首页 文章 问题

priordesign(priordesign官网)

爱车范儿
爱车范儿 2022-09-23 19:55
+关注

关于IC卡的英文资料最好带翻译3000字左右 100分

换个马甲,资料太多,你可以摘录自己需要的材料 Health care (Medical)Smart health cards can improve the security and privacy of patient information, provide the secure carrier for portable medical records, reduce health care fraud, support new processes for portable medical records, provide secure access to emergency medical information, enable compliance with government initiatives and mandates, and provide the platform to implement other applications as needed by the health care organization. [7]IdentificationA quickly growing application is in digital identification cards. In this application, the cards are used for authentication of identity. The most common example is in conjunction with a PKI. The smart card will store an encrypted digital certificate issued from the PKI along with any other relevant or needed information about the card holder. Examples include the U.S. Department of Defense (DoD) Common Access Card (CAC), and the use of various smart cards by many governments as identification cards for their citizens. When combined with biometrics, smart cards can provide two- or three-factor authentication. Smart cards are not always a privacy-enhancing technology, for the subject carries possibly incriminating information about him all the time. By employing contactless smart cards, that can be read without having to remove the card from the wallet or even the garment it is in, one can add even more authentication value to the human carrier of the cards.The first smart card driver's license system in the world was issued in 1995 in Mendoza, a province of Argentina. Mendoza has a high level of road accidents, driving offenses, and a poor record of recovering outstanding fines.[citation needed] The smart licenses keep an up-to-date record of driving offenses and unpaid fines. They also store personal information, license type and number, and a photograph of the holder. Emergency medical information like blood type, allergies, and biometrics (fingerprints) can be stored on the chip if the cardholder wishes. The Argentina government anticipates that this new system will help to recover more than $10 million per year in fines.Gujarat was the first state in India to introduce the smart card license system in 1999. To date the Gujarat Government has issued 5 million smart card driving licenses to its people.[citation needed] This card is basically a plastic card having ISO/IEC 7810 certification and integrated circuit, capable of storing and verifying information according to its programming.“a national ID card, protected by a 1,024-bit key code, is impossible to break ``without a supercomputer working away for a hundred years” [8]By the start of 2009 the entire population of Spain and Belgium will have an eID card, that is issued by the Spanish and Belgian Governments and that is used to identify an individual. These cards contain 2 certificates: one for authentication and one for signature. This signature is legally adopted. More and more services in these countries are using the eID card as an authorization token. More information on [2]and [3]OtherSmart cards are widely used to protect digital television streams. See television encryption for an overview, and VideoGuard for a specific example of how smart card security worked (and was cracked).The Malaysian government uses smart card technology in identity cards carried by all Malaysian citizens and resident non-citizens. The personal information inside the smart card (called MYKAD) can be read using special APDU commands.MYKAD SDKSecuritySmart cards have been advertised as suitable for personal identification tasks, because they are engineered to be tamper resistant. The embedded chip of a smart card usually implements some cryptographic algorithm. There are, however, several methods of recovering some of the algorithm's internal state.Differential power analysisDifferential power analysis[9] involves measuring the precise time and electrical current required for certain encryption or decryption operations. This is most often used against public key algorithms such as RSA in order to deduce the on-chip private key, although some implementations of symmetric ciphers can be vulnerable to timing or power attacks as well.Physical disassemblySmart cards can be physically disassembled by using acid, abrasives, or some other technique to obtain direct, unrestricted access to the on-board microprocessor. Although such techniques obviously involve a fairly high risk of permanent damage to the chip, they permit much more detailed information (e.g. photomicrographs of encryption hardware) to be extracted.ProblemsAnother problem of smart cards may be the failure rate. The plastic card in which the chip is embedded is fairly flexible, and the larger the chip, the higher the probability of breaking. Smart cards are often carried in wallets or pockets — a fairly harsh environment for a chip. However, for large banking systems, the failure-management cost can be more than offset by the fraud reduction. A card enclosure might be a good idea.Using a smart card for mass transit presents a risk for privacy, because such a system enables the mass transit operator (and the authorities) to track the movement of individuals. In Finland, the Data Protection Ombudsman prohibited the transport operator YTV from collecting such information, in spite of YTV's argument that the owner of the card has the right to get a list of journeys paid with the card. Prior to this, such information was used in the investigation of the Myyrmanni bombing.This section does not cite any references or sources. Please help improve this article by adding citations to reliable sources (ideally, using inline citations). Unsourced material may be challenged and removed. (September 2007)This article may require copy-editing for grammar. You can assist by editing it now. A how-to guide is available. (January 2009)Smart cards used for client-side identification and authentication are the most secure way for eg. internet banking applications, but the security is never 100% sure. In the example of internet banking, if the PC is infected with any kind of malware, the security model is broken. A malware can override the communication (both input via keyboard and output via application screen) between the user and the internet banking application (eg. browser). This would result in modifying transactions by the malware and unnoticed by the user. There are malwares in the wild with this capability (eg. Trojan. Silentbanker). Banks like Fortis and Dexia in Belgium combine a Smart card with an unconnected card reader to avoid this problem. The customer enters a challenge received from the bank's website, his PIN and the transaction amount into the card reader, the card reader returns an 8 digits signature. This signature is manually copied to the PC and verified by the bank. This method prevents a malware to change the transaction amount.In addition to technical hurdles is the lack of standards for smart card functionality and security. To address this problem, the ERIDANE Project was launched by The Berlin Group to develop a proposal for "a new functional and security framework for smart-card based Point of Interaction (POI) equipment", equipment that would be used, for instance, in retail environments.[10]Toppan Printing Company (凸版印刷 ,Toppan insatsu?) developed smart card material with paper, instead of plastic, which is reusable and no need to incineration or buried in the soil after disposal, this paper based smart card put in market from April 2009.[11]智能卡(Smartcard 或 IC Card),又称智慧卡、聪明卡、集成电路卡,指指粘贴或嵌有集成电路芯片的一种便携式卡片塑胶。卡片包含了微处理器、I/O接口及内存,提供了资料的运算、存取控制及储存功能,卡片的大小、接点定义目前是由ISO规范统一,主要规范在ISO7816中。常见的有电话IC卡、身份IC卡,以及一些交通票证和存储卡。历史IC卡是一种外形与信用卡一样,卡上含有一个符合ISO 标准的集成电路芯片卡片,又称“集成电路卡”、智能卡,英文名称“Integrated Circuit Card”或“Smart card”,是法国人Ro-land morono于1974年发明的,将具有存储加密及数据处理能力的集成电路芯片模组封装于和信用卡尺寸一样大小的塑胶片基中,便构成了IC卡。法国布尔(BULL)公司于1976年首先制成IC卡产品,并开始应用在各个领域。[1]组成基片:现在多为PVC材质,也有塑料或是纸制接触面:金属材质,一般为铜制薄片,集成电路的输入输出端连结到大的接触面上,这样便于读写器的操作,大的接触面也有助于延长卡片使用寿命;触点一般有8个(C1 C2 C3 C4 C5 C6 C7 C8, C4和C8设计为将来保留用),但由于历史原因有的智能卡设计成6个触点(C1 C2 C3 C5 C6 C7)。另外,C6原来设计为对EEPROM供电,但因后来EEPROM所需的程式电压(Programming Voltage)由芯片内直接控制,所以C6通常也就不再使用了。 集成芯片:通常非常薄,在0.5mm以内,直径大约1/4厘米,一般成圆形,方形的也有,内部芯片一般有CPU RAM ROM EPROM.
Smart card A smart card, chip card, or integrated circuit card (ICC), is in any pocket-sized card with embedded integrated circuits which can process data. This implies that it can receive input which is processed — by way of the ICC applications — and delivered as an output. There are two broad categories of ICCs. Memory cards contain only non-volatile memory storage components, and perhaps some specific security logic. Microprocessor cards contain volatile memory and microprocessor components. The card is made of plastic, generally PVC, but sometimes ABS. The card may embed a hologram to avoid counterfeiting. Using smartcards also is a form of strong security authentication for single sign-on within large companies and organizations.OverviewA "smart card" is also characterized as follows:Dimensions are normally credit card size. The ID-1 of ISO/IEC 7810 standard defines them as 85.60 × 53.98 mm. Another popular size is ID-000 which is 25 × 15 mm (commonly used in SIM cards). Both are 0.76 mm thick.Contains a security system with tamper-resistant properties (e.g. a secure cryptoprocessor, secure file system, human-readable features) and is capable of providing security services (e.g. confidentiality of information in the memory).Asset managed by way of a central administration system which interchanges information and configuration settings with the card through the security system. The latter includes card hotlisting, updates for application data.Card data is transferred to the central administration system through card reading devices, such as ticket readers, ATMs etc.BenefitsSmart cards can be used for identification, authentication, and data storage.[1]Smart cards provide a means of effecting business transactions in a flexible, secure, standard way with minimal human intervention.Smart card can provide strong authentication[2] for single sign-on or enterprise single sign-on to computers, laptops, data with encryption, enterprise resource planning platforms such as SAP, etc.HistoryThe automated chip card was invented by German rocket scientist Helmut Gröttrup and his colleague Jürgen Dethloff in 1968; the patent was finally approved in 1982. The first mass use of the cards was for payment in French pay phones, starting in 1983 (Télécarte).Roland Moreno actually patented his first concept of the memory card in 1974. In 1977, Michel Ugon from Honeywell Bull invented the first microprocessor smart card. In 1978, Bull patented the SPOM (Self Programmable One-chip Microcomputer) that defines the necessary architecture to auto-program the chip. Three years later, the very first "CP8" based on this patent was produced by Motorola. At that time, Bull had 1200 patents related to smart cards. In 2001, Bull sold its CP8 Division together with all its patents to Schlumberger. Subsequently, Schlumberger combined its smart card department and CP8 and created Axalto. In 2006, Axalto and Gemplus, at the time the world's no.2 and no.1 smart card manufacturers, merged and became Gemalto.A smart card, combining credit card and debit card properties. The 3 by 5 mm security chip embedded in the card is shown enlarged in the inset. The contact pads on the card enables electronic access to the chip.The second use was with the integration of microchips into all French debit cards (Carte Bleue) completed in 1992. When paying in France with a Carte Bleue, one inserts the card into the merchant's terminal, then types the PIN, before the transaction is accepted. Only very limited transactions (such as paying small autoroute tolls) are accepted without PIN.Smart-card-based electronic purse systems (in which value is stored on the card chip, not in an externally recorded account, so that machines accepting the card need no network connectivity) were tried throughout Europe from the mid-1990s, most notably in Germany (Geldkarte), Austria (Quick), Belgium (Proton), France (Moneo), the Netherlands (Chipknip and Chipper), Switzerland ("Cash"), Norway ("Mondex"), Sweden ("Cash"), Finland ("Avant"), UK ("Mondex"), Denmark ("Danmønt") and Portugal ("Porta-moedas Multibanco").The major boom in smart card use came in the 1990s, with the introduction of the smart-card-based SIM used in GSM mobile phone equipment in Europe. With the ubiquity of mobile phones in Europe, smart cards have become very common.The international payment brands MasterCard, Visa, and Europay agreed in 1993 to work together to develop the specifications for the use of smart cards in payment cards used as either a debit or a credit card. The first version of the EMV system was released in 1994. In 1998 a stable release of the specifications was available. EMVco, the company responsible for the long-term maintenance of the system, upgraded the specification in 2000 and most recently in 2004. The goal of EMVco is to assure the various financial institutions and retailers that the specifications retain backward compatibility with the 1998 version.With the exception of countries such as the United States of America there has been significant progress in the deployment of EMV-compliant point of sale equipment and the issuance of debit and or credit cards adhering the EMV specifications. Typically, a country's national payment association, in coordination with MasterCard International, Visa International, American Express and JCB, develop detailed implementation plans assuring a coordinated effort by the various stakeholders involved.The backers of EMV claim it is a paradigm shift in the way one looks at payment systems. In countries where banks do not currently offer a single card capable of supporting multiple account types, there may be merit to this statement. Though some banks in these countries are considering issuing one card that will serve as both a debit card and as a credit card, the business justification for this is still quite elusive. Within EMV a concept called Application Selection defines how the consumer selects which means of payment to employ for that purchase at the point of sale.For the banks interested in introducing smart cards the only quantifiable benefit is the ability to forecast a significant reduction in fraud, in particular counterfeit, lost and stolen. The current level of fraud a country is experiencing, coupled with whether that country's laws assign the risk of fraud to the consumer or the bank, determines if there is a business case for the financial institutions. Some critics claim that the savings are far less than the cost of implementing EMV, and thus many believe that the USA payments industry will opt to wait out the current EMV life cycle in order to implement new, contactless technology.Smart cards with contactless interfaces are becoming increasingly popular for payment and ticketing applications such as mass transit. Visa and MasterCard have agreed to an easy-to-implement version currently being deployed (2004-2006) in the USA. Across the globe, contactless fare collection systems are being implemented to drive efficiencies in public transit. The various standards emerging are local in focus and are not compatible, though the MIFARE Standard card from Philips has a considerable market share in the US and Europe.Smart cards are also being introduced in personal identification and entitlement schemes at regional, national, and international levels. Citizen cards, drivers’ licenses, and patient card schemes are becoming more prevalent; For example in Malaysia, the compulsory national ID scheme MyKad includes 8 different applications and is rolled out for 18 million users. Contactless smart cards are being integrated into ICAO biometric passports to enhance security for international travel.Contact smart cardContact smart cards have a contact area, comprising several gold-plated contact pads, that is about 1 cm square. When inserted into a reader, the chip makes contact with electrical connectors that can read information from the chip and write information back.[3]The ISO/IEC 7816 and ISO/IEC 7810 series of standards define:the physical shapethe positions and shapes of the electrical connectorsthe electrical characteristicsthe communications protocols, that includes the format of the commands sent to the card and the responses returned by the card.robustness of the cardthe functionalityThe cards do not contain batteries; energy is supplied by the card reader.Electrical signals descriptionA smart card pinoutVCC : Power supply inputRST : Either used itself (reset signal supplied from the interface device) or in combination with an internal reset control circuit (optional use by the card). If internal reset is implemented, the voltage supply on Vcc is mandatory.CLK : Clocking or timing signal (optional use by the card).GND : Ground (reference voltage).VPP : Programming voltage input (deprecated / optional use by the card).I/O : Input or Output for serial data to the integrated circuit inside the card.NOTE - The use of the two remaining contacts will be defined in the appropriate application standards.ReaderSee also: Card reader#Smart card readersContact smart card readers are used as a communications medium between the smart card and a host, e.g. a computer, a point of sale terminal, or a mobile telephone.Since the chips in the financial cards are the same as those used for mobile phone Subscriber Identity Module (SIM) cards, just programmed differently and embedded in a different shaped piece of PVC, the chip manufacturers are building to the more demanding GSM/3G standards. So, for instance, although EMV allows a chip card to draw 50 mA from its terminal, cards are normally well inside the telephone industry's 6mA limit. This is allowing financial card terminals to become smaller and cheaper, and moves are afoot to equip every home PC with a card reader and software to make internet shopping more secure.[citation needed]Contactless smart cardMain ArticleSee also: List of smart cardsA second type is the contactless smart card, in which the chip communicates with the card reader through RFID induction technology (at data rates of 106 to 848 kbit/s). These cards require only close proximity to an antenna to complete transaction. They are often used when transactions must be processed quickly or hands-free, such as on mass transit systems, where smart cards can be used without even removing them from a wallet.The standard for contactless smart card communications is ISO/IEC 14443. It defines two types of contactless cards ("A" and "B"), allows for communications at distances up to 10 cm. There had been proposals for ISO/IEC 14443 types C, D, E and F that have been rejected by the International Organization for Standardization. An alternative standard for contactless smart cards is ISO 15693, which allows communications at distances up to 50 cm.Examples of widely used contactless smart cards are Hong Kong's Octopus card, South Korea's T-money (Bus, Subway, Taxi), London's Oyster card, Japan Rail's Suica Card and Mumbai Bus transportation service BEST uses smart cards for bus pass, which predate the ISO/IEC 14443 standard. All of them are primarily designed for public transportation payment and other electronic purse applications.Novosibirsk (Russia). Transport farecollection terminal CFTSmartcard being used to pay for public transportation in the Helsinki area.Compass Card being used to pay for public transportation in the San Diego area.A related contactless technology is RFID (radio frequency identification). In certain cases, it can be used for applications similar to those of contactless smart cards, such as for electronic toll collection. RFID devices usually do not include writeable memory or microcontroller processing capability as contactless smart cards often do.There are dual-interface cards that implement contactless and contact interfaces on a single card with some shared storage and processing. An example is Porto's multi-application transport card, called Andante, that uses a chip in contact and contactless (ISO/IEC 14443 Type B).Like smart cards with contacts, contactless cards do not have a battery. Instead, they use a built-in inductor to capture some of the incident radio-frequency interrogation signal, rectify it, and use it to power the card's electronics.Communication protocolsCommunication protocols Name DescriptionT=0 Character-level transmission protocol, defined in ISO/IEC 7816-3T=1 Block-level transmission protocol, defined in ISO/IEC 7816-3ISO/IEC 14443 APDU transmission via contactless interface, defined in ISO/IEC 14443-4Credit card contactless technologyThese are the best known payment cards (classical plastic card):Visa: Visa Contactless, Quick VSDC - "qVSDC", Visa Wave, MSD, payWaveMasterCard: PayPass Magstripe, PayPass MChipAmerican Express: Express PayChase: Blink (credit and debit cards)Roll-outs started in 2005 in USA (Asia and Europe - 2006). Contactless (non PIN) transactions cover a payment range of ~$5-50. There is an ISO/IEC 14443 PayPass implementation. All PayPass implementations may be separated on EMV and non EMV.Non-EMV cards work like magnetic stripe cards. This is a typical card technology in the USA (PayPass Magstripe and VISA MSD). The cards do not control amount remaining. All payment passes without a PIN and usually in off-line mode. The security level of such a transaction is no greater than with classical magnetic stripe card transaction.EMV cards have two interfaces (contact and contactless) and they work as a normal EMV card via contact interface. Via contactless interface they work almost like an EMV (card command sequence adopted on contactless features as low power and short transaction time).Cryptographic smart cardsCryptographic smart cards are often used for single sign-on. Most advanced smart cards are equipped with specialized cryptographic hardware that let you use algorithms such as RSA and DSA on board. Today's cryptographic smart cards are also able to generate key pairs on board, to avoid the risk of having more than one copy of the key (since by design there usually isn't a way to extract private keys from a smart card).Such smart cards are mainly used for digital signature and secure identification, (see applications section). [4]The most common way to access cryptographic smart card functions on a computer is to use a PKCS#11 library provided by the vendor. On Microsoft Windows platforms the CSP API is also adopted.The most widely used cryptographic algorithms in smart cards (excluding the GSM so-called "crypto algorithm") are 3DES (Triple DES) and RSA. The key set is usually loaded (DES) or generated (RSA) on the card at the personalization stage.ApplicationsComputer securityThe Mozilla Firefox web browser can use smart cards to store certificates for use in secure web browsing[5].Some disk encryption systems, such as FreeOTFE or TrueCrypt, can use smart cards to securely hold encryption keys, and also to add another layer of encryption to critical parts of the secured disk[6].Smartcards are also used for single sign-on to log on to computersSmartcards support functionality has been added to Windows Live PassportsFinancialThe applications of smart cards include their use as credit or ATM cards, in a fuel card, SIMs for mobile phones, authorization cards for pay television, pre-pay utilities in household, high-security identification and access-control cards, and public transport and public phone payment cards. Smart cards may also be used as electronic wallets. The smart card chip can be loaded with funds which can be spent in parking meters and vending machines or at various merchants. Cryptographic protocols protect the exchange of money between the smart card and the accepting machine. There is no connection to the issuing bank necessary, so the holder of the card can use it regardless of him being the owner. Examples are Proton, Geldkarte, Chipknip and Mon�o. The German Geldkarte is also used to validate the customers age at vending machines for cigarettes.
关于IC卡的英文资料最好带翻译3000字左右 100分

英文翻译!急!

The focal point of this thesis is that solar energy only bends over the systematic design and design of complementary system of scene. The design of the solar energy solar cell system is divided into software design and hardware and designed, and software design is prior to the hardware to design. Software design includes: Calculation of the power consumption of load, calculation of radiation quantity the square matrix of the solar cell, calculation of solar cell, battery consumption and optimization design matching each other between the two, install calculation of the inclination, prediction of the systematic running situation and analysis of systematic economic benefits,etc. in square matrix of the solar cell. The hardware is designed and included: The selecting type of load and essential design, the selecting types of solar cell and battery, the design of the solar cell support, go against the selecting type of the becoming device and design, and control, measuring system selecting type and designing. As to the large-scale solar energy solar cell system, glazed to bend over battery square matrix design of field, prevent thunder earth design, distribution design and assist or spare selecting type of power and design of system from. Because software design involves the complicated radiation amount of solar energy, installs the design of inclination and system optimization to calculate, Generally finished by the computer; Can adopt the method estimated too on condition that require not very strict. Scene complementary electricity generation system can follow power consuming load situation and resource terms of user carry on systematic reasonable disposition of capacity, can that security system supply power dependability, can reduce fabrication cost of electricity generation system. No matter what kind of environment and how complementary electricity generation system can systematic design plan optimized most to make come requirement to satisfied with user with require scene by electricity. Should say, the complementary electricity generation system of scene is the most rational independent power system. 本人英语6级,一定可以的
The point of this thesis is the design moderate breezes of the solar energy light 伏 system, the light repairs system with each other of design.The solar energy light 伏 generates electricity the design of system to is divided into software design and hardware design, and the software design designs in the hardware first.The software design includes:The load uses the calculation of electricity quantity, solar cell phalanx noodles radiation quantity of calculation, of[with] the calculation and twos of solar cell, storage battery dosage match mutually of excellent turn a design, solar cell phalanx install 倾 Cape of calculation, system circulate analytical etc. of[with] the estimate and the system economic performance of[with] circumstance.The hardware design includes:Load of choose a type and necessity of the design, solar cell and storage battery choose a type, the design of solar cell support, go against to change a machine to choose type and design, and control, measure the system choose type and design.Generate electricity system to the large solar energy light 伏 , have to also have light 伏 battery phalanx the design of the field, defend the design that the thunder connects ground and go together with electricity system of design and assistance or back up the power supply choose type and design.Because the software design concerns complicated solar energy radiation quantity and installs 倾 Cape and system an excellent design calculation for turning, generally from calculator to complete of;Can also adopt the way for estimating under the sistuation that haven't that strict request. Scene's supplying again electricity system with each other can carry on system capacity with the electricity burden circumstance and resources condition according to the customer of the reasonable install, promise the credibility of system power supply then, and then can lower to generate electricity system to build price.No matter what kind of it is environment with how of use an electricity request, scene's supplying again electricity systems with each other can make superior turn of system design project to satisfy the request of customer.Should say, scene's supplying again electricity system with each other is the most reasonable independent power supply system.
The point of this thesis is the design moderate breezes of the solar energy light Fu system, the light with each other repairs system of design.The solar energy light Fu generates electricity the design of system to is divided into software design and hardware design, and the software design designs at the hardware first.The software design include:The load uses the calculation of electricity quantity, solar cell phalanx noodles radiation quantity of calculation, of the calculation and twos of solar cell, storage battery dosage matches mutually of excellent turn a design, solar cell phalanx install Qing Cape of calculation, system circulate the estimate of the circumstance and analytical etc. of the system economic performance.The hardware design include:Load of choose the design of type and necessity, choose of solar cell and storage battery type, the design of solar cell support, go against to change the choose of machine type and design, and control, measure the system choose type and design.Generate electricity system to the large solar energy light Fu, have to also have light Fu battery phalanx the design of the field, defend the design that the thunder connects ground and go together with electricity system of design and assistance or back up type and design of the choose of power supply.Because the software design concern complicated solar energy radiation quantity, install Qing Cape and system excellent design calculation for turn, generally from calculator to complete of;Can also adopt the way for estimate under the sistuation that haven't that strict request. The scene with each other supplies again electricity system and can then promise the credibility of system power supply, and then can lower to generate electricity build of system price according to the reasonable allocation that the electricity burden circumstance and resources condition carry on system capacity of use of customer.No matter what kind of it is environment with how of use an electricity request, scene's with each other supplying again electricity system can make superior turn of system design project to satisfy customer's request.Should say, scene's with each other supplying again electricity system is the most reasonable independent power supply system. The keyword light Fu generate electricity, the scene with each other supplies again an electricity, solar energy.
The focal point of this thesis is that solar energy only bends over the systematic design and design of complementary system of scene. The design of the solar energy solar cell system is divided into software design and hardware and designed, and software design is prior to the hardware to design. Software design includes: Calculation of the power consumption of load, calculation of radiation quantity the square matrix of the solar cell, calculation of solar cell, battery consumption and optimization design matching each other between the two, install calculation of the inclination, prediction of the systematic running situation and analysis of systematic economic benefits,etc. in square matrix of the solar cell. The hardware is designed and included: The selecting type of load and essential design, the selecting types of solar cell and battery, the design of the solar cell support, go against the selecting type of the becoming device and design, and control, measuring system selecting type and designing. As to the large-scale solar energy solar cell system, bend over the design of the square matrix field of battery, defend earth design of thunder, design and assisting or selecting type of the spare power and designing of distribution system glazedly. Because software design involves the complicated radiation amount of solar energy, installs the design of inclination and system optimization to calculate, generally finished by the computer; Can adopt the method estimated too on condition that require not very strict. Power consuming load situation and resource condition that the complementary electricity generation system of scene can follow users carry on the rational disposition of the systematic capacity, can that security system supply power dependability, can reduce fabrication cost of electricity generation system. No matter what kind of environment and how complementary electricity generation system can systematic design plan optimized most to make come requirement to satisfied with user with require scene by electricity. Should say, the complementary electricity generation system of scene is the most rational independent power system. The solar cell of keyword, the scene takes place complementarily Electricity, solar energy.
This paper focuses on solar photovoltaic system design and scenery complementary system design. Photovoltaic power generation system design software design and hardware design, software design and hardware design in the first. Software design include : load consumption, solar cell array of surface radiation, solar cells, Battery amount of calculation and mutual match between the optimum design, solar array installation inclination, operation of the system of forecasting and system cost-effective analysis. Hardware design, including : the selection and load the necessary design, solar batteries and battery selection, Solar battery stent design, the inverter selection and design, and control, measurement system selection and design. For large-scale solar photovoltaic power generation system, we should also have the PV array market design, mine grounding design, distribution system design and support or reserve power supply selection and design. Due to a software design involves complex solar radiation, installation and system optimization angle design, is usually completed by the computer; In less stringent requirements circumstances, it can take estimation approach. Sightseeing complementary generating system users can load and resource conditions of system capacity in the rational allocation can guarantee the reliability of electricity supply systems, and can also lower the cost of power generation system. No matter what the environment is and how the electricity requirements, Sightseeing power system can make optimal system design programs to meet the user's requirements. It should be said that the scenery complementary generating system is the most reasonable independent power supply system.
英文翻译!急!

英文翻译--高手来吧,高分悬赏哦

二。混合动力电动汽车电动机动态模型的研究 图。 1显示了永磁同步电动机的基本分析模型。由于极槽比为1.5,与分数槽集中绕组采用组合如图所示。 1(a)条。这也使得人们有可能最大限度地槽填补部分采用定子齿因素。桥梁结构,包括对管道的设计最高速度离心力。该混合动力汽车永磁同步电动机的规格表一所示三。特征到期撑弧撑间距比为了尽量减少转矩脉动,相反电动势波形应在无负载正弦波。因此,中小企业市场推广基金由于极弧背撑间距比之前分析的磁负荷的决定。对极弧参数撑间距比指宽的比例极下午角度俯仰角。反电动势波形图清盘是提出阶段。 2(一)根据极弧极间距比率从62.2%到90%。较小的极弧极间距的比例越大,降低反电动势由于每极磁通减少产生。但是,它可以实现在小极弧极间距比正弦反电动势波形。在论文中,如平均转矩和转矩脉动以及备份扭矩性能电磁场是安娜,对于极弧极间距比设计lyzed。图。 2(二)金正日¬ lustrates平均转矩和转矩脉动的分析结果根据极弧极间距的比例。表二显示了每个阶段的总反电势谐波失真(THD)。电磁场在背总谐波失真最小化在79%极弧极间距的比例。扭矩也平均在79%饱和极弧极间距的比例。然而,在转矩脉动79%极弧极间距比不最小虽然反电动势是最小的总谐波失真在这一点上。这是因为在桥梁构件磁饱和电枢反应发生在不同的地方。转矩波动仅仅意味着最大的差异最小转矩发电。因此,我们可以验证的反电动势总谐波失真并不总是相关的永磁同步电动机转矩脉动。为了集中在低转矩脉动,我们决定在极弧极间距比为73.5%的文件。 图。 3显示的结果相比较的反电动势之间的模拟和实验。对于结果的验证,谐波进行了比较,表三。
II。 混合动力汽车研究模型IPMSM 图1显示IPMSM基本分析模型。因为之比为1.5,槽磁极集中绕组采用以分数槽组合,如图1(a)。它也可以最大限度的填充因子运用槽定子段的牙齿。风管包括桥梁结构设计谋害离心力在最快的速度行驶。的使用说明书中注明为混合动力IPMSM表我。三。由于POLE-ARC特点,POLE-PITCH比率为了减小转矩脉动的阶段,反电动势波形正弦在不应负荷运转。因此,对反电动势由于pole-arc前pole-pitch比是分析决策的磁性装。pole-arc的参数,并对pole-pitch宽度的比值比手段的角度螺旋角点到极点。反电动势波形相绕组的给出了图2(a)根据pole-arc比率,从pole-pitch 62.2%高达90%以上。pole-arc pole-pitch越小,越低比例是,因为减少反电动势产生磁通每拿到杆位。然而,它可以实现正弦反电动势波形,在一个小小的pole-arc pole-pitch比率。在论文中,扭矩性能平均转矩和转矩脉动以及反电动势的设计是ana-lyzed pole-arc到pole-pitch比率。图2(b)il¬结果的分析lustrates平均转矩和转矩脉动,根据pole-arc pole-pitch比率。 附表二)显示总谐波畸变(容器)每一阶段的反电动势。 反电动势的拉力pole-arc降到最小程度,pole-pitch 79%的比率。平均转矩也是pole-arc饱和的79%,pole-pitch比率。 然而,在79% pole-arc转矩脉动最小,比不pole-pitch虽然脾反电动势是很小的,在这一点上。这是由于磁饱和,在斯坦福桥的组件发生在电枢反应不同。
在定子上,突出来的部分叫pole, pole 中间的就是slot,线圈缠绕在pole上 ,所以就有了slot 的fill factor这个概念。(pole 和slot的比例是5:1,我猜你是在看textbook,一句句翻译没什么意思。我需要看看你的图,看看哪里是teeth,理解一下为什么stator segment teeth可以最大化fill factor; 为什么 The duct including bridge 可以在高速时减少离心力。and need to take a look of spec. sheet table)
II。混合动力汽车研究模型IPMSM 图1显示IPMSM基本分析模型。因为之比为1.5,槽磁极集中绕组采用以分数槽组合,如图1(a)。它也可以最大限度的填充因子运用槽定子段的牙齿。风管包括桥梁结构设计谋害离心力在最快的速度行驶。的使用说明书中注明为混合动力IPMSM表我。 三。由于POLE-ARC特点的T
英文翻译--高手来吧,高分悬赏哦

英文翻译(工业设计)which states that the design addresses the whole User Experience这里很不理解

这里的意思是指“即整个用户体验设计地址”
英文翻译(工业设计)which states that the design addresses the whole User Experience这里很不理解

比萨斜塔英文介绍

Leaning Tower of Pisa, the campanile, freestanding bell tower, of the cathedral of Pisa, Italy. Like the cathedral and associated baptistery, the tower was built in the Romanesque style (see Romanesque Art and Architecture). Adjacent to the three structures is a cemetery, or camposanto (Italian: literally, holy field, originally meant to hold sacred soil from the holy land). The tower is renowned for its marked tilt. This spectacular irregularity has tended to obscure the fact that it is also a magnificent example of Romanesque architecture and decoration. Begun in 1173, the eight-story round tower is 55 m (180 ft) tall and 16 m (52 ft) in diameter at the base. The ground floor is encircled by a blind arcade, or series of walled-in arches. Six additional levels of open galleries, consisting of round arches supported on columns, are surmounted by the bell chamber, somewhat smaller in diameter. Although the tower's ancient bells remain in place, they are no longer rung. The interior of the tower is occupied by a 294-step spiral staircase that leads to the bell chamber. The exterior is adorned with fine multicolored marbles and excellent carved work. The doorway, which is especially ornate, features grotesque carvings of animals.Construction of the campanile stretched over a period of nearly 200 years, partly because of delays caused by the tower's persistent structural problems. By the time the first three stories were completed, one side of the tower had already begun to sink into the soft soil, and construction was halted for nearly 100 years. The first attempts to counter the lean of the structure were made in 1275, when construction resumed. By 1301 six stories were complete, and the tower was finished about 1350.At its summit, the structure tilts about 5 m (16 ft) from the vertical, and the lean is said to be increasing at a rate of about 1 mm (about 1/25 of an inch) per year. Italian physicist Galileo conducted his famous experiments with gravity and the relative speed of falling objects from the top story of the tower. The structure has been closed to the public since 1990 due to safety and conservation concerns.意大利比萨斜塔修建于1173年,由著名建筑师那诺·皮萨诺主持修建。它位于罗马式大教堂后面右侧,是比萨城的标志。开始时,塔高设计为100米左右,但动工五六年后,塔身从三层开始倾斜,直到完工还在持续倾斜,在其关闭之前,塔顶已南倾(即塔顶偏离垂直线)3.5米。1990年,意大利政府将其关闭,开始进行整修。在实际工作中,许多有关专家对比萨斜塔的全部历史以及塔的建筑材料、结构、地质、水源等方面进行充分的研究,并采用各种先进的仪器设备进行测试。比萨中古史学家皮洛迪教授研究后认为,建造塔身的每一块石砖都是一块石雕佳品,石砖与石砖间的粘合极为巧妙,有效地防止了塔身倾斜引起的断裂,成为斜塔斜而不倒的一个因素。但他仍强调指出,现在当务之急是弄清比萨斜塔斜而不倒的奥妙。从事观测该塔的专家盖里教授根据比萨斜塔近几年来倾斜的速度推测出,斜塔将于250年后因塔身的重心超出塔基外缘而倾倒。但是公共事务部比萨斜塔服务局的有关人员,针对盖里教授的看法提出了反驳,认为只按数学方式推算是不可靠的,比萨斜塔是“一个由多种事实交织成的综合性问题”。另一些研究者调查发现比萨斜塔塔身曾一度向东倾斜,尔后又转向南倾斜,他们同样认为该塔在过去几百年间斜而不倒,250年后倒与不倒恐怕不能局限于简单的假设和预测。当然,最关心斜塔命运的自然是比萨人,尽管他们也对斜塔的倾斜感到担忧,但更多的是骄傲和自豪,为自己的故乡拥有一个自认为可与世界上著名建筑媲美的斜塔而感到自豪。他们坚信它不会倒下,他们有这样一句俗语,比萨塔像比萨人一样健壮结实,永远不会倒下去。他们对那些把斜塔重新纠正竖直的建议最为深恶痛绝。如1934年,在地基及四周喷入90吨水泥,实施基础防水工程,塔身反而更加不稳,向周围移动,倾斜得更快。人们目前还难以预言比萨斜塔今后的命运,但仍感叹它斜而不倒的壮观景象参考资料:转自中华网http://culture.china.com/zh_cn/reading/shuzhai/11022789/20050616/12408245.html
The Leaning Tower of Pisa (Italian: Torre pendente di Pisa) or simply The Tower of Pisa (La Torre di Pisa) is the campanile, or freestanding bell tower, of the cathedral of the Italian city of Pisa. It is situated behind the Cathedral and it is the third structure in Pisa's Campo dei Miracoli (field of Miracles). Although intended to stand vertically, the tower began leaning to the southeast soon after the onset of construction in 1173 due to a poorly laid foundation and loose substrate that has allowed the foundation to shift. The height of the tower is 55.86 m (183.27 ft) from the ground on the lowest side and 56.70 m (186.02 ft) on the highest side. The width of the walls at the base is 4.09 m (13.42 ft) and at the top 2.48 m (8.14 ft). Its weight is estimated at 14,500 tonnes. The tower has 294 steps.
The Leaning Tower of Pisa is a valuable artifact of Italian engineering, history and culture for many more reasons than just because it leans. The Tower has borne witness to nearly 800 years of Italian history. It has survived innumerable wars, earthquakes, pestilence and the Plague.If only it could talk! The stories it must have stored in its stones. Maybe it would reveal the true architect of its design.Though historians know that construction began in 1173, they haven't figured out who designed it.1173: Construction begins on the Tower of Pisa. Evidence suggests the tower began to lean soon after, but historians discount theories that the original architects intended for the tower to lean.1185: Experts believe construction was interrupted at the fourth order, or level, of the tower.Construction probably resumed in 1231, only to be suspended again in 1292.1360: Tommaso Pisano completes the tower, adding a belfry and making other minor corrections.Late 1830s: Nearby excavation work begins to destabilize the tower's base.1990: Italian government closes tower to tourists over fears it is leaning too far.June 6, 2001: Official inauguration ceremony for the leaning Tower of Pisa .November 2001: The Tower is set to reopen to tourists and climbers for $12 admission. Guides will lead groups of 30 at time.Beyond 2300: Next time engineers believe the tower will need a major overhaul.The Leaning TowerIf you have a chance to travel in Europe , you’d better choose Italy as a good place tovisit , because Italy is a very famous country with a long history ,and there are manyinteresting cities in this country . There are millions of people each year who visit thecity of Pisa . It is known for the Leaning Tower (斜塔) of Pisa .The tower looks as if it might fall at any time. In fact, some visitors stop at the towerjust long enough to take a picture, then they hurry away. The tower has 294 steps(台阶).Visitors who can climb to the top and come down will feel like heroes(英雄).The engineers say that the visitors are safe, though the tower does lean. This tower hasbeen leaning for about800years. And it leans a tiny bit more every year. If this keeps on, thetower will fall at last. But many engineers are trying their best to keep the tower standing as long as possible.
The Tower of Pisa is the bell tower of the Cathedral. Its construction began in the august of 1173 and continued (with two long interruptions) for about two hundred years, in full fidelity to the original project, whose architect is still uncertain. In the past it was widely believed that the inclination of the Tower was part of the project ever since its beginning, but now we know that it is not so. The Tower was designed to be "vertical" (and even if it did not lean it would still be one of the most remarkable bell towers in Europe), and started to incline during its construction.Both because of its inclination, and its beauty, from 1173 up to the present the Tower has been the object of very special attention. During its construction efforts were made to halt the incipient inclination through the use of special construction devices; later colums and other damaged parts were substituted in more than one occasion; today, interventions are being carried out within the sub-soil in order to significantly reduce the inclination and to make sure that Tower will have a long life.In all this story it is possible to find a meaningful constant, the "genetic code" of the Tower: its continual interaction with the soil on which it was built. Today's (1999) works for the safeguard and the conservation of the Tower with very advanced methodologies are designed to fully respect this constant.In this site you will find:Tower's GalleryEvery detail of the Tower in 6400 pictures accessible interactively.Tower's EventsComplete information about the Tower from 1173 up to the present.Poster Information on the inclination and the restoration interventions in 14 displays.
The Leaning Tower of Pisa (Italian: Torre pendente di Pisa) or simply the Tower of Pisa (Torre di Pisa) is the campanile, or freestanding bell tower, of the cathedral of the Italian city of Pisa, known worldwide for its unintended tilt to one side. It is situated behind the Cathedral and is the third oldest structure in Pisa's Cathedral Square (Piazza del Duomo) after the Cathedral and the Baptistry. The tower's tilt began during construction, caused by an inadequate foundation on ground too soft on one side to properly support the structure's weight. The tilt increased in the decades before the structure was completed, and gradually increased until the structure was stabilized (and the tilt partially corrected) by efforts in the late 20th and early 21st centuries. The height of the tower is 55.86 m (183.27 ft) from the ground on the low side and 56.70 m (186.02 ft) on the high side. The width of the walls at the base is 4.09 m (13.42 ft) and at the top 2.48 m (8.14 ft). Its weight is estimated at 14,500 metric tons(16,000 short tons). The tower has 296 or 294 steps; the seventh floor has two fewer steps on the north-facing staircase. Prior to restoration work performed between 1990 and 2001, the tower leaned at an angle of 5.5 degrees,[1][2][3] but the tower now leans at about 3.99 degrees.[4] This means that the top of the tower is displaced horizontally 3.9 metres (12 ft 10 in) from where it would be if the structure were perfectly vertical.[5]比萨斜塔(意大利语:Torre pendente di Pisa或Torre di Pisa)是意大利比萨城大教堂的独立式钟楼,位于比萨大教堂的后面,是奇迹广场[1]的三大建筑之一。钟楼始建于1173年,设计为垂直建造,但是在工程开始后不久便由于地基不均匀和土层松软而倾斜,1372年完工,塔身倾斜向东南。 比萨斜塔是比萨城的标志,1987年它和相邻的大教堂、洗礼堂、墓园一起因其对11世纪至14世纪意大利建筑艺术的巨大影响,而被联合国教育科学文化组织评选为世界遗产[2]。
比萨斜塔英文介绍

请选择举报类别

取消 确认
举报

精彩推荐

RECOMMEND

热门评论

TOP COMMENTS

登录进行回复
返回首页
热门提问
分享到
取消