Institute,Liaohe Oilfield Company) Liaohe Oilfield,the largest heavy oil production base in China,features in various reservoir types,deep burial,and wide range of crude oil viscosity.For many years,a series of technologies have been developed for different oil products and reservoir types of the oilfield,of which water flooding,foam slug drive,steam stimulation,steam drive,and SAGD are the main technologies. After continuous improvement,they have been further developed and played an important role in the development of heavy oil in the oilfield. Liaohe Oilfield is abundant in heavy oil resources,46%of the total proved reserves of Liaohe Oilfield Company. Horizontally the resources concentrates in the West Depression and the southern plunging belt of the Central Uplift in Liaohe Rift. Vertically,it is mainly distributed in Paleocene Shahejie Formation(ES). The distinctive geological feature of Liaohe 0ilfield is manifested in three aspects:first,the heavy oil reservoirs are deeply buried and 80%of them are buried more than 900m deep;second,the heavy oil viscosity ranges widely.For most of the reservoirs.the dead oil viscosity ranges in 100~100000mPa·s with the maximum 650000mPa·s.Third the reservoir types are various with complicated oil—water relationship,most of the reservoirs are edge water and bosom water reservoirs and there are also edge water reservoirs,top water reservoirs and bosom water reservoirs.For more than 20 years of development,Liaohe Oilfield has developed series of heavy oil development technologies for different oil products and different types of reservoirs,such as water flooding, foam slug drive,steam stimulation steam drive and SAGD.The most difficult issues have been overcome in the development of the super

《化学工程与工艺专业英语》课文翻译 完整版

Unit 1 Chemical Industry 化学工业 1.Origins of the Chemical Industry Although the use of chemicals dates back to the ancient civilizations, the evolution of what we know as the modern chemical industry started much more recently. It may be considered to have begun during the Industrial Revolution, about 1800, and developed to provide chemicals roe use by other industries. Examples are alkali for soapmaking, bleaching powder for cotton, and silica and sodium carbonate for glassmaking. It will be noted that these are all inorganic chemicals. The organic chemicals industry started in the 1860s with the exploitation of William Henry Perkin‘s discovery if the first synthetic dyestuff—mauve. At the start of the twentieth century the emphasis on research on the applied aspects of chemistry in Germany had paid off handsomely, and by 1914 had resulted in the German chemical industry having 75% of the world market in chemicals. This was based on the discovery of new dyestuffs plus the development of both the contact process for sulphuric acid and the Haber process for ammonia. The later required a major technological breakthrough that of being able to carry out chemical reactions under conditions of very high pressure for the first time. The experience gained with this was to stand Germany in good stead, particularly with the rapidly increased demand for nitrogen-based compounds (ammonium salts for fertilizers and nitric acid for explosives manufacture) with the outbreak of world warⅠin 1914. This initiated profound changes which continued during the inter-war years (1918-1939). 1.化学工业的起源 尽管化学品的使用可以追溯到古代文明时代,我们所谓的现代化学工业的发展却是非常近代(才开始的)。可以认为它起源于工业革命其间,大约在1800年,并发展成为为其它工业部门提供化学原料的产业。比如制肥皂所用的碱,棉布生产所用的漂白粉,玻璃制造业所用的硅及Na2CO3. 我们会注意到所有这些都是无机物。有机化学工业的开始是在十九世纪六十年代以William Henry Perkin 发现第一种合成染料—苯胺紫并加以开发利用为标志的。20世纪初,德国花费大量资金用于实用化学方面的重点研究,到1914年,德国的化学工业在世界化学产品市场上占有75%的份额。这要归因于新染料的发现以及硫酸的接触法生产和氨的哈伯生产工艺的发展。而后者需要较大的技术突破使得化学反应第一次可以在非常高的压力条件下进行。这方面所取得的成绩对德国很有帮助。特别是由于1914年第一次世界大仗的爆发,对以氮为基础的化合物的需求飞速增长。这种深刻的改变一直持续到战后(1918-1939)。 date bake to/from: 回溯到 dated: 过时的,陈旧的 stand sb. in good stead: 对。。。很有帮助

机械专业外文翻译(中英文翻译)

外文翻译 英文原文 Belt Conveying Systems Development of driving system Among the methods of material conveying employed,belt conveyors play a very important part in the reliable carrying of material over long distances at competitive cost.Conveyor systems have become larger and more complex and drive systems have also been going through a process of evolution and will continue to do so.Nowadays,bigger belts require more power and have brought the need for larger individual drives as well as multiple drives such as 3 drives of 750 kW for one belt(this is the case for the conveyor drives in Chengzhuang Mine).The ability to control drive acceleration torque is critical to belt conveyors’performance.An efficient drive system should be able to provide smooth,soft starts while maintaining belt tensions within the specified safe limits.For load sharing on multiple drives.torque and speed control are also important considerations in the drive system’s design. Due to the advances in conveyor drive control technology,at present many more reliable.Cost-effective and performance-driven conveyor drive systems covering a wide range of power are available for customers’ choices[1]. 1 Analysis on conveyor drive technologies 1.1 Direct drives Full-voltage starters.With a full-voltage starter design,the conveyor head shaft is direct-coupled to the motor through the gear drive.Direct full-voltage starters are adequate for relatively low-power, simple-profile conveyors.With direct fu11-voltage starters.no control is provided for various conveyor loads and.depending on the ratio between fu11-and no-1oad power requirements,empty starting times can be three or four times faster than full load.The maintenance-free starting system is simple,low-cost and very reliable.However, they cannot control starting torque and maximum stall torque;therefore.they are

电气外文文献-翻译

Circuit breaker 断路器 Compressed air circuit breaker is a mechanical switch equipm ent, can be i 空气压缩断路器是一种机械开关设备,能够在n normal and special conditions breaking current (such as sho rt circuit cur 正常和特殊情况下开断电流(比如说短路电流)。 rent). For example, air circuit breaker, oil circuit breaker, interf erence circ 例如空气断路器、油断路器,干扰电路的导体uit conductor for the application of the safety and reliability o f the circuit 干扰电路的导体因该安全可靠的应用于其中, breaker, current in arc from is usually divided into the followin g grades: a 电流断路器按灭弧远离通常被分为如下等级:ir switch circuit breaker, oil circuit breaker, less oil circuit break er, compr 空气开关断路器、油断路器、少油断路器、压缩空essed air circuit breaker, a degaussing of isolating switch, six s ulfur hexaf

污水处理 英文文献3 翻译

丹宁改性絮凝剂处理城市污水 J.Beltrán-heredia,J.ánche z-Martin 埃斯特雷马杜拉大学化学工程系和物理化学系,德埃娃儿,S / N 06071,巴达霍斯,西班牙 摘要 一种新的以丹宁为主要成分的混凝剂和絮凝剂已经过测试用以处理城市污水。TANFLOC 证实了其在浊度的去除上的高效性(接近100%,取决于剂量),并且近50%的BOD5和COD 被去除,表明TANFLOC是合适的凝集剂,效力可与明矾相媲美。混凝絮凝剂过程不依赖于温度,发现最佳搅拌速度和时间为40转/每分钟和30分钟。多酚含量不显著增加,30%的阴离子表面活性剂被去除。沉淀过程似乎是一种絮凝分离,所以污泥体积指数和它随絮凝剂剂量的改变可以确定。证明TANFLOC是相当有效的可用于污水处理的混凝絮凝剂。 关键词: 基于丹宁的絮凝剂城市污水絮凝天然混凝剂 1.简介 人类活动是废物的来源。特别是在城市定居点,来自家庭和工业的废水可能是危险有害的产品[ 1 ],需要适当的处理,以避免对环境[ 2 ]和健康的影响[ 3,4 ]。2006年12月4日联合国大会通过决议宣布2008为国际卫生年。无效的卫生基础设施促使每年220万人死于腹泻,主要在3岁以下儿童,600万人因沙眼失明,两亿人感染血吸虫病,只是为了给出一些数据[ 5 ]。显然,他们中的大多数都是在发展中国家,所以谈及城市污水,必须研究适当的技术来拓宽可能的处理技术种类。 在这个意义上,许多类型的水处理被使用。他们之间的分歧在于经济和技术特点上。了摆脱危险的污染[ 6 ],一些令人关注的论文已经发表的关于城市污水处理的几种天然的替代方法,包括绿色过滤器、化学初步分离、紫外消毒[ 7 ]和多级程序[ 8 ]。 几个以前的文件指出了城市污水管理[9,10]的重要性。这种类型的废物已成为社会研究的目标,因为它涉及到几个方面,都与社会结构和社会组织[11 ]相关。根据这一维度,必须认识到废水管理作为发展中国家的一种社会变化的因素,事关污水处理和生产之间的平衡,是非常重要的,一方面,人类要发展,另一方面,显而易见。 对水处理其它程序的研究一直是这和其他文件的范围。几年来,研究者关注的是发展中国家间的合作,他们正在致力于水处理的替代过程,主要考虑可持续发展,社会承受能力和可行性等理念。在这个意义上,自然混凝絮凝剂这一广为传播,易于操作的资源即使是非专业人员也不难操作。有一些例子,如辣木[ 14 ]和仙人掌榕[ 15 ]。丹宁可能是一个新的混凝剂和絮凝剂。 一些开拓者已经研究了丹宁水处理能力。 ?zacar和sengil [ 16 ]:从瓦罗NIA获得的丹宁,从土耳其的autoctonous树的果壳中获得丹宁,并用于他们的–污水混凝絮凝过程。他们表明,丹宁有很好的效果,结合Al2(SO4)3可进一步提高污泥去除率。 詹和赵[ 17 ]试着用丹宁为主要成分的凝胶作为吸收剂除去水中的铝,丹宁凝胶改进了金属去除过程,一定意义上也可参照Nakano等人的[ 18 ],Kim 和Nakano[ 19 ]。 ?zacar和sengil [ 20 ]加强以前的文章给出了关于三卤甲烷的形成和其他不良化合物特殊的数据,以及处理后的水质安全。他们始终使用丹宁与Al2(SO4)3的组合。 帕尔马等人将丹宁从辐射松的树皮为原位提取,用于重金属去除中聚合固体。树皮本

Manufacturing Engineering and Technology(机械类英文文献+翻译)

Manufacturing Engineering and Technology—Machining Serope kalpakjian;Steven R.Schmid 机械工业出版社2004年3月第1版 20.9 MACHINABILITY The machinability of a material usually defined in terms of four factors: 1、Surface finish and integrity of the machined part; 2、Tool life obtained; 3、Force and power requirements; 4、Chip control. Thus, good machinability good surface finish and integrity, long tool life, and low force And power requirements. As for chip control, long and thin (stringy) cured chips, if not broken up, can severely interfere with the cutting operation by becoming entangled in the cutting zone. Because of the complex nature of cutting operations, it is difficult to establish relationships that quantitatively define the machinability of a material. In manufacturing plants, tool life and surface roughness are generally considered to be the most important factors in machinability. Although not used much any more, approximate machinability ratings are available in the example below. 20.9.1 Machinability Of Steels Because steels are among the most important engineering materials (as noted in Chapter 5), their machinability has been studied extensively. The machinability of steels has been mainly improved by adding lead and sulfur to obtain so-called free-machining steels. Resulfurized and Rephosphorized steels. Sulfur in steels forms manganese sulfide inclusions (second-phase particles), which act as stress raisers in the primary shear zone. As a result, the chips produced break up easily and are small; this improves machinability. The size, shape, distribution, and concentration of these inclusions significantly influence machinability. Elements such as tellurium and selenium, which are both chemically similar to sulfur, act as inclusion modifiers in

电气供配电系统大学毕业论文英文文献翻译及原文

毕业设计(论文) 外文文献翻译 文献、资料中文题目:供配电系统 文献、资料英文题目:POWER SUPPLY AND DISTRIBUTION SYSTEM 文献、资料来源: 文献、资料发表(出版)日期: 院(部): 专业: 班级: 姓名: 学号: 指导教师: 翻译日期: 2017.02.14

POWER SUPPLY AND DISTRIBUTION SYSTEM ABSTRACT The basic function of the electric power system is to transport the electric power towards customers. The l0kV electric distribution net is a key point that connects the power supply with the electricity using on the industry, business and daily-life. For the electric power, allcostumers expect to pay the lowest price for the highest reliability, but don't consider that it's self-contradictory in the co-existence of economy and reliable.To improve the reliability of the power supply network, we must increase the investment cost of the network construction But, if the cost that improve the reliability of the network construction, but the investment on this kind of construction would be worthless if the reducing loss is on the power-off is less than the increasing investment on improving the reliability .Thus we find out a balance point to make the most economic,between the investment and the loss by calculating the investment on power net and the loss brought from power-off. KEYWARDS:power supply and distribution,power distribution reliability,reactive compensation,load distribution

中英文文献以及翻译(化工类)

Foreign material: Chemical Industry 1.Origins of the Chemical Industry Although the use of chemicals dates back to the ancient civilizations, the evolution of what we know as the modern chemical industry started much more recently. It may be considered to have begun during the Industrial Revolution, about 1800, and developed to provide chemicals roe use by other industries. Examples are alkali for soapmaking, bleaching powder for cotton, and silica and sodium carbonate for glassmaking. It will be noted that these are all inorganic chemicals. The organic chemicals industry started in the 1860s with the exploitation of William Henry Perkin’s discovery if the first synthetic dyestuff—mauve. At the start of the twentieth century the emphasis on research on the applied aspects of chemistry in Germany had paid off handsomely, and by 1914 had resulted in the German chemical industry having 75% of the world market in chemicals. This was based on the discovery of new dyestuffs plus the development of both the contact process for sulphuric acid and the Haber process for ammonia. The later required a major technological breakthrough that of being able to carry out chemical reactions under conditions of very high pressure for the first time. The experience gained with this was to stand Germany in good stead, particularly with the rapidly increased demand for nitrogen-based compounds (ammonium salts for fertilizers and nitric acid for explosives manufacture) with the outbreak of world warⅠin 1914. This initiated profound changes which continued during the inter-war years (1918-1939). Since 1940 the chemical industry has grown at a remarkable rate, although this has slowed significantly in recent years. The lion’s share of this growth has been in the organic chemicals sector due to the development and growth of the petrochemicals area since 1950s. The explosives growth in petrochemicals in the 1960s and 1970s was largely due to the enormous increase in demand for synthetic polymers such as polyethylene, polypropylene, nylon, polyesters and epoxy resins. The chemical industry today is a very diverse sector of manufacturing industry, within which it plays a central role. It makes thousands of different chemicals which

各专业的英文翻译剖析

哲学Philosophy 马克思主义哲学Philosophy of Marxism 中国哲学Chinese Philosophy 外国哲学Foreign Philosophies 逻辑学Logic 伦理学Ethics 美学Aesthetics 宗教学Science of Religion 科学技术哲学Philosophy of Science and Technology 经济学Economics 理论经济学Theoretical Economics 政治经济学Political Economy 经济思想史History of Economic Thought 经济史History of Economic 西方经济学Western Economics 世界经济World Economics 人口、资源与环境经济学Population, Resources and Environmental Economics 应用经济学Applied Economics 国民经济学National Economics 区域经济学Regional Economics 财政学(含税收学)Public Finance (including Taxation) 金融学(含保险学)Finance (including Insurance) 产业经济学Industrial Economics 国际贸易学International Trade 劳动经济学Labor Economics 统计学Statistics 数量经济学Quantitative Economics 中文学科、专业名称英文学科、专业名称 国防经济学National Defense Economics 法学Law 法学Science of Law 法学理论Jurisprudence 法律史Legal History 宪法学与行政法学Constitutional Law and Administrative Law 刑法学Criminal Jurisprudence 民商法学(含劳动法学、社会保障法学) Civil Law and Commercial Law (including Science of Labour Law and Science of Social Security Law ) 诉讼法学Science of Procedure Laws

机械专业中英文对照翻译大全.

机械专业英语词汇中英文对照翻译一览表 陶瓷ceramics 合成纤维synthetic fibre 电化学腐蚀electrochemical corrosion 车架automotive chassis 悬架suspension 转向器redirector 变速器speed changer 板料冲压sheet metal parts 孔加工spot facing machining 车间workshop 工程技术人员engineer 气动夹紧pneuma lock 数学模型mathematical model 画法几何descriptive geometry 机械制图Mechanical drawing 投影projection 视图view 剖视图profile chart 标准件standard component 零件图part drawing 装配图assembly drawing

尺寸标注size marking 技术要求technical requirements 刚度rigidity 内力internal force 位移displacement 截面section 疲劳极限fatigue limit 断裂fracture 塑性变形plastic distortion 脆性材料brittleness material 刚度准则rigidity criterion 垫圈washer 垫片spacer 直齿圆柱齿轮straight toothed spur gear 斜齿圆柱齿轮helical-spur gear 直齿锥齿轮straight bevel gear 运动简图kinematic sketch 齿轮齿条pinion and rack 蜗杆蜗轮worm and worm gear 虚约束passive constraint 曲柄crank 摇杆racker

化学实验方法外文文献翻译、中英文翻译、外文翻译

实验方法 辐射黑色体理论(Chao et al., 1961)和切削表面理论(Friedman and Lenz, 1970)。随着敏感的红外感光胶片的发展,在一个可被记录切削侧面温度场的工具(Boothroyd, 1961)和电视型红外线敏感的视频设备已被哈里斯等人使用(1980年),以热传感和半导体量子吸收的原则为基础的红外线传感器的不断发展,使得这些传感器的第二敏感性大于第一次,其时间常数很小太- 在微秒到毫秒的范围之内。图5.21显示了最新使用的第二类的例子。有两个传感器以及开始投入使用,一个是在1毫米至5毫米的波长范围的敏感型锑化铟,另外一个是从6毫米至13毫米的敏感型碲镉汞类型,通过与两个不同的探测器信号比较可以使用温度测量更敏感的方法。大部分金属切削温度已进行了调查和了解使得更好地了解这个过程。原则上,温度测量可能用于条件监测,例如,警告说如果是天气太热导致切割刀具后刀面磨损,然而,尤其是辐射能尺寸,在生产条件,校准问题以及确保辐射能量途径从伤口区到探测器不被打断的困难,使得以温度测量为目的方法不够可靠切削的另一种方式是监测声发射,这虽然是一个间接的方法,但研究过程的状态是一个值得考虑未来。 5.4 声发射 材料的活跃形变—例如裂缝的增长,变形夹杂物,快速塑性剪切,甚至晶界,位错运动都是伴随着弹性应力波的排放而产生。这就是声发射(AE)。排放的发

生在一个很宽的频率范围内,但通常是从10万赫到1兆赫。虽然波幅度很小,但是他们可以被检测到,通过强烈的压电材料如钛酸钡或压电陶瓷传感器制造从,(Pb(Zr x Ti1–x)O3; x = 0.5 to 0.6)。图5.22显示了传感器的结构。声波传送到压力传感器造成直接的压力E(△L/L),其中E是传感器的杨氏模量,L 是它的长度,△L是它的长度变化。应力产生电场 T = g33E(△L/L)(5.7a) g33是传感器材料的压电应力系数。传感器两端的电压是TL,然后 V= g33E△L(5.7b) g33和E的典型值分别是24.4 × 10-3Vm/ N和58.5GPa,以检测电压高达0.01毫伏,这是可能的。将这些值代入方程(5.7b)导致了检测△L的长度变化的可以小到7 × 10-15米:对于一个L = 10毫米的传感器来说,即相当于拥有7 ×10-13 图5.22显示的是声发射传感器的结构 实验理论方法

机械类英文文献+翻译)

机械工业出版社2004年3月第1版 20.9 MACHINABILITY The machinability of a material usually defined in terms of four factors: 1、Surface finish and integrity of the machined part; 2、Tool life obtained; 3、Force and power requirements; 4、Chip control. Thus, good machinability good surface finish and integrity, long tool life, and low force And power requirements. As for chip control, long and thin (stringy) cured chips, if not broken up, can severely interfere with the cutting operation by becoming entangled in the cutting zone. Because of the complex nature of cutting operations, it is difficult to establish relationships that quantitatively define the machinability of a material. In manufacturing plants, tool life and surface roughness are generally considered to be the most important factors in machinability. Although not used much any more, approximate machinability ratings are available in the example below. 20.9.1 Machinability Of Steels Because steels are among the most important engineering materials (as noted in Chapter 5), their machinability has been studied extensively. The machinability of steels has been mainly improved by adding lead and sulfur to obtain so-called free-machining steels. Resulfurized and Rephosphorized steels. Sulfur in steels forms manganese sulfide inclusions (second-phase particles), which act as stress raisers in the primary shear zone. As a result, the chips produced break up easily and are small; this improves machinability. The size, shape, distribution, and concentration of these inclusions significantly influence machinability. Elements such as tellurium and selenium, which are both chemically similar to sulfur, act as inclusion modifiers in resulfurized steels. Phosphorus in steels has two major effects. It strengthens the ferrite, causing

电气工程及其自动化专业_外文文献_英文文献_外文翻译_plc方面

1、 外文原文 A: Fundamentals of Single-chip Microcomputer Th e si ng le -c hi p m ic ro co mp ut er i s t he c ul mi na ti on of both t h e de ve lo pm en t o f t he d ig it al co m pu te r an d th e i n te gr at ed c i rc ui t a rg ua bl y t h e to w m os t s ig ni f ic an t i nv en ti on s o f t he 20th c e nt ur y [1]. Th es e t ow ty pe s of ar ch it ec tu re a re fo un d i n s in g le -ch i p m i cr oc om pu te r. So m e em pl oy t he spl i t pr og ra m/da ta m e mo ry o f th e H a rv ar d ar ch it ect u re , sh ow n in Fi g.3-5A -1, o th ers fo ll ow t he p h il os op hy , wi del y a da pt ed f or ge n er al -p ur po se co m pu te rs a nd m i cr op ro ce ss o r s, o f ma ki ng n o log i ca l di st in ct ion be tw ee n p r og ra m an d d at a m e mo ry a s i n t he P r in ce to n ar ch ite c tu re , sh ow n i n F ig.3-5A-2. In g en er al te r ms a s in gl e -chi p m ic ro co mp ut er i s c h ar ac te ri ze d b y t h e i nc or po ra ti on o f a ll t he un it s of a co mp uter i n to a s in gl e d ev i ce , as s ho wn in Fi g3-5A -3. Fig.3-5A-1 A Harvard type Program memory Data memory CPU Input& Output unit memory CPU Input& Output unit

相关文档
最新文档