毕业设计英文论文翻译,五千字,翻译原文
毕业设计中英文翻译【范本模板】
英文The road (highway)The road is one kind of linear construction used for travel。
It is made of the roadbed,the road surface, the bridge, the culvert and the tunnel. In addition, it also has the crossing of lines, the protective project and the traffic engineering and the route facility。
The roadbed is the base of road surface, road shoulder,side slope, side ditch foundations. It is stone material structure, which is designed according to route's plane position .The roadbed, as the base of travel, must guarantee that it has the enough intensity and the stability that can prevent the water and other natural disaster from corroding.The road surface is the surface of road. It is single or complex structure built with mixture。
The road surface require being smooth,having enough intensity,good stability and anti—slippery function. The quality of road surface directly affects the safe, comfort and the traffic。
毕业论文(设计)外文文献翻译及原文
金融体制、融资约束与投资——来自OECD的实证分析R.SemenovDepartment of Economics,University of Nijmegen,Nijmegen(荷兰内梅亨大学,经济学院)这篇论文考查了OECD的11个国家中现金流量对企业投资的影响.我们发现不同国家之间投资对企业内部可获取资金的敏感性具有显著差异,并且银企之间具有明显的紧密关系的国家的敏感性比银企之间具有公平关系的国家的低.同时,我们发现融资约束与整体金融发展指标不存在关系.我们的结论与资本市场信息和激励问题对企业投资具有重要作用这种观点一致,并且紧密的银企关系会减少这些问题从而增加企业获取外部融资的渠道。
一、引言各个国家的企业在显著不同的金融体制下运行。
金融发展水平的差别(例如,相对GDP的信用额度和相对GDP的相应股票市场的资本化程度),在所有者和管理者关系、企业和债权人的模式中,企业控制的市场活动水平可以很好地被记录.在完美资本市场,对于具有正的净现值投资机会的企业将一直获得资金。
然而,经济理论表明市场摩擦,诸如信息不对称和激励问题会使获得外部资本更加昂贵,并且具有盈利投资机会的企业不一定能够获取所需资本.这表明融资要素,例如内部产生资金数量、新债务和权益的可得性,共同决定了企业的投资决策.现今已经有大量考查外部资金可得性对投资决策的影响的实证资料(可参考,例如Fazzari(1998)、 Hoshi(1991)、 Chapman(1996)、Samuel(1998)).大多数研究结果表明金融变量例如现金流量有助于解释企业的投资水平。
这项研究结果解释表明企业投资受限于外部资金的可得性。
很多模型强调运行正常的金融中介和金融市场有助于改善信息不对称和交易成本,减缓不对称问题,从而促使储蓄资金投着长期和高回报的项目,并且提高资源的有效配置(参看Levine(1997)的评论文章)。
因而我们预期用于更加发达的金融体制的国家的企业将更容易获得外部融资.几位学者已经指出建立企业和金融中介机构可进一步缓解金融市场摩擦。
毕业设计英语翻译全文
[1]. These brake systems use compressed air as the energy transmitting medium to actuate the foundation brakes mounted on the axles.The air brake system currently found in commercial vehicles is made up of two subsystems —the pneumatic subsystem and the mechanical subsystem. The pneumatic subsystem includes the compressor, storage reservoirs, treadle valve (or the brake application valve), brake lines, relay valves, quick release valve, brake chambers, etc. The mechanical subsystem starts from the brake chambers and includes push rods, slack adjusters, S-cams, brake pads and brake drums. One of the most important differences between a hydraulic brake system (found in passenger cars) and an air brake system is in their mode of operation. In a hydraulic brake system, the force applied by the driver on the brake pedal is transmitted through the brake fluid to the wheel cylinders mounted on the axles. The driver obtains a sensory feedback in the form of pressure on his/her foot. If there is a leak in the hydraulic brake system, this pressure will decrease and the driver can detect it through the relatively easy motion of the brake pedal. In an air brake system, the application of the brake pedal by the driver meters out compressed air from a supply reservoir to the brake chambers. The force applied by the driver on the brake pedal is utilized in opening certain ports in the treadle valve and is not used to pressurize air in the brake system. This leads to a lack of variation in the sensory feedback to the driver in the case of leaks, worn brake pads and other defects in the brake system.Air brake systems can degrade significantly with use and need periodic inspection and maintenance [2]. As a result, periodic maintenance inspections are performed by fleet owners and roadside enforcement inspections are carried out by state and federal inspection teams. The performance requirements of brakes in newly manufactured and “on-the-road”commercial vehicles in the United States are specified by the Federal Motor V ehicle Safety Standard (FMVSS) 121 [3]and the Federal Motor Carrier Safety Regulation (FMCSR) Part 393 [4], respectively. These regulations specify the stopping distance, deceleration and brake force that should be achieved when the vehicle is braked from an initial speed of 20 mph. Due to the difficulty in carrying out such tests on the road, equivalent methods have been developed to inspect the brake system. A chronology of the development of the various commercial vehicle brake testing procedures used in the United States can be found in [5].Inspection techniques that are currently used to monitor the air brake system can be broadly divided into two categories —“visual inspections”and “performance-based inspections”[6]. Visual inspections include observing the stroke of the push rod, thickness of the brake linings, checking for wear in other components and detecting leaks in the brake system through aural and tactile means. They are subjective, time-consuming and difficult on vehicles with a low ground clearance since an inspector has to go underneath a vehicle to check the brake system. In fact, the average time required for a typical current roadside inspection of a commercial vehicle is 30 min, with approximately half of the time spent on inspecting brakes [7]. Performance-based inspections involve the measurement of the braking force/torque, stopping distance, brake pad temperature, etc. A description of two performance-based brake testers —the roller dynamometer brake tester and the flat plate brake tester —and the associated failure criteria when an air brake system is tested with them can be found in [8]. It is appropriate to point out that, in an appraisal of the future needs of the trucking industry [9], the authors call for the development of improved methods of brake inspections.Also, in recent years, studies have been carried out to develop “Adaptive Cruise Control”(ACC)systems or “Autonomous Intelligent Cruise Control”(AICC) systems. The objective of these systems is to maintain a constant distance between two consecutive vehicles by mainly controlling the engine throttle and the brake system. While most of the research on ACC systems has focused on passenger cars, the benefits of implementing such systems on heavy trucks are significant [10].A typical ACC system for heavy trucks controls the engine throttle, the transmission and the brake system and will be interfaced with existing systems like the Antilock Braking System (ABS), Traction Control System (TCS), etc. A typical truck ABS monitors the speed of the wheels and modulates the brake system pressure in the event of an impending wheel lock-up [11]. The ABS consists of an Electronic Control Unit (ECU) that receives signals from the wheel speed sensors and processes this information to regulate the brake system pressure through modulator valves. It should be noted that ABS does not control the treadle valve to regulate the pressure in the brake system. It reduces the brake system pressure that is “commanded”by the driver when it senses an impending wheel lock-up. It cannot provide a higher pressure than that corresponding to the pedal input from the driver.It is important to note that the ABS modulates the brake system pressure only under conditions when a wheel lock-up is impending. The ABS is disengaged during “normal”braking operations. In fact, it has been pointed out in [12] that ABS is “passive during the vast majority of braking operations”. During such braking operations, the pressure of air in the brake system is the level that is commanded by the driver through the motion of the brake pedal. Hence, in order to implement ACC systems on commercial vehicles it is necessary to develop control schemes that will automatically regulate the brake system pressure during all braking operations.Motivated by the above issues, our overall objective is to develop model-based control and diagnostic systems for air brake systems. Such a model of the air brake system should correlate the pressure transients in all the brake chambers of the air brake system with the treadle valve plunger displacement (i.e., the displacement of the brake pedal) and the supply pressure of air provided from the reservoirs to the treadle and relay valves. We have already developed a model [13], and control and diagnostic schemes [14] and [15]based on this model, for the configuration of the air brake system where the primary circuit of the treadle valve is directly connected to one of the two front brake chambers. This model predicts the pressure transients in a front brake chamber during a given brake application with the input data being the treadle valve plunger displacement and the supply pressure to the treadle valve. In order to extend these control and diagnostic schemes, a model should be developed to predict the response of all the brake chambers in the air brake system. One of the steps involved in obtaining a model for the entire air brake system is to develop a model to predict the response of the relay valve, and this is the focus of this article.We will show in the subsequent sections that a relay valve has three phases (or modes) of operation and the evolution of pressure in each of the modes is different. The transition from one mode to another depends primarily on the pressure in the brake chamber and for this reason, it can be naturally modeled as a hybrid system.This article is organized as follows. In Section 2, we present a brief description of the air brake system and the experimental setup that has been constructed at Texas A&M University. A hybrid dynamical model of the relay valve to predict its pressure response is derived in Section 3. We present the equations governing the motion of the mechanical components in the relay valve and the flow of air in the system. This model is corroborated against experimental data and the resultsare provided in Section 4.2. A brief description of the air brake system and the experimental setupA layout of the air brake system found in a typical tractor is presented in Fig. 1. An engine-driven air compressor is used to compress air and the compressed air is collected in storage reservoirs. The pressure of the compressed air in the reservoirs is regulated by a governor. Compressed air is supplied from these reservoirs to the treadle and relay valves. The driver applies the brake by pressing the brake pedal on the treadle valve. This action meters the compressed air from the supply port of the treadle valve to its delivery port. Then, the compressed air travels from the delivery port of the treadle valve through air hoses to the relay valve (referred to as the service relay valve in Fig. 1) and the quick release valve and finally to the brake chambers mounted on the axles.Fig. 1. A general layout of a truck air brake system.View thumbnail imagesThe S-cam foundation brake, found in more than 85% of the air-braked vehicles in the United States [1], is illustrated in Fig. 2. Compressed air metered from the storage reservoirs enters the brake chamber and acts against the diaphragm, generating a force resulting in the motion of the push rod. The motion of the push rod serves to rotate, through the slack adjuster, a splined shaft on which a cam in the shape of an ‘S’is mounted. The ends of two brake shoes rest on the profile of the S-cam and the rotation of the S-cam pushes the brake shoes outwards so that the brake pads make contact with the rotating drum. This action results in the deceleration of the rotating drum. When the brake pedal is released by the driver, air is exhausted from the brake chamber and the push rod strokes back into the brake chamber thereby rotating the S-cam in the opposite direction. The contact between the brake pads and the drum is now broken and the brake is thus released.Fig. 2. The S-cam foundation brake.View thumbnail imagesA schematic of the experimental setup at Texas A&M University is provided in Fig. 3. Two “Type-20”brake chambers (having an effective cross-sectional area of 20 in2) are mounted on a front axle of a tractor and two “Type-30”brake chambers (having an effective cross-sectional area of 30 in2) are mounted on a fixture designed to simulate the rear axle of a tractor. The air supply to the system is provided by means of two compressors and storage reservoirs. The reservoirs are chosen such that their volume is more than twelve times the volume of the brake chambers that they provide air to, as required by the Federal Motor V ehicle Safety Standard (FMVSS) 121 [3]. Pressure regulators are mounted at the delivery ports of the reservoirs to control the supply pressure to the treadle valve and the relay valve. A cross-sectional view of the treadle valve used in the experiments is illustrated in Fig. 4. The treadle valve consists of two circuits —the primary circuit and the secondary circuit. The delivery port of the primary circuit is connected to the control port of the relay valve and the delivery ports of the relay valve are connected to the two rear brake chambers. The relay valve has a separate port for obtaining compressed air supply from the reservoir. The delivery port of the secondary circuit is connected to the Quick Release V alve (QRV) and the delivery ports of the QRV are connected to the two front brake chambers.Fig. 3. A schematic of the experimental facility.View thumbnail imagesFig. 4. A sectional view of the treadle valve.View thumbnail imagesThe treadle valve is actuated by means of a pneumatic actuator and compressed air is supplied to this actuator from the storage reservoirs through a pressure regulator. The displacement of the treadle valve plunger is measured by means of a displacement transducer. A pressure transducer is mounted at the entrance of each of the four brake chambers by means of a custom designed and fabricated pitot tube fixture. A displacement transducer is mounted on each of the two front brake chamber push rods through appropriately fabricated fixtures in order to measure the push rod stroke. All the transducers are interfaced with a connector block through shielded cables. The connector block is connected to a PCI-MIO-16E-4 Data Acquisition (DAQ) board [16] (mounted on a PCI slot inside a desktop computer) that collects the data during brake application and release. An application program is used to collect and store the data in the computer.3. Modeling the response of the relay valveIn this section, we shall present a description of the model of the relay valve. We adopt a lumped parameter approach in the development of this model. Friction at the sliding surfaces in the treadle and relay valves is neglected since they are well lubricated. The springs present in these valves have been experimentally found to be nearly linear in the range of their operation (except the rubber graduating spring used in the treadle valve, see Fig. 4) and the spring constants have been determined from experimental data. Other parameters such as areas, initial deflections, etc., are measured and used in the model.In this article, our objective is to develop a model for predicting the pressure transients in the rear brake chambers actuated by the relay valve during the brake application process. The relay valve is controlled by means of the compressed air delivered by the primary circuit of the treadle valve during a brake application. We shall consider the configuration of the brake system where the delivery port of the primary circuit of the treadle valve is connected to the control port of the relay valve. Compressed air is provided from the storage reservoirs to the relay valve at its supply port and one of the delivery ports of the relay valve is connected to a rear brake chamber. We shall measure the pressure transients at the primary delivery port of the treadle valve and in the rear brake chamber in our experiments. The pressure measured at the primary delivery port of the treadle valve will be provided as input to the numerical scheme that solves the model equations developed to predict the pressure transients in the rear brake chamber.When the driver presses the brake pedal, the primary piston in the treadle valve (see Fig. 4) first closes the primary exhaust port (by moving a distance equal to xpt) and then opens up the primary inlet port (xpp>xpt, xpp being the displacement of the primary piston from its initial position). This action serves to meter the compressed air from the reservoir to the primary delivery port. We shall refer to this phase as the “apply phase”. When the pressure in the primary circuit increases to a level such that it balances the force applied by the driver, the primary piston closes the primary inlet port with the exhaust port also remaining closed (xpp=xpt). We shall refer to this phase as the “hold phase”. When the driver releases the brake pedal, the primary piston return spring forces the primary piston to its initial position. This action opens the exhaust port (xpp<xpt) and air is exhausted from the primary delivery port to the atmosphere. We shall refer to this phase as the “exhaust phase”. A detailed derivation of the model of the treadle valve can be foundin [13].A schematic of the cross-sectional view of the relay valve used in our experimental setup is presented in Fig. 5. The compressed air from the delivery port of the primary circuit of the treadle valve enters the control port of the relay valve. The resulting force pushes the relay valve piston and the exhaust port of the relay valve is closed when the relay valve piston moves a distance equal to xrpt. Once the pre-loads on the relay valve assembly gasket are overcome, the inlet port of the relay valve is opened (xrpp>xrpt, xrpp being the displacement of the relay valve piston from its initial position). Compressed air is now metered from the supply port of the relay valve to its delivery port and subsequently to the rear brake chambers. This is the apply phase associated with the operation of the relay valve. When the pressure in the delivery port of the relay valve increases to a level such that it balances the forces acting on the relay valve piston due to the compressed air from the treadle valve, the inlet port of the relay valve is closed with its exhaust port also remaining closed (xrpp=xrpt). This is the hold phase associated with the operation of the relay valve. When the brake pedal is released by the driver, air is exhausted from the primary circuit of the treadle valve and consequently from the control port of the relay valve. Due to the presence of compressed air in the delivery port of the relay valve, the relay valve piston is pushed back to its initial position and this opens the exhaust port of the relay valve (xrpp<xrpt). Thus, air is exhausted from the delivery port of the relay valve to the atmosphere. This is the exhaust phase associated with the operation of the relay valve.Fig. 5. A sectional view of the relay valve.View thumbnail imagesThe equation of motion governing the mechanics of the operation of the relay valve piston and the relay valve assembly gasket during the apply and the hold phases is given by(1)where Mrpp and Mrv denote respectively the mass of the relay valve piston and the relay valve assembly gasket, xrpp denotes the displacement of the relay valve piston from its initial position, xrpt is the distance traveled by the relay valve piston before it closes the relay valve exhaust port, Krv is the spring constant of the relay valve assembly return spring, Fkrvi is the pre-load on the same, Arpp is the net area of the relay valve piston exposed to the pressurized air at the control port of the relay valve, Arpp1 is the net area of the relay valve piston exposed to the pressurized air at the delivery port of the relay valve, Arpp2 is the net area of the relay valve piston exposed to the exhaust port of the relay valve, Arv1 is the net cross-sectional area of the relay valve assembly gasket exposed to the pressurized air at the supply port of the relay valve, Arv2 is the net cross-sectional area of the relay valve assembly gasket exposed to the pressurized air at the delivery port of the relay valve, Ppd is the pressure of air at the delivery port of the primary circuit of the treadle valve, Prs is the pressure of air being supplied to the relay valve, Prd is the pressure of air at the delivery port of the relay valve and is the atmospheric pressure.The mass of the relay valve piston is of the order of around 0.1 kg and the magnitude of the spring and pressure forces is found to be of the order of 102 N. Thus, the acceleration required for the inertial forces to be comparable with the spring force and the pressure force terms has to be of theorder of 102–103 m/s2, which is not the case. Hence the inertial forces are neglected and the above equation reduces to(2)The equation of motion of the relay valve piston during the exhaust phase is given by(3)Neglecting inertial forces, the above equation reduces to(4)PpdArpp=Prd(Arpp1+Arpp2).Next, we will consider the flow of air in the portion of the brake system under study. The relay valve opening is modeled as a nozzle. For the flow through a restriction, if the ratio of the cross-sectional area of the upstream section to the cross-sectional area of the restriction is 4.4 or higher, the approach velocity to this restriction can be neglected and the upstream properties (such as pressure, enthalpy, temperature, etc.) can be taken to be the upstream total or stagnation properties [17]. In our case, the minimum ratio of the cross-sectional area of the supply chamber of the relay valve to the cross-sectional area of the relay valve opening (the restriction) is found to be more than this value. Hence, we can consider the valve opening as a nozzle and take the properties in the supply chamber of the valve as the stagnation properties at the inlet section of the nozzle. The flow through the nozzle is assumed to be one-dimensional and isentropic. We also assume that the fluid properties are uniform at all sections in the nozzle. Air is assumed to behave like an ideal gas with constant specific heats. Under the above assumptions, the part of the pneumatic subsystem under consideration can be visualized as illustrated in Fig. 6.Fig. 6. The simplified visualization of the pneumatic subsystem under consideration.View thumbnail imagesThe energy equation for the flow of air through the nozzle under the above assumptions can be written as [18](5)where ho is the specific stagnation enthalpy at the entrance section of the nozzle, h is the specific enthalpy at the exit section of the nozzle and u is the magnitude of the velocity of air at the exit section of the nozzle.For isentropic flow of an ideal gas with constant specific heats, the pressure (P), density (ρ) and temperature (T) are related by(6)where γis the ratio of specific heats.The mass flow rate of air from the relay valve opening at any instant of time (denoted by ) isgiven bywhere Ap is the cross-sectional area of the valve opening. This is the rate at which air is accumulating in the hoses and the brake chamber once the relay valve is actuated. Since we lump the properties of air inside the hose and the brake chamber, the mass of air in the brake chamber at any instant of time is obtained from the ideal gas equation of state as(8)where Vb is the volume of air in the brake chamber and Trd is the temperature of air in the brake chamber at that instant of time.Let us now consider the mechanics of the operation of the brake chamber. A cross-sectional view of the brake chamber is shown in Fig. 7. When the brake is applied, the brake chamber diaphragm starts to move only after a minimum threshold pressure is reached. This pressure is required to overcome the pre-loads on the diaphragm. When this pressure is attained in the brake chamber, the diaphragm moves such that the push rod is pushed out of the brake chamber. Once the brake pads contact the brake drum and steady state is reached, the volume of air in the brake chamber will be the maximum during that particular brake application. Thus, the volume of air in the brake chamber at any instant of time during the brake application process is given by(9)where V o1 is the initial volume of air in the brake chamber before the application of the brake, V o2 is the maximum volume of air in the brake chamber, Ab is the cross-sectional area of the brake chamber, xb is the displacement of the brake chamber diaphragm, i.e., the stroke of the push rod, and xbmax is the maximum stroke of the push rod.Fig. 7. A sectional view of the brake chamber.View thumbnail imagesIn our current experimental setup, the rear brake chambers are mounted on a fixture and the end of the push rod outside the brake chamber is not connected to a slack adjuster. The push rod is brought to rest during a given brake application when it strikes a plate mounted with its face perpendicular to the direction of motion of the push rod. The position of this plate can be adjusted to vary the push rod stroke. Hence, a reasonable model for the brake chamber is given by(10)where Mb is the mass of the brake chamber diaphragm, Kb is the spring constant of the brake chamber return spring and Fkbi is the pre-load on the brake chamber diaphragm return spring. It should be noted that the pressure of air in the rear brake chamber at any instant of time is assumed to be the same as the pressure of air at the delivery port of the relay valve at that instant of time. Neglecting inertial forces when compared to the force due to the pressure and spring forces, the above equation reduces toIn the case of a brake chamber mounted on an actual axle, the relationship between the push rod stroke and the brake chamber pressure has been found to be different than the one given by Eq.(11) due to the presence of additional components such as the slack adjuster, S-cam, brake pads and brake drum [15]. Thus, the model relating the push rod stroke and the brake chamber pressure for a rear brake chamber mounted on an actual rear axle should be developed as described in [15]. Differentiating Eq. (8) with respect to time and comparing the result with Eq. (7), and using Eqs.(5), (6), (9) and (11), we obtain the equation describing the pressure response of the relay valve during the apply and hold phases as(12)where Trs is the temperature of the air being supplied to the relay valve, CD is the discharge coefficient, R is the specific heat of air, γis the ratio of specific heats of air (both R and γare assumed to be constants) and(13)Ap=2πrrv(xrpp−xrpt),with rrv being the external radius of the relay valve inlet section. The discharge coefficient (CD) is used in order to compensate for the losses during the flow. Due to the complexity involved in calibrating the valve to determine the value of the discharge coefficient, we assumed a value of 0.82 for CD as recommended in [17]. The pressure transients in the brake chamber during the apply and hold phases are obtained by solving Eqs. (2) and (12) along with the initial condition that at the start of a given brake application, the brake chamber pressure is equal to the atmospheric pressure.4. Corroboration of the modelIn this section, we corroborate the model for the relay valve by comparing its predictions against experimental data obtained from various test runs carried out over a range of supply pressures. It should be noted that the typical supply pressure in air brake systems is usually between 825.3 kPa (105 psig) and 928.8 kPa (120 psig) and this is the pressure range provided by the compressor used in our experimental setup. Eqs. (2) and (12) are solved numerically to obtain the pressure transients in the rear brake chamber during the apply and hold phases of a given brake application. The pressure measured at the delivery port of the primary circuit of the treadle valveis given as the input data to the numerical scheme. The prediction of the model for a test run is compared with the data collected during that test run and the results from various test runs are presented in Fig. 8, Fig. 9, Fig. 10, Fig. 11 and Fig. 12. In these figures, time (in seconds) and brake chamber pressure (in Pa) have been plotted on the abscissa and the ordinate respectively. The value corresponds to that instant of time at which the computer program for collecting the data is started.Fig. 8. Pressure transients at 653 kPa (80 psig) supply pressure —apply phase.View thumbnail imagesFig. 9. Pressure transients at 722 kPa (90 psig) supply pressure —apply phase.View thumbnail imagesFig. 10. Pressure transients at 584 kPa (70 psig) supply pressure —apply and exhaust phases. View thumbnail imagesFig. 11. Pressure transients at 653 kPa (80 psig) supply pressure —apply and exhaust phases. View thumbnail imagesFig. 12. Pressure transients at 584 kPa (70 psig) supply pressure —repeated application.View thumbnail imagesIt can be observed from these figures that the model is able to predict the beginning and end of each brake application reasonably well. The steady state brake chamber pressure is also predicted well by the model in all the cases. The model has also captured the pressure transients well in the exhaust phase during a complete brake application and release cycle as shown in Fig. 10 and Fig. 11. It has also predicted the pressure transients well in the case of repeated brake applications as can be observed from Fig. 12.5. ConclusionsIn this article, we have developed a hybrid model for predicting the response of the relay valve used in air brake systems of commercial vehicles. The relay valve is actuated by the compressed air from the delivery port of the primary circuit of the treadle valve. We have presented the main governing equations for the pressure transients in a rear brake chamber attached to a delivery port of the relay valve. We have corroborated this model using data obtained from experimental test runs performed over a range of supply pressures. We plan to incorporate this model of the relay valve into an overall model of the air brake system which can be used in control and diagnostic applications.References[1]S.F. Williams, R.R. Knipling, Automatic slack adjusters for heavy vehicle air brake systems, Tech. Rep. DOT HS 807 724, National Highway Traffic Safety Administration, Washington, D. C., February 1991。
毕业设计中英文翻译
本科生毕业设计(论文)外文翻译毕业设计(论文)题目:电力系统检测与计算外文题目:The development of the single chipmicrocomputer译文题目:单片机技术的发展与应用学生姓名: XXX专业: XXX指导教师姓名: XXX评阅日期:单片机技术的发展与应用从无线电世界到单片机世界现代计算机技术的产业革命,将世界经济从资本经济带入到知识经济时代。
在电子世界领域,从 20 世纪中的无线电时代也进入到 21 世纪以计算机技术为中心的智能化现代电子系统时代。
现代电子系统的基本核心是嵌入式计算机系统(简称嵌入式系统),而单片机是最典型、最广泛、最普及的嵌入式系统。
一、无线电世界造就了几代英才。
在 20 世纪五六十年代,最具代表的先进的电子技术就是无线电技术,包括无线电广播,收音,无线通信(电报),业余无线电台,无线电定位,导航等遥测、遥控、遥信技术。
早期就是这些电子技术带领着许多青少年步入了奇妙的电子世界,无线电技术展示了当时科技生活美妙的前景。
电子科学开始形成了一门新兴学科。
无线电电子学,无线通信开始了电子世界的历程。
无线电技术不仅成为了当时先进科学技术的代表,而且从普及到专业的科学领域,吸引了广大青少年,并使他们从中找到了无穷的乐趣。
从床头的矿石收音机到超外差收音机;从无线电发报到业余无线电台;从电话,电铃到无线电操纵模型。
无线电技术成为当时青少年科普、科技教育最普及,最广泛的内容。
至今,许多老一辈的工程师、专家、教授当年都是无线电爱好者。
无线电技术的无穷乐趣,无线电技术的全面训练,从电子学基本原理,电子元器件基础到无线电遥控、遥测、遥信电子系统制作,培养出了几代科技英才。
二、从无线电时代到电子技术普及时代。
早期的无线电技术推动了电子技术的发展,其中最主要的是真空管电子技术向半导体电子技术的发展。
半导体电子技术使有源器件实现了微小型化和低成本,使无线电技术有了更大普及和创新,并大大地开阔了许多非无线电的控制领域。
毕业设计外文文献翻译(原文+译文)
Environmental problems caused by Istanbul subway excavation and suggestionsfor remediation伊斯坦布尔地铁开挖引起的环境问题及补救建议Ibrahim Ocak Abstract:Many environmental problems caused by subway excavations have inevitably become an important point in city life. These problems can be categorized as transporting and stocking of excavated material, traffic jams, noise, vibrations, piles of dust mud and lack of supplies. Although these problems cause many difficulties,the most pressing for a big city like Istanbul is excava tion,since other listed difficulties result from it. Moreover, these problems are environmentally and regionally restricted to the period over which construction projects are underway and disappear when construction is finished. Currently, in Istanbul, there are nine subway construction projects in operation, covering approximately 73 km in length; over 200 km to be constructed in the near future. The amount of material excavated from ongoing construction projects covers approximately 12 million m3. In this study, problems—primarily, the problem with excavation waste(EW)—caused by subway excavation are analyzed and suggestions for remediation are offered.摘要:许多地铁开挖引起的环境问题不可避免地成为城市生活的重要部分。
毕业设计(论文)外文翻译【范本模板】
华南理工大学广州学院本科生毕业设计(论文)翻译英文原文名Review of Vibration Analysis Methods for Gearbox Diagnostics and Prognostics中文译名对变速箱振动分析的诊断和预测方法综述学院汽车工程学院专业班级车辆工程七班学生姓名刘嘉先学生学号201130085184指导教师李利平填写日期2015年3月15日英文原文版出处:Proceedings of the 54th Meeting of the Society for Machinery Failure Prevention Technology, Virginia Beach,V A, May 1-4,2000,p. 623-634译文成绩:指导教师(导师组长)签名:译文:简介特征提取技术在文献中有描述;然而,大多数人似乎掩盖所需的特定的预处理功能。
一些文件没有提供足够的细节重现他们的结果,并没有一个全面的比较传统的功能过渡齿轮箱数据。
常用术语,如“残差信号”,是指在不同的文件不同的技术.试图定义了状态维修社区中的常用术语和建立所需的特定的预处理加工特性。
本文的重点是对所使用的齿轮故障检测功能。
功能分为五个不同的组基于预处理的需要。
论文的第一部分将提供预处理流程的概述和其中每个特性计算的处理方案。
在下一节中,为特征提取技术描述,将更详细地讨论每一个功能。
最后一节将简要概述的宾夕法尼亚州立大学陆军研究实验室的CBM工具箱用于齿轮故障诊断。
特征提取概述许多类型的缺陷或损伤会增加机械振动水平。
这些振动水平,然后由加速度转换为电信号进行数据测量。
原则上,关于受监视的计算机的健康的信息被包含在这个振动签名。
因此,新的或当前振动签名可以与以前的签名进行比较,以确定该元件是否正常行为或显示故障的迹象。
在实践中,这种比较是不能奏效的。
由于大的变型中,签名的直接比较是困难的。
相反,一个涉及从所述振动署名数据特征提取更多有用的技术也可以使用。
毕业设计外文翻译原文
CLUTCHThe engine produces the power to drive the vehicle. The drive line or drive train transfers the power of the engine to the wheels. The drive train consists of the parts from the back of the flywh eel to the wheels. These parts include the clutch, th e transmission, the drive shaft, and the final drive assembly (Figure 8-1).The clutch which includes the flywheel, clutch disc, pressure plate, springs, pressure plate cover and the linkage necessary to operate the clutch is a rotating mechanism between t he engine and the transmission (Figure 8-2). It operates through friction which comes from contact between the parts. That is the reason why the clutch is called a friction mechanism. After engagement, the clutch must continue to transmit all the engine torque to the transmission depending on the friction without slippage. The clutch is also used to disengage the engine from the drive train whenever the gears in the transmission are being shifted from one gear ratio to another.To start the engine or shift the gears, the driver has to depress the clutch pedal with the purpose of disengagement the transmission from the engine. At that time, the driven members connected to the transmission input shaft are either stationary or rotating at a speed that is slower or faster than the driving members connected to the engine crankshaft. There is no spring pressure on the clutch assembly parts. So there is no friction between the driving members and driven members. As the driver lets loose the clutch pedal, spring pre ssure increases on the clutch parts. Friction between the parts also increases. The pressure exerted by the springs on the driven members is controlled by the driver through the clutch pedal and linkage. The positive engagement of the driving and driven members is made possible by the friction between the surfaces of the members. When full spring pressure is applied, the speed of the driving and driven members should be the same. At themoment, the clutch must act as a solid coupling device and transmit al l engine power to the transmission, without slipping.However, the transmission should be engaged to the engine gradually in order to operate the car smoothly and minimize torsional shock on the drive train because an engine at idle just develops little power. Otherwise, the driving members are connected with the driven members too quickly and the engine would be stalled.The flywheel is a major part of the clutch. The flywheel mounts to the engine’s crankshaft and transmits engine torque to the clutch assembly. The flywheel, when coupled with the clutch disc and pressure plate makes and breaks the flow of power from the engine to the transmission.The flywheel provides a mounting location for the clutch assembly as well. When the clutch is applied, the flyw heel transfers engine torque to the clutch disc. Because of its weight, the flywheel helps to smooth engine operation. The flywheel also has a large ring gear at its outer edge, which engages with a pinion gear on the starter motor during engine cranking.The clutch disc fits between the flywheel and the pressure plate. The clutch disc has a splined hub that fits over splines on the transmission input shaft. A splined hub has grooves that match splines on the shaft. These splines fit in the grooves. Thus, t he two parts are held together. However, back-and-forth movement of the disc on the shaft is possible. Attached to the input shaft, At disc turns at the speed of the shaft.The clutch pressure plate is generally made of cast iron. It is round and about the same diameter as the clutch disc. One side of the pressure plate is machined smooth. This side will press the clutch disc facing are against the flywheel. The outer side has various shapes to facilitate attachment of spring and release mechanisms. The two primary types of pressure plate assemblies are coil spri ng assembly and diaphragmspring (Figure 8-3).In a coil spring clutch the pressure plate is backed by a number of coil springs and housed with them in a pressed-steel cover bolted to the flywheel. The springs push against the cover. Neither the driven plate nor the pressure plate is connected rigidly to the flywh eel and both can move either towards it or away. When the clutch pedal is depressed a thrust pad riding on a carbon or ball thrust bearing i s forced towards the flywheel. Levers pivoted so that they engage with the thrust pad at one end and the pressure plate at the other end pull the pressure plate ba ck against its springs. This releases pressure on the driven plate disconnecting the gearbox from the engine (Figure 8-4).Diaphragm spring pressure plate assemblies are widely used in most modern cars. The diaphragm spring is a single thin sheet of metal which yields when pressure is applied to it. When pressure is removed the metal springs back to its original shape. The centre portion of the diaphragm spring is slit into numerous fingers that act as release levers. When the clutch assembly rotates with the engine these weights are flung outwards by centrifugal forces and cause the levers to pre ss against the pressure plate. During disengagement of the clutch the fingers are moved forward by the release bearing. The spring pivots over the fulcrum ring and its outer rim moves away from the flywheel. The retracting spring pulls the pressure plate a way from the clutch plate thus disengaging the clutch (Figure 8-5).When engaged the release bearing and the fingers of the diaphragm spring move towards the transmission. As the diaphragm pivots over the pivot ring its outer rim forces the pressure plate against the clutch disc so that the clutch plate is engaged to the flywheel.The advantages of a diaphragm type pres sure plate assembly are its compactness, lower weight, fewer moving parts, less effort to engage, reduces rotational imbalance by providin g a balanced force around the pressure plate and less chances of clutch slippage.The clutch pedal is connected to the disengagement mechanism either by a cable or, more com monly, by a hydraulic system. Either way, pushing the pedal down operates the dise ngagement mechanism which puts pressure on the fingers of the clutch diaphragm via a release bearing and causes the diaphragm to release the clutch plate. With a hydraulic mechanism, the clutch pedal arm operates a piston in the clutch master cylinder. Thi s forces hydraulic fluid through a pipe to the clutch release cylinder where another piston operates the clutch disengagement mechanism. The alternative is to link the clutch pedal to the disengagement mechanism by a cable.The other parts including the cl utch fork, release bearing, bell-housing, bell housing cover, and pilot bushing are needed to couple and uncouple the transmission. The clutch fork, which connects to the linkage, actually operates the clutch. The release bearing fits between the clutch fork and the pressure plate assembly. The bell housing covers the clutch assembly. The bell housing c over fastens to the bottom of the bell housing. This removable cover allows a mechanic to inspect the clutch without removing the transmission and bell housing. A pilot bushing fits into the back of th e crankshaft and holds the transmission input shaft.A Torque ConverterThere are four components inside the very strong housing of the torque converter:1. Pump;2. Turbine;3. Stator;4. Transmission fluid.The housing of the torque converter is bolted to the flywheel of the engine, so it turns at what ever speed the engine is running at. The fins that make up the pump of the torque converter are at tached to the housing, so they also turn at the same speed a s the engine. The cutaway below shows how everything is connected inside the torque converter (Figure 8-6).The pump inside a torque converter is a type of centrifugal pump. As it spins, fluid is flung to the outside, much as the spin cycle of a washing machine flings water and clothes to the outside of the wash tub. As fluid is flung to the outside, a vacuum is created that draws more fluid in at the center.The fluid then enters the blades of the turbine, which is connected to the transmission. The turbin e causes the transmission to spin, which basically moves the car. The blades of the turbine are curved. This means that the fluid, which enters the turbine from the outside, has to change direction before it exits the center of the turbine. It is this directional change that causes the turbine to spin.The fluid exits the turbine at the center, moving in a different direction than when it entered. The fluid exits the turbine moving opposite the direction that the pump (and engine) is turning. If the fluid were allowed to hit the pump, it would slow the engine down, wasting power. This is why a torque converter has a stator.The stator resides in the very center of the torque converter. Its job is to redirect the fluid returning from the turbine before it hits the pump again. This dramatically increases the efficiency of the torque converter.The stator has a very aggressive blade design that almost completely reverses the direction of the fluid. A one-way clutch (inside the stator) connects the stator to a fixed shaft in the transmission. Because of this arrangement, the stator cannot spin with the fluid - i tc a n s p i n o n l y i n t h e o p p o s i t ed i re c t i o n,f o r c i ng th e f l ui d t oc h a n g ed i re c t i o n a s i t h i t s t h e s t a t o r b l a d e s.Something a little bit tricky happens when the car gets moving. There is a point, around 40 mph (64 kph), at which both the pump and the turbine are spinning at almost the same speed (the pump alwaysspins slightly faster). At this point, the fluid returns from the turbine, entering the pump already moving in the same direction as the pump, so the stator is not needed.Even though the turbine changes the direction of the fluid and flings it out the back, the fluid still ends up moving in the direction that the turbine is spinning because the turbin e is spinning faster in one direction than the fluid is being pumped in the other direction. If you were standing in the back of a pickup moving at 60 mph, and you threw a ball out the back of that pickup at 40 mph, the ball would still be going forward at 20 mph. This is similar to what happens in the tur bine: The fluid is being flung out the back in one direction, but not as fast as it was going to start with in the other direction.At these speeds, the fluid actually strikes the back sides of the stator blades, causing the stator to freewheel on its one-way clutch so it doesn’t hinder the fluid moving through it.Benefits and Weak PointsIn addition to the very important job of allowing a car come to a complete stop without stalling the engine; the torqu e converter actually gives the car more torque when you accelerate out of a Stop. Modern torque converters can multiply the torque of the engine by two to three times. This effect only happens when the engine is turning much faster than the transmission.At higher speeds, the transmission catches up to the engine, eventually moving at almost the same speed. Ideally, though, the transmission would move at exactly the same speed as the engine, because this difference in speed wastes power. This is part of th e reason why cars with automatic transmissions get worse gas mileage than cars with manual transmissions.To counter this effect, some cars have a torque converter with alockup clutch. When the two halves of the torque converter get up to speed, this clutch locks them together, eliminating the slip page and improving efficiency.。
大学毕业论文英文翻译及原文
大学毕业论文英文翻译中文译文计算机网络每个一个世纪都有一种主导地位的技术。
18世纪伴随着工业革命的到来的是大型机械系统的时代;19世纪是蒸汽机的时代,而20世纪的发展历程中,关键的技术是信息收集、处理和分发。
在其他的发展方面,我们还可以看到:遍布全球的电话网络的建立起来了,无线电广播和电视的出现了,计算机工业诞生了,并且以超乎想象的速度在成长;另外通信卫星也发射上天了。
技术的快速发展的一个直接结果是,这些领域正在快速地融合,信息收集、传输、存储和处理之间的差别正在迅速地消失。
对于具有数百个办公室的大型组织来说,尽管这些办公室分布在广阔的地理区域中,但未来期望的情景是,工作人员只要单击一下按钮,就可以查看最远处分部的状态。
随着信息收集、处理和分发能力的不断提高,我们对于更加复杂的信息处理技术的需求也增长得更快。
与其他的工业(比如汽车和航空运输业)相比,计算机工业还是非常年轻,尽管如此,计算机技术却在很短的时间内有了惊人的进展。
在计算机诞生之初的20年间,计算机系统是高度集中化的,通常位于一个很大的房间中。
该房间通常配有玻璃墙,参观的人透过玻璃墙可以欣赏到里边伟大的电子奇迹。
中等规模的公司或者大学可能会有一台或者两台计算机,而大型的研究机构最多也就几十台计算机。
要在20年内生产出大量同样功能但是体积比邮票还小的计算机,在当时的人们看来纯属科学幻想。
计算机和通信的结合对于计算机系统的组织方式产生了深远的影响。
把一台大型的计算机放在一个单独的房间中,然后用户带着他们的处理任务去房间里上机,这种"计算机中心"的概念现在已经完全过时了。
由一台计算机来处理整个组织中所有的计算需求,这种老式的模型已经被新的模型所取代,在新的模型下,由大量独立的,但相互连接起来的计算机来共同完成计算任务。
这些系统称为计算机网络(computer networks)。
如何设计这些网络,并且将这些网络组织起来,这就是本书的主题。
5000字英文论文
5000字英文论文篇一:论文用5000字中英文翻译MCU DescriptionSCM is also known as micro-controller (Microcontroller Unit), commonly used letters of the acronym MCU that it was first used in industrial control. Only a single chip by the CPU chip developed from a dedicated processor. The first design is by a large number of peripherals and CPU on a chip in the computer system, smaller, more easily integrated into a complex and demanding on the volume control device which. INTEL s Z80 is the first designed in accordance with this idea processor, then on the development of microcontroller and dedicated processors have parted ways.Are 8-bit microcontroller early or 4 bits. One of the most successful is the INTEL 8031, for a simple, reliable and good performance was a lot of praise. Then developed in 8031 out of MCS51 MCU Systems. SCM systems based on this system until now are still widely used. With the increased requirements of industrial control field, began a 16-bit microcontroller, because the cost is not satisfactory but have not been very widely used. After 90 years with the great development of consumer electronics, microcontroller technology has been a huge increase. With INTEL i960 series, especially the later series of widely used ARM, 32-bit microcontroller quickly replace high-end 16-bit MCU status and enter the mainstream market. The traditional 8-bit microcontroller performances have been the rapid increase capacity increase compared to 80 the number of times. Currently, high-end 32-bit microcontroller clocked over 300MHz, the performance catching the mid-90 s dedicated processor, while the average model prices fall to one U.S. dollars; the most high-end model only 10 dollars. Modern SCM systems are no longer only in the developmentand use of bare metal environment, a large number of proprietary embedded operating system is widely used in the full range of SCM. The handheld computers and cell phones as the core processing of high-end microcontroller can even use a dedicated Windows and Linux operating systems.SCM is more suitable than the specific processor used in embedded systems, so it was up to the application. In fact the number of SCM is the world s largest computer. Modern human life used in almost every piece of electronic and mechanical products will be integrated single chip. Phone, telephone, calculator, home appliances,electronic toys, handheld computers and computer accessories such as a mouse with a 1-2 in both the Department of SCM. Personal computer will have a large number of SCM in the work. General car with more than 40 SCM, complex industrial control systems may even have hundreds of SCM in the same time work! SCM is not only far exceeds the number of PC and other computing the sum, or even more than the number of human beingsSingle chip, also known as single-chip microcontroller, it is not complete a certain logic chips, but to a computer system integrated into a chip. Equivalent to a micro-computer, and computer than just the lack of a microcontroller I / O devices. General talk: a chip becomes a computer. Its small size, light weight, cheap, for the study, application and development of facilities provided. At the same time, learning to use the MCU is to understand the principle and structure of the computer the best choice. SCM and the computer functions internally with similar modules, such as CPU, memory, parallel bus, the same effect as well, and hard disk memory devices, and different is its performance of these components were relatively weak many of our home computer, but the price is low , usually not more than 10 yuan you can do with it ...... some control for a class is not very complicated electrical work is enough of. We are usingautomatic drum washing machine, smoke hood, VCD and so on appliances which could see its shadow! ...... It is primarily as a control section of the core componentsIt is an online real-time control computer, control-line is that the scene is needed is a stronger anti-jamming ability, low cost, and this is, and off-line computer (such as home PC), the main difference.Single chipMCU is through running, and can be modified. Through different procedures to achieve different functions, in particular special unique features, this is another device much effort needs to be done, some great efforts are very difficult to do. A not very complex functions if the 50 s with the United States developed 74 series, or the 60 s CD4000 series of these pure hardware buttoned, then the circuit must be a large PCB board! But if the United States if the 70 s with a series of successful SCM market, theresult will be a drastic change! Just because you are prepared by microcomputer programs can achieve high intelligence, high efficiency and high reliability!As the microcontroller on the cost-sensitive, so now the dominant software or the lowest level assembly language, which is the lowest level in addition to more than binary machine code language, and as so low why is the use? Many high-level language has reached the level of visual programming Why is not it? The reason is simply that there is no home computer as a single chip CPU, not as hard as a mass storage device. A visualization of small high-level language program which even if only one button, will reach tens of K of size! For the home PC s hard drive in terms of nothing, but in terms of the MCU is not acceptable. SCM in the utilization of hardware resources to be very high for the job so although the original is still in the compilation of a lot of use. The same token,if the giant computer operating system and applications run up to get home PC, home PC, also can not afford to.Can be said that the twentieth century across the three power era, that is, the age of electricity, the electronic age and has entered into the computer age. However, this computer, usually refers to the personal computer, referred to as PC. It consists of the host, keyboard, monitor and other components. Another type of computer, most people do not know how. This computer is to give all kinds of intelligent machines single chip (also known as micro-controller). As the name suggests, this computer system took only a minimal integrated circuit, can be a simple operation and control. Because it is small, usually hidden in the charged mechanical stomach in. It is in the device, like the human brain plays a role, it goes wrong, the whole plant was paralyzed. Now, this microcontroller has a very broad field of use, such as smart meters, real-time industrial control, communications equipment, navigation systems, and household appliances. Once all kinds of products were using SCM, can serve to upgrade the effectiveness of products, often in the product name preceded by the adjective - intelligent, such as intelligent washing machines. Now some technical personnel of factories or other amateur electronics developers to engage in out of certain products, not the circuit is too complicated, that function is too simple and can easily be copied. The reason may be stuck in the product did not use a microcontrolleror other programmable logic device.SCM historySCM was born in the late 20th century, 70, experienced SCM, MCU, SoC three stages.First model1.SCM the single chip microcomputer (Single Chip Microcomputer) stage, mainly seeking the best of the best single form of embedded systemsarchitecture. Innovation model success, laying the SCM and general computer completely different path of development. In the open road of independent development of embedded systems, Intel Corporation contributed.2.MCU the micro-controller (Micro Controller Unit) stage, the main direction of technology development: expanding to meet the embedded applications, the target system requirements for the various peripheral circuits and interface circuits, highlight the object of intelligent control. It involves the areas associated with the object system, therefore, the development of MCU s responsibility inevitably falls on electrical, electronics manufacturers. From this point of view, Intel faded MCU development has its objective factors. In the development of MCU, the most famous manufacturers as the number of Philips Corporation. Philips company in embedded applications, its great advantage, the MCS-51 single-chip micro-computer from the rapid development of the micro-controller. Therefore, when we look back at the path of development of embedded systems, do not forget Intel and Philips in History.Embedded SystemsEmbedded system microcontroller is an independent development path, the MCU important factor in the development stage, is seeking applications to maximize the solution on the chip; Therefore, the development of dedicated single chip SoC trend of the natural form. As the microelectronics, IC design, EDA tools development, application system based on MCU SOC design have greater development. Therefore, the understanding of the microcontroller chip microcomputer can be, extended to the single-chip micro-controller applications.MCU applicationsSCM now permeate all areas of our lives, which is almost difficult to find traces of the field without SCM. Missile navigation equipment,aircraft, all types of instrument control, computer network communications and data transmission, industrial automation, real-time process control and data processing, extensive use of various smart IC card, civilian luxury car security system, video recorder, camera, fully automatic washing machine control, and program-controlled toys, electronic pet, etc., which are inseparable from the microcontroller. Not to mention the area of robot control, intelligent instruments, medical equipment was. Therefore, the MCU learning, development and application of the large number of computer applications and intelligent control of the scientists, engineers.SCM is widely used in instruments and meters, household appliances, medical equipment, aerospace, specialized equipment, intelligent management and process control fields, roughly divided into the following several areas:1. In the application of Intelligent InstrumentsSCM has a small size, low power consumption, controlling function, expansion flexibility, the advantages of miniaturization and ease of use, widely used instrument, combining different types of sensors can be realized Zhuru voltage, power, frequency, humidity, temperature, flow, speed, thickness, angle, length, hardness, elemental, physical pressure measurement. SCM makes use of digital instruments, intelligence, miniaturization, and functionality than electronic or digital circuits more powerful. Such as precision measuring equipment (power meter, oscilloscope, various analytical instrument).2. In the industrial control applicationWith the MCU can constitute a variety of control systems, data acquisition system. Such as factory assembly line of intelligent control 3. In Household AppliancesCan be said that the appliances are basically using SCM, praise from the electric rice, washing machines, refrigerators, air conditioners, color TV, and other audio video equipment, to the electronic weighing equipment, varied, and omnipresent.篇二:毕业论文5000字英文文献翻译(c++)┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书英文翻译英语原文:. Introducing ClassesThe only remaining feature we need to understand before solving our bookstore problem is how to write a data structure to represent our transaction data. In C++ we define our own data structure by defining a class. The class mechanism is one of the most important features in C++. In fact, a primary focus of the design of C++ is to make it possible to define class types that behave as naturally as the built-in types themselves. The library types that we ve seen already, such as istream and ostream, are all defined as classesthat is,they are not strictly speaking part of the language.Complete understanding of the class mechanism requires mastering a lot of information. Fortunately, it is possible to use a class that someone else has written without knowing how to define a class ourselves. In this section, we ll describe a simple class that we canuse in solving our bookstore problem. We ll implement this class in the subsequent chapters as we learn more about types,expressions, statements, and functionsall of which are used in defining classes.To use a class we need to know three things:What is its name? Where is it defined?What operations does it support?For our bookstore problem, we ll assume that the class is named Sales_item and that it is defined in a header named Sales_item.h.The Sales_item ClassThe purpose of the Sales_item class is to store an ISBN and keep track of the number of copies sold, the revenue, and average sales price for that book. How these data are stored or computed is not our concern. To use a class, we need not know anything about how it is implemented. Instead, what we need to know is what operations the class provides.As we ve seen, when we use library facilities such as IO, we must include the associated headers. Similarly, for our own classes, we must make the definitions associated with the class available to the compiler. We do so in much the same way. Typically, we put the class definition into a file. Any program that wants to use our class must include that file. Conventionally, class types are stored in a file with a name that, like the name of a program source file, has two parts: a file name and a file suffix. Usually the file name is the same as the class defined in the header. The suffix usually is .h, but some programmers use .H, .hpp, or .hxx. Compilers usually aren t picky about header file names, but IDEs ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书sometimes are. We ll assume that our class is defined in a file named Sales_item.h.Operations on Sales_item ObjectsEvery class defines a type. The type name is the same as the name of the class. Hence, our Sales_item class defines a type namedSales_item. As with the built-in types, we can define a variable of a class type. When we write Sales_item item we are saying that item is an object of type Sales_item. We often contract the phrase an object of type Sales_item to aSales_ item object or even more simply to a Sales_item. In addition to being able to define variables of type Sales_item, we can perform the following operations on Sales_item objects:Use the addition operator, +, to add two Sales_items,Use the input operator, to read a Sales_item object,Use the output operator, to write a Sales_item object,Use the assignment operator, =, to assign one Sales_item object to another,Call the same_isbn function to determine if two Sales_items refer to the same book.Classes are central to most C++ programs: Classes let us define our own types that are customizedfor the problems we need to solve, resulting in applications that are easier to write andunderstand.Well-designed class types can be as easy to use as the built-in types.A class defines data and function members: The data members store the state associated with objectsof the class type, and the functions perform operations that give meaning to the data. Classeslet us separate implementation and interface. The interface specifies the operations that the classsupports. Only the implementor of the class need know or care about the details of the implementation. This separation reduces the bookkeeping aspects that make programming tedious anderror-prone.Class types often are referred to as abstract data types. An abstract data type treats the data(state) and operations on that state as a single unit. We can think abstractly about what the classd oes, rather than always having to be aware of how the class operates. Abstract data types arefundamental to both object-oriented and generic programming.Data abstraction is a programming (and design) technique that relies on the separation of interfaceand implementation. The class designer must worry about how a class is implemented, but programmersthat use the class need not know about these details. Instead, programmers who use a type need to know only the type s interface; they can think abstractly about what the type does rather than concretely about how the type works. Encapsulation is a term that describes the technique of combining lower-level elements to forma new, higher-level entity. A function is one form of encapsulation: The detailed actions performedby the function are encapsulated in the larger entity that is the function itself. Encapsulated elements hide the details of their implementationwe may call ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书a function but have no access to the statements that it executes. In the same way, a class is an encapsulated entity: It represents an aggregation of several members, and most (well-designed) class types hide the members that implement the type.If we think about the library vector type, it is an example of both data abstraction and encapsulation. It is abstract in that to use it, we think about its interfaceabout the operations that it can perform. It is encapsulated because we have no access to the details of how the type is representated nor to any of its implementation artifacts. An array, on the other hand, is similar in concept to a vector but is neither abstract nor encapsulated. We manipulate an array directly by accessing the memory in which the array is stored.Not all types need to be abstract. The library pair class is a good example of a useful, well-designed class that is concrete rather thanabstract. A concrete class is a class that exposes, rather than hides, its implementation.Some classes, such as pair, really have no abstract interface. The pair type exists to bundle two data members into a single object. There is no need or advantage to hiding the data members. Hiding the members in a class like pair would only complicate the use of the type.Even so, such types often have member functions. In particular, it is a good idea for any class that has data members of built-in or compound type to define constructor(s) to initialize those members. The user of the class could initialize or assign to the data members but it is less error-prone for the class to do so.Programmers tend to think about the people who will run their applications as users. Applicationsare designed for and evolve in response to feedback from those who ultimately use the applications. Classes are thought of in a similar way: A class designer designs and implements a class for users of that class. In this case, the user is a programmer, not the ultimate user of the application.Authors of successful applications do a good job of understanding and implementing the needs ofthe application s users. Similarly,well-designed, useful classes are designed with a close attention to the needs of the users of the class.In another way, the division between class designer and class user reflects the division betweenusers of an application and the designers and implementors of the application. Users care only if the application meets their needs in a cost-effective way. Similarly, users of a class care only about its interface. Good class designers define a class interface that is intuitive and easy to use. Users care about the implementation only in so far as the implementation affects their use of the class. If the implementation is too slow or puts burdens on users ofthe class, then the users must care. In well-designed classes, only the class designer worries about the implementation.In simple applications, the user of a class and the designer of the class might be one┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书and the same person. Even in such cases, it is useful to keep the roles distinct. When designing the interface to a class, the class designer should think about how easy it will be to use the class. When using the class, the designer shouldn t think about how the class works.When referring to a user, the context makes it clear which kind of user is meant. If we speak of user code or the user of the Sales_item class, we mean a programmer who is using a class in writing an application. If we speak of the user of the bookstore application, we mean the manager of the store who is running the application.Data abstraction and encapsulation provide two important advantages: 1.Class internals are protected from inadvertent user-level errors, which might corrupt the state of the object.2.The class implementation may evolve over time in response to changing requirements or bug reports without requiring change inuser-level code.By defining data members only in the private section of the class, the class author is free to make changes in the data. If the implementation changes, only the class code needs to be examined to see what affect the change may have. If data are public, then any function that directly accesses the data members of the old representation might be broken. Itwould be necessary to locate and rewrite all those portions of code that relied on the old pesentation before the program could be used again. Similarly, if the internal state of the class is private, then changes to the member data can happen in only a limited number of places. The data is protected from mistakes that users might introduce. If there is a bug that corrupts the object s state, the places to look for the bug are localized: When data are private, only a member function could be responsible for the error. The search for the mistake is limited, greatly easing the problems of maintenance and program correctness.If the data are private and if the interface to the member functions does not change, then user functions that manipulate class objects require no change.Because changing a class definition in a header file effectively changes the text of every source file that includes that header, code that uses a class must be recompiled when the class changes.Classes are the most fundamental feature in C++. Classes let us define new types that are tailored to our own applications, making our programs shorter and easier to modify.Data abstractionthe ability to define both data and function membersand encapsulationthe ability to protect class members from general accessare fundamental to classes. Member functions define the interface to the class. We encapsulate the class by making the data and functions used by the implementation of a class private.Classes may define constructors, which are special member functions that control how┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ 装┊ ┊ ┊ ┊ ┊ 订┊ ┊ ┊ ┊ ┊ 线┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊ ┊安徽工业大学毕业设计(论文)说明书objects of the class are initialized. Constructors may be verloaded. Every constructor should initialize every data member. Constructors should use a constructor initializer list to initialize the data members. Initializer lists are lists of namevalue pairs where the name is a member and the value is an initial value for that member.Classes may grant access to their nonpublic members to other classes or functions. A class grants access by making the class or function a friend.Classes may also define mutable or static members. A mutable member is a data member that is never const; its value may be changed inside a const member function. A static member can be either function or data; static members exist independently of the objects of the class type. Copy ControlEach type, whether a built-in or class type, defines the meaning of a (possibly empty) set of operations on objects of that type. We can add two int values, run size on a vector, and so on. These operations define what can be done with objects of the given type.Each type also defines what happens when objects of the type are created. Initialization of objects of class type is defined by constructors. Types also control what happens when objects of the type are copied, assigned, or destroyed. Classes control these actions through special member functions: the copy constructor, the assignment operator, and the destructor. This chapter covers these operations.When we define a new type, we specifyexplicitly or implicitlywhat happens when objects of that type are copied, assigned, and destroyed. We do so by defining special members: the copy constructor, the assignment operator, and the destructor. If we do not explicitly define the copy constructor or the assignment operator, the compiler will (usually) define them for us.The copy constructor is a special constructor that has a single parameter that is a (usually const) reference to the class type. The copy constructor is used explicitly when we define a new object and initialize it from an object of the same type. It is used implicitly when we pass or return objects of that type to or from functions.Collectively, the copy constructor, assignment operator, and destructor are referred to as copy control. The compiler automatically implements these operations, but the class may define its own versions. Copy control is an essential part of defining any C++ class. Programmers new to C++ are often confused by having to define what happens when objects arecopied, assigned, or destroyed. This confusion is compounded because if we do not explicitly define these operations, the compiler defines them for usalthough they might not behave as we intend.Often the compiler-synthesized copy-control functions are finethey do exactly the篇三:毕业设计的5000字英文文献翻译外文及翻译英语原文 Android Application FundamentalsAndroid applications are written in the Java programming language. The Android SDK tools compile the code—along with any data and resource files—into an Android package, an archive file with an .apk suffix. All the code in a single .apk file is considered to be one application and is the file that Android-powered devices use to install the application. Once installed on a device, each Android application lives in its own security sandbox: ? The Android operating system is a multi-user Linux system in which eachapplication is a different user.? By default, the system assigns each application a unique Linux user ID (the ID is used only by the system and is unknown to the application). The system setspermissions for all the files in an application so that only the user ID assigned to that application can access them.? Each process has its own virtual machine (VM), so an application s code runs in isolation from other applications.? By default, every application runs in its own Linux process. Android starts the process when any of the application s components need to be executed, then shuts down the process when it s no longer needed or when the system must recovermemory for other applications.In this way, the Android system implements the principle of least privilege. That is, each application, by default, has access only to the components that it requires to do its work and no more. This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.However, there are ways for an application to share data with other applications and for an application to access system services:? It s possible to arrange for two applications to share the same Linux user ID, in whichcase they are able to access each other s files. To conserve system resources,applications with the same user ID can also arrange to run in the same Linux processand share the same VM (the applications must also be signed with the samecertificate).。
大学本科毕业设计--英文原文+中文翻译
Library of C the CNC industrialdeveloped tens of thousands and educational field, he hasNUMERICAL CONTROLNumerical Control technology as it is known today, emerged in the mid 20th century. It can be traced to the year of 1952, the U.S. Air Force, and the names of John Parsons and the Massachusetts Institute of Technology in Cam-bridge, MA, USA. It was not applied in production manu-facturing until the early 1960's. The real boom came in the form of CNC, around the year of 1972, and a decade later with the introduction of affordable micro computers. The history and development of this fascinating technology has been well documented in many publications.In the manufacturing field, and particularly in the area of metal working, Numerical Control technology has caused something of a revolution. Even in the days before comput-ers became standard fixtures in every company and in many homes, the2machine tools equipped with Numerical Control system found their special place in the machine shops. The recent evolution of micro electronics and the never ceasing computer development, including its impact on Numerical Control, has brought significant changes to the manufacturing sector in general and metalworking in-dustry in particular.DEFINITION OF NUMERICAL CONTROLIn various publications and articles, many descriptions have been used during the years, to define what Numerical Control is. It would be pointless to try to find yet another definition, just for the purpose of this handbook. Many of these definitions share the same idea, same basic concept, just use different wording.The majority of all the known definitions can be summed up into a relatively simple statement:Numerical Control can be defined as an operation of machine tools by the means of specifically coded instructions to the machine control systemThe instructions are combinations of the letters of alpha-bet, digits and selected symbols, for example, a decimal point, the percent sign or the parenthesis symbols. All in-structions are written in a logical order and a predetermined form. The collectionNUMERICAL CONTROLof all instructions necessary to ma-chine a part is called an NC Program, CNC Program, or a Part Program. Such a program can be stored for a future use and used repeatedly to achieve identical machining re-sults at any time.♦ NC and CNC TechnologyIn strict adherence to the terminology, there is a differ-ence in the meaning of the abbreviations NC and CNC. The NC stands for the older and original Numerical Control technology, whereby the abbreviation CNC stands for the newer Computerized Numerical Control technology, a modem spin-off of its older relative. However, in practice, CNC is the preferred abbreviation. To clarify the proper us-age of each term, look at the major differences between the NC and the CNC systems.Both systems perform the same tasks, namely manipula-tion of data for the purpose of machining a part. In both cases, the internal design of the control system contains the logical instructions that process the data. At this point the similarity ends. The NC system (as opposed to the CNC system) uses a fixed logical functions, those that are built-in and perma-nently wired within the control unit. These functions can-not be changed by the programmer or the machine opera-tor. Because of the fixed4wiring of the control logic, the NC control system is synonymous with the term 'hardwired'. The system can interpret a part program, but it does not al-low any changes to the program, using the control features. All required changes must be made away from the control, typically in an office environment. Also, the NC system re-quires the compulsory use of punched tapes for input of the program information.The modem CNC system, but not the old NC system, uses an internal micro processor (i.e., a computer). This computer contains memory registers storing a variety of routines that are capable of manipulating logical functions. That means the part programmer or the machine operator can change the program on the control itself (at the ma-chine), with instantaneous results. This flexibility is the greatest advantage of the CNC systems and probably the key element that contributed to such a wide use of the tech-nology in modern manufacturing. The CNC programs and the logical functions are stored on special computer chips, as software instructions, rather than used by the hardware connections, such as wires, that control the logical func-tions. In contrast to the NC system, the CNC system is syn-onymous with the term 'softwired'.NUMERICAL CONTROLWhen describing a particular subject that relates to the numerical control technology, it is customary to use either the term NC or CNC. Keep in mind that NC can also mean CNC in everyday talk, but CNC can never refer to the older technology, described in this handbook under the abbrevia-tion ofNC. The letter 'C 'stands for Computerized, and it is not applicable to the hardwired system. All control systems manufactured today are of the CNC design. Abbreviations such as C&C or C'n 'C are not correct and reflect poorly on anybody that uses them.CONVENTIONAL AMD CNC MACHININGWhat makes the CNC machining superior to the conven-tional methods? Is it superior at all? Where are the main benefits? If the CNC and the conventional machining pro-cesses are compared, a common general approach to ma-chining a part will emerge: Obtain and study the drawingSelect the most suitable machining methodDecide on the setup method (work holding)Select the cutting toolsEstablish speeds and feedsMachine the part6This basic approach is the same for both types of machin-ing. The major difference is in the way how various data are input. A feedrate of 10 inches per minute (10 in/min) is the same in manual or CNC applications, but the method of applying it is not. The same can be said about a coolant - it can be activated by turning a knob, pushing a switch or programming a special code. All these actions will result in a coolant rushing out of a nozzle. In both kinds of machin-ing, a certain amount of knowledge on the part of the user is required. After all, metal working, particularly metal cut-ting, is mainly a skill, but it is also, to a great degree, an art and a profession of large number of people. So is theappli-cation of Computerized Numerical Control. Like any skill or art or profession, mastering it to the last detail is neces-sary to be successful. It takes more than technical knowl-edge to be a CNC machinist or a CNC programmer. Work experience and intuition, and what is sometimes called a 'gut-feel', is a much needed supplement to any skill.In a conventional machining, the machine operator sets up the machine and moves each cutting tool, using one or both hands, to produce the required part. The design of a manual machine tool offers many features that help the process of machining a part -NUMERICAL CONTROLlevers, handles, gears and di-als, to name just a few. The same body motions are re-peated by the operator for every part in the batch. However, the word 'same 'in this context really means'similar 'rather than 'identical'. Humans are not capable to repeat every process exactly the same at all times - that is the job ofma-chines. People cannot work at the same performance level all the time, without a rest. All of us have some good andsome bad moments. The results of these moments, when*applied to machining a part, are difficult to predict. There will be some differences and inconsistencies within each batch of parts. The parts will not always be exactly the same. Maintaining dimensional tolerances and surface fin-ish quality are the most typical problems in conventional machining. Individual machinists may have their own time 'proven' methods, different from those of their fellow col-leagues. Combination of these and other factors create a great amount of mconsistency.The machining under numerical control does away with the majority of inconsistencies. It does not require the same physical involvement as manual machining. Numerically controlled machining does not need any levers or dials or handles, at least8not in the same sense as conventional ma-chining does. Once the part program has been proven, it can be used any number of times over, always returning consistent results. That does not mean there are no limiting factors. The cutting tools do wear out, the material blank in one batch is not identical to the material blank in another batch, the setups may vary, etc. These factors should be considered and compensated for, whenever necessary.The emergence of the numerical control technology does not mean an instant, or even a long term, demise of all man-ual machines. There are times when a traditional machin-ing method is preferable to a computerized method. For ex-ample, a simple one time job may be done more efficiently on a manual machine than a CNC machine. Certain types of machining jobs will benefit from manual or semiauto-matic machining, rather than numerically controlled ma-chining. The CNC machine tools are not meant to replace every manual machine, only to supplement them.In many instances, the decision whether certain machin-ing will be done on a CNC machine or not is based on the number of required parts and nothing else. Although the volume of partsNUMERICAL CONTROLmachined as a batch is always an important criteria, it should never be the only factor. Consideration should also be given to the part complexity, its tolerances, the required quality of surface finish, etc. Often, a single complex part will benefit from CNC machining, while fifty relatively simple parts will not.Keep in mind that numerical control has never machined a single part by itself. Numerical control is only a process or a method that enables a machine tool to be used in a pro-ductive, accurate and consistent way.NUMERICAL CONTROL ADVANTAGESWhat are the main advantages of numerical control?It is important to know which areas of machining will benefit from it and which are better done the conventional way. It is absurd to think that a two horse power CNC mill will win over jobs that are currently done on a twenty times more powerful manual mill. Equally unreasonable are ex-pectations of great improvements in cutting speeds and feedrates over a conventional machine. If the machining and tooling conditions are the same, the cutting time will be very close in both cases.Some of the major areas where the CNC user can and should expect improvement:10Setup time reductionLead time reductionAccuracy and repeatabilityContouring of complex shapesSimplified tooling and work holdingConsistent cutting timeGeneral productivity increaseEach area offers only a potential improvement. Individ-ual users will experience different levels of actual improve-ment, depending on the product manufactured on-site, the CNC machine used, the setup methods, complexity of fixturing, quality of cutting tools, management philosophy and engineering design, experience level of the workforce, individual attitudes, etc.Setup Time ReductionIn many cases, the setup time for a CNC machine can be reduced, sometimes quite dramatically. It is important to realize that setup is a manual operation, greatly dependent on the performance of CNC operator, the type of fixturing and general practices of the machine shop. Setup time is unproductive, but necessary - it is a part of the overhead costs of doing business. To keep the setupNUMERICAL CONTROLtime to a mini-mum should be one of the primary considerations of any machine shop supervisor, programmer and operator. Because of the design of CNC machines, the setup time should not be a major problem. Modular fixturing, standard tooling, fixed locators, automatic tool changing, pallets and other advanced features, make the setup time more efficient than a comparable setup of a conventional machine. With a good knowledge of modern manufacturing, productivity can be increased significantly.The number of parts machined under one setup is also important, in order to assess the cost of a setup time. If a great number of parts is machined in one setup, the setup cost per part can be very insignificant. A very similar re-duction can be achieved by grouping several different oper-ations into a single setup. Even if the setup time is longer, it may be justified when compared to the time required to setup several conventional machines.Lead Time ReductionOnce a part program is written and proven, it is ready to be Bsed again in the future, even at a short notice. Although the lead time for the first run is usually longer, it is virtually nil for any subsequent run. Even if an engineering change of the part design12requires the program to be modi tied, it can be done usually quickly, reducing the lead time.Long lead time, required to design and manufacture sev-eral special fixtures for conventional machines, can often be reduced by preparing a part program and the use of sim-plified fixturing. Accuracy and RepeatabilityThe high degree of accuracy and repeatability of modern CNC machines has been the single major benefit to many users. Whether the part program is stored on a disk or in the computer memory, or even on a tape (the original method), it always remains the same. Any program can be changed at will, but once proven, no changes are usually required any more. A given program can be reused as many times as needed, without losing a single bit of data it contains. True, program has to allow for such changeable factors as tool wear and operating temperatures, it has to be stored safely, but generally very little interference from the CNC pro-grammer or operator will be required. The high accuracy of CNC machines and their repeatability allows high quality parts to be produced consistently time after time. Contouring of Complex ShapesNUMERICAL CONTROLCNC lathes and machining centers are capable of con-touring a variety of shapes. Many CNC users acquired their machines only to be able to handle complex parts. A good examples are CNC applications in the aircraft and automo-tive industries. The use of some form of computerized pro-gramming is virtually mandatory for any three dimensional tool path generation.Complex shapes, such as molds, can be manufactured without the additional expense of making a model for trac-ing. Mirrored parts can be achieved literally at the switch of a button. Storage of programs is a lot simpler than storage of patterns, templates, wooden models, and other pattern making tools.Simplified Tooling and Work HoldingNonstandard and 'homemade' tooling that clutters the benches and drawers around a conventional machine can be eliminated by using standard tooling, specially designed for numerical control applications. Multi-step tools such as pilot drills, step drills, combination tools, counter borers and others are replaced with several individual standard tools. These tools are often cheaper and easier to replace than special and nonstandard tools.Cost-cutting measures have forced many tool suppliers to keep a low or even a nonexistent inventory, increasing the delivery lime14to the customer. Standard, off-the-shelf tooling can usually beob-tained faster then nonstandard tooling.Fixturing and work holding for CNC machines have only one major purpose - to hold the part rigidly and in the same position for all parts within a batch. Fixtures designed for CNC work do not normally require jigs, pilot holes and other hole locating aids.♦ Cutting Time and Productivity IncreaseThe cutting time on the CNC machine is commonly known as the cycle time - and is always consistent. Unlike a conventional machining, where the operator's skill, experi-ence and personal fatigue are subject to changes, the CNC machining is under the control of a computer. The small amount of manual work is restricted to the setup andload-ing and unloading the part. For large batch runs, the high cost of the unproductive time is spread among many parts, making it less significant. The main benefit of a consistent cutting time is for repetitive jobs, where the production scheduling and work allocation to individual machine tools can be done very accurately.The main reason companies often purchase CNCma-chines is strictly economic - it is a serious investment. Also, having a competitive edge is always on the mind of every plant manager. The numerical control teclmology offers excellent means to achieve a significant improvement in the manufacturing productivity and increasing the overall quality of the manufactured parts. Like any means, it has to be used wisely and knowledgeably. When more and more companies use the CNCtechnology, just having a CNC machine does not offer the extra edge anymore. Thecom-panies that get forward are those who know how to use the technology efficiently and practice it to be competitive in the global economy.To reach the goal of a major increase in productivity, it is essential that users understand the fundamental principles on which CNC technology is based. These principles take many forms, for example, understanding the electronic cir-cuitry, complex ladder diagrams, computer logic, metrol-ogy, machine design, machining principles and practices and many others. Each one has to be studied and mastered by the person in charge. In this handbook, the emphasis is on the topics that relate directly to the CNC programming and understanding the most common CNC machine tools, the Machining Centers and the lathes (sometimes also called the Turning Centers). The part quality consideration should be very important to every programmer and ma-chine tool operator and this goal is also reflected in the handbook approach as well as in the numerous examples.TYPES OF CNC MACHINE TOOLSDifferent kinds of CNCmachines cover an extremelylarge variety. Their numbersare rapidly increasing, as thetechnology developmentadvances. It is impossible toiden-tify all the applications,they would make a long list.Here is a brief list of some ofthe groups CNC machines canbe part of: *Mills and Machining centersLathes and Turning CentersDrilling machines CNC machining centers andlathes dominate the number ofinstallations in industry. Thesetwo groups share the marketjust about equally. Someindustries may have a higherneed for one group ofmachines, depending on their □ Boring mills and Profilers □ EDM machines □ Punch presses and Shears □ Flame cutting machines □ Routers □ Water jet and Laser profilers □ Cylindrical grinders □ Welding machines □ Benders, Winding and Spinning machines, etc.needs. One must remember that there are many different kinds of ladies and equally many different kinds ofma-chining centers. However, the programming process for a vertical machine is similar to the one for a horizontalma-chine or a simple CNC mill. Even between differentma-chine groups, there is a great amount of general applica-tions and the programming process is generally the same. For example, a contour milled with an end mill has a lot in common with a contour cut with a wire.♦ Mills and Machining Centers Standard number of axes on a milling machine is three - the X, Y and Z axes. The part set on a milling system is al-ways stationary, mounted on a moving machine table. The cutting tool rotates, it can move up and down (or in and out), but it does not physically follow the tool path.CNC mills - sometimes called CNC milling machines - are usually small, simple machines, without a tool changer or other automatic features. Their power rating is often quite low. In industry, they are used for toolroom work, maintenance purposes, or small part production. They are usuallydesigned for contouring, unlike CNC drills.CNC machining centers are far more popular and effi-cient than drills and mills, mainly for their flexibility. The main benefit the user gets out of a CNC machining center is the ability to group several diverse operations into a single setup. For example, drilling, boring, counter boring, tap-ping, spot facing and contour milling can be incorporated into a single CNC program. In addition, the flexibility is enhanced by automatic tool changing, using pallets to minimize idle time, indexing to a different side of the part, using a rotary movement of additional axes, and a number of other features. CNC machining centers can be equipped with special software that controls the speeds and feeds, the life of the cutting tool, automatic in-process gauging and offset adjustment and other production enhancing and time saving devices.There are two basic designs of a typical CNC machining center. They are the vertical and the horizontal machining centers. The major difference between the two types is the nature of work that can be done on them efficiently. For a vertical CNC machining center, the most suitable type of work are flat parts, either mounted to the fixture on the ta-ble, or held in a vise or a chuck. The work that requires ma-chining on two or more faces m a single setup is more de-sirable to be done on a CNC horizontal machining center. An good example is a pump housing and other cubic-like shapes. Some multi-face machining of small parts can also be done on a CNC vertical machining center equipped with a rotary table.The programming process is the same for both designs, but an additional axis (usually a B axis) is added to the hori-zontal design. This axis is either a simple positioning axis (indexing axis) for the table, or a fully rotary axis for simul-taneous contouring. This handbook concentrates on the CNC vertical ma-chining centers applications, with a special section dealing with the horizontal setup and machining. The program-ming methods are also applicable to the small CNC mills or drilling and/or tapping machines, but the programmer has to consider their restrictions.♦ Lathes and Turning CentersA CNC lathe is usually a machine tool with two axes, the vertical X axis and the horizontal Z axis. The main feature of a lathe that distinguishes it from a mill is that the part is rotating about the machine center line. In addition, the cut-ting tool is normally stationary, mounted in a sliding turret. The cutting tool follows the contour of the programmed tool path. For the CNC lathes with a milling attachment, so called live tooling, the milling tool has its own motor and rotates while the spindle is stationary.The modem lathe design can be horizontal or vertical. Horizontal type is far more common than the vertical type, but both designs have their purpose in manufacturing. Sev-eral different designs exist for either group. For example, a typical CNC lathe of the horizontal group can be designed with a flat bed or a slant bed, as a bar type, chucker type or a universal type. Added to these combinations are many ac-cessories that make a CNC lathe an extremely flexible ma-chine tool. Typically, accessories such as a tailstock, steady rests or follow-up rests, part catchers,pullout-fingers and even a third axis milling attachment are popular compo-nents of the CNC lathe. ?CNC lathe can be veiy versatile - so versatile in fact, that it is often called a CNC TurningCenter. All text and program examples in this handbook use the more traditional term CNC lathe, yet still recogniz-ing all its modern functions.中文翻译:数控正如我们现在所知,数控技术出现于20世纪中叶。
毕业设计论文翻译(译文+原文)
Hacking tricks toward security on network environments Tzer-Shyong Chen1, Fuh-Gwo Jeng 2, and Yu-Chia Liu 11 Department of Information Management, Tunghai University, Taiwan2 Department of Applied Mathematics, National Chiayi University, TaiwanE-Mail:****************.edu.twAbstractMounting popularity of the Internet has led to the birth of Instant Messaging, an up-and-coming form of Internet communication. Instant Messaging is very popular with businesses and individuals since it has instant communication ability. As a result, Internet security has become a pressing and important topic for discussion. Therefore, in recent years, a lot of attention has been drawn towards Internet security and the various attacks carried out by hackers over the Internet. People today often handle affairs via the Internet. For instance, instead of the conventional letter, they communicate with others by e-mails; they chat with friends through an instant messenger; find information by browsing websites instead of going to the library; perform e-commerce transactions through the Internet, etc. Although the convenience of the Internet makes our life easier, it is also a threat to Internet security. For instance, a business email intercepted during its transmission may let slip business confidentiality; file transfers via instant messengers may also be intercepted, and then implanted with backdoor malwares; conversations via instant messengers could be eavesdropped. Furthermore, ID and password theft may lose us money when using Internet bank service. Attackers on the Internet use hacking tricks to damage systems while users are connected to the Internet. These threats along with possible careless disclosure of business information make Instant Messaging a very unsafe method of communication for businesses. The paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing or fraud via e-mails. (3) Fake Websites. Keywords:Hacking tricks, Trojan programs, Phishing, Firewall, Intrusion detection system.1. IntroductionIncreasingly more people are using instant messengers such as MSN Messenger, Yahoo! Messenger, ICQ, etc as the media of communication. These instant messengers transmit alphanumeric message as well as permit file sharing. During transfer, a file may be intercepted by a hacker and implanted with backdoor malware. Moreover, the e-mails users receive every day may include Spam, advertisements, and fraudulent mail intended to trick uninformed users. Fake websites too are prevalent. Websites which we often visit could be counterfeited by imitating the interface and the URL of the original, tricking users. The paper classifies hacking tricks into three categories which are explained in the following sections.2. Hacking TricksThe paper divides hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites.2.1 Trojan programs that share files via instant messengerInstant messaging allows file-sharing on a computer [9]. All present popular instant messengers have file sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. These communication softwares also makeit difficult for existing hack prevention methods to prevent and control information security. Therefore, we shall discuss how to control the flow of instant messages and how to identify dangerous user behavior.Hackers use instant communication capability to plant Trojan program into an unsuspected program; the planted program is a kind of remotely controlled hacking tool that can conceal itself and is unauthorized. The Trojan program is unknowingly executed, controlling the infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs [1] with instant messengers to access files are:When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.A hacker need not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port.Even if a computer uses dynamic IP addresses, its screen name doesn’t change.Certain Trojan programs are designed especially for instant messengers. These Trojans can change group settings and share all files on the hard disk of the infected computer. They can also destroy or modify data, causing data disarray. This kind of program allows a hacker access to all files on an infected computer, and thus poses a great threat to users. The Trojan program takes up a large amount of the resources of the computer causing it to become very slow and often crashes without a reason.Trojan programs that access a user computer through an instant messenger are probably harder to detect than classic Trojan horse programs. Although classic Trojan intrudes a computer by opening a listening or outgoing port which is used to connect toa remote computer, a desktop firewall can effectively block such Trojans. Alternatively, since it is very difficult for the server’s firewall to spot intrusion by controlling an instant messenger’s flow, it is extremely susceptible to intrusion.Present Trojan programs have already successfully implemented instant messengers. Some Trojan programs are Backdoor Trojan, AIMVision, and Backdoor. Sparta.C. Backdoor Trojans use ICQ pager to send messages to its writer. AIMVision steals AIM related information stored in the Windows registry, enabling a hacker to setup an AIM user id. Backdoor. Sparta.C uses ICQ to communicate with its writer and opens a port on an infected host and send its IP Address to the hacker, and at the same time attempts to terminate the antivirus program or firewall of the host.2.1.1 Hijacking and ImpersonationThere are various ways through which a hacker can impersonate other users [7]. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information impersonate the user; the user’s contacts not knowing that the user’s account has been hacked believe that the person they’re talking to is the user, and are persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, e-mails, etc.Current four most popular instant messengers are AIM, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore, a hackercan use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat-session. Although difficult, a hacker can use the man-in-the-middle attack to hijack the connection entirely. For example, a user may receive an offline message that resembles that sent by the server, but this message could have been sent by the hacker. All at once, the user could also get disconnected to the server. Furthermore, hackers may also use a Denial of Service (DoS) tool or other unrelated exploits to break the user’s connection. However, the server keeps the connection open, and does not know that the user has been disconnected; thus allowing the hacker to impersonate the user. Moreover, since the data flow is unencrypted and unauthenticated, a hacker can use man-in-the-middle attacks that are similar to that of ARP fraud to achieve its purpose.2.1.2 Denial of Service (DoS)There are many ways through which a hacker can launch a denial of service (DoS) attack [2] on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.Another commonly seen attack is the flooding of messages to a particular user. Most instant messengers allow the blocking of a particular user to prevent flood attacks. However, a hacker can use tools that allow him to log in using several different identities at the same time, or automatically create a large number of new user ids, thus enabling a flood attack. Once a flood attack begins, even if the user realizes that his/her computer has been infected, the computer will not be able to respond. Thus, the problem cannot be solved by putting a hacker’s user id on the ignore list of your instant messenger.A DoS attack on an instant messenger client is only a common hacking tool. The difficulty of taking precautions against it could turn this hacking tool into dangerous DoS type attacks. Moreover, some hacking tools do not just cause an instant messenger client to hang, but also cause the user end to consume large amount of CPU time, causing the computer to crash.2.1.3 Information DisclosureRetrieving system information through instant messenger users is currently the most commonly used hacking tool [4]. It can effortlessly collect user network information like, current IP, port, etc. IP address retriever is an example. IP address retrievers can be used to many purposes; for instance, a Trojan when integrated with an IP address retriever allows a hacker to receive all information related to the infected computer’s IP address as soon as the infected computer connects to the internet. Therefore, even if the user uses a dynamic IP address, hackers can still retrieve the IP address.IP address retrievers and other similar tools can also be used by hackers to send data and Trojans to unsuspecting users. Hackers may also persuade unsuspecting users to execute files through social engineering or other unrelated exploits. These files when executed search for information on the user’s computer and sends them back to the hacker through the instant messenger network.Different Trojan programs were designed for different instant messaging clients. For example, with a user accounts and password stealing Trojans a hacker can have full control of the account once the user logs out. The hacker can thus perform various tasks like changing the password and sending the Trojan program to all of the user’s contacts.Moreover, Trojans is not the only way through which a hacker can cause information disclosure. Since data sent through instant messengers are unencrypted, hackers can sniff and monitor entire instant messaging transmissions. Suppose an employee of an enterprise sends confidential information of the enterprise through the instant messenger; a hacker monitoring the instant messaging session can retrieve the data sent by the enterprise employee. Thus, we must face up to the severity of the problem.2.2 PhishingThe word “Phishing” first appeared in 1996. It is a variant of ‘fishing’, and formed by replacing the ‘f’ in ‘fishing’ with ‘ph’ from phone. It means tricking users of their money through e-mails.Based on the statistics of the Internet Crime Complaint Center, loss due to internet scam was as high as $1.256 million USD in 2004. The Internet Crime Complaint Center has listed the above Nigerian internet scam as one of the ten major internet scams.Based on the latest report of Anti-Phishing Working Group (APWG) [8], there has been a 28% growth of Phishing scams in the past 4 months, mostly in the US and in Asia. Through social engineering and Trojans, it is very difficult for a common user to detect the infection.To avoid exploitation of your compassion, the following should be noted:(1)When you need to enter confidentialinformation, first make sure that theinformation is entered via an entirely secureand official webpage. There are two ways todetermine the security of the webpage:a.The address displayed on the browserbegins with https://, and not http://. Payattention to if the letter ‘s’ exists.b.There is a security lock sign on the lowerright corner of the webpage, and whenyour mouse points to the sign, a securitycertification sign shall appear.(2)Consider installing a browser security softwarelike SpoofStick which can detect fake websites.(3)If you suspect the received e-mail is a Phishinge-mail, do not open attachments attached to theemail. Opening an unknown attachment couldinstall malicious programs onto your computer.(4)Do not click on links attached to your emails. Itis always safer to visit the website through theofficial link or to first confirm the authenticityof the link. Never follow or click on suspiciouslinks in an e-mail. It is advisable to enter theURL at the address bar of the web browser,and not follow the given link.Generally speaking, Phishing [3] [5] is a method that exploits people’s sympathy in the form of aid-seeking e-mails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website; but in truth links the readers to a website that will install a Trojan program into the reader’s computer. Therefore, users should not forward unauthenticated charity mails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often asks users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fillin the required information. People are often trapped by phishing due to inattentionBesides, you must also be careful when using a search engine to search for donations and charitable organizations.2.3 Fake WebsitesFake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.There are countless kinds of phishing baits, for instance, messages that say data expired, data invalid, please update data, or identity verification intended to steal account ID and matching password. This typeof online scam is difficult for users to identify. As scam methods become finer, e-mails and forged websites created by the impostor resemble their original, and tremendous losses arise from the illegal transactions.The following are methods commonly used by fake websites. First, the scammers create a similar website homepage; then they send out e-mails withenticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes. Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:(1)Observe the correct procedure for entering abanking website. Do not use links resultingfrom searches or links on other websites.(2)Online banking certifications are currently themost effective security safeguard measure. (3)Do not easily trust e-mails, phone calls, andshort messages, etc. that asks for your accountnumber and passwords.Phishers often impost a well-known enterprise while sending their e-mails, by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website.Most Phishers create imitations of well known enterprises websites to lure users into using their fake websites. Even so, a user can easily notice that the URL of the website they’re entering has no relation to the intended enterprise. Hence, Phishers may use different methods to impersonate enterprises and other people. A commonly used method is hiding the URL. This can easily be done with the help of JavaScript.Another way is to exploit the loopholes in an internet browser, for instance, displaying a fake URL in the browser’s address bar. The security loophole causing the address bar of a browser to display a fake URL is a commonly used trick and has often been used in the past. For example, an e-mail in HTML format may hold the URL of a website of a well-known enterprise, but in reality, the link connects to a fake website.The key to successfully use a URL similar to that of the intended website is to trick the visual senses. For example, the sender’s address could be disguised as that of Nikkei BP, and the link set to http://www.nikeibp.co.jp/ which has one k less than the correct URL which is http://www.nikkeibp.co.jp/. The two URLs look very similar, and the difference barely noticeable. Hence people are easily tricked into clicking the link.Besides the above, there are many more scams that exploit the trickery of visual senses. Therefore, you should not easily trust the given sender’s name and a website’s appearance. Never click on unfamiliar and suspicious URLs on a webpage. Also, never enter personal information into a website without careful scrutiny.3. ConclusionsBusiness strategy is the most effective form of defense and also the easiest to carry out. Therefore, they should be the first line of defense, and not last. First, determine if instant messaging is essential in the business; then weigh its pros and cons. Rules and norms must be set on user ends if it is decided that the business cannot do without instant messaging functionality. The end server should be able to support functions like centralized logging and encryption. If not, then strict rules must be drawn, and carried out by the users. Especially, business discussions must not be done over an instant messenger.The paper categorized hacking tricks into three categories: (1) Trojan programs that share files via instant messenger. (2) Phishing (3) Fake Websites. Hacking tricks when successfully carried out could cause considerable loss and damage to users. The first category of hacking tricks can be divided into three types: (1) Hijacking and Impersonation; (2) Denial of Service; (3) Information Disclosure.Acknowledgement:This work was supported by the National Science Council, Taiwan, under contract No. NSC 95-2221-E-029-024.References[1] B. Schneier, “The trojan horse race,”Communications of ACM, Vol. 42, 1999, pp.128.[2] C. L. Schuba, “Analysis of a denial of serviceattack on TCP,” IEEE Security and PrivacyConference, 1997, pp. 208-223.[3] E. Schultz, “Phishing is becoming moresophisticated,” Computer and Security, Vol.24(3), 2005, pp. 184-185.[4]G. Miklau, D. Suciu, “A formal analysis ofinformation disclosure in data exchange,”International Conference on Management ofData, 2004, pp. 575-586.[5]J. Hoyle, “'Phishing' for trouble,” Journal ofthe American Detal Association, Vol. 134(9),2003, pp. 1182-1182.[6]J. Scambray, S. McClure, G. Kurtz, Hackingexposed: network security secrets and solutions,McGraw-Hill, 2001.[7]T. Tsuji and A. Shimizu, “An impersonationattack on one-time password authenticationprotocol OSPA,” to appear in IEICE Trans.Commun, Vol. E86-B, No.7, 2003.[8]Anti-Phishing Working Group,.[9]/region/tw/enterprise/article/icq_threat.html.有关网络环境安全的黑客技术摘要:现在人们往往通过互联网处理事务。
毕业设计的论文中英翻译
Anti-Aircraft Fire Control and the Development of IntegratedSystems at SperryT he dawn of the electrical age brought new types of control systems. Able to transmit data between distributed components and effect action at a distance, these systems employed feedback devices as well as human beings to close control loops at every level. By the time theories of feedback and stability began to become practical for engineers in the 1930s a tradition of remote and automatic control engineering had developed that built distributed control systems with centralized information processors. These two strands of technology, control theory and control systems, came together to produce the large-scale integrated systems typical of World War II and after.Elmer Ambrose Sperry (I860-1930) and the company he founded, the Sperry Gyroscope Company, led the engineering of control systems between 1910 and 1940. Sperry and his engineers built distributed data transmission systems that laid the foundations of today‟s command and control systems. Sperry‟s fire control systems included more than governors or stabilizers; they consisted of distributed sensors, data transmitters, central processors, and outputs that drove machinery. This article tells the story of Sperry‟s involvement in anti-aircraft fire control between the world wars and shows how an industrial firm conceived of control systems before the common use of control theory. In the 1930s the task of fire control became progressively more automated, as Sperry engineers gradually replaced human operators with automatic devices. Feedback, human interface, and system integration posed challenging problems for fire control engineers during this period. By the end of the decade these problems would become critical as the country struggled to build up its technology to meet the demands of an impending war.Anti-Aircraft Artillery Fire ControlBefore World War I, developments in ship design, guns, and armor drove the need for improved fire control on Navy ships. By 1920, similar forces were at work in the air: wartime experiences and postwar developments in aerial bombing created the need for sophisticated fire control for anti-aircraft artillery. Shooting an airplane out of the sky is essentially a problem of “leading” the target. As aircraft developed rapidly in the twenties, their increased speed and altitude rapidly pushed the task of computing the lead out of the range of human reaction and calculation. Fire control equipment for anti-aircraft guns was a means of technologically aiding human operators to accomplish a task beyond their natural capabilities.During the first world war, anti-aircraft fire control had undergone some preliminary development. Elmer Sperry, as chairman of the Aviation Committee of the Naval Consulting Board, developed two instruments for this problem: a goniometer,a range-finder, and a pretelemeter, a fire director or calculator. Neither, however, was widely used in the field.When the war ended in I918 the Army undertook virtually no new development in anti-aircraft fire control for five to seven years. In the mid-1920s however, the Army began to develop individual components for anti-aircraft equipment including stereoscopic height-finders, searchlights, and sound location equipment. The Sperry Company was involved in the latter two efforts. About this time Maj. Thomas Wilson, at the Frankford Arsenal in Philadelphia, began developing a central computer for firecontrol data, loosely based on the system of “director firing” that had developed in naval gunn ery. Wilson‟s device resembled earlier fire control calculators, accepting data as input from sensing components, performing calculations to predict the future location of the target, and producing direction information to the guns.Integration and Data TransmissionStill, the components of an anti-aircraft battery remained independent, tied together only by telephone. As Preston R. Bassett, chief engineer and later president of the Sperry Company, recalled, “no sooner, however, did the components get to the point of functioning satisfactorily within themselves, than the problem of properly transmitting the information from one to the other came to be of prime importance.”Tactical and terrain considerations often required that different fire control elements be separated by up to several hundred feet. Observers telephoned their data to an officer, who manually entered it into the central computer, read off the results, and telephoned them to the gun installations. This communication system introduced both a time delay and the opportunity for error. The components needed tighter integration, and such a system required automatic data communications.In the 1920s the Sperry Gyroscope Company led the field in data communications. Its experience came from Elmer Spe rry‟s most successful invention, a true-north seeking gyro for ships. A significant feature of the Sperry Gyrocompass was its ability to transmit heading data from a single central gyro to repeaters located at a number of locations around the ship. The repeaters, essentially follow-up servos, connected to another follow-up, which tracked the motion of the gyro without interference. These data transmitters had attracted the interest of the Navy, which needed a stable heading reference and a system of data communication for its own fire control problems. In 1916, Sperry built a fire control system for the Navy which, although it placed minimal emphasis on automatic computing, was a sophisticated distributed data system. By 1920 Sperry had installed these systems on a number of US. battleships.Because of the Sperry Company‟s experience with fire control in the Navy, as well as Elmer Sperry‟s earlier work with the goniometer and the pretelemeter, the Army approached the company for help with data transmission for anti-aircraft fire control. To Elmer Sperry, it looked like an easy problem: the calculations resembled those in a naval application, but the physical platform, unlike a ship at sea, anchored to the ground. Sperry engineers visited Wilson at the Frankford Arsenal in 1925, and Elmer Sperry followed up with a letter expressing his interest in working on the problem. He stressed his company‟s experience with naval problems, as well as its recent developments in bombsights, “work from the other end of the pro position.” Bombsights had to incorporate numerous parameters of wind, groundspeed, airspeed, and ballistics, so an anti-aircraft gun director was in some ways a reciprocal bombsight . In fact, part of the reason anti-aircraft fire control equipment worked at all was that it assumed attacking bombers had to fly straight and level to line up their bombsights. Elmer Sperry‟s interests were warmly received, and in I925 and 1926 the Sperry Company built two data transmission systems for the Army‟s gun directors.The original director built at Frankford was designated T-1, or the “Wilson Director.” The Army had purchased a Vickers director manufactured in England, but encouraged Wilson to design one thatcould be manufactured in this country Sperry‟s two data tran smission projects were to add automatic communications between the elements of both the Wilson and the Vickers systems (Vickers would eventually incorporate the Sperry system into its product). Wilson died in 1927, and the Sperry Company took over the entire director development from the Frankford Arsenal with a contract to build and deliver a director incorporating the best features of both the Wilson and Vickers systems. From 1927 to 193.5, Sperry undertook a small but intensive development program in anti-aircraft systems. The company financed its engineering internally, selling directors in small quantities to the Army, mostly for evaluation, for only the actual cost of production [S]. Of the nearly 10 models Sperry developed during this period, it never sold more than 12 of any model; the average order was five. The Sperry Company offset some development costs by sales to foreign govemments, especially Russia, with the Army‟s approval 191.The T-6 DirectorSperry‟s modified version of Wilson‟s director was designated T-4 in development. This model incorporated corrections for air density, super-elevation, and wind. Assembled and tested at Frankford in the fall of 1928, it had problems with backlash and reliability in its predicting mechanisms. Still, the Army found the T-4 promising and after testing returned it to Sperry for modification. The company changed the design for simpler manufacture, eliminated two operators, and improved reliability. In 1930 Sperry returned with the T-6, which tested successfully. By the end of 1931, the Army had ordered 12 of the units. The T-6 was standardized by the Army as the M-2 director.Since the T-6 was the first anti-aircraft director to be put into production, as well as the first one the Army formally procured, it is instructive to examine its operation in detail. A technical memorandum dated 1930 explained the theory behind the T-6 calculations and how the equations were solved by the system. Although this publication lists no author, it probably was written by Earl W. Chafee, Sperry‟s director of fire control engineering. The director was a complex mechanical analog computer that connected four three-inch anti-aircraft guns and an altitude finder into an integratedsystem (see Fig. 1). Just as with Sperry‟s naval fire control system, the primary means of connection were “data transmitters,” similar to those that connected gyrocompasses to repeaters aboard ship.The director takes three primary inputs. Target altitude comes from a stereoscopic range finder. This device has two telescopes separated by a baseline of 12 feet; a single operator adjusts the angle between them to bring the two images into coincidence. Slant range, or the raw target distance, is then corrected to derive its altitude component. Two additional operators, each with a separate telescope, track the target, one for azimuth and one for elevation. Each sighting device has a data transmitter that measures angle or range and sends it to the computer. The computer receives these data and incorporates manual adjustments for wind velocity, wind direction, muzzle velocity, air density, and other factors. The computer calculates three variables: azimuth, elevation, and a setting for the fuze. The latter, manually set before loading, determines the time after firing at which the shell will explode. Shells are not intended to hit the target plane directly but rather to explode near it, scattering fragments to destroy it.The director performs two major calculations. First, pvediction models the motion of the target and extrapolates its position to some time in the future. Prediction corresponds to “leading” the target. Second, the ballistic calculation figures how to make the shell arrive at the desired point in space at the future time and explode, solving for the azimuth and elevation of the gun and the setting on the fuze. This calculation corresponds to the traditional artillery man‟s task of looking up data in a precalculated “firing table” and setting gun parameters accordingly. Ballistic calculation is simpler than prediction, so we will examine it first.The T-6 director solves the ballistic problem by directly mechanizing the traditional method, employing a “mechanical firing table.” Traditional firing tables printed on paper show solutions for a given angular height of the target, for a given horizontal range, and a number of other variables. The T-6 replaces the firing table with a Sperry ballistic cam.” A three-dimensionally machined cone shaped device, the ballistic cam or “pin follower” solves a pre-determined function. Two independent variables are input by the angular rotation of the cam and the longitudinal position of a pin that rests on top of the cam. As the pin moves up and down the length of the cam, and as the cam rotates, the height of the pin traces a function of two variables: the solution to the ballistics problem (or part of it). The T-6 director incorporates eight ballistic cams, each solving for a different component of the computation including superelevation, time of flight, wind correction, muzzle velocity. air density correction. Ballistic cams represented, in essence, the stored data of the mechanical computer. Later directors could be adapted to different guns simply by replacing the ballistic cams with a new set, machined according to different firing tables. The ballistic cams comprised a central component of Sperry‟s mechanical computing technology. The difficulty of their manufacture would prove a major limitation on the usefulness of Sperry directors.The T-6 director performed its other computational function, prediction, in an innovative way as well. Though the target came into the system in polar coordinates (azimuth, elevation, and range), targets usually flew a constant trajectory (it was assumed) in rectangular coordinates-i.e. straight andlevel. Thus, it was simpler to extrapolate to the future in rectangular coordinates than in the polar system. So the Sperry director projected the movement of the target onto a horizontal plane, derived the velocity from changes in position, added a fixed time multiplied by the velocity to determine a future position, and then converted the solution back into polar coordinates. This method became known as the “plan prediction method”because of the representation of the data on a flat “plan” as viewed from above; it was commonly used through World War II. In the plan prediction method, “the actual movement of the target is mechanically reproduced on a small scale within the Computer and the desired angles or speeds can be measured directly from the movements of these elements.”Together, the ballistic and prediction calculations form a feedback loop. Operators enter an estimated “time of flight” for the shell when they first begin tracking. The predictor uses this estimate to perform its initial calculation, which feeds into the ballistic stage. The output of the ballistics calculation then feeds back an updated time-of-flight estimate, which the predictor uses to refine the initial estimate. Thus “a cumulative cycle of correction brings the predicted future position of the target up to the point indicated by the actual future time of flight.”A square box about four feet on each side (see Fig. 2) the T-6 director was mounted on a pedestal on which it could rotate. Three crew would sit on seats and one or two would stand on a step mounted to the machine. The remainder of the crew stood on a fixed platform; they would have had to shuffle around as the unit rotated. This was probably not a problem, as the rotation angles were small. The direc tor‟s pedestal mounted on a trailer, on which data transmission cables and the range finder could be packed for transportation.We have seen that the T-6 computer took only three inputs, elevation, azimuth, and altitude (range), and yet it required nine operators. These nine did not include the operation of the range finder, which was considered a separate instrument, but only those operating the director itself. What did these nine men do?Human ServomechanismsTo the designers of the director, the operato rs functioned as “manual servomechanisms.”One specification for the machine required “minimum dependence on …human element.‟ The Sperry Company explained, “All operations must be made as mechanical and foolproof as possible; training requirements must visualize the conditions existent under rapid mobilization.” The lessons of World War I ring in this statement; even at the height of isolationism, with the country sliding into depression, design engineers understood the difficulty of raising large numbers of trained personnel in a national emergency. The designers not only thought the system should account for minimal training and high personnel turnover, they also considered the ability of operators to perform their duties under the stress of battle. Thus, nearly all the work for the crew was in a “follow-the-pointer”mode: each man concentrated on an instrument with two indicating dials, one the actual and one the desired value for a particular parameter. With a hand crank, he adjusted the parameter to match the two dials.Still, it seems curious that the T-6 director required so many men to perform this follow-the-pointer input. When the external rangefinder transmitted its data to the computer, it appeared on a dial and an operator had to follow the pointer to actually input the data into the computing mechanism. The machine did not explicitly calculate velocities. Rather, two operators (one for X and one for Y) adjusted variable-speed drives until their rate dials matched that of a constant-speed motor. When the prediction computation was complete, an operator had to feed the result into the ballistic calculation mechanism. Finally, when the entire calculation cycle was completed, another operator had to follow the pointer to transmit azimuth to the gun crew, who in turn had to match the train and elevation of the gun to the pointer indications.Human operators were the means of connecting “individual elements” into an integrated system. In one sense the men were impedance amplifiers, and hence quite similar to servomechanisms in other mechanical calculators of the time, especially Vannevar Bush‟s differential analyzer .The term “manual servomechanism”itself is an oxymoron: by the conventional definition, all servomechanisms are automatic. The very use of the term acknowledges the existence of an automatic technology that will eventually replace the manual method. With the T-6, this process was already underway. Though the director required nine operators, it had already eliminated two from the previous generation T-4. Servos replaced the operator who fed back superelevation data and the one who transmitted the fuze setting. Furthermore, in this early machine one man corresponded to one variable, and the machine‟s requirement for operators corresponded directly to the data flow of its computation. Thus the crew that operated the T-6 director was an exact reflection of the algorithm inside it.Why, then, were only two of the variables automated? This partial, almost hesitating automation indicates there was more to the human servo-motors than Sperry wanted to acknowledge. As much as the company touted “their duties are purely mechanical and little skill or judgment is required on the part of the operators,” men were still required to exercise some judgment, even if unconsciously. The data were noisy, and even an unskilled human eye could eliminate complications due to erroneous or corrupted data. The mechanisms themselves were rather delicate and erroneous input data, especially if it indicated conditions that were not physically possible, could lock up or damage the mechanisms. Theoperators performed as integrators in both senses of the term: they integrated different elements into a system.Later Sperry DirectorsWhen Elmer Sperry died in 1930, his engineers were at work on a newer generation director, the T-8. This machine was intended to be lighter and more portable than earlier models, as well as less expensive and “procurable in quantities in case of emergency.” The company still emphasized the need for unskilled men to operate the system in wartime, and their role as system integrators. The operators were “mechanical links in the apparatus, thereby making it possible to avoid mechanical complication which would be involved by the use of electrical or mechanical servo motors.” Still, army field experience with the T-6 had shown that servo-motors were a viable way to reduce the number of operators and improve reliability, so the requirements for the T-8 specified that wherever possible “electrical shall be used to reduce the number of operators to a minimum.” Thus the T-8 continued the process of automating fire control, and reduced the number of operators to four. Two men followed the target with telescopes, and only two were required for follow-the-pointer functions. The other follow-the-pointers had been replaced by follow-up servos fitted with magnetic brakes to eliminate hunting. Several experimental versions of the T-8 were built, and it was standardized by the Army as the M3 in 1934.Throughout the remain der of the …30s Sperry and the army fine-tuned the director system in the M3. Succeeding M3 models automated further, replacing the follow-the-pointers for target velocity with a velocity follow-up which employed a ball-and-disc integrator. The M4 series, standardized in 1939, was similar to the M3 but abandoned the constant altitude assumption and added an altitude predictor for gliding targets. The M7, standardized in 1941, was essentially similar to the M4 but added full power control to the guns for automatic pointing in elevation and azimuth. These later systems had eliminated errors. Automatic setters and loaders did not improve the situation because of reliability problems. At the start of World War II, the M7 was the primary anti-aircraft director available to the army.The M7 was a highly developed and integrated system, optimized for reliability and ease of operation and maintenance. As a mechanical computer, it was an elegant, if intricate, device, weighing 850 pounds and including about 11,000 parts. The design of the M7 capitalized on the strength of the Sperry Company: manufacturing of precision mechanisms, especially ballistic cams. By the time the U.S. entered the second world war, however, these capabilities were a scarce resource, especially for high volumes. Production of the M7 by Sperry and Ford Motor Company as subcontractor was a “real choke” and could not keep up with production of the 90mm guns, well into 1942. The army had also adopted an English system, known as the “Kerrison Director” or M5, which was less accurate than the M7 but easier to manufacture. Sperry redesigned the M5 for high-volume production in 1940, but passed in 1941.Conclusion: Human Beings as System IntegratorsThe Sperry directors we have examined here were transitional, experimental systems. Exactly for that reason, however, they allow us to peer inside the process of automation, to examine the displacement of human operators by servomechanisms while the process was still underway. Skilled asthe Sperry Company was at data transmission, it only gradually became comfortable with the automatic communication of data between subsystems. Sperry could brag about the low skill levels required of the operators of the machine, but in 1930 it was unwilling to remove them completely from the process. Men were the glue that held integrated systems together.As products, the Sperry Company‟s anti-aircraft gun directors were only partially successful. Still, we should judge a technological development program not only by the machines it produces but also by the knowledge it creates, and by how that knowledge contributes to future advances. Sperry‟s anti-aircraft directors of the 1930s were early examples of distributed control systems, technology that would assume critical importance in the following decades with the development of radar and digital computers. When building the more complex systems of later years, engineers at Bell Labs, MIT, and elsewhere would incorporate and build on the Sperry Company‟s experience,grappling with the engineering difficulties of feedback, control, and the augmentation of human capabilities by technological systems.在斯佩里防空炮火控和集成系统的发展电气时代的到来带来了新类型的控制系统。
毕业设计(论文)外文翻译
华南理工大学广州学院本科生毕业设计(论文)翻译外文原文名Agency Cost under the Restriction of Free Cash Flow中文译名自由现金流量的限制下的代理成本学院管理学院专业班级会计学3班学生姓名陈洁玉学生学号200930191100指导教师余勍讲师填写日期2015年5月11日外文原文版出处:译文成绩:指导教师(导师组长)签名:译文:自由现金流量的限制下的代理成本摘要代理成本理论是资本结构理论的一个重要分支。
自由现金流代理成本有显着的影响。
在这两个领域相结合的研究,将有助于建立和扩大理论体系。
代理成本理论基础上,本研究首先分类自由现金流以及统计方法的特点。
此外,投资自由现金流代理成本的存在证明了模型。
自由现金流代理成本理论引入限制,分析表明,它会改变代理成本,进而将影响代理成本和资本结构之间的关系,最后,都会影响到最优资本结构点,以保持平衡。
具体地说,自由现金流增加,相应地,债务比例会降低。
关键词:资本结构,现金流,代理成本,非金钱利益1、介绍代理成本理论,金融契约理论,信号模型和新的啄食顺序理论,新的资本结构理论的主要分支。
财务con-道的理论侧重于限制股东的合同行为,解决股东和债权人之间的冲突。
信令模式和新的啄食顺序理论中心解决投资者和管理者之间的冲突。
这两种类型的冲突是在商业组织中的主要冲突。
代理成本理论认为,如何达到平衡这两种类型的冲突,资本结构是如何形成的,这是比前两次在一定程度上更多的理论更全面。
……Agency Cost under the Restriction of Free Cash FlowAbstractAgency cost theory is an important branch of capital structural theory. Free cash flow has significant impact on agency cost. The combination of research on these two fields would help to build and extend the theoretical system. Based on agency cost theory, the present study firstly categorized the characteristics of free cash flow as well as the statistical methodologies. Furthermore, the existence of investing free cash flow in agency cost was proved by a model. Then free cash flow was introduced into agency cost theory as restriction, the analysis shows that it will change agency cost, in turn, will have an impact on the relationship between agency cost and capital structure, finally, will influence the optimal capital structure point to maintain the equilibrium. Concretely, with the increasing free cash flow, correspondingly, debt proportion will decrease.Keywords:Capital Structure,Free Cash Flow,Agency Cost,Non-Pecuniary Benefit1. IntroductionAgency cost theory, financial contract theory, signaling model and new pecking order theory are the main branches of new capital structure theory. Financial con-tract theory focuses on restricting stockholders’ behavior by contract and solving the conflict between stockholders and creditors. Signaling model and new pecking order theory center on solving the conflict between investors and managers. These two types of conflict are the main conflict in business organizations. Agency cost theory considers how equilibrium is reached in both types of conflict and how capital structure is formed, which is more theory is more comprehensive than the previous two to some degree.……。
土木工程-毕业设计-论文-外文翻译-中英文对照
英文原文:Concrete structure reinforcement designSheyanb oⅠWangchenji aⅡⅠFoundation Engineering Co., Ltd. Heilongjiang DongyuⅡHeilongjiang Province, East Building Foundation Engineering Co., Ltd. CoalAbstract:structure in the long-term natural environment and under the use environment's function, its function is weaken inevitably gradually, our structural engineering's duty not just must finish the building earlier period the project work, but must be able the science appraisal structure damage objective law and the degree, and adopts the effective method guarantee structure the security use, that the structure reinforcement will become an important work. What may foresee will be the 21st century, the human building also by the concrete structure, the steel structure, the bricking-up structure and so on primarily, the present stage I will think us in the structure reinforcement this aspect research should also take this as the main breakthrough direction.Key word:Concrete structure reinforcement bricking-up structure reinforcement steel structure reinforcement1 Concrete structure reinforcementConcrete structure's reinforcement divides into the direct reinforcement and reinforces two kinds indirectly, when the design may act according to the actual condition and the operation requirements choice being suitable method and the necessary technology.1.1the direct reinforcement's general method1)Enlarges the section reinforcement lawAdds the concretes cast-in-place level in the reinforced concrete member in bending compression zone, may increase the section effective height, the expansion cross sectional area, thus enhances the component right section anti-curved, the oblique section anti-cuts ability and the section rigidity, plays the reinforcement reinforcement the role.In the suitable muscle scope, the concretes change curved the component right section supporting capacity increase along with the area of reinforcement and the intensity enhance. In the original component right section ratio of reinforcement not too high situation, increases the main reinforcement area to be possible to propose the plateau component right section anti-curved supporting capacity effectively. Is pulled in the section the area to add the cast-in-place concrete jacket to increase the component section, through new Canada partial and original component joint work, but enhances the component supporting capacity effectively, improvement normal operational performance.Enlarges the section reinforcement law construction craft simply, compatible, and has the mature design and the construction experience; Is suitable in Liang, the board, the column, the wall and the general structure concretes reinforcement; But scene construction's wet operating time is long, to produces has certain influence with the life, and after reinforcing the building clearance has certain reduction.2) Replacement concretes reinforcement lawThis law's merit with enlarges the method of sections to be close, and after reinforcing, does not affect building's clearance, but similar existence construction wet operating time long shortcoming; Is suitable somewhat low or has concretes carrier's and so on serious defect Liang, column in the compression zone concretes intensity reinforcement.3) the caking outsourcing section reinforcement lawOutside the Baotou Steel Factory reinforcement is wraps in the section or the steel plate is reinforced component's outside, outside the Baotou Steel Factory reinforces reinforced concrete Liang to use the wet outsourcing law generally, namely uses the epoxy resinification to be in the milk and so on methods with to reinforce the section the construction commission to cake a whole, after the reinforcement component, because is pulled with the compressed steel cross sectional area large scale enhancement, therefore right section supporting capacity and section rigidity large scale enhancement.This law also said that the wet outside Baotou Steel Factory reinforcement law, the stress is reliable, the construction is simple, the scene work load is small, but is big with the steel quantity, and uses in above not suitably 600C in the non-protection's situation the high temperature place; Is suitable does not allow in the use obviously to increase the original component section size, but requests to sharpen its bearing capacity large scale the concrete structure reinforcement.4) Sticks the steel reinforcement lawOutside the reinforced concrete member in bending sticks the steel reinforcement is (right section is pulled in the component supporting capacity insufficient sector area, right section compression zone or oblique section) the superficial glue steel plate, like this may enhance is reinforced component's supporting capacity, and constructs conveniently.This law construction is fast, the scene not wet work or only has the plastering and so on few wet works, to produces is small with the life influence, and after reinforcing, is not remarkable to the original structure outward appearance and the original clearance affects, but the reinforcement effect is decided to a great extent by the gummy craft and the operational level; Is suitable in the withstanding static function, and is in the normal humidity environment to bend or the tension member reinforcement.5) Glue fibre reinforcement plastic reinforcement lawOutside pastes the textile fiber reinforcement is pastes with the cementing material the fibre reinforcement compound materials in is reinforced the component to pull the region, causes it with to reinforce the section joint work, achieves sharpens the component bearing capacity the goal. Besides has glues the steel plate similar merit, but also has anticorrosive muddy, bears moistly, does not increase the self-weight of structure nearly, durably, the maintenance cost low status merit, but needs special fire protection processing, is suitable in each kind of stress nature concrete structure component and the general construction.This law's good and bad points with enlarge the method of sections to be close; Is suitable reinforcement which is insufficient in the concrete structure component oblique section supporting capacity, or must exert the crosswise binding force to the compressional member the situation.6) Reeling lawThis law's good and bad points with enlarge the method of sections to be close; Is suitable reinforcement which is insufficient in the concrete structure component oblique section supporting capacity, or must exert the crosswise binding force to the compressional member the situation.7) Fang bolt anchor lawThis law is suitable in the concretes intensity rank is the C20~C60 concretes load-bearing member transformation, the reinforcement; It is not suitable for already the above structure which and the light quality structure makes decent seriously. 1.2The indirect reinforcement's general method1)Pre-stressed reinforcement law(1)Thepre-stressed horizontal tension bar reinforces concretes member in bending,because the pre-stressed and increases the exterior load the combined action, in the tension bar has the axial tension, this strength eccentric transmits on the component through the pole end anchor (, when tension bar and Liang board bottom surface close fitting, tension bar can look for tune together with component, this fashion has partial pressures to transmit directly for component bottom surface), has the eccentric compression function in the component, this function has overcome the bending moment which outside the part the load produces, reduced outside the load effect, thus sharpened component's anti-curved ability. At the same time, because the tension bar passes to component's pressure function, the component crack development can alleviate, the control, the oblique section anti-to cut the supporting capacity also along with it enhancement.As a result of the horizontal lifting stem's function, the original component's section stress characteristic by received bends turned the eccentric compression, therefore, after the reinforcement, component's supporting capacity was mainly decided in bends under the condition the original component's supporting capacity 。
论文英文翻译最终版
序号(学号):040940131长春光华学院毕业设计(论文)译文Electronic technique电子技术姓名盛遵义教学院电气信息学院专业电子信息工程班级电信09401指导教师张淑艳(讲师)2013 年04 月10 日┊┊┊┊┊┊┊┊┊┊┊┊┊装┊┊┊┊┊订┊┊┊┊┊线┊┊┊┊┊┊┊┊┊┊┊┊┊Electronic techniqueFrom the world of radio in the world to a single chip, modern computer technology, industrial revolution, the world economy from the capital into the economy to knowledge economy。
Field in the electronic world, from the 20th century into the era of radio to computer technology in the 21st century as the center of the intelligent modern era of electronic systems。
The basic core of modern electronic systems are embedded computer systems (referred to as embedded systems), while the microcontroller is the most typical and most extensive and most popular embedded systems。
radio has created generations of excellence in the world Fifties and sixties in the 20th century,the most representative of the advanced electronic technology is wireless technology, including radio broadcasting, radio,wireless communications (telegraph),Amateur Radio, radio positioning,navigation and other telemetry, remote control, remote technology。
本科毕业设计(论文)外文翻译译文
本科毕业设计(论文)外文翻译译文学生姓名:院(系):油气资源学院专业班级:物探0502指导教师:完成日期:年月日地震驱动评价与发展:以玻利维亚冲积盆地的研究为例起止页码:1099——1108出版日期:NOVEMBER 2005THE LEADING EDGE出版单位:PanYAmericanYEnergyvBuenosYAiresvYArgentinaJPYBLANGYvYBPYExplorationvYHoustonvYUSAJ.C.YCORDOVAandYE.YMARTINEZvYChacoYS.A.vYSantaYCruzvYBolivia 通过整合多种地球物理地质技术,在玻利维亚冲积盆地,我们可以减少许多与白垩纪储集层勘探有关的地质技术风险。
通过对这些远景区进行成功钻探我们可以验证我们的解释。
这些方法包括盆地模拟,联井及地震叠前同时反演,岩石性质及地震属性解释,A VO/A V A,水平地震同相轴,光谱分解。
联合解释能够得到构造和沉积模式的微笑校正。
迄今为止,在新区有七口井已经进行了成功钻探。
基质和区域地质。
Tarija/Chaco盆地的subandean 褶皱和冲断带山麓的中部和南部,部分扩展到玻利维亚的Boomerange地区经历了集中的成功的开采。
许多深大的泥盆纪气田已经被发现,目前正在生产。
另外在山麓发现的规模较小较浅的天然气和凝析气田和大的油田进行价格竞争,如果他们能产出较快的油流而且成本低。
最近发现气田就是这种情况。
接下来,我们赋予Aguja的虚假名字就是为了讲述这些油田的成功例子。
图1 Aguja油田位于玻利维亚中部Chaco盆地的西北角。
基底构造图显示了Isarzama背斜的相对位置。
地层柱状图显示了主要的储集层和源岩。
该油田在Trija和冲积盆地附近的益背斜基底上,该背斜将油田和Ben i盆地分开(图1),圈闭类型是上盘背斜,它存在于连续冲断层上,Aguja有两个主要结构:Aguja中部和Aguja Norte,通过重要的转换压缩断层将较早开发的“Sur”油田分开Yantata Centro结构是一个三路闭合对低角度逆冲断层并伴随有小的摆幅。
(完整版)_毕业设计(论文)外文翻译_(原文)
毕业设计(论文)——外文翻译(原文)NEW APPLICATION OF DATABASERelational databases in use for over two decades. A large portion of the applications of relational databases in the commercial world, supporting such tasks as transaction processing for banks and stock exchanges, sales and reservations for a variety of businesses, and inventory and payroll for almost of all companies. We study several new applications, which recent years.First. Decision-support systemAs the online availability of data , businesses to exploit the available data to make better decisions about increase sales. We can extract much information for decision support by using simple SQL queries. Recently support based on data analysis and data mining, or knowledge discovery, using data from a variety of sources.Database applications can be broadly classified into transaction processing and decision support. Transaction-processing systems are widely used today, and companies generated by these systems.The term data mining refers loosely to finding relevant information, or “discovering knowledge,” from a large volume of data. Like knowledge discovery in artificial intelligence, data mining attempts to discover statistical rules and patterns automatically from data. However, data mining differs from machine learning in that it deals with large volumes of data, stored primarily on disk.Knowledge discovered from a database can be represented by a set of rules. We can discover rules from database using one of two models:In the first model, the user is involved directly in the process of knowledge discovery.In the second model, the system is responsible for automatically discovering knowledgefrom the database, by detecting patterns and correlations in the data.Work on automatic discovery of rules influenced strongly by work in the artificial-intelligence community on machine learning. The main differences lie in the volume of data databases, and in the need to access disk. Specialized data-mining algorithms developed to which rules are discovered depends on the class of data-mining application. We illustrate rule discovery using two application classes: classification and associations.Second. Spatial and Geographic DatabasesSpatial databases store information related to spatial locations, and provide support for efficient querying and indexing based on spatial locations. Two types of spatial databases are particularly important:Design databases, or computer-aided-design (CAD) databases, are spatial databases used to store design information about databases are integrated-circuit and electronic-device layouts.Geographic databases are spatial databases used to store geographic information, such as maps. Geographic databases are often called geographic information systems.Geographic data are spatial in nature, but differ from design data in certain ways. Maps and satellite images are typical examples of geographic data. Maps may provide not only location information -such as boundaries, rivers and roads---but also much more detailed information associated with locations, such as elevation, soil type, land usage, and annual rainfall.Geographic data can be categorized into two types: raster data (such data consist a bit maps or pixel maps, in two or more dimensions.), vector data (vector data are constructed from basic geographic objects). Map data are often represented in vector format.Third. Multimedia DatabasesRecently, there much interest in databases that store multimedia data, such as images, audio, and video. Today multimedia data typically are stored outside the database, in files systems. When the number of multimedia objects is relatively small, features provided by databases are usually not important. Database functionality becomes important when the number of multimedia objects stored is large. Issues such as transactional updates, querying facilities, and indexing then become important. Multimedia objects often they were created, who created them, and to what category they belong. One approach to building a database for such multimedia objects is to use database for storing the descriptive attributes, and for keeping track of the files in which the multimedia objects are stored.However, storing multimedia outside the database makes it the basis of actual multimedia data content. It can also lead to inconsistencies, such a file that is noted in the database, but whose contents are missing, or vice versa. It is therefore desirable to store the data themselves in the database.Forth. Mobility and Personal DatabasesLarge-scale commercial databases stored in central computing facilities. In the case of distributed database applications, there strong central database and network administration. Two technology trends which this assumption of central control and administration is not entirely correct:1.The increasingly widespread use of personal computers, and, more important, of laptop or “notebook” computers.2.The development of a relatively low-cost wireless digital communication infrastructure, base on wireless local-area networks, cellular digital packet networks, and other technologies.Wireless computing creates a situation where machines no longer at which to materialize the result of a query. In some cases, the location of the user is a parameter of the query. A example is a traveler’s information system that provides data on the current route must be processed based on knowledge of the user’s location, direction of motion, and speed.Energy (battery power) is a scarce resource for mobile computers. This limitation influences many aspects of system design. Among the more interesting consequences of the need for energy efficiency is the use of scheduled data broadcasts to reduce the need for mobile system to transmit queries. Increasingly amounts of data may reside on machines administered by users, rather than by database administrators. Furthermore, these machines may, at times, be disconnected from the network.SummaryDecision-support systems are gaining importance, as companies realize the value of the on-line data collected by their on-line transaction-processing systems. Proposed extensions to SQL, such as the cube operation, of summary data. Data mining seeks to discover knowledge automatically, in the form of statistical rules and patterns from large databases. Data visualization systems data as well as geographic data. Design data are stored primarily as vector data; geographic data consist of a combination of vector and raster data.Multimedia databases are growing in importance. Issues such as similarity-based retrieval and delivery of data at guaranteed rates are topics of current research.Mobile computing systems , leading to interest in database systems that can run on such systems. Query processing in such systems may involve lookups on server database.毕业设计(论文)——外文翻译(译文)数据库的新应用我们使用关系数据库已经有20多年了,关系数据库应用中有很大一部分都用于商业领域支持诸如银行和证券交易所的事务处理、各种业务的销售和预约,以及几乎所有公司都需要的财产目录和工资单管理。
毕业设计外文翻译英文翻译英文原稿
Harmonic source identification and current separationin distribution systemsYong Zhao a,b,Jianhua Li a,Daozhi Xia a,*a Department of Electrical Engineering Xi’an Jiaotong University, 28 West Xianning Road, Xi’an, Shaanxi 710049, Chinab Fujian Electric Power Dispatch and Telecommunication Center, 264 Wusi Road, Fuzhou, Fujian, 350003, China AbstractTo effectively diminish harmonic distortions, the locations of harmonic sources have to be identified and their currents have to be separated from that absorbed by conventional linear loads connected to the same CCP. In this paper, based on the intrinsic difference between linear and nonlinear loads in their V –I characteristics and by utilizing a new simplified harmonic source model, a new principle for harmonic source identification and harmonic current separation is proposed. By using this method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic source and the linear loads to harmonic voltage distortion can be distinguished. The detailed procedure based on least squares approximation is given. The effectiveness of the approach is illustrated by test results on a composite load.2004 Elsevier Ltd. All rights reserved.Keywords: Distribution system; Harmonic source identification; Harmonic current separation; Least squares approximation1. IntroductionHarmonic distortion has experienced a continuous increase in distribution systems owing to the growing use of nonlinear loads. Many studies have shown that harmonics may cause serious effects on power systems, communication systems, and various apparatus [1–3]. Harmonic voltages at each point on a distribution network are not only determined by the harmonic currents produced by harmonic sources (nonlinear loads), but also related to all linear loads (harmonic current sinks) as well as the structure and parameters of the network. To effectively evaluate and diminish the harmonic distortion in power systems, the locations of harmonic sources have to be identified and the responsibility of the distortion caused by related individual customers has to be separated.As to harmonic source identification, most commonly the negative harmonic power is considered as an essential evidence of existing harmonic source [4–7]. Several approaches aiming at evaluating the contribution of an individual customer can also be found in the literatures. Schemes based on power factor measurement to penalize the customer’s harmonic currents are discussed in Ref. [8]. However, it would be unfair to use economical penalization if we could not distinguish whether the measured harmonic current is from nonlinear load or from linear load.In fact, the intrinsic difference between linear and nonlinear loads lies in their V –I characteristics. Harmonic currents of a linear load are i n linear proportion to its supplyharmonic voltages of the same order 次, whereas the harmonic currents of a nonlinear load are complex nonlinear functions of its supply fundamental 基波and harmonic voltage components of all orders. To successfully identify and isolate harmonic source in an individual customer or several customers connected at same point in the network, the V –I characteristics should be involved and measurement of voltages and currents under several different supply conditions should be carried out.As the existing approaches based on measurements of voltage and current spectrum or harmonic power at a certain instant cannot reflect the V –I characteristics, they may not provide reliable information about the existence and contribution of harmonic sources, which has been substantiated by theoretical analysis or experimental researches [9,10].In this paper, to approximate the nonlinear characteristics and to facilitate the work in harmonic source identification and harmonic current separation, a new simplified harmonic source model is proposed. Then based on the difference between linear and nonlinear loads in their V –I characteristics, and by utilizing the harmonic source model, a new principle for harmonic source identification and harmonic current separation is presented. By using the method, not only the existence of harmonic source can be determined, but also the contributions of the harmonic sources and the linear loads can be separated. Detailed procedure of harmonic source identification and harmonic current separation based on least squares approximation is presented. Finally, test results on a composite load containing linear and nonlinear loads are given to illustrate the effectiveness of the approach.2. New principle for harmonic source identification and current separationConsider a composite load to be studied in a distribution system, which may represent an individual consumer or a group of customers supplied by a common feeder 支路in the system. To identify whether it contains any harmonic source and to separate the harmonic currents generated by the harmonic sources from that absorbed by conventional linear loads in the measured total harmonic currents of the composite load, the following assumptions are made.(a) The supply voltage and the load currents are both periodical waveforms withperiod T; so that they can be expressed by Fourier series as1()s i n (2)h h h v t ht T πθ∞==+ (1)1()sin(2)h h h i t ht πφ∞==+The fundamental frequency and harmonic components can further be presented bycorresponding phasorshr hi h h hr hi h hV jV V I jI I θφ+=∠+=∠ , 1,2,3,...,h n = (2)(b) During the period of identification, the composite load is stationary, i.e. both its composition and circuit parameters of all individual loads keep unchanged.Under the above assumptions, the relationship between the total harmonic currents of the harmonic sources(denoted by subscript N) in the composite load and the supply voltage, i.e. the V –I characteristics, can be described by the following nonlinear equation ()()()N i t f v t = (3)and can also be represented in terms of phasors as()()122122,,,...,,,,,,...,,Nhr r i nr ni Nh Nhi r inr ni I V V V V V I I V V V V V ⎡⎤=⎢⎥⎣⎦ 2,3,...,h n = (4)Note that in Eq. (4), the initial time (reference time) of the voltage waveform has been properly selected such that the phase angle u1 becomes 0 and 10i V =, 11r V V =in Eq. (2)for simplicity.The V –I characteristics of the linear part (denote by subscript L) of the composite load can be represented by its equivalent harmonic admittance Lh Lh Lh Y G jB =+, and the total harmonic currents absorbed by the linear part can be described as,Lhr LhLh hr Lh Lhi LhLh hi I G B V I I B G V -⎡⎤⎡⎤⎡⎤==⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦2,3,...,h n = (5)From Eqs. (4) and (5), the whole harmonic currents absorbed by the composite load can be expressed as()()122122,,,...,,,,,,...,,hr Lhr Nhr r i nr ni h hi Lhi Nhi r inr ni I I I V V V V V I I I I V V V V V ⎡⎤⎡⎤⎡⎤==-⎢⎥⎢⎥⎢⎥⎣⎦⎣⎦⎣⎦ 2,3,...,h n = (6)As the V –I characteristics of harmonic source are nonlinear, Eq. (6) can neither be directly used for harmonic source identification nor for harmonic current separation. To facilitate the work in practice, simplified methods should be involved. The common practice in harmonic studies is to represent nonlinear loads by means of current harmonic sources or equivalent Norton models [11,12]. However, these models are not of enough precision and new simplified model is needed.From the engineering point of view, the variations of hr V and hi V ; ordinarily fall into^3% bound of the rated bus voltage, while the change of V1 is usually less than ^5%. Within such a range of supply voltages, the following simplified linear relation is used in this paper to approximate the harmonic source characteristics, Eq. (4)112222112322,ho h h r r h i i hnr nr hni ni Nh ho h h r r h i i hnr nr hni ni a a V a V a V a V a V I b b V b V b V b V b V ++++++⎡⎤=⎢⎥++++++⎣⎦2,3,...,h n = (7)这个地方不知道是不是原文写错?23h r r b V 其他的都是2The precision and superiority of this simplified model will be illustrated in Section 4 by test results on several kinds of typical harmonic sources.The total harmonic current (Eq. (6)) then becomes112222112222,2,3,...,Lh Lh hr ho h h r r h i i hnr nr hni ni h Lh Lh hi ho h h r r h i i hnr nr hni ni G B V a a V a V a V a V a V I B G V b b V b V b V b V b V h n-++++++⎡⎤⎡⎤⎡⎤=-⎢⎥⎢⎥⎢⎥++++++⎣⎦⎣⎦⎣⎦= (8)It can be seen from the above equations that the harmonic currents of the harmonic sources (nonlinear loads) and the linear loads differ from each other intrinsically in their V –I characteristics. The harmonic current component drawn by the linear loads is uniquely determined by the harmonic voltage component with same order in the supply voltage. On the other hand, the harmonic current component of the nonlinear loads contains not only a term caused by the same order harmonic voltage but also a constant term and the terms caused by fundamental and harmonic voltages of all other orders. This property will be used for identifying the existence of harmonic source sin composite load.As the test results shown in Section 4 demonstrate that the summation of the constant term and the component related to fundamental frequency voltage in the harmonic current of nonlinear loads is dominant whereas other components are negligible, further approximation for Eq. (7) can be made as follows.Let112'012()()nh h hkr kr hki ki k k h Nhnh h hkr kr hki kik k h a a V a V a V I b b V b V b V =≠=≠⎡⎤+++⎢⎥⎢⎥=⎢⎥⎢⎥+++⎢⎥⎢⎥⎣⎦∑∑ hhr hhi hr Nhhhr hhi hi a a V I b b V ⎡⎤⎡⎤''=⎢⎥⎢⎥⎣⎦⎣⎦hhrhhihr Lh Lh Nh hhrhhi hi a a V I I I b b V ''⎡⎤⎡⎤'''=-=⎢⎥⎢⎥''⎣⎦⎣⎦,2,3,...,hhr hhiLh Lh hhrhhi hhr hhi Lh Lh hhr hhi a a G B a a h n b b B G b b ''-⎡⎤⎡⎤⎡⎤=-=⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎣⎦The total harmonic current of the composite load becomes112012(),()2,3,...,nh h hkr kr hki ki k k hhhrhhi hr h Lh NhLhNh n hhrhhi hi h h hkr kr hki kik k h a a V a V a V a a V I I I I I b b V b b V b V b V h n=≠=≠⎡⎤+++⎢⎥⎢⎥''⎡⎤⎡⎤''=-=-=-⎢⎥⎢⎥⎢⎥''⎣⎦⎣⎦⎢⎥+++⎢⎥⎢⎥⎣⎦=∑∑ (9)By neglecting ''Nh I in the harmonic current of nonlinear load and adding it to the harmonic current of linear load, 'Nh I can then be deemed as harmonic current of thenonlinear load while ''Lh I can be taken as harmonic current of the linear load. ''Nh I =0 means the composite load contains no harmonic sources, while ''0NhI ≠signify that harmonic sources may exist in this composite load. As the neglected term ''Nh I is not dominant, it is obviousthat this simplification does not make significant error on the total harmonic current of nonlinear load. However, it makes the possibility or the harmonic source identification and current separation.3. Identification procedureIn order to identify the existence of harmonic sources in a composite load, the parameters in Eq. (9) should be determined primarily, i.e.[]0122hr h h h rh i hhr hhihnr hni C a a a a a a a a ''= []0122hi h h h rh i hhrhhihnr hni C b b b b b b b b ''=For this purpose, measurement of different supply voltages and corresponding harmoniccurrents of the composite load should be repeatedly performed several times in some short period while keeping the composite load stationary. The change of supply voltage can for example be obtained by switching in or out some shunt capacitors, disconnecting a parallel transformer or changing the tap position of transformers with OLTC. Then, the least squares approach can be used to estimate the parameters by the measured voltages and currents. The identification procedure will be explained as follows.(1) Perform the test for m (2m n ≥)times to get measured fundamental frequency andharmonic voltage and current phasors ()()k k h h V θ∠,()()k k hh I φ∠,()1,2,,,1,2,,k m h n == .(2) For 1,2,,k n = ,transfer the phasors corresponding to zero fundamental voltage phase angle ()1(0)k θ=and change them into orthogonal components, i.e.()()11kkr V V = ()10ki V =()()()()()()()()()()11cos sin kkkkk kkkhr h h hihhV V h V V h θθθθ=-=-()()()()()()()()()()11cos sin k kkkk kkkhrhhhihhI I h I I h φθφθ=-=-,2,3,...,h n =(3)Let()()()()()()()()1221Tk k k k k k k k r i hr hi nr ni VV V V V V V V ⎡⎤=⎣⎦ ,()1,2,,k m = ()()()12Tm X V V V ⎡⎤=⎣⎦ ()()()12T m hr hr hr hrW I I I ⎡⎤=⎣⎦()()()12Tm hi hi hihi W I I I ⎡⎤=⎣⎦ Minimize ()()()211hr mk hr k I C V=-∑ and ()()()211him k hi k IC V=-∑, and determine the parametershr C and hi C by least squares approach as [13]:()()11T T hr hr T T hi hiC X X X W C X X X W --== (10)(4) By using Eq. (9), calculate I0Lh; I0Nh with the obtained Chr and Chi; then the existence of harmonic source is identified and the harmonic current is separated.It can be seen that in the course of model construction, harmonic source identification and harmonic current separation, m times changing of supply system operating condition and measuring of harmonic voltage and currents are needed. More accurate the model, more manipulations are necessary.To compromise the needed times of the switching operations and the accuracy of the results, the proposed model for the nonlinear load (Eq. (7)) and the composite load (Eq. (9)) can be further simplified by only considering the dominant terms in Eq. (7), i.e.01111,Nhr h h hhr hhi hr Nh Nhi ho h hhrhhi hi I a a V a a V I I b b V b b V +⎡⎤⎡⎤⎡⎤⎡⎤==+⎢⎥⎢⎥⎢⎥⎢⎥+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (11) 01111h h Nh ho h a a V I b b V +⎡⎤'=⎢⎥+⎣⎦01111,hr hhrhhi hr h h h LhNh hi hhr hhihi ho h I a a V a a V I I I I b b V b b V ''+⎡⎤⎡⎤⎡⎤⎡⎤''==-=-⎢⎥⎢⎥⎢⎥⎢⎥''+⎣⎦⎣⎦⎣⎦⎣⎦2,3,,h n = (12) In this case, part equations in the previous procedure should be changed as follows[]01hr h h hhrhhi C a a a a ''= []01hi h h hhrhhiC b b b b ''= ()()()1Tk k k hr hi V V V ⎡⎤=⎣⎦ Similarly, 'Nh I and 'Lh I can still be taken as the harmonic current caused by thenonlinear load and the linear load, respectively.4. Experimental validation4.1. Model accuracyTo demonstrate the validity of the proposed harmonic source models, simulations are performed on the following three kind of typical nonlinear loads: a three-phase six-pulse rectifier, a single-phase capacitor-filtered rectifier and an acarc furnace under stationary operating condition.Diagrams of the three-phase six-pulse rectifier and the single-phase capacitor-filtered rectifier are shown in Figs. 1 and 2 [14,15], respectively, the V –I characteristic of the arc furnace is simplified as shown in Fig. 3 [16].The harmonic currents used in the simulation test are precisely calculated from their mathematical model. As to the supply voltage, VekT1 is assumed to be uniformly distributed between 0.95 and 1.05, VekThr and VekThi ek 1; 2;…;m T are uniformly distributed between20.03 and 0.03 with base voltage 10 kV and base power 1 MVFig. 1. Diagram of three-phase six-pulse rectifier.Fig. 2. Diagram of single-phase capacitor-filtered rectifierFig. 3. Approximate V –I characteristics of arc furnace.Three different models including the harmonic current source (constant current) model, the Norton model and the proposed simplified model are simulated and estimated by the least squares approach for comparison.For the three-phase six-pulse rectifier with fundamental currentI=1.7621; the1 parameters in the simplified model for fifth and seventh harmonic currents are listed in Table 1.To compare the accuracy of the three different models, the mean and standard deviations of the errors on Ihr; Ihi and Ih between estimated value and the simulated actual value are calculated for each model. The error comparison of the three models on the three-phase six-pulse rectifier is shown in Table 2, where mhr; mhi and mha denote the mean, and shr; shi and sha represent the standard deviations. Note that I1 and _Ih in Table 2are the current values caused by rated pure sinusoidal supply voltage.Error comparisons on the single-phase capacitor-filtered rectifier and the arc furnace load are listed in Table 3 and 4, respectively.It can be seen from the above test results that the accuracy of the proposed model is different for different nonlinear loads, while for a certain load, the accuracy will decrease as the harmonic order increase. However, the proposed model is always more accurate than other two models.It can also be seen from Table 1 that the componenta50 t a51V1 and b50 t b51V1 are around 20:0074 t0:3939 0:3865 and 0:0263 t 0:0623 0:0886 while the componenta55V5r and b55V5i will not exceed 0:2676 £0:03 0:008 and 0:9675 £0:003 0:029; respectively. The result shows that the fifth harmonic current caused by the summation of constant term and the fundamental voltage is about 10 times of that caused by harmonic voltage with same order, so that the formal is dominant in the harmonic current for the three-phase six-pulse rectifier. The same situation exists for other harmonic orders and other nonlinear loads.4.2. Effectiveness of harmonic source identification and current separationTo show the effectiveness of the proposed harmonic source identification method, simulations are performed on a composite load containing linear load (30%) and nonlinear loads with three-phase six-pulse rectifier (30%),single-phase capacitor-filtered rectifier (20%) and ac arc furnace load (20%).For simplicity, only the errors of third order harmonic current of the linear and nonlinear loads are listed in Table 5, where IN3 denotes the third order harmonic current corresponding to rated pure sinusoidal supply voltage; mN3r ;mN3i;mN3a and mL3r ;mL3i;mL3a are error means of IN3r ; IN3i; IN3 and IL3r ; IL3i; IL3 between the simulated actual value and the estimated value;sN3r ;sN3i;sN3a and sL3r ;sL3i;sL3a are standard deviations.Table 2Table 3It can be seen from Table 5 that the current errors of linear load are less than that of nonlinear loads. This is because the errors of nonlinear load currents are due to both the model error and neglecting the components related to harmonic voltages of the same order, whereas only the later components introduce errors to the linear load currents. Moreover, it can be found that more precise the composite load model is, less error is introduced. However, even by using the very simple model (12), the existence of harmonic sources can be correctly identified and the harmonic current of linear and nonlinear loads can be effectively separated. Table 4Error comparison on the arc furnaceTable 55. ConclusionsIn this paper, from an engineering point of view, firstly anew linear model is presented for representing harmonic sources. On the basis of the intrinsic difference between linear and nonlinear loads in their V –I characteristics, and by using the proposed harmonic source model, a new concise principle for identifying harmonic sources and separating harmonic source currents from that of linear loads is proposed. The detailed modeling and identification procedure is also developed based on the least squares approximation approach. Test results on several kinds of typical harmonic sources reveal that the simplified model is of sufficient precision, and is superior to other existing models. The effectiveness of the harmonic source identification approach is illustrated using a composite nonlinear load.AcknowledgementsThe authors wish to acknowledge the financial support by the National Natural Science Foundation of China for this project, under the Research Program Grant No.59737140. References[1] IEEE Working Group on Power System Harmonics, The effects of power system harmonics on power system equipment and loads. IEEE Trans Power Apparatus Syst 1985;9:2555–63.[2] IEEE Working Group on Power System Harmonics, Power line harmonic effects on communication line interference. IEEE Trans Power Apparatus Syst 1985;104(9):2578–87.[3] IEEE Task Force on the Effects of Harmonics, Effects of harmonic on equipment. IEEE Trans Power Deliv 1993;8(2):681–8.[4] Heydt GT. Identification of harmonic sources by a State Estimation Technique. IEEE Trans Power Deliv 1989;4(1):569–75.[5] Ferach JE, Grady WM, Arapostathis A. An optimal procedure for placing sensors and estimating the locations of harmonic sources in power systems. IEEE Trans Power Deliv 1993;8(3):1303–10.[6] Ma H, Girgis AA. Identification and tracking of harmonic sources in a power system using Kalman filter. IEEE Trans Power Deliv 1996;11(3):1659–65.[7] Hong YY, Chen YC. Application of algorithms and artificial intelligence approach for locating multiple harmonics in distribution systems. IEE Proc.—Gener. Transm. Distrib 1999;146(3):325–9.[8] Mceachern A, Grady WM, Moncerief WA, Heydt GT, McgranaghanM. Revenue and harmonics: an evaluation of someproposed rate structures. IEEE Trans Power Deliv 1995;10(1):474–82.[9] Xu W. Power direction method cannot be used for harmonic sourcedetection. Power Engineering Society Summer Meeting, IEEE; 2000.p. 873–6.[10] Sasdelli R, Peretto L. A VI-based measurement system for sharing the customer and supply responsibility for harmonic distortion. IEEETrans Instrum Meas 1998;47(5):1335–40.[11] Arrillaga J, Bradley DA, Bodger PS. Power system harmonics. NewYork: Wiley; 1985.[12] Thunberg E, Soder L. A Norton approach to distribution networkmodeling for harmonic studies. IEEE Trans Power Deliv 1999;14(1):272–7.[13] Giordano AA, Hsu FM. Least squares estimation with applications todigital signal processing. New York: Wiley; 1985.[14] Xia D, Heydt GT. Harmonic power flow studies. Part I. Formulationand solution. IEEE Trans Power Apparatus Syst 1982;101(6):1257–65.[15] Mansoor A, Grady WM, Thallam RS, Doyle MT, Krein SD, SamotyjMJ. Effect of supply voltage harmonics on the input current of single phase diode bridge rectifier loads. IEEE Trans Power Deliv 1995;10(3):1416–22.[16] Varadan S, Makram EB, Girgis AA. A new time domain voltage source model for an arc furnace using EMTP. IEEE Trans Power Deliv 1996;11(3):1416–22.。
关于毕业英语小作文加翻译
关于毕业英语小作文加翻译Graduation is a special milestone in our lives. It marks the end of one chapter and the beginning of another. As we say goodbye to the familiar surroundings of our school or university, we embark on a new journey filled with opportunities and challenges.Looking back on the years we spent in school, we can't help but feel a sense of nostalgia. We remember the friends we made, the teachers who inspired us, and the lessons we learned. We also remember the hard work, the late nights, and the stress of exams. But most of all, we remember the sense of accomplishment we felt when we achieved our goals.Now, as we prepare to leave, we must take with us the lessons we learned. We must remember to always work hard, to never give up, and to believe in ourselves. We must also remember to stay true to our values and to be kind to others. These are the qualities that will help us succeedin life.As we move on to the next phase of our lives, we must also remember to stay connected to our roots. We must keep in touch with our friends and mentors, and we must never forget the experiences that shaped us into the people we are today. We must also remember to give back to our communities and to help those who are less fortunate than us.In conclusion, graduation is a time of reflection, celebration, and anticipation. It is a time to look back on our achievements, to cherish the memories we made, and to prepare for the future. As we say goodbye to our school or university, we must remember to take with us the lessons we learned, the values we hold dear, and the connections we made. We must also remember to embrace the future with open arms and to never stop learning and growing. Congratulations to all the graduates, and good luck on your journey ahead!毕业是我们人生中的一个特殊里程碑。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
毕业设计英文论文翻译,五千字,翻译原文如果您想找到原文wordl版本的,请您文库中搜索——毕业设计英文论文翻译,五千字,翻译原文,自己翻译,模具类——精密注射成型技术的研究进展介绍聚合物材料的精密注射成型技术,论述影响精密注射成型的因素,包括模具的精度、注塑机的控制精度、精密注射工艺控制和其它一些计算机控制技术。
分别对这些因素进行分析讨论,并给出了相关的解决方法,最后介绍了一些先进的模塑成型技术。
关键词:精密注射;注塑机;精密注射工艺;精密注射模具近年来,随着电子、电信、医疗、汽车等行业的迅速发展,对塑料制品的高精度、高性能要求与日俱增,促使精密成型技术不断地进步,新的技术不断地涌现。
精密注射成型要求制品不仅具有较高的尺寸精度、较低的翘曲变形、优良的转写性,而且还应有优异的光学性能等[ 1 ]。
注射成型是最重要的塑料成型方法之一,包括塑料的塑化、注射、保压、冷却等几个基本的过程,因此影响精密注射成型的因素也很多。
1精密模具要制造出精密的制品,精密模具是必不可少的。
模具的精度一般受模具的温度控制、模具的精密制造和模具设计时对塑料收缩率选用等影响。
1. 1模具温度的精密控制在一般精度零件的注射成型中,控制模具温度主要是为了提高生产率。
然而模具温度控制对精密注射成型的影响极大[ 2 ] ,它影响制件的收缩、形状、结晶、内应力等,因此设计模具冷热回路时要求温度分布合理,控制精度精确,最好采用模温机和冷水机控制。
模具温度控制和冷却时间对制品性能的影响及其影响因素如下[ 3 ] :(1)塑料熔体注入和模具开模的循环时间二者会在模具中产生温度差的波动,因此应该尽量减小这种波动差峰。
(2)模具内的热量转移模具的热量是通过模具体和模具内的媒体传递出去的,模具是不变的,因此对媒体的控制是关键,一般其冷却水出入口温度差小于1℃,应用平均温度理论来计算[ 4 ] ,这样能够保证热量传递的稳定性。
媒体的流量和热量转移是相互联系的,可以用模具表面温度传感器来控制媒体流量,以补偿因环境温度变化引起的模具温度变化。
(3)模具稳定状态为使模具所吸收和散发的热量保持平衡,注塑机注射出的熔体要严格保持稳定的温度。
模具周围的温度对模具也有很大的影响,一般会影响到模具内媒体对流系数的变化,因此最好在模具表面设置温度传感器,随时观察模具表面温度,并使其保持稳定。
(4)热交换效率的变化模具用久后,在冷却水管道中会出现锈斑和水垢,这时交界面的热导率降低,应对水垢及时清除。
1. 2精密模具的设计与制造模具设计的好坏是保证塑料制件尺寸精度的前提,为了提高精密注塑模的精度,在设计过程中采用计算机辅助分析是必要的,特别是对浇注系统的流动行为和模具温度调节系统热量分布的分析等。
应尽可能地应用分析模拟软件并利用接近实际的加载条件来分析模拟熔体在模具中的浇注、冷却等非稳态的过程。
模具的制造质量是保证塑料制件尺寸精度的关键,精密模具主要的制造特点是除了抛光和装配作业外,均不用手工加工。
一般模具机械加工和手工加工的比例约为6∶4~7∶3,而精密模具的机械加工和手工加工比例为9∶1。
模具材料和热处理是模具精度的保障,在成型加工过程中,模具处于高温状态,因而即使对模具零件采用低温回火,生产时高温熔体又会对零件进行重复回火而使硬度降低,同时还应考虑残留奥氏体所引起的体积膨胀。
因此一般回火温度至少应是成型加工时模具温度的两倍以上,并适当地进行低温处理以便消除残余奥氏体。
对高精度制品,要求模具成型零件的精度、组合件累计精度、模具导向件的对中精度以及分型面的平行度应该达到微米级。
模具应有足够的强度、刚度和耐磨性,在注塑压力下不易变形、磨损。
要达到以上的加工精度可采用立体加工中心、数控机床和应用CAD /CAM /CAE等新技术。
1. 3精密模具设计时物料收缩率的选用热塑性塑料制品成型时收缩率波动较大,给模具设计、确定型腔尺寸和控制制品尺寸精度带来困难[ 5 ]。
因此在模具设计时应了解塑料的收缩特性和因制件形状而造成的各部位收缩率的差异,然后采用必要的补偿措施。
对高精度塑料件可在设计前先制造简易模具,以测出成型时各部位的实际收缩率,这样便可大大提高制件的尺寸精度[ 6 ]。
1. 4精密模具浇口的设计浇口的类型、大小、位置和数量都影响制件尺寸精度。
点浇口喷射力大,但补缩效果差,对厚壁制件不适用。
浇口位置影响熔体流向和流程远近,流程愈长收缩愈大。
多浇口可以缩短流程,但熔接痕增多。
浇口的设计应该根据制件大小和所选用的材料运用分析软件并借助于实际经验来最终确定。
2精密注射成型最佳工艺参数的设定选取最佳的成型工艺参数能够减少塑料制品的收缩率。
塑料的收缩特性是指塑料的热收缩、弹性回复、塑性变形、后收缩和老化收缩的综合反映,通常是因材料吸水或分子链重排而引起,具体表现为线性收缩率和体积收缩率的变化,常用收缩特性值表示。
热塑性塑料注塑制品成型时收缩率波动较大,特别是对于结晶性塑料注塑制品更加明显,由于结晶度不仅取决于化学结构,而且还受到加工过程中冷却参数(冷却速率、熔体温度、模具温度、制品厚度)的影响,给模具设计确定型腔尺寸和控制制品尺寸精度带来困难,所以迫切需要了解注塑工艺参数对各种塑料收缩率的影响规律[ 7 ]。
制件壁厚的差异一般认为是由两个方面的因素引起的:一是高压熔体引起的模具型腔轻微变形;二是当模具开模后材料的弹性膨胀。
一般来说,质量精度能够很好地控制尺寸精度,而在较高的模具温度里熔体的粘度较低,所以粘度梯度较小,在一定的螺杆背压下,制件的质量精度就能够得到精确的控制。
然而对于液晶聚合物(LCP)来说,它恰恰需要较低的模具温度,这是因为LCP遇冷后会迅速冷却定形。
LCP有低的熔解热和有序的结构状态,因此在液体晶态向固体晶态转变之间有较小的变化,当充分冷却时,液- 固转变几乎是在瞬间完成。
在较冷的模具中,当型腔充满时,型腔中的大部分材料和浇口已经固化,因此压缩阶段很难补充熔体,因而制件的尺寸与未变形的型腔尺寸十分接近[ 8 ]。
无定型塑料较结晶型塑料收缩率低,配混料的收缩率较纯聚合物材料低,同时随着弹性体用量的增加,材料的收缩率有所降低。
塑料经增强或填充后,热容减小,刚性增大,收缩率大幅度降低,且纤维或填充剂含量愈高,收缩率愈小[ 9 ] 。
结晶型塑料制品精度还受压力的影响。
由于压力致结晶的作用,注塑压力( P1 ) 、保压压力( P2 )和补料压力( P3 )能够加速结晶过程,因此结晶度随P1、P2、P3 的增加呈上升趋势。
对于P1 ,其压力致结晶作用提高了结晶度,使收缩率增加; P2 和P3 上升,一方面因结晶度提高使收缩率增加,另一方面P2 升高能压入更多的熔体,使型腔内塑料受到充分压实; P3 升高能增大补料量, 并有效地防止倒流, 有利于降低收缩率。
因此,塑料件的收缩率是两方面作用的结果,所以收缩率随P1、P2、P3 的升高先增加后减小[10 ]。
精密塑料件不仅要求有稳定的尺寸公差,而且还要求有严格的力学性能。
这些特性主要取决于熔体在冷却阶段的热- 机械作用的历史过程。
模具温度和冷却时间对制品质量和生产率都有直接的影响。
研究发现,在给定的模具温度下,制品的尺寸精度并不随冷却时间的延长而有明显的提高,只有在一定的时间段后才有明显的作用。
在一般冷却过程中这样的关键冷却时间点有两个,在第一个冷却时间点时虽然生产的制品精度也较高,但不是最稳定的状态,而第二个冷却时间点冷却时间比较长,但能使制品的状态最稳定[ 11, 12 ]。
3用精密注塑机代替常规注塑机精密注塑机一般都采用较大的注射功率,这样除了可以满足注塑压力和注射速率方面的要求外,注射功率本身还会对制品精度起一定的改进作用。
精密注塑机的控制系统一般都有很高的控制精度,这一点是制品本身所要求的。
高的控制精度能保证各种注射工艺参数具有良好的重复精度,以避免制品精度因工艺参数波动而发生变化。
因此精密注塑机一般都对注射量、注塑压力、注射速率、保压压力、背压和螺杆转速等工艺参数采取多级反馈控制。
精密注塑要求其合模系统有足够的刚度,否则制品精度将会因合模系统的弹性变形而降低。
其次合模系统的合模力大小必须能够精确控制,否则过大或过小的合模力都将对制品精度产生不良影响。
所以在设计时,应该综合考虑模具刚度、系统刚度以及合模力的大小以精确控制制品的精度,尤其是平板薄壁制品。
当模具面积较大时,必须对导向柱进行挠度校核[ 13 ]。
精密注塑机还必须能够对液压回路中的工作温度进行精确控制,以防工作油因温度变化而引起粘度和流量变化,进一步导致注射工艺参数波动而使制品失去应有的精度。
3. 1成型制件循环时间的一致性一般典型的注塑机有三种模式:手动、半自动、全自动。
由于各种因素的影响,在前两种模式下每次模塑的循环时间不尽相同,这会影响到模具温度和物料在料筒中的停留时间,进而影响到制件的精度,因此在精密成型中应尽量采用全自动的模式[ 14 ]。
3. 2精密注塑机的温度控制和新型螺杆的设计注塑机筒上自动调温器的循环性开和关导致了料筒内熔料密度和粘度的变化,从而影响制件质量和尺寸精度的周期性波动;注塑机的喷嘴紧靠模具型腔,所以喷嘴的温度对模塑制件也有重大的影响。
现代的注塑机配备了特殊的过程控制软件来抑制温度波动,这就是比例积分微分( P ID)控制。
至少从机筒温度差电偶的观点上来看,优化P ID参数能够完全消除温度的波动[ 15 ]。
要制得高质量和稳定的塑料件,注塑机的塑化单元是非常重要的。
对塑化单元评判的重要标准是:注射量、塑化速率、注射速率、高聚物在塑化单元的停留时间。
由于塑料件质量的误差对于尺寸精度有很重要的影响,因此应精确控制注塑机的注射量。
提高注塑机计量精度的最有效方法就是用技术上能够实现的最小的螺杆直径,特别是对于轻型制件更是如此。
由于螺杆计量段的相对长度和螺杆的整体长度变小,因此物料在塑化单元中停留的时间也会变短。
螺杆螺纹也近似地变宽,可避免物料的停留时间变长,使螺杆稳定地运行。
螺槽的宽深比也相应地变小,这对制造许多工程塑料制件的小直径螺杆尤为有效。
熔体的均一性并没有因为小压缩比而减小,这是因为由非常浅的螺槽引起非常强烈的剪切速率而导致的。
喂料段是设计的难点,它必须要保证各种粒料能够均匀地喂进去。
考虑到需要较短的循环周期,塑化速率也必须足够大,因此在设计喂料段时必须有效地解决这一对矛盾。
另外,若要通过两阶段螺杆注射来达到精确控制注射量误差,这就需要熔体的计量要通过球形检测阀由注塑机注射到活塞注塑机中[ 16 ]。
以前由微处理器控制的注射成型过程不能获得的注射精确度已经通过电压比较仪成功地解决了。
电压比较仪允许从传送器和其它敏感器传来的非常精确的电压信号通过,当设定点和真实值相吻合时有一个信号马上传送到顺序控制的微处理器,因此由顺序运行程序的循环时间引起的异步时间转移能够通过直接的信号过程来消除[ 17 ] ,大大提高了控制的精度。