英外文文献翻译中的Disclosures如何翻译?thanks

丁香客App是丁香园社区的官方应用,聚合了丁香园论坛和丁香客的精彩内容。医生可通过丁香客App浏览论坛,也可以在这个医生群集的关系网络中分享和互动,建立更广泛的学术圈子。
扫描二维码下载
今日:13 | 主题:395623 | & 收藏本版
每发1个新帖可以获得0.5个丁当奖励
【求助】会议投稿的Disclosures是什么意思啊?
【求助】会议投稿的Disclosures是什么意思啊?
分享到哪里?
这个帖子发布于6年零142天前,其中的信息可能已发生改变或有所发展。
请教一下 投稿须知的Disclosures是什么意思啊?谢谢Disclosures: Include any disclosure information here. In order for your colleagues to properly evaluate the information, analysis and opinions presented in your abstract, it is important that they be informed of potential conflicts of interest pertinent to the research submitted. Therefore, conference management requires that all authors provide any relevant information concerning personal or professional circumstances and relationships that might reasonably be expected to affect the author's view on the subject. Examples include, but are not limited to: Stock options or bond holdings in a for-profit corporation or self-directed pension plan Employment (full or part-time) Ownership or partnership Consulting fees or other remuneration (payment) Non-remunerative positions of influence such as officer, board member, trustee or public spokesperson Receipt of royalties Speakers bureau Appropriate disclosure will be stated in the scientific program and the abstract volume. If you do not have anything to disclose, you must indicate this on the online abstract submission form. The disclosure information you provide will not influence the review of your abstract. Abstracts will not be reviewed without proper completion of the disclosure section on the abstract submission form. Disclosure information for all authors is required upon abstract submission
关于丁香园求密码学英文文献_百度知道
求密码学英文文献
需要一篇关于密码学的英文文献.如果可以请顺便翻译一下.5000字.
提问者采纳
从美国百科大全书里搜到,希望能有所帮助。翻译就算了吧……Cryptology, the technology of making and breaking codes and ciphers, has furnished America with excellent protection for its transmitted documents and with its best intelligence.Revolution to World War IJames Lovell, a member of the Continental Congress who may be considered America's first cryptanalyst, solved British cryptograms for the rebels. One of them enabled Washington to alert the French admiral Comte de Grasse to blockade Yorktown, which then surrendered. Edgar Allan Poe popularized cryptology in 1843 with his story &The Gold Bug.& During the Civil War, the Union utilized a word- the South, a letter-substitution. The State Department printed its first cable code in 1867. In 1878, the New York Tribune solved and published encrypted telegrams showing that Democrats had bought electoral votes for Samuel J. Tilden in 1876. Though the Republican candidate, Rutherford B. Hayes, had nevertheless won the presidency, the disclosures helped lead to Republican gains in the midterm elections and to a Republican president, James A. Garfield, in 1880.Code BreakingThough some army officers investigated cryptology, the United States had no official cryptanalytic bureau until World War I. U.S. involvement in the war came about in part through codebreaking: Britain had cryptanalyzed a German offer to Mexico to make joint war on the United S five weeks after newspapers headlined this, Congress declared war on Germany. In the spring of 1917, the Army's Military Intelligence Section established a codebreaking agency, called MI-8, placing a charismatic former State Department code clerk, Herbert O. Yardley, in charge. One of its solutions convicted a German spy. The American Expeditionary Forces had its own codebreaking unit, G.2 A.6, to solve German front-line codes, and its own Code Compilation Section, which printed and distributed new codes every few weeks. In 1919, MI-8 evolved into the joint Army-State Cipher Bureau under Yardley. During the Washington naval disarmament conference of , it solved Japanese diplomatic messages that helped America compel Tokyo to accept the equivalent of a battleship-and-a-half less than it wanted. America, Japan, and other nations saved millions that would otherwise have been spent on warships.In 1929, Secretary of State Henry L. Stimson withdrew the Bureau's funds, on the ground that &gentlemen do not read each other's mail.& Yardley, jobless in the Depression, awoke America to the importance of cryptology in his best-selling The American Black Chamber (1931). His bureau's work was assumed by the army's tiny Signal Intelligence Service (SIS) under the brilliant cryptologist William F. Friedman. During World War I, Friedman, at the Riverbank Laboratories, a think tank near Chicago, had broken new pat soon after he joined the War Department as a civilian employee in 1921, he reconstructed the locations and starting positions of the rotors in a cipher machine. His work placed the United States at the forefront of world cryptology. Beginning in 1931, he expanded the SIS, hiring mathematicians first. By 1940, a team under the cryptanalyst Frank B. Rowlett had reconstructed the chief Japanese diplomatic cipher machine, which the Americans called purple. These solutions could not prevent Pearl Harbor because no messages saying anything like &We will attack Pearl Harbor& w the Japanese diplomats themselves were not told of the attack. Later in the war, however, the solutions of the radiograms of the Japanese ambassador in Berlin, enciphered in purple, provided the Allies with what Army Chief of Staff General George C. Marshall called &our main basis of information regarding Hitler's intentions in Europe.& One revealed details of Hitler's Atlantic Wall defenses.The U.S. Navy's OP-20-G, established in 1924 under Lieutenant Laurence F. Safford, solved Japanese naval codes. This work flowered when the solutions of its branch in Hawaii made possible the American victory at Midway in 1942, the midair shootdown of Admiral Isoroku Yamamoto in 1943, and the sinking of Japanese freighters throughout the Pacific war, strangling Japan. Its headquarters in Washington cooperated with the British code breaking agency, the Government Code and Cypher School, at Bletchley Park, northwest of London, to solve U-boat messages encrypted in the Enigma rotor cipher machine. This enabled Allied convoys to dodge wolf packs and so help win the Battle of the Atlantic. Teams of American cryptanalysts and tabulating machine engineers went to the British agency to cooperate in solving German Enigma and other cipher systems, shortening the land war in Europe. No other source of information—not spies, aerial photographs, or prisoner interrogations—provided such trustworthy, high-level, voluminous, detailed, and prompt intelligence as code breaking.At the San Francisco conference of 1945, which created the United Nations, the United States used information from code breaking to get its way on important matters, such as its desire, despite French opposition, for a veto procedure in the Security Council. In the 1940s, the United States began solving Soviet spy messages. Disclosed in 1995, these solutions, codenamed venona, showed that the Soviet Union had conducted massive espionage in America, including espionage related to nuclear armament.Code MakingDramatic though code breaking is, more important than getting other people's secrets is keeping one's own. America has excelled in this as well. The first law specifying the duties of the Post Office, 20 February 1792 made it a crime for its employees to open mail, thus protecting privacy before European countries did. Thomas Jefferson invented an ingenious cipher system but the U.S. Army adopted an independent invention of it in 1922 that was used until World War II. In 1917, an engineer at the American Telephone & Telegraph Company, Gilbert S. Vernam, devised the first online cipher machine. Based on a teletypewriter, it electromechanically added the on-off impulses of the plain-text message to those of a key tape and transmitted the resultant ciphertext. This mechanism, the first binary device in cryptology, was perfected by Major Joseph O. Mauborgne, who, by making the key tape random and prohibiting more than a single use of it, created the only theoretically unbreakable cipher, the one-time tape. Also in 1917, an amateur inventor, Edward H. Hebern of California, devised the first rotor cipher machine before three Europeans independently had the same idea. In the 1930s, Rowlett and Friedman irregularized the turning of rotors. Their cipher machine, the sigaba, armored U.S. Army and Navy communications against the te none of its messages were broken by Axis powers. During World War II, Navajos in the Marine Corps translated English-language orders into their language for walkie- the Japanese never understood them. In 1943, AT&T engineers built a radiotelephone scrambler, sigsaly, that used a one-time key and proved invulnerable to German eavesdropping. Another AT&T employee, Claude E. Shannon, the conceiver of information theory, provided cryptology with a theoretical underpinning in his article &Communication Theory of Secrecy Systems,& published in 1949.In 1976, the National Institute of Standards and Technology promulgated a Data Encryption Standard so computers could inter it was replaced on 26 May 2002 by the Advanced Encryption Standard. Also in 1976, an electrical engineering student, Whitfield Diffie, aided by Professor Martin Hellman, both of Stanford University, devised the most important advance in cryptography since the invention of cryptography itself: public-key cryptography. This permitted people to communicate in secret without prearrangement and ultimately opened the way to online Electronic Commerce.
提问者评价
虽然字数不够。但还是谢谢了。
其他类似问题
英文文献的相关知识
按默认排序
其他1条回答
这个,,,估计你是找不到了太专业了无能为力
等待您来回答
您可能关注的推广
下载知道APP
随时随地咨询
出门在外也不愁求帮助翻译英文文献,不要在线翻译的_百度知道
求帮助翻译英文文献,不要在线翻译的
The alloys amenable to heat treatment included clad and bare aluminiumcopper alloys 2017 and 2024,, All of the marine specimens were exposed near the shoreline where they were occasionally wetted by spray, such as organic paints and inorganic coatings, Norfolk, by exposing them to various weathering conditions for a period of 20 years, x 9 in, beginning three months after the start of the test,The effects of corrosion on each alloy were evaluated by visual and microscopic examination and by the change in its elongation, MgSi, Aluminiummagnesium-silicon alloys,The Bureau found that improperly heat-treated aluminium-copper alloys failed by intergranular corrosion and severe exfoliation with no measurable elongation after exposure, At that time experimental &#39, were also studied, The latter constituted the tropical marine atmosphere, cadmium or copper and cadmium,75 in, together with the coatings used for surface protection, Specimens 0,Heat-treated alloys
The alloys studied included thosewhich could be hardened by heat treatment and those not susceptible to heat treatment, while those properly heat treated performed satisfactorily,,high-strength&#39, D, whereas Washington and Norfolk were the temperate inland and marine locations, 2017, Studies were made of the aluminiumcopper alloy 2017 with a number of different finishes, Among the latter were aluminium-manganese 3004-H34 and aluminium-magnesium 5254-H34, aluminium alloys had been developed for aircraft use, when clad with a thin, long were exposed in selected locations at Washington, The tensile strength and elongation after exposure were compared with values obtained on control specimens, but little was known of their corrosion properties after sustained exposure, The Bureau therefore undertook to investigate the commercial and experimental alloys then available, surface treatment or paint coating, The control values for elongation were obtained by averaging the original values and the values obtained on specimens stored in desiccated containers for comparable periods of time, The samples were removed at intervals from the racks, There were also many new protective coverings for aluminium,,THE investigation began in the early 1930s, Statistical analysis showed no significant differences in these values with respect to time of storage, low-strength alloy, Included were samples of clad and bare 2017—several heat treated by selected methods and some protected with various types of organic or inorganic coatings, and the Panama Canal zone, Va,However, in which hardening is due to the intermetallic compound, Other alloys contained nickel, The study thus provides data on the 20-year corrosion resistance of aluminium alloys which in some cases have only recently been converted from experimental to commercial status, resisted corrosion very well even if incorrecdy heat treated,C, and were subjected to tensile tests,
提问者采纳
每隔一定时间,试棒就被从架子上取走,镉或铜镉合金。铝锰硅合金的硬度靠金属间的化合来获得,储存时间的长短以及表面如何进行,尽管热处理错误,偶尔会被水浪打湿。试验包括2017铜铝合金,该项研究始于二十世纪三十年代。那时,其值都没有显著差异。该局发现,例如有机喷涂和无机镀层。该局于是对能找到的贱合金及其所采用的,ば源胧,,多种方式表面处理。有电镀和裸露的,有几个用多种有机和无机涂层的,铝合金的高强度试验用于航空领域。但对于长期暴露条件下,し绞酱砉C恐趾辖鸬母葱Ч扇庋酃鄄旌拖晕⑹匝橐约把由炻世唇衅兰邸J笛榭既鲈潞,ね坎憬醒芯亢褪匝,2017 仅仅镀了薄薄一层低强度合金,而那些热处理得当的试棒有令人满意的性能。不过,以及巴拿马运河流域。巴拿马运河流域属热带海洋气候,佛吉尼亚,ご,有些直到最近才由试验状态转化为商业状态。热处理合金这项研究包括那些热处理后易于硬化和不大受影响的合金。硅锰合金54-H34就属于后者。其他合金包括包括镍,华盛顿特区,硅锰金属也在研究之列。0,75英寸乘以9英寸长的试棒被分别露天置放于各个不同选择地点,暴露后的铜铝合金的确产生粒间腐蚀和测量不到延伸率的情况,其防腐性能如何却知之甚少。当时为铝材料采取了很多,使之长时间暴露于各种气象条件下长达二十年之久。这项研究提供了二十年来铝合金防腐方面的数据,而华盛顿和诺,宋诼轿麓蚝退掀颉H克鲜园舳贾梅庞诎侗吒浇,仍然有着非常良好的耐腐蚀性。,进行抗拉强度试验。经过腐蚀试验样棒的抗拉强度和延伸率与标准试棒进行比较。标准试棒的标准值是试棒原始值与分别保管于干燥条件一定时间的试棒的平均值。统计数据表明,热处理方式不当,诺,
提问者评价
实在太感谢啦 论文翻译有着落了 呵呵
其他类似问题
翻译英文的相关知识
等待您来回答
您可能关注的推广
下载知道APP
随时随地咨询
出门在外也不愁如何较好的翻译英文文献_百度知道
如何较好的翻译英文文献
提问者采纳
读懂内容,最后是翻译成句,这与平时的积累,仔细琢磨。当然,汉语水平都有关系。,首先要了解文献的写作背景,然后查单词,
提问者评价
其他类似问题
翻译英文的相关知识
其他2条回答
用谷歌翻译,觉得翻译不同的再用金山翻译单词,
找专业人士
等待您来回答
您可能关注的推广回答者:
下载知道APP
随时随地咨询
出门在外也不愁}

我要回帖

更多关于 翻译英文文献的软件 的文章

更多推荐

版权声明:文章内容来源于网络,版权归原作者所有,如有侵权请点击这里与我们联系,我们将及时删除。

点击添加站长微信