Chapter 5-Finite-length Discrete TransformA

合集下载

(完整版)学术英语词汇AWL

(完整版)学术英语词汇AWL

AWL (Academic Word List)(英汉)abandon 放弃;抛弃abstract 抽象的;摘要academy 研究院;学院;access 接近;入口accommodate 容纳;给⋯提供住宿;使适应accompany 陪伴;伴随accumulate 积累accurate 准确的achieve 完成;取得acknowledge 承认;致谢acquire 获得adapt 使适应;改编adequate 足够的adjacent 毗连的adjust 调整administer 管理adult 成年人advocate 拥护者;拥护affect 影响aggregate 总的;总计aid 帮助albeit 虽然allocate 分派alter 改变alternative 替代物;替代的ambiguous 模棱两可的amend 修订analogy 类似;类推analyze 分析annual 每年的;年鉴anticipate 预料apparent 明显的append 附加appreciate 欣赏;感激approach 靠近;方法appropriate 恰当的approximate 近似的arbitrary 任意的;专断的area 面积;地区;领域aspect 方面assemble 集合;装配assess 估价;评价assign 分派assist 援助assume 假设;认为;承担assure 保证attach 贴;附加attain 达到;获得attitude 态度attribute 归结于;性质author 作者;创始人authority 当局;权威automate 使自动化available 可得到的aware 意识到的behalf 利益benefit 利益;津贴;有益bias 偏见bond 纽带;债券brief 简短的bulk 体积;大批capable 能够的;有能力的capacity 容量category 种类;范畴cease 停止challenge 挑战channel 海峡;频道chapter 章chart图表chemical 化学的;化学药品circumstance 情况cite 引用civil 公民的;国内的clarify 阐明classic 名著;经典的clause 条款;从句code 代码;法典coherent 连贯的coincide相符collapse 倒塌colleague 同事commence开始comment 评论commission 委任;委员会commit 犯commodity 日用品communicate 交流community 社区;界compatible 兼容的compensate 补偿compile编纂complement 补充complex 复杂的component组成部分compound 化合物;复合词comprehensive 综合的comprise 构成compute 计算conceive 构思;怀孕concentrate 浓缩;集中concept 概念conclude 下结论concurrent 同时的conduct 行为;指挥confer授予;协商confine 限制confirm 证实conflict 冲突conform 遵守;符合consent 同意consequent必然的considerable 相当大的consist 组成constant不断的constitute 构成constrain 限制;强制construct 建造consult 咨询;查阅;请教consume消费;消耗contact 接触;联系;联系人contemporary 当代的;同代人context 上下文;背景contract 合同;收缩contradict 矛盾contrary 相反的contrast 对比contribute 贡献;捐献;投稿controversy 争议convene 召集converse 相反convert 转化convince使信服cooperate 合作coordinate 协调core 核心corporate 公司的correspond 通信;对应couple 夫妇;两个create创造;产生credit 信用;学分;功劳encounter 遇到fund 资金criteria 标准energy 精力;能量fundamental 基本的crucial 决定性的enforce 实施furthermore 此外culture 文化enhance 增强gender 性别currency 货币enormous 巨大的;大量的generate 产生cycle 骑自行车;循环ensure 保证generation 一代;产生data 数据entity 实体globe 地球debate 辩论environment 环境goal 球门;目标decade 十年equate 使相等;使平等grade 等级;年级;成绩decline 下倾;下降;谢绝equip 装备grant 拨款;助学金deduce 演绎equivalent 对等guarantee 保证define 下定义;明确erode 腐蚀guideline 方针definite 明确的error 错误hence 因此demonstrate 表明;演示;establish 建立hierarchy 等级制度示威estate 房地产highlight 精华;加亮;强denote 表示estimate 估计调deny 否认ethic 伦理hypothesis 假设depress 使沮丧ethnic 种族的identical 相同的derive 起源evaluate 评价identify 识别design 设计;图案eventual 最后的ideology 思想体系despite 尽管evident 明显的ignorant 无知的detect 检测evolve 进化;演变illustrate 举例说明;图解deviate 偏离exceed 超过image 图像;形象device 装置exclude 排除immigrate 移民devote 奉献;为⋯献身exhibit 展览impact 影响differentiate 区分expand 扩大implement 工具;执行dimension 尺寸;维expert 专家;熟练的implicate 暗指diminish 减少explicit 明晰的;详述的implicit 暗指的discrete 分离的exploit 剥削;利用imply 暗指discriminate 区别;歧视export 出口impose 征收;强加displace 移置expose 暴露;揭露incentive 刺激display 展览;显示external 外部的incidence 发生dispose 处理extract 取出;摘录incline 斜坡;使倾斜;使distinct 清晰的;独特的facilitate 使容易倾向distort 歪曲factor 因素income 收入distribute 分布feature 特征incorporate 包含diverse 多样的federal 联邦的index 索引;指标document 文件fee 费indicate 表明domain 领域;域file 文件individual 个人domestic 国内的;家庭的final 最后的induce 引起dominate 支配finance 财政inevitable 必然的draft 草稿;通风;起草finite 有限的infer 推断drama 戏剧flexible 灵活的infrastructure 基础设施duration 持续时间fluctuate 波动inherent 固有的dynamic 有活力的focus 集中;焦点inhibit 抑制economy 经济;节约format 格式initial 最初的;词首的;edit 编辑formula 公式首字母element 元素forthcoming 即将到来的initiate 开始eliminate 消除found 建立injure 使受伤emerge 出现foundation 建立;基础;innovate 创新emphasis 强调基金会input 输入empirical 经验的framework 框架insert 插入;插页enable 使能够function 功能;函数insight 见识inspect 视察instance 例子institute 研究所;学院instruct 教;指示integral 整体的;整的integrate 使结合integrity 诚信;完整intelligent 聪明的intense 强烈的interact 相互作用intermediate 中间的;中级的internal 内部的interpret 解释;口译interval 间隔intervene 干预intrinsic 内在的invest 投资investigate 调查invoke 恳求involve 涉及isolate 孤立issue 问题;发行item 项目job 工作journal 杂志;日记justify 证明label 标签labor 劳动layer 层lecture 讲课;讲座legal 合法的;法律的legislate 立法levy 征收liberal 自由的;开明的license 执照likewise 同样地link 连接;环节locate 使位于;找到logic 逻辑maintain 维持;维修major 主要的;专业manipulate 操作manual 体力的;手册margin 页边mature 成熟maximize 使最大化mechanism 装置;机制media 媒体mediate 调停medical 医学的medium 媒介;中等的mental 心理的method 方法migrate 迁移military 军事的minimal 最小的minimize 使最小化minimum 最小值ministry 部minor 次要的;辅修专业mode 模式modify 修改;修饰monitor 监视motive 动机mutual 相互的negate 否定network 网络neutral 中立的nevertheless 然而nonetheless 然而norm 标准normal 正常的notion概念;想法notwithstanding 虽然nuclear 核的;核心的objective 客观的;目标obtain 获得obvious 明显的occupy 占领;使忙碌occur 出现odd 奇数的;奇怪的;临时的offset 抵消ongoing 进行中的option 选择orient 东方;使适应outcome 结果output 产量;产出overall 总体的overlap 重叠overseas 海外panel 专家小组;面板paradigm 范例paragraph 段落parallel 平行的parameter 参数participate 参加partner 搭档passive 被动的perceive 察觉;理解percent 百分之period 时期;句号persist 持续perspective 角度phase 阶段phenomenon 现象philosophy 哲学physical 身体的;物理的plus 加policy 政策portion 部分pose 摆姿势positive 积极的;阳性的potential 潜在的;潜力practitioner 从业者precede 先于precise 精确的predict 预测predominant 主要的preliminary 初步的;初赛presume 假设previous 先前的primary 初级的;主要的prime 首要的principal 主要的;校长principle 原则prior 在先的priority 优先;重点proceed 进行process 过程;加工professional 专业的;专业人员prohibit 禁止project 工程promote 促进;促销proportion 比例prospect 前景protocol 协议;礼仪psychology 心理学publication 出版;出版物publish 出版purchase 购买pursue 追赶;追求qualitative 定性的quote 引用radical 基本的;激进的random 随机的range 范围;山脉ratio 比rational 理性的react 反应recover 恢复refine 提炼regime 政权region 地区register 登记;挂号regulate 调节reinforce 加强reject 拒绝site 地点terminate 终止relax 放松so-called 所谓的text 文本release 释放sole 唯一的;脚底;鞋底theme 主题relevant 有关的somewhat 有点theory 理论reluctance 勉强source 来源thereby 从而rely 依赖specific 具体的thesis 论文remove 移走specify 详述topic 话题require 要求sphere 球体;领域trace 痕迹research 研究stable 稳定的;马厩tradition 传统reside 居住statistic 统计的transfer 转移;换车resolve 解决;决心status 地位transform 转变resource 资源straightforward 坦率的transit 运输;过渡respond 响应strategy 战略;策略transmit 输送restore 恢复stress 压力;重音;强调transport 运输restrain 抑制structure 结构trend 趋势restrict 限制style 风格trigger 触发;扳机retain 保留submit 使屈服;提交ultimate 最终的reveal 显示subordinate 下级的;从属undergo 经受revenue 收入;税收的underlie 是⋯的基础reverse 背面;倒车subsequent 随后的undertake 从事revise 修改subsidy 补助uniform 一致的;制服revolution 革命;旋转substitute 代替者;代替unify 统一rigid 僵硬的:刻板的successor 继任unique 独一无二的role 角色sufficient 足够的utilize 利用route 路线sum 金额valid 有效的scenario 剧本;方案summary 总结vary 变化schedule 时间表supplement 补充vehicle 车辆scheme 方案survey 调查version 译文;版本scope 范围survive 幸存via 经过section 部分suspend 暂停violate 违犯sector 部门sustain 维持virtual 实际上的;虚拟的secure 安全的symbol 象征;符号visible 可见的seek 试图;寻找tape 磁带vision 视力select 选择target 靶子;目标visual 视觉的sequence 顺序task 任务volume 卷;音量;体积series 系列team 队voluntary 自愿的;志愿sex 性;性别technical 技术的welfare 福利shift 转换technique 技巧whereas 而significant 重要的technology 技术whereby 由此similar 相似的temporary 暂时的widespread 普遍的simulate 模拟tense 紧张的;时态AWL 词汇(汉英)安全的secure 暗指implicate 暗指imply 暗指的implicit 靶子target 百分之percent 摆姿势pose 扳机trigger 版本version 伴随accompany 帮助aid 包含incorporate 保留retain 保证assure 保证ensure 保证guarantee 暴露expose 背景context 背面reverse 被动的passive 比ratio 比例proportion 必然的consequent 必然的inevitable 编辑edit 编纂compile 变化vary 辩论debate 标签label 标准criteria 标准norm 表明demonstrate 表明indicate 表示denote 拨款grant 波动fluctuate 剥削exploit 补偿compensate 补充complement 补充supplement 补助subsidy 不断的constant 部ministry 部分portion 部分section 部门sector 财政finance 参加participate 参数parameter 操作manipulate 草稿draft 策略strategy 层layer 插入insert 插页insert 查阅consult 察觉perceive 产出output 产量output 产生create 产生generate 产生generation 阐明clarify 超过exceed车辆vehicle 成绩grade 成年人adult成熟mature 诚信integrity 承担assume 承认acknowledge 持续persist 持续时间duration 尺寸dimension 冲突conflict 抽象的abstract 出版publication 出版publish 出版物publication 出口export 出现emerge出现occur 初步的preliminary 初级的primary 初赛preliminary 处理dispose 触发trigger 传统tradition 创始人author 创新innovate 创造create 词首的initial磁带tape 此外furthermore 次要的minor 刺激incentive 聪明的intelligent 从而thereby 从句clause 从事undertake 从属的subordinate 从业者practitioner 促进promote 促销promote 错误error搭档partner 达到attain 大量的enormous 大批bulk 代码code 代替substitute 代替者substitute 当代的contemporary 当局authority 倒车reverse 倒塌collapse 登记register 等级grade等级制度hierarchy 抵消offset 地点site 地球globe 地区area地区region 地位status 定性的qualitative 东方orient动机motive 独特的distinct 独一无二的unique 段落paragraph 队team 对比contrast 对等equivalent 对应correspond 多样的diverse 而whereas 发行issue 发生incidence 法典code法律的legal 反应react 犯commit 范畴category 范例paradigm 范围range范围scope估计estimate 估价assess 孤立isolate 固有的inherent 挂号register 管理administer 归结于attribute 国内的civil 国内的domestic 过程process 过渡transit 海外overseas 海峡channel 函数function 行为conduct 合法的legal 合同contract 合作cooperate 核的nuclear 核心core 核心的nuclear 痕迹trace 化合物compound 化学的chemical 化学药品chemical 话题topic 怀孕conceive 环节link 环境environment 换车transfer 恢复recover 恢复restore 货币currency 获得acquire 获得attain 获得obtain 机制mechanism 积极的positive 积累accumulate 基本的fundamental 基本的radical 基础foundation 基础设施infrastructure 基金会foundation 激进的radical 即将到来的forthcoming 集合assemble 集中concentrate 集中focus 计算compute 技巧technique 技术technology 技术的technical 继任successor 加plus 加工process 加亮highlight 加强reinforce 家庭的domestic 假设assume 假设hypothesis 假设presume 间隔interval 监视monitor 兼容的compatible 检测detect 减少diminish 简短的brief 见识insight 建立establish 建立found 建立foundation 建造construct 僵硬的:刻板的rigid 讲课lecture 讲座lecture 交流communicate 焦点focus 角度perspective 角色role 脚底sole 教instruct 阶段phase 接触contact 接近access 揭露expose 节约economy 结构structure 结果outcome 解决resolve 解释interpret 界community 金额sum 津贴benefit 紧张的tense 尽管despite 进行proceed 进行中的ongoing 进化evolve 近似的approximate 禁止prohibit 经典的classic 经过via 经济economy 经受undergo 经验的empirical方案scenario 方案scheme 方法approach 方法method 方面aspect 方针guideline 房地产estate 放弃abandon 放松relax 费fee 分布distribute 分离的discrete 分派allocate 分派assign 分析analyze 风格style 奉献devote 否定negate 否认deny 夫妇couple 符号symbol 符合conform 福利welfare 辅修专业minor 腐蚀erode 附加append 附加attach 复合词compound 复杂的complex 改编adapt 改变alter 概念concept 概念notion 感激appreciate 干预intervene 革命revolution 格式format 个人individual 给⋯提供住宿accommodate 工程project 工具implement 工作job 公民的civil 公式formula 公司的corporate 功劳credit 功能function 贡献contribute 构成comprise 构成constitute 构思conceive 购买purchase精华highlight 论文thesis 潜在的potential精力energy 逻辑logic 强加impose精确的precise 马厩stable 强烈的intense居住reside 矛盾contradict 强调emphasis举例说明illustrate 媒介medium 强调highlight巨大的enormous 媒体media 强调stress句号period 每年的annual 强制constrain拒绝reject 勉强reluctance 清晰的distinct具体的specific 面板panel 情况circumstance剧本scenario 面积area 请教consult捐献contribute 名著classic 球门goal卷volume 明确define 球体sphere决定性的crucial 明确的definite 区别discriminate决心resolve 明晰的explicit 区分differentiate军事的military 明显的apparent 趋势trend开明的liberal 明显的evident 取出extract开始commence 明显的obvious 取得achieve开始initiate 模棱两可的ambiguous 权威authority靠近approach 模拟simulate 然而nevertheless可得到的available 模式mode 然而nonetheless可见的visible 目标goal 认为assume客观的objective 目标objective 任务task恳求invoke 目标target 任意的arbitrary口译interpret 内部的internal 日记journal框架framework 内在的intrinsic 日用品commodity扩大expand 能够的capable 容量capacity来源source 能量energy 容纳accommodate 劳动labor 年级grade 入口access类似analogy 年鉴annual 山脉range类推analogy 纽带bond 上下文context礼仪protocol 浓缩concentrate 设计design理解perceive 排除exclude 社区community理论theory 抛弃abandon 涉及involve理性的rational 陪伴accompany 身体的physical立法legislate 毗连的adjacent 十年decade利益behalf 偏见bias 时间表schedule利益benefit 偏离deviate 时期period利用exploit 频道channel 时态tense利用utilize 平行的parallel 识别identify例子instance 评价assess 实际上的virtual连贯的coherent 评价evaluate 实施enforce连接link 评论comment 实体entity联邦的federal 普遍的widespread 使结合integrate联系contact 奇怪的odd 使沮丧depress联系人contact 奇数的odd 使忙碌occupy两个couple 歧视discriminate 使能够enable临时的odd 骑自行车cycle 使平等equate灵活的flexible 起草draft 使倾向incline领域area 起源derive 使倾斜incline领域domain 恰当的appropriate 使屈服submit领域sphere 迁移migrate 使容易facilitate路线route 前景prospect 使适应accommodate 伦理ethic 潜力potential 使适应adapt使适应orient 使受伤injure 使位于locate 使相等equate 使信服convince 使自动化automate 使最大化maximize 使最小化minimize 示威demonstrate 试图seek 视察inspect 视觉的visual 视力vision 是⋯的基础underlie 释放release 收入income 收入revenue 收缩contract 手册manual 首要的prime 首字母initial 授予confer 输入input 输送transmit 熟练的expert 数据data 税收revenue 顺序sequence 思想体系ideology 虽然albeit 虽然notwithstanding 随后的subsequent 随机的random 所谓的so-called 索引index 态度attitude 坦率的straightforward 特征feature 提交submit 提炼refine 体积bulk 体积volume 体力的manual 替代的alternative 替代物alternative 挑战challenge 条款clause 调查investigate 调查survey 调节regulate 调停mediate 调整adjust 贴attach 停止cease 通风draft 通信correspond 同代人contemporary 同时的concurrent 同事colleague 同样地likewise 同意consent 统计的statistic 统一unify 投稿contribute 投资invest 图案design 图表chart 图解illustrate 图像image 推断infer 歪曲distort 外部的external 完成achieve 完整integrity 网络network 为⋯献身devote 违犯violate 唯一的sole 维dimension维持maintain 维持sustain 维修maintain委任commission 委员会commission 文本text 文化culture 文件document 文件file 稳定的stable 问题issue无知的ignorant 物理的physical 戏剧drama 系列series 下定义define下级的subordinate 下降decline 下结论conclude 下倾decline先前的previous 先于precede 显示display显示reveal 现象phenomenon 限制confine 限制constrain限制restrict 相当大的considerable 相反converse 相反的contrary 相符coincide相互的mutual 相互作用interact 相似的similar 相同的identical详述specify 详述的explicit 响应respond 想法notion 项目item 象征symbol 消除eliminate 消费consume 消耗consume 校长principal协商confer 协调coordinate 协议protocol 斜坡incline 鞋底sole 谢绝decline 心理的mental 心理学psychology 欣赏appreciate 信用credit形象image 幸存survive 性sex 性别gender 性别sex 性质attribute 修订amend 修改modify 修改revise修饰modify 虚拟的virtual 旋转revolution选择option 选择select学分credit 学会academy 学院academy 学院institute寻找seek 循环cycle压力stress 研究research 研究所institute 研究院academy主要的 major 主要的predominant 主要的 primary 主要的principal 助学金 grant 专断的 arbitrary 专家 expert 专家小组 panel 专业 major 专业的 professional 专业人员 professional 转变transform 转化 convert 转换 shift 转移 transfer 装备 equip 装配assemble 装置 device 装置 mechanism 追赶 pursue 追求 pursue 准确的 accurate 咨询 consult 资金 fund 资源 resource 自由的 liberal 自愿的 voluntary 综合的 comprehensive 总的 aggregate 总计 aggregate 总结 summary 总体的 overall 足够的 adequate 足够的 sufficient 组成 consist 组成部分 component 最初的 initial 最后的 eventual 最后的 final 最小的 minimal 最小值 minimum 最终的ultimate 遵守 conform 作者 author演变 evolve 演示 demonstrate 演绎 deduce 阳性的 positive 要求require 页边 margin 一代 generation 一致的 uniform 医学的 medical 依赖 rely 移民 immigrate 移置 displace 移走 remove 抑制 inhibit 抑制 restrain 译文 version 意识到的 aware 因此 hence 因素 factor 音量 volume 引起 induce 引用 cite 引用 quote 影响 affect 影响 impact 拥护 advocate 拥护者 advocate 优先 priority 由此 whereby 有点 somewhat 有关的 relevant 有活力的 dynamic 有能力的 capable 有限的 finite 有效的 valid 有益 benefit 预测 predict 预料 anticipate 域 domain 遇到 encounter 元素 element 原则 principle 援助 assist 运输 transit 运输 transport 杂志journal暂停 suspend 增强 enhance 摘录 extract 摘要 abstract 债券 bond 展览 display 展览 exhibit 占领 occupy 战略 strategy 章 chapter 找到 locate 召集 convene 哲学 philosophy 争议 controversy 征收 impose 征收 levy 整的 integral 整体的 integral 正常的 normal 证明 justify 证实 confirm 政策 policy 政权 regime 支配 dominate 执行 implement 执照 license 指标 index 指挥 conduct 指示 instruct志愿的 voluntary 制服 uniform致谢 acknowledge 中等的 medium 中级的 intermediate 中间的 intermediate 中立的 neutral 终止 terminate 种类 category 种族的 ethnic 重点 priority 重叠 overlap重要的 significant 重音 stress 主题 theme在先的 prior 暂时的 temporary。

石油地质学常用专业英语词汇

石油地质学常用专业英语词汇

Aabbreviate v. 缩写,简写abnormally ad. 异常地abrupt v. 突然的absolute porosity 绝对孔隙度access n. 接近,进入accumulate v. 聚集accumulation n. 聚集acquisition n. 获取,采集acromagnetic a. 航空磁测的acyclic a. 无环的admixture n. 混合,混合物aeolian a. 风成的,风积的aerobic a. 喜氧的affinity n. 亲合力,亲合性aformentioned a. 上述的,上面提到的agency n. 因素,营力,作用agglomeration n. 结块,凝聚aggregated gas 聚集型气agitated a. 搅动过,摇过的agitation n. 搅拌,搅动aircraft n. 飞机,航空器algae 藻类aliphatic a. 脂肪类的alkane 链烷alkane n. 烷烃,链烷alkene n. 烯烃alkylaromatic a. 烷基芳烃的alkylate v. 烷基化allochthonous a. 外来的,异地的alluvial fan 冲积扇alteration n. 蚀变作用ambient a. 周围的ambiguity n. 含糊,模棱两可ambiguous a. 意思含糊的,模棱两可的amino acids 氨基酸ammonite n. 菊石amorphous a. 非晶质的,无一定方向的amphibolite n. 角闪石amplitude n. 幅度,振幅analogous a. 类似的,模拟的angular a. 棱角状的,带角的anhydrite n. 硬石膏anomoly n. 异常,变异anoxic a. 缺氧的anteisoalkane n. 反异构烷烃anthracite n. 无烟煤anticline n. 背斜antiform n. 背斜构造aperture n.孔,孔眼apparent molecular weight 表观分子量aquatic a. 水的,水生的aragonite n.霰石area of trap 圈闭面积arene n. 芳香烃argon n. 氩arid a. 干旱的aromatic asphaltic oils 芳香沥青型原油aromatic hydrocarbon芳香烃aromatic intermediate oils 芳香中间型原油aromatic naphthenic oils 芳香环烷型原油aromatics n. 芳香烃arsenic 砷, 砒霜asphalt n. 沥青,地沥青asphaltene n. 沥青质,沥青烯asphaltenes 沥青质asphaltic a. 沥青的asphaltoid a. 沥青类的assess v. 估价,评估associated gas 伴生气association n. 联合,组合asthenosphere n. 软流圈(层)asymmetry n. 不对称at the expense of 以…为代价atectonic a. 非构造的attenuation n. 变细(薄)attribute (to) v. 把…归因于aulacogn n. 拗拉槽(谷),断陷槽autochthonous a. 原地的axiomatic a. 自明的Bbacteria (pl.) n. 细菌bacterium (sing.) n. 细菌bafflestone n. 生物堆置灰岩,障积岩baling n. 打包,填料barrier n. 堡坝,海岸沙坝,障壁base n. 基础,…基be referred to as 被称为behaviour n. 习性,动态benthic a. 海底的,水底的bentonite n. 膨润土,斑脱岩benzene n. 苯benzothiophene n. 苯硫茂benzphenanthrene n. 苯并菲benzpyrene n. 苯并芘bicarbonates 重碳酸盐(HCO3 —)bidirectional a. 双向(作用)的bifurcation n. 分叉,支流bimodality n. 双峰,双向bindstone n. 粘结灰岩,生物包粘灰岩biochemical degradation 生物化学降解biochemical rock 生物化学岩biodegradation n. 生物降解(作用) biofacies n. 生物相biogenic a. 生物成因的biological markers 生物标志物biomarker n. 生物标志化合物biomass n. 生物体,生物量biomodic a. 生物模的biopolymer n. 生物聚合物biosphere n. 生物圈biostrome n. 生物层bioturbation n. 生物扰动作用bitumen n. 沥青bituminous a. 沥青的blend v. 调合,合成bluntly ad. 直截了当地,坦率地boghead n. 藻煤bond n. 结合,化学键borehole n. 钻孔bottom water 底水bottomset n. 底积层bounce v. 弹回,反跳breccia n. 角砾岩brine n. 卤水,盐水bryozoa n. 苔藓动物门bubble point curve泡点线bubble-point 泡点buckle v. 弯折,挠曲buoyancy n. 浮力buoyant force 浮力burrow n. 洞,窟,潜穴butane 丁烷 C4H10Ccalcarenite n. 钙屑灰岩,灰屑岩calcilutite n. 泥屑灰岩,钙质泥岩calcite n. 方解石calcium n. 钙(Ca)Caledonian orogeny 加里东造山运动calorific value 热值cancellation n. 消除,抹去cannel n. 烛煤cap rock/roof rock 盖层capillary n. & a. 毛细作用的capillary pressure毛细管力carbazole n. 氮芴,咔唑carbohydrates 碳水化合物carbonates n. 碳酸盐(类)Carboniferous n. & a. 石炭纪(的),石炭系(的)carboxylic a. 羧基的carcinogen n. 致癌物,诱癌剂catagenesis n. 深成作用阶段catagenesis 深成作用catalyst n. 催化剂cavity n. 洞穴cell n. 水室,池,细胞cement v. & n. 胶结(物)cementation n. 胶结作用charcoal-broiled 木炭烧烤过的chert n. 燧石,角岩chlorides 氯化物chlorophyll n. 叶绿素chromium铬chronostratigraphy n. 年代地层学clastic rock碎屑岩clayey a. 粘土质的cleavage n. 解理,裂开clogging n. & a. 堵塞(的),阻碍(的)coagulation n. 凝结(聚)作用coal bed gas 煤层气cobalt 钴cohesion n. 凝聚力,粘性cohesive a. 粘合的coincide (with) v. 与…符合,与…一致collar n. 围环colloidal a. 胶体的combination traps 复合圈闭come into being 形成,产生compaction n. 致密,压实compaction压实compatible a. 共存的,一致的competence n. 起动能力compile v. 编辑,汇编complexity n. 复杂性,组成compressibility n. 可压缩性,压缩性compressibility factor 压缩因子concave a. 凹的,凹面的concentration浓度concordant a. 与…一致的,整合的concurrently ad. 同时condensate oil n. 凝析油condensed gas 凝析气configuration n. 构型,轮廓conflict n. 冲突,抵触conglomerate n. 砾岩connected pores 连通孔隙consolidated固结conspicuous a. 明显的constriction n. 压缩,收缩constructional a. 堆积的,建设的contact n. 接触(带)contaminant 杂质contorted a. 扭曲的,弯曲的contour n. 等值(高)线contraction n. 收缩contrary to 与…相反contributor n. 捐助者,贡献者convergence n. 会聚,收敛,(地层)交汇converging a. 会聚的,聚敛的copper 铜coral n. 珊瑚cores 岩芯correlate v. 相互关联,对比correlation n. (油源)对比,相互(关系)counteract v. 抵消,阻碍counterpart n. 对应物covalent a. 共价的crack n. 裂隙,裂解craton n. 克拉通,稳定地块crescentic a. 新月形的crest n. 顶部,山脊Cretaceous n. & a. 白垩纪(的),白垩系(的)crevasse n. 裂隙,冰隙criteria (pl.) n. 标准criterion (sing.) n.标准critical a. 临界的,关键的critical point 临界点critical pressure临界压力critical temperature临界温度crude oil 原油crystalline compounds 晶体化合物cucumber n. 黄瓜culmination n. 顶点,褶皱区curvature n. 曲率,曲度customary a. 通常的,习惯的cuttings 岩屑cycloalkane n. 环烷烃cycloalkanes 环烷cycloalkylaromatic a. 环烷基芳烃的cycloheptane n. 环庚烷cyclohexane n. 环己烷cycloparaffin n. 环烷烃cyclopentane n. 环戊烷cyclopentane环戊烷cylinder n. 圆柱体cymene n. 异丙基苯Ddeasphalting脱沥青作用debouch n. 河口,流出debris n. 碎屑,岩屑deceleration n. 减速度decentralized gas 分散型气deep troughs 深海槽defy v. 不让,使不能degradation n. 降解,退化degree of mineralization矿化度dehydration n. 脱水,失水delincation n. 定界,划界delta-front 三角洲前缘demarcation n. 划界,定界dense oil 稠油density n. 密度deplete v. 耗尽,亏损,枯竭depocenter n. 沉积中心derivation n. 起源despositional a. 沉积的destructional a. 侵蚀的,破坏性的deterioration n. 退化,变质,恶化detrital a. 碎屑的deviatoric a. 偏差的Devonian n. & a. 泥盆纪(的),泥盆系(的)dew point curve露点线diagenesis 成岩作用diagenetic a. 成岩(作用)的diagnostic a. 特征的,有鉴定意义的diapiric a. 底辟的diaprism n. 底辟作用diaproportionation n. 不均,歧化作用diastrophic a. 地壳运动的diastrophism n. 地壳作用differential entrapment 差异聚集diffuse v. 扩散,漫射Dijon 第戌(法国城市)dilute v. 稀释,冲淡dip n. 倾斜,倾向,倾角discernible a. 可辨别的,看得清的discharge n. 流量,排泄,释放discrepancy n. 差异,偏差discrete a. 不连续的,离散的,个别的disintegration n. 衰变,蜕变,崩解dislocation n. 错位,位移,断错disperse v. 散布,分布disposal n. 处理,配置disseminate v. 散布,侵染dissipation n. 损耗,散逸distal a. 远端的,末端的distillate n. 馏分,馏分物distillation蒸馏作用distributary n. 分流,支流divergence n. 离散,发散diverse a. 不同的,多种多样的dolomite n. 白云岩,白云石dolomitisation n. 白云岩化downflex v. 向下弯曲,向下挠曲downthrow n. & v. 下降盘,下降断层;下落downwarp n. 下拗,拗陷drape n. 披盖,盖层drill cuttings 岩屑drilling mud钻井泥浆drive v. & n. 驱动,开动,推进ductile a. 延性的,塑性的Eechinoderm n. 棘皮类动物,棘皮动物echinoid a. 海胆形的,海胆属的echo sounder 回声探测仪edge water 边水effective permeability有效渗透率effective porosity有效孔隙度effluent n. 侧流elegant a. 优雅的,精致的elevated a. 上升的eliminate v. 消除,消去,排除elimination n. 消除,消去elliptical a. 椭圆的elongate a. 延伸的,细长的elucidation n. 阐明,解释embed v. 埋入,夹在层间,嵌入embryo n. & a. 胚胎,胚胎的,雏形的enclosure n. 包裹体,包体encompassing a. 包罗万象的encounter v. 遇到encrusting a. 结壳的,包壳的engulf v. 吞没,湮没entrap v. 俘获,捕集enzyme n. 酶Eocene n. & a. 始新世(的),始新统(的)episode n. 幕,期equatorial a. 赤道的equilibrium n. 平衡,均衡erosion v. 侵蚀erratic a. 不规则的ester n. 脂estuary n. 河口,江湾,三角港,潮区ethane n. 乙烷eustatic a. 海面升降(变化)的,全球性的evaluate v. 估计,评价,测定evaluation n. 估计,评价,测定evaporate n. 蒸发盐(岩)类evaporate rock蒸发岩exosolution n. 析出,逸出expansibility n. 膨胀性,延伸性exponential a. 指数的expulsion n. 排出,驱动extrapolate v. 推断,外推Exxon 埃克森(石油公司)Ffabric n. 组构facet n. 刻面,磨蚀面facies n. 相,岩相,期fatty acids 脂肪酸fauna (sing.) n. 动物群faunae (pl.) n. 动物群fecal a. 粪便的fenestra (sing.) n. 窗孔,膜孔fenestral a. 窗格状的,小孔的filtrate n. 渗流,滤液finite a. 有限的flank n. 翼,侧flexural a. 弯曲的flora (sing.) n. 植物群florae (pl.) n. 植物群fluid traps 流体圈闭fluorescence荧光性fluvial a. 河流的foraminifera n. 有孔虫目foredeep n. 前渊,外地槽foreland n. 前陆,山前地带foreset n. 前积层formulate v. 把…化为公式fracture裂缝fragile a. 易碎的,碎的fragmental reservoir rocks 碎屑岩储集岩fragmental rock碎屑岩fragrant a. 芬芳的,香的framestone n. 骨架岩framework n. 结构,格架,骨架friable a. 易碎的,脆性的friction n. 摩擦function groups 官能团fungi (pl.) n. 真菌fungi 菌类fungus (sing.) n. 真菌futile a. 无用的,无效的Ggas chromatography (Ge) 气相色谱法gas hydrates 气水合物gaseous a. 气体的gastropod n. 腹足纲软体动物generation生成geopolymer n. 地质(有机)聚合物geosynclinal zones 地槽带globule n. 小球,球粒gouge n. 断层泥graben n. 地堑gradational a. 渐变的,逐渐过渡的grapestone n. 葡萄石graphite n. 石墨greenschist n. 绿片岩greywacke n. 杂砂岩,硬砂岩,灰瓦克groove n. 沟,槽沟guarantee n. & v. 保证guesswork n. 推测gypsum n. 石膏HHalimeda n. 仙掌藻属halite n. 石盐halite/rock salt 岩盐heave n. 平错height of gas column 气柱高度height of oil column 油柱高度height of traps/closure闭合高度helium n. 氦(He)hemin血红素heteroatomic a. 杂原子的heteroatoms NSO 杂原子heterochronous a. 异时的heterogeneous a. 异质的,非均质的high sulfur crude oil 高硫原油hinge belt 枢纽带,捩转带hinterland n. 后陆,腹地homogenize v. 使…均匀homologous a. 同源的,同系(物)的homologous 同系物homopycnal a. 等密度的horst n. 地垒humic a. 腐植的hummocky a. 丘状起伏的humus n. 腐植质hydraulic a. 水力的,液压的hydrocarbon n. 烃,碳氢化合物hydrostatic a. 静水压力的hypogene a. 深成的,上升的hypopycnal a. 低密度的Ii-alkanes 异构链烷igneous rock火成岩imbrication n. 叠瓦构造impair v. 削弱,减少impart v. 给予,传递impedance n. 阻抗impervious a. 不透水的,不渗透的impervious rock非渗透性岩石impinge (on) v. 冲击,碰撞in bulk 大量in conjunction with 和…一起,连同…一起in response to 响应,随…而,根据in situ 原地,原点,原生incidence n. 发生,入射,倾角incite v. 刺激,鼓励incorporate v. 合并,混合incremental a. 渐进的,递增的index (sing.) n. 指数,索引indices (pl.) n. 指数,索引indole n. 氮茚,吲哚induce v. 导致,引起induration n. 固结,硬化inert a.惰性的,不活泼的inertia n. 惰性,惯性infancy n. 幼年期infauna n. 海底动物infiltration water 渗入水inflection n. 弯曲,曲折influx n. 流入量ingest v. 摄取,吸收inherit v. 继承,遗传initiate v. 开始,发动inorganic origin无机成因intact a. 完整的,未受损的intercrystalline a. 晶间的interdeep n. 山间拗陷interfacial a. 界面的,面间的intergranular a. 粒间的intermediary waters 夹层水intermittent a. 间歇的,间断的intermontane a. 山间的interregional a. 区际的,跨区域的intersect v. 横切,交叉intersection n. 横切,交叉interstice n. 空隙,间隙interstitial a. 空隙的,间隙的,填隙的intimately ad. 密切地,直接地intraparticle a. 粒内的intrusion n. 侵入,侵入体invalidate v. 使无效,使作废inversion n. 倒转,转换invoke v. 援引,引用inwards ad. 向内,向里irreversible a. 单向的,不可逆的isomer n. (同分)异构体isomeric alkanes 异构链烷isopach n. 等厚线isoparaffin n. 异构烷烃isoprenoid n. 异戊间二烯化合物isostatically ad. 均衡地,等压地Jjerk v. & n. 猛拉,冲击jet v. & n. 喷射,急流Jurassic n. & a. 侏罗纪(的),侏罗系(的)juxtapose v. 使…并置juxtaposition n. 并置,毗连Kkerogen n. 干酪根,油母岩kinetics n. 动力学Llacustrine a. 湖泊的,湖成的laden a. 充满了的lagoon n. 泻湖lamina (sing.) n. 薄片,薄层lamination n. 薄层,纹理lath n. 条板layer-cake 连续地层柱lead铅lenses 透镜体levee n. 天然堤lignite n. 褐煤lime n. 石灰,氧化钙lime-secreting 分泌钙质的,钙质充填的limestone灰岩linearly线性体lipid n. 脂类liquefy液化literfingering n. 指状穿插,楔形夹层lithification n. 石化作用lithify v. 石化lithofacies n. 岩相lithologic a. 岩性的lithology n. 岩性lithosphere岩石圈lithostratigraphic a. 岩性地层的lobe n. 舌,瓣logarithmically对数地longitudinal a. 经度的,纵向的low sulfur crude oil 低硫原油lump v. 集中,使…归并lunate a. 新月形的Mmagmatism岩浆作用magnesium n. 镁(Mg)magnesium镁maintenance n. 维持,保养manganese锰marine petroleum海相石油marl n. 泥灰岩mass spectrography (MS) 质谱法maturation n. 成熟作用meandering n. 曲流,弯曲mechanics n. 力学,机制,机理megaripple n. 巨波纹Mesozoic n. & a. 中生代(的),中生界(的)metagenesis 深成作用metagenetic a. 准变质作用的metamorphic rock变质岩metamorphism变质作用metastable a. 亚稳的metaxylene n. 间二甲苯meteoric a. 大气的,气象的methane n. 甲烷,沼气methane hydrate甲烷水合物methane甲烷methylisomer n. 甲基同分异构体microbial a. 微生物的microbial activity微生物活动microorganisms 显微有机质migrate v. 运移migration n. 运移migration运移millidarcy n. 毫达西,千分达西minimal a. 最小的,最低的miogeosyncline n. 冒地槽,冒地向斜Mio-Pliocene 中—上新世(统)miscellaneous 混杂misstate v. 谎报,伪称mobility n. 活动性,迁移率modeling n. 模拟,模式化moderate a. 中等的,适度的modification n. 改进,修正Moho n. 莫霍面molasses n. 磨拉石moldic a. 印模的,铸模的mollusk n. 软体动物molybdenum钼monocline n. 单斜morphology n. 结构,形态(学)mucus n. 粘液mudstone泥岩multichannel a. 多道的,多路的multitude n. 大量,众多mutually ad. 相互地Nn-alkanes 正构烷烃naphthalene萘naphthene n. 环烷烃naphthene环烷naphthenic oils 环烷型原油naphthenoaromatic nuclei 环烷芳香核natural gas 天然气negate v. 使…无效,取消negative ion负离子neglect v. 忽略,遗漏negligible a. 可忽略的,很小的next to 仅次于niche n. 小生境nickel porghyrin镍卟啉nickel 镍Nitrogen n. 氮(N)nitrogen compounds 含氮化合物nitrogen氮non-associated gas 非伴生气noncommercial a. 非商业的nonetheless ad. & conj. 尽管,还是;然而;依然non-hydrocarbon gases 非烃气nonmarine a. 非海洋的,非海成的nonskeletal a. 非骨骼的normal alkanes 正构链烷nourishment n. 营养,食物NSO compounds 氮硫氧化合物nucleus n. 核,地核nutrient n. 滋养剂,营养Ooblique a. 倾斜的,斜交的obliquely ad. 倾斜地,斜交地obliterate v. 消除obscure a. & v. 模糊的;搞混,使…不分明oceanology n. 海洋学odor n. 气味oil-field water 油田水oil-water contacts 油水接触olefin n. 烯烃Oligo-Miocene 渐—中新世(统)onlap n. 超覆,上超onset n. 开始,起始oolite n. 鲕粒岩,鲕石oomoldic a. 鲕穴状的optimistic a. 乐观的Ordovician n.& a. 泥盆纪(的),泥盆系(的)organic acid有机酸organic matter 有机质organic origin有机成因organometallic compounds 有机金属化合物originate v. 发源,起源orthodox a. 传统的,惯例的orthoquartzite n. 沉积石英岩(正石英岩)oscillate v. 摆动,振荡outcrop n. 露头outlet n. 出口,排水口outwards ad. 向外oval a. 椭圆的,卵形的overestimate v. 过高评价over-flowing points 溢流点overgrowth n. 增长,过度生长overlap n. 超覆,重叠overthrust n. 逆掩断层overview n. 总的看法ovoid a. 卵形的,蛋形的oxygen compounds 含氧化合物Ppacket n. 套(地层)Paleocene n.& a. 古新世(的),古新统(的)Paleozoic n.&a. 古生代(的),古生界(的)palynological a. 孢粉学的panoramic a. 全景的paraffin n. 石蜡烃,烷烃paraffinic oils 石蜡型原油paraffinic–naphthenic oils 石蜡环烷型原油paraffin石蜡烃parameter n. 参数,参量paranaphthalene蒽parlance n. 用语,说法parrotfish n. 鹦咀鱼partial saturation部分饱和particulate n. 颗粒,微粒parting n. 分离,裂理,裂开patch n. 斑,块pay sand 油砂pelecypod n. 瓣鳃纲软体动物pelletoud n. 似球粒,似团粒pelmodic a. 泥质团粒印模的peloid n. 球粒状,似球粒penecontemporaneous a. 准同期的,准同生的Penicillas n. 笔藻属,画笔藻属permeability渗透性(率)permeable a. 可渗透的permeat n. 渗透,穿过perpendicular a. 垂直的,正交的petroleum alteration石油蚀变petroleum geology石油地质学petroleum pools 油藏petroleum refiners 石油炼制者petroleum reservoirs 油藏petroliferous a. 含石油的petrology n. 岩石学phenol n. 酚phenols 苯酚photosynthesis n. 光合作用photosynthetic pigment 光合色素phytoplankton n. 浮游植物pinpoint v. 精确定位plan n. 平面图planar a. 平面的planktonic a. 浮游生物的plausible a. 似乎合理的playa n. 干盐湖plutonic water 火成岩水point-bar 点沙坝,曲流沙坝pollen n. 花粉polycondensation缩聚作用polycyclic a. 多环的,多旋回的polysaccharides 多醣pool n. 水池,储油层,油藏porosity孔隙度porous a. 多孔的porphyrin卟啉positive ion阳离子postulate v. 要求,假设potassium n. 钾(K)potassium钾(K)Precambrian n.& a. 前寒武纪(的),前寒武系(的)preclude v. 消除,妨碍precursor n. 先驱,先质体preferentially ad. 优先地preliminary a. 初步的,预先的preponderance n. 优势,优越preservable a. 可保存的preservation n. 保存,储存preserve v. 保存,储存primary migration初次运移primitive a. 原始的,早期的prior (to) ad.&a. 在…之前,居先的procedural a. 程序性的processing n. 处理prodelta n. 前三角州profiling n. 剖面勘探,剖面法progradation n. 前积,进积渐进作用prolific a. 多产的,丰富的prolong v. 延长,拖长promising a. 有希望的,有开采价值的prone a. 有…的倾向,易于…的propane n. 丙烷prophyrin n. 甾族化合物,卟啉proportional to 与…成(正)比例。

57个学术性词汇

57个学术性词汇

1. abandon [ə'bændən] v.放弃;抛弃2. abstract ['æbstrækt, æb'strækt] a.抽象的n.摘要3. academy [ə'kædəmi] n.研究院;学院;学会4. access ['ækses, 'æksəs, æk'ses]n.接近;入口5. acmodate [ə'kɔmədeit] v.容纳;给…提供住宿;使适应6. acpany [ə'kʌmpəni] v.陪伴;伴随7. accumulate [ə'kju:mjuleit] v.积累8. accurate ['ækjurət] a.准确的9. achieve [ə'tʃi:v] v.完成;到达10. acknowledge [ək'nɔlidʒ] v.成认;致11. acquire [ə'kwaiə] v.获得12. adapt [ə'dæpt] v.使适应;改编13. adequate ['ædikwit] a.足够的14. adjacent [ə'dʒeisənt] a.毗连的;紧接着的15. adjust [ə'dʒʌst] v.调整;修改16. administration [əd,mini'streiʃən] n.管理;管理局;行政;政府17. adult ['ædʌlt, ə'dʌlt] n.&a.成人18. advocate ['ædvəkeit, 'ædvəkət] n.拥护者v.拥护19. affect [ə'fekt, 'æfekt] v.影响20. aggregate ['æɡriɡət, 'æɡriɡeit] a.总的n.总计v.总计21. aid [eid] v.帮助n.帮助;助手22. albeit [ɔ:l'bi:it] conj.虽然23. allocate ['æləukeit] v.分派24. alter ['ɔ:ltə] v.改变25. alternative [ɔ:l'tə:nətiv] n.替代物a.选择的26. ambiguous [æm'biɡjuəs] a.模棱两可的27. amend [ə'mend] v.修订;改正自新28. analogy [ə'nælədʒi] a.类似;比较;类推29. analyze ['ænəlaiz] v.分析30. annual ['ænjuəl] a.每年的n.年鉴31. anticipate [æn'tisipeit] v.预料32. apparent [ə'pærənt] a.明显的33. append [ə'pend] v.附上34. appreciate [ə'pri:ʃieit] v.欣赏;感谢35. approach [ə'prəutʃ] v.靠近n.方法36. appropriate [ə'prəuprieit, ə'prəupriət] a.恰当的37. appro*imate [ə'prɔksimit] a.近似的v.与…近似38. arbitrary ['ɑ:bitrəri] a.任意的;专断的39. area ['εəriə] n.地区;面积;领域40. aspect ['æspekt] n.方面;面貌41. assemble [ə'sembl] v.集合;装配;收集42. assess [ə'ses] v.对…估价;评价43. assign [ə'sain] v.指定;分配44. assist [ə'sist] v.帮助45. assume [ə'sju:m, ə'su:m] v.假设;认为;承当;呈现46. assure [ə'ʃuə] v.向…保证47. attach [ə'tætʃ] v.系;贴;使附加;使依恋48. attain [ə'tein] v.到达;获得49. attitude ['ætɪtjuːd, -tuːd] n.态度;姿势50. attribute [ə'tribju:t, 'ætribju:t] v.把…归因于n.性质51. author ['ɔ:θə] n.作者;作家;创始人52. authority [ɔ:'θɔrəti] n.当局;权威;权力53. automate ['ɔ:təmeit] v.使自动化54. available [ə'veiləbl] a.可得到的55. aware [ə'wεə] a.意识到的56. behalf [bi'hɑ:f] n.利益57. benefit ['benifit] n.利益;津贴v.有利于;获益58. bias ['baiəs] n.偏见;爱好59. bond [bɔnd] n.纽带;债券60. brief [bri:f] a.简短的61. bulk [bʌlk] n.体积;主体62. capable ['keipəbl] a.能够;有能力的63. capacity [kə'pæsəti] n.容量;潜在能力64. category ['kætiɡəri] n.种类;畴65. cease [si:s] n.&v.停顿66. challenge ['tʃælindʒ] n.挑战67. channel ['tʃænəl] n.海峡;渠道;频道68. chapter ['tʃæptə] n.章69. chart [tʃɑ:t] n.图表v.制图表70. chemical ['kemikəl] a.化学的n.化学药品71. circumstance ['sə:kəmstəns] n.情况72. cite [sait] v.引用73. civil ['sivəl] a.公民的;国的;民用的74. clarify ['klærifai] v.说明75. classic ['klæsik] n.名著a.古典的76. clause [klɔ:z] n.条款;从句77. code [kəud] n.法典;代码;习俗78. coherent [kəu'hiərənt] a.一致的;连贯的79. coincide [,kəuin'said] v.巧合,同时发生80. collapse [kə'læps] v.&n.倒坍;瓦解81. colleague ['kɔli:ɡ] n.同事82. mence [kə'mens] v.开场83. ment ['kɔment] n.&v.评论;注释84. mission [kə'miʃən] n.委员会;委托;委托书;佣金85. mit [kə'mit] v.犯罪86. modity [kə'mɔditi] n.日用品87. municate [kə'mju:nikeit] v.通信;交流88. munity [kə'mju:niti] n.社区;社会;界89. patible [kəm'pætəbl] a.和睦的;兼容的90. pensate ['kɔmpenseit] v.补偿91. pile [kəm'pail] v.编92. plement ['kɔmplimənt] v.&n.补充93. ple* ['kɔmpleks] a.复杂的94. ponent [kəm'pəunənt] n.组成局部a.组成的95. pound ['kɔmpaund, kəm'paund] n.化合物a.复合的96. prehensive [,kɔmpri'hensiv] a.综合的97. prise [kəm'praiz] v.包含;构成98. pute [kəm'pju:t] v.计算99. conceive [kən'si:v] v.构思;怀胎;认为100. concentrate ['kɔnsəntreit] v.集中;浓缩101. concept ['kɔnsept] n.概念102. conclude [kən'klu:d] v.完毕;下结论103. concurrent [kən'kʌrənt] a.同时发生的;并存的104. conduct ['kɔndʌkt, kən'dʌkt] n.行为v.实施;指挥;导电105. confer [kən'fə:] v.授予;协商106. confine [kən'fain, 'kɔnfain] v.限制;禁闭107. confirm [kən'fə:m] v.证实108. conflict [kən'flikt, 'kɔnflikt] n.冲突v.冲突109. conform [kən'fɔ:m] v.遵守;符合110. consent [kən'sent] n.&v.同意111. consequent ['kɔnsi,kwənt] a.作为结果的112. considerable [kən'sidərəbl] a.相当的113. consist [kən'sist] v.由…组成114. constant ['kɔnstənt] a.不断的115. constitute ['kɔnstitju:t] v.构成116. constrain [kən'strein] v.限制;强制117. construct [kən'strʌkt] v.建造118. consult [kɔn'sʌlt, 'kɔnsʌlt] v.商量;咨询;查阅119. consume [kən'sju:m] v.消耗;消费120. contact ['kɔntækt, kən'tækt] v.&n.接触;联系121. contemporary [kən'tempərəri] a.当代的n.同代人122. conte*t ['kɔntekst] n.上下文;背景123. contract ['kɔntrækt, kən'trækt] n.合同v.收缩124. contradict [,kɔntrə'dikt] v.反驳;与…矛盾125. contrary ['kɔntrəri] a.&n.相反126. contrast [kən'trɑ:st, -'træst, 'kɔntrɑ:st, -træst] n.比照v.形成比照127. contribute [kən'tribju:t] v.捐献;奉献;投稿128. controversy ['kɔntrə,və:si] n.争论129. convene [kən'vi:n] v.召集130. converse [kən'və:s] a.相反的131. convert [kən'və:t] v.转化132. convince [kən'vins] v.使确信133. cooperate [kəu'ɔpəreit] v.合作134. coordinate [kəu'ɔ:dinit, kəu'ɔ:dineit] a.同等的v.使协调135. core [kɔ:] n.核心136. corporate ['kɔ:pərit] a.公司的137. correspond [,kɔ:ri'spɔnd] v.通信;符合;对应138. couple ['kʌpl] n.两个;夫妇139. create [kri'eit] v.创造;引起140. credit ['kredit] n.信用;学分;功绩141. criterion [krai'ti.ri.n] n.标准142. crucial ['kru:..l] a.决定性的143. culture ['k.lt..] n.文化;修养144. currency ['k.r.nsi] n.货币145. cycle ['saikl] n.循环;周期146. data ['deit.] n.[复]数据147. debate [di'beit] n.&v.辩论148. decade ['dekeid] n.十年149. decline [di'klain] v.绝;下倾;衰退n.衰退150. deduce [di'dju:s] v.演绎151. define [di'fain] v.给…下定义;明确152. definite ['definit] a.明确的153. demonstrate ['dem.nstreit] v.说明;演示;示威154. denote [di'n.ut] v.表示155. deny [di'nai] v.否认156. depress [di'pres] v.使沮丧157. derive [di'raiv] v.引伸;起源158. design [di'zain] v.设计n.设计;图案159. despite [di'spait] prep.尽管160. detect [di'tekt] v.觉察;检测161. deviate ['di:vieit, 'di:vi.t] v.背离162. device [di'vais] n.装置;设计163. devote [di'v.ut] v.致力;为…献身164. differentiate [,dif.'ren.ieit] v.区分165. dimension [di'men..n, dai-] n.尺寸;维166. diminish [di'mini.] v.减少167. discrete [dis'kri:t] a.别离的168. discriminate [dis'krimineit, dis'krimin.t] v.区别;歧视169. displace [dis'pleis] v.移置;置换170. display [,dis'plei] v.&n.展览;显示171. dispose [dis'p.uz] v.处置172. distinct [dis'ti.kt] a.清晰的;独特的;不同的173. distort [dis't.:t] v.歪曲;扭曲174. distribute [di'stribju:t, 'dis-] v.分发;分配;分布175. diverse [dai'v.:s, di-] a.多样的176. document ['d.kjum.nt, 'd.kjument] n.文件v.引证177. domain [d.u'mein] n.领域;域;幅员178. domestic [d.u'mestik] a.国的;家庭的179. dominate ['d.mineit] v.支配180. draft [drɑ:ft, dr.ft] n.草稿v.起草181. drama ['drɑ:m., dr.m.] n.戏剧182. duration [dju.'rei..n] n.持续时间183. dynamic [dai'n.mik] a.有活力的184. economy [i'k.n.mi] n.经济;节约185. edit ['edit] v.编辑186. element ['elim.nt] n.元素;要素187. eliminate [i'limineit] v.消灭;消除188. emerge [i'm.:d.] v.出现189. emphasis ['emf.sis] n.强调190. empirical [em'pirik.l] n.经历的191. enable [i'neibl] v.使能够192. encounter [in'kaunt.] v.&n.遇到193. energy ['en.d.i] n.精力;能量194. enforce [in'f.:s] v.实施;强制195. enhance [in'hɑ:ns, -h.ns] v.增强196. enormous [i'n.:m.s] a.巨大的;大量的197. ensure [in'.u.] v.保证198. entity ['ent.ti] n.实体199. environment [in'vai.r.nm.nt] n.环境200. equate [i'kweit] v.使相等;使平等201. equip [i'kwip] v.装备202. equivalent [i'kwiv.l.nt] a.相等的n.等值物203. erode [i'r.ud] v.腐蚀204. error ['er.] n.错误205. establish [i'st.bli.] v.建立;确立206. estate [i'steit] n.房地产;财产207. estimate ['estimeit] v.估计n.208. ethic ['eθik] n.伦理209. ethnic ['eθnik] n.种族的210. evaluate [i'v.ljueit] v.对…估价;评价211. eventual [i'vent.u.l] a.最后的212. evident ['evid.nt] a.明显的213. evolve [i'v.lv] v.进化;演变214. e*ceed [ik'si:d] v.超过215. e*clude [iks'klu:d] v.排除216. e*hibit [iɡ'zibit] v.显示;展览n.展览217. e*pand [ik'sp.nd] v.扩大;膨胀218. e*pert ['eksp.:t, ek'sp.:t] n.专家a.熟练的219. e*plicit [ik'splisit] a.明晰的;详述的;直率的220. e*ploit ['ekspl.it, ik's-] v.剥削;利用;开采n.功绩221. e*port [ik'sp.:t, 'eks-, 'eksp.:t] v.出口n.出口;出口商品222. e*pose [ik'sp.uz] v.暴露;揭露;使接触223. e*ternal [ik'st.:n.l] a.外部的224. e*tract [ik'str.kt, 'ekstr.kt] v.取出;榨取n.摘录225. facilitate [f.'siliteit] v.使容易;促进226. factor ['f.kt.] n.因素;因子227. feature ['fi:t..] n.特征;容貌228. federal ['fed.r.l] a.联邦的;联盟的229. fee [fi:] n.费230. file ['fail] n.档案;文件;锉231. final ['fainl] a.最后的;决定性的232. finance [fai'n.ns] n.财政;金融v.给…提供资金233. finite ['fainait] a.有限的234. fle*ible ['fleksibl] a.易弯曲的;灵活的235. fluctuate ['fl.ktjueit] v.波动236. focus ['.s] v.集中n.焦点;焦距237. format ['f.:m.t] n.格式238. formula ['f.:mjul.] n.公式239. forthing ['f.:θ'k.mi.] a.即将到来的240. found [faund] v.创立;建立241. foundation [faun'dei..n] n.创立;根底;基金会242. framework ['freimw.:k] n.框架;体制243. function ['f..k..n] n.功能;函数v.运行244. fund [f.nd] n.基金245. fundamental [,f.nd.'ment.l] a.根底的;根本的246. furthermore ['f.:e.m.:] ad.此外247. gender ['d.end.] n.性别248. generate ['d.en.reit] v.产生249. generation [,d.en.'rei..n] n.一代;产生250. globe [ɡl.ub] n.球;地球251. goal [ɡ.ul] n.球门;目标252. grade [ɡreid] n.等级;年级;成绩253. grant [ɡrɑ:nt, ɡr.nt] n.授予物;拨款;助学金v.授予254. guarantee [,ɡ.r.n'ti:] n.&v.保证255. guideline ['ɡaidlain] n.方针256. hence [hens] ad.因此257. hierarchy ['hai.,rɑ:ki] n.等级制度258. highlight ['hailait] n.精华v.强调259. hypothesis [hai'p.θisis] n.假设;假说260. identical [ai'dentik.l] a.同一的261. identify [ai'dentifai] v.认出;识别262. ideology [,aidi'.l.d.i, ,idi-] n.思想体系;意识形态263. ignorance ['iɡn.r.ns] n.无知;不知道264. illustrate ['il.streit] v.举例说明;图解265. image ['imid.] n.像;图像;形象266. immigrate ['imiɡreit] v.移民入境267. impact ['imp.kt, im'p.kt] n.碰撞;影响268. implement ['implim.nt, 'impliment] n.工具v.贯彻269. implicate ['implikeit] v.暗示;使牵连270. implicit [im'plisit] a.含蓄的;含的271. imply [im'plai] v.暗示272. impose [im'p.uz] v.征(税);强加273. incentive [in'sentiv] n.&a.刺激274. incidence ['insid.ns] n.发生275. incline [in'klain] n.斜坡v.使倾斜;使倾向276. ine ['ink.m] n.收入277. incorporate [in'k.:p.reit, in'k.:p.r.t] v.合并278. inde* ['indeks] n.索引;指标;指数279. indicate ['indikeit] v.说明280. individual [,indi'vidju.l, -d..l] n.个人;个体a.单个的;独特的281. induce [in'dju:s, in'du:s] v.劝诱;导致282. inevitable [in'evit.bl] a.不可防止的283. infer [in'f.:] v.推断284. infrastructure ['infr.,str.kt..] n.根底设施285. inherent [in'hi.r.nt] a.固有的286. inhibit [in'hibit] v.抑制287. initial [i'ni..l] a.最初的n.首字母288. initiate [i'ni.ieit, i'ni.i.t, -eit] v.开场;启蒙289. injure ['ind..] v.使受伤290. innovate ['in.uveit] v.创新291. input ['input] v.&n.输入292. insert [in's.:t, 'ins.:t] v.插入n.插页293. insight ['insait] n.洞察力;见识294. inspect [in'spekt] v.检查;视察295. instance ['inst.ns] n.例子296. institute ['institjut, -tu:t] n.研究所;学院v.设立297. instruct [in'str.kt] v.教;指导298. integral ['intiɡr.l] a.整体的299. integrate ['intiɡreit, 'intiɡrit, -ɡreit] v.使结合300. integrity [in'teɡr.ti] n.诚信;完整301. intelligence [in'telid..ns] n.智力;情报302. intense [in'tens] a.强烈的303. interact ['int.r.kt] v.相互作用304. intermediate [,int.'mi:dj.t, -dieit] a.中间的;中级的305. internal [in't.:n.l] a.部的306. interpret [in't.:prit] v.解释;口译307. interval ['int.v.l] n.间隔;休息308. intervene [,int.'vi:n] v.干预309. intrinsic [in'trinsik,-k.l] a.在的310. invest [in'vest] v.投资311. investigate [in'vestiɡeit] v.调查312. invoke [in'] v.恳求;实施313. involve [in'v.lv] v.使卷入314. isolate ['ais.leit, -lit] v.隔离;孤立315. issue ['i.ju:, 'isju:] n.问题v.发行316. item ['ait.m] n.条款;条317. job [d..b] n.工作318. journal ['d..:n.l] n.杂志319. justify ['d..stifai] v.证明…有理320. label ['leibl] n.标签;标记321. labor ['leib.] n.&v.劳动322. layer ['lei.] n.层323. lecture ['lekt..] n.&v.讲课;讲座324. legal ['li:ɡ.l] a.合法的;法律的325. legislate ['led.isleit] v.为…立法326. levy ['levi] v.征收n.税款327. liberal ['lib.r.l] a.自由的;开明的n.开明的人328. license ['lais.ns] n.执照329. likewise ['laikwaiz] ad.同样地330. link [li.k] v.连接n.链;环节331. locate [l.u'keit, 'l.u] v.使位于;找到332. logic ['l.d.ik] n.逻辑333. maintain [mein'tein] v.维持;维修334. major ['meid..] a.较大的;主要的n.专业v.专修335. manipulate [m.'nipjuleit] v.操作;操纵336. manual ['m.nju.l] a.手的;体力的n.手册337. margin ['mɑ:d.in] n.页边距;边缘;余地338. mature [m.'tju.] a.&v.成熟339. ma*imize ['m.ksimaiz] v.使最大化340. mechanism ['mek.niz.m] n.机制341. media ['mi:di.] n.媒体342. mediate ['mi:dieit] v.调停343. medical ['medik.l] a.医学的344. medium ['mi:di.m, -dj.m] n.媒质;中间a.中等的345. mental ['ment.l] a.精神的;脑力的346. method ['meθ.d] n.方法347. migrate [mai'ɡreit, 'maiɡ-] v.迁移348. military ['milit.ri] a.军事的349. minimal ['minim.l] a.最小的350. minimize ['minimaiz] v.使最小化351. minimum ['minim.m] n.最小量a.最小的352. ministry ['ministri] n.部353. minor ['main.] a.次要的n.辅修专业v.辅修354. mode [m.ud] n.模式355. modify ['m.difai] v.修改;修饰356. monitor ['m.nit.] n.班长;显示器v.监视357. motive ['m.utiv] n.动机a.运动的358. mutual ['mju:t.u.l, -tju.l] a.相互的;共同的359. negate [ni'ɡeit, 'neɡeit, 'ni:-] v.否认360. network ['netw.:k] n.网络361. neutral ['nju:tr.l] a.中立的;中性的362. nevertheless [,nev.e.'les] ad.然而363. nonetheless [,n.ne.'les] ad.然而364. norm [n.:m] n.标准365. normal ['n.:m.l] a.正常的;正规的366. notion ['n.u..n] n.概念;想法367. notwithstanding [,n.twiθ'st.ndi., -wie-] prep.&conj.虽然368. nuclear ['nju:kli., 'nu:-] a.核的;核心的369. objective [.b'd.ektiv, .b-] a.客观的n.目标370. obtain [.b'tein, .b-] v.获得371. obvious ['.bvi.s] a.明显的372. occupy ['.kjupai] v.占;使忙碌373. occur [.'k.:] v.发生;出现;想起374. odd [.d] a.奇怪的;奇数的;临时的375. offset [,.f'set, ,.:-, '.fset, '.:-] n.分支v.抵消376. ongoing ['.n,ɡ.ui., '.:n-] n.进展中的377. option ['.p..n] n.选择378. orient ['.:ri.nt, '.u-, '.:rient] n.v.给…定位379. oute ['autk.m] n.结果380. output ['autput, ,aut'put] n.产量;输出381. overall ['.uv.r.:l, ,.uv.'r.:l] n.[overalls]工作服a.总体的382. overlap [,.uv.'l.p, '.uv.l.p] v.重叠383. overseas ['.uv.'si:z] ad.&a.海外384. panel ['p.nl] n.专门小组;面板385. paradigm ['p.r.dim] n.例386. paragraph ['p.r.ɡrɑ:f, -ɡr.f] n.段落387. parallel ['p.r.lel] a.平行的v.使平行388. parameter [p.'r.mit.] n.参数389. participate [pɑ:'tisipeit] v.参加390. partner ['pɑ:tn.] n.伙伴391. passive ['p.siv] a.被动的;消极的392. perceive [p.'si:v] v.感觉到;理解393. percent [p.'sent] n.百分之…394. period ['p..r..d] n.时期;句号395. persist [p.'sist, -'zist] v.坚持;持续396. perspective [p.'spektiv] n.角度;观点397. phase [feiz] n.阶段398. phenomenon [fi'n.min.n, f.-] n.现象399. philosophy [fi'l.s.fi, f.-] n.哲学400. physical ['fizik.l] a.物质的;身体的;物理的401. plus [pl.s] prep.加n.加号402. policy ['p.lisi] n.政策403. portion ['p.:..n, 'p.u-] n.局部;份v.分404. pose [p.uz] v.摆姿势;提出n.姿势405. positive ['p.z.tiv, -zi-] a.肯定的;积极的;正的;阳性的406. potential [p.u'ten..l] a.潜在的n.潜力407. practitioner [pr.k'ti..n.] n.开业者408. precede [pri:'si:d, pri-] v.先于;优先于409. precise [pri'sais] a.准确的410. predict [pri'dikt] v.预言411. predominant [,pri'd.min.nt] a.占优势的;主要的412. preliminary [pri'limin.ri] a.预备的;初步的n.初试;预赛413. presume [pri'zju:m, -'zu:m] v.假定414. previous ['pri:vj.s] a.先前的415. primary ['praim.ri] a.初级的;主要的416. prime [praim] a.首要的n.全盛时期417. principal ['prins.p.l] a.主要的n.校长418. principle ['prins.pl] n.原则419. prior ['prai.] a.在先的420. priority [prai'.r.ti] n.在先;重点421. proceed [pr.u'si:d] v.继续进展422. process ['es, 'pr.-] n.过程v.加工423. professional [pr.u'fe..n.l] a.职业的n.专业人员424. prohibit [pr.u'hibit] v.制止425. project ['pr.d.ekt, 'pr.u, pr.'d.ekt] n.工程;工程v.投射426. promote [pr.u'm.ut] v.促进;提升;促销427. proportion [pr..p...(.)n] n.比例;相称428. prospect ['pr.spekt] n.前景v.勘探429. protocol ['pr.ut.k.l] n.协议;礼仪430. psychology [psai'k.l.d.i] n.心理学431. publication [,p.bli'kei..n] n.出版;出版物432. publish ['p.bli.] v.出版433. purchase ['p.:t..s] n.&v.购置434. pursue [p.'sju:, -'su:] v.追;追求;从事435. qualitative ['kw.lit.tiv, -tei-] a.质的;定性的436. quote [kw.ut, k.ut] v.引用437. radical ['r.dik.l] a.根本的;激进的438. random ['r.nd.m] n.&a.随机439. range [reind.] n.围;山脉;炉灶v.排列440. ratio ['rei.i.u, -..u] n.比441. rational ['r...n.l] a.理性的;合理的442. react [ri'.kt, ri:-] v.反响443. recover [ri'k.v.] v.恢复;挽回444. refine [ri'fain] v.提炼445. regime [rei'.i:m, ri-, ri'd.i:m] n.政权;制度446. region ['ri:d..n] n.地区;领域447. register ['red.ist.] n.&v.登记;注册;挂号n.登记簿448. regulate ['reɡjuleit] v.调整449. reinforce [,ri:in'f.:s] v.增援;加强450. reject [ri'd.ekt] v.拒绝451. rela* [ri'l.ks] v.使放松452. release [ri'li:s] v.&n.释放;公布453. relevant ['rel.v.nt] a.相关的454. reluctance [ri'l.kt.ns] n.勉强455. rely [ri'lai] v.依靠;信赖456. remove [ri'mu:v] v.移开;搬迁;消除457. require [ri'kwai.] v.需要;要求458. research [ri's.:t., 'ri:s-] n.研究459. reside [ri'zaid] v.居住460. resolve [ri'z.lv] v.解决;决心n.决心461. resource [ri's.:s, -'z.:s, 'ri:s-, 'ri:z-] n.资源;谋略462. respond [ri'sp.nd] v.答复;响应463. restore [ri'st.:] v.恢复;归还464. restrain [ri'strein] v.抑制465. restrict [ri'strikt] v.限制466. retain [ri'tein] v.保持;保存467. reveal [ri'vi:l] v.显示;告诉468. revenue ['rev.nju:, -nu:] n.税收469. reverse [ri'v.:s] v.颠倒n.相反;反面470. revise [ri'vaiz, 'ri:vaiz] v.修订471. revolution [,rev.'lu:..n] n.革命;旋转472. rigid ['rid.id] a.刻板的473. role [r.ul] n.角色;作用474. route [ru:t, raut] n.路线475. scenario [si'nɑ:ri.u, -'n.-, -'nε.-] n.剧本;方案476. schedule ['..dju:.l, -d.u:.l, 'sked.u:.l, -d.u.l] n.时间表477. scheme [ski:m] v.方案n.方案;诡计478. scope [sk.up] n.围479. section ['sek..n] n.局部;截面480. sector ['sekt.] n.扇形;部门481. secure [si'kju.] a.平安的v.获得482. seek [si:k] v.寻找;试图483. select [si'lekt] v.选择484. sequence ['si:kw.ns] n.顺序;连续485. series ['si.ri:z, -riz] n.系列486. se* [seks] n.性别;性487. shift [.ift] v.&n.转移488. significant [sig'nifik.nt] n.有意义的;重要的489. similar ['simil.] a.相似的490. simulate ['simjuleit] v.假装;模仿491. site [sait] n.地点;场所492. so-called ['s.u'k.:ld] a.所谓的493. sole [s.ul] n.脚底;鞋底a.唯一的494. somewhat ['s.mhw.t, -hw.t] ad.有点495. source [s.:s] n.源;来源496. specific [spi'sifik] a.具体的;特有的497. specify ['spes.fai, -si-] v.指定;详细说明498. sphere [sfi.] n.球;领域499. stable ['steibl] a.稳定的n.马厩500. statistic [st.'tistik] a.统计的501. status ['steit.s, 'st.-] n.地位502. straightforward [,streit'f.:w.d] a.坦率的;明确的503. strategy ['str.tid.i] n.战略;策略504. stress [stres] n.压力;重音v.强调505. structure ['str.kt..] n.构造;建筑物506. style [stail] n.风格507. submit [s.b'mit] v.服从;提交508. subordinate [s.'b.:din.t, -neit, s.'b.:dineit] a.下级的;附属的n.部下509. subsequent ['s.bsikw.nt] a.随后的510. subsidy ['s.bsidi] n.补助;津贴511. substitute ['s.bstitju:t, -tu:t] n.代替者v.代替512. successor [s.k'ses.] n.继任者513. sufficient [s.'fi..nt] a.足够的514. sum [s.m] n.总数;金额v.总计515. summary ['s.m.ri] n.概要a.概括的516. supplement ['s.plim.nt, 's.pl.ment] n.增刊;补遗v.增补;补充517. survey [s.:'vei, 's.:vei, s.-] v.俯瞰;测量;调查n.俯瞰;测量;调查518. survive [s.'vaiv] v.幸存519. suspend [s.'spend] v.悬挂;推迟520. sustain [s.'stein] v.保持;忍受521. symbol ['simb.l] n.象征;符号522. tape [teip] v.捆;录(磁带) n.带子;磁带523. target ['tɑ:ɡit] n.靶子;目标524. task [tɑ:sk, t.sk] n.任务525. team [ti:m] n.队;团队v.协作526. technical ['teknik.l] a.技术的527. technique [tek'ni:k] n.技术;技巧528. technology [tek'n.l.d.i] n.技术529. temporary ['temp.r.ri] a.暂时的;临时的530. tense [tens] n.时态a.绷紧的531. terminate ['t.:mineit] v.终止532. te*t [tekst] n.正文,文本533. theme [θi:m] n.主题534. theory ['θi.ri, 'θi:.-] n.理论535. thereby [,eε.'bai, 'eε.bai] ad.从而536. thesis ['θi:sis] n.论文;论点537. topic ['t.pik] n.话题538. trace [treis] n.痕迹v.追踪539. tradition [tr.'di..n] n.传统540. transfer [tr.ns'f.:] v.&n.转移;换车;调动541. transform [tr.ns'f.:m, -, trɑ:n-] v.转变;改革542. transit ['tr.nsit, -zit, 'trɑ:n-] n.通过;运输;过渡543. transmit ['mit, tr.ns-, trɑ:n-] v.传播;传递544. transport [tr.ns'p.:t; -tr.ns'p.:t, -, trɑ:n-, 'tr.nsp.:t, '-, 'trɑ:n-] n.&v.运输545. trend [trend] n.趋势546. trigger ['triɡ.] v.引发n.板机547. ultimate ['.ltim.t] a.最终的;根本的548. undergo [,.nd.'ɡ.u] v.经历549. underlie [,.nd.'lai] v.是…的根底550. undertake [,.nd.'teik] v.承受;从事551. uniform ['ju:nif.:m] a.一样的n.制服552. unify ['ju:nifai] v.统一553. unique [ju:'ni:k] a.独一无二的554. utilize ['ju:tilaiz] v.利用555. valid ['v.lid] a.有效的;正当的556. vary ['vε.ri] v.变化;使多样化557. vehicle ['vi..k(.)l] n.车辆558. version ['v.:..n] n.译文;说法559. via ['vai.] prep.经由560. violate ['vai.leit] v.违犯561. virtual ['v.:t.u.l] a.实际上的562. visible ['viz.bl] a.可看见的563. vision ['vi..n] n.视力;眼光564. visual ['vizju.l] a.视觉的565. volume ['v.lju:m] n.卷,册;体积;额;音量566. voluntary ['v.l.nt.ri] a.自愿的567. welfare ['welfε.] n.福利568. whereas [hwε.'.z conj.而569. whereby [hwε.'bai] ad.由此570. widespread ['waid'spred] a.普遍的。

Chapter_5_Syntax_句法(练习答案)_doc

Chapter_5_Syntax_句法(练习答案)_doc

Chapter 5 Syntax 句法I. Multiple Choices:1.D. Immediate Constituent2. B. semantic3. A. concord4. A. the future is not expressed by morphological change5. D. substitutability6. C. co-occurrence7. B. Predicate 8.B. syntactic 9. C. self-control10. D. Government 11. D. coordinateII. Fill in the blanks with the most suitable words:1. Cohesion refers to ties and connections which exist within texts. They are also called formal links between sentences and between clauses.2. A sentence structure that is made up of layers of word groups is called a hierarchical structure.3. Sentences are traditionally assumed to be made up of words in _linear___ direction.4. Provide linguistic terms for the following descriptions.1) a type of relation holding with each other at aparticular place in a structure:2) an operation that moves a phrase category from its original position generated byPS rules to another within a structure: transformation3) the branch of linguistics which studies the rules governing the combination ofwords into sentences: syntaxIII. Decide whether the following statements are true or false. Write T for true and F for false in the bracket before each of them:T 1. It is characteristic of Halliday’s theory that more attention is paid to paradigmatic relations than to syntagmatic relations, which is the main concern of Chomsky.F2. Tense and aspect are two important categories of the verb, and they were separated in traditional grammar. (they were not separated in traditional grammar)F 3. Paradigmatic relation in syntax is alternatively called horizontal relation.(Paradigmatic relation is also called vertical relation; horizontal relation is a term for syntagmatic relation.)T 4. All human languages utilize a finite set of discrete units to form an infinite set of possible sentences.F 5. The English sentence "If only I could fly!" is in imperative mood. subjunctivemoodF 6. GOVERNMENT may be defined as the requirement that the form of two or morewords in a syntactic relationship should agree with each other. concordT 7. The SYNTAGMATIC RELATION is a relation between one item and others in a sequence, or between elements which are all present.T 8. The deep structure may be defined the abstract representation of the syntactic properties of a construction, i.e. the underlying level of structural relations between its different constituents, such as the relation between the underlying subject and its verbs, or a verb and its object.F 9. Categorization is the process of classifying our experiences into same categoriesbased on commonalities and differences. As a major ingredient in the creation of human knowledge, it allows us to relate present experiences to past ones.different categoriesF 10. The syntagmatic relation is also known as vertical relation. horizontal relationF 11. "Singing an English song" is an exocentric construction. endocentricconstructionT 12. Single words and clauses can both be constituents.IV. Define the following terms:1. IC analysisIC analysis. IC analysis (immediate constituent analysis) refers to the analysis of a sentence in terms of its immediate constituents ---- word groups ( or phrases), which are in turn analyzed into the immediate constituents of their own, and the process goes on until the ultimate constituents are reached. In practice, for the sake of convenience, we usually stop at the level of word.2. paradigmatic relationparadigmatic relation: Saussure originally called associative, is a relation holding between elements replaceable with each other at a particular place in a structure, or between one element present and the others absent.3. Lexical ambiguityLexical ambiguity: It refers to ambiguity explained by reference to lexical meanings. For example, “I went to the bank” is lexically ambiguous in the sense that “bank” in this sentence could refer to a business establishment or a slop of landing adjoining a river.4. Grammatical ambiguityGrammatical ambiguity: Grammatical ambiguity occurs when the grammatical structure of a sentence allows two different interpretations, each of which gives rise toa different meaning.5. Concord (or: Agreement)Concord (or: Agreement) could be defined as the requirement that the forms of two or more words in a syntactic relationship should agree with each other in terms of some categories. For example, in English the determiner and the noun it precedes should concord in number as in “this man”, “these men”; “book”, “same books”.6. endocentric constructionEndocentric construction is one kind of syntactic constructions whose distribution is functionally equivalent to that of one or more of its constituents, i.e., a word or a group of words, which serves as a definable centre or head. An endocentric construction is also known as a headed construction, for example, in the noun phrase “all these last few days”, days is the head. And this phrase is an endocentric construction.V. Questions:1. What is the aim of IC analysis? Make an IC analysis of the following sentence bymeans of either brackets or a tree diagram.北外2010My brother said Mary liked the handbag.The aim of IC analysis is to discover and demonstrate the interrelationships of the words in a linguistic structure—the sentence or the word-combination. The IC analysis views the sentence not just as a linear sequence of elements but as sequence made up of “layers”of immediate constituents, each lower-level constituent being part of a higher-level constituent.Though IC analysis, the internal structure of a sentence may be demonstrated clearly and ambiguities, if any, will be revealed.We can analyze the sentence like this:SNP VPVSˈNP VPN V NPDet N Det NMy mother said Mary liked the handbag. OrMy mother said Mary liked the handbag. 2. Why did Chomsky make the distinction between Deep and Surface structures?人大2006In generative grammar, deep structure is the abstract syntactic representation of a sentence, the underlying level of structural organization which specifies all the factors governing the way the sentence should be interpreted. On the other hand, surface structure is the final stage in the syntactic representation of a sentence, which provides the input to the phonological component of the grammar, and which thus most closely corresponds to the structure we articulate and hear.According to Chomsky, it is necessary to make the distinction, since it is helpful to differentiate and analyze syntactic structures such as "John is easy to please" and"John is eager to please", and also to disambiguate structures like "the shooting of the hunters". More importantly, it reflects two of the stages of how the language is processed through the generative grammar: the deep structure, which is an underlying structure, has to be transformed to the surface structure via a set of transformational rules.3.Try to identify the possible paradigmatic relation between any items in thefollowing poem by Lu Xun (i.e. tell if there is such a relation between which and which items).岂有豪情似旧时,花开花落两由之。

Chapter 5 Finite-Length discrete Transforms

Chapter 5 Finite-Length discrete Transforms

5.3 Relation between the DTFT and the DFT and the Their Inverses
The relation between the DTFT and the Npoint DFT of a length-N sequence.
Numerical computation of the DTFT using the DFT.
1 N
1
1 M
WN-1 WN-2
M
1
W -(N-1) N
Note: DN-1=DN*/N.
1 WN-2 WN-4
M
W -2(N-1) N
L 1
L
W -(N-1) N
L M
W -2(N-1) N M
L
W -(N-1)2 N
5.2.3 DFT Computation Using MATLAB
The functions to compute the DFT and the IDFT are FFT and IFFT.
Sampling to make the signal be discrete. Make the signal periodical by periodical
expanding.
Make a signal discrete and periodical
From DTFT to get DFT
g[n] cos(2 rn/ N), 0 r N 1
Using a trigonometric identity we can write:
g[n] 1
e e j2 rn/ N
j 2 rn / N
2
1 2
W rN N

数字信号处理第一章可就PDF版本

数字信号处理第一章可就PDF版本
Lab3 Discrete-Time Signals : FrequencyDomain Representations (离散时间信号的频域 分析)
Lab 4 Digital Processing of Continuous-Time Signals (连续时间信号的数字处理)
Lab 5 Digital Filter Design (数字滤波器设计) Lab 6 Digital Filter Implementation (数字滤波器
r (x,y) u (x,y) = g (x,y)
b (x,y)
r (x,y)
g (x,y)
b (x,y)
重点: 1-D信号的分类
问题1:离散时间信号就是数字信号,对吗? 问题2:采(抽)样信号是不是数字信号?若不
是,二者有何区别?
2
analog signal (模拟信号)
quantized boxcar signal (量化阶梯信号)
¾ 数字信号处理 —— 基于计算机的方法 (第3版). Sanjit K. Mitra 著, 阔永 红 改编. 电子工业出版社. 2006,3.
¾ 数字信号处理实验指导书 (MATLAB版). Sanjit K. Mitra 著,孙洪等译. 电子工业出版社. 2005, 1.
References
Exercises and Behavior (作业和平时): 10% Mid-term Exam (期中): 30% Final Exam (期末): 60%
Architecture of the course (课程体系)

离散时间信号的时域分析
号 分
离散时间傅里叶变换 (DTFT)

现代密码学中英文翻译(部分)

现代密码学中英文翻译(部分)

Table of ContentsModern Cryptography: Theory and PracticeBy Wenbo Mao Hewlett-Packard CompanyPublisher: Prentice Hall PTRPub Date: July 25, 2003ISBN: 0-13-066943-1Pages: 648Many cryptographic schemes and protocols, especially those based onpublic-keycryptography,have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects formany textbooks on cryptography. This book takes adifferent approach to introducingcryptography: it pays much more attention tofit-for-application aspects of cryptography. Itexplains why "textbook crypto" isonly good in an ideal world where data are random and badguys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world bydemonstratingnumerous attacks on such schemes, protocols and systems under variousrealworldapplication scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely,explains their working principles, discusses their practicalusages, and examines their strong(i.e., fit-for-application) security properties, oftenwith security evidence formally established.The book also includes self-containedtheoretical background material that is the foundation formodern cryptography.Table of ContentsModern Cryptography: Theory and PracticeBy Wenbo Mao Hewlett-Packard CompanyPublisher: Prentice Hall PTRPub Date: July 25, 2003ISBN: 0-13-066943-1Pages: 648CopyrightHewlett-Packard® Professional BooksA Short Description of the BookPrefaceScopeAcknowledgementsList of FiguresList of Algorithms, Protocols and AttacksPart I: IntroductionChapter 1. Beginning with a Simple Communication GameSection 1.1. A Communication GameSection 1.2. Criteria for Desirable Cryptographic Systems and Protocols Section 1.3. Chapter SummaryExercisesChapter 2. Wrestling Between Safeguard and AttackSection 2.1. IntroductionSection 2.2. EncryptionSection 2.3. Vulnerable Environment (the Dolev-Yao Threat Model)Section 2.4. Authentication ServersSection 2.5. Security Properties for Authenticated Key Establishment Section 2.6. Protocols for Authenticated Key Establishment Using Encryption Section 2.7. Chapter SummaryExercisesPart II: Mathematical Foundations: Standard NotationChapter 3. Probability and Information TheorySection 3.1. IntroductionSection 3.2. Basic Concept of ProbabilitySection 3.3. PropertiesSection 3.4. Basic CalculationSection 3.5. Random Variables and their Probability DistributionsSection 3.6. Birthday ParadoxSection 3.7. Information TheorySection 3.8. Redundancy in Natural LanguagesSection 3.9. Chapter SummaryExercisesChapter 4. Computational ComplexitySection 4.1. IntroductionSection 4.2. Turing MachinesSection 4.3. Deterministic Polynomial TimeSection 4.4. Probabilistic Polynomial TimeSection 4.5. Non-deterministic Polynomial TimeSection 4.6. Non-Polynomial BoundsSection 4.7. Polynomial-time IndistinguishabilitySection 4.8. Theory of Computational Complexity and Modern Cryptography Section 4.9. Chapter SummaryExercisesChapter 5. Algebraic FoundationsSection 5.1. IntroductionSection 5.2. GroupsSection 5.3. Rings and FieldsSection 5.4. The Structure of Finite FieldsSection 5.5. Group Constructed Using Points on an Elliptic CurveSection 5.6. Chapter SummaryExercisesChapter 6. Number TheorySection 6.1. IntroductionSection 6.2. Congruences and Residue ClassesSection 6.3. Euler's Phi FunctionSection 6.4. The Theorems of Fermat, Euler and LagrangeSection 6.5. Quadratic ResiduesSection 6.6. Square Roots Modulo IntegerSection 6.7. Blum IntegersSection 6.8. Chapter SummaryExercisesPart III: Basic Cryptographic TechniquesChapter 7. Encryption — Symmetric TechniquesSection 7.1. IntroductionSection 7.2. DefinitionSection 7.3. Substitution CiphersSection 7.4. Transposition CiphersSection 7.5. Classical Ciphers: Usefulness and SecuritySection 7.6. The Data Encryption Standard (DES)Section 7.7. The Advanced Encryption Standard (AES)Section 7.8. Confidentiality Modes of OperationSection 7.9. Key Channel Establishment for Symmetric Cryptosystems Section 7.10. Chapter SummaryExercisesChapter 8. Encryption — Asymmetric TechniquesSection 8.1. IntroductionSection 8.2. Insecurity of "Textbook Encryption Algorithms"Section 8.3. The Diffie-Hellman Key Exchange ProtocolSection 8.4. The Diffie-Hellman Problem and the Discrete Logarithm Problem Section 8.5. The RSA Cryptosystem (Textbook Version)Section 8.6. Cryptanalysis Against Public-key CryptosystemsSection 8.7. The RSA ProblemSection 8.8. The Integer Factorization ProblemSection 8.9. Insecurity of the Textbook RSA EncryptionSection 8.10. The Rabin Cryptosystem (Textbook Version)Section 8.11. Insecurity of the Textbook Rabin EncryptionSection 8.12. The ElGamal Cryptosystem (Textbook Version)Section 8.13. Insecurity of the Textbook ElGamal EncryptionSection 8.14. Need for Stronger Security Notions for Public-key CryptosystemsSection 8.15. Combination of Asymmetric and Symmetric CryptographySection 8.16. Key Channel Establishment for Public-key CryptosystemsSection 8.17. Chapter SummaryExercisesChapter 9. In An Ideal World: Bit Security of The Basic Public-Key Cryptographic Functions Section 9.1. IntroductionSection 9.2. The RSA BitSection 9.3. The Rabin BitSection 9.4. The ElGamal BitSection 9.5. The Discrete Logarithm BitSection 9.6. Chapter SummaryExercisesChapter 10. Data Integrity TechniquesSection 10.1. IntroductionSection 10.2. DefinitionSection 10.3. Symmetric TechniquesSection 10.4. Asymmetric Techniques I: Digital SignaturesSection 10.5. Asymmetric Techniques II: Data Integrity Without Source Identification Section 10.6. Chapter SummaryExercisesPart IV: AuthenticationChapter 11. Authentication Protocols — PrinciplesSection 11.1. IntroductionSection 11.2. Authentication and Refined NotionsSection 11.3. ConventionSection 11.4. Basic Authentication TechniquesSection 11.5. Password-based AuthenticationSection 11.6. Authenticated Key Exchange Based on Asymmetric CryptographySection 11.7. Typical Attacks on Authentication ProtocolsSection 11.8. A Brief Literature NoteSection 11.9. Chapter SummaryExercisesChapter 12. Authentication Protocols — The Real WorldSection 12.1. IntroductionSection 12.2. Authentication Protocols for Internet SecuritySection 12.3. The Secure Shell (SSH) Remote Login ProtocolSection 12.4. The Kerberos Protocol and its Realization in Windows 2000Section 12.5. SSL and TLSSection 12.6. Chapter SummaryExercisesChapter 13. Authentication Framework for Public-Key CryptographySection 13.1. IntroductionSection 13.2. Directory-Based Authentication FrameworkSection 13.3. Non-Directory Based Public-key Authentication FrameworkSection 13.4. Chapter SummaryExercisesPart V: Formal Approaches to Security EstablishmentChapter 14. Formal and Strong Security Definitions for Public-Key Cryptosystems Section 14.1. IntroductionSection 14.2. A Formal Treatment for SecuritySection 14.3. Semantic Security — the Debut of Provable SecuritySection 14.4. Inadequacy of Semantic SecuritySection 14.5. Beyond Semantic SecuritySection 14.6. Chapter SummaryExercisesChapter 15. Provably Secure and Efficient Public-Key CryptosystemsSection 15.1. IntroductionSection 15.2. The Optimal Asymmetric Encryption PaddingSection 15.3. The Cramer-Shoup Public-key CryptosystemSection 15.4. An Overview of Provably Secure Hybrid CryptosystemsSection 15.5. Literature Notes on Practical and Provably Secure Public-key Cryptosystems Section 15.6. Chapter SummarySection 15.7. ExercisesChapter 16. Strong and Provable Security for Digital SignaturesSection 16.1. IntroductionSection 16.2. Strong Security Notion for Digital SignaturesSection 16.3. Strong and Provable Security for ElGamal-family SignaturesSection 16.4. Fit-for-application Ways for Signing in RSA and RabinSection 16.5. SigncryptionSection 16.6. Chapter SummarySection 16.7. ExercisesChapter 17. Formal Methods for Authentication Protocols AnalysisSection 17.1. IntroductionSection 17.2. Toward Formal Specification of Authentication ProtocolsSection 17.3. A Computational View of Correct Protocols — the Bellare-Rogaway Model Section 17.4. A Symbolic Manipulation View of Correct ProtocolsSection 17.5. Formal Analysis Techniques: State System ExplorationSection 17.6. Reconciling Two Views of Formal Techniques for SecuritySection 17.7. Chapter SummaryExercisesPart VI: Cryptographic ProtocolsChapter 18. Zero-Knowledge ProtocolsSection 18.1. IntroductionSection 18.2. Basic DefinitionsSection 18.3. Zero-knowledge PropertiesSection 18.4. Proof or Argument?Section 18.5. Protocols with Two-sided-errorSection 18.6. Round EfficiencySection 18.7. Non-interactive Zero-knowledgeSection 18.8. Chapter SummaryExercisesChapter 19. Returning to "Coin Flipping Over Telephone"Section 19.1. Blum's "Coin-Flipping-By-Telephone" ProtocolSection 19.2. Security AnalysisSection 19.3. EfficiencySection 19.4. Chapter SummaryChapter 20. AfterremarkBibliographyCopyrightLibrary of Congress Cataloging-in-Publication DataA CIP catalog record for this book can be obtained from the Library of Congress. Editorial/production supervision: Mary SudulCover design director: Jerry VottaCover design: Talar BoorujyManufacturing manager: Maura ZaldivarAcquisitions editor: Jill HarryMarketing manager: Dan DePasqualePublisher, Hewlett-Packard Books: Walter BruceA Short Description of the BookMany cryptographic schemes and protocols, especially those based on public-key cryptography,have basic or so-called "textbook crypto" versions, as these versions are usually the subjects formany textbooks on cryptography. This book takes a different approach to introducingcryptography: it pays much more attention to fit-for-application aspects of cryptography. Itexplains why "textbook crypto" is only good in an ideal world where data are random and badguys behave nicely. It reveals the general unfitness of "textbook crypto" for the real world bydemonstrating numerous attacks on such schemes, protocols and systems under various realworldapplication scenarios. This book chooses to introduce a set of practical cryptographicschemes, protocols and systems, many of them standards or de facto ones, studies them closely,explains their working principles, discusses their practical usages, and examines their strong(i.e., fit-for-application) security properties, often with security evidence formally established.The book also includes self-contained theoretical background material that is the foundation formodern cryptography.PrefaceOur society has entered an era where commerce activities, business transactions andgovernment services have been, and more and more of them will be, conducted and offered overopen computer and communications networks such as the Internet, in particular, viaWorldWideWeb-based tools. Doing things online has a great advantage of an always-onavailability to people in any corner of the world. Here are a few examples of things that havebeen, can or will be done online:Banking, bill payment, home shopping, stock trading, auctions, taxation, gambling, micropayment(e.g., pay-per-downloading), electronic identity, online access to medical records, virtual private networking, secure data archival and retrieval, certified delivery of documents, fair exchange of sensitive documents, fair signing of contracts,time-stamping,notarization, voting, advertising, licensing, ticket booking, interactive games, digitallibraries, digital rights management, pirate tracing, …And more can be imagined.Many cryptographic schemes and protocols, especially those based onpublic-keycryptography,have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects formany textbooks on cryptography. This book takes adifferent approach to introducingcryptography: it pays much more attention tofit-for-application aspects of cryptography. Itexplains why "textbook crypto" isonly good in an ideal world where data are random and badguys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world bydemonstratingnumerous attacks on such schemes, protocols and systems under variousrealworldapplication scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely,explains their working principles, discusses their practicalusages, and examines their strong(i.e., fit-for-application) security properties, oftenwith security evidence formally established.The book also includes self-containedtheoretical background material that is the foundation formodern cryptography.PrefaceOur society has entered an era where commerce activities, business transactions andgovernment services have been, and more and more of them will be, conducted and offered overopen computer and communications networks such as the Internet, in particular, viaWorldWideWeb-based tools. Doing things online has a great advantage of an always-onavailability to people in any corner of the world. Here are a few examples of things that havebeen, can or will be done online:Banking, bill payment, home shopping, stock trading, auctions, taxation, gambling, micropayment(e.g., pay-per-downloading), electronic identity, online access to medical records, virtual private networking, secure data archival and retrieval, certified delivery of documents, fair exchange of sensitive documents, fair signing of contracts,time-stamping,notarization, voting, advertising, licensing, ticket booking, interactive games, digitallibraries, digital rights management, pirate tracing, …And more can be imagined.Fascinating commerce activities, transactions and services like these are only possible ifcommunications over open networks can be conducted in a secure manner. An effective solutionto securing communications over open networks is to apply cryptography. Encryption, digitalsignatures, password-based user authentication, are some of the most basic cryptographictechniques for securing communications. However, as we shall witness many times in this book,there are surprising subtleties and serious security consequences in the applicationsof even themost basic cryptographic techniques. Moreover, for many "fancier" applications, such as manylisted in the preceding paragraph, the basic cryptographic techniques are no longer adequate.With an increasingly large demand for safeguarding communications over open networks formore and more sophisticated forms of electronic commerce, business and services[a], anincreasingly large number of information security professionals will be needed for designing,developing, analyzing and maintaining information security systems and cryptographicprotocols. These professionals may range from IT systems administrators, information securityengineers and software/hardware systems developers whose products have securityrequirements, to cryptographers.[a] Gartner Group forecasts that total electronic business revenues for business to business (B2B) andbusiness to consumer (B2C) in the European Union will reach a projected US $2.6 trillion in 2004 (withprobability 0.7) which is a 28-fold increase from the level of 2000 [5]. Also, eMarketer [104] (page 41) reportsthat the cost to financial institutions (in USA) due to electronic identity theft was US $1.4 billion in 2002, andforecasts to grow by a compound annual growth rate of 29%.In the past few years, the author, a technical consultant on information security and cryptographic systems at Hewlett-Packard Laboratories in Bristol, has witnessed the phenomenon of a progressively increased demand for information security professionalsunmatched by an evident shortage of them. As a result, many engineers, who are oriented toapplication problems and may have little proper training in cryptography and informationsecurity have become "roll-up-sleeves" designers and developers for information securitysystems or cryptographic protocols. This is in spite of the fact that designing cryptographicsystems and protocols is a difficult job even for an expert cryptographer.The author's job has granted him privileged opportunities to review many information securitysystems and cryptographic protocols, some of them proposed and designed by "roll-up-sleeves"engineers and are for uses in serious applications. In several occasions, the author observed socalled"textbook crypto" features in such systems, which are the result of applications of cryptographic algorithms and schemes in ways they are usually introduced in many cryptographic textbooks. Direct encryption of a password (a secret number of a smallmagnitude) under a basic public-key encryption algorithm (e.g., "RSA") is a typical example oftextbook crypto. The appearances of textbook crypto in serious applications with a "nonnegligibleprobability" have caused a concern for the author to realize that the general danger oftextbook crypto is not widely known to many people who design and develop informationsecurity systems for serious real-world applications.Motivated by an increasing demand for information security professionals and a belief that theirknowledge in cryptography should not be limited to textbook crypto, the author has written thisbook as a textbook on non-textbook cryptography. This book endeavors to: Introduce a wide range of cryptographic algorithms, schemes and protocols with a particular emphasis on their non-textbook versions.Reveal general insecurity of textbook crypto by demonstrating a large number of attacks onand summarizing typical attacking techniques for such systems.Provide principles and guidelines for the design, analysis and implementation of cryptographic systems and protocols with a focus on standards.Study formalism techniques and methodologies for a rigorous establishment of strong andfit-for-application security notions for cryptographic systems and protocols. Include self-contained and elaborated material as theoretical foundations of modern cryptography for readers who desire a systematic understanding of the subject.ScopeModern cryptography is a vast area of study as a result of fast advances made in the past thirtyyears. This book focuses on one aspect: introducing fit-for-application cryptographic schemesand protocols with their strong security properties evidently established.The book is organized into the following six parts:Part I This part contains two chapters (1—2) and serves an elementary-level introductionfor the book and the areas of cryptography and information security. Chapter 1 begins witha demonstration on the effectiveness of cryptography in solving a subtle communicationproblem. A simple cryptographic protocol (first protocol of the book) for achieving "fair cointossing over telephone" will be presented and discussed. This chapter then carries on toconduct a cultural and "trade" introduction to the areas of study. Chapter 2 uses a series ofsimple authentication protocols to manifest an unfortunate fact in the areas: pitfalls areeverywhere.As an elementary-level introduction, this part is intended for newcomers to the areas.Part II This part contains four chapters (3—6) as a set of mathematical background knowledge, facts and basis to serve as a self-contained mathematical reference guide forthe book. Readers who only intend to "knowhow," i.e., know how to use thefit-forapplicationcrypto schemes and protocols, may skip this part yet still be able to follow most contents of the rest of the book. Readers who also want to "know-why," i.e., know whythese schemes and protocols have strong security properties, may find that this selfcontainedmathematical part is a sufficient reference material. When we present working principles of cryptographic schemes and protocols, reveal insecurity for some of them andreason about security for the rest, it will always be possible for us to refer to a precise pointin this part of the book for supporting mathematical foundations.This part can also be used to conduct a systematic background study of the theoreticalfoundations for modern cryptography.Part III This part contains four chapters (7—10) introducing the most basic cryptographicalgorithms and techniques for providing privacy and data integrity protections. Chapter 7 isfor symmetric encryption schemes, Chapter 8, asymmetric techniques. Chapter 9 considersan important security quality possessed by the basic and popular asymmetric cryptographicfunctions when they are used in an ideal world in which data are random. Finally, Chapter10 covers data integrity techniques.Since the schemes and techniques introduced here are the most basic ones, manyof themare in fact in the textbook crypto category and are consequently insecure. While the schemes are introduced, abundant attacks on many schemes will be demonstrated withwarning remarks explicitly stated. For practitioners who do not plan to proceed with an indepthstudy of fit-for-application crypto and their strong security notions, this textbook crypto part will still provide these readers with explicit early warning signals on the generalinsecurity of textbook crypto.Part IV This part contains three chapters (11—13) introducing an important notion inapplied cryptography and information security: authentication. These chapters provide awide coverage of the topic. Chapter 11 includes technical background, principles, a series ofbasic protocols and standards, common attacking tricks and prevention measures. Chapter12 is a case study for four well-known authentication protocol systems for real world applications. Chapter 13 introduces techniques which are particularly suitable for openfor-application) security properties, oftenwith security evidence formally established.The book also includes self-containedtheoretical background material that is the foundation formodern cryptography.systems which cover up-to-date and novel techniques.Practitioners, such as information security systems administration staff in an enterprise andsoftware/hardware developers whose products have security consequences may find thispart helpful.Part V This part contains four chapters (14—17) which provide formalism and rigoroustreatments for strong (i.e., fit-for-application) security notions for public-key cryptographictechniques (encryption, signature and signcryption) and formal methodologies for theanalysis of authentication protocols. Chapter 14 introduces formal definitions of strongsecurity notions. The next two chapters are fit-for-application counterparts to textbookcrypto schemes introduced in Part III, with strong security properties formally established(i.e., evidently reasoned). Finally, Chapter 17 introduces formal analysismethodologiesand techniques for the analysis of authentication protocols, which we have not been able todeal with in Part IV.Part VI This is the final part of the book. It contains two technical chapters (18—19) and ashort final remark (Chapter 20). The main technical content of this part, Chapter 18, introduces a class of cryptographic protocols called zero-knowledge protocols. Theseprotocols provide an important security service which is needed in various "fancy" electronic commerce and business applications: verification of a claimed property of secretdata (e.g., in conforming with a business requirement) while preserving a strict privacyquality for the claimant. Zero-knowledge protocols to be introduced in this part exemplifythe diversity of special security needs in various real world applications, which are beyondconfidentiality, integrity, authentication and non-repudiation. In the final technical chapterof the book (Chapter 19) we will complete our job which has been left over from the firstprotocol of the book: to realize "fair coin tossing over telephone." That final realization willachieve a protocol which has evidently-established strong security properties yet with anefficiency suitable for practical applications.Needless to say, a description for each fit-for-application crypto scheme or protocol has to beginwith a reason why the textbook crypto counterpart is unfit for application. Invariably, thesereasons are demonstrated by attacks on these schemes or protocols, which, by the nature ofattacks, often contain a certain degree of subtleties. In addition, a description of a fit-forapplicationscheme or protocol must also end at an analysis that the strong (i.e.,fit-forapplication)security properties do hold as claimed. Consequently, some parts of this book inevitably contain mathematical and logical reasonings, deductions and transformations in orderto manifest attacks and fixes.While admittedly fit-for-application cryptography is not a topic for quick mastery or that can bemastered via light reading, this book, nonetheless, is not one for in-depth researchtopics whichwill only be of interest to specialist cryptographers. The things reported and explained in it arewell-known and quite elementary to cryptographers. The author believes that they can also becomprehended by non-specialists if the introduction to the subject is provided with plenty ofexplanations and examples and is supported by self-contained mathematical background andreference material.The book is aimed at the following readers.Students who have completed, or are near to completion of, first degree courses in computer, information science or applied mathematics, and plan to pursue a career ininformation security. For them, this book may serve as an advanced course in appliedcryptography.Security engineers in high-tech companies who are responsible for the design and development of information security systems. If we say that the consequence of textbookcrypto appearing in an academic research proposal may not be too harmful since the worstcase of the consequence would be an embarrassment, then the use of textbook crypto in aninformation security product may lead to a serious loss. Therefore, knowing the unfitness oftextbook crypto for real world applications is necessary for these readers. Moreover, thesereaders should have a good understanding of the security principles behind thefit-forapplicationschemes and protocols and so they can apply the schemes and the principles correctly. The self-contained mathematical foundations material in Part II makes the book asuitable self-teaching text for these readers.Information security systems administration staff in an enterprise andsoftware/hardwaresystems developers whose products have security consequences. For these readers, Part Iis a simple and essential course for cultural and "trade" training; Parts III and IV form asuitable cut-down set of knowledge in cryptography and information security. These threeparts contain many basic crypto schemes and protocols accompanied with plenty of attacking tricks and prevention measures which should be known to and can be grasped by。

Digital Signal ProcessingChapter5

Digital Signal ProcessingChapter5

15
Effect of Sampling in the Frequency Domain
• To derive the form of G p ( j) • we note that p(t) can be expressed as a Fourier series:
jT kt j (2 / T ) kt 1 p(t ) k e T k e 1 T
Chapter 5 Digital Processing of Continuous-Time Signals
Digital Processing of Continuous-Time Signals
• Digital processing of a continuous-time signal involves the following basic steps: (1) Conversion of the continuous-time signal into a discrete-time signal, (2) Processing of the discrete-time signal, (3) Conversion of the processed discretetime signal back into a continuous-time signal
19
Effect of Sampling in the Frequency Domain
• Illustration of the frequency-domain effects of time-domain sampling
20
Effect of Sampling g of Continuous-Time Signals
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

M-1
x[n] y[n],
0 n N 1
4.2 Sampling the DTFT
y[n]
m
x(n mN )
x ( n)
n M-1

0 1 2
x '(n)
0 1 2
N
n
the length of x(n) M > N
4.2 Sampling the DTFT
Finite length
X (s)
DTFT:
jt
x ( n) X ( k )
DFT:
DFT ( )
Fourier Transform:
X ( ) x( t )e


dt
X ( )
n


x(n)e j n
j n
X (k ) x(n)e
k 0
n 0
L 1
2 j nk N
,0 k N 1;
N反映DFT点数 L反映序列长度

L和N可以相等,也可以不等;若L<N, 可以对 输入序列补零,使补零后序列长度等于N
1. Definition
1. Definition
1. Definition
2. Matrix Relations
Chapter 5
Finite-Length Discrete Transforms
Review of Transforms
Analog Signal
x(t ) X ()
L () F () DTFT ( ) Z ()
Discrete-time Signal
x(n) X ( ) X ( z)
0 Re WN
3)对称性
4) W
N 2 N
WN
(k
N ) 2
k WN
3 WN 2 WN
1 WN
W
N 2 N
N 8
1
2n n W W N 5) N 2
1. Definition
1. Definition
1. Definition

长度为L的序列x[n]的N点DFT
X (k ) x(n)e
4.1 DTFT from DFT by interpolation
4.1 DTFT from DFT by interpolation
4.2 Sampling the DTFT
4.2 Sampling the DTFT
4.2 Sampling the DTFT
Y[k]
4.2 Sampling the DTFT
2. Matrix Relations
2. Matrix Relations
2. Matrix Relations
3. DFT Computation Using MATLAB



The functions to compute the DFT and the IDFT are fft and ifft These functions make use of FFT algorithms which are computationally highly efficient compared with the direct computation Figure in the next slide shows the DFT and DTFT of the sequence cos(6πn/16) 0≤n≤15
Part A: Discrete Fourier Transform (DFT)

Definition
Matrix Relations
DFT Computation Using MATLAB
Relation between DTFT and DFT and their
inverses
Chapter 5 Finite-Length Discrete Transforms
x(n+4)
0
1
2
3
4
5
x(n)
0
1
2
3
4
5
x(n-4)
0
1
2
3
4
5
y(n)
4
6
2
3
4.3 Numerical Computation of the DTFT using DFT
4.3 Numerical Computation of the DTFT using DFT
通过末尾补 零增加序列 长度
N 1
j
2 nk N
x( t ) X ( )e


j t
d 2
x(n) X ( )e


d 2
0 k N 1;
2 j nk 1 N 1 x(n) X (k )e N N k 0 0 n N 1.
Laplace Transform:
1. Definition
1. Definition
1. Definition
twiddle factor (旋转因子)
WN e
j 2 N
j Im
( n N ) k N
1)周期性 W
nk N
W
W
n( k N ) N
4 WN
5 WN
6 WN 7 WN
nk ( N n)k n( N k ) ( W ) W W 2)共轭性 N N N
4.2 Sampling the DTFT
y(n)
m
x(n mN )
x ( n)
n

0 1 2
M-1
x '(n)
0 1 2
M-1 N
n
the length of x(n)
M N
the length of x(n)
M N
x ( n)
'
0 1 2
N
n
y ( n)
n
0 1 2
5.2 The Discrete Fourier Transform 5.3 Relation Between the FT and the DFT 5.4 Circular Convolution 5.5 Classification of Finite-Length Sequences 5.6 DFT Symmetry Relations 5.7 Discrete Fourier Transform Theorems 5.8 Fourier-Domain Filtering 5.9 Computation of the DFT of Real Sequences 5.10 Linear Convolution using the DFT
4.3 Numerical Computation of the DTFT using DFT
Example
3n x[n] cos( ), 8
0 n 15
Homework
Problems: 5.2,5.9,5.10, 5.20, 5.25,5.28, 5.43,5.45, 5.55
3. DFT Computation Using MATLAB
4. Relatiheir inverses
4.1 DTFT from DFT by interpolation
4.1 DTFT from DFT by interpolation
Z-Transform:
X (s) x(t )est dt


X ( z)
n
x(n)z

n
Ch.5 Finite-Length Discrete Transforms

Part A: Discrete Fourier Transform (DFT) Part B: Operations on Finite-Length Sequences and Discrete Fourier Transform Properties
相关文档
最新文档