本科论文 3000字外文翻译
本科毕业论文外文翻译【范本模板】
本科毕业论文外文翻译外文译文题目:不确定条件下生产线平衡:鲁棒优化模型和最优解解法学院:机械自动化专业:工业工程学号: 201003166045学生姓名: 宋倩指导教师:潘莉日期: 二○一四年五月Assembly line balancing under uncertainty: Robust optimization modelsand exact solution methodÖncü Hazır , Alexandre DolguiComputers &Industrial Engineering,2013,65:261–267不确定条件下生产线平衡:鲁棒优化模型和最优解解法安库·汉泽,亚历山大·多桂计算机与工业工程,2013,65:261–267摘要这项研究涉及在不确定条件下的生产线平衡,并提出两个鲁棒优化模型。
假设了不确定性区间运行的时间。
该方法提出了生成线设计方法,使其免受混乱的破坏。
基于分解的算法开发出来并与增强策略结合起来解决大规模优化实例.该算法的效率已被测试,实验结果也已经发表。
本文的理论贡献在于文中提出的模型和基于分解的精确算法的开发.另外,基于我们的算法设计出的基于不确定性整合的生产线的产出率会更高,因此也更具有实际意义。
此外,这是一个在装配线平衡问题上的开创性工作,并应该作为一个决策支持系统的基础。
关键字:装配线平衡;不确定性; 鲁棒优化;组合优化;精确算法1.简介装配线就是包括一系列在车间中进行连续操作的生产系统。
零部件依次向下移动直到完工。
它们通常被使用在高效地生产大量地标准件的工业行业之中。
在这方面,建模和解决生产线平衡问题也鉴于工业对于效率的追求变得日益重要。
生产线平衡处理的是分配作业到工作站来优化一些预定义的目标函数。
那些定义操作顺序的优先关系都是要被考虑的,同时也要对能力或基于成本的目标函数进行优化。
就生产(绍尔,1999)产品型号的数量来说,装配线可分为三类:单一模型(SALBP),混合模型(MALBP)和多模式(MMALBP)。
外文资料翻译3000
无锡职业技术学院外文翻译The energy-conservation of freezer, with automaticallyingcontrol1 A present freezer of automatic control current situationsThough the cold storage self-control having been popularized all round, but great majority cold storages putting particular emphasis on is only a safeguard face to face , the energy conservation having increased Wenku picking up the self-adjustment and cold storage measuring and controlling, to entire system relates that under the control of seldom or. Even if another aspect, already getting the all-round universal safeguard, before actual condition in working can't admit of no sanguine, } pins up the cold storage self-control facilities having become "ear of the deaf person" even having become furnishing and decorating decorating front appearance only. The Shanghai cold storage association has done investigation in recent years to Shanghai area ammonia refrigerating system cold storage safeguard and autocontrol condition , concrete conditions has seen that are what form l shows. A spot of should inquire into a data as the leopard has reflected current cold storage self-control general situation Form what 1 shows a self-control interposes and runs status though the very good cold storage only having 5 tidal current and direction accounting for 9% of the number counting, but it is these cold storages to have represented a nowadays. With the development of electron technology, the self-control component is more and more advanced , changeable procedure controller (PLC) and the PC function are more and more strong , self-control procedure is more and more perfect, system optimization and the energy conservation consciousness are also more and more strong. The cold storage energy conservation and the autocontrol relation are more and more rapid and intense , need the cold storage energy conservation to be ready for and composing much better, do well in and be engaged in better the autocontrol vitally needing right away. Above-mentioned example adopted by five cold storages representing tidal current in the nowadays and advanced level has all got the pretty important effect to realizing cold storage energy conservation.2 How be ready for cold storage energy conservation autocontrolFundamental above-mentioned content starting point is the cold storage taking ammonia as all together style refrigeration working medium refrigerating system , is that refrigeration working medium decentralization, allows all together style , all together style refrigerating system cold storage to have got very big development , whose self-control degree overtops also sometimes the all together style refrigerating system cold storage taking ammonia as refrigeration working medium on behalf of a hydrocarbon with the thick gravy nowadays. Many working mediums are unlike cold storage of system of all kinds extensive use, content having enriched cold storage autocontrol tremendously, application in energy conservation at the same time also has provided the vast scope for one's ability to autocontrol in the cold storage.2.1 Cold storage energy conservation autocontrolCold storage energy conservation autocontrol is energy conservation under the control of procedure establishment and self-control component selecting and using from the content coming to study the autocontrol developing cold storage energy conservation's relates that mainly whom.The firm, special field designing institute or capable unit as self-control component may assume cold storage energy conservation autocontrol research and develop equally. The firm and the designing institute make a contribution to some extent without exception already by now within that field. Cold storage energy conservation autocontrol can be developed exploitation commonly by firm and designing institute best (not bad firm give first place to, the designing institute coordinates) , perfects in the process of putting into effect using an unit the new product getting into form and grinding unceasingly to get rich.2.2 Energy conservation autocontrol specific items design prepares a cold storage putting composition into practice.That a specific items energy conservation autocontrol's puts process into practice sometimes is that the purpose checking K amendment , reaching energy conservation until according with design demand by designing , assembling debugging , pilot run , effect is extremely. While the project requires that content is changed into a ratio to some extent, may revise K at any time satisfying a request.The cold storage energy conservation sometimes requires that the advanced refrigeration switches over to prepare , right system mates , effective the words emergency measure and strict operation manage to manage to be put into effect, be requiring that the refrigeration technician goes ahead in the basis optimizing refrigeration process design right now, know well that energy conservation needs , be tied in wedlock this project characteristic , the flow chart designing out entire cold storage energy conservation autocontrol. Ability accomplishes whose electricity self-control design according to the self-control flow chart , the electricity self-control technician , being able to wield whose professional knowledge at the same time, makes self-control technological process be simplification and an optimization more. Cold storage energy conservation is a cold storage autocontrol important component , all cold storage autocontrol is composed of refrigeration and electricity two parts content without exception , K makes cold storage energy conservation be carried out to the letter only when ability makes cold storage autocontrol come into effect in the field of two under technician's making joint efforts.3 Cold storage energy conservation autocontrol pilot run is also one very important ring , echoes the usage unit and the special field firm in the pilot run keeping close connection , uses an unit to discuss working effect , deliberates amendment measure with special field firm and.Energy conservation is one of cold storage autocontrol purpose.3.1 Adjusts storehouse temperature adjustment in the past about that the storehouse temperature and the evaporation temperature adjust the parametric storehouse of3.1.1 Storehouse temperature controlMultiple spots temperature temperature giving first place to dyadic adjustment of place, correct evaporate the temperature not sometimes doing adjustment , very difficult to reach good energy conservation effect.The ideal storehouse temperature control mode is that wind and their air-out temperature is entering parameter with the storehouse mean temperature , the air cooler moving forward , works out appropriate under the control of procedure , measures by the fact that PLC is in progress. So-called Wenku adjusts the request being able to reach energy conservation , also can satisfy the need that some storehouse high-accuracy temperature adjusts, self own but the accuracy reaching 0.250 C requires that energy conservation makes an appointment with 10% at present.3.1.2 Regard to relatively evaporate temperature higher cold right away be in no energy conservation operation statePs stop being unlike the diversity evaporates because K couplet operation can only work under evaporating the temperature with a with a systematic refrigeration compression engine evaporating the cold room of temperature temperature cold if K couplet work, with regard to relatively evaporate temperature higher cold right away be in no energy conservation operation state, should cold hot load increasingly be promoted to a higher post increasingly no energy conservation. Ought to try one's best to avoid this condition appearing. One machine reviews the cold storage method of work pair in freon refrigerating system , add the back pressure valve on time of high temperature warehouse air tube , add single check valve on time of low temperature warehouse air tube, be representative block of wood energy conservation methodof work, do not respond to encourage but suitable abolish.3.1.3 Unexpected turn of events evaporates temperature adjustmentSome one work state lower if evaporate temperature can use storehouse hot load and refrigerating system refrigerating output be parameter be in progress adjustment, then now that can reach energy conservation purpose can make energy adjustment be more rational. The sort Er Yan , refrigerating system evaporation implement and refrigeration compression engine equipment can satisfy maximal load need basically all. Load falls off but the refrigerating output can not make corresponding adjustment in time if the cold room is hot, the refrigerating output and hot load being that the refrigerating system evaporation temperature will may act in responses reduces , uses a compression engine reach a new balance burning. The lessening evaporating the temperature has increased but the refrigerating output evaporating an implement conversely but , has faced the hot load that self own cuts down taking form surely frequently opening the consequence staying. Evaporate temperature 10 C per change, electric energy about 3 ~ 5% acting in responses adding or subtracting. Be energy conservation on making system burn in another ideal balance of } if raising the evaporation temperature in time,have avoided freely not having achieved not only, having decreased by the refrigeration compression engine's frequently starts , is the energy conservation measure achieving two things at one stroke. Not changeable fundamental refrigerant rate of flow rate of flow evaporating an implement adjusts.3.1.4 Changeable rateChangeable rate of flow adjustment ammonia in the past refrigerating system; Freon system evaporates the implement refrigerant rate of flow , great majority achieve simple proportion measures. The air cooler air mass flow great majority do not measure or speed and the electric fan platform number measure only when two. This two kinds parametric rate of flow adjustment all are cold the adjustment assigning the equipment refrigerating output and storehouse temperature direct relevance , one of the content being also that the cold storage energy conservation self-control responds to in taking seriously with the storehouse.3.1.5 Fetch the warehouse taken heightSets up right under the control of accuracy and adds the storehouse temperature setting up the commodity and different storage period controlling the different storehouse , different stock out of gauge having no equal to and their under the control of accuracy request. Set off from the energy conservation angle, the storehouse temperature ought to take height not choosing low , the mild high-accuracy controlling accuracy ought to fetch the warehouse taken height , insisted to run after face to face unnecessarily low low controls as long as not affecting the commodity quality.To the cold room of many } storehouse temperature under the control of, except original storehouse temperature setting value, suitable add set up Kuwen transfinite controlling value. This pair of factors storehouse temperature adjusts deflect but premature bringing into service being able to achieve when refrigerating system needs bringing into service , incapable because of } pins up the storehouse temperature; Can not make cold according to reality that time at intervals, refrigerating system stops working untimely Ding , fully utilizes now having energy K avoid equipment or systematic frequently open Ding.3.1.6 Set up avoiding meeting high o perationInterpose avoid meeting high o operation under the control of electric power short-supplied be the universal phenomenon that current all parts of the country there exists in everywhere, huge bad especially heavy electric power of power consumption o grain is short-supplied , the electric charge o grain price differences puts into effect in a lot of city and price differences play big as early as successive steps for this purpose. Under the premise not affecting commodity mass, the cold storage is set up avoiding meeting high o peration , beneficial to the electrified wire netting cuts o repair a valley , help overall situation energyconservation on macroscopic view; Microcosmic Er Yan operation also beneficial toreducing a cold storage cost.3.2 Cold room relative humidities adjust cold room relative humidity adjustmentCold room relative humidities adjust cold room relative humidity adjustment and the temperatureadjusts the method similarity repeating description unnecessarily. But in general cold room relative humidity is in 85 ~ the relative humidity that the also a little bit cold room demands is lower than or the relative humidity higher than the be 98%, but some crops of relative humidity kind of quality warehouse being range , for instance some gases turn to obj1 = " 位" exchange the warehouse request demands 45% to be 40 ~ between 95%. During the period of high relative humidity adjustment and low relative humidity adjustment, Youyin attaches importance to energy conservation measure.3.2.1 High relative humidities adjust the adjustmentHigh relative humidities adjust the adjustment demanding the cold room to high relative humidity , are going try one's best to reduce the logarithm averages difference in temperature (2 advisable K) between the refrigerant temperature and the storehouse temperature, return refrigerating system back when being necessary but adopt to be loaded with the cold agent first; May adopt air defrosting K besides with defrosting water restoring to the storehouse. That this two measure is given by autocontrol being put into effect, is effective energy conservation method , the domestic trade headquarter has not been 20,000 tons of Long Kou City gas that the research institute designs obj1 exchange a warehouse being a very good example of one 17 }.3.2.2 Low relative humidities adjust the adjustmentLow relative humidities adjust the adjustment demanding the cold room to low relative humidity , controlling also should be ready for two aspect mainly. One is on the basis selecting and using dehumidification method and dehumidification machine stopping bringing quantity of heat into cold room to the full, hot few cold p rooms load controlling good dehumidification while procedure, reaching the relative humidity request. It's two is to avoid air current organizing the wet load controlling fever of taking now and then entering unnecessary outside; Once had the wet low one } low temperature crops kind of quality warehouse, wet load roughly accounts for about35% of plain meter { load from invading the heat within being put in storage outside.3.3 Measures about providing liquid wayDirect swelling is for liquid's expanding directly to be for liquid's being that great majority thick gravies pin up the confession liquid method that ammonia system adopts on behalf of hydrocarbon (include freon) system and }. This provides liquid method with adopt the heating power expansion valve to provide liquid in the past basically , self problem, has no way to realize the energy conservation purpose since choosing the type , adjustment and product. Electron expansion valve appearing measures combining with selecting parametric Kuwen of temperature much , can realize energy conservation operation fairly good, sort but energy conservation 10%. But the thick gravy generation hydrocarbon refrigerating system heating power expansion valve product already be commensurate to maturity and still have the special-purpose PLC Kuwen controller, for a variety of reasons, adopt extension , wait for to increase energy not yet commonly in cold storage refrigerating system. Working hot shot degree of ammonia refrigerating system evaporation implement is not big , degree of difficulty is under the control of relatively bigger , there is no at present still mature ammonia using electron to expand ? ? valve product. The system冷库节能与自动控制1 当前冷库自控现状冷库自控虽然得到了全面普及,然而大多数冷库的侧重面只是安全保护,或者还增加了温库捡测和控制,对于全系统的自动调节和冷库的节能控制还很少涉及。
论文外文文献翻译3000字左右
南京航空航天大学金城学院毕业设计(论文)外文文献翻译系部经济系专业国际经济与贸易学生姓名陈雅琼学号2011051115指导教师邓晶职称副教授2015年5月Economic policy,tourism trade and productive diversification(Excerpt)Iza Lejárraga,Peter WalkenhorstThe broad lesson that can be inferred from the analysis is that promoting tourism linkages with the productive capabilities of a host country is a multi-faceted approach influenced by a variety of country conditions.Among these,fixed or semi-fixed factors of production,such as land,labor,or capital,seem to have a relatively minor influence.Within the domain of natural endowments,only agricultural capital emerged as significant.This is a result that corresponds to expectations,given that foods and beverages are the primary source of demand in the tourism economy.Hence,investments in agricultural technology may foment linkages with the tourism market.It is also worth mentioning that for significant backward linkages to emerge with local agriculture,a larger scale of tourism may be important. According to the regression results,a strong tourism–agriculture nexus will not necessarily develop at a small scale of tourism demand.It appears that variables related to the entrepreneurial capital of the host economy are of notable explanatory significance.The human development index(HDI), which is used to measure a country's general level of development,is significantly and positively associated with tourism linkages.One plausible explanation for this is that international tourists,who often originate in high-income countries,may feel more comfortable and thus be inclined to consume more in a host country that has a life-style to which they can relate easily.Moreover,it is important to remember that the HDI also captures the relative achievements of countries in the level of health and education of the population.Therefore,a higher HDI reflects a healthier and more educated workforce,and thus,the quality of local entrepreneurship.Related to this point,it is important to underscore that the level of participation of women in the host economy also has a significantly positive effect on linkages.In sum, enhancing local entrepreneurial capital may expand the linkages between tourism and other sectors of the host country.Formal institutions and their regulatory control of the market,proxied by the size of the government and price controls,were not found to have significant effects on linkages formation.Despite the importance of democratic governance,this was not identified as a key determinant either.On the other hand,the significance of informal institutions accords with the clustering dynamics inherent in tourism,in which linkages are formed on the basis of self-enforcing“relations-based”governance.Also,informal structures cost less than formal,rules-driven institutional frameworks for entrepreneurship.Therefore,highly formalized regulations can deter the spontaneous and cost-driven coordination among potential local suppliers and the potential buyers of the tourism economy.One type of formal institutions that does matter is policing and vigilance.As would be expected,the results show that countries with higher incidence of violence or crime are significantly associated with lower levels of tourism linkages.Indeed, the coordination of providers in tourism clusters depends fundamentally on trust among local entrepreneurs and trust can hardly flourish in an environment characterized by social conflict.Equally important,the perception of violence on the part of tourists and hotels will dissuade tourists from venturing beyond the safe boundaries of the“enclave”hotel resort.Finally,hotel managers and other foreign investors in the tourism economy will be less inclined to maintain productive relations with the host economy in the absence of predictability and stability. Therefore,investments in institutions that maintain safety and a perception of safety,in the host economy appear critical for spawning coordination.While all country domains may be playing a role in fostering or hindering linkages, the business environment seems to exert an overriding influence on linkages.After controlling for a country's natural endowments,level of development,and institutional maturity,the business environment on its own explains almost20%of cross-country variations in linkages.In particular,the level of corporate taxes in the host economy is associated with the most significant adverse effect on the formation of linkages,in conformity with the lower-cost motivation underlying tourism-led linkage creation.Also,a widespread usage of internet is alsosignificantly associated with a positive effect in the ability of suppliers to orchestrate coordination in tourism linkages.Moreover,the results suggest that there could be a role for government in improving trade facilitation and reducing transportation costs.Also,maintaining an open trade regime seems to be critical for the emergence of linkages.This underscores the importance of not protecting inefficient economic activities and opening potential products for tourism demand to competition.Although trade barriers may indeed serve to prod investors in the tourism economy to procure domestic goods, they will also hinder the competitiveness of local producers.Shielded from imports, local producers will not have the incentives to meet the international quality standards of the products needed by the tourism economy.Yet,quality expectations, possibly more so than costs,will likely inform the procurement decisions of the tourism economy.Concerning the relative magnitude of the effects of the different domains on linkages,the business environment and trade regulations stand out.The independent contributions of these domains,that is their ability to explain variations in the dependent variable when no controls for other domains are applied,amount to53%and 43%,respectively.The level-of-development domain follows with25%explanatory power,while the domains covering institutions and endowments provide an independent contribution of23%each.The implications of the analysis should be considered in light of its limitations. Causal direction cannot be fully substantiated,because we use a cross-sectional approach due to data limitations.In the absence of time-series for the variables at hand,it is not possible to test for causation.While the explanatory variables concerning natural endowments are exogenous,some of the other explanatory variables could potentially be subject to reverse causality.That said,there do not seem to be a priori strong conceptual reasons that would lead us to believe that the degree of tourism linkages critically affects trade policy,the quality of institutions, and other variables of our model.Moreover,the risk of encountering problems of reverse causality is mitigated by the observation that several longitudinal studies have established a causal relationship that runs from higher levels of economic development Eugenio-Martin et al.(2008)or a better business environment(Barrowclough,2007and Selvanathan et al.,2009)to the development of the tourism sector,rather than the other way around.Finally,the construction of the dependent variable as a ratio of indirect to direct tourism expenditure makes the reverse causality hypothesis less compelling. While it might be expected that an expansion of the tourism sector that increases total revenues and employment opportunities might have an impact on the explanatory variables,it is less evident that a change in the composition of tourism revenues, as implied by a change in the LINK variable,would have such an effect.That said, the confidence in our findings would clearly be further enhanced,if supported by results from future studies based on longitudinal designs.The scientific environmental ethics plays a key role in the recognition of the human—environment interactions.Modern environmental ethics is the philosophical rethinking of modern human race environmental behavior.The development of environmental ethics theory as well as its application in reality.determines the viewpoints of environmental ethics.Sustainable development implies harmony on human-environment interactions and intergeneration responsibility,with emphasis on a harmonious relationship among population,resources,environment and development,so as to lay a sustainable and healthy foundation of resources and environment for future generations.The harmonious society construction in China that is raised by the Chinese central government should be covered by environmental ethics.The connotation of open environmental ethics includes a respect for nature.care for the individual human race.and respect for the development of future generations,which means giving consideration to natural values.individual and human race benefits and welfare across generations.The role of environmental ethics in regional development consists of cognition,criticism,education,inspiration,adjusting,legislation and promoting environmental regulations.The major problems in regional development are extensive resource exploration,fast population growth irrational,industrialstructure.Unfair welfare distribution and the twofold effects of science and technology development.The formulation of environmental ethics that aims at regional sustainable development,can not only harmonize the relationship of population,resource,environment and economic development,but also guide behavior selection,push social and political system transformation.strengthen the legal system,and raise environmental awareness of the public.Human races face severe global challenges in resources,environment,population and poverty.To solve these problems science and technology should be developed on one hand,and human-environment interactions should be adjusted on the other hand.Modem environmental ethics is the philosophical review on modem human race environmental behavior.Environmental ethics can be a view point as the moral perception of the relationship between humankind and nature in general.The keystone of sustainable development is on harmonious human.environment interactions.with an emphasis on sustainable environmental ethics.Environmental ethics and sustainable development are key issues in the study of man.1and system,as well as a precondition to regional development(Zheng,2005a).Though there exists theoretical divergence in different environmental ideologies.some general understandings can also be obtained:human races are the only ethical agents on earth;the essence of the environmental crisis is a cultural and value crisis;future generations have the same right as current generations,especially on survival space;differences should be made between human race and other entities on earth,at the same time they are an undivided union;the capability of the earth is limited.Based on the above general understandings.it is possible to form a more open and sustainable environmental ethics.A more open and sustainable environmental ethics has some special connections.To respect and treat nature friendly means to acknowledge the value and right of nature,that is to say,minimum hurt criterion,basic benefit criterion and fair compensation criterion should be followed.To pay attention to both individuals and mankind should follow justice criterion,equity criterion and cooperation criterion.To have futuregeneration in mind Should follow responsibility criterion,saving criterion,and cautiousness criterion(Wang,2003;Wang,2004a).The conclusion to be drawn from the above is to give attention to both human race and natural value.to both individual and mankind’s benefit。
浙江大学本科毕业论文外文文献翻译
核准通过,归档资料。
未经允许,请勿外传!浙江大学本科毕业论文外文文献翻译The influence of political connections on the firm value of small and medium-sized enterprises in China政治关联在中国对中小型企业价值的影响1摘要中小型企业的价值受很多因素的影响,比如股东、现金流以及政治关联等.这篇文章调查的正是在中国政治关联对中小型企业价值的影响。
通过实验数据来分析政治关联对企业价值效益的影响.结果表明政府关联是关键的因素并且在中国对中小型企业的价值具有负面影响。
2重要内容翻译2。
1引言在商业界,有越来越多关于政治关联的影响的经济研究。
它们发现政治关联能够帮助企业确保有利的规章条件以及成功获得资源,比如能够最终提高企业价值或是提升绩效的银行贷款,这种政治关联的影响在不同的经济条件下呈现不同的效果。
在高腐败和法律制度薄弱的国家,政治关联对企业价值具有决定性因素1的作用.中国由高度集权的计划经济向市场经济转变,政府对市场具有较强的控制作用,而且有大量的上市企业具有政治关联。
中小型企业发展的很迅速,他们已经在全球经济环境中变得越来越重要。
从90年代起, 政治因素对中国的任何规模的企业来说都变得越来越重要,尤其是中小型企业的价值。
和其他的部门相比较,中小型企业只有较小的现金流,不稳定的现金流且高负债率.一方面,中小型企业改变更加灵活;另一方面,中小型企业在由于企业规模以及对银行来说没有可以抵押的资产,在筹资方面较为困难。
企业如何应对微观经济环境和政策去保证正常的企业活动,并且政治关联如何影响企业价值?这篇论文调查政治关联和企业价值之间的联系,并且试图去研究企业是否可以从政治关联中获利提升企业价值。
2.2定义这些中小型企业之所以叫中小型企业,是和管理规模有关。
对这些小企业来说,雇员很少,营业额较低,资金一般由较少的人提供,因此,通常由这些业主直接管理企业。
本科毕业论文外文翻译
本科毕业论文外文翻译Undergraduate Thesis External Translation (700 Words)Title: The Impact of Social Media on Consumer Behavior Abstract:With the rapid development of social media, its influence on consumer behavior has drawn increasing attention from scholars and marketers. This paper aims to explore the impact of social media on consumer behavior from the perspective of information acquisition, interpersonal communication, and brand evaluation. Through a literature review and analysis, it is found that social media has a significant impact on consumer behavior by providing easy access to information, facilitating communication between consumers, and influencing brand perception. This research provides valuable insights for marketers in understanding and utilizing social media platforms to effectively engage with consumers and influence their purchasing decisions.1. IntroductionSocial media has become an integral part of people's daily lives, and its impact on consumer behavior cannot be ignored. This paper aims to investigate the impact of social media on consumer behavior and provide practical implications for marketers. The research question is: How does social media influence consumer behavior in terms of information acquisition, interpersonal communication, and brand evaluation?2. Information Acquisition2.1 Social media provides a platform for consumers to easilyaccess information about products and services. Through social media platforms such as Facebook, Instagram, and Twitter, consumers can obtain product reviews, comparisons, and recommendations from peers. This information influences consumers' purchasing decisions and enhances their knowledge about products.2.2 Social media also serves as a source of entertainment and inspiration, enabling users to discover new trends and products. Influencers and celebrities, who gain popularity through social media, often endorse products and create consumer desire for these items. This form of indirect advertising through social media has a significant impact on consumer behavior.3. Interpersonal CommunicationSocial media platforms enable users to interact with friends, family, and even strangers. This communication aspect of social media hasa direct influence on consumer behavior.3.1 Word-of-mouth (WOM) communication through social media is prevalent. Consumers often share their positive or negative experiences with products on social media platforms, which influence others' opinions and purchasing decisions. These online conversations have a wide reach and can greatly impact brand perception.3.2 Social media facilitates communication between consumers and brands. Consumers can directly communicate with brands through social media channels, providing feedback, asking questions, and seeking assistance. This two-way communicationimproves customer satisfaction and loyalty.4. Brand Evaluation4.1 Social media plays a crucial role in brand evaluation. Consumers often seek information about brands, their values, and their reputation on social media platforms. Positive or negative brand mentions and reviews on social media greatly influence consumers' perceptions of brands, leading to either increased or decreased brand trust and loyalty.4.2 Social media influencers and celebrities endorsing particular brands also impact brand evaluation. These individuals' recommendations and opinions can greatly influence consumers' perceptions and preferences for specific brands.5. ConclusionIn conclusion, social media has a significant impact on consumer behavior by influencing information acquisition, interpersonal communication, and brand evaluation. Marketers should utilize and engage with social media platforms to effectively reach and influence their target customers. This research provides insights for marketers to enhance their social media strategies and create effective brand-consumer interactions.。
3000字外文文献翻译
Human resource management more and more drives value. Under the system that economy development mature, human resource management have to match with fight for the best resources performance, if out of character of the manpower form couples out of character of post, the resources performance be not only whole have no, or may have already exhaust. The modern economy stress balance and match, promote management effect and quality vegetable, will human resource match with make balance, the inside contents establish human resource structure frame, use most in keeping with of the person do most in keeping with of work. Establishment human resource terrace is a communication and collection information way, everyone's opinion comprehensive, give up short take long, with processing salary, welfare etc. affair. Human resource most the importance be a training and development, human resource development have to investment at training aspect, with exertive each stratum of human resource potential.人力资源管理愈来愈被重视。
毕业论文外文翻译两篇
毕业论文外文翻译两篇篇一:毕业论文外文翻译外文资料翻译译文:概述是一个统一的Web开发模型,它包括您使用尽可能少的代码生成企业级Web应用程序所必需的各种服务。
作为.NETFramework的一部分提供。
当您编写应用程序的代码时,可以访问.NETFramework中的类。
您可以使用与公共语言运行库(CLR)兼容的任何语言来编写应用程序的代码,这些语言包括MicrosoftVisualBasic、C#、和J#。
使用这些语言,可以开发利用公共语言运行库、类型安全、继承等方面的优点的应用程序。
包括:∙页和控件框架∙编译器∙安全基础结构∙状态管理功能∙应用程序配置∙运行状况监视和性能功能∙调试支持∙XMLWebservices框架∙可扩展的宿主环境和应用程序生命周期管理∙可扩展的设计器环境页和控件框架是一种编程框架,它在Web服务器上运行,可以动态地生成和呈现网页。
可以从任何浏览器或客户端设备请求网页,会向请求浏览器呈现标记(例如HTML)。
通常,您可以对多个浏览器使用相同的页,因为会为发出请求的浏览器呈现适当的标记。
但是,您可以针对诸如MicrosoftInternetExplorer6的特定浏览器设计网页,并利用该浏览器的功能。
支持基于Web的设备(如移动电话、手持型计算机和个人数字助理(PDA))的移动控件。
网页是完全面向对象的。
在网页中,可以使用属性、方法和事件来处理HTML元素。
页框架为响应在服务器上运行的代码中的客户端事件提供统一的模型,从而使您不必考虑基于Web的应用程序中固有的客户端和服务器隔离的实现细节。
该框架还会在页处理生命周期中自动维护页及该页上控件的状态。
使用页和控件框架还可以将常用的UI功能封装成易于使用且可重用的控件。
控件只需编写一次,即可用于许多页并集成到网页中。
这些控件在呈现期间放入网页中。
页和控件框架还提供各种功能,以便可以通过主题和外观来控制网站的整体外观和感觉。
可以先定义主题和外观,然后在页面级或控件级应用这些主题和外观。
毕业论文外文文献翻译
2013届本科生毕业论文英文参考文献翻译
Oracle虚拟机服务器软件虚拟化在一个64位
Linux环境的性能和可扩展性
(译文)
学院(系):
信息工程
专业年级:
学生姓名:
指导教师:
合作指导教师:
完成日期:
2013年6月
Oracle虚拟机服务器软件虚拟化在一个64位Linux环境的性能和可扩展性
benefits, however, this has not been without its attendantproblems and anomalies, such as performance tuning anderratic performance metrics, unresponsive virtualized systems,crashed virtualized servers, misconfigured virtual hostingplatforms, amongst others. The focus of this research was theanalysis of the performance of the Oracle VM servervirtualization platform against that of the bare-metal serverenvironment. The scalability and its support for high volumetransactions were also analyzed using 30 and 50 active usersfor the performance evaluation. Swingbench and LMbench,two open suite benchmark tools were utilized in measuringperformance. Scalability was also measured using Swingbench.Evidential results gathered from Swingbench revealed 4% and8% overhead for 30 and 50 active users respectively in theperformance evaluation of Oracle database in a single OracleVM. Correspondingly, performance metric法
毕业设计(论文)外文资料翻译(学生用)
毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。
附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。
程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。
一般地,我们需要理解连网协议中不同的“层”(Layer)。
而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。
这是一项令人痛苦的工作。
但是,连网本身的概念并不是很难。
我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。
这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。
Java最出色的一个地方就是它的“无痛苦连网”概念。
有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。
我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。
除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。
本章将用一系列易懂的例子解释Java的连网支持。
15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。
早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。
但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。
为达到这个目的,我们采用了IP(互联网地址)的概念。
IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。
我自己的域名是。
所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。
毕业论文文献外文翻译----危机管理:预防,诊断和干预文献翻译-中英文文献对照翻译
第1页 共19页中文3572字毕业论文(设计)外文翻译标题:危机管理-预防,诊断和干预一、外文原文标题:标题:Crisis management: prevention, diagnosis and Crisis management: prevention, diagnosis andintervention 原文:原文:The Thepremise of this paper is that crises can be managed much more effectively if the company prepares for them. Therefore, the paper shall review some recent crises, theway they were dealt with, and what can be learned from them. Later, we shall deal with the anatomy of a crisis by looking at some symptoms, and lastly discuss the stages of a crisis andrecommend methods for prevention and intervention. Crisis acknowledgmentAlthough many business leaders will acknowledge thatcrises are a given for virtually every business firm, many of these firms do not take productive steps to address crisis situations. As one survey of Chief Executive officers of Fortune 500 companies discovered, 85 percent said that a crisisin business is inevitable, but only 50 percent of these had taken any productive action in preparing a crisis plan(Augustine, 1995). Companies generally go to great lengths to plan their financial growth and success. But when it comes to crisis management, they often fail to think and prepare for those eventualities that may lead to a company’s total failure.Safety violations, plants in need of repairs, union contracts, management succession, and choosing a brand name, etc. can become crises for which many companies fail to be prepared untilit is too late.The tendency, in general, is to look at the company as a perpetual entity that requires plans for growth. Ignoring the probabilities of disaster is not going to eliminate or delay their occurrences. Strategic planning without inclusion ofcrisis management is like sustaining life without guaranteeinglife. One reason so many companies fail to take steps to proactively plan for crisis events, is that they fail to acknowledge the possibility of a disaster occurring. Like an ostrich with its head in the sand, they simply choose to ignorethe situation, with the hope that by not talking about it, it will not come to pass. Hal Walker, a management consultant, points out “that decisions will be more rational and better received, and the crisis will be of shorter duration, forcompanies who prepare a proactive crisis plan” (Maynard, 1993) .It is said that “there are two kinds of crises: those that thatyou manage, and those that manage you” (Augustine, 1995). Proactive planning helps managers to control and resolve a crisis. Ignoring the possibility of a crisis, on the other hand,could lead to the crisis taking a life of its own. In 1979, theThree-Mile Island nuclear power plant experienced a crisis whenwarning signals indicated nuclear reactors were at risk of a meltdown. The system was equipped with a hundred or more different alarms and they all went off. But for those who shouldhave taken the necessary steps to resolve the situation, therewere no planned instructions as to what should be done first. Hence, the crisis was not acknowledged in the beginning and itbecame a chronic event.In June 1997, Nike faced a crisis for which they had no existi existing frame of reference. A new design on the company’s ng frame of reference. A new design on the company’s Summer Hoop line of basketball shoes - with the word air writtenin flaming letters - had sparked a protest by Muslims, who complained the logo resembled the Arabic word for Allah, or God.The council of American-Islamic Relations threatened aa globalNike boycott. Nike apologized, recalled 38,000 pairs of shoes,and discontinued the line (Brindley, 1997). To create the brand,Nike had spent a considerable amount of time and money, but hadnever put together a general framework or policy to deal with such controversies. To their dismay, and financial loss, Nike officials had no choice but to react to the crisis. This incident has definitely signaled to the company that spending a little more time would have prevented the crisis. Nonetheless,it has taught the company a lesson in strategic crisis management planning.In a business organization, symptoms or signals can alert the strategic planners or executives of an eminent crisis. Slipping market share, losing strategic synergy anddiminishing productivity per man hour, as well as trends, issues and developments in the socio-economic, political and competitive environments, can signal crises, the effects of which can be very detrimental. After all, business failures and bankruptcies are not intended. They do not usually happen overnight. They occur more because of the lack of attention to symptoms than any other factor.Stages of a crisisMost crises do not occur suddenly. The signals can usuallybe picked up and the symptoms checked as they emerge. A company determined to address these issues realizes that the real challenge is not just to recognize crises, but to recognize themin a timely fashion (Darling et al., 1996). A crisis can consistof four different and distinct stages (Fink, 1986). The phasesare: prodromal crisis stage, acute crisis stage, chronic crisisstage and crisis resolution stage.Modern organizations are often called “organic” due tothe fact that they are not immune from the elements of their surrounding environments. Very much like a living organism, organizations can be affected by environmental factors both positively and negatively. But today’s successfulorganizations are characterized by the ability to adapt by recognizing important environmental factors, analyzing them, evaluating the impacts and reacting to them. The art of strategic planning (as it relates to crisis management)involves all of the above activities. The right strategy, in general, provides for preventive measures, and treatment or resolution efforts both proactively and reactively. It wouldbe quite appropriate to examine the first three stages of acrisis before taking up the treatment, resolution or intervention stage.Prodromal crisis stageIn the field of medicine, a prodrome is a symptom of the onset of a disease. It gives a warning signal. In business organizations, the warning lights are always blinking. No matter how successful the organization, a number of issues andtrends may concern the business if proper and timely attentionis paid to them. For example, in 1995, Baring Bank, a UK financial institution which had been in existence since 1763,ample opportunitysuddenly and unexpectedly failed. There wasfor the bank to catch the signals that something bad was on thehorizon, but the company’s efforts to detect that were thwarted by an internal structure that allowed a single employee both to conduct and to oversee his own investment trades, and the breakdown of management oversight and internalcontrol systems (Mitroff et al., 1996). Likewise, looking in retrospect, McDonald’s fast food chain was given the prodromalsymptoms before the elderly lady sued them for the spilling ofa very hot cup of coffee on her lap - an event that resulted in a substantial financial loss and tarnished image of thecompany. Numerous consumers had complained about thetemperature of the coffee. The warning light was on, but the company did not pay attention. It would have been much simplerto pick up the signal, or to check the symptom, than facing the consequences.In another case, Jack in the Box, a fast food chain, had several customers suffer intestinal distress after eating at their restaurants. The prodromal symptom was there, but the company took evasive action. Their initial approach was to lookaround for someone to blame. The lack of attention, the evasiveness and the carelessness angered all the constituent groups, including their customers. The unfortunate deaths thatptoms,occurred as a result of the company’s ignoring thesymand the financial losses that followed, caused the company to realize that it would have been easier to manage the crisis directly in the prodromal stage rather than trying to shift theblame.Acute crisis stageA prodromal stage may be oblique and hard to detect. The examples given above, are obvious prodromal, but no action wasWebster’s New Collegiate Dictionary, an acute stage occursacutewhen a symptom “demands urgent attention.” Whether the acutesymptom emerges suddenly or is a transformation of a prodromalstage, an immediate action is required. Diverting funds and other resources to this emerging situation may cause disequilibrium and disturbance in the whole system. It is onlythose organizations that have already prepared a framework forthese crises that can sustain their normal operations. For example, the US public roads and bridges have for a long time reflected a prodromal stage of crisis awareness by showing cracks and occasionally a collapse. It is perhaps in light of the obsessive decision to balance the Federal budget that reacting to the problem has been delayed and ignored. This situation has entered an acute stage and at the time of this writing, it was reported that a bridge in Maryland had just collapsed.The reason why prodromes are so important to catch is thatit is much easier to manage a crisis in this stage. In the caseof most crises, it is much easier and more reliable to take careof the problem before it becomes acute, before it erupts and causes possible complications (Darling et al., 1996). In andamage. However, the losses are incurred. Intel, the largest producer of computer chips in the USA, had to pay an expensiveprice for initially refusing to recall computer chips that proved unreliable o n on certain calculations. The f irmfirm attempted to play the issue down and later learned its lesson. At an acutestage, when accusations were made that the Pentium Chips were not as fast as they claimed, Intel quickly admitted the problem,apologized for it, and set about fixing it (Mitroff et al., 1996). Chronic crisis stageDuring this stage, the symptoms are quite evident and always present. I t isIt is a period of “make or break.” Being the third stage, chronic problems may prompt the company’s management to once and for all do something about the situation. It may be the beginning of recovery for some firms, and a deathknell for others. For example, the Chrysler Corporation was only marginallysuccessful throughout the 1970s. It was not, however, until the company was nearly bankrupt that amanagement shake-out occurred. The drawback at the chronic stage is that, like in a human patient, the company may get used to “quick fixes” and “band “band--aid”approaches. After all, the ailment, the problem and the crisis have become an integral partoverwhelmed by prodromal and acute problems that no time or attention is paid to the chronic problems, or the managers perceive the situation to be tolerable, thus putting the crisison a back burner.Crisis resolutionCrises could be detected at various stages of their development. Since the existing symptoms may be related todifferent problems or crises, there is a great possibility thatthey may be misinterpreted. Therefore, the people in charge maybelieve they have resolved the problem. However, in practicethe symptom is often neglected. In such situations, the symptomwill offer another chance for resolution when it becomes acute,thereby demanding urgent care. Studies indicate that today anincreasing number of companies are issue-oriented and searchfor symptoms. Nevertheless, the lack of experience in resolvinga situation and/or inappropriate handling of a crisis can leadto a chronic stage. Of course, there is this last opportunityto resolve the crisis at the chronic stage. No attempt to resolve the crisis, or improper resolution, can lead to grim consequences that will ultimately plague the organization or even destroy it.It must be noted that an unsolved crisis may not destroy the company. But, its weakening effects can ripple through the organization and create a host of other complications.Preventive effortsThe heart of the resolution of a crisis is in the preventiveefforts the company has initiated. This step, similar to a humanbody, is actually the least expensive, but quite often the mostoverlooked. Preventive measures deal with sensing potential problems (Gonzales-Herrero and Pratt, 1995). Major internalfunctions of a company such as finance, production, procurement, operations, marketing and human resources are sensitive to thesocio-economic, political-legal, competitive, technological, demographic, global and ethical factors of the external environment. What is imminently more sensible and much more manageable, is to identify the processes necessary forassessing and dealing with future crises as they arise (Jacksonand Schantz, 1993). At the core of this process are appropriate information systems, planning procedures, anddecision-making techniques. A soundly-based information system will scan the environment, gather appropriate data, interpret this data into opportunities and challenges, and provide a concretefoundation for strategies that could function as much to avoid crises as to intervene and resolve them.Preventive efforts, as stated before, require preparations before any crisis symptoms set in. Generally strategic forecasting, contingency planning, issues analysis, and scenario analysis help to provide a framework that could be used in avoiding and encountering crises.出处:出处:Toby TobyJ. Kash and John R. Darling . Crisis management: prevention, diagnosis 179-186二、翻译文章标题:危机管理:预防,诊断和干预译文:本文的前提是,如果该公司做好准备得话,危机可以更有效地进行管理。
法学 毕业论文 文献 外文 英文 翻译
附件一:英文文献INTRODUCTIONOffences of strict liability are those crimes which do not require mens rea with regard to at least one or more elements of the actus reus. The defendant need not have intended or known about that circumstance or consequence. Liability is said to be strict with regard to that element. For a good example see:R v Prince[1875]:The defendant ran off with an under-age girl. He was charged with an offence of taking a girl under the age of 16 out of the possession of her parents contrary to s55 of the Offences Against the Person Act 1861. The defendant knew that the girl was in the custody her father but he believed on reasonable grounds that the girl was aged 18. It was held that knowledge that the girl was under the age of 16 was not required in order to establish the offence. It was sufficient to show that the defendant intended to take the girl out of the possession of her father.It is only in extreme and rare cases where no mens rea is required for liability, thereby making the particular offence "absolute".GENERAL PRINCIPLESThe vast majority of strict liability crimes are statutory offences. However, statutes do not state explicitly that a particular offence is one of strict liability. Where a statute uses terms such as "knowingly" or "recklessly" then the offence being created is one that requires mens rea. Alternatively, it may make it clear that an offence of strict liability is being created. In many cases it will be a matter for the courts to interpret the statute and decide whether mens rea is required or not. What factors are taken into account by the courts when assessing whether or not an offence falls into the category of strict liability offences?THE MODERN CRITERIAIn Gammon (Hong Kong) Ltd v Attorney-General for Hong Kong [1984], the Privy Council considered the scope and role of strict liability offences in the modern criminal law and their effect upon the "presumption of mens rea". Lord Scarman laid down the criteria upon which a court should decide whether or not it is appropriate to impose strict liability: "In their Lordships' opinion, the law … may be stated in the following propositions … : (1) there is a presumption of law that mens rea is required before a person can be held guilty of a criminal offence; (2) the presumption is particularly strong where the offence is "truly criminal" in character; (3) the presumption applies to statutory offences, and can be displaced only if this is clearly or by necessary implication the effect of the statute; (4) the only situation in which the presumption can be displaced is where the statute is concerned with an issue of social concern, and public safety is such an issue; (5) even where a statute is concerned with such an issue, the presumption of mens rea stands unless it can be shown that the creation of strict liability will be effective to promote the objects of the statute by encouraging greater vigilance to prevent the commission of the prohibited act."(1) PRESUMPTION OF MENS REACourts usually begin with the presumption in favor of mens rea, seeing the well-known statement by Wright J in Sherras v De Rutzen:There is a presumption that mens rea, or evil intention, or knowledge of the wrongfulness of the act, is an essential ingredient in every offence; but that presumption is liable to be displaced either by the words of the statute creating the offence or by the subject-matter with which it deals, and both must be considered(2) GRAVITY OF PUNISHMENTAs a general rule, the more serious the criminal offence created by statute, the less likely the courts is to view it as an offence of strict liability. See:Sweet v Parsley [1970]:The defendant was a landlady of a house let to tenants. She retained one room in the house for herself and visited occasionally to collect the rent and letters. While she was absent the police searched the house and found cannabis. The defendant was convicted under s5 of the Dangerous Drugs Act 1965, of "being concerned in the management of premises used for the smoking of cannabis". She appealed alleging that she had no knowledge of the circumstances and indeed could not expect reasonably to have had such knowledge.The House of Lords,quashing her conviction, held that it had to be proved that the defendant had intended the house to be used for drug-taking, since the statute in question created a serious, or "truly criminal" offence, conviction for which would have grave consequences for the defendant. Lord Reid stated that "a stigma still attaches to any person convicted of a truly criminal offence, and the more serious or more disgraceful the offence the greater the stigma". And equally important, "the press in this country are vigilant to expose injustice, and every manifestly unjust conviction made known to the public tends to injure the body politic [people of a nation] by undermining public confidence in the justice of the law and of its administration."Lord Reid went on to point out that in any event it was impractical to impose absolute liability for an offence of this nature, as those who were responsible for letting properties could not possibly be expected to know everything that their tenants were doing.(3) WORDING OF THE STATUTEIn determining whether the presumption in favor of mens rea is to be displaced, the courts are required to have reference to the whole statute in which the offence appears. See:Cundy v Le Cocq (1884) :The defendant was convicted of unlawfully selling alcohol to an intoxicated person, contrary to s13 of the Licensing Act 1872. On appeal, the defendant contended that he had been unaware of the customer's drunkenness and thus should be acquitted. The Divisional Court interpreted s13 as creating an offence of strict liability since it was itself silent as to mens rea, whereas other offences under the same Act expressly required proof of knowledge on the part of the defendant. It was held that it was not necessary to consider whether the defendant knew, or had means of knowing, or could with ordinary care have detected that the person served was drunk. If he served a drink to a person who was in fact drunk, he was guilty. Stephen J stated: Here, as I have already pointed out, the object of this part of the Act is to prevent the sale of intoxicating liquor to drunken persons, and it is perfectly natural to carry that out by throwing on the publican the responsibility of determining whether the person supplied comes within that category.(4) ISSUES OF SOCIAL CONCERNSee :R v Blake (1996) :Investigation officers heard an unlicensed radio station broadcast and traced it to a flat where the defendant was discovered alone standing in front of the record decks, still playing music and wearing a set of headphones. Though the defendant admitted that he knewhe was using the equipment, he claimed that he believed he was making demonstration tapes and did not know he was transmitting. The defendant was convicted of using wireless telegraphy equipment without a license, contrary to s1 (1) Wireless Telegraphy Act 1949 and appealed on the basis that the offence required mens rea.The Court of Appeal held that the offence was an absolute (actually a strict) liability offence. The Court applied Lord Scarman's principles in Gammon and found that, though the presumption in favor of mens rea was strong because the offence carried a sentence of imprisonment and was, therefore, "truly criminal", yet the offence dealt with issues of serious social concern in the interests of public safety (namely, frequent unlicensed broadcasts on frequencies used by emergency services) and the imposition of strict liability encouraged greater vigilance in setting up careful checks to avoid committing the offence.(5) IS THERE ANY PURPOSE IN IMPOSING STRICT LIABILITY?The courts will be reluctant to construe a statute as imposing strict liability upon a defendant, where there is evidence to suggest that despite his having taken all reasonable steps, he cannot avoid the commission of an offence. See:Sherras v De Rutzen [1895]: The defendant was convicted of selling alcohol to a police officer whilst on duty, contrary to s16(2) of the Licensing Act 1872. He had reasonably believed the constable to be off duty as he had removed his arm-band, which was the acknowledged method of signifying off duty. The Divisional Court held that the conviction should be quashed, despite the absence from s16 (2) of any words requiring proof of mens rea as an element of the offence. Wright J expressed the view that the presumption in favor of mens rea would only be displaced by the wording of the statute itself, or its subject matter. In this case the latter factor was significant, in that no amount of reasonable care by the defendant would have prevented the offence from being committed. Wright J stated: "It is plain that if guilty knowledge is not necessary, no care on the part of the publican could save him from a conviction under section 16, subsection (2), since it would be as easy for the constable to deny that he was on duty when asked, or to produce a forged permission from his superior officer, as to remove his armlet before entering the public house. I am, therefore, of opinion that this conviction ought to be quashed."MODERN EXAMPLESThe following case is a modern example of the imposition of strict liability: Alphacell v Woodward [1972] The defendants were charged with causing polluted matter to enter a river contrary to s2 of the Rivers (Prevention of Pollution) Act 1951. The river had in fact been polluted because a pipe connected to the defendant's factory had been blocked, and the defendants had not been negligent. The House of Lords nevertheless held that the defendants were liable. Lord Salmon stated: If this appeal succeeded and it were held to be the law that no conviction be obtained under the 1951 Act unless the prosecution could discharge the often impossible onus of proving that the pollution was caused intentionally or negligently, a great deal of pollution would go unpunished and undeterred to the relief of many riparian factory owners. As a result, many rivers which are now filthy would become filthier still and many rivers which are now clean would lose their cleanliness. The legislature no doubt recognized that as a matter of public policy this would be most unfortunate. Hence s2(1)(a) which encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it.ARGUMENTS FOR STRICT LIABILITY1. The primary function of the courts is the prevention of forbidden acts. What acts should be regarded as forbidden? Surely only such acts as we can assert ought not to have been done. Some of the judges who upheld the conviction of Prince did so on the ground that men should be deterred from taking girls out of the possession of their parents, whatever the girl's age. This reasoning can hardly be applied to many modern offences of strict liability. We do not wish to deter people from driving cars, being concerned in the management of premises, financing hire purchase transactions or canning peas. These acts, if done with all proper care, are not such acts as the law should seek to prevent.2. Another argument that is frequently advanced in favor of strict liability is that, without it, many guilty people would escape - that there is neither time nor personnel available to litigate the culpability of each particular infraction. T his argument assumes that it is possible to deal with these cases without deciding whether D had mens rea or not, whether he was negligent or not. Certainly D may be convicted without deciding these questions, but how can he be sentenced? Suppose that a butcher sells some meat which is unfit for human consumption. Clearly the court will deal differently with (i) the butcher who knew that the meat was tainted; (ii) the butcher who did not know, but ought to have known; and (iii) the butcher who did not know and had no means of finding out. Sentence can hardly be imposed without deciding into which category the convicted person falls.3. The argument which is probably most frequently advanced by the courts for imposing strict liability is that it is necessary to do so in the interests of the public. Now it may be conceded that in many of the instances where strict liability has been imposed, the public does need protection against negligence and, assuming that the threat of punishment can make the potential harm doer more careful, there may be a valid ground for imposing liability for negligence as well as where there is mens rea. This is a plausible argument in favor of strict liability if there were no middle way between mens rea and strict liability - that is liability for negligence - and the judges have generally proceeded on the basis that there is no such middle way. Liability for negligence has rarely been spelled out of a statute except where, as in driving without due care, it is explicitly required. Lord Devlin has said: "It is not easy to find a way of construing a statute apparently expressed in terms of absolute liability so as to produce the requirement of negligence."ARGUMENTS AGAINST STRICT LIABILITY1. The case against strict liability, then, is, first, that it is unnecessary. It results in the conviction of persons who have behaved impeccably and who should not be required to alter their conduct in any way.2. Secondly, that it is unjust. Even if an absolute discharge can be given D may feel rightly aggrieved at having been formally convicted of an offence for which he bore no responsibility. Moreover, a conviction may have far-reaching consequences outside the courts, so that it is no answer to say that only a nominal penalty is imposed.3. The imposition of liability for negligence would in fact meet the arguments of most of those who favor strict liability. Such statutes are not meant to punish the vicious will but to put pressure upon the thoughtless and inefficient to do their whole duty in the interest of public health or safety or morals." The "thoughtless and inefficient" are, of course, the negligent. The objection tooffences of strict liability is not that these persons are penalized, but that others who are completely innocent are also liable to conviction. Though Lord Devlin was skeptical about the possibility of introducing the criterion of negligence (above), in Reynolds v Austin (1951) he stated that strict liability should only apply when there is something that the defendant can do to promote the observance of the law - which comes close to requiring negligence. If there were something which D could do to prevent the commission of the crime and which he failed to do, he might generally be said to have failed to comply with a duty - perhaps a high duty - of care; and so have been negligent.4. In Alphacell v Woodward (1972) Lord Salmon thought the relevant statutory section, "encourages riparian factory owners not only to take reasonable steps to prevent pollution but to do everything possible to ensure that they do not cause it." This suggests that, however vast the expenditure involved, and however unreasonable it may be in relation to the risk, D is under a duty to take all possible steps. Yet it may be doubted whether factory owners will in fact do more than is reasonable; and it is questionable whether they ought to be required to do so, at the risk - even though it be unlikely - of imprisonment. The contrary argument is that the existence of strict liability does induce organizations to aim at higher and higher standards.POSSIBLE DEVELOPMENTSThere are several possible compromises between mens rea and strict liability in regulatory offences. A "halfway house" has developed in Australia. The effect of Australian cases is: D might be convicted without proof of any mens rea by the Crown; but acquitted if he proved on a balance of probabilities that he lacked mens rea and was not negligent; ie, that he had an honest and reasonable belief in a state of facts which, would have made his act innocent. The onus of proving reasonable mistake is on D.STATUTORY DEFENCESIt is common for the drastic effect of a statute imposing strict liability to be mitigated by the provision of a statutory defense. It is instructive to consider one example. Various offences relating to the treatment and sale of food are enacted by the first twenty sections of the Food Safety Act 1990. Many, if not all, of these are strict liability offences. Section 21(1), however, provides that it shall be a defense for the person charged with any of the offences to prove that he took all reasonable precautions and exercised all due diligence to avoid the commission of the offence by himself or by a person under his control. Statutory defenses usually impose on the defendant a burden of proving that he had no mens rea and that he took all reasonable precautions and exercised all due diligence to avoid the commission of an offence. The effect of such provisions is that the prosecution need do no more than prove that the accused did the prohibited act and it is then for him to establish, if he can, that he did it innocently. Such provisions are a distinct advance on unmitigated strict liability.附件二:英文文献翻译介绍严格责任犯罪是关于客观方面的一个或多个因素不要求犯罪意图的那些犯罪。
3000字外文翻译
3000字外文翻译篇一:3000字英文翻译Bolt Supporting of Large-Span Soft Rockway inShaqu CollieryAbstract The instability of trapezoidal I-steel support is analysed for the compound roof of main coal seam in Shaqu Colliery, and the mechanism of bolt supporting is studied. A scheme of bolt supporting has been given and put into practice,remarkable technical and economic benefits have been got.Key words :large-span,compound roof, bolt supporting, mechanism1.IntroductionIn shaqu colliery a large coal mine mining rare coking coal in China, most roadways are laid out in main coal seamroof of coal seam .The soft compound ,which is composed of mudstone and coal seamcontains aboundant beddings and joints. The strength of the roof is so low that its uniaxial-saturated compressive strength is only 10.7 Mpa.RQD value of coal seam and is zero ,and that of mudstone is lower than 10%. There is clay minerals in mudstone, main compositions are interbedded strata of illite and montmorillonite which will swell when soaked by water, The span of preperation roadways and gateways is wider than 4m, and that of some main roadways is over 5m. In shaqu colliery , preperation roadways and gateways were supported by trapezoidal I-steel support, the beams of which were bent and damaged, and the roadways were destroyed seriously within a short period just after excavated. Roofcontrolling of Large-Span Soft Rockways in the coal seam became the key to the production and construction of shaqu colliery.2.supporting status and instability analysis of trapezoidal I-steel supportstrapezoidal I-steel supports were used in drawing roadways,which roof span is 4.0m, floor span is 4.9m, and hight 2.95m and spacing 0.5m. Initial resistance of the supports was almost zero because it was difficult to the support beams contact the roof, even if with high quality of installation. The trapezoidal I-steel supports would not carry load until the displacement of surrounding rock excceded 80-100 mm because the supports increased very slowly. Therefore, right after excavation, the roof would bend and subside severly. Eight hours after excavation, the roof strata would break completely, and then form rock cavity. The weight of caving rock would act on the beams of supports, which forms loose rock pressure.By calculating, the ultimate load-bearing capacity is smaller than roof pressure whether it is uniformal or concentrated, Based on the in-situ observation, inflection value of most roof reached 200-300mm. When paired supports were used, paired beams were still bent and damaged; then midprops were added, they were also destroyed. Many roof beams were stabilized only if 2-3 props had been added. The supports were damaged completely, and most of them could not be reused. The partsection of roadways had become inverted trapezoid, and the available section was far smaller than the designed section. Part of roadways was out of use because it was in the danger of serious caving.3.Mechanism of bolt supportingIts mechanism is to make full use of the self-load-bearing capacity of surrounding rock by bolting, and then make the surrounding rock stabilize by itself. The stability of surrounding rock depends on the equilibrium status of ground pressure, self-load-bearing capacity of surrounding rock and anchoring force of bolts. Ground pressure is to make surrounding rock deform and break; self-load-bearing capacity is the main factor to stablize surrounding rock. Anchoring force of bolts can notchange the equilibrium status of the three because it is very small, compared with ground pressure and self-load-bearing capacity. And its function is to change the decreasing regularity of self-load-bearing capacity versus the deformation of surrounding rock, and balance self-load-bearing capacity against ground pressure early.Roof pressure is the pressure acting on the roof beams when I-steel supports are used to control the roof. When roof is supported by bolts, the roof pressure change to be the pressure acting on the rock within the bolting range because this part of rock is change into self-bearing body. According to the characteristics of the roof of coal seamscan be divided into six substrata. , bolts strataWhen the value of roof subsidence is zero, roof pressure is in-situ stress; then roof pressure decreases with the increase of roof subsidence. The variation of roof pressure is analyzed by FLAC, The results are shown as curve 1 in Fig.1. Wheoof subsidence reaches 19 mm, the first roof substratum begins to bearing tensile stress, then losts self-load-bearing capacity, and roof pressure decreases to 0.67Mpa. When roof subsidence reaches 40 mm, the second substratum loses self-load-bearing capacity, and roof pressure decreases to 0.16Mpa. When roof subsidence reaches 100 mm, the fourth substratum loses self-load-bearing capacity, and roof pressure decreases to0.08Mpa. In the initial stage of roof subsidence, roof pressure decreases rapidly, and in the later stage of roof subsidence, roof pressure decreases slowly and then has an increasing trend.The self-load-bearing capacity of the roof without bolting is calculated upon the theory of laminated beam, the result are shown as curve 2 in Fig.1. When roof subsidence is zero, the self-load-bearing capacity is at its utmost value 0.0625Mpa; when roof subsidence is 100mm,roof strata have broken, most of self-load-bearing capacity has lost, and the residual self-load-bearing capacity is only 0.0375Mpa.Theself-load-bearing capacity of the roof with bolting is calculated upon the theory of combined beam, the result are shown as curve 3 in Fig.1. When roof subsidence is zero, the self-load-bearing capacity is at its utmostvalue 0.4Mpa; when the roof subsidence reaches 40mm the self-load-bearing capacity decreases to 0.225Mpa,and when roof subsidence reaches 100mm, the self-load-bearing capacity decreases to 0.1Mpa .As shown in Fin. 1, the self-load-bearing capacity of roof strata without bolting is lower than roof pressure during the whole course of roof subsiding, so roof strata cave inevitably. When bolted, roof strata is changed from laminated beam into combined beam ,and the selr-load-bearing capacity increases markedly. When roof subsidence reaches 44mm, the self-load-bearing capacity exceeds roof pressure, then roof strata stabilized by itself.4 Anchoring technologyBased on the above study of bolting mechanism, large setting resistance, high speed of resistance and high final resistance are the key technology to the large-spon soft rock roadway before roof strata detaching, which includes: (1)to improve the setting resistance increasing and achieve high speed of resistance increasing, to make the real working properties of bolts coordinate self-load-bearing properties of roof strata , which enables to make full use of the self-load-bearing capacity of roof strata; (2)to raise bolting reliability, and solve the difficult problems that anchoring force between bolts and soft rock is small and easy to lose.4.1 Bloting scheme篇二:本科论文 3000字外文翻译附录A3 Image Enhancement in the Spatial DomainThe principal objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. The word specific is important, because it establishes at the outset than the techniques discussed in this chapter are very much problem oriented. Thus, for example, a method that is quite useful for enhancing X-ray images may not necessarily be the best approach for enhancing pictures of Mars transmitted by a space probe. Regardless of the method used .However, image enhancement is one of the most interesting and visually appealing areas of image processing.Image enhancement approaches fall into two broad categories: spatial domain methods and frequency domain methods. The term spatial domain refers to the image plane itself, and approaches in this category are based on direct manipulation of pixels in an image. Fourier transform of an image. Spatial methods are covered in this chapter, and frequency domain enhancement is discussed in Chapter 4.Enhancement techniques based on various combinations of methods from these two categories are not unusual. We note also that many of the fundamental techniques introduced in this chapter in the context of enhancement are used in subsequent chapters for a variety of other image processing applications.There is no general theory of image enhancement. When an image is processed for visual interpretation, the viewer is the ultimate judge of how well a particular method works. Visual evaluation of image quality is a highly is highly subjective process, thus making the definition of a “good image” an elusive standard by which to compare algorithm performance. When the problem is one of processing images for machine perception, the evaluation task is somewhat easier. For example, in dealing with a character recognition application, and leaving aside other issues such as computational requirements, the best image processingmethod would be the one yielding the best machine recognition results. However, even in situations when aclear-cut criterion of performance can be imposed on the problem, a certain amount of trial and error usually is required before a particular image enhancement approach is selected.3.1 BackgroundAs indicated previously, the term spatial domain refers to the aggregate of pixels composing an image. Spatial domain methods are procedures that operate directly on these pixels. Spatial domain processes will be denotes by the expressiong?x,y??T?f(x,y)? (3.1-1)where f(x, y) is the input image, g(x, y) is the processed image, and T is an operator on f, defined over some neighborhood of (x, y). In addition, T can operate on a set of input images, such as performing the pixel-by-pixel sum of K images for noise reduction, as discussed in Section 3.4.2.The principal approach in defining a neighborhood about a point (x, y) is to use a square or rectangular subimage area centered at (x, y).The center of the subimage is moved from pixel to starting, say, at the top left corner. The operator T is applied at each location (x, y) to yield the output, g, at that location. The process utilizes only the pixels in the area of the image spanned by the neighborhood. Although other neighborhood shapes, such as approximations to a circle, sometimes are used, square and rectangular arrays are by far the most predominant because of their ease of implementation.The simplest from of T is when the neighborhood is of size 1×1 (that is, a single pixel). In this case, g depends only on the value of f at (x, y), and T becomes a gray-level (also called an intensity or mapping) transformation function of the forms?T(r) (3.1-2)where, for simplicity in notation, r and s are variables denoting, respectively, the grey level of f(x, y) and g(x, y)at any point (x, y).Some fairly simple, yet powerful, processing approaches can be formulates with gray-level transformations. Because enhancement at any point in an image depends only on the grey level at that point, techniques in this category often are referred to as point processing.Larger neighborhoods allow considerably more flexibility. The general approach is to use a function of the values of f in a predefined neighborhood of (x, y) to determine the value of g at (x, y). One of the principal approaches in this formulation is based on the use of so-called masks (also referred to as filters, kernels, templates, or windows). Basically, a mask is a small (say, 3×3) 2-Darray, in which the values of the mask coefficients determine the nature of the type of approach often are referred to as mask processing or filtering. These concepts are discussed in Section 3.5.3.2 Some Basic Gray Level TransformationsWe begin the study of image enhancement techniques by discussing gray-level transformation functions. These are among the simplest of all image enhancement techniques. The values of pixels, before and after processing, will be denoted by r and s, respectively. As indicated in the previous section, these values are related by an expression of the from s = T(r), where T is a transformation that maps a pixel value r into a pixel value s. Since we are dealing with digital quantities, values of the transformation function typically are stored in a one-dimensional array and the mappings from r to s are implemented via table lookups. For an 8-bit environment, a lookup table containing the values of T will have 256 entries.As an introduction to gray-level transformations, which shows threebasic types of functions used frequently for image enhancement: linear (negative and identity transformations), logarithmic (log and inverse-log transformations), and power-law (nth power and nth root transformations). The identity function is the trivial case in which out put intensities are identical to input intensities. It is included in the graph only for completeness.3.2.1 Image NegativesThe negative of an image with gray levels in the range [0, L-1]is obtained by using the negative transformation show shown, which is given by the expressions?L?1?r(3.2-1)Reversing the intensity levels of an image in this manner produces the equivalent of a photographic negative. This type of processing is particularly suited for enhancing white or grey detail embedded in dark regions of an image, especiallywhen the black areas are dominant in size.3.2.2 Log TransformationsThe general from of the log transformation iss?clog(1?r) (3.2-2)Where c is a constant, and it is ass umed that r ≥0 .The shape of the log curve transformation maps a narrow range of low gray-level values in the input image into a wider range of output levels. The opposite is true of higher values of input levels. We would use a transformation of this type to expand the values of dark pixels in an image while compressing the higher-level values. The opposite is true of the inverse log transformation.Any curve having the general shape of the log functions would accomplish this spreading/compressing of gray levels in an image. In fact, the power-law transformations discussed in the next section are much moreversatile for this purpose than the log transformation. However, the log function has the important characteristic that it compresses the dynamic range of image characteristics of spectra. It is not unusual to encounter spectrum values that range from 0 to 106 or higher. While processing numbers such as these presents no problems for a computer, image display systems generally will not be able to reproduce faithfully such a wide range of intensity values .The net effect is that a significant degree of detail will be lost in the display of a typical Fourier spectrum.3.2.3 Power-Law TransformationsPower-Law transformations have the basic froms?cr? (3.2-3)Where c and y are positive constants .Sometimes Eq. (3.2-3) is written asto account for an offset (that is, a measurable output when the input is zero). However, offsets typically are an issue of display calibration and as a result they are normally ignored in Eq. (3.2-3). Plots of s versus r for various values of y are shown in Fig.3.6. As in the case of the log transformation, power-law curves with fractional values of y map a narrow range of dark input values into a wider range of output values, with the opposite being true for higher values of input levels. Unlike the log function, however, we notice here a family of possible transformation curves obtained simply by varying y. As expected, we see in Fig.3.6 that curves generated with values of y>1 have exactly the opposite effect as those generated with values of y<1. Finally, we note that Eq.(3.2-3) reduces to the identity transformation when c = y = 1.A variety of devices used for image capture, printing, and display respond according to as gamma[hence our use of this symbol in Eq.(3.2-3)].The process used to correct this power-law response phenomena is called gamma correction.Gamma correction is important if displaying an image accurately ona computer screen is of concern. Images that are not corrected properly can look either bleached out, or, what is more likely, too dark. Trying to reproduce colors accurately also requires some knowledge of gamma correction because varying the value of gamma correcting changes not only the brightness, but also the ratios of red to green to blue. Gamma correction has become increasingly important in the past few years, as use of digital images for commercial purposes over the Internet has increased. It is not Internet has increased. It is not unusual that images created for a popular Web site will be viewed by millions of people, the majority of whom will have different monitors and/or monitor settings. Some computer systems even have partial gamma correction built in. Also, current image standards do not contain the value of gamma with which an image was created, thus complicating the issue further. Given these constraints, a reasonable approach when storing images in a Web site is to preprocess the images with a gamma that represents in a Web site is to preprocess the images with a gamma that represents an “average” of the types of monitors and computer systems that one expects in the open market at any given point in time.3.2.4 Piecewise-Linear Transformation FunctionsA complementary approach to the methods discussed in the previous three sections is to use piecewise linear functions. The principal advantage of piecewise linear functions over the types of functions we have discussed thus far is that the form of piecewise functions can be arbitrarily complex. In fact, as we will see shortly, a practical implementation of some important transformations can be formulated only 篇三:3000字外文文献翻译模板学年论文(外文文献翻译)英文题目 Financial structure and development 译文题目金融结构与金融发展姓名学号所在学院管理学院专业班级指导教师日期 20xx 年 6 月 28 日目录文献名:作者:文献来源:原文 (1)译文 (10)原文:(可以保留文献的原有格式)译文:(需要有页眉为:20xx级会计专业学年论文)11。
工程跟踪审计 毕业论文外文翻译
中国地质大学长城学院本科毕业论文外文资料翻译系别:管理科学与工程系专业:工程管理姓名:学号:026115392015 年03月03日外文原文Project Tracking Audit2014 -management for development series ©.Tracking Audit.Joseph Duran.With the rapid development of China's socialist market economy, the continuous improvement of people's living standards, increasing social demand for the protection of sound and fast economic development, the state has increased its investment in infrastructure, in order to meet the social power increased demand for power plants as an infrastructure is constantly built. However, at all stages of the construction process of the plant, the functional departments will inevitably occur operations are not standardized, improper use of funds and other violations of trade regulations, to circumvent or minimize the phenomenon of violations occur, we need construction audit tracking.1 Project Tracking AuditConstruction project tracking audit refers to an independent audit institutions and auditors (including the trial of the Association with the audit department of social agencies and professionals) use of audit techniques, in accordance with relevant national laws, regulations and rules and norms, from an investment project for construction projects completion of delivery to the various stages of economic management activities real, legitimate, benefits review, monitoring, analysis and evaluation process. The purpose is to effectively control and a true reflection of the project cost, and safeguard the legitimate rights and interests, improve construction project management, and improve investment efficiency.2 Project Tracking Audit Main ContentConstruction phase of the project is the construction of the entire project during the longest time span, the largest change in phase. To this end the following aspects from the audit and control:Mixed involved in the construction drawings.Understand construction drawings to change the situation, be aware of, and drawings joint hearing to assess the cost of content, for which made reference to theviews irrational content.For construction design evaluation.On one of the major construction program for economic analysis, to see whether the organizational problems due to construction project cost increased content, and some of the construction schedule, process, plan to make reasonable suggestions to further optimize the construction design.Progress payment payment control.According to the progress of measurement engineering, progress payments paid to participate in the project control, progress payment audits to assist owners and visa in time to the project owners report the use of funds.Audit and Control engineering design changes.Engineering design changes to be proposed measurement and assessment, analysis of the impact of design changes proposed cost, multi-protocol changes from preferred a practical, most economical and reasonable changes to the program, and estimates the cost of design changes may be caused by the increase or decrease; closely with the owners and supervision units to minimize design changes occur, and where changes occur in the construction, but also in construction before the change, in order to avoid the occurrence of an event of a claim; to design changes and major site supervision Matters record and briefly stated the cause of the change, background, change the time produced, participants, project location, proposed units. Provide detailed and reliable information on completion of settlement; implementation of design changes track; analysis of the design changes to the responsible party accountableSingle visa for the project be measured and evaluationTo ensure timely visa hidden works, timely measurement, timely assessment, the owner promptly drew attention in the construction process, we will send specialized personnel to go to the site, to fully grasp the project live, check the hidden figure, concealment acceptance records. Check whether the covert project visa by design units, supervision units, construction units and other relevant personnel to the scene acceptance signature until formalities complete, engineering and as-built drawings included in the settlement agreement before. While construction of visa do you calculate the corresponding effort to avoid disputes afterwards. Provide inquiry service for major materials procurement. After completion of the project in accordance with the trust of the owners, I will organize a review team to the completion of settlement construction raised by audit and issue audit reports.3 Construction Project Management Tracking Audit RoleTracking audit runs through the whole process of construction, which is reflected in the project feasibility study, preparation of audit the estimates, bidding to design drawings comparative economic rationality, preparation of construction drawing budget, project, construction of the design contract terms of the contract review and tentative pricing or armor for material (equipment) inquiry bidding, design changes and economic engineering review visa metering, metering project progress payments audit, on preliminary engineering and much more settled, all the required determine the cost of the project, control, supervision and management of the entire process. After the settlement is to audit before, during, an extension of the whole process of auditing methods, so that the whole project implementation in a controlled state, can effectively overcome the limitations of post-supervision.Strengthening the design and drawings economically rational argument comparing the design phase. Tracking audit unit shall assist the construction unit costs low, while focusing on the design, the design of the unit design, drawings demonstrate whether the economy is reasonable, good control of the project cost from the design source.To focus on BOQ preparation of the tender price control review, while the project tender documents, the relevant provisions of the construction contract cost audit should focus on.By tracking the audit will help make up for the lack of project supervision of investment management deficiencies, and promote supervision fulfill their duties to complete the job. By tracking the audit, valuation and cost management can better control, supervision and other relevant departments to errors caused the project to make timely corrections and accountability.In the construction process, due to the constraints of geological conditions, etc. are not visible using functional adjustment factors, design changes are inevitable, change each case has a variety of programs to choose from, audit tracking unit for supervision and construction units proposed design change economic and technical analysis, optimization tips, making basis for the construction units.As a follow-up audit unit should grasp a lot of building materials, the actual market price information equipment to help build a more accurate unit through inquiry, bidding or competitive negotiation to determine a reasonable price of materials and equipment, so as to control or reduce the project The purpose of cost;For the construction site technical changes and engineering visa, the auditor should be timely and accurate tracking of nuclear volume pricing, written in time for visa formalities, as the completion of final accounts basis, especially for the future settlement of the exact amount of nuclear difficult part of the project, hidden engineering, auditors must metering site, in order to avoid controversy in theaccounts.In control engineering progress payments payments, tracking audit units in accordance with the provisions of core prices, calculate the project cost has been completed within the scope of the contract payment percentage, made progress billings paid advice, progress billing control of the whole.4 Construction Project Management Tracking Audit ApproachAnd AttentionTo keep track of audit independence, objectivity, fairness impartiality. Pay attention to distinguish the audit tracking and project management.To keep track of the coordination of audit work and construction management. Do active service, actively cooperate.Choose a good follow-up audit units, while based on the choice of a good follow-up audit team, the key is to do the follow-up audit, decided to track the success of the audit work.Strengthen on-site follow-up audit personnel management and supervision, improve the overall quality and comprehensive on-site tracking service level auditors. This mainly includes two aspects. On the one hand the construction unit through the development of rules and regulations related to the project site constraints auditors and management, construction site management personnel stationed parties conduct their supervision. More importantly, on the other hand is the follow-up audit units to strengthen the presence of the project site audit personnel management, including: First, according to various tracking audit services, with corresponding tracking professional auditors. Second track auditor must comply with ethical and abide by an independent, objective and impartial manner, the personal and professional ethics, responsibility, skill level as an entry site audit assessment indicators. Third, the establishment of self-discipline system. Independent audit strictly enforced discipline and abide by professional ethics. Fourth, the strict implementation of the professionals from the school, the project leader for review, three quality control person in charge of the technical audit.外文资料翻译译文工程跟踪审计2014–管理发展系列《跟踪审计》约瑟夫·戴瑞随着我国社会主义市场经济的蓬勃发展,人民生活水平的不断提高,社会需求不断增加,为保障国民经济又好又快发展,国家加大了对基础设施建设的投入力度,为满足社会用电加大的需求,电厂作为一项基础设施正在不断地建造。
毕业论文外文翻译范例
外文原文(一)Savigny and his Anglo-American Disciple s*M. H. HoeflichFriedrich Carl von Savigny, nobleman, law reformer, champion of the revived German professoriate, and founder of the Historical School of jurisprudence, not only helped to revolutionize the study of law and legal institutions in Germany and in other civil law countries, but also exercised a profound influence on many of the most creative jurists and legal scholars in England and the United States. Nevertheless, tracing the influence of an individual is always a difficult task. It is especially difficult as regards Savigny and the approach to law and legal sources propounded by the Historical School. This difficulty arises, in part, because Savigny was not alone in adopting this approach. Hugo, for instance, espoused quite similar ideas in Germany; George Long echoed many of these concepts in England during the 1850s, and, of course, Sir Henry Sumner Maine also espoused many of these same concepts central to historical jurisprudence in England in the 1860s and 1870s. Thus, when one looks at the doctrinal writings of British and American jurists and legal scholars in the period before 1875, it is often impossible to say with any certainty that a particular idea which sounds very much the sort of thing that might, indeed, have been derived from Savigny's works, was, in fact, so derived. It is possible, nevertheless, to trace much of the influence of Savigny and his legal writings in the United States and in Great Britain during this period with some certainty because so great was his fame and so great was the respect accorded to his published work that explicit references to him and to his work abound in the doctrinal writing of this period, as well as in actual law cases in the courts. Thus, Max Gutzwiller, in his classic study Der einfluss Savignys auf die Entwicklung des International privatrechts, was able to show how Savigny's ideas on conflict of laws influenced such English and American scholars as Story, Phillimore, Burge, and Dicey. Similarly, Andreas Schwarz, in his "Einflusse Deutscher Zivilistik im Auslande," briefly sketched Savigny's influence upon John Austin, Frederick Pollock, and James Bryce. In this article I wish to examine Savigny's influence over a broader spectrum and to draw a picture of his general fame and reputation both in Britain and in the United States as the leading Romanist, legal historian, and German legal academic of his day. The picture of this Anglo-American respect accorded to Savigny and the historical school of jurisprudence which emerges from these sources is fascinating. It sheds light not only upon Savigny’s trans-channel, trans-Atlantic fame, but also upon the extraordinarily*M.H.Hoeflich, Savigny and his Anglo-American Disciples, American Journal of Comparative Law, vol.37, No.1, 1989.cosmopolitan outlook of many of the leading American and English jurists of the time. Of course, when one sets out to trace the influence of a particular individual and his work, it is necessary to demonstrate, if possible, precisely how knowledge of the man and his work was transmitted. In the case of Savigny and his work on Roman law and ideas of historical jurisprudence, there were three principal modes of transmission. First, there was the direct influence he exercised through his contacts with American lawyers and scholars. Second, there was the influence he exercised through his books. Third, there was the influence he exerted indirectly through intermediate scholars and their works. Let us examine each mode separately.I.INFLUENCE OF THE TRANSLATED WORKSWhile American and British interest in German legal scholarship was high in the antebellum period, the number of American and English jurists who could read German fluently was relatively low. Even those who borrowed from the Germans, for instance, Joseph Story, most often had to depend upon translations. It is thus quite important that Savigny’s works were amongst the most frequently translated into English, both in the United States and in Great Britain. His most influential early work, the Vom Beruf unserer Zeitfur Rechtsgeschichte und Gestzgebung, was translated into English by Abraham Hayward and published in London in 1831. Two years earlier the first volume of his History of Roman Law in the Middle Ages was translated by Cathcart and published in Edinburgh. In 1830, as well, a French translation was published at Paris. Sir Erskine Perry's translation of Savigny's Treatise on Possession was published in London in 1848. This was followed by Archibald Brown's epitome of the treatise on possession in 1872 and Rattigan's translation of the second volume of the System as Jural Relations or the Law of Persons in 1884. Guthrie published a translation of the seventh volume of the System as Private International Law at Edinburgh in 1869. Indeed, two English translations were even published in the far flung corners of the British Raj. A translation of the first volume of the System was published by William Holloway at Madras in 1867 and the volume on possession was translated by Kelleher and published at Calcutta in 1888. Thus, the determined English-speaking scholar had ample access to Savigny's works throughout the nineteenth century.Equally important for the dissemination of Savigny's ideas were those books and articles published in English that explained and analyzed his works. A number of these must have played an important role in this process. One of the earliest of these is John Reddie's Historical Notices of the Roman law and of the Progress of its Study in Germany, published at Edinburgh in 1826. Reddie was a noted Scots jurist and held the Gottingen J.U.D. The book, significantly, is dedicated to Gustav Hugo. It is of that genre known as an external history of Roman law-not so much a history of substantive Roman legal doctrine but rather a historyof Roman legal institutions and of the study of Roman law from antiquity through the nineteenth century. It is very much a polemic for the study of Roman law and for the Historical School. It imparts to the reader the excitement of Savigny and his followers about the study of law historically and it is clear that no reader of the work could possibly be left unmoved. It is, in short, the first work of public relations in English on behalf of Savigny and his ideas.Having mentioned Reddie's promotion of Savigny and the Historical School, it is important to understand the level of excitement with which things Roman and especially Roman law were greeted during this period. Many of the finest American jurists were attracted-to use Peter Stein's term-to Roman and Civil law, but attracted in a way that, at times, seems to have been more enthusiastic than intellectual. Similarly, Roman and Civil law excited much interest in Great Britain, as illustrated by the distinctly Roman influence to be found in the work of John Austin. The attraction of Roman and Civil law can be illustrated and best understood, perhaps, in the context of the publicity and excitement in the English-speaking world surrounding the discovery of the only complete manuscript of the classical Roman jurist Gaius' Institutes in Italy in 1816 by the ancient historian and German consul at Rome, B.G. Niebuhr. Niebuhr, the greatest ancient historian of his time, turned to Savigny for help with the Gaius manuscript (indeed, it was Savigny who recognized the manuscript for what it was) and, almost immediately, the books and journals-not just law journals by any means-were filled with accounts of the discovery, its importance to legal historical studies, and, of course, what it said. For instance, the second volume of the American Jurist contains a long article on the civil law by the scholarly Boston lawyer and classicist, John Pickering. The first quarter of the article is a gushing account of the discovery and first publication of the Gaius manuscript and a paean to Niebuhr and Savigny for their role in this. Similarly, in an article published in the London Law Magazine in 1829 on the civil law, the author contemptuously refers to a certain professor who continued to tell his students that the text of Gaius' Institutes was lost for all time. What could better show his ignorance of all things legal and literary than to be unaware of Niebuhr's great discovery?Another example of this reaction to the discovery of the Gaius palimpsest is to be found in David Irving's Introduction to the Study of the Civil Law. This volume is also more a history of Roman legal scholarship and sources than a study of substantive Roman law. Its pages are filled with references to Savigny's Geschichte and its approach clearly reflects the influence of the Historical School. Indeed, Irving speaks of Savigny's work as "one of the most remarkable productions of the age." He must have been truly impressed with German scholarship and must also have been able to convince the Faculty of Advocates, forwhom he was librarian, of the worth of German scholarship, for in 1820 the Faculty sent him to Gottingen so that he might study their law libraries. Irving devotes several pages of his elementary textbook on Roman law to the praise of the "remarkable" discovery of the Gaius palimpsest. He traces the discovery of the text by Niebuhr and Savigny in language that would have befitted an adventure tale. He elaborates on the various labors required to produce a new edition of the text and was particularly impressed by the use of a then new chemical process to make the under text of the palimpsest visible. He speaks of the reception of the new text as being greeted with "ardor and exultation" strong words for those who spend their lives amidst the "musty tomes" of the Roman law.This excitement over the Verona Gaius is really rather strange. Much of the substance of the Gaius text was already known to legal historians and civil lawyers from its incorporation into Justinian's Institutes and so, from a substantive legal perspective, the find was not crucial. The Gaius did provide new information on Roman procedural rules and it did also provide additional information for those scholars attempting to reconstruct pre-Justinianic Roman law. Nevertheless, these contributions alone seem hardly able to justify the excitement the discovery caused. Instead, I think that the Verona Gaius discovery simply hit a chord in the literary and legal community much the same as did the discovery of the Rosetta Stone or of Schliemann’s Troy. Here was a monument of a great civilization brought newly to light and able to be read for the first time in millenia. And just as the Rosetta Stone helped to establish the modern discipline of Egyptology and Schliemann's discoveries assured the development of classical archaeology as a modern academic discipline, the discovery of the Verona Gaius added to the attraction Roman law held for scholars and for lawyers, even amongst those who were not Romanists by profession. Ancillary to this, the discovery and publication of the Gaius manuscript also added to the fame of the two principals involved in the discovery, Niebuhr and Savigny. What this meant in the English-speaking world is that even those who could not or did not wish to read Savigny's technical works knew of him as one of the discoverers of the Gaius text. This fame itself may well have helped in spreading Savigny's legal and philosophical ideas, for, I would suggest, the Gaius "connection" may well have disposed people to read other of Savigny's writings, unconnected to the Gaius, because they were already familiar with his name.Another example of an English-speaking promoter of Savigny is Luther Stearns Cushing, a noted Boston lawyer who lectured on Roman law at the Harvard Law School in 1848-49 and again in 1851- 1852.Cushing published his lectures at Boston in 1854 under the title An Introduction to the Study of Roman Law. He devoted a full chapter to a description of the historical school and to the controversy betweenSavigny and Thibaut over codification. While Cushing attempted to portray fairly the arguments of both sides, he left no doubt as to his preference for Savigny's approach:The labors of the historical school have established an entirely new and distinct era in the study of the Roman jurisprudence; and though these writers cannot be said to have thrown their predecessors into the shade, it seems to be generally admitted, that almost every branch of the Roman law has received some important modification at their hands, and that a knowledge of their writings, to some extent, at least, is essentially necessary to its acquisition.译文(一)萨维尼和他的英美信徒们*M·H·豪弗里奇弗雷德里奇·卡尔·冯·萨维尼出身贵族,是一位出色的法律改革家,也是一位倡导重建德国教授协会的拥护者,还是历史法学派的创建人之一。
毕业论文的外文翻译
毕业论文的外文翻译Graduation Thesis AbstractTitle: The Impact of Social Media on Consumer BehaviorWith the rapid development of social media in recent years, it has become a dominant force in shaping consumer behavior. This study aims to explore the impact of social media on consumer behavior and the factors that influence this impact.This research utilizes a mixed-methods approach, combining both qualitative and quantitative analysis. The qualitative analysis includes a thorough review of existing literature and case studies of successful marketing campaigns on social media platforms. The quantitative analysis involves a survey of 200 participants, aiming to gather data on their social media usage and its influence on their purchasing decisions.The findings of this study reveal that social media has a significant impact on consumer behavior. Firstly, social media provides consumers with a platform to engage with brands, to seek product information and recommendations from peers. Secondly, social media influencers play a crucial role in shaping consumer preferences and purchase intentions. Thirdly, social media advertising and promotions effectively reach and engage target audiences, contributing to the decision-making process. Additionally, this study identifies several factors that influence the impact of social media on consumer behavior. Firstly, the credibility and trustworthiness of information shared on socialmedia platforms affect consumers' willingness to accept and act upon it. Secondly, the level of engagement and interaction between consumers and brands determines the effectiveness of social media marketing campaigns. Lastly, the influence of social media varies across different consumer demographics, such as age, gender, and socio-economic status.In conclusion, social media has become an indispensable tool for marketers to reach and influence consumers. By understanding the impact and factors that influence consumer behavior on social media, marketers can develop more effective marketing strategies to connect with their target audience. However, it is essential for marketers to continually adapt and evolve their strategies as social media landscape is continuously changing. By harnessing the power of social media, businesses can gain a competitive advantage in the marketplace.。
本科毕业设计(论文)外文翻译译文
本科毕业设计(论文)外文翻译译文学生姓名:院(系):油气资源学院专业班级:物探0502指导教师:完成日期:年月日地震驱动评价与发展:以玻利维亚冲积盆地的研究为例起止页码:1099——1108出版日期:NOVEMBER 2005THE LEADING EDGE出版单位:PanYAmericanYEnergyvBuenosYAiresvYArgentinaJPYBLANGYvYBPYExplorationvYHoustonvYUSAJ.C.YCORDOVAandYE.YMARTINEZvYChacoYS.A.vYSantaYCruzvYBolivia 通过整合多种地球物理地质技术,在玻利维亚冲积盆地,我们可以减少许多与白垩纪储集层勘探有关的地质技术风险。
通过对这些远景区进行成功钻探我们可以验证我们的解释。
这些方法包括盆地模拟,联井及地震叠前同时反演,岩石性质及地震属性解释,A VO/A V A,水平地震同相轴,光谱分解。
联合解释能够得到构造和沉积模式的微笑校正。
迄今为止,在新区有七口井已经进行了成功钻探。
基质和区域地质。
Tarija/Chaco盆地的subandean 褶皱和冲断带山麓的中部和南部,部分扩展到玻利维亚的Boomerange地区经历了集中的成功的开采。
许多深大的泥盆纪气田已经被发现,目前正在生产。
另外在山麓发现的规模较小较浅的天然气和凝析气田和大的油田进行价格竞争,如果他们能产出较快的油流而且成本低。
最近发现气田就是这种情况。
接下来,我们赋予Aguja的虚假名字就是为了讲述这些油田的成功例子。
图1 Aguja油田位于玻利维亚中部Chaco盆地的西北角。
基底构造图显示了Isarzama背斜的相对位置。
地层柱状图显示了主要的储集层和源岩。
该油田在Trija和冲积盆地附近的益背斜基底上,该背斜将油田和Ben i盆地分开(图1),圈闭类型是上盘背斜,它存在于连续冲断层上,Aguja有两个主要结构:Aguja中部和Aguja Norte,通过重要的转换压缩断层将较早开发的“Sur”油田分开Yantata Centro结构是一个三路闭合对低角度逆冲断层并伴随有小的摆幅。
3000字的本科毕业外文文献翻译(格式标准)
本科毕业生外文文献翻译学生姓名:指导教师:所在学院:专业:中国·大庆2013 年5 月Chapter 1IntroductionSpread-spectrum techniques are methods by which a signal (e.g. an electrical, electromagnetic, or acoustic signal ) generated in a particular bandwidth is deliberately spread in the frequency domain, resulting in a signal with a wider bandwidth. These techniques are used for a variety of reasons, including the establishment of secure communications, increasing resistance to natural interference and jamming, to prevent detection, and to limit power flux density (e.g. in satellite downlinks).1.1 History Frequency hoppingThe concept of frequency hopping was first alluded to in the 1903 U.S. Patent 723,188 and U.S. Patent 725,605 filed by Nikola Tesla in July 1900. Tesla came up with the idea after demonstrating the world's first radio-controlled submersible boat in 1898, when it became apparent the wireless signals controlling the boat needed to be secure from "being disturbed, intercepted, or interfered with in any way." His patents covered two fundamentally different techniques for achieving immunity to interference, both of which functioned by altering the carrier frequency or other exclusive characteristic. The first had a transmitter that worked simultaneously at two or more separate frequencies and a receiver in which each of the individual transmitted frequencies had to be tuned in, in order for the control circuitry to respond. The second technique used a variable-frequency transmitter controlled by an encoding wheel that altered the transmitted frequency in a predetermined manner. These patents describe the basic principles of frequency hopping and frequency-division multiplexing, and also the electronic AND-gate logic circuit.Frequency hopping is also mentioned in radio pioneer Johannes Zenneck's book Wireless Telegraphy (German, 1908, English translation McGraw Hill, 1915), although Zenneck himself states that Telefunken had already tried it several years earlier. Zenneck's book was a leading text of the time, and it is likely that many later engineers were aware of it. A Polish engineer, Leonard Danilewicz, came up with the idea in 1929.Several other patents were taken out in the 1930s, including one by Willem Broertjes (Germany 1929, U.S. Patent 1,869,695, 1932). During World War II, the US Army Signal Corps was inventing a communication system called SIGSALY for communication between Roosevelt and Churchill, which incorporated spread spectrum, but due to its top secret nature, SIGSALY's existence did not become known until the 1980s.The most celebrated invention of frequency hopping was that of actress Hedy Lamarr and composer George Antheil, who in 1942 received U.S. Patent 2,292,387 for their "Secret Communications System". Lamarr had learned about the problem at defense meetings she had attended with her former husband Friedrich Mandl, who was an Austrian arms manufacturer. The Antheil-Lamarr version of frequency hopping used a piano-roll to change among 88 frequencies, and was intended to make radio-guided torpedoes harder for enemies to detect or to jam. The patent came to light during patent searches in the 1950s when ITT Corporation and other privatefirms began to develop Code Division Multiple Access (CDMA), a civilian form of spread spectrum, though the Lamarr patent had no direct impact on subsequent technology. It was in fact ongoing military research at MIT Lincoln Laboratory, Magnavox Government & Industrial Electronics Corporation, ITT and Sylvania Electronic Systems that led to early spread-spectrum technology in the 1950s. Parallel research on radar systems and a technologically similar concept called "phase coding" also had an impact on spread-spectrum development.1.2 Commercial useThe 1976 publication of Spread Spectrum Systems by Robert Dixon, ISBN 0-471-21629-1, was a significant milestone in the commercialization of this technology. Previous publications were either classified military reports or academic papers on narrow subtopics. Dixon's book was the first comprehensive unclassified review of the technology and set the stage for increasing research into commercial applications.Initial commercial use of spread spectrum began in the 1980s in the US with three systems: Equatorial Communications System's very small aperture (VSAT) satellite terminal system for newspaper newswire services, Del Norte Technology's radio navigation system for navigation of aircraft for crop dusting and similar applications, and Qualcomm's OmniTRACS system for communications to trucks. In the Qualcomm and Equatorial systems, spread spectrum enabled small antennas that viewed more than one satellite to be used since the processing gain of spread spectrum eliminated interference. The Del Norte system used the high bandwidth of spread spectrum to improve location accuracy.In 1981, the Federal Communications Commission started exploring ways to permit more general civil uses of spread spectrum in a Notice of Inquiry docket. This docket was proposed to FCC and then directed by Michael Marcus of the FCC staff. The proposals in the docket were generally opposed by spectrum users and radio equipment manufacturers, although they were supported by the then Hewlett-Packard Corp. The laboratory group supporting the proposal would later become part of Agilent.The May 1985 decision in this docket permitted unlicensed use of spread spectrum in 3 bands at powers up to 1 Watt. FCC said at the time that it would welcome additional requests for spread spectrum in other bands.The resulting rules, now codified as 47 CFR 15.247 permitted Wi-Fi, Bluetooth, and many other products including cordless telephones. These rules were then copied in many other countries. Qualcomm was incorporated within 2 months after the decision to commercialize CDMA.1.3 Spread-spectrum telecommunicationsThis is a technique in which a (telecommunication) signal is transmitted on a bandwidth considerably larger than the frequency content of the original information.Spread-spectrum telecommunications is a signal structuring technique that employs direct sequence, frequency hopping, or a hybrid of these, which can be used for multiple access and/or multiple functions. This technique decreases the potential interference to other receivers while achieving privacy. Spread spectrum generally makes use of a sequential noise-like signalstructure to spread the normally narrowband information signal over a relatively wideband (radio) band of frequencies. The receiver correlates the received signals to retrieve the original information signal. Originally there were two motivations: either to resist enemy efforts to jam the communications (anti-jam, or AJ), or to hide the fact that communication was even taking place, sometimes called low probability of intercept (LPI).Frequency-hopping spread spectrum (FHSS), direct-sequence spread spectrum (DSSS), time-hopping spread spectrum (THSS), chirp spread spectrum (CSS), and combinations of these techniques are forms of spread spectrum. Each of these techniques employs pseudorandom number sequences —created using pseudorandom number generators —to determine and control the spreading pattern of the signal across the alloted bandwidth. Ultra-wideband (UWB) is another modulation technique that accomplishes the same purpose, based on transmitting short duration pulses. Wireless Ethernet standard IEEE 802.11 uses either FHSS or DSSS in its radio interface.Chapter 22.1 Spread-spectrum clock signal generationSpread-spectrum clock generation (SSCG) is used in some synchronous digital systems, especially those containing microprocessors, to reduce the spectral density of the electromagnetic interference (EMI) that these systems generate. A synchronous digital system is one that is driven by a clock signal and because of its periodic nature, has an unavoidably narrow frequency spectrum. In fact, a perfect clock signal would have all its energy concentrated at a single frequency and its harmonics, and would therefore radiate energy with an infinite spectral density. Practical synchronous digital systems radiate electromagnetic energy on a number of narrow bands spread on the clock frequency and its harmonics, resulting in a frequency spectrum that, at certain frequencies, can exceed the regulatory limits for electromagnetic interference (e.g. those of the FCC in the United States, JEITA in Japan and the IEC in Europe).To avoid this problem, which is of great commercial importance to manufacturers, spread-spectrum clocking is used. This consists of using one of the methods described in the Spread-spectrum telecommunications section in order to reduce the peak radiated energy. The technique therefore reshapes the system's electromagnetic emissions to comply with the electromagnetic compatibility (EMC) regulations. It is a popular technique because it can be used to gain regulatory approval with only a simple modification to the equipment.Spread-spectrum clocking has become more popular in portable electronics devices because of faster clock speeds and the increasing integration of high-resolution LCD displays in smaller and smaller devices. Because these devices are designed to be lightweight and inexpensive, passive EMI reduction measures such as capacitors or metal shielding are not a viable option. Active EMI reduction techniques such as spread-spectrum clocking are necessary in these cases, but can also create challenges for designers. Principal among these is the risk that modifying th e system clock runs the risk of the clock/data misalignment.2.2Direct-sequence spread spectrumIn telecommunications, direct-sequence spread spectrum (DSSS) is a modulation technique. As with other spread spectrum technologies, the transmitted signal takes up more bandwidth than the information signal that is being modulated. The name 'spread spectrum' comes from the fact that the carrier signals occur over the full bandwidth (spectrum) of a device's transmitting frequency.2.2.1Features1.It phase-modulates a sine wave pseudorandomly with a continuous string ofpseudonoise (PN) code symbols called "chips", each of which has a much shorter duration than an information bit. That is, each information bit is modulated by a sequence of much faster chips. Therefore, the chip rate is much higher than the information signal bit rate.2. It uses a signal structure in which the sequence of chips produced by the transmitter isknown a priori by the receiver. The receiver can then use the same PN sequence to counteract the effect of the PN sequence on the received signal in order to reconstruct the informationsignal.2.2.2Transmission methodDirect-sequence spread-spectrum transmissions multiply the data being transmitted by a "noise" signal. This noise signal is a pseudorandom sequence of 1 and −1 values, at a frequency much higher than that of the original signal, thereby spreading the energy of the original signal into a much wider band.The resulting signal resembles white noise, like an audio recording of "static". However, this noise-like signal can be used to exactly reconstruct the original data at the receiving end, by multiplying it by the same pseudorandom sequence (because 1 × 1 = 1, and −1 × −1 = 1). This process, known as "de-spreading", mathematically constitutes a correlation of the transmitted PN sequence with the PN sequence that the receiver believes the transmitter is using.For de-spreading to work correctly, the transmit and receive sequences must be synchronized. This requires the receiver to synchronize its sequence with the transmitter's sequence via some sort of timing search process. However, this apparent drawback can be a significant benefit: if the sequences of multiple transmitters are synchronized with each other, the relative synchronizations the receiver must make between them can be used to determine relative timing, which, in turn, can be used to calculate the receiver's position if the transmitters' positions are known. This is the basis for many satellite navigation systems.The resulting effect of enhancing signal to noise ratio on the channel is called process gain. This effect can be made larger by employing a longer PN sequence and more chips per bit, but physical devices used to generate the PN sequence impose practical limits on attainable processing gain.If an undesired transmitter transmits on the same channel but with a different PN sequence (or no sequence at all), the de-spreading process results in no processing gain for that signal. This effect is the basis for the code division multiple access (CDMA) property of DSSS, which allows multiple transmitters to share the same channel within the limits of the cross-correlation properties of their PN sequences.As this description suggests, a plot of the transmitted waveform has a roughly bell-shaped envelope centered on the carrier frequency, just like a normal AM transmission, except that the added noise causes the distribution to be much wider than that of an AM transmission.In contrast, frequency-hopping spread spectrum pseudo-randomly re-tunes the carrier, instead of adding pseudo-random noise to the data, which results in a uniform frequency distribution whose width is determined by the output range of the pseudo-random number generator.2.2.3Benefits∙Resistance to intended or unintended jamming∙Sharing of a single channel among multiple users∙Reduced signal/background-noise level hampers interception (stealth)∙Determination of relative timing between transmitter and receiver2.2.4Uses∙The United States GPS and European Galileo satellite navigation systems∙DS-CDMA (Direct-Sequence Code Division Multiple Access) is a multiple access scheme based on DSSS, by spreading the signals from/to different users with different codes.It is the most widely used type of CDMA.∙Cordless phones operating in the 900 MHz, 2.4 GHz and 5.8 GHz bands∙IEEE 802.11b 2.4 GHz Wi-Fi, and its predecessor 802.11-1999. (Their successor 802.11g uses OFDM instead)∙Automatic meter reading∙IEEE 802.15.4 (used e.g. as PHY and MAC layer for ZigBee)2.3 Frequency-hopping spread spectrumFrequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly switching a carrier among many frequency channels, using a pseudorandom sequence known to both transmitter and receiver. It is utilized as a multiple access method in the frequency-hopping code division multiple access (FH-CDMA) scheme.A spread-spectrum transmission offers three main advantages over a fixed-frequency transmission:1.Spread-spectrum signals are highly resistant to narrowband interference. Theprocess of re-collecting a spread signal spreads out the interfering signal, causing it to recede into the background.2.Spread-spectrum signals are difficult to intercept. An FHSS signal simply appearsas an increase in the background noise to a narrowband receiver. An eavesdropper would only be able to intercept the transmission if they knew the pseudorandom sequence.3.Spread-spectrum transmissions can share a frequency band with many types ofconventional transmissions with minimal interference. The spread-spectrum signals add minimal noise to the narrow-frequency communications, and vice versa. As a result, bandwidth can be utilized more efficiently.2.3.1 Basic algorithmTypically, the initiation of an FHSS communication is as follows1.The initiating party sends a request via a predefined frequency or control channel.2.The receiving party sends a number, known as a seed.3.The initiating party uses the number as a variable in a predefined algorithm, whichcalculates the sequence of frequencies that must be used. Most often the period of the frequency change is predefined, as to allow a single base station to serve multiple connections.4.The initiating party sends a synchronization signal via the first frequency in thecalculated sequence, thus acknowledging to the receiving party it has correctly calculated the sequence.5.The communication begins, and both the receiving and the sending party changetheir frequencies along the calculated order, starting at the same point in time.2.3.2 Military useSpread-spectrum signals are highly resistant to deliberate jamming, unless the adversary has knowledge of the spreading characteristics. Military radios use cryptographic techniques to generate the channel sequence under the control of a secret Transmission Security Key(TRANSEC) that the sender and receiver share.By itself, frequency hopping provides only limited protection against eavesdropping and jamming. To get around this weakness most modern military frequency hopping radios often employ separate encryption devices such as the KY-57. U.S. military radios that use frequency hopping include HAVE QUICK and SINCGARS.2.3.3Technical considerationsThe overall bandwidth required for frequency hopping is much wider than that required to transmit the same information using only one carrier frequency. However, because transmission occurs only on a small portion of this bandwidth at any given time, the effective interference bandwidth is really the same. Whilst providing no extra protection against wideband thermal noise, the frequency-hopping approach does reduce the degradation caused by narrowband interferers.One of the challenges of frequency-hopping systems is to synchronize the transmitter and receiver. One approach is to have a guarantee that the transmitter will use all the channels in a fixed period of time. The receiver can then find the transmitter by picking a random channel and listening for valid data on that channel. The transmitter's data is identified by a special sequence of data that is unlikely to occur over the segment of data for this channel and the segment can have a checksum for integrity and further identification. The transmitter and receiver can use fixed tables of channel sequences so that once synchronized they can maintain communication by following the table. On each channel segment, the transmitter can send its current location in the table.In the US, FCC part 15 on unlicensed system in the 900MHz and 2.4GHz bands permits more power than non-spread spectrum systems. Both frequency hopping and direct sequence systems can transmit at 1 Watt. The limit is increased from 1 milliwatt to 1 watt or a thousand times increase. The Federal Communications Commission (FCC) prescribes a minimum number of channels and a maximum dwell time for each channel.In a real multipoint radio system, space allows multiple transmissions on the same frequency to be possible using multiple radios in a geographic area. This creates the possibility of system data rates that are higher than the Shannon limit for a single channel. Spread spectrum systems do not violate the Shannon limit. Spread spectrum systems rely on excess signal to noise ratios for sharing of spectrum. This property is also seen in MIMO and DSSS systems. Beam steering and directional antennas also facilitate increased system performance by providing isolation between remote radios.2.3.4 Variations of FHSSAdaptive Frequency-hopping spread spectrum (AFH) (as used in Bluetooth) improves resistance to radio frequency interference by avoiding using crowded frequencies in the hopping sequence. This sort of adaptive transmission is easier to implement with FHSS than with DSSS.The key idea behind AFH is to use only the “good” frequencies, by avoiding the "bad" frequency channels -- perhaps those "bad" frequency channels are experiencing frequency selective fading, or perhaps some third party is trying to communicate on those bands, or perhaps those bands are being actively jammed. Therefore, AFH should be complemented by a mechanism for detecting good/bad channels.However, if the radio frequency interference is itself dynamic, then the strategy of “badchannel removal”, applied in AFH might not work well. For example, if there are several colocated frequency-hopping networks (as Bluetooth Piconet), then they are mutually interfering and the strategy of AFH fails to avoid this interference.In this case, there is a need to use strategies for dynamic adaptation of the frequency hopping pattern.Such a situation can often happen in the scenarios that use unlicensed spectrum.In addition, dynamic radio frequency interference is expected to occur in the scenarios related to cognitive radio, where the networks and the devices should exhibit frequency-agile operation.Chirp modulation can be seen as a form of frequency-hopping that simply scans through the available frequencies in consecutive order.第一章介绍扩频技术是信号(例如一个电气、电磁,或声信号)生成的特定带宽频率域中特意传播,从而导致更大带宽的信号的方法。
全球价值链的治理外文翻译 大学论文
本科毕业论文外文翻译外文题目:The Governance of Global Value Chains出处:Review of International Political Economy作者:Gary Gereffi, John Humphrey, Timothy Sturgeon译文:全球价值链的治理摘要本文构建了一个理论框架来解释全球价值链的治理模式。
它依据交易成本经济学、生产网络、技术能力和企业层面的学习着三方面的文献,定义了在决定全球价值链的治理和变化中其作用的三个变量。
它们分别是:(1)交易的复杂程度,(2)进行交易的能力,(3)供应基地的容量。
这个理论产生了从高到低不同程度的明确合作和权利不对称的五种类型的全球价值链的治理模式——层级型、领导型、关系型、模块型和市场型。
本文通过对自行车、服装、园艺和电子这四个产业的简单案例的研究,强调了全球价值链治理的动态和重叠的本质。
一、引言在过去的几十年里,世界经济特别是在国际贸易和产业组织领域发生了巨大的变化。
当代经济最重要的两个新特征就是生产和贸易的全球化,以及跨国公司的垂直分工。
前者加速了发展中国家的工业能力的增长,后者使得跨国公司的核心竞争力集中在创新和产品策略、营销、高附加值的制造业和服务业,同时减少其对一般服务和批量生产这些非核心的功能的直接所有权。
这两个变化一方面为各种各样的相邻市场间的网络整理形式奠定了基础,另一方面为大型的垂直一体化公司的产生提供了条件。
本文的目的在于构建一个理论框架,为了更好地理解在全球市场的生产中治理结构的转变,这个结构指的是“全球价值链”。
我们的目的在于为已知领域的各种各样的网络形式提供秩序。
全球规模的产业组织的改革不仅仅对企业命运和产业结构产生影响,而且影响了国家如何以及为什么会在全球经济中前进或者停滞不前。
对全球价值链的研究和政策工作检验了全球生产和分工系统一体化的不同方式,以及发展中国家的企业在全球市场上提高地位的能力。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
附录A3 Image Enhancement in the Spatial DomainThe principal objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. The word specific is important, because it establishes at the outset than the techniques discussed in this chapter are very much problem oriented. Thus, for example, a method that is quite useful for enhancing X-ray images may not necessarily be the best approach for enhancing pictures of Mars transmitted by a space probe. Regardless of the method used .However, image enhancement is one of the most interesting and visually appealing areas of image processing.Image enhancement approaches fall into two broad categories: spatial domain methods and frequency domain methods. The term spatial domain refers to the image plane itself, and approaches in this category are based on direct manipulation of pixels in an image. Fourier transform of an image. Spatial methods are covered in this chapter, and frequency domain enhancement is discussed in Chapter 4.Enhancement techniques based on various combinations of methods from these two categories are not unusual. We note also that many of the fundamental techniques introduced in this chapter in the context of enhancement are used in subsequent chapters for a variety of other image processing applications.There is no general theory of image enhancement. When an image is processed for visual interpretation, the viewer is the ultimate judge of how well a particular method works. Visual evaluation of image quality is a highly is highly subjective process, thus making the definition of a “good image” an elusive standard by which to compare algorithm performance. When the problem is one of processing images for machine perception, the evaluation task is somewhat easier. For example, in dealing with a character recognition application, and leaving aside other issues such as computational requirements, the best image processing method would be the one yielding the best machine recognition results. However, even in situations when aclear-cut criterion of performance can be imposed on the problem, a certain amount of trial and error usually is required before a particular image enhancement approach is selected.3.1 BackgroundAs indicated previously, the term spatial domain refers to the aggregate of pixels composing an image. Spatial domain methods are procedures that operate directly on these pixels. Spatial domain processes will be denotes by the expression()[]=(3.1-1)g x y T f x y,(,)where f(x, y) is the input image, g(x, y) is the processed image, and T is an operator on f, defined over some neighborhood of (x, y). In addition, T can operate on a set of input images, such as performing the pixel-by-pixel sum of K images for noise reduction, as discussed in Section 3.4.2.The principal approach in defining a neighborhood about a point (x, y) is to use a square or rectangular subimage area centered at (x, y).The center of the subimage is moved from pixel to starting, say, at the top left corner. The operator T is applied at each location (x, y) to yield the output, g, at that location. The process utilizes only the pixels in the area of the image spanned by the neighborhood. Although other neighborhood shapes, such as approximations to a circle, sometimes are used, square and rectangular arrays are by far the most predominant because of their ease of implementation.The simplest from of T is when the neighborhood is of size 1×1 (that is, a single pixel). In this case, g depends only on the value of f at (x, y), and T becomes a gray-level (also called an intensity or mapping) transformation function of the form=(3.1-2)s T r()where, for simplicity in notation, r and s are variables denoting, respectively, the grey level of f(x, y) and g(x, y)at any point (x, y).Some fairly simple, yet powerful, processing approaches can be formulates with gray-level transformations. Because enhancement at any point in an image depends only on the grey level at that point, techniques in this category often are referred to as point processing.Larger neighborhoods allow considerably more flexibility. The general approach is to use a function of the values of f in a predefined neighborhood of (x, y) to determine the value of g at (x, y). One of the principal approaches in this formulation is based on the use of so-called masks (also referred to as filters, kernels, templates, or windows). Basically, a mask is a small (say, 3×3) 2-Darray, in which the values of the mask coefficients determine the nature of the type of approach often are referred to as mask processing or filtering. These concepts are discussed in Section 3.5.3.2 Some Basic Gray Level TransformationsWe begin the study of image enhancement techniques by discussing gray-level transformation functions. These are among the simplest of all image enhancement techniques. The values of pixels, before and after processing, will be denoted by r and s, respectively. As indicated in the previous section, these values are related by an expression of the from s = T(r), where T is a transformation that maps a pixel value r into a pixel value s. Since we are dealing with digital quantities, values of the transformation function typically are stored in a one-dimensional array and the mappings from r to s are implemented via table lookups. For an 8-bit environment, a lookup table containing the values of T will have 256 entries.As an introduction to gray-level transformations, which shows three basic types of functions used frequently for image enhancement: linear (negative and identity transformations), logarithmic (log and inverse-log transformations), and power-law (nth power and nth root transformations). The identity function is the trivial case in which out put intensities are identical to input intensities. It is included in the graph only for completeness.3.2.1 Image NegativesThe negative of an image with gray levels in the range [0, L-1]is obtained by using the negative transformation show shown, which is given by the expression=--(3.2-1)s L r1Reversing the intensity levels of an image in this manner produces the equivalent of a photographic negative. This type of processing is particularly suited for enhancing white or grey detail embedded in dark regions of an image, especiallywhen the black areas are dominant in size.3.2.2 Log TransformationsThe general from of the log transformation is=+(3.2-2)log(1)s c rWhere c is a constant, and it is assumed that r ≥0 .The shape of the log curve transformation maps a narrow range of low gray-level values in the input image into a wider range of output levels. The opposite is true of higher values of input levels. We would use a transformation of this type to expand the values of dark pixels in an image while compressing the higher-level values. The opposite is true of the inverse log transformation.Any curve having the general shape of the log functions would accomplish this spreading/compressing of gray levels in an image. In fact, the power-law transformations discussed in the next section are much more versatile for this purpose than the log transformation. However, the log function has the important characteristic that it compresses the dynamic range of image characteristics of spectra. It is not unusual to encounter spectrum values that range from 0 to 106 or higher. While processing numbers such as these presents no problems for a computer, image display systems generally will not be able to reproduce faithfully such a wide range of intensity values .The net effect is that a significant degree of detail will be lost in the display of a typical Fourier spectrum.3.2.3 Power-Law TransformationsPower-Law transformations have the basic froms crϒ=(3.2-3) Where c and y are positive constants .Sometimes Eq. (3.2-3) is written as to account for an offset (that is, a measurable output when the input is zero). However, offsets typically are an issue of display calibration and as a result they are normally ignored in Eq. (3.2-3). Plots of s versus r for various values of y are shown in Fig.3.6. As in the case of the log transformation, power-law curves with fractional values of y map a narrow range of dark input values into a wider range of output values, with theopposite being true for higher values of input levels. Unlike the log function, however, we notice here a family of possible transformation curves obtained simply by varying y. As expected, we see in Fig.3.6 that curves generated with values of y>1 have exactly the opposite effect as those generated with values of y<1. Finally, we note that Eq.(3.2-3) reduces to the identity transformation when c = y = 1.A variety of devices used for image capture, printing, and display respond according to as gamma[hence our use of this symbol in Eq.(3.2-3)].The process used to correct this power-law response phenomena is called gamma correction.Gamma correction is important if displaying an image accurately on a computer screen is of concern. Images that are not corrected properly can look either bleached out, or, what is more likely, too dark. Trying to reproduce colors accurately also requires some knowledge of gamma correction because varying the value of gamma correcting changes not only the brightness, but also the ratios of red to green to blue. Gamma correction has become increasingly important in the past few years, as use of digital images for commercial purposes over the Internet has increased. It is not Internet has increased. It is not unusual that images created for a popular Web site will be viewed by millions of people, the majority of whom will have different monitors and/or monitor settings. Some computer systems even have partial gamma correction built in. Also, current image standards do not contain the value of gamma with which an image was created, thus complicating the issue further. Given these constraints, a reasonable approach when storing images in a Web site is to preprocess the images with a gamma that represents in a Web site is to preprocess the images with a gamma that represents an “average” of the types of monitors and computer systems that one expects in the open market at any given point in time.3.2.4 Piecewise-Linear Transformation FunctionsA complementary approach to the methods discussed in the previous three sections is to use piecewise linear functions. The principal advantage of piecewise linear functions over the types of functions we have discussed thus far is that the form of piecewise functions can be arbitrarily complex. In fact, as we will see shortly, a practical implementation of some important transformations can be formulated onlyas piecewise functions. The principal disadvantage of piecewise functions is that their specification requires considerably more user input.Contrast stretchingOne of the simplest piecewise linear functions is a contrast-stretching transformation. Low-contrast images can result from poor illumination, lack of dynamic range in the imaging sensor, or even wrong setting of a lens aperture during image acquisition. The idea behind contrast stretching is to increase the dynamic range of the gray levels in the image being processed.Gray-level slicingHighlighting a specific range of gray levels in an image often is desired. Applications include enhancing features such as masses of water in satellite imagery and enhancing flaws in X-ray images. There are several ways of doing level slicing, but most of them are variations of two basic themes. One approach is to display a high value for all gray levels in the range of interest and a low value for all other gray levels.Bit-plane slicingInstead of highlighting gray-level ranges, highlighting the contribution made to total image appearance by specific bits might be desired. Suppose that each pixel in an image is represented by 8 bits. Imagine that the image is composed of eight 1-bit planes, ranging from bit-plane 0 for the least significant bit to bit-plane 7 for the most significant bit. In terms of 8-bit bytes, plane 0 contains all the lowest order bits in the bytes comprising the pixels in the image and plane 7 contains all the high-order bits.3.3 Histogram ProcessingThe histogram of a digital image with gray levels in the range [0, L-1] is a discrete function , where is the kth gray level and is the number of pixels in the image having gray level . It is common practice to pixels in the image, denoted by n. Thus, a normalized histogram is given by , for , Loosely speaking, gives an estimate of the probability of occurrence of gray level . Note that the sum of all components of a normalized histogram is equal to 1.Histograms are the basis for numerous spatial domain processing techniques.Histogram manipulation can be used effectively for image enhancement, as shown in this section. In addition to providing useful image statistics, we shall see in subsequent chapters that the information inherent in histograms also is quite useful in other image processing applications, such as image compression and segmentation. Histograms are simple to calculate in software and also lend themselves to economic hardware implementations, thus making them a popular tool for real-time image processing.附录B第三章空间域图像增强增强的首要目标是处理图像,使其比原始图像格式和特定应用。