外文参考文献下载

合集下载

建筑施工质量管理体系外文翻译参考文献

建筑施工质量管理体系外文翻译参考文献

建筑施工质量管理体系外文翻译参考文献1. GB/T -2016 英文名称:Quality management systems--Requirements《质量管理体系要求》2. GB/T -2016 英文名称:Quality management systems--Guidelines for the application of ISO 9001:2015《质量管理体系应用指南》3. GB -2013 英文名称:Code for construction quality acceptance of building engineering《建筑工程质量验收规范》4. GB -2011 英文名称:Code for acceptance of constructional quality of masonry engineering《砌体工程施工质量验收规范》5. GB -2010 英文名称:Code for design of concrete structures《混凝土结构设计规范》6. GB -2013 英文名称:Standard for building drawing standardization《建筑施工图件编制规范》7. GB -2001 英文名称:Code for acceptance of construction quality of pile foundation engineering《桩基工程施工质量验收规范》8. /T 11-2017 英文名称:Technical specification for concrete structure of tall building《高层建筑混凝土结构技术规范》9. 63-2013 英文名称:Technical specification for strengthening of building structures using carbon fiber reinforced plastics 《建筑结构加固碳纤维布增强复合材料技术规范》10. 81-2002 英文名称:Technical specification for application of sprayed mortar in building construction and acceptance of quality 《建筑喷涂砂浆工程施工及质量验收技术规定》。

英文论文(外文文献)翻译成中文的格式与方法

英文论文(外文文献)翻译成中文的格式与方法

英文论文(外文文献)翻译成中文的格式与方法英文论文(外文文献)翻译成中文的格式与方法本文关键词:外文,英文,中文,翻译成,文献英文论文(外文文献)翻译成中文的格式与方法本文简介:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找英文论文(外文文献)翻译成中文的格式与方法本文内容:在撰写毕业设计(论文)或科研论文时,需要参考一些相关外文文献,了解国外的最新研究进展,这就需要我们找到最新最具代表性的外文文献,进行翻译整理,以备论文写作时参考,外文文献中英文文献占绝大多数,因此英文论文准确的翻译成中文就显得尤为重要!一、外文文献从哪里下载1、从知网国际文献总库中找,该数据库中包含14,000多家国外出版社的文献,囊括所有专业的英文文献资料。

2、一些免费的外文数据库或网站,为了方便大家查找,编者整理成文档供大家下载:国外免费文献数据库大全下载3、谷歌学术检索工具,检索时设置成只检索英文文献,键入与专业相关的关键词即可检索。

二、英文论文翻译格式与要求翻译的外文文献的字符要求不少于1.5万(或翻译成中文后至少在3000字以上)。

字数达到的文献一篇即可。

翻译的外文文献应主要选自学术期刊、学术会议的文章、有关着作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。

并在每篇中文译文首页用"脚注"形式注明原文作者及出处,中文译文后应附外文原文。

需认真研读和查阅术语完成翻译,不得采用翻译软件翻译。

中文译文的编排结构与原文同,撰写格式参照毕业论文的格式要求。

参考文献不必翻译,直接使用原文的(字体,字号,标点符号等与毕业论文中的参考文献要求同),参考文献的序号应标注在译文中相应的地方。

外文参考文献

外文参考文献

[1]G. Einsele a, SK. Chough b, T. Shiki,1996. Depositional events and their records-an introduction[J].Sedimentary Geology, 104:l-9.[2]Kauffman E.G.,Elder W.P. and Sageman B.B..High-resolution correlation: a new tool in chronostratigraphy. In: Einsele et al. (Editor), Cycle and Events in Stratigraphy. Springer-Verlag, Berlin, Heidelberg, 1991,798-819.[3]Bruce C. Heezen, D.B. Ericson, Maurice Ewing.Further evidence for a turbidity current following the 1929 Grand banks earthquake[J].Deep Sea Search.1954,1(4):193-202.[4]Cita and Lucchi.Marine Geology[J].Seismicity and sedimentation.1984, 55(1-2):VII–X.[5]Frank R Ettensohn,Carlton E Brett. Stratigraphic evidence from the Appalachian Basin for continuation of the Taconian orogeny into Early Silurian time[J]. Physics and Chemistry of the Earth.2002,27(1): 279-288.[6]Fabrizio Storti, Paola Vannucchi.Preface[J].Sedimentary Geology.2007,196(1-4):1-3.[7]R. Bernhart Owen;Robin W. Renaut and Michael G. te Miocene lacustrine sedimentation in the Mytilinii Basin, Samos Island, Greece[J].Journal of Paleolimnology.2011,46(1):151-166.[8]DengWeidong, YangBaoguo, WuXiaogen. 1997. Studies of storm deposits in China:a review. Continental Shelf Research, 17(13): 1645-1658.[9]H.N. Bhattacharya, Biplab Bhattacharya, Indranil Chakraborty, Abhijit Chakraborty.Sole marks in storm event beds in the Permo-Carboniferous Talchir Formation, Raniganj Basin, India[J].Sedimentary Geology.2004, 166(3-4):209–222. [10]Shu Degan , Conway Morris S , Zhang Xingliang .A Pikaialike chordate from the Lower Cambrian of China[J]. Nature.1996a,384 : 156 -157.[10]Shu Degan, Conway Morris S, Zhang Xingliang, et al.. A pipiscid-like fossil from the Lower Cambrian of South China[J]. Nature, 1999a,400: 746 -749.[11]Becker L, Poreda R J, Hunt A G, et al . . Impact event at the Permian-Triassicboundary: Evidence from extraterrestrial noble gases in fullerenes[J]. Science, 2001, 291 (5508): 1530-1533.[12]Bambach R K. . Phanerozoic biodiversity mass extinctions[J]. Annu Rev Earth Planet Sci..2006, 34: 127-155.[13]Alvarez L W, Alvarez W, Asaro F, et al.. Extraterrestrial Cause for the Cretaceous-Tertiary Extinction[J]. Science.1980,208: 1095-1108.[14]Wolfgang Stinnesbeck, Gerta Keller, Peter Schulte, Doris Stüben, Zsolt Berner, Utz Kramar, JoséGuadalupe Lopez-Oliva.The Cretaceous–Tertiary (K/T) boundary transition at Coxquihui, state of Veracruz, Mexico: evidence for an early Danian impact event?[J]Journal of South American Earth Sciences .2002,15 (5) :497–509. [15]S. J. Nichols and S. G. Hagemann[16]P. Farrimond, G. Eglinton, S.C. Brassell, H.C. Jenkyns.The Toarcian black shale event in northern Italy[J].Organic Geochemistry.1988,13(4-6):823-832.[17]Röhl, Hans-Joachim;Schmid-Röhl, Annette;Oschmann, Wolfgang;Frimmel, Andreas.Erratum to “The Posidonia Shale (Lower Toarcian) of SW-Germany: an oxygen-depleted ecosystem controlled by sea level and palaeoclimate”[J].Palaeogeography, Palaeoclimatology, Palaeoecology.2001,169(3-4):271.[18]Anthony S. Cohen;Angela L. Coe and David B. Kemp.The Late Palaeocene–Early Eocene and Toarcian (Early Jurassic) carbon isotope excursions: a comparison of their time scales, associated environmental changes, causes and consequences[J].Journal of the Geological Society.2007,164(6):1093-1108.[19]Bryony A. Caswell;Angela L. Coe;Anthony S. Cohen.New range data for marine invertebrate species across the early Toarcian (Early Jurassic) mass extinction[J].Journal of the Geological Society.2009,166(5):859-872.[20]Mattioli[21]Suan[22]Hoffman P F, Li Zhengxiang. A palaeogeographic context for Neoproterozoic glaciation[J]. Palaeogeogrpahy.2009,277: 158-172.[23Ramzi Gharsalli, Taher Zouaghi, Mohamed Soussi, Riadh Chebbi, Sami Khomsi, Mourad Bédir.Seismic sequence stratigraphy of Miocene deposits related to eustatic,tectonic and climatic events, Cap Bon Peninsula, northeastern Tunisia[J].Comptes Rendus Geoscience.2013,345(9-10):401-417.[24]Yuzhu Zhang;Chun Chang Huang;Jiangli Pang;Xiaochun Zha;Yali Zhou;Xiaqing Wang.Holocene palaeoflood events recorded by slackwater deposits along the middle Beiluohe River valley, middle Yellow River basin, China[J].Boreas.2015,44(1):127-138.[25]Keim[26]Hornung[27]David Z. Piper.Rare earth elements in the sedimentary cycle: A summary[J].Chemical Geology.1974,14(4):285-304.[28]Mclennan S M. 1989. Rare earth elements in sedimentary rocks: influence of provenance and sedimentary processes. In: Lipin B R, Mckay G R, eds. Geochemistry and mineralogy of rare earth elements. Reviews in Mineralogy, 21: 169-200.[29]Mclennan S M, Hemming S, McDanial D K, et al.. Geochemical approaches to sedimentation, provenance, and tectonics[J]. Geological Society of American Special Paper.1993,284: 21-40.[30]Bhatia M R..Plate tectonics and geochemical composition of sandstones[J].Journal of Geology, 1991,91:611-629.。

云计算外文翻译参考文献

云计算外文翻译参考文献

云计算外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)原文:Technical Issues of Forensic Investigations in Cloud Computing EnvironmentsDominik BirkRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyRuhr-University BochumHorst Goertz Institute for IT SecurityBochum, GermanyAbstract—Cloud Computing is arguably one of the most discussedinformation technologies today. It presents many promising technological and economical opportunities. However, many customers remain reluctant to move their business IT infrastructure completely to the cloud. One of their main concerns is Cloud Security and the threat of the unknown. Cloud Service Providers(CSP) encourage this perception by not letting their customers see what is behind their virtual curtain. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. Cloud Forensics constitutes a new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the cloud, traditional approaches to evidence collection and recovery are no longer practical. This paper focuses on the technical aspects of digital forensics in distributed cloud environments. We contribute by assessing whether it is possible for the customer of cloud computing services to perform a traditional digital investigation from a technical point of view. Furthermore we discuss possible solutions and possible new methodologies helping customers to perform such investigations.I. INTRODUCTIONAlthough the cloud might appear attractive to small as well as to large companies, it does not come along without its own unique problems. Outsourcing sensitive corporate data into the cloud raises concerns regarding the privacy and security of data. Security policies, companies main pillar concerning security, cannot be easily deployed into distributed, virtualized cloud environments. This situation is further complicated by the unknown physical location of the companie’s assets. Normally,if a security incident occurs, the corporate security team wants to be able to perform their own investigation without dependency on third parties. In the cloud, this is not possible anymore: The CSP obtains all the power over the environmentand thus controls the sources of evidence. In the best case, a trusted third party acts as a trustee and guarantees for the trustworthiness of the CSP. Furthermore, the implementation of the technical architecture and circumstances within cloud computing environments bias the way an investigation may be processed. In detail, evidence data has to be interpreted by an investigator in a We would like to thank the reviewers for the helpful comments and Dennis Heinson (Center for Advanced Security Research Darmstadt - CASED) for the profound discussions regarding the legal aspects of cloud forensics. proper manner which is hardly be possible due to the lackof circumstantial information. For auditors, this situation does not change: Questions who accessed specific data and information cannot be answered by the customers, if no corresponding logs are available. With the increasing demand for using the power of the cloud for processing also sensible information and data, enterprises face the issue of Data and Process Provenance in the cloud [10]. Digital provenance, meaning meta-data that describes the ancestry or history of a digital object, is a crucial feature for forensic investigations. In combination with a suitable authentication scheme, it provides information about who created and who modified what kind of data in the cloud. These are crucial aspects for digital investigations in distributed environments such as the cloud. Unfortunately, the aspects of forensic investigations in distributed environment have so far been mostly neglected by the research community. Current discussion centers mostly around security, privacy and data protection issues [35], [9], [12]. The impact of forensic investigations on cloud environments was little noticed albeit mentioned by the authors of [1] in 2009: ”[...] to our knowledge, no research has been published on how cloud computing environments affect digital artifacts,and on acquisition logistics and legal issues related to cloud computing env ironments.” This statement is also confirmed by other authors [34], [36], [40] stressing that further research on incident handling, evidence tracking and accountability in cloud environments has to be done. At the same time, massive investments are being made in cloud technology. Combined with the fact that information technology increasingly transcendents peoples’ private and professional life, thus mirroring more and more of peoples’actions, it becomes apparent that evidence gathered from cloud environments will be of high significance to litigation or criminal proceedings in the future. Within this work, we focus the notion of cloud forensics by addressing the technical issues of forensics in all three major cloud service models and consider cross-disciplinary aspects. Moreover, we address the usability of various sources of evidence for investigative purposes and propose potential solutions to the issues from a practical standpoint. This work should be considered as a surveying discussion of an almost unexplored research area. The paper is organized as follows: We discuss the related work and the fundamental technical background information of digital forensics, cloud computing and the fault model in section II and III. In section IV, we focus on the technical issues of cloud forensics and discuss the potential sources and nature of digital evidence as well as investigations in XaaS environments including thecross-disciplinary aspects. We conclude in section V.II. RELATED WORKVarious works have been published in the field of cloud security and privacy [9], [35], [30] focussing on aspects for protecting data in multi-tenant, virtualized environments. Desired security characteristics for current cloud infrastructures mainly revolve around isolation of multi-tenant platforms [12], security of hypervisors in order to protect virtualized guest systems and secure network infrastructures [32]. Albeit digital provenance, describing the ancestry of digital objects, still remains a challenging issue for cloud environments, several works have already been published in this field [8], [10] contributing to the issues of cloud forensis. Within this context, cryptographic proofs for verifying data integrity mainly in cloud storage offers have been proposed,yet lacking of practical implementations [24], [37], [23]. Traditional computer forensics has already well researched methods for various fields of application [4], [5], [6], [11], [13]. Also the aspects of forensics in virtual systems have been addressed by several works [2], [3], [20] including the notionof virtual introspection [25]. In addition, the NIST already addressed Web Service Forensics [22] which has a huge impact on investigation processes in cloud computing environments. In contrast, the aspects of forensic investigations in cloud environments have mostly been neglected by both the industry and the research community. One of the first papers focusing on this topic was published by Wolthusen [40] after Bebee et al already introduced problems within cloud environments [1]. Wolthusen stressed that there is an inherent strong need for interdisciplinary work linking the requirements and concepts of evidence arising from the legal field to what can be feasibly reconstructed and inferred algorithmically or in an exploratory manner. In 2010, Grobauer et al [36] published a paper discussing the issues of incident response in cloud environments - unfortunately no specific issues and solutions of cloud forensics have been proposed which will be done within this work.III. TECHNICAL BACKGROUNDA. Traditional Digital ForensicsThe notion of Digital Forensics is widely known as the practice of identifying, extracting and considering evidence from digital media. Unfortunately, digital evidence is both fragile and volatile and therefore requires the attention of special personnel and methods in order to ensure that evidence data can be proper isolated and evaluated. Normally, the process of a digital investigation can be separated into three different steps each having its own specificpurpose:1) In the Securing Phase, the major intention is the preservation of evidence for analysis. The data has to be collected in a manner that maximizes its integrity. This is normally done by a bitwise copy of the original media. As can be imagined, this represents a huge problem in the field of cloud computing where you never know exactly where your data is and additionallydo not have access to any physical hardware. However, the snapshot technology, discussed in section IV-B3, provides a powerful tool to freeze system states and thus makes digital investigations, at least in IaaS scenarios, theoretically possible.2) We refer to the Analyzing Phase as the stage in which the data is sifted and combined. It is in this phase that the data from multiple systems or sources is pulled together to create as complete a picture and event reconstruction as possible. Especially in distributed system infrastructures, this means that bits and pieces of data are pulled together for deciphering the real story of what happened and for providing a deeper look into the data.3) Finally, at the end of the examination and analysis of the data, the results of the previous phases will be reprocessed in the Presentation Phase. The report, created in this phase, is a compilation of all the documentation and evidence from the analysis stage. The main intention of such a report is that it contains all results, it is complete and clear to understand. Apparently, the success of these three steps strongly depends on the first stage. If it is not possible to secure the complete set of evidence data, no exhaustive analysis will be possible. However, in real world scenarios often only a subset of the evidence data can be secured by the investigator. In addition, an important definition in the general context of forensics is the notion of a Chain of Custody. This chain clarifies how and where evidence is stored and who takes possession of it. Especially for cases which are brought to court it is crucial that the chain of custody is preserved.B. Cloud ComputingAccording to the NIST [16], cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal CSP interaction. The new raw definition of cloud computing brought several new characteristics such as multi-tenancy, elasticity, pay-as-you-go and reliability. Within this work, the following three models are used: In the Infrastructure asa Service (IaaS) model, the customer is using the virtual machine provided by the CSP for installing his own system on it. The system can be used like any other physical computer with a few limitations. However, the additive customer power over the system comes along with additional security obligations. Platform as a Service (PaaS) offerings provide the capability to deploy application packages created using the virtual development environment supported by the CSP. For the efficiency of software development process this service model can be propellent. In the Software as a Service (SaaS) model, the customer makes use of a service run by the CSP on a cloud infrastructure. In most of the cases this service can be accessed through an API for a thin client interface such as a web browser. Closed-source public SaaS offers such as Amazon S3 and GoogleMail can only be used in the public deployment model leading to further issues concerning security, privacy and the gathering of suitable evidences. Furthermore, two main deployment models, private and public cloud have to be distinguished. Common public clouds are made available to the general public. The corresponding infrastructure is owned by one organization acting as a CSP and offering services to its customers. In contrast, the private cloud is exclusively operated for an organization but may not provide the scalability and agility of public offers. The additional notions of community and hybrid cloud are not exclusively covered within this work. However, independently from the specific model used, the movement of applications and data to the cloud comes along with limited control for the customer about the application itself, the data pushed into the applications and also about the underlying technical infrastructure.C. Fault ModelBe it an account for a SaaS application, a development environment (PaaS) or a virtual image of an IaaS environment, systems in the cloud can be affected by inconsistencies. Hence, for both customer and CSP it is crucial to have the ability to assign faults to the causing party, even in the presence of Byzantine behavior [33]. Generally, inconsistencies can be caused by the following two reasons:1) Maliciously Intended FaultsInternal or external adversaries with specific malicious intentions can cause faults on cloud instances or applications. Economic rivals as well as former employees can be the reason for these faults and state a constant threat to customers and CSP. In this model, also a malicious CSP is included albeit he isassumed to be rare in real world scenarios. Additionally, from the technical point of view, the movement of computing power to a virtualized, multi-tenant environment can pose further threads and risks to the systems. One reason for this is that if a single system or service in the cloud is compromised, all other guest systems and even the host system are at risk. Hence, besides the need for further security measures, precautions for potential forensic investigations have to be taken into consideration.2) Unintentional FaultsInconsistencies in technical systems or processes in the cloud do not have implicitly to be caused by malicious intent. Internal communication errors or human failures can lead to issues in the services offered to the costumer(i.e. loss or modification of data). Although these failures are not caused intentionally, both the CSP and the customer have a strong intention to discover the reasons and deploy corresponding fixes.IV. TECHNICAL ISSUESDigital investigations are about control of forensic evidence data. From the technical standpoint, this data can be available in three different states: at rest, in motion or in execution. Data at rest is represented by allocated disk space. Whether the data is stored in a database or in a specific file format, it allocates disk space. Furthermore, if a file is deleted, the disk space is de-allocated for the operating system but the data is still accessible since the disk space has not been re-allocated and overwritten. This fact is often exploited by investigators which explore these de-allocated disk space on harddisks. In case the data is in motion, data is transferred from one entity to another e.g. a typical file transfer over a network can be seen as a data in motion scenario. Several encapsulated protocols contain the data each leaving specific traces on systems and network devices which can in return be used by investigators. Data can be loaded into memory and executed as a process. In this case, the data is neither at rest or in motion but in execution. On the executing system, process information, machine instruction and allocated/de-allocated data can be analyzed by creating a snapshot of the current system state. In the following sections, we point out the potential sources for evidential data in cloud environments and discuss the technical issues of digital investigations in XaaS environmentsas well as suggest several solutions to these problems.A. Sources and Nature of EvidenceConcerning the technical aspects of forensic investigations, the amount of potential evidence available to the investigator strongly diverges between thedifferent cloud service and deployment models. The virtual machine (VM), hosting in most of the cases the server application, provides several pieces of information that could be used by investigators. On the network level, network components can provide information about possible communication channels between different parties involved. The browser on the client, acting often as the user agent for communicating with the cloud, also contains a lot of information that could be used as evidence in a forensic investigation. Independently from the used model, the following three components could act as sources for potential evidential data.1) Virtual Cloud Instance: The VM within the cloud, where i.e. data is stored or processes are handled, contains potential evidence [2], [3]. In most of the cases, it is the place where an incident happened and hence provides a good starting point for a forensic investigation. The VM instance can be accessed by both, the CSP and the customer who is running the instance. Furthermore, virtual introspection techniques [25] provide access to the runtime state of the VM via the hypervisor and snapshot technology supplies a powerful technique for the customer to freeze specific states of the VM. Therefore, virtual instances can be still running during analysis which leads to the case of live investigations [41] or can be turned off leading to static image analysis. In SaaS and PaaS scenarios, the ability to access the virtual instance for gathering evidential information is highly limited or simply not possible.2) Network Layer: Traditional network forensics is knownas the analysis of network traffic logs for tracing events that have occurred in the past. Since the different ISO/OSI network layers provide several information on protocols and communication between instances within as well as with instances outside the cloud [4], [5], [6], network forensics is theoretically also feasible in cloud environments. However in practice, ordinary CSP currently do not provide any log data from the network components used by the customer’s instances or applications. For instance, in case of a malware infection of an IaaS VM, it will be difficult for the investigator to get any form of routing information and network log datain general which is crucial for further investigative steps. This situation gets even more complicated in case of PaaS or SaaS. So again, the situation of gathering forensic evidence is strongly affected by the support the investigator receives from the customer and the CSP.3) Client System: On the system layer of the client, it completely depends on the used model (IaaS, PaaS, SaaS) if and where potential evidence could beextracted. In most of the scenarios, the user agent (e.g. the web browser) on the client system is the only application that communicates with the service in the cloud. This especially holds for SaaS applications which are used and controlled by the web browser. But also in IaaS scenarios, the administration interface is often controlled via the browser. Hence, in an exhaustive forensic investigation, the evidence data gathered from the browser environment [7] should not be omitted.a) Browser Forensics: Generally, the circumstances leading to an investigation have to be differentiated: In ordinary scenarios, the main goal of an investigation of the web browser is to determine if a user has been victim of a crime. In complex SaaS scenarios with high client-server interaction, this constitutes a difficult task. Additionally, customers strongly make use of third-party extensions [17] which can be abused for malicious purposes. Hence, the investigator might want to look for malicious extensions, searches performed, websites visited, files downloaded, information entered in forms or stored in local HTML5 stores, web-based email contents and persistent browser cookies for gathering potential evidence data. Within this context, it is inevitable to investigate the appearance of malicious JavaScript [18] leading to e.g. unintended AJAX requests and hence modified usage of administration interfaces. Generally, the web browser contains a lot of electronic evidence data that could be used to give an answer to both of the above questions - even if the private mode is switched on [19].B. Investigations in XaaS EnvironmentsTraditional digital forensic methodologies permit investigators to seize equipment and perform detailed analysis on the media and data recovered [11]. In a distributed infrastructure organization like the cloud computing environment, investigators are confronted with an entirely different situation. They have no longer the option of seizing physical data storage. Data and processes of the customer are dispensed over an undisclosed amount of virtual instances, applications and network elements. Hence, it is in question whether preliminary findings of the computer forensic community in the field of digital forensics apparently have to be revised and adapted to the new environment. Within this section, specific issues of investigations in SaaS, PaaS and IaaS environments will be discussed. In addition, cross-disciplinary issues which affect several environments uniformly, will be taken into consideration. We also suggest potential solutions to the mentioned problems.1) SaaS Environments: Especially in the SaaS model, the customer does notobtain any control of the underlying operating infrastructure such as network, servers, operating systems or the application that is used. This means that no deeper view into the system and its underlying infrastructure is provided to the customer. Only limited userspecific application configuration settings can be controlled contributing to the evidences which can be extracted fromthe client (see section IV-A3). In a lot of cases this urges the investigator to rely on high-level logs which are eventually provided by the CSP. Given the case that the CSP does not run any logging application, the customer has no opportunity to create any useful evidence through the installation of any toolkit or logging tool. These circumstances do not allow a valid forensic investigation and lead to the assumption that customers of SaaS offers do not have any chance to analyze potential incidences.a) Data Provenance: The notion of Digital Provenance is known as meta-data that describes the ancestry or history of digital objects. Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud environments, yet it is still a challenging issue today [8]. Albeit data provenance is of high significance also for IaaS and PaaS, it states a huge problem specifically for SaaS-based applications: Current global acting public SaaS CSP offer Single Sign-On (SSO) access control to the set of their services. Unfortunately in case of an account compromise, most of the CSP do not offer any possibility for the customer to figure out which data and information has been accessed by the adversary. For the victim, this situation can have tremendous impact: If sensitive data has been compromised, it is unclear which data has been leaked and which has not been accessed by the adversary. Additionally, data could be modified or deleted by an external adversary or even by the CSP e.g. due to storage reasons. The customer has no ability to proof otherwise. Secure provenance mechanisms for distributed environments can improve this situation but have not been practically implemented by CSP [10]. Suggested Solution: In private SaaS scenarios this situation is improved by the fact that the customer and the CSP are probably under the same authority. Hence, logging and provenance mechanisms could be implemented which contribute to potential investigations. Additionally, the exact location of the servers and the data is known at any time. Public SaaS CSP should offer additional interfaces for the purpose of compliance, forensics, operations and security matters to their customers. Through an API, the customers should have the ability to receive specific information suchas access, error and event logs that could improve their situation in case of aninvestigation. Furthermore, due to the limited ability of receiving forensic information from the server and proofing integrity of stored data in SaaS scenarios, the client has to contribute to this process. This could be achieved by implementing Proofs of Retrievability (POR) in which a verifier (client) is enabled to determine that a prover (server) possesses a file or data object and it can be retrieved unmodified [24]. Provable Data Possession (PDP) techniques [37] could be used to verify that an untrusted server possesses the original data without the need for the client to retrieve it. Although these cryptographic proofs have not been implemented by any CSP, the authors of [23] introduced a new data integrity verification mechanism for SaaS scenarios which could also be used for forensic purposes.2) PaaS Environments: One of the main advantages of the PaaS model is that the developed software application is under the control of the customer and except for some CSP, the source code of the application does not have to leave the local development environment. Given these circumstances, the customer obtains theoretically the power to dictate how the application interacts with other dependencies such as databases, storage entities etc. CSP normally claim this transfer is encrypted but this statement can hardly be verified by the customer. Since the customer has the ability to interact with the platform over a prepared API, system states and specific application logs can be extracted. However potential adversaries, which can compromise the application during runtime, should not be able to alter these log files afterwards. Suggested Solution:Depending on the runtime environment, logging mechanisms could be implemented which automatically sign and encrypt the log information before its transfer to a central logging server under the control of the customer. Additional signing and encrypting could prevent potential eavesdroppers from being able to view and alter log data information on the way to the logging server. Runtime compromise of an PaaS application by adversaries could be monitored by push-only mechanisms for log data presupposing that the needed information to detect such an attack are logged. Increasingly, CSP offering PaaS solutions give developers the ability to collect and store a variety of diagnostics data in a highly configurable way with the help of runtime feature sets [38].3) IaaS Environments: As expected, even virtual instances in the cloud get compromised by adversaries. Hence, the ability to determine how defenses in the virtual environment failed and to what extent the affected systems havebeen compromised is crucial not only for recovering from an incident. Also forensic investigations gain leverage from such information and contribute to resilience against future attacks on the systems. From the forensic point of view, IaaS instances do provide much more evidence data usable for potential forensics than PaaS and SaaS models do. This fact is caused throughthe ability of the customer to install and set up the image for forensic purposes before an incident occurs. Hence, as proposed for PaaS environments, log data and other forensic evidence information could be signed and encrypted before itis transferred to third-party hosts mitigating the chance that a maliciously motivated shutdown process destroys the volatile data. Although, IaaS environments provide plenty of potential evidence, it has to be emphasized that the customer VM is in the end still under the control of the CSP. He controls the hypervisor which is e.g. responsible for enforcing hardware boundaries and routing hardware requests among different VM. Hence, besides the security responsibilities of the hypervisor, he exerts tremendous control over how customer’s VM communicate with the hardware and theoretically can intervene executed processes on the hosted virtual instance through virtual introspection [25]. This could also affect encryption or signing processes executed on the VM and therefore leading to the leakage of the secret key. Although this risk can be disregarded in most of the cases, the impact on the security of high security environments is tremendous.a) Snapshot Analysis: Traditional forensics expect target machines to be powered down to collect an image (dead virtual instance). This situation completely changed with the advent of the snapshot technology which is supported by all popular hypervisors such as Xen, VMware ESX and Hyper-V.A snapshot, also referred to as the forensic image of a VM, providesa powerful tool with which a virtual instance can be clonedby one click including also the running system’s mem ory. Due to the invention of the snapshot technology, systems hosting crucial business processes do not have to be powered down for forensic investigation purposes. The investigator simply creates and loads a snapshot of the target VM for analysis(live virtual instance). This behavior is especially important for scenarios in which a downtime of a system is not feasible or practical due to existing SLA. However the information whether the machine is running or has been properly powered down is crucial [3] for the investigation. Live investigations of running virtual instances become more common providing evidence data that。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the financesector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more i ts “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs, but the recent developments in the finance sector worsen the situation even more.Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to l ending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPME’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70 areas they have room to adapt the Accord to their specific needs when implementing itinto EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs: •The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive,which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, whichstrengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating w ill also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to easetransparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

电子信息工程外文翻译参考文献

电子信息工程外文翻译参考文献

电子信息工程外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)译文:利用修改后的迈克耳孙干涉仪进行长度测量的初步结果摘要:基于飞秒加速器的装置,该装置建造在上海应用物理研究所(SINAP),最近一个经修改后的远红外迈克耳孙干涉仪通过光学自相关方法,已经被用来测量电子光束的长度。

相比较于之前常规的迈克耳孙干涉仪,我们使用一个空心回射器而不是一个平面反射镜的反射镜。

本文将为大家介绍实验设置和长度测量的结果。

关键词:飞秒线性加速器,长度串,干涉仪,空心回射器1 介绍最近关于电子脉冲压缩的实验产生高峰值电流和亮度飞秒电子串。

关于短束源自于高质量光束的潜在应用要求这方面一起了广泛兴趣。

高质量的核物理加速器,自由电子激光器驱动加速器,下一代线性对撞机,第四代光源都需要短时间光束脉冲。

同时,在进程中对诊断的短电子串的研究也起了重要作用。

有几种已经使用或正在开发的方法去测量短电子串的长度。

这些一般分为两类:频域方法和时域方法。

众所周知,在时域测量长度的方法中使用条纹相机,条纹相机已经证实是限于串长度超过200 fs ,此外,条纹相机昂贵并且测量系统复杂。

相对于时域测量方法,频域测量使用相干过渡辐射(CTR )从金属箔在测量飞秒脉冲的短电子中已经显现出前景。

本文我们首先从短电子串方面给出了基于一代的高强度相干渡越辐射的理论和试验研究,然后讨论该方法基于相干渡越辐射测量束飞秒的长度,并从改进电子实验装置给出了串长度测量的结果。

最后,我们分析了空气湿度对串长度测量的影响,并且阐释了对未来研究的计划。

2 理论背景2.1 相干渡越辐射源自于相对论性电子串辐射如同步加速器辐射跃迁辐射等,本质上有较广的范围,如果辐射的波长短于电子串长度,这个阶段的辐射电子不同于彼此,所以辐射是不连贯的。

另一方面,如果波长较长的串长度,辐射是连贯的并且辐射强度的平方成正比每串数字电子。

光谱强度发出一束N 粒子:11()()(1)()|()|tot I NI N N I f λλλλ=+- (2-1)这里1()I λ是靠单电子辐射的强度,()f λ是串形成因素,这是傅里叶变换的规范化的电子密度分布()S Z 。

毕业设计外文参考文献

毕业设计外文参考文献

[1] 王起江,洪杰.超超临界电站锅炉用新型管材的研制[J].宝钢技术,2008(5):44-53.[2] 王起江,邹凤鸣.T91高压锅炉管的研制与应用[J].发电设备,2005 (1):43-47.[3] Fujio Abe.Bainitic and martensitic creep-resistant steels[J].Solid State andMaterials Science,2004,8:305-311.[4] 马明编译.美国新的超临界机组考虑使用T/P92的原因[J].电力建设,2006,27(11):79-80.[5] 戴平.国产P91钢管道存在的问题及其解决[J].广东电力,2008,21(8):67-69.[6] 田党.关于难变形钢和合金管坯的二辊斜轧穿孔问题[J].钢铁,1998,33(1):33-36.[7] P J Ennis,A Czyrska-Filemonowicz.Recent advances in creep-resistant steelsfor power plant applications [J].Sādhanā,2003,28:709–730.[8] 刘立民,朱洪,刘志国.法国T91、P91钢管性能评定[J].电站系统工程,2002,18(1):63-64.[9] 彭孙鸿.T91钢管在我国的应用前景[J].宝钢技术,1997,6:48-50.[10] H.C. Furtado,L.H. de Almeida,I. Le May.Precipitation in 9Cr–1Mo steel aftercreep deformation[J].Materials Characterization,2007,58:72–77.[11] 蒯春光,彭志方.T/P91钢在450-1200℃区间各相元素的分配特征及相稳定性[J].金属学报,2008,44(8):897-900.[12] 孙智,董小文,张绪平,等.奥氏体化温度对9Cr-1Mo-V-Nb钢组织与性能的影响[J].金属热处理,2001,26(8):12-14.[13] 刘靖,周立新,傅晨光,等.电站锅炉用T91钢热穿孔性能的研究[J].钢管,2002,31(5):9-11.[14] 彭孙鸿,尤夙志,姜明娟,等.热穿孔温度对T91持久强度的影响[J].特殊钢,2001,22(2):10-12.[15] 崔光珠,朱伏先,高德福,等.T91钢高温变形特性研究[J].塑性工程学报,1999,6(2):13-16.[16] 余勇,周晓岚,赵志毅,等.T91变形抗力模型建立及理论轧制压力计算[J].宝钢技术,2006(3):31-34.[17] Polcik P,Sailer T,Blum W,et al.On the microstructural development of thetempered martensitic Cr-steel P91 during long-term creep[J].Materials Science and Engineering,1999,260:252-259.[18] Orlová A,Buršík J,Kucharová K,et al.Microstructural development duringhigh temperature creep of 9% Cr steel[J].Materials Science and Engineering,1998,254:39-48.[19] Sasaki,Terufumi,Kobayashi,et al.Production and properties of seamlessmodified 9Cr-1Mo steel boiler tubes[R].Kaw asaki Steel Technical Report,1991,25(4):78-87.[20] Bendick W,Vaillant JC,Vandenberghe B,et al.Properties and workability ofnew creep strength enhanced steels as known grades 23, 24, 911 and 92[J].International Journal of Pressure Vessels and Piping,2004,476:25-29.[21] 刘江南,王正品,束国刚,等.P91钢的形变强化行为[J].金属热处理,2009,34(1):28-32.[22] Tőkei Z S,Viefhaus H,Grabke H J.Initial stages of oxidation of a9CrMoV-steel: role of segregation and martensite laths[J].Applied Surface Science,2000,165:23-33.[23] Rajendran P S,Sankar P,Khatak H S.Cyclic oxidation of P91 at 1073, 1123 and1173K[J].High Temperature Materials and Processes,2004,23(3):195-204.[24] Ahmed Shibli,Fred Starr.Some aspects of plant and research experience in theuse of new high strength martensitic steel P91[J].International Journal of Pressure Vessels and Piping,2007,84:114-122.[25] J.C. Vaillant,B. Vandenberghe,B. Hahn,et al.T/P23, 24, 911 and 92: Newgrades for advanced coal-fired power plants—Properties and experience [J].International Journal of Pressure Vessels and Piping,2008,85:38-46.[26] Brett SJ.The creep strength of weak thick section modified 9Crforgings[C].Proceedings of Baltica,2001,1:39-45.[27] U.Gampe,P.Seliger.Creep crack growth testing of P91 and P22bends[J].International Journal of Pressure Vessels and Piping,2001,78:859-864.[28] L.Kunz,P.Lukáš.High temperature fatigure and cyclic creep of P91steel[J].European Structural Integrity Society,2002,29:37-44.[29] B.Fournier,M.Sauzay,C.Caës,et al.Creep-fatigue-oxidation interactions ina 9Cr-1Mo martensitic steel[J].International Journal of Pressure Vessels andPiping,2008,85:478-485.[30] 刘洪杰.电站锅炉用P91钢蠕变/疲劳交互作用的试验研究[J].动力工程,2007,27(6):990-995.[31] LIU Jiang-nan,JIE Wang-qi.Application of improved vacuum degassingtechnique to refinement of heat resistant steel P91[J].Trans. Nonferrous Met.Soc. China,2005,15:291-294.[32] 苏俊,张铮,李进.P91高压锅炉管的开发[J].钢管,2008,37(4):33-37.[33] 郭元蓉,吴红.P91无缝钢管国产化研究进展[J].钢管,2008,37(1):22-27.[34] 王起江,邹凤鸣,张瑞,等.宝钢T91高压锅炉管性能试验与研究[J].宝钢技术,2003,(4):46-50.[35] Miyata K,Sawaragi Y.Effect of Mo and W on the phase stability of precipitatesin low Cr heat resistant steels[J].ISIJ,2001,41:281-289.[36] Wachter O,Ennis PJ.Investigation of the properties of the 9% Cr steel of thetype 9Cr-0.5Mo-1.8W-V-Nb with respect to its application as a pipework and boiler steel operation at elevated temperatures[D].Germany,1995.[37] Hättestrand M,Andrén H O.Evaluation of particle size distribution in a 9% Crsteel using EFTEM[J].Micron,2001,32:789-797.[38] Sklenicka V,Kucharova K,Svoboda M,et al.Long-term creep behavior of9-12%Cr power plant steels [J].Mater. Character,2003,51:35-48.[39] Strang A,Foldyna V,Lenert J,et al.Prediction of the long-term creep ruptureproperties of 9-12Cr power plant steels [C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,427-441.[40] Kimura K,Kushima H,Sawaka K.Long-term creep strength prediction of highCr ferritic creep resistant steels based on degradation mechanisms[C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,444-456.[41] 高巍,刘江南,王正品,等.P92钢塑性变形行为[J].西安工业大学学报,2008,28(4):356-359.[42] 田党,张根良,卜玉钦.二辊斜轧穿孔时高合金钢的变形分布和分层缺陷形成机制[J].钢铁,1995,30(1):40-45.[43] 刘新生,赵定国,崔成业.冷轧薄板中分层现象的研究[J].钢铁,2008,43(5):40-43.[44] 崔风平,赵乾,唐愈.铸坯内部缺陷对钢板分层形成的影响[J].中国冶金,2008,18(2):14-18.[45] 唐生斌.板材分层缺陷产生原因分析[J].连铸,2003,4:32-34.[46] 洪小玲,肖荣仁,李端来.GH3030合金锻坯裂纹分析[J].钢铁研究,2002,128(5):11-12.[47] S.A.Sharadzenidze,E.A.Svetlitskii.High Quality Seamless Tubes[J]. Metallurg,1968,11:38-39.[48] 王建文.27SiMn钢管表面龟裂原因分析[J].湖南冶金,2000,5:25-26.[49] 任建国,祁晓英,马学军,等.低合金钢热轧缺陷分析[J].沈阳工业学院学报,1996,15(3):35-37.[50] 卢居桂,安自亮,刘钰.夹杂物引起的石油套管缺陷分析[J].天津冶金,2002,106(1):27-29.[51] 田党.关于锥形辊穿孔机轧辊转速对毛管分层缺陷影响的讨论[J].钢管,2006,35(4):12-16.[52] 王永吉,陈大国,王世英,等.二辊斜轧穿孔轧辊转速对高合金钢毛管质量的影响[J].钢铁,1985,20(2):25-30.[53] 严智.高温合金穿孔工艺的研究[J].特钢技术,1994,2:27-31.[54] 田党.高温合金无缝管材的研制与生产[J].钢管,2002,31(3):1-6.[55] 田党.关于毛管分层缺陷的试验研究[J].轧钢,1997,6:7-10.[56] 田党.高温合金管坯在二辊斜轧穿孔机上的穿孔实践[J].天津冶金,1996,4:25-28.[57] 田党.毛管分层缺陷形成过程的观察和分析[J].天津冶金,1996,1:24-26.[58] 田党.高温合金毛管分层缺陷形成的过程[J].钢管,1992,1:19-22.[59] 卢于逑,王先进.二辊斜轧穿孔中心金属断裂机理和穿孔变形工艺实质[J].钢铁,1980,6:7-15.[60] 卢于逑,王先进.二辊斜轧穿孔圆坯断面的变形分布[J].金属学报,1980,4:470-479.[61] 田党,张根良,卜玉钦.二辊斜轧穿孔时高温合金钢圆坯的变形分布及分层形成机制[J].钢铁,1995,30(1):40-46.[62] 田党,李群.关于锥形辊穿孔机的穿孔原理及应用问题的讨论[J].钢管,2003,32(6):1-4.[63] 赵咏秋,吴秀丽,陈菊芳.0Cr18Ni9Ti热轧荒管分层内裂原因分析[J].物理测试,1999,2:33-35.[64] 张存信,冯晓庭,项炳和,等.不锈钢无缝管加工过程中断裂原因简析[J].钢管,2008,37(3):38-42.[65] 袁桂林,苏殿荣.GCr15钢管环状层裂在二辊斜轧穿孔过程中的发生和发展[J].钢管,1983,3:15-18.[66] 张世文,刘仓理,李庆忠,等.初始应力状态对材料层裂破坏特性影响研究[J].力学学报,2008,40(4):535-542.[67] 侯凤桐.日本住友金属公司新开发的菌式穿孔机[J].钢管技术,1985,2:57-59.[68] Chihiro HAYASHI,Tomio YAMAKAWA.Influences of Feed and Cross Angleon Inside Bore and Lamination Defects in Rotary Piercing for Materials with Poor Hot Workability [J].ISIJ International,1997,37(2):153-160.[69] 嵇国金,彭颖红,阮雪榆.有关金属体积成形中的韧性断裂准则[J].金属成形工艺,1998,16(4):36-37.[70] 郭达人编译.金属材料的断裂及其断口分析[J].国外金属热处理,1996,17(4):25-31.[71] 黄建科,董湘怀.金属成形中韧性断裂准则的细观损伤力学研究进展[J].上海交通大学学报,2006,40(10):1748-1753.[72] Oyane M,Sota T,Okintoto K,et al.Criteria for ductile fractures and theirapplications[J].J Mech Work Tech,1980,4:65-81.[73] 郑长卿,张克实,周利.金属韧性破坏的细观力学及其应用研究[M].北京:国防工业出版社,1995,28-32.[74] Venugopal Rao A,Ramakrishnan N,Krishna Kumar R.A comparativeevaluation of the theoretical failure criteria for workability in cold forging[J].Journal of Materials Processing Technology,2003,142(1):29-42.[75] Komori Kazutake.Effect of ductile fracture criteria on chevron crack formationand evolution in drawing[J].International Journal of Mechanical Sciences,2003,45(1):141-160.[76] Ozturk Fahrettin,Lee Daeyong.Analysis of forming limits using ductile fracturecriteria[J].Journal of Materials Processing Technology,2004,147(3):397-404.[77] Jeong Kim,Sung-Jong Kang,Beom-Soo Kang.A prediction of bursting failurein tube hydroforming processes based on ductile fracture criterion[J].Int J Adv Manuf Technol,2003,22:357-362.[78] 虞松,陈军,阮雪榆.韧性断裂准则的试验与理论研究[J].中国机械工程,2006,17(19):2049-2052.[79] 胡庆安,程侠,邰卫华.金属材料断裂预测损伤破坏准则的应用[J].长安大学学报,2007,27(4):100-102.[80] 俞树荣,严志刚,曹睿,等.有限元软件模拟裂纹扩展的方法探讨[J].甘肃科学学报,2003,15(4):15-21.[81] 陈乃超,田冠玉,郑博.12Cr1MoV短期高温冲击断裂韧性及其参数的研究[J].上海电力学院学报,2008,24(2):178-181.[82] Ken-ichiro Mori,Hidenori Yoshimura,Kozo Osakada.Simplified three-dimensional simulation of rotary piercing of seamless pipe by rigid-plastic finite-element method[J].Journal of Materials Processing Technology,1998,80-81:700-706.[83] Y van Chastel,Aliou Diop,Silvio Fanini,et al.Finite Element Modeling ofTube Piercing and Creation of a Crack[J].Int J Mater Form,2008,Suppl 1:355-358.[84] Hyoung Wook Lee,Geun An Lee,Eung Kim,et al.Prediction of plug tipposition in rotary tube piercing mill using simulation and experiment[J].International Journal of Modern Physics B,2008,22(31-32):5787-5792.[85] S Fanini,A Ghiotti,S Bruschi.Evaluation of Fracture Initiation in theMannesmann Piercing Process[C].The 10th ESAFORM Conference on Material Forming,2007,709-714.[86] Saurabh Dwivedi,Samuel H,Huang Jun Shi,et al.Yield prediction for seamlesstubing processes: a computational intelligence approach[J].Int Adv Manuf Technol,2008,37:314-322.[87] Elisabetta Ceretti,Claudio Glaudio,Aldo Attanasio.3D Simulation andValidation of Tube Piercing Process[C].NUMIFORM 07 Materials and Design: Modling, Simulation and Applications,2007,413-418.[88] Kazutake Komori.Simulation of Mannesmann piercing process by thethree-dimensional rigid-plastic finite-element method[J].International Journal of Mechanical Sciences,2005,47:1838-1853.[89] Hayashi C,Yamakawa T.Influence of feed and cross angle on rotary forgingeffects and redundant shear deformation in rotary piercing process[J].ISIJ International,1997,37:146-152.[90] 曾幼宗.斜轧穿孔工艺的有限元分析[J].钢管,2004,33(3):51-53.[91] 双远华,赖明道,张中元.斜轧穿孔过程金属流动的有限元模拟[J].机械工程学报,2004,40(3):140-144.[92] 双远华,赖明道,张中元.钢管斜轧过程应力应变与温度耦合模拟分析[J].锻压技术,2003(6):36-40.[93] 李胜衹,陈大宏,孙中建,等.二辊斜轧穿孔时圆管坯的变形与应力分布及其发展[J].钢铁研究学报,2000,12(5):26-30.[94] A Ghiotti,S Fanini,S Bruschi,et al.Modeling of the Mannesmanneffect[J].CIRP Annals-Manufacturing Technology,2009,58:255-258.[95] E.I. Panov.Shear Stresses and Their Dependence on Different ProcessParameters in The Helical Rolling of Solid Semifinished Products[J].Metallurgist,2005,49(7-8):280-292.[96] E.I. Panov.Certain Aspects of The Stress-Strain State of Semifinished Productsin Helical Rolling[J].Metallurgist,2003,47(11-12):499-505.[97] E.I. Panov.Effect of thrust and tension on the radial stresses in helical rolling[J].Metallurg,2004,4:50-57.[98] Z. Pater,J. Kazanecki,J. Bartnicki.Three dimensional thermo-mechanicalsimulation of the tube forming process in Diescher’s mill [J].Journal of Materials Processing Technology,2006,177:167-170.[99] 双远华,陈惠琴,赖明道.斜轧管材生产中内部组织有限元模拟和预测[J].中国有色金属学报,2001,11(2):238-242.[100] 双远华,张中元,赖明道.热轧穿孔内部组织控轧的工业性试验研究[J].钢铁,2002,37(6):42-47.[101] J C Prince,R Maroño,F León.Thermomechanical analysis of a piercing mandrel for the production of seamless steel tubes[J].J. Process Mechanical Engineering,2003,217:337-344.[102] W.A.Khudheyer,D.C.Barton,T.Z.Blazynski.A comparison between macroshear redundancy and loading effects in 2- and 3-roll rotary tube cone piercers[J].Journal of Materials Processing Technology,1997,65:191-202.[103] A.N.Nikulin,V.V. Streletskii.Deformation of continuous cast metal during rotary rolling[J].Metallurgist,2005,49(3-4):97-101.[104] Kazutake Komori,Kouta Mizuno.Study on plastic deformation in cone-type rotary piercing process using model piercing mill for modeling clay[J].Journal of Materials Processing Technology,2009,209:4994-5001.[105] 李连诗.钢管塑性变形原理(上册)[M],北京:冶金工业出版社,1985:178-185.[106] 卢于逑.斜轧穿孔过程中应力和变形的分布和中心金属断裂机构的某些特点分析[D].北京:北京钢铁学院,1963.[107] 卢于逑,王先进.二辊斜轧穿孔时圆坯断面的变形分布和发展[J].金属学报,1980,16(4):470-479.[108] 严泽生.现代热轧无缝钢管生产[M].北京:冶金工业出版社,2009:175-195.[109] Takuda H,Mori K,Hatta N.The application of some criteria for ductile fracture to the prediction of the forming limit of sheet metals[J].J Mater Process Technol,1999,95:116-121.[110] Takuda H,Mori K,Fujimoto H,et al.Prediction of the forming limit in bore-expanding of sheet metals using ductile fracture criteria[J].J Mater Process Technol,1999,92-93:433-438.[111] Mori K,Takuda H.Prediction of forming limit in deep drawing of finite element simulation and criterion for ductile fracture[J].Transaction of NAMRI/SME XXIV,1996,143-148.[112] Takuda H,Mori K,Takakura N,et al.Finite element analysis of limit strains in biaxial stretching of sheet metals allowing for ductile fracture[J].Int J Mech Sci,2000,42:785-798.。

钢结构设计外文翻译参考文献

钢结构设计外文翻译参考文献

钢结构设计外文翻译参考文献In the United States。

XXX (ASD)。

Plastic Design (PD)。

and Load and Resistance Factor Design (LRFD)。

In ASD。

stress ns are based on first-order elastic analysis。

XXX。

In PD。

first-order plastic hinge analysis is used in structural analysis。

XXX progressive collapse effects are not included in PD。

they are XXX LRFD。

first-order XXX。

and the XXX。

All three design methods require independent checks。

including K factor ns。

In this paper。

XXX structural system and its components are related。

but the current LRFD n of the American Institute of Steel n (AISC) separates them。

In practical ns。

the XXX in the effective length factor。

This is described in the excerpt from the Technical Memorandum on Social Science Research。

Volume 5.Although the maximum internal forces of the structure and the maximum internal forces of the components are interdependent (but not necessarily coexisting)。

家具设计外文翻译参考文献

家具设计外文翻译参考文献

家具设计外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)SCANDINA VIAN FURNITURE DESIGNScandinavian design is 30 years in the 20th century Having achieved great success, and acquired an international reputation for design. The style is concerned, the Scandinavian design is the function of doctrine, but not as stringent as the 20th century, 30 years and doctrines.as stringent as the 20th century, 30 years and doctrines. Geometric form of soften, and edges are fairing into S-shaped curve or wavy lines, often described as "organic form", so that the form of more humane and angry. Before the war with Bauhaus functionalism as the center 40 years in the 20th century, under the difficult conditionsof material deprivation is widely accepted, but by the mid-20th century, 40, functionalism has been gradually includes a number of practical and style changes. These changes left the Bauhaus pure geometric forms and "works" the language of aesthetics, most notably the Scandinavian design. As early as 1930, the Stockholm Fair, Germany, Scandinavian design will be a strict functionalism and local arts and crafts in the humanist tradition of integrating their together. In the 1939 New York International Exposition, but also established the "Swedish Modern style," as the concept of an international status. After the 20th century, 40 years after a difficult period, Scandinavian design in the 20th century, 50 years produced a new leap forward. Its simple and organic shape and natural color and texture very popular in the international arena. Milan Triennial in 1954, the international design exhibition, Scandinavian design show a new look, the participation of Sweden, Denmark, Finland and Norway have achieved great success. The design of these countries after the war, the organization implemented a policy of cooperation, their first major achievement was called "Scandinavian Design" exhibition. Arts Foundation in the United States under the sponsorship of this exhibition from 1954-1957 in North America in 22 years, the city's main museums around the world, thus making "Scandinavian design" the image of the widely popular in the international community. Function of the Scandinavian modern design movement, the countries in the design organization at the national or local level, held a large number of exhibitions, the 20th century, these activities have become a key feature of the 50's. Scandinavian design of the Year, held alternately in various countries, affecting a wide range, which, together with the publications and periodicals for the design of the exchanges made a significant contribution. Design organizations not only exhibitions, they are also an important advocate in this area designed to encourage manufacturers to invest in a creative product development, to persuade the authorities to design policies to support its excellent design. They also inspire public awareness of good design and everyday use more beautiful thing, and this 50 to 60 for the 20th century, the early design development played an important role. In addition to designing the organization efforts, dominated the 20th century, 50 years of social and economic life of the development of the power of design has a more profound impact, with the process ofindustrialization and urbanization, the whole population structure has changed. Continuously improve the standard of living affected the majority of the people and their way of life, resulting in widespread optimism and confidence for the development and progress. New ideas begin to gain traction, such as that the ordinary people have the right to enjoy the comfort of home, the family is not only healthy, but also meets the functional and aesthetic requirements. In the 20th century, 50's, the ultimate welfare state built up in Scandinavia. The 20th century, 40 years in order to reflect the ethnic characteristics arising from a sense of nostalgia, often showing the pristine countryside, contributed to this softening trend. Early functionalism advocated by the primary color for the 20th century, 40 years to reconcile the color gradually replaced by a more coarse texture and natural materials by their favorite designers. After 1945, another retro trend - the Danish tradition of excellent craftsmanship in Sweden and Norway have also been strengthened. The 20th century, 50 years, a group of pre-war designers, such as the prestigious Henningsen, Klandt, mam Marsden, Aalto, etc. are still walking in the forefront of the design. For example, Henningsen, designed after the war, a number of new PH lamps, in particular, he designed a PH-5, and PH Artichoke pendant lamp has achieved great success and has sold briskly. The other hand, young designers have also come to the fore, thus promoted the Scandinavian design of further development. Scandinavian design of the human touch is also reflected in the design of industrial equipment, in this respect Swedish industrial designer made a lot of work. From 1965 onwards, from Sweden, consisting of six designers "design team" involved in Solna, the company's offset printing production line development and design work, they operate on the production line process carried out a detailed ergonomic analysis and redesign the signs, symbols, instructions and manipulating the handle, so that working conditions have been greatly improved.Danish furniture design has a tradition dating back almost 450 years .In 1554, a n umber of cabinetmakers founded Koebenhavns Snedkerlaug (The Copenhagen Guild of Cabinetmakers) with the dual purpose of creating high-quality furniture and of prot ecting the trade from poor craftsmen by establishing formal training for cabin-makers. Two hundred years later,in 1777,Det Kongelige Meoble Magazine (The Royal Furniture Magazine) was established with the aim of manufacturing uniform,high-quality fur niture in terms of production and design for the Danish Royal Household and its vario us departments and ministries ,etc.The furniture was designed almost along the lines o f catalogue goods by the most renowned designers of the period,and their drawings w ere forwarded to master cabinetmakers all over the country,who then manufactured th em.After a brief period of only 40 years,the practice came to an end in 1815.The imp ortant thing is that the above-mentioned events were extremely visionary as regards q uality and design,and that they went on to form a solid foundation for later developme nt.Furthermore,Det Kongelige Danske Kunstakademi (The Royal Danish Academy of Art) in Copenhagen, established a school of furniture design in 1770,whose purpose w as the education of furniture apprentices to draw and inspect masterpieces what amou nted to the world’s first systematic education of furniture designer.Throughout the 19t h century,indeed until the beginning of the 1920’s, there is an absence of an independe nt Danish style.The architects of the time are inspired by French, and particularly,Engl ish furniture and only design furniture for the wealthy upper classes and civil authoriti es. Peasants,farmers and the fledgling working class still do not represent an interestin g commercial body,but this picture changes with the country’s move from an agricultu ral society to an industrialized one towards the end of the last century.The cities almos t exploded in size and social awareness flew with the emergence of the new social clas ses-laborers and office workers-both of whom demanded monetary payment for their services.Put in simple terms,you might say that this was how the foundation of moder n consumer society came into being. Once current overheads had been met such as food,clothing,rent and heating ,etc.People still had the means to buy furniture,which in its own small way, created the basis for a formalized furniture industry.The furniture industry did not really take off until people began moving away from the cramped apartments in the city centers to larger apartments and detached houses on the outskirts of town.This happened in two stages,the first of which was in the 1920’s,when the social housing projects began and detached houses started to appear.The second stage was in the 1950’s,when both types of housing be fan to shoot up everywhere.This development,combined with a high level of knowledge andawareness,creatd a new and more rational housing culture where people began to demand high-quality functional furniture.As it turned out, people outside Denmark soon began to make the same kinds of demands.The 1920’s saw the desire for a purely Danish style of furniture.In 1924,a lecture ship in furniture design was established at Kunstakademiets Arkitektskole (The Royal Danish Academy of Fine Arts School of Architecture) in Copenhagen.The lectureship went to the Danish architect,Kaare Klint(1888-1954), who influenced the developmen t of Danish furniture design to a great degree.Kaare Klint was a systematist and a mod ernist who used his students to pioneer a series of surveys and analyses of furniture an d spatial needs. First and foremost,Kaare Klint represented the approach that furniture should be functional and user-friendly,an approach which in many ways deviated fro m the rest of Europe,where functionalism often took the form of formalistic exercises, directing its focus towards a well-to-do elite rather than the ordinary man in the street.The result was that a strong,independent,humanistic functionalism evolved in De nmark through the 1930’s and 40’s,culminating in an international breakthrough at the beginning of the 1950’s.A contributory factor to this breakthrough was the Guild or C abinetmakers’ annual autumn exhibition held for the first time in 1928.Here, young fu rniture designers could find collaborative partners among the established cabinetmake r workshops with an eye to developing new types of furniture.It was at these exhibitio ns that Danish architects like Hans J.Wegner,Ole Wanscher, Finn Juhl,Boerge Mogens en,Arne Jacobsen and many others made their breakthrough,and it was at these same e xhibitions in the period following the Second World War that,in particular the Americ an market,caught sight of Danish furniture design-Danish modern.The development of Danish furniture design continued forcefully up through the 1950’s and 60’s, resulting in a sharp increase in furniture exports.The starting point of Danish furniture production was joiner craftsmen furniture, but as technology develop ed ,production became increasingly industrialized and this affected the way in which a rchitects designed furniture. One of the best examples of the furniture of this period is architect, Professor Arne Jacobsen’s famous “Myren”(“The Ant”),designed in 1951 as a canteen chair for Novo Nordisk”s new medicinal factory.The chair was developed i n cooperation with the furniture manufacturer Fritz Hansen A/S. From the beginning,It was designed as an industrial product for mass production. Some years later, in 195 7,Arne Jacobsen designed a more streamlined version of “The Ant” for Fritz Hansen A/S, the so-called 7-series and these chairs became a huge success with 5 million chai rs sold to date. His collaboration with Fritz Hansen A/S continued until his death in 19 71. In addition to “The Ant” and the 7-series, Arne Jacobsen and Fritz Hansec succeed ed in creating a long series of Danish furniture classics, such as the easy chairs “Aegg et”(“The Egg”) and Svanen (“The Swan”), which Jacobsen designed for the SAS Roy al Hotel in Copenhagen in 1959. These two chairs were remarkable inasmuch as Jaco bsen pioneered the use of expanded polystyrene in furniture-chairs ahead of the times.There were others too, designers who designed industrially manufactured furnitu re. In 1942, FDB(The Danish Co-op Society) hired the 28 year old furniture designer, Borge Mogensen, as chief designer for FDB’s newly established furniture design studi o. Borge Mogensen was a former student of Kaare Klint, and Mogensen further devel oped Klint’s ideas regarding quality functional furniture for the ordinary consumer. F DB’s furniture was manufactured in wood, especially in the domestic wood sorts of oa k and beech. These chairs were designed for industrial manufacture and despite the fa ct this was “furniture for the common man”, it was still of a very high calibre, both in terms of functionality and design. Later on, Boerge Mogensen created a name for him self by designing exclusive furniture in an altogether different price bracket for afflue nt clientele. Despite this, he never diverged from his principles of functionality and us er-friendliness.The two designers who really put Denmark on the world map were Hans J.Wegn er (born 1914) and Finn Juhl (1912-1989). These two men came from radically differe nt backgrounds. Hans J.Wegner was the country craftsman who had received his traini ng as furniture designer at Kunsthaandvaerkerskolen (The Danish School of Arts &Cr afts). Jinn Juhl was the cosmopolitan academic from Copenhagen, who had been educ ated as an architect at the Kunstakademiet (The Royal Danish Academy of Jine Arts). Both men had an amazing feel for design and a deep-seated desire to create beautiful, functional furniture. As a result, they created a long series of furniture classics over a period lasting 40 years; classics which even today stand out as exceptional. Their prod uction of quality furniture is so extensive-Hans J.Wegner alone is responsible for more than 500 models-that it is impossible to highlight the work of one or the other. Partic ular examples of Hans J.Wegner’s unique design work are Kinastolen (“The Chinese Chair”) from 1945, The Chair from 1949, and Cirkelstolen (“The Circle Chair”) from 1986. Among Finn Juhl’s furniture are such highlights as his armchair made for the G uild of Cabinetmakers’ autumn exhibition in 1944 and Hoevdingstolen (The Chieftain Chair) from 1949. It was chairs like these that won Denmark its reputation as the worl d’s leading design nation.Around 1970, Denmark began to experience stiff competition from Italy at the nu merous furniture fairs around the world, and in particular, at the furniture fairs around the world, and in particular, at the furniture fairs in Cologne and Chicago. The Italian designers and furniture manufacturers moved in new directions and experimented wit h all kinds of materials and expression, which caused Danish furniture to appear behin d the times. It was really only the Danish designer, Verner Panton, who lived in Switz erland, who understood how to use the new man-made materials and create new desig ns.This was a critical period in Danish furniture design and for the Danish furniture in dustry which found it difficult to maintain its position as marker leader. This situation was not only caused by the challenge posed by the Italian designers. It was also the re sult of too much success.The good international reputation of Danish furniture design had built by a handf ul of furniture manufacturers who were interested in good design and the use of talent ed designers. In the wake of their success however, were a large number of less seriou s furniture manufacturers. Who swamped the market with unoriginal furniture, usually of poor quality, which was hastily marketed under the label of Danish Design.Fortunately, there were new, talented designers on the way up: people like the Da nish designers, Bernt, Rud Thygesen&Johnny Soerensen, Johannes Foersom&Peter H iort-Lorenzen, Gunver&Niels Joergen Haugesen, Joergen Gammelgaard, as well as N anna Ditzel and Poul Kjaerholm. These designers helped to lift the heavy legacy left t o them by the “Golden Age” of Danish design in the 1950’s and 60’s, and fortunately, there were still furniture manufacturers willing to bank on quality design.The greatest problem for Danish furniture design of the period was that the manu facture of furniture was becoming more and more industrialised. The meant that designers had to come up with far more rational designs than before. The fact that training at the architect and design colleges was to a high degree based on artistry and craftsm anship caused a good deal of friction between designers and manufacturers. Many des igners felt that the manufacturers only had an eye for profit margins and mass product ion. For their part, the manufacturers felt that the designers only thought about designi ng expensive furniture and of making a name for themselves. This was not a good fou ndation for developing Danish furniture design and both parties were lacking a viable model with which to move on. It was a small, elegant chair and accompanying table s eries in laminated beechwood which marked the start of the second “Golden Age” of Danish furniture design. The new furniture was presented at the annual Scandinavian Furniture Fair at The Bella Centre in 1974 and was designed by the young architects Rud Thygesen & Johnny soerensen for the furniture manufacturer Magnus Olesen A/S . The chair and the table series were specifically designed as industrial products in a f unctional design and were of a very high quality. To top it all, they were relatively che ap as well. The fact that this could be done was partly because the designers had redis covered the industrial and design qualities of the laminating technique, and partly bec ause they had gambled on the contract market rather on the market for household furn iture. The laminating technique was well known: the Finnish designer, Alvar Alto and the Swedish designer, Bruno Mathsson had already created a long line of beautiful la minated furniture in the 1930’s and 40’s–and in Denmark, people like Arne Jacobsen had developed series of laminated furniture. What made Rud Thygesen & Johnny Soe rens en’s approach so unique was the fact that they regarded their furniture as industria l products instead of one-of-a-kind, craftsman-made goods. Their furniture was highly adapted to rational mass production, almost kike industrial design. More inportant stil l was the fact that an extremely viable model for collaboration between designers and manufacturers had been found. This model created a school of thought and convinced the furniture industry that good design could actually pay!As we approach a new century, there is every reason to have high expectations fo r the continued development of Danish furniture design. Never before has so much qu ality furniture been manufactured, and young, new designers are making their mark. P eople like the designer Troels Grum-Schwensen, Kasper Salto, Henrik Tengler, HansSandgren Jacobsen, Tom Srepp, Pelikan Design, Komplot Design and various other gr oups of designers. The most interesting feature of the development of furniture desig n from 1980 to the present day is that it essentially followed its own path, more or less uninfluenced by changing styles: the postmodernism, high-tech, neoclassic of the 198 0’s, the rediscovery of art deco at the beginning of the 1990’s together with neo-functi onalism and the renewed interest for the design of the 1960’s-all of these are styles wh ich have been ostentatiously introduced (and reintroduced) at the great furniture fairs i n Cologne and Milan since 1980, and nearly all have disappeared again. Danish furnit ure designers and furniture manufacturers however, have not felt tempted to follow th ese trends. This is not out of fear but rather out of a deep-rooted unwillingness to be di ctated to by whimsical trends which do not add anything new to furniture design. Inste ad, they have continued to develop and refine Scandinavian modernism which is chara cterised by its great care for detail and the manufacturing process, respect for the hum an anatomy, thorough analyses of requirements and use, aesthetics and considerations about form and function and rational production. This is a work approach which has at tracted wide international attention in the course of the last five to six years, and one which many international designers have tried to copy, as was the case with the Danis h furniture designs of “the Golden Age” 30-40 years ago.It is this same work approach which will probably guarantee the leading position of Danish furniture design for ma ny years to come: innovation via tradition.Given the fact that the western concept of art from the end of the 18th century m oved towards the ever-increasing independence of artistic expression, part of the task of modern art became to reassemble what had been dismantled. The boundary betwee n fine and mass culture narrowed.Visual art, architecture and applied art were to be se en as aspects of a common dream; the ideal of powerful, modern expression. The begi nning of the 20th century saw the introduction of the term “Gesamtkunstwerk”. A hou se was no longer a frame around random content. Buildings, furniture design, decorati ve art and interior design generally were to support the integral whole, which became greater than the sum of its individual parts.From the 1920’s and 30’s, the dominant German Bauhaus School greatly influenced design in Europe and America. Architect and School Director, WalterGropius, expressed his intentions in the following way:”Our ultimate goal was the compound yet indivisible work of art, the unique building where the old boundary between the monumental and decorative elements vanished fo rever”.In Denmark, architects led by Arne Jacobsen, among others, were extremely stim ulated by this way of thinking. Here lay the keystone to the tradition of interrelationsh ip between architecture and interior design, which to this day remains an important ha llmark of Danish architects and designers. Since 1971,the architectural firm of Dissing +Weitling A/S has continued to run and develop Arne Jacobsen’s architect business, w ith employees in Denmark and around the world. The depth in Dissing+Weitling’s wo rk is exceptional but this also says something characteristic about the Danish approach . Here we find both a sense of wholeness as well as an attention to detail, and especiall y, the challenge of getting both elements to form a synthesis. Nothing is too small, let alone irrelevant to warrant care and attention.In addition to architectural buildings, Dissing+Weitling also carry out work in th e fields of furniture, lighting design, and medico-technical equipment. In all events, it is an attempt to merge the various parameters such as form, function, construction, ma terials and color to form a balanced expression whose hallmark is a strong visual ident ity, which is the leitmotif of the design process: A clarity and purity which has timeles s and universal qualities. In this regard, Dissing+Weitling have done a supreme job of carrying on the legacy of Arne Jacobsen.Whereas at the close of this century, we have witnessed the noisier, mishmash of diversity of international design reflecting the spiri t of the times, here in Denmark-and the Nordic countries-the modernistic method and approach has prevailed. Design has been carried forward with moderation and variatio ns based on a tighter minimalism, focusing on the elements and dynamics of the indivi dual form, as well as a pronounced sensitivity for materials. There are many examples of how this subtle dialogue between space, furniture and interior design have found p owerful expression; designs which break up and imprint a different rhythm on the spa ce and the way in which fine contrasts such as the lineatity of the room are juxtaposed by the curvature of the reception area-a common, repeated theme in many interiors.It is important to remember that interior designers are not housebuilders like arch itects. Interior designers are given finished rooms whose interiors they have to design.For this reason, all interior design deals with “treatment of the room” and the Scandin avian tradition for this is strongly linked to Scandinavian modernism, i.e. humanism a nd democracy paired with functionalism, which again is linked to the architectural tra dition.The restoration of old buildings also exerts an influence on the work of Danish architects and interior designers. An extensive series of buildings has been restored wi th respect for existing architecture and the qualities of past design. Many buildings ha ve been thoroughly renovated with an eye to meeting new functions and modern requi rements.The balance between maintaining the original distinctive architectural feature s and ensuring a modern design poses a continuing challenge. This is exactly where a comprehensive staging with the designing of special furniture and fixtures can becom e a means of ensuring a uniformity of style and expression.参考文献:朱迪思·古拉泰晤士和哈德逊公司.斯堪的纳维亚家具:21世纪的原始资料的经典设计.2007-11迈克•罗莫. 室内与家具设计. Thame Hudson出版社.2005北欧家具设计斯堪的纳维亚设计是在20世纪30年代即已取得较大成就,并获得了国际声誉的设计风格。

学生考试系统外文参考文献

学生考试系统外文参考文献

学生考试系统外文参考文献以下是一些关于学生考试系统的外文参考文献:1."A Comprehensive Framework for Online Exam Management System," by Ravi Shankar and Deepak Suryawanshi. Journal of Computer Science and Technology, vol. 32, no. 4, 2017, pp. 775-787.2."Exam Management System: Design and Implementation," by Nidhi Jain and Anil K. Jain. International Journal of Computer Applications, vol. 138, no. 4, 2017, pp. 1-5.3."Cloud-Based Online Exam Management System," by Sunil Verma and Vishwa Deepak Mishra. International Journal of Computer Science and Information Technology, vol. 9, no. 2, 2017, pp. 1-7.4."An Efficient Online Exam Management System," by Deepak Tiwari and Sumit Shukla. Indian Journal of Computer Science and Engineering, vol. 8, no. 2, 2017, pp. 1-6.5."Exam Evaluation using Fuzzy Logic: A Comparative Study," by Ranjit Kumar and Deepak Kumar Jha. Information Science and Engineering Applications, vol. 5, no. 2, 2017, pp. 1-10.这些文献涵盖了学生考试系统的各个方面,包括系统设计、实现、评估和优化等。

外文参考文献(带中文翻译)

外文参考文献(带中文翻译)

外文资料原文涂敏之会计学 8051208076Title:Future of SME finance(/docs/pos_papers/2004/041027_SME-finance_final.do c)Background – the environment for SME finance has changedFuture economic recovery will depend on the possibility of Crafts, Trades and SMEs to exploit their potential for growth and employment creation.SMEs make a major contribution to growth and employment in the EU and are at the heart of the Lisbon Strategy, whose main objective is to turn Europe into the most competitive and dynamic knowledge-based economy in the world. However, the ability of SMEs to grow depends highly on their potential to invest in restructuring, innovation and qualification. All of these investments need capital and therefore access to finance.Against this background the consistently repeated complaint of SMEs about their problems regarding access to finance is a highly relevant constraint that endangers the economic recovery of Europe.Changes in the finance sector influence the behavior of credit institutes towards Crafts, Trades and SMEs. Recent and ongoing developments in the banking sector add to the concerns of SMEs and will further endanger their access to finance. The main changes in the banking sector which influence SME finance are:•Globalization and internationalization have increased the competition and the profit orientation in the sector;•worsening of the economic situations in some institutes (burst of the ITC bubble, insolvencies) strengthen the focus on profitability further;•Mergers and restructuring created larger structures and many local branches, which had direct and personalized contacts with small enterprises, were closed;•up-coming implementation of new capital adequacy rules (Basel II) will also change SME business of the credit sector and will increase its administrative costs;•Stricter interpretation of State-Aide Rules by the European Commission eliminates the support of banks by public guarantees; many of the effected banks are very active in SME finance.All these changes result in a higher sensitivity for risks and profits in the finance sector.The changes in the finance sector affect the accessibility of SMEs to finance.Higher risk awareness in the credit sector, a stronger focus on profitability and the ongoing restructuring in the finance sector change the framework for SME finance and influence the accessibility of SMEs to finance. The most important changes are: •In order to make the higher risk awareness operational, the credit sector introduces new rating systems and instruments for credit scoring;•Risk assessment of SMEs by banks will force the enterprises to present more and better quality information on their businesses;•Banks will try to pass through their additional costs for implementing and running the new capital regulations (Basel II) to their business clients;•due to the increase of competition on interest rates, the bank sector demands more and higher fees for its services (administration of accounts, payments systems, etc.), which are not only additional costs for SMEs but also limit their liquidity;•Small enterprises will lose their personal relationship with decision-makers in local branches –the credit application process will become more formal and anonymous and will probably lose longer;•the credit sector will lose more and more its “public function” to provide access to finance for a wide range of economic actors, which it has in a number of countries, in order to support and facilitate economic growth; the profitability of lending becomes the main focus of private credit institutions.All of these developments will make access to finance for SMEs even more difficult and / or will increase the cost of external finance. Business start-ups and SMEs, which want to enter new markets, may especially suffer from shortages regarding finance. A European Code of Conduct between Banks and SMEs would have allowed at least more transparency in the relations between Banks and SMEs and UEAPME regrets that the bank sector was not able to agree on such a commitment.Towards an encompassing policy approach to improve the access of Crafts, Trades and SMEs to financeAll analyses show that credits and loans will stay the main source of finance for the SME sector in Europe. Access to finance was always a main concern for SMEs,but the recent developments in the finance sector worsen the situation even more. Shortage of finance is already a relevant factor, which hinders economic recovery in Europe. Many SMEs are not able to finance their needs for investment.Therefore, UEAPME expects the new European Commission and the new European Parliament to strengthen their efforts to improve the framework conditions for SME finance. Europe’s Crafts, Trades and SMEs ask for an encompassing policy approach, which includes not only the conditions for SMEs’ access to lending, but will also strengthen their capacity for internal finance and their access to external risk capital.From UEAPM E’s point of view such an encompassing approach should be based on three guiding principles:•Risk-sharing between private investors, financial institutes, SMEs and public sector;•Increase of transparency of SMEs towards their external investors and lenders;•improving the regulatory environment for SME finance.Based on these principles and against the background of the changing environment for SME finance, UEAPME proposes policy measures in the following areas:1. New Capital Requirement Directive: SME friendly implementation of Basel IIDue to intensive lobbying activities, UEAPME, together with other Business Associations in Europe, has achieved some improvements in favour of SMEs regarding the new Basel Agreement on regulatory capital (Basel II). The final agreement from the Basel Committee contains a much more realistic approach toward the real risk situation of SME lending for the finance market and will allow the necessary room for adaptations, which respect the different regional traditions and institutional structures.However, the new regulatory system will influence the relations between Banks and SMEs and it will depend very much on the way it will be implemented into European law, whether Basel II becomes burdensome for SMEs and if it will reduce access to finance for them.The new Capital Accord form the Basel Committee gives the financial market authorities and herewith the European Institutions, a lot of flexibility. In about 70areas they have room to adapt the Accord to their specific needs when implementing it into EU law. Some of them will have important effects on the costs and the accessibility of finance for SMEs.UEAPME expects therefore from the new European Commission and the new European Parliament:•The implementation of the new Capital Requirement Directive will be costly for the Finance Sector (up to 30 Billion Euro till 2006) and its clients will have to pay for it. Therefore, the implementation – especially for smaller banks, which are often very active in SME finance –has to be carried out with as little administrative burdensome as possible (reporting obligations, statistics, etc.).•The European Regulators must recognize traditional instruments for collaterals (guarantees, etc.) as far as possible.•The European Commission and later the Member States should take over the recommendations from the European Parliament with regard to granularity, access to retail portfolio, maturity, partial use, adaptation of thresholds, etc., which will ease the burden on SME finance.2. SMEs need transparent rating proceduresDue to higher risk awareness of the finance sector and the needs of Basel II, many SMEs will be confronted for the first time with internal rating procedures or credit scoring systems by their banks. The bank will require more and better quality information from their clients and will assess them in a new way. Both up-coming developments are already causing increasing uncertainty amongst SMEs.In order to reduce this uncertainty and to allow SMEs to understand the principles of the new risk assessment, UEAPME demands transparent rating procedures –rating procedures may not become a “Black Box” for SMEs:•The bank should communicate the relevant criteria affecting the rating of SMEs.•The bank should inform SMEs about its assessment in order to allow SMEs to improve.The negotiations on a European Code of Conduct between Banks and SMEs , which would have included a self-commitment for transparent rating procedures by Banks, failed. Therefore, UEAPME expects from the new European Commission and the new European Parliament support for:•binding rules in the framework of the new Capital Adequacy Directive, which ensure the transparency of rating procedures and credit scoring systems for SMEs;•Elaboration of national Codes of Conduct in order to improve the relations between Banks and SMEs and to support the adaptation of SMEs to the new financial environment.3. SMEs need an extension of credit guarantee systems with a special focus on Micro-LendingBusiness start-ups, the transfer of businesses and innovative fast growth SMEs also depended in the past very often on public support to get access to finance. Increasing risk awareness by banks and the stricter interpretation of State Aid Rules will further increase the need for public support.Already now, there are credit guarantee schemes in many countries on the limit of their capacity and too many investment projects cannot be realized by SMEs.Experiences show that Public money, spent for supporting credit guarantees systems, is a very efficient instrument and has a much higher multiplying effect than other instruments. One Euro form the European Investment Funds can stimulate 30 Euro investments in SMEs (for venture capital funds the relation is only 1:2).Therefore, UEAPME expects the new European Commission and the new European Parliament to support:•The extension of funds for national credit guarantees schemes in the framework of the new Multi-Annual Programmed for Enterprises;•The development of new instruments for securitizations of SME portfolios;•The recognition of existing and well functioning credit guarantees schemes as collateral;•More flexibility within the European Instruments, because of national differences in the situation of SME finance;•The development of credit guarantees schemes in the new Member States;•The development of an SBIC-like scheme in the Member States to close the equity gap (0.2 – 2.5 Mio Euro, according to the expert meeting on PACE on April 27 in Luxemburg).•the development of a financial support scheme to encourage the internalizations of SMEs (currently there is no scheme available at EU level: termination of JOP, fading out of JEV).4. SMEs need company and income taxation systems, which strengthen their capacity for self-financingMany EU Member States have company and income taxation systems with negative incentives to build-up capital within the company by re-investing their profits. This is especially true for companies, which have to pay income taxes. Already in the past tax-regimes was one of the reasons for the higher dependence of Europe’s SMEs on bank lending. In future, the result of rating will also depend on the amount of capital in the company; the high dependence on lending will influence the access to lending. This is a vicious cycle, which has to be broken.Even though company and income taxation falls under the competence of Member States, UEAPME asks the new European Commission and the new European Parliament to publicly support tax-reforms, which will strengthen the capacity of Crafts, Trades and SME for self-financing. Thereby, a special focus on non-corporate companies is needed.5. Risk Capital – equity financingExternal equity financing does not have a real tradition in the SME sector. On the one hand, small enterprises and family business in general have traditionally not been very open towards external equity financing and are not used to informing transparently about their business.On the other hand, many investors of venture capital and similar forms of equity finance are very reluctant regarding investing their funds in smaller companies, which is more costly than investing bigger amounts in larger companies. Furthermore it is much more difficult to set out of such investments in smaller companies.Even though equity financing will never become the main source of financing for SMEs, it is an important instrument for highly innovative start-ups and fast growing companies and it has therefore to be further developed. UEAPME sees three pillars for such an approach where policy support is needed:Availability of venture capital•The Member States should review their taxation systems in order to create incentives to invest private money in all forms of venture capital.•Guarantee instruments for equity financing should be further developed.Improve the conditions for investing venture capital into SMEs•The development of secondary markets for venture capital investments in SMEs should be supported.•Accounting Standards for SMEs should be revised in order to ease transparent exchange of information between investor and owner-manager.Owner-managers must become more aware about the need for transparency towards investors•SME owners will have to realise that in future access to external finance (venture capital or lending) will depend much more on a transparent and open exchange of information about the situation and the perspectives of their companies.•In order to fulfil the new needs for transparency, SMEs will have to use new information instruments (business plans, financial reporting, etc.) and new management instruments (risk-management, financial management, etc.).外文资料翻译涂敏之会计学 8051208076题目:未来的中小企业融资背景:中小企业融资已经改变未来的经济复苏将取决于能否工艺品,贸易和中小企业利用其潜在的增长和创造就业。

会计职业道德外文的参考文献_论文格式_

会计职业道德外文的参考文献_论文格式_

会计职业道德外文的参考文献1、Kalampokis, Evangelos,Tambouris, Efthimios,Tarabanis, Konstantinos.A classification scheme for open government data: Towards linking decentralised data. International Journal of Web Engineering and T echnology . 20192、Borzacchiello Maria Teresa,Craglia Max.The impact on innovation of open access to spatial environmental information : a research strategy. International Journal of Technology Management . 20193、Olayiwola B,Victor A,Oluwatoyosi J,Ahmed I.Open Data Portals in Africa:An Analysis of Open Government Data Initiatives. African Journal of Library,Archives and Information Science . 20194、Rininta Putri Nugroho,Anneke Zuiderwijk,Marijn Janssen,Martin de Jong.“A comp arison of national open data policies:lessons learned”. Transforming Government:People,Process and Policy . 20195、Yang Dong-mou,Luo Jin,Wang Hui-ru,Xiang Jin.Open government data and increment of information:experience and enlightenment of Chinese Taiwan P.R.China. Library and Information Service . 20196、Lin Jie,Chen Kai-hua,Qin Hai-bo,Hou parative study on innovation policies of local governments in China and the United States-Take Jiangsu and California for example. Studies in Science of Science . 20197、Zhao Rui-ti.Foreign open government date policy:A guiding study. Information Studies:Theory&Application . 20198、Shahidullah. Social Entrepreneurship in Economically Disadvantaged Communities: Merit of NGO-MFI Guided Community-Based Organizations[A]. Conference Proceedings of5th International Conference on Advances in Social Sciences (ICASS),Bangkok[C]. 20199、YI Cheng-zhi. The Shortcomings and Reshaping of E-governmental Value Based on Metropolitan Harmonious Development in China[A]. Proceedings of 2019 International Conference on Public Administration(9th)(Volume Ⅰ)[C]. 201910、HU Chunyan 1,a,CHEN Binbin 1,b 1 School of Public Administration,Central South University,Changsha,Hunan,China,410083 The Instrumental Predicaments of the Neitizen's Accountability:An Analytical Framework of Discourse Theory[A]. Advances in Artificial Intelligence (Volume 1)--Proceedings of 2019 International Conference on Management Science and Engineering (MSE 2019)[C]. 201911、YANG Xiao-wei,DAN Chu. The Implementation of E-government is an Important Measure to Realize the Transparency of Services-oriented Government[A]. 2019年公共管理国际会议论文集(第四届)(下)[C]. 201912、Ling Qian. Social capital and micro-charity participation:evidence from China[A]. 2019年中国市场营销国际学术年会论文集--专题四[C]. 201913、GOU Huan. The Turn of Activism in the Study of Public Policy T ools[A]. Proceedings of 2019 International Conference on Public Administration(12th)& International Symposium on West African Studies (1st)(Volume II)[C]. 201914、Gyorgy Attila. Transparency in Public Administration: Panacea for Public Finance Quality[A]. Proceedings of 2019 International Conference on Public Administration(7th)(Volume Ⅱ)[C]. 201915、LIU Wen-yan,ZHENG Yu-ying. Research on Strategies of Strengthening the Government Credibility in the Process of Public Crisis Management--Based on the Perspective of Public Participation[A]. Proceedings of 2019 International Conference on Public Administration(7th)(Volume Ⅲ)[C]. 201916、SU Jun,DU Min. Market Failure and Government Failure in AVS Standard Setting: A Study based on Policy Process & Instruments Framework[A]. Proceedings of 2019 International Conference on Public Administration[C]. 201917、HUI Hong,ZHANG Ren-jun,CHENG Yi-xin. A Study on the Enthusiasm of Resident Participation on Regional Development in Different Nations: A Cultural Perspective[A]. Proceedings of 2019 International Conference on Public Administration(5th)(Volume Ⅲ)[C]. 201918、Ma Rong,et al.Study on Population Migration and Ethnic Interaction in the Western Development. . 201919、Ma Rong.Classics of Western Ethnic Sociology:Study on the Relationship between Race and EthniC ity. . 201920、Jin Bing-hao.Theory of Ethnic Relations. . 201921、Ma Rong.National Sociology:Study of Ethnic Relations in Sociology. . 201922、Ma Rong.Thoughts on the Current Urban National Work. Northwest Ethnic Studies . 201923、Gao Xiang-dong,Yu Yun-jiang,Huang Zu-hong.Study on Urban Adaptation of Floating Population of Ethnic Minorities Based on Ethnic Factors and Institutional Factors. Journal of South-Central University for Nationalities (Humanities and Social Sciences) . 201924、Chen Ji.Interaction and Adjustment:an Approach to the Social Integration of Ethnic Minorities. Journal of SouthwestUniversity for Nationalities (Humanities and Social Sciences) . 201925、Qing Cheng.Study on the Citizenization of Floating Population of Urban Minorities. Journal of South-Central University for Nationalities (Humanities and Social Sciences) . 201926、D.Wang,L.Guo,B.S.Wu,L.Lv. Spatial distribution of ethnic villages in Qiandongnan mountainous region[A]. Proceedings of the 2019 International Conference on Environmental Engineering and Computer Application (ICEECA 2019)[C]. 201927、Denis Chistyakov. Nationalism in the Contemporary World: Theoretical Approaches and Empirical Implementations[A]. Proceedings of 2019 International Conference on Contemporary Education, Social Sciences and Humanities(ICCESSH 2019)[C]. 201928、T ong Ama,Katsunori Furuya. Comparison among Different Ethnic Groups Regarding Plays and Nature Experience in Memory by University Students in Tibet Highland in China[A]. 第十三届中日韩风景园林学术研讨会论文集[C]. 201929、Yangjie Lu. Procedure Standardization and Result Efficiency:the Method to Deal With the Ethnic Affairs[A]. Journal of Simulation(VOL.3,NO.4)[C]. 201930、Chua Bee Seok,Ferlis Bin Bahari,Lailawati Madlan,Jasmine Adela Mutang,Nur Farhana,Ardillah Aftar. Parents' Ethnic Socialization Practices,Ethnic Identity and Psychological Adjustment among Multi Ethnic Children in Sabah,Malaysia[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 201931、XU Cai-ming,MIAO Ya,WANG Xi,YANG Ting,HU Min-min. Construction on the Social Management Functions of the EthnicTownship Government in China[A]. Proceedings of 2019 International Conference on Public Administration(9th)(Volume Ⅱ)[C]. 201932、SHI Zheng-yi,HUANG Fang. An Analysis of Mass Incidents in China's Border Ethnic Regions: From Psychological, Legal and Developmental Perspective[A]. Proceedings of 2019 International Conference on Public Administration(7th)(Volume Ⅰ)[C]. 201933、Changping Ke. The Harmonious Index System of Building a Moderately Prosperous Society in Minority Nationality Regions in Yunnan Province[A]. Proceedings of 2019 2nd International Conference in Humanities,Social Sciences and Global Business Management(ISSGBM 2019 V27)[C]. 201934、LI Jun-qing. Public Service and Protection of Ethnic Minorities Culture-The Case of China[A]. Proceedings of 2019 International Conference on Public Administration(7th)(Volu me Ⅰ)[C]. 201935、GAO Yanning,JIN Haihe. Study on the Mechanism Construction of the Social Stability in Frontier Ethnic Regions in China[A]. 2019公共管理国际会议论文集(第十届)(下)[C]. 2019 会计职业道德外文参考文献二:37、Habibie Ibrahim,Sally Johnson,Philip Gilligan. The Perceptions of the Malaysian Professional on Emotions in Decision-Making Processes[A]. Proceedings of International Conference on Trends in Social Sciences and Humanities (TSSH-2019, Indonesia)[C]. 201938、Nur Saadah Mohd Shapri,Riza Sulaiman,Abdullah Bade. Collision Detection between Cloth and a Solid Object using Mass Spring Model and Bounding Volume Hierarchy[A]. Proceedings of 2019 International Conference on Image Processing,Production and Computer Science (ICIPCS'2019);2019 International Conference on Chemical, Metallurgy and Environmental Engineering (ICCMEE-15);International Conference on Innovations in Civil and Structural Engineering (ICICSE'15)[C]. 201939、Mailin Misson,Bo Jin,Hu Zhang. Immobilized β-Galactosidase on Functionalized Nanoparticles and Nanofibers: A Comparative Study[A]. Proceedings of 2019 4th International Conference on Environment, Chemistry and Biology[C]. 201940、Ak.Mohd Rafiq Ak.Matusin,Norazah Mohd Suki,Mahadimenakbar Mohamed Dawood,Fiffy Hanisdah Saikim. Activity and Support Factors Influencing Increased Value Of Invertebrates In Ecotourism[A]. Proceedings of International Conference on Advances in Agricultural, Biological & Environmental Sciences(AABES-2019, Dubai)[C]. 201941、M.K.M Ali,J.V.H.Wong,J.Sulaiman,J.L.Juli,S.Md.Yasir. Improvement of Growth and Mass of Kappaphycus Striatum var. Sacol by Using Plant Density Study at Selakan Island in Semporna Malaysia[A]. Proceedings of International Conference on Biological, Chemical and Environmental Sciences (BCES-2019, Penang)[C]. 201942、Syahriel Abdullah,Januarius Gobilik,Khim-Phin Chong. In vitro Antimicrobial Mode of Action of Cynodon dactylon(L.)Pers.Solid Phase Extract(SPE)against Selected Pathogens[A]. Proceedings of International Conference on Civil,Biological and Environmental Engineering (CBEE-2019, Istanbul)[C]. 201943、Mohd.Asraff Amzani. Simulation Study of Online Game Performance over Mobile Ad-Hoc Network(MANET)[A]. Proceedings of Int'l Conf. on Advances in Science, Engg., Technology & Natural Resources (ICASETNR-2019, KotaKinabalu)[C]. 201944、Jia Hui Ong,Jason Teo. Exploring Mutation Space in the Interactive Evolution of an Android Arcade-type Game[A]. Proceedings of Int'l Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2019, Kuala Lumpur)[C]. 201945、Murali Krishnan,Muralindran Mariappan. EEG-Based Brain-Machine Interface(BMI) for Controlling Mobile Robots: The Trend of Prior Studies[A]. International Scientific Academy of Engineering and Technology (ISAET)Conference Proceeding[C]. 201946、SURUGAU,L.Noumie,BERGSTR諱,Ed T.,GOODALL,David M Capillary array electrophoresis of peptides using UV imaging detector[A]. 13th Asian Chemical Congress Abstract Book (1)[C]. 201947、 A.J.,Olarewaju,N.S.V.,Kameswara Rao,M.A.,Mannan. Response of Underground Pipes Due to Underground Blast[A]. 2019国际农业工程大会亚洲论坛分会场论文集[C]. 201948、Rossita Shapawi,Saleem Mustafa,Ng Wing-Keong. Effects of dietary carbohydrate source and level on growth,feed utilization and body composition of the humpback grouper,Cromileptes altivelis[A]. Program & Abstracts of the 14th International Symposium on Fish Nutrition & Feeding[C]. 201949、Jedol Dayou,Ng Chee Han,Ho Chong Mun,Abdul Hamid Ahmad,Sithi V.Muniandy,Mohd.Noh Dalimin. ENTROPY APPROACH FOR BIOACOUSTICS SIGNAL ANALYSIS OF REPETITIVE NOTES[A]. Proceedings of International Conference on Biology, Environment and Chemistry(ICBEC 2019)[C]. 201950、Jedol Dayou,Ng Chee Han,Ho Chong Mun,Abdul Hamid Ahmad,Sithi V.Muniandy,Mohd.Noh Dalimin. CLASSIFICATIONAND IDENTIFICATION OF FROG SOUND BASED ON ENTROPY APPROACH[A]. Proceedings of International Conference on Life Science and Technology(ICLST 2019)[C]. 201951、Muralindran Mariappan,Vigneswaran Ramu,Thayabaren Ganesan,Brendan Khoo,Kumarheshan Vellian. Virtual Medical Instrument for OTOROB Based on LabVIEW for Acquiring Multiple Medical Instrument LCD Reading Using Optical Character Recognition[A]. Proceedings of International Conference on Biomedical Engineering and Technology(ICBET 2019)[C]. 201952、Tiek Ying Lau,Wan Fen Joveen-Neoh,Ka Lung Chong. Molecular Detection of Plasmodium knowlesi in the Interior Division of Sabah,Malaysian Borneo[A]. Proceedings of International Conference on Food Engineering and Biotechnology(ICFEB 2019)[C]. 201953、Muralindran Mariappan,Vigneswaran Ramu,Thayabaren Ganesan,Brendan Khoo,Kumarheshan Vellian. A Remote Navigation Methodology for a Four Wheel Rectangular Configured Holonomic Mobile Telemedicine Robot[A]. Proceedings of International Conference on Biomedical Engineering and T echnology(ICBET 2019)[C]. 201954、MohdFairusJalil,MaryatiMohamed,PatrickAndau,IsabelleLackma n-Ancrenaz,MarcAncrenaz,MichaelW.Bruford,BenoitGoossens. ORANGUTAN CONSERVATION GENETICS IN THE KINABATANGAN WILDLIFE SANCTUARY, SABAH, MALAYSIA: A DARWIN INITIATIVE FOR THE SURVIVAL OF SPECIES PROJECT[A]. Abstracts of the Xixth Congress The International Primatological Society[C]. 201955、Chiew, S. L.,Lum, M. S Accumulation of rishitin in tomatoafter elicited by silver nitrate[A]. Abstracts of the 1st International Conference on Plant Secondary Metabolism[C]. 201956、Horng Yuan Saw,Sivakumar Kumaresan,Jidon Janaun. Investigations on the Hydration Properties of Palm Kernel Cake Used as a Substrate for Solid State Fermentation[A]. Book of Abstracts of the 12th Asian Pacific Confederation of Chemical Engineering Congress(Vol 4 Biotechnology)[C]. 201957、Jacob Sow,Patricia Anthony,Chong Mun Ho. Empirical Study on the Market Economy Analysis for Online Auctions with Homogeneous and Heterogeneous Bidder Agents[A]. The proceedings of 2019 International Conference on Information and Intelligent Computing[C]. 201958、Norazah Mohd Suki,Norbayah Mohd Suki. Patient Satisfaction,Trust,Commitment and Loyalty toward Doctors[A]. The Proceedings of 2019 International Conference on Sociality and Economics Development[C]. 201959、Suraya Sintang,Khadijah Mohd.Khambali,Azizan Baharuddin,Mahmud Ahmad. Interfaith Marriage and Religious Conversion:a Case Study of Muslim Converts in Sabah,Malaysia[A]. The Proceedings of 2019 2nd International Conference on Behavioral,Cognitive and Psychological Sciences[C]. 201960、Jason Miin-Hwa Lim. Recounting and Justifying Data Analysis Procedures in Experimental Studies:An Investigation into Research Reports on Language Education[A]. The Proceedings of 2019 International Conference on Humanities,Society and Culture[C]. 201961、Venus Khim-Sen Liew,Ricky Chee-Jiun Chia. Revisiting Purchasing Power Parity of Papua New Guinea[A]. The Proceedings of 2019 International Conference on Economics,Business and Management[C]. 201962、Suwaibah Zakaria,Chua Bee Seok,Agnis Sombuling,Mohd Sharani Ahmad,Shazia Iqbal Hashmi. Reliability and Validity for Malay Version of Bayley Scales of Infant and Toddler Development-Third Edition (Bayley-Ⅲ):Preliminary Study[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 201963、Agnis Sombuling,Suwaibah Zakaria,Chua Bee Seok,Rosnah Ismail,Uichol Kim. Sadness from the Perspectives of Adolescents in Malaysia[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 201964、Chua Bee Seok,Ferlis Bin Bahari,Lailawati Madlan,Jasmine Adela Mutang,Nur Farhana,Ardillah Aftar. Parents' Ethnic Socialization Practices,Ethnic Identity and Psychological Adjustment among Multi Ethnic Children in Sabah,Malaysia[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 201965、Shazia Iqbal Hashmi,Chua Bee Seok,Murnizam Hj Halik,Carmella E.Ading. Mastery Motivation and Cognitive Development among Toddlers:A Developmental Perspective[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 201966、Ferlis Bullare. Using Grounded Theory for Studying Meaningful Happiness among People with Physical Disabilities in Malaysia[A]. Proceedings of 2019 International Conference on Psychological Sciences and Behaviors[C]. 2019。

国外英文原版图书参考文献规范(3篇)

国外英文原版图书参考文献规范(3篇)

国外英文原版图书参考文献规范(3篇)国外英文原版图书参考文献规范(一)Implications of ipsilateral spatial neglect after stroke(中风后单侧忽略的影响)Lastupdated: Tuesday 7 October 2014 at 1am PSTStroke researchers have confirmed that damageto the right frontal-subcortical network may cause ipsilateral spatial neglect.A difference was alsoseen in spatial bias, ie, the type of spatial errors among this group tended tobe 'where'(perceptual-attentional) rather than 'aiming' (motor-intentional)errors.IpsilesionalNeglect: Behavioral and Anatomical Correlates was published online ahead ofprint by Neuropsychology.The study was conductedin 12 patients with ipsilateral neglect.A computerizedline-bisection task was used to evaluate spatial errors of 'where' and 'aiming' Little is known about ipsilateral neglect, which is much less common thancontralesional neglect, noted Dr. Barrett. Our findings confirmthat of prior studies showing that these patients tend to have lesions ofthefrontal-subcortical network.An unexpected findingwas the spatial bias toward 'where' errors in this group.Weneed further investigation to determine the differences in functional deficitsbetween ipsilateral and contralateral neglect, and the clinical implications ofthose differences for rehabilitation interventions.国外英文原版图书参考文献规范(二)Cyborg science for the future(未来的机器人科学)Lastupdated: Tuesday 12 August 2014 at 12am PSTNo longer justfantastical fodder for sci-fi buffs, cyborg technology is bringing us tangibleprogress toward real-life electronic skin, prosthetics andultraflexiblecircuits. Now taking this human-machine concept to an unprecedented level,pioneering scientists are working on the seamless marriage between electronicsand brain signaling with the potential to transform our understanding of howthe brain works - and how to treat its most devastating diseases.Their presentation tookplace at the 248th National Meeting & Exposition of the American ChemicalSociety (ACS), the world's largest scientific society.By focusing on thenanoelectronic connections between cells, we can do things no one has donebefore, says Charles M. Lieber, Ph.D. We're really going into a newsize regime for not only the device that records or stimulates cellularactivity, but also for the whole circuit. We can make it really look and behavelike smart, soft biological material, and integrate it with cells and cellularnetworks at the whole-tissue level. This could get around a lot of serioushealth problems in neurodegenerative diseases in the future.These disorders, such asParkinson's, that involve malfunctioning nerve cells can lead to difficultywith the most mundane and essential movements that most of us take for granted:walking, talking, eating and swallowing.Scientists are workingfuriously to get to the bottom of neurological disorders. But they involve thebody's most complex organ - the brain - which is largely inaccessible todetailed, real-time scrutiny. This inability to see what's happening in thebody's command center hinders the development of effective treatments for diseasesthat stem from it.By usingnanoelectronics, it could become possible for scientists to peer for the firsttime inside cells, see what's going wrong in real time and ideally set them ona functional path again.For the past severalyears, Lieber has been working to dramatically shrink cyborg science to a levelthat's thousands of times smaller and more flexible than other bioelectronicresearch efforts. His team has made ultrathin nanowires that can monitor andinfluence what goes on inside cells. Using these wires, they have builtultraflexible, 3-D mesh scaffolding with hundreds of addressable electronicunits, and they have grown living tissue on it. They have also developed thetiniest electronic probe ever that can record even the fastest signaling betweencells.Rapid-fire cellsignaling controls all of the body's movements, including breathing andswallowing, which are affected in some neurodegenerative diseases. And it's atthis level where the promise of Lieber's most recent work enters the picture.In one of the lab'slatest directions, Lieber's team is figuring out how to inject their tiny,ultraflexible electronics into the brain and allow them to become fullyintegrated with the existing b#from 国外英文原版图书参考文献规范(3篇)来自 end#iological web of neurons. They're currently inthe early stages of the project and are working with rat models.It's hard to saywhere this work will take us, he says. But in the end, I believeour unique approach will take us on a path to do something reallyrevolutionary.TitleNanoelectronicsmeetsbiology: From new tools to electronic therapeuticsAbstractNanoscale materialsenable unique opportunities at the interface between the physical and lifesciences, and the interfaces between nanoelectronic devices and cells, cellnetworks, and tissue makes possible communication between these systems at thelength scale relevant to biological function. In this presentation, thedevelopment of nanowire nanoelectronic devices and their application aspowerful tools for the recording and stimulation from the level of single cellsto tissue will be discussed. First, a brief introduction to nanowirenanoelectronic devices as well as comparisons to other tools will be presentedto illuminate the unique strengths and opportunities enabled by activeelectronic devices. Second, opportunities for the creation of powerful newprobes capable of intracellular recording and stimulation at scales heretoforenot possible with existing electrophysiology techniques will be discussed.Third, we will take an 'out-of-the-box' look and consider mergingnanoelectronics with cell networks in three-dimensions (3D). We will introducegeneral methods and provide examples of synthetic 'cyborg' tissues innervatedwith nanoelectronic sensor elements that enabling recording and modulating activityin 3D for these engineered tissues. In addition, we will discuss extension ofthese nanoelectronic scaffold concepts for the development of revolutionaryprobes for acute and chronic brain mapping as well as their potential as futureelectronic therapeutics. The prospects for broad-ranging applications in thelife sciences as the distinction between electronic and living systems isblurred in the future will be discussed.国外英文原版图书参考文献规范(三)例(1) (7)选自英国Edinburgh University Press出版的Modern North American Criticism and Theory: A Critical Guide。

桥梁建设外文翻译参考文献

桥梁建设外文翻译参考文献

桥梁建设外文翻译参考文献1. NCHRP Report 724: Guidelines for Vegetation Management on Low-Volume Roads- 作者:Graham, Melinda S.; Miller, Nathan W.- 出版年份:2012年- 主题:该研究报告提供了低交通量道路上植被管理的指导方针,以帮助道路管理者有效管理植被并确保道路安全。

2. ASCE Journal of Bridge Engineering: Long-Term Performance Monitoring of Bridges- 作者:Steen, Ryan R.; DeWolf, Ronald J.; Cerato, Amy B.- 出版年份:2018年- 主题:该期刊文章介绍了监测桥梁长期性能的方法和技术,以评估桥梁结构的强度和安全性,并提出了预防维护的建议。

3. TRB Special Report 233: Bridge and Infrastructure Financing- 作者:National Research Council- 出版年份:2018年- 主题:该专题报告讨论了桥梁和基础设施融资的问题,包括不同的融资模式、可持续融资策略以及政府和私有部门之间的合作机制。

4. Journal of Bridge Structures: Innovative Materials for Bridge Construction- 作者:Ozyildirim, Celal; Ilki, Alper- 出版年份:2015年- 主题:该期刊文章介绍了用于桥梁建设的创新材料,包括纤维增强复合材料、高性能混凝土和聚合物改性材料等,以提高桥梁的性能和耐久性。

5. FHWA Report FHWA-IF-12-052: Bridge Design for Service Life Beyond 100 Years- 作者:Federal Highway Administration- 出版年份:2012年- 主题:该报告提供了设计具有100年以上使用寿命的桥梁的指南和方法,包括结构耐久性、材料选用、预防性维护等方面的考虑。

建筑施工安全管理外文翻译参考文献

建筑施工安全管理外文翻译参考文献

建筑施工安全管理外文翻译参考文献1. Chen, J., & Skibniewski, M. J. (2017). Construction project safety management in China: A 2004–2014 research review. Safety Science, 93, 96-105.2. Yang, Y., Leung, Y. T., Chan, A. P., & Lu, W. (2018). Research trends and topics in construction safety management literature: A bibliometric analysis. Safety Science, 103, 255-264.3. Abdou, D. E. S., & Hassanein, M. K. (2019). Assessment of construction safety management factors affecting safety performance in Egypt. Alexandria Engineering Journal, 58(2), 767-777.4. Ling, F. Y., Chong, H. Y., Lan, Y., & Lu, W. (2020). A reviewof safety climate research from 2012 to 2018: Bibliometric analysis considering the construction industry's perspective. Safety Science, 125, .5. Zhang, Q., Jia, R., Zuo, J., & Hu, Y. (2019). Exploring the effects of construction workers’ safety behavior and safety climate onsafety performance: A multilevel analysis approach. Safety Science, 118, 502-512.6. Alazemi, K., & Kartam, N. (2014). Assessing safety performance index for construction projects in Kuwait. Journal of Construction Engineering and Management, 140(1), .7. Ardeshir, A., & Mohammadfam, I. (2015). Safety climate improvement framework for construction industry. International Journal of Injury Control and Safety Promotion, 22(1), 47-58.9. Lingard, H., & Rowlinson, S. (2015). Occupational health and safety in construction project management. Routledge.10. Sumner, N. (2019). Construction project management: An integrated approach. Routledge.11. Chikumba, T. (2017). Construction health and safety management systems in developing countries: The case of Zimbabwe. Journal of Civil Engineering and Management, 23(2), 163-175.12. Hadipriono, F. C., & Stamatis, D. H. (2016). Construction safety management. John Wiley & Sons.以上是一些关于建筑施工安全管理的外文翻译参考文献,涵盖了安全管理研究、安全氛围、安全绩效等方面的内容,有助于进一步了解该领域的研究动态和相关理论。

外文文献下载网站

外文文献下载网站

开题报告主要包括以下几个方面:(一)论文名称论文名称就是课题的名字第一,名称要准确、规范。

准确就是论文的名称要把论文研究的问题是什么,研究的对象是什么交待清楚,论文的名称一定要和研究的内容相一致,不能太大,也不能太小,要准确地把你研究的对象、问题概括出来。

第二,名称要简洁,不能太长。

不管是论文或者课题,名称都不能太长,能不要的字就尽量不要,一般不要超过20个字。

(二)论文研究的目的、意义研究的目的、意义也就是为什么要研究、研究它有什么价值。

这一般可以先从现实需要方面去论述,指出现实当中存在这个问题,需要去研究,去解决,本论文的研究有什么实际作用,然后,再写论文的理论和学术价值。

这些都要写得具体一点,有针对性一点,不能漫无边际地空喊口号。

主要内容包括:⑴研究的有关背景(课题的提出):即根据什么、受什么启发而搞这项研究。

⑵通过分析本地(校)的教育教学实际,指出为什么要研究该课题,研究的价值,要解决的问题。

(三)本论文国内外研究的历史和现状(文献综述)。

规范些应该有,如果是小课题可以省略。

一般包括:掌握其研究的广度、深度、已取得的成果;寻找有待进一步研究的问题,从而确定本课题研究的平台(起点)、研究的特色或突破点。

(四)论文研究的指导思想指导思想就是在宏观上应坚持什么方向,符合什么要求等,这个方向或要求可以是哲学、政治理论,也可以是政府的教育发展规划,也可以是有关研究问题的指导性意见等。

(五)论文写作的目标论文写作的目标也就是课题最后要达到的具体目的,要解决哪些具体问题,也就是本论文研究要达到的预定目标:即本论文写作的目标定位,确定目标时要紧扣课题,用词要准确、精练、明了。

常见存在问题是:不写研究目标;目标扣题不紧;目标用词不准确;目标定得过高, 对预定的目标没有进行研究或无法进行研究。

确定论文写作目标时,一方面要考虑课题本身的要求,另一方面要考率实际的工作条件与工作水平。

(六)论文的基本内容研究内容要更具体、明确。

公共关系的外文参考文献

公共关系的外文参考文献

公共关系的外文参考文献1. Cutlip, S. M., Center, A. H., & Broom, G. M. (2006). Effective public relations. Pearson Education India.2. Grunig, J. E., & Hunt, T. (1984). Managing public relations. Holt, Rinehart and Winston.3. Ledingham, J. A., & Bruning, S. D. (2000). Public relations as relationship management: A relational approach to the study and practice of public relations. Lawrence Erlbaum Associates.4. Wilcox, D. L., Cameron, G. T., & Xifra, J. (2013). Public relations: Strategies and tactics. Pearson.5. Botan, C. H., & Hazleton, V. (2006). Publicrelations theory II. Routledge.6. Grunig, J. E. (1992). Excellence in public relations and communication management. Routledge.7. Sriramesh, K., & Vercic, D. (2003). The global public relations handbook: Theory, research, and practice. Routledge.8. Moss, D. C. (2007). Public relations, security and the shaping of public opinion: An analysis of the UK security industry. Ashgate Publishing, Ltd.9. Heath, R. L., & Coombs, W. T. (2006). Today's public relations: An introduction. SAGE Publications.10. Toth, E. L. (2007). The future of excellence in public relations and communication management: Challenges for the next generation. Lawrence Erlbaum Associates.这些参考文献涵盖了公共关系领域的各个方面,包括理论、实践、战略、关系管理等,可以作为研究和学习公共关系的重要参考资料。

家具创新外文翻译参考文献

家具创新外文翻译参考文献

家具创新外文翻译参考文献1. Yu, X. L., & Lu, J. (2019). Innovative Design of Furniture Based on Livability: Taking the Design of Children's Desk as an Example. Advances in Engineering Research, 264-264.2. Candi, M., Damasceno, M. F., & Bezerrra, A. K. (2021). Innovation in furniture design: A look at production processes and material choices. Journal of Industrial and Production Engineering,38(1), 56-68.3. González-Zamar, M. D. P., & Suárez-Torres, J. (2020). Customer-oriented innovation in furniture design: key factors and approaches. Journal of Engineering Designs, 31(5), 234-247.4. Zhang, P., & Cheng, X. (2020). Analysis of the Innovation Model of High-end Customized Furniture Design. Journal of Applied Science and Engineering Innovation, 555-562.5. Wernick, J. S., & Katz, A. E. (2021). Design and Innovation for Office Furniture: High-Quality Design for the Workspace. International Journal of Humanoid Robotics.以上是一些文献参考,介绍了家具创新设计的不同方面,包括客户导向创新、高端定制家具的创新模式、基于舒适度的创新设计以及办公家具设计的创新和发展等。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

外文原文Introduction to Javaautor:Martin Ngobye.source:Computing Static Slice for Java ProgramsJava is designed to meet the challenges of application development in the context of heterogeneous, network-wide distributed environments. Paramount among these challenges is secure delivery of applications that consume the minimum of system resources, can run on any hardware and software platform, and can be extended dynamically.Java originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop.The design requirements of Java are driven by the nature of the computing environments in which software must be deployed.The massive growth of the Internet and the World-Wide Web leads us to a completely new way of looking at development and distribution of software. To live in the world of electronic commerce and distribution, Java must enable the development of secure, high performance, and highly robust applications on multiple platforms in heterogeneous, distributed networks.Operating on multiple platforms in heterogeneous networks invalidates the traditional schemes of binary distribution, release, upgrade, patch, and so on. To survive in this jungle, Java must be architecture neutral, portable, and dynamically adaptable.The Java system that emerged to meet these needs is simple, so it can be easily programmed by most developers; familiar, so that current developers can easily learnJava; object oriented, to take advantage of modern software development methodologies and to fit into distributed client-server applications; multithreaded, for high performance in applications that need to perform multiple concurrent activities, such as multimedia; and interpreted, for maximum portability and dynamic capabilities.Together, the above requirements comprise quite a collection of buzzwords, so let’s examine some of them and their respective benefits before going on.What’s completely new is the manner in which Java and its run-time system have combined them to produce a flexible and powerful programming system..Developing your applications using Java results in software that is portable across multiple machine architectures, operating systems, and graphical user interfaces, secure, and high performance, With Java, your job as a software developer is much easier—you focus your full attention on the end goal of shipping innovative products on time, based on the solid foundation of Java. The better way to develop software is here, now, brought to you by the Java language platform.Very dynamic languages like Lisp, TCL, and SmallTalk are often used for prototyping. One of the reasons for their success at this is that they are very robust—you don’t have to worry about freeing or corrupting memory.Similarly, programmers can be relatively fearless about dealing with memory when programming in Java, The garbage collecti on system makes the programmer’s job vastly easier; with the burden of memory management taken off the programmer’s shoulders, storage allocation errors go away. Another reason commonly given that languages like Lisp, TCL, and SmallTalk are good for protot yping is that they don’t require you to pin down decisions early on—these languages are semantically rich.Java has exactly the opposite property: it forces you to make explicit choices. Along with these choices come a lot of assistance—you can write method invocations and, if you get something wrong, you get told about it at compile time. You don’t have to worry about method invocation error.The Java beginner must grasp 30 basic conceptsBasic concept1.In OOP the only relations is what the object’s interface, such as the computer seller he leaves alone internal structure of electrical source, but he is only concerned about that whether the power will be supplied to you, also so long as know can or not butis not how and why.All procedures are make up of certain attribute and the behavior object, the different object visit invokes through the function invocation, between the object all intercommunion are invoke through the method invocation, By object data encapsulation, enhances reuse rate very much..2.In OOP the most important thought is class, the class is the template ,is a blueprint, construct an object from a class, namely construct an instance of the class.3. Encapsulation: is that combines the data and the behavior in a package) and hides the data the realization process to the object user, in an object data is called its instance field.4.Through expands a class to obtain a new class is called inheritance, but all classes are constructed by the object super root class of expansion, super root class of as follows can make the introduction.5.Object 3 principal characteristicsBehavior--- explained this object can make what.Tate--- when the object exerts the method object reflection.Dentity--- and other similar behavior objects discrimination symbols.Each object has only indentity and among three characteristics they affect mutually.6. Relations among classes:Use-a:Dependent relationHas-a:Polymerization relationIs-a: inheritor relation -- example:A class has inherited B class, this time A class not only has B class of method, but also has its own method(Individuality exists in general character)7.Structure object use structure:Structure proposing, the structure is one special method, the structure object and to its initialization.Example:A Data class of structure calls DataNew Data () --- structure a new object, also initialize current time.Data happyday=new Data () --- an object evaluates an variable happyday, thus enables this object to be used many times, here be stated the cause variable and the object variable are different.New returns the value is a quotation.Constructor characteristic:The constructor may have 0, one or many parametersThe constructor and the class have the same nameA class may have many constructor. The constructor has not returned valueThe constructor always be together used with the new operator8. Over loading: When many methods have the same name when includes the different parameter, then has the over loading Which method does the compiler have to choose invokes.9.Package : Java allow one or many classes to become together as group, is called package, to organizing duty easily, the standard Java storehouse divides into many packages ng java.Util java, net and so on, the package is layered and all java packages are in java and in a javax package.10. Extendable thought: permit to construct new class on existing classes , when you extend the class which already existed, then you reuse this class of method and the field, at the same time you might add the new method and the field in the new class.11.Expandable class:The expandable class fully manifested is-a to extend the relations The form is:Class (subclass) extends (base class).12. Multi-modality: In java, the object variable is multi-modality But in java does not support multiple extend.13.Dynamic combine: the mechanism of invoking object method mechanism.1) compiler examines object statement type and method name.2) the compiler examines that method invokes parameter type.3) static combine: If the method type is priavte static the final ,compiler can accurately know which method should invoke.4) when the procedure runs and uses dynamic combine to invoke a method, the method edition which then hypothesized machine must invoke x the object actual type which aims at to match.5) dynamic combine: is a very important characteristic, it can cause the procedure to change again may expand but does not need to translate has saved the code.14.Final class:In order to prevent other people derive the new class from yours class, this class is cannot expanded.15.The dynamic invocation spend longer time than the static invocation expenditure.16.Abstract class:Stipulated or many abstract methods class of itself must define is abstract.Example: Public abstract string getDescripition17.In Java each class is be extended by object class.18. equal and toString method in object class .Equal uses in testing an object is whether equal with another object.ToString returns to represent this object the string of character, each class can nearly over loading this method, in order to returns to the current condition the correct expression.(The toString method is a very important method)19.General programming:Any class of type all values all may replace with a object class of variable.20.The array tabulates: The ArrayList dynamic array tabulates, is a class of storehouse, defines in java.In uitl package, but automatic control array size.21.in class and class of object ,getclass method returns to the class type an example, when the procedure start contains can increase in the main method class, hypothesized confidential increase all classes which he needs, each increase class all must increase the class which it needs.22.The class: class might dynamic operate the java code for the compilation the procedure to provide the formidable function reflection, this function was JavaBeans is specially useful, the use reflected Java to be able to support the VB programmer to be familiar with the use the tool.procedure of analysis class ability is called the reflector, in Java to provide this function the package to call ng.The reflect reflection mechanism is extremely formidable.1) when run analysis class ability.2) when run searches observes a class of object.3) realizes the general array operation code.4) provides the method object.But this mechanism mainly aims at the tool but not the application and the procedure.In the reflection mechanism most important part is that permits class that youinspect structure. With to API includes:ng.Reflect.Field returns to the field.Java.Reflect.Method returns to the method.ng.Reflect.Constructor returns to the parameter.Method pointer: Java does not have the method pointer, makes a method address another method, may invoke it in behind, but the interface is the better solution.23. interface: should showing class could do what but not to assign how to do,a class may realize one or many interfaces.24.The interface is not a class, but is to conforms to a interface request class of set of standard.If realizes a interface to need 2 steps:1) the statement class needs to realize assigns the interface.2) provides in the interface all methods definition.Stated a class realizes a interface to need to use the implements key wordsClass actionB implements Comparable its actionb needs to provide the CompareTo method, the interface is not the class, cannot use a new example interface.25.A class only then a super class, but a class can realize many interfaces. In a Java important interface: Cloneable26.The interface and call-back :to programs a commonly used pattern is call-back,in the pattern, you may refer when this class of pattern settled specific time occurs returns to adjusts on the object the method.Example:ActionListener interface monitor.Similar API includes:Java.Swing.JOptionPaneJava.Swing.TimerJava.Awt.Tookit27.Object clone:The clone method is a object protection method, this meant your code cannot simple invoke it.28.Inner class an inner class definition is the definition in another class.The reason is:1) an inner class object can visit founds its object realization, including private data.2) about other classes in the same package in that, inner class can be hided.3) the anonymous inner class may the very convenient definition accent.In 4) uses the category to be possible the extremely convenient compilation event driver.29.Agent class (proxy):1) appointing all codes that interfaces request2) all methods (toString equals) that object class define30.Data type:Java is kind of emphasizing type language, each variable all must be declared its types at first, in java altogether has 8 basic types . four kinds are the long, two kinds are the float, one is the char, being used in the Unicode code char, Boolean.1. java is simpleJava and C + + are very similar, but much simpler. All the high-level programming language features, is not absolutely necessary have been deleted. For example, Java does not overload operator, the title of the document, pre-processing, computing pointer, the structure of the joint, multi-dimensional array, templates and implicit type conversion. If you know a little C, C + + or Pascal, you will soon master Java. Here is a simple procedure JavaHelloWorld:publicclassHelloInternet (publicstaticvoidmain (Stringargv []) (System. out. println ( "HelloIn-ternet!")))2. Java is object-orientedJava is an object-oriented programming language. In addition to the simple types, such as digital and Boolean operators in addition, Java is an object of most. As with any object-oriented languages, Java code also organized by category. Each category provides a definition of the object behavior. Another type of succession can be a kind of behavior. In the category of the root level, often the target category. Java support for the single type of inherited hierarchy. This means that each category can only inherit one other category. Some of the language to allow multiple inheritance, but it may cause confusion and unnecessarily complicated language. For example, imagine that an object would inherit two completely different category. Java also supports the kind ofsummary of the interface. This allows programmers to define the interface methods, and do not have to rush immediately to determine the methods to achieve. A type of interface can be a number of purposes in order to truly multi-inheritance of a number of advantages. The implementation of an object can be any number of interfaces. IDL interface and Java interface very similar. Very easy to set up IDLJ compiler. In other words, Java can be used to create a CORBA object system distributed object system. In the view of many computer systems use IDL interface and CORBA objects, such compatibility is important.3. Java is a type of staticIn a Java program, it is essential to the definition used by the target (number of characters, such as an array) type. This will help programmers quickly found because the procedure when the compiler can detect the type of error. However, Java System objects are also dynamic types. A requirement for the type of dynamic is often possible, so programmers can write the procedures for different types of objects to do different things.4. Is a Java-based compilerWhen running Java programs, which were first compiled into byte code. Byte code is very similar to the machine instructions, so Java program is very efficient. However, the byte code does not specifically for a particular machine, so no need to recompile Java program can be in many different computer implementation. Java source code files were compiled into a category, which is equivalent to process byte code performance. In a Java class file, and an example for all of the variables are in the light of, and for the first time in the implementation of the code be resolved. This makes the code more common and more easily subject to revision, but still high.5. Java is architecture neutralJava language is the same for each computer. For example, simple types are the same: 32-bit integer always, always 64-bit long integers. It is strange, such as C and C + + programming language, and so fashionable it is not the case. As a result of these languages so the definition of freedom, each of the compiler and development environment will be different, so that this process nuisance become a transplant. Java programs can easily gain access to transplants, and there is no need to re-compile.6. Java is a soundJava program can not be caused by the collapse of the computer. Java careful testing of the system memory of each visit, make sure it is legitimate and will not cause any problems. However, even if the Java program may also be wrong. If there is some kind of unexpected things, the process will not collapse, and to abandon the exception. Procedures for such an exception would be found to address them. Traditional computer programs can access the full memory. May (unconsciously) to amend any of the value of memory, which will cause problems. Java program can only access memory to allow them access to those parts of the Java program can not modify it does not seek to change the value.7. Java is a compactAs the Java is designed to run on a small computer, as a programming language for the system is relatively small. It effectively in more than 4MB of RAM to run on PC machine. Java translator occupied by only a few hundred KB. This translator for the Java platform independence and portability is reliable. Due to Java is very small, it is a very small computer memory, such as the Java-based PC, as well as television sets, ovens, telephone and home computer, and so on, it is ideal.8. Java is a multi-threadedJava program can run more than one thread. For example, it can be a thread in a time-consuming to complete the calculation, and other users to interact with the threads of dialogue. Therefore, users do not have to stop working, waiting for the Java computing time-consuming process. In the multi-threaded programming environment, it is often difficult because many things may occur at the same time. However, Java provides easy-to-use features simultaneously, so that the programming easier.。

相关文档
最新文档