毕业设计(论文)外文参考文献译文本

合集下载

毕业设计外文翻译译文

毕业设计外文翻译译文

1 工程概论1.1 工程专业1.2 工业和技术1.3 现代制造业工程专业1 工程行业是历史上最古老的行业之一。

如果没有在广阔工程领域中应用的那些技术,我们现在的文明绝不会前进。

第一位把岩石凿削成箭和矛的工具匠是现代机械工程师的鼻祖。

那些发现地球上的金属并找到冶炼和使用金属的方法的工匠们是采矿和冶金工程师的先祖。

那些发明了灌溉系统并建造了远古世纪非凡的建筑物的技师是他们那个时代的土木工程师。

2 工程一般被定义为理论科学的实际应用,例如物理和数学。

许多早期的工程设计分支不是基于科学而是经验信息,这些经验信息取决于观察和经历,而不是理论知识。

这是一个倾斜面实际应用的例子,虽然这个概念没有被确切的理解,但是它可以被量化或者数字化的表达出来。

3 从16、17世纪当代初期,量化就已经成为科学知识大爆炸的首要原因之一。

另外一个重要因素是实验法验证理论的发展。

量化包含了把来源于实验的数据和信息转变成确切的数学术语。

这更加强调了数学是现代工程学的语言。

4 从19世纪开始,它的结果的实际而科学的应用已经逐步上升。

机械工程师现在有精确的能力去计算来源于许多不同机构之间错综复杂的相互作用的机械优势。

他拥有能一起工作的既新型又强硬的材料和巨大的新能源。

工业革命开始于使用水和蒸汽一起工作。

从此使用电、汽油和其他能源作动力的机器变得如此广泛以至于它们承担了世界上很大比例的工作。

5 科学知识迅速膨胀的结果之一就是科学和工程专业的数量的增加。

到19世纪末不仅机械、土木、矿业、冶金工程被建立而且更新的化学和电气工程专业出现了。

这种膨胀现象一直持续到现在。

我们现在拥有了核能、石油、航天航空空间以及电气工程等。

每种工程领域之内都有细分。

6 例如,土木工程自身领域之内有如下细分:涉及永久性结构的建筑工程、涉及水或其他液体流动与控制系统的水利工程、涉及供水、净化、排水系统的研究的环境工程。

机械工程主要的细分是工业工程,它涉及的是错综复杂的机械系统,这些系统是工业上的,而非单独的机器。

毕业设计外文翻译模板

毕业设计外文翻译模板

本科生毕业设计(论文)外文翻译毕业设计(论文)题目:组合钻床动力滑台液压系统及电控系统设计外文题目: Drilling machine译文题目:组合钻床学生姓名:马莉莉专业:机械设计制造及其自动化0701班指导教师姓名:王洁评阅日期:正文内容小四号字,宋体,行距1.5倍行距。

The drilling machine is a machine for making holes with removal of chips and it is used to create or enlarge holes. There are many different types of drilling machine for different jobs, but they can be basically broken down into two categories.The bench drill is used for drilling holes through raw materials such as wood, plastic and metal and gets its name because it is bolted to bench for stability so that larger pieces of work can be drilled safely. The pillar drill is a larger version that stands upright on the floor. It can do exactly the same work as the bench drill, but because of its size it can be used to drill larger pieces of materials and produce bigger holes. Most modern drilling machines are digitally automated using the latest computer numerical control (CNC) technology.Because they can be programmed to produce precise results, over and over again, CNC drilling machines are particularly useful for pattern hole drilling, small hole drilling and angled holes.If you need your drilling machine to work at high volume, a multi spindle drill head will allow you to drill many holes at the same time. These are also sometimes referred to as gang drills.Twist drills are suitable for wood, metal and plastics and can be used for both hand and machine drilling, with a drill set typically including sizes from 1mm to 14mm. A type of drill machine known as the turret stores tools in the turret and positions them in the order needed for work.Drilling machines, which can also be referred to as bench mounted drills or floor standing drills are fixed style of drills that may be mounted on a stand or bolted to the floor or workbench. A drilling machine consists of a base, column, table, spindle), and drill head, usually driven by an induction motor.The head typically has a set of three which radiate from a central hub that, when turned, move the spindle and chuck vertically, parallel to the axis of the column. The table can be adjusted vertically and is generally moved by a rack and pinion. Some older models do however rely on the operator to lift and re clamp the table in position. The table may also be offset from the spindles axis and in some cases rotated to a position perpendicular to the column.The size of a drill press is typically measured in terms of swing which can be is defined as twice the throat distance, which is the distance from the centre of the spindle to the closest edge of the pillar. Speed change on these drilling machines is achieved by manually moving a belt across a stepped pulley arrangement.Some drills add a third stepped pulley to increase the speed range. Moderndrilling machines can, however, use a variable-speed motor in conjunction with the stepped-pulley system. Some machine shop drilling machines are equipped with a continuously variable transmission, giving a wide speed range, as well as the ability to change speed while the machine is running.Machine drilling has a number of advantages over a hand-held drill. Firstly, it requires much less to apply the drill to the work piece. The movement of the chuck and spindle is by a lever working on a rack and pinion, which gives the operator considerable mechanical advantage.The use of a table also allows a vice or clamp to be used to position and restrain the work. This makes the operation much more secure. In addition to this, the angle of the spindle is fixed relative to the table, allowing holes to be drilled accurately and repetitively.Most modern drilling machines are digitally automated using the latest computer numerical control (CNC) technology. Because they can be programmed to produce precise results, over and over again, CNC drilling machines are particularly useful for pattern hole drilling, small hole drilling and angled holes.Drilling machines are often used for miscellaneous workshop tasks such as sanding, honing or polishing, by mounting sanding drums, honing wheels and various other rotating accessories in the chuck. To add your products click on the traders account link above.You can click on the links below to browse for new, used or to hire a drilling machine.Drilling machines are used for drilling, boring, countersinking, reaming, and tapping. Several types are used in metalworking: vertical drilling machines, horizontal drilling machines, center-drilling machines, gang drilling machines, multiple-spindle drilling machines, and special-purpose drilling machines.Vertical drilling machines are the most widely used in metalworking. They are used to make holes in relatively small work-pieces in individual and small-lot production; they are also used in maintenance shops. The tool, such as a drill, countersink, or reamer, is fastened on a vertical spindle, and the work-piece is secured on the table of the machine. The axes of the tool and the hole to be drilled are aligned by moving the workpiece. Programmed control is also used to orient the workpiece and to automate the operation. Bench-mounted machines, usually of the single-spindle type, are used to make holes up to 12 mm in diameter, for instance, in instrument-making.Heavy and large workpieces and workpieces with holes located along a curved edge are worked on radial drilling machines. Here the axes of the tool and the hole to be drilled are aligned by moving the spindle relative to the stationary work-piece.Horizontal drilling machines are usually used to make deep holes, for instance, in axles, shafts, and gun barrels for firearms and artillery pieces.Center-drilling machines are used to drill centers in the ends of blanks. They are sometimes equipped with supports that can cut off the blank before centering, and in such cases they are called center-drilling machines. Gang drilling machines with more than one drill head are used to produce several holes at one time. Multiple-spindle drilling machines feature automation of the work process. Such machines can be assembled from several standardized, self-contained heads with electric motors and reduction gears that rotate the spindle and feed the head. There are one-, two-, and three-sidedmultiple-spindle drilling machines with vertical, horizontal, and inclined spindles for drilling and tapping. Several dozen such spindles may be mounted on a single machine. Special-purpose drilling machines, on which a limited range of operations is performed, are equipped with various automated devices.Multiple operations on workpieces are performed by various combination machines. These include one- and two-sided jig boring machines,drilling-tapping machines (usually gang drilling machines with reversible thread-cutting spindles), milling-type drilling machines and drilling-mortising machines used mainly for woodworking, and automatic drilling machines.In woodworking much use is made of single- and multiple-spindle vertical drilling machines, one- and two-sided, horizontal drilling machines (usually with multiple spindles), and machines equipped with a swivel spindle that can be positioned vertically and horizontally. In addition to drilling holes, woodworking machines may be used to make grooves, recesses, and mortises and to remove knots.英文翻译指导教师评阅意见。

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1.doc

山东建筑大学本科毕业设计说明书外文文献及翻译格式模版1附件3:(本科毕业论文)文献、资料题目:院(部)专班姓名:张三学号:指导教师:张九光翻译日期:2005.6.30,the National Institute of Standards and Technology (NIST) has been working to develop a new encryption standard to keep government information secure .The organization is in the final stages of an open process of selecting one or more algorithms ,or data-scrambling formulas ,for the new Advanced Encryption Standard (AES) and plans to make adecision by late summer or early fall .The standard is slated to go into effect next year .AES is intended to be a stronger ,more efficient successor to Triple Data Encryption Standard (3DES),which replaced the aging DES ,which was cracked in less than three days in July 1998.“Until we have the AES ,3DES will still offer protection for years to come .So there is no need to immediately switch over ,”says Edward Roback ,acting chief of the computer security division at NIST and chairman of the AES selection committee .“What AES will offer is a more efficient algorithm .It will be a federal standard ,but it will be widely implemented in the IT community .”According to Roback ,efficiency of the proposed algorithms is measured by how fast they can encrypt and decrypt information ,how fast they can present an encryption key and how much information they can encrypt .The AES review committee is also looking at how much space the algorithm takes up on a chip and how much memory it requires .Roback says the selection of a more efficient AES will also result in cost savings and better use of resources .“DES w as designed for hardware implementations ,and we are now living in a world of much more efficient software ,and we have learned an awful lot about the design of algorithms ,”says Roback .“When you start multiplying this with the billions of implementations done daily ,the saving on overhead on the networks will be enormous .”……山东建筑大学毕业设计(或毕业论文,二选一)外文文献及译文- 1 -以确保政府的信息安全。

转向架毕业设计外文翻译

转向架毕业设计外文翻译

(3)
Flateral 是横向力,Fflange 是接触点 B 处的法向力,FN 是接触处的法向力点 A,Fcreep
是接触点 A 处的蠕变力. 是法兰角,这里为 70 度, 是车轮踏面上的轮轨接触角。
在窄弯道中的两点接触的情况下,点 B 围绕点 A 滑动。 图 11 中的 b 是滑动臂。在 这些条件下,凸缘磨损取决于轮缘力 Fflange 和滑臂 b [21]。基于如图 11 所示的车轮
如图 10 所示。在这种情况下,轮轨接触状态如图 11 所示。接触点 A 主要维持垂直
力 Fvertical ,接触点 B 维持横向力 Flateral 。当车辆以非常低的速度行驶时,横向力 Flateral 可以由以下公式计算:
Flateral Fflange cos FN sin Fcreep
6
时,迎角和横向力随着曲线半径的减小而快速增加,并且在 300m 曲线半径处横向
力为 37kN。这与测试数据类似,如图 5 所示。
为了说明当车辆通过窄曲线进行洽谈时的车辆动态行为,轮对的位移和攻角在
图 27 和 28 中给出。当车辆通过窄曲线时,车轮和轨道之间的蠕变力不足以导致轮
对的径向对准,使得轮对可以朝向高轨移动并且攻角将增大,横向力也将显着增加,
再成型周期中是相似的,因此可以看出,轮缘磨损量随着再成型周期而增加。
测量车已被用于测量车轮/轨道侧向力,如图 5 所示。可以看出,在高轨处的横 向力远大于在低轨处的横向力。 尽管测量车不同于正常车辆,但可以说速度对车轮 横向力的影响很小。在高轨上的高横向力是轨距角磨损的一个很好的指示器。
3
图 1.铁路轨距角磨损
图 2.磨损的轨道型材
表 1.列车和轨道的基本参数
车辆最大运行速度 操作速度 轨距 轨道倾角 调查的铁轨斜面 背靠背轮副的尺寸 车轮轮廓类型 铁轨类型 3mm 等效维度的轮对横向位移 轮距

毕业设计英文翻译原文

毕业设计英文翻译原文

编号:毕业设计(论文)外文翻译(原文)院(系):计算机科学与工程学院专业:自动化学生姓名:肖健学号:0600320126指导教师单位:计算机科学与工程学院姓名:王改云职称:教授2010年6月1日The Application of Visualization Technology in ElectricPower Automation SystemWang Chuanqi, Zou QuanxiElectric Power Automation System Department of Yantai Dongfang Electronics Information IndustryCo., Ltd.Abstract: Isoline chart is widely used chart. The authors have improved the existing isoline formation method, proposed a simple and practical isoline formation method, studied how to fill the isoline chart, brought about a feasible method of filling the isoline chart and discussed the application of isoline chart in electric power automation system.Key words: Visualization; Isoline; Electric power automation systemIn the electric power system industry, the dispatching of electric network becomes increasingly important along with the expansion of electric power system and the increasing demands of people towards electric power. At present, electric network dispatching automation system is relatively advanced and relieves the boring and heavy work for operation staff. However, there is a large amount or even oceans of information. Especially when there is any fault, a large amount of alarm information and fault information will flood in the dispatching center. Faced with massive data, operation staff shall rely on some simple and effective tool to quickly locate the interested part in order to grasp the operation state of the system as soon as possible and to predict, identify and remove fault.Meanwhile, the operation of electric power system needs engineers and analysts in the system to analyze a lot of data. The main challenge that a system with thousands of buses poses for electric power automation system is that it needs to supply a lot of data to users in a proper way and make users master and estimate the state of the system instinctively and quickly. This is the case especially in electric network analyzing software. For example, the displaying way of data is more important in analyzing the relations between the actual trend, planned trend of electric network and the transmission capacity of the system. The application of new computer technology and visualization technology in the electric power automation system can greatly satisfy new development and new demands of electric power automation system.Th e word “Visualization” originates from English “Visual” and its original meaning is visual and vivid. In fact, the transformation of any abstract things and processes into graphs and images can be regarded as visualization. But as a subject term, the word “Visualization” officially appeared in a seminar held by National Science Foundation (shortened as NSF) of the USA in February 1987. The official report published after the seminar defined visualization, its covered fields and its recent and long-term research direction, which symbolized that “Visualization” became mature as a subject at the international level.The basic implication of visualization is to apply the principles and methods of computer graphics and general graphics to transforming large amounts of data produced by scientific and engineering computation into graphs and images and displaying them in a visual way. It refers to multi research fields such as computer graphics, image processing, computer vision, computer-aided design (CAD) and graphical user interface (GUI), etc. and has become an important direction for the current research of computer graphics.There are a lot of methods to realize visualization and each method has its unique features and applies to different occasions. Isoline and isosurface is an important method in visualization and can be applied to many occasions. The realization of isoline (isosurface) and its application in the electric power automation system will be explained below in detail.1、 Isoline (Isosurface)Isoline is defined with all such points (x i, y i), in which F(x i, y i)=F i (F i is a set value), and these points connected in certain order form the isoline of F(x,y) whose value is F i…Common isolines such as contour line and isotherm, etc.are based on the measurement of certain height and temperature.Regular isoline drawing usually adopts grid method and the steps are as follows:gridingdiscrete data;converting grid points into numerical value;calculating isoline points; tracing isoline; smoothing and marking isoline; displaying isoline or filling the isoline chart. Recently, some people have brought about the method of introducing triangle grid to solve the problems of quadrilateral grid. What the two methods have in common is to use grid and isoline points on the grid for traveling tracing, which results in the following defects in the drawing process:(1) The two methods use the grid structure, first find out isoline points on each side of certain quadrilateral grid or triangle grid, and then continue to find out isoline points from all the grids, during which a lot of judgment are involved, increasing the difficulty of program realization. When grid nodes become isoline points, they shall be treated as singular nodes, which not only reduces the graph accuracy but also increases the complexity of drawing.(2) The two methods produce drawn graphs with inadequate accuracy and intersection may appear during traveling tracing. The above methods deal with off-grid points using certain curve-fitting method. That is, the methods make two approximations and produce larger tolerance.(3) The methods are not universal and they can only deal with data of grid structure. If certain data is transformed into the grid structure, interpolation is needed in the process, which will definitely reduce the accuracy of graphs.To solve the problems, we adopt the method of raster graph in drawing isoline when realizing the system function, and it is referred to as non-grid method here. This method needs no grid structures and has the following advantages compared to regular methods:(1) Simple programming and easily realized, with no singular nodes involved and no traveling tracing of isoline. All these advantages greatly reduce the complexity of program design.(2)Higher accuracy. It needs one approximation while regular methods need two or more.(3) More universal and with no limits of grid1.1 Isoline Formation Method of Raster GraphThe drawing of raster graph has the following features: the area of drawing isoline is limited and is composed of non-continuous points. In fact, raster graph is limited by computer screen and what people can see is just a chart formed by thousands of or over ten thousand discrete picture elements. For example, a straight line has limited length on computers and is displayed with lots of discrete points. Due to the limitations of human eyes, it seemscontinuous. Based on the above features, this paper proposes isoline formation method of raster graph. The basic idea of this method is: as computer graphs are composed of discrete points, one just needs to find out all thepicture element points on the same isoline, which will definitely form this isoline.Take the isoline of rectangular mountain area for example to discussdetailed calculation method. Data required in calculation is the coordinates and altitude of each measuring point, i.e., (x i ,y i ,z i ), among which z i represents the altitude of No.i measuring point and there are M measuring points in total. Meanwhile, the height of isoline which is to be drawn is provided. For example, starting from h 0 , an isoline is drawn with every height difference of ∆h0 and total m isolines are drawn. Besides, the size of the screen area to be displayed is known and here (StartX,StartY) represents the top left corner of this area while (EndX ,EndY)represents the low right corner of this area. The calculation method for drawing its isoline is as follows:(1) Find out the value of x i and y i of the top left corner and low right corner points in the drawing area, which are represented by X max ,X min ,Y max ,Y min ;(2)Transform the coordinate (x i ,y i ) into screen coordinate (SX i ,SY i )and the required transformation formula is as follows:sx i =x i -X min /X max -X min (EndX-StartX)sy i =y i -Y min /Y max -Y min (EndY-StartY)Fig. 1 Height computation sketch(3) i =startX,j=StartY; Suppose i =startX,j=StartY;(4) Use the method of calculating height (such as distance weighting method and least square method, etc.) to calculate out the height h 1, h 2, h 3 of points (i,j), (i+1,j) and (i,j+1), i.e., the height of the three points P 1, P 2 and P 3 in Fig. 1;(5) Check the value of h 1, h 2, h 3 and determine whether there is any isoline crossing according to the following methods:①k=1,h=h 0;①k=1,h=h 0;②Judge whether (P 1-h)*(P 2-h)≤0 is justified. If justified, continue the next step; otherwise, perform ⑤;③Judge whether |P1-h|=|P2-h| is justified. If justified, it indicates that there is an isoline crossing P1, P2, dot the two points and jump to (6); otherwise, continue next step;④Judge whether |P1-h|<|P2-h|is justified. If justified, it indicates that there is an isoline crossing P1, dot this point; otherwise, dot P2;⑤Judge whether (P1-h)*(P3-h)≤0 is justified. If justified, con tinue next step; otherwise, perform ⑧.⑥Judge whether|P1-h|=|P3-h|is justified. If justified, dot the two points P1\,P3 and jump to (6);otherwise, jump to ⑤;⑦Judge whether|P1-h|<|P3-h|is justified. If justified, dot P1; otherwise, dot P3;⑧Suppose k:=k+1 and judge whether k<m+1 I is justified. If unjustified, continue next step; otherwise, suppose h:=h+∆h0 and return to ②.(6) Suppose j:j+1 and judge whether j<EndY is justified. If unjustified, continue next step; otherwise, return to (4);(7) Suppose i:=i+1 and judge whether i<EndX is justified. If unjustified, continue next step; otherwise, return to (4);(8) The end.In specific program design, in order to avoid repeated calculation, an array can be used to keep all the value of P2 in Column i+1 and another variable is used to keep the value of P3.From the above calculation method, it can be seen that this method doesn’t involve the traveling of isoline, the judgment of grid singular nodes and the connection of isoline, etc., which greatly simplifies the programming and is easily realized, producing no intersection lines in the drawn chart.1.2 Griding and Determining NodesTime consumption of a calculation method is of great concern. When calculating the height of (i,j), all the contributing points to the height of this point need to be found out. If one searches through the whole array, it is very time consuming. Therefore, the following regularized grid method is introduced to accelerate the speed.First, two concepts, i.e., influence domain and influence point set, are provided and defined as follows:Definition 1: influence domain O(P) of node P refers to the largest area in which this nodes has some influence on other nodes. In this paper, it can refer to the closed disc with radius as r (predetermined) or the square with side length as a (predetermined).Definition 2: influence point set S(P)of node P refers to the collection of all the nodes which can influence node P. In this paper, it refers to the point set with the number of elements as n (predetermined), i.e., the number of all the known contributing nodes to the height of node (i,j) can only be n and these nodesare generally n nodes closet to node P.According to the above definition, in order to calculate out the height of any node (i,j), one just needs to find out all the nodes influencing the height of this node and then uses the interpolation method according to two-dimensional surface fitting. Here, we will explain in detail how to calculate out the height of node (i,j) with Definition 1, i.e., the method of influence domain, and make similar calculation with Definition 2.Grid structure is used to determine other nodes in the influence domain of node (i,j). Irregular area is covered with regular grid, in which the grids have the same size and the side of grid is parallel with X axis and Y axis.The grid is described as follows:(x min,x max,NCX)(y min,y max,NCY)In the formula, x min, y max and x max, y max are respectively the minimum and maximum coordinates of x, y direction of the area; NCX is the number of grids in X direction; NCY is the number of grids in Y direction.Determining which grid a node belongs to is performed in the following two steps. Suppose the coordinate of this node is (x,y). First, respectively calculate its grid No. in x direction and y direction, and the formula is as follows:IX=NCX*(x-x min)/(xmax-x min)+1;IY=NCY(y-y min)/(y max-y min)+1。

外文翻译--模拟轨道交通列车运行的跟车模型研究

外文翻译--模拟轨道交通列车运行的跟车模型研究

中文4680字毕业设计(论文)外文参考文献及译文英文题目SIMULATING TRAIN MOVEMENT IN RAILWAY TRAFFIC USING A CAR-FOLLOWMING MODEL 中文题目模拟轨道交通列车运行的跟车模型研究AbstractBased on a car-following model, in this paper, we propose a new traffic model for simulating train movement in railway traffic. In the proposed model, some realistic characteristics of train movement are considered, such as the distance headway and the safety stopping distance. Using the proposed traffic model, we analyse the space-time diagram of traffic model, the trajectory of train movement, etc. Simulation results demonstrate that the proposed model can be successfully used for simulating the train movement. Some complex phenomena can be reproduced, such as the complex acceleration and deceleration of trains and the propagation of train delay.Keywords: Train movement, Railway traffic, Car-following model1 IntroductionTrain movement calculation is used to calculate the velocity and distance profile as a train travels from one station to another. When the theoretical control algorithm of train movement is analysed and evaluated, a computer-based simulation model is necessary. An important problem is how to establish and solve this simulation model. Recently, a number of studies have been performed in this field. However, many characteristic behaviours of train movement remain unknown. What are the mechanisms by which the train delays emerge? How do the tracked trains affect each other?The car-following model is one of the important traffic models in studying traffic model, and it is used mainly to describe the behaviour of an individual driver. Several car-following models have been proposed, including the early car-following models, and some recent improved models. Since in the car-following model realistic driver behaviour and detailed vehicle characters are included, it can be used to simulate various traffic flows which are observed in real traffic. In addition, by using the car-following model, some results can be derived analytically.In 1995, Bando et alproposed an improved car-following model, which is called the optimal velocity model. Such an improved model attracts a lot of attention because of its distinctive features in representing real traffic flow. Lately, research has been carried out on extending the optimal velocity model. A well known extended model, called the “general optimal velocity model”, was proposed by Nagatani in 1999 and Sawada in 2001 separately. But most of them focused on analyzing the characters of density wave from the viewpoint of physics.In the present work, based on the optimal velocity car-following model, we propose a new model for simulating train movement, where the influence of tracked trains is considered. Using the proposed simulation model, we study and discuss some characteristic behaviours of train movement in railway traffic. To our knowledge, this work explicitly shows this effect for the car-following model for the frst time. The remainder of the present paper is organized as follows. In Section 2, we introduce the optimal velocity model. The principle of the train control system is introduced in Section 3. In Section 4, we outline the proposed model. The numerical and the analytical results are presented in Section 5. Finally, the conclusions obtained by using this approach are presented in Section 6.2 The optimal velocity modelThe car-following model describes the motion of a vehicle following its leader vehicle without making a lane change. In the car-following model, a follower vehicle tries to maintaina space gap behind its leader vehicle. A classical car-following model was proposed by Pipes. In order to account for the time lag, Chandler et al uggested an improved car-following model,)]()([)(1t x t x T t x n n n -=++λ (1)Where )(t x n is the position of vehicle n at time t, T is a response time lag, and o is the sensitive coefficient. For a more realistic description, Newell presented the optimal velocity car-following model,))(()(t x V T t x n opt n ∆=+ (2) where optV is called the optimal velocity function, and )()()(1t x t x t x n n n -=∆+is the headway of vehicle n at time t. More than 30 years later, Bando et al suggested a well-known optimal velocity model, τ)())(()(t x t x V t x n n opt n -∆= (3)where τ is the relaxation time.In the optimal velocity model, the deceleration and the acceleration of the vehicle are described by a simple differential equation. According to such a differential equation, the behaviour of the driver is dependent mainly on the headway (the distance between two successive vehicles). This means that the driver is assumed to be only looking at the leader vehicle. But, in more realistic situations, the driver considers more information about vehicles around him/her. Apart from this, the relaxation time τ in Eq.(3) is an important parameter, which must be reasonably selected to avoid the collision between two successive vehicles.In order to reproduce traffic as realistically as possible, some complex models are proposed, but they are at the cost of introducing a large number of parameters, or, losing their realistic features in the deterministic limit. For example, the “generalized -force model” with a generalized optimal velocity function was proposed in Ref. This model could successfully reproduce the time-dependent gaps and velocities. However, the acceleration time and deceleration time in this model are still unrealistically small. As a result, a great effort has been made to improve the optimal velocity car-following model and to make it suitable for simulating various realistic traffics.3 Principle of the train control systemThe train control system plays a central role in railway traffic. Usually, it is used to decide how a driver operates under safety restrictions and other considered constraints. Two types of the train control systems have been developed, i.e. the fixed-block system and the moving block system. The fixed-block system has been widely used in modern railway traffic for more than one century. However, as signaling technology is developed, the moving block system becomes of considerable importance and will probably replace the fixed-block system some day.With the moving block system, electronic communications between the control centre and trains continuously control the trains, and make them maintain the safety stopping distance. In a moving block equipped system, using the information about the velocities and the locations of all the trains in its area, controllers can optimize system performance and respond to events quickly and effectively. The advantages of the moving block system are that the line capacity can be increased and the traffic fluidity and the energy efficiency can be improved.In the moving block system, between two successive trains, the following train needs to adjust its velocity continuously. If the distance between two successive trains is smaller than the safety stopping distance, the following train will be forced to brake to a lower velocity or stop at a site on the track line. Several types of moving block systems have been developed, i.e. the moving space block, the moving time block and the pure moving block. In the present paper, we employ the moving space block as the studied block system. Some approaches can be easily extended to other block systems.4 Our modelThe behaviour of train movement in railway traffic differs from that of vehicle movement in road traffic. The deceleration and the acceleration of the train are limited to a range between -22s m and 22s m . But such a range in road traffic is between -32s m and 42s m .The velocity relaxation time is larger than that in city traffic and freeway traffic (realistic velocity relaxation time is of the order of 10 s in city traffic and 40 s in freeway traffic). In addition, the2202 Li Ke-Ping et al V ol. 18 safety stopping distance is strongly related to the maximum velocity and the deceleration rate of the train. Usually, the safety stopping distance c x is defined as sm b v x c +=)2/(2max , where sm is called the safety margindistance, max v is the maximum velocity of the train and b is the deceleration rate of the train. In order to use the car-following model to simulate the train movement in railway traffic, wehere improve the optimal velocity model, and make it suitable for describing train movement in railway traffic.The car-following model proposed in Ref. is a well-known optimal velocity model, where the optimal velocity function ))((t x V n opt ∆is taken as]tanh[])(){tanh[2())((max c c n n opt x x t x v t x V +-∆=∆. Based on such a car-following model, we propose a new improved model for simulating train movement. The proposed model is as follows:ττ))()(()]exp(1[)(21t x t x V c c t x n n opt n -∆--= (4)In the above equation, we have introduced a function )]exp(1[21τc c --. This function ensures that the improved equation model meets the following two conditions: (i) the deceleration and the acceleration of the train are limited to a given range; (ii) a crash can be avoided when the velocity relaxation time τ is of a high order. Here 1c and 2c are adjustable parameters. In simulation, we need to select reasonable values of 1c and 2c .The dynamic behaviour of train movement near a station is more complex. When train n prepares to travel into a station, if the station in front of train n is occupied by other trains, train n must keep away from the station, otherwise, train n can travel into the station directly. In the former case, train n maintains a safety stopping distance from the train in front of it, but in the latter case, the safety stopping distance between train n and the station is neglected. In the former case, the optimal velocity function for train n is]}tanh[])(){tanh[2())((max c c n n opt x x t x v t x V +-∆=∆, and in the latter case, the optimal velocity function for train n can be simplified into]}){tanh[2())((max c n opt x v t x V =∆ . The boundary condition used in this paper is open. Considering a single track line with a length of L, the boundary condition is as follows: (i) when the section from site 1 to site S L is empty, a train with the velocity max V is created. This train immediately travels according to the equation model (4). Here the parameter S L is called the departure interval, and it must be larger than or equal to the safety stopping distance c x . (ii) At site L, trains simply move out of the system. In order to compare simulation results with field measurements, one iteration roughly corresponds to 1 s, and the length of a unit is about 1 m. This means, for example, that c x = 10 units/update corresponds to c x = 36 km/h.5 SimulationWe use the proposed model to simulate the train movement in single line railway traffic. The train control system employs the moving space block system. The dynamic equation of train movement is described by Eq. (4). The proposed equation model is suitable for computer programming. To start with, by changing the time derivative, the proposed equation modelis simplified into a discrete model. Then we iterate the discrete equation model under the open boundary condition. The basic program is that at each time step, for all trains, we use the current velocities and positions of trains to calculate their velocities and positions at the next time step.In simulation, a system with length L = 10000 is considered (L = 10000 units correspond to L =10000 m). The number of the iteration time steps is Ts = 2000. One station is designed in the middle of the system, i.e. the station is at the site l = 5000. As a train arrives at a station, it needs to stop for a time (say, Td) and then leaves the station. Td is called the station dwell time. The values of 1c and 2c are related mainly to the maximum velocity max V . When max V is larger, 1c and 2c should take smaller values. On the contrary, when max V is smaller, 1c and 2c should take larger values. For a given max V , when 1c is larger, 2c should take a smaller value, and when 1c is smaller, 2c should take a larger value. Because the deceleration rate b is a variant, the safety stopping distance c x is also a variant. But, in the process of train operation, c x usually is considered as a constant. So b in the formula of c x is set at a middle value of the decelerations. The velocity relaxation time τ and the safety margin distance sm are respectively set to be τ = 100 and sm = 10. After sufficient transient time, we begin to record the data of traffic flow.Simulation results demonstrate that when the departure interval S L is large, trains can travel without any disturbance, and when the departure interval S L is small, train delays begin to emerge. In order to study the characteristic behaviour of train movement, we investigate the space-time diagram of the railway traffic flow. Figure 1 shows part of the space-time diagram of railway traffic flow for c x = 40. Here we plot 10000 sites in 1000 consecutive time steps. The horizontal direction indicates the direction in which trains travel forwards. The vertical direction indicates the evolution time step. The parameters 1c and 2c are respectively set to be 1c = 50 and = 2c 0:001. In Fig.1, the positions of trains are indicated by dots. From Fig.1, we can find that the traffic flow shown in Fig.1(a) is free, where thetraffic flux can be increased by reducing the departure interval S L , and figure 1(b) presents complex traffic flow where train delays move backwards.In the present paper, we focus on the case where the departure interval S L is small. Under such a condition, we can observe how trains change their velocities, and maintain the safety stopping distance between them. In Fig.1(b), all trains start from the departure site, i.e. the site l = 1, and then arrive at the station, i.e. the middle site l = 5000. After the station dwell time d T , they leave the station. When they arrive at the arrival site, i.e. the site l = 10000, they leave the system immediately. Before the station, the train delays form and propagate backwards. During the train delays propagating backwards, their time intervals stopping at track increase. This is the Complex dynamic behaviour of train movement occurs near a station. When a train passes through a station, it needs to stop to enable passengers to board and alight. In this process, it needs to accelerate and decelerate continuously. If the station dwell time Td is large, the train delays possibly form and propagate backwards. Figure 2 shows the local space-time diagram, which displays the positions and velocities of the trains near a station. Here numbers represent the velocities of trains. The values of 1c and 2c are set to be 1c = 100 and 2c = 0:001. From Fig.2, we can clearly see that as train C stops at the station, train D that is directly behind train C needs to decelerate, and then stops at the site in front of train E. As time goes on, a number of trains before train C are delayed. These results demonstrate that the proposed model can successfully capture the expected delays in railway traffic.As mentioned in Section 4, when a train travels from one station to another, its deceleration and acceleration are limited to a range between -22s m and 2 2s m . Using theproposed model, the deceleration and acceleration of trains can be made to enter into such a given range by controlling the values of c1 and c2. The relevant results are presented in Fig. 3. Here we record the decelerations and accelerations of all trains at all times. The parameters c x , 1c and 2c are the same as those used in Fig.1. From Fig.3, we can see that the acceleration of trains is in the range between 0 and 22s m , and the deceleration of trains is in the range between -22s m and 0 2s m . In general, the higher the values of 1c and 2c are,the larger the range limiting the deceleration and acceleration will be.In reality railway traffic, one of the important factors which factors train movement is the safety stopping distance. With the moving block system, the safety stopping distance between two successive trains must be maintained. For example, when the distance between two successive trains is smaller than the safety stopping distance, the following train must decelerate. In order to further test the proposed model, we measure the distribution of thedistance headway i s∆at a given time, where ¢si is the distance from train i to train 1+i. Figure 4 shows the distribution of the distance headway at time t= 1000, where the solid line denotes the measurement results, and the dotted line represents the safety stopping distance. In Fig.4, at time t= 1000, there are 4 trains traveling on the single line. From Fig.4, it is obvious that all the measurement results are larger than the safety stopping distance. The simulation results indicate that the proposed model is an effective tool for simulating train movement.6 ConclusionsWe proposed an improved car-following model for simulating the train movement in railway traffic. By iterating the proposed equation model, we simulate the train movement under the moving block system condition. The numerical simulation results indicate that the proposed model can describe well the train movement in railway traffic. Not only can the dynamic behaviour of train movement be described, but also some complex phenomena observed in real railway traffic, such as the train delays, can be reproduced.In a practical train control system, train movement is restricted by several factors, such as the track geometry, traction equipment, train length, etc. In the proposed model, some factors have not been considered, thereby leading to the simplification of the train movement calculation. Although the proposed model is simplified, it can reproduce some characteristic behaviours of train movement, moreover it provides a new approach for the further analysis and evaluation of train control systems.摘要根据跟车模型,在本文中,我们提出了在铁路交通模拟列车运行一个新的交通模式。

毕业设计(论文)外文资料翻译

毕业设计(论文)外文资料翻译

南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械工程系专业:机械工程及自动化姓名:徐华俊学号:100104348外文出处:WASTE FOOD DISPOSAL SYSTEM(3)(用外文写)附件:1.外文资料翻译译文;2.外文原文。

指导教师评语:该生翻译了一篇有关《废弃食物处理系统》的论文,论文内容跟课题的研究领域相关,在将来的课题设计中可以借鉴。

译文语句基本通顺,专业术语正确,标点符号运用无误。

说明该生具备一定的英语水平和翻译能力。

但文中仍有部分语句组织得不够完善,可以进一步修改。

签名:年月日注:请将该封面与附件装订成册。

附件1:外文资料翻译译文垃圾食物处理系统(3)打开功率继电器32的驱动,关闭与其相连的常闭开关118,从而消除了在此之前被施加到定时器单元40的控制终端146的触发信号,并且需要注意的是,功率继电器30的电源开关108供应了一个类似的功能,如本文所述的,启动系统10每天第一次激活功率继电器30的时候,这个功能中断了定时器单元40的控制终端146,即先前追踪的触发信号电路,如本文所述。

进一步,在与功率继电器32相连的开关被关闭的时候,它的驱动被触发的结果是非常明显的,断开常开继电器开关119,为高流量水阀22的电磁阀80建立了一个到地面的备用路径,也就是可以追踪到电源线200;通过导线202;电磁阀80;导线204;导线416和现在被断开的功率继电器32的闭合开关119到地面,如此一来就能明显并且很方便的注意到,与功率继电器30相连的开关109执行同样的功能,通过一个完全可追踪的功率继电器30,而不是功率继电器32,使功率继电器30处于启动状态,所以在任何时期,控制单元12的电动机46可在任意一个方向操作(这取决于功率继电器30或功率继电器32处于激活状态),电磁阀80也将保持通电,来保持高流量水阀22在该段时期内处于闭合状态,这样的话,水流将会在需要大幅率的时候流通,通过管道76和78流到控制单元12,这个控制单元12的机构52正积极粉碎积累废料,并且已经积累或正在采用,接着顺着水流冲到下水道或者通过类似单元12的出口58.你将会很方便的观察到电磁阀74保持通电,并且在控制单元12积极运作期间,低流量水阀20也保持闭合,并且应当在任何特定安装情况下,把阀22的流通能力考虑在内。

毕业设计(论文)外文资料翻译

毕业设计(论文)外文资料翻译

毕业设计(论文)外文资料翻译题目:On-the-job Training院系名称:管理学院专业班级:工商管理0702班学生姓名:刘月停学号: 20074900818指导教师:张可军教师职称:讲师附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文在职培训在职培训一般是在正常工作条件下对工作技能的培训。

通过在职培训,工人可以掌握一般技能,是可以从一个工作转移到另一个工作的技能。

关于在职训练,通常包括口头和书面指示,示范和观察,动手实践和模仿。

此外,对在职员工的培训过程涉及一个通常是主管或有经验的员工传递知识和技能到一个新手。

在职培训是最古老的培训形式之一。

此前,异地培训教室的出现,唯一的任务是一起学习某一行业或专业,是学徒的做法,在中世纪时,有经验的工匠和新手一起工作教授新员工实用的方法和知识。

在职培训是一种职业培训,在美国它是一种对非管理雇员培训的主要形式。

许多研究表明,它是最有效的职业培训形式。

在职培训大部分是由私营部门提供,但最广泛的研究培训计划由联邦立法的赞助。

在职培训程序从公司监事正规培训到观察学习。

从这个意义上说,在职培训最正式的类型是课堂培训,他们主要在企业内部不同的部门进行。

在国际竞争更广泛的电脑生产过程中使用,更正式更复杂的在职培训的落实已成为在美国公司的关键问题。

在职培训的类型两个不同类型的关于在职培训的频繁杰出的专业文献:结构(计划)和非结构化(计划外)。

非结构是最常见的一种,泛指在职培训主要涉及一个新手与经验丰富的员工的工作,新手在导师的观察下模仿训练的过程。

新工人主要通过试验和学习的方法向经验丰富的工人或者监事学习。

非结构化培训的工作(如产品制造)的要求很低,并不像传授工作技能(如生产产品所需的特定技能)的新工人培训。

因此,非结构化的在职培训往往不能完全按需要的技能传授或持续,因为有经验的员工,有时无法清楚表达执行工作的正确方法,他们每次训练新工人时会使用不同的训练方法。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

武汉工业学院 毕业设计(论文)外文参考文献译文本 2011届 原文出处 IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996

毕业设计(论文)题目 音乐图像浏览器的设计与实现

院(系) 计算机与信息工程 专业名称 计算机科学与技术 学生姓名 郭谦 学生学号 070501103 指导教师 丰洪才 译文要求: 1、 译文内容须与课题(或专业)有联系; 2、 外文翻译不少于4000汉字。

隐藏数据技术研究 数据隐藏,是一种隐秘的数据加密形式,它将数据嵌入到数字媒体之中来达到鉴定,注释和版权保护的目的。 然而,这一应用却受到了一些限制:首先是需要隐藏的数据量,其次是在“主”讯号受到失真的条件影响之下,对于这些需隐藏数据的可靠性的需要。举例来说,就是有损压缩以及对有损压缩来说数据遇到被拦截,被修改或被第三方移除等操作的免疫程度。我们同时用传统的和新式技术来探究解决数据隐藏问题的方法并且对这些技术在以下三个方面的应用:版权保护,防止篡改,和增强型数据嵌入做出评估。 我们能非常方便地得到数字媒体并且潜在地改善了其可移植性,信息展现的效率,和信息呈现的准确度。便捷的数据访问所带来的负面效果包括以下两点:侵犯版权的几率增加或者是有篡改或修改其中内容的可能性增大。这项工作的目的在于研究知识产权保护条款、内容修改的相关指示和增加注解的方法。数据隐藏代表了一类用于插入数据的操作,例如版权信息,它利用“主”信号能够感知的最小变化量来进入到各种不同形式的媒体之内,比如图像、声音或本文。也就是说,嵌入的数据对人类观察者来说应该是既看不见也听不见的。值得注意的是,数据隐藏虽然与压缩很类似,但与加密解密技术却是截然不同的。它的目标不是限制或者管理对“主”信号的存取,而是保证被嵌入的数据依然未被破坏而且是可以恢复的。 数据隐藏在数字媒体中的两个重要应用就是提供版权信息的证明,和保证内容完整性。因此,即使主讯号遭受诸如过滤、重取样,截取或是有损压缩等破坏行为,数据也应该一直在“主”信号中保持被隐藏的特点。数据隐藏的其他应用比如增加被隐藏数据量,对于试图探测和移除隐藏数据仍能保持不变性的需要,这种形式的数据隐藏是由作者和内容购买商共同决定的。因此,数据隐藏技术是由被隐藏数据量和数据接收处理后仍保持不变性的需要所决定的。目前没有一种方法能达到所有的这些目标,我们需要的是一类能覆盖多种应用的程序。 数据隐藏技术所面临的挑战是巨大的。无论这种信号是用数据统计的还是感知出来的,任何“主”信号中用来填充数据的“容器“都有可能是有损信号压缩时要去除的对象。成功的数据隐藏关键在于找出那些不适合用来进行压缩算法的容器。更进一步的挑战则是将这些容器填满,使得“主”信号转换后他们依然没有变化。 功能和应用程序 数据隐藏技术应能在一个主信号中加入具有下列限制的数据: 1. 主信号应该是衰减很小并且嵌入的数据应该几乎不可察觉。(目的就是为了隐藏数据。任何魔术师都会告诉你,当它依然在你清楚可见的地方保持不变的时候,某些东西可能已经隐藏在他手中了,你却一直在盯着它看。我们将会使用隐藏着的,听不见的,察觉不到的和看不见的字符来意指观察者没有注意到数据的显示,即使这些数据是可察觉的。) 2. 嵌入的数据应该直接通过编码进入媒体之中,而不是放在头部或是封装起来,这样数据就能在各种不同数据文件格式间仍然保持不变。 3. 嵌入的数据对于各种修改,从有目的地尝试进行移除到各种能够预料到的问题,比如信道噪音,过滤,重取样,截取,编码,有损压缩,打印和扫描,数模转换,模数转换等都应该是能够防御的。 4.对嵌入的数据进行不对称编码是很理想的,这样就达到了数据隐藏在主信号之中,这样数据取出也显得并不困难。 5. 数据完整性应该通过纠错编码来保证。但也不可避免的造成当主信号被修改时,嵌入的数据也会有一些损耗。 6. 嵌入的数据应该能够实现自锁或可任意次重复读取。这样就能保证,当主信号仅有一些微弱信号的时候还能够把嵌入的数据恢复出来。举例来说,如果新闻采访的原生摘要从采访中被截取出来,在音频片段中隐藏的数据就能够被恢复。由于没有必要考虑最初的主信号,这种功能也促进了隐藏数据的自动解码,。 下面来看一下它们的实际应用。我们需要在隐藏的数据量的多少和对主信号修改的抵御能力强弱之间做出取舍。通过限制主信号的衰减强度,单一一种信息隐藏方法可以单独针对高数据隐藏率,或是单独针对信息修改的高抵御性,但是不能同时对两者进行兼顾。这种参数上升,另一种参数必然会下降。这种现象可以透过一些数据隐藏系统如扩展频谱的方法在数学上得以直观的展现出来,这一点对所有的信息隐藏系统似乎都是一样的。在任何系统中,你都可以为了增强程序强壮性采用增大冗余的办法来增加带宽。然而嵌入数据量和抵御修改强度因程序而异。所以,不同的应用程序使用了不同的技术。 我们将这一小节中讨论一些关于数据隐藏的可能应用。 一种应用就是仅仅需要少量嵌入数据的内置数字水印的方法。嵌入式数据被用来在主信号中放置一种所有权标识,作为作者签名或是公司图标的目的。由于这些信息具有这种关键特性,而且信号可能要面对企图破坏或者移除这种信息的情况,使用的编码技术必须对于大范围的修改有较强的抵御能力。 第二项数据隐藏的应用就是防止篡改。它用来指示主信号相对初始状态已经被修改。对嵌入数据的修改能够告诉我们主信号已经以某种方式被修改。 第三项应用就是功能定位,这需要更多的数据嵌入。在这种应用中,嵌入的数据被隐藏在一幅图像的特定位置。它使我们能够识别出个人内容,举例来说,在图像中正对右边的左边人物的姓名。一般来说,功能定位数据不会被有意去除。然而,人们很希望主信号能够对一定程度的修改,举例来说,图像通常会由于缩放,裁剪,和色调调整而被修改。所以基于功能定位的数据隐藏技术必须加强在主信号上进行几何学、非几何学的修改的抵御能力。 图像和声音的说明(或注释)可能需要大量的数据。注释通常单独地存在于主信号中,因此需要额外的信道和存储空间。如果文件格式被改变,储存在文件头或资源区段中的注释通常会丢失,举例来说,在标记图像文件格式(TIFF格式)中创建的注释在图像被转换为图形交换格式(GIF格式)时就有可能显示不出来。通过将注释直接嵌入到主信号的数据结构之中就能使这些问题得到解决。 在静止图像中隐藏数据 在静止图像中隐藏数据面临多种挑战,这些挑战主要是人类视觉系统(HVS)的工作方式和传统修改图片方式所造成的。此外,静止图像提供的是一个相对较小的主信号空间来隐藏数据。 典型情况是8比特大小的照片如果以200× 200的分辨率存储,则必须提供大约 40 千字节(kB)数据工作空间。这相当于只有5秒的电话语音音频信号,甚至比一帧NTSC制式的电视信号还少。同时,我们有理由设想能够对静止的图像进行一系列从仿射变换到非线性变换的操作,诸如裁剪,混杂,过滤,有损压缩等。实用的数据隐藏技术需要能够经受住各式各样尽可能多的操作。尽管存在着不少挑战,静止图像还是数据隐藏的可能的“候选技术”。人类视觉系统中有不少属性都具有将之应用于数据隐藏系统的潜力,包括我们多变的灵敏度用来当做空间频率和触发掩蔽效应的边缘功能(都存在于亮度和色度中)。人类视觉系统在亮度方面对于微小的改变具有很强的感应度,能够感觉出一个区域多达30种随机模式的变化来。 不仅如此,在一个图像的统一区域,人类视觉系统对亮度的变化更加敏感,大约一个部分能有240种颜色。一台典型的阴极射线管(电子射线管)显示装置或打印机有一个有限的变化范围。一个图像在一个区域有256种颜色,举例来说,如果采用8位的灰度级,那么正如伪随机变换对图像亮度影响一样,就有潜在的空间来隐藏数据。另外一个人类视觉系统“容器”对非常低的空间频率变化的感知能力,好比一张图像上持续不断的亮度变化,也就是渐晕。 利用静止图像工作的另一个优点就是他们之间是无关联的。 数据隐藏技术能对任何像素或像素的区块进行随机存取。 利用这些观测数据,我们已经发展了多种将数据隐藏在静止图像中的技术。一些技术适合处理少量数据,还有一些技术则适合处理大量数据。有些技术对几何变换能够有较好的解决办法,还有些技术则对非几何变换有较好的解决办法。 音频中隐藏数据 因为人类听觉系统(HAS)工作在一个较宽的动态范围之内,所以音频信号的数据隐藏尤其具有挑战性。人类听觉系统感知能量单位低至十亿分之一的范围,频率则大于千分之一。人类对于散乱杂音的灵敏度对也是很高的。一个声音文件中的细小扰动即使低至千万分之一(背景噪音 80分贝)也是能被察觉的。然而,这其中仍然有一些“容器”能够被使用。尽管人类听觉系统有非常大的动态范围,它还是有一个非常小差别的范围。这样,较大的声音会使较小的声音出不来。此外,人类听觉系统察觉不出来绝对相位,只对相对相位有感觉。最终,在大多数情况下一些环境的失真非常常见以至于听者忽略了。 我们在下面将要探讨的方法中利用了不少上面的线索,请大家记住人类听觉系统的极端敏感性。 声音环境 当为音频信号发展一种隐藏数据的方法时,首先要考虑的是在编码和解码之中音频信号要传播的可能环境。有两个我们要考虑的主要修改区域,首先是储存环境或将会被使用的数字信号表示法,其次就是信号可能的传播路径。 对大部分数字音频表示法有两个非常重要的参数:采样量化的方法和实时采样率。 表现高质量数字音频样本的最常用的方式是 16位线性量化,如Windows音频格式(WAV)、音频交换文件格式 (AIFF)。另外一种处理低质量音频的常用格式就是8位对数μ法。这些量化方法引入了一些信号失真,对于8位μ法某种程度上则是更加明显。 音频常用的采样率包括 8 千赫兹、 9.6千赫兹、 10千赫兹、 12千赫兹、 16千赫兹、 22.05千赫兹和 44.1千赫兹。采样率通过为频谱的可用部分设定最大值来影响数据隐藏的参数(如果某个信号的采样率为8千赫兹,你不能够修改频率在4千赫兹以上部分)。 对已经发展起来的绝大多数信息隐藏技术而言,可使用的数据空间以随着采样率的增加而线性增长。 我们要说的最后一种方法就是有损压缩算法,像是国际标准组织运动图画——音频专家组(ISO MPEG-AUDIO)的编码标准。这些表示法大幅度的改变了信号的数据;他们仅仅保留了该声音能被听者听到的特性(也就是说,就算信号已经跟原来相比面目全非,但对听着来说他们听上去还是很相似的)。 一个信号在编码和解码的过程中可能会经历许多不同的传输环境。 我们为说明相关情况考虑以下四个类别的环境。(见图 11)

相关文档
最新文档