信工学院毕业设计外文翻译封面完整版

合集下载

毕设外文原文及译文

毕设外文原文及译文

北京联合大学毕业设计(论文)任务书题目:OFDM调制解调技术的设计与仿真实现专业:通信工程指导教师:张雪芬学院:信息学院学号:2011080331132班级:1101B姓名:徐嘉明一、外文原文Evolution Towards 5G Multi-tier Cellular WirelessNetworks:An Interference ManagementPerspectiveEkram Hossain, Mehdi Rasti, Hina Tabassum, and Amr AbdelnasserAbstract—The evolving fifth generation (5G) cellular wireless networks are envisioned to overcome the fundamental challenges of existing cellular networks, e.g., higher data rates, excellent end-to-end performance and user-coverage in hot-spots and crowded areas with lower latency, energy consumption and cost per information transfer. To address these challenges, 5G systems will adopt a multi-tier architecture consisting of macrocells, different types of licensed small cells, relays, and device-to-device (D2D) networks to serve users with different quality-of-service (QoS) requirements in a spectrum and energy-efficient manner. Starting with the visions and requirements of 5G multi-tier networks, this article outlines the challenges of interference management (e.g., power control, cell association) in these networks with shared spectrum access (i.e., when the different network tiers share the same licensed spectrum). It is argued that the existing interference management schemes will not be able to address the interference management problem in prioritized 5G multitier networks where users in different tiers have different priorities for channel access. In this context, a survey and qualitative comparison of the existing cell association and power control schemes is provided to demonstrate their limitations for interference management in 5G networks. Open challenges are highlighted and guidelines are provided to modify the existing schemes in order to overcome these limitations and make them suitable for the emerging 5G systems.Index Terms—5G cellular wireless, multi-tier networks, interference management, cell association, power control.I. INTRODUCTIONTo satisfy the ever-increasing demand for mobile broadband communications, the IMT-Advanced (IMT-A) standards have been ratified by the International Telecommunications Union (ITU) in November 2010 and the fourth generation (4G) wireless communication systems are currently being deployed worldwide. The standardization for LTE Rel-12, also known as LTE-B, is also ongoing and expected to be finalized in 2014. Nonetheless, existing wireless systems will not be able to deal with the thousand-fold increase in total mobile broadband data [1] contributed by new applications and services such as pervasive 3D multimedia, HDTV, VoIP, gaming, e-Health, and Car2x communication. In this context, the fifth generation (5G) wireless communication technologies are expected to attain 1000 times higher mobile data volume per unit area,10-100 times higher number of connecting devices and user data rate, 10 times longer battery life and 5 times reduced latency [2]. While for 4G networks the single-user average data rate is expected to be 1 Gbps, it is postulated that cell data rate of theorder of 10 Gbps will be a key attribute of 5G networks.5G wireless networks are expected to be a mixture of network tiers of different sizes, transmit powers, backhaul connections, different radio access technologies (RATs) that are accessed by an unprecedented numbers of smart and heterogeneous wireless devices. This architectural enhancement along with the advanced physical communications technology such as high-order spatial multiplexing multiple-input multiple-output (MIMO) communications will provide higher aggregate capacity for more simultaneous users, or higher level spectral efficiency, when compared to the 4G networks. Radio resource and interference management will be a key research challenge in multi-tier and heterogeneous 5G cellular networks. The traditional methods for radio resource and interference management (e.g., channel allocation, power control, cell association or load balancing) in single-tier networks (even some of those developed for two-tier networks) may not be efficient in this environment and a new look into the interference management problem will be required.First, the article outlines the visions and requirements of 5G cellular wireless systems. Major research challenges are then highlighted from the perspective of interference management when the different network tiers share the same radio spectrum. A comparative analysis of the existing approaches for distributed cell association and power control (CAPC) is then provided followed by a discussion on their limitations for5G multi-tier cellular networks. Finally, a number of suggestions are provided to modifythe existing CAPC schemes to overcome these limitations.II. VISIONS AND REQUIREMENTS FOR 5G MULTI-TIERCELLULAR NETWORKS5G mobile and wireless communication systems will require a mix of new system concepts to boost the spectral and energy efficiency. The visions and requirements for 5G wireless systems are outlined below.·Data rate and latency: For dense urban areas, 5G networks are envisioned to enable an experienced data rate of 300 Mbps and 60 Mbps in downlink and uplink, respectively, in 95% of locations and time [2]. The end-to- end latencies are expected to be in the order of 2 to 5 milliseconds. The detailed requirements for different scenarios are listed in [2].·Machine-type Communication (MTC) devices: The number of traditional human-centric wireless devices with Internet connectivity (e.g., smart phones, super-phones, tablets) may be outnumbered by MTC devices which can be used in vehicles, home appliances, surveillance devices, and sensors.·Millimeter-wave communication: To satisfy the exponential increase in traffic and the addition of different devices and services, additional spectrum beyond what was previously allocated to 4G standard is sought for. The use of millimeter-wave frequency bands (e.g., 28 GHz and 38 GHz bands) is a potential candidate to overcome the problem of scarce spectrum resources since it allows transmission at wider bandwidths than conventional 20 MHz channels for 4G systems.·Multiple RATs: 5G is not about replacing the existing technologies, but it is about enhancing and supporting them with new technologies [1]. In 5G systems, the existing RATs, including GSM (Global System for Mobile Communications), HSPA+ (Evolved High-Speed Packet Access), and LTE, will continue to evolve to provide a superior system performance. They will also be accompanied by some new technologies (e.g., beyondLTE-Advanced).·Base station (BS) densification: BS densification is an effective methodology to meet the requirements of 5G wireless networks. Specifically, in 5G networks, there will be deployments of a large number of low power nodes, relays, and device-to-device (D2D) communication links with much higher density than today’s macrocell networks.Fig. 1 shows such a multi-tier network with a macrocell overlaid by relays, picocells, femtocells, and D2D links. The adoption of multiple tiers in the cellular networkarchitecture will result in better performance in terms of capacity, coverage, spectral efficiency, and total power consumption, provided that the inter-tier and intratier interferences are well managed.·Prioritized spectrum access: The notions of both trafficbased and tier-based Prioriti -es will exist in 5G networks. Traffic-based priority arises from the different requirements of the users (e.g., reliability and latency requirements, energy constraints), whereas the tier-based priority is for users belonging to different network tiers. For example, with shared spectrum access among macrocells and femtocells in a two-tier network, femtocells create ―dead zones‖ around them in the downlink for macro users. Protection should, thus, be guaranteed for the macro users. Consequently, the macro and femtousers play the role of high-priority users (HPUEs) and lowpriority users (LPUEs), respectively. In the uplink direction, the macrocell users at the cell edge typically transmit with high powers which generates high uplink interference to nearby femtocells. Therefore, in this case, the user priorities should get reversed. Another example is a D2D transmission where different devices may opportunistically access the spectrum to establish a communication link between them provided that the interference introduced to the cellular users remains below a given threshold. In this case, the D2D users play the role of LPUEs whereas the cellular users play the role of HPUEs.·Network-assisted D2D communication: In the LTE Rel- 12 and beyond, focus will be on network controlled D2D communications, where the macrocell BS performs control signaling in terms of synchronization, beacon signal configuration and providing identity and security management [3]. This feature will extend in 5G networks to allow other nodes, rather than the macrocell BS, to have the control. For example, consider a D2D link at the cell edge and the direct link between the D2D transmitter UE to the macrocell is in deep fade, then the relay node can be responsible for the control signaling of the D2Dlink (i.e., relay-aided D2D communication).·Energy harvesting for energy-efficient communication: One of the main challenges in 5G wireless networks is to improve the energy efficiency of the battery-constrained wireless devices. To prolong the battery lifetime as well as to improve the energy efficiency, an appealing solution is to harvest energy from environmental energy sources (e.g., solar and wind energy). Also, energy can be harvested from ambient radio signals (i.e., RF energy harvesting) with reasonable efficiency over small distances. The havested energy could be used for D2D communication or communication within a small cell. Inthis context, simultaneous wireless information and power transfer (SWIPT) is a promising technology for 5G wireless networks. However, practical circuits for harvesting energy are not yet available since the conventional receiver architecture is designed for information transfer only and, thus, may not be optimal for SWIPT. This is due to the fact that both information and power transfer operate with different power sensitivities at the receiver (e.g., -10dBm and -60dBm for energy and information receivers, respectively) [4]. Also, due to the potentially low efficiency of energy harvesting from ambient radio signals, a combination of different energy harvesting technologies may be required for macrocell communication.III. INTERFERENCE MANAGEMENT CHALLENGES IN 5GMULTI-TIER NETWORKSThe key challenges for interference management in 5G multi-tier networks will arise due to the following reasons which affect the interference dynamics in the uplink and downlink of the network: (i) heterogeneity and dense deployment of wireless devices, (ii) coverage and traffic load imbalance due to varying transmit powers of different BSs in the downlink, (iii) public or private access restrictions in different tiers that lead to diverse interference levels, and (iv) the priorities in accessing channels of different frequencies and resource allocation strategies. Moreover, the introduction of carrier aggregation, cooperation among BSs (e.g., by using coordinated multi-point transmission (CoMP)) as well as direct communication among users (e.g., D2D communication) may further complicate the dynamics of the interference. The above factors translate into the following key challenges.·Designing optimized cell association and power control (CAPC) methods for multi-tier networks: Optimizing the cell associations and transmit powers of users in the uplink or the transmit powers of BSs in the downlink are classical techniques to simultaneously enhance the system performance in various aspects such as interference mitigation, throughput maximization, and reduction in power consumption. Typically, the former is needed to maximize spectral efficiency, whereas the latter is required to minimize the power (and hence minimize the interference to other links) while keeping theFig. 1. A multi-tier network composed of macrocells, picocells, femtocells, relays, and D2D links.Arrows indicate wireless links, whereas the dashed lines denote the backhaul connections. desired link quality. Since it is not efficient to connect to a congested BS despite its high achieved signal-to-interference ratio (SIR), cell association should also consider the status of each BS (load) and the channel state of each UE. The increase in the number of available BSs along with multi-point transmissions and carrier aggregation provide multiple degrees of freedom for resource allocation and cell-selection strategies. For power control, the priority of different tiers need also be maintained by incorporating the quality constraints of HPUEs. Unlike downlink, the transmission power in the uplink depends on the user’s batt ery power irrespective of the type of BS with which users are connected. The battery power does not vary significantly from user to user; therefore, the problems of coverage and traffic load imbalance may not exist in the uplink. This leads to considerable asymmetries between the uplink and downlink user association policies. Consequently, the optimal solutions for downlink CAPC problems may not be optimal for the uplink. It is therefore necessary to develop joint optimization frameworks that can provide near-optimal, if not optimal, solutions for both uplink and downlink. Moreover, to deal with this issue of asymmetry, separate uplink and downlink optimal solutions are also useful as far as mobile users can connect with two different BSs for uplink and downlink transmissions which is expected to be the case in 5G multi-tier cellular networks [3].·Designing efficient methods to support simultaneous association to multiple BSs: Compared to existing CAPC schemes in which each user can associate to a singleBS, simultaneous connectivity to several BSs could be possible in 5G multi-tier network. This would enhance the system throughput and reduce the outage ratio by effectively utilizing the available resources, particularly for cell edge users. Thus the existing CAPCschemes should be extended to efficiently support simultaneous association of a user to multiple BSs and determine under which conditions a given UE is associated to which BSs in the uplink and/or downlink.·Designing efficient methods for cooperation and coordination among multiple tiers: Cooperation and coordination among different tiers will be a key requirement to mitigate interference in 5G networks. Cooperation between the macrocell and small cells was proposed for LTE Rel-12 in the context of soft cell, where the UEs are allowed to have dual connectivity by simultaneously connecting to the macrocell and the small cell for uplink and downlink communications or vice versa [3]. As has been mentioned before in the context of asymmetry of transmission power in uplink and downlink, a UE may experience the highest downlink power transmission from the macrocell, whereas the highest uplink path gain may be from a nearby small cell. In this case, the UE can associate to the macrocell in the downlink and to the small cell in the uplink. CoMP schemes based on cooperation among BSs in different tiers (e.g., cooperation between macrocells and small cells) can be developed to mitigate interference in the network. Such schemes need to be adaptive and consider user locations as well as channel conditions to maximize the spectral and energy efficiency of the network. This cooperation however, requires tight integration of low power nodes into the network through the use of reliable, fast andlow latency backhaul connections which will be a major technical issue for upcoming multi-tier 5G networks. In the remaining of this article, we will focus on the review of existing power control and cell association strategies to demonstrate their limitations for interference management in 5G multi-tier prioritized cellular networks (i.e., where users in different tiers have different priorities depending on the location, application requirements and so on). Design guidelines will then be provided to overcome these limitations. Note that issues such as channel scheduling in frequency domain, timedomain interference coordination techniques (e.g., based on almost blank subframes), coordinated multi-point transmission, and spatial domain techniques (e.g., based on smart antenna techniques) are not considered in this article.IV. DISTRIBUTED CELL ASSOCIATION AND POWERCONTROL SCHEMES: CURRENT STATE OF THE ARTA. Distributed Cell Association SchemesThe state-of-the-art cell association schemes that are currently under investigation formulti-tier cellular networks are reviewed and their limitations are explained below.·Reference Signal Received Power (RSRP)-based scheme [5]: A user is associated with the BS whose signal is received with the largest average strength. A variant of RSRP, i.e., Reference Signal Received Quality (RSRQ) is also used for cell selection in LTE single-tier networks which is similar to the signal-to-interference (SIR)-based cell selection where a user selects a BS communicating with which gives the highest SIR. In single-tier networks with uniform traffic, such a criterion may maximize the network throughput. However, due to varying transmit powers of different BSs in the downlink of multi-tier networks, such cell association policies can create a huge traffic load imbalance. This phenomenon leads to overloading of high power tiers while leaving low power tiers underutilized.·Bias-based Cell Range Expansion (CRE) [6]: The idea of CRE has been emerged as a remedy to the problem of load imbalance in the downlink. It aims to increase the downlink coverage footprint of low power BSs by adding a positive bias to their signal strengths (i.e., RSRP or RSRQ). Such BSs are referred to as biased BSs. This biasing allows more users to associate with low power or biased BSs and thereby achieve a better cell load balancing. Nevertheless, such off-loaded users may experience unfavorable channel from the biased BSs and strong interference from the unbiased high-power BSs. The trade-off between cell load balancing and system throughput therefore strictly depends on the selected bias values which need to be optimized in order to maximize the system utility. In this context, a baseline approach in LTE-Advanced is to ―orthogonalize‖ the transmissions of the biased and unbiased BSs in time/frequency domain such that an interference-free zone is created.·Association based on Almost Blank Sub-frame (ABS) ratio [7]: The ABS technique uses time domain orthogonalization in which specific sub-frames are left blank by the unbiased BS and off-loaded users are scheduled within these sub-frames to avoid inter-tier interference. This improves the overall throughput of the off-loaded users by sacrificing the time sub-frames and throughput of the unbiased BS. The larger bias values result in higher degree of offloading and thus require more blank subframes to protect the offloaded users. Given a specific number of ABSs or the ratio of blank over total number of sub-frames (i.e., ABS ratio) that ensures the minimum throughput of the unbiased BSs, this criterion allows a user to select a cell with maximum ABS ratio and may even associate with the unbiased BS if ABS ratio decreases significantly. A qualitative comparison amongthese cell association schemes is given in Table I. The specific key terms used in Table I are defined as follows: channel-aware schemes depend on the knowledge of instantaneous channel and transmit power at the receiver. The interference-aware schemes depend on the knowledge of instantaneous interference at the receiver. The load-aware schemes depend on the traffic load information (e.g., number of users). The resource-aware schemes require the resource allocation information (i.e., the chance of getting a channel or the proportion of resources available in a cell). The priority-aware schemes require the information regarding the priority of different tiers and allow a protection to HPUEs. All of the above mentioned schemes are independent, distributed, and can be incorporated with any type of power control scheme. Although simple and tractable, the standard cell association schemes, i.e., RSRP, RSRQ, and CRE are unable to guarantee the optimum performance in multi-tier networks unless critical parameters, such as bias values, transmit power of the users in the uplink and BSs in the downlink, resource partitioning, etc. are optimized.B. Distributed Power Control SchemesFrom a user’s point of view, the objective of power control is to support a user with its minimum acceptable throughput, whereas from a system’s point of view it is t o maximize the aggregate throughput. In the former case, it is required to compensate for the near-far effect by allocating higher power levels to users with poor channels as compared to UEs with good channels. In the latter case, high power levels are allocated to users with best channels and very low (even zero) power levels are allocated to others. The aggregate transmit power, the outage ratio, and the aggregate throughput (i.e., the sum of achievable rates by the UEs) are the most important measures to compare the performance of different power control schemes. The outage ratio of a particular tier can be expressed as the ratio of the number of UEs supported by a tier with their minimum target SIRs and the total number of UEs in that tier. Numerous power control schemes have been proposed in the literature for single-tier cellular wireless networks. According to the corresponding objective functions and assumptions, the schemes can be classified into the following four types.·Target-SIR-tracking power control (TPC) [8]: In the TPC, each UE tracks its own predefined fixed target-SIR. The TPC enables the UEs to achieve their fixed target-TABLE IQUALITATIVE COMPARISON OF EXISTING CELL ASSOCIATION SCHEMESFOR MULTI-TIER NETWORKSSIRs at minimal aggregate transmit power, assuming thatthe target-SIRs are feasible. However, when the system is infeasible, all non-supported UEs (those who cannot obtain their target-SIRs) transmit at their maximum power, which causes unnecessary power consumption and interference to other users, and therefore, increases the number of non-supported UEs.·TPC with gradual removal (TPC-GR) [9], [10], and [11]:To decrease the outage ra -tio of the TPC in an infeasiblesystem, a number of TPC-GR algorithms were proposedin which non-supported users reduce their transmit power[10] or are gradually removed [9], [11].·Opportunistic power control (OPC) [12]: From the system’s point of view, OPC allocates high power levels to users with good channels (experiencing high path-gains and low interference levels) and very low power to users with poor channels. In this algorithm, a small difference in path-gains between two users may lead to a large difference in their actual throughputs [12]. OPC improves the system performance at the cost of reduced fairness among users.·Dynamic-SIR tracking power control (DTPC) [13]: When the target-SIR requirements for users are feasible, TPC causes users to exactly hit their fixed target-SIRs even if additional resources are still available that can otherwise be used to achieve higher SIRs (and thus better throughputs). Besides, the fixed-target-SIR assignment is suitable only for voice service for which reaching a SIR value higher than the given target value does not affect the service quality significantly. In contrast, for data services, a higher SIR results in a better throughput, which is desirable. The DTPC algorithm was proposed in [13] to address the problem of system throughput maximization subject to a given feasible lower bound for the achieved SIRs of all users in cellular networks. In DTPC, each user dynamically sets its target-SIR by using TPC and OPC in a selective manner. It was shown that when the minimum acceptable target-SIRs are feasible, the actual SIRs received by some users can be dynamically increased (to a value higher than their minimum acceptabletarget-SIRs) in a distributed manner so far as the required resources are available and the system remains feasible (meaning that reaching the minimum target-SIRs for the remaining users are guaranteed). This enhances the system throughput (at the cost of higher power consumption) as compared to TPC. The aforementioned state-of-the-art distributed power control schemes for satisfying various objectives in single-tier wireless cellular networks are unable to address the interference management problem in prioritized 5G multi-tier networks. This is due to the fact that they do not guarantee that the total interference caused by the LPUEs to the HPUEs remain within tolerable limits, which can lead to the SIR outage of some HPUEs. Thus there is a need to modify the existing schemes such that LPUEs track their objectives while limiting their transmit power to maintain a given interference threshold at HPUEs. A qualitative comparison among various state-of-the-art power control problems with different objectives and constraints and their corresponding existing distributed solutions are shown in Table II. This table also shows how these schemes can be modified and generalized for designing CAPC schemes for prioritized 5G multi-tier networks.C. Joint Cell Association and Power Control SchemesA very few work in the literature have considered the problem of distributed CAPC jointly (e.g., [14]) with guaranteed convergence. For single-tier networks, a distributed framework for uplink was developed [14], which performs cell selection based on the effective-interference (ratio of instantaneous interference to channel gain) at the BSs and minimizes the aggregate uplink transmit power while attaining users’ desire d SIR targets. Following this approach, a unified distributed algorithm was designed in [15] for two-tier networks. The cell association is based on the effective-interference metric and is integrated with a hybrid power control (HPC) scheme which is a combination of TPC and OPC power control algorithms.Although the above frameworks are distributed and optimal/ suboptimal with guaranteed convergence in conventional networks, they may not be directly compatible to the 5G multi-tier networks. The interference dynamics in multi-tier networks depends significantly on the channel access protocols (or scheduling), QoS requirements and priorities at different tiers. Thus, the existing CAPC optimization problems should be modified to include various types of cell selection methods (some examples are provided in Table I) and power control methods with different objectives and interference constraints (e.g., interference constraints for macro cell UEs, picocell UEs, or D2Dreceiver UEs). A qualitative comparison among the existing CAPC schemes along with the open research areas are highlighted in Table II. A discussion on how these open problems can be addressed is provided in the next section.V. DESIGN GUIDELINES FOR DISTRIBUTED CAPCSCHEMES IN 5G MULTI-TIER NETWORKSInterference management in 5G networks requires efficient distributed CAPC schemes such that each user can possibly connect simultaneously to multiple BSs (can be different for uplink and downlink), while achieving load balancing in different cells and guaranteeing interference protection for the HPUEs. In what follows, we provide a number of suggestions to modify the existing schemes.A. Prioritized Power ControlTo guarantee interference protection for HPUEs, a possible strategy is to modify the existing power control schemes listed in the first column of Table II such that the LPUEs limit their transmit power to keep the interference caused to the HPUEs below a predefined threshold, while tracking their own objectives. In other words, as long as the HPUEs are protected against existence of LPUEs, the LPUEs could employ an existing distributed power control algorithm to satisfy a predefined goal. This offers some fruitful direction for future research and investigation as stated in Table II. To address these open problems in a distributed manner, the existing schemes should be modified so that the LPUEs in addition to setting their transmit power for tracking their objectives, limit their transmit power to keep their interference on receivers of HPUEs below a given threshold. This could be implemented by sending a command from HPUEs to its nearby LPUEs (like a closed-loop power control command used to address the near-far problem), when the interference caused by the LPUEs to the HPUEs exceeds a given threshold. We refer to this type of power control as prioritized power control. Note that the notion of priority and thus the need of prioritized power control exists implicitly in different scenarios of 5G networks, as briefly discussed in Section II. Along this line, some modified power control optimization problems are formulated for 5G multi-tier networks in second column of Table II.To compare the performance of existing distributed power control algorithms, let us consider a prioritized multi-tier cellular wireless network where a high-priority tier consisting of 3×3 macro cells, each of which covers an area of 1000 m×1000 m, coexists with a low-priority tier consisting of n small-cells per each high-priority macro cell, each。

外文翻译模板

外文翻译模板

大连交通大学信息工程学院毕业设计(论文)外文翻译学生姓名陈辉专业班级机械073班指导教师王凤彪职称讲师所在单位机械工程系教学部主任吕海霆完成日期 2011年4月15日Numerical Control SystemThe numerical control system is the digital control system abbreviation. By early is composed of hardware circuit is called hardware numerical control (Hard NC), after 1970, hardware circuit components gradually instead by the computer called for computer numerical control system.Computerized numerical control system is a system that is use computer control processing function to achieve numerical control system. CNC system according to the computer memory stored in the control program execution part or all, numerical control function, and is equipped with interface circuit and servo drive the special computer system.CNC system consists of NC program, input devices; output devices, computer numerical control equipment (CNC equipment), programmable logic controllers (PLC), the spindle and feed drive (servo) drive (including detection devices) and so on.The core of CNC system is equipment. By using the computer system with the function of software and PLC instead of the traditional machine electric device to make the system logic control more compact, its flexibility and versatility, reliability become more better, easy to implement complex numerical control function, use and maintenance can be more convenient, and it also has connected and super ordination machine and the remote communication function.At present, the numerical control system has variety of different forms; composition structure has its own characteristics. These structural features from the basic requirements of the initial system design and engineering design ideas. For example, the control system of point and continuous path control systems have different requirements. For the T system and the M system, there are also very different, the former applies to rotary part processing, the latter suitable for special-shaped the axially symmetrical parts processing. For different manufacturers, based on historical development factors and vary their complex factors, may also be thinking in the design is different. For example, the United States Dynapath system uses a small plate for easy replacement and flexible combination of the board; while Japan FANUC system is a large plate structure tends to make the system work in favor of reliability, make the system MTBF rate continues to increase. However, no matter what kind of system, their basic principle and structure are very similar.The numerical control system generally consists of three major components, namely the control system, servo system and position measuring system. Control procedures by interpolation operation work piece, issue control instructions to the servo drive system; servo drive system control instructions amplified by the servo motor-driven mechanical movement required; measurement system detects the movement of mechanical position or speed, and feedback to the control system, to modify the control instructions. These three parts combine to form a complete closed-loop control of the CNC system.Control system mainly consists of bus, CPU, power supply, memory, operating panel and display, position control unit, programmable logic controller control unit and datainput / output interface and so on. The latest generation of CNC system also includes a communication unit; it can complete the CNC, PLC's internal data communications and external high-order networks. Servo drive system including servo drives and motors. Position measuring system is mainly used grating, or circular grating incremental displacement encoder.CNC system hardware from the NC device, input / output devices, drives and machine logic control devices, electrical components, between the four parts through the I / O interface to interconnect.Numerical control device is the core of CNC system, its software and hardware to control the implementation of various CNC functions.The hardware structure of no device by CNC installations in the printed circuit board with infixing pattern can be divided into the big board structure and function module (small board) structure; Press CNC apparatus hardware manufacturing mode, can be divided into special structure and personal computer type structure; Press CNC apparatus in the number of microprocessor can be divided into single microprocessor structure and many microprocessor structure.(1)Large panel structure and function templates structure1) Large panel structurePanel structures CNC system CNC equipment from the main circuit board, position control panels, PC boards, graphics control panel, additional I / O board and power supply unit and other components. The main circuit board printed circuit board is big; the other circuit board is a small plate, inserted in the large printed circuit board slot. This structure is similar to the structure of micro-computer.2) Function templates structure(2)Single-microprocessor structure and mulct-microprocessor structure1) Single-microprocessor structureIn a single-microprocessor structure, only a microprocessor to focus on control, time-sharing deals with the various tasks of CNC equipment.2) melt-microprocessor structureWith the increase in numerical control system functions, CNC machine tools to improve the processing speed of a single microprocessor CNC system can not meet the requirement; therefore, many CNC systems uses a multi-microprocessor structure. If a numerical control system has two or more microprocessors, each microprocessor via the data bus or communication to connect, share system memory and common I / O interfaces, each processor sharing system Part of the work, which is multi-processor systems.CNC software is divided into application software and system software. CNC system software for the realization of various functions of the CNC system, the preparation of special software, also known as control software, stored in the computer EPROM memory. CNC Systems feature a variety of settings and different control schemes, and their system software in the structure and size vary widely, but generally include input data processing procedures, computing interpolation procedures, speed control procedures, management procedures and diagnostic procedures.(1)Input data processing proceduresIt receives input part program, the standard code, said processing instructions and datadecoding, data processing, according to the prescribed format for storage. Some systems also calculated to compensate, or interpolation operation and speed control for pre-computation. Typically, the input data processing program, including input, decoding and data processing three elements.(2)Computing interpolation proceduresCNC work piece processing system according to the data provided, such as curve type, start, end, etc. operations. According to the results of operations were sent to each axis feed pulse. This process is called interpolation operation. Feed drive servo system Impulsive table or by a corresponding movement of the tool to complete the procedural requirements of the processing tasks.Interpolation for CNC system is the side of the operation, while processing, is a typical real-time control, so the interpolation directly affects the speed of operation the machine feed rate, and should therefore be possible to shorten computation time, which is the preparation of interpolation Complements the key to the program.(3)Speed control proceduresSpeed control program according to the given value control the speed of operation of the frequency interpolation, in order to maintain a predetermined feed rate. Changes in speed is large, the need for automatic control of acceleration and deceleration to avoid speed drive system caused by mutations in step.(4)Management proceduresManagement procedures responsible for data input, data processing, interpolation processing services operations as the various procedures for regulation and management. Management process but also on the panel command, the clock signal, the interrupt caused by fault signals for processing.(5)Diagnostic proceduresDiagnostic features are found in the running system failure in a timely manner, and that the type of failure. Y ou can also run before or after the failure, check the system main components (CPU, memory, interfaces, switches, servo systems, etc.) function is normal, and that the site of failure.MachiningAny machining must have three basic conditions: machining tools, work piece and machining sports. Machining tool edge should be, the material must be rigid than the work piece. Different forms of tool structure and cutting movements constitute different cutting methods. Blade with a blade-shaped and have a fixed number of methods for cutting tools for turning, drilling, boring, milling, planning, broaching, and sawing, etc.; edge shape and edge with no fixed number of abrasive or abrasive Cutting methods are grinding, grinding, honing and polishing.Machining is the most important machinery manufacturing processing methods. Although the rough improve manufacturing precision, casting, forging, extrusion, powder metallurgy processing applications on widely, but to adapt to a wide range of machining,and can achieve high accuracy and low surface roughness, in Manufacturing still plays an important role in the process. Cutting metal materials have many classifications. Common are the following three kinds.By cutting process feature distinguishing characteristics of the decision process on the structure of cutting tools and cutting tools and work piece relative motion form. According to the technical characteristics of cutting can be divided into: turning, milling, drilling, boring, reaming, planning, shaping, slotting, broaching, sawing, grinding, grinding, honing, super finishing, polishing, gear Processing, the worm process, thread processing, ultra-precision machining, bench and scrapers and so on. By material removal rate and machining accuracy distinction can be divided into: ① rough: with large depth of cut, one or a few times by the knife away from the work cut out most or all allowances, such as rough turning, rough planning, Rough milling, drilling and sawing, etc., rough machining precision high efficiency low, generally used as a pre-processing, and sometimes also for final processing. ② Semi-finishing: General roughing and finishing as the middle between the process, but the work piece accuracy and surface roughness on the less demanding position, but also can be used as the final processing. ③ finishing: cutting with a fine way to achieve higher machining surface accuracy and surface quality, such as fine cars, fine planning, precision hinges, grinding and so on. General is the final finishing process. ④Finishing process: after the finish, the aim is to obtain a smaller surface roughness and to slightly improve the accuracy. Finishing processing allowance is small, such as honing, grinding, ultra-precision grinding and super finishing and so on. ⑤Modification process: the aim is to reduce the surface roughness, to improve the corrosion, dust properties and improve appearance, but does not require higher precision, such as polishing, sanding, etc. ⑥ultra-precision machining: aerospace, lasers, electronics, nuclear energy and other cutting-edge technologies that need some special precision parts, high accuracy over IT4, surface roughness less than Ra 0.01 microns. This need to take special measures to ultra-precision machining, such as turning mirror, mirror grinding, chemical mechanical polishing of soft abrasive.Distinguished by method of surface machining, the work piece is to rely on the machined surface for cutting tool and the work piece to obtain the relative motion. By surface methods, cutting can be divided into three categories. ①tip trajectory method: relying on the tip relative to the trajectory of the surface to obtain the required work piece surface geometry, such as cylindrical turning, planning surface, cylindrical grinding, with the forming surface, such as by turning mode. The trajectory depends on the tool tip provided by the cutting tool and work piece relative motion. ② forming tool method: short forming method, with the final work piece surface profile that matches the shape forming cutter or grinding wheel, such as processing a shaped surface. At this time forming part of the machine movement was replaced by the blade geometry, such as the shape of turning, milling and forming grinding forming and so on. The more difficult the manufacture of forming cutter, machine - clamp - work piece - tool formed by the process system can withstand the cutting force is limited, forming method is generally used for processing short shaped surface. ③generating method: also known as rotary cutting method, cutting tool and work piece during processing as a relatively developed into a campaign tool (or wheel) and the work piece instantaneous center line of pure rolling interaction between thetwo maintain a certain ratio between Is obtained by processing the surface of the blade in this movement in the envelope. Gear machining hobbling, gear shaping, shaving, honing, and grinding teeth (not including form grinding teeth), etc. are generating method processing.PLCEarly called the programmable logic controller PLC (Programmable Logic Controller, PLC), which is mainly used to replace the logic control relays. With the technology, which uses micro-computer technology, industrial control device function has been greatly exceeded the scope of logic control, therefore, such a device today called programmable logic controller, referred to as the PC. However, in order to avoid personal computer (Personal Computer) in the short confusion, it will be referred to as programmable logic controller PLC, plc since 1966, the U.S. Digital Equipment Corporation (DEC) developed there, the current United States, Japan, Germany, PLC Good quality and powerful.The basic structure of Programmable Logic ControllerA. PowerPLC's power in the whole system plays a very important role. If you do not have a good, reliable power system is not working, so the PLC manufacturers design and manufacture of power very seriously. General AC voltage fluctuations of +10% (+15%) range, you can not take other measures to PLC to connect directly to the AC line.B.Central processing unit (CPU)Central processing unit (CPU) is the central PLC control. It is given by the function of PLC system program from the programmer receives and stores the user program and data type; check the power supply, memory, I / O and timer alert status, and to diagnose syntax errors in the user program. When the PLC into run-time, first it scans the scene to receive the status of various input devices and data, respectively, into I / O image area, and then one by one from the user program reads the user program memory, after a shell and press Provisions of the Directive the result of logic or arithmetic operations into the I / O image area or data register. And the entire user program is finished, and finally I / O image area of the state or the output of the output register data to the appropriate output device, and so on to run until stopped.To further improve the reliability of PLC, PLC is also large in recent years constitutes a redundant dual-CPU system, or by three voting systems CPU. Thus, even if a CPU fails, the whole system can still work properly.C.MemoryStorage system software of memory called system program memory. Storage application software of memory called the user program memory.D.Input and output interface circuit1, the live input interface circuit by the optical coupling circuit and the computer input interface circuit, the role of PLC and field control of an interface for input channels.2, Field output interface circuit by the output data registers, interrupt request strobe circuit and integrated circuit, the role of PLC output interface circuit through the on-siteimplementation of parts of the output to the field corresponding control signal.E.Function moduleSuch as counting, positioning modules.munication moduleSuch as Ethernet, RS485, Prefab’s-DP communication module.数控系统数控系统是数字控制系统简称,英文名称为Numerical Control System,早期是由硬件电路构成的称为硬件数控(Hard NC),1970年代以后,硬件电路元件逐步由专用的计算机代替称为计算机数控系统。

毕业设计(论文)外文参考文献译文本

毕业设计(论文)外文参考文献译文本

武汉工业学院毕业设计(论文)外文参考文献译文本2011届原文出处IBM SYSTEMS JOURNAL, VOL 35, NOS 3&4, 1996毕业设计(论文)题目音乐图像浏览器的设计与实现院(系)计算机与信息工程专业名称计算机科学与技术学生姓名郭谦学生学号070501103指导教师丰洪才译文要求:1、译文内容须与课题(或专业)有联系;2、外文翻译不少于4000汉字。

隐藏数据技术研究数据隐藏,是一种隐秘的数据加密形式,它将数据嵌入到数字媒体之中来达到鉴定,注释和版权保护的目的。

然而,这一应用却受到了一些限制:首先是需要隐藏的数据量,其次是在“主”讯号受到失真的条件影响之下,对于这些需隐藏数据的可靠性的需要。

举例来说,就是有损压缩以及对有损压缩来说数据遇到被拦截,被修改或被第三方移除等操作的免疫程度。

我们同时用传统的和新式技术来探究解决数据隐藏问题的方法并且对这些技术在以下三个方面的应用:版权保护,防止篡改,和增强型数据嵌入做出评估。

我们能非常方便地得到数字媒体并且潜在地改善了其可移植性,信息展现的效率,和信息呈现的准确度。

便捷的数据访问所带来的负面效果包括以下两点:侵犯版权的几率增加或者是有篡改或修改其中内容的可能性增大。

这项工作的目的在于研究知识产权保护条款、内容修改的相关指示和增加注解的方法。

数据隐藏代表了一类用于插入数据的操作,例如版权信息,它利用“主”信号能够感知的最小变化量来进入到各种不同形式的媒体之内,比如图像、声音或本文。

也就是说,嵌入的数据对人类观察者来说应该是既看不见也听不见的。

值得注意的是,数据隐藏虽然与压缩很类似,但与加密解密技术却是截然不同的。

它的目标不是限制或者管理对“主”信号的存取,而是保证被嵌入的数据依然未被破坏而且是可以恢复的。

数据隐藏在数字媒体中的两个重要应用就是提供版权信息的证明,和保证内容完整性。

因此,即使主讯号遭受诸如过滤、重取样,截取或是有损压缩等破坏行为,数据也应该一直在“主”信号中保持被隐藏的特点。

毕业设计外文翻译模板

毕业设计外文翻译模板

本科生毕业设计(论文)外文翻译毕业设计(论文)题目:组合钻床动力滑台液压系统及电控系统设计外文题目: Drilling machine译文题目:组合钻床学生姓名:马莉莉专业:机械设计制造及其自动化0701班指导教师姓名:王洁评阅日期:正文内容小四号字,宋体,行距1.5倍行距。

The drilling machine is a machine for making holes with removal of chips and it is used to create or enlarge holes. There are many different types of drilling machine for different jobs, but they can be basically broken down into two categories.The bench drill is used for drilling holes through raw materials such as wood, plastic and metal and gets its name because it is bolted to bench for stability so that larger pieces of work can be drilled safely. The pillar drill is a larger version that stands upright on the floor. It can do exactly the same work as the bench drill, but because of its size it can be used to drill larger pieces of materials and produce bigger holes. Most modern drilling machines are digitally automated using the latest computer numerical control (CNC) technology.Because they can be programmed to produce precise results, over and over again, CNC drilling machines are particularly useful for pattern hole drilling, small hole drilling and angled holes.If you need your drilling machine to work at high volume, a multi spindle drill head will allow you to drill many holes at the same time. These are also sometimes referred to as gang drills.Twist drills are suitable for wood, metal and plastics and can be used for both hand and machine drilling, with a drill set typically including sizes from 1mm to 14mm. A type of drill machine known as the turret stores tools in the turret and positions them in the order needed for work.Drilling machines, which can also be referred to as bench mounted drills or floor standing drills are fixed style of drills that may be mounted on a stand or bolted to the floor or workbench. A drilling machine consists of a base, column, table, spindle), and drill head, usually driven by an induction motor.The head typically has a set of three which radiate from a central hub that, when turned, move the spindle and chuck vertically, parallel to the axis of the column. The table can be adjusted vertically and is generally moved by a rack and pinion. Some older models do however rely on the operator to lift and re clamp the table in position. The table may also be offset from the spindles axis and in some cases rotated to a position perpendicular to the column.The size of a drill press is typically measured in terms of swing which can be is defined as twice the throat distance, which is the distance from the centre of the spindle to the closest edge of the pillar. Speed change on these drilling machines is achieved by manually moving a belt across a stepped pulley arrangement.Some drills add a third stepped pulley to increase the speed range. Moderndrilling machines can, however, use a variable-speed motor in conjunction with the stepped-pulley system. Some machine shop drilling machines are equipped with a continuously variable transmission, giving a wide speed range, as well as the ability to change speed while the machine is running.Machine drilling has a number of advantages over a hand-held drill. Firstly, it requires much less to apply the drill to the work piece. The movement of the chuck and spindle is by a lever working on a rack and pinion, which gives the operator considerable mechanical advantage.The use of a table also allows a vice or clamp to be used to position and restrain the work. This makes the operation much more secure. In addition to this, the angle of the spindle is fixed relative to the table, allowing holes to be drilled accurately and repetitively.Most modern drilling machines are digitally automated using the latest computer numerical control (CNC) technology. Because they can be programmed to produce precise results, over and over again, CNC drilling machines are particularly useful for pattern hole drilling, small hole drilling and angled holes.Drilling machines are often used for miscellaneous workshop tasks such as sanding, honing or polishing, by mounting sanding drums, honing wheels and various other rotating accessories in the chuck. To add your products click on the traders account link above.You can click on the links below to browse for new, used or to hire a drilling machine.Drilling machines are used for drilling, boring, countersinking, reaming, and tapping. Several types are used in metalworking: vertical drilling machines, horizontal drilling machines, center-drilling machines, gang drilling machines, multiple-spindle drilling machines, and special-purpose drilling machines.Vertical drilling machines are the most widely used in metalworking. They are used to make holes in relatively small work-pieces in individual and small-lot production; they are also used in maintenance shops. The tool, such as a drill, countersink, or reamer, is fastened on a vertical spindle, and the work-piece is secured on the table of the machine. The axes of the tool and the hole to be drilled are aligned by moving the workpiece. Programmed control is also used to orient the workpiece and to automate the operation. Bench-mounted machines, usually of the single-spindle type, are used to make holes up to 12 mm in diameter, for instance, in instrument-making.Heavy and large workpieces and workpieces with holes located along a curved edge are worked on radial drilling machines. Here the axes of the tool and the hole to be drilled are aligned by moving the spindle relative to the stationary work-piece.Horizontal drilling machines are usually used to make deep holes, for instance, in axles, shafts, and gun barrels for firearms and artillery pieces.Center-drilling machines are used to drill centers in the ends of blanks. They are sometimes equipped with supports that can cut off the blank before centering, and in such cases they are called center-drilling machines. Gang drilling machines with more than one drill head are used to produce several holes at one time. Multiple-spindle drilling machines feature automation of the work process. Such machines can be assembled from several standardized, self-contained heads with electric motors and reduction gears that rotate the spindle and feed the head. There are one-, two-, and three-sidedmultiple-spindle drilling machines with vertical, horizontal, and inclined spindles for drilling and tapping. Several dozen such spindles may be mounted on a single machine. Special-purpose drilling machines, on which a limited range of operations is performed, are equipped with various automated devices.Multiple operations on workpieces are performed by various combination machines. These include one- and two-sided jig boring machines,drilling-tapping machines (usually gang drilling machines with reversible thread-cutting spindles), milling-type drilling machines and drilling-mortising machines used mainly for woodworking, and automatic drilling machines.In woodworking much use is made of single- and multiple-spindle vertical drilling machines, one- and two-sided, horizontal drilling machines (usually with multiple spindles), and machines equipped with a swivel spindle that can be positioned vertically and horizontally. In addition to drilling holes, woodworking machines may be used to make grooves, recesses, and mortises and to remove knots.英文翻译指导教师评阅意见。

(完整版)_毕业设计英文翻译_及格式

(完整版)_毕业设计英文翻译_及格式

毕业设计(论文)英文翻译题目专业班级姓名学号指导教师职称200年月日The Restructuring of OrganizationsThroughout the 1990s, mergers and acquisitions a major source of corporate restructuring, affecting millions of workers and their families. This form of restructuring often is accompanied by downsizing. Downsizing is the process of reducing the size of a firm by laying off or retiring workers early. The primary objectives of downsizing are similar in U.S. companies and those in other countries:●cutting cost,●spurring decentralization and speeding up decision making,●cutting bureaucracy and eliminating layers of especially they did five years ago. One consequence of this trend is that today’s managers supervise larger numbers of subordinates who report directly to them. In 1990, only about 20 percent of managers supervise twelve or more people and 54 percent supervised six or fewer.Because of downsizing, first-line managers quality control, resources, and industrial engineering provide guidance and support. First-line managers participate in the production processes and other line activities and coordinate the efforts of the specialists as part of their jobs. At the same time, the workers that first-line managers supervise are less willing to put up with authoritarian management. Employees want their jobs to be more creative, challenging, fun, and satisfying and want to participate in decisions affecting their work. Thus self-managed work teams that bring workers and first-line managers together to make joint decisions to improve the way they do their jobs offer a solution to both supervision and employee expectation problems. When you ’t always the case. Sometimes entire divisions of a firm are simply spun off from the main company to operate on their own as new, autonomous companies. The firm that spun them off may then become one of their most important customers or suppliers. That AT&T “downsized” the old Bell Labs unit, which is now known as Lucent Technologies. Now, rather than - return is free to enter into contracts with companies other than AT&T. this method of downsizing is usually called outsourcing.Outsourcing means letting other organizations perform a needed service andor manufacture needed parts or products. Nike outsources the production of its shoes to low-cost plants in South Korea and China and imports the shoes for distribution in North America. These same plants also ship shoes to Europe and other parts of Asia for distribution. Thus today’s managers face a new challenge: t o plan, organize, lead, and control a company that may as a modular corporation. The modularcorporation is most is most common in three industries: apparel, auto manufacturing, and electronics. The most commonly out-sourced function is production. By out sourcing production, a company can switch supplier best suited to a customer’s needs.Decisions about what to outsource and what to keep in- to contract production to another company is a sound business decision to contract production to another company is a sound business decision, at least for U.S. manufacturers. It appears to the unit cost of production by relieving the company of some overhead, and it frees the company to allocate scarce resources to activities for which the company examples of modular companies are Dell Computer, Nike, Liz Claiborne fashions, and ship designer Cyrix.As organizations downsize and outsource functions, they become flatter and smaller. Unlike the behemoths of the past, the new, smaller firms are less like autonomous fortresses and more like nodes in a net work of complex relationships. This approach, called the network form of organization, involves establishing strategic alliances among several entities.In Japan, cross-ownership and alliances among firms-called keiretsu-both foreign and U.S. auto parts producers. It also owns 49 percent of Hertz, the car rental company that is also a major customer. Other alliances include involvement in several research consortia. In the airline industry, a common type of alliance is between an airline and an airframe manufacture. For example, Delta recently agreed to buy all its aircraft from Boeing. Boeing Airlines. Through these agreements, Boeing guarantees that it will be able to sell specified models of its aircraft and begin to adapt their operations to the models they will be flying in the future. Thus both sides expect to reap benefits from these arrangements for many years.Networks forms of organizations are prevalent in access to the universities and in small, creative organizations. For example, the U.S. biotechnology industry is characterized by network of relationships between new biotechnology firms dedicated to research and new products development and established firms in industries that can use these new products, such as pharmaceuticals. In return for sharing technical information with the larger firms, the smaller firms gain access to their partners’ resources for product testing, marketing, and distribution. Big pharmaceutical firms such as Merk or Eli Lily gain from such partnerships because the smaller firms typically development cycle in the larger firms.Being competitive increasingly requires establishing and managing strategic alliances with other firms. In a strategic alliance, two or more firms agree to cooperate in a venture that is expected to benefit both firms.企业重组整个20世纪90年代中,合并和收购一直是企业重组的主要起源,影响着千百万的工人和他们的家庭。

毕业设计(论文)外文资料翻译〔含原文〕【范本模板】

毕业设计(论文)外文资料翻译〔含原文〕【范本模板】

南京理工大学毕业设计(论文)外文资料翻译教学点: 南京信息职业技术学院专业:电子信息工程姓名:陈洁学号:014910253034外文出处:《Pci System Architecture 》(用外文写)附件: 1.外文资料翻译译文;2。

外文原文。

附件1:外文资料翻译译文64位PCI扩展1.64位数据传送和64位寻址:独立的能力PCI规范给出了允许64位总线主设备与64位目标实现64位数据传送的机理。

在传送的开始,如果回应目标是一个64位或32位设备,64位总线设备会自动识别.如果它是64位设备,达到8个字节(一个4字)可以在每个数据段中传送。

假定是一串0等待状态数据段。

在33MHz总线速率上可以每秒264兆字节获取(8字节/传送*33百万传送字/秒),在66MHz总线上可以528M字节/秒获取.如果回应目标是32位设备,总线主设备会自动识别并且在下部4位数据通道上(AD[31::00])引导,所以数据指向或来自目标。

规范也定义了64位存储器寻址功能。

此功能只用于寻址驻留在4GB地址边界以上的存储器目标。

32位和64位总线主设备都可以实现64位寻址。

此外,对64位寻址反映的存储器目标(驻留在4GB地址边界上)可以看作32位或64位目标来实现。

注意64位寻址和64位数据传送功能是两种特性,各自独立并且严格区分开来是非常重要的。

一个设备可以支持一种、另一种、都支持或都不支持。

2.64位扩展信号为了支持64位数据传送功能,PCI总线另有39个引脚。

●REQ64#被64位总线主设备有效表明它想执行64位数据传送操作.REQ64#与FRAME#信号具有相同的时序和间隔。

REQ64#信号必须由系统主板上的上拉电阻来支持.当32位总线主设备进行传送时,REQ64#不能又漂移。

●ACK64#被目标有效以回应被主设备有效的REQ64#(如果目标支持64位数据传送),ACK64#与DEVSEL#具有相同的时序和间隔(但是直到REQ64#被主设备有效,ACK64#才可被有效).像REQ64#一样,ACK64#信号线也必须由系统主板上的上拉电阻来支持。

毕业设计(论文)外文资料翻译(学生用)

毕业设计(论文)外文资料翻译(学生用)

毕业设计外文资料翻译学院:信息科学与工程学院专业:软件工程姓名: XXXXX学号: XXXXXXXXX外文出处: Think In Java (用外文写)附件: 1.外文资料翻译译文;2.外文原文。

附件1:外文资料翻译译文网络编程历史上的网络编程都倾向于困难、复杂,而且极易出错。

程序员必须掌握与网络有关的大量细节,有时甚至要对硬件有深刻的认识。

一般地,我们需要理解连网协议中不同的“层”(Layer)。

而且对于每个连网库,一般都包含了数量众多的函数,分别涉及信息块的连接、打包和拆包;这些块的来回运输;以及握手等等。

这是一项令人痛苦的工作。

但是,连网本身的概念并不是很难。

我们想获得位于其他地方某台机器上的信息,并把它们移到这儿;或者相反。

这与读写文件非常相似,只是文件存在于远程机器上,而且远程机器有权决定如何处理我们请求或者发送的数据。

Java最出色的一个地方就是它的“无痛苦连网”概念。

有关连网的基层细节已被尽可能地提取出去,并隐藏在JVM以及Java的本机安装系统里进行控制。

我们使用的编程模型是一个文件的模型;事实上,网络连接(一个“套接字”)已被封装到系统对象里,所以可象对其他数据流那样采用同样的方法调用。

除此以外,在我们处理另一个连网问题——同时控制多个网络连接——的时候,Java内建的多线程机制也是十分方便的。

本章将用一系列易懂的例子解释Java的连网支持。

15.1 机器的标识当然,为了分辨来自别处的一台机器,以及为了保证自己连接的是希望的那台机器,必须有一种机制能独一无二地标识出网络内的每台机器。

早期网络只解决了如何在本地网络环境中为机器提供唯一的名字。

但Java面向的是整个因特网,这要求用一种机制对来自世界各地的机器进行标识。

为达到这个目的,我们采用了IP(互联网地址)的概念。

IP以两种形式存在着:(1) 大家最熟悉的DNS(域名服务)形式。

我自己的域名是。

所以假定我在自己的域内有一台名为Opus的计算机,它的域名就可以是。

外文文献翻译封面格式及要求(模版)

外文文献翻译封面格式及要求(模版)

毕业论文外文文献翻译院年级专业:2009级XXXXXXXXXXX 姓 名:学 号:附 件:备注:(注意:备注页这一整页的内容都不需要打印,看懂了即可)1.从所引用的与毕业设计(论文)内容相近的外文文献中选择一篇或一部分进行翻译(不少于3000实词);2。

外文文献翻译的装订分两部分,第一部分为外文文献;第二部分为该外文文献的中文翻译,两部分之间用分页符隔开.也就是说,第一外文文献部分结束后,使用分页符,另起一页开始翻译。

3。

格式方面,外文文献的格式,除了字体统一使用Times new roman 之外,其他所有都跟中文论文的格式一样.中文翻译的格式,跟中文论文的格式一样。

(注意:备注页这一整页的内容都不需要打印,看懂了即可,定稿后,请删除本页.)范文如下:注意,下面内容每一部份均已用分页符分开了,如果用本模板,请将每一模块单独删除,直接套用到每一模板里面,不要将全部内容一次性删除。

【Abstract】This paper has a systematic analysis on outside Marco—environment of herbal tea beverage industry and major competitors of brands inside the herbal tea market。

Based onthe theoretic framework, this paper takes WONG LO KAT and JIA DUO BAO herbal tea as an example, and researches the strategy on brand positioning and relevant marketing mix of it. Through analysis on the prevention sense of WONG LO KAT herbal tea, it was positioned the beverage that can prevent excessive internal heat in body, a new category divided from the beverage market。

毕业设计外文翻译

毕业设计外文翻译

毕业设计外文翻译Newly compiled on November 23, 2020Title:ADDRESSING PROCESS PLANNING AND VERIFICATION ISSUES WITH MTCONNECTAuthor:Vijayaraghavan, Athulan, UC BerkeleyDornfeld, David, UC BerkeleyPublication Date:06-01-2009Series:Precision Manufacturing GroupPermalink:Keywords:Process planning verification, machine tool interoperability, MTConnect Abstract:Robust interoperability methods are needed in manufacturing systems to implement computeraided process planning algorithms and to verify their effectiveness. In this paper wediscuss applying MTConnect, an open-source standard for data exchange in manufacturingsystems, in addressing two specific issues in process planning and verification. We use data froman MTConnect-compliant machine tool to estimate the cycle time required for machining complexparts in that machine. MTConnect data is also used in verifying the conformance of toolpaths tothe required part features by comparing the features created by the actual tool positions to therequired part features using CAD tools. We demonstrate the capabilities of MTConnect in easilyenabling process planning and verification in an industrial environment.Copyright Information:All rights reserved unless otherwise indicated. Contact the author or original publisher for anynecessary permissions. eScholarship is not the copyright owner for deposited works. Learn moreADDRESSING PROCESS PLANNING AND VERIFICATION ISSUESWITH MTCONNECTAthulan Vijayaraghavan, Lucie Huet, and David DornfeldDepartment of Mechanical EngineeringUniversity of CaliforniaBerkeley, CA 94720-1740William SobelArtisanal SoftwareOakland, CA 94611Bill Blomquist and Mark ConleyRemmele Engineering Inc.Big Lake, MNKEYWORDSProcess planning verification, machine tool interoperability, MTConnect.ABSTRACTRobust interoperability methods are needed in manufacturing systems to implement computeraided process planning algorithms and to verifytheir effectiveness. In this paper we discuss applying MTConnect, an open-source standardfor data exchange in manufacturing systems, in addressing two specific issues in processplanning and verification. We use data from an MTConnect-compliant machine tool to estimatethe cycle time required for machining complex parts in that machine. MTConnect data is also used in verifying the conformance of toolpaths to the required part features by comparing the features created by the actual tool positions tothe required part features using CAD tools. We demonstrate the capabilities of MTConnect in easily enabling process planning and verificationin an industrial environment.INTRODUCTIONAutomated process planning methods are acritical component in the design and planning of manufacturing processes for complex parts. Thisis especially the case with high speed machining, as the complex interactions betweenthe tool and the workpiece necessitates careful selection of the process parameters and the toolpath design. However, to improve the effectiveness of these methods, they need to be integrated tightly with machines and systems in industrial environments. To enable this, we need robust interoperability standards for data exchange between the different entities in manufacturing systems.In this paper, we discuss using MTConnect – an open source standard for data exchange in manufacturing systems – to address issues in process planning and verification in machining.We discuss two examples of using MTConnect for better process planning: in estimating the cycle time for high speed machining, and in verifying the effectiveness of toolpath planning for machining complex features. As MTConnect standardizes the exchange of manufacturing process data, process planning applications can be developed independent of the specific equipment used (Vijayaraghavan, 2008). This allowed us to develop the process planning applications and implement them in an industrial setting with minimal overhead. The experiments discussed in this paper were developed at UC Berkeley and implemented at Remmele Engineering Inc.The next section presents a brief introduction to MTConnect, highlighting its applicability in manufacturing process monitoring. We then discuss two applications of MTConnect – in computing cycle time estimates and in verifying toolpath planning effectiveness. MTCONNECTMTConnect is an open software standard for data exchange and communication between manufacturing equipment (MTConnect, 2008a). The MTConnect protocol defines a common language and structure for communication in manufacturing equipment, and enables interoperability by allowing access to manufacturing data using standardized interfaces. MTConnect does not define methods for data transmission or use, and is not intended to replace the functionality of existing products and/or data standards. It enhances the data acquisition capabiltiies of devices and applications, moving towards a plug-and-play environment that can reduce the cost of integration. MTConnect is built upon prevalent standards in the manufacturing and software industry, which maximizes the number of tools available for its implementation and provides a high level of interoperability with other standards and tools in these industries.MTConnect is an XML-based standard andmessages are encoded using XML (eXtensibleMarkup Language), which has been usedextensively as a portable way of specifying data interchange formats (W3C, 2008). A machinereadable XML schema defines the format ofMTConnect messages and how the data itemswithin those messages are represented. At thetime of publication, the latest version of the MTConnect standard defining the schema is (MTConnect, 2008b).The MTConnect protocol includes the following information about a device:Identity of a deviceIdentity of all the independent components ofthe deviceDesign characteristics of the deviceData occurring in real or near real-time by thedevice that can be utilized by other devices or applications. The types of data that can beaddressed includes:Physical and actual device design dataMeasurement or calibration dataNear-real time data from the deviceFigure 1 shows an example of a data gatheringsetup using MTConnect. Data is gathered innear-time from a machine tool and from thermal sensors attached to it. The data stored by the MTConnect protocol for this setup is shown inTable 1. Specialized adaptors are used to parsethe data from the machine tool and from thesensor devices into a format that can beunderstood by the MTConnect agent, which inturn organizes the data into the MTConnect XML schema. Software tools can be developed which operate on the XML data from the agent. Sincethe XML schema is standardized, the softwaretools can be blind to the specific configuration ofthe equipment from where the data is gathered. FIGURE 1: MTCONNECT SETUP.TABLE 1:MTCONNECT PROTOCOL INFORMATION FOR MACHINE TOOL IN FIGURE 1.Device identity “3-Axis Milling Machine”Devicecomponents1 X Axis; 1 Y Axis; 1 Z Axis;2 Thermal SensorsDevice designcharacteristicsX Axis Travel: 6”Y Axis Travel: 6”Z Axis Travel: 12”Max Spindle RPM: 24000Data occurringin deviceTool position: (0,0,0);Spindle RPM: 1000Alarm Status: OFFTemp Sensor 1: 90oFTemp Sensor 2: 120oFAn added benefit of XML is that it is a hierarchical representation, and this is exploited by designing the hierarchy of the MTConnect schema to resemble that of a conventional machine tool. The schema itself functions as a metaphor for the machine tool and makes the parsing and encoding of messages intuitive. Data items are grouped based on their logical organization, and not on their physical organization. For example, Figure 2 shows the XML schema associated with the setup shown in Figure 1. Although the temperature sensors operate independant of the machine tool (with its own adaptor), the data from the sensors are associated with specific components of the machine tool, and hence the temperature data is a member of the hierarchy of the machine tool. The next section discusses applying MTConnect in estimating cycle time in high-speed machining.ACCURATE CYCLE TIME ESTIMATESIn high speed machining processes there can be discrepancies between the actual feedrates during cutting and the required (or commanded) feedrates. These discrepancies are dependenton the design of the controller used in the machine tool and the toolpath geometry. While there have been innovative controller designs that minimize the feedrate discrepancy (Sencer,2008), most machine tools used in conventional industrial facilities have commercial off-the-shelf controllers that demonstrate some discrepancies in the feedrates, especially when machining complex geometries at high speeds. There is a need for simple tools to estimate the discrepancy in these machining conditions. Apart from influencing the surface quality of the machined parts, feedrate variation can lead to inaccurate estimates of the cycle time during machining. Accurate estimates of the cycle time is a critical requirement in planning for complex machining operations in manufacturing facilities. The cycle time is needed for both scheduling the part in a job shop, as well as for costing the part. Inaccurate cycle time estimates (especiallywhen the feed is overestimated) can lead to uncompetitive estimates for the cost of the part and unrealistic estimates for the cycle time. Related Workde Souza and Coelho (2007) presented a comprehensive set of experiments to demonstrate feedrate limitations during the machining of freeform surfaces. They identified the causes of feedrate variation as dynamic limitations of the machine, block processing time FIGURE 2: MTCONNECT HIERARCHY.for the CNC, and the feature size in the toolpaths. Significant discrepancies were observed between the actual and commanded feeds when machining with linear interpolation (G01). The authors used a custom monitoring and data logging system to capture the feedrate variation in the CNC controller during machining. Sencer et al. (2008) presented feed scheduling algorithms to minimize the machining time for 5- axis contour machining of sculptured surfaces. The algorithm optimized the profile of the feedrate for minimum machining time, while observing constrains on the smoothness of the feedrate, acceleration and jerk of the machine tool drives. This follows earlier work in minimizing the machining time in 3-axis milling using similar feed scheduling techniques(Altintas, 2003). While these methods are very effective in improving the cycle time of complex machining operations, they can be difficult toapply in conventional factory environments asthey require specialized control systems. The methods we discuss in this paper do notaddress the optimization of cycle time during machining. Instead, we provide simple tools to estimate the discrepancy in feedrates during machining and use this in estimating the cycletime for arbitrary parts.MethodologyDuring G01 linear interpolation the chief determinant of the maximum feedrateachievable is the spacing between adjacentpoints (G01 step size). We focus on G01 interpolation as this is used extensively when machining simultaneously in 3 or more axes.The cycle time for this machine tool to machinean arbitrary part (using linear interpolation) is estimated based on the maximum feedachievable by the machine tool at a given path spacing. MTConnect is a key enabler in this process as it standardizes both data collectionas well as the analysis.The maximum feedrate achievable is estimated using a standardized test G-code program. This program consists of machining a simple shapewith progressively varying G01 path spacings.The program is executed on an MTConnectcompliant machine tool, and the position andfeed data from the machine tool is logged innear-real time. The feedrate during cutting at the different spacings is then analyzed, and amachine tool “calibration” curve is developed, which identifies the maximum feedrate possibleat a given path spacing.FIGURE 3: METHODOLOGY FOR ESTIMATING CYCLE TIME.Conventionally, the cycle time for a giventoolpath is estimated by summing the time takenfor the machine tool to process each block of Gcode, which is calculated as the distancetravelled in that block divided by the feedrate ofthe block. For a given arbitrary part G-code to be executed on a machine tool, the cycle time is estimated using the calibration curve as follows. For each G01 block executed in the program, the size of the step is calculated (this is the distance between the points the machine tool is interpolating) and the maximum feedrate possible at this step size is looked up from the calibration curve. If the maximum feedrate is smaller than the commanded feedrate, this line of the G-code is modified to machine at the (lower) actual feedrate, if the maximum feedrate is greater, then the line is left unmodified. This is performed for all G01 lines in the program, and finally, the cycle time of the modified G-code program is estimated the conventional way. This methodology is shown in Figure 3. The next section discusses an example applying this methodology on a machine tool.ResultsWe implemented the cycle time estimation method on a 3-axis machine tool with a conventional controller. The calibration curve of this machine tool was computed by machining a simple circular feature at the following linear spacings: ”, ”, ”, ”,”, ”, ”, ”, ”. Weconfirmed that the radius of the circle (that is, the curvature in the toolpath) had no effect on the feedrate achieved by testing with circular features of radius ”, ”, and ”, andobserving the same maximum feedrate in all cases. Table 2 shows the maximum achievable feedrate at each path spacing when using a circle of radius 1”. We can see from the table that the maximum feedrate achievable is a linear function of the path spacing. Using a linear fit, the calibration curve for this machine tool can be estimated. Figure 4 plots the calibration curve for this machine tool. The relationship between the feedrate and the path spacing is linear asthe block processing time of the machine tool controller is constant at all feedrates. The block processing time determines the maximumfederate achievable for a given spacing as it isthe time the machine tool takes to interpolateone block of G-code. As the path spacing (or interpolatory distance) linearly increases, thespeed at which it can be interpolated alsoincreases linearly. The relationship for the datain Figure 4 is:MAX FEED (in/min) = 14847 * SPACING (in)TABLE 2: MAXIMUM ACHIEVABLE FEEDRATE AT VARYING PATH SPACINGSpacing Maximum Feedrate”””””””””We also noticed that the maximum feedrate for agiven spacing was unaffected by thecommanded feedrate, as long as it was lesserthan the commanded feedrate. This means thatit was adequate to compute the calibration curveby commanding the maximum possible feedratein the machine tool.FIGURE 4: CALIBRATION CURVE FOR MACHINE TOOL.Using this calibration curve, we estimated thecycle time for machining an arbitrary feature inthis machine tool. The feature we used was a3D spiral with a smoothly varying path spacing,which is shown in Figure 5. The spiral path isdescribed exclusively using G01 steps andinvolves simultaneous 3-axis interpolation. Thepath spacing of the G-code blocks for thefeature is shown in Figure 6.FIGURE 5: 3D SPIRAL FEATURE.FIGURE 6: PATH SPACING VARIATION WITH GCODE LINE FOR SPIRAL FEATURE.Figure 7 shows the predicted feedrate based onthe calibration curve for machining the spiralshape at 100 inches/min, compared to the actualfeedrate during machining. We can see that the feedrate predicted by the calibration curvematches very closely with the actual feedrate.We can also observe the linear relationship between path spacing and maximum feedrate by comparing figures 6 and 7.FIGURE 7: PREDICTED FEEDRATE COMPARED TO MEASURED FEEDRATE FOR SPIRAL FEATURE AT 100 IN/MIN.FIGURE 8: ACTUAL CYCLE TIME TO MACHINE SPIRAL FEATURE AT DIFFERENT FEEDRATES. The cycle time for machining the spiral atdifferent commanded feedrates was alsoestimated using the calibration curve. Figure 8 shows the actual cycle time taken to machinethe spiral feature at different feedrates. Noticehere that the trend is non-linear – an increase infeed does not yield a proportional decrease incycle time – implying that there is somefeedrate discrepancy at high feeds. Figure 9 compares the theoretical cycle time to machineat different feedrates to the actual cycle time andthe model predicted cycle time. We can see thatthe model predictions match the cycle times very closely (within 1%). Significant discrepancies are seen between the theoretical cycle time and the actual cycle time when machining at high feed rates. These discrepancies can be explained bythe difference between the block processingtime for the controller, and the time spent oneach block of G-Code during machining. At high feedrates, the time spent at each block is shorterthan the block processing time, so the controller slows down the interpolation resulting in a discrepancy in the cycle time.These results demonstrated the effectiveness of using the calibration curve to estimate feed, and ultimately apply in estimating the cycle time.This method can be extrapolated to multi-axis machining by measuring the feedrate variationfor linear interpolation in specific axes. We canalso specifically correlate feed in one axis to the path spacing instead of the overall feedrate. FIGURE 9: ACTUAL OBSERVED CYCLE TIMESAND PREDICTED CYCLE TIMES COMPARED TO THE NORMALIZED THEORETICAL CYCLE TIMES FOR MACHINING SPIRAL FEATURE AT DIFFERENT FEEDRATES.TOOL POSITION VERIFICATIONMTConnect data can also be used in verifying toolpath planning for the machining of complex parts. Toolpaths for machining complex featuresare usually designed using specialized CAM algorithms, and traditionally the effectiveness ofthe toolpaths in creating the required partfeatures are either verified using computer simulations of the toolpath, or by surfacemetrology of the machined part. The formerapproach is not very accurate, as the toolpath commanded to the machine tool may not matchthe actual toolpath travelled during machining.The latter approach, while accurate, tends to betime consuming and expensive, and requires the analysis and processing of 3D metrology data(which can be complex). Moreover, errors in the features of a machined part are not solely due to toolpath errors, and using metrology data fortoolpath verification may obfuscate toolpatherrors with process dynamics errors. In aprevious work we discussed a simple way toverify toolpath planning by overlaying the actualtool positions against the CAM generated tool positions (Vijayaraghavan, 2008). We nowdiscuss a more intuitive method to verify the effectiveness of machining toolpaths, wheredata from MTConnect-compliant machine toolsis used to create a solid model of the machined features to compare with the desired features.Related WorkThe manufacturing community has focussed extensively on developing process planning algorithms for the machining of complex parts.Elber (1995) in one of the earliest works in thefield, discussed algorithms for toolpathgeneration for 3- and 5-axis machining. Wrightet al. (2004) discussed toolpath generationalgorithms for the finish machining of freeform surfaces; the algorithms were based on thegeometric properties of the surface features. Vijayaraghavan et al. (2009) discussed methodsto vary the spacing of raster toolpaths and tooptimize the orientation of workpieces infreeform surface machining. The efficiency ofthese methods were validated primarily bymetrology and testing of the machined part. MethodologyTo verify toolpath planning effectiveness, we logthe actual cutting tool positions during machiningfrom an MTConnect-compliant machine tool,and use the positions to generate a solid modelof the machined part. The discrepancy infeatures traced by the actual toolpath relative tothe required part features can be computed by comparing these two solid models. The solidmodel of the machined part from the toolpositions can be obtained as follows:Create a 3D model of the toolCreate a 3D model of the stock materialCompute the swept volume of the tool as ittraces the tool positions (using logged data)Subtract the swept volume of the tool from thestock materialThe remaining volume of material is a solidmodel of the actual machined part.The two models can then be compared using 3D boolean difference (or subtraction) operations.ResultsWe implemented this verification scheme bylogging the cutter positions from an MTConnectcompliant 5-axis machine tool. The procedure toobtain the solid model using the tool positionswas implemented in Vericut. The two modelswere compared using a boolean diff operation in Vericut, which identified the regions in the actual machined part that were different from therequired solid model. An example applying thismethod for a feature is shown in Figure 10.FIGURE 10: A – SOLID MODEL OF REQUIRED PART; B – SOLID MODEL OF PART FROM TOOL POSITIONS SHOWING DISCREPANCIES BETWEEN ACTUAL PART FEATURES AND REQUIRED PART FEATURES. SHADED REGIONSDENOTE ~” DIFFERENCE IN MATERIAL REMOVAL.DISCUSSION AND CONCLUSIONS MTConnect makes it very easy to standardize data capture from disparate sources anddevelop common planning and verification applications. The importance of standardization cannot be overstated here – while it has always been possible to get process data from machine tools, this can be generally cumbersome andtime consuming because different machine tools require different methods of accessing data.Data analysis was also challenging to standardize as the data came in differentformats and custom subroutines were needed to process and analyze data from differentmachine tools. With MTConnect the data gathering and analysis process is standardized resulting in significant cost and time savings. This allowed us to develop the verification tools independent of the machine tools they were applied in. This also allowed us to rapidly deploy these tools in an industrial environment without any overheads (especially from the machine tool sitting idle). The toolpath verification was performed with minimal user intervention on a machine which was being actively used in a factory. The only setup needed was to initially configure the machine tool to output MTConnect-compliant data; since this is a onetime activity, it has an almost negligible impacton the long term utilization of the machine tool. Successful implementations of data capture and analysis applications over MTConnect requires a robust characterization of the data capture rates and the latency in the streaming information. Current implementations of MTConnect are over ethernet, and a data rate of about 10~100Hzwas observed in normal conditions (with no network congestion). While this is adequate for geometric analysis (such as the examples in this paper), it is not adequate for real-time process monitoring applications, such as sensor data logging. More work is needed in developing theMTConnect software libraries so that acceptable data rates and latencies can be achieved.One of the benefits of MTConnect is that it can act as a bridge between academic research and industrial practice. Researchers can developtools that operate on standardized data, whichare no longer encumbered by specific data formats and requirements. The tools can then be easily applied in industrial settings, as the framework required to implement the tools in a specific machine or system is already in place. Greater use of interoperability standards by the academic community in manufacturing research will lead to faster dissemination of research results and closer collaboration with industry. ACKNOWLEDGEMENTSWe thank the reviewers for their valuable comments. MTConnect is supported by AMT –The Association for Manufacturing Technology. We thank Armando Fox from the RAD Lab at UC Berkeley, and Paul Warndorf from AMT for their input. Research at UC Berkeley is supported by the Machine Tool Technology Research Foundation and the industrial affiliates of the Laboratory for Manufacturing and Sustainability. To learn more about the lab’s REFERENCESAltintas, Y., and Erkormaz, K., 2003, “Feedrate Optimization for Spline Interpolation In High Speed Machine Tools”, CIRP Annals –Manufacturing Technology, 52(1), pp. 297-302. de Souza, A. F., and Coelho, R. T., 2007, “Experimental Inv estigation of Feedrate Limitations on High Speed Milling Aimed at Industrial Applications”, Int. J. of Afv. Manuf. Tech, 32(11), pp. 1104–1114.Elber, G., 1995, “Freeform Surface Region Optimization for 3-Axis and 5-Axis Milling”, Computer-Aided Design, 27(6), pp. 465–470. MTConnectTM, 2008b, MTConnectTM Standard, Sencer, B., Altintas, Y., and Croft, E., 2008, “Feed Optimization for Five-axis CNC Machine Tools with Drive Constraints”, Int. J. of Mach.Tools and Manuf., 48(7), pp. 733–745. Vijayaraghavan, A., Sobel, W., Fox, A., Warndorf, P., Dornfeld, D. A., 2008, “Improving Machine Tool Interoperability with Standardized Interface Protocols”, Proceedings of ISFA. Vijayaraghavan, A., Hoover, A., Hartnett, J., and Dornfeld, D. A., 2009, “Improving Endmilli ng Surface Finish by Workpiece Rotation and Adaptive Toolpath Spacing”, Int. J. of Mach. Tools and Manuf., 49(1), pp. 89–98.World Wide Web Consortium (W3C), 2008, “Extensible Markup Language (XML),”Wright, P. K., Dornfeld, D. A., Sundararajan, V., and Misra, D., 2004, “Tool Path Generation for Finish Machining of Freeform Surfaces in the Cybercut Process Planning Pipeline”, Trans. of NAMRI/SME, 32, 159–166.毕业设计外文翻译网址。

毕 业 设 计(英文翻译)

毕 业 设 计(英文翻译)

附录G:英文翻译参考(要求学生完成与论文有关的外文资料中文字数5000字左右的英译汉,旨在培养学生利用外文资料开展研究工作的能力,为所选课题提供前沿参考资料。

)毕业设计(英文翻译)题目系别:专业:班级:学生姓名:学号:指导教师:一位从事质量管理的人约瑟夫·朱兰出生于圣诞夜,1904 在罗马尼亚的喀尔巴阡山脉山中。

他青年时期的村庄中贫穷、迷信和反犹太主义甚是猖獗。

1912年朱兰家搬到了明尼阿波尼斯州,虽然充满了危险,但是它却让一个男孩充满信心和希望。

从如此多了一个在质量观念的世界最好改革者之一。

在他90年的生活中,朱兰一直是一个精力充沛的思想者倡导者,推动着传统的质量思想向前走。

因为九岁就被雇用,朱兰表示在他的生活工作上永不停止。

记者:技术方面如何讲质量?朱兰:技术有不同方面:一、当然是精密。

物的对精密的需求像电子学、化学…我们看来它们似乎需要放大来说,和重要的原子尘的有关于质量。

要做到高精密具有相当大的挑战,而且我们已经遇见非常大的挑战。

另外的一个方面是可信度-没有失败。

当我们举例来说建立一个系统,同类空中交通管制的时候,我们不想要它失败。

我们必须把可信度建入系统。

因为我们投入很大的资金并依赖这些系统,系统非常复杂,这是逐渐增加的。

除此之外,有对公司的失败费用。

如果事物在领域中意外失败,可以说,它影响民众。

但是如果他们失败在内部,然后它影响公司的费用,而且已经试着发现这些费用在哪里和该如何免除他们。

因此那些是相当大的因素:精密、可信度和费用。

还有其它的,当然,但是我认为这些是主要的一些。

记者:据说是质量有在美国变成一种产业的可能?朱兰:资讯科技当然有。

已经有大的变化。

在世纪中初期当质量的一个想法到一个检验部门的时候,这有了分开的工作,东西被做坏之后。

检验是相当易错的程序,实际上。

而且无论如何,资讯科技在那天中相当花时间,直到某事已经被认为是否资讯科技是正确的。

应该强调计划,如此它不被错误首先订定。

6、毕业设计(论文)外文翻译(原文)模板

6、毕业设计(论文)外文翻译(原文)模板

编号:桂林电子科技大学信息科技学院毕业设计(论文)外文翻译(原文)系(部):专业:学生姓名:学号:指导教师单位:姓名:职称:年月日1、所填写内容“居中”对齐,注意每项下划线长度一致,所填字体为三号字、宋体字。

2、A4纸打印;页边距要求如下:页边距上下各为2.5 厘米,左右边距各为2.5厘米。

正文:要求为小四号Times New Roman字体,行间距取固定值(设置值为20磅);字符间距为默认值(缩放100%,间距:标准)。

页眉处“共X页”,X需要手动修改。

大功率LED散热的研究摘要:如何提高大功率LED的散热能力,是LED器件封装和器件应用设计要解决的核心问题。

介绍并分析了国内外大功率LED散热封装技术的研究现状,总结了其发展趋势与前景用途。

关键词:大功率LED;散热;封装1. 引言发光二极管(LED )诞生至今,已经实现了全彩化和高亮度化,并在蓝光LED 和紫光LED 的基础上开发了白光LED ,它为人类照明史又带来了一次飞跃。

发光二极管(LED)具有低耗能、省电、寿命长、耐用等优点,因而被各方看好将取代传统照明成为未来照明光源。

而大功率LED 作为第四代电光源,赋有“绿色照明光源”之称,具有体积小、安全低电压、寿命长、电光转换效率高、响应速度快、节能、环保等优良特性,必将取代传统的白炽灯、卤钨灯和荧光灯而成为21世纪的新一代光源。

普通LED 功率一般为0.05W ,工作电流为20mA ,大功率LED可以达到1W,2W,甚至数十瓦!工作电流可以是几十毫安到几百毫安不等。

其特点具有体积小、耗电小、发热小、寿命长、响应速度快、安全低电压、耐候性好、方向性好等优点。

外罩可用PC管制作,耐高温达135 度,低温-45 度。

广泛应用在油田、石化、铁路、矿山、部队等特殊行业、舞台装饰、城市景观照明、显示屏以及体育场馆等,特种工作灯具中的具有广泛的应用前景。

但由于目前大功率白光LED 的转换效率还较低,光通量较小,成本较高等方面因素的制约,因此大功率白光LED 短期内的应用主要是一些特殊领域的特种工作灯具,中长期目标才能是通用照明领域。

电子信息工程专业毕设 文献翻译 附英文原文

电子信息工程专业毕设 文献翻译 附英文原文

5.3. 时钟独立的显性误差
对于每一个特定的GPS时钟,在每个适用的时间从KF1相位偏差估计值减去 UECC估计值, 去估计其OEIC的相位。 在测量加工, OEIC包含在几部分纳秒内(见 图4)。图4展示了的两种情况下地面工作站时钟S1的OEIC。在蓝线的可见区间和 KF1测距处理显然有别于没有测量的传播间隔。在测量处理期间,KF1估计误差 的观察目标部分包含在几部分纳秒内。OEIC的协方差顺序计算需要每个时间点 的 KF1相位偏差估计误差和UECC估计误差的互协方差矩阵值。 我尚未能计算这
X K 1|K 1 X K 1|K K K 1[ y K 1 y( X K 1|K )]

Hale Waihona Puke (5)5. 难以观察的 GPS 时钟系统
GPS时间是由作战空军(USAF)卡尔曼滤波器处理 GPS伪距测量产生的。 GPS时间是多个GPS时钟的平均相位, 可是, 通过 GPS伪距测量, 每个运行的GPS 时钟的时钟相位是难以观察的,演示如下。GPS导航星的轨道参数是从GPS伪距 观测可观察到的。从GPS伪距测量可以得到USAF(美国空军)卡尔曼滤波器估 计轨道参数和时钟同步参数, 因此以这种方式将状态估计值分为隐式的时钟参数 子集和显式的轨道参数子集。通过应用谢尔曼有关MU函数的定理,演示了这种 分区方式。
4.3.2. 非线性函数 MU
计算 n ×1 矩阵滤波器增益 K K 1 :
T T 1 K K 1 PK 1|K H K 1 [ H K 1 PK 1| K H K 1 R K 1 ]
(4)
滤波器测量更新 n×1 状态估计矩阵 X K 1|K 1 ,观测 yK+1 得


态估计误差协方差方阵(正特征值)

通信工程毕业设计的论文外文翻译TDCDM与WCM络优化分析

通信工程毕业设计的论文外文翻译TDCDM与WCM络优化分析

毕业设计(论文)外文参考资料及译文译文题目: TD-SCDMA与WCMA网络优化分析3G network optimization 学生姓名:学号:专业:通信工程所在学院:龙蟠学院指导教师:职称:讲师2011年 12 月 1 日说明:要求学生结合毕业设计(论文)课题参阅一篇以上的外文资料,并翻译至少一万印刷符(或译出3千汉字)以上的译文。

译文原则上要求打印(如手写,一律用400字方格稿纸书写),连同学校提供的统一封面及英文原文装订,于毕业设计(论文)工作开始后2周内完成,作为成绩考核的一部分.3G network optimization摘自TD-SCDMA无线网络优化原理及方法One, the basic process of 3G network optimizationOperators aim is to build a profitable network, they are very concerned about the network construction, expansion and upgrade in the process of investment cost and its final performance, but the expansion,upgrade costs and network performance is a pair of contradiction. Construction cost budget and control can get relatively accurate numerical,but the performance of the network is composed of many subjective and objective factors. On one hand, the network capacity expansion,upgrading and upgrades to existing users can guarantee the normal use,on the other hand, it also can provide competitive new business,and makes further expansion,upgrading and upgrades can be carried out smoothly。

毕设外文翻译电子版

毕设外文翻译电子版

7.1 INTRODUCTIONAfter lathes, milling machines are the most widely used for manufacturing applications. In milling, the workpiece is fed into a rotating milling cutter, which is a multi-point tool as shown in Fig. 7.1, unlike a lathe, which uses a single point cutting tool. The tool used in milling is called the milling cutter.Fig. 7.1Schematic diagram of a milling operationThe milling process is characterised by:(i)Interrupted cutting Each of the cutting edges removes materialfor only a part of the rotation of the milling cutter. As a result, the cutting edge has time to cool before it again removes material.Thus the milling operation is much more cooler compared to the turning operation. This allows for a much larger material rates.(ii)Small size of chips Though the size of the chips is small, in view of the multiple cutting edges in contact a large amount of material is removed and as a result the component is generally completed ina single pass unlike the turning process which requires a largenumber of cuts for finishing.(iii)Variation in chip thickness This contributes to the non-steady state cyclic conditions of varying cutting forces during the contact of the cutting edge with the chip thickness varying from zero to maximum size or vice versa. This cyclic variation of the force can excite any of the natural frequencies of the machine tool system and is harmful to the tool life and surface finish generatedA milling machine is one of the most versatile machine tools. It is adaptable for quantity production as well as in job shops and tool rooms. The versatility of milling is because of the large variety of accessories and tools available with milling machines. The typical tolerance expected from the process is about ±0.050 mm.7.2 TYPES OF MILLING MACHINESTo satisfy various requirements milling machines come in a number of sizes and varieties. In view of the large material removal ratesmilling machines come with a very rigid spindle and large power. The varieties of milling machines available are:(i) Knee and Column type(a) horizontal(b) vertical(c) universal(d) turret typeThese are the general purpose milling machines, which have a high degree of flexibility and are employed for all types of works including batch manufacturing. A large variety of attachments to improve the flexibility are available for this class of milling machines.(ii) Production (Bed) type(a) simplex(b) duplex(c) triplexThese machines are generally meant for regular production involving large batch sizes. The flexibility is relatively less in these machines which is suitable for productivity enhancement.(iii) Plano millersThese machines are used only for very large workpieces involving table travels in meters.(iv) Special type(a) Rotary table(b) Drum type(c) Copy milling (Die sinking machines)(d) Key way milling machines(e) Spline shaft milling machinesThese machines provide special facilities to suit specific applications that are not catered to by the other classes of milling machines.7.2.1 Knee and Column Milling MachinesThe knee(升降台) and column type is the most commonly used machine in view of its flexibility and easier setup. A typical machine construction is shown in Fig. 7.2 for the horizontal axis. The knee houses the feed mechanism and mounts the saddle and table. The table basically has the T-slots running along the X-axis for the purpose of work holding. The table moves along the X-axis on the saddle while the saddle moves along the Y-axis on the guide ways provided on the knee.The feed is provided either manually with a hand wheel or connected for automatic by the lead screw, which in turn is coupled to the main spindle drive. The knee can move up and down (Z-axis) on a dovetail provided on the column.Fig. 7.2 Horizontal knee and column type milling machineThe massive column at the back of the machine houses all the power train including the motor and the spindle gearbox. The power for feeding the table lead screw is taken from the main motor through a separate feed gearbox. Sometimes a separate feed motor is provided for the feed gearbox as well.While the longitudinal and traverse motions are provided with automatic motion, the raising of the knee is generally made manually.The spindle is located at the top end of the column. The arbour used to mount the milling cutters is mounted in the spindle and is provided with a support on the other end to take care of the heavy cutting forces by means of an overarm with bearing. As shown in Fig.7.2 the overarm extends from the column with a rigid design. The spindle nose has the standard Morse taper of the suitable sizedepending upon the machine size.The milling cutters are mounted on the arbour at any desired position, the rest of the length being filled by standard hardened collars of varying widths to fix the position of the cutter. The arbour is clamped in the spindle with the help of a draw bar and then fixed with nuts.Milling machines are generally specified on the following basis:(i) Size of the table, which specifies the actual working area on the table and relates to the maximum size of the workpiece that can be accommodated.(ii) Amount of table travel, which gives the maximum axis movement that is possible.(iii) Horse power of the spindle, which actually specifies the power of the spindle motor used. Smaller machines may come with 1 to 3 hp while the production machines may go from 10 to 50 hp.Another type of knee and column milling machine is the vertical axis type. Its construction is very similar to the horizontal axis type, except for the spindle type and location.The vertical axis milling machine is relatively more flexible (Fig. 7.4) and suitable for machining complex cavities such as die cavities in tool rooms. The vertical head is provided with a swiveling facility in horizontal direction whereby the cutter axis can be swivelled. This isuseful for tool rooms where more complex milling operations are carried out.The spindle is located in the vertical direction and is suitable for using the shank mounted milling cutters such as end mills, In view of the location of the tool, the setting up of the workpiece and observing the machining operation is more convenient.Fig, 7.3 Vertical knee and column type milling machineFig.7.4 Some of the milling operations normally carried out on vertical axis machinesThe universal machine has the table which can be swivelled in a horizontal plane at about 45o to either the left or right. This makes the universal machine suitable for milling spur and helical gears as well as worm gears and cams.7.2.2 Bed Type Milling MachineIn production milling machines it is desirable to increase the metal removal rates. If it is done on conventional machines by increasingthe depth of cut, there is possibility of chatter. Hence another varietyof milling machines named as bed type machines are used which are made more rugged and are capable of removing more material. The ruggedness is obtained as a consequence of the reduction in versatility.The table in the case of bed type machines is directly mounted on the bed and is provided with only longitudinal motion.The spindle moves along with the column to provide the cutting action. Simplex machines (Fig. 7.5) are the ones with only one spindle head while duplex machines have two spindles (Fig. 7.6). The two spindles are located on either side of a heavy workpiece and remove material from both sides simultaneously.Fig. 7.5 Simplex bed type milling machineFig. 7.6 Duplex bed type milling machine7.3 MILLING CUTTERSThere are a large variety of milling cutters available to suit specific requirements. The versatility of the milling machine is contributed toa great extent by the variety of milling cutters that are available.7.3.1 Types of Milling CuttersMilling cutters are classified into various types based on a variety of methods.(i) Based on construction:(a) Solid(b) Inserted tooth typeBased on mounting:(a) Arbor mounted(b) Shank mounted(c) Nose mountedBase on rotation:(a) Right hand rotation (counter clockwise)(b) Left hand rotation (clockwise)Based on helix:(a) Right hand helix(b) Left hand helixMilling cutters are generally made of high speed steel or cemented carbides. The cemented carbide cutters can be of a brazed tip variety or with indexable tips. The indexable variety is more common since it is normally less expensive to replace the worn out cutting edges than to regrind them.Plain milling cutters These are also called slab milling cutters and are basically cylindrical with the cutting teeth on the periphery as shown in Fig. 7.7. These are generally used for machining flat surfaces.Fig. 7.7 Arbor mounted milling cutters for general purposeLight duty slab milling cutters generally have a face width, which is small of the order of 25 mm. They generally have straight teeth and large number of teeth.Heavy duty slab milling cutters come with a smaller number of teeth to allow for more chip space. This allows taking deeper cuts and consequently high material removal rates.Helical milling cutters have a very small number of teeth but a large helix angle. This type of cutter cuts with a shearing action, which can produce a very fine finish. The large helix angle allows the cutter to absorb most of the end load and therefore the cutter enters and leaves the workpiece very smoothly.Side and face milling cutters These have the cutting edges not only onthe face like the slab milling cutters, but also on both the sides. As aresult, these cutters become more versatile since they can be used for side milling as well as for slot milling.Staggered tooth side milling cutters are a variation where the teeth are arranged in an alternate helix pattern. This type is generally used for milling deep slots, since the staggering of teeth provides for greater chip space.Another variation of the side and face cutter is the half side milling cutter, which has cutting edges only on one side. This arrangement provides a positive rake angle and is useful for machining on only one side. These have a much smoother cutting action and a long tool life. The power consumed is also less for these cutters.Fig. 7.8Special forms of arbor mounted milling cuttersSlitting saws The other common form of milling cutters in the arbor mounted category is the slitting saw. This is very similar to a saw blade inappearance as well as function. Most of these have teeth around the circumference while some have side teeth as well. The thickness of these cutters is generally very small and is used for cutting off operations or for deep slots.Special form cutters In addition to the general type of milling cutters described above, there are a large number of special form milling cutters available which are used for machining specific profiles.Angular milling cutters are made in single or double angle cutters for milling any angle such as 30, 45 or 60o Form relieved cutters are made of various shapes such as circular, corner rounding, convex or concave shapes.T-slot milling cutters are used for milling T-slots such as those in the milling machine table. The central slot is to be milled first using an end mill before using the T-slot milling cutter. Woodruff key seat milling cutters are used for milling as the name suggests, woodruff key seats Some other special form cutters are dovetail milling cutters and gear milling cutters.End mills These are shank mounted as shown in Fig. 7.9 and are generally used in vertical axis milling machines. They are used for milling slots, key ways and pockets where other type of milling cutters cannot be used. A depth of cut of almost half the diameter can be taken with the end mills.The end mills have the cutting edge running through the length of the cutting portion as well as on the face radially up to a certain length. The helix angle of the cutting edge promotes smooth and efficient cutting even at high cutting speeds and feed rates. High cutting speeds(转速?) are generally recommended for this type of milling cutters.Fig. 7.9 Shank mounted milling cutters and various types of end mills There are a large variety of end mills. One of the distinctions is based on the method of holding, i.e., the end mill shank can be straight or tapered. The straight shank is used on end mills of small size and held in the milling machine spindle with the help of a suitable collet. The tapered shank can be directly mounted in the spindle with the help of the selfholding taper. If the taper is small compared to the spindle taper, then an adopter accommodating both the tapers is used.The end teeth of the end mills may be terminated at a distance from the cutter center or may proceed till the center (Fig. 7.9 f). Those with the cutting edge up to the center are called slot drills or end cutting end mills since they have the ability to cut into the solid material (Fig. 7.9 g). The other type of end mills which have a larger number of teeth cannot cut into solid material and hence require a pilot hole drilled before a pocket is machined.The cutting edge along the side of an end mill is generally straight and sometimes can be tapered by grinding on a tool and cutter grinder such that the draft required for mould and die cavities can be automatically generated.。

毕业设计(论文)外文资料及译文(模板)

毕业设计(论文)外文资料及译文(模板)

大连东软信息学院
毕业设计(论文)外文资料及译文
系所:
专业:
班级:
姓名:
学号:
大连东软信息学院
Dalian Neusoft University of Information
外文资料和译文格式要求
一、装订要求
1、外文资料原文(复印或打印)在前、译文在后、最后为指导教师评定成绩。

2、译文必须采用计算机输入、打印。

3、A4幅面打印,于左侧装订。

二、撰写要求
1、外文文献内容与所选课题相关。

2、本科学生译文汉字字数不少于4000字,高职学生译文汉字字数不少于2000字。

三、格式要求
1、译文字号:中文小四号宋体,英文小四号“Times New Roman”字型,全文统一,首行缩进2个中文字符,1.5倍行距。

2、译文页码:页码用阿拉伯数字连续编页,字体采用“Times New Roman”字体,字号小五,页底居中。

3、译文页眉:眉体使用单线,页眉说明五号宋体,居中“大连东软信息学院本科毕业设计(论文)译文”。

大连东软信息学院毕业设计(论文)译文
大连东软信息学院毕业设计(论文)译文
大连东软信息学院毕业设计(论文)译文
大连东软信息学院毕业设计(论文)译文
大连东软信息学院毕业设计(论文)译文。

外文翻译模板

外文翻译模板

外文翻译模板(总12页)--本页仅作为文档封面,使用时请直接删除即可----内页可以根据需求调整合适字体及大小--杭州电子科技大学毕业论文外文文献翻译要求根据《普通高等学校本科毕业设计(论文)指导》的内容,特对外文文献翻译提出以下要求:一、翻译的外文文献可以是一篇,也可以是两篇,但总字符要求不少于万(或翻译成中文后至少在3000字以上)。

二、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关着作及其他相关材料,应与毕业论文(设计)主题相关,并作为外文参考文献列入毕业论文(设计)的参考文献。

并在每篇中文译文标题尾部用“脚注”形式注明原文作者及出处,中文译文后应附外文原文(全文,格式为word)。

不能翻译中国学者的文章,不能翻译准则等有译文的着作。

三、中文译文的基本撰写格式1.题目:采用小三号、黑体字、居中打印;段前二行,段后二行。

2.正文:采用小四号、宋体字,行间距一般为固定值20磅,标准字符间距。

页边距为左3cm,右,上下各,页面统一采用A4纸。

四、外文原文格式1.题目:采用小三号、Times New Roman、居中打印;段前二行,段后二行。

2.正文:采用小四号、Times New Roman,行间距一般为固定值20磅,标准字符间距。

页边距为左3cm,右,上下各,页面统一采用A4纸。

五、封面格式由学校统一制作(注:封面上的“翻译题目”指中文译文的题目),并按“封面、封面、译文、外文原文、考核表”的顺序统一装订。

毕业论文外文文献翻译毕业论文题目Xxx翻译题目指翻译后的中文译文的题目学院会计学院(以本模板为准)专业XXXXXX(以本模板为准)姓名XXXXXX(以本模板为准)班级XXXXXX(以本模板为准)学号XXXXXX(以本模板为准)指导教师XXXXXX(以本模板为准)译文管理者过度乐观与债务、股权融资之间的选择1本文采取了一家成长较快速的公司作为样本,比较债务融资和股权融资后的长期股票业绩。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

信工学院毕业设计外文
翻译封面
Document serial number【NL89WT-NY98YT-NC8CB-NNUUT-NUT108】
毕业设计外文资料翻译
专业名称网络工程
班级学号
学生姓名吕帅
指导教师胡硕
填表日期 2015 年 04 月 02 日
Cryptography isone ofthe maintraditional technology andinformation security technology,it is theShannoninformation theory andcryptography theory andtechnology based on thedigital content protection,theuse ofencryptionmethod to
complete,i.e.themultimediadata fileis encrypted into ciphertextafter the
release,theillegal attackerappearsin the transmission processcannot obtainconfidentialinformation from thetext,so as to achievethe purpose ofcopyright protection andinformation security.Butthis does not completely solve the problem: the spread ofanencrypted filebecause it is notcomprehensibleand hinderthe multimedia information;on the other hand,through themultimedia informationencryptionis easy to causethe attacker'sattention and curiosity,andthere isthe possibility of cracking,and when theinformation isreceivedanddecrypted,theencryptionthe documentandthe document,will no longer be protected,not spared frompiracy.In other
words,cryptographycan protectthe transmissionofcontent,and the contentoncedecryptionwill no longer have theprotection.Therefore,there is an urgent need for areplacementorsupplement thecryptographytechnology,itevencan continue to protect thecontent is decryptedincontent.In this way,people put forward thenewconcept ofdigital watermarking,information hiding.Digital watermark isa new direction in thefield of information security technology,is anewtechnologyto protectcopyright and authentication source andintegrality in theopen network environment,the creation ofinformation andpersonal logocreatorthrough digitalwatermarking system toembed the watermarkcan not be perceivedbypeoplein themedia,peoplecan not perceiveon the face ofthe watermark,onlyspecial detector orcomputer softwarethatcan detect thedigital watermarkhidden.。

相关文档
最新文档