506 research outputs found

    On the Translation of Publicity Texts Under Semantic Translation and Communicative Translation Theory

    Get PDF
    The publicity texts involve various aspects in external publicity and plays an increasingly important role. This paper takes Xi Jinping’s report at the 19th National Congress of the Communist Party of China as an example to discuss the practical application of Newmark’s semantic translation and communicative translation theory in the translation of publicity texts. It is summarized that how semantic translation and communicative translation are used in the English translation of publicity texts in this paper so as to provide some practicable suggestions for the English translation of publicity texts

    Study on the Transmission of Chinese Culture From the Perspective of Big Translation

    Get PDF
    This paper analyzes and studies the transmission of Chinese culture from the the perspective of Big Translation. Through analyzing the contents of Big translation   and the practical application of Big Translation in the transmission of Chinese culture, we find intralingual translation, interlingual translation and intersemiotic translation all play important roles in the process of cultural transmission. The purpose of this paper is to study how to spread Chinese culture effectively. With various examples, it is concluded that big translation is an important way to promote the effective spread of Chinese culture. We should attach importance to big translation and use it to promote cross-cultural communication and cultural transmission

    Dispatch Planning of a Wide-Area Wind Power-Energy Storage Scheme Based on Ensemble Empirical Mode Decomposition Technique

    Get PDF
    This paper addresses the challenging task of developing a procedure for the day-ahead dispatch planning of wind power which emanates from a wide geographical area. Using the complete ensemble empirical mode decomposition technique, it is shown that the low-frequency components of the area aggregated wind power account for the largest proportions of the perturbing energy harnessed from the wind. By taking advantage of the slow-varying characteristics of the low-frequency components, accurate forecast of these components is readily obtained and incorporated into the developed dispatch planning procedure. The dispatchability of the wide-area wind generation is facilitated by the buffering actions offered by a centralized power dispatch energy storage system, operating under a proposed power flows control strategy. The efficacy of the developed procedure is illustrated using a pumped hydroelectric system as the dispatch energy storage medium

    Measurement-based Channel Characterization Using Virtual Array with Directional Antenna

    Get PDF
    Obtaining accurate channel characteristics is essential for wireless communication system design and protocols. Directional scan sounding (DSS) achieved by rotating a directional antenna with a turntable, and virtual antenna array (VAA) basedsounding achieved by moving the antenna to the pre-designed locations are both popular methods to characterize static radio channel environments. However, the beam-width of the employed directional antenna limits the angular resolution of DSS. The conventional VAA usually employs an omnidirectional antenna which limits its application in millimeter wave bands due to the low antenna gain. In this work, VAA scheme based on directional antennas is presented to characterize the spatial-temporal profiles and omnidirectional pathloss of the channels. This scheme can provide high angular resolution and improve the SNR in the measurements simultaneously. Indoor channel measurements at 28 GHz with four different link distances were conducted to verify the effectiveness of the directional antenna based VAA scheme

    Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding

    Full text link
    Exploiting quantum mechanisms, quantum attacks have the potential ability to break the cipher structure. Recently, Ito et al. proposed a quantum attack on Feistel-2* structure (Ito et al.'s attack) based onthe Q2 model. However, it is not realistic since the quantum oracle needs to be accessed by the adversary, and the data complexityis high. To solve this problem, a quantum all-subkeys-recovery (ASR) attack based on multi-equations quantum claw-finding is proposed, which takes a more realistic model, the Q1 model, as the scenario, and only requires 3 plain-ciphertext pairs to quickly crack the 6-round Feistel-2* structure. First, we proposed a multi-equations quantum claw-finding algorithm to solve the claw problem of finding multiple equations. In addition, Grover's algorithm is used to speedup the rest subkeys recovery. Compared with Ito et al.'s attack, the data complexity of our attack is reduced from O(2^n) to O(1), while the time complexity and memory complexity are also significantly reduced.Comment: 18 pages, 4 figure

    Understanding Members’ Active Participation in a DAO: An Empirical Study on Steemit

    Get PDF
    One of Blockchain’s great potential is to enable the decentralized autonomous organizations (DAOs), whose organizational structure and operational mechanism fundamentally distinct from traditional organizations. This revolutionary nature of DAOs will definitely influence peoples’ behavior. Steemit is an online community like Reddit, but it’s a DAO enabled by STEEM blockchain. This nature makes Steemit fans both users and owners. As users, people can enjoy social capital from using Steemit, just like using any other social media. As owners, people can get some economic incentives by earning and holding Steem Power, and Steem Power can be seen a kind of share capital. This paper attempts to explore the participation behavior of people in the Steemit community from two perspectives—social capital and share capital. Social feedback and economic feedback received by members also have an impact on participation behavior

    Fast Array Diagnosis Based on Measured Complex Array Signals with Short Measurement Distance

    Get PDF

    A novel fault location method for a cross-bonded hv cable system based on sheath current monitoring

    Get PDF
    In order to improve the practice in the operation and maintenance of high voltage (HV) cables, this paper proposes a fault location method based on the monitoring of cable sheath currents for use in cross-bonded HV cable systems. This method first analyzes the power–frequency component of the sheath current, which can be acquired at cable terminals and cable link boxes, using a Fast Fourier Transform (FFT). The cable segment where a fault occurs can be localized by the phase difference between the sheath currents at the two ends of the cable segment, because current would flow in the opposite direction towards the two ends of the cable segment with fault. Conversely, in other healthy cable segments of the same circuit, sheath currents would flow in the same direction. The exact fault position can then be located via electromagnetic time reversal (EMTR) analysis of the fault transients of the sheath current. The sheath currents have been simulated and analyzed by assuming a single-phase short-circuit fault to occur in every cable segment of a selected cross-bonded high voltage cable circuit. The sheath current monitoring system has been implemented in a 110 kV cable circuit in China. Results indicate that the proposed method is feasible and effective in location of HV cable short circuit faults
    • …
    corecore