外文翻译
五分钟搞定外文翻译

五分钟搞定5000字-外文文献翻译工具大全 /node/2151在科研过程中阅读翻译外文文献是一个非常重要的环节,许多领域高水平的文献都是外文文献,借鉴一些外文文献翻译的经验是非常必要的。
由于特殊原因我翻译外文文献的机会比较多,慢慢地就发现了外文文献翻译过程中的三大利器:Google“翻译”频道、金山词霸(完整版本)和CNKI“翻译助手"。
具体操作过程如下:1.先打开金山词霸自动取词功能,然后阅读文献;2.遇到无法理解的长句时,可以交给Google处理,处理后的结果猛一看,不堪入目,可是经过大脑的再处理后句子的意思基本就明了了;3.如果通过Google仍然无法理解,感觉就是不同,那肯定是对其中某个“常用单词”理解有误,因为某些单词看似很简单,但是在文献中有特殊的意思,这时就可以通过CNKI的“翻译助手”来查询相关单词的意思,由于CNKI的单词意思都是来源与大量的文献,所以它的吻合率很高。
另外,在翻译过程中最好以“段落”或者“长句”作为翻译的基本单位,这样才不会造成“只见树木,不见森林”的误导。
注:1、Google翻译:/language_toolsgoogle,众所周知,谷歌里面的英文文献和资料还算是比较详实的。
我利用它是这样的。
一方面可以用它查询英文论文,当然这方面的帖子很多,大家可以搜索,在此不赘述。
回到我自己说的翻译上来。
下面给大家举个例子来说明如何用吧比如说“电磁感应透明效应”这个词汇你不知道他怎么翻译,首先你可以在CNKI里查中文的,根据它们的关键词中英文对照来做,一般比较准确。
在此主要是说在google里怎么知道这个翻译意思。
大家应该都有词典吧,按中国人的办法,把一个一个词分着查出来,敲到google里,你的这种翻译一般不太准,当然你需要验证是否准确了,这下看着吧,把你的那支离破碎的翻译在google里搜索,你能看到许多相关的文献或资料,大家都不是笨蛋,看看,也就能找到最精确的翻译了,纯西式的!我就是这么用的。
毕设外文翻译是什么意思(两篇)

引言概述:在现代高等教育中,毕业设计(或称为毕业论文、学士论文等)是学生完成学业的重要环节。
而对于一些特定的专业,例如翻译专业,有时候还需要完成外文翻译这一项任务。
本文将探讨毕设外文翻译的意义和目的,以及为什么对翻译专业的学生而言这一任务极其重要。
正文内容:1.提高翻译能力和技巧外文翻译是一项对翻译专业学生而言十分重要的任务,通过进行外文翻译,学生们可以通过实践提高自己的翻译能力和技巧。
在这个过程中,他们可以学习如何处理不同类型的外文文本,熟悉不同领域的专业术语,并掌握一些常用的翻译技巧和策略。
2.扩展语言和文化知识毕设外文翻译要求学生们对翻译语言的相关知识和背景有一定的了解。
在进行翻译时,学生们需要遵循目标语言的语法规则,并确保所翻译的内容准确、清晰地传达源语言的意义。
通过这一过程,学生们可以进一步扩展自己的语言和文化知识,提高自己的跨文化沟通能力。
3.提供实践机会毕设外文翻译为学生们提供了一个实践的机会,让他们能够将在课堂上所学到的理论知识应用于实际操作中。
通过实践,学生们可以对所学知识的理解更加深入,同时也可以发现并解决实际翻译过程中的问题和挑战。
这对于学生们将来从事翻译工作时具备更好的实践能力和经验具有重要意义。
4.培养翻译专业素养毕设外文翻译要求学生们具备良好的翻译专业素养。
在进行翻译过程中,学生们需要保持专业的态度和责任心,严谨地对待每一个翻译任务。
他们需要学会如何进行翻译质量的评估和控制,以确保最终翻译稿的准确性和流畅性。
这一系列的要求和实践,可以帮助学生们培养出色的翻译专业素养。
5.提升自我学习和研究能力毕设外文翻译要求学生们进行广泛的文献阅读和研究,以便更好地理解所翻译的内容,并找到适当的翻译方法和策略。
在这个过程中,学生们需要培养自己的自主学习和研究能力,提高对学术和专业领域的敏感性,并能够独立思考和解决问题。
这将对学生们未来的学术研究和进一步的职业发展产生积极的影响。
总结:引言概述:毕业设计外文翻译(Thesis Translation)是指在毕业设计过程中,对相关外文文献进行翻译,并将其应用于研究中,以提供理论支持和参考。
外文翻译中英文对照

Strengths优势All these private sector banks hold strong position on CRM part, they have professional, dedicated and well-trained employees.所以这些私人银行在客户管理部分都持支持态度,他们拥有专业的、细致的、训练有素的员工。
Private sector banks offer a wide range of banking and financial products and financial services to corporate and retail customers through a variety of delivery channels such as ATMs, Internet-banking, mobile-banking, etc. 私有银行通过许多传递通道(如自动取款机、网上银行、手机银行等)提供大范围的银行和金融产品、金融服务进行合作并向客户零售。
The area could be Investment management banking, life and non-life insurance, venture capital and asset management, retail loans such as home loans, personal loans, educational loans, car loans, consumer durable loans, credit cards, etc. 涉及的领域包括投资管理银行、生命和非生命保险、风险投资与资产管理、零售贷款(如家庭贷款、个人贷款、教育贷款、汽车贷款、耐用消费品贷款、信用卡等)。
Private sector banks focus on customization of products that are designed to meet the specific needs of customers. 私人银行主要致力于为一些特殊需求的客户进行设计和产品定制。
外文翻译-英文

In traditional supply chain inventory management, orders are the only information firms exchange, but information technology now allows firms to share demand and inventory data quickly and inexpensively. We study the value of sharing these data in a model with one supplier, N identical retailers, and stationary stochastic consumer demand. There are inventory holding costs and back-order penalty costs. We compare a traditional information policy that does not use shared information with a full information policy that does exploit shared information. In a numerical study we find that supply chain costs are 2.2% lower on averagewith the full information policy than with the traditional information policy, and themaximum difference is 12.1%. We also develop a simulation-based lower bound over all feasible policies. The cost difference between the traditional information policy and the lower bound is an upper bound on the value of information sharing: In the same study, that difference is 3.4% on average, and no more than 13.8%. We contrast the value of information sharing with two other benefits of information technology, faster and cheaper order processing, which lead to shorter lead times and smaller batch sizes, respectively. In our sample, cutting lead times nearly in half reduces costs by 21% on average, and cutting batchesin half reduces costs by 22% on average. For the settings we study, we conclude that implementing information technology to accelerate and smooth the physical flow of goods through a supply chain is significantly more valuable than using information technology to expand the flow of information.Inventory management is a commercial enterprise management of the core areas, Enterprises can also achieve an effective key, if we can achieve from the purchase of stock,Sales then the entire flow of goods and capital flow situation for the unified management and reasonable production, timely sales and inventory is the smallest. reduce the backlog of material, then the business will achieve the best results.1.sessionIn my experience, session word is probably second only to the extent of the abuse of transaction, even more interesting is the transaction and the session in the context of the meaning of some of the same.session, the Chinese often translated into the session, its original meaning refers to the beginnings and ends of a series of action / information, such as a phone call from the dial to pick up the phone to hang up the middle of the process can be described as a series of session. Sometimes we can see that the case "during the session in a browser session ,...", term used here is its original meaning, is open from a browser window to close the period of ①. The most confusing is the "user (client) during the first session," the words, it may refer to a series of user actions (generally with a specific purpose related to a series of actions, such as log on to buy goods from to sign out such an online shopping checkout process, sometimes also called a transaction), but sometimes may be just that a connection could also be that the meaning of ①, the difference can only be inferred by context ②.However, when the term session is associated with the network protocol when it often implies a "connection-oriented" and / or "on hold" so the two meanings, "connection-oriented" refers to both the communication in the communication prior to first establish a communication channel, such as phone calls, until the other party answered the phone communication can begin, and this is the opposite of writing, before you sent the letter, the time you and can not confirm the other side of the address is correct, communication channels Buyi Ding can be established,but the sender, the communication has already begun. "Keep state" means the communication party is able to associate a series of messages, making messages between each other depends, for example, a waiter can recognize old customers come back and remember the last time the customer still owes a store, dollar . Examples of this type, "a TCP session" or "a POP3 session"③.And to the web server flourishing, session in the context of semantic web development has a new expansion, its meaning is mean to the client and server to maintain state between the solution ④. Session is also sometimes used to refer to such solutions, storage structures, such "stored in the session to xxx where" ⑤. For various 用于web development languages are available to some extent on the support of such a solution, so in the context of a particular language 下, session also used to denote a solution on behalf of the language, such as regular Java in the provision of javax.servlet.http.HttpSession referred to as the session ⑥.In view of this confusion has been changed, in this article use the term session will have different meanings depending on the context, drew attention to the resolution.In this article, the use of Chinese "during the browser session," to convey the meaning of ①, use "session mechanism" to convey the meaning ④, use the "session" expression meaning ⑤, use specific "HttpSession" to convey the meaning ⑥Second, HTTP protocol and the state to maintainHTTP protocol itself is stateless, HTTP protocol which is consistent with the original purpose of the client only needs a simple request to download some file server, either the client or the server not have been necessary records of past behavior to each other, and each time between the request are independent, like a customer and a vending machine or an ordinary (non-membership) as the relationship between supermarkets.However, smart (or greedy?) People soon discovered that if they can provide on-demand generation of dynamic web information will become more useful, like a cable TV with on-demand the same function. This demand on the one hand to force gradually add HTML form, script, DOM and other client-side behavior, on the other hand there is the server-side CGI practices to respond to client-side dynamic request, the HTTP protocol as the transport carrier also added a file upload , cookie these characteristics. The role which cookie is to solve the stateless HTTP protocol efforts defects. As for the subsequent emergence of the session mechanism is yet another in between the client and the server state solution.Let us use some examples to describe the session cookie and the differences and similarities between the mechanisms. I once frequented a coffee shop with free gifts to drink five cups of coffee offers a cup of coffee, but a one-time consumption of five cups of coffee is remote, then need a way to record a customer's consumption. Imagine that in fact nothing less than the following several options:1, the store's staff is very powerful, able to remember each customer's consumption, as long as customers entered the cafe, shop assistants know how to deal with the. This approach is the agreement itself to support the state.2, issue customers a card recording the number of consumers in general have a validity period. Each consumer, if this card is produced, then the consumer will be with the consumer before or after linking up. This approach is maintained in the client state.3, a membership card issued to customers, in addition to any information outside the card number is not recorded, each consumer, if the card is produced, then the records clerk in the store to find the card number corresponds to the record to add some consumer information. Thisapproach is maintained in the server-side state.As the HTTP protocol is stateless, but due to various considerations do not want to become a state, therefore, the last two programs has become a realistic option. Specifically cookie mechanism is used to maintain state of the client program, which uses a session mechanism to maintain state in the server-side program. We also see that, thanks to server-side maintain state of the program in customer client but also Xuyaobaocun a logo, so mechanisms may need the help of session cookie mechanism to identify the purpose of Da Dao saved, it actually alternatives are available.Third, the cookie mechanismThe basic principle cookie mechanism as simple as the above example, but there are several issues to resolve: "membership card" how to distribute; "membership card" of the content; and customers how to use the "Member Card."Orthodox cookie distribution is by extending the HTTP protocol to achieve, and the server through the HTTP response header with a line of special instructions to prompt the browser in accordance with the instructions generates the corresponding cookie. But pure client-side scripting such as JavaScript or VBScript can also generate the cookie.The cookie used by the browser in the background according to certain principles automatically sent to the server. Check all stored browser cookie, if a cookie is greater than or equal scope statement will be the location of the requested resources, put the resources of the HTTP request cookie attached to the head sent the request to the server. Means that McDonald's membership card can only be produced in the McDonald's store, if a store has also issued its own membership card, then enter the store when the addition to produce McDonald's membership card, but also to produce a member of the store card.cookie's contents include: name, values, expiration time, path and domain.You can specify a domain in which a domain such as. , the equivalent of main store signs, such as Procter & Gamble, you can also specify a specific domain of a machine under such or , can float Flexibility to do than.Path is the name behind the URL with the path, such as / or / foo, etc., can do more than a counter Rejoice.Path together with the domain constitutes a cookie's scope. If you do not set the expiration time, then the lifetime of this cookie to the browser during the session, simply close the browser window, cookie disappears. This period of life of the cookie browser session is called session cookie. Session cookie is generally not stored on the hard disk but kept in memory, of course, provided that it is not standardized. If you set the expiration time, the browser the cookie will be saved to the hard disk, open again after closing the browser, the cookie is still valid until the expiration time exceeds a set.Stored in a cookie on your hard disk in a different browser, shared between processes, such as the two IE windows. And stored in memory for the cookie, different browsers have different approaches. For IE, open windows in a press Ctrl-N (or from the File menu) to open the window can be shared with the original window while using other means to open the IE process will not have to open the windows shared memory cookie; for Mozilla Firefox0.8, all of the process and can share the same tab the cookie. In general is the window.open javascript window will open with the original windows shared memory cookie. Browser, this cookie for the session cookiedoes not believe that people only recognize the approach to the use of the regular session of web application development mechanism causing great distress.Here is a goolge set cookie response header exampleHTTP/1.1 302 FoundLocation: /intl/zh-CN/Set-Cookie: PREF = ID = 0565f77e132de138: NW = 1: TM = 1098082649: LM = 1098082649: S = KaeaCFPo49RiA_d8; expires = Sun, 17-Jan-2038 19:14:07 GMT; path = /; domain =. google . comContent-Type: text / htmlThis is the use of HTTPLook the HTTP Sniffer HTTP communications software to capture the part of the recordGoolge browser to access the resources again, automatically send out cookieUse Firefox can easily observe the current value of cookieUse HTTPLook with Firefox cookie can easily understand the working principle.IE can be set to ask before accepting cookieThis is a dialog box asking to accept cookie.Fourth, understand the session mechanismmechanism is a server-side session mechanism, the server uses a hash table is similar to the structure (and probably is to use a hash table) to save the information.When the program needs for a client's request to create a session when the server first checks the client's request is included in a session ID - known as the session id, if the description contains a session id for this client previously Create over session, the server in accordance with the session id to retrieve the session out of the use (if not retrieved, may be the new one), if the client request does not include session id, then create a session for this client and generate a session with this associated with the session id, session id value should be a not only will not repeat, not easy to find the law to copy the string, the session id to be returned in this response to the client saved.Save the session id of the ways to use cookie, so the interaction of the browser can automatically identify this play by the rules to the server. The name of this cookie are generally similar to SEEESIONID, and. For example, web applications weblogic generated cookie, JSESSIONID = ByOK3vjFD75aPnrF7C2HmdnV6QZcEbzWoWiBYEnLerjQ99zWpBng! -145788764, Its name is JSESSIONID.As the cookie can be artificially prohibited, there must be other mechanisms to be banned in the cookie when the session id still be able to pass back to the server. Often use a technique called URL rewriting, the session id is attached to the URL path directly behind, there are two additional ways, one is the URL path as additional information, showing the form of http:// ... .. / xxx; jsessionid = ByOK3vjFD75aPnrF7C2HmdnV6QZcEbzWoWiBYEnLerjQ99zWpBng! -145788764 The other is as a URL query string appended to the back, showing the form of http://.. (xxx)jsessionid=ByOK3vjFD75aPnrF7C2HmdnV6QZcEbzWoWiBYEnLerjQ99zWpBng!-145788764Both ways is no different for users, and only a server parsing the time to deal with the different ways, using the first ways are conducive to turning one kind of session id's information and to distinguish normal program parameters.Wei Liao Zai the interaction always maintain state, we must each client may request a path to the rear of containing this session id.Another technique known as hidden form fields. Is that the server will automatically modify the form, add a hidden field, so when the form is submitted to the session id passed back to the server. Example, the following form<form name="testform" action="/xxx"><input type="text"></ Form>Being passed to client will be rewritten before<form name="testform" action="/xxx"><input type="hidden" name="jsessionid"value="ByOK3vjFD75aPnrF7C2HmdnV6QZcEbzWoWiBYEnLerjQ99zWpBng!-145788764"><input type="text"></ Form>Application of this technology is now less, I contacted the very old iPlanet6 (SunONE Application Server's predecessor) on the use of this technology.In fact this technology can simply apply to the action URL rewriting instead.When talking about the session mechanism, often heard of such a misunderstanding, "as long as the browser is closed, session disappears." In fact, imagine the example card, unless the customer to make sales on the store card, otherwise the store would not easily remove the customer information. This is also true of the session, unless the procedure to inform the server to delete a session, otherwise the server will remain on the program are generally done in the user log off when the send a command to delete the session. However, the browser will never take the initiative to notify the server will be shut off, so the server will not have the opportunity to know the browser has been the reason why there is such a misconception, the majority of session mechanism to use a session cookie to store the session id and close your browser the session id is gone, once again connect to the server will not be able to find when the original session. If the server cookie settings are saved to the hard disk, or use some means to rewrite the browser's HTTP request header sent to the original session id sent to the server, then re-open the browser can still find the original session.It is precisely because of the closure does not cause the browser session is deleted, forcing server seesion set up a failure time, as the distance between the first use of the client session for more than the failure time, the server that the client has ceased its activities, the session will be deleted to save storage space.5, javax.servlet.http.HttpSessionHttpSession session mechanism is the Java platform implementation of norms, because it isonly the interface, specific to each web application server providers, in addition to standard support, there will still be no requirement of some norms in the nuances. Here we are with BEA's Weblogic Server8.1 as an example to demonstrate.First of all, Weblogic Server provides a set of parameters to control its HttpSession implementation, including the use of cookie switch option to use URL rewriting switches, session persistence settings, session failure time setting, as well as for the cookie a variety of settings, such as set cookie name, path, domain, cookie survival time.In general, session are stored in memory, when the process is stopped, or restart the server when the memory of the session will also be empty, if you set the session persistence feature, the server will save the session to your hard drive When the server process restart or the information can be used again, Weblogic Server supports sustainable manner including documents, databases, client-side cookie preservation and reproduction.Strictly speaking not a persistent copy saved, because the session is actually stored in memory, but the same information is replicated to each server process within the cluster, so even if a server process to stop working and still available from other processes obtain session.cookie settings will affect the survival time of the browser generates a session cookie is a cookie. The default is to use a session cookie. Interested can use it to test us in the fourth quarter, as mentioned in the misunderstanding.cookie path for the web application is a very important option, Weblogic Server on the default handling of this option makes it significantly different from other servers. We will discuss the topic later.Settings on the session reference [5] /wls/docs70/webapp/weblogic_xml.html # 10368696, HttpSession Frequently Asked Questions (In this section the implications for the session mixed ⑤and ⑥)1, session is created whenA common misconception is that the session in a client visit, was created, but the fact is that until a server-side program called HttpServletRequest.getSession (true) when such a statement is created, note that if the JSP does not appear to use <% @ page session = "false"%> closed session, the JSP file will be automatically compiled into a Servlet when the inclusion of such a statement HttpSession session = HttpServletRequest.getSession (true); This is also implied in JSP session object origin.As the session will consume memory resources, so if you do not intend to use the session, all the JSP should be turned off it.2, session is deleted whenComprehensive discussions earlier, session is deleted in the following cases a. program calls HttpSession.invalidate (); or b. from the last time before the client sends the session id than the interval session timeout settings; or c. server process is stopped (non-persistent session)3, how to do delete the browser closed session。
毕业论文 外文翻译格式

毕业论文外文翻译格式毕业论文外文翻译格式在撰写毕业论文时,外文翻译是一个重要的环节。
无论是引用外文文献还是翻译相关内容,都需要遵循一定的格式和规范。
本文将介绍一些常见的外文翻译格式,并探讨其重要性和应用。
首先,对于引用外文文献的格式,最常见的是使用APA(American Psychological Association)格式。
这种格式要求在引用外文文献时,先列出作者的姓氏和名字的首字母,然后是出版年份、文章标题、期刊名称、卷号和页码。
例如:Smith, J. D. (2010). The impact of climate change on biodiversity. Environmental Science, 15(2), 145-156.在翻译外文文献时,需要注意保持原文的准确性和完整性。
尽量避免意译或添加自己的解释,以免歪曲原文的意思。
同时,还需要在翻译后的文献后面加上“译者”和“翻译日期”的信息,以便读者可以追溯翻译的来源和时间。
其次,对于翻译相关内容的格式,可以参考国际标准组织ISO(International Organization for Standardization)的格式。
这种格式要求在翻译相关内容时,先列出原文,然后是翻译后的文本。
例如:原文:The importance of effective communication in the workplace cannot be overstated.翻译:工作场所有效沟通的重要性不容忽视。
在翻译相关内容时,需要注意保持原文的意思和语气。
尽量使用准确的词汇和语法结构,以便读者能够理解和接受翻译后的内容。
同时,还需要在翻译后的文本后面加上“翻译者”和“翻译日期”的信息,以便读者可以追溯翻译的来源和时间。
此外,对于长篇外文文献的翻译,可以考虑将其分成若干章节,并在每个章节前面加上章节标题。
这样可以使读者更容易理解和阅读翻译后的内容。
【免费下载】 外文翻译-中英

外文翻译1.1 Earthquake BackgroundEarthquake is a high risk natural disaster which costs injuries and casualties as well as the damages to the infrastructures. It has an ability to deform the earth surfaces thus causing destructions to buildings on it1.2 Earthquake PhenomenonEarthquake happens when there is an earth crust movement due to folding crust. When the earthquake occurs, the soil and crust move randomly to directions. Earthquake happens actually numerous times in a day but the earthquake that affects the most and has great magnitude is seldom to occur, nevertheless once in several years.According to the tectonic plate theory, the earth surface is divided into several rigid crusts. They move in such ways, colliding or apart from each other. When the crusts collide, one of them will subdue under one another and the sliding crusts will generate energy. This movement will take years and peoples on it will never aware of this activity and it actually takes only several centimeters in a year. Each time the couple crusts move and slip with each other, it increase and accumulate the energy in the substances around it like rocks. Finally the energy itself will exceed the rock strength, thus make the rocks to move or explode. The exploding rocks will later cause the earthquake means once the earthquake occurs, the forces are subsided.The earthquake magnitude is measured in Richter Scale. A great earthquake is categorized as an earthquake with magnitude of 5.0 and above which surely causes damage to structures.The point where the earthquake origins is called focus or hypocenter which determined by seismic assessment. Earthquake starts with a small shaking followed by a sudden increase of shaking intensity. The small shake is called foreshock, while the great shaking is called mainshock and the rest is called aftershock. A great earthquake usually not done with only one shake, the shakings will remain to happen but there will only the magnitude is decreasing. The starting is called mainshock but the rest is called aftershock.1.3 Earthquake WavesThe earthquake is a result of an elastic waves. There are 3 types of earthquake waves. Two of them are moving within the rock, while another one moving through earth surface. The P-wave is the fastest wave among the three. It is corresponded as a motion of push and pull and can travel through solid rock or water of the ocean.The S-wave is slower than the P-wave. It shears the rock sideways to the travel direction. It can not travel through the water ocean. While the third wave is the Surface Wave. Surface wave is divided into two types of minor waves. The first is the Love Wave while the second is Rayleigh Wave. It is similar to the S-wave but with no vertical movement. It moves in horizontal plane with an angle to he travel direction. While the Rayleigh Wave is a wave that travels in both horizontal and vertical direction.1.4 Effects of EarthquakeEarthquake can cause properties damage and casualties as well as earth deformations and damaging structures that get in its way. Earthquakes that occur below sea level and have large vertical displacements can give rise to tsunamis, either as a direct result of the deformation of the sea bed due to the earthquake or as a result of submarine landslides directly or indirectly triggered by the quake (Bolt, 1978).Earthquake force is acting like a pull and push action resulting the building to receive random excitation. The excitation will transfer force from the foundation to the tip of the building. The sway of the building increases as the height increases. The top section of the building will experience the most swinging force rather than the bottom part1.5 Problem StatementIn an earthquake event, the most affected things will be the civil structure and buildings. The lost will cost millions in monies as well as casualties. In Malaysia, there are no such things that had been done to overcome the unexpected disaster. In the current building practice, no earthquake load factor taken into account into the design consideration. Earthquake impact, this study is imperative as a precaution and to prove how important an earthquake design code implemented in Malaysia’s building and civil structure practices.1.6 ObjectivesThe objectives of this study are:1. To study the design capacity of the bridge.2. To determine the bridge responses (deformation, shear and moment) under various intensity of earthquake.3. To identify the Damage Index of the bridge.4. To identify the most critical part of the bridge while transmitting earthquake loading.5. To model the bridge structure as close as possible to its actual state so that its behavior can be studied.6. To identify the safer structural design practice to be implemented in bridge structure, in the future.2.1 AnalysisThe evolution of seismic analyses in earthquake engineering has followed closely the developments in dynamic structural analysis as a whole. Numerous kind of research done by research team, academic institutes and distinguished researchers regarding to the earthquake induced structure. All the studies are concern toward finding the best solution to reduce the impact and damage to the structure.Malaysia is a region which free from the seismic activity and has been regarded as a stable area. But there are numbers of major faults have been recognized in thePeninsular.2.2 Concrete FailureConcrete failure always associated with the air and moisture factor. They can lead the concrete to deteriorate in problems like:i.Cracksii.Spalling and scaling of concrete due to expansion of steel rebar which transmits tension to concrete.iii.Abrasion of the steel rebar caused by concrete inadequacies surrounding the section and exposureto crack attack.iv.Inadequate concrete strength.2.3Natural Disaster ProblemThe unexpected natural disaster can cause the bridge structure to fail and collapse. The disaster can lead to problems like below (Kirillov et al., 1962):i.Settling of the soils surround the structure.ii.Slope failure.teral crack on superstructure’s surface.iv.Cracks of retaining wall and settlement of the support.Numerous actions can be taken to overcome this problem. There are four actions to be considered according to Parry, 1976. Those are:e more and bigger bolts to carry the load.ii.Increase the retaining wall strength.iii.Emplace shear or concrete blocks between the girder sections.iv.Increase concrete strength which located in the end of the bridge span.2.4 Analysis stepsThere are many techniques used in structural dynamic analysis. One of the essential parts to be focused in is the analysis and the design of the structure to withstand the ground acceleration from the earthquake.Non-linear analysis is used in this study. IDARC 2D is chosen as the non-linear dynamic program to be used to analyze dynamic characteristic of the structure when it failed. While the SAP2000 will analyze the bridge by Response Spectrum analysis, comparing its shear and moment under earthquake loading with the actual design capacity.In this study, the inelastic analysis is considering a bridge where an identified box girder bridge will be accounted and analyze with increasing intensity seismic accelerations, to the extent when the bridglastic characteristice shows the ine.2.5 Time History AnalysisThe Time History analysis will be carried out by the IDARC program analysis. Time History is a set of graphical data that shows the intensity of the earthquake and contains the acceleration, g of the earthquake event to the period of the event.2.6 IDARC 2D – A Program for Inelastic Structural Analysis.Developed at the State University of New York at Buffalo, IDARC was first introduced inservice for the traffic until now。
毕业论文外文翻译要求

毕业论文外文翻译要求
外国文献翻译是撰写毕业论文的重要环节之一,下面是一份要求700字的毕业论文外文翻译要求:
1. 翻译时间: 需在规定时间内完成翻译任务,以确保毕业论文
后续工作的顺利进行。
2. 原文准确性: 翻译必须准确无误,不得对原文进行任何删节、增补或变动。
3. 语言流畅度: 翻译应当具有良好的语言流畅度,不得过于生
硬或呆板。
4. 专业术语准确性: 翻译时要确保专业术语的准确性,避免词
义的混淆。
5. 语法错误及标点符号: 翻译应符合英文的语法规范,避免语
法错误和标点符号的错误使用。
6. 翻译风格: 翻译应当符合学术论文的要求,措辞恰当,语气
客观中立。
7. 格式要求: 翻译部分应与论文正文的格式一致,包括字体、
字号、行间距等。
8. 校对: 完成翻译后,需要进行一次仔细的校对工作,确保翻
译的正确性。
9. 原文附录: 翻译部分要同时附上原文,以便审查人员对翻译的准确性进行核对。
10. 翻译文档: 翻译文档要以电子文档的形式提交,确保方便审查人员查看。
以上要求旨在保证翻译的质量和准确性,对于撰写毕业论文非常重要。
翻译过程中,建议使用专业的翻译工具,如翻译记忆软件、专业词典等,以提高翻译的效率和准确性。
同时,积极与导师和专业领域的人进行交流和讨论,以解决翻译中的问题和困惑。
外文翻译模板

外文翻译模板在进行外文翻译时,我们需要注意一些重要的事项,以确保翻译质量和准确性。
以下是一些外文翻译模板,供大家参考和使用。
1. 翻译目的。
在进行外文翻译之前,我们需要明确翻译的目的。
是为了商务沟通,学术交流,还是其他用途?不同的翻译目的可能需要采用不同的翻译风格和用词选择。
2. 原文阅读。
在进行翻译之前,我们需要对原文进行充分的阅读和理解。
只有对原文有深入的理解,才能进行准确的翻译。
在阅读原文时,可以标记重要的词语和句子,以便后续的翻译工作。
3. 语言风格。
在进行外文翻译时,我们需要根据翻译的目的和受众选择合适的语言风格。
比如,商务文件的翻译可能需要正式的语言风格,而文学作品的翻译可能需要更具有文学感的语言风格。
4. 词语选择。
在翻译过程中,我们需要注意选择准确的词语。
有些词语在不同的语境中可能有不同的意思,我们需要根据上下文选择合适的译词,以确保翻译的准确性和流畅性。
5. 句子结构。
在翻译时,我们需要注意句子结构的调整。
有些语言的句子结构和语序可能与中文不同,我们需要根据中文的表达习惯调整句子结构,以使翻译更符合中文的表达习惯。
6. 校对修改。
在完成翻译之后,我们需要进行校对和修改工作。
这包括检查译文的准确性、流畅性和语言风格是否符合要求。
如果有条件,最好能请其他人进行审校,以确保翻译质量。
7. 文化差异。
在进行外文翻译时,我们需要注意文化差异带来的影响。
有些表达在不同的文化背景中可能有不同的含义,我们需要根据具体情况进行恰当的调整。
总结。
外文翻译是一项复杂的工作,需要我们对原文有深入的理解和准确的把握。
希望以上的外文翻译模板能够帮助大家更好地进行翻译工作,提高翻译质量和效率。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
南京理工大学泰州科技学院 毕业设计(论文)外文资料翻译
学院 (系): 计算机科学与技术系 专 业: 计算机科学与技术 姓 名: 蒋亦樟 学 号: 06040116 外文出处:IEEE TRANSACTIONS ON KNOWLEDGE AND
DATA ENGINEERING, VOL. 17, NO. 11, NOVEMBER 2005 附 件: 1.外文资料翻译译文;2.外文原文。
指导教师评语: 外文翻译资料选材与毕业设计课题紧密相关,译文正确,叙述流畅,表明该同学已经认真完成了外文资料翻译任务。
签名: 年 月 日 附件1:外文资料翻译译文 发现频繁的情节并学习隐性的马尔可夫模型:一个正规的链接 摘要 本篇文章主要是基于建立在两个正常的情节之间的一个正规的链接的基础上进行阐述的,在分析以前未链接的数据流的方式上:本文将在计算机科学的框架内对于频繁的情节进行挖掘并且统计出相关的数据从而生成模型。本文介绍了一个特殊的离散的隐马尔可夫模型,将其称作情节产生马尔可夫模型,并且将其他的情节与这独一无二的EGH结合起来进行实验。实验证明在给予的任意两个情节下,EGH最有可能产生一个情节的数据序列,这个实验所需要的序列是包含在这个情节下的不重叠的数据事件中的。然后通过一个有效的算法从而计算出这一系列的频繁的情节。通过大量的模拟实验,能够使得实验的结果显示出这种算法既有效又比当前的频繁情节的挖掘更加快速。当然这种在频繁情节和EGHS之间的结合已经被证明并且用来评估这种频繁情节,同时实验也证明了这个思想是可以用来提高频繁情节集挖掘的效率的。 检索关键词:时态数据挖掘,序列数据,频繁发作,隐马尔可夫模型,统计学意义。 1. 引言 数据集与时间依赖性经常被运用到商业,工程和科学的方案中。多年来,许多数据挖掘的分析都是基于这些数据的 [1],[2],[3],[4],[5],[6]。在这之后,进行的分析的方法一般大致可以分为两种:即模式识别和学习生成模型。 通过挖掘模型能够挖掘到一些有趣的或者是频繁出现的经常受到关注的时态数据 [1],[2],[5]。为获得频繁情节模式中的主要内容需通过寻求表达模式来完成,然而快速的挖掘算法对于数据挖掘技术来讲是既有效又有用的。这种模式挖掘一般是通过暂时的有序的事件序列的属性价值[1],[2],[6]或者是各种紧密结构的时间序列[7],[8],[9]来完成的。
学习生成模型是另一种重要的时间序列分析的方法。隐马尔可夫模型是由一系列丰富的类模式组成的,它的广泛应用主要依靠对于时间序列的描述。许多类似的马尔可夫模型已经在各种各样的领域中得到了应用 [3],[10],[11],[12],[13],[14]。 总体而言,模式识别技术往往被应用到更为有用的数据统计及挖掘规则当中。大多使用这种计数类型的参数,都被归纳为计算机科学的观点。另一方面,它将模型作为其技术的基础,使用随机方法构成统计框架。这些技术提供了一种原则性的方法来生成描述/建模的统计数据,从而管理产生的数据。对于数据挖而言,这两种方法都很重要,应该用来相互补充[15]。本文也是出于这种考虑进行描述的。 从而将建立两个模式之间的框架作为发现频繁情节的基础并与生成一类HMM模型进行连接。目前定义了一个指定的HMM模型以及对应的这一类特有的HMM的集合。实验证明了,任意的两个集合,都与频繁情节产生的HMM有关,并且其更有可能产生一些有效的数据,反之亦然。这使得实验能够严格地将频繁情节与HMM模型联系起来。据实验所知,以一个正式的连接为例,它将产生一些具有特殊意义的结果。例如,实验表明,它能为实验提供一种方法,并用它来测试那些经常发现的事件,在某种意义上来说,这是统计学的范畴。通过一个合理的频率的阈值设置,就能够获得使阈值自动计算的方法,从而得到需要挖掘的数据。 本篇文章的第二个贡献是对于一个频繁情节的集合,即新的频率进行测量。通过考虑一个不重叠出现的情节,从而获得此频繁情节的一系列相应的算法。正是这种新的频率计数的算法使得将正式连接中的频繁情节的发现与HMM的学习连接起来变成了可能。此外,它也大大加快了频繁情节的发现过程。实验通过一些仿真模拟也说明了这一切。 本文的其余部分安排如下。第2节对于在事件流中的频繁情节作了简要的概述。第3节着重讲了新的频率测量和计算的方法。第4节的主要贡献在于阐述如何实现情节和HMM模型之间的链接。第5节中,讨论了这一正式链接的结果。第6和第7的结论即为仿真实验的结果。 2. 在事件流中的频繁情节 这一章节简要的介绍了挖掘频繁情节的框架[1]。这些数据来源于一系列的事件<(E1,t1),(E2,t2),„>,其中Ei代表了时间类型并且其中ti表示第i个事件的发生时间为t。其中Ei的取值来源于一个有限的事件类型集合。例如,以下的一个事件顺序就包含了八个事件: <(A,1),(B,3),(D,4),(C,6),(E,12),(A,14),(B,15),(C,17)>。 这一情节是一个有序元组的事件类型。(在[1]中的类型相当于串行事件)例如,(A->B->C)是一个3个节点的情节。一个出现在事件序列中的情节,如果这些情节在 队列中的时间都有一个相同的时间顺序,就把它作为特殊的情节模式对待。在这个例子(1)中,这些事件{(A,1),(B,3),(C,6)}包含了这一情节的发生顺序(A->B->C),然而{(A,14),(B,3),(C,6)}并不能表示这一情节。 如果甲事件是一个子情节,那么它将与事件具有相同的顺序序列。例如,两个节点的(A->B),(A->C),以及(B->C)都是三个节点的(A->B->C)的子情节,而(B->A)并不是它的子情节。 对于出现频率很高的情节可以用多种方式来定义它。一个正确的频繁情节必须证明它的任何一个子情节至少在这个情节中频繁出现过。一个频繁的情节可以将其定义为是其频率超过用户指定阈值的情节,即超过阈值的情节即为频繁情节。在[1]中用来挖掘频繁情节的过程是与Apriori算法基于同一个原理基础的 [2]。这一方法能够说明如果N个节点的情节频繁出现,那么N-1个节点作为其N个节点的子情节必然是频繁的。同时用相同的方法来产生候选情节(通过数据挖掘算法来生成候选情节)并省略掉其中的一些细节。 计算这一事件集合的候选集的频率是计算频繁情节至关重要的一步。在[1]中,一些至少出现一次的情节被定义成一系列的窗口。最近,有研究人员[16]提出该窗口的宽度可以通过指定事件之间允许的最大时间间隔来自动调整。对于基于窗口计数的方法是不能立刻准确地对产生的频率(即那些情节发生的数量)有一个直观的感受的。另一种计算[1]中频繁情节的方法是基于最小发生时间的。在此窗口中的最小发生的情节,其中的子窗口包含了这个发生的情节。该方法在对[1]进行最小发生统计时并不是很有效率(与内存所需要的数据长度有关)。相比之下,由内存所需要的基于窗口的计数是唯一的n个有序节点的情节的方法。不过,通过仿真模拟显示要统计出[1]中出现的最小发生的情节通常需要迭代30至40次才可获得。 在下一节中,本文通过限制某些准确的已经被定义的情节的类型作为频繁情节的新的定义。此处提出的关于频繁情节的计数方法是基于窗口的并且具有相同的空间复杂度(事实上,需要少量的缓存),统计结果显示这种方法运行的非常快。 3. 频率计数 从直觉上来讲,一个情节的出现总次数可以被看作是它频繁出现的最大自然选择的次数。根据建议,在[1]中的情节发生的顺序可以使用有限状态自动机来表示。例如,对于这一事件(A->B->C)项,将事件类型为A的事件看作是自动机上的”A”状态,然后等待转移到事件类型B上,将B作为A的下一个状态,如此循环下去。 当这个自动机执行到最终状态时,就说明了这个情节成功的发生了一次。一个自动机中的一个情节对应的不同的事件需要追踪所有状态的转移概率,并因此计算出所有相关的发生次数。由于计算出所有的发生次数其效率并不高,并且它也不能证明其子情节的频度大于或者等于此情节出现的频度。 每个发生的情节都与在数据流中的事件集合相联系。两个发生的情节如果没有任何的事件相同则认为它们是截然不同的两个情节。在数据序列(1)中,只有两个不同的发生的情节(A->B->C),尽管发生的总数为4次。虽然一个情节的不同事件的发生次数可以看作是计算频率的一种方法,但是这种方法并不是很有效。考虑序列: <(A,1),(B,2),(A,3),(B,4),(A,7),(B,8),„>. (2) 在这种情况下,(原则上)自动机(A->B->C)中包含的事件的数目是需要的,并且它们都在第二个状态中等待,而C中的任何事件都有可能在随后出现。因此,需要通过发生次数的限制来进行控制。 定义1 第一个发生的最后一个事件较第二个发生的第一个事件要早,则称是情节的两个非重叠的发生。将事件流中非重叠发生的最大数定义成情节的频度。 在数据流(1)中,情节(A->B->C)最多有两个非重叠的发生:{(A,1),(B,3),(C,6)}和{(A,14),(B,15),(C,17)}。显然,非重叠的发生集是所有发生集的一个子集。在这个事件序列(1)中,考虑(A->B->C)的一次发生{(A,14),(B,15),(C,17)}。没有任何发生与此不重叠。然而,不考虑这个,而是考虑到上述其他发生,就可能获得两个不重叠的事件集。这就是为什么在定义中规定不重叠的发生的最大数作为频度。非重叠的发生可以有效地计算出来。例如,在数据流(2)中,我们需要追踪最后一对事件类型A和B,因为我们需要的都应该是非重叠的发生。 3.1 统计非重叠的发生的次数 本章节提出对每一个候选情节计算它的非重叠发生的最大数的算法。沿事件序列从左到右出发,在任何一个重叠发生集中,计算内联发生总是会产生一个情节的非重叠发生的最大集合。 给出了一个候选的情节C,其中算法I返回了一个频繁情节序列F。本算法是基于自动机的计数模式,这类似于基于窗口的思想。主要的数据结构都处在等待数列中。由于有很多候选情节,所以对每一个都有多次发生,在每个时间都可能有许多