毕业设计英语参考文献
英语专业毕业论文文献综述要求和格式
英语专业毕业论文文献综述报告的基本要求文献综述是作者对某一方面问题的历史背景、前人工作、争论焦点、研究现状和发展前景等内容进行评论的论文。
文献综述要求对文献资料进行综合分析、归纳整理,使材料更精练明确、更有逻辑层次;并对综合整理后的文献进行比较专门的、全面的、深入的、系统的论述。
牛顿说过:如果我能比别人看得更远些,那是因为我站在前人肩上的缘故。
对于撰写本科毕业论文来说,一篇好的文献综述就能起到这样的作用。
撰写本科毕业论文需要做好一些基础性的工作。
其一是要了解前人关于这一课题研究的基本情况。
研究工作最根本的特点就是要有创造性,而不是重复别人走过的路。
熟悉前人对本课题的研究情况,可以避免重复研究的无效劳动,可以站在前人的基础上,从事更高层次、更有价值的研究。
其二是要掌握与课题相关的基础理论知识。
理论基础扎实,研究工作才能有一个坚实的基础,否则,没有理论基础,你就很难深入研究下去,很难有真正的创造。
上述两项基础性工作,在文献综述中得到了充分的体现。
文献综述是由学生通过系统地查阅与所选课题相关的国内外文献,进行搜集、整理、加工,从而撰写出综合性叙述和评价的文章。
在文献综述中,要较全面地反映与本课题直接相关的国内外研究成果,特别是近年来的最新成果和发展趋势,也要指出该课题需要进一步解决的问题。
通过文献综述对中外研究成果的比较和评价,不仅可以进一步阐明本课题选题的意义,还可以为本课题组织材料、形成观点奠定基础。
文献综述的写作是本科学生毕业论文创作中一次重要的研究实践活动。
文献综述的写作能反映出学生多方面的能力,其中主要的则是中外文献阅读能力和综合分析能力。
(二)文献综述的基本特征文献是指用文字、图形、符号、声频、视频等技术手段记录知识的载体,是各种资料的总称。
文献综述的基本特征可以概括为下面三点。
第一,综合性。
文献综述是对某一时期同一课题的所有主要研究成果的综合概括。
因此,要尽可能把所有重要研究成果搜集到手,并作认真的加工、整理和分析,使各种流派的观点清楚明晰,不要遗漏重要的流派和观点。
毕业设计英语参考文献
C++[1] Gordon Hogenson. C++/Cli The Visual C++ Language For .Net [M]. Wiley India Pvt. Ltd., 2007.[2] Motor Industry Software Reliability Association. MISRA-C: 2004: guidelines for the use of the C language in critical systems.[M]. MIRA, 2008.[3] Jeff Cogswell, John Paul Mueller. C++ All-In-One Desk Reference For Dummies [M]. Wiley publishing.Inc 2009.[4] Stephen R. Davis. C++ for Dummies [M]. wiley publishing.Inc 2008.[5] Harvey Dietel, Paul Deitel. C: How to Program [M]. Pearson Education,Inc 2010.[6] Bruce Eckel. Thinking in C++[M]. Prentice Hall, 2000.[7] Herbert Schildt. C++: a beginner's guide Beginner's Guides[M]. McGraw-Hill Professional, 2003.[8] Mark Lee. C++ Programming for the Absolute Beginner For the Absolute Beginner[M]. Course Technology, 2009.MIS参考文献[9] Kenneth C. Laudon, Jane P. Laudon . Management Information Systems: Managing the Digital Firm[M]. Publisher Prentice Hall, 2007.[10] Raymond McLeod, George P. Schell. Management information systems[M]. Pearson/Prentice Hall, 2007.[11] James A. O'Brien, George M. Marakas. Management Information Systems[M]. McGraw-Hill/Irwin, 2008.[12] Singh. Information System Management[M]. S.B. Nangia APH publishing Corporation .2007.[13] Kenneth C. Laudon, Jane Price Laudon.Management Information Systems: Managing the Digital Firm MyMISLab Series[M]. Prentice Hall, 2009.数据库参考文献[14] Thomas M. Connolly, Carolyn E. Begg. Database systems: a practical approach to design, implementation, and management[M]. Addison-Wesley, 2009.[15] Abraham Silberschatz, Henry F. Korth, S. Sudar shan. Database System Concepts[M]. McGraw-Hill, 2010.[16] Peter Rob, Carlos Coronel.Database Systems[M]. Cengage Learning EMEA, 2008.[17] J. Stanley Warford. Computer Systems[M]. Jones & Bartlett Publishers, 2009.[18] Toby J. Teorey, Stephen Buxton, Lowell Fryman, Terry Halpin. Database design: know it allKnow It All[M]. Morgan Kaufmann, 2009.[19] John W. Satzinger. Systems Analysis and Design in a Changing World[M]. Cengage Learning EMEA, 2008.SQL 参考文献[20] Alan Beaulieu. Learning SQLO'Reilly Series[M]. O'Reilly Media, Inc., 2009.[21] Clare Churcher. Beginning SQL Queries: From Novice to ProfessionalApress Series[M]. Apress, 2008.[22] Andy Oppel, Robert Sheldon. SQL: a beginner's guide BEGINNER'S GUIDE[M]. McGraw-Hill Professional, 2008.[23] Chris Fehily. SQL: Visual QuickStart Guide Visual Quickstart Guide Series[M]. Peachpit Press, 2008.交通管理参考文献:[24] Peter T. Martin, Aleksandar Stevanovic, Mountain Plains Consortium. Adaptive signal control, five: Sydney Coordinated Adaptive Traffic System evaluation in Park City, Utah Issues 6-200 of MPC report[M]. Mountain-Plains Consortium, 2008. [25] Kenneth J. Button, David A. Hensher. Handbook of transport systems and traffic control Volume 3 of Handbooks in Transportation Research Series[M]. Emerald Group Publishing, 2001.[26] Mashrur A. Chowdhury, Adel Wadid Sadek. Fundamentals of intelligent transportation systems planning Artech House ITS library[M]. Artech House, 2003.[27] Michael A. P. T aylor, Peter W. Bonsall, William Young. Understanding traffic systems: data, analysis, and presentation[M]. Ashgate, 2000.[28] Mike Slinn, Paul Matthews, Peter Guest.Traffic engineering design: principles and practice[M]. Butterworth-Heinemann, 2005.。
土木毕设外文参考文献
土木毕设外文参考文献以下是一份土木工程毕设外文参考文献,供您参考:1.generally, construction under the traditional construction procedure is performed by contractors. (2016) "construction under the traditional construction procedure". construction management. 35(7): 46-53.2. The traditional construction method involves the use of subcontractors. (2018) "the traditional construction method". architectsdigest. 22(1): 24-29.3. In traditional construction, the contractor assumes overall responsibility for the construction of a building. (2017) "traditional construction". building design. 113(11): 82-89.4. The traditional construction process involves the use of bid pricing. (2018) "the traditional construction process". architectsdigest. 21(4): 36-41.5. In traditional construction, the contractor is responsible for all materials, equipment, power, labor, and supervision required for construction. (2017) "traditional construction". building design. 113(11): 82-89.6. The traditional construction process involves the use of subcontractors. (2018) "the traditional constructionprocess". architectsdigest. 21(4): 36-41.7. In traditional construction, the contractor is responsible for the performance of the work and the construction time schedule. (2017) "traditional construction". building design. 113(11): 82-89.8. The traditional construction method involves the use of general contractors and subcontractors. (2018) "the traditional construction method". architectsdigest. 22(1): 24-29.9. The traditional construction process involves the use of bidding. (2017) "the traditional construction process". architectsdigest. 21(4): 36-41.10. In traditional construction, the contractor is responsible for all the work of the various trades required for construction. (2018) "the traditional construction method". architectsdigest.。
机器人毕业设计参考文献
机器人毕业设计参考文献以下是一些关于机器人毕业设计的参考文献:1. "Robot Operating System for Mobile Robotics Applications" by Anis Koubaa2. "Robotics: Modelling, Planning and Control" by Bruno Siciliano, Lorenzo Sciavicco, Luigi Villani, Giuseppe Oriolo3. "Robotics: State of the Art and Future Challenges" edited by Jadran Lenarčič, Baochuan Li4. "Introduction to Autonomous Robots: Kinematics, Perception, Localization and Planning" by Nikolaus Correll5. "Introduction to Robotics: Analysis, Systems, Applications" by Saeed B. Niku6. "Robotics, Vision and Control: Fundamental Algorithms in MATLAB" by Peter Corke7. "Principles of Robot Motion: Theory, Algorithms, and Implementations" by Howie Choset, Kevin M. Lynch, Seth Hutchinson, George Kantor, Wolfram Burgard, Lydia E. Kavraki, Sebastian Thrun8. "Robotics Automation and Control" edited by Abul Hasan Siddiqi, Mahesh Chavan, Anish Goel, Anurag Mishra, Prashantha Jayaram, Navin Kumar, Rajesh S. Bansode9. "Introduction to Mechatronics and Measurement Systems" by David G. Alciatore, Michael B. Histand10. "Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms" by Jorge Angeles请注意,具体参考文献的选择应根据你的研究主题和方向进行调整。
土木工程毕业设计英文参考文献
土木工程毕业设计英文参考文献1. Chen, Z., & Yang, J. (2015). Study on the Application of BIM Technology in Civil Engineering. Applied Mechanics and Materials, 549, 1097-1103.2. Wang, J., & Xu, H. (2014). Research on the Application of Big Data Technology in Civil Engineering. Advances in Computer Science Research, 32, 327-334.3. Wang, X., & Li, Z. (2017). Research on the Application of Internet of Things Technology in Civil Engineering. Advances in Engineering Research, 103, 209-214.4. Zhang, Y., & Hu, H. (2016). Study on the Application of Artificial Intelligence Technology in Civil Engineering. Journal of Computational and Theoretical Nanoscience, 13(11), 8320-8324.5. Li, J., & Liu, T. (2019). Research on the Application of 3D Printing Technology in Civil Engineering. Journal of Physics: Conference Series, 1140, 012042.6. Wu, H., & Liu, Y. (2018). Study on the Application of Robotics Technology in Civil Engineering. Applied Mechanics and Materials, 878, 646-651.7. Wang, Q., & Zhang, L. (2016). Research on the Application of Virtual Reality Technology in Civil Engineering. AppliedMechanics and Materials, 864, 485-490.8. Liu, Y., & Wang, X. (2017). Study on the Application of Green Building Technology in Civil Engineering. Advanced Materials Research, 1014, 146-150.9. Zhang, L., & Li, T. (2015). Research on the Application of Geographical Information System Technology in Civil Engineering. International Journal of Environmental, Chemical, Ecological, Geological and Geophysical Engineering, 9(2), 150-154.10. Zhou, H., & Yang, W. (2019). Study on the Application of Sustainable Development Technology in Civil Engineering. Journal of Sustainable Development, 12(5), 15-20.。
毕业设计电动车电池参考文献英文
IntroductionElectric vehicles (EVs) have gained significant attention in recent years due to their potential to reduce greenhouse gas emissions and dependence on fossil fuels. The battery is a crucial component of an electric vehicle, as it provides the energy required for propulsion. A well-designed and efficient battery system is essential for the success of an EV.This research paper aims to explore the various aspects of electric vehicle batteries for a graduation project on electric vehicle battery design. The paper discusses the different types of batteries used in electric vehicles, their characteristics, advantages, and challenges. Additionally, it touches upon the battery management system, charging infrastructure, and future advancements in electric vehicle batteries.Types of Electric Vehicle Batteries1.Lithium-ion Batteries: Lithium-ion batteries are the mostcommonly used batteries in electric vehicles due to their highenergy density, long cycle life, and lightweight characteristics.They provide a good balance between performance, cost, and safety.A comprehensive investigation of the structure, working principle,and limitations of lithium-ion batteries is essential fordesigning an optimized battery system.2.Nickel-Metal Hydride (Ni-MH) Batteries: Ni-MH batteries werewidely used in electric vehicles before the emergence of lithium-ion batteries. They offer a relatively lower energy density thanlithium-ion batteries but have better thermal stability, whichensures safer operation. A comparative analysis between lithium-ion and Ni-MH batteries can aid in choosing the appropriatebattery for the design project.3.Solid-State Batteries: Solid-state batteries are a promisingalternative to traditional lithium-ion batteries. They utilizesolid electrolytes instead of liquid electrolytes, providinghigher energy density, improved safety, and faster chargingcapabilities. Although still under development, solid-statebatteries hold great potential for the future of electric vehicles.Battery Management System (BMS)The Battery Management System (BMS) is responsible for monitoring and controlling the battery’s performance, safety, and lifespan. A well-designed BMS ensures the optimal operation of the battery system, preventing overcharging, undercharging, and excessive discharge. It provides accurate state-of-charge (SOC) and state-of-health (SOH) estimations, which are crucial for maximizing the battery’s efficiency.The BMS consists of various components, including sensors, control algorithms, and battery balancing circuits. In-depth research on BMS architecture, functionality, and control strategies is necessary to design an effective battery management system for the electric vehicle.Charging InfrastructureThe availability of a robust charging infrastructure is essential for widespread adoption and convenience of electric vehicles. The research project should explore the different types of charging stations, including:1.Level 1 Charging: Level 1 charging refers to standard householdoutlets (120V), which provide a slow charging rate but are widely accessible.2.Level 2 Charging: Level 2 charging utilizes dedicated chargingstations (240V). It offers a faster charging rate compared toLevel 1 and is commonly found in residential areas, workplaces,and public charging stations.3.DC Fast Charging: DC Fast Charging, also known as Level 3charging, provides rapid charging capabilities by directlydelivering DC power to the vehicle’s battery. These chargingstations are typically located along highways and major routes.The paper should discuss the importance of a well-established charging infrastructure and address potential challenges and solutions to the deployment of charging stations.Future AdvancementsThe field of electric vehicle batteries is continuously evolving, with ongoing research and advancements. It is crucial for the researchproject to explore future developments, such as:1.Advanced Lithium-ion Batteries: Researchers are constantlyworking on improving the energy density, charging speed, andsafety of lithium-ion batteries. Advancements in materials,electrode designs, and electrolytes are expected to result in more efficient and long-lasting batteries.2.Solid-State Batteries: As mentioned earlier, solid-statebatteries hold immense potential for the future of electricvehicles. The research should discuss the current challenges faced in commercializing solid-state batteries and potentialbreakthroughs that can lead to their widespread adoption.3.Beyond Lithium-ion: Besides solid-state batteries, alternativebattery chemistries like lithium-sulfur (Li-S) and lithium-air(Li-Air) batteries are being explored for their high energydensities. Understanding these emerging battery technologies canpave the way for future advancements in EV batteries.ConclusionDesigning an efficient and reliable battery system is crucial for the success of an electric vehicle. This research paper provides a comprehensive and detailed analysis of different types of electric vehicle batteries, their characteristics, and the importance of a well-designed battery management system and charging infrastructure. Furthermore, it explores future advancements in electric vehicle battery technologies. By understanding these aspects, the research project can aim to design an optimized electric vehicle battery system that contributes to a sustainable and greener transportation future.Note: The content provided above is a suggested structure for the research paper related to the topic of “Graduation Project - Electric Vehicle Battery”. Please add relevan t and specific details from appropriate academic references to complete the paper.。
房建毕业设计英文参考文献
房建毕业设计英文参考文献The undergraduate course in civil engineering requires students to complete a final year project, which involves conducting research and writing a dissertation. This process necessitates extensive literature review to gain a comprehensive understanding of the topic, identify existing knowledge gaps, and formulate research questions. Consequently, consulting relevant literature sources is crucial for ensuring the quality and academic rigor of the project. This paper aims to provide a comprehensive list of English reference sources that can be utilized by civil engineering students during their final year project.Firstly, it is essential to consult authoritative textbooks and handbooks in the field of civil engineering. These resources serve as foundational sources of information, offering in-depth explanations of key concepts, theories, and methodologies. Examples of such textbooks include "Structural Analysis" by Hibbeler, "Reinforced Concrete Design" by Nilson et al., and "Foundation Engineering Handbook" by Fang. These texts not only provide theoretical knowledge but also offer practical applications and case studies relevant to various subfields of civil engineering.Furthermore, peer-reviewed journal articles are invaluable sources of the latest research findings and advancements in the field. Renowned journals such as the "Journal of Structural Engineering," "Construction and Building Materials," and "Transportation Research Record" publish cutting-edge research conducted by experts in their respective domains. Accessing these journals through online databases like ScienceDirect, Scopus, or Web of Science can facilitate the discovery of relevant literature tailored to the specific research topic.Online repositories and digital libraries are another essential resource for accessing a wealth of academic literature. Platforms like the American Society of Civil Engineers (ASCE) Library, the Institution of Civil Engineers (ICE) Virtual Library, and the National Technical Information Service (NTIS) offer extensive collections of technical reports, conference proceedings, and research papers related to civil engineering projects. These resources often provide valuable insights and data that may not be readily available in traditional journal publications.Additionally, official guidelines, codes, and standards issued by professional organizations and regulatory bodies are crucial reference materials for civil engineering projects. Documents such as the American Concrete Institute (ACI) Code, the International Building Code (IBC), and the American Association of State Highwayand Transportation Officials (AASHTO) Bridge Design Specifications provide authoritative guidance on design principles, construction practices, and safety regulations that must be adhered to in civil engineering projects.Moreover, government publications and technical reports from agencies like the Federal Highway Administration (FHWA), the Environmental Protection Agency (EPA), and the United States Geological Survey (USGS) can offer valuable information on topics such as infrastructure development, environmental impact assessments, and geotechnical investigations. These resources often present case studies, research findings, and best practices that can inform and guide civil engineering projects.Finally, it is crucial to consider online resources and databases that aggregate and provide access to a wide range of civil engineering literature. Platforms like the ASCE Civil Engineering Database, the Engineering Village, and Google Scholar enable comprehensive searches across various sources, including journals, conference proceedings, dissertations, and technical reports. These resources can significantly streamline the literature review process and ensure that relevant studies are not overlooked.In conclusion, a thorough literature review is essential for the successful completion of a civil engineering final year project. Byconsulting authoritative textbooks, peer-reviewed journals, online repositories, official guidelines, government publications, and comprehensive databases, students can gain a deep understanding of their research topic, identify gaps in existing knowledge, and develop well-informed research questions and methodologies. Leveraging these English reference sources will not only enhance the quality of the project but also contribute to the advancement of knowledge in the field of civil engineering.。
英文参考文献格式
英文参考文献格式篇一:英语论文参考文献格式要求英语专业本科毕业论文参考文献格式要求I.文内引用(一)直接引用1.引用中的省略原始资料的引用:在正文中直接引用时,应给出作者、年份,并用带括号的数字标出页码。
若有任何资料省略,使用英文时,应用3个省略号在句中标出(),中文用6个();若两句间的资料省略,英文应用4个省略号标出(‥‥),中文用6个()。
若要在直接引用插入自己的解释,应使用方括号[ ]。
若在资料中有什么错误拼写、错误语法或标点错误会使读者糊涂,应在引用后立即插入[sic],中文用[原文如此]。
下面是一些示例:例一:The DSM IV defines the disorder [dysthymic] as being in a chronically depressed mood that occurs for most of the day more days than not for at least two years (Criterion A) .... In children, the mood may be irritable rather than depressed, and the required minimum duration is only one year (APA, 1994, p. 345).例二:Issac (1995) states that bipolar disorder is not only uncommon but may be the most diagnostic entity in children and adolescents in similar settings .... and may be the most common diagnosis in adolescents who are court-remanded to such settings (p.275).2.大段落引用当中文引用超过160字时,不使用引号,而使用“块”的形式(引用起于新的一行,首行缩进4个空格,两端对齐,之后每行都缩进)。
计算机毕设英文参考文献
计算机毕设英文参考文献当涉及到毕业设计或者毕业论文的参考文献时,你可以考虑以下一些经典的计算机科学领域的文献:1. D. E. Knuth, "The Art of Computer Programming," Addison-Wesley, 1968.2. A. Turing, "On Computable Numbers, with an Application to the Entscheidungsproblem," Proceedings of the London Mathematical Society, 1936.3. V. Bush, "As We May Think," The Atlantic Monthly, 1945.4. C. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, 1948.5. E. W. Dijkstra, "Go To Statement Considered Harmful," Communications of the ACM, 1968.6. L. Lamport, "Time, Clocks, and the Ordering of Events in a Distributed System," Communications of the ACM, 1978.7. T. Berners-Lee, R. Cailliau, "WorldWideWeb: Proposal for a HyperText Project," 1990.8. S. Brin, L. Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," Computer Networks and ISDN Systems, 1998.这些文献涵盖了计算机科学领域的一些经典工作,包括算法、计算理论、分布式系统、人机交互等方面的内容。
3D毕业设计论文常用参考文献
文献:1.[美]B·约瑟夫·派恩,詹姆士·H·吉尔摩.体验经济[卜1].北京:机械工业出版社,20022.[美]Donald A Norman.情感化设计[m.北京:电子工业出版社,20053.[法]马克·第亚尼.非物质社会[M].成都:四川人民出版社,19984.[美]B·H·施密特.体验营销[H].经济日报出版社,20045.[美]布里顿.体验:从平凡到卓越的产品策略CM].北京:中信出版社,20036.[英]史密斯.顾客体验品牌化m].北京:机械工业出版社,20047.[美]恰安,沃格尔.创造突破性产品——从产品策略到项目定案的创新[M].北京:机械工业出版社,200452注释:①[法]马克·第亚尼.非物质社会[H].成都:四川人民出版社,1998②金开诚.文艺心理学术语详解辞典[H].北京:北京大学出版社,1992③[美]诺尔曼·丹森.情感论[H].沈阳:辽宁人民出版社,1989④[苏]雅科布松.情感心理学[H].哈尔滨:黑龙江人民出版社,1997⑤[美]唐纳德·A·诺曼.情感化设计[H].北京:电子工业出版社。
2005⑥[美]诺尔曼·丹森.情感论[M].沈阳:辽宁人民出版社,1989色彩:参考文献1.J. Wiley and Sons.《Color Research and Application》.New York∶1976.2.林书尧.《色彩认识论》.台北∶三民书局:1986.3.小林重顺.《色彩行销战略》.台北∶前程企业管理公司:1986.4.大田登and 刘中本.《色彩工学》.西安∶西安交通大学出版社:1997.5.J. 埃姆斯and 赵晓红.《通俗色彩理论: 全新的色彩理论, 以色彩理论指导调色》.北京∶中国建筑工业出版社:1998.6.B. Jane, K. Taylor and 孙建华.《色彩的奥秘》.2000.7.李金花and 韩国I.R.I色彩研究所.《Color Combination色彩设计师配色密码》.北京∶电子工业出版社:2003.8.Heller.Eva and 吴彤.《色彩的文化》.北京∶中央编译出版社:2004.9.吉米.《流行色彩: 与国际同步的中国色彩流行趋势》.北京∶中国城市出版社:2004.10.李明吉, 安文哲and 韩. I.R.I色彩研究所.《色彩设计师营销密码》.北京∶人民邮电出版社:2005.11.潘泰克.斯蒂芬, 罗斯.理查德and 汤凯青.《美国色彩基础教材》.上海∶上海人民美术出版社:2005.12.程杰铭, 陈夏洁and 顾凯.《色彩学》.北京∶科学出版社:2006.13.南云治嘉and 黄文娟.《色彩战略: 色彩设计的商业应用》.北京∶中国。
毕业设计外文参考文献
[1] 王起江,洪杰.超超临界电站锅炉用新型管材的研制[J].宝钢技术,2008(5):44-53.[2] 王起江,邹凤鸣.T91高压锅炉管的研制与应用[J].发电设备,2005 (1):43-47.[3] Fujio Abe.Bainitic and martensitic creep-resistant steels[J].Solid State andMaterials Science,2004,8:305-311.[4] 马明编译.美国新的超临界机组考虑使用T/P92的原因[J].电力建设,2006,27(11):79-80.[5] 戴平.国产P91钢管道存在的问题及其解决[J].广东电力,2008,21(8):67-69.[6] 田党.关于难变形钢和合金管坯的二辊斜轧穿孔问题[J].钢铁,1998,33(1):33-36.[7] P J Ennis,A Czyrska-Filemonowicz.Recent advances in creep-resistant steelsfor power plant applications [J].Sādhanā,2003,28:709–730.[8] 刘立民,朱洪,刘志国.法国T91、P91钢管性能评定[J].电站系统工程,2002,18(1):63-64.[9] 彭孙鸿.T91钢管在我国的应用前景[J].宝钢技术,1997,6:48-50.[10] H.C. Furtado,L.H. de Almeida,I. Le May.Precipitation in 9Cr–1Mo steel aftercreep deformation[J].Materials Characterization,2007,58:72–77.[11] 蒯春光,彭志方.T/P91钢在450-1200℃区间各相元素的分配特征及相稳定性[J].金属学报,2008,44(8):897-900.[12] 孙智,董小文,张绪平,等.奥氏体化温度对9Cr-1Mo-V-Nb钢组织与性能的影响[J].金属热处理,2001,26(8):12-14.[13] 刘靖,周立新,傅晨光,等.电站锅炉用T91钢热穿孔性能的研究[J].钢管,2002,31(5):9-11.[14] 彭孙鸿,尤夙志,姜明娟,等.热穿孔温度对T91持久强度的影响[J].特殊钢,2001,22(2):10-12.[15] 崔光珠,朱伏先,高德福,等.T91钢高温变形特性研究[J].塑性工程学报,1999,6(2):13-16.[16] 余勇,周晓岚,赵志毅,等.T91变形抗力模型建立及理论轧制压力计算[J].宝钢技术,2006(3):31-34.[17] Polcik P,Sailer T,Blum W,et al.On the microstructural development of thetempered martensitic Cr-steel P91 during long-term creep[J].Materials Science and Engineering,1999,260:252-259.[18] Orlová A,Buršík J,Kucharová K,et al.Microstructural development duringhigh temperature creep of 9% Cr steel[J].Materials Science and Engineering,1998,254:39-48.[19] Sasaki,Terufumi,Kobayashi,et al.Production and properties of seamlessmodified 9Cr-1Mo steel boiler tubes[R].Kaw asaki Steel Technical Report,1991,25(4):78-87.[20] Bendick W,Vaillant JC,Vandenberghe B,et al.Properties and workability ofnew creep strength enhanced steels as known grades 23, 24, 911 and 92[J].International Journal of Pressure Vessels and Piping,2004,476:25-29.[21] 刘江南,王正品,束国刚,等.P91钢的形变强化行为[J].金属热处理,2009,34(1):28-32.[22] Tőkei Z S,Viefhaus H,Grabke H J.Initial stages of oxidation of a9CrMoV-steel: role of segregation and martensite laths[J].Applied Surface Science,2000,165:23-33.[23] Rajendran P S,Sankar P,Khatak H S.Cyclic oxidation of P91 at 1073, 1123 and1173K[J].High Temperature Materials and Processes,2004,23(3):195-204.[24] Ahmed Shibli,Fred Starr.Some aspects of plant and research experience in theuse of new high strength martensitic steel P91[J].International Journal of Pressure Vessels and Piping,2007,84:114-122.[25] J.C. Vaillant,B. Vandenberghe,B. Hahn,et al.T/P23, 24, 911 and 92: Newgrades for advanced coal-fired power plants—Properties and experience [J].International Journal of Pressure Vessels and Piping,2008,85:38-46.[26] Brett SJ.The creep strength of weak thick section modified 9Crforgings[C].Proceedings of Baltica,2001,1:39-45.[27] U.Gampe,P.Seliger.Creep crack growth testing of P91 and P22bends[J].International Journal of Pressure Vessels and Piping,2001,78:859-864.[28] L.Kunz,P.Lukáš.High temperature fatigure and cyclic creep of P91steel[J].European Structural Integrity Society,2002,29:37-44.[29] B.Fournier,M.Sauzay,C.Caës,et al.Creep-fatigue-oxidation interactions ina 9Cr-1Mo martensitic steel[J].International Journal of Pressure Vessels andPiping,2008,85:478-485.[30] 刘洪杰.电站锅炉用P91钢蠕变/疲劳交互作用的试验研究[J].动力工程,2007,27(6):990-995.[31] LIU Jiang-nan,JIE Wang-qi.Application of improved vacuum degassingtechnique to refinement of heat resistant steel P91[J].Trans. Nonferrous Met.Soc. China,2005,15:291-294.[32] 苏俊,张铮,李进.P91高压锅炉管的开发[J].钢管,2008,37(4):33-37.[33] 郭元蓉,吴红.P91无缝钢管国产化研究进展[J].钢管,2008,37(1):22-27.[34] 王起江,邹凤鸣,张瑞,等.宝钢T91高压锅炉管性能试验与研究[J].宝钢技术,2003,(4):46-50.[35] Miyata K,Sawaragi Y.Effect of Mo and W on the phase stability of precipitatesin low Cr heat resistant steels[J].ISIJ,2001,41:281-289.[36] Wachter O,Ennis PJ.Investigation of the properties of the 9% Cr steel of thetype 9Cr-0.5Mo-1.8W-V-Nb with respect to its application as a pipework and boiler steel operation at elevated temperatures[D].Germany,1995.[37] Hättestrand M,Andrén H O.Evaluation of particle size distribution in a 9% Crsteel using EFTEM[J].Micron,2001,32:789-797.[38] Sklenicka V,Kucharova K,Svoboda M,et al.Long-term creep behavior of9-12%Cr power plant steels [J].Mater. Character,2003,51:35-48.[39] Strang A,Foldyna V,Lenert J,et al.Prediction of the long-term creep ruptureproperties of 9-12Cr power plant steels [C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,427-441.[40] Kimura K,Kushima H,Sawaka K.Long-term creep strength prediction of highCr ferritic creep resistant steels based on degradation mechanisms[C].Proceedings of the 6th International Charles Parsons Turbine Conference,Dublin,2003,444-456.[41] 高巍,刘江南,王正品,等.P92钢塑性变形行为[J].西安工业大学学报,2008,28(4):356-359.[42] 田党,张根良,卜玉钦.二辊斜轧穿孔时高合金钢的变形分布和分层缺陷形成机制[J].钢铁,1995,30(1):40-45.[43] 刘新生,赵定国,崔成业.冷轧薄板中分层现象的研究[J].钢铁,2008,43(5):40-43.[44] 崔风平,赵乾,唐愈.铸坯内部缺陷对钢板分层形成的影响[J].中国冶金,2008,18(2):14-18.[45] 唐生斌.板材分层缺陷产生原因分析[J].连铸,2003,4:32-34.[46] 洪小玲,肖荣仁,李端来.GH3030合金锻坯裂纹分析[J].钢铁研究,2002,128(5):11-12.[47] S.A.Sharadzenidze,E.A.Svetlitskii.High Quality Seamless Tubes[J]. Metallurg,1968,11:38-39.[48] 王建文.27SiMn钢管表面龟裂原因分析[J].湖南冶金,2000,5:25-26.[49] 任建国,祁晓英,马学军,等.低合金钢热轧缺陷分析[J].沈阳工业学院学报,1996,15(3):35-37.[50] 卢居桂,安自亮,刘钰.夹杂物引起的石油套管缺陷分析[J].天津冶金,2002,106(1):27-29.[51] 田党.关于锥形辊穿孔机轧辊转速对毛管分层缺陷影响的讨论[J].钢管,2006,35(4):12-16.[52] 王永吉,陈大国,王世英,等.二辊斜轧穿孔轧辊转速对高合金钢毛管质量的影响[J].钢铁,1985,20(2):25-30.[53] 严智.高温合金穿孔工艺的研究[J].特钢技术,1994,2:27-31.[54] 田党.高温合金无缝管材的研制与生产[J].钢管,2002,31(3):1-6.[55] 田党.关于毛管分层缺陷的试验研究[J].轧钢,1997,6:7-10.[56] 田党.高温合金管坯在二辊斜轧穿孔机上的穿孔实践[J].天津冶金,1996,4:25-28.[57] 田党.毛管分层缺陷形成过程的观察和分析[J].天津冶金,1996,1:24-26.[58] 田党.高温合金毛管分层缺陷形成的过程[J].钢管,1992,1:19-22.[59] 卢于逑,王先进.二辊斜轧穿孔中心金属断裂机理和穿孔变形工艺实质[J].钢铁,1980,6:7-15.[60] 卢于逑,王先进.二辊斜轧穿孔圆坯断面的变形分布[J].金属学报,1980,4:470-479.[61] 田党,张根良,卜玉钦.二辊斜轧穿孔时高温合金钢圆坯的变形分布及分层形成机制[J].钢铁,1995,30(1):40-46.[62] 田党,李群.关于锥形辊穿孔机的穿孔原理及应用问题的讨论[J].钢管,2003,32(6):1-4.[63] 赵咏秋,吴秀丽,陈菊芳.0Cr18Ni9Ti热轧荒管分层内裂原因分析[J].物理测试,1999,2:33-35.[64] 张存信,冯晓庭,项炳和,等.不锈钢无缝管加工过程中断裂原因简析[J].钢管,2008,37(3):38-42.[65] 袁桂林,苏殿荣.GCr15钢管环状层裂在二辊斜轧穿孔过程中的发生和发展[J].钢管,1983,3:15-18.[66] 张世文,刘仓理,李庆忠,等.初始应力状态对材料层裂破坏特性影响研究[J].力学学报,2008,40(4):535-542.[67] 侯凤桐.日本住友金属公司新开发的菌式穿孔机[J].钢管技术,1985,2:57-59.[68] Chihiro HAYASHI,Tomio YAMAKAWA.Influences of Feed and Cross Angleon Inside Bore and Lamination Defects in Rotary Piercing for Materials with Poor Hot Workability [J].ISIJ International,1997,37(2):153-160.[69] 嵇国金,彭颖红,阮雪榆.有关金属体积成形中的韧性断裂准则[J].金属成形工艺,1998,16(4):36-37.[70] 郭达人编译.金属材料的断裂及其断口分析[J].国外金属热处理,1996,17(4):25-31.[71] 黄建科,董湘怀.金属成形中韧性断裂准则的细观损伤力学研究进展[J].上海交通大学学报,2006,40(10):1748-1753.[72] Oyane M,Sota T,Okintoto K,et al.Criteria for ductile fractures and theirapplications[J].J Mech Work Tech,1980,4:65-81.[73] 郑长卿,张克实,周利.金属韧性破坏的细观力学及其应用研究[M].北京:国防工业出版社,1995,28-32.[74] Venugopal Rao A,Ramakrishnan N,Krishna Kumar R.A comparativeevaluation of the theoretical failure criteria for workability in cold forging[J].Journal of Materials Processing Technology,2003,142(1):29-42.[75] Komori Kazutake.Effect of ductile fracture criteria on chevron crack formationand evolution in drawing[J].International Journal of Mechanical Sciences,2003,45(1):141-160.[76] Ozturk Fahrettin,Lee Daeyong.Analysis of forming limits using ductile fracturecriteria[J].Journal of Materials Processing Technology,2004,147(3):397-404.[77] Jeong Kim,Sung-Jong Kang,Beom-Soo Kang.A prediction of bursting failurein tube hydroforming processes based on ductile fracture criterion[J].Int J Adv Manuf Technol,2003,22:357-362.[78] 虞松,陈军,阮雪榆.韧性断裂准则的试验与理论研究[J].中国机械工程,2006,17(19):2049-2052.[79] 胡庆安,程侠,邰卫华.金属材料断裂预测损伤破坏准则的应用[J].长安大学学报,2007,27(4):100-102.[80] 俞树荣,严志刚,曹睿,等.有限元软件模拟裂纹扩展的方法探讨[J].甘肃科学学报,2003,15(4):15-21.[81] 陈乃超,田冠玉,郑博.12Cr1MoV短期高温冲击断裂韧性及其参数的研究[J].上海电力学院学报,2008,24(2):178-181.[82] Ken-ichiro Mori,Hidenori Yoshimura,Kozo Osakada.Simplified three-dimensional simulation of rotary piercing of seamless pipe by rigid-plastic finite-element method[J].Journal of Materials Processing Technology,1998,80-81:700-706.[83] Y van Chastel,Aliou Diop,Silvio Fanini,et al.Finite Element Modeling ofTube Piercing and Creation of a Crack[J].Int J Mater Form,2008,Suppl 1:355-358.[84] Hyoung Wook Lee,Geun An Lee,Eung Kim,et al.Prediction of plug tipposition in rotary tube piercing mill using simulation and experiment[J].International Journal of Modern Physics B,2008,22(31-32):5787-5792.[85] S Fanini,A Ghiotti,S Bruschi.Evaluation of Fracture Initiation in theMannesmann Piercing Process[C].The 10th ESAFORM Conference on Material Forming,2007,709-714.[86] Saurabh Dwivedi,Samuel H,Huang Jun Shi,et al.Yield prediction for seamlesstubing processes: a computational intelligence approach[J].Int Adv Manuf Technol,2008,37:314-322.[87] Elisabetta Ceretti,Claudio Glaudio,Aldo Attanasio.3D Simulation andValidation of Tube Piercing Process[C].NUMIFORM 07 Materials and Design: Modling, Simulation and Applications,2007,413-418.[88] Kazutake Komori.Simulation of Mannesmann piercing process by thethree-dimensional rigid-plastic finite-element method[J].International Journal of Mechanical Sciences,2005,47:1838-1853.[89] Hayashi C,Yamakawa T.Influence of feed and cross angle on rotary forgingeffects and redundant shear deformation in rotary piercing process[J].ISIJ International,1997,37:146-152.[90] 曾幼宗.斜轧穿孔工艺的有限元分析[J].钢管,2004,33(3):51-53.[91] 双远华,赖明道,张中元.斜轧穿孔过程金属流动的有限元模拟[J].机械工程学报,2004,40(3):140-144.[92] 双远华,赖明道,张中元.钢管斜轧过程应力应变与温度耦合模拟分析[J].锻压技术,2003(6):36-40.[93] 李胜衹,陈大宏,孙中建,等.二辊斜轧穿孔时圆管坯的变形与应力分布及其发展[J].钢铁研究学报,2000,12(5):26-30.[94] A Ghiotti,S Fanini,S Bruschi,et al.Modeling of the Mannesmanneffect[J].CIRP Annals-Manufacturing Technology,2009,58:255-258.[95] E.I. Panov.Shear Stresses and Their Dependence on Different ProcessParameters in The Helical Rolling of Solid Semifinished Products[J].Metallurgist,2005,49(7-8):280-292.[96] E.I. Panov.Certain Aspects of The Stress-Strain State of Semifinished Productsin Helical Rolling[J].Metallurgist,2003,47(11-12):499-505.[97] E.I. Panov.Effect of thrust and tension on the radial stresses in helical rolling[J].Metallurg,2004,4:50-57.[98] Z. Pater,J. Kazanecki,J. Bartnicki.Three dimensional thermo-mechanicalsimulation of the tube forming process in Diescher’s mill [J].Journal of Materials Processing Technology,2006,177:167-170.[99] 双远华,陈惠琴,赖明道.斜轧管材生产中内部组织有限元模拟和预测[J].中国有色金属学报,2001,11(2):238-242.[100] 双远华,张中元,赖明道.热轧穿孔内部组织控轧的工业性试验研究[J].钢铁,2002,37(6):42-47.[101] J C Prince,R Maroño,F León.Thermomechanical analysis of a piercing mandrel for the production of seamless steel tubes[J].J. Process Mechanical Engineering,2003,217:337-344.[102] W.A.Khudheyer,D.C.Barton,T.Z.Blazynski.A comparison between macroshear redundancy and loading effects in 2- and 3-roll rotary tube cone piercers[J].Journal of Materials Processing Technology,1997,65:191-202.[103] A.N.Nikulin,V.V. Streletskii.Deformation of continuous cast metal during rotary rolling[J].Metallurgist,2005,49(3-4):97-101.[104] Kazutake Komori,Kouta Mizuno.Study on plastic deformation in cone-type rotary piercing process using model piercing mill for modeling clay[J].Journal of Materials Processing Technology,2009,209:4994-5001.[105] 李连诗.钢管塑性变形原理(上册)[M],北京:冶金工业出版社,1985:178-185.[106] 卢于逑.斜轧穿孔过程中应力和变形的分布和中心金属断裂机构的某些特点分析[D].北京:北京钢铁学院,1963.[107] 卢于逑,王先进.二辊斜轧穿孔时圆坯断面的变形分布和发展[J].金属学报,1980,16(4):470-479.[108] 严泽生.现代热轧无缝钢管生产[M].北京:冶金工业出版社,2009:175-195.[109] Takuda H,Mori K,Hatta N.The application of some criteria for ductile fracture to the prediction of the forming limit of sheet metals[J].J Mater Process Technol,1999,95:116-121.[110] Takuda H,Mori K,Fujimoto H,et al.Prediction of the forming limit in bore-expanding of sheet metals using ductile fracture criteria[J].J Mater Process Technol,1999,92-93:433-438.[111] Mori K,Takuda H.Prediction of forming limit in deep drawing of finite element simulation and criterion for ductile fracture[J].Transaction of NAMRI/SME XXIV,1996,143-148.[112] Takuda H,Mori K,Takakura N,et al.Finite element analysis of limit strains in biaxial stretching of sheet metals allowing for ductile fracture[J].Int J Mech Sci,2000,42:785-798.。
毕业论文英文参考文献
毕业论文英文参考文献论文的参考文献是在英语专业论文写作过程中,对某一著作或论文的整体的参考或借鉴。
征引过的文献在注释中已注明,不再出现于文后参考文献中。
下面是店铺带来的关于毕业论文英文参考文献的内容,欢迎阅读参考!毕业论文英文参考文献(一)[1]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).[2]Coulombe,JosephL.ReadingNativeAmericanLiterature[M\. NewYork:Routledge,2011.[3]Erdrich,Louise.TheRoundHouse\M\.NewYork:HarperCollin sPublishers,2012.[J].作家,2013(12):1.[4]杨恒.弱者的失语法律的缺位--评美国国家图书奖获奖作品《圆屋》[J].博览群书,2013(6):84-88.[5]Said,Edward.CultureandImprerialism[M].NewYork:Vintage Books,1994.[6]Erdrich,Louise.LoveMedicine[M],NewYork:HarperPerennia l,1993.[7]罗世平.凝视:后殖民主义文学折射[J].国外文学,2006(4):122.[8]任一鸣.《后殖民:批评理论与文学》[M].北京:外语教学与研究出版社,2008.[9]Halliday,Lisa.LouiseErdrich[J].ParisReview,2010(52):133-137.[10]温语晴.书写印第安文化的温暖和困境一美国当代作家路易丝·厄德里克和她的作品.[11]陈榕.《凝视》[A].《西方文论关键词》[C].ed.赵一凡.北京:外语教学与研究出版社,2011.[12]Russo,Maria.Disturbing the spirits[i]. New York TimesBook Review, 2012(10): 9[13]Said, Edward. Culture and Imprerialism[M]. New York: Vintage Books,1994.[14]Fanon,Frantz. The Wretched of the Earth[M]. New York: Grove Press,1968.[15]徐安律.原住民小说《圆屋》获美国国家图书奖[N].中华读书报,2012(004).毕业论文英文参考文献(二)[1] 陈鹏.高速公路服务区及收费站建筑节能研究[D].中南大学,2007[2] 清华大学建筑节能研究中心.中国建筑节能年度发展研究报告[M]2014.北京:中国建筑工业出版社,2014:39[3] 李慧玲.绿色建筑理念下的高速公路服务区建筑设计研究[D].西安:长安大学,2011[4] 公通字[2009]46 号.民用建筑外保温系统及外墙装饰防火暂行规定[S].新乡市建筑工程质量监督站印发.2009[5] 汤旭东.建筑工程中的现浇聚苯复合材料屋面保温技术[J].江西建材,2014,(11):45[6] 杨欣霖.高速公路服务区绿色建筑技术体系研究[D].西安:长安大学,2011[7] 欧志华,郭俊明.浅谈我国建筑节能50%设计标准的含义[J].建筑节能,2007,35(12):60-62[8] 邹惠芬,王国业,郭立杰等.严寒地区窗户热工性能对建筑能耗的影响分析[J].沈阳建筑大学学报(自然科学版).2009,25(5):982-986[9] 崔洪军,刘孔杰.国外服务区建设及研究现状[J].中国交通报,2008,(12):138-139[10] 郎松军.建筑结露的起因和防治方法初探[J].四川建筑,2002,22(Z1):201-203[11] 王金奎,史慧芳,邵旭.体形系数在公共建筑节能设计中的应用[J].低温建筑技术,2010,(5):98-99[12] 王丽颖,丘雨佳.对德国被动式居住建筑节能技术的考察[J].长春工程学院学报,2013,14(3):38-40[13] 赖有志,陆京海,杨军霞,张童.现浇轻质泡沫混凝土在屋面工程中的应用[J].施工技术.2011,40(14):79-94毕业论文英文参考文献(三)[1]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[2]黄梅.女人的危机和小说的危机--女人与小说杂谈之四[J].读书,1988(01):5.[3]孙宗白.真诚的女作家多丽丝·莱辛[J].外国文学研宄,1981(3):70.[4]施旻.《金色笔记》是女性主义文本吗·一关于多丽丝·莱辛及其《金色笔记》的论争[J].东岳论丛,2000(5): 132-134.[5]李福祥.多丽丝·莱辛笔下的政治与妇女主题[J].外国文学评论,1993(4):40-43[6]黎会华·多丽丝·莱辛《金色笔记》中的现代主义技巧分析[J].外语研究,2003(6):73.[7]陈才宇,刘新民.金色笔记[M].北京:译林出版社,2000.[8]黎会华·解构菲勒斯中心:构建新型女性主义主体一《金色笔记》的女性主义阅读[J].浙江师范大学学报,2004(3):33.[9]韩小敏,纪卫宁.析伍尔夫与莱辛文学创作的相似性[J].理论专刊,2004(8):125-126.[10]姜红.有意味的形式[J].外国文学,2003(4):96-98.[11]徐燕.《金色笔记》的超小说艺术[J].宁波大学学报,2003(3):78-80[12]蒋花,史志康.整合与对话一论《金色笔记》中的戏仿[J].当代外国文学,2007(2):78.[13]卢婧.《金色笔记》的艺术形式与作者莱辛的人生体验[D].南京师范大学博士学位论文,2008.[14]佘海若.迟来的正义:被缚的自由女性一记2007年诺贝尔文学奖[J].今日科苑,2007(23): 19-24.[15]刘颖.建构女性的主体性话语一评多丽丝·莱辛的《金色笔记》[J].邵阳学院学报,2004(4).[16]范晓红.从《金色笔记》解读多丽丝·莱辛的生态整体观[D].南京师范大学,2011.[17]Brewster, Dorothy. Doris Lessing\M\. New York: Wayne, 1965: 161.[18]Spilka, Mark. Lessing and Lawrence: the Battle of theContemporary Literature,1975(16): 218-240.。
毕业设计——关于传感器的英语参考文献
DiMo:Distributed Node Monitoring in WirelessSensor NetworksAndreas Meier†,Mehul Motani∗,Hu Siquan∗,and Simon Künzli‡†Computer Engineering and Networks Lab,ETH Zurich,Switzerland∗Electrical&Computer Engineering,National University of Singapore,Singapore‡Siemens Building T echnologies,Zug,SwitzerlandABSTRACTSafety-critical wireless sensor networks,such as a distributed fire-or burglar-alarm system,require that all sensor nodes are up and functional.If an event is triggered on a node, this information must be forwarded immediately to the sink, without setting up a route on demand or having tofind an alternate route in case of a node or link failure.Therefore, failures of nodes must be known at all times and in case of a detected failure,an immediate notification must be sent to the network operator.There is usually a bounded time limit,e.g.,five minutes,for the system to report network or node failure.This paper presents DiMo,a distributed and scalable solution for monitoring the nodes and the topology, along with a redundant topology for increased robustness. Compared to existing solutions,which traditionally assume a continuous data-flow from all nodes in the network,DiMo observes the nodes and the topology locally.DiMo only reports to the sink if a node is potentially failed,which greatly reduces the message overhead and energy consump-tion.DiMo timely reports failed nodes and minimizes the false-positive rate and energy consumption compared with other prominent solutions for node monitoring.Categories and Subject DescriptorsC.2.2[Network Protocols]:Wireless Sensor NetworkGeneral TermsAlgorithms,Design,Reliability,PerformanceKeywordsLow power,Node monitoring,Topology monitoring,WSN 1.INTRODUCTIONDriven by recent advances in low power platforms and protocols,wireless sensor networks are being deployed to-day to monitor the environment from wildlife habitats[1] Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on thefirst page.To copy otherwise,to republish,to post on servers or to redistribute to lists,requires prior specific permission and/or a fee.MSWiM’08,October27–31,2008,Vancouver,BC,Canada.Copyright2008ACM978-1-60558-235-1/08/10...$5.00.to mission-criticalfire-alarm systems[5].There are,how-ever,still some obstacles in the way for mass application of wireless sensor networks.One of the key challenges is the management of the wireless sensor network itself.With-out a practical management system,WSN maintenance will be very difficult for network administrators.Furthermore, without a solid management plan,WSNs are not likely to be accepted by industrial users.One of the key points in the management of a WSN is the health status monitoring of the network itself.Node failures should be captured by the system and reported to adminis-trators within a given delay constraint.Due to the resource constraints of WSN nodes,traditional network management protocols such as SNMP adopted by TCP/IP networks are not suitable for sensor networks.In this paper,we con-sider a light-weight network management approach tailored specifically for WSNs and their unique constraints. Currently,WSN deployments can be categorized by their application scenario:data-gathering applications and event-detection applications.For data-gathering systems,health status monitoring is quite straight forward.Monitoring in-formation can be forwarded to the sink by specific health status packets or embedded in the regular data packets.Ad-ministrators can usually diagnose the network with a helper program.NUCLEUS[6]is one of the network management systems for data-gathering application of WSN.Since event-detection deployments do not have regular traffic to send to the sink,the solutions for data-gathering deployments are not suitable.In this case,health status monitoring can be quite challenging and has not been discussed explicitly in the literature.In an event-detection WSN,there is no periodic data trans-fer,i.e.,nodes maintain radio silence until there is an event to report.While this is energy efficient,it does mean that there is no possibility for the sink to decide whether the net-work is still up and running(and waiting for an event to be detected)or if some nodes in the network have failed and are therefore silent.Furthermore,for certain military ap-plications or safety-critical systems,the specifications may include a hard time constraint for accomplishing the node health status monitoring task.In an event-detection WSN,the system maintains a net-work topology that allows for forwarding of data to a sink in the case of an event.Even though there is no regular data transfer in the network,the network should always be ready to forward a message to the sink immediately when-ever necessary.It is this urgency of data forwarding that makes it undesirable to set up a routing table and neighborlist after the event has been detected.The lack of regular data transfer in the network also leads to difficulty in de-tecting bad quality links,making it challenging to establish and maintain a stable robust network topology.While we have mentioned event-detection WSNs in gen-eral,we accentuate that the distributed node monitoring problem we are considering is inspired by a real-world ap-plication:a distributed indoor wireless alarm system which includes a sensor for detection of a specific alarm such as fire(as studied in[5]).To illustrate the reporting require-ments of such a system,we point out that regulatory speci-fications require afire to be reported to the control station within10seconds and a node failure to be reported within 5minutes[9].This highlights the importance of the node-monitoring problem.In this paper,we present a solution for distributed node monitoring called DiMo,which consists of two functions: (i)Network topology maintenance,introduced in Section2, and(ii)Node health status monitoring,introduced in Sec-tion3.We compare DiMo to existing state-of-the-art node monitoring solutions and evaluate DiMo via simulations in Section4.1.1Design GoalsDiMo is developed based on the following design goals:•In safety critical event monitoring systems,the statusof the nodes needs to be monitored continuously,allow-ing the detection and reporting of a failed node withina certain failure detection time T D,e.g.,T D=5min.•If a node is reported failed,a costly on-site inspectionis required.This makes it of paramount interest todecrease the false-positive rate,i.e.,wrongly assuminga node to have failed.•In the case of an event,the latency in forwarding theinformation to the sink is crucial,leaving no time toset up a route on demand.We require the system tomaintain a topology at all times.In order to be robustagainst possible link failures,the topology needs toprovide redundancy.•To increase efficiency and minimize energy consump-tion,the two tasks of topology maintenance(in par-ticular monitoring of the links)and node monitoringshould be combined.•Maximizing lifetime of the network does not necessar-ily translate to minimizing the average energy con-sumption in the network,but rather minimizing theenergy consumption of the node with the maximal loadin the network.In particular,the monitoring shouldnot significantly increase the load towards the sink.•We assume that the event detection WSN has no reg-ular data traffic,with possibly no messages for days,weeks or even months.Hence we do not attempt to op-timize routing or load balancing for regular data.Wealso note that approaches like estimating links’perfor-mance based on the ongoing dataflow are not possibleand do not take them into account.•Wireless communications in sensor networks(especially indoor deployments)is known for its erratic behav-ior[2,8],likely due to multi-path fading.We assumesuch an environment with unreliable and unpredictablecommunication links,and argue that message lossesmust be taken into account.1.2Related WorkNithya et al.discuss Sympathy in[3],a tool for detect-ing and debugging failures in pre-and post-deployment sen-sor networks,especially designed for data gathering appli-cations.The nodes send periodic heartbeats to the sink that combines this information with passively gathered data to detect failures.For the failure detection,the sink re-quires receiving at least one heartbeat from the node every so called sweep interval,i.e.,its lacking indicates a node fail-ure.Direct-Heartbeat performs poorly in practice without adaptation to wireless packet losses.To meet a desired false positive rate,the rate of heartbeats has to be increased also increasing the communication cost.NUCLEUS[6]follows a very similar approach to Sympathy,providing a manage-ment system to monitor the heath status of data-gathering applications.Rost et al.propose with Memento a failure detection sys-tem that also requires nodes to periodically send heartbeats to the so called observer node.Those heartbeats are not directly forwarded to the sink node,but are aggregated in form of a bitmask(i.e.,bitwise OR operation).The ob-server node is sweeping its bitmask every sweep interval and will forward the bitmask with the node missing during the next sweep interval if the node fails sending a heartbeat in between.Hence the information of the missing node is disseminated every sweep interval by one hop,eventually arriving at the sink.Memento is not making use of ac-knowledgements and proactively sends multiple heartbeats every sweep interval,whereas this number is estimated based on the link’s estimated worst-case performance and the tar-geted false positive rate.Hence Memento and Sympathy do both send several messages every sweep interval,most of them being redundant.In[5],Strasser et al.propose a ring based(hop count)gos-siping scheme that provides a latency bound for detecting failed nodes.The approach is based on a bitmask aggre-gation,beingfilled ring by ring based on a tight schedule requiring a global clock.Due to the tight schedule,retrans-missions are limited and contention/collisions likely,increas-ing the number of false positives.The approach is similar to Memento[4],i.e.,it does not scale,but provides latency bounds and uses the benefits of acknowledgements on the link layer.2.TOPOLOGY MAINTENANCEForwarding a detected event without any delay requires maintaining a redundant topology that is robust against link failures.The characteristics of such a redundant topology are discussed subsequently.The topology is based on so called relay nodes,a neighbor that can provide one or more routes towards the sink with a smaller cost metric than the node itself has.Loops are inherently ruled out if packets are always forwarded to relay nodes.For instance,in a simple tree topology,the parent is the relay node and the cost metric is the hop count.In order to provide redundancy,every node is connected with at least two relay nodes,and is called redundantly con-nected.Two neighboring nodes can be redundantly con-nected by being each others relay,although having the same cost metric,only if they are both connected to the sink. This exception allows the nodes neighboring the sink to be redundantly connected and avoids having a link to the sinkas a single point of failure.In a(redundantly)connected network,all deployed nodes are(redundantly)connected.A node’s level L represents the minimal hop count to the sink according to the level of its relay nodes;i.e.,the relay with the least hop count plus one.The level is infinity if the node is not connected.The maximal hop count H to the sink represents the longest path to the sink,i.e.,if at every hop the relay node with the highest maximal hop count is chosen.If the node is redundantly connected,the node’s H is the maximum hop count in the set of its relays plus one, if not,the maximal hop count is infinity.If and only if all nodes in the network have afinite maximal hop count,the network is redundantly connected.The topology management function aims to maintain a redundantly connected network whenever possible.This might not be possible for sparsely connected networks,where some nodes might only have one neighbor and therefore can-not be redundantly connected by definition.Sometimes it would be possible tofind alternative paths with a higher cost metric,which in turn would largely increase the overhead for topology maintenance(e.g.,for avoiding loops).For the cost metric,the tuple(L,H)is used.A node A has the smaller cost metric than node B ifL A<L B∨(L A=L B∧H A<H B).(1) During the operation of the network,DiMo continuously monitors the links(as described in Section3),which allows the detection of degrading links and allows triggering topol-ogy adaptation.Due to DiMo’s redundant structure,the node is still connected to the network,during this neighbor search,and hence in the case of an event,can forward the message without delay.3.MONITORING ALGORITHMThis section describes the main contribution of this paper, a distributed algorithm for topology,link and node monitor-ing.From the underlying MAC protocol,it is required that an acknowledged message transfer is supported.3.1AlgorithmA monitoring algorithm is required to detect failed nodes within a given failure detection time T D(e.g.,T D=5min).A node failure can occur for example due to hardware fail-ures,software errors or because a node runs out of energy. Furthermore,an operational node that gets disconnected from the network is also considered as failed.The monitoring is done by so called observer nodes that monitor whether the target node has checked in by sending a heartbeat within a certain monitoring time.If not,the ob-server sends a node missing message to the sink.The target node is monitored by one observer at any time.If there are multiple observer nodes available,they alternate amongst themselves.For instance,if there are three observers,each one observes the target node every third monitoring time. The observer node should not only check for the liveliness of the nodes,but also for the links that are being used for sending data packets to the sink in case of a detected event. These two tasks are combined by selecting the relay nodes as observers,greatly reducing the network load and maximiz-ing the network lifetime.In order to ensure that all nodes are up and running,every node is observed at all times. The specified failure detection time T D is an upper bound for the monitoring interval T M,i.e.,the interval within which the node has to send a heartbeat.Since failure detec-tion time is measured at the sink,the detection of a missing node at the relay needs to be forwarded,resulting in an ad-ditional maximal delay T L.Furthermore,the heartbeat can be delayed as well,either by message collisions or link fail-ures.Hence the node should send the heartbeat before the relay’s monitoring timer expires and leave room for retries and clock drift within the time window T R.So the monitor-ing interval has to be set toT M≤T D−T L−T R(2) and the node has to ensure that it is being monitored every T M by one of its observers.The schedule of reporting to an observer is only defined for the next monitoring time for each observer.Whenever the node checks in,the next monitoring time is announced with the same message.So for every heartbeat sent,the old monitoring timer at the observer can be cancelled and a new timer can be set according the new time.Whenever,a node is newly observed or not being observed by a particular observer,this is indicated to the sink.Hence the sink is always aware of which nodes are being observed in the network,and therefore always knows which nodes are up and running.This registration scheme at the sink is an optional feature of DiMo and depends on the user’s requirements.3.2Packet LossWireless communication always has to account for possi-ble message losses.Sudden changes in the link quality are always possible and even total link failures in the order of a few seconds are not uncommon[2].So the time T R for send-ing retries should be sufficiently long to cover such blanks. Though unlikely,it is possible that even after a duration of T R,the heartbeat could not have been successfully for-warded to the observer and thus was not acknowledged,in spite of multiple retries.The node has to assume that it will be reported miss-ing at the sink,despite the fact it is still up and running. Should the node be redundantly connected,a recovery mes-sage is sent to the sink via another relay announcing be-ing still alive.The sink receiving a recovery message and a node-missing message concerning the same node can neglect these messages as they cancel each other out.This recov-ery scheme is optional,but minimizes the false positives by orders of magnitudes as shown in Section4.3.3Topology ChangesIn the case of a new relay being announced from the topol-ogy management,a heartbeat is sent to the new relay,mark-ing it as an observer node.On the other hand,if a depre-cated relay is announced,this relay might still be acting as an observer,and the node has to check in as scheduled.How-ever,no new monitor time is announced with the heartbeat, which will release the deprecated relay of being an observer.3.4Queuing PolicyA monitoring buffer exclusively used for monitoring mes-sages is introduced,having the messages queued according to a priority level,in particular node-missing messagesfirst. Since the MAC protocol and routing engine usually have a queuing buffer also,it must be ensured that only one single monitoring message is being handled by the lower layers atthe time.Only if an ACK is received,the monitoring mes-sage can be removed from the queue(if a NACK is received, the message remains).DiMo only prioritizes between the different types of monitoring messages and does not require prioritized access to data traffic.4.EV ALUATIONIn literature,there are very few existing solutions for mon-itoring the health of the wireless sensor network deployment itself.DiMo is thefirst sensor network monitoring solution specifically designed for event detection applications.How-ever,the two prominent solutions of Sympathy[3]and Me-mento[4]for monitoring general WSNs can also be tailored for event gathering applications.We compare the three ap-proaches by looking at the rate at which they generate false positives,i.e.,wrongly inferring that a live node has failed. False positives tell us something about the monitoring pro-tocol since they normally result from packet losses during monitoring.It is crucial to prevent false positives since for every node that is reported missing,a costly on-site inspec-tion is required.DiMo uses the relay nodes for observation.Hence a pos-sible event message and the regular heartbeats both use the same path,except that the latter is a one hop message only. The false positive probability thus determines the reliability of forwarding an event.We point out that there are other performance metrics which might be of interest for evaluation.In addition to false positives,we have looked at latency,message overhead, and energy consumption.We present the evaluation of false positives below.4.1Analysis of False PositivesIn the following analysis,we assume r heartbeats in one sweep for Memento,whereas DiMo and Sympathy allow sending up to r−1retransmissions in the case of unac-knowledged messages.To compare the performance of the false positive rate,we assume the same sweep interval for three protocols which means that Memento’s and Sympa-thy’s sweep interval is equal to DiMo’s monitoring interval. In the analysis we assume all three protocols having the same packet-loss probability p l for each hop.For Sympathy,a false positive for a node occurs when the heartbeat from the node does not arrive at the sink in a sweep interval,assuming r−1retries on every hop.So a node will generate false positive with a possibility(1−(1−p r l)d)n,where d is the hop count to the sink and n the numbers of heartbeats per sweep.In Memento,the bitmask representing all nodes assumes them failed by default after the bitmap is reset at the beginning of each sweep interval. If a node doesn’t report to its parent successfully,i.e.,if all the r heartbeats are lost in a sweep interval,a false positive will occur with a probability of p l r.In DiMo the node is reported missing if it fails to check in at the observer having a probability of p l r.In this case,a recovery message is triggered.Consider the case that the recovery message is not kept in the monitoring queue like the node-missing messages, but dropped after r attempts,the false positive rate results in p l r(1−(1−p l r)d).Table1illustrates the false positive rates for the three protocols ranging the packet reception rate(PRR)between 80%and95%.For this example the observed node is in afive-hop distance(d=5)from the sink and a commonPRR80%85%90%95% Sympathy(n=1) 3.93e-2 1.68e-2 4.99e-3 6.25e-4 Sympathy(n=2) 1.55e-3 2.81e-4 2.50e-5 3.91e-7 Memento8.00e-3 3.38e-3 1.00e-3 1.25e-4 DiMo 3.15e-4 5.66e-5 4.99e-67.81e-8Table1:False positive rates for a node with hop count5and3transmissions under different packet success rates.number of r=3attempts for forwarding a message is as-sumed.Sympathy clearly suffers from a high packet loss, but its performance can be increased greatly sending two heartbeats every sweep interval(n=2).This however dou-bles the message load in the network,which is especially substantial as the messages are not aggregated,resulting in a largely increased load and energy consumption for nodes next to the paring DiMo with Memento,we ob-serve the paramount impact of the redundant relay on the false positive rate.DiMo offers a mechanism here that is not supported in Sympathy or Memento as it allows sending up to r−1retries for the observer and redundant relay.Due to this redundancy,the message can also be forwarded in the case of a total blackout of one link,a feature both Memento and Sympathy are lacking.4.2SimulationFor evaluation purposes we have implemented DiMo in Castalia1.3,a state of the art WSN simulator based on the OMNet++platform.Castalia allows evaluating DiMo with a realistic wireless channel(based on the empiricalfindings of Zuniga et al.[8])and radio model but also captures effects like the nodes’clock drift.Packet collisions are calculated based on the signal to interference ratio(SIR)and the radio model features transition times between the radio’s states (e.g.,sending after a carrier sense will be delayed).Speck-MAC[7],a packet based version of B-MAC,with acknowl-edgements and a low-power listening interval of100ms is used on the link layer.The characteristics of the Chipcon CC2420are used to model the radio.The simulations are performed for a network containing80 nodes,arranged in a grid with a small Gaussian distributed displacement,representing an event detection system where nodes are usually not randomly deployed but rather evenly spread over the observed area.500different topologies were analyzed.The topology management results in a redun-dantly connected network with up to5levels L and a max-imum hop count H of6to8.A false positive is triggered if the node fails to check in, which is primarily due to packet errors and losses on the wireless channel.In order to understand false positives,we set the available link’s packet reception rate(PRR)to0.8, allowing us to see the effects of the retransmission scheme. Furthermore,thisfixed PRR also allows a comparison with the results of the previous section’s analysis and is shown in Figure1(a).The plot shows on the one hand side the monitoring based on a tree structure that is comparable to the performance of Memento,i.e.,without DiMo’s possibil-ity of sending a recovery message using an alternate relay. On the other hand side,the plot shows the false positive rate of DiMo.The plot clearly shows the advantage of DiMo’s redundancy,yet allowing sending twice as many heartbeats than the tree approach.This might not seem necessarily fair atfirst;however,in a real deployment it is always possible(a)Varying number of retries;PRR =0.8.(b)Varying link quality.Figure 1:False positives:DiMo achieves the targeted false positive rate of 1e-7,also representing the reliability for successfully forwarding an event.that a link fails completely,allowing DiMo to still forward the heartbeat.The simulation and the analysis show a slight offset in the performance,which is explained by a simulation artifact of the SpeckMAC implementation that occurs when the receiver’s wake-up time coincides with the start time of a packet.This rare case allows receiving not only one but two packets out of the stream,which artificially increases the link quality by about three percent.The nodes are observed every T M =4min,resulting in being monitored 1.3e5times a year.A false positive rate of 1e-6would result in having a particular node being wrongly reported failed every 7.7years.Therefore,for a 77-node net-work,a false positive rate of 1e-7would result in one false alarm a year,being the targeted false-positive threshold for the monitoring system.DiMo achieves this rate by setting the numbers of retries for both the heartbeat and the recov-ery message to four.Hence the guard time T R for sending the retries need to be set sufficiently long to accommodate up to ten messages and back-offtimes.The impact of the link quality on DiMo’s performance is shown in Figure 1(b).The tree topology shows a similar performance than DiMo,if the same number of messages is sent.However,it does not show the benefit in the case of a sudden link failure,allowing DiMo to recover immedi-ately.Additionally,the surprising fact that false positives are not going to zero for perfect link quality is explained by collisions.This is also the reason why DiMo’s curve for two retries flattens for higher link qualities.Hence,leaving room for retries is as important as choosing good quality links.5.CONCLUSIONIn this paper,we presented DiMo,a distributed algorithm for node and topology monitoring,especially designed for use with event-triggered wireless sensor networks.As a de-tailed comparative study with two other well-known moni-toring algorithm shows,DiMo is the only one to reach the design target of having a maximum error reporting delay of 5minutes while keeping the false positive rate and the energy consumption competitive.The proposed algorithm can easily be implemented and also be enhanced with a topology management mechanism to provide a robust mechanism for WSNs.This enables its use in the area of safety-critical wireless sensor networks.AcknowledgmentThe work presented in this paper was supported by CTI grant number 8222.1and the National Competence Center in Research on Mobile Information and Communication Sys-tems (NCCR-MICS),a center supported by the Swiss Na-tional Science Foundation under grant number 5005-67322.This work was also supported in part by phase II of the Embedded and Hybrid System program (EHS-II)funded by the Agency for Science,Technology and Research (A*STAR)under grant 052-118-0054(NUS WBS:R-263-000-376-305).The authors thank Matthias Woehrle for revising a draft version of this paper.6.REFERENCES[1] A.Mainwaring et al.Wireless sensor networks for habitatmonitoring.In 1st ACM Int’l Workshop on Wireless Sensor Networks and Application (WSNA 2002),2002.[2] A.Meier,T.Rein,et al.Coping with unreliable channels:Efficient link estimation for low-power wireless sensor networks.In Proc.5th Int’l worked Sensing Systems (INSS 2008),2008.[3]N.Ramanathan,K.Chang,et al.Sympathy for the sensornetwork debugger.In Proc.3rd ACM Conf.Embedded Networked Sensor Systems (SenSys 2005),2005.[4]S.Rost and H.Balakrishnan.Memento:A health monitoringsystem for wireless sensor networks.In Proc.3rd IEEE Communications Society Conf.Sensor,Mesh and Ad Hoc Communications and Networks (IEEE SECON 2006),2006.[5]M.Strasser,A.Meier,et al.Dwarf:Delay-aware robustforwarding for energy-constrained wireless sensor networks.In Proceedings of the 3rd IEEE Int’l Conference onDistributed Computing in Sensor Systems (DCOSS 2007),2007.[6]G.Tolle and D.Culler.Design of an application-cooperativemanagement system for wireless sensor networks.In Proc.2nd European Workshop on Sensor Networks (EWSN 2005),2005.[7]K.-J.Wong et al.Speckmac:low-power decentralised MACprotocols for low data rate transmissions in specknets.In Proc.2nd Int’l workshop on Multi-hop ad hoc networks:from theory to reality (REALMAN ’06),2006.[8]M.Zuniga and B.Krishnamachari.Analyzing thetransitional region in low power wireless links.In IEEE SECON 2004,2004.[9]Fire detection and fire alarm systems –Part 25:Componentsusing radio links.European Norm (EN)54-25:2008-06,2008.。
毕业设计参考文献
参考文献[1] 朱光俊, 廖建云, 张生芹[J]. 重庆工业高等专科学校学报, 2002, 17 (4): 47-51.[2] 朱磊, 吴伯荣, 陈晖, 等. 超级电容器研究及及其应用[J]. 稀有金属, 2003, 27,(3): 385-390.[3] 雷永泉. 新能源材料[M]. 天津: 天津大学出版社, 2000, 17-22.[4] Mermin N. D. Crystalline Order in Two Dimensions [J]. Physical Review. 1968, 176(1): 250.[5] Novoselov K S, Geim A K, Morozov S V, et al. Electric field effectin atomically thin carbonfilms [J]. Science, 2004, 306(5696): 666−669.[6] Geim A K, Novoselov K S. The rise of graphene [J]. Nat. Mater, 2007, 6(3): 183−191.[7] Wu J S, Pisula W, Mullen K. Graphenes as potential material for electronics [J]. Chem. Rev.2007, 107(3): 718−747.[8] Rao C N R, Sood A k, Voggu R, et al. Some novel attributes of grapheme [J]. Phys. Chem.Lett., 2010, 1(2): 572−580.[9] Allen M J, Tung V C, Kaner R B. Honeycomb carbon: a review of Graphene [J]. Chem. Rev.,2010, 110(1): 132−145.[10] Zhang Y, Tan J W, Stormer H L, et al. Experimental observation of the quantum Hall effectand Berry's phase in graphene [J]. Nature, 2005, 438: 201−204.[11] Bolotin K I, Sikes K J, Jiang Z, et al. Ultrahigh electron mobility in suspended graphene[J].Solid State Commun., 2008, 146(9/10):351−355.[12] Balandin A A, Ghosh S, Bao W Z, et al. Superior thermal conductivity of single-layergraphene [J]. Nano Lett. 2008, 8(3): 902−907.[13] Schadler L S, Giannris S C, Ajayan P M. Load transfer in carbon nanotube epoxy composites[J]. Appl. Phys. Lett., 1998, 73(26): 3842−3847.[14] Chae H K, Siberio-Perez D Y, Kim J, et al. A route to high surface area, porosity andinclu sion of large molecules in crystals [J]. Nature, 2004, 427: 523−527.[15] Lee C, Wei X, Kysar J W, et al. Measurement of the elastic properties and intrinsic strengthof monolayer graphene [J]. Science, 2008,321(5887): 385−388.[16] Van den Brink J. Graphene-from strength to strength [J]. Nat. Nanotechnol., 2007,2(4):199−201.[17] K. S. Novoselov, Z. Jiang, Y. Zhang, et al. Room-Temperature Quantum Hall Effect inGraphene [J]. Science, 2007, 315: 1379-1382.[18] D. S. L. Abergel, V. Apalkov, J. Berashevich, et al. Properties of graphene: a theoretical perspective [J]. Advances in Physics, 2010, 59: 323-339.[19] C. Lee, X. Wei, J. W. Kysar, et al.Measurement of the Elastic Properties and Intrinsic Strength of Monolayer Graphene [J]. Science, 2008, 321: 385-388.[20] M. Poot, H. S. J. vander Zant, Nanomechanical properties of few-layer graphene membranes [J]. Appl. Phys. Lett., 2008, 92: 063111-3.[21] I. W. Frank, D. M. Tanenbaum, A. M. vander Zande, et al. Mechanical properties of suspended graphene sheets, Mechanical properties of suspended graphene sheets [J]. Vac. Sci. Technol. B, 2007, 25: 2558-2561.[22] Balandin A. A, Ghosh S, Bao W. Z, et al. Superior thermal conductivity of single-layer grapheme [J]. Nano Letters, 2008, 8(3): 902-907[23] Geim A. K, Novoselov K. S. The rise of graphene [J]. Nature Materials, 2007, 6 (3): 183-191[24] Li Z. Q, Henriksen E. A, Jiang Z, et al. Dirac charge dynamics in graphene by infrared spectroscopy [J]. Nature Physics, 2008, 4(7): 532-535[25] Park S, An J H, Piner R. D, et al. Aqueous suspension and characterization of chemically modified graphene sheets [J]. Chemistry of Materials, 2008, 20(21): 6592- 6594.[26] Cai D. Y, Song M. Preparation of fully exfoliated graphite oxide nanoplatelets in organic solvents [J]. Journal of Materials Chemistry, 2007, 17(35): 3678-3680.[27] Wu Z. S, Pei S. F, Ren W.C, et al. Field emission of single-layer graphene films prepared byelectrophoretic deposition [J]. Advanced Materials, 2009, 21(17): 1756-1760.[28] A. K. Geim, K. S. Novoselov, The rise of graphene [J]. nature materials, 2007, 6: 183-191.[29] K. S. Novoselov, A. K. Geiml, S. V. Morozov, et al. Electric Field Effect in Atomically ThinCarbon Films [J]. Science, 2004, 306: 666-669.[30] P. W. Sutter, J. Flege, E. A. Sutter. Epitaxial graphene on ruthenium [J]. Nature Materials,2008, 7:406-411.[31] J. Coraux, A. T. N'Diaye, C. Busse et al. Structural Coherency of Graphene on Ir (111) [J].Nano Lett., 2008, 8: 565-570.[32] Y. Pan, D. Shi, H. Gao. Formation of graphene on Ru (0001) surface [J]. Chinese Phys., 2007,16: 3151-3153.[33] Y. Pan, H. Zhang, D. Shi, et al. Highly Ordered, Millimeter-Scale, Continuous Single-Crystalline Graphene Monolayer Formed on Ru (0001) [J]. Advanced Materials, 2008, 20: 2777-2780.[34] S. Stankovich, D. A. Dikin, G. H. B. Dommett, et al. Graphene-based composite materials [J].Nature, 2006, 442: 282-286.[35] X. Li, X. Wang, L. Zhang, et al. Ultrasmooth Graphene Nanoribbon Semiconductors [J].Science, 2008, 319: 1229-1232.[36] S. Gilje, S. Han, M. Wang, K. Wang, et al. A Chemical Route to Graphene for DeviceApplications [J]. Nano Lett., 2007, 7: 3394-3398.[37] C. Berger, Z. Song, X. Li, et al. Electronic Confinement and Coherence in Patterned EpitaxialGraphene [J]. Science, 2006, 312: 1191-1196.[38] T. Ohta, A. Bostwick, T. Seyller, et al. Controlling the Electronic Structure of BilayerGraphene [J]. Science, 2006, 313: 951-954.[39] D. V. Kosynkin, A. L. Higginbotham, A. Sinitskii, et al. Longitudinal unzipping of carbonnanotubes to form graphene nanoribbons [J]. Nature, 2009: 458: 872-876.[40] L. Jiao, L. Zhang, X. Wang, et al. Narrow graphene nanoribbons from carbon nanotubes [J].Nature, 2009, 458: 877-880.[41] A. G. Cano-Marquez, F. J. Rodn'guez-Macias, J. Campos-Delgado, et al. Ex-MWNTs:Graphene Sheets and Ribbons Produced by Lithium Intercalation and Exfoliation of Carbon Nanotubes [J]. Nano Lett., 2009, 9: 1527-1533.[42] By William S. Hummers, Jr. Richard E, Offeman. Preparation of graphite oxide [J]. J. Am.Chem. Soc. 1958 (80): 1339-1339.[43] Staudenmaier L. Verfahren zur darstellung der graphits ure. [J]. Ber. Dt. Sch. Chem. Ges.,1898, 31(2): 1481−1487.[44] 刘敏玲, 新型黄铜矿基p型透明导体的设计制备与性能研究[D]. 上海: 中国科学院上海硅酸盐研究所, 2008.[45] P. W. Sutter, J. Flege, E. A. Sutter, Epitaxial graphene on ruthenium [J]. Nature Materials,2008, 7: 406-411.[46] K. S. Kim, Y. Zhao, H. Jang, S. Y. Lee, et al. Large-scale pattern growth of graphene filmsfor stretchable transparent electrodes [J] .Nature, 2009,457: 706-710.[47] X. Li, W. Cai, J. An, et al. Large-Area Synthesis of High-Quality and Uniform GrapheneFilms on Copper Foils [J]. Science, 2009, 324: 1312-1314.[48] D. Wei, Y.qi Liu, H. Zhang, et al. Scalable Synthesis of Few-Layer Graphene Ribbons withControlled Morphologies by a Template Method and Their Applications in Nanoelectro mechanical Switches [J]. J.AM. CHEM. SOC, 2009, 131: 11147-11154.[49] C. Berger, Z, Song, X. Li, et al. Electronic Confinement and Coherence in Patterned EpitaxialGraphene [J]. Science, 2006, 312: 1191-1196.[50] D. Deng, X. Pan, H. Zhang, et al. Freestanding Graphene by Thermal Splitting of SiliconCarbide Granules [J]. Adv. Mater. 2010, 22: 2168-2171.[51] Q. Huang, X. Chen, J. Liu, et al. Epitaxial graphene on 4H-SiC by pulsed electron irradiation.[J]. Chem. Commun., 2010, 46, 4917-4919.[52] D. V. Kosynkin, A. L. Higginbotham, A. Sinitskii, et al. Longitudinal unzipping of carbonnanotubes to form graphene nanoribbons [J]. Nature, 2009, 458: 872-876.[53] J. Ito, J. Nakamura, A. Natori, Semiconducting nature of the oxygen-adsorbed graphene sheet[J]. Journal of Applied Physics, 2008, 103: 1137-1140.[54] Yan Wang, Zhiqiang Shi, Yi Huang, et al. Supercapacitor Devices Based on GrapheneMaterials [J]. J. Phys. Chem. C, 2009, 113 (30), 13103–13107.[55] EunJoo Yoo, Jedeok Kim, Eiji Hosono, et al. Large Reversible Li Storage of Graphene Nanosheet Families for Use in Rechargeable Lithium Ion Batteries [J]. Nano Lett., 2008, 8(8): 2277-2282.[56] Guoxiu Wang, Xiaoping Shen, Jane Yao, et al. Graphene nanosheets for enhanced lithiumstorage in lithium ion batteries [J]. carbon, 2009, 47: 2049-2053.[57] Xin Zhao, Cary M. Hayner, Mayfair C, et al. Flexible Holey Graphene Paper Electrodes withEnhanced Rate Capability for Energy Storage Applications [J]. ACSNANO, 2011, 5(11): 8739-8749.[58] Tong Wei a, Fangyong Wangb, Jun Yan, et al. Microspheres composed of multilayer grapheneas anode material for lithium-ion batteries [J]. Electroanalytical Chemistry, 2011, 635, 45-49.[59] 高云雷, 赵东林, 白利忠, 等. 石墨烯用作锂离子电池负极材料的电化学性能[J]. 中国科技论文, 2012, 7(3): 201-205.[60] Yoo E, Kim J, Hosono E, et al. Large riversible Li storage of graphene nanosheet families foruse in rechargeble lithium ion batteries [J]. Nano Lett , 2008 , 8(8):2277-2282[61] Peichao Lian, Xuefeng Zhu, Shuzhao Liang, et al. High reversible capacity of SnO2/graphene nanocomposite as an anode material for lithium-ion batteries[J]. Electrochimica Acta 2011, 56,[62] 张娜, 张宝宏. 电化学超级电容器研究进展[J]. 电池, 2003, 33(5): 330-332.[63] 李雅琳. 锂离子电池负极材料纳米SnO2的研究[D]. 湖南长沙: 湖南大学, 2007, 5,:34-35[64] 虞祯君. 石墨烯及二氧化锡/石墨烯用作锂离子电池负极材料的电化学性能研究[D].上海: 华东理工大学, 2013, 30-40.。
毕业论文参考文献目录
语料库研究
《语料库在外语教育中的应用—— 理论与实践》 《语料库语言学与外语教学》 《语料库语言学的研究与应用》
ห้องสมุดไป่ตู้
教学法
外语教学法丛书21本 《外语教学大纲.教材.课堂教学——设计与评估》 《课程标准新理念与初中英语教学改革》
教学法 教学法
《中学英语教材评价工具》 《高中英语校本培训指导手册》 《高中英语教育评价的研究与实施》 《英语篇章语调》
作者/编者
Brown,G et al Carroll,D.W. Croft,W. Halliday,M.A.K. Henning,G Hudson,R.A. Kennedy,G Leech,G N. Levinson,S.C. Nunan,D. Ouhalla,J. Richards,J.et al. Saeed,J.I. Scollon,R.et al Ungerer,F.et al 胡壮麟
毕业论文参考文献目录
研究方向 语言学
参考文献
Discourse Analysis Psychology of Language Typology and Universals An Introduction to Functional Grammar A Guide to Language Testing:Development,Evaluation and Research Socialinguistics An Introduction to Corpus Linguistics A Linguistic Guide to English Poetry Pragmatics Second Language Teaching and Learning Introduction Transformational Grammar:From Principles and Paramenters to Minimalism Approaches and Methods in Language Teaching Semantics Intercultural Communication:A Discourse Analysis An Introduction to Cognitive Linguistics 语言学教程(第3版)
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
C++
[1] Gordon Hogenson. C++/Cli The Visual C++ Language For .Net [M]. Wiley India Pvt. Ltd., 2007.
[2] Motor Industry Software Reliability Association. MISRA-C: 2004: guidelines for the use of the C language in critical systems.[M]. MIRA, 2008.
[3] Jeff Cogswell, John Paul Mueller. C++ All-In-One Desk Reference For Dummies [M]. Wiley publishing.Inc 2009.
[4] Stephen R. Davis. C++ for Dummies [M]. wiley publishing.Inc 2008.
[5] Harvey Dietel, Paul Deitel. C: How to Program [M]. Pearson Education,Inc 2010.
[6] Bruce Eckel. Thinking in C++[M]. Prentice Hall, 2000.
[7] Herbert Schildt. C++: a beginner's guide Beginner's Guides[M]. McGraw-Hill Professional, 2003.
[8] Mark Lee. C++ Programming for the Absolute Beginner For the Absolute Beginner[M]. Course Technology, 2009.
MIS参考文献
[9] Kenneth C. Laudon, Jane P. Laudon . Management Information Systems: Managing the Digital Firm[M]. Publisher Prentice Hall, 2007.
[10] Raymond McLeod, George P. Schell. Management information systems[M]. Pearson/Prentice Hall, 2007.
[11] James A. O'Brien, George M. Marakas. Management Information Systems[M]. McGraw-Hill/Irwin, 2008.
[12] Singh. Information System Management[M]. S.B. Nangia APH publishing Corporation .2007.
[13] Kenneth C. Laudon, Jane Price Laudon.Management Information Systems: Managing the Digital Firm MyMISLab Series[M]. Prentice Hall, 2009.
数据库参考文献
[14] Thomas M. Connolly, Carolyn E. Begg. Database systems: a practical approach to design, implementation, and management[M]. Addison-Wesley, 2009.
[15] Abraham Silberschatz, Henry F. Korth, S. Sudar shan. Database System Concepts[M]. McGraw-Hill, 2010.
[16] Peter Rob, Carlos Coronel.Database Systems[M]. Cengage Learning EMEA, 2008.
[17] J. Stanley Warford. Computer Systems[M]. Jones & Bartlett Publishers, 2009.
[18] Toby J. Teorey, Stephen Buxton, Lowell Fryman, Terry Halpin. Database design: know it all
Know It All[M]. Morgan Kaufmann, 2009.
[19] John W. Satzinger. Systems Analysis and Design in a Changing World[M]. Cengage Learning EMEA, 2008.
SQL 参考文献
[20] Alan Beaulieu. Learning SQLO'Reilly Series[M]. O'Reilly Media, Inc., 2009.
[21] Clare Churcher. Beginning SQL Queries: From Novice to ProfessionalApress Series[M]. Apress, 2008.
[22] Andy Oppel, Robert Sheldon. SQL: a beginner's guide BEGINNER'S GUIDE[M]. McGraw-Hill Professional, 2008.
[23] Chris Fehily. SQL: Visual QuickStart Guide Visual Quickstart Guide Series[M]. Peachpit Press, 2008.
交通管理参考文献:
[24] Peter T. Martin, Aleksandar Stevanovic, Mountain Plains Consortium. Adaptive signal control, five: Sydney Coordinated Adaptive Traffic System evaluation in Park City, Utah Issues 6-200 of MPC report[M]. Mountain-Plains Consortium, 2008. [25] Kenneth J. Button, David A. Hensher. Handbook of transport systems and traffic control Volume 3 of Handbooks in Transportation Research Series[M]. Emerald Group Publishing, 2001.
[26] Mashrur A. Chowdhury, Adel Wadid Sadek. Fundamentals of intelligent transportation systems planning Artech House ITS library[M]. Artech House, 2003.
[27] Michael A. P. T aylor, Peter W. Bonsall, William Young. Understanding traffic systems: data, analysis, and presentation[M]. Ashgate, 2000.
[28] Mike Slinn, Paul Matthews, Peter Guest.Traffic engineering design: principles and practice[M]. Butterworth-Heinemann, 2005.。