英文文献
英文文献阅读对科研的帮助
英文文献阅读对科研的帮助一、理解科研前沿英文文献是科研领域的主要交流媒介,通过阅读英文文献,我们可以及时了解国际科研前沿,掌握最新的科研动态和研究成果。
这有助于我们在科研工作中保持敏锐的洞察力和前瞻性,从而更好地把握研究方向和课题选择。
二、拓展知识体系英文文献涵盖了广泛的学科领域和研究方向,通过阅读不同领域的文献,我们可以拓展自己的知识体系,加深对相关领域的理解。
这有助于我们在跨学科的科研项目中更好地整合资源和方法,实现创新性的研究。
三、学习研究方法英文文献中包含了许多先进的研究方法和技巧,通过阅读这些文献,我们可以学习到各种实验设计、数据分析、模型构建等方面的知识和技能。
这有助于我们提高自己的研究水平,优化研究过程,从而提高研究结果的可靠性和科学性。
四、提高英语水平阅读英文文献需要具备一定的英语水平,长期坚持阅读英文文献可以显著提高我们的英语水平。
这对于我们参加国际学术交流、发表高水平的论文以及提高在国际舞台上的竞争力都具有重要意义。
五、启发研究思路通过阅读英文文献,我们可以从中获得启发和灵感,拓展自己的研究思路和视角。
不同的研究成果和方法往往具有共性和可借鉴之处,通过比较和分析,我们可以发现新的研究切入点和创新点。
六、增强学术洞察力通过深入阅读和分析英文文献,我们可以更好地理解学术研究的内在逻辑和规律,增强自己的学术洞察力。
这有助于我们更加准确地评估和判断学术研究的价值和影响,提升自己在学术界的地位和影响力。
七、建立学术网络阅读英文文献的过程中,我们有机会结识来自世界各地的学者和研究人员。
通过与他们交流和合作,我们可以建立广泛的学术网络,为未来的学术研究和职业发展创造更多机会和资源。
八、提升论文写作技巧阅读英文文献不仅可以帮助我们提高英语水平,还能提升我们的论文写作技巧。
通过模仿和学习英文文献中的写作技巧和表达方式,我们可以改进自己的论文写作风格和方法,使自己的论文更加规范、严谨、流畅和具有说服力。
英语论文参考文献精选3篇
英语论文参考文献精选3篇英语论文参考文献精选1篇英文及其它语种的文献在前,中文文献在后,参照以下标准执行。
期刊论文Bolinger, D. 1965. The atomization of word meaning [J]. Language 41 (4): 555-573.朱永生,2006,名词化、动词化与语法隐喻[J],《外语教学与研究》(2):83-90。
论文集论文Bybee, J. 1994. The grammaticization of zero: Asymmetries in tense and aspect systems [A]. In W. Pagliuca (ed.). Perspectives on Grammaticalization [C]. Amsterdam: John Benjamins. 235-254.文秋芳,2003a,英语学习者动机、观念、策略的变化规律与特点 [A]。
载文秋芳、王立非(编),《英语学习策略实证研究》[C]。
西安:陕西师范大学出版社。
255-259。
网上文献Jiang, Yan. 2000. The Tao of verbal communication: An Elementary textbook on pragmatics and discourse analysis [OL]. (accessed 30/04/2006).王岳川,2004,当代传媒中的网络文化与电视批评[OL], (2005年11月18日读取)。
专著Bloomfield, L. 1933. Language [M]. New York: Holt.吕叔湘、朱德熙,1952,《语法修辞讲话》[M]。
北京:中国青年出版社。
译著Nedjalkov, V. P. (ed.). 1983/1988. Typology of Resultative Constructions, trans. Bernard Comrie [C]. Amsterdam: John Benjamins.赵元任,1968/1980,《中国话的文法》(A Grammar of Spoken Chinese)[M],丁邦新译。
英文文献全文翻译
英文文献全文翻译全文共四篇示例,供读者参考第一篇示例:LeGuin, Ursula K. (December 18, 2002). "Dancing at the Edge of the World: Thoughts on Words, Women, Places".《世界边缘的舞蹈:关于语言、女性和地方的思考》Introduction:In "Dancing at the Edge of the World," Ursula K. LeGuin explores the intersection of language, women, and places. She writes about the power of words, the role of women in society, and the importance of our connection to the places we inhabit. Through a series of essays, LeGuin invites readers to think critically about these topics and consider how they shape our understanding of the world.Chapter 1: LanguageConclusion:第二篇示例:IntroductionEnglish literature translation is an important field in the study of language and culture. The translation of English literature involves not only the linguistic translation of words or sentences but also the transfer of cultural meaning and emotional resonance. This article will discuss the challenges and techniques of translating English literature, as well as the importance of preserving the original author's voice and style in the translated text.Challenges in translating English literature第三篇示例:Title: The Importance of Translation of Full English TextsTranslation plays a crucial role in bringing different languages and cultures together. More specifically, translating full English texts into different languages allows for access to valuable information and insights that may otherwise be inaccessible to those who do not speak English. In this article, we will explore the importance of translating full English texts and the benefits it brings.第四篇示例:Abstract: This article discusses the importance of translating English literature and the challenges translators face when putting together a full-text translation. It highlights the skills and knowledge needed to accurately convey the meaning and tone of the original text while preserving its cultural and literary nuances. Through a detailed analysis of the translation process, this article emphasizes the crucial role translators play in bridging the gap between languages and making English literature accessible to a global audience.IntroductionEnglish literature is a rich and diverse field encompassing a wide range of genres, styles, and themes. From classic works by Shakespeare and Dickens to contemporary novels by authors like J.K. Rowling and Philip Pullman, English literature offers something for everyone. However, for non-English speakers, accessing and understanding these works can be a challenge. This is where translation comes in.Translation is the process of rendering a text from one language into another, while striving to preserve the original meaning, tone, and style of the original work. Translating afull-length English text requires a deep understanding of both languages, as well as a keen awareness of the cultural andhistorical context in which the work was written. Additionally, translators must possess strong writing skills in order to convey the beauty and complexity of the original text in a new language.Challenges of Full-text TranslationTranslating a full-length English text poses several challenges for translators. One of the most significant challenges is capturing the nuances and subtleties of the original work. English literature is known for its rich and layered language, with intricate wordplay, metaphors, and symbolism that can be difficult to convey in another language. Translators must carefully consider each word and phrase in order to accurately convey the author's intended meaning.Another challenge of full-text translation is maintaining the author's unique voice and style. Each writer has a distinct way of expressing themselves, and a good translator must be able to replicate this voice in the translated text. This requires a deep understanding of the author's writing style, as well as the ability to adapt it to the conventions of the target language.Additionally, translators must be mindful of the cultural and historical context of the original work. English literature is deeply rooted in the history and traditions of the English-speaking world, and translators must be aware of these influences in orderto accurately convey the author's intended message. This requires thorough research and a nuanced understanding of the social, political, and economic factors that shaped the work.Skills and Knowledge RequiredTo successfully translate a full-length English text, translators must possess a wide range of skills and knowledge. First and foremost, translators must be fluent in both the source language (English) and the target language. This includes a strong grasp of grammar, syntax, and vocabulary in both languages, as well as an understanding of the cultural and historical context of the works being translated.Translators must also have a keen eye for detail and a meticulous approach to their work. Every word, sentence, and paragraph must be carefully considered and translated with precision in order to accurately convey the meaning of the original text. This requires strong analytical skills and a deep understanding of the nuances and complexities of language.Furthermore, translators must possess strong writing skills in order to craft a compelling and engaging translation. Translating a full-length English text is not simply a matter of substituting one word for another; it requires creativity, imagination, and a deep appreciation for the beauty of language. Translators mustbe able to capture the rhythm, cadence, and tone of the original work in their translation, while also adapting it to the conventions of the target language.ConclusionIn conclusion, translating a full-length English text is a complex and challenging task that requires a high level of skill, knowledge, and creativity. Translators must possess a deep understanding of both the source and target languages, as well as the cultural and historical context of the work being translated. Through their careful and meticulous work, translators play a crucial role in making English literature accessible to a global audience, bridging the gap between languages and cultures. By preserving the beauty and complexity of the original text in their translations, translators enrich our understanding of literature and bring the works of English authors to readers around the world.。
阅读英文文献的技巧
阅读英文文献的技巧
阅读英文文献是学术研究中不可或缺的一部分,以下是一些技巧可以帮助读者更有效地阅读英文文献:
1. 熟悉学术写作格式:英文文献通常采用特定的学术写作格式,如APA、MLA、Chicago等。
在阅读前,先了解这些格式并熟悉它们,这将有助于读者更好地理解文献中的内容。
2. 阅读文献前先搜索:在阅读英文文献之前,先通过学术搜索引擎(如Google Scholar、PubMed等)进行文献搜索,这将有助于读者找到相关的文献,并避免阅读一些不相关的内容。
3. 摘要和关键词阅读:文献的摘要和关键词是读者快速了解文献的主要内
容和贡献的关键信息。
读者应该仔细阅读摘要和关键词,以确定文献是否与自己的研究方向相关。
4. 阅读多个文献:在研究过程中,可能会需要阅读多个文献,每个文献都有
不同的观点和贡献。
因此,读者应该尝试阅读多个文献,以更全面地了解研究领域。
5. 笔记和注释:在阅读文献时,可以使用笔记和注释来记录重要的信息,如
作者、文献来源、时间、主题等。
这将有助于读者更好地理解文献内容,并在以后阅读时进行回顾。
6. 寻求帮助:如果读者在阅读英文文献时遇到困难,可以向导师、同事或其他学者寻求帮助。
他们可以提供有用的建议和指导,帮助读者更好地理解文献内容。
以上是一些阅读英文文献的技巧,读者可以根据自己的研究需要和实际情况选择合适的技巧。
英文文献综述怎么写范文(汇总3篇)
拆解论文结构,是一个很好的理解论文,学习论文写作,同时提高逻辑思维和表达的方法。
方法其实很简单,但凡事不能一蹴而就。
但相信勤加练习以后,你一定会觉得看论文、写论文都不再那么那么痛苦。
最后再来复习一遍步骤吧:step 1:找到自己喜欢的文献综述。
step 2:提炼框架。
提取出文献综述中的结构性语句,得到该篇文献综述的框架。
step3:填答案。
根据得到的框架来有目的地查阅文献,提取相关信息,填上答案。
得到初稿。
step4:多选几篇。
重复之前的方法,对其反复拆解、组装,最终得到完全属于自己的litera ture review。
英文文献综述怎么写范文第2篇当我们已经提炼出一篇文献综述的框架,去填每个空的答案就比较容易了。
但因为论文最注重的就是理论支撑。
我们不能随便百度到答案就填上去。
我们在文献综述中引用的一切,都需要在原文中找到依据。
但去看原文实在太累了。
所以建议的方法是:先在知乎、Quora、学术论坛或者相关好懂的文献综述,看看他们是如何引用这篇paper,评价这篇paper的。
看完之后你的心里就已经有底了。
那么我们需要做的也很简单:1. 翻到相关部分2. 关键词定位 (快速找到答案)3. 同义词替换 (降重)文献综述是一种通过对已有文献进行梳理、分析和评价的方法,以形成系统性的综合性文献报告,探讨某个问题的现状、发展趋势以及未来研究方向的方法。
那么如何写优秀的文献综述呢?下面从几个角度为大家介绍。
1.明确研究目的和问题在写文献综述之前,先要明确自己的研究目的和问题,这有助于你在文献中寻找和汇总符合研究方向的文献资料,也能避免收集到不必要的资料浪费时间。
2.合理筛选文献来源3.分类整理文献资料在文献综述的写作过程中,需要将搜集到的文献进行分类整理,例如按照时间、地区、专业领域、研究角度等进行整合,方便后续的分析和总结。
4.分析比较文献中不同观点和研究方法通过对文献的比较和分析,可以了解研究领域发展的趋势、发现未解决的问题和矛盾,并提出自己的新的解决方法,这就需要作家具有较强的综合分析能力。
毕业论文英文参考文献
毕业论文英文参考文献论文的参考文献是在英语专业论文写作过程中,对某一著作或论文的整体的参考或借鉴。
征引过的文献在注释中已注明,不再出现于文后参考文献中。
下面是店铺带来的关于毕业论文英文参考文献的内容,欢迎阅读参考!毕业论文英文参考文献(一)[1]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).[2]Coulombe,JosephL.ReadingNativeAmericanLiterature[M\. NewYork:Routledge,2011.[3]Erdrich,Louise.TheRoundHouse\M\.NewYork:HarperCollin sPublishers,2012.[J].作家,2013(12):1.[4]杨恒.弱者的失语法律的缺位--评美国国家图书奖获奖作品《圆屋》[J].博览群书,2013(6):84-88.[5]Said,Edward.CultureandImprerialism[M].NewYork:Vintage Books,1994.[6]Erdrich,Louise.LoveMedicine[M],NewYork:HarperPerennia l,1993.[7]罗世平.凝视:后殖民主义文学折射[J].国外文学,2006(4):122.[8]任一鸣.《后殖民:批评理论与文学》[M].北京:外语教学与研究出版社,2008.[9]Halliday,Lisa.LouiseErdrich[J].ParisReview,2010(52):133-137.[10]温语晴.书写印第安文化的温暖和困境一美国当代作家路易丝·厄德里克和她的作品.[11]陈榕.《凝视》[A].《西方文论关键词》[C].ed.赵一凡.北京:外语教学与研究出版社,2011.[12]Russo,Maria.Disturbing the spirits[i]. New York TimesBook Review, 2012(10): 9[13]Said, Edward. Culture and Imprerialism[M]. New York: Vintage Books,1994.[14]Fanon,Frantz. The Wretched of the Earth[M]. New York: Grove Press,1968.[15]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).毕业论文英文参考文献(二)[1] 陈鹏.高速公路服务区及收费站建筑节能研究[D].中南大学,2007[2] 清华大学建筑节能研究中心.中国建筑节能年度发展研究报告[M]2014.北京:中国建筑工业出版社,2014:39[3] 李慧玲.绿色建筑理念下的高速公路服务区建筑设计研究[D].西安:长安大学,2011[4] 公通字[2009]46 号.民用建筑外保温系统及外墙装饰防火暂行规定[S].新乡市建筑工程质量监督站印发.2009[5] 汤旭东.建筑工程中的现浇聚苯复合材料屋面保温技术[J].江西建材,2014,(11):45[6] 杨欣霖.高速公路服务区绿色建筑技术体系研究[D].西安:长安大学,2011[7] 欧志华,郭俊明.浅谈我国建筑节能50%设计标准的含义[J].建筑节能,2007,35(12):60-62[8] 邹惠芬,王国业,郭立杰等.严寒地区窗户热工性能对建筑能耗的影响分析[J].沈阳建筑大学学报(自然科学版).2009,25(5):982-986[9] 崔洪军,刘孔杰.国外服务区建设及研究现状[J].中国交通报,2008,(12):138-139[10] 郎松军.建筑结露的起因和防治方法初探[J].四川建筑,2002,22(Z1):201-203[11] 王金奎,史慧芳,邵旭.体形系数在公共建筑节能设计中的应用[J].低温建筑技术,2010,(5):98-99[12] 王丽颖,丘雨佳.对德国被动式居住建筑节能技术的考察[J].长春工程学院学报,2013,14(3):38-40[13] 赖有志,陆京海,杨军霞,张童.现浇轻质泡沫混凝土在屋面工程中的应用[J].施工技术.2011,40(14):79-94毕业论文英文参考文献(三)[1]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[2]黄梅.女人的危机和小说的危机--女人与小说杂谈之四[J].读书,1988(01):5.[3]孙宗白.真诚的女作家多丽丝·莱辛[J].外国文学研宄,1981(3):70.[4]施旻.《金色笔记》是女性主义文本吗·一关于多丽丝·莱辛及其《金色笔记》的论争[J].东岳论丛,2000(5): 132-134.[5]李福祥.多丽丝·莱辛笔下的政治与妇女主题[J].外国文学评论,1993(4):40-43[6]黎会华·多丽丝·莱辛《金色笔记》中的现代主义技巧分析[J].外语研究,2003(6):73.[7]陈才宇,刘新民.金色笔记[M].北京:译林出版社,2000.[8]黎会华·解构菲勒斯中心:构建新型女性主义主体一《金色笔记》的女性主义阅读[J].浙江师范大学学报,2004(3):33.[9]韩小敏,纪卫宁.析伍尔夫与莱辛文学创作的相似性[J].理论专刊,2004(8):125-126.[10]姜红.有意味的形式[J].外国文学,2003(4):96-98.[11]徐燕.《金色笔记》的超小说艺术[J].宁波大学学报,2003(3):78-80[12]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[13]卢婧.《金色笔记》的艺术形式与作者莱辛的人生体验[D].南京师范大学博士学位论文,2008.[14]佘海若.迟来的正义:被缚的自由女性一记2007年诺贝尔文学奖[J].今日科苑,2007(23): 19-24.[15]刘颖.建构女性的主体性话语一评多丽丝·莱辛的《金色笔记》[J].邵阳学院学报,2004(4).[16]范晓红.从《金色笔记》解读多丽丝·莱辛的生态整体观[D].南京师范大学,2011.[17]Brewster, Dorothy. Doris Lessing\M\. New York: Wayne, 1965: 161.[18]Spilka, Mark. Lessing and Lawrence: the Battle of theContemporary Literature,1975(16): 218-240.。
参考文献 英文
外文文献[1] Progress Possible through Science&Technology[N].KOREA IT TIMES,2005,March V ol.11.[2] V.J.Drapela&D.C.Washington,Guidance and Counseling AroundWorld[M].Universitypress of America,1979[3] D.E.Super,V ocational Development:A Frame work for Research[M].NewYork:TeachersCollege,Columbia University,1976:188-189.[52]J.O.Critos,Career Counseling Models,Methods and Materials[M].Newyork,McGraw-Hall Book Co,1981.[4] D.E.Super,A Theory of V ocational Development[J].American Psychologist,1953,[5] The World Conference on Higher Education﹒World Declaration andFramework for Priority Action forChange and Development in Higher Education[R]﹒World Conference on Higher Education,9 October,1998﹒[6] 青年就业网秘书处﹒ A Global Alliance forYouthEmployment:Recommendations of the High-Level Panelon YouthEmployment[R]﹒The 29th Item on the Agen-da of the 56th Session of theUnited Nations General As-sembly(Sept﹒28 2001).[7] Klandt,H.EntrePreneurshiPEdue硕onandRe·searehinGerman一SPeakingEuroPe.AeademyofManagementLearning&Edueation,SeP,2004,3(3):293.[8] KatZ,J.A.,TheehronologyandintelleetUaltrajeetoryofAmerieanentrePreneurshiPedueacionl876一1999[J].JoumalofBusinessVenturing,2003,(18)·[9] HenryEtzkowitz,etal.TheFutUreoftheUniversityandtheUniversityoftheFuture:Evolutionofivo汀TowertoEntrePreneurialParadigln[月,ResearehPoliey,2000(29):313一330. [10] VesPer,K.H.,Gartner,W.B.,MeasuringProgressinentrePreneurshiPedueation闭.JoumalofBusinessVenturing,[11] CooPerAC,HornadayJA,1997,(5).VesPerKH.TheFieldofEntrePreneurshiPoverTime[A].FrontiersofEntrePreneurshiPReseareh[C].Wellesley,MA:Babsoneollege,1997.[12] Katz,J.A.,Theinstitut1On阴dinfr韶trUCtureofentrePreneurshiP[J].EnterpreneurshiP:Throry&Practiee,SPring,1991,(3).[13] SolomonGT,FernaldLW{TrendsinSmallBusinessandEnireP拍neurshiPEdueationintheUnitedStates[J].EntrePreneurshiP:Theory&Practiee,1991,15(3):2540. [14] CalvinA.Kent.,EntrePreneurshiPeducationeurrentdeveloPments,futuredireetions[明.New丫brkQuor以roBookS,1990.[15] Jeffey A.immons:New Ventere Creation.Iwin McGraw–Hill,1999,3[16] Katz,J,The chronology and intellectual trajectory of American entrepreneurshipeducation,Journal of Business Venturing,2003(18):283-300[17]Vesper,K.H.,Gartner,W.B.,1997.Measuingprogressinentrepreneurshipeducation.J.Bus.Ve[18] Aaron Koh.Towards Crica l Pedagogy:Creating’thingking Schools’inSinggaporein:Joural of Curriculum studies.Taylor&Francis ltd,2002 255-264 [19] Jan H.Van Driel,Nico Verloop etal.Teachers’craft knowledge and curriculuminnovationin higher engineering education.in:Higher Education 1997:105-122 [20] Lin,Nan,“SocialResourcesandInstrumentalAetion.”Soeia1S加etureAndNetworkAnalysis,editdbyPeterMarsden&NanLin,BeverlyHills,CA:SagePublieations,Ine,1982[21] Lin,Nan,“SoeialResoureesTheory.”,inEneyeloPediaofSoeiology,V olume4,EditedbyE.F.BorgattaandM.1.Borgatta,NewYork:Maemillan,1992[22] Burt,Ronald,StruetureHoles:TheSoeialStruetUreofComPetition,MA:HarvardUniversityPress,1992[23] GranovetterMark.ThestrengthofweakTies.〔J].AmerieaJoumalofSoeiology,1973,78[24] Bourdieu,1990,ThelogieofPraetiee,Cambridge:PolityPress;Stanford:StanfordUniversityPress.[25] Portes,Alejandr,1995,TheEeonomieSoeiologyof11llllligration,NewYOrk:RussellSageFoundation.[26] Putnam,RobertD.,1993,“I五eProsPerousCommunity:SoeialCaPitalandPublieLife,”AmerieanProsPeet,13LS}Coleman,James,S,1990,TheFoundationsofSoeialTheory,Calllbridge,MA:Bel知aP,PressofHarvardUniversityPress.[27] Granove优er,Mark:1973,“TheStrengthofweakties”Americanjoumalssoeiology,75[28] Bian,YianjieandSoonAng,“GuanxiNetworksandJobMobilityinChinaandSingaPore.”inSoeialForees,1997,75[29] Paul5.Adler,Seok一WooKlwon,2002,SoeialC叩ital:prosPectSforaneweoneePt,AeademyofManagementReview,VOI.27,Nol:170一40[30] Burt,R.5.1997.“TheContingentValueofsocialC即ital,AdministratiVeSeieneeQuarterly,42:339一365[31] Hirseh,P.M.,&Levin,D.2.1999.UmbrellaadvoeatesversusvalidityPoliee:Alife一anizationSeienee,10:199一212[32] Putnam,R.D.,1995.Bowlingalone:Ameriea,5decliningsoeialeaPital.JournalofDemocraey,61:65一8[33] Nallapiet,J.,&Ghoshal,5.1998.Soeialc即ital,intellectualeaPital,andtheorganizationaladvantage.AeademyofManagemeniReview,23:242一266[34] podolny,J.M.,&Baron,J.N.1997.Resou-rcesandrelationshiPs:SoeialnetworksandmobilityintheworkPlaee.AmerieanSociologiealReview,62:673一93[35] SeottE.Seibert,RobertC.Linden(2001)“ASoeialCaPitalTheoryofCareerSuceess,,,“AeademyofManagementjo徽al,,[36] Femandez,R.M.,Castilla, E.J.,&Moore,P.200.SoeialcaPitalatwork:NetworksandemPloymentataPhoneeenier.AmerieanJoumalofSoeiology,105:1288一356[37] Hargadon, A.,&Sutton,R.1.1997.TeehnologybrokeringandinnovationinaProduetdeveloPmentfirm.AdministrativeScieneeQuarterly,42:716一49fZOJPennings,J.M.,Lee,K.,&vanwitteloostu巧n,A.1998.H脚aneaPital,soeialeaPital,andFirmdissolution.AcademyofManagementJournal,41:425一40[38] Whlker,G,,Kogut, B.,&Shan,W.1997,anizationSeienee,8:109一25[39] RobertD.putnam.MakeDemoeracywo永LM].PrincetonUniversitypress,1993:167[40] MarsdenP.V.,Networkdataandmeasurement【J].JournalReviewofSoeiology,1990,16:435一463[41] BurrisB.H.,Thehumaneffeetsofundere哪loyment[J〕.SocialProblems,1983,31(l):96一99[42] Coleman,James.SoeialCaPitalintheCreationofHumanCaPital【J」.AmerieanJournalofSoeiology,1998,94(SuPPlement):95一120 [43] Beggs,Jolm,J.AndHurlbelt,Jeanne5.,TheSoeialContextofMen,5andWomen‘5JobSearchTies:MembershiPinVOluntaryorganizations,SoeialResoureesandJobSearchOuteomes[J」.SoeiologiealPersPeetives,1997,40:601一28[44] Uzzi, B.,1997.Soeialstruetureandeo哪etitionininterfirmnetworks:TheParadoxofembeddedness.AdministrativeScienceQualterly.[45] smitka,M.,petitiveties:SubeolltractingintheJ即aneseautomotiveindustryNewYork:ColumbiaUniversityPress.[46] Klandt,H.,Entrepreneurship Education and Research in German-SpeakingEurope[J].Academy of Management Learning&Education,Sep2004,(3):293.[47] Vesper,K.H.,Gartner,W.B.,Measuring progress in entrepreneurshipeducation[J].Journalof Business Venturing.1997,(5):403-421.[48] Katz,J·A.The institution and infrastructure ofentrepreneurship[J].Entrepreneurship:Theory&Practice,Spring,1991,15(3):85~102.[49] Vesper,K·H,Gartner,W·B.Measuring progress in entrepreneurshipeducation[J].Journal ofBusiness Venturing,1997,12(5):403~421.[ 50] EdithWaterfall. The Day Continuation School ,London ,1923.[51 ] Dr. N. L. McCaslin Designing Career and Technical (Voca2tional) EducationPrograms for the Modern City 上海教育论坛[J ] . 2005 , (6) :22 - 23.[52] Jeffey A.immons:New Ventere Creation.Iwin McGraw–Hill,1999,3[53] Katz,J,The chronology and intellectual trajectory of American entrepreneurshipeducation,Journal of Business Venturing,2003(18):283-300nturing12(5)[ 54 ] 滕大春. 美国教育史[M] . 北京:人民教育出版社,1994.[ 55 ] 滕大春. 外国教育通史(第1 卷) [M] . 济南:山东教育出版社,1990.[56 ] [英]安迪·格林著,王春华等译,朱旭东校. 教育与国家的形成:英、法、美教育体系起源之比较[M] . 北京:教育科学出版社,2004[ 57] 滕大春. 今日美国教育[M] . 北京:人民教育出版社,1980.2.傅汉清:《美国小企业研究》,北京:中国财经经济出版社,2000年版。
中英文参考文献
中英文参考文献
中英文参考文献是学术研究中必不可少的部分,用于向读者提供关于研究背景、方法和结果的详细信息。
以下是一些中英文参考文献的示例:
中文参考文献:
1. 张三. (2019). 机器学习算法在数据挖掘中的应用研究. 中国计算机学会.
2. 李四, 王五, & 赵六. (2018). 人工智能的发展及其应用. 北京: 电子工业出版社.
3. 吕七, 刘八, & 陈九. (2017). 自然语言处理技术的最新进展. 人工智能, 25(3), 28-35.
英文参考文献:
1. Zhang, S. (2019). Application of machine learning algorithms in data mining. China Computer Federation.
2. Li, S., Wang, W., & Zhao, L. (2018). The development and applications of artificial intelligence. Beijing: Electronics Industry Press.
3. Lyu, Q., Liu, B., & Chen, J. (2017). The latest advances in natural language processing technology. Artificial Intelligence, 25(3), 28-35.。
英文文献的常见类型
英文文献的常见类型
学术期刊文章
原创研究论文:报告首次发现或对现有知识的重大贡献的研究成果。
综述论文:批判性地评估现有文献,总结特定主题的当前状态和未来方向。
专题论文:提供对特定主题的深入探讨,包括历史背景、理论框架和实证证据。
方法论论文:介绍和评估研究方法,讨论其优点和局限性。
病例报告:描述罕见或具有教学意义的病例,有助于临床知识的传播。
学术专著
学术专著:对特定主题的深入全面的研究,通常由一名或多名
学者撰写。
编著:由多位作者撰写的章节集,涵盖特定领域的各个方面。
手册:提供特定学科或主题的实用指南,通常由多位专家撰写。
会议论文集
会议论文:在学术会议上发表的论文,通常包含正在进行的研
究或新发现的摘要。
会议论文集:收集并发表在特定会议上发表的论文。
学位论文
硕士论文:对特定课题进行深入研究,通常作为硕士学位的一
部分撰写。
博士论文:对特定课题进行原创性研究,通常作为博士学位的
一部分撰写。
技术报告
技术报告:记录研究成果、项目进展或技术发展的正式文件。
白皮书:阐述特定技术问题或解决方案的综合报告。
其他类型
评论:对已发表研究或其他出版物的批判性评估。
访谈:对专家或主题专家进行正式采访,以收集见解和信息。
文献综述:对特定主题的已发表文献进行系统性的总结和分析。
传记:个人的生活和职业的详细描述。
自传:个人撰写的自己生活的叙述。
几个英文文献的网站
几个免费英文文献的网站推荐几个免费英文文献的网站2007-06-14 9:48Update: 2011-06-26①:学术英文资料NCBI美国国家生物技术中心简介:生物、医学、药学等友情提示1:PMC搜索入口在Search下拉列表中找到,可以找到全文的免费文献友情提示2:其它入口也有部分文献可查看全文,如PubMed,右上角会有“Full-Text Article”HighWire Press简介:综合类;斯坦福大学下属的出版机构;友情提示:部分免费,标识有“This article is FREE”; Science简介:科学杂志官方网站友情提示:免费注册后,可以下载1997年以前的全文;注册有点繁琐,但是内容都可以随意填写,不过,一定要记住自己先前大致的填写内容,否则通不过最后的一个验证;Nature简介:自然杂志官方网站,有一些Full Text的在线发表的论文;ScienceDirect简介:综合期刊、论文;友情提示:仅带绿框的文章可全文浏览;沃顿知识在线简介:商业,金融经济类为主;分中、英文两个版本;Marxists 简介:文史类;有中文版;友情提示:一切与马克思主义挨边的资料人、事件、国家,都可以在这儿找;比如可以找到列宁、毛泽东、鲁迅等的生平和着作,还有法国大革命、古巴导弹危机……;literature简介:综合类;类似于一个文献搜索的搜索引擎;友情提示:“Free Full Text”一栏值得关注,提供了一些全文免费文献的搜索入口;②:普通英文资料Wikipedia维基百科简介:英文大百科全书;查单个词条十分方便;友情提示1:适合于查找资料性的东西,比如,电冰箱的诞生史、微软的概况、红楼梦的简评和人物分析等Many books简介:免费的英文小说下载,都是无版权争议的,即20世纪之前的经典,提供多种格式;友情提示:在Search框里输入内容后,直接回车即可,没设置搜索按钮;Archive简介:资源丰富,被称为网络的“黑洞”;友情提示:要找某个网站的历史网页,可以到这儿来碰碰运气;Encyclopedia简介:英文大百科全书,类似于Wikipedia;Answers简介:搜索引擎Answers做的百科;About简介:类似一个门户网站,可以找找分类文章;其它未整理:。
如何快速有效阅读英文文献
如何快速有效阅读英文文献阅读英文文献对于非英语母语的人来说可能会有些困难,但通过一些技巧和方法,你可以提高阅读的效率和质量。
以下是几种快速有效阅读英文文献的方法:1.阅读前的准备在开始阅读之前,先浏览文章的标题、摘要和关键词,了解文章的主题和内容。
这可以帮助你对文章有一个大致的了解,并且帮助你判断是否值得进一步阅读。
2.制定阅读计划在开始阅读之前,设定一个时间限制,以避免花费过多时间在一篇文章上。
可以根据文章长度和自己的阅读速度,合理安排阅读的时间。
3.关注文章结构英文文章一般都会按照Introduction、Methods、Results和Discussion等部分进行组织。
关注这些部分的标题和段落开头的句子,可以帮助你快速了解文章的结构和主要内容。
4.关注重点句子和关键词文章中的关键句子通常会包含关键词和核心主题。
通过关注这些句子和关键词,可以更好地理解文章的要点和主题。
5.利用上下文推测词义遇到不认识的单词时,不要立即查字典,而是可以尝试通过上下文来推测其意思。
这样可以避免频繁查字典,减少阅读的中断。
6.制定阅读目标在阅读之前,确定自己的阅读目标。
是为了获取特定的信息、解决特定的问题还是仅仅获得整体了解?根据不同的目标,可以采用不同的阅读策略。
7.速读和扫读阅读长篇的英文文献时,可以采用速读和扫读的方法来提高阅读速度。
速读是快速浏览文章,关注标题、摘要和重点段落,获取整体了解。
扫读是快速寻找关键信息,如图表、数据和结论等。
8.笔记和总结在阅读过程中,可以用草图、关键词或者总结的方式做笔记。
这有助于加深对文章内容的理解和记忆,并且方便后期参考和复习。
9.多读一些相关文献通过阅读多篇相关的文献,可以帮助你更好地理解和掌握相关领域的知识。
同时,多读一些经典的文献也是提高阅读能力和学术素养的重要途径。
10.练习阅读技巧阅读英文文献是一个需要时间和实践的过程。
通过不断地练习阅读技巧,如速读、扫读、理解和推理等,可以逐渐提高阅读的速度和质量。
英文专著参考文献格式举例
英文专著参考文献格式举例参考文献是学术研究的重要组成部分,它为研究提供了有力的支持和参考。
在写英文专著时,适当引用相关的参考文献是必不可少的,下面是一些英文专著参考文献格式举例:1. 书籍:Smith, John. (2021). "The Impact of Climate Change on Global Ecosystems." Cambridge University Press.这是一本由约翰·史密斯(John Smith)撰写的关于气候变化对全球生态系统影响的书籍,出版商为剑桥大学出版社(Cambridge University Press)。
2. 期刊文章:Brown, Mary, et al. (2020). "The Role of Artificial Intelligence in Healthcare." Journal of Medical Research, vol. 45, no. 3, pp. 123-135.这篇期刊文章由玛丽·布朗(Mary Brown)等人撰写,题为“人工智能在医疗领域中的作用”,发表于《医学研究杂志》(Journal of Medical Research),第45卷,第3期,页码为123-135。
3. 学位论文:Johnson, David. (2019). "The Effects of Social Media onAdolescent Mental Health." Unpublished doctoral dissertation, Harvard University.这是一篇由大卫·约翰逊(David Johnson)撰写的关于社交媒体对青少年心理健康影响的学位论文,未发表,毕业于哈佛大学。
4. 网络资源:World Health Organization. (2020). "COVID-19: Guidelines for Public Health Measures." Available at:https://www.who.int/emergencies/diseases/novel-coronavirus-2019/phm-measures.这是世界卫生组织(World Health Organization)关于COVID-19公共卫生措施指南的网络资源,可在https://www.who.int/emergencies/diseases/novel-coronavirus-2019/phm-measures上找到。
如何阅读英文文献
如何阅读英文文献阅读英文文献是提高英语水平和专业知识的重要途径。
对于许多初次接触英文文献的人来说,仅仅依靠字典翻译,并不足以全面理解文献中的内容。
为了更好地阅读英文文献,下面将为你提供一些有用的技巧和建议。
1.熟悉文献结构:英文文献通常按照常规结构编写,包括摘要、引言、方法、结果和讨论部分。
在阅读之前,先熟悉这些部分的内容和顺序,这将帮助你更好地理解文献的组织结构和主要观点。
2.阅读摘要和标题:文献的摘要通常提供了对全文的概述和关键信息。
在开始全文阅读之前,先阅读摘要和标题,了解研究的目的、方法和主要结果,这有助于你确定是否继续阅读全文。
3.利用上下文推测词义:在阅读过程中,你可能会遇到一些生词和不熟悉的词汇。
此时,不要立即去查字典,尝试根据上下文推测其意思。
通过将其放入句子和段落的语境中,你可能能够理解其大致意思,从而更好地理解文献内容。
4.标记关键信息:在阅读过程中,使用标记或笔记来突出重要的观点、数据和引用。
这样做可以帮助你在之后翻阅时更快地找到相关信息,并帮助你更好地理解和消化文献。
5.阅读相关文献:阅读一篇文献时,经常会引用其他相关的文献。
如果你对该领域不够了解,不妨阅读这些相关文献,以加深对研究背景和领域知识的理解。
这有助于你更好地理解文献内涵,并从更广泛的角度看待问题。
8.注重语法和单词:在阅读文献的过程中,留意句子结构和语法使用。
如果遇到困难,可以参考语法书籍或向老师、同学寻求帮助。
同时,将常见的单词和短语列入生词表,并在之后的阅读中加以复习和应用。
9.常规阅读和扫描阅读结合:对于长篇文献或特定内容的深入阅读,可能需要花费较多时间。
然而,当你只是需要了解文献中的一些特定信息时,可以采用扫描阅读的方式快速获取所需信息。
在这种情况下,注重标题、摘要、图表和结论等部分的内容。
10.多读多练:在阅读英文文献上,没有捷径或替代品。
只通过不断的阅读才能提高阅读能力和理解能力。
因此,给自己设置阅读目标,并尽量多读不同领域的文献。
英文文献怎么找
英文文献怎么找引言:在进行学术研究和写作时,获取相关的英文文献是不可或缺的。
找到可靠且适合研究领域的英文文献,对于提供有力的支持和资料是至关重要的。
本文将介绍几种常见的方法,帮助您有效地查找英文文献。
一、图书馆及索引数据库1. 纸质图书馆:传统的图书馆仍然是一种常见的资源,可以找到大量的英文文献。
在图书馆使用卡片目录或在线目录,通过书名、作者姓名、主题或关键字查找相关书籍。
2. 图书馆提供的电子资源:许多大学和公共图书馆提供在线数据库和电子期刊,可以方便地查找英文文献。
通过访问图书馆网站,您可以浏览数据库和目录,使用关键字搜索进行研究和查找。
3. 知名索引数据库:一些知名的索引数据库提供广泛的英文文献检索服务,其中包含大量学术期刊、图书、会议论文和报告等。
常见的索引数据库包括PubMed、Google学术、Web of Science、Scopus等。
通过这些数据库,您可以使用关键字、作者、标题等进行搜索,并获得相关的文献列表。
二、学术搜索引擎1. Google学术:Google学术是一个强大的学术搜索引擎,提供广泛的英文文献检索服务。
与普通的搜索引擎不同,Google学术的搜索结果主要包含学术性的资源,如学术期刊、学位论文、会议论文等。
用户可以使用关键字、作者、标题等进行搜索,并通过相关性和引用数量等指标筛选出合适的文献。
2. Microsoft学术搜索:Microsoft学术搜索是微软公司提供的一个学术搜索引擎,特点是可以根据用户的需求进行高级搜索、学科筛选、排序和过滤,提供精准的英文文献检索服务。
3. 其他学术搜索引擎:除了Google学术和Microsoft学术,还有一些其他的学术搜索引擎可供选择,如JSTOR、Project MUSE、IEEE Xplore等。
这些学术搜索引擎专注于学术界的研究资源,提供了高质量和可信度较高的英文文献资源。
三、在线学术交流平台和社交媒体1. 学术交流平台:学术交流平台如ResearchGate和是研究人员之间分享研究成果和资源的社交网络,提供了大量的英文文献。
检索英文文献的方法
检索英文文献的方法在学术研究和知识探索的道路上,英文文献是不可或缺的资源。
然而,面对海量的信息,如何高效、准确地检索到所需的英文文献成为一大挑战。
本文将为您详细介绍几种实用的检索英文文献的方法。
一、使用学术搜索引擎1.Google Scholar(谷歌学术):作为全球最大的学术搜索引擎,Google Scholar提供了丰富的英文文献资源。
用户可以通过关键词搜索,还可以根据文章标题、作者、出版物等信息进行精确查找。
2.PubMed:主要针对生物医学领域的文献检索,资源丰富,检索结果具有较高的可靠性。
3.Web of Science:涵盖多个学科领域,提供引文分析、作者关系网络等功能,有助于用户发现相关领域的权威文献。
二、利用专业数据库1.IEEE Xplore:针对电子工程、计算机科学、自动化等领域,提供丰富的学术资源。
2.ScienceDirect:包含自然科学、工程技术、医药卫生等多个领域的文献,全文可在线查看。
3.Scopus:全球最大的文摘和引文数据库,涵盖多个学科领域,提供详细的文献信息。
三、运用学术期刊网站许多学术期刊都有自己的官方网站,用户可以直接访问这些网站,浏览最新发表的论文。
此外,部分期刊网站还提供关键词检索、作者检索等功能。
四、参考学术引用索引1.SCI(科学引文索引):涵盖自然科学领域的重要期刊,是衡量科研水平的重要指标。
2.SSCI(社会科学引文索引):针对社会科学领域的重要期刊,为社会科学研究提供权威的文献来源。
3.A&HCI(艺术与人文引文索引):包含艺术、人文领域的重要期刊,为相关领域研究提供丰富的文献资源。
五、利用图书馆资源许多高校图书馆都提供了丰富的电子资源,包括各类学术数据库、期刊等。
用户可以通过图书馆的官方网站或客户端访问这些资源。
六、社交网络与学术交流平台1.ResearchGate:一个国际性的学术社交网络,用户可以分享自己的研究成果,同时也能发现他人的研究。
英文文献阅读方法(一)
英文文献阅读方法1. 确定阅读目的在阅读英文文献之前,首先要明确阅读的目的。
是为了获取某方面的知识,还是为了查找支持自己观点的论据?不同的阅读目的会影响阅读的方式和深度。
2. 制定阅读计划在确定阅读目的的基础上,可以制定阅读计划。
考虑到时间和资源的限制,可以选择优先阅读具有代表性的文献,或者根据自己的研究方向和兴趣进行选择。
3. 阅读前的准备在开始阅读英文文献之前,可以先了解一些背景知识,比如作者的研究背景、研究方法和研究成果。
这样可以帮助我们更好地理解文献内容。
4. 速读在进行大量文献筛选时,可以采用速读的方式。
快速浏览文献的标题、摘要和关键词,以确定是否与自己的研究课题相关。
5. 详读对于与自己研究相关的文献,可以进行详细阅读。
可以逐段逐句地阅读,理解作者的论点、论据和结论,并思考其对自己研究的意义。
6. 笔记和摘录在阅读过程中,可以做好笔记和摘录工作。
可以记录下文献的主要观点、关键词和作者的论据,以备日后查阅。
7. 查找相关文献在阅读一篇文献的过程中,可能会涉及到其他相关的文献。
可以借助文献引用和检索工具,查找到相关的文献进行深入阅读。
8. 思考和总结阅读完毕后,可以对文献进行思考和总结。
可以思考文献的亮点和不足之处,以及对自己研究的启发和帮助。
9. 反复阅读有些重要的文献可能需要反复阅读。
通过多次阅读,可以更深入地理解文献内容,并为自己的研究提供更多的启发和支持。
10. 结合实际阅读完文献后,可以结合自己的研究实际,思考如何将文献中的观点和论据应用到自己的研究中,或者对文献中的研究方法和成果进行验证和拓展。
通过以上方法,可以更加有效地进行英文文献阅读,获取到有价值的知识和信息,为自己的研究工作提供支持和帮助。
英文文献参考文献格式
英文文献参考文献格式
1、Journal(期刊)
期刊(Journal)是最常见的参考文献类型,一般需要依次列出以下信息:作者、文章的题目、期刊名称、发表年份、卷号、页码。
提醒:页码也可由DOI、文章编号(ArticleNumber)代替,期刊类型参考文献也可以改成网页类型。
2、Book(书)
参考文献为书(Book),一般需要列出的信息有:作者、书名、出版社、出版社地点(包括城市和国家)、年份、页码。
3、书中的Chapter(章节)
书中的某个章节(Chapter),需要流出的信息有:作者、章节的题目、书名、编辑、出版社、出版社地点(包括城市和国家)、年份、卷号、页码。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Application of IC Card to Public Transport SystemZhou Cheng( Hubei University of Economics, Wuhan 430070 China)Abstract: According to the development of society, public transport system faces up with some serious problems.A new type of public transport system base on Bus IC Card is introduced in this paper. Electronic ticket, paying for busing based on the busing distance, the information of BIC owner and busing record storing is realized base on Bus IC Card. Also the system security is discussed and a new co-authorization method base on ellipse encryption algorithm is proposed.Keywords: IC Card, COS; security; public transport system;RSA; ellipse encryption algorithm.1 IntroductionWith the development of micro-electron technology, computer technology and sensor technology, more and more information products are applied to the practice of modern production and people’s living. IC card is one of the information product has been mentioned above, which has achieved gigantic economic effect and social effect.With the application of IC card to city transport system, there are many problems be solved to certain extent. For example, transport system has been refined and saved human resources by use of IC card. And economic loss caused by counterfeit money has been decreased[1].Transport development must precede the development of economy, especially the urban transport system, which directly influences the lives of citizens and the sustainable development of urban economy. It faces up with very serious challenges.Although Bus IC Card (BIC) has been introduced into the transport system for some years, it also has some deficiencies such as:(1)Passengers can pay money by card,but the IC card that applied to transport system only havea simple function of paying and without recording the information about IC card owner. Once the IC card owner lost the card, it is no way countermanding Consequently, passengers will suffer economic loss and their behalf will not be assurance.(2)Urban transport system universally ado pts “"one ticket standard" ,which simplify the management of transport system. It is often unfair to many passengers, especially to passengers who take only a few station, they still pay as much money as who takes many stations. In other words, it is unfair for these people that take a short distance and will make they pay more in line with their destination.(3)When the public transport company designs the vehicle routine, the busing time, starting station and terminal station must be recorded for the purpose of utilizing the transporting power completely. Unfortunately, it has takes a great of human resource and financial resource to do it. In fact, passenger peak time and bottom time such as during one day and a week can be recorded by ICcard. Therefore, Public Transport Company will adjust the frequency of bus according to passenger peak time or bottom time. And transport capability and transport power reached on the balance.According to the development of society, public transport system faces up with some serious problems.A new type of public transport system base on BIC is introduced in this paper. The rest of this paper is organized as follows. Section 2 mainly focuses on the hard and soft characteristic of IC Card. Section 3 adopts IC Card to realize a new type of public transport system. It also analyzes the system security and proposes a new co-authorization method base on ellipse encryption algorithm. Section 4 summarizes the paper and discusses about future research on thesubject.2 Description and Analysis of ICCard[2][3]Since an American businessman named Fnank formed Diners Club and designed the first modernSmart Card in the world, we have come through such several phrases as: Plastic Card (such as MASTER Card and VISA Card), Memory Card and CPU Card (alias is Smart Card). IC (integrate circuit) chip of smart card is a MCU (micro controller unit), which includes ROM, RAM, EEPROM (client memory) and CPU. As the core of smart card, the COS (Chip Operating System) is encapsulated in the ROM. The mutual authentication is one of basal function of COS, and thee-payment is based on the mutual authentication. Memory chip of IC card is composed of three elements (Hardware constitution of IC Card is such as FIG 1):ROM: It is only to read and not to write since the data is written into when produced.RAM: It is just like the inner-memory. It can be used to hold the application middle-result, such assession key.EEPROM:The data is written by specially programming. And the data is only to be read and not to be rewrited. We can rewrite or erasure the data by the use of the electrical signal derived from the IO devices (such as Card Reader) under the guidelines of page, word and byte. It has such perfect characteristics as follows: the count of overlap erasure is more times (from 10000 to 100000); the time of holding data is long (from 10 years to 100 years); the performance is stable and so on. But it also has such disadvantages as:the speed of writing data is low and the time of erasure and rewrite data will be increased along with the storage in Card is increasing. And it is better for us to store the application data and the result, such as key,personal information, special application information.It is just like the external-memory in PC. Memory region of IC Card can be divided into four sections as follows:Fig .1 Hardware constitution of IC CardPublic memory region: It comprises public information as sending card ID, accounting number of owner and so on.Non-transparent memory region for extern:The recording data is only for the purpose of inner decision. For example, PIN is stored in this memory region. PIN is wrote-in this memory region during the IC Card personnel process of sending Card. Although the data of PIN can be modified when user inputs the right PIN, it is no method of delivering PIN to extern of IC Card. Key is also can be stored in this special memory region to keep the security level of IC Card.Security memory region: It consists of remit money of IC Card and the type of IC Card serve.Recording memory region: Each payment data is recorded in this memory region. It is also canbe output as log-file to analyze some details.It is well known for us that security system of IC Card depends on the Card OS with the help of the characteristic of The IC Card Operating System (short in OS) has to be in accordance with the ISO/IEC7816 Standard and the EMV Standard. In china, it also has to be in accordance with <<The Chinese Finance IC Card Normal>> when the IC Card is adopted in the application of finance. COS can be divided into modular functional units called managers, the most important of which are File Manager and Security Manager.File Manager: the file in the IC Card is divided into MF (Master File), DF (Dedicated File) and EF (Elementary File). MF is the root of the whole file system; DF can be look upon as file directory; EF contains application information or data. The EF storing user data includes binary file,variable-length record file, circular variable-length record file, fixed-length record file and wallet file.Security Manager: Security Manager controls and secures the information in IC Card, including two parts: Secure Messaging Manager and Internal Security Manager. Secure Messaging Manager covers the cryptographic protection of the information transmission by enciphering or deciphering information and/or attaching MAC (Message Authentication Code) to the information. Internal Security Manager provides the functions as follows: PIN protection for validating cardholder, andmutual authentication (includes internal authentication and external authentication) for the authentication between the IC Card on the terminal side and cryptographic system on the host side.3 Application of IC Card to Public Transport SystemSince IC Card is convenience of portable and storing capability, it has been adopted to Public Transport System. Although IC Card has been used to implement "one ticket standard" for some years in China, its function is singleness since it has only has the function of payment in accordance with unified standard price. It is without owner personnel information, bus time frequency, security assurance and so on. Therefore, a new BIC framework design has been put forward in this paper. Passengers can pay for according to the destination distance and countermand IC Card. Public transport company can designs the vehicle routine, the busing time, starting station and terminal station base on the information that recorded in IC Card such as passengers peak time,bottom time and routine. In this section, such working has been discussed as follows: framework of BIC, IC Card file design, co-authorization method and ellipse encryption algorithm.3.1 Modules of BICBIC system mentioned in this paper is consisted of these modules such as: Issuing Module, User management module, IC Card Depositing Module,Payment module, Supplementary Module that recorded busing time and busing area. (The framework of BIC is as FIG 2)(1)Issuing Module: It recorded the send card timeand place.(2)User Management Module: It recorded the ICCard NO and owner’s elementary information such as:name, sex, age, employment, communication and soon.(3)IC Card Depositing Module: It containsinformation such as depositing amount ofmoney,remaining, Overdraw, accumulated number ofdepositing, and accumulated depositing amount ofmoney. IC card owner can deposit on card atauthorized depositing places. The depositing amountof money is written into IC card when card ownerpays some money. Depositing Module is able to countaccumulated number of depositing and accumulateddepositing amount of money, which is used to analyze the type of passengers. Public transport system will give some discount to customer whose accumulated number and amount of money is big. Overdraw is introduced to depositing module. Usually, passengers could not find that remaining sum is not enough until they cannot pay fare. Once he is not carry little money with him, which will cause inconvenient, even gives rise to conflict. After overdraw is introduced to depositing module, pay fare by card is still valid when the remaining sum is not enough. IC Card will report overdraw automatically, and prompting warning sends out special voice to remind of passenger he should to deposit money. Therefore, the owner of IC Card should depositing IC Card money, else he will not pay by IC Card when he has overdrawn some money.Fig, 2 BIC System Framework(4)Payment Module: It adopts two times operation when paying for the ticket. For example, he will pay for ticket by IC Card according to the distance between his current bus station and the bus terminal station. The money of IC Card is deduced as for a time. When he arrive his destination station, he should have a operation of IC Card again, the IC Card and IC Card manager system compute the actual distance that passenger take and refill some money that passenger should not pay for to IC Card. It is evidence that passenger can pay for ticker by IC Card in accordance with the distance that he take. It improves the original IC Card payment system that pay for ticket in fixed money.(5)Supplementary Module: The information of busing is applied to program the transport of city by traffic control center. When passengers get on bus,they pay for ticker by IC Card. The busing time and busing station are recorded. When they get off, they operate IC Card again. The busing time and stop station are reported. The rush hours and peak station can be counted by analyzing diagram. Public Transport Company should decrease the interval of starting during the rush hour and arrange more bus passing by the peak stations.3.2 Design of BIC System FileBIC System File consists of these files such as: IC Card files, Bus Charges management file, Depositing files system and supplementary information files. The IC card operating system (COS) shall support multiple Directory Files (DF) and Elementary Files (EF) under the Master File (MF). MF is Master File (The structure of IC Card file is as FIG 3). One card has only one Master File. Master File is created during the personnel initialization, which is existing and valid among the whole lifecycle of IC card. This MF contains information about control parameter and files security. The storage space of MF consists of MF header and storage space of EF and DF managed by MF. DF isdirectory file. Although the number of DF is controlled by space of EEPROM, we can define the number of DF according to the demand of application.EF is used to store user data and security key. What is used to store user data is called work basic file. It can be update when we gain the permission. Internal basic file store the security key. It cannot be read by surroundings and cannot be increased or update without permission. Both MF and DF include EF. However, EF cannot accommodate other DF and EF.Supplementary file system is introduced as Table 1. The busing time and busing station are reported. When they get off, they operate IC Card again. The busing time and stop station are recorded. According to the passengers busing information, transport department can analyze amount of attraction and production.Fig.3 Structure of IC Card FileTable 1 Supplementary File Structure3.3 Co-Authorization and Ellipse Encryption AlgorithmIC Card can perfectly realize the functions when it is never required to red out the cipher and it is in accordance with some purviews: Encryption arithmetic, KEY creating, KEY storing, KEY Management, KEY Destroying etc. Its security level depends on co-authorization. Mutual authentication contains internal authentication and external authentication. Internal authentication is the process that cryptographic system validates IC Card, which comprises the steps as follows: (1) cryptographic system creates 8 bytes pseudo-random number and sends it to the IC Card; (2) IC Card gets X by encrypting the pseudo-random number and sends X back; (3) cryptographic system gets Y by encrypting the pseudo-random number; (4) the host checks if X equals Y or not; (5) if X equals Y,the IC Card is valid.External Authentication is the process that IC Card validates cryptographic system, which comprises the steps as follows: (1) IC Card creates 8 bytes pseudo-random number and sends it to cryptographic system; (2) cryptographic system gets Y by encrypting the pseudo-random number and sends Y back; (3) IC Card gets X by encrypting the pseudo-random number;(4) IC Card checks if Y equals X or not; (5) if Y equals X, the terminal is valid.Co-authorization is base on encryption algorithm.RSA is a kind of grouping password, among which the text of open and secret are all of integral data from 0 to n -1 for a certain n . The secret password adopted is variable from 40b to 2048b , cutting the open statement up into pieces smaller than the length of password when encrypting, the calculation way of RSA converts each piece of open statement to secret pieces in the same length password. The public password and privately owned password in creation isas follows.(1)Select two different prime numbers p and q .(2)Calculation n = p×q and Function Φ(n) = ( p −1)(q −1)(3)Selecting an integral e randomly, e and Φ(n) are prime numbers with each other, at the same timefinding another d to satisfy e×d ≡1(modΦ(n)) .(4) (n,e) , (n,d) are separately as public secret key and privately secret key .For the clear statement M , adopting the public secret key (n,e) to get the text of secret C , C = M e mod(n) ;For the text of secret C , adopting the privately secret key (n,d) through saluting secret we can get the clear statement M ,M = C d mod(n) .Obviously, the time consumption of RSA arithmetic is index level, so in once trade process it needs the encrypt and deciphering for many times,The time complication of arithmetic brings overload effect on trade processing.The ECC security of the ellipse curve password system establishes on the dispersed logarithm question through the dots of the ellipse curve. The principle is described in brief as follows: The ellipse curve is not ellipse, deified generally to describe on the limited area F = GF( p) and curvilinear cubic equation is y2 = x3 + ax + b(mod p) , p is a prime number larger than 3, a and b are elements on the limited area F , defining another infinite far dot O . If P(x, y) satisfies above expression, it is the point on that ellipse. The points on the ellipse curve can be defined the additive calculation, if P and Q are both points on the ellipse curve, then (P +Q) is also point on the curve. The long-lost logarithms problem in ellipse curve firstly chooses a certain area or line on a certain curve, xP means P to add x times. To some x , presuming Q = xP , the dispersed logarithm questionof ellipse curve inverts to solve x .Obviously the algorithms of ellipse curve encrypts encrypt to three powers, therefore the more times of the encryption are, the more advantage of the time expense. Data manifesting: the encrypting strength of 160 bit of the ECC is mostly equal to 1024 bit of the RSA; The one add operator of ECC is equal to ten multiplies operators of RSA. The ECC is short in size of private key .In encrypt system, when delivering encrypt, ECC can save the amount of communication. ECC is superior to RSA in computing load, size of private key and amount of communication. In reality it can attain a higher speed, lower consuming; it also reduces the work strength ofthe procedure worker.4 ConclusionsFirstly, the application of IC Card to transport system is analyzed in China. Secondly, Software and hardware characteristic of IC Card is discussed. Thirdly, it propose a new BIC system that with thefunction of paying for bus ticket in line with the distance that between the stations (from getting on bus to getting off bus), and design a supplementary module to record the information of passenger on bus frequency. It can be adopted to analyze and set up the bus station, and the frequency of bus starting. All works in this paper can do some good to solve the serious problems that public transport system faces up with in China in some extend.AcknowledgmentsThe author acknowledges useful conversations with my partners PH.D Chen Xiyang of HuazhongUniversity of Science and Technology.Reference[1]Zhou Cheng, Chen Xiyang. The application smart card to security platform of logistics enterprise. J. Huazhong Univ.of Sci. & Tech. (Nature Science Edition), 3003, Vol.31, No.4:18-20.[2]Guo Yunhua, Chen xiyang. Research on Distributed web-based Smart Card Application. Proceedings of IceCE 2001, Sept.16-18, 2001. Xi’an, P.R.China.[3]Liu Jinpeng, Chen xiyang. The Concept and Implement of Smart Card in Security E-Commerce. Proceedings of IceCE 2001, Sept.16-18, 2001. Xi’an, P.R.China.Author BiographiesZhou Cheng received her bachelor degree of automatic engineering in 2001 and master degree of communication engineering in 2004 from Wuhan University of Technology. Now she is a instructor of HuBei University of Economics. Her research is major in communication and managementengineering.。