外文文献翻译

合集下载

知识产权论文中英文对照外文翻译文献

知识产权论文中英文对照外文翻译文献

中英文对照外文翻译文献1外文参考文献译文the well-known trademarks and dilute anti-diluted First, well-known trademarks SummaryWell-known trademarks is a long-term use, in the market enjoy a high reputation, known for the relevant public and by certain procedures that the trademark. Since the "Paris Convention" was first introduced the concept of well-known trademarks, the well-known trademarks for special protection legislation has become the world trend.Paris Convention stipulates: all of the members were identified as the well-known trade marks, or registered First, the first to ban others, and the other is to prohibit the use of others with identical or similar logo. Trips further provides: 1, the Paris Convention for the special protection and extension of the services of well-known trademarks, 2, the scope of protection does not extend to prohibit similar goods or services with the well-known trademarks for use on the same or similar logo, 3, on how to That a well-known trademarks in principle a simple requirement.National legislation on the practice, the well-known trade marks that standards vary, often based on specific trade mark promotion of public awareness of related areas, logo merchandise sales and the scope of national interests, and other factors identified. From an international treaty to protect the well-known trademarks mind, that well-known trade marks and protection of well-known trade marks are closely linked.Second, the well-known trademarks protected modeOn the protection of the main trademarks of relative and absolute protectionism two models.The former refers to ban others with well-known trademarks identical or similar trademark with the trademark owner the same or similar industries in the registration or use of similar goods in non-use of the same or similar trademarks is permitted, "the Paris Convention "That is, relative to protectionism.While the latter refers to ban others in any industry, including the well-known trade mark goods with different or similar to those in the industry to register with the well-known trade marks and the use of the same or similar trademarks, TRIPS agreement that is taken by the expansion of the absolute protectionism.In simple economic form, as specified by the trade mark goods at a single, specific trade mark goods and the link between more closely. With, a valuable well-known trademarks have been more and more use of different types of commodities, which are among the types of goods on the property may be totally different, in a trademark associated with the commodity groups and the relative weakening of trade marks Commodity producers and the relative isolation. Not well-known trademarks such as cross-category protection and allow others to register, even if the goods obvious differences, the public will still be in the new goods and reputable well-known trademarks to establish a link between people that the goods may be well-known trademark, the new commodities , Or the well-known trademarks of goods and people between the existence of a legal, organizational or business association, thus leading to the misuse of consumers purchase. The rapid development of the commodity today, the relative protectionism has not improved the protection of the public and well-known trademark owner's interests.In view of this, in order to effectively prevent the reputation of well-known trademarks, and the identification of significant features and advertising value by the improper use of the damage, many countries on the implementation of a well-known trademarks is protectionism, which prohibits the use of any products on the same or with the well-known trademarks Similar to the trademark.TRIPS Agreement Article 16, paragraph 3 states: Paris Convention 1967 text, in principle, applicable to the well-known trademarks and logos of the commodities or services are not similar goods or services, if not similar goods or services on the use of the trademark will be Suggest that the goods or services with the well-known trademarks on a link exists, so that the interests of all well-known trademarks may be impaired.Third, the well-known trademarks dilutedThe protection of trademark rights, there are mainly two: one for the confusion theory, a theory for desalination.The main traditional trademark protection for trade marks the difference between functional design, and its theoretical basis for the theory of confusion. In summary, which is to ensure that the trademark can be identification, confirmation and different goods or services different from the significant features, to avoid confusion, deception and E Wu, the law gives first use of a person or persons registered with exclusive rights, which prohibits any Without the permission of the rights to use may cause confusion among consumers in the same or similar trademarks. Clearly, the traditional concept of trademark protection, to stop "the possibility of confusion" is the core of trademark protection.With the socio-economic development and commercialization of the continuous improvement of the degree, well-known trademarks by the enormous implication for the growing commercial value have attracted the attention of people. Compared with ordinary marks, bearing well-known trademarks by the significance and meaning beyond the trademark rights to the general, and further symbol of product quality and credit, contains a more valuable business assets - goodwill. Well-known trade mark rights of people to use its excellent reputation of leading the way in the purchasing power, instead of the use of trademarks to distinguish between different products and producers.When the mark beyond the role of this feature to avoid confusion, then, this factor is obviously confused and can not cover everything, and other factors become as important as or more important. Thus, in theory confusion on the basis of further development of desalination theory.Trademark Dilution (dilution), also known as trademark dilution, is one of trademark infringement theory. "Watered down", according to the U.S. "anti-federal trademark law dilute" means "regardless of well-known trade mark rights and theothers between the existence of competition, or existence of confusion, misunderstanding or the possibility of deception, reduce and weaken the well-known trademarks Its goods or services and the identification of significant capacity of the act. " In China, some scholars believe that "refers to dilute or weaken gradually weakened consumer or the public will be trademarks of the commercial sources with a specific link between the ability." Trademark faded and that the main theory is that many market operators have Using well-known trademarks of the desire of others, engage in well-known trademarks should be to prevent others from using its own unique identification of special protection.1927, Frank • Si Kaite in the "Harvard Law reviews" wrote the first trademark dilute theory. He believes that people should not only be trademarks of others prohibit the use of the mark, he will compete in the commodity, and should prohibit the use of non-competitive goods on. He pointed out: the real role of trade marks, not distinguish between goods operators, but satisfied with the degree of difference between different commodities, so as to promote the continuous consumer purchase. From the basic function of trademarks, trade mark used in non-competitive goods, their satisfaction with regard to the distinction between the role of different commodities will be weakened and watered down. Trademarks of the more significant or unique, to the public the impression that the more deeply, that is, should be restricted to non-compete others in the use of goods or services.Since then, the Intellectual Property Rights Branch of the American Bar Association Chairman Thomas • E • Si Kaite Smith on the theory made a fu rther elaboration and development. He said: "If the courts allow or laissez-faire 'Rolls Royce' restaurants, 'Rolls-Royce' cafeteria, 'Rolls-Royce' pants, 'Rolls-Royce' the candy, then not 10 years, ' Rolls-Royce 'trademark owners will no longer have the world well-known trademarks. "Si Kaite in accordance with the theory of well-known trade marks have faded because of the effect of non-rights holders with well-known trademarks in the public mind the good image of well-known trademarks will be used in non-competitivegoods, so as to gradually weaken or reduce the value of well-known trademarks, That is, by the well-known trademarks have credibility. Trademark tag is more significant or unique characteristics, which in the public mind the impression that the more deep, more is the need for increased protection, to prevent the well-known trade marks and their specific goods was the link between the weakening or disappearance.In practice, trademarks diluted share a wide range of operating methods, such as:A well-known trademarks of others will still use as a trademark, not only in the use of the same, similar to the goods or services. For example, household appliances, "Siemens" trademark as its own production of the furniture's trademark.2. To other people's well-known trademarks as their corporate name of the component. Such as "Haier" trademark for the name of his restaurant.3. To the well-known trademarks of others as the use of domain names. For example, watches trademark "OMEGA" registered the domain name for themselves ().4. To the well-known trademarks of others as a commodity and decorating use.5. Will be others as well-known trade marks of goods or services using the common name. For example, "Kodak" interpreted as "film, is a camera with photographic material", or "film, also known as Kodak,……" This interpretation is also the mark of the water down. If the "Kodak" ignored the trademark owner, after a period of time, people will Kodak film is, the film is Kodak. In this way, the Kodak film-related goods has become the common name, it as a trademark by a significant, identifiable on limbo. The public well-known Jeep (Jeep), aspirin (Aspirin), freon (Freon), and so was the registration of foreign goods are due to improper use and management and the protection of poor, evolved into similar products common name, Thus lost its trademark logo features.U.S. "anti-diluted Federal trademark law" before the implementation of the Federal Court of Appeal through the second from 1994 to 1996 case, identified thefollowing violations including the Trademark Dilution: (1) vague, non-means as others in similar goods not on Authorized the use of a trademark so that the sales of goods and reduce the value of trademarks or weakened (2) pale, that is because of violations related to the quality, or negative, to demonize the acts described a trademark goods may be caused to others The negative effects of the situation, (3) to belittle, or improperly changed, or derogatory way to describe a trade mark case.The majority of our scholars believe that the well-known trademarks diluted There are two main forms: watered down and defaced. The so-called dilute the people will have no right to use the same or similar trademark with the well-known trademarks used in different types of commodities, thus making the mark with the goods weakened ties between the specific acts the so-called defaced is that people will have no right to use the same Or similar marks for the well-known trade marks will have to belittle good reputation, tarnished the role of different types of goods on the act.Some scholars believe that the desalination also refers to the three aspects of well-known trademarks damage. First, in a certain way to demonize the relevant well-known trademarks; Second, some way related to well-known trademark dark; Third is the indirect way so that consumers will distort trade mark goods for the general misunderstanding of the name.In general, can be diluted in the form summarized as follows:1, weakeningWeakening is a typical diluted form, also known as dark, is that others will have some visibility in the use of a trademark is not the same, similar to the goods or services, thereby weakening the mark with its original logo of goods or services The link between, weakening the mark was a significant and identifiable, thus bearing the trade mark by the damage caused by acts of goodwill. Weakening the mark of recognition of the significant damage is serious, it can be the recognition of trademark dilution, was significant, or even make it completely disappeared, then to the mark bycarrying the reputation of devastating combat.First, the weakening of the identification is the weakening and lower. Any unauthorized person, others will have some visibility in the use of a trademark is not the same, similar to the goods or services, will reduce its recognition of. But consumers were referred to the mark, it may no longer think of first is the original goods or services, not only is the original or goods or services, consumers simply will not even think of goods or services, but the Trademark Dilution of goods Or services. There is no doubt that this marks the recognition of, is a heavy blow.Weakening of the mark is significantly weakened and the lower. Mark is significantly different from other commercial trademark marked characteristics. A certain well-known trademarks, which in itself should be a very significant, very significant and can be quickly and other signs of its own separate. However, the Trademark Dilution of the same or similar trademarks used in different goods or services, so that was the trademark and other commercial marked difference in greatly reduced, to the detriment of its significant.Of course, regardless of the weakening of the mark was a significant or identifiable, are the ultimate impact of the mark by the bearer of goodwill. Because the trade mark is the carrier of goodwill, the mark of any major damage, the final performance for all bearing the trade mark by the goodwill of the damage.2, tarnishedMeans others will have some well-known trademarks in the use of the good reputation of the trademark will have to belittle, defaced role of the goods or services on the act. Contaminate the trademarks of others, is a distortion of trade marks to others, the use of the damage, not only reduced the value of the mark, even on such values were defaced. As tarnished reputation is a trademark of damage, so tarnished included in the diluted acts, is also relatively accepted view. Moreover, in the field of trademark faded, tarnished than the weakening of the danger of even greater acts, the consequences are more serious.3, degradationDegradation is due to improper use of trademarks, trade mark goods for the evolution of the common name recognition and loss of function. Trademark Dilution degradation is the most serious kind. Degradation of the event, will completely lose their identification marks, no longer has the distinction function as the common name of the commodity.Fourth, protection against diluteBased on the well-known trademarks dilute the understanding, and accompanied by a serious weakening of well-known trademarks, all countries are gradually legislation to provide for the well-known trademarks to protect anti-diluted. There are specific models:1, the development of special anti-dilute the protection of well-known trademarksThe United States is taking this protection on behalf of the typical pattern.1995, in order to prevent lower dilute "the only representative of the public eye, the unique image of the trademark" to protect "the trademark value of advertising," the U.S. Congress passed the National reunification of the "anti-federal trademark law watered down", so as to the well-known trademarks All provide the unified and effective national anti-dilute the protection.U.S. anti-diluted in trademark protection has been added a new basis for litigation, which is different from the traditional basis of trademark infringement litigation. Trademark infringement of the criteria is confusing, the possibility of deception and misleading, and the Trademark Dilution criteria is unauthorized to others well-known trademarks of the public to reduce the use of the trademark instructions for goods and services only and in particular of Feelings. It is clear that the U.S. law is anti-diluted basis, "business reputation damage" and the possibility of well-known trade mark was a significant weakening of the possibility of providingrelief. Moreover, anti-faded law does not require the application of competitive relations or the existence of possible confusion, which is more conducive to the exercise of trademark right to appeal.2, through the Anti-Unfair Competition Law ProtectionSome countries apply anti-unfair competition law to protect famous trademarks from being watered down. Such as Greece, "Anti-Unfair Competition Law," the first one: "Prohibition of the Use of well-known trademarks in order to take advantage of different commodities on the well-known trademarks dilute its credibility was significant." Although some countries in the Anti-Unfair Competition Law does not explicitly prohibits trademark faded, but the Trademark Dilution proceedings, the application of unfair competition litigation.3, through or under well-known trademark protection within the scope of trademark protectionMost civil law countries is this way. 1991, "the French Intellectual Property Code," Di Qijuan trademark law section L.713-5 of the provisions that: not in similar goods or services on the use of well-known trade marks to the trademark owner or a loss caused by the improper use of trademarks , Against people should bear civil liability.Germany in 1995, "the protection of trademarks and other signs of" Article 14 also stipulates that: without the consent of the trademark rights of third parties should be banned in commercial activities, in and protected by the use of the trademark does not like similar goods or services , And the use of the trademark identical or similar to any signs.4, in the judicial precedents in the application of anti-dilute the protection ofIn some countries there are no clear legislative provisions of the anti-dilute well-known trademarks, but in judicial practice, they are generally applicable civil law on compensation for the infringement of the debt to protect the interests of allwell-known trademarks, through judicial precedents to dilute the protection of applicable anti.China's well-known trademarks in the protection of the law did not "water down" the reference, but on the substance of the relevant legal provisions, protection of anti-diluted. 2001 "Trademark Law" amendment to increase the protection of well-known trademarks, in particular, it is important to the well-known trademarks have been registered to conduct cross-category protection. Article 13 stipulates: "The meeting is not the same as or similar to the trademark application for registration of goods is copied, Mofang, translation others have been registered in the well-known trademarks, misleading the public, the standard of the well-known trade mark registration may be the interests of the damage, no registration And can not be used. "But needs to be pointed out that this provision does not mean that China's laws for the well-known trademarks has provided an effective anti-dilute the protection. "Trademark Law" will prohibit only well-known trademarks and trademarks of the same or similar use, without the same or similar goods not on the behavior, but the well-known trade marks have faded in various forms, such as the well-known trademarks for names, domain names, such acts Detract from the same well-known trademarks destroyed the logo of the ability to make well-known trade mark registration of the interests of damage, this is not a legal norms.It must be pointed out that the trade mark that should be paying attention to downplay acts of the following:1, downplay acts are specifically for the well-known registered trade marks.Perpetrators diluted one of the main purpose is the free-rider, using the credibility of well-known trademarks to sell their products, and general use of trademarks do not have this value. That acts to dilute limited to well-known trademarks, can effectively protect the rights of trademark rights, have not excessively restrict the freedom of choice of logo, is right to resolve the conflict right point of balance. "Trademark Law" will be divided into well-known trademarks have beenregistered and unregistered, and give different protection. Anti-has been watered down to protect only against the well-known trade marks registration, and for China not only well-known trade marks registered in the same or similar ban on the registration and use of goods. This reflects the "Trademark Law" the principle of protection of registered trademarks.2, faded in the different categories of goods and well-known trademarks for use on the same or similar logo.If this is the same or similar goods with well-known trademarks for use on the same or similar to the logo should be in accordance with the general treatment of trademark infringement. There is also a need to downplay the use of the tags are similar to a well-known trademarks and judgments.3, not all the non-use of similar products on the well-known trade marks and logos of the same or similar circumstances are all faded.When a trademark has not yet become well-known trademarks, perhaps there are some with the same or similar trademarks used in other types of goods on. In the well-known trademarks, the original has been in existence does not constitute a trademark of those who play down.4, acts that play down the perpetrator does not need to consider the subjective mental state.Regardless of their out of goodwill or malicious, intentional or fault, is not watered down the establishment. But the acts of subjective mental state will assume responsibility for its impact on the manner and scope. Generally speaking, if the perpetrator acts intentionally dilute the responsibility to shoulder much weight, in particular, bear a heavier responsibility for damages, if the fault is the commitment will be less responsibility. If there are no mistakes, just assume the responsibility to stop infringement.5, due to anti-faded to protect well-known trade marks with a specific goods orservices linked to well-known trademarks a long time widely used in a variety of goods, will inevitably lead to trademark the logo of a particular commodity producers play down the link, well-known trademarks A unique attraction to consumers will also be greatly reduced. So that should not be watered down to conduct a source of confusion for the conditions of goods, after all, not all the water down will cause consumers confusion. For example, a street shop's name is "Rolls-Royce fruit shop," people at this time there will be no confusion and that the shop and the famous Rolls-Royce trademark or producers of the contact. However, such acts can not be allowed, a large number of similar acts will dilute the Rolls-Royce trademark and its products linked to undermine the uniqueness of the trademark, if things continue this way when the mention of Rolls-Royce trademark, people may think of is not only Automobile, food, clothing, appliances, etc.. That faded as to cause confusion for the conditions, some will not dilute norms and suppression of acts, makes well-known trade marks are not well protected. Therefore, as long as it is a well-known trademark detract from the logo and unique ability to act on the behavior should be identified as diluted.1. Zheng Chengsi: "Intellectual property law", legal publishers 2003 version.2. Wu Handong editor: "Intellectual Property Law," China Politics and Law University Press 2002 edition.3. Susan. Sela De: "The United States Federal trademark law dilute the anti-legislation and practice," Zhang Jin Yi, contained in the "Law on Foreign Translation" 1998 No.4.4. Kong Xiangjun: "Anti-Unfair Competition AFP theory," People's Court Press, 2001 edition.5. Liu Ping, Qi Chang: "On the special protection of famous trademarks", in "law and commercial" 1998 No.6.6. Well-Tao, Lu Zhou Li: "On the well-known trademarks to protect the anti-diluted", in "Law" 1998 No. 5.2 外文参考文献原文浅谈驰名商标之淡化与反淡化一、驰名商标概述驰名商标是指经过长期使用,在市场上享有较高声誉,为相关公众所熟知,并经一定程序认定的商标。

外文文献及翻译

外文文献及翻译

外文文献原稿和译文原稿DATABASEA database may be defined as a collection interrelated data store together with as little redundancy as possible to serve one or more applications in an optimal fashion .the data are stored so that they are independent of programs which use the data .A common and controlled approach is used in adding new data and in modifying and retrieving existing data within the data base .One system is said to contain a collection of database if they are entirely separate in structure .A database may be designed for batch processing , real-time processing ,or in-line processing .A data base system involves application program, DBMS, and database.THE INTRODUCTION TO DATABASE MANAGEMENT SYSTEMSThe term database is often to describe a collection of related files that is organized into an integrated structure that provides different people varied access to the same data. In many cases this resource is located in different files in different departments throughout the organization, often known only to the individuals who work with their specific portion of the total information. In these cases, the potential value of the information goes unrealized because a person in other departments who may need it does not know it or it cannot be accessed efficiently. In an attempt to organize their information resources and provide for timely and efficient access, many companies have implemented databases.A database is a collection of related data. By data, we mean known facts that can be recorded and that have implicit meaning. For example, the names, telephone numbers, and addresses of all the people you know. You may have recorded this data in an indexed address book, or you may have stored it on a diskette using a personalcomputer and software such as DBASE Ⅲor Lotus 1-2-3. This is a collection of related data with an implicit meaning and hence is a database.The above definition of database is quite general. For example, we may consider the collection of words that made up this page of text to be usually more restricted. A database has the following implicit properties:● A database is a logically coherent collection of data with some inherent meaning. A random assortment of data cannot be referred to as a database.● A database is designed, built, and populated with data for a specific purpose. It has an intended group of user and some preconceived applications in which these users are interested.● A database represents some aspect of the real world, sometimes called the miniworld. Changes to the miniworld are reflected in the database.In other words, a database has some source from which data are derived, some degree of interaction with events in the real world, and an audience that is actively interested in the contents of the database.A database management system (DBMS) is composed of three major parts: (1) a storage subsystem that stores and retrieves data in files; (2)a modeling and manipulation subsystem that provides the means with which to organize the data and to add, delete, maintain, and update the data; and (3) an interface between the DBMS and its users. Several major trends are emerging that enhance the value and usefulness of database management systems.●Managers who require more up-to-date information to make effective decisions.●Customers who demand increasingly sophisticated information services and more current information about the status of their orders, invoices, and accounts.●Users who find that they can develop custom applications with database systems in a fraction of the time it takes to use traditional programming languages.●Organizations that discover information has a strategic value; they utilize their database systems to gain an edge over their competitors.A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions that aren’t available in regular reports. These questions might initially be vague and/or p oorly defined, but people can “browse” through the database until they have the needed information. In short, the DBMS will “mange” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers. In a file-oriented system, user needing special information may communicate their needs to a programmer, who, when time permits, will write one or more programs to extract the data and prepare the information. The availability of a DBMS, however, offers users a much faster alternative communications path.DATABASE QUERYIf the DBMS provides a way to interactively enter and update the database ,as well as interrogate it ,this capability allows for managing personal database. However, it does not automatically leave an audit trail of actions and does not provide the kinds of controls necessary in a multi-user organization .There controls are only available when a set of application programs is customized for each data entry and updating function.Software for personal computers that perform some of the DBMS functions has been very popular .Individuals for personal information storage and processing intended personal computers for us .Small enterprises, professionals like doctors, architects, engineers, lawyers and so on have also used these machines extensively. By the nature of intended usage ,database system on there machines are except from several of the requirements of full-fledged database systems. Since data sharing is not intended, concurrent operations even less so ,the software can be less complex .Security and integrity maintenance are de-emphasized or absent .as data volumes will be small, performance efficiency is also less important .In fact, the only aspect of a database system that is important is data independence. Data independence ,as stated earlier ,means that application programs and user queries need not recognize physical organization of data on secondary storage. The importance of this aspect , particularly for the personal computer user ,is that this greatly simplifies database usage . The user can store ,access and manipulate data at ahigh level (close to the application)and be totally shielded from the low level (close to the machine )details of data organization.DBMS STRUCTURING TECHNIQUESSpatial data management has been an active area of research in the database field for two decades ,with much of the research being focused on developing data structures for storing and indexing spatial data .however, no commercial database system provides facilities for directly de fining and storing spatial data ,and formulating queries based on research conditions on spatial data.There are two components to data management: history data management and version management .Both have been the subjects of research for over a decade. The troublesome aspect of temporal data management is that the boundary between applications and database systems has not been clearly drawn. Specifically, it is not clear how much of the typical semantics and facilities of temporal data management can and should be directly incorporated in a database system, and how much should be left to applications and users. In this section, we will provide a list of short-term research issues that should be examined to shed light on this fundamental question.The focus of research into history data management has been on defining the semantics of time and time interval, and issues related to understanding the semantics of queries and updates against history data stored in an attribute of a record. Typically, in the context of relational databases ,a temporal attribute is defined to hold a sequence of history data for the attribute. A history data consists of a data item and a time interval for which the data item is valid. A query may then be issued to retrieve history data for a specified time interval for the temporal attribute. The mechanism for supporting temporal attributes is to that for supporting set-valued attributes in a database system, such as UniSQL.In the absence of a support for temporal attributes, application developers who need to model and history data have simply simulated temporal attributes by creating attribute for the time interval ,along with the “temporal” attribute. This of course may result in duplication of records in a table, and more complicated search predicates in queries. The one necessary topic of research in history data management is to quantitatively establish the performance (and even productivity) differences betweenusing a database system that directly supports attributes and using a conventional database system that does not support either the set-valued attributes or temporal attributes.Data security, integrity, and independenceData security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database of the database, called subschemas. For example, an employee database can contain all the data about an individual employee, but one group of users may be authorized to view only payroll data, while others are allowed access to only work history and medical data.Data integrity refers to the accuracy, correctness, or validity of the data in the database. In a database system, data integrity means safeguarding the data against invalid alteration or destruction. In large on-line database system, data integrity becomes a more severe problem and two additional complications arise. The first has to do with many users accessing the database concurrently. For example, if thousands of travel agents book the same seat on the same flight, the first agent’s booking will be lost. In such cases the technique of locking the record or field provides the means for preventing one user from accessing a record while another user is updating the same record.The second complication relates to hardware, software or human error during the course of processing and involves database transaction which is a group of database modifications treated as a single unit. For example, an agent booking an airline reservation involves several database updates (i.e., adding the passenger’s name and address and updating the seats-available field), which comprise a single transaction. The database transaction is not considered to be completed until all updates have been completed; otherwise, none of the updates will be allowed to take place.An important point about database systems is that the database should exist independently of any of the specific applications. Traditional data processing applications are data dependent.When a DMBS is used, the detailed knowledge of the physical organization of the data does not have to be built into every application program. The application program asks the DBMS for data by field name, for example, a coded representationof “give me customer name and balance due” would be sent to the DBMS. Without a DBMS the programmer must reserve space for the full structure of the record in the program. Any change in data structure requires changes in all the applications programs.Data Base Management System (DBMS)The system software package that handles the difficult tasks associated with creating ,accessing and maintaining data base records is called a data base management system (DBMS). A DBMS will usually be handing multiple data calls concurrently.It must organize its system buffers so that different data operations can be in process together .It provides a data definition language to specify the conceptual schema and most likely ,some of the details regarding the implementation of the conceptual schema by the physical schema.The data definition language is a high-level language, enabling one to describe the conceptual schema in terms of a “data model “.At the present time ,there are four underling structures for database management systems. They are :List structures.Relational structures.Hierarchical (tree) structures.Network structures.Management Information System(MIS)An MIS can be defined as a network of computer-based data processing procedures developed in an organization and integrated as necessary with manual and other procedures for the purpose of providing timely and effective information to support decision making and other necessary management functions.One of the most difficult tasks of the MIS designer is to develop the information flow needed to support decision making .Generally speaking ,much of the information needed by managers who occupy different levels and who have different levels and have different responsibilities is obtained from a collection of exiting information system (or subsystems)Structure Query Language (SQL)SQL is a data base processing language endorsed by the American NationalStandards Institute. It is rapidly becoming the standard query language for accessing data on relational databases .With its simple ,powerful syntax ,SQL represents a great progress in database access for all levels of management and computing professionals.SQL falls into two forms : interactive SQL and embedded SQL. Embedded SQL usage is near to traditional programming in third generation languages .It is the interactive use of SQL that makes it most applicable for the rapid answering of ad hoc queries .With an interactive SQL query you just type in a few lines of SQL and you get the database response immediately on the screen.译文数据库数据库可以被定义为一个相互联系的数据库存储的集合。

外文文献及翻译

外文文献及翻译

To connect SQL Server databaseFirst we introduce the basic knowledge of the database,be regarded as thewarm-up exercise that study database weave distance front!1.warm-up exerciseNeeding first avowal is relation database that database knowledge that we here introduce all point. The so-called relation database is to mean data as that the form gather, passing to establish simple form an a kind of database for of relation to defining construction.I ignore the watch at how saving way in physics in the document in database is,it can see to make an a line for with row, with electronics form is similar with the row.In relation database, the line were called the record, but the row then is called word segment.This form inside each an all in formations for is a record, it including particular customer, but each record then included the same type with the word segment of the quantity:Customer's number, name etc.Form is logic set that a kind of related information that press a line of arrangingwith row, similar in single form in work.Each row of the word a database form inside calls a word segment. Watch isfrom every kind of word a definition of its containment of, each word a data for describing its implying. While creating to set up a database, the beard assign for each word segment a the piece belongs to the sex with the other according to thetype,biggest length.The word segment can include every kind of word sign,arithmetic figure even sketch.An information of relevant customer deposits in the line of the form, is called record.By any large, arbitrarily two records for database form to create set up can't be same.Key be a certain word segment( or several words segment) of the form inside, it()for fast inspect but drive index. The key can be unique, and also can then the right and wrong is unique, being decided by it() whether admission repetition. Unique key can specify for main key, using each one that come to unique marking form.The norm turns the database design of mission be method that the data of buildup,but the data of buildup, should can dissolve otiose repetition, and for have the necessary information offering to check to seek the path quickly. For attaining this kind of target but separate information to the process gone to in every kind of independent form, be called the norm turn.It is complicated process to use many appointed rules to proceed the norm withthe type of the different Class that norm turn. That process studies and discuss already beyond the reach of textual scope.But,the norm of the simple database in majority turn and can use the simple experience in underneath rule completes: include the form of the information of repetition must be divided into independent a few forms dissolve repetition.If we have chosen to learn 12 curricular 1000 students, the each curricularandcurricular that choose to -many100 teacher the with show will elucidation eachstudent repeat once.To avoid this kind of low efficiency, should to turn the dichotomous and independent form in form to the norm,an is used to mean the student,the another uses mean the course.Now the form was turned by the norm, so, to changes the particular andcurricular course describe or data,as long as change a record all right.Is a basic knowledge concerning database above,this is what study database plait distance must.Although the database technique is used as a course,its depth is not this space and can describe with the wide degree of,be used as the primer with simple database plait the distance should be all right already.Like,underneath we can start practicing.We usually meet the database system is to registers the system,ignoring you are in the unit,or attend what buildup,the register is to cans not help of,and it of the construction is more simple,we take a register system as an example.The analysis is once a data for involving.2. understanding the elementsFor the register, want the on the trail of information include:name、sex、native place、age、date of birth、unit、address、postal service codes、telephone、FAX. Certainly,can create to set up a form in brief,make above each piece according to item to should a word segment.Need to point the form the main key in parties now, in order to unique marking each a record,increase register number conduct and actions unique key respectively in register form,guarantee a two records like this all different.To the database after making an above analysis,we can start establishing the database.3.set up the firm in campHere we study to establish the database how,needing to make sure the typethat to establish the database first.Pass in Visual Basic the data interview control piece or data interview object ( DAO) can visit the following database:1)The database of JET, namely Microsoft Access2)The database of ISAM, such as: DBase, etc. of FoxPro3)The database of ODBC,every follow the standard of ODBC customer/ server database. Such as: Microsoft SQL Server, OracleBy any large, if develop the personal small scaled database system, use Access database comparison accommodation, to develop the big and medium-sized database system uses the database of ODBC fester. But dBase with the database of FoxPro because of already dated,unless special circumstance,do not use otherwise.In our example, chose to use the database of Access certainly. Establish the database of Access contain two kinds of methods: While establishing the database in Microsoft Access. Click new set up button can establish the new form. Here we main introduction the second method: The usage can see to turn the data management machine, do not need to weave the distance and then can create to set up the database.Can see to turn the data management machine is the applied procedure of a great use,it is a VB business enterprise version is supplementary with theprofession version, in the catalogue\..\ Devastation\ vb\ samples\ the Visdata is next, its interface is as follows the diagram.Click the menu document item is next newset up son item Microsoft ACCESS son item of edition 7.0 MDB item. Input thenew setting upthe name of the database in flick window way open register, appear the underneath show the window way:Want the born and new form, the single shot in right key database window way flicks the menu open, then the choice new form ordinaries,establishing in watch construction dialog box appeared later on a word for wanting segment. The every time faces to join in the form new word segment, single shot increment word segment button, will appear of increment word segment dialog box.Increment word a type for options in the dialog box, according to word segment.In our the register database that establish, the type of the each word segment.Want to notice of is, because the word segment registers the number be used unique marking record of, therefore, it can't be inputted by customer. So while defining the word's segment need to be defined for Long data type, the automatic born word segment item is valid, and picks out this item. Be the customer like this to input to record with other the different value every input a new record, system would on the word's segment automatically.In ACCESS database, the key word realizes with the index of, conduct andactions plait distance personnel at gather to weave the distance to the record of the form type,needs to adjust to use index.While searching,the technique of Rushmore uses the index information the excellent turning the search automatically. Aftercompleting the form definition, click increment index button, flick such aspen figure 5 show the window way.In window way the right side contain three optioned, its meaning, such as table,12.Increase the index dialog box options.After completing such as figure 6.Certainly, the academic association database establishes too not a dynasty the business of the one night, the reader no harm much practices once. Visit databases design and the development of the application procedures ofMS Visual Basics of the databases of the SQL Server. When design a system, the customer still needs to comprehend to use to come to visit the plait distance of ask the data of SQL Server to connect. The origin was detailed to elaborate that the usage open type database conjunction (the Open Database Connectivity, ODBC) adjusts to connect the objects to connect with the class, still having the data interviews object (the Data Access Objects, the DAO) and the long-range data objects.Design and weave to write large and complicated and applied procedure's database design for the software developer is a challenge, need to choose to weave the distance language and tools, do an accommodation for the SQL Server, choose the calculate way and the data structures, still need to design the sketch customer interface and the application procedures to connect. The decision within the most important software design is applied fixed position of the procedure. In other words, design must specify the system of which parts are data, business rule, and the data entrance procedure and used for circulating the code of other part. The MS Visual Basic supports the plait distance that some databases manage the systems connect, especially SQL Server. Adjust to connect to include the ODBC and DB-Libraries toconnect the, object to connect to include the data interview object (DAO), long range data object (the RDO), the OLE DB and the ActiveX Data Objects (ADO) with the class, todistributes mission the manage to Server SQL capable the returns that SQL the manage the object (the SQL Distributed management Objects, SQL-DMO) to connect. Connect the oculars right choice can improve the whole function of system and the development speed biggest. Design the large data warehouse system needs to choose the applied model properly. Traditional customer/ service's model depends on to join in the center layer but get the improvement to become three layer models. These three layers divide the line system as three parts: each layer is responsible for providing the service:(1) Data service( the Data Service) contain the maintenance data and the operation date such as the increment, modification, deletion and backups.These services maintenance data relation and contact,support backup and ually the data service is managed the system usage by the database.(2) business service( the Business Service) is handled the logic by the businessrule and data to constitute, such as the data legitimacy rule, the business processing support and the record backup logics. The main purpose of these services provides the data maintenance toward the application procedure Logic.(3) expression service( the Presentation Service)( or the customer service) support customer interface, control the customer data to input to express with data.(Output) Notice in customer/ service's technical term, sometimes express the service definition as customer's machine (or head), the data service definition for server (or after carry), but the business service is in the center the layer (the middle layer). But important comprehend any two layers .The data service business service expresses the logic support GUI that the service maintenance database business rule and the processing data need, data importation and manifestation the correspondences can think to carry on between customer's machine and servers. For example, in the center the layer can think is a head.Server The physics realization of the system can carry on through many different paths.The underneath wills discuss three layer logic models three kinds of to carry out the method:1.Fat customer machine realizationMany layer (the multi tier) realizations of fat customer the machine realization three layer models of a kind of carry out the options is in the customer's on board movement business and expression services. This probably writes the most common path in the Visual Basic application procedure for the SQL Server. This kind of carries out the physics up only two layers:The server provides the data service only, this kind of method contain 2:00 shortage. First, was the applied procedure to compute the on board increment at the customer, customer's calculators need to be stronger, this will increase the system expense, because the system usually takes several customer's machines. When the system takes to have the number with thousand million of customer's machine, thiskind of method will become too expensive. Another 1:00 shortage is a possible increment maintenance expenses. Move to the change of legitimacy logic and the business rule of the system and will cause upgrade customer's machine procedure each time. If the system contain customer's machine of the equal quantity, this is a problem. The biggest advantage of the machine realization in fat customer is to reduce the network discharge, if the legitimacy and the business rules need not be decide by the database. Under this kind of circumstance, only pass the data of the legitimacy logic and can spread toward server. Be the example of the importation data legitimacy,suppose the reader to have a small form (for example national form of name) to put in customer's machine. If the data entrance mold piece checks the native watch but is not a more national name in main database, then will reduce the network discharge obviously. Another an important use is in the development process of the system.If the head developer was limited to the interview carry behind, for example, can't pass the data in the database to verify to input the legitimacy, so, this kind of method can make it right processing data.2. Thin customer machine realizationIn thin customer the machine realization, business the service locates the server,the business logic usually expresses for saving process.The Server, the saving process usages T-The SQL plait write. This kind of realization is like fat customer's machine to carry out the similar physics up only two layers.The advantage of this kind of method is to reduce the system expense, because thin customer's machine needs the less system resources, this have very important many systems of customer's machines to take. And, support the expenses to also compare the fat customer the machine system is a little less, because the code carries the concentrated control in the server. If the business rule is depend on in the data of the database, thin customer the machine realization reduces the network discharge. The main shortage of this kind of method is a saving process to lack the vivid. The Visual Basic provide stronger than the T-SQL the plait distance ability that have to have another. Notice three the thin customer of the layer model the machine physics realization sometimes is called the fat server (the fat Server) model to confuse with thin customer's machine/ server calculation model by avoid, the latter points a kind of thin customer the machine hardware equipments and techniques are for example the Citric.3. Many layer realizationMost in brief many layer realizations are three layer realizations, many possible three a kinds of the layer model physics realizations. In this kind of realization, Link the SQL Server usage data service business to serve the thin customer of the machine expression service data service business service of fat customer from the Visual Basic the machine expression service data business the service be an alone the progress circulate. That progress can install for serve in the data same set server of the place or at another one server of the dissimilarity. The key characteristics of this kind of realization is the data service, business to serve the different from expression serve to can do for separation of progress movement in calculator. Three layer realizations.连接SQL Server数据库我们先介绍一下数据库的基本知识,算是学习数据库编程前的热身运动吧!1. 热身运动首先需要声明是,我们这里介绍的数据库知识都是指的关系数据库。

外文文献翻译(图片版)

外文文献翻译(图片版)

本科毕业论文外文参考文献译文及原文学院经济与贸易学院专业经济学(贸易方向)年级班别2007级 1 班学号3207004154学生姓名欧阳倩指导教师童雪晖2010 年 6 月 3 日目录1 外文文献译文(一)中国银行业的改革和盈利能力(第1、2、4部分) (1)2 外文文献原文(一)CHINA’S BANKING REFORM AND PROFITABILITY(Part 1、2、4) (9)1概述世界银行(1997年)曾声称,中国的金融业是其经济的软肋。

当一国的经济增长的可持续性岌岌可危的时候,金融业的改革一直被认为是提高资金使用效率和消费型经济增长重新走向平衡的必要(Lardy,1998年,Prasad,2007年)。

事实上,不久前,中国的国有银行被视为“技术上破产”,它们的生存需要依靠充裕的国家流动资金。

但是,在银行改革开展以来,最近,强劲的盈利能力已恢复到国有商业银行的水平。

但自从中国的国有银行在不久之前已经走上了改革的道路,它可能过早宣布银行业的改革尚未取得完全的胜利。

此外,其坚实的财务表现虽然强劲,但不可持续增长。

随着经济增长在2008年全球经济衰退得带动下已经开始软化,银行预计将在一个比以前更加困难的经济形势下探索。

本文的目的不是要评价银行业改革对银行业绩的影响,这在一个完整的信贷周期后更好解决。

相反,我们的目标是通过审查改革的进展和银行改革战略,并分析其近期改革后的强劲的财务表现,但是这不能完全从迄今所进行的改革努力分离。

本文有三个部分。

在第二节中,我们回顾了中国的大型国有银行改革的战略,以及其执行情况,这是中国银行业改革的主要目标。

第三节中分析了2007年的财务表现集中在那些在市场上拥有浮动股份的四大国有商业银行:中国工商银行(工商银行),中国建设银行(建行),对中国银行(中银)和交通银行(交通银行)。

引人注目的是中国农业银行,它仍然处于重组上市过程中得适当时候的后期。

第四节总结一个对银行绩效评估。

外文文献及翻译

外文文献及翻译

外文文献及翻译1. 文献:"The Effects of Exercise on Mental Health"翻译:运动对心理健康的影响Abstract: This article explores the effects of exercise on mental health. The author discusses various studies that have been conducted on this topic, and presents evidence to support the claim that exercise can have positive impacts on mental well-being. The article also examines the mechanisms through which exercise affects mental health, such as the release of endorphins and the reduction of stress hormones. Overall, the author concludes that exercise is an effective strategy for improving mental health and recommends incorporating physical activity into daily routines.摘要:本文探讨了运动对心理健康的影响。

作者讨论了在这个主题上进行的各种研究,并提出证据支持运动对心理健康有积极影响的观点。

该文章还探讨了运动如何影响心理健康的机制,如内啡肽的释放和压力激素的减少。

总的来说,作者得出结论,运动是改善心理健康的有效策略,并建议将体育活动纳入日常生活。

2. 文献: "The Benefits of Bilingualism"翻译:双语能力的好处Abstract: This paper examines the benefits of bilingualism. The author presents research findings that demonstrate the cognitiveadvantages of being bilingual, such as enhanced problem-solving skills and improved attention control. The article also explores the social and cultural benefits of bilingualism, such as increased cultural awareness and the ability to communicate with people from different backgrounds. Additionally, the author discusses the positive effects of bilingualism on mental health, highlighting its role in delaying the onset of cognitive decline and in providing a buffer against age-related memory loss. Overall, the author concludes that bilingualism offers a range of advantages and recommends promoting bilingual education and language learning. 摘要:本文研究了双语能力的好处。

市场调研方法外文文献及翻译

市场调研方法外文文献及翻译

市场调研方法外文文献及翻译1. Market Research Methods: Incorporating Social Media into Traditional Approaches文章介绍了如何在市场调研中运用社交媒体,以帮助企业更好地了解消费者。

研究人员将社交媒体与传统的定量调研和定性调研相结合,以获得更全面的信息。

通过采集社交媒体的数据分析消费者的行为和偏好,以及对产品或服务的反馈意见。

2. Using Eye Tracking in Market Research: A Guide to Best Practices该文献介绍了视觉追踪技术在市场调研中的应用。

作者指出,视觉追踪技术可以帮助研究人员理解消费者在浏览产品或服务时的注意力分配和行为模式。

文章介绍了适用于市场调研的视觉追踪应用程序的最佳实践和测试方法。

3. Conjoint Analysis in Marketing: New Developments with Implications for Research and Practice这篇文章介绍了一种被称为 "共轭分析" 的调研方法,该方法可以帮助研究人员了解消费者在购买某种产品或服务时的偏好和决策过程。

文献称,共轭分析已经成为市场营销领域最为普遍的工具之一。

文章还介绍了最新的研究和在实践中的应用,并探讨了一些特定情况下共轭分析的限制。

4. Qualitative Market Research: An International Journal这个杂志专注于定性市场调研方法。

它包括与确定消费者需求、分析竞争对手、建立品牌等相关的研究。

文章强调定性市场调研可以提供深入的见解和对产品或服务的更清晰的理解,帮助企业做出更明智的营销和业务决策。

每一期都包括来自该领域的专家的文章,并提供案例研究和最佳实践。

5. Use of Artificial Intelligence Techniques in Market Research: A Review该文献介绍了如何使用人工智能技术进行市场调研。

外文文献及翻译

外文文献及翻译

Yunnan Ethnic pattern in Packaging DesignAbstract: Art is a folk Mother of the arts,is the source of the new art, From which to draw a strong tradition of high—grade Nutrition。

The persons belonging to national folk arts Ethnic patterns,are folk arts Intraoperative a gem, its development Research,and with the means of modern art,art wind Grid,professional skills combine to form a unique Style and features a modern design There are important applications,this paper focuses on Minority Folk pattern in modern packaging design Meter applications are discussed.Keywords: Yunnan Ethnic. Pattern。

Packaging Design.IntroductionYunnan is a multi-ethnic province, Here multiply survive the Han, Yi, Bai More than twenty families, Zhuang, Miao, Dai, etc。

Nation. Long history of various ethnic groups in Yunnan Province, the source is far Long, creating a rich and colorful Folk art。

论文外文文献翻译

论文外文文献翻译

论文外文文献翻译以下是一篇700字左右的论文外文文献翻译:原文题目:The Role of Artificial Intelligence in Medical Diagnostics: A Review原文摘要:In recent years, there has been a growing interest in the use of artificial intelligence (AI) in the field of medical diagnostics. AI has the potential to improve the accuracy and efficiency of medical diagnoses, and can assist clinicians in making treatment decisions. This review aims to examine the current state of AI in medical diagnostics, and discuss its advantages and limitations. Several AI techniques, including machine learning, deep learning, and natural language processing, are discussed. The review also examines the ethical and legal considerations associated with the use of AI in medical diagnostics. Overall, AI has shown great promise in improving medical diagnostics, but further research is needed to fully understand its potential benefits and limitations.AI在医学诊断中发挥的作用:一项综述近年来,人工智能(AI)在医学诊断领域的应用引起了越来越多的关注。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the financesector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more i ts “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs, but the recent developments in the finance sector worsen the situation even more.Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to l ending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPME’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70 areas they have room to adapt the Accord to their specific needs when implementing itinto EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs: •The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive,which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, whichstrengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating w ill also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to easetransparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

外文文献免费范文精选

外文文献免费范文精选

英文原文1:《Professional C# Third Edition》Simon Robinson,Christian Nagel, Jay Glynn, Morgan Skinner, Karli Watson, Bill Evjen. Wiley Publishing, Inc. 2006 Where C# Fits InIn one sense, C# can be seen as being the same thing to programming languages is to the Windows environment. Just as Microsoft has been adding more and more features to Windows and the Windows API over the past decade. Visual Basic andC++ have undergone expansion. Although Visual Basic and C++ have ended up as hugely powerful languages as a result of this, both languages also suffer from problems due to the legacies of how they have evolved.In the case of Visual Basic 6 and earlier, the main strength of the language was the fact that it was simple to understand and didn't make many programming tasks easy, largely hiding the details of the Windows APT and the COM component infrastructure from the developer. The downside to this was that Visual Basic was never truly object-oriented, so that large applications quickly become disorganized and hard to maintain. As well as this, because Visual Basic's syntax was inherited from early versions of BASIC (which, in turn, was designed to be intuitively simple for beginning programmers to understand, rather than lo write large commercial applications), it didn't really lend itself to well-structured or object-oriented programs.C++, on the other hand, has its roots in the ANSI C++ language definition. It isn’t completely ANSI compliant for the simple reason that Microso ft first wrote itsC++ compiler before the ANSI definition had become official, but it conics close. Unfortunately, this has led to two problems. First, ANSI C++ has its roots in a decade-old state of technology, and this shows up in a lack of support for modern 1 外文文献-中文翻译-c#concepts (such as Unicode strings and generating XML documentation), and in some archaic syntax structures designed for the compilers of yesteryear (such as the separation of declaration from definition of member functions). Second, Microsoft has been simultaneously trying to evolve C++ into a language that is designed for high-performance (asks on Windows, and in order to achieve that they've been forced to add a huge number of Microsoft-specific keywords as well as various libraries to the language.The result is that on Windows, the language has become a complete mess. Just ask C++ developers how many definitions for a string they can think of: char*, LPTSTR, string, CString (MFC version), CString (WTL version), wchar_l*, OLECHAR*, and so on.Now completely new environment that is going to involve new extensions to both languages. Microsoft has gotten around this by adding yet more Microsoft-specific keywords to C++, and by completely revamping Visual Basic into Visual a language that retains some of the basic VB syntax but that is so different in design that we can consider it to be, for all practical purposes, a new language. It?s in this context that Microsoft has decided to give developers an alternative—a language designed specifically and designed with a clean slate. Visual C# .NET is the result. Officially, Microsoft describes C# as a ''simple, modern, object-oriented, and type-safe programming language derived from C and C++.” Most independent observers would probably change Chat to '"derived from C, C++, and Java.^ Such descriptions are technically accurate but do little to convey the beauty or elegance of the language. Syntactically, C# is very similar to both C++ and Java, to such 2an extent that many keywords are (he same, and C# also shares the same block structure with braces ({}) to mark blocks of code, and semicolons to separate statements. The first impression of a piece of C# code is that it looks quite like C++ or Java code. Behind that initial similarity, however, C# is a lot easier to learn than C++, and of comparable difficulty to Java. Its design is more in tune with modern developer tools than both of those other languages, and it has been designed to give us, simultaneously, the ease of use of Visual Basic, and the high performance, low-level memory access of C++ if required. Some of the features of C# arc:LI Full support for classes and object-oriented programming, including both interface and implementation inheritance, virtual functions, and operator overloading.□ A consistent and well-defined set of basic types.□ Built-in support for automatic generation of XML documentation.□ Automatic cleanup of dynamically allocated memory.□ The facility to mark classes or methods with user-defined attributes. This can be useful for documentation and can have some effects on compilation (for example, marking methods to be compiled only in debug builds).□ Full access to base class library, as well as easy access to the Windows AP I (if you really need it, which won’t be all that often).□ Pointers and direct memory access are available if required, but the language has been designed in such a way that you can work without them in almost all cases. □ Support for properties and eve nts in the style of Visual Basic.LJ Just by changing the compiler options, you can compile either to an executable or to a library components that can be called up by other code in the same way as 3外文文献-中文翻译-c#ActiveX controls (COM components).LI C# can be used to write dynamic Web pages and XMLWeb services.Most of the above statements, it should be pointed out. do also apply to Visual and Managed C++. The fact that C# is designed from the start to work however, means that its support for the features is both more complete, and offered within the context of a more suitable syntax than for those other languages. While the C# language itself is very similar to Java, there are some improvements: in particular. Java is not designed to work with environment.Before we leave the subject, we should point out a couple of limitations of C#. The one area the language is not designed for is time-critical or extremely high performance code—the kind where you really are worried about whether a loop takes 1.000 or 1,050 machine cycles to run through, and you need to clean up your resources the millisecond they arc no longer needed. C++ is likely to continue to reign supreme among low-level languages in this area. C# lacks certain key facilities needed for extremely high performance apps, including the ability to specify inline functions and destructors that are guaranteed to run at particular points in the code. However, the proportions of applications that fall into this category are very low.4外文文献-中文翻译-c#中文译文1:《C#的优点》C#在某种程度上k可以打作足.NET面向Windows环境的种编程语言。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(/docs/pos_papers/2004/041027_SME-finance_final.do c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the finance sector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more its “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs,but the recent developments in the finance sector worsen the situation even more. Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to lending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPM E’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70areas they have room to adapt the Accord to their specific needs when implementing it into EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs:•The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive, which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, which strengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating will also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to ease transparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

外文翻译文献

外文翻译文献

外文翻译文献The Impact of Social Media on Mental HealthIntroductionIn recent years, with the rapid development of technology, social media has become an integral part of people's lives. It allows users to connect with others, share information, and express their opinions. While social media has many benefits, such as enhancing communication and facilitating information dissemination, it also has several negative effects on mental health. This paper will explore the impact of social media on mental health, including the increase in anxiety and depression, the pressure to maintain a perfect online image, and the addictive nature of social media.Increase in Anxiety and DepressionStudies have shown that the use of social media is associated with an increased risk of anxiety and depression. Constant exposure to the carefully curated lives of others on social media platforms can lead to feelings of inadequacy and low self-esteem. Users often compare themselves to others and may experience envy or jealousy, which can contribute to anxiety and depressive symptoms. Moreover, the fear of missing out (FOMO) is prevalent among social media users. Seeing others engaging in enjoyable activities or having a large number of friends can cause feelings of loneliness and isolation in individuals who are not experiencing the same level of social engagement. These feelings can contribute to the development or worsening of anxiety and depression.Pressure to Maintain a Perfect Online ImageSocial media platforms often promote an idealized version of reality, where individuals present only the highlights of their lives. These posts are carefully crafted, showing only the positive aspects of one's life and ignoring the negatives. This constant pressure to maintain a perfect online image can lead to feelings of inadequacy and low self-worth.Additionally, the need for validation and approval from others is heightened on social media. Users often measure their self-worth based on the number of likes, comments, or followers they have. The constant pursuit of validation can be mentally exhausting and can contribute to a negative self-image if one's posts do not receive the desired attention.Addictive Nature of Social MediaAnother significant impact of social media on mental health is its addictive nature. The constant availability of social media platforms on smartphones and other devices promotes excessive use and can lead to an addiction-like behavior. Individuals may find themselves spending hours scrolling through their feeds, neglecting their responsibilities, and isolating themselves fromreal-life interactions.The addictive nature of social media can also disrupt sleep patterns. The blue light emitted from screens can interfere with the production of melatonin, a hormone that regulates sleep. Studieshave shown that excessive social media use before bedtime can lead to poor sleep quality, which can have detrimental effects on mental health.ConclusionIn conclusion, while social media has its merits, it also has several negative effects on mental health. It can contribute to an increase in anxiety and depression, as well as a pressure to maintain a perfect online image. Additionally, the addictive nature of social media can lead to excessive use and disrupt sleep patterns. It is important for individuals to be mindful of their social media usage and take steps to prioritize their mental well-being.。

建筑类外文文献及中文翻译

建筑类外文文献及中文翻译

forced concrete structure reinforced with anoverviewReinSince the reform and opening up, with the national economy's rapid and sustained development of a reinforced concrete structure built, reinforced with the development of technology has been great. Therefore, to promote the use of advanced technology reinforced connecting to improve project quality and speed up the pace of construction, improve labor productivity, reduce costs, and is of great significance.Reinforced steel bars connecting technologies can be divided into two broad categories linking welding machinery and steel. There are six types of welding steel welding methods, and some apply to the prefabricated plant, and some apply to the construction site, some of both apply. There are three types of machinery commonly used reinforcement linking method primarily applicable to the construction site. Ways has its own characteristics and different application, and in the continuous development and improvement. In actual production, should be based on specific conditions of work, working environment and technical requirements, the choice of suitable methods to achieve the best overall efficiency.1、steel mechanical link1.1 radial squeeze linkWill be a steel sleeve in two sets to the highly-reinforced Department with superhigh pressure hydraulic equipment (squeeze tongs) along steel sleeve radial squeeze steel casing, in squeezing out tongs squeeze pressure role of a steel sleeve plasticity deformation closely integrated with reinforced through reinforced steel sleeve and Wang Liang's Position will be two solid steel bars linkedCharacteristic: Connect intensity to be high, performance reliable, can bear high stress draw and pigeonhole the load and tired load repeatedly.Easy and simple to handle, construction fast, save energy and material, comprehensive economy profitable, this method has been already a large amount of application in the project.Applicable scope : Suitable for Ⅱ, Ⅲ, Ⅳgrade reinforcing bar (including welding bad reinfor cing bar ) with ribbing of Ф 18- 50mm, connection between the same diameter or different diameters reinforcing bar .1.2must squeeze linkExtruders used in the covers, reinforced axis along the cold metal sleeve squeeze dedicated to insert sleeve Lane two hot rolling steel drums into a highly integrated mechanical linking methods.Characteristic: Easy to operate and joining fast and not having flame homework , can construct for 24 hours , save a large number of reinforcing bars and energy. Applicable scope : Suitable for , set up according to first and second class antidetonation requirement -proof armored concrete structure ФⅡ, Ⅲgrade reinforcing bar with ribbing of hot rolling of 20- 32mm join and construct live.1.3 cone thread connectingUsing cone thread to bear pulled, pressed both effort and self-locking nature, undergo good principles will be reinforced by linking into cone-processing thread at the moment the value of integration into the joints connecting steel bars.Characteristic: Simple , all right preparatory cut of the craft , connecting fast, concentricity is good, have pattern person who restrain from advantage reinforcing bar carbon content.Applicable scope : Suitable for the concrete structure of the industry , civil buil ding and general structures, reinforcing bar diameter is for Фfor the the 16- 40mm one Ⅱ, Ⅲgrade verticality, it is the oblique to or reinforcing bars horizontal join construct live.conclusionsThese are now commonly used to connect steel synthesis methods, which links technology in the United States, Britain, Japan and other countries are widely used. There are different ways to connect their different characteristics and scope of the actual construction of production depending on the specific project choose a suitable method of connecting to achieve both energy conservation and saving time limit for a project ends.钢筋混凝土构造中钢筋连接综述改革开放以来,伴随国民经济旳迅速、持久发展,多种钢筋混凝土建筑构造大量建造,钢筋连接技术得到很大旳发展。

外文文献翻译原文+译文

外文文献翻译原文+译文

外文文献翻译原文Analysis of Con tin uous Prestressed Concrete BeamsChris BurgoyneMarch 26, 20051、IntroductionThis conference is devoted to the development of structural analysis rather than the strength of materials, but the effective use of prestressed concrete relies on an appropriate combination of structural analysis techniques with knowledge of the material behaviour. Design of prestressed concrete structures is usually left to specialists; the unwary will either make mistakes or spend inordinate time trying to extract a solution from the various equations.There are a number of fundamental differences between the behaviour of prestressed concrete and that of other materials. Structures are not unstressed when unloaded; the design space of feasible solutions is totally bounded;in hyperstatic structures, various states of self-stress can be induced by altering the cable profile, and all of these factors get influenced by creep and thermal effects. How were these problems recognised and how have they been tackled?Ever since the development of reinforced concrete by Hennebique at the end of the 19th century (Cusack 1984), it was recognised that steel and concrete could be more effectively combined if the steel was pretensioned, putting the concrete into compression. Cracking could be reduced, if not prevented altogether, which would increase stiffness and improve durability. Early attempts all failed because the initial prestress soon vanished, leaving the structure to be- have as though it was reinforced; good descriptions of these attempts are given by Leonhardt (1964) and Abeles (1964).It was Freyssineti’s observations of the sagging of the shallow arches on three bridges that he had just completed in 1927 over the River Allier near Vichy which led directly to prestressed concrete (Freyssinet 1956). Only the bridge at Boutiron survived WWII (Fig 1). Hitherto, it had been assumed that concrete had a Young’s modulus which remained fixed, but he recognised that the de- ferred strains due to creep explained why the prestress had been lost in the early trials. Freyssinet (Fig. 2) also correctly reasoned that high tensile steel had to be used, so that some prestress would remain after the creep had occurred, and alsothat high quality concrete should be used, since this minimised the total amount of creep. The history of Freyssineti’s early prestressed concrete work is written elsewhereFigure1:Boutiron Bridge,Vic h yFigure 2: Eugen FreyssinetAt about the same time work was underway on creep at the BRE laboratory in England ((Glanville 1930) and (1933)). It is debatable which man should be given credit for the discovery of creep but Freyssinet clearly gets the credit for successfully using the knowledge to prestress concrete.There are still problems associated with understanding how prestressed concrete works, partly because there is more than one way of thinking about it. These different philosophies are to some extent contradictory, and certainly confusing to the young engineer. It is also reflected, to a certain extent, in the various codes of practice.Permissible stress design philosophy sees prestressed concrete as a way of avoiding cracking by eliminating tensile stresses; the objective is for sufficient compression to remain after creep losses. Untensionedreinforcement, which attracts prestress due to creep, is anathema. This philosophy derives directly from Freyssinet’s logic and is primarily a working stress concept.Ultimate strength philosophy sees prestressing as a way of utilising high tensile steel as reinforcement. High strength steels have high elastic strain capacity, which could not be utilised when used as reinforcement; if the steel is pretensioned, much of that strain capacity is taken out before bonding the steel to the concrete. Structures designed this way are normally designed to be in compression everywhere under permanent loads, but allowed to crack under high live load. The idea derives directly from the work of Dischinger (1936) and his work on the bridge at Aue in 1939 (Schonberg and Fichter 1939), as well as that of Finsterwalder (1939). It is primarily an ultimate load concept. The idea of partial prestressing derives from these ideas.The Load-Balancing philosophy, introduced by T.Y. Lin, uses prestressing to counter the effect of the permanent loads (Lin 1963). The sag of the cables causes an upward force on the beam, which counteracts the load on the beam. Clearly, only one load can be balanced, but if this is taken as the total dead weight, then under that load the beam will perceive only the net axial prestress and will have no tendency to creep up or down.These three philosophies all have their champions, and heated debates take place between them as to which is the most fundamental.2、Section designFrom the outset it was recognised that prestressed concrete has to be checked at both the working load and the ultimate load. For steel structures, and those made from reinforced concrete, there is a fairly direct relationship between the load capacity under an allowable stress design, and that at the ultimate load under an ultimate strength design. Older codes were based on permissible stresses at the working load; new codes use moment capacities at the ultimate load. Different load factors are used in the two codes, but a structure which passes one code is likely to be acceptable under the other.For prestressed concrete, those ideas do not hold, since the structure is highly stressed, even when unloaded. A small increase of load can cause some stress limits to be breached, while a large increase in load might be needed to cross other limits. The designer has considerable freedom to vary both the working load and ultimate load capacities independently; both need to be checked.A designer normally has to check the tensile and compressive stresses, in both the top and bottom fibre of the section, for every load case. The critical sections are normally, but not always, the mid-span and the sections over piers but other sections may become critical ,when the cable profile has to be determined.The stresses at any position are made up of three components, one of which normally has a different sign from the other two; consistency of sign convention is essential.If P is the prestressing force and e its eccentricity, A and Z are the area of the cross-section and its elastic section modulus, while M is the applied moment, then where ft and fc are the permissible stresses in tension and compression.c e t f ZM Z P A P f ≤-+≤Thus, for any combination of P and M , the designer already has four in- equalities to deal with.The prestressing force differs over time, due to creep losses, and a designer isusually faced with at least three combinations of prestressing force and moment;• the applied moment at the time the prestress is first applied, before creep losses occur,• the maximum applied moment after creep losses, and• the minimum applied moment after creep losses.Figure 4: Gustave MagnelOther combinations may be needed in more complex cases. There are at least twelve inequalities that have to be satisfied at any cross-section, but since an I-section can be defined by six variables, and two are needed to define the prestress, the problem is over-specified and it is not immediately obvious which conditions are superfluous. In the hands of inexperienced engineers, the design process can be very long-winded. However, it is possible to separate out the design of the cross-section from the design of the prestress. By considering pairs of stress limits on the same fibre, but for different load cases, the effects of the prestress can be eliminated, leaving expressions of the form:rangestress e Perm issibl Range Mom entZ These inequalities, which can be evaluated exhaustively with little difficulty, allow the minimum size of the cross-section to be determined.Once a suitable cross-section has been found, the prestress can be designed using a construction due to Magnel (Fig.4). The stress limits can all be rearranged into the form:()M fZ PA Z e ++-≤1 By plotting these on a diagram of eccentricity versus the reciprocal of the prestressing force, a series of bound lines will be formed. Provided the inequalities (2) are satisfied, these bound lines will always leave a zone showing all feasible combinations of P and e. The most economical design, using the minimum prestress, usually lies on the right hand side of the diagram, where the design is limited by the permissible tensile stresses.Plotting the eccentricity on the vertical axis allows direct comparison with the crosssection, as shown in Fig. 5. Inequalities (3) make no reference to the physical dimensions of the structure, but these practical cover limits can be shown as wellA good designer knows how changes to the design and the loadings alter the Magnel diagram. Changing both the maximum andminimum bending moments, but keeping the range the same, raises and lowers the feasible region. If the moments become more sagging the feasible region gets lower in the beam.In general, as spans increase, the dead load moments increase in proportion to the live load. A stage will be reached where the economic point (A on Fig.5) moves outside the physical limits of the beam; Guyon (1951a) denoted the limiting condition as the critical span. Shorter spans will be governed by tensile stresses in the two extreme fibres, while longer spans will be governed by the limiting eccentricity and tensile stresses in the bottom fibre. However, it does not take a large increase in moment ,at which point compressive stresses will govern in the bottom fibre under maximum moment.Only when much longer spans are required, and the feasible region moves as far down as possible, does the structure become governed by compressive stresses in both fibres.3、Continuous beamsThe design of statically determinate beams is relatively straightforward; the engineer can work on the basis of the design of individual cross-sections, as outlined above. A number of complications arise when the structure is indeterminate which means that the designer has to consider, not only a critical section,but also the behaviour of the beam as a whole. These are due to the interaction of a number of factors, such as Creep, Temperature effects and Construction Sequence effects. It is the development of these ideas whichforms the core of this paper. The problems of continuity were addressed at a conference in London (Andrew and Witt 1951). The basic principles, and nomenclature, were already in use, but to modern eyes concentration on hand analysis techniques was unusual, and one of the principle concerns seems to have been the difficulty of estimating losses of prestressing force.3.1 Secondary MomentsA prestressing cable in a beam causes the structure to deflect. Unlike the statically determinate beam, where this motion is unrestrained, the movement causes a redistribution of the support reactions which in turn induces additional moments. These are often termed Secondary Moments, but they are not always small, or Parasitic Moments, but they are not always bad.Freyssinet’s bridge across the Marne at Luzancy, started in 1941 but not completed until 1946, is often thought of as a simply supported beam, but it was actually built as a two-hinged arch (Harris 1986), with support reactions adjusted by means of flat jacks and wedges which were later grouted-in (Fig.6). The same principles were applied in the later and larger beams built over the same river.Magnel built the first indeterminate beam bridge at Sclayn, in Belgium (Fig.7) in 1946. The cables are virtually straight, but he adjusted the deck profile so that the cables were close to the soffit near mid-span. Even with straight cables the sagging secondary momentsare large; about 50% of the hogging moment at the central support caused by dead and live load.The secondary moments cannot be found until the profile is known but the cablecannot be designed until the secondary moments are known. Guyon (1951b) introduced the concept of the concordant profile, which is a profile that causes no secondary moments; es and ep thus coincide. Any line of thrust is itself a concordant profile.The designer is then faced with a slightly simpler problem; a cable profile has to be chosen which not only satisfies the eccentricity limits (3) but is also concordant. That in itself is not a trivial operation, but is helped by the fact that the bending moment diagram that results from any load applied to a beam will itself be a concordant profile for a cable of constant force. Such loads are termed notional loads to distinguish them from the real loads on the structure. Superposition can be used to progressively build up a set of notional loads whose bending moment diagram gives the desired concordant profile.3.2 Temperature effectsTemperature variations apply to all structures but the effect on prestressed concrete beams can be more pronounced than in other structures. The temperature profile through the depth of a beam (Emerson 1973) can be split into three components for the purposes of calculation (Hambly 1991). The first causes a longitudinal expansion, which is normally released by the articulation of the structure; the second causes curvature which leads to deflection in all beams and reactant moments in continuous beams, while the third causes a set of self-equilibrating set of stresses across the cross-section.The reactant moments can be calculated and allowed-for, but it is the self- equilibrating stresses that cause the main problems for prestressed concrete beams. These beams normally have high thermal mass which means that daily temperature variations do not penetrate to the core of the structure. The result is a very non-uniform temperature distribution across the depth which in turn leads to significant self-equilibrating stresses. If the core of the structure is warm, while the surface is cool, such as at night, then quite large tensile stresses can be developed on the top and bottom surfaces. However, they only penetrate a very short distance into the concrete and the potential crack width is very small. It can be very expensive to overcome the tensile stress by changing the section or the prestress。

(完整word版)外文文献及翻译doc

(完整word版)外文文献及翻译doc

Criminal Law1.General IntroductionCriminal law is the body of the law that defines criminal offenses, regulates the apprehension, charging, and trial of suspected offenders,and fixes punishment for convicted persons. Substantive criminal law defines particular crimes, and procedural law establishes rules for the prosecution of crime. In a democratic society, it is the function of the legislative bodies to decide what behavior will be made criminal and what penalties will be attached to violations of the law.Capital punishment may be imposed in some jurisdictions for the most serious crimes. And physical or corporal punishment may still be imposed such as whipping or caning, although these punishments are prohibited in much of the world. A convict may be incarcerated in prison or jail and the length of incarceration may vary from a day to life.Criminal law is a reflection of the society that produce it. In an Islamic theocracy, such as Iran, criminal law will reflect the religious teachings of the Koran; in an Catholic country, it will reflect the tenets of Catholicism. In addition, criminal law will change to reflect changes in society, especially attitude changes. For instance, use of marijuana was once considered a serious crime with harsh penalties, whereas today the penalties in most states are relatively light. As severity of the penaltieswas reduced. As a society advances, its judgments about crime and punishment change.2.Elements of a CrimeObviously, different crimes require different behaviors, but there are common elements necessary for proving all crimes. First, the prohibited behavior designated as a crime must be clearly defined so that a reasonable person can be forewarned that engaging in that behavior is illegal. Second, the accused must be shown to have possessed the requisite intent to commit the crime. Third, the state must prove causation. Finally, the state must prove beyond a reasonable doubt that the defendant committed the crime.(1) actus reusThe first element of crime is the actus reus.Actus is an act or action and reus is a person judicially accused of a crime. Therefore, actus reus is literally the action of a person accused of a crime. A criminal statute must clearly define exactly what act is deemed “guilty”---that is, the exact behavior that is being prohibited. That is done so that all persons are put on notice that if they perform the guilty act, they will be liable for criminal punishment. Unless the actus reus is clearly defined, one might not know whether or not on e’s behavior is illegal.Actus reus may be accomplished by an action, by threat of action,or exceptionally, by an omission to act, which is a legal duty to act. For example, the act of Cain striking Abel might suffice, or a parent’s failure to give to a young child also may provide the actus reus for a crime.Where the actus reus is a failure to act, there must be a duty of care. A duty can arise through contract, a voluntary undertaking, a blood relation, and occasionally through one’s official position. Duty also can arise from one’s own creation of a dangerous situation.(2)mens reaA second element of a crime is mens rea. Mens rea refers to an individual’s state of mind when a crime is committed. While actus reus is proven by physical or eyewitness evidence, mens rea is more difficult to ascertain. The jury must determine for itself whether the accused had the necessary intent to commit the act.A lower threshold of mens rea is satisfied when a defendant recognizes an act is dangerous but decides to commit it anyway. This is recklessness. For instance, if Cain tears a gas meter from a wall, and knows this will let flammable gas escape into a neighbor’s house, he could be liable for poisoning. Courts often consider whether the actor did recognise the danger, or alternatively ought to have recognized a danger (though he did not) is tantamount to erasing intent as a requirement. In this way, the importance of mens rea hasbeen reduced in some areas of the criminal law.Wrongfulness of intent also may vary the seriousness of an offense. A killing committed with specific intent to kill or with conscious recognition that death or serious bodily harm will result, would be murder, whereas a killing affected by reckless acts lacking such a consciousness could be manslaughter.(3)CausationThe next element is causation. Often the phrase “but for”is used to determine whether causation has occurred. For example, we might say “Cain caused Abel”, by which we really mean “Cain caused Abel’s death. ”In other words, ‘but for Cain’s act, Abel would still be alive.” Causation, then, means “but for” the actions of A, B would not have been harmed. In criminal law, causation is an element that must be proven beyond a reasonable doubt.(4) Proof beyond a Reasonable DoubtIn view of the fact that in criminal cases we are dealing with the life and liberty of the accused person, as well as the stigma accompanying conviction, the legal system places strong limits on the power of the state to convict a person of a crime. Criminal defendants are presumed innocent. The state must overcome this presumption of innocence by proving every element of the offense charged against the defendant beyond a reasonable doubt to thesatisfaction of all the jurors. This requirement is the primary way our system minimizes the risk of convicting an innocent person.The state must prove its case within a framework of procedural safeguards that are designed to protect the accused. The state’s failure to prove any material element of its case results in the accused being acquitted or found not guilty, even though he or she may actually have committed the crime charged.3. Strict LiabilityIn modern society, some crimes require no more mens rea, and they are known as strict liability offenses. For in stance, under the Road Traffic Act 1988 it is a strict liability offence to drive a vehicle with an alcohol concentration above the prescribed limit.Strict liability can be described as criminal or civil liability notwithstanding the lack mens rea or intent by the defendant. Not all crimes require specific intent, and the threshold of culpability required may be reduced. For example, it might be sufficient to show that a defendant acted negligently, rather than intentionally or recklessly.1. 概述刑法是规定什么试犯罪,有关犯罪嫌疑人之逮捕、起诉及审判,及对已决犯处以何种刑罚的部门法。

外文文献及外文翻译 1

外文文献及外文翻译 1

The Stereo Garage1.1 An overview of the stereo garageVehicles parked nowhere is the problem of the urban social, economic and transport development to a certain extent the result, Garage Equipment development in foreign countries, especially in Japan nearly 30-40 years. Whether technically or in terms of experience had been a success. China is also in the beginning of the 1990s developed mechanical parking equipment, which was 10 years in the past. Because a lot of new residents in the district with the ratio of 1:1. To address the size of parking spaces for tenants and business areas contradictions 3D mechanical parking equipment with an average size of a small motorcycle's unique characteristics, the majority of users have been accepted.Compared with the traditional natural underground garage, Machinery garage demonstrates its superiority in many respects. First, the mechanical garage has a prominent section of superiority. Past due to the underground garage must elapse enough lanes, the average car will occupy an area of 40 square meters, If the use of double-mechanical garage, which would enable ground to improve the utilization rate of around 80% to 90%, If using ground multi-storey (21 storey), three-dimensional garage, 50 square meters of land area will be placed on the 40 cars, which can greatly save the limited land resources, Civil and save development costs.To underground garage, Mechanical garage can be more effective to ensure personal and vehicle safety in the garage or car kept prospective location, the entire electronic control equipment would not operate. It should be said that the mechanical garage from the management can do a thorough separation of people and vehicles.In the underground garage using mechanical parking, it also can remove the heating ventilation; therefore, Operation of the power consumption than workers in the management of underground garage is much lower. Mechanical garage don't usually do complete system, but as a single machine containers. This will give full play to its small space, the advantages of decentralized, Each of the residential areas or groups downstairs to make a complete circuit can be set up random mechanicalparking building. This garage of the district can solve the shortage of parking difficulty in providing convenient conditions right now.Currently, three-dimensional garage mainly in the following forms: lifting and transferring,aisle stacking garage, vertical garage, vertical cycle, box-level cycle, the level of circulating round.1.1.1 Lifting and transferringLifting and transferring Garage modular design, each module can be designed into two, three, four levels, the five-story, semi-submerged in various forms, such as the number of parking spaces from a few to hundreds. Three-dimensional garage applies to the ground and underground car parks, configuration flexibility and cost is low.1. Product features:1) Save land, the configuration flexibility, and shorter construction period.2) Low prices, firefighting and exterior decoration, with a total investment on small foundations.3) Use automatic control, simple structure, safe and reliable.4) Access to a quick, short waiting time.5) Run a smooth, low noise.6) Applies to commercial, offices, and residential quarters supporting the use of car parks.2. Safety devices: anti-dropping device, a photoelectric sensor, spacing protectors, emergency stop switch.1.1.2 Aisle stacking garageAisle stacking garage used as a stacking machine tool access vehicles. All vehicles are stacking machine access, so the technical requirements for stacker higher, a single stacker cost is higher. So aisle stacking apply to the parking garage needs a few more customers.1.1.3 Vertical GarageVertical Garage Elevator similar to the principle that both sides of the hoist layout spaces. Generally need a ground vehicle rotary tables can be saved by the driver away. Vertical Garage generally higher high (tens of meters), safety equipment, Installation precision machining requirements are very high, high cost, but has the smallest area.1.1.4 Vertical cycleProduct features:1) covers an area of small; two berths area can stop 6-10 vehicles.2) The decoration can be added only roof, fire hydrants available.3) Low prices, foundation, external decoration, fire and other small investment, short construction periods.4) Use automatic control, safe and reliable operation.2.2.1 The stereo garage automatic control systemThe modern large-scale building mainstream is intelligent mansion and community. So, automated parking equipment or garage automatic control system will become intelligent mansion and an important part of community. Simple, fast, easy to use, safe, reliable, and less maintenance, to provide users with a safe, easy to use environment, This is auto-parking feature of the basic equipment. All parking equipment operating conditions, vehicles parked in time, vehicle storage Malaysia, garage storage capacity. Vehicles kept high and low peaks, and other information can be transmitted through the network of intelligent control center through intelligent control center operator, and the broadcasting system and the management office of the Division linked related to early release control, management information, thus achieving all the intelligent management. Building and the Community through the intelligent control of the center could also associate with social networking functions. Information released to the collection coming out or expands utilization of the garage social and economic benefits. This will be the automation of the development direction of the garage. Solid Garage automation control system include the following five major subsystems: automatic toll collection management system automatic access systems for remote diagnosis system, automatic Gate, control security system.Subsystems are more unified control of the central control room, for customers planning Garage form of management, Published garage inventory capacity, traffic control program.2.1.1 Automatic Toll Management SystemAutomatic charge adopts contactless IC card. IC card points long-term card and the stored-card. For fixed users, the issue of long-term cards, the cost of fixed users pays management fees paid together; on the temporary users, issue stored-value cards, namely: the user feespaid cards exist within each parking card reader automatically deducted from the cost.2.1.2 Automatic vehicle access systemAutomatic vehicle access system is generally controlled by small PLC. Including the identification card number and mobile disc contains two cars process. Users enter the garage at the entrance to Swiping cards, reader data automatically transmitted to the PLC control system, PLC system through the judgment card number and automatically set the corresponding site mobile trucks and vehicles to the handover location, the garage door opened, shorten the time access to cars. Truck drivers light signals in accordance with the guidelines created only when vehicles parked in a safe location, Parking will be normal light-Kai. Access car after the completion of the garage doors shut down automatically. Mobile site contains car, the system in strict accordance with the various signal detection mobile state, including long signal detection, Detection in place, the position detection limit, officers hit detection, emergency stop signal detection. If cars are running plate is not in place or vehicle length in excess of the permitted length of the garage, all vehicles disc will contain no action, If detected emergency stop signal to stop all action until the emergency stop signal disappeared. Above signals are hardware signals, in addition, the software can also be installed to control signal protection, such as the protection of the time, to ensure that the damage due to hardware failure to signal equipment and the main guarantee for the safety of vehicles.2.1.3 Remote diagnosis systemControllers can spot card, hubs and other network equipment and control center connected to the LAN, MODEN through remote management, monitoring the operation of the scene, when the scene failure, in the control center can be addressed to facilitate the management, e-office security personnel.2.1.4 Automatic GateIn the garage entrance of the no-contact reader, and the Gate of coil users in the garage entrances Swiping cards, the system automatically discriminates validity of the card, if valid, the Gateopen automatically, through induction coils, Automatic self-closing fence; If invalid, the Gate is not open, and sound and light alarm.2.1.5 Monitoring security systemMonitoring security system is in the central control room for monitoring and controlling the operation of the garage scene conditions. It has motion detection, license plate recognition, network connections, different types of alarm systems linkage, and other functions, can be achieved unguarded.System catalog:Video monitoring function : the garage entrances, and the duty, the main segments within the garage installation focusing cameras, On the larger spaces installation spherical platforms, in order to achieve all-round garage on real-time monitoring. If the garage light conditions of the poor would use black-and-white cameras.Motion Detection functions: setting up the night in the garage of motion detection region, detecting when there are a moving target, Motion Detection and Alarm function remind staffs.LPR functions: it can set up the garage light vehicle license plates, vehicle. When the light vehicles entering the garage regional surveillance, the system automatically cross-referenced with images of a very odd situation, issued a warning signal and automatic switching and record their images.Alarm linkage functions: all can move even the police mainframe, if activated Relay acousto-optic warning issued notice of security personnel to voluntarily disarm Gate interception of vehicular access.Digital video functions : it with a continuous record of what happened in the garage, can be synchronized intervals over images arbitrary choice of the overall image to enlarge and local amplification, recording, playback, backup can be conducted all kinds of information.Reportedly, has begun an increasing number of residential quarters began to use a mechanical garage. Taking into account the cost and maintenance, the majority of the district is a multi-storey lifting and transferring parking equipment, mass storage mechanical garage also rarely. Lifting and transferring Garage Equipment parking flow indicate the following:1、The sense of light yellow instructions garage operationRed lamp was ongoing operating instructions, please wait; Green light is currently no operating instructions, can operate; yellow light instructions were to fail, the garage can not work.2、The operationDrivers of vehicles enter from the garage entrance. At the entrance of non-contact sensors Reader former regional shaken following their IC cards, induction process completed, the fence automatically rises driver drove into the garage. The fence shut down automatically after vehicles entering. Card is the controller to read spaces, corresponding to the parking garage containing cars moved to the site automatically transfer vehicle location, Automatic garage door open units. Car drivers entering and parking in place, Latin hand brake, alighted out of the garage, using IC cards in the garage exit Huang about IC cards Garage door modules to shut down automatically. Completed deposit truck operators.3、Collect the car operationDrivers entering the garage at the entrance to the non-contact sensors Reader former regional shaken following their IC cards Controller automatically read spaces, corresponding to the parking garage containing cars moved to the site automatically transfer vehicle location, Automatic garage door open modules, drivers entering the garage and drive out, in the garage exit of the automatic reader before induction regional dazzle your own IC cards, sensors finished, the reader receive information, Host controller automatically recorded, prepaid, automatically raising the fence, the driver drove the playing field, appeared after fencing to shut down automatically. Meanwhile, Controller automatically read spaces, corresponding to the garage door unit shut down automatically. Vehicle operation finished.The garage has a complete self-protection device in the course of operation. A series of photoelectric switches, proximity switches, trip switches and other vehicles on site contains accurate operation in place to play a decisive role; falling unique defense installations, broken rope warning device, speeding vehicle protection device to protect the security role played. Detection of long vehicles, vehicle parking is not in place detection, and personnel into a detection signal of vehicles and the safety play a decisive role.翻译立体车库1.1 立体车库概述车辆无处停放的问题是城市的社会、经济、交通发展到一定程度产生的结果,立体停车设备的发展在国外,尤其在日本已有近3040年的历史,无论在技术上还是在经验上均已获得了成功。

儿童教育外文翻译文献

儿童教育外文翻译文献

儿童教育外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:The Role of Parents and Community in the Educationof the Japanese ChildHeidi KnipprathAbstractIn Japan, there has been an increased concern about family and community participation in the child’s educat ion. Traditionally, the role of parents and community in Japan has been one of support and less one of active involvement in school learning. Since the government commenced education reforms in the last quarter of the 20th century, a more active role for parents and the community in education has been encouraged. These reforms have been inspired by the need to tackle various problems that had arisen, such as the perceived harmful elements of society’spreoccupation with academic achievement and the problematic behavior of young people. In this paper, the following issues are examined: (1) education policy and reform measures with regard to parent and community involvement in the child’s education; (2) the state of parent and community involvement at the eve of the 20th century.Key Words: active involvement, community, education reform, Japan, parents, partnership, schooling, supportIntroduction: The Discourse on the Achievement GapWhen western observers are tempted to explain why Japanese students attain high achievement scores in international comparative assessment studies, they are likely to address the role of parents and in particular of the mother in the education of the child. Education mom is a phrase often brought forth in the discourse on Japanese education to depict the Japanese mother as being a pushy, and demanding home-bound tutor, intensely involved in the child’s education due to severe academic competition. Although this image of the Japanese mother is a stereotype spread by the popular mass media in Japan and abroad, and the extent by which Japanese mothers are absorbed in their children is exaggerated (Benjamin, 1997, p. 16; Cummings, 1989, p. 297; Stevenson & Stigler, 1992, p. 82), Stevenson and Stigler (1992) argue that Japanese parents do play an indispensable role in the academic performance of their children. During their longitudinal and cross-national research project, they and their collaborators observed that Japanese first and fifth graders persistently achieved higher on math tests than American children. Besides reciting teacher’s teaching style, cultural beliefs, and organization of schooling, Stevenson and Stigler (1992) mention parent’s role in supporting the learning conditions of the child to explain differences in achievement between elementary school students of the United States and students of Japan. In Japan, children receive more help at home with schoolwork (Chen & Stevenson, 1989; Stevenson & Stigler, 1992), and tend to perform less household chores than children in the USA (Stevenson et al., 1990; Stevenson & Stigler, 1992). More Japanese parents than American parents provide space and a personal desk and purchase workbooks for their children to supplement their regular text-books at school (Stevenson et al., 1990; Stevenson & Stigler, 1992). Additionally, Stevenson and Stigler (1992) observed that American mothers are much more readily satisfied with their child’s performance than Asian parents are, have less realistic assessments of their child’s academic perform ance, intelligence, and other personality characteristics, and subsequently have lower standards. Based on their observation of Japanese, Chinese and American parents, children and teachers, Stevenson and Stigler (1992) conclude that American families can increase the academic achievement of their children by strengthening the link between school and home, creating a physical and psychological environment that is conducive to study, and by making realistic assessments and raising standards. Also Benjamin (1997), who performed ‘day-to-day ethnography’ to find out how differences in practice between American and Japanese schools affect differences in outcomes, discusses the relationship between home and school and how the Japanese mother is involved in the academic performance standards reached by Japanese children. She argues that Japanese parents are willing to pay noticeable amounts of money for tutoring in commercial establishments to improve the child’s performance on entrance examinations, to assist in ho mework assignments, to facilitate and support their children’s participation in school requirements and activities, and to check notebooks of teachers on the child’s progress and other school-related messages from the teacher. These booklets are read and written daily by teachers and parents. Teachers regularly provide advice and reminders to parents, and write about homework assignments of the child, special activities and the child’s behavior (Benjamin, 1997, p. 119, p. 1993–1995). Newsletters, parents’ v isits to school, school reports, home visits by the teacher and observation days sustain communication in later years at school. According toBenjamin (1997), schools also inform parents about how to coach their children on proper behavior at home. Shimahara (1986), Hess and Azuma (1991), Lynn (1988) and White (1987) also try to explain national differences in educational achievement. They argue that Japanese mothers succeed in internalizing into their children academic expectations and adaptive dispositions that facilitate an effective teaching strategy, and in socializing the child into a successful person devoted to hard work.Support, Support and SupportEpstein (1995) constructed a framework of six types of involvement of parents and the community in the school: (1) parenting: schools help all families establish home environments to support children as students; (2) communicating: effective forms of school-to-home and home-to-school communications about school programs and children’s progress; (3) volu nteering: schools recruit and organize parents help and support; (4) learning at home: schools provide information and ideas to families about how to help students at home with homework and other curriculum-related activities, decisions and planning; (5) decision making: schools include parents in school decisions, develop parent leaders and representatives; and (6) collaborating with the community: schools integrate resources and services from the community to strengthen school programs, family practices, and student learning and development. All types of involvement mentioned in studies of Japanese education and in the discourse on the roots of the achievement gap belong to one of Epstein’s first four types of involvement: the creation of a conducive learn ing environment (type 4), the expression of high expectations (type 4), assistance in homework (type 4), teachers’ notebooks (type 2), mother’s willingness to facilitate school activities (type3) teachers’ advice about the child’s behavior (type 1), observ ation days by which parents observe their child in the classroom (type 2), and home visits by the teachers (type 1). Thus, when one carefully reads Stevenson and Stigler’s, Benjamin’s and other’s writings about Japanese education and Japanese students’ high achievement level, one notices that parents’ role in the child’s school learning is in particular one of support, expected and solicited by the school. The fifth type (decision making) as well as the sixth type (community involvement) is hardly ever mentioned in the discourse on the achievement gap.In 1997, the OECD’s Center for Educational Research and Innovation conducted a cross-national study to report the actual state of parents as partners in schooling in nine countries, including Japan. In its report, OECD concludes that the involvement of Japanese parents in their schools is strictly limited, and that the basis on which it takes place tends to be controlled by the teacher (OECD, 1997, p. 167). According to OECD (1997), many countries are currently adopting policies to involve families closely in the education of their children because (1) governments are decentralizing their administrations; (2) parents want to be increasingly involved; and (3) because parental involvement is said to be associated with higher achievement in school (p. 9). However, parents in Japan, where students already score highly on international achievement tests, are hardly involved in governance at the national and local level, and communication between school and family tends to be one-way (Benjamin, 1997; Fujita, 1989; OECD, 1997). Also parent–teacher associations (PTA, fubo to kyoshi no kai ) are primarily presumed to be supportive of school learning and not to participate in school governance (cf. OECD, 2001, p. 121). On the directionsof the occupying forces after the second world war, PTA were established in Japanese schools and were considered with the elective education boards to provide parents and the community an opportunity to participate actively in school learning (Hiroki, 1996, p. 88; Nakata, 1996, p. 139). The establishment of PTA and elective education boards are only two examples of numerous reform measures the occupying forces took to decentralize the formal education system and to expand educational opportunities. But after they left the country, the Japanese government was quick to undo liberal education reform measures and reduced the community and parental role in education. The stipulation that PTA should not interfere with personnel and other administrative tasks of schools, and the replacement of elective education boards by appointed ones, let local education boards believe that parents should not get involved with school education at all (Hiroki, 1996, p. 88). Teachers were regarded to be the experts and the parents to be the laymen in education (Hiroki, 1996, p. 89).In sum, studies of Japanese education point into one direction: parental involvement means being supportive, and community involvement is hardly an issue at all. But what is the actual state of parent and community involvement in Japanese schools? Are these descriptions supported by quantitative data?Statistics on Parental and Community InvolvementTo date, statistics of parental and community involvement are rare. How-ever, the school questionnaire of the TIMSS-R study did include some interesting questions that give us a clue about the degree of involvement relatively compared to the degree of involvement in other industrialized countries. The TIMSS-R study measured science and math achievement of eighth graders in 38 countries. Additionally, a survey was held among principals, teachers and students. Principals answered questions relating to school management, school characteristics, and involvement. For convenience, the results of Japan are only compared with the results of those countries with a GNP of 20650 US dollars or higher according to World Bank’s indicators in 1999.Unfortunately, only a very few items on community involvement were measured. According to the data, Japanese principals spend on average almost eight hours per month on representing the school in the community (Table I). Australian and Belgian principals spend slightly more hours and Dutch and Singaporean principals spend slightly less on representing the school and sustaining communication with the community. But when it comes to participation from the community, Japanese schools report a nearly absence of involvement (Table II). Religious groups and the business community have hardly any influence on the curriculum of the school. In contrast, half of the principals report that parents do have an impact in Japan. On one hand, this seems a surprising result when one is reminded of the centralized control of the Ministry of Education. Moreover, this control and the resulting uniform curriculum are often cited as a potential explanation of the high achievement levels in Japan. On the other hand, this extent of parental impact on the curriculum might be an indicator of the pressure parents put on schools to prepare their children appropriately for the entrance exams of senior high schools.In Table III, data on the extent of other types of parental involvement in Japan and other countries are given. In Japan, parental involvement is most common in case of schools volunteering for school projects and programs, and schools expecting parents to make sure that thechild completes his or her homework. The former is together with patrolling the grounds of the school to monitor student behavior most likely materialized through the PTA. The kinds and degree of activities of PTA vary according to the school, but the activities of the most active and well-organized PTA’s of 395 elementary schools investigated by Sumida (2001)range from facilitating sport and recreation for children, teaching greetings, encouraging safe traffic, patrolling the neighborhood, publishing the PTA newspaper to cleaning the school grounds (pp. 289–350). Surprisingly, less Japanese principals expect from the parents to check one’s child’s completion of homework than principals of other countries. In the discourse on the achievement gap, western observers report that parents and families in Japan provide more assistance with their children’s homework than parents and families outside Japan. This apparent contradiction might be the result of the fact that these data are measured at the lower secondary level while investigations of the roots of Japanese students’ high achievement levels focus on childhood education and learning at primary schools. In fact, junior high school students are given less homework in Japan than their peers in other countries and less homework than elementary school students in Japan. Instead, Japanese junior high school students spend more time at cram schools. Finally, Japanese principals also report very low degrees of expectations toward parents with regard to serving as a teacher aid in the classroom, raising funds for the school, assisting teachers on trips, and serving on committees which select school personnel and review school finances. The latter two items measure participation in school governance.In other words, the data support by and large the descriptions of parental of community involvement in Japanese schooling. Parents are requested to be supportive, but not to mount the territory of the teacher nor to be actively involved in governance. Moreover, whilst Japanese principals spend a few hours per month on communication toward the community, involvement from the community with regard to the curriculum is nearly absent, reflecting the nearly absence of accounts of community involvement in studies on Japanese education. However, the reader needs to be reminded that these data are measured at the lower secondary educational level when participation by parents in schooling decreases (Epstein, 1995; OECD, 1997; Osakafu Kyoiku Iinkai, unpublished report). Additionally, the question remains what stakeholders think of the current state of involvement in schooling. Some interesting local data provided by the Osaka Prefecture Education Board shed a light on their opinion.ReferencesBenjamin, G. R. (1997). Japanese lessons. New York: New York University Press.Cave, P. (2003). Educational reform in Japan in the 1990s: ‘Individuality’ and other uncertainties. Comparative Education Review, 37(2), 173–191.Chen, C., & Stevenson, H. W. (1989). Homework: A cross-cultural examination. Child Development, 60(3), 551–561.Chuo Kyoiku Shingikai (1996). 21 seiki o tenbo shita wagakuni no kyoiku no arikata ni tsu-ite [First Report on the Model for Japanese Education in the Perspective of theCummings, W. K. (1989). The American perception of Japanese parative Education, 25(3), 293–302.Epstein, J. L. (1995). School/family/community partnerships. Phi Delta Kappan , 701–712.Fujita, M. (1989). It’s all mother’s fault: childcare and the socialization of working mothers in Japan. The Journal of Japanese Studies , 15(1), 67–91.Harnish, D. L. (1994). Supplemental education in Japan: juku schooling and its implication. Journal of Curriculum Studies , 26(3), 323–334.Hess, R. D., & Azuma, H. (1991). Cultural support for schooling, contrasts between Japanand the United States. Educational Researcher , 20(9), 2–8, 12.Hiroki, K. (1996). Kyoiku ni okeru kodomo, oya, kyoshi, kocho no kenri, gimukankei[Rights and duties of principals, teachers, parents and children in education. InT. Horio & T. Urano (Eds.), Soshiki toshite no gakko [School as an organization](pp. 79–100). Tokyo: Kashiwa Shobo. Ikeda, H. (2000). Chiiki no kyoiku kaikaku [Local education reform]. Osaka: Kaiho Shup-pansha.Kudomi, Y., Hosogane, T., & Inui, A. (1999). The participation of students, parents and the community in promoting school autonomy: case studies in Japan. International Studies in Sociology of Education, 9(3), 275–291.Lynn, R. (1988).Educational achievement in Japan. London: MacMillan Press.Martin, M. O., Mullis, I. V. S., Gonzalez, E. J., Gregory, K. D., Smith, T. A., Chrostowski,S. J., Garden, R. A., & O’Connor, K. M. (2000). TIMSS 1999 Intern ational science report, findings from IEA’s Repeat of the Third International Mathematics and ScienceStudy at the Eight Grade.Chestnut Hill: The International Study Center.Mullis, I. V. S., Martin, M. O., Gonzalez, E. J., Gregory, K. D., Garden, R. A., O’Connor, K. M.,Chrostowski, S. J., & Smith, T. A.. (2000). TIMSS 1999 International mathemat-ics report, findings from IEA’s Repeat of the Third International Mathematics and Science Study at the Eight Grade.Chestnut Hill: The International Study Center. Ministry of Education, Science, Sports and Culture (2000).Japanese government policies in education, science, sports and culture. 1999, educational reform in progress. Tokyo: PrintingBureau, Ministry of Finance.Monbusho Ed. (1999).Heisei 11 nendo, wagakuni no bunkyoshisaku : Susumu kaikaku [Japanese government policies in education, science, sports and culture 1999: Educational reform in progress]. Tokyo: Monbusho.Educational Research for Policy and Practice (2004) 3: 95–107 © Springer 2005DOI 10.1007/s10671-004-5557-6Heidi KnipprathDepartment of MethodologySchool of Business, Public Administration and TechnologyUniversity of Twente P.O. Box 2177500 AE Enschede, The Netherlands译文:家长和社区在日本儿童教育中的作用摘要在日本,人们越来越关心家庭和社区参与到儿童教育中。

外文文献翻译格式

外文文献翻译格式

外文文献翻译格式
外文文献翻译格式一般需包括以下内容:
1. 文献翻译的题目:对外文文献的标题进行翻译,并在翻译后的题目前加上“外文文献翻译:”。

2. 文献的出处:包括外文文献的作者名称、文献标题、原文出版信息等。

3. 翻译的正文:按照文章的段落,将外文文献逐段翻译成中文。

在翻译的文本前后加上序号,以示区分。

4. 翻译的语言风格:外文文献翻译应注重语言风格的保持。

翻译时要根据文章的风格,选择适当的中文表达方式,保持原文的句子结构和词汇用法。

5. 原文和译文对照:将原文和译文对照排列,方便读者对照阅读。

可以将原文和译文分别排列在左右两栏中,或者将原文和译文分别放在不同的页面上,便于对照阅读。

6. 翻译中的注释:如果有部分内容翻译困难或有待解释的地方,在翻译文中添加注释。

注释的格式一般为在译文后面加上方括号,括号内的文字为注释内容。

7. 译者的信息:在文献翻译末尾一般会加上译者的姓名,并注明译者的专业领域或者工作单位。

总之,外文文献翻译格式需要将原文翻译成中文,保持原文的结构和风格,并加上适当的注释和对照,方便读者阅读和理解。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

苯多羧酸在水中的溶解度Alexander Apelblat a,*, Emanuel Manzurola a, Nazmia Abo Balal ba Department of Chemical Engineering, Ben Gurion University of the Negev, P.O. Box 653, Beer Sheva 84105, Israelb Negev Academic College of Engineering, Beer Sheva, IsraelReceived 30 May 2005; received in revised form 14 July 2005; accepted 14 July 2005.Available online 26 August 2005摘要对所有的苯多羧酸进行了讨论,包括实验得到的数据(苯甲酸,对苯二甲酸,偏苯酸,1,3,5-苯三酸和1,2,4,5-苯四酸)和从文献确定的数据(苯甲酸,邻苯二甲酸,间苯二甲酸,对苯二甲酸,连苯酸,偏苯酸,1,3,5-苯三酸,1,2,3,5-苯四甲酸,1,2,3,4-苯四甲酸,均苯四甲酸,苯五甲酸和苯六酸)。

这些聚羧酸苯的饱和溶液的表观摩尔焓温度的由溶解度对温度的依赖性确定。

关键词:苯多羧酸、饱和水溶液、摩尔溶解焓1.简介包括12种苯多羧酸:1种一元酸(苯甲酸),三种二元酸{1,2-苯二甲酸(邻苯二甲酸),苯1,3-苯二甲酸(间苯二甲酸)和1,4-苯二甲酸(对苯二甲酸)},三种三元酸{1,2,3-苯三甲酸(连苯三酸),1,2,4-苯三甲酸(偏苯三酸),以及1,3,5-苯三甲酸(均苯三酸)},三种四元羧酸{1,2,3,4-苯四甲酸(连苯四酸),1,2,3,5-苯四甲酸(偏苯四酸)和1,2,4,5-苯四甲酸(均苯四酸)},一种五元酸(苯五羧酸),和一种六元酸(苯六羧酸酸)。

低羧酸苯(特别是苯甲酸和邻苯二甲酸)被大量生产,它们的各种酯衍生物作为树脂,增塑剂,染料,油墨,粘合剂,生物碱溶液,药物(抗真菌)助剂以及脂肪和果汁的食品保鲜中间体[1-5]。

超纯苯甲酸作为滴定和热量实验的标准,比起苯多羧酸有着更重要的市场。

然而,因为它们是由石墨,煤,木材木质素和类似材料的急剧氧化形成,它们具有地球化学和生态学意义,由于有毒金属苯多配位体形成不利于自然环境的水资源[6]。

苯多羧酸在水中的溶解度随着温度的函数显著变化。

通常,溶解度小,即使非常小的对苯二甲酸,溶解度的准确性在不同的实验之间的也是不同的[7-9]。

它是从最近制定的有机化合物在水中的溶解度表(Yalkovsky和He [9]),而且只有苯甲酸和邻苯二甲酸的溶解度数据可查清楚,不太注意其他苯多羧酸,其中所述的溶解度是在分离程序的情况下的一个或几个温度测定一次。

所有这里提到的调查中,只考虑两类饱和溶液的固液相平衡(Ward和Cooper[10]苯甲酸和苯二甲酸; Yukhno和Bikkulov[11]所有12种苯多羧酸都是他们准备的)。

在温度范围T = 273.15 K至T = 323.15 K,他们推测,苯甲酸,异构体的邻苯二羧酸,偏苯三酸,连苯四酸和苯六甲酸的晶体是无水的,连苯三酸和均苯四酸存在二水合物,均苯三酸是一水合物,偏苯四酸和苯五羧酸形成固态水合物。

由于Yukhno和Bikkulov的研究是不容易的,他们的研究成果值得一提,偏苯四酸三水合物改变为二水合物的温度约为T = 274.04 K,变无水的温度要大于T = 315.10 K;苯五羧酸由五水合物变为三水合物温度在T= 285.40 K,成为一水合物温度要大于T = 305.85 K。

这两种酸极易形成亚稳态过饱和溶液。

本文研究了可商购苯多羧酸的溶解度。

为了讨论的完整性,先前论述的多羧酸苯的溶解度[7-12,15-24]也包括在分析中,以得到最好的溶解度曲线,同时也对饱和溶液的表观摩尔焓进行了论述。

2.实验苯甲酸的固体样品(质量分数>0.999),对苯二甲酸(质量分数>0.99),偏苯三酸(质量分数>0.99),1,3,5-苯三酸(质量分数>0.97)和均苯四酸(质量分数0.97)由Fluka供应,无需进一步净化。

溶解度实验的过程在别的地方已有详细的描述[13]。

在给定的温度下混合和重力沉降后,称取安息香酸对饱和溶液的样品进行滴定,用NaOH的标准溶液,所报告的结果是三次或四次测定的平均值。

3.结果及讨论苯甲酸,对苯二甲酸,偏苯三酸,1,3,5-苯三酸和1,2,4,5-苯四酸在不同温度下水中的溶解度数据列于表1。

对非电解质在水中的溶解度随温度的变化,M/molÆKG1,由williamson方程[14]表示。

表1苯甲酸(benzoic),对苯二甲酸(terephtalic),偏苯三酸(mellitic),1,3,5-苯三酸(trimesic)和1,2,4,5-苯四酸(pyromelliticacids)在不同温度下水中的溶解度数据其中H表示在水合物大量水分子,Dsolh(T)是溶液的摩尔焓,C2是溶质的活度系数,M1是水的摩尔质量,R是气体常数,m = 1molÆ kg1。

在方程(1),它是假定在饱和点的多羧酸苯的离解小[ 6 ],它们可以被视为非电解质或非电解质水。

在饱和点M附近的活度系数的变化是未知的,因此系数f被统一替换为饱和溶液的表观摩尔焓。

如果假定溶液的焓值线性依赖于温度,方程的积分形式(1)是其中A,B和C是由一个未加权的多变量最小二乘法确定的可调节的系数,R2是回归的平方校正系数。

这些系数被记录在苯多羧酸表2。

本文通过计算并结合文献的溶解度数据,得到可以被视为最好的溶解度曲线。

按照(1)和(2),该溶液在饱和点的表观摩尔焓为:其中h值取自yukhno和bikkulov[ 11 ]。

表2 苯多羧酸溶解度等式的系数A、B和C为了比较不同的溶解度数据,将他们绘制在图1至8。

图1 对苯二甲酸在水中的溶解度随温度变化。

○,参考[2];■,参考[10];●,参考[11];▢,参考[15];□,本实验。

图2邻苯二甲酸在水中的溶解度随温度变化。

○,参考[10];●,参考[11];□,参考[12];▣,参考[16];■,参考[18];▢,参考[24]。

图3间苯二甲酸在水中的溶解度随温度变化。

●,参考[11];▣,参考[17];■,参考[18];○,参考[20];□,参考[21];▢,参考[24]。

图4对苯二甲酸在水中的溶解度随温度变化。

●,参考[11];▢,参考[17];■,参考[18];○,参考[20];▣,参考[21];□,本实验;——方程(2)。

图5连苯三酸在水中的溶解度随温度变化。

●,参考[11];○,参考[17];■,参考[23];□,本实验。

图6均苯三酸在水中的溶解度随温度变化。

●,参考[11];○,参考[17];□,本实验。

图7均苯四酸在水中的溶解度随温度变化。

●,参考[11];□,本实验。

图8苯六甲酸在水中的溶解度随温度变化。

●,参考[11];○,参考[23]。

苯甲酸在文献中被研究了许多次[8],因此这里仅系统性测定的在(273.15至373.15)K的结果,这里考虑[2,7,10,11,15]。

与其他苯多羧酸相比,苯甲酸的溶解度比较高,因而对比各种研究结果可以预计它们之间的关系,这种期望结果可在图1中看出。

苯甲酸,邻苯二甲酸在水中的溶解度是众所周知的[9-12,16-19,24],结果也比较一致(图2)。

邻苯二甲酸比苯甲酸更容易溶解于水中,大大超过其他异构酸,如间苯二甲酸和对苯二甲酸。

间苯二甲酸的情况(图3)很明显,Freidlin和Davidov的结果[20]其他的测量结果大不相同[9,11,17-19,21,24]。

假定他们的溶解度存在恒定的数值误差,因此溶解度曲线应当被移位(可能是由两个因子分割),其中它们在高温部分的溶解度大大低于预期(图3)。

因此在对方程系数的评价(3)将Freidlin和Davidov的结果被排除在外。

对苯二甲酸在水中的溶解度(表1)非常小,从图4中可以看到,不同的作品之间分歧是很大的[11,17,18,20,24]。

所有溶解度有相同的数量级,但其溶解度对温度的依赖是不一致的。

这样的事实说明在低溶解度的情况下,固体分散在液相的分离是特别困难的。

在Yukhno和Bikkulov[11]以及Rathousky'[18]等人的测定中对苯二甲酸的溶解度总是随温度的升高而增大。

但不幸的是,这两组的溶解度结果有很大不同(图4)。

在我们的实验中,溶解度的测定从T = 298.15 K开始上升,Avidova和Khodzhaev[17]、Freidlin和Davidov[20]所述的溶解度支持我们的结果。

Han等人[24]最近又对对苯二甲酸的溶解度做出了相关研究,其结果显示只有在T = 301.45 K以上,其溶解度会随温度明显增加,目前,相比其他多羧酸苯来说,对苯二甲酸的最好溶解度曲线是不准确的(表2和图4)。

连苯三酸在水中的溶解度是由Yukhno和Bikkulov[11]提出的,并且只在两个温度点下,与Avidova和Khodzhaev[17]的研究是一致的。

关于偏苯三酸的溶解度我们的研究结果与Yukhno and Bikkulov[11]以及Tudorovskaya等人[22]等人的研究结果是十分吻合的,但是,Avidova和Khodzhaev[17]两个人的溶解度数据比所有其他结果都要低(图5),它们溶解度曲线的计算被略去(表2)。

均苯三酸与偏苯三酸在水中的溶解度是相似的(表1),将Yukhno和Bikkulov[11],Avidova和Khodzhaev[17]的数据与我们的数据进行了比较,由图6可以看出,这三组数据走势相似。

但我们的溶解度数据都比Yukhno和Bikkulov 的高。

从Avidova和Khodzhaev测定的两点溶解度来看,其中有一点支持Yukhno 和Bikkulov的结果,而另一个点支持我们的结果(图6)。

均苯三酸的所有溶解度都使用在(2)的方程系数的计算中,R 2比以前认为的明显小得多。

从Yukhno和Bikkulov调查[11]可知,偏苯四酸,连苯四酸和苯五羧酸在水中的溶解度温度范围为(273.15至323.15)K。

根据他们的结论,偏苯四酸在固相中存在三水合物和二水合物的形式,苯五羧酸存在五水合物,三水合物和一水合物的形式。

这两种酸很容易形成过饱和溶液。

实际上,它们的溶解度在这里由一个公式(表2)表示,包括不同的水合物形式。

除了Yukhno和Bikkulov[11]的结果,我们测定的均苯四酸在水中的溶解度(表1)和其余两组溶解度数据具有良好的一致性(图7)。

相关文档
最新文档