毕业设计(论文)外文翻译
毕业论文(设计)外文文献翻译及原文
金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
毕业设计论文外文文献翻译
毕业设计(论文)外文文献翻译院系:财务与会计学院年级专业:201*级财务管理姓名:学号:132148***附件: 财务风险管理【Abstract】Although financial risk has increased significantly in recent years risk and risk management are not contemporary issues。
The result of increasingly global markets is that risk may originate with events thousands of miles away that have nothing to do with the domestic market。
Information is available instantaneously which means that change and subsequent market reactions occur very quickly。
The economic climate and markets can be affected very quickly by changes in exchange rates interest rates and commodity prices。
Counterparties can rapidly become problematic。
As a result it is important to ensure financial risks are identified and managed appropriately. Preparation is a key component of risk management。
【Key Words】Financial risk,Risk management,YieldsI. Financial risks arising1.1What Is Risk1.1.1The concept of riskRisk provides the basis for opportunity. The terms risk and exposure have subtle differences in their meaning. Risk refers to the probability of loss while exposure is the possibility of loss although they are often used interchangeably。
毕业设计外文文献翻译范文
毕业设计外文文献翻译专业学生姓名班级学号指导教师优集学院外文资料名称:Knowledge-Based Engineeri--ng Design Methodology外文资料出处:Int.J.Engng Ed.Vol.16.No.1附件: 1.外文资料翻译译文2.外文原文基于知识工程(KBE)设计方法D. E. CALKINS1.背景复杂系统的发展需要很多工程和管理方面的知识、决策,它要满足很多竞争性的要求。
设计被认为是决定产品最终形态、成本、可靠性、市场接受程度的首要因素。
高级别的工程设计和分析过程(概念设计阶段)特别重要,因为大多数的生命周期成本和整体系统的质量都在这个阶段。
产品成本的压缩最可能发生在产品设计的最初阶段。
整个生命周期阶段大约百分之七十的成本花费在概念设计阶段结束时,缩短设计周期的关键是缩短概念设计阶段,这样同时也减少了工程的重新设计工作量。
工程权衡过程中采用良好的估计和非正式的启发进行概念设计。
传统CAD工具对概念设计阶段的支持非常有限。
有必要,进行涉及多个学科的交流合作来快速进行设计分析(包括性能,成本,可靠性等)。
最后,必须能够管理大量的特定领域的知识。
解决方案是在概念设计阶段包含进更过资源,通过消除重新设计来缩短整个产品的时间。
所有这些因素都主张采取综合设计工具和环境,以在早期的综合设计阶段提供帮助。
这种集成设计工具能够使由不同学科的工程师、设计者在面对复杂的需求和约束时能够对设计意图达成共识。
那个设计工具可以让设计团队研究在更高级别上的更多配置细节。
问题就是架构一个设计工具,以满足所有这些要求。
2.虚拟(数字)原型模型现在需要是一种代表产品设计为得到一将允许一产品的早发展和评价的真实事实上原型的过程的方式。
虚拟样机将取代传统的物理样机,并允许设计工程师,研究“假设”的情况,同时反复更新他们的设计。
真正的虚拟原型,不仅代表形状和形式,即几何形状,它也代表如重量,材料,性能和制造工艺的非几何属性。
本科毕业设计外文文献翻译
(Shear wall st ructural design ofh igh-lev el fr ameworkWu Jiche ngAbstract : In t his pape r the basic c oncepts of man pow er from th e fra me sh ear w all str uc ture, analy sis of the struct ur al des ign of th e c ont ent of t he fr ame she ar wall, in cludi ng the seism ic wa ll she ar spa本科毕业设计外文文献翻译学校代码: 10128学 号:题 目:Shear wall structural design of high-level framework 学生姓名: 学 院:土木工程学院 系 别:建筑工程系 专 业:土木工程专业(建筑工程方向) 班 级:土木08-(5)班 指导教师: (副教授)nratiodesign, and a concretestructure in themost co mmonly usedframe shear wallstructurethedesign of p oints to note.Keywords: concrete; frameshearwall structure;high-risebuildingsThe wall is amodern high-rise buildings is an impo rtant buildingcontent, the size of theframe shear wall must comply with building regulations. The principle is that the largersizebut the thicknessmust besmaller geometric featuresshouldbe presented to the plate,the force is close to cylindrical.The wall shear wa ll structure is a flatcomponent. Itsexposure to the force along the plane level of therole ofshear and moment, must also take intoaccountthe vertical pressure.Operate under thecombined action ofbending moments and axial force andshear forcebythe cantilever deep beam under the action of the force levelto loo kinto the bottom mounted on the basis of. Shearwall isdividedinto a whole walland theassociated shear wall in theactual project,a wholewallfor exampl e, such as generalhousingconstruction in the gableor fish bone structure filmwalls and small openingswall.Coupled Shear walls are connected bythecoupling beam shear wall.Butbecause thegeneralcoupling beamstiffness is less thanthe wall stiffnessof the limbs,so. Walllimb aloneis obvious.The central beam of theinflection pointtopay attentionto thewall pressure than the limits of the limb axis. Will forma shortwide beams,widecolumn wall limbshear wall openings toolarge component atbothen ds with just the domain of variable cross-section ro din the internalforcesunder theactionof many Walllimb inflection point Therefore, the calcula tions and construction shouldAccordingtoapproximate the framestructure to consider.The designof shear walls shouldbe based on the characteristics of avariety ofwall itself,and differentmechanical ch aracteristicsand requirements,wall oftheinternalforcedistribution and failuremodes of specific and comprehensive consideration of the design reinforcement and structural measures. Frame shear wall structure design is to consider the structure of the overall analysis for both directionsofthehorizontal and verticaleffects. Obtain theinternal force is required in accordancewiththe bias or partial pull normal section forcecalculation.The wall structure oftheframe shear wall structural design of the content frame high-rise buildings, in the actual projectintheuse of themost seismic walls have sufficient quantitiesto meet thelimitsof the layer displacement, the location isrelatively flexible. Seismic wall for continuous layout,full-length through.Should bedesigned to avoid the wall mutations in limb length and alignment is notupand down the hole. The sametime.The inside of the hole marginscolumnshould not belessthan300mm inordertoguaranteethelengthof the column as the edgeof the component and constraint edgecomponents.Thebi-direc tional lateral force resisting structural form of vertical andhorizontalwallconnected.Each other as the affinityof the shear wall. For one, two seismic frame she ar walls,even beam highratio should notgreaterthan 5 and a height of not less than400mm.Midline columnand beams,wall midline shouldnotbe greater tha nthe columnwidthof1/4,in order toreduce thetorsional effect of the seismicaction onthecolumn.Otherwisecan be taken tostrengthen thestirrupratio inthe column tomake up.If theshear wall shearspan thanthe big two. Eventhe beamcro ss-height ratiogreaterthan 2.5, then the design pressure of thecut shouldnotmakeabig 0.2. However, if the shearwallshear spanratioof less than two couplingbeams span of less than 2.5, then the shear compres sion ratiois notgreater than 0.15. Theother hand,the bottom ofthe frame shear wallstructure to enhance thedesign should notbe less than200mmand notlessthanstorey 1/16,otherpartsshouldnot be less than 160mm and not less thanstorey 1/20. Aroundthe wall of the frame shear wall structure shouldbe set to the beam or dark beamand the side columntoform a border. Horizontal distributionofshear walls can from the shear effect,this design when building higher longeror framestructure reinforcement should be appropriatelyincreased, especially in the sensitiveparts of the beam position or temperature, stiffnesschange is bestappropriately increased, thenconsideration shouldbe givento the wallverticalreinforcement,because it is mainly from the bending effect, andtake in some multi-storeyshearwall structurereinforcedreinforcement rate -likelessconstrained edgeofthecomponent or components reinforcement of theedge component.References: [1 sad Hayashi,He Yaming. On the shortshear wall high-rise buildingdesign [J].Keyuan, 2008, (O2).高层框架剪力墙结构设计吴继成摘要: 本文从框架剪力墙结构设计的基本概念人手, 分析了框架剪力墙的构造设计内容, 包括抗震墙、剪跨比等的设计, 并出混凝土结构中最常用的框架剪力墙结构设计的注意要点。
毕业设计论文 外文文献翻译
毕业设计(论文)外文参考文献翻译计算机科学与信息工程系系(院)2008 届题目企业即时通Instant Messaging for Enterprises课题类型技术开发课题来源自选学生姓名许帅专业班级 04计算机科学与技术指导老师王占中职称工程师完成日期:2008年4 月 6 日目录I NSTANT M ESSAGING FOR E NTERPRISE (1)1. Tips (1)2. Introduction (1)3. First things first (2)4.The While-Accept loop (4)5. Per-Thread class (6)6. The Client class (7)企业即时通 (9)1.提示 (9)2.简介 (9)3.首先第一件事 (10)4.监听循环 (11)5.单线程类 (13)6.用户端类 (14)Instant Messaging for Enterprise1. TipsIf Java is, in fact, yet another computer programming language, you may question why it is so important and why it is being promoted as a revolutionary step in computer programming. The answer isn’t immediately obvious if you’re coming from a tr aditional programming perspective. Although Java is very useful for solving traditional standalone programming problems, it is also important because it will solve programming problems on the World Wide Web. What is the Web?The Web can seem a bit of a mys tery at first, with all this talk of “surfing,”“presence,” and “home pages.” It’s helpful to step back and see what it really is, but to do this you must understand client/server systems, another aspect of computing that is full of confusing issues. The primary idea of a client/server system is that you have a central repository of information,some kind of data, often in a database。
毕业设计(论文)外文资料翻译(学生用)
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
单片机基础毕业设计外文翻译
本科生毕业设计(论文)外文翻译毕业设计题目:外文题目:Fundamentals of Single-chip Microcomputer 译文题目:单片机基础学院:信息科学与工程学院专业班级:电子信息工程0802班学生姓名:指导教师:外文原文Fundamentals of Single-chip MicrocomputerDr. Dobbs MacintoshJournalAbstractT h e s i n gl e-chi p m i c r o com pu t er i s t h e cul m i na t i on of bo t h t h e d e v el opm e nt o f t h e di gi t al c om p ut e r a nd t h e i nt e gra t e d c i r c ui t a rgu a b l y t h e t ow m o st s i gn i fi c ant i nv en t i on s of t h e 20t h ce n t u r y .T h es e t o w t yp e s o f a rc hi t e c t u r e a r e fo un d i n s i n gl e-c hi p m i c r o com pu t e r.S om e e m p l o y t h e s pl i t p ro gr a m/d at a m em o r y o f t h e H a r v a rd a r ch i t e ct u r e, s ho wn i n F i g.3-5A-1, ot h er s f o l l o w t he p hi l o so ph y,w i d e l y a d a p t ed f o r ge n e r al-pu rp os e com p ut e rs and m i c r op r oc e s s o rs,of m ak i n g n o l o gi c al di s t i nc t i on be t w ee n p ro gr a m a n d d at a m em o r y a s i n t h e P r i n c et on ar c hi t e ct u r e.In ge n e r a l t er m s a si n gl e-c hi p m i cro c om put e r i s c ha r ac t e ri z ed b y t h e i n co r po r at i o n o f al l t h e u ni t s o f a c om put e r i n t o a s i n gl e d e vi c e.Keyword: Single-chip Microcomputer ROM RAM Programming Algorithm Features• Compatible with MCS-51™ Products• 4K Bytes of In-System Reprogrammable Flash Memory– Endurance: 1,000 Write/Erase Cycles• Fully Static Operation: 0 Hz to 24 MHz• Three-level Program Memory Lock• 128 x 8-bit Internal RAM• 32 Programmable I/O Lines• Two 16-bit Timer/Counters• Six Interrupt Sources• Programmable Serial Channel• Low-power Idle and Power-down ModesDescriptionThe AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4Kbytes of Flash programmable and erasable read only memory (PEROM). The deviceis manufactured using Atmel’s high-density nonvolatile memory technology and iscompatible with the industry-standard MCS-51 instruction set and pinout. Theon-chipFlash allows the program memory to be reprogrammed in-system or by a conventionalnonvolatile memory programmer. By combining a versatile 8-bit CPU with Flashon a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which providesa highly-flexible and cost-effective solution to many embedded control applications.The AT89C51 provides the following standard features: 4Kbytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bittimer/counters, a five vector two-level interrupt architecture,a full duplex serial port, on-chip oscillator and clock circuitry.In addition, the AT89C51 is designed with static logicfor operation down to zero frequency and supports twosoftware selectable power saving modes. The Idle Modestops the CPU while allowing the RAM, timer/counters,serial port and interrupt system to continue functioning. ThePower-down Mode saves the RAM contents but freezesthe oscillator disabling all other chip functions until the nexthardware reset.Pin ConfigurationsBlock DiagramPin DescriptionVCCSupply voltage.GNDGround.Port 0Port 0 is an 8-bit open-drain bi-directional I/O port. As anoutput port, each pin can sink eight TTL inputs. When 1sare written to port 0 pins, the pins can be used as highimpedanceinputs.Port 0 may also be configured to be the multiplexed loworderaddress/data bus during accesses to external programand data memory. In this mode P0 has internalpullups.Port 0 also receives the code bytes during Flash programming,and outputs the code bytes during programverification. External pullups are required during program verification.Port 1Port 1 is an 8-bit bi-directional I/O port with internal pullups.The Port 1 output buffers can sink/source four TTL inputs.When 1s are written to Port 1 pins they are pulled high bythe internal pullups and can be used as inputs. As inputs,Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 1 also receives the low-order address bytes during Flash programming and verification.Port 2Port 2 is an 8-bit bi-directional I/O port with internal pullups.The Port 2 output buffers can sink/source four TTL inputs.When 1s are written to Port 2 pins they are pulled high by the internal pullups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pullups.Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that use 16-bit addresses (MOVX @DPTR). In this application, it uses strong internal pullups when emitting 1s. During accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register.Port 2 also receives the high-orderaddress bits and some control signals during Flash programming and verification.Port 3Port 3 is an 8-bit bi-directional I/O port with internal pullups.The Port 3 output buffers can sink/source four TTL inputs.When 1s are written to Port 3 pins they are pulled high by the internal pullups and can be used as inputs. As inputs,Port 3 pins that are externally being pulled low will source current (IIL) because of the pullups.Port 3 also serves the functions of various special features of the AT89C51 as listed below:Port 3 also receives some control signals for Flash programmingand verification.ALE/PROGAddress Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programming.In normal operation ALE is emitted at a constant rate of 1/6the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory.If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode.PSENProgram Store Enable is the read strobe to external program memory.When theAT89C51 is executing code from external programmemory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory.EA/VPPExternal Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP.XTAL1Input to the inverting oscillator amplifier and input to the internal clock operating circuit.XTAL2Output from the inverting oscillator amplifier.Oscillator CharacteristicsXTAL1 and XTAL2 are the input and output, respectively,of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven as shown in Figure 2. There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed.Idle ModeIn idle mode, the CPU puts itself to sleep while all the onchip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. It should be noted that when idle is terminated by a hard ware reset, the device normally resumes programexecution,from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory.Figure 1. Oscillator ConnectionsFigure 2. External Clock Drive ConfigurationPower-down ModeIn the power-down mode, the oscillator is stopped, and the instruction that invokes power-down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power-down mode is terminated. The only exit from power-down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize.Program Memory Lock BitsOn the chip are three lock bits which can be left unprogrammed (U) or can be programmed (P) to obtain the additional features listed in the table below.When lock bit 1 is programmed, the logic level at the EA pin is sampled and latched during reset. If the device is powered up without a reset, the latch initializes to a random value, and holds that value until reset is activated. It is necessary that the latched value of EA be in agreement with the current logic level at that pin in order for the device to function properly.Programming the FlashThe AT89C51 is normally shipped with the on-chip Flash memory array in the erased state (that is, contents = FFH) and ready to be programmed. The programming interface accepts either a high-voltage (12-volt) or a low-voltage (VCC) program enable signal. The low-voltage programming mode provides a convenient way to program theAT89C51 inside the user’s system, while the high-voltage programming mode is compatible with conventional thirdparty Flash or EPROM programmers. The AT89C51 is shipped with either the high-voltage or low-voltage programming mode enabled. The respective top-side marking and device signature codes are listed in the following table.The AT89C51 code memory array is programmed byte-bybyte in either programming mode. To program any nonblank byte in the on-chip Flash Memory, the entire memory must be erased using the Chip Erase Mode.Programming Algorithm: Before programming the AT89C51, the address, data and control signals should be set up according to the Flash programming mode table and Figure 3 and Figure 4. To program the AT89C51, take the following steps.1. Input the desired memory location on the address lines.2. Input the appropriate data byte on the data lines.3. Activate the correct combination of control signals.4. Raise EA/VPP to 12V for the high-voltage programming mode.5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte-write cycle is self-timed and typically takes no more than 1.5 ms.Repeat steps 1 through 5, changing the address and data for the entire array or until the end of the object file is reached.Data Polling: The AT89C51 features Data Polling to indicate the end of a write cycle. During a write cycle, an attempted read of the last byte written will result in the complement of the written datum on PO.7. Once the write cycle has been completed, true data are valid on all outputs, and the next cycle may begin. Data Polling may begin any time after a write cycle has been initiated.Ready/Busy: The progress of byte programming can also be monitored by theRDY/BSY output signal. P3.4 is pulled low after ALE goes high during programming to indicate BUSY. P3.4 is pulled high again when programming is done to indicate READY.Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed code data can be read back via the address and data lines for verification. The lock bits cannot be verified directly. Verification of the lock bits is achieved by observing that their features are enabled.Chip Erase: The entire Flash array is erased electrically by using the proper combination of control signals and by holding ALE/PROG low for 10 ms. The code array is written with all “1”s. The chip erase operation must be executed before the code memory can be re-programmed.Reading the Signature Bytes: The signature bytes are read by the same procedure as a normal verification of locations 030H, 031H, and 032H, except that P3.6 and P3.7 must be pulled to a logic low. The values returned are as follows.(030H) = 1EH indicates manufactured by Atmel(031H) = 51H indicates 89C51(032H) = FFH indicates 12V programming(032H) = 05H indicates 5V programmingProgramming InterfaceEvery code byte in the Flash array can be written and the entire array can be erasedby using the appropriate combination of control signals. The write operation cycle is selftimed and once initiated, will automatically time itself to completion. All major programming vendors offer worldwide support for the Atmel microcontroller series. Please contact your local programming vendor for the appropriate software revision.外文资料翻译译文单片机基础摘要:单片机是电脑和集成电路发展的巅峰,有据可查的是它们也是20世纪最意义的两大发明。
毕业设计(论文)外文资料翻译【范本模板】
南京理工大学紫金学院毕业设计(论文)外文资料翻译系:机械系专业:车辆工程专业姓名:宋磊春学号:070102234外文出处:EDU_E_CAT_VBA_FF_V5R9(用外文写)附件:1。
外文资料翻译译文;2.外文原文.附件1:外文资料翻译译文CATIA V5 的自动化CATIA V5的自动化和脚本:在NT 和Unix上:脚本允许你用宏指令以非常简单的方式计划CATIA。
CATIA 使用在MS –VBScript中(V5.x中在NT和UNIX3。
0 )的共用部分来使得在两个平台上运行相同的宏。
在NT 平台上:自动化允许CATIA像Word/Excel或者Visual Basic程序那样与其他外用分享目标。
ATIA 能使用Word/Excel对象就像Word/Excel能使用CATIA 对象。
在Unix 平台上:CATIA将来的版本将允许从Java分享它的对象。
这将提供在Unix 和NT 之间的一个完美兼容。
CATIA V5 自动化:介绍(仅限NT)自动化允许在几个进程之间的联系:CATIA V5 在NT 上:接口COM:Visual Basic 脚本(对宏来说),Visual Basic 为应用(适合前:Word/Excel ),Visual Basic。
COM(零部件目标模型)是“微软“标准于几个应用程序之间的共享对象。
Automation 是一种“微软“技术,它使用一种解释环境中的COM对象。
ActiveX 组成部分是“微软“标准于几个应用程序之间的共享对象,即使在解释环境里。
OLE(对象的链接与嵌入)意思是资料可以在一个其他应用OLE的资料里连结并且可以被编辑的方法(在适当的位置编辑).在VBScript,VBA和Visual Basic之间的差别:Visual Basic(VB)是全部的版本。
它能产生独立的计划,它也能建立ActiveX 和服务器。
它可以被编辑。
VB中提供了一个补充文件名为“在线丛书“(VB的5。
计算机专业毕业设计论文外文文献中英文翻译——java对象
1 . Introduction To Objects1.1The progress of abstractionAll programming languages provide abstractions. It can be argued that the complexity of the problems you’re able to solve is directly related to the kind and quality of abstraction。
By “kind” I mean,“What is it that you are abstracting?” Assembly language is a small abstraction of the underlying machine. Many so—called “imperative” languages that followed (such as FORTRAN,BASIC, and C) were abstractions of assembly language。
These languages are big improvements over assembly language,but their primary abstraction still requires you to think in terms of the structure of the computer rather than the structure of the problem you are trying to solve。
The programmer must establish the association between the machine model (in the “solution space,” which is the place where you’re modeling that problem, such as a computer) and the model of the problem that is actually being solved (in the “problem space,” which is the place where the problem exists). The effort required to perform this mapping, and the fact that it is extrinsic to the programming language,produces programs that are difficult to write and expensive to maintain,and as a side effect created the entire “programming methods” industry.The alter native to modeling the machine is to model the problem you’re trying to solve。
外文翻译格式及规范
嘉兴学院毕业论文(设计)外文翻译撰写格式规范一、外文翻译形式要求1、要求本科生毕业论文(设计)外文翻译部分的外文字符不少于1.5万字, 每篇外文文献翻译的中文字数要求达到2000字以上,一般以2000~3000字左右为宜。
2、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。
3、外文翻译应包括外文文献原文和译文,译文要符合外文格式规范和翻译习惯。
二、打印格式嘉兴学院毕业论文(设计)外文翻译打印纸张统一用A4复印纸,页面设置:上:2.8;下:2.6;左:3.0;右:2.6;页眉:1.5;页脚:1.75。
段落格式为:1.5倍行距,段前、段后均为0磅。
页脚设置为:插入页码,居中。
具体格式见下页温馨提示:正式提交“嘉兴学院毕业论文(设计)外文翻译”时请删除本文本中说明性的文字部分(红字部分)。
嘉兴学院本科毕业论文(设计)外文翻译题目:(指毕业论文题目)学院名称:服装与艺术设计学院专业班级:楷体小四学生姓名:楷体小四一、外文原文见附件(文件名:12位学号+学生姓名+3外文原文.文件扩展名)。
二、翻译文章翻译文章题目(黑体小三号,1.5倍行距,居中)作者(用原文,不需翻译,Times New Roman五号,加粗,1.5倍行距,居中)工作单位(用原文,不需翻译,Times New Roman五号,1.5倍行距,居中)摘要:由于消费者的需求和汽车市场竞争力的提高,汽车检测标准越来越高。
现在车辆生产必须长于之前的时间并允许更高的价格进行连续转售……。
(内容采用宋体五号,1.5倍行距)关键词:汽车产业纺织品,测试,控制,标准,材料的耐用性1 导言(一级标题,黑体五号,1.5倍行距,顶格)缩进两个字符,文本主体内容采用宋体(五号),1.5倍行距参考文献(一级标题,黑体五号, 1.5倍行距,顶格)略(参考文献不需翻译,可省略)资料来源:AUTEX Research Journal, V ol. 5, No3, September 2008*****译****校(另起一页)三、指导教师评语***同学是否能按时完成外文翻译工作。
毕业设计(论文)外文翻译
华南理工大学广州学院本科生毕业设计(论文)翻译外文原文名Agency Cost under the Restriction of Free Cash Flow中文译名自由现金流量的限制下的代理成本学院管理学院专业班级会计学3班学生姓名陈洁玉学生学号200930191100指导教师余勍讲师填写日期2015年5月11日外文原文版出处:译文成绩:指导教师(导师组长)签名:译文:自由现金流量的限制下的代理成本摘要代理成本理论是资本结构理论的一个重要分支。
自由现金流代理成本有显着的影响。
在这两个领域相结合的研究,将有助于建立和扩大理论体系。
代理成本理论基础上,本研究首先分类自由现金流以及统计方法的特点。
此外,投资自由现金流代理成本的存在证明了模型。
自由现金流代理成本理论引入限制,分析表明,它会改变代理成本,进而将影响代理成本和资本结构之间的关系,最后,都会影响到最优资本结构点,以保持平衡。
具体地说,自由现金流增加,相应地,债务比例会降低。
关键词:资本结构,现金流,代理成本,非金钱利益1、介绍代理成本理论,金融契约理论,信号模型和新的啄食顺序理论,新的资本结构理论的主要分支。
财务con-道的理论侧重于限制股东的合同行为,解决股东和债权人之间的冲突。
信令模式和新的啄食顺序理论中心解决投资者和管理者之间的冲突。
这两种类型的冲突是在商业组织中的主要冲突。
代理成本理论认为,如何达到平衡这两种类型的冲突,资本结构是如何形成的,这是比前两次在一定程度上更多的理论更全面。
……Agency Cost under the Restriction of Free Cash FlowAbstractAgency cost theory is an important branch of capital structural theory. Free cash flow has significant impact on agency cost. The combination of research on these two fields would help to build and extend the theoretical system. Based on agency cost theory, the present study firstly categorized the characteristics of free cash flow as well as the statistical methodologies. Furthermore, the existence of investing free cash flow in agency cost was proved by a model. Then free cash flow was introduced into agency cost theory as restriction, the analysis shows that it will change agency cost, in turn, will have an impact on the relationship between agency cost and capital structure, finally, will influence the optimal capital structure point to maintain the equilibrium. Concretely, with the increasing free cash flow, correspondingly, debt proportion will decrease.Keywords:Capital Structure,Free Cash Flow,Agency Cost,Non-Pecuniary Benefit1. IntroductionAgency cost theory, financial contract theory, signaling model and new pecking order theory are the main branches of new capital structure theory. Financial con-tract theory focuses on restricting stockholders’ behavior by contract and solving the conflict between stockholders and creditors. Signaling model and new pecking order theory center on solving the conflict between investors and managers. These two types of conflict are the main conflict in business organizations. Agency cost theory considers how equilibrium is reached in both types of conflict and how capital structure is formed, which is more theory is more comprehensive than the previous two to some degree.……。
燃气输配毕业设计的外文翻译
某某学校毕业设计(论文)外文文献翻译(本科学生用)题目:为了未来的发展,液化天然气工艺处理过程中应该注意的问题学生姓名:学号:学部(系):城市建设工程学部专业年级:级建筑环境与设备工程班指导教师:年月日equipment are also needed to ensure that economies of scale are not lost in the non-LNG facilities. Given the limited supply of gas resources capable of supporting these large trains, future projects will need to find ways to maintain some cost advantages at smaller capacities. One way to do this is to improve the project execution by selecting a process that gives the maximum flexibility for utilizing compressors, heat exchangers, and drivers with multiple competing vendors. Another desirable feature is using refrigerant as a utility to allow for facilitated expansion if there is a possibility that several resources can be staged for expansion trains.PROCESS COMPARISONLNG process selection has often been highly influenced by the specific power consumption, i.e., refrigerant compression power divided by the train capacity. This is certainly an important parameter, since refrigerant compressors are the largest single cost and energy consumption components in an LNG train. Conventional wisdom would be that lower specific power consumption would result in lower refrigerant compression costs and additional LNG production from a fixed feed gas rate. In actuality it is a more complicated picture. Figure 1 plots the specific power consumptions for a variety of liquefaction processes against the number of cycles employed based on consistent conditions.Figure 2 - ExxonMobil DMR-BAHX Process Schematic It would utilize BAHX exchangers to provide:• Multiple manufacturers for cost and schedule benefits,• Economic scale up over a wide range of throughputs,• Ease of modularizationThe BAHX exchangers would be protected from operational and design problems associated with multi-phase maldistribution by effecting refrigerant separation at each pressure level of the warm refrigerant and feeding only liquids to the BAHX cores while bypassing the vapor back to the compression system.It would utilize gas-turbine-driven centrifugal compressors large enough to capture the economy of scale available but small enough to ensure that multiple compressor vendors are capability of supplying the sizes needed.The results of our LNG process research applying these principles to a potential LNG development are shown in Figure 3. By using BAHXs and a dual mixed refrigerant process to match the best fit of compressors and drivers available from multiple vendors, the resulting process will have a lower specific power requirement, and could have a lower capital cost than traditional technologies. The DMR process with brazed aluminum heat exchangers shows a unit cost advantage across a broad range of plant capacities and optimizes the trade-offs of efficiency versus cost for a wide size range (3-6 MTPA) ofplants.EFFICIENT EXPANSIONLNG plants have long benefited for profitable expansion trains, typically provided from the same large resource. While the number of discovered large fields available for multi-train development is shrinking, there is still the potential for economical expansion from nearby smaller resources. In many cases these other fields cannot be aggregated into one large project for a variety of reasons: difficulty aligning several commercial interests, waiting on reduced development costs for more difficult resources, or near-field discoveries identified after the LNG project is underway. For all of these reasons it is desirable to have an easily expandable LNGplant.Treating refrigerant as a utility is a way to maximize the expandability and reliability of a multtrain facility. In this configuration all of the refrigerants that serve the same process function are combined into a single header and delivered as required to the LNG liquefaction sections. The refrigerant as a utility concept can be done with any liquefaction process, but is most suited for dual mixed refrigerants where the refrigerant return pressures can be higher resulting in smaller piping for distribution of refrigerant across the LNG plant. Figure 4 shows one such configurationTreating refrigerant as a utility has several benefits:• The trains do not necessarily need to be the same size, leading to customizableexpansion to match commercial needs.• All the refrigerants can be re-tuned to match changes in feed gas composition tomachinery limits as new gas supplies are brought on-line.• Any spare capacity identified by testing after start-up can be designed for and utilized during expansion.• A mixture of gas turbine, steam turbine, and motor drivers can be used giving more flexibility to the driver selection and energy utilization.• In the event of driver failures, the liquefaction train may be able to turn-down instead of shut-down.• During planned driver maintenance the other drivers can be run at their maximum rates and potentially take advantage of seasonal swings.• A driver and hence refrigerant supply can be easily spared across the whole plant, increasing plant availability.• Various cold streams, such as LNG-loading vapors, can be effectively integrated into the process scheme to allow the impact of flow fluctuations in these streams to be evenlyspread across all trains for operational stability.With these advantages, a refrigerant as a utility concept could be beneficial to provide大的成本和最大的能源消耗体。
毕业设计论文外文文献翻译
xxxx大学xxx学院毕业设计(论文)外文文献翻译系部xxxx专业xxxx学生姓名xxxx 学号xxxx指导教师xxxx 职称xxxx2013年3 月Introducing the Spring FrameworkThe Spring Framework: a popular open source application framework that addresses many of the issues outlined in this book. This chapter will introduce the basic ideas of Spring and dis-cuss the central “bean factory” lightweight Inversion-of-Control (IoC) container in detail.Spring makes it particularly easy to implement lightweight, yet extensible, J2EE archi-tectures. It provides an out-of-the-box implementation of the fundamental architectural building blocks we recommend. Spring provides a consistent way of structuring your applications, and provides numerous middle tier features that can make J2EE development significantly easier and more flexible than in traditional approaches.The basic motivations for Spring are:To address areas not well served by other frameworks. There are numerous good solutions to specific areas of J2EE infrastructure: web frameworks, persistence solutions, remoting tools, and so on. However, integrating these tools into a comprehensive architecture can involve significant effort, and can become a burden. Spring aims to provide an end-to-end solution, integrating spe-cialized frameworks into a coherent overall infrastructure. Spring also addresses some areas that other frameworks don’t. For example, few frameworks address generic transaction management, data access object implementation, and gluing all those things together into an application, while still allowing for best-of-breed choice in each area. Hence we term Spring an application framework, rather than a web framework, IoC or AOP framework, or even middle tier framework.To allow for easy adoption. A framework should be cleanly layered, allowing the use of indi-vidual features without imposing a whole worldview on the application. Many Spring features, such as the JDBC abstraction layer or Hibernate integration, can be used in a library style or as part of the Spring end-to-end solution.To deliver ease of use. As we’ve noted, J2EE out of the box is relatively hard to use to solve many common problems. A good infrastructure framework should make simple tasks simple to achieve, without forcing tradeoffs for future complex requirements (like distributed transactions) on the application developer. It should allow developers to leverage J2EE services such as JTA where appropriate, but to avoid dependence on them in cases when they are unnecessarily complex.To make it easier to apply best practices. Spring aims to reduce the cost of adhering to best practices such as programming to interfaces, rather than classes, almost to zero. However, it leaves the choice of architectural style to the developer.Non-invasiveness. Application objects should have minimal dependence on the framework. If leveraging a specific Spring feature, an object should depend only on that particular feature, whether by implementing a callback interface or using the framework as a class library. IoC and AOP are the key enabling technologies for avoiding framework dependence.Consistent configuration. A good infrastructure framework should keep application configuration flexible and consistent, avoiding the need for custom singletons and factories. A single style should be applicable to all configuration needs, from the middle tier to web controllers.Ease of testing. Testing either whole applications or individual application classes in unit tests should be as easy as possible. Replacing resources or application objects with mock objects should be straightforward.To allow for extensibility. Because Spring is itself based on interfaces, rather than classes, it is easy to extend or customize it. Many Spring components use strategy interfaces, allowing easy customization.A Layered Application FrameworkChapter 6 introduced the Spring Framework as a lightweight container, competing with IoC containers such as PicoContainer. While the Spring lightweight container for JavaBeans is a core concept, this is just the foundation for a solution for all middleware layers.Basic Building Blockspring is a full-featured application framework that can be leveraged at many levels. It consists of multi-ple sub-frameworks that are fairly independent but still integrate closely into a one-stop shop, if desired. The key areas are:Bean factory. The Spring lightweight IoC container, capable of configuring and wiring up Java-Beans and most plain Java objects, removing the need for custom singletons and ad hoc configura-tion. Various out-of-the-box implementations include an XML-based bean factory. The lightweight IoC container and its Dependency Injection capabilities will be the main focus of this chapter.Application context. A Spring application context extends the bean factory concept by adding support for message sources and resource loading, and providing hooks into existing environ-ments. Various out-of-the-box implementations include standalone application contexts and an XML-based web application context.AOP framework. The Spring AOP framework provides AOP support for method interception on any class managed by a Spring lightweight container.It supports easy proxying of beans in a bean factory, seamlessly weaving in interceptors and other advice at runtime. Chapter 8 dis-cusses the Spring AOP framework in detail. The main use of the Spring AOP framework is to provide declarative enterprise services for POJOs.Auto-proxying. Spring provides a higher level of abstraction over the AOP framework and low-level services, which offers similar ease-of-use to .NET within a J2EE context. In particular, the provision of declarative enterprise services can be driven by source-level metadata.Transaction management. Spring provides a generic transaction management infrastructure, with pluggable transaction strategies (such as JTA and JDBC) and various means for demarcat-ing transactions in applications. Chapter 9 discusses its rationale and the power and flexibility that it offers.DAO abstraction. Spring defines a set of generic data access exceptions that can be used for cre-ating generic DAO interfaces that throw meaningful exceptions independent of the underlying persistence mechanism. Chapter 10 illustrates the Spring support for DAOs in more detail, examining JDBC, JDO, and Hibernate as implementation strategies.JDBC support. Spring offers two levels of JDBC abstraction that significantly ease the effort of writing JDBC-based DAOs: the org.springframework.jdbc.core package (a template/callback approach) and the org.springframework.jdbc.object package (modeling RDBMS operations as reusable objects). Using the Spring JDBC packages can deliver much greater pro-ductivity and eliminate the potential for common errors such as leaked connections, compared with direct use of JDBC. The Spring JDBC abstraction integrates with the transaction and DAO abstractions.Integration with O/R mapping tools. Spring provides support classesfor O/R Mapping tools like Hibernate, JDO, and iBATIS Database Layer to simplify resource setup, acquisition, and release, and to integrate with the overall transaction and DAO abstractions. These integration packages allow applications to dispense with custom ThreadLocal sessions and native transac-tion handling, regardless of the underlying O/R mapping approach they work with.Web MVC framework. Spring provides a clean implementation of web MVC, consistent with the JavaBean configuration approach. The Spring web framework enables web controllers to be configured within an IoC container, eliminating the need to write any custom code to access business layer services. It provides a generic DispatcherServlet and out-of-the-box controller classes for command and form handling. Request-to-controller mapping, view resolution, locale resolution and other important services are all pluggable, making the framework highly extensi-ble. The web framework is designed to work not only with JSP, but with any view technology, such as Velocity—without the need for additional bridges. Chapter 13 discusses web tier design and the Spring web MVC framework in detail.Remoting support. Spring provides a thin abstraction layer for accessing remote services without hard-coded lookups, and for exposing Spring-managed application beans as remote services. Out-of-the-box support is inc luded for RMI, Caucho’s Hessian and Burlap web service protocols, and WSDL Web Services via JAX-RPC. Chapter 11 discusses lightweight remoting.While Spring addresses areas as diverse as transaction management and web MVC, it uses a consistent approach everywhere. Once you have learned the basic configuration style, you will be able to apply it in many areas. Resources, middle tier objects, and web components are all set up using the same bean configuration mechanism. You can combine your entireconfiguration in one single bean definition file or split it by application modules or layers; the choice is up to you as the application developer. There is no need for diverse configuration files in a variety of formats, spread out across the application.Spring on J2EEAlthough many parts of Spring can be used in any kind of Java environment, it is primarily a J2EE application framework. For example, there are convenience classes for linking JNDI resources into a bean factory, such as JDBC DataSources and EJBs, and integration with JTA for distributed transaction management. In most cases, application objects do not need to work with J2EE APIs directly, improving reusability and meaning that there is no need to write verbose, hard-to-test, JNDI lookups.Thus Spring allows application code to seamlessly integrate into a J2EE environment without being unnecessarily tied to it. You can build upon J2EE services where it makes sense for your application, and choose lighter-weight solutions if there are no complex requirements. For example, you need to use JTA as transaction strategy only if you face distributed transaction requirements. For a single database, there are alternative strategies that do not depend on a J2EE container. Switching between those transac-tion strategies is merely a matter of configuration; Spring’s consistent abstraction avoids any need to change application code.Spring offers support for accessing EJBs. This is an important feature (and relevant even in a book on “J2EE without EJB”) because the u se of dynamic proxies as codeless client-side business delegates means that Spring can make using a local stateless session EJB an implementation-level, rather than a fundamen-tal architectural, choice.Thus if you want to use EJB, you can within a consistent architecture; however, you do not need to make EJB the cornerstone of your architecture. This Spring feature can make devel-oping EJB applications significantly faster, because there is no need to write custom code in service loca-tors or business delegates. Testing EJB client code is also much easier, because it only depends on the EJB’s Business Methods interface (which is not EJB-specific), not on JNDI or the EJB API.Spring also provides support for implementing EJBs, in the form of convenience superclasses for EJB implementation classes, which load a Spring lightweight container based on an environment variable specified in the ejb-jar.xml deployment descriptor. This is a powerful and convenient way of imple-menting SLSBs or MDBs that are facades for fine-grained POJOs: a best practice if you do choose to implement an EJB application. Using this Spring feature does not conflict with EJB in any way—it merely simplifies following good practice.Introducing the Spring FrameworkThe main aim of Spring is to make J2EE easier to use and promote good programming practice. It does not reinvent the wheel; thus you’ll find no logging packages in Spring, no connection pools, no distributed transaction coordinator. All these features are provided by other open source projects—such as Jakarta Commons Logging (which Spring uses for all its log output), Jakarta Commons DBCP (which can be used as local DataSource), and ObjectWeb JOTM (which can be used as transaction manager)—or by your J2EE application server. For the same reason, Spring doesn’t provide an O/R mapping layer: There are good solutions for this problem area, such as Hibernate and JDO.Spring does aim to make existing technologies easier to use. For example, although Spring is not in the business of low-level transactioncoordination, it does provide an abstraction layer over JTA or any other transaction strategy. Spring is also popular as middle tier infrastructure for Hibernate, because it provides solutions to many common issues like SessionFactory setup, ThreadLocal sessions, and exception handling. With the Spring HibernateTemplate class, implementation methods of Hibernate DAOs can be reduced to one-liners while properly participating in transactions.The Spring Framework does not aim to replace J2EE middle tier services as a whole. It is an application framework that makes accessing low-level J2EE container ser-vices easier. Furthermore, it offers lightweight alternatives for certain J2EE services in some scenarios, such as a JDBC-based transaction strategy instead of JTA when just working with a single database. Essentially, Spring enables you to write appli-cations that scale down as well as up.Spring for Web ApplicationsA typical usage of Spring in a J2EE environment is to serve as backbone for the logical middle tier of a J2EE web application. Spring provides a web application context concept, a powerful lightweight IoC container that seamlessly adapts to a web environment: It can be accessed from any kind of web tier, whether Struts, WebWork, Tapestry, JSF, Spring web MVC, or a custom solution.The following code shows a typical example of such a web application context. In a typical Spring web app, an applicationContext.xml file will reside in the WEB-INF directory, containing bean defini-tions according to the “spring-beans” DTD. In such a bean definition XML file, business objects and resources are defined, for example, a “myDataSource” bean, a “myInventoryManager” bean, and a “myProductManager” bean. Spring takes care of their configuration, their wiring up, and their lifecycle.<beans><bean id=”myDataSource” class=”org.springframework.jdbc. datasource.DriverManagerDataSource”><property name=”driverClassName”> <value>com.mysql.jdbc.Driver</value></property> <property name=”url”><value>jdbc:mysql:myds</value></property></bean><bean id=”myInventoryManager” class=”ebusiness.DefaultInventoryManager”> <property name=”dataSource”><ref bean=”myDataSource”/> </property></bean><bean id=”myProductManager” class=”ebusiness.DefaultProductManage r”><property name=”inventoryManager”><ref bean=”myInventoryManager”/> </property><property name=”retrieveCurrentStock”> <value>true</value></property></bean></beans>By default, all such beans have “singleton” scope: one instance per context. The “myInventoryManager” bean will automatically be wired up with the defined DataSource, while “myProductManager” will in turn receive a reference to the “myInventoryManager” bean. Those objects (traditionally called “beans” in Spring terminology) need to expos e only the corresponding bean properties or constructor arguments (as you’ll see later in this chapter); they do not have to perform any custom lookups.A root web application context will be loaded by a ContextLoaderListener that is defined in web.xml as follows:<web-app><listener> <listener-class>org.springframework.web.context.ContextLoaderListener</listener-class></listener>...</web-app>After initialization of the web app, the root web application context will be available as a ServletContext attribute to the whole web application, in the usual manner. It can be retrieved from there easily via fetching the corresponding attribute, or via a convenience method in org.springframework.web. context.support.WebApplicationContextUtils. This means that the application context will be available in any web resource with access to the ServletContext, like a Servlet, Filter, JSP, or Struts Action, as follows:WebApplicationContext wac = WebApplicationContextUtils.getWebApplicationContext(servletContext);The Spring web MVC framework allows web controllers to be defined as JavaBeans in child application contexts, one per dispatcher servlet. Such controllers can express dependencies on beans in the root application context via simple bean references. Therefore, typical Spring web MVC applications never need to perform a manual lookup of an application context or bean factory, or do any other form of lookup.Neither do other client objects that are managed by an application context themselves: They can receive collaborating objects as bean references.The Core Bean FactoryIn the previous section, we have seen a typical usage of the Spring IoC container in a web environment: The provided convenience classes allow for seamless integration without having to worry about low-level container details. Nevertheless, it does help to look at the inner workings to understand how Spring manages the container. Therefore, we will now look at the Spring bean container in more detail, starting at the lowest building block: the bean factory. Later, we’ll continue with resource setup and details on the application context concept.One of the main incentives for a lightweight container is to dispense with the multitude of custom facto-ries and singletons often found in J2EE applications. The Spring bean factory provides one consistent way to set up any number of application objects, whether coarse-grained components or fine-grained busi-ness objects. Applying reflection and Dependency Injection, the bean factory can host components that do not need to be aware of Spring at all. Hence we call Spring a non-invasive application framework.Fundamental InterfacesThe fundamental lightweight container interface is org.springframework.beans.factory.Bean Factory. This is a simple interface, which is easy to implement directly in the unlikely case that none of the implementations provided with Spring suffices. The BeanFactory interface offers two getBean() methods for looking up bean instances by String name, with the option to check for a required type (and throw an exception if there is a type mismatch).public interface BeanFactory {Object getBean(String name) throws BeansException;Object getBean(String name, Class requiredType) throws BeansException;boolean containsBean(String name);boolean isSingleton(String name) throws NoSuchBeanDefinitionException;String[] getAliases(String name) throws NoSuchBeanDefinitionException;}The isSingleton() method allows calling code to check whether the specified name represents a sin-gleton or prototype bean definition. In the case of a singleton bean, all calls to the getBean() method will return the same object instance. In the case of a prototype bean, each call to getBean() returns an inde-pendent object instance, configured identically.The getAliases() method will return alias names defined for the given bean name, if any. This mecha-nism is used to provide more descriptive alternative names for beans than are permitted in certain bean factory storage representations, such as XML id attributes.The methods in most BeanFactory implementations are aware of a hierarchy that the implementation may be part of. If a bean is not foundin the current factory, the parent factory will be asked, up until the root factory. From the point of view of a caller, all factories in such a hierarchy will appear to be merged into one. Bean definitions in ancestor contexts are visible to descendant contexts, but not the reverse.All exceptions thrown by the BeanFactory interface and sub-interfaces extend org.springframework. beans.BeansException, and are unchecked. This reflects the fact that low-level configuration prob-lems are not usually recoverable: Hence, application developers can choose to write code to recover from such failures if they wish to, but should not be forced to write code in the majority of cases where config-uration failure is fatal.Most implementations of the BeanFactory interface do not merely provide a registry of objects by name; they provide rich support for configuring those objects using IoC. For example, they manage dependen-cies between managed objects, as well as simple properties. In the next section, we’ll look at how such configuration can be expressed in a simple and intuitive XML structure.The sub-interface org.springframework.beans.factory.ListableBeanFactory supports listing beans in a factory. It provides methods to retrieve the number of beans defined, the names of all beans, and the names of beans that are instances of a given type:public interface ListableBeanFactory extends BeanFactory {int getBeanDefinitionCount();String[] getBeanDefinitionNames();String[] getBeanDefinitionNames(Class type);boolean containsBeanDefinition(String name);Map getBeansOfType(Class type, boolean includePrototypes,boolean includeFactoryBeans) throws BeansException}The ability to obtain such information about the objects managed by a ListableBeanFactory can be used to implement objects that work with a set of other objects known only at runtime.In contrast to the BeanFactory interface, the methods in ListableBeanFactory apply to the current factory instance and do not take account of a hierarchy that the factory may be part of. The org.spring framework.beans.factory.BeanFactoryUtils class provides analogous methods that traverse an entire factory hierarchy.There are various ways to leverage a Spring bean factory, ranging from simple bean configuration to J2EE resource integration and AOP proxy generation. The bean factory is the central, consistent way of setting up any kind of application objects in Spring, whether DAOs, business objects, or web controllers. Note that application objects seldom need to work with the BeanFactory interface directly, but are usu-ally configured and wired by a factory without the need for any Spring-specific code.For standalone usage, the Spring distribution provides a tiny spring-core.jar file that can be embed-ded in any kind of application. Its only third-party dependency beyond J2SE 1.3 (plus JAXP for XML parsing) is the Jakarta Commons Logging API.The bean factory is the core of Spring and the foundation for many other services that the framework offers. Nevertheless, the bean factory can easily be used stan-dalone if no other Spring services are required.Derivative:networkSpring 框架简介Spring框架:这是一个流行的开源应用框架,它可以解决很多问题。
本科毕业设计(论文)外文翻译译文
本科毕业设计(论文)外文翻译译文学生姓名:院(系):油气资源学院专业班级:物探0502指导教师:完成日期:年月日地震驱动评价与发展:以玻利维亚冲积盆地的研究为例起止页码:1099——1108出版日期:NOVEMBER 2005THE LEADING EDGE出版单位:PanYAmericanYEnergyvBuenosYAiresvYArgentinaJPYBLANGYvYBPYExplorationvYHoustonvYUSAJ.C.YCORDOVAandYE.YMARTINEZvYChacoYS.A.vYSantaYCruzvYBolivia 通过整合多种地球物理地质技术,在玻利维亚冲积盆地,我们可以减少许多与白垩纪储集层勘探有关的地质技术风险。
通过对这些远景区进行成功钻探我们可以验证我们的解释。
这些方法包括盆地模拟,联井及地震叠前同时反演,岩石性质及地震属性解释,A VO/A V A,水平地震同相轴,光谱分解。
联合解释能够得到构造和沉积模式的微笑校正。
迄今为止,在新区有七口井已经进行了成功钻探。
基质和区域地质。
Tarija/Chaco盆地的subandean 褶皱和冲断带山麓的中部和南部,部分扩展到玻利维亚的Boomerange地区经历了集中的成功的开采。
许多深大的泥盆纪气田已经被发现,目前正在生产。
另外在山麓发现的规模较小较浅的天然气和凝析气田和大的油田进行价格竞争,如果他们能产出较快的油流而且成本低。
最近发现气田就是这种情况。
接下来,我们赋予Aguja的虚假名字就是为了讲述这些油田的成功例子。
图1 Aguja油田位于玻利维亚中部Chaco盆地的西北角。
基底构造图显示了Isarzama背斜的相对位置。
地层柱状图显示了主要的储集层和源岩。
该油田在Trija和冲积盆地附近的益背斜基底上,该背斜将油田和Ben i盆地分开(图1),圈闭类型是上盘背斜,它存在于连续冲断层上,Aguja有两个主要结构:Aguja中部和Aguja Norte,通过重要的转换压缩断层将较早开发的“Sur”油田分开Yantata Centro结构是一个三路闭合对低角度逆冲断层并伴随有小的摆幅。
毕业设计英文 翻译(原文)
编号:毕业设计(论文)外文翻译(原文)院(系):桂林电子科技大学专业:电子信息工程学生姓名: xx学号: xxxxxxxxxxxxx 指导教师单位:桂林电子科技大学姓名: xxxx职称: xx2014年x月xx日Timing on and off power supplyusesThe switching power supply products are widely used in industrial automation and control, military equipment, scientific equipment, LED lighting, industrial equipment,communications equipment,electrical equipment,instrumentation, medical equipment, semiconductor cooling and heating, air purifiers, electronic refrigerator, LCD monitor, LED lighting, communications equipment, audio-visual products, security, computer chassis, digital products and equipment and other fields.IntroductionWith the rapid development of power electronics technology, power electronics equipment and people's work, the relationship of life become increasingly close, and electronic equipment without reliable power, into the 1980s, computer power and the full realization of the switching power supply, the first to complete the computer Power new generation to enter the switching power supply in the 1990s have entered into a variety of electronic, electrical devices, program-controlled switchboards, communications, electronic testing equipment power control equipment, power supply, etc. have been widely used in switching power supply, but also to promote the rapid development of the switching power supply technology .Switching power supply is the use of modern power electronics technology to control the ratio of the switching transistor to turn on and off to maintain a stable output voltage power supply, switching power supply is generally controlled by pulse width modulation (PWM) ICs and switching devices (MOSFET, BJT) composition. Switching power supply and linear power compared to both the cost and growth with the increase of output power, but the two different growth rates. A power point, linear power supply costs, but higher than the switching power supply. With the development of power electronics technology and innovation, making the switching power supply technology to continue to innovate, the turning points of this cost is increasingly move to the low output power side, the switching power supply provides a broad space for development.The direction of its development is the high-frequency switching power supply, high frequency switching power supply miniaturization, and switching power supply into a wider range of application areas, especially in high-tech fields, and promote the miniaturization of high-tech products, light of. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.classificationModern switching power supply, there are two: one is the DC switching power supply; the other is the AC switching power supply. Introduces only DC switching power supply and its function is poor power quality of the original eco-power (coarse) - such as mains power or battery power, converted to meet the equipment requirements of high-quality DC voltage (Varitronix) . The core of the DC switching power supply DC / DC converter. DC switching power supply classification is dependent on the classification of DC / DC converter. In other words, the classification of the classification of the DC switching power supply and DC/DC converter is the classification of essentially the same, the DC / DC converter is basically a classification of the DC switching power supply.DC /DC converter between the input and output electrical isolation can be divided into two categories: one is isolated called isolated DC/DC converter; the other is not isolated as non-isolated DC / DC converter.Isolated DC / DC converter can also be classified by the number of active power devices. The single tube of DC / DC converter Forward (Forward), Feedback (Feedback) two. The double-barreled double-barreled DC/ DC converter Forward (Double Transistor Forward Converter), twin-tube feedback (Double Transistor Feedback Converter), Push-Pull (Push the Pull Converter) and half-bridge (Half-Bridge Converter) four. Four DC / DC converter is the full-bridge DC / DC converter (Full-Bridge Converter).Non-isolated DC / DC converter, according to the number of active power devices can be divided into single-tube, double pipe, and four three categories. Single tube to a total of six of the DC / DC converter, step-down (Buck) DC / DC converter, step-up (Boost) DC / DC converters, DC / DC converter, boost buck (Buck Boost) device of Cuk the DC / DC converter, the Zeta DC / DC converter and SEPIC, the DC / DC converter. DC / DC converters, the Buck and Boost type DC / DC converter is the basic buck-boost of Cuk, Zeta, SEPIC, type DC / DC converter is derived from a single tube in this six. The twin-tube cascaded double-barreled boost (buck-boost) DC / DC converter DC / DC converter. Four DC / DC converter is used, the full-bridge DC / DC converter (Full-Bridge Converter).Isolated DC / DC converter input and output electrical isolation is usually transformer to achieve the function of the transformer has a transformer, so conducive to the expansion of the converter output range of applications, but also easy to achieve different voltage output , or a variety of the same voltage output.Power switch voltage and current rating, the converter's output power is usually proportional to the number of switch. The more the number of switch, the greater the output power of the DC / DC converter, four type than the two output power is twice as large,single-tube output power of only four 1/4.A combination of non-isolated converters and isolated converters can be a single converter does not have their own characteristics. Energy transmission points, one-way transmission and two-way transmission of two DC / DC converter. DC / DC converter with bi-directional transmission function, either side of the transmission power from the power of lateral load power from the load-lateral side of the transmission power.DC / DC converter can be divided into self-excited and separately controlled. With the positive feedback signal converter to switch to self-sustaining periodic switching converter, called self-excited converter, such as the the Luo Yeer (Royer,) converter is a typical push-pull self-oscillating converter. Controlled DC / DC converter switching device control signal is generated by specialized external control circuit.the switching power supply.People in the field of switching power supply technology side of the development of power electronic devices, while the development of the switching inverter technology, the two promote each other to promote the switching power supply annual growth rate of more than two digits toward the light, small, thin, low-noise, high reliability, the direction of development of anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, AC / AC DC / AC, such as inverters, DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardization, and has been recognized by the user, but AC / DC modular, its own characteristics make the modular process, encounter more complex technology and manufacturing process. Hereinafter to illustrate the structure and characteristics of the two types of switching power supply.Self-excited: no external signal source can be self-oscillation, completely self-excited to see it as feedback oscillation circuit of a transformer.Separate excitation: entirely dependent on external sustain oscillations, excited used widely in practical applications. According to the excitation signal structure classification; can be divided into pulse-width-modulated and pulse amplitude modulated two pulse width modulated control the width of the signal is frequency, pulse amplitude modulation control signal amplitude between the same effect are the oscillation frequency to maintain within a certain range to achieve the effect of voltage stability. The winding of the transformer can generally be divided into three types, one group is involved in the oscillation of the primary winding, a group of sustained oscillations in the feedback winding, there is a group of load winding. Such as Shanghai is used in household appliances art technological production of switching power supply, 220V AC bridge rectifier, changing to about 300V DC filter added tothe collector of the switch into the transformer for high frequency oscillation, the feedback winding feedback to the base to maintain the circuit oscillating load winding induction signal, the DC voltage by the rectifier, filter, regulator to provide power to the load. Load winding to provide power at the same time, take up the ability to voltage stability, the principle is the voltage output circuit connected to a voltage sampling device to monitor the output voltage changes, and timely feedback to the oscillator circuit to adjust the oscillation frequency, so as to achieve stable voltage purposes, in order to avoid the interference of the circuit, the feedback voltage back to the oscillator circuit with optocoupler isolation.technology developmentsThe high-frequency switching power supply is the direction of its development, high-frequency switching power supply miniaturization, and switching power supply into the broader field of application, especially in high-tech fields, and promote the development and advancement of the switching power supply, an annual more than two-digit growth rate toward the light, small, thin, low noise, high reliability, the direction of the anti-jamming. Switching power supply can be divided into AC / DC and DC / DC two categories, the DC / DC converter is now modular design technology and production processes at home and abroad have already matured and standardized, and has been recognized by the user, but modular AC / DC, because of its own characteristics makes the modular process, encounter more complex technology and manufacturing process. In addition, the development and application of the switching power supply in terms of energy conservation, resource conservation and environmental protection are of great significance.The switching power supply applications in power electronic devices as diodes, IGBT and MOSFET.SCR switching power supply input rectifier circuit and soft start circuit, a small amount of applications, the GTR drive difficult, low switching frequency, gradually replace the IGBT and MOSFET.Direction of development of the switching power supply is a high-frequency, high reliability, low power, low noise, jamming and modular. Small, thin, and the key technology is the high frequency switching power supply light, so foreign major switching power supply manufacturers have committed to synchronize the development of new intelligent components, in particular, is to improve the secondary rectifier loss, and the power of iron Oxygen materials to increase scientific and technological innovation in order to improve the magnetic properties of high frequency and large magnetic flux density (Bs), and capacitor miniaturization is a key technology. SMT technology allows the switching power supply has made considerable progress, the arrangement of the components in the circuit board on bothsides, to ensure that the light of the switching power supply, a small, thin. High-frequency switching power supply is bound to the traditional PWM switching technology innovation, realization of ZVS, ZCS soft-switching technology has become the mainstream technology of the switching power supply, and a substantial increase in the efficiency of the switching power supply. Indicators for high reliability, switching power supply manufacturers in the United States by reducing the operating current, reducing the junction temperature and other measures to reduce the stress of the device, greatly improve the reliability of products.Modularity is the overall trend of switching power supply, distributed power systems can be composed of modular power supply, can be designed to N +1 redundant power system, and the parallel capacity expansion. For this shortcoming of the switching power supply running noise, separate the pursuit of high frequency noise will also increase, while the use of part of the resonant converter circuit technology to achieve high frequency, in theory, but also reduce noise, but some The practical application of the resonant converter technology, there are still technical problems, it is still a lot of work in this field, so that the technology to be practical.Power electronics technology innovation, switching power supply industry has broad prospects for development. To accelerate the pace of development of the switching power supply industry in China, it must take the road of technological innovation, out of joint production and research development path with Chinese characteristics and contribute to the rapid development of China's national economy.Developments and trends of the switching power supply1955 U.S. Royer (Roger) invented the self-oscillating push-pull transistor single-transformer DC-DC converter is the beginning of the high-frequency conversion control circuit 1957 check race Jen, Sen, invented a self-oscillating push-pull dual transformers, 1964, U.S. scientists canceled frequency transformer in series the idea of switching power supply, the power supply to the size and weight of the decline in a fundamental way. 1969 increased due to the pressure of the high-power silicon transistor, diode reverse recovery time shortened and other components to improve, and finally made a 25-kHz switching power supply.At present, the switching power supply to the small, lightweight and high efficiency characteristics are widely used in a variety of computer-oriented terminal equipment, communications equipment, etc. Almost all electronic equipment is indispensable for a rapid development of today's electronic information industry power mode. Bipolar transistor made of 100kHz, 500kHz power MOS-FET made, though already the practical switching power supply is currently available on the market, but its frequency to be further improved. Toimprove the switching frequency, it is necessary to reduce the switching losses, and to reduce the switching losses, the need for high-speed switch components. However, the switching speed will be affected by the distribution of the charge stored in the inductance and capacitance, or diode circuit to produce a surge or noise. This will not only affect the surrounding electronic equipment, but also greatly reduce the reliability of the power supply itself. Which, in order to prevent the switching Kai - closed the voltage surge, RC or LC buffers can be used, and the current surge can be caused by the diode stored charge of amorphous and other core made of magnetic buffer . However, the high frequency more than 1MHz, the resonant circuit to make the switch on the voltage or current through the switch was a sine wave, which can reduce switching losses, but also to control the occurrence of surges. This switch is called the resonant switch. Of this switching power supply is active, you can, in theory, because in this way do not need to greatly improve the switching speed of the switching losses reduced to zero, and the noise is expected to become one of the high-frequency switching power supply The main ways. At present, many countries in the world are committed to several trillion Hz converter utility.the principle of IntroductionThe switching power supply of the process is quite easy to understand, linear power supplies, power transistors operating in the linear mode and linear power, the PWM switching power supply to the power transistor turns on and off state, in both states, on the power transistor V - security product is very small (conduction, low voltage, large current; shutdown, voltage, current) V oltammetric product / power device is power semiconductor devices on the loss.Compared with the linear power supply, the PWM switching power supply more efficient process is achieved by "chopping", that is cut into the amplitude of the input DC voltage equal to the input voltage amplitude of the pulse voltage. The pulse duty cycle is adjusted by the switching power supply controller. Once the input voltage is cut into the AC square wave, its amplitude through the transformer to raise or lower. Number of groups of output voltage can be increased by increasing the number of primary and secondary windings of the transformer. After the last AC waveform after the rectifier filter the DC output voltage.The main purpose of the controller is to maintain the stability of the output voltage, the course of their work is very similar to the linear form of the controller. That is the function blocks of the controller, the voltage reference and error amplifier can be designed the same as the linear regulator. Their difference lies in the error amplifier output (error voltage) in the drive before the power tube to go through a voltage / pulse-width conversion unit.Switching power supply There are two main ways of working: Forward transformand boost transformation. Although they are all part of the layout difference is small, but the course of their work vary greatly, have advantages in specific applications.the circuit schematicThe so-called switching power supply, as the name implies, is a door, a door power through a closed power to stop by, then what is the door, the switching power supply using SCR, some switch, these two component performance is similar, are relying on the base switch control pole (SCR), coupled with the pulse signal to complete the on and off, the pulse signal is half attentive to control the pole voltage increases, the switch or transistor conduction, the filter output voltage of 300V, 220V rectifier conduction, transmitted through the switching transformer secondary through the transformer to the voltage increase or decrease for each circuit work. Oscillation pulse of negative semi-attentive to the power regulator, base, or SCR control voltage lower than the original set voltage power regulator cut-off, 300V power is off, switch the transformer secondary no voltage, then each circuit The required operating voltage, depends on this secondary road rectifier filter capacitor discharge to maintain. Repeat the process until the next pulse cycle is a half weeks when the signal arrival. This switch transformer is called the high-frequency transformer, because the operating frequency is higher than the 50HZ low frequency. Then promote the pulse of the switch or SCR, which requires the oscillator circuit, we know, the transistor has a characteristic, is the base-emitter voltage is 0.65-0.7V is the zoom state, 0.7V These are the saturated hydraulic conductivity state-0.1V-0.3V in the oscillatory state, then the operating point after a good tune, to rely on the deep negative feedback to generate a negative pressure, so that the oscillating tube onset, the frequency of the oscillating tube capacitor charging and discharging of the length of time from the base to determine the oscillation frequency of the output pulse amplitude, and vice versa on the small, which determines the size of the output voltage of the power regulator. Transformer secondary output voltage regulator, usually switching transformer, single around a set of coils, the voltage at its upper end, as the reference voltage after the rectifier filter, then through the optocoupler, this benchmark voltage return to the base of the oscillating tube pole to adjust the level of the oscillation frequency, if the transformer secondary voltage is increased, the sampling coil output voltage increases, the positive feedback voltage obtained through the optocoupler is also increased, this voltage is applied oscillating tube base, so that oscillation frequency is reduced, played a stable secondary output voltage stability, too small do not have to go into detail, nor it is necessary to understand the fine, such a high-power voltage transformer by switching transmission, separated and after the class returned by sampling the voltage from the opto-coupler pass separated after class, so before the mains voltage, and after the classseparation, which is called cold plate, it is safe, transformers before power is independent, which is called switching power supply.the DC / DC conversionDC / DC converter is a fixed DC voltage transformation into a variable DC voltage, also known as the DC chopper. There are two ways of working chopper, one Ts constant pulse width modulation mode, change the ton (General), the second is the frequency modulation, the same ton to change the Ts, (easy to produce interference). Circuit by the following categories:Buck circuit - the step-down chopper, the average output voltage U0 is less than the input voltage Ui, the same polarity.Boost Circuit - step-up chopper, the average output voltage switching power supply schematic U0 is greater than the input voltage Ui, the same polarity.Buck-Boost circuit - buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, the inductance transmission.Cuk circuit - a buck or boost chopper, the output average voltage U0 is greater than or less than the input voltage Ui, the opposite polarity, capacitance transmission.The above-mentioned non-isolated circuit, the isolation circuit forward circuits, feedback circuit, the half-bridge circuit, the full bridge circuit, push-pull circuit. Today's soft-switching technology makes a qualitative leap in the DC / DC the U.S. VICOR company design and manufacture a variety of ECI soft-switching DC / DC converter, the maximum output power 300W, 600W, 800W, etc., the corresponding power density (6.2 , 10,17) W/cm3 efficiency (80-90)%. A the Japanese Nemic Lambda latest using soft-switching technology, high frequency switching power supply module RM Series, its switching frequency (200 to 300) kHz, power density has reached 27W/cm3 with synchronous rectifier (MOSFETs instead of Schottky diodes ), so that the whole circuit efficiency by up to 90%.AC / DC conversionAC / DC conversion will transform AC to DC, the power flow can be bi-directional power flow by the power flow to load known as the "rectification", referred to as "active inverter power flow returned by the load power. AC / DC converter input 50/60Hz AC due must be rectified, filtered, so the volume is relatively large filter capacitor is essential, while experiencing safety standards (such as UL, CCEE, etc.) and EMC Directive restrictions (such as IEC, FCC, CSA) in the AC input side must be added to the EMC filter and use meets the safety standards of the components, thus limiting the miniaturization of the volume of AC / DC power, In addition, due to internal frequency, high voltage, current switching, making the problem difficult to solve EMC also high demands on the internal high-density mountingcircuit design, for the same reason, the high voltage, high current switch makes power supply loss increases, limiting the AC / DC converter modular process, and therefore must be used to power system optimal design method to make it work efficiency to reach a certain level of satisfaction.AC / DC conversion circuit wiring can be divided into half-wave circuit, full-wave circuit. Press the power phase can be divided into single-phase three-phase, multiphase. Can be divided into a quadrant, two quadrant, three quadrants, four-quadrant circuit work quadrant.he selection of the switching power supplySwitching power supply input on the anti-jamming performance, compared to its circuit structure characteristics (multi-level series), the input disturbances, such as surge voltage is difficult to pass on the stability of the output voltage of the technical indicators and linear power have greater advantages, the output voltage stability up to (0.5)%. Switching power supply module as an integrated power electronic devices should be selected。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
EIDGEN.SSISCHE TECHNISCHE HOCHSCHULE LAUSANNE POLITECNICO FEDERALE DI LOSANNASWISS FEDERAL INSTITUTE OF TECHNOLOGY LAUSANNE COMMUNICATION SYSTEMS DIVISION (SSC)CH-1015 LAUSANNE, SWITZERLANDhttp://sscwww.epfl.chIP Network Management Platforms Before the WebJean-Philippe Martin-FlatinVersion 1: July 1998Version 2: December 1998Technical Report SSC/1998/021IP Network Management Platforms Before the WebJean-Philippe Martin-FlatinEPFL-ICA, 1015 Lausanne, SwitzerlandEmail: martin-flatin@epfl.ch Fax: +41-21-693-6610 Web: http://icawww.epfl.chAbstractIn this paper, we analyze the characteristics and shortcomings of IP network managementplatforms before the arrival of Web technologies. In the first part, we give a brief history ofIP network management, and summarize the limitations of traditional (i.e., pre-Web andSNMP-based) management platforms. We recall the initial objectives of open networkmanagement. We then explain how the early vision of generic management was changed bythe industry’s natural inclination for market segmentation, and how the market of IP networksevolved from generic to vendor-specific equipment, management GUIs and MIBs. In thesecond part, we propose a simple model of traditional IP network management platforms,against which new Web-based management solutions can be compared. We introduce thethree core functions of such platforms (network monitoring, data collection, and eventhandling), distinguish regular management from ad hoc management, and explain howSNMP’s polling model maps onto these functions.Keywords: SNMP, Open Network Management, Network Monitoring, Data Collection,Event Handling.1. IntroductionThe attraction of Web technologies has proved irresistible in many segments of the software industry.In IP network management, people began writing HTML forms and CGIscripts as early as 1993-94.These new technologies were typically used to standardize and automate problem reporting, or toreplace print-outs of network usage reports with electronic equivalents. In 1995-96, vendors beganexperimenting with HTTP servers and Java applets embedded in network equipment, as reported byWellens and Auerbach [26], Bruins [3], and Mullaney [20]. In 1997, many network managementplatform (NMP) vendors integrated a Web interface into their tool. In the course of 1997 and 1998,people realized that recent Web technologies — e.g., Java applets, servlets, RMI, Object Serialization,or mobile agents — could not only do differently what traditional (that is, pre-Web andSNMP-based) NMPs already did before: they also suggested new ways of collecting data, detectingfaults, or distributing the network management application, and more generally, new ways ofmanaging IP networks.The first aforementioned reasons for the success of the Web in IPnetwork management could beascribed to fashion, or to the legitimate desire of enterprises to reduce the range of competenciesneeded to run their business. But the last reason (new ways of managing networks) goes much further,and suggests that Web technologies are here to stay in IP network management, and are more likelyto become more pervasive than to fade away when a new fashion comes in.But how did we come to this point? What were the administrators missing in traditional NMPs thatthey find today in Web-based management? Why were people so pleased with open networkmanagement in the first half of the 1990s, and why do customers currently put so much pressure on1network equipment vendors to have embedded HTTP servers, embedded JVMs, and even securemobile-agent run-time environments?The main goal of this paper is to answer these questions. In section 2, we describe the characteristicsand shortcomings of traditional NMPs. By placing ourselves into an historical perspective, we showhow we came to a point where Web technologies were needed, and how expectations from administratorsevolved through the 1990s. We also highlight the fact that among the limitations that weidentified, only a fraction can be addressed by simply integrating Web browsers into NMPs.The second goal of this paper is to give a simple model of NMPs, to serve as a reference to which newmodels can be compared. This model is depicted and explained in detail in section 3. It is used inparticular in two companion papers [14, 15], where we introduce the push and pull models inWeb-based network management.2. A Brief History of IP Network Management Before the WebIn this section, we give a brief history of IP network management before the Web. We explain theinitial vision of an open market with generic tools, show how it evolved toward captive markets withvendor-specific tools, and study what the consequences of the advent of Windows-based NMPs werein a market so far dominated by Unix.2.1. An open market with generic toolsIn 1990-91, when NMPs1 started to sell by the thousand, many people had a vision of open systemsand generic network equipment. Unix systems were widely deployed in academia; in the industry,they nearly wiped out mini-computers for scientific work. Proprietary network equipment wasgradually replaced with third-party equipment—that is, to interconnect hosts from vendor X, you nolonger had to buy routers or bridges from the same vendor X. SNMP compliance became acommercial argument, often mandated by customers. High heterogeneity was considered a goodthing, because it allowed substantial financial savings by choosing systematically the best buy of theday: if a network administrator wanted to purchase an IP router today, he would select, say, Cisco,whereas tomorrow he would buy 3Com, as a sheer result of unbiased competition in an open market.Putting a whole network together was as simple as using Lego: generic IP routers, bridges, hubs orFDDI concentrators were interchangeable, just as open systems (i.e., Unix hosts) were—more or less.Very naturally, this vision was reflected in the management of this equipment: NMPs evolved fromproprietary solutions, where a vendor would support only its own equipment (e.g., the first release ofSunNet Manager could only manage Sun workstations), to open platforms (e.g., Lexcel’s Lance+),which offered generic GUIs to manage all routers alike, all hubs alike, etc.In those days, the goal was to hide vendor-specific features from operators, who spent their timemonitoring large networks and gazing at GUIs. Any interface of any IP router, or any port of any hub,could be reset the same way. Traffic monitoring was independent of the brand of the equipmentmonitored. Operators resented the idea of having to master dozens of GUIs and dozens of ways of1.A network management platform encompasses a Network Management Station (NMS)—characterized by a givenhardware and a given operating system (e.g. a Sun UltraSparc workstation running Solaris 2.6, or a Compaq Pentium IIPC running Windows NT 4.0)—and management software (e.g. Cabletron Spectrum or HP OpenView). For detailsabout the terminology used in this tutorial, see Martin-Flatin et al. [13].2managing network devices: the physical heterogeneity had to be masked by an apparent homogeneity,in the logical view of a device offered by a management GUI.This vision of IP network management was also shared and promoted by the IETF, who issued anumber of generic MIBs: MIB-II [17] was released in March 1991, the Token Ring MIB [16] in May1991, the RMON MIB [25] in November 1991, the FDDI MIB [4] in January 1992, the Hub MIB [18]in October 1992, etc. This effort from the IETF went on for several years.2.2. Problems with early network management platformsOver time, this vision of openness, and the very concept of genericity (generic equipment managedvia generic GUIs using generic MIBs), did not resist the market reality. The main problems whichwere encountered were the hidden costs of heterogeneity, the limitations of generic MIBs, thevendors’desire to secure niche markets, and the inexperience of new customers.First, customers discovered the hard way that genericity in network equipment is confined tobottom-of-the-range niche markets, such as print servers or terminal servers. But there is no such athing as a generic router, because vendors endeavor to differentiate their offer from the competition—especially for expensive equipment such as routers that sustain the backbone of a LAN. So, forcustomers, the cost of training staff to manage equipment from different vendors, added to the cost ofmaintaining and debugging so many different network devices, quickly turned into a nightmare. Theindustrial reality proved that, over time, the extra costs ascribable to the heterogeneity of the networkequipment often outweigh the immediate financial benefits of going for the best buy of the moment.Second, vendors were not happy with such fierce competition that cut down their margins significantly.They were not happy either with the concept of generic equipment, which reduced theirchances to differentiate their offer from the competition, and thereby justify a higher price for betterequipment. So they looked for ways to segment this open market into multiple captive markets.Third, vendors and customers alike were dissatisfied with the slow pace of the IETF Working Groupsresponsible for issuing generic MIBs. Several MIBs, especially those related to systems management,were released rather late, including the Host MIB [7] in September 1993, the Mail MIB [11] inJanuary 1994, the UPS (Uninterruptible Power Supply) MIB [5] in May 1994, the Modem MIB [1]and the RDBMS MIB [2] in August 1994, etc.Fourth, generic MIBs could not stand the comparison with interactive command line interfaces: theytended to be the least common denominator between all existing interfaces, because the IETF did notwant to appear to favor one vendor over another, and because it could not keep up with the paceimposed by the vendors in a highly competitive market. As a result,administrators and operatorscould do with SNMP only a fraction of what they could do via a terminal directly attached to thenetwork equipment, or via a telnet session. To give a concrete example, security was notstandardized in router management like traffic statistics were in MIB-II. So, although most IP routervendors soon supported per-interface access control lists, no generic MIB allowed to manage themwith SNMP.Consequently, vendors looked for a way to work around the concept of generic network equipment,in order to increase their revenue, better satisfy their customers, and attract new customers. Andundeniably, they succeeded in splitting this large open market of IP network management into amosaic of smaller, captive markets.32.3. Captive markets with vendor-specific toolsThe answer to all these concerns came in the form of vendor-specific MIBs: vendors developed theirown MIBs to manage their own equipment. These proprietary MIBs were richer and more comprehensivethan the generic MIBs then specified by the IETF. They covered most if not all of theinteractive command line interface, whereas generic MIBs covered only a fraction of it. Thisaddressed the fourth issue raised in the previous section. Vendors were also in complete control oftheir own MIBs, so they could update them at a faster pace than the IETF (e.g., there were threereleases of the Cisco MIB between 1991 and 1995). This tackled the third issue.In order to help their customers manage their network equipment, vendors developed vendor-specificmanagement GUIs, and even device-specific management GUIs, which relied heavily, if notexclusively, on their proprietary MIBs. These GUIs were initiallyintegrated into stand-alonemanagement applications, which were sold separately, and generally run on middle-range PCs. Butmany customers had to manage heterogeneous networks, and did not want to run multiplemanagement applications in parallel. This also defeated one of the purposes of integrated networkmanagement: to be able to manage all network equipment from a single NMP. Instead, customerswanted vendors to integrate vendor-specific management GUIs into their favorite NMP. So they did.Peer-to-peer agreements were signed between NMP vendors and network equipment vendors, whichallowed the latter to integrate their proprietary GUIs into existing NMPs. These GUIs were calledadd-ons, because they were optional extensions of the management platforms.Vendor-specific management GUIs gave vendors the opportunity to gain a commercial edge on thecompetition: the quality of these GUIs became a valuable commercial argument for salespeople.Management GUIs evolved to look like the real devices, a feature that operators—and often administrators—came to cherish. Beside the marketing argument that their network equipment supportedgeneric MIBs, a warrant of their openness, vendors also put forward the fact that this equipment couldbe managed with user-friendly and intuitive add-ons, e.g. CiscoWorks by Cisco. Technically, thesetwo arguments were actually opposed; nonetheless, salespeople used them side by side, andsuccessfully.The peer-to-peer agreements that we mentioned above progressively reshaped the entire landscape ofIP network management, by introducing a bias which seriously shook the concept of “open”management. They were based on market shares, business relationships, and mutual commercialinterests. And the bias was that some business partners became more equal than others, to put it in anorwellian way.As far as network equipment vendors were concerned, small companies (especially start-ups) foundit very difficult to sign any agreement at all with NMP vendors. They had small market shares, andthey did not bring in new customers or new revenue, so they were of no interest to large NMP vendors.For these small companies, the best strategy was to find one large customer willing to pay the highprice for the integration of a management GUI into its current NMP (especially to manage cuttingedge equipment)... but such customers were difficult to find. Large equipment vendors, conversely,had no problem to integrate their GUIs into any NMP: their names even appeared on the bookletsadvertising these NMPs. But the timeliness of this integration depended to a large extent on the qualityof the business partnership between the equipment and the NMP vendors. Between the time a newequipment was put on the market and the time its management GUI could be integrated in a givenNMP, it could take several weeks, or two months, or six months...As far as customers were concerned, gone were the days of open systems, generic MIBs and NMPsable to manage any network equipment. Gradually, they became prisoners of their NMP or theirvendor-specific add-ons.For customers managing small networks, the relative cost of the NMP was high, compared to the totalprice of their network equipment. To put it simply, they had two options: they could abide by the rulesset by their NMP vendor, and get flashy GUIs in a timely manner from one of its “friends”; or theycould take the dangerous route of a start-up company, and try to live with user-unfriendly MIBbrowsers, additional NMSs, and dissatisfied operators. In practice, in most business settings, they hadno choice.For customers managing large networks, the problem was not so much their NMP as the heterogeneityof their network equipment. They could afford another NMP, if reallyneeded, but they were prisonersof their existing equipment suppliers, and especially their vendor-specific add-ons. Companies couldrealistically train operators to master a few dozens GUIs, but they could not ask them to know severalhundred. Similarly, administrators could not be expected to manage an infinitely large number ofdifferent systems. Consequently, companies could not afford to have too many suppliers for theirnetwork equipment. When a network administrator wanted to buy a device of a certain type, for whichhe/she already had one or two suppliers, he/she would always select one of these suppliers, and wasprepared to pay a higher price for it than that of the competitors.Whatever the size of their network, customers could no longer pull the prices down as much as theycould in the past. Competition had been hampered: the IP network management market had entered alogic of captive markets. Vendors had managed to address the second issue raised in section 2.2, thatis, secure niche markets exposed to little competition.Proprietary MIBs and GUIs were initially resisted by many experienced customers, who knew thedrawbacks of captive markets. But from 1992-93, they were quickly adopted by new customers,perhaps more na.ve, who did not realize that by doing so, they were contributing to the segmenting ofthe open market of SNMP into a multitude of captive markets. In other words, they were wreckingthe very reason why they had come to SNMP in the first place: its openness. SNMP was no longer anopen protocol supporting open management in an open market: it had become an open protocolsupporting proprietary management in a mosaic of captive markets. The sole stable guarantees ofopenness were the use of third-party NMPs, and the conformance to one of the SNMP managementframeworks (SNMPv1, SNMPv2, SNMPv3).To be fair, captive markets were not only bad news for customers. Admittedly, they induced higherpurchase costs for customers. But they also lowered the training cost ofstaff (administrators andoperators), and they significantly simplified the maintenance of the network equipment. Indeed,although they were created primarily by vendors for their own sake, captive markets also suitedcustomers in some respects, and, in particular, addressed the first issue raised above.Peer-to-peer agreements between NMP and network equipment vendors had an even greater impacton the NMPs market. As far as NMP vendors were concerned, the major players knew that they werea must for large network equipment vendors. They did not have to spend much money for all majorequipment vendors to port their management GUIs onto their NMP. But smaller players were progressivelyleft out. The less customers an NMP vendor had, the less chances its NMP would have to raiseinterest from equipment vendors. By snowball effect, smaller players were initially supported onemonth later than the bigger players, then six months later, and one day, they were not supported at all.If customers wanted to manage a piece of equipment with an NMP that had only gained a small market5share, they were charged for its development... a strong deterrent indeed! For small equipmentvendors, as we saw, the situation was also bad; but at least they had a workaround: customers couldmanage their equipment with a dedicated PC, directly attached to the equipment. Things were muchworse for small NMP vendors: without peer-to-peer agreements, they could not survive.As a result, these agreements caused the number of actors in the NMPs market to reduce drastically.During the years 1993-95, minor players gave up this market, one after the other, and only four NMPvendors managed to retain a significant market share: HP with OpenView, Sun with SunNet Manager(which later became Solstice), Cabletron with Spectrum, and IBM with NetView. These platformsstill dominate the IP network management market today. Interestingly enough, only one of these fourcompanies came from the networking industry, while the three others came from the computingindustry. The reason was that third-party management software appeared to be a guarantee ofimpartiality and openness. A company like HP was more trustworthy when it claimed to manage allnetwork equipment alike, whatever its vendor, than the heavy weights of the networking industry likeCisco or 3Com, who had too many business interests at stake1.The only type of peer-to-peer agreement we considered so far involved NMP and network equipmentvendors. But another type of agreement soon appeared. NMPs initially relied on a single solution tostore management data; this could be a proprietary database (like HP OpenView in its early days), athird-party DBMS (relational or object-oriented), or a directory tree of text files. But large customersoften had an RDBMS in their intranet; they had already spent fortunes on training its administrators,and were very reluctant to use another DBMS; so they asked NMP vendors to support their existingRDBMSs. Unfortunately, although all RDBMSs spoke SQL, they all offered different APIs (therewas no mature ODBC in those days), and the cost of porting from one RDBMS to another was highfor NMP vendors. This problem appeared to be solved when peer-to-peer agreements began to besigned by NMP and DBMS vendors. But unlike what happened with NMP and network equipmentvendors (all major NMPs soon supported all major equipment vendors, and vice versa), the proportionof agreements that were actually signed by NMP and DBMS vendors remained fairly low, comparedto the number of actors on these markets. In 1995-96, just before the days of Web-based management,Cabletron still supported only a proprietary OODBMS, whereas HP, Sun and IBM supported only oneor two major RDBMSs (Oracle, Sybase, Informix, Ingres). As most customers could not afford to buya new DBMS for the sole purpose of network management, they often resorted to storing managementdata into text files, and writing ad hoc scripts to exploit this data.2.4. The move from Unix-based to Windows-based network management platformsBefore the Web came into the game, a last change occurred in the IP network management market.As this market had gained the reputation of being mature, in 1993-94, many small to medium-sizedenterprises (SMEs) decided to make a move toward SNMP-based network management. But for thesecompanies, an expensive NMS running expensive software was simply not an option: there had to bean inexpensive way to manage their relatively small networks. Operators were also out of thequestion: these companies could not afford staff monitoring constantly the health of their network,which generally consisted of a fairly small LAN, with possibly just a few WAN links. Networkmanagement was entirely the responsibility of the network administrator, who was managing thenetwork on an ad hoc basis (typically when a problem showed up, that is, troubleshooting rather than1.In the PC market, a similar conflict of interests exists between Microsoft vendor of the Windows operating system,Microsoft vendor of applications for Windows, and third-party vendors of applications for Windows. Is Microsofttrustworthy when it claims that Windows treats all applications alike?6monitoring), and did not require permanent access to an NMS. Finally, Unix was generally not anoption either, as SMEs were mostly equipped with PCs and Mac’s, and often lacked Unix expertise.In order to take on this new market, which was all the more attractive since the market of largernetworks was almost fully equipped, NMP vendors came up with so-called “light” versions of theirsoftware. They were “light” in the sense that they were less demanding in terms of CPU, memory anddisk resources, they did not offer all the functionalities of the Unix-based NMPs (e.g., no RDBMS tostore polled data), and they were less expensive. These were not as inexpensive as customers werehoping for, but they could easily run on middle-range PCs, and they could run under Windows. As amatter of fact, by 1996, with the significant increase in the power of PCs and the generalization ofWindows NT in enterprises (that is, a clean and stable operating system a la Unix, which did notrepeatedly crash like Windows 3.1), there were no longer any functionality differences betweenUnix-based and Windows-based NMPs.This evolution enlarged the network management market significantly. But it also indirectly made thedevelopment costs for network equipment vendors skyrocket: not only did they have to integrate theirdevice-specific GUIs into all major Unix-based NMPs, they also had to support these NMPs undernew operating systems: Windows 3.1, Windows 95, Windows 98, Windows NT 3.x, Windows 4.x...2.5. Problems with traditional network management platformsTo summarize the shortcomings of IP network management before the Web, customers had threegrievances: (i) they sought less expensive solutions, in terms of both hardware and software; inparticular, they did not want to have dedicated hardware to manage small networks; (ii) they wantedto be able to store management data in whatever RDBMS they happened to own, and did not want tobe constrained by peer-to-peer agreements signed or not signed between NMP and RDBMS vendors;(iii) those who were supporting a Unix system for the sole purpose of network management wantedto use a PC or a Mac instead, since this kind of expertise was ubiquitous in enterprises; but they didnot want to buy a new and expensive NMP for that.Network equipment vendors were primarily dissatisfied by the huge cost they had to bear to supporta myriad of device-specific GUIs running on all existing hardware and operating systems. They alsoshared two concerns with customers. First, they wanted to reduce the time-to-market ofvendor-specific management GUIs. Ideally, they wanted any network equipment to be manageablevia a nice GUI (that is, not a mere MIB browser) as soon as it was launched on the market. Start-upcompanies also wanted to have access to integrated management platforms, in order to attract morecustomers. Second, both vendors and customers needed a solution to the problem of versioning. Fromtime to time, network equipment vendors release a new version of their proprietary MIBs and GUIs.As it was not possible to upgrade all equipment and the add-ons of the NMP at the same time,customers had to live with several versions of the same MIB at the same time, either temporarily orpermanently. But many NMPs were poorly designed in this respect: some did not support multipleversions of the same MIB, while others required the administrator to enter manually, device bydevice, what version of the MIB was supported. Customers and vendors alike wanted this phase to beautomated, e.g. via some kind of MIB-discovery protocol.7In summary, we showed in section 2 how the way of managing IP networks evolved since theinception of SNMP and open network management, and how the initial vision of generic equipmentwas lost in favor of a more pragmatic, business-oriented approach leading to:. peer-to-peer agreements between vendors. captive markets for customers. vendor-specific management add-ons3. A Simple Model of Network Management Platforms Before the Web Now that we have explained how IP networks were typically managed when Web technologiesarrived in this field, let us present a simple model of how NMPs were structured before the Web. Thismodel will be used in [14, 15] as a standard against which new models, integrating Web technologies,can be compared and assessed.Traditional NMPs can all be modeled as follows:。