prompt
stringlengths 1.06k
15.6k
| ori_text
stringlengths 1.02k
15.6k
| reference_list
stringlengths 65
2.27k
| __internal_uuid__
stringlengths 5
5
| Primary_Domain
stringclasses 4
values | Secondary_Domain
stringclasses 17
values | prompt_id
stringlengths 1
3
|
|---|---|---|---|---|---|---|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
我国一直坚持对代孕完全禁止的立法态度,但是在2015年下半年所通过的《人口与计划生育法修正案》中,立法人员出于对不孕不育家庭生育孩子权力的人道主义考虑,把此前关于禁止以任何形式实施代孕的法律条款进行了删除,这就让代孕在法律层面有了一定的管理空白。并且在社会中,我国当前广泛存在着不孕不育家庭,这些家庭在当前科学技术的辅助下完全可以实现拥有自己孩子的梦想,还有失独家庭对孩子的需要使得代孕看似可以推行。但在社会实际中,代孕弃养、物化女性,或者公众人物单纯为了自身的利益为目的违反公序良俗选择代孕等等不良现象层出不穷,这不得不需要社会进行深刻地反思,从伦理道德出发分析代孕合法性的对与错,为以后我国代孕合法性的未来走向总结推引出合理的建议,也为这一社会问题的解决而助力。
一、代孕合法性争议下的道德相对论
(一)支持说
首先从法律的角度来看,代孕合法化是对生育权的一种法律保护,更是对基本人权的一种保障,在我国的《妇女权益保障法》中明确确定了生育权这个概念,生育权是人权的一种,是每个家庭,每对父母所享有的基本权利,此外《婚姻法》《人口与计划生育法》都对生育权进行了相关的规定,每对夫妻享有是否生育孩子或者以何种方式生育孩子的权利,只要不违背社会公序良俗、伦理道德,皆可以为之。其次从法理学角度中来分析,可以把代孕合法性问题推引到道德与法律之间的关系上,本着维护正义的法律精神,代孕是对社会弱势群体的一种保护,不孕家庭、失独家庭因为缺少孩子而造成的心理负担以及现实矛盾让他们在社会大家庭中处于弱势的地位,为了帮助这类家庭走出困境,代孕是一种有效的方式,基于正义的法律精神,法律应该在这方面给以让步,并通过法律来保护这一行为,这是国家通过法律保护社会弱势群体的正义表现。最后再从为了社会和谐发展的目标来看代孕,太多的家庭因为年龄、疾病或者其他身体缺陷造成了家庭缺少孩子的情况,无法生育家庭或者失独家庭的需要使得代孕在我国民间广泛存在着,代孕若是被法律完全禁止,那么这些家庭的幸福如何被保障,因此出于对此类家庭的社会关怀以及本着社会和谐发展的目标,应该坚持实事求是的原则正视代孕的合理性存在,推广代孕合法化发展。
(二)反对说
首先代孕不符合中国的传统伦理道德观念,因为中国传统文化具有相对保守的特点,代孕并不被广大的社会群体所普遍接受,代孕行为容易受到社会歧视与冷漠。并且代孕是由多方当事人所共同完成的,之间的伦理关系,财产继承以及情感处理等诸多问题容易造成当事人之间的人伦关系扭曲,最终造成社会秩序紊乱,形成不好的影响。所以这种由多方当事人所共同完成的生育方式是对生命伦理关系的破坏,不应予以支持。其次从法律层面来看,首先从民事角度,代孕行为本身有违背社会的公序良俗,在合同法中基于这条原则代孕合同是根本站不住脚的,是无效合同。再从行政角度来看,关于代孕行为我国法律没有条文给予行政支持,就是任何医疗机构没有资质独立随意进行代孕手术或辅助,另外关于代孕子女也没有相应的户口、医疗管理规定。此外代孕行为也是对代孕妇女基本人权的侵害,是对其人格权的侮辱。还有代孕所生的子女在以后的成长道路中,也很容易受人诋毁,人格权遭到侵害,不利于其身心健康地成长。最后再从社会发展角度来看,代孕行为很容易造成社会纠纷,并且此类纠纷很难公平、公正有效的得以解决,遗留的问题更是长期影响着代孕家庭及代孕母亲,另外代孕行为的利益驱使还对社会的正确价值观念带来冲击,使得功利主义观在社会中暴涨,故此为了杜绝这些不良社会影响的出现,代孕行为应该被禁止。
|
我国一直坚持对代孕完全禁止的立法态度,但是在2015年下半年所通过的《人口与计划生育法修正案》中,立法人员出于对不孕不育家庭生育孩子权力的人道主义考虑,把此前关于禁止以任何形式实施代孕的法律条款进行了删除,这就让代孕在法律层面有了一定的管理空白。并且在社会中,我国当前广泛存在着不孕不育家庭,这些家庭在当前科学技术的辅助下完全可以实现拥有自己孩子的梦想,还有失独家庭对孩子的需要使得代孕看似可以推行。但在社会实际中,代孕弃养、物化女性,或者公众人物单纯为了自身的利益为目的违反公序良俗选择代孕等等不良现象层出不穷,这不得不需要社会进行深刻地反思,从伦理道德出发分析代孕合法性的对与错,为以后我国代孕合法性的未来走向总结推引出合理的建议,也为这一社会问题的解决而助力。
一、代孕合法性争议下的道德相对论
(一)支持说
首先从法律的角度来看,代孕合法化是对生育权的一种法律保护,更是对基本人权的一种保障,在我国的《妇女权益保障法》中明确确定了生育权这个概念,生育权是人权的一种,是每个家庭,每对父母所享有的基本权利,此外《婚姻法》《人口与计划生育法》都对生育权进行了相关的规定,每对夫妻享有是否生育孩子或者以何种方式生育孩子的权利,只要不违背社会公序良俗、伦理道德,皆可以为之。其次从法理学角度中来分析,可以把代孕合法性问题推引到道德与法律之间的关系上,本着维护正义的法律精神,代孕是对社会弱势群体的一种保护,不孕家庭、失独家庭因为缺少孩子而造成的心理负担以及现实矛盾让他们在社会大家庭中处于弱势的地位,为了帮助这类家庭走出困境,代孕是一种有效的方式,基于正义的法律精神,法律应该在这方面给以让步,并通过法律来保护这一行为,这是国家通过法律保护社会弱势群体的正义表现。最后再从为了社会和谐发展的目标来看代孕,太多的家庭因为年龄、疾病或者其他身体缺陷造成了家庭缺少孩子的情况,无法生育家庭或者失独家庭的需要使得代孕在我国民间广泛存在着,代孕若是被法律完全禁止,那么这些家庭的幸福如何被保障,因此出于对此类家庭的社会关怀以及本着社会和谐发展的目标,应该坚持实事求是的原则正视代孕的合理性存在,推广代孕合法化发展。
(二)反对说
首先代孕不符合中国的传统伦理道德观念,因为中国传统文化具有相对保守的特点,代孕并不被广大的社会群体所普遍接受,代孕行为容易受到社会歧视与冷漠。并且代孕是由多方当事人所共同完成的,之间的伦理关系,财产继承以及情感处理等诸多问题容易造成当事人之间的人伦关系扭曲,最终造成社会秩序紊乱,形成不好的影响。所以这种由多方当事人所共同完成的生育方式是对生命伦理关系的破坏,不应予以支持。其次从法律层面来看,首先从民事角度,代孕行为本身有违背社会的公序良俗,在合同法中基于这条原则代孕合同是根本站不住脚的,是无效合同。再从行政角度来看,关于代孕行为我国法律没有条文给予行政支持,就是任何医疗机构没有资质独立随意进行代孕手术或辅助,另外关于代孕子女也没有相应的户口、医疗管理规定。此外代孕行为也是对代孕妇女基本人权的侵害,是对其人格权的侮辱。还有代孕所生的子女在以后的成长道路中,也很容易受人诋毁,人格权遭到侵害,不利于其身心健康地成长。最后再从社会发展角度来看,代孕行为很容易造成社会纠纷,并且此类纠纷很难公平、公正有效的得以解决,遗留的问题更是长期影响着代孕家庭及代孕母亲,另外代孕行为的利益驱使还对社会的正确价值观念带来冲击,使得功利主义观在社会中暴涨,故此为了杜绝这些不良社会影响的出现,代孕行为应该被禁止。
|
考点1:“立法态度”推荐译为“ legislative stance; legislative attitude”
考点2:“ 管理空白”推荐译为“ regulatory vacuum;”
考点3:“ 失独家庭”推荐译为“ families who have lost their only child”
考点4:“代孕弃养”推荐译为“abandonment of children born through surrogacy”
考点5:“物化女性”推荐译为“the objectification of women; to commodify women”
考点6:“公序良俗”推荐译为“public order and good morals; public order and good customs”
考点7:“ 生育权 ”推荐译为“reproductive rights”
考点8:“法理学”推荐译为“ jurisprudence”
考点9:“社会弱势群体”推荐译为“socially vulnerable groups”
考点10:“人伦关系”推荐译为“ethical human relationships; familial and social ethics; kinship and ethical bonds”
考点11:“无效合同”推荐译为“Void contract”
考点12:“功利主义”推荐译为“profit-seeking mentality; materialism”,注意语境下的贬义表达
考点13:“我国”应译为“China”,而不是“our country”
|
7c517
|
学术论文
|
社会科学
|
12
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Protein Language Models have become important tools in computational biology for tasks such as protein structure prediction, functional annotation, and sequence design. These models draw on recent advances in Natural Language Processing , which uses Deep Learning techniques to capture complex relationships within protein sequences. However, optimizing Protein Language Models for specific biological tasks is still a huge challenge due to the large volume of protein sequence space and the complexity of folding and interaction. To transform general yet unfocused protein Large Language Models into expert tools capable of solving specific biological challenges, an optimized strategy that combines Fine-Tuning and Prompt Engineering has emerged. The essence of this approach lies in a two-pronged process: on one hand, Parameter-Efficient Fine-Tuning uses specialized datasets related to specific tasks to further train the model, much like providing specialized training to equip the model with deep, domain-specific knowledge and fundamentally enhance its performance in targeted applications. On the other hand, advanced Prompt Engineering serves as a “precise remote control,” enabling researchers to deliver complex design objectives and constraints to the model in real time and at a fine-grained level through well-structured and information-rich instructions, thereby precisely steering its generation process. These two techniques complement each other—Fine-Tuning endows the model with robust internal expertise, while Prompt Engineering provides the means to harness and direct this expertise. The synergy between them ultimately gives rise to the next generation of protein design tools, which are both deeply specialized and highly controllable, dramatically accelerating innovation in fields such as drug discovery and synthetic biology. Protein science, the study of protein structure, function, and interactions in living organisms, has entered a new era with the emergence of Large Language Models. This convergence leverages various Deep Learning models, particularly the Transformer, to analyze and predict protein sequences, structures, and functions, accelerating biomedical research and drug development. For example, ProteinBERT demonstrated the effectiveness for protein sequence analysis, while xTrimoPGLM, with its 100 billion parameters, established new capabilities in both protein understanding and generation. ProteinLMBench is a comprehensive, manually annotated benchmark for a comprehensive assessment of under- standing and representation of protein knowledge.TourSynbio-7B is a multi-modal large model designed for protein engineering and it does not require an external protein encoder.
AutoPE mainly introduces a proxy framework called AutoProteinEngine, which utilizes Large Language Models to implement multimodal automated machine learning in protein engineering. However, the reason why general Large Language Models perform poorly on scientific tasks fundamentally lies in the inherent flaws of the datasets used to train them. Simply expanding the size of general web-text corpora is far from sufficient, as these datasets cannot meet the rigorous requirements of scientific research in terms of quality, structure, and content. The specific limitations are as follows:
Contamination and low signal-to-noise ratio in general corpora: Models trained on such "polluted" data tend to develop "world knowledge" that is biased toward common sense rather than rigorous scientific facts. This leads to a propensity for hallucinations, namely, generating statements that sound plausible but are entirely incorrect, and makes it difficult to distinguish between peer-reviewed knowledge and arbitrary claims found on the internet. Neglect of the multimodality of scientific knowledge: During the processing of traditional text datasets, structured information is often flattened or discarded, causing the model to lose the essence of the "language" of science. A model exposed only to plain text cannot truly understand or manipulate a chemical reaction equation, nor can it correctly generate or interpret a complex mathematical derivation. Insufficient coverage of "long-tail" scientific knowledge: As a result, the model exhibits breadth but lacks depth in knowledge. It may be able to discuss basic physics fluently but remains completely ignorant of a particular branch of condensed matter physics or the latest algorithms in bioinformatics. This imbalance in knowledge coverage severely limits its usefulness as a professional research assistant. Lack of knowledge provenance and citation information: The model cannot provide citations or sources for its generated content, which is fatal in scientific applications. It cannot distinguish between widely accepted theories and controversial hypotheses, nor can it help researchers trace the original source of information, greatly undermining its reliability. Static and outdated information: The knowledge acquired by the model will inevitably become outdated. For rapidly fields such as Artificial Intelligence or gene editing, a model trained on data from several years ago may provide information that is incorrect or no longer applicable. Protein structure prediction and functional analysis are of great significance in the field of bioinformatics. In recent years, the application of protein large language model has greatly improved the accuracy of protein sequence analysis. However, how to efficiently Fine-Tuning the parameters of large language models for optimal performance remains a challenge Overwhelming hardware barriers, especially the “VRAM wall.” This is the most immediate and fundamental limitation. Full parameter Fine-Tuning requires loading all model parameters, gradients, and optimizer states into GPU VRAM during training. Overall, fully Fine-Tuning a 7B-parameter model may require close to 100GB of VRAM. This far exceeds the capacity of most consumer GPUs (such as the RTX 4090, with 24GB) and even many professional-grade GPUs, creating a “VRAM wall” that ordinary
users cannot overcome. Inefficiency in deployment and storage. Full parameter Fine-Tuning generates a complete and independent model copy for each specific downstream task. This leads to the problem of “model copy proliferation.” For organizations with limited resources, simply storing these massive model files is already overwhelming, let alone configuring a separate and expensive inference service for each model in production environments. This results in extremely high costs for model scaling and maintenance. Instability during training and “catastrophic forgetting.” On limited hardware, researchers may be forced to use extremely small batch sizes just to make training feasible. Too small a batch size causes gradients to be noisy, making the training process highly unstable and difficult to converge. Improvements in task-specific performance may come at the cost of degrading general capabilities, which is unacceptable in many application scenarios. At the same time, unstable training also increases the difficulty and time cost of hyperparameter tuning. Extremely low iteration efficiency and high trial-and-error costs. Each training cycle of full parameter Fine-Tuning is extremely time-consuming. With limited computational resources, completing a single Fine-Tuning experiment may take days or even weeks. This greatly slows the pace of research and innovation. Researchers are unable to quickly conduct experiments, test ideas, or adjust hyperparameters. The high time and energy costs make exploratory research a luxury, hindering the popularization and democratization of the technology. At present, the commonly used evaluation indicators for protein language models are limited, mainly focusing on sequence prediction, structure prediction, etc., lacking rich downstream functional or interactive evaluations. The evaluation system for Large Language Models in biomedicine is still not perfect, especially in downstream tasks such as interactive question answering and reasoning, where the problem of single evaluation indicators is more prominent. The evaluation of Protein Language Models mainly relies on a limited number of benchmarks, with insufficient consideration of diverse tasks and actual dialogue task. The dataset of Protein Language Models has problems such as insufficient coverage of professional domain knowledge, untimely data updates, severe data pollution, and difficulty in ensuring scientificity . The Fine-Tuning of Protein Language Models faces significant limitations: Firstly, full-parameter Fine-Tuning has extremely high requirements for video memory and hardware, which are unaffordable for ordinary researchers; Secondly, different tasks require the separate saving and deployment of complete models, which
leads to a significant increase in storage and operation and maintenance costs. Secondly, due to the limitations of hardware resources, unstable gradients and catastrophic forgetting are prone to occur during the training process, making it difficult to guarantee the model’s performance. Finally, the long training time and the low efficiency of experiments and parameter adjustment have greatly affected the promotion of research and application. At present, the evaluation methods for protein language models are relatively limited, mainly focusing on sequence and structure prediction, and lacking comprehensive assessment of downstream functionality and interactive capabilities. The evaluation system for large biomedical models is also not fully developed; in practical scenarios such as question answering and reasoning, the evaluation metrics are rather single-dimensional, making it difficult to fully demonstrate the overall application level of the models.
Based on the above content, the research questions are as follows. Firstly, this study optimized the application of Protein Language Models in the field of bioinformatics. By combining Fine-Tuning techniques and Prompt Engineering methods, it effectively enhanced the model’s capabilities in tasks such as protein sequence understanding, functional prediction, and structural inference. Secondly, this method can achieve efficient adaptation to specific downstream tasks without significantly increasing the consumption of computing resources, thereby promoting the automation and intelligence of protein science research. Finally, this research provides new ideas for the customized application of cross-domain large models, opens up broader prospects for the integration of life sciences and Artificial Intelligence, and helps accelerate the progress of practical applications such as drug design and disease mechanism analysis.
|
Protein Language Models have become important tools in computational biology for tasks such as protein structure prediction, functional annotation, and sequence design. These models draw on recent advances in Natural Language Processing , which uses Deep Learning techniques to capture complex relationships within protein sequences. However, optimizing Protein Language Models for specific biological tasks is still a huge challenge due to the large volume of protein sequence space and the complexity of folding and interaction. To transform general yet unfocused protein Large Language Models into expert tools capable of solving specific biological challenges, an optimized strategy that combines Fine-Tuning and Prompt Engineering has emerged. The essence of this approach lies in a two-pronged process: on one hand, Parameter-Efficient Fine-Tuning uses specialized datasets related to specific tasks to further train the model, much like providing specialized training to equip the model with deep, domain-specific knowledge and fundamentally enhance its performance in targeted applications. On the other hand, advanced Prompt Engineering serves as a “precise remote control,” enabling researchers to deliver complex design objectives and constraints to the model in real time and at a fine-grained level through well-structured and information-rich instructions, thereby precisely steering its generation process. These two techniques complement each other—Fine-Tuning endows the model with robust internal expertise, while Prompt Engineering provides the means to harness and direct this expertise. The synergy between them ultimately gives rise to the next generation of protein design tools, which are both deeply specialized and highly controllable, dramatically accelerating innovation in fields such as drug discovery and synthetic biology. Protein science, the study of protein structure, function, and interactions in living organisms, has entered a new era with the emergence of Large Language Models. This convergence leverages various Deep Learning models, particularly the Transformer, to analyze and predict protein sequences, structures, and functions, accelerating biomedical research and drug development. For example, ProteinBERT demonstrated the effectiveness for protein sequence analysis, while xTrimoPGLM, with its 100 billion parameters, established new capabilities in both protein understanding and generation. ProteinLMBench is a comprehensive, manually annotated benchmark for a comprehensive assessment of under- standing and representation of protein knowledge.TourSynbio-7B is a multi-modal large model designed for protein engineering and it does not require an external protein encoder.
AutoPE mainly introduces a proxy framework called AutoProteinEngine, which utilizes Large Language Models to implement multimodal automated machine learning in protein engineering. However, the reason why general Large Language Models perform poorly on scientific tasks fundamentally lies in the inherent flaws of the datasets used to train them. Simply expanding the size of general web-text corpora is far from sufficient, as these datasets cannot meet the rigorous requirements of scientific research in terms of quality, structure, and content. The specific limitations are as follows:
Contamination and low signal-to-noise ratio in general corpora: Models trained on such "polluted" data tend to develop "world knowledge" that is biased toward common sense rather than rigorous scientific facts. This leads to a propensity for hallucinations, namely, generating statements that sound plausible but are entirely incorrect, and makes it difficult to distinguish between peer-reviewed knowledge and arbitrary claims found on the internet. Neglect of the multimodality of scientific knowledge: During the processing of traditional text datasets, structured information is often flattened or discarded, causing the model to lose the essence of the "language" of science. A model exposed only to plain text cannot truly understand or manipulate a chemical reaction equation, nor can it correctly generate or interpret a complex mathematical derivation. Insufficient coverage of "long-tail" scientific knowledge: As a result, the model exhibits breadth but lacks depth in knowledge. It may be able to discuss basic physics fluently but remains completely ignorant of a particular branch of condensed matter physics or the latest algorithms in bioinformatics. This imbalance in knowledge coverage severely limits its usefulness as a professional research assistant. Lack of knowledge provenance and citation information: The model cannot provide citations or sources for its generated content, which is fatal in scientific applications. It cannot distinguish between widely accepted theories and controversial hypotheses, nor can it help researchers trace the original source of information, greatly undermining its reliability. Static and outdated information: The knowledge acquired by the model will inevitably become outdated. For rapidly fields such as Artificial Intelligence or gene editing, a model trained on data from several years ago may provide information that is incorrect or no longer applicable. Protein structure prediction and functional analysis are of great significance in the field of bioinformatics. In recent years, the application of protein large language model has greatly improved the accuracy of protein sequence analysis. However, how to efficiently Fine-Tuning the parameters of large language models for optimal performance remains a challenge Overwhelming hardware barriers, especially the “VRAM wall.” This is the most immediate and fundamental limitation. Full parameter Fine-Tuning requires loading all model parameters, gradients, and optimizer states into GPU VRAM during training. Overall, fully Fine-Tuning a 7B-parameter model may require close to 100GB of VRAM. This far exceeds the capacity of most consumer GPUs (such as the RTX 4090, with 24GB) and even many professional-grade GPUs, creating a “VRAM wall” that ordinary
users cannot overcome. Inefficiency in deployment and storage. Full parameter Fine-Tuning generates a complete and independent model copy for each specific downstream task. This leads to the problem of “model copy proliferation.” For organizations with limited resources, simply storing these massive model files is already overwhelming, let alone configuring a separate and expensive inference service for each model in production environments. This results in extremely high costs for model scaling and maintenance. Instability during training and “catastrophic forgetting.” On limited hardware, researchers may be forced to use extremely small batch sizes just to make training feasible. Too small a batch size causes gradients to be noisy, making the training process highly unstable and difficult to converge. Improvements in task-specific performance may come at the cost of degrading general capabilities, which is unacceptable in many application scenarios. At the same time, unstable training also increases the difficulty and time cost of hyperparameter tuning. Extremely low iteration efficiency and high trial-and-error costs. Each training cycle of full parameter Fine-Tuning is extremely time-consuming. With limited computational resources, completing a single Fine-Tuning experiment may take days or even weeks. This greatly slows the pace of research and innovation. Researchers are unable to quickly conduct experiments, test ideas, or adjust hyperparameters. The high time and energy costs make exploratory research a luxury, hindering the popularization and democratization of the technology. At present, the commonly used evaluation indicators for protein language models are limited, mainly focusing on sequence prediction, structure prediction, etc., lacking rich downstream functional or interactive evaluations. The evaluation system for Large Language Models in biomedicine is still not perfect, especially in downstream tasks such as interactive question answering and reasoning, where the problem of single evaluation indicators is more prominent. The evaluation of Protein Language Models mainly relies on a limited number of benchmarks, with insufficient consideration of diverse tasks and actual dialogue task. The dataset of Protein Language Models has problems such as insufficient coverage of professional domain knowledge, untimely data updates, severe data pollution, and difficulty in ensuring scientificity . The Fine-Tuning of Protein Language Models faces significant limitations: Firstly, full-parameter Fine-Tuning has extremely high requirements for video memory and hardware, which are unaffordable for ordinary researchers; Secondly, different tasks require the separate saving and deployment of complete models, which
leads to a significant increase in storage and operation and maintenance costs. Secondly, due to the limitations of hardware resources, unstable gradients and catastrophic forgetting are prone to occur during the training process, making it difficult to guarantee the model’s performance. Finally, the long training time and the low efficiency of experiments and parameter adjustment have greatly affected the promotion of research and application. At present, the evaluation methods for protein language models are relatively limited, mainly focusing on sequence and structure prediction, and lacking comprehensive assessment of downstream functionality and interactive capabilities. The evaluation system for large biomedical models is also not fully developed; in practical scenarios such as question answering and reasoning, the evaluation metrics are rather single-dimensional, making it difficult to fully demonstrate the overall application level of the models.
Based on the above content, the research questions are as follows. Firstly, this study optimized the application of Protein Language Models in the field of bioinformatics. By combining Fine-Tuning techniques and Prompt Engineering methods, it effectively enhanced the model’s capabilities in tasks such as protein sequence understanding, functional prediction, and structural inference. Secondly, this method can achieve efficient adaptation to specific downstream tasks without significantly increasing the consumption of computing resources, thereby promoting the automation and intelligence of protein science research. Finally, this research provides new ideas for the customized application of cross-domain large models, opens up broader prospects for the integration of life sciences and Artificial Intelligence, and helps accelerate the progress of practical applications such as drug design and disease mechanism analysis.
|
考点1: "Large Language Models" 应译为"大语言模型"
考点2: "multi-modal large model"应译为"多模态大模型"
|
7e079
|
学术论文
|
应用学科
|
172
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Obstetric anesthesia has evolved significantly over the past decade, driven by technological innovations, refined pharmacological strategies, and a deeper understanding of maternal-fetal physiology. These advancements have improved maternal and neonatal outcomes, addressing challenges in labor analgesia, cesarean delivery anesthesia, management of obstetric complications, and critical care in high-risk pregnancies. The field emphasizes patient-centered care, safety, and multidisciplinary collaboration, integrating anesthesiologists, obstetricians, neonatologists, and critical care specialists to optimize outcomes. This text explores these developments in detail, highlighting evidence-based practices, emerging technologies, and ongoing challenges.
**Labor Analgesia**: Effective labor analgesia balances pain relief with minimal maternal and fetal side effects. Low-dose local anesthetics (LAs), such as bupivacaine (0.0625–0.125%) or ropivacaine (0.1–0.2%), are combined with adjuvants like fentanyl (2–5 μg/mL), sufentanil (0.5–1 μg/mL), or dexamethasone (4–8 mg) to enhance epidural analgesia while reducing motor blockade. Programmed Intermittent Epidural Bolus (PIEB) has emerged as a superior technique compared to continuous epidural infusion (CEI). PIEB delivers boluses (e.g., 8–10 mL every 45–60 minutes) via automated pumps, reducing total LA consumption by 20–30%, breakthrough pain by 15%, and motor blockade incidence. Studies, such as those published in *Anesthesiology* (2021), demonstrate PIEB’s ability to improve maternal satisfaction and reduce anesthesiologist interventions. Dural Puncture Epidural (DPE) techniques, involving intentional dural puncture with a 25–27G spinal needle before epidural catheter placement, accelerate analgesia onset (by 5–10 minutes) and improve sacral spread, though randomized trials show inconsistent benefits over standard epidurals. Ultrasound-guided neuraxial techniques have revolutionized care for challenging patients, such as those with obesity (BMI >35 kg/m²), scoliosis, or prior spinal surgery. Automated vertebral level identification systems, using real-time ultrasound imaging, achieve 95% accuracy in landmark identification, reducing failed epidural placements by 50%. Non-neuraxial options, like remifentanil patient-controlled intravenous analgesia (PCA) (0.1–0.5 μg/kg bolus, 8–10 min lockout), provide rapid pain relief but pose risks, including a 24.7% incidence of maternal oxygen desaturation and a 5% need for neonatal oxygen supplementation. Concerns about remifentanil’s safety have limited its use, particularly as it lacks FDA approval for pregnancy. Immersive virtual reality (VR) is a novel non-pharmacological adjunct, effective in early labor (pain scores <8), reducing anxiety and pain perception by 30–40% in daytime settings, per a 2022 *BJOG* study. VR’s efficacy diminishes in advanced labor, and patient preference for its use varies.
**Cesarean Delivery Anesthesia**: Spinal anesthesia remains the preferred method for elective cesarean sections, offering rapid onset and reliable sensory blockade. Typical regimens include hyperbaric bupivacaine (10–12 mg) with fentanyl (10–25 μg) or morphine (100–200 μg) to prolong postoperative analgesia. Ultrasound-guided spinal anesthesia enhances first-attempt success rates (85–90%) and reduces complications like post-dural puncture headache (PDPH), which occurs in 1–3% of cases. PDPH is managed conservatively with hydration and caffeine, but severe cases require an epidural blood patch (EBP) with 15–20 mL autologous blood, achieving a 50–80% resolution rate. Post-spinal hypotension, affecting 50–70% of patients, is mitigated with prophylactic vasopressors, such as phenylephrine (25–50 μg/min infusion) or norepinephrine (6–8 μg bolus), targeting systolic blood pressure ≥90% of baseline or ≥100 mm Hg. The 2021 NICE guidelines emphasize individualized vasopressor dosing to prevent maternal nausea and fetal acidosis. Novel regional blocks, including quadratus lumborum block (QLB) and transversus abdominis plane (TAP) block, combined with wound infiltration (e.g., 0.25% bupivacaine), form the cornerstone of multimodal analgesia, reducing postoperative opioid consumption by 40%. For urgent cesarean deliveries (category 1, decision-to-delivery within 30 minutes), general anesthesia is required in 5–10% of cases. Videolaryngoscopy (e.g., Glidescope, C-MAC) improves intubation success rates (98% first-pass success), while high-flow nasal oxygen and second-generation supraglottic airway devices (e.g., Proseal LMA) minimize hypoxia risks. Preoperative neck and gastric ultrasound reduce aspiration risk by identifying full stomach conditions in 20% of urgent cases. Enhanced Recovery After Cesarean (ERAC) protocols promote early oral intake (within 2 hours), ambulation (within 6–8 hours), and catheter removal, reducing hospital stays by 12–24 hours and opioid use by 30%. However, ERAC implementation faces barriers in low-literacy populations, rural settings, and areas with limited staff training, as noted in a 2023 *Obstetric Anesthesia Digest* report.
**Obstetric Complication Management**: Major obstetric hemorrhage, a leading cause of maternal mortality (1–2% of deliveries), requires rapid intervention. Carbetocin (100 μg IV), a long-acting oxytocin analog, outperforms oxytocin in preventing postpartum hemorrhage, reducing blood loss by 100–200 mL, per a 2020 *Cochrane Database* review. Tranexamic acid (1 g IV within 3 hours) is standard for bleeding control, supported by the WOMAN trial, which reported a 19% reduction in mortality. Rotational thromboelastometry (ROTEM) guides transfusion, targeting hemoglobin >7 g/dL, platelets >75,000/μL, fibrinogen >2 g/L, and INR <1.5, minimizing unnecessary blood product use by 25%. Hypertensive disorders, such as preeclampsia and eclampsia, affect 5–10% of pregnancies and require blood pressure control (<140/90 mm Hg) with labetalol (20–80 mg IV) or hydralazine (5–10 mg IV). Continuous wave Doppler ultrasound assesses maternal hemodynamics, aiding early preeclampsia diagnosis with 80% sensitivity. Cardiac risk stratification, using tools like the CARPREG II score or modified WHO (mWHO) classification, identifies high-risk patients, with registries like Tamil Nadu’s Pregnancy and Heart Disease Registry improving maternal survival by 15%. Venous thromboembolism (VTE), a leading cause of maternal morbidity, is assessed using NICE/RCOG guidelines, with low-molecular-weight heparin (e.g., enoxaparin 40 mg daily) as the cornerstone of prophylaxis. However, optimal dosing and timing remain understudied, particularly in obese patients. Anesthetic management of high-risk cases requires tailored approaches, such as combined spinal-epidural (CSE) techniques for patients with coagulopathy, ensuring safe neuraxial anesthesia while minimizing bleeding risks.
**Critical Care in Obstetrics**: Approximately 3–8% of pregnant women require admission to an obstetric intensive care unit (OICU), driven by conditions like postpartum hemorrhage, sepsis, or cardiomyopathy. Modified Early Obstetric Warning Scores (MEOWS) and the Obstetric Comorbidity Index (OB-CMI) identify at-risk patients with 90% sensitivity, enabling early intervention. Point-of-care ultrasound (POCUS), including lung ultrasound and the BLUE protocol, diagnoses pulmonary edema and pleural effusion with 95% accuracy, surpassing chest X-rays. ROTEM-guided transfusion in postpartum hemorrhage reduces blood product use by 20–30%, improving outcomes. Maternal sepsis, affecting 0.1–0.3% of pregnancies, is managed with the obstetric-modified qSOFA score (lactate >2 mmol/L, altered mentation, or hypotension), triggering a “sepsis bundle” (early antibiotics, fluids, and source control within 12 hours). A 2022 *Critical Care Medicine* study reported a 25% reduction in mortality with bundle compliance. Extracorporeal membrane oxygenation (ECMO) is increasingly used for peripartum respiratory failure, with a 70% survival rate in case series. Perimortem cesarean delivery, recommended within 5 minutes of cardiac arrest without return of spontaneous circulation, improves maternal survival by 30% and fetal survival by 80%. Challenges in critical care include resource disparities, with low-income settings facing shortages of trained personnel and equipment, limiting ECMO and POCUS access.
**Emerging Challenges and Future Directions**: Despite progress, obstetric anesthesia faces barriers to equitable care. Low-literacy populations and rural settings struggle with ERAC adoption due to inadequate patient education and infrastructure. The use of unapproved agents like dextromethorphan in pregnancy remains controversial, with insufficient safety data. Precision medicine, leveraging genetic profiling (e.g., CYP2D6 polymorphisms for opioid metabolism), holds promise for tailoring analgesia but is limited by cost and biomarker availability. Artificial intelligence (AI)-assisted ultrasound and predictive analytics for hemorrhage risk are under investigation, with pilot studies showing 85% accuracy in predicting severe outcomes. Training programs for anesthesiologists in low-resource settings are critical to bridge gaps, as emphasized by the World Federation of Societies of Anaesthesiologists (WFSA). Multidisciplinary protocols, standardized across regions, are needed to ensure consistent care, particularly for high-risk conditions like preeclampsia and VTE.
These advancements underscore the dynamic nature of obstetric anesthesia, requiring ongoing research, training, and policy support to address global disparities and optimize maternal-fetal outcomes.
|
Obstetric anesthesia has evolved significantly over the past decade, driven by technological innovations, refined pharmacological strategies, and a deeper understanding of maternal-fetal physiology. These advancements have improved maternal and neonatal outcomes, addressing challenges in labor analgesia, cesarean delivery anesthesia, management of obstetric complications, and critical care in high-risk pregnancies. The field emphasizes patient-centered care, safety, and multidisciplinary collaboration, integrating anesthesiologists, obstetricians, neonatologists, and critical care specialists to optimize outcomes. This text explores these developments in detail, highlighting evidence-based practices, emerging technologies, and ongoing challenges.
**Labor Analgesia**: Effective labor analgesia balances pain relief with minimal maternal and fetal side effects. Low-dose local anesthetics (LAs), such as bupivacaine (0.0625–0.125%) or ropivacaine (0.1–0.2%), are combined with adjuvants like fentanyl (2–5 μg/mL), sufentanil (0.5–1 μg/mL), or dexamethasone (4–8 mg) to enhance epidural analgesia while reducing motor blockade. Programmed Intermittent Epidural Bolus (PIEB) has emerged as a superior technique compared to continuous epidural infusion (CEI). PIEB delivers boluses (e.g., 8–10 mL every 45–60 minutes) via automated pumps, reducing total LA consumption by 20–30%, breakthrough pain by 15%, and motor blockade incidence. Studies, such as those published in *Anesthesiology* (2021), demonstrate PIEB’s ability to improve maternal satisfaction and reduce anesthesiologist interventions. Dural Puncture Epidural (DPE) techniques, involving intentional dural puncture with a 25–27G spinal needle before epidural catheter placement, accelerate analgesia onset (by 5–10 minutes) and improve sacral spread, though randomized trials show inconsistent benefits over standard epidurals. Ultrasound-guided neuraxial techniques have revolutionized care for challenging patients, such as those with obesity (BMI >35 kg/m²), scoliosis, or prior spinal surgery. Automated vertebral level identification systems, using real-time ultrasound imaging, achieve 95% accuracy in landmark identification, reducing failed epidural placements by 50%. Non-neuraxial options, like remifentanil patient-controlled intravenous analgesia (PCA) (0.1–0.5 μg/kg bolus, 8–10 min lockout), provide rapid pain relief but pose risks, including a 24.7% incidence of maternal oxygen desaturation and a 5% need for neonatal oxygen supplementation. Concerns about remifentanil’s safety have limited its use, particularly as it lacks FDA approval for pregnancy. Immersive virtual reality (VR) is a novel non-pharmacological adjunct, effective in early labor (pain scores <8), reducing anxiety and pain perception by 30–40% in daytime settings, per a 2022 *BJOG* study. VR’s efficacy diminishes in advanced labor, and patient preference for its use varies.
**Cesarean Delivery Anesthesia**: Spinal anesthesia remains the preferred method for elective cesarean sections, offering rapid onset and reliable sensory blockade. Typical regimens include hyperbaric bupivacaine (10–12 mg) with fentanyl (10–25 μg) or morphine (100–200 μg) to prolong postoperative analgesia. Ultrasound-guided spinal anesthesia enhances first-attempt success rates (85–90%) and reduces complications like post-dural puncture headache (PDPH), which occurs in 1–3% of cases. PDPH is managed conservatively with hydration and caffeine, but severe cases require an epidural blood patch (EBP) with 15–20 mL autologous blood, achieving a 50–80% resolution rate. Post-spinal hypotension, affecting 50–70% of patients, is mitigated with prophylactic vasopressors, such as phenylephrine (25–50 μg/min infusion) or norepinephrine (6–8 μg bolus), targeting systolic blood pressure ≥90% of baseline or ≥100 mm Hg. The 2021 NICE guidelines emphasize individualized vasopressor dosing to prevent maternal nausea and fetal acidosis. Novel regional blocks, including quadratus lumborum block (QLB) and transversus abdominis plane (TAP) block, combined with wound infiltration (e.g., 0.25% bupivacaine), form the cornerstone of multimodal analgesia, reducing postoperative opioid consumption by 40%. For urgent cesarean deliveries (category 1, decision-to-delivery within 30 minutes), general anesthesia is required in 5–10% of cases. Videolaryngoscopy (e.g., Glidescope, C-MAC) improves intubation success rates (98% first-pass success), while high-flow nasal oxygen and second-generation supraglottic airway devices (e.g., Proseal LMA) minimize hypoxia risks. Preoperative neck and gastric ultrasound reduce aspiration risk by identifying full stomach conditions in 20% of urgent cases. Enhanced Recovery After Cesarean (ERAC) protocols promote early oral intake (within 2 hours), ambulation (within 6–8 hours), and catheter removal, reducing hospital stays by 12–24 hours and opioid use by 30%. However, ERAC implementation faces barriers in low-literacy populations, rural settings, and areas with limited staff training, as noted in a 2023 *Obstetric Anesthesia Digest* report.
**Obstetric Complication Management**: Major obstetric hemorrhage, a leading cause of maternal mortality (1–2% of deliveries), requires rapid intervention. Carbetocin (100 μg IV), a long-acting oxytocin analog, outperforms oxytocin in preventing postpartum hemorrhage, reducing blood loss by 100–200 mL, per a 2020 *Cochrane Database* review. Tranexamic acid (1 g IV within 3 hours) is standard for bleeding control, supported by the WOMAN trial, which reported a 19% reduction in mortality. Rotational thromboelastometry (ROTEM) guides transfusion, targeting hemoglobin >7 g/dL, platelets >75,000/μL, fibrinogen >2 g/L, and INR <1.5, minimizing unnecessary blood product use by 25%. Hypertensive disorders, such as preeclampsia and eclampsia, affect 5–10% of pregnancies and require blood pressure control (<140/90 mm Hg) with labetalol (20–80 mg IV) or hydralazine (5–10 mg IV). Continuous wave Doppler ultrasound assesses maternal hemodynamics, aiding early preeclampsia diagnosis with 80% sensitivity. Cardiac risk stratification, using tools like the CARPREG II score or modified WHO (mWHO) classification, identifies high-risk patients, with registries like Tamil Nadu’s Pregnancy and Heart Disease Registry improving maternal survival by 15%. Venous thromboembolism (VTE), a leading cause of maternal morbidity, is assessed using NICE/RCOG guidelines, with low-molecular-weight heparin (e.g., enoxaparin 40 mg daily) as the cornerstone of prophylaxis. However, optimal dosing and timing remain understudied, particularly in obese patients. Anesthetic management of high-risk cases requires tailored approaches, such as combined spinal-epidural (CSE) techniques for patients with coagulopathy, ensuring safe neuraxial anesthesia while minimizing bleeding risks.
**Critical Care in Obstetrics**: Approximately 3–8% of pregnant women require admission to an obstetric intensive care unit (OICU), driven by conditions like postpartum hemorrhage, sepsis, or cardiomyopathy. Modified Early Obstetric Warning Scores (MEOWS) and the Obstetric Comorbidity Index (OB-CMI) identify at-risk patients with 90% sensitivity, enabling early intervention. Point-of-care ultrasound (POCUS), including lung ultrasound and the BLUE protocol, diagnoses pulmonary edema and pleural effusion with 95% accuracy, surpassing chest X-rays. ROTEM-guided transfusion in postpartum hemorrhage reduces blood product use by 20–30%, improving outcomes. Maternal sepsis, affecting 0.1–0.3% of pregnancies, is managed with the obstetric-modified qSOFA score (lactate >2 mmol/L, altered mentation, or hypotension), triggering a “sepsis bundle” (early antibiotics, fluids, and source control within 12 hours). A 2022 *Critical Care Medicine* study reported a 25% reduction in mortality with bundle compliance. Extracorporeal membrane oxygenation (ECMO) is increasingly used for peripartum respiratory failure, with a 70% survival rate in case series. Perimortem cesarean delivery, recommended within 5 minutes of cardiac arrest without return of spontaneous circulation, improves maternal survival by 30% and fetal survival by 80%. Challenges in critical care include resource disparities, with low-income settings facing shortages of trained personnel and equipment, limiting ECMO and POCUS access.
**Emerging Challenges and Future Directions**: Despite progress, obstetric anesthesia faces barriers to equitable care. Low-literacy populations and rural settings struggle with ERAC adoption due to inadequate patient education and infrastructure. The use of unapproved agents like dextromethorphan in pregnancy remains controversial, with insufficient safety data. Precision medicine, leveraging genetic profiling (e.g., CYP2D6 polymorphisms for opioid metabolism), holds promise for tailoring analgesia but is limited by cost and biomarker availability. Artificial intelligence (AI)-assisted ultrasound and predictive analytics for hemorrhage risk are under investigation, with pilot studies showing 85% accuracy in predicting severe outcomes. Training programs for anesthesiologists in low-resource settings are critical to bridge gaps, as emphasized by the World Federation of Societies of Anaesthesiologists (WFSA). Multidisciplinary protocols, standardized across regions, are needed to ensure consistent care, particularly for high-risk conditions like preeclampsia and VTE.
These advancements underscore the dynamic nature of obstetric anesthesia, requiring ongoing research, training, and policy support to address global disparities and optimize maternal-fetal outcomes.
|
考点1:"Ultrasound-guided neuraxial techniques" 推荐译为 “超声引导的椎管内穿刺技术”
考点2:"epidural blood patch" 必须译为 “硬膜外血补丁”
考点3:"maternal sepsis" 推荐译为 “产妇脓毒症”
考点4:"combined spinal-epidural (CSE)" 推荐译为 “腰麻 - 硬膜外联合(CSE)”
考点5:"Non-neuraxial options" 推荐译为 “非椎管内麻醉”
|
80fa0
|
学术论文
|
自然科学
|
152
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
生物学:生命系统的认知与探索
一、生命演化历程与生物多样性
1. 地球生命的起源与阶段演化
现存生物经历了约35亿年的渐进演化。最早的原核生物(细菌、蓝藻)出现于35-33亿年前,开启“菌藻植物时代”。至4亿年前志留纪晚期,绿藻演化出原始陆生维管植物——裸蕨,标志着陆地生态系统的初步形成。泥盆纪末期,裸蕨被蕨类植物取代,进入“蕨类植物时代”,巨型乔木状蕨类(如鳞木、芦木)成为陆地主导。二叠纪至白垩纪早期,裸子植物兴起(“裸子植物时代”),中生代达到繁盛顶峰。白垩纪至今为“被子植物时代”,其种类多样性、环境适应性使其成为现代优势类群。
2. 演化规律与驱动力
生命演化遵循“从低级到高级、简单到复杂、水生到陆生”的路径,核心驱动力包括遗传变异、自然选择及环境适应性分化。苔藓植物虽在泥盆纪出现,但因适应性局限未能成为主流,印证了演化中的“侧支淘汰”现象。
二、现代生物学的研究维度与应用
1. 微观机制解析
- 基因工程:通过重组DNA技术定向改造生物遗传物质。例如,将外源基因导入受体细胞,实现跨物种性状传递,为农业育种(抗虫作物)及医学(胰岛素合成)提供核心技术支持。
- 细胞抗逆机制:研究揭示植物抵抗重金属胁迫的策略。以大白菜为例,耐镉品种通过将镉固定在根细胞壁(占比70%以上),并提升非蛋白硫醇(如植物螯合肽)和柠檬酸浓度,显著降低镉向地上部分的转运。
2. 生态保护与可持续发展
- 生物多样性保护:成都大熊猫基地通过种群复壮技术及公众科普,近三年开展576场活动,推动公众认知物种保护的紧迫性。
- 低碳实践:推广节能灯(耗电仅为白炽灯的1/5)、自行车通勤(强化心肺功能并减少碳排放)等行为,将生物学原理转化为公民环保行动。
三、生物学教育的核心理念革新
1. 生命教育渗透
中小学课堂强化“认识生命-珍爱生命-敬畏生命”的逻辑主线。例如:
- 高中课程关联细胞构成(C、H、O、N等元素化合物)与个体发育(受精卵分化),引导学生理解生命诞生的系统性;
- 初中采用“情境驱动”教学,如通过食物霉变案例导入《细菌和真菌的分布》课程,激发探究兴趣。
2. 跨学科能力整合
- 实验技能:初中生需掌握显微观察、标本制作等基础技术;高中进阶至DNA提取、PCR扩增等分子操作。
- 学科融合:如生物-化学交叉(“生化不分家”),学习有机化学(《有机化学基础》)是理解蛋白质结构、代谢途径的前提。
四、前沿领域与未来挑战
1. 生命节律与健康干预
2024年世界生命科学大会聚焦“昼夜节律”对代谢、免疫的调控机制。研究发现,广西长寿人群肠道菌群结构与青年人类似,提示微生物组“年轻化”可能是抗衰老的关键靶点。
2. 合成生物学突破
基于基因编辑技术(如CRISPR),科学家尝试设计人工生命系统。例如重构微生物代谢通路生产生物燃料,或合成新型药物前体,推动“定制化生物制造”进程。
3. 全球科研竞争力
据2023自然指数排名,中国在生命科学领域以21,300.75分位列全球第一,美国(20,255.78分)、德国(4,354.03分)紧随其后,亚洲国家中韩国(1,624.03分)、印度(1,323.46分)加速追赶。
结语:生物学的使命与担当
生物学始终肩负解析生命本质、协调人地关系的双重使命。从三十亿年演化史的追溯,到基因编辑技术的伦理边界探讨,学科发展需坚持科技创新(如合成生物学)与科学普及(如大熊猫保护宣传)并重,最终实现“人与自然和谐共生”的终极目标。
|
生物学:生命系统的认知与探索
一、生命演化历程与生物多样性
1. 地球生命的起源与阶段演化
现存生物经历了约35亿年的渐进演化。最早的原核生物(细菌、蓝藻)出现于35-33亿年前,开启“菌藻植物时代”。至4亿年前志留纪晚期,绿藻演化出原始陆生维管植物——裸蕨,标志着陆地生态系统的初步形成。泥盆纪末期,裸蕨被蕨类植物取代,进入“蕨类植物时代”,巨型乔木状蕨类(如鳞木、芦木)成为陆地主导。二叠纪至白垩纪早期,裸子植物兴起(“裸子植物时代”),中生代达到繁盛顶峰。白垩纪至今为“被子植物时代”,其种类多样性、环境适应性使其成为现代优势类群。
2. 演化规律与驱动力
生命演化遵循“从低级到高级、简单到复杂、水生到陆生”的路径,核心驱动力包括遗传变异、自然选择及环境适应性分化。苔藓植物虽在泥盆纪出现,但因适应性局限未能成为主流,印证了演化中的“侧支淘汰”现象。
二、现代生物学的研究维度与应用
1. 微观机制解析
- 基因工程:通过重组DNA技术定向改造生物遗传物质。例如,将外源基因导入受体细胞,实现跨物种性状传递,为农业育种(抗虫作物)及医学(胰岛素合成)提供核心技术支持。
- 细胞抗逆机制:研究揭示植物抵抗重金属胁迫的策略。以大白菜为例,耐镉品种通过将镉固定在根细胞壁(占比70%以上),并提升非蛋白硫醇(如植物螯合肽)和柠檬酸浓度,显著降低镉向地上部分的转运。
2. 生态保护与可持续发展
- 生物多样性保护:成都大熊猫基地通过种群复壮技术及公众科普,近三年开展576场活动,推动公众认知物种保护的紧迫性。
- 低碳实践:推广节能灯(耗电仅为白炽灯的1/5)、自行车通勤(强化心肺功能并减少碳排放)等行为,将生物学原理转化为公民环保行动。
三、生物学教育的核心理念革新
1. 生命教育渗透
中小学课堂强化“认识生命-珍爱生命-敬畏生命”的逻辑主线。例如:
- 高中课程关联细胞构成(C、H、O、N等元素化合物)与个体发育(受精卵分化),引导学生理解生命诞生的系统性;
- 初中采用“情境驱动”教学,如通过食物霉变案例导入《细菌和真菌的分布》课程,激发探究兴趣。
2. 跨学科能力整合
- 实验技能:初中生需掌握显微观察、标本制作等基础技术;高中进阶至DNA提取、PCR扩增等分子操作。
- 学科融合:如生物-化学交叉(“生化不分家”),学习有机化学(《有机化学基础》)是理解蛋白质结构、代谢途径的前提。
四、前沿领域与未来挑战
1. 生命节律与健康干预
2024年世界生命科学大会聚焦“昼夜节律”对代谢、免疫的调控机制。研究发现,广西长寿人群肠道菌群结构与青年人类似,提示微生物组“年轻化”可能是抗衰老的关键靶点。
2. 合成生物学突破
基于基因编辑技术(如CRISPR),科学家尝试设计人工生命系统。例如重构微生物代谢通路生产生物燃料,或合成新型药物前体,推动“定制化生物制造”进程。
3. 全球科研竞争力
据2023自然指数排名,中国在生命科学领域以21,300.75分位列全球第一,美国(20,255.78分)、德国(4,354.03分)紧随其后,亚洲国家中韩国(1,624.03分)、印度(1,323.46分)加速追赶。
结语:生物学的使命与担当
生物学始终肩负解析生命本质、协调人地关系的双重使命。从三十亿年演化史的追溯,到基因编辑技术的伦理边界探讨,学科发展需坚持科技创新(如合成生物学)与科学普及(如大熊猫保护宣传)并重,最终实现“人与自然和谐共生”的终极目标。
|
考点1:“演变规律”应翻译为“evolution law”
考点2:《有机化学基础》应翻译为“Fundamentals of Organic Cheministry”
|
8292d
|
学术论文
|
自然科学
|
39
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
We start by exploring the notion of a moral principle. If particularism is to hang its hat on rejecting “moral principles,” we had better know what sort of creatures they would be.
The term “moral principle” is bandied about loosely: It can sound as though any list of broad moral injunctions count, which makes it difficult to isolate particularism’s target. That difficulty is probably reinforced by the doctrine’s name (not to mention the rhetorical flourishes its proponents sometimes favor); “particularism,” after all, sounds as though it must stand in opposition to “generalism”—a position, presumably, that attests to the existence or usefulness of generality in morality. But there are some forms of generality—for example, subsumption under concepts, or, again, everyday generalizations about, say, the frequency of unfair elections—that no one would eschew. In fact, though, the conception of moral principle that forms particularism’s target is meant to be something quite specific. Let’s take a look.
We can begin by distinguishing two different tasks that purported principles have been asked to play in morality. Broadly put, normative principles purport to articulate which considerations count as good- or bad-making, right- or wrong-making. In contrast to ontological claims about what, as it were, make good making features good-making—a divine commandment, a Platonic Reality, the output of some idealized contract—normative principles aim to set forth those that do so count. A deontologist’s list of duties, the utilitarian’s injunction to maximize net aggregate utility, the Ten Commandments would all qualify—together with theoretical generalizations that try to elucidate the concepts therein (understanding, say, what makes an act count as consent, a gesture as generous).
Deliberative principles are generalizations that purport to give us advice on what procedures mere mortals should follow in order to arrive at good moral verdicts. These principles lay out directions to agents about what to do with a given set of inputs in order to move from uncertainty to clarity, disagreement to resolution. For many, of course, the correct deliberative principles piggyback fairly straightforwardly on the correct normative principles: The best procedure is to apply one’s understanding of the normative principles to the inputs at hand. The two sorts of principles needn’t go hand in hand, though. After all, one might think the moral landscape susceptible to all manner of interesting methods of divination—kicking the Blarney stone three times, following instructions to achieve the requisite meditative epiphany, doing whatever one’s wise friend Fred does. Less fancifully, many utilitarians famously distinguish their normative and deliberative principles: The utilitarian calculus determines what actions are in fact good or bad, but it isn’t as if one is meant to engage in expected utility calculations when deciding how to react to an abusive boyfriend. Here local rules of thumb are advised, precisely because employing them has higher utility than attempting a utility calculation.
Kant’s moral philosophy was complex in part because he provided both sorts of principles. Part of his task was to outline a principle that marks a deliberative procedure for deciding what is permissible—namely, identify one’s maxim, see if it could be a natural law, and then see if it could be willed as such. This is a principle that doesn’t itself state contentful moral injunctives. But he also, familiarly, pulled back from that first-personal test to defend a set of normative in junctions, including directives not to lie, not to treat others as mere means (or wear wigs).
We have, then, two agendas that are at least conceptually separable: sorting out the nature of moral reality and figuring out procedures to make our moral way.
Now obviously, a great many people, from Ann Landers to Aristotle, think there’s something to be said by way of filling in our understanding of the normative terrain and of giving suggestions for helpful procedures. At the core of an enormously wide range of Western ethical theory, though, is a certain conception of the sort of generalization we can—and should—find in answer to these questions. The conception is sufficiently dominant, indeed, that it might fairly be called the classical conception of moral Principles (hence hereafter awarded capitalization). It is this sort of Principle that forms the target of particularism.
A classical Principle is marked by the following three features.
1. Classical Principles are universal, exceptionless, law-like moral generalizations that mark the moral import of considerations. Normative such Principles purport to illuminate something’s moral status, or again to set forth the conditions for understanding its moral status, by making explicit a necessary and nontrivial connection. Deliberative such Principles, where distinct from invocations to use the former, purport to set forth procedures that, if ideally executed, guarantee hitting their mark, by capturing something essential about the nature of good deliberation (think of Kant’s Categorical Imperative test rather than the utilitarian’s locally useful rules of thumb). This implies that while such Principles can be rendered as universal conditionals of the form
(∀x)(Fx → Gx);or perhaps □(∀x)(Fx → Gx)
where G picks out some recognizable moral property, the conditional must assert some sort of a substantive and law-like connection between F and G. The → is not, that is, the ⊃ of material implication: Surface grammar does not a Principle make.
2. The conditionals implicit in classical Principles serve genuine inferential roles in determining, criticizing, or justifying particular moral claims. They are supposed to name a genuinely possible move from noting that something is F to concluding it is G: They concern the import, that is, of features whose moral import—for instance, whether it counts as a reason for or against the action—is in principle questionable. Crucially, then, agreement on a given Principle can serve as epistemic leverage on beliefs, hunches, or conjectures about individual cases. Hence, → is also not expressing merely the sort of self-evident entailment of obvious analyticity that, however helpful it might be for housekeeping and regimenting our language, is without possibility of substantive controversy.
3. Classical Principles are members of theoretical systems. A system, as the name implies, is meant to be more than simply an aggregate—or “unconnected heap,” as David McNaughton (1996) nicely puts it—of true generalizations. A system is a set of interanimating propositions whose cross-connections themselves serve to illuminate the subject matter. Crucially, then, commitment to one Principle can serve as leverage when discussing, deliberating, or disputing commitment to another such generalization. Such inter-Principle leverage can be achieved either through simplification—as when we corral otherwise disparate phenomena under a few common and elegantly interrelated categories, or by articulating a complex web whose multiplicity of inferential connections between Principles helps to tighten our understanding of each. Whatever account one prefers, something isn’t a classical Principle unless it fits into a structure of other Principles that purport to systematic illumination.
Classical Principles, then, are exceptionless, explanatory, interrelated moral generalizations that are capable of serving key epistemic functions.
Highlighting these various features begins to show why there is something substantive in contention with their denial. It’s sometimes argued that particularism’s objection to Principles, far from being radical, is more a tempest in a teapot. Everyone, surely, is a generalist, once we go sufficiently far up in abstraction or far down in detail. After all, even particularists agree that the moral supervenes on the natural—two situations cannot be alike in every natural respect and differ in their moral features. This means that there must be some exceptionless generalizations that express the moral as a function of the natural. Such “supervenience functions,” as we might call them, may of course be enormously complex; but that’s just a difference in degree, not kind. Moving to the other end of the spectrum, even the most committed particularist, it’s said, will admit that there is some level of abstraction where moral generalizations are safe from exception, if only principles such as ‘pursue the good’ or ‘do the right thing’. This means, though, that they are not rejecting principles, just squabbling over their concreteness. Particularists, in short, don’t reject moral principles; they just relocate them.
But admitting the existence of exceptionless moral generalizations is not equivalent to admitting to the existence of Principles. As the foregoing criteria make clear, the latter must be explanatory, ensconced in a surrounding theory, and epistemically useful. This means, for one, that acknowledgement of mere supervenience functions does not go far toward acknowledgement of a Principle.
As John McDowell (1979) points out, supervenience can be admitted so readily because doing so admits to so little: it doesn’t mean that there are any useful patterns to the way in which the dependencies line up (see also Little, 2000, sec. 3; Jackson, Pettit, and Smith, 2000). While situations can’t differ in their moral properties without also differing in their natural properties, that is, this does not imply that a given moral difference (say, the difference between being just and unjust) need always be found in the same natural differences. Instead, stringing together the situations in which an action is cruel rather than kind, for example, may yield groupings that would simply look gerrymandered to anyone who does not have an independent competency with the moral concepts. On such a picture, the complicated sets of properties mentioned in supervenience functions will not constitute anything recognizably explanatory; they are too disjointed—“too indiscriminate,” as Jonathan Dancy (1999, p. 26) puts it—to serve.
Similarly for abstraction. It’s certainly true that no one will abjure the existence of exceptionless heady abstractions in morality—at the limit, we can invent a predicate whose application entails invariant moral import (we could dub ‘lighing’, say, as the term to pick out those cases of lying that are wrong-making). But this doesn’t yet mean we have on hand anything explanatory or procedurally useful. If classification as such simply reflects judgment of its objectionable nature definitionally, no substantive explanatory work will be done by the generalization that lighings are wrong. The predicate may still be useful—say, in marking off moral from pragmatic or again legal reasons; but expression of the generalization won’t serve as check on one’s specific intuitions. Similarly for deliberative principles. “Choose well, grasshopper,” may be a pragmatically helpful inspiration, but it hardly offers substantive guidance.
Finally, since classical Principles are meant to be pieces of theory, one cannot determine the status of a given generalization as such in isolation from its relation to other theoretical generalizations. This excludes one otherwise innocuous use of the “principlist” label as off topic here. Someone who avows a particular list of injunctions as “principles to live by” may count in one sense as strongly principlist; if those principles, though, are a disconnected list, or involve concepts, such as Justice Stewart’s conception of ‘obscenity’, about which no further theorizing can be done, one does not thereby count as advocating a set of Principles of the sort particularists want to reject.
|
We start by exploring the notion of a moral principle. If particularism is to hang its hat on rejecting “moral principles,” we had better know what sort of creatures they would be.
The term “moral principle” is bandied about loosely: It can sound as though any list of broad moral injunctions count, which makes it difficult to isolate particularism’s target. That difficulty is probably reinforced by the doctrine’s name (not to mention the rhetorical flourishes its proponents sometimes favor); “particularism,” after all, sounds as though it must stand in opposition to “generalism”—a position, presumably, that attests to the existence or usefulness of generality in morality. But there are some forms of generality—for example, subsumption under concepts, or, again, everyday generalizations about, say, the frequency of unfair elections—that no one would eschew. In fact, though, the conception of moral principle that forms particularism’s target is meant to be something quite specific. Let’s take a look.
We can begin by distinguishing two different tasks that purported principles have been asked to play in morality. Broadly put, normative principles purport to articulate which considerations count as good- or bad-making, right- or wrong-making. In contrast to ontological claims about what, as it were, make good making features good-making—a divine commandment, a Platonic Reality, the output of some idealized contract—normative principles aim to set forth those that do so count. A deontologist’s list of duties, the utilitarian’s injunction to maximize net aggregate utility, the Ten Commandments would all qualify—together with theoretical generalizations that try to elucidate the concepts therein (understanding, say, what makes an act count as consent, a gesture as generous).
Deliberative principles are generalizations that purport to give us advice on what procedures mere mortals should follow in order to arrive at good moral verdicts. These principles lay out directions to agents about what to do with a given set of inputs in order to move from uncertainty to clarity, disagreement to resolution. For many, of course, the correct deliberative principles piggyback fairly straightforwardly on the correct normative principles: The best procedure is to apply one’s understanding of the normative principles to the inputs at hand. The two sorts of principles needn’t go hand in hand, though. After all, one might think the moral landscape susceptible to all manner of interesting methods of divination—kicking the Blarney stone three times, following instructions to achieve the requisite meditative epiphany, doing whatever one’s wise friend Fred does. Less fancifully, many utilitarians famously distinguish their normative and deliberative principles: The utilitarian calculus determines what actions are in fact good or bad, but it isn’t as if one is meant to engage in expected utility calculations when deciding how to react to an abusive boyfriend. Here local rules of thumb are advised, precisely because employing them has higher utility than attempting a utility calculation.
Kant’s moral philosophy was complex in part because he provided both sorts of principles. Part of his task was to outline a principle that marks a deliberative procedure for deciding what is permissible—namely, identify one’s maxim, see if it could be a natural law, and then see if it could be willed as such. This is a principle that doesn’t itself state contentful moral injunctives. But he also, familiarly, pulled back from that first-personal test to defend a set of normative in junctions, including directives not to lie, not to treat others as mere means (or wear wigs).
We have, then, two agendas that are at least conceptually separable: sorting out the nature of moral reality and figuring out procedures to make our moral way.
Now obviously, a great many people, from Ann Landers to Aristotle, think there’s something to be said by way of filling in our understanding of the normative terrain and of giving suggestions for helpful procedures. At the core of an enormously wide range of Western ethical theory, though, is a certain conception of the sort of generalization we can—and should—find in answer to these questions. The conception is sufficiently dominant, indeed, that it might fairly be called the classical conception of moral Principles (hence hereafter awarded capitalization). It is this sort of Principle that forms the target of particularism.
A classical Principle is marked by the following three features.
1. Classical Principles are universal, exceptionless, law-like moral generalizations that mark the moral import of considerations. Normative such Principles purport to illuminate something’s moral status, or again to set forth the conditions for understanding its moral status, by making explicit a necessary and nontrivial connection. Deliberative such Principles, where distinct from invocations to use the former, purport to set forth procedures that, if ideally executed, guarantee hitting their mark, by capturing something essential about the nature of good deliberation (think of Kant’s Categorical Imperative test rather than the utilitarian’s locally useful rules of thumb). This implies that while such Principles can be rendered as universal conditionals of the form
(∀x)(Fx → Gx);or perhaps □(∀x)(Fx → Gx)
where G picks out some recognizable moral property, the conditional must assert some sort of a substantive and law-like connection between F and G. The → is not, that is, the ⊃ of material implication: Surface grammar does not a Principle make.
2. The conditionals implicit in classical Principles serve genuine inferential roles in determining, criticizing, or justifying particular moral claims. They are supposed to name a genuinely possible move from noting that something is F to concluding it is G: They concern the import, that is, of features whose moral import—for instance, whether it counts as a reason for or against the action—is in principle questionable. Crucially, then, agreement on a given Principle can serve as epistemic leverage on beliefs, hunches, or conjectures about individual cases. Hence, → is also not expressing merely the sort of self-evident entailment of obvious analyticity that, however helpful it might be for housekeeping and regimenting our language, is without possibility of substantive controversy.
3. Classical Principles are members of theoretical systems. A system, as the name implies, is meant to be more than simply an aggregate—or “unconnected heap,” as David McNaughton (1996) nicely puts it—of true generalizations. A system is a set of interanimating propositions whose cross-connections themselves serve to illuminate the subject matter. Crucially, then, commitment to one Principle can serve as leverage when discussing, deliberating, or disputing commitment to another such generalization. Such inter-Principle leverage can be achieved either through simplification—as when we corral otherwise disparate phenomena under a few common and elegantly interrelated categories, or by articulating a complex web whose multiplicity of inferential connections between Principles helps to tighten our understanding of each. Whatever account one prefers, something isn’t a classical Principle unless it fits into a structure of other Principles that purport to systematic illumination.
Classical Principles, then, are exceptionless, explanatory, interrelated moral generalizations that are capable of serving key epistemic functions.
Highlighting these various features begins to show why there is something substantive in contention with their denial. It’s sometimes argued that particularism’s objection to Principles, far from being radical, is more a tempest in a teapot. Everyone, surely, is a generalist, once we go sufficiently far up in abstraction or far down in detail. After all, even particularists agree that the moral supervenes on the natural—two situations cannot be alike in every natural respect and differ in their moral features. This means that there must be some exceptionless generalizations that express the moral as a function of the natural. Such “supervenience functions,” as we might call them, may of course be enormously complex; but that’s just a difference in degree, not kind. Moving to the other end of the spectrum, even the most committed particularist, it’s said, will admit that there is some level of abstraction where moral generalizations are safe from exception, if only principles such as ‘pursue the good’ or ‘do the right thing’. This means, though, that they are not rejecting principles, just squabbling over their concreteness. Particularists, in short, don’t reject moral principles; they just relocate them.
But admitting the existence of exceptionless moral generalizations is not equivalent to admitting to the existence of Principles. As the foregoing criteria make clear, the latter must be explanatory, ensconced in a surrounding theory, and epistemically useful. This means, for one, that acknowledgement of mere supervenience functions does not go far toward acknowledgement of a Principle.
As John McDowell (1979) points out, supervenience can be admitted so readily because doing so admits to so little: it doesn’t mean that there are any useful patterns to the way in which the dependencies line up (see also Little, 2000, sec. 3; Jackson, Pettit, and Smith, 2000). While situations can’t differ in their moral properties without also differing in their natural properties, that is, this does not imply that a given moral difference (say, the difference between being just and unjust) need always be found in the same natural differences. Instead, stringing together the situations in which an action is cruel rather than kind, for example, may yield groupings that would simply look gerrymandered to anyone who does not have an independent competency with the moral concepts. On such a picture, the complicated sets of properties mentioned in supervenience functions will not constitute anything recognizably explanatory; they are too disjointed—“too indiscriminate,” as Jonathan Dancy (1999, p. 26) puts it—to serve.
Similarly for abstraction. It’s certainly true that no one will abjure the existence of exceptionless heady abstractions in morality—at the limit, we can invent a predicate whose application entails invariant moral import (we could dub ‘lighing’, say, as the term to pick out those cases of lying that are wrong-making). But this doesn’t yet mean we have on hand anything explanatory or procedurally useful. If classification as such simply reflects judgment of its objectionable nature definitionally, no substantive explanatory work will be done by the generalization that lighings are wrong. The predicate may still be useful—say, in marking off moral from pragmatic or again legal reasons; but expression of the generalization won’t serve as check on one’s specific intuitions. Similarly for deliberative principles. “Choose well, grasshopper,” may be a pragmatically helpful inspiration, but it hardly offers substantive guidance.
Finally, since classical Principles are meant to be pieces of theory, one cannot determine the status of a given generalization as such in isolation from its relation to other theoretical generalizations. This excludes one otherwise innocuous use of the “principlist” label as off topic here. Someone who avows a particular list of injunctions as “principles to live by” may count in one sense as strongly principlist; if those principles, though, are a disconnected list, or involve concepts, such as Justice Stewart’s conception of ‘obscenity’, about which no further theorizing can be done, one does not thereby count as advocating a set of Principles of the sort particularists want to reject.
|
考点1:“deliberative principles”译为“慎思性原则”
考点2:“kicking the Blarney stone three times”译为“踢巧言石三次
考点3:“a tempest in a teapot”译为“小题大做”,英语经典俚语
考点4:“Choose well, grasshopper”译为“好好选择吧,年轻人/新人”,
考点5:"invocations" 推荐译为“援引”或“诉诸”,不可译为“召唤”
考点6:“abusive boyfriend”不可译为“虐待性男友”,应译为更中性的“一个施暴的伴侣”
考点7:“interanimating”推荐译为“相互赋予生命、相互激发”
|
83b1a
|
学术论文
|
人文科学
|
184
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
1. Introduction
Post-quantum cryptography (PQC) has been actively studied in recent years. To construct PQC, a public key encryption scheme (PKE) with chosen-plaintext attack (CPA) security is first developed, and then a key encapsulation mechanism (KEM) with chosen-ciphertext attack (CCA) security is obtained by combining the PKE with either the Fujisaki–Okamoto (FO) transform [FO99] or its variants. Thus, the re-encryption of the FO(-like) transform plays an essential role in the decapsulation of PQC.
In practical uses of PQC, security evaluation against implementation attacks, such as side-channel attacks, in addition to mathematical cryptanalysis attacks is inevitable. Side-channel attacks on PQC have been first studied on the PKE decryption part that exploits the secret key directly, similar to those on the modular exponentiation/scalar multiplication in RSA/elliptic curve cryptography (ECC). In recent years, another attack aspect has been studied [GTN20,RRCB20,UXT+21], in which the attacker focuses on the leakage of re-encryption to implement a decryption oracle, which enables one to mount a chosen-ciphertext attack (CCA) on the underlying CPA-secure PKE. Note that the decryption oracle is not necessarily a full decryption oracle but it can be, for example, plaintext-checking (PC) and decryption-failure (DF) oracles. These attacks suggest that we should protect not only the PKE decryption but also the whole KEM decapsulation, including re-encryption and the equality/validity checks of the re-encrypted ciphertext, against side-channel attacks. Ueno et al. [UXT+21] showed that such an attack was generally applicable to many post-quantum KEMs equipped with an FO-like transforms, and demonstrated that their attack could recover eight of the nine KEM candidates in the third round of the NIST PQC standardization.
These studies suggest that the potential and limitation of such attacks (i.e., the least number of side-channel traces for a successful key recovery) should be investigated to develop secure KEM implementations, including the design of countermeasures and/or cryptographic protocols. The number of side-channel traces required for a successful attack is commonly determined by two factors: (1) the number of decryption oracle accesses required for key recovery and (2) the number of traces required to realize the reliable decryption oracle. Therefore, a tight evaluation of the factors, that is, an efficient keyrecovery algorithm with a decryption oracle that can be realized from side-channel traces, would contribute to understanding the least number of traces (i.e., the optimal attack cost) for a successful key recovery.
2.Related works
A KEM is a public-key cryptographic primitive used to transmit a secret key securely. A KEM consists of three probabilistic polynomial-time algorithms: key generation (KeyGen), encapsulation (Encaps), and decapsulation (Decaps). Most post-quantum KEMs are proven to be CCA secure since they adopt an FO-like transform. Here, we refer to FO transforms and their variants [HHK17, SXY18, BHH+19] as FO-like transforms. Algorithm 1 illustrates a typical post-quantum KEM equipped with an underlying PKE scheme and an FO-like transform, assuming that the PKE is CPA secure and is given as three probabilistic polynomial-time algorithms: key generation Gen, encryption Enc and decryption Dec. Such KEMs employ random oracles (ROs) denoted by G, H, and Hprf in Algorithm 1, which are frequently realized using a cryptographic hash function (or other symmetric primitive), and are frequently instantiated with SHA-3 or SHAKE. The attacks considered herein focus on the decapsulation KEM.Decaps, which computes the shared secret as a result of H at Line 6 from an input ciphertext c, a private key sk and a public key pk (if the input ciphertext is valid). KEM.Decaps first applies the PKE decryption PKE.Dec to compute the corresponding plaintext m′ from the ciphertext and then performs a re-encryption to validate the computed m′, that is, computes PKE.Enc in the same manner as KEM.Encaps to check whether the re-encrypted ciphertext c′ equals to the input ciphertext c. If c = c′, the input ciphertext is considered valid, and the shared secret H(m′, c) is then calculated and output. Otherwise (i.e., c ̸= c′), the ciphertext is invalid, and a pseudorandom value computed using Hprf (or a rejection symbol) is output at Line 8. The FO-like transform performs the ciphertext verification to detect any invalid ciphertexts and prevent any CCA that queries invalid ciphertexts and exploits their decryption results.
Side-channel attacks on the FO-like transforms were initially presented in the pioneering works by Guo et al. [GTN20] and Ravi et al. [RRCB20]. Guo et al. presented a timing attack exploiting the equality check (as at Line 5 in Algorithm 1). Ciphertexts of postquantum KEMs are treated as a long vector in CPUs/microcontrollers. A comparison using an usual operation (e.g., memcmp) takes a (relatively) long time if two ciphertexts are very similar to each other; otherwise, the comparison terminates shortly. They exploited this timing difference to implement a PC oracle for lattice- and code-based KEMs, and presented key-recovery attacks for lattice-based and code-based KEMs where the equality check was not implemented in constant time. Ravi et al. reported the first power/EM attack on an FO-like transform. The attack implemented a PC oracle or decryption failure oracle by exploiting the side-channel leakage during computation of RO (i.e., hash function) in re-encryption with a t-test-based template. Their attack achieved key recovery of six lattice-based KEMs: Kyber, Saber, FrodoKEM, Round5, NewHope and LAC. Bhasin et al. [BDH+21] presented an attack on masked polynomial comparison schemes for Kyber, Saber, and FrodoKEM [OSPG18, BPO+20] by exploiting ciphertext equality checks in lattice-based KEMs and demonstrated its application to Kyber. They implemented a PC oracle using a distinguisher based on the t-test. More recently, Ueno et al. demonstrated a generalization of power/EM attacks on FO-like transforms [UXT+21]. They illustrated that the side-channel leakage during re-encryption can be generally exploited if a KR-PCA on the underlying PKE is known. They demonstrated that their attack could achieve key recovery of eight out of nine KEMs of NIST PQC third-round candidates. One major research direction of attacks of this kind is to improve the attack efficiency (i.e., reduce the number of required traces) for a precise evaluation of the cost of an optimal attack. Other side-channel-assisted CCAs have also been extensively studied in this way [XPR+22, RBRC22, SKL+20, REB+21, NDGJ21], especially for lattice-based KEMs. More recently, in [QCZ+21], Qin et al. showed an improvement of CCAs on lattice-based KEMs using a binary key-mismatch oracle with adaptive queries, which reduced the number of oracle accesses/queries compared to that of the CCA used in [UXT+21]. In [SCZ+23], Shen et al. presented a side-channel-assisted CCA using a binary PC oracle with an error correction of the PC oracle outputs, implemented by side-channel information. They showed that the error tolerance reduced the number of traces required to implement a PC oracle, which reduced the total number of traces required for key recovery. They also applied their attack to Kyber, and achieved up to 55.4% reduction of the total number of traces required for key recovery compared to that in [UXT+21].
3.Proposed Attack
The major drawback of CCAs with the PC oracle outlined in Section 2.3 is that the attacker obtains no more than one-bit information per oracle access4, which results in a large number of traces being required for key recovery. In this study, we propose an oracle named the multiple-valued plaintext-checking (MV-PC) oracle to extract more bits of information per oracle access. Let μ be a positive integer. Consider an attacker who knows that a ciphertext c ̃ is necessarily decrypted to either of the μ plaintexts m0, m1, . . . , mμ−1. The attacker can recover the secret key of the KEM with repeated and adaptive queries if the attacker knows to which plaintext c ̃ is decrypted. Such an oracle is a generalization of the (binary) PC oracle with μ = 2. Note that, without side-channels, the FO-like transform theoretically does not provide any information about which plaintext c ̃ corresponds to (although the attacker knows the reference plaintext for valid ciphertext). We name this oracle the MV-PC oracle, and formally define it as Oμ(c ̃; m0, m1, . . . , mμ−1) = v s.t. PKE.Decsk(c ̃) = mv. Intuitively, the MV-PC oracle for μ values (called μV-PC) provides up-to log2 μ information to the attacker; therefore, a CCA using the MV-PC oracle would achieve key recovery with fewer oracle accesses roughly by a factor of 1/ log2 μ than that of the conventional KR-PCA with the binary PC oracle.
3.2 General attack description
The proposed attack exploits an MV-PC oracle through a side-channel leakage and recovers the secret key by side-channel-assisted CCA on the underlying CPA-secure PKE. As well as the previous attack in [UXT+21], the proposed attack focuses on the side-channel leakage during the RO evaluation (i.e., computation of symmetric primitive like hash function) of re-encryption in PKE.Decaps. Using the side-channel leakage, the attacker accesses to an MV-PC oracle; that is, estimates which an invalid ciphertext c ̃ is decrypted to plaintext m0, m1, . . . , mμ−1 by PKE.Dec. If the attacker can correctly estimate the plaintext from the side-channel leakage, the attacker can perform a key recovery CCA. The proposed attack achieves a key recovery with fewer side-channel traces, if the MV-PC oracle is efficiently implemented. As in [UXT+21], the proposed SCA consists of profiling and attack phases. In the profiling phase, the attacker trains a μ-classification NN to estimate the plaintext (i.e., implement an μV-PC oracle) from side-channel traces during the RO evaluation. In the attack phase, the attacker queries invalid ciphertexts and performs a CCA using the μVPC oracle implemented by the trained NN. Although the attack requires a profiling, we do not require any profiling device which the attacker can know/control the secret key, in contrast to major DL-based side-channel attacks on symmetric primitive. This is because the profiling can be carried out without secret key, as in previous SCAs on latticebased KEMs [RRCB20, XPR+22, RBRC20, SKL+20, NDGJ21, UXT+21]. The usage of NN makes the proposed attack general and efficient, because it has been shown that
DL-based side-channel attacks are applicable to various implementations (including ones with countermeasures such as masking and random delay) without detailed knowledge of implementation nor a specific condition/assumption about leakage. Moreover, the proposed attack can be carried out by the neural distinguisher from side-channel leakage during the RO evaluation, and the key recovery capability depends solely on the quality of the neural distinguisher.
|
1. Introduction
Post-quantum cryptography (PQC) has been actively studied in recent years. To construct PQC, a public key encryption scheme (PKE) with chosen-plaintext attack (CPA) security is first developed, and then a key encapsulation mechanism (KEM) with chosen-ciphertext attack (CCA) security is obtained by combining the PKE with either the Fujisaki–Okamoto (FO) transform [FO99] or its variants. Thus, the re-encryption of the FO(-like) transform plays an essential role in the decapsulation of PQC.
In practical uses of PQC, security evaluation against implementation attacks, such as side-channel attacks, in addition to mathematical cryptanalysis attacks is inevitable. Side-channel attacks on PQC have been first studied on the PKE decryption part that exploits the secret key directly, similar to those on the modular exponentiation/scalar multiplication in RSA/elliptic curve cryptography (ECC). In recent years, another attack aspect has been studied [GTN20,RRCB20,UXT+21], in which the attacker focuses on the leakage of re-encryption to implement a decryption oracle, which enables one to mount a chosen-ciphertext attack (CCA) on the underlying CPA-secure PKE. Note that the decryption oracle is not necessarily a full decryption oracle but it can be, for example, plaintext-checking (PC) and decryption-failure (DF) oracles. These attacks suggest that we should protect not only the PKE decryption but also the whole KEM decapsulation, including re-encryption and the equality/validity checks of the re-encrypted ciphertext, against side-channel attacks. Ueno et al. [UXT+21] showed that such an attack was generally applicable to many post-quantum KEMs equipped with an FO-like transforms, and demonstrated that their attack could recover eight of the nine KEM candidates in the third round of the NIST PQC standardization.
These studies suggest that the potential and limitation of such attacks (i.e., the least number of side-channel traces for a successful key recovery) should be investigated to develop secure KEM implementations, including the design of countermeasures and/or cryptographic protocols. The number of side-channel traces required for a successful attack is commonly determined by two factors: (1) the number of decryption oracle accesses required for key recovery and (2) the number of traces required to realize the reliable decryption oracle. Therefore, a tight evaluation of the factors, that is, an efficient keyrecovery algorithm with a decryption oracle that can be realized from side-channel traces, would contribute to understanding the least number of traces (i.e., the optimal attack cost) for a successful key recovery.
2.Related works
A KEM is a public-key cryptographic primitive used to transmit a secret key securely. A KEM consists of three probabilistic polynomial-time algorithms: key generation (KeyGen), encapsulation (Encaps), and decapsulation (Decaps). Most post-quantum KEMs are proven to be CCA secure since they adopt an FO-like transform. Here, we refer to FO transforms and their variants [HHK17, SXY18, BHH+19] as FO-like transforms. Algorithm 1 illustrates a typical post-quantum KEM equipped with an underlying PKE scheme and an FO-like transform, assuming that the PKE is CPA secure and is given as three probabilistic polynomial-time algorithms: key generation Gen, encryption Enc and decryption Dec. Such KEMs employ random oracles (ROs) denoted by G, H, and Hprf in Algorithm 1, which are frequently realized using a cryptographic hash function (or other symmetric primitive), and are frequently instantiated with SHA-3 or SHAKE. The attacks considered herein focus on the decapsulation KEM.Decaps, which computes the shared secret as a result of H at Line 6 from an input ciphertext c, a private key sk and a public key pk (if the input ciphertext is valid). KEM.Decaps first applies the PKE decryption PKE.Dec to compute the corresponding plaintext m′ from the ciphertext and then performs a re-encryption to validate the computed m′, that is, computes PKE.Enc in the same manner as KEM.Encaps to check whether the re-encrypted ciphertext c′ equals to the input ciphertext c. If c = c′, the input ciphertext is considered valid, and the shared secret H(m′, c) is then calculated and output. Otherwise (i.e., c ̸= c′), the ciphertext is invalid, and a pseudorandom value computed using Hprf (or a rejection symbol) is output at Line 8. The FO-like transform performs the ciphertext verification to detect any invalid ciphertexts and prevent any CCA that queries invalid ciphertexts and exploits their decryption results.
Side-channel attacks on the FO-like transforms were initially presented in the pioneering works by Guo et al. [GTN20] and Ravi et al. [RRCB20]. Guo et al. presented a timing attack exploiting the equality check (as at Line 5 in Algorithm 1). Ciphertexts of postquantum KEMs are treated as a long vector in CPUs/microcontrollers. A comparison using an usual operation (e.g., memcmp) takes a (relatively) long time if two ciphertexts are very similar to each other; otherwise, the comparison terminates shortly. They exploited this timing difference to implement a PC oracle for lattice- and code-based KEMs, and presented key-recovery attacks for lattice-based and code-based KEMs where the equality check was not implemented in constant time. Ravi et al. reported the first power/EM attack on an FO-like transform. The attack implemented a PC oracle or decryption failure oracle by exploiting the side-channel leakage during computation of RO (i.e., hash function) in re-encryption with a t-test-based template. Their attack achieved key recovery of six lattice-based KEMs: Kyber, Saber, FrodoKEM, Round5, NewHope and LAC. Bhasin et al. [BDH+21] presented an attack on masked polynomial comparison schemes for Kyber, Saber, and FrodoKEM [OSPG18, BPO+20] by exploiting ciphertext equality checks in lattice-based KEMs and demonstrated its application to Kyber. They implemented a PC oracle using a distinguisher based on the t-test. More recently, Ueno et al. demonstrated a generalization of power/EM attacks on FO-like transforms [UXT+21]. They illustrated that the side-channel leakage during re-encryption can be generally exploited if a KR-PCA on the underlying PKE is known. They demonstrated that their attack could achieve key recovery of eight out of nine KEMs of NIST PQC third-round candidates. One major research direction of attacks of this kind is to improve the attack efficiency (i.e., reduce the number of required traces) for a precise evaluation of the cost of an optimal attack. Other side-channel-assisted CCAs have also been extensively studied in this way [XPR+22, RBRC22, SKL+20, REB+21, NDGJ21], especially for lattice-based KEMs. More recently, in [QCZ+21], Qin et al. showed an improvement of CCAs on lattice-based KEMs using a binary key-mismatch oracle with adaptive queries, which reduced the number of oracle accesses/queries compared to that of the CCA used in [UXT+21]. In [SCZ+23], Shen et al. presented a side-channel-assisted CCA using a binary PC oracle with an error correction of the PC oracle outputs, implemented by side-channel information. They showed that the error tolerance reduced the number of traces required to implement a PC oracle, which reduced the total number of traces required for key recovery. They also applied their attack to Kyber, and achieved up to 55.4% reduction of the total number of traces required for key recovery compared to that in [UXT+21].
3.Proposed Attack
The major drawback of CCAs with the PC oracle outlined in Section 2.3 is that the attacker obtains no more than one-bit information per oracle access4, which results in a large number of traces being required for key recovery. In this study, we propose an oracle named the multiple-valued plaintext-checking (MV-PC) oracle to extract more bits of information per oracle access. Let μ be a positive integer. Consider an attacker who knows that a ciphertext c ̃ is necessarily decrypted to either of the μ plaintexts m0, m1, . . . , mμ−1. The attacker can recover the secret key of the KEM with repeated and adaptive queries if the attacker knows to which plaintext c ̃ is decrypted. Such an oracle is a generalization of the (binary) PC oracle with μ = 2. Note that, without side-channels, the FO-like transform theoretically does not provide any information about which plaintext c ̃ corresponds to (although the attacker knows the reference plaintext for valid ciphertext). We name this oracle the MV-PC oracle, and formally define it as Oμ(c ̃; m0, m1, . . . , mμ−1) = v s.t. PKE.Decsk(c ̃) = mv. Intuitively, the MV-PC oracle for μ values (called μV-PC) provides up-to log2 μ information to the attacker; therefore, a CCA using the MV-PC oracle would achieve key recovery with fewer oracle accesses roughly by a factor of 1/ log2 μ than that of the conventional KR-PCA with the binary PC oracle.
3.2 General attack description
The proposed attack exploits an MV-PC oracle through a side-channel leakage and recovers the secret key by side-channel-assisted CCA on the underlying CPA-secure PKE. As well as the previous attack in [UXT+21], the proposed attack focuses on the side-channel leakage during the RO evaluation (i.e., computation of symmetric primitive like hash function) of re-encryption in PKE.Decaps. Using the side-channel leakage, the attacker accesses to an MV-PC oracle; that is, estimates which an invalid ciphertext c ̃ is decrypted to plaintext m0, m1, . . . , mμ−1 by PKE.Dec. If the attacker can correctly estimate the plaintext from the side-channel leakage, the attacker can perform a key recovery CCA. The proposed attack achieves a key recovery with fewer side-channel traces, if the MV-PC oracle is efficiently implemented. As in [UXT+21], the proposed SCA consists of profiling and attack phases. In the profiling phase, the attacker trains a μ-classification NN to estimate the plaintext (i.e., implement an μV-PC oracle) from side-channel traces during the RO evaluation. In the attack phase, the attacker queries invalid ciphertexts and performs a CCA using the μVPC oracle implemented by the trained NN. Although the attack requires a profiling, we do not require any profiling device which the attacker can know/control the secret key, in contrast to major DL-based side-channel attacks on symmetric primitive. This is because the profiling can be carried out without secret key, as in previous SCAs on latticebased KEMs [RRCB20, XPR+22, RBRC20, SKL+20, NDGJ21, UXT+21]. The usage of NN makes the proposed attack general and efficient, because it has been shown that
DL-based side-channel attacks are applicable to various implementations (including ones with countermeasures such as masking and random delay) without detailed knowledge of implementation nor a specific condition/assumption about leakage. Moreover, the proposed attack can be carried out by the neural distinguisher from side-channel leakage during the RO evaluation, and the key recovery capability depends solely on the quality of the neural distinguisher.
|
考点1:“plaintext-checking oracle” 推荐翻译为 明文检查谕言机 或 明文检查预言机
考点2:“full decryptyion oracle” 推荐翻译为 全解密谕言机 或 全解密预言机
考点3: ”decryption failure oracle“ 推荐翻译为 解密失败谕言机 或 解密失败预言机
考点4:“exploit" 应跟据后接宾语调整翻译语义,如”exploit the secret key“推荐翻译为”非法获取私钥“,”exploit the decryption results“则推荐翻译为”利用解密后的结果“
考点5:”invalid“ 在密码学选择密文攻击场景下推荐翻译为 ”非法的“
考点6:”trace“ 在侧信道密码分析领域推荐翻译为 ”波形“
考点7:”profiling phase“ 在侧信道密码分析领域推荐必须译为 ”建模阶段“
考点8:”cryptographic primitive“ 推荐翻译为 ”密码学原语” 或 “密码学基础组件”
考点9:“secret key” 在公钥密码学场景下必须译为 “私钥”
|
8716f
|
学术论文
|
应用学科
|
139
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
PRIVATE EQUITY FUND SUBSCRIPTION AGREEMENT
Article 1: Fund Structure and Investment Objectives
This Subscription Agreement ("Agreement") is entered into between the General Partner, acting as the fund manager of ABC Private Equity Fund L.P. ("Fund"), and the undersigned Limited Partner ("Investor" or "Subscriber"). The Fund is structured as a limited partnership domiciled in Delaware, with the General Partner holding unlimited liability for fund operations and Limited Partners enjoying limited liability protection subject to their capital commitments.
The Fund's primary investment objective is to achieve superior risk-adjusted returns through acquiring controlling or significant minority stakes in middle-market companies across diversified sectors. The investment strategy focuses on value creation through operational improvements, strategic repositioning, and prudent use of leverage. The Fund operates under a closed-end structure with a predetermined investment period of five years, followed by a harvest period not exceeding three years.
Article 2: Capital Commitment and Drawdown Mechanisms
The Investor hereby commits to contribute the aggregate amount specified in Schedule A ("Capital Commitment") to the Fund. Such commitment represents the maximum amount that may be called by the General Partner during the commitment period. Capital contributions shall be made through a series of capital calls issued by the General Partner upon not less than ten (10) business days' prior written notice to all Limited Partners.
Each capital call notice shall specify the purpose of the drawdown, the aggregate amount being called, each Limited Partner's pro rata share based on their respective capital commitments, and the deadline for funding. Failure to satisfy a capital call within the prescribed timeframe shall constitute a default event, subjecting the defaulting Limited Partner to remedial measures including, but not limited to, dilution of their partnership interest, forfeiture of previously contributed capital, and potential forced withdrawal from the Fund.
The General Partner reserves the right to implement a bridging facility to accommodate temporary funding needs, with any associated costs allocated proportionally among all Limited Partners. Interest expense and arrangement fees related to such facilities shall be treated as Fund expenses and allocated according to the waterfall distribution mechanism outlined herein.
Article 3: Management Fee Structure and Carried Interest
The Investor acknowledges and agrees to pay a management fee calculated as 2.0% per annum of the Investor's capital commitment during the commitment period, and 2.0% per annum of the Investor's contributed capital thereafter. Management fees are payable quarterly in advance and are subject to offset against future carried interest distributions to the General Partner.
The General Partner shall be entitled to carried interest equal to 20% of the Fund's net profits, subject to an 8% preferred return hurdle rate applied to Limited Partners' contributed capital. The carried interest calculation shall employ the European waterfall method, whereby carried interest is only distributed after all Limited Partners have received return of their contributed capital plus the specified preferred return on a cumulative basis.
Any carried interest distributed to the General Partner shall be subject to clawback provisions in the event that subsequent portfolio company exits result in aggregate Fund performance falling below the hurdle rate threshold. The clawback mechanism ensures that Limited Partners receive their preferred return before any carried interest is definitively retained by the General Partner.
Article 4: Portfolio Company Governance and Reserved Rights
The General Partner shall maintain discretionary authority over all investment decisions, including but not limited to initial acquisitions, follow-on investments, portfolio company board representation, and exit strategies. However, certain material decisions require Limited Partner advisory committee approval or supermajority consent as specified in the Limited Partnership Agreement.
Reserved rights subject to Limited Partner approval include: (i) amendments to the investment strategy or geographic focus; (ii) co-investment opportunities exceeding 15% of total Fund commitments; (iii) related party transactions involving the General Partner or its affiliates; (iv) modifications to the fee structure or carried interest arrangement; and (v) early termination of the Fund or extension of the investment period beyond the initial five-year term.
The Limited Partner advisory committee shall comprise representatives elected by Limited Partners holding not less than 66% of total capital commitments. Advisory committee members serve two-year terms and are responsible for reviewing potential conflicts of interest, approving annual valuations of portfolio investments, and providing guidance on material Fund governance matters.
Article 5: Due Diligence and Disclosure Obligations
The Investor represents and warrants that they have conducted adequate due diligence regarding the Fund's investment strategy, risk profile, and operational framework. The Investor acknowledges receipt of the Fund's Private Placement Memorandum, Limited Partnership Agreement, and audited financial statements of the General Partner.
The General Partner shall provide quarterly reporting to all Limited Partners, including portfolio company valuations prepared in accordance with International Private Equity and Venture Capital Valuation Guidelines. Annual reports shall include audited financial statements prepared by an independent accounting firm of recognized international standing.
The General Partner maintains discretionary authority regarding the timing and method of portfolio company exits, including initial public offerings, strategic sales, management buyouts, and secondary market transactions. Limited Partners acknowledge that liquidity events are inherently unpredictable and may require extended holding periods to maximize value creation.
Article 6: Risk Factors and Regulatory Compliance
Investment in the Fund involves substantial risks, including but not limited to: (i) potential total loss of invested capital; (ii) illiquidity of partnership interests; (iii) concentration risk due to focused investment strategy; (iv) leverage-related risks at both Fund and portfolio company levels; (v) regulatory changes affecting target markets or investment structures; and (vi) key person dependency related to the General Partner's investment team.
The Fund is exempt from registration under the Investment Company Act of 1940 pursuant to Section 3(c)(1) thereof and relies on exemptions under the Securities Act of 1933 for private placement of partnership interests. The Investor must qualify as an accredited investor as defined under Regulation D and satisfy applicable suitability standards.
Cross-border investments may expose the Fund to foreign exchange risk, political risk, and varying regulatory environments. The General Partner maintains professional indemnity insurance and implements comprehensive compliance procedures to mitigate operational risks, but cannot guarantee protection against all potential liabilities.
Article 7: Transfer Restrictions and Secondary Market Transactions
Partnership interests are subject to strict transfer restrictions and may not be sold, assigned, or transferred without prior written consent of the General Partner. Any proposed transfer must comply with applicable securities laws and maintain the Fund's exemption status under relevant investment company regulations.
Secondary market transactions involving partnership interests require valuation opinions from qualified independent appraisers and may trigger right of first refusal provisions in favor of existing Limited Partners. Transfer procedures must allow adequate due diligence periods for prospective assignees and ensure compliance with know-your-customer and anti-money laundering requirements.
The General Partner reserves the right to implement mandatory redemption provisions in cases where Limited Partner transfers would compromise the Fund's regulatory status or operational efficiency. Redemption prices shall be determined based on independently appraised net asset values, subject to applicable discounts reflecting illiquidity and transfer costs.
Article 8: Tax Considerations and Regulatory Reporting
The Fund is structured as a pass-through entity for U.S. federal income tax purposes, with all income, gains, losses, and deductions allocated to Limited Partners according to their respective partnership interests. Limited Partners are responsible for their own tax liabilities arising from Fund operations and distributions.
The General Partner shall provide annual Schedule K-1 forms detailing each Limited Partner's allocable share of Fund income and expenses. International investors may be subject to withholding taxes on U.S.-source income and should consult independent tax advisors regarding treaty benefits and foreign tax credit opportunities.
The Fund maintains compliance with Foreign Account Tax Compliance Act (FATCA) requirements and Common Reporting Standard (CRS) obligations. Limited Partners acknowledge that confidential information may be disclosed to tax authorities pursuant to applicable reporting requirements and international tax treaties.
Article 9: Termination and Liquidation Procedures
The Fund shall terminate upon the earlier of: (i) expiration of the partnership term as specified in the Limited Partnership Agreement; (ii) completion of all portfolio exits and final distributions; (iii) dissolution by General Partner election; or (iv) removal of the General Partner by supermajority Limited Partner vote for cause.
Upon termination, the General Partner shall liquidate remaining portfolio investments in an orderly manner designed to maximize recovery values for Limited Partners. Liquidation proceeds shall be distributed according to the waterfall mechanism, with Limited Partners receiving priority over carried interest distributions until full return of contributed capital plus preferred returns.
Final accounting and distribution statements shall be prepared by independent auditors and distributed to all Limited Partners within 90 days of final asset disposition. Any remaining liabilities or contingent obligations shall be reserved against final distributions until resolution or expiration of applicable statute of limitations periods.
Article 10: Dispute Resolution and Governing Law
This Agreement shall be governed by and construed in accordance with the laws of the State of Delaware, without regard to choice of law principles. Any disputes arising under this Agreement shall be resolved through binding arbitration administered by the American Arbitration Association under its Commercial Arbitration Rules.
The arbitration shall be conducted by a three-member panel, with each party selecting one arbitrator and the two party-appointed arbitrators selecting a neutral chairperson. Arbitration proceedings shall be confidential, and awards shall be final and binding upon all parties, subject only to limited judicial review as provided under the Federal Arbitration Act.
The prevailing party in any dispute resolution proceeding shall be entitled to recover reasonable attorneys' fees and costs from the non-prevailing party. All parties waive any right to jury trial and agree that arbitration is the exclusive method for resolving disputes related to this Agreement or the Fund's operations.
|
PRIVATE EQUITY FUND SUBSCRIPTION AGREEMENT
Article 1: Fund Structure and Investment Objectives
This Subscription Agreement ("Agreement") is entered into between the General Partner, acting as the fund manager of ABC Private Equity Fund L.P. ("Fund"), and the undersigned Limited Partner ("Investor" or "Subscriber"). The Fund is structured as a limited partnership domiciled in Delaware, with the General Partner holding unlimited liability for fund operations and Limited Partners enjoying limited liability protection subject to their capital commitments.
The Fund's primary investment objective is to achieve superior risk-adjusted returns through acquiring controlling or significant minority stakes in middle-market companies across diversified sectors. The investment strategy focuses on value creation through operational improvements, strategic repositioning, and prudent use of leverage. The Fund operates under a closed-end structure with a predetermined investment period of five years, followed by a harvest period not exceeding three years.
Article 2: Capital Commitment and Drawdown Mechanisms
The Investor hereby commits to contribute the aggregate amount specified in Schedule A ("Capital Commitment") to the Fund. Such commitment represents the maximum amount that may be called by the General Partner during the commitment period. Capital contributions shall be made through a series of capital calls issued by the General Partner upon not less than ten (10) business days' prior written notice to all Limited Partners.
Each capital call notice shall specify the purpose of the drawdown, the aggregate amount being called, each Limited Partner's pro rata share based on their respective capital commitments, and the deadline for funding. Failure to satisfy a capital call within the prescribed timeframe shall constitute a default event, subjecting the defaulting Limited Partner to remedial measures including, but not limited to, dilution of their partnership interest, forfeiture of previously contributed capital, and potential forced withdrawal from the Fund.
The General Partner reserves the right to implement a bridging facility to accommodate temporary funding needs, with any associated costs allocated proportionally among all Limited Partners. Interest expense and arrangement fees related to such facilities shall be treated as Fund expenses and allocated according to the waterfall distribution mechanism outlined herein.
Article 3: Management Fee Structure and Carried Interest
The Investor acknowledges and agrees to pay a management fee calculated as 2.0% per annum of the Investor's capital commitment during the commitment period, and 2.0% per annum of the Investor's contributed capital thereafter. Management fees are payable quarterly in advance and are subject to offset against future carried interest distributions to the General Partner.
The General Partner shall be entitled to carried interest equal to 20% of the Fund's net profits, subject to an 8% preferred return hurdle rate applied to Limited Partners' contributed capital. The carried interest calculation shall employ the European waterfall method, whereby carried interest is only distributed after all Limited Partners have received return of their contributed capital plus the specified preferred return on a cumulative basis.
Any carried interest distributed to the General Partner shall be subject to clawback provisions in the event that subsequent portfolio company exits result in aggregate Fund performance falling below the hurdle rate threshold. The clawback mechanism ensures that Limited Partners receive their preferred return before any carried interest is definitively retained by the General Partner.
Article 4: Portfolio Company Governance and Reserved Rights
The General Partner shall maintain discretionary authority over all investment decisions, including but not limited to initial acquisitions, follow-on investments, portfolio company board representation, and exit strategies. However, certain material decisions require Limited Partner advisory committee approval or supermajority consent as specified in the Limited Partnership Agreement.
Reserved rights subject to Limited Partner approval include: (i) amendments to the investment strategy or geographic focus; (ii) co-investment opportunities exceeding 15% of total Fund commitments; (iii) related party transactions involving the General Partner or its affiliates; (iv) modifications to the fee structure or carried interest arrangement; and (v) early termination of the Fund or extension of the investment period beyond the initial five-year term.
The Limited Partner advisory committee shall comprise representatives elected by Limited Partners holding not less than 66% of total capital commitments. Advisory committee members serve two-year terms and are responsible for reviewing potential conflicts of interest, approving annual valuations of portfolio investments, and providing guidance on material Fund governance matters.
Article 5: Due Diligence and Disclosure Obligations
The Investor represents and warrants that they have conducted adequate due diligence regarding the Fund's investment strategy, risk profile, and operational framework. The Investor acknowledges receipt of the Fund's Private Placement Memorandum, Limited Partnership Agreement, and audited financial statements of the General Partner.
The General Partner shall provide quarterly reporting to all Limited Partners, including portfolio company valuations prepared in accordance with International Private Equity and Venture Capital Valuation Guidelines. Annual reports shall include audited financial statements prepared by an independent accounting firm of recognized international standing.
The General Partner maintains discretionary authority regarding the timing and method of portfolio company exits, including initial public offerings, strategic sales, management buyouts, and secondary market transactions. Limited Partners acknowledge that liquidity events are inherently unpredictable and may require extended holding periods to maximize value creation.
Article 6: Risk Factors and Regulatory Compliance
Investment in the Fund involves substantial risks, including but not limited to: (i) potential total loss of invested capital; (ii) illiquidity of partnership interests; (iii) concentration risk due to focused investment strategy; (iv) leverage-related risks at both Fund and portfolio company levels; (v) regulatory changes affecting target markets or investment structures; and (vi) key person dependency related to the General Partner's investment team.
The Fund is exempt from registration under the Investment Company Act of 1940 pursuant to Section 3(c)(1) thereof and relies on exemptions under the Securities Act of 1933 for private placement of partnership interests. The Investor must qualify as an accredited investor as defined under Regulation D and satisfy applicable suitability standards.
Cross-border investments may expose the Fund to foreign exchange risk, political risk, and varying regulatory environments. The General Partner maintains professional indemnity insurance and implements comprehensive compliance procedures to mitigate operational risks, but cannot guarantee protection against all potential liabilities.
Article 7: Transfer Restrictions and Secondary Market Transactions
Partnership interests are subject to strict transfer restrictions and may not be sold, assigned, or transferred without prior written consent of the General Partner. Any proposed transfer must comply with applicable securities laws and maintain the Fund's exemption status under relevant investment company regulations.
Secondary market transactions involving partnership interests require valuation opinions from qualified independent appraisers and may trigger right of first refusal provisions in favor of existing Limited Partners. Transfer procedures must allow adequate due diligence periods for prospective assignees and ensure compliance with know-your-customer and anti-money laundering requirements.
The General Partner reserves the right to implement mandatory redemption provisions in cases where Limited Partner transfers would compromise the Fund's regulatory status or operational efficiency. Redemption prices shall be determined based on independently appraised net asset values, subject to applicable discounts reflecting illiquidity and transfer costs.
Article 8: Tax Considerations and Regulatory Reporting
The Fund is structured as a pass-through entity for U.S. federal income tax purposes, with all income, gains, losses, and deductions allocated to Limited Partners according to their respective partnership interests. Limited Partners are responsible for their own tax liabilities arising from Fund operations and distributions.
The General Partner shall provide annual Schedule K-1 forms detailing each Limited Partner's allocable share of Fund income and expenses. International investors may be subject to withholding taxes on U.S.-source income and should consult independent tax advisors regarding treaty benefits and foreign tax credit opportunities.
The Fund maintains compliance with Foreign Account Tax Compliance Act (FATCA) requirements and Common Reporting Standard (CRS) obligations. Limited Partners acknowledge that confidential information may be disclosed to tax authorities pursuant to applicable reporting requirements and international tax treaties.
Article 9: Termination and Liquidation Procedures
The Fund shall terminate upon the earlier of: (i) expiration of the partnership term as specified in the Limited Partnership Agreement; (ii) completion of all portfolio exits and final distributions; (iii) dissolution by General Partner election; or (iv) removal of the General Partner by supermajority Limited Partner vote for cause.
Upon termination, the General Partner shall liquidate remaining portfolio investments in an orderly manner designed to maximize recovery values for Limited Partners. Liquidation proceeds shall be distributed according to the waterfall mechanism, with Limited Partners receiving priority over carried interest distributions until full return of contributed capital plus preferred returns.
Final accounting and distribution statements shall be prepared by independent auditors and distributed to all Limited Partners within 90 days of final asset disposition. Any remaining liabilities or contingent obligations shall be reserved against final distributions until resolution or expiration of applicable statute of limitations periods.
Article 10: Dispute Resolution and Governing Law
This Agreement shall be governed by and construed in accordance with the laws of the State of Delaware, without regard to choice of law principles. Any disputes arising under this Agreement shall be resolved through binding arbitration administered by the American Arbitration Association under its Commercial Arbitration Rules.
The arbitration shall be conducted by a three-member panel, with each party selecting one arbitrator and the two party-appointed arbitrators selecting a neutral chairperson. Arbitration proceedings shall be confidential, and awards shall be final and binding upon all parties, subject only to limited judicial review as provided under the Federal Arbitration Act.
The prevailing party in any dispute resolution proceeding shall be entitled to recover reasonable attorneys' fees and costs from the non-prevailing party. All parties waive any right to jury trial and agree that arbitration is the exclusive method for resolving disputes related to this Agreement or the Fund's operations.
|
考点1:Limited Partnership 推荐译为"有限合伙企业"
考点2:Capital Commitment 推荐译为"出资承诺"
考点3:Drawdown Mechanisms 推荐译为"资金调用机制""缴款机制"
考点4:Carried Interest 推荐译为"附带权益""业绩报酬"
考点5:Hurdle Rate 推荐译为"门槛收益率"
考点6:European Waterfall Method 推荐译为"欧式瀑布分配法"
考点7:Clawback Provisions 推荐译为"回拨条款"
考点8:Pass-through Entity 推荐译为"税收透明实体"
考点9:Schedule K-1 必须译为"K-1税表/K-1表/K-1表格"
考点10:Binding Arbitration 推荐译为"强制仲裁"/“有拘束力的仲裁”
考点11:Harvest Period 推荐译为"退出期"
考点12:International Private Equity and Venture Capital Valuation Guidelines 推荐译为"《国际私募股权和风险投资估值指引》/《IPEV估值指引》"
|
886b4
|
垂类场景
|
法律
|
124
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Diet
People’s diets vary from one country to another. Diets can also vary within a single country. Geographic differences explain part of this variation. For example, people who live near the ocean might eat greater amounts of fish than people who live farther inland. People living in cool regions with short growing seasons depend on crops that mature quickly, such as potatoes. In warm, wet lowlands where the soil retains water, rice is often a staple.
Geographic factors are less important today than they were a century ago. Improved methods of agriculture and transportation, as well as increased trade and tourism, have made more types of food available to a wider variety of people.
Improved methods of food processing, preservation, storage, and shipping allow many people to enjoy foods produced far from their homes. Spanish olive oil, French cheeses, and sardines from Norway, for example, are eaten as far away as Australia.
Local traditions and customs play a role in determining what foods people eat and how they are prepared. English tradition encourages roast beef and Yorkshire pudding, a type of bread, be eaten together. Many Asians serve rice with almost every meal.
Economic factors also affect what people eat. In the U.S. state of Maine, lobster is usually a relatively inexpensive food. The shellfish is native to the state’s coastal areas and has been a traditional food for hundreds of years. However, lobster is a luxury item in the Midwest, where it must be flown in. Lobster dishes served in Iowa may cost two to three times what they do in Maine.
In developed countries, many people have enough money to buy a variety of nutritious foods. Malnutrition is not a large problem, and people have a long lifespan. But even in these countries, there are many people who cannot buy these foods because resources are not evenly distributed throughout the population. In some places, healthy, nutritious food can be more expensive than so-called “junk food,” which has many calories but little nutritional benefit.
Even those who can afford healthy food may eat poorly. The diets of many people in developed countries are too high in the fats, salt, and refined sugars found in junk food. These diets are too low in fruits, vegetables, and fiber.
In developing countries, malnutrition is more common. A poor harvest, flood, or drought may cause famine, because the community or nation is not economically able to import food.
The diets of the urban and rural populations of developing countries are often quite different. People in urban areas eat more processed foods, while people who live in rural areas may have access to fresh milk, fruits, and vegetables. However, people living in rural areas are the first to be affected by a poor harvest.
Food and Culture
People do not eat only to obtain nutrients and ward off hunger and starvation. People’s eating habits are strongly influenced by culture. Rituals around preparing, sharing, and consuming food serve social roles as well as biological ones.
Religion sometimes plays a role in what, and when, people eat. Followers of the Jain religion, for example, strongly believe in nonviolence toward all living things. Strict Jains never eat meat. Many Jains also refrain from eating potatoes and other tubers because many small organisms are harmed as the tubers are pulled from the earth.
Jewish kashrut law and Muslim dhabihah law outline many rules for eating. Both include a ban on pork. Food that is prepared according to kashrut law is called kosher, while food that is prepared according to dhabihah law is called halal.
During the month of Ramadan, Muslims fast, or avoid eating, during daylight hours. Typically, Muslims will eat one meal before dawn and one after sunset, but nothing at all while the sun is shining. Ramadan is considered a time for inner reflection, devotion to God, and self-control.
Feasting is also an important ritual, both for religious and nonreligious reasons. Most religious fasting periods, such as Ramadan, are followed by holiday feasts. Eid al-Fitr is the Islamic holiday following Ramadan. One of the ways Muslims celebrate Eid is to donate food to the poor.
Nonreligious holidays often include feasts as well. In the United States, people gather to eat turkey, stuffing, cranberry sauce, and pumpkin pie on Thanksgiving. In China, families celebrate the Chinese New Year with foods that symbolize luck and prosperity, such as long noodles, chickens, fish, oysters, dumplings, tangerines, oranges, and sticky rice cakes.
Many people make dietary choices based on ethics—beliefs about what is right and wrong. For instance, some people choose not to eat meat out of concern for the environment. Livestock is one of the leading contributors to carbon emissions, and some people reduce the amount of beef they eat to reduce their “carbon footprint.” Many people avoid eating meat out of concern for animal welfare.
Vegetarians avoid eating all meat and fish. Vegans avoid all animal products, including eggs, milk, cheese, and honey. Some people who are not vegetarians may raise or buy humanely produced animal products such as free-range chicken and grass-fed beef.
Other ethics-based food practices include choosing organic or locally grown foods. People who choose organic foods may do so because of the reduced number of chemicals in the food. Organic food relies little on genetic modification or pesticides. Organic food also releases fewer chemicals into the environment in the form of runoff.
The “locavore” movement values the reduced environmental impact of local foods. There are fewer transportation costs, such as greenhouse gas emissions, with local foods.
The way we serve and eat food is as culturally important as what foods we consume. In East Asian countries, most people use chopsticks to pick up their food. In Europe and the Americas, a variety of utensils serve different purposes. A full, formal place setting can include a salad fork, dinner fork, dessert fork, teaspoon, soup spoon, butter knife, and dinner knife. In other countries, such as India and Ethiopia, many foods are picked up with pieces of flat bread rather than utensils.
Table manners vary widely from culture to culture. Manners include rules about how and where people should sit, when to begin eating, which utensils to use in certain situations and with which hand, and what behaviors might be considered rude.
In East Asian countries, it is considered rude to point at people with your chopsticks, or to rest your chopsticks standing upright in your rice. In Malaysia, eating with your left hand is considered unclean. In Japan, it is acceptable and even encouraged to make slurping noises while eating hot noodles, but not while eating soup. In Russia, it is considered polite to leave a bit of food after eating, but in Brazil, people are expected to eat everything on their plates.
Cuisine
Food and food preparation associated with a specific region are known as that region’s cuisine. Cuisine can be national, such as the fresh fish and noodles associated with Japanese food. Cuisine can also be regional or local. California cuisine, for instance, is known for mixing different types of national cuisines, such as French and Chinese.
A food’s adaptability to a specific region can define that region. Maize, native to North and Central America, is considered one of Mexico’s greatest “national treasures.” An image of Xochipilli, the Aztec god of maize, appears on Mexico's 100-peso bill.
Most cuisines feature staple foods of the region. In the Democratic Republic of Congo, boiled cassava root is a staple food. The large leaves of the cassava and a fiery pepper sauce called pili-pili are often part of a traditional Congolese meal. Fresh-picked bananas, papayas, and pineapples are frequently eaten. Animal proteins from poultry, fish, and crocodiles are also popular foods in the Democratic Republic of Congo.
Climate can also impact the cuisine of a region. Much of Russia faces cold winters, so few crops grow there. Warm soups are a large part of Russian cuisine. Borscht, or beet soup, is probably the most familiar Russian soup. Beets are vegetables that are capable of growing in the cold, hard ground. Grains that grow well in cold climates are also popular in Russian cuisine. Kasha, for example, is cooked grains, such as buckwheat, barley, or semolina. Blini, or buckwheat pancakes, are served with caviar, smoked fish, butter, and sour cream. Pickles, cucumbers, and onions are widely eaten.
Since Japan is surrounded by the ocean, fish is a mainstay of Japanese cuisine. It is prepared in a variety of ways. Sashimi, for example, is raw fish dipped in seasoned soy sauce. Tempura is prawns or slices of fish and vegetables dipped in batter and fried. Most sushi is made from flavored rice covered with slices of raw or cooked fish and vegetables.
Even non-native foods can define a region. Potatoes were introduced to Ireland in the early 17th century, probably by the explorer Sir Walter Raleigh, who brought the tubers home with him after exploring the Americas. Potatoes, especially the “lumper” variety, grow well in cold climates and rocky soil. Within 200 years, the population of Ireland was dependent on lumpers for most of their carbohydrates. A potato disease, or blight, struck Ireland in the mid-19th century, causing the so-called Irish Potato Famine. More than a million Irish people died of malnutrition, and a million more were forced to immigrate.
Often, cuisine reflects a country or region’s history. Pho, for instance, is a Vietnamese noodle soup made with large chunks of meat, vegetables, and spices, such as basil. Vietnam was a French colony from the 19th century to the middle of the 20th century. French colonists brought French cuisine with them, including the stew called pot au feu. Pho is an adaptation of pot au feu, with the most significant addition being rice noodles, which are native to Southeast Asia. “Pho” even sounds like “feu.”
The growing number of immigrants in many cities has broadened people’s tastes in food. Many foods associated with national cuisines are inventions of immigrants. Chicken tikka masala, for example, is one of the most popular “Indian” dishes in the world. Chicken tikka masala was invented by an immigrant Pakistani chef in Glasgow, Scotland.
Often, immigrants will adapt their traditional diet with foods not available in their homeland. Chinese-American food, for instance, often features tomatoes and potatoes, foods that are not native to Asia.
Cuisine varies widely, even within a specific region and a specific food. In the Carolinas region of the United States, for example, there are more than a dozen types of traditional barbecue. In this region, pork is the most familiar barbecued meat, although chicken and beef are also barbecued. Some barbecues feature a mustard-based sauce, while others feature tomato, vinegar, or molasses. Still other traditional barbecues are “dry,” and feature spice-based rubs instead of sauce.
|
Diet
People’s diets vary from one country to another. Diets can also vary within a single country. Geographic differences explain part of this variation. For example, people who live near the ocean might eat greater amounts of fish than people who live farther inland. People living in cool regions with short growing seasons depend on crops that mature quickly, such as potatoes. In warm, wet lowlands where the soil retains water, rice is often a staple.
Geographic factors are less important today than they were a century ago. Improved methods of agriculture and transportation, as well as increased trade and tourism, have made more types of food available to a wider variety of people.
Improved methods of food processing, preservation, storage, and shipping allow many people to enjoy foods produced far from their homes. Spanish olive oil, French cheeses, and sardines from Norway, for example, are eaten as far away as Australia.
Local traditions and customs play a role in determining what foods people eat and how they are prepared. English tradition encourages roast beef and Yorkshire pudding, a type of bread, be eaten together. Many Asians serve rice with almost every meal.
Economic factors also affect what people eat. In the U.S. state of Maine, lobster is usually a relatively inexpensive food. The shellfish is native to the state’s coastal areas and has been a traditional food for hundreds of years. However, lobster is a luxury item in the Midwest, where it must be flown in. Lobster dishes served in Iowa may cost two to three times what they do in Maine.
In developed countries, many people have enough money to buy a variety of nutritious foods. Malnutrition is not a large problem, and people have a long lifespan. But even in these countries, there are many people who cannot buy these foods because resources are not evenly distributed throughout the population. In some places, healthy, nutritious food can be more expensive than so-called “junk food,” which has many calories but little nutritional benefit.
Even those who can afford healthy food may eat poorly. The diets of many people in developed countries are too high in the fats, salt, and refined sugars found in junk food. These diets are too low in fruits, vegetables, and fiber.
In developing countries, malnutrition is more common. A poor harvest, flood, or drought may cause famine, because the community or nation is not economically able to import food.
The diets of the urban and rural populations of developing countries are often quite different. People in urban areas eat more processed foods, while people who live in rural areas may have access to fresh milk, fruits, and vegetables. However, people living in rural areas are the first to be affected by a poor harvest.
Food and Culture
People do not eat only to obtain nutrients and ward off hunger and starvation. People’s eating habits are strongly influenced by culture. Rituals around preparing, sharing, and consuming food serve social roles as well as biological ones.
Religion sometimes plays a role in what, and when, people eat. Followers of the Jain religion, for example, strongly believe in nonviolence toward all living things. Strict Jains never eat meat. Many Jains also refrain from eating potatoes and other tubers because many small organisms are harmed as the tubers are pulled from the earth.
Jewish kashrut law and Muslim dhabihah law outline many rules for eating. Both include a ban on pork. Food that is prepared according to kashrut law is called kosher, while food that is prepared according to dhabihah law is called halal.
During the month of Ramadan, Muslims fast, or avoid eating, during daylight hours. Typically, Muslims will eat one meal before dawn and one after sunset, but nothing at all while the sun is shining. Ramadan is considered a time for inner reflection, devotion to God, and self-control.
Feasting is also an important ritual, both for religious and nonreligious reasons. Most religious fasting periods, such as Ramadan, are followed by holiday feasts. Eid al-Fitr is the Islamic holiday following Ramadan. One of the ways Muslims celebrate Eid is to donate food to the poor.
Nonreligious holidays often include feasts as well. In the United States, people gather to eat turkey, stuffing, cranberry sauce, and pumpkin pie on Thanksgiving. In China, families celebrate the Chinese New Year with foods that symbolize luck and prosperity, such as long noodles, chickens, fish, oysters, dumplings, tangerines, oranges, and sticky rice cakes.
Many people make dietary choices based on ethics—beliefs about what is right and wrong. For instance, some people choose not to eat meat out of concern for the environment. Livestock is one of the leading contributors to carbon emissions, and some people reduce the amount of beef they eat to reduce their “carbon footprint.” Many people avoid eating meat out of concern for animal welfare.
Vegetarians avoid eating all meat and fish. Vegans avoid all animal products, including eggs, milk, cheese, and honey. Some people who are not vegetarians may raise or buy humanely produced animal products such as free-range chicken and grass-fed beef.
Other ethics-based food practices include choosing organic or locally grown foods. People who choose organic foods may do so because of the reduced number of chemicals in the food. Organic food relies little on genetic modification or pesticides. Organic food also releases fewer chemicals into the environment in the form of runoff.
The “locavore” movement values the reduced environmental impact of local foods. There are fewer transportation costs, such as greenhouse gas emissions, with local foods.
The way we serve and eat food is as culturally important as what foods we consume. In East Asian countries, most people use chopsticks to pick up their food. In Europe and the Americas, a variety of utensils serve different purposes. A full, formal place setting can include a salad fork, dinner fork, dessert fork, teaspoon, soup spoon, butter knife, and dinner knife. In other countries, such as India and Ethiopia, many foods are picked up with pieces of flat bread rather than utensils.
Table manners vary widely from culture to culture. Manners include rules about how and where people should sit, when to begin eating, which utensils to use in certain situations and with which hand, and what behaviors might be considered rude.
In East Asian countries, it is considered rude to point at people with your chopsticks, or to rest your chopsticks standing upright in your rice. In Malaysia, eating with your left hand is considered unclean. In Japan, it is acceptable and even encouraged to make slurping noises while eating hot noodles, but not while eating soup. In Russia, it is considered polite to leave a bit of food after eating, but in Brazil, people are expected to eat everything on their plates.
Cuisine
Food and food preparation associated with a specific region are known as that region’s cuisine. Cuisine can be national, such as the fresh fish and noodles associated with Japanese food. Cuisine can also be regional or local. California cuisine, for instance, is known for mixing different types of national cuisines, such as French and Chinese.
A food’s adaptability to a specific region can define that region. Maize, native to North and Central America, is considered one of Mexico’s greatest “national treasures.” An image of Xochipilli, the Aztec god of maize, appears on Mexico's 100-peso bill.
Most cuisines feature staple foods of the region. In the Democratic Republic of Congo, boiled cassava root is a staple food. The large leaves of the cassava and a fiery pepper sauce called pili-pili are often part of a traditional Congolese meal. Fresh-picked bananas, papayas, and pineapples are frequently eaten. Animal proteins from poultry, fish, and crocodiles are also popular foods in the Democratic Republic of Congo.
Climate can also impact the cuisine of a region. Much of Russia faces cold winters, so few crops grow there. Warm soups are a large part of Russian cuisine. Borscht, or beet soup, is probably the most familiar Russian soup. Beets are vegetables that are capable of growing in the cold, hard ground. Grains that grow well in cold climates are also popular in Russian cuisine. Kasha, for example, is cooked grains, such as buckwheat, barley, or semolina. Blini, or buckwheat pancakes, are served with caviar, smoked fish, butter, and sour cream. Pickles, cucumbers, and onions are widely eaten.
Since Japan is surrounded by the ocean, fish is a mainstay of Japanese cuisine. It is prepared in a variety of ways. Sashimi, for example, is raw fish dipped in seasoned soy sauce. Tempura is prawns or slices of fish and vegetables dipped in batter and fried. Most sushi is made from flavored rice covered with slices of raw or cooked fish and vegetables.
Even non-native foods can define a region. Potatoes were introduced to Ireland in the early 17th century, probably by the explorer Sir Walter Raleigh, who brought the tubers home with him after exploring the Americas. Potatoes, especially the “lumper” variety, grow well in cold climates and rocky soil. Within 200 years, the population of Ireland was dependent on lumpers for most of their carbohydrates. A potato disease, or blight, struck Ireland in the mid-19th century, causing the so-called Irish Potato Famine. More than a million Irish people died of malnutrition, and a million more were forced to immigrate.
Often, cuisine reflects a country or region’s history. Pho, for instance, is a Vietnamese noodle soup made with large chunks of meat, vegetables, and spices, such as basil. Vietnam was a French colony from the 19th century to the middle of the 20th century. French colonists brought French cuisine with them, including the stew called pot au feu. Pho is an adaptation of pot au feu, with the most significant addition being rice noodles, which are native to Southeast Asia. “Pho” even sounds like “feu.”
The growing number of immigrants in many cities has broadened people’s tastes in food. Many foods associated with national cuisines are inventions of immigrants. Chicken tikka masala, for example, is one of the most popular “Indian” dishes in the world. Chicken tikka masala was invented by an immigrant Pakistani chef in Glasgow, Scotland.
Often, immigrants will adapt their traditional diet with foods not available in their homeland. Chinese-American food, for instance, often features tomatoes and potatoes, foods that are not native to Asia.
Cuisine varies widely, even within a specific region and a specific food. In the Carolinas region of the United States, for example, there are more than a dozen types of traditional barbecue. In this region, pork is the most familiar barbecued meat, although chicken and beef are also barbecued. Some barbecues feature a mustard-based sauce, while others feature tomato, vinegar, or molasses. Still other traditional barbecues are “dry,” and feature spice-based rubs instead of sauce.
|
考点1: “religious fasting periods”应译为“宗教禁食期”。
考点2: “Jains“应译为“耆那教”。
考点3: ”Kashrut“应译为“洁食律法。“
考点4: “Dhabihah”应译为“清真动物屠宰法”。
考点5:“halal”应译为“清真食品”。
考点6:“Ramadanl”应译为“斋月”。
考点7:“Eid al-Fitr”应译为“开斋节”。
考点8:“Chicken Tikka Masala”应译为“香料烤鸡咖喱”
|
898ef
|
垂类场景
|
食品健康
|
53
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
From the Red Detachment to the Women: A Postscript
Life and Dance
Most Chinese urban independent theatre and performance makers have been connected in some way to the Beijing-based Caochangdi Workstation (Caochangdi Gongzuozhan1 ) and the Living Dance Studio (Shenghuo Wudao Gongzuoshi). They attended the body workshops conducted by choreographer Wen Hui and borrowed the Workstation stage to rehearse their own projects. Some presented their earliest pieces at the festivals held at either the Workstation or the Young Choreographers’ Project. I was probably the last one to enjoy the opportunity to work as an artist at Caochangdi and did so mainly in the summer of 2014, right before its demolition. That was also my first collaboration with Wen Hui. Without a lived experience of working with the Living Dance Studio, I could not understand this kind of creative process, which bears all the marks of inspiration, rapture, and everyday triviality.
Caochangdi Workstation, a significant incubation site for innovations in unconventional theatre and performance in urban China, lives on in spirit. However, in the middle of our first round of rehearsals for RED (HONG), its physical body ceased to exist. When I returned to Beijing in summer 2015 for the second round of rehearsals, the cast had changed, and the rehearsal space was Wen Hui’s living room. New to the team were two women of the post-’80s generation: Jiang Fan and Li Xinmin. Both have laughed and cried along with the ups and downs of China’s market-oriented, commercialized system. But they know little, if anything, of the Cultural Revolution that dominated the mid-1960s to mid-1970s.
Wen Hui suggested: “Let’s start all over again.” That remark sparked my epiphany. Our living condition, the moment we found ourselves in, would determine the direction of the dance.
From the Red Detachment of Women
The inspiration to create RED came from three sources. The first was a trove of documentary materials related to The Red Detachment of Women (Hongse Niangzi Jun)—audiovisual clips, publications, memorabilia from the original revolutionary model ballet, interview footage. These were incorporated to evoke a special territory of memory and reactivate a living and lived archive within specific bodies: those of the performers and those of people who experienced the Cultural Revolution.
The second combined the desire to understand the complex feelings of people who experienced the politicized art and aestheticized politics that held sway during the Cultural Revolution, along with the desire to explore the in/congruity between the state’s discourse and the everyday cultural lives of the people.
The third was the idea to use the dancers’ bodies as a departure point. Varied connections with the original model ballet, in content and movement and staging, would allow RED to anatomize the original choreography and explore here-and-now experiences as dancers and survivors, together, revisit that turbulent decade. Tasks both new and stimulating befell me with the arrival of the two new members. With its all-women ensemble, RED could and should add another layer to the complexity of women’s reality in China today. It should function as a way to reflect on how the socialist imagination prescribed gender equality and women’s liberation, which were embedded in Maoist state feminism and disseminated through the revolutionary model opera . Accordingly, we played the collected documentary materials to the younger performers, pausing whenever they felt inclined to share their thoughts or express themselves through movement. I also created a tabular list of the known past experiences and current realities of the two generations of female performers, including each of their distinct experiences with and understandings of The Red Detachment of Women.
Then we heard, quite by accident, that United Heart Home of Hope (Tongxin Xiwang Jiayuan), an NGO founded in 2003 with the goal of supporting women and children in the migrant communities on the outskirts of Beijing, was singing Marching Forward (Xiang Qianjin), the theme song from the 1961 film The Red Detachment of Women, at all of their meetings. 7 We immediately decided to interview Ma Xiaoduo, the organization’s founder. Ma freely admitted that she did not remember much of the model ballet from seeing it in elementary school. But she recounted being exceptionally moved by a single occurrence in the plot: The female protagonist’s change of fortune after she joined the Red Army-led women’s detachment. To Ma, The Red Detachment of Women is about how women should transform themselves to free themselves from oppression and misery. United Heart Home of Hope was formed with exactly the same vision of self-salvation.
The development of the script of RED in 2015 was strongly directed at and dedicated to women in general and the four female performers specifically. However, in addition to using the original model ballet to engage with the decade-long social and cultural chaos initiated by the Cultural Revolution and examining the cultural products praised by the revolutionary discourse of class struggle, I wonder how RED can reflect the ways that women in today’s China face ideological orientations that are official, if different, and engage in new forms of political, social, and gender-specific struggle.
Looking Back
Act Three, “Looking Back”, aims to both show the past generation’s reminiscences onscreen and to demonstrate, through four performers’ current stories, their vibrant and tenacious presence onstage. My deepest regret is that this part could not be developed as planned due to inadequate initiatives, opportunity, budget, and rehearsal time. Since “the author is dead” and the performance text refuses further development, can only replace some of these current stories from the original script into a postscript.
Liu Zhuying could not care less if any connection exists between revolutionary model opera and guangchang wu (public square dancing). To her, the latter is neither a mobilization of mass culture in an era of depoliticization nor a cultural form of reconstruction of Maoist collectivism. She only complains that the middle-aged female dancers are not professional enough, in either spirit or technique. As a local official in charge of cultural activities, her main purpose in organizing large-scale public square-dancing activities is to maintain stability in sensitive times. This goal is best accomplished if public spaces are filled with energetic, if amateur, dancers.
Jiang Fan resigned her position as a choreographer and dancer at the Shanghai Opera House Dance Troupe in 2015 and moderately enjoys her freedom from the state-owned performing arts institutions and their suffocating leitmotif projects. She makes a living by choreographing musicals and has collaborated with Shanghai International Dance Center as an independent artist. During the creation of RED, she recognized the continuity between the revolutionary model opera of 50 years ago and today’s leitmotif works that eulogize the Party’s revolutionary history. The more artistically independent she becomes, the more she must think about how to balance the market, audience interests, and the degree to which the present can be transmitted through individualized artistic references.
Like Wu Qinghua, the female protagonist in the model ballet, Li Xinmin desperately fled her hometown (Huamulin, in rural Yunnan Province) to Kunming and then to Beijing. Since the demise of Caochangdi Workstation, when she lost her dwelling in the city, she continued to make documentary films, worked in an NGO for migrant domestic workers, sold fruit with friends, and, with her longtime artistic partner, created an autobiographical documentary theatre piece, Timeline (Fanhui de Lu). However, unlike Wu Qinghua, she made peace with her past and decided to go back to Huamulin, where she is about to get married and is expecting her first child. She still thinks The Red Detachment of Women has little to do with her life and regrets spending so much energy on RED.
We see very little of Wen Hui’s personal memories and narratives in RED. She keeps creating new pieces and touring old ones around Europe, the site of her “independence,” and conducting workshops on the body as an archive in universities all over the world. In December 2018, she commemorated the twentieth anniversary of the independent theatre and performance movement in urban China with Paper Tiger Studio Beijing (Beijing Zhilaohu Xiju Gongzuoshi) and Niao Collective at the Beijing Inside-Out Art Museum. This work functions as a physical manifesto that echoes independent artists’ ongoing rewriting of theatre and performance history in modern China. Nonetheless, even as she works with all forms of activity around the phenomenon of memorization, she chooses not to mention in public two losses of her own: That of Caochangdi Workstation and that of Wu Wenguang, her artistic and life partner.
A Nightmare
When RED was staged at the Asia Society in New York in November 2018, I moderated a pre-performance dialogue. 10 Some interview footage that was not included in the final documentary performance was shown to the audience. From this footage, I selected Ma Xiaoduo’s recollection of her nightmare:
For years, I have had the same nightmare: I am in the middle of the bridge and cannot cross it. The bridge starts crumbling, and I have to hold tight. That kind of nightmare is a reflection of repression. Sometimes I feel like I am going to screw it. I need to bring it down. I want to be freed. I feel I am being repressed. It’s like when the red light is on, you are stopped there and cannot move. Just because you are a rural woman, just because you are a woman, everyone can keep walking, but not you. I was blocked all the time. Anyone could do things, but not you. So this is a kind of battle. Whenever I listen to Marching Forward, I feel the power.
|
From the Red Detachment to the Women: A Postscript
Life and Dance
Most Chinese urban independent theatre and performance makers have been connected in some way to the Beijing-based Caochangdi Workstation (Caochangdi Gongzuozhan1 ) and the Living Dance Studio (Shenghuo Wudao Gongzuoshi). They attended the body workshops conducted by choreographer Wen Hui and borrowed the Workstation stage to rehearse their own projects. Some presented their earliest pieces at the festivals held at either the Workstation or the Young Choreographers’ Project. I was probably the last one to enjoy the opportunity to work as an artist at Caochangdi and did so mainly in the summer of 2014, right before its demolition. That was also my first collaboration with Wen Hui. Without a lived experience of working with the Living Dance Studio, I could not understand this kind of creative process, which bears all the marks of inspiration, rapture, and everyday triviality.
Caochangdi Workstation, a significant incubation site for innovations in unconventional theatre and performance in urban China, lives on in spirit. However, in the middle of our first round of rehearsals for RED (HONG), its physical body ceased to exist. When I returned to Beijing in summer 2015 for the second round of rehearsals, the cast had changed, and the rehearsal space was Wen Hui’s living room. New to the team were two women of the post-’80s generation: Jiang Fan and Li Xinmin. Both have laughed and cried along with the ups and downs of China’s market-oriented, commercialized system. But they know little, if anything, of the Cultural Revolution that dominated the mid-1960s to mid-1970s.
Wen Hui suggested: “Let’s start all over again.” That remark sparked my epiphany. Our living condition, the moment we found ourselves in, would determine the direction of the dance.
From the Red Detachment of Women
The inspiration to create RED came from three sources. The first was a trove of documentary materials related to The Red Detachment of Women (Hongse Niangzi Jun)—audiovisual clips, publications, memorabilia from the original revolutionary model ballet, interview footage. These were incorporated to evoke a special territory of memory and reactivate a living and lived archive within specific bodies: those of the performers and those of people who experienced the Cultural Revolution.
The second combined the desire to understand the complex feelings of people who experienced the politicized art and aestheticized politics that held sway during the Cultural Revolution, along with the desire to explore the in/congruity between the state’s discourse and the everyday cultural lives of the people.
The third was the idea to use the dancers’ bodies as a departure point. Varied connections with the original model ballet, in content and movement and staging, would allow RED to anatomize the original choreography and explore here-and-now experiences as dancers and survivors, together, revisit that turbulent decade. Tasks both new and stimulating befell me with the arrival of the two new members. With its all-women ensemble, RED could and should add another layer to the complexity of women’s reality in China today. It should function as a way to reflect on how the socialist imagination prescribed gender equality and women’s liberation, which were embedded in Maoist state feminism and disseminated through the revolutionary model opera . Accordingly, we played the collected documentary materials to the younger performers, pausing whenever they felt inclined to share their thoughts or express themselves through movement. I also created a tabular list of the known past experiences and current realities of the two generations of female performers, including each of their distinct experiences with and understandings of The Red Detachment of Women.
Then we heard, quite by accident, that United Heart Home of Hope (Tongxin Xiwang Jiayuan), an NGO founded in 2003 with the goal of supporting women and children in the migrant communities on the outskirts of Beijing, was singing Marching Forward (Xiang Qianjin), the theme song from the 1961 film The Red Detachment of Women, at all of their meetings. 7 We immediately decided to interview Ma Xiaoduo, the organization’s founder. Ma freely admitted that she did not remember much of the model ballet from seeing it in elementary school. But she recounted being exceptionally moved by a single occurrence in the plot: The female protagonist’s change of fortune after she joined the Red Army-led women’s detachment. To Ma, The Red Detachment of Women is about how women should transform themselves to free themselves from oppression and misery. United Heart Home of Hope was formed with exactly the same vision of self-salvation.
The development of the script of RED in 2015 was strongly directed at and dedicated to women in general and the four female performers specifically. However, in addition to using the original model ballet to engage with the decade-long social and cultural chaos initiated by the Cultural Revolution and examining the cultural products praised by the revolutionary discourse of class struggle, I wonder how RED can reflect the ways that women in today’s China face ideological orientations that are official, if different, and engage in new forms of political, social, and gender-specific struggle.
Looking Back
Act Three, “Looking Back”, aims to both show the past generation’s reminiscences onscreen and to demonstrate, through four performers’ current stories, their vibrant and tenacious presence onstage. My deepest regret is that this part could not be developed as planned due to inadequate initiatives, opportunity, budget, and rehearsal time. Since “the author is dead” and the performance text refuses further development, can only replace some of these current stories from the original script into a postscript.
Liu Zhuying could not care less if any connection exists between revolutionary model opera and guangchang wu (public square dancing). To her, the latter is neither a mobilization of mass culture in an era of depoliticization nor a cultural form of reconstruction of Maoist collectivism. She only complains that the middle-aged female dancers are not professional enough, in either spirit or technique. As a local official in charge of cultural activities, her main purpose in organizing large-scale public square-dancing activities is to maintain stability in sensitive times. This goal is best accomplished if public spaces are filled with energetic, if amateur, dancers.
Jiang Fan resigned her position as a choreographer and dancer at the Shanghai Opera House Dance Troupe in 2015 and moderately enjoys her freedom from the state-owned performing arts institutions and their suffocating leitmotif projects. She makes a living by choreographing musicals and has collaborated with Shanghai International Dance Center as an independent artist. During the creation of RED, she recognized the continuity between the revolutionary model opera of 50 years ago and today’s leitmotif works that eulogize the Party’s revolutionary history. The more artistically independent she becomes, the more she must think about how to balance the market, audience interests, and the degree to which the present can be transmitted through individualized artistic references.
Like Wu Qinghua, the female protagonist in the model ballet, Li Xinmin desperately fled her hometown (Huamulin, in rural Yunnan Province) to Kunming and then to Beijing. Since the demise of Caochangdi Workstation, when she lost her dwelling in the city, she continued to make documentary films, worked in an NGO for migrant domestic workers, sold fruit with friends, and, with her longtime artistic partner, created an autobiographical documentary theatre piece, Timeline (Fanhui de Lu). However, unlike Wu Qinghua, she made peace with her past and decided to go back to Huamulin, where she is about to get married and is expecting her first child. She still thinks The Red Detachment of Women has little to do with her life and regrets spending so much energy on RED.
We see very little of Wen Hui’s personal memories and narratives in RED. She keeps creating new pieces and touring old ones around Europe, the site of her “independence,” and conducting workshops on the body as an archive in universities all over the world. In December 2018, she commemorated the twentieth anniversary of the independent theatre and performance movement in urban China with Paper Tiger Studio Beijing (Beijing Zhilaohu Xiju Gongzuoshi) and Niao Collective at the Beijing Inside-Out Art Museum. This work functions as a physical manifesto that echoes independent artists’ ongoing rewriting of theatre and performance history in modern China. Nonetheless, even as she works with all forms of activity around the phenomenon of memorization, she chooses not to mention in public two losses of her own: That of Caochangdi Workstation and that of Wu Wenguang, her artistic and life partner.
A Nightmare
When RED was staged at the Asia Society in New York in November 2018, I moderated a pre-performance dialogue. 10 Some interview footage that was not included in the final documentary performance was shown to the audience. From this footage, I selected Ma Xiaoduo’s recollection of her nightmare:
For years, I have had the same nightmare: I am in the middle of the bridge and cannot cross it. The bridge starts crumbling, and I have to hold tight. That kind of nightmare is a reflection of repression. Sometimes I feel like I am going to screw it. I need to bring it down. I want to be freed. I feel I am being repressed. It’s like when the red light is on, you are stopped there and cannot move. Just because you are a rural woman, just because you are a woman, everyone can keep walking, but not you. I was blocked all the time. Anyone could do things, but not you. So this is a kind of battle. Whenever I listen to Marching Forward, I feel the power.
|
考点1:the Red Detachment to the Women 推荐翻译为:《红色娘子军》
考点2:Beijing Inside-Out Art Museum 必须翻译为:北京中间美术馆,不可错译为“北京798艺术空间”
考点3:Marching Forward (Xiang Qianjin) 推荐翻译为:《向前进》
考点4:Jiang Fan 推荐翻译为:江帆
考点5:ceased to exist 推荐翻译为:实体已不存在 / 已被拆除,不要直译为“停止存在”
考点6:archive 推荐翻译为:(身体性的)档案,在剧场语境中强调“身体作为档案”,不要机械译为“档案馆”或“资料”
考点7:“a living and lived archive”不可直译为“一个鲜活的档案”,推荐译为“鲜活的、亲历的记忆档案”。
考点8:“presence”不可直译为“存在”,过于抽象和字面化,可译为“形象”、“风采”或“坚韧鲜活的生命力”
考点9:“...due to inadequate initiatives...”的“initiatives”推荐译为“(创作上的)新想法、动议”,不可译为“主动性”
考点10:"Screw it”推荐译为“去他的吧!”或“我受够了!”
|
89add
|
文学艺术
|
传记
|
190
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Natural resources, pollution, and other environmental considerations are absent from the Solow model. But at least since Malthus (1798) made his classic argument, many people have believed that these considerations are critical to the possibilities for long-run economic growth. For example, the amounts of oil and other natural resources on earth are fixed. This could mean that any attempt to embark on a path of perpetually rising output will eventually deplete those resources, and must therefore fail. Similarly, the fixed supply of land may become a binding constraint on our ability to produce. Or ever-increasing output may generate an ever-increasing stock of pollution that will bring growth to a halt.
This section addresses the issue of how environmental limitations affect long-run growth. In thinking about this issue, it is important to distinguish between environmental factors for which there are well-defined property rights—notably natural resources and land—and those for which there are not—notably pollution-free air and water.
The existence of property rights for an environmental good has two important implications. The first is that markets provide valuable signals concerning how the good should be used. Suppose, for example, that the best available evidence indicates that the limited supply of oil will be an important limitation on our ability to produce in the future. This means that oil will command a high price in the future. But this in turn implies that the owners of oil do not want to sell their oil cheaply today. Thus oil commands a high price today, and so current users have an incentive to conserve. In short, evidence that the fixed amount of oil is likely to limit our ability to produce in the future would not be grounds for government intervention. Such a situation, though unfortunate, would be addressed by the market.
The second implication of the existence of property rights for an environmental good is that we can use the good’s price to obtain evidence about its importance in production. For example, since evidence that oil will be an important constraint on future production would cause it to have a high price today, economists can use the current price to infer what the best available evidence suggests about oil’s importance; they do not need to assess that evidence independently.
With environmental goods for which there are no property rights, the use of a good has externalities. For example, firms can pollute without compensating the people they harm. Thus the case for government intervention is much stronger. And there is no market price to provide a handy summary of the evidence concerning the good’s importance. As a result, economists interested in environmental issues must attempt to assess that evidence themselves.
The stock of land is fixed, and resource use must eventually fall. Thus even though technology has been able to keep ahead of resource and land limitations over the past few centuries, it may still appear that those limitations must eventually become a binding constraint on our ability to produce.
The reason that this does not occur in our model is that production is Cobb–Douglas. With Cobb–Douglas production, a given percentage change in A always produces the same percentage change in output, regardless of how large A is relative to R and T. As a result, technological progress can always counterbalance declines in R/L and T/L.
This is not a general property of production functions, however. With Cobb–Douglas production, the elasticity of substitution between inputs is 1. If this elasticity is less than 1, the share of income going to the inputs that are becoming scarcer rises over time. Intuitively, as the production function becomes more like the Leontief case, the inputs that are becoming scarcer become increasingly important. Conversely, if the elasticity of substitution is greater than 1, the share of income going to the inputs that are becoming scarcer is falling. This, too, is intuitive: as the production function becomes closer to linear, the abundant factors benefit. In terms of our earlier analysis, what this means is that if we do not restrict our attention to Cobb–Douglas production, the shares in expression (1.51) for the growth drag are no longer constant, but are functions of factor proportions. And if the elasticity of substitution is less than 1, the share of income going to resources and land is rising over time—and thus the growth drag is as well. Indeed, in this case the share of income going to the slowestgrowing input—resources—approaches 1. Thus the growth drag approaches b + n. That is, asymptotically income per worker declines at rate b + n, the rate at which resource use per worker is falling. This case supports our apocalyptic intuition: in the long run, the fixed supply of resources leads to steadily declining incomes.
In fact, however, recognizing that production may not be Cobb–Douglas should not raise our estimate of the importance of resource and land limitations, but reduce it. The reason is that the shares of income going to resources and land are falling rather than rising. We can write land’s shareas the real rental price of land multiplied by the ratio of land to output. The real rental price shows little trend, while the land-to-GDP ratio has been falling steadily. Thus land’s share has been declining. Similarly, real resource prices have had a moderate downward trend, and the ratio of resource use to GDP has also been falling. Thus resources’ share has also been declining. And declining resource and land shares imply a falling growth drag.
The fact that land’s and resources’ shares have been declining despite the fact that these factors have been becoming relatively scarcer means that the elasticity of substitution between these inputs and the others must be greater than 1. At first glance, this may seem surprising. If we think in terms of narrowly defined goods—books, for example—possibilities for substitution among inputs may not seem particularly large. But if we recognize that what people value is not particular goods but the ultimate services they provide—information storage, for example—the idea that there are often large possibilities for substitution becomes more plausible. Information can be stored not only through books, but through oral tradition, stone tablets, microfilm, videotape, DVDs, hard drives, and more. These different means of storage use capital, resources, land, and labor in very different proportions. As a result, the economy can respond to the increasing scarcity of resources and land by moving to means of information storage that use those inputs less intensively.
Declining quantities of resources and land per worker are not the only ways that environmental problems can limit growth. Production creates pollution. This pollution reduces properly measured output. That is, if our data on real output accounted for all the outputs of production at prices that reflect their impacts on utility, pollution would enter with a negative price. In addition, pollution could rise to the point where it reduces conventionally measured output. For example, global warming could reduce output through its impact on sea levels and weather patterns.
Economic theory does not give us reason to be sanguine about pollution. Because those who pollute do not bear the costs of their pollution, an unregulated market leads to excessive pollution. Similarly, there is nothing to prevent an environmental catastrophe in an unregulated market. For example, suppose there is some critical level of pollution that would result in a sudden and drastic change in climate. Because pollution’s effects are external, there is no market mechanism to prevent pollution from rising to such a level, or even a market price of a pollution-free environment to warn us that well-informed individuals believe a catastrophe is imminent.
Conceptually, the correct policy to deal with pollution is straightforward. We should estimate the dollar value of the negative externality and taxpollution by this amount. This would bring private and social costs in line, and thus would result in the socially optimal level of pollution.
Although describing the optimal policy is easy, it is still useful to know how severe the problems posed by pollution are. In terms of understanding economic growth, we would like to know by how much pollution is likely to retard growth if no corrective measures are taken. In terms of policy, we would like to know how large a pollution tax is appropriate. We would also like to know whether, if pollution taxes are politically infeasible, the benefits of cruder regulatory approaches are likely to outweigh their costs. Finally, in terms of our own behavior, we would like to know how much effort individuals who care about others’ well-being should make to curtail their activities that cause pollution.
Since there are no market prices to use as guides, economists interested in pollution must begin by looking at the scientific evidence. In the case of global warming, for example, a reasonable point estimate is that in the absence of major intervention, the average temperature will rise by 3 degrees centigrade over the next century, with various effects on climate (Nordhaus, 2008). Economists can help estimate the welfare consequences of these changes. To give just one example, experts on farming had estimated the likely impact of global warming on U.S. farmers’ ability to continue growing their current crops. These studies concluded that global warming would have a significant negative impact. Mendelsohn, Nordhaus, and Shaw (1994), however, note that farmers can respond to changing weather patterns by moving into different crops, or even switching their land use out of crops altogether. They find that once these possibilities for substitution are taken into account, the overall effect of global warming on U.S. farmers is small and may be positive (see also Deschenes and Greenstone, 2007).
After considering the various channels through which global warming is likely to affect welfare, Nordhaus (2008) concludes that a reasonable estimate is that the overall welfare effect as of 2100 is likely to be slightly negative—the equivalent of a reduction in GDP of 2 to 3 percent. This corresponds to a reduction in average annual growth of only about 0.03 percentage points. Not surprisingly, Nordhaus finds that drastic measures to combat climate change, such as policies that would largely halt further warming by cutting emissions of greenhouse gases to less than half their 1990 levels, would be much more harmful than simply doing nothing. Similarly, mainstream estimates of the social cost of carbon (that is, the size of the appropriate Pigovian tax to address the negative externalities from carbon emissions through their impact on climate), while not trivial, are only moderate. Both Greenstone, Kopits, and Wolverton (2013) and Nordhaus(2014) estimate the cost as about $20 per ton. One way of describing the size of such a tax is that it would add about $0.20 to the cost of a gallon of
gasoline.
Of course, it is possible that these attempts to interpret the scientific evidence and estimate the likely welfare effects are far from the mark. There appear to be two main considerations that could lend support to much stronger views of the costs of climate change and the value of measures to address it. The first is tail risks (or tipping points) that is, the perhaps small chance that outcomes will be vastly worse than the point estimates. Nordhaus (2013) tries to account for uncertainty and concludes that it does not greatly change his conclusions; one reason is simply that just as outcomes could be worse than his point estimates, they could also be better. Likewise, Greenstone, Kopits, and Wolverton (2013) find that there are alternative assumptions that lead to, say, a doubling of the estimated social cost of carbon, but that it is hard to make a case for estimates that are qualitatively different from their baseline. In contrast, Weitzman (2009) argues that tail risks fundamentally change the analysis of climate change and support much more dramatic policy changes.
The second important issue is the appropriate discount rate: even small changes in the discount rate have very large effects on analyses of policies that involve costs today in exchange for benefits extending decades into the future. And with a sufficiently low discount rate, impacts at horizons beyond the 50 to 100 years usually examined in analyses of climate change could have large effects on the conclusions. A good introduction to the question of how to discount the costs and benefits of actions to mitigate climate change is the debate between Nordhaus (2007) and Stern (2008). Despite these complications, the fact remains that most (though certainly not all) economists who have studied climate change seriously, even ones whose initial positions were very sympathetic with environmental concerns, have concluded that the impact of climate change on growth is likely to be no more than moderate.25
Finally, it is important to remember that climate change is not the only type of pollution. Indeed, using an approach similar to his analysis of climate change, Nordhaus (1992) estimates that the welfare costs of the externalities from other types of pollution are probably slightly larger than those from climate change; his point estimate is that they are lowering appropriately measured annual growth by roughly 0.04 percentage points. Thus, policymakers and concerned citizens should not lose sight of more conventional types of pollution.
|
Natural resources, pollution, and other environmental considerations are absent from the Solow model. But at least since Malthus (1798) made his classic argument, many people have believed that these considerations are critical to the possibilities for long-run economic growth. For example, the amounts of oil and other natural resources on earth are fixed. This could mean that any attempt to embark on a path of perpetually rising output will eventually deplete those resources, and must therefore fail. Similarly, the fixed supply of land may become a binding constraint on our ability to produce. Or ever-increasing output may generate an ever-increasing stock of pollution that will bring growth to a halt.
This section addresses the issue of how environmental limitations affect long-run growth. In thinking about this issue, it is important to distinguish between environmental factors for which there are well-defined property rights—notably natural resources and land—and those for which there are not—notably pollution-free air and water.
The existence of property rights for an environmental good has two important implications. The first is that markets provide valuable signals concerning how the good should be used. Suppose, for example, that the best available evidence indicates that the limited supply of oil will be an important limitation on our ability to produce in the future. This means that oil will command a high price in the future. But this in turn implies that the owners of oil do not want to sell their oil cheaply today. Thus oil commands a high price today, and so current users have an incentive to conserve. In short, evidence that the fixed amount of oil is likely to limit our ability to produce in the future would not be grounds for government intervention. Such a situation, though unfortunate, would be addressed by the market.
The second implication of the existence of property rights for an environmental good is that we can use the good’s price to obtain evidence about its importance in production. For example, since evidence that oil will be an important constraint on future production would cause it to have a high price today, economists can use the current price to infer what the best available evidence suggests about oil’s importance; they do not need to assess that evidence independently.
With environmental goods for which there are no property rights, the use of a good has externalities. For example, firms can pollute without compensating the people they harm. Thus the case for government intervention is much stronger. And there is no market price to provide a handy summary of the evidence concerning the good’s importance. As a result, economists interested in environmental issues must attempt to assess that evidence themselves.
The stock of land is fixed, and resource use must eventually fall. Thus even though technology has been able to keep ahead of resource and land limitations over the past few centuries, it may still appear that those limitations must eventually become a binding constraint on our ability to produce.
The reason that this does not occur in our model is that production is Cobb–Douglas. With Cobb–Douglas production, a given percentage change in A always produces the same percentage change in output, regardless of how large A is relative to R and T. As a result, technological progress can always counterbalance declines in R/L and T/L.
This is not a general property of production functions, however. With Cobb–Douglas production, the elasticity of substitution between inputs is 1. If this elasticity is less than 1, the share of income going to the inputs that are becoming scarcer rises over time. Intuitively, as the production function becomes more like the Leontief case, the inputs that are becoming scarcer become increasingly important. Conversely, if the elasticity of substitution is greater than 1, the share of income going to the inputs that are becoming scarcer is falling. This, too, is intuitive: as the production function becomes closer to linear, the abundant factors benefit. In terms of our earlier analysis, what this means is that if we do not restrict our attention to Cobb–Douglas production, the shares in expression (1.51) for the growth drag are no longer constant, but are functions of factor proportions. And if the elasticity of substitution is less than 1, the share of income going to resources and land is rising over time—and thus the growth drag is as well. Indeed, in this case the share of income going to the slowestgrowing input—resources—approaches 1. Thus the growth drag approaches b + n. That is, asymptotically income per worker declines at rate b + n, the rate at which resource use per worker is falling. This case supports our apocalyptic intuition: in the long run, the fixed supply of resources leads to steadily declining incomes.
In fact, however, recognizing that production may not be Cobb–Douglas should not raise our estimate of the importance of resource and land limitations, but reduce it. The reason is that the shares of income going to resources and land are falling rather than rising. We can write land’s shareas the real rental price of land multiplied by the ratio of land to output. The real rental price shows little trend, while the land-to-GDP ratio has been falling steadily. Thus land’s share has been declining. Similarly, real resource prices have had a moderate downward trend, and the ratio of resource use to GDP has also been falling. Thus resources’ share has also been declining. And declining resource and land shares imply a falling growth drag.
The fact that land’s and resources’ shares have been declining despite the fact that these factors have been becoming relatively scarcer means that the elasticity of substitution between these inputs and the others must be greater than 1. At first glance, this may seem surprising. If we think in terms of narrowly defined goods—books, for example—possibilities for substitution among inputs may not seem particularly large. But if we recognize that what people value is not particular goods but the ultimate services they provide—information storage, for example—the idea that there are often large possibilities for substitution becomes more plausible. Information can be stored not only through books, but through oral tradition, stone tablets, microfilm, videotape, DVDs, hard drives, and more. These different means of storage use capital, resources, land, and labor in very different proportions. As a result, the economy can respond to the increasing scarcity of resources and land by moving to means of information storage that use those inputs less intensively.
Declining quantities of resources and land per worker are not the only ways that environmental problems can limit growth. Production creates pollution. This pollution reduces properly measured output. That is, if our data on real output accounted for all the outputs of production at prices that reflect their impacts on utility, pollution would enter with a negative price. In addition, pollution could rise to the point where it reduces conventionally measured output. For example, global warming could reduce output through its impact on sea levels and weather patterns.
Economic theory does not give us reason to be sanguine about pollution. Because those who pollute do not bear the costs of their pollution, an unregulated market leads to excessive pollution. Similarly, there is nothing to prevent an environmental catastrophe in an unregulated market. For example, suppose there is some critical level of pollution that would result in a sudden and drastic change in climate. Because pollution’s effects are external, there is no market mechanism to prevent pollution from rising to such a level, or even a market price of a pollution-free environment to warn us that well-informed individuals believe a catastrophe is imminent.
Conceptually, the correct policy to deal with pollution is straightforward. We should estimate the dollar value of the negative externality and taxpollution by this amount. This would bring private and social costs in line, and thus would result in the socially optimal level of pollution.
Although describing the optimal policy is easy, it is still useful to know how severe the problems posed by pollution are. In terms of understanding economic growth, we would like to know by how much pollution is likely to retard growth if no corrective measures are taken. In terms of policy, we would like to know how large a pollution tax is appropriate. We would also like to know whether, if pollution taxes are politically infeasible, the benefits of cruder regulatory approaches are likely to outweigh their costs. Finally, in terms of our own behavior, we would like to know how much effort individuals who care about others’ well-being should make to curtail their activities that cause pollution.
Since there are no market prices to use as guides, economists interested in pollution must begin by looking at the scientific evidence. In the case of global warming, for example, a reasonable point estimate is that in the absence of major intervention, the average temperature will rise by 3 degrees centigrade over the next century, with various effects on climate (Nordhaus, 2008). Economists can help estimate the welfare consequences of these changes. To give just one example, experts on farming had estimated the likely impact of global warming on U.S. farmers’ ability to continue growing their current crops. These studies concluded that global warming would have a significant negative impact. Mendelsohn, Nordhaus, and Shaw (1994), however, note that farmers can respond to changing weather patterns by moving into different crops, or even switching their land use out of crops altogether. They find that once these possibilities for substitution are taken into account, the overall effect of global warming on U.S. farmers is small and may be positive (see also Deschenes and Greenstone, 2007).
After considering the various channels through which global warming is likely to affect welfare, Nordhaus (2008) concludes that a reasonable estimate is that the overall welfare effect as of 2100 is likely to be slightly negative—the equivalent of a reduction in GDP of 2 to 3 percent. This corresponds to a reduction in average annual growth of only about 0.03 percentage points. Not surprisingly, Nordhaus finds that drastic measures to combat climate change, such as policies that would largely halt further warming by cutting emissions of greenhouse gases to less than half their 1990 levels, would be much more harmful than simply doing nothing. Similarly, mainstream estimates of the social cost of carbon (that is, the size of the appropriate Pigovian tax to address the negative externalities from carbon emissions through their impact on climate), while not trivial, are only moderate. Both Greenstone, Kopits, and Wolverton (2013) and Nordhaus(2014) estimate the cost as about $20 per ton. One way of describing the size of such a tax is that it would add about $0.20 to the cost of a gallon of
gasoline.
Of course, it is possible that these attempts to interpret the scientific evidence and estimate the likely welfare effects are far from the mark. There appear to be two main considerations that could lend support to much stronger views of the costs of climate change and the value of measures to address it. The first is tail risks (or tipping points) that is, the perhaps small chance that outcomes will be vastly worse than the point estimates. Nordhaus (2013) tries to account for uncertainty and concludes that it does not greatly change his conclusions; one reason is simply that just as outcomes could be worse than his point estimates, they could also be better. Likewise, Greenstone, Kopits, and Wolverton (2013) find that there are alternative assumptions that lead to, say, a doubling of the estimated social cost of carbon, but that it is hard to make a case for estimates that are qualitatively different from their baseline. In contrast, Weitzman (2009) argues that tail risks fundamentally change the analysis of climate change and support much more dramatic policy changes.
The second important issue is the appropriate discount rate: even small changes in the discount rate have very large effects on analyses of policies that involve costs today in exchange for benefits extending decades into the future. And with a sufficiently low discount rate, impacts at horizons beyond the 50 to 100 years usually examined in analyses of climate change could have large effects on the conclusions. A good introduction to the question of how to discount the costs and benefits of actions to mitigate climate change is the debate between Nordhaus (2007) and Stern (2008). Despite these complications, the fact remains that most (though certainly not all) economists who have studied climate change seriously, even ones whose initial positions were very sympathetic with environmental concerns, have concluded that the impact of climate change on growth is likely to be no more than moderate.25
Finally, it is important to remember that climate change is not the only type of pollution. Indeed, using an approach similar to his analysis of climate change, Nordhaus (1992) estimates that the welfare costs of the externalities from other types of pollution are probably slightly larger than those from climate change; his point estimate is that they are lowering appropriately measured annual growth by roughly 0.04 percentage points. Thus, policymakers and concerned citizens should not lose sight of more conventional types of pollution.
|
考点1:"narrowly defined goods“推荐译为“狭义的产品“。
考点2:“pollution’s effects are external”应译为“污染的影响是外生的”,”外生性“是经济学模型中常见概念,此处应准确翻译。
考点3:“ tipping points”推荐译为“临界点理论“。
考点4: "apocalyptic intuition"推荐译为“末世直觉”
考点5: "sympathetic with environmental concerns"中的“sympathetic”不能译为“同情”
|
8aaad
|
学术论文
|
社会科学
|
165
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
5.2.4 Change control
The scope of change control is defined by each organization. It will typically include all IT infrastructure, applications, documentation, processes, supplier relationships, and anything else that might directly or indirectly impact a product or service.
It is important to distinguish change control from organizational change management. Organizational change management manages the people aspects of changes to ensure that improvements and organizational transformation initiatives are implemented successfully. Change control is usually focused on changes in products and services.
Change control must balance the need to make beneficial changes that will deliver additional value with the need to protect customers and users from the adverse effect of changes. All changes should be assessed by people who are able to understand the risks and the expected benefits; the changes must then be authorized before they are deployed. This assessment, however, should not introduce unnecessary delay.
The person or group who authorizes a change is known as a change authority. It is essential that the correct change authority is assigned to each type of change to ensure that change control is both efficient and effective. In high-velocity organizations, it is a common practice to decentralize change approval, making the peer review a top predictor of high performance.
There are three types of change that are each managed in different ways:
•Standard changes These are low-risk, pre-authorized changes that are well understood and fully documented, and can be implemented without needing additional authorization. They are often initiated as service requests, but may also be operational changes. When the procedure for a standard change is created or modified, there should be a full risk assessment and authorization as for any other change. This risk assessment does not need to be repeated each time the standard change is implemented; it only needs to be done if there is a modification to the way it is carried out.
•Normal changes These are changes that need to be scheduled, assessed, and authorized following a process. Change models based on the type of change determine the roles for assessment and authorization. Some normal changes are low risk, and the change authority for these is usually someone who can make rapid decisions, often using automation to speed up the change. Other normal changes are very major and the change authority could be as high as the management board (or equivalent). Initiation of a normal change is triggered by the creation of a change request. This may be created manually, but organizations that have an automated pipeline for continuous integration and continuous deployment often automate most steps of the change control process.
• Emergency changes These are changes that must be implemented as soon as possible; for example, to resolve an incident or implement a security patch.
Emergency changes are not typically included in a change schedule, and the process for assessment and authorization is expedited to ensure they can be implemented quickly. As far as possible, emergency changes should be subject to the same testing, assessment, and authorization as normal changes, but it may be acceptable to defer some documentation until after the change has been implemented, and sometimes it will be necessary to implement the change with less testing due to time constraints. There may also be a separate change authority for emergency changes, typically including a small number of senior managers who understand the business risks involved.
The change schedule is used to help plan changes, assist in communication, avoid conflicts, and assign resources. It can also be used after changes have been deployed to provide information needed for incident management, problem management, and improvement planning. Regardless of who the change authority is, they may need to communicate widely across the organization. Risk assessment, for instance, may require them to gather input from many people with specialist knowledge. Additionally, there is usually a need to communicate information about the change to ensure people are fully prepared before the change is deployed.
Figure 5.19 shows the contribution of change control to the service value chain, with the practice being involved in all value chain activities:
• Plan Changes to product and service portfolios, policies, and practices all require a certain level of control, and the change control practice is used to provide it.
• Improve Many improvements will require changes to be made, and these should be assessed and authorized in the same way as all other changes.
• Engage Customers and users may need to be consulted or informed about changes, depending on the nature of the change.
• Design and transition Many changes are initiated as a result of new or changed services. Change control activity is a major contributor to transition.
• Obtain/build Changes to components are subject to change control, whether they are built in house or obtained from suppliers.
• Deliver and support Changes may have an impact on delivery and support, and information about changes must be communicated to personnel who carry out this value chain activity. These people may also play a part in assessing and authorizing changes.
Figure 5.19 Heat map of the contribution of change control to value chain activities
The IT IL story: Change control
Henri: The car hire market is developingfaster than ever. To make sure that Axle meets customer demands and capitalizes on opportunities, we need to have speed–to–market and to experiment with new ideas. Our new service
oferings will see a lot of change at Axle. Some teams will need to double, while others may reduce. We need to bring everyone at Axle on board.
Radhika: The change control practice at Axle makes sure that our services achieve the right balance of flexibility and reliability.
Marco: Some of our processes are highly automated and designedfor the fast deployment of changes. These are perfectfor changes to our booking app and some of our lT systems.
Su: ln other cases, such as when we update our vehicles, we use a mix of
manual and automated testing. For example, the Axle Aware road monitoring and safety system requires consultation and approval before we can update it.
Marco: Systems such as Axle Aware can’t be altered like the booking app. The priorityfor those changes is that we act safely and comply with appropriate regulations. That’s more important than time to market.
5.2.5 Incident management
Key message
The purpose of the incident management practice is to minimize the negative impact of incidents by restoring normal service operation as quickly as possible.
Incident management can have an enormous impact on customer and user satisfaction, and on how customers and users perceive the service provider. Every incident should be logged and managed to ensure that it is resolved in a time that meets the expectations of the customer and user. Target resolution times are agreed, documented, and communicated to ensure that expectations are realistic. Incidents are prioritized based on an agreed classification to ensure that incidents with the highest business impact are resolved first.
Organizations should design their incident management practice to provide appropriate management and resource allocation to different types of incident.
Incidents with a low impact must be managed efficiently to ensure that they do not consume too many resources. Incidents with a larger impact may require more resources and more complex management. There are usually separate processes for managing major incidents, and for managing information security incidents.
Information about incidents should be stored in incident records in a suitable tool. Ideally, this tool should also provide links to related CIs, changes, problems, known errors, and other knowledge to enable quick and efficient diagnosis and recovery. Modern IT service management tools can provide automated matching of incidents to other incidents, problems, or known errors, and can even provide intelligent analysis of incident data to generate recommendations for helping with future incidents.
It is important that people working on an incident provide good-quality updates in a timely fashion. These updates should include information about symptoms, business impact, CIs affected, actions completed, and actions planned. Each of these should have a timestamp and information about the people involved, so that the people involved or interested can be kept informed. There may also be a need for good collaboration tools so that people working on an incident can collaborate effectively.
Incidents may be diagnosed and resolved by people in many different groups, depending on the complexity of the issue or the incident type. All of these groups need to understand the incident management process, and how their contribution to this helps to manage the value, outcomes, costs, and risks of t he services provided:
• Some incidents will be resolved by the users themselves, using self-help. Use of specific self-help records should be captured for use in measurement and improvement activities.
• Some incidents will be resolved by the service desk.
• More complex incidents will usually be escalated to a support team for resolution. Typically, the routing is based on the incident category, which should help to identify the correct team.
• Incidents can be escalated to suppliers or partners, who offer support for their products and services.
• The most complex incidents, and all major incidents, often require a temporary team to work together to identify the resolution. This team may include representatives of many stakeholders, including the service provider, suppliers, users, etc.
• In some extreme cases, disaster recovery plans may be invoked to resolve an incident. Disaster recovery is described in the service continuity management practice (section 5.2.12).
Effective incident management often requires a high level of collaboration within and between teams. These teams may include the service desk, technical support, application support, and vendors. Collaboration can facilitate information-sharing and learning, as well as helping to solve the incident more efficiently and effectively.
Third-party products and services that are used as components of a service require support agreements which align the obligations of the supplier with the commitments made by the service provider to customers. Incident management may require frequent interaction with these suppliers, and routine management of this aspect of supplier contracts is often part of the incident management practice. A supplier can also act as a service desk, logging and managing all incidents and escalating them to subject matter experts or other parties as required.
There should be a formal process for logging and managing incidents. This process does not usually include detailed procedures for how to diagnose, investigate, and resolve incidents, but can provide techniques for making investigation and diagnosis more efficient. There may be scripts for collecting information from users during initial contact, and this may lead directly to diagnosis and resolution of simple incidents. Investigation of more complicated incidents often requires knowledge and expertise, rather than procedural steps.
Dealing with incidents is possible in every value chain activity, though t he most visible (due to effect on users) are incidents in an operational environment.
Figure 5.20 shows the contribution of incident management to the service value chain, with the practice being applied mainly to the engage, and deliver and support value chain activities. Except for plan, other activities may use information about
incidents to help set priorities:
• Improve Incident records are a key input to improvement activities, and are prioritized both in terms of incident frequency and severity.
• Engage Incidents are visible to users, and significant incidents are also visible to customers. Good incident management requires regular communication to understand the issues, set expectations, provide status updates, and agree that the issue has been resolved so the incident can be closed.
• Design and transition Incidents may occur in test environments, as well as during service release and deployment. The practice ensures these incidents are resolved in a timely and controlled manner.
• Obtain/build Incidents may occur in development environments. Incident management practice ensures these incidents are resolved in a timely and controlled manner.
• Deliver and support Incident management makes a significant contribution to support. This value chain activity includes resolving incidents and problems.
Figure 5.20 Heat map of the contribution of incident management to value chain activities
The IT IL story: Axle’s incident management
Radhika: Axle faces many potential IT and non-IT incidents. Cars can break down, road accidents might occur, or our customers mightface challenges with unfamiliar road rules.
Marco: A car booking can be a fected by an error in our app, or by a user getting lost due to a navigation error with our software. When incidents occur, we have to be ready to restore normal services as soon as possible. We also have to make sure our team knows how and when to switchfrom pre-defined recovery procedures to swarming and collective analysis.
Radhika: We also make sure that such cases are followed by investigation and improvements.
Henri: Axle has developed clear processes for all types of incidents, with workarounds available for cases that happen frequently, such as a tyre puncture or loss of internet connectivity.
Radhika: Our teams work together with our suppliers and partners to ensure fast and efective incident response. We develop and test recovery procedures together with the partners involved in any incidents we experience.
|
5.2.4 Change control
The scope of change control is defined by each organization. It will typically include all IT infrastructure, applications, documentation, processes, supplier relationships, and anything else that might directly or indirectly impact a product or service.
It is important to distinguish change control from organizational change management. Organizational change management manages the people aspects of changes to ensure that improvements and organizational transformation initiatives are implemented successfully. Change control is usually focused on changes in products and services.
Change control must balance the need to make beneficial changes that will deliver additional value with the need to protect customers and users from the adverse effect of changes. All changes should be assessed by people who are able to understand the risks and the expected benefits; the changes must then be authorized before they are deployed. This assessment, however, should not introduce unnecessary delay.
The person or group who authorizes a change is known as a change authority. It is essential that the correct change authority is assigned to each type of change to ensure that change control is both efficient and effective. In high-velocity organizations, it is a common practice to decentralize change approval, making the peer review a top predictor of high performance.
There are three types of change that are each managed in different ways:
•Standard changes These are low-risk, pre-authorized changes that are well understood and fully documented, and can be implemented without needing additional authorization. They are often initiated as service requests, but may also be operational changes. When the procedure for a standard change is created or modified, there should be a full risk assessment and authorization as for any other change. This risk assessment does not need to be repeated each time the standard change is implemented; it only needs to be done if there is a modification to the way it is carried out.
•Normal changes These are changes that need to be scheduled, assessed, and authorized following a process. Change models based on the type of change determine the roles for assessment and authorization. Some normal changes are low risk, and the change authority for these is usually someone who can make rapid decisions, often using automation to speed up the change. Other normal changes are very major and the change authority could be as high as the management board (or equivalent). Initiation of a normal change is triggered by the creation of a change request. This may be created manually, but organizations that have an automated pipeline for continuous integration and continuous deployment often automate most steps of the change control process.
• Emergency changes These are changes that must be implemented as soon as possible; for example, to resolve an incident or implement a security patch.
Emergency changes are not typically included in a change schedule, and the process for assessment and authorization is expedited to ensure they can be implemented quickly. As far as possible, emergency changes should be subject to the same testing, assessment, and authorization as normal changes, but it may be acceptable to defer some documentation until after the change has been implemented, and sometimes it will be necessary to implement the change with less testing due to time constraints. There may also be a separate change authority for emergency changes, typically including a small number of senior managers who understand the business risks involved.
The change schedule is used to help plan changes, assist in communication, avoid conflicts, and assign resources. It can also be used after changes have been deployed to provide information needed for incident management, problem management, and improvement planning. Regardless of who the change authority is, they may need to communicate widely across the organization. Risk assessment, for instance, may require them to gather input from many people with specialist knowledge. Additionally, there is usually a need to communicate information about the change to ensure people are fully prepared before the change is deployed.
Figure 5.19 shows the contribution of change control to the service value chain, with the practice being involved in all value chain activities:
• Plan Changes to product and service portfolios, policies, and practices all require a certain level of control, and the change control practice is used to provide it.
• Improve Many improvements will require changes to be made, and these should be assessed and authorized in the same way as all other changes.
• Engage Customers and users may need to be consulted or informed about changes, depending on the nature of the change.
• Design and transition Many changes are initiated as a result of new or changed services. Change control activity is a major contributor to transition.
• Obtain/build Changes to components are subject to change control, whether they are built in house or obtained from suppliers.
• Deliver and support Changes may have an impact on delivery and support, and information about changes must be communicated to personnel who carry out this value chain activity. These people may also play a part in assessing and authorizing changes.
Figure 5.19 Heat map of the contribution of change control to value chain activities
The IT IL story: Change control
Henri: The car hire market is developingfaster than ever. To make sure that Axle meets customer demands and capitalizes on opportunities, we need to have speed–to–market and to experiment with new ideas. Our new service
oferings will see a lot of change at Axle. Some teams will need to double, while others may reduce. We need to bring everyone at Axle on board.
Radhika: The change control practice at Axle makes sure that our services achieve the right balance of flexibility and reliability.
Marco: Some of our processes are highly automated and designedfor the fast deployment of changes. These are perfectfor changes to our booking app and some of our lT systems.
Su: ln other cases, such as when we update our vehicles, we use a mix of
manual and automated testing. For example, the Axle Aware road monitoring and safety system requires consultation and approval before we can update it.
Marco: Systems such as Axle Aware can’t be altered like the booking app. The priorityfor those changes is that we act safely and comply with appropriate regulations. That’s more important than time to market.
5.2.5 Incident management
Key message
The purpose of the incident management practice is to minimize the negative impact of incidents by restoring normal service operation as quickly as possible.
Incident management can have an enormous impact on customer and user satisfaction, and on how customers and users perceive the service provider. Every incident should be logged and managed to ensure that it is resolved in a time that meets the expectations of the customer and user. Target resolution times are agreed, documented, and communicated to ensure that expectations are realistic. Incidents are prioritized based on an agreed classification to ensure that incidents with the highest business impact are resolved first.
Organizations should design their incident management practice to provide appropriate management and resource allocation to different types of incident.
Incidents with a low impact must be managed efficiently to ensure that they do not consume too many resources. Incidents with a larger impact may require more resources and more complex management. There are usually separate processes for managing major incidents, and for managing information security incidents.
Information about incidents should be stored in incident records in a suitable tool. Ideally, this tool should also provide links to related CIs, changes, problems, known errors, and other knowledge to enable quick and efficient diagnosis and recovery. Modern IT service management tools can provide automated matching of incidents to other incidents, problems, or known errors, and can even provide intelligent analysis of incident data to generate recommendations for helping with future incidents.
It is important that people working on an incident provide good-quality updates in a timely fashion. These updates should include information about symptoms, business impact, CIs affected, actions completed, and actions planned. Each of these should have a timestamp and information about the people involved, so that the people involved or interested can be kept informed. There may also be a need for good collaboration tools so that people working on an incident can collaborate effectively.
Incidents may be diagnosed and resolved by people in many different groups, depending on the complexity of the issue or the incident type. All of these groups need to understand the incident management process, and how their contribution to this helps to manage the value, outcomes, costs, and risks of t he services provided:
• Some incidents will be resolved by the users themselves, using self-help. Use of specific self-help records should be captured for use in measurement and improvement activities.
• Some incidents will be resolved by the service desk.
• More complex incidents will usually be escalated to a support team for resolution. Typically, the routing is based on the incident category, which should help to identify the correct team.
• Incidents can be escalated to suppliers or partners, who offer support for their products and services.
• The most complex incidents, and all major incidents, often require a temporary team to work together to identify the resolution. This team may include representatives of many stakeholders, including the service provider, suppliers, users, etc.
• In some extreme cases, disaster recovery plans may be invoked to resolve an incident. Disaster recovery is described in the service continuity management practice (section 5.2.12).
Effective incident management often requires a high level of collaboration within and between teams. These teams may include the service desk, technical support, application support, and vendors. Collaboration can facilitate information-sharing and learning, as well as helping to solve the incident more efficiently and effectively.
Third-party products and services that are used as components of a service require support agreements which align the obligations of the supplier with the commitments made by the service provider to customers. Incident management may require frequent interaction with these suppliers, and routine management of this aspect of supplier contracts is often part of the incident management practice. A supplier can also act as a service desk, logging and managing all incidents and escalating them to subject matter experts or other parties as required.
There should be a formal process for logging and managing incidents. This process does not usually include detailed procedures for how to diagnose, investigate, and resolve incidents, but can provide techniques for making investigation and diagnosis more efficient. There may be scripts for collecting information from users during initial contact, and this may lead directly to diagnosis and resolution of simple incidents. Investigation of more complicated incidents often requires knowledge and expertise, rather than procedural steps.
Dealing with incidents is possible in every value chain activity, though t he most visible (due to effect on users) are incidents in an operational environment.
Figure 5.20 shows the contribution of incident management to the service value chain, with the practice being applied mainly to the engage, and deliver and support value chain activities. Except for plan, other activities may use information about
incidents to help set priorities:
• Improve Incident records are a key input to improvement activities, and are prioritized both in terms of incident frequency and severity.
• Engage Incidents are visible to users, and significant incidents are also visible to customers. Good incident management requires regular communication to understand the issues, set expectations, provide status updates, and agree that the issue has been resolved so the incident can be closed.
• Design and transition Incidents may occur in test environments, as well as during service release and deployment. The practice ensures these incidents are resolved in a timely and controlled manner.
• Obtain/build Incidents may occur in development environments. Incident management practice ensures these incidents are resolved in a timely and controlled manner.
• Deliver and support Incident management makes a significant contribution to support. This value chain activity includes resolving incidents and problems.
Figure 5.20 Heat map of the contribution of incident management to value chain activities
The IT IL story: Axle’s incident management
Radhika: Axle faces many potential IT and non-IT incidents. Cars can break down, road accidents might occur, or our customers mightface challenges with unfamiliar road rules.
Marco: A car booking can be a fected by an error in our app, or by a user getting lost due to a navigation error with our software. When incidents occur, we have to be ready to restore normal services as soon as possible. We also have to make sure our team knows how and when to switchfrom pre-defined recovery procedures to swarming and collective analysis.
Radhika: We also make sure that such cases are followed by investigation and improvements.
Henri: Axle has developed clear processes for all types of incidents, with workarounds available for cases that happen frequently, such as a tyre puncture or loss of internet connectivity.
Radhika: Our teams work together with our suppliers and partners to ensure fast and efective incident response. We develop and test recovery procedures together with the partners involved in any incidents we experience.
|
考点1:“IT infrastructure”推荐译为“IT基础架构”
考点2:“able to understand the risks and the expected benefits”必须译为“有能力理解风险和预期收益”,避免缩小为特定人群。
考点3:“a major contributor”必须译为“主要贡献者”,避免夸大为“核心”。
考点4:“based on an agreed classification”必须译为“根据商定的分类确定优先级”,不可省略“分类”。
考点5:“outcomes”必须译为“成果”,不可漏译。
考点6:“escalated to”必须译为“升级至”,避免泛化为“参与”。
考点7:“well understood and fully documented”必须译为“充分理解并完整记录”,避免限定为“流程”。
考点8:“specialist knowledge”必须译为“专业知识”,避免译为“专业人士的意见”。
|
8cf6b
|
学术论文
|
自然科学
|
113
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
最后贷款人制度的目的是什么?长期以来理论和实践中有两种不同的目的之争:第一种被称为货币主义学派,即最后贷款人立法目标在于通过流动性的注入实现币值长期稳定的目标;第二种被称为金融稳定主义学派,即央行提供流动性支持是为了避免个别金融机构严重的流动性困境引发的系统性风险,从而损害金融稳定。从时间上看,英国的模式更加偏重于金融稳定,而美国的模式则更加偏重于货币政策。
1. 货币主义学派
货币主义学派认为,最后贷款人制度的功能是向金融体系注入基础货币,从而抵消银行和批发货币市场的流动性撤出,并防止通货紧缩压力的积累。从这一角度而言,最后贷款人制度虽然是针对微观的机构进行的,但其实是货币政策在微观层面上的体现而已。如果将最后贷款人制度作为货币政策的下位概念,则最后贷款人制度的适用和限制等均应与货币政策所要追求的币值稳定的制度目的相挂钩。那么就需要从金融市场整体甚至更加长远的货币政策的影响来考虑最后贷款人制度的适用,而不是根据单个金融机构的情况进行判断。诚如有学者所概括的以货币主义视角来设计最后贷款人制度会产生两个重要的假设:“第一个假设是,即使在危机最严重的时候,批发货币市场也将继续有效地将资金分配给信誉良好的机构。因此,如果一个机构无法在货币市场上获得资金,货币主义者会将其解释为有关机构从根本上资不抵债的证据。第二个假设是,一家或多家金融机构的倒闭不会引发更广泛的不稳定,而这种不稳定本身可能会引发或加剧货币供应量的收缩,或扰乱对实体经济的信贷供应。”
货币主义是一种长期视角,认为个别金融机构的危机包括退出市场并不会从长远上影响整个市场,因为幸存的金融机构将会吸收失败的金融机构的业务,从而使市场上金融服务的供给在长期视角下达到均衡。货币主义学派的核心原则之一是,从根本上讲,有偿付能力的银行将始终能在批发货币市场中获得资金。货币主义学派认为应通过中央银行的正常公开市场操作为整个货币市场提供流动性支持。同时,货币主义学派认为能够申请最后贷款人流动支持的适格主体应当限于吸收存款的金融机构,因为这些金融机构构成了货币的主要供给者。传统理论认为,美联储是货币主义最后贷款人的典型,美联储“通过中央银行提供紧急流动性支持,防止暂时流动性危机向清偿危机和系统性危机转化,使陷入困境的银行走出困境”。美联储提供紧急贷款的主体一般是银行金融机构。但是,2008年国际金融危机之前,美国《联邦储备法》第13(3)条赋予了美联储在非常情况下向非银行实体提供紧急贷款的权利,即“在特殊且紧急的情况下,美联储可以向任何个体、合伙企业或公司提供贷款”。此处的“特殊并且紧急”指的是贷款无法从金融市场上获得。为了获得这些紧急贷款,借款人必须提供充足的担保品,确保贷款的安全性。美国《联邦储备法》第13(3)条特别强调了在金融体系面临系统性风险时,美联储可以使用这一权力来稳定市场,防止金融危机的蔓延。这使得美联储在应对金融危机时具有更大的灵活性和操作空间。但是,2008年国际金融危机中美联储用第13(3)条对非银行金融机构发放贷款以提供流动性支持被认为加剧了道德风险,因此《多德-弗兰克法案》第1101条限制美联储利用第13(3)条的权利向特定的非银行金融机构发放贷款,除非该机构仅限于作为“具有广泛资格的计划或设施”的一部分,或者满足第806条的例外,即在“不寻常或紧急情况下”向清算所和其他指定的金融市场公用事业公司提供信贷或流动性援助;该法案第716条还禁止美联储向衍生品交易商或这些计划或设施范围之外的其他主要交易对手提供任何援助。
2. 金融稳定主义学派
金融稳定主义学派则将最后贷款人制度视为为单个金融机构提供流动性的“保险”制度,由于银行资产负债表固有的脆弱性,保险是必要的。金融稳定是一个宏观概念,它要求金融体系的三个组成部分——金融机构(商业银行、政策性银行、金融资产管理公司及证券公司等)、金融市场(股票、债券、货币和衍生品市场等)和金融基础设施(法律、支付、清算和会计体系等)都能正常运转,并能够正确评估、防范和化解金融风险。
根据金融脆弱性理论,银行等金融机构天生具有脆弱性,因为这些金融机构往往会借短投长,这使得他们资产缺乏足够的流动性,一旦短期债权人对金融机构的稳定性产生怀疑,他们就会竞相挤兑这些金融机构,迫使金融机构火线出售(低价出售)银行的资产,从而导致其后的债权人无法得到足额清偿;对无法得到足额清偿的恐惧,将迫使更多的债权人一旦有任何风吹草动,就竞相挤兑金融机构。现代金融机构业务的复杂性使得金融机构及其短期债权人资金的信息不对称更加明显,从而使得金融机构更容易被这些短期债权人挤兑。无论是货币主义的观点抑或金融稳定的观点都会承认,由于金融系统的脆弱性和挤兑的风险,最后贷款人制度是不可或缺的。
对于金融稳定主义学派的支持者来说,银行倒闭引发了两个重要风险。第一个风险是,银行的倒闭可能会破坏其对债权人的偿付能力,破坏其他金融机构的稳定性或支付系统的平稳高效运行;第二个风险是,一家或多家银行的倒闭可能会阻碍为实体经济提供信贷和其他金融服务。金融稳定主义者认为,央行的最后贷款人机制应当通过贴现窗口进行,是在对被贴现机构审慎监管的基础上进行的。贴现窗口贷款的有效性取决于央行是否获取有关潜在被贴现者信誉的详细信息,以及已发布的抵押品的质量。从金融稳定主义的视角看,中央银行的最后贷款人制度不仅应当覆盖传统的存款类金融机构,也应当广义包括那些因为机构的倒闭可能引起金融系统不稳定的影子银行体系。当然,把最后贷款人机制用于吸收公众存款以外的金融机构可能会面临识别的问题:即如何精确识别哪些金融机构的倒闭会引发系统性金融风险,从而避免最后贷款人援助制度的滥用引发的道德风险。
|
最后贷款人制度的目的是什么?长期以来理论和实践中有两种不同的目的之争:第一种被称为货币主义学派,即最后贷款人立法目标在于通过流动性的注入实现币值长期稳定的目标;第二种被称为金融稳定主义学派,即央行提供流动性支持是为了避免个别金融机构严重的流动性困境引发的系统性风险,从而损害金融稳定。从时间上看,英国的模式更加偏重于金融稳定,而美国的模式则更加偏重于货币政策。
1. 货币主义学派
货币主义学派认为,最后贷款人制度的功能是向金融体系注入基础货币,从而抵消银行和批发货币市场的流动性撤出,并防止通货紧缩压力的积累。从这一角度而言,最后贷款人制度虽然是针对微观的机构进行的,但其实是货币政策在微观层面上的体现而已。如果将最后贷款人制度作为货币政策的下位概念,则最后贷款人制度的适用和限制等均应与货币政策所要追求的币值稳定的制度目的相挂钩。那么就需要从金融市场整体甚至更加长远的货币政策的影响来考虑最后贷款人制度的适用,而不是根据单个金融机构的情况进行判断。诚如有学者所概括的以货币主义视角来设计最后贷款人制度会产生两个重要的假设:“第一个假设是,即使在危机最严重的时候,批发货币市场也将继续有效地将资金分配给信誉良好的机构。因此,如果一个机构无法在货币市场上获得资金,货币主义者会将其解释为有关机构从根本上资不抵债的证据。第二个假设是,一家或多家金融机构的倒闭不会引发更广泛的不稳定,而这种不稳定本身可能会引发或加剧货币供应量的收缩,或扰乱对实体经济的信贷供应。”
货币主义是一种长期视角,认为个别金融机构的危机包括退出市场并不会从长远上影响整个市场,因为幸存的金融机构将会吸收失败的金融机构的业务,从而使市场上金融服务的供给在长期视角下达到均衡。货币主义学派的核心原则之一是,从根本上讲,有偿付能力的银行将始终能在批发货币市场中获得资金。货币主义学派认为应通过中央银行的正常公开市场操作为整个货币市场提供流动性支持。同时,货币主义学派认为能够申请最后贷款人流动支持的适格主体应当限于吸收存款的金融机构,因为这些金融机构构成了货币的主要供给者。传统理论认为,美联储是货币主义最后贷款人的典型,美联储“通过中央银行提供紧急流动性支持,防止暂时流动性危机向清偿危机和系统性危机转化,使陷入困境的银行走出困境”。美联储提供紧急贷款的主体一般是银行金融机构。但是,2008年国际金融危机之前,美国《联邦储备法》第13(3)条赋予了美联储在非常情况下向非银行实体提供紧急贷款的权利,即“在特殊且紧急的情况下,美联储可以向任何个体、合伙企业或公司提供贷款”。此处的“特殊并且紧急”指的是贷款无法从金融市场上获得。为了获得这些紧急贷款,借款人必须提供充足的担保品,确保贷款的安全性。美国《联邦储备法》第13(3)条特别强调了在金融体系面临系统性风险时,美联储可以使用这一权力来稳定市场,防止金融危机的蔓延。这使得美联储在应对金融危机时具有更大的灵活性和操作空间。但是,2008年国际金融危机中美联储用第13(3)条对非银行金融机构发放贷款以提供流动性支持被认为加剧了道德风险,因此《多德-弗兰克法案》第1101条限制美联储利用第13(3)条的权利向特定的非银行金融机构发放贷款,除非该机构仅限于作为“具有广泛资格的计划或设施”的一部分,或者满足第806条的例外,即在“不寻常或紧急情况下”向清算所和其他指定的金融市场公用事业公司提供信贷或流动性援助;该法案第716条还禁止美联储向衍生品交易商或这些计划或设施范围之外的其他主要交易对手提供任何援助。
2. 金融稳定主义学派
金融稳定主义学派则将最后贷款人制度视为为单个金融机构提供流动性的“保险”制度,由于银行资产负债表固有的脆弱性,保险是必要的。金融稳定是一个宏观概念,它要求金融体系的三个组成部分——金融机构(商业银行、政策性银行、金融资产管理公司及证券公司等)、金融市场(股票、债券、货币和衍生品市场等)和金融基础设施(法律、支付、清算和会计体系等)都能正常运转,并能够正确评估、防范和化解金融风险。
根据金融脆弱性理论,银行等金融机构天生具有脆弱性,因为这些金融机构往往会借短投长,这使得他们资产缺乏足够的流动性,一旦短期债权人对金融机构的稳定性产生怀疑,他们就会竞相挤兑这些金融机构,迫使金融机构火线出售(低价出售)银行的资产,从而导致其后的债权人无法得到足额清偿;对无法得到足额清偿的恐惧,将迫使更多的债权人一旦有任何风吹草动,就竞相挤兑金融机构。现代金融机构业务的复杂性使得金融机构及其短期债权人资金的信息不对称更加明显,从而使得金融机构更容易被这些短期债权人挤兑。无论是货币主义的观点抑或金融稳定的观点都会承认,由于金融系统的脆弱性和挤兑的风险,最后贷款人制度是不可或缺的。
对于金融稳定主义学派的支持者来说,银行倒闭引发了两个重要风险。第一个风险是,银行的倒闭可能会破坏其对债权人的偿付能力,破坏其他金融机构的稳定性或支付系统的平稳高效运行;第二个风险是,一家或多家银行的倒闭可能会阻碍为实体经济提供信贷和其他金融服务。金融稳定主义者认为,央行的最后贷款人机制应当通过贴现窗口进行,是在对被贴现机构审慎监管的基础上进行的。贴现窗口贷款的有效性取决于央行是否获取有关潜在被贴现者信誉的详细信息,以及已发布的抵押品的质量。从金融稳定主义的视角看,中央银行的最后贷款人制度不仅应当覆盖传统的存款类金融机构,也应当广义包括那些因为机构的倒闭可能引起金融系统不稳定的影子银行体系。当然,把最后贷款人机制用于吸收公众存款以外的金融机构可能会面临识别的问题:即如何精确识别哪些金融机构的倒闭会引发系统性金融风险,从而避免最后贷款人援助制度的滥用引发的道德风险。
|
考点1:“信誉良好”推荐译为“Creditworthy,Reputable”考点2:“影子银行体系”应译为“the shadow banking system”
|
8e2cf
|
学术论文
|
社会科学
|
153
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
A. Use a tailored definition of pedagogy in pedagogical research and reform.
Despite widespread use of the term “pedagogy,” there is no consensus on what the term means in practice. Some see pedagogy as a purely technical activity and describe it as “the science of teaching.” Others focus on how sociocultural elements such as culture, local education ecosystems, and learning theories influence pedagogical choices. And others propose some combination of these definitions (Alexander, 2009; Bremner, 2021). “Pedagogy” is ambiguous partly because the purposes of education vary and because ways of teaching and learning are contested topics (Burde, 2014; Qargha, 2022). This section explores how various individuals and entities define “pedagogy” and highlights the importance of considering Invisible Pedagogical Mindsets when defining “pedagogy” in local contexts.
1. Understand that there is no single definition for “pedagogy.”
“Pedagogy” is a complex term, and its meaning varies based on political, historical, or social factors in local contexts. Although many cultures value good teaching practice, the modern use of the term “pedagogy” to describe teaching and learning is predominantly a Western phenomenon. Dating back to the 16th century, the term has been adopted by non-Western localities or transferred from the outside by international actors (Loughran, 1999; Rizvi, 2009; Schweisfurth, 2013; Steiner-Khamsi & Waldow, 2012). The term “pedagogy” is more common in French-, German-, Russian-, and Spanish-speaking communities than in English-speaking ones (Hamilton, 2009). “Pedagogy” has been used to describe various concepts, including the place, practice, system, science, art, and principles of education and teaching. For instance,
the Oxford English Dictionary defines “pedagogy” as a place of instruction (such as a school, college, or university), a system of introductory training, and a means of guidance.
Linguistic Definitions of “Pedagogy”
“the science of teaching” (Oxford Shorter English Dictionary, 1993)
“the art, science, or profession of teaching” (Merriam Webster Dictionary)
“the function or work of a teacher” (dictionary.com)
“the study of teaching methods” (Oxford Learners Dictionary, 2023)
In academic literature, the term “pedagogy” encompasses the visible aspects of teaching and learning, like teaching methods, interactions between teachers and students, the learning environment, and the curriculum, as well as the invisible theories, values, knowledge, attitudes, experiences, and research that influence classroom practice (Alexander, 2009; Moyles et al., 2002; Shah & Campus, 2020; Siraj-Blatchford et al., 2002). Academics also use the term “pedagogy” to describe interactions in diverse fields, such as health, fitness, gender, literature, management, cultural studies, and media studies (Loughran, 1999; Marton & Booth, 1997).
Ministries of education and international development organizations also have varied definitions of “pedagogy.” For instance, the Victoria State Department of Education and Training in Australia focuses on instructional methods and sees “pedagogy” as the methods or principles of teaching (Department of Education and Training, 2018). A USAID report defines “pedagogy” as strategies and techniques supporting development and learning (Bub, 2022). Without explicitly defining “pedagogy,” the World Bank emphasizes the importance of pedagogy for teachers’ professional development and advocates for specific interventions, such as structured pedagogy (Global Education Evidence Advisory Panel, 2023). An OECD working paper defines “pedagogy” as repeated patterns or sets of teaching and learning practices that shape interactions between teachers and learners (Peterson et al., 2018). The term “innovative pedagogies” emerged in the last two decades to refer to pedagogical approaches that aim to significantly improve learning outcomes by creating transformative shifts in teaching and learning, described as leapfrogging (Istance & Paniagua, 2019). According to recent literature, two main characteristics make a pedagogy innovative: a) intentionally planned practices to enhance student learning, and b) a departure from common pedagogical approaches in a specific context (Averill & Major, 2020; Kukulska-Hulme et al., 2020). Therefore, any intentional changes to classroom practice that aim to improve student learning in a local context can be considered an “innovative pedagogy.” However, no single practice is universally “innovative.” An “innovative” practice in one local context might be common practice in another. In Working Paper II, we discuss student-centered pedagogies as a leading example of innovative pedagogies in practice. We recommend a working definition for pedagogy as a starting point for discussion in local contexts to overcome the lack of consensus on a universal definition for the term.
2. Consider local culture, education ecosystems, and learning theories when defining pedagogy.
In attempting to define pedagogy, we draw from work by education scholar Robin Alexander, who emphasized the impact of culture and local context on pedagogical choices. Alexander (2009) defines “pedagogy” as “the act of teaching together with its attendant discourse of educational theories, values, evidence and justifications” (p. 928). In other words, pedagogy is not only the teaching methods but also the theories, values, and experiences that influence a teacher’s worldview, as well as the evidence and justification that impact a teacher’s choices.
We encourage policymakers and researchers to build on our working definition to develop a definition most appropriate for their local context and aligned with their education reform agendas. In Working Paper III, we outline a collaborative research strategy that can help researchers and education actors – which can include policymakers, academics, teachers, students, donors, civil society organizations and other actors in the local education ecosystem - jointly define and explore pedagogies in their local context. Our working definition of pedagogy aims to capture the multiple elements that make up pedagogy. In the following section, we refer to these elements as Invisible Pedagogical Mindsets.
B. Adapt pedagogical approaches to account for Invisible Pedagogical Mindsets.
The act of teaching is the visible part of pedagogy—the tip of the iceberg. But beneath the surface, elements such as culture, local education ecosystems, and learning theories inform teachers’ choices and shape the teaching and learning experience. We use these three categories to encompass what we define as Invisible Pedagogical Mindsets: the multifaceted, interconnected, and unobservable elements that impact pedagogical approaches in the classroom. UNESCO defines culture as “the set of distinctive spiritual, material, intellectual and emotional features of society or a social group that encompasses, not only art and literature, but lifestyles, ways of living together, values systems, traditions and beliefs” (UNESCO, 2001). Because knowledge is situated within a social context, an individual’s learning is shaped by social processes and values within this cultural context (Kim & Davidson, 2019). Jones (1989) also underlines the importance of culture in the classroom, stating that “we cannot discuss what happens in the classroom and its significance for social change without at least an understanding of the structured, collective cultural interpretations of the pupils” (p. 22).
|
A. Use a tailored definition of pedagogy in pedagogical research and reform.
Despite widespread use of the term “pedagogy,” there is no consensus on what the term means in practice. Some see pedagogy as a purely technical activity and describe it as “the science of teaching.” Others focus on how sociocultural elements such as culture, local education ecosystems, and learning theories influence pedagogical choices. And others propose some combination of these definitions (Alexander, 2009; Bremner, 2021). “Pedagogy” is ambiguous partly because the purposes of education vary and because ways of teaching and learning are contested topics (Burde, 2014; Qargha, 2022). This section explores how various individuals and entities define “pedagogy” and highlights the importance of considering Invisible Pedagogical Mindsets when defining “pedagogy” in local contexts.
1. Understand that there is no single definition for “pedagogy.”
“Pedagogy” is a complex term, and its meaning varies based on political, historical, or social factors in local contexts. Although many cultures value good teaching practice, the modern use of the term “pedagogy” to describe teaching and learning is predominantly a Western phenomenon. Dating back to the 16th century, the term has been adopted by non-Western localities or transferred from the outside by international actors (Loughran, 1999; Rizvi, 2009; Schweisfurth, 2013; Steiner-Khamsi & Waldow, 2012). The term “pedagogy” is more common in French-, German-, Russian-, and Spanish-speaking communities than in English-speaking ones (Hamilton, 2009). “Pedagogy” has been used to describe various concepts, including the place, practice, system, science, art, and principles of education and teaching. For instance,
the Oxford English Dictionary defines “pedagogy” as a place of instruction (such as a school, college, or university), a system of introductory training, and a means of guidance.
Linguistic Definitions of “Pedagogy”
“the science of teaching” (Oxford Shorter English Dictionary, 1993)
“the art, science, or profession of teaching” (Merriam Webster Dictionary)
“the function or work of a teacher” (dictionary.com)
“the study of teaching methods” (Oxford Learners Dictionary, 2023)
In academic literature, the term “pedagogy” encompasses the visible aspects of teaching and learning, like teaching methods, interactions between teachers and students, the learning environment, and the curriculum, as well as the invisible theories, values, knowledge, attitudes, experiences, and research that influence classroom practice (Alexander, 2009; Moyles et al., 2002; Shah & Campus, 2020; Siraj-Blatchford et al., 2002). Academics also use the term “pedagogy” to describe interactions in diverse fields, such as health, fitness, gender, literature, management, cultural studies, and media studies (Loughran, 1999; Marton & Booth, 1997).
Ministries of education and international development organizations also have varied definitions of “pedagogy.” For instance, the Victoria State Department of Education and Training in Australia focuses on instructional methods and sees “pedagogy” as the methods or principles of teaching (Department of Education and Training, 2018). A USAID report defines “pedagogy” as strategies and techniques supporting development and learning (Bub, 2022). Without explicitly defining “pedagogy,” the World Bank emphasizes the importance of pedagogy for teachers’ professional development and advocates for specific interventions, such as structured pedagogy (Global Education Evidence Advisory Panel, 2023). An OECD working paper defines “pedagogy” as repeated patterns or sets of teaching and learning practices that shape interactions between teachers and learners (Peterson et al., 2018). The term “innovative pedagogies” emerged in the last two decades to refer to pedagogical approaches that aim to significantly improve learning outcomes by creating transformative shifts in teaching and learning, described as leapfrogging (Istance & Paniagua, 2019). According to recent literature, two main characteristics make a pedagogy innovative: a) intentionally planned practices to enhance student learning, and b) a departure from common pedagogical approaches in a specific context (Averill & Major, 2020; Kukulska-Hulme et al., 2020). Therefore, any intentional changes to classroom practice that aim to improve student learning in a local context can be considered an “innovative pedagogy.” However, no single practice is universally “innovative.” An “innovative” practice in one local context might be common practice in another. In Working Paper II, we discuss student-centered pedagogies as a leading example of innovative pedagogies in practice. We recommend a working definition for pedagogy as a starting point for discussion in local contexts to overcome the lack of consensus on a universal definition for the term.
2. Consider local culture, education ecosystems, and learning theories when defining pedagogy.
In attempting to define pedagogy, we draw from work by education scholar Robin Alexander, who emphasized the impact of culture and local context on pedagogical choices. Alexander (2009) defines “pedagogy” as “the act of teaching together with its attendant discourse of educational theories, values, evidence and justifications” (p. 928). In other words, pedagogy is not only the teaching methods but also the theories, values, and experiences that influence a teacher’s worldview, as well as the evidence and justification that impact a teacher’s choices.
We encourage policymakers and researchers to build on our working definition to develop a definition most appropriate for their local context and aligned with their education reform agendas. In Working Paper III, we outline a collaborative research strategy that can help researchers and education actors – which can include policymakers, academics, teachers, students, donors, civil society organizations and other actors in the local education ecosystem - jointly define and explore pedagogies in their local context. Our working definition of pedagogy aims to capture the multiple elements that make up pedagogy. In the following section, we refer to these elements as Invisible Pedagogical Mindsets.
B. Adapt pedagogical approaches to account for Invisible Pedagogical Mindsets.
The act of teaching is the visible part of pedagogy—the tip of the iceberg. But beneath the surface, elements such as culture, local education ecosystems, and learning theories inform teachers’ choices and shape the teaching and learning experience. We use these three categories to encompass what we define as Invisible Pedagogical Mindsets: the multifaceted, interconnected, and unobservable elements that impact pedagogical approaches in the classroom. UNESCO defines culture as “the set of distinctive spiritual, material, intellectual and emotional features of society or a social group that encompasses, not only art and literature, but lifestyles, ways of living together, values systems, traditions and beliefs” (UNESCO, 2001). Because knowledge is situated within a social context, an individual’s learning is shaped by social processes and values within this cultural context (Kim & Davidson, 2019). Jones (1989) also underlines the importance of culture in the classroom, stating that “we cannot discuss what happens in the classroom and its significance for social change without at least an understanding of the structured, collective cultural interpretations of the pupils” (p. 22).
|
考点1:“contested topics”推荐译为“备受争议的话题”
考点2:“tailored definition”推荐译为“因地制宜的定义”
考点3:“leapfrogging”应译为“跨越式发展”
考点4:“a departure from common pedagogical approaches”中的“departure”不是指“离开”,因此完整译文应为“对常规教学方法的突破”
|
9026a
|
学术论文
|
社会科学
|
45
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
牛腩500g(选带筋雪花纹更软糯)、土豆2个(黄心土豆更沙糯)、番茄3个
2. 辅料:姜片5片、葱段2根、蒜瓣3粒、八角1颗、香叶2片(可选)、洋葱1/4个(提香)
3. 调料:料酒2勺、生抽2勺、老抽½勺、冰糖5粒、盐1小勺、番茄酱2勺(提味关键)
👨🍳 四步家常做法
🔪 一、预处理(10分钟)
1. 牛腩处理
切3cm块,冷水浸泡30分钟去血水(中途换水);
冷水下锅 + 姜2片 + 料酒1勺,煮沸撇净浮沫 → 捞出用温水冲洗(锁住水分防变柴)。
2. 蔬果处理
- 番茄去皮:划十字烫开水,2个切丁(熬酱)、1个切块(最后加);
- 土豆切滚刀块,泡盐水防氧化。
🔥 二、炒制炖煮(核心60分钟)
1. 炒香底料
- 热油爆香姜片、蒜粒、洋葱丝、八角;
- 加番茄丁 + 番茄酱2勺,小火炒至软烂出红油。
2. 炖牛腩
- 倒入牛腩翻炒,加料酒1勺+生抽2勺+老抽½勺+冰糖炒匀;
- 加热水没过食材2cm → 大火煮沸转小火盖盖炖1小时(高压锅20分钟)。
🥔 三、加土豆收尾(20分钟)
1. 加入土豆块 + 剩余番茄块 + 盐1小勺;
2. 继续炖15分钟至土豆软糯(筷子轻松插入);
3. 开盖大火收汁至浓稠,撒葱花出锅。
💡 家常秘诀
- 肉嫩不柴:焯水后温水冲洗,炖煮全程小火;
- 浓汤关键:番茄丁+番茄酱双组合,汤汁更红亮酸甜;
- 土豆不碎:最后15分钟加入,避免过早炖化;
- 省时技巧:用高压锅先压牛腩,再转移炒锅收汁。
失败补救:若汤汁过酸,加冰糖调和;若过淡,补少量盐或生抽。
Tips: 土豆去皮切块和牛腩切块小技巧
🥔土豆去皮切块
1. 去皮:土豆划浅口 → 沸水煮3分钟 → 冰水急冷 → 从切口撕下整张皮,能保留果肉厚度均匀
2. 适宜滚刀块:土豆斜切45° → 旋转60°再切 → 重复形成不规则多面体
🥩牛腩切块
1. 切块部位
筋多部位(如坑腩):切4cm块,预留筋膜收缩空间;
瘦肉为主:3cm避免干柴。
2. 切割手法
逆纹切:垂直肌肉纤维下刀,缩短纤维长度更易软烂;
保肥瘦粘连:带筋膜的块状保留脂肪层,炖化后增香润口。
3. 尺寸
2-3cm小块适合时间紧张的速炖:熟透快(高压锅15分钟),但易炖散失形状,肉质纤维易分离,汤汁易浑浊;
3-4cm标准块是番茄炖牛腩的黄金尺寸:受热均匀,中心易熟透,也能保留适度嚼劲,炖煮后形状完整,可充分吸收汤汁。
✅ 成品特点:牛肉酥烂裹汁,土豆绵密入味,汤汁浓郁拌饭绝佳!家常操作简单,营养丰富,适合全家享用🍅🥔🍖。
|
牛腩500g(选带筋雪花纹更软糯)、土豆2个(黄心土豆更沙糯)、番茄3个
2. 辅料:姜片5片、葱段2根、蒜瓣3粒、八角1颗、香叶2片(可选)、洋葱1/4个(提香)
3. 调料:料酒2勺、生抽2勺、老抽½勺、冰糖5粒、盐1小勺、番茄酱2勺(提味关键)
👨🍳 四步家常做法
🔪 一、预处理(10分钟)
1. 牛腩处理
切3cm块,冷水浸泡30分钟去血水(中途换水);
冷水下锅 + 姜2片 + 料酒1勺,煮沸撇净浮沫 → 捞出用温水冲洗(锁住水分防变柴)。
2. 蔬果处理
- 番茄去皮:划十字烫开水,2个切丁(熬酱)、1个切块(最后加);
- 土豆切滚刀块,泡盐水防氧化。
🔥 二、炒制炖煮(核心60分钟)
1. 炒香底料
- 热油爆香姜片、蒜粒、洋葱丝、八角;
- 加番茄丁 + 番茄酱2勺,小火炒至软烂出红油。
2. 炖牛腩
- 倒入牛腩翻炒,加料酒1勺+生抽2勺+老抽½勺+冰糖炒匀;
- 加热水没过食材2cm → 大火煮沸转小火盖盖炖1小时(高压锅20分钟)。
🥔 三、加土豆收尾(20分钟)
1. 加入土豆块 + 剩余番茄块 + 盐1小勺;
2. 继续炖15分钟至土豆软糯(筷子轻松插入);
3. 开盖大火收汁至浓稠,撒葱花出锅。
💡 家常秘诀
- 肉嫩不柴:焯水后温水冲洗,炖煮全程小火;
- 浓汤关键:番茄丁+番茄酱双组合,汤汁更红亮酸甜;
- 土豆不碎:最后15分钟加入,避免过早炖化;
- 省时技巧:用高压锅先压牛腩,再转移炒锅收汁。
失败补救:若汤汁过酸,加冰糖调和;若过淡,补少量盐或生抽。
Tips: 土豆去皮切块和牛腩切块小技巧
🥔土豆去皮切块
1. 去皮:土豆划浅口 → 沸水煮3分钟 → 冰水急冷 → 从切口撕下整张皮,能保留果肉厚度均匀
2. 适宜滚刀块:土豆斜切45° → 旋转60°再切 → 重复形成不规则多面体
🥩牛腩切块
1. 切块部位
筋多部位(如坑腩):切4cm块,预留筋膜收缩空间;
瘦肉为主:3cm避免干柴。
2. 切割手法
逆纹切:垂直肌肉纤维下刀,缩短纤维长度更易软烂;
保肥瘦粘连:带筋膜的块状保留脂肪层,炖化后增香润口。
3. 尺寸
2-3cm小块适合时间紧张的速炖:熟透快(高压锅15分钟),但易炖散失形状,肉质纤维易分离,汤汁易浑浊;
3-4cm标准块是番茄炖牛腩的黄金尺寸:受热均匀,中心易熟透,也能保留适度嚼劲,炖煮后形状完整,可充分吸收汤汁。
✅ 成品特点:牛肉酥烂裹汁,土豆绵密入味,汤汁浓郁拌饭绝佳!家常操作简单,营养丰富,适合全家享用🍅🥔🍖。
|
考点1: 牛腩应译为“beef brisket”
考点2: 雪花纹推荐译为“well-marbled”
考点3: 黄心土豆应译为“yellow-fleshed potato”,不能译成“yellow-hearted potato”
考点4: 血水推荐译为“bloody impurities”
考点5: 撇净有英文对应的固定搭配,应译为“skim off”
考点6: “滚刀块”英文没有直接对应的单词,建议译成“cube”就可以,如果译为rolling cube会有歧义
考点7: 炒香推荐译为“sauté”,有炒入味的含义,如果用stir-fry不足以传达原文的“炒香”
考点8: 收汁应译为“reduce the sauce”,是英文对应的固定搭配
考点9: 坑腩应译为“boneless short rib”
考点10: 逆纹切应译为“cut against the grain”,是英文中对应的说法
考点11:“核心60分钟”推荐译为“60 minutes total”,不建议翻译成“core 60 minutes”
|
90483
|
垂类场景
|
食品健康
|
30
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Abstract
Food-based environmental enrichment (EE) is a valuable strategy for stimulating foraging behaviour in fish under human care, as it increases the challenge of food acquisition and encourages prolonged engagement in this activity. Curimbas (Prochilodus argenteus) and pacus (Myleus micans) are fish species for which ex situ maintenance has become an important conservation measure. In this context, providing EE is essential to ensure high welfare standards. This study aimed to assess the effects of food enrichment on the behaviour of these two endemic species from the São Francisco River basin in Brazil. Behavioural data were collected across three experimental phases, including baseline, enrichment, and post-enrichment. Slow-dissolving food items known as “acorns” were introduced during the enrichment phase. Both species exhibited a marked reduction in inactivity throughout the study. For curimbas, the enrichment phase was associated with increased foraging, elevated agonistic interactions, and greater use of specific tank areas. Among pacus, inactivity significantly declined during the enrichment period. Additionally, the presence of visitors influenced behavioural patterns, promoting foraging activity while reducing inactivity and interactions with the enrichment device. These findings reinforce the value of incorporating environmental enrichment to promote the welfare of freshwater fish in public aquariums.
1. Introduction
Environmental enrichment (EE) is a tool used to improve the welfare of animals under human care [1]. Animal welfare is generally determined by the quality of the animal’s experiences concerning five domains, namely nutrition, health, the environment, behavioural interactions, and mental state [2,3]. In other words, more positive experiences increase the animal’s well-being, and more negative experiences decrease it. Animals that live in stimulating environments and have positive experiences generally display a greater diversity of behaviours, which can be measured and used as an indicator of well-being [4]. In the case of fish, the application of EE consists of offering items to stimulate individuals, allowing them to express their motor skills, exploratory behaviours, feeding, and other behaviours that are close to natural, which tends to reduce abnormal and unwanted behaviours [5,6,7].
Foraging is a behaviour that is naturally highly exhibited in the wild, as obtaining food in this environment is often a challenge [8,9]. In zoos and aquariums, there is often a routine in the animals’ diets, with food being offered at exact times in pieces or on trays, and this does not provide a challenge to get the food, making the feeding time very quick [10,11]. Therefore, food enrichment is a documented way of stimulating foraging behaviour, making it more difficult for the animal to access the food, so it must dedicate itself to this activity for longer [12,13]. In turn, the greater display of this natural behaviour improves animal welfare [11,14,15,16].
The welfare of animals kept in zoos and aquariums can also be affected by the presence of visitors [17]. Since 2012, there has been an increase in research into the zoo visitor effect; however, only 4% of existing studies have been conducted with fish [18]. Fish displaying less social behaviour and becoming more active or showing neutral or inconclusive responses in the presence of visitors are results observed in the few studies on this subject [18,19].
Fish with low welfare levels kept under human care can develop health problems and behavioural changes due to the stress caused by artificial environments [20,21], such as apathy (remaining motionless at the bottom of the tank or spending a long time on the surface of the water), uncoordinated swimming, or increased aggression [22,23]. Some studies have shown a significant lack of research into the effects of EE on fish welfare [24,25,26,27,28], but some positive effects of EE on fish welfare have already been reported, such as increased brain development [29,30,31], a reduction in stress levels, analysed based on the amount of cortisol in the blood of the fish studied [32,33,34], improved foraging ability [12,35,36], aggression [34,37], and positive effects on body growth [38,39].
Although environmental enrichment has been increasingly studied in aquaculture and laboratory environments, a notable gap remains in research concerning aquarium-housed fish in zoological institutions, particularly in Brazil. A recent review emphasised that only a small fraction of enrichment studies focus on aquatic species kept in public aquaria [40]. Similarly, other researchers have proposed structured enrichment protocols for diverse aquarium-housed species but have highlighted the lack of empirical data for teleosts [41]. In Brazil, while aquariums play a growing role in conservation and education [42], systematic evaluations of the impacts of enrichment on native freshwater fish in public aquarium contexts are virtually absent. Furthermore, there are no published studies investigating the effects of environmental enrichment on curimbas Prochilodus argenteus or pacus Myleus micans under managed care. This scarcity underscores the novelty and relevance of the present study, which seeks to address this knowledge gap by assessing enrichment effects on behaviour and welfare in these two species within a Brazilian zoological setting.
Institutions that keep animals must always ensure that the animals under their care exhibit high levels of welfare and are in good physical and mental health so that they can fulfil their role effectively [43]. Aquariums play a vital role in the conservation of fish, particularly endangered species, given the global environmental degradation scenario. Through environmental education, these institutions raise awareness among the population, sensitising and educating them about the importance of these animals to the ecological balance [44,45].
Considering the importance of EE in ensuring the well-being of fish under human care, this study aimed to examine the impacts of EE on the behaviour of two species of fish endemic to the São Francisco River basin in a public aquarium in Brazil (curimbas Prochilodus argenteus and pacus Myleus micans). The central hypothesis is that the EE will influence the behavioural displays of the fishes studied, resulting in a decrease in inactivity and abnormal behaviours and an increase in activity and foraging behaviours during the use of the EE. In addition, more visitors in front of the pond will result in less interaction with the enrichment and an increase in the display of inactivity, aggressive behaviour, and non-visibility by the fish.
2. Materials and Methods
2.1. Ethical Note
The Belo Horizonte Zoo’s Research and Ethics Committee approved the study (protocol no. FU011/2023).
2.2. Study Place, Fish Species, and Maintenance
The study was conducted at the São Francisco River Basin Aquarium in the Belo Horizonte Zoo, Minas Gerais, Brazil (19°51′37.49″ S, 44°0′18.25″ W) (Figure 1). The São Francisco River Basin Aquarium was inaugurated in March 2010 and has 22 enclosures (tanks) that, in their various sizes and shapes, hold more than 1 million litres of water and more than 50 species of fish, most of which are native to the São Francisco basin, including endemic and endangered species [46].
The aquarium houses two popular species from the São Francisco River Basin in a community tank. The curimba Prochilodus argenteus Spix & Agassiz, 1829 (Characiformes), belongs to the Prochilodontidae family and has an iliophagous feeding habit, consuming detritus, filamentous algae, and benthic fauna . Due to its habit, the curimba plays an important role in the ecosystem, promoting greater utilisation of available nutrients by purifying waterways and cycling nutrients . The pacu Myleus micans (Lütken, 1875) (Characiformes), which belongs to the Serrasalmidae family and has a laterally compressed body with a high lateral profile, minor scales, and a long dorsal fin, is also kept with this species . Its eating habits are omnivorous, but its diet is predominantly herbivorous, consuming mainly aquatic macrophytes and filamentous algae .
We studied five pacu individuals, all adults and weighing an average of 3.2 kg, kept in the aquarium since June 2011 and originating from the Três Marias reservoir (Minas Gerais State), as well as six adult curimba individuals weighing an average of 0.6 kg, kept in the aquarium since May 2014 and originating from the São Francisco and Parnaíba Valley Development Company (Codevasf, Montes Claros, Minas Gerais, Brazil). During the study, the individuals were kept in Tank 1, which contained 32.89 m3 of water (4.4 m × 4.5 m × 2 m × 5 m × 2.3 m deep). The fish were fed daily at 4 pm with 150 g of feed produced by the zoo’s nutrition team. They were always maintained in suitable conditions for the species (mean ± SD: pH, 7.35 ± 0.14; temperature, 25.12 ± 1.02 °C; dissolved oxygen, 13.2 mg/L) .
|
Abstract
Food-based environmental enrichment (EE) is a valuable strategy for stimulating foraging behaviour in fish under human care, as it increases the challenge of food acquisition and encourages prolonged engagement in this activity. Curimbas (Prochilodus argenteus) and pacus (Myleus micans) are fish species for which ex situ maintenance has become an important conservation measure. In this context, providing EE is essential to ensure high welfare standards. This study aimed to assess the effects of food enrichment on the behaviour of these two endemic species from the São Francisco River basin in Brazil. Behavioural data were collected across three experimental phases, including baseline, enrichment, and post-enrichment. Slow-dissolving food items known as “acorns” were introduced during the enrichment phase. Both species exhibited a marked reduction in inactivity throughout the study. For curimbas, the enrichment phase was associated with increased foraging, elevated agonistic interactions, and greater use of specific tank areas. Among pacus, inactivity significantly declined during the enrichment period. Additionally, the presence of visitors influenced behavioural patterns, promoting foraging activity while reducing inactivity and interactions with the enrichment device. These findings reinforce the value of incorporating environmental enrichment to promote the welfare of freshwater fish in public aquariums.
1. Introduction
Environmental enrichment (EE) is a tool used to improve the welfare of animals under human care [1]. Animal welfare is generally determined by the quality of the animal’s experiences concerning five domains, namely nutrition, health, the environment, behavioural interactions, and mental state [2,3]. In other words, more positive experiences increase the animal’s well-being, and more negative experiences decrease it. Animals that live in stimulating environments and have positive experiences generally display a greater diversity of behaviours, which can be measured and used as an indicator of well-being [4]. In the case of fish, the application of EE consists of offering items to stimulate individuals, allowing them to express their motor skills, exploratory behaviours, feeding, and other behaviours that are close to natural, which tends to reduce abnormal and unwanted behaviours [5,6,7].
Foraging is a behaviour that is naturally highly exhibited in the wild, as obtaining food in this environment is often a challenge [8,9]. In zoos and aquariums, there is often a routine in the animals’ diets, with food being offered at exact times in pieces or on trays, and this does not provide a challenge to get the food, making the feeding time very quick [10,11]. Therefore, food enrichment is a documented way of stimulating foraging behaviour, making it more difficult for the animal to access the food, so it must dedicate itself to this activity for longer [12,13]. In turn, the greater display of this natural behaviour improves animal welfare [11,14,15,16].
The welfare of animals kept in zoos and aquariums can also be affected by the presence of visitors [17]. Since 2012, there has been an increase in research into the zoo visitor effect; however, only 4% of existing studies have been conducted with fish [18]. Fish displaying less social behaviour and becoming more active or showing neutral or inconclusive responses in the presence of visitors are results observed in the few studies on this subject [18,19].
Fish with low welfare levels kept under human care can develop health problems and behavioural changes due to the stress caused by artificial environments [20,21], such as apathy (remaining motionless at the bottom of the tank or spending a long time on the surface of the water), uncoordinated swimming, or increased aggression [22,23]. Some studies have shown a significant lack of research into the effects of EE on fish welfare [24,25,26,27,28], but some positive effects of EE on fish welfare have already been reported, such as increased brain development [29,30,31], a reduction in stress levels, analysed based on the amount of cortisol in the blood of the fish studied [32,33,34], improved foraging ability [12,35,36], aggression [34,37], and positive effects on body growth [38,39].
Although environmental enrichment has been increasingly studied in aquaculture and laboratory environments, a notable gap remains in research concerning aquarium-housed fish in zoological institutions, particularly in Brazil. A recent review emphasised that only a small fraction of enrichment studies focus on aquatic species kept in public aquaria [40]. Similarly, other researchers have proposed structured enrichment protocols for diverse aquarium-housed species but have highlighted the lack of empirical data for teleosts [41]. In Brazil, while aquariums play a growing role in conservation and education [42], systematic evaluations of the impacts of enrichment on native freshwater fish in public aquarium contexts are virtually absent. Furthermore, there are no published studies investigating the effects of environmental enrichment on curimbas Prochilodus argenteus or pacus Myleus micans under managed care. This scarcity underscores the novelty and relevance of the present study, which seeks to address this knowledge gap by assessing enrichment effects on behaviour and welfare in these two species within a Brazilian zoological setting.
Institutions that keep animals must always ensure that the animals under their care exhibit high levels of welfare and are in good physical and mental health so that they can fulfil their role effectively [43]. Aquariums play a vital role in the conservation of fish, particularly endangered species, given the global environmental degradation scenario. Through environmental education, these institutions raise awareness among the population, sensitising and educating them about the importance of these animals to the ecological balance [44,45].
Considering the importance of EE in ensuring the well-being of fish under human care, this study aimed to examine the impacts of EE on the behaviour of two species of fish endemic to the São Francisco River basin in a public aquarium in Brazil (curimbas Prochilodus argenteus and pacus Myleus micans). The central hypothesis is that the EE will influence the behavioural displays of the fishes studied, resulting in a decrease in inactivity and abnormal behaviours and an increase in activity and foraging behaviours during the use of the EE. In addition, more visitors in front of the pond will result in less interaction with the enrichment and an increase in the display of inactivity, aggressive behaviour, and non-visibility by the fish.
2. Materials and Methods
2.1. Ethical Note
The Belo Horizonte Zoo’s Research and Ethics Committee approved the study (protocol no. FU011/2023).
2.2. Study Place, Fish Species, and Maintenance
The study was conducted at the São Francisco River Basin Aquarium in the Belo Horizonte Zoo, Minas Gerais, Brazil (19°51′37.49″ S, 44°0′18.25″ W) (Figure 1). The São Francisco River Basin Aquarium was inaugurated in March 2010 and has 22 enclosures (tanks) that, in their various sizes and shapes, hold more than 1 million litres of water and more than 50 species of fish, most of which are native to the São Francisco basin, including endemic and endangered species [46].
The aquarium houses two popular species from the São Francisco River Basin in a community tank. The curimba Prochilodus argenteus Spix & Agassiz, 1829 (Characiformes), belongs to the Prochilodontidae family and has an iliophagous feeding habit, consuming detritus, filamentous algae, and benthic fauna . Due to its habit, the curimba plays an important role in the ecosystem, promoting greater utilisation of available nutrients by purifying waterways and cycling nutrients . The pacu Myleus micans (Lütken, 1875) (Characiformes), which belongs to the Serrasalmidae family and has a laterally compressed body with a high lateral profile, minor scales, and a long dorsal fin, is also kept with this species . Its eating habits are omnivorous, but its diet is predominantly herbivorous, consuming mainly aquatic macrophytes and filamentous algae .
We studied five pacu individuals, all adults and weighing an average of 3.2 kg, kept in the aquarium since June 2011 and originating from the Três Marias reservoir (Minas Gerais State), as well as six adult curimba individuals weighing an average of 0.6 kg, kept in the aquarium since May 2014 and originating from the São Francisco and Parnaíba Valley Development Company (Codevasf, Montes Claros, Minas Gerais, Brazil). During the study, the individuals were kept in Tank 1, which contained 32.89 m3 of water (4.4 m × 4.5 m × 2 m × 5 m × 2.3 m deep). The fish were fed daily at 4 pm with 150 g of feed produced by the zoo’s nutrition team. They were always maintained in suitable conditions for the species (mean ± SD: pH, 7.35 ± 0.14; temperature, 25.12 ± 1.02 °C; dissolved oxygen, 13.2 mg/L) .
|
考点1:【environmental enrichment (EE) 】应译为 【环境丰富化】
考点2:【food-based environmental enrichment 】应译为【食物型环境丰富化】
考点3:【baseline, enrichment, and post-enrichment 】应译为 【基线期、丰富化期、后丰富化期】
考点4:【agonistic interactions】 应译为 【攻击性互动/对抗性互动】
考点5:【iliophagous feeding habit 】应译为 【食淤泥的摄食习性】
考点6:【community tank 】应译为 【混养水缸/混养水池】
考点7:【Parnaíba Valley Development Company (Codevasf) 】应译为 【帕尔奈巴河谷开发公司】
|
91d4f
|
学术论文
|
自然科学
|
76
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
体育锻炼在延缓衰老和预防痴呆中的作用
规律体育锻炼对维持心血管系统、肌肉骨骼系统和神经系统功能的益处已得到广泛认可。体育锻炼可使运动中骨骼肌的血流量增加高达100倍,同时也能适度增加脑部血流量;然而,在体育锻炼期间,肝脏、肾脏和睾丸等器官的血流量会减少。尽管不同器官的血流量存在差异,但所有器官都能从规律的体育锻炼中获益。体育锻炼能减轻与年龄相关的最大摄氧量下降、活性氧生成以及各器官功能衰退。此外,体育锻炼可抑制与年龄相关的细胞内稳态系统(如蛋白酶体、自噬、线粒体自噬和DNA修复系统)的退化,这些系统对多个器官的功能具有积极影响。体育锻炼还能增加大脑、心脏、肝脏和肾脏中的线粒体水平。因此,体育锻炼诱导的最大摄氧量升高有助于改善器官功能,包括增强抗氧化系统、修复系统的效能以及细胞内稳态维持活动。
体育锻炼能增强免疫力,并调节与年龄相关的免疫衰老。免疫衰老的典型特征是免疫系统功能减弱,同时伴随先天性和适应性免疫的改变。与年龄相关的变化会影响免疫细胞的表型和功能,进而干扰免疫细胞的趋化作用、胞内杀伤作用以及对病原体的应答。免疫衰老会促使老年人患上多种与年龄相关的疾病,包括心血管疾病、阿尔茨海默病(AD)和糖尿病,同时增加自身免疫性疾病和慢性感染的发病风险。因此,体育锻炼可通过缓解免疫衰老来预防与年龄相关的疾病。体育锻炼的作用还可能有助于调节多发性硬化等疾病中的免疫系统功能。
体育锻炼能显著改善动物和人类的大脑功能。与年龄相关的认知衰退是痴呆发病的关键危险因素,且与整体神经生理改变相关。值得注意的是,体育锻炼能延缓与年龄相关的认知衰退。在动物模型中,研究表明体育锻炼可增强记忆和情绪功能,同时伴随神经发生增加、包括脑源性神经营养因子(BDNF)在内的多种神经营养因子上调以及海马体突触可塑性改善。体育锻炼还能增加AD模型小鼠的神经发生和BDNF水平,并预防其认知功能障碍。此外,体育锻炼会促使骨骼肌、肝脏和脂肪组织等外周器官分泌多种因子,这些因子也能影响神经元功能。近期一项研究表明,骨骼肌细胞分泌的蛋白质可上调未成熟神经元标志物DCX和β-III微管蛋白的表达,这提示骨骼肌在应对体育锻炼时分泌的因子有助于体育锻炼诱导的神经发生增加。
因此,从青年或中年时期开始进行规律的体育锻炼似乎是维持老年健康的必要生活方式改变。由于目前尚未发现能显著预防与年龄相关的认知衰退的药物,因此在神经储备仍充足的生命早期开始体育锻炼计划,对于完全避免或至少延缓认知衰退至关重要。然而,青年或中年时期需要进行多少体育锻炼才能维持老年时期的健康认知功能,这一问题尚未明确。以往的一些体育锻炼临床试验显示其对认知表现有积极影响,而另一些试验则显示影响甚微或无积极影响。尽管如此,研究认为结构化、个体化且长期坚持的体育锻炼计划有助于维持老年人的认知表现。事实上,近期一项临床试验表明,在6个月内锻炼至少52小时与有或无认知障碍的老年人认知表现改善相关。另一项研究显示,将体育活动与认知活动相结合,能改善或维持被诊断为轻度认知障碍(尤其是遗忘型)的老年人的认知和身体表现。关于多种锻炼方式对AD预防作用的临床试验表明,长期体育活动结合多成分认知干预能改善AD患者的认知功能。总体而言,这些结果提示,在轻度认知障碍或AD早期发病后,仅靠体育锻炼干预可能不够,但当与充分的认知活动结合时,仍有望改善功能。
有望促进健康衰老的抗氧化剂和草药
氧化应激在多种与年龄相关疾病的发生发展中具有重要影响,这些疾病包括关节炎、糖尿病、痴呆、中风、癌症、动脉粥样硬化、血管疾病、肥胖、骨质疏松症和代谢综合征。生物体内会生成活性氧,以调节细胞存活、应激反应、离子通道和炎症等细胞活动。然而,活性氧水平升高与衰老的发生和进展相关。特别是,活性氧被认为通过氧化损伤以及与线粒体的相互作用而加剧与年龄相关疾病的进展。多项研究表明,烟酰胺腺嘌呤二核苷酸磷酸氧化酶产生的瞬时或生理性活性氧可作为氧化还原信号,以恢复细胞内稳态。通常,随着衰老,重建细胞内稳态的能力会逐渐减弱。但长寿动物具有重建细胞内稳态的能力,这有助于促进健康衰老。因此,通过调控烟酰胺腺嘌呤二核苷酸磷酸氧化酶活性来实现局部和生理性氧化还原信号传导的策略,可能有助于促进健康衰老。
由于内源性抗氧化系统效能降低,老年人更易受到氧化应激的影响。心脏和大脑的细胞更新率有限且耗氧量高,因此尤其容易受到这种现象的影响。通常情况下,血浆抗氧化剂水平与多种疾病(包括心血管疾病、糖尿病和神经系统疾病)的发生发展呈负相关。新兴研究表明,天然抗氧化剂可通过中断自由基的传播或抑制自由基的形成来控制自氧化。通过这些作用,抗氧化剂能减轻氧化应激、改善免疫功能并延长健康寿命。抗氧化剂能够清除引发过氧化的物质、阻断自氧化链式反应、淬灭自由基并防止过氧化物形成。因此,补充抗氧化剂膳食在对抗衰老方面受到了广泛关注。这种方法也与衰老的自由基理论相符,该理论认为降低体内活性氧的整体水平可延缓衰老、延长寿命并预防和治疗与衰老相关的疾病。然而,在老年人群中进行的抗氧化剂临床试验结果并不一致。目前,用于治疗衰老和AD相关认知功能障碍的最有前景的抗氧化剂包括白藜芦醇和姜黄素,它们正处于临床试验阶段。
关于白藜芦醇,一项临床试验报道,对患有代谢综合征的中年男性进行4个月的白藜芦醇治疗,可增加肌肉周转和脂质代谢,促进长链饱和、单不饱和和多不饱和游离脂肪酸的积累,并对肠道菌群产生有益影响。另一项临床试验表明,在标准抗高血压治疗中加入白藜芦醇能有效将血压降至正常水平,且无需额外使用抗高血压药物。该研究还基于血清中肝酶谷丙转氨酶水平降低,提示摄入白藜芦醇可能具有预防肝损伤的作用。其他临床试验显示,白藜芦醇治疗可改善健康超重老年人的记忆表现,并增强海马体与内侧前额叶皮层之间的功能连接。白藜芦醇还被证实能增强2型糖尿病患者的神经血管偶联和认知表现。此外,与安慰剂治疗组相比,在轻至中度AD患者中,白藜芦醇治疗可调节血浆和脑脊液中淀粉样蛋白β-40的水平。
在一项纳入健康老年人群的随机临床试验中对姜黄素进行了研究。该研究发现,急性给予姜黄素可改善持续注意力和工作记忆,而慢性治疗则能改善情绪并减轻疲劳。另一项近期临床试验报道,中年和老年非痴呆人群每日口服生物利用度高且安全的姜黄素,18个月后其记忆表现得到改善。此外,该研究提示每日口服姜黄素可能减少杏仁核和下丘脑的神经病理积累。因此,基于已开展的临床试验结果,白藜芦醇和姜黄素似乎都是安全、耐受性良好且有益的,副作用极少。尽管如此,仍需要开展详细、长期、大规模的临床试验,以充分了解白藜芦醇和姜黄素在改善患有轻度认知障碍或AD早期的老年人认知功能方面的效能。
|
体育锻炼在延缓衰老和预防痴呆中的作用
规律体育锻炼对维持心血管系统、肌肉骨骼系统和神经系统功能的益处已得到广泛认可。体育锻炼可使运动中骨骼肌的血流量增加高达100倍,同时也能适度增加脑部血流量;然而,在体育锻炼期间,肝脏、肾脏和睾丸等器官的血流量会减少。尽管不同器官的血流量存在差异,但所有器官都能从规律的体育锻炼中获益。体育锻炼能减轻与年龄相关的最大摄氧量下降、活性氧生成以及各器官功能衰退。此外,体育锻炼可抑制与年龄相关的细胞内稳态系统(如蛋白酶体、自噬、线粒体自噬和DNA修复系统)的退化,这些系统对多个器官的功能具有积极影响。体育锻炼还能增加大脑、心脏、肝脏和肾脏中的线粒体水平。因此,体育锻炼诱导的最大摄氧量升高有助于改善器官功能,包括增强抗氧化系统、修复系统的效能以及细胞内稳态维持活动。
体育锻炼能增强免疫力,并调节与年龄相关的免疫衰老。免疫衰老的典型特征是免疫系统功能减弱,同时伴随先天性和适应性免疫的改变。与年龄相关的变化会影响免疫细胞的表型和功能,进而干扰免疫细胞的趋化作用、胞内杀伤作用以及对病原体的应答。免疫衰老会促使老年人患上多种与年龄相关的疾病,包括心血管疾病、阿尔茨海默病(AD)和糖尿病,同时增加自身免疫性疾病和慢性感染的发病风险。因此,体育锻炼可通过缓解免疫衰老来预防与年龄相关的疾病。体育锻炼的作用还可能有助于调节多发性硬化等疾病中的免疫系统功能。
体育锻炼能显著改善动物和人类的大脑功能。与年龄相关的认知衰退是痴呆发病的关键危险因素,且与整体神经生理改变相关。值得注意的是,体育锻炼能延缓与年龄相关的认知衰退。在动物模型中,研究表明体育锻炼可增强记忆和情绪功能,同时伴随神经发生增加、包括脑源性神经营养因子(BDNF)在内的多种神经营养因子上调以及海马体突触可塑性改善。体育锻炼还能增加AD模型小鼠的神经发生和BDNF水平,并预防其认知功能障碍。此外,体育锻炼会促使骨骼肌、肝脏和脂肪组织等外周器官分泌多种因子,这些因子也能影响神经元功能。近期一项研究表明,骨骼肌细胞分泌的蛋白质可上调未成熟神经元标志物DCX和β-III微管蛋白的表达,这提示骨骼肌在应对体育锻炼时分泌的因子有助于体育锻炼诱导的神经发生增加。
因此,从青年或中年时期开始进行规律的体育锻炼似乎是维持老年健康的必要生活方式改变。由于目前尚未发现能显著预防与年龄相关的认知衰退的药物,因此在神经储备仍充足的生命早期开始体育锻炼计划,对于完全避免或至少延缓认知衰退至关重要。然而,青年或中年时期需要进行多少体育锻炼才能维持老年时期的健康认知功能,这一问题尚未明确。以往的一些体育锻炼临床试验显示其对认知表现有积极影响,而另一些试验则显示影响甚微或无积极影响。尽管如此,研究认为结构化、个体化且长期坚持的体育锻炼计划有助于维持老年人的认知表现。事实上,近期一项临床试验表明,在6个月内锻炼至少52小时与有或无认知障碍的老年人认知表现改善相关。另一项研究显示,将体育活动与认知活动相结合,能改善或维持被诊断为轻度认知障碍(尤其是遗忘型)的老年人的认知和身体表现。关于多种锻炼方式对AD预防作用的临床试验表明,长期体育活动结合多成分认知干预能改善AD患者的认知功能。总体而言,这些结果提示,在轻度认知障碍或AD早期发病后,仅靠体育锻炼干预可能不够,但当与充分的认知活动结合时,仍有望改善功能。
有望促进健康衰老的抗氧化剂和草药
氧化应激在多种与年龄相关疾病的发生发展中具有重要影响,这些疾病包括关节炎、糖尿病、痴呆、中风、癌症、动脉粥样硬化、血管疾病、肥胖、骨质疏松症和代谢综合征。生物体内会生成活性氧,以调节细胞存活、应激反应、离子通道和炎症等细胞活动。然而,活性氧水平升高与衰老的发生和进展相关。特别是,活性氧被认为通过氧化损伤以及与线粒体的相互作用而加剧与年龄相关疾病的进展。多项研究表明,烟酰胺腺嘌呤二核苷酸磷酸氧化酶产生的瞬时或生理性活性氧可作为氧化还原信号,以恢复细胞内稳态。通常,随着衰老,重建细胞内稳态的能力会逐渐减弱。但长寿动物具有重建细胞内稳态的能力,这有助于促进健康衰老。因此,通过调控烟酰胺腺嘌呤二核苷酸磷酸氧化酶活性来实现局部和生理性氧化还原信号传导的策略,可能有助于促进健康衰老。
由于内源性抗氧化系统效能降低,老年人更易受到氧化应激的影响。心脏和大脑的细胞更新率有限且耗氧量高,因此尤其容易受到这种现象的影响。通常情况下,血浆抗氧化剂水平与多种疾病(包括心血管疾病、糖尿病和神经系统疾病)的发生发展呈负相关。新兴研究表明,天然抗氧化剂可通过中断自由基的传播或抑制自由基的形成来控制自氧化。通过这些作用,抗氧化剂能减轻氧化应激、改善免疫功能并延长健康寿命。抗氧化剂能够清除引发过氧化的物质、阻断自氧化链式反应、淬灭自由基并防止过氧化物形成。因此,补充抗氧化剂膳食在对抗衰老方面受到了广泛关注。这种方法也与衰老的自由基理论相符,该理论认为降低体内活性氧的整体水平可延缓衰老、延长寿命并预防和治疗与衰老相关的疾病。然而,在老年人群中进行的抗氧化剂临床试验结果并不一致。目前,用于治疗衰老和AD相关认知功能障碍的最有前景的抗氧化剂包括白藜芦醇和姜黄素,它们正处于临床试验阶段。
关于白藜芦醇,一项临床试验报道,对患有代谢综合征的中年男性进行4个月的白藜芦醇治疗,可增加肌肉周转和脂质代谢,促进长链饱和、单不饱和和多不饱和游离脂肪酸的积累,并对肠道菌群产生有益影响。另一项临床试验表明,在标准抗高血压治疗中加入白藜芦醇能有效将血压降至正常水平,且无需额外使用抗高血压药物。该研究还基于血清中肝酶谷丙转氨酶水平降低,提示摄入白藜芦醇可能具有预防肝损伤的作用。其他临床试验显示,白藜芦醇治疗可改善健康超重老年人的记忆表现,并增强海马体与内侧前额叶皮层之间的功能连接。白藜芦醇还被证实能增强2型糖尿病患者的神经血管偶联和认知表现。此外,与安慰剂治疗组相比,在轻至中度AD患者中,白藜芦醇治疗可调节血浆和脑脊液中淀粉样蛋白β-40的水平。
在一项纳入健康老年人群的随机临床试验中对姜黄素进行了研究。该研究发现,急性给予姜黄素可改善持续注意力和工作记忆,而慢性治疗则能改善情绪并减轻疲劳。另一项近期临床试验报道,中年和老年非痴呆人群每日口服生物利用度高且安全的姜黄素,18个月后其记忆表现得到改善。此外,该研究提示每日口服姜黄素可能减少杏仁核和下丘脑的神经病理积累。因此,基于已开展的临床试验结果,白藜芦醇和姜黄素似乎都是安全、耐受性良好且有益的,副作用极少。尽管如此,仍需要开展详细、长期、大规模的临床试验,以充分了解白藜芦醇和姜黄素在改善患有轻度认知障碍或AD早期的老年人认知功能方面的效能。
|
考点1:“阿尔茨海默病(AD)” 推荐译为 “Alzheimer's disease (AD)”
考点2:“最大摄氧量” 推荐译为 “maximal oxygen uptake”
考点3:“活性氧” 推荐译为 “reactive oxygen species (ROS)”
考点4:“自噬” 推荐译为 “autophagy”
考点5:“线粒体自噬” 推荐译为 “mitophagy”
考点6:“脑源性神经营养因子(BDNF)” 推荐译为 “brain-derived neurotrophic factor (BDNF)”
考点7: 文中 “预防其认知功能障碍” 中的 “认知功能障碍”,不可以翻译为 “cognitive impairment”,建议翻译为 “cognitive dysfunction” .
考点8:“β-III微管蛋白” 推荐译为 “β-III tubulin”
考点9:“免疫衰老” 推荐译为 “immunosenescence”
考点10:“先天性免疫” 推荐译为 “innate immunity”
考点11:“适应性免疫” 推荐译为 “adaptive immunity”
考点12:“趋化作用” 推荐译为 “chemotaxis”
考点13:“多发性硬化” 推荐译为 “multiple sclerosis”
考点14:“代谢综合征” 推荐译为 “metabolic syndrome”
考点15:“烟酰胺腺嘌呤二核苷酸磷酸氧化酶” 推荐译为 “nicotinamide adenine dinucleotide phosphate oxidases (NADPH oxidases)”
考点16:“谷丙转氨酶” 推荐译为 “glutamate-pyruvate transaminase”
考点17:“白藜芦醇” 推荐译为 “resveratrol”
考点18:“姜黄素” 推荐译为 “curcumin”
考点19:“脑脊液” 推荐译为 “cerebrospinal fluid”
考点20. 文中“骨骼肌的血流量增加高达100倍”中“高达100倍”需要翻译为”by up to 100-fold。不可以翻译为“by up to 100 times”。
考点21:文中 “减轻与年龄相关的最大摄氧量下降” 中的 “减轻”,不可以翻译为侧重数量上的降低的 “reduce”,建议翻译为 “attenuate”。
|
92746
|
学术论文
|
自然科学
|
125
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Spermatogenesis is a precisely regulated and highly ordered process, including mitotic proliferation of spermatogonia, meiosis of spermatocytes, and differentiation of haploid spermatids during spermiogenesis. Any errors in this process will lead to male reproductive disorders. Male infertility, accounting for 50% of infertile couples, is a serious reproductive health problem Nonobstructive azoospermia (NOA) is the most serious form, accounting for 10–15% of male infertility.
Only one in three cases of azoospermia can be explained by genetic defects, such as abnormalities and deletion of the azoospermia-factor (AZF) region in the Y chromosome, whereas more than 70% of the cases are idiopathic NOA (iNOA). In addition to genetic defects, infectious and inflammatory conditions in the reproductive system contribute to male infertility. Genome-wide association studies of idiopathic male infertility have revealed a series of NOA susceptibility loci, including PEX10, PRMT6, and SIRPA. Several single- gene mutations have been reported in patients with testicular- phenotype NOA, including TEX11, TEX14, TEX15, DMC1, and MEIOB. Recent studies have used transcriptome analysis to investigate the pathogenic mechanism of NOA. Bulk transcriptome analyses have revealed that PILRA and ZNF676 are related to NOA susceptibility. Two-dimensional coculture of multiple stem cell types and three-dimensional testicular organ culture have been used to simulate the environment of testicular sperm production and promote spermatogenesis, with promising results for the treatment of azoospermia.
Treatments for azoospermia require a better understanding of the classification of azoospermia. Single-cell RNA sequencing (scRNA-seq) enables the study of highly heterogeneous cell populations in the testes at a single-cell resolution. We previously conducted scRNA-seq analysis of adult human testis samples from normal donors and iNOA patients and reconstructed the transcriptional programs inherent to sequential cell fate transition during human spermatogenesis. The results showed that the gene expression patterns of somatic cells in iNOA differed from those in normal spermatogenesis and mainly included DNA damage genes and other stress-responsive genes. A recent study revealed that maturation disorders in Sertoli cells are in- volved in iNOA, and inhibition of the Wnt signaling pathway promoted the maturation of these cells. However, the number of reported study cases is very small, and the explanation of the iNOA mechanism is limited from a somatic perspective. The gene expression characteristics of germ cells and somatic cells, cell–cell interactions between germ cells and somatic cells, as well as the regulatory networks of transcription factors (TFs) in iNOA patients remain largely unknown.
We performed scRNA-seq analysis of 3696 individual testicular cells from 17 iNOA donors to construct transcriptional land- scapes of human spermatogenesis in the context of NOA. In comparison with healthy subjects with normal spermatogenesis, we assessed the gene expression characteristics of germ cells and somatic cells, cell–cell interactions between germ cells and somatic cells, as well as the regulatory networks of TFs in iNOA patients. In particular, we demonstrated that CD164 played an important role in the apoptosis of spermatogonia. Moreover, we identified a series of genes predicting spermatogenic capacity in different testicular diseases. In general, our study provides new insights into the molecular pathogenesis as well as the clinical diagnosis and therapeutic strategy of iNOA.
Our results revealed that germ cells, including SSC, from azoospermia patients had enhanced cell cycle activity and weakened energy production, which may provide clues for the selection of factors to be added to the in vitro culture medium for round sperm. As SSC can self-renew to maintain the stem cell population and further produce sperm, sperm can be produced uninterruptedly throughout adulthood.
To identify candidate iNOA pathogenic genes, we analyzed the key DEGs between the four classes iNOA and the NC group. Among them, HMGB4, a member of the high-mobility group box (HMGB) family, is present in spermatocytes, spermatids, and spermatozoa in human and mice. A significant decline of HMGB4 in all cell types in the three classes of iNOA was observed. Though male fertility was not affected in Hmgb4 knock- out mice, which might be due to species variation. We speculated that HMGB4 might be a key pathogenic gene of iNOA and played an important role in spermatogenesis. More studies should be carried out in the future. Cell–cell interactions between ST and developing SSC have long received research interest. We found that the CD226/NECTIN2, LGR4/RSPO3, and NOTCH1/JAG2 interaction pairs might have an effect on human spermatogenesis. Moreover, the CSF1/SIRPA and CXCL12/CXCR4 interaction pairs were downregulated in all classes of iNOA. CSF1 (colony-stimulating factor 1) exerts a crucial impact on the development of SSC. Polymorphisms in SIRPA, its interaction partner, are strongly associated with iNOA susceptibility. Additionally, CXCL12 encodes a chemokine ex- pressed and secreted by ST and binds to the CXCR4 receptor on SSC to regulate the self-renewal and maintenance of SSC. Therefore, the downregulation of these key interaction signals may provide ideas for targeted therapy of iNOA in the future.
Apart from intercellular communication, TFs are essential in spermatogenesis. We found that HES7 (Hes family bHLH TF 7), as a transcriptional repressor. was significantly upregulated in iNOA cells. Another key TF, SOX5, is necessary for correct gene expression patterns during spermatogenesis and its expression was significantly downregulated in iNOA cells. Therefore, we speculate that the increase in HES7 transcriptional activity and decrease in SOX5 transcriptional activity may disrupt the key regulatory network during spermatogenesis and cause iNOA.
None of the iNOA patients in our study had mature sperm, but other indicators, such as genetic factors, were normal in all patients. We classified them into four groups based on gene expression and pathological features, and identified a series of genes that were highly associated with spermatogenic capacity. At present, testicular biopsy is an invasive method to diagnose the spermatogenic ability of patients, and a safe and noninvasive diagnostic strategy is still lacking. The genes identified in this work may be integrated into a panel for the rapid and noninvasive diagnosis of male infertility in the future.
As demonstrated in this study, the interactions between germ cells and somatic cells were speculated only by expression data, computational software prediction, protein localization, and quantification. Additional experiments are needed to further clarify the cell–cell communications. In addition, we used cell lines for functional validation of the key pathogenic genes we screened, indicating the reliability of our bioinformatics analysis results. Further studies using in vivo animal models are still needed to better characterize the effect of these pathogenic genes on spermatogenesis. Moreover, we used different testicular diseases to find common diagnostic predictor of spermatogenic ability, providing a large amount of data resources for clinical diagnosis. However, a large number of clinical samples still need to be included to verify its accuracy.
Although there have been enormous advances in iNOA testicular microenvironment, transcriptional network of autophagy- related genes, and hub genes of azoospermia to our knowledge, this was the first study to investigate the occurrence and development of idiopathic NOA from a testicular germ cell perspective, including the largest number of cases to date. The data comprehensively and systematically reveal the transcriptional regulatory network of iNOA. Our findings not only provide valuable knowledge to improve our understanding of the molecular basis and mechanism of iNOA but also provide new insights for clinical diagnosis and treatment.
Experimental Model and Subject Details: the donors in this study underwent sperm isolation surgery for in vitro fertilization due to male-related infertility. Men with spermatogenic cells, but without mature sperm, abnormal hormone levels, chromosomal abnormalities, Y chromosome microdeletion, and no other medical history were selected. Testis tissues were collected from 17 iNOA patients between 27 and 37 years old to map single-cell transcriptome landscapes. All testis samples for transcriptome analysis were obtained from Peking University Third Hospital with informed consent from the donors. The study was approved by the Ethics Committee of Peking University Third Hospital (2017SZ-048). All experimental procedures and animal care were approved by the Animal Care and Use Committee of the Peking University Health Science Center (LA2021579). Normal Samples data included 2854 testicular cells from 9 donors, have been deposited in NCBI GEO: GSE106487.
Isolation of iNOA Male Testicular Cells for Transcriptional Profiling: Idiopathic NOA testis tissues were washed three times with Dulbecco’s modified Eagle’s medium (DMEM, C11995500BT, Thermo Scientific) containing 10% fetal bovine serum (FBS, 10437028, Gbico) and minced using sterilized scissors. Then, 500 μL of Accutase Cell Detachment Solution (A6964, Sigma- Aldrich) was added, and the samples were incubated at 37 °C for 15 min. To completely digest the tissues into single cells, the mixture was pipetted 30 times at 7 min and at the end of digestion. The cell suspension was filtered through 40 μm Pre-Separation Filters and centrifuged at 300× g for 8 min, and the cells were resuspended in 500 μL of DMEM (containing 10% FBS).
ScRNA-seq Library Preparation and Sequencing: After digestion, the cells were diluted in 1 mg mL−1 Ac-Bovine Serum Albumin (A9418, Sigma-Aldrich) and single cells were randomly picked using a mouth pipette and added to lysis buffer prepared in advance. Mouth pipette method can make sure that there’s only one cell in each tube. A previously reported modified STRT- seq protocol was used to construct the scRNA-seq library. In brief, after total RNA was extracted from the single cells, the mRNAs were captured using an oligo (dT) primer and subjected to reverse transcription. The cDNAs were PCR-amplified in 18 cycles to increase yields. After barcoding, the cDNAs from 48 single cells were pooled, and a biotin-modified index sequence was added to the 3′ end in four cycles of PCR. Dynabeads MyOne Streptavidin C1(65 002, Invitrogen) was used to capture the fragmented 3′ cDNAs, which were sheared using Covaris (S2). The libraries were constructed using a Kapa Hyper Prep Kit (KK8505, Kapa Biosystems) and were subjected to 150 bp paired-end sequencing on the Illumina 4000 platform.
|
Spermatogenesis is a precisely regulated and highly ordered process, including mitotic proliferation of spermatogonia, meiosis of spermatocytes, and differentiation of haploid spermatids during spermiogenesis. Any errors in this process will lead to male reproductive disorders. Male infertility, accounting for 50% of infertile couples, is a serious reproductive health problem Nonobstructive azoospermia (NOA) is the most serious form, accounting for 10–15% of male infertility.
Only one in three cases of azoospermia can be explained by genetic defects, such as abnormalities and deletion of the azoospermia-factor (AZF) region in the Y chromosome, whereas more than 70% of the cases are idiopathic NOA (iNOA). In addition to genetic defects, infectious and inflammatory conditions in the reproductive system contribute to male infertility. Genome-wide association studies of idiopathic male infertility have revealed a series of NOA susceptibility loci, including PEX10, PRMT6, and SIRPA. Several single- gene mutations have been reported in patients with testicular- phenotype NOA, including TEX11, TEX14, TEX15, DMC1, and MEIOB. Recent studies have used transcriptome analysis to investigate the pathogenic mechanism of NOA. Bulk transcriptome analyses have revealed that PILRA and ZNF676 are related to NOA susceptibility. Two-dimensional coculture of multiple stem cell types and three-dimensional testicular organ culture have been used to simulate the environment of testicular sperm production and promote spermatogenesis, with promising results for the treatment of azoospermia.
Treatments for azoospermia require a better understanding of the classification of azoospermia. Single-cell RNA sequencing (scRNA-seq) enables the study of highly heterogeneous cell populations in the testes at a single-cell resolution. We previously conducted scRNA-seq analysis of adult human testis samples from normal donors and iNOA patients and reconstructed the transcriptional programs inherent to sequential cell fate transition during human spermatogenesis. The results showed that the gene expression patterns of somatic cells in iNOA differed from those in normal spermatogenesis and mainly included DNA damage genes and other stress-responsive genes. A recent study revealed that maturation disorders in Sertoli cells are in- volved in iNOA, and inhibition of the Wnt signaling pathway promoted the maturation of these cells. However, the number of reported study cases is very small, and the explanation of the iNOA mechanism is limited from a somatic perspective. The gene expression characteristics of germ cells and somatic cells, cell–cell interactions between germ cells and somatic cells, as well as the regulatory networks of transcription factors (TFs) in iNOA patients remain largely unknown.
We performed scRNA-seq analysis of 3696 individual testicular cells from 17 iNOA donors to construct transcriptional land- scapes of human spermatogenesis in the context of NOA. In comparison with healthy subjects with normal spermatogenesis, we assessed the gene expression characteristics of germ cells and somatic cells, cell–cell interactions between germ cells and somatic cells, as well as the regulatory networks of TFs in iNOA patients. In particular, we demonstrated that CD164 played an important role in the apoptosis of spermatogonia. Moreover, we identified a series of genes predicting spermatogenic capacity in different testicular diseases. In general, our study provides new insights into the molecular pathogenesis as well as the clinical diagnosis and therapeutic strategy of iNOA.
Our results revealed that germ cells, including SSC, from azoospermia patients had enhanced cell cycle activity and weakened energy production, which may provide clues for the selection of factors to be added to the in vitro culture medium for round sperm. As SSC can self-renew to maintain the stem cell population and further produce sperm, sperm can be produced uninterruptedly throughout adulthood.
To identify candidate iNOA pathogenic genes, we analyzed the key DEGs between the four classes iNOA and the NC group. Among them, HMGB4, a member of the high-mobility group box (HMGB) family, is present in spermatocytes, spermatids, and spermatozoa in human and mice. A significant decline of HMGB4 in all cell types in the three classes of iNOA was observed. Though male fertility was not affected in Hmgb4 knock- out mice, which might be due to species variation. We speculated that HMGB4 might be a key pathogenic gene of iNOA and played an important role in spermatogenesis. More studies should be carried out in the future. Cell–cell interactions between ST and developing SSC have long received research interest. We found that the CD226/NECTIN2, LGR4/RSPO3, and NOTCH1/JAG2 interaction pairs might have an effect on human spermatogenesis. Moreover, the CSF1/SIRPA and CXCL12/CXCR4 interaction pairs were downregulated in all classes of iNOA. CSF1 (colony-stimulating factor 1) exerts a crucial impact on the development of SSC. Polymorphisms in SIRPA, its interaction partner, are strongly associated with iNOA susceptibility. Additionally, CXCL12 encodes a chemokine ex- pressed and secreted by ST and binds to the CXCR4 receptor on SSC to regulate the self-renewal and maintenance of SSC. Therefore, the downregulation of these key interaction signals may provide ideas for targeted therapy of iNOA in the future.
Apart from intercellular communication, TFs are essential in spermatogenesis. We found that HES7 (Hes family bHLH TF 7), as a transcriptional repressor. was significantly upregulated in iNOA cells. Another key TF, SOX5, is necessary for correct gene expression patterns during spermatogenesis and its expression was significantly downregulated in iNOA cells. Therefore, we speculate that the increase in HES7 transcriptional activity and decrease in SOX5 transcriptional activity may disrupt the key regulatory network during spermatogenesis and cause iNOA.
None of the iNOA patients in our study had mature sperm, but other indicators, such as genetic factors, were normal in all patients. We classified them into four groups based on gene expression and pathological features, and identified a series of genes that were highly associated with spermatogenic capacity. At present, testicular biopsy is an invasive method to diagnose the spermatogenic ability of patients, and a safe and noninvasive diagnostic strategy is still lacking. The genes identified in this work may be integrated into a panel for the rapid and noninvasive diagnosis of male infertility in the future.
As demonstrated in this study, the interactions between germ cells and somatic cells were speculated only by expression data, computational software prediction, protein localization, and quantification. Additional experiments are needed to further clarify the cell–cell communications. In addition, we used cell lines for functional validation of the key pathogenic genes we screened, indicating the reliability of our bioinformatics analysis results. Further studies using in vivo animal models are still needed to better characterize the effect of these pathogenic genes on spermatogenesis. Moreover, we used different testicular diseases to find common diagnostic predictor of spermatogenic ability, providing a large amount of data resources for clinical diagnosis. However, a large number of clinical samples still need to be included to verify its accuracy.
Although there have been enormous advances in iNOA testicular microenvironment, transcriptional network of autophagy- related genes, and hub genes of azoospermia to our knowledge, this was the first study to investigate the occurrence and development of idiopathic NOA from a testicular germ cell perspective, including the largest number of cases to date. The data comprehensively and systematically reveal the transcriptional regulatory network of iNOA. Our findings not only provide valuable knowledge to improve our understanding of the molecular basis and mechanism of iNOA but also provide new insights for clinical diagnosis and treatment.
Experimental Model and Subject Details: the donors in this study underwent sperm isolation surgery for in vitro fertilization due to male-related infertility. Men with spermatogenic cells, but without mature sperm, abnormal hormone levels, chromosomal abnormalities, Y chromosome microdeletion, and no other medical history were selected. Testis tissues were collected from 17 iNOA patients between 27 and 37 years old to map single-cell transcriptome landscapes. All testis samples for transcriptome analysis were obtained from Peking University Third Hospital with informed consent from the donors. The study was approved by the Ethics Committee of Peking University Third Hospital (2017SZ-048). All experimental procedures and animal care were approved by the Animal Care and Use Committee of the Peking University Health Science Center (LA2021579). Normal Samples data included 2854 testicular cells from 9 donors, have been deposited in NCBI GEO: GSE106487.
Isolation of iNOA Male Testicular Cells for Transcriptional Profiling: Idiopathic NOA testis tissues were washed three times with Dulbecco’s modified Eagle’s medium (DMEM, C11995500BT, Thermo Scientific) containing 10% fetal bovine serum (FBS, 10437028, Gbico) and minced using sterilized scissors. Then, 500 μL of Accutase Cell Detachment Solution (A6964, Sigma- Aldrich) was added, and the samples were incubated at 37 °C for 15 min. To completely digest the tissues into single cells, the mixture was pipetted 30 times at 7 min and at the end of digestion. The cell suspension was filtered through 40 μm Pre-Separation Filters and centrifuged at 300× g for 8 min, and the cells were resuspended in 500 μL of DMEM (containing 10% FBS).
ScRNA-seq Library Preparation and Sequencing: After digestion, the cells were diluted in 1 mg mL−1 Ac-Bovine Serum Albumin (A9418, Sigma-Aldrich) and single cells were randomly picked using a mouth pipette and added to lysis buffer prepared in advance. Mouth pipette method can make sure that there’s only one cell in each tube. A previously reported modified STRT- seq protocol was used to construct the scRNA-seq library. In brief, after total RNA was extracted from the single cells, the mRNAs were captured using an oligo (dT) primer and subjected to reverse transcription. The cDNAs were PCR-amplified in 18 cycles to increase yields. After barcoding, the cDNAs from 48 single cells were pooled, and a biotin-modified index sequence was added to the 3′ end in four cycles of PCR. Dynabeads MyOne Streptavidin C1(65 002, Invitrogen) was used to capture the fragmented 3′ cDNAs, which were sheared using Covaris (S2). The libraries were constructed using a Kapa Hyper Prep Kit (KK8505, Kapa Biosystems) and were subjected to 150 bp paired-end sequencing on the Illumina 4000 platform.
|
考点1:“Donors” 应译为“供体”
考点2:“high-mobility group box (HMGB) family” 必须译为“高迁移率族蛋白”,固定译法
考点3:“DMEM”必须译为“杜尔贝科改良鹰培养基”,固定译法
考点4:“PCR”必须译为“聚合酶链式反应”,固定译法
|
947ac
|
学术论文
|
自然科学
|
160
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Apart from these three primary requirements, several other factors are worthy of emphasis. First, the structure or structural system must relate to the building's function. It should not be in conflict in terms of form. For example, a linear function demands a linear structure, and therefore it would be improper to roof a bowling alley with a dome. Similarly, a theater must have large, unobstructed spans, but a fine restaurant probably should not. Stated simply, the structure must be appropriate to the function it is to shelter.
Second, the structure must be fire-resistant. It is obvious that the structural system must be able to maintain its integrity at least until the occupants are safely out. Building codes specify the number of hours for which certain parts of a building must resist the heat without collapsing. The structural materials used for those elements must be inherently fire-resistant or be adequately protected by fireproofing materials. The degree of fire resistance to be provided will depend upon a number of items, including the use and occupancy load of the space, its dimensions, and the location of the building.
Third, the structure should integrate well with the building's circulation systems. It should not be in conflict with the piping systems for water and waste, the ducting systems for air, or (most important) the movement of people. It is obvious that the various building systems must be coordinated as the design progresses. One can design in a sequential step-by-step manner within any one system, but the design of all of them should move in a parallel manner toward completion. Spatially, all the various parts of a building are interdependent.
Fourth, the structure must be psychologically safe as well as physically safe. A high-rise frame that sways considerably in the wind might not actually be dangerous, but may make the building uninhabitable just the same. Lightweight floor systems that are too "bouncy" can make the users very uncomfortable. Large glass windows, uninterrupted by dividing motions, can be quite safe but will appear very insecure to the occupant standing next to them on 40 floors above the street.
Sometimes the architect must make deliberate attempts to increase the apparent strength or solidness of the structure. This apparent safety may be more important than honestly expressing the building's structure, because the untrained viewer cannot distinguish between real and perceived safety.
The building designer needs to understand the behavior of physical structures under load. An ability to intuit or "feel" structural behavior is possessed by those having much experience involving structural analysis, both qualitative and quantitative. The consequent knowledge of how forces, stresses, and deformations build up in different materials and shapes is vital to the development of this "sense". Structural analysis is the process of determining the forces and deformations in structures due to specified loads, allowing for rational design and ensuring that the safety of existing structures can be checked.
In the design of structures, it is necessary to start with a concept leading to a configuration that can then be analyzed. This is done to members can be sized and the needed reinforcing determined, in order to: a) carry the design loads without distress or excessive deformations (serviceability or working condition); and b) to prevent collapse before a specified overload has been placed on the structure(safety or ultimate condition).
Since normally elastic conditions will prevail under working loads, a structural theory based on the assumptions of elastic behavior is appropriate for determining serviceability conditions. The collapse of a structure will usually occur only long after the elastic range of the materials has been exceeded at critical points, so that an ultimate strength theory based on the inelastic behavior of the material is necessary for a rational determination of the safety of a structure against collapse. Nevertheless, an elastic theory can be used to determine a safe approximation to the strength of ductile structures (the lower bound approach of plasticity), and this approach is customarily followed in reinforced concrete practice. For this reason, only the elastic theory structure is pursued in this chapter.
Looked at critically, all structures are assemblies of three-dimensional elements, the exact analysis of which is a forbidding task even under ideal conditions and impossible to contemplate under conditions of professional practice. For this reason, an important part of the analyst's work is the simplification of the actual structure and loading conditions to a model that is susceptible to rational analysis.
Thus, a structural framing system is decomposed into a slab and floor beams which in turn frame into girders carried by columns which transmit the loads to the foundations. Since traditional structural analysis has been unable to cope with the action of the slab, this has often been idealized into a system of strips acting as beams. A Iso, long-hand methods have been unable to cope with three-dimensional framing systems, so that the entire structure has been modeled by a system of planner subassemblies, to be analyzed one at a time. The modern matrix-computer methods have revolutionized structural analysis by making it possible to analyze entire systems, thus leading to more reliable predictions about the behavior of structures under loads.
Actual loading conditions are also both difficult to determine and to express realistically, and must be simplified for purposes of analysis. Thus, traffic loads on a bridge structure, which are essentially both of dynamic and random nature, are usually idealized into statically moving standard trucks or distributed loads, intended to simulate the most severe loading conditions occurring in practice.
Similary, continuous beams are sometimes reduced to simple beams, rigid joints to pin-joints, fillers-walls are neglected, shear walls considered as beams; in deciding how to model a structure so as to make it reasonably realistic but at the same time reasonably simple, the analyst must remember that each such idealization will make the soulation more suspect. The more realistic the analysis, the greater will be the confidence which it inspires, and the smaller may be the safety factor ( or factor of ignorance). Thus, unless code provisions control, the engineer must evaluate the extra expense of a thorough analysis as compared to possible savings in the structure.
The most important use of structure analysis is as a tool in structural design. As such, it will usually be a part of a trial-and-error procedure, in which an assumed configuration with assumed dead loads is analyzed, and the members are designed in accordance with the results of the analysis. This phase is called the preliminary design, since this design is still subject to change. Usually, a crude, fast analysis method is adequate. At this stage, the cost of the structure is estimated, loads and member properties are revised, and the design is checked for possible improvements. The changes are now incorporated in the structure, a more refined analysis is performed, and the member design is revised. This project is carried out to convergence, the rapidity of which will depend on the capability of the designer. It is clear that a variety of analysis methods, ranging from " quick and dirty to exact ", are needed for design purposes.
An efficient analyst must thus be in command of the rigorous methods of analysis, must be able to reduce these to shortcut methods by appropriate assumptions, and must be aware of available design and analysis aids, as well as simplification permitted by applicable building codes. An up-to-date analyst must likewise be versed in the basics of matrix structural analysis and its use in digital computers, as well as in the use of available analysis programs or software.
|
Apart from these three primary requirements, several other factors are worthy of emphasis. First, the structure or structural system must relate to the building's function. It should not be in conflict in terms of form. For example, a linear function demands a linear structure, and therefore it would be improper to roof a bowling alley with a dome. Similarly, a theater must have large, unobstructed spans, but a fine restaurant probably should not. Stated simply, the structure must be appropriate to the function it is to shelter.
Second, the structure must be fire-resistant. It is obvious that the structural system must be able to maintain its integrity at least until the occupants are safely out. Building codes specify the number of hours for which certain parts of a building must resist the heat without collapsing. The structural materials used for those elements must be inherently fire-resistant or be adequately protected by fireproofing materials. The degree of fire resistance to be provided will depend upon a number of items, including the use and occupancy load of the space, its dimensions, and the location of the building.
Third, the structure should integrate well with the building's circulation systems. It should not be in conflict with the piping systems for water and waste, the ducting systems for air, or (most important) the movement of people. It is obvious that the various building systems must be coordinated as the design progresses. One can design in a sequential step-by-step manner within any one system, but the design of all of them should move in a parallel manner toward completion. Spatially, all the various parts of a building are interdependent.
Fourth, the structure must be psychologically safe as well as physically safe. A high-rise frame that sways considerably in the wind might not actually be dangerous, but may make the building uninhabitable just the same. Lightweight floor systems that are too "bouncy" can make the users very uncomfortable. Large glass windows, uninterrupted by dividing motions, can be quite safe but will appear very insecure to the occupant standing next to them on 40 floors above the street.
Sometimes the architect must make deliberate attempts to increase the apparent strength or solidness of the structure. This apparent safety may be more important than honestly expressing the building's structure, because the untrained viewer cannot distinguish between real and perceived safety.
The building designer needs to understand the behavior of physical structures under load. An ability to intuit or "feel" structural behavior is possessed by those having much experience involving structural analysis, both qualitative and quantitative. The consequent knowledge of how forces, stresses, and deformations build up in different materials and shapes is vital to the development of this "sense". Structural analysis is the process of determining the forces and deformations in structures due to specified loads, allowing for rational design and ensuring that the safety of existing structures can be checked.
In the design of structures, it is necessary to start with a concept leading to a configuration that can then be analyzed. This is done to members can be sized and the needed reinforcing determined, in order to: a) carry the design loads without distress or excessive deformations (serviceability or working condition); and b) to prevent collapse before a specified overload has been placed on the structure(safety or ultimate condition).
Since normally elastic conditions will prevail under working loads, a structural theory based on the assumptions of elastic behavior is appropriate for determining serviceability conditions. The collapse of a structure will usually occur only long after the elastic range of the materials has been exceeded at critical points, so that an ultimate strength theory based on the inelastic behavior of the material is necessary for a rational determination of the safety of a structure against collapse. Nevertheless, an elastic theory can be used to determine a safe approximation to the strength of ductile structures (the lower bound approach of plasticity), and this approach is customarily followed in reinforced concrete practice. For this reason, only the elastic theory structure is pursued in this chapter.
Looked at critically, all structures are assemblies of three-dimensional elements, the exact analysis of which is a forbidding task even under ideal conditions and impossible to contemplate under conditions of professional practice. For this reason, an important part of the analyst's work is the simplification of the actual structure and loading conditions to a model that is susceptible to rational analysis.
Thus, a structural framing system is decomposed into a slab and floor beams which in turn frame into girders carried by columns which transmit the loads to the foundations. Since traditional structural analysis has been unable to cope with the action of the slab, this has often been idealized into a system of strips acting as beams. A Iso, long-hand methods have been unable to cope with three-dimensional framing systems, so that the entire structure has been modeled by a system of planner subassemblies, to be analyzed one at a time. The modern matrix-computer methods have revolutionized structural analysis by making it possible to analyze entire systems, thus leading to more reliable predictions about the behavior of structures under loads.
Actual loading conditions are also both difficult to determine and to express realistically, and must be simplified for purposes of analysis. Thus, traffic loads on a bridge structure, which are essentially both of dynamic and random nature, are usually idealized into statically moving standard trucks or distributed loads, intended to simulate the most severe loading conditions occurring in practice.
Similary, continuous beams are sometimes reduced to simple beams, rigid joints to pin-joints, fillers-walls are neglected, shear walls considered as beams; in deciding how to model a structure so as to make it reasonably realistic but at the same time reasonably simple, the analyst must remember that each such idealization will make the soulation more suspect. The more realistic the analysis, the greater will be the confidence which it inspires, and the smaller may be the safety factor ( or factor of ignorance). Thus, unless code provisions control, the engineer must evaluate the extra expense of a thorough analysis as compared to possible savings in the structure.
The most important use of structure analysis is as a tool in structural design. As such, it will usually be a part of a trial-and-error procedure, in which an assumed configuration with assumed dead loads is analyzed, and the members are designed in accordance with the results of the analysis. This phase is called the preliminary design, since this design is still subject to change. Usually, a crude, fast analysis method is adequate. At this stage, the cost of the structure is estimated, loads and member properties are revised, and the design is checked for possible improvements. The changes are now incorporated in the structure, a more refined analysis is performed, and the member design is revised. This project is carried out to convergence, the rapidity of which will depend on the capability of the designer. It is clear that a variety of analysis methods, ranging from " quick and dirty to exact ", are needed for design purposes.
An efficient analyst must thus be in command of the rigorous methods of analysis, must be able to reduce these to shortcut methods by appropriate assumptions, and must be aware of available design and analysis aids, as well as simplification permitted by applicable building codes. An up-to-date analyst must likewise be versed in the basics of matrix structural analysis and its use in digital computers, as well as in the use of available analysis programs or software.
|
考点1:bouncy 可直译为 弹性,或意译为 晃动。
考点2:serviceability 译为 适用性。
考点3:working condition 译为 正常使用状态。
考点4:followed 需译为 “使用”或“应用”,不可直译为 遵循。
考点5:distributed loads 需译为 分布荷载。
|
96108
|
学术论文
|
应用学科
|
2
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
标题:从“后天”返“先天”:论丹道“炼精化气、炼气化神、炼神还虚”之内景实践与心性论
摘要:
内丹学,作为中国本土身心性命之学,其核心旨归在于实现生命的逆向飞升,即从“后天”驳杂之躯返回“先天”纯阳之体。此过程全凭一套严密的内景实践——“炼精化气、炼气化神、炼神还虚”——作为路径。本文旨在剖析这一转化过程的三个关键阶段。首先,在“炼精化气”的筑基阶段,行者如何通过凝神于下丹田,运用“武火”与“文火”,将后天有形之精,提纯为先天一炁。其次,在“炼气化神”的转捩阶段,如何以“过关服食”之法,打通小周天,使真气沿任督二脉流转,最终在泥丸宫中结成“圣胎”(婴儿)。最后,在“炼神还虚、与道合真”的终极阶段,如何打破时空幻象,实现“性命双修”之圆满,使个体神识融入宇宙太虚本体。本文认为,这一过程不仅是生理能量的转化,更是一场深刻的心性修炼,旨在降伏“心猿意马”,最终实现“身心不二”的超越性存在。
正文:
一、 筑基炼己:炼精化气与丹田之火
丹道修行的第一步,谓之“百日筑基”。此阶段的核心任务是“炼精化气”。此处的“精”,并非单指凡俗的欲望产物,而分为“后天之精”与“先天元精”。修行者首先要做的,是“勒阳关”,以求保精不失。而后,通过凝神意守下丹田,即所谓“意守玄关”,在体内点燃“无中生有之火”。丹家将此过程比喻为“采药”。当精气充盈,即“药物”已足,便需以呼吸为风箱,催动“武火”进行急速炼化,待“水火既济”,再转为“文火”温养。
这一过程充满了凶险,火候的掌握至关重要,稍有不慎则“水火未济”,前功尽弃。其本质,是将人体后天消耗性的、有形的生命能量(后天之精),通过心神的专注与呼吸的配合,逆转、提纯为一种更高级、更具创造力的生命本源能量(先天一炁)。当丹田温暖,真气流转不息,即是“筑基”成功的标志,为后续的“炼气化神”奠定了坚实基础。
二、 过关服食:炼气化神与周天运转
筑基功成,体内真气充盈,便进入“炼气化神”的关键阶段。此时,行者需将积蓄于下丹田的真气,引导打通人体最重要的两条经脉——任脉与督脉,此即“转小周天”。真气从督脉上升(“进阳火”),经尾闾、夹脊、玉枕三关,抵达头顶的泥丸宫;而后沿任脉下降(“退阴符”),回归丹田。如此循环往复,周流不息。
在周天运转的过程中,单纯的“气”在心神(神)的导引与熔炼下,逐渐转化为更高层次的能量体。这个过程被称为“过关服食”,仿佛是将自身的真气作为食物,反复哺育那居于上丹田(泥丸宫)的神。当能量积累到极致,便会在一片混沌光明中,结成所谓的“婴儿”,也称“圣胎”。此“婴儿”并非实体,而是修行者纯阳之神与先天一炁高度凝聚的产物,是超越凡俗肉身的另一个“真我”的雏形。它的出现,标志着“炼气化神”的初步成功。
三、 粉碎虚空:炼神还虚与性命合一
“圣胎”既成,便进入丹道修行的最高阶段——“炼神还虚”。此处的“炼神”,是指将已经凝聚成形的“婴儿”进一步温养,使其发育成熟,最终能够“出窍”,即神识可以自由离开肉体而独立存在。这一步被称为“九年面壁”或“乳哺”。
当“婴儿”长大,神通具足,修行的最后一步便是“炼神还虚,与道合真”。这要求修行者连同这个凝聚了自身全部精华的“婴儿”也一并放下,即“打破虚空”。修行者需认识到,即便是这个纯阳的“圣胎”,也仍是“道”所化生的一种“有”,仍非最终的“无”。通过甚深禅定,最终粉碎一切能所、主客的对立,将个体神识彻底消融于无边无际、无始无终的宇宙本体——“太虚”之中。至此,“性命双修”方告圆满,完成了从凡俗生命到与道合一的伟大回归。这不仅是技术的终点,更是心性的彻底解脱。
结论:内丹学对现代身心观的启示
内丹学这套繁复的符号与实践体系,其本质是对“身心不二”理念的极致探索。它所描述的“内景”,既是生理能量的真实体验,也是心灵意象的投射。在笛卡尔式身心二元论影响深远的今天,内丹学提醒我们,身体并非一个可供意识随意驱使的、无生命的机器。恰恰相反,身体本身就是一个充满智慧的宇宙,蕴藏着生命转化的巨大潜能。重新理解“炼精化气”中对生命本源的珍惜,“炼气化神”中意识与能量的共舞,以及“炼神还虚”中对“终极实在”的追问,对于我们克服现代性的身心分离,具有深刻的启示意义。
|
标题:从“后天”返“先天”:论丹道“炼精化气、炼气化神、炼神还虚”之内景实践与心性论
摘要:
内丹学,作为中国本土身心性命之学,其核心旨归在于实现生命的逆向飞升,即从“后天”驳杂之躯返回“先天”纯阳之体。此过程全凭一套严密的内景实践——“炼精化气、炼气化神、炼神还虚”——作为路径。本文旨在剖析这一转化过程的三个关键阶段。首先,在“炼精化气”的筑基阶段,行者如何通过凝神于下丹田,运用“武火”与“文火”,将后天有形之精,提纯为先天一炁。其次,在“炼气化神”的转捩阶段,如何以“过关服食”之法,打通小周天,使真气沿任督二脉流转,最终在泥丸宫中结成“圣胎”(婴儿)。最后,在“炼神还虚、与道合真”的终极阶段,如何打破时空幻象,实现“性命双修”之圆满,使个体神识融入宇宙太虚本体。本文认为,这一过程不仅是生理能量的转化,更是一场深刻的心性修炼,旨在降伏“心猿意马”,最终实现“身心不二”的超越性存在。
正文:
一、 筑基炼己:炼精化气与丹田之火
丹道修行的第一步,谓之“百日筑基”。此阶段的核心任务是“炼精化气”。此处的“精”,并非单指凡俗的欲望产物,而分为“后天之精”与“先天元精”。修行者首先要做的,是“勒阳关”,以求保精不失。而后,通过凝神意守下丹田,即所谓“意守玄关”,在体内点燃“无中生有之火”。丹家将此过程比喻为“采药”。当精气充盈,即“药物”已足,便需以呼吸为风箱,催动“武火”进行急速炼化,待“水火既济”,再转为“文火”温养。
这一过程充满了凶险,火候的掌握至关重要,稍有不慎则“水火未济”,前功尽弃。其本质,是将人体后天消耗性的、有形的生命能量(后天之精),通过心神的专注与呼吸的配合,逆转、提纯为一种更高级、更具创造力的生命本源能量(先天一炁)。当丹田温暖,真气流转不息,即是“筑基”成功的标志,为后续的“炼气化神”奠定了坚实基础。
二、 过关服食:炼气化神与周天运转
筑基功成,体内真气充盈,便进入“炼气化神”的关键阶段。此时,行者需将积蓄于下丹田的真气,引导打通人体最重要的两条经脉——任脉与督脉,此即“转小周天”。真气从督脉上升(“进阳火”),经尾闾、夹脊、玉枕三关,抵达头顶的泥丸宫;而后沿任脉下降(“退阴符”),回归丹田。如此循环往复,周流不息。
在周天运转的过程中,单纯的“气”在心神(神)的导引与熔炼下,逐渐转化为更高层次的能量体。这个过程被称为“过关服食”,仿佛是将自身的真气作为食物,反复哺育那居于上丹田(泥丸宫)的神。当能量积累到极致,便会在一片混沌光明中,结成所谓的“婴儿”,也称“圣胎”。此“婴儿”并非实体,而是修行者纯阳之神与先天一炁高度凝聚的产物,是超越凡俗肉身的另一个“真我”的雏形。它的出现,标志着“炼气化神”的初步成功。
三、 粉碎虚空:炼神还虚与性命合一
“圣胎”既成,便进入丹道修行的最高阶段——“炼神还虚”。此处的“炼神”,是指将已经凝聚成形的“婴儿”进一步温养,使其发育成熟,最终能够“出窍”,即神识可以自由离开肉体而独立存在。这一步被称为“九年面壁”或“乳哺”。
当“婴儿”长大,神通具足,修行的最后一步便是“炼神还虚,与道合真”。这要求修行者连同这个凝聚了自身全部精华的“婴儿”也一并放下,即“打破虚空”。修行者需认识到,即便是这个纯阳的“圣胎”,也仍是“道”所化生的一种“有”,仍非最终的“无”。通过甚深禅定,最终粉碎一切能所、主客的对立,将个体神识彻底消融于无边无际、无始无终的宇宙本体——“太虚”之中。至此,“性命双修”方告圆满,完成了从凡俗生命到与道合一的伟大回归。这不仅是技术的终点,更是心性的彻底解脱。
结论:内丹学对现代身心观的启示
内丹学这套繁复的符号与实践体系,其本质是对“身心不二”理念的极致探索。它所描述的“内景”,既是生理能量的真实体验,也是心灵意象的投射。在笛卡尔式身心二元论影响深远的今天,内丹学提醒我们,身体并非一个可供意识随意驱使的、无生命的机器。恰恰相反,身体本身就是一个充满智慧的宇宙,蕴藏着生命转化的巨大潜能。重新理解“炼精化气”中对生命本源的珍惜,“炼气化神”中意识与能量的共舞,以及“炼神还虚”中对“终极实在”的追问,对于我们克服现代性的身心分离,具有深刻的启示意义。
|
考点1:“炼精化气、炼气化神、炼神还虚”必须译为:“Refining Essence into Qi, Refining Qi into Spirit, and Refining Spirit to Return to the Void”或“refining essence into qi, refining qi into spirit, refining spirit to return to emptiness”
考点2:“后天” vs. “先天”必须译为:“Postnatal” vs. “Prenatal” ;
考点3:“心猿意马”推荐译为:“the restless and untamed mind”
考点4:“性命双修”必须译为:“the dual cultivation of Nature and Life-Destiny”或“double cultivation of nature and life”
考点5:“丹田”必须译为:“Dantian”;“dantian”
考点6:“周天”必须译为:“ Microcosmic Orbit”或“ microcosmic orbit”
考点7:“婴儿”必须译为:“ Sacred Embryo”或“sacred embryo (infant)”
考点8:“采药” 推荐译为:“gathering the elixir ”
考点9:“身心不二”必须译为:“the non-duality of body and mind”或“mind-body non-duality”
考点10:“乳哺”必须译为:“nursing”
考点11:“打通”必须译为:“to open up”;“to open”
|
96602
|
学术论文
|
人文科学
|
132
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
一、出生努尔哈赤, 中国历史上最后一个封建王朝的奠基人。金庸称他为“自成吉思汗以来, 四百多年中全世界从未出现过的军事天才”。努尔哈赤于1559年2月21日, 出生在赫图阿拉 (也就是今辽宁省新宾县) 建州一个小部酋长的家里。努尔哈赤的祖父叫觉昌安, 是后被清朝追尊为兴祖直皇帝的第四子, 而努尔哈赤的父亲也是觉昌安的第四子塔克世, 母亲是喜塔喇·厄墨气, 努尔哈赤还有两个弟弟, 名字分别为舒尔哈齐, 雅尔哈齐。父亲觉昌安是当时明朝所封的建州左卫枝部酋长, 也就是相当于明官的都指挥使, 人少势弱, 早先依附建州“强酋”王杲, 常率领部众进入抚顺马市交易, 以麻布、粮食交换猪牛, 领取抚赏的食盐、红布、兀剌等物。 (1574年) 因王杲抗命, 扰民抢掠, 扩大实力, 有不轨之心。明朝辽东总兵官李成梁率军数万, 攻打王杲之寨, 并取之, 还杀掠人畜殆尽, 其父觉昌安、其祖父塔克世为平息战火, 充当明军向导, 劝说王杲罢兵息战。 (1583年) 王杲之子阿台图为报父仇, 攻打边境, 李成梁再率大军出击, 取阿台的古勒寨以及其同党阿海的莽子寨, 杀阿台, “杲自是子孙靡孑遗”。觉昌安、塔克世再次作为明军向导, 战乱中被明兵误杀。后来, 明朝认识到误杀的错误, 归还其祖塔克世、其父觉昌安遗体, 并赔“敕书三十道, 马三十匹, 封龙虎将军, 复给都督敕书”。听到这个信息的努尔哈赤本想起兵为父仇, 但当时的他才二十五岁, 势单力薄, 怎么可能与拥有百万兵马的大明“皇帝”交锋?无可奈何之下, 努尔哈赤越过建州左卫图伦城主尼堪外兰, 上奏明臣指责其唆使明兵杀害父、祖, 并索要当时杀害祖和父的明兵。不料这一要求, 惹恼了当时的明朝边将, 被视为无理取闹, 并一口拒绝, 还宣称要于甲板筑城, 令尼堪外兰为“满洲国主”, 因而尼堪外兰威望大升, “于是国人信之, 皆归尼堪外兰”, 连亲族子弟也“对神立誓”, 要杀努尔哈赤以换取大明朝的信任, 尼堪外兰也乘机逼努尔哈赤向他“依附”, 俨然以建州国君自居。二、发展1583年5月, 努尔哈赤以十三副铠甲、部众三十人起兵。先后吞并了其他建州部落, 栋鄂部、海西叶赫、乌拉、哈达强部这些小的部落, 再降服建州、海西、“野人”数以万计的女真, 建立后金国, 登上女真王的宝座。这就是历史上的努尔哈赤了, 不过学生认为, 努尔哈赤会崛起也不是没有条件的, 因为就所看到的史料上记载, 当时的明朝将领有好多都是不可一世, 以为努尔哈赤一个小小的部落, 人又没有多少, 也翻不起什么大浪。就算看出了那个势头, 也完全不放在眼中。如果说当时的明将在努尔哈赤刚刚攻打别的小部的时候就制止了他的话, 那努尔哈赤要崛起也是很难的, 可是当时的明将却是事不关己, 高高挂起, 就是没有想到星星之火也能燎原, 不及时扑灭, 最后烧到了自己的身上。不过明将的放之任之是一个原因, 但还不是全部, 当时的建州各部太过于软弱, 因为有了几年的安心生活, 就忘了居安思危, 没有了那份热血和反抗的精神, 一有事就只知道找明朝或别的部落帮忙, 如果别人不帮, 那就只有等死。还有, 遇到事的时候各部还在计较着自己的利益, 并没有想到唇亡齿寒这个道理。所以让努尔哈赤各个击破, 这也是一个原因。还有的学生认为, 在中国人的心中有一个信念, 那就是父仇不共代天, 仇恨也是让努尔哈赤成功的一种动力。他的父亲和祖父本来是帮明朝带路的, 可明朝的士兵却将他们杀了, 事后明朝仅仅以“敕书三十道, 马三十匹, 封龙虎将军, 复给都督敕书”就想把他们打发了。让交出那个杀人的士兵, 还有严罚那个背后的指使人, 也算是人之常情, 可明将不干不说, 还把他的仇人封了大官, 这不是分明是说:“我就是要杀你的父亲、祖父, 你能把我咋样?”这无疑是火上浇油。努尔哈赤就觉得这是一种很大的耻辱, 他这时不只是想为父报仇, 还有对明将的一种恼怒, 所以他定会奋发图强。这是一个人的本性, 也可以说是一种原因。
|
一、出生努尔哈赤, 中国历史上最后一个封建王朝的奠基人。金庸称他为“自成吉思汗以来, 四百多年中全世界从未出现过的军事天才”。努尔哈赤于1559年2月21日, 出生在赫图阿拉 (也就是今辽宁省新宾县) 建州一个小部酋长的家里。努尔哈赤的祖父叫觉昌安, 是后被清朝追尊为兴祖直皇帝的第四子, 而努尔哈赤的父亲也是觉昌安的第四子塔克世, 母亲是喜塔喇·厄墨气, 努尔哈赤还有两个弟弟, 名字分别为舒尔哈齐, 雅尔哈齐。父亲觉昌安是当时明朝所封的建州左卫枝部酋长, 也就是相当于明官的都指挥使, 人少势弱, 早先依附建州“强酋”王杲, 常率领部众进入抚顺马市交易, 以麻布、粮食交换猪牛, 领取抚赏的食盐、红布、兀剌等物。 (1574年) 因王杲抗命, 扰民抢掠, 扩大实力, 有不轨之心。明朝辽东总兵官李成梁率军数万, 攻打王杲之寨, 并取之, 还杀掠人畜殆尽, 其父觉昌安、其祖父塔克世为平息战火, 充当明军向导, 劝说王杲罢兵息战。 (1583年) 王杲之子阿台图为报父仇, 攻打边境, 李成梁再率大军出击, 取阿台的古勒寨以及其同党阿海的莽子寨, 杀阿台, “杲自是子孙靡孑遗”。觉昌安、塔克世再次作为明军向导, 战乱中被明兵误杀。后来, 明朝认识到误杀的错误, 归还其祖塔克世、其父觉昌安遗体, 并赔“敕书三十道, 马三十匹, 封龙虎将军, 复给都督敕书”。听到这个信息的努尔哈赤本想起兵为父仇, 但当时的他才二十五岁, 势单力薄, 怎么可能与拥有百万兵马的大明“皇帝”交锋?无可奈何之下, 努尔哈赤越过建州左卫图伦城主尼堪外兰, 上奏明臣指责其唆使明兵杀害父、祖, 并索要当时杀害祖和父的明兵。不料这一要求, 惹恼了当时的明朝边将, 被视为无理取闹, 并一口拒绝, 还宣称要于甲板筑城, 令尼堪外兰为“满洲国主”, 因而尼堪外兰威望大升, “于是国人信之, 皆归尼堪外兰”, 连亲族子弟也“对神立誓”, 要杀努尔哈赤以换取大明朝的信任, 尼堪外兰也乘机逼努尔哈赤向他“依附”, 俨然以建州国君自居。二、发展1583年5月, 努尔哈赤以十三副铠甲、部众三十人起兵。先后吞并了其他建州部落, 栋鄂部、海西叶赫、乌拉、哈达强部这些小的部落, 再降服建州、海西、“野人”数以万计的女真, 建立后金国, 登上女真王的宝座。这就是历史上的努尔哈赤了, 不过学生认为, 努尔哈赤会崛起也不是没有条件的, 因为就所看到的史料上记载, 当时的明朝将领有好多都是不可一世, 以为努尔哈赤一个小小的部落, 人又没有多少, 也翻不起什么大浪。就算看出了那个势头, 也完全不放在眼中。如果说当时的明将在努尔哈赤刚刚攻打别的小部的时候就制止了他的话, 那努尔哈赤要崛起也是很难的, 可是当时的明将却是事不关己, 高高挂起, 就是没有想到星星之火也能燎原, 不及时扑灭, 最后烧到了自己的身上。不过明将的放之任之是一个原因, 但还不是全部, 当时的建州各部太过于软弱, 因为有了几年的安心生活, 就忘了居安思危, 没有了那份热血和反抗的精神, 一有事就只知道找明朝或别的部落帮忙, 如果别人不帮, 那就只有等死。还有, 遇到事的时候各部还在计较着自己的利益, 并没有想到唇亡齿寒这个道理。所以让努尔哈赤各个击破, 这也是一个原因。还有的学生认为, 在中国人的心中有一个信念, 那就是父仇不共代天, 仇恨也是让努尔哈赤成功的一种动力。他的父亲和祖父本来是帮明朝带路的, 可明朝的士兵却将他们杀了, 事后明朝仅仅以“敕书三十道, 马三十匹, 封龙虎将军, 复给都督敕书”就想把他们打发了。让交出那个杀人的士兵, 还有严罚那个背后的指使人, 也算是人之常情, 可明将不干不说, 还把他的仇人封了大官, 这不是分明是说:“我就是要杀你的父亲、祖父, 你能把我咋样?”这无疑是火上浇油。努尔哈赤就觉得这是一种很大的耻辱, 他这时不只是想为父报仇, 还有对明将的一种恼怒, 所以他定会奋发图强。这是一个人的本性, 也可以说是一种原因。
|
考点1:人名、地名不能译错:努尔哈赤(Nurhaci)、金庸(Louis Cha Leung-yung )、 成吉思汗(Genghis Khan)、赫图阿拉(Hetu Ala)觉昌安 (Giocangga)、塔克世(Taksi)、喜塔喇·厄墨气(Hitara Emeci)、舒尔哈齐(Surgaci)、雅尔哈齐(Yargaci)、阿台图(Atatu或Atai)、尼堪外兰(nikan wailan)、图伦(turun hoton)。
考点2: ”兀剌”应译为“boots”,在元语中表示靴子。
考点3:“ 不轨之心”应译为“rebellious intensions”。
考点4: ”敕书“应译为“Command paper ”。
考点5:”唇亡齿寒”应译为“if the lips are gone, the teeth will be cold (implying that two parties are interdependent)”,解释具体含义
考点6:“学生认为”翻译为“student believes”
|
98d57
|
学术论文
|
人文科学
|
54
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
“大气的热状况与大气运动——热力环流”
教学设计
陕西省渭南市大荔县大荔中学 刘 瑞
一、设计思路
(一) 教学指导思想
《普通高中课程标准》对本节的要求是“运用热力环流的形成原理”,要学会灵活运用解释生活中的一些现象。此要求是在这节课的教学指导思想和教学依据。
(二) 设计理念
本节课的教学,和现实生活相联系,并采用情景教学,活动探究、问题讨论、对比分析的教学方法,充分体现“教师为主导,学生为主体”的教育理念,放手让学生自主探索的学习,主动参与到知识形成整个思维的过程,力求使学生在积极、愉快的课堂中提高自己的水平。
(三) 教材分析
新课标要求:运用图表说明大气的受热过程。热力环流是大气运动最简单的形式,在本单元中有着举足轻重的作用,是后面学习“风”“全球性大气环流”“常见的天气系统”等知识的基础。同时,热力环流的形成过程和形成原理又是一个难点,很多学生在学习后仍然思维模糊,概念混淆。如何才能突破这个难点,只有在教学过程中遵循学生的认识规律,循序渐进,步步深入,才能让学生更好地接受。因此在讲大气热力环流时采取大气运动由静态到动态的发生过程,直观深入地展示大气环流发生时气温、气压、气流 3 者之间的关系,即可突破难点。
大气热力环流是大气不均匀受热的结果。大气不均匀受热主要是由太阳辐射的纬度差异和下垫面热力性质差异引起的。冷热不均是大气运动的根本原因,大气热力环流则是理解许多大气运动的理论基础。小到城市热岛环流,大到全球性大气环流,都可以用大气热力环流的原理来解释。热力环流是本节的重点,要讲清两个问题:一是大气的垂直运动是由于地面冷热不均产生的(大气垂直运动直接影响天气的变化);二是大气的水平运动是由于大气的垂直运动导致在同一水平面上产生气压差异(大气水平运动直接影响热量与水汽的输送)。
(四) 学情分析
新课标中高中地理教材比较强调知识的应用,这与初中地理学习有很大的不同。由于学生在学习的过程中缺乏相关的知识,学生在学习的过程中往往会碰到比较多的问题,教材的重难点也教多,在学习的过程中,学生要处理好这些重难点是有一定的困难的。但是,学生对学习这些内容。如“热力环流”这一重难点的掌握。从教材的内容安排来看,这一重难点安排在第二章,高一新生的物理基础知识还不是十分好,要理解“热力环流”的形成必须掌握物理学习中有关“大气受热不同对气压的影响”的相关知识。在学习过程中,学生通过具体例子的分析来理解“热力环流”可以达到事半功倍的学习效果。
二、教学目标
知识与技能:
1、掌握热力环流的定义,熟练阅读热力环流示意图,理解热力环流的形成过程。
2、通过绘制热力环流图,培养学生的绘图能力。
3、能够利用热力环流原理,解答生产、生活中的局地环流问题,达到知识拓展的目的。
过程与方法:
本节课遵循由问题→多媒体演示获得感性认识→分析推理运动过程→归纳概括运动规律(理性认识)→给出实际生活案例→应用规律解决实际问题的教学主线,在此过程中进一步培养学生用分析、推理、归纳等方法学习地理知识。
情感态度与价值观:通过分析、理解、观察热力环流和局地环流,培养学生探索自然、热爱科学的精神。通过对城市风、山谷风等内容的学习,进一步提高学生的环境意识。现代教学手段:
运用多媒体辅助教学提高学生读图能力。
三、教学重点
热力环流的形成过程及应用
四、 教学难点
运用热力环流原理分析绘制海陆风、城市风、山谷风形成
五、 教学反思
1、课时的安排:1 课时。
2、这节课的三维目标比较合理,围绕知识点来展开。
3、这节课的理论性强,内容较抽象,另外学生必备的空间建构能力还较弱,所以授课时我用必要的多媒体课件解决这两个问题,变抽象为直观,变二维为三维。利用这个手段不仅降低了知识的难度,更是极大的调动了学生的热情和探究欲望。在运用原理分析实际问题时,联系学生身边的地理问题,引导其分析最熟悉的海陆风、城市风、山谷风,调动学生学习的主动性,激发学生探究问题的精神,使学生学习到对终身发展有用的地理。同时提前让学生利用互联网收集有关城市热岛的地理信息,培养学生在信息时代的信息收集能力。总之,通过三个案例的反复分析,不仅使知识顺利迁移拓展,而且最终突破了本节课难点。
4、在教学中,设计问题时注重问题的难易结合,由浅入深,符合教学规律和认识方法。并且在教学过程中,注意及时进行每个环节的小结,强调重点内容,争取使学生当堂记忆消化。
|
“大气的热状况与大气运动——热力环流”
教学设计
陕西省渭南市大荔县大荔中学 刘 瑞
一、设计思路
(一) 教学指导思想
《普通高中课程标准》对本节的要求是“运用热力环流的形成原理”,要学会灵活运用解释生活中的一些现象。此要求是在这节课的教学指导思想和教学依据。
(二) 设计理念
本节课的教学,和现实生活相联系,并采用情景教学,活动探究、问题讨论、对比分析的教学方法,充分体现“教师为主导,学生为主体”的教育理念,放手让学生自主探索的学习,主动参与到知识形成整个思维的过程,力求使学生在积极、愉快的课堂中提高自己的水平。
(三) 教材分析
新课标要求:运用图表说明大气的受热过程。热力环流是大气运动最简单的形式,在本单元中有着举足轻重的作用,是后面学习“风”“全球性大气环流”“常见的天气系统”等知识的基础。同时,热力环流的形成过程和形成原理又是一个难点,很多学生在学习后仍然思维模糊,概念混淆。如何才能突破这个难点,只有在教学过程中遵循学生的认识规律,循序渐进,步步深入,才能让学生更好地接受。因此在讲大气热力环流时采取大气运动由静态到动态的发生过程,直观深入地展示大气环流发生时气温、气压、气流 3 者之间的关系,即可突破难点。
大气热力环流是大气不均匀受热的结果。大气不均匀受热主要是由太阳辐射的纬度差异和下垫面热力性质差异引起的。冷热不均是大气运动的根本原因,大气热力环流则是理解许多大气运动的理论基础。小到城市热岛环流,大到全球性大气环流,都可以用大气热力环流的原理来解释。热力环流是本节的重点,要讲清两个问题:一是大气的垂直运动是由于地面冷热不均产生的(大气垂直运动直接影响天气的变化);二是大气的水平运动是由于大气的垂直运动导致在同一水平面上产生气压差异(大气水平运动直接影响热量与水汽的输送)。
(四) 学情分析
新课标中高中地理教材比较强调知识的应用,这与初中地理学习有很大的不同。由于学生在学习的过程中缺乏相关的知识,学生在学习的过程中往往会碰到比较多的问题,教材的重难点也教多,在学习的过程中,学生要处理好这些重难点是有一定的困难的。但是,学生对学习这些内容。如“热力环流”这一重难点的掌握。从教材的内容安排来看,这一重难点安排在第二章,高一新生的物理基础知识还不是十分好,要理解“热力环流”的形成必须掌握物理学习中有关“大气受热不同对气压的影响”的相关知识。在学习过程中,学生通过具体例子的分析来理解“热力环流”可以达到事半功倍的学习效果。
二、教学目标
知识与技能:
1、掌握热力环流的定义,熟练阅读热力环流示意图,理解热力环流的形成过程。
2、通过绘制热力环流图,培养学生的绘图能力。
3、能够利用热力环流原理,解答生产、生活中的局地环流问题,达到知识拓展的目的。
过程与方法:
本节课遵循由问题→多媒体演示获得感性认识→分析推理运动过程→归纳概括运动规律(理性认识)→给出实际生活案例→应用规律解决实际问题的教学主线,在此过程中进一步培养学生用分析、推理、归纳等方法学习地理知识。
情感态度与价值观:通过分析、理解、观察热力环流和局地环流,培养学生探索自然、热爱科学的精神。通过对城市风、山谷风等内容的学习,进一步提高学生的环境意识。现代教学手段:
运用多媒体辅助教学提高学生读图能力。
三、教学重点
热力环流的形成过程及应用
四、 教学难点
运用热力环流原理分析绘制海陆风、城市风、山谷风形成
五、 教学反思
1、课时的安排:1 课时。
2、这节课的三维目标比较合理,围绕知识点来展开。
3、这节课的理论性强,内容较抽象,另外学生必备的空间建构能力还较弱,所以授课时我用必要的多媒体课件解决这两个问题,变抽象为直观,变二维为三维。利用这个手段不仅降低了知识的难度,更是极大的调动了学生的热情和探究欲望。在运用原理分析实际问题时,联系学生身边的地理问题,引导其分析最熟悉的海陆风、城市风、山谷风,调动学生学习的主动性,激发学生探究问题的精神,使学生学习到对终身发展有用的地理。同时提前让学生利用互联网收集有关城市热岛的地理信息,培养学生在信息时代的信息收集能力。总之,通过三个案例的反复分析,不仅使知识顺利迁移拓展,而且最终突破了本节课难点。
4、在教学中,设计问题时注重问题的难易结合,由浅入深,符合教学规律和认识方法。并且在教学过程中,注意及时进行每个环节的小结,强调重点内容,争取使学生当堂记忆消化。
|
考点1:《普通高中课程标准》应译为”Senior High School Curriculum Standards”
考点2:"情景教学"应译为“Context-Based Instruction”
考点3:"直观"应译为“straightforward”
考点4:"一课时"翻译为“45minutes”
|
9ae4b
|
垂类场景
|
教育
|
66
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
3.1 Similarities
The purpose of all advertising is to familiarize consumers with or remind them of the benefits of particular products in the hope of increasing sales, and the techniques used by advertisers do not vary markedly. An advertisement is often merely glimpsed in passing and so, to be effective, its message must be colorful, legible, understandable and memorable. The rules governing the language of advertising are similar. We have summarized the lexical features of English advertisements. If words are leaves of a tree, and sentences branches; the branches must also possess their similarities.
First, length of a sentence in advertising is usually short. A sentence in daily consumer goods ads has 10.3 words on average; in technical equipment ads, 11.8 words; in service ads, 12.3 words.
Second, as to sentence structure, simple sentences and elliptical sentences are often used in advertisements. Compared with complex sentences, simple sentences are more understandable and forceful. Elliptical sentences are actually incomplete in structure but complete in meaning. The adoption of elliptical sentences can spare more print space, and take less time for readers to finish reading. In addition, a group of sentence fragments may gain special advertising effectiveness. Let us compare the following two advertisements.
a. Baked. Drenched. Tested to the extreme. A Motorola cellular phone …
b. The Motorola cellular phone are baked and drenched to extreme.
Obviously, by using elliptical structure, sentence a is far more brief, eye-catching and forceful than sentence b. What’s more, it conveys attitudes that sentence b lacks. Sentence a implies a kind of appreciation for the phone, by splitting the sentence into several fragments and rearranging its word order. Therefore skillful arrangement of elliptical sentences may add color to a sentence.
Third, as to sentence patterns, interrogative sentences and imperative sentences are heavily used in English advertisements. Imperative sentences are short, encouraging and forceful. They are used to arouse audiences’ wants or encourage them to buy something.
3.2 Differences
3.2.1 Headline
The term Headline refers to the sentences in the leading position of the advertisement—the words that will be read first or that are positioned to draw the most attention. Therefore, headlines are usually set in larger type than other portions of the advertisement. Research (Coutland L. Bovee & William F. Arens, 1992:294) has shown that, on average, three to five times as many people read the headline as read the body copy. Therefore, if the advertiser hasn’t done some selling in the headline, he has wasted the greatest percent of his money. So it might be suggested that advertisers should not be afraid of long headlines.
A headline has numerous functions. First of all, the headline must attract attention to the advertisement fast. It should take only a few seconds to capture the reader’s attention. Otherwise, the entire message may be lost. A headline also selects the reader, that is, it tells whether the advertisement’s subject matter interests the reader. The idea is to engage and involve the reader, suggesting a reason to read the rest of the advertisement. Therefore, the headline is the most important in an advertisement.
Generally, we can classify effective advertising headlines into five basic categories: benefit headline, provocative headline, news/information headline, question headline, and command headline.
Benefit headlines make a direct promise to the reader. News/information headlines include many of the how-to headlines and headlines that seek to gain identification for their sponsors by announcing some news or providing some promise of information. Provocative headlines are used to provoke the reader’s curiosity. To learn more, the reader must read the body copy. A question headline will pique the reader’s curiosity and imagination by asking a question that the reader is interested in. A command headline orders the reader to do something. It motivates the reader through fear or emotion or because the reader understands the inherent correctness of the command.
4.1 Body Copy of an Advertisement
In general, a written advertisement consists of five parts: headline, body copy, slogan, illustration and trade mark among which headline, body copy and slogan are the main parts. Headline plays a role in catching attention from readers; slogan can be used as a device to create a corporate image and a common practice to conclude advertisement.
In this section we will discuss the body copy as a discourse component. The advertiser tells the complete sales story in the body copy. Set in smaller type than headlines or subheads, the body copy is a logical continuation of the headline and subheads. It is also where the sale is closed. The body copy should relate to the campaign appeal and to the reader’s self-interest, and it must explain how the product or service being advertised satisfies the customer’s need. The body copy may concentrate on one or several benefits as they relate specifically to the target audience. In some cases, especially in daily goods ads, body copy is omitted just because readers know what they are.
4.2 Differences in Body Copy s
Copy s fall into many categories. Some common types of copy s include straight-sell copy, institutional copy, narrative copy, dialogue/monologue copy.
In a straight-sell copy, the text immediately explains or develops the headline in a straightforward attempt to sell the product. Since the product’s sales points are ticked off in order of their importance, straight-sell copy is particularly advantageous for technical products that may be difficult to use in direct-mail advertising and industrial situations. Many camera ads, for example, use this straight, factual copy to get the message across. The straight-sell approach emphasizes the reason why the consumer should buy something. For example:
Pick up right where you left off with the new C-2000 ZOOM filmless digital camera.
You loved taking pictures then. You’ll love it even more now with the 2.1 megapixel C-2000 ZOOM. It’ll remind you of your favorite film camera of yesterday, but with all the advantages Olympus filmless photography offers today. Only the C-2000 ZOOM, for example, incorporates an all-glass, aspherical 3x zoom lens system featuring a large aperture f2.0 lens that’s exceptionally fast and bright. Along with automatic or manual features like aperture and shutter priority, spot metering, exposure compensation, white balance and ISO settings. And just like your film camera, the C-2000 ZOOM grows with you when you add external flash, lighting equipment, lenses or filter. So bring back old memories while creating new ones with the C-2000 ZOOM from Olympus--THE WORLD LEADER IN FILM AND FILMLESS PHOTOGRAPHY.
Sometimes the advertiser uses the institutional copy to sell an idea or the merits of the organization or service rather than sales features of a particular product. Often institutional copy is also narrative in because it lends warmth to the organization. Service ads, such as ads of banks, insurance companies, public utilities, and large manufacturing concerns are the most common users of the institutional copy.
Advertisers use the narrative copy to tell a story. It often sets up a problem and then creates a solution using the particular sales features of the product or service. It may then suggest that the audiences use the same solution if they have that problem. Service advertisements are often written in this .
|
3.1 Similarities
The purpose of all advertising is to familiarize consumers with or remind them of the benefits of particular products in the hope of increasing sales, and the techniques used by advertisers do not vary markedly. An advertisement is often merely glimpsed in passing and so, to be effective, its message must be colorful, legible, understandable and memorable. The rules governing the language of advertising are similar. We have summarized the lexical features of English advertisements. If words are leaves of a tree, and sentences branches; the branches must also possess their similarities.
First, length of a sentence in advertising is usually short. A sentence in daily consumer goods ads has 10.3 words on average; in technical equipment ads, 11.8 words; in service ads, 12.3 words.
Second, as to sentence structure, simple sentences and elliptical sentences are often used in advertisements. Compared with complex sentences, simple sentences are more understandable and forceful. Elliptical sentences are actually incomplete in structure but complete in meaning. The adoption of elliptical sentences can spare more print space, and take less time for readers to finish reading. In addition, a group of sentence fragments may gain special advertising effectiveness. Let us compare the following two advertisements.
a. Baked. Drenched. Tested to the extreme. A Motorola cellular phone …
b. The Motorola cellular phone are baked and drenched to extreme.
Obviously, by using elliptical structure, sentence a is far more brief, eye-catching and forceful than sentence b. What’s more, it conveys attitudes that sentence b lacks. Sentence a implies a kind of appreciation for the phone, by splitting the sentence into several fragments and rearranging its word order. Therefore skillful arrangement of elliptical sentences may add color to a sentence.
Third, as to sentence patterns, interrogative sentences and imperative sentences are heavily used in English advertisements. Imperative sentences are short, encouraging and forceful. They are used to arouse audiences’ wants or encourage them to buy something.
3.2 Differences
3.2.1 Headline
The term Headline refers to the sentences in the leading position of the advertisement—the words that will be read first or that are positioned to draw the most attention. Therefore, headlines are usually set in larger type than other portions of the advertisement. Research (Coutland L. Bovee & William F. Arens, 1992:294) has shown that, on average, three to five times as many people read the headline as read the body copy. Therefore, if the advertiser hasn’t done some selling in the headline, he has wasted the greatest percent of his money. So it might be suggested that advertisers should not be afraid of long headlines.
A headline has numerous functions. First of all, the headline must attract attention to the advertisement fast. It should take only a few seconds to capture the reader’s attention. Otherwise, the entire message may be lost. A headline also selects the reader, that is, it tells whether the advertisement’s subject matter interests the reader. The idea is to engage and involve the reader, suggesting a reason to read the rest of the advertisement. Therefore, the headline is the most important in an advertisement.
Generally, we can classify effective advertising headlines into five basic categories: benefit headline, provocative headline, news/information headline, question headline, and command headline.
Benefit headlines make a direct promise to the reader. News/information headlines include many of the how-to headlines and headlines that seek to gain identification for their sponsors by announcing some news or providing some promise of information. Provocative headlines are used to provoke the reader’s curiosity. To learn more, the reader must read the body copy. A question headline will pique the reader’s curiosity and imagination by asking a question that the reader is interested in. A command headline orders the reader to do something. It motivates the reader through fear or emotion or because the reader understands the inherent correctness of the command.
4.1 Body Copy of an Advertisement
In general, a written advertisement consists of five parts: headline, body copy, slogan, illustration and trade mark among which headline, body copy and slogan are the main parts. Headline plays a role in catching attention from readers; slogan can be used as a device to create a corporate image and a common practice to conclude advertisement.
In this section we will discuss the body copy as a discourse component. The advertiser tells the complete sales story in the body copy. Set in smaller type than headlines or subheads, the body copy is a logical continuation of the headline and subheads. It is also where the sale is closed. The body copy should relate to the campaign appeal and to the reader’s self-interest, and it must explain how the product or service being advertised satisfies the customer’s need. The body copy may concentrate on one or several benefits as they relate specifically to the target audience. In some cases, especially in daily goods ads, body copy is omitted just because readers know what they are.
4.2 Differences in Body Copy s
Copy s fall into many categories. Some common types of copy s include straight-sell copy, institutional copy, narrative copy, dialogue/monologue copy.
In a straight-sell copy, the text immediately explains or develops the headline in a straightforward attempt to sell the product. Since the product’s sales points are ticked off in order of their importance, straight-sell copy is particularly advantageous for technical products that may be difficult to use in direct-mail advertising and industrial situations. Many camera ads, for example, use this straight, factual copy to get the message across. The straight-sell approach emphasizes the reason why the consumer should buy something. For example:
Pick up right where you left off with the new C-2000 ZOOM filmless digital camera.
You loved taking pictures then. You’ll love it even more now with the 2.1 megapixel C-2000 ZOOM. It’ll remind you of your favorite film camera of yesterday, but with all the advantages Olympus filmless photography offers today. Only the C-2000 ZOOM, for example, incorporates an all-glass, aspherical 3x zoom lens system featuring a large aperture f2.0 lens that’s exceptionally fast and bright. Along with automatic or manual features like aperture and shutter priority, spot metering, exposure compensation, white balance and ISO settings. And just like your film camera, the C-2000 ZOOM grows with you when you add external flash, lighting equipment, lenses or filter. So bring back old memories while creating new ones with the C-2000 ZOOM from Olympus--THE WORLD LEADER IN FILM AND FILMLESS PHOTOGRAPHY.
Sometimes the advertiser uses the institutional copy to sell an idea or the merits of the organization or service rather than sales features of a particular product. Often institutional copy is also narrative in because it lends warmth to the organization. Service ads, such as ads of banks, insurance companies, public utilities, and large manufacturing concerns are the most common users of the institutional copy.
Advertisers use the narrative copy to tell a story. It often sets up a problem and then creates a solution using the particular sales features of the product or service. It may then suggest that the audiences use the same solution if they have that problem. Service advertisements are often written in this .
|
考点1:“institutional copy”应译为“机构宣传正文”或“机构广告正文”
考点2:“advertisement slogan”推荐译为“广告标语”,不可译为“口号”。
考点3:“exceptionally fast and bright”应译为“出色的大光圈性能和进光量”,不可直译为“异常快速且明亮”
考点4:“wasted the greatest percent of his money”中的“the greatest percent”推荐译为“大部分的”,不可直译为“最大比例的”
|
9b088
|
学术论文
|
人文科学
|
27
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
BlossomsShanghai is a Chinese television series directed and produced by Wong Kar-wai. It isadaptedfrom the novel Blossoms written by Jin Yucheng.
It follows the story of Ah Bao (played by Hu Ge) as hegoes from nothing to dubious successin the 1990s.
Among them, there are the guidance of the master uncle (played by You Benchang), the help of the boss of Night Tokyo Reiko (played by Ma Yili), the foreign trade company Miss Wang (played by Tang Yan), and the boss of Zhizhenyuan Li (played by Xin Zhilei).
Now, let's take a look at the classic lines in the play:
After the intense heat of Greater Heat, there must come a time of bitter cold. Remember, this is the law.
A layman looks at the facade, an expert looks at the back door.
You think you’re eating lobster, but actually you’re eating opportunities. A lobster is an opportunity. You’re either socializing or asking for help.
Always leave a trick up your sleeve.
Do you know the Empire State Building in New York? It takes an hour to run from the bottom to the top, but only 8.8 seconds to jump down from the roof. This is what stocks are like. If you want to make money from stocks, you need to learn how to lose first.
Shanghai people do business, pay attention to style, fun, signs.
This is all your style. This private room is your stunt. They run a so-called company, and you are the same. But your bag is bigger than others - Peace Hotel.
How many wallets should a man have? Three. The first is how much money you actually have. The second is your credit, which means how much money people can lend you from their wallets. The third one is how much money people think you have.
The market is always right, and only oneself can be wrong. Rushing too fast and running away too slowly will definitely lead to failure. The head rests on the shoulders, and the feet are on your own body. As long as you protect yourself well, opportunities are always greater than risks.
Doing business is not about who earns more, but about who lives longer. Don’t think about taking a big step at once, take one step at a time and move forward steadily.
In business, the first two words to learn are ’no comment’. If you don’t know, if you can’t explain clearly, if you haven’t thought about it or planned it, if it’s difficult for yourself or others, just say no comment. Leave some room for maneuvering when doing things, right?
Foreign trade is like borrowing someone else’s chicken to lay your own eggs, but why should they lend you their chicken and help you lay eggs?
Now we advocate market economy, and if we want to engage in the marketNow we advocate market economy, and if we want to engage in the market, we must believe in the market. Whether it is one yuan for a cup of tea or ten yuan for a cup of tea, it is up to others. If you don’t believe in the market, just live a peaceful life like us.
The revenge of the capital market will only let you go where you come from.
The heart can be hot, but the head must be cold.
Opportunities are equal for everyone, and seizing an opportunity may change one’s life. Some people rise with the wind, while others return to zero in half a day.
There are some principles, such as being able to handle things and balance them. Finally, there is one more thing, which is that you should be able to afford to lose.
People always have to be trapped by something. It’s either stocks or houses.
Looking at yourself, you think you are perfect andLooking at yourself, you think you are perfect and it’s always someone else’s fault. In fact, when others look at you, they see all your flaws. Being optimistic is good, but making the worst plan is still necessary. You should always prepare for a rainy day.
To stand out from the crowd is a process of being taught by others.
Don’t talk big with little strength.
Everyone has a scale in their heart, when they can be rich and nobleEveryone has a scale in their heart, when they can be rich and noble together, when they can share weal and woe together, they all have some idea in their hearts.
The goal is never far away, step by step, day by day, just do your best, and leave the rest to time.
People always have to catch up, either go or stay, only not regretPeople always have to catch up, either go or stay, only not regret, regret no medicine can be saved.
Human feelings are owed back and forth, just like painting walls, brushHuman feelings are owed back and forth, just like painting walls, brushing back and forth, so this human feeling will become deeper and deeper.
There is no such thing as true or false, what you see in frontThere is no such thing as true or false, what you see in front of you is true, and what is gone is false.
I couldn’t see her clearly at that time, and ten years laterI couldn’t see her clearly at that time, and ten years later, I still didn’t see her clearly, but I saw myself.
Cricket is brave again, teeth again sharp, fight to the endCricket is brave again, teeth again sharp, fight to the end, or lose, to die, people are the same.
Why can’t I be my own wharf? No. 27 is not my wharf, nor is General Manager Bao. I am my own wharf.
Better strike the bell once than break it a thousand times.
The difficulties of crossing the mountains are hard to overcome, and it is a matter of pride to cross them. Another journey is far away from the mountains and rivers, and if you can’t cross them, it becomes a lesson and a warning to future generations.
Today’s sun cannot dry tomorrow’s clothes. Time decides everything.
In the eyes of God, it is inevitable. A choice, a life, not you know right and wrong, can escape.
There are two problems in life. The first is to find the problem, and the second is to solve it.
Only by seeing the future can there be a future.
The weather won’t always be good, and people won’t always have the upper hand.
|
BlossomsShanghai is a Chinese television series directed and produced by Wong Kar-wai. It isadaptedfrom the novel Blossoms written by Jin Yucheng.
It follows the story of Ah Bao (played by Hu Ge) as hegoes from nothing to dubious successin the 1990s.
Among them, there are the guidance of the master uncle (played by You Benchang), the help of the boss of Night Tokyo Reiko (played by Ma Yili), the foreign trade company Miss Wang (played by Tang Yan), and the boss of Zhizhenyuan Li (played by Xin Zhilei).
Now, let's take a look at the classic lines in the play:
After the intense heat of Greater Heat, there must come a time of bitter cold. Remember, this is the law.
A layman looks at the facade, an expert looks at the back door.
You think you’re eating lobster, but actually you’re eating opportunities. A lobster is an opportunity. You’re either socializing or asking for help.
Always leave a trick up your sleeve.
Do you know the Empire State Building in New York? It takes an hour to run from the bottom to the top, but only 8.8 seconds to jump down from the roof. This is what stocks are like. If you want to make money from stocks, you need to learn how to lose first.
Shanghai people do business, pay attention to style, fun, signs.
This is all your style. This private room is your stunt. They run a so-called company, and you are the same. But your bag is bigger than others - Peace Hotel.
How many wallets should a man have? Three. The first is how much money you actually have. The second is your credit, which means how much money people can lend you from their wallets. The third one is how much money people think you have.
The market is always right, and only oneself can be wrong. Rushing too fast and running away too slowly will definitely lead to failure. The head rests on the shoulders, and the feet are on your own body. As long as you protect yourself well, opportunities are always greater than risks.
Doing business is not about who earns more, but about who lives longer. Don’t think about taking a big step at once, take one step at a time and move forward steadily.
In business, the first two words to learn are ’no comment’. If you don’t know, if you can’t explain clearly, if you haven’t thought about it or planned it, if it’s difficult for yourself or others, just say no comment. Leave some room for maneuvering when doing things, right?
Foreign trade is like borrowing someone else’s chicken to lay your own eggs, but why should they lend you their chicken and help you lay eggs?
Now we advocate market economy, and if we want to engage in the marketNow we advocate market economy, and if we want to engage in the market, we must believe in the market. Whether it is one yuan for a cup of tea or ten yuan for a cup of tea, it is up to others. If you don’t believe in the market, just live a peaceful life like us.
The revenge of the capital market will only let you go where you come from.
The heart can be hot, but the head must be cold.
Opportunities are equal for everyone, and seizing an opportunity may change one’s life. Some people rise with the wind, while others return to zero in half a day.
There are some principles, such as being able to handle things and balance them. Finally, there is one more thing, which is that you should be able to afford to lose.
People always have to be trapped by something. It’s either stocks or houses.
Looking at yourself, you think you are perfect andLooking at yourself, you think you are perfect and it’s always someone else’s fault. In fact, when others look at you, they see all your flaws. Being optimistic is good, but making the worst plan is still necessary. You should always prepare for a rainy day.
To stand out from the crowd is a process of being taught by others.
Don’t talk big with little strength.
Everyone has a scale in their heart, when they can be rich and nobleEveryone has a scale in their heart, when they can be rich and noble together, when they can share weal and woe together, they all have some idea in their hearts.
The goal is never far away, step by step, day by day, just do your best, and leave the rest to time.
People always have to catch up, either go or stay, only not regretPeople always have to catch up, either go or stay, only not regret, regret no medicine can be saved.
Human feelings are owed back and forth, just like painting walls, brushHuman feelings are owed back and forth, just like painting walls, brushing back and forth, so this human feeling will become deeper and deeper.
There is no such thing as true or false, what you see in frontThere is no such thing as true or false, what you see in front of you is true, and what is gone is false.
I couldn’t see her clearly at that time, and ten years laterI couldn’t see her clearly at that time, and ten years later, I still didn’t see her clearly, but I saw myself.
Cricket is brave again, teeth again sharp, fight to the endCricket is brave again, teeth again sharp, fight to the end, or lose, to die, people are the same.
Why can’t I be my own wharf? No. 27 is not my wharf, nor is General Manager Bao. I am my own wharf.
Better strike the bell once than break it a thousand times.
The difficulties of crossing the mountains are hard to overcome, and it is a matter of pride to cross them. Another journey is far away from the mountains and rivers, and if you can’t cross them, it becomes a lesson and a warning to future generations.
Today’s sun cannot dry tomorrow’s clothes. Time decides everything.
In the eyes of God, it is inevitable. A choice, a life, not you know right and wrong, can escape.
There are two problems in life. The first is to find the problem, and the second is to solve it.
Only by seeing the future can there be a future.
The weather won’t always be good, and people won’t always have the upper hand.
|
考点1: style, fun, signs推荐译为:派头、噱头、苗头,三个“头”字既押韵,又符合上海方言的习惯
考点2: no comment推荐译为“不响”,“不响”源自上海话,包含了深藏不露,静观其变的心态和处事智慧
考点3: human feelings推荐译为“人情”,更符合中国文化语境和习惯
考点4: God推荐译为“老天爷”,更符合中文习惯
考点5:Blossoms Shanghai 译为“《繁花》”
考点6:Ah Bao 译为“阿宝”
考点7:Jin Yucheng 译为“金宇澄”
考点8:Night Tokyo 译为 “夜东京”
考点9:Reiko 译为“玲子”
考点10:Miss Wang 译为“汪小姐”
|
9c632
|
文学艺术
|
影视
|
31
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
引言
若将国家理解为一种持续形塑的地理—政治实体,俄罗斯或许是其最具“空间张力”与“疆界焦虑”的典型案例。它的地理构型——一块横跨欧亚、内嵌高寒、边界松散、腹地松散而边陲紧绷的地理体,构成了其历史上数次空间跃迁与战略重组的基础结构。尤其是东部空间的存在,既非自然延展的边缘带,也非文化逻辑上的文明边界,而是一种被历史、资源、意识形态和安全逻辑多重编码的战略“灰色地带”。本文将以远东空间为中心,透过地貌结构、生态分区、资源布设、人口迁移、战略话语与治理架构等多重视角,探讨俄罗斯如何在全球边界重组、极地通道开放、亚太秩序重构等背景下,试图通过语言与空间的重编码,赋予远东以从边陲转向枢纽的“合法性叙述”。
一、地理范式的位移:从疆域控制到文明表述
俄罗斯作为“疆域国家”的原型,其空间逻辑从未真正建立在西欧式的“中心—边缘”二元结构之上。乌拉尔以东并非传统意义上的资源后方,而是“被临界化的内部”,一种结构上属于国家、一体性上却异质的存在。远东更非“边界之外”,而是一种“尚未完全被整合”的空间文化悬崖。
西伯利亚与远东的空间叙述,在俄罗斯民族—国家叙事中历经三次范式变迁:
• 殖民时代(17—19世纪):以边疆开拓为主轴,远东成为毛皮、矿产等“资源—贡赋型空间”的对象。此阶段空间被客体化,语言中充斥“征服”“开发”“驯服”等表达,呈典型的殖民地语法结构;
• 苏维埃时期(20世纪):转为“国家—空间一体化”的试验场,铁路、劳改营、军事工业等基础设施将远东“嵌入”国家权力网格,空间呈现工具理性;
• 后苏联时期(1991—至今):则是“断裂与重建”并存,空间功能与国家意识间张力剧增,官方叙述与实际开发状况日益脱节。
这种“空间认知的断裂性”导致远东在国家语境中始终处于“再叙述—再失败”的循环:它既是战略必须,又是治理失败的象征。
二、地貌分层与基础地理张力
从自然地理视角看,俄罗斯远东呈现出一种“双重空间逻辑”:地形复杂性与基础设施贫弱性并存,资源分布丰度与开发路径不匹配。中西伯利亚高原西侧为多年冻土带下沉区,地形松软且排水迟缓,导致基建成本持续居高;东西伯利亚山系纵深展开,雪线高度压低,滑坡与雪崩为常态,尤以堪察加、萨哈林岛为甚。滨海边疆区虽接壤中国,但因受季风影响、地形破碎、跨境河流沉积影响,交通运输结构呈“单向放射状”,难以形成区域闭环。2020年《俄罗斯极东交通枢纽指数报告》指出,远东内部交通平均联通度为全国最低,仅为中央联邦区的47.6%。此外,生态风险亦极为突出。气候变暖加剧冻土层深度年际波动,使得原本有限的施工季窗口进一步压缩。沿太平洋岸线出现多个气候交错带,例如鄂霍次克海沿岸可见从苔原到森林草原的急剧过渡,造成生态修复难度剧增。
三、远东的资源政治与人口结构异质性
俄罗斯远东占据全国森林资源的32%、已探明金属矿产的27%、天然气与石油潜储的15%,然而其人口总量却不足全俄人口的6%,其中65%以上集中于阿穆尔河与滨海沿线城镇。地广人稀不仅造成资源开发的规模经济瓶颈,更在治理层面制造出“权力沉淀不足”的治理真空。“资源政治”因而成为远东治理核心语汇。近年兴起的“地区资源租金再分配机制”未能有效解决中心—地方之间的财政逆差,反而导致地方政府对资源开发的依附性增强而非减弱。以马加丹州为例,2018年该州财政中有83%来自金矿与铜矿税收,中央再分配比例不足18%。而在人口结构层面,远东呈现出高度“去均质化”的趋势:西伯利亚原住民族(如雅库特人、楚科奇人)与新迁入族群(如中国商人、中亚劳工)之间在空间使用、宗教信仰与生活方式上差异极大,民族认同的碎片化与边界感知的浮动性显著增强。
四、地缘话语的再书写与边陲主体性的构造
近年来,随着中国“一带一路”倡议与俄“欧亚经济联盟”政策框架在远东交汇,官方话语逐渐由“边疆防御”转向“桥梁建设”。2019年《远东开发2035战略》中首次提出“通往太平洋的门户”“欧亚陆桥的前哨”这一叙述结构。但值得注意的是,这种战略语言并未完全脱离“边陲化想象”,而更像是中心在缺席有效结构性政策支持时对边陲“象征性赋能”的补偿行为。换言之,“远东的枢纽性”更多停留在语言与文件层面,其物理现实与技术结构仍表现出“边缘封闭性”。在这一点上,俄罗斯学者费多罗夫指出:“远东被定位为国家—文明接壤地,而非文明腹地,这一定位本身即暗含其主体性缺失。”
|
引言
若将国家理解为一种持续形塑的地理—政治实体,俄罗斯或许是其最具“空间张力”与“疆界焦虑”的典型案例。它的地理构型——一块横跨欧亚、内嵌高寒、边界松散、腹地松散而边陲紧绷的地理体,构成了其历史上数次空间跃迁与战略重组的基础结构。尤其是东部空间的存在,既非自然延展的边缘带,也非文化逻辑上的文明边界,而是一种被历史、资源、意识形态和安全逻辑多重编码的战略“灰色地带”。本文将以远东空间为中心,透过地貌结构、生态分区、资源布设、人口迁移、战略话语与治理架构等多重视角,探讨俄罗斯如何在全球边界重组、极地通道开放、亚太秩序重构等背景下,试图通过语言与空间的重编码,赋予远东以从边陲转向枢纽的“合法性叙述”。
一、地理范式的位移:从疆域控制到文明表述
俄罗斯作为“疆域国家”的原型,其空间逻辑从未真正建立在西欧式的“中心—边缘”二元结构之上。乌拉尔以东并非传统意义上的资源后方,而是“被临界化的内部”,一种结构上属于国家、一体性上却异质的存在。远东更非“边界之外”,而是一种“尚未完全被整合”的空间文化悬崖。
西伯利亚与远东的空间叙述,在俄罗斯民族—国家叙事中历经三次范式变迁:
• 殖民时代(17—19世纪):以边疆开拓为主轴,远东成为毛皮、矿产等“资源—贡赋型空间”的对象。此阶段空间被客体化,语言中充斥“征服”“开发”“驯服”等表达,呈典型的殖民地语法结构;
• 苏维埃时期(20世纪):转为“国家—空间一体化”的试验场,铁路、劳改营、军事工业等基础设施将远东“嵌入”国家权力网格,空间呈现工具理性;
• 后苏联时期(1991—至今):则是“断裂与重建”并存,空间功能与国家意识间张力剧增,官方叙述与实际开发状况日益脱节。
这种“空间认知的断裂性”导致远东在国家语境中始终处于“再叙述—再失败”的循环:它既是战略必须,又是治理失败的象征。
二、地貌分层与基础地理张力
从自然地理视角看,俄罗斯远东呈现出一种“双重空间逻辑”:地形复杂性与基础设施贫弱性并存,资源分布丰度与开发路径不匹配。中西伯利亚高原西侧为多年冻土带下沉区,地形松软且排水迟缓,导致基建成本持续居高;东西伯利亚山系纵深展开,雪线高度压低,滑坡与雪崩为常态,尤以堪察加、萨哈林岛为甚。滨海边疆区虽接壤中国,但因受季风影响、地形破碎、跨境河流沉积影响,交通运输结构呈“单向放射状”,难以形成区域闭环。2020年《俄罗斯极东交通枢纽指数报告》指出,远东内部交通平均联通度为全国最低,仅为中央联邦区的47.6%。此外,生态风险亦极为突出。气候变暖加剧冻土层深度年际波动,使得原本有限的施工季窗口进一步压缩。沿太平洋岸线出现多个气候交错带,例如鄂霍次克海沿岸可见从苔原到森林草原的急剧过渡,造成生态修复难度剧增。
三、远东的资源政治与人口结构异质性
俄罗斯远东占据全国森林资源的32%、已探明金属矿产的27%、天然气与石油潜储的15%,然而其人口总量却不足全俄人口的6%,其中65%以上集中于阿穆尔河与滨海沿线城镇。地广人稀不仅造成资源开发的规模经济瓶颈,更在治理层面制造出“权力沉淀不足”的治理真空。“资源政治”因而成为远东治理核心语汇。近年兴起的“地区资源租金再分配机制”未能有效解决中心—地方之间的财政逆差,反而导致地方政府对资源开发的依附性增强而非减弱。以马加丹州为例,2018年该州财政中有83%来自金矿与铜矿税收,中央再分配比例不足18%。而在人口结构层面,远东呈现出高度“去均质化”的趋势:西伯利亚原住民族(如雅库特人、楚科奇人)与新迁入族群(如中国商人、中亚劳工)之间在空间使用、宗教信仰与生活方式上差异极大,民族认同的碎片化与边界感知的浮动性显著增强。
四、地缘话语的再书写与边陲主体性的构造
近年来,随着中国“一带一路”倡议与俄“欧亚经济联盟”政策框架在远东交汇,官方话语逐渐由“边疆防御”转向“桥梁建设”。2019年《远东开发2035战略》中首次提出“通往太平洋的门户”“欧亚陆桥的前哨”这一叙述结构。但值得注意的是,这种战略语言并未完全脱离“边陲化想象”,而更像是中心在缺席有效结构性政策支持时对边陲“象征性赋能”的补偿行为。换言之,“远东的枢纽性”更多停留在语言与文件层面,其物理现实与技术结构仍表现出“边缘封闭性”。在这一点上,俄罗斯学者费多罗夫指出:“远东被定位为国家—文明接壤地,而非文明腹地,这一定位本身即暗含其主体性缺失。”
|
考点1:“资源后方”推荐译为”resource hinterland”,
考点2:“权力沉淀不足”推荐译为“lack of power consolidation”,因为根据原文,此处指的是治理能力低下
考点3:“疆域国家”可以译为”territory country”,
考点4:“苏维埃时期”推荐译为”Soviet era”
|
9c767
|
学术论文
|
社会科学
|
195
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
"Climate change and weather-related hazards are known to adversely impact environmental determinants of human health such as air quality, water quality, food systems, and the built environment [1]. An additional 250,000 annual climate-related deaths are expected globally between 2030 and 2050 due to malnutrition, malaria, diarrhea, and heat stress—most of these deaths are predicted to occur in low- and middle-income countries (LMICs) [2]. Compounded with socio-economic challenges, climate change is likely to pose the greatest consequences to those in low-income settings, who are least likely to contribute to climate change [3, 4].
Low-income urban communities, especially those in LMICs, are vulnerable to climate change. These populations have less access to services, lower-quality and infrequently maintained infrastructure, and degraded natural environments and ecosystems as compared to urban areas in high-income communities/countries [5]. These inequalities in services, infrastructure, and environmental capital are a product of historical and systemic exploitation by the global north and further exacerbated by socio-economic marginalization and insufficient social welfare funding [6,7,8,9,10].
There has been an increase in urban informal settlements due to rapid and unplanned urbanization, especially in Asia and sub-Saharan Africa [11]. Generally located in more inhospitable parts of urban areas, informal settlements have no tenure security, are cut off from formal, basic services, and housing infrastructure may not comply with current planning and building regulations [12]. Urban poor communities and residents of informal settlements are vulnerable to a variety of environmental disturbances but unlike higher income settings, lack consistent and dependable resources to cope with such disturbances [5]. Global estimates from 2020 suggest over one billion people are living in either slums or other informal settlements and currently lack adequate and affordable housing. The number is expected to grow by 200 million or 20% by 2030 [13]. With a worsening climate, there is an urgent need to build resilience among these vulnerable populations [14].
Resilient households and communities are better able to cope with shocks and stressors—disruptive events or the risk of such events [15]—which leads to more efficient and timely recovery [16]. Resilience is the capacity of a system to cope with, absorb, and adapt to a changing environment and resulting disturbances, while also incorporating the ability to reorganize, learn from past experiences, and transform for future challenges [17,18,19]. Resilience is often considered in terms of the following capacities: “(1) absorptive capacity—the ability to minimize exposure to shocks and recover quickly when exposed; (2) adaptive capacity—the ability to make informed choices about alternative livelihood strategies based on changing conditions; and (3) transformative capacity—system-level enabling conditions for lasting resilience” [19]. There is a growing interest in building resilience among urban households and informal settlements [20]. However, there is limited evidence for resilience-building strategies, especially among urban households in LMICs and informal settlements.
A reliable and valid resilience measurement tool is needed to track progress and generate evidence towards building resilience in the face of environmental disturbances. However, resilience is a latent construct, meaning it is not directly observable or quantifiable, posing measurement challenges [21]. Existing measures often rely on direct observation, overlooking the latent nature of resilience [22]. While there is a strong theoretical foundation for resilience measurement and conceptualization, resilience frameworks require additional specificity to be applied for measures. This poses a challenge as resilience is context-specific, influenced by the system of interest (resilience of what), relevant shocks/stressors (resilience to what), and the population and cultural context (resilience by whom) [23]. There is little guidance on how to transform generalized frameworks into context-specific and field applicable tools/methods such as surveys and quantitative analyses. Limited resilience measurement data impedes the ability to test underlying theory and assess current programmatic approaches to building resilience [24]. Among the limited practical tools available, many have not retained the theoretical underpinnings of resilience measurement, often conflating resilience with concepts like vulnerability and mere counting of assets [25,26,27,28].
To address these challenges, we developed and validated scales measuring urban household resilience to environmental shocks/stressors in LMICs. The scales were internally validated using additionally collected data on topics such as financial satisfaction and community satisfaction and safety. The scales capture the latent construct of resilience through survey questions that assess the ability to cope, recover, and overcome relevant disturbances. This paper details the process from survey drafting to scale development and psychometric evaluation.
Our scales were developed within the ongoing Revitalizing Informal Settlements and their Environments (RISE) study, a randomized control trial across 24 informal settlements in Makassar, Indonesia and Suva, Fiji. RISE adopts a water-sensitive approach to site-specific water and sanitation infrastructure, aiming to reduce flooding hazards and fecal contamination and improve human health (see more on study design in Leder et al.) [29]. While not explicitly designed to improve household resilience, the participatory design approach has the potential to affect resilience through changes in social capital [30], and infrastructural interventions can affect resilience through water supply diversification and flood management [31, 32]. Resilience data produced by our study serves not only to test a previously developed theoretical resilience framework[25] but will also be used to assess the effect of the RISE program on resilience among participating informal settlements.
Bahasa Indonesia and iTaukei (Fijian) translations of the abstract are provided in Additional File 1.
Methods
We developed three separate scales to measure economic, environmental, and social urban household resilience to environmental disturbances. We used factor analysis and item response theory (IRT) methods to evaluate the factor structure and measurement properties of the scales. Additionally, we assessed the scales’ internal validity and reliability.
The RISE trial
Our study was conducted within RISE study, an on-going randomized control trial being conducted across 24 informal settlements in Suva, Fiji and Makassar, Indonesia with six intervention and six control settlements in each country (inception in 2017) (Additional file 1: Fig S1). Specifics of the intervention can be found in Leder et al., Francis et al., and the RISE Knowledge Product Series [29, 33,34,35,36]. Briefly, RISE uses a water-sensitive approach to participatory design of site-specific, modular, and decentralized water and sanitation infrastructural interventions. The central hypothesis of RISE is that these water-sensitive interventions will decrease environmental fecal contamination and flooding hazards, resulting overall in reduced human exposure to fecal contamination, and thus, improved human and ecological health and well-being. The infrastructural intervention includes wet pods (toilets, hand basins, rainwater tanks); pressure sewer systems; and wastewater treatment via constructed wetlands and biofilters. Stormwater management features revitalized drains, rain gardens, and permeable pavement, while flood mitigation includes backflow prevention, terrain modification, and protection walls. Water security is enhanced through municipal connections, rainwater harvesting, and well protection, with raised pathways improving road access in flood-prone areas.
Household resilience scale development within the RISE study
To measure potential impacts of the RISE intervention on household resilience, we developed survey questions that were embedded in the September 2022 household survey (prior to the start of intervention build), which we refer to as the “main” survey throughout this paper. The rest of the methods section details our process on survey question development, data collection, scale development, further scale evaluation, and scale validation, which are in line with best practices [22, 37].
Development of an urban household resilience framework for LMICs
For our a priori framework, we adapted the household resilience measurement framework developed in Serfillipi et al. [38]. We chose this framework as it was well grounded in resilience theory, being the result of a literature review and synthesis of 13 resilience frameworks [38]. We removed elements that would only pertain to rural or agricultural settings to create an adapted framework that would pertain to an urban environment. We further adapted the framework to make it more context-specific, based on the results of our scoping review of household and community resilience to environmental shocks and stressors in coastal urban environments in LMICs [25]. Because this framework consisted of three domains (economic, environmental, and social resilience), we chose to develop three separate resilience measurement scales, one for each of the three domains. While resilience is inherently multidimensional, with economic, environmental, and social resilience interacting to shape a household’s overall capacity to cope with disturbances, we developed separate measurement scales for each to enable independent assessment of the factors influencing each aspect of resilience.
Survey question development
We designed the resilience module survey questions based on an adapted framework for urban household resilience measurement in LMICs, which we developed and published through a scoping review [25]. This framework guided the selection and development of survey items to capture key sub-domains, capitals, and capacities relevant to resilience in these settings. The majority of survey items were newly developed based on this framework, and five items were adapted from the regularly deployed main RISE household survey. For example, the Household Water Insecurity Experience (HWISE) scale [39], which consists of four survey questions, was already present in the main RISE survey and was therefore also used within the environmental resilience domain questions. Table S1 details the preliminary survey questions by resilience framework domain and sub-domain, indicating whether they were newly designed or adapted from the existing RISE survey. The surveys were translated into the local languages (Bahasa Indonesia for Indonesia and iTaukei for Fiji) and back-translated to English to ensure accuracy and consistency (Additional File 1: Table S1).
We carried out cognitive interviews with our new survey questions to identify and revise questions that may be unclear, ambiguous, difficult, or not understood as intended [40]. These cognitive interviews were also conducted to ensure the survey questions reflected the experiences of the current study population, and to identify potentially irrelevant questions and revise questions to better fit the context (see Additional file 1: Table S1). The goal of cognitive interviews is to reveal issues that respondents might have with survey item content or context, understanding of the items, and retrieving and integrating personal information and experiences to answer the item. Cognitive interviews are also used to reveal issues regarding sequencing, item length, sensitivity, problematic or irrelevant response options, inappropriate vocabulary, and temporal and spatial confusion [41].
We conducted six cognitive interviews with our Indonesian team members virtually via Zoom (due to COVID-19 restrictions) and nine cognitive interviews with our team members in Fiji (in person) using our first draft of survey items. During the interviews, we asked each new survey question to a staff member, recorded their response, and then followed up with additional questions to better understand how they arrived at their answer. While it is recommended to pilot survey questions with a subset of the study population, we opted to pilot our questions with staff members to minimize survey fatigue among community members. Prior to the interviews, we met with all participating in-country team members to explain the purpose of the interviews; we instructed the team members to answer the survey questions as if they were members of the RISE communities. The RISE team members that were chosen to participate in these cognitive interviews are residents of Indonesia and Fiji, and many have been working with RISE for several years. The chosen staff members have the background knowledge and cultural context of their respective countries and were able to advise on the appropriateness of the question wording, vocabulary, and translations (see Additional file 2). Survey items were revised after approximately every three interviews. After completing all the interviews, we reconvened with the RISE team members and went through each revised survey question to discuss any outstanding issues before finalizing the survey items."
|
"Climate change and weather-related hazards are known to adversely impact environmental determinants of human health such as air quality, water quality, food systems, and the built environment [1]. An additional 250,000 annual climate-related deaths are expected globally between 2030 and 2050 due to malnutrition, malaria, diarrhea, and heat stress—most of these deaths are predicted to occur in low- and middle-income countries (LMICs) [2]. Compounded with socio-economic challenges, climate change is likely to pose the greatest consequences to those in low-income settings, who are least likely to contribute to climate change [3, 4].
Low-income urban communities, especially those in LMICs, are vulnerable to climate change. These populations have less access to services, lower-quality and infrequently maintained infrastructure, and degraded natural environments and ecosystems as compared to urban areas in high-income communities/countries [5]. These inequalities in services, infrastructure, and environmental capital are a product of historical and systemic exploitation by the global north and further exacerbated by socio-economic marginalization and insufficient social welfare funding [6,7,8,9,10].
There has been an increase in urban informal settlements due to rapid and unplanned urbanization, especially in Asia and sub-Saharan Africa [11]. Generally located in more inhospitable parts of urban areas, informal settlements have no tenure security, are cut off from formal, basic services, and housing infrastructure may not comply with current planning and building regulations [12]. Urban poor communities and residents of informal settlements are vulnerable to a variety of environmental disturbances but unlike higher income settings, lack consistent and dependable resources to cope with such disturbances [5]. Global estimates from 2020 suggest over one billion people are living in either slums or other informal settlements and currently lack adequate and affordable housing. The number is expected to grow by 200 million or 20% by 2030 [13]. With a worsening climate, there is an urgent need to build resilience among these vulnerable populations [14].
Resilient households and communities are better able to cope with shocks and stressors—disruptive events or the risk of such events [15]—which leads to more efficient and timely recovery [16]. Resilience is the capacity of a system to cope with, absorb, and adapt to a changing environment and resulting disturbances, while also incorporating the ability to reorganize, learn from past experiences, and transform for future challenges [17,18,19]. Resilience is often considered in terms of the following capacities: “(1) absorptive capacity—the ability to minimize exposure to shocks and recover quickly when exposed; (2) adaptive capacity—the ability to make informed choices about alternative livelihood strategies based on changing conditions; and (3) transformative capacity—system-level enabling conditions for lasting resilience” [19]. There is a growing interest in building resilience among urban households and informal settlements [20]. However, there is limited evidence for resilience-building strategies, especially among urban households in LMICs and informal settlements.
A reliable and valid resilience measurement tool is needed to track progress and generate evidence towards building resilience in the face of environmental disturbances. However, resilience is a latent construct, meaning it is not directly observable or quantifiable, posing measurement challenges [21]. Existing measures often rely on direct observation, overlooking the latent nature of resilience [22]. While there is a strong theoretical foundation for resilience measurement and conceptualization, resilience frameworks require additional specificity to be applied for measures. This poses a challenge as resilience is context-specific, influenced by the system of interest (resilience of what), relevant shocks/stressors (resilience to what), and the population and cultural context (resilience by whom) [23]. There is little guidance on how to transform generalized frameworks into context-specific and field applicable tools/methods such as surveys and quantitative analyses. Limited resilience measurement data impedes the ability to test underlying theory and assess current programmatic approaches to building resilience [24]. Among the limited practical tools available, many have not retained the theoretical underpinnings of resilience measurement, often conflating resilience with concepts like vulnerability and mere counting of assets [25,26,27,28].
To address these challenges, we developed and validated scales measuring urban household resilience to environmental shocks/stressors in LMICs. The scales were internally validated using additionally collected data on topics such as financial satisfaction and community satisfaction and safety. The scales capture the latent construct of resilience through survey questions that assess the ability to cope, recover, and overcome relevant disturbances. This paper details the process from survey drafting to scale development and psychometric evaluation.
Our scales were developed within the ongoing Revitalizing Informal Settlements and their Environments (RISE) study, a randomized control trial across 24 informal settlements in Makassar, Indonesia and Suva, Fiji. RISE adopts a water-sensitive approach to site-specific water and sanitation infrastructure, aiming to reduce flooding hazards and fecal contamination and improve human health (see more on study design in Leder et al.) [29]. While not explicitly designed to improve household resilience, the participatory design approach has the potential to affect resilience through changes in social capital [30], and infrastructural interventions can affect resilience through water supply diversification and flood management [31, 32]. Resilience data produced by our study serves not only to test a previously developed theoretical resilience framework[25] but will also be used to assess the effect of the RISE program on resilience among participating informal settlements.
Bahasa Indonesia and iTaukei (Fijian) translations of the abstract are provided in Additional File 1.
Methods
We developed three separate scales to measure economic, environmental, and social urban household resilience to environmental disturbances. We used factor analysis and item response theory (IRT) methods to evaluate the factor structure and measurement properties of the scales. Additionally, we assessed the scales’ internal validity and reliability.
The RISE trial
Our study was conducted within RISE study, an on-going randomized control trial being conducted across 24 informal settlements in Suva, Fiji and Makassar, Indonesia with six intervention and six control settlements in each country (inception in 2017) (Additional file 1: Fig S1). Specifics of the intervention can be found in Leder et al., Francis et al., and the RISE Knowledge Product Series [29, 33,34,35,36]. Briefly, RISE uses a water-sensitive approach to participatory design of site-specific, modular, and decentralized water and sanitation infrastructural interventions. The central hypothesis of RISE is that these water-sensitive interventions will decrease environmental fecal contamination and flooding hazards, resulting overall in reduced human exposure to fecal contamination, and thus, improved human and ecological health and well-being. The infrastructural intervention includes wet pods (toilets, hand basins, rainwater tanks); pressure sewer systems; and wastewater treatment via constructed wetlands and biofilters. Stormwater management features revitalized drains, rain gardens, and permeable pavement, while flood mitigation includes backflow prevention, terrain modification, and protection walls. Water security is enhanced through municipal connections, rainwater harvesting, and well protection, with raised pathways improving road access in flood-prone areas.
Household resilience scale development within the RISE study
To measure potential impacts of the RISE intervention on household resilience, we developed survey questions that were embedded in the September 2022 household survey (prior to the start of intervention build), which we refer to as the “main” survey throughout this paper. The rest of the methods section details our process on survey question development, data collection, scale development, further scale evaluation, and scale validation, which are in line with best practices [22, 37].
Development of an urban household resilience framework for LMICs
For our a priori framework, we adapted the household resilience measurement framework developed in Serfillipi et al. [38]. We chose this framework as it was well grounded in resilience theory, being the result of a literature review and synthesis of 13 resilience frameworks [38]. We removed elements that would only pertain to rural or agricultural settings to create an adapted framework that would pertain to an urban environment. We further adapted the framework to make it more context-specific, based on the results of our scoping review of household and community resilience to environmental shocks and stressors in coastal urban environments in LMICs [25]. Because this framework consisted of three domains (economic, environmental, and social resilience), we chose to develop three separate resilience measurement scales, one for each of the three domains. While resilience is inherently multidimensional, with economic, environmental, and social resilience interacting to shape a household’s overall capacity to cope with disturbances, we developed separate measurement scales for each to enable independent assessment of the factors influencing each aspect of resilience.
Survey question development
We designed the resilience module survey questions based on an adapted framework for urban household resilience measurement in LMICs, which we developed and published through a scoping review [25]. This framework guided the selection and development of survey items to capture key sub-domains, capitals, and capacities relevant to resilience in these settings. The majority of survey items were newly developed based on this framework, and five items were adapted from the regularly deployed main RISE household survey. For example, the Household Water Insecurity Experience (HWISE) scale [39], which consists of four survey questions, was already present in the main RISE survey and was therefore also used within the environmental resilience domain questions. Table S1 details the preliminary survey questions by resilience framework domain and sub-domain, indicating whether they were newly designed or adapted from the existing RISE survey. The surveys were translated into the local languages (Bahasa Indonesia for Indonesia and iTaukei for Fiji) and back-translated to English to ensure accuracy and consistency (Additional File 1: Table S1).
We carried out cognitive interviews with our new survey questions to identify and revise questions that may be unclear, ambiguous, difficult, or not understood as intended [40]. These cognitive interviews were also conducted to ensure the survey questions reflected the experiences of the current study population, and to identify potentially irrelevant questions and revise questions to better fit the context (see Additional file 1: Table S1). The goal of cognitive interviews is to reveal issues that respondents might have with survey item content or context, understanding of the items, and retrieving and integrating personal information and experiences to answer the item. Cognitive interviews are also used to reveal issues regarding sequencing, item length, sensitivity, problematic or irrelevant response options, inappropriate vocabulary, and temporal and spatial confusion [41].
We conducted six cognitive interviews with our Indonesian team members virtually via Zoom (due to COVID-19 restrictions) and nine cognitive interviews with our team members in Fiji (in person) using our first draft of survey items. During the interviews, we asked each new survey question to a staff member, recorded their response, and then followed up with additional questions to better understand how they arrived at their answer. While it is recommended to pilot survey questions with a subset of the study population, we opted to pilot our questions with staff members to minimize survey fatigue among community members. Prior to the interviews, we met with all participating in-country team members to explain the purpose of the interviews; we instructed the team members to answer the survey questions as if they were members of the RISE communities. The RISE team members that were chosen to participate in these cognitive interviews are residents of Indonesia and Fiji, and many have been working with RISE for several years. The chosen staff members have the background knowledge and cultural context of their respective countries and were able to advise on the appropriateness of the question wording, vocabulary, and translations (see Additional file 2). Survey items were revised after approximately every three interviews. After completing all the interviews, we reconvened with the RISE team members and went through each revised survey question to discuss any outstanding issues before finalizing the survey items."
|
考点1: "environmental determinants of human health" 应译为 "人类健康的环境决定因素"
考点2: "Compounded with" 应译为 "与…… 叠加" / "与……交织加剧"
考点3: "historical and systemic exploitation by the global north" 应译为 "全球北方国家的历史性和系统性剥削"
考点4: "tenure security" 应译为 "居住权保障" / "土地保有权保障"
考点5: "shocks and stressors" 应译为 "冲击与压力源"
考点6: "absorptive capacity, adaptive capacity, transformative capacity" 应译为 "吸收能力、适应能力、转型能力"
考点7: "latent construct" 应译为 "潜在构念"
考点8: "wet pods" 应译为 "湿舱" / "集成式卫浴单元"
考点9: "constructed wetlands and biofilters" 应译为 "人工湿地和生物滤池"
考点10: "scoping review" 应译为 "范围综述" / "范畴综述"
考点11: "back-translated to English" 应译为 "回译成英文"
考点12: "factor analysis and item response theory (IRT)" 应译为 "因子分析与项目反应理论"
考点13: "site-specific water and sanitation infrastructure" 应译为 "场地特定的水与卫生基础设施"
考点14: "flood mitigation" 应译为 "防洪缓解措施"
|
9d0ab
|
学术论文
|
社会科学
|
98
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
在新能源汽车的浪潮中,小米汽车凭借其独特的雷式营销法则,成功吸引了无数消费者的目光。其背后的品牌故事、市场洞察、产品策略以及营销策略,都堪称教科书级别的营销案例。
一、品牌背景
1.亮眼数据彰显实力
小米SU7自开订以来,以惊人的速度席卷市场。开订27分钟,大定突破5万台;上市24小时,大定更是高达88898台。短短时间内,超过10万人大订,锁单量已超过4万单。更为难得的是,从上市到第1批交付,小米仅用了5天时间,充分展现了其强大的营销能力和市场号召力。
2.品牌设计
小米SU7以C级高性能生态科技轿车的定位,瞄准了那些喜欢先进科技、有品位、热爱生活的消费者。品牌口号“人车合一我心澎湃”更是直击人心,让人对这款车充满期待。而50万以内Z好看、Z好开、Z智慧的承诺,以及全系长续航、小米全栈自研智驾技术等亮点,更是让它在众多竞品中脱颖而出。
二、综合洞察
1.消费者洞察:年轻、有品位、热爱生活
通过深入洞察消费者需求,小米汽车发现年轻消费者占据了市场的较大比例。他们追求个性化和品质生活,希望通过爱车彰显自己的品味和态度。因此,小米汽车将目标用户定位为喜欢先进科技、有品位、热爱生活的年轻人。
2.市场洞察:新能源汽车市场崛起
随着汽车年度总销量的不断攀升,燃油车市场持续萎缩,而新能源车市场则呈现出强劲的增长势头。在这一背景下,小米汽车凭借其产品力和营销策略,成功抓住了市场机遇。
3.消费趋势:年轻消费者偏好新势力品牌
在买车预算为30-50万的用户中,新势力品牌备受青睐。这些用户更在意外观和智慧化程度,而小米汽车正是凭借其在这些方面的大力宣传赢得了市场的认可。
三、产品策略
1.定价策略:锚定价格,让用户感觉占了便宜
小米汽车在产品定价上采用了“锚定价格”的策略。通过对比竞品价格,为消费者提供了一个颇具竞争力的价格区间。同时,通过一系列优惠活动和赠品政策,让消费者感觉占到了便宜,从而提升了消费意愿。
2.用户需求洞察:打造差异化产品
小米汽车洞察到年轻用户对于“既要又要还要”的痛点需求,将品牌定位为“50万以内Z好看、Z好开、Z智慧的高品质轿车”。这种多特性捆绑的方式打造了品牌差异化的优势,吸引了更广泛的目标受众。
四、营销策略
1.路透式营销:制造悬念
小米汽车在营销上善于运用路透式策略,提前预热并制造悬念。从官宣造车到技术发布会预热,小米汽车始终保持着较高的市场热度。这种营销方式激发了消费者的好奇心和消费欲望,成功提升了品牌知名度和话题度。
2.小米式文案:数字讲故事
小米汽车擅长用数字讲故事,将复杂的概念转化为简单易懂的语言。通过一系列直观、抓眼球的数据,让消费者秒懂产品魅力和价值。这种文案风格不仅增强了消费者的认知度,还提升了品牌的传播效果。
3.雷式营销:借势对标
雷军作为小米汽车的核心人物,其独特的营销策略被网友称为“雷式营销”。通过找对标、借势营销的方式,小米汽车迅速建立了品牌心智。同时,其局部功能对标的策略,总是能成功吸引消费者的目光。
4.打造大IP男主:雷军亲和力营销
小米CEO雷军凭借其个人魅力和影响力为小米汽车造势。他亲自参与第1批交付仪式,为第1批车主开车门,并利用明星效应打造品牌话题度。这种亲和力营销不仅增强了消费者与品牌之间的情感联系,还提升了品牌的美誉度和忠诚度。
五、分析点评
小米汽车SU7轿跑的属性,决定了其更接近于年轻人的大玩具而非家庭用车。因此,品牌营销过程中需要深入分析真实消费者的预期,并理解他们根本的动机,通过提供超预期的产品和服务,才能使品牌赢得市场并树立了良好的品牌形象。
|
在新能源汽车的浪潮中,小米汽车凭借其独特的雷式营销法则,成功吸引了无数消费者的目光。其背后的品牌故事、市场洞察、产品策略以及营销策略,都堪称教科书级别的营销案例。
一、品牌背景
1.亮眼数据彰显实力
小米SU7自开订以来,以惊人的速度席卷市场。开订27分钟,大定突破5万台;上市24小时,大定更是高达88898台。短短时间内,超过10万人大订,锁单量已超过4万单。更为难得的是,从上市到第1批交付,小米仅用了5天时间,充分展现了其强大的营销能力和市场号召力。
2.品牌设计
小米SU7以C级高性能生态科技轿车的定位,瞄准了那些喜欢先进科技、有品位、热爱生活的消费者。品牌口号“人车合一我心澎湃”更是直击人心,让人对这款车充满期待。而50万以内Z好看、Z好开、Z智慧的承诺,以及全系长续航、小米全栈自研智驾技术等亮点,更是让它在众多竞品中脱颖而出。
二、综合洞察
1.消费者洞察:年轻、有品位、热爱生活
通过深入洞察消费者需求,小米汽车发现年轻消费者占据了市场的较大比例。他们追求个性化和品质生活,希望通过爱车彰显自己的品味和态度。因此,小米汽车将目标用户定位为喜欢先进科技、有品位、热爱生活的年轻人。
2.市场洞察:新能源汽车市场崛起
随着汽车年度总销量的不断攀升,燃油车市场持续萎缩,而新能源车市场则呈现出强劲的增长势头。在这一背景下,小米汽车凭借其产品力和营销策略,成功抓住了市场机遇。
3.消费趋势:年轻消费者偏好新势力品牌
在买车预算为30-50万的用户中,新势力品牌备受青睐。这些用户更在意外观和智慧化程度,而小米汽车正是凭借其在这些方面的大力宣传赢得了市场的认可。
三、产品策略
1.定价策略:锚定价格,让用户感觉占了便宜
小米汽车在产品定价上采用了“锚定价格”的策略。通过对比竞品价格,为消费者提供了一个颇具竞争力的价格区间。同时,通过一系列优惠活动和赠品政策,让消费者感觉占到了便宜,从而提升了消费意愿。
2.用户需求洞察:打造差异化产品
小米汽车洞察到年轻用户对于“既要又要还要”的痛点需求,将品牌定位为“50万以内Z好看、Z好开、Z智慧的高品质轿车”。这种多特性捆绑的方式打造了品牌差异化的优势,吸引了更广泛的目标受众。
四、营销策略
1.路透式营销:制造悬念
小米汽车在营销上善于运用路透式策略,提前预热并制造悬念。从官宣造车到技术发布会预热,小米汽车始终保持着较高的市场热度。这种营销方式激发了消费者的好奇心和消费欲望,成功提升了品牌知名度和话题度。
2.小米式文案:数字讲故事
小米汽车擅长用数字讲故事,将复杂的概念转化为简单易懂的语言。通过一系列直观、抓眼球的数据,让消费者秒懂产品魅力和价值。这种文案风格不仅增强了消费者的认知度,还提升了品牌的传播效果。
3.雷式营销:借势对标
雷军作为小米汽车的核心人物,其独特的营销策略被网友称为“雷式营销”。通过找对标、借势营销的方式,小米汽车迅速建立了品牌心智。同时,其局部功能对标的策略,总是能成功吸引消费者的目光。
4.打造大IP男主:雷军亲和力营销
小米CEO雷军凭借其个人魅力和影响力为小米汽车造势。他亲自参与第1批交付仪式,为第1批车主开车门,并利用明星效应打造品牌话题度。这种亲和力营销不仅增强了消费者与品牌之间的情感联系,还提升了品牌的美誉度和忠诚度。
五、分析点评
小米汽车SU7轿跑的属性,决定了其更接近于年轻人的大玩具而非家庭用车。因此,品牌营销过程中需要深入分析真实消费者的预期,并理解他们根本的动机,通过提供超预期的产品和服务,才能使品牌赢得市场并树立了良好的品牌形象。
|
考点1:”雷式营销法则”推荐译为“The Lei Jun marketing playbook”,翻译成 "playbook" (战术手册) 能更形象地表达其系统性和策略性,更显专业。
考点2:“大定”应该译为“firm orders”,是中国汽车销售行业的特定术语,指已支付不可退定金的订单,区别于意向金“小定”。不能简单翻译成 "pre-orders" 或 "orders"。
考点3:”锁单量“是专业术语,应该译为“locked-in orders”,“锁单”指客户确认了具体配置、订单不可再修改,并进入生产队列的状态。
考点4:”Z好看、Z好开、Z智慧”推荐译为“The best-looking, the best-to-drive, and the smartest”。
考点5: “全栈自研智驾技术”是一个技术术语组合,应该译为“full-stack, in-house developed intelligent driving technology”,全栈 (full-stack)源自软件开发,自研 (in-house developed)指自主研发,智驾 (intelligent driving)是智能驾驶的缩写。
考点6: “既要又要还要”的痛点需求推荐译为“the "want-it-all" pain point”。
考点7:”打造大IP男主“推荐译为“cultivating a major IP persona”。
|
9de1e
|
新闻资讯
|
观点评论
|
33
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Governing Law and Dispute Resolution
1. The formation of this Contract, its validity, interpretation, execution and settlement of disputes in connection herewith shall be governed by the laws of the People's Republic of China ("PRC"), but in the event that there is no published and publicly available law in the PRC governing a particular matter relating to this Contract, reference shall be made to general international commercial practices.
2. If, after the signing of this Agreement, the Chinese government either atthe State, provincial, municipal or local level adopts any new law, regulation,decree or rule, amends or repeals any provision of any law, regulation,decree or rule, or adopts any different interpretation or method of implementation of any law, regulation, decree or rule, which contravenes this Agreement or which materially and adversely affects a party's economic benefit under this Agreement, then upon written notice thereof from the affected party to the other Party, the Parties shall promptly consult and decide whether (i) to continue to implement this Agreement in accordance with the original provisions thereof as per the relevant provisions of the Contract Law of the People's Republic of China;or (ii) to effectuate
necessary adjustments in order to preserve each Party's economic benefit under this Agreement on a basis no less favorable than the economic benefit it would have received if such law, regulation, decree or rule had not been adopted, amended, repealed or so interpreted or implemented.3. Any controversy or claim arising out of, or relating to, this Agreemen shall be settled under the Rules of Conciliation and Arbitration of the International Chamber of Commerce by three(3)arbitrators appointed in accordance with said Rules. The place of Arbitration shall be Hong Kong The language of Arbitration shall be English.In no event shall any arbitration award provide a remedy beyond those permitted under these Terms and Conditions, and any award providing a remedy beyond those permitted under this Agreement shall not be confirmed, no presumption of validity shall attach, and such award shall be vacated..4. Any dispute arising from, out of, or in connection with, this Agreement shall be settled by the Parties through friendly consultation. Such consultation shall begin immediately after one Party has delivered to the other party a written request for such consultation. If the dispute cannot be settled through consultation within thirty (30) days after such notice is given.the Parties shall submit the dispute to China International Trade Arbitration Committee, Shanghai Branch("Arbitration Institute") to be arbitrated according to its rules and regulations.
There shall be three (3) arbitrators. Party A and Party B shall appoint one (1)arbitrator each. The two arbitrators shall be selected within thirty (30) days after giving or receiving of the request for arbitration. The chairman of the Arbitration Institute shall select the third arbitrator. If a Party fails to appoint an arbitrator within thirty (30) days after the other Party has appointed an arbitrator, the chairman of the Arbitration Institute shall make the appoint-ment.
The arbitration proceedings shall be conducted in Chinese language. The arbitration tribunal shall apply the arbitration rules of the Arbitration Institute in effect on the date of the signing of this Agreement. However, if such rules are in conflict with the provisions of the previous paragraph of this Article, including the provisions for appointing arbitrators, the provisions of this Article shall prevail.The arbitration award shall be final and binding on both parties. No party shall appeal in connection with the matters in relation to the arbitration award.
Each Party may request any court having jurisdiction to make a judgment for enforcing the arbitration award, or apply with such court for judicial recognition of the award or any order of enforcement thereof.During the process of arbitration, the Parties shall continue to implement this Agreement without interruption, except for the matters in dispute.
1. This Agreement shall be governed by and construed in accordance with the laws of New York (USA),without regard to the conflict of laws provisions thereof, The United Nations Convention on Contracts for the International Sale of Goods shall not apply to this Agreement..
2. The Parties will make every effort to settle amicably any dispute or claim arising in connection with the Contract. Should the Parties fail to resolve any such dispute within sixty (60) days after one Party gives a written notice of a dispute to the other, any and all such disputes shall be finally settled in accordance with the Rules of Arbitration of the International Chamber of Commerce by three (3) arbitrators appointed in accordance with said Rules.Any arbitration decision rendered in conformity with this Article shall befinal and binding upon the Parties. Arbitration shall take place in Geneva,Switzerland. The proceedings shall be conducted in English. All arbitration fees shall be borne by the losing party or, where appropriate, in conformity with the stipulations of the award. All other fees including legal fees shall be borne by the respective parties or, where appropriate, in conformity with the stipulations of the award..
3. Should any dispute arise from the execution or implementation of this Contract or otherwise relating thereto, both Parties shall resolve the dispute through friendly negotiations. If the dispute cannot be resolved by negotiations within thirty (30) days after one Party has issued notice to the other Party requesting the commencement of such negotiations, then either Party may submit it to the Singapore International Arbitration Center (the"Arbitration Institute") for arbitration in accordance with the UNCITRAL rules of arbitration then in effect and the following provisions:a)The arbitration shall be conducted in the English language and three (3)arbitrators (one appointed by each Party and the third appointed by the Arbitration Institute) may refer to both the English and Chinese text of the Contract;
b) The arbitration award shall be final and binding on the Parties and shall be enforced in accordance with its terms; and
c)The costs of arbitration shall be borne by the Party as designated in the arbitration award.
Insurance
1. The JVC shall purchase appropriate comprehensive insurance to cover various kinds of risks as would be usual for a joint venture enterprise engaged in the same type of industry and in manufacturing products similar to the Products including, without limitation, product liability covering the manufacture and supply of the Products and such insurance shall be underwritten by an insurance company registered in the PRC. The typesvalue and duration of insurance shall be decided by the Board of Directors after discussion with the insurance companies and Party B.
The premises, plant, machinery and equipment, raw materials, components and the Products shall be insured by JVC for adequate replacement value against fire, storm, tempest, accident, flood, theft and other risks which may destroy or diminish the value of the Products or which may render the Products unfit for consumption..
2. Insurance shall, to the extent it is available on premium and terms comparable to those abroad and as required by applicable Chinese law, be obtained in China and such policies will be denominated in Renminbi or foreign currency or both, as appropriate.
The Company shall, at its own cost and expense, at all times during operation of the factory and other facilities and during any construction work take out and maintain full and adequate property insurance covering the buildings, contents, and other first party risks of the Company as are customarily insured against in China.
The Company shall maintain product liability insurance, third party liability insurance and other relevant insurance coverage in order to protect the Company, its employees, agents and other appropriate parties from claims.3. During the term of this Agreement, Party A shall undertake, renew and maintain for its benefit and interest, and at its own cost and expense, the following primary insurance policies:.a) General Public Liability Policy with Party B being named as a co-insured covering all loss, damage or liability incurred or arising from the operation of the Services including, without limitation, for bodily injury, death or property damage, for an amount not less than RMB25,000,000 per accident or occurrence ;
b) Employer's Liability Policy with Party B being named as a co-insured in conformity with local laws and regulations and accepted practice in the PRC;
c)Property Damage Policy covering its premises against all risks of direct physical loss or damage from any cause, or if such a policy is not available against the risks of fire and associated risks such as explosion, electrical damage, water damage, riots, strikes, civil commotion, terrorism.windstorms, hurricanes, cyclones, floods, burglary, theft and other similar risks:
d) Property Damage Policy with Party B being named as the sole beneficiary covering loss or damage to the materials, Products, Bulk Products, Equipment and other property of Party B as a result of natural disaster or negligence or omission by Party A; and e) Any other insurance policy or policies against such other insurable risks as shall be normal and customary in the PRC for operations similar to that of Party A, in each case with Party B named in the policy or a certificate of insurance as loss payee, additional insured, or in such manner as Party B's insurance company and Party A's insurance company may agree.
Party A shall inform Party B of any change to its insurance policies listedabove which would result in a reduced insurance coverage.
|
Governing Law and Dispute Resolution
1. The formation of this Contract, its validity, interpretation, execution and settlement of disputes in connection herewith shall be governed by the laws of the People's Republic of China ("PRC"), but in the event that there is no published and publicly available law in the PRC governing a particular matter relating to this Contract, reference shall be made to general international commercial practices.
2. If, after the signing of this Agreement, the Chinese government either atthe State, provincial, municipal or local level adopts any new law, regulation,decree or rule, amends or repeals any provision of any law, regulation,decree or rule, or adopts any different interpretation or method of implementation of any law, regulation, decree or rule, which contravenes this Agreement or which materially and adversely affects a party's economic benefit under this Agreement, then upon written notice thereof from the affected party to the other Party, the Parties shall promptly consult and decide whether (i) to continue to implement this Agreement in accordance with the original provisions thereof as per the relevant provisions of the Contract Law of the People's Republic of China;or (ii) to effectuate
necessary adjustments in order to preserve each Party's economic benefit under this Agreement on a basis no less favorable than the economic benefit it would have received if such law, regulation, decree or rule had not been adopted, amended, repealed or so interpreted or implemented.3. Any controversy or claim arising out of, or relating to, this Agreemen shall be settled under the Rules of Conciliation and Arbitration of the International Chamber of Commerce by three(3)arbitrators appointed in accordance with said Rules. The place of Arbitration shall be Hong Kong The language of Arbitration shall be English.In no event shall any arbitration award provide a remedy beyond those permitted under these Terms and Conditions, and any award providing a remedy beyond those permitted under this Agreement shall not be confirmed, no presumption of validity shall attach, and such award shall be vacated..4. Any dispute arising from, out of, or in connection with, this Agreement shall be settled by the Parties through friendly consultation. Such consultation shall begin immediately after one Party has delivered to the other party a written request for such consultation. If the dispute cannot be settled through consultation within thirty (30) days after such notice is given.the Parties shall submit the dispute to China International Trade Arbitration Committee, Shanghai Branch("Arbitration Institute") to be arbitrated according to its rules and regulations.
There shall be three (3) arbitrators. Party A and Party B shall appoint one (1)arbitrator each. The two arbitrators shall be selected within thirty (30) days after giving or receiving of the request for arbitration. The chairman of the Arbitration Institute shall select the third arbitrator. If a Party fails to appoint an arbitrator within thirty (30) days after the other Party has appointed an arbitrator, the chairman of the Arbitration Institute shall make the appoint-ment.
The arbitration proceedings shall be conducted in Chinese language. The arbitration tribunal shall apply the arbitration rules of the Arbitration Institute in effect on the date of the signing of this Agreement. However, if such rules are in conflict with the provisions of the previous paragraph of this Article, including the provisions for appointing arbitrators, the provisions of this Article shall prevail.The arbitration award shall be final and binding on both parties. No party shall appeal in connection with the matters in relation to the arbitration award.
Each Party may request any court having jurisdiction to make a judgment for enforcing the arbitration award, or apply with such court for judicial recognition of the award or any order of enforcement thereof.During the process of arbitration, the Parties shall continue to implement this Agreement without interruption, except for the matters in dispute.
1. This Agreement shall be governed by and construed in accordance with the laws of New York (USA),without regard to the conflict of laws provisions thereof, The United Nations Convention on Contracts for the International Sale of Goods shall not apply to this Agreement..
2. The Parties will make every effort to settle amicably any dispute or claim arising in connection with the Contract. Should the Parties fail to resolve any such dispute within sixty (60) days after one Party gives a written notice of a dispute to the other, any and all such disputes shall be finally settled in accordance with the Rules of Arbitration of the International Chamber of Commerce by three (3) arbitrators appointed in accordance with said Rules.Any arbitration decision rendered in conformity with this Article shall befinal and binding upon the Parties. Arbitration shall take place in Geneva,Switzerland. The proceedings shall be conducted in English. All arbitration fees shall be borne by the losing party or, where appropriate, in conformity with the stipulations of the award. All other fees including legal fees shall be borne by the respective parties or, where appropriate, in conformity with the stipulations of the award..
3. Should any dispute arise from the execution or implementation of this Contract or otherwise relating thereto, both Parties shall resolve the dispute through friendly negotiations. If the dispute cannot be resolved by negotiations within thirty (30) days after one Party has issued notice to the other Party requesting the commencement of such negotiations, then either Party may submit it to the Singapore International Arbitration Center (the"Arbitration Institute") for arbitration in accordance with the UNCITRAL rules of arbitration then in effect and the following provisions:a)The arbitration shall be conducted in the English language and three (3)arbitrators (one appointed by each Party and the third appointed by the Arbitration Institute) may refer to both the English and Chinese text of the Contract;
b) The arbitration award shall be final and binding on the Parties and shall be enforced in accordance with its terms; and
c)The costs of arbitration shall be borne by the Party as designated in the arbitration award.
Insurance
1. The JVC shall purchase appropriate comprehensive insurance to cover various kinds of risks as would be usual for a joint venture enterprise engaged in the same type of industry and in manufacturing products similar to the Products including, without limitation, product liability covering the manufacture and supply of the Products and such insurance shall be underwritten by an insurance company registered in the PRC. The typesvalue and duration of insurance shall be decided by the Board of Directors after discussion with the insurance companies and Party B.
The premises, plant, machinery and equipment, raw materials, components and the Products shall be insured by JVC for adequate replacement value against fire, storm, tempest, accident, flood, theft and other risks which may destroy or diminish the value of the Products or which may render the Products unfit for consumption..
2. Insurance shall, to the extent it is available on premium and terms comparable to those abroad and as required by applicable Chinese law, be obtained in China and such policies will be denominated in Renminbi or foreign currency or both, as appropriate.
The Company shall, at its own cost and expense, at all times during operation of the factory and other facilities and during any construction work take out and maintain full and adequate property insurance covering the buildings, contents, and other first party risks of the Company as are customarily insured against in China.
The Company shall maintain product liability insurance, third party liability insurance and other relevant insurance coverage in order to protect the Company, its employees, agents and other appropriate parties from claims.3. During the term of this Agreement, Party A shall undertake, renew and maintain for its benefit and interest, and at its own cost and expense, the following primary insurance policies:.a) General Public Liability Policy with Party B being named as a co-insured covering all loss, damage or liability incurred or arising from the operation of the Services including, without limitation, for bodily injury, death or property damage, for an amount not less than RMB25,000,000 per accident or occurrence ;
b) Employer's Liability Policy with Party B being named as a co-insured in conformity with local laws and regulations and accepted practice in the PRC;
c)Property Damage Policy covering its premises against all risks of direct physical loss or damage from any cause, or if such a policy is not available against the risks of fire and associated risks such as explosion, electrical damage, water damage, riots, strikes, civil commotion, terrorism.windstorms, hurricanes, cyclones, floods, burglary, theft and other similar risks:
d) Property Damage Policy with Party B being named as the sole beneficiary covering loss or damage to the materials, Products, Bulk Products, Equipment and other property of Party B as a result of natural disaster or negligence or omission by Party A; and e) Any other insurance policy or policies against such other insurable risks as shall be normal and customary in the PRC for operations similar to that of Party A, in each case with Party B named in the policy or a certificate of insurance as loss payee, additional insured, or in such manner as Party B's insurance company and Party A's insurance company may agree.
Party A shall inform Party B of any change to its insurance policies listedabove which would result in a reduced insurance coverage.
|
考点1:“no published and publicly available law”必须译为“未正式颁布并公开发布的法律”,应保留“published”和“publicly available”的双重限制。
考点2:“reference shall be made to general international commercial practices”必须译为“参照国际商业惯例”,为固定法律表达,应避免直译“应参照一般国际商业惯例”。
考点3:“property insurance covering...first party risks”应理解为“财产保险,涵盖第一方风险”,注意“first party”法律术语含义,不等于“首要方”。
考点4:“loss payee”推荐译为“损失赔偿受偿人”,准确表达保险金的最终领取人。
考点5:“contents”在财产保险语境中应译为“室内财产”,涵盖家具、设备、存货等动产,避免限缩为“内装物”。
考点6:“undertake(insurance policies)”在保险条款中推荐译为“购买”、“投保”或“办理”,避免使用不自然的“承担保险保单”。
考点7:“amends or repeals any provision of any law, regulation, decree or rule”推荐译为“修订或废止任何法律、法规、法令或规章的任何条款”,避免仅译为“法律条款”而缩小范围。
考点8:“economic benefit”在同一条款内应统一译法,避免混用“经济利益”和“经济收益”造成语义偏差。
|
9fb6a
|
垂类场景
|
法律
|
112
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Where I Lived, and What I Lived For
At a certain season of our life we are accustomed to consider every spot as the possible site of a house. I have thus surveyed the country on every side within a dozen miles of where I live. In imagination I have bought all the farms in succession, for all were to be bought, and I knew their price. I walked over each farmer’s premises, tasted his wild apples, discoursed on husbandry with him, took his farm at his price, at any price, mortgaging it to him in my mind; even put a higher price on it,—took everything but a deed of it,—took his word for his deed, for I dearly love to talk,—cultivated it, and him too to some extent, I trust, and withdrew when I had enjoyed it long enough, leaving him to carry it on. This experience entitled me to be regarded as a sort of real-estate broker by my friends. Wherever I sat, there I might live, and the landscape radiated from me accordingly. What is a house but a sedes, a seat?—better if a country seat. I discovered many a site for a house not likely to be soon improved, which some might have thought too far from the village, but to my eyes the village was too far from it. Well, there I might live, I said; and there I did live, for an hour, a summer and a winter life; saw how I could let the years run off, buffet the winter through, and see the spring come in. The future inhabitants of this region, wherever they may place their houses, may be sure that they have been anticipated. An afternoon sufficed to lay out the land into orchard, woodlot, and pasture, and to decide what fine oaks or pines should be left to stand before the door, and whence each blasted tree could be seen to the best advantage; and then I let it lie, fallow perchance, for a man is rich in proportion to the number of things which he can afford to let alone.
My imagination carried me so far that I even had the refusal of several farms,—the refusal was all I wanted,—but I never got my fingers burned by actual possession. The nearest that I came to actual possession was when I bought the Hollowell place, and had begun to sort my seeds, and collected materials with which to make a wheelbarrow to carry it on or off with; but before the owner gave me a deed of it, his wife—every man has such a wife—changed her mind and wished to keep it, and he offered me ten dollars to release him. Now, to speak the truth, I had but ten cents in the world, and it surpassed my arithmetic to tell, if I was that man who had ten cents, or who had a farm, or ten dollars, or all together. However, I let him keep the ten dollars and the farm too, for I had carried it far enough; or rather, to be generous, I sold him the farm for just what I gave for it, and, as he was not a rich man, made him a present of ten dollars, and still had my ten cents, and seeds, and materials for a wheelbarrow left. I found thus that I had been a rich man without any damage to my poverty. But I retained the landscape, and I have since annually carried off what it yielded without a wheelbarrow. With respect to landscapes,—
“I am monarch of all I survey,
My right there is none to dispute.”
I have frequently seen a poet withdraw, having enjoyed the most valuable part of a farm, while the crusty farmer supposed that he had got a few wild apples only. Why, the owner does not know it for many years when a poet has put his farm in rhyme, the most admirable kind of invisible fence, has fairly impounded it, milked it, skimmed it, and got all the cream, and left the farmer only the skimmed milk.
The real attractions of the Hollowell farm, to me, were; its complete retirement, being, about two miles from the village, half a mile from the nearest neighbor, and separated from the highway by a broad field; its bounding on the river, which the owner said protected it by its fogs from frosts in the spring, though that was nothing to me; the gray color and ruinous state of the house and barn, and the dilapidated fences, which put such an interval between me and the last occupant; the hollow and lichen-covered apple trees, gnawed by rabbits, showing what kind of neighbors I should have; but above all, the recollection I had of it from my earliest voyages up the river, when the house was concealed behind a dense grove of red maples, through which I heard the house-dog bark. I was in haste to buy it, before the proprietor finished getting out some rocks, cutting down the hollow apple trees, and grubbing up some young birches which had sprung up in the pasture, or, in short, had made any more of his improvements. To enjoy these advantages I was ready to carry it on; like Atlas, to take the world on my shoulders,—I never heard what compensation he received for that,—and do all those things which had no other motive or excuse but that I might pay for it and be unmolested in my possession of it; for I knew all the while that it would yield the most abundant crop of the kind I wanted if I could only afford to let it alone. But it turned out as I have said.
All that I could say, then, with respect to farming on a large scale, (I have always cultivated a garden,) was, that I had had my seeds ready. Many think that seeds improve with age. I have no doubt that time discriminates between the good and the bad; and when at last I shall plant, I shall be less likely to be disappointed. But I would say to my fellows, once for all, As long as possible live free and uncommitted. It makes but little difference whether you are committed to a farm or the county jail.
Old Cato, whose “De Re Rusticâ” is my “Cultivator,” says, and the only translation I have seen makes sheer nonsense of the passage, “When you think of getting a farm, turn it thus in your mind, not to buy greedily; nor spare your pains to look at it, and do not think it enough to go round it once. The oftener you go there the more it will please you, if it is good.” I think I shall not buy greedily, but go round and round it as long as I live, and be buried in it first, that it may please me the more at last.
The present was my next experiment of this kind, which I purpose to describe more at length; for convenience, putting the experience of two years into one. As I have said, I do not propose to write an ode to dejection, but to brag as lustily as chanticleer in the morning, standing on his roost, if only to wake my neighbors up.
When first I took up my abode in the woods, that is, began to spend my nights as well as days there, which, by accident, was on Independence Day, or the Fourth of July, 1845, my house was not finished for winter, but was merely a defence against the rain, without plastering or chimney, the walls being of rough, weather-stained boards, with wide chinks, which made it cool at night. The upright white hewn studs and freshly planed door and window casings gave it a clean and airy look, especially in the morning, when its timbers were saturated with dew, so that I fancied that by noon some sweet gum would exude from them. To my imagination it retained throughout the day more or less of this auroral character, reminding me of a certain house on a mountain which I had visited the year before. This was an airy and unplastered cabin, fit to entertain a travelling god, and where a goddess might trail her garments. The winds which passed over my dwelling were such as sweep over the ridges of mountains, bearing the broken strains, or celestial parts only, of terrestrial music. The morning wind forever blows, the poem of creation is uninterrupted; but few are the ears that hear it. Olympus is but the outside of the earth every where.
|
Where I Lived, and What I Lived For
At a certain season of our life we are accustomed to consider every spot as the possible site of a house. I have thus surveyed the country on every side within a dozen miles of where I live. In imagination I have bought all the farms in succession, for all were to be bought, and I knew their price. I walked over each farmer’s premises, tasted his wild apples, discoursed on husbandry with him, took his farm at his price, at any price, mortgaging it to him in my mind; even put a higher price on it,—took everything but a deed of it,—took his word for his deed, for I dearly love to talk,—cultivated it, and him too to some extent, I trust, and withdrew when I had enjoyed it long enough, leaving him to carry it on. This experience entitled me to be regarded as a sort of real-estate broker by my friends. Wherever I sat, there I might live, and the landscape radiated from me accordingly. What is a house but a sedes, a seat?—better if a country seat. I discovered many a site for a house not likely to be soon improved, which some might have thought too far from the village, but to my eyes the village was too far from it. Well, there I might live, I said; and there I did live, for an hour, a summer and a winter life; saw how I could let the years run off, buffet the winter through, and see the spring come in. The future inhabitants of this region, wherever they may place their houses, may be sure that they have been anticipated. An afternoon sufficed to lay out the land into orchard, woodlot, and pasture, and to decide what fine oaks or pines should be left to stand before the door, and whence each blasted tree could be seen to the best advantage; and then I let it lie, fallow perchance, for a man is rich in proportion to the number of things which he can afford to let alone.
My imagination carried me so far that I even had the refusal of several farms,—the refusal was all I wanted,—but I never got my fingers burned by actual possession. The nearest that I came to actual possession was when I bought the Hollowell place, and had begun to sort my seeds, and collected materials with which to make a wheelbarrow to carry it on or off with; but before the owner gave me a deed of it, his wife—every man has such a wife—changed her mind and wished to keep it, and he offered me ten dollars to release him. Now, to speak the truth, I had but ten cents in the world, and it surpassed my arithmetic to tell, if I was that man who had ten cents, or who had a farm, or ten dollars, or all together. However, I let him keep the ten dollars and the farm too, for I had carried it far enough; or rather, to be generous, I sold him the farm for just what I gave for it, and, as he was not a rich man, made him a present of ten dollars, and still had my ten cents, and seeds, and materials for a wheelbarrow left. I found thus that I had been a rich man without any damage to my poverty. But I retained the landscape, and I have since annually carried off what it yielded without a wheelbarrow. With respect to landscapes,—
“I am monarch of all I survey,
My right there is none to dispute.”
I have frequently seen a poet withdraw, having enjoyed the most valuable part of a farm, while the crusty farmer supposed that he had got a few wild apples only. Why, the owner does not know it for many years when a poet has put his farm in rhyme, the most admirable kind of invisible fence, has fairly impounded it, milked it, skimmed it, and got all the cream, and left the farmer only the skimmed milk.
The real attractions of the Hollowell farm, to me, were; its complete retirement, being, about two miles from the village, half a mile from the nearest neighbor, and separated from the highway by a broad field; its bounding on the river, which the owner said protected it by its fogs from frosts in the spring, though that was nothing to me; the gray color and ruinous state of the house and barn, and the dilapidated fences, which put such an interval between me and the last occupant; the hollow and lichen-covered apple trees, gnawed by rabbits, showing what kind of neighbors I should have; but above all, the recollection I had of it from my earliest voyages up the river, when the house was concealed behind a dense grove of red maples, through which I heard the house-dog bark. I was in haste to buy it, before the proprietor finished getting out some rocks, cutting down the hollow apple trees, and grubbing up some young birches which had sprung up in the pasture, or, in short, had made any more of his improvements. To enjoy these advantages I was ready to carry it on; like Atlas, to take the world on my shoulders,—I never heard what compensation he received for that,—and do all those things which had no other motive or excuse but that I might pay for it and be unmolested in my possession of it; for I knew all the while that it would yield the most abundant crop of the kind I wanted if I could only afford to let it alone. But it turned out as I have said.
All that I could say, then, with respect to farming on a large scale, (I have always cultivated a garden,) was, that I had had my seeds ready. Many think that seeds improve with age. I have no doubt that time discriminates between the good and the bad; and when at last I shall plant, I shall be less likely to be disappointed. But I would say to my fellows, once for all, As long as possible live free and uncommitted. It makes but little difference whether you are committed to a farm or the county jail.
Old Cato, whose “De Re Rusticâ” is my “Cultivator,” says, and the only translation I have seen makes sheer nonsense of the passage, “When you think of getting a farm, turn it thus in your mind, not to buy greedily; nor spare your pains to look at it, and do not think it enough to go round it once. The oftener you go there the more it will please you, if it is good.” I think I shall not buy greedily, but go round and round it as long as I live, and be buried in it first, that it may please me the more at last.
The present was my next experiment of this kind, which I purpose to describe more at length; for convenience, putting the experience of two years into one. As I have said, I do not propose to write an ode to dejection, but to brag as lustily as chanticleer in the morning, standing on his roost, if only to wake my neighbors up.
When first I took up my abode in the woods, that is, began to spend my nights as well as days there, which, by accident, was on Independence Day, or the Fourth of July, 1845, my house was not finished for winter, but was merely a defence against the rain, without plastering or chimney, the walls being of rough, weather-stained boards, with wide chinks, which made it cool at night. The upright white hewn studs and freshly planed door and window casings gave it a clean and airy look, especially in the morning, when its timbers were saturated with dew, so that I fancied that by noon some sweet gum would exude from them. To my imagination it retained throughout the day more or less of this auroral character, reminding me of a certain house on a mountain which I had visited the year before. This was an airy and unplastered cabin, fit to entertain a travelling god, and where a goddess might trail her garments. The winds which passed over my dwelling were such as sweep over the ridges of mountains, bearing the broken strains, or celestial parts only, of terrestrial music. The morning wind forever blows, the poem of creation is uninterrupted; but few are the ears that hear it. Olympus is but the outside of the earth every where.
|
考点1: “surveyed”应该译为“勘查”。
考点2: “sedes”应译为“位置”,拉丁语表示座位的意思,此处指的是房屋的坐落之处。
考点3: “got my fingers burned”应译为“没有损失”。
考点4: “De Re Rusticâ”应译为“《论农业》”。
|
a1947
|
文学艺术
|
散文
|
55
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Introducing the MVPs of POV: Meet the Marketers Powering Cultural Discovery
At this year’s Cannes Lions, TikTok is turning the spotlight on discovery and the marketing leaders who are shaping what comes next. As the global platform where our community comes to find, form, and share diverse points of view, TikTok is proud to introduce the MVPs of POV: a new class of marketing trailblazers whose work is redefining brand storytelling for the discovery era.
“Today’s most effective marketers know that real brand love doesn’t come from shouting the loudest," said Sofia Hernandez, Global Head of Business Marketing at TikTok. “TikTok gives brands a chance to show up not as advertisers, but as people with personality, point of view, and purpose. The MVPs of POV are the ones who get it. They’re rewriting the rules of marketing by meeting communities where they are and showing up authentically and creatively without sacrificing ROI. This program celebrates the brands that aren’t just joining the conversation, they’re shaping it.”
"By staying true to our history while embedding our brand in modern culture, we are able to innovate without forgoing who we are, and that is key to building a strong POV on any social channel, particularly TikTok," said Fabiola Torres, Global CMO at Gap.
A New Era of Discovery, Powered by POV
In a world moving toward perspective-led exploration, TikTok continues to spark new ideas and experiences, with billions of searches happening on the platform every day. (1) Every scroll opens a new perspective; every tap joins a conversation; and every search leads to unexpected inspiration. In fact, according to new research conducted by WARC, 64% of users say they search TikTok to find multiple perspectives, and 60% of users say TikTok’s search results are more likely to motivate them to take action, compared to other platforms. (2)
TikTok is where discovery starts, and this year at Cannes Lions, we’re bringing that journey to life IRL with the MVPs of POV. The MVPs of POV program anchors TikTok’s presence at Cannes, turning the city into a live demonstration of how discovery happens on the platform, with programming and content highlighting all the innovative ways brands are engaging with the TikTok community.
Meet the MVPs of POV who are flipping the script on what it means to show up in culture, leaning into creator collaborations, leaning into real-time trends, and building community-driven campaigns that don’t just land – they resonate. Their work isn’t just seen, it’s discovered, shared, and remembered.
The MVPs of POV
- Avery Akkineni, CMO, VaynerX
- Anna Lenka Jáuregui, CMO at BCP / Credicorp
- Armagan Engel, Director, Communication Office, QNB Türkiye
- Benjamin Braun, VP and CMO at Samsung Europe
- Camila Ribeiro, Senior Director of Advertising, Media and Brand Management, TIM Brasil
- Catalina Beltran, WACAM Digital Lead at Mondelēz International
- Cecilia Schena, CMO at KIKO MILANO
- Charlie Smith, CMO at Loewe
- Daisy Kelly, Founder and CEO at Glow for It
- Domingo Iudice, Director at Brainpull
- Fabiola Torres, Global CMO at Gap
- Philip Edsel, VP of Brand & Creative at Ladder
- Ghadeer Khub, Creative and Production Director at the Abu Dhabi Department of Culture and Tourism
TikTok for Artists: The new all-in-one music insights platform for artists
- TikTok for Artists is a new artist-first platform designed to help artists build their careers and fanbase on TikTok
- Artists can now access data and insights about their music, posts and followers
- New 'Pre-Release' tool now available for the creation of album pre-release campaigns*
June 3 2025: Today, TikTok is proud to announce the global** launch of TikTok for Artists, the new all-in-one music insights platform for artists on TikTok. The new platform provides artists, their labels and their teams with data and insights which can help them better connect with the global TikTok community, promote their music, and drive success both on and off the platform.
TikTok for Artists provides daily-updated analytics dashboards which display a wealth of detailed, actionable data about the performance of an artist's music and posts on TikTok, and comprehensive insights into how the community is engaging with the artist and their music on the platform. The tool has been designed with the goal of helping artists and their teams boost fan engagement, optimize their promotional strategies and inform content creation on TikTok.
TikTok for Artists features include:
- Song performance: the number of views, posts and creator engagements per track
- Post performance: the number of views, likes, comments, shares and post completion rates
- Follower insights: including self-declared gender, age and language
- Step-by-step guides to TikTok's tools and features
- Support and further resources
Today's launch also sees the official global launch of the Pre-Release tool, a new self-service tool which gives artists the ability to promote the forthcoming release of an album on TikTok. The feature will allow fans to pre-save that album directly to their Spotify or Apple Music library, where it will become instantly available to listen to on their chosen music streaming service upon its release.
Tracy Gardner, TikTok's Global Head of Music Business Development, commented on the launch: "TikTok is already well known for being the world's best platform for music discovery and promotion, and with the launch of TikTok for Artists, all tiers of artists will gain insights on TikTok that they can use to take their careers to a whole new level. We built the platform to give artists transparent access to useful, actionable data about their music and their fans, to help them better engage with the TikTok community and supercharge their careers both on and off the platform."
British artist, Jordan Adetunji (640k followers), said: "TikTok for Artists is a game changer. It has so much information about my music, my followers, and how they’re using my songs in their posts. And it’s brilliant that I can give access to my team who can also use the data to help us plan our campaigns."
Australian artist, Cyril Riley (750k followers), an early tester of the platform, commented: "My team and I rely on TikTok for Artists daily, sometimes even hourly. In such a rapidly evolving industry, it's crucial for us to consistently monitor and review the analytics of my account."
TikTok for Artists is available now for all artists with a certified TikTok Artist Account. Artists are also able to provide account access to their artist teams, and to label teams.
|
Introducing the MVPs of POV: Meet the Marketers Powering Cultural Discovery
At this year’s Cannes Lions, TikTok is turning the spotlight on discovery and the marketing leaders who are shaping what comes next. As the global platform where our community comes to find, form, and share diverse points of view, TikTok is proud to introduce the MVPs of POV: a new class of marketing trailblazers whose work is redefining brand storytelling for the discovery era.
“Today’s most effective marketers know that real brand love doesn’t come from shouting the loudest," said Sofia Hernandez, Global Head of Business Marketing at TikTok. “TikTok gives brands a chance to show up not as advertisers, but as people with personality, point of view, and purpose. The MVPs of POV are the ones who get it. They’re rewriting the rules of marketing by meeting communities where they are and showing up authentically and creatively without sacrificing ROI. This program celebrates the brands that aren’t just joining the conversation, they’re shaping it.”
"By staying true to our history while embedding our brand in modern culture, we are able to innovate without forgoing who we are, and that is key to building a strong POV on any social channel, particularly TikTok," said Fabiola Torres, Global CMO at Gap.
A New Era of Discovery, Powered by POV
In a world moving toward perspective-led exploration, TikTok continues to spark new ideas and experiences, with billions of searches happening on the platform every day. (1) Every scroll opens a new perspective; every tap joins a conversation; and every search leads to unexpected inspiration. In fact, according to new research conducted by WARC, 64% of users say they search TikTok to find multiple perspectives, and 60% of users say TikTok’s search results are more likely to motivate them to take action, compared to other platforms. (2)
TikTok is where discovery starts, and this year at Cannes Lions, we’re bringing that journey to life IRL with the MVPs of POV. The MVPs of POV program anchors TikTok’s presence at Cannes, turning the city into a live demonstration of how discovery happens on the platform, with programming and content highlighting all the innovative ways brands are engaging with the TikTok community.
Meet the MVPs of POV who are flipping the script on what it means to show up in culture, leaning into creator collaborations, leaning into real-time trends, and building community-driven campaigns that don’t just land – they resonate. Their work isn’t just seen, it’s discovered, shared, and remembered.
The MVPs of POV
- Avery Akkineni, CMO, VaynerX
- Anna Lenka Jáuregui, CMO at BCP / Credicorp
- Armagan Engel, Director, Communication Office, QNB Türkiye
- Benjamin Braun, VP and CMO at Samsung Europe
- Camila Ribeiro, Senior Director of Advertising, Media and Brand Management, TIM Brasil
- Catalina Beltran, WACAM Digital Lead at Mondelēz International
- Cecilia Schena, CMO at KIKO MILANO
- Charlie Smith, CMO at Loewe
- Daisy Kelly, Founder and CEO at Glow for It
- Domingo Iudice, Director at Brainpull
- Fabiola Torres, Global CMO at Gap
- Philip Edsel, VP of Brand & Creative at Ladder
- Ghadeer Khub, Creative and Production Director at the Abu Dhabi Department of Culture and Tourism
TikTok for Artists: The new all-in-one music insights platform for artists
- TikTok for Artists is a new artist-first platform designed to help artists build their careers and fanbase on TikTok
- Artists can now access data and insights about their music, posts and followers
- New 'Pre-Release' tool now available for the creation of album pre-release campaigns*
June 3 2025: Today, TikTok is proud to announce the global** launch of TikTok for Artists, the new all-in-one music insights platform for artists on TikTok. The new platform provides artists, their labels and their teams with data and insights which can help them better connect with the global TikTok community, promote their music, and drive success both on and off the platform.
TikTok for Artists provides daily-updated analytics dashboards which display a wealth of detailed, actionable data about the performance of an artist's music and posts on TikTok, and comprehensive insights into how the community is engaging with the artist and their music on the platform. The tool has been designed with the goal of helping artists and their teams boost fan engagement, optimize their promotional strategies and inform content creation on TikTok.
TikTok for Artists features include:
- Song performance: the number of views, posts and creator engagements per track
- Post performance: the number of views, likes, comments, shares and post completion rates
- Follower insights: including self-declared gender, age and language
- Step-by-step guides to TikTok's tools and features
- Support and further resources
Today's launch also sees the official global launch of the Pre-Release tool, a new self-service tool which gives artists the ability to promote the forthcoming release of an album on TikTok. The feature will allow fans to pre-save that album directly to their Spotify or Apple Music library, where it will become instantly available to listen to on their chosen music streaming service upon its release.
Tracy Gardner, TikTok's Global Head of Music Business Development, commented on the launch: "TikTok is already well known for being the world's best platform for music discovery and promotion, and with the launch of TikTok for Artists, all tiers of artists will gain insights on TikTok that they can use to take their careers to a whole new level. We built the platform to give artists transparent access to useful, actionable data about their music and their fans, to help them better engage with the TikTok community and supercharge their careers both on and off the platform."
British artist, Jordan Adetunji (640k followers), said: "TikTok for Artists is a game changer. It has so much information about my music, my followers, and how they’re using my songs in their posts. And it’s brilliant that I can give access to my team who can also use the data to help us plan our campaigns."
Australian artist, Cyril Riley (750k followers), an early tester of the platform, commented: "My team and I rely on TikTok for Artists daily, sometimes even hourly. In such a rapidly evolving industry, it's crucial for us to consistently monitor and review the analytics of my account."
TikTok for Artists is available now for all artists with a certified TikTok Artist Account. Artists are also able to provide account access to their artist teams, and to label teams.
|
考点1:“MVPs of POV”推荐译为“视角最具价值人物”或“POV杰出人物”,不可直译为“POV的MVP”
考点2:“turning the spotlight on discovery”推荐译为“聚焦于探索”或“把注意力集中在发现上”,不可直译为“打开探照灯”或“打开聚光灯在发现上”。
考点3:“redefining brand storytelling”推荐译为“重新定义品牌叙事”
考点4:“show up not as advertisers, but as people with personality, point of view, and purpose”推荐译为“以有个性、有观点、有目标的人身份出现,而非传统广告主”
考点5:“they’re rewriting the rules of marketing by meeting communities where they are”推荐译为“他们通过贴近社群实际情况来重塑营销规则”
考点6:“every scroll opens a new perspective”推荐译为“每次滑动都带来新的视角”,不可直译为“每一次滚动开启一个新观点”。
考点7:“flipping the script on what it means to show up in culture”推荐译为“彻底改变了品牌参与文化表达的方式”,避免直译为“翻转剧本”。
考点8:“community-driven campaigns”推荐译为“以社群为驱动的营销活动”,不可直译为“社区驱动的活动”或“社区推动的战役”。
考点9:“analytics dashboards”推荐译为“数据分析仪表板”或“分析面板”
考点10:“Pre-Release tool”推荐译为“预发布工具”或“预热推广工具”
|
a1c3c
|
垂类场景
|
互联网
|
23
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
藏在“星星”里的热情
戴钰玲
我想给大家讲一个关于“星星”的故事。这 “星星”,不在浩瀚夜空闪烁,而是隐匿在临安青山翠谷间,每年金秋,随着第一缕秋风轻拂天目山,漫山遍野的山核桃树就像被点亮的绿色灯塔,颗颗饱满的山核桃便是那熠熠生辉的 “星星”,它们向世界发出诚挚邀约——来临安吧,尝尝我们藏在硬壳里的热情!
核桃为信,山水寄情
还记得去年白露,我满心欢喜地跟着爷爷上山打核桃。他扛着三米长的竹竿,像握着一支巨大的毛笔,在绿色的树冠上轻轻“作画”。“啪嗒啪嗒”,青褐色的核桃纷纷落下,打在我的遮阳帽上,仿佛奏响了一曲秋的乐章。爷爷弯腰捡起一颗核桃,他那布满老茧的大手轻轻蹭去外皮,露出裹着绒毛的“小脑袋”:“你看,每颗核桃都要在树上挂足九个月,喝的是山泉水,晒的是竹林漏下的阳光,连外壳上的纹路,都是天目山亲手刻的印章呢!”
此后,每当我剥开一颗山核桃,爷爷劳作的身影就会浮现在眼前。这些深山里孕育的 “金果子”,历经 270 天的漫长生长,是临安山水馈赠的厚礼,静静诉说着大自然的慷慨,也彰显着这片土地对每一份等待的珍视。
传承匠心,三代同辉
在村口的加工厂里,处处都是温情的画面。八十岁的阿婆戴着老花镜,眼神专注,用镊子仔细地挑出每一颗有瑕疵的核桃;叔叔们守着不锈钢炒锅,熟练地翻炒着,山核桃在蜂蜜与桂皮营造的香气中翻滚跳跃;年轻的哥哥姐姐们则对着手机镜头,将刚出锅的酥脆果仁轻轻掰开,让金黄的果仁在镜头前闪耀。
去年寒假,我跟着妈妈给直播间当小助手。当屏幕里的阿姨咬下第一口山核桃,眼睛突然亮起来:“原来你们的核桃这么香,是因为炒的时候,把人情味都炒进去了呀!”那一刻我突然明白,临安人传递给世界的,远不止是美味的零食,更是爷爷竹竿上的晨曦、阿婆指尖的专注,是三代人掌心相传的温暖,是代代坚守的匠心。
核桃传情,宾至如归
上个月,家里来了位外国游客。爸爸神秘地递给他一个小布袋,笑着说:“这是我们临安的‘神奇钥匙’请你打开看看。”只见他对着核桃发愁时,妈妈递上自制的核桃夹——那是用天目山竹子削成的精巧工具,中间还刻着小巧的山核桃图案。“先敲尖,再压腰,宝贝就会对你笑。”妈妈边说边示范,果仁“蹦”出来的瞬间,外国友人惊喜地喊道:“It's like opening a treasure box!”我们坐在老桂花树下,看他把果仁放进嘴里,脸上洋溢着幸福的笑容,嘴里不停地说着“So sweet, so warm”。那一刻,飘落的桂花、香脆的核桃、还有我们的笑声,都成了临安递给世界的明信片。
下次当你剥开一颗山核桃,不妨仔细聆听——那“咔嗒”一声裂开的,不仅是坚硬的外壳,更是临安人敞开的心扉。让我们带着山核桃的香脆、三代人的匠心,怀揣着对家乡的热爱,让客人从舌尖甜到心间。因为,最好的待客之道,从来都藏在最纯粹的家乡味道里,藏在我们眼里闪烁的、对这片土地的骄傲里!
|
藏在“星星”里的热情
戴钰玲
我想给大家讲一个关于“星星”的故事。这 “星星”,不在浩瀚夜空闪烁,而是隐匿在临安青山翠谷间,每年金秋,随着第一缕秋风轻拂天目山,漫山遍野的山核桃树就像被点亮的绿色灯塔,颗颗饱满的山核桃便是那熠熠生辉的 “星星”,它们向世界发出诚挚邀约——来临安吧,尝尝我们藏在硬壳里的热情!
核桃为信,山水寄情
还记得去年白露,我满心欢喜地跟着爷爷上山打核桃。他扛着三米长的竹竿,像握着一支巨大的毛笔,在绿色的树冠上轻轻“作画”。“啪嗒啪嗒”,青褐色的核桃纷纷落下,打在我的遮阳帽上,仿佛奏响了一曲秋的乐章。爷爷弯腰捡起一颗核桃,他那布满老茧的大手轻轻蹭去外皮,露出裹着绒毛的“小脑袋”:“你看,每颗核桃都要在树上挂足九个月,喝的是山泉水,晒的是竹林漏下的阳光,连外壳上的纹路,都是天目山亲手刻的印章呢!”
此后,每当我剥开一颗山核桃,爷爷劳作的身影就会浮现在眼前。这些深山里孕育的 “金果子”,历经 270 天的漫长生长,是临安山水馈赠的厚礼,静静诉说着大自然的慷慨,也彰显着这片土地对每一份等待的珍视。
传承匠心,三代同辉
在村口的加工厂里,处处都是温情的画面。八十岁的阿婆戴着老花镜,眼神专注,用镊子仔细地挑出每一颗有瑕疵的核桃;叔叔们守着不锈钢炒锅,熟练地翻炒着,山核桃在蜂蜜与桂皮营造的香气中翻滚跳跃;年轻的哥哥姐姐们则对着手机镜头,将刚出锅的酥脆果仁轻轻掰开,让金黄的果仁在镜头前闪耀。
去年寒假,我跟着妈妈给直播间当小助手。当屏幕里的阿姨咬下第一口山核桃,眼睛突然亮起来:“原来你们的核桃这么香,是因为炒的时候,把人情味都炒进去了呀!”那一刻我突然明白,临安人传递给世界的,远不止是美味的零食,更是爷爷竹竿上的晨曦、阿婆指尖的专注,是三代人掌心相传的温暖,是代代坚守的匠心。
核桃传情,宾至如归
上个月,家里来了位外国游客。爸爸神秘地递给他一个小布袋,笑着说:“这是我们临安的‘神奇钥匙’请你打开看看。”只见他对着核桃发愁时,妈妈递上自制的核桃夹——那是用天目山竹子削成的精巧工具,中间还刻着小巧的山核桃图案。“先敲尖,再压腰,宝贝就会对你笑。”妈妈边说边示范,果仁“蹦”出来的瞬间,外国友人惊喜地喊道:“It's like opening a treasure box!”我们坐在老桂花树下,看他把果仁放进嘴里,脸上洋溢着幸福的笑容,嘴里不停地说着“So sweet, so warm”。那一刻,飘落的桂花、香脆的核桃、还有我们的笑声,都成了临安递给世界的明信片。
下次当你剥开一颗山核桃,不妨仔细聆听——那“咔嗒”一声裂开的,不仅是坚硬的外壳,更是临安人敞开的心扉。让我们带着山核桃的香脆、三代人的匠心,怀揣着对家乡的热爱,让客人从舌尖甜到心间。因为,最好的待客之道,从来都藏在最纯粹的家乡味道里,藏在我们眼里闪烁的、对这片土地的骄傲里!
|
考点 1:"山核桃" 应译为 "Chinese hickory"
考点 2:"白露" 应译为 "White Dew"
考点 3:"外壳上的纹路" 应译为 "patterns on the shell"
考点 4:"金果子" 应译为 "golden nuts"
考点 5:"老花镜" 应译为 "reading glasses"
考点 6:"人情味" 应译为 "human warmth"
考点 7:"家乡味道" 应译为 "taste of home"
|
a1c63
|
文学艺术
|
散文
|
86
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
【黄春慧】管理学视角下“中庸之道”的现代转化与运用
摘要:中庸之道思想既是一种人生哲学,又对现代领导管理有很好的启示和指导意义。从对“中”的阐释中看到事物变化发展的差异性和矛盾性,促使我们在领导管理中把握好规律;从对“度”的认识中,要求把握火候,使各项职能得到有效的发挥;从对“和”的认识上把和谐发展作为发展的目标追求,从内部各要素和外部环境协调好关系,整合资源,提高领导管理效率;从对“诚”的认识上要求领导管理者重视修身之本,只有不断提升自身素质和能力,才能真正把握中庸思想的本质,提高领导管理水平。
关键词:管理/中庸之道/管理者/孔子
领导管理作为一种社会实践活动,建立在一定社会文化基础之上。为实现资源的有效配置和专业化分工协调,领导管理逐渐从一般社会活动中分离出来,并随时代变迁和人类文明进步而趋于制度化。中国历史上的管理大多体现于治国理政的政治方面,并逐渐扩展到社会活动的各个方面。中庸思想作为儒学的重要内容,《尚书·大禹谟》记载“人心惟危,道心惟微,惟精惟一,允执厥中。”凡事一定要执中,做到适当、适度,它是维持社会秩序稳定的有效方式与思想。但是当“中”的观念从一种行为智慧上升到社会主导价值取向时,对“中”的认识转向于“德”的理解,《论语·雍也》“中庸之为德也,其至矣乎!民鲜久矣。”“中庸”作为人的行为规范,成为儒家追求的高道德标准和精神境界。领导管理作为一种社会发展的制度保障和文化构成的要件,其有效性和管理水平的提高必须吸收和融入到历史的文化思想中去。儒家中庸思想蕴含的这种领导智慧,对现代管理有深远影响。[1]
一、从中庸“尚中”思想把握规律性问题
领导管理对规律的遵循就是要用科学的理念和方法协调各系统之间的关系,实现更高的效率和效益。孔子特别的“尚中”,把它作为人性发展的基本要求,作为评判“君子”品格的标准。在孔子看来,万事万物都存在着差异性,正是这种差异性构成了事物发展的关系复杂性,这是天地间的“道”,能否实现社会协调性发展,必须理清事物间存在的矛盾复杂性,从“尚中”的“道”的遵循做起。《中庸》中说:“不偏之谓中,不易之谓庸。中者,天下之正道,庸者,天下之定理。”“中”作为天下的“正道”体现了事物变化的本来面目,它不仅成为人的行为规范标准,同时也成为管理应遵循的原则。社会治理存在各种矛盾的影响,能否实现社会协调性的发展,必须从“尚中”的遵循做起。无论从管理计划、制度控制、用人决策等,是否在各利益关系平衡中做到恰到好处,是影响效果的关键,忽视这样的规律存在,不按规律办事,必然受到规律的惩罚,导致领导管理失败。
“天地之道,博也、厚也、高也、明也、悠也、久也”,领导管理活动如同“天地之道”,就是一个有目的、有意识的能动过程,领导管理中的各环节、各要素之间存在的差异性,需要通过计划、组织、控制和沟通等职能整合,处理好人与自然的关系,维护好社会生产关系,调节好内在的“博、厚、高、明、悠”等规律的复杂性,才能实现领导管理的科学化和有效性。人的天性就是顺应规律,达到中正及平衡有序,使天、地、人实现协调发展。而要达到“率性之谓道”的境界,必须“修道”,“修道”的关键是把握中庸的精髓,那就要做到恰当适度。事物发展的规律性也就在这个“度”,它是事物存在的依据,同时也是人的行为规定,把握好了“度”,同时也就更好做到了“中”,也就真正实践了“天下之定理”。因此,管理不仅要认清管理过程中的关系矛盾,认识到“中”的规律性,而且应通过适度把握做出恰当的选择,在具体的时空条件下做出适当的行为。
领导管理者要认清过程中的关系矛盾,通过适度把握做出恰当的选择。中庸之道要求顺应事物的自然禀性而为,因势利导;寻求内在平衡,做到不偏不倚,平衡各种极端冲突。从这个意义上说,中庸之道既是一种领导管理循“道”,也是遵“规”的科学方法论的应用。
|
【黄春慧】管理学视角下“中庸之道”的现代转化与运用
摘要:中庸之道思想既是一种人生哲学,又对现代领导管理有很好的启示和指导意义。从对“中”的阐释中看到事物变化发展的差异性和矛盾性,促使我们在领导管理中把握好规律;从对“度”的认识中,要求把握火候,使各项职能得到有效的发挥;从对“和”的认识上把和谐发展作为发展的目标追求,从内部各要素和外部环境协调好关系,整合资源,提高领导管理效率;从对“诚”的认识上要求领导管理者重视修身之本,只有不断提升自身素质和能力,才能真正把握中庸思想的本质,提高领导管理水平。
关键词:管理/中庸之道/管理者/孔子
领导管理作为一种社会实践活动,建立在一定社会文化基础之上。为实现资源的有效配置和专业化分工协调,领导管理逐渐从一般社会活动中分离出来,并随时代变迁和人类文明进步而趋于制度化。中国历史上的管理大多体现于治国理政的政治方面,并逐渐扩展到社会活动的各个方面。中庸思想作为儒学的重要内容,《尚书·大禹谟》记载“人心惟危,道心惟微,惟精惟一,允执厥中。”凡事一定要执中,做到适当、适度,它是维持社会秩序稳定的有效方式与思想。但是当“中”的观念从一种行为智慧上升到社会主导价值取向时,对“中”的认识转向于“德”的理解,《论语·雍也》“中庸之为德也,其至矣乎!民鲜久矣。”“中庸”作为人的行为规范,成为儒家追求的高道德标准和精神境界。领导管理作为一种社会发展的制度保障和文化构成的要件,其有效性和管理水平的提高必须吸收和融入到历史的文化思想中去。儒家中庸思想蕴含的这种领导智慧,对现代管理有深远影响。[1]
一、从中庸“尚中”思想把握规律性问题
领导管理对规律的遵循就是要用科学的理念和方法协调各系统之间的关系,实现更高的效率和效益。孔子特别的“尚中”,把它作为人性发展的基本要求,作为评判“君子”品格的标准。在孔子看来,万事万物都存在着差异性,正是这种差异性构成了事物发展的关系复杂性,这是天地间的“道”,能否实现社会协调性发展,必须理清事物间存在的矛盾复杂性,从“尚中”的“道”的遵循做起。《中庸》中说:“不偏之谓中,不易之谓庸。中者,天下之正道,庸者,天下之定理。”“中”作为天下的“正道”体现了事物变化的本来面目,它不仅成为人的行为规范标准,同时也成为管理应遵循的原则。社会治理存在各种矛盾的影响,能否实现社会协调性的发展,必须从“尚中”的遵循做起。无论从管理计划、制度控制、用人决策等,是否在各利益关系平衡中做到恰到好处,是影响效果的关键,忽视这样的规律存在,不按规律办事,必然受到规律的惩罚,导致领导管理失败。
“天地之道,博也、厚也、高也、明也、悠也、久也”,领导管理活动如同“天地之道”,就是一个有目的、有意识的能动过程,领导管理中的各环节、各要素之间存在的差异性,需要通过计划、组织、控制和沟通等职能整合,处理好人与自然的关系,维护好社会生产关系,调节好内在的“博、厚、高、明、悠”等规律的复杂性,才能实现领导管理的科学化和有效性。人的天性就是顺应规律,达到中正及平衡有序,使天、地、人实现协调发展。而要达到“率性之谓道”的境界,必须“修道”,“修道”的关键是把握中庸的精髓,那就要做到恰当适度。事物发展的规律性也就在这个“度”,它是事物存在的依据,同时也是人的行为规定,把握好了“度”,同时也就更好做到了“中”,也就真正实践了“天下之定理”。因此,管理不仅要认清管理过程中的关系矛盾,认识到“中”的规律性,而且应通过适度把握做出恰当的选择,在具体的时空条件下做出适当的行为。
领导管理者要认清过程中的关系矛盾,通过适度把握做出恰当的选择。中庸之道要求顺应事物的自然禀性而为,因势利导;寻求内在平衡,做到不偏不倚,平衡各种极端冲突。从这个意义上说,中庸之道既是一种领导管理循“道”,也是遵“规”的科学方法论的应用。
|
考点1:中庸之道应统一译为 the Doctrine of the Mean
考点2:尚中应译为 the principle of centrality 或 reverence for the middle way
考点3:度推荐译为 moderation 或 appropriate measure或grasp of proportion
考点4:和应译为 harmony
考点5:诚应译为 sincerity
考点6:修道应译为 cultivate the Way
考点7:不偏不倚应译为 neither biased nor partial 或 impartial and balanced
考点8:率性之谓道推荐译为 The Way is to follow one's innate nature
考点9:天下之正道应译为 the rightful Way of the world 或 the universal Way
考点10:博、厚、高、明、悠、久推荐意译为 vastness, profundity, elevation, clarity, expansiveness, and perpetuity
|
a28bc
|
学术论文
|
人文科学
|
73
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
法兰克福学派文化产业批判理论
1947 年,阿多诺和霍克海默合著了《启蒙辩证法》,在该书的《文化工业:作为欺骗群众的启蒙》一文中,阿多尔诺认为“大众文化”(massculture)一词模糊而不准确,应该用
“文化工业”(culturalindustry)这一新术语取而代之。霍克海默和阿多尔诺在文中并没有给文化工业下明确的定义,只大致提出它指涉凭借现代科学技术手段大规模地复制、传播文化产品的娱乐工业体系。在《文化工业再考察》一文中,阿多尔诺对术语作了阐释,认为其中的“工业”不能从字面上去理解,它表示事物本身的标准化和分配技术的合理化,而不是指严格的生产过程,除了文化工业的某些主要部分(如电影工业)之外,个别的生产形式(即构思及创作)仍被保持。因此,文化工业一词并不表示生产,而是表示文化产品的“标准化”和“伪个别性”。“文化工业”概念提出后,法兰克福学派其他主要代表人物马尔库塞、本杰明、哈贝马斯等人也对这个主题加以阐述,形成了法兰克福学派“文化工业”理论。法兰克福学派“文化工业”理论体现在《文化的肯定性质》《单面人》《机械复制时代中的艺术作品》《作为“意识形态”的技术和科学》等文本中,由于每个文本都有自己的主题,
因而在阐述文化工业时也各有侧重,但总体上都对文化工业采取了批判的、否定的态度。这与该学派的社会批判理论、文化批判理论是一致的。法兰克福学派认为批判精神才是马克思主义的生命力所在,他们秉承了马克思主义的批判精神,对资本主义工业文明进行强烈谴责和彻底抨击,展开了对文化工业的批判之维,这些批判主要集中在两个方面:第一、文化工业与文化/艺术的性质相悖。文化工业对文化/艺术产生严重的消极影响,是法兰克福学派批判文化工业的首要之点。文化/艺术彰显个性、独创性、否定性以及超越性等。而文化工业则借助于科技进步和工业化生产,把文化/艺术产品纳人市场交换的轨道,按照从生产到流通到消费的商品操作程序运作,使之服从于市场机制和价值规则,最终蜕变为纯粹的商品。首先,文化工业通过模仿、复制和包装等使文化产品具有了同质化、标准化、齐一化的性质,正如霍克海默和阿多尔诺指出的:“在文化工业中,这种摹仿最终成为绝对的”,“达到个性化的努力最终被摹仿的努力所取代”文化工业使文化/艺术失去了个性、独立自主性,降低了、损害了文化/艺术真正的、内在的价值。其次,文化工业在追求利润、形成文化同质性的过程中,剥夺了文化的批判功能,即其否定的、大拒绝的方式,使文化/艺术丧失了对社会的否定、批判的维度。再次,资本主义文化工业的发展是文化服从于资本的权力、资本的逻辑的结果,在其中,价值原则支配了文化的各个方面,工具理性支配了文化领域,甚至支配着社会生活的一切领域,意味着文化的人文意义和内在价值的全面覆灭。
4
总而言之,文化/艺术沦为商品,带来了文化/艺术产品标准化和齐一化,引起了文化/艺术的质变。第二、文化工业与人性相悖。文化工业行使着意识形态的功能,通过大量标准化、齐一化的文化产品的影响和渗透,不知不觉中实现对人的思想、心理的控制。阿多诺清醒地意识到这一点,他认为现代社会对个人的控制程度大大超过以往,这种控制不是通过暴力和恐怖手段实现,而是通过文化工业的意识形态功能完成;马尔库塞在《单面人》中提到:“娱乐和信息工业不可抗拒的产品所带来的是各种定式的态度和习惯以及精神和情感方面的某些反应,这种反应使消费者在不同程度上愉快地与生产者紧密结合起来,并通过后者与整个娱乐和信息工业紧密结合起来。这些产品向消费者灌输某些思想并操纵他们的行为;它们提倡一种不受其虚伪影响的虚伪意识,这成为一种生活方式。”他们都致力于说明,文化工业通过文化商品的生产,控制和规范着消费者的需要,成了一种支配人的力量。文化工业造成“启蒙在意识形态方面的倒退”,人们逐步习惯于看似丰富多彩、实际上却单一机械的生活方式,缺乏对社会现实的批判精神和否定意识,丧失了主体意识、感性能力和主动性,失去了从事更有价值和更为充实的活动的潜力。文化工业不仅侵人了人们的生活世界,更渗透到人的“私人空间”。“私人空间”本是人具有内在自由的空间,在这个空间里,人可以成为并仍然是“他自己”。但是文化下业控制了大众日常生活直至内心意识,一体化的公共舆论侵人了“私人空间”,剥夺了个人的内在自由,使人丧失了“他自己”。“文化工业的每个运动都不可避免地把人们再现为社会需要塑造的那种样子”,成为与人的本性相背离的物化存在。法兰克福学派对资本主义文化的一种模式——文化工业进行了深刻的、否定性的分析和批判,其批判的主题是与当时的社会历史条件紧密相关的。与法兰克福学派所关注,反映和批判的 20 世纪 40、50 年代相比,20 世纪后半叶至今的社会状况发生了很大的变化。在现时代,文化工业作为文化生产的一种手段,在全世界各个国家和地区都获得了迅速的发展,即出现了文化工业全球化的现象。就资本主义世界而言,美国学者杰姆逊在《晚期资本主义的文化逻辑》一书中,着眼于“后工业社会”或“晚期资本主义”的文化状况,指出当代资本的一大特点在于其势力已扩张到精神领域、文化领域,资本主义文化已被彻底商品化、工业化;当代资本主义或晚期资本主义的发展、科学技术的进步为文化工业提供了重要的前提和基础,使得当代资本主义世界在原有的基础上,形成了更为系统的文化工业体系;而在非资本主义世界,就我国而言,随着市场经济体制的建立和改革开放的进一步深入,文化/艺术的商品化、工业化也成了一种不可避免的趋势,发展我国的文化工业,规范我国的文化市场势在必行。总体而言,文化工业已成了一种全球性的文化现象。
5
单向度的人
发达工业社会成功地压制了人们心中的否定性、批判性、超越性的向度,使这个社会成为单向度的社会,而生活在其中的人就成了单向的人,这种人丧失了自由和创造力,不再想像或追求与现实生活不同的另一种生活。简单来说,单向度的人就是只知道物质享受而丧失了精神追求,只有物欲没有灵魂,对社会只有屈从没有批判精神的人,这样的人不会去追求更高的生活,甚至没有能力去想像更好的生活。同时,马尔库塞分析了现代资本主义社会对人的“消费控制”。在他看来,文化工业的先进手段使得“那些为了某些特殊的社会利益,从外部强加于个人的需求”不断大量生产出来,特别是所谓“强迫性消费”。在大众传播媒介的诱导下,人们在消费过程中不断得到一种虚假的满足,“人们似乎是为商品而生活,小轿车高清晰度的传真装置、错层式家庭住宅以及厨房设备成了人们生活的灵魂。”在马尔库塞看来,追求物质享受并不是人的本质特征,但是,在现代西方社会里,由于商人和传媒的共同操纵,人们把物质需求作为自己的最基本的需求,一旦把追求物质享受这种“虚假的需求”奉为信条,实际上人们已把“商品作为自己生活灵魂的中心”。人同产品的关系被颠倒了,不是产品为了满足人的需要而被生产,而是人为了使产品得到消费而存在。人拜倒在物面前,把物作为自己的灵魂,这就意味着忘却了、失去了自己的灵魂,这就是“物化”和“异化”的结局。工业社会技术发展带来的人的单向度,在当今网络社会中仍然存在并呈现加剧的态势。沉溺于虚拟现实、信息爆炸和自由的幻象削弱着人的批判性和反抗性,加强技术及其背后力量的社会控制。这种反思并非否定技术进步的积极功能和作用,而是提出一个参照和警示——虚拟社会并不是“乌托邦”,而只是一种媒介的形式
|
法兰克福学派文化产业批判理论
1947 年,阿多诺和霍克海默合著了《启蒙辩证法》,在该书的《文化工业:作为欺骗群众的启蒙》一文中,阿多尔诺认为“大众文化”(massculture)一词模糊而不准确,应该用
“文化工业”(culturalindustry)这一新术语取而代之。霍克海默和阿多尔诺在文中并没有给文化工业下明确的定义,只大致提出它指涉凭借现代科学技术手段大规模地复制、传播文化产品的娱乐工业体系。在《文化工业再考察》一文中,阿多尔诺对术语作了阐释,认为其中的“工业”不能从字面上去理解,它表示事物本身的标准化和分配技术的合理化,而不是指严格的生产过程,除了文化工业的某些主要部分(如电影工业)之外,个别的生产形式(即构思及创作)仍被保持。因此,文化工业一词并不表示生产,而是表示文化产品的“标准化”和“伪个别性”。“文化工业”概念提出后,法兰克福学派其他主要代表人物马尔库塞、本杰明、哈贝马斯等人也对这个主题加以阐述,形成了法兰克福学派“文化工业”理论。法兰克福学派“文化工业”理论体现在《文化的肯定性质》《单面人》《机械复制时代中的艺术作品》《作为“意识形态”的技术和科学》等文本中,由于每个文本都有自己的主题,
因而在阐述文化工业时也各有侧重,但总体上都对文化工业采取了批判的、否定的态度。这与该学派的社会批判理论、文化批判理论是一致的。法兰克福学派认为批判精神才是马克思主义的生命力所在,他们秉承了马克思主义的批判精神,对资本主义工业文明进行强烈谴责和彻底抨击,展开了对文化工业的批判之维,这些批判主要集中在两个方面:第一、文化工业与文化/艺术的性质相悖。文化工业对文化/艺术产生严重的消极影响,是法兰克福学派批判文化工业的首要之点。文化/艺术彰显个性、独创性、否定性以及超越性等。而文化工业则借助于科技进步和工业化生产,把文化/艺术产品纳人市场交换的轨道,按照从生产到流通到消费的商品操作程序运作,使之服从于市场机制和价值规则,最终蜕变为纯粹的商品。首先,文化工业通过模仿、复制和包装等使文化产品具有了同质化、标准化、齐一化的性质,正如霍克海默和阿多尔诺指出的:“在文化工业中,这种摹仿最终成为绝对的”,“达到个性化的努力最终被摹仿的努力所取代”文化工业使文化/艺术失去了个性、独立自主性,降低了、损害了文化/艺术真正的、内在的价值。其次,文化工业在追求利润、形成文化同质性的过程中,剥夺了文化的批判功能,即其否定的、大拒绝的方式,使文化/艺术丧失了对社会的否定、批判的维度。再次,资本主义文化工业的发展是文化服从于资本的权力、资本的逻辑的结果,在其中,价值原则支配了文化的各个方面,工具理性支配了文化领域,甚至支配着社会生活的一切领域,意味着文化的人文意义和内在价值的全面覆灭。
4
总而言之,文化/艺术沦为商品,带来了文化/艺术产品标准化和齐一化,引起了文化/艺术的质变。第二、文化工业与人性相悖。文化工业行使着意识形态的功能,通过大量标准化、齐一化的文化产品的影响和渗透,不知不觉中实现对人的思想、心理的控制。阿多诺清醒地意识到这一点,他认为现代社会对个人的控制程度大大超过以往,这种控制不是通过暴力和恐怖手段实现,而是通过文化工业的意识形态功能完成;马尔库塞在《单面人》中提到:“娱乐和信息工业不可抗拒的产品所带来的是各种定式的态度和习惯以及精神和情感方面的某些反应,这种反应使消费者在不同程度上愉快地与生产者紧密结合起来,并通过后者与整个娱乐和信息工业紧密结合起来。这些产品向消费者灌输某些思想并操纵他们的行为;它们提倡一种不受其虚伪影响的虚伪意识,这成为一种生活方式。”他们都致力于说明,文化工业通过文化商品的生产,控制和规范着消费者的需要,成了一种支配人的力量。文化工业造成“启蒙在意识形态方面的倒退”,人们逐步习惯于看似丰富多彩、实际上却单一机械的生活方式,缺乏对社会现实的批判精神和否定意识,丧失了主体意识、感性能力和主动性,失去了从事更有价值和更为充实的活动的潜力。文化工业不仅侵人了人们的生活世界,更渗透到人的“私人空间”。“私人空间”本是人具有内在自由的空间,在这个空间里,人可以成为并仍然是“他自己”。但是文化下业控制了大众日常生活直至内心意识,一体化的公共舆论侵人了“私人空间”,剥夺了个人的内在自由,使人丧失了“他自己”。“文化工业的每个运动都不可避免地把人们再现为社会需要塑造的那种样子”,成为与人的本性相背离的物化存在。法兰克福学派对资本主义文化的一种模式——文化工业进行了深刻的、否定性的分析和批判,其批判的主题是与当时的社会历史条件紧密相关的。与法兰克福学派所关注,反映和批判的 20 世纪 40、50 年代相比,20 世纪后半叶至今的社会状况发生了很大的变化。在现时代,文化工业作为文化生产的一种手段,在全世界各个国家和地区都获得了迅速的发展,即出现了文化工业全球化的现象。就资本主义世界而言,美国学者杰姆逊在《晚期资本主义的文化逻辑》一书中,着眼于“后工业社会”或“晚期资本主义”的文化状况,指出当代资本的一大特点在于其势力已扩张到精神领域、文化领域,资本主义文化已被彻底商品化、工业化;当代资本主义或晚期资本主义的发展、科学技术的进步为文化工业提供了重要的前提和基础,使得当代资本主义世界在原有的基础上,形成了更为系统的文化工业体系;而在非资本主义世界,就我国而言,随着市场经济体制的建立和改革开放的进一步深入,文化/艺术的商品化、工业化也成了一种不可避免的趋势,发展我国的文化工业,规范我国的文化市场势在必行。总体而言,文化工业已成了一种全球性的文化现象。
5
单向度的人
发达工业社会成功地压制了人们心中的否定性、批判性、超越性的向度,使这个社会成为单向度的社会,而生活在其中的人就成了单向的人,这种人丧失了自由和创造力,不再想像或追求与现实生活不同的另一种生活。简单来说,单向度的人就是只知道物质享受而丧失了精神追求,只有物欲没有灵魂,对社会只有屈从没有批判精神的人,这样的人不会去追求更高的生活,甚至没有能力去想像更好的生活。同时,马尔库塞分析了现代资本主义社会对人的“消费控制”。在他看来,文化工业的先进手段使得“那些为了某些特殊的社会利益,从外部强加于个人的需求”不断大量生产出来,特别是所谓“强迫性消费”。在大众传播媒介的诱导下,人们在消费过程中不断得到一种虚假的满足,“人们似乎是为商品而生活,小轿车高清晰度的传真装置、错层式家庭住宅以及厨房设备成了人们生活的灵魂。”在马尔库塞看来,追求物质享受并不是人的本质特征,但是,在现代西方社会里,由于商人和传媒的共同操纵,人们把物质需求作为自己的最基本的需求,一旦把追求物质享受这种“虚假的需求”奉为信条,实际上人们已把“商品作为自己生活灵魂的中心”。人同产品的关系被颠倒了,不是产品为了满足人的需要而被生产,而是人为了使产品得到消费而存在。人拜倒在物面前,把物作为自己的灵魂,这就意味着忘却了、失去了自己的灵魂,这就是“物化”和“异化”的结局。工业社会技术发展带来的人的单向度,在当今网络社会中仍然存在并呈现加剧的态势。沉溺于虚拟现实、信息爆炸和自由的幻象削弱着人的批判性和反抗性,加强技术及其背后力量的社会控制。这种反思并非否定技术进步的积极功能和作用,而是提出一个参照和警示——虚拟社会并不是“乌托邦”,而只是一种媒介的形式
|
考点1:伪个别性推荐翻译pseudo-individuality,不可译为“pseudo-individualization”
考点2:“阿多诺清醒地意识到这一点”中的“清醒地意识到”不可译为“clearly realized”,推荐译为“acutely aware”或“soberly realized”
考点3:“感性能力”不可译为“sensual ability”,推荐译为“aesthetic sensibility”或“perceptual ability”
考点4:“商品操作程序”不可译为“commodity operation procedures”,表达生硬。推荐译为“operates according to commercial processes”或“follows the logic of commodity production”
考点5:“人们心中的”不可直译为“in people's hearts”,在学术语境下显得过于文学化和情绪化。推荐译为“in people's minds”或“in human consciousness”
考点6:“主体意识”和“感性能力”可分别译为“subjectivity”或“sense of self”,以及“sensibility”
考点7:“批判性和反抗性”,不可译为“critical and resistant consciousness”,推荐译为“capacity for criticism and resistance”
|
a2deb
|
学术论文
|
人文科学
|
192
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
1. 蜀道集团:“蜀畅一号”TBM即将投入西香高速建设西宁高速全线开工建设
8月3日,由蜀道集团四川路桥和铁建重工集团联合打造的隧道工程利器一敞开式TBM“蜀畅一号”在长沙下线验收通过。顺利下线后,预计9月下旬在西香高速5标段完成安装调试及进洞首发。西香高速作为交通强国“十四五”重点项目,是四川建设交通强省、蜀道集团推进“五网融合”的重要支撑项目,是目前四川省内由单个项目公司管理单体投资建设体量最大的高速公路建设项目。项目包含“三桥五隧一地下互通”九大超级工程,施工区艰险陡峭,地质条件复杂。其中,盐源隧道全长14.15公里,不仅是西香高速五大隧道中10公里级最长隧道,还是目前全国在建第四、全省第二长隧道。针对施工隧址区地势艰险陡峭、地质条件复杂的特点,项目将采用TBM施工平导+大型机械钻爆法施工主洞模式,按“五横通六区间”布局,实现超特长隧道地下多掌子面的同步作业,确保项目工期可控,推动西香高速早日建成,早日结束凉山州盐源县、木里县不通高速的历史。
2. 省能投集团:与日本住友商事株式会社、北京兆泰集团开展工作会谈
8月1日,日本住友商事株式会社、北京兆泰集团到访四川能投,同四川能投进行工作座谈。四川能投作为四川省能源化工领军型企业,正围绕四川清洁能源优势,大力发展电力链、气体链、化工链、锂电链、氢能链五大链条。住友商事在能源资源、化学品、电子等方面与四川能投集团发展战略高度契合,北京兆泰集团在清洁能源业务有独特优势,三方将进一步深化清洁能源、绿氢绿氨、新材料、储能、动力电池回收等方面的合作,助力四川绿色低碳优势产业高质量发展,共同应对全球产业发展变革和全球气候变化挑战,续写中日经贸互利合作新篇章。
3. 川煤集团:嘉华机械公司与俄罗斯马珂自动化公司签订战略合作协议
8月1日,嘉华机械公司与俄罗斯马珂自动化公司签订了战略合作协议,标志川煤华荣嘉华向国际化又迈出了一大步。俄罗斯马珂自动化公司总经理瓦吉姆(Gruzdev Vadim)一行深入绿水洞煤矿井下现场查看嘉华机械公司综采装备应用情况,对嘉华机械公司在薄煤层、大倾角、急倾斜综采成套装备专业制造的水平给予了充分肯定。双方就产品质量、产品售后、“EAC”认证、品牌授权等细节进行了深入细致的探讨,并签定了战略合作协议。俄罗斯马珂公司成为嘉华机械公司在俄罗斯唯一一家具有代理嘉华机械公司煤机装备的企业,也为嘉华机械公司走出国门开辟了新通道。
4. 省旅投集团:正式上线数字旅投等保云平台护航集团数字信息安全
近日,旅投信产正式上线数字旅投等保云平台,进一步提高集团信息安全管理水平,促进集团数字化转型发展,为集团信息数字安全保驾护航。数字旅投等保云平台具有数据安全保护、数据统一合规管理、优化资源共享、快速风险应对等方面特点,将全方面、多领域为集团信息系统安全提供技术保障。
|
1. 蜀道集团:“蜀畅一号”TBM即将投入西香高速建设西宁高速全线开工建设
8月3日,由蜀道集团四川路桥和铁建重工集团联合打造的隧道工程利器一敞开式TBM“蜀畅一号”在长沙下线验收通过。顺利下线后,预计9月下旬在西香高速5标段完成安装调试及进洞首发。西香高速作为交通强国“十四五”重点项目,是四川建设交通强省、蜀道集团推进“五网融合”的重要支撑项目,是目前四川省内由单个项目公司管理单体投资建设体量最大的高速公路建设项目。项目包含“三桥五隧一地下互通”九大超级工程,施工区艰险陡峭,地质条件复杂。其中,盐源隧道全长14.15公里,不仅是西香高速五大隧道中10公里级最长隧道,还是目前全国在建第四、全省第二长隧道。针对施工隧址区地势艰险陡峭、地质条件复杂的特点,项目将采用TBM施工平导+大型机械钻爆法施工主洞模式,按“五横通六区间”布局,实现超特长隧道地下多掌子面的同步作业,确保项目工期可控,推动西香高速早日建成,早日结束凉山州盐源县、木里县不通高速的历史。
2. 省能投集团:与日本住友商事株式会社、北京兆泰集团开展工作会谈
8月1日,日本住友商事株式会社、北京兆泰集团到访四川能投,同四川能投进行工作座谈。四川能投作为四川省能源化工领军型企业,正围绕四川清洁能源优势,大力发展电力链、气体链、化工链、锂电链、氢能链五大链条。住友商事在能源资源、化学品、电子等方面与四川能投集团发展战略高度契合,北京兆泰集团在清洁能源业务有独特优势,三方将进一步深化清洁能源、绿氢绿氨、新材料、储能、动力电池回收等方面的合作,助力四川绿色低碳优势产业高质量发展,共同应对全球产业发展变革和全球气候变化挑战,续写中日经贸互利合作新篇章。
3. 川煤集团:嘉华机械公司与俄罗斯马珂自动化公司签订战略合作协议
8月1日,嘉华机械公司与俄罗斯马珂自动化公司签订了战略合作协议,标志川煤华荣嘉华向国际化又迈出了一大步。俄罗斯马珂自动化公司总经理瓦吉姆(Gruzdev Vadim)一行深入绿水洞煤矿井下现场查看嘉华机械公司综采装备应用情况,对嘉华机械公司在薄煤层、大倾角、急倾斜综采成套装备专业制造的水平给予了充分肯定。双方就产品质量、产品售后、“EAC”认证、品牌授权等细节进行了深入细致的探讨,并签定了战略合作协议。俄罗斯马珂公司成为嘉华机械公司在俄罗斯唯一一家具有代理嘉华机械公司煤机装备的企业,也为嘉华机械公司走出国门开辟了新通道。
4. 省旅投集团:正式上线数字旅投等保云平台护航集团数字信息安全
近日,旅投信产正式上线数字旅投等保云平台,进一步提高集团信息安全管理水平,促进集团数字化转型发展,为集团信息数字安全保驾护航。数字旅投等保云平台具有数据安全保护、数据统一合规管理、优化资源共享、快速风险应对等方面特点,将全方面、多领域为集团信息系统安全提供技术保障。
|
考点1:“蜀道集团”需译为“SHUDAO INVESTMENT GROUP”或“Shudao Investment Group”
考点2:“高速”推荐译为“Expressway”
考点3:“四川路桥”推荐译为“Sichuan Road & Bridge Group”
考点4:“铁建重工集团”推荐译为“China Railway Construction Heavy Industry Corporation Limited”或者“China Railway Construction Heavy Industry Corporation”
考点5:“西香高速”需译为“Xichang-Shangrila Express Way”
考点6:“十四五”推荐译为“the 14th Five-Year Plan”
考点7:“平导”推荐译为“parallel adit”或“pilot tunnel”
考点8:“爆钻法”推荐译为“Drill and Blast Method”
考点9:“五通道六区间”推荐译为“Excavation of five connecting adits completed within six running tunnel sections”
考点10:“凉山州”需译为“Liangshan Yi Autonomous Prefecture”
考点11:“木里县”需译为“Muli Tibetan Autonomous County”
考点12:“省能投集团”推荐译为“Sichuan Provincial Investment Group”
考点13:“日本住友商事株式会社”推荐译为“Sumitomo Corporation”
考点14:“北京兆泰集团”推荐译为“Zhao Tai Group”
考点15:“川煤集团”推荐译为“Sichuan Coal Industry Group”
考点16:“嘉华机械”推荐译为“Sichuan Jiahua Machinery”
考点17:“西宁高速”推荐译为“Xining Expressway”
|
a3d00
|
新闻资讯
|
新闻报道
|
17
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
CHAPTER III.
BEAUTY.
A NOBLER want of man is served by nature, namely, the love of Beauty.
The ancient Greeks called the world κοσμος, beauty. Such is the constitution of all things, or such the plastic power of the human eye, that the primary forms, as the sky, the mountain, the tree, the animal, give us a delight in and for themselves; a pleasure arising from outline, color, motion, and grouping. This seems partly owing to the eye itself. The eye is the best of artists. By the mutual action of its structure and of the laws of light, perspective is produced, which integrates every mass of objects, of what character soever, into a well colored and shaded globe, so that where the particular objects are mean and unaffecting, the landscape which they compose, is round and symmetrical. And as the eye is the best composer, so light is the first of painters. There is no object so foul that intense light will not make beautiful. And the stimulus it affords to the sense, and a sort of infinitude which it hath, like space and time, make all matter gay. Even the corpse has its own beauty. But besides this general grace diffused over nature, almost all the individual forms are agreeable to the eye, as is proved by our endless imitations of some of them, as the acorn, the grape, the pine-cone, the wheat-ear, the egg, the wings and forms of most birds, the lion's claw, the serpent, the butterfly, sea-shells, flames, clouds, buds, leaves, and the forms of many trees, as the palm.
For better consideration, we may distribute the aspects of Beauty in a threefold manner.
1. First, the simple perception of natural forms is a delight. The influence of the forms and actions in nature, is so needful to man, that, in its lowest functions, it seems to lie on the confines of commodity and beauty. To the body and mind which have been cramped by noxious work or company, nature is medicinal and restores their tone. The tradesman, the attorney comes out of the din and craft of the street, and sees the sky and the woods, and is a man again. In their eternal calm, he finds himself. The health of the eye seems to demand a horizon. We are never tired, so long as we can see far enough.
But in other hours, Nature satisfies by its loveliness, and without any mixture of corporeal benefit. I see the spectacle of morning from the hill-top over against my house, from day-break to sun-rise, with emotions which an angel might share. The long slender bars of cloud float like fishes in the sea of crimson light. From the earth, as a shore, I look out into that silent sea. I seem to partake its rapid transformations: the active enchantment reaches my dust, and I dilate and conspire with the morning wind. How does Nature deify us with a few and cheap elements! Give me health and a day, and I will make the pomp of emperors ridiculous. The dawn is my Assyria; the sun-set and moon-rise my Paphos, and unimaginable realms of faerie; broad noon shall be my England of the senses and the understanding; the night shall be my Germany of mystic philosophy and dreams.
Not less excellent, except for our less susceptibility in the afternoon, was the charm, last evening, of a January sunset. The western clouds divided and subdivided themselves into pink flakes modulated with tints of unspeakable softness; and the air had so much life and sweetness, that it was a pain to come within doors. What was it that nature would say? Was there no meaning in the live repose of the valley behind the mill, and which Homer or Shakspeare could not reform for me in words? The leafless trees become spires of flame in the sunset, with the blue east for their back-ground, and the stars of the dead calices of flowers, and every withered stem and stubble rimed with frost, contribute something to the mute music.
The inhabitants of cities suppose that the country landscape is pleasant only half the year. I please myself with the graces of the winter scenery, and believe that we are as much touched by it as by the genial influences of summer. To the attentive eye, each moment of the year has its own beauty, and in the same field, it beholds, every hour, a picture which was never seen before, and which shall never be seen again. The heavens change every moment, and reflect their glory or gloom on the plains beneath. The state of the crop in the surrounding farms alters the expression of the earth from week to week. The succession of native plants in the pastures and roadsides, which makes the silent clock by which time tells the summer hours, will make even the divisions of the day sensible to a keen observer. The tribes of birds and insects, like the plants punctual to their time, follow each other, and the year has room for all. By water-courses, the variety is greater. In July, the blue pontederia or pickerel-weed blooms in large beds in the shallow parts of our pleasant river, and swarms with yellow butterflies in continual motion. Art cannot rival this pomp of purple and gold. Indeed the river is a perpetual gala, and boasts each month a new ornament.
But this beauty of Nature which is seen and felt as beauty, is the least part. The shows of day, the dewy morning, the rainbow, mountains, orchards in blossom, stars, moonlight, shadows in still water, and the like, if too eagerly hunted, become shows merely, and mock us with their unreality. Go out of the house to see the moon, and 't is mere tinsel; it will not please as when its light shines upon your necessary journey. The beauty that shimmers in the yellow afternoons of October, who ever could clutch it? Go forth to find it, and it is gone: 't is only a mirage as you look from the windows of diligence.
2. The presence of a higher, namely, of the spiritual element is essential to its perfection. The high and divine beauty which can be loved without effeminacy, is that which is found in combination with the human will. Beauty is the mark God sets upon virtue. Every natural action is graceful. Every heroic act is also decent, and causes the place and the bystanders to shine. We are taught by great actions that the universe is the property of every individual in it. Every rational creature has all nature for his dowry and estate. It is his, if he will. He may divest himself of it; he may creep into a corner, and abdicate his kingdom, as most men do, but he is entitled to the world by his constitution. In proportion to the energy of his thought and will, he takes up the world into himself. "All those things for which men plough, build, or sail, obey virtue;" said Sallust. "The winds and waves," said Gibbon, "are always on the side of the ablest navigators." So are the sun and moon and all the stars of heaven. When a noble act is done,—perchance in a scene of great natural beauty; when Leonidas and his three hundred martyrs consume one day in dying, and the sun and moon come each and look at them once in the steep defile of Thermopylae; when Arnold Winkelried, in the high Alps, under the shadow of the avalanche, gathers in his side a sheaf of Austrian spears to break the line for his comrades; are not these heroes entitled to add the beauty of the scene to the beauty of the deed? When the bark of Columbus nears the shore of America;—before it, the beach lined with savages, fleeing out of all their huts of cane; the sea behind; and the purple mountains of the Indian Archipelago around, can we separate the man from the living picture? Does not the New World clothe his form with her palm-groves and savannahs as fit drapery? Ever does natural beauty steal in like air, and envelope great actions. When Sir Harry Vane was dragged up the Tower-hill, sitting on a sled, to suffer death, as the champion of the English laws, one of the multitude cried out to him, "You never sate on so glorious a seat." Charles II., to intimidate the citizens of London, caused the patriot Lord Russel to be drawn in an open coach, through the principal streets of the city, on his way to the scaffold. "But," his biographer says, "the multitude imagined they saw liberty and virtue sitting by his side." In private places, among sordid objects, an act of truth or heroism seems at once to draw to itself the sky as its temple, the sun as its candle. Nature stretcheth out her arms to embrace man, only let his thoughts be of equal greatness. Willingly does she follow his steps with the rose and the violet, and bend her lines of grandeur and grace to the decoration of her darling child. Only let his thoughts be of equal scope, and the frame will suit the picture. A virtuous man is in unison with her works, and makes the central figure of the visible sphere. Homer, Pindar, Socrates, Phocion, associate themselves fitly in our memory with the geography and climate of Greece. The visible heavens and earth sympathize with Jesus. And in common life, whosoever has seen a person of powerful character and happy genius, will have remarked how easily he took all things along with him,—the persons, the opinions, and the day, and nature became ancillary to a man.
|
CHAPTER III.
BEAUTY.
A NOBLER want of man is served by nature, namely, the love of Beauty.
The ancient Greeks called the world κοσμος, beauty. Such is the constitution of all things, or such the plastic power of the human eye, that the primary forms, as the sky, the mountain, the tree, the animal, give us a delight in and for themselves; a pleasure arising from outline, color, motion, and grouping. This seems partly owing to the eye itself. The eye is the best of artists. By the mutual action of its structure and of the laws of light, perspective is produced, which integrates every mass of objects, of what character soever, into a well colored and shaded globe, so that where the particular objects are mean and unaffecting, the landscape which they compose, is round and symmetrical. And as the eye is the best composer, so light is the first of painters. There is no object so foul that intense light will not make beautiful. And the stimulus it affords to the sense, and a sort of infinitude which it hath, like space and time, make all matter gay. Even the corpse has its own beauty. But besides this general grace diffused over nature, almost all the individual forms are agreeable to the eye, as is proved by our endless imitations of some of them, as the acorn, the grape, the pine-cone, the wheat-ear, the egg, the wings and forms of most birds, the lion's claw, the serpent, the butterfly, sea-shells, flames, clouds, buds, leaves, and the forms of many trees, as the palm.
For better consideration, we may distribute the aspects of Beauty in a threefold manner.
1. First, the simple perception of natural forms is a delight. The influence of the forms and actions in nature, is so needful to man, that, in its lowest functions, it seems to lie on the confines of commodity and beauty. To the body and mind which have been cramped by noxious work or company, nature is medicinal and restores their tone. The tradesman, the attorney comes out of the din and craft of the street, and sees the sky and the woods, and is a man again. In their eternal calm, he finds himself. The health of the eye seems to demand a horizon. We are never tired, so long as we can see far enough.
But in other hours, Nature satisfies by its loveliness, and without any mixture of corporeal benefit. I see the spectacle of morning from the hill-top over against my house, from day-break to sun-rise, with emotions which an angel might share. The long slender bars of cloud float like fishes in the sea of crimson light. From the earth, as a shore, I look out into that silent sea. I seem to partake its rapid transformations: the active enchantment reaches my dust, and I dilate and conspire with the morning wind. How does Nature deify us with a few and cheap elements! Give me health and a day, and I will make the pomp of emperors ridiculous. The dawn is my Assyria; the sun-set and moon-rise my Paphos, and unimaginable realms of faerie; broad noon shall be my England of the senses and the understanding; the night shall be my Germany of mystic philosophy and dreams.
Not less excellent, except for our less susceptibility in the afternoon, was the charm, last evening, of a January sunset. The western clouds divided and subdivided themselves into pink flakes modulated with tints of unspeakable softness; and the air had so much life and sweetness, that it was a pain to come within doors. What was it that nature would say? Was there no meaning in the live repose of the valley behind the mill, and which Homer or Shakspeare could not reform for me in words? The leafless trees become spires of flame in the sunset, with the blue east for their back-ground, and the stars of the dead calices of flowers, and every withered stem and stubble rimed with frost, contribute something to the mute music.
The inhabitants of cities suppose that the country landscape is pleasant only half the year. I please myself with the graces of the winter scenery, and believe that we are as much touched by it as by the genial influences of summer. To the attentive eye, each moment of the year has its own beauty, and in the same field, it beholds, every hour, a picture which was never seen before, and which shall never be seen again. The heavens change every moment, and reflect their glory or gloom on the plains beneath. The state of the crop in the surrounding farms alters the expression of the earth from week to week. The succession of native plants in the pastures and roadsides, which makes the silent clock by which time tells the summer hours, will make even the divisions of the day sensible to a keen observer. The tribes of birds and insects, like the plants punctual to their time, follow each other, and the year has room for all. By water-courses, the variety is greater. In July, the blue pontederia or pickerel-weed blooms in large beds in the shallow parts of our pleasant river, and swarms with yellow butterflies in continual motion. Art cannot rival this pomp of purple and gold. Indeed the river is a perpetual gala, and boasts each month a new ornament.
But this beauty of Nature which is seen and felt as beauty, is the least part. The shows of day, the dewy morning, the rainbow, mountains, orchards in blossom, stars, moonlight, shadows in still water, and the like, if too eagerly hunted, become shows merely, and mock us with their unreality. Go out of the house to see the moon, and 't is mere tinsel; it will not please as when its light shines upon your necessary journey. The beauty that shimmers in the yellow afternoons of October, who ever could clutch it? Go forth to find it, and it is gone: 't is only a mirage as you look from the windows of diligence.
2. The presence of a higher, namely, of the spiritual element is essential to its perfection. The high and divine beauty which can be loved without effeminacy, is that which is found in combination with the human will. Beauty is the mark God sets upon virtue. Every natural action is graceful. Every heroic act is also decent, and causes the place and the bystanders to shine. We are taught by great actions that the universe is the property of every individual in it. Every rational creature has all nature for his dowry and estate. It is his, if he will. He may divest himself of it; he may creep into a corner, and abdicate his kingdom, as most men do, but he is entitled to the world by his constitution. In proportion to the energy of his thought and will, he takes up the world into himself. "All those things for which men plough, build, or sail, obey virtue;" said Sallust. "The winds and waves," said Gibbon, "are always on the side of the ablest navigators." So are the sun and moon and all the stars of heaven. When a noble act is done,—perchance in a scene of great natural beauty; when Leonidas and his three hundred martyrs consume one day in dying, and the sun and moon come each and look at them once in the steep defile of Thermopylae; when Arnold Winkelried, in the high Alps, under the shadow of the avalanche, gathers in his side a sheaf of Austrian spears to break the line for his comrades; are not these heroes entitled to add the beauty of the scene to the beauty of the deed? When the bark of Columbus nears the shore of America;—before it, the beach lined with savages, fleeing out of all their huts of cane; the sea behind; and the purple mountains of the Indian Archipelago around, can we separate the man from the living picture? Does not the New World clothe his form with her palm-groves and savannahs as fit drapery? Ever does natural beauty steal in like air, and envelope great actions. When Sir Harry Vane was dragged up the Tower-hill, sitting on a sled, to suffer death, as the champion of the English laws, one of the multitude cried out to him, "You never sate on so glorious a seat." Charles II., to intimidate the citizens of London, caused the patriot Lord Russel to be drawn in an open coach, through the principal streets of the city, on his way to the scaffold. "But," his biographer says, "the multitude imagined they saw liberty and virtue sitting by his side." In private places, among sordid objects, an act of truth or heroism seems at once to draw to itself the sky as its temple, the sun as its candle. Nature stretcheth out her arms to embrace man, only let his thoughts be of equal greatness. Willingly does she follow his steps with the rose and the violet, and bend her lines of grandeur and grace to the decoration of her darling child. Only let his thoughts be of equal scope, and the frame will suit the picture. A virtuous man is in unison with her works, and makes the central figure of the visible sphere. Homer, Pindar, Socrates, Phocion, associate themselves fitly in our memory with the geography and climate of Greece. The visible heavens and earth sympathize with Jesus. And in common life, whosoever has seen a person of powerful character and happy genius, will have remarked how easily he took all things along with him,—the persons, the opinions, and the day, and nature became ancillary to a man.
|
考点1:【company 】应译为“人际往来”。
考点2:【my dust】应译为“我的身躯”。
考点3:【and the air had so much life】中的【life】应译为“清新”。
考点4:【attentive eye】应译为“有心人”,不可直译为“专注的眼睛”
考点5:【decent】应译为“正道”。
考点6:【Tower-hill】应译为“塔丘”,英国伦敦中心的地区。
|
a6f30
|
文学艺术
|
小说
|
61
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
The Diversity Elevator: On R. F. Kuang’s “Yellowface”
Historically, yellowface was a Hollywood phenomenon. The portmanteau, like the offense it characterizes, is hideously obvious, wherein a white actor transforms into an Orientalist caricature for racist comic relief. On the page, however, this minstrelsy is more subtle. The fraudulence is professional, encased within a name.
Since the 1990s, at least two instances of literary yellowface have arisen in the world of American poetry. The poet Kent Johnson contrived an exhaustive biography and body of work for a fictitious Japanese poet named Araki Yasusada. Johnson never expressly admitted to fabricating the persona, but served as its “executor,” overseeing all matters of correspondence and even compiling a volume of his poetry. Similarly, Michael Derrick Hudson adopted the Chinese moniker Yi-Fen Chou to submit poems previously rejected under his real name, a move that apparently increased his work’s prospects for publication. Hudson only admitted to doing so in 2015 when one of his poems was selected for that year’s Best American Poetry.
These poetic provocations were not malicious, so Johnson and Hudson have claimed. Johnson has, more or less, insisted that the fabricated persona was a postmodernist response to “the unrepresentable acts of Hiroshima [and] Nagasaki.” Meanwhile, Hudson’s deception seems to be a sorry attempt at validating the artistic viability of his rejected work. The implications of this racial subterfuge have been subject to much literary debate, and constitute the central theme of R.F. Kuang’s unsubtly-titled novel Yellowface. I don’t intend to relitigate the rationale behind these hoaxes, except to remark that if Kuang’s protagonist, the young white novelist June Hayward, had possessed a sliver of Johnson’s or Hudson’s delusional gall, Yellowface would have made for a much more exciting read. Instead, the novel is a lackluster examination of plagiarism, privilege, and cultural appropriation that is too assured of its own righteousness; that fails, in its moral assertions and limp characterizations, to conclude anything besides the painstakingly obvious. With a contrived plot and colorless, cliché-ridden prose, Yellowface, which is billed as a “razor sharp” satire, offers remarkably little novelty and nuance into contested artistic territory.
•
June Hayward is a novelist whose coming-of-age debut was released to middling acclaim. Wracked by careerist envy, June is debilitated by the success of her friend and fellow writer Athena Liu, the newly-crowned Asian American darling of the literary world. Athena, at the ripe age of 27, has three bestselling novels, a Netflix deal, and “a history of awards nominations longer than [a] grocery list,” while June is adrift with an agent who doesn’t seem to even like her work. Knowledge of Athena’s success only exacerbates June’s writer’s block. She was “derailed for days” after hearing of her friend’s six-figure option deal, an admission that leads the reader to wonder: Was June ever much of a writer at all?
Turns out, she’s more of a plagiarist—and a puzzlingly diligent one at that. After bearing witness to Athena’s untimely death, June steals an unfinished manuscript off her dead friend’s desk, substantially reworks the stolen material, and claims it as an original work. The manuscript, a historical epic about Chinese laborers in World War I, launches June to literary stardom. But June’s duplicity doesn’t stop after she rejoices in “breaking the glass ceiling.” At the behest of the white editors who acquired her manuscript, June rebrands as the vaguely Asian-sounding Juniper Song “to have a clean start.” She manipulates Athena’s mother to keep her from sharing her dead daughter’s diaries with the public, fearing they contained evidence of her plagiarism. She extorts Athena’s ex-boyfriend and gets an editorial assistant who harbored suspicions about her writing fired. She even briefly considers murder.
Contrary to this aforementioned plot summary, the novel’s tone is not one of Ripley-esque malice, but is self-consciously confessional à la Sally Rooney. The novel’s sophomoric and humorless prose is cluttered with banal exposition (“I shut the lid and push my laptop across the desk, breathless at my own audacity”), dull dialogue, trivial observations (“The line at the campus Starbucks was moving at a glacial pace”), and weak clichés (“I can tell this book is going to dazzle”; “I glimpse something that makes my heart stop”; “I fall in love with writing again”). The diaristic narration speeds through June’s most shocking transgressions and skips past the manuscript theft, effacing the novel of any psychological momentum. The chapters end hastily, often with a foreboding sentiment, dangled like a carrot to entice the reader on. The first chapter features one such example: “Meanwhile, in my bag, tossed at the floor of my bed, Athena’s manuscript sits like a hot sack of coals.”
As the novel progresses, these narrative cliffhangers serve as fleeting proof of June’s entitled delusion. The perfunctory dialogue is set up to be a weak defense of June’s worst, cancel-worthy traits. Consider this feeble rebuttal mounted amidst her impending Twitter cancellation: “It’s the internet that’s fucked, not me. It’s this contingent of social justice warriors, these clout-chasing white ‘allies,’ and Asian activists seeking attention who are acting up. I am not the bad guy. I am the victim here.” This is, of course, a roundabout reminder that June is the bad guy. Her objections are not persuasive, as they are an unsophisticated ploy to peel back the authorial curtain, revealing the earnest plot designer behind the page, ready to clue readers into her manufactured conclusions. Yellowface, then, becomes an excruciatingly cumbersome mental exercise, as the reader is asked to suspend disbelief that such an eminently skittish and stupid character, on the basis of her whiteness, could fool the publishing industry with little more than a half-baked plan in place. When sustained over the course of 336 pages, the narration sags in its inverted moral didacticism. The novel doesn’t seem to “grapple with questions of diversity, racism, and cultural appropriation,” as the jacket copy claims, as much as it regurgitates palatable groupthink on the matters at hand.
June is no Rachel Dolezal, strategic and self-righteous in her racist ruse. We learn that her plagiarism is motivated by puerile revenge, a tit-for-tat since Athena, so June claims, stole from her first. June was sexually assaulted in college (“my maybe-rape”), an experience that’s callously recounted in a few pages over the novel’s halfway mark. The assault is alluded to only once beyond that section. June claimed to bury her trauma “so deep in the back of my mind that [it] wouldn’t resurface until therapy sessions many years later.” We learn that June first disclosed this sexual trauma to Athena, who, in a “Cat Person”-like twist of events, mined it for a short story.
One could recognize how Athena’s emotional theft fueled June’s rage over time, her success finally pushing June off the embittered edge. But June, as far as we know, had no ongoing scheme against her nemesis, nor was she a compulsive plagiarist in college. In the third chapter, which was crafted to function as an anticipatory aside, June mounts a self-reflexive defense of the theft, declaring that it “felt like reparations, payback for the things that Athena took from me.” It’s a rare instance of the character’s deranged folly on display, as her postmortem resentment is felt in timid doses, and her jealous obsession (“I feel this hot coiling in my stomach, a bizarre urge to stick my fingers in her berry-red-painted mouth and rip her face apart”) is alluded to but left largely unexplored.
There are many discrepancies in Yellowface, least of which is how a white girl from Philadelphia can physically pass as a part-Asian writer by adopting the surname Song and donning a bad tan: “I’ve never pretended to be Chinese,” June says, after an older Chinese woman confuses her to be of Asian heritage. But the most incongruous aspect of Yellowface is the self-conscious moral schema imposed upon June, who should be, by all accounts, a far more shameless and shrewd anti-hero. June is so skittishly insecure that she lives more in fear of cancel culture than a hefty lawsuit from her publishers. She is preoccupied with appearances (“I want bloggers, reviewers, and readers to know I’m the kind of person who, you know, cares about the right issues”), an obsession that leads her to fund an annual scholarship in Athena’s name and volunteer to mentor young AAPI writers. “I’m going to be better than Athena. I am a woman who helps other women,” she says.
June’s moral framework—specifically her compulsion to perform goodness—seems to be imported directly from Twitter, the virtual world where the novel briefly achieves its parodic foothold. But let’s not mistake parody for profundity. Anyone who has spent time scrolling through literary Twitter is capable of imitating its dialogic absurdities. This uneven characterization is puzzling, as Kuang has said that she set out to write an unlikable narrator in the vein of Gone Girl and The Girl in the Window. Fictional narrators are generally understood to be unreliable, though unlikability is, as of late, a trendy provocation. The novel’s form has become “a tool for moral instruction,” argued the critic Lauren Oyler, a technique to “make [a] feminist argument about how the shiftiness of narrative can be used and abused in imbalanced power relations.” Yellowface attempts to subvert this from a racial vantage point, though Kuang does little to disguise her didacticism.
|
The Diversity Elevator: On R. F. Kuang’s “Yellowface”
Historically, yellowface was a Hollywood phenomenon. The portmanteau, like the offense it characterizes, is hideously obvious, wherein a white actor transforms into an Orientalist caricature for racist comic relief. On the page, however, this minstrelsy is more subtle. The fraudulence is professional, encased within a name.
Since the 1990s, at least two instances of literary yellowface have arisen in the world of American poetry. The poet Kent Johnson contrived an exhaustive biography and body of work for a fictitious Japanese poet named Araki Yasusada. Johnson never expressly admitted to fabricating the persona, but served as its “executor,” overseeing all matters of correspondence and even compiling a volume of his poetry. Similarly, Michael Derrick Hudson adopted the Chinese moniker Yi-Fen Chou to submit poems previously rejected under his real name, a move that apparently increased his work’s prospects for publication. Hudson only admitted to doing so in 2015 when one of his poems was selected for that year’s Best American Poetry.
These poetic provocations were not malicious, so Johnson and Hudson have claimed. Johnson has, more or less, insisted that the fabricated persona was a postmodernist response to “the unrepresentable acts of Hiroshima [and] Nagasaki.” Meanwhile, Hudson’s deception seems to be a sorry attempt at validating the artistic viability of his rejected work. The implications of this racial subterfuge have been subject to much literary debate, and constitute the central theme of R.F. Kuang’s unsubtly-titled novel Yellowface. I don’t intend to relitigate the rationale behind these hoaxes, except to remark that if Kuang’s protagonist, the young white novelist June Hayward, had possessed a sliver of Johnson’s or Hudson’s delusional gall, Yellowface would have made for a much more exciting read. Instead, the novel is a lackluster examination of plagiarism, privilege, and cultural appropriation that is too assured of its own righteousness; that fails, in its moral assertions and limp characterizations, to conclude anything besides the painstakingly obvious. With a contrived plot and colorless, cliché-ridden prose, Yellowface, which is billed as a “razor sharp” satire, offers remarkably little novelty and nuance into contested artistic territory.
•
June Hayward is a novelist whose coming-of-age debut was released to middling acclaim. Wracked by careerist envy, June is debilitated by the success of her friend and fellow writer Athena Liu, the newly-crowned Asian American darling of the literary world. Athena, at the ripe age of 27, has three bestselling novels, a Netflix deal, and “a history of awards nominations longer than [a] grocery list,” while June is adrift with an agent who doesn’t seem to even like her work. Knowledge of Athena’s success only exacerbates June’s writer’s block. She was “derailed for days” after hearing of her friend’s six-figure option deal, an admission that leads the reader to wonder: Was June ever much of a writer at all?
Turns out, she’s more of a plagiarist—and a puzzlingly diligent one at that. After bearing witness to Athena’s untimely death, June steals an unfinished manuscript off her dead friend’s desk, substantially reworks the stolen material, and claims it as an original work. The manuscript, a historical epic about Chinese laborers in World War I, launches June to literary stardom. But June’s duplicity doesn’t stop after she rejoices in “breaking the glass ceiling.” At the behest of the white editors who acquired her manuscript, June rebrands as the vaguely Asian-sounding Juniper Song “to have a clean start.” She manipulates Athena’s mother to keep her from sharing her dead daughter’s diaries with the public, fearing they contained evidence of her plagiarism. She extorts Athena’s ex-boyfriend and gets an editorial assistant who harbored suspicions about her writing fired. She even briefly considers murder.
Contrary to this aforementioned plot summary, the novel’s tone is not one of Ripley-esque malice, but is self-consciously confessional à la Sally Rooney. The novel’s sophomoric and humorless prose is cluttered with banal exposition (“I shut the lid and push my laptop across the desk, breathless at my own audacity”), dull dialogue, trivial observations (“The line at the campus Starbucks was moving at a glacial pace”), and weak clichés (“I can tell this book is going to dazzle”; “I glimpse something that makes my heart stop”; “I fall in love with writing again”). The diaristic narration speeds through June’s most shocking transgressions and skips past the manuscript theft, effacing the novel of any psychological momentum. The chapters end hastily, often with a foreboding sentiment, dangled like a carrot to entice the reader on. The first chapter features one such example: “Meanwhile, in my bag, tossed at the floor of my bed, Athena’s manuscript sits like a hot sack of coals.”
As the novel progresses, these narrative cliffhangers serve as fleeting proof of June’s entitled delusion. The perfunctory dialogue is set up to be a weak defense of June’s worst, cancel-worthy traits. Consider this feeble rebuttal mounted amidst her impending Twitter cancellation: “It’s the internet that’s fucked, not me. It’s this contingent of social justice warriors, these clout-chasing white ‘allies,’ and Asian activists seeking attention who are acting up. I am not the bad guy. I am the victim here.” This is, of course, a roundabout reminder that June is the bad guy. Her objections are not persuasive, as they are an unsophisticated ploy to peel back the authorial curtain, revealing the earnest plot designer behind the page, ready to clue readers into her manufactured conclusions. Yellowface, then, becomes an excruciatingly cumbersome mental exercise, as the reader is asked to suspend disbelief that such an eminently skittish and stupid character, on the basis of her whiteness, could fool the publishing industry with little more than a half-baked plan in place. When sustained over the course of 336 pages, the narration sags in its inverted moral didacticism. The novel doesn’t seem to “grapple with questions of diversity, racism, and cultural appropriation,” as the jacket copy claims, as much as it regurgitates palatable groupthink on the matters at hand.
June is no Rachel Dolezal, strategic and self-righteous in her racist ruse. We learn that her plagiarism is motivated by puerile revenge, a tit-for-tat since Athena, so June claims, stole from her first. June was sexually assaulted in college (“my maybe-rape”), an experience that’s callously recounted in a few pages over the novel’s halfway mark. The assault is alluded to only once beyond that section. June claimed to bury her trauma “so deep in the back of my mind that [it] wouldn’t resurface until therapy sessions many years later.” We learn that June first disclosed this sexual trauma to Athena, who, in a “Cat Person”-like twist of events, mined it for a short story.
One could recognize how Athena’s emotional theft fueled June’s rage over time, her success finally pushing June off the embittered edge. But June, as far as we know, had no ongoing scheme against her nemesis, nor was she a compulsive plagiarist in college. In the third chapter, which was crafted to function as an anticipatory aside, June mounts a self-reflexive defense of the theft, declaring that it “felt like reparations, payback for the things that Athena took from me.” It’s a rare instance of the character’s deranged folly on display, as her postmortem resentment is felt in timid doses, and her jealous obsession (“I feel this hot coiling in my stomach, a bizarre urge to stick my fingers in her berry-red-painted mouth and rip her face apart”) is alluded to but left largely unexplored.
There are many discrepancies in Yellowface, least of which is how a white girl from Philadelphia can physically pass as a part-Asian writer by adopting the surname Song and donning a bad tan: “I’ve never pretended to be Chinese,” June says, after an older Chinese woman confuses her to be of Asian heritage. But the most incongruous aspect of Yellowface is the self-conscious moral schema imposed upon June, who should be, by all accounts, a far more shameless and shrewd anti-hero. June is so skittishly insecure that she lives more in fear of cancel culture than a hefty lawsuit from her publishers. She is preoccupied with appearances (“I want bloggers, reviewers, and readers to know I’m the kind of person who, you know, cares about the right issues”), an obsession that leads her to fund an annual scholarship in Athena’s name and volunteer to mentor young AAPI writers. “I’m going to be better than Athena. I am a woman who helps other women,” she says.
June’s moral framework—specifically her compulsion to perform goodness—seems to be imported directly from Twitter, the virtual world where the novel briefly achieves its parodic foothold. But let’s not mistake parody for profundity. Anyone who has spent time scrolling through literary Twitter is capable of imitating its dialogic absurdities. This uneven characterization is puzzling, as Kuang has said that she set out to write an unlikable narrator in the vein of Gone Girl and The Girl in the Window. Fictional narrators are generally understood to be unreliable, though unlikability is, as of late, a trendy provocation. The novel’s form has become “a tool for moral instruction,” argued the critic Lauren Oyler, a technique to “make [a] feminist argument about how the shiftiness of narrative can be used and abused in imbalanced power relations.” Yellowface attempts to subvert this from a racial vantage point, though Kuang does little to disguise her didacticism.
|
考点1: “R. F. Kuang”应该译为“匡灵秀”。
考点2: “Yellowface”应译为“黄色脸孔”。
考点3: “expressly”应译为“明确地”。
考点4:“Araki Yasusada” 推荐翻译成 ”荒木安貞”
考点5: “coming-of-age debut”应译为“成长题材处女作”。
考点6:“She even briefly considers murder”中的“briefly”应译为“闪过”。
考点7:“AAPI”应译为“亚裔和太平洋岛裔美国人”。
考点8:“Gone Girl”中应译为“《消失的爱人》”。
考点9:“The Girl in the Window”应译为“窗里的女人”。
|
a7771
|
新闻资讯
|
观点评论
|
59
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Representativeness of measurements for underlying dynamics The above modeling uncertainties arise when one assumes that the time series used are a direct representation of the climate system in question. In practice, that is rarely the case. Tipping elements in the climate are complex, spatially extended systems with many degrees of freedom, and it is always a crude simplification to describe their dynamics by a 1D observational time series. Moreover, it is often unclear whether the relevant dynamical properties of the system in question are captured well by the available measurements. For example, the Amazon rainforest is observed using different remotely sensed vegetation indices, but it remains hard to tell which one is appropriate for understanding its stability (11, 23). The problem is further complicated by the relatively short time span of many climate observations. Tipping elements such as the polar ice sheets or the AMOC evolve over long timescales, and so, time series of a hundred years or more would be necessary to understand and predict their dynamics. When there are no direct measurements on such long timescales, studies use different proxies (“fingerprints”) for the systems. These fingerprints are climate variables that have some physical connection to the system of interest and are thus, to some extent, correlated with the changes of the system. For example, ice core–derived Greenland melt rates have been used as a fingerprint for ice sheet height and SST patterns as a fingerprint for the AMOC streamfunction strength (9, 24). Similarly, satellite-derived vegetation indices should be interpreted as—uncertain and potentially biased—fingerprints of the actual vegetation dynamics (11, 23). Fingerprints that are useful for understanding the evolution of the mean trend are not necessarily useful for predicting tipping times.
In conclusion, there are often no fingerprints available with the precision required for predicting tipping times, as we will discuss for the AMOC in the next section. Effect of dataset preprocessing and underlying uncertainties / nonstationary coverage In addition to the uncertainties arising from the modeling approach and the choice of fingerprint, there are also substantial uncertainties in CSD indicators that originate from the dataset preprocessing steps and the nonstationarity of observational data coverage (23, 25, 26). The number of available climate observations has grown exponentially since 1850 (27, 28), especially with the increase of remote sensing measurements since the 1970s. In earlier years, these measurements are often concentrated in a small number of areas on the globe, resulting in uneven and sparse global coverage until at least the mid-20th century (28). Therefore, to produce globally complete datasets, researchers often merge a number of different instrumental records and fill in the gaps in data using a processing procedure. The bias correction for the different measurements and the infilling methods often prioritize the accuracy of the mean trend over the accuracy of the higher-order statistics [see, for example, (23, 29–32)]. This can cause problems for the detection of CSD (23, 25, 26, 33) and especially for the calculation of the future tipping time. Any calculation of the future tipping time is strongly reliant on the time evolution of the data’s higher-order statistics, and the dataset preprocessing can induce artificial trends in these statistics. To this point, we show the effect of adding white measurement noise of a decreasing amplitude to the synthetic model data of the fold normal form and estimate tipping times using the introduced methods. Figure 2D shows how a small amount of observational uncertainty can incur substantial changes in the estimations. One real-world example of such an effect is the merging of multiple satellite signals. The change in signal-tonoise ratio from one satellite to the next can cause an artificial increase in autocorrelation (23).
Another issue emerges when missing data are infilled with some sort of principal components analysis, in which case there will be more artificial smoothing in earlier times due to the lack of data, and so quantities like the variance could increase artificially (26, 29). In the next section, we will discuss such dataset uncertainties in detail for the AMOC SST fingerprints. Uncertainties in predicting the AMOC tipping time We now address these uncertainties for the specific case of predicting the tipping time of a system by applying DD23’s MLE-based method to SST-based fingerprints of the AMOC (14). We choose to use DD23’s methodology because among the three discussed methods, it performs best for a fold normal form with white noise (Fig. 2A) and was designed for AMOC tipping time prediction. Modeling assumptions There has long been a discussion about whether the AMOC, when investigated as a complex system under external forcing of, e.g., GMT (or better, regional freshwater forcing), exhibits multiple stable states (34–36). Transitions between such stable states could be bifurcation induced and thus abrupt and irreversible. The so-called fold bifurcation constitutes a minimal example of such behavior. For instance, the conceptual Stommel model of the AMOC features a fold bifurcation (34). Taking this reasoning another step further, the application of the MLE method assumes that the 1D observable of AMOC strength is well represented by the following normal form model where Xt is the system state at time t, α is the external control parameter, b is a timescale parameter, m is a translation parameter, and the white noise term σdWt represents noisy perturbations within the system. A similar simplification has been applied to more complex AMOC models in multiple studies (37, 38) and is justified by arguing that all fold bifurcations are topologically equivalent to this model. This, however, is only true locally, in potentially very close proximity to the bifurcation point, while the proposed estimation method banks on the assumption that it would hold in arbitrary distance to the bifurcation point. On the basis of the arguments brought forth, we do not see a direct constraint on the dynamics away from the tipping point. When applying the MLE method to data of the closely related 2D Stommel-Cessi AMOC model (39), one obtains a considerable bias in tipping time estimates toward earlier times (Fig. 3A).
This should be seen as an indication that even models with an underlying fold bifurcation structure, yet not following the very specific normal form model equation above, produce time series which, when applying the MLE method, yield biased tipping time estimates. The AMOC exhibits pronounced decadal variability (40). Before the commencing of the destabilisation at time t0, the AMOC is assumed to resemble paths of a stationary stochastic process X defined by When applying their MLE method to the AMOC, DD23 estimates a value of 2b√α ≈ 3.1 [year−1], corresponding to a characteristic correlation time of 0.32 [year]. In contrast, frequency spectra of AMOC evolutions in general circulation models show strongest variability between 5 and 100 years [e.g., figure 6 in (41)]. Such pronounced additional variability on long timescales is not captured by the above Ornstein-Uhlenbeck model. Internal variability independent of the model noise will thus cause large excursions from the transient mean. The proposed method is not equipped to incorporate the impact of these excursions on the estimated tipping time, since they may be misinterpreted as trends toward a tipping point. This exposes the estimation method to risks of false alarms of a similar nature as in Fig. 1. In addition, recent application of DD23’s MLE method to AMOC tipping in a complex climate model (42) has shown that the tipping time prediction is very sensitive to the time interval analyzed due to the decadal variability of the AMOC, and most 150-year windows cannot accurately estimate the tipping time. Moreover, for quantitative extrapolations of tipping time, any simplifying assumptions on the driving noise would need to be carefully checked. Since disturbances to the equilibrium state are themselves of atmospheric and oceanic origin, time correlation of the noise should be taken into consideration, e.g., via a red noise model (8). Nonstationary red noise present in the system can incur substantial biases in the estimation of the tipping time and even result in false alarms of an approaching bifurcation (as seen in Figs. 1 and 2B).
Assumptions on future AMOC forcing Previously, we discussed the fact that not only can we not assume the future evolution of the forcing of climate tipping elements to be known, we also cannot assume that the forcing evolved linearly in the past. This is also true for the AMOC: Several studies show that radiative anomalies due to aerosol pollution likely attenuated the AMOC weakening of the past decades (43, 44), and such changes cannot be modeled with a linearly changing control parameter. Moreover, the GMT forcing itself influences the AMOC due to many different nonlinear mechanisms, e.g., via thermal expansion, a strengthening hydrological cycle, as well as sea ice and ice sheet melt (with the influence of the latter in the historical period still under debate) (45, 46). The effective freshwater flux might serve as a better forcing parameter (35, 47), but we do not have long-term measurements of this parameter, and there is evidence that it does not linearly depend on GMT; e.g., Greenland runoff increases nonlinearly over time (48, 49).
|
Representativeness of measurements for underlying dynamics The above modeling uncertainties arise when one assumes that the time series used are a direct representation of the climate system in question. In practice, that is rarely the case. Tipping elements in the climate are complex, spatially extended systems with many degrees of freedom, and it is always a crude simplification to describe their dynamics by a 1D observational time series. Moreover, it is often unclear whether the relevant dynamical properties of the system in question are captured well by the available measurements. For example, the Amazon rainforest is observed using different remotely sensed vegetation indices, but it remains hard to tell which one is appropriate for understanding its stability (11, 23). The problem is further complicated by the relatively short time span of many climate observations. Tipping elements such as the polar ice sheets or the AMOC evolve over long timescales, and so, time series of a hundred years or more would be necessary to understand and predict their dynamics. When there are no direct measurements on such long timescales, studies use different proxies (“fingerprints”) for the systems. These fingerprints are climate variables that have some physical connection to the system of interest and are thus, to some extent, correlated with the changes of the system. For example, ice core–derived Greenland melt rates have been used as a fingerprint for ice sheet height and SST patterns as a fingerprint for the AMOC streamfunction strength (9, 24). Similarly, satellite-derived vegetation indices should be interpreted as—uncertain and potentially biased—fingerprints of the actual vegetation dynamics (11, 23). Fingerprints that are useful for understanding the evolution of the mean trend are not necessarily useful for predicting tipping times.
In conclusion, there are often no fingerprints available with the precision required for predicting tipping times, as we will discuss for the AMOC in the next section. Effect of dataset preprocessing and underlying uncertainties / nonstationary coverage In addition to the uncertainties arising from the modeling approach and the choice of fingerprint, there are also substantial uncertainties in CSD indicators that originate from the dataset preprocessing steps and the nonstationarity of observational data coverage (23, 25, 26). The number of available climate observations has grown exponentially since 1850 (27, 28), especially with the increase of remote sensing measurements since the 1970s. In earlier years, these measurements are often concentrated in a small number of areas on the globe, resulting in uneven and sparse global coverage until at least the mid-20th century (28). Therefore, to produce globally complete datasets, researchers often merge a number of different instrumental records and fill in the gaps in data using a processing procedure. The bias correction for the different measurements and the infilling methods often prioritize the accuracy of the mean trend over the accuracy of the higher-order statistics [see, for example, (23, 29–32)]. This can cause problems for the detection of CSD (23, 25, 26, 33) and especially for the calculation of the future tipping time. Any calculation of the future tipping time is strongly reliant on the time evolution of the data’s higher-order statistics, and the dataset preprocessing can induce artificial trends in these statistics. To this point, we show the effect of adding white measurement noise of a decreasing amplitude to the synthetic model data of the fold normal form and estimate tipping times using the introduced methods. Figure 2D shows how a small amount of observational uncertainty can incur substantial changes in the estimations. One real-world example of such an effect is the merging of multiple satellite signals. The change in signal-tonoise ratio from one satellite to the next can cause an artificial increase in autocorrelation (23).
Another issue emerges when missing data are infilled with some sort of principal components analysis, in which case there will be more artificial smoothing in earlier times due to the lack of data, and so quantities like the variance could increase artificially (26, 29). In the next section, we will discuss such dataset uncertainties in detail for the AMOC SST fingerprints. Uncertainties in predicting the AMOC tipping time We now address these uncertainties for the specific case of predicting the tipping time of a system by applying DD23’s MLE-based method to SST-based fingerprints of the AMOC (14). We choose to use DD23’s methodology because among the three discussed methods, it performs best for a fold normal form with white noise (Fig. 2A) and was designed for AMOC tipping time prediction. Modeling assumptions There has long been a discussion about whether the AMOC, when investigated as a complex system under external forcing of, e.g., GMT (or better, regional freshwater forcing), exhibits multiple stable states (34–36). Transitions between such stable states could be bifurcation induced and thus abrupt and irreversible. The so-called fold bifurcation constitutes a minimal example of such behavior. For instance, the conceptual Stommel model of the AMOC features a fold bifurcation (34). Taking this reasoning another step further, the application of the MLE method assumes that the 1D observable of AMOC strength is well represented by the following normal form model where Xt is the system state at time t, α is the external control parameter, b is a timescale parameter, m is a translation parameter, and the white noise term σdWt represents noisy perturbations within the system. A similar simplification has been applied to more complex AMOC models in multiple studies (37, 38) and is justified by arguing that all fold bifurcations are topologically equivalent to this model. This, however, is only true locally, in potentially very close proximity to the bifurcation point, while the proposed estimation method banks on the assumption that it would hold in arbitrary distance to the bifurcation point. On the basis of the arguments brought forth, we do not see a direct constraint on the dynamics away from the tipping point. When applying the MLE method to data of the closely related 2D Stommel-Cessi AMOC model (39), one obtains a considerable bias in tipping time estimates toward earlier times (Fig. 3A).
This should be seen as an indication that even models with an underlying fold bifurcation structure, yet not following the very specific normal form model equation above, produce time series which, when applying the MLE method, yield biased tipping time estimates. The AMOC exhibits pronounced decadal variability (40). Before the commencing of the destabilisation at time t0, the AMOC is assumed to resemble paths of a stationary stochastic process X defined by When applying their MLE method to the AMOC, DD23 estimates a value of 2b√α ≈ 3.1 [year−1], corresponding to a characteristic correlation time of 0.32 [year]. In contrast, frequency spectra of AMOC evolutions in general circulation models show strongest variability between 5 and 100 years [e.g., figure 6 in (41)]. Such pronounced additional variability on long timescales is not captured by the above Ornstein-Uhlenbeck model. Internal variability independent of the model noise will thus cause large excursions from the transient mean. The proposed method is not equipped to incorporate the impact of these excursions on the estimated tipping time, since they may be misinterpreted as trends toward a tipping point. This exposes the estimation method to risks of false alarms of a similar nature as in Fig. 1. In addition, recent application of DD23’s MLE method to AMOC tipping in a complex climate model (42) has shown that the tipping time prediction is very sensitive to the time interval analyzed due to the decadal variability of the AMOC, and most 150-year windows cannot accurately estimate the tipping time. Moreover, for quantitative extrapolations of tipping time, any simplifying assumptions on the driving noise would need to be carefully checked. Since disturbances to the equilibrium state are themselves of atmospheric and oceanic origin, time correlation of the noise should be taken into consideration, e.g., via a red noise model (8). Nonstationary red noise present in the system can incur substantial biases in the estimation of the tipping time and even result in false alarms of an approaching bifurcation (as seen in Figs. 1 and 2B).
Assumptions on future AMOC forcing Previously, we discussed the fact that not only can we not assume the future evolution of the forcing of climate tipping elements to be known, we also cannot assume that the forcing evolved linearly in the past. This is also true for the AMOC: Several studies show that radiative anomalies due to aerosol pollution likely attenuated the AMOC weakening of the past decades (43, 44), and such changes cannot be modeled with a linearly changing control parameter. Moreover, the GMT forcing itself influences the AMOC due to many different nonlinear mechanisms, e.g., via thermal expansion, a strengthening hydrological cycle, as well as sea ice and ice sheet melt (with the influence of the latter in the historical period still under debate) (45, 46). The effective freshwater flux might serve as a better forcing parameter (35, 47), but we do not have long-term measurements of this parameter, and there is evidence that it does not linearly depend on GMT; e.g., Greenland runoff increases nonlinearly over time (48, 49).
|
考点1:“Tipping elements”必须译为“临界要素”,避免“临界点要素”等不一致表达。
考点2:“CSD”必须译为“临界减速”,临界减速是指接近临界点时系统动态的减缓。
考点3:“a minimal example”建议译为“最简化例子”,避免翻译为“基本例子”,准确传达“minimal”的含义。
考点4:“white measurement noise”必须译为“测量的白噪声”,避免遗漏“measurement”一词,确保精确性。
考点5:“tipping times”必须译为“临界时间”,确保对“tipping time”术语的标准化翻译。
考点6:“Fingerprint”推荐译为“指纹 / 代理指标”,避免在科学语境中误用“指纹”单独的译法,需附加说明。
考点7:“decadal variability”建议译为“年代际变率”,避免使用“年代际变化”等不准确的翻译。
考点8:“GMT”必须译为“全球平均气温”,避免使用“全球平均温度”或其他混淆表达。确保气候学术语准确传达,避免模糊。
考点9:“underlying dynamics”必须译为“潜在动力学”,避免误用“潜在动态”,保持术语一致性。
考点10:“SST patterns”建议译为“海表温度(SST)模式”,并在首次出现时明确解释“SST”的含义。
考点11:“nonstationary coverage”建议译为“非平稳覆盖范围”,避免遗漏“覆盖范围”的表达。
考点12:“higher-order statistics”建议译为“高阶统计量”,保持术语一致性。
考点13:“autocorrelation”建议译为“自相关”,避免误译为“自相关性”。自相关用于描述数据序列间的相似性,需精确翻译。
考点14:“topologically equivalent”统一译为“拓扑等价的”,避免使用其他含糊的翻译。拓扑等价是数学和物理中常用术语,需确保精准传达。
考点15:“spatially extended systems”建议译为“空间延展系统”,保持准确的术语翻译。确保译文精准传递了系统在空间上的广泛扩展特性。
考点16:“Stommel–Cessi AMOC model”建议译为“斯托梅尔—切西大西洋经向翻转环流模型”,确保音译一致。确认模型的全名和背景,以免误导读者。
考点17:“hydrological cycle”推荐译为“水文循环”,保持正式且准确的翻译。水文循环在气候系统中是核心概念,需确保译文清晰。
考点18:“Greenland runoff”统一译为“格陵兰径流”,避免翻译为“格陵兰的径流量”或其他不标准翻译。
|
a927f
|
学术论文
|
自然科学
|
108
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
最新数据显示,截至6月末,我国央行已连续8个月增持黄金,我国黄金储备规模达7390万盎司。这一稳健增持节奏与世界黄金协会近期发布的《2025年全球央行黄金储备调查》(以下简称《调查》)结果形成呼应——逾九成的受访央行预计未来12个月内全球央行将继续增持黄金,这一比例创下自2019年首次针对该问题进行调查以来的最高纪录。 黄金储备是各国国际储备多元化构成的重要内容。笔者认为,我国黄金储备“八连增”,蕴含着调节优化国际储备组合、稳步推进人民币国际化、应对全球经济不确定性的考量。 其一,我国央行连续8个月扩大黄金储备,是优化国际储备组合的主动作为。 当前,美元在全球外汇储备中的占比已降至历史低位。这一变化缘于美国债务攀升、经济减速等多重因素导致的美元信用弱化,美元指数承压下行。在此背景下,黄金作为非主权信用储备资产,其价格通常与美元指数呈负相关性,成为对冲美元资产贬值等风险的理想选择。 我国黄金储备“八连增”,既是顺应全球趋势,更是对国际储备资产韧性的战略加固。这种配置策略也成为多国央行的共同选择。 其二,我国央行连续8个月扩大黄金储备,是夯实人民币国际化的信用基石。 《调查》显示,受访央行同时认为,欧元、人民币等其他货币以及黄金在全球储备中的占比将在未来五年内上升。这一共识印证了国际货币体系正向多极化发展。货币国际化既需以强大的经济和金融实力为支撑,也需要多元化的国际储备提供信用背书。我国央行有序增持黄金,向国际市场传递了人民币具有坚实价值支撑的信号,有力推动全球经济主体在贸易结算、投融资以及外汇储备等维度扩大人民币的使用。 这种“强基固本”的布局,正与人民币国际地位的稳步上升形成良性互动。6月18日,中国人民银行行长潘功胜在2025陆家嘴论坛上表示:“人民币已成为全球第二大贸易融资货币;按全口径计算,人民币已成为全球第三大支付货币;在国际货币基金组织(IMF)特别提款权(SDR)货币篮子中的权重位列全球第三。” 其三,我国央行连续8个月扩大黄金储备,是应对全球经济不确定性的有效手段。 受地缘政治紧张等因素影响,全球经济面临严峻挑战。黄金作为具备避险属性、抗通胀功能和长期价值稳定特征的特殊资产,契合国际储备管理对安全性、流动性和保值增值的核心需求。此外,黄金还具有金融和商品的多重属性,在复杂国际环境中“稳定器”功能凸显,我国央行保持每月合理幅度的稳健增持,既避免了市场波动,又为防范外部冲击构建了可靠的“安全垫”。 总体而言,央行“八连增”黄金,既展现了对国际货币体系变革的敏锐把握,也为应对全球经济格局调整提供了“中国方案”。
|
最新数据显示,截至6月末,我国央行已连续8个月增持黄金,我国黄金储备规模达7390万盎司。这一稳健增持节奏与世界黄金协会近期发布的《2025年全球央行黄金储备调查》(以下简称《调查》)结果形成呼应——逾九成的受访央行预计未来12个月内全球央行将继续增持黄金,这一比例创下自2019年首次针对该问题进行调查以来的最高纪录。 黄金储备是各国国际储备多元化构成的重要内容。笔者认为,我国黄金储备“八连增”,蕴含着调节优化国际储备组合、稳步推进人民币国际化、应对全球经济不确定性的考量。 其一,我国央行连续8个月扩大黄金储备,是优化国际储备组合的主动作为。 当前,美元在全球外汇储备中的占比已降至历史低位。这一变化缘于美国债务攀升、经济减速等多重因素导致的美元信用弱化,美元指数承压下行。在此背景下,黄金作为非主权信用储备资产,其价格通常与美元指数呈负相关性,成为对冲美元资产贬值等风险的理想选择。 我国黄金储备“八连增”,既是顺应全球趋势,更是对国际储备资产韧性的战略加固。这种配置策略也成为多国央行的共同选择。 其二,我国央行连续8个月扩大黄金储备,是夯实人民币国际化的信用基石。 《调查》显示,受访央行同时认为,欧元、人民币等其他货币以及黄金在全球储备中的占比将在未来五年内上升。这一共识印证了国际货币体系正向多极化发展。货币国际化既需以强大的经济和金融实力为支撑,也需要多元化的国际储备提供信用背书。我国央行有序增持黄金,向国际市场传递了人民币具有坚实价值支撑的信号,有力推动全球经济主体在贸易结算、投融资以及外汇储备等维度扩大人民币的使用。 这种“强基固本”的布局,正与人民币国际地位的稳步上升形成良性互动。6月18日,中国人民银行行长潘功胜在2025陆家嘴论坛上表示:“人民币已成为全球第二大贸易融资货币;按全口径计算,人民币已成为全球第三大支付货币;在国际货币基金组织(IMF)特别提款权(SDR)货币篮子中的权重位列全球第三。” 其三,我国央行连续8个月扩大黄金储备,是应对全球经济不确定性的有效手段。 受地缘政治紧张等因素影响,全球经济面临严峻挑战。黄金作为具备避险属性、抗通胀功能和长期价值稳定特征的特殊资产,契合国际储备管理对安全性、流动性和保值增值的核心需求。此外,黄金还具有金融和商品的多重属性,在复杂国际环境中“稳定器”功能凸显,我国央行保持每月合理幅度的稳健增持,既避免了市场波动,又为防范外部冲击构建了可靠的“安全垫”。 总体而言,央行“八连增”黄金,既展现了对国际货币体系变革的敏锐把握,也为应对全球经济格局调整提供了“中国方案”。
|
考点 1:"我国央行" 应译为 ”China’s central bank”
考点 2:"世界黄金协会 "应译为 “World Gold Council”
考点 3:"2025 年全球央行黄金储备调查" 应译为 ”2025 Global Central Bank Gold Reserves Survey“
考点 4:"国际储备多元化构成" 应译为 ”diversified composition of international reserves”
考点 5:"黄金储备 “八连增” 应译为 "eight consecutive months of gold reserve increases"
考点 6:"人民币国际化" 应译为 "RMB internationalization"
考点 7:"国际储备组合" 应译为 "international reserve portfolio"
考点 8:"美元指数" 应译为 "US Dollar Index"
考点 9:"非主权信用储备资产" 应译为 "non-sovereign credit reserve asset"
考点10:"对冲美元资产贬值风险"应译为 "hedge against depreciation risk of dollar-denominated assets“
考点 11:"国际储备资产韧性" 应译为 “resilience of international reserve assets”
考点 12:"信用基石" 应译为 “credit cornerstone“
考点 13:"国际货币体系多极化" 应译为 ”multipolarization of the international monetary system“
考点 14:"信用背书" 应译为 “credit backing”
考点 15:"外汇储备" 应译为 “foreign exchange reserves“
考点 16:"2025 陆家嘴论坛" 应译为 ”2025 Lujiazui Forum“
考点 17:"全球第二大贸易融资货币" 应译为 “world’s second-largest trade financing currency”
考点 18:"全球第三大支付货币" 应译为 ”world’s third-largest payment currency”
考点 19:"国际货币基金组织(IMF)特别提款权(SDR)货币篮子" 应译为 “IMF Special Drawing Rights currency basket“
考点 20:"避险属性" 应译为 “safe-haven attribute”
考点 21:"抗通胀功能" 应译为 ”hedge against inflation“
考点 22:"长期价值稳定特征" 应译为 ”long-term value stability characteristic”
考点 23:"安全性、流动性和保值增值" 应译为 “security, liquidity, and value preservation and appreciation”
考点 24:"安全垫" 应译为 ”safety cushion“
|
aa3a6
|
新闻资讯
|
观点评论
|
84
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
上周,美国政府签署《大规模税收与支出法案》(“大而美”法案),这项争议日久的法案正式成为法律。该法案恰似给美国经济注入代价高昂的“兴奋剂”,一边减税举债对内加大刺激,一边持续对外转嫁经济风险。这种对美国经济“竭泽而渔”、对世界经济“祸水东引”的行为,折射出美国国内治理所面临的深层困境。
这份近千页的法案核心内容并不复杂:通过永久性降低企业税率至20%、对富人实施大规模减税、免除小费与加班收入税收,试图刺激企业投资与居民消费。同时,1570亿美元的新增军费与1500亿美元的边境安全拨款,则打上了“创造就业”的旗号。
法案对美国经济具有刺激兴奋作用,然而要为之付出的代价也不小。为平衡减税造成的财政收入窟窿,法案削减了1万亿美元以上的社会福利支出——约1200万低收入者将失去医疗保险,300万人被剥夺食品券资格,医疗补助门槛也被大幅提高。根据美国国会预算办公室的分析,仅法案中的延长减税措施在未来10年就将带来超过4.5万亿美元支出成本。同时,参议院版本法案在未来10年将使美国赤字增加近3.3万亿美元,美国债务上限也将提高5万亿美元。
法案这种“劫贫济富”的设计,将使财富加速向顶层聚集,而社会成本则甩给最脆弱的群体,更直接透支了美国未来的财政健康。美国企业家埃隆·马斯克就痛批法案“极其疯狂且具破坏性”“给夕阳产业提供施舍,却严重损害未来产业”。
在本届美国政府看来,该法案可以通过永久性降低企业税率、免除特定劳动收入税收等措施来释放企业投资与居民消费的短期动能,减税带来企业资本开支的回升与股市的乐观反应,能被包装为政府创造经济增长的“证据”,在选举周期内具有显著政治吸引力。分析认为,这有助于在短期内压制美国国内社会矛盾,同时也为美国政府对外转嫁风险提供操作空间。
实际上,就在该法案通过参议院投票后不久,美国政府就已经迅速将矛头指向世界,宣布将每日向10个国家发送关税通知函,税率从10%到70%不等。有分析认为,此举旨在“用外国关税收入填补美国国内减税缺口”。同时,美国所谓“对等关税”90天暂缓期临近,美国政府突然强硬的表态,迫使各国在高压下接受不平等条款的意图一览无余。
“大而美”法案的支持者声称,法案将通过企业回流与投资增长重塑美国经济竞争力。不过,当减税红利被关税成本抵消,企业实际承担的合规成本与供应链中断损失,可能远超税收优惠。更关键的是,以邻为壑的政策必然引发反制——欧盟已酝酿针对性关税,新兴市场则在加速“去美元化”布局。这种对抗性循环一旦形成,全球经济增长的整体蛋糕将持续萎缩,最终反噬美国企业的海外利润根基。
本届美国政府就职以来推出的种种争议政策,反映出美国国内经济治理失序的困境。这种政策变动正对世界经济带来多重冲击。
首先,多边贸易体系遭遇信任危机。当美国以国内法案为由单方面调整关税,其行为违背了世界贸易组织(WTO)框架下的互惠原则。欧盟、日本等传统盟友被迫重新评估与美国的贸易关系,新兴经济体则加速推进区域自贸协定以规避系统性风险。全球供应链从效率优先转向安全优先的重构进程,因美国政策不可预测性而显著提速。
其次,美元信用基础面临持续侵蚀。法案再度提升债务上限,虽然暂时避免债务违约,却让美国国债规模突破40万亿美元。当财政纪律让位于政治周期,各国央行对美元资产的长期信心必然受损。历史表明,主权货币的全球地位不仅依赖市场,更需要货币发行国的财政自律——而当前法案正在消耗这种稀缺的政治资本。
此外,气候治理共识受到局部冲击。法案中清洁能源补贴的取消与化石能源的政策倾斜,不仅削弱《巴黎协定》的执行力度和机制,阻滞全球应对气候变化的努力,更可能引发连锁效应:部分工业化国家可能以竞争力为由推迟低碳转型,发展中国家则面临技术合作中断的风险。
当前美国一些人的政策路径,正将世界推向“零和博弈”的危险轨道。这也让世人更加看清,世界经济的真正风险,不在于美国经济的短期波动,而在于其政策引发的系统性信任危机。
|
上周,美国政府签署《大规模税收与支出法案》(“大而美”法案),这项争议日久的法案正式成为法律。该法案恰似给美国经济注入代价高昂的“兴奋剂”,一边减税举债对内加大刺激,一边持续对外转嫁经济风险。这种对美国经济“竭泽而渔”、对世界经济“祸水东引”的行为,折射出美国国内治理所面临的深层困境。
这份近千页的法案核心内容并不复杂:通过永久性降低企业税率至20%、对富人实施大规模减税、免除小费与加班收入税收,试图刺激企业投资与居民消费。同时,1570亿美元的新增军费与1500亿美元的边境安全拨款,则打上了“创造就业”的旗号。
法案对美国经济具有刺激兴奋作用,然而要为之付出的代价也不小。为平衡减税造成的财政收入窟窿,法案削减了1万亿美元以上的社会福利支出——约1200万低收入者将失去医疗保险,300万人被剥夺食品券资格,医疗补助门槛也被大幅提高。根据美国国会预算办公室的分析,仅法案中的延长减税措施在未来10年就将带来超过4.5万亿美元支出成本。同时,参议院版本法案在未来10年将使美国赤字增加近3.3万亿美元,美国债务上限也将提高5万亿美元。
法案这种“劫贫济富”的设计,将使财富加速向顶层聚集,而社会成本则甩给最脆弱的群体,更直接透支了美国未来的财政健康。美国企业家埃隆·马斯克就痛批法案“极其疯狂且具破坏性”“给夕阳产业提供施舍,却严重损害未来产业”。
在本届美国政府看来,该法案可以通过永久性降低企业税率、免除特定劳动收入税收等措施来释放企业投资与居民消费的短期动能,减税带来企业资本开支的回升与股市的乐观反应,能被包装为政府创造经济增长的“证据”,在选举周期内具有显著政治吸引力。分析认为,这有助于在短期内压制美国国内社会矛盾,同时也为美国政府对外转嫁风险提供操作空间。
实际上,就在该法案通过参议院投票后不久,美国政府就已经迅速将矛头指向世界,宣布将每日向10个国家发送关税通知函,税率从10%到70%不等。有分析认为,此举旨在“用外国关税收入填补美国国内减税缺口”。同时,美国所谓“对等关税”90天暂缓期临近,美国政府突然强硬的表态,迫使各国在高压下接受不平等条款的意图一览无余。
“大而美”法案的支持者声称,法案将通过企业回流与投资增长重塑美国经济竞争力。不过,当减税红利被关税成本抵消,企业实际承担的合规成本与供应链中断损失,可能远超税收优惠。更关键的是,以邻为壑的政策必然引发反制——欧盟已酝酿针对性关税,新兴市场则在加速“去美元化”布局。这种对抗性循环一旦形成,全球经济增长的整体蛋糕将持续萎缩,最终反噬美国企业的海外利润根基。
本届美国政府就职以来推出的种种争议政策,反映出美国国内经济治理失序的困境。这种政策变动正对世界经济带来多重冲击。
首先,多边贸易体系遭遇信任危机。当美国以国内法案为由单方面调整关税,其行为违背了世界贸易组织(WTO)框架下的互惠原则。欧盟、日本等传统盟友被迫重新评估与美国的贸易关系,新兴经济体则加速推进区域自贸协定以规避系统性风险。全球供应链从效率优先转向安全优先的重构进程,因美国政策不可预测性而显著提速。
其次,美元信用基础面临持续侵蚀。法案再度提升债务上限,虽然暂时避免债务违约,却让美国国债规模突破40万亿美元。当财政纪律让位于政治周期,各国央行对美元资产的长期信心必然受损。历史表明,主权货币的全球地位不仅依赖市场,更需要货币发行国的财政自律——而当前法案正在消耗这种稀缺的政治资本。
此外,气候治理共识受到局部冲击。法案中清洁能源补贴的取消与化石能源的政策倾斜,不仅削弱《巴黎协定》的执行力度和机制,阻滞全球应对气候变化的努力,更可能引发连锁效应:部分工业化国家可能以竞争力为由推迟低碳转型,发展中国家则面临技术合作中断的风险。
当前美国一些人的政策路径,正将世界推向“零和博弈”的危险轨道。这也让世人更加看清,世界经济的真正风险,不在于美国经济的短期波动,而在于其政策引发的系统性信任危机。
|
考点1:大规模税收与支出法案应统一译为 One Big Beautiful Bill Act(OBBBA/OBBB/BBB/OB3)
考点2:兴奋剂应译为 economic stimulant 或 adrenaline shot to the economy
考点3:竭泽而渔推荐译为 draining the pond to catch the fish或 short-sighted exploitation
考点4:祸水东引推荐译为 shifting the burden to others 或 passing on risks to the world
考点5:永久性降低企业税率应译为 permanently lower the corporate tax rate
考点6:小费与加班收入统一译为 tips and overtime income
考点7:延长减税措施应译为 extended tax cuts
考点8:赤字应统一译为 fiscal deficit 或 budget deficit
考点9:发送关税通知函应译为 issue tariff notices
考点10:对等关税应译为 reciprocal tariffs
考点11:企业回流推荐译为 reshoring of enterprises 或 business relocation back
考点12:互惠原则应译为 principle of reciprocity
考点13:供应链从效率优先转向安全优先应译为 shift from efficiency-first to security-first supply chains
考点14:美元信用基础应译为 dollar’s credit foundation 或 the credibility of the U.S. dollar
考点15:货币发行国的财政自律应译为 the issuer’s fiscal responsibility
考点16:稀缺的政治资本应译为 scarce political capital
考点17:清洁能源补贴的取消应译为 repeal of clean energy subsidies
考点18:系统性信任危机应译为 systemic crisis of trust 或 systemic credibility crisis
|
abe22
|
新闻资讯
|
观点评论
|
72
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Numerous pamphlets and printings were published. These works agitated revolutionary people not only in America but also around the world.
Among the most renowned was the work Common Sense (1776) of Thomas Paine (1737-1809). It’s the ringing call for the decoration of liberty. He also wrote Crisis (1774-1783) and The Age of Reason (1794-1796), according to Wu, “He thought that religion should be based on rational, reasonable ground. ” (Wu Dingbo, 12) The pamphlets helped complete the debate that resulted in America's separation from England.
And of course for all the Americans, the most important document from this period was a single sheet of paper called The Declaration of Independence (1776), mainly written by Thomas Jefferson and Benjamin Franklin.
Benjamin Franklin (1706-1790), the most distinguished person and giant in American history, he wrote and worked for American independence hardly and had made so many great efforts to America that he has been called "The First American." a world-renowned scientist, diplomat, philosopher, and writer. He perfected the smooth, clear, short sentences of the Puritan plain style. His Autobiography encourages hard work and emphasizes the importance of achievement. Another work that is well known is Poor Richard's Almanack, and many of the sentences have become popular quotations.
During this time writers thought that the truth should be relied on Bible, churchmen, authorities, or practice and experience.
(2) Early National Literature
During the period of American Revolution War, American national literature came into being. Since before the war, American people have already had the awareness of national independence, so they wrote many political writings revolutionary poems.
The war helped the first important American prose writers and poets grow up both culturally and artistically. Furthermore, the independence of nation led to the independence of national literature. From this moment on, American people began to understand of meaning of being a real ”American“.
3. The flourishing of American literature in 19th century
From the 1820’s to the Civil War broke out, American literature entered a period of full blooming. Writings all characterized by a distinct national style and flavor. At the same time, the world as a whole was experiencing a change in ways of thinking: there was a move from classical ideas to romantic ones. This change was taking place in all areas of culture around the world. This was an exciting period in the history of American literature. Like the flowers of spring, there were suddenly many different kinds of writing at the same time. All the works have an optimistic spirit. They represented the various and quick development of American national literature.
(1) Early Romantics
In early 19th century, Washington Irving (1783-1859), the person born with the new nation, his The Sketch Book created a new style of American literature—short novel. James Fenimore Cooper (1789-1851) His "Leather-Stocking" novels told us a story about how the brave immigrants fight with savage using what they have learnt from nature.
Another famous writer of this time was William Cullen Bryant (1794-1878), he was regarded one of the earliest naturalist poets in American history. His greatest poem Thanatopsis was published in the North American Review in 1817. He appreciates normal birds and flowers, through which appreciated harmonious relationship between human and nature. The Romantics emphasized individualism and they thought feelings and emotions were more important than reason and common sense.
(2) The Transcendentalism
“The New England Transcendentalism was romantic idealism on puritan soil” (Wu Dingbo: 28). It stressed the power of intuition placed spirit first, and it took nature as symbolic of spirit or God. There were three main features of Transcendentalism were Unitarianism, idealistic philosophy, and oriental mysticism.
Ralph Waldo Emerson (1803-1882), the leader of American Transcendentalism. “He captained a group of enthusiast and formed a transcendental club with them. He also helped to set up and edited the transcendentalist journal The Dial. ” He had written many famous essays. Among the best are Nature and The American Scholar, which has been called “America’s Declaration of Intellectual Independence”. Emerson wrote in The American Scholar (1837), a man must "learn to detect and watch that gleam of light which flashes across his mind from within." The main key to this inner world is the imagination. Man's imagination leads to expression. Our expression makes each of us a unique human. Romanticism became the way of thinking for this generation of writers.
Henry David Thoreau was also one of the writers of Transcendentalism, and his famous essay was Walden, in which he revealed the hidden spiritual possibilities in everyone’s life, and to considerate the pursuit of material things.
(3) High Romantics
Due to the great effort made by those geniuses such as Emerson and Thoreau, a wild-ranged national American literature had been laid a solid foundation by the mid-19th century.
There are four important names in American literature to remember from this period: Washington Irving (1783-1859), Walt Whitman (1819-1892), James Fennimore Cooper (1789-1851), and Edgar Allan Poe (1809-49).
Irving will long be remembered for his book of essays and stories, The Sketch Book of Geoffrey Crayon (1819), which helping this new nation started its first step confidently. Cooper and Whitman described the character of the nation, which combined the courage and cleverness of expansion, the great sense of destination, and the optimistic spirit together. Hawthorne and Melville expressed the dark side of American dream though their profound and symbolized works.
Walt Whitman (1819-1892), father of free verse, “he threw aside the traditional ornaments and prettiness of verse, and created his own form” (Wu Dingbo, 44). His Leaves of Grass (1855), which contains such well-known poems as I Hear America Singing, and Song of Myself, was regarded America’s first genuine epic poem. He rejected regular meter and rhyme in favor of flowing free verse and celebrated patriotic love, ragged individualism, democracy and equality and stressed an almost mystical identification with America.
Nathaniel Hawthorne (1804-1864), due to his family background, his works always concerned with sin, morality, romance, and had complex Puritanism. His masterpiece was the novel The Scarlet Letter, and his The House of Seven Gables was also well liked. In these works he presented material on the alienation between facts and fancy, by using many symbols and setting to reveal the psychology of the character.
|
Numerous pamphlets and printings were published. These works agitated revolutionary people not only in America but also around the world.
Among the most renowned was the work Common Sense (1776) of Thomas Paine (1737-1809). It’s the ringing call for the decoration of liberty. He also wrote Crisis (1774-1783) and The Age of Reason (1794-1796), according to Wu, “He thought that religion should be based on rational, reasonable ground. ” (Wu Dingbo, 12) The pamphlets helped complete the debate that resulted in America's separation from England.
And of course for all the Americans, the most important document from this period was a single sheet of paper called The Declaration of Independence (1776), mainly written by Thomas Jefferson and Benjamin Franklin.
Benjamin Franklin (1706-1790), the most distinguished person and giant in American history, he wrote and worked for American independence hardly and had made so many great efforts to America that he has been called "The First American." a world-renowned scientist, diplomat, philosopher, and writer. He perfected the smooth, clear, short sentences of the Puritan plain style. His Autobiography encourages hard work and emphasizes the importance of achievement. Another work that is well known is Poor Richard's Almanack, and many of the sentences have become popular quotations.
During this time writers thought that the truth should be relied on Bible, churchmen, authorities, or practice and experience.
(2) Early National Literature
During the period of American Revolution War, American national literature came into being. Since before the war, American people have already had the awareness of national independence, so they wrote many political writings revolutionary poems.
The war helped the first important American prose writers and poets grow up both culturally and artistically. Furthermore, the independence of nation led to the independence of national literature. From this moment on, American people began to understand of meaning of being a real ”American“.
3. The flourishing of American literature in 19th century
From the 1820’s to the Civil War broke out, American literature entered a period of full blooming. Writings all characterized by a distinct national style and flavor. At the same time, the world as a whole was experiencing a change in ways of thinking: there was a move from classical ideas to romantic ones. This change was taking place in all areas of culture around the world. This was an exciting period in the history of American literature. Like the flowers of spring, there were suddenly many different kinds of writing at the same time. All the works have an optimistic spirit. They represented the various and quick development of American national literature.
(1) Early Romantics
In early 19th century, Washington Irving (1783-1859), the person born with the new nation, his The Sketch Book created a new style of American literature—short novel. James Fenimore Cooper (1789-1851) His "Leather-Stocking" novels told us a story about how the brave immigrants fight with savage using what they have learnt from nature.
Another famous writer of this time was William Cullen Bryant (1794-1878), he was regarded one of the earliest naturalist poets in American history. His greatest poem Thanatopsis was published in the North American Review in 1817. He appreciates normal birds and flowers, through which appreciated harmonious relationship between human and nature. The Romantics emphasized individualism and they thought feelings and emotions were more important than reason and common sense.
(2) The Transcendentalism
“The New England Transcendentalism was romantic idealism on puritan soil” (Wu Dingbo: 28). It stressed the power of intuition placed spirit first, and it took nature as symbolic of spirit or God. There were three main features of Transcendentalism were Unitarianism, idealistic philosophy, and oriental mysticism.
Ralph Waldo Emerson (1803-1882), the leader of American Transcendentalism. “He captained a group of enthusiast and formed a transcendental club with them. He also helped to set up and edited the transcendentalist journal The Dial. ” He had written many famous essays. Among the best are Nature and The American Scholar, which has been called “America’s Declaration of Intellectual Independence”. Emerson wrote in The American Scholar (1837), a man must "learn to detect and watch that gleam of light which flashes across his mind from within." The main key to this inner world is the imagination. Man's imagination leads to expression. Our expression makes each of us a unique human. Romanticism became the way of thinking for this generation of writers.
Henry David Thoreau was also one of the writers of Transcendentalism, and his famous essay was Walden, in which he revealed the hidden spiritual possibilities in everyone’s life, and to considerate the pursuit of material things.
(3) High Romantics
Due to the great effort made by those geniuses such as Emerson and Thoreau, a wild-ranged national American literature had been laid a solid foundation by the mid-19th century.
There are four important names in American literature to remember from this period: Washington Irving (1783-1859), Walt Whitman (1819-1892), James Fennimore Cooper (1789-1851), and Edgar Allan Poe (1809-49).
Irving will long be remembered for his book of essays and stories, The Sketch Book of Geoffrey Crayon (1819), which helping this new nation started its first step confidently. Cooper and Whitman described the character of the nation, which combined the courage and cleverness of expansion, the great sense of destination, and the optimistic spirit together. Hawthorne and Melville expressed the dark side of American dream though their profound and symbolized works.
Walt Whitman (1819-1892), father of free verse, “he threw aside the traditional ornaments and prettiness of verse, and created his own form” (Wu Dingbo, 44). His Leaves of Grass (1855), which contains such well-known poems as I Hear America Singing, and Song of Myself, was regarded America’s first genuine epic poem. He rejected regular meter and rhyme in favor of flowing free verse and celebrated patriotic love, ragged individualism, democracy and equality and stressed an almost mystical identification with America.
Nathaniel Hawthorne (1804-1864), due to his family background, his works always concerned with sin, morality, romance, and had complex Puritanism. His masterpiece was the novel The Scarlet Letter, and his The House of Seven Gables was also well liked. In these works he presented material on the alienation between facts and fancy, by using many symbols and setting to reveal the psychology of the character.
|
考点1:"The First American"不能译为“第一位美国人”。
考点2: "sense of destination"推荐译为“宿命感”。
|
acf19
|
学术论文
|
人文科学
|
43
|
翻译,中文翻译成英文。不要输出译文以外的内容。 以下是你本次的任务:
在一些学者看来,儒教也可以被视为一种宗教,儒家思想的创始人孔子成为了子孙后代崇拜的对象。2000多年以来,供奉孔子的庙宇来一直是中国传统文化中一种重要的神圣空间。中国古代许多朝代的皇帝都尊崇儒家思想,因此,各级城市都建立了正式的孔庙。在漫长的历史过程中,中国人逐渐形成并传承了孔庙的建设模式。本文以北京孔庙作为研究案例,利用历史文献、现代文献和实地调查证据,目的是展示在不同尺度下所形成的北京孔庙的神圣性,以及不同主体在互动过程中如何将从对孔庙神圣性的多元认识逐渐转变为统一认识。本文探究的尺度包括城市尺度、街道尺度、建筑尺度和身体尺度,参与互动的对象不仅包括来自不同的民族的人,还包括来自不同阶级和代际的人。本文的结论是:多主体互动所形成的神圣空间遗产是可以被传承的。
北京孔庙共有三进院落。依据每个院落中的中的建筑功能不同,各个院落因此分别形成了前导空间、祭祀空间和尾部空间。中间的院落和中轴线都是最为尊贵的位置。
第一个进院落为前导空间。它位于孔庙入口和先师门之间。南北长46米,东西宽108米。这里没有其他大多数文庙中建设的棂星门和泮池,取而代之的是先师门、历代进士题名碑和御制记功碑亭。院落内多种植柏树,这是本文开篇的诗歌中所提到的元素。这里还有供斋戒人居住的房子“室”。“步”(即走两步的长度) 是中国古代用来衡量长度的一种单位。 在中国的不同朝代,“步”所代表的长度不一。在元朝,一“步”被定义为1.575米。孔庙和学宫用地范围东西方向长度为144步,其中孔庙占80步,比例关系近似为九比五,南北方向长度为150步,与东西长度的比例同样近似九比五。在中国古代,数字九和五是只有皇帝能使用的数字,因此这里的长宽比例体现了院落是按照最高等级来设计的。这里还有用来制作献祭贡品的厨房,名为“神厨”。还有用于存放祭祀礼仪用品的仓库,名为“神库”。院内有元、明、清三个朝代的进士题名碑,共198块,它们为研究中国古代科举制度提供了重要的文献资料。
第二进院落是很重要的祭祀空间。它在大成门和崇圣门之间,南北长和东西宽均为93米。院落中由大成门、有大成殿和东西两庑围成,这里供奉的有其他儒家先圣和先师。院内建有十一座碑亭,配有黄瓦朱栏,屋顶的规制为重檐歇山顶。
第三进院落为尾声空间。它在崇圣门到崇圣祠后墙之间。此院落南北长50.8米,东西宽44.6米。大成殿两侧各有一条路径,人们可以由这两条路进入第三个院落。首先要进入的是崇圣门。之后可以看见崇圣祠,它是这个院落中的主体建筑。由于北京孔庙等级高,所以这个殿内除了供奉孔子五代先人外,还有及颜回、孔伋、曾参和孟轲四位圣人的父亲先哲之父。院内还有东西配殿,这些殿宇用于供奉程颐、程颢兄弟、张载、蔡沈、周敦颐和朱熹六位历史上著名儒学大师的父亲。在建筑规制上,崇圣祠比大成殿少两间,屋顶、台基、装饰等级也相应降低。
北京孔庙的建筑布局严格遵循礼制规定。 “间”是中国古代建筑的宽度计量单位,它指两个古代宫殿建筑柱子之间的距离。大成殿宽度为九间,长度为五间。在介绍院落的部分,我们提到在中国古代,数字九和五是只有皇帝能使用的数字。从这两个数字就可以看出,大成殿的建筑等级是最高的。明代1600年,大成殿用的一般灰色陶瓦被改为了琉璃瓦。而如今大成殿所用的这种黄色琉璃瓦,与皇家建筑等级是一致的。大成殿所在的院落中有11座御制石碑,它们分别在1686-1791年间建成。大成殿门窗的窗棂的图案为“三交六椀”。这个图案的基本单元是有三个直线相交,分割出六个三角,组成一个六边形。这是最高等级的窗棂图案(见图5),其含义是皇帝与天和地的精神相交汇。相比之下, 顺天府(都城市政府)下辖的大兴县(北京老城的东半部分)的孔庙内,大成殿面阔五间,等级就相对低很多了。
|
在一些学者看来,儒教也可以被视为一种宗教,儒家思想的创始人孔子成为了子孙后代崇拜的对象。2000多年以来,供奉孔子的庙宇来一直是中国传统文化中一种重要的神圣空间。中国古代许多朝代的皇帝都尊崇儒家思想,因此,各级城市都建立了正式的孔庙。在漫长的历史过程中,中国人逐渐形成并传承了孔庙的建设模式。本文以北京孔庙作为研究案例,利用历史文献、现代文献和实地调查证据,目的是展示在不同尺度下所形成的北京孔庙的神圣性,以及不同主体在互动过程中如何将从对孔庙神圣性的多元认识逐渐转变为统一认识。本文探究的尺度包括城市尺度、街道尺度、建筑尺度和身体尺度,参与互动的对象不仅包括来自不同的民族的人,还包括来自不同阶级和代际的人。本文的结论是:多主体互动所形成的神圣空间遗产是可以被传承的。
北京孔庙共有三进院落。依据每个院落中的中的建筑功能不同,各个院落因此分别形成了前导空间、祭祀空间和尾部空间。中间的院落和中轴线都是最为尊贵的位置。
第一个进院落为前导空间。它位于孔庙入口和先师门之间。南北长46米,东西宽108米。这里没有其他大多数文庙中建设的棂星门和泮池,取而代之的是先师门、历代进士题名碑和御制记功碑亭。院落内多种植柏树,这是本文开篇的诗歌中所提到的元素。这里还有供斋戒人居住的房子“室”。“步”(即走两步的长度) 是中国古代用来衡量长度的一种单位。 在中国的不同朝代,“步”所代表的长度不一。在元朝,一“步”被定义为1.575米。孔庙和学宫用地范围东西方向长度为144步,其中孔庙占80步,比例关系近似为九比五,南北方向长度为150步,与东西长度的比例同样近似九比五。在中国古代,数字九和五是只有皇帝能使用的数字,因此这里的长宽比例体现了院落是按照最高等级来设计的。这里还有用来制作献祭贡品的厨房,名为“神厨”。还有用于存放祭祀礼仪用品的仓库,名为“神库”。院内有元、明、清三个朝代的进士题名碑,共198块,它们为研究中国古代科举制度提供了重要的文献资料。
第二进院落是很重要的祭祀空间。它在大成门和崇圣门之间,南北长和东西宽均为93米。院落中由大成门、有大成殿和东西两庑围成,这里供奉的有其他儒家先圣和先师。院内建有十一座碑亭,配有黄瓦朱栏,屋顶的规制为重檐歇山顶。
第三进院落为尾声空间。它在崇圣门到崇圣祠后墙之间。此院落南北长50.8米,东西宽44.6米。大成殿两侧各有一条路径,人们可以由这两条路进入第三个院落。首先要进入的是崇圣门。之后可以看见崇圣祠,它是这个院落中的主体建筑。由于北京孔庙等级高,所以这个殿内除了供奉孔子五代先人外,还有及颜回、孔伋、曾参和孟轲四位圣人的父亲先哲之父。院内还有东西配殿,这些殿宇用于供奉程颐、程颢兄弟、张载、蔡沈、周敦颐和朱熹六位历史上著名儒学大师的父亲。在建筑规制上,崇圣祠比大成殿少两间,屋顶、台基、装饰等级也相应降低。
北京孔庙的建筑布局严格遵循礼制规定。 “间”是中国古代建筑的宽度计量单位,它指两个古代宫殿建筑柱子之间的距离。大成殿宽度为九间,长度为五间。在介绍院落的部分,我们提到在中国古代,数字九和五是只有皇帝能使用的数字。从这两个数字就可以看出,大成殿的建筑等级是最高的。明代1600年,大成殿用的一般灰色陶瓦被改为了琉璃瓦。而如今大成殿所用的这种黄色琉璃瓦,与皇家建筑等级是一致的。大成殿所在的院落中有11座御制石碑,它们分别在1686-1791年间建成。大成殿门窗的窗棂的图案为“三交六椀”。这个图案的基本单元是有三个直线相交,分割出六个三角,组成一个六边形。这是最高等级的窗棂图案(见图5),其含义是皇帝与天和地的精神相交汇。相比之下, 顺天府(都城市政府)下辖的大兴县(北京老城的东半部分)的孔庙内,大成殿面阔五间,等级就相对低很多了。
|
考点1:"儒教" 推荐翻译为:"Confucianism"
考点2:"尺度" 推荐翻译为:"scale"
考点3:"互动" 推荐翻译为:"interaction"
考点4:"三进院落" 推荐翻译为:"three courtyards"
考点5:"入口" 推荐翻译为:"main entrance"
考点6:"先师门" 推荐翻译为:"Xianshi gate"
考点7:"棂星门" 推荐翻译为:"Lingxing gate"
考点8:"泮池" 推荐翻译为:"Pan Chi"
考点9:"进士" 推荐翻译为:"scholars"
考点10:"御制记功碑亭" 推荐翻译为:"imperial monuments"
考点11:"斋戒人" 推荐翻译为:"fasting people"
考点12:"步" 推荐翻译为:"Bu"
考点13:"神厨" 推荐翻译为:"Shenchu"
考点14:"神库" 推荐翻译为:"Shenku"
考点15:"大成门" 推荐翻译为:"Dacheng gate"
考点16:"崇圣门" 推荐翻译为:"Chongsheng gate"
考点17:"大成殿" 推荐翻译为:"Dacheng Hall"
考点18:"庑" 推荐翻译为:"wing"
考点19:"儒家先圣、先师" 推荐翻译为:"Confucian saints and masters"
考点20:"黄瓦" 推荐翻译为:"yellow tiles"
考点21:"朱栏" 推荐翻译为:"vermilion columns"
考点22:"重檐歇山顶" 推荐翻译为:"gable and hip roof with multiple eaves"
考点23:"东西配殿" 推荐翻译为:"East and West Hall"
考点24:"间" 推荐翻译为:"Jian"
考点25:"九间" 推荐翻译为:"nine of Jian(注意写法,五间也是相似的)"
考点26:"三交六椀" 推荐翻译为:"San Jiao Liu Wan"
考点27:"窗棂" 推荐翻译为:"window lattice"
考点28: "学宫"推荐翻译为:"school palace"
考点29: "崇圣祠"推荐翻译为:"Chongsheng Shrine"
考点30: "前导空间"推荐翻译为:"leading space"
考点31: "祭祀空间"推荐翻译为:"worship space"
考点32: "尾声空间"推荐翻译为:"epilogue space"
|
b0136
|
学术论文
|
人文科学
|
102
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Abstract--Economists' productivity over their careers and as measured by publication in leading journals declines very sharply with age. There is no difference by age in the probability that an article submitted to a leading journal will be accepted. Rates of declining productivity are no greater among the very top publishers than among others, and the probability of acceptance is increasingly related to the author's quality rather than the author's age.
It is well known that productivity declines with age in a wide range of activities. Lehman (1953) suggests an early peak in productivity in a variety of scientific and artistic endeavors, and Diamond (1986) documents the pattern for several scholarly pursuits. Levin and Stephan (1992) provide clear evidence that this decline exists even after careful attempts to account for individual and cohort differences. Fair (1994) finds declines in physical ability among elite runners, as does Lydall (1968,pp. 113 passim) in physical abilities of the population generally. In this study we examine productivity declines in our own field. The main new results arise from our use of two different types of information, the equivalent of household and establishment data, to study the stone field over essentially the same period of time. Section I discusses the general results on aging and productivity, whereas section II presents evidence of the importance of heterogeneity.
I. Declining Productivity with Age
Using the American Economic Association (AEA) Directory of Members, we identified tenured economics faculty at 17 top research institutions and obtained the years of their Ph.D. degrees. With the citation index of the Journal of Economic Literature we replicated portions of the curricala vitae of each of the 208 economists currently in the economics departments of those institutions who received Ph.D. degrees between 1959 and 1983.
To measure productivity we construct three indexes, combining papers published in refereed journals. Prior research suggests that, at least in terms of salary determination, the returns from nonreferred publications are quite low Sauer (1988), so that we ignore such publications in calculating these measures. I1 weights an article by the journal where it appears based on citations to that journal, using values generated by Laband and Piette (1994). This index distinguishes strongly among journals. For example, the Journal of Political Economy has a weight of 59.1, whereas Economic Inquiry has a weight of 7.9. In constructing I1 we use the weights associated with the decade in which the articles were published. I2 distinguishes somewhat less among journals by assigning all articles in the nine "core" journals identified by Laband and Piette a value of 1, whereas all other journals are valued at 0.5.Finally, I3 gives all papers a weight of 1. Coauthored articles were given half credit, consistent with Sauer's (1988) findings on the economic returns to coauthorship.
We measure the change in productivity over the life cycle by the percentage change in the number of publications from 9-10 years past the Ph.D. to the periods 14-15 years and then 19-20 years after. For most of the elite economists the base period is equivalent (accounting for publication lags) to the time of tenure, when one might expect that incentives to produce are at a peak. Using two-year publication records at each point reduces the effects of noise in the performance measures. One might argue that still other scientific life-cycle mileposts (e.g., attaining a full professorship) should be accounted for too (and to some extent the 14-15-year point does this). But our main purpose is simply to provide detailed evidence on the relationship to age, and our data are not sufficient to infer the impact of every possible milepost.
II. Heterogeneity in Declining Productivity
The evidence in section I documents the decline in productivity at the sample means. Information on the age-productivity relationship at the extremes of the sample is interesting in its own right and might help shed some light on the possible causes of the apparent decline in productivity with age. The simplest test compares productivity losses among the top early performers with that of the entire sample of economists at elite institutions. Among the top 10% of early producers the mean values of I1, I2, and I3 at year 20 were 64, 50, and 22%, respectively. These means are quite close to those listed for the entire sample in table 1. Thus on average early promise seems to be sustained in this sample. Of the 12 top researchers on whom we have 20 years of data, five were still among the top dozen producers at year 20.
Another way of examining heterogeneity is to look at how authors of different quality fare in the publication process conditional on their efforts. We obtained data on a random sample of initial submissions to a major general journal during a four-month period in 1991. (Some of the data were initially supplied by the journal's office for use in Hamermesh (1994).) Refereeing at this journal is double-blind, so that the chance that referees (though possibly not the editors) were affected by authors' reputations is reduced. The ages of the authors of these 313 papers are measured as of 1993 to account for the probable two-year average lag between the submission of a paper and its publication.
The probits included interaction terms between indicator variables for age and the extent of citations. (Low-cited economists were defined as those with fewer than 10 citations per year, well-cited with at least 10.) As figure 1 clearly shows, acceptance rates for each age group differ sharply by citation status. Comparing authors age 36-50 to those over 50, it is quite clear that the degree of heterogeneity increases with age. This appears to be less true in comparing the oldest to the youngest group, but that inference is due mainly to a very small sample. (Only six authors under age 36, the future superstars of the profession, were well cited.) The general tenor of the combined results from this sample is that the profession signals to less able scholars that their work no longer meets the profession's highest standards, and most of them respond by reducing their submissions to the highest quality journals.
III. Conclusions
We have followed the careers of economists and measured the demographic characteristics of publishers in leading journals. The evidence seems quite clear that publishing diminishes with age, especially publishing in leading journals, at rates as rapid as in the physical sciences. Indeed, remarkably few older people publish successfully in the scholarly outlets on which the profession places the highest value. As economists age, those who were the most productive early in their careers are among the few "survivors" still contributing to scholarship through the leading scholarly outlets.
Whether this relationship is due to natural declines in capacity or decreased incentives to produce is extremely difficult to discern. Unlike athletes, where it is likely that pure physical deterioration causes the reduction in productivity with age, among scholars even the fairly subtle facts that we have uncovered can be marshaled as support for each of these competing hypotheses. Without direct observation on how scholars' use of time changes as they age, we are unlikely to be able to distinguish between explanations of the declining ageproductivity relationship in science.
|
Abstract--Economists' productivity over their careers and as measured by publication in leading journals declines very sharply with age. There is no difference by age in the probability that an article submitted to a leading journal will be accepted. Rates of declining productivity are no greater among the very top publishers than among others, and the probability of acceptance is increasingly related to the author's quality rather than the author's age.
It is well known that productivity declines with age in a wide range of activities. Lehman (1953) suggests an early peak in productivity in a variety of scientific and artistic endeavors, and Diamond (1986) documents the pattern for several scholarly pursuits. Levin and Stephan (1992) provide clear evidence that this decline exists even after careful attempts to account for individual and cohort differences. Fair (1994) finds declines in physical ability among elite runners, as does Lydall (1968,pp. 113 passim) in physical abilities of the population generally. In this study we examine productivity declines in our own field. The main new results arise from our use of two different types of information, the equivalent of household and establishment data, to study the stone field over essentially the same period of time. Section I discusses the general results on aging and productivity, whereas section II presents evidence of the importance of heterogeneity.
I. Declining Productivity with Age
Using the American Economic Association (AEA) Directory of Members, we identified tenured economics faculty at 17 top research institutions and obtained the years of their Ph.D. degrees. With the citation index of the Journal of Economic Literature we replicated portions of the curricala vitae of each of the 208 economists currently in the economics departments of those institutions who received Ph.D. degrees between 1959 and 1983.
To measure productivity we construct three indexes, combining papers published in refereed journals. Prior research suggests that, at least in terms of salary determination, the returns from nonreferred publications are quite low Sauer (1988), so that we ignore such publications in calculating these measures. I1 weights an article by the journal where it appears based on citations to that journal, using values generated by Laband and Piette (1994). This index distinguishes strongly among journals. For example, the Journal of Political Economy has a weight of 59.1, whereas Economic Inquiry has a weight of 7.9. In constructing I1 we use the weights associated with the decade in which the articles were published. I2 distinguishes somewhat less among journals by assigning all articles in the nine "core" journals identified by Laband and Piette a value of 1, whereas all other journals are valued at 0.5.Finally, I3 gives all papers a weight of 1. Coauthored articles were given half credit, consistent with Sauer's (1988) findings on the economic returns to coauthorship.
We measure the change in productivity over the life cycle by the percentage change in the number of publications from 9-10 years past the Ph.D. to the periods 14-15 years and then 19-20 years after. For most of the elite economists the base period is equivalent (accounting for publication lags) to the time of tenure, when one might expect that incentives to produce are at a peak. Using two-year publication records at each point reduces the effects of noise in the performance measures. One might argue that still other scientific life-cycle mileposts (e.g., attaining a full professorship) should be accounted for too (and to some extent the 14-15-year point does this). But our main purpose is simply to provide detailed evidence on the relationship to age, and our data are not sufficient to infer the impact of every possible milepost.
II. Heterogeneity in Declining Productivity
The evidence in section I documents the decline in productivity at the sample means. Information on the age-productivity relationship at the extremes of the sample is interesting in its own right and might help shed some light on the possible causes of the apparent decline in productivity with age. The simplest test compares productivity losses among the top early performers with that of the entire sample of economists at elite institutions. Among the top 10% of early producers the mean values of I1, I2, and I3 at year 20 were 64, 50, and 22%, respectively. These means are quite close to those listed for the entire sample in table 1. Thus on average early promise seems to be sustained in this sample. Of the 12 top researchers on whom we have 20 years of data, five were still among the top dozen producers at year 20.
Another way of examining heterogeneity is to look at how authors of different quality fare in the publication process conditional on their efforts. We obtained data on a random sample of initial submissions to a major general journal during a four-month period in 1991. (Some of the data were initially supplied by the journal's office for use in Hamermesh (1994).) Refereeing at this journal is double-blind, so that the chance that referees (though possibly not the editors) were affected by authors' reputations is reduced. The ages of the authors of these 313 papers are measured as of 1993 to account for the probable two-year average lag between the submission of a paper and its publication.
The probits included interaction terms between indicator variables for age and the extent of citations. (Low-cited economists were defined as those with fewer than 10 citations per year, well-cited with at least 10.) As figure 1 clearly shows, acceptance rates for each age group differ sharply by citation status. Comparing authors age 36-50 to those over 50, it is quite clear that the degree of heterogeneity increases with age. This appears to be less true in comparing the oldest to the youngest group, but that inference is due mainly to a very small sample. (Only six authors under age 36, the future superstars of the profession, were well cited.) The general tenor of the combined results from this sample is that the profession signals to less able scholars that their work no longer meets the profession's highest standards, and most of them respond by reducing their submissions to the highest quality journals.
III. Conclusions
We have followed the careers of economists and measured the demographic characteristics of publishers in leading journals. The evidence seems quite clear that publishing diminishes with age, especially publishing in leading journals, at rates as rapid as in the physical sciences. Indeed, remarkably few older people publish successfully in the scholarly outlets on which the profession places the highest value. As economists age, those who were the most productive early in their careers are among the few "survivors" still contributing to scholarship through the leading scholarly outlets.
Whether this relationship is due to natural declines in capacity or decreased incentives to produce is extremely difficult to discern. Unlike athletes, where it is likely that pure physical deterioration causes the reduction in productivity with age, among scholars even the fairly subtle facts that we have uncovered can be marshaled as support for each of these competing hypotheses. Without direct observation on how scholars' use of time changes as they age, we are unlikely to be able to distinguish between explanations of the declining ageproductivity relationship in science.
|
考点1:“productivity”推荐译为“学术产出”
考点2:“household and establishment data”推荐译为“ 家庭数据和机构数据”
考点3:“ heterogeneity”推荐译为“异质性”
考点4:“refereed journals / non-refereed publications”推荐译为“同行评审期刊 / 非同行评审出版物”
考点5:“ life cycle”推荐译为“职业生命周期”
考点6:“ sample means”推荐译为“ 样本均值”
考点7:“double-blind”推荐译为“ 双盲”(评审)
考点8:“probits”推荐译为“概率单位模型”
考点9:“marshaled as support”推荐译为“ 被用来支持;被引为证据”
|
b2b59
|
学术论文
|
社会科学
|
11
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
For the facemask miniplate protocol, 2 anchor surgical miniplates (55-0851; Stryker Leibinger, Freiburg, Germany) were placed 1 at each zygomatic buttress area. Surgical miniplates were adapted and bent according to the anatomy of the zygomatic buttress in a curvilinear pattern according to the anatomic shape of the zygomatic buttress area and fixed with 3 self-tapping bone screws per side (2-mm diameter, 6-mm length; 50-20706; Stryker Leibinger). The distal end of the miniplate was exposed through the keratinized attached gingiva near the canine to prevent gingival irritation, and the end holes of the miniplates were cut to create hooks for elastics. Three weeks after the surgery, an orthopedic force of 400 to 500 g per side was applied by heavy extraoral elastics directed 30 downward and forward from the occlusal plane from the miniplates to the facemasks. The patients were asked to replace the elastics once each day. A removable maxillary biteplate covering the posterior occlusal surfaces was placed to eliminate occlusal interference in the incisor region until correction of the anterior crossbite was obtained. For the Class III elastics and miniplate protocol, 4 straight miniplates (55-0851; Stryker Leibinger) were placed. In the maxilla, straight surgical miniplates, 25 mm or 6 holes in length, were adapted to the anatomy of the infrazygomatic buttress and fixed with 3 selftapping bone screws per side (2-mm diameter, 6-mm length; 50-20706; Stryker Leibinger). In the mandible, straight miniplates of 21 mm or 5 holes in length were adapted to the bone anatomy inferiorly between the mandibular lateral incisors and canines and fixed with 2 or 3 self-tapping bone screws per side so that the upper screw was at the level of root apices. All mucoperiosteal flaps were secured and sutured, exposing the ends of the miniplates over the keratinized attached gingiva to prevent gingival irritation. The distal end holes of the miniplates were cut to create hooks for elastics.
Three weeks after the surgery, the miniplates were loaded with Class III elastics on each side to provide a force of approximately 250 g to each side. The patients were instructed to wear the elastics 24 hours per day. The elastics were replaced at least once each day. A removable biteplate covering the occlusal surface of maxillary teeth was placed to eliminate occlusal interference in the incisor region until correction of the anterior crossbite was obtained . The decision to discontinue orthopedic treatment in groups 1 and 2 was made by the operator when the patients had 3 to 4 mm of positive anterior overjet. For each patient, a lateral cephalogram and facial moulage were obtained before treatment (T1) and at the end of protraction therapy or the observation period (T2), All facial moulages were scanned with the Facial Insight 3D Scanner (Motion View Software, Chattanooga, Tenn). Hence, 3D photographs of all patients and controls were acquired. All subjects were in centric occlusion, with relaxed facial musculature and lips. The 3D photographs were imported in stereolithography binary file format (*.stl) into an advanced processing software package (Geomagic Control 14; Geomagic, Research Triangle Park, NC) for further analysis. All 3D photographs were acquired in a similar way and had the same orientation. The facial soft tissue changes after maxillary protraction were evaluated by superimposition of the T1 and T2 3D photographs for every patient by a surface-based registration, Maal et al concluded that surface-based registration is an accurate method to compare 3D photographs of the same subject at different times rather than reference frame-based registration.
For the initial register of T1 and T2 scans, 9 markers were used as references to superimpose the images: (1) left endocanthion, (2) left exocanthion, (3) right endocanthion, (4) right exocanthion, (5) soft tissue nasion, (6) left palpebrale superius, (7) left palpebrale inferius, (8) right palpebrale superius, and (9) right palpebrale inferius.20-22 The 3D photographs at T1 were set as fixed, and the T2 3D photographs were set as floating objects. For more refining of the superimpositions, the final register was made on the wide surface starting from right and left exocanthion and extending upward over all the forehead on the area that would not be influenced by the treatment. The T1 and T2 3D images were superimposed with the same coordinate system .23 For the 3D analysis of each subject, the T1 face scan was set as a reference, and the T2 scan was set as the test, and then the 3D compare analysis was performed. The 3D compare analysis generated a 3D color-coded map that displayed the areas and magnitudes of changes in facial soft tissues between the T1 (reference) and T2 (test) scans . Soft tissue landmarks, including right and left buccale points, right and left points of the cheek, subnasale, labiale superius, labiale inferius, soft tissue B-point, soft tissue pogonion, and soft tissue menton, were defined using the Create Annotation function in the Geomagic Control 14 software.21,22 The Annotation function measured the magnitude of deviation between the T1 and T2 scans at the selected points corresponding to x-, y-, and z-axes (Dx, deviation in the transverse direction; Dy, deviation in the vertical direction; Dz, deviation in the anteroposterior direction). The magnitudes of deviations were analyzed statistically. Cephalometric radiographs were obtained at T1 and T2 for all subjects to evaluate the amounts of maxillary advancement and the changes. Hence, the soft tissue changes were compared with actual skeletal movements. All cephalometric radiographs were scanned and analyzed by 1 investigator (M.H.E) using software (version 11.7; Dolphin Imaging and Management Solutions, Chatsworth, Calif). The analysis consisted of the following.
Skeletally anchored maxillary protraction using miniplates was introduced to transfer the orthopedic forces directly to the maxilla, to achieve an outcome not possible by conventional tooth-anchored facemask therapy in which a large portion of the force is dissipated to the periodontal ligament area. The application of orthopedic force through the teeth results in unwanted dentoalveolar changes such as extrusion and mesial movement of the maxillary molars, proclination of the maxillary incisors, and retroclination of the mandibular incisors. Moreover, studies have shown that facemask and rapid maxillary expansion therapies produce greater dental than skeletal changes; in contrast, bone-anchored maxillary protraction produces greater skeletal changes and open circummaxillary sutures. This is the first study to use a 3D approach to evaluate the facial soft tissue changes associated with skeletally anchored maxillary protraction protocols: skeletally anchored facemask with miniplates, and Class III elastics from infrazygomatic miniplates in the maxilla to symphyseal miniplates in the mandible. The conventional lateral cephalometric analysis evaluates the soft tissue changes only at the midsagittal area. However, patients usually evaluate their own soft tissue esthetics on the basis of how they look in the frontal view. Therefore, imaging methods, such as 3D computed tomography and 3D facial scan images are needed to analyze and evaluate the soft tissues of the entire face.
One major application of 3D imaging in orthodontics and oral and maxillofacial surgery is preintervention and postinterventions assessment of facial esthetics. To evaluate treatment outcomes with regard to soft tissues, preoperative and postoperative 3D photographs of the patient's face are registered. After registration of the 3D photographs, the differences between them can be visualized on a color scale or a distance map. In this way, the results of surgical and orthodontic treatment can be evaluated quantitatively and objectively. Investigators concluded that surface-based registration is an accurate method to compare 3D photographs of the same subject at different times. Therefore, 3D stereophotogrammetry is an accurate tool to evaluate facial changes (surgical or nonsurgical) over time. The soft tissue landmarks used in this study proved to be reproducible, easy to designate, and useful for facial soft tissue analysis. For superimposition and registration of pretreatment and postreatment 3D photographs, Day and Lee used a broad surface on the forehead, Soncul and Bamber used 5 points (right and left exocanthions and endocanthions, and soft-tissue nasion), and McCance et al used these 5 points and an additional 5 arbitrary points on the forehead. Recently, Baik and Kim used the 5 landmarks on the right and left exocanthions and endocanthions, and soft-tissue nasion for point registration, followed by area registration using the wide surface of the forehead as the reference for superimposing the 3D images to evaluate the soft-tissue changes after the correction of thye skeletal Class III malocclusion by 2-jaw surgery with genioplasty. Hence, in this study, we used initial point registration followed by the wide surface registration starting from right and left exocanthions and extending upward over the forehead on the area that would not be influenced by the treatment.
The maxilla was protracted forward significantly in groups 1 and 2 when compared with the untreated control group (group 1, 4.87 mm; group 2, 5.81 mm). The protraction rates were 0.61 and 0.65 mm per month for groups 1 and 2, respectively, without a significant difference between them. In previous studies, Cha and Ngan achieved 3.42 mm of maxillary advancement, and Lee et al reported 3.11 mm of advancement using facemasks anchored by miniplates at the zygomatic buttress area. Sar et al46 had 2.83 mm of maxillary advancement using facemasks anchored by miniplates fixed in the lateral nasal wall.
|
For the facemask miniplate protocol, 2 anchor surgical miniplates (55-0851; Stryker Leibinger, Freiburg, Germany) were placed 1 at each zygomatic buttress area. Surgical miniplates were adapted and bent according to the anatomy of the zygomatic buttress in a curvilinear pattern according to the anatomic shape of the zygomatic buttress area and fixed with 3 self-tapping bone screws per side (2-mm diameter, 6-mm length; 50-20706; Stryker Leibinger). The distal end of the miniplate was exposed through the keratinized attached gingiva near the canine to prevent gingival irritation, and the end holes of the miniplates were cut to create hooks for elastics. Three weeks after the surgery, an orthopedic force of 400 to 500 g per side was applied by heavy extraoral elastics directed 30 downward and forward from the occlusal plane from the miniplates to the facemasks. The patients were asked to replace the elastics once each day. A removable maxillary biteplate covering the posterior occlusal surfaces was placed to eliminate occlusal interference in the incisor region until correction of the anterior crossbite was obtained. For the Class III elastics and miniplate protocol, 4 straight miniplates (55-0851; Stryker Leibinger) were placed. In the maxilla, straight surgical miniplates, 25 mm or 6 holes in length, were adapted to the anatomy of the infrazygomatic buttress and fixed with 3 selftapping bone screws per side (2-mm diameter, 6-mm length; 50-20706; Stryker Leibinger). In the mandible, straight miniplates of 21 mm or 5 holes in length were adapted to the bone anatomy inferiorly between the mandibular lateral incisors and canines and fixed with 2 or 3 self-tapping bone screws per side so that the upper screw was at the level of root apices. All mucoperiosteal flaps were secured and sutured, exposing the ends of the miniplates over the keratinized attached gingiva to prevent gingival irritation. The distal end holes of the miniplates were cut to create hooks for elastics.
Three weeks after the surgery, the miniplates were loaded with Class III elastics on each side to provide a force of approximately 250 g to each side. The patients were instructed to wear the elastics 24 hours per day. The elastics were replaced at least once each day. A removable biteplate covering the occlusal surface of maxillary teeth was placed to eliminate occlusal interference in the incisor region until correction of the anterior crossbite was obtained . The decision to discontinue orthopedic treatment in groups 1 and 2 was made by the operator when the patients had 3 to 4 mm of positive anterior overjet. For each patient, a lateral cephalogram and facial moulage were obtained before treatment (T1) and at the end of protraction therapy or the observation period (T2), All facial moulages were scanned with the Facial Insight 3D Scanner (Motion View Software, Chattanooga, Tenn). Hence, 3D photographs of all patients and controls were acquired. All subjects were in centric occlusion, with relaxed facial musculature and lips. The 3D photographs were imported in stereolithography binary file format (*.stl) into an advanced processing software package (Geomagic Control 14; Geomagic, Research Triangle Park, NC) for further analysis. All 3D photographs were acquired in a similar way and had the same orientation. The facial soft tissue changes after maxillary protraction were evaluated by superimposition of the T1 and T2 3D photographs for every patient by a surface-based registration, Maal et al concluded that surface-based registration is an accurate method to compare 3D photographs of the same subject at different times rather than reference frame-based registration.
For the initial register of T1 and T2 scans, 9 markers were used as references to superimpose the images: (1) left endocanthion, (2) left exocanthion, (3) right endocanthion, (4) right exocanthion, (5) soft tissue nasion, (6) left palpebrale superius, (7) left palpebrale inferius, (8) right palpebrale superius, and (9) right palpebrale inferius.20-22 The 3D photographs at T1 were set as fixed, and the T2 3D photographs were set as floating objects. For more refining of the superimpositions, the final register was made on the wide surface starting from right and left exocanthion and extending upward over all the forehead on the area that would not be influenced by the treatment. The T1 and T2 3D images were superimposed with the same coordinate system .23 For the 3D analysis of each subject, the T1 face scan was set as a reference, and the T2 scan was set as the test, and then the 3D compare analysis was performed. The 3D compare analysis generated a 3D color-coded map that displayed the areas and magnitudes of changes in facial soft tissues between the T1 (reference) and T2 (test) scans . Soft tissue landmarks, including right and left buccale points, right and left points of the cheek, subnasale, labiale superius, labiale inferius, soft tissue B-point, soft tissue pogonion, and soft tissue menton, were defined using the Create Annotation function in the Geomagic Control 14 software.21,22 The Annotation function measured the magnitude of deviation between the T1 and T2 scans at the selected points corresponding to x-, y-, and z-axes (Dx, deviation in the transverse direction; Dy, deviation in the vertical direction; Dz, deviation in the anteroposterior direction). The magnitudes of deviations were analyzed statistically. Cephalometric radiographs were obtained at T1 and T2 for all subjects to evaluate the amounts of maxillary advancement and the changes. Hence, the soft tissue changes were compared with actual skeletal movements. All cephalometric radiographs were scanned and analyzed by 1 investigator (M.H.E) using software (version 11.7; Dolphin Imaging and Management Solutions, Chatsworth, Calif). The analysis consisted of the following.
Skeletally anchored maxillary protraction using miniplates was introduced to transfer the orthopedic forces directly to the maxilla, to achieve an outcome not possible by conventional tooth-anchored facemask therapy in which a large portion of the force is dissipated to the periodontal ligament area. The application of orthopedic force through the teeth results in unwanted dentoalveolar changes such as extrusion and mesial movement of the maxillary molars, proclination of the maxillary incisors, and retroclination of the mandibular incisors. Moreover, studies have shown that facemask and rapid maxillary expansion therapies produce greater dental than skeletal changes; in contrast, bone-anchored maxillary protraction produces greater skeletal changes and open circummaxillary sutures. This is the first study to use a 3D approach to evaluate the facial soft tissue changes associated with skeletally anchored maxillary protraction protocols: skeletally anchored facemask with miniplates, and Class III elastics from infrazygomatic miniplates in the maxilla to symphyseal miniplates in the mandible. The conventional lateral cephalometric analysis evaluates the soft tissue changes only at the midsagittal area. However, patients usually evaluate their own soft tissue esthetics on the basis of how they look in the frontal view. Therefore, imaging methods, such as 3D computed tomography and 3D facial scan images are needed to analyze and evaluate the soft tissues of the entire face.
One major application of 3D imaging in orthodontics and oral and maxillofacial surgery is preintervention and postinterventions assessment of facial esthetics. To evaluate treatment outcomes with regard to soft tissues, preoperative and postoperative 3D photographs of the patient's face are registered. After registration of the 3D photographs, the differences between them can be visualized on a color scale or a distance map. In this way, the results of surgical and orthodontic treatment can be evaluated quantitatively and objectively. Investigators concluded that surface-based registration is an accurate method to compare 3D photographs of the same subject at different times. Therefore, 3D stereophotogrammetry is an accurate tool to evaluate facial changes (surgical or nonsurgical) over time. The soft tissue landmarks used in this study proved to be reproducible, easy to designate, and useful for facial soft tissue analysis. For superimposition and registration of pretreatment and postreatment 3D photographs, Day and Lee used a broad surface on the forehead, Soncul and Bamber used 5 points (right and left exocanthions and endocanthions, and soft-tissue nasion), and McCance et al used these 5 points and an additional 5 arbitrary points on the forehead. Recently, Baik and Kim used the 5 landmarks on the right and left exocanthions and endocanthions, and soft-tissue nasion for point registration, followed by area registration using the wide surface of the forehead as the reference for superimposing the 3D images to evaluate the soft-tissue changes after the correction of thye skeletal Class III malocclusion by 2-jaw surgery with genioplasty. Hence, in this study, we used initial point registration followed by the wide surface registration starting from right and left exocanthions and extending upward over the forehead on the area that would not be influenced by the treatment.
The maxilla was protracted forward significantly in groups 1 and 2 when compared with the untreated control group (group 1, 4.87 mm; group 2, 5.81 mm). The protraction rates were 0.61 and 0.65 mm per month for groups 1 and 2, respectively, without a significant difference between them. In previous studies, Cha and Ngan achieved 3.42 mm of maxillary advancement, and Lee et al reported 3.11 mm of advancement using facemasks anchored by miniplates at the zygomatic buttress area. Sar et al46 had 2.83 mm of maxillary advancement using facemasks anchored by miniplates fixed in the lateral nasal wall.
|
考点 1:“zygomatic buttress” 推荐译为 “颧牙槽嵴”
考点 2:“self-tapping bone screws” 推荐译为 “自攻骨螺钉”
考点 3:“orthopedic force” 推荐译为 “矫形力”
考点 4:“centric occlusion” 推荐译为 “正中咬合”
考点 5:“cephalometric radiographs” 推荐译为 “头影测量片”
考点 6:“anterior crossbite” 推荐译为 “前牙反𬌗”
考点 7:“facial moulages” 必须译为 “面部扫描模型”,不能翻译为 “面部印模”
考点 8:“infrazygomatic buttress” 推荐译为 “颧下嵴”
考点 9:“mucoperiosteal flaps” 推荐译为 “粘骨膜瓣”
考点 10:“circummaxillary sutures” 推荐译为 “上颌周围骨缝”
考点 11:“soft tissue pogonion” 推荐译为 “软组织颏前点”
考点 12:“rapid maxillary expansion” 推荐译为 “快速上颌扩弓”
考点 13:“periodontal ligament” 推荐译为 “牙周膜”
考点 14:“symphyseal miniplates” 必须译为 “颏部微型钢板”
|
b3ae4
|
学术论文
|
自然科学
|
127
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
21世纪以后,我国民间借贷的规模逐渐扩大,影响日益深远,在当前中国的经济发展中发挥着重要的作用。民间借贷既有积极作用,也有消极作用。一方面,民间借贷的存在和发展在弥补正规金融不足的同时也带动了正规金融的发展。而另一方面,我们必须看到民间借贷的存在和发展在一定程度上削弱了宏观调控的力度,并且其风险的危害性也大。因此,如何定位我国的民间借贷并采取相应的政策措施已经成为当前亟需解决的问题。
一、我国目前有关民间借贷的法律规定及规定之间存在的相互冲突
(一)目前有关民间借贷的法律规定
目前,在我国的法律体系之中,尚没有专门规范民间借贷的法律或是行政法规,有关民间借贷的规定分散在《合同法》和最高人民法院的两个司法解释中。
在《合同法》中,借款合同作为一种有名的民事合同被集中地归入在第12章之中。《合同法》第12章第1条规定:“借款合同是指借款人向贷款人借款,到期返还借款并支付利息的合同。”第210条规定:“自然人之间的借贷合同,自贷款人提供贷款时生效”.第211条规定:“自然人之间的借款合同对支会利息没有约定或约定不明的,视为不支付利息,自然人之间的借款合同约定支付利息的,借款的利率不得违反国家有关限制利率的规定”.很明显,《合同法》对民间借贷合同是采取区别对待的,主要表现在借款主体和无息推定原则上。民间借贷既然是借贷合同的一种形式,就应该准用金融借贷的有关规定,然而实践中却不是如此。
(二)现有民间借贷法律规定存在相互冲突且协调性较差在现有有关民间借贷的法律规定之中,存在着规定相互冲突的问题,协调性较差。比如《意见》第8条的规定:“借贷双方对有无约定利率发生争议又不能证明的,可参照银行同类贷款利率计息。借贷双方对约定的利率发生争议,又不能证明的,可参照本意见第6条规定计息”即由各地人民法院根据本地区的实际情况掌握,但最高不超过银行同类贷款利率的4倍。而根据《合同法》第211条之规定,“自然人之间的借款合同对支付利息没有约定或约定不明的,视为不支付利息”.即实行无息推定原则,很明显,这两条规定是互相冲突的。
我国有关民间借贷的法律规定,但民间借贷的实践己经发生了太多的变化,原来的规定早已经是捉襟见肘,为了能够满足现实的需要对相应的规定进行修改己经是当务之急,从长远来看应该制定《民间借贷法》对民间借贷行为进行规范。
二、当前我国民间借贷存在纠纷的主要形式
(一)案例引发的思考
本色集团是在浙江省东阳市注册的一家大型企业集团,法人代表吴英,总资产达30余亿之多,26岁的东阳女子创造了这样的本色集团,不能不说是个神话。2007年2月10日吴英因涉嫌非法吸收公众存款罪而被依法采取强制措施,随之本色的神话似乎到了终结的边缘。随着本色集团的土崩瓦解人们也渐渐开始思考本色后面并不本色的东西。各种媒体在争相报道本色事件的同时,都提到“非法集资”、“高利贷”、“民间游资”、“非法吸收公众存款罪”等字眼。可见人民所关心的己经不仅仅是事件的表面,而是事件背后的思考。
以上案例中,在民间大量闲置资金的背景下,巨额资金的所有者为了自身利益不断尝试为资金寻找出路。除了传统的投资途径外是否还有可以拓展的空间,在我国现有的金融体制之下是否存在更加高额的回报之路,民间借贷长期存在的原因及其与“非法集资”、“高利贷”、“非法吸收公众存款罪”等的界限等厂这些都是我们不得不思考的问题。
|
21世纪以后,我国民间借贷的规模逐渐扩大,影响日益深远,在当前中国的经济发展中发挥着重要的作用。民间借贷既有积极作用,也有消极作用。一方面,民间借贷的存在和发展在弥补正规金融不足的同时也带动了正规金融的发展。而另一方面,我们必须看到民间借贷的存在和发展在一定程度上削弱了宏观调控的力度,并且其风险的危害性也大。因此,如何定位我国的民间借贷并采取相应的政策措施已经成为当前亟需解决的问题。
一、我国目前有关民间借贷的法律规定及规定之间存在的相互冲突
(一)目前有关民间借贷的法律规定
目前,在我国的法律体系之中,尚没有专门规范民间借贷的法律或是行政法规,有关民间借贷的规定分散在《合同法》和最高人民法院的两个司法解释中。
在《合同法》中,借款合同作为一种有名的民事合同被集中地归入在第12章之中。《合同法》第12章第1条规定:“借款合同是指借款人向贷款人借款,到期返还借款并支付利息的合同。”第210条规定:“自然人之间的借贷合同,自贷款人提供贷款时生效”.第211条规定:“自然人之间的借款合同对支会利息没有约定或约定不明的,视为不支付利息,自然人之间的借款合同约定支付利息的,借款的利率不得违反国家有关限制利率的规定”.很明显,《合同法》对民间借贷合同是采取区别对待的,主要表现在借款主体和无息推定原则上。民间借贷既然是借贷合同的一种形式,就应该准用金融借贷的有关规定,然而实践中却不是如此。
(二)现有民间借贷法律规定存在相互冲突且协调性较差在现有有关民间借贷的法律规定之中,存在着规定相互冲突的问题,协调性较差。比如《意见》第8条的规定:“借贷双方对有无约定利率发生争议又不能证明的,可参照银行同类贷款利率计息。借贷双方对约定的利率发生争议,又不能证明的,可参照本意见第6条规定计息”即由各地人民法院根据本地区的实际情况掌握,但最高不超过银行同类贷款利率的4倍。而根据《合同法》第211条之规定,“自然人之间的借款合同对支付利息没有约定或约定不明的,视为不支付利息”.即实行无息推定原则,很明显,这两条规定是互相冲突的。
我国有关民间借贷的法律规定,但民间借贷的实践己经发生了太多的变化,原来的规定早已经是捉襟见肘,为了能够满足现实的需要对相应的规定进行修改己经是当务之急,从长远来看应该制定《民间借贷法》对民间借贷行为进行规范。
二、当前我国民间借贷存在纠纷的主要形式
(一)案例引发的思考
本色集团是在浙江省东阳市注册的一家大型企业集团,法人代表吴英,总资产达30余亿之多,26岁的东阳女子创造了这样的本色集团,不能不说是个神话。2007年2月10日吴英因涉嫌非法吸收公众存款罪而被依法采取强制措施,随之本色的神话似乎到了终结的边缘。随着本色集团的土崩瓦解人们也渐渐开始思考本色后面并不本色的东西。各种媒体在争相报道本色事件的同时,都提到“非法集资”、“高利贷”、“民间游资”、“非法吸收公众存款罪”等字眼。可见人民所关心的己经不仅仅是事件的表面,而是事件背后的思考。
以上案例中,在民间大量闲置资金的背景下,巨额资金的所有者为了自身利益不断尝试为资金寻找出路。除了传统的投资途径外是否还有可以拓展的空间,在我国现有的金融体制之下是否存在更加高额的回报之路,民间借贷长期存在的原因及其与“非法集资”、“高利贷”、“非法吸收公众存款罪”等的界限等厂这些都是我们不得不思考的问题。
|
考点1:“民间借贷“应该译为“private lending”,不能直译为 "folk" 或 "civilian"。
考点2:”有名合同“应该译为“nominate contract”,指法律上已经确定了一定名称和特定规则的合同,源于大陆法系的概念。
考点3:“本色后面并不本色的东西”推荐译为“the unsavory truths behind the Bense Group”。
考点4:“寻找出路“不能直译为“finding a way out”。
考点5:”捉襟见肘“推荐译为“be stretched to its limits”。
考点6:“本色集团”应该翻译为:“Bense Group”
考点7: “我国”应译为“China”,而不是“our country”
|
b4633
|
学术论文
|
社会科学
|
36
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
【美食地理】中国最著名的48种地方小吃,看看你吃过几个,中国最值得打卡的十大美食地点
在中国这片神奇的土地上,饮食文化传承数千载,各省份、地区、民族的不同文化、习俗皆可在饮食中有所体现。要说最令吃货们念念不忘的,也许不是那些山珍海味,而是一道道风味各异的特色小吃。它们是那么平凡、朴素,甚至被认为难登大雅之堂,但它们也正是无数吃货舌尖上最深的念想。今天小编就为大家盘点一下全国各地最有名的风味小吃,如有疏漏之处,欢迎在留言中补充,让大家来共同了解祖国各地的特色美食!
1.长沙臭豆腐
小吃中当之无愧的王者,“臭名远扬”,即使不喜欢它的味道,也绝不会没有听说过它的名字。长沙臭豆腐,长沙人又称臭干子。“臭豆腐 ”其名虽俗气,但外陋内秀、平中见奇、源远流长,却是一种极具特色的休闲风味。色墨黑,外焦里嫩,鲜而香辣。焦脆而不糊、细嫩而不腻、初闻臭气扑鼻,细嗅浓香诱人。
2.小龙虾
不知从何时起,小龙虾悄悄出现在人们的餐桌上,从此一发不可收拾,以迅雷不及掩耳之势征服了中国人刁钻的胃口。在全国的任何一条小吃街,都绝不会少了小龙虾的身影。过去说“有井水处,可歌柳词”,如今是有人烟处,必烹龙虾。如果中国人的宵夜有图腾,那么必然是非小龙虾莫属。小龙虾常被做成香辣、蒜蓉、十三香等口味,其特点是 色艳、汤浓、味重、香辣无比,深受各路吃货喜欢。
3.天津煎饼果子
煎饼果子是天津的传统小吃。实际上,煎饼果子应当写作煎饼馃(guǒ)子,馃子是北方方言,即油条。还记得那句网络流行语吗,“哟哟,切克劳,煎饼果子来一套!”这句话足可说明煎饼果子的受欢迎程度。
正宗的天津煎饼果子,必须是绿豆磨成面作为主料,白面和黄豆面按比例搭配,“果子” 就是油条或者馃篦(北京叫薄脆)。调料方面,葱花必不可少,其次就是天津产的甜面酱、蒜蓉辣酱或者油炸辣子,以及红色的北方豆腐乳调味,这些就是一套正宗天津煎饼果子的全部内容了,另外再加鸡蛋的实际要叫鸡蛋煎饼果子(鸡蛋还可以自带哦)。除此之外,一切加烤肠、生菜、榨菜、肉松、海带丝的都是邪教,在天津人看来,食理难容。
4.天津狗不理包子
狗不理包子是天津市中国传统风味小吃,始创于公元1858年(清朝咸丰年间)。狗不理包子是包子中的“LV”,被誉为“津门老字号,中华第一包”,以其鲜美的味道和独特的样式而闻名。 狗不理包子的面、馅选料精细,制作工艺严格,外形美观,特别是包子褶花匀称,每个包子都是18个褶,“薄皮大馅十八褶”便是对其最生动的描写。刚出笼的包子,鲜而不腻,清香适口。
|
【美食地理】中国最著名的48种地方小吃,看看你吃过几个,中国最值得打卡的十大美食地点
在中国这片神奇的土地上,饮食文化传承数千载,各省份、地区、民族的不同文化、习俗皆可在饮食中有所体现。要说最令吃货们念念不忘的,也许不是那些山珍海味,而是一道道风味各异的特色小吃。它们是那么平凡、朴素,甚至被认为难登大雅之堂,但它们也正是无数吃货舌尖上最深的念想。今天小编就为大家盘点一下全国各地最有名的风味小吃,如有疏漏之处,欢迎在留言中补充,让大家来共同了解祖国各地的特色美食!
1.长沙臭豆腐
小吃中当之无愧的王者,“臭名远扬”,即使不喜欢它的味道,也绝不会没有听说过它的名字。长沙臭豆腐,长沙人又称臭干子。“臭豆腐 ”其名虽俗气,但外陋内秀、平中见奇、源远流长,却是一种极具特色的休闲风味。色墨黑,外焦里嫩,鲜而香辣。焦脆而不糊、细嫩而不腻、初闻臭气扑鼻,细嗅浓香诱人。
2.小龙虾
不知从何时起,小龙虾悄悄出现在人们的餐桌上,从此一发不可收拾,以迅雷不及掩耳之势征服了中国人刁钻的胃口。在全国的任何一条小吃街,都绝不会少了小龙虾的身影。过去说“有井水处,可歌柳词”,如今是有人烟处,必烹龙虾。如果中国人的宵夜有图腾,那么必然是非小龙虾莫属。小龙虾常被做成香辣、蒜蓉、十三香等口味,其特点是 色艳、汤浓、味重、香辣无比,深受各路吃货喜欢。
3.天津煎饼果子
煎饼果子是天津的传统小吃。实际上,煎饼果子应当写作煎饼馃(guǒ)子,馃子是北方方言,即油条。还记得那句网络流行语吗,“哟哟,切克劳,煎饼果子来一套!”这句话足可说明煎饼果子的受欢迎程度。
正宗的天津煎饼果子,必须是绿豆磨成面作为主料,白面和黄豆面按比例搭配,“果子” 就是油条或者馃篦(北京叫薄脆)。调料方面,葱花必不可少,其次就是天津产的甜面酱、蒜蓉辣酱或者油炸辣子,以及红色的北方豆腐乳调味,这些就是一套正宗天津煎饼果子的全部内容了,另外再加鸡蛋的实际要叫鸡蛋煎饼果子(鸡蛋还可以自带哦)。除此之外,一切加烤肠、生菜、榨菜、肉松、海带丝的都是邪教,在天津人看来,食理难容。
4.天津狗不理包子
狗不理包子是天津市中国传统风味小吃,始创于公元1858年(清朝咸丰年间)。狗不理包子是包子中的“LV”,被誉为“津门老字号,中华第一包”,以其鲜美的味道和独特的样式而闻名。 狗不理包子的面、馅选料精细,制作工艺严格,外形美观,特别是包子褶花匀称,每个包子都是18个褶,“薄皮大馅十八褶”便是对其最生动的描写。刚出笼的包子,鲜而不腻,清香适口。
|
考点1:“臭豆腐”应统一译为:stinky tofu
考点2:“臭名远扬”推荐译为:notorious yet beloved或famous for its pungent smell
考点3:“迅雷不及掩耳之势”应译为:took China by storm或exploded in popularity
考点4:“刁钻的胃口”应译为:discerning palates
考点5:“宵夜图腾”应译为:symbol of Chinese late-night food
考点6:“煎饼果子”应译为:Tianjin-style jianbing或Jianbing guozi
|
b5b8f
|
垂类场景
|
广告营销
|
70
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Automated decision support systems are one type of automation that supports human operators by providing information about a particular state of the world (Mosier and Manzey 2020). Typical examples are alarm systems or detection systems (Rieger, Heilmann, and Manzey 2021) in security contexts (Goh, Wiegmann, and Madhavan 2005; Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020), process control (Chavaillaz, Wastell, and Sauer 2016, Chavaillaz et al. 2019; Chavaillaz and Sauer 2017; Sauer, Chavaillaz, and Wastell 2016), or medical screening tasks (Alberdi et al. 2004; Drew, Cunningham, and Wolfe 2012; Xiao et al. 2021). One function of decision support systems in visual inspection tasks is to provide direct cues that operators must resolve. Direct cues attract the attention of human operators by indicating the exact location of a possible target (Chavaillaz et al. 2018; Darnell and Lamy 2022; Posner, Snyder, and Davidson 1980)Such direct cues have two goals: First, they should support the operator’s search during a visual inspection task (Chavaillaz et al. 2018; Goh, Wiegmann, and Madhavan 2005; Wiegmann et al. 2006) by guiding attention towards the cued area (Wolfe 2021); and second, they should improve the operator’s decision making regarding the detection of critical events or targets (Wickens et al. 2015). However, the reliability of most decision support systems is imperfect, and system designers must decide how to set their decision criterion.
Usually, the priority is to set a more liberal decision criterion (Sorkin and Woods 1985) to detect more targets (automation hits). But a liberal decision criterion comes at the cost of producing more alarms where no target is present (automation false alarms) or producing automation miscues. Based on previous studies (Chavaillaz et al. 2020; Goh, Wiegmann, and Madhavan 2005), we define automation miscues as alarms in the wrong location when a target is located elsewhere in the image. Because of the decision support system’s imperfect reliability, operators should assess the validity of its alarms and act appropriately. Such behaviour would improve human–machine system performance (Meyer and Kuchar 2021). Unfortunately, operators often do not react optimally to the decision support system’s presence, resulting in insufficient human–machine system performance (Bartlett and McCarley 2017, 2019; Boskemper, Bartlett, and McCarley 2022). Although direct cues can improve human–machine system performance (Chavaillaz et al. 2018), they can also have adverse effects when false alarms and miscues become frequent. It has been well-researched that operators will ignore automation alarms if they experience many false alarms, a so-called ‘cry wolf’ effect (Bliss, Gilson, and Deaton 1995; Dixon and Wickens 2006; Parasuraman and Wickens 2008; Zirk, Wiczorek, and Manzey 2020). Several studies have found this phenomenon and described it as a lack of operator compliance (Bliss, Gilson, and Deaton 1995; Huegli, Merks, and Schwaninger 2020, 2023; Parasuraman, Sheridan, and Wickens 2000; Zirk, Wiczorek, and Manzey 2020). We define compliance operationally as the proportion of target-present responses given by operators on trials with automation alarms—regardless of whether true or false (Dixon and Wickens 2006; Manzey, Gérard, and Wiczorek 2014). Compliance has been described as a behavioural expression of trust in automation (Hoff and Bashir 2015; Lee and See 2004). Although there is some evidence that compliance somehow relates to subjective trust in automation (Avril et al. 2022; Chancey et al. 2017; Lee and Moray 1992), subjective trust and objective compliance do not always correlate strongly (Chavaillaz, Wastell, and Sauer 2016, Chavaillaz et al. 2019; Rovira, McGarry, and Parasuraman 2007). Eye-tracking research has shown that the marked areas are the ones that are mainly inspected by operators (Drew, Cunningham, and Wolfe 2012), which implies strong attentional guidance (Wolfe 2021) by direct cues. However, if the marked area is a miscue, this can become a problem if operators get distracted by it and visual search for prohibited articles in other areas of the X-ray image is impaired. Alberdi et al. (2004) and Kunar et al. (2017) analysed the performance data of radiologists detecting breast cancer cells with the help of an automated decision support that provided direct cues. Radiologists benefitted from the alarms when they located cancer cells correctly, but less when miscues were given.
Goh, Wiegmann, and Madhavan (2005) tested student participants in a simulated baggage X-ray screening task in which they had to detect knives in greyscale images with the help of a decision support system. Participants benefitted from direct cues, especially when automation reliability was high, but they missed most of the targets when miscues were present. We extend this research by using highly realistic colourised X-ray images with professional airport security officers supported by an explosive detection system (EDSCB) for cabin baggage screening. Moreover, whereas previous studies investigated whether miscues impair the detection of the same type of target located elsewhere in the X-ray image, we investigated spill-over effects from a cueing system for one type of target (EDSCB for explosive) on detection of different types of targets (guns and knives). X-ray baggage screening at airports aims to prevent passengers from bringing prohibited articles (e.g. guns, knives, bombs) onto an aircraft (Harris 2002; Petrozziello and Jordanov 2019). Bombs are the most dangerous prohibited articles in passenger baggage and are technically called improvised explosive devices (IEDs). Screeners can detect IEDs when they are trained well (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009; Schuster et al. 2013; Schwaninger and Hofer 2004) and when they are supported with explosives detection systems for cabin baggage (EDSCB) screening (Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020, 2023). EDSCB support screeners by providing direct cues in areas in the X-ray image that might contain explosive material. When the EDSCB is used as a decision support system in primary screening, the screeners conduct on-screen alarm resolution. That is, the screeners visually inspect the X-ray image and decide whether the EDSCB alarm is correct or incorrect (Hättenschwiler et al. 2018;Schwaninger and Merks 2019). When the screeners decide that the bag could contain a prohibited article, the bag is sent to secondary screening where another screener inspects the bag by applying explosives trace detection or manual baggage opening (Sterchi and Schwaninger 2015). An alternative to on-screen alarm resolution in primary screening is automated decision: Bags on which EDSCB has alarmed are sent directly to secondary screening for further inspection (Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020). State-of-the-art multi-view EDSCB technologies (EDSCB of Standard C2) achieve automation hit rates in the range of 75%–90% and automation false alarm rates of 6%–20% (Hättenschwiler et al. 2018).
Because such false alarm rates can impair checkpoint efficiency (Sterchi and Schwaninger 2015), some countries still use EDSCB with on-screen alarm resolution. EDSCB false alarms can either occur on target-absent images not containing prohibited articles (genuine false alarms) or on images containing other prohibited articles such as guns or knives (miscues). The goal of the present study was to investigate whether the failure proneness of a decision support system affects operator performance during a visual inspection task. More specifically, we wanted to examine spill-over effects from a cueing system for one type of target (EDSCB for explosives) on human detection of different types of targets (guns and knives). Besides the theoretical relevance of the study, we also wanted to answer the practically relevant question whether miscues are a problem that needs to be considered when conducting EDSCB on-screen alarm resolution in primary screening.
The present study used highly realistic X-ray images in colour with professional airport security officers supported by EDSCB with a realistic automation reliability. The screeners had to detect prohibited articles (guns, knives, and IEDs). Screeners were tested in three experimental conditions: a false alarm prone condition where all EDSCB alarms were false alarms, a miscue prone condition where all EDSCB alarms were miscues, and a multiple failures condition where EDSCB false alarms and miscues appeared equally often.
The dependent variables were performance measures (hit rate, false alarm rate, response time), behavioural trust (operator compliance), and subjective trust perception. Basic research on visual search has shown that salient cues capture attention, which can result in lower detection of targets, particularly in difficult visual search tasks (Gaspelin, Ruthruff, and Lien 2016; Luck et al. 2021; Ruthruff et al. 2020). Therefore, we expected lowest performance in the miscue prone condition, because screeners get distracted by the miscue and visual search for prohibited articles in other areas of the X-ray image gets impaired. Because knives are more difficult to detect than guns (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009), we expected to find the negative effect of miscues for detecting knives and less, if at all, for detecting guns. Because well trained screeners achieve a high detection of IEDs (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009), we expected that screeners would comply more with correct EDSCB alarms than with incorrect EDSCB alarms. That is, they should recognise such automation failures.
|
Automated decision support systems are one type of automation that supports human operators by providing information about a particular state of the world (Mosier and Manzey 2020). Typical examples are alarm systems or detection systems (Rieger, Heilmann, and Manzey 2021) in security contexts (Goh, Wiegmann, and Madhavan 2005; Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020), process control (Chavaillaz, Wastell, and Sauer 2016, Chavaillaz et al. 2019; Chavaillaz and Sauer 2017; Sauer, Chavaillaz, and Wastell 2016), or medical screening tasks (Alberdi et al. 2004; Drew, Cunningham, and Wolfe 2012; Xiao et al. 2021). One function of decision support systems in visual inspection tasks is to provide direct cues that operators must resolve. Direct cues attract the attention of human operators by indicating the exact location of a possible target (Chavaillaz et al. 2018; Darnell and Lamy 2022; Posner, Snyder, and Davidson 1980)Such direct cues have two goals: First, they should support the operator’s search during a visual inspection task (Chavaillaz et al. 2018; Goh, Wiegmann, and Madhavan 2005; Wiegmann et al. 2006) by guiding attention towards the cued area (Wolfe 2021); and second, they should improve the operator’s decision making regarding the detection of critical events or targets (Wickens et al. 2015). However, the reliability of most decision support systems is imperfect, and system designers must decide how to set their decision criterion.
Usually, the priority is to set a more liberal decision criterion (Sorkin and Woods 1985) to detect more targets (automation hits). But a liberal decision criterion comes at the cost of producing more alarms where no target is present (automation false alarms) or producing automation miscues. Based on previous studies (Chavaillaz et al. 2020; Goh, Wiegmann, and Madhavan 2005), we define automation miscues as alarms in the wrong location when a target is located elsewhere in the image. Because of the decision support system’s imperfect reliability, operators should assess the validity of its alarms and act appropriately. Such behaviour would improve human–machine system performance (Meyer and Kuchar 2021). Unfortunately, operators often do not react optimally to the decision support system’s presence, resulting in insufficient human–machine system performance (Bartlett and McCarley 2017, 2019; Boskemper, Bartlett, and McCarley 2022). Although direct cues can improve human–machine system performance (Chavaillaz et al. 2018), they can also have adverse effects when false alarms and miscues become frequent. It has been well-researched that operators will ignore automation alarms if they experience many false alarms, a so-called ‘cry wolf’ effect (Bliss, Gilson, and Deaton 1995; Dixon and Wickens 2006; Parasuraman and Wickens 2008; Zirk, Wiczorek, and Manzey 2020). Several studies have found this phenomenon and described it as a lack of operator compliance (Bliss, Gilson, and Deaton 1995; Huegli, Merks, and Schwaninger 2020, 2023; Parasuraman, Sheridan, and Wickens 2000; Zirk, Wiczorek, and Manzey 2020). We define compliance operationally as the proportion of target-present responses given by operators on trials with automation alarms—regardless of whether true or false (Dixon and Wickens 2006; Manzey, Gérard, and Wiczorek 2014). Compliance has been described as a behavioural expression of trust in automation (Hoff and Bashir 2015; Lee and See 2004). Although there is some evidence that compliance somehow relates to subjective trust in automation (Avril et al. 2022; Chancey et al. 2017; Lee and Moray 1992), subjective trust and objective compliance do not always correlate strongly (Chavaillaz, Wastell, and Sauer 2016, Chavaillaz et al. 2019; Rovira, McGarry, and Parasuraman 2007). Eye-tracking research has shown that the marked areas are the ones that are mainly inspected by operators (Drew, Cunningham, and Wolfe 2012), which implies strong attentional guidance (Wolfe 2021) by direct cues. However, if the marked area is a miscue, this can become a problem if operators get distracted by it and visual search for prohibited articles in other areas of the X-ray image is impaired. Alberdi et al. (2004) and Kunar et al. (2017) analysed the performance data of radiologists detecting breast cancer cells with the help of an automated decision support that provided direct cues. Radiologists benefitted from the alarms when they located cancer cells correctly, but less when miscues were given.
Goh, Wiegmann, and Madhavan (2005) tested student participants in a simulated baggage X-ray screening task in which they had to detect knives in greyscale images with the help of a decision support system. Participants benefitted from direct cues, especially when automation reliability was high, but they missed most of the targets when miscues were present. We extend this research by using highly realistic colourised X-ray images with professional airport security officers supported by an explosive detection system (EDSCB) for cabin baggage screening. Moreover, whereas previous studies investigated whether miscues impair the detection of the same type of target located elsewhere in the X-ray image, we investigated spill-over effects from a cueing system for one type of target (EDSCB for explosive) on detection of different types of targets (guns and knives). X-ray baggage screening at airports aims to prevent passengers from bringing prohibited articles (e.g. guns, knives, bombs) onto an aircraft (Harris 2002; Petrozziello and Jordanov 2019). Bombs are the most dangerous prohibited articles in passenger baggage and are technically called improvised explosive devices (IEDs). Screeners can detect IEDs when they are trained well (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009; Schuster et al. 2013; Schwaninger and Hofer 2004) and when they are supported with explosives detection systems for cabin baggage (EDSCB) screening (Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020, 2023). EDSCB support screeners by providing direct cues in areas in the X-ray image that might contain explosive material. When the EDSCB is used as a decision support system in primary screening, the screeners conduct on-screen alarm resolution. That is, the screeners visually inspect the X-ray image and decide whether the EDSCB alarm is correct or incorrect (Hättenschwiler et al. 2018;Schwaninger and Merks 2019). When the screeners decide that the bag could contain a prohibited article, the bag is sent to secondary screening where another screener inspects the bag by applying explosives trace detection or manual baggage opening (Sterchi and Schwaninger 2015). An alternative to on-screen alarm resolution in primary screening is automated decision: Bags on which EDSCB has alarmed are sent directly to secondary screening for further inspection (Hättenschwiler et al. 2018; Huegli, Merks, and Schwaninger 2020). State-of-the-art multi-view EDSCB technologies (EDSCB of Standard C2) achieve automation hit rates in the range of 75%–90% and automation false alarm rates of 6%–20% (Hättenschwiler et al. 2018).
Because such false alarm rates can impair checkpoint efficiency (Sterchi and Schwaninger 2015), some countries still use EDSCB with on-screen alarm resolution. EDSCB false alarms can either occur on target-absent images not containing prohibited articles (genuine false alarms) or on images containing other prohibited articles such as guns or knives (miscues). The goal of the present study was to investigate whether the failure proneness of a decision support system affects operator performance during a visual inspection task. More specifically, we wanted to examine spill-over effects from a cueing system for one type of target (EDSCB for explosives) on human detection of different types of targets (guns and knives). Besides the theoretical relevance of the study, we also wanted to answer the practically relevant question whether miscues are a problem that needs to be considered when conducting EDSCB on-screen alarm resolution in primary screening.
The present study used highly realistic X-ray images in colour with professional airport security officers supported by EDSCB with a realistic automation reliability. The screeners had to detect prohibited articles (guns, knives, and IEDs). Screeners were tested in three experimental conditions: a false alarm prone condition where all EDSCB alarms were false alarms, a miscue prone condition where all EDSCB alarms were miscues, and a multiple failures condition where EDSCB false alarms and miscues appeared equally often.
The dependent variables were performance measures (hit rate, false alarm rate, response time), behavioural trust (operator compliance), and subjective trust perception. Basic research on visual search has shown that salient cues capture attention, which can result in lower detection of targets, particularly in difficult visual search tasks (Gaspelin, Ruthruff, and Lien 2016; Luck et al. 2021; Ruthruff et al. 2020). Therefore, we expected lowest performance in the miscue prone condition, because screeners get distracted by the miscue and visual search for prohibited articles in other areas of the X-ray image gets impaired. Because knives are more difficult to detect than guns (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009), we expected to find the negative effect of miscues for detecting knives and less, if at all, for detecting guns. Because well trained screeners achieve a high detection of IEDs (Halbherr et al. 2013; Koller et al. 2008, Koller, Drury, and Schwaninger 2009), we expected that screeners would comply more with correct EDSCB alarms than with incorrect EDSCB alarms. That is, they should recognise such automation failures.
|
考点1 :“ visual search tasks ”推荐译为"视觉搜索任务 "
考点2:" direct cues "需要译为"直接提示"
考点3:" hit rates " 推荐译为"击中率"
考点4:"false alarm rates "推荐译为 "虚报率 "
考点5:" validity "推荐译为"效度"
考点6:" Eye-tracking research "应译为"眼动追踪 "
考点7:" secondary screening"推荐译为"二次扫描 "
考点8:" multi-view"推荐译为"多视图 "
考点9:"response time"推荐译为"反应时 "
考点10:"miscues"推荐译为" 错误线索"
|
b6477
|
学术论文
|
社会科学
|
135
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
2.相关工作
装配精度预测的准确性与效率取决于三大核心要素:表面形状表征的保真度、几何量-物理量融合偏差建模的完备性、以及预测方法的计算效能。本节从上述维度系统评述现有研究进展与局限。
2.1零件表面形状构建
(1)公差表达模型
公差表达模型是计算机辅助设计系统中用于描述零件几何尺寸与公差信息的数学工具,旨在通过工程语义来界定公差域的边界及变动要素,为装配精度预测提供基础数据支持。自20世纪80年代以来,学者们提出了多种公差表达模型,如工艺和拓扑相关曲面模型、矩阵模型、矢量环模型、公差映射图模型、雅可比-旋量模型、GapSpace模型等。然而,这些模型多集中于尺寸、位置与方向的公差描述,通常简化或忽略了零件表面形状的表征。在复杂的精密装配中,这一缺陷会导致装配表面形状误差的几何分布特性无法准确捕捉,从而影响装配精度预测的准确性。
鉴于实际表面形状对装配精度的重要影响,Ballu等人提出了肤面模型,从物理几何角度出发,构建了一个能反映零件制造误差的产品设计模型,提供了一种设计与制造阶段几何形状一致性表达的方法,进而提高了装配精度预测的准确性。本文也采用这一肤面模型,通过高效融合虚拟模型与实测数据,构建零件的实际表面形貌。
(2)实际表面构建方法
针对零件实际表面的构建,学者们开展了大量研究,方法可分为两类:第一类,基于数字空间的模拟数据,通过函数式方法表征实际形貌。例如,Yan等人提出了一种基于有限元分析的网格变形方法,能够生成与实际零件形状偏差一致的肤面模型;Xue等人基于离散余弦变换方法,结合虚拟样本生成与代理模型,实现了航空结构件装配偏差的快速响应与准确预测。尽管这些方法提高了仿真精度,但仍与实际工件表面特征存在差距,难以完全再现实际零件表面。Huang等人利用模态分解方法识别和预测增材制造零件的几何偏差,通过将复杂的几何形状偏差分解为多个独立的缺陷模式,从而能够更准确地描述和预测增材制造零件的形状偏差。
第二类,基于物理空间的实测数据,采用多尺度分析实现滤波与重构。例如,Luo等人通过离散化点集描述形状偏差,并利用点云配准技术将物理空间中的零件表面映射到虚拟空间,从而解决了虚实同步问题。Sun等人利用小波变换方法预处理测量的表面数据,滤除噪声、粗糙度等不影响装配精度的因素,仅保留对配合表面影响较大的宏观成分。
Zhang等针对加工零件的粗糙表面,提出了一种融合了分形理论、Weibull分布和遗传算法的创新方法,旨在刻画非高斯粗糙表面的特定偏度和峰度。通过优化遗传算法的参数生成尺度独立且更实际的粗糙表面模型,为工程接触力学的研究提供了一个有效且精确的工具。尽管这些方法能较好地再现实际表面形貌,但在大型复杂零件的应用中,由于点云数据的庞大规模,仍然存在计算量大、同步困难的问题。考虑到表面形状的建模效率问题,Haitjema提出了一种结合离散勒让德多项式和离散傅里叶变换的创新方法,通过将实测数据分解为不同阶数的多项式系数,实现了零件表面形状的快速重构。
综上所述,现有的公差表达与表面重构方法要么依赖全局曲面拟合导致高维点云运算开销巨大,要么在多尺度统计特性与几何连续性之间难以兼顾,难以满足大型薄壁碳纤维增强复合材料构件实时更新、高精度描述和大规模批量三者的需求。因此,本研究引入基于几何协方差的点云直算肤面模型,以期在保证统计一致性与空间连续性的同时,实现与现场测量数据的无缝对接,从而为后续装配偏差预测提供高效且可扩展的表面形貌基础。
2.2装配偏差建模
装配偏差传递模型的核心在于揭示多源偏差在装配链中的累积与融合机制。针对CFRP构件装配流程,偏差主要来源于几何定位偏差与物理变形偏差。这两类偏差通过非线性传递与交互作用,共同影响装配系统的几何约束场(体现为定位精度的偏移)和物理交互场(例如装配接触力场、位移约束场)。特别地,CFRP薄壁结构的层级装配过程(零件级—组件级—部件级)呈现出较高的误差累积效应:初始制造偏差、定位系统偏差以及载荷诱导变形的相互作用,经过多阶段传递后,最终导致装配体几何形态特征的非确定性分布。
基于几何量的装配偏差传递模型包括尺寸链模型和确定性定位模型。例如,Liu等人结合肤面模型与雅可比模型,提出了一种考虑实际表面形状的装配偏差传递分析模型;Iaccarino等人则通过结合统计预测与确定性装配优化了航空结构装配中的精度。然而,这些模型多基于刚性假设,主要关注几何变动量,缺乏对装配过程中的物理因素的全面考虑。
在CFRP薄壁结构装配过程中,考虑到多约束、装配载荷等物理特性,变形效应不可忽视。因此,必须将物理因素纳入装配偏差传递模型。目前,主流的物理因素建模方法包括有限元法、影响系数法和混合方法。有限元法通过对装配体进行建模,赋予材料属性、边界条件等,进行力学分析,能够有效处理复杂装配体的非理想状态。然而,有限元法在计算效率上存在一定局限,尤其在处理大规模结构时,可能无法满足工程应用中的实时响应需求。例如,Camelio等人提出了一种结合主成分分析和有限元分析的方法,通过分析零件的几何协方差,并考虑零件装配过程中的变形与回弹,从而提高柔性零件装配偏差传递分析的计算效率。影响系数法则通过预先计算并存储影响系数矩阵,提高了计算效率,特别适用于柔性装配体的变形和应力分布分析。然而,该方法在面对多源偏差较多的装配过程中,可能在建模效率上存在不足。例如,Polini等人利用影响系数法评估柔性装配体中的偏差和应力分布,并通过不同案例对比该方法的模拟时间和结果准确性。但由于该方法的模型参数是通过有限元分析数据回归拟合的,当装配步骤和偏差源较多时,其建模效率仍然不足,导致在复杂装配场景下存在一定的局限性。此外,现代控制理论中的状态空间模型能够有效处理多工位装配中的偏差传递与累积效应。然而,该模型假设偏差传递是线性关系,这可能未能准确捕捉装配偏差传递中的非线性特征。Zhang等人采用状态空间模型对复合材料单工位装配过程中的偏差传递进行了分析,并结合有限元法评估了零件制造误差和工装定位误差对装配偏差的影响。然而,由于假设各工位之间的多源偏差传递为线性关系,这一方法在处理复杂装配任务时存在局限,未能全面捕捉装配偏差传递中的非线性特征。此外,在同时考虑零件的几何变动与物理因素时,映射关系会变得更为繁杂,不能将其简单视为多源误差的线性传递过程。
从尺寸链、影响系数法到状态空间模型,常规装配偏差传递方法在几何定位和静态物理分析上各具优势,却因刚性假设或线性叠加限制,对多源非线性耦合的装配偏差场描述不足。有限元法虽能捕捉非线性物理效应,却在计算效率上难以实现秒级响应。由此可见,亟需一种兼顾几何-物理复合建模精度与快速响应能力的端到端预测框架,以支持高精度装配公差的动态决策与闭环优化。
|
2.相关工作
装配精度预测的准确性与效率取决于三大核心要素:表面形状表征的保真度、几何量-物理量融合偏差建模的完备性、以及预测方法的计算效能。本节从上述维度系统评述现有研究进展与局限。
2.1零件表面形状构建
(1)公差表达模型
公差表达模型是计算机辅助设计系统中用于描述零件几何尺寸与公差信息的数学工具,旨在通过工程语义来界定公差域的边界及变动要素,为装配精度预测提供基础数据支持。自20世纪80年代以来,学者们提出了多种公差表达模型,如工艺和拓扑相关曲面模型、矩阵模型、矢量环模型、公差映射图模型、雅可比-旋量模型、GapSpace模型等。然而,这些模型多集中于尺寸、位置与方向的公差描述,通常简化或忽略了零件表面形状的表征。在复杂的精密装配中,这一缺陷会导致装配表面形状误差的几何分布特性无法准确捕捉,从而影响装配精度预测的准确性。
鉴于实际表面形状对装配精度的重要影响,Ballu等人提出了肤面模型,从物理几何角度出发,构建了一个能反映零件制造误差的产品设计模型,提供了一种设计与制造阶段几何形状一致性表达的方法,进而提高了装配精度预测的准确性。本文也采用这一肤面模型,通过高效融合虚拟模型与实测数据,构建零件的实际表面形貌。
(2)实际表面构建方法
针对零件实际表面的构建,学者们开展了大量研究,方法可分为两类:第一类,基于数字空间的模拟数据,通过函数式方法表征实际形貌。例如,Yan等人提出了一种基于有限元分析的网格变形方法,能够生成与实际零件形状偏差一致的肤面模型;Xue等人基于离散余弦变换方法,结合虚拟样本生成与代理模型,实现了航空结构件装配偏差的快速响应与准确预测。尽管这些方法提高了仿真精度,但仍与实际工件表面特征存在差距,难以完全再现实际零件表面。Huang等人利用模态分解方法识别和预测增材制造零件的几何偏差,通过将复杂的几何形状偏差分解为多个独立的缺陷模式,从而能够更准确地描述和预测增材制造零件的形状偏差。
第二类,基于物理空间的实测数据,采用多尺度分析实现滤波与重构。例如,Luo等人通过离散化点集描述形状偏差,并利用点云配准技术将物理空间中的零件表面映射到虚拟空间,从而解决了虚实同步问题。Sun等人利用小波变换方法预处理测量的表面数据,滤除噪声、粗糙度等不影响装配精度的因素,仅保留对配合表面影响较大的宏观成分。
Zhang等针对加工零件的粗糙表面,提出了一种融合了分形理论、Weibull分布和遗传算法的创新方法,旨在刻画非高斯粗糙表面的特定偏度和峰度。通过优化遗传算法的参数生成尺度独立且更实际的粗糙表面模型,为工程接触力学的研究提供了一个有效且精确的工具。尽管这些方法能较好地再现实际表面形貌,但在大型复杂零件的应用中,由于点云数据的庞大规模,仍然存在计算量大、同步困难的问题。考虑到表面形状的建模效率问题,Haitjema提出了一种结合离散勒让德多项式和离散傅里叶变换的创新方法,通过将实测数据分解为不同阶数的多项式系数,实现了零件表面形状的快速重构。
综上所述,现有的公差表达与表面重构方法要么依赖全局曲面拟合导致高维点云运算开销巨大,要么在多尺度统计特性与几何连续性之间难以兼顾,难以满足大型薄壁碳纤维增强复合材料构件实时更新、高精度描述和大规模批量三者的需求。因此,本研究引入基于几何协方差的点云直算肤面模型,以期在保证统计一致性与空间连续性的同时,实现与现场测量数据的无缝对接,从而为后续装配偏差预测提供高效且可扩展的表面形貌基础。
2.2装配偏差建模
装配偏差传递模型的核心在于揭示多源偏差在装配链中的累积与融合机制。针对CFRP构件装配流程,偏差主要来源于几何定位偏差与物理变形偏差。这两类偏差通过非线性传递与交互作用,共同影响装配系统的几何约束场(体现为定位精度的偏移)和物理交互场(例如装配接触力场、位移约束场)。特别地,CFRP薄壁结构的层级装配过程(零件级—组件级—部件级)呈现出较高的误差累积效应:初始制造偏差、定位系统偏差以及载荷诱导变形的相互作用,经过多阶段传递后,最终导致装配体几何形态特征的非确定性分布。
基于几何量的装配偏差传递模型包括尺寸链模型和确定性定位模型。例如,Liu等人结合肤面模型与雅可比模型,提出了一种考虑实际表面形状的装配偏差传递分析模型;Iaccarino等人则通过结合统计预测与确定性装配优化了航空结构装配中的精度。然而,这些模型多基于刚性假设,主要关注几何变动量,缺乏对装配过程中的物理因素的全面考虑。
在CFRP薄壁结构装配过程中,考虑到多约束、装配载荷等物理特性,变形效应不可忽视。因此,必须将物理因素纳入装配偏差传递模型。目前,主流的物理因素建模方法包括有限元法、影响系数法和混合方法。有限元法通过对装配体进行建模,赋予材料属性、边界条件等,进行力学分析,能够有效处理复杂装配体的非理想状态。然而,有限元法在计算效率上存在一定局限,尤其在处理大规模结构时,可能无法满足工程应用中的实时响应需求。例如,Camelio等人提出了一种结合主成分分析和有限元分析的方法,通过分析零件的几何协方差,并考虑零件装配过程中的变形与回弹,从而提高柔性零件装配偏差传递分析的计算效率。影响系数法则通过预先计算并存储影响系数矩阵,提高了计算效率,特别适用于柔性装配体的变形和应力分布分析。然而,该方法在面对多源偏差较多的装配过程中,可能在建模效率上存在不足。例如,Polini等人利用影响系数法评估柔性装配体中的偏差和应力分布,并通过不同案例对比该方法的模拟时间和结果准确性。但由于该方法的模型参数是通过有限元分析数据回归拟合的,当装配步骤和偏差源较多时,其建模效率仍然不足,导致在复杂装配场景下存在一定的局限性。此外,现代控制理论中的状态空间模型能够有效处理多工位装配中的偏差传递与累积效应。然而,该模型假设偏差传递是线性关系,这可能未能准确捕捉装配偏差传递中的非线性特征。Zhang等人采用状态空间模型对复合材料单工位装配过程中的偏差传递进行了分析,并结合有限元法评估了零件制造误差和工装定位误差对装配偏差的影响。然而,由于假设各工位之间的多源偏差传递为线性关系,这一方法在处理复杂装配任务时存在局限,未能全面捕捉装配偏差传递中的非线性特征。此外,在同时考虑零件的几何变动与物理因素时,映射关系会变得更为繁杂,不能将其简单视为多源误差的线性传递过程。
从尺寸链、影响系数法到状态空间模型,常规装配偏差传递方法在几何定位和静态物理分析上各具优势,却因刚性假设或线性叠加限制,对多源非线性耦合的装配偏差场描述不足。有限元法虽能捕捉非线性物理效应,却在计算效率上难以实现秒级响应。由此可见,亟需一种兼顾几何-物理复合建模精度与快速响应能力的端到端预测框架,以支持高精度装配公差的动态决策与闭环优化。
|
考点1:“工艺和拓扑相关曲面模型” 推荐翻译为“Technologically and topologically related surfaces, TTRS”;
考点2:“公差映射图模型” 必须译为“Tolerance-Map models”;
考点3:“雅可比-旋量模型” 必须译为“Jacobian-Torsor models”;
考点4:“碳纤维增强型复合材料” 必须译为“Carbon Fiber Reinforced Plastics, CFRP”;
考点5:“零件-组件-部件” 推荐翻译为“part-level -> sub-assembly-level -> component-level”;
考点6:“尺寸链”推荐翻译为“dimension chain”;
考点7:“确定性装配”推荐翻译为“determinant assembly”;
考点8:“有限元法”推荐翻译为“Finite Element Method ,FEM”;
考点9:“影响系数法”必须译为“Method of Influence Coefficients,MIC”;
|
b6b70
|
学术论文
|
应用学科
|
119
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
This review evaluates the paper "A Self-Aligned Elevated Source/Drain MOSFET", which presents an innovative CMOS fabrication process featuring self-aligned lightly doped drain (LDD) and channel implantation. The proposed method simplifies the manufacturing process by using a single selective silicon deposition step to define both the epitaxial source/drain and polycrystalline gate regions. The process demonstrates excellent short-channel device characteristics, reduced leakage currents, and minimal series resistance, making it suitable for high-performance submicron CMOS applications. While the paper is well-structured and provides comprehensive experimental validation, it lacks a detailed discussion on limitations, scalability to smaller technology nodes, and long-term reliability. A deeper exploration of comparative benchmarks and integration with emerging CMOS technologies would enhance its impact. Overall, the work offers valuable insights into addressing fabrication challenges in advanced semiconductor devices.
The paper "A Self-Aligned Elevated Source/Drain MOSFET" presents an innovative fabrication process for MOSFET devices that integrates elevated source/drain (ESD) structures with self-aligned lightly doped drain (LDD) and channel implantation. This process is distinguished by its use of a single selective silicon deposition step to simultaneously define the epitaxial source/drain and polycrystalline gate regions, streamlining fabrication and reducing complexity compared to conventional methods. A single sidewall spacer is employed to achieve both LDD and salicide definition, ensuring precise alignment of the LDD regions with heavily doped channel regions, thereby minimizing dopant compensation effects that typically degrade device performance.
The authors provide a detailed description of the process, supported by experimental results and SEM photomicrographs. The fabricated devices exhibit excellent short-channel behavior, low junction leakage, and minimal series resistance, making them suitable for high-performance submicron CMOS applications. Electrical characteristics, such as threshold voltage, subthreshold slope, and I-V behavior, are comparable to or better than conventional MOSFETs. The paper highlights the advantages of this approach, including its ability to simplify the manufacturing process while improving device performance and reducing leakage currents.
The authors conclude that their self-aligned elevated source/drain MOSFET process is an effective solution to the challenges posed by short-channel effects in submicron CMOS technology. This work provides a significant contribution to semiconductor device fabrication by demonstrating how innovative process integration can enhance performance while addressing practical manufacturing concerns.
The paper introduces a novel and streamlined fabrication process for MOSFETs, leveraging a single selective silicon deposition step to simultaneously define the source/drain and gate regions. This integration reduces the number of processing steps compared to conventional elevated source/drain (ESD) methods, which typically require separate deposition for the gate and source/drain. By doing so, the proposed approach not only simplifies the fabrication process but also minimizes alignment errors between different regions, which can be a major source of device variability. Furthermore, the self-alignment of the lightly doped drain (LDD) regions with heavily doped channel regions eliminates dopant compensation effects, a common issue that degrades device performance. This innovative integration demonstrates a profound understanding of the challenges in advanced CMOS technology and proposes an effective, scalable solution.
The paper emphasizes the superior electrical characteristics of the proposed MOSFET design. The devices fabricated using this process exhibit:
Excellent short-channel behavior, with low leakage currents and reduced short-channel effects.
High threshold voltage stability, supported by a well-optimized channel implantation process.
Minimal series resistance, achieved by confining source/drain implant damage to the elevated epitaxial silicon region and employing salicidation.
These results suggest that the process can effectively address the challenges of submicron CMOS technology, which are critical for achieving high performance in modern electronics. The experimental data validate these claims, with measurable improvements in subthreshold slopes, I-V characteristics, and junction leakage over conventional designs.
The proposed process is highly relevant to the semiconductor industry, as it directly addresses the key challenges in submicron CMOS technology, such as short-channel effects, leakage currents, and scalability. The integration of elevated source/drain structures with self-aligned LDD and channel implantation not only enhances device performance but also simplifies the back-end metallization process. This streamlined approach could potentially reduce manufacturing costs and increase production yield, making it attractive for industrial adoption. Furthermore, the process is compatible with existing CMOS fabrication techniques, which ensures feasibility for large-scale implementation without requiring extensive modifications to current manufacturing infrastructure.
The authors support their claims with extensive experimental evidence, including:
SEM photomicrographs, which visually confirm the precise definition of device structures and the integrity of the fabrication process.
Electrical measurements, such as threshold voltage, subthreshold slope, and leakage currents, which provide quantitative validation of the device’s performance.
Process flow diagrams, which offer clarity and transparency about the fabrication steps.
This level of detail not only enhances the credibility of the proposed method but also provides valuable insights for other researchers or engineers seeking to replicate or build upon the work.
The process design prioritizes simplicity and scalability, addressing the need for manufacturing efficiency in advanced CMOS technology. The use of a single selective silicon deposition step and a single sidewall spacer to define both LDD and salicide regions reduces process complexity, which is critical for maintaining high yields in semiconductor fabrication. The elimination of additional deposition steps for separate regions minimizes potential misalignments and improves device reliability. These features make the process inherently scalable for submicron nodes, laying the groundwork for its applicability in the rapidly advancing semiconductor industry.
The paper is a significant contribution to the field of semiconductor fabrication, presenting a highly innovative and practically viable solution to the challenges in submicron CMOS technology. Its emphasis on performance improvement, manufacturing simplicity, and industry relevance ensures its applicability in both academic research and industrial settings. By addressing critical issues like short-channel effects and leakage currents, the work provides a pathway for advancing CMOS technology into the next generation of high-performance, low-power electronics.
The paper presents a well-structured and innovative fabrication process, but there are several areas where it could improve to provide a more comprehensive and impactful contribution.
Firstly, while the proposed process appears effective, the paper lacks a thorough discussion of its potential limitations or challenges. Manufacturing processes in the semiconductor industry often face hurdles such as yield issues, which can significantly affect the economic viability of a new approach. The authors could have addressed whether their method might encounter problems in maintaining high yields, especially given the complexity of selective silicon deposition. Similarly, scalability to mass production is critical for any fabrication technique, and a discussion on how this process might perform under industrial-scale conditions is notably absent. Moreover, as modern CMOS technologies increasingly adopt high-k/metal gate (HKMG) stacks for enhanced performance at smaller nodes, it is unclear whether the proposed process is compatible with such advanced materials and architectures. Addressing these aspects would have provided a more balanced and practical perspective on the applicability of their approach.
Secondly, the paper’s claims of superior performance could be strengthened with a more rigorous comparative analysis. While the authors highlight the advantages of their process, they do not provide detailed quantitative benchmarks against competing technologies. For instance, direct comparisons of parameters such as leakage current, threshold voltage stability, or process variability with conventional elevated source/drain methods would have offered stronger evidence of the process's relative benefits. Without such comparisons, it is challenging to assess the true significance of the proposed innovation in the broader context of semiconductor fabrication.
Another area for improvement is the lack of discussion on the long-term reliability of the devices fabricated using this process. Semiconductor devices are subject to various reliability challenges over time, such as thermal stability, stress-induced degradation, and process-induced variability. For instance, the thermal conditions used during the selective silicon deposition and salicidation steps could introduce stress or defects that affect the device's performance over extended periods. The authors do not address whether these factors have been considered or how they might impact the practical adoption of the technology. Including such an analysis would have enhanced the paper’s credibility and provided valuable insights into the robustness of the proposed approach.
Finally, while the paper focuses on submicron dimensions, it does not explore the scalability of the process to more advanced nodes, such as those below 45 nm. As the industry continues to push towards smaller feature sizes, it is crucial to evaluate whether the process can maintain its advantages under the constraints of extreme miniaturization. Challenges such as increased variability, higher leakage, and the need for even more precise alignment could affect the applicability of this method. A discussion on how the process could be adapted or extended for future nodes would have made the paper more forward-looking and aligned with the ongoing trends in semiconductor technology.
In conclusion, while the paper makes a significant contribution by proposing an innovative and practical fabrication process, it could benefit from a deeper exploration of its challenges, comparative performance, long-term reliability, and scalability. Addressing these areas would not only strengthen the work but also provide a clearer roadmap for its integration into future CMOS technologies.
The paper presents an innovative and streamlined fabrication process for elevated source/drain MOSFETs, integrating a single selective silicon deposition step to define both source/drain and gate regions. This approach simplifies manufacturing, reduces alignment errors, and mitigates dopant compensation effects, leading to improved short-channel behavior, low leakage currents, and minimal series resistance. Supported by detailed experimental data and SEM imaging, the paper demonstrates strong technical innovation and practical relevance.
However, the work has some notable gaps. It lacks a thorough discussion of potential challenges, such as yield issues and scalability to industrial-scale production. Comparisons with existing technologies are insufficient, with limited quantitative benchmarks to substantiate claims of superior performance. Furthermore, the paper does not address the long-term reliability of the devices or their compatibility with advanced materials and smaller nodes, critical for modern CMOS scaling.
Overall, while the paper is a significant contribution with a well-supported methodology, a deeper exploration of these limitations would enhance its practical impact and relevance to advancing semiconductor technologies.
|
This review evaluates the paper "A Self-Aligned Elevated Source/Drain MOSFET", which presents an innovative CMOS fabrication process featuring self-aligned lightly doped drain (LDD) and channel implantation. The proposed method simplifies the manufacturing process by using a single selective silicon deposition step to define both the epitaxial source/drain and polycrystalline gate regions. The process demonstrates excellent short-channel device characteristics, reduced leakage currents, and minimal series resistance, making it suitable for high-performance submicron CMOS applications. While the paper is well-structured and provides comprehensive experimental validation, it lacks a detailed discussion on limitations, scalability to smaller technology nodes, and long-term reliability. A deeper exploration of comparative benchmarks and integration with emerging CMOS technologies would enhance its impact. Overall, the work offers valuable insights into addressing fabrication challenges in advanced semiconductor devices.
The paper "A Self-Aligned Elevated Source/Drain MOSFET" presents an innovative fabrication process for MOSFET devices that integrates elevated source/drain (ESD) structures with self-aligned lightly doped drain (LDD) and channel implantation. This process is distinguished by its use of a single selective silicon deposition step to simultaneously define the epitaxial source/drain and polycrystalline gate regions, streamlining fabrication and reducing complexity compared to conventional methods. A single sidewall spacer is employed to achieve both LDD and salicide definition, ensuring precise alignment of the LDD regions with heavily doped channel regions, thereby minimizing dopant compensation effects that typically degrade device performance.
The authors provide a detailed description of the process, supported by experimental results and SEM photomicrographs. The fabricated devices exhibit excellent short-channel behavior, low junction leakage, and minimal series resistance, making them suitable for high-performance submicron CMOS applications. Electrical characteristics, such as threshold voltage, subthreshold slope, and I-V behavior, are comparable to or better than conventional MOSFETs. The paper highlights the advantages of this approach, including its ability to simplify the manufacturing process while improving device performance and reducing leakage currents.
The authors conclude that their self-aligned elevated source/drain MOSFET process is an effective solution to the challenges posed by short-channel effects in submicron CMOS technology. This work provides a significant contribution to semiconductor device fabrication by demonstrating how innovative process integration can enhance performance while addressing practical manufacturing concerns.
The paper introduces a novel and streamlined fabrication process for MOSFETs, leveraging a single selective silicon deposition step to simultaneously define the source/drain and gate regions. This integration reduces the number of processing steps compared to conventional elevated source/drain (ESD) methods, which typically require separate deposition for the gate and source/drain. By doing so, the proposed approach not only simplifies the fabrication process but also minimizes alignment errors between different regions, which can be a major source of device variability. Furthermore, the self-alignment of the lightly doped drain (LDD) regions with heavily doped channel regions eliminates dopant compensation effects, a common issue that degrades device performance. This innovative integration demonstrates a profound understanding of the challenges in advanced CMOS technology and proposes an effective, scalable solution.
The paper emphasizes the superior electrical characteristics of the proposed MOSFET design. The devices fabricated using this process exhibit:
Excellent short-channel behavior, with low leakage currents and reduced short-channel effects.
High threshold voltage stability, supported by a well-optimized channel implantation process.
Minimal series resistance, achieved by confining source/drain implant damage to the elevated epitaxial silicon region and employing salicidation.
These results suggest that the process can effectively address the challenges of submicron CMOS technology, which are critical for achieving high performance in modern electronics. The experimental data validate these claims, with measurable improvements in subthreshold slopes, I-V characteristics, and junction leakage over conventional designs.
The proposed process is highly relevant to the semiconductor industry, as it directly addresses the key challenges in submicron CMOS technology, such as short-channel effects, leakage currents, and scalability. The integration of elevated source/drain structures with self-aligned LDD and channel implantation not only enhances device performance but also simplifies the back-end metallization process. This streamlined approach could potentially reduce manufacturing costs and increase production yield, making it attractive for industrial adoption. Furthermore, the process is compatible with existing CMOS fabrication techniques, which ensures feasibility for large-scale implementation without requiring extensive modifications to current manufacturing infrastructure.
The authors support their claims with extensive experimental evidence, including:
SEM photomicrographs, which visually confirm the precise definition of device structures and the integrity of the fabrication process.
Electrical measurements, such as threshold voltage, subthreshold slope, and leakage currents, which provide quantitative validation of the device’s performance.
Process flow diagrams, which offer clarity and transparency about the fabrication steps.
This level of detail not only enhances the credibility of the proposed method but also provides valuable insights for other researchers or engineers seeking to replicate or build upon the work.
The process design prioritizes simplicity and scalability, addressing the need for manufacturing efficiency in advanced CMOS technology. The use of a single selective silicon deposition step and a single sidewall spacer to define both LDD and salicide regions reduces process complexity, which is critical for maintaining high yields in semiconductor fabrication. The elimination of additional deposition steps for separate regions minimizes potential misalignments and improves device reliability. These features make the process inherently scalable for submicron nodes, laying the groundwork for its applicability in the rapidly advancing semiconductor industry.
The paper is a significant contribution to the field of semiconductor fabrication, presenting a highly innovative and practically viable solution to the challenges in submicron CMOS technology. Its emphasis on performance improvement, manufacturing simplicity, and industry relevance ensures its applicability in both academic research and industrial settings. By addressing critical issues like short-channel effects and leakage currents, the work provides a pathway for advancing CMOS technology into the next generation of high-performance, low-power electronics.
The paper presents a well-structured and innovative fabrication process, but there are several areas where it could improve to provide a more comprehensive and impactful contribution.
Firstly, while the proposed process appears effective, the paper lacks a thorough discussion of its potential limitations or challenges. Manufacturing processes in the semiconductor industry often face hurdles such as yield issues, which can significantly affect the economic viability of a new approach. The authors could have addressed whether their method might encounter problems in maintaining high yields, especially given the complexity of selective silicon deposition. Similarly, scalability to mass production is critical for any fabrication technique, and a discussion on how this process might perform under industrial-scale conditions is notably absent. Moreover, as modern CMOS technologies increasingly adopt high-k/metal gate (HKMG) stacks for enhanced performance at smaller nodes, it is unclear whether the proposed process is compatible with such advanced materials and architectures. Addressing these aspects would have provided a more balanced and practical perspective on the applicability of their approach.
Secondly, the paper’s claims of superior performance could be strengthened with a more rigorous comparative analysis. While the authors highlight the advantages of their process, they do not provide detailed quantitative benchmarks against competing technologies. For instance, direct comparisons of parameters such as leakage current, threshold voltage stability, or process variability with conventional elevated source/drain methods would have offered stronger evidence of the process's relative benefits. Without such comparisons, it is challenging to assess the true significance of the proposed innovation in the broader context of semiconductor fabrication.
Another area for improvement is the lack of discussion on the long-term reliability of the devices fabricated using this process. Semiconductor devices are subject to various reliability challenges over time, such as thermal stability, stress-induced degradation, and process-induced variability. For instance, the thermal conditions used during the selective silicon deposition and salicidation steps could introduce stress or defects that affect the device's performance over extended periods. The authors do not address whether these factors have been considered or how they might impact the practical adoption of the technology. Including such an analysis would have enhanced the paper’s credibility and provided valuable insights into the robustness of the proposed approach.
Finally, while the paper focuses on submicron dimensions, it does not explore the scalability of the process to more advanced nodes, such as those below 45 nm. As the industry continues to push towards smaller feature sizes, it is crucial to evaluate whether the process can maintain its advantages under the constraints of extreme miniaturization. Challenges such as increased variability, higher leakage, and the need for even more precise alignment could affect the applicability of this method. A discussion on how the process could be adapted or extended for future nodes would have made the paper more forward-looking and aligned with the ongoing trends in semiconductor technology.
In conclusion, while the paper makes a significant contribution by proposing an innovative and practical fabrication process, it could benefit from a deeper exploration of its challenges, comparative performance, long-term reliability, and scalability. Addressing these areas would not only strengthen the work but also provide a clearer roadmap for its integration into future CMOS technologies.
The paper presents an innovative and streamlined fabrication process for elevated source/drain MOSFETs, integrating a single selective silicon deposition step to define both source/drain and gate regions. This approach simplifies manufacturing, reduces alignment errors, and mitigates dopant compensation effects, leading to improved short-channel behavior, low leakage currents, and minimal series resistance. Supported by detailed experimental data and SEM imaging, the paper demonstrates strong technical innovation and practical relevance.
However, the work has some notable gaps. It lacks a thorough discussion of potential challenges, such as yield issues and scalability to industrial-scale production. Comparisons with existing technologies are insufficient, with limited quantitative benchmarks to substantiate claims of superior performance. Furthermore, the paper does not address the long-term reliability of the devices or their compatibility with advanced materials and smaller nodes, critical for modern CMOS scaling.
Overall, while the paper is a significant contribution with a well-supported methodology, a deeper exploration of these limitations would enhance its practical impact and relevance to advancing semiconductor technologies.
|
考点1:“self‑aligned elevated source/drain MOSFET”推荐译为“自对准抬高源/漏MOSFET”
考点2:“elevated source/drain; elevated S/D; ESD (structure)”推荐译为“抬高源/漏(ESD)”
考点3:“polycrystalline gate; polysilicon gate”推荐译为“多晶硅栅极”
考点4:“single sidewall spacer; sidewall spacer”推荐译为“单侧墙间隔层(spacer)”
考5:“subthreshold slope; subthreshold swing (SS)”推荐译为“次阈值摆幅(SS)”
考点6:“I–V characteristics; I–V behavior”推荐译为“I–V特性”
考点7:“selective epitaxy; selective silicon epitaxy”推荐译为“选择性外延”
考点8:“device variability; device‑to‑device variation”推荐译为“器件离散性”
考点9:“comparative benchmarks; benchmark comparisons”推荐译为“基准对比”
考点10:“salicide definition”推荐译为“硅化区域形貌”
考点11:“heavily doped source/drain; heavily doped extensions”推荐译为“重掺杂源/漏(扩展区)”
考点12:“industrial adoption”推荐译为“产业化采用”
考点13:“emerging CMOS technologies”推荐译为“新兴CMOS技术”
考点14: “CMOS fabrication process”推荐译为“CMOS制造工艺”
|
b730f
|
学术论文
|
自然科学
|
169
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
学问与趣味
前辈的学者常以学问的趣味启迪后生,因为他们自己实在是得到了学问的趣味,故不惜现身说法,诱导后学,使他们也在愉快的心情之下走进学问的大门。例如,梁任公先生就说过:“我是个主张趣味主义的人,倘若用化学化分‘梁启超’这件东西,把里头所含一种原素名叫‘趣味’的抽出来,只怕所剩下的仅有个零了。”任公先生注重趣味,学问甚是渊博,而并不存有任何外在的动机,只是“无所为而为”,故能有他那样的成就。一个人在学问上果能感觉到趣味,有时真会像是着了魔一般,真能废寝忘食,真能不知老之将至,苦苦钻研,锲而不舍,在学问上焉能不有收获?不过我尝想,以任公先生而论,他后期的著述如历史研究法,先秦政治思想史,以及有关墨子佛学陶渊明的作品,都可说是他的一点“趣味”在驱使着他,可是在他在年青的时候,从师受业,诵读典籍,那时节也全然是趣味么?作八股文,作试帖诗,莫非也是趣味么?我想未必。大概趣味云云,是指年长之后自动作学问之时而言,在年青时候为学问打根底之际恐怕不能过分重视趣味。学问没有根底,趣味也很难滋生。任公先生的学问之所以那样的博大精深,涉笔成趣,左右逢源,不能不说的一大部分得力于他的学问根底之打得坚固。
我尝见许多年青的朋友,聪明用功,成绩优异,而语文程度不足以达意,甚至写一封信亦难得通顺,问其故则曰其兴趣不在语文方面。又有一些位,执笔为文,斐然可诵,而视数理科目如仇讐,勉强才能及格,问其故则亦曰其兴趣不在数理方面,而且他们觉得某些科目没有趣味,便撇在一旁视如敝屣,怡然自得,振振有词,略无愧色,好像兴趣是最后的惟一的凭藉。这种态度的错误是很显然的。一个人在学校里,在求学的期间,应该奠定知识的根基。所谓根基,就是指普通的、基本的知识。在中学里,国文、英文、数学、物理、化学、史地、生物,都是人人应具备的基本知识。我们虽然不能个个都成为数学家、物理学家、化学家,但是我们不可不具备数学、物理、化学的基本知识,否则我们便不配做现代的公民。这些基本学科,我们必须在学校里专心学习,由教师的督责,由功课的压力,乃至由考试的强制,我们虽不情愿也须得接受。这些学科里面自然也有趣味,不过初学的人不能立刻发现,非下很多的苦功不能领略。我们这时候的求学,不是为趣味,而是为知识,为日后能体验趣味之时的准备。我们应该暂且把趣味压在下面,靠纪律把根基打好。没有纪律,光讲趣味,免不了要走向浅薄的路。并且,一个人在少年时代,兴趣还没有定型,若说对于某种功课没有兴趣,那常是无稽之谈,不可以为训的。其所以提不起兴趣,大半是由于懒。真确的兴趣,不是凭空可以发生的,是要由对该事物的深刻的认识和明了的理解为基础。一知半解,便谈不到趣味。譬如学画,必先由用笔用墨的基本方法学起,必先经过一个“格物”的阶段,等到对于形象色彩线条等等有了相当的认识,对于挥毫染翰有了相当的经验,那时候才能体会到画中的三昧,才能感到趣味。若仅是浅尝辄止,甚至躐等躁进,当然味同嚼蜡,自讨没趣。一个有中上天资的人,对于普通的、基本的文理科目,都同样的有学习的能力,绝不会本能的长于此而拙于彼。只有懒惰与任性,才能使一个人自甘暴弃的在“趣味”的掩护之下败退。
由小学到中学,所修习的无非是一些普通的基本知识。就是大学四年,所授课业也还是相当粗浅的学识。世人常称大学为“最高学府”,这名称易滋误解,好像过此以上即无学问可言。大学的研究所才是初步研究学问的所在,在这里作学问也只能算是粗涉藩篱,注重的是研究学问的方法与实习。学无止境,一生的时间都嫌太短,所以古人皓首穷经,头发白了还是在继续研究,不过在这样的研究中确是有浓厚的趣味。
在初学的阶段,由小学至大学,我们与其倡言趣味,不如偏重纪律。一个合理编列的课程表,犹如一个营养均衡的食谱,里面各个项目都是有益而必需的,不可偏废,不可再有选择。所谓选修科目也只是在某一项目范围内略有拣选余地而已。一个受过良好教育的人,犹如一个科班出身的戏剧演员,在坐科的时候他是要服从严格纪律的,唱念做打武把子都要认真学习,各种脚色的戏都要完全谙通,学成之后才能各按其趣味而单独发展其所长。学问要有根底,根底要打得平正坚实,以后永远受用。初学阶段的科目之最重要的莫过于语文与数学。语文是阅读达意的工具,国文不通便很难表达自己,外国文不通便很难吸取外来的新知。数学是思想条理之最好的训练。其他科目也各有各的用处,其重要性很难强分轩轾,例如体育,从另一方面看也是重要得无以复加。总之,我们在求学时代,应该暂且把趣味放在一旁,耐着性子接受教育的纪律,把自己锻炼成为坚实的材料。学问的趣味,留在将来慢慢享受一点也不迟。
|
学问与趣味
前辈的学者常以学问的趣味启迪后生,因为他们自己实在是得到了学问的趣味,故不惜现身说法,诱导后学,使他们也在愉快的心情之下走进学问的大门。例如,梁任公先生就说过:“我是个主张趣味主义的人,倘若用化学化分‘梁启超’这件东西,把里头所含一种原素名叫‘趣味’的抽出来,只怕所剩下的仅有个零了。”任公先生注重趣味,学问甚是渊博,而并不存有任何外在的动机,只是“无所为而为”,故能有他那样的成就。一个人在学问上果能感觉到趣味,有时真会像是着了魔一般,真能废寝忘食,真能不知老之将至,苦苦钻研,锲而不舍,在学问上焉能不有收获?不过我尝想,以任公先生而论,他后期的著述如历史研究法,先秦政治思想史,以及有关墨子佛学陶渊明的作品,都可说是他的一点“趣味”在驱使着他,可是在他在年青的时候,从师受业,诵读典籍,那时节也全然是趣味么?作八股文,作试帖诗,莫非也是趣味么?我想未必。大概趣味云云,是指年长之后自动作学问之时而言,在年青时候为学问打根底之际恐怕不能过分重视趣味。学问没有根底,趣味也很难滋生。任公先生的学问之所以那样的博大精深,涉笔成趣,左右逢源,不能不说的一大部分得力于他的学问根底之打得坚固。
我尝见许多年青的朋友,聪明用功,成绩优异,而语文程度不足以达意,甚至写一封信亦难得通顺,问其故则曰其兴趣不在语文方面。又有一些位,执笔为文,斐然可诵,而视数理科目如仇讐,勉强才能及格,问其故则亦曰其兴趣不在数理方面,而且他们觉得某些科目没有趣味,便撇在一旁视如敝屣,怡然自得,振振有词,略无愧色,好像兴趣是最后的惟一的凭藉。这种态度的错误是很显然的。一个人在学校里,在求学的期间,应该奠定知识的根基。所谓根基,就是指普通的、基本的知识。在中学里,国文、英文、数学、物理、化学、史地、生物,都是人人应具备的基本知识。我们虽然不能个个都成为数学家、物理学家、化学家,但是我们不可不具备数学、物理、化学的基本知识,否则我们便不配做现代的公民。这些基本学科,我们必须在学校里专心学习,由教师的督责,由功课的压力,乃至由考试的强制,我们虽不情愿也须得接受。这些学科里面自然也有趣味,不过初学的人不能立刻发现,非下很多的苦功不能领略。我们这时候的求学,不是为趣味,而是为知识,为日后能体验趣味之时的准备。我们应该暂且把趣味压在下面,靠纪律把根基打好。没有纪律,光讲趣味,免不了要走向浅薄的路。并且,一个人在少年时代,兴趣还没有定型,若说对于某种功课没有兴趣,那常是无稽之谈,不可以为训的。其所以提不起兴趣,大半是由于懒。真确的兴趣,不是凭空可以发生的,是要由对该事物的深刻的认识和明了的理解为基础。一知半解,便谈不到趣味。譬如学画,必先由用笔用墨的基本方法学起,必先经过一个“格物”的阶段,等到对于形象色彩线条等等有了相当的认识,对于挥毫染翰有了相当的经验,那时候才能体会到画中的三昧,才能感到趣味。若仅是浅尝辄止,甚至躐等躁进,当然味同嚼蜡,自讨没趣。一个有中上天资的人,对于普通的、基本的文理科目,都同样的有学习的能力,绝不会本能的长于此而拙于彼。只有懒惰与任性,才能使一个人自甘暴弃的在“趣味”的掩护之下败退。
由小学到中学,所修习的无非是一些普通的基本知识。就是大学四年,所授课业也还是相当粗浅的学识。世人常称大学为“最高学府”,这名称易滋误解,好像过此以上即无学问可言。大学的研究所才是初步研究学问的所在,在这里作学问也只能算是粗涉藩篱,注重的是研究学问的方法与实习。学无止境,一生的时间都嫌太短,所以古人皓首穷经,头发白了还是在继续研究,不过在这样的研究中确是有浓厚的趣味。
在初学的阶段,由小学至大学,我们与其倡言趣味,不如偏重纪律。一个合理编列的课程表,犹如一个营养均衡的食谱,里面各个项目都是有益而必需的,不可偏废,不可再有选择。所谓选修科目也只是在某一项目范围内略有拣选余地而已。一个受过良好教育的人,犹如一个科班出身的戏剧演员,在坐科的时候他是要服从严格纪律的,唱念做打武把子都要认真学习,各种脚色的戏都要完全谙通,学成之后才能各按其趣味而单独发展其所长。学问要有根底,根底要打得平正坚实,以后永远受用。初学阶段的科目之最重要的莫过于语文与数学。语文是阅读达意的工具,国文不通便很难表达自己,外国文不通便很难吸取外来的新知。数学是思想条理之最好的训练。其他科目也各有各的用处,其重要性很难强分轩轾,例如体育,从另一方面看也是重要得无以复加。总之,我们在求学时代,应该暂且把趣味放在一旁,耐着性子接受教育的纪律,把自己锻炼成为坚实的材料。学问的趣味,留在将来慢慢享受一点也不迟。
|
考点1.“涉笔成趣,左右逢源”推荐译为effortless and resourceful creativity或类似的表达如 writing with flair and finding inspiration at every turn。
考点2.“浅尝辄止,甚至躐等躁进,当然味同嚼蜡”中,“浅尝辄止”、“躐等躁进”、“味同嚼蜡”三个成语,推荐译为merely scratching the surface, or even rashly skipping steps, will naturally feel as dull as chewing wax。
考点3.“所以古人皓首穷经,头发白了还是在继续研究”中的“皓首穷经”推荐译为 spend one's entire life studying the classics, even until one's hair turns white 。
考点4.“所谓选修科目也只是在某一项目范围内略有拣选余地而已”中的“拣选余地”是一个关键的翻译点,直接翻译成 slight choices 较为生硬,更优的翻译如 room for choice 或 leeway for selection。
考点5.“否则我们便不配做现代的公民”中的“公民”是一个内涵广阔的社会学概念,不可译为“literates”(识字的人)。
考点6.“必先经过一个‘格物’的阶段”中的“格物”推荐译为investigate things to acquire knowledge,不可译为subject yourself to discipline。
考点7. “一个有中上天资的人”不可译为“An ordinary talented person”(一个普通有才华的人),推荐译为a person of above-average talent。
|
b78f2
|
新闻资讯
|
观点评论
|
186
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
1、乳腺癌组织学分型
目前,乳腺癌的病理学诊断已从形态学结合免疫组化发展为形态学-免疫组化分子生物学特征相结合。精准的组织学分型对患者的预后判断、治疗决策有重要指导作用。如大部分三阴性乳腺癌(tiple-negative breast cancer,TNBC)恶性程度高
预后差,但也有一些低度恶性的TNBC生物学行为相对惰性,如分泌性癌、低级别腺鳞疡、纤维瘤病样梭形细胞癌、经典型腺样性癌等。对这部分低度恶性的TNBC除非有病理学检查证实的淋巴结转移,否则无需给予全身治疗。某些组织学类型的准确区分需行免疫组织化学和(或)分子病理学检测后确定部分组织学类型的乳腺癌具有独特的分子生物学特征,例如分泌性癌常伴有ETV6-NTRK3基因重排、经典型腺样囊性癌常有MYB-NFIB重排、低级别黏液表皮样癌常有 CRTC1-MAML2重排、极性翻转的高细胞癌常伴有IDH2基因突变
2、乳腺癌组织学分级
组织学分级是重要的预后因素。推荐采用Nottingham分级系统对浸润性乳腺癌进行组织学分级。根据腺管形成的比例、核异型性和核分裂象计数三项指标分别独立评估,各给予1~3分,相加后根据总分将浸润性癌分为I级、Ⅱ级、亚级三个级别。腺管分化程度的评估针对整个肿瘤,需要在低倍镜下评估。只计数有明确中央腺腔且由有极向肿瘤细胞包绕的结构,以腺管/肿瘤区域的百分比表示。细胞核多形性的评估要选取多形性最显著的区域。该项评估参考周围正常乳腺上皮细胞的细胞核大小、形状和核仁大小。当周边缺乏正常细胞时,可用淋巴细胞作为参照。当细胞核与周围正常上皮细胞的大小和形状相似、染色质均匀分布时,视为1分;当细胞该比正常细胞大,形状和大小有中等程度差异,可见单个核仁时,视为2分;当细胞核的大小有显著差异,核仁显著,可见多个核仁时应视为3分。只计数明确的核分裂象,不计数核浓染和核碎屑。核分裂象计数区域必须根据显微镜高倍视野的直径进行校正。核分裂象计数要选取增殖最活跃的区域,一般常见于肿瘤边缘,如果存在异质性,应选择核分裂象多的区域
3、乳腺癌的分期
包括传统的解剖学分期和预后分期。解剖学分期包括肿瘤的大小、累及范围(皮肤和胸壁受累情况)、淋巴结转移和远处转移情况。肿瘤大小的测量有多种方法,包括临床体检、影像学评估、病理大体测量和显微镜下测量。乳腺癌分期中涉及的肿瘤大小是指浸润癌的大小。由于体检、影像学及大体检查均无法区分浸润性癌和DCIS,因此显微镜下测量应该是最准确的测量方式。如果浸润性癌范围较大,无法用一个蜡块全部包埋,则以巨检时的肿瘤大小为准。若浸润性癌病灶局限,可以用一个蜡块全部包埋,肿瘤大小以显微镜下测量的尺寸为准。
(1)如果肿瘤组织中有浸润性癌和原位癌两种成分,肿瘤的大小应以浸润性成分的测量值为准。
(2)原位癌伴微浸润:出现微浸润时,应在报告中注明,并测量微浸润灶最大径;如为多灶微浸润,浸润灶大小不累加,需在报告中注明为多灶微浸润,并测量最大浸润灶的最大径
(3)对肉眼能确定的发生于同一象限的两个以上多发性肿瘤病灶,应在病理学检查报告中注明为多灶性肿瘤,并分别测量大小,以最大浸润病灶作为分期依据。
(4)对肉眼能确定的发生于不同象限的两个以上肿瘤病灶,应在病理学检查报告中注明为多中心性肿瘤,并分别测量大小。
(5)如果肿瘤组织完全由DCIS组成,应尽量测量其范围。淋巴结状态是决定彩腺癌患者治疗和预后的重要因素,要特别仔细观察淋巴结的转移数目,从而做出准确的pN分期判断。预后分期是在传统解剖学分期基础上增加生物学信息,是解剖学分期的完善和补充
4、乳腺癌免疫组化和分子病理学检测及其质量控制
(1)应对所有乳腺浸润性癌病例进行雌激素受体、孕激素受体、人表皮生长因子受体2的免疫组化染色,HER2 2+病例应进一步行原位杂交检测。对DCIS也建议进行ER、PR及HER2免疫组织化学染色ER、PR的病理学报告需包含阳性细胞强度和百分比。ER、PR检测参考中国《乳腺癌雌、孕激素受体免疫组织化学检测指南(2015版)》(参见附录V-D),ER/PR阳性定义:>1%的浸润性癌细胞呈阳性染色;当阳性细胞1%~10%时为ER/PR低表达HER2检测参考中国《乳腺癌HER2检测指南(2019版)》(附录V-E)。HER2免疫组织化学检测结果为IHC 1+或IHC 2+ЛISH无扩增的局部晚期/晚期乳腺癌患者也可能从 ADC药物治疗中获益。目前大多数研究将IHC 1+和IHC 2+ЛSH无扩增者定义为HER2低表达。随着循证医学证据的不断积累,此定义有可能会发生改变。以下几点建议也许有助于区分 IHC0和IHC 1+:① 严格按照指南标准进行判读。② 应在高倍(40x)镜下区分判读HER2 IHC0和1+。③ 对于IHCO/HC 1+临界值附近的病例,可考虑请第二位病理科医师进行判读。④建议采用不同梯度表达水平的外对照(包含IHC 1+)。⑤ 需关注检测前、检测中和检测后的全流程质控。
(2)应对所有乳腺浸润性癌进行Ki-67增殖指数检测,并对癌细胞中阳性染色细胞所占的百分比进行报告。
(3)PD-L1检测:目前临床研究中采用的PD-L1检测是一套完整的系统,包括抗体、检测平台和判读系统。目前TNBC中PD-L1检测常用的抗体为22C3(DAKO)
判读采用CPS评分。报告中应标明检测平台、抗体克隆号及评分方式。CPS评分公式如下:
PD-L1(DAKO22C3)CPS=PD-L1 阳性细胞数 (肿瘤细胞、淋巴细胞、巨噬细胞 ) 活的肿瘤细胞总数 x100 PD-L1(DAKO22C3)CPS=PD-L1 阳性细胞数 (肿瘤细胞、淋巴细胞、巨噬细胞 )活的肿瘤细胞总数 x100
(4)可进行肿瘤浸润淋巴细胞报告。
(5)开展乳腺癌免疫组织化学和分子病理学检测的实验室应建立完整有效的内部质量控制体系,具有合格资质的病理实验室应满足以下条件:①具备完善的标准操作程序,并严格遵照执行,做好每次检测情况的记录和存档工作。对同一组织不同批次染色结果开展重复性分析。检测相关的仪器和设备定期维护、校验。对于任何操作程序和试剂变化均重新进行严格的验证。②从事乳腺癌免疫组织化学和分子病理学检测的实验技术人员和病理学医师定期进行必要的培训、资格考核和能力评估。③ 实验室外部质控可通过参加有关外部质控活动来实现。外部质控的阳性符合率和阴性符合率达到90%以上。外部质控活动推荐每年参加1~2次。不具备检测条件的单位应妥善地保存好标本,以供具有相关资质的病理实验室进行检测
|
1、乳腺癌组织学分型
目前,乳腺癌的病理学诊断已从形态学结合免疫组化发展为形态学-免疫组化分子生物学特征相结合。精准的组织学分型对患者的预后判断、治疗决策有重要指导作用。如大部分三阴性乳腺癌(tiple-negative breast cancer,TNBC)恶性程度高
预后差,但也有一些低度恶性的TNBC生物学行为相对惰性,如分泌性癌、低级别腺鳞疡、纤维瘤病样梭形细胞癌、经典型腺样性癌等。对这部分低度恶性的TNBC除非有病理学检查证实的淋巴结转移,否则无需给予全身治疗。某些组织学类型的准确区分需行免疫组织化学和(或)分子病理学检测后确定部分组织学类型的乳腺癌具有独特的分子生物学特征,例如分泌性癌常伴有ETV6-NTRK3基因重排、经典型腺样囊性癌常有MYB-NFIB重排、低级别黏液表皮样癌常有 CRTC1-MAML2重排、极性翻转的高细胞癌常伴有IDH2基因突变
2、乳腺癌组织学分级
组织学分级是重要的预后因素。推荐采用Nottingham分级系统对浸润性乳腺癌进行组织学分级。根据腺管形成的比例、核异型性和核分裂象计数三项指标分别独立评估,各给予1~3分,相加后根据总分将浸润性癌分为I级、Ⅱ级、亚级三个级别。腺管分化程度的评估针对整个肿瘤,需要在低倍镜下评估。只计数有明确中央腺腔且由有极向肿瘤细胞包绕的结构,以腺管/肿瘤区域的百分比表示。细胞核多形性的评估要选取多形性最显著的区域。该项评估参考周围正常乳腺上皮细胞的细胞核大小、形状和核仁大小。当周边缺乏正常细胞时,可用淋巴细胞作为参照。当细胞核与周围正常上皮细胞的大小和形状相似、染色质均匀分布时,视为1分;当细胞该比正常细胞大,形状和大小有中等程度差异,可见单个核仁时,视为2分;当细胞核的大小有显著差异,核仁显著,可见多个核仁时应视为3分。只计数明确的核分裂象,不计数核浓染和核碎屑。核分裂象计数区域必须根据显微镜高倍视野的直径进行校正。核分裂象计数要选取增殖最活跃的区域,一般常见于肿瘤边缘,如果存在异质性,应选择核分裂象多的区域
3、乳腺癌的分期
包括传统的解剖学分期和预后分期。解剖学分期包括肿瘤的大小、累及范围(皮肤和胸壁受累情况)、淋巴结转移和远处转移情况。肿瘤大小的测量有多种方法,包括临床体检、影像学评估、病理大体测量和显微镜下测量。乳腺癌分期中涉及的肿瘤大小是指浸润癌的大小。由于体检、影像学及大体检查均无法区分浸润性癌和DCIS,因此显微镜下测量应该是最准确的测量方式。如果浸润性癌范围较大,无法用一个蜡块全部包埋,则以巨检时的肿瘤大小为准。若浸润性癌病灶局限,可以用一个蜡块全部包埋,肿瘤大小以显微镜下测量的尺寸为准。
(1)如果肿瘤组织中有浸润性癌和原位癌两种成分,肿瘤的大小应以浸润性成分的测量值为准。
(2)原位癌伴微浸润:出现微浸润时,应在报告中注明,并测量微浸润灶最大径;如为多灶微浸润,浸润灶大小不累加,需在报告中注明为多灶微浸润,并测量最大浸润灶的最大径
(3)对肉眼能确定的发生于同一象限的两个以上多发性肿瘤病灶,应在病理学检查报告中注明为多灶性肿瘤,并分别测量大小,以最大浸润病灶作为分期依据。
(4)对肉眼能确定的发生于不同象限的两个以上肿瘤病灶,应在病理学检查报告中注明为多中心性肿瘤,并分别测量大小。
(5)如果肿瘤组织完全由DCIS组成,应尽量测量其范围。淋巴结状态是决定彩腺癌患者治疗和预后的重要因素,要特别仔细观察淋巴结的转移数目,从而做出准确的pN分期判断。预后分期是在传统解剖学分期基础上增加生物学信息,是解剖学分期的完善和补充
4、乳腺癌免疫组化和分子病理学检测及其质量控制
(1)应对所有乳腺浸润性癌病例进行雌激素受体、孕激素受体、人表皮生长因子受体2的免疫组化染色,HER2 2+病例应进一步行原位杂交检测。对DCIS也建议进行ER、PR及HER2免疫组织化学染色ER、PR的病理学报告需包含阳性细胞强度和百分比。ER、PR检测参考中国《乳腺癌雌、孕激素受体免疫组织化学检测指南(2015版)》(参见附录V-D),ER/PR阳性定义:>1%的浸润性癌细胞呈阳性染色;当阳性细胞1%~10%时为ER/PR低表达HER2检测参考中国《乳腺癌HER2检测指南(2019版)》(附录V-E)。HER2免疫组织化学检测结果为IHC 1+或IHC 2+ЛISH无扩增的局部晚期/晚期乳腺癌患者也可能从 ADC药物治疗中获益。目前大多数研究将IHC 1+和IHC 2+ЛSH无扩增者定义为HER2低表达。随着循证医学证据的不断积累,此定义有可能会发生改变。以下几点建议也许有助于区分 IHC0和IHC 1+:① 严格按照指南标准进行判读。② 应在高倍(40x)镜下区分判读HER2 IHC0和1+。③ 对于IHCO/HC 1+临界值附近的病例,可考虑请第二位病理科医师进行判读。④建议采用不同梯度表达水平的外对照(包含IHC 1+)。⑤ 需关注检测前、检测中和检测后的全流程质控。
(2)应对所有乳腺浸润性癌进行Ki-67增殖指数检测,并对癌细胞中阳性染色细胞所占的百分比进行报告。
(3)PD-L1检测:目前临床研究中采用的PD-L1检测是一套完整的系统,包括抗体、检测平台和判读系统。目前TNBC中PD-L1检测常用的抗体为22C3(DAKO)
判读采用CPS评分。报告中应标明检测平台、抗体克隆号及评分方式。CPS评分公式如下:
PD-L1(DAKO22C3)CPS=PD-L1 阳性细胞数 (肿瘤细胞、淋巴细胞、巨噬细胞 ) 活的肿瘤细胞总数 x100 PD-L1(DAKO22C3)CPS=PD-L1 阳性细胞数 (肿瘤细胞、淋巴细胞、巨噬细胞 )活的肿瘤细胞总数 x100
(4)可进行肿瘤浸润淋巴细胞报告。
(5)开展乳腺癌免疫组织化学和分子病理学检测的实验室应建立完整有效的内部质量控制体系,具有合格资质的病理实验室应满足以下条件:①具备完善的标准操作程序,并严格遵照执行,做好每次检测情况的记录和存档工作。对同一组织不同批次染色结果开展重复性分析。检测相关的仪器和设备定期维护、校验。对于任何操作程序和试剂变化均重新进行严格的验证。②从事乳腺癌免疫组织化学和分子病理学检测的实验技术人员和病理学医师定期进行必要的培训、资格考核和能力评估。③ 实验室外部质控可通过参加有关外部质控活动来实现。外部质控的阳性符合率和阴性符合率达到90%以上。外部质控活动推荐每年参加1~2次。不具备检测条件的单位应妥善地保存好标本,以供具有相关资质的病理实验室进行检测
|
考点1:“组织学分型” 推荐译为 Histologic type 或 Histologic subtype,保持全文一致,不建议混用 Histological Classification 与 Histologic Typing,优先采用病理学常用形式。
考点2:“生物学行为相对惰性” 推荐译为 Biologically indolent,避免用 vague 形容词,确保医学专业语境明确。
考点3:“纤维瘤病样梭形细胞癌” 必须译为 Fibromatosis-like spindle cell carcinoma,病理标准译法,避免用 desmoid-type 以免与其他软组织病变混淆。
考点4:“全身治疗” 必须译为 Systemic therapy,保持肿瘤学标准术语。
考点5:“基因重排” 必须译为 Gene rearrangement,保持分子病理学常用表达。
考点6:“组织学分级” 推荐译为 Histologic grade,注意与 Histological grading 区分,grade 指结果,grading 指过程。
考点7:“HER2 2+病例” 推荐译为 Cases with a HER2 IHC 2+ result,避免仅用 HER2 2+ 以免语义模糊。
考点8:“核浓染和核碎屑” 推荐译为 Pyknosis and karyorrhexis 或 Apoptotic bodies,使用病理学专用术语而非形态描述。“核碎屑” 对应 Karyorrhexis,避免泛化为 nuclear debris。
考点9:“病理大体测量” 推荐译为 Gross pathologic measurement,注意 pathologic 与 pathological 均可但全文需统一。
考点10:“多灶性肿瘤” 必须译为 Multifocal tumor(单复数根据语境调整)。
考点11:“多中心性肿瘤” 必须译为 Multicentric tumor(单复数根据语境调整)。
考点12:“肿瘤浸润淋巴细胞” 必须译为 Tumor-infiltrating lymphocytes(缩写 TILs 在首次出现时给全称)。
考点13:“HER2低表达” 必须译为 HER2-low expression,连字符不可省略。
考点14:“IHC 0/IHC 1+临界值” 推荐译为 IHC 0/IHC 1+ cutoff value,cutoff 需单词连写。
考点15:“全流程质量控制” 推荐译为 Full-process quality control,或 Pre-analytical, analytical, and post-analytical QC。
考点16:“PD-L1检测” 推荐译为 PD-L1 testing,避免混用 detection。
考点17:“综合阳性评分” 必须译为 Combined Positive Score(CPS),首次出现给出全称与缩写。
考点18:“肿瘤细胞、淋巴细胞、巨噬细胞” 推荐译为 Tumor cells, lymphocytes, and macrophages,保持三类细胞顺序与原文一致。
考点19:“染色结果可重复性分析” 推荐译为 Reproducibility analysis of staining results,注意 batch 的说明不可漏。
考点20:“操作规程/试剂变更复核” 推荐译为 Re-verification of changes in procedures and reagents。
考点21:“无检测条件的单位” 推荐译为 Units without testing capabilities,避免直译成 non-accredited labs。
|
bb347
|
学术论文
|
自然科学
|
110
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
最高40%!特朗普威胁对日韩等14国加征关税
当地时间7日,美国总统特朗普发信函给日韩及南非等14国威胁征税,随后,他又签署行政令,延长所谓“对等关税”暂缓期,将实施时间从7月9日推迟到8月1日。
3个月来,美国就加征所谓“对等关税”与多个贸易对象进行谈判,但进度显著不及美方预期。目前仅与英国、越南达成贸易协议,但协议细节仍待敲定,与欧盟、日本、韩国、印度等的谈判进展艰难。
特朗普公开致信14国威胁征税
当地时间7日,美国总统特朗普宣称,将从8月1日起对来自14个国家的进口产品征收关税:
日本、韩国、哈萨克斯坦、马来西亚、突尼斯:25%
波黑、南非:30%
印度尼西亚:32%
孟加拉国、塞尔维亚:35%
柬埔寨、泰国:36%
老挝、缅甸:40%
• 特朗普:若提高对美关税,将追加同等幅度
特朗普当天在自己创立的“真实社交”网站上发布他写给日本首相石破茂和韩国总统李在明的信。在这两封内容几乎完全相同的信中,特朗普写道:“请理解,25%这一数字远远低于消除我们与贵国之间贸易逆差所需的水平。”
特朗普警告称,如果日韩两国以提高关税作为回应,美国也将在25%的基础上再提高同等额度的关税。
特朗普表示,贸易逆差已对美国经济乃至国家安全构成重大威胁,因此必须作出改变。此项关税将独立于各类行业性关税。此外,任何试图通过第三国转运来规避该关税的做法,也将被征以更高的关税。特朗普称,选择在美国境内建厂或生产产品的公司无需缴纳此项关税。若这些国家决定提高对美关税,则美国将在现有税率基础上追加同等幅度关税。
• 美官员频频施压
在刚刚过去的周末,包括财政部长贝森特等在内的美方高官频繁表态,一方面施压贸易对象加快谈判步伐,另一方面暗示未能如期达成协议的国家可选择延长谈判截止期限。
贝森特6日接受美国有线电视新闻网采访时表示,对于在8月1日之前未能与美国达成贸易协议的国家,关税税率将恢复到4月宣布的“对等关税”水平。
贝森特当时拒绝向媒体证实8月1日是否为最新截止日期,称“如果你想加快速度,那就行动吧”。
关税谈判进度显著不及预期
• 南非
南非总统拉马福萨7日表示,南非将继续通过外交渠道推动与美国建立更加平衡、互惠的贸易关系。南非注意到美国政府承诺,30%的关税税率将根据双方谈判结果进行调整。
• 欧盟
欧盟委员会主席冯德莱恩日前表示,欧盟在关税问题上“准备好与美国达成一项原则性协议”。但若谈判失败,欧盟将坚决采取反制措施以保护欧洲经济。
• 日本
日本与美国已进行多轮谈判,但仍未取得突破。日本首相石破茂6日表示,日本已为所有可能的关税情况做好准备,将“坚定立场”,捍卫自身利益。
• 韩国
韩国总统李在明3日表示,与美国的谈判看起来非常困难,双方都不是十分确定“想要什么”。他说,无法确定能否在7月8日前完成谈判。
李在明同时表示,将尽最大努力与美国达成协议,并尽最大努力在谈判中取得以韩国国家利益为中心、务实共赢的结果。
• 印度
印度方面宣布,已向世界贸易组织通报,计划对部分美国产品征收报复性关税,以回应美方对从印度进口的汽车及零部件加征关税的措施。
• 越南
越共中央总书记苏林日前表示,建议美方尽快承认越南市场经济地位,并取消美对越部分高科技产品的出口限制。
美媒:高关税将由美国消费者埋单
根据美国商务部发布的数据,去年美国总共从特朗普发出信函的其中7个国家进口了3510亿美元的商品。日本和韩国,作为美国第六和第七大贸易伙伴,去年共向美国出口了价值2800亿美元的商品。
美国媒体分析,提高商品关税会导致美国消费者支付更高的价格。美国从韩国和日本进口的主要商品包括汽车、汽车零部件、半导体、药品和机械。特朗普政府已经对其中许多商品征收或威胁征收行业特定关税。
|
最高40%!特朗普威胁对日韩等14国加征关税
当地时间7日,美国总统特朗普发信函给日韩及南非等14国威胁征税,随后,他又签署行政令,延长所谓“对等关税”暂缓期,将实施时间从7月9日推迟到8月1日。
3个月来,美国就加征所谓“对等关税”与多个贸易对象进行谈判,但进度显著不及美方预期。目前仅与英国、越南达成贸易协议,但协议细节仍待敲定,与欧盟、日本、韩国、印度等的谈判进展艰难。
特朗普公开致信14国威胁征税
当地时间7日,美国总统特朗普宣称,将从8月1日起对来自14个国家的进口产品征收关税:
日本、韩国、哈萨克斯坦、马来西亚、突尼斯:25%
波黑、南非:30%
印度尼西亚:32%
孟加拉国、塞尔维亚:35%
柬埔寨、泰国:36%
老挝、缅甸:40%
• 特朗普:若提高对美关税,将追加同等幅度
特朗普当天在自己创立的“真实社交”网站上发布他写给日本首相石破茂和韩国总统李在明的信。在这两封内容几乎完全相同的信中,特朗普写道:“请理解,25%这一数字远远低于消除我们与贵国之间贸易逆差所需的水平。”
特朗普警告称,如果日韩两国以提高关税作为回应,美国也将在25%的基础上再提高同等额度的关税。
特朗普表示,贸易逆差已对美国经济乃至国家安全构成重大威胁,因此必须作出改变。此项关税将独立于各类行业性关税。此外,任何试图通过第三国转运来规避该关税的做法,也将被征以更高的关税。特朗普称,选择在美国境内建厂或生产产品的公司无需缴纳此项关税。若这些国家决定提高对美关税,则美国将在现有税率基础上追加同等幅度关税。
• 美官员频频施压
在刚刚过去的周末,包括财政部长贝森特等在内的美方高官频繁表态,一方面施压贸易对象加快谈判步伐,另一方面暗示未能如期达成协议的国家可选择延长谈判截止期限。
贝森特6日接受美国有线电视新闻网采访时表示,对于在8月1日之前未能与美国达成贸易协议的国家,关税税率将恢复到4月宣布的“对等关税”水平。
贝森特当时拒绝向媒体证实8月1日是否为最新截止日期,称“如果你想加快速度,那就行动吧”。
关税谈判进度显著不及预期
• 南非
南非总统拉马福萨7日表示,南非将继续通过外交渠道推动与美国建立更加平衡、互惠的贸易关系。南非注意到美国政府承诺,30%的关税税率将根据双方谈判结果进行调整。
• 欧盟
欧盟委员会主席冯德莱恩日前表示,欧盟在关税问题上“准备好与美国达成一项原则性协议”。但若谈判失败,欧盟将坚决采取反制措施以保护欧洲经济。
• 日本
日本与美国已进行多轮谈判,但仍未取得突破。日本首相石破茂6日表示,日本已为所有可能的关税情况做好准备,将“坚定立场”,捍卫自身利益。
• 韩国
韩国总统李在明3日表示,与美国的谈判看起来非常困难,双方都不是十分确定“想要什么”。他说,无法确定能否在7月8日前完成谈判。
李在明同时表示,将尽最大努力与美国达成协议,并尽最大努力在谈判中取得以韩国国家利益为中心、务实共赢的结果。
• 印度
印度方面宣布,已向世界贸易组织通报,计划对部分美国产品征收报复性关税,以回应美方对从印度进口的汽车及零部件加征关税的措施。
• 越南
越共中央总书记苏林日前表示,建议美方尽快承认越南市场经济地位,并取消美对越部分高科技产品的出口限制。
美媒:高关税将由美国消费者埋单
根据美国商务部发布的数据,去年美国总共从特朗普发出信函的其中7个国家进口了3510亿美元的商品。日本和韩国,作为美国第六和第七大贸易伙伴,去年共向美国出口了价值2800亿美元的商品。
美国媒体分析,提高商品关税会导致美国消费者支付更高的价格。美国从韩国和日本进口的主要商品包括汽车、汽车零部件、半导体、药品和机械。特朗普政府已经对其中许多商品征收或威胁征收行业特定关税。
|
考点1: “石破茂”应译为“Shigeru Ishiba / Ishiba Shigeru”,人名。
考点2:“苏林”应译为“Tô Lâm”
考点3: “李在明”应译为“Lee Jae-myung”
|
bc236
|
新闻资讯
|
新闻报道
|
50
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Abstract: Literature is a mirror of real life which can reflect all aspects of people’s lives. More and more scholars have begun to study a country from the roots of economy, politics and culture. As early as ancient Greece, there were some creations of tragedy. Tragedy is a kind of literary creation, which is not a simple artistic form or technique but the repeat of real society. It can depict the piteous, sad, distressing and sentimental plots by describing some tortuous or complicated events. The British famous writer Thomas Hardy was one of the excellent novelists of the Victorian age. He delineated a lot of characters of tragedies, showing various persons’ enchantment. Besides providing the dignity of life tragedy to the readers, the novels contains the profound rationalism of the writer and Thomas Hardy’s Tess of the D’urbervilles reflected his real society. Hardy succeeded in portraying the image of heroine Tess and revealing the hypocritical ethics and morals of bourgeois society. This paper will discuss the causes of Clare’s tragedy from the hero –Angel Clare’s social background and psychology.
Key words: Thomas Hardy, tragedy, Angel Clare
Chapter1 Introduction
Literature is not only an art but also a mirror of real life. When studying a literary work, scholars actually study history. Nowadays an increasing number of scholars have begun to study the history of a country’s economic, political and cultural forms from the perspective of literature because through different kinds of literary works, we can see all sorts of feelings such as joy, anger, sorrow and various truths. The manifestation of literature is manifold, one of which is tragedy. The writers often want to show the piteous, sad, distressing and sentimental plots by describing some tortuous or complicated events. In the tragedy, it is inevitable that the heroes or heroines should suffer a setback or disadvantage, cover themselves in dishonor, experience tribulation or even fail or die though they have reasonable motivation, wishes, ideal, or passion which may indicate a victory or success. But finally they will either die or get mad. With a bad ending, tragedy often contains a certain philosophy of life
. There are lots of tragedies in western literature such as Oedipus, Prometheus Bound, Romeo and Juliet, Macbeth, Hamlet, Faust, etc. And the famous tragedians are also legion like Aeschylus, Sophocles, Shakespeare, etc –Thomas Hardy for one. He was a prolific and excellent writer, publishing fourteen novels and four volumes of short stories. His works were noted for the intense tragic spirit and sense of fortune, from which we can feel the atmosphere of tragedy brought by fortune deeply.
“Tess of the D’urbervilles” is one of the Hardy’s tragedies, a masterpiece which brought him into a number of literary critics notice. It reflected the writer’s real society and its social system and morals; therefore studying this novel can help us to know about the history of his age. But many papers showed that most of critics used to research the writing background from the tragedy of Tess. Many scholars have always put emphasis on the tragedy of Tess for a long time. Only a few scholars made researches for the tragedy of its hero Angel Clare. He was a contradictory unity –he was bold in struggling with the traditional view but in the meantime he could not break the shackles of feudal ideas. This paper will see the society from this perspective –Angel Clare, the hero’s tragedy and discuss the causes of Clare’s tragedy from his social background and psychology.
Chapter2 A brief account of Tess of The D’urbervilles
It seems that the fictional works do not concern with the real world. But we know that before the writers begin to create their works, it can be said that their social experience may be their primary material for creation. Some writers created the roles and environments in order to revolt against the worldly prejudice of their ages. These kinds of words are expected to tell people the truth of a society. In many cases, the social background of the novel is the writer’s background. Before analyzing the roots of Clare’s tragedy, this paper will discuss two aspects of this novel, namely “the writing background” and “the writer and his works” from which we can see the background of this novel.
2.1 The writing background
Thomas Hardy was the last important novelist of the Victoria ages. The Victorian age was an age of realism rather than of romanticism –a realism which strives to tell the whole truth showing moral and physical diseases as they are. Victorian literature, in general, truthfully represented the reality and spirit of this age which was the great age of the English novel—realistic, thickly plotted, crowded with characters, and long. Hardy, who also shown the truth of this age had a high place in Western literature which came from the agitation of life and fatalism of human being. His tragedies in the history of Western literature were no an accident for the tragedy consciousness. Hardy’s tragic novels has sprung from and developed this tragic idea in form and connotation. The tragedy consciousness in Hardy’s novels originated from Western traditional tragic spirit which was full of rationalism and profound reflection on the contradictions of human society. And it also revealed an ineluctable and inevitable cond
itionality of fate. That is to say, the heroes or heroines would slip into the tragic path of life in the end in Western literature no matter whether they liked or not, or where they hided. Tragedy was their final arrangement.
Thomas Hardy studied Greek tragedies and Shakespearean tragedies all his life. And he was deeply influenced by Schopenhauer’s tragedy consciousness. Schopenhauer was a famous philosopher who believed that life was a tragedy –life was filled with desire. If a person had a desire but could not gain his desires, he would feel painful; however, when he could gain his desires, he would become insipid. This was another torment. Schopenhauer grouped tragedy into three types: the tragedy caused by those who committed heinous crimes, the tragedy led by the irony of fate and the tragedy caused by misunderstanding and distrust between persons in everyday life. In his opinion, the last tragedy was the most terrible one which we can see in Hardy’s works. Hardy began to creating the novels in the early 1870s. In the late 1890s, he turned to write poetry. The Britain in this period was undergoing a transition period from laisser-faire capitalism to imperialism. The capitalism thought that the social system of this period
could not be changed. But Hardy’s works exactly clashed with it, which reflected the tremendous changes of society due to the invasion of industrial capital to the village. With one remark he had ripped away the mask of British society.
2.2 The writer Thomas Hardy and his work
Literature is reflection of life. Almost all writers created their novels according to his social background. We can see many literary works written on the basis of their ages. They wanted to bring out the social facts by their works. It should be such a free way that they could rebuke the dark society. People can feel the society of the writers from their works and then identified with the writers. The writers hoped that they could let the people know the dark aspects of the government and then fine an echo from them by their works. To some extent, a novel should be a history. From the introduction of Thomas Hardy and the main content of Tess of The D’urbervilles must be helpful to show us the background of Clare’s tragedy.
|
Abstract: Literature is a mirror of real life which can reflect all aspects of people’s lives. More and more scholars have begun to study a country from the roots of economy, politics and culture. As early as ancient Greece, there were some creations of tragedy. Tragedy is a kind of literary creation, which is not a simple artistic form or technique but the repeat of real society. It can depict the piteous, sad, distressing and sentimental plots by describing some tortuous or complicated events. The British famous writer Thomas Hardy was one of the excellent novelists of the Victorian age. He delineated a lot of characters of tragedies, showing various persons’ enchantment. Besides providing the dignity of life tragedy to the readers, the novels contains the profound rationalism of the writer and Thomas Hardy’s Tess of the D’urbervilles reflected his real society. Hardy succeeded in portraying the image of heroine Tess and revealing the hypocritical ethics and morals of bourgeois society. This paper will discuss the causes of Clare’s tragedy from the hero –Angel Clare’s social background and psychology.
Key words: Thomas Hardy, tragedy, Angel Clare
Chapter1 Introduction
Literature is not only an art but also a mirror of real life. When studying a literary work, scholars actually study history. Nowadays an increasing number of scholars have begun to study the history of a country’s economic, political and cultural forms from the perspective of literature because through different kinds of literary works, we can see all sorts of feelings such as joy, anger, sorrow and various truths. The manifestation of literature is manifold, one of which is tragedy. The writers often want to show the piteous, sad, distressing and sentimental plots by describing some tortuous or complicated events. In the tragedy, it is inevitable that the heroes or heroines should suffer a setback or disadvantage, cover themselves in dishonor, experience tribulation or even fail or die though they have reasonable motivation, wishes, ideal, or passion which may indicate a victory or success. But finally they will either die or get mad. With a bad ending, tragedy often contains a certain philosophy of life
. There are lots of tragedies in western literature such as Oedipus, Prometheus Bound, Romeo and Juliet, Macbeth, Hamlet, Faust, etc. And the famous tragedians are also legion like Aeschylus, Sophocles, Shakespeare, etc –Thomas Hardy for one. He was a prolific and excellent writer, publishing fourteen novels and four volumes of short stories. His works were noted for the intense tragic spirit and sense of fortune, from which we can feel the atmosphere of tragedy brought by fortune deeply.
“Tess of the D’urbervilles” is one of the Hardy’s tragedies, a masterpiece which brought him into a number of literary critics notice. It reflected the writer’s real society and its social system and morals; therefore studying this novel can help us to know about the history of his age. But many papers showed that most of critics used to research the writing background from the tragedy of Tess. Many scholars have always put emphasis on the tragedy of Tess for a long time. Only a few scholars made researches for the tragedy of its hero Angel Clare. He was a contradictory unity –he was bold in struggling with the traditional view but in the meantime he could not break the shackles of feudal ideas. This paper will see the society from this perspective –Angel Clare, the hero’s tragedy and discuss the causes of Clare’s tragedy from his social background and psychology.
Chapter2 A brief account of Tess of The D’urbervilles
It seems that the fictional works do not concern with the real world. But we know that before the writers begin to create their works, it can be said that their social experience may be their primary material for creation. Some writers created the roles and environments in order to revolt against the worldly prejudice of their ages. These kinds of words are expected to tell people the truth of a society. In many cases, the social background of the novel is the writer’s background. Before analyzing the roots of Clare’s tragedy, this paper will discuss two aspects of this novel, namely “the writing background” and “the writer and his works” from which we can see the background of this novel.
2.1 The writing background
Thomas Hardy was the last important novelist of the Victoria ages. The Victorian age was an age of realism rather than of romanticism –a realism which strives to tell the whole truth showing moral and physical diseases as they are. Victorian literature, in general, truthfully represented the reality and spirit of this age which was the great age of the English novel—realistic, thickly plotted, crowded with characters, and long. Hardy, who also shown the truth of this age had a high place in Western literature which came from the agitation of life and fatalism of human being. His tragedies in the history of Western literature were no an accident for the tragedy consciousness. Hardy’s tragic novels has sprung from and developed this tragic idea in form and connotation. The tragedy consciousness in Hardy’s novels originated from Western traditional tragic spirit which was full of rationalism and profound reflection on the contradictions of human society. And it also revealed an ineluctable and inevitable cond
itionality of fate. That is to say, the heroes or heroines would slip into the tragic path of life in the end in Western literature no matter whether they liked or not, or where they hided. Tragedy was their final arrangement.
Thomas Hardy studied Greek tragedies and Shakespearean tragedies all his life. And he was deeply influenced by Schopenhauer’s tragedy consciousness. Schopenhauer was a famous philosopher who believed that life was a tragedy –life was filled with desire. If a person had a desire but could not gain his desires, he would feel painful; however, when he could gain his desires, he would become insipid. This was another torment. Schopenhauer grouped tragedy into three types: the tragedy caused by those who committed heinous crimes, the tragedy led by the irony of fate and the tragedy caused by misunderstanding and distrust between persons in everyday life. In his opinion, the last tragedy was the most terrible one which we can see in Hardy’s works. Hardy began to creating the novels in the early 1870s. In the late 1890s, he turned to write poetry. The Britain in this period was undergoing a transition period from laisser-faire capitalism to imperialism. The capitalism thought that the social system of this period
could not be changed. But Hardy’s works exactly clashed with it, which reflected the tremendous changes of society due to the invasion of industrial capital to the village. With one remark he had ripped away the mask of British society.
2.2 The writer Thomas Hardy and his work
Literature is reflection of life. Almost all writers created their novels according to his social background. We can see many literary works written on the basis of their ages. They wanted to bring out the social facts by their works. It should be such a free way that they could rebuke the dark society. People can feel the society of the writers from their works and then identified with the writers. The writers hoped that they could let the people know the dark aspects of the government and then fine an echo from them by their works. To some extent, a novel should be a history. From the introduction of Thomas Hardy and the main content of Tess of The D’urbervilles must be helpful to show us the background of Clare’s tragedy.
|
考点1:“agitation of life and fatalism of human being”推荐译为“人生的动荡与宿命观”
考点2:“are expected to tell people”推荐译为“旨在向人们揭示”,不可直译为“期望告诉人们”
考点3:“Introduction”在论文中必须译为“引言”
|
bdb14
|
学术论文
|
人文科学
|
24
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Bilateral trade is considered a key driver of business-cycle transmission, as countries with higher bilateral trade have more correlated business cycles. We show, however, that when we account for the common trade exposure of a country pair to similar foreign cycles, the effect of bilateral trade on comovement falls sharply. Furthermore, common trade exposure is also a robust predictor of comovement. We conclude that trade is indeed a driver of business-cycle transmission, but often through common exposure to foreign cycles rather than just bilateral linkages. Finally, we consider the implications of these empirical results for the ‘‘trade-comovement puzzle.’’
A large literature, starting with Frankel and Rose (1998), argues that bilateral trade is a key driver of business-cycle transmission, as countries that trade more with each other have more correlated business cycles—a phenomenon known as trade comovement.
We show that previous estimates of trade comovement are upward biased because they omit the common exposure of a country pair to similar foreign cycles, which is positively correlated with bilateral trade and a robust predictor of trade comovement. Thus, business cycle comovement is influenced by trade both directly through bilateral trade and indirectly through trade exposure to similar partners. We propose a novel indicator to measure common exposure and show that when one accounts for the common exposure of a country pair, the effect of bilateral trade on business cycle comovement falls substantially.
The comovement of Canada’s and Mexico’s business cycles illustrates the main empirical issue. Both countries’ bilateral trade with the United States accounts for nearly 70 percent of total trade. It is no surprise, then, that the business cycles of Canada and Mexico are highly correlated. If we ignore common exposure in trade-comovement analysis, we exaggerate the effect of direct bilateral trade of these two countries–less than 3 percent of total trade–on business cycle comovement.
We derive a measure of common trade exposure that addresses this issue. For each country in a country pair, we calculate a trade-weighted ‘‘rest of world’’ cycle using the cyclical GDP fluctuations of all its trade partners. We then define common trade exposure of a country pair as the correlation between the two countries’ rest of world cycles over time. This measure of common exposure is positively correlated with bilateral trade intensity, as countries that trade together tend to also have similar trading partners. Given this positive relationship, if common exposure increases business-cycle comovement, then a regression that fails to control for common exposure will suffer from positive omitted variable bias, as explained by Kose and Yi (2006).
We perform standard cross-sectional trade-comovement regressions with and without our measure of common trade exposure as a control. We find that the effect of common trade exposure on comovement is both positive and significant, with a one standard deviation increase in common trade exposure yielding an average increase in comovement of more than 5 percentage points.
Furthermore, when common trade exposure is included in the regression, the estimated effect of bilateral trade intensity on GDP comovement falls over 40 percent, suggesting the omitted variable bias in the estimation of the effect of bilateral trade intensity is quite strong.
A high measure of common trade exposure amounts to more than just exposure to the same trading partners. Indeed, two countries could share none of the same trading partners and still have a high amount of common trade exposure because the trade partners of each country have highly correlated business cycles. This distinction is important as it represents a broader notion of common shocks that can affect a country pair through trade. To make this point, we repeat our analysis using a measure of the similarity in trade partners for a country pair. We find that this measure has a much weaker mitigating effect on the relationship between bilateral trade and comovement and is a less robust predictor of comovement than our measure of common trade exposure.
Indeed, we find that when we control for both common trade exposure and trade partner similarity, the coefficient on trade partner similarity turns negative, suggesting that the comovement-boosting effect of trade partner similarity is accounted for by its positive correlation with common exposure.
Previous studies have found that trade-comovement is stronger among more highly-developed countries. Motivated by this result, we split the data into two subsamples: one in which all country pairs are made up of high-income countries only, and one with all other country pairs. Consistent with the literature, we find that estimated trade-comovement is higher for high-income countries.
Furthermore, adding common trade exposure to the regression reduces the trade-comovement coefficient by less for the high-income country pairs and by more for other country pairs. Common trade exposure also has a stronger relationship with comovement among high-income countries. Thus, we conclude that bilateral trade and trade exposure to similar foreign cycles are more importance sources of comovement between high-income countries than for lower-income countries.
Our empirical results are robust to a battery of robustness tests. Among these, we pay special attention to potential issues of simultaneity bias or reverse causality by instrumenting bilateral trade and common trade exposure with gravity determinants, dividing the sample into panels to control for country-pair characteristics, and limiting the set of countries to small open economies that are assumed to not influence the foreign business cycle. These specifications confirm that common trade exposure is a robust predictor of business-cycle comovement. Indeed, we find the coefficient on common exposure to be positive and significant even when the coefficient on bilateral trade intensity is not. Furthermore, the trade-comovement relationship in these specifications still exhibits positive omitted variable bias.
Our empirical results offer a new lens through which to view the so-called ‘‘trade-comovement puzzle.’’ Kose and Yi (2001) show that a standard international real business cycle (IRBC) model is capable of matching the qualitative result that countries with higher bilateral trade have more correlated business cycles, but that the magnitude of this relationship is far lower than in the data.
Several researchers have since attempted to bridge the gap with new mechanisms in the model. We argue, however, that the target comovement to capture in the model is lower than previously thought.
We extend the three-country IRBC model of Drozd et al. (2021) to four countries, allowing us to match both bilateral trade intensity and common trade exposure to foreign cycles in calibration. The model features households that optimally choose imports, consumption, labor, and investment in physical capital and a non-contingent bond to maximize welfare. Similar to the previous literature, we find increasing bilateral trade in the IRBC model increases comovement but only accounts for about 11 percent of the coefficient in the data, despite our lower trade-comovement target. Furthermore, we find that the model cannot generate a statistically significant positive relationship between common trade exposure and comovement, nor the omitted variable bias in the trade-comovement relationship when omitting common trade exposure. These findings highlight additional failures of the baseline model.
Drozd et al. (2021) find that introducing a dynamic trade elasticity in the model (via import adjustment costs) strengthens the positive relationship between trade and comovement, as it reverses the income effect of foreign productivity shocks that move trade and GDP in different directions. Introducing this mechanism in our model brings it much closer to data. Indeed, we find that with reasonably calibrated adjustment costs, the model accounts for 76 percent of the trade-comovement relationship in the data. The stronger relationship between trade and comovement also serves to increase the effect of increasing common trade exposure in the model, as each country’s comovement with its rest of world cycle increases. With the same adjustment costs, the model accounts for 31 percent of the coefficient on common trade exposure. With even more restrictive adjustment costs, the model can match both coefficients from the data quite closely, though it would still fail to match the trade-comovement relationship from our empirical analysis that does not control for common trade exposure.
In addition to exploring the model-implied effect of increased bilateral trade or common trade exposure, we also explore the effect of increased trade partner similarity, our alternative measure discussed previously. Throughout, we find that the model-implied coefficient from raising trade partner similarity (holding common trade exposure and bilateral trade constant) is negative. Increasing trade partner similarity while holding common trade exposure fixed implies that the business cycles of foreign countries must be less correlated. Trade partner similarity increases comovement only as far as it is associated with higher common exposure to countries with similar cycles. This result may give some intuition for the same result in the data when we control for both common trade exposure and trade partner similarity.
In Section 2, we present a brief literature review. Section 3 describes our measures of common exposure, trade partner similarity, and bilateral trade intensity and reports the empirical results for the effect of each on a country pair’s business cycle comovement.
In Section 4, we evaluate the implications of our empirical results on the trade-comovement puzzle. Section 5 concludes.
|
Bilateral trade is considered a key driver of business-cycle transmission, as countries with higher bilateral trade have more correlated business cycles. We show, however, that when we account for the common trade exposure of a country pair to similar foreign cycles, the effect of bilateral trade on comovement falls sharply. Furthermore, common trade exposure is also a robust predictor of comovement. We conclude that trade is indeed a driver of business-cycle transmission, but often through common exposure to foreign cycles rather than just bilateral linkages. Finally, we consider the implications of these empirical results for the ‘‘trade-comovement puzzle.’’
A large literature, starting with Frankel and Rose (1998), argues that bilateral trade is a key driver of business-cycle transmission, as countries that trade more with each other have more correlated business cycles—a phenomenon known as trade comovement.
We show that previous estimates of trade comovement are upward biased because they omit the common exposure of a country pair to similar foreign cycles, which is positively correlated with bilateral trade and a robust predictor of trade comovement. Thus, business cycle comovement is influenced by trade both directly through bilateral trade and indirectly through trade exposure to similar partners. We propose a novel indicator to measure common exposure and show that when one accounts for the common exposure of a country pair, the effect of bilateral trade on business cycle comovement falls substantially.
The comovement of Canada’s and Mexico’s business cycles illustrates the main empirical issue. Both countries’ bilateral trade with the United States accounts for nearly 70 percent of total trade. It is no surprise, then, that the business cycles of Canada and Mexico are highly correlated. If we ignore common exposure in trade-comovement analysis, we exaggerate the effect of direct bilateral trade of these two countries–less than 3 percent of total trade–on business cycle comovement.
We derive a measure of common trade exposure that addresses this issue. For each country in a country pair, we calculate a trade-weighted ‘‘rest of world’’ cycle using the cyclical GDP fluctuations of all its trade partners. We then define common trade exposure of a country pair as the correlation between the two countries’ rest of world cycles over time. This measure of common exposure is positively correlated with bilateral trade intensity, as countries that trade together tend to also have similar trading partners. Given this positive relationship, if common exposure increases business-cycle comovement, then a regression that fails to control for common exposure will suffer from positive omitted variable bias, as explained by Kose and Yi (2006).
We perform standard cross-sectional trade-comovement regressions with and without our measure of common trade exposure as a control. We find that the effect of common trade exposure on comovement is both positive and significant, with a one standard deviation increase in common trade exposure yielding an average increase in comovement of more than 5 percentage points.
Furthermore, when common trade exposure is included in the regression, the estimated effect of bilateral trade intensity on GDP comovement falls over 40 percent, suggesting the omitted variable bias in the estimation of the effect of bilateral trade intensity is quite strong.
A high measure of common trade exposure amounts to more than just exposure to the same trading partners. Indeed, two countries could share none of the same trading partners and still have a high amount of common trade exposure because the trade partners of each country have highly correlated business cycles. This distinction is important as it represents a broader notion of common shocks that can affect a country pair through trade. To make this point, we repeat our analysis using a measure of the similarity in trade partners for a country pair. We find that this measure has a much weaker mitigating effect on the relationship between bilateral trade and comovement and is a less robust predictor of comovement than our measure of common trade exposure.
Indeed, we find that when we control for both common trade exposure and trade partner similarity, the coefficient on trade partner similarity turns negative, suggesting that the comovement-boosting effect of trade partner similarity is accounted for by its positive correlation with common exposure.
Previous studies have found that trade-comovement is stronger among more highly-developed countries. Motivated by this result, we split the data into two subsamples: one in which all country pairs are made up of high-income countries only, and one with all other country pairs. Consistent with the literature, we find that estimated trade-comovement is higher for high-income countries.
Furthermore, adding common trade exposure to the regression reduces the trade-comovement coefficient by less for the high-income country pairs and by more for other country pairs. Common trade exposure also has a stronger relationship with comovement among high-income countries. Thus, we conclude that bilateral trade and trade exposure to similar foreign cycles are more importance sources of comovement between high-income countries than for lower-income countries.
Our empirical results are robust to a battery of robustness tests. Among these, we pay special attention to potential issues of simultaneity bias or reverse causality by instrumenting bilateral trade and common trade exposure with gravity determinants, dividing the sample into panels to control for country-pair characteristics, and limiting the set of countries to small open economies that are assumed to not influence the foreign business cycle. These specifications confirm that common trade exposure is a robust predictor of business-cycle comovement. Indeed, we find the coefficient on common exposure to be positive and significant even when the coefficient on bilateral trade intensity is not. Furthermore, the trade-comovement relationship in these specifications still exhibits positive omitted variable bias.
Our empirical results offer a new lens through which to view the so-called ‘‘trade-comovement puzzle.’’ Kose and Yi (2001) show that a standard international real business cycle (IRBC) model is capable of matching the qualitative result that countries with higher bilateral trade have more correlated business cycles, but that the magnitude of this relationship is far lower than in the data.
Several researchers have since attempted to bridge the gap with new mechanisms in the model. We argue, however, that the target comovement to capture in the model is lower than previously thought.
We extend the three-country IRBC model of Drozd et al. (2021) to four countries, allowing us to match both bilateral trade intensity and common trade exposure to foreign cycles in calibration. The model features households that optimally choose imports, consumption, labor, and investment in physical capital and a non-contingent bond to maximize welfare. Similar to the previous literature, we find increasing bilateral trade in the IRBC model increases comovement but only accounts for about 11 percent of the coefficient in the data, despite our lower trade-comovement target. Furthermore, we find that the model cannot generate a statistically significant positive relationship between common trade exposure and comovement, nor the omitted variable bias in the trade-comovement relationship when omitting common trade exposure. These findings highlight additional failures of the baseline model.
Drozd et al. (2021) find that introducing a dynamic trade elasticity in the model (via import adjustment costs) strengthens the positive relationship between trade and comovement, as it reverses the income effect of foreign productivity shocks that move trade and GDP in different directions. Introducing this mechanism in our model brings it much closer to data. Indeed, we find that with reasonably calibrated adjustment costs, the model accounts for 76 percent of the trade-comovement relationship in the data. The stronger relationship between trade and comovement also serves to increase the effect of increasing common trade exposure in the model, as each country’s comovement with its rest of world cycle increases. With the same adjustment costs, the model accounts for 31 percent of the coefficient on common trade exposure. With even more restrictive adjustment costs, the model can match both coefficients from the data quite closely, though it would still fail to match the trade-comovement relationship from our empirical analysis that does not control for common trade exposure.
In addition to exploring the model-implied effect of increased bilateral trade or common trade exposure, we also explore the effect of increased trade partner similarity, our alternative measure discussed previously. Throughout, we find that the model-implied coefficient from raising trade partner similarity (holding common trade exposure and bilateral trade constant) is negative. Increasing trade partner similarity while holding common trade exposure fixed implies that the business cycles of foreign countries must be less correlated. Trade partner similarity increases comovement only as far as it is associated with higher common exposure to countries with similar cycles. This result may give some intuition for the same result in the data when we control for both common trade exposure and trade partner similarity.
In Section 2, we present a brief literature review. Section 3 describes our measures of common exposure, trade partner similarity, and bilateral trade intensity and reports the empirical results for the effect of each on a country pair’s business cycle comovement.
In Section 4, we evaluate the implications of our empirical results on the trade-comovement puzzle. Section 5 concludes.
|
考点1:“common trade exposure”可以译为“共同贸易风险”,“共同贸易敞口”、“共同贸易关联度” 或 “对共同贸易伙伴的敞口”
考点2:‘’trade-comovement puzzle‘’可以译为“贸易-联动之谜”, “贸易-协同变动之谜” 或 “贸易与商业周期同步性之谜”
考点3:“trade comovement”推荐译为“贸易联动性”
考点4:“country pair”推荐译为“国家对”
考点5:“empirical issue”推荐译为“实证问题”或“实证案例”
考点6:“common shocks”推荐译为“共同冲击”
考点7:“non-contingent bond”必须译为“非或有债券”
|
be71f
|
学术论文
|
社会科学
|
126
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
SpaceX loses contact with its Starship on 9th test flight after last 2 went down in flames
After spectacular back-to-back upper stage failures in January and March, SpaceX launched another Super Heavy-Starship rocket Tuesday on the program's ninth test flight, but ran into fresh problems that resulted in the loss of both stages before they could carry out controlled descents to splashdown.
The Super Heavy first stage, following a deliberately steeper, more stressful descent trajectory toward splashdown near the Texas Gulf Coast, suffered a catastrophic failure at the moment its engines reignited for what would have been a relatively gentle splashdown.
SpaceX confirmed the stage had been lost, but given the extreme nature of the testing, the loss was not an out-of-the-blue surprise. The Starship upper stage, meanwhile, managed to make it into its planned suborbital trajectory after an apparently flawless performance from its six engines.
But a few minutes later, a door on the side of the rocket failed to open, preventing the planned release of simulated Starlink satellites in a test of the rocket's Pez-like deployment system.
With that test deferred to a future flight, SpaceX engineers hoped to reignite a single Raptor engine to test its start-up capability in space. But an apparent propellant leak put the spacecraft into a slow spin that ruled out the restart and a controlled reentry and splashdown.
The Starship has to enter at the right angle and in a precise orientation to survive reentry heating and aerodynamic "loads." Entering in a spin doomed the Starship to a catastrophic breakup.
"Starship made it to the scheduled ship engine cutoff, so big improvement over last flight!" SpaceX founder and CEO Elon Musk wrote on X. "Also, no significant loss of heat shield tiles during ascent. Leaks caused loss of main tank pressure during the coast and re-entry phase. Lot of good data to review."
He added that the Super Heavy launch cadence for the next three flights will be faster, at approximately one per month or less, assuming, of course, engineers reviewing telemetry can quickly pin down what went wrong and implement fixes to correct the problems.
The huge rocket's launching, known as Integrated Flight Test 9, got underway with a ground-shaking liftoff at 7:37 p.m. EDT from SpaceX's sprawling Boca Chica, Texas, manufacturing and flight facility — Starbase — on the Texas coast.
The mission featured the first use of a previously flown Super Heavy first stage, which flew itself back to capture by giant mechanical arms on the launch tower during the program's seventh test flight in January.
For the program's latest launch, the Super Heavy, powered by 33 methane-fueled Raptor engines generating up to 16 million pounds of thrust, followed the same ascent flight plan as previous missions, propelling the Starship upper stage out of the thick lower atmosphere on an easterly trajectory toward the Straits of Florida.
Equipped with six Raptors of its own, the 160-foot-long Starship separated from its booster about two and a half minutes after liftoff, heading for a suborbital trajectory carrying it toward a planned vertical splashdown in the southern Indian Ocean.
The Super Heavy, meanwhile, used a different method for flipping around for the trip back to the launch site in a bid to save propellants. It was also programmed to fly a much steeper descent than usual to learn more about the thermal and aerodynamic stresses it can safely endure.
"The booster will attempt to fly at a higher angle of attack during its descent," SpaceX said on its website. "By increasing the amount of atmospheric drag on the vehicle, a higher angle of attack can result in a lower descent speed which in turn requires less propellant for the initial landing burn."
"Getting real-world data on how the booster is able to control its flight at this higher angle of attack will contribute to improved performance on future vehicles, including the next generation of Super Heavy," SpaceX said.
As a result of the high-stress tests, SpaceX targeted a splashdown in the Gulf instead of attempting a launch pad capture where critical infrastructure could be damaged in a landing mishap.
As it turned out, that was a good decision.
Launch attempt follows two Starship breakups
Tuesday's launch came on the heels of back-to-back Starship upper stage breakups during the two previous test flights that generated spectacular showers of flaming debris along the flight paths.
Since then, SpaceX engineers have carried out extensive testing and implemented multiple upgrades and improvements to minimize the chances for similar failures. The Federal Aviation Administration, which oversaw both failure investigations, gave SpaceX permission to proceed with IFT-9 last week after wrapping up the IFT-8 review.
"The FAA conducted a comprehensive safety review of the SpaceX Starship Flight 8 mishap and determined that the company has satisfactorily addressed the causes of the mishap, and therefore, the Starship vehicle can return to flight," the agency said in a statement. "The FAA will verify SpaceX implements all corrective actions."
In both of the previous failures, commercial airline traffic in and around the Straits of Florida was held up pending confirmation falling debris was no longer a threat. For the ninth flight, the length of the Aircraft Hazard Area was expanded from about 1,000 statute miles to around 1,840 miles and SpaceX was required to launch the rocket during non-peak air travel periods.
Plans for the moon and Mars
The Super Heavy-Starship rocket is critical to NASA's plans to land astronauts on the moon in the next few years and to Musk's plans to eventually send humans to Mars.
NASA plans to use a variant of the Starship upper stage as a lunar lander in the agency's Artemis program. NASA wants to use its own rocket and crew capsule to ferry astronauts to lunar orbit where the SpaceX lander will be waiting to carry them down to the surface.
The Trump administration wants to cancel NASA's Space Launch System rocket and Orion crew capsule, leaving the future of the Artemis program, as it's currently envisioned, in doubt. For his part, Musk has argued the United States should pass up moon missions, which he called a "distraction," and instead head directly to Mars.
In any case, the Super Heavy-Starship rocket is expected to play a major role in future deep space exploration, regardless of the target. But multiple successful test flights will be needed to demonstrate the safety and reliability needed for astronauts and passengers heading to the moon, Mars or beyond.
In an interview for "CBS Sunday Morning," taped shortly before Tuesday's launch, Musk told correspondent David Pogue, "If we're lucky, we've probably got about a 50% chance of sending ... ships from Earth to Mars at the end of next year. So November, December next year, in about 18 months."
Asked if that timeline was realistic, Musk replied, "Well, I try to give the 50th percentile. ... So you should expect half the time I'm wrong." [See more of the exclusive interview with Musk on "CBS Sunday Morning," Sunday, June 1.]
SpaceX made changes after two catastrophic explosions
The last two Starships, launched Jan. 16 and March 6, both ended with unrelated catastrophic explosions as they neared their planned sub-orbital trajectories.
During the January flight, a propellant leak in an unpressurized "attic" above the Raptor engines led to sustained fires that eventually triggered shutdown of all but one of the spacecraft's engines. Telemetry was lost eight minutes and 20 seconds after launch and moments later, the vehicle broke apart.
"The most probable root cause for the loss of ship was identified as a harmonic response several times stronger in flight than had been seen during testing, which led to increased stress on hardware in the propulsion system," SpaceX said on its website. "The subsequent propellant leaks exceeded the venting capability of the ship's attic area and resulted in sustained fires."
After extensive ground tests, SpaceX made changes to propellant feedlines, and thrust levels and installed additional vents and a new nitrogen purge system in the attic to reduce the potential for fire.
Those fixes appeared to work as expected during the Starship's eighth test flight in March, but the upper stage again suffered a catastrophic failure. This time around, the Starship suffered a "hardware failure in one of the upper stage Raptor engines that resulted in inadvertent propellant mixing and ignition," SpaceX said on its website.
To fix the problem, upper stage Raptors now feature a new nitrogen purge system, improvements to the propellant drain system and tighter joints in key areas. SpaceX is also developing an improved Raptor engine that will eliminate several failure modes.
|
SpaceX loses contact with its Starship on 9th test flight after last 2 went down in flames
After spectacular back-to-back upper stage failures in January and March, SpaceX launched another Super Heavy-Starship rocket Tuesday on the program's ninth test flight, but ran into fresh problems that resulted in the loss of both stages before they could carry out controlled descents to splashdown.
The Super Heavy first stage, following a deliberately steeper, more stressful descent trajectory toward splashdown near the Texas Gulf Coast, suffered a catastrophic failure at the moment its engines reignited for what would have been a relatively gentle splashdown.
SpaceX confirmed the stage had been lost, but given the extreme nature of the testing, the loss was not an out-of-the-blue surprise. The Starship upper stage, meanwhile, managed to make it into its planned suborbital trajectory after an apparently flawless performance from its six engines.
But a few minutes later, a door on the side of the rocket failed to open, preventing the planned release of simulated Starlink satellites in a test of the rocket's Pez-like deployment system.
With that test deferred to a future flight, SpaceX engineers hoped to reignite a single Raptor engine to test its start-up capability in space. But an apparent propellant leak put the spacecraft into a slow spin that ruled out the restart and a controlled reentry and splashdown.
The Starship has to enter at the right angle and in a precise orientation to survive reentry heating and aerodynamic "loads." Entering in a spin doomed the Starship to a catastrophic breakup.
"Starship made it to the scheduled ship engine cutoff, so big improvement over last flight!" SpaceX founder and CEO Elon Musk wrote on X. "Also, no significant loss of heat shield tiles during ascent. Leaks caused loss of main tank pressure during the coast and re-entry phase. Lot of good data to review."
He added that the Super Heavy launch cadence for the next three flights will be faster, at approximately one per month or less, assuming, of course, engineers reviewing telemetry can quickly pin down what went wrong and implement fixes to correct the problems.
The huge rocket's launching, known as Integrated Flight Test 9, got underway with a ground-shaking liftoff at 7:37 p.m. EDT from SpaceX's sprawling Boca Chica, Texas, manufacturing and flight facility — Starbase — on the Texas coast.
The mission featured the first use of a previously flown Super Heavy first stage, which flew itself back to capture by giant mechanical arms on the launch tower during the program's seventh test flight in January.
For the program's latest launch, the Super Heavy, powered by 33 methane-fueled Raptor engines generating up to 16 million pounds of thrust, followed the same ascent flight plan as previous missions, propelling the Starship upper stage out of the thick lower atmosphere on an easterly trajectory toward the Straits of Florida.
Equipped with six Raptors of its own, the 160-foot-long Starship separated from its booster about two and a half minutes after liftoff, heading for a suborbital trajectory carrying it toward a planned vertical splashdown in the southern Indian Ocean.
The Super Heavy, meanwhile, used a different method for flipping around for the trip back to the launch site in a bid to save propellants. It was also programmed to fly a much steeper descent than usual to learn more about the thermal and aerodynamic stresses it can safely endure.
"The booster will attempt to fly at a higher angle of attack during its descent," SpaceX said on its website. "By increasing the amount of atmospheric drag on the vehicle, a higher angle of attack can result in a lower descent speed which in turn requires less propellant for the initial landing burn."
"Getting real-world data on how the booster is able to control its flight at this higher angle of attack will contribute to improved performance on future vehicles, including the next generation of Super Heavy," SpaceX said.
As a result of the high-stress tests, SpaceX targeted a splashdown in the Gulf instead of attempting a launch pad capture where critical infrastructure could be damaged in a landing mishap.
As it turned out, that was a good decision.
Launch attempt follows two Starship breakups
Tuesday's launch came on the heels of back-to-back Starship upper stage breakups during the two previous test flights that generated spectacular showers of flaming debris along the flight paths.
Since then, SpaceX engineers have carried out extensive testing and implemented multiple upgrades and improvements to minimize the chances for similar failures. The Federal Aviation Administration, which oversaw both failure investigations, gave SpaceX permission to proceed with IFT-9 last week after wrapping up the IFT-8 review.
"The FAA conducted a comprehensive safety review of the SpaceX Starship Flight 8 mishap and determined that the company has satisfactorily addressed the causes of the mishap, and therefore, the Starship vehicle can return to flight," the agency said in a statement. "The FAA will verify SpaceX implements all corrective actions."
In both of the previous failures, commercial airline traffic in and around the Straits of Florida was held up pending confirmation falling debris was no longer a threat. For the ninth flight, the length of the Aircraft Hazard Area was expanded from about 1,000 statute miles to around 1,840 miles and SpaceX was required to launch the rocket during non-peak air travel periods.
Plans for the moon and Mars
The Super Heavy-Starship rocket is critical to NASA's plans to land astronauts on the moon in the next few years and to Musk's plans to eventually send humans to Mars.
NASA plans to use a variant of the Starship upper stage as a lunar lander in the agency's Artemis program. NASA wants to use its own rocket and crew capsule to ferry astronauts to lunar orbit where the SpaceX lander will be waiting to carry them down to the surface.
The Trump administration wants to cancel NASA's Space Launch System rocket and Orion crew capsule, leaving the future of the Artemis program, as it's currently envisioned, in doubt. For his part, Musk has argued the United States should pass up moon missions, which he called a "distraction," and instead head directly to Mars.
In any case, the Super Heavy-Starship rocket is expected to play a major role in future deep space exploration, regardless of the target. But multiple successful test flights will be needed to demonstrate the safety and reliability needed for astronauts and passengers heading to the moon, Mars or beyond.
In an interview for "CBS Sunday Morning," taped shortly before Tuesday's launch, Musk told correspondent David Pogue, "If we're lucky, we've probably got about a 50% chance of sending ... ships from Earth to Mars at the end of next year. So November, December next year, in about 18 months."
Asked if that timeline was realistic, Musk replied, "Well, I try to give the 50th percentile. ... So you should expect half the time I'm wrong." [See more of the exclusive interview with Musk on "CBS Sunday Morning," Sunday, June 1.]
SpaceX made changes after two catastrophic explosions
The last two Starships, launched Jan. 16 and March 6, both ended with unrelated catastrophic explosions as they neared their planned sub-orbital trajectories.
During the January flight, a propellant leak in an unpressurized "attic" above the Raptor engines led to sustained fires that eventually triggered shutdown of all but one of the spacecraft's engines. Telemetry was lost eight minutes and 20 seconds after launch and moments later, the vehicle broke apart.
"The most probable root cause for the loss of ship was identified as a harmonic response several times stronger in flight than had been seen during testing, which led to increased stress on hardware in the propulsion system," SpaceX said on its website. "The subsequent propellant leaks exceeded the venting capability of the ship's attic area and resulted in sustained fires."
After extensive ground tests, SpaceX made changes to propellant feedlines, and thrust levels and installed additional vents and a new nitrogen purge system in the attic to reduce the potential for fire.
Those fixes appeared to work as expected during the Starship's eighth test flight in March, but the upper stage again suffered a catastrophic failure. This time around, the Starship suffered a "hardware failure in one of the upper stage Raptor engines that resulted in inadvertent propellant mixing and ignition," SpaceX said on its website.
To fix the problem, upper stage Raptors now feature a new nitrogen purge system, improvements to the propellant drain system and tighter joints in key areas. SpaceX is also developing an improved Raptor engine that will eliminate several failure modes.
|
考点1: “Starship”应该译为“星舰”, SpaceX公司研发的飞船。
考点2: “splashdown”应译为“溅落”,表示太空船落入海里。
考点3: “Starbase“应译为“星港”。
考点4: “angle of attack”应译为“迎角”,太空术语。
考点5: “IFT”应译为“星舰轨道试飞任务”。
考点6:“CBS”应译为“哥伦比亚广播公司”或保留CBS。
考点7:“nitrogen purge system”应译为“氮气吹扫系统”。
|
bf687
|
新闻资讯
|
新闻报道
|
56
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
孕期是生命早期1000天中的第一个重要阶段。为了完成妊娠过程,孕妇的生理及代谢状态发生了较大适应性改变,总体营养需求增加,以满足孕期母亲生殖器官变化和胎儿的生长发育,并为产后泌乳储备营养。
然而,随着经济发展和生活方式的改变,膳食摄入不合理、体重增长过多以及微量元素缺乏在部分孕妇人群中依然存在,这些问题都会影响母婴双方近期和远期健康。
防宝宝畸形,叶酸不能少
《健康生活方式核心要点(2023)》中建议孕妇适当补充叶酸、铁等微量营养素。妊娠早期缺乏叶酸可引起死胎、流产、脑和神经管畸形,还可导致口唇、心血管、骨骼等器官畸形。妊娠中晚期缺乏叶酸可能导致巨幼红细胞性贫血。建议女性从备孕前3个月开始每天补充0.4毫克叶酸。此外,还建议孕期常吃富含叶酸的食物,如动物肝脏、蛋类、豆类、绿叶蔬菜、水果及坚果等,但因为食物中的叶酸加热易分解,影响吸收利用,因此不能代替叶酸补充剂。
防孕期贫血,补铁是关键
孕中期的女性对铁的需求量增加,如果铁的摄入量不足,可能会发生缺铁性贫血,这对孕妇和胎儿都会造成不利影响。铁的推荐摄入量为:孕早期20毫克/天、孕中期24毫克/天、孕晚期29毫克/天。孕妇可每周吃1-2次动物内脏或血,也可在医生指导下服用膳食铁补充剂。也可以适量摄入含维生素C较多的水果和蔬菜,例如鲜枣、甜椒等,有助于提高膳食铁的吸收与利用率。
保骨骼健康,补钙很重要
孕期缺钙,女性可能会出现骨质疏松、腿抽筋和牙齿松动的情况,对胎儿也会带来比较严重的影响,如大脑发育迟缓、先天性佝偻病等。奶类是钙良好的来源,从备孕期开始建议女性每日摄入奶类300克,孕中期增加至每日300-500克,如果不习惯喝牛奶,选择酸奶也是可以的,或是吃一些虾皮、海鱼、豆制品等含钙丰富的食物。维生素D可以促进钙吸收,对胎儿骨、牙齿的形成非常重要。孕妇平均每天晒太阳10-20分钟所合成的维生素D基本上能够满足身体的需要。
保胎儿发育,碘盐海产少不了
孕妇缺碘将影响胎儿发育及智力,严重的还会引起先兆流产、早产、胚胎停育和死胎等情况。我国地理环境普遍缺碘,因而国家采用食盐加碘的方式进行强化。孕期对碘的需要量增加,按每天摄入5克碘盐计算,孕妇每周还应额外摄入1-2次富含碘的海产食品,如海带、紫菜、贝类等。
孕妇营养的补充,不仅要充足,还要适当,既要避免营养不良,也要防止营养过剩。践行健康的生活方式,做到食物多样,总量控制,践行“三减”也很重要。
|
孕期是生命早期1000天中的第一个重要阶段。为了完成妊娠过程,孕妇的生理及代谢状态发生了较大适应性改变,总体营养需求增加,以满足孕期母亲生殖器官变化和胎儿的生长发育,并为产后泌乳储备营养。
然而,随着经济发展和生活方式的改变,膳食摄入不合理、体重增长过多以及微量元素缺乏在部分孕妇人群中依然存在,这些问题都会影响母婴双方近期和远期健康。
防宝宝畸形,叶酸不能少
《健康生活方式核心要点(2023)》中建议孕妇适当补充叶酸、铁等微量营养素。妊娠早期缺乏叶酸可引起死胎、流产、脑和神经管畸形,还可导致口唇、心血管、骨骼等器官畸形。妊娠中晚期缺乏叶酸可能导致巨幼红细胞性贫血。建议女性从备孕前3个月开始每天补充0.4毫克叶酸。此外,还建议孕期常吃富含叶酸的食物,如动物肝脏、蛋类、豆类、绿叶蔬菜、水果及坚果等,但因为食物中的叶酸加热易分解,影响吸收利用,因此不能代替叶酸补充剂。
防孕期贫血,补铁是关键
孕中期的女性对铁的需求量增加,如果铁的摄入量不足,可能会发生缺铁性贫血,这对孕妇和胎儿都会造成不利影响。铁的推荐摄入量为:孕早期20毫克/天、孕中期24毫克/天、孕晚期29毫克/天。孕妇可每周吃1-2次动物内脏或血,也可在医生指导下服用膳食铁补充剂。也可以适量摄入含维生素C较多的水果和蔬菜,例如鲜枣、甜椒等,有助于提高膳食铁的吸收与利用率。
保骨骼健康,补钙很重要
孕期缺钙,女性可能会出现骨质疏松、腿抽筋和牙齿松动的情况,对胎儿也会带来比较严重的影响,如大脑发育迟缓、先天性佝偻病等。奶类是钙良好的来源,从备孕期开始建议女性每日摄入奶类300克,孕中期增加至每日300-500克,如果不习惯喝牛奶,选择酸奶也是可以的,或是吃一些虾皮、海鱼、豆制品等含钙丰富的食物。维生素D可以促进钙吸收,对胎儿骨、牙齿的形成非常重要。孕妇平均每天晒太阳10-20分钟所合成的维生素D基本上能够满足身体的需要。
保胎儿发育,碘盐海产少不了
孕妇缺碘将影响胎儿发育及智力,严重的还会引起先兆流产、早产、胚胎停育和死胎等情况。我国地理环境普遍缺碘,因而国家采用食盐加碘的方式进行强化。孕期对碘的需要量增加,按每天摄入5克碘盐计算,孕妇每周还应额外摄入1-2次富含碘的海产食品,如海带、紫菜、贝类等。
孕妇营养的补充,不仅要充足,还要适当,既要避免营养不良,也要防止营养过剩。践行健康的生活方式,做到食物多样,总量控制,践行“三减”也很重要。
|
考点1:《健康生活方式核心要点(2023)》需译为 The Core Points for a Healthy Lifestyle (2023)。
考点2:心血管 需译为 cardiovascular,不可译为heart。
考点3:内脏 可译为offal或organ,不可译为liver。
考点4:“也可以适量摄入含维生素C较多的水果和蔬菜”必须翻译完整,不能漏译任何内容,特别是“适量”。
考点5:“孕妇平均每天晒太阳10-20分钟所合成的维生素D基本上能够满足身体的需要”必须翻译完整,不能漏译任何内容,特别是“孕妇”。
考点6:“采用食盐加碘的方式进行强化”必须翻译完整,不能漏译任何内容。
考点7:紫菜 可译为 laver,不可译为“seaweed”。
考点8:三减 译为 Three Reductions (reducing salt, oil, and sugar) 或 Three Reductions。
|
c0501
|
垂类场景
|
食品健康
|
8
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
研究材料包括以下内容:
1. 人口统计问卷 :调查年龄、性别、母语、飞行经验和训练阶段;
2. 罗森伯格自尊量表(Rosenberg, 1979) :该量表包含10个陈述项,参与者需使用4点李克特量表(1=“强烈不同意”至4=“强烈同意”)表明对每项陈述的认同程度。其中一半条目为反向计分。该量表最高得分为40分,得分越高,表明自尊水平越高。
3. 洛克等人(Locke et al., 1984)自我效能量表的修订版 :洛克等人的原量表要求受试者在1分钟内尽可能多地列出一个常见物品的用途,随后填写自我效能量表,测量两个维度—— 幅度 (即受试者能列出的用途数量,最多16项,在A栏中以“是/否”记录)和 强度 (在B栏中,受试者需以0%-100%表示对自己表现的确定程度)。自我效能分数为所有强度得分的总和,分数越高,表明自我效能强度越高。
在本研究中,自我效能的测量调整为评估参与者对飞行能力的信心,具体为能否在20英尺的增量范围内(±20英尺、±40英尺等)保持目标高度(1,000英尺)。与洛克等人的方法一致,本研究设置了8个幅度测量项(如“保持1,000英尺±20英尺”“保持1,000英尺±40英尺”等),要求受试者回答“能”或“不能”(是/否),而强度测量则要求受试者以0%-100%表示对自己表现的确定程度。自我效能分数为所有强度得分的总和(与洛克等人1984年的方法一致)。
4. 反馈语气感知问题 :题目为“请指出您在飞行中接收到的反馈语气(仅圈选一项):积极、中性、消极。”
5. 飞行数据参考表 :列出Frasca飞行模拟器操作的目标高度、空速和航线程序;
6. 三种音频反馈脚本(积极、中性、消极语气) :具体描述如下。
音频反馈脚本由一名英语母语的女性录制。所有脚本内容相同,仅根据参与者在基线飞行的下风段表现调整两个关键词(以 粗体 标出)。脚本内容为:
> “下风段的目标高度为1,000英尺;您的高度 偏低/偏高 。保持下风段1,000英尺的高度非常重要。”
为确保脚本语气尽可能接近研究的三种目标语气,进行了预实验。共使用6种录音脚本,每种语气(积极、中性、消极)各2种。对于每种语气,第一种脚本用于飞行员在下风段高度偏高的情况(脚本中提示“您的高度 偏高 ”),第二种脚本用于高度偏低的情况(提示“您的高度 偏低 ”)。
6种脚本变体的制作流程如下:首先招募4名女性朗读脚本,并由6名参与者(3名英语母语者,平均年龄27.67岁,SD=3.79;3名非英语母语者,平均年龄24.00岁,SD=1.73)进行语气评估(判断为“积极”“中性”或“消极”)。最终选择评估一致性最高的女性录音(Fleiss’ Kappa显示评估者间一致性较高,κ=0.763,95% CI [0.615, 0.910],p<0.001)。
飞行模拟设置
实验在UNSW Bankstown飞行操作中心的Frasca飞行模拟器中进行。该模拟器配置为模拟Diamond DA40飞机,并获准用于飞行训练。模拟天气条件为 CAVOK (晴空无云,能见度极佳),风向多变(风速5节),湍流等级设为5/10(模拟轻至中度湍流)。两名合格飞行教官测试后确认该设置能反映需参与者努力保持高度的气象条件,且符合晴天常见湍流情况。模拟过程中未发生故障,燃油消耗导致的重量变化正常模拟。飞机模拟重量设为1,150公斤(模拟两人满载燃油)。
反馈录音通过Apple MacBook Pro播放,参与者使用Beyerdynamic DT770 PRO监听耳机收听。播放前调整音量至清晰可听,参与者可自行调节。模拟器配备Garmin G1000电子航电系统,可记录气压高度等飞行参数。飞行数据通过SD卡导出至Microsoft Excel分析,计算平均高度偏差以确定反馈类型(偏高/偏低)。
实验流程
参与者从UNSW飞行操作中心招募,在理论课上介绍研究目的(仅提及“反馈对表现的影响”,未说明语气因素),自愿报名者安排实验时间。实验当天,参与者按到场顺序随机分配至三种反馈语气组之一,随后填写三份问卷(人口统计、自我效能、自尊)。完成后,提供 飞行数据参考表 (含关键性能参数,如起飞速度、爬升速度、下风段目标高度、进近和着陆速度),供全程参考。
接着进行 熟悉飞行 (约15分钟),模拟从Bankstown机场29L跑道起飞,帮助参与者适应模拟器。随后,参与者接受指令,在Bankstown机场11R跑道完成一次右航线全停着陆,需遵循检查单和UNSW发布的飞行程序。模拟天气条件同前(CAVOK、风向多变5节、气压1013 hPa、湍流等级5)。
基线飞行结束后,提取下风段(起点S33.942 E150.987,终点S33.925 E150.964)的高度数据,计算平均高度偏差,按随机分配的反馈语气组播放预录反馈。随后进行 测试飞行 (再次完成11R跑道右航线全停着陆)。结束后,参与者回答反馈语气感知问题,获赠20美元礼品卡致谢。全程耗时约1小时。
反馈语气对表现的影响
在分析语气对飞行表现的影响前,先检验分组随机化效果。以年龄和基线飞行平均绝对高度偏差为变量进行单因素方差分析(α=0.05),结果显示三组无显著差异(年龄:F(2,35)=0.76, p=0.476, η²=0.04)。
为控制飞行经验的影响,计算飞行总时长与基线飞行高度偏差的Pearson相关系数(α=0.05),结果无显著相关性(r(36)=-0.207, p=0.212)。
随后进行3×2×2(反馈语气×自我效能×自尊)组间方差分析。反馈语气分三水平(积极/中性/消极),自我效能和自尊各分高低两组(按中位数划分)。在满足正态性和方差齐性条件下(α=0.05),结果显示 反馈语气主效应显著 (见表2),无其他主效应或交互作用。LSD事后检验表明,积极语气组(M=23.18, SD=16.07)的高度偏差显著大于中性组(M=9.55, SD=4.78; p=0.009)和消极组(M=11.46, SD=8.11; p=0.025),中性与消极组无差异(p=0.700)。
由于并非所有参与者准确感知分配的语气(见表3),进一步以 感知语气 (而非实际语气)为自变量进行二次方差分析,结果无显著主效应或交互作用(见表4),表明 感知语气不影响表现 。
语言背景可能影响语气解读,但卡方检验显示母语与非母语飞行员对语气的准确判断比例相近(约58%,见表5)。
|
研究材料包括以下内容:
1. 人口统计问卷 :调查年龄、性别、母语、飞行经验和训练阶段;
2. 罗森伯格自尊量表(Rosenberg, 1979) :该量表包含10个陈述项,参与者需使用4点李克特量表(1=“强烈不同意”至4=“强烈同意”)表明对每项陈述的认同程度。其中一半条目为反向计分。该量表最高得分为40分,得分越高,表明自尊水平越高。
3. 洛克等人(Locke et al., 1984)自我效能量表的修订版 :洛克等人的原量表要求受试者在1分钟内尽可能多地列出一个常见物品的用途,随后填写自我效能量表,测量两个维度—— 幅度 (即受试者能列出的用途数量,最多16项,在A栏中以“是/否”记录)和 强度 (在B栏中,受试者需以0%-100%表示对自己表现的确定程度)。自我效能分数为所有强度得分的总和,分数越高,表明自我效能强度越高。
在本研究中,自我效能的测量调整为评估参与者对飞行能力的信心,具体为能否在20英尺的增量范围内(±20英尺、±40英尺等)保持目标高度(1,000英尺)。与洛克等人的方法一致,本研究设置了8个幅度测量项(如“保持1,000英尺±20英尺”“保持1,000英尺±40英尺”等),要求受试者回答“能”或“不能”(是/否),而强度测量则要求受试者以0%-100%表示对自己表现的确定程度。自我效能分数为所有强度得分的总和(与洛克等人1984年的方法一致)。
4. 反馈语气感知问题 :题目为“请指出您在飞行中接收到的反馈语气(仅圈选一项):积极、中性、消极。”
5. 飞行数据参考表 :列出Frasca飞行模拟器操作的目标高度、空速和航线程序;
6. 三种音频反馈脚本(积极、中性、消极语气) :具体描述如下。
音频反馈脚本由一名英语母语的女性录制。所有脚本内容相同,仅根据参与者在基线飞行的下风段表现调整两个关键词(以 粗体 标出)。脚本内容为:
> “下风段的目标高度为1,000英尺;您的高度 偏低/偏高 。保持下风段1,000英尺的高度非常重要。”
为确保脚本语气尽可能接近研究的三种目标语气,进行了预实验。共使用6种录音脚本,每种语气(积极、中性、消极)各2种。对于每种语气,第一种脚本用于飞行员在下风段高度偏高的情况(脚本中提示“您的高度 偏高 ”),第二种脚本用于高度偏低的情况(提示“您的高度 偏低 ”)。
6种脚本变体的制作流程如下:首先招募4名女性朗读脚本,并由6名参与者(3名英语母语者,平均年龄27.67岁,SD=3.79;3名非英语母语者,平均年龄24.00岁,SD=1.73)进行语气评估(判断为“积极”“中性”或“消极”)。最终选择评估一致性最高的女性录音(Fleiss’ Kappa显示评估者间一致性较高,κ=0.763,95% CI [0.615, 0.910],p<0.001)。
飞行模拟设置
实验在UNSW Bankstown飞行操作中心的Frasca飞行模拟器中进行。该模拟器配置为模拟Diamond DA40飞机,并获准用于飞行训练。模拟天气条件为 CAVOK (晴空无云,能见度极佳),风向多变(风速5节),湍流等级设为5/10(模拟轻至中度湍流)。两名合格飞行教官测试后确认该设置能反映需参与者努力保持高度的气象条件,且符合晴天常见湍流情况。模拟过程中未发生故障,燃油消耗导致的重量变化正常模拟。飞机模拟重量设为1,150公斤(模拟两人满载燃油)。
反馈录音通过Apple MacBook Pro播放,参与者使用Beyerdynamic DT770 PRO监听耳机收听。播放前调整音量至清晰可听,参与者可自行调节。模拟器配备Garmin G1000电子航电系统,可记录气压高度等飞行参数。飞行数据通过SD卡导出至Microsoft Excel分析,计算平均高度偏差以确定反馈类型(偏高/偏低)。
实验流程
参与者从UNSW飞行操作中心招募,在理论课上介绍研究目的(仅提及“反馈对表现的影响”,未说明语气因素),自愿报名者安排实验时间。实验当天,参与者按到场顺序随机分配至三种反馈语气组之一,随后填写三份问卷(人口统计、自我效能、自尊)。完成后,提供 飞行数据参考表 (含关键性能参数,如起飞速度、爬升速度、下风段目标高度、进近和着陆速度),供全程参考。
接着进行 熟悉飞行 (约15分钟),模拟从Bankstown机场29L跑道起飞,帮助参与者适应模拟器。随后,参与者接受指令,在Bankstown机场11R跑道完成一次右航线全停着陆,需遵循检查单和UNSW发布的飞行程序。模拟天气条件同前(CAVOK、风向多变5节、气压1013 hPa、湍流等级5)。
基线飞行结束后,提取下风段(起点S33.942 E150.987,终点S33.925 E150.964)的高度数据,计算平均高度偏差,按随机分配的反馈语气组播放预录反馈。随后进行 测试飞行 (再次完成11R跑道右航线全停着陆)。结束后,参与者回答反馈语气感知问题,获赠20美元礼品卡致谢。全程耗时约1小时。
反馈语气对表现的影响
在分析语气对飞行表现的影响前,先检验分组随机化效果。以年龄和基线飞行平均绝对高度偏差为变量进行单因素方差分析(α=0.05),结果显示三组无显著差异(年龄:F(2,35)=0.76, p=0.476, η²=0.04)。
为控制飞行经验的影响,计算飞行总时长与基线飞行高度偏差的Pearson相关系数(α=0.05),结果无显著相关性(r(36)=-0.207, p=0.212)。
随后进行3×2×2(反馈语气×自我效能×自尊)组间方差分析。反馈语气分三水平(积极/中性/消极),自我效能和自尊各分高低两组(按中位数划分)。在满足正态性和方差齐性条件下(α=0.05),结果显示 反馈语气主效应显著 (见表2),无其他主效应或交互作用。LSD事后检验表明,积极语气组(M=23.18, SD=16.07)的高度偏差显著大于中性组(M=9.55, SD=4.78; p=0.009)和消极组(M=11.46, SD=8.11; p=0.025),中性与消极组无差异(p=0.700)。
由于并非所有参与者准确感知分配的语气(见表3),进一步以 感知语气 (而非实际语气)为自变量进行二次方差分析,结果无显著主效应或交互作用(见表4),表明 感知语气不影响表现 。
语言背景可能影响语气解读,但卡方检验显示母语与非母语飞行员对语气的准确判断比例相近(约58%,见表5)。
|
考点1. "反向计分"推荐翻译为"Reverse-Scored (Items)"
考点2. "监听耳机"推荐翻译为"Aviation Headset"
考点3. "高度偏差"推荐翻译为"Altitude Deviation"
考点4. "积极/中性/消极语气"推荐翻译为"Positive/Neutral/Negative Tone"
考点5. "飞行数据参考表"推荐翻译为"Flight Data Reference Sheet"
考点6. “二次方差分析”推荐翻译为“a second ANOVA”
|
c0af4
|
学术论文
|
社会科学
|
137
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Chapter ⅠGENERAL PRINCIPLES (Articles 1-3)
Article 1
The Belt and Road News Network (hereinafter referred to as “BRNN”) is jointly established by media organizations from countries and regions involved in the Belt and Road Initiative, aiming to strengthen understanding, friendship and cooperation, and form a normalized mechanism for collaboration.
Article 2
To achieve shared growth through discussion and collaboration, BRNN shall adhere to the principles of mutual respect, equal consultation, mutual assistance and benefits, and voluntarism, as well as uphold the Silk Road spirit characterized by “peace and cooperation, openness and inclusiveness, mutual learning and mutual benefit.” BRNN will give full play to the media's social role, tap into the unique advantages of media in communication, and build an open, cooperative platform. BRNN is committed to facilitating policy coordination, facility connectivity, unimpeded trade, financial integration, and people-to-people bonds among countries and regions jointly building the Belt and Road. BRNN is also committed to turning the Belt and Road into a road of peace, prosperity, openness, green development, innovation and togetherness for different civilizations. BRNN promotes the development of international relations, better understanding and mutual trust among all countries involved, as well as cultural and friendly exchanges between the people who live there, and contributes to regional economic prosperity, world peace and development.
Article 3
The BRNN headquarters is located in Beijing, China.
Chapter Ⅱ PRIMARY FUNCTIONS (Articles 4-7)
Article 4
To build an open and cooperative platform. BRNN is committed to creating a platform for exchange and cooperation among media organizations of countries and regions involved in the Belt and Road Initiative, establishing operational mechanisms, and boosting project cooperation. BRNN shall enhance multilateral cooperation among its members, push forward the integration of resources, convergence of channels, combination of advantages, information aggregation, and marketing collaboration, as well as facilitate personnel exchanges, mutual assistance in reporting, content exchanges, technology exchanges, and mutual sharing of experiences. BRNN will set up a collaborative mechanism for sub-sectors such as photo and information, radio, audiovisual and documentary.
Article 5
To promote mutual assistance, collaboration and exchange. BRNN shall, on the basis of extensive consultations, organize mutual visits among its members for better understanding and cooperation. It shall hold media cooperation forums and dialogues under the theme of the Belt and Road Initiative, arrange activities such as joint reporting trips and award programs, and organize seminars, training workshops and programs. The purpose of these events is to promote dialogue and idea exchange, encourage media innovation, and to jointly combat the everyday challenges of the media industry.
Article 6
To carry out pragmatic cooperation in innovative ways. Based on respect and copyright protection, BRNN shall strengthen content cooperation exchange and information sharing among its members, following their agreement. Furthermore, BRNN shall establish a website and an aggregated platform for the distribution of news information, providing members with free content uploading and sharing services in text, image, audio and video mediums, and will thus facilitate their news content cooperation directly and conveniently. It will support and help media organizations to cooperate in areas such as page layout, channel creation, time swap, and news coverage. BRNN shall also deepen operational cooperation including exhibitions, filming co-production, copyright trading, and advertisement exchange to enhance practical cooperation, promote resource integration and achieve shared interests. The BRNN shall enhance technological collaboration, in such ways as carrying out themed activities, providing specific services, conducting cooperative research on big data and artificial intelligence, and improving technologies in the field of new media, especially the cutting-edge technologies of social media.
Article 7
To strengthen research on major issues. BRNN shall gather information, investigate, and conduct policy research on important, pressing and difficult issues relating to the joint construction of the Belt and Road Initiative. BRNN shall pool this wisdom and propose specific, constructive, and proactive suggestions on jointly building the Belt and Road, the purpose being to provide intellectual and public support for joint construction of the Belt and Road.
Chapter III Organization (Articles 8-13)
Article 8
BRNN membership. Members must meet the following requirements:
1. They must voluntarily join the Network;
2. They must support the Charter;
3. They must have certain influence in the country and region where they are located.
Article 9
The council of BRNN is responsible for making decisions on key issues regarding the development of BRNN. The council consists members worldwide and has a chair assumed by People’s Daily (China). The chair is responsible for convening council meetings and work coordination meetings. It shall also supervise and push forward the implementation of the major work of BRNN by means of communication and coordination activities. Each council shall have a term of two years.
Article 10
The secretariat of BRNN shall be the permanent office of BRNN. The secretariat is located at People's Daily, and is responsible for daily operations, fundraising, activity organization, and implementation of the decisions of the council.
Article 11
BRNN adopts an invitation system for membership and authorizes the secretariat to undertake the related work. The secretariat will invite media organizations that meet the membership requirements, and media organizations can join BRNN after submitting relevant application materials. The secretariat shall report the accession of new members to the council.
Article 12
Any member who wishes to withdraw from BRNN shall inform the secretariat in writing, at which point the secretariat will report to the council. If a member commits a serious violation of the Charter, the member may be removed by council vote.
Article 13
Members of BRNN are granted the following rights and obligations.
1. Members’ rights: Obtain various services provided by BRNN; participate in activities organized by BRNN, such as annual meetings and forums; receive materials from BRNN such as briefings; enjoy the freedom to join or withdraw from BRNN.
2. Members’ obligations: Comply with the Charter; actively participate in activities held by BRNN; protect the rights, interests and the reputation of BRNN.
Chapter Ⅳ Operational Mechanism (Articles 14-16)
Article 14
BRNN shall organize meetings every two years for members to enhance partnerships, and take measures to boost cooperation through consultation and discussion.
Article 15
BRNN shall hold the council meeting aperiodically, as needed, to study the major issues surrounding the development of BRNN. The council may propose relevant guiding initiatives for reference after consultations among the participating council members.
Article 16
BRNN provides the following services to its members:
1. Organize cooperation and exchange activities. BRNN shall organize visits among members and other visiting activities, annual meetings and forums for members, as well as the signing of bilateral and multilateral cooperative agreements.
2. Provide a news service platform. BRNN shall establish a website and a mobile platform for collecting and distributing information for members.
3. Promote resource sharing among members. BRNN shall build the Belt and Road database with open access to all members to provide news materials for members. BRNN shall facilitate copyright cooperation and the swap of advertisement resources among members.
4. Organize joint reporting trips. BRNN shall organize cross-border joint reporting trips themed on the Belt and Road for its members to enhance their communication strength and influence.
5. Design professional training programs. Based on common needs and choices of members, BRNN shall organize various training programs of different durations of time and different topics in different regions. The content may include news reporting, media convergence and technology.
6. Provide technological support for media. BRNN shall provide technological support in news coverage, media development, transformation and upgrading in line with the practical needs of members.
7. Set up Belt and Road media awards. BRNN shall set up the Belt and Road all-media prize with clear standards for selection and expert judges recommended by member media organizations through consultation to guarantee fairness. Strive to make it a global news award with international influence.
8. Provide other tailored and customized services according to Members’ needs.
Chapter V Supplementary Provisions (Articles 17-20)
Article 17
The charter shall take effect on the approval of the council.
Article 18
Any amendment to the Charter shall be decided by the council after discussion.
Article 19
The secretariat reserves the right of final interpretation of the Charter.
Article 20
The charter was originally written in Chinese, from which the English version has been translated. In case of any discrepancy between the Chinese and the English versions of the above Articles, the Chinese version shall prevail.
|
Chapter ⅠGENERAL PRINCIPLES (Articles 1-3)
Article 1
The Belt and Road News Network (hereinafter referred to as “BRNN”) is jointly established by media organizations from countries and regions involved in the Belt and Road Initiative, aiming to strengthen understanding, friendship and cooperation, and form a normalized mechanism for collaboration.
Article 2
To achieve shared growth through discussion and collaboration, BRNN shall adhere to the principles of mutual respect, equal consultation, mutual assistance and benefits, and voluntarism, as well as uphold the Silk Road spirit characterized by “peace and cooperation, openness and inclusiveness, mutual learning and mutual benefit.” BRNN will give full play to the media's social role, tap into the unique advantages of media in communication, and build an open, cooperative platform. BRNN is committed to facilitating policy coordination, facility connectivity, unimpeded trade, financial integration, and people-to-people bonds among countries and regions jointly building the Belt and Road. BRNN is also committed to turning the Belt and Road into a road of peace, prosperity, openness, green development, innovation and togetherness for different civilizations. BRNN promotes the development of international relations, better understanding and mutual trust among all countries involved, as well as cultural and friendly exchanges between the people who live there, and contributes to regional economic prosperity, world peace and development.
Article 3
The BRNN headquarters is located in Beijing, China.
Chapter Ⅱ PRIMARY FUNCTIONS (Articles 4-7)
Article 4
To build an open and cooperative platform. BRNN is committed to creating a platform for exchange and cooperation among media organizations of countries and regions involved in the Belt and Road Initiative, establishing operational mechanisms, and boosting project cooperation. BRNN shall enhance multilateral cooperation among its members, push forward the integration of resources, convergence of channels, combination of advantages, information aggregation, and marketing collaboration, as well as facilitate personnel exchanges, mutual assistance in reporting, content exchanges, technology exchanges, and mutual sharing of experiences. BRNN will set up a collaborative mechanism for sub-sectors such as photo and information, radio, audiovisual and documentary.
Article 5
To promote mutual assistance, collaboration and exchange. BRNN shall, on the basis of extensive consultations, organize mutual visits among its members for better understanding and cooperation. It shall hold media cooperation forums and dialogues under the theme of the Belt and Road Initiative, arrange activities such as joint reporting trips and award programs, and organize seminars, training workshops and programs. The purpose of these events is to promote dialogue and idea exchange, encourage media innovation, and to jointly combat the everyday challenges of the media industry.
Article 6
To carry out pragmatic cooperation in innovative ways. Based on respect and copyright protection, BRNN shall strengthen content cooperation exchange and information sharing among its members, following their agreement. Furthermore, BRNN shall establish a website and an aggregated platform for the distribution of news information, providing members with free content uploading and sharing services in text, image, audio and video mediums, and will thus facilitate their news content cooperation directly and conveniently. It will support and help media organizations to cooperate in areas such as page layout, channel creation, time swap, and news coverage. BRNN shall also deepen operational cooperation including exhibitions, filming co-production, copyright trading, and advertisement exchange to enhance practical cooperation, promote resource integration and achieve shared interests. The BRNN shall enhance technological collaboration, in such ways as carrying out themed activities, providing specific services, conducting cooperative research on big data and artificial intelligence, and improving technologies in the field of new media, especially the cutting-edge technologies of social media.
Article 7
To strengthen research on major issues. BRNN shall gather information, investigate, and conduct policy research on important, pressing and difficult issues relating to the joint construction of the Belt and Road Initiative. BRNN shall pool this wisdom and propose specific, constructive, and proactive suggestions on jointly building the Belt and Road, the purpose being to provide intellectual and public support for joint construction of the Belt and Road.
Chapter III Organization (Articles 8-13)
Article 8
BRNN membership. Members must meet the following requirements:
1. They must voluntarily join the Network;
2. They must support the Charter;
3. They must have certain influence in the country and region where they are located.
Article 9
The council of BRNN is responsible for making decisions on key issues regarding the development of BRNN. The council consists members worldwide and has a chair assumed by People’s Daily (China). The chair is responsible for convening council meetings and work coordination meetings. It shall also supervise and push forward the implementation of the major work of BRNN by means of communication and coordination activities. Each council shall have a term of two years.
Article 10
The secretariat of BRNN shall be the permanent office of BRNN. The secretariat is located at People's Daily, and is responsible for daily operations, fundraising, activity organization, and implementation of the decisions of the council.
Article 11
BRNN adopts an invitation system for membership and authorizes the secretariat to undertake the related work. The secretariat will invite media organizations that meet the membership requirements, and media organizations can join BRNN after submitting relevant application materials. The secretariat shall report the accession of new members to the council.
Article 12
Any member who wishes to withdraw from BRNN shall inform the secretariat in writing, at which point the secretariat will report to the council. If a member commits a serious violation of the Charter, the member may be removed by council vote.
Article 13
Members of BRNN are granted the following rights and obligations.
1. Members’ rights: Obtain various services provided by BRNN; participate in activities organized by BRNN, such as annual meetings and forums; receive materials from BRNN such as briefings; enjoy the freedom to join or withdraw from BRNN.
2. Members’ obligations: Comply with the Charter; actively participate in activities held by BRNN; protect the rights, interests and the reputation of BRNN.
Chapter Ⅳ Operational Mechanism (Articles 14-16)
Article 14
BRNN shall organize meetings every two years for members to enhance partnerships, and take measures to boost cooperation through consultation and discussion.
Article 15
BRNN shall hold the council meeting aperiodically, as needed, to study the major issues surrounding the development of BRNN. The council may propose relevant guiding initiatives for reference after consultations among the participating council members.
Article 16
BRNN provides the following services to its members:
1. Organize cooperation and exchange activities. BRNN shall organize visits among members and other visiting activities, annual meetings and forums for members, as well as the signing of bilateral and multilateral cooperative agreements.
2. Provide a news service platform. BRNN shall establish a website and a mobile platform for collecting and distributing information for members.
3. Promote resource sharing among members. BRNN shall build the Belt and Road database with open access to all members to provide news materials for members. BRNN shall facilitate copyright cooperation and the swap of advertisement resources among members.
4. Organize joint reporting trips. BRNN shall organize cross-border joint reporting trips themed on the Belt and Road for its members to enhance their communication strength and influence.
5. Design professional training programs. Based on common needs and choices of members, BRNN shall organize various training programs of different durations of time and different topics in different regions. The content may include news reporting, media convergence and technology.
6. Provide technological support for media. BRNN shall provide technological support in news coverage, media development, transformation and upgrading in line with the practical needs of members.
7. Set up Belt and Road media awards. BRNN shall set up the Belt and Road all-media prize with clear standards for selection and expert judges recommended by member media organizations through consultation to guarantee fairness. Strive to make it a global news award with international influence.
8. Provide other tailored and customized services according to Members’ needs.
Chapter V Supplementary Provisions (Articles 17-20)
Article 17
The charter shall take effect on the approval of the council.
Article 18
Any amendment to the Charter shall be decided by the council after discussion.
Article 19
The secretariat reserves the right of final interpretation of the Charter.
Article 20
The charter was originally written in Chinese, from which the English version has been translated. In case of any discrepancy between the Chinese and the English versions of the above Articles, the Chinese version shall prevail.
|
考点1:“a normalized mechanism for collaboration”必须译为“常态化协作机制”
考点2: "mutual respect, equal consultation, mutual assistance and benefits, and voluntarism”必须译为“相互尊重、平等协商、互助互利、自主自愿”
考点3:"tap into"推荐翻译为“彰显”
考点4:“better understanding and mutual trust”必须译为“友好交往和文化交流互鉴”
考点5:“countries and regions involved in the Belt and Road Initiative”必须译为“一带一路共建国家”
考点6:“facilitate personnel exchanges, mutual assistance in reporting, content exchanges, technology exchanges, and mutual sharing of experiences”必须译为“人员互访、采访互助、内容互换、技术互学、经验互鉴”
考点7:”audiovisual“必须译为”视听“
考点8:”following their agreement“必须译为”自愿协商“
考点9:” specific, constructive, and proactive“必须译为”针对性、建设性、前瞻性“
考点10:”chair“必须译为”理事长“
考点11:” a mobile platform for collecting and distributing information“必须译为”移动端聚合分发平台“
考点12:” Belt and Road media awards. “推荐翻译为”国际传播“丝路”奖“
|
c1277
|
垂类场景
|
法律
|
142
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
1993年,26岁的王祖贤跟随祖父一起回到安徽舒城老家,为家乡捐资5万元,修建了安徽第一条村建柏油路。乡亲们为了感恩王祖贤,把这条路命名为“祖贤路”。时至今日,祖贤路依然是石岗村的主干道。它见证了中国30年的飞速发展,也见证了一代女神王祖贤的跌宕起伏。
90年代初,王祖贤已经红遍整个亚洲。尤其是在韩国,她和周润发的受欢迎程度,已经盖过了韩国本土明星。韩国大街小巷到处可见王祖贤的海报。有一次韩媒为了拍照,特意堵在王祖贤的活动现场,而王祖贤却悄悄从后台溜走,因此得罪了韩国媒体。
可即便如此,韩国民众对王祖贤的喜爱依旧半分未减。不过王祖贤倒也无所谓,不管是韩媒对自己有意见,还是韩民众追捧热度下降,她也丝毫不以为意。
除了韩国市场,国内的市场同样火热。王祖贤回到台湾拍摄,这一次同时接拍了《灵狐》和《阿婴》。她对《阿婴》这部作品,抱有很高的期望,一直希望带着这部作品上颁奖典礼。所以全身心扑在工作上。结果,忙碌起来她连休息的时间都没有,最后把身体都搞垮了。1990年8月,王祖贤感染肠炎被送去住院。当时她手上还有四部戏在拍,但为了健康着想,不得不推掉这四部戏。正因如此,王祖贤才萌生了退意。加上那一年,她的那部抱有希望的《阿婴》无缘金马奖,王祖贤更是失落万分……
不过就在她的名气冷却时,又在日本市场渐渐火热起来。当时有一个日本的电影杂志,在评选最受欢迎的外国女明星时,王祖贤成为TOP1,一举收获了无数日本影迷。王祖贤的事业得以维持下去。但是王祖贤一直有一个愿望,就是打破“小倩”的标签,让自己能够塑造更多经典角色,在观众心目中留下印象。只是迟迟没能实现这个愿望。就拿91年和成龙合作的《城市猎人》来说,王祖贤虽然是女主角,但依旧没有给人太深刻的印象。
去北京参演《画皮》时,王祖贤感慨很多。她在片场度过了自己25岁的生日。剧组随后去了山西五台山,在这佛门圣地,对王祖贤的心境影响颇深。同时,她也想起了自己的祖籍安徽……
王祖贤这个名字家喻户晓的同时,她的身世也逐渐被更多人知道。王祖贤虽然在台湾出生,但她祖籍在安徽舒城。王家在安徽是书香世家,她的曾祖父王仁峰,是赫赫有名的人物。
王仁峰早年受到中山先生的影响,从而投身革命,加入同盟会。1910年南京起义时,王仁峰也是成员之一,他擅长制造弹药。可当时条件有限,王仁峰的每一次实验都置身危险之中。一次制作炸弹时,刚好是春天,天气比较潮湿,有几根雷管失灵,王仁峰和几位战友用锤子轻轻敲打,结果炸弹瞬间爆炸了!
王仁峰手臂被炸伤,巨大的爆炸声还吸引了清军,他们只能匆匆躲在一个草垛里。就这么躲了三天,这才获救。可因为没有及时得到救治,这条胳膊也保不住了。从此以后他便有了“王一手”的名号。他为革命事业立下汗马功劳。
后来,他又回乡创办了舒城中学。至今学校仍有他的雕像。就在王祖贤出生后三个月,曾祖父便去世了。王祖贤的爷爷王国璠继承了这份事业,之后在舒城担任教师。1949年与家人定居台湾。爷爷一直以来的梦想,就是回到内地。他还以为有生之年这个梦想实现不了,谁知,孙女帮他实现了这个心愿。
|
1993年,26岁的王祖贤跟随祖父一起回到安徽舒城老家,为家乡捐资5万元,修建了安徽第一条村建柏油路。乡亲们为了感恩王祖贤,把这条路命名为“祖贤路”。时至今日,祖贤路依然是石岗村的主干道。它见证了中国30年的飞速发展,也见证了一代女神王祖贤的跌宕起伏。
90年代初,王祖贤已经红遍整个亚洲。尤其是在韩国,她和周润发的受欢迎程度,已经盖过了韩国本土明星。韩国大街小巷到处可见王祖贤的海报。有一次韩媒为了拍照,特意堵在王祖贤的活动现场,而王祖贤却悄悄从后台溜走,因此得罪了韩国媒体。
可即便如此,韩国民众对王祖贤的喜爱依旧半分未减。不过王祖贤倒也无所谓,不管是韩媒对自己有意见,还是韩民众追捧热度下降,她也丝毫不以为意。
除了韩国市场,国内的市场同样火热。王祖贤回到台湾拍摄,这一次同时接拍了《灵狐》和《阿婴》。她对《阿婴》这部作品,抱有很高的期望,一直希望带着这部作品上颁奖典礼。所以全身心扑在工作上。结果,忙碌起来她连休息的时间都没有,最后把身体都搞垮了。1990年8月,王祖贤感染肠炎被送去住院。当时她手上还有四部戏在拍,但为了健康着想,不得不推掉这四部戏。正因如此,王祖贤才萌生了退意。加上那一年,她的那部抱有希望的《阿婴》无缘金马奖,王祖贤更是失落万分……
不过就在她的名气冷却时,又在日本市场渐渐火热起来。当时有一个日本的电影杂志,在评选最受欢迎的外国女明星时,王祖贤成为TOP1,一举收获了无数日本影迷。王祖贤的事业得以维持下去。但是王祖贤一直有一个愿望,就是打破“小倩”的标签,让自己能够塑造更多经典角色,在观众心目中留下印象。只是迟迟没能实现这个愿望。就拿91年和成龙合作的《城市猎人》来说,王祖贤虽然是女主角,但依旧没有给人太深刻的印象。
去北京参演《画皮》时,王祖贤感慨很多。她在片场度过了自己25岁的生日。剧组随后去了山西五台山,在这佛门圣地,对王祖贤的心境影响颇深。同时,她也想起了自己的祖籍安徽……
王祖贤这个名字家喻户晓的同时,她的身世也逐渐被更多人知道。王祖贤虽然在台湾出生,但她祖籍在安徽舒城。王家在安徽是书香世家,她的曾祖父王仁峰,是赫赫有名的人物。
王仁峰早年受到中山先生的影响,从而投身革命,加入同盟会。1910年南京起义时,王仁峰也是成员之一,他擅长制造弹药。可当时条件有限,王仁峰的每一次实验都置身危险之中。一次制作炸弹时,刚好是春天,天气比较潮湿,有几根雷管失灵,王仁峰和几位战友用锤子轻轻敲打,结果炸弹瞬间爆炸了!
王仁峰手臂被炸伤,巨大的爆炸声还吸引了清军,他们只能匆匆躲在一个草垛里。就这么躲了三天,这才获救。可因为没有及时得到救治,这条胳膊也保不住了。从此以后他便有了“王一手”的名号。他为革命事业立下汗马功劳。
后来,他又回乡创办了舒城中学。至今学校仍有他的雕像。就在王祖贤出生后三个月,曾祖父便去世了。王祖贤的爷爷王国璠继承了这份事业,之后在舒城担任教师。1949年与家人定居台湾。爷爷一直以来的梦想,就是回到内地。他还以为有生之年这个梦想实现不了,谁知,孙女帮他实现了这个心愿。
|
考点1:“扑在工作上”推荐译为“threw herself into her work”。
考点2:“无缘金马奖”推荐译为“was snubbed by the Golden Horse Awards”。
考点3:“心境‘’推荐译为“state of mind”。
考点4:“书香世家‘’推荐译为“a family of scholars”或a scholarly family都可以;
考点5:“王一手”推荐译为“One-armed Wang”。
考点6:”立下汗马功劳”推荐译为“made outstanding contributions”。
考点7:《灵狐》应翻译为“Fox Legend”,
考点8:《阿婴》应翻译为“Ming Ghost”
|
c1411
|
文学艺术
|
传记
|
41
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
任务
体质人类学阐述人类生物学上的发生及其进化方面的课题;确定人类同其他灵长类动物之间的差别;还要给各人种之间体质上的差异进行分类。
现代体质人类学开始形成于19世纪前半期,自从达尔文《物种起源》于1859年发表后,进化论对体质人类学的发展产生巨大推动作用。达尔文的另一著作《人类的由来及性别选择》(The Descent of Man and Selection in Relation to Sex, 1871)也是一本重要论著,第一次提出了有关人类起源的有科学根据的假说。到1859∼1900年之际,人类学者承认,人种发展进化的历史可溯至几十万年以前,而不是像过去所想的只有几千年。
20世纪早期,科学家揭示出遗传学上的各种原理和ABO血型,这有助于体质人类学者们对不同人种之间的变异和差别进行研究,同时由于相对的和绝对的年代测定方法的发展,也使得人类学者们能够确定人类化石和其他人造器物的年龄。
研究重点
人种进化的过程。这方面包括发现过去人类化石遗存并加以描述以及分析这些骨化石明显特点的重要意义,因为遗传物质是进化史高度可靠的“指示器”,所以,对于不同人种之间和人类与其他动物之间的遗传密码、染色体、线粒体、去氧核糖核酸进行比较分析,已证明在广泛的人类学研究领域是一项行之有效的新方法。
体质人类学对于至少可以上溯200万年这一段时期内的人类体质方面的进化情况,提出了很多解释。
分类
根据所探讨的问题和所采用的研究方法的不同,传统上体质人类学再被细分成灵长目学、古人类学、种族人类学、人种测量学等分支学科。
灵长目学主要通过比较人与其他灵长类动物在身体构造和行为上的异同来探讨人类在自然界的位置。
古人类学通过考古发掘出来的古代人类骨骼、古人类及与之近似的动物化石来研究人类的起源和进化、演变过程。
种族人类学主要研究种族分类、种族的起源和演变、种族体征差异的意义。不同种族的人体测量学主要对人类各种群的体质进行测量,对各种族的肤色、发型、头型和体质进行分类和比较研究。随着科学研究的深入发展,体质人类学不断同有关学科相结合,又产生了诸如优生学、营养人类学、医药人类学、分子人类学等边缘分支学科。
意义
体质人类学对人们客观地认识自身,扫除迷信,反对种族歧视和种族压迫,改善人们的卫生健康状况,促进社会经济繁荣发展等方面起着十分重要的作用。
发展历程
中国的体质人类学的萌芽可以上溯到2500年前战国时代的中医经典著作《黄帝内经》,该书记载了不同地域人类的体质特征,骨骼和内脏器官度量等方面的资料。
汉代以后,随着中西交通的发展,中国文献中对不同体质特征的人群记载也日益增多,反映了对人类体质特征的初步观察。
北宋时期的王惟一(公元1026年)著有《铜人腧穴针灸图经》,其所铸造的经络铜人是世界上最早最精巧的人体模型。刘昉(公元1150年)等的《幼幼新书》最早记录了先天性畸形的资料。
南宋末年,宋慈(约1247年)的《洗冤集录》包含有体质人类学的萌芽。
明代的王圻、王思义编写的《三才图会》记载有对人类五官形态的分类。这些虽然不是真正意义上的体质人类学研究,但却是对人类体质研究的早期萌芽。
现代体质人类学是在19、20世纪之交开始从国外传入我国的。体质人类学在中国的百年发展历史可以大致分为四个阶段,即19、20世纪之交至20世纪20年代末的传入和接受时期,20世纪30年代至1949年的本土化时期,1949年至1976年的曲折发展时期,20世纪70年代末以来的纵深发展时期。
|
任务
体质人类学阐述人类生物学上的发生及其进化方面的课题;确定人类同其他灵长类动物之间的差别;还要给各人种之间体质上的差异进行分类。
现代体质人类学开始形成于19世纪前半期,自从达尔文《物种起源》于1859年发表后,进化论对体质人类学的发展产生巨大推动作用。达尔文的另一著作《人类的由来及性别选择》(The Descent of Man and Selection in Relation to Sex, 1871)也是一本重要论著,第一次提出了有关人类起源的有科学根据的假说。到1859∼1900年之际,人类学者承认,人种发展进化的历史可溯至几十万年以前,而不是像过去所想的只有几千年。
20世纪早期,科学家揭示出遗传学上的各种原理和ABO血型,这有助于体质人类学者们对不同人种之间的变异和差别进行研究,同时由于相对的和绝对的年代测定方法的发展,也使得人类学者们能够确定人类化石和其他人造器物的年龄。
研究重点
人种进化的过程。这方面包括发现过去人类化石遗存并加以描述以及分析这些骨化石明显特点的重要意义,因为遗传物质是进化史高度可靠的“指示器”,所以,对于不同人种之间和人类与其他动物之间的遗传密码、染色体、线粒体、去氧核糖核酸进行比较分析,已证明在广泛的人类学研究领域是一项行之有效的新方法。
体质人类学对于至少可以上溯200万年这一段时期内的人类体质方面的进化情况,提出了很多解释。
分类
根据所探讨的问题和所采用的研究方法的不同,传统上体质人类学再被细分成灵长目学、古人类学、种族人类学、人种测量学等分支学科。
灵长目学主要通过比较人与其他灵长类动物在身体构造和行为上的异同来探讨人类在自然界的位置。
古人类学通过考古发掘出来的古代人类骨骼、古人类及与之近似的动物化石来研究人类的起源和进化、演变过程。
种族人类学主要研究种族分类、种族的起源和演变、种族体征差异的意义。不同种族的人体测量学主要对人类各种群的体质进行测量,对各种族的肤色、发型、头型和体质进行分类和比较研究。随着科学研究的深入发展,体质人类学不断同有关学科相结合,又产生了诸如优生学、营养人类学、医药人类学、分子人类学等边缘分支学科。
意义
体质人类学对人们客观地认识自身,扫除迷信,反对种族歧视和种族压迫,改善人们的卫生健康状况,促进社会经济繁荣发展等方面起着十分重要的作用。
发展历程
中国的体质人类学的萌芽可以上溯到2500年前战国时代的中医经典著作《黄帝内经》,该书记载了不同地域人类的体质特征,骨骼和内脏器官度量等方面的资料。
汉代以后,随着中西交通的发展,中国文献中对不同体质特征的人群记载也日益增多,反映了对人类体质特征的初步观察。
北宋时期的王惟一(公元1026年)著有《铜人腧穴针灸图经》,其所铸造的经络铜人是世界上最早最精巧的人体模型。刘昉(公元1150年)等的《幼幼新书》最早记录了先天性畸形的资料。
南宋末年,宋慈(约1247年)的《洗冤集录》包含有体质人类学的萌芽。
明代的王圻、王思义编写的《三才图会》记载有对人类五官形态的分类。这些虽然不是真正意义上的体质人类学研究,但却是对人类体质研究的早期萌芽。
现代体质人类学是在19、20世纪之交开始从国外传入我国的。体质人类学在中国的百年发展历史可以大致分为四个阶段,即19、20世纪之交至20世纪20年代末的传入和接受时期,20世纪30年代至1949年的本土化时期,1949年至1976年的曲折发展时期,20世纪70年代末以来的纵深发展时期。
|
考点1:《铜人腧穴针灸图经》 应译为 "Illustrated Manual of Acupuncture Points on Bronze Figures"
考点 2:《经络铜人》 应译为 "Bronze Acupuncture Figure"
考点 3:《幼幼新书》 应译为 "Newly Compiled Book for the Care of Infants"
考点4:《洗冤集录》应译为“Collected Cases of Injustice Rectified”
考点5:《三才图会》应译为“Sancai Tuhui”
|
c332b
|
学术论文
|
社会科学
|
93
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
特朗普对华日韩25%关税:贸易保护主义的全球冲击波
引言:单边主义的回归
2025年7月7日,华盛顿的夏日骄阳炙烤着白宫南草坪,而美国总统特朗普在社交媒体上投下的一枚"关税炸弹",让全球金融市场瞬间降温。这位以"美国优先"为口号的前总统,在重返椭圆形办公室半年后,宣布自8月1日起对日本和韩国所有输美产品征收25%的惩罚性关税,理由是"两国长期对美存在巨额贸易逆差,已威胁美国经济安全"。这一决定不仅使美日韩三边关系降至冰点,更引发了全球贸易体系的剧烈震荡——道琼斯工业指数当日暴跌422点,日元对美元汇率创三年来最大单日跌幅,而丰田、三星等跨国巨头的市值一夜蒸发超500亿美元。
特朗普在致日本首相石破茂和韩国总统李在明的信件中冷酷地写道:"25%这一数字远远低于消除我们与贵国之间贸易逆差所需的水平。"这种近乎最后通牒的语气,揭示了此次关税政策的本质——不是简单的贸易平衡工具,而是美国重塑全球产业链的战略武器。当白宫同时宣布将"对等关税"暂缓期延长至8月1日时,外界终于明白:这不是谈判的筹码,而是单边行动的预告。
政策解构:关税大棒的三重逻辑
特朗普政府的关税政策构建在一套看似自洽却充满矛盾的逻辑体系之上。最表层的是贸易逆差论,美国商务部数据显示,2024年美对日贸易逆差达678亿美元,对韩逆差582亿美元,合计占美国全球贸易逆差的18%。但深入分析可见,逆差主要集中在汽车(日本占美进口汽车市场份额34%)和半导体(韩国占美芯片进口47%)领域,而美国在农产品、能源和服务贸易上对华韩保持顺差。将特定行业失衡夸大为"国家安全威胁",暴露了数据背后的政治算计。
更深层的产业回流战略体现在政策细节中:特朗普明确表示"在美国境内建厂的公司无需缴纳此项关税"。这种"关税+补贴"的组合拳,实质是逼迫丰田、现代等企业将亚洲产能转移至美国。美国财政部长贝森特毫不掩饰地表示:"这将创造至少50万个制造业岗位",却对这些岗位背后的政府补贴成本(预计年均230亿美元)讳莫如深。韩国产业通商资源部测算显示,若三星将西安半导体工厂部分产能转移至亚利桑那州,生产成本将上升37%。
最具争议的是盟友施压逻辑。特朗普政府打破了美国战后对盟友的"关税豁免传统",将日韩剧变为与中国、印度同等的关税适用对象。白宫官员私下透露,此举旨在"测试盟友在经济主权上的让步底线",为后续逼迫日韩在半导体出口管制、5G建设等议题上配合美国铺路。这种"经济杠杆化"外交,使美日韩安全同盟与经济利益产生剧烈撕扯——驻日美军70%的后勤补给依赖日本企业,而韩国尹锡悦政府刚宣布增加12%国防预算以配合美国印太战略。
|
特朗普对华日韩25%关税:贸易保护主义的全球冲击波
引言:单边主义的回归
2025年7月7日,华盛顿的夏日骄阳炙烤着白宫南草坪,而美国总统特朗普在社交媒体上投下的一枚"关税炸弹",让全球金融市场瞬间降温。这位以"美国优先"为口号的前总统,在重返椭圆形办公室半年后,宣布自8月1日起对日本和韩国所有输美产品征收25%的惩罚性关税,理由是"两国长期对美存在巨额贸易逆差,已威胁美国经济安全"。这一决定不仅使美日韩三边关系降至冰点,更引发了全球贸易体系的剧烈震荡——道琼斯工业指数当日暴跌422点,日元对美元汇率创三年来最大单日跌幅,而丰田、三星等跨国巨头的市值一夜蒸发超500亿美元。
特朗普在致日本首相石破茂和韩国总统李在明的信件中冷酷地写道:"25%这一数字远远低于消除我们与贵国之间贸易逆差所需的水平。"这种近乎最后通牒的语气,揭示了此次关税政策的本质——不是简单的贸易平衡工具,而是美国重塑全球产业链的战略武器。当白宫同时宣布将"对等关税"暂缓期延长至8月1日时,外界终于明白:这不是谈判的筹码,而是单边行动的预告。
政策解构:关税大棒的三重逻辑
特朗普政府的关税政策构建在一套看似自洽却充满矛盾的逻辑体系之上。最表层的是贸易逆差论,美国商务部数据显示,2024年美对日贸易逆差达678亿美元,对韩逆差582亿美元,合计占美国全球贸易逆差的18%。但深入分析可见,逆差主要集中在汽车(日本占美进口汽车市场份额34%)和半导体(韩国占美芯片进口47%)领域,而美国在农产品、能源和服务贸易上对华韩保持顺差。将特定行业失衡夸大为"国家安全威胁",暴露了数据背后的政治算计。
更深层的产业回流战略体现在政策细节中:特朗普明确表示"在美国境内建厂的公司无需缴纳此项关税"。这种"关税+补贴"的组合拳,实质是逼迫丰田、现代等企业将亚洲产能转移至美国。美国财政部长贝森特毫不掩饰地表示:"这将创造至少50万个制造业岗位",却对这些岗位背后的政府补贴成本(预计年均230亿美元)讳莫如深。韩国产业通商资源部测算显示,若三星将西安半导体工厂部分产能转移至亚利桑那州,生产成本将上升37%。
最具争议的是盟友施压逻辑。特朗普政府打破了美国战后对盟友的"关税豁免传统",将日韩剧变为与中国、印度同等的关税适用对象。白宫官员私下透露,此举旨在"测试盟友在经济主权上的让步底线",为后续逼迫日韩在半导体出口管制、5G建设等议题上配合美国铺路。这种"经济杠杆化"外交,使美日韩安全同盟与经济利益产生剧烈撕扯——驻日美军70%的后勤补给依赖日本企业,而韩国尹锡悦政府刚宣布增加12%国防预算以配合美国印太战略。
|
考点1: “石破茂”应译为“Shigeru Ishiba / Ishiba Shigeru”,人名。
考点2:“李在明”应译为“Lee Jae-myung”
考点3: “财政部长贝森特”应译为“Treasury Secretary Bessent”,人名和官职。
考点4:“关税+补贴”译文需避免保留“+”,建议把“+”意译为“and”这种能体现出并列关系的表达
|
cae16
|
新闻资讯
|
新闻报道
|
57
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
自2018年安徽高考英语新题型 “任务型阅读”揭晓已有四年了,虽也是阅读,但其解题思路发生了变化。面对新的提醒,许多学生感觉无从下手。其实这样一个新的题型,对教师还是对学生都是一个新的挑战。如何有效地了解和掌握它的答题要求和技巧,适应考试的新变化,成为我们关注的焦点。
任务型读写的特点:
任务型阅读是语言运用类的试题,考察学生把握文章的篇章结构,获得直接信息,和综合处理信息的能力,符合新课程标准的要求及增加主观试题这个考试方向。它要求考生在阅读完一段材料后,能比较清楚地把握整篇文章的结构,较好地分析作者的观点和意图,并进行准确的表达。考生要能够获得直接信息,分析、总结信息,进而转换信息。
任务型阅读文篇的题材是多种多样的,可以是说明文,记叙文或议论文。从表面上看,任务型阅读是考查学生的单词拼写能力,但是和单句的单词拼写有着极大的不同,任务型阅读考查是是考生对语篇的分析能力,它要求学生解剖文章的“脉络”,辨认语言结构,内容,事物发展的顺序和程序。学生答题是找寻信息的过程,同事也是筛选,归纳和表述信息进行的过程。也就是说不仅要求获得信息,还要求科学地表述信息。在解题的过程中,阅读能力和书面表达能力同时发挥着作用。任务型阅读试题实际上考查的能力主要为:1.获得信息的能力,即理解文章意思的能力;2.组织信息的能力,即分析文章结构的能力; 3.逻辑排序的能力, 即或以时间, 或以地点; 或以情节等加以排序的能力; 4.抽象概括的能力,即提炼中心思想,或对某些事实和现象加以命名的能力; 5.意义转述的能力, 即用不同形式表达同一意思的能力等。
任务型读写由两部分组成:阅读材料和表格。它要求考生阅读所给材料,填写完成表格中空缺的信息。阅读材料为一篇300字左右的文章,在文章后设10道小题,每小题1分,满分10分,所有题目都呈现表格中。要求学生在阅读理解的基础上,对信息进行加工并以表格的形式把加工后的信息准确有序地表达出来,表格中每空只填一个词。而空格的类型有三大类:1. 筛选类: 属于基础题,只要读懂文章大意, 就可以直接找到答案, 一般为原词。2. 加工整合类:要根据已获得的信息进行第二次加工,根据句型结构变化和语法要求,在分析原文句子的基础上,结合题目,填写出相关的不同词性的派生词,同义词或近义词等等。 3.总结概括类:难度较大,要能概括标题,段落大意,文章目的,结论等,考察综合表达的能力,需要推理;还有些需要进行归纳总结或转述句子。此外,在填空是务必要注意单词大小写,单复数,词性等。
任务型阅读的解题思路:
一、通读短文知大意(通读全文)
读懂文章是解题的第一环节,也是关键的一步。读懂了短文,才能顺利地在表格中填出相关信息。平时训练中要提醒学生了解文章结构以及段落之间的逻辑关系,关注主题句,把握文章主旨。
二、理解结构是基础(理解结构)
结构指的是文章的结构和表格的结构。理清短文主体结构,了解短文的写作思路和线索结构,有助于加深对篇章内容的理解,同事短文的结构往往也是很重要的命题线索。
|
自2018年安徽高考英语新题型 “任务型阅读”揭晓已有四年了,虽也是阅读,但其解题思路发生了变化。面对新的提醒,许多学生感觉无从下手。其实这样一个新的题型,对教师还是对学生都是一个新的挑战。如何有效地了解和掌握它的答题要求和技巧,适应考试的新变化,成为我们关注的焦点。
任务型读写的特点:
任务型阅读是语言运用类的试题,考察学生把握文章的篇章结构,获得直接信息,和综合处理信息的能力,符合新课程标准的要求及增加主观试题这个考试方向。它要求考生在阅读完一段材料后,能比较清楚地把握整篇文章的结构,较好地分析作者的观点和意图,并进行准确的表达。考生要能够获得直接信息,分析、总结信息,进而转换信息。
任务型阅读文篇的题材是多种多样的,可以是说明文,记叙文或议论文。从表面上看,任务型阅读是考查学生的单词拼写能力,但是和单句的单词拼写有着极大的不同,任务型阅读考查是是考生对语篇的分析能力,它要求学生解剖文章的“脉络”,辨认语言结构,内容,事物发展的顺序和程序。学生答题是找寻信息的过程,同事也是筛选,归纳和表述信息进行的过程。也就是说不仅要求获得信息,还要求科学地表述信息。在解题的过程中,阅读能力和书面表达能力同时发挥着作用。任务型阅读试题实际上考查的能力主要为:1.获得信息的能力,即理解文章意思的能力;2.组织信息的能力,即分析文章结构的能力; 3.逻辑排序的能力, 即或以时间, 或以地点; 或以情节等加以排序的能力; 4.抽象概括的能力,即提炼中心思想,或对某些事实和现象加以命名的能力; 5.意义转述的能力, 即用不同形式表达同一意思的能力等。
任务型读写由两部分组成:阅读材料和表格。它要求考生阅读所给材料,填写完成表格中空缺的信息。阅读材料为一篇300字左右的文章,在文章后设10道小题,每小题1分,满分10分,所有题目都呈现表格中。要求学生在阅读理解的基础上,对信息进行加工并以表格的形式把加工后的信息准确有序地表达出来,表格中每空只填一个词。而空格的类型有三大类:1. 筛选类: 属于基础题,只要读懂文章大意, 就可以直接找到答案, 一般为原词。2. 加工整合类:要根据已获得的信息进行第二次加工,根据句型结构变化和语法要求,在分析原文句子的基础上,结合题目,填写出相关的不同词性的派生词,同义词或近义词等等。 3.总结概括类:难度较大,要能概括标题,段落大意,文章目的,结论等,考察综合表达的能力,需要推理;还有些需要进行归纳总结或转述句子。此外,在填空是务必要注意单词大小写,单复数,词性等。
任务型阅读的解题思路:
一、通读短文知大意(通读全文)
读懂文章是解题的第一环节,也是关键的一步。读懂了短文,才能顺利地在表格中填出相关信息。平时训练中要提醒学生了解文章结构以及段落之间的逻辑关系,关注主题句,把握文章主旨。
二、理解结构是基础(理解结构)
结构指的是文章的结构和表格的结构。理清短文主体结构,了解短文的写作思路和线索结构,有助于加深对篇章内容的理解,同事短文的结构往往也是很重要的命题线索。
|
考点1:"新课程标准" 应译为 "the New Curriculum Standards"
考点2:"篇章结构" 应译为 "textual structure/discourse structure"
考点3:"获得直接信息" 应译为 "extract direct information/obtain explicit information"
考点4:"综合处理信息的能力" 应译为 "ability to synthesise and process information"
考点5:"信息加工" 应译为 "information processing"
考点6:"解剖文章的“脉络”" 应译为 "analyse the thread of the text/dissect the text structure"
考点7:"段落大意" 应译为 "main idea of the paragraph/paragraph gist"
考点8:"文章主旨" 应译为 "main theme of the article/central idea of the text"
考点9:"通读全文" 应译为 "read through the whole passage"
考点10:"命题线索" 应译为 "clues for test item design/question-setting cues"
|
cc8c0
|
垂类场景
|
教育
|
77
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
1 INTRODUCTION TO THE UNESCO SITE
1.1 Location
Country: Italy
Geographical Coordinates (Central point of the site):
Longitude: 45°94’84.84’’ N
Latitude: 12°17’53.03’’ E
Located in the Northeast of Italy, in the Veneto Region, “Le colline del Prosecco e Valdobbiadene” was recognized as a World Heritage Site in 2019. The site is located entirely in the Province of Treviso.
It includes the municipalities of Vidor, Miane, Farra di Soligo, Pieve di Soligo, Follina, Cison di Valmarino, Refrontolo, San Pietro di Feletto, Revine Lago, Tarzo, Vittorio Veneto, and partial territories of Valdobbiadene.
The buffer zone includes the municipalities of Susegana, Conegliano, and San Vendemiano. Instead, the territories of the municipalities of Segusino, Moriago della Battaglia, Sernaglia della Battaglia, Santa Lucia di Piave, Mareno di Piave, Vazzola, Codogne, San Fior, Godega Sant’Urbano, Colle Umberto, Cordignano, Cappella are part of the commitment zone.
1.2 Boundaries and the Zones that Make up the Site
Core zone: 9.197,45 ha
Buffer zone: 9.769,80 ha
Total: 18.967,25 ha
The site includes a core zone of 9,197.45 hectares surrounded by a buffer zone (Fig. 4) of 9,769.80 hectares, ensuring the protection of its ecological and cultural integrity. When identifying these zones, the peculiar geographical and historical individuality was taken into consideration, and not the administrative limits of the Province. In fact, the site is an example of a process of adaptation to a fraught and fragile peripheral territory in which a rural and cultural evolutionary landscape has been generated strongly characterized by viticulture. The physical nature of the site is interlinked with the historical facts, and the agricultural, social, and cultural characteristics developed on the property over time.
The tectonic hogback hill system has been, and will continue to be, a conditioning element of the territory characteristics and land use limitations. As a result of these agricultural limitations, a highly adaptive agricultural landscape has developed on ciglionature, which over time has proven to be the most efficient way to protect the soil and make the most of the hills' soil and climate characteristics. As can be seen in the Fig. 4 a commitment zone is introduced. This zone is useful in terms of site management, which, in the southern part of the site, takes the form of highly urbanized territories where services and infrastructure that logistically support the site are located, and accommodates the population working for or within the site.
Based on the parameters described in the previous paragraphs the perimeters of the site are defined as
North: the valleys separate the hills from the foothills
West: the Piave River
Southwest: the bottom of the foothills to the great Po Valley
1.3 Characteristics of the Site
1.3.1 Geomorphology
The Conegliano Valdobbiadene region is characterized by steep hogback hills formed through tectonic processes, alongside karst (typical landri) formations that dominate its southern zones. These hogbacks consist of stratified marl and rocky layers, shaped over millions of years by tectonic activity and erosion. Landri landscapes, which feature karst formations created by water erosion on softer rocks, further diversify the terrain.
The dynamic topography has necessitated innovative agricultural practices. The ciglioni terraces, a hallmark of this region, demonstrate both functionality and aesthetics, solidifying the landscape’s recognition as a cultural and agricultural landmark. These terraces not only mitigate soil erosion but also facilitate the cultivation of high-quality Prosecco grapes, leveraging the region’s unique geological conditions.
Also, the area has a unique geomorphological structure, making it a popular building material for centuries. The inhabitants used native stones for grinding stones, millstones, architraves, sills, columns, and statues for villa gardens. The paths along these structures offer stunning views and interactive experiences, making them sacred sites. Devotional climbs and Via Crucis, such as S. Augusta and Colle S. Paolo in Vittorio Veneto, S. Gallo in Soligo, and S. Francesco da Paola in Revine, are merely extensions of previous pagan worship sites. The valleys between the hogbacks are often uncontaminated and crossed by streams.
1.3.2 The Hydrographical System
As can be seen in the hydrological map (Fig. 6) the area has significant water resources, including small glacial lakes, and numerous fluvial incisions like the Lierza, Crevada (Fig. 7), and Cervano streams which are very important since they characterize the length of the hogback face, rivers such as the Soligo and Monticano, and a considerable number of springs. The presence of numerous waterways allowed for a varied range of morphologies, such as unique landscapes and waterfalls (Fig. 8). The recursion of underlying morphological structures, highlighted by erosion, also contributes to landscape similarity. Groundwater springs and numerous streams ensure water supply, allowing for agricultural processing and industrial activities like weaving. The unique landscapes and morphologies of the area are influenced by the recursion of erosion-influenced underlying structures.
1.3.3 Climate and Vegetation
The Köppen climatic classification classifies the site as Cfa, with C representing a temperate-hot and rainy climate, f indicating the presence of rainy precipitation, and for areas with hotter months exceeding 22°C. The average annual temperature is 12.6°C, and the average precipitation is 1099mm/year.
The area’s climate and geomorphology foster a rich diversity of vegetation. The vegetation is influenced by the area's climatic and geomorphological characteristics, such as steep, thickly wooded north-facing slopes and genus south-facing slopes colonized by thermophile forests and cultivations. The cool slopes are mainly populated by chestnut tree plant associations, with seasonal changes in appearance, particularly in spring with the flowering of yellow dogwood and white wild cherry trees (Fig. 12). The warmer slopes, characterized by manna ash or Querco-ostryeto, represent a less evolved portion due to disturbances and transformations. The southern portions are characterized by juniper and cypress trees, while the warmer wooded areas take on an interesting appearance in spring with dogwood flowering and many wild or previously cultivated fruit trees.
The forestry vegetation of the site is primarily classified as Orno-ostrieto tipico, a type of calcareous sedimentary substrate characterized by numerous species, mostly Fraxinus ornus, Ostrya carpinifoli, and Quercus pubescens. This forestry type is widespread in the Veneto region's Piedmont area and pre-alpine zone and is influenced by zones with more evolved soil structures or less wind exposure. The typical Ostrio-querceto is one of the more prevalent forestry types in the area, characterized by Quercus pubescens and a higher number of grass species.
The fundamental component of a landscape is crucial for defense against erosion, reducing hydrogeological risk, and improving soil structure and habitats for various species. The presence of a uniform forest cover in upper slopes controls water flow in lower elevations, while in lower hills, it forms a fundamental component of the landscape matrix (Fig. 13-14). The combination of terraced vineyards and woodlands in the proposed property can be understood as an integrated landscape system, with each element playing an essential role in the site's value. The widespread presence of forests and human-based viticulture contributes to the system's sustainability.
1.3.3.1 The flora of the Conegliano Valdobbiadene DOCG territory vineyards
The Conegliano-Valdobbiadene DOCG area has been entrusted with optimizing and disseminating the biodiversity heritage of the UNESCO site. For the UNESCO nomination, an interactive guide, titled “Guida alla flora dei vigneti del territorio DOCG Conegliano-Valdobbiadene,” was developed as part of a project coordinated by the University of Padua in partnership with the University of Trieste. The guide includes about 450 species surveyed in the vineyards and semi-natural habitats adjacent to them.
This is not an exhaustive inventory of the site's flora, but a basic representation of the main plant species found along the roads of the vineyards. The area has natural and semi-natural habitats that are closely linked to the management of viticulture sites. Many of these habitats are recognized by the European Union under the Habitats Directive as key elements in biodiversity conservation. Priority habitat 6110, characterized by calcareous rupicolous grasslands, meadows, and forests, is a prime example of these habitats.
Habitat 6210, semi-natural dry grassland, and bush-covered strips on calcareous substrates are considered a priority if they host important orchids. This habitat includes herbaceous or partly bushy formations, from dry to mesophilic, whose persistence is guaranteed by low-intensity management practices such as occasional mowing. The typical species of these formations is Bromus erectus, flanked by Bromus condensatus in areas with drier conditions. Other species of other families vary by the dryness of the conditions.
1.3.4 Agrobiodiversity
The site’s landscape is characterized by the continuous relation between semi-natural habitats and agricultural areas, affecting vegetational and agricultural biodiversity. Such a relationship is crucial for the ecosystem's functionality and its services, including soil formation, pathogen control, pollination, and cultural, recreational, and educational valorization. Farmers in hills are increasingly integrating production with biodiversity, recognizing the long-term maintenance of environmental assets. A study comparing vineyards in complex landscapes to vineyards in simple landscapes found the former performing better since semi-natural habitats contributed to increased plant biodiversity. This effect is even enhanced when vineyards are in contact with a forest or meadow since this provides access to species living in semi-natural habitats to the vineyard and thus increases the specific richness. The most interesting aspects of the area's biodiversity are linked to the semi-natural habitats, with arid meadows home to interesting plant species like orchids, common yet typical species such as Anthyllis vulneraria, Artemisia alba, Bromus erectus, Bromus condensatus, Chrysopogon gryllus, Helianthemum nummularium, Koeleria pyramidata, Galium verum and Galium lucidum (see Fig 20), and vineyards with species typical of ruderal environments or permanent meadows used for haymaking.
Management practices applied to vineyards play a fundamental role in determining biodiversity patterns. Semi-natural habitats occurring in the area show multifunctionality, providing crucial ecosystem services, such as enhancing crop ecological stability, reducing pesticide use, increasing the populations of pollinators, reducing weeds, decreasing herbicide dispersion, and reducing erosion in cropland. The simplification of the landscape and conversion of semi-natural habitats can lead to the rapid depletion of the environmental heritage of the area. However, this trend can very well be reversed by favoring sustainable practices.
Equally important for the territory's ecological responsiveness is the increase in forest formations, which are generally more extensive due to the abandonment of previously cultivated surfaces. The BTC analysis confirms that the expansion of the forest corresponds to higher values in 2007 than those in 1960 and, therefore, the growth in the system's capacity to produce plant biomass and resist external perturbations.
Despite the challenges, the area has great potential to meet future challenges in a landscape complicated by global changes that increasingly require the reconciliation of biodiversity and production. The analysis underlines the importance of sustainable practices for protecting the environment and promoting biodiversity.
|
1 INTRODUCTION TO THE UNESCO SITE
1.1 Location
Country: Italy
Geographical Coordinates (Central point of the site):
Longitude: 45°94’84.84’’ N
Latitude: 12°17’53.03’’ E
Located in the Northeast of Italy, in the Veneto Region, “Le colline del Prosecco e Valdobbiadene” was recognized as a World Heritage Site in 2019. The site is located entirely in the Province of Treviso.
It includes the municipalities of Vidor, Miane, Farra di Soligo, Pieve di Soligo, Follina, Cison di Valmarino, Refrontolo, San Pietro di Feletto, Revine Lago, Tarzo, Vittorio Veneto, and partial territories of Valdobbiadene.
The buffer zone includes the municipalities of Susegana, Conegliano, and San Vendemiano. Instead, the territories of the municipalities of Segusino, Moriago della Battaglia, Sernaglia della Battaglia, Santa Lucia di Piave, Mareno di Piave, Vazzola, Codogne, San Fior, Godega Sant’Urbano, Colle Umberto, Cordignano, Cappella are part of the commitment zone.
1.2 Boundaries and the Zones that Make up the Site
Core zone: 9.197,45 ha
Buffer zone: 9.769,80 ha
Total: 18.967,25 ha
The site includes a core zone of 9,197.45 hectares surrounded by a buffer zone (Fig. 4) of 9,769.80 hectares, ensuring the protection of its ecological and cultural integrity. When identifying these zones, the peculiar geographical and historical individuality was taken into consideration, and not the administrative limits of the Province. In fact, the site is an example of a process of adaptation to a fraught and fragile peripheral territory in which a rural and cultural evolutionary landscape has been generated strongly characterized by viticulture. The physical nature of the site is interlinked with the historical facts, and the agricultural, social, and cultural characteristics developed on the property over time.
The tectonic hogback hill system has been, and will continue to be, a conditioning element of the territory characteristics and land use limitations. As a result of these agricultural limitations, a highly adaptive agricultural landscape has developed on ciglionature, which over time has proven to be the most efficient way to protect the soil and make the most of the hills' soil and climate characteristics. As can be seen in the Fig. 4 a commitment zone is introduced. This zone is useful in terms of site management, which, in the southern part of the site, takes the form of highly urbanized territories where services and infrastructure that logistically support the site are located, and accommodates the population working for or within the site.
Based on the parameters described in the previous paragraphs the perimeters of the site are defined as
North: the valleys separate the hills from the foothills
West: the Piave River
Southwest: the bottom of the foothills to the great Po Valley
1.3 Characteristics of the Site
1.3.1 Geomorphology
The Conegliano Valdobbiadene region is characterized by steep hogback hills formed through tectonic processes, alongside karst (typical landri) formations that dominate its southern zones. These hogbacks consist of stratified marl and rocky layers, shaped over millions of years by tectonic activity and erosion. Landri landscapes, which feature karst formations created by water erosion on softer rocks, further diversify the terrain.
The dynamic topography has necessitated innovative agricultural practices. The ciglioni terraces, a hallmark of this region, demonstrate both functionality and aesthetics, solidifying the landscape’s recognition as a cultural and agricultural landmark. These terraces not only mitigate soil erosion but also facilitate the cultivation of high-quality Prosecco grapes, leveraging the region’s unique geological conditions.
Also, the area has a unique geomorphological structure, making it a popular building material for centuries. The inhabitants used native stones for grinding stones, millstones, architraves, sills, columns, and statues for villa gardens. The paths along these structures offer stunning views and interactive experiences, making them sacred sites. Devotional climbs and Via Crucis, such as S. Augusta and Colle S. Paolo in Vittorio Veneto, S. Gallo in Soligo, and S. Francesco da Paola in Revine, are merely extensions of previous pagan worship sites. The valleys between the hogbacks are often uncontaminated and crossed by streams.
1.3.2 The Hydrographical System
As can be seen in the hydrological map (Fig. 6) the area has significant water resources, including small glacial lakes, and numerous fluvial incisions like the Lierza, Crevada (Fig. 7), and Cervano streams which are very important since they characterize the length of the hogback face, rivers such as the Soligo and Monticano, and a considerable number of springs. The presence of numerous waterways allowed for a varied range of morphologies, such as unique landscapes and waterfalls (Fig. 8). The recursion of underlying morphological structures, highlighted by erosion, also contributes to landscape similarity. Groundwater springs and numerous streams ensure water supply, allowing for agricultural processing and industrial activities like weaving. The unique landscapes and morphologies of the area are influenced by the recursion of erosion-influenced underlying structures.
1.3.3 Climate and Vegetation
The Köppen climatic classification classifies the site as Cfa, with C representing a temperate-hot and rainy climate, f indicating the presence of rainy precipitation, and for areas with hotter months exceeding 22°C. The average annual temperature is 12.6°C, and the average precipitation is 1099mm/year.
The area’s climate and geomorphology foster a rich diversity of vegetation. The vegetation is influenced by the area's climatic and geomorphological characteristics, such as steep, thickly wooded north-facing slopes and genus south-facing slopes colonized by thermophile forests and cultivations. The cool slopes are mainly populated by chestnut tree plant associations, with seasonal changes in appearance, particularly in spring with the flowering of yellow dogwood and white wild cherry trees (Fig. 12). The warmer slopes, characterized by manna ash or Querco-ostryeto, represent a less evolved portion due to disturbances and transformations. The southern portions are characterized by juniper and cypress trees, while the warmer wooded areas take on an interesting appearance in spring with dogwood flowering and many wild or previously cultivated fruit trees.
The forestry vegetation of the site is primarily classified as Orno-ostrieto tipico, a type of calcareous sedimentary substrate characterized by numerous species, mostly Fraxinus ornus, Ostrya carpinifoli, and Quercus pubescens. This forestry type is widespread in the Veneto region's Piedmont area and pre-alpine zone and is influenced by zones with more evolved soil structures or less wind exposure. The typical Ostrio-querceto is one of the more prevalent forestry types in the area, characterized by Quercus pubescens and a higher number of grass species.
The fundamental component of a landscape is crucial for defense against erosion, reducing hydrogeological risk, and improving soil structure and habitats for various species. The presence of a uniform forest cover in upper slopes controls water flow in lower elevations, while in lower hills, it forms a fundamental component of the landscape matrix (Fig. 13-14). The combination of terraced vineyards and woodlands in the proposed property can be understood as an integrated landscape system, with each element playing an essential role in the site's value. The widespread presence of forests and human-based viticulture contributes to the system's sustainability.
1.3.3.1 The flora of the Conegliano Valdobbiadene DOCG territory vineyards
The Conegliano-Valdobbiadene DOCG area has been entrusted with optimizing and disseminating the biodiversity heritage of the UNESCO site. For the UNESCO nomination, an interactive guide, titled “Guida alla flora dei vigneti del territorio DOCG Conegliano-Valdobbiadene,” was developed as part of a project coordinated by the University of Padua in partnership with the University of Trieste. The guide includes about 450 species surveyed in the vineyards and semi-natural habitats adjacent to them.
This is not an exhaustive inventory of the site's flora, but a basic representation of the main plant species found along the roads of the vineyards. The area has natural and semi-natural habitats that are closely linked to the management of viticulture sites. Many of these habitats are recognized by the European Union under the Habitats Directive as key elements in biodiversity conservation. Priority habitat 6110, characterized by calcareous rupicolous grasslands, meadows, and forests, is a prime example of these habitats.
Habitat 6210, semi-natural dry grassland, and bush-covered strips on calcareous substrates are considered a priority if they host important orchids. This habitat includes herbaceous or partly bushy formations, from dry to mesophilic, whose persistence is guaranteed by low-intensity management practices such as occasional mowing. The typical species of these formations is Bromus erectus, flanked by Bromus condensatus in areas with drier conditions. Other species of other families vary by the dryness of the conditions.
1.3.4 Agrobiodiversity
The site’s landscape is characterized by the continuous relation between semi-natural habitats and agricultural areas, affecting vegetational and agricultural biodiversity. Such a relationship is crucial for the ecosystem's functionality and its services, including soil formation, pathogen control, pollination, and cultural, recreational, and educational valorization. Farmers in hills are increasingly integrating production with biodiversity, recognizing the long-term maintenance of environmental assets. A study comparing vineyards in complex landscapes to vineyards in simple landscapes found the former performing better since semi-natural habitats contributed to increased plant biodiversity. This effect is even enhanced when vineyards are in contact with a forest or meadow since this provides access to species living in semi-natural habitats to the vineyard and thus increases the specific richness. The most interesting aspects of the area's biodiversity are linked to the semi-natural habitats, with arid meadows home to interesting plant species like orchids, common yet typical species such as Anthyllis vulneraria, Artemisia alba, Bromus erectus, Bromus condensatus, Chrysopogon gryllus, Helianthemum nummularium, Koeleria pyramidata, Galium verum and Galium lucidum (see Fig 20), and vineyards with species typical of ruderal environments or permanent meadows used for haymaking.
Management practices applied to vineyards play a fundamental role in determining biodiversity patterns. Semi-natural habitats occurring in the area show multifunctionality, providing crucial ecosystem services, such as enhancing crop ecological stability, reducing pesticide use, increasing the populations of pollinators, reducing weeds, decreasing herbicide dispersion, and reducing erosion in cropland. The simplification of the landscape and conversion of semi-natural habitats can lead to the rapid depletion of the environmental heritage of the area. However, this trend can very well be reversed by favoring sustainable practices.
Equally important for the territory's ecological responsiveness is the increase in forest formations, which are generally more extensive due to the abandonment of previously cultivated surfaces. The BTC analysis confirms that the expansion of the forest corresponds to higher values in 2007 than those in 1960 and, therefore, the growth in the system's capacity to produce plant biomass and resist external perturbations.
Despite the challenges, the area has great potential to meet future challenges in a landscape complicated by global changes that increasingly require the reconciliation of biodiversity and production. The analysis underlines the importance of sustainable practices for protecting the environment and promoting biodiversity.
|
考点1:“Valdobbiadene”推荐译为“瓦尔多比亚德内”
考点2:“manna ash" 必须译为“花白蜡树”,不可译为“槐叶槭”
考点3:"increasing the populations of pollinators" 中的"pollinators应译为“传粉昆虫”
考点4:“Valdobbiadene”必须统一译为“瓦尔多比亚代内”
|
cd79d
|
学术论文
|
自然科学
|
175
|
翻译:英文翻译成为中文。不要输出译文以外的内容。以下是你本次的任务:
The GNPC dataset represents a substantial advancement in neurodegenerative disease research, by providing a real-world clinical pro teomic dataset that comprises over 35,000 (11,270 with APOE genotype) individuals across AD, FTD, PDD, PD, ALS and normal aging from across more than 20 clinical sites in the US, UK and Europe. This enabled us to ask whether the APOE ε4-associated proteomic signature is shared across multiple neurodegenerative diseases. Our results demonstrate that all APOE ε4 carriers, irrespective of neurodegenerative disease, have a unique proteome signature that extends across the plasma and CSF. Unlike prospectively designed cohorts, the GNPC dataset reflects real-world clinical heterogeneity, highlighting the robustness and generalizability of our findings. This signature is associated with pro-inflammatory immune dysregulation and an enrichment for circulating immune cells, including monocytes, memory CD8 and γδ T cells, Tregs and NK cells. This molecular phenotype extends to the brains of APOE ε4 carriers in a similar disease-independent manner and is not associated with the presence of any disease-specific brain pathology. Although all APOE ε4 carriers have a systemic immune-related proteome signature, we find that the relationships between proteins within this signature are uniquely associated with demographic, lifestyle, and clinical variables in a neurodegenerative disease-specific manner. Notably, this suggests that although the biological changes associated with APOE ε4 carriage are essential for neurodegeneration, broadly, interactions with underlying biological vulnerability and the environment may be key for driving the pathogenesis of the specific neurodegenerative disease.
There is evidence that the APOE ε4 genotype is a modern-day example of antagonistic pleiotropy. In younger adults, APOE ε4 is associated with increased survival and fertility in environments with high levels of infectious disease. For example, healthy individuals who are APOE ε4 heterozygotes exhibit heightened cytokine release, increased plasma TNF levels, a more pronounced hyperthermic response and an earlier onset of IL-6 production following immune challenge with TLR2/TLR4/TLR5 ligands or lipopolysaccharide. While this immune response protects younger APOE ε4 carriers from infectious diseases, prolonged states of inflammation and cytokine release are likely deleterious with age. Although this study identified a proteomic signature indicative of a pro-inflammatory phenotype, a limitation is the absence of direct measures of routine inflammatory markers such as C-reactive protein or cytokines. Future studies should incorporate these markers in prospectively designed cohorts to clarify their association with APOE ε4.
To date, the biological effects of APOE ε4 carriage have largely only been studied in the context of AD. A notable finding of our study is that the pro-inflammatory molecular phenotype associated with APOE ε4 extends to individuals with other neurodegenerative diseases, including FTD, PDD, PD and ALS. This raises two key considerations. First, our findings underscore the need to shift focus from the continued identification of genetic risk loci via genome-wide association studies toward functional characterization of established variants. Notably, the absence of a statistically significant association between a variant and a specific disease phenotype does not preclude biological relevance. Despite APOE ε4 being overrepresented in the AD cohort, we observe a consistent molecular signature associated with APOE ε4 across multiple neurodegenerative diseases, highlighting an underrecognized role for this variant beyond AD that may have been overlooked due to its historically strong link with AD risk. Second, our data support reconceptualizing APOE ε4 not only as a disease-specific risk factor but also as a broader susceptibility allele contributing to shared pathogenic mechanisms across neurodegenerative diseases. It remains unclear, however, why APOE ε4 is more strongly associated with AD in terms of prevalence despite exhibiting systemic biological effects across neurodegenerative diseases. One possibility is that interactions between APOE ε4 and additional age-related, environmental, or comorbid factors may selectively amplify neurodegenerative pathways characteristic of AD. Another possibility is that CNS-specific vulnerabilities or cellular contexts (for example, in hippocampal circuits or dopaminergic neurons) modulate how the APOE ε4 inflammatory phenotype manifests clinically. Thus, while APOE ε4 confers a shared biological susceptibility, disease expression likely depends on a combination of genetic background, cellular context(s), and lifetime exposures. Large-scale integrative efforts, such as the GNPC, which harmonize data across distinct disease cohorts into unified datasets, provide a powerful framework for advancing this line of inquiry. By enabling cross-disease comparisons, such efforts may help delineate modifiers that influence why some APOE ε4 carriers develop AD while others remain healthy or develop different neurodegenerative diseases. This has important implications for prognosis and risk stratification in midlife individuals who carry APOE ε4.
A limitation of our study is the absence of validated biomarkers (for example, CSF p-tau217) to confirm clinical diagnoses, which reflects both the nature of the GNPC dataset and global heterogeneity in clinical practice. However, several features mitigate concerns regarding potential misdiagnosis. First, the APOE ε4 signature was derived from nonimpaired individuals. While it is possible that a minority of these nonimpaired individuals harbored asymptomatic pathology (for example, asymptomatic AD), the majority would be free of overt disease, reducing the likelihood of confounding results. Second, the consistent presence of the signature across all APOE ε4 carriers, irrespective of clinical diagnosis, supports its generalizability and suggests it reflects a broader APOE ε4-related biological phenotype rather than disease-specific changes. Finally, we validate our findings using postmortem brain proteomics and histopathology, where diagnostic certainty is highest. Here APOE ε4 status was not associated with hallmark pathologies, including amyloid-β, tau, TDP-43 or α-synuclein, across respective disease groups. This postmortem validation reinforces the robustness of our findings. Future studies would benefit from prospective cohorts incorporating validated CSF or plasma biomarkers to confirm and extend these observations.
An unexpected finding of our study was that plasma neurofilament light (NEFL) levels were lower in APOE ε4 carriers across neurodegenerative diseases, despite NEFL’s growing recognition as a biomarker of neurodegeneration. Prior studies have reported conflicting results— some found no association, another reported increased levels in APOE ε4 carriers, while others using the SomaScan and Simoa assays observed decreased levels, consistent with our findings. These discrepancies may reflect differences in sample size, with studies reporting decreased NEFL levels generally including larger cohorts (~600 to 5,000 participants, and 9,924 in our study). Alternatively, APOE ε4-related blood–brain barrier (BBB) or metabolic dysfunction may alter peripheral clearance of NEFL and affect its plasma or CSF concentration. These results raise important questions about the reliability of NEFL as a stand-alone biomarker and underscore the need for mechanistic studies and a shift toward precision biomarkers that integrate genetic and environmental context.
In our study, key peripheral inflammatory states in APOE ε4 carriers were mirrored in the CNS. Notably, brain proteomics performed using label-free MS orthogonally validated findings from SomaScan-based CSF and plasma analyses. While SomaScan aptamer technology offers high-throughput protein quantification, it is relatively insensitive to proteoform diversity, including post-translational modifications, a limitation when examining signaling pathways and protein networks where such modifications are functionally significant. In contrast, MS enables the detection of broader proteoforms, offering an independent assessment of protein abundance and pathway enrichment. The concordance of APOE ε4-associated protein signatures and enrichment patterns across plasma, CSF and brain proteomic datasets suggests that our findings are not artifacts of platform-specific biases but likely reflect underlying biology. Supporting this interpretation, we observed enrichment of APOE ε4-associated proteins in both hepatocytes and Kupffer cells in the CSF, but only in Kupffer cells and T cells in plasma. This pattern implies that plasma reflects chronic peripheral immune activation, whereas the CSF may capture liver-brain axis-mediated inflammatory signaling in APOE ε4 carriers. Further experimental studies are warranted to validate these mechanisms. Prospective cohort studies incorporating cross-platform, multi-tissue analyses from the same individuals will be essential to confirm and expand upon these observations.
While the exact mechanisms underlying the mirroring of peripheral and central pro-inflammatory states remain unclear, they may involve interactions between pro-inflammatory peripheral immune cells and the BBB. A recent study of individuals with long COVID-19 demonstrated that hyperactive peripheral blood mononuclear cells adhere to the endothelial cells of the BBB, driving inflammation, degradation, and symptoms of brain fog. In support of this, cognitively healthy APOE ε4 carriers exhibit early markers of BBB dysfunction in the hippocampus and medial temporal lobe. As the BBB becomes increasingly compromised, it allows the infiltration of blood-derived proteins and pro-inflammatory immune cells into the brain, contributing to exacerbated neuroinflammation and neurodegeneration. In our study, we identify enriched pro-inflammatory immune cell subpopulations, including nonclassical and intermediate monocytes, memory CD8+ T cells, γδ T cells and NK cells. These immune cell types may represent peripheral blood mononuclear cells that interact with the BBB to promote neurodegeneration in APOE ε4 carriers. Given that APOE ε4 is linked to a shared molecular phenotype across neurodegenerative diseases, this hypothesis is consistent with current understanding. Healthy, nonimpaired APOE ε4 carriers have a systemic pro-inflammatory phenotype (and as we have shown here), early signs of BBB disruption, alterations in brain activity and connectivity, and sleep disturbances, all of which are known to be risk factors for neurodegenerative diseases, broadly. Further supporting this is the recent evidence that vaccinations protect against dementia, including the shingles vaccines Zostavax and Shingrix. Although none of these studies explicitly examined the interactive effects between vaccination status and APOE ε4 genotype, the fact that more than 60% of individuals with dementia are APOE ε4 carriers suggests that APOE ε4 may represent a critical modifier of the observed associations, warranting further investigation. Future studies in human disease-relevant models, such as patient stem cell-derived organoids, are needed to further elucidate these mechanisms.
|
The GNPC dataset represents a substantial advancement in neurodegenerative disease research, by providing a real-world clinical pro teomic dataset that comprises over 35,000 (11,270 with APOE genotype) individuals across AD, FTD, PDD, PD, ALS and normal aging from across more than 20 clinical sites in the US, UK and Europe. This enabled us to ask whether the APOE ε4-associated proteomic signature is shared across multiple neurodegenerative diseases. Our results demonstrate that all APOE ε4 carriers, irrespective of neurodegenerative disease, have a unique proteome signature that extends across the plasma and CSF. Unlike prospectively designed cohorts, the GNPC dataset reflects real-world clinical heterogeneity, highlighting the robustness and generalizability of our findings. This signature is associated with pro-inflammatory immune dysregulation and an enrichment for circulating immune cells, including monocytes, memory CD8 and γδ T cells, Tregs and NK cells. This molecular phenotype extends to the brains of APOE ε4 carriers in a similar disease-independent manner and is not associated with the presence of any disease-specific brain pathology. Although all APOE ε4 carriers have a systemic immune-related proteome signature, we find that the relationships between proteins within this signature are uniquely associated with demographic, lifestyle, and clinical variables in a neurodegenerative disease-specific manner. Notably, this suggests that although the biological changes associated with APOE ε4 carriage are essential for neurodegeneration, broadly, interactions with underlying biological vulnerability and the environment may be key for driving the pathogenesis of the specific neurodegenerative disease.
There is evidence that the APOE ε4 genotype is a modern-day example of antagonistic pleiotropy. In younger adults, APOE ε4 is associated with increased survival and fertility in environments with high levels of infectious disease. For example, healthy individuals who are APOE ε4 heterozygotes exhibit heightened cytokine release, increased plasma TNF levels, a more pronounced hyperthermic response and an earlier onset of IL-6 production following immune challenge with TLR2/TLR4/TLR5 ligands or lipopolysaccharide. While this immune response protects younger APOE ε4 carriers from infectious diseases, prolonged states of inflammation and cytokine release are likely deleterious with age. Although this study identified a proteomic signature indicative of a pro-inflammatory phenotype, a limitation is the absence of direct measures of routine inflammatory markers such as C-reactive protein or cytokines. Future studies should incorporate these markers in prospectively designed cohorts to clarify their association with APOE ε4.
To date, the biological effects of APOE ε4 carriage have largely only been studied in the context of AD. A notable finding of our study is that the pro-inflammatory molecular phenotype associated with APOE ε4 extends to individuals with other neurodegenerative diseases, including FTD, PDD, PD and ALS. This raises two key considerations. First, our findings underscore the need to shift focus from the continued identification of genetic risk loci via genome-wide association studies toward functional characterization of established variants. Notably, the absence of a statistically significant association between a variant and a specific disease phenotype does not preclude biological relevance. Despite APOE ε4 being overrepresented in the AD cohort, we observe a consistent molecular signature associated with APOE ε4 across multiple neurodegenerative diseases, highlighting an underrecognized role for this variant beyond AD that may have been overlooked due to its historically strong link with AD risk. Second, our data support reconceptualizing APOE ε4 not only as a disease-specific risk factor but also as a broader susceptibility allele contributing to shared pathogenic mechanisms across neurodegenerative diseases. It remains unclear, however, why APOE ε4 is more strongly associated with AD in terms of prevalence despite exhibiting systemic biological effects across neurodegenerative diseases. One possibility is that interactions between APOE ε4 and additional age-related, environmental, or comorbid factors may selectively amplify neurodegenerative pathways characteristic of AD. Another possibility is that CNS-specific vulnerabilities or cellular contexts (for example, in hippocampal circuits or dopaminergic neurons) modulate how the APOE ε4 inflammatory phenotype manifests clinically. Thus, while APOE ε4 confers a shared biological susceptibility, disease expression likely depends on a combination of genetic background, cellular context(s), and lifetime exposures. Large-scale integrative efforts, such as the GNPC, which harmonize data across distinct disease cohorts into unified datasets, provide a powerful framework for advancing this line of inquiry. By enabling cross-disease comparisons, such efforts may help delineate modifiers that influence why some APOE ε4 carriers develop AD while others remain healthy or develop different neurodegenerative diseases. This has important implications for prognosis and risk stratification in midlife individuals who carry APOE ε4.
A limitation of our study is the absence of validated biomarkers (for example, CSF p-tau217) to confirm clinical diagnoses, which reflects both the nature of the GNPC dataset and global heterogeneity in clinical practice. However, several features mitigate concerns regarding potential misdiagnosis. First, the APOE ε4 signature was derived from nonimpaired individuals. While it is possible that a minority of these nonimpaired individuals harbored asymptomatic pathology (for example, asymptomatic AD), the majority would be free of overt disease, reducing the likelihood of confounding results. Second, the consistent presence of the signature across all APOE ε4 carriers, irrespective of clinical diagnosis, supports its generalizability and suggests it reflects a broader APOE ε4-related biological phenotype rather than disease-specific changes. Finally, we validate our findings using postmortem brain proteomics and histopathology, where diagnostic certainty is highest. Here APOE ε4 status was not associated with hallmark pathologies, including amyloid-β, tau, TDP-43 or α-synuclein, across respective disease groups. This postmortem validation reinforces the robustness of our findings. Future studies would benefit from prospective cohorts incorporating validated CSF or plasma biomarkers to confirm and extend these observations.
An unexpected finding of our study was that plasma neurofilament light (NEFL) levels were lower in APOE ε4 carriers across neurodegenerative diseases, despite NEFL’s growing recognition as a biomarker of neurodegeneration. Prior studies have reported conflicting results— some found no association, another reported increased levels in APOE ε4 carriers, while others using the SomaScan and Simoa assays observed decreased levels, consistent with our findings. These discrepancies may reflect differences in sample size, with studies reporting decreased NEFL levels generally including larger cohorts (~600 to 5,000 participants, and 9,924 in our study). Alternatively, APOE ε4-related blood–brain barrier (BBB) or metabolic dysfunction may alter peripheral clearance of NEFL and affect its plasma or CSF concentration. These results raise important questions about the reliability of NEFL as a stand-alone biomarker and underscore the need for mechanistic studies and a shift toward precision biomarkers that integrate genetic and environmental context.
In our study, key peripheral inflammatory states in APOE ε4 carriers were mirrored in the CNS. Notably, brain proteomics performed using label-free MS orthogonally validated findings from SomaScan-based CSF and plasma analyses. While SomaScan aptamer technology offers high-throughput protein quantification, it is relatively insensitive to proteoform diversity, including post-translational modifications, a limitation when examining signaling pathways and protein networks where such modifications are functionally significant. In contrast, MS enables the detection of broader proteoforms, offering an independent assessment of protein abundance and pathway enrichment. The concordance of APOE ε4-associated protein signatures and enrichment patterns across plasma, CSF and brain proteomic datasets suggests that our findings are not artifacts of platform-specific biases but likely reflect underlying biology. Supporting this interpretation, we observed enrichment of APOE ε4-associated proteins in both hepatocytes and Kupffer cells in the CSF, but only in Kupffer cells and T cells in plasma. This pattern implies that plasma reflects chronic peripheral immune activation, whereas the CSF may capture liver-brain axis-mediated inflammatory signaling in APOE ε4 carriers. Further experimental studies are warranted to validate these mechanisms. Prospective cohort studies incorporating cross-platform, multi-tissue analyses from the same individuals will be essential to confirm and expand upon these observations.
While the exact mechanisms underlying the mirroring of peripheral and central pro-inflammatory states remain unclear, they may involve interactions between pro-inflammatory peripheral immune cells and the BBB. A recent study of individuals with long COVID-19 demonstrated that hyperactive peripheral blood mononuclear cells adhere to the endothelial cells of the BBB, driving inflammation, degradation, and symptoms of brain fog. In support of this, cognitively healthy APOE ε4 carriers exhibit early markers of BBB dysfunction in the hippocampus and medial temporal lobe. As the BBB becomes increasingly compromised, it allows the infiltration of blood-derived proteins and pro-inflammatory immune cells into the brain, contributing to exacerbated neuroinflammation and neurodegeneration. In our study, we identify enriched pro-inflammatory immune cell subpopulations, including nonclassical and intermediate monocytes, memory CD8+ T cells, γδ T cells and NK cells. These immune cell types may represent peripheral blood mononuclear cells that interact with the BBB to promote neurodegeneration in APOE ε4 carriers. Given that APOE ε4 is linked to a shared molecular phenotype across neurodegenerative diseases, this hypothesis is consistent with current understanding. Healthy, nonimpaired APOE ε4 carriers have a systemic pro-inflammatory phenotype (and as we have shown here), early signs of BBB disruption, alterations in brain activity and connectivity, and sleep disturbances, all of which are known to be risk factors for neurodegenerative diseases, broadly. Further supporting this is the recent evidence that vaccinations protect against dementia, including the shingles vaccines Zostavax and Shingrix. Although none of these studies explicitly examined the interactive effects between vaccination status and APOE ε4 genotype, the fact that more than 60% of individuals with dementia are APOE ε4 carriers suggests that APOE ε4 may represent a critical modifier of the observed associations, warranting further investigation. Future studies in human disease-relevant models, such as patient stem cell-derived organoids, are needed to further elucidate these mechanisms.
|
考点1::“expression”根据语境翻译为“临床表现”更加合适
考点2:“vulnerability”根据语境翻译为“易感性”更加合适
考点3:“APOE ε4 carriage”推荐翻译为“APOE ε4基因携带者/APOE ε4基因携带状态”,勿翻译为“运载体”
考点4:“prospectively designed cohorts”中的“prospectively”推荐翻译为“前瞻性”
考点5:“disease-specific risk factor”推荐翻译为“疾病特异性风险因素”
考点6:“postmortem validation”必须翻译为“尸检验证”,不能译为“死后验证”
考点7:“proteoform diversity”推荐翻译为“蛋白质异构体多样性”
考点8:“label-free MS”翻译为“无标记质谱”
考点9:“orthogonally validated”推荐翻译为“交叉验证”
考点10:“GNPC” 应该译为 “全球神经退行性疾病蛋白质组学联盟”,不能保留原文不译
考点11:“individuals across AD, FTD, PDD, PD, ALS and normal aging”中“AD”应译为“阿尔茨海默病”或“阿尔茨海默病(AD)”,不能保留原文不译
考点12:“individuals across AD, FTD, PDD, PD, ALS and normal aging”中“FTD”应译为“额颞叶痴呆”或“额颞叶痴呆(FTD)”,不能保留原文不译
考点13:individuals across AD, FTD, PDD, PD, ALS and normal aging”中“PDD”应译为“帕金森病痴呆”或“帕金森病痴呆(PDD)”,不能保留原文不译
考点14:individuals across AD, FTD, PDD, PD, ALS and normal aging”中“PD”应译为“帕金森病”或“帕金森病(PD)”,不能保留原文不译
考点15:individuals across AD, FTD, PDD, PD, ALS and normal aging”中“ALS”应译为“肌萎缩侧索硬化症”或“肌萎缩侧索硬化症(ALS)”,不能保留原文不译
|
ce117
|
学术论文
|
自然科学
|
131
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
China has reaffirmed its commitment to fostering a more open and investment-friendly economy with the release of a new action plan aimed at stabilizing and promoting foreign investment in 2025. In this article, we explore the key measures outlined in the plan and the broader implications for foreign investors.
On February 19, 2025, China introduced a comprehensive action plan to stabilize foreign investment (hereinafter referred to as the “action plan”), reaffirming its commitment to high-standard opening-up and advancing economic modernization. Approved during a State Council executive meeting, the action plan outlines key measures to attract and retain foreign investment by expanding market access, easing financial restrictions, and fostering a fair business environment. With a focus on sectors such as biotechnology, telecommunications, education, and healthcare, the initiative seeks to enhance foreign participation in China’s industrial and service sectors.
The move comes as China continues to be a major global investment hub, having established over 59,000 new foreign-invested enterprises (FIEs) in 2024 and maintaining an annual foreign investment inflow exceeding RMB 1 trillion (US$137.29 billion) for three consecutive years. In this article, we explore the key measures outlined in the plan, its impact on various sectors, and the broader implications for foreign investors.
China’s newly announced action plan reflects a concerted effort to enhance foreign investment, strengthen economic stability, and maintain momentum in its industrial development. At its core, the plan underscores China’s commitment to creating a more attractive and equitable business environment. A pivotal aspect of this strategy is the continuous evolution of the Invest in China brand, which will be refined each year through an organized roadmap that emphasizes targeted promotion and collaboration.
In light of the shifting global economic landscape, China has set out to address the diverse needs of international investors by tailoring its approach based on the unique characteristics of major investment sources. By building on bilateral investment promotion mechanisms and fostering closer cooperation between central and local governments, China is positioning itself as a reliable and strategic partner for foreign enterprises.
A key focus of the action plan is reinforcing existing FIEs and encouraging reinvestment within the country. The government aims to optimize the business climate to ensure equal treatment for all enterprises, fostering an environment where companies are not only encouraged to invest but also to reinvest their profits domestically. To support this, revisions to the Catalogue of Encouraged Industries for Foreign Investment will direct foreign capital toward high-value sectors, including advanced manufacturing, modern services, and underdeveloped regions in central, western, and northeastern China. Additionally, efforts to enhance transparency in foreign enterprises’ reinvestment activities will ensure a more predictable and stable investment process.
To facilitate foreign mergers and acquisitions (M&A), the action plan also outlines steps to simplify regulations under the framework of the Foreign Investment Law. By streamlining M&A procedures, lowering barriers for cross-border equity swaps, and improving regulatory oversight, China aims to create a more investor-friendly landscape that supports long-term engagement and innovation.
Moreover, the government is lifting restrictions on domestic loans for foreign enterprises, enabling them to leverage local financing for equity investments and regional expansion. Multinational corporations are also encouraged to establish regional headquarters in China, with regulatory adjustments aimed at easing foreign exchange management, personnel mobility, and data flow.
Through targeted efforts across strategic sectors such as biotechnology, animal husbandry, high-tech industries, and modern services, the action plan lays the foundation for deeper foreign involvement in China’s industrial modernization. These measures align with China’s broader objectives of fostering sustainable development and integrating international expertise into its key industries.
Finally, to boost investor confidence, the plan includes initiatives aimed at enhancing transparency and communication about economic policies. Regular press conferences, expert briefings, and media outreach will serve as platforms to reinforce China’s openness to foreign investment and demonstrate its commitment to a stable, transparent, and competitive investment environment.
Expansion of opening-up policies
China’s commitment to “opening up” remains a central pillar of its foreign investment promotion strategy. In 2024, the government introduced several key policy updates aimed at further improving market access for foreign enterprises:
1. Foreign investment negative list – On August 19, 2024, Premier Li Qiang chaired a State Council executive meeting approving the Special Administrative Measures for Foreign Investment Access (Negative List) (2024 Edition). This marks the first revision since the previous edition was released in late 2021, signaling adjustments in market access restrictions for foreign investors.
2. Encouraged catalogue – On December 20, China’s National Development and Reform Commission (NDRC) and the Ministry of Commerce (MOFCOM) issued the Catalogue of Encouraged Industries for Foreign Investment (Exposure Draft) (Draft FI Encouraged Catalogue), which expands the 2022 version. The 2024 draft includes 1,700 items—620 in the national catalogue and 1,080 in the regional catalogue, representing a 15 percent increase from the previous 1,474 items.
3. Healthcare and telecommunications sector – On September 8, MOFCOM announced an expansion of pilot programs in the healthcare industry. The newly issued circular lifts restrictions on foreign-invested enterprises (FIEs) engaged in cell and gene therapy (CGT) within select free trade zones (FTZs) and allows wholly foreign-owned hospitals in designated cities.
4. Telecommunications – In October, China launched a pilot program allowing 100 percent foreign ownership of data centers and value-added telecom services in Beijing, Shanghai, Hainan, and Shenzhen.
The 2025 Action Plan builds on these efforts and indicates a further expansion of pilot programs in healthcare and telecommunications. It also outlines research and planning for an orderly opening-up of the education and cultural industries, with implementation expected at an appropriate time. Additionally, China has reiterated its commitment to expanding market access in the services sector, which saw an added value of RMB 76.56 trillion (US$10.56 trillion) in 2024, growing by 5 percent year-on-year and accounting for 56.7 percent of GDP. The plan also places a strong emphasis on the biopharmaceutical industry, supporting qualified foreign-invested enterprises in pilot programs for segmented biopharmaceutical production. It pledges to accelerate the approval of provincial pilot projects and quality supervision plans while ensuring regulatory coordination. Further initiatives will focus on streamlining market entry for innovative drugs, optimizing bulk pharmaceutical procurement, and improving the predictability of medical device procurement policies.
These key sectors –healthcare, telecommunications, services, and biopharmaceuticals—are expected to present significant opportunities for foreign investors in 2025. As China continues to refine its foreign investment policies, businesses can expect a more accessible, predictable, and stable regulatory environment, fostering deeper international participation in the Chinese market.
|
China has reaffirmed its commitment to fostering a more open and investment-friendly economy with the release of a new action plan aimed at stabilizing and promoting foreign investment in 2025. In this article, we explore the key measures outlined in the plan and the broader implications for foreign investors.
On February 19, 2025, China introduced a comprehensive action plan to stabilize foreign investment (hereinafter referred to as the “action plan”), reaffirming its commitment to high-standard opening-up and advancing economic modernization. Approved during a State Council executive meeting, the action plan outlines key measures to attract and retain foreign investment by expanding market access, easing financial restrictions, and fostering a fair business environment. With a focus on sectors such as biotechnology, telecommunications, education, and healthcare, the initiative seeks to enhance foreign participation in China’s industrial and service sectors.
The move comes as China continues to be a major global investment hub, having established over 59,000 new foreign-invested enterprises (FIEs) in 2024 and maintaining an annual foreign investment inflow exceeding RMB 1 trillion (US$137.29 billion) for three consecutive years. In this article, we explore the key measures outlined in the plan, its impact on various sectors, and the broader implications for foreign investors.
China’s newly announced action plan reflects a concerted effort to enhance foreign investment, strengthen economic stability, and maintain momentum in its industrial development. At its core, the plan underscores China’s commitment to creating a more attractive and equitable business environment. A pivotal aspect of this strategy is the continuous evolution of the Invest in China brand, which will be refined each year through an organized roadmap that emphasizes targeted promotion and collaboration.
In light of the shifting global economic landscape, China has set out to address the diverse needs of international investors by tailoring its approach based on the unique characteristics of major investment sources. By building on bilateral investment promotion mechanisms and fostering closer cooperation between central and local governments, China is positioning itself as a reliable and strategic partner for foreign enterprises.
A key focus of the action plan is reinforcing existing FIEs and encouraging reinvestment within the country. The government aims to optimize the business climate to ensure equal treatment for all enterprises, fostering an environment where companies are not only encouraged to invest but also to reinvest their profits domestically. To support this, revisions to the Catalogue of Encouraged Industries for Foreign Investment will direct foreign capital toward high-value sectors, including advanced manufacturing, modern services, and underdeveloped regions in central, western, and northeastern China. Additionally, efforts to enhance transparency in foreign enterprises’ reinvestment activities will ensure a more predictable and stable investment process.
To facilitate foreign mergers and acquisitions (M&A), the action plan also outlines steps to simplify regulations under the framework of the Foreign Investment Law. By streamlining M&A procedures, lowering barriers for cross-border equity swaps, and improving regulatory oversight, China aims to create a more investor-friendly landscape that supports long-term engagement and innovation.
Moreover, the government is lifting restrictions on domestic loans for foreign enterprises, enabling them to leverage local financing for equity investments and regional expansion. Multinational corporations are also encouraged to establish regional headquarters in China, with regulatory adjustments aimed at easing foreign exchange management, personnel mobility, and data flow.
Through targeted efforts across strategic sectors such as biotechnology, animal husbandry, high-tech industries, and modern services, the action plan lays the foundation for deeper foreign involvement in China’s industrial modernization. These measures align with China’s broader objectives of fostering sustainable development and integrating international expertise into its key industries.
Finally, to boost investor confidence, the plan includes initiatives aimed at enhancing transparency and communication about economic policies. Regular press conferences, expert briefings, and media outreach will serve as platforms to reinforce China’s openness to foreign investment and demonstrate its commitment to a stable, transparent, and competitive investment environment.
Expansion of opening-up policies
China’s commitment to “opening up” remains a central pillar of its foreign investment promotion strategy. In 2024, the government introduced several key policy updates aimed at further improving market access for foreign enterprises:
1. Foreign investment negative list – On August 19, 2024, Premier Li Qiang chaired a State Council executive meeting approving the Special Administrative Measures for Foreign Investment Access (Negative List) (2024 Edition). This marks the first revision since the previous edition was released in late 2021, signaling adjustments in market access restrictions for foreign investors.
2. Encouraged catalogue – On December 20, China’s National Development and Reform Commission (NDRC) and the Ministry of Commerce (MOFCOM) issued the Catalogue of Encouraged Industries for Foreign Investment (Exposure Draft) (Draft FI Encouraged Catalogue), which expands the 2022 version. The 2024 draft includes 1,700 items—620 in the national catalogue and 1,080 in the regional catalogue, representing a 15 percent increase from the previous 1,474 items.
3. Healthcare and telecommunications sector – On September 8, MOFCOM announced an expansion of pilot programs in the healthcare industry. The newly issued circular lifts restrictions on foreign-invested enterprises (FIEs) engaged in cell and gene therapy (CGT) within select free trade zones (FTZs) and allows wholly foreign-owned hospitals in designated cities.
4. Telecommunications – In October, China launched a pilot program allowing 100 percent foreign ownership of data centers and value-added telecom services in Beijing, Shanghai, Hainan, and Shenzhen.
The 2025 Action Plan builds on these efforts and indicates a further expansion of pilot programs in healthcare and telecommunications. It also outlines research and planning for an orderly opening-up of the education and cultural industries, with implementation expected at an appropriate time. Additionally, China has reiterated its commitment to expanding market access in the services sector, which saw an added value of RMB 76.56 trillion (US$10.56 trillion) in 2024, growing by 5 percent year-on-year and accounting for 56.7 percent of GDP. The plan also places a strong emphasis on the biopharmaceutical industry, supporting qualified foreign-invested enterprises in pilot programs for segmented biopharmaceutical production. It pledges to accelerate the approval of provincial pilot projects and quality supervision plans while ensuring regulatory coordination. Further initiatives will focus on streamlining market entry for innovative drugs, optimizing bulk pharmaceutical procurement, and improving the predictability of medical device procurement policies.
These key sectors –healthcare, telecommunications, services, and biopharmaceuticals—are expected to present significant opportunities for foreign investors in 2025. As China continues to refine its foreign investment policies, businesses can expect a more accessible, predictable, and stable regulatory environment, fostering deeper international participation in the Chinese market.
|
考点1:State Council executive meeting应译为“国务院常务会议。
考点2:market access音译为“市场准入”。
考点3:Invest in China brand中的Invest in China是一个专有品牌名称,应译为“投资中国”品牌。
考点4:leverage推荐译为“利用”。
考点5:Exposure Draft应译为“征求意见稿”
考点6:orderly opening-up应译为“有序开放”。
考点7:bulk pharmaceutical procurement应译为“药品集中采购”,也可以译为“集采”。
考点8:Foreign investment negative list应译为 外商投资准入负面清单。
考点9:Special Administrative Measures for Foreign Investment Access (Negative List) (2024 Edition)应译为 外商投资准入特别管理措施(负面清单)(2024 年版) 。
考点10:China’s National Development and Reform Commission (NDRC)应译为 中国国家发展和改革委员会
考点11:Catalogue of Encouraged Industries for Foreign Investment (Exposure Draft)应译为 鼓励外商投资产业目录
|
cea44
|
新闻资讯
|
新闻报道
|
38
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
量子计算理论建立在量子力学的叠加原理和纠缠现象基础之上,通过量子比特的相干操作实现了超越经典计算能力的信息处理范式。量子算法的设计利用量子并行性和量子干涉效应,在特定问题域中展现出指数级的计算优势,其中Shor算法对整数分解问题和Grover算法对无结构搜索问题的突破性进展标志着量子计算从理论走向实践的重要里程碑。量子门电路模型作为量子计算的标准计算模型,基于酉变换的可逆性原理构建了通用量子计算的理论框架。Pauli算子和Clifford群构成了量子纠错码的数学基础,而Gottesman-Knill定理证明了稳定子态的经典可模拟性。通用量子门集合的构造需要满足稠密性条件,其中Solovay-Kitaev定理保证了任意酉操作都可以通过有限门集合以任意精度逼近。
量子纠错理论通过引入冗余度克服了量子相干性易受环境噪声破坏的根本挑战。量子纠错码的构造基于稳定子形式主义,通过对易关系的巧妙设计实现了量子信息的保护。表面码和拓扑码利用二维网格上的局域相互作用构建了具有阈值容错特性的量子存储系统,而色码则通过三维拓扑结构提供了更高的编码效率。绝热量子计算模型基于量子绝热定理,通过缓慢演化的哈密顿量引导系统从初始态到问题解态。量子退火算法利用横向磁场的调控实现了组合优化问题的求解,而变分量子算法则结合经典优化与量子资源,在近期含噪声中等规模量子设备上寻求量子优势。计算复杂性理论中的量子复杂性类别体系为理解量子计算能力提供了严格的数学框架。BQP复杂性类刻画了有界错误量子多项式时间可解的判定问题,而QMA类则是量子梅林 - 亚瑟类的简称,代表了量子非确定性多项式时间复杂性。量子交互证明系统和量子零知识证明扩展了经典密码学协议的安全性定义。量子近似优化算法通过参数化量子电路的变分训练解决了组合优化中的NP困难问题。最大割问题和图着色问题的量子启发式算法展现了在特定实例上的性能提升,而量子交替算子算法则为通用组合优化提供了系统性的量子方法。量子机器学习领域探索了量子计算与机器学习算法的深度融合。量子主成分分析算法利用量子奇异值分解实现了高维数据的降维处理,而量子支持向量机则通过量子核方法在指数维特征空间中进行分类。变分量子分类器和量子神经网络为近期量子设备上的机器学习应用提供了可行路径。量子模拟作为量子计算的重要应用方向,专注于利用可控量子系统模拟复杂量子多体系统的动力学演化。数字量子模拟通过Trotter-Suzuki分解将连续时间演化离散化为量子门序列,而模拟量子模拟则通过工程化的哈密顿量直接实现目标系统的物理映射。量子密码学基于量子力学的基本原理构建了信息论安全的密钥分发协议。BB84协议利用量子态的不可克隆定理和海森堡不确定性原理实现了无条件安全的密钥交换,而量子密钥分发的安全性证明依赖于纠缠提纯和隐私放大技术。量子计算的物理实现面临着量子相干时间有限和门操作保真度不足的技术挑战。超导约瑟夫森结量子比特通过能级工程和脉冲控制实现了高保真度的量子门操作,而离子阱量子计算机则利用激光冷却和囚禁技术维持了长相干时间的量子态。容错量子计算的实现需要将逻辑错误率压制到阈值以下,这要求物理量子比特的错误率满足严格的容错条件。量子错误纠正码的阈值定理表明,只要物理错误率低于特定阈值,通过增加编码冗余度可以将逻辑错误率任意降低。魔态蒸馏技术通过量子态的纯化过程为容错量子计算提供了高保真度的辅助资源态。量子优越性的演示需要在特定计算任务上展现量子设备相对于最优经典算法的计算优势。随机电路采样问题为量子优越性提供了理论基础,而玻色采样和IQP电路则构成了其他候选问题。量子优越性的验证面临着经典模拟算法不断改进的挑战,需要在问题规模和验证效率之间寻求平衡。变分量子特征求解器通过量子-经典混合算法求解哈密顿量的基态和激发态能谱。量子近似优化算法的性能分析揭示了量子优势与问题结构之间的深层联系,而量子交替算子算法的收敛性理论为算法设计提供了指导原则。量子计算中的去相干效应和环境噪声构成了实用量子算法设计的主要约束。开放量子系统的主方程描述了量子态在环境耦合下的非酉演化,而量子过程层析技术则提供了噪声特征化的实验手段。
近期量子算法的研究集中于在含噪声中等规模量子设备上寻求实用量子优势。变分量子算法通过参数优化适应了硬件噪声特性,而量子错误缓解技术则通过后处理方法部分抑制了噪声影响。零噪声外推和概率错误消除为近期量子计算提供了实用的错误缓解策略。量子计算复杂性理论中的量子PCP猜想和量子哈密顿复杂性问题探索了量子系统中可验证性和难解性的根本界限。局域哈密顿量的基态能量问题被证明是QMA完全的,而量子满足性问题则为理解量子复杂性提供了重要范例。量子网络和分布式量子计算扩展了量子信息处理的空间范围。量子中继器通过纠缠交换克服了量子通信的距离限制,而量子互联网的愿景依赖于量子存储和量子路由技术的突破。分布式量子算法需要在通信复杂性和计算复杂性之间权衡,量子隐形传态和量子纠缠分发构成了分布式量子协议的基础操作。量子计算在材料科学和药物发现中的应用前景激发了量子模拟算法的深入研究。费米-哈伯德模型和分子电子结构计算为量子化学提供了天然的量子算法应用场景,而变分量子特征求解器在小分子体系中已经展现了与经典方法相当的计算精度。量子启发的经典算法从量子算法设计中汲取灵感,为经典计算机上的近似算法提供了新的思路。张量网络方法和矩阵乘积态技术在某些量子系统的经典模拟中取得了显著成功,而量子启发的优化算法则在组合优化和机器学习中找到了应用价值。
|
量子计算理论建立在量子力学的叠加原理和纠缠现象基础之上,通过量子比特的相干操作实现了超越经典计算能力的信息处理范式。量子算法的设计利用量子并行性和量子干涉效应,在特定问题域中展现出指数级的计算优势,其中Shor算法对整数分解问题和Grover算法对无结构搜索问题的突破性进展标志着量子计算从理论走向实践的重要里程碑。量子门电路模型作为量子计算的标准计算模型,基于酉变换的可逆性原理构建了通用量子计算的理论框架。Pauli算子和Clifford群构成了量子纠错码的数学基础,而Gottesman-Knill定理证明了稳定子态的经典可模拟性。通用量子门集合的构造需要满足稠密性条件,其中Solovay-Kitaev定理保证了任意酉操作都可以通过有限门集合以任意精度逼近。
量子纠错理论通过引入冗余度克服了量子相干性易受环境噪声破坏的根本挑战。量子纠错码的构造基于稳定子形式主义,通过对易关系的巧妙设计实现了量子信息的保护。表面码和拓扑码利用二维网格上的局域相互作用构建了具有阈值容错特性的量子存储系统,而色码则通过三维拓扑结构提供了更高的编码效率。绝热量子计算模型基于量子绝热定理,通过缓慢演化的哈密顿量引导系统从初始态到问题解态。量子退火算法利用横向磁场的调控实现了组合优化问题的求解,而变分量子算法则结合经典优化与量子资源,在近期含噪声中等规模量子设备上寻求量子优势。计算复杂性理论中的量子复杂性类别体系为理解量子计算能力提供了严格的数学框架。BQP复杂性类刻画了有界错误量子多项式时间可解的判定问题,而QMA类则是量子梅林 - 亚瑟类的简称,代表了量子非确定性多项式时间复杂性。量子交互证明系统和量子零知识证明扩展了经典密码学协议的安全性定义。量子近似优化算法通过参数化量子电路的变分训练解决了组合优化中的NP困难问题。最大割问题和图着色问题的量子启发式算法展现了在特定实例上的性能提升,而量子交替算子算法则为通用组合优化提供了系统性的量子方法。量子机器学习领域探索了量子计算与机器学习算法的深度融合。量子主成分分析算法利用量子奇异值分解实现了高维数据的降维处理,而量子支持向量机则通过量子核方法在指数维特征空间中进行分类。变分量子分类器和量子神经网络为近期量子设备上的机器学习应用提供了可行路径。量子模拟作为量子计算的重要应用方向,专注于利用可控量子系统模拟复杂量子多体系统的动力学演化。数字量子模拟通过Trotter-Suzuki分解将连续时间演化离散化为量子门序列,而模拟量子模拟则通过工程化的哈密顿量直接实现目标系统的物理映射。量子密码学基于量子力学的基本原理构建了信息论安全的密钥分发协议。BB84协议利用量子态的不可克隆定理和海森堡不确定性原理实现了无条件安全的密钥交换,而量子密钥分发的安全性证明依赖于纠缠提纯和隐私放大技术。量子计算的物理实现面临着量子相干时间有限和门操作保真度不足的技术挑战。超导约瑟夫森结量子比特通过能级工程和脉冲控制实现了高保真度的量子门操作,而离子阱量子计算机则利用激光冷却和囚禁技术维持了长相干时间的量子态。容错量子计算的实现需要将逻辑错误率压制到阈值以下,这要求物理量子比特的错误率满足严格的容错条件。量子错误纠正码的阈值定理表明,只要物理错误率低于特定阈值,通过增加编码冗余度可以将逻辑错误率任意降低。魔态蒸馏技术通过量子态的纯化过程为容错量子计算提供了高保真度的辅助资源态。量子优越性的演示需要在特定计算任务上展现量子设备相对于最优经典算法的计算优势。随机电路采样问题为量子优越性提供了理论基础,而玻色采样和IQP电路则构成了其他候选问题。量子优越性的验证面临着经典模拟算法不断改进的挑战,需要在问题规模和验证效率之间寻求平衡。变分量子特征求解器通过量子-经典混合算法求解哈密顿量的基态和激发态能谱。量子近似优化算法的性能分析揭示了量子优势与问题结构之间的深层联系,而量子交替算子算法的收敛性理论为算法设计提供了指导原则。量子计算中的去相干效应和环境噪声构成了实用量子算法设计的主要约束。开放量子系统的主方程描述了量子态在环境耦合下的非酉演化,而量子过程层析技术则提供了噪声特征化的实验手段。
近期量子算法的研究集中于在含噪声中等规模量子设备上寻求实用量子优势。变分量子算法通过参数优化适应了硬件噪声特性,而量子错误缓解技术则通过后处理方法部分抑制了噪声影响。零噪声外推和概率错误消除为近期量子计算提供了实用的错误缓解策略。量子计算复杂性理论中的量子PCP猜想和量子哈密顿复杂性问题探索了量子系统中可验证性和难解性的根本界限。局域哈密顿量的基态能量问题被证明是QMA完全的,而量子满足性问题则为理解量子复杂性提供了重要范例。量子网络和分布式量子计算扩展了量子信息处理的空间范围。量子中继器通过纠缠交换克服了量子通信的距离限制,而量子互联网的愿景依赖于量子存储和量子路由技术的突破。分布式量子算法需要在通信复杂性和计算复杂性之间权衡,量子隐形传态和量子纠缠分发构成了分布式量子协议的基础操作。量子计算在材料科学和药物发现中的应用前景激发了量子模拟算法的深入研究。费米-哈伯德模型和分子电子结构计算为量子化学提供了天然的量子算法应用场景,而变分量子特征求解器在小分子体系中已经展现了与经典方法相当的计算精度。量子启发的经典算法从量子算法设计中汲取灵感,为经典计算机上的近似算法提供了新的思路。张量网络方法和矩阵乘积态技术在某些量子系统的经典模拟中取得了显著成功,而量子启发的优化算法则在组合优化和机器学习中找到了应用价值。
|
考点1:“酉变换”推荐译为 Unitary Transformation,避免与“unitary operation”混用,全文统一。
考点2:“量子纠错码”推荐译为 Quantum Error Correction Code,首次出现可注明缩写 QECC。
考点3:“阈值容错”推荐译为 Fault-Tolerance Threshold避免仅译为“Threshold Fault Tolerance”
考点4:“哈密顿量”推荐译为 Hamiltonian,泛指概念时用单数,指多个不同体系时用复数 Hamiltonians,全文统一。
考点5:“问题解态”推荐译为 solution state,避免“problem-solving state”等过程化表达。
考点6:量子梅林亚瑟类首次出现时译为 Quantum Merlin-Arthur,注明缩写 (QMA),全文一致。
考点7:量子近似优化算法首次出现时译为 Quantum Approximate Optimization Algorithm,注明缩写 (QAOA),全文一致。
考点8:量子密钥分发首次出现时译为 Quantum Key Distribution,注明缩写 (QKD),全文一致。
|
d0731
|
学术论文
|
自然科学
|
109
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
The Atlantic meridional overturning circulation (AMOC) is a major tipping element in the climate system and a future collapse would have severe impacts on the climate in the North Atlantic region. In recent years weakening in circulation has been reported, but assessments by the Intergovernmental Panel on Climate Change (IPCC), based on the Climate Model Intercomparison Project (CMIP) model simulations suggest that a full collapse is unlikely within the 21st century. Tipping to an undesired state in the climate is, however, a growing concern with increasing greenhouse gas concentrations. Predictions based on observations rely on detecting early-warning signals, primarily an increase in variance (loss of resilience) and increased autocorrelation (critical slowing down), which have recently been reported for the AMOC. Here we provide statistical significance and data-driven estimators for the time of tipping. We estimate a collapse of the AMOC to occur around mid-century under the current scenario of future emissions.
A forthcoming collapse of the Atlantic meridional overturning circulation (AMOC) is a major concern as it is one of the most important tipping elements in Earth’s climate system1–3. In recent years, model studies and paleoclimatic reconstructions indicate that the strongest abrupt climate fluctuations, the Dansgaard-Oeschger events4, are connected to the bimodal nature of the AMOC5,6. Numerous climate model studies show a hysteresis behavior, where changing a control parameter, typically the freshwater input into the Northern Atlantic, makes the AMOC bifurcate through a set of co-dimension one saddlenode bifurcations7–9. State-of-the-art Earth-system models can reproduce such a scenario, but the inter-model spread is large and the critical threshold is poorly constrained10,11. Based on the CMIP5 generation of models, the AR6 IPCC report quotes a collapse in the 21st century to be very unlikely (medium confidence)12. Among CMIP6 models, there is a larger spread in the AMOC response to warming scenarios, thus an increased uncertainty in the assessment of a future collapse13. There are, however, model biases toward overestimated stability of the AMOC, both from tuning to the historic climate record14, poor representation of the deep water formation15, salinity and glacial runoff16. When complex systems, such as the overturning circulation, undergo critical transitions by changing a control parameter λ through a critical value λc, a structural change in the dynamics happens. The previously statistically stable state ceases to exist and the system moves to a different statistically stable state. The system undergoes a bifurcation, which for λ sufficiently close to λc can happen in a limited number of ways rather independent from the details in the governing dynamics17. Besides a decline of the AMOC before the critical transition, there are early-warning signals (EWSs), statistical quantities, which also change before the tipping happens. These are critical slowing down (increased autocorrelation) and, from the FluctuationDissipation Theorem, increased variance in the signal18–20. The latter is also termed “loss of resilience”, especially in the context of ecological collapse21. The two EWSs are statistical equilibrium concepts. Thus, using them as actual predictors of a forthcoming transition relies on the assumption of quasi-stationary dynamics. The AMOC has only been monitored continuously since 2004 through combined measurements from moored instruments, induced electrical currents in submarine cables and satellite surface measurements22. Over the period 2004–2012, a decline in the AMOC has been observed, but longer records are necessary to assess the significance. For that, careful fingerprinting techniques have been applied to longer records of sea surface temperature (SST), which, backed by a survey of a large ensemble of climate model simulations,have found the SST in the Subpolar gyre (SG) region of the North Atlantic (area marked with a black contour in Fig. 1a) to contain an optimal fingerprint of the strength of the AMOC23–25. Figure 1b shows the SG and the GM SSTs obtained from the Hadley Centre Sea Ice and Sea Surface Temperature data set (HadISST)26. Figure 1c shows the SG anomaly, and Fig. 1d shows the GM anomaly with a clear global warming trend in the last half of the record. The AMOC fingerprint for the period 1870–2020 is shown in Fig. 1e. This is the basis for the analysis. It has been reported11,27 that this and similar AMOC indices show significant trends in the mean, the variance and the autocorrelation, indicating early warning of a shutdown of the AMOC. However, a trend in the EWSs within a limited period of observation could be a random fluctuation within steady-state statistics. Thus, for a robust assessment of the shutdown, it is necessary to establish a statistical confidence level for the change above the natural fluctuations. This is not easily done given only one, the observed realization of the approach to the transition. Here we establish such a measure of the confidence for the variance and autocorrelation and demonstrate that variance is the more reliable of the two. A further contribution is an estimator of not only whether a transition is approaching but also the time when the critical transition is expected to occur. The strategy is to infer the evolution of the AMOC solely on observed changes in mean, variance and autocorrelation. The typical choice of control parameter is the flux of freshwater into the North Atlantic. River runoff, Greenland ice melt and export from the Arctic Ocean are not well constrained28; thus, we do not assume the control parameter known. Boers27 assumes the global mean temperature T to represent the control parameter. Although T has increased since ~1920 (Fig. 1d), the increase is not quite linear with time. All we assume here is that the AMOC is in an equilibrium state prior to a change toward the transition. The simplest uninformed assumption is that the change is sufficiently slow and that the control parameter approaches the (unknown) critical value linearly with time. This assumption is confirmed by a close fit of the estimated model to the observed AMOC fingerprint. Although we make no explicit assumptions, the primary driver of climate change, the logarithm of the atmospheric CO2 concentration, does, in fact, increase close to linearly with time in the industrial period29. Our results are robust without making specific assumptions regarding the driver of the AMOC. In this work, we show that a transition of the AMOC is most likely to occur around 2025-2095 (95% confidence interval).
Modeling and detecting the critical transition Denote the observed AMOC fingerprint by x(t) (Fig. 1e). We model it by a stochastic process Xt, which, depending on a control parameter λ < 0, is at risk of undergoing a critical transition through a saddle-node bifurcation for λ = λc = 0. The system is initially in a statistically stable state, i.e., it follows some stationary distribution with constant λ = λ0. We are uninformed about the dynamics governing the evolution of Xt but can assume effective dynamics, which, with λ sufficiently close to the critical value λc = 0, can be described by the stochastic differential equation (SDE):dX t = ðAðX t mÞ2 + λÞdt + σdBt , ð1Þ where m = μ ∣λ∣=A p and μ is the stable fixed point of the drift, A is a time scale parameter, Bt is a Brownian motion and σ2 scales the variance. Disregarding the noise, this is the normal form of the codimension one saddle-node bifurcation17 (see “Methods”). The squareroot dependence of the stable state: μ m ∼ λc λ p is the main signature of a saddle-node bifurcation. It is observed for the AMOC shutdown in ocean-only models as well as in coupled models, see Fig. 2, in strong support of Eq. (1) for the AMOC.At time t0, λ(t) begins to change linearly toward λc = λ(tc) = 0: λðtÞ = λ0ð1 Θ1⁄2t t0 ðt t0Þ=τr Þ, ð2Þ where Θ[t] is the Heaviside function and τr = tc − t0 > 0 is the ramping time up to time tc, where the transition eventually will occur. Time tc is denoted the tipping time; however, an actual tipping can happen earlier than tc due to a noise-induced tipping. As the transition is approached, the risk of noise-induced tipping (n-tipping) prior to tc is increasing and, at some point, making the EWSs irrelevant for predicting the tipping. The probability for n-tipping can, in the small noise limit, be calculated in closed form, Pðt,λÞ = 1 expð t=τnðλÞÞ, with mean waiting time τnðλÞ = ðπ= ffi∣ffiλffiffi∣ffi p Þ expð8∣λ∣3=2=3σ2Þ (see “Methods”). The mean and variance are calculated from the observations as the control parameter λ(t) is possibly changing. These EWSs are inherently equilibrium concepts and statistical; thus, a time window, Tw, of a certain size is required for a reliable estimate. As the transition is approached, the differences between the EWSs and the preramping values of the variance and autocorrelation (baseline) increase; thus, a shorter window Tw is required for detecting a difference. Conversely, close to the transition critical slowing down decreases the number of independent points within a window, thus calling for a larger window for reliable detection. Within a short enough window, [t − Tw/2, t + Tw/2], we may assume λ(t) to be constant and the noise small enough so that the process (1) for given λ is well approximated by a linear SDE, the Ornstein–Uhlenbeck process30. A Taylor expansion around the fixed point μ(λ) yields the approximation ... where ... and ... is the inverse correlation time. For fixed λ, the process is stationary, with mean μ, variance γ2 = σ2/2α and one-lag autocorrelation ρ = expð αΔtÞ with step size Δt = 1 month. As λ(t) increases, α decreases, and thus variance and autocorrelation increase. From μ, γ2 and ρ the parameters of Eq. (1) are determined: α = log ρ=Δt, σ2 = 2αγ2, A = α/2(μ − m) and λ = ðσ2=4γ2Þ2=A. Closed form estimators for μ, γ2 and ρ are obtained from the observed time series within a running window by maximum likelihood estimation (MLE) (Supplementary text S1, see also ref. 31). The uncertainty is expressed through the variances of the estimators γ^2 and ^ρ obtained from the observations within a time window Tw. The hats indicate that they are estimators and thus stochastic variables with variances around the true values. Detection of an EWS at some chosen confidence level q (such as 95 or 99%) requires one of the estimates γ^2 or ^ρ for a given window to be statistically different from the baseline values γ^2 0 or ^ρ0, which depend on the window size as well as how different the EWSs are from their baseline values.
|
The Atlantic meridional overturning circulation (AMOC) is a major tipping element in the climate system and a future collapse would have severe impacts on the climate in the North Atlantic region. In recent years weakening in circulation has been reported, but assessments by the Intergovernmental Panel on Climate Change (IPCC), based on the Climate Model Intercomparison Project (CMIP) model simulations suggest that a full collapse is unlikely within the 21st century. Tipping to an undesired state in the climate is, however, a growing concern with increasing greenhouse gas concentrations. Predictions based on observations rely on detecting early-warning signals, primarily an increase in variance (loss of resilience) and increased autocorrelation (critical slowing down), which have recently been reported for the AMOC. Here we provide statistical significance and data-driven estimators for the time of tipping. We estimate a collapse of the AMOC to occur around mid-century under the current scenario of future emissions.
A forthcoming collapse of the Atlantic meridional overturning circulation (AMOC) is a major concern as it is one of the most important tipping elements in Earth’s climate system1–3. In recent years, model studies and paleoclimatic reconstructions indicate that the strongest abrupt climate fluctuations, the Dansgaard-Oeschger events4, are connected to the bimodal nature of the AMOC5,6. Numerous climate model studies show a hysteresis behavior, where changing a control parameter, typically the freshwater input into the Northern Atlantic, makes the AMOC bifurcate through a set of co-dimension one saddlenode bifurcations7–9. State-of-the-art Earth-system models can reproduce such a scenario, but the inter-model spread is large and the critical threshold is poorly constrained10,11. Based on the CMIP5 generation of models, the AR6 IPCC report quotes a collapse in the 21st century to be very unlikely (medium confidence)12. Among CMIP6 models, there is a larger spread in the AMOC response to warming scenarios, thus an increased uncertainty in the assessment of a future collapse13. There are, however, model biases toward overestimated stability of the AMOC, both from tuning to the historic climate record14, poor representation of the deep water formation15, salinity and glacial runoff16. When complex systems, such as the overturning circulation, undergo critical transitions by changing a control parameter λ through a critical value λc, a structural change in the dynamics happens. The previously statistically stable state ceases to exist and the system moves to a different statistically stable state. The system undergoes a bifurcation, which for λ sufficiently close to λc can happen in a limited number of ways rather independent from the details in the governing dynamics17. Besides a decline of the AMOC before the critical transition, there are early-warning signals (EWSs), statistical quantities, which also change before the tipping happens. These are critical slowing down (increased autocorrelation) and, from the FluctuationDissipation Theorem, increased variance in the signal18–20. The latter is also termed “loss of resilience”, especially in the context of ecological collapse21. The two EWSs are statistical equilibrium concepts. Thus, using them as actual predictors of a forthcoming transition relies on the assumption of quasi-stationary dynamics. The AMOC has only been monitored continuously since 2004 through combined measurements from moored instruments, induced electrical currents in submarine cables and satellite surface measurements22. Over the period 2004–2012, a decline in the AMOC has been observed, but longer records are necessary to assess the significance. For that, careful fingerprinting techniques have been applied to longer records of sea surface temperature (SST), which, backed by a survey of a large ensemble of climate model simulations,have found the SST in the Subpolar gyre (SG) region of the North Atlantic (area marked with a black contour in Fig. 1a) to contain an optimal fingerprint of the strength of the AMOC23–25. Figure 1b shows the SG and the GM SSTs obtained from the Hadley Centre Sea Ice and Sea Surface Temperature data set (HadISST)26. Figure 1c shows the SG anomaly, and Fig. 1d shows the GM anomaly with a clear global warming trend in the last half of the record. The AMOC fingerprint for the period 1870–2020 is shown in Fig. 1e. This is the basis for the analysis. It has been reported11,27 that this and similar AMOC indices show significant trends in the mean, the variance and the autocorrelation, indicating early warning of a shutdown of the AMOC. However, a trend in the EWSs within a limited period of observation could be a random fluctuation within steady-state statistics. Thus, for a robust assessment of the shutdown, it is necessary to establish a statistical confidence level for the change above the natural fluctuations. This is not easily done given only one, the observed realization of the approach to the transition. Here we establish such a measure of the confidence for the variance and autocorrelation and demonstrate that variance is the more reliable of the two. A further contribution is an estimator of not only whether a transition is approaching but also the time when the critical transition is expected to occur. The strategy is to infer the evolution of the AMOC solely on observed changes in mean, variance and autocorrelation. The typical choice of control parameter is the flux of freshwater into the North Atlantic. River runoff, Greenland ice melt and export from the Arctic Ocean are not well constrained28; thus, we do not assume the control parameter known. Boers27 assumes the global mean temperature T to represent the control parameter. Although T has increased since ~1920 (Fig. 1d), the increase is not quite linear with time. All we assume here is that the AMOC is in an equilibrium state prior to a change toward the transition. The simplest uninformed assumption is that the change is sufficiently slow and that the control parameter approaches the (unknown) critical value linearly with time. This assumption is confirmed by a close fit of the estimated model to the observed AMOC fingerprint. Although we make no explicit assumptions, the primary driver of climate change, the logarithm of the atmospheric CO2 concentration, does, in fact, increase close to linearly with time in the industrial period29. Our results are robust without making specific assumptions regarding the driver of the AMOC. In this work, we show that a transition of the AMOC is most likely to occur around 2025-2095 (95% confidence interval).
Modeling and detecting the critical transition Denote the observed AMOC fingerprint by x(t) (Fig. 1e). We model it by a stochastic process Xt, which, depending on a control parameter λ < 0, is at risk of undergoing a critical transition through a saddle-node bifurcation for λ = λc = 0. The system is initially in a statistically stable state, i.e., it follows some stationary distribution with constant λ = λ0. We are uninformed about the dynamics governing the evolution of Xt but can assume effective dynamics, which, with λ sufficiently close to the critical value λc = 0, can be described by the stochastic differential equation (SDE):dX t = ðAðX t mÞ2 + λÞdt + σdBt , ð1Þ where m = μ ∣λ∣=A p and μ is the stable fixed point of the drift, A is a time scale parameter, Bt is a Brownian motion and σ2 scales the variance. Disregarding the noise, this is the normal form of the codimension one saddle-node bifurcation17 (see “Methods”). The squareroot dependence of the stable state: μ m ∼ λc λ p is the main signature of a saddle-node bifurcation. It is observed for the AMOC shutdown in ocean-only models as well as in coupled models, see Fig. 2, in strong support of Eq. (1) for the AMOC.At time t0, λ(t) begins to change linearly toward λc = λ(tc) = 0: λðtÞ = λ0ð1 Θ1⁄2t t0 ðt t0Þ=τr Þ, ð2Þ where Θ[t] is the Heaviside function and τr = tc − t0 > 0 is the ramping time up to time tc, where the transition eventually will occur. Time tc is denoted the tipping time; however, an actual tipping can happen earlier than tc due to a noise-induced tipping. As the transition is approached, the risk of noise-induced tipping (n-tipping) prior to tc is increasing and, at some point, making the EWSs irrelevant for predicting the tipping. The probability for n-tipping can, in the small noise limit, be calculated in closed form, Pðt,λÞ = 1 expð t=τnðλÞÞ, with mean waiting time τnðλÞ = ðπ= ffi∣ffiλffiffi∣ffi p Þ expð8∣λ∣3=2=3σ2Þ (see “Methods”). The mean and variance are calculated from the observations as the control parameter λ(t) is possibly changing. These EWSs are inherently equilibrium concepts and statistical; thus, a time window, Tw, of a certain size is required for a reliable estimate. As the transition is approached, the differences between the EWSs and the preramping values of the variance and autocorrelation (baseline) increase; thus, a shorter window Tw is required for detecting a difference. Conversely, close to the transition critical slowing down decreases the number of independent points within a window, thus calling for a larger window for reliable detection. Within a short enough window, [t − Tw/2, t + Tw/2], we may assume λ(t) to be constant and the noise small enough so that the process (1) for given λ is well approximated by a linear SDE, the Ornstein–Uhlenbeck process30. A Taylor expansion around the fixed point μ(λ) yields the approximation ... where ... and ... is the inverse correlation time. For fixed λ, the process is stationary, with mean μ, variance γ2 = σ2/2α and one-lag autocorrelation ρ = expð αΔtÞ with step size Δt = 1 month. As λ(t) increases, α decreases, and thus variance and autocorrelation increase. From μ, γ2 and ρ the parameters of Eq. (1) are determined: α = log ρ=Δt, σ2 = 2αγ2, A = α/2(μ − m) and λ = ðσ2=4γ2Þ2=A. Closed form estimators for μ, γ2 and ρ are obtained from the observed time series within a running window by maximum likelihood estimation (MLE) (Supplementary text S1, see also ref. 31). The uncertainty is expressed through the variances of the estimators γ^2 and ^ρ obtained from the observations within a time window Tw. The hats indicate that they are estimators and thus stochastic variables with variances around the true values. Detection of an EWS at some chosen confidence level q (such as 95 or 99%) requires one of the estimates γ^2 or ^ρ for a given window to be statistically different from the baseline values γ^2 0 or ^ρ0, which depend on the window size as well as how different the EWSs are from their baseline values.
|
考点1:“Climate Model Intercomparison Project (CMIP)”推荐译为“气候模式对比计划”
考点2:“tipping”推荐译为“颠覆”,而不应该翻译成专有名词中常见表述“临界的”
考点3:“co-dimension one saddle node bifurcations”推荐译为“共维一鞍节点分叉点”
考点4:“resilience”推荐译为“恢复力”
考点5:“quasi-stationary”推荐译为“准稳态/平稳”
考点6:“Heaviside function”推荐译为“赫维赛德函数”
|
d17d2
|
学术论文
|
自然科学
|
136
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
登高望远,穿云破雾
推动“大金砖合作”高质量发展
——在金砖国家领导人第十六次会晤上的讲话
尊敬的普京总统,
各位同事:
祝贺峰会成功召开,感谢普京总统及东道主俄罗斯的周到安排和热情接待。
我想借此机会再次欢迎新成员加入金砖大家庭。扩员是金砖发展史上的重要里程碑,也是国际格局演变的标志性事件。这次峰会我们又决定邀请多个国家成为金砖伙伴国。这是金砖发展过程中的又一个重要进展。中国人常讲:“君子处事,于义合者为利。”金砖国家走到一起,是基于共同追求,顺应世界和平和发展大势。我们要利用好这次峰会,保持好金砖发展势头,谋划好全局性、方向性、战略性问题,同心同德,勇毅前行,推动金砖国家集体再出发。
当前,世界进入新的动荡变革期,面临关键抉择。是任由世界动荡不安,还是推动其重回和平发展的正道?我想到俄罗斯作家车尔尼雪夫斯基的著作《怎么办?》,书中主人公的坚强意志和奋斗激情,正是当前我们所需要的精神力量。时代的风浪越大,我们越要勇立潮头,以坚韧不拔之志、敢为人先之勇、识变应变之谋,把金砖打造成促进“全球南方”团结合作的主要渠道、推动全球治理变革的先锋力量。
——我们要建设“和平金砖”,做共同安全的维护者。人类是不可分割的安全共同体。只有践行共同、综合、合作、可持续的安全观,才能走出一条普遍安全之路。乌克兰危机还在延宕。中国和巴西会同有关“全球南方”国家发起了乌克兰危机“和平之友”小组,旨在汇集更多致力于和平的声音。我们要坚持“战场不外溢、战事不升级、各方不拱火”三原则,推动局势尽快缓和。加沙地区的人道主义形势持续恶化,黎巴嫩战火又起,相关各方间的冲突还在进一步升级。我们要推动尽快停火、停止杀戮,为全面、公正、持久解决巴勒斯坦问题不懈努力。
——我们要建设“创新金砖”,做高质量发展的先行者。新一轮科技革命和产业变革迅猛发展。我们要紧跟时代步伐,培育新质生产力。中方新近成立中国-金砖国家人工智能发展与合作中心,愿同各方深化创新合作,释放人工智能能量。中方将建立金砖国家深海资源国际研究中心、金砖国家特殊经济区中国合作中心、金砖国家工业能力中国中心、金砖国家数字产业生态合作网络。欢迎各方积极参与,推动金砖合作提质升级。
——我们要建设“绿色金砖”,做可持续发展的践行者。绿色是这个时代的底色,金砖国家要主动融入全球绿色低碳转型洪流。中国电动汽车、锂电池、光伏产品等优质产能,为世界绿色发展提供了重要助力。中方愿发挥自身优势,同金砖国家拓展绿色产业、清洁能源以及绿色矿产合作,推动全产业链“绿色化”发展,充实合作“含绿量”,提升发展“含金量”。
——我们要建设“公正金砖”,做全球治理体系改革的引领者。国际力量对比正在深刻演变,但全球治理体系改革长期滞后。我们要践行真正的多边主义,坚持共商共建共享的全球治理观,以公平正义、开放包容为理念引领全球治理改革。我们要顺应“全球南方”崛起大势,积极回应各国加入金砖合作机制的呼声,推进扩员和设置伙伴国进程,提升发展中国家在全球治理中的代表性和发言权。
当前形势下,国际金融架构改革紧迫性突出。金砖国家要发挥引领作用,深化财金合作,促进金融基础设施互联互通,维护高水平金融安全,做大做强新开发银行,推动国际金融体系更好反映世界经济格局变化。
——我们要建设“人文金砖”,做文明和合共生的倡导者。金砖国家汇聚了深厚的历史和璀璨的文化。我们要积极倡导不同文明包容共存,加强治国理政经验交流,挖掘教育、体育、艺术等领域合作潜力,让不同文明交相辉映,照亮金砖前行之路。去年,我提出金砖数字教育合作倡议,很高兴看到这一机制已经落地。中方将实施金砖数字教育能力建设计划,未来5年在金砖国家设立10个海外学习中心,为1000名教育管理人员和师生提供培训机会,助力金砖人文交流走深走实。
各位同事!
中方愿同金砖各国一道,开创“大金砖合作”高质量发展新局面,携手更多“全球南方”国家共同推动构建人类命运共同体!
谢谢大家!
|
登高望远,穿云破雾
推动“大金砖合作”高质量发展
——在金砖国家领导人第十六次会晤上的讲话
尊敬的普京总统,
各位同事:
祝贺峰会成功召开,感谢普京总统及东道主俄罗斯的周到安排和热情接待。
我想借此机会再次欢迎新成员加入金砖大家庭。扩员是金砖发展史上的重要里程碑,也是国际格局演变的标志性事件。这次峰会我们又决定邀请多个国家成为金砖伙伴国。这是金砖发展过程中的又一个重要进展。中国人常讲:“君子处事,于义合者为利。”金砖国家走到一起,是基于共同追求,顺应世界和平和发展大势。我们要利用好这次峰会,保持好金砖发展势头,谋划好全局性、方向性、战略性问题,同心同德,勇毅前行,推动金砖国家集体再出发。
当前,世界进入新的动荡变革期,面临关键抉择。是任由世界动荡不安,还是推动其重回和平发展的正道?我想到俄罗斯作家车尔尼雪夫斯基的著作《怎么办?》,书中主人公的坚强意志和奋斗激情,正是当前我们所需要的精神力量。时代的风浪越大,我们越要勇立潮头,以坚韧不拔之志、敢为人先之勇、识变应变之谋,把金砖打造成促进“全球南方”团结合作的主要渠道、推动全球治理变革的先锋力量。
——我们要建设“和平金砖”,做共同安全的维护者。人类是不可分割的安全共同体。只有践行共同、综合、合作、可持续的安全观,才能走出一条普遍安全之路。乌克兰危机还在延宕。中国和巴西会同有关“全球南方”国家发起了乌克兰危机“和平之友”小组,旨在汇集更多致力于和平的声音。我们要坚持“战场不外溢、战事不升级、各方不拱火”三原则,推动局势尽快缓和。加沙地区的人道主义形势持续恶化,黎巴嫩战火又起,相关各方间的冲突还在进一步升级。我们要推动尽快停火、停止杀戮,为全面、公正、持久解决巴勒斯坦问题不懈努力。
——我们要建设“创新金砖”,做高质量发展的先行者。新一轮科技革命和产业变革迅猛发展。我们要紧跟时代步伐,培育新质生产力。中方新近成立中国-金砖国家人工智能发展与合作中心,愿同各方深化创新合作,释放人工智能能量。中方将建立金砖国家深海资源国际研究中心、金砖国家特殊经济区中国合作中心、金砖国家工业能力中国中心、金砖国家数字产业生态合作网络。欢迎各方积极参与,推动金砖合作提质升级。
——我们要建设“绿色金砖”,做可持续发展的践行者。绿色是这个时代的底色,金砖国家要主动融入全球绿色低碳转型洪流。中国电动汽车、锂电池、光伏产品等优质产能,为世界绿色发展提供了重要助力。中方愿发挥自身优势,同金砖国家拓展绿色产业、清洁能源以及绿色矿产合作,推动全产业链“绿色化”发展,充实合作“含绿量”,提升发展“含金量”。
——我们要建设“公正金砖”,做全球治理体系改革的引领者。国际力量对比正在深刻演变,但全球治理体系改革长期滞后。我们要践行真正的多边主义,坚持共商共建共享的全球治理观,以公平正义、开放包容为理念引领全球治理改革。我们要顺应“全球南方”崛起大势,积极回应各国加入金砖合作机制的呼声,推进扩员和设置伙伴国进程,提升发展中国家在全球治理中的代表性和发言权。
当前形势下,国际金融架构改革紧迫性突出。金砖国家要发挥引领作用,深化财金合作,促进金融基础设施互联互通,维护高水平金融安全,做大做强新开发银行,推动国际金融体系更好反映世界经济格局变化。
——我们要建设“人文金砖”,做文明和合共生的倡导者。金砖国家汇聚了深厚的历史和璀璨的文化。我们要积极倡导不同文明包容共存,加强治国理政经验交流,挖掘教育、体育、艺术等领域合作潜力,让不同文明交相辉映,照亮金砖前行之路。去年,我提出金砖数字教育合作倡议,很高兴看到这一机制已经落地。中方将实施金砖数字教育能力建设计划,未来5年在金砖国家设立10个海外学习中心,为1000名教育管理人员和师生提供培训机会,助力金砖人文交流走深走实。
各位同事!
中方愿同金砖各国一道,开创“大金砖合作”高质量发展新局面,携手更多“全球南方”国家共同推动构建人类命运共同体!
谢谢大家!
|
考点1:大金砖合作 必须译为:greater BRICS cooperation。避免使用 "Great BRICS Cooperation" 等可能引起歧义的表达,"greater" 能准确体现扩员后范围更广、规模更大的含义。
考点2:君子处事,于义合者为利。 必须译为:A man of virtue regards righteousness as the greatest interest。避免额外添加“for mutual benefit”等非原文信息,以免偏离“合乎道义本身就是利益”的核心含义。
考点3:和平金砖 推荐翻译为:a BRICS committed to peace。
考点4:战场不外溢、战事不升级、各方不拱火 推荐翻译为:no expansion of the battlefields, no escalation of hostilities, and no fanning flames。避免将“外溢”简化为 “not expanding war”,应保留“spillover/expansion of the battlefield”的准确概念。
考点5:创新金砖 推荐翻译为:a BRICS committed to innovation。
考点6:绿色金砖 推荐翻译为:a BRICS committed to green development。
考点7:公正金砖 推荐翻译为:a BRICS committed to justice。
考点8:践行真正的多边主义 推荐翻译为:to champion true multilateralism。避免用 “follow” 替代 “champion/practice”,否则会削弱主动性和政治力度。
考点9:坚持共商共建共享的全球治理观 推荐翻译为:to adhere to the vision of global governance characterized by extensive consultation, joint contribution, and shared benefits。避免将“共商共建共享”简化为“...for shared benefit”,需保留三者并列结构。
考点10:人文金砖 推荐翻译为:a BRICS committed to closer people-to-people exchanges。避免使用 "Humanistic BRICS" 等在英文语境中偏向“人本主义”或“人文学科”的表达。
考点11:开创……新局面 推荐翻译为:open a new chapter for / usher in a new era of,而非 create a new situation of,避免中式直译。
考点12:再出发(政治话语) 推荐翻译为:embark on a new journey / launch a new chapter,避免 new departure 等不常用于政治语境的表达。
考点13:绿色是这个时代的底色 推荐翻译为:Green development defines our era / Green is a defining feature of our times,避免直译为 fundamental color of this era。
考点14:充实合作“含绿量”,提升发展“含金量” 推荐翻译为:increase the sustainability of cooperation and enhance the value/quality of development,避免逐字直译为 green content / gold content,丢失文字游戏与文化意象。
考点15:转型洪流 推荐翻译为:the torrent of transition / a surging tide of transformation,而非简单的 global trend,以保留比喻的力量与气势。
考点16:崛起大势 推荐翻译为:the irresistible rise / the prevailing tide of the rise,避免 general trend of the rise 这种情感色彩偏弱的表述。
考点17:海外学习中心 推荐翻译为:overseas learning centers,避免额外增补未出现的修饰(如 for digital education cooperation)除非原文明确。
考点18:师生 推荐翻译为:teachers and students,不应改为 practitioners,以免改变受益人群的范围和性质。
考点19:引领者 推荐翻译为:leaders in / be the leader of,避免用 promote 替代,以免弱化领导角色的主动性与权威性。
考点20:外溢(安全语境) 推荐翻译为:spillover of the battlefield,保留军事/冲突语境的准确含义,避免仅用 not expanding war。
考点21:发展与合作(机构名称) 推荐翻译为:Development and Cooperation,避免添加原文无的 Research 等词汇。
|
d7f14
|
新闻资讯
|
观点评论
|
114
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
**Abstract:** As we know, Hanfeizi is the most representative figure of the legist school. His ideas are best described in his book “Hanfeizi ”,in which he strongly advocated the importance of “law”, “means”, “force ” for an emperor to control his country. About one thousand years later, in Italy there was an politician named Machiavelli. In his famous book called “The Prince”, he adopted the same attitude with Hanfeizi towards how an emperor should rule his country. In this paper, the author tries to explore some similarities and some dissimilarities between the two great thinkers from the aspect of their background, their attitudes towards the nature and relationship of human beings and so on.
**I Similarities in their backgrounds**
Hanfeizi (280BC_233BC) was born in the Spring and Autumn Period in Han state. At that time Han state was the most weakest state of the seven states. Hanfeizi ,who was much influenced by his teacher Xunzi and the Taoism, saw the political corruption in his country and put forward much useful advice to carry out reform.. Unfortunately the emperor of Han would not like to adopt his ideas and let his country wither away. However the emperor of Qinshihuang admired the talent of Hanfeizi and wanted to give him a position in Qin state. Although Qinshihuang finally killed Hanfeizi owing to listening to the unfaithful advice of Lisi., he ruled his country on the principles advocated by Hanfeizi. Until that time did the divived situation come to an end and the united central right come out.
Machiavelli was born in Florence, Italy at a time when the country was in political upheaval . Italy was divided between four dominant city-states, and each of these was continually at the mercy of the stronger foreign governments of Europe. Since 1434 Florence was ruled by the wealthy Medici family. Their rule was temporarily interrupted by a reform movement, begun in 1494, in which the young Machiavelli became an important diplomat. When the Medici family regained power in 1512 with the help of Spanish troops, Machiavelli was tortured and removed from public life. For the next 10 years he devoted himself to writing history, political philosophy, and even plays. He ultimately gained favor with the Medici family and was called back to public duty for the last two years of his life. Machiavelli's greatest work is The Prince, written in 1513 and published after his death in 1532. The work immediately provoked controversy and was soon condemned by Pope Clement VIII. Its main theme is that princes should retain absolute control of their territories, and they should use any means of expediency to accomplish this end, including deceit. Scholars struggle over interpreting Machiavelli's precise point. In several section Machiavelli praises Caesar Borgia, a Spanish aristocrat who became a notorious and much despised tyrant of the Romagna region of northern Italy. During Machiavelli's early years as a diplomat, he was in contact with Borgia and witnessed Borgia's rule first hand. Does Machiavelli hold up Borgia as the model prince? Some readers initially saw The Prince as a satire on absolute rulers such as Borgia, which showed the repugnance of arbitrary power (thereby implying the importance of liberty). However, this theory fell apart when, in 1810, a letter by Machiavelli was discovered in which he reveals that he wrote The Prince to endear himself to the ruling Medici family in Florence. To liberate Italy from the influence of foreign governments, Machiavelli explains that strong indigenous governments are important, even if they are absolutist.
**II Similarities in their attitudes reflected in their works**
1. On force
From the experience Machiavelli learned that weak countries had no diplomatic relationship with other counties. In his work he put forward that the weakest thing in the world was the power that was exaggerated. He tried to persuade the emperor to make a strong army, which would become the solid foundation of any course. While Hanfeizi held the same opinion with Machiavelli, he said that the most important task for an emperor was to develop his country in many ways such as increasing the production of agriculture, establish clear encouragement and punishment laws, have a forceful army under his control.
2. On humans nature and their relationship
Though humanists of Machiavelli's time believed that an individual had much to offer to the well being of the state, Machiavelli was quick to mock human nature. Humanists believed that "An individual only grows to maturity- both intellectually and morally- through participation' in the life of the state."
Machiavelli generally distrusted citizens, stating that "...in time of adversity, when the state is in need of it's citizens there are few to be found.” Machiavelli further went on to question the loyalty of the citizens and advised the Prince that "...because men a wretched creatures who would not keep their word to you, you need keep your word to them."
The same to Hanfeizi. Under the influence of his teacher Xunzi, Hanfeizi adhered to the principle that human nature was bad. And his developed his ideas to the enumerated kingdom which he thought was the heaven of the earth. He believed that human beings were driven by the greed for profit. We can see some trace in his famous saying: strict mother has kind children, while kind mother has brute children.
Both of them believed that the relationship among human beings was a kind of naked interest_oriented relationship. They make use of each other, not believe in others, and would try every means to reach ones aims.
3. On the image of emperor.
In The Prince Niccolo Machiavelli presents a view of governing : state that is drastically different from that of humanists of his time. Machiavelli believes the ruling Prince should be the sole authority determining every aspect of the state and put in effect a policy, which would serve his best interests. These interests were gaining, maintaining, and expanding his political power. His understanding of human nature was a complete contradiction of what humanists believed and
taught. Machiavelli strongly promoted a secular society and felt morality was not necessary but in fact stood in the way of an effectively governed principality. Though in come cases Machiavelli's suggestions seem harsh and immoral one must remember that these views
were derived out of concern Italy's unstable political condition. If a prince can not be both feared and loved, Machiavelli suggests, it would be better for him to be feared bey the citizens within his own principality. He makes the generalization that men are, "...ungrateful, fickle, liars, and deceivers, they shun danger and are greedy for profit; while you treat them well they are yours." He characterizes men as being self centered and not willing to act in the best interest of the state,"[and when the prince] is in danger they turn against[him]." Machiavelli reinforces the prince's need to be feared by stating: Machiavelli postulates that a prince must also deceive those whoattempt to flatter him.
In choosing wise men for his government and allowing those the freedom to speak the truth to him, and then only concerning matters on which he asks their opinion, and nothing else. But he should also question them toughly and listen to what they say; then he should make
up his own mind.
Machiavelli actively promoted a secular form of politics. He laid aside the Medievalli conception "of the state as a necessary creation for humankinds spiritual, material, and social well-being." In such a state,"a ruler was justified in his exercise of political power only if it contributed to the common good of the people he served, and the ethical side of a princes activity...ought to be based on Christian moral principles...."
Machiavelli believed a secular form of government to be a more realistic type. His views were to the benefit of the prince, in helping him maintain power rather than to serve to the well being of the citizens. Machiavelli promoted his belief by stating: The fact is that a man who wants to act virtuously in every way necessarily comes to grief among those who are not virtuous. Therefore,if a prince wants to maintain his rule he must learn not to be sovirtuous, and to make use of this or not according to need.
Hanfeizi also had the same attitude .He advocated his ideas about the “law”, ”mean”, ”force”. Many emperors in the Chinese history adopted his ideas in order to rule their countries. He believed that as an emperor ,one should know the dividing line of the encouragement and punishment and use these them wisely. The emperor should learn to get rid of the opponents and use law to rule the country so that all the citizen would know what they should do and what they should not.
|
**Abstract:** As we know, Hanfeizi is the most representative figure of the legist school. His ideas are best described in his book “Hanfeizi ”,in which he strongly advocated the importance of “law”, “means”, “force ” for an emperor to control his country. About one thousand years later, in Italy there was an politician named Machiavelli. In his famous book called “The Prince”, he adopted the same attitude with Hanfeizi towards how an emperor should rule his country. In this paper, the author tries to explore some similarities and some dissimilarities between the two great thinkers from the aspect of their background, their attitudes towards the nature and relationship of human beings and so on.
**I Similarities in their backgrounds**
Hanfeizi (280BC_233BC) was born in the Spring and Autumn Period in Han state. At that time Han state was the most weakest state of the seven states. Hanfeizi ,who was much influenced by his teacher Xunzi and the Taoism, saw the political corruption in his country and put forward much useful advice to carry out reform.. Unfortunately the emperor of Han would not like to adopt his ideas and let his country wither away. However the emperor of Qinshihuang admired the talent of Hanfeizi and wanted to give him a position in Qin state. Although Qinshihuang finally killed Hanfeizi owing to listening to the unfaithful advice of Lisi., he ruled his country on the principles advocated by Hanfeizi. Until that time did the divived situation come to an end and the united central right come out.
Machiavelli was born in Florence, Italy at a time when the country was in political upheaval . Italy was divided between four dominant city-states, and each of these was continually at the mercy of the stronger foreign governments of Europe. Since 1434 Florence was ruled by the wealthy Medici family. Their rule was temporarily interrupted by a reform movement, begun in 1494, in which the young Machiavelli became an important diplomat. When the Medici family regained power in 1512 with the help of Spanish troops, Machiavelli was tortured and removed from public life. For the next 10 years he devoted himself to writing history, political philosophy, and even plays. He ultimately gained favor with the Medici family and was called back to public duty for the last two years of his life. Machiavelli's greatest work is The Prince, written in 1513 and published after his death in 1532. The work immediately provoked controversy and was soon condemned by Pope Clement VIII. Its main theme is that princes should retain absolute control of their territories, and they should use any means of expediency to accomplish this end, including deceit. Scholars struggle over interpreting Machiavelli's precise point. In several section Machiavelli praises Caesar Borgia, a Spanish aristocrat who became a notorious and much despised tyrant of the Romagna region of northern Italy. During Machiavelli's early years as a diplomat, he was in contact with Borgia and witnessed Borgia's rule first hand. Does Machiavelli hold up Borgia as the model prince? Some readers initially saw The Prince as a satire on absolute rulers such as Borgia, which showed the repugnance of arbitrary power (thereby implying the importance of liberty). However, this theory fell apart when, in 1810, a letter by Machiavelli was discovered in which he reveals that he wrote The Prince to endear himself to the ruling Medici family in Florence. To liberate Italy from the influence of foreign governments, Machiavelli explains that strong indigenous governments are important, even if they are absolutist.
**II Similarities in their attitudes reflected in their works**
1. On force
From the experience Machiavelli learned that weak countries had no diplomatic relationship with other counties. In his work he put forward that the weakest thing in the world was the power that was exaggerated. He tried to persuade the emperor to make a strong army, which would become the solid foundation of any course. While Hanfeizi held the same opinion with Machiavelli, he said that the most important task for an emperor was to develop his country in many ways such as increasing the production of agriculture, establish clear encouragement and punishment laws, have a forceful army under his control.
2. On humans nature and their relationship
Though humanists of Machiavelli's time believed that an individual had much to offer to the well being of the state, Machiavelli was quick to mock human nature. Humanists believed that "An individual only grows to maturity- both intellectually and morally- through participation' in the life of the state."
Machiavelli generally distrusted citizens, stating that "...in time of adversity, when the state is in need of it's citizens there are few to be found.” Machiavelli further went on to question the loyalty of the citizens and advised the Prince that "...because men a wretched creatures who would not keep their word to you, you need keep your word to them."
The same to Hanfeizi. Under the influence of his teacher Xunzi, Hanfeizi adhered to the principle that human nature was bad. And his developed his ideas to the enumerated kingdom which he thought was the heaven of the earth. He believed that human beings were driven by the greed for profit. We can see some trace in his famous saying: strict mother has kind children, while kind mother has brute children.
Both of them believed that the relationship among human beings was a kind of naked interest_oriented relationship. They make use of each other, not believe in others, and would try every means to reach ones aims.
3. On the image of emperor.
In The Prince Niccolo Machiavelli presents a view of governing : state that is drastically different from that of humanists of his time. Machiavelli believes the ruling Prince should be the sole authority determining every aspect of the state and put in effect a policy, which would serve his best interests. These interests were gaining, maintaining, and expanding his political power. His understanding of human nature was a complete contradiction of what humanists believed and
taught. Machiavelli strongly promoted a secular society and felt morality was not necessary but in fact stood in the way of an effectively governed principality. Though in come cases Machiavelli's suggestions seem harsh and immoral one must remember that these views
were derived out of concern Italy's unstable political condition. If a prince can not be both feared and loved, Machiavelli suggests, it would be better for him to be feared bey the citizens within his own principality. He makes the generalization that men are, "...ungrateful, fickle, liars, and deceivers, they shun danger and are greedy for profit; while you treat them well they are yours." He characterizes men as being self centered and not willing to act in the best interest of the state,"[and when the prince] is in danger they turn against[him]." Machiavelli reinforces the prince's need to be feared by stating: Machiavelli postulates that a prince must also deceive those whoattempt to flatter him.
In choosing wise men for his government and allowing those the freedom to speak the truth to him, and then only concerning matters on which he asks their opinion, and nothing else. But he should also question them toughly and listen to what they say; then he should make
up his own mind.
Machiavelli actively promoted a secular form of politics. He laid aside the Medievalli conception "of the state as a necessary creation for humankinds spiritual, material, and social well-being." In such a state,"a ruler was justified in his exercise of political power only if it contributed to the common good of the people he served, and the ethical side of a princes activity...ought to be based on Christian moral principles...."
Machiavelli believed a secular form of government to be a more realistic type. His views were to the benefit of the prince, in helping him maintain power rather than to serve to the well being of the citizens. Machiavelli promoted his belief by stating: The fact is that a man who wants to act virtuously in every way necessarily comes to grief among those who are not virtuous. Therefore,if a prince wants to maintain his rule he must learn not to be sovirtuous, and to make use of this or not according to need.
Hanfeizi also had the same attitude .He advocated his ideas about the “law”, ”mean”, ”force”. Many emperors in the Chinese history adopted his ideas in order to rule their countries. He believed that as an emperor ,one should know the dividing line of the encouragement and punishment and use these them wisely. The emperor should learn to get rid of the opponents and use law to rule the country so that all the citizen would know what they should do and what they should not.
|
考点1:"Spring and Autum period"必须译为“春秋战国”
考点2:“strict mother has kind children, while kind mother has brute children”必须译为“严家无悍虏,而慈母有败子”
考点3:“law” 指的是韩非子思想核心,必须译为 “法”
考点4: “means” 指的是韩非子思想核心,必须译为“术”
考点5:“force” 指的是韩非子思想核心,必须译为 “势”
|
d9b0c
|
学术论文
|
人文科学
|
19
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Identified Transportation Challenges
1. Technical Capability and Real-Time Data Utilization
Several studies highlight critical issues related to technical capability and real-time data utilization in smart transportation systems. The main issue is the integration of heterogeneous IoT data sources, which often creates data silos and interoperability problems that hamper seamless communication and decision-making [27,28,29,30,43]. Additionally, many legacy systems struggle to process dynamic, real-time data, resulting in suboptimal traffic management and extended response times [30,35,36,37,41,45,46]. Researchers further note a lack of robust predictive models, which undermines short-term traffic flow predictions and hinders efficient management of congestion in response to factors such as weather, road incidents, and special events [29,30,32,33,42,48,49].
Limited integration of multimodal traffic data with situational context also impedes effective transportation planning, underscoring the need to incorporate contextual information (e.g., real-time traffic restrictions and urban planning changes) [33,41]. Data reliability and accuracy remain pressing concerns, with sensor anomalies necessitating rigorous validation to ensure data quality [34,38,39,46,47]. Finally, interoperability gaps across transportation subsystems (e.g., buses and subways) create operational inefficiencies and negatively affect commuter experiences [28,33,45].
2. Traffic Congestion
Traffic congestion remains a central challenge in urban environments, impairing economic efficiency, environmental sustainability, and public health. Primary contributors include escalating vehicular density—driven by urbanization and rising vehicle ownership—and infrastructure limitations that fail to accommodate growing travel demand [24,26,28,35]. Inadequate real-time data processing curtails proactive congestion management measures, such as adaptive traffic signals and dynamic routing, while inefficiencies in traffic management systems further exacerbate the problem [27,34,43]. Severe congestion at key locations and during peak hours highlights the challenges of an overburdened transportation network that lacks the flexibility to accommodate fluctuating demand [31,36]. Long queues at intersections and inadequate signal timing contribute to further delays and inefficient traffic flow management [36].
Congestion also disrupts travel time reliability and impacts public transportation systems, particularly buses sharing mixed traffic lanes, leading to service irregularities and passenger dissatisfaction [42,44]. Beyond operational inefficiencies, the environmental impact of sustained congestion is significant, including higher fuel consumption and emissions that degrade air quality and contribute to respiratory ailments [38,48]. These findings stress the urgency of implementing measures that mitigate congestion and foster sustainable transportation alternatives.
3. Public Transit and Multimodal Transportation Systems
Public transit and multimodal systems face interconnected challenges that restrict efficiency, accessibility, and overall effectiveness. Inequitable access is particularly acute in rural areas, where limited mobility options constrain access to essential services and exacerbate social inequalities [25]. This challenge is compounded by rising operational costs for demand-responsive transport systems and the difficulty in balancing multiple objectives, such as cost, coverage, and equity [25]. Operational inefficiencies, such as static timetables and unpredictably fluctuating traffic conditions, extend passenger wait times, reduce service reliability, and increase dissatisfaction [28]. Furthermore, a lack of integrated multimodal data hampers seamless transitions among various travel modes, while suboptimal passenger flow management during peak hours compounds congestion and service quality issues [33,45]. Consequently, planners seek integrated strategies to enhance network design, service frequency, and data sharing, ensuring that transit systems remain accessible, efficient, and adaptable to changing user demands [45].
4. Traffic Safety and Accidental Risks
Traffic safety and accidental risks remain substantial concerns in both conventional and increasingly connected or automated transport systems. Recurring traffic violations—such as drunk driving and red-light running—persist despite current enforcement, indicating an unmet need for integrating violation data into accident prevention measures [49]. The lack of advanced sensor deployment in accident-prone areas further limits the capacity to identify and address these violations proactively, leading to persistent safety risks [49]. Security threats in vehicular networks are another pressing concern, as increased connectivity in smart transportation systems introduces vulnerabilities to cyber intrusions and attacks, which can compromise vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, posing substantial risks to road users and critical infrastructure [43]. The need to balance mobility with health restrictions during crises, such as pandemics, presents unique challenges. Restrictions, including curfews and changing alert levels, disrupt traffic flow and necessitate real-time adjustments to route planning, complicating efforts to ensure both public safety and transportation efficiency [39]. Additionally, in the era of autonomous vehicles (AVs), safety risks in mixed-traffic environments may arise due to the coexistence of autonomous and human-driven vehicles, leading to unpredictable interactions and potential conflicts caused by differing driving behaviors and decision-making processes [37]. AVs operate based on pre-programmed algorithms, whereas human drivers rely on intuition and experience, increasing the likelihood of accidents in complex urban environments [37].
5. Environmental Impacts
Environmental concerns tied to transportation systems pose major barriers to sustainable urban development. Persistent congestion intensifies emissions of harmful pollutants, such as nitrogen oxides and particulate matter, degrading air quality and urban livability [38]. Reliance on fossil fuels contributes significantly to greenhouse gas emissions, climate change, and economic burdens associated with fuel consumption [44]. Poorly optimized logistics and traffic management practices exacerbate these challenges by increasing both travel distances and fuel consumption [47].
In response, numerous studies highlight a shift toward green transportation solutions, including enhanced public transit, active travel modes (e.g., walking and cycling), and smart mobility technologies [44]. Such strategies aim to lower environmental footprints and foster sustainable urban growth [44].
6. Transportation System Operation and Management
Effective operation and management of transportation systems are essential for ensuring efficiency, reliability, and sustainability. Nonetheless, resource limitations, legacy systems, and growing complexity create substantial operational hurdles. Studies point to constrained resources and the difficulty of balancing cost, coverage, and equity objectives, particularly in densely populated urban settings [25]. Conventional traffic management strategies are increasingly inadequate for handling modern, complex urban mobility, particularly as vehicle density rises [26,35]. One major contributor to inefficiency is the inadequate processing of real-time traffic data, which hinders the ability to implement adaptive traffic control measures [35]. Traffic light operations, in particular, remain inefficient, failing to respond effectively to fluctuating traffic volumes and dynamic demand patterns [34].
Furthermore, many systems are ill-equipped to incorporate real-time data and respond adaptively to fluctuating traffic conditions [36]. Traditional predictive models, which are typically designed for static or historical data, often prove ill-suited or exhibit inadequate performance when applied to dynamic, real-time traffic conditions. The complexity and unpredictability of streamed data can lead to delayed or suboptimal traffic flow management and inefficient resource utilization [44]. Freight operations add further intricacy, as route planning, resource allocation, and fleet management must account for cost, environmental impact, and service reliability [47]. Collectively, these findings illustrate the urgent need for data-driven, integrated strategies capable of addressing congestion, resource allocation, and technological interoperability challenges.
|
Identified Transportation Challenges
1. Technical Capability and Real-Time Data Utilization
Several studies highlight critical issues related to technical capability and real-time data utilization in smart transportation systems. The main issue is the integration of heterogeneous IoT data sources, which often creates data silos and interoperability problems that hamper seamless communication and decision-making [27,28,29,30,43]. Additionally, many legacy systems struggle to process dynamic, real-time data, resulting in suboptimal traffic management and extended response times [30,35,36,37,41,45,46]. Researchers further note a lack of robust predictive models, which undermines short-term traffic flow predictions and hinders efficient management of congestion in response to factors such as weather, road incidents, and special events [29,30,32,33,42,48,49].
Limited integration of multimodal traffic data with situational context also impedes effective transportation planning, underscoring the need to incorporate contextual information (e.g., real-time traffic restrictions and urban planning changes) [33,41]. Data reliability and accuracy remain pressing concerns, with sensor anomalies necessitating rigorous validation to ensure data quality [34,38,39,46,47]. Finally, interoperability gaps across transportation subsystems (e.g., buses and subways) create operational inefficiencies and negatively affect commuter experiences [28,33,45].
2. Traffic Congestion
Traffic congestion remains a central challenge in urban environments, impairing economic efficiency, environmental sustainability, and public health. Primary contributors include escalating vehicular density—driven by urbanization and rising vehicle ownership—and infrastructure limitations that fail to accommodate growing travel demand [24,26,28,35]. Inadequate real-time data processing curtails proactive congestion management measures, such as adaptive traffic signals and dynamic routing, while inefficiencies in traffic management systems further exacerbate the problem [27,34,43]. Severe congestion at key locations and during peak hours highlights the challenges of an overburdened transportation network that lacks the flexibility to accommodate fluctuating demand [31,36]. Long queues at intersections and inadequate signal timing contribute to further delays and inefficient traffic flow management [36].
Congestion also disrupts travel time reliability and impacts public transportation systems, particularly buses sharing mixed traffic lanes, leading to service irregularities and passenger dissatisfaction [42,44]. Beyond operational inefficiencies, the environmental impact of sustained congestion is significant, including higher fuel consumption and emissions that degrade air quality and contribute to respiratory ailments [38,48]. These findings stress the urgency of implementing measures that mitigate congestion and foster sustainable transportation alternatives.
3. Public Transit and Multimodal Transportation Systems
Public transit and multimodal systems face interconnected challenges that restrict efficiency, accessibility, and overall effectiveness. Inequitable access is particularly acute in rural areas, where limited mobility options constrain access to essential services and exacerbate social inequalities [25]. This challenge is compounded by rising operational costs for demand-responsive transport systems and the difficulty in balancing multiple objectives, such as cost, coverage, and equity [25]. Operational inefficiencies, such as static timetables and unpredictably fluctuating traffic conditions, extend passenger wait times, reduce service reliability, and increase dissatisfaction [28]. Furthermore, a lack of integrated multimodal data hampers seamless transitions among various travel modes, while suboptimal passenger flow management during peak hours compounds congestion and service quality issues [33,45]. Consequently, planners seek integrated strategies to enhance network design, service frequency, and data sharing, ensuring that transit systems remain accessible, efficient, and adaptable to changing user demands [45].
4. Traffic Safety and Accidental Risks
Traffic safety and accidental risks remain substantial concerns in both conventional and increasingly connected or automated transport systems. Recurring traffic violations—such as drunk driving and red-light running—persist despite current enforcement, indicating an unmet need for integrating violation data into accident prevention measures [49]. The lack of advanced sensor deployment in accident-prone areas further limits the capacity to identify and address these violations proactively, leading to persistent safety risks [49]. Security threats in vehicular networks are another pressing concern, as increased connectivity in smart transportation systems introduces vulnerabilities to cyber intrusions and attacks, which can compromise vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, posing substantial risks to road users and critical infrastructure [43]. The need to balance mobility with health restrictions during crises, such as pandemics, presents unique challenges. Restrictions, including curfews and changing alert levels, disrupt traffic flow and necessitate real-time adjustments to route planning, complicating efforts to ensure both public safety and transportation efficiency [39]. Additionally, in the era of autonomous vehicles (AVs), safety risks in mixed-traffic environments may arise due to the coexistence of autonomous and human-driven vehicles, leading to unpredictable interactions and potential conflicts caused by differing driving behaviors and decision-making processes [37]. AVs operate based on pre-programmed algorithms, whereas human drivers rely on intuition and experience, increasing the likelihood of accidents in complex urban environments [37].
5. Environmental Impacts
Environmental concerns tied to transportation systems pose major barriers to sustainable urban development. Persistent congestion intensifies emissions of harmful pollutants, such as nitrogen oxides and particulate matter, degrading air quality and urban livability [38]. Reliance on fossil fuels contributes significantly to greenhouse gas emissions, climate change, and economic burdens associated with fuel consumption [44]. Poorly optimized logistics and traffic management practices exacerbate these challenges by increasing both travel distances and fuel consumption [47].
In response, numerous studies highlight a shift toward green transportation solutions, including enhanced public transit, active travel modes (e.g., walking and cycling), and smart mobility technologies [44]. Such strategies aim to lower environmental footprints and foster sustainable urban growth [44].
6. Transportation System Operation and Management
Effective operation and management of transportation systems are essential for ensuring efficiency, reliability, and sustainability. Nonetheless, resource limitations, legacy systems, and growing complexity create substantial operational hurdles. Studies point to constrained resources and the difficulty of balancing cost, coverage, and equity objectives, particularly in densely populated urban settings [25]. Conventional traffic management strategies are increasingly inadequate for handling modern, complex urban mobility, particularly as vehicle density rises [26,35]. One major contributor to inefficiency is the inadequate processing of real-time traffic data, which hinders the ability to implement adaptive traffic control measures [35]. Traffic light operations, in particular, remain inefficient, failing to respond effectively to fluctuating traffic volumes and dynamic demand patterns [34].
Furthermore, many systems are ill-equipped to incorporate real-time data and respond adaptively to fluctuating traffic conditions [36]. Traditional predictive models, which are typically designed for static or historical data, often prove ill-suited or exhibit inadequate performance when applied to dynamic, real-time traffic conditions. The complexity and unpredictability of streamed data can lead to delayed or suboptimal traffic flow management and inefficient resource utilization [44]. Freight operations add further intricacy, as route planning, resource allocation, and fleet management must account for cost, environmental impact, and service reliability [47]. Collectively, these findings illustrate the urgent need for data-driven, integrated strategies capable of addressing congestion, resource allocation, and technological interoperability challenges.
|
考点1:heterogeneous IoT data sources 需译为 异构物联网数据源,IoT不可不译。
考点2:legacy systems 可译为 “传统系统”或“遗留系统”。
考点3:multimodal traffic data 可译为 “多式联运交通数据” 或 “多模态交通数据”。
考点4:Multimodal Transportation 需译为 多式联运。
考点5:vehicle-to-vehicle (V2V) 需译为 车对车(V2V)。
考点6:vehicle-to-infrastructure (V2I) 需译为 车对基础设施(V2I)。
|
d9e7c
|
学术论文
|
应用学科
|
16
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
1. Introduction
Digital technology has drastically changed the possibilities for the curation and display of cultural heritage collections (CHCs). The physical and conceptual boundaries of such collections continue to expand, creating new opportunities for audiences to access and to engage with artefacts and cultural heritage [1]. During cultural heritage collection digitalisation processes the nuances of past heritage contexts need to be considered to ensure that cultures and diverse social groups are presented in an inclusive manner [2]. Heritage institutions traditionally use methods such as cataloguing and labelling to describe artefacts and to communicate such histories and cultures to the public. The fact that many collections were established through ‘finds’, excavations, expeditions, and bought or seized by colonisers means that narratives related to colonisation and oppression are inevitably part of analogue cultural records even if they are not made explicit within them. Cultural heritage is increasingly negotiated as a past practice that is (re)constructed in the present [3] (p. 3), [4,5] (pp. 32, 165), [6] (pp. 4–8). Different dimensions of CHCs such as acquisition histories, museum history, ownership, location, the items themselves, and curatorial guidance are all intertwined in creating an interactive system between people and information [7]. Critical heritage studies examine the nexus of people, heritage, and societal power in its challenge to conventional heritage discourses [3] (p. 281), [8] (p. 4). Heritage is thus a process ‘understood as being produced through socio-political processes reflecting society’s power structures’ [9] (p. 569).
In digitising CHCs, the question-and-answer protocol of new technologies such as ChatGPT or the production of synthetic images with DALL-E, MidJourney, or Stable Diffusion immediately creates a situation in which human and machine exist in a cognitively productive relationship; the human describes and the machine renders. Generative AI, also known as GenAI or GAI, is an artificial intelligence technology that can generate text, images, or other data using generative models, often in response to prompts. It learns the patterns and structure of input training data to generate new data with similar characteristics. GenAI and the synthetic data it produces has been examined from a number of perspectives. The aesthetics of AI and its impact on visual cultural practices have been extensively discussed [10,11]. Understanding such computationally aided creativity, there is a need for a deeper investigation of the socio-material complexity in implementing GenAI for cultural dissemination [12,13].
The research question that underpins this paper is whether and how a machine can interpret and classify human memory and its artefacts in retrospect in an inclusive manner. In this, we recognise that compromises have to be reached between historical fidelity and inclusivity; we think that this requires careful annotation to explicate diverse positions over time regarding particular subject matters but also that it is paramount to make heritage collections relevant to contemporary audiences [14]. Given the inevitable presence of bias in CHCs and in their digitised versions [15,16] (pp. 607–640), [17] (pp. 815–825), this article aims to discuss the challenges that automation brings as well as provide solutions from beyond the cultural heritage sector. CHCs are normally quite diverse unless they are following some metadata standards as digitised historical collections are the result of legacy digitalisation. Further, there is a lack of interconnectivity/interoperability of digitised collections: not everything is online, or well annotated, or using the same software, and that may be picked via a GenAI or an aggregator such as, for example, Google Arts and Culture.
3. Results and Discussion
3.1. What Is Bias and How Does It Leak into Heritage Datasets?
Bias as a concept is accompanied by ideas of prejudice, unfairness, distortion, and violation, including a systematic distortion of a statistical result due to a factor not allowed for in its derivation [18]. Bias may be as simple as an excluding description related to issues of race and ethnicity, age, gender, LGBTQIA+ communities, and ability. The use of particular data such as post codes in the construction of algorithms can end up amplifying existing skewing such as where supposedly credit-worthy citizens reside, with detrimental impacts on those living elsewhere [19]. All CHCs involve selection, a form of bias in itself. Such selection is frequently accompanied by outdated descriptions of their artefacts that entail inclusion of some segments of society and exclusion of others, conforming to descriptions of a world very different from the contemporary. Dominant historical, national narratives, and organisational legacies dictate what may be included and articulated in a collection [3,20]. While technology can, at least in theory, revolutionise how we understand the human contexts that CHCs carry and CHCs’ ‘democratisation’ [1,21], practice proves otherwise with the risk of carrying through biases of a not-so-distant past to the present and hence the future [2,22,23]. As recently discussed in relation to newspaper archival collections, ‘bias exists prior to any sampling. . .unbiased data—even as an idea—is essentially ahistorical data’ [24] (p. 5).
Research into digital cultural data demonstrates how bias transitions from collections to datasets and then to platforms. AI can amplify bias and hinder effective AI implemen- tation due to a lack of well-annotated datasets and structured metadata in CHCs. Biases within museum collections can manifest in datasets, databases, and aggregators that in- creasingly employ AI technologies such as machine learning [16,25]. Bias in CHCs is then transferred, and it entails issues of digital cultural colonialism and otherness, reflecting tensions between contrasting structures such as European/western versus other, North versus South, and centre versus periphery [2,26–29]. This also extends to gender. Kizhner et al. (2021) examine how bias in the cultural heritage platform Google Arts and Culture is amplified with AI noting that the choices behind digitisation, publication, aggregation, and promotion often obscure institutional, social, and political circumscriptions. These perpetuate the status quo at scale [16]. Kizhner et al. advocate making these epistemic choices transparent, documented, and interpretable. Davis et al. (2021) succinctly state that algorithms are animated by data, data come from people, people make up society, and society is unequal. Davis et al. (2021) [30] discuss algorithmic reparation and intersection- ality as frameworks to combat structural inequalities reflected and amplified by machine learning outcomes.
In computer vision, too, biases related to digital cultural colonialism and dominant epistemologies persist, leading to biased knowledge representations [31,32]. To avoid merely replicating biases, AI technology must evolve to embrace complex, non-binary, and non-dominant interpretations. The contribution of humanities expertise in generative AI platforms is at best unclear. This can lead to biased interpretations and classifications. Critical perspectives from the humanities and social sciences play a vital role in highlighting these issues relevant to more inclusive and equitable AI development practices. These perspectives emphasise the need for ethical AI development (see [33]) that addresses racial and gender discrimination, among other socio-ethical concerns.
Bias, especially racial and gender bias, extends across both technical and epistemo- logical domains, with the gender binary serving as a deeply racialised tool of colonial control. The concept of auto-essentialisation, recently introduced [34], describes how automated technologies reinforce identity distinctions rooted in colonial practices. The concept of auto-essentialisation is explored through historical gender practices, particularly the establishment of the European gender binary via 19th- and 20th-century disciplines such as sexology, physiognomy, and phrenology. These historical practices are viewed as predecessors to today’s automated facial analysis technologies in computer vision. This connection underscores the necessity for a critical reassessment of AI/ML applications in image recognition, as they may represent modern iterations of longstanding technologically mediated ideologies [13,34].
Bias might be mitigated by the enhanced interconnectivity and interoperability of digitised collections through collections ‘speaking to’ each other and correcting misattri- butions, etc. This is particularly important where one deals with rare objects and small special collections, not least if they are located in countries such as Sweden with relatively few collections that cannot provide large datasets to train AI on and are therefore prone to acquire software off-the-peg and not necessarily trained on relevant data. However, calls for such interconnectivity and interoperability which require transnational cooperation are still recent and require political will (see e.g., [35]) and negotiated resource provision.
3.2. GenAI: An Illustration of Biased Synthesis
Wasielewski (2023b) [36] examines the challenges faced by GenAI text-to-image gen- erators such as DALL·E and Stable Diffusion, focusing on their struggles with hand rep- resentation and object counting. While these tools have democratised AI-driven image creation, leading to a surge in creative outputs, they also exhibit significant limitations because they are mechanistic in their depiction of the objects, relying on pattern replication rather than contextual knowledge. This results in images that may appear superficially correct but lack nuanced understanding. The rise of generative AI models like ChatGPT and DALL-E has captured the public imagination; cultural and creative sectors increasingly turn to predictive models for analysing and categorising their materials [37].
The opportunities GenAI affords are significantly structured by the CH sector that underlies them. As Griffin et al. (2023) have shown in the context of Sweden, a geographi- cally large country with a small population (around 10.5 million) and a correspondingly small CH sector that is also quite fragmented, factors such as limited budgets, lack of AI expertise among CH staff, lack of professional mobility and of continuing professional training among CH staff, small collections, and no overarching national policy on the matter, can lead to scenarios where these factors are replayed in how AI is engaged with. This means that individual CHCs may acquire off-the-peg software solutions not trained on the data they are actually applied to or solutions that also lack interconnectivity and interoperability with software and systems in ‘sister’ CHCs, or they may simply not (be able to) afford themselves of what AI and GenAI have to offer, thus isolating those CHCs both nationally and internationally.
The interconnectivity and interoperability of heritage datasets significantly aid AI implementation in the cultural heritage sector by enhancing data access, integration, and analysis capabilities. These characteristics enable AI systems to cross-reference information across multiple collections and institutions, providing a more comprehensive view of cultural heritage. For instance, AI can link artifacts from various museums to reconstruct historical contexts or identify patterns across diverse collections. Interoperability also facilitates the standardisation of catalogue data, making it easier for AI to process and understand information from different sources. This standardisation improves searchability and compatibility with new technologies, as demonstrated by the National Museum of the Royal Navy and the University of Southampton’s pilot project on standardising catalogue data for image collections (see for example https://www.heritagefund.org.uk/about/ insight/research/artificial-intelligence-digital-heritage-leadership-briefing, accessed on 28 October 2024). Interoperable datasets provide AI systems with richer, more diverse training data, leading to improved accuracy and better generalisation across different types of cultural heritage materials and contexts. This enhanced performance is crucial for developing robust AI applications in the heritage sector. Furthermore, interconnectivity and interoperability support collaborative AI implementation by enabling knowledge sharing and facilitating multi-institutional projects (see [38] for practical solutions for enhancing interconnectivity).
Cultural heritage institutions can share expertise, resources, and best practices more easily when working with compatible datasets, potentially leading to groundbreaking discoveries or innovative applications. Many cultural heritage institutions face resource constraints when implementing AI. Interoperability helps address this challenge by al- lowing institutions to pool resources and share AI tools, expertise, and computational resources. This collaboration makes AI implementation more accessible to smaller organi- sations and reduces duplication of effort, as standardised, interoperable datasets prevent institutions from having to reinvent the wheel when implementing AI solutions. Inter- connected and interoperable datasets also enhance the discoverability and accessibility of cultural heritage materials through AI-powered tools. AI systems can leverage these datasets to provide more sophisticated search capabilities across multiple collections and in- stitutions, as well as offer more accurate and personalised recommendations to researchers and visitors. This improved functionality enhances user experience and engagement with cultural heritage materials.
|
1. Introduction
Digital technology has drastically changed the possibilities for the curation and display of cultural heritage collections (CHCs). The physical and conceptual boundaries of such collections continue to expand, creating new opportunities for audiences to access and to engage with artefacts and cultural heritage [1]. During cultural heritage collection digitalisation processes the nuances of past heritage contexts need to be considered to ensure that cultures and diverse social groups are presented in an inclusive manner [2]. Heritage institutions traditionally use methods such as cataloguing and labelling to describe artefacts and to communicate such histories and cultures to the public. The fact that many collections were established through ‘finds’, excavations, expeditions, and bought or seized by colonisers means that narratives related to colonisation and oppression are inevitably part of analogue cultural records even if they are not made explicit within them. Cultural heritage is increasingly negotiated as a past practice that is (re)constructed in the present [3] (p. 3), [4,5] (pp. 32, 165), [6] (pp. 4–8). Different dimensions of CHCs such as acquisition histories, museum history, ownership, location, the items themselves, and curatorial guidance are all intertwined in creating an interactive system between people and information [7]. Critical heritage studies examine the nexus of people, heritage, and societal power in its challenge to conventional heritage discourses [3] (p. 281), [8] (p. 4). Heritage is thus a process ‘understood as being produced through socio-political processes reflecting society’s power structures’ [9] (p. 569).
In digitising CHCs, the question-and-answer protocol of new technologies such as ChatGPT or the production of synthetic images with DALL-E, MidJourney, or Stable Diffusion immediately creates a situation in which human and machine exist in a cognitively productive relationship; the human describes and the machine renders. Generative AI, also known as GenAI or GAI, is an artificial intelligence technology that can generate text, images, or other data using generative models, often in response to prompts. It learns the patterns and structure of input training data to generate new data with similar characteristics. GenAI and the synthetic data it produces has been examined from a number of perspectives. The aesthetics of AI and its impact on visual cultural practices have been extensively discussed [10,11]. Understanding such computationally aided creativity, there is a need for a deeper investigation of the socio-material complexity in implementing GenAI for cultural dissemination [12,13].
The research question that underpins this paper is whether and how a machine can interpret and classify human memory and its artefacts in retrospect in an inclusive manner. In this, we recognise that compromises have to be reached between historical fidelity and inclusivity; we think that this requires careful annotation to explicate diverse positions over time regarding particular subject matters but also that it is paramount to make heritage collections relevant to contemporary audiences [14]. Given the inevitable presence of bias in CHCs and in their digitised versions [15,16] (pp. 607–640), [17] (pp. 815–825), this article aims to discuss the challenges that automation brings as well as provide solutions from beyond the cultural heritage sector. CHCs are normally quite diverse unless they are following some metadata standards as digitised historical collections are the result of legacy digitalisation. Further, there is a lack of interconnectivity/interoperability of digitised collections: not everything is online, or well annotated, or using the same software, and that may be picked via a GenAI or an aggregator such as, for example, Google Arts and Culture.
3. Results and Discussion
3.1. What Is Bias and How Does It Leak into Heritage Datasets?
Bias as a concept is accompanied by ideas of prejudice, unfairness, distortion, and violation, including a systematic distortion of a statistical result due to a factor not allowed for in its derivation [18]. Bias may be as simple as an excluding description related to issues of race and ethnicity, age, gender, LGBTQIA+ communities, and ability. The use of particular data such as post codes in the construction of algorithms can end up amplifying existing skewing such as where supposedly credit-worthy citizens reside, with detrimental impacts on those living elsewhere [19]. All CHCs involve selection, a form of bias in itself. Such selection is frequently accompanied by outdated descriptions of their artefacts that entail inclusion of some segments of society and exclusion of others, conforming to descriptions of a world very different from the contemporary. Dominant historical, national narratives, and organisational legacies dictate what may be included and articulated in a collection [3,20]. While technology can, at least in theory, revolutionise how we understand the human contexts that CHCs carry and CHCs’ ‘democratisation’ [1,21], practice proves otherwise with the risk of carrying through biases of a not-so-distant past to the present and hence the future [2,22,23]. As recently discussed in relation to newspaper archival collections, ‘bias exists prior to any sampling. . .unbiased data—even as an idea—is essentially ahistorical data’ [24] (p. 5).
Research into digital cultural data demonstrates how bias transitions from collections to datasets and then to platforms. AI can amplify bias and hinder effective AI implemen- tation due to a lack of well-annotated datasets and structured metadata in CHCs. Biases within museum collections can manifest in datasets, databases, and aggregators that in- creasingly employ AI technologies such as machine learning [16,25]. Bias in CHCs is then transferred, and it entails issues of digital cultural colonialism and otherness, reflecting tensions between contrasting structures such as European/western versus other, North versus South, and centre versus periphery [2,26–29]. This also extends to gender. Kizhner et al. (2021) examine how bias in the cultural heritage platform Google Arts and Culture is amplified with AI noting that the choices behind digitisation, publication, aggregation, and promotion often obscure institutional, social, and political circumscriptions. These perpetuate the status quo at scale [16]. Kizhner et al. advocate making these epistemic choices transparent, documented, and interpretable. Davis et al. (2021) succinctly state that algorithms are animated by data, data come from people, people make up society, and society is unequal. Davis et al. (2021) [30] discuss algorithmic reparation and intersection- ality as frameworks to combat structural inequalities reflected and amplified by machine learning outcomes.
In computer vision, too, biases related to digital cultural colonialism and dominant epistemologies persist, leading to biased knowledge representations [31,32]. To avoid merely replicating biases, AI technology must evolve to embrace complex, non-binary, and non-dominant interpretations. The contribution of humanities expertise in generative AI platforms is at best unclear. This can lead to biased interpretations and classifications. Critical perspectives from the humanities and social sciences play a vital role in highlighting these issues relevant to more inclusive and equitable AI development practices. These perspectives emphasise the need for ethical AI development (see [33]) that addresses racial and gender discrimination, among other socio-ethical concerns.
Bias, especially racial and gender bias, extends across both technical and epistemo- logical domains, with the gender binary serving as a deeply racialised tool of colonial control. The concept of auto-essentialisation, recently introduced [34], describes how automated technologies reinforce identity distinctions rooted in colonial practices. The concept of auto-essentialisation is explored through historical gender practices, particularly the establishment of the European gender binary via 19th- and 20th-century disciplines such as sexology, physiognomy, and phrenology. These historical practices are viewed as predecessors to today’s automated facial analysis technologies in computer vision. This connection underscores the necessity for a critical reassessment of AI/ML applications in image recognition, as they may represent modern iterations of longstanding technologically mediated ideologies [13,34].
Bias might be mitigated by the enhanced interconnectivity and interoperability of digitised collections through collections ‘speaking to’ each other and correcting misattri- butions, etc. This is particularly important where one deals with rare objects and small special collections, not least if they are located in countries such as Sweden with relatively few collections that cannot provide large datasets to train AI on and are therefore prone to acquire software off-the-peg and not necessarily trained on relevant data. However, calls for such interconnectivity and interoperability which require transnational cooperation are still recent and require political will (see e.g., [35]) and negotiated resource provision.
3.2. GenAI: An Illustration of Biased Synthesis
Wasielewski (2023b) [36] examines the challenges faced by GenAI text-to-image gen- erators such as DALL·E and Stable Diffusion, focusing on their struggles with hand rep- resentation and object counting. While these tools have democratised AI-driven image creation, leading to a surge in creative outputs, they also exhibit significant limitations because they are mechanistic in their depiction of the objects, relying on pattern replication rather than contextual knowledge. This results in images that may appear superficially correct but lack nuanced understanding. The rise of generative AI models like ChatGPT and DALL-E has captured the public imagination; cultural and creative sectors increasingly turn to predictive models for analysing and categorising their materials [37].
The opportunities GenAI affords are significantly structured by the CH sector that underlies them. As Griffin et al. (2023) have shown in the context of Sweden, a geographi- cally large country with a small population (around 10.5 million) and a correspondingly small CH sector that is also quite fragmented, factors such as limited budgets, lack of AI expertise among CH staff, lack of professional mobility and of continuing professional training among CH staff, small collections, and no overarching national policy on the matter, can lead to scenarios where these factors are replayed in how AI is engaged with. This means that individual CHCs may acquire off-the-peg software solutions not trained on the data they are actually applied to or solutions that also lack interconnectivity and interoperability with software and systems in ‘sister’ CHCs, or they may simply not (be able to) afford themselves of what AI and GenAI have to offer, thus isolating those CHCs both nationally and internationally.
The interconnectivity and interoperability of heritage datasets significantly aid AI implementation in the cultural heritage sector by enhancing data access, integration, and analysis capabilities. These characteristics enable AI systems to cross-reference information across multiple collections and institutions, providing a more comprehensive view of cultural heritage. For instance, AI can link artifacts from various museums to reconstruct historical contexts or identify patterns across diverse collections. Interoperability also facilitates the standardisation of catalogue data, making it easier for AI to process and understand information from different sources. This standardisation improves searchability and compatibility with new technologies, as demonstrated by the National Museum of the Royal Navy and the University of Southampton’s pilot project on standardising catalogue data for image collections (see for example https://www.heritagefund.org.uk/about/ insight/research/artificial-intelligence-digital-heritage-leadership-briefing, accessed on 28 October 2024). Interoperable datasets provide AI systems with richer, more diverse training data, leading to improved accuracy and better generalisation across different types of cultural heritage materials and contexts. This enhanced performance is crucial for developing robust AI applications in the heritage sector. Furthermore, interconnectivity and interoperability support collaborative AI implementation by enabling knowledge sharing and facilitating multi-institutional projects (see [38] for practical solutions for enhancing interconnectivity).
Cultural heritage institutions can share expertise, resources, and best practices more easily when working with compatible datasets, potentially leading to groundbreaking discoveries or innovative applications. Many cultural heritage institutions face resource constraints when implementing AI. Interoperability helps address this challenge by al- lowing institutions to pool resources and share AI tools, expertise, and computational resources. This collaboration makes AI implementation more accessible to smaller organi- sations and reduces duplication of effort, as standardised, interoperable datasets prevent institutions from having to reinvent the wheel when implementing AI solutions. Inter- connected and interoperable datasets also enhance the discoverability and accessibility of cultural heritage materials through AI-powered tools. AI systems can leverage these datasets to provide more sophisticated search capabilities across multiple collections and in- stitutions, as well as offer more accurate and personalised recommendations to researchers and visitors. This improved functionality enhances user experience and engagement with cultural heritage materials.
|
考点1. cultural heritage collections (CHCs)必须译为:文化遗产藏品
考点2. expeditions推荐译为:探险
考点3. gender binary必须译为:性别二元论
考点4. auto-essentialisation必须译为:自动本质化
考点5. ‘sister’ CHCs必须译为:姊妹文化遗产藏品
考点6. Interoperable datasets推荐译为:互操性的数据集/可互操作的数据集
考点7. reinvent the wheel推荐译为:重复性工作
|
dabb8
|
学术论文
|
应用学科
|
147
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
沿着时间社会学长期以来专注时间体验的研究取向,本文以等待为线索,试图处理社会时间理论中主体性不足的困境。通过回溯等待这一时间体验的理论基础,本文考察了等待的双重属性,也即他者指涉的社会性和自我指涉的主体性,进而揭示出等待中希望的生产在桥接时间、自我与他人方面所具的社会意义。本文为社会时间框架下消极的主体正名,并建立了一种兼顾社会时间的社会性与主体性的分析路径。
社会生活中的时间议题不胜枚举,其中“等待”作为体验时间和权力之间关系的一种特殊方式,直戳社会时间结构问题的症结,成为时间社会学的重要研究对象。相关研究揭示出等待在不同社会领域存在的困境及出路,但鲜少与经典社会学理论对话,或未叩击时间社会学的核心议题,使得我们仍要处理那些碎片化的社会时间理论及多元化的经验景象。实际上,一种关于等待的系统性阐析可以超越时间结构的批判性分析框架,在经典社会学建立的理论基础之上,应对时间社会学分析中主体性不足的境况。
主体性不足首先体现在结构功能主义和马克思主义对时间的社会建构与支配分析的传统旨趣中。自涂尔干提出“时间作为一种社会范畴”开始,社会学家对时间的探索往往围绕着时间的社会建构特征展开,并将社会成员间共享的时间范畴视作社会生活秩序的基础。这种时间的功能主义探索虽然揭开了那些隐藏在自然时间背后的社会结构性力量,却又逐渐摒弃了能动的个体关于时间的鲜活体验。随着马克思主义学派对工作—时间理论的发展,工人在资本主义生产过程中的行动意志及所受剥削备受关注。一种“被支配的主体”在这种时间范畴的政治经济学批判中走上前台,从而弥合了结构功能主义学派中的主体性缺失状态。另一方面,马克思主义用商品化时间来理解工业化时间的倾向,使得社会时间的主体性研究将重心转向一种受经济、政治或文化法则支配下的消极主体,进而消减了主体的完整性。
在社会时间研究深入的过程中,人们注意到现代制度体系不断制造着一种日常的、强制的或普遍的等待状态。等待经验中的消极主体逐渐成为时间建构与支配研究的重要切入点,并在经济、政治和文化领域得到检验。例如,顾客排队等待现象服务于商家谋取利润最大化的工具性动机,这实则损害了顾客的时间利益;监狱制度通过剥夺长期服刑囚犯的时间主权,促使他们主动屈服于无限期的等待状态;主流文化将“延迟满足”型等待与未来成就之实现关联起来,通过一种符号价值的塑造,实现青年人的自我管理与控制。不过,无论是沿着结构功能主义的时间建构视角,还是遵循马克思主义的政治经济学批判,等待都很容易被描绘为一种被强制接受且无法改变的状态。由此带来的结果之一便是等待研究中对于权力不平等议题的偏好。这类议题专注于勾勒等待者受时间秩序支配的形象,因而未能充分把握一种完整的主体性。随着互动论与现象学将社会时间与主体间复杂而多样的关系带回研究者视野中,社会成员利用时间来调整和组织自己生活的能动性也重新受到审视。
换言之,关于“被支配的主体性”的批判性讨论忽略了存在于社会时间中的“能动的主体性”。同质性的社会时间被不同的主体以多种方式感知和体验着,人们在等待中通常不会空等,而会选择开展别的行动,以填补空等所导致的时间间隔或不确定性。由此可见,等待的消极性不等于等待者的消极性。等待的主体能够付诸一系列积极利用时间的实践,进而以自主的能动者的姿态来驾驭和理解个人时间,探索与建立社会意义。例如,有研究发现,长期失业者在其充满不确定性的待业期中会从一开始失去生活意义的状态转向努力控制生活轨迹。
从社会时间研究中主体性的“缺失”到“被支配”的推进,再到一种“能动的主体”的出场,我们可以看到关于等待的研究不仅能够超越社会建构与秩序的分析框架,还能为时间、社会和主体之间复杂的相互作用提供宝贵的见解。通过关注行动者作为能动的主体所开展的时间实践,关于等待的研究可以为社会时间框架下的消极主体正名,进而为回答时间的社会性及主体性同在提供切入口。本文以等待的时间体验为线索回溯等待的社会理论基础,分析这种时间体验所。具有的社会性与主体性之双重属性以及如何发挥其社会性及主体性之双重价值,进而提供一种兼顾社会性建构与主体性存在的时间分析路径。
|
沿着时间社会学长期以来专注时间体验的研究取向,本文以等待为线索,试图处理社会时间理论中主体性不足的困境。通过回溯等待这一时间体验的理论基础,本文考察了等待的双重属性,也即他者指涉的社会性和自我指涉的主体性,进而揭示出等待中希望的生产在桥接时间、自我与他人方面所具的社会意义。本文为社会时间框架下消极的主体正名,并建立了一种兼顾社会时间的社会性与主体性的分析路径。
社会生活中的时间议题不胜枚举,其中“等待”作为体验时间和权力之间关系的一种特殊方式,直戳社会时间结构问题的症结,成为时间社会学的重要研究对象。相关研究揭示出等待在不同社会领域存在的困境及出路,但鲜少与经典社会学理论对话,或未叩击时间社会学的核心议题,使得我们仍要处理那些碎片化的社会时间理论及多元化的经验景象。实际上,一种关于等待的系统性阐析可以超越时间结构的批判性分析框架,在经典社会学建立的理论基础之上,应对时间社会学分析中主体性不足的境况。
主体性不足首先体现在结构功能主义和马克思主义对时间的社会建构与支配分析的传统旨趣中。自涂尔干提出“时间作为一种社会范畴”开始,社会学家对时间的探索往往围绕着时间的社会建构特征展开,并将社会成员间共享的时间范畴视作社会生活秩序的基础。这种时间的功能主义探索虽然揭开了那些隐藏在自然时间背后的社会结构性力量,却又逐渐摒弃了能动的个体关于时间的鲜活体验。随着马克思主义学派对工作—时间理论的发展,工人在资本主义生产过程中的行动意志及所受剥削备受关注。一种“被支配的主体”在这种时间范畴的政治经济学批判中走上前台,从而弥合了结构功能主义学派中的主体性缺失状态。另一方面,马克思主义用商品化时间来理解工业化时间的倾向,使得社会时间的主体性研究将重心转向一种受经济、政治或文化法则支配下的消极主体,进而消减了主体的完整性。
在社会时间研究深入的过程中,人们注意到现代制度体系不断制造着一种日常的、强制的或普遍的等待状态。等待经验中的消极主体逐渐成为时间建构与支配研究的重要切入点,并在经济、政治和文化领域得到检验。例如,顾客排队等待现象服务于商家谋取利润最大化的工具性动机,这实则损害了顾客的时间利益;监狱制度通过剥夺长期服刑囚犯的时间主权,促使他们主动屈服于无限期的等待状态;主流文化将“延迟满足”型等待与未来成就之实现关联起来,通过一种符号价值的塑造,实现青年人的自我管理与控制。不过,无论是沿着结构功能主义的时间建构视角,还是遵循马克思主义的政治经济学批判,等待都很容易被描绘为一种被强制接受且无法改变的状态。由此带来的结果之一便是等待研究中对于权力不平等议题的偏好。这类议题专注于勾勒等待者受时间秩序支配的形象,因而未能充分把握一种完整的主体性。随着互动论与现象学将社会时间与主体间复杂而多样的关系带回研究者视野中,社会成员利用时间来调整和组织自己生活的能动性也重新受到审视。
换言之,关于“被支配的主体性”的批判性讨论忽略了存在于社会时间中的“能动的主体性”。同质性的社会时间被不同的主体以多种方式感知和体验着,人们在等待中通常不会空等,而会选择开展别的行动,以填补空等所导致的时间间隔或不确定性。由此可见,等待的消极性不等于等待者的消极性。等待的主体能够付诸一系列积极利用时间的实践,进而以自主的能动者的姿态来驾驭和理解个人时间,探索与建立社会意义。例如,有研究发现,长期失业者在其充满不确定性的待业期中会从一开始失去生活意义的状态转向努力控制生活轨迹。
从社会时间研究中主体性的“缺失”到“被支配”的推进,再到一种“能动的主体”的出场,我们可以看到关于等待的研究不仅能够超越社会建构与秩序的分析框架,还能为时间、社会和主体之间复杂的相互作用提供宝贵的见解。通过关注行动者作为能动的主体所开展的时间实践,关于等待的研究可以为社会时间框架下的消极主体正名,进而为回答时间的社会性及主体性同在提供切入口。本文以等待的时间体验为线索回溯等待的社会理论基础,分析这种时间体验所。具有的社会性与主体性之双重属性以及如何发挥其社会性及主体性之双重价值,进而提供一种兼顾社会性建构与主体性存在的时间分析路径。
|
考点1. “时间社会学”必须译为“Sociology of Time”
考点2. “主体性不足”必须译为“Insufficient Subjectivity; Lack of Subjectivity”
考点3. “他者指涉”必须译为“Other-reference”
考点4. “自我指涉”必须译为“Self-reference”
考点5. “消极的主体”必须译为“Negative Subject”
考点6. “能动的主体(性)必须译为“Agentic Subject; Agentic Subjectivity”
考点7. “被支配的主体”必须译为“Dominated Subject”。
考点8. “线索”推荐译为“Lens; Analytical Thread”
考点9. “困境”推荐译为“Dilemma; Predicament”
考点10. “为……正名”推荐译为“To Vindicate”
|
dabcf
|
学术论文
|
社会科学
|
143
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
在沿海深厚软土地层中,由于其天然沉积成因复杂,形成了结构性显著、胶结性弱、微观孔隙形态高度多样的软黏性土体,其工程响应表现出显著的非线性、各向异性及时效性。当前城市基础设施向纵深发展趋势愈发显著,深基坑、地下空间及盾构隧道工程广泛侵入至30–60 m深度,常穿越多个承压含水层与扰动敏感软土层,故准确掌握软土在不同应力路径、加载速率与排水条件下的力学行为,成为高风险工程中亟待突破的技术瓶颈。
本研究基于应力–应变–时间三维耦合视角,结合室内多路径三轴试验与微观结构观测,探讨深层软黏土在多种加载条件下的破坏机制与本构响应规律。试验采用GDS全自动三轴加载系统,设置恒应力比加载、应变控制加载及路径依赖加载等工况,分别开展了CU、CD与加载–卸载–再加载循环试验。试样取自上海浦东某典型地段第Ⅰ承压含水层上覆层,物理性质指标中天然含水率约为42%,液限约为52%,初始结构性明显。
在试样制备阶段,通过真空饱和–背压饱和联合方案确保Skempton B值大于0.97。固结过程采用K0等向主固结路径模拟竖向加载条件;加载阶段控制速率为0.1 %/min,孔压及体应变数据每0.5 s采集一次,以捕捉瞬态响应。在非排水CU试验中观察到典型的剪切软化行为,最大主应力差达186 kPa后显著下降,强度包络曲线呈现非线性扩展趋势。部分样本表现出双峰型剪切响应,反映出内在结构破坏与颗粒重排的阶段性过程。
结合剪胀角–应力比演化路径,发现该类土体在初始阶段表现为负剪胀,即体积压缩趋势明显,随加载持续出现临界状态剪胀角迅速增长的过渡过程,表明结构性破坏触发了粒间滑移与孔隙重构过程。应用DIC数字图像技术分析剪切带发展情况,发现剪切破坏并非单一面局部化,而呈现多裂缝共存、剪切面分支发展的复杂形态,尤其在加载–卸载–再加载循环试验中,剪切路径与之前不同,表现出明显的结构劣化记忆效应。
在固结排水(CD)路径中,试样呈现较强的剪胀效应与残余强度平台,未发生明显峰值强度下降,显示出结构破坏模式受排水路径显著调控。为评估长期变形趋势,引入等时应变法,以不同持荷阶段(1 h、4 h、24 h)为基准,统计轴向与体积等时应变变化,并采用Burgers黏弹模型对长期蠕变数据进行拟合,获得瞬态黏滞参数η₁、稳态黏滞η₂及弹性模量E₁、E₂,发现软土黏弹参数与初始孔隙比呈幂律正相关关系。
为进一步揭示微观机制,利用场发射扫描电子显微镜(FE-SEM)对试样剪切前后进行对比观察,结合X射线衍射分析(XRD)分析矿物组分演变,并辅以能谱分析(EDS)识别剪切面微区元素富集变化。结果表明,在剪切带区域,伊利石晶粒趋于定向排列,钙离子迁移导致絮凝结构松散化,反映出剪切诱导的物理–化学协同破坏机制。
理论方面,本研究引入基于结构性演化的双屈服面模型,考虑加载历史下结构退化函数s(ε),其演化由指数型函数控制,辅以非线性剪胀函数与加载方向因子。
通过与Cam-Clay模型、ISSM模型(ISSM:Isotropic Structurally Sensitive Model)对比发现,传统模型无法准确再现应力路径切换下的剪胀行为突变、破坏延迟现象及循环加载的结构记忆效应,而本模型在路径相关性、多峰应力响应及剪切模量演化趋势拟合方面表现优异,具有良好的工程适应性。
考虑深基坑降水导致的负孔压效应,通过轴对称渗透–剪切耦合试验装置模拟降水速率变化,结果揭示:在中高降水速率下,试样中部形成显著孔压梯度,导致有效应力突变,进而诱发剪切集中、结构坍塌及局部再固结过程。此现象在实际基坑监测中与沉降突变、内支撑反力异常响应高度吻合,显示模型理论具有现实指导意义。
在理论分析基础上,为验证结构性本构模型在实际工程中的适用性,本文选取上海某深基坑工程作为验证场景。该工程基坑开挖深度达42.5 m,围护结构为地下连续墙+多道支撑体系,基坑底部穿越第Ⅰ与第Ⅱ承压含水层之间的软弱过渡层,层厚约9.5 m,孔隙比高达1.87。该区域地下水位变化频繁,软土结构性显著,对降水引起的有效应力扰动极为敏感。
基于现场地勘资料与室内试验参数,构建二维有限元模型,采用应力–应变法分析基坑底部隆起、周边沉降与支撑内力响应。在模型中,软弱夹层赋予结构性演化模型,其余层按修正Mohr–Coulomb模型处理。通过参数反演校正过程,选取位移监测数据作为目标函数,以遗传算法优化剪切模量G₀、结构参数s₀、剪胀角ψ₀与屈服函数参数n的初始取值。拟合结果表明,结构性模型可有效反映现场观测中的非对称沉降、底鼓偏移及支撑反力滞后等现象。
进一步在FLAC3D平台开展降水诱导下的三维多场耦合模拟,模拟内容包括:连续降水速率阶跃加载、不同排水边界控制、土体结构破坏演化及塑性区分布。模拟显示,降水速率超过1.5 m/d后,底部软弱层内部出现显著剪应变集中,最大塑性区沿墙底–软弱夹层交界处延伸,形成典型“壳型破坏模式”。同时,地层侧向移动引起中部支撑内力失衡,与实际施工期出现的轴力突增–突降过程高度吻合。
为研究该类土体的长期沉降行为,本文构建基于Biot理论的固结–蠕变耦合分析框架,考虑超静孔压耗散与黏弹–塑性蠕变同步演化机制。引入改进型Log-time黏性函数描述等时变形,并设定沉降时程控制点(28 d、90 d、1 a、3 a、10 a)。预测结果表明,在含结构性的软土层中,沉降在3 a后仍呈缓慢增长态势,结构性破坏–再固结所引起的“二次沉降平台”在90–180天阶段最为显著,占总沉降量的32%以上。
此外,软土区域常伴有基岩埋深大、剪切波速低的特点,导致地震作用下场地响应复杂,振动主频降低、波形延迟现象显著。为此,研究引入等效线性化方法,结合SH-wave输入条件与场地剖面参数,建立一维地震反应分析模型,选取北川地震、宝山地震等典型地震波作为输入。结果表明,结构性软土在高阶剪应变下强度退化显著,主频响应在1.2–2.3 Hz之间展宽,剪切模量下降达70%以上。
场地响应中,孔压增长与微震放大存在明显同步性。通过动三轴试验观测发现,在循环加载第8–12周次内,孔压比r_u迅速上升至0.9以上,并伴随剪应变突跃,表明软土在动力荷载下存在结构性触发液化的风险。基于此,进一步提出动力下的应力路径控制模型,设置等幅–渐增加载序列并测定等效阻尼比、剪胀能耗指数、应力回滞面积,建立“动剪应变–孔压增长–能耗释放”三维特征面,揭示动力疲劳损伤机制。
|
在沿海深厚软土地层中,由于其天然沉积成因复杂,形成了结构性显著、胶结性弱、微观孔隙形态高度多样的软黏性土体,其工程响应表现出显著的非线性、各向异性及时效性。当前城市基础设施向纵深发展趋势愈发显著,深基坑、地下空间及盾构隧道工程广泛侵入至30–60 m深度,常穿越多个承压含水层与扰动敏感软土层,故准确掌握软土在不同应力路径、加载速率与排水条件下的力学行为,成为高风险工程中亟待突破的技术瓶颈。
本研究基于应力–应变–时间三维耦合视角,结合室内多路径三轴试验与微观结构观测,探讨深层软黏土在多种加载条件下的破坏机制与本构响应规律。试验采用GDS全自动三轴加载系统,设置恒应力比加载、应变控制加载及路径依赖加载等工况,分别开展了CU、CD与加载–卸载–再加载循环试验。试样取自上海浦东某典型地段第Ⅰ承压含水层上覆层,物理性质指标中天然含水率约为42%,液限约为52%,初始结构性明显。
在试样制备阶段,通过真空饱和–背压饱和联合方案确保Skempton B值大于0.97。固结过程采用K0等向主固结路径模拟竖向加载条件;加载阶段控制速率为0.1 %/min,孔压及体应变数据每0.5 s采集一次,以捕捉瞬态响应。在非排水CU试验中观察到典型的剪切软化行为,最大主应力差达186 kPa后显著下降,强度包络曲线呈现非线性扩展趋势。部分样本表现出双峰型剪切响应,反映出内在结构破坏与颗粒重排的阶段性过程。
结合剪胀角–应力比演化路径,发现该类土体在初始阶段表现为负剪胀,即体积压缩趋势明显,随加载持续出现临界状态剪胀角迅速增长的过渡过程,表明结构性破坏触发了粒间滑移与孔隙重构过程。应用DIC数字图像技术分析剪切带发展情况,发现剪切破坏并非单一面局部化,而呈现多裂缝共存、剪切面分支发展的复杂形态,尤其在加载–卸载–再加载循环试验中,剪切路径与之前不同,表现出明显的结构劣化记忆效应。
在固结排水(CD)路径中,试样呈现较强的剪胀效应与残余强度平台,未发生明显峰值强度下降,显示出结构破坏模式受排水路径显著调控。为评估长期变形趋势,引入等时应变法,以不同持荷阶段(1 h、4 h、24 h)为基准,统计轴向与体积等时应变变化,并采用Burgers黏弹模型对长期蠕变数据进行拟合,获得瞬态黏滞参数η₁、稳态黏滞η₂及弹性模量E₁、E₂,发现软土黏弹参数与初始孔隙比呈幂律正相关关系。
为进一步揭示微观机制,利用场发射扫描电子显微镜(FE-SEM)对试样剪切前后进行对比观察,结合X射线衍射分析(XRD)分析矿物组分演变,并辅以能谱分析(EDS)识别剪切面微区元素富集变化。结果表明,在剪切带区域,伊利石晶粒趋于定向排列,钙离子迁移导致絮凝结构松散化,反映出剪切诱导的物理–化学协同破坏机制。
理论方面,本研究引入基于结构性演化的双屈服面模型,考虑加载历史下结构退化函数s(ε),其演化由指数型函数控制,辅以非线性剪胀函数与加载方向因子。
通过与Cam-Clay模型、ISSM模型(ISSM:Isotropic Structurally Sensitive Model)对比发现,传统模型无法准确再现应力路径切换下的剪胀行为突变、破坏延迟现象及循环加载的结构记忆效应,而本模型在路径相关性、多峰应力响应及剪切模量演化趋势拟合方面表现优异,具有良好的工程适应性。
考虑深基坑降水导致的负孔压效应,通过轴对称渗透–剪切耦合试验装置模拟降水速率变化,结果揭示:在中高降水速率下,试样中部形成显著孔压梯度,导致有效应力突变,进而诱发剪切集中、结构坍塌及局部再固结过程。此现象在实际基坑监测中与沉降突变、内支撑反力异常响应高度吻合,显示模型理论具有现实指导意义。
在理论分析基础上,为验证结构性本构模型在实际工程中的适用性,本文选取上海某深基坑工程作为验证场景。该工程基坑开挖深度达42.5 m,围护结构为地下连续墙+多道支撑体系,基坑底部穿越第Ⅰ与第Ⅱ承压含水层之间的软弱过渡层,层厚约9.5 m,孔隙比高达1.87。该区域地下水位变化频繁,软土结构性显著,对降水引起的有效应力扰动极为敏感。
基于现场地勘资料与室内试验参数,构建二维有限元模型,采用应力–应变法分析基坑底部隆起、周边沉降与支撑内力响应。在模型中,软弱夹层赋予结构性演化模型,其余层按修正Mohr–Coulomb模型处理。通过参数反演校正过程,选取位移监测数据作为目标函数,以遗传算法优化剪切模量G₀、结构参数s₀、剪胀角ψ₀与屈服函数参数n的初始取值。拟合结果表明,结构性模型可有效反映现场观测中的非对称沉降、底鼓偏移及支撑反力滞后等现象。
进一步在FLAC3D平台开展降水诱导下的三维多场耦合模拟,模拟内容包括:连续降水速率阶跃加载、不同排水边界控制、土体结构破坏演化及塑性区分布。模拟显示,降水速率超过1.5 m/d后,底部软弱层内部出现显著剪应变集中,最大塑性区沿墙底–软弱夹层交界处延伸,形成典型“壳型破坏模式”。同时,地层侧向移动引起中部支撑内力失衡,与实际施工期出现的轴力突增–突降过程高度吻合。
为研究该类土体的长期沉降行为,本文构建基于Biot理论的固结–蠕变耦合分析框架,考虑超静孔压耗散与黏弹–塑性蠕变同步演化机制。引入改进型Log-time黏性函数描述等时变形,并设定沉降时程控制点(28 d、90 d、1 a、3 a、10 a)。预测结果表明,在含结构性的软土层中,沉降在3 a后仍呈缓慢增长态势,结构性破坏–再固结所引起的“二次沉降平台”在90–180天阶段最为显著,占总沉降量的32%以上。
此外,软土区域常伴有基岩埋深大、剪切波速低的特点,导致地震作用下场地响应复杂,振动主频降低、波形延迟现象显著。为此,研究引入等效线性化方法,结合SH-wave输入条件与场地剖面参数,建立一维地震反应分析模型,选取北川地震、宝山地震等典型地震波作为输入。结果表明,结构性软土在高阶剪应变下强度退化显著,主频响应在1.2–2.3 Hz之间展宽,剪切模量下降达70%以上。
场地响应中,孔压增长与微震放大存在明显同步性。通过动三轴试验观测发现,在循环加载第8–12周次内,孔压比r_u迅速上升至0.9以上,并伴随剪应变突跃,表明软土在动力荷载下存在结构性触发液化的风险。基于此,进一步提出动力下的应力路径控制模型,设置等幅–渐增加载序列并测定等效阻尼比、剪胀能耗指数、应力回滞面积,建立“动剪应变–孔压增长–能耗释放”三维特征面,揭示动力疲劳损伤机制。
|
考点1:“软黏性土体”推荐翻译为 “soft clay”
考点2:“深基坑”推荐翻译为 “deep foundation pit”
|
dae9e
|
学术论文
|
应用学科
|
162
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
理解传播技术作为一个技术/文化复合体如何对各种爱国主义或者民族主义的话语构型起至关重要的作用。而中国电竞作为一个“异质元素的集群”,其爱国主义有着独特的复杂性,不仅包括技术与文化,还包括政治、经济、资本、市场与个体等多元要素和主体,更加体现出一种多元互动的社会情境、权力博弈和文化景观,相应地,也指向更加复杂的话语接合实践。实际上,各种民族主义或者爱国主义都是文化和历史进程的产物,这些进程融入了权力关系、社会实践和意识形态斗争,同时也需要通过话语实践的不断肯定和争夺来维持。因此,民族主义或者爱国主义不是固化、静态或同质化的身份认同,而是一个异质性的领域,不同的参与者和话语在其中争夺合法性、权威和再现;这本质上是一种不断演进、协商和争夺意义与认同的话语“接合实践”。
为此,本研究延续这一学术脉络并聚焦新兴的“电竞爱国主义”认同,利用话语接合的理论概念和方法论工具,考察中国电竞场域中爱国主义话语接合的可能形式、过程和意义,特别是其如何通过国家权力、行业资本、个人梦想的“三重接合”,相应地将政治理念、经济利益和自我认同,历史性、实践性、能动性地接合成一个复杂的、动态的甚至临时的“电竞爱国主义”认同。
首先是国家权力要渗透、吸纳并规训电竞,将电竞同时作为一个“治理对象”和“发展主体”,并借由“为国争光”的爱国话语将年轻世代聚集的电竞场域打造成为一个新的爱国主义教育平台;其次是行业资本开始积极挪用上述国家话语,并联合其他利益相关者结成利益联盟,既合力推动电竞行业的快速野蛮生长,又以这种行业高速增长带来的经济合法性,争取和强化其行业的政治合法性;最后是电竞选手也会挪用这种爱国主义话语为自己的个人行为背书,甚至会将追求自我梦想(“冠军梦”)与国家梦想(“中国梦”)直接联接起来,寻求自我合法化、自我价值和自我认同。
不过,不管是电竞行业还是电竞选手等对国家爱国主义话语的挪用以及相应的自我合理化和合法化,最终又都将接着被国家所吸纳,服务于地方经济发展、部门政策规划乃至国家文化走出去战略等,而这又将反过来被行业和选手等进一步挪用,继续服务于自我合理化和自我合法化,如此形成电竞爱国主义话语“三重接合”自我循环的内在动力。这种“三重接合”所体现出来的多元互动,使“电竞爱国主义”区别于以往的“粉丝民族主义”“嘻戏爱国主义”等,因此也对民族主义与爱国主义研究领域有所贡献。首先,以往民族主义研究多聚焦“官方”或“民间/民众”,一是作为“官方宣传”的精英建构论,即官方对民族主义的建构与利用,二是民众对民族主义的挪用与重组,“民众的网络正在向国家对民族主义的垄断发起挑战,民众在民族主义政治中正发挥着更大的作用”,而电竞爱国主义展现了爱国主义话语实践中官方与民众之外更多元的主体和行动者,特别是行业资本作为一个重要主体和行动者;其次,以往研究已经关注到自上而下的官方民族主义与自下而上的大众民族主义之间的互动关系,特别是新近粉丝民族主义等作为新兴大众民族主义的挑战性和抵抗性,而电竞爱国主义揭示了上述不同行动者之间更复杂和暧昧的相互关系和动态过程,特别是挑战了截然二分的“官方vs.民众”“自上而下vs.自下而上”,而是接合出一种“双向奔赴”“上下同心”的奇特关系;最后,电竞爱国主义警示我们,在国家与民众之外,在新媒体技术与民族主义互动关系之外,行业资本特别是裹挟着新媒体技术力量的行业资本作为民族主义及爱国主义场域中新兴而又强大的力量存在,有着强烈的合法性危机感和强大的能动性,从而在电竞爱国主义话语的三重接合循环中实质性地起到“车头”的主导性作用。以往研究让我们看到了国家与民众对民族主义及爱国主义的利用或挪用,电竞爱国主义却让我们进一步看到了资本作为新兴且强大的力量,借由对爱国主义话语的挪用,在主动策略性地接合国家、民众与行业的话语共识。但是,这并不意味着资本成为电竞爱国主义话语接合的主导力量。对这个接合过程,我们可以借用欧文·戈夫曼的拟剧理论术语作为隐喻来理解:资本固然在“后台”运筹,让选手在“前台”表演,并请民众在“舞台”前观赏,但国家始终是最强有力的“剧作家”,创作并限定了爱国主义的“剧本”,并使之内化成为资本、选手和民众的共同规范、准则、惯例和依据,即所有行动者共同的“框架”;包括资本在内的所有行动者在“框架”内或多或少有应变和创作的空间,但整体上是服从并服务于“剧本”和“剧作家”的。
|
理解传播技术作为一个技术/文化复合体如何对各种爱国主义或者民族主义的话语构型起至关重要的作用。而中国电竞作为一个“异质元素的集群”,其爱国主义有着独特的复杂性,不仅包括技术与文化,还包括政治、经济、资本、市场与个体等多元要素和主体,更加体现出一种多元互动的社会情境、权力博弈和文化景观,相应地,也指向更加复杂的话语接合实践。实际上,各种民族主义或者爱国主义都是文化和历史进程的产物,这些进程融入了权力关系、社会实践和意识形态斗争,同时也需要通过话语实践的不断肯定和争夺来维持。因此,民族主义或者爱国主义不是固化、静态或同质化的身份认同,而是一个异质性的领域,不同的参与者和话语在其中争夺合法性、权威和再现;这本质上是一种不断演进、协商和争夺意义与认同的话语“接合实践”。
为此,本研究延续这一学术脉络并聚焦新兴的“电竞爱国主义”认同,利用话语接合的理论概念和方法论工具,考察中国电竞场域中爱国主义话语接合的可能形式、过程和意义,特别是其如何通过国家权力、行业资本、个人梦想的“三重接合”,相应地将政治理念、经济利益和自我认同,历史性、实践性、能动性地接合成一个复杂的、动态的甚至临时的“电竞爱国主义”认同。
首先是国家权力要渗透、吸纳并规训电竞,将电竞同时作为一个“治理对象”和“发展主体”,并借由“为国争光”的爱国话语将年轻世代聚集的电竞场域打造成为一个新的爱国主义教育平台;其次是行业资本开始积极挪用上述国家话语,并联合其他利益相关者结成利益联盟,既合力推动电竞行业的快速野蛮生长,又以这种行业高速增长带来的经济合法性,争取和强化其行业的政治合法性;最后是电竞选手也会挪用这种爱国主义话语为自己的个人行为背书,甚至会将追求自我梦想(“冠军梦”)与国家梦想(“中国梦”)直接联接起来,寻求自我合法化、自我价值和自我认同。
不过,不管是电竞行业还是电竞选手等对国家爱国主义话语的挪用以及相应的自我合理化和合法化,最终又都将接着被国家所吸纳,服务于地方经济发展、部门政策规划乃至国家文化走出去战略等,而这又将反过来被行业和选手等进一步挪用,继续服务于自我合理化和自我合法化,如此形成电竞爱国主义话语“三重接合”自我循环的内在动力。这种“三重接合”所体现出来的多元互动,使“电竞爱国主义”区别于以往的“粉丝民族主义”“嘻戏爱国主义”等,因此也对民族主义与爱国主义研究领域有所贡献。首先,以往民族主义研究多聚焦“官方”或“民间/民众”,一是作为“官方宣传”的精英建构论,即官方对民族主义的建构与利用,二是民众对民族主义的挪用与重组,“民众的网络正在向国家对民族主义的垄断发起挑战,民众在民族主义政治中正发挥着更大的作用”,而电竞爱国主义展现了爱国主义话语实践中官方与民众之外更多元的主体和行动者,特别是行业资本作为一个重要主体和行动者;其次,以往研究已经关注到自上而下的官方民族主义与自下而上的大众民族主义之间的互动关系,特别是新近粉丝民族主义等作为新兴大众民族主义的挑战性和抵抗性,而电竞爱国主义揭示了上述不同行动者之间更复杂和暧昧的相互关系和动态过程,特别是挑战了截然二分的“官方vs.民众”“自上而下vs.自下而上”,而是接合出一种“双向奔赴”“上下同心”的奇特关系;最后,电竞爱国主义警示我们,在国家与民众之外,在新媒体技术与民族主义互动关系之外,行业资本特别是裹挟着新媒体技术力量的行业资本作为民族主义及爱国主义场域中新兴而又强大的力量存在,有着强烈的合法性危机感和强大的能动性,从而在电竞爱国主义话语的三重接合循环中实质性地起到“车头”的主导性作用。以往研究让我们看到了国家与民众对民族主义及爱国主义的利用或挪用,电竞爱国主义却让我们进一步看到了资本作为新兴且强大的力量,借由对爱国主义话语的挪用,在主动策略性地接合国家、民众与行业的话语共识。但是,这并不意味着资本成为电竞爱国主义话语接合的主导力量。对这个接合过程,我们可以借用欧文·戈夫曼的拟剧理论术语作为隐喻来理解:资本固然在“后台”运筹,让选手在“前台”表演,并请民众在“舞台”前观赏,但国家始终是最强有力的“剧作家”,创作并限定了爱国主义的“剧本”,并使之内化成为资本、选手和民众的共同规范、准则、惯例和依据,即所有行动者共同的“框架”;包括资本在内的所有行动者在“框架”内或多或少有应变和创作的空间,但整体上是服从并服务于“剧本”和“剧作家”的。
|
考点1. “权力博弈”推荐译为“power games”或者“power dynamics”,选取一种即可,保持译文一致性
考点2. “粉丝民族主义”应该译为“fandom nationalism”,已成为主流翻译
考点3. “嬉戏民族主义”应该译为“playful patriotism”,已成为主流翻译
|
db828
|
学术论文
|
社会科学
|
199
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
16 of the best things to do in London
Fast-paced, fabulous and fun, London is packed with world-class things to see and experience. You probably already have a checklist of London sights to visit, but don't forget to pause and soak up the vibe of a city that has been at the forefront of world culture for at least two millennia.
Whether you're a first-time visitor or coming back for more, London serves up so many options that it can be hard to know where to start. It's easy to fill days or even weeks taking advantage of free entry at the city's top art galleries and museums, learning about the rich and complex history, and seeing live bands and captivating West End shows.
If you have the time – and budget – almost anything is possible in London. To help you whittle down the options, here are the top experiences in London that you won't want to miss.
1. Stroll the sights of the South Bank
A great way to get your bearings and take in a slew of sights at the same time is to take a west-to-east walk along the Thames, through the cultural quarter known as the South Bank. Getting off the Tube at Westminster will deposit you right by Big Ben, the legendary bell atop the clocktower of the Houses of Parliament. From there, cross Westminster Bridge for stellar views back toward the seat of British democracy.
Once on the Queen's Walk, as this pathway is known, stroll east with the river to your left. Although it’s inescapably touristy, a rotation on the London Eye is a must for any first-time visitor to the capital. This futuristic Ferris wheel takes 30 minutes to complete a full turn, reaching 135m (443ft) at its highest point, and providing spectacular views of iconic landmarks from its glass capsules. Book tickets in advance to avoid the lines.
The Southbank Centre offers up a roll call of top-draw icons and entertainment; it's a great place to go if you're traveling with kids, with lots of free activities and events in summer. Once you leave the Brutalist concrete architecture of the Southbank Centre behind, you'll find other eclectic London sights, including Shakespeare’s Globe Theatre, the Tate Modern art gallery (with views across the river to St Paul’s Cathedral), and the Shard, Britain's tallest building. As you walk, look across the river towards the City of London, and try to pick out its curiously nicknamed skyscrapers – such as the Gherkin, the Cheesegrater and the Walkie-Talkie. When hunger calls, take a snack break at legendary Borough Market close to London Bridge, where there are pubs, restaurants, dairies, bakers and more than 100 gourmet food stalls.
Local tip: Ice-cream sellers on Westminster Bridge are known for overcharging tourists, so resist the urge to buy anything here. Also, don't engage in any of the cup and ball gambling games – these are illegal scams and you will not win, no matter how easy it looks.
2. Be wowed by contemporary art at Tate Modern
A vast shrine to modern and contemporary art, the much-loved Tate Modern enjoys a triumphant position right on the River Thames. Housed in the former Bankside Power Station, the gallery is a vigorous statement of modernity, architectural renewal and accessibility. Enter via Holland St to experience the vast Turbine Hall, which used to house the power station’s electricity generators, and is now home to large-scale art installations. Upstairs exhibition spaces are pushing the conceptual envelope, too, with interesting temporary shows, installations and performance art.
Local tip: Level 10, the viewing platform atop the Blavatnik Building, has been the subject of some controversy regarding privacy because it's possible to look into the adjacent apartment buildings. There are many signs politely requesting no photography on the south side (and not as much to see there anyway). There are also great views from the coffee shop and bar in the main building. If the tide is out, try mudlarking – an evocative term for looking for historic junk on the exposed mud at low tide – right in front of the gallery.
3. Step back in time at the Tower of London
A world of English eccentricity enclosed within the sturdy walls of an imposing 11th-century fortress, the Tower of London is the perfect place to start a visit to London. As well as taking visitors on a remarkable architectural and historical journey, the castle is home to the world's largest diamond (the controversial Cullinan diamond, part of the famous Crown Jewels), as well as a dazzling array of armor and weaponry. A palpable sense of history and heritage will greet you at every turn.
Planning tip: It’s well worth getting to the Tower early – you'll need at least half a day to explore the sprawling chambers, courtyards and jail cells, and hear about its gruesome history. Arrive as the doors are unlocked and head straight to the Crown Jewels to avoid a long wait in line. To learn more about the Tower's back story, join a Yeoman Warder’s tour for a fascinating and personal introduction to the life and grisly times of this fortress-palace.
4. Explore London’s Black history
London’s Black history is rich and fascinating and stretches back across centuries. All over London, you'll sense a growing enthusiasm for acknowledging, owning and celebrating this once-overlooked part of the capital's story. Begin your journey by joining one of the 16 walking tours in central London run by Black History Walks, then head down to the Docklands to learn about the capital’s involvement in the transatlantic slave trade at the Museum of London Docklands before meandering south to marvel at the vast Black archives at Brixton’s Black Cultural Archives. Next, indulge in some delicious Caribbean cuisine and take in many of the city’s best Black artists at 198 Contemporary Arts and Learning.
Planning tip: Notting Hill Carnival, held over the August Bank Holiday weekend, is a colossal street party celebrating Black, Caribbean and African cultures. Join the dancing, parties and parades that fill the neighborhoods around Ladbroke Grove. The official website publishes routes and events in advance.
5. Imagine the royal weddings of yesteryear at Westminster Abbey
Westminster Abbey has been the heart of the country’s royal and religious life for centuries. This Gothic wonder was founded more than a thousand years ago and today it displays a mix of architectural styles, with the bulk of its structure dating back to the 13th century. As a result, almost every nook and cranny has a story attached to it.
London's great abbey has served as the venue for many showstopper funerals and weddings – 30 monarchs are buried here, and 16 royal weddings have been hosted here, the most recent being that of Prince William and Catherine Middleton in 2011. Among the highlights, you will find the oldest door in the UK, the collection of memorials to great poets and writers known as Poets’ Corner, the Coronation Chair, 14th-century cloisters, a 900-year-old garden, royal tombs and much, much more.
Planning tip: Be warned that the crowds are almost as solid as the abbey’s unshakeable stonework, so aim to join the line first thing in the morning.
6. Delve into Muslim London
London was once the capital of an empire that ruled over more than half the world’s Muslims, so it should come as no surprise that the city is home to a wide range of Muslim communities and rich in Islamic heritage. Start with the amazing Islamic collections in the Victoria & Albert Museum’s Jameel Gallery or the British Museum’s Albukhary Gallery – between them, these former imperial institutes hold over 115,000 Islamic items.
To learn where Arabic was taught in 17th century London, take an eye-opening Muslim History Tour, then treat yourself to some of the capital’s most delicious Muslim cuisine. Try a fiery curry along East London’s Brick Lane (or great Punjabi-style kebabs nearby at Tayyabs), head north to Green Lanes for London’s most authentic Anatolian dishes, or go west along Edgware Rd for varied Middle Eastern cuisine.
7. Tour through history and science at South Kensington's museums
A trio of world-class museums lie within yards of each other in the well-to-do neighborhood of South Kensington, their grand edifices proving an equal draw to the glories within. With seven floors of interactive, educational and eye-opening exhibits, the spellbinding collection of models, machines and inventions at the Science Museum mesmerizes adults and children in equal measure.
You could spend days in the huge Victoria & Albert Museum, which houses the world’s leading collection of decorative art objects, and still be astounded at its variety and depth. With its animatronic Tyrannosaurus rex, riveting displays about planet Earth, the research-oriented Darwin Centre and architecture straight out of a Gothic fairy tale, the Natural History Museum is an astonishing melding of science and imagination. Start in the iconic Hintze Hall, where the skeleton of a blue whale dives down from the ceiling.
Planning tip: To see a more unusual side to the museums, and mingle with some Londoners, check in advance to see if any “Lates” are running; the museums periodically open their doors into the evening for special events with music and food. There are even occasional sleepover events called Dino Snores at the Natural History Museum.
|
16 of the best things to do in London
Fast-paced, fabulous and fun, London is packed with world-class things to see and experience. You probably already have a checklist of London sights to visit, but don't forget to pause and soak up the vibe of a city that has been at the forefront of world culture for at least two millennia.
Whether you're a first-time visitor or coming back for more, London serves up so many options that it can be hard to know where to start. It's easy to fill days or even weeks taking advantage of free entry at the city's top art galleries and museums, learning about the rich and complex history, and seeing live bands and captivating West End shows.
If you have the time – and budget – almost anything is possible in London. To help you whittle down the options, here are the top experiences in London that you won't want to miss.
1. Stroll the sights of the South Bank
A great way to get your bearings and take in a slew of sights at the same time is to take a west-to-east walk along the Thames, through the cultural quarter known as the South Bank. Getting off the Tube at Westminster will deposit you right by Big Ben, the legendary bell atop the clocktower of the Houses of Parliament. From there, cross Westminster Bridge for stellar views back toward the seat of British democracy.
Once on the Queen's Walk, as this pathway is known, stroll east with the river to your left. Although it’s inescapably touristy, a rotation on the London Eye is a must for any first-time visitor to the capital. This futuristic Ferris wheel takes 30 minutes to complete a full turn, reaching 135m (443ft) at its highest point, and providing spectacular views of iconic landmarks from its glass capsules. Book tickets in advance to avoid the lines.
The Southbank Centre offers up a roll call of top-draw icons and entertainment; it's a great place to go if you're traveling with kids, with lots of free activities and events in summer. Once you leave the Brutalist concrete architecture of the Southbank Centre behind, you'll find other eclectic London sights, including Shakespeare’s Globe Theatre, the Tate Modern art gallery (with views across the river to St Paul’s Cathedral), and the Shard, Britain's tallest building. As you walk, look across the river towards the City of London, and try to pick out its curiously nicknamed skyscrapers – such as the Gherkin, the Cheesegrater and the Walkie-Talkie. When hunger calls, take a snack break at legendary Borough Market close to London Bridge, where there are pubs, restaurants, dairies, bakers and more than 100 gourmet food stalls.
Local tip: Ice-cream sellers on Westminster Bridge are known for overcharging tourists, so resist the urge to buy anything here. Also, don't engage in any of the cup and ball gambling games – these are illegal scams and you will not win, no matter how easy it looks.
2. Be wowed by contemporary art at Tate Modern
A vast shrine to modern and contemporary art, the much-loved Tate Modern enjoys a triumphant position right on the River Thames. Housed in the former Bankside Power Station, the gallery is a vigorous statement of modernity, architectural renewal and accessibility. Enter via Holland St to experience the vast Turbine Hall, which used to house the power station’s electricity generators, and is now home to large-scale art installations. Upstairs exhibition spaces are pushing the conceptual envelope, too, with interesting temporary shows, installations and performance art.
Local tip: Level 10, the viewing platform atop the Blavatnik Building, has been the subject of some controversy regarding privacy because it's possible to look into the adjacent apartment buildings. There are many signs politely requesting no photography on the south side (and not as much to see there anyway). There are also great views from the coffee shop and bar in the main building. If the tide is out, try mudlarking – an evocative term for looking for historic junk on the exposed mud at low tide – right in front of the gallery.
3. Step back in time at the Tower of London
A world of English eccentricity enclosed within the sturdy walls of an imposing 11th-century fortress, the Tower of London is the perfect place to start a visit to London. As well as taking visitors on a remarkable architectural and historical journey, the castle is home to the world's largest diamond (the controversial Cullinan diamond, part of the famous Crown Jewels), as well as a dazzling array of armor and weaponry. A palpable sense of history and heritage will greet you at every turn.
Planning tip: It’s well worth getting to the Tower early – you'll need at least half a day to explore the sprawling chambers, courtyards and jail cells, and hear about its gruesome history. Arrive as the doors are unlocked and head straight to the Crown Jewels to avoid a long wait in line. To learn more about the Tower's back story, join a Yeoman Warder’s tour for a fascinating and personal introduction to the life and grisly times of this fortress-palace.
4. Explore London’s Black history
London’s Black history is rich and fascinating and stretches back across centuries. All over London, you'll sense a growing enthusiasm for acknowledging, owning and celebrating this once-overlooked part of the capital's story. Begin your journey by joining one of the 16 walking tours in central London run by Black History Walks, then head down to the Docklands to learn about the capital’s involvement in the transatlantic slave trade at the Museum of London Docklands before meandering south to marvel at the vast Black archives at Brixton’s Black Cultural Archives. Next, indulge in some delicious Caribbean cuisine and take in many of the city’s best Black artists at 198 Contemporary Arts and Learning.
Planning tip: Notting Hill Carnival, held over the August Bank Holiday weekend, is a colossal street party celebrating Black, Caribbean and African cultures. Join the dancing, parties and parades that fill the neighborhoods around Ladbroke Grove. The official website publishes routes and events in advance.
5. Imagine the royal weddings of yesteryear at Westminster Abbey
Westminster Abbey has been the heart of the country’s royal and religious life for centuries. This Gothic wonder was founded more than a thousand years ago and today it displays a mix of architectural styles, with the bulk of its structure dating back to the 13th century. As a result, almost every nook and cranny has a story attached to it.
London's great abbey has served as the venue for many showstopper funerals and weddings – 30 monarchs are buried here, and 16 royal weddings have been hosted here, the most recent being that of Prince William and Catherine Middleton in 2011. Among the highlights, you will find the oldest door in the UK, the collection of memorials to great poets and writers known as Poets’ Corner, the Coronation Chair, 14th-century cloisters, a 900-year-old garden, royal tombs and much, much more.
Planning tip: Be warned that the crowds are almost as solid as the abbey’s unshakeable stonework, so aim to join the line first thing in the morning.
6. Delve into Muslim London
London was once the capital of an empire that ruled over more than half the world’s Muslims, so it should come as no surprise that the city is home to a wide range of Muslim communities and rich in Islamic heritage. Start with the amazing Islamic collections in the Victoria & Albert Museum’s Jameel Gallery or the British Museum’s Albukhary Gallery – between them, these former imperial institutes hold over 115,000 Islamic items.
To learn where Arabic was taught in 17th century London, take an eye-opening Muslim History Tour, then treat yourself to some of the capital’s most delicious Muslim cuisine. Try a fiery curry along East London’s Brick Lane (or great Punjabi-style kebabs nearby at Tayyabs), head north to Green Lanes for London’s most authentic Anatolian dishes, or go west along Edgware Rd for varied Middle Eastern cuisine.
7. Tour through history and science at South Kensington's museums
A trio of world-class museums lie within yards of each other in the well-to-do neighborhood of South Kensington, their grand edifices proving an equal draw to the glories within. With seven floors of interactive, educational and eye-opening exhibits, the spellbinding collection of models, machines and inventions at the Science Museum mesmerizes adults and children in equal measure.
You could spend days in the huge Victoria & Albert Museum, which houses the world’s leading collection of decorative art objects, and still be astounded at its variety and depth. With its animatronic Tyrannosaurus rex, riveting displays about planet Earth, the research-oriented Darwin Centre and architecture straight out of a Gothic fairy tale, the Natural History Museum is an astonishing melding of science and imagination. Start in the iconic Hintze Hall, where the skeleton of a blue whale dives down from the ceiling.
Planning tip: To see a more unusual side to the museums, and mingle with some Londoners, check in advance to see if any “Lates” are running; the museums periodically open their doors into the evening for special events with music and food. There are even occasional sleepover events called Dino Snores at the Natural History Museum.
|
考点1:Houses of Parliament 应译为 英国国会大厦
考点2:Westminster Bridge 应译为 威斯敏斯特桥
考点3:Queen's Walk 应译为 女王步道
考点4:London Eye 应译为 伦敦眼
考点5:Southbank Centre 应译为 南岸艺术中心
考点6:Shakespeare’s Globe Theatre 应译为 莎士比亚环球剧场
考点7:Tate Modern 应译为 泰特现代美术馆
考点8:St Paul’s Cathedral 应译为 圣保罗大教堂
考点9:The Shard 应译为 碎片大厦/伦敦碎片塔
考点10:City of London 应译为 伦敦金融城/伦敦城
考点11:the Gherkin 应译为 小黄瓜大厦
考点12:the Cheesegrater 应译为 刨丝器大厦
考点13:the Walkie-Talkie 应译为 对讲机大厦
考点14:Borough Market 应译为 博罗市场
考点15:London Bridge 应译为 伦敦桥
考点16:Tate Modern’s Turbine Hall 应译为 泰特现代美术馆涡轮大厅
考点17:Bankside Power Station 应译为 岸边发电站
考点18:Blavatnik Building 应译为 布拉瓦特尼克楼
考点19:mudlarking 应译为 淘泥寻宝/河泥拾遗
考点20:Tower of London 应译为 伦敦塔
考点21:Cullinan diamond 应译为 库里南钻石
考点22:Crown Jewels 应译为 英国王室珠宝/御宝
考点23:Yeoman Warder 应译为 伦敦塔哨兵/伦敦塔守卫
考点24:London’s Black history 应译为 伦敦黑人历史
考点25:Black History Walks 应译为 黑人历史徒步之旅
考点26:Museum of London Docklands 应译为 伦敦码头区博物馆
考点27:Brixton’s Black Cultural Archives 应译为 布里克斯顿黑人文化档案馆
考点28:198 Contemporary Arts and Learning 应译为 198当代艺术与学习中心
考点29:Notting Hill Carnival 应译为 诺丁山狂欢节
考点30:Ladbroke Grove 应译为 拉德布鲁克格罗夫
考点31:Westminster Abbey 应译为 威斯敏斯特大教堂/威斯敏斯特修道院
考点32:Poets’ Corner 应译为 诗人角
考点33:Coronation Chair 应译为 加冕椅
考点34:Victoria & Albert Museum 应译为 维多利亚与艾尔伯特博物馆
考点35:Jameel Gallery 应译为 贾米尔展厅
考点36:British Museum’s Albukhary Gallery 应译为 大英博物馆阿尔布哈里展厅
考点37:Brick Lane 应译为 砖巷
考点38:Tayyabs 应译为 塔亚布餐厅
考点39:Green Lanes 应译为 格林巷
考点40:Edgware Rd 应译为 埃奇韦尔路
考点41:South Kensington 应译为 南肯辛顿
考点42:Science Museum 应译为 科学博物馆
考点43:Natural History Museum 应译为 自然历史博物馆
考点44:Darwin Centre 应译为 达尔文中心
考点45:Hintze Hall 应译为 欣策大厅
考点46:Dino Snores 应译为 恐龙夜宿/恐龙夜眠活动
|
dd70f
|
垂类场景
|
广告营销
|
75
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
7月8日,国家发展改革委(简称“发改委”)表示,日前新增下达100亿元中央预算内投资,开展以工代赈加力扩围促进重点群体就业增收行动,支持26个省(区、市)和新疆生产建设兵团实施1975个项目,预计发放劳务报酬45.9亿元,助力31万名重点群体稳就业促增收。
以工代赈是指政府投资建设基础设施工程,受赈济者参加工程建设获得劳务报酬,以此取代直接赈济的一项扶持政策,也是中央政治局会议部署的稳就业稳经济政策工具之一。
发改委每年下达以工代赈中央专项资金,并推动国家重点项目、农业农村基础设施项目实施以工代赈。截至2025年6月底,发改委联合财政部共下达2025年度以工代赈中央投资295亿元,支持地方实施以工代赈项目近6000个,预计吸纳带动70余万名困难群众就地就近就业,将发放劳务报酬超过110亿元,有效拓宽群众就业增收渠道。
发改委表示,下一步将立足当前就业形势,积极主动作为,督促指导地方推动已下达投资的以工代赈项目全部开工建设,抓实抓牢重点群体务工组织和劳务报酬发放等关键环节,同步做好项目常态化滚动式储备,推动以工代赈切实发挥稳就业、促增收的逆周期调节作用。
突出纾困解难、可感可及和一举多得
当前,以工代赈着力挖掘务工岗位扩大就业容量,突出“纾困解难”。本批1975个以工代赈项目瞄准返乡回流重点群体集中、务工需求大的地区,围绕城乡融合发展和农业农村领域中小型基础设施建设,充分挖掘工程建设、服务保障、项目管理和建后管护等各环节务工岗位,预计吸纳带动31万名重点群体就近就业,包括脱贫人口及防返贫致贫监测对象、返乡农民工、其他农村劳动力等群体。
此外,以工代赈着力提高劳务报酬占中央投资比例,突出“可感可及”。本批投资将项目劳务报酬占中央投资的比例提高至不低于40%,优先实施人工用量大、材料成本低、机械使用少的村道巷道硬化、乡村生产道路改造、小型排灌沟渠疏浚、生态护坡护坝等劳动密集型工程。与此同时,推动地方落实以工代赈项目可不招标的要求,鼓励“村民自建”“乡建公司承建”等灵活发包方式,创新“乡镇政府+村级合作社(村民项目理事会、乡建公司)+群众”的劳务组织模式,提高乡村两级基层组织动员能力,增加群众更多实际务工收入。本批100亿元投资将发放劳务报酬45.9亿元,占比达45.9%。
另外,以工代赈着力改善群众身边的生产生活条件,突出“一举多得”。本批投资拟支持硬化各类村道巷道、改造县城或乡镇连接村庄的小型道路共9640公里,疏浚小型排灌沟渠3762余公里,整治农田9180余亩,铺设供排水管网2110公里,修建农村简易桥涵、山坪塘和蓄水池等4842座。这些“小而美”的项目既能有效改善村容村貌和人居环境,又能提升农村产业发展配套基础设施条件,覆盖了一般政府投资支持不到的“末梢”,补上了部分建设领域的“盲点”和“死角”,打通了城乡基础设施“最后一公里”。
加力扩围提标实施以工代赈,促进重点群体就业增收
近日,发改委联合有关部门印发了《以工代赈加力扩围促进重点群体就业增收行动方案》(简称“《行动方案》”),通过这项增量政策,进一步加大对困难群体帮扶力度。
发改委政策研究室副主任李超表示,近期以工代赈的新举措和工作进展可以用“加力”“扩围”“提标”三个关键词概括。
此次《行动方案》要新增安排一批中央预算内投资项目,对重点群体较为集中的地区予以支持。受益对象要扩围,支持项目也扩围。另外,《行动方案》将以工代赈劳务报酬占中央对项目投入资金的比重由30%以上提高至40%以上,尽可能增加群众务工收入。发改委已经完成重点群体摸底、项目谋划申报等前期工作,正在抓紧组织开展项目审查,有序推进投资计划下达工作。
下一步,发改委将推动各地最大程度挖掘以工代赈项目用工岗位规模,最大力度吸纳当地困难群众参与建设,最大幅度提高劳务报酬占中央投资的比例,多种方式开展培训提高务工群众技能,充分发挥以工代赈中“赈”的实效。
|
7月8日,国家发展改革委(简称“发改委”)表示,日前新增下达100亿元中央预算内投资,开展以工代赈加力扩围促进重点群体就业增收行动,支持26个省(区、市)和新疆生产建设兵团实施1975个项目,预计发放劳务报酬45.9亿元,助力31万名重点群体稳就业促增收。
以工代赈是指政府投资建设基础设施工程,受赈济者参加工程建设获得劳务报酬,以此取代直接赈济的一项扶持政策,也是中央政治局会议部署的稳就业稳经济政策工具之一。
发改委每年下达以工代赈中央专项资金,并推动国家重点项目、农业农村基础设施项目实施以工代赈。截至2025年6月底,发改委联合财政部共下达2025年度以工代赈中央投资295亿元,支持地方实施以工代赈项目近6000个,预计吸纳带动70余万名困难群众就地就近就业,将发放劳务报酬超过110亿元,有效拓宽群众就业增收渠道。
发改委表示,下一步将立足当前就业形势,积极主动作为,督促指导地方推动已下达投资的以工代赈项目全部开工建设,抓实抓牢重点群体务工组织和劳务报酬发放等关键环节,同步做好项目常态化滚动式储备,推动以工代赈切实发挥稳就业、促增收的逆周期调节作用。
突出纾困解难、可感可及和一举多得
当前,以工代赈着力挖掘务工岗位扩大就业容量,突出“纾困解难”。本批1975个以工代赈项目瞄准返乡回流重点群体集中、务工需求大的地区,围绕城乡融合发展和农业农村领域中小型基础设施建设,充分挖掘工程建设、服务保障、项目管理和建后管护等各环节务工岗位,预计吸纳带动31万名重点群体就近就业,包括脱贫人口及防返贫致贫监测对象、返乡农民工、其他农村劳动力等群体。
此外,以工代赈着力提高劳务报酬占中央投资比例,突出“可感可及”。本批投资将项目劳务报酬占中央投资的比例提高至不低于40%,优先实施人工用量大、材料成本低、机械使用少的村道巷道硬化、乡村生产道路改造、小型排灌沟渠疏浚、生态护坡护坝等劳动密集型工程。与此同时,推动地方落实以工代赈项目可不招标的要求,鼓励“村民自建”“乡建公司承建”等灵活发包方式,创新“乡镇政府+村级合作社(村民项目理事会、乡建公司)+群众”的劳务组织模式,提高乡村两级基层组织动员能力,增加群众更多实际务工收入。本批100亿元投资将发放劳务报酬45.9亿元,占比达45.9%。
另外,以工代赈着力改善群众身边的生产生活条件,突出“一举多得”。本批投资拟支持硬化各类村道巷道、改造县城或乡镇连接村庄的小型道路共9640公里,疏浚小型排灌沟渠3762余公里,整治农田9180余亩,铺设供排水管网2110公里,修建农村简易桥涵、山坪塘和蓄水池等4842座。这些“小而美”的项目既能有效改善村容村貌和人居环境,又能提升农村产业发展配套基础设施条件,覆盖了一般政府投资支持不到的“末梢”,补上了部分建设领域的“盲点”和“死角”,打通了城乡基础设施“最后一公里”。
加力扩围提标实施以工代赈,促进重点群体就业增收
近日,发改委联合有关部门印发了《以工代赈加力扩围促进重点群体就业增收行动方案》(简称“《行动方案》”),通过这项增量政策,进一步加大对困难群体帮扶力度。
发改委政策研究室副主任李超表示,近期以工代赈的新举措和工作进展可以用“加力”“扩围”“提标”三个关键词概括。
此次《行动方案》要新增安排一批中央预算内投资项目,对重点群体较为集中的地区予以支持。受益对象要扩围,支持项目也扩围。另外,《行动方案》将以工代赈劳务报酬占中央对项目投入资金的比重由30%以上提高至40%以上,尽可能增加群众务工收入。发改委已经完成重点群体摸底、项目谋划申报等前期工作,正在抓紧组织开展项目审查,有序推进投资计划下达工作。
下一步,发改委将推动各地最大程度挖掘以工代赈项目用工岗位规模,最大力度吸纳当地困难群众参与建设,最大幅度提高劳务报酬占中央投资的比例,多种方式开展培训提高务工群众技能,充分发挥以工代赈中“赈”的实效。
|
考点1:“加力扩围”应译为“to strengthen efforts and expand the scope”,“加力”指加大力度,“扩围”指扩大范围。
考点2:“中央政治局”应译为“Political Bureau of the Central Committee of the CPC ”,中国特有的政府机构名称。
考点3:“逆周期调节”应译为“counter-cyclical adjustment ”,中国特色表达。
考点4:“可感可及”中的“可及”应译为“accessibility”。
考点5:“小而美”应译为“small yet smart”,不可译为“small but beautiful”。
考点6:“加力扩围提标”中的“提标”应译为“raising standards”,不可译为“upgrade”
考点7:“摸底”应译为“preliminary survey”。
考点8:“乡镇政府+村级合作社+群众”译文需避免保留“+”,建议把“+”意译为“connecting / linking... with / collaboration between”这种能体现出协作关系的表达
|
de876
|
新闻资讯
|
新闻报道
|
49
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
《烬琉璃》
第一幕:琉璃碎
【场景 1:鎏金夜宴】
水晶吊灯的光斑洒在宴会厅,镜头定格在苏璃身上。她身着绯红琉璃裙,银剪修剪缎带,金粉滑落。屏风阴影里,林浩将文件塞进白薇薇的墨绿色手袋,文件封面透出 “核心工艺图谱”。苏璃腰间刻着 “璃” 字的琉璃佩轻晃,林浩手表秒针停在 10:17—— 与工作室监控切断时间吻合。
【场景 2:骤雨破局】
暴雨夜,苏璃冲进工作室,设计台散落撕碎的草图,中央是断裂的琉璃佩,断面嵌着半颗珍珠。投影幕布播放监控:林浩用万能钥匙开门,白薇薇拷贝硬盘,两人碰掉琉璃佩。
蒙太奇镜头:
苏璃捧起断佩,指腹划过刻痕,血珠染红碎片。
财经新闻字幕闪烁:“苏氏工艺破产”“核心技术被收购”。
垃圾桶里,绯红琉璃裙揉成一团,金线凤凰如滴血残羽。
第二幕:淬火录
【场景 1:废窑重生】
三年后,废弃窑厂内,苏璃将碎琉璃投入熔炉,火苗映红手臂疤痕。她夹起通红琉璃浸入冷水,裂纹成荆棘图案。左侧屏幕中,林浩展示 “涅槃系列”,设计与苏璃草稿一致;右侧工作台上,她将荆棘琉璃嵌入钛金属框架,底座刻 “烬” 字。
【场景 2:暗棋落子】
国际设计周后台,白薇薇试戴缺左翅的凤凰项链。苏璃混在工人中,穿 “暗夜琉璃” 工服,袖口露红绳 —— 当年裙摆丝线。她将微型芯片贴在展台雕花里。
第三幕:烬凤鸣
【场景 1:展台惊雷】
聚光灯下,白薇薇走秀时,背景屏切换影像:
林浩与境外买家交割文件,桌上放着苏璃的断佩。
白薇薇用 PS 篡改设计时间戳,屏保是苏璃获奖照。
苏璃将刻有 “苏氏工艺” 的琉璃碎片熔入新作。
白薇薇胸前吊坠缺翅处透出仿琉璃气泡。苏璃身着熔岩石色工装走出,举起钛合金框架 —— 内嵌重生凤凰,左翅琉璃剔透,右翅钛金属冷冽,裂纹如火焰纹路。
【场景 2:琉璃新生】
半年后,公益工坊内,苏璃教孩子用碎琉璃拼凤凰壁画,每片羽毛刻捐赠者名字。她围裙口袋露出国际工艺保护协会邀请函,落款正是夺回商标权之日。
【核心意象贯穿】
琉璃佩:从温润到断裂,再到镶嵌于凤凰心脏,隐喻苏璃从天真匠人到遭遇背叛,最终在废墟中重建自我的蜕变。
荆棘与凤凰:荆棘是复仇的锋芒,亦是重生的铠甲;凤凰涅槃则直接呼应 “烬琉璃” 的主题,展现大女主在灰烬中重燃的力量。
色彩叙事:绯红(毁灭)→ 熔岩石色(蛰伏与淬炼)→ 彩虹光(新生),以视觉符号串联起苏璃从低谷到逆袭的情感轨迹,全程无对白却通过道具、场景与动作完成强情节叙事。
|
《烬琉璃》
第一幕:琉璃碎
【场景 1:鎏金夜宴】
水晶吊灯的光斑洒在宴会厅,镜头定格在苏璃身上。她身着绯红琉璃裙,银剪修剪缎带,金粉滑落。屏风阴影里,林浩将文件塞进白薇薇的墨绿色手袋,文件封面透出 “核心工艺图谱”。苏璃腰间刻着 “璃” 字的琉璃佩轻晃,林浩手表秒针停在 10:17—— 与工作室监控切断时间吻合。
【场景 2:骤雨破局】
暴雨夜,苏璃冲进工作室,设计台散落撕碎的草图,中央是断裂的琉璃佩,断面嵌着半颗珍珠。投影幕布播放监控:林浩用万能钥匙开门,白薇薇拷贝硬盘,两人碰掉琉璃佩。
蒙太奇镜头:
苏璃捧起断佩,指腹划过刻痕,血珠染红碎片。
财经新闻字幕闪烁:“苏氏工艺破产”“核心技术被收购”。
垃圾桶里,绯红琉璃裙揉成一团,金线凤凰如滴血残羽。
第二幕:淬火录
【场景 1:废窑重生】
三年后,废弃窑厂内,苏璃将碎琉璃投入熔炉,火苗映红手臂疤痕。她夹起通红琉璃浸入冷水,裂纹成荆棘图案。左侧屏幕中,林浩展示 “涅槃系列”,设计与苏璃草稿一致;右侧工作台上,她将荆棘琉璃嵌入钛金属框架,底座刻 “烬” 字。
【场景 2:暗棋落子】
国际设计周后台,白薇薇试戴缺左翅的凤凰项链。苏璃混在工人中,穿 “暗夜琉璃” 工服,袖口露红绳 —— 当年裙摆丝线。她将微型芯片贴在展台雕花里。
第三幕:烬凤鸣
【场景 1:展台惊雷】
聚光灯下,白薇薇走秀时,背景屏切换影像:
林浩与境外买家交割文件,桌上放着苏璃的断佩。
白薇薇用 PS 篡改设计时间戳,屏保是苏璃获奖照。
苏璃将刻有 “苏氏工艺” 的琉璃碎片熔入新作。
白薇薇胸前吊坠缺翅处透出仿琉璃气泡。苏璃身着熔岩石色工装走出,举起钛合金框架 —— 内嵌重生凤凰,左翅琉璃剔透,右翅钛金属冷冽,裂纹如火焰纹路。
【场景 2:琉璃新生】
半年后,公益工坊内,苏璃教孩子用碎琉璃拼凤凰壁画,每片羽毛刻捐赠者名字。她围裙口袋露出国际工艺保护协会邀请函,落款正是夺回商标权之日。
【核心意象贯穿】
琉璃佩:从温润到断裂,再到镶嵌于凤凰心脏,隐喻苏璃从天真匠人到遭遇背叛,最终在废墟中重建自我的蜕变。
荆棘与凤凰:荆棘是复仇的锋芒,亦是重生的铠甲;凤凰涅槃则直接呼应 “烬琉璃” 的主题,展现大女主在灰烬中重燃的力量。
色彩叙事:绯红(毁灭)→ 熔岩石色(蛰伏与淬炼)→ 彩虹光(新生),以视觉符号串联起苏璃从低谷到逆袭的情感轨迹,全程无对白却通过道具、场景与动作完成强情节叙事。
|
考点1:“琉璃”推荐译为“liuli (a type of Chinese colored glaze)”或“Chinese colored glaze”,不可直译为“glass”或“crystal”,应保留文化特性
考点2:“绯红琉璃裙”推荐译为“crimson liuli gown”,不可译为“red glass dress”,应保留“绯红”中的东方古典审美
考点3:“断佩”推荐译为“broken pendant”或“fractured talisman”,不可译为“broken necklace”
考点4:“涅槃系列”推荐译为“Nirvana Collection”或“Phoenix Rebirth Series”,不可译为“Rebirth Line”,应保留“涅槃”背后的佛教文化语义
考点5:“荆棘图案”推荐译为“thorn motif”,应呈现“荆棘”象征的苦难与坚韧
考点6:“烬”推荐译为“embers”或“ashes”,应保留其“余烬中的希望”语义
考点7:“暗夜琉璃”推荐译为“Nocturne Liuli”或“Dark Liuli Uniform”
考点8:“裂纹如火焰纹路”推荐译为“cracks resembling flame patterns”
考点9:“金线凤凰如滴血残羽”推荐译为“gold-threaded phoenix resembling a bloodstained feather”,不可译为“gold phoenix like bloody feathers”,避免误解成暴力图像
|
e0e40
|
文学艺术
|
小说
|
26
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
I.THE PRISON DOOR
A throng of bearded men, in sad-coloured garments and grey steeple-crowned hats, intermixed with women, some wearing hoods, and others bareheaded, was assembled in front of a wooden edifice, the door of which was heavily timbered with oak, and studded with iron spikes.
The founders of a new colony, whatever Utopia of human virtue and happiness they might originally project, have invariably recognised it among their earliest practical necessities to allot a portion of the virgin soil as a cemetery, and another portion as the site of a prison. In accordance with this rule it may safely be assumed that the forefathers of Boston had built the first prison-house somewhere in the vicinity of Cornhill, almost as seasonably as they marked out the first burial-ground, on Isaac Johnson’s lot, and round about his grave, which subsequently became the nucleus of all the congregated sepulchres in the old churchyard of King’s Chapel. Certain it is that, some fifteen or twenty years after the settlement of the town, the wooden jail was already marked with weather-stains and other indications of age, which gave a yet darker aspect to its beetle-browed and gloomy front. The rust on the ponderous iron-work of its oaken door looked more antique than anything else in the New World. Like all that pertains to crime, it seemed never to have known a youthful era. Before this ugly edifice, and between it and the wheel-track of the street, was a grass-plot, much overgrown with burdock, pig-weed, apple-pern, and such unsightly vegetation, which evidently found something congenial in the soil that had so early borne the black flower of civilised society, a prison. But on one side of the portal, and rooted almost at the threshold, was a wild rose-bush, covered, in this month of June, with its delicate gems, which might be imagined to offer their fragrance and fragile beauty to the prisoner as he went in, and to the condemned criminal as he came forth to his doom, in token that the deep heart of Nature could pity and be kind to him.
This rose-bush, by a strange chance, has been kept alive in history; but whether it had merely survived out of the stern old wilderness, so long after the fall of the gigantic pines and oaks that originally overshadowed it, or whether, as there is fair authority for believing, it had sprung up under the footsteps of the sainted Ann Hutchinson as she entered the prison-door, we shall not take upon us to determine. Finding it so directly on the threshold of our narrative, which is now about to issue from that inauspicious portal, we could hardly do otherwise than pluck one of its flowers, and present it to the reader. It may serve, let us hope, to symbolise some sweet moral blossom that may be found along the track, or relieve the darkening close of a tale of human frailty and sorrow.
II.THE MARKET-PLACE
The grass-plot before the jail, in Prison Lane, on a certain summer morning, not less than two centuries ago, was occupied by a pretty large number of the inhabitants of Boston, all with their eyes intently fastened on the iron-clamped oaken door. Amongst any other population, or at a later period in the history of New England, the grim rigidity that petrified the bearded physiognomies of these good people would have augured some awful business in hand. It could have betokened nothing short of the anticipated execution of some noted culprit, on whom the sentence of a legal tribunal had but confirmed the verdict of public sentiment. But, in that early severity of the Puritan character, an inference of this kind could not so indubitably be drawn. It might be that a sluggish bond-servant, or an undutiful child, whom his parents had given over to the civil authority, was to be corrected at the whipping-post. It might be that an Antinomian, a Quaker, or other heterodox religionist, was to be scourged out of the town, or an idle or vagrant Indian, whom the white man’s firewater had made riotous about the streets, was to be driven with stripes into the shadow of the forest. It might be, too, that a witch, like old Mistress Hibbins, the bitter-tempered widow of the magistrate, was to die upon the gallows. In either case, there was very much the same solemnity of demeanour on the part of the spectators, as befitted a people among whom religion and law were almost identical, and in whose character both were so thoroughly interfused, that the mildest and severest acts of public discipline were alike made venerable and awful. Meagre, indeed, and cold, was the sympathy that a transgressor might look for, from such bystanders, at the scaffold. On the other hand, a penalty which, in our days, would infer a degree of mocking infamy and ridicule, might then be invested with almost as stern a dignity as the punishment of death itself.
It was a circumstance to be noted on the summer morning when our story begins its course, that the women, of whom there were several in the crowd, appeared to take a peculiar interest in whatever penal infliction might be expected to ensue. The age had not so much refinement, that any sense of impropriety restrained the wearers of petticoat and farthingale from stepping forth into the public ways, and wedging their not unsubstantial persons, if occasion were, into the throng nearest to the scaffold at an execution. Morally, as well as materially, there was a coarser fibre in those wives and maidens of old English birth and breeding than in their fair descendants, separated from them by a series of six or seven generations; for, throughout that chain of ancestry, every successive mother had transmitted to her child a fainter bloom, a more delicate and briefer beauty, and a slighter physical frame, if not character of less force and solidity than her own. The women who were now standing about the prison-door stood within less than half a century of the period when the man-like Elizabeth had been the not altogether unsuitable representative of the sex. They were her countrywomen: and the beef and ale of their native land, with a moral diet not a whit more refined, entered largely into their composition. The bright morning sun, therefore, shone on broad shoulders and well-developed busts, and on round and ruddy cheeks, that had ripened in the far-off island, and had hardly yet grown paler or thinner in the atmosphere of New England. There was, moreover, a boldness and rotundity of speech among these matrons, as most of them seemed to be, that would startle us at the present day, whether in respect to its purport or its volume of tone.
|
I.THE PRISON DOOR
A throng of bearded men, in sad-coloured garments and grey steeple-crowned hats, intermixed with women, some wearing hoods, and others bareheaded, was assembled in front of a wooden edifice, the door of which was heavily timbered with oak, and studded with iron spikes.
The founders of a new colony, whatever Utopia of human virtue and happiness they might originally project, have invariably recognised it among their earliest practical necessities to allot a portion of the virgin soil as a cemetery, and another portion as the site of a prison. In accordance with this rule it may safely be assumed that the forefathers of Boston had built the first prison-house somewhere in the vicinity of Cornhill, almost as seasonably as they marked out the first burial-ground, on Isaac Johnson’s lot, and round about his grave, which subsequently became the nucleus of all the congregated sepulchres in the old churchyard of King’s Chapel. Certain it is that, some fifteen or twenty years after the settlement of the town, the wooden jail was already marked with weather-stains and other indications of age, which gave a yet darker aspect to its beetle-browed and gloomy front. The rust on the ponderous iron-work of its oaken door looked more antique than anything else in the New World. Like all that pertains to crime, it seemed never to have known a youthful era. Before this ugly edifice, and between it and the wheel-track of the street, was a grass-plot, much overgrown with burdock, pig-weed, apple-pern, and such unsightly vegetation, which evidently found something congenial in the soil that had so early borne the black flower of civilised society, a prison. But on one side of the portal, and rooted almost at the threshold, was a wild rose-bush, covered, in this month of June, with its delicate gems, which might be imagined to offer their fragrance and fragile beauty to the prisoner as he went in, and to the condemned criminal as he came forth to his doom, in token that the deep heart of Nature could pity and be kind to him.
This rose-bush, by a strange chance, has been kept alive in history; but whether it had merely survived out of the stern old wilderness, so long after the fall of the gigantic pines and oaks that originally overshadowed it, or whether, as there is fair authority for believing, it had sprung up under the footsteps of the sainted Ann Hutchinson as she entered the prison-door, we shall not take upon us to determine. Finding it so directly on the threshold of our narrative, which is now about to issue from that inauspicious portal, we could hardly do otherwise than pluck one of its flowers, and present it to the reader. It may serve, let us hope, to symbolise some sweet moral blossom that may be found along the track, or relieve the darkening close of a tale of human frailty and sorrow.
II.THE MARKET-PLACE
The grass-plot before the jail, in Prison Lane, on a certain summer morning, not less than two centuries ago, was occupied by a pretty large number of the inhabitants of Boston, all with their eyes intently fastened on the iron-clamped oaken door. Amongst any other population, or at a later period in the history of New England, the grim rigidity that petrified the bearded physiognomies of these good people would have augured some awful business in hand. It could have betokened nothing short of the anticipated execution of some noted culprit, on whom the sentence of a legal tribunal had but confirmed the verdict of public sentiment. But, in that early severity of the Puritan character, an inference of this kind could not so indubitably be drawn. It might be that a sluggish bond-servant, or an undutiful child, whom his parents had given over to the civil authority, was to be corrected at the whipping-post. It might be that an Antinomian, a Quaker, or other heterodox religionist, was to be scourged out of the town, or an idle or vagrant Indian, whom the white man’s firewater had made riotous about the streets, was to be driven with stripes into the shadow of the forest. It might be, too, that a witch, like old Mistress Hibbins, the bitter-tempered widow of the magistrate, was to die upon the gallows. In either case, there was very much the same solemnity of demeanour on the part of the spectators, as befitted a people among whom religion and law were almost identical, and in whose character both were so thoroughly interfused, that the mildest and severest acts of public discipline were alike made venerable and awful. Meagre, indeed, and cold, was the sympathy that a transgressor might look for, from such bystanders, at the scaffold. On the other hand, a penalty which, in our days, would infer a degree of mocking infamy and ridicule, might then be invested with almost as stern a dignity as the punishment of death itself.
It was a circumstance to be noted on the summer morning when our story begins its course, that the women, of whom there were several in the crowd, appeared to take a peculiar interest in whatever penal infliction might be expected to ensue. The age had not so much refinement, that any sense of impropriety restrained the wearers of petticoat and farthingale from stepping forth into the public ways, and wedging their not unsubstantial persons, if occasion were, into the throng nearest to the scaffold at an execution. Morally, as well as materially, there was a coarser fibre in those wives and maidens of old English birth and breeding than in their fair descendants, separated from them by a series of six or seven generations; for, throughout that chain of ancestry, every successive mother had transmitted to her child a fainter bloom, a more delicate and briefer beauty, and a slighter physical frame, if not character of less force and solidity than her own. The women who were now standing about the prison-door stood within less than half a century of the period when the man-like Elizabeth had been the not altogether unsuitable representative of the sex. They were her countrywomen: and the beef and ale of their native land, with a moral diet not a whit more refined, entered largely into their composition. The bright morning sun, therefore, shone on broad shoulders and well-developed busts, and on round and ruddy cheeks, that had ripened in the far-off island, and had hardly yet grown paler or thinner in the atmosphere of New England. There was, moreover, a boldness and rotundity of speech among these matrons, as most of them seemed to be, that would startle us at the present day, whether in respect to its purport or its volume of tone.
|
考点1:“sad-coloured garments”应该译为“色泽暗淡的衣服”。
考点2: “steeple-crowned hats”应译为“尖顶高帽”。
考点3:“apple-pern”应当译为“杂草、毒草“之类的衰败意象
考点4: “beetle-browed”应译为“如眉骨般突出的”。
考点5: “unsightly vegetation”应译为“刺眼的植被”。
考点6: “pity and be kind to him”中的“pity”应译为“怜惜”。
考点7: “sainted Ann Hutchinson”应译为“圣人安·哈钦森”。
考点8: “awful business”应译为“肮脏的交易”。
考点9: “Antinomian”应译为“惟信仰论者”。
考点10:“Quaker”应译为“公谊会教徒”。
考点11:“fainter bloom”应译为“更暗淡的容光”。
考点12:“briefer beauty”应译为“更短的花期”。
|
e1b5f
|
文学艺术
|
小说
|
58
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
今年港股IPO尤为火爆,2025年上半年港交所新受理的IPO申请达到168家,远超去年全年。同时赴港上市的企业中不乏宁德时代、恒瑞医药、海天味业等行业龙头,最近挖掘机龙头三一重工的港股IPO也有新进展。
格隆汇获悉,近日,三一重工股份有限公司(简称“三一重工”)境外发行上市备案有新进展。监管要求公司补充说明对控股股东认定结果不一致的原因及认定标准,并就控股股东的认定情况出具明确结论性意见;公司部分募集资金拟用于扩大海外制造能力,说明具体项目情况及项目所在的国别或地区等。
三一重工 (SS:600031)曾于今年5月递表港交所,中信证券为其独家保荐人。作为国内最大的工程机械企业,2024年其收入超783亿元。但在行业周期等影响下,近几年三一重工的收入存在波动,且公司海外营收占比较大,面临关税、贸易保护政策等风险。
近几年三一重工的股价也大幅波动,在2021年达到48.51元/股的高峰后,呈震荡下跌走势,今天下午收盘为19.07元/股,市值超1616亿元。如今工程机械市场情况如何?不妨通过三一重工来一探究竟。
三一重工冲击“A+H”上市,近三年累计派息超70亿
三一重工总部位于北京市昌平区,其历史可追溯至1989年,当时公司创始人梁稳根与唐修国、毛中吾、袁金华共同创立了公司前身涟源市焊接材料厂。
1994年公司在湖南成立,从其前身分立并改组为一家专注于工程机械制造业务的有限责任公司,并于2000年改制为股份有限公司,2003年在上海证券交易所主板上市。
招股书显示,截至2025年5月14日,控股股东集团(包括三一集团、梁稳根、唐修国、向文波、毛中吾、袁金华、易小刚、周福贵及北京三一重机)共同持有三一重工约33.73%股份。
三一重工创始人梁稳根及其子梁在中均担任公司非执行董事。
梁稳根今年68岁,1983年获得中南矿冶学院(现为中南大学)金属材料及热处理工程学士学位,在机械行业拥有超过40年经验。梁稳根自2000年10月起担任三一集团董事,2001年4月起担任三一重机有限公司董事,2016年8月起担任湖南三一工学院股份有限公司董事。
梁在中今年40岁,2006年获得华威大学计算机与管理科学学士学位,并于2014年获得哈佛大学肯尼迪政府学院公共管理硕士学位。梁在中2006年加入公司,曾担任子公司三一汽车制造有限公司制造部调度员,还曾在三一集团财务部担任多个管理职务,并担任过湖南三湘银行股份有限公司董事长。
三一重工董事长向文波今年62岁,1988年获得大连理工大学材料工程学硕士学位,1991年加入公司前身,并于2000年共同创立三一集团,此后在集团担任执行总裁、市场营销部总经理、总经理等多项职务。
副董事长兼总裁俞宏福今年62岁,1984年获得南京建筑工程学院(现南京工业大学)工程机械学士学位,2010年获得中欧国际工商学院工商管理硕士学位。2006年加入集团,先后担任生产管理部主任、小型挖掘机事业部总经理等职务。
值得注意的是,据2024年年度报告,向文波、俞宏福、易小刚等高管均存在减持公司股份的情形。同时,三一重工一边大手笔分红,一边赴港上市募资的行为也备受市场关注。
2022年、2023年、2024年(简称“报告期”),三一重工分别向股东宣派或支付现金股息约38亿元、13.5亿元、18.6亿元,三年累计派息超70亿元。
本次赴港IPO,三一重工拟募资用于进一步发展全球销售及服务网络,以提高全球品牌知名度、市场渗透率和服务效率;增强研发能力;扩大海外制造能力和优化生产效率;营运资金和一般公司用途。
尽管公司募资用途中提到要增强研发能力,但实际上近两年公司的研发人员数量却大幅下降。年报显示,2022年至2024年末,三一重工在职员工数量从约2.6万名降至2.5万名;其中,研发人员从7466 名降至 5867 名,减少近1600人。
|
今年港股IPO尤为火爆,2025年上半年港交所新受理的IPO申请达到168家,远超去年全年。同时赴港上市的企业中不乏宁德时代、恒瑞医药、海天味业等行业龙头,最近挖掘机龙头三一重工的港股IPO也有新进展。
格隆汇获悉,近日,三一重工股份有限公司(简称“三一重工”)境外发行上市备案有新进展。监管要求公司补充说明对控股股东认定结果不一致的原因及认定标准,并就控股股东的认定情况出具明确结论性意见;公司部分募集资金拟用于扩大海外制造能力,说明具体项目情况及项目所在的国别或地区等。
三一重工 (SS:600031)曾于今年5月递表港交所,中信证券为其独家保荐人。作为国内最大的工程机械企业,2024年其收入超783亿元。但在行业周期等影响下,近几年三一重工的收入存在波动,且公司海外营收占比较大,面临关税、贸易保护政策等风险。
近几年三一重工的股价也大幅波动,在2021年达到48.51元/股的高峰后,呈震荡下跌走势,今天下午收盘为19.07元/股,市值超1616亿元。如今工程机械市场情况如何?不妨通过三一重工来一探究竟。
三一重工冲击“A+H”上市,近三年累计派息超70亿
三一重工总部位于北京市昌平区,其历史可追溯至1989年,当时公司创始人梁稳根与唐修国、毛中吾、袁金华共同创立了公司前身涟源市焊接材料厂。
1994年公司在湖南成立,从其前身分立并改组为一家专注于工程机械制造业务的有限责任公司,并于2000年改制为股份有限公司,2003年在上海证券交易所主板上市。
招股书显示,截至2025年5月14日,控股股东集团(包括三一集团、梁稳根、唐修国、向文波、毛中吾、袁金华、易小刚、周福贵及北京三一重机)共同持有三一重工约33.73%股份。
三一重工创始人梁稳根及其子梁在中均担任公司非执行董事。
梁稳根今年68岁,1983年获得中南矿冶学院(现为中南大学)金属材料及热处理工程学士学位,在机械行业拥有超过40年经验。梁稳根自2000年10月起担任三一集团董事,2001年4月起担任三一重机有限公司董事,2016年8月起担任湖南三一工学院股份有限公司董事。
梁在中今年40岁,2006年获得华威大学计算机与管理科学学士学位,并于2014年获得哈佛大学肯尼迪政府学院公共管理硕士学位。梁在中2006年加入公司,曾担任子公司三一汽车制造有限公司制造部调度员,还曾在三一集团财务部担任多个管理职务,并担任过湖南三湘银行股份有限公司董事长。
三一重工董事长向文波今年62岁,1988年获得大连理工大学材料工程学硕士学位,1991年加入公司前身,并于2000年共同创立三一集团,此后在集团担任执行总裁、市场营销部总经理、总经理等多项职务。
副董事长兼总裁俞宏福今年62岁,1984年获得南京建筑工程学院(现南京工业大学)工程机械学士学位,2010年获得中欧国际工商学院工商管理硕士学位。2006年加入集团,先后担任生产管理部主任、小型挖掘机事业部总经理等职务。
值得注意的是,据2024年年度报告,向文波、俞宏福、易小刚等高管均存在减持公司股份的情形。同时,三一重工一边大手笔分红,一边赴港上市募资的行为也备受市场关注。
2022年、2023年、2024年(简称“报告期”),三一重工分别向股东宣派或支付现金股息约38亿元、13.5亿元、18.6亿元,三年累计派息超70亿元。
本次赴港IPO,三一重工拟募资用于进一步发展全球销售及服务网络,以提高全球品牌知名度、市场渗透率和服务效率;增强研发能力;扩大海外制造能力和优化生产效率;营运资金和一般公司用途。
尽管公司募资用途中提到要增强研发能力,但实际上近两年公司的研发人员数量却大幅下降。年报显示,2022年至2024年末,三一重工在职员工数量从约2.6万名降至2.5万名;其中,研发人员从7466 名降至 5867 名,减少近1600人。
|
考点1: "海天味业"应译为“ Foshan Haitian Flavouring and Food Company Ltd.”
考点2:"一探究竟"应译为“figure out”
考点3: “三一重工”应译为“SANY Heavy Industry”
考点4: “恒瑞医药”应译为“Hengrui Pharmaceuticals”
考点5:“湖南三一工学院”应译为“Hunan SANY Industrial Vocational and Technical College”
考点6: “哈佛大学肯尼迪政府学院”应译为“John F.Kennedy School of Government”,简称“Harvard Kennedy School”,缩写HKS;
考点7:“南京工业大学”应译为“Nanjing Tech University”
|
e303f
|
新闻资讯
|
新闻报道
|
64
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
The popularity of short drama videos is a common expectation of content, platform, and user sides
- The plot is short and compact, with a strong sense of rhythm. There are many exciting and turning points every minute, and the scene and interaction are excellent.
- Short drama content is high-quality PGC content for the platform recommended by the algorithm, which increases the user’s stay time on the platform, and the platform will support traffic.
- Currently, the global market is blank and has a great sense of freshness.
The popularity of short dramas, the retention demand of platforms, and the blank market overseas will contribute to the vigorous development of the overseas short drama market.
In this article, we will delve into various aspects of short drama content going global, including video making, and show you how to use domestic content and video localization tools to gain traffic overseas. I believe this method will bring you new ideas and elevate your content and fans to a new level. The following is the most comprehensive analysis of short drama production strategies going global. We hope you can become a master as soon as possible!
🔥 The secret of content production of short dramas
By observing more effective short drama accounts, we can see that the account types, content production methods, and publishing rules of “Overseas Short Drama” are very effective and replicable. Specifically, find short dramas with explosive plots, operate accounts according to the drama dimension, strengthen localized content production, and maintain a high publishing frequency.
Through this storytelling structure, each short drama account can reach tens of thousands or even hundreds of thousands of subscribers in a few weeks or months. Let’s carefully dismantle each part of the machine fee.
1. Find short dramas with explosive plots
To attract the attention of the audience on TikTok, you need to master the art of popular short videos. The average attention span used on platforms such as TikTok is only 1–4 seconds, so it becomes more challenging to stand out. The first rule of going global with short dramas is “explosive plot”. To attract your audience and get the viewing time you need, you must start with “content explosion”. Reelshort short dramas with hundreds of thousands of fans have similar strategies.
1. What is an explosive plot?
Generally speaking, dramas that combine popular elements such as revenge, time travel, sadomasochism, and sweet pets will become popular if there are also pornographic or violent ones. These plots vary from region to region. For example, female short dramas with love as the main theme are common in various regions. Specifically, in Europe and America, the male protagonists are mostly CEOs, heirs of wealthy families, powerful alphas, werewolves, and vampires, while the female protagonists are mostly independent female protagonists who are self-reliant, because female audiences in Europe and America prefer this set, and instead have the complex of crying and sadomasochism to be deleted. Popular themes in South East Asia are mostly scenes of bitter love, mother-in-law and daughter-in-law wars, while Brazil and other South American regions prefer gangsters.
2. Where can I find a short play with an explosive plot?
Chinese mainland’s short drama content has high competitiveness worldwide, and is in a leading position in terms of production level, theme type, and audience. Therefore, if you want to create a short drama account on TikTok, it is a very wise choice to learn about and obtain the latest short dramas from Chinese mainland platforms such as Douyin, Kuaishou, WeChat Channels, and publish them overseas.
When choosing domestic short drama works, the following factors can be considered:
- Theme types: You can choose themes that meet the preferences of overseas audiences, such as romance, comedy, suspense, science fiction, etc.
- Production level: The production level of short dramas should be high, with clear visuals, smooth plots, and natural acting skills of actors.
- Audience: You can choose short dramas with certain popularity, which can more easily attract the attention of overseas users.
By following these guidelines, you can effectively obtain content from the short drama market in the Chinese mainland, successfully publish it to your account on TikTok after being processed by Localization. As for the content posted overseas, we can also see through the screenshots below that they are very attractive, and many users are constantly seeking the next installment: next please, next part, next, next pls …
2. Operate accounts by episode dimension
Operating a TikTok account according to the dimension of the series has many benefits, which are similar to the usual IP character design we create, which can bring high fan conversion and continuous content viewing.
- It can form a stable fan base. TV series have a certain continuity and completeness, and viewers can form a recognition and favorable impression of the account by watching TV series, thus becoming a stable fan base.
- It can improve the stickiness of the account. TV series can generate sustained viewing interest from the audience, thereby increasing the active level and stickiness of the account.
- It can reduce operating costs. Operating accounts according to the TV series set dimension can reduce the workload of operators and reduce operating costs.
It is highly recommended that when TikTok operates an account, publish the content of the short drama neatly and orderly according to the series of the short drama.
3. Strengthen localized content production
Globalization of content must be preceded by localization of content:
1. Cultural adaptability: When choosing short plays, consider their cross-cultural transmissibility. Although some short plays may be very popular in the Chinese mainland, it does not mean that they will be equally popular in other cultural environments. Choose stories that have universal appeal and are easy to understand.
2. Language and subtitles: Considering the TikTok international audience, adding subtitles in English or other languages to the short play will help expand its audience.
3. Music and dubbing: Due to the different music copyright situation in some countries, the same, distributed to TikTok in each country needs to be reconsidered the music copyright and localization dubbing.
Accurate live dubbing is time-consuming and laborious. In addition to hiring someone to do the dubbing separately, it is also necessary to adjust the dubbing, screen, and subtitles in the later stage to achieve alignment of audio and video subtitles. In practice in the industry and most of the TikTok short drama cases we have seen, it is basically composed of “subtitling” + “translating subtitles” + “music”, and live dubbing is relatively rare. Many top short drama companies in the industry use GhostCut automatic subtitling and automatic translation functions are very effective, low-cost, and the lowest cost is only a few cents per minute. The following are the specific subtitling and translation effects.
|
The popularity of short drama videos is a common expectation of content, platform, and user sides
- The plot is short and compact, with a strong sense of rhythm. There are many exciting and turning points every minute, and the scene and interaction are excellent.
- Short drama content is high-quality PGC content for the platform recommended by the algorithm, which increases the user’s stay time on the platform, and the platform will support traffic.
- Currently, the global market is blank and has a great sense of freshness.
The popularity of short dramas, the retention demand of platforms, and the blank market overseas will contribute to the vigorous development of the overseas short drama market.
In this article, we will delve into various aspects of short drama content going global, including video making, and show you how to use domestic content and video localization tools to gain traffic overseas. I believe this method will bring you new ideas and elevate your content and fans to a new level. The following is the most comprehensive analysis of short drama production strategies going global. We hope you can become a master as soon as possible!
🔥 The secret of content production of short dramas
By observing more effective short drama accounts, we can see that the account types, content production methods, and publishing rules of “Overseas Short Drama” are very effective and replicable. Specifically, find short dramas with explosive plots, operate accounts according to the drama dimension, strengthen localized content production, and maintain a high publishing frequency.
Through this storytelling structure, each short drama account can reach tens of thousands or even hundreds of thousands of subscribers in a few weeks or months. Let’s carefully dismantle each part of the machine fee.
1. Find short dramas with explosive plots
To attract the attention of the audience on TikTok, you need to master the art of popular short videos. The average attention span used on platforms such as TikTok is only 1–4 seconds, so it becomes more challenging to stand out. The first rule of going global with short dramas is “explosive plot”. To attract your audience and get the viewing time you need, you must start with “content explosion”. Reelshort short dramas with hundreds of thousands of fans have similar strategies.
1. What is an explosive plot?
Generally speaking, dramas that combine popular elements such as revenge, time travel, sadomasochism, and sweet pets will become popular if there are also pornographic or violent ones. These plots vary from region to region. For example, female short dramas with love as the main theme are common in various regions. Specifically, in Europe and America, the male protagonists are mostly CEOs, heirs of wealthy families, powerful alphas, werewolves, and vampires, while the female protagonists are mostly independent female protagonists who are self-reliant, because female audiences in Europe and America prefer this set, and instead have the complex of crying and sadomasochism to be deleted. Popular themes in South East Asia are mostly scenes of bitter love, mother-in-law and daughter-in-law wars, while Brazil and other South American regions prefer gangsters.
2. Where can I find a short play with an explosive plot?
Chinese mainland’s short drama content has high competitiveness worldwide, and is in a leading position in terms of production level, theme type, and audience. Therefore, if you want to create a short drama account on TikTok, it is a very wise choice to learn about and obtain the latest short dramas from Chinese mainland platforms such as Douyin, Kuaishou, WeChat Channels, and publish them overseas.
When choosing domestic short drama works, the following factors can be considered:
- Theme types: You can choose themes that meet the preferences of overseas audiences, such as romance, comedy, suspense, science fiction, etc.
- Production level: The production level of short dramas should be high, with clear visuals, smooth plots, and natural acting skills of actors.
- Audience: You can choose short dramas with certain popularity, which can more easily attract the attention of overseas users.
By following these guidelines, you can effectively obtain content from the short drama market in the Chinese mainland, successfully publish it to your account on TikTok after being processed by Localization. As for the content posted overseas, we can also see through the screenshots below that they are very attractive, and many users are constantly seeking the next installment: next please, next part, next, next pls …
2. Operate accounts by episode dimension
Operating a TikTok account according to the dimension of the series has many benefits, which are similar to the usual IP character design we create, which can bring high fan conversion and continuous content viewing.
- It can form a stable fan base. TV series have a certain continuity and completeness, and viewers can form a recognition and favorable impression of the account by watching TV series, thus becoming a stable fan base.
- It can improve the stickiness of the account. TV series can generate sustained viewing interest from the audience, thereby increasing the active level and stickiness of the account.
- It can reduce operating costs. Operating accounts according to the TV series set dimension can reduce the workload of operators and reduce operating costs.
It is highly recommended that when TikTok operates an account, publish the content of the short drama neatly and orderly according to the series of the short drama.
3. Strengthen localized content production
Globalization of content must be preceded by localization of content:
1. Cultural adaptability: When choosing short plays, consider their cross-cultural transmissibility. Although some short plays may be very popular in the Chinese mainland, it does not mean that they will be equally popular in other cultural environments. Choose stories that have universal appeal and are easy to understand.
2. Language and subtitles: Considering the TikTok international audience, adding subtitles in English or other languages to the short play will help expand its audience.
3. Music and dubbing: Due to the different music copyright situation in some countries, the same, distributed to TikTok in each country needs to be reconsidered the music copyright and localization dubbing.
Accurate live dubbing is time-consuming and laborious. In addition to hiring someone to do the dubbing separately, it is also necessary to adjust the dubbing, screen, and subtitles in the later stage to achieve alignment of audio and video subtitles. In practice in the industry and most of the TikTok short drama cases we have seen, it is basically composed of “subtitling” + “translating subtitles” + “music”, and live dubbing is relatively rare. Many top short drama companies in the industry use GhostCut automatic subtitling and automatic translation functions are very effective, low-cost, and the lowest cost is only a few cents per minute. The following are the specific subtitling and translation effects.
|
考点1:“PGC content”推荐译为“专业生产内容”,专业术语。
考点2:“a great sense of freshness”不可直译为“很强的新鲜感”,推荐译为“强烈的新奇感”或“极具吸引力的新意”,更符合市场语境和行文语气。
考点3:“elevate your content and fans to a new level”推荐译为“提升内容质量和用户量级”或“实现内容与粉丝的双重跃升”,不可生硬直译为“提升内容和粉丝”。
考点4:“explosive plot”推荐译为“爆款剧情”或“引爆剧情”,不可译为“爆炸性情节”,后者易误导为暴力内容。
考点5:“CEO, heirs of wealthy families, powerful alphas, werewolves, and vampires”必须统译为“霸总、豪门、强势Alpha、狼人、吸血鬼”等流行人设,体现海外市场偏好,避免逐个直译导致割裂。
考点6:“the complex of crying and sadomasochism to be deleted”中的“complex”推荐译为“情结”或“偏好”。
考点7:“bitter love, mother-in-law and daughter-in-law wars”必须译为“虐恋情深、婆媳大战”,属固定题材用语,避免逐字翻译失去语义色彩。
考点8:“content stickiness”推荐译为“内容粘性”或“用户粘性”,属平台运营常用术语,需统一用词。
考点9:“globalization of content must be preceded by localization of content”推荐译为“内容出海需先本地化”,为常见表达结构。
考点10:“cross-cultural transmissibility”推荐译为“跨文化传播力”或“文化适应性”,不可译为“传染性”或“可传播性”。
考点11:“alignment of audio and video subtitles”推荐译为“音画字幕同步”,不可译为“对齐音频和视频字幕”,生硬机械。
考点12:“GhostCut”应保留专有名词形式,后续可加注释“(一款自动字幕与翻译工具)”。
|
e52d0
|
垂类场景
|
互联网
|
20
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
The Secret to Coca-Cola’s Global Marketing Power: Crisp Creativity
As every marketer knows, it’s difficult to keep consumers interested when preferences, attitudes and expectations are always changing. Now imagine juggling all that for over 100 years.
That’s exactly what the Coca-Cola Company has been doing since its start all the way back in 1886. At the time, its bubbly beverage was just five cents a glass and its slogan was “Drink Coca-Cola.”
Nothing wrong with keeping it simple, right?
Maybe not — but the creativity cup wasn’t empty. As business boomed, so did the Coca-Cola slogans, showing off marketing strategies built to sell the mouthwatering customer experience. Here are just a few examples:
- 1905: “Coca-Cola Revives and Sustains”
- 1922: “Thirst Knows No Season”
- 1927: “Pure as Sunlight” and “Around the Corner from Everywhere”
- 1939: “Whoever You Are, Whatever You Do, Wherever You May Be, When You Think of Refreshment Think of Ice Cold Coca‑Cola”
- 1952: “What You Want is a Coke”
- 1979: “Have a Coke and a Smile”
- 1989: “Official Soft Drink of Summer”
- 2009: “Open Happiness”
- 2016: “Taste the Feeling”
See how those slogans change over time? They’re shifting to align with an ever-changing consumer preference — and yet, they’re always positioning the Coca-Cola Company as sunny, cheerful, warm and energetic. A consistent image builds brand identity, but if you want brand loyalty, you need consumers to trust that you’ll stick to your values as the years go by.
And that, dear marketers, is where our story really begins. Because the secret to Coca-Cola’s marketing strategy has never been just one catchy phrase or product strategy; instead, it’s about finding crisp, refreshing ways to tell a decades-old story.
So, how have they managed it?
A Taste of Success: 4 Famous Coca-Cola Marketing Campaigns
As it turns out, my little snow globe was only one marketing channel for the unstoppable Coca-Cola brand. Its campaigns have taken tons of incredible forms throughout the years, including these four favorites:
1. The Coca-Cola Santas
Although Santa Claus has been enjoying the crisp taste of Coca-Cola in holiday ads since the 1920s, he didn’t get his iconic look until 1931. It was all thanks to illustrator Haddon Sundblom, who took inspiration from “‘Twas the Night Before Christmas” to create a warm, friendly character.
Warm and friendly. Sounds a lot like what Coca-Cola was doing with its slogans, right?
Unsurprisingly, it worked. The world fell in love with this iteration of Saint Nick, and Coca-Cola put that “nose like a cherry” on billboards, store displays, calendars and more.
2. Bonus: The Bears
While they might have crossed paths when grabbing a Coke, the iconic polar bears of snow globe fame weren’t actually part of the Santa Claus campaigns. They debuted in 1993 as part of a new technical approach in Coca-Cola’s marketing — including computer animation. The bears were called “fun” and “playful,” representing yet another new interpretation of familiar values.
3. A Brilliant Bottle
I know — bottle design isn’t really digital marketing or content marketing. But stay with me on this one.
In 1912, the Coca-Cola Company realized it didn’t have a significant way to protect its brand identity. It needed packaging it could patent. So, the company asked glass companies to develop a “bottle so distinct that you would recognize it by feel in the dark or lying broken on the ground.”
Why? Lead Coca-Cola attorney Harold Hirsch said it best: “We are not building Coca‑Cola alone for today. We are building Coca‑Cola forever.”
See what I mean about brand positioning and consistency?
By 1915, the company had secured its bottle and its patent. Now, the bottle is part of Coca-Cola’s marketing campaigns, held by Santas and polar bears alike — and it’s a reminder that marketing is about more than words on a screen.
4. Sharing Your Soft Drink
I have mixed feelings about the “Share a Coke” campaign, I really do.
And that’s not because it’s anything short of brilliant. It is. I’ll just never be over the fact that I couldn’t find my name on one of those iconic bottles.
A moment of silence for the Ashlees of the world.
The folks behind the campaign said they built it to talk to the Coca-Cola target audience (minus me) “at eye level,” which is an interesting perspective on matching your marketing tone to your consumers’ expectations. In this case, it was all about a friendly, informal, social approach — one that stuck to the brand’s values and encouraged people to buy and share their favorite soft drink at the same time.
“I’d Like to Buy the World a Coke”
When creative director Bill Backer found himself suffering through a flight delay with his fellow grounded passengers, he realized the once-furious folks were now laughing at their woes over a Coke. He told the rest of his team he’d like to do the same thing for the whole world — but they protested, wondering if it would make more sense to buy the world homes instead.
So they did both.
The “I’d Like to Buy the World a Coke” campaign started as a commercial celebrating the desire to help one another. It turned into a song that helped do that very thing, with the Coca-Cola Company donating $80,000 in royalties to UNICEF.
Years later, Google got into the marketing mix with “Project Re:Brief” — a modernization of the original campaign. This time, people could purchase Coca-Cola products on their smartphones, record messages and send them to strangers all over the world through innovative vending machines.
In many ways, this is a culmination of everything we’ve seen from Coca-Cola. It was the familiar story of warmth and friendliness told in new ways — but it took those values to the next level by turning them into a tangible, interactive customer experience.
Take Inspiration From the Coca-Cola Playbook
Even if you’re more of a Pepsi person, there’s always something to learn from the Coca-Cola brand. From its humble five-cent beginnings to campaigns that change lives (and my own holiday traditions), this company isn’t just in your glass anymore; it’s a major force in the marketing world — and it has a lot to say.
If you’re looking for ways to evolve with changing market dynamics, talk to a shifting consumer base and still maintain the spark that makes your company unique, it might be time to grab a Coke.
|
The Secret to Coca-Cola’s Global Marketing Power: Crisp Creativity
As every marketer knows, it’s difficult to keep consumers interested when preferences, attitudes and expectations are always changing. Now imagine juggling all that for over 100 years.
That’s exactly what the Coca-Cola Company has been doing since its start all the way back in 1886. At the time, its bubbly beverage was just five cents a glass and its slogan was “Drink Coca-Cola.”
Nothing wrong with keeping it simple, right?
Maybe not — but the creativity cup wasn’t empty. As business boomed, so did the Coca-Cola slogans, showing off marketing strategies built to sell the mouthwatering customer experience. Here are just a few examples:
- 1905: “Coca-Cola Revives and Sustains”
- 1922: “Thirst Knows No Season”
- 1927: “Pure as Sunlight” and “Around the Corner from Everywhere”
- 1939: “Whoever You Are, Whatever You Do, Wherever You May Be, When You Think of Refreshment Think of Ice Cold Coca‑Cola”
- 1952: “What You Want is a Coke”
- 1979: “Have a Coke and a Smile”
- 1989: “Official Soft Drink of Summer”
- 2009: “Open Happiness”
- 2016: “Taste the Feeling”
See how those slogans change over time? They’re shifting to align with an ever-changing consumer preference — and yet, they’re always positioning the Coca-Cola Company as sunny, cheerful, warm and energetic. A consistent image builds brand identity, but if you want brand loyalty, you need consumers to trust that you’ll stick to your values as the years go by.
And that, dear marketers, is where our story really begins. Because the secret to Coca-Cola’s marketing strategy has never been just one catchy phrase or product strategy; instead, it’s about finding crisp, refreshing ways to tell a decades-old story.
So, how have they managed it?
A Taste of Success: 4 Famous Coca-Cola Marketing Campaigns
As it turns out, my little snow globe was only one marketing channel for the unstoppable Coca-Cola brand. Its campaigns have taken tons of incredible forms throughout the years, including these four favorites:
1. The Coca-Cola Santas
Although Santa Claus has been enjoying the crisp taste of Coca-Cola in holiday ads since the 1920s, he didn’t get his iconic look until 1931. It was all thanks to illustrator Haddon Sundblom, who took inspiration from “‘Twas the Night Before Christmas” to create a warm, friendly character.
Warm and friendly. Sounds a lot like what Coca-Cola was doing with its slogans, right?
Unsurprisingly, it worked. The world fell in love with this iteration of Saint Nick, and Coca-Cola put that “nose like a cherry” on billboards, store displays, calendars and more.
2. Bonus: The Bears
While they might have crossed paths when grabbing a Coke, the iconic polar bears of snow globe fame weren’t actually part of the Santa Claus campaigns. They debuted in 1993 as part of a new technical approach in Coca-Cola’s marketing — including computer animation. The bears were called “fun” and “playful,” representing yet another new interpretation of familiar values.
3. A Brilliant Bottle
I know — bottle design isn’t really digital marketing or content marketing. But stay with me on this one.
In 1912, the Coca-Cola Company realized it didn’t have a significant way to protect its brand identity. It needed packaging it could patent. So, the company asked glass companies to develop a “bottle so distinct that you would recognize it by feel in the dark or lying broken on the ground.”
Why? Lead Coca-Cola attorney Harold Hirsch said it best: “We are not building Coca‑Cola alone for today. We are building Coca‑Cola forever.”
See what I mean about brand positioning and consistency?
By 1915, the company had secured its bottle and its patent. Now, the bottle is part of Coca-Cola’s marketing campaigns, held by Santas and polar bears alike — and it’s a reminder that marketing is about more than words on a screen.
4. Sharing Your Soft Drink
I have mixed feelings about the “Share a Coke” campaign, I really do.
And that’s not because it’s anything short of brilliant. It is. I’ll just never be over the fact that I couldn’t find my name on one of those iconic bottles.
A moment of silence for the Ashlees of the world.
The folks behind the campaign said they built it to talk to the Coca-Cola target audience (minus me) “at eye level,” which is an interesting perspective on matching your marketing tone to your consumers’ expectations. In this case, it was all about a friendly, informal, social approach — one that stuck to the brand’s values and encouraged people to buy and share their favorite soft drink at the same time.
“I’d Like to Buy the World a Coke”
When creative director Bill Backer found himself suffering through a flight delay with his fellow grounded passengers, he realized the once-furious folks were now laughing at their woes over a Coke. He told the rest of his team he’d like to do the same thing for the whole world — but they protested, wondering if it would make more sense to buy the world homes instead.
So they did both.
The “I’d Like to Buy the World a Coke” campaign started as a commercial celebrating the desire to help one another. It turned into a song that helped do that very thing, with the Coca-Cola Company donating $80,000 in royalties to UNICEF.
Years later, Google got into the marketing mix with “Project Re:Brief” — a modernization of the original campaign. This time, people could purchase Coca-Cola products on their smartphones, record messages and send them to strangers all over the world through innovative vending machines.
In many ways, this is a culmination of everything we’ve seen from Coca-Cola. It was the familiar story of warmth and friendliness told in new ways — but it took those values to the next level by turning them into a tangible, interactive customer experience.
Take Inspiration From the Coca-Cola Playbook
Even if you’re more of a Pepsi person, there’s always something to learn from the Coca-Cola brand. From its humble five-cent beginnings to campaigns that change lives (and my own holiday traditions), this company isn’t just in your glass anymore; it’s a major force in the marketing world — and it has a lot to say.
If you’re looking for ways to evolve with changing market dynamics, talk to a shifting consumer base and still maintain the spark that makes your company unique, it might be time to grab a Coke.
|
考点1:“Crisp Creativity”应译为“鲜活爽脆的创意/让创意保持鲜活”。
考点2:”the creativity cup wasn’t empty”采用了隐喻的手法,推荐译为“创意的源泉并未枯竭”。
考点3:”brand identity”是市场营销中的核心术语,区别于brand image(品牌形象),指品牌希望在消费者心中建立的形象和认知,应该译为“品牌识别”。
考点4:”Pepsi person”推荐译为“百事粉”。
考点5:“crossed paths”需结合语境理解,推荐译为“曾(在广告中)同框出现”。
考点6:”at eye level”应译为“以平等的姿态”。
考点7:‘’A Brilliant Bottle”应译为“ 绝妙的瓶身设计”
|
e552c
|
垂类场景
|
广告营销
|
32
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
在高地温与动水扰动共同作用的岩体注浆过程中,浆液的扩散行为不仅受控于材料本身的流变特性,还与围岩孔隙结构、渗流状态和热-流-固耦合过程密切相关。由于注浆区位于高温水循环发育带,地层中含水层与微裂隙网络交错分布,在高温梯度与高水压联合驱动下,浆液的流动呈现非线性穿透与波动扩散特征,明显不同于常温条件下的达西型渗流模式。
注浆材料方面,传统水泥基材料在高温环境下易出现早凝、抗冲散性下降及与围岩界面结合力弱化等问题,难以满足热扰动隧洞或深部裂隙封堵的工程需求。近年来,基于硫铝酸盐水泥(CSA)与地聚物的复合体系显示出在高地温注浆工程中的潜在优势,表现为良好的热稳定性、低黏度下的快速凝结能力及优异的抗冲散性。试验结果表明,随着环境温度升高至90℃以上,CSA-地聚物复合浆液在剪切速率超过50 s⁻¹后仍保持适度的塑性流动性,其初始凝结时间控制在15分钟以内,而在动水条件下的抗分散半径显著小于普通水泥浆液。
从反应机制角度分析,CSA-地聚物复合注浆材料的强度来源主要包括三种路径:(1)CSA组分在高温水环境中快速水化,形成大量的钙矾石(ettringite)与铝酸钙水合物(C-A-H);(2)地聚物体系在激发剂(如氢氧化钠、硅酸钠)作用下发生溶出-聚合反应,生成以N-A-S-H为主的凝胶相,并在高温作用下形成三维交联结构;(3)二者之间发生协同水化或共聚反应,形成含钠-钙-铝硅四元复合胶体,提升浆体的致密性与热稳定性。
尤其在高地温条件下,硅铝源溶解速率明显加快,有助于早期强度形成;同时,水化放热过程的热峰前移、强度增长速率提升,需特别控制反应速率与放热曲线,避免浆体快速失水导致开裂。测试表明,浆液在90℃热浴中养护6小时后,其等效28天抗压强度可达到常温下养护3天的水平。
在材料-环境交互过程中,浆液与高温水体接触会导致体系内自由水加速逸散、浆体离子浓度快速变化,进而影响凝胶结构的形成与空间网络的构建。这一过程中的界面演化表现为:早期形成的钙矾石与水铝石类水化产物在高温下易产生相变或晶型重构,从而影响浆岩界面层的致密度和剪切结合力。此外,高温环境还促进离子迁移速率,造成溶胶-凝胶相转化区的边界模糊,进而影响后期浆体力学性能的均质性。
注浆体在固化过程中的热传导行为也是决定其最终工程性能的关键因素之一。实际观测发现,CSA-地聚物浆体的导热系数在40–120℃区间呈非线性变化趋势,主要受其孔隙结构、毛细水蒸发速率以及水化产物热物性差异影响。微观分析显示,随着高温作用时间延长,浆体内部出现明显的微裂隙重构现象,导致热响应不均并产生局部热应力集中,可能引发注浆区的局部失稳。
从界面破坏试验来看,高温-动水复合作用下,浆岩结合面表现出明显的黏聚力退化与界面粗糙度劣化趋势,破坏模式逐步由剪切黏结转向界面滑移。多轴加载试验进一步揭示,在不同温度梯度与水流剪切应力耦合作用下,浆体层内发生黏弹性-塑性转变,其应力-应变关系不再线性,需引入变形时效与温度响应项进行多参数修正。
为提升注浆体在复杂环境下的适应性,一种新型多尺度增强方法被提出,采用纳米硅灰、聚乙烯醇纤维与碳纳米管协同掺杂策略,可显著提升浆体的抗冲散临界流速、界面黏结强度及后期干湿循环下的体积稳定性。该体系在高温循环20次后仍保持超过85%的未扰动抗压强度,并在模拟动水渗透试验中表现出低于10⁻⁷ cm/s的长期渗透系数,有效满足封堵型注浆工程的稳定性要求。
为了系统评估注浆材料在热-水-应力条件下的适应性与可靠性,需建立多维度测试方法体系。常用测试方法包括但不限于:
流变性能测试:采用旋转流变仪(如HAAKE RheoStress)在不同温度和剪切速率下测定黏度-剪切应力关系曲线,提取屈服应力与表观黏度;
抗冲散性测试:利用动水槽或旋转剪切装置(参考中国工程建设标准CECS 513)模拟不同水流速下的流失行为,测定抗分散起始流速与流失质量比;
界面黏结测试:通过直剪仪或劈拉试验评估浆体与岩体/混凝土界面结合强度,分析剪切滑移段能量释放情况;
微观结构分析:结合XRD、SEM、MIP及CT等方法,揭示浆体水化产物类型、孔隙结构演化及热损伤微裂隙分布;
热性能测试:采用热常数分析仪(如Hot Disk法)测定浆体不同龄期下的导热系数、比热容等参数;
模拟服役试验:构建封闭高温–流动水–应力三维模拟腔,开展长期渗透–温升–剪切循环加载实验,评价材料稳定性和性能劣化趋势。
在服役适应性方面,复合浆体还需满足以下要求:(1)在多次热循环中维持体积稳定性,避免微裂隙扩展或孔隙结构坍塌;(2)在长时间动水冲蚀下保持界面稳定性与渗透性控制;(3)在复杂水化路径影响下依然具备良好的反应完整性与后期强度增长潜力。
特别是在深部隧洞、边坡支护或储能库区等典型高温水域,封堵型注浆材料应体现“快凝–抗流失–稳性能–可调控”的综合特征。材料配方可通过以下策略进一步优化:(1)引入晶种辅助水化,控制初期析晶行为;(2)掺加有机-无机复合缓凝剂调节热促反应速率;(3)通过界面活性剂或功能颗粒强化浆岩界面结合区;(4)优化粒径分布与颗粒级配以提升浆液稳定性与微结构密实度。
此外,服役性能模拟还应考虑注浆体老化行为,如高温下碳酸化、溶解蚀变及界面再析晶等问题。通过长期暴露试验及CT动态跟踪,可揭示材料在复杂服役条件下的失效机制,从而为工程参数选取与配方优化提供科学支撑。
整体来看,高地温动水环境下的注浆材料需综合考虑流变稳定性、界面黏结性、热稳定性与微观结构演化机制,其设计不再仅限于材料物性层面,更应从系统耦合过程、界面相互作用及服役行为预测等多维度进行优化设计。
|
在高地温与动水扰动共同作用的岩体注浆过程中,浆液的扩散行为不仅受控于材料本身的流变特性,还与围岩孔隙结构、渗流状态和热-流-固耦合过程密切相关。由于注浆区位于高温水循环发育带,地层中含水层与微裂隙网络交错分布,在高温梯度与高水压联合驱动下,浆液的流动呈现非线性穿透与波动扩散特征,明显不同于常温条件下的达西型渗流模式。
注浆材料方面,传统水泥基材料在高温环境下易出现早凝、抗冲散性下降及与围岩界面结合力弱化等问题,难以满足热扰动隧洞或深部裂隙封堵的工程需求。近年来,基于硫铝酸盐水泥(CSA)与地聚物的复合体系显示出在高地温注浆工程中的潜在优势,表现为良好的热稳定性、低黏度下的快速凝结能力及优异的抗冲散性。试验结果表明,随着环境温度升高至90℃以上,CSA-地聚物复合浆液在剪切速率超过50 s⁻¹后仍保持适度的塑性流动性,其初始凝结时间控制在15分钟以内,而在动水条件下的抗分散半径显著小于普通水泥浆液。
从反应机制角度分析,CSA-地聚物复合注浆材料的强度来源主要包括三种路径:(1)CSA组分在高温水环境中快速水化,形成大量的钙矾石(ettringite)与铝酸钙水合物(C-A-H);(2)地聚物体系在激发剂(如氢氧化钠、硅酸钠)作用下发生溶出-聚合反应,生成以N-A-S-H为主的凝胶相,并在高温作用下形成三维交联结构;(3)二者之间发生协同水化或共聚反应,形成含钠-钙-铝硅四元复合胶体,提升浆体的致密性与热稳定性。
尤其在高地温条件下,硅铝源溶解速率明显加快,有助于早期强度形成;同时,水化放热过程的热峰前移、强度增长速率提升,需特别控制反应速率与放热曲线,避免浆体快速失水导致开裂。测试表明,浆液在90℃热浴中养护6小时后,其等效28天抗压强度可达到常温下养护3天的水平。
在材料-环境交互过程中,浆液与高温水体接触会导致体系内自由水加速逸散、浆体离子浓度快速变化,进而影响凝胶结构的形成与空间网络的构建。这一过程中的界面演化表现为:早期形成的钙矾石与水铝石类水化产物在高温下易产生相变或晶型重构,从而影响浆岩界面层的致密度和剪切结合力。此外,高温环境还促进离子迁移速率,造成溶胶-凝胶相转化区的边界模糊,进而影响后期浆体力学性能的均质性。
注浆体在固化过程中的热传导行为也是决定其最终工程性能的关键因素之一。实际观测发现,CSA-地聚物浆体的导热系数在40–120℃区间呈非线性变化趋势,主要受其孔隙结构、毛细水蒸发速率以及水化产物热物性差异影响。微观分析显示,随着高温作用时间延长,浆体内部出现明显的微裂隙重构现象,导致热响应不均并产生局部热应力集中,可能引发注浆区的局部失稳。
从界面破坏试验来看,高温-动水复合作用下,浆岩结合面表现出明显的黏聚力退化与界面粗糙度劣化趋势,破坏模式逐步由剪切黏结转向界面滑移。多轴加载试验进一步揭示,在不同温度梯度与水流剪切应力耦合作用下,浆体层内发生黏弹性-塑性转变,其应力-应变关系不再线性,需引入变形时效与温度响应项进行多参数修正。
为提升注浆体在复杂环境下的适应性,一种新型多尺度增强方法被提出,采用纳米硅灰、聚乙烯醇纤维与碳纳米管协同掺杂策略,可显著提升浆体的抗冲散临界流速、界面黏结强度及后期干湿循环下的体积稳定性。该体系在高温循环20次后仍保持超过85%的未扰动抗压强度,并在模拟动水渗透试验中表现出低于10⁻⁷ cm/s的长期渗透系数,有效满足封堵型注浆工程的稳定性要求。
为了系统评估注浆材料在热-水-应力条件下的适应性与可靠性,需建立多维度测试方法体系。常用测试方法包括但不限于:
流变性能测试:采用旋转流变仪(如HAAKE RheoStress)在不同温度和剪切速率下测定黏度-剪切应力关系曲线,提取屈服应力与表观黏度;
抗冲散性测试:利用动水槽或旋转剪切装置(参考中国工程建设标准CECS 513)模拟不同水流速下的流失行为,测定抗分散起始流速与流失质量比;
界面黏结测试:通过直剪仪或劈拉试验评估浆体与岩体/混凝土界面结合强度,分析剪切滑移段能量释放情况;
微观结构分析:结合XRD、SEM、MIP及CT等方法,揭示浆体水化产物类型、孔隙结构演化及热损伤微裂隙分布;
热性能测试:采用热常数分析仪(如Hot Disk法)测定浆体不同龄期下的导热系数、比热容等参数;
模拟服役试验:构建封闭高温–流动水–应力三维模拟腔,开展长期渗透–温升–剪切循环加载实验,评价材料稳定性和性能劣化趋势。
在服役适应性方面,复合浆体还需满足以下要求:(1)在多次热循环中维持体积稳定性,避免微裂隙扩展或孔隙结构坍塌;(2)在长时间动水冲蚀下保持界面稳定性与渗透性控制;(3)在复杂水化路径影响下依然具备良好的反应完整性与后期强度增长潜力。
特别是在深部隧洞、边坡支护或储能库区等典型高温水域,封堵型注浆材料应体现“快凝–抗流失–稳性能–可调控”的综合特征。材料配方可通过以下策略进一步优化:(1)引入晶种辅助水化,控制初期析晶行为;(2)掺加有机-无机复合缓凝剂调节热促反应速率;(3)通过界面活性剂或功能颗粒强化浆岩界面结合区;(4)优化粒径分布与颗粒级配以提升浆液稳定性与微结构密实度。
此外,服役性能模拟还应考虑注浆体老化行为,如高温下碳酸化、溶解蚀变及界面再析晶等问题。通过长期暴露试验及CT动态跟踪,可揭示材料在复杂服役条件下的失效机制,从而为工程参数选取与配方优化提供科学支撑。
整体来看,高地温动水环境下的注浆材料需综合考虑流变稳定性、界面黏结性、热稳定性与微观结构演化机制,其设计不再仅限于材料物性层面,更应从系统耦合过程、界面相互作用及服役行为预测等多维度进行优化设计。
|
考点1:“热-流-固耦合过程” 应该翻译为 “thermal–hydraulic–mechanical (THM) coupling process”或者“thermo-hydro-mechanical (THM) coupling process””
考点2:“热峰” 只能翻译为 “thermal peak ”或“exothermic peak”,不能翻译为“heat peak”,因为这表示的是热能外放的过程,译文二者取其一即可,保持译文一致性
考点3:“系统耦合过程” 应该翻译为 “thermal–hydraulic–mechanical coupling process” 或 “thermo-hydro-mechanical coupling process”,因为这是对前文的一个总结性说法,应该还原成原本含义。
|
e5656
|
学术论文
|
自然科学
|
157
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
三、地方高校“新工科专业建设的经验——以浙江为例
这一轮“新工科”建设,为地方院校整合教育资源、加强特色办学和提高办学质量提供了机遇。如浙江省教育厅真正落实了“新工科”背景下的产业需求导向,开辟了政产学研合作协同育人的建设途径,全面推进了新时代浙江省高校工科教育改革及创新,为全国“新工科”建设提供了浙江样本和浙江元素。
“浙八味”是一个中医药领域的概念,是指白术、白芍、浙贝母、杭白菊、元胡、玄参、笕麦冬、温郁金等八味浙江地区出产的中药材。2017年6月1日,浙江省本科高校专业认证暨新工科建设研讨会上发布了《浙江省新工科建设行动八条方案》(以下简称“新浙八味”),包括建设行业特色学院、建设工科优势特色专业、建设工科核心课程和通识课程、实施工科院系与行业企业人员互聘“双千计划”、实施产学合作协同育人项目、建设一批协同创新中心、建设一批大学生学科竞赛品牌、培育若干新工科建设示范点等八条指导性的政策目标。“新浙八味”的提出,为浙江省高校的“新工科”建设提供了行动指南。三年来,不少浙江高校已在“新工科”专业建设和人才培养方面取得了宝贵的实践经验。
1.z大学:以学科交叉为特色,开设“新工科”课程群 z大学是浙江省的一所重点综合性大学,在传统工科专业上具有深厚的历史积累,其“新工科”建设对于浙江省高校具有示范作用。Z大学以美国斯坦福大学为学习对象,斯坦福和硅谷的关系与Z大学和杭州的关系较为相似,Z大学也提出“新工科”专业建设要与杭州和浙江的发展相结合,相得益彰。陆国栋(2017)介绍过z大学在新工科建设方面的五大探索,包括3个双学位班、贯通本研的工程师学院、激发师生激情的学生评价模式改革以及校企协同的“千生计划”等。
在专业建设方面,z大学根据新时代科技发展的最新趋势,创新“新工科”建设的理念,以学科交叉为特色,开创了“机器人+人工智能”“金融+数学”“计算机+大数据”等三个双学位班。自2016年以后,已招收本科生300多人,培养模式得到学生、家长、企业和专家的高度认同。在新专业开设上,Z大学比较谨慎,但在开设新课程上却是步伐很大。例如,该校的计算机学院开始上区块链、大数据、物联网的课程,但并非独立设置专业,而是通过加强新课程,让学生受到更多的训练。Z大学接下来计划开设区块链、大数据、云计算、人工智能等一大批课程群,能够把本科和研究生打通。同时,也会发挥各工科类学院和产业界结合的优势,邀请一批优秀的产业界专家来校授课。
2.H大学:围绕核心优势,开设复合型“新工科”专业 H大学是浙江省一所以电子科技为特色的省属重点大学。该校申报的《浙江省地方高校多学科交叉的复合型新工科专业建设与实践》为教育部发布的612个首批“新工科”研究与实践项目之一。面对以“互联网+”为主导的新兴信息产业转型,而H大学工科专业里70%的专业与产业相关, 因此“新工科”专业建设既是机遇也是挑战。面对传统IT专业升级换代、传统工科专业智能化、非工科专业信息化等三大问题,H大学着力强化IT专业的特色。首先,H大学考虑在未来两年内,计划要停招11个本科专业,其中,包括信息工程等。由于H大学在IT领域里专业很多,有些专业名称很相似,例如,电子科学与技术、电子信息科学与技术、电子信息工程,在实际人才培养过程中定位并不是很清晰,因此有必要进行裁撤或合并。其次,高校现在面向的很多行业需求单靠一个学科是无法满足的,所以H大学现在申请的“新工科”专业都是复合型专业。H大学正在升级尝试的一个复合型专业是“会计+计算机”,也叫“云会计”,培养的“云会计”人才只需要面对用户、根据需求设计财务规则即可,能够优化传统的财务人员工作流程和提升工作效率。除了“云会计”以外,H大学还新开设了智能科学与技术专业,该专业主要的应用领域是机器人,这个专业仅靠H大学自动化学院无法办成,因此H大学成立了交叉教学组织,可以通过这个组织吸引计算机、电子、机械等多个学院来为智能科学与技术专业的发展提供资源支撑。
|
三、地方高校“新工科专业建设的经验——以浙江为例
这一轮“新工科”建设,为地方院校整合教育资源、加强特色办学和提高办学质量提供了机遇。如浙江省教育厅真正落实了“新工科”背景下的产业需求导向,开辟了政产学研合作协同育人的建设途径,全面推进了新时代浙江省高校工科教育改革及创新,为全国“新工科”建设提供了浙江样本和浙江元素。
“浙八味”是一个中医药领域的概念,是指白术、白芍、浙贝母、杭白菊、元胡、玄参、笕麦冬、温郁金等八味浙江地区出产的中药材。2017年6月1日,浙江省本科高校专业认证暨新工科建设研讨会上发布了《浙江省新工科建设行动八条方案》(以下简称“新浙八味”),包括建设行业特色学院、建设工科优势特色专业、建设工科核心课程和通识课程、实施工科院系与行业企业人员互聘“双千计划”、实施产学合作协同育人项目、建设一批协同创新中心、建设一批大学生学科竞赛品牌、培育若干新工科建设示范点等八条指导性的政策目标。“新浙八味”的提出,为浙江省高校的“新工科”建设提供了行动指南。三年来,不少浙江高校已在“新工科”专业建设和人才培养方面取得了宝贵的实践经验。
1.z大学:以学科交叉为特色,开设“新工科”课程群 z大学是浙江省的一所重点综合性大学,在传统工科专业上具有深厚的历史积累,其“新工科”建设对于浙江省高校具有示范作用。Z大学以美国斯坦福大学为学习对象,斯坦福和硅谷的关系与Z大学和杭州的关系较为相似,Z大学也提出“新工科”专业建设要与杭州和浙江的发展相结合,相得益彰。陆国栋(2017)介绍过z大学在新工科建设方面的五大探索,包括3个双学位班、贯通本研的工程师学院、激发师生激情的学生评价模式改革以及校企协同的“千生计划”等。
在专业建设方面,z大学根据新时代科技发展的最新趋势,创新“新工科”建设的理念,以学科交叉为特色,开创了“机器人+人工智能”“金融+数学”“计算机+大数据”等三个双学位班。自2016年以后,已招收本科生300多人,培养模式得到学生、家长、企业和专家的高度认同。在新专业开设上,Z大学比较谨慎,但在开设新课程上却是步伐很大。例如,该校的计算机学院开始上区块链、大数据、物联网的课程,但并非独立设置专业,而是通过加强新课程,让学生受到更多的训练。Z大学接下来计划开设区块链、大数据、云计算、人工智能等一大批课程群,能够把本科和研究生打通。同时,也会发挥各工科类学院和产业界结合的优势,邀请一批优秀的产业界专家来校授课。
2.H大学:围绕核心优势,开设复合型“新工科”专业 H大学是浙江省一所以电子科技为特色的省属重点大学。该校申报的《浙江省地方高校多学科交叉的复合型新工科专业建设与实践》为教育部发布的612个首批“新工科”研究与实践项目之一。面对以“互联网+”为主导的新兴信息产业转型,而H大学工科专业里70%的专业与产业相关, 因此“新工科”专业建设既是机遇也是挑战。面对传统IT专业升级换代、传统工科专业智能化、非工科专业信息化等三大问题,H大学着力强化IT专业的特色。首先,H大学考虑在未来两年内,计划要停招11个本科专业,其中,包括信息工程等。由于H大学在IT领域里专业很多,有些专业名称很相似,例如,电子科学与技术、电子信息科学与技术、电子信息工程,在实际人才培养过程中定位并不是很清晰,因此有必要进行裁撤或合并。其次,高校现在面向的很多行业需求单靠一个学科是无法满足的,所以H大学现在申请的“新工科”专业都是复合型专业。H大学正在升级尝试的一个复合型专业是“会计+计算机”,也叫“云会计”,培养的“云会计”人才只需要面对用户、根据需求设计财务规则即可,能够优化传统的财务人员工作流程和提升工作效率。除了“云会计”以外,H大学还新开设了智能科学与技术专业,该专业主要的应用领域是机器人,这个专业仅靠H大学自动化学院无法办成,因此H大学成立了交叉教学组织,可以通过这个组织吸引计算机、电子、机械等多个学院来为智能科学与技术专业的发展提供资源支撑。
|
考点 1:"新工科" 应译为 "emerging engineering disciplines"
考点 2:"地方高校" 应译为 "local universities"
考点 3:"政产学研合作协同育人" 应译为 "government-industry-academia-research collaborative education"
考点 4:"浙八味" 应译为 "Eight Zhejiang Flavors"
考点 5:"浙江省本科高校专业认证暨新工科建设研讨会" 应译为 "Zhejiang Undergraduate Program Accreditation and Emerging Engineering Disciplines Construction Seminar"
考点 6:"浙江省新工科建设行动八条方案" 应译为 "Eight-Point Action Plan for Zhejiang Emerging Engineering Disciplines Construction"
考点 7:"新浙八味" 应译为 "New Eight Zhejiang Flavors"
考点 8:"行业特色学院" 应译为 "industry-specific colleges"
考点 9:"工科优势特色专业" 应译为 "advantageous engineering programs"
考点 10:"工科核心课程" 应译为 "core engineering courses"
考点 11:"双千计划" 应译为 "Dual Thousand Talents Program"
考点 12:"产学合作协同育人项目" 应译为 "industry-academia collaborative education projects"
考点 13:"协同创新中心" 应译为 "collaborative innovation centers"
考点 13:"大学生学科竞赛品牌" 应译为 "student discipline competition brands"
考点 14:"新工科建设示范点" 应译为 "demonstration sites for emerging engineering disciplines"
考点 15:"Z 大学" 应译为 "Z University"
考点 16:"工程师学院" 应译为 "School of Engineering"
考点 17:"复合型专业" 应译为 "compound/interdisciplinary programs"
|
e71e7
|
学术论文
|
社会科学
|
83
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
病因
心肌血流量减少而使心肌缺氧是心绞痛的主要病因,导致心肌血流减少的最常见原因是冠状动脉疾病。
发病原因
血液中的脂质成分沉积在冠状动脉血管壁上,形成动脉粥样硬化斑块,是导致动脉管腔狭窄、心肌供血供氧不足是心绞痛的主要病因。
诱发因素
稳定型心绞痛
稳定型心绞痛通常由体力劳动引发。在爬楼梯,运动或走路时,心脏需要更多血液,而血管动脉粥样硬化变窄时,心肌无法获得足够的血液,因此发生心绞痛。除了身体活动外,其他因素如情绪波动、寒冷和暴饮暴食等也会使心率增快,心肌耗氧增多,引发心绞痛。
不稳定型心绞痛
大多数没有明显诱因,即使在休息时也可发生。少部分有诱因,如感染、甲亢等导致心肌耗氧量增加,低血压导致冠状动脉血流量减少,贫血和低氧血症导致血液携氧能力下降。
变异型心绞痛
由冠状动脉痉挛引起的,表现为冠状动脉暂时性变窄,从而减少心脏血流量,导致胸痛。吸烟、喝酒和吸毒均为重要诱发因素。
症状
心绞痛以发作性疼痛为主要临床表现,多表现为胸部压榨性疼痛,主要位于胸骨后,可放射至心前区、上肢、下颌咽喉部,也有些患者仅表现为胸闷。
典型症状
加拿大心血管病学会(CCS)把心绞痛严重度分为四级。
Ⅰ级:一般体力活动(如步行和登楼)不受限,仅在强、快或持续用力时发生心绞痛。
Ⅱ级:一般体力活动轻度受限。快步、饭后、寒冷、精神刺激或醒后数小时内发生心绞痛。一般情况下平地步行200m以上或登楼一层以上受限。
Ⅲ级:一般体力活动明显受限,一般情况下平地步行200m内或登楼一层引起心绞痛。
Ⅳ级:轻微活动或休息时即可发生心绞痛。
根据不同的疾病类型又表现出不同的疾病症状。
稳定型心绞痛
患者常在体力活动或情绪激动时,出现压迫、发闷或紧缩性胸痛,主要在胸骨后,可波及整个心前区,可伴烧灼感,持续数分钟,休息或舌下含服硝酸甘油等硝酸酯类药物后能在几分钟内缓解。
不稳定型心绞痛
患者胸部不适的部位及性质与稳定型心绞痛相似,但通常程度更重,持续时间更长,可达半小时至一小时,胸痛可在安静或睡眠中发生,休息或舌下含服硝酸甘油后症状缓解不明显。
变异型心绞痛
主要表现为安静状态下的心前区疼痛,无活动或情绪激动等诱因,可伴心律失常及晕厥。
伴随症状
发作时可伴有胸闷、出汗、恶心、呕吐、心悸或呼吸困难等症状。
就医
对于疑似心绞痛发作的患者,如果症状持续几分钟不缓解,在休息或舌下含服硝酸甘油后疼痛也不消失,应立即拨打急救电话寻求帮助。除非救护车无法到达,否则不要自行驾车前往医院。等待救护车到来期间采取卧位或半卧位休息。
医生可根据患者病史、体格检查、心电图、超声心动图、CT等相关检查,对患者病情初步判断,并制定相关的治疗方案。
发作典型者:根据发作特点和体征,结合年龄和高危因素,在排除其他原因所致的心绞痛后,一般即可确诊。心电图无改变的患者可考虑做运动负荷试验。
发作不典型者:要观察硝酸甘油的疗效和发作时心电图的改变进行诊断。如仍不能确诊,可多次复查心电图、心电图负荷试验或24小时动态心电图连续监测,如心电图出现阳性变化或负荷试验诱发心绞痛时亦可确诊。
就诊科室
急诊科、胸痛门诊(中心)、心内科、心外科。
相关检查
心电图检查
心电图是诊断心肌缺血的最常用的无创性检查,静息时心电图在正常范围内的患者,不能排除心肌缺血,可考虑进行动态心电图记录和(或)运动负荷试验。
心电图负荷试验
亦称心电图运动负荷试验,是通过一定量的运动增加心脏负荷,观察心电图变化以及有无心绞痛发作。运动方式主要有迎着转动的平板就地踏步和踏车。
心电图连续动态监测
连续记录24小时或更长时间心电活动的全过程,包括休息、活动、进餐、工作、学习和睡眠等不同情况下的心电图资料。
超声心动图
医生可以根据超声心动图来发现与心绞痛相关的问题,包括心肌区域是否因长时间缺血而受损。
胸部X光片
该检查拍摄心脏和肺部的图像。这是为了寻找可能解释心绞痛症状的其他原因,并检查是否有扩大的心脏和肺淤血等。检查时应除去有金属性物质的衣物、饰品,拍摄时要处于深吸气的静止状态。
核素心肌显像及负荷试验
核压力测试有助于测量静息和压力期间心肌的血流量。它类似于常规压力测试,但在核应力测试期间,放射性物质被注入血液中。心脏供血不足的部位会在图像上显示为灌注缺损,可明确静息和运动时有无心肌缺血。检查前根据医生意见调整平时所服药物,测试前避免饮水进食,检查前24小时避免进食任何含有咖啡因的东西。
血液指标检查
包括肌钙蛋白、心肌酶等,因为这些指标在心肌坏死时都会发生相应变化。
冠状动脉增强CT
这是一种无创性检查,主要判断患者是否存在冠状动脉狭窄。主要适用于症状不典型的可疑冠心病的患者。检查前正常休息和饮食,检查过程中因造影剂注入体内可能会有全身发热的感觉,不要紧张和惊慌,以免干扰检查结果。心功能正常的患者,检查后应大量饮水,有助于将造影剂排出体外。
冠状动脉造影
该检查为有创性检查,可以准确反映冠状动脉狭窄的程度和部位,目前是诊断冠状动脉病变并指导治疗方案选择的黄金标准。做该项检查后,心功能正常者应大量饮水,帮助将造影剂排出体外。
|
病因
心肌血流量减少而使心肌缺氧是心绞痛的主要病因,导致心肌血流减少的最常见原因是冠状动脉疾病。
发病原因
血液中的脂质成分沉积在冠状动脉血管壁上,形成动脉粥样硬化斑块,是导致动脉管腔狭窄、心肌供血供氧不足是心绞痛的主要病因。
诱发因素
稳定型心绞痛
稳定型心绞痛通常由体力劳动引发。在爬楼梯,运动或走路时,心脏需要更多血液,而血管动脉粥样硬化变窄时,心肌无法获得足够的血液,因此发生心绞痛。除了身体活动外,其他因素如情绪波动、寒冷和暴饮暴食等也会使心率增快,心肌耗氧增多,引发心绞痛。
不稳定型心绞痛
大多数没有明显诱因,即使在休息时也可发生。少部分有诱因,如感染、甲亢等导致心肌耗氧量增加,低血压导致冠状动脉血流量减少,贫血和低氧血症导致血液携氧能力下降。
变异型心绞痛
由冠状动脉痉挛引起的,表现为冠状动脉暂时性变窄,从而减少心脏血流量,导致胸痛。吸烟、喝酒和吸毒均为重要诱发因素。
症状
心绞痛以发作性疼痛为主要临床表现,多表现为胸部压榨性疼痛,主要位于胸骨后,可放射至心前区、上肢、下颌咽喉部,也有些患者仅表现为胸闷。
典型症状
加拿大心血管病学会(CCS)把心绞痛严重度分为四级。
Ⅰ级:一般体力活动(如步行和登楼)不受限,仅在强、快或持续用力时发生心绞痛。
Ⅱ级:一般体力活动轻度受限。快步、饭后、寒冷、精神刺激或醒后数小时内发生心绞痛。一般情况下平地步行200m以上或登楼一层以上受限。
Ⅲ级:一般体力活动明显受限,一般情况下平地步行200m内或登楼一层引起心绞痛。
Ⅳ级:轻微活动或休息时即可发生心绞痛。
根据不同的疾病类型又表现出不同的疾病症状。
稳定型心绞痛
患者常在体力活动或情绪激动时,出现压迫、发闷或紧缩性胸痛,主要在胸骨后,可波及整个心前区,可伴烧灼感,持续数分钟,休息或舌下含服硝酸甘油等硝酸酯类药物后能在几分钟内缓解。
不稳定型心绞痛
患者胸部不适的部位及性质与稳定型心绞痛相似,但通常程度更重,持续时间更长,可达半小时至一小时,胸痛可在安静或睡眠中发生,休息或舌下含服硝酸甘油后症状缓解不明显。
变异型心绞痛
主要表现为安静状态下的心前区疼痛,无活动或情绪激动等诱因,可伴心律失常及晕厥。
伴随症状
发作时可伴有胸闷、出汗、恶心、呕吐、心悸或呼吸困难等症状。
就医
对于疑似心绞痛发作的患者,如果症状持续几分钟不缓解,在休息或舌下含服硝酸甘油后疼痛也不消失,应立即拨打急救电话寻求帮助。除非救护车无法到达,否则不要自行驾车前往医院。等待救护车到来期间采取卧位或半卧位休息。
医生可根据患者病史、体格检查、心电图、超声心动图、CT等相关检查,对患者病情初步判断,并制定相关的治疗方案。
发作典型者:根据发作特点和体征,结合年龄和高危因素,在排除其他原因所致的心绞痛后,一般即可确诊。心电图无改变的患者可考虑做运动负荷试验。
发作不典型者:要观察硝酸甘油的疗效和发作时心电图的改变进行诊断。如仍不能确诊,可多次复查心电图、心电图负荷试验或24小时动态心电图连续监测,如心电图出现阳性变化或负荷试验诱发心绞痛时亦可确诊。
就诊科室
急诊科、胸痛门诊(中心)、心内科、心外科。
相关检查
心电图检查
心电图是诊断心肌缺血的最常用的无创性检查,静息时心电图在正常范围内的患者,不能排除心肌缺血,可考虑进行动态心电图记录和(或)运动负荷试验。
心电图负荷试验
亦称心电图运动负荷试验,是通过一定量的运动增加心脏负荷,观察心电图变化以及有无心绞痛发作。运动方式主要有迎着转动的平板就地踏步和踏车。
心电图连续动态监测
连续记录24小时或更长时间心电活动的全过程,包括休息、活动、进餐、工作、学习和睡眠等不同情况下的心电图资料。
超声心动图
医生可以根据超声心动图来发现与心绞痛相关的问题,包括心肌区域是否因长时间缺血而受损。
胸部X光片
该检查拍摄心脏和肺部的图像。这是为了寻找可能解释心绞痛症状的其他原因,并检查是否有扩大的心脏和肺淤血等。检查时应除去有金属性物质的衣物、饰品,拍摄时要处于深吸气的静止状态。
核素心肌显像及负荷试验
核压力测试有助于测量静息和压力期间心肌的血流量。它类似于常规压力测试,但在核应力测试期间,放射性物质被注入血液中。心脏供血不足的部位会在图像上显示为灌注缺损,可明确静息和运动时有无心肌缺血。检查前根据医生意见调整平时所服药物,测试前避免饮水进食,检查前24小时避免进食任何含有咖啡因的东西。
血液指标检查
包括肌钙蛋白、心肌酶等,因为这些指标在心肌坏死时都会发生相应变化。
冠状动脉增强CT
这是一种无创性检查,主要判断患者是否存在冠状动脉狭窄。主要适用于症状不典型的可疑冠心病的患者。检查前正常休息和饮食,检查过程中因造影剂注入体内可能会有全身发热的感觉,不要紧张和惊慌,以免干扰检查结果。心功能正常的患者,检查后应大量饮水,有助于将造影剂排出体外。
冠状动脉造影
该检查为有创性检查,可以准确反映冠状动脉狭窄的程度和部位,目前是诊断冠状动脉病变并指导治疗方案选择的黄金标准。做该项检查后,心功能正常者应大量饮水,帮助将造影剂排出体外。
|
考点1:“冠状动脉疾病”必须译为 Coronary Artery Disease,常用缩写 CAD,首次出现时应给出全称与缩写,全文统一。
考点2:“稳定型心绞痛”必须译为 Stable Angina Pectoris。
考点3:“不稳定型心绞痛”必须译为 Unstable Angina Pectoris。
考点4:“变异型心绞痛”必须译为 Variant Angina 或 Prinzmetal’s Angina。
考点5:“胸骨后疼痛”推荐译为 Retrosternal Pain。
考点6:“舌下含服硝酸甘油”推荐译为 Sublingual Nitroglycerin Administration。
考点7:“心电图负荷试验”推荐译为 Exercise Stress Test 或 Electrocardiographic Stress Test。
考点8:“动态心电图”推荐译为 Ambulatory Electrocardiogram 或 Holter Monitoring。
考点9:“核素心肌显像”推荐译为 Nuclear Myocardial Perfusion Imaging 或 Nuclear Cardiac Scan。
考点10:核素心肌显像 必须译为 Nuclear Myocardial Perfusion Imaging,不能遗漏 “perfusion”。
考点11:活动耐量限制的表述应准确传达触发条件,如 “walking more than 200m is limited” 应改为 “limitation occurs when walking more than 200m”。
考点12:少数情况应译为 “A Minority of Cases Are…” 或 “In a Minority of Cases, …”,避免直接用 “Minority” 作主语。
考点13:医学影像中避免使用 “shooting”,推荐译为 “during exposure” 或 “while the image is being taken”。
考点14:跑步机运动应译为 Walking on a Treadmill,避免使用错误构造如 “rotating treadmill”。
考点15:胸片拍摄体位的表达应符合临床指令习惯,推荐译为 “hold breath after deep inhalation”。
|
e7864
|
垂类场景
|
食品健康
|
111
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
In an era characterized by rapid digitization and the proliferation of online communication platforms, vast amounts of textual data are generated daily. While the proliferation of online communication provides rich insights, extracting meaning from vast textual data remains resource intensive. Latent content analysis, which involves decoding the underlying meanings, sentiments, and nuances in text, is crucial for understanding social dynamics, informing policy decisions, and guiding business strategies. Automating this process could significantly enhance our ability to respond to societal needs promptly and effectively.
The societal implications of effectively analyzing textual content are profound. Sentiment analysis can reveal public opinion on policies or products, influencing governmental decisions and corporate strategies. Understanding political leanings aids in assessing electoral landscapes and fostering democratic engagement. Detecting emotional intensity and sarcasm in communication is vital for mental health monitoring, customer service, and even national security. Large Language Models (LLMs) offer the potential to perform these analyses at scale, reducing reliance on extensive human labor and accelerating the time to insight.
The field of automated content analysis has evolved significantly over the past few decades. Early computational approaches relied on manual coding schemes applied to small datasets. The advent of machine learning introduced algorithms capable of handling larger datasets with increased efficiency. Traditional models, such as Naïve Bayes and Support Vector Machines, were used for tasks like sentiment classification but often struggled with contextual understanding.
The introduction of deep learning architectures marked a transformative period in natural language processing (NLP). Models utilizing word embeddings captured semantic relationships between words. Recurrent Neural Networks (RNNs) and Long Short-Term Memory (LSTM) networks improved the modeling of sequential data. These advancements enhanced performance in sentiment analysis and emotion detection tasks.
Recent research has also explored integrating multi-modal data (e.g., text with images or audio) to enhance sentiment and effect detection, a challenge that LLMs may benefit from addressing. Thareja addressed the challenges posed by extreme emotional sentiments on social media platforms like Twitter, which can impact users’ mental well-being. Introducing Tweet-SentiNet, a multi-modal framework utilizing both image and text embeddings, the study demonstrated improved sentiment analysis by effectively filtering content with extreme sentiments. Similarly, Li et al. proposed a multi-modal sentiment analysis model based on image and text fusion using a cross-attention mechanism. By extracting features using advanced techniques like ALBert for text and DenseNet121 for images, and then fusing them with cross-attention, their model outperformed baseline models on public datasets, achieving accuracy and F1 scores of over 85%. Akhtar et al. explored a deep multi-task contextual attention framework for multi-modal affect analysis. Recognizing that emotions and sentiments are interdependent, they leveraged the associations among neighboring utterances and their multi-modal information.
Recent approaches broaden the scope of stance detection by integrating knowledge graphs, which help capture political or ideological context in more structured ways. Likewise, boundary-aware frameworks for few‐shot tasks have shown promise in enriching entity‐level interpretations.
Despite these improvements, models have been found to still face challenges in interpreting complex linguistic features such as sarcasm and nuanced emotions. Sarcasm detection, for instance, requires an understanding of contextual cues and sometimes external knowledge beyond the text itself, leading researchers to explore context-aware and multi-modal approaches to enhance detection accuracy. Baruah et al. investigated the impact of conversational context on sarcasm detection using deep-learning (BERT, BiLSTM) NLP models and ML classifier (SVM). They found that incorporating the last utterance in a dialogue significantly improved classifier performance on Twitter datasets, achieving an F-score of 0.743 with BERT. Exploring the distinction between intended and perceived sarcasm, Oprea and Magdy introduced the iSarcasm dataset, which consists of tweets labeled for sarcasm directly by their authors emphasizing the need for datasets that reflect the intended use of sarcasm to improve detection systems.
The introduction of the Transformer architecture and pre-trained language models such as BERT and RoBERTa significantly advanced NLP capabilities. These models utilized attention mechanisms to capture long-range dependencies in text, leading to state-of-the-art results in various tasks.
Beyond Transformer architectures, emerging methods provide complementary solutions. For example, knowledge-graph‐based architectures can improve stance detection tasks, and boundary‐aware LLM designs are increasingly valuable for few‐shot named entity recognition. Integrating both constituency and dependency parse information has proven beneficial for relation extraction.
Large Language Models (LLMs) like GPT-2 and GPT-3 expanded these capabilities by increasing model size and training data. GPT-3, with 175 billion parameters, demonstrated remarkable proficiency in zero-shot and few-shot learning scenarios, performing well on tasks it was not explicitly trained for.
Recent studies have explored LLMs in sentiment analysis and related tasks. Chang & Bergen investigated the use of GPT-3 for sentiment classification and found that it performed competitively with fine-tuned models on specific datasets. Similarly, Floridi and Chiriatti discussed the potential of GPT-3 in understanding and generating human-like text, highlighting its applicability in content analysis.
The incorporation of context-aware mechanisms, consideration of intended versus perceived meanings, and the use of multi-modal data represent critical steps toward improving model performance in complex NLP tasks. The development of domain-specific models like PoliBERTweet highlights the potential benefits of customizing language models to better capture specific content areas, such as political discourse. The integration of symbolic reasoning with deep learning in SenticNet 6 further highlights the importance of combining different AI approaches to enhance understanding and interpretation of subtle linguistic features.
However, challenges remain regarding the ethical and practical implications of relying on LLMs. Concerns include model bias, the interpretability of results, and the tendency of LLMs to produce plausible but incorrect or biased outputs. Additionally, studies have shown that while LLMs excel in language tasks, their performance in detecting sarcasm and nuanced emotions is inconsistent.
The consistency of LLMs over time is another area of interest. Although not updated by service providers, models that are prompted on different instances, may produce different outputs on the same input, raising questions about consistency in longitudinal studies. LLMs can be sensitive to input phrasing, leading to different interpretations based on slight changes in wording.
Human annotators have long been the gold standard in content analysis due to their ability to understand context, cultural references, and subtle language cues. Inter-rater reliability metrics such as Krippendorff’s alpha are used to assess consistency among human coders. Comparing LLM performance against human benchmarks is essential to evaluate their viability as substitutes or supplements in content analysis tasks.
While Large Language Models (LLMs) have demonstrated impressive capabilities, there is a notable lack of comprehensive evaluations comparing their performance to human annotators across multiple dimensions of latent content analysis. Existing studies often focus on single tasks or lack extensive statistical analysis of reliability and quality. Additionally, the consistency of LLMs over time and their inter-rater reliability in capturing complex linguistic features remain underexplored. To address these gaps this study formulates the following research questions:
RQ1: How reliably do LLMs compare to human annotators across multiple dimensions of latent content analysis?
Although the field of content analysis has advanced from manual coding schemes, through machine learning introduced algorithms capable of handling larger datasets with increased efficiency, and finally peaked with deep learning architectures, research is still needed especially in interpreting complex linguistic features such as sarcasm and nuanced emotions. On the other hand, other studies show that machines underperform in comparison to humans in certain tasks. One big gap in these studies is the lack of comparison with human annotations – to compare how LLMs and humans annotate complex linguistic features and whether humans are better at these tasks.
Previous studies have focused on specific aspects of content analysis, such as sentiment classification and sarcasm detection, but there is limited research on how the level of reliability between LLMs and humans varies across different dimensions. This is another gap to be addressed in this study.
RQ2: Are LLMs consistent over time when analyzing textual content?
Consistency over time is another underaddressed issue. Models used in different instances can create different outputs in different instances. LLM outputs can vary due to minor prompt modifications, raising concerns about time consistency.
RQ3: To what extent do LLMs provide analysis that is comparable to human analysis in terms of quality?
Human annotators have long been the gold standard in content analysis due to their ability to understand context, cultural references, and subtle language cues. However, the ability of LLMs to learn from the context is being examined, as well as their ability to produce human-like texts is rising, with an aim to replace human annotators with LLMs. Even though these studies are rising in numbers, quality check studies comparing humans and LLMs are still lacking, and this is another gap to be addressed in this study.
RQ4: How do inter-rater reliability and comparability vary across different LLM models?
Previous studies examined some LLM models’ success in annotation, but usually in one or two tasks, and usually using one or two models in this study we aim to close this gap by including multiple models and multiple tasks, and examine all their inter-rater reliability and consistency. Given the rapid development and diversity of LLM architectures—each trained on varying datasets and employing different model sizes—it’s crucial to understand whether these differences translate into variations in content analysis outcomes.
To evaluate the inter-rater reliability and quality of large language models (LLMs) in latent content analysis, we conducted a comparative study involving both humans and eight types of LLMs that each responded to presented queries to evaluate content by assigning values to statements. Our objective was to benchmark the performance of LLMs and humans across four key dimensions: sentiment, political leaning, emotional intensity, and sarcasm detection by performing (a) within (internal consistency) and (b) between analyses (comparison of performance).
The ethical approval was acquired from the Ethics Committee prior to this research. All methods were carried out in accordance with relevant guidelines and regulations.
|
In an era characterized by rapid digitization and the proliferation of online communication platforms, vast amounts of textual data are generated daily. While the proliferation of online communication provides rich insights, extracting meaning from vast textual data remains resource intensive. Latent content analysis, which involves decoding the underlying meanings, sentiments, and nuances in text, is crucial for understanding social dynamics, informing policy decisions, and guiding business strategies. Automating this process could significantly enhance our ability to respond to societal needs promptly and effectively.
The societal implications of effectively analyzing textual content are profound. Sentiment analysis can reveal public opinion on policies or products, influencing governmental decisions and corporate strategies. Understanding political leanings aids in assessing electoral landscapes and fostering democratic engagement. Detecting emotional intensity and sarcasm in communication is vital for mental health monitoring, customer service, and even national security. Large Language Models (LLMs) offer the potential to perform these analyses at scale, reducing reliance on extensive human labor and accelerating the time to insight.
The field of automated content analysis has evolved significantly over the past few decades. Early computational approaches relied on manual coding schemes applied to small datasets. The advent of machine learning introduced algorithms capable of handling larger datasets with increased efficiency. Traditional models, such as Naïve Bayes and Support Vector Machines, were used for tasks like sentiment classification but often struggled with contextual understanding.
The introduction of deep learning architectures marked a transformative period in natural language processing (NLP). Models utilizing word embeddings captured semantic relationships between words. Recurrent Neural Networks (RNNs) and Long Short-Term Memory (LSTM) networks improved the modeling of sequential data. These advancements enhanced performance in sentiment analysis and emotion detection tasks.
Recent research has also explored integrating multi-modal data (e.g., text with images or audio) to enhance sentiment and effect detection, a challenge that LLMs may benefit from addressing. Thareja addressed the challenges posed by extreme emotional sentiments on social media platforms like Twitter, which can impact users’ mental well-being. Introducing Tweet-SentiNet, a multi-modal framework utilizing both image and text embeddings, the study demonstrated improved sentiment analysis by effectively filtering content with extreme sentiments. Similarly, Li et al. proposed a multi-modal sentiment analysis model based on image and text fusion using a cross-attention mechanism. By extracting features using advanced techniques like ALBert for text and DenseNet121 for images, and then fusing them with cross-attention, their model outperformed baseline models on public datasets, achieving accuracy and F1 scores of over 85%. Akhtar et al. explored a deep multi-task contextual attention framework for multi-modal affect analysis. Recognizing that emotions and sentiments are interdependent, they leveraged the associations among neighboring utterances and their multi-modal information.
Recent approaches broaden the scope of stance detection by integrating knowledge graphs, which help capture political or ideological context in more structured ways. Likewise, boundary-aware frameworks for few‐shot tasks have shown promise in enriching entity‐level interpretations.
Despite these improvements, models have been found to still face challenges in interpreting complex linguistic features such as sarcasm and nuanced emotions. Sarcasm detection, for instance, requires an understanding of contextual cues and sometimes external knowledge beyond the text itself, leading researchers to explore context-aware and multi-modal approaches to enhance detection accuracy. Baruah et al. investigated the impact of conversational context on sarcasm detection using deep-learning (BERT, BiLSTM) NLP models and ML classifier (SVM). They found that incorporating the last utterance in a dialogue significantly improved classifier performance on Twitter datasets, achieving an F-score of 0.743 with BERT. Exploring the distinction between intended and perceived sarcasm, Oprea and Magdy introduced the iSarcasm dataset, which consists of tweets labeled for sarcasm directly by their authors emphasizing the need for datasets that reflect the intended use of sarcasm to improve detection systems.
The introduction of the Transformer architecture and pre-trained language models such as BERT and RoBERTa significantly advanced NLP capabilities. These models utilized attention mechanisms to capture long-range dependencies in text, leading to state-of-the-art results in various tasks.
Beyond Transformer architectures, emerging methods provide complementary solutions. For example, knowledge-graph‐based architectures can improve stance detection tasks, and boundary‐aware LLM designs are increasingly valuable for few‐shot named entity recognition. Integrating both constituency and dependency parse information has proven beneficial for relation extraction.
Large Language Models (LLMs) like GPT-2 and GPT-3 expanded these capabilities by increasing model size and training data. GPT-3, with 175 billion parameters, demonstrated remarkable proficiency in zero-shot and few-shot learning scenarios, performing well on tasks it was not explicitly trained for.
Recent studies have explored LLMs in sentiment analysis and related tasks. Chang & Bergen investigated the use of GPT-3 for sentiment classification and found that it performed competitively with fine-tuned models on specific datasets. Similarly, Floridi and Chiriatti discussed the potential of GPT-3 in understanding and generating human-like text, highlighting its applicability in content analysis.
The incorporation of context-aware mechanisms, consideration of intended versus perceived meanings, and the use of multi-modal data represent critical steps toward improving model performance in complex NLP tasks. The development of domain-specific models like PoliBERTweet highlights the potential benefits of customizing language models to better capture specific content areas, such as political discourse. The integration of symbolic reasoning with deep learning in SenticNet 6 further highlights the importance of combining different AI approaches to enhance understanding and interpretation of subtle linguistic features.
However, challenges remain regarding the ethical and practical implications of relying on LLMs. Concerns include model bias, the interpretability of results, and the tendency of LLMs to produce plausible but incorrect or biased outputs. Additionally, studies have shown that while LLMs excel in language tasks, their performance in detecting sarcasm and nuanced emotions is inconsistent.
The consistency of LLMs over time is another area of interest. Although not updated by service providers, models that are prompted on different instances, may produce different outputs on the same input, raising questions about consistency in longitudinal studies. LLMs can be sensitive to input phrasing, leading to different interpretations based on slight changes in wording.
Human annotators have long been the gold standard in content analysis due to their ability to understand context, cultural references, and subtle language cues. Inter-rater reliability metrics such as Krippendorff’s alpha are used to assess consistency among human coders. Comparing LLM performance against human benchmarks is essential to evaluate their viability as substitutes or supplements in content analysis tasks.
While Large Language Models (LLMs) have demonstrated impressive capabilities, there is a notable lack of comprehensive evaluations comparing their performance to human annotators across multiple dimensions of latent content analysis. Existing studies often focus on single tasks or lack extensive statistical analysis of reliability and quality. Additionally, the consistency of LLMs over time and their inter-rater reliability in capturing complex linguistic features remain underexplored. To address these gaps this study formulates the following research questions:
RQ1: How reliably do LLMs compare to human annotators across multiple dimensions of latent content analysis?
Although the field of content analysis has advanced from manual coding schemes, through machine learning introduced algorithms capable of handling larger datasets with increased efficiency, and finally peaked with deep learning architectures, research is still needed especially in interpreting complex linguistic features such as sarcasm and nuanced emotions. On the other hand, other studies show that machines underperform in comparison to humans in certain tasks. One big gap in these studies is the lack of comparison with human annotations – to compare how LLMs and humans annotate complex linguistic features and whether humans are better at these tasks.
Previous studies have focused on specific aspects of content analysis, such as sentiment classification and sarcasm detection, but there is limited research on how the level of reliability between LLMs and humans varies across different dimensions. This is another gap to be addressed in this study.
RQ2: Are LLMs consistent over time when analyzing textual content?
Consistency over time is another underaddressed issue. Models used in different instances can create different outputs in different instances. LLM outputs can vary due to minor prompt modifications, raising concerns about time consistency.
RQ3: To what extent do LLMs provide analysis that is comparable to human analysis in terms of quality?
Human annotators have long been the gold standard in content analysis due to their ability to understand context, cultural references, and subtle language cues. However, the ability of LLMs to learn from the context is being examined, as well as their ability to produce human-like texts is rising, with an aim to replace human annotators with LLMs. Even though these studies are rising in numbers, quality check studies comparing humans and LLMs are still lacking, and this is another gap to be addressed in this study.
RQ4: How do inter-rater reliability and comparability vary across different LLM models?
Previous studies examined some LLM models’ success in annotation, but usually in one or two tasks, and usually using one or two models in this study we aim to close this gap by including multiple models and multiple tasks, and examine all their inter-rater reliability and consistency. Given the rapid development and diversity of LLM architectures—each trained on varying datasets and employing different model sizes—it’s crucial to understand whether these differences translate into variations in content analysis outcomes.
To evaluate the inter-rater reliability and quality of large language models (LLMs) in latent content analysis, we conducted a comparative study involving both humans and eight types of LLMs that each responded to presented queries to evaluate content by assigning values to statements. Our objective was to benchmark the performance of LLMs and humans across four key dimensions: sentiment, political leaning, emotional intensity, and sarcasm detection by performing (a) within (internal consistency) and (b) between analyses (comparison of performance).
The ethical approval was acquired from the Ethics Committee prior to this research. All methods were carried out in accordance with relevant guidelines and regulations.
|
考点1:“resource intensive”推荐译为“资源密集型”
考点2:“societal needs”推荐译为“社会需要/需求”
考点3:“insight”推荐译为“了解/见解”
考点4:“benefit”推荐译为“受益于”
考点5:“inconsistent”推荐译为“时好时坏的”或“不稳定的”
考点6:"constituency parse"推荐译为“组块分析”/“成分句法分析”
|
eaa06
|
学术论文
|
应用学科
|
130
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Talent competitiveness refers to the ability of a country or a region to cultivate, attract, and utilize talent resources for its economic and social development, as demonstrated by its talent strategy, policy, and deployment, thereby contributing to the development of the region or the country [1]. National competitiveness is influenced by higher education and scientific research systems, both of which depend on talent competitiveness. Countries around the world have introduced several talent policies to promote national development. In 2022, the UK’s Research and Innovation Agency (RIA) formulated its Strategy 2022–2027: Changing the Future Together, focusing on building a system of excellence in research and innovation to achieve the goal of becoming a global science and technology powerhouse and an innovation-driven nation [2]. In 2023, the U.S. Federal Government introduced its STEM education plan for the period 2023–2028, which was laid out in four areas including education, social engagement, workforce development, and research & innovation capability, as the key support for the U.S. to maintain its global leadership in science and technology [3]. In China, another major economy in the world, the synergistic development of science, education, and talent is seen as fundamental and strategic for the comprehensive construction of a modern socialist country [4]. In both the West and the East, talent search has been recognized as the most important task over decades [5].
The European Institute of Business Administration (hereinafter, INSEAD), established in 1957, is headquartered in Fontainebleau, France, with additional campuses in locations including Singapore and Abu Dhabi. INSEAD’s educational mission is to develop future business leaders with a global perspective, a strong sense of responsibility, and the capacity to drive meaningful impact. The institution offers a diverse portfolio of academic programs, including the MBA program, designed to cultivate senior leadership talent; the Executive MBA (EMBA) program, targeting mid- to senior-level managers; and the PhD program, which focuses on rigorous academic research. In addition to its degree offerings, INSEAD engages in specialized research initiatives led by expert teams that integrate resources from multiple sources to conduct focused academic investigations and produce comprehensive database reports. One such initiative is the Global Talent Competitiveness Index (hereinafter, GTCI) project, which is discussed in detail in the following section.
To assess and monitor the landscape of global talent cultivation, INSEAD has taken the lead in launching the GTCI. The GTCI index focuses on the ability of countries or economies to cultivate, attract and retain talent, and has received extensive attention from academics for its comprehensiveness, international comparability, dynamic monitoring capability, and policy guidance. Seminal studies have examined the effectiveness of the GTCI. By analyzing the role of talent in the economic development of various countries and economies, researchers suggest that the GTCI could be used as a competitiveness measurement standard [6] as it assesses a country’s talent competitiveness from a comprehensive and objective perspective [7].
Pioneering research has used the GTCI data to conduct international comparisons. After an in-depth analysis of the G20 countries’ performance in talent competitiveness, researchers found that developed countries are particularly strong in talent competitiveness [8]. Some scholars have also examined the migration status of 25 countries and found a positive correlation between a country’s migration status and its GTCI performance, highlighting the importance of talent competitiveness in driving a country’s development [9]. Moreover, several studies have utilized the GTCI data for dynamic monitoring and analysis: using the European innovation scoreboard, scholars have analyzed the changes in Poland’s GTCI data between 2013 and 2018 and pointed out the challenges for talent management and innovation [10]. These capabilities provide important research insights for policymakers, business leaders, and academic researchers worldwide.
Extending the aforementioned literature, this study takes GTCI as the key data source and selects G20 countries as the main objects of analysis. In the past, the established literature from the fields of political economy [11], development studies [12], and public policy [13] has carefully sketched the issue of China’s talent competitiveness. However, few studies have compared the talent competitiveness of China with a representative coalition of countries such as the G20, resulting in a lack of international comparative perspective. At the end of the 20th century and the beginning of the 21st century, Chinese scholars had already begun to pay attention to the issue of talent competitiveness and to build China’s assessment system in the foreground [14]. However, as of 2024, there is still no substantial breakthrough drawn on such a comprehensive database as the GTCI database.
As of now, the scholarly discussions on the issue of talent competitiveness in Chinese academia focus on two aspects: (a) analyzing talent competition between regions and (b) providing vague suggestions for policy-making without detailed solutions. This is caused by China’s rapid development in the 21st century, which leaves regional competition being the focus of public policy research while talent competitiveness is an accessory. At the same time, there is a research gap between economic advancement and educational development: globalized economic development requires China to have a more developed talent competitiveness system, but the mainstream examination-based education system is not conducive to such development.
Thus, in studies focusing solely on China’s talent competitiveness, there are three research gaps that can be summarized. First, due to the lack of national-level datasets, most of the existing studies are based on individual provinces in China and are not generalizable enough. Second, current Chinese-language research in talent competitiveness mainly focuses on local policy slogans, with relatively broad arguments and a lack of empirical data support. Third, relevant studies in English language still have not proposed a set of systematic, comprehensive evaluation frameworks to measure the competitiveness of talents across the world, which hinders academics from deep diving into talent policies.
Additionally, there is an unmet need of highly skilled professionals in China, partly due to the disadvantage of its education system. China’s low attractiveness to talent has also led to a large number of Chinese overseas students being reluctant to return to China and foreign talent being reluctant to enter China [15]. The lack of a scientific evaluation system is not conducive to the updating of talent competitiveness policies at the national level, thus leading to a vicious circle of local talent competitiveness policies.
Given this, this research proposes and adopts an original analysis matrix as a multi-dimensional and multi-indicator framework (which we name PEST-embedded SWOT matrix), for assessing talent competitiveness. By comparatively analyzing the performance of different countries in terms of talent competitiveness, this investigation aims to accurately grasp China’s position and posture in the global talent competition, thereby putting forward targeted improvement paths and policy recommendations in terms of talent cultivation, attraction, and utilization. We aimed to conduct a comprehensive literature analysis and introduce an analytical matrix to extract the indicators embedded in the GTCI data that influence China’s talent competitiveness. These indicators are compared with those of G20 countries to explore the underlying reasons for observed changes. Through this comparative analysis, we seek to identify the key factors shaping China’s talent competitiveness and examine the political, economic, social, and technological deficiencies contributing to these challenges. This research will provide valuable insights into strategies for enhancing China’s talent competitiveness. Furthermore, we will lay the groundwork for developing a national talent competitiveness assessment system tailored to China’s specific context. In subsequent research, the current absence of a standardized and unified evaluation framework is expected to become increasingly evident.
Building upon this research, we aim to develop a standardized and unified talent competitiveness assessment system for China. Ideally, this system will adopt a dual structure, comprising a nationally unified framework as the core, complemented by region-specific subsystems that reflect local cultural and contextual variations. This ambitious initiative represents the practical application of preceding theoretical research. However, achieving this objective necessitates a solid foundation of theoretical inquiry grounded in current realities, drawing upon the well-established GTCI talent competitiveness evaluation model. Accordingly, this study employs a SWOT-PEST analytical matrix (political, economic, social, and technological) to systematically examine the key factors shaping China’s present talent competitiveness landscape.
|
Talent competitiveness refers to the ability of a country or a region to cultivate, attract, and utilize talent resources for its economic and social development, as demonstrated by its talent strategy, policy, and deployment, thereby contributing to the development of the region or the country [1]. National competitiveness is influenced by higher education and scientific research systems, both of which depend on talent competitiveness. Countries around the world have introduced several talent policies to promote national development. In 2022, the UK’s Research and Innovation Agency (RIA) formulated its Strategy 2022–2027: Changing the Future Together, focusing on building a system of excellence in research and innovation to achieve the goal of becoming a global science and technology powerhouse and an innovation-driven nation [2]. In 2023, the U.S. Federal Government introduced its STEM education plan for the period 2023–2028, which was laid out in four areas including education, social engagement, workforce development, and research & innovation capability, as the key support for the U.S. to maintain its global leadership in science and technology [3]. In China, another major economy in the world, the synergistic development of science, education, and talent is seen as fundamental and strategic for the comprehensive construction of a modern socialist country [4]. In both the West and the East, talent search has been recognized as the most important task over decades [5].
The European Institute of Business Administration (hereinafter, INSEAD), established in 1957, is headquartered in Fontainebleau, France, with additional campuses in locations including Singapore and Abu Dhabi. INSEAD’s educational mission is to develop future business leaders with a global perspective, a strong sense of responsibility, and the capacity to drive meaningful impact. The institution offers a diverse portfolio of academic programs, including the MBA program, designed to cultivate senior leadership talent; the Executive MBA (EMBA) program, targeting mid- to senior-level managers; and the PhD program, which focuses on rigorous academic research. In addition to its degree offerings, INSEAD engages in specialized research initiatives led by expert teams that integrate resources from multiple sources to conduct focused academic investigations and produce comprehensive database reports. One such initiative is the Global Talent Competitiveness Index (hereinafter, GTCI) project, which is discussed in detail in the following section.
To assess and monitor the landscape of global talent cultivation, INSEAD has taken the lead in launching the GTCI. The GTCI index focuses on the ability of countries or economies to cultivate, attract and retain talent, and has received extensive attention from academics for its comprehensiveness, international comparability, dynamic monitoring capability, and policy guidance. Seminal studies have examined the effectiveness of the GTCI. By analyzing the role of talent in the economic development of various countries and economies, researchers suggest that the GTCI could be used as a competitiveness measurement standard [6] as it assesses a country’s talent competitiveness from a comprehensive and objective perspective [7].
Pioneering research has used the GTCI data to conduct international comparisons. After an in-depth analysis of the G20 countries’ performance in talent competitiveness, researchers found that developed countries are particularly strong in talent competitiveness [8]. Some scholars have also examined the migration status of 25 countries and found a positive correlation between a country’s migration status and its GTCI performance, highlighting the importance of talent competitiveness in driving a country’s development [9]. Moreover, several studies have utilized the GTCI data for dynamic monitoring and analysis: using the European innovation scoreboard, scholars have analyzed the changes in Poland’s GTCI data between 2013 and 2018 and pointed out the challenges for talent management and innovation [10]. These capabilities provide important research insights for policymakers, business leaders, and academic researchers worldwide.
Extending the aforementioned literature, this study takes GTCI as the key data source and selects G20 countries as the main objects of analysis. In the past, the established literature from the fields of political economy [11], development studies [12], and public policy [13] has carefully sketched the issue of China’s talent competitiveness. However, few studies have compared the talent competitiveness of China with a representative coalition of countries such as the G20, resulting in a lack of international comparative perspective. At the end of the 20th century and the beginning of the 21st century, Chinese scholars had already begun to pay attention to the issue of talent competitiveness and to build China’s assessment system in the foreground [14]. However, as of 2024, there is still no substantial breakthrough drawn on such a comprehensive database as the GTCI database.
As of now, the scholarly discussions on the issue of talent competitiveness in Chinese academia focus on two aspects: (a) analyzing talent competition between regions and (b) providing vague suggestions for policy-making without detailed solutions. This is caused by China’s rapid development in the 21st century, which leaves regional competition being the focus of public policy research while talent competitiveness is an accessory. At the same time, there is a research gap between economic advancement and educational development: globalized economic development requires China to have a more developed talent competitiveness system, but the mainstream examination-based education system is not conducive to such development.
Thus, in studies focusing solely on China’s talent competitiveness, there are three research gaps that can be summarized. First, due to the lack of national-level datasets, most of the existing studies are based on individual provinces in China and are not generalizable enough. Second, current Chinese-language research in talent competitiveness mainly focuses on local policy slogans, with relatively broad arguments and a lack of empirical data support. Third, relevant studies in English language still have not proposed a set of systematic, comprehensive evaluation frameworks to measure the competitiveness of talents across the world, which hinders academics from deep diving into talent policies.
Additionally, there is an unmet need of highly skilled professionals in China, partly due to the disadvantage of its education system. China’s low attractiveness to talent has also led to a large number of Chinese overseas students being reluctant to return to China and foreign talent being reluctant to enter China [15]. The lack of a scientific evaluation system is not conducive to the updating of talent competitiveness policies at the national level, thus leading to a vicious circle of local talent competitiveness policies.
Given this, this research proposes and adopts an original analysis matrix as a multi-dimensional and multi-indicator framework (which we name PEST-embedded SWOT matrix), for assessing talent competitiveness. By comparatively analyzing the performance of different countries in terms of talent competitiveness, this investigation aims to accurately grasp China’s position and posture in the global talent competition, thereby putting forward targeted improvement paths and policy recommendations in terms of talent cultivation, attraction, and utilization. We aimed to conduct a comprehensive literature analysis and introduce an analytical matrix to extract the indicators embedded in the GTCI data that influence China’s talent competitiveness. These indicators are compared with those of G20 countries to explore the underlying reasons for observed changes. Through this comparative analysis, we seek to identify the key factors shaping China’s talent competitiveness and examine the political, economic, social, and technological deficiencies contributing to these challenges. This research will provide valuable insights into strategies for enhancing China’s talent competitiveness. Furthermore, we will lay the groundwork for developing a national talent competitiveness assessment system tailored to China’s specific context. In subsequent research, the current absence of a standardized and unified evaluation framework is expected to become increasingly evident.
Building upon this research, we aim to develop a standardized and unified talent competitiveness assessment system for China. Ideally, this system will adopt a dual structure, comprising a nationally unified framework as the core, complemented by region-specific subsystems that reflect local cultural and contextual variations. This ambitious initiative represents the practical application of preceding theoretical research. However, achieving this objective necessitates a solid foundation of theoretical inquiry grounded in current realities, drawing upon the well-established GTCI talent competitiveness evaluation model. Accordingly, this study employs a SWOT-PEST analytical matrix (political, economic, social, and technological) to systematically examine the key factors shaping China’s present talent competitiveness landscape.
|
考点1: "talent search "应译为 "招才引智 / 人才寻觅”
考点2: "drive meaningful impact "应译为 “推动产生深远影响 / 创造有意义的价值”
考点3: "Seminal studies "应译为 “开创性研究 / 奠基性研究”
考点4:" Pioneering research" 应译为 "先驱性研究 / 开创性研究"
考点5:" in the foreground "应译为" 前瞻性地 / 率先"
考点6:" research gap "应译为 研究空白
考点7: grounded in current realities 应译为 立足于当前现实 / 植根于现实情况
|
eacd2
|
学术论文
|
社会科学
|
92
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
There is a vast hidden workforce behind AI(April 10, 2025)
When DEEPSEEK, a hotshot Chinese firm, released its cheap large language model late last year it overturned long-standing assumptions about what it will take to build the next generation of artificial intelligence (AI). This will matter to whoever comes out on top in the epic global battle for AI supremacy. Developers are now reconsidering how much hardware, energy and data are needed. Yet another, less discussed, input in machine intelligence is in flux too: the workforce.
To the layman, AI is all robots, machines and models. It is a technology that kills jobs. In fact, there are millions of workers involved in producing AI models. Much of their work has involved tasks like tagging objects in images of roads in order to train self-driving cars and labelling words in the audio recordings used to train speech-recognition systems. Technically, annotators give data the contextual information computers need to work out the statistical associations between components of a dataset and their meaning to human beings. In fact, anyone who has completed a captcha test, selecting photos containing zebra crossings, may have inadvertently helped train an AI.
Annotators have long been compared to parents, teaching models and helping them make sense of the world. But the latest models don’t need their guidance in the same way. As the technology grows up, are its teachers becoming redundant?Data annotation is not new. Fei Fei Li, an American computer scientist known as “the godmother of AI”, is credited with firing the industry’s starting gun in the mid-2000s when she created ImageNet, the largest image dataset at the time. Ms Li realised that if she paid college students to categorise the images, which was then how most researchers did things, the task would take 90 years. Instead, she hired workers around the world using Mechanical Turk, an online gig-work platform run by Amazon. She got some 3.2m images organised into a dataset in two and a half years. Soon other AI labs were outsourcing annotation work this way, too.
A debate in the industry has been about the treatment of the workers behind AI. Firms are reluctant to share information on wages. But American annotators generally consider $10-20 per hour to be decent pay on online platforms. Those in poor countries often get $4-8 per hour. Many must use monitoring tools that track their computer activity and are penalised for being slow. Scale AI has been hit with several lawsuits over its employment practices. The firm denies wrongdoing and says: “We plan to defend ourselves vigorously.”The bigger issue, though, is that basic annotation work is drying up. In part, this was inevitable. If AI was once a toddler who needed a parent to point things out and to help it make sense of the world around it, the technology has grown into an adolescent who needs occasional specialist guidance and advice. AI labs increasingly use pre-labelled data from other AI labs, which use algorithms to apply labels to datasets.
The most recent wave of AI models has changed data work more dramatically. Since 2022, when OpenAI first let the public play with its ChatGPT chatbot, there has been a rush of interest in large language models. Data from Pitchbook, a research firm, suggest that global venture-capital funding for AI startups jumped by more than 50% in 2024 to $131.5bn, even as funding for other startups fell. Much of it is going into newer techniques for developing AI, which do not need data annotated in the same way. Iva Gumnishka at Humans in the Loop, a social enterprise, says firms doing low-skilled annotation for older computer-vision and natural-language-processing clients are being “left behind”.
There is still demand for annotators, but their work has changed. As businesses start to deploy AI, they are building smaller specialised models and looking for highly educated annotators to help. It has become fairly common for adverts for annotation jobs to require a PhD or skills in coding and science. Now that researchers are trying to make AI more multilingual, demand for annotators who speak languages other than English is growing, too. Sushovan Das, a dentist working on medical-AI projects at iMerit, reckons that annotation work will never disappear. “This world is constantly evolving,” he says. “So the AI needs to be improved time and again.”
If AI developers had their way they would not need this sort of human input at all. Studies suggest that as much as 80% of the time that goes into the development of AI is spent on data work. Naveen Rao at Databricks, an AI firm, says he would like models to teach themselves, just as he would like his own children to do. “I want to build self-efficacious humans,” he says. “I want them to have their own curiosity and figure out how to solve problems. I don’t want to spoon-feed them every step of the way.”There is a lot of excitement about unsupervised learning, which involves feeding models unlabelled data, and reinforcement learning, which uses trial and error to improve decision-making. AI firms, including Google DeepMind, have trained machines to win at games like Go and chess by millions of contests against themselves and tracking which strategies work, without any human input at all. But that self-taught approach doesn’t work outside the realms of maths and science, at least for the moment.
Tech nerds everywhere have been blown away by how cheap and efficient DeepSeek’s model is. But they are less impressed by DeepSeek’s attempt to train AI using feedback generated by computers rather than humans. The model struggled to answer open-ended questions, producing gobbledygook in a mixture of languages. Mr Bradley, like many techies, reckons that more people will need to get involved in training AI, not fewer. Diversity in the workforce matters. When ChatGPT was released a few years ago, people noticed that it overused the word “delve”. The word became seen as “AI-ese”, a telltale sign that the text was written by a bot. In fact, annotators in Africa had been hired to train the model and the word “delve” is more commonly used in African English than it is in American or British English. In the same way as workers’ skills and knowledge are transferred to models, their vocabulary is, too. As it turns out, it takes more than just a village to raise a child.
|
There is a vast hidden workforce behind AI(April 10, 2025)
When DEEPSEEK, a hotshot Chinese firm, released its cheap large language model late last year it overturned long-standing assumptions about what it will take to build the next generation of artificial intelligence (AI). This will matter to whoever comes out on top in the epic global battle for AI supremacy. Developers are now reconsidering how much hardware, energy and data are needed. Yet another, less discussed, input in machine intelligence is in flux too: the workforce.
To the layman, AI is all robots, machines and models. It is a technology that kills jobs. In fact, there are millions of workers involved in producing AI models. Much of their work has involved tasks like tagging objects in images of roads in order to train self-driving cars and labelling words in the audio recordings used to train speech-recognition systems. Technically, annotators give data the contextual information computers need to work out the statistical associations between components of a dataset and their meaning to human beings. In fact, anyone who has completed a captcha test, selecting photos containing zebra crossings, may have inadvertently helped train an AI.
Annotators have long been compared to parents, teaching models and helping them make sense of the world. But the latest models don’t need their guidance in the same way. As the technology grows up, are its teachers becoming redundant?Data annotation is not new. Fei Fei Li, an American computer scientist known as “the godmother of AI”, is credited with firing the industry’s starting gun in the mid-2000s when she created ImageNet, the largest image dataset at the time. Ms Li realised that if she paid college students to categorise the images, which was then how most researchers did things, the task would take 90 years. Instead, she hired workers around the world using Mechanical Turk, an online gig-work platform run by Amazon. She got some 3.2m images organised into a dataset in two and a half years. Soon other AI labs were outsourcing annotation work this way, too.
A debate in the industry has been about the treatment of the workers behind AI. Firms are reluctant to share information on wages. But American annotators generally consider $10-20 per hour to be decent pay on online platforms. Those in poor countries often get $4-8 per hour. Many must use monitoring tools that track their computer activity and are penalised for being slow. Scale AI has been hit with several lawsuits over its employment practices. The firm denies wrongdoing and says: “We plan to defend ourselves vigorously.”The bigger issue, though, is that basic annotation work is drying up. In part, this was inevitable. If AI was once a toddler who needed a parent to point things out and to help it make sense of the world around it, the technology has grown into an adolescent who needs occasional specialist guidance and advice. AI labs increasingly use pre-labelled data from other AI labs, which use algorithms to apply labels to datasets.
The most recent wave of AI models has changed data work more dramatically. Since 2022, when OpenAI first let the public play with its ChatGPT chatbot, there has been a rush of interest in large language models. Data from Pitchbook, a research firm, suggest that global venture-capital funding for AI startups jumped by more than 50% in 2024 to $131.5bn, even as funding for other startups fell. Much of it is going into newer techniques for developing AI, which do not need data annotated in the same way. Iva Gumnishka at Humans in the Loop, a social enterprise, says firms doing low-skilled annotation for older computer-vision and natural-language-processing clients are being “left behind”.
There is still demand for annotators, but their work has changed. As businesses start to deploy AI, they are building smaller specialised models and looking for highly educated annotators to help. It has become fairly common for adverts for annotation jobs to require a PhD or skills in coding and science. Now that researchers are trying to make AI more multilingual, demand for annotators who speak languages other than English is growing, too. Sushovan Das, a dentist working on medical-AI projects at iMerit, reckons that annotation work will never disappear. “This world is constantly evolving,” he says. “So the AI needs to be improved time and again.”
If AI developers had their way they would not need this sort of human input at all. Studies suggest that as much as 80% of the time that goes into the development of AI is spent on data work. Naveen Rao at Databricks, an AI firm, says he would like models to teach themselves, just as he would like his own children to do. “I want to build self-efficacious humans,” he says. “I want them to have their own curiosity and figure out how to solve problems. I don’t want to spoon-feed them every step of the way.”There is a lot of excitement about unsupervised learning, which involves feeding models unlabelled data, and reinforcement learning, which uses trial and error to improve decision-making. AI firms, including Google DeepMind, have trained machines to win at games like Go and chess by millions of contests against themselves and tracking which strategies work, without any human input at all. But that self-taught approach doesn’t work outside the realms of maths and science, at least for the moment.
Tech nerds everywhere have been blown away by how cheap and efficient DeepSeek’s model is. But they are less impressed by DeepSeek’s attempt to train AI using feedback generated by computers rather than humans. The model struggled to answer open-ended questions, producing gobbledygook in a mixture of languages. Mr Bradley, like many techies, reckons that more people will need to get involved in training AI, not fewer. Diversity in the workforce matters. When ChatGPT was released a few years ago, people noticed that it overused the word “delve”. The word became seen as “AI-ese”, a telltale sign that the text was written by a bot. In fact, annotators in Africa had been hired to train the model and the word “delve” is more commonly used in African English than it is in American or British English. In the same way as workers’ skills and knowledge are transferred to models, their vocabulary is, too. As it turns out, it takes more than just a village to raise a child.
|
考点 1:【hidden workforce 】应译为 【隐形劳动力】
考点 2:【multilingual AI】 应译为 【多语言人工智能】
考点 3:【venture-capital funding】 应译为【 风险投资资金】
|
eaf3f
|
新闻资讯
|
新闻报道
|
82
|
翻译,中文翻译成英文,不要输出译文以外的内容。以下是你本次的任务:
在俄罗斯文化中,莫斯科和彼得堡已经超出城市的地理范畴,作为一种文化符号成为对立的两极:俄罗斯传统文化与西方文化,民族性与现代性,俄罗斯与欧洲,弥赛亚与敌基督等,从而构成了一直以来困扰俄罗斯的关于道路选择和民族身份认证等一系列重大的俄罗斯思想问题。
在“莫斯科神话”的编码中,很大一部分与它的地理形态和构成相关。编年史记载,莫斯科坐落在一片天然形成的如巨型大碗的洼地之中,周围有12座不高的山峦环绕。但据历史学家确认,莫斯科是由七座神奇的山丘组成。它们是波罗维茨、斯列坚斯科、特维尔、三头山、列弗尔托夫、沃罗比约夫和传奇的施维夫。如此一来,围绕着莫斯科到底是由7座山丘还是12座山丘组成就形成了一系列复杂的说法。其中,俄罗斯星相学就将莫斯科划归为金牛座的属性。这不仅是因为这座城市的奠基日(1147年3月28日,史上记载为1147年4月5日)恰好落在黄道带(Зодиак)的金牛座上(有人注意到在古克里姆林宫的三角形里有个牛头,即金牛座的象征),更因为第一罗马和第二罗马的创建日期也是金牛座属性:即罗马建于公元前754年4月22日,而康斯坦丁堡则建于公元330年5月11日。按照当代俄罗斯星相学家巴维尔·格罗巴的观点,莫斯科的不可替代性和宇宙性即由此构成。因为它是按照“七座山丘一条河”的原则建造的,它是一座“永恒之城”。在东正教秘传中,数字7永远被认为是一个具有魔法的数字,它意味着秘密、尚未认识的东西和无法解释的东西。
莫斯科如此的地貌和城市结构,我们可以借尤里·洛特曼的“城市符号学”理论加以阐释:“当一座城市在与周遭的世界中的关系中,就像一座坐落在尘世中心的教堂一般,那么,它首先表现出一种被理想化的宇宙模式来。”这样的城市,通常,“被置于‘大地的中心’。……耶路撒冷、罗马、莫斯科在不同的(城市)文本中正是作为某些世界的中心来看待的。它可以同时既作为天国城市的模型,又作为周边世界的圣地。”这样的城市也被称为“同心城市”。“通常,城市的同心状态在符号学的空间里,是与处在高山之上(群山上)的城市形象相联系的。那样的城市表现为地与天的中介,在它周围集结着一些有关起源、发生嬗变的神话,它具有开始,但没有结束——这是‘永恒之城’。”
除此之外,莫斯科的大火也成为“莫斯科神话”中较为重要的构成元素。莫斯科曾遭受过无数次“火”的历练。历史上比较重要的记载共有四次。1812年的那场大火促成了这座城市的诸多骄傲。战争与大火的破坏,不仅使莫斯科成为“多灾多难”之城的象征,也使它成为俄罗斯最受宠爱的城市。俄罗斯热爱并怜惜着莫斯科,因为从莫斯科身上俄罗斯认出了自己。
如此一来,俄罗斯文学“莫斯科文本”最基本的神话原型通常分为两类:一是有关起源的神话:即莫斯科起源于“七座山丘”或“十二座山丘”的神话和莫斯科作为“向心的”“被护佑的城市”神话。二是关于末日论的神话:即莫斯科的“大火”。“火”的意象在莫斯科文本中往往衍生出两个向度的神话阐释:即莫斯科既是“浴火重生”的“凤凰城”,又是象征“毁灭”的“大墓地”。俄罗斯“白银时代”的研究者们在言涉“莫斯科-彼得堡”的城市哲学时,最早提及了莫斯科城的“凤凰之名”:“在与罗马争夺优先权的斗争中,莫斯科逐渐书写了新的神话,它就是凤凰城”,“从灰烬中得到重生的旧首都吸引了全世界的目光。”这里喻指大火后的莫斯科像凤凰涅槃一样在烈火中重生。“凤凰城”因此而得名。有的文学家认为,莫斯科之所以重要,不仅是因为莫斯科是俄罗斯传统的象征,更重要的是,它与浴火的凤凰有关。它代表着俄罗斯民族源源不断的生命力和重振雄风的可能。
“大墓地”一词出自恰达耶夫的《哲学书简》。在其中,恰达耶夫特别强调说“大墓地指的是莫斯科”。作为俄罗斯思想界西欧派的杰出代表,恰达耶夫将充满着宗法制陈腐之气的莫斯科喻为死亡之城。在第一封信中,恰达耶夫对俄罗斯进行了强烈的谴责:“首先是野蛮的不开化,然后是愚蠢的愚昧,接下来是残暴的,凌辱的异族统治……它除了残暴以外没有兴起过任何东西,除了奴役以外没有温暖过任何东西……我们仅仅生活在界限非常狭隘的现在,没有过去和未来,置身于僵死的停滞。”在恰达耶夫看来,俄罗斯真是一无是处了。俄罗斯构成了人类“精神世界的一处空白”,俄罗斯人“徒有基督徒的虚名”,甚至连俄罗斯人勇敢的天性,也被恰达耶夫视为一种“恶习”。“残暴的、凌辱异族的统治,这一统治方式后来又为我们本民族的当权者所继承。” 《哲学书简》遂成为斯拉夫派和西欧派争论的导火索。在西欧派看来,莫斯科所代表的保守,“维护那些与俄罗斯的历史落后性联接在一起的民族生活的特征”,它“担心欧洲的技术机械、工业的发展”,它认为“与欧洲在形式上的相似的新社会可能戕害俄罗斯精神的独特性,让俄罗斯失去个性”,在这种陈腐保守的民族主义氛围里,莫斯科没有一丝生气,是一座“大墓地”,是“死寂的原子”,是“保守的庞然大物”。
然而,在苏维埃政权的最初年代,“莫斯科神话”发生了本质的变形。当然,这主要与新政权对作家心灵的意识形态高压有关,与将首都重又转向莫斯科有关。从20年代开始,莫斯科神话又显现出两种形态:旧莫斯科被讽刺性地重新提起,当代莫斯科则被理解为乌托邦。在20年代,安德烈·别雷创作了有关革命前的莫斯科三部曲《莫斯科》,这个称谓无可避免地使人把那部他创作于1911年的《彼得堡》联系在一起。在这部小说里,所有过往构成“莫斯科神话”的东西都被颠倒了过来。取代“神圣”的莫斯科的是“万恶的、该死的莫斯科”“站在地狱之上的莫斯科”;取代“家常的莫斯科”的是“小市民的”“鄙俗的”“肮脏的莫斯科”;取代“自然的、生气盎然、蓬勃壮大”的莫斯科的是“衰老的”“病恹恹的”莫斯科。莫斯科仿佛是一个“肿瘤”:“莫斯科……是被自己不幸命运的丝袜捆绑了千年的老太婆”,它“突出来的瘤子,纠缠成密不透风的网络。”在这里,被祛神话化了的旧的、革命前的莫斯科,又被莫斯科的现代神话、莫斯科的科学技术乌托邦、莫斯科的科学幻想所补足。20年代的莫斯科神话往往与那些年的两个口号密切相关:即“要进行世界革命”和“要搞电气化!”这两个思想要求文学的世界性激情,而作家们的创作甚至超出了这个社会订货。他们不仅把莫斯科描绘成全世界的,而且是全宇宙的。莫斯科的现代化不仅闪烁着英雄主义色彩,而且是一种梦想的设计。最能体现这种设计的是在二三十年代有关莫斯科的诗歌里对于地铁的赞颂。
高度发达的工业化,正是20年代莫斯科“魔幻”乌托邦的通常语境。然而,与此同时,还存在另一种与意识形态相对抗的象征符号性的魔幻。这种魔幻使20年代的“莫斯科文本”往往具有两种固定的情节:一是被无产阶级大众所掌握的科学发明,二是集体劳动的思想体制。第一种情节在布尔加科夫的反乌托邦小说《孽卵》和《狗心》之中被典型地运用。
“莫斯科神话”在布尔加科夫的最后一部长篇小说《大师与玛格丽特》中发生了决定性的逆转。在这里,莫斯科不再是耶路撒冷的模板,而是根本的对立。然而,在这一对立中,被特别强调的不是对新世界的期待,而是旧世界的衰朽。小说写道:在莫斯科“太阳被击成粉末”。城市毁灭了,仿佛变成了彼得堡一般的“虚空”。莫斯科神话和彼得堡神话就此合拢在一起:两座城市在精神上都是空虚的。
|
在俄罗斯文化中,莫斯科和彼得堡已经超出城市的地理范畴,作为一种文化符号成为对立的两极:俄罗斯传统文化与西方文化,民族性与现代性,俄罗斯与欧洲,弥赛亚与敌基督等,从而构成了一直以来困扰俄罗斯的关于道路选择和民族身份认证等一系列重大的俄罗斯思想问题。
在“莫斯科神话”的编码中,很大一部分与它的地理形态和构成相关。编年史记载,莫斯科坐落在一片天然形成的如巨型大碗的洼地之中,周围有12座不高的山峦环绕。但据历史学家确认,莫斯科是由七座神奇的山丘组成。它们是波罗维茨、斯列坚斯科、特维尔、三头山、列弗尔托夫、沃罗比约夫和传奇的施维夫。如此一来,围绕着莫斯科到底是由7座山丘还是12座山丘组成就形成了一系列复杂的说法。其中,俄罗斯星相学就将莫斯科划归为金牛座的属性。这不仅是因为这座城市的奠基日(1147年3月28日,史上记载为1147年4月5日)恰好落在黄道带(Зодиак)的金牛座上(有人注意到在古克里姆林宫的三角形里有个牛头,即金牛座的象征),更因为第一罗马和第二罗马的创建日期也是金牛座属性:即罗马建于公元前754年4月22日,而康斯坦丁堡则建于公元330年5月11日。按照当代俄罗斯星相学家巴维尔·格罗巴的观点,莫斯科的不可替代性和宇宙性即由此构成。因为它是按照“七座山丘一条河”的原则建造的,它是一座“永恒之城”。在东正教秘传中,数字7永远被认为是一个具有魔法的数字,它意味着秘密、尚未认识的东西和无法解释的东西。
莫斯科如此的地貌和城市结构,我们可以借尤里·洛特曼的“城市符号学”理论加以阐释:“当一座城市在与周遭的世界中的关系中,就像一座坐落在尘世中心的教堂一般,那么,它首先表现出一种被理想化的宇宙模式来。”这样的城市,通常,“被置于‘大地的中心’。……耶路撒冷、罗马、莫斯科在不同的(城市)文本中正是作为某些世界的中心来看待的。它可以同时既作为天国城市的模型,又作为周边世界的圣地。”这样的城市也被称为“同心城市”。“通常,城市的同心状态在符号学的空间里,是与处在高山之上(群山上)的城市形象相联系的。那样的城市表现为地与天的中介,在它周围集结着一些有关起源、发生嬗变的神话,它具有开始,但没有结束——这是‘永恒之城’。”
除此之外,莫斯科的大火也成为“莫斯科神话”中较为重要的构成元素。莫斯科曾遭受过无数次“火”的历练。历史上比较重要的记载共有四次。1812年的那场大火促成了这座城市的诸多骄傲。战争与大火的破坏,不仅使莫斯科成为“多灾多难”之城的象征,也使它成为俄罗斯最受宠爱的城市。俄罗斯热爱并怜惜着莫斯科,因为从莫斯科身上俄罗斯认出了自己。
如此一来,俄罗斯文学“莫斯科文本”最基本的神话原型通常分为两类:一是有关起源的神话:即莫斯科起源于“七座山丘”或“十二座山丘”的神话和莫斯科作为“向心的”“被护佑的城市”神话。二是关于末日论的神话:即莫斯科的“大火”。“火”的意象在莫斯科文本中往往衍生出两个向度的神话阐释:即莫斯科既是“浴火重生”的“凤凰城”,又是象征“毁灭”的“大墓地”。俄罗斯“白银时代”的研究者们在言涉“莫斯科-彼得堡”的城市哲学时,最早提及了莫斯科城的“凤凰之名”:“在与罗马争夺优先权的斗争中,莫斯科逐渐书写了新的神话,它就是凤凰城”,“从灰烬中得到重生的旧首都吸引了全世界的目光。”这里喻指大火后的莫斯科像凤凰涅槃一样在烈火中重生。“凤凰城”因此而得名。有的文学家认为,莫斯科之所以重要,不仅是因为莫斯科是俄罗斯传统的象征,更重要的是,它与浴火的凤凰有关。它代表着俄罗斯民族源源不断的生命力和重振雄风的可能。
“大墓地”一词出自恰达耶夫的《哲学书简》。在其中,恰达耶夫特别强调说“大墓地指的是莫斯科”。作为俄罗斯思想界西欧派的杰出代表,恰达耶夫将充满着宗法制陈腐之气的莫斯科喻为死亡之城。在第一封信中,恰达耶夫对俄罗斯进行了强烈的谴责:“首先是野蛮的不开化,然后是愚蠢的愚昧,接下来是残暴的,凌辱的异族统治……它除了残暴以外没有兴起过任何东西,除了奴役以外没有温暖过任何东西……我们仅仅生活在界限非常狭隘的现在,没有过去和未来,置身于僵死的停滞。”在恰达耶夫看来,俄罗斯真是一无是处了。俄罗斯构成了人类“精神世界的一处空白”,俄罗斯人“徒有基督徒的虚名”,甚至连俄罗斯人勇敢的天性,也被恰达耶夫视为一种“恶习”。“残暴的、凌辱异族的统治,这一统治方式后来又为我们本民族的当权者所继承。” 《哲学书简》遂成为斯拉夫派和西欧派争论的导火索。在西欧派看来,莫斯科所代表的保守,“维护那些与俄罗斯的历史落后性联接在一起的民族生活的特征”,它“担心欧洲的技术机械、工业的发展”,它认为“与欧洲在形式上的相似的新社会可能戕害俄罗斯精神的独特性,让俄罗斯失去个性”,在这种陈腐保守的民族主义氛围里,莫斯科没有一丝生气,是一座“大墓地”,是“死寂的原子”,是“保守的庞然大物”。
然而,在苏维埃政权的最初年代,“莫斯科神话”发生了本质的变形。当然,这主要与新政权对作家心灵的意识形态高压有关,与将首都重又转向莫斯科有关。从20年代开始,莫斯科神话又显现出两种形态:旧莫斯科被讽刺性地重新提起,当代莫斯科则被理解为乌托邦。在20年代,安德烈·别雷创作了有关革命前的莫斯科三部曲《莫斯科》,这个称谓无可避免地使人把那部他创作于1911年的《彼得堡》联系在一起。在这部小说里,所有过往构成“莫斯科神话”的东西都被颠倒了过来。取代“神圣”的莫斯科的是“万恶的、该死的莫斯科”“站在地狱之上的莫斯科”;取代“家常的莫斯科”的是“小市民的”“鄙俗的”“肮脏的莫斯科”;取代“自然的、生气盎然、蓬勃壮大”的莫斯科的是“衰老的”“病恹恹的”莫斯科。莫斯科仿佛是一个“肿瘤”:“莫斯科……是被自己不幸命运的丝袜捆绑了千年的老太婆”,它“突出来的瘤子,纠缠成密不透风的网络。”在这里,被祛神话化了的旧的、革命前的莫斯科,又被莫斯科的现代神话、莫斯科的科学技术乌托邦、莫斯科的科学幻想所补足。20年代的莫斯科神话往往与那些年的两个口号密切相关:即“要进行世界革命”和“要搞电气化!”这两个思想要求文学的世界性激情,而作家们的创作甚至超出了这个社会订货。他们不仅把莫斯科描绘成全世界的,而且是全宇宙的。莫斯科的现代化不仅闪烁着英雄主义色彩,而且是一种梦想的设计。最能体现这种设计的是在二三十年代有关莫斯科的诗歌里对于地铁的赞颂。
高度发达的工业化,正是20年代莫斯科“魔幻”乌托邦的通常语境。然而,与此同时,还存在另一种与意识形态相对抗的象征符号性的魔幻。这种魔幻使20年代的“莫斯科文本”往往具有两种固定的情节:一是被无产阶级大众所掌握的科学发明,二是集体劳动的思想体制。第一种情节在布尔加科夫的反乌托邦小说《孽卵》和《狗心》之中被典型地运用。
“莫斯科神话”在布尔加科夫的最后一部长篇小说《大师与玛格丽特》中发生了决定性的逆转。在这里,莫斯科不再是耶路撒冷的模板,而是根本的对立。然而,在这一对立中,被特别强调的不是对新世界的期待,而是旧世界的衰朽。小说写道:在莫斯科“太阳被击成粉末”。城市毁灭了,仿佛变成了彼得堡一般的“虚空”。莫斯科神话和彼得堡神话就此合拢在一起:两座城市在精神上都是空虚的。
|
考点1 :“城市符号学”推荐译为”urban semiotics‘’
考点2:“民族身份认证”推荐译为“national identity recognition”
考点3:"白银时代"推荐译为”Silver Age”
考点4:”大墓地”推荐译为”great cemetery”
考点5:“家常的莫斯科”推荐译为“ordinary Moscow”
考点6:“莫斯科如此的地貌和城市结构,我们可以借尤里·洛特曼的‘城市符号学‘理论加以阐释”推荐译为“Such topography and urban structure of Moscow can be interpreted using Yuri Lotman’s theory of ‘urban semiotics’.”
考点7:“东正教秘传”推荐译为”Eastern Orthodox esotericism“
考点18:“凤凰涅槃”推荐译为“phoenix reborn from the ashes”
考点9:”波罗维茨、斯列坚斯科、特维尔、三头山、列弗尔托夫、沃罗比约夫”推荐译为”Borovitsky Hill, Sretensky Hill, Tverskoy Hill, Tryokhgornaya Hill, Lefortovo Hill, Sparrow Hills”
考点10:“人类精神世界的一处空白”推荐译为“a blank spot in the spiritual world of humanity”
考点11:“要搞电气化!”推荐译为“Electrification!”
|
eb104
|
学术论文
|
人文科学
|
103
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Title: Psychological Barriers and Outcomes of Extension Requests in the Workplace: An Empirical Study
Abstract
This study investigates the psychological factors influencing employees' decisions to request deadline extensions in professional settings, with a focus on self-presentation concerns, perceived negative evaluations, and organizational policies. Using a mixed-methods approach involving surveys and behavioral experiments, data were collected from 500 employees across diverse industries. Results indicate that concerns about self-image act as significant barriers to extension requests, while employees who proactively seek extensions demonstrate higher work quality. Gender differences reveal distinct interpersonal concerns affecting willingness to request extensions. The presence of formal extension policies significantly enhances request rates, suggesting actionable interventions for organizations. These findings underscore the need for psychological support mechanisms in workplace environments to mitigate cognitive biases and improve productivity.
1. Introduction
Deadline management is a critical aspect of workplace psychology, where employees often face pressures related to task completion and performance evaluations. Extension requests—formal appeals for additional time—represent a common yet understudied behavior in organizational psychology. Previous research has highlighted psychological barriers such as fear of negative judgment and self-presentation anxieties, which can deter employees from seeking necessary accommodations. The broader field of psychology emphasizes that cognitive distortions, including overestimation of negative outcomes, are pervasive in decision-making processes. For instance, studies on personality disorders reveal how maladaptive thought patterns exacerbate interpersonal conflicts, paralleling workplace dynamics where employees misjudge supervisors' reactions.8 This study integrates these insights to examine how psychological factors influence extension requests and their correlation with work outcomes. Theoretical frameworks from cognitive psychology and organizational behavior guide this inquiry, with hypotheses centered on gender disparities and policy impacts.
2. Method
2.1 Participants
A total of 500 full-time employees (46% male, 54% female; mean age = 34.2 years, SD = 8.5) were recruited from technology, healthcare, and education sectors. Participants represented varied organizational roles, including entry-level staff (40%), middle management (35%), and senior executives (25%). Inclusion criteria required at least one year of employment to ensure familiarity with workplace protocols. Compensation included monetary incentives and confidentiality assurances.
2.2 Design and Procedure
A sequential mixed-methods design was employed, comprising:
- Survey Phase: Participants completed an online questionnaire assessing self-presentation concerns (e.g., "I worry that requesting an extension will make me seem incompetent"), perceived supervisor reactions, and past extension behaviors. Scales used a 7-point Likert format, validated in prior cognitive psychology research for reliability (Cronbach’s α = 0.85).
- Experimental Phase: A subgroup of 200 participants engaged in a simulated task scenario involving urgent vs. non-urgent deadlines. Behavioral data on request timing, task quality, and post-request anxiety were recorded. Scenarios were counterbalanced to control for order effects.
- Data collection occurred over three months, with ethics approval obtained from an institutional review board. All instruments adhered to APA guidelines for psychological assessments.
2.3 Measures
Key variables included:
- Self-Presentation Concerns: Measured via the Workplace Anxiety Scale (WAS), adapted from studies on cognitive biases.
- Work Quality: Evaluated using supervisor ratings on a 10-point scale for tasks completed with vs. without extensions.
- Perceived Negative Evaluations: Captured through vignette-based questions derived from social psychology frameworks.
- Organizational Policies: Assessed by examining company handbooks and participant reports on formal extension protocols.
3. Results
3.1 Quantitative Findings
Results from regression analyses revealed that self-presentation concerns were the strongest predictor of avoidance behaviors (β = 0.42, p < .001), accounting for 65% of variance in extension request reluctance. Employees who requested extensions exhibited 23% higher work quality scores (M = 8.2, SD = 1.1) compared to non-requesters (M = 6.7, SD = 1.5), supporting the hypothesis that proactive requests correlate with superior outcomes. Gender differences emerged significantly (p = .02), with women reporting higher interpersonal concerns (e.g., fear of burdening others) rather than self-competence doubts, aligning with trends in health psychology research on gendered communication patterns.
3.2 Qualitative Insights
Thematic analysis of open-ended responses identified recurring themes:
- Overestimation of negative supervisor evaluations was common across genders, with 78% of participants inflating perceived criticism.
- In non-urgent task scenarios, supervisors prioritized quality over speed, reducing negative feedback when extensions were requested.
- Formal organizational policies (e.g., clear request guidelines) boosted request willingness by 40%, mitigating psychological barriers through structured support.
4. Discussion
This study demonstrates that psychological barriers to extension requests stem primarily from cognitive distortions, such as overestimating negative judgments, which align with broader findings in mental health research. The positive association between extension requests and work quality underscores that employees seeking accommodations engage in more deliberate task execution, challenging assumptions that extensions indicate poor performance. Gender-specific concerns highlight the need for tailored interventions, as women's reluctance is driven more by interpersonal dynamics than self-doubt—a nuance consistent with recent APA reports on workplace psychology trends.
The role of organizational policies emerges as a key moderator, reinforcing that formal structures reduce ambiguity and anxiety, thereby fostering psychological safety. Compared to prior studies on educational psychology, where deadline extensions are common, workplace contexts amplify barriers due to hierarchical dynamics. Limitations include reliance on self-reported data and sector-specific sampling, which may limit generalizability. Future research should explore cross-cultural variations and longitudinal designs to track behavioral changes over time.
5. Conclusion
Employees' decisions to request deadline extensions are significantly influenced by psychological factors, including self-presentation fears and cognitive biases, with notable gender differences in underlying concerns. Organizations can enhance productivity and well-being by implementing formal extension policies and psychological support programs. This study contributes to workplace psychology by providing empirical evidence for interventions that address cognitive distortions, ultimately promoting healthier work environments.
6. Extending the Research: Policy Interventions and Cognitive Mechanisms
Building on the foundational findings of our study, this section explores actionable strategies for organizations and theoretical contributions to workplace psychology.
6.1 Organizational Policy Design
The study’s results underscore that formal extension policies reduce psychological barriers by 40%, but their design requires nuance. Effective policies should:
- Clarify Eligibility Criteria: Transparent guidelines (e.g., "Extensions permitted for tasks exceeding 8 hours of work") mitigate ambiguity-induced anxiety. A 2024 meta-analysis confirms that rule clarity decreases perceived request "stigma" by 31%.
- Decentralize Approval Authority: Allowing team leads (vs. senior managers) to approve requests reduces hierarchical intimidation, particularly for junior employees.
- Normalize Extensions as Productivity Tools: Case studies from tech firms show that framing extensions as "quality optimization periods" (e.g., Google’s "20% time" model) increases utilization without penalizing performance metrics.
6.2 Cognitive-Behavioral Interventions
Employees’ overestimation of negative evaluations mirrors clinical findings in social anxiety research. Adapting therapeutic techniques could yield workplace benefits:
- Reframing Exercises: Training sessions teaching employees to challenge cognitive distortions (e.g., "My supervisor will think I’m lazy") reduced avoidance behaviors by 22% in a pilot study.
- Graded Exposure: Gradually increasing exposure to extension requests (e.g., starting with low-stakes tasks) builds confidence, akin to exposure therapy for phobias.
- Feedback Loops: Anonymous peer data sharing (e.g., "70% of your team requested extensions last quarter") corrects pluralistic ignorance, where employees falsely assume they are outliers.
6.3 Cross-Cultural and Longitudinal Gaps
While this study focused on Western corporate contexts, Hofstede’s cultural dimensions theory suggests collectivist cultures (e.g., Japan) may exhibit heightened group harmony concerns, further deterring requests. Future research should:
- Compare extension behaviors in high-power-distance vs. egalitarian cultures.
- Track long-term effects of policy changes using controlled trials (e.g., A/B testing different policy formats across office branches).
6.4 Theoretical Contributions
This work bridges gaps between clinical psychology and organizational behavior by:
- Extending Cognitive Distortion Models: Demonstrating how workplace-specific distortions (e.g., "extension = failure") parallel maladaptive beliefs in anxiety disorders.
- Redefining Procrastination: Proactive extension requests may represent strategic delay rather than avoidance, challenging traditional procrastination frameworks.
|
Title: Psychological Barriers and Outcomes of Extension Requests in the Workplace: An Empirical Study
Abstract
This study investigates the psychological factors influencing employees' decisions to request deadline extensions in professional settings, with a focus on self-presentation concerns, perceived negative evaluations, and organizational policies. Using a mixed-methods approach involving surveys and behavioral experiments, data were collected from 500 employees across diverse industries. Results indicate that concerns about self-image act as significant barriers to extension requests, while employees who proactively seek extensions demonstrate higher work quality. Gender differences reveal distinct interpersonal concerns affecting willingness to request extensions. The presence of formal extension policies significantly enhances request rates, suggesting actionable interventions for organizations. These findings underscore the need for psychological support mechanisms in workplace environments to mitigate cognitive biases and improve productivity.
1. Introduction
Deadline management is a critical aspect of workplace psychology, where employees often face pressures related to task completion and performance evaluations. Extension requests—formal appeals for additional time—represent a common yet understudied behavior in organizational psychology. Previous research has highlighted psychological barriers such as fear of negative judgment and self-presentation anxieties, which can deter employees from seeking necessary accommodations. The broader field of psychology emphasizes that cognitive distortions, including overestimation of negative outcomes, are pervasive in decision-making processes. For instance, studies on personality disorders reveal how maladaptive thought patterns exacerbate interpersonal conflicts, paralleling workplace dynamics where employees misjudge supervisors' reactions.8 This study integrates these insights to examine how psychological factors influence extension requests and their correlation with work outcomes. Theoretical frameworks from cognitive psychology and organizational behavior guide this inquiry, with hypotheses centered on gender disparities and policy impacts.
2. Method
2.1 Participants
A total of 500 full-time employees (46% male, 54% female; mean age = 34.2 years, SD = 8.5) were recruited from technology, healthcare, and education sectors. Participants represented varied organizational roles, including entry-level staff (40%), middle management (35%), and senior executives (25%). Inclusion criteria required at least one year of employment to ensure familiarity with workplace protocols. Compensation included monetary incentives and confidentiality assurances.
2.2 Design and Procedure
A sequential mixed-methods design was employed, comprising:
- Survey Phase: Participants completed an online questionnaire assessing self-presentation concerns (e.g., "I worry that requesting an extension will make me seem incompetent"), perceived supervisor reactions, and past extension behaviors. Scales used a 7-point Likert format, validated in prior cognitive psychology research for reliability (Cronbach’s α = 0.85).
- Experimental Phase: A subgroup of 200 participants engaged in a simulated task scenario involving urgent vs. non-urgent deadlines. Behavioral data on request timing, task quality, and post-request anxiety were recorded. Scenarios were counterbalanced to control for order effects.
- Data collection occurred over three months, with ethics approval obtained from an institutional review board. All instruments adhered to APA guidelines for psychological assessments.
2.3 Measures
Key variables included:
- Self-Presentation Concerns: Measured via the Workplace Anxiety Scale (WAS), adapted from studies on cognitive biases.
- Work Quality: Evaluated using supervisor ratings on a 10-point scale for tasks completed with vs. without extensions.
- Perceived Negative Evaluations: Captured through vignette-based questions derived from social psychology frameworks.
- Organizational Policies: Assessed by examining company handbooks and participant reports on formal extension protocols.
3. Results
3.1 Quantitative Findings
Results from regression analyses revealed that self-presentation concerns were the strongest predictor of avoidance behaviors (β = 0.42, p < .001), accounting for 65% of variance in extension request reluctance. Employees who requested extensions exhibited 23% higher work quality scores (M = 8.2, SD = 1.1) compared to non-requesters (M = 6.7, SD = 1.5), supporting the hypothesis that proactive requests correlate with superior outcomes. Gender differences emerged significantly (p = .02), with women reporting higher interpersonal concerns (e.g., fear of burdening others) rather than self-competence doubts, aligning with trends in health psychology research on gendered communication patterns.
3.2 Qualitative Insights
Thematic analysis of open-ended responses identified recurring themes:
- Overestimation of negative supervisor evaluations was common across genders, with 78% of participants inflating perceived criticism.
- In non-urgent task scenarios, supervisors prioritized quality over speed, reducing negative feedback when extensions were requested.
- Formal organizational policies (e.g., clear request guidelines) boosted request willingness by 40%, mitigating psychological barriers through structured support.
4. Discussion
This study demonstrates that psychological barriers to extension requests stem primarily from cognitive distortions, such as overestimating negative judgments, which align with broader findings in mental health research. The positive association between extension requests and work quality underscores that employees seeking accommodations engage in more deliberate task execution, challenging assumptions that extensions indicate poor performance. Gender-specific concerns highlight the need for tailored interventions, as women's reluctance is driven more by interpersonal dynamics than self-doubt—a nuance consistent with recent APA reports on workplace psychology trends.
The role of organizational policies emerges as a key moderator, reinforcing that formal structures reduce ambiguity and anxiety, thereby fostering psychological safety. Compared to prior studies on educational psychology, where deadline extensions are common, workplace contexts amplify barriers due to hierarchical dynamics. Limitations include reliance on self-reported data and sector-specific sampling, which may limit generalizability. Future research should explore cross-cultural variations and longitudinal designs to track behavioral changes over time.
5. Conclusion
Employees' decisions to request deadline extensions are significantly influenced by psychological factors, including self-presentation fears and cognitive biases, with notable gender differences in underlying concerns. Organizations can enhance productivity and well-being by implementing formal extension policies and psychological support programs. This study contributes to workplace psychology by providing empirical evidence for interventions that address cognitive distortions, ultimately promoting healthier work environments.
6. Extending the Research: Policy Interventions and Cognitive Mechanisms
Building on the foundational findings of our study, this section explores actionable strategies for organizations and theoretical contributions to workplace psychology.
6.1 Organizational Policy Design
The study’s results underscore that formal extension policies reduce psychological barriers by 40%, but their design requires nuance. Effective policies should:
- Clarify Eligibility Criteria: Transparent guidelines (e.g., "Extensions permitted for tasks exceeding 8 hours of work") mitigate ambiguity-induced anxiety. A 2024 meta-analysis confirms that rule clarity decreases perceived request "stigma" by 31%.
- Decentralize Approval Authority: Allowing team leads (vs. senior managers) to approve requests reduces hierarchical intimidation, particularly for junior employees.
- Normalize Extensions as Productivity Tools: Case studies from tech firms show that framing extensions as "quality optimization periods" (e.g., Google’s "20% time" model) increases utilization without penalizing performance metrics.
6.2 Cognitive-Behavioral Interventions
Employees’ overestimation of negative evaluations mirrors clinical findings in social anxiety research. Adapting therapeutic techniques could yield workplace benefits:
- Reframing Exercises: Training sessions teaching employees to challenge cognitive distortions (e.g., "My supervisor will think I’m lazy") reduced avoidance behaviors by 22% in a pilot study.
- Graded Exposure: Gradually increasing exposure to extension requests (e.g., starting with low-stakes tasks) builds confidence, akin to exposure therapy for phobias.
- Feedback Loops: Anonymous peer data sharing (e.g., "70% of your team requested extensions last quarter") corrects pluralistic ignorance, where employees falsely assume they are outliers.
6.3 Cross-Cultural and Longitudinal Gaps
While this study focused on Western corporate contexts, Hofstede’s cultural dimensions theory suggests collectivist cultures (e.g., Japan) may exhibit heightened group harmony concerns, further deterring requests. Future research should:
- Compare extension behaviors in high-power-distance vs. egalitarian cultures.
- Track long-term effects of policy changes using controlled trials (e.g., A/B testing different policy formats across office branches).
6.4 Theoretical Contributions
This work bridges gaps between clinical psychology and organizational behavior by:
- Extending Cognitive Distortion Models: Demonstrating how workplace-specific distortions (e.g., "extension = failure") parallel maladaptive beliefs in anxiety disorders.
- Redefining Procrastination: Proactive extension requests may represent strategic delay rather than avoidance, challenging traditional procrastination frameworks.
|
考点1:”self-presentation concerns“应该译为“自我呈现顾虑”,是社会心理学的专业术语。
考点2:”mixed-methods approach”应译为“混合方法研究”。
考点3:“ognitive biases”不应译为“认知偏见”。
考点4:”Cronbach’s α“应译为“克朗巴赫系数”,是统计学的专业术语。
考点5:”Graded Exposure“应译为“分级暴露”。
考点6:”with ethics approval obtained from an institutional review board”应翻译为”机构审查委员会的伦理批准“
|
ee41f
|
学术论文
|
社会科学
|
35
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
2025年6月9日上午,江苏省选考化学、地理的考生完成了高考“成人礼”。在考场外,一位妈妈手捧顶流玩偶Labubu花束的身影格外引人注目,她的这一暖心举动,为紧张的高考增添了一抹别样的色彩。
这位妈妈透露,女儿一直很喜欢Labubu,然而上学期间由于学业繁重,没怎么让她去购买。如今高考结束,她特意带着Labubu花束来迎接女儿,就是希望女儿能够开开心心的。在妈妈心中,高考只是人生中的一场考试,女儿永远是最棒的,她期待着女儿未来能做自己喜欢的事,成为想成为的人。这份深沉的爱与满满的仪式感,让人动容。
Labubu的爆火并非偶然。从设计层面来看,它打破了传统玩具甜美的范式,走丑萌路线,尖耳朵、圆眼睛以及带有尖牙的露齿笑容,将可爱与神秘的气息巧妙融合,满足了年轻一代追求个性化表达的需求。在营销方面,泡泡玛特借助盲盒机制,通过推出限量版、隐藏版来制造稀缺性,极大地刺激了消费者的购买欲望。再加上明星效应和社交媒体的广泛传播,Labubu想不火都难。此外,它还推出各地特色限定款,如新加坡限定版鱼尾狮Labubu,精准适配了不同地区的本土化审美需求。
近年来,高考考场外家长们的应援方式可谓花样百出。从传统的横幅、鲜花和拥抱,到如今的“烧烤花”“985现金花束”等,这些独特的应援背后,折射出当代家长的教育智慧和对孩子深深的爱。“烧烤花”承载着孩子备考期间对美食的念想,传递着父母无声的承诺:无论结果如何,生活本味永远值得期待;“985现金花束”则寄托了家长期盼孩子金榜题名、直抵顶尖学府的热望。
教育专家指出,高考压力往往源于对“完美结局”的过度追求,家长应该学会“科学助攻”,用更理性、更贴心的方式支持孩子。比如,有的家长用Excel表格梳理考试日程,用便签纸记录孩子情绪波动,通过模拟填报志愿系统提前演练决策过程,这种“润物细无声”的支持,远比考场外的鲜花横幅更有力量。在漫漫人生长河中,总有一些时刻,宛如熠熠星辰,照亮我们前行的道路,成为生命中难以磨灭的珍贵记忆。对于无数中国学子而言,高考,无疑就是这样一个至关重要的时刻。它不仅仅是一场知识的检验,更是一场盛大的人生“成人礼”,承载着青春的梦想、奋斗的汗水,以及家庭的殷切期望。
回到这位带Labubu花束的妈妈身上,她关注到了孩子的喜好和情绪,让孩子知道,高考不是终点,家人的爱与支持才是最坚实的后盾。这也给众多家长提了个醒,比起成绩,孩子的快乐和内心需求同样重要。高考只是人生的一个阶段,未来还有更多的可能性等待着孩子们去探索。希望每一位考生都能在家人的关爱和支持下,勇敢地迈向新的征程,实现自己的梦想。
|
2025年6月9日上午,江苏省选考化学、地理的考生完成了高考“成人礼”。在考场外,一位妈妈手捧顶流玩偶Labubu花束的身影格外引人注目,她的这一暖心举动,为紧张的高考增添了一抹别样的色彩。
这位妈妈透露,女儿一直很喜欢Labubu,然而上学期间由于学业繁重,没怎么让她去购买。如今高考结束,她特意带着Labubu花束来迎接女儿,就是希望女儿能够开开心心的。在妈妈心中,高考只是人生中的一场考试,女儿永远是最棒的,她期待着女儿未来能做自己喜欢的事,成为想成为的人。这份深沉的爱与满满的仪式感,让人动容。
Labubu的爆火并非偶然。从设计层面来看,它打破了传统玩具甜美的范式,走丑萌路线,尖耳朵、圆眼睛以及带有尖牙的露齿笑容,将可爱与神秘的气息巧妙融合,满足了年轻一代追求个性化表达的需求。在营销方面,泡泡玛特借助盲盒机制,通过推出限量版、隐藏版来制造稀缺性,极大地刺激了消费者的购买欲望。再加上明星效应和社交媒体的广泛传播,Labubu想不火都难。此外,它还推出各地特色限定款,如新加坡限定版鱼尾狮Labubu,精准适配了不同地区的本土化审美需求。
近年来,高考考场外家长们的应援方式可谓花样百出。从传统的横幅、鲜花和拥抱,到如今的“烧烤花”“985现金花束”等,这些独特的应援背后,折射出当代家长的教育智慧和对孩子深深的爱。“烧烤花”承载着孩子备考期间对美食的念想,传递着父母无声的承诺:无论结果如何,生活本味永远值得期待;“985现金花束”则寄托了家长期盼孩子金榜题名、直抵顶尖学府的热望。
教育专家指出,高考压力往往源于对“完美结局”的过度追求,家长应该学会“科学助攻”,用更理性、更贴心的方式支持孩子。比如,有的家长用Excel表格梳理考试日程,用便签纸记录孩子情绪波动,通过模拟填报志愿系统提前演练决策过程,这种“润物细无声”的支持,远比考场外的鲜花横幅更有力量。在漫漫人生长河中,总有一些时刻,宛如熠熠星辰,照亮我们前行的道路,成为生命中难以磨灭的珍贵记忆。对于无数中国学子而言,高考,无疑就是这样一个至关重要的时刻。它不仅仅是一场知识的检验,更是一场盛大的人生“成人礼”,承载着青春的梦想、奋斗的汗水,以及家庭的殷切期望。
回到这位带Labubu花束的妈妈身上,她关注到了孩子的喜好和情绪,让孩子知道,高考不是终点,家人的爱与支持才是最坚实的后盾。这也给众多家长提了个醒,比起成绩,孩子的快乐和内心需求同样重要。高考只是人生的一个阶段,未来还有更多的可能性等待着孩子们去探索。希望每一位考生都能在家人的关爱和支持下,勇敢地迈向新的征程,实现自己的梦想。
|
考点1:顶尖 可译为 top-tier 或 elite 或其它正确词汇。
考点2:烧烤花 需译为 barbecue bouquet,不可译为 barbecue flowers,此处是花束的意思。
考点3:985现金花束 可译为 985 cash bouquet。
考点4:对于“高考”的译法,全文应保持一致,不能既用college entrance examination,又用gaokao。
|
f14f2
|
新闻资讯
|
观点评论
|
3
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
THE RIGHT TO BE FORGOTTENJeffrey Rosen*At the end of January, the European Commissioner for Justice, Fundamen- tal Rights, and Citizenship, Viviane Reding, announced the European Commission’s proposal to create a sweeping new privacy right—the “right to be forgotten.” The right, which has been hotly debated in Europe for the past few years, has finally been codified as part of a broad new proposed data protection regulation. Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade. The right to be forgotten could make Facebook and Google, for example, liable for up to two percent of their global income if they fail to remove photos that people post about themselves and later regret, even if the photos have been widely distributed already. Unless the right is defined more precisely when it is promulgated over the next year or so, it could precipitate a dramatic clash between European and American conceptions of the proper balance between privacy and free speech, leading to a far less open Internet.In theory, the right to be forgotten addresses an urgent problem in the digital age: it is very hard to escape your past on the Internet now that every photo, status update, and tweet lives forever in the cloud. But Europeans and Americans have diametrically opposed approaches to the problem. In Europe, the intellectual roots of the right to be forgotten can be found in French law, which recognizes le droit à l’oubli—or the “right of oblivion”—a right that allows a convicted criminal who has served his time and been rehabilitated to object to the publication of the facts of his conviction and incarceration. In America, by contrast, publication of someone’s criminal history is protected by the First Amendment, leading Wikipedia to resist the efforts by two Germans convicted of murdering a famous actor to remove their criminal history from the actor’s Wikipedia page.European regulators believe that all citizens face the difficulty of escaping their past now that the Internet records everything and forgets nothing—a difficulty that used to be limited to convicted criminals. When Commissioner Reding announced the new right to be forgotten on January 22, she noted the particular risk to teenagers who might reveal compromising information that they would later come to regret. She then articulated the core provision of the “right to be forgotten”: “If an individual no longer wants his personal data to be processed or stored by a data controller, and if there is no legitimate reason for keeping it, the data should be removed from their system.” In endorsing the new right, Reding downplayed its effect on free speech. “It is clear that the right to be forgotten cannot amount to a right of the total erasure of history,” she said.3 And relying on Reding’s speeches, press accounts of the newly proposed right to be forgotten have been similarly reassuring about its effect on free speech. In a post at the Atlantic.com, Why Journalists Shouldn’t Fear Europe’s ‘Right to be Forgotten,’ John Hendel writes that although the original proposals a year ago “would have potentially given people the ability to cull any digital reference—from the public record, journalism, or social networks—they deemed irrelevant and unflattering,” Reding had proposed a narrower definition of data that people have the right to remove: namely “personal data [people] have given out themselves.”4 According to Hendel “[t]his provision is key. The overhaul insists that Internet users control the data they put online, not the references in media or anywhere else.” But Hendel seems not to have parsed the regulations that were actually proposed three days later on January 25. They are not limited to personal data that people “have given out themselves”; instead, they create a new right to delete personal data, defined broadly as “any information relating to a data subject.”6 For this reason, they arguably create a legally enforceable right to demand the deletion of any photos or data that I post myself, even after they’ve gone viral, not to mention unflattering photos that include me or information about me that others post, whether or not it is true. In a widely cited blog post last March, Peter Fleischer, chief privacy counsel of Google, notes that the right to be forgotten, as discussed in Europe, often covers three separate categories, each of which proposes progressively greater threats to free speech.7 And the right to be forgotten, as proposed at the end of January, arguably applies in all three of Fleischer’s categories.The first category is the least controversial: “If I post something online, do I have the right to delete it again?” This involves cases where I post a photo on Facebook and later think better of it and want to take it down. Since Facebook and other social networking sites already allow me to do this, creating a legally enforceable right here is mostly symbolic and entirely unobjectionable. As proposed, the European right to be forgotten would also usefully put pressure on Facebook to abide by its own stated privacy policies by allowing users to confirm that photos and other data have been deleted from its archives after they are removed from public display. But the right to delete data becomes far more controversial when it involves Fleischer’s second category: “If I post something, and someone else copies it and re-posts it on their own site, do I have the right to delete it?” Imagine a teenager regrets posting a picture of herself with a bottle of beer on her own site and after deleting it, later discovers that several of her friends have copied and reposted the picture on their own sites. If she asks them to take down the pictures, and her friends refuse or cannot be found, should Facebook be forced to delete the picture from her friends’ albums without the owners’ consent based solely on the teenager’s objection? According to the proposed European Right to Forget, the default answer is almost certainly yes. According to the regulation, when someone demands the erasure of personal data, an Internet Service Provider “shall carry out the erasure without delay,” unless the retention of the data is “necessary” for exercising “the right of freedom of expression,” as defined by member states in their local laws.
|
THE RIGHT TO BE FORGOTTENJeffrey Rosen*At the end of January, the European Commissioner for Justice, Fundamen- tal Rights, and Citizenship, Viviane Reding, announced the European Commission’s proposal to create a sweeping new privacy right—the “right to be forgotten.” The right, which has been hotly debated in Europe for the past few years, has finally been codified as part of a broad new proposed data protection regulation. Although Reding depicted the new right as a modest expansion of existing data privacy rights, in fact it represents the biggest threat to free speech on the Internet in the coming decade. The right to be forgotten could make Facebook and Google, for example, liable for up to two percent of their global income if they fail to remove photos that people post about themselves and later regret, even if the photos have been widely distributed already. Unless the right is defined more precisely when it is promulgated over the next year or so, it could precipitate a dramatic clash between European and American conceptions of the proper balance between privacy and free speech, leading to a far less open Internet.In theory, the right to be forgotten addresses an urgent problem in the digital age: it is very hard to escape your past on the Internet now that every photo, status update, and tweet lives forever in the cloud. But Europeans and Americans have diametrically opposed approaches to the problem. In Europe, the intellectual roots of the right to be forgotten can be found in French law, which recognizes le droit à l’oubli—or the “right of oblivion”—a right that allows a convicted criminal who has served his time and been rehabilitated to object to the publication of the facts of his conviction and incarceration. In America, by contrast, publication of someone’s criminal history is protected by the First Amendment, leading Wikipedia to resist the efforts by two Germans convicted of murdering a famous actor to remove their criminal history from the actor’s Wikipedia page.European regulators believe that all citizens face the difficulty of escaping their past now that the Internet records everything and forgets nothing—a difficulty that used to be limited to convicted criminals. When Commissioner Reding announced the new right to be forgotten on January 22, she noted the particular risk to teenagers who might reveal compromising information that they would later come to regret. She then articulated the core provision of the “right to be forgotten”: “If an individual no longer wants his personal data to be processed or stored by a data controller, and if there is no legitimate reason for keeping it, the data should be removed from their system.” In endorsing the new right, Reding downplayed its effect on free speech. “It is clear that the right to be forgotten cannot amount to a right of the total erasure of history,” she said.3 And relying on Reding’s speeches, press accounts of the newly proposed right to be forgotten have been similarly reassuring about its effect on free speech. In a post at the Atlantic.com, Why Journalists Shouldn’t Fear Europe’s ‘Right to be Forgotten,’ John Hendel writes that although the original proposals a year ago “would have potentially given people the ability to cull any digital reference—from the public record, journalism, or social networks—they deemed irrelevant and unflattering,” Reding had proposed a narrower definition of data that people have the right to remove: namely “personal data [people] have given out themselves.”4 According to Hendel “[t]his provision is key. The overhaul insists that Internet users control the data they put online, not the references in media or anywhere else.” But Hendel seems not to have parsed the regulations that were actually proposed three days later on January 25. They are not limited to personal data that people “have given out themselves”; instead, they create a new right to delete personal data, defined broadly as “any information relating to a data subject.”6 For this reason, they arguably create a legally enforceable right to demand the deletion of any photos or data that I post myself, even after they’ve gone viral, not to mention unflattering photos that include me or information about me that others post, whether or not it is true. In a widely cited blog post last March, Peter Fleischer, chief privacy counsel of Google, notes that the right to be forgotten, as discussed in Europe, often covers three separate categories, each of which proposes progressively greater threats to free speech.7 And the right to be forgotten, as proposed at the end of January, arguably applies in all three of Fleischer’s categories.The first category is the least controversial: “If I post something online, do I have the right to delete it again?” This involves cases where I post a photo on Facebook and later think better of it and want to take it down. Since Facebook and other social networking sites already allow me to do this, creating a legally enforceable right here is mostly symbolic and entirely unobjectionable. As proposed, the European right to be forgotten would also usefully put pressure on Facebook to abide by its own stated privacy policies by allowing users to confirm that photos and other data have been deleted from its archives after they are removed from public display. But the right to delete data becomes far more controversial when it involves Fleischer’s second category: “If I post something, and someone else copies it and re-posts it on their own site, do I have the right to delete it?” Imagine a teenager regrets posting a picture of herself with a bottle of beer on her own site and after deleting it, later discovers that several of her friends have copied and reposted the picture on their own sites. If she asks them to take down the pictures, and her friends refuse or cannot be found, should Facebook be forced to delete the picture from her friends’ albums without the owners’ consent based solely on the teenager’s objection? According to the proposed European Right to Forget, the default answer is almost certainly yes. According to the regulation, when someone demands the erasure of personal data, an Internet Service Provider “shall carry out the erasure without delay,” unless the retention of the data is “necessary” for exercising “the right of freedom of expression,” as defined by member states in their local laws.
|
考点1:“codified”应译为“编入法典”
考点2:“First Amendment”应译为“第一修正案”
考点3:“think better of it”应译为“改变了主意”
考点4:“legally enforceable right”应译为“具有法律强制执行力的权利“
|
f2351
|
垂类场景
|
法律
|
46
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
Toni Morrison, born Chloe Anthony Wofford in 1931, was the second of four children. Her father, a shipyard welder and a gifted storyteller, and her mother, a religious woman skilled at singing church songs, moved from the South to Ohio, hoping to raise their children in an environment more welcoming to Black people. Although they had moved to the North, the Woffords maintained a family atmosphere where the oral traditions of Southern Black culture remained highly influential. Undoubtedly, this family atmosphere, filled with songs, stories, and women’s gossip, had a profound impact on her creative writing. A significant aspect of Morrison's literary endeavor has been to craft a distinct voice for Black Americans, one that draws its strength from the oral art forms of Afro-American culture.
Examples of this oral tradition are found throughout Morrison’s novels, where music is used as a tool to express the joys and soothe the sorrows of Black people. This Africanist musical language was often inaccessible to a white audience. By grounding her literary craftsmanship in Black musical traditions, she consciously distances herself from mainstream Anglo-American writers. Through her multi-layered lyrical narration, interweaving stories with music, myth, and other oral forms, Morrison offers readers vivid portrayals of the African-American experience—their love, loneliness, struggles, quests, traditions, and history. The characters and places she created, the scenes she imagined, and her explorations of humanity and bittersweet love all constitute an oeuvre unparalleled in contemporary American literature.
Morrison’s ability to intricately draw on these traditions stems from her rich personal experience. In a 1992 interview, she stated that she considers herself lucky to have learned two languages: “one from books and the other from the storytelling at large family gatherings that always took place when someone came up from the South.” This childhood experience is reflected in her unique writing style, which masterfully combines modern literary forms with ancient modes of discourse.
Music, in particular, held a special power for Morrison. Raised in a music-rich environment, she was surrounded by a family of musicians, including her mother and grandparents. She recalled waking up to her mother’s voice each morning, learning to understand its subtle nuances—its tone, volume, and timbre—which conveyed whether her mother was happy, sad, or angry. In her childhood world, the sound of music often spoke more powerfully than the words themselves.
Though immersed in this environment, Morrison was a listener rather than a performer. Claiming no natural gift for music, she recalled with frustration being sent with her sister to learn piano from a book. This theme of a complex relationship with music—both as a source of cultural heritage and a marker of social status—is powerfully explored in her novel Song of Solomon.
The novel presents characters whose identities are deeply tied to their acceptance or rejection of their musical heritage. For instance, Macon Dead II, who has become well-off and successful, strives to climb the social ladder. As a result, he rejects his sister, Pilate, because of her low social status and her deep connection to their family’s folk traditions. By all accounts, Pilate is a peculiar old woman who makes a living selling bootleg whiskey and lives without modern conveniences. Yet, she is the keeper of the family’s history, which she preserves in the songs she sings—a responsibility she believes was dictated to her by her father’s ghost. Despite his snobbery, Macon cannot resist the temptation of sneaking around Pilate’s house, listening to the three women inside singing by candlelight. He is caught in a dilemma, torn between the restrictive sophistication required for upward mobility and the free, soul-soothing musical expressions emanating from his sister’s home.
Ultimately, Macon chooses to reject Pilate and her music, thereby detaching himself from his family's history and roots. It is his son, Milkman, who embarks on a journey to seek his own identity, a journey that involves reconnecting with the very traditions his father spurned. This quest for self-discovery is intertwined with a mysterious song that holds the key to his family’s past.
The song first appears in the novel on the night of Milkman’s birth. As a man in blue wings attempts suicide, Pilate stands on the hospital steps and begins to sing “in a powerful contralto.” The song, considered the novel's most valuable treasure, is sung by children and elders, evolving as it is passed down. It interweaves the myth of a flying African slave with the history of the Dead family. This act of storytelling through music embeds Afro-American mythology into the family's oral tradition, ensuring it is handed down from generation to generation.
When asked about the "flying African" myth, Morrison explained that while she found references to it in slave narratives, she could not find hard data on its origins. She believed this was precisely its power. Myth, she argued, is “the way people learn narrative. Myth is the first information there is, and it conveys far more than what is explicitly stated.” It is clear that Morrison has faith in the ability of myth to communicate profound, nonspecific knowledge. In Song of Solomon, she gives voice to music to unearth this mythic core, providing a framework for the novel’s central themes of history, identity, and freedom.
|
Toni Morrison, born Chloe Anthony Wofford in 1931, was the second of four children. Her father, a shipyard welder and a gifted storyteller, and her mother, a religious woman skilled at singing church songs, moved from the South to Ohio, hoping to raise their children in an environment more welcoming to Black people. Although they had moved to the North, the Woffords maintained a family atmosphere where the oral traditions of Southern Black culture remained highly influential. Undoubtedly, this family atmosphere, filled with songs, stories, and women’s gossip, had a profound impact on her creative writing. A significant aspect of Morrison's literary endeavor has been to craft a distinct voice for Black Americans, one that draws its strength from the oral art forms of Afro-American culture.
Examples of this oral tradition are found throughout Morrison’s novels, where music is used as a tool to express the joys and soothe the sorrows of Black people. This Africanist musical language was often inaccessible to a white audience. By grounding her literary craftsmanship in Black musical traditions, she consciously distances herself from mainstream Anglo-American writers. Through her multi-layered lyrical narration, interweaving stories with music, myth, and other oral forms, Morrison offers readers vivid portrayals of the African-American experience—their love, loneliness, struggles, quests, traditions, and history. The characters and places she created, the scenes she imagined, and her explorations of humanity and bittersweet love all constitute an oeuvre unparalleled in contemporary American literature.
Morrison’s ability to intricately draw on these traditions stems from her rich personal experience. In a 1992 interview, she stated that she considers herself lucky to have learned two languages: “one from books and the other from the storytelling at large family gatherings that always took place when someone came up from the South.” This childhood experience is reflected in her unique writing style, which masterfully combines modern literary forms with ancient modes of discourse.
Music, in particular, held a special power for Morrison. Raised in a music-rich environment, she was surrounded by a family of musicians, including her mother and grandparents. She recalled waking up to her mother’s voice each morning, learning to understand its subtle nuances—its tone, volume, and timbre—which conveyed whether her mother was happy, sad, or angry. In her childhood world, the sound of music often spoke more powerfully than the words themselves.
Though immersed in this environment, Morrison was a listener rather than a performer. Claiming no natural gift for music, she recalled with frustration being sent with her sister to learn piano from a book. This theme of a complex relationship with music—both as a source of cultural heritage and a marker of social status—is powerfully explored in her novel Song of Solomon.
The novel presents characters whose identities are deeply tied to their acceptance or rejection of their musical heritage. For instance, Macon Dead II, who has become well-off and successful, strives to climb the social ladder. As a result, he rejects his sister, Pilate, because of her low social status and her deep connection to their family’s folk traditions. By all accounts, Pilate is a peculiar old woman who makes a living selling bootleg whiskey and lives without modern conveniences. Yet, she is the keeper of the family’s history, which she preserves in the songs she sings—a responsibility she believes was dictated to her by her father’s ghost. Despite his snobbery, Macon cannot resist the temptation of sneaking around Pilate’s house, listening to the three women inside singing by candlelight. He is caught in a dilemma, torn between the restrictive sophistication required for upward mobility and the free, soul-soothing musical expressions emanating from his sister’s home.
Ultimately, Macon chooses to reject Pilate and her music, thereby detaching himself from his family's history and roots. It is his son, Milkman, who embarks on a journey to seek his own identity, a journey that involves reconnecting with the very traditions his father spurned. This quest for self-discovery is intertwined with a mysterious song that holds the key to his family’s past.
The song first appears in the novel on the night of Milkman’s birth. As a man in blue wings attempts suicide, Pilate stands on the hospital steps and begins to sing “in a powerful contralto.” The song, considered the novel's most valuable treasure, is sung by children and elders, evolving as it is passed down. It interweaves the myth of a flying African slave with the history of the Dead family. This act of storytelling through music embeds Afro-American mythology into the family's oral tradition, ensuring it is handed down from generation to generation.
When asked about the "flying African" myth, Morrison explained that while she found references to it in slave narratives, she could not find hard data on its origins. She believed this was precisely its power. Myth, she argued, is “the way people learn narrative. Myth is the first information there is, and it conveys far more than what is explicitly stated.” It is clear that Morrison has faith in the ability of myth to communicate profound, nonspecific knowledge. In Song of Solomon, she gives voice to music to unearth this mythic core, providing a framework for the novel’s central themes of history, identity, and freedom.
|
考点1:“church songs”推荐译为“颂歌”或“圣歌”
考点2:“women’s gossip”推荐译为“女性絮语”或“女性八卦”
考点3:“oral tradition”推荐译为“口头传统”
考点4:“flying African”推荐译为“黑人会飞”
考点5:“Milkman”推荐译为“奶娃”
考点6:“bootleg whiskey”推荐译为“私酿酒”或“私酿威士忌”,不能译为“私酒”
考点7:“his sister”需翻译成“他妹妹”,翻译成“他姐姐”错误
|
f2fd4
|
学术论文
|
人文科学
|
15
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
3.1测绘地理信息技术在矿产勘探中的应用
在矿产作业中,有效的矿产勘探施工一方面能够提升后续施工的效率,节约施工中不必要的人力、物力成本;另一方面也能够提高后续施工作业的安全性,通过准确的数据来保障工作人员的人身安全和企业的财产安全。在传统的矿产勘探工作中,勘探工作主要以人力为主,以相应的机械设备为辅助。这一种勘探方式不仅无法做到精准分析相应的地理数据,更有可能对矿产附近的水土环境进行破坏,造成难以弥补的损失。
除此之外,人工作业也存在着安全弊端。在部分水土流失严重的地区进行人工作业还有可能发生滑坡等危险,不利于矿产勘探工作的顺利开展。在信息技术不断发展的过程中,地质勘查工作必然会应用到测绘地理信息技术,它能够通过相应的数据采集设备将矿产的深度以及矿产所处的地质图层进行数据收集,将收集到的数据传输到计算机系统中,通过相应的信息技术转化为工程人员能够看懂的数据分析报告和三维效果图,对矿产能否开发及开发的危险进行系统性分析。
同传统的矿产勘探工作相比,测绘地理信息技术具有以下几方面的优势:①地理测绘信息技术以信息技术取代传统的人工测绘,极大地降低了企业的人力成本支出,提升了企业的经济效率;②人工成本的减少也能够增加矿场勘测人员的人身安全性,保障施工人员的安全;③随着信息技术的不断发展,测绘地理信息技术也能够不断更新更加准确的地理数据信息,为后续施工方案的制定及矿产的开发奠定良好的数据基础。
3.2测绘地理信息技术在工程测绘中的应用
在施工工程前期的工作准备中,地质勘探工作是保障工程测绘有效性的重要工作内容之一。而传统的地质信息数据收集需要考虑到天气环境、土壤土质等多种因素的影响,需要耗费企业大量的人力、物力成本进行多次测量。但是在测绘地理信息技术应用的过程中,该技术能够有效降低施工企业的成本,提升施工企业测绘工作的有效性及数据精的准性。在工程测绘中,测绘地理信息技术的应用主要有以下几个方面:①以测绘技术代替传统的人工多次测量能够通过矢量的方式来保存勘察地区的地理信息数据,并将相关数据上传到计算机系统中进行数据分析。这样一方面能够提升数据勘测的精准性,另一方面也能够加强数据的保存以及分析,通过先进的计算机系统来保障数据分析的精准性,为后续的施工图纸、施工方案制定打下坚实的基础。②测绘地理信息技术也能够提高数据的精准性。测绘地理信息技术在测量时需要应用到许多精密的仪器以及先进的设备技术。这些设备技术是目前地质勘测领域所能做到的数据误差最小、数据精准度最高的技术设备。因此同传统的工程测绘工作相比,该项技术的测绘成果要更加精准,能够保证数据的精准性。③在工程测绘中,测绘地理信息技术能够将收集到的地质信息等相关地理信息上传到计算机系统中,并由计算机系统进行三维建模处理,对不同的数据进行系统分析,给出相应的三维效果图,为后续的施工奠定良好的基础。这样能够帮助专业人员以更加直观的方式了解到该地区的地质信息。除了工程测绘外,三维效果图还被广泛地应用在交通作业、地质信息收集等场景,它以更加直观、更加便于人们理解、更加精准等的优点成为了人们施工作业中的常见技术之一。
|
3.1测绘地理信息技术在矿产勘探中的应用
在矿产作业中,有效的矿产勘探施工一方面能够提升后续施工的效率,节约施工中不必要的人力、物力成本;另一方面也能够提高后续施工作业的安全性,通过准确的数据来保障工作人员的人身安全和企业的财产安全。在传统的矿产勘探工作中,勘探工作主要以人力为主,以相应的机械设备为辅助。这一种勘探方式不仅无法做到精准分析相应的地理数据,更有可能对矿产附近的水土环境进行破坏,造成难以弥补的损失。
除此之外,人工作业也存在着安全弊端。在部分水土流失严重的地区进行人工作业还有可能发生滑坡等危险,不利于矿产勘探工作的顺利开展。在信息技术不断发展的过程中,地质勘查工作必然会应用到测绘地理信息技术,它能够通过相应的数据采集设备将矿产的深度以及矿产所处的地质图层进行数据收集,将收集到的数据传输到计算机系统中,通过相应的信息技术转化为工程人员能够看懂的数据分析报告和三维效果图,对矿产能否开发及开发的危险进行系统性分析。
同传统的矿产勘探工作相比,测绘地理信息技术具有以下几方面的优势:①地理测绘信息技术以信息技术取代传统的人工测绘,极大地降低了企业的人力成本支出,提升了企业的经济效率;②人工成本的减少也能够增加矿场勘测人员的人身安全性,保障施工人员的安全;③随着信息技术的不断发展,测绘地理信息技术也能够不断更新更加准确的地理数据信息,为后续施工方案的制定及矿产的开发奠定良好的数据基础。
3.2测绘地理信息技术在工程测绘中的应用
在施工工程前期的工作准备中,地质勘探工作是保障工程测绘有效性的重要工作内容之一。而传统的地质信息数据收集需要考虑到天气环境、土壤土质等多种因素的影响,需要耗费企业大量的人力、物力成本进行多次测量。但是在测绘地理信息技术应用的过程中,该技术能够有效降低施工企业的成本,提升施工企业测绘工作的有效性及数据精的准性。在工程测绘中,测绘地理信息技术的应用主要有以下几个方面:①以测绘技术代替传统的人工多次测量能够通过矢量的方式来保存勘察地区的地理信息数据,并将相关数据上传到计算机系统中进行数据分析。这样一方面能够提升数据勘测的精准性,另一方面也能够加强数据的保存以及分析,通过先进的计算机系统来保障数据分析的精准性,为后续的施工图纸、施工方案制定打下坚实的基础。②测绘地理信息技术也能够提高数据的精准性。测绘地理信息技术在测量时需要应用到许多精密的仪器以及先进的设备技术。这些设备技术是目前地质勘测领域所能做到的数据误差最小、数据精准度最高的技术设备。因此同传统的工程测绘工作相比,该项技术的测绘成果要更加精准,能够保证数据的精准性。③在工程测绘中,测绘地理信息技术能够将收集到的地质信息等相关地理信息上传到计算机系统中,并由计算机系统进行三维建模处理,对不同的数据进行系统分析,给出相应的三维效果图,为后续的施工奠定良好的基础。这样能够帮助专业人员以更加直观的方式了解到该地区的地质信息。除了工程测绘外,三维效果图还被广泛地应用在交通作业、地质信息收集等场景,它以更加直观、更加便于人们理解、更加精准等的优点成为了人们施工作业中的常见技术之一。
|
考点1:“测绘地理信息技术”推荐译为“Surveying and Geographic Information Technology”
考点2:“矿产勘探”推荐译为“mineral exploration”
考点3:“人工作业”推荐译为“manual operation”
考点4:“滑坡”需要译为“landslide”
考点5:“地质图层”推荐译为“geological stratification”
考点6:“人力成本支出”推荐译为“labor costs”
考点7:“有效性”推荐译为“validity”
考点8:“多次测量”推荐译为“repetitive measurements”
考点9:“水土环境”推荐译为“local ecosystem”
考点10:“三维效果图”推荐译为“3D models”,不能译为“3D renderings”
|
f3a8c
|
学术论文
|
应用学科
|
10
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
Memorandum No.5
Preventive Service
Antung Custom House
to The Chief Secretary, Inspectorate General of Custom
I find the position here more clearly defined than I had expected. It can be stated in a few lines.
From Japanese territory on the Corea side of the Yalu River, and across that river: the water of one half of which is claimed expressly, the other half also by suggestion, by the Japanese; and so to the Japanese settlement of the South Manchurian Railway zone at Antung, - Chinese soil but again entirely under Japanese control, - dutiable goods have, since the imposing of the new tariff this year, been increasingly smuggled by boat.
Once landed within the settlement limits the cargo is safe, either for consumption within Antung settlement or to be put on the railway – also under Japanese control – where it can then be conveyed without Customs intervention into Manchuria and discharged duty free at any point.
The Chinese customs function in Antung under the following limitations. They exercise adequate control, over the direct import by railway, at the first station after the river crossing. They maintain little more than a face-value footing on a narrow depth, undefined, along the water front. Within the settlement they are unsupported by Chinese authority; Chinese police being entirely excluded from operating. (Even the Chinese post office may not function in the settlement.) Japanese police and the settlement authorities are less than lukewarm in their supports. The public generally barely concedes us the prerogatives of a Government office. Corean and other low-class roughs openly defy, and when occasion demands maltreat out officers, rushing goods through, by boat or sledge, by sheer force.
Smuggling is non-existent outside the settlement limits. There is no problem there at present. It may be taken that the goal of the smuggled cargoes is for the most part the railway: for distribution, in whole or broken into smaller packages, up country.
The problem before the Customs is: whether, by means, say, of armed patrol vessels in the river, to maintain the check that our own Government cannot, and the Japanese will not, provide ashore; or whether, by increased staffing or by means of new stations, to attempt to cover the ground support to the Japanese authorities. The only alternative must be that of a withdrawal to, or the forming of an additional barrier at, some region behind this virtual bridgehead against the Chinese Customs. This last is not practicable on several grounds; moreover, while accounting for cargo leaving there for inland would not deal – as the Customs existing first station on the line does not deal – with smuggled cargoes remaining in the settlement for consumption there.
To take the first: strong measures are impracticable for the following reasons:
The entire breadth of the river is, in reality, claimed by the Japanese. Were it decided to police the waterfront by means of floating craft – a method that would at best only account for eight months in the year, the remaining months being icebound – the first use of armed force would probably be given the prominence of an “incident”. Apart from this, too, such floating guard would be largely wasted. Goods on their way across from the other side are still within their right. Our duty-collecting stations are on the shore. Until they have attempted to pass these they are within the law.
By shore patrols still less would the Japanese permit the use of arms; and in a conflict with smugglers our officers would be, and have already been, treated equally with the smugglers as breaking the peace.
I do not recommend any steps in the direction of force to meet the situation in the Antung district nor do I think that even another motor boat would appreciably assist such a situation.
Smuggling by boat or sledge across the river in order to avoid the Customs at the first station on the railway has existed since the opening of the place in 1907. It did not under the old tariff amount to a serious matter for the revenue and the cases brought forward to the Inspectorate rose largely from clandestine movements of rice and salt. With the higher tariff Shingishu (Hsin Wiju) on the Corean side began to be made a depot for cargo destined to be ferried across the river to Antung.
The idea of using force being put on one side and the status of the Japanese Railway zone Settlement being what it is, the Customs can only press the Authorities there for what improvement it can secure intreatment. This was done upon the introduction of the higher tariff and there seems reason to see in the Japanese official attitude some realization that greater support must be lent to the Chinese Customs. This is the line that was followed by the late Commissioner, Mr. Fukumoto and his line of action is now being followed up by the present Commissioner, Mr. Bessell.
Japanese administration on the two sides of the river falls under two distinct authorities, both as to Government and Railway management. On the Shingishu side is the Japanese “Department” of Chosen; on the Antung side is the South Manchurian Railway under the Kwangtung Government, the headquarters of which is situated at Port Arthur.
Early in the year Mr. Fukumoto made representations to the Japanese Consul at Antung and as a result two definite steps were effected:
(a) Japanese merchants were instructed by the authorities at Seoul (Keicho) through the Commissioner of Japanese Customs at Shingishu : “to avail themselves of the railway” when importing goods across the river into Antung.
(b) the Kwangtung Government at Port Arthur instructed the Consul at Antung that police in the settlement were to “assist the Customs by sending patrols along the foreshore to direct smugglers to report and pay the proper duties”; and by further issuing “a severe warning to suspected smugglers to abandon their practices in future.”
Regarding the first of these: Mr. Inouye, Commissioner of Japanese Customs at Shingishu tells me that this order is absolutely obeyed. Goods, he said, are no longer stored in the warehouses on the riverside there by the cargo brokers, of whom there are five, licensed by the Customs. And the hundred Corean coolies who used to work the cargo there (and no doubt across the river) have now gone over to Antung to seek work on that side: - “There, probably,” Mr. Inouye added, “to turn their abilities to smuggling against the Japanese side of the water!
And Mr. Bessell says that since the above orders were promulgated the Antung Customs receipts have risen appreciably and show directly the effect of the new rule as far as Shingishu side is concerned.
Mr. Usami, Japanese Consul at Antung, states that he thinks that this riverine smuggling will be “practically put an end to” by the new orders. This is as it may be of course. But no doubt something has been accomplished and this is the line that we must continue to follow, pressing fore the full carrying out of the Japanese promises. That the Customs must rest content with these measures granted by the Japanese; measures which, by the lapse of time may tend to be less thoroughly carried out, or, in their turn, may come to be countered by the smuggling fraternity, is to be deplored; but in the circumstances of our establishment at Antung and of China’s inability to secure a stronger position for us, there seems no present alternative.
I believe, however, that no little can be done to “clinch” these arrangements officially in higher places, by a visit to the Governor General at Seoul and, thereafter, to the Governor General at Port Arthur, and this I propose to do in the course of the next week.
Then there are certain further steps that can be taken by the Customs; these are:
(a) the opening, already proposed, of a station of the Customs at Liutaokou.
(b) that we should avail ourselves of our right, already established under noted exchanged at the signing of the Customs Railway Agreement of 1919, signed by the Inspector General of Customs and Ijuin, Japanese Minister (River Yalu Frontier Trade Agreement, 1913: pp 775/9, Vol. II, Treaties , Conventions, etc., No: 3. Miscellaneous Serious: No. 30.); and open a Chinese Customs Office on the Corean side of the Yalu.
With regard to (a) : The opening of a station at Liutaokou, which is the spot to which this smuggling across the river is carried out, may be said to be a necessary measure if only for the reason that trade is developing towards that end of the settlement; while it will deprive those landing in that neighbourhood with dutiable cargo of their present not altogether unfounded excuse, namely, that it is a mile and a half further up-stream to get to the Customs. The details of carrying this out should be easy of accomplishment with the help of the officials.
With reference to (b): we come here to something rather more important, requiring, as it would, some negotiation with the Corean Government before it could be effected.
It would give us the advantage of a lookout established upon the farther side of the river. Now that we know definite instructions have been reveived by the Japanese Customs there to discourage the shipping of cargo across the river our presence on the spot would assist in keeping them up to the mark. Duty on such exports as may leave there would be collected by such an office; but its principla use would be as a watch on river traffic.
No very great amount of smuggling can occur except of goods that have been brought there by the railway. And this involves temporary storage there; for the Japanese Customs which is in a strong position and keeps a firm hand over shippers no less than importers, permits no export without full formality. With closer relations with the Japanese Customs on the Corean side there should result a mutual assistance that does not spring from the present proximity of the two Customs’ working at the railway station.
The Japanese duties are far higher than ours; and the Shingishu Customs maintains a system of patrol along 25 miles of the Corean bank of the River, the upkeep of which, exclusive of buildings, is Yen 330000 per annum. The assistance that the Chinese Customs could render, therefore, must at least equal what we should be asking of them. It is in the direction of such mutual working that we should try to move. Smuggling will never be entirely eradicable by any system in a district poor, full of the turbulent characters associated with frontiers, and lending itself particularly, as regards ground, to clandestine operations. But smuggling in any wholesale form could not flourish greatly with the two Customs’ acting under a fair degree of understanding and good relations.
I propose, therefore, to discuss the question of opening such an office with the Corean Authorities in a few days.
There is one last proposition that I believe should be considered:
(c) the borrowing of a police guard from the Antung settlement authorities for the protection of Customs officers.
Since Chinese police may not operate and armed Customs officers are regarded askance in the Settlement, the Antung authorities might, by arrangement, detail a certain makes of police in uniform for a permanent guard to the Customs. These guards would be paid for by us through the Police Department. They would not function as Custom officers; but where rough treatment at the hands of Coreans or others was apprehended they would be detailed under our orders for duty; that duty being only the protection of our officers acting as any Customs officer is expected to act, and must be free to act. I suggest that about twelve such police would be sufficient. They would be under the orders of their own Police Chief except – as above noted – regarding the details of actual post for the time being.
I have discussed this suggestion with the Japanese Consul and he will look into the arguments for and against it with his Chief of police; regarding it, of course, as merely a tentative suggestion and not as definite arrangement. I propose to go into this question on the same basis with the Governor General – or whoever may discuss these questions with me – when I reach Port Arthur.
Everything considered I do not regard the question of smuggling at Antung as so grave a one as I had expected to find it. This does not mean that it is not recognized that there has been a deplorable loss to the revenue under the circumstances that have obtained. But I think this has been the result of the hiatus in Customs powers here of the early part of this year and is not a question impossible to deal with. The increase this spring in the tariff caught Customs methods napping at Antung as it has done elsewhere. In seeking the obvious changes in practice called for by the new demands upon us ground has had to be crossed that was in a high degree delicate and demanded a full measure of time and discussion.
When it is said that the status of the Railway Settlement of Antung is hopelessly inequitable to China everything has been said. It is not justifiable to ascribe to individuals, nor even to local and subordinate administrations, the faults in a system so perverse and difficult to handle. The required adjustments in procedure take time to bring about. But Mr. Fukumoto’s appeal through the local Consul appears to have received at the hands of the Various authorities who had to be consulted, quite a fair reception and response, and orders were in the course of time given which have already commenced to show satisfactory results. The further proposals for the consideration of the Inspector General now being forwarded will serve further to prevent loss of revenue on any large scale. All that will then be called for will be some extra activity and watchfulness on our part to see that the new safeguards – such as they are – are at least given their full chance.
I will report in a later memorandum upon the outcome of my interviews with the Authorities at Seoul and Port Arthur.
|
Memorandum No.5
Preventive Service
Antung Custom House
to The Chief Secretary, Inspectorate General of Custom
I find the position here more clearly defined than I had expected. It can be stated in a few lines.
From Japanese territory on the Corea side of the Yalu River, and across that river: the water of one half of which is claimed expressly, the other half also by suggestion, by the Japanese; and so to the Japanese settlement of the South Manchurian Railway zone at Antung, - Chinese soil but again entirely under Japanese control, - dutiable goods have, since the imposing of the new tariff this year, been increasingly smuggled by boat.
Once landed within the settlement limits the cargo is safe, either for consumption within Antung settlement or to be put on the railway – also under Japanese control – where it can then be conveyed without Customs intervention into Manchuria and discharged duty free at any point.
The Chinese customs function in Antung under the following limitations. They exercise adequate control, over the direct import by railway, at the first station after the river crossing. They maintain little more than a face-value footing on a narrow depth, undefined, along the water front. Within the settlement they are unsupported by Chinese authority; Chinese police being entirely excluded from operating. (Even the Chinese post office may not function in the settlement.) Japanese police and the settlement authorities are less than lukewarm in their supports. The public generally barely concedes us the prerogatives of a Government office. Corean and other low-class roughs openly defy, and when occasion demands maltreat out officers, rushing goods through, by boat or sledge, by sheer force.
Smuggling is non-existent outside the settlement limits. There is no problem there at present. It may be taken that the goal of the smuggled cargoes is for the most part the railway: for distribution, in whole or broken into smaller packages, up country.
The problem before the Customs is: whether, by means, say, of armed patrol vessels in the river, to maintain the check that our own Government cannot, and the Japanese will not, provide ashore; or whether, by increased staffing or by means of new stations, to attempt to cover the ground support to the Japanese authorities. The only alternative must be that of a withdrawal to, or the forming of an additional barrier at, some region behind this virtual bridgehead against the Chinese Customs. This last is not practicable on several grounds; moreover, while accounting for cargo leaving there for inland would not deal – as the Customs existing first station on the line does not deal – with smuggled cargoes remaining in the settlement for consumption there.
To take the first: strong measures are impracticable for the following reasons:
The entire breadth of the river is, in reality, claimed by the Japanese. Were it decided to police the waterfront by means of floating craft – a method that would at best only account for eight months in the year, the remaining months being icebound – the first use of armed force would probably be given the prominence of an “incident”. Apart from this, too, such floating guard would be largely wasted. Goods on their way across from the other side are still within their right. Our duty-collecting stations are on the shore. Until they have attempted to pass these they are within the law.
By shore patrols still less would the Japanese permit the use of arms; and in a conflict with smugglers our officers would be, and have already been, treated equally with the smugglers as breaking the peace.
I do not recommend any steps in the direction of force to meet the situation in the Antung district nor do I think that even another motor boat would appreciably assist such a situation.
Smuggling by boat or sledge across the river in order to avoid the Customs at the first station on the railway has existed since the opening of the place in 1907. It did not under the old tariff amount to a serious matter for the revenue and the cases brought forward to the Inspectorate rose largely from clandestine movements of rice and salt. With the higher tariff Shingishu (Hsin Wiju) on the Corean side began to be made a depot for cargo destined to be ferried across the river to Antung.
The idea of using force being put on one side and the status of the Japanese Railway zone Settlement being what it is, the Customs can only press the Authorities there for what improvement it can secure intreatment. This was done upon the introduction of the higher tariff and there seems reason to see in the Japanese official attitude some realization that greater support must be lent to the Chinese Customs. This is the line that was followed by the late Commissioner, Mr. Fukumoto and his line of action is now being followed up by the present Commissioner, Mr. Bessell.
Japanese administration on the two sides of the river falls under two distinct authorities, both as to Government and Railway management. On the Shingishu side is the Japanese “Department” of Chosen; on the Antung side is the South Manchurian Railway under the Kwangtung Government, the headquarters of which is situated at Port Arthur.
Early in the year Mr. Fukumoto made representations to the Japanese Consul at Antung and as a result two definite steps were effected:
(a) Japanese merchants were instructed by the authorities at Seoul (Keicho) through the Commissioner of Japanese Customs at Shingishu : “to avail themselves of the railway” when importing goods across the river into Antung.
(b) the Kwangtung Government at Port Arthur instructed the Consul at Antung that police in the settlement were to “assist the Customs by sending patrols along the foreshore to direct smugglers to report and pay the proper duties”; and by further issuing “a severe warning to suspected smugglers to abandon their practices in future.”
Regarding the first of these: Mr. Inouye, Commissioner of Japanese Customs at Shingishu tells me that this order is absolutely obeyed. Goods, he said, are no longer stored in the warehouses on the riverside there by the cargo brokers, of whom there are five, licensed by the Customs. And the hundred Corean coolies who used to work the cargo there (and no doubt across the river) have now gone over to Antung to seek work on that side: - “There, probably,” Mr. Inouye added, “to turn their abilities to smuggling against the Japanese side of the water!
And Mr. Bessell says that since the above orders were promulgated the Antung Customs receipts have risen appreciably and show directly the effect of the new rule as far as Shingishu side is concerned.
Mr. Usami, Japanese Consul at Antung, states that he thinks that this riverine smuggling will be “practically put an end to” by the new orders. This is as it may be of course. But no doubt something has been accomplished and this is the line that we must continue to follow, pressing fore the full carrying out of the Japanese promises. That the Customs must rest content with these measures granted by the Japanese; measures which, by the lapse of time may tend to be less thoroughly carried out, or, in their turn, may come to be countered by the smuggling fraternity, is to be deplored; but in the circumstances of our establishment at Antung and of China’s inability to secure a stronger position for us, there seems no present alternative.
I believe, however, that no little can be done to “clinch” these arrangements officially in higher places, by a visit to the Governor General at Seoul and, thereafter, to the Governor General at Port Arthur, and this I propose to do in the course of the next week.
Then there are certain further steps that can be taken by the Customs; these are:
(a) the opening, already proposed, of a station of the Customs at Liutaokou.
(b) that we should avail ourselves of our right, already established under noted exchanged at the signing of the Customs Railway Agreement of 1919, signed by the Inspector General of Customs and Ijuin, Japanese Minister (River Yalu Frontier Trade Agreement, 1913: pp 775/9, Vol. II, Treaties , Conventions, etc., No: 3. Miscellaneous Serious: No. 30.); and open a Chinese Customs Office on the Corean side of the Yalu.
With regard to (a) : The opening of a station at Liutaokou, which is the spot to which this smuggling across the river is carried out, may be said to be a necessary measure if only for the reason that trade is developing towards that end of the settlement; while it will deprive those landing in that neighbourhood with dutiable cargo of their present not altogether unfounded excuse, namely, that it is a mile and a half further up-stream to get to the Customs. The details of carrying this out should be easy of accomplishment with the help of the officials.
With reference to (b): we come here to something rather more important, requiring, as it would, some negotiation with the Corean Government before it could be effected.
It would give us the advantage of a lookout established upon the farther side of the river. Now that we know definite instructions have been reveived by the Japanese Customs there to discourage the shipping of cargo across the river our presence on the spot would assist in keeping them up to the mark. Duty on such exports as may leave there would be collected by such an office; but its principla use would be as a watch on river traffic.
No very great amount of smuggling can occur except of goods that have been brought there by the railway. And this involves temporary storage there; for the Japanese Customs which is in a strong position and keeps a firm hand over shippers no less than importers, permits no export without full formality. With closer relations with the Japanese Customs on the Corean side there should result a mutual assistance that does not spring from the present proximity of the two Customs’ working at the railway station.
The Japanese duties are far higher than ours; and the Shingishu Customs maintains a system of patrol along 25 miles of the Corean bank of the River, the upkeep of which, exclusive of buildings, is Yen 330000 per annum. The assistance that the Chinese Customs could render, therefore, must at least equal what we should be asking of them. It is in the direction of such mutual working that we should try to move. Smuggling will never be entirely eradicable by any system in a district poor, full of the turbulent characters associated with frontiers, and lending itself particularly, as regards ground, to clandestine operations. But smuggling in any wholesale form could not flourish greatly with the two Customs’ acting under a fair degree of understanding and good relations.
I propose, therefore, to discuss the question of opening such an office with the Corean Authorities in a few days.
There is one last proposition that I believe should be considered:
(c) the borrowing of a police guard from the Antung settlement authorities for the protection of Customs officers.
Since Chinese police may not operate and armed Customs officers are regarded askance in the Settlement, the Antung authorities might, by arrangement, detail a certain makes of police in uniform for a permanent guard to the Customs. These guards would be paid for by us through the Police Department. They would not function as Custom officers; but where rough treatment at the hands of Coreans or others was apprehended they would be detailed under our orders for duty; that duty being only the protection of our officers acting as any Customs officer is expected to act, and must be free to act. I suggest that about twelve such police would be sufficient. They would be under the orders of their own Police Chief except – as above noted – regarding the details of actual post for the time being.
I have discussed this suggestion with the Japanese Consul and he will look into the arguments for and against it with his Chief of police; regarding it, of course, as merely a tentative suggestion and not as definite arrangement. I propose to go into this question on the same basis with the Governor General – or whoever may discuss these questions with me – when I reach Port Arthur.
Everything considered I do not regard the question of smuggling at Antung as so grave a one as I had expected to find it. This does not mean that it is not recognized that there has been a deplorable loss to the revenue under the circumstances that have obtained. But I think this has been the result of the hiatus in Customs powers here of the early part of this year and is not a question impossible to deal with. The increase this spring in the tariff caught Customs methods napping at Antung as it has done elsewhere. In seeking the obvious changes in practice called for by the new demands upon us ground has had to be crossed that was in a high degree delicate and demanded a full measure of time and discussion.
When it is said that the status of the Railway Settlement of Antung is hopelessly inequitable to China everything has been said. It is not justifiable to ascribe to individuals, nor even to local and subordinate administrations, the faults in a system so perverse and difficult to handle. The required adjustments in procedure take time to bring about. But Mr. Fukumoto’s appeal through the local Consul appears to have received at the hands of the Various authorities who had to be consulted, quite a fair reception and response, and orders were in the course of time given which have already commenced to show satisfactory results. The further proposals for the consideration of the Inspector General now being forwarded will serve further to prevent loss of revenue on any large scale. All that will then be called for will be some extra activity and watchfulness on our part to see that the new safeguards – such as they are – are at least given their full chance.
I will report in a later memorandum upon the outcome of my interviews with the Authorities at Seoul and Port Arthur.
|
考点1:Preventive Service推荐译为缉私事务
考点2:The Chief Secretary, Inspectorate General of Custom推荐译为总务科税务司
考点3:South Manchurian Railway zone推荐译为南满洲铁道附属地,或者称为“满铁附属地”
考点4:“the other half also by suggestion, by the Japanese推荐译为默认为日本主权
考点5:waterfront推荐译为沿岸
考点6:station推荐译为分卡,或者海关分卡
考点7:Chinese customs必须译为中国海关
考点8:Japanese Railway zone Settlement必须译为日本铁路附属地
考点9:Mr. Fukumoto推荐译为福本顺三郎,或者福本顺
考点10:Mr. Bessell推荐译为弼素乐
考点11:Ijuin必须译为伊集院彦吉
考点12:“to avail themselves of the railway” when importing goods across the river into Antung推荐译为洋货越江运入安东时,“应当使用铁路”
考点13:Kwangtung Government必须译为关东厅
考点14:Keicho推荐译为京城
考点15:foreshore推荐译为河岸
考点16:coolies必须译为苦力
考点17:Mr. Usami必须译为宇佐美珍彦
考点18:Governor General at Seoul必须译为朝鲜总督
考点19:Governor General at Port Arthur必须译为关东厅长官
考点20:Police Department推荐译为警察署
考点21:The only alternative must be that of a withdrawal to, or the forming of an additional barrier at, some region behind this virtual bridgehead against the Chinese Customs推荐译为唯一的选择是撤退至这些对抗中国海关的事实上的桥头堡后面的一些地区的分卡,或者设立一个新的分卡
考点22:uniform必须译为制服
考点23:a few lines推荐译为简述如下
考点24:settlement推荐译为附属地,或者居留地
考点25:Japanese “Department” of Chosen推荐译为朝鲜总督府
|
f449f
|
文学艺术
|
传记
|
140
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
在自动驾驶系统的设计与实现领域,“实时性”不仅仅是一个技术指标,更是关乎道路安全与系统可靠性的生命线。在高度动态的交通环境中,任何微秒级的延迟都可能在毫米级距离上转化为灾难性的后果。为了剖析这一挑战,研究者们将实时性瓶颈归纳为四个关键环节——传感器采集、数据预处理、决策推演与运动控制——并从架构深度、算法复杂度、硬件约束及通信拓扑四个维度展开多层次剖析。
首先,传感器层面面临的首要难题在于多源异构数据的同步与融合。激光雷达通常以每秒数十万次帧率捕捉三维点云,但其数据量体量在高分辨率模式下可轻易突破数十GB/s;相机则以高帧率获取二维图像,并配合全景拼接与深度估计,但其网络带宽与显存吞吐能力常常成为制约因素;毫米波雷达提供了优异的抗干扰性能,却在感知精度及点云稠密度方面逊色于LiDAR。如何在毫秒级时间窗口内对上述异源数据进行时空校准、噪声滤除与特征提取,并保证各传感器数据的时间戳误差不超过1 ms,是系统设计的首要攻坚点。
进入数据预处理阶段,传统的批量化滤波与卡尔曼滤波算法因其多次迭代及矩阵运算开销,被逐渐替换为能够并行执行的滤波网络或轻量化的稀疏滤波变体。例如,基于张量分解技术的三阶滤波网络能够将卡尔曼增益矩阵压缩为低秩近似,从而将运算复杂度从O(n³)降低至O(n² log n),在保留滤波精度的前提下缩减延迟。但同时,这类方法对系统总体误差累积效应的鲁棒性提出了更高要求,任何压缩近似误差都可能在后续决策层面被放大。
决策推演环节的核心难点则在于如何在有限的计算预算内,完成对复杂场景中多主体交互、道路拓扑及交通法规的同步评估。经典的基于马尔可夫决策过程(MDP)的路径规划算法,需要在每个离散时间步对潜在动作序列进行回溯搜索,其时间复杂度呈指数爆炸。研究者们引入了分层决策框架,将全局路径规划与局部运动规划解耦,并在高层采用粗粒度的图搜索、A*变体或基于采样的快速随机树算法,而在低层则构建基于深度强化学习的策略网络,以实现对最近时域内避障与车道保持的实时优化。然而,这种分层结构在节点切换时会引入架构中断,若缺少精细的同步机制,就会在决策链条中留下“盲区”,导致短时内无法响应突发事件。
在运动控制层面,工业界普遍采用模型预测控制(MPC)算法,但其需要在线求解约束最优化问题,而这类问题通常伴随高维非线性函数求导与二次规划(QP)迭代。为了加速求解过程,研究者借助自适应步长策略与多项式逼近技术,将QP子问题近似转化为一阶优化,即可将控制指令计算时延压缩至1–2 ms。但在面对高马力动力学系统或复杂路面摩擦系数变化时,模型误差对MPC的稳定性提出了新的挑战,需要在软实时环境中增加冗余检查与最坏情况回退机制,以避免因求解超时而导致的控制失效。
硬件层面的优化同样不可或缺。随着硬件加速器的多样化,FPGA、ASIC 与 GPU 在灵活性、功耗与吞吐量上各有千秋。研究团队提出了基于FPGA内置DSP单元的异构多核协同调度框架,该框架将高频率的卷积神经网络(CNN)推理任务映射至FPGA的流水线结构中,而将稀疏矩阵运算与图神经网络推理托付给GPU并行线程。此种交叉调度策略不仅提升了硬件利用率,也使得整体处理延迟在不牺牲精度的前提下下降了近40%。不过,异构计算环境下的任务分配与负载均衡依然是一个NP难题,任何调度错误都可能将过载风险转嫁至系统薄弱环节。
在通信与拓扑优化方面,车路协同(V2X)与边缘计算的深度融合正逐步改变未来出行的实时性格局。通过在关键路口部署边缘服务器,车辆可以将部分感知与决策任务外包给最近端的边缘单元,以获得更低的通信时延与更高的带宽保障。同时,为了防止网络拥塞引发的丢包与延迟抖动,研究者引入了迭代式传输冗余机制,即在关键帧或决策结果传递时,同时采用多路径传输协议与前向纠错(FEC)编码,以确保在丢包率达到1%时仍能将端到端时延控制在5 ms以内。
针对极端场景与突发工况,异步迭代调整机制被提出并投入小规模实车测试。该机制允许在主决策链路中断或信息不完整时,启动后备策略——包括基于经验库的保守行为决策与利用模式识别的短时预测——以维持车辆在三秒内的安全可控状态,并在后续通信链路恢复后进行全链路回溯校正与路径再优化。此举既保证了在网络抖动或传感器故障时的安全冗余,又保留了主决策框架的持续学习能力。
与此同时,为兼顾资源受限的边缘部署需求,轻量化剪枝与知识蒸馏技术在模型训练与推理中被广泛采用。研究表明,通过对原始大模型的网络结构进行梯度敏感度分析,删除微贡献的权重连接后,再以原模型输出作为软标签对精简后模型进行再训练,可在保证原有感知精度95%以上的情况下,将模型参数量与计算量均压缩至原版的30%左右。此外,借助在线蒸馏技术,边缘节点可在实车运行中持续从云端大模型接收更新,以应对道路环境的复杂多变。
在人工智能与物联网集成方面,多车协同仰赖联邦学习范式。车辆本地在边缘节点上进行增量式微调,并将模型梯度安全加密后上传至云端聚合,生成全局模型后同步下发。此循环既保护了车载数据的隐私安全,又借助大量车辆的多样化场景样本,提升了全局模型对复杂工况的泛化性能。
从系统架构视角看,云边协同正逐渐演变为三层架构——云端服务器负责全局模型训练与大规模数据挖掘;边缘节点承担在线推理与动态模型更新;终端车辆则完成感知数据获取与最末级控制执行。此分层协作模式在降低单点故障风险的同时,也将99 百分位延迟和尾部延迟等关键指标纳入持续监测,以确保系统在极端拥堵或恶劣天气条件下,依然能保持可接受的响应速度和可靠性
实时性研究将继续向微秒级做精细化耦合,并在在线学习、跨域传输优化、量子加速器应用等领域展开探索。唯有通过硬件与算法的协同创新、边缘与云端的无缝协作,以及异步与冗余机制的有机结合,才能真正实现毫秒乃至微秒级的实时自动驾驶,为智慧交通的安全与高效奠定坚实基础。
|
在自动驾驶系统的设计与实现领域,“实时性”不仅仅是一个技术指标,更是关乎道路安全与系统可靠性的生命线。在高度动态的交通环境中,任何微秒级的延迟都可能在毫米级距离上转化为灾难性的后果。为了剖析这一挑战,研究者们将实时性瓶颈归纳为四个关键环节——传感器采集、数据预处理、决策推演与运动控制——并从架构深度、算法复杂度、硬件约束及通信拓扑四个维度展开多层次剖析。
首先,传感器层面面临的首要难题在于多源异构数据的同步与融合。激光雷达通常以每秒数十万次帧率捕捉三维点云,但其数据量体量在高分辨率模式下可轻易突破数十GB/s;相机则以高帧率获取二维图像,并配合全景拼接与深度估计,但其网络带宽与显存吞吐能力常常成为制约因素;毫米波雷达提供了优异的抗干扰性能,却在感知精度及点云稠密度方面逊色于LiDAR。如何在毫秒级时间窗口内对上述异源数据进行时空校准、噪声滤除与特征提取,并保证各传感器数据的时间戳误差不超过1 ms,是系统设计的首要攻坚点。
进入数据预处理阶段,传统的批量化滤波与卡尔曼滤波算法因其多次迭代及矩阵运算开销,被逐渐替换为能够并行执行的滤波网络或轻量化的稀疏滤波变体。例如,基于张量分解技术的三阶滤波网络能够将卡尔曼增益矩阵压缩为低秩近似,从而将运算复杂度从O(n³)降低至O(n² log n),在保留滤波精度的前提下缩减延迟。但同时,这类方法对系统总体误差累积效应的鲁棒性提出了更高要求,任何压缩近似误差都可能在后续决策层面被放大。
决策推演环节的核心难点则在于如何在有限的计算预算内,完成对复杂场景中多主体交互、道路拓扑及交通法规的同步评估。经典的基于马尔可夫决策过程(MDP)的路径规划算法,需要在每个离散时间步对潜在动作序列进行回溯搜索,其时间复杂度呈指数爆炸。研究者们引入了分层决策框架,将全局路径规划与局部运动规划解耦,并在高层采用粗粒度的图搜索、A*变体或基于采样的快速随机树算法,而在低层则构建基于深度强化学习的策略网络,以实现对最近时域内避障与车道保持的实时优化。然而,这种分层结构在节点切换时会引入架构中断,若缺少精细的同步机制,就会在决策链条中留下“盲区”,导致短时内无法响应突发事件。
在运动控制层面,工业界普遍采用模型预测控制(MPC)算法,但其需要在线求解约束最优化问题,而这类问题通常伴随高维非线性函数求导与二次规划(QP)迭代。为了加速求解过程,研究者借助自适应步长策略与多项式逼近技术,将QP子问题近似转化为一阶优化,即可将控制指令计算时延压缩至1–2 ms。但在面对高马力动力学系统或复杂路面摩擦系数变化时,模型误差对MPC的稳定性提出了新的挑战,需要在软实时环境中增加冗余检查与最坏情况回退机制,以避免因求解超时而导致的控制失效。
硬件层面的优化同样不可或缺。随着硬件加速器的多样化,FPGA、ASIC 与 GPU 在灵活性、功耗与吞吐量上各有千秋。研究团队提出了基于FPGA内置DSP单元的异构多核协同调度框架,该框架将高频率的卷积神经网络(CNN)推理任务映射至FPGA的流水线结构中,而将稀疏矩阵运算与图神经网络推理托付给GPU并行线程。此种交叉调度策略不仅提升了硬件利用率,也使得整体处理延迟在不牺牲精度的前提下下降了近40%。不过,异构计算环境下的任务分配与负载均衡依然是一个NP难题,任何调度错误都可能将过载风险转嫁至系统薄弱环节。
在通信与拓扑优化方面,车路协同(V2X)与边缘计算的深度融合正逐步改变未来出行的实时性格局。通过在关键路口部署边缘服务器,车辆可以将部分感知与决策任务外包给最近端的边缘单元,以获得更低的通信时延与更高的带宽保障。同时,为了防止网络拥塞引发的丢包与延迟抖动,研究者引入了迭代式传输冗余机制,即在关键帧或决策结果传递时,同时采用多路径传输协议与前向纠错(FEC)编码,以确保在丢包率达到1%时仍能将端到端时延控制在5 ms以内。
针对极端场景与突发工况,异步迭代调整机制被提出并投入小规模实车测试。该机制允许在主决策链路中断或信息不完整时,启动后备策略——包括基于经验库的保守行为决策与利用模式识别的短时预测——以维持车辆在三秒内的安全可控状态,并在后续通信链路恢复后进行全链路回溯校正与路径再优化。此举既保证了在网络抖动或传感器故障时的安全冗余,又保留了主决策框架的持续学习能力。
与此同时,为兼顾资源受限的边缘部署需求,轻量化剪枝与知识蒸馏技术在模型训练与推理中被广泛采用。研究表明,通过对原始大模型的网络结构进行梯度敏感度分析,删除微贡献的权重连接后,再以原模型输出作为软标签对精简后模型进行再训练,可在保证原有感知精度95%以上的情况下,将模型参数量与计算量均压缩至原版的30%左右。此外,借助在线蒸馏技术,边缘节点可在实车运行中持续从云端大模型接收更新,以应对道路环境的复杂多变。
在人工智能与物联网集成方面,多车协同仰赖联邦学习范式。车辆本地在边缘节点上进行增量式微调,并将模型梯度安全加密后上传至云端聚合,生成全局模型后同步下发。此循环既保护了车载数据的隐私安全,又借助大量车辆的多样化场景样本,提升了全局模型对复杂工况的泛化性能。
从系统架构视角看,云边协同正逐渐演变为三层架构——云端服务器负责全局模型训练与大规模数据挖掘;边缘节点承担在线推理与动态模型更新;终端车辆则完成感知数据获取与最末级控制执行。此分层协作模式在降低单点故障风险的同时,也将99 百分位延迟和尾部延迟等关键指标纳入持续监测,以确保系统在极端拥堵或恶劣天气条件下,依然能保持可接受的响应速度和可靠性
实时性研究将继续向微秒级做精细化耦合,并在在线学习、跨域传输优化、量子加速器应用等领域展开探索。唯有通过硬件与算法的协同创新、边缘与云端的无缝协作,以及异步与冗余机制的有机结合,才能真正实现毫秒乃至微秒级的实时自动驾驶,为智慧交通的安全与高效奠定坚实基础。
|
考点1:“基于张量分解的三阶滤波网络”应译为“tensor-decomposition filtering network”
考点2:“激光雷达通常以每秒数十万次帧率捕捉三维点云”中“每秒数十万次帧率”应译为“at a rate of hundreds of thousands of points per second”,不可译为“at hundreds of thousands of frames per second”
|
f50b9
|
学术论文
|
应用学科
|
174
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
1995年,上海希望通过设置生态屏障来防止城市的无序扩张,正式启动建设外环绿带。随着人们物质生活水平提高,闲暇时间对游憩活动的需求日益提升。地处乡村与城市交界地带的外环绿带具有独特地理区位及景观资源和多样的土地性质,具有实现城乡融合、面向全市人民提供高质量游憩服务的潜能 ( Jin et al.,2022)。经过30年的发展,外环绿带从防护绿化带到“环上”生态公园带。如何构建高密城区游憩服务场所,提供新型城市生活休闲方式,促进市民与自然互动是当前发展重点。
绿带的概念起源于英国社会学家霍华德提出的“田园城市”理论。1900年后伦敦城市快速扩张,伦敦郡议会提出设立Green Girdles (Thomas,1970,Masucci et al., 2013),而后经发展,绿带成为规划界的共识并得到全球推广实施(Schram & Doevendans, 2018). 几十年来,各国的绿带建设都在绿带破碎(Zheng et al.,2020)、各项效益减退(Jun et al.,2012)、城市建设越过绿带成片 (Yang et al., 2007)等争议中不断调整并进行职能转型,建立基于传统绿带的城市外环绿地新体系成为新趋势。
环城生态公园带是基于城乡融合发展和市民休闲游憩需求的背景,在城市绿带的基础上经过结构优化和功能提升演进形成的城市开放游憩空间( Zhang et al.,2024)。中国多位学者证明包括上海环城生态公园带的高密度城区公园环能帮助原绿带实现空间形态上优化拓展、功能定位上提质增效,回应市民游憩需求( Li et al.,2021,Ge et al.,2022,Zhang et al.,2024)。但当前全球针对环城公园带的系统研究较少,进一步探索从城市绿带到环城生态公园带发展过程中的理论研究和游憩服务提升的实践探索具有重要意义。
游憩一般指人们在工作或学习忙碌后会寻求额外的放松与娱乐行为(Zhao et al.,2020),学者普遍认为游憩服务是生态系统文化服务中的一种,通过对游憩资源进行规划、利用和管理,满足游人需求。目前游憩服务供给侧研究集中于游憩服务供给水平测量( Bedimo-Rung et al.,2005, Lee et al.,2013),诸多学者引用生态系统文化服务供给评估方法,通过recreation potential supply (RPS) and recreation opportunity supply (ROS)两模型建立评价体系(Paracchini et al.,2014)。但当前针对城市绿地系统的游憩服务水平研究仍较少,对城市绿带、公园环等绿地体系的游憩服务缺少系统评价体系,且针对游憩服务的供需匹配研究较少。有研究者引入空间溢出效应,揭示城市绿地游憩服务对周边区域存在近程溢出机制远程耦合影响,认为溢出效应评价与优化是缓解绿地游憩资源分配不公平问题的切入点。(Zhang et al.,2018, Wang et al.,2023)
溢出效应又叫外溢效应,指组织不仅能够产生活动所预期的效果,也能对组织之外的社会系统产生影响。研究普遍将绿地服务对周边区域产生的经济、社会和环境影响的辐射影响定义为绿地服务的溢出效应(Wu et al.,2023)。近年,有学者基于绿地作为准公共物品具有外部性特点,关注其外溢现象,探究绿地通过空间邻接或空间距离传递,对周边地区的影响机制,并对其外部溢出范围进行科学测度(Chen et al.,2022, Liu et al.,2024),证明构建空间相关网络对于加强区域合作提升城市绿地服务至关重要(Qu et al.,2024)。但当前绿地服务溢出效应研究仍较少,且多集中于宏观或单一尺度,缺乏中观尺度研究;此外,对溢出效应是绿地游憩服务范围及服务水平科学测度的重要切入点,但对绿地游憩服务溢出研究尚未得到充分关注。
上海环城生态公园带现存在游憩服务结构布局的空间不均衡与功能效能供需不平衡问题。上海环城生态公园带作为城乡边界和纽带,空间要素混杂且与各类生态空间密切联系,各段地理条件、土地利用现状、及社会经济发展水平存在差异,规划和建设难度大;公园带现无法满足市民对游憩服务的多样化需求,且公园带沿线区域的交通基础及城市功能差异显著,未来在游憩功能配置和服务供给质量方面有较大优化空间。
缓解环城生态公园带游憩服务问题,溢出效应评价与优化是重要切入点。科学评价其溢出效应,可促进区域协同、提升城市韧性,优化资源配置。相关研究通过分析正向溢出效应,为协同发展提供支持,提升生态公园带的响应能力,增强绿地体系韧性,形成可持续发展格局,同时揭示绿地游憩服务对城市环境的影响机制,识别供需不平衡的关键节点,进一步优化资源配置。
|
1995年,上海希望通过设置生态屏障来防止城市的无序扩张,正式启动建设外环绿带。随着人们物质生活水平提高,闲暇时间对游憩活动的需求日益提升。地处乡村与城市交界地带的外环绿带具有独特地理区位及景观资源和多样的土地性质,具有实现城乡融合、面向全市人民提供高质量游憩服务的潜能 ( Jin et al.,2022)。经过30年的发展,外环绿带从防护绿化带到“环上”生态公园带。如何构建高密城区游憩服务场所,提供新型城市生活休闲方式,促进市民与自然互动是当前发展重点。
绿带的概念起源于英国社会学家霍华德提出的“田园城市”理论。1900年后伦敦城市快速扩张,伦敦郡议会提出设立Green Girdles (Thomas,1970,Masucci et al., 2013),而后经发展,绿带成为规划界的共识并得到全球推广实施(Schram & Doevendans, 2018). 几十年来,各国的绿带建设都在绿带破碎(Zheng et al.,2020)、各项效益减退(Jun et al.,2012)、城市建设越过绿带成片 (Yang et al., 2007)等争议中不断调整并进行职能转型,建立基于传统绿带的城市外环绿地新体系成为新趋势。
环城生态公园带是基于城乡融合发展和市民休闲游憩需求的背景,在城市绿带的基础上经过结构优化和功能提升演进形成的城市开放游憩空间( Zhang et al.,2024)。中国多位学者证明包括上海环城生态公园带的高密度城区公园环能帮助原绿带实现空间形态上优化拓展、功能定位上提质增效,回应市民游憩需求( Li et al.,2021,Ge et al.,2022,Zhang et al.,2024)。但当前全球针对环城公园带的系统研究较少,进一步探索从城市绿带到环城生态公园带发展过程中的理论研究和游憩服务提升的实践探索具有重要意义。
游憩一般指人们在工作或学习忙碌后会寻求额外的放松与娱乐行为(Zhao et al.,2020),学者普遍认为游憩服务是生态系统文化服务中的一种,通过对游憩资源进行规划、利用和管理,满足游人需求。目前游憩服务供给侧研究集中于游憩服务供给水平测量( Bedimo-Rung et al.,2005, Lee et al.,2013),诸多学者引用生态系统文化服务供给评估方法,通过recreation potential supply (RPS) and recreation opportunity supply (ROS)两模型建立评价体系(Paracchini et al.,2014)。但当前针对城市绿地系统的游憩服务水平研究仍较少,对城市绿带、公园环等绿地体系的游憩服务缺少系统评价体系,且针对游憩服务的供需匹配研究较少。有研究者引入空间溢出效应,揭示城市绿地游憩服务对周边区域存在近程溢出机制远程耦合影响,认为溢出效应评价与优化是缓解绿地游憩资源分配不公平问题的切入点。(Zhang et al.,2018, Wang et al.,2023)
溢出效应又叫外溢效应,指组织不仅能够产生活动所预期的效果,也能对组织之外的社会系统产生影响。研究普遍将绿地服务对周边区域产生的经济、社会和环境影响的辐射影响定义为绿地服务的溢出效应(Wu et al.,2023)。近年,有学者基于绿地作为准公共物品具有外部性特点,关注其外溢现象,探究绿地通过空间邻接或空间距离传递,对周边地区的影响机制,并对其外部溢出范围进行科学测度(Chen et al.,2022, Liu et al.,2024),证明构建空间相关网络对于加强区域合作提升城市绿地服务至关重要(Qu et al.,2024)。但当前绿地服务溢出效应研究仍较少,且多集中于宏观或单一尺度,缺乏中观尺度研究;此外,对溢出效应是绿地游憩服务范围及服务水平科学测度的重要切入点,但对绿地游憩服务溢出研究尚未得到充分关注。
上海环城生态公园带现存在游憩服务结构布局的空间不均衡与功能效能供需不平衡问题。上海环城生态公园带作为城乡边界和纽带,空间要素混杂且与各类生态空间密切联系,各段地理条件、土地利用现状、及社会经济发展水平存在差异,规划和建设难度大;公园带现无法满足市民对游憩服务的多样化需求,且公园带沿线区域的交通基础及城市功能差异显著,未来在游憩功能配置和服务供给质量方面有较大优化空间。
缓解环城生态公园带游憩服务问题,溢出效应评价与优化是重要切入点。科学评价其溢出效应,可促进区域协同、提升城市韧性,优化资源配置。相关研究通过分析正向溢出效应,为协同发展提供支持,提升生态公园带的响应能力,增强绿地体系韧性,形成可持续发展格局,同时揭示绿地游憩服务对城市环境的影响机制,识别供需不平衡的关键节点,进一步优化资源配置。
|
考点1: “溢出效应”必须译为"spillover effect"
考点2: “绿带破碎”必须译为 "green belt fragmentation"
考点3:“无序扩张”推荐译为“uncontrolled expansion”或“disorderly expansion”或“urban sprawl”
考点4:伦敦郡议会 必须译为 London County Council,固定译法
考点5:空间相关网络 必须译为 spatial correlation network,专业术语,固定译法
|
f5b63
|
学术论文
|
自然科学
|
178
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
TERT在调控核苷酸添加持续性中发挥作用这一观点已获得充分支持。大量分析得出的核心结论是,在核苷酸添加持续性的决定因素方面,TERT与典型逆转录酶(RTs)在机制上具有高度的保守性。
对逆转录病毒RTs的既往研究表明,保守的RT基序1、2、B、C、E以及“拇指”结构域均参与持续性调控。除少数例外情况,TERT中相应的类似结构已被证实在持续性控制中具有相似作用。
TERT中三个保守的RT基序对维持最佳持续性至关重要,其中两个位于推测的“手指”结构域(基序1和2),一个位于“手掌”与“拇指”结构域的界面(基序E)。酵母和四膜虫中这些基序的许多点突变,都会导致连续核苷酸添加出现预期的功能损伤。重要的是,在保守位置上,端粒酶和逆转录病毒RTs要优化持续性,都需要完全相同的残基,这表明二者在机制上具有高度的保守性。例如,将酵母TERT的基序E中两个残基替换为HIV-1 RT对应位置的氨基酸,会使酵母端粒酶的持续性增强。HIV-1 RT转录复合物的晶体结构显示,保守的RT基序要么与三磷酸核苷酸结合(基序1和2),要么与引物末端结合(基序E),它们通过促进底物结合来调控持续性,这一作用机制不难理解。
对保守基序C的分析显示,其在机制保守性方面的情况更为复杂。该基序包含两个恒定的天冬氨酸(Asp)残基,这些残基对金属离子结合和聚合酶化学反应至关重要。逆转录病毒RTs中,Asp对前的两个残基通常是大型疏水氨基酸,但在TERTs中变异性更大。将四膜虫TERT第813位(位于两个保守天冬氨酸前两位)的亮氨酸替换为逆转录病毒RTs特有的酪氨酸,得到的酶持续性增强。相反,将Est2p中Asp对前的两个残基替换为酪氨酸和苏氨酸,会导致持续性显著降低。这些结果表明,基序C对持续性的影响是通过其整体构象和化学反应介导的,而非单个氨基酸。在HIV-1 RT的晶体结构中,Asp对前两位的酪氨酸与DNA引物中倒数第二个核苷酸结合,这为其影响持续性提供了一种合理机制。将TERT中两个天冬氨酸前的残基替换为甲硫氨酸(HIV-1 RT中存在该残基且与引物末端相互作用),这一实验值得关注。不过,HIV-1 RT中该残基的突变似乎不影响聚合功能,但会降低DNA合成的保真度。
另一组与核苷酸添加持续性相关的残基位于C端结构域。尽管该区域的序列保守性较弱,但酵母和人类TERT的该结构域中,多个突变都会损伤核苷酸添加持续性,这与功能保守性相符。与典型RTs类比,TERT的该结构域被认为构成端粒酶的“拇指”结构域。C端突变对Km值、端粒酶-底物稳定性的影响,以及酵母TERT该结构域具有弱核酸结合活性的证实,进一步支持了这一观点。由于重复添加持续性是端粒酶特有的生化属性,自然会推测端粒酶特异性结构负责这一活性。事实上,已证实能促进重复添加的三组TERT残基,虽分布于RT结构域内外,但主要局限于端粒酶特异性基序中。以下将分别对这些残基进行讨论。
首先,如前所述,与典型RTs相比,TERT的RT结构域在保守基序A和B之间存在一个大的插入片段,即IFD(插入结构域)。在酵母端粒酶中,该结构域的特定突变会导致重复添加缺陷,并显著降低端粒酶对DNA底物的Km值。然而,酵母端粒酶在体外的重复添加水平天然极低。因此,评估四膜虫和人类等持续性更强的端粒酶中,相应残基的作用具有重要意义。
第二组与重复添加相关的残基位于人TERT(hTERT)的C端结构域。如前所述,该结构域被认为构成端粒酶的“拇指”结构域。尽管酵母和人类TERT的C端结构域中,许多突变主要损伤核苷酸添加持续性,但hTERT该结构域的几个缺失突变也会降低重复添加,这表明人类端粒酶的“拇指”结构域具有额外功能。
最后一组有助于重复添加持续性的残基,定位于hTERT的RID1结构域和酵母TERT的同源N-GQ结构域。多项研究表明,该结构域的缺失和点突变会选择性损伤重复添加持续性,并降低端粒酶延伸部分或完全非端粒引物的能力。突变体对端粒DNA的表观Km值也会降低,这再次表明RID1/N-GQ结构域有助于DNA结合。
与TERT促进重复添加的作用相关的,是端粒酶酶学中的一个经典问题,即锚定位点的身份。对纤毛虫和人类端粒酶的早期功能分析表明,端粒酶包含第二个不依赖模板的DNA底物结合位点。该位点(也称为锚定位点)的存在,是通过5' DNA底物序列对酶的重复添加持续性、结合亲和力和催化速率的影响推断得出的。随后,利用绿草履虫(*E. aediculatus*)和酿酒酵母(*S. cerevisiae*)来源的酶进行的交联实验,确定了TERT大小的蛋白质负责与DNA的5'区域物理接触。进一步研究表明,锚定位点在功能上可分为模板近端和模板远端位点,且可能只有前者对重复添加持续性是必需的。RID1/N-GQ结构域对重复添加持续性和DNA底物识别的作用表明,该结构域可能构成模板近端锚定位点。酵母TERT上DNA交联位点的近期蛋白水解图谱支持了这一观点。已知hTERT的RID1结构域是与端粒酶RNA的假结-模板区域相互作用的位点,该区域也与促进重复添加持续性有关。蛋白质和RNA结构域在锚定位点功能中的相对作用及其相互影响,值得进一步研究。
由于端粒酶合成端粒DNA重复序列需要TERT和RNA组件,因此这两个组件的稳定组装对酶活性至关重要。已证实TERT的两个结构域介导与端粒酶RNA的相互作用。一个亲和力较高的RNA结合结构域对应于N端延伸区(NTE)的C端部分,该部分包含三个保守的端粒酶特异性基序,分别命名为CP、QFP和T。在酵母、人类和四膜虫中,NTE的这部分已被证明与端粒酶RNA相互作用。令人惊讶的是,尽管该结构域在所有TERT中显然构成高亲和力RNA结合结构,但在不同生物中,它似乎与端粒酶RNA的不同靶标相互作用。在酵母中,包含潜在茎环/假结结构的区域被确定为TERT结合所必需;在人类中,远离模板的保守CR4-CR5区域是高亲和力结构域的靶位点;在四膜虫中,TERT结合需要RNA模板5'侧的几个核苷酸以及茎II,且似乎不涉及保守的假结。保守的蛋白质结构域识别明显不同的RNA结构,这一现象难以解释。一种可能的解释是,CP基序N端的蛋白质区域发挥了作用。酵母、人类和四膜虫TERT的高亲和力RNA结合结构域似乎延伸到这一保守性较低的区域,该区域具有物种特异性特征。因此,高度保守的基序可能形成一个共同的支架,物种特异性结构附着其上,以介导对不同RNA靶标的识别。除了促进端粒酶RNP的稳定组装外,四膜虫的RNA结合结构域还有一个额外作用:帮助确定模板的5'边界。减弱这种相互作用会导致逆转录显著超出正常模板边界。探究其他TERT中的类似突变是否也会影响模板边界的确定,将是一件有趣的事。
第二个亲和力较低的RNA相互作用显然由RID1/N-GQ结构域介导。同样,不同生物中该结构域的RNA靶标也不同。四膜虫的RNA靶标包含一个茎环和模板3'端紧邻的一段区域(称为模板识别元件);人类的靶标似乎位于假结-模板结构域,而酵母的靶标尚未确定。如前文所述,RID1/N-GQ结构域已被证明能促进重复添加持续性和酶互补,还需进一步研究以确定RNA相互作用在这些功能中的作用。
|
TERT在调控核苷酸添加持续性中发挥作用这一观点已获得充分支持。大量分析得出的核心结论是,在核苷酸添加持续性的决定因素方面,TERT与典型逆转录酶(RTs)在机制上具有高度的保守性。
对逆转录病毒RTs的既往研究表明,保守的RT基序1、2、B、C、E以及“拇指”结构域均参与持续性调控。除少数例外情况,TERT中相应的类似结构已被证实在持续性控制中具有相似作用。
TERT中三个保守的RT基序对维持最佳持续性至关重要,其中两个位于推测的“手指”结构域(基序1和2),一个位于“手掌”与“拇指”结构域的界面(基序E)。酵母和四膜虫中这些基序的许多点突变,都会导致连续核苷酸添加出现预期的功能损伤。重要的是,在保守位置上,端粒酶和逆转录病毒RTs要优化持续性,都需要完全相同的残基,这表明二者在机制上具有高度的保守性。例如,将酵母TERT的基序E中两个残基替换为HIV-1 RT对应位置的氨基酸,会使酵母端粒酶的持续性增强。HIV-1 RT转录复合物的晶体结构显示,保守的RT基序要么与三磷酸核苷酸结合(基序1和2),要么与引物末端结合(基序E),它们通过促进底物结合来调控持续性,这一作用机制不难理解。
对保守基序C的分析显示,其在机制保守性方面的情况更为复杂。该基序包含两个恒定的天冬氨酸(Asp)残基,这些残基对金属离子结合和聚合酶化学反应至关重要。逆转录病毒RTs中,Asp对前的两个残基通常是大型疏水氨基酸,但在TERTs中变异性更大。将四膜虫TERT第813位(位于两个保守天冬氨酸前两位)的亮氨酸替换为逆转录病毒RTs特有的酪氨酸,得到的酶持续性增强。相反,将Est2p中Asp对前的两个残基替换为酪氨酸和苏氨酸,会导致持续性显著降低。这些结果表明,基序C对持续性的影响是通过其整体构象和化学反应介导的,而非单个氨基酸。在HIV-1 RT的晶体结构中,Asp对前两位的酪氨酸与DNA引物中倒数第二个核苷酸结合,这为其影响持续性提供了一种合理机制。将TERT中两个天冬氨酸前的残基替换为甲硫氨酸(HIV-1 RT中存在该残基且与引物末端相互作用),这一实验值得关注。不过,HIV-1 RT中该残基的突变似乎不影响聚合功能,但会降低DNA合成的保真度。
另一组与核苷酸添加持续性相关的残基位于C端结构域。尽管该区域的序列保守性较弱,但酵母和人类TERT的该结构域中,多个突变都会损伤核苷酸添加持续性,这与功能保守性相符。与典型RTs类比,TERT的该结构域被认为构成端粒酶的“拇指”结构域。C端突变对Km值、端粒酶-底物稳定性的影响,以及酵母TERT该结构域具有弱核酸结合活性的证实,进一步支持了这一观点。由于重复添加持续性是端粒酶特有的生化属性,自然会推测端粒酶特异性结构负责这一活性。事实上,已证实能促进重复添加的三组TERT残基,虽分布于RT结构域内外,但主要局限于端粒酶特异性基序中。以下将分别对这些残基进行讨论。
首先,如前所述,与典型RTs相比,TERT的RT结构域在保守基序A和B之间存在一个大的插入片段,即IFD(插入结构域)。在酵母端粒酶中,该结构域的特定突变会导致重复添加缺陷,并显著降低端粒酶对DNA底物的Km值。然而,酵母端粒酶在体外的重复添加水平天然极低。因此,评估四膜虫和人类等持续性更强的端粒酶中,相应残基的作用具有重要意义。
第二组与重复添加相关的残基位于人TERT(hTERT)的C端结构域。如前所述,该结构域被认为构成端粒酶的“拇指”结构域。尽管酵母和人类TERT的C端结构域中,许多突变主要损伤核苷酸添加持续性,但hTERT该结构域的几个缺失突变也会降低重复添加,这表明人类端粒酶的“拇指”结构域具有额外功能。
最后一组有助于重复添加持续性的残基,定位于hTERT的RID1结构域和酵母TERT的同源N-GQ结构域。多项研究表明,该结构域的缺失和点突变会选择性损伤重复添加持续性,并降低端粒酶延伸部分或完全非端粒引物的能力。突变体对端粒DNA的表观Km值也会降低,这再次表明RID1/N-GQ结构域有助于DNA结合。
与TERT促进重复添加的作用相关的,是端粒酶酶学中的一个经典问题,即锚定位点的身份。对纤毛虫和人类端粒酶的早期功能分析表明,端粒酶包含第二个不依赖模板的DNA底物结合位点。该位点(也称为锚定位点)的存在,是通过5' DNA底物序列对酶的重复添加持续性、结合亲和力和催化速率的影响推断得出的。随后,利用绿草履虫(*E. aediculatus*)和酿酒酵母(*S. cerevisiae*)来源的酶进行的交联实验,确定了TERT大小的蛋白质负责与DNA的5'区域物理接触。进一步研究表明,锚定位点在功能上可分为模板近端和模板远端位点,且可能只有前者对重复添加持续性是必需的。RID1/N-GQ结构域对重复添加持续性和DNA底物识别的作用表明,该结构域可能构成模板近端锚定位点。酵母TERT上DNA交联位点的近期蛋白水解图谱支持了这一观点。已知hTERT的RID1结构域是与端粒酶RNA的假结-模板区域相互作用的位点,该区域也与促进重复添加持续性有关。蛋白质和RNA结构域在锚定位点功能中的相对作用及其相互影响,值得进一步研究。
由于端粒酶合成端粒DNA重复序列需要TERT和RNA组件,因此这两个组件的稳定组装对酶活性至关重要。已证实TERT的两个结构域介导与端粒酶RNA的相互作用。一个亲和力较高的RNA结合结构域对应于N端延伸区(NTE)的C端部分,该部分包含三个保守的端粒酶特异性基序,分别命名为CP、QFP和T。在酵母、人类和四膜虫中,NTE的这部分已被证明与端粒酶RNA相互作用。令人惊讶的是,尽管该结构域在所有TERT中显然构成高亲和力RNA结合结构,但在不同生物中,它似乎与端粒酶RNA的不同靶标相互作用。在酵母中,包含潜在茎环/假结结构的区域被确定为TERT结合所必需;在人类中,远离模板的保守CR4-CR5区域是高亲和力结构域的靶位点;在四膜虫中,TERT结合需要RNA模板5'侧的几个核苷酸以及茎II,且似乎不涉及保守的假结。保守的蛋白质结构域识别明显不同的RNA结构,这一现象难以解释。一种可能的解释是,CP基序N端的蛋白质区域发挥了作用。酵母、人类和四膜虫TERT的高亲和力RNA结合结构域似乎延伸到这一保守性较低的区域,该区域具有物种特异性特征。因此,高度保守的基序可能形成一个共同的支架,物种特异性结构附着其上,以介导对不同RNA靶标的识别。除了促进端粒酶RNP的稳定组装外,四膜虫的RNA结合结构域还有一个额外作用:帮助确定模板的5'边界。减弱这种相互作用会导致逆转录显著超出正常模板边界。探究其他TERT中的类似突变是否也会影响模板边界的确定,将是一件有趣的事。
第二个亲和力较低的RNA相互作用显然由RID1/N-GQ结构域介导。同样,不同生物中该结构域的RNA靶标也不同。四膜虫的RNA靶标包含一个茎环和模板3'端紧邻的一段区域(称为模板识别元件);人类的靶标似乎位于假结-模板结构域,而酵母的靶标尚未确定。如前文所述,RID1/N-GQ结构域已被证明能促进重复添加持续性和酶互补,还需进一步研究以确定RNA相互作用在这些功能中的作用。
|
考点1: “逆转录酶” 推荐译为 “reverse transcriptase (RT)”
考点2:“三磷酸核苷酸” 推荐译为 “nucleotide triphosphate”
考点3: “端粒DNA” 推荐译为 “telomere DNA”
考点4:文中的 “典型逆转录酶” 描述的是逆转录酶中的原型代表,在原文的语境中强调酶的“原型和典型”,需要翻译为 “prototypical RTs”,不可以翻译为 “canonical reverse transcriptases”。
考点5: “HIV-1 RT转录复合物” 推荐译为 “HIV-1 RT reverse transcription complex”,避免将“逆转录”误译为“转录”。
考点6: 首次出现“三磷酸核苷酸”应使用“nucleotide triphosphate”,不要用“nucleoside triphosphate”除非上下文明确强调核苷而非核苷酸。
考点7: “IFD” 全称推荐译为 “insertion in fingers domain (IFD)” 或 “insertion domain (IFD)”,首次出现需给出全称及缩写并全文统一。
|
f769e
|
学术论文
|
自然科学
|
116
|
翻译,英文翻译成中文。不要输出译文以外的内容。
以下是你本次的任务:
2. Lithium-ion batteries in tunnel energy storage system
The tunnel energy storage system (TESS) has the characteristics of peak shaving and valley filling, delayed power consumption, power quality optimization, etc. Peak clipping and valley filling is charging when the power is in the “flat” and “valley” periods, and discharging when the power is in the “peak” periods, which can not only save the operating cost of power supply, but also reduce the cost of providing frequency regulation and standby power supply. When the power grid encounters power failure, the energy storage system can be used as a backup power supply to continuously supply power for tunnel lighting and ventilation. In addition, the installation and application of the energy storage system can filter out the disturbance from the power grid, which can be used as a special power quality control device to improve the power supply quality of important loads. From the perspective of energy conservation and emission reduction, the energy storage system transfers the electric energy of low carbon emission power sources to peak load periods during off peak load periods, thereby reducing the consumption of high emission energy, which is conducive to energy conservation and emission reduction. lithium-ion battery (LIB) is an ideal high-energy energy storage battery due to its high specific capacity, small self discharge, long storage time, no memory effect, long lifetime, fast charging and other advantages, which is widely used in TESS.
As shown in Fig. 3, the tunnel LIB energy storage system is mainly composed of a battery system, a power converter system (PCS), a battery management system (BMS), an energy management system (EMS), and a monitoring system. Nowadays, LIBs are developing in the direction of higher safety, high environmental protection, high energy density, and long lifetime. As a lithium-ion concentration difference battery, the main components include: cathode and anode materials, electrolytes, separators, and shells.
2.1. The working principle of lithium-ion batteries
As shown in Fig. 4, during the charging and discharging process of LIBs, lithium ions are intercalated and deintercalated back and forth between the positive negative electrode, thereby realizing the mutual conversion of chemical energy and electrical energy. During charging, lithium ions are deintercalated from the lithium-rich positive electrode, enter the electrolyte, pass through the separator, and are transported to be embedded in the negative electrode. At this time, the negative electrode is in a lithium-rich state, while the positive electrode is in a lithium-poor state, and the electrons are transmitted from the positive electrode by the external circuit. To the negative electrode, electrical energy is converted into chemical energy. During discharge, lithium ions are deintercalated from the negative electrode, pass through the electrolyte, pass through the separator, and re-insert into the lithium-poor positive electrode, and electrons are transferred from the negative electrode back to the positive electrode by the external circuit, Return the electric charge to the equilibrium state and realize the conversion of chemical energy to electrical energy.
2.2. Cathode materials
As one of the important components of LIBs, the cathode materials determine the performance of LIBs, and it should meet the following requirements: (1) higher potential and stable platform to ensure high voltage for battery operation; (2) small electrochemical equivalent to ensure large specific capacity of the battery; (3) high lithium ion diffusion coefficient and conductivity to ensure high reversible capacity of the battery; (4) excellent embeddedness and de-embeddedness, small structural change to ensure the long cycle lifetime of the battery; (5) good compatibility with the electrolyte to ensure high chemical and thermal stability of the battery; (6) low price and green environmental protection to ensure that the battery is environmentally friendly. The cathode materials of LIBs can be divided into layered structure, spinel structure and polyanion type (olivine type) according to their structures.
Typical layered cathode materials are: lithium cobaltate (LiCoO2), lithium nickelate (LiNiO2), lithium manganate (LiMnO2), ternary transition metal oxides. As shown in Fig. 5, LiCoO2, the most representative layered oxide, was first used as a cathode material for commercial LIBs. Its α-NaFeO2 type layered structure has electrochemical stability. However, in the case of deep delithiation, the structure will be severely damaged due to the higher charging voltage, which affects the performance of LIBs. However, it is possible to improve the structural stability and improve the performance of LiCoO2 by increasing the charge-discharge voltage of the LiCoO2 cathode material or by doping other elements (such as Mg, Al, etc.). As LiNiO2, which has attracted more attention recently, although Ni is richer in resources, lower in cost and less harmful to the environment than Co, the radius of Ni2+ and Li are close, which is easy to cause mixed discharge, so LiNiO+2 has poor thermal stability. The researchers have stabilized its structure by doping it with Al elements. LiMnO2 mainly has two structures of monoclinic phase and orthorhombic phase, and its actual specific capacity is higher than that of LiCoO2 and LiNiO2, but its Mn3+ is unstable and easy to transform to Mn4+, resulting in structural variation, which seriously affects its electrochemical stability. It can be stabilized by doping with other elements. Due to the unsatisfactory performance of single LiCoO2, LiNiO2 and LiMnO2, the ternary material LiNixCoyMn1-x-yO2 combines the high conductivity and performance of Co, the high specific capacity of Ni, and the strong stability and safety of Mn, effectively improving its performance,.
As shown in Fig. 5, the most representative cathode material of spinel structure is lithium manganate (LiMn2O4), which has the characteristics of low price, simple synthesis process and strong safety. LiMn2O4 (belonging to the Fd3m space group ) has low theoretical and practical specific capacities, and the capacity decays severely during high-temperature cycling because the Jahn-Teller effect occurs during charge-discharge, resulting in severe structural deformation, and due to the action of electrolyte, soluble Mn2+ is produced, which seriously affects the performance of LIBs, so it is not suitable for large-scale power equipment. However, studies have shown that LiMn2O4 can be protected by doping Al, Cr and other elements to stabilize its structure or coating the surface with oxides such as Al2O3 and Y2O3 to prevent direct contact with the electrolyte, thereby improving the performance of LIBs,.
The polyanion type (olivine type) cathode material has good stability and safety. As shown in Fig. 5, at present, the main commercial one is lithium iron phosphate (LiFePO4), which is also the most commonly used cathode material for energy storage systems. Its Li and Fe+2+ are paired with O2− to form different LiO6 and FeO6 octahedra and PO4 tetrahedra staggered to form a space skeleton structure. However, due to its own structure, Li transport is limited, resulting in low conductivity and poor performance of LiFePO+4. At present, LiFePO4 can be modified by doping, coating, and nanometerization.
The above common cathode materials have stable thermal safety when the temperature does not exceed 650 °C, and they can also be in a stable voltage state when charging. The main factors restricting the thermal safety of cathode materials for LIBs are as follows: a large amount of heat is generated under the condition of heat abuse; it releases oxygen or has strong oxidizability in case of overcharge. Both of these are necessary conditions for TR of LIBs, which will eventually lead to the decline of capacity and performance of LIBs.
2.3. Anode materials
The anode materials, as the carrier of lithium ions and electrons in the process of battery charge and discharge, plays the role of energy storage and release, and should meet : (1) low working potential; (2) good electrochemical stability; (3) higher specific capacity; (4) stable structure and charge-discharge platform; (5) higher electrical conductivity; (6) lower cost and high environmental protection. As shown in Fig. 6, anode materials for LIBs can be divided into: intercalation, alloy and conversion types according to the lithium storage mechanism.
Intercalation-type anode materials can store lithium by intercalating lithium ions into their structural gaps, and have good stability because they can remain reversible during the intercalation and deintercalation processes and their structure will not be destroyed. At present, typical intercalation anode materials mainly include carbon-based, titanium-based materials, and some layered metal compounds. Among them, carbon-based materials include graphite, soft, hard carbon, carbon nanomaterials (carbon nanotubes, graphene), etc.. As the earliest commercialized and most commonly used anode material, graphite has the characteristics of stable electrochemical performance, high tap density, abundant resources and low cost. However, due to the poor compatibility between graphite and electrolyte, a thicker SEI film will be formed with the electrolyte at the beginning of charge and discharge, causing Li to pass through the SEI film for a long time, resulting in poor battery performance. At present, it can be improved by surface coating, doping and other technologies. Titanium-based materials mainly include TiO+2, Li4Ti5O12, etc., which have been widely studied and developed due to their stable electrochemical performance, environmental protection and no pollution. Fig. 7 is a comparison chart of the advantages and disadvantages of common carbon-based materials.
Alloy-type anode materials store lithium through an alloying reaction with lithium ions, with ultra-high specific capacity and low charge-discharge platform, such as silicon-based, germanium-based, tin-based materials, etc. As the silicon-based materials with the highest specific capacity among the alloy-type anode materials, they have the characteristics of abundant resources, green environmental protection, and low price. However, due to theirs huge volume expansion during the charging and discharging process, the silicon particles are crushed, fallen off, and the structure collapses. It leads to irreversible loss of capacity, exposes silicon particles to electrolyte, forms a new SEI film, hinders the conduction of lithium ions, and seriously affects the performance of the battery. At present, scientists have improved theirs electrochemical performance through schemes such as silicon nanoization and silicon-based material composite. Germanium-based, tin-based materials and other alloy-type anode materials also have the problem of drastic volume changes during charging and discharging, resulting in too few practical applications, which can also be modified by certain means.
Conversion-type anode materials store lithium through reversible redox reactions with lithium ions, and have the advantages of higher specific capacity than intercalation-type anode materials, and smaller volume changes during charge and discharge than alloy-type anode materials. Such materials are mainly transition metal compounds, such as oxides, sulfides, fluorides, phosphides, etc.. However, most of the transition metal compounds have low conductivity, low first coulomb efficiency, large and obvious volume change, and high working potential, which greatly affect the performance of LIBs, resulting in shorter life and lower efficiency. At present, most of the current modifications are made by nanosizing the oxide.
The thermal safety of anode materials is related to their type, particle size and the stability of SEI film formed by the cathode. If the size particles are made into cathode materials according to a certain proportion, the purpose of expanding the contact area between particles, reducing electrode impedance, increasing electrode capacity and reducing the possibility of active metal precipitation can be achieved. The quality of SEI film directly affects the charging and discharging performance and safety of LIBs. The main methods to improve the quality of SEI film are: weak oxidation of carbon material surface; carbon materials after reduction, doping and surface modification; use spherical or fibrous carbon materials. The safety of anode materials can be improved by reducing the specific surface area of anode materials and improving the thermal stability of SEI films.
|
2. Lithium-ion batteries in tunnel energy storage system
The tunnel energy storage system (TESS) has the characteristics of peak shaving and valley filling, delayed power consumption, power quality optimization, etc. Peak clipping and valley filling is charging when the power is in the “flat” and “valley” periods, and discharging when the power is in the “peak” periods, which can not only save the operating cost of power supply, but also reduce the cost of providing frequency regulation and standby power supply. When the power grid encounters power failure, the energy storage system can be used as a backup power supply to continuously supply power for tunnel lighting and ventilation. In addition, the installation and application of the energy storage system can filter out the disturbance from the power grid, which can be used as a special power quality control device to improve the power supply quality of important loads. From the perspective of energy conservation and emission reduction, the energy storage system transfers the electric energy of low carbon emission power sources to peak load periods during off peak load periods, thereby reducing the consumption of high emission energy, which is conducive to energy conservation and emission reduction. lithium-ion battery (LIB) is an ideal high-energy energy storage battery due to its high specific capacity, small self discharge, long storage time, no memory effect, long lifetime, fast charging and other advantages, which is widely used in TESS.
As shown in Fig. 3, the tunnel LIB energy storage system is mainly composed of a battery system, a power converter system (PCS), a battery management system (BMS), an energy management system (EMS), and a monitoring system. Nowadays, LIBs are developing in the direction of higher safety, high environmental protection, high energy density, and long lifetime. As a lithium-ion concentration difference battery, the main components include: cathode and anode materials, electrolytes, separators, and shells.
2.1. The working principle of lithium-ion batteries
As shown in Fig. 4, during the charging and discharging process of LIBs, lithium ions are intercalated and deintercalated back and forth between the positive negative electrode, thereby realizing the mutual conversion of chemical energy and electrical energy. During charging, lithium ions are deintercalated from the lithium-rich positive electrode, enter the electrolyte, pass through the separator, and are transported to be embedded in the negative electrode. At this time, the negative electrode is in a lithium-rich state, while the positive electrode is in a lithium-poor state, and the electrons are transmitted from the positive electrode by the external circuit. To the negative electrode, electrical energy is converted into chemical energy. During discharge, lithium ions are deintercalated from the negative electrode, pass through the electrolyte, pass through the separator, and re-insert into the lithium-poor positive electrode, and electrons are transferred from the negative electrode back to the positive electrode by the external circuit, Return the electric charge to the equilibrium state and realize the conversion of chemical energy to electrical energy.
2.2. Cathode materials
As one of the important components of LIBs, the cathode materials determine the performance of LIBs, and it should meet the following requirements: (1) higher potential and stable platform to ensure high voltage for battery operation; (2) small electrochemical equivalent to ensure large specific capacity of the battery; (3) high lithium ion diffusion coefficient and conductivity to ensure high reversible capacity of the battery; (4) excellent embeddedness and de-embeddedness, small structural change to ensure the long cycle lifetime of the battery; (5) good compatibility with the electrolyte to ensure high chemical and thermal stability of the battery; (6) low price and green environmental protection to ensure that the battery is environmentally friendly. The cathode materials of LIBs can be divided into layered structure, spinel structure and polyanion type (olivine type) according to their structures.
Typical layered cathode materials are: lithium cobaltate (LiCoO2), lithium nickelate (LiNiO2), lithium manganate (LiMnO2), ternary transition metal oxides. As shown in Fig. 5, LiCoO2, the most representative layered oxide, was first used as a cathode material for commercial LIBs. Its α-NaFeO2 type layered structure has electrochemical stability. However, in the case of deep delithiation, the structure will be severely damaged due to the higher charging voltage, which affects the performance of LIBs. However, it is possible to improve the structural stability and improve the performance of LiCoO2 by increasing the charge-discharge voltage of the LiCoO2 cathode material or by doping other elements (such as Mg, Al, etc.). As LiNiO2, which has attracted more attention recently, although Ni is richer in resources, lower in cost and less harmful to the environment than Co, the radius of Ni2+ and Li are close, which is easy to cause mixed discharge, so LiNiO+2 has poor thermal stability. The researchers have stabilized its structure by doping it with Al elements. LiMnO2 mainly has two structures of monoclinic phase and orthorhombic phase, and its actual specific capacity is higher than that of LiCoO2 and LiNiO2, but its Mn3+ is unstable and easy to transform to Mn4+, resulting in structural variation, which seriously affects its electrochemical stability. It can be stabilized by doping with other elements. Due to the unsatisfactory performance of single LiCoO2, LiNiO2 and LiMnO2, the ternary material LiNixCoyMn1-x-yO2 combines the high conductivity and performance of Co, the high specific capacity of Ni, and the strong stability and safety of Mn, effectively improving its performance,.
As shown in Fig. 5, the most representative cathode material of spinel structure is lithium manganate (LiMn2O4), which has the characteristics of low price, simple synthesis process and strong safety. LiMn2O4 (belonging to the Fd3m space group ) has low theoretical and practical specific capacities, and the capacity decays severely during high-temperature cycling because the Jahn-Teller effect occurs during charge-discharge, resulting in severe structural deformation, and due to the action of electrolyte, soluble Mn2+ is produced, which seriously affects the performance of LIBs, so it is not suitable for large-scale power equipment. However, studies have shown that LiMn2O4 can be protected by doping Al, Cr and other elements to stabilize its structure or coating the surface with oxides such as Al2O3 and Y2O3 to prevent direct contact with the electrolyte, thereby improving the performance of LIBs,.
The polyanion type (olivine type) cathode material has good stability and safety. As shown in Fig. 5, at present, the main commercial one is lithium iron phosphate (LiFePO4), which is also the most commonly used cathode material for energy storage systems. Its Li and Fe+2+ are paired with O2− to form different LiO6 and FeO6 octahedra and PO4 tetrahedra staggered to form a space skeleton structure. However, due to its own structure, Li transport is limited, resulting in low conductivity and poor performance of LiFePO+4. At present, LiFePO4 can be modified by doping, coating, and nanometerization.
The above common cathode materials have stable thermal safety when the temperature does not exceed 650 °C, and they can also be in a stable voltage state when charging. The main factors restricting the thermal safety of cathode materials for LIBs are as follows: a large amount of heat is generated under the condition of heat abuse; it releases oxygen or has strong oxidizability in case of overcharge. Both of these are necessary conditions for TR of LIBs, which will eventually lead to the decline of capacity and performance of LIBs.
2.3. Anode materials
The anode materials, as the carrier of lithium ions and electrons in the process of battery charge and discharge, plays the role of energy storage and release, and should meet : (1) low working potential; (2) good electrochemical stability; (3) higher specific capacity; (4) stable structure and charge-discharge platform; (5) higher electrical conductivity; (6) lower cost and high environmental protection. As shown in Fig. 6, anode materials for LIBs can be divided into: intercalation, alloy and conversion types according to the lithium storage mechanism.
Intercalation-type anode materials can store lithium by intercalating lithium ions into their structural gaps, and have good stability because they can remain reversible during the intercalation and deintercalation processes and their structure will not be destroyed. At present, typical intercalation anode materials mainly include carbon-based, titanium-based materials, and some layered metal compounds. Among them, carbon-based materials include graphite, soft, hard carbon, carbon nanomaterials (carbon nanotubes, graphene), etc.. As the earliest commercialized and most commonly used anode material, graphite has the characteristics of stable electrochemical performance, high tap density, abundant resources and low cost. However, due to the poor compatibility between graphite and electrolyte, a thicker SEI film will be formed with the electrolyte at the beginning of charge and discharge, causing Li to pass through the SEI film for a long time, resulting in poor battery performance. At present, it can be improved by surface coating, doping and other technologies. Titanium-based materials mainly include TiO+2, Li4Ti5O12, etc., which have been widely studied and developed due to their stable electrochemical performance, environmental protection and no pollution. Fig. 7 is a comparison chart of the advantages and disadvantages of common carbon-based materials.
Alloy-type anode materials store lithium through an alloying reaction with lithium ions, with ultra-high specific capacity and low charge-discharge platform, such as silicon-based, germanium-based, tin-based materials, etc. As the silicon-based materials with the highest specific capacity among the alloy-type anode materials, they have the characteristics of abundant resources, green environmental protection, and low price. However, due to theirs huge volume expansion during the charging and discharging process, the silicon particles are crushed, fallen off, and the structure collapses. It leads to irreversible loss of capacity, exposes silicon particles to electrolyte, forms a new SEI film, hinders the conduction of lithium ions, and seriously affects the performance of the battery. At present, scientists have improved theirs electrochemical performance through schemes such as silicon nanoization and silicon-based material composite. Germanium-based, tin-based materials and other alloy-type anode materials also have the problem of drastic volume changes during charging and discharging, resulting in too few practical applications, which can also be modified by certain means.
Conversion-type anode materials store lithium through reversible redox reactions with lithium ions, and have the advantages of higher specific capacity than intercalation-type anode materials, and smaller volume changes during charge and discharge than alloy-type anode materials. Such materials are mainly transition metal compounds, such as oxides, sulfides, fluorides, phosphides, etc.. However, most of the transition metal compounds have low conductivity, low first coulomb efficiency, large and obvious volume change, and high working potential, which greatly affect the performance of LIBs, resulting in shorter life and lower efficiency. At present, most of the current modifications are made by nanosizing the oxide.
The thermal safety of anode materials is related to their type, particle size and the stability of SEI film formed by the cathode. If the size particles are made into cathode materials according to a certain proportion, the purpose of expanding the contact area between particles, reducing electrode impedance, increasing electrode capacity and reducing the possibility of active metal precipitation can be achieved. The quality of SEI film directly affects the charging and discharging performance and safety of LIBs. The main methods to improve the quality of SEI film are: weak oxidation of carbon material surface; carbon materials after reduction, doping and surface modification; use spherical or fibrous carbon materials. The safety of anode materials can be improved by reducing the specific surface area of anode materials and improving the thermal stability of SEI films.
|
考点1. "Power Converter System"必须译为"功率转换系统"
考点2. "small self discharge"推荐译为 "自放电率低"
考点3. "delayed power consumption" 推荐译为"延迟用电"
考点4. "standby power supply" 推荐译为"待机电源"
考点5. "frequency regulation" 必须译为"调频控制"
考点6. "thermal abuse" 必须译为"热失控"
考点7. "severe structural deformation" 推荐译为"晶格畸变"
|
f8e40
|
学术论文
|
自然科学
|
141
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
魅力一词最早是由马克斯·韦伯从宗教文化词汇引入社会、政治、经济等领域的学术概念。具体而言,韦伯将魅力解释为:“能够使个体区分于普通人的非凡品质,从而使其被追随者认可为具有超自然的、超人的或至少是(有)特殊能力的”。基于韦伯对三种组织内部领导权威——即传统型、理性—法定型和克里斯马型的理想类型的论述,之后的学者将魅力应用于探究现代社会中的依赖“英雄主义或个人启示”的领导风格与政治权威。近年来,也有传播学者注意到,魅力同样关乎“饭圈”粉丝将偶像视为“精神领袖”或“神明”的崇拜现象。在将适用于政治、经济等领域中的魅力型领导或克里斯马型权威应用于明星、偶像等特定文化人物时,应当注意到,由于前者掌管着某些社会资源的分配,他们的行动决定会直接影响其他社会成员或集体的生产生活,而后者则相反,他们所具备的制度权力相当有限,正如粉丝在欣赏或崇拜偶像时,并不代表他们抛弃了原有的社会角色。那么,应当如何理解粉丝眼中偶像的特殊魅力呢?有学者认为,在文化范畴,特定人物被多数人认为具备出众能力构成了“魅力”这一概念所指涉的现象,魅力型偶像虽然不是韦伯所关注的权威决策者,他们仍在高度结构化的社会中承担了特定角色,他们的行为与生活方式也会激发某些或较大范围的意愿与兴趣。魅力这一原本关乎社会层面权力结构的概念因此能够与粉丝—偶像关系有所呼应,并被运用于探索偶像崇拜现象背后“个人的选择、超验的情感以及特殊性的存在”。本研究关于魅力的理论回顾首先围绕魅力发展的两个重要阶段,即起源与常规化过程。随后围绕粉丝何以将特定偶像视作与众不同或具备超凡能力,分析影响粉丝—偶像关系存续的具体情景,进而提出偶像魅力的悖论这一理论框架。
1. 魅力的起源
魅力者(偶像)意味着具备追随者(粉丝)眼中的超凡能力,后者对前者的识别或认可对于判定真正魅力是否发生至关重要。具体而言,魅力来源于追随者的个人投入,这是基于他们因魅力者的某些特质或光环而激发的热情、希望等特定情感。由于追随者对魅力者的“认可”并非基于已有的社会惯例和既定规则,这也说明魅力本身预示了对常规行动或循规蹈矩的日常生活的创新或颠覆,即魅力的“反常性”。
现有研究对魅力起源的探究基本围绕以下三种假设:(1)行为属性;(2)行动策略;(3)社会背景。首先,魅力者自身的行为属性对塑造魅力光环尤为重要:如个人才能、创造力、保持不败的能力等。具体而言,偶像的外貌、身材、唱跳实力、演技等条件都是促进其“吸粉”的主要因素。其次,魅力者在塑造追随者对个体身份的认知时,可以通过一些实用策略将追随者的自我概念与集体的目标捆绑:如完成具备意义价值的任务、为追随者投射充满希望的愿景、将该愿景表达为一种集体身份等。具体而言,与已经具备社会知名度的明星不同,选秀参赛者或养成系偶像的成名之路往往依赖粉丝的共同投入,综艺节目或经纪公司将粉丝的支持看作决定偶像自身发展命运的关键力量,邀请粉丝共同见证偶像在竞争或练习模式中“洗刷”掉平庸感,最终在大众文化或亚文化的话语体系中脱颖而出。最后,在某些特定的社会背景下,魅力者更容易得到追随者认可:在不安或动荡时期,人们更容易对现状和已有生活感到无助从而幻想新的生活动力。类似地,有研究发现,父母缺席和较低的社会地位都会促使青少年崇拜偶像以寻求补偿。然而,随着他们年龄的增长以及自身认知水平的提升,更为自主的、社会化的成年人将不再只依赖偶像获得心理支撑,他们能够调整自己以适应社会排斥或应对其他伤害。
2.魅力的常规化
由于魅力者本身具备超凡、创新、与众不同的特质,魅力与秩序的生活或惯常的行为活动之间存在难以调和的矛盾。因此,真正的魅力无法长期维持其本身的存在形态,魅力在秩序生活中存续,可以通过常规化为更加细致的社会实践活动完成。常规化能够避免魅力“被维持追随者日常生活的各种条件以及主导他们的其他力量所取代”。有学者指出,常规化的魅力会使魅力者与追随者之间的关系失去魅力起源过程中至关重要的个人体验。在大众媒介情境下,魅力者与追随者之间的魅力式链接也会面临被解谜的过程,这是因为前者被过度曝光的个人生活和日常行动会使其不再具备神秘感和吸引力。鲍德里亚关于“诱惑”的论述似乎为此提出了合理解释,即常规化的魅力无非是“被窃取的秘密”,而持守秘密才是秘密本身的诱惑力。
3. 魅力的悖论
然而,也有学者认为,在担忧魅力会在常规化过程中消失的同时,还应考虑到魅力以分散或弱化的形式存在的可能。具体而言,常规化的生活方式和权力运作与人们对魅力者超凡能力的“认可”并非不可调和,这是因为“人对人的控制或支配”是人类社会中一直以来的普遍存在。早前爱德华·希尔斯曾假设,由于所有社会组织都存在能够向外辐射一系列社会规则的中心,那么各种形式的魅力也是由人们对社会中心的认识产生。相较于普通人身上低强度的中心性,魅力者拥有的则是高强度的中心性,其超凡能力是“开启、创造、掌握、转换、维持或毁灭对人们日常生活至关重要的事物”的构成力。
结合真正魅力对现有秩序和常规生活的挑战与希尔斯对社会秩序中心的强调,克利福德·格尔茨提出应当将魅力视作一种文化现象,并思考魅力者在出现之时被人们认可的原因。具体而言,格尔茨推断以下有关魅力的悖论:一方面,魅力的符号表达需要与常规世界保持距离,以便魅力者向追随者展示超凡能力;另一方面,魅力仍需要徘徊于主导社会事务的意义中心附近,以确保魅力者能够获得追随者的注意,有关魅力的符号与概念也能够被追随者理解。
|
魅力一词最早是由马克斯·韦伯从宗教文化词汇引入社会、政治、经济等领域的学术概念。具体而言,韦伯将魅力解释为:“能够使个体区分于普通人的非凡品质,从而使其被追随者认可为具有超自然的、超人的或至少是(有)特殊能力的”。基于韦伯对三种组织内部领导权威——即传统型、理性—法定型和克里斯马型的理想类型的论述,之后的学者将魅力应用于探究现代社会中的依赖“英雄主义或个人启示”的领导风格与政治权威。近年来,也有传播学者注意到,魅力同样关乎“饭圈”粉丝将偶像视为“精神领袖”或“神明”的崇拜现象。在将适用于政治、经济等领域中的魅力型领导或克里斯马型权威应用于明星、偶像等特定文化人物时,应当注意到,由于前者掌管着某些社会资源的分配,他们的行动决定会直接影响其他社会成员或集体的生产生活,而后者则相反,他们所具备的制度权力相当有限,正如粉丝在欣赏或崇拜偶像时,并不代表他们抛弃了原有的社会角色。那么,应当如何理解粉丝眼中偶像的特殊魅力呢?有学者认为,在文化范畴,特定人物被多数人认为具备出众能力构成了“魅力”这一概念所指涉的现象,魅力型偶像虽然不是韦伯所关注的权威决策者,他们仍在高度结构化的社会中承担了特定角色,他们的行为与生活方式也会激发某些或较大范围的意愿与兴趣。魅力这一原本关乎社会层面权力结构的概念因此能够与粉丝—偶像关系有所呼应,并被运用于探索偶像崇拜现象背后“个人的选择、超验的情感以及特殊性的存在”。本研究关于魅力的理论回顾首先围绕魅力发展的两个重要阶段,即起源与常规化过程。随后围绕粉丝何以将特定偶像视作与众不同或具备超凡能力,分析影响粉丝—偶像关系存续的具体情景,进而提出偶像魅力的悖论这一理论框架。
1. 魅力的起源
魅力者(偶像)意味着具备追随者(粉丝)眼中的超凡能力,后者对前者的识别或认可对于判定真正魅力是否发生至关重要。具体而言,魅力来源于追随者的个人投入,这是基于他们因魅力者的某些特质或光环而激发的热情、希望等特定情感。由于追随者对魅力者的“认可”并非基于已有的社会惯例和既定规则,这也说明魅力本身预示了对常规行动或循规蹈矩的日常生活的创新或颠覆,即魅力的“反常性”。
现有研究对魅力起源的探究基本围绕以下三种假设:(1)行为属性;(2)行动策略;(3)社会背景。首先,魅力者自身的行为属性对塑造魅力光环尤为重要:如个人才能、创造力、保持不败的能力等。具体而言,偶像的外貌、身材、唱跳实力、演技等条件都是促进其“吸粉”的主要因素。其次,魅力者在塑造追随者对个体身份的认知时,可以通过一些实用策略将追随者的自我概念与集体的目标捆绑:如完成具备意义价值的任务、为追随者投射充满希望的愿景、将该愿景表达为一种集体身份等。具体而言,与已经具备社会知名度的明星不同,选秀参赛者或养成系偶像的成名之路往往依赖粉丝的共同投入,综艺节目或经纪公司将粉丝的支持看作决定偶像自身发展命运的关键力量,邀请粉丝共同见证偶像在竞争或练习模式中“洗刷”掉平庸感,最终在大众文化或亚文化的话语体系中脱颖而出。最后,在某些特定的社会背景下,魅力者更容易得到追随者认可:在不安或动荡时期,人们更容易对现状和已有生活感到无助从而幻想新的生活动力。类似地,有研究发现,父母缺席和较低的社会地位都会促使青少年崇拜偶像以寻求补偿。然而,随着他们年龄的增长以及自身认知水平的提升,更为自主的、社会化的成年人将不再只依赖偶像获得心理支撑,他们能够调整自己以适应社会排斥或应对其他伤害。
2.魅力的常规化
由于魅力者本身具备超凡、创新、与众不同的特质,魅力与秩序的生活或惯常的行为活动之间存在难以调和的矛盾。因此,真正的魅力无法长期维持其本身的存在形态,魅力在秩序生活中存续,可以通过常规化为更加细致的社会实践活动完成。常规化能够避免魅力“被维持追随者日常生活的各种条件以及主导他们的其他力量所取代”。有学者指出,常规化的魅力会使魅力者与追随者之间的关系失去魅力起源过程中至关重要的个人体验。在大众媒介情境下,魅力者与追随者之间的魅力式链接也会面临被解谜的过程,这是因为前者被过度曝光的个人生活和日常行动会使其不再具备神秘感和吸引力。鲍德里亚关于“诱惑”的论述似乎为此提出了合理解释,即常规化的魅力无非是“被窃取的秘密”,而持守秘密才是秘密本身的诱惑力。
3. 魅力的悖论
然而,也有学者认为,在担忧魅力会在常规化过程中消失的同时,还应考虑到魅力以分散或弱化的形式存在的可能。具体而言,常规化的生活方式和权力运作与人们对魅力者超凡能力的“认可”并非不可调和,这是因为“人对人的控制或支配”是人类社会中一直以来的普遍存在。早前爱德华·希尔斯曾假设,由于所有社会组织都存在能够向外辐射一系列社会规则的中心,那么各种形式的魅力也是由人们对社会中心的认识产生。相较于普通人身上低强度的中心性,魅力者拥有的则是高强度的中心性,其超凡能力是“开启、创造、掌握、转换、维持或毁灭对人们日常生活至关重要的事物”的构成力。
结合真正魅力对现有秩序和常规生活的挑战与希尔斯对社会秩序中心的强调,克利福德·格尔茨提出应当将魅力视作一种文化现象,并思考魅力者在出现之时被人们认可的原因。具体而言,格尔茨推断以下有关魅力的悖论:一方面,魅力的符号表达需要与常规世界保持距离,以便魅力者向追随者展示超凡能力;另一方面,魅力仍需要徘徊于主导社会事务的意义中心附近,以确保魅力者能够获得追随者的注意,有关魅力的符号与概念也能够被追随者理解。
|
考点1. “饭圈”推荐译为“fandom”,不能译为“fan circle”
考点2. “生产生活”推荐译为“the lives and livelihoods”或根据上下文简化为“the daily lives”
考点3.“行为属性”推荐译为behavioral attributes 或 properties,不可译为“Behavior Attribution”
考点4.“保持不败的能力”推荐译为the ability to remain undefeated
|
fc8b0
|
学术论文
|
社会科学
|
183
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
第三十届上海电视节白玉兰奖于2025年6月27日晚在上海临港演艺中心落下帷幕,这绝非一场简单的颁奖礼,而是一面赤裸裸的“时代棱镜”,折射出中国社会文化思潮的涌动、观众心理的微妙变迁,以及影视产业经济逻辑的复杂交织。本届白玉兰奖以“三十而励,光影新程”为主题,其评选结果和获奖作品,在社会学意义上精准捕捉并回应了当下中国社会的深层情感需求与文化议题,使其成为一个独特的“社会学样本”。
白玉兰奖自1988年设立以来,已从上海电视节的组成部分,野蛮生长为中国首个国际性电视奖项,其发展历程本身就是中国电视行业改革与进步的缩影。它始终秉持“坚守专业、秉持公正、鼓励多元、尊重突破、传承匠心、提携新人”的评判原则,致力于发掘和表彰那些具有公共价值和艺术高度的作品。本届奖项共征集到来自五大洲43个国家和地区的近千部作品,其中海外剧报名量激增53.7%,纪录片单元海外作品占比高达六成——这些冰冷的数据,却直观展现了白玉兰奖日益提升的国际影响力与开放视野,以及其作为文化交流桥梁的不可替代性。
本届白玉兰奖的获奖作品,如《我的阿勒泰》和《山花烂漫时》,之所以能引发如此广泛的社会共鸣,并非偶然,而是它们精准触达了当下中国社会的深层情感需求和文化议题。前者以其独特的地域风情、诗意栖居的生活哲学以及人与自然和谐共生的主题,如同清风拂面,唤醒了都市人对“远方”的向往和对精神本真的回归,满足了人们对美好生活和文化多样性的情感诉求。该剧不仅斩获最佳中国电视剧,更荣获国际传播奖,这无疑证明了其跨越文化界限的普世魅力。
而《山花烂漫时》则以“七一勋章”获得者张桂梅为原型,深入刻画了她为教育事业无私奉献的伟大精神。这部剧不仅展现了教育公平的艰辛与成就,更传递了信仰、责任和奉献的强大力量,引发了全社会对教育公平、农村女性命运以及个人奋斗价值的广泛讨论和强烈情感共鸣。宋佳对张桂梅的“教科书级别”演绎,获得了原型人物的亲自认可,使得这一故事不仅是荧屏呈现,更成为社会正能量的具象化表达,深刻连接了观众的集体记忆与文化认同。
然而,在当前影视行业面临“去流量化”和提升公信力的背景下,白玉兰奖的评选导向也并非没有争议,甚至可以说,争议是其公信力保卫战的必然产物。近年来,关于流量明星与实力派之间的提名拉锯战、奖项评选机制透明度以及公正性的讨论屡见不鲜。例如,部分流量演员获得提名曾引发“水分太大”的质疑,与宋佳、马伊琍等实力派的硬核作品形成鲜明对比,这不仅是演技的较量,更是市场流量与艺术价值之间永恒的冲突。甚至有观点认为,蒋欣在《小巷人家》中表现亮眼,却从最佳女主热门“降级”至女配,被解读为团队为求稳而采取的“战术性降维打击”,这无疑将奖项的严肃性降格为一场精密的博弈,引发了公众对奖项权威性的担忧。
这些争议,从早年《甄嬛传》的遗憾落选,到2015年李雪健未获提名引发的“杰出贡献奖”风波,再到2024年《追风者》的“番位争议”,都曾将白玉兰奖推向舆论的风口浪尖。但每一次争议,都促使奖项机制不断完善,例如引入“评委实名制投票”和公示投票规则,近期更将“提携新人”纳入核心评审原则。这些调整旨在平衡专业性、公共性和行业生态的健康发展,体现了白玉兰奖在面对挑战时,不断自我革新以秉持公正的决心。评委会主席陈宝国言简意赅地阐述了白玉兰奖的评判标准:“温度是艺术感染力,态度是作品的思想内核和艺术家的立场表达,尺度就是衡量这部入围作品是否达到了奖项所要求的高度。”而靳东在获奖感言中强调“内容是王道”,更是对这种趋势的最好注脚。这正是白玉兰奖坚守专业、回归内容本质的评选导向,也是其公信力得以巩固的基石。
|
第三十届上海电视节白玉兰奖于2025年6月27日晚在上海临港演艺中心落下帷幕,这绝非一场简单的颁奖礼,而是一面赤裸裸的“时代棱镜”,折射出中国社会文化思潮的涌动、观众心理的微妙变迁,以及影视产业经济逻辑的复杂交织。本届白玉兰奖以“三十而励,光影新程”为主题,其评选结果和获奖作品,在社会学意义上精准捕捉并回应了当下中国社会的深层情感需求与文化议题,使其成为一个独特的“社会学样本”。
白玉兰奖自1988年设立以来,已从上海电视节的组成部分,野蛮生长为中国首个国际性电视奖项,其发展历程本身就是中国电视行业改革与进步的缩影。它始终秉持“坚守专业、秉持公正、鼓励多元、尊重突破、传承匠心、提携新人”的评判原则,致力于发掘和表彰那些具有公共价值和艺术高度的作品。本届奖项共征集到来自五大洲43个国家和地区的近千部作品,其中海外剧报名量激增53.7%,纪录片单元海外作品占比高达六成——这些冰冷的数据,却直观展现了白玉兰奖日益提升的国际影响力与开放视野,以及其作为文化交流桥梁的不可替代性。
本届白玉兰奖的获奖作品,如《我的阿勒泰》和《山花烂漫时》,之所以能引发如此广泛的社会共鸣,并非偶然,而是它们精准触达了当下中国社会的深层情感需求和文化议题。前者以其独特的地域风情、诗意栖居的生活哲学以及人与自然和谐共生的主题,如同清风拂面,唤醒了都市人对“远方”的向往和对精神本真的回归,满足了人们对美好生活和文化多样性的情感诉求。该剧不仅斩获最佳中国电视剧,更荣获国际传播奖,这无疑证明了其跨越文化界限的普世魅力。
而《山花烂漫时》则以“七一勋章”获得者张桂梅为原型,深入刻画了她为教育事业无私奉献的伟大精神。这部剧不仅展现了教育公平的艰辛与成就,更传递了信仰、责任和奉献的强大力量,引发了全社会对教育公平、农村女性命运以及个人奋斗价值的广泛讨论和强烈情感共鸣。宋佳对张桂梅的“教科书级别”演绎,获得了原型人物的亲自认可,使得这一故事不仅是荧屏呈现,更成为社会正能量的具象化表达,深刻连接了观众的集体记忆与文化认同。
然而,在当前影视行业面临“去流量化”和提升公信力的背景下,白玉兰奖的评选导向也并非没有争议,甚至可以说,争议是其公信力保卫战的必然产物。近年来,关于流量明星与实力派之间的提名拉锯战、奖项评选机制透明度以及公正性的讨论屡见不鲜。例如,部分流量演员获得提名曾引发“水分太大”的质疑,与宋佳、马伊琍等实力派的硬核作品形成鲜明对比,这不仅是演技的较量,更是市场流量与艺术价值之间永恒的冲突。甚至有观点认为,蒋欣在《小巷人家》中表现亮眼,却从最佳女主热门“降级”至女配,被解读为团队为求稳而采取的“战术性降维打击”,这无疑将奖项的严肃性降格为一场精密的博弈,引发了公众对奖项权威性的担忧。
这些争议,从早年《甄嬛传》的遗憾落选,到2015年李雪健未获提名引发的“杰出贡献奖”风波,再到2024年《追风者》的“番位争议”,都曾将白玉兰奖推向舆论的风口浪尖。但每一次争议,都促使奖项机制不断完善,例如引入“评委实名制投票”和公示投票规则,近期更将“提携新人”纳入核心评审原则。这些调整旨在平衡专业性、公共性和行业生态的健康发展,体现了白玉兰奖在面对挑战时,不断自我革新以秉持公正的决心。评委会主席陈宝国言简意赅地阐述了白玉兰奖的评判标准:“温度是艺术感染力,态度是作品的思想内核和艺术家的立场表达,尺度就是衡量这部入围作品是否达到了奖项所要求的高度。”而靳东在获奖感言中强调“内容是王道”,更是对这种趋势的最好注脚。这正是白玉兰奖坚守专业、回归内容本质的评选导向,也是其公信力得以巩固的基石。
|
考点1: 电影、电视剧名必须翻译正确:“我的阿勒泰”应译为“To the Wonder”、“山花烂漫时”应译为“She and Her Girls”、“小巷人家”应译为“Romance in the Alley”、 “甄嬛传”应译为“Empresses in the palace”、 “追风者”应译为“War of Faith”。
考点2: “流量明星”应译为“a star with a huge following ”。
考点3: “注脚”应译为“illustration”,表示对“内容是王道”的说明,不可直译为“footnote”
考点4:“三十而励,光影新程”应译为“Thirty & Thriving: Screen Arts’ New Horizon”,这是官方翻译
考点5:“从最佳女主热门‘降级’至女配”中的女配应译为“Best Supporting Actress”,原文暗指的是最佳女配,而不是普通的女配
考点6:“上海电视节白玉兰奖“应译为“Shanghai TV Festival Magnolia Awards”
|
fcf08
|
新闻资讯
|
观点评论
|
52
|
翻译,英文翻译成中文。不要输出译文以外的内容。以下是你本次的任务:
What is Behaviorism?
Behaviorism is a theoretical approach to psychology popularized in the 20th century by John B. Watson and B.F Skinner. This school of thought focuses only on observable behavior and the environmental stimuli that produce it. It is often tied to learning, and asserts that behaviours are learned through interaction with the environment through either classical conditioning or operant conditioning.
Behaviorism
It is no surprise that when you have a bowl of dog food in your hands, your dog becomes the best show dog on earth, effortlessly performing all the tricks it has learned. Sometimes you may even find your dog running through the list of tricks before you tell them which one to do. When you don’t have dog food in your hands, however, your furry friend will likely seem completely disinterested in performing. This behavior can be explained by behaviorism, sometimes referred to as behavioral psychology.
Behaviorism is a theory of learning; it’s based on the idea that our behavior is learned as a result of interaction with our external environment. Interaction with our external environment can include an interaction with a certain person, a certain object, or with certain surroundings.
Our behavior is learned through a process called conditioning. Conditioning is a learning process that can lead to habits and is the result of training ourselves to react a certain way in different scenarios.1 Behaviorism presents two main types of conditioning:
Classical conditioning: when a dog learns to get excited when we walk towards the bag of dog food because the dog has learned that it would mean they get to eat right away.
Operant conditioning: when a trainer successfully teaches a dog how to sit on command with the help of incentives, such as a treat every time they do it correctly.
Strong believers of behaviorism argue that with the right conditioning, anyone can be trained to do any task within their capabilities, regardless of one’s personality.
In behavioral psychology, there are two types of behavior: overt behavior, which is what everyone sees publicly, and covert behavior, which is inner and private. Behaviorism as a field of study looks only at observable external behaviors rather than internal mental states. Behaviorists argue that since thoughts and emotions cannot be objectively measured, psychology should focus instead on stimulus-response relationships (like a dog’s response to food) that can be observed and analyzed.
A person who has been punished is not thereby simply less inclined to behave in a given way; at best, he learns how to avoid punishment. – Burrhus Frederic Skinner in his book, Beyond Freedom and Dignity
Key Terms
Behaviorism: A theory and school of thought in modern psychology stating that all types of human behavior can be learned through two key types of conditioning: classical conditioning and operant conditioning.
Radical Behaviorism: A theory developed by B.F. Skinner that extends traditional behaviorism. It includes not only observable behaviors but also internal events, such as thoughts and feelings, as behaviors subject to the same principles of conditioning. It views all behavior, external and internal, as shaped by the environment and past reinforcement.
Stimulus: Anything that occurs in the environment that elicits a response from an individual.
Response: Any observable action or behavior that an organism performs as a result of a stimulus.
Classical Conditioning: A learning technique that unconsciously pairs a specific action, or stimulus, with the resulting automatic behavioral response. When the action or stimulus is repeated, the automatic behavioral response is eventually learned to be associated with the action.
Operant Conditioning: A learning technique that employs positive and negative reinforcements in the form of rewards or punishments to encourage an individual to pick up or stop a specific behavior. It’s sometimes referred to as instrumental conditioning.1 There are two types of punishment: positive, where a negative stimulus is added to discourage behavior; and negative, where a pleasant stimulus is removed to decrease undesired behavior.
Positive Reinforcement: A consequence that aims to strengthen or encourage certain behaviors, such as providing a reward for doing something well.
Grid Cells: Cells in the brain that help us to know where we are and where we’re going. They’re found in a part of the brain called the entorhinal cortex, and they fire in patterns that form a grid. As we move through space, different grid cells light up in a repeating pattern, helping our brains track our position, even without a map or landmarks.
History
Early work on behaviorism can be traced back to 1897, when Ivan Pavlov, a Russian physiologist, conducted experiments on the digestion in dogs. Pavlov’s now-famous experiments led him to discover what we call classical conditioning. It all started when Pavlov noticed the dogs would start salivating when presented with food. When presented with food, the lab assistant would also ring a bell (a neutral stimulus). Over time, the dogs would associate the bell with food. Eventually, the dogs associated the sight of the lab assistant’s white coat (another neutral stimulus) with food, which prompted a salivation response from the dogs even before the food was presented.
Behaviorism would not be introduced formally until 1913, when American psychologist John B. Watson presented his publication, Psychology as the Behaviorist Views It. In this paper, Watson mentioned that if he provided his own specified environment for a baby to grow up in, he would be able to train them to become a specialist in any profession. Watson claimed this could include law, medicine, art, or even theft.1
Watson’s formal contribution was so influential that in the following forty years, behaviorism became the dominant school of thought in psychology. Its popularity also reflected the desire to cement psychology as a measurable science, which behaviorism’s focus on observable behavior was able to provide.
Operant conditioning was introduced by American psychologist B. F. Skinner in the 1938 book, The Behavior of Organisms. Skinner derived his theory by studying rats. He set up a box with a lever, which when pressed would drop a pellet of food onto a tray. Skinner introduced a rat into the box and observed that initially, it would wander around before accidentally pressing the bar. After the first food pellet was released, Skinner noticed that the rat’s rate of bar pressing increased dramatically. Research on Skinner’s experiment eventually led to the principle of reinforcement,2 a term used in operant conditioning to describe an action that increases the chances of certain behavior.
Towards the end of the 1900s, the cognitive psychology revolution resulted in the diminishing popularity of behaviorism as the mainstream school of thought. Psychologists started turning to cognitive science to study human behavior, due to behaviorism’s failure in considering important mental processes.6 However, many insights from behaviorism were not forgotten and are used regularly to this day.
The principles of reinforcement and punishment, for example, remain central to behavior change, influencing everything from parenting techniques to workplace motivation and educational strategies. Similarly, behavioral conditioning is still widely applied in therapy, particularly in treating phobias, anxiety, and addictions through techniques like systematic desensitization and exposure therapy.
Marketing and advertising also rely on behaviorist principles, using rewards and associations to shape consumer behavior. Take loyalty programs, for example, which use positive reinforcement to keep people coming back time and again. Each time a customer buys something, they earn a point, eventually working their way up to a free drink or a considerable discount. This operant conditioning encourages repeat purchases by associating spending with a desirable reward.
People
Ivan Pavlov
A Russian physiologist whose groundbreaking discovery of classical conditioning in the 1980s was influential in shaping behaviorism. Sometimes referred to as Pavlovian conditioning, classical conditioning was discovered accidentally while Pavlov studied salivation in dogs. Upon realizing the significance of his conditioning discovery, Pavlov spent the rest of his career studying this type of learning.
John B. Watson
An American psychologist who was renowned for formally introducing and popularizing behaviorism. His work in this field was groundbreaking and incredibly influential, establishing behaviorism as the mainstream school of thought in psychology in the mid-1900s. Watson burned a significant amount of his letters and papers, except for some reprints of his academic work, which made it difficult to understand his earlier thoughts on behaviorism.
Burrhus Frederic (B.F.) Skinner
An American psychologist and behaviorist who is commonly referred to as the father of operant conditioning. B.F. Skinner introduced this theory in his 1938 book, The Behavior of Organisms, which was influential in reinforcing behaviorism as a mainstream school of thought in psychology.
Claude Shannon
An American mathematician and computer scientist who was dubbed the ‘father of information theory’ and played a pioneering role in the development of artificial intelligence. His most well-known work was his groundbreaking 1948 paper, A Mathematical Theory of Communication, which introduced the concept of binary digits (bits) as the fundamental unit of information. However, he’s also the creator of Theseus, the maze-solving mouse, which was an early experiment in artificial intelligence and machine learning.
Joseph Wolpe
South African psychiatrist who was one of the most influential figures in behavioral therapy during the twentieth century. Wolpe’s main area of research was in reciprocal inhibition techniques, a behavioral therapy method based on opposites. The principle is simple: two opposing responses cannot occur at the same time, such as being relaxed and anxious simultaneously. The idea of reciprocal inhibition techniques is to weaken an undesired response (like anxiety) by pairing it with a response that is incompatible with it (like relaxation).
Edward Tolman
An American psychologist who is best known for developing the concept of purposive behaviorism. His work rejected the stimulus-response model of behaviorism and paved the way for further developments in the field.
|
What is Behaviorism?
Behaviorism is a theoretical approach to psychology popularized in the 20th century by John B. Watson and B.F Skinner. This school of thought focuses only on observable behavior and the environmental stimuli that produce it. It is often tied to learning, and asserts that behaviours are learned through interaction with the environment through either classical conditioning or operant conditioning.
Behaviorism
It is no surprise that when you have a bowl of dog food in your hands, your dog becomes the best show dog on earth, effortlessly performing all the tricks it has learned. Sometimes you may even find your dog running through the list of tricks before you tell them which one to do. When you don’t have dog food in your hands, however, your furry friend will likely seem completely disinterested in performing. This behavior can be explained by behaviorism, sometimes referred to as behavioral psychology.
Behaviorism is a theory of learning; it’s based on the idea that our behavior is learned as a result of interaction with our external environment. Interaction with our external environment can include an interaction with a certain person, a certain object, or with certain surroundings.
Our behavior is learned through a process called conditioning. Conditioning is a learning process that can lead to habits and is the result of training ourselves to react a certain way in different scenarios.1 Behaviorism presents two main types of conditioning:
Classical conditioning: when a dog learns to get excited when we walk towards the bag of dog food because the dog has learned that it would mean they get to eat right away.
Operant conditioning: when a trainer successfully teaches a dog how to sit on command with the help of incentives, such as a treat every time they do it correctly.
Strong believers of behaviorism argue that with the right conditioning, anyone can be trained to do any task within their capabilities, regardless of one’s personality.
In behavioral psychology, there are two types of behavior: overt behavior, which is what everyone sees publicly, and covert behavior, which is inner and private. Behaviorism as a field of study looks only at observable external behaviors rather than internal mental states. Behaviorists argue that since thoughts and emotions cannot be objectively measured, psychology should focus instead on stimulus-response relationships (like a dog’s response to food) that can be observed and analyzed.
A person who has been punished is not thereby simply less inclined to behave in a given way; at best, he learns how to avoid punishment. – Burrhus Frederic Skinner in his book, Beyond Freedom and Dignity
Key Terms
Behaviorism: A theory and school of thought in modern psychology stating that all types of human behavior can be learned through two key types of conditioning: classical conditioning and operant conditioning.
Radical Behaviorism: A theory developed by B.F. Skinner that extends traditional behaviorism. It includes not only observable behaviors but also internal events, such as thoughts and feelings, as behaviors subject to the same principles of conditioning. It views all behavior, external and internal, as shaped by the environment and past reinforcement.
Stimulus: Anything that occurs in the environment that elicits a response from an individual.
Response: Any observable action or behavior that an organism performs as a result of a stimulus.
Classical Conditioning: A learning technique that unconsciously pairs a specific action, or stimulus, with the resulting automatic behavioral response. When the action or stimulus is repeated, the automatic behavioral response is eventually learned to be associated with the action.
Operant Conditioning: A learning technique that employs positive and negative reinforcements in the form of rewards or punishments to encourage an individual to pick up or stop a specific behavior. It’s sometimes referred to as instrumental conditioning.1 There are two types of punishment: positive, where a negative stimulus is added to discourage behavior; and negative, where a pleasant stimulus is removed to decrease undesired behavior.
Positive Reinforcement: A consequence that aims to strengthen or encourage certain behaviors, such as providing a reward for doing something well.
Grid Cells: Cells in the brain that help us to know where we are and where we’re going. They’re found in a part of the brain called the entorhinal cortex, and they fire in patterns that form a grid. As we move through space, different grid cells light up in a repeating pattern, helping our brains track our position, even without a map or landmarks.
History
Early work on behaviorism can be traced back to 1897, when Ivan Pavlov, a Russian physiologist, conducted experiments on the digestion in dogs. Pavlov’s now-famous experiments led him to discover what we call classical conditioning. It all started when Pavlov noticed the dogs would start salivating when presented with food. When presented with food, the lab assistant would also ring a bell (a neutral stimulus). Over time, the dogs would associate the bell with food. Eventually, the dogs associated the sight of the lab assistant’s white coat (another neutral stimulus) with food, which prompted a salivation response from the dogs even before the food was presented.
Behaviorism would not be introduced formally until 1913, when American psychologist John B. Watson presented his publication, Psychology as the Behaviorist Views It. In this paper, Watson mentioned that if he provided his own specified environment for a baby to grow up in, he would be able to train them to become a specialist in any profession. Watson claimed this could include law, medicine, art, or even theft.1
Watson’s formal contribution was so influential that in the following forty years, behaviorism became the dominant school of thought in psychology. Its popularity also reflected the desire to cement psychology as a measurable science, which behaviorism’s focus on observable behavior was able to provide.
Operant conditioning was introduced by American psychologist B. F. Skinner in the 1938 book, The Behavior of Organisms. Skinner derived his theory by studying rats. He set up a box with a lever, which when pressed would drop a pellet of food onto a tray. Skinner introduced a rat into the box and observed that initially, it would wander around before accidentally pressing the bar. After the first food pellet was released, Skinner noticed that the rat’s rate of bar pressing increased dramatically. Research on Skinner’s experiment eventually led to the principle of reinforcement,2 a term used in operant conditioning to describe an action that increases the chances of certain behavior.
Towards the end of the 1900s, the cognitive psychology revolution resulted in the diminishing popularity of behaviorism as the mainstream school of thought. Psychologists started turning to cognitive science to study human behavior, due to behaviorism’s failure in considering important mental processes.6 However, many insights from behaviorism were not forgotten and are used regularly to this day.
The principles of reinforcement and punishment, for example, remain central to behavior change, influencing everything from parenting techniques to workplace motivation and educational strategies. Similarly, behavioral conditioning is still widely applied in therapy, particularly in treating phobias, anxiety, and addictions through techniques like systematic desensitization and exposure therapy.
Marketing and advertising also rely on behaviorist principles, using rewards and associations to shape consumer behavior. Take loyalty programs, for example, which use positive reinforcement to keep people coming back time and again. Each time a customer buys something, they earn a point, eventually working their way up to a free drink or a considerable discount. This operant conditioning encourages repeat purchases by associating spending with a desirable reward.
People
Ivan Pavlov
A Russian physiologist whose groundbreaking discovery of classical conditioning in the 1980s was influential in shaping behaviorism. Sometimes referred to as Pavlovian conditioning, classical conditioning was discovered accidentally while Pavlov studied salivation in dogs. Upon realizing the significance of his conditioning discovery, Pavlov spent the rest of his career studying this type of learning.
John B. Watson
An American psychologist who was renowned for formally introducing and popularizing behaviorism. His work in this field was groundbreaking and incredibly influential, establishing behaviorism as the mainstream school of thought in psychology in the mid-1900s. Watson burned a significant amount of his letters and papers, except for some reprints of his academic work, which made it difficult to understand his earlier thoughts on behaviorism.
Burrhus Frederic (B.F.) Skinner
An American psychologist and behaviorist who is commonly referred to as the father of operant conditioning. B.F. Skinner introduced this theory in his 1938 book, The Behavior of Organisms, which was influential in reinforcing behaviorism as a mainstream school of thought in psychology.
Claude Shannon
An American mathematician and computer scientist who was dubbed the ‘father of information theory’ and played a pioneering role in the development of artificial intelligence. His most well-known work was his groundbreaking 1948 paper, A Mathematical Theory of Communication, which introduced the concept of binary digits (bits) as the fundamental unit of information. However, he’s also the creator of Theseus, the maze-solving mouse, which was an early experiment in artificial intelligence and machine learning.
Joseph Wolpe
South African psychiatrist who was one of the most influential figures in behavioral therapy during the twentieth century. Wolpe’s main area of research was in reciprocal inhibition techniques, a behavioral therapy method based on opposites. The principle is simple: two opposing responses cannot occur at the same time, such as being relaxed and anxious simultaneously. The idea of reciprocal inhibition techniques is to weaken an undesired response (like anxiety) by pairing it with a response that is incompatible with it (like relaxation).
Edward Tolman
An American psychologist who is best known for developing the concept of purposive behaviorism. His work rejected the stimulus-response model of behaviorism and paved the way for further developments in the field.
|
考点 1:"theoretical approach" 应译为 "理论取向 / 理论范式"
考点 2:"Classical conditioning" 应译为 "经典条件作用"
考点 3:"Operant conditioning" 应译为 "操作条件作用 / 工具性条件作用"
考点 4:"overt behavior" 应译为 "外显行为"
考点 5:"covert behavior" 应译为 "内隐行为"
考点 6:"the cognitive psychology revolution" 应译为 "认知心理学革命"
考点 7:"show dog" 应译为 "表演犬 / 赛级犬"
考点 8:"running through the list of tricks" 中 ”running“应译为"都过一遍"
考点 9:"dubbed the 'father of information theory" 应译为 被誉为 "信息论之父"
考点 10:"reciprocal inhibition techniques" 应译为 "交互抑制技术"
考点 11:"purposive behaviorism" 应译为 "目的行为主义"
考点 12:"instrumental conditioning" 应译为 "工具性条件作用"
考点 13:"Pavlovian conditioning" 应译为 "巴甫洛夫式条件作用 "
考点 14:"Psychology as the Behaviorist Views It" 应译为 "《行为主义者眼中的心理学》"
考点 15:"principle of reinforcement" 应译为 "强化原理"
|
fd74f
|
学术论文
|
社会科学
|
94
|
翻译,中文翻译成英文。不要输出译文以外的内容。
以下是你本次的任务:
郁金香、风车、木鞋是很多游客提起荷兰时说得最多的事物。尤其是郁金香,它不仅是荷兰国花,更成为旅游的亮丽名片。荷兰郁金香规模宏大,种植面积达到7000多公顷,占全球产量的65%,且品种极为丰富,拥有8000多个品种,其中绝大多数为荷兰自主培育。每到郁金香花开时,荷兰便会迎来大批来自世界各地的游客。荷兰凭借郁金香这一独特标识,成功塑造了全球最具吸引力的春季旅游胜地,并通过系统化的旅游开发、产业协同和品牌推广策略,让郁金香旅游成为荷兰经济发展的重要推动力。
郁金香为荷兰带来的价值
荷兰旅游部门数据显示,每年春季约有200万人次的国际游客因花而来,创造超过5亿欧元的经济效益。
郁金香对荷兰的影响力可以概括为以下几点:
郁金香蕴含荷兰文化特点。16世纪,郁金香从土耳其经由奥地利引入荷兰,彼时作为珍稀花卉备受追捧。荷兰人持续改良种植技术,提高产量与质量,加之温室栽培技术的进步,使荷兰成为全球最大的郁金香球茎生产国与出口国之一,也成为荷兰文化的重要象征。在荷兰,从家庭装饰到公共场所,郁金香图案随处可见,形成了独特的郁金香文化氛围。自2012年起,荷兰将每年1月的第三个星期六 设立为国家“郁金香日”。
荷兰郁金香旅游产品多元。荷兰依托郁金香开发了丰富多样且颇具特色的产品,涵盖观赏型、体验型、节庆型等多种类型。每年郁金香盛开的5月,荷兰会举办“郁金香节”。大量游客前来观赏郁金香花海,领略自然风光,体验异域风情。游客可选择花田骑行,在微风中穿梭花海;也能花田泛舟,乘船深入花田内部,近距离欣赏郁金香;还可乘飞机飞越花田,从空中俯瞰这片壮丽的花之海洋。以库肯霍夫公园为例,该公园位于阿姆斯特丹近郊小镇利瑟,被誉为“欧洲花园”。每年种植700万株球茎花卉,其中郁金香超450种,15公里长的花径穿梭于百年古树、镜面湖泊与风车间。每年春季,公园都会举办郁金香花展,这是全球规模最大、最为著名的花卉展览之一。2023年公园还创新推出“郁金香声音之旅”,游客扫码即可聆听每种花卉背后的历史故事。
郁金香对荷兰经济发展具有重要作用。郁金香作为富有魅力的花卉,其旅游价值日益凸显,带动了一系列相关产业发展,形成了独特的发展模式。一是促进消费增长。游客的到访为荷兰带来可观的旅游收入,酒店、餐饮、交通等行业均因郁金香旅游而受益。二是带动相关产业发展。郁金香旅游推动了花卉种植、花卉贸易、园艺设计等产业的进步。花农通过种植郁金香获取收益,花卉贸易因郁金香的畅销而繁荣,园艺设计行业也因花田景观设计需求得以发展,设计师为花田设计出各类精美的图案,又吸引更多游客前来观赏。三是促进文化交流,传播荷兰文化。郁金香旅游吸引了来自不同国家和地区的游客,促进了不同文化的交流与融合。游客在欣赏郁金香的同时,也深入了解了荷兰的历史、文化和风俗习惯,增进了各国之间的相互理解和友谊。此外,荷兰的传统手工艺品、美食等也借助郁金香旅游得到更广泛传播,让更多的人了解并喜爱荷兰文化。
据荷兰中央统计局数据,2023年,荷兰游客过夜总数达4974万夜,同比增长8.1%,国际游客过夜数显著上升23%,至2042万夜,成为推动荷兰旅游业增长的关键因素。国际游客主要来自英国、美国和德国,也不乏来自中国、日本、韩国的亚洲游客。
|
郁金香、风车、木鞋是很多游客提起荷兰时说得最多的事物。尤其是郁金香,它不仅是荷兰国花,更成为旅游的亮丽名片。荷兰郁金香规模宏大,种植面积达到7000多公顷,占全球产量的65%,且品种极为丰富,拥有8000多个品种,其中绝大多数为荷兰自主培育。每到郁金香花开时,荷兰便会迎来大批来自世界各地的游客。荷兰凭借郁金香这一独特标识,成功塑造了全球最具吸引力的春季旅游胜地,并通过系统化的旅游开发、产业协同和品牌推广策略,让郁金香旅游成为荷兰经济发展的重要推动力。
郁金香为荷兰带来的价值
荷兰旅游部门数据显示,每年春季约有200万人次的国际游客因花而来,创造超过5亿欧元的经济效益。
郁金香对荷兰的影响力可以概括为以下几点:
郁金香蕴含荷兰文化特点。16世纪,郁金香从土耳其经由奥地利引入荷兰,彼时作为珍稀花卉备受追捧。荷兰人持续改良种植技术,提高产量与质量,加之温室栽培技术的进步,使荷兰成为全球最大的郁金香球茎生产国与出口国之一,也成为荷兰文化的重要象征。在荷兰,从家庭装饰到公共场所,郁金香图案随处可见,形成了独特的郁金香文化氛围。自2012年起,荷兰将每年1月的第三个星期六 设立为国家“郁金香日”。
荷兰郁金香旅游产品多元。荷兰依托郁金香开发了丰富多样且颇具特色的产品,涵盖观赏型、体验型、节庆型等多种类型。每年郁金香盛开的5月,荷兰会举办“郁金香节”。大量游客前来观赏郁金香花海,领略自然风光,体验异域风情。游客可选择花田骑行,在微风中穿梭花海;也能花田泛舟,乘船深入花田内部,近距离欣赏郁金香;还可乘飞机飞越花田,从空中俯瞰这片壮丽的花之海洋。以库肯霍夫公园为例,该公园位于阿姆斯特丹近郊小镇利瑟,被誉为“欧洲花园”。每年种植700万株球茎花卉,其中郁金香超450种,15公里长的花径穿梭于百年古树、镜面湖泊与风车间。每年春季,公园都会举办郁金香花展,这是全球规模最大、最为著名的花卉展览之一。2023年公园还创新推出“郁金香声音之旅”,游客扫码即可聆听每种花卉背后的历史故事。
郁金香对荷兰经济发展具有重要作用。郁金香作为富有魅力的花卉,其旅游价值日益凸显,带动了一系列相关产业发展,形成了独特的发展模式。一是促进消费增长。游客的到访为荷兰带来可观的旅游收入,酒店、餐饮、交通等行业均因郁金香旅游而受益。二是带动相关产业发展。郁金香旅游推动了花卉种植、花卉贸易、园艺设计等产业的进步。花农通过种植郁金香获取收益,花卉贸易因郁金香的畅销而繁荣,园艺设计行业也因花田景观设计需求得以发展,设计师为花田设计出各类精美的图案,又吸引更多游客前来观赏。三是促进文化交流,传播荷兰文化。郁金香旅游吸引了来自不同国家和地区的游客,促进了不同文化的交流与融合。游客在欣赏郁金香的同时,也深入了解了荷兰的历史、文化和风俗习惯,增进了各国之间的相互理解和友谊。此外,荷兰的传统手工艺品、美食等也借助郁金香旅游得到更广泛传播,让更多的人了解并喜爱荷兰文化。
据荷兰中央统计局数据,2023年,荷兰游客过夜总数达4974万夜,同比增长8.1%,国际游客过夜数显著上升23%,至2042万夜,成为推动荷兰旅游业增长的关键因素。国际游客主要来自英国、美国和德国,也不乏来自中国、日本、韩国的亚洲游客。
|
考点1: “郁金香日”应译为“National Tulip Day”。
考点2: “库肯霍夫公园”应译为“Keukenhof Park”
考点3:“节庆型”推荐译为“festival-themed types”
|
ffd8e
|
新闻资讯
|
新闻报道
|
69
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.