外文翻译(英文)
外文翻译 - 英文
The smart gridSmart grid is the grid intelligent (electric power), also known as the "grid" 2.0, it is based on the integration, high-speed bidirectional communication network, on the basis of through the use of advanced sensor and measuring technology, advanced equipme nt technology, the advancedcontrol method, and the application of advanced technology of decision support system, realize the power grid reliability, security, economic, efficient, environmental friendly and use the security target, its main features include self-healing, incentives and include user, against attacks, provide meet user requirements of power quality in the 21st century, allow all sorts of different power generation in the form of access, start the electric power market and asset optimizatio n run efficiently.The U.S. department of energy (doe) "the Grid of 2030" : a fully automated power transmission network, able to monitor and control each user and power Grid nodes, guarantee from power plants to end users among all the nodes in the whole process of transmission and distribution of information and energy bi-directional flow.China iot alliance between colleges: smart grid is made up of many parts, can be divided into:intelligent substation, intelligent power distribution network, intelli gent watt-hourmeter,intelligent interactive terminals, intelligent scheduling, smart appliances, intelligent building electricity, smart city power grid, smart power generation system, the new type of energy storage system.Now a part of it to do a simple i ntroduction. European technology BBS: an integration of all users connected to the power grid all the behavior of the power transmission network, to provide sustained and effective economic and security of power.Chinese academy of sciences, institute of electrical: smart grid is including all kinds of power generation equipment, power transmission and distribution network, power equipment and storage equipment, on the basis of the physical power grid will be modern advanced sensor measurement technology, network technology, communicationtechnology, computing technology, automationand intelligent control technology and physical grid highly integrated to form a new type of power grid, it can realize the observable (all the state of the equipment can monitor grid), can be controlled (able to control the power grid all the state of the equipment), fully automated (adaptive and self-healing) and system integrated optimization balance (power generation, transmission and distribution, and the optimization of the balance between electricity), so that the power system is more clean, efficient, safe and reliable.American electric power research institute: IntelliGrid is a composed of numerous automation system of power transmission and distribution power system, in a coordinated, effective and reliable way to achieve all of the power grid operation: have self-healing function;Rapid response to the electric power market and enterprise business requirements;Intelligent communication architecture, realizes the real-time, security, and flexible information flow, to provide users with reliable, economic power services. State grid electric power research institute, China: on the basis of the physical power grid (China's smart grid is based on high voltage network backbone network frame, different grid voltage level based on the coordinated development of strong power grid), the modern advanced sensor measurement technology, communication technology, information technology, computer technology and control technology and the physical power grid highly integrated to form a new type of power grid.It to fully meet user demand for electricity and optimize the allocation of resources, guarantee the safety, reliability and economy of power supply, meet environmental constraints, ens ure the quality of electric energy, to adapt to the development of power market, for the purpose of implementing the user reliable, economic, clean and interactive power supply and value-added services.BackgroundStrong smart grid development in the wor ld is still in its infancy, without a common precisely defined, its technology can be roughly divided into four areas: advanced Measurement system, advanced distribution operation, advanced transmission operation and advanced asset management.Advanced meas urement system main function is authorized to the user, make the system to establish a connection with load, enabling users to support the operationof the power grid;Advanced core distribution operation is an online real-time decision command, goal is to disaster prevention and control, realizing large cascading failure prevention;Advanced transmission operation main role is to emphasize congestion ma nagement and reduce the risk of the large-scale railway;Advanced asset management is installed in the system can provide the system parameters and equipments (assets) "health" condition of advanced sensor, and thereal-time information collected by integrat ion and resource management, modeling and simulation process, improve the operation and efficiency of power grid.The smart grid is an important application of Internet of things, and published in the journal of computer smart grid information system archit ecture research is carried on the detailed discussion on this, and the architecture of the smart grid information system are analyzed.The market shareThe establishment of the smart grid is a huge historical works.At present many complicated smart grid project is underway, but the gap is still great.For the provider of the smart grid technology, promote the development of facing the challenges of the distribution network system i s upgrading, automation and power distribution substation transportation, smart grid network and intelligent instruments.According to the latest report of parker investigators, smart grid technology market will increase from $2012 in 33 billion to $2020 in 73 billion, eight years, the market accumulated up to $494 billion.China smart grid industry market foresight and investment forward-looking strategic planning analysis, points out that in our country will be built during the "twelfth five-year""three vertical and three horizontal and one ring" of uhv ac lines, and 11 back to u hv dc transmission project construction, investment of 300 billion yuan.Although during the period of "much starker choices-and graver consequences-in" investment slowed slightly, the investment is 250 billion yuan.By 2015, a wide range of national power grid, long distance transmission capacity will reach 250 million kilowatts, power transmission of 1.15 trillion KWH per year, to support the new 145 million kilowatts of clean energy generation given and sent out, can satisfy the demand of morethan 1 million electric cars, a grid resource configuration optimization ability, economic efficiency, safety and intelligent levels will be fully promoted.The abroad application of analysisIn terms of power grid development foundation, national electricity dema nd tends to be saturated, the grid after years of rapid development, architecture tends to be stable, mature, have a more abundant supply of electric power transmission and distribution capacity.Germany has "E - Energy plan, a total investment of 140 million euros, from 2009 to 2012, four years, six sites across the country to the smart grid demonstration experiment.At the same time also for wind power and electric car empirical experiments, testing and management of power consumption of the Internet.Big companies such as Germany's Siemens, SAP and Swiss ABB are involved in this plan.To smart grid Siemens 2014 annual market scale will reach 30 billion euros, and plans to take a 20% market share, make sure order for 6 billion euros a year.The advanced nat ureCompared with the existing grid, smart grid, reflects the power flow, information flow and business flow marked characteristics of highly integration, its advancement and advantage mainly displays in:(1) has a strong foundation of grid system and te chnical support system, able to withstand all kinds of external disturbance and attacks, can adapt to large-scale clean energy and renewable energy access, strong sex of grid reinforced and ascend.(2) the information technology, sensor technology, automatic control technology organic combination with power grid infrastructure, a panoramic view of available power grid information, timely detection, foresee the possibility of failure.Fault occurs, the grid can be quickly isolate fault,realize self recovery,to avoid the occurrence of blackouts.(3) flexible ac/dc transmission, mesh factory coordination, intelligent scheduling, power storage, and distribution automation technology widespread application, makes the control of power grid operation more flexibl e,economic, and can adapt to a large number of distributed power supply, power grid and electric vehicle charging and discharging facility access.(4) communication, information, and the integrated use of modern management technology, will greatly improve the efficiency of power equipment, and reduce the loss of electrical power, making the operation of power grid is more economic and efficient.(5) the height of the real-time and non real-time information integration, sharing and utilization, to run the show management comprehensive, complete and fine grid operation state diagram, at the same time can provide decision support, control scheme and the corresponding response plans.(6) to establish a two-way interactive service mode, users can real-time understand the status of the power supply ability, power quality, price and power outage information, reasonable arrangement of electric equipment use;The electric power enterprise can obtain the user's electricity information in detail, to provide more value-added services.developmentaltrend"Twelfth five-year" period, the state grid will invest 500 billion yuan to build the connection of large ene rgy base and center of the "three horizontal three longitudinal" main load of ultra high voltage backbone network frame and 13 back to long branch, engineering, to form the core of the world first-class strong smart grid."Strong smart grid technology standards promulgated by the state grid system planning", has been clear about the strong smart grid technology standards roadmap, is the world's first used to guide the development of smart grid technology guiding standards.SGC planning is to built 2015 basic information, automation, interaction characteristics of strong smart grid, formed in north China, central China, east China, for the end to the northwest and northeast power grid for sending the three synchronous power grid, the grid resource allocati on ability, economic efficiency and safety level, technology level and improve intelligent level.(1) the smart grid is the inevitable developing trend ofpower grid technology.Such as communication, computer, automation technology has extensive applicati on in the power grid, and organic combination with traditional electric power technology, and greatly improve the intelligent level of the power grid.Sensor technology and information technology application in the power grid, the system state analysis and auxiliary decision provides the technical support, make it possible to grid self-healing.Scheduling technology, automation technology and the mature development of flexible transmission technology, for the development and utilization of renewable energy an d distributed power supply provides the basic guarantee.The improvement of the communication network and the popularization and application of user information collection technology, promote the two-way interaction with users of the grid.With the further development of various new technologies, application and highly integrated with the physical power grid, smart grid arises at the historic moment.(2) the development of smart grid is the inevitable choice of social and economic development.In order to ach ieve the development of clean energy, transport and given power grid must increase its flexibility and compatibility.To withstand the increasingly frequent natural disasters and interference, intelligent power grid must rely on means to improve its securit y defense andself-healing ability.In order to reduce operating costs, promote energy conservation and emissions reduction, power grid operation must be more economic and efficient, at the same time must to intelligent control of electric equipment, reduce electricity consumption as much as possible.Distributed generation and energy storage technology and the rapid development of electric cars, has changed the traditional mode of power supply, led power flow, information flow, business flow constantly fusion, in order to satisfy the demands of increasingly diverse users.PlanJapan plans to all the popularity of smart grid in 2030, officer of the people at the same time to promote the construction of overseas integrated smart grid.In the field of battery, Japanese firms' global market share goal is to strive to reach 50%, with about 10 trillion yen in the market.Japan's trade ministry has set up a "about the next generation of energy systems international standardizationresearch institute", the japan-american established in Okinawa and Hawaii for smart grid experimental project [6].Learns in the itu, in 2020 China will be built in high power grid with north China, east China, China as the center, northeast, northwest 750 kv uhv power grid as the sending, connecting each big coal base, large hydropower bases, big base for nuclear power, renewable energy base, the coordinated development of various grid strong smart grid.In north China, east China, China high voltage synchronous ZhuWangJia six "five longitudi nal and transverse" grid formation.The direction ofIn the green energy saving consciousness, driven by the smart grid to become the world's countries to develop a focus areas.The smart grid is the electric power network, is a self-healing, let consum ers to actively participate in, can recover from attacks and natural disasters in time, to accommodate all power generation and energy storage, can accept the new product, service and market, optimize asset utilization and operation efficiency, provide qua lity of power supply for digital economy.Smart grid based on integrated, high-speed bidirectional communication network foundation, aims to use advanced sensor and measuring technology, advanced equipment, technology and advanced control methods, and adv anced technology of decision support system, realize the power grid reliability, security, economic, efficient, environmental friendly, and the use of safe run efficiently.Its development is a gradual progressive evolution, is a radical change, is the product of the coordinated development of new and existing technologies, in ad dition to the network and smart meters also included the wider range.Grid construction in high voltage network backbone network frame, all levels of the coordinated development, informatization, automation, interaction into the characteristics of strong smart grid, improve network security, economy, adaptability and interactivity, strength is the foundation, intelligence is the key.meaningIts significance is embodied in the foll owing aspects:(1) has the strong ability of resources optimization allocation.After the completion of the smart grid in China, will implement the big water and electricity, coal, nuclear power, large-scale renewable energy across regions, long distance, large capacity, low loss, high efficiency, regional power exchange capacity improved significantly.(2) have a higher level of safe and stable operation.Grid stability and power supply reliability will be improved, the safety of the power grid close coord ination between all levels of line, have theability to against sudden events and serious fault, can effectively avoid the happening of a wide range of chain failure, improve power supply reliability, reduce the power loss.(3) to adapt and promote the dev elopment of clean energy.Grid will have wind turbines power prediction and dynamic modeling, low voltage across, and active reactive power control and regular units quickly adjust control mechanism, combined with the application of large capacity storage technology, the operation control of the clean energy interconnection capacity will significantly increased, and make clean energy the more economical, efficient and reliable way of energy supply.(4)implementing highly intelligent power grid scheduling.Co mpleted vertical integration, horizontal well versed in the smart grid scheduling technology support system, realize the grid online intelligent analysis, early warning and decision-making, and all kinds of new transmission technology and equipment of effi cient control and lean control of ac/dc hybrid power grid.(5)can satisfy the demands of electric cars and other new type electric power user services.Would be a perfect electric vehicle charging and discharging supporting infrastructure network, can meet the needs of the development of the electric car industry, to meet the needs of users, realize high interaction of electric vehicles and power grid.(6) realize high utilization and whole grid assets life cycle management.Can realize electric grid system of the whole life cycle management plan.Through smart grid scheduling and demand side management, power grid assets utilization hours, power grid assets efficiency improvedsignificantly.(7) to realize power convenient interaction between the user and the grid.Will form a smart electricity interactive platform, improving the demand side management, to provide users with high-quality electric power service.At the same time, the comprehensive utilization of the grid can be distributed power supply, intelli gent watt-hour meter, time-sharing electricity price policy and the electric vehicle charging and discharging mechanism, effectively balance electric load, reduce the peak valley load difference, reduce the power grid and power construction costs.(8)grid management informatization and the lean.Covering power grid will each link of communication network system, realize the power grid operation maintenance integrated regulation, data management, information grid spatial information services, and production and scheduling application integration, and other functions, to realize all-sided management informatization and the lean.(9) grid infrastructure of value-added service potential into full play.In power at the same time, the national strategy of "triple play" of services, to provide users with community advertising, network television, voice and other integrated services, such as water supply, heating, gas industry informatization, interactive platform support, expand the range of value-added services and improve the grid infrastructure and capacity, vigorously promote the development of smart city.(10)Gridto promote the rapid development of related industries.Electric power industry belongsto the capital-intensive and technology-intensive industry, has the characteristics of huge investment, long industrial chain.Construction of smart grid, which is beneficial to promote equipment manufacturing information and communication industry technology upgrade, for our country to occupy the high ground to lay the foundation in the field of electric power equipment manufacturing.Important significanceLife is convenientThe construction of strong smart grid, will promote the development of intelligent community, smart city, improve people's quality of life.(1) to make life more convenient.Home intelligent power system can not onlyrealize the real-time control of intelligent home appliances such as air conditioning, water heater and remote control;And can provide telecommunication network, Internet, radio and television network access services;Through intelligent watt-hour meter will also be able to achieve au tomatic meter reading and automatic transfer fee, and other functions.(2) to make life more low carbon.Smart grid can access to the small family unit such as wind power and photovoltaic roof, pushing forward the large-scale application of electric cars, so as to raise the proportion of clean energy consumption, reduce the pollution of the city.(3) to make life more economical.The smart grid can promote power user role transformation, both electricity and sell electricity twofold properties;To build a family for the user electricity integrated services platform, to help users choose the way of electricity, save energy, reduce the energy expense.Produce benefitThe development of a strong smart grid, the grid function gradually extended to promote the optim al allocation of energy resources, guarantee the safe and stable operation of power system, providing multiple open power service, promote the development of strategic emerging industries, and many other aspects.As China's important energy delivery and configuration platform, strong and smart grid from the investment construction to the operation of production process will be for the national economic development, energy production and use, environmental protection bring great benefits.(1)in power system.Can save system effective capacity;Reducing the system total power generation fuel cost;Improving the efficiency of grid equipment, reduce construction investment;Ascension grid transmission efficiency, reduce the line loss.(2)in terms of power customers.Can realize the bidirectional interaction, to provide convenient services;Improving terminal energy efficiency, save power consumption;To improve power supply reliability, and improve power quality.(3) in the aspect of energy saving and environment.Can improve the efficiency of energy utilization, energy conservation and emissions reduction benefit.To promote clean energy development, realize the alternative reductionbenefits;Promote the overall utilization of land resources, saving land usage.(4) other aspects.Can promote the economic development, jobs;To ensure the safety of energy supply;Coal for power transmission and improve the efficiency of energy conversion, reducing the transportation pressure.Propulsion system(1) can effectively improve t he security of power system and power supply e of strong smart grid "self-healing" function, can accurately and quickly isolate the fault components, and in the case of less manual intervention make the system quickly returned to normal, so as to improve the security and reliability of power supply system.(2) the power grid to realize the sustainable development.Strong smart grid technology innovation can promote the power grid construction, implementation technology, equipment, operation an d management of all aspects of ascension, to adapt to the electric power market demand, promote the scientific and sustainable development of power grid.(3) reduce the effective ing the power load characteristics in different regions of the ch aracteristics of big differences through the unification of the intelligent dispatching, the peakand peak shaving, such as networking benefit;At the same time through the time-sharing electricity price mechanism, and guide customers low power, reduce the peak load, so as to reduce the effective capacity.(4) to reduce the system power generation fuel costs.Construction of strong smart grid, which can meet the intensive development of coal base, optimization of power distribution in our country, thereby red ucing fuel transportation cost;At the same time, by reducing the peak valley load difference, can improve the efficiency of thermal power unit, reduce the coal consumption, reduce the cost.(5)improve the utilization efficiency of grid equipment.First of all, by improving the power load curve, reduce the peak valley is poor, improve the utilization efficiency of grid equipment;Second, by self diagnosis, extend the life of the grid infrastructure.(6) reduce the line loss.On the important basis of uhv transmission technology of strong smart grid, will greatly reduce the loss rate in the electric power transmission;Intelligent scheduling system, flexible transmission technology and real-time two-way interaction with customers, can optimize the tide distribut ion, reducing line loss;At the same time, the construction and application of distributed power supply, also reduce the network loss of power transmission over a long distance.Allocation of resourcesEnergy resources and energy demand in the reverse distribution in our country, more than 80% of the coal, water power and wind power resource distribution in the west, north, and more than 75% of the energy demand is concentrated in the eastern and central regions.Energy resources and energy demand unbalance d distribution of basic national conditions, demand of energy needs to be implemented nationwide resource optimizing configuration.The construction of strong smart grid, for optimal allocation of energy resources provides a good platform.Strong smart grid is completed, will form a strong structure and sending by the end of the power grid power grid, power capacity significantly strengthened, and the formation of the intensity, stiffness of uhv power transmission network, realize the big water and electricit y, coal, nuclear power, large-scale renewable energy across regions, long distance, large capacity, low loss, high efficiency transport capacity significantly increased power a wide range of energy resources optimization.Energy developmentThe development and utilization of clean energy such as wind power and solar energy to produce electricity is given priority to, in the form of the construction of strong smart grid can significantly improve the grid's ability to access, given and adjust clean energy, vigorously promote the development of clean energy.(1) smart grid, the application of advanced control technology and energy storage technology, perfect the grid-connected clean energy technology standards, improve the clean energy acceptance ability.Clean energy base, (2) the smart grid, rational planning of large-scale space truss structure and sending the power structure, application of uhv, flexible transmission technology, meet the requirements of the large-scale clean energy electricitytransmission.(3) the smart grid for large-scale intermittent clean energy to carry on the reasonable and economic operation, improve the operation performance of clean energy production.(4) intelligent with electric equipment, can achieve acceptance and coordinated cont rol of distributed energy, realize the friendly interaction with the user, the user to enjoy the advantages of new energy power.Energy conservation and emissions reductionStrong smart grid construction to promote energy conservation and emissions reduc tion,development of low carbon economy is of great significance: (1) to support large-scale clean energy unit net, accelerate the development of clean energy, promote our country the optimization of energy structure adjustment;(2) to guide users reasonable arrangement of electricity, reducing peak load, stable thermal power unit output, reduce power generation coal consumption;(3) promote ultra-high voltage, flexible transmission, promotion and application of advanced technology such as economic operation, reduce the transmission loss, improve power grid operation efficiency;(4) to realize the power grid to interact with users effectively, promote intelligent power technology, improve the efficiency of electricity;(5) to promote the electric car of large-scale application, promote the development of low-carbon economy, achieve emission reduction benefits.There are three milestones of the concept of smart grid development:The first is 2006, the United States "smart grid" put forward by the IBM solution.IBM smart grid is mainly to solve, improve reliability and safety of power grid from its release in China, the construction of the smart grid operations management innovation - the new train of thought on the development of China's power "the white paper can be seen that the scheme provides a larger framework, through to the electric power production, transmission, the optimization of all aspects of retail management, for the relevant enterprises to improve operation efficiency and reliability, reduce cost dep icts a blueprint.IBM is a marketing strategy.The second is the energy plan put forward by the Obama took office, in addition to the published plan, the United States will also focus on cost $120 billion a year circuit。
外文翻译中英文对照
Strengths优势All these private sector banks hold strong position on CRM part, they have professional, dedicated and well-trained employees.所以这些私人银行在客户管理部分都持支持态度,他们拥有专业的、细致的、训练有素的员工。
Private sector banks offer a wide range of banking and financial products and financial services to corporate and retail customers through a variety of delivery channels such as ATMs, Internet-banking, mobile-banking, etc. 私有银行通过许多传递通道(如自动取款机、网上银行、手机银行等)提供大范围的银行和金融产品、金融服务进行合作并向客户零售。
The area could be Investment management banking, life and non-life insurance, venture capital and asset management, retail loans such as home loans, personal loans, educational loans, car loans, consumer durable loans, credit cards, etc. 涉及的领域包括投资管理银行、生命和非生命保险、风险投资与资产管理、零售贷款(如家庭贷款、个人贷款、教育贷款、汽车贷款、耐用消费品贷款、信用卡等)。
Private sector banks focus on customization of products that are designed to meet the specific needs of customers. 私人银行主要致力于为一些特殊需求的客户进行设计和产品定制。
毕业设计外文翻译_英文版
A Design and Implementation of Active NetworkSocket ProgrammingK.L. Eddie Law, Roy LeungThe Edward S. Rogers Sr. Department of Electrical and Computer EngineeringUniversity of TorontoToronto, Canadaeddie@, roy.leung@utoronto.caAbstract—The concept of programmable nodes and active networks introduces programmability into communication networks. Code and data can be sent and modified on their ways to destinations. Recently, various research groups have designed and implemented their own design platforms. Each design has its own benefits and drawbacks. Moreover, there exists an interoperability problem among platforms. As a result, we introduce a concept that is similar to the network socket programming. We intentionally establish a set of simple interfaces for programming active applications. This set of interfaces, known as Active Network Socket Programming (ANSP), will be working on top of all other execution environments in future. Therefore, the ANSP offers a concept that is similar to “write once, run everywhere.” It is an open programming model that active applications can work on all execution environments. It solves the heterogeneity within active networks. This is especially useful when active applications need to access all regions within a heterogeneous network to deploy special service at critical points or to monitor the performance of the entire networks. Instead of introducing a new platform, our approach provides a thin, transparent layer on top of existing environments that can be easily installed for all active applications.Keywords-active networks; application programming interface; active network socket programming;I. I NTRODUCTIONIn 1990, Clark and Tennenhouse [1] proposed a design framework for introducing new network protocols for the Internet. Since the publication of that position paper, active network design framework [2, 3, 10] has slowly taken shape in the late 1990s. The active network paradigm allows program code and data to be delivered simultaneously on the Internet. Moreover, they may get executed and modified on their ways to their destinations. At the moment, there is a global active network backbone, the ABone, for experiments on active networks. Apart from the immaturity of the executing platform, the primary hindrance on the deployment of active networks on the Internet is more on the commercially related issues. For example, a vendor may hesitate to allow network routers to run some unknown programs that may affect their expected routing performance. As a result, alternatives were proposed to allow active network concept to operate on the Internet, such as the application layer active networking (ALAN) project [4] from the European research community. In the ALAN project, there are active server systems located at different places in the networks and active applications are allowed to run in these servers at the application layer. Another potential approach from the network service provider is to offer active network service as the premium service class in the networks. This service class should provide the best Quality of Service (QoS), and allow the access of computing facility in routers. With this approach, the network service providers can create a new source of income.The research in active networks has been progressing steadily. Since active networks introduce programmability on the Internet, appropriate executing platforms for the active applications to execute should be established. These operating platforms are known as execution environments (EEs) and a few of them have been created, e.g., the Active Signaling Protocol (ASP) [12] and the Active Network Transport System (ANTS) [11]. Hence, different active applications can be implemented to test the active networking concept.With these EEs, some experiments have been carried out to examine the active network concept, for example, the mobile networks [5], web proxies [6], and multicast routers [7]. Active networks introduce a lot of program flexibility and extensibility in networks. Several research groups have proposed various designs of execution environments to offer network computation within routers. Their performance and potential benefits to existing infrastructure are being evaluated [8, 9]. Unfortunately, they seldom concern the interoperability problems when the active networks consist of multiple execution environments. For example, there are three EEs in ABone. Active applications written for one particular EE cannot be operated on other platforms. This introduces another problem of resources partitioning for different EEs to operate. Moreover, there are always some critical network applications that need to run under all network routers, such as collecting information and deploying service at critical points to monitor the networks.In this paper, a framework known as Active Network Socket Programming (ANSP) model is proposed to work with all EEs. It offers the following primary objectives.• One single programming interface is introduced for writing active applications.• Since ANSP offers the programming interface, the design of EE can be made independent of the ANSP.This enables a transparency in developing andenhancing future execution environments.• ANSP addresses the interoperability issues among different execution environments.• Through the design of ANSP, the pros and cons of different EEs will be gained. This may help design abetter EE with improved performance in future.The primary objective of the ANSP is to enable all active applications that are written in ANSP can operate in the ABone testbed . While the proposed ANSP framework is essential in unifying the network environments, we believe that the availability of different environments is beneficial in the development of a better execution environment in future. ANSP is not intended to replace all existing environments, but to enable the studies of new network services which are orthogonal to the designs of execution environments. Therefore, ANSP is designed to be a thin and transparent layer on top of all execution environments. Currently, its deployment relies on automatic code loading with the underlying environments. As a result, the deployment of ANSP at a router is optional and does not require any change to the execution environments.II. D ESIGN I SSUES ON ANSPThe ANSP unifies existing programming interfaces among all EEs. Conceptually, the design of ANSP is similar to the middleware design that offers proper translation mechanisms to different EEs. The provisioning of a unified interface is only one part of the whole ANSP platform. There are many other issues that need to be considered. Apart from translating a set of programming interfaces to other executable calls in different EEs, there are other design issues that should be covered, e.g., • a unified thread library handles thread operations regardless of the thread libraries used in the EEs;• a global soft-store allows information sharing among capsules that may execute over different environmentsat a given router;• a unified addressing scheme used across different environments; more importantly, a routing informationexchange mechanism should be designed across EEs toobtain a global view of the unified networks;• a programming model that should be independent to any programming languages in active networks;• and finally, a translation mechanism to hide the heterogeneity of capsule header structures.A. Heterogeneity in programming modelEach execution environment provides various abstractions for its services and resources in the form of program calls. The model consists of a set of well-defined components, each of them has its own programming interfaces. For the abstractions, capsule-based programming model [10] is the most popular design in active networks. It is used in ANTS [11] and ASP [12], and they are being supported in ABone. Although they are developed based on the same capsule model, their respective components and interfaces are different. Therefore, programs written in one EE cannot run in anther EE. The conceptual views of the programming models in ANTS and ASP are shown in Figure 1.There are three distinct components in ANTS: application, capsule, and execution environment. There exist user interfaces for the active applications at only the source and destination routers. Then the users can specify their customized actions to the networks. According to the program function, the applications send one or more capsules to carry out the operations. Both applications and capsules operate on top of an execution environment that exports an interface to its internal programming resources. Capsule executes its program at each router it has visited. When it arrives at its destination, the application at destination may either reply it with another capsule or presents this arrival event to the user. One drawback with ANTS is that it only allows “bootstrap” application.Figure 1. Programming Models in ASP and ANTS.In contrast, ASP does not limit its users to run “bootstrap” applications. Its program interfaces are different from ANTS, but there are also has three components in ASP: application client, environment, and AAContext. The application client can run on active or non-active host. It can start an active application by simply sending a request message to the EE. The client presents information to users and allows its users to trigger actions at a nearby active router. AAContext is the core of the network service and its specification is divided into two parts. One part specifies its actions at its source and destination routers. Its role is similar to that of the application in ANTS, except that it does not provide a direct interface with the user. The other part defines its actions when it runs inside the active networks and it is similar to the functional behaviors of a capsule in ANTS.In order to deal with the heterogeneity of these two models, ANSP needs to introduce a new set of programming interfaces and map its interfaces and execution model to those within the routers’ EEs.B. Unified Thread LibraryEach execution environment must ensure the isolation of instance executions, so they do not affect each other or accessThe authors appreciate the Nortel Institute for Telecommunications (NIT) at the University of Toronto to allow them to access the computing facilitiesothers’ information. There are various ways to enforce the access control. One simple way is to have one virtual machine for one instance of active applications. This relies on the security design in the virtual machines to isolate services. ANTS is one example that is using this method. Nevertheless, the use of multiple virtual machines requires relatively large amount of resources and may be inefficient in some cases. Therefore, certain environments, such as ASP, allow network services to run within a virtual machine but restrict the use of their services to a limited set of libraries in their packages. For instance, ASP provides its thread library to enforce access control. Because of the differences in these types of thread mechanism, ANSP devises a new thread library to allow uniform accesses to different thread mechanisms.C. Soft-StoreSoft-store allows capsule to insert and retrieve information at a router, thus allowing more than one capsules to exchange information within a network. However, problem arises when a network service can execute under different environments within a router. The problem occurs especially when a network service inserts its soft-store information in one environment and retrieves its data at a later time in another environment at the same router. Due to the fact that execution environments are not allowed to exchange information, the network service cannot retrieve its previous data. Therefore, our ANSP framework needs to take into account of this problem and provides soft-store mechanism that allows universal access of its data at each router.D. Global View of a Unified NetworkWhen an active application is written with ANSP, it can execute on different environment seamlessly. The previously smaller and partitioned networks based on different EEs can now be merging into one large active network. It is then necessary to advise the network topology across the networks. However, different execution environments have different addressing schemes and proprietary routing protocols. In order to merge these partitions together, ANSP must provide a new unified addressing scheme. This new scheme should be interpretable by any environments through appropriate translations with the ANSP. Upon defining the new addressing scheme, a new routing protocol should be designed to operate among environments to exchange topology information. This allows each environment in a network to have a complete view of its network topology.E. Language-Independent ModelExecution environment can be programmed in any programming language. One of the most commonly used languages is Java [13] due to its dynamic code loading capability. In fact, both ANTS and ASP are developed in Java. Nevertheless, the active network architecture shown in Figure 2 does not restrict the use of additional environments that are developed in other languages. For instance, the active network daemon, anted, in Abone provides a workspace to execute multiple execution environments within a router. PLAN, for example, is implemented in Ocaml that will be deployable on ABone in future. Although the current active network is designed to deploy multiple environments that can be in any programming languages, there lacks the tool to allow active applications to run seamlessly upon these environments. Hence, one of the issues that ANSP needs to address is to design a programming model that can work with different programming languages. Although our current prototype only considers ANTS and ASP in its design, PLAN will be the next target to address the programming language issue and to improve the design of ANSP.Figure 2. ANSP Framework Model.F. Heterogeneity of Capsule Header StructureThe structures of the capsule headers are different in different EEs. They carries capsule-related information, for example, the capsule types, sources and destinations. This information is important when certain decision needs to be made within its target environment. A unified model should allow its program code to be executed on different environments. However, the capsule header prevents different environments to interpret its information successfully. Therefore, ANSP should carry out appropriate translation to the header information before the target environment receives this capsule.III. ANSP P ROGRAMMING M ODELWe have outlined the design issues encountered with the ANSP. In the following, the design of the programming model in ANSP will be discussed. This proposed framework provides a set of unified programming interfaces that allows active applications to work on all execution environments. The framework is shown in Figure 2. It is composed of two layers integrated within the active network architecture. These two layers can operate independently without the other layer. The upper layer provides a unified programming model to active applications. The lower layer provides appropriate translation procedure to the ANSP applications when it is processed by different environments. This service is necessary because each environment has its own header definition.The ANSP framework provides a set of programming calls which are abstractions of ANSP services and resources. A capsule-based model is used for ANSP, and it is currently extended to map to other capsule-based models used in ANTSand ASP. The mapping possibility to other models remains as our future works. Hence, the mapping technique in ANSP allows any ANSP applications to access the same programming resources in different environments through a single set of interfaces. The mapping has to be done in a consistent and transparent manner. Therefore, the ANSP appears as an execution environment that provides a complete set of functionalities to active applications. While in fact, it is an overlay structure that makes use of the services provided from the underlying environments. In the following, the high-level functional descriptions of the ANSP model are described. Then, the implementations will be discussed. The ANSP programming model is based upon the interactions between four components: application client , application stub , capsule , and active service base.Figure 3. Information Flow with the ANSP.•Application Client : In a typical scenario, an active application requires some means to present information to its users, e.g., the state of the networks. A graphical user interface (GUI) is designed to operate with the application client if the ANSP runs on a non-active host.•Application Stub : When an application starts, it activates the application client to create a new instance of application stub at its near-by active node. There are two responsibilities for the application stub. One of them is to receive users’ instructions from the application client. Another one is to receive incoming capsules from networks and to perform appropriate actions. Typically, there are two types of actions, thatare, to reply or relay in capsules through the networks, or to notify the users regarding the incoming capsule. •Capsule : An active application may contain several capsule types. Each of them carries program code (also referred to as forwarding routine). Since the application defines a protocol to specify the interactions among capsules as well as the application stubs. Every capsule executes its forwarding routine at each router it visits along the path between the source and destination.•Active Service Base : An active service base is designed to export routers’ environments’ services and execute program calls from application stubs and capsules from different EEs. The base is loaded automatically at each router whenever a capsule arrives.The interactions among components within ANSP are shown in Figure 3. The designs of some key components in the ANSP will be discussed in the following subsections. A. Capsule (ANSPCapsule)ANSPXdr decode () ANSPXdr encode () int length ()Boolean execute ()New types of capsule are created by extending the abstract class ANSPCapsule . New extensions are required to define their own forwarding routines as well as their serialization procedures. These methods are indicated below:The execution of a capsule in ANSP is listed below. It is similar to the process in ANTS.1. A capsule is in serial binary representation before it issent to the network. When an active router receives a byte sequence, it invokes decode() to convert the sequence into a capsule. 2. The router invokes the forwarding routine of thecapsule, execute(). 3. When the capsule has finished its job and forwardsitself to its next hop by calling send(), this call implicitly invokes encode() to convert the capsule into a new serial byte representation. length() isused inside the call of encode() to determine the length of the resulting byte sequence. ANSP provides a XDR library called ANSPXdr to ease the jobs of encoding and decoding.B. Active Service Base (ANSPBase)In an active node, the Active Service Base provides a unified interface to export the available resources in EEs for the rest of the ANSP components. The services may include thread management, node query, and soft-store operation, as shown in Table 1.TABLE I. ACTIVE SERVICE BASE FUNCTION CALLSFunction Definition Descriptionboolean send (Capsule, Address) Transmit a capsule towards its destination using the routing table of theunderlying environment.ANSPAddress getLocalHost () Return address of the local host as an ANSPAddress structure. This isuseful when a capsule wants to check its current location.boolean isLocal (ANSPAddress) Return true if its input argument matches the local host’s address andreturn false otherwise.createThread () Create a new thread that is a class ofANSPThreadInterface (discussed later in Section VIA “Unified Thread Abstraction”).putSStore (key, Object) Object getSStore (key) removeSStore (key)The soft-store operations are provided by putSStore(), getSSTore(), and removeSStore(), and they put, retrieve, and remove data respectively. forName (PathName) Supported in ANSP to retrieve a classobject corresponding to the given path name in its argument. This code retrieval may rely on the code loading mechanism in the environment whennecessary.C. Application Client (ANSPClient)boolean start (args[])boolean start (args[],runningEEs) boolean start (args[],startClient)boolean start (args[],startClient, runningEE)Application Client is an interface between users and the nearby active source router. It does the following responsibilities.1. Code registration: It may be necessary to specify thelocation and name of the application code in some execution environments, e.g., ANTS. 2. Application initialization: It includes selecting anexecution environment to execute the application among those are available at the source router. Each active application can create an application client instance by extending the abstract class, ANSPClient . The extension inherits a method, start(), to automatically handle both the registration and initialization processes. All overloaded versions of start() accept a list of arguments, args , that are passed to the application stub during its initialization. An optional argument called runningEEs allows an application client to select a particular set of environment variables, specified by a list of standardized numerical environment ID, the ANEP ID, to perform code registration. If this argument is not specified, the default setting can only include ANTS and ASP. D. Application Stub (ANSPApplication)receive (ANSPCapsule)Application stubs reside at the source and destination routers to initialize the ANSP application after the application clients complete the initialization and registration processes. It is responsible for receiving and serving capsules from the networks as well as actions requested from the clients. A new instance is created by extending the application client abstract class, ANSPApplication . This extension includes the definition of a handling routine called receive(), which is invoked when a stub receives a new capsule.IV. ANSP E XAMPLE : T RACE -R OUTEA testbed has been created to verify the design correctnessof ANSP in heterogeneous environments. There are three types of router setting on this testbed:1. Router that contains ANTS and a ANSP daemonrunning on behalf of ASP; 2. Router that contains ASP and a ANSP daemon thatruns on behalf of ANTS; 3. Router that contains both ASP and ANTS.The prototype is written in Java [11] with a traceroute testing program. The program records the execution environments of all intermediate routers that it has visited between the source and destination. It also measures the RTT between them. Figure 4 shows the GUI from the application client, and it finds three execution environments along the path: ASP, ANTS, and ASP. The execution sequence of the traceroute program is shown in Figure 5.Figure 4. The GUI for the TRACEROUTE Program.The TraceCapsule program code is created byextending the ANSPCapsule abstract class. When execute() starts, it checks the Boolean value of returning to determine if it is returning from the destination. It is set to true if TraceCapsule is traveling back to the source router; otherwise it is false . When traveling towards the destination, TraceCapsule keeps track of the environments and addresses of the routers it has visited in two arrays, path and trace , respectively. When it arrives at a new router, it calls addHop() to append the router address and its environment to these two arrays. When it finally arrives at the destination, it sets returning to false and forwards itself back to the source by calling send().When it returns to source, it invokes deliverToApp() to deliver itself to the application stub that has been running at the source. TraceCapsule carries information in its data field through the networks by executing encode() and decode(), which encapsulates and de-capsulates its data using External Data Representation (XDR) respectively. The syntax of ANSP XDR follows the syntax of XDR library from ANTS. length() in TraceCapsule returns the data length, or it can be calculated by using the primitive types in the XDRlibrary.Figure 5. Flow of the TRACEROUTE Capsules.V. C ONCLUSIONSIn this paper, we present a new unified layered architecture for active networks. The new model is known as Active Network Socket Programming (ANSP). It allows each active application to be written once and run on multiple environments in active networks. Our experiments successfully verify the design of ANSP architecture, and it has been successfully deployed to work harmoniously with ANTS and ASP without making any changes to their architectures. In fact, the unified programming interface layer is light-weighted and can be dynamically deployable upon request.R EFERENCES[1] D.D. Clark, D.L. Tennenhouse, “Architectural Considerations for a NewGeneration of Protocols,” in Proc. ACM Sigcomm’90, pp.200-208, 1990. [2] D. Tennenhouse, J. M. Smith, W. D. Sicoskie, D. J. Wetherall, and G. J.Minden, “A survey of active network research,” IEEE Communications Magazine , pp. 80-86, Jan 1997.[3] D. Wetherall, U. Legedza, and J. Guttag, “Introducing new internetservices: Why and how,” IEEE Network Magazine, July/August 1998. [4] M. Fry, A. Ghosh, “Application Layer Active Networking,” in ComputerNetworks , Vol.31, No.7, pp.655-667, 1999.[5] K. W. Chin, “An Investigation into The Application of Active Networksto Mobile Computing Environments”, Curtin University of Technology, March 2000.[6] S. Bhattacharjee, K. L. Calvert, and E. W. Zegura, “Self OrganizingWide-Area Network Caches”, Proc. IEEE INFOCOM ’98, San Francisco, CA, 29 March-2 April 1998.[7] L. H. Leman, S. J. Garland, and D. L. Tennenhouse, “Active ReliableMulticast”, Proc. IEEE INFOCOM ’98, San Francisco, CA, 29 March-2 April 1998.[8] D. Descasper, G. Parulkar, B. Plattner, “A Scalable, High PerformanceActive Network Node”, In IEEE Network, January/February 1999.[9] E. L. Nygren, S. J. Garland, and M. F. Kaashoek, “PAN: a high-performance active network node supporting multiple mobile code system”, In the Proceedings of the 2nd IEEE Conference on Open Architectures and Network Programming (OpenArch ’99), March 1999. [10] D. L. Tennenhouse, and D. J. Wetherall. “Towards an Active NetworkArchitecture”, In Proceeding of Multimedia Computing and Networking , January 1996.[11] D. J. Wetherall, J. V. Guttag, D. L. Tennenhouse, “ANTS: A toolkit forBuilding and Dynamically Deploying Network Protocols”, Open Architectures and Network Programming, 1998 IEEE , 1998 , Page(s): 117 –129.[12] B. Braden, A. Cerpa, T. Faber, B. Lindell, G. Phillips, and J. Kann.“Introduction to the ASP Execution Environment”: /active-signal/ARP/index.html .[13] “The java language: A white paper,” Tech. Rep., Sun Microsystems,1998.。
毕业论文外文翻译(中英文)
译文交通拥堵和城市交通系统的可持续发展摘要:城市化和机动化的快速增长,通常有助于城市交通系统的发展,是经济性,环境性和社会可持续性的体现,但其结果是交通量无情增加,导致交通拥挤。
道路拥挤定价已经提出了很多次,作为一个经济措施缓解城市交通拥挤,但还没有见过在实践中广泛使用,因为道路收费的一些潜在的影响仍然不明。
本文首先回顾可持续运输系统的概念,它应该满足集体经济发展,环境保护和社会正义的目标.然后,根据可持续交通系统的特点,使拥挤收费能够促进经济增长,环境保护和社会正义。
研究结果表明,交通拥堵收费是一个切实有效的方式,可以促进城市交通系统的可持续发展。
一、介绍城市交通是一个在世界各地的大城市迫切关注的话题。
随着中国的城市化和机动化的快速发展,交通拥堵已成为一个越来越严重的问题,造成较大的时间延迟,增加能源消耗和空气污染,减少了道路网络的可靠性.在许多城市,交通挤塞情况被看作是经济发展的障碍.我们可以使用多种方法来解决交通挤塞,包括新的基础设施建设,改善基础设施的维护和操作,并利用现有的基础设施,通过需求管理策略,包括定价机制,更有效地减少运输密度.交通拥堵收费在很久以前就已提出,作为一种有效的措施,来缓解的交通挤塞情况。
交通拥堵收费的原则与目标是通过对选择在高峰拥挤时段的设施的使用实施附加收费,以纾缓拥堵情况.转移非高峰期一些出行路线,远离拥挤的设施或高占用车辆,或完全阻止一些出行,交通拥堵收费计划将在节省时间和降低经营成本的基础上,改善空气中的质量,减少能源消耗和改善过境生产力。
此计划在世界很多国家和地方都有成功的应用。
继在20世纪70年代初和80年代中期挪威与新加坡实行收费环,在2003年2月伦敦金融城推出了面积收费;直至现在,它都是已经开始实施拥挤收费的大都市圈中一个最知名的例子。
然而,交通拥堵收费由于理论和政治的原因未能在实践中广泛使用。
道路收费的一些潜在的影响尚不清楚,和城市发展的拥塞定价可持续性,需要进一步研究。
岩土工程中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)原文:Safety Assurance for Challenging Geotechnical Civil Engineering Constructions in Urban AreasAbstractSafety is the most important aspect during design, construction and service time of any structure, especially for challenging projects like high-rise buildings and tunnels in urban areas. A high level design considering the soil-structure interaction, based on a qualified soil investigation is required for a safe and optimised design. Dueto the complexity of geotechnical constructions the safety assurance guaranteed by the 4-eye-principle is essential. The 4-eye-principle consists of an independent peer review by publicly certified experts combined with the observational method. The paper presents the fundamental aspects of safety assurance by the 4-eye-principle. The application is explained on several examples, as deep excavations, complex foundation systems for high-rise buildings and tunnel constructions in urban areas. The experiences made in the planning, design and construction phases are explained and for new inner urban projects recommendations are given.Key words: Natural Asset; Financial Value; Neural Network1.IntroductionA safety design and construction of challenging projects in urban areas is based on the following main aspects:Qualified experts for planning, design and construction;Interaction between architects, structural engineers and geotechnical engineers;Adequate soil investigation;Design of deep foundation systems using the FiniteElement-Method (FEM) in combination with enhanced in-situ load tests for calibrating the soil parameters used in the numerical simulations;Quality assurance by an independent peer review process and the observational method (4-eye-principle).These facts will be explained by large construction projects which are located in difficult soil and groundwater conditions.2.The 4-Eye-PrincipleThe basis for safety assurance is the 4-eye-principle. This 4-eye-principle is a process of an independent peer review as shown in Figure 1. It consists of 3 parts. The investor, the experts for planning and design and the construction company belong to the first division. Planning and design are done accordingto the requirements of the investor and all relevant documents to obtain the building permission are prepared. The building authorities are the second part and are responsible for the buildingpermission which is given to the investor. The thirddivision consists of the publicly certified experts.They are appointed by the building authorities but work as independent experts. They are responsible for the technical supervision of the planning, design and the construction.In order to achieve the license as a publicly certified expert for geotechnical engineering by the building authorities intensive studies of geotechnical engineering in university and large experiences in geotechnical engineering with special knowledge about the soil-structure interaction have to be proven.The independent peer review by publicly certified experts for geotechnical engineering makes sure that all information including the results of the soil investigation consisting of labor field tests and the boundary conditions defined for the geotechnical design are complete and correct.In the case of a defect or collapse the publicly certified expert for geotechnical engineering can be involved as an independent expert to find out the reasons for the defect or damage and to develop a concept for stabilization and reconstruction [1].For all difficult projects an independent peer review is essential for the successful realization of the project.3.Observational MethodThe observational method is practical to projects with difficult boundary conditions for verification of the design during the construction time and, if necessary, during service time. For example in the European Standard Eurocode 7 (EC 7) the effect and the boundary conditions of the observational method are defined.The application of the observational method is recommended for the following types of construction projects [2]:very complicated/complex projects;projects with a distinctive soil-structure-interaction,e.g. mixed shallow and deep foundations, retaining walls for deep excavations, Combined Pile-Raft Foundations (CPRFs);projects with a high and variable water pressure;complex interaction situations consisting of ground,excavation and neighbouring buildings and structures;projects with pore-water pressures reducing the stability;projects on slopes.The observational method is always a combination of the common geotechnical investigations before and during the construction phase together with the theoretical modeling and a plan of contingency actions(Figure 2). Only monitoring to ensure the stability and the service ability of the structure is not sufficient and,according to the standardization, not permitted for this purpose. Overall the observational method is an institutionalized controlling instrument to verify the soil and rock mechanical modeling [3,4].The identification of all potential failure mechanismsis essential for defining the measure concept. The concept has to be designed in that way that all these mechanisms can be observed. The measurements need to beof an adequate accuracy to allow the identification ocritical tendencies. The required accuracy as well as the boundary values need to be identified within the design phase of the observational method . Contingency actions needs to be planned in the design phase of the observational method and depend on the ductility of the systems.The observational method must not be seen as a potential alternative for a comprehensive soil investigation campaign. A comprehensive soil investigation campaignis in any way of essential importance. Additionally the observational method is a tool of quality assurance and allows the verification of the parameters and calculations applied in the design phase. The observational method helps to achieve an economic and save construction [5].4.In-Situ Load TestOn project and site related soil investigations with coredrillings and laboratory tests the soil parameters are determined. Laboratory tests are important and essential for the initial definition of soil mechanical properties of the soil layer, but usually not sufficient for an entire and realistic capture of the complex conditions, caused by theinteraction of subsoil and construction [6].In order to reliably determine the ultimate bearing capacity of piles, load tests need to be carried out [7]. Forpile load tests often very high counter weights or strong anchor systems are necessary. By using the Osterberg method high loads can be reached without install inganchors or counter weights. Hydraulic jacks induce the load in the pile using the pile itself partly as abutment.The results of the field tests allow a calibration of the numerical simulations.The principle scheme of pile load tests is shown in Figure 3.5.Examples for Engineering Practice5.1. Classic Pile Foundation for a High-Rise Building in Frankfurt Clay and LimestoneIn the downtown of Frankfurt am Main, Germany, on aconstruction site of 17,400 m2 the high-rise buildingproject “PalaisQuartier” has been realized (Figure 4). The construction was finished in 2010.The complex consists of several structures with a total of 180,000 m2 floor space, there of 60,000 m2 underground (Figure 5). The project includes the historic building “Thurn-und Taxis-Palais” whose facade has been preserved (Unit A). The office building (Unit B),which is the highest building of the project with a height of 136 m has 34 floors each with a floor space of 1340 m2. The hotel building (Unit C) has a height of 99 m with 24 upper floors. The retail area (Unit D)runs along the total length of the eastern part of the site and consists of eight upper floors with a total height of 43 m.The underground parking garage with five floors spans across the complete project area. With an 8 m high first sublevel, partially with mezzanine floor, and four more sub-levels the foundation depth results to 22 m below ground level. There by excavation bottom is at 80m above sea level (msl). A total of 302 foundation piles(diameter up to 1.86 m, length up to 27 m) reach down to depths of 53.2 m to 70.1 m. above sea level depending on the structural requirements.The pile head of the 543 retaining wall piles (diameter1.5 m, length up to 38 m)were located between 94.1 m and 99.6 m above sea level, the pile base was between 59.8 m and 73.4 m above sea level depending on the structural requirements. As shown in the sectional view(Figure 6), the upper part of the piles is in the Frankfurt Clay and the base of the piles is set in the rocky Frankfurt Limestone.Regarding the large number of piles and the high pile loads a pile load test has been carried out for optimization of the classic pile foundation. Osterberg-Cells(O-Cells) have been installed in two levels in order to assess the influence of pile shaft grouting on the limit skin friction of the piles in the Frankfurt Limestone(Figure 6). The test pile with a total length of 12.9 m and a diameter of 1.68 m consist of three segments and has been installed in the Frankfurt Limestone layer 31.7 m below ground level. The upper pile segment above the upper cell level and the middle pile segment between the two cell levels can be tested independently. In the first phase of the test the upper part was loaded by using the middle and the lower part as abutment. A limit of 24 MN could be reached (Figure 7). The upper segment was lifted about 1.5 cm, the settlement of the middle and lower part was 1.0 cm. The mobilized shaft friction was about 830 kN/m2.Subsequently the upper pile segment was uncoupled by discharging the upper cell level. In the second test phase the middle pile segment was loaded by using the lower segment as abutment. The limit load of the middle segment with shaft grouting was 27.5 MN (Figure 7).The skin friction was 1040 kN/m2, this means 24% higher than without shaft grouting. Based on the results of the pile load test using O-Cells the majority of the 290 foundation piles were made by applying shaft grouting. Due to pile load test the total length of was reduced significantly.5.2. CPRF for a High-Rise Building in Clay MarlIn the scope of the project Mirax Plaza in Kiev, Ukraine,2 high-rise buildings, each of them 192 m (46 storeys)high, a shopping and entertainment mall and an underground parking are under construction (Figure 8). The area of the project is about 294,000 m2 and cuts a 30 m high natural slope.The geotechnical investigations have been executed 70m deep. The soil conditions at the construction site are as follows: fill to a depth of 2 m to 3mquaternary silty sand and sandy silt with a thickness of 5 m to 10 m tertiary silt and sand (Charkow and Poltaw formation) with a thickness of 0 m to 24 m tertiary clayey silt and clay marl of the Kiev and But schak formation with a thickness of about 20 m tertiary fine sand of the But schak formation up to the investigation depthThe ground water level is in a depth of about 2 m below the ground surface. The soil conditions and a cross section of the project are shown in Figure 9.For verification of the shaft and base resistance of the deep foundation elements and for calibration of the numerical simulations pile load tests have been carried out on the construction yard. The piles had a diameter of 0.82 m and a length of about 10 m to 44 m. Using the results of the load tests the back analysis for verification of the FEM simulations was done. The soil properties in accordance with the results of the back analysis were partly 3 times higher than indicated in the geotechnical report. Figure 10 shows the results of the load test No. 2 and the numerical back analysis. Measurement and calculation show a good accordance.The obtained results of the pile load tests and of the executed back analysis were applied in 3-dimensionalFEM-simulations of the foundation for Tower A, taking advantage of the symmetry of the footprint of the building. The overall load of the Tower A is about 2200 MN and the area of the foundation about 2000 m2 (Figure11).The foundation design considers a CPRF with 64 barrettes with 33 m length and a cross section of 2.8 m × 0.8m. The raft of 3 m thickness is located in Kiev Clay Marl at about 10 m depth below the ground surface. The barrettes are penetrating the layer of Kiev Clay Marl reaching the Butschak Sands.The calculated loads on the barrettes were in the range of 22.1 MN to 44.5 MN. The load on the outer barrettes was about 41.2 MN to 44.5 MN which significantly exceeds the loads on the inner barrettes with the maximum value of 30.7 MN. This behavior is typical for a CPRF.The outer deep foundation elements take more loads because of their higher stiffness due to the higher volume of the activated soil. The CPRF coefficient is 0.88 =CPRF . Maximum settlements of about 12 cm werecalculated due to the settlement-relevant load of 85% of the total design load. The pressure under the foundation raft is calculated in the most areas not exceeding 200 kN/m2, at the raft edge the pressure reaches 400 kN/m2.The calculated base pressure of the outer barrettes has anaverage of 5100 kN/m2 and for inner barrettes an average of 4130 kN/m2. The mobilized shaft resistance increases with the depth reaching 180 kN/m2 for outer barrettes and 150 kN/m2 for inner barrettes.During the construction of Mirax Plaza the observational method according to EC 7 is applied. Especially the distribution of the loads between the barrettes and the raft is monitored. For this reason 3 earth pressure devices were installed under the raft and 2 barrettes (most loaded outer barrette and average loaded inner barrette) were instrumented over the length.In the scope of the project Mirax Plaza the new allowable shaft resistance and base resistance were defined for typical soil layers in Kiev. This unique experience will be used for the skyscrapers of new generation in Ukraine.The CPRF of the high-rise building project MiraxPlaza represents the first authorized CPRF in the Ukraine. Using the advanced optimization approaches and taking advantage of the positive effect of CPRF the number of barrettes could be reduced from 120 barrettes with 40 mlength to 64 barrettes with 33 m length. The foundation optimization leads to considerable decrease of the utilized resources (cement, aggregates, water, energy etc.)and cost savings of about 3.3 Million US$.译文:安全保证岩土公民发起挑战工程建设在城市地区摘要安全是最重要的方面在设计、施工和服务时间的任何结构,特别是对具有挑战性的项目,如高层建筑和隧道在城市地区。
工程管理专业外文文献翻译(中英文)【精选文档】
xxxxxx 大学本科毕业设计外文翻译Project Cost Control: the Way it Works项目成本控制:它的工作方式学院(系): xxxxxxxxxxxx专业: xxxxxxxx学生姓名: xxxxx学号: xxxxxxxxxx指导教师: xxxxxx评阅教师:完成日期:xxxx大学项目成本控制:它的工作方式在最近的一次咨询任务中,我们意识到对于整个项目成本控制体系是如何设置和应用的,仍有一些缺乏理解。
所以我们决定描述它是如何工作的.理论上,项目成本控制不是很难跟随。
首先,建立一组参考基线。
然后,随着工作的深入,监控工作,分析研究结果,预测最终结果并比较参考基准。
如果最终的结果不令人满意,那么你要对正在进行的工作进行必要的调整,并在合适的时间间隔重复。
如果最终的结果确实不符合基线计划,你可能不得不改变计划.更有可能的是,会 (或已经) 有范围变更来改变参考基线,这意味着每次出现这种情况你必须改变基线计划。
但在实践中,项目成本控制要困难得多,通过项目数量无法控制成本也证明了这一点。
正如我们将看到的,它还需要大量的工作,我们不妨从一开始启用它。
所以,要跟随项目成本控制在整个项目的生命周期.同时,我们会利用这一机会来指出几个重要文件的适当的地方。
其中包括商业案例,请求(资本)拨款(执行),工作包和工作分解结构,项目章程(或摘要),项目预算或成本计划、挣值和成本基线。
所有这些有助于提高这个组织的有效地控制项目成本的能力。
业务用例和应用程序(执行)的资金重要的是要注意,当负责的管理者对于项目应如何通过项目生命周期展开有很好的理解时,项目成本控制才是最有效的。
这意味着他们在主要阶段的关键决策点之间行使职责。
他们还必须识别项目风险管理的重要性,至少可以确定并计划阻止最明显的潜在风险事件。
在项目的概念阶段•每个项目始于确定的机会或需要的人.通常是有着重要性和影响力的人,如果项目继续,这个人往往成为项目的赞助。
人力资源管理系统中英文对照外文翻译文献
人力资源管理系统中英文对照外文翻译文献Human resource management systems (HRMS) have e essential tools for businesses of all sizes。
including small offices with just 20 XXX using HRMS。
firms can improve their efficiency and ce the time and money XXX。
HRMS XXX。
XXX difficult economic times。
XXX of their business。
including human resources.HRIS are packages are designed to address HR needs。
including planning。
employee n access。
XXX the company's current and future HR needs。
businesses can determine which HRMS features will be most useful for their specific needs。
For example。
HRMS can help with recruitment。
training。
performance management。
XXX.Once the planning stage is complete。
businesses XXX This includes automating tasks such as employee data management。
benefits n。
XXX employees。
providing them with access toimportant n such as company policies。
道路与桥梁工程中英文对照外文翻译文献
中英文对照外文翻译(文档含英文原文和中文翻译)Bridge research in EuropeA brief outline is given of the development of the European Union, together withthe research platform in Europe. The special case of post-tensioned bridges in the UK is discussed. In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio: relating to the identification of voids in post-tensioned concrete bridges using digital impulse radar.IntroductionThe challenge in any research arena is to harness the findings of different research groups to identify a coherent mass of data, which enables research and practice to be better focused. A particular challenge exists with respect to Europe where language barriers are inevitably very significant. The European Community was formed in the 1960s based upon a political will within continental Europe to avoid the European civil wars, which developed into World War 2 from 1939 to 1945. The strong political motivation formed the original community of which Britain was not a member. Many of the continental countries saw Britain’s interest as being purelyeconomic. The 1970s saw Britain joining what was then the European Economic Community (EEC) and the 1990s has seen the widening of the community to a European Union, EU, with certain political goals together with the objective of a common European currency.Notwithstanding these financial and political developments, civil engineering and bridge engineering in particular have found great difficulty in forming any kind of common thread. Indeed the educational systems for University training are quite different between Britain and the European continental countries. The formation of the EU funding schemes —e.g. Socrates, Brite Euram and other programs have helped significantly. The Socrates scheme is based upon the exchange of students between Universities in different member states. The Brite Euram scheme has involved technical research grants given to consortia of academics and industrial partners within a number of the states—— a Brite Euram bid would normally be led by partners within a number of the statesan industrialist.In terms of dissemination of knowledge, two quite different strands appear to have emerged. The UK and the USA have concentrated primarily upon disseminating basic research in refereed journal publications: ASCE, ICE and other journals. Whereas the continental Europeans have frequently disseminated basic research at conferences where the circulation of the proceedings is restricted.Additionally, language barriers have proved to be very difficult to break down. In countries where English is a strong second language there has been enthusiastic participation in international conferences based within continental Europe —e.g. Germany, Italy, Belgium, The Netherlands and Switzerland. However, countries where English is not a strong second language have been hesitant participants }—e.g. France.European researchExamples of research relating to bridges in Europe can be divided into three types of structure:Masonry arch bridgesBritain has the largest stock of masonry arch bridges. In certain regions of the UK up to 60% of the road bridges are historic stone masonry arch bridges originally constructed for horse drawn traffic. This is less common in other parts of Europe as many of these bridges were destroyed during World War 2.Concrete bridgesA large stock of concrete bridges was constructed during the 1950s, 1960s and 1970s. At the time, these structures were seen as maintenance free. Europe also has a large number of post-tensioned concrete bridges with steel tendon ducts preventing radar inspection. This is a particular problem in France and the UK.Steel bridgesSteel bridges went out of fashion in the UK due to their need for maintenance as perceived in the 1960s and 1970s. However, they have been used for long span and rail bridges, and they are now returning to fashion for motorway widening schemes in the UK.Research activity in EuropeIt gives an indication certain areas of expertise and work being undertaken in Europe, but is by no means exhaustive.In order to illustrate the type of European research being undertaken, an example is given from the University of Edinburgh portfolio. The example relates to the identification of voids in post-tensioned concrete bridges, using digital impulse radar.Post-tensioned concrete rail bridge analysisOve Arup and Partners carried out an inspection and assessment of the superstructure of a 160 m long post-tensioned, segmental railway bridge in Manchester to determine its load-carrying capacity prior to a transfer of ownership, for use in the Metrolink light rail system..Particular attention was paid to the integrity of its post-tensioned steel elements.Physical inspection, non-destructive radar testing and other exploratory methods were used to investigate for possible weaknesses in the bridge.Since the sudden collapse of Ynys-y-Gwas Bridge in Wales, UK in 1985, there has been concern about the long-term integrity of segmental, post-tensioned concrete bridges which may b e prone to ‘brittle’ failure without warning. The corrosion protection of the post-tensioned steel cables, where they pass through joints between the segments, has been identified as a major factor affecting the long-term durability and consequent strength of this type of bridge. The identification of voids in grouted tendon ducts at vulnerable positions is recognized as an important step in the detection of such corrosion.Description of bridgeGeneral arrangementBesses o’ th’ Barn Bridge is a 160 m long, three span, segmental, post-tensionedconcrete railway bridge built in 1969. The main span of 90 m crosses over both the M62 motorway and A665 Bury to Prestwick Road. Minimum headroom is 5.18 m from the A665 and the M62 is cleared by approx 12.5 m.The superstructure consists of a central hollow trapezoidal concrete box section 6.7 m high and 4 m wide. The majority of the south and central spans are constructed using 1.27 m long pre-cast concrete trapezoidal box units, post-tensioned together. This box section supports the in site concrete transverse cantilever slabs at bottom flange level, which carry the rail tracks and ballast.The center and south span sections are of post-tensioned construction. These post-tensioned sections have five types of pre-stressing:1. Longitudinal tendons in grouted ducts within the top and bottom flanges.2. Longitudinal internal draped tendons located alongside the webs. These are deflected at internal diaphragm positions and are encased in in site concrete.3. Longitudinal macalloy bars in the transverse cantilever slabs in the central span .4. Vertical macalloy bars in the 229 mm wide webs to enhance shear capacity.5. Transverse macalloy bars through the bottom flange to support the transverse cantilever slabs.Segmental constructionThe pre-cast segmental system of construction used for the south and center span sections was an alternative method proposed by the contractor. Current thinkingire suggests that such a form of construction can lead to ‘brittle’ failure of the ententire structure without warning due to corrosion of tendons across a construction joint,The original design concept had been for in site concrete construction.Inspection and assessmentInspectionInspection work was undertaken in a number of phases and was linked with the testing required for the structure. The initial inspections recorded a number of visible problems including:Defective waterproofing on the exposed surface of the top flange.Water trapped in the internal space of the hollow box with depths up to 300 mm.Various drainage problems at joints and abutments.Longitudinal cracking of the exposed soffit of the central span.Longitudinal cracking on sides of the top flange of the pre-stressed sections.Widespread sapling on some in site concrete surfaces with exposed rusting reinforcement.AssessmentThe subject of an earlier paper, the objectives of the assessment were:Estimate the present load-carrying capacity.Identify any structural deficiencies in the original design.Determine reasons for existing problems identified by the inspection.Conclusion to the inspection and assessmentFollowing the inspection and the analytical assessment one major element of doubt still existed. This concerned the condition of the embedded pre-stressing wires, strands, cables or bars. For the purpose of structural analysis these elements、had been assumed to be sound. However, due to the very high forces involved,、a risk to the structure, caused by corrosion to these primary elements, was identified.The initial recommendations which completed the first phase of the assessment were:1. Carry out detailed material testing to determine the condition of hidden structural elements, in particularthe grouted post-tensioned steel cables.2. Conduct concrete durability tests.3. Undertake repairs to defective waterproofing and surface defects in concrete.Testing proceduresNon-destructi v e radar testingDuring the first phase investigation at a joint between pre-cast deck segments the observation of a void in a post-tensioned cable duct gave rise to serious concern about corrosion and the integrity of the pre-stress. However, the extent of this problem was extremely difficult to determine. The bridge contains 93 joints with an average of 24 cables passing through each joint, i.e. there were approx. 2200 positions where investigations could be carried out. A typical section through such a joint is that the 24 draped tendons within the spine did not give rise to concern because these were protected by in site concrete poured without joints after the cables had been stressed.As it was clearly impractical to consider physically exposing all tendon/joint intersections, radar was used to investigate a large numbers of tendons and hence locate duct voids within a modest timescale. It was fortunate that the corrugated steel ducts around the tendons were discontinuous through the joints which allowed theradar to detect the tendons and voids. The problem, however, was still highly complex due to the high density of other steel elements which could interfere with the radar signals and the fact that the area of interest was at most 102 mm wide and embedded between 150 mm and 800 mm deep in thick concrete slabs.Trial radar investigations.Three companies were invited to visit the bridge and conduct a trial investigation. One company decided not to proceed. The remaining two were given 2 weeks to mobilize, test and report. Their results were then compared with physical explorations.To make the comparisons, observation holes were drilled vertically downwards into the ducts at a selection of 10 locations which included several where voids were predicted and several where the ducts were predicted to be fully grouted. A 25-mm diameter hole was required in order to facilitate use of the chosen horoscope. The results from the University of Edinburgh yielded an accuracy of around 60%.Main radar sur v ey, horoscope verification of v oids.Having completed a radar survey of the total structure, a baroscopic was then used to investigate all predicted voids and in more than 60% of cases this gave a clear confirmation of the radar findings. In several other cases some evidence of honeycombing in the in site stitch concrete above the duct was found.When viewing voids through the baroscopic, however, it proved impossible to determine their actual size or how far they extended along the tendon ducts although they only appeared to occupy less than the top 25% of the duct diameter. Most of these voids, in fact, were smaller than the diameter of the flexible baroscopic being used (approximately 9 mm) and were seen between the horizontal top surface of the grout and the curved upper limit of the duct. In a very few cases the tops of the pre-stressing strands were visible above the grout but no sign of any trapped water was seen. It was not possible, using the baroscopic, to see whether those cables were corroded.Digital radar testingThe test method involved exciting the joints using radio frequency radar antenna: 1 GHz, 900 MHz and 500 MHz. The highest frequency gives the highest resolution but has shallow depth penetration in the concrete. The lowest frequency gives the greatest depth penetration but yields lower resolution.The data collected on the radar sweeps were recorded on a GSSI SIR System 10.This system involves radar pulsing and recording. The data from the antenna is transformed from an analogue signal to a digital signal using a 16-bit analogue digital converter giving a very high resolution for subsequent data processing. The data is displayed on site on a high-resolution color monitor. Following visual inspection it isthen stored digitally on a 2.3-gigabyte tape for subsequent analysis and signal processing. The tape first of all records a ‘header’ noting the digital radar settings together with the trace number prior to recording the actual data. When the data is played back, one is able to clearly identify all the relevant settings —making for accurate and reliable data reproduction.At particular locations along the traces, the trace was marked using a marker switch on the recording unit or the antenna.All the digital records were subsequently downloaded at the University’s NDT laboratory on to a micro-computer.(The raw data prior to processing consumed 35 megabytes of digital data.) Post-processing was undertaken using sophisticated signal processing software. Techniques available for the analysis include changing the color transform and changing the scales from linear to a skewed distribution in order to highlight、突出certain features. Also, the color transforms could be changed to highlight phase changes. In addition to these color transform facilities, sophisticated horizontal and vertical filtering procedures are available. Using a large screen monitor it is possible to display in split screens the raw data and the transformed processed data. Thus one is able to get an accurate indication of the processing which has taken place. The computer screen displays the time domain calibrations of the reflected signals on the vertical axis.A further facility of the software was the ability to display the individual radar pulses as time domain wiggle plots. This was a particularly valuable feature when looking at individual records in the vicinity of the tendons.Interpretation of findingsA full analysis of findings is given elsewhere, Essentially the digitized radar plots were transformed to color line scans and where double phase shifts were identified in the joints, then voiding was diagnosed.Conclusions1. An outline of the bridge research platform in Europe is given.2. The use of impulse radar has contributed considerably to the level of confidence in the assessment of the Besses o’ th’ Barn Rail Bridge.3. The radar investigations revealed extensive voiding within the post-tensioned cable ducts. However, no sign of corrosion on the stressing wires had been foundexcept for the very first investigation.欧洲桥梁研究欧洲联盟共同的研究平台诞生于欧洲联盟。
外文翻译---国际贸易单证的作用
附录F.1英文参考资料及中文翻译F. 1 .1international trade documents roleGeneral international trade documents (international trade documents) is the international trade of use all the documents, documents and certificates collectively. Usually with international trade documents to deal with in and out of delivery of the goods El, transportation, insurance, inspection and quarantine, customs declaration, the settlement of exchange, etc. Special international trade documents usually refers to the settlement documents, especially the l/c under the way of settlement of documents.International trade documents and the use of import and export trade program closely related, the documents in the import and export enterprise work throughout the export, purchase, transportation, the whole process of the proceeds, the effort is big, timeliness strong, is broad, in addition to import and export enterprise internal between various departments the cooperation with the outside, still must and bank, customs, transportation department, insurance companies, the inspection and quarantine agencies and the relevant administrative authorities happen various contact, linked together, mutual influence, also are conditions.International trade documents for the performance of a contract is necessary meansInternational trade is the transnational goods business, due to the particularity of the multinational business, which is the purchase and sale of the different departments are located in different countries, are remote, in most cases, the goods and payment can't perform simple direct exchange, but only as the medium of exchange with documents means. The international trade of the documents that sales of goods through the documents realization sale, the seller should not only will the actual delivery of goods export shipment, and should submit to the buyer include the title to the goods vouchers, complete documents to show real assignment. The seller/p means that the delivery of the goods, and the buyer payment is get to buy goods on behalf of property rights certificate, the deal is no longer with the goods as the core, but with documents as the core. Documents and payment of the convection principle has become the international trade of general principles of the commodity business. As international trade experts "; m Cardiff in the export trade in his book mentioned: "from a business perspective, can say CIF the purpose of the contract is not the buying and selling of goods itself, but the documents relating to the goods business." What say here "documents" is the international trade of documents.International trade documents many kinds, every kind of documents has itsspecial role, functions and different prepared by requirements. In the import and export trade in the process of contract documents can be roughly divided into two kinds: one kind has the property of commodity. They represent some goods, some say the exchange value of commodity, some explain the packaging of goods content, some guarantee the quality and quantity of goods, some for commodities exempt from provide the essential proof, etc.; Another type of have monetary properties, they represent direct some money, some of the money to pay for to make a promise made conditional guarantee or. All the documents issued by, combined, circulation, exchange and application reflects the process of contract, it reflects the buyers and sellers of responsibility, transfer and termination happen. This shows, international trade documents is necessary to complete the contract.International trade documents is foreign trade business management important toolsInternational trade documents is involved in international trade by import and export enterprises and the relevant countries issued by the government organizations, from import and export enterprise perspective, the international trade documents the import and export of the work is an important link. The actual business, whether the contract contents, terms and conditions of the credit, or implement supply, delivery quality control, quantity, and transportation, insurance, inspection and quarantine, customs declaration, the settlement of exchange, and many other business management link, the final work in documents concentrated reflection out, also is the contract performance post processing the important basis of controversy and disputes.From the perspective of national, international trade documents as a foreign business and legal documents, reflected the one country foreign trade policy, reflects a country foreign trade related laws, regulations and rules and regulations, involved in one country and other countries of between bilateral or multilateral trade agreements, as members must abide by the related to the international organization of the relevant rules.Visible, import and export enterprise management stand or fall and work organization management quality documents relationship is very big, international trade documents work is not only the whole process service for trade, import and export enterprise management is an important tool, but also a country foreign trade management important tools.International trade documents import and export enterprise to improve the economic benefit is the important guaranteeInternational trade work and import and export documents the economic efficiency of enterprises closely related, the documents management work to strengthen and improve the quality of documents, not only can effectively stop mistakes accidents, make up for the defect of the management, also can accelerate the money collecting, increasing the service efficiency of funds, managing interest expenses, save all kinds of cost, express in the import and export enterprises improve economic benefit. If documents management work of any errors, failed to hand in single or provide the correct documents, it will lead to the buyer refuse to pay payment, delay payment, and then to the enterprise and even the country risks andlosses, the economic benefit of enterprise could not be guaranteed.International trade documents is the important content of import and export enterprise imageInternational trade is not only the business and legal documents documents, and still can rise to shape and perfect the import and export enterprise external image, foreign expanded publicity role. Beautiful, neat and clear the documents, can show import and export enterprise a high level of service quality, the high quality of the work product, and the first-class standard management standards, and for enterprise to mould good image, be helpful for business development. Conversely, poor, mixed and disorderly, the wrong documents is inevitable brings to the enterprise negative effect.Ticket, promissory notes, checks or other used for payment of money has similar documents; Commercial documents has the property of commodity, such as commercial invoice.(URC 522) classification model makes commercial documents category is quite widespread, covers the financial documents except outside of all documents, in fact commercial documents could further subdivided into basic documents and affiliate documents. Basic documents in real business use frequency is very high, usually including commercial invoice, ocean bill of lading and insurance policy; Affiliated usually in real business documents, according to the agreement of the buyer is required to provide the seller, can be divided into two kinds: one kind is the requirements of the importing country official documents, such as consular invoice, custom invoice, the certificate of origin, etc.; Another kind is the buyer requests that the goods and related documents, such as packing list and quality certificate, weight list, send docs proof, send samples proof, shipment notification, age certification, etc.F.2国际贸易单证的作用广义的国际贸易单证(international trade documents)是国际贸易中使用的各种单据、文件与证书的统称。
3000字外文翻译
3000字外文翻译篇一:3000字英文翻译Bolt Supporting of Large-Span Soft Rockway inShaqu CollieryAbstract The instability of trapezoidal I-steel support is analysed for the compound roof of main coal seam in Shaqu Colliery, and the mechanism of bolt supporting is studied. A scheme of bolt supporting has been given and put into practice,remarkable technical and economic benefits have been got.Key words :large-span,compound roof, bolt supporting, mechanism1.IntroductionIn shaqu colliery a large coal mine mining rare coking coal in China, most roadways are laid out in main coal seamroof of coal seam .The soft compound ,which is composed of mudstone and coal seamcontains aboundant beddings and joints. The strength of the roof is so low that its uniaxial-saturated compressive strength is only 10.7 Mpa.RQD value of coal seam and is zero ,and that of mudstone is lower than 10%. There is clay minerals in mudstone, main compositions are interbedded strata of illite and montmorillonite which will swell when soaked by water, The span of preperation roadways and gateways is wider than 4m, and that of some main roadways is over 5m. In shaqu colliery , preperation roadways and gateways were supported by trapezoidal I-steel support, the beams of which were bent and damaged, and the roadways were destroyed seriously within a short period just after excavated. Roofcontrolling of Large-Span Soft Rockways in the coal seam became the key to the production and construction of shaqu colliery.2.supporting status and instability analysis of trapezoidal I-steel supportstrapezoidal I-steel supports were used in drawing roadways,which roof span is 4.0m, floor span is 4.9m, and hight 2.95m and spacing 0.5m. Initial resistance of the supports was almost zero because it was difficult to the support beams contact the roof, even if with high quality of installation. The trapezoidal I-steel supports would not carry load until the displacement of surrounding rock excceded 80-100 mm because the supports increased very slowly. Therefore, right after excavation, the roof would bend and subside severly. Eight hours after excavation, the roof strata would break completely, and then form rock cavity. The weight of caving rock would act on the beams of supports, which forms loose rock pressure.By calculating, the ultimate load-bearing capacity is smaller than roof pressure whether it is uniformal or concentrated, Based on the in-situ observation, inflection value of most roof reached 200-300mm. When paired supports were used, paired beams were still bent and damaged; then midprops were added, they were also destroyed. Many roof beams were stabilized only if 2-3 props had been added. The supports were damaged completely, and most of them could not be reused. The partsection of roadways had become inverted trapezoid, and the available section was far smaller than the designed section. Part of roadways was out of use because it was in the danger of serious caving.3.Mechanism of bolt supportingIts mechanism is to make full use of the self-load-bearing capacity of surrounding rock by bolting, and then make the surrounding rock stabilize by itself. The stability of surrounding rock depends on the equilibrium status of ground pressure, self-load-bearing capacity of surrounding rock and anchoring force of bolts. Ground pressure is to make surrounding rock deform and break; self-load-bearing capacity is the main factor to stablize surrounding rock. Anchoring force of bolts can notchange the equilibrium status of the three because it is very small, compared with ground pressure and self-load-bearing capacity. And its function is to change the decreasing regularity of self-load-bearing capacity versus the deformation of surrounding rock, and balance self-load-bearing capacity against ground pressure early.Roof pressure is the pressure acting on the roof beams when I-steel supports are used to control the roof. When roof is supported by bolts, the roof pressure change to be the pressure acting on the rock within the bolting range because this part of rock is change into self-bearing body. According to the characteristics of the roof of coal seamscan be divided into six substrata. , bolts strataWhen the value of roof subsidence is zero, roof pressure is in-situ stress; then roof pressure decreases with the increase of roof subsidence. The variation of roof pressure is analyzed by FLAC, The results are shown as curve 1 in Fig.1. Wheoof subsidence reaches 19 mm, the first roof substratum begins to bearing tensile stress, then losts self-load-bearing capacity, and roof pressure decreases to 0.67Mpa. When roof subsidence reaches 40 mm, the second substratum loses self-load-bearing capacity, and roof pressure decreases to 0.16Mpa. When roof subsidence reaches 100 mm, the fourth substratum loses self-load-bearing capacity, and roof pressure decreases to0.08Mpa. In the initial stage of roof subsidence, roof pressure decreases rapidly, and in the later stage of roof subsidence, roof pressure decreases slowly and then has an increasing trend.The self-load-bearing capacity of the roof without bolting is calculated upon the theory of laminated beam, the result are shown as curve 2 in Fig.1. When roof subsidence is zero, the self-load-bearing capacity is at its utmost value 0.0625Mpa; when roof subsidence is 100mm,roof strata have broken, most of self-load-bearing capacity has lost, and the residual self-load-bearing capacity is only 0.0375Mpa.Theself-load-bearing capacity of the roof with bolting is calculated upon the theory of combined beam, the result are shown as curve 3 in Fig.1. When roof subsidence is zero, the self-load-bearing capacity is at its utmostvalue 0.4Mpa; when the roof subsidence reaches 40mm the self-load-bearing capacity decreases to 0.225Mpa,and when roof subsidence reaches 100mm, the self-load-bearing capacity decreases to 0.1Mpa .As shown in Fin. 1, the self-load-bearing capacity of roof strata without bolting is lower than roof pressure during the whole course of roof subsiding, so roof strata cave inevitably. When bolted, roof strata is changed from laminated beam into combined beam ,and the selr-load-bearing capacity increases markedly. When roof subsidence reaches 44mm, the self-load-bearing capacity exceeds roof pressure, then roof strata stabilized by itself.4 Anchoring technologyBased on the above study of bolting mechanism, large setting resistance, high speed of resistance and high final resistance are the key technology to the large-spon soft rock roadway before roof strata detaching, which includes: (1)to improve the setting resistance increasing and achieve high speed of resistance increasing, to make the real working properties of bolts coordinate self-load-bearing properties of roof strata , which enables to make full use of the self-load-bearing capacity of roof strata; (2)to raise bolting reliability, and solve the difficult problems that anchoring force between bolts and soft rock is small and easy to lose.4.1 Bloting scheme篇二:本科论文 3000字外文翻译附录A3 Image Enhancement in the Spatial DomainThe principal objective of enhancement is to process an image so that the result is more suitable than the original image for a specific application. The word specific is important, because it establishes at the outset than the techniques discussed in this chapter are very much problem oriented. Thus, for example, a method that is quite useful for enhancing X-ray images may not necessarily be the best approach for enhancing pictures of Mars transmitted by a space probe. Regardless of the method used .However, image enhancement is one of the most interesting and visually appealing areas of image processing.Image enhancement approaches fall into two broad categories: spatial domain methods and frequency domain methods. The term spatial domain refers to the image plane itself, and approaches in this category are based on direct manipulation of pixels in an image. Fourier transform of an image. Spatial methods are covered in this chapter, and frequency domain enhancement is discussed in Chapter 4.Enhancement techniques based on various combinations of methods from these two categories are not unusual. We note also that many of the fundamental techniques introduced in this chapter in the context of enhancement are used in subsequent chapters for a variety of other image processing applications.There is no general theory of image enhancement. When an image is processed for visual interpretation, the viewer is the ultimate judge of how well a particular method works. Visual evaluation of image quality is a highly is highly subjective process, thus making the definition of a “good image” an elusive standard by which to compare algorithm performance. When the problem is one of processing images for machine perception, the evaluation task is somewhat easier. For example, in dealing with a character recognition application, and leaving aside other issues such as computational requirements, the best image processingmethod would be the one yielding the best machine recognition results. However, even in situations when aclear-cut criterion of performance can be imposed on the problem, a certain amount of trial and error usually is required before a particular image enhancement approach is selected.3.1 BackgroundAs indicated previously, the term spatial domain refers to the aggregate of pixels composing an image. Spatial domain methods are procedures that operate directly on these pixels. Spatial domain processes will be denotes by the expressiong?x,y??T?f(x,y)? (3.1-1)where f(x, y) is the input image, g(x, y) is the processed image, and T is an operator on f, defined over some neighborhood of (x, y). In addition, T can operate on a set of input images, such as performing the pixel-by-pixel sum of K images for noise reduction, as discussed in Section 3.4.2.The principal approach in defining a neighborhood about a point (x, y) is to use a square or rectangular subimage area centered at (x, y).The center of the subimage is moved from pixel to starting, say, at the top left corner. The operator T is applied at each location (x, y) to yield the output, g, at that location. The process utilizes only the pixels in the area of the image spanned by the neighborhood. Although other neighborhood shapes, such as approximations to a circle, sometimes are used, square and rectangular arrays are by far the most predominant because of their ease of implementation.The simplest from of T is when the neighborhood is of size 1×1 (that is, a single pixel). In this case, g depends only on the value of f at (x, y), and T becomes a gray-level (also called an intensity or mapping) transformation function of the forms?T(r) (3.1-2)where, for simplicity in notation, r and s are variables denoting, respectively, the grey level of f(x, y) and g(x, y)at any point (x, y).Some fairly simple, yet powerful, processing approaches can be formulates with gray-level transformations. Because enhancement at any point in an image depends only on the grey level at that point, techniques in this category often are referred to as point processing.Larger neighborhoods allow considerably more flexibility. The general approach is to use a function of the values of f in a predefined neighborhood of (x, y) to determine the value of g at (x, y). One of the principal approaches in this formulation is based on the use of so-called masks (also referred to as filters, kernels, templates, or windows). Basically, a mask is a small (say, 3×3) 2-Darray, in which the values of the mask coefficients determine the nature of the type of approach often are referred to as mask processing or filtering. These concepts are discussed in Section 3.5.3.2 Some Basic Gray Level TransformationsWe begin the study of image enhancement techniques by discussing gray-level transformation functions. These are among the simplest of all image enhancement techniques. The values of pixels, before and after processing, will be denoted by r and s, respectively. As indicated in the previous section, these values are related by an expression of the from s = T(r), where T is a transformation that maps a pixel value r into a pixel value s. Since we are dealing with digital quantities, values of the transformation function typically are stored in a one-dimensional array and the mappings from r to s are implemented via table lookups. For an 8-bit environment, a lookup table containing the values of T will have 256 entries.As an introduction to gray-level transformations, which shows threebasic types of functions used frequently for image enhancement: linear (negative and identity transformations), logarithmic (log and inverse-log transformations), and power-law (nth power and nth root transformations). The identity function is the trivial case in which out put intensities are identical to input intensities. It is included in the graph only for completeness.3.2.1 Image NegativesThe negative of an image with gray levels in the range [0, L-1]is obtained by using the negative transformation show shown, which is given by the expressions?L?1?r(3.2-1)Reversing the intensity levels of an image in this manner produces the equivalent of a photographic negative. This type of processing is particularly suited for enhancing white or grey detail embedded in dark regions of an image, especiallywhen the black areas are dominant in size.3.2.2 Log TransformationsThe general from of the log transformation iss?clog(1?r) (3.2-2)Where c is a constant, and it is ass umed that r ≥0 .The shape of the log curve transformation maps a narrow range of low gray-level values in the input image into a wider range of output levels. The opposite is true of higher values of input levels. We would use a transformation of this type to expand the values of dark pixels in an image while compressing the higher-level values. The opposite is true of the inverse log transformation.Any curve having the general shape of the log functions would accomplish this spreading/compressing of gray levels in an image. In fact, the power-law transformations discussed in the next section are much moreversatile for this purpose than the log transformation. However, the log function has the important characteristic that it compresses the dynamic range of image characteristics of spectra. It is not unusual to encounter spectrum values that range from 0 to 106 or higher. While processing numbers such as these presents no problems for a computer, image display systems generally will not be able to reproduce faithfully such a wide range of intensity values .The net effect is that a significant degree of detail will be lost in the display of a typical Fourier spectrum.3.2.3 Power-Law TransformationsPower-Law transformations have the basic froms?cr? (3.2-3)Where c and y are positive constants .Sometimes Eq. (3.2-3) is written asto account for an offset (that is, a measurable output when the input is zero). However, offsets typically are an issue of display calibration and as a result they are normally ignored in Eq. (3.2-3). Plots of s versus r for various values of y are shown in Fig.3.6. As in the case of the log transformation, power-law curves with fractional values of y map a narrow range of dark input values into a wider range of output values, with the opposite being true for higher values of input levels. Unlike the log function, however, we notice here a family of possible transformation curves obtained simply by varying y. As expected, we see in Fig.3.6 that curves generated with values of y>1 have exactly the opposite effect as those generated with values of y<1. Finally, we note that Eq.(3.2-3) reduces to the identity transformation when c = y = 1.A variety of devices used for image capture, printing, and display respond according to as gamma[hence our use of this symbol in Eq.(3.2-3)].The process used to correct this power-law response phenomena is called gamma correction.Gamma correction is important if displaying an image accurately ona computer screen is of concern. Images that are not corrected properly can look either bleached out, or, what is more likely, too dark. Trying to reproduce colors accurately also requires some knowledge of gamma correction because varying the value of gamma correcting changes not only the brightness, but also the ratios of red to green to blue. Gamma correction has become increasingly important in the past few years, as use of digital images for commercial purposes over the Internet has increased. It is not Internet has increased. It is not unusual that images created for a popular Web site will be viewed by millions of people, the majority of whom will have different monitors and/or monitor settings. Some computer systems even have partial gamma correction built in. Also, current image standards do not contain the value of gamma with which an image was created, thus complicating the issue further. Given these constraints, a reasonable approach when storing images in a Web site is to preprocess the images with a gamma that represents in a Web site is to preprocess the images with a gamma that represents an “average” of the types of monitors and computer systems that one expects in the open market at any given point in time.3.2.4 Piecewise-Linear Transformation FunctionsA complementary approach to the methods discussed in the previous three sections is to use piecewise linear functions. The principal advantage of piecewise linear functions over the types of functions we have discussed thus far is that the form of piecewise functions can be arbitrarily complex. In fact, as we will see shortly, a practical implementation of some important transformations can be formulated only 篇三:3000字外文文献翻译模板学年论文(外文文献翻译)英文题目 Financial structure and development 译文题目金融结构与金融发展姓名学号所在学院管理学院专业班级指导教师日期 20xx 年 6 月 28 日目录文献名:作者:文献来源:原文 (1)译文 (10)原文:(可以保留文献的原有格式)译文:(需要有页眉为:20xx级会计专业学年论文)11。
红楼梦和大观园外文文献翻译中英文
红楼梦和大观园外文翻译中英文英文Tourism, a Classic Novel, and Television:The Case of Cáo Xue˘qin’s Dream of the Red Mansions and Grand View Gardens, BeijingChris RyanAbstractThis article reports a study of the importance of the classic Chinese novel, The Dream of the Red Mansion, in attracting visitors to Grand View Gardens in Beijing. That site was built as a replica of a Qing Dynasty palace for a popular television series. The study found that 52% of the 308 respondents stated that the novel was very or extremely important in attracting them to the gardens. The article seeks to go beyond this statistic by examining how familiarity with the novel might help explain some of the statistical findings and concludes by arguing that if one is to obtain an understanding of the tourist experience of a place made popular by fiction, then it is also necessary to engage in cultural, media, and literary studies as well as conversations and surveys of visitors. Hence, the text of the novel is itself part of the data set.Keywords: Chinese literature; tourism; constructions; culture; heritageThe purpose of this article is to examine to what extent familiarity with the television series and classic novel, The Dream of the RedMansion, attracted visitors to Grand View Gardens in Beijing. Given the text taken above from the novel by Cáo Xue˘qin, the nature of the site, the novel, the film, and the different perceptions of visitors might be said to combine to fulfill Cáo Xue˘qin’s complex unfolding of illusion as reality, and reality as illusion. In addition, repeated visits by the authors were found to inform subsequent visits and the research project so that the authors became filters through which to better understand the place and people’s experience of it. Consequently, the study us es a mixed-methods research approach in which the data are (1) observation and sustained visitation during a period of more than 4 months, (2) the statistical data collected from respondents, (3) responses to open-ended questions, (4) conversations with visitors, and (5) knowledge of the novel. This last is important in that it quickly became evident that for many respondents the visit was motivated by the novel and its status within Chinese literature as “a masterpiece of realism written in the middle of t he eighteenth century” (Yang and Yang 1979, p. 1289). The implication of this is that a sixth source of data exists, which is the experience and knowledge of the authors of not only the site but also Chinese culture, including its Taoist and Buddhist underpinnings. Consequently, the discourse within this article is informed by not only an empiricist research tradition but also a subjective tradition of observation that Adler and Adler (1994, p. 389) maintain serves as “the most powerful form ofvalidation.” By necessity, therefore, the authors have recourse not only to the meta-narratives implicit in the postpositivistic approach that seeks to generalize and predict from quantitative data but also in the minutiae of observations of behaviors. They have adopted ideas derived from symbolic or interpretive interactionism and the “lived in experience” as proposed by Denzin (2001) and the stance of CAP ethnography— that is, creative analytical practice—as espoused by Richardson (2000), by which research unfolds micro actions with unknown macro implications. However, problems relate to such non-post positivistic approaches premised on the view that “the truth” of a situation is structured within its social setting and that the researcher is also part of that structure. The authors recognize that the act of asking a question is not neutral. The question shapes the articulation of a response on the part of the respondent, and thus asking a question initiates a reply on the part of the respondent about something which the respondent may not actually have previously thought about. For example, a visitor may visit an attraction unaware that it is associated with a novel or a film, but on being told of the linkage will now shape a response having had that linkage created in his or her mind. The question has changed the visitor’s experience! Simply collecting data that are formed solely by responses to a quantitatively based questionnaire does not include this aspect of the visitor experience. However, a challenge then exists for the researcher.While now the researcher has played a role in the construction of the experience, how does the researcher establish the credibility of an interpretation in the reporting of the visitor experience to which they have contributed? In this instance the authors used text analysis software to help formulate the interpretation of at least part of the qualitative data.To summarize, the research question is to what extent associations with film and literature attract people to the gardens, or a re the garden’s aesthetic attributes alone sufficient? Accordingly, the article is contextualized within different texts. First, there is that related to the novel itself. Second, there is that related to the academic literature on the relationship between films and novels on one hand and tourism on the other. Third, there is that related to the modes of analysis adopted. This last includes some explanation of the software used to interpret the textual data. The article is also premised on a view that there is little written about the relationship between literature and television on one hand and patterns of visitation to sites in China on the other. This article does not pretend to offer a definitive analysis of that situation but simply seeks to initiate a discussion by offering this case study.Consequently, the article is divided into various sections. The first is a description of the novel and location of the research, thereby indicating why the gardens were selected as a site for this research. Second, there is a review of the literature pertaining to visitor motivation and reaction tosites based on popular media representations. Third, the results of the research are presented, before finally a discussion of the implications of the research completes the article.Grand View Gardens and The Dream of the Red MansionThe Dream of the Red Mansion is one of the classic pieces of Chinese literature, and thus the destination has two facets to being a tourist attraction. First, it replicates the location of the story itself. Second, the destination was created, in Beijing, from 1984 to 1989 as a film location for a television series that, because of its historical antecedents as well as the epic style of the production, became very popular in China. However, unlike many Western film sets, the buildings not only sought to replicate the Qing Dynasty setting of the novel but also were built as permanent structures on a large scale. It covers 30 hectares (32.12 acres) and replicates in full size the palace, pavilions, and gardens of the period, as is illustrated in figures 1 and 2. It also appeals to tourists by being more than simply a replica of classical Chinese architecture by also maintaining a permanent exhibition of costumes and photographs of the film series and through hosting various events based on the story line, including “The Imperial Concubine Yuan Visits Home,” “A Grand View Garden Temple Fair,” and “The Grand View Garden Mid-Autumn Night.” In addition, as shown in figures 3 and 4, the gardens are used as a recreational resource by local people. In addition, visitors are offered anopportunity to be dressed in the clothes of the period, have photographs taken (figure 5), and be carried in a sedan chair. Visitors pay an entrance fee, but local people are able to buy an annual pass at a heavily discounted price, thereby permitting frequent access to the gardens. This is consistent with normal Chinese practice in Beijing as evidenced at other parks, for example Jingshang Park. Chinese parks are important social meeting places and are venues for dance, song, and games playing for their local communities. This study is of nonlocal visitors, but the local people are part of the experiential framework, and it can be argued that multiple gazes exist within the park where nonlocal visitors, especially non-Chinese, are themselves gazed on by the locals. For an analysis of this existence of multiple gazes, see Willemen (1995, p. 114) who notes, “Any articulation of images and looks which brings into play the position and activity of the viewer . . . also destabilises that position . . . the viewer [therefore] runs the risk of becoming the object of the look.”The novel, written by Cáo Xue˘qin, was written in the middle of the eighteenth century and is thought to be, at least in part, autobiographical (Hawkes 1973). Centered on two houses of the Jia Clan, it is an epic with more than 400 characters. Their stories are told over four volumes, 120 chapters, and 2,549 pages. On the face of it the story is about two great houses brought to ruin through a dictatorial whim, while within the sagathere lies a story of romance denied and decay and decline, as great as any found in Western literature. It is difficult to understate the importance of the novel. Minford (1986, p. 15) comments that “we witness death (sometimes brief and poignant, more often protracted and harrowing), ruin (nowhere in Chinese literature is there such a well inventoried chronicle of a family’s ‘confiscation’).” Throughout the story is the life of the major protagonist, Jia Bao-yu—the stone. And herein lies the complexity of the story, for this is no mere telling of a family’s fortune like John Gal sworthy’s Forsyte Saga, indicative though that novel is of the social mores of its time. The Dream of the Red Mansion is infused with Taoist and Buddhist thought and observation (Kao 1988). Hawkes (1973, p. 45) states that “Chinese devotees of the novel of ten continue to read and reread it throughout their lives and to discover more . . . each time they read it.” As the current authors have delved more into the surrounding literature and Buddhist readings, so too they have become more immersed in this world and the journey toward Jia Bao-yu’s enlightenment through his detachment from the world of the mansion, its girls, and the garden. For anyone wishing to understand Chinese culture, it is essential reading. For example, Ryan, Gu, and Zhang (2009) draw explicit attention to chapter 17 of the novel in seeking to explain the role of calligraphy in natural settings (and Chinese national parks) to demonstrate the harmony of man and natural places as found in Chineseclassical culture informed by Taoist, Buddhist, and Confucian thought. Visitors to Grand View Gardens are immersed in that tradition to a greater or lesser extent in addition to awareness of the actual text. Levy (1999, p.4) argues the book is “transforming” but also states there are as many interpretations as there are readers. Her analysis of the novel is based on themes of Buddhist thought, the examination of the social structures, the dysfunction of the Jia household through the abrogation of responsibilities by the male characters, the role of medicine (which is detailed in the novel), and the role of poetry (through which the land of illusion is a land of allusion and part of the puzzle referred to above). The novel is both complex and detailed in its observations of eighteenth-century life and Buddhist thought, and it is simply not possible to provide other than a fleeting glimpse of the novel in this article. The story commences with an introduction through a wandering Buddhist monk and a Taoist who, at the foot of Greensickness Peak, draw out a stone. These monks appear and reappear through the story. The romance is with Jia Bao-yu (the Stone), and there is conflict between Jade (Bao-Chai) and Flower (Dai Yu), and while Bao-yu loves Dai Y u, family requirements create a marriage with Bao-Chai, and finally he accepts his role as the eldest male, but the acceptance of those roles leads to detachment in the Buddhist sense, and eventually he wakens from illusion to seek enlightenment. This takes place against a background of familydecline and suicides. To add to the complexities there are different translations and spellings. C.-C. Wang (1958) translates the title as Dream of the Red Chamber and anglicizes the author’s name as Tsao Hsueh-Chin, while the characters are given English translations. Thus, Xinfeng is “Phoenix”—a name redolent with implications within Chinese culture—and is thus made more accessible to an English-speaking audience in this translation if they are aware of the connotations. Certainly, as any examination of Buddhist texts reveals, such as Nagarjuna’s Precious Garland of Advice, which dates from the second or third century, or Mills’s (1999) contemporary explanation of Buddhist life, Taoist and Buddhist thought are intimately concerned with the illusion of life. Hence, in the context of this research article, a place that replicates a novel and eighteenth-century palace yet has a contemporary presence in popular and classic fiction arguably is perhaps more nuanced for many Chinese visitors than might be the case of a film set for a Western counterpart such as the example of Coronation Street. For readers interested in an easily accessible analysis of the cultural connotations of names, Saussy’s (1987) essay “Reading and Folly in Dream of the Red Chamber” represents a learned and b rief introduction.The Relationship among Literature, Film, and TourismSince the pioneering work of Riley and Van Doren (1992), there is an emergent literature on the role of films in inducing tourists to visit agiven site, including, for example, the books by Beeton (2005) and Crouch, Jackson, and Thompson (2005). In addition, in 2008, La Trobe and Monash Universities hosted their third themed conference on tourism and media that included the impacts of novels, films, and filmmaking on destinations. Thus, in recent years there has been some progress since Beeton (2005, p. 17) wrote, “The study of filminduced tourism is complex. . . . Consequently, this is an untapped and little-understood field of tourism research.” In addition, within her text there are other references to the anecdotal nature of much of the evidence. For example, on page 112 she notes a “dearth of research and information on the topic,” referring to the impact of the Lord of the Rings trilogy on tourism in New Zealand, and again on page 105 she notes the poor quality of evidence relating to visitor reactions from visits to film locations. It can also be noted that in work related to cultural geographies there remains a silence on the topic. For example, Norton (2000, p. 298) refers to the fact that “cultural geographers are recognizing that powerful individuals and institutions, including the state, act as agents to shape the landscape, and landscapes are being read accordingly,” yet the index contains no references to film making even wh ile chapters exist on “popular culture.” Thus, Norton is largely able to discuss the creation of image with no reference to tourism, much less films. At least Valentine (2001, p. 259) makes reference to wilderness and adventure with reference to thecommodification of the New Zealand landscape, but Valentine refers more to photography than actual tourism promotions. In total, tourism in both Norton and Valentine are accorded but a passing mention of about half a dozen pages. If this relative silence is broadly true of the situation within the academic literature of the Western world, then it seems to be certainly true of any analysis of tourism destinations in China that are based on popular literature, film, and television productions—at least in the English academic literature.中文旅游,经典小说和电视节目:以曹雪芹的《红楼梦和大观园》为例克里斯瑞安摘要本文报道了中国经典小说《红楼梦》对吸引北京大观园游客的重要性的研究。
工程造价专业外文文献翻译(中英文对照
外文文献:Project Cost Control: The Way it WorksBy R. Max WidemanIn a recent consulting assignment we realized that there was some lack of understanding of the whole system of project cost control, how it is setup and applied. So we decided to write up a description of how it works. Project cost control is not that difficult to follow in theory.First you establish a set of reference baselines. Then, as work progresses, you monitor the work, analyze the findings, forecast the end results and compare those with the reference baselines. If the end results are not satisfactory then you make adjustments as necessary to the work in progress, and repeat the cycle at suitable intervals. If the end results get really out of line with the baseline plan, you may have to change the plan. More likely, there will be (or have been) scope changes that change the reference baselines which means that every time that happens you have to change the baseline plan anyway.But project cost control is a lot more difficult to do in practice, as is evidenced by the number of projects that fail to contain costs. It also involves a significant amount of work, as we shall see, and we might as well start at the beginning. So let us follow the thread of project cost control through the entire project life span.And, while we are at it, we will take the opportunity to point out the proper places for several significant documents. These include the Business Case, the Request for (a capital) Appropriation (for execution), Work Packages and the Work Breakdown Structure, the Project Charter (or Brief), the Project Budget or Cost Plan, Earned Value and the Cost Baseline. All of these contribute to the organization's ability to effectively control project costs.FootnoteI am indebted to my friend Quentin Fleming, the guru of Earned Value, for checking and correcting my work on this topic.The Business Case and Application for (execution) FundingIt is important to note that project cost control is most effective when the executive management responsible has a good understanding of how projects should unfold through the project life span. This means that they exercise their responsibilities at the key decision points between the major phases. They must also recognize the importance of project risk management for identifying and planning to head off at least the most obvious potential risk events.In the project's Concept Phase• Every project starts with someone identifying an opportunity or need. That is usually someone of importance or influence, if the project is to proceed, and that person often becomes the project's sponsor.• To determine the suitability of the potential project, most organizations call for the preparation of a "Business Case" and its "Order of Magnitude" cost to justify the value of the project so that itcan be compared with all the other competing projects. This effort is conducted in the Concept Phase of the project and is done as a part of the organization's management of the entire project portfolio.• The cost of the work of preparing the Business Case is usually covered by corporate management overhead, but it may be carried forward as an accounting cost to the eventual project. No doubt because this will provide a tax benefit to the organization. The problem is, how do you then account for all the projects that are not so carried forward?• If the Business case has sufficient merit, approval will be given to proceed to a Development and Definition phase.In the project's Development or Definition Phase• The objective of the Development Phase is to establish a good understanding of the work involved to produce the required product, estimate the cost and seek capital funding for the actual execution of the project.• In a formalized setting, especially where big projects are involved, this application for funding is often referred to as a Request for (a capital)Appropriation (RFA) or Capital Appropriation Request (CAR).•This requires the collection of more detailed requirements and data to establish what work needsto be done to produce the required product or "deliverable". From this information, a plan is prepared in sufficient detail to give adequate confidence in a dollar figure to be included in the request.• In a less formalized setting, everyone just tries to muddle through.Work Packages and the WBSThe Project Management Plan, Project Brief or Project Charter•If the deliverable consists of a number of different elements, these are identified and assembled into Work Packages (WPs) and presented in the form of a Work Breakdown Structure (WBS).• Each WP involves a set of activities, the "work" that is planned and scheduled as a part of the Project Management Plan. Note, however, that the planning will still be at a relatively high level,and more detailed planning will be necessary during execution if the project is given the go ahead.• This Project Management Plan, by the way, should become the "bible" for the execution phase of the project and is sometimes referred to as the "Project Brief" or the "Project Charter".• The cost of doing the various activities is then estimated and these estimated costs are aggregated to determine the estimated cost of the WP. This approach is known as "detailed estimating" or "bottom up estimating". There are other approaches to estimating that we'll come to in a minute. Either way, the result is an estimated cost of the total work of the project.Note: that project risk management planning is an important part of this exercise. This should examine the project's assumptions and environmental conditions to identify any weaknesses in the plan thus far, and identify those potential risk events that warrant attention for mitigation. This might take the form of specific contingency planning, and/or the setting aside of prudent funding reserves.Request for capitalConverting the estimate•However, an estimate of the work alone is not sufficient for a capital request. To arrive at a capital request some conversion is necessary, for example, by adding prudent allowances such asoverheads, a contingency allowance to cover normal project risks and management reserves to cover unknowns and possible scope changes.•In addition, it may be necessary to convert the estimating data into a financial accounting formatthat satisfies the corporate or sponsor's format for purposes of comparison with other projects and consequent funding approval.• In practice all the data for the type of "bottom up" approach just described may not be available.In this case alternative estimating approaches are adopted that provide various degrees of reliability in a "top down" fashion. For example:Order of Magnitude estimate – a "ball park" estimate, usually reserved for the concept phase onlyAnalogous estimate – an estimate based on previous similar projectsParametric estimate –an estimate based on statistical relationships in historical data•Whichever approach is adopted, hopefully the sum thus arrived at will be approved in full and proves to be satisfactory! This is the trigger to start the Execution Phase of the projectNote: Some managements will approve some lesser sum in the mistaken belief that this will help everyone to "sharpen their pencils" and "work smarter" for the benefit of the organization. This is a mistaken belief because management has failed to understand the nature of uncertainty and risk in project work. Consequently, the effect is more likely to result in "corner cutting" with an adverse effect on product quality, or reduced product scope or functionality. This often leads to a "game" in which estimates are inflated so that management can adjust themdownwards. But to be fair, management is also well aware that if money is over allocated, it will get spent anyway. The smart thing for managements to do is to set aside contingent reserve funds, varying with the riskiness of the project, and keep that money under careful control.Ownership of approved capital•If senior management approves the RFA as presented, the sum in question becomes the responsibility of the designated project sponsor. However, if the approved capital request includes allowances such as a "Management Reserve", this may or may not be passed on to the project's sponsor, depending on the policies of the organization.• For the approved RFA, the project sponsor will, in turn, further delegate expenditure authority to the project's project manager and will likely not include any of the allowances. An exception might be the contingency allowances to cover the normal variations in work performance.• The net sum thus arrived at constitutes the project manager's Approved Project Budget.Note: If management does not approve the RFA, you should not consider this a project failure. Either the goals, objectives, justification and planning need rethinking to increase the value of the project's deliverables, or senior management simply has higher priorities elsewhere for the available resources and funding.The Project's Execution PhaseThe project manager's Project Budget responsibility•Once this Approved Project Budget is released to the project manager, a reverse process must take place to convert it into a working control document. That is, the money available must be divided amongst the various WBS WPs that, by the way, have probably by now been upgraded! This results in a project execution Control Budget or Project Baseline Budget, or simply, the Project Budget. In some areas of project management application it is referred to as a Project Cost Plan. •On a large project where different corporate production divisions are involved, there may be a further intermediate step of creating "Control Accounts" for theseparate divisions, so that each division subdivides their allocated money into their own WBS WPs.• Observe that, since the total Project Budget received formal approval from Executive Management, you, as project manager, must likewise seek and obtain from Executive Management, via the project's sponsor, formal approval for any changes to the total project budget. Often this is only justified and accepted on the basis of a requested Product Scope Change.• In such a case the project's sponsor will either draw down on the management reserve in his or her possession, or submit a supplementary RFA to upper management. • Now that we have the Project Budget money allocated to Work Packages we can further distribute it amongst the various activities of each WP so that we know how much money we have as a "Baseline" cost for each activity.• This provides us with the base of reference for the cost control function. Of course, depending on the circumstances the same thing may be done at the WP level but the ability to control is then at a higher and coarser level.Use of the Earned Value technique• If we have the necessary details another control tool that we can adopt for monitoring ongoing work is the "Earned Value" (EV) technique. This is a considerable art and science that you must learn about from texts dedicated to the subject. • But essentially, you take the costs of the schedule activities and plot them as a cumulative total on the appropriate time base. Again you can do this at the activity level, WP level or the whole project level. The lower the level the more control information you have available but the more work you get involved in. The Cost Baseline•This planned reference S-curve is sometimes referred to as the "Cost Baseline", typically in EVparlance. That is, it is the "Budgeted Cost of Work Scheduled" (BCWS), or more simply the "Planned Value" (PV).•Observe that you need to modify this Cost Baseline every time there is an approved scope change that has cost and/or schedule implications and consequently changesthe project's Approved Project Budget.• Now, as the work progresses, you can plot the "Actual Cost of Work Performed" (ACWP or simply "Actual Cost" - AC).• You can plot other things as well, see diagram referred to above, and if you don't like what you see then you need to take "Corrective Action". CommentaryThis whole process is a cyclic, situational operation and is probably the source of the term "cycle" in the popularly misnamed "project life cycle".As an aside, the Earned Value pundits offer various other techniques within the EV process designed to aid in forecasting the final result, that is, the "Estimate At Completion" (EAC). EAC is what you should really be interested in because it is the only constant in a moving project. Therefore, these extended EV techniques must be considered in the same realm of accuracy as top-down estimating. They are useful, but only if you recognize the limitations and know what you are doing!But, as we said at the beginning, it is a lot more difficult to do in practice –and involves a significant amount of work. But, let's face it, that's what project managers are hired for, right?中文译文:项目成本控制:它的工作方式R.马克斯怀德曼我们在最近的咨询任务中意识到,对于整个项目成本控制体系是如何设置和应用的这个问题,我们仍有一些缺乏了解。
毕业设计外文翻译英文
Bid Compensation Decision Model for Projectswith Costly Bid PreparationS.Ping Ho,A.M.ASCE 1Abstract:For projects with high bid preparation cost,it is often suggested that the owner should consider paying bid compensation to the most highly ranked unsuccessful bidders to stimulate extra effort or inputs in bid preparation.Whereas the underlying idea of using bid compensation is intuitively sound,there is no theoretical basis or empirical evidence for such suggestion.Because costly bid preparation often implies a larger project scale,the issue of bid compensation strategy is important to practitioners and an interest of study.This paper aims to study the impacts of bid compensation and to develop appropriate bid compensation strategies.Game theory is applied to analyze the behavioral dynamics between competing bidders and project owners.A bid compensation model based on game theoretic analysis is developed in this study.The model provides equilibrium solutions under bid compensation,quantitative formula,and quali-tative implications for the formation of bid compensation strategies.DOI:10.1061/(ASCE )0733-9364(2005)131:2(151)CE Database subject headings:Bids;Project management;Contracts;Decision making;Design/build;Build/Operate/Transfer;Construction industry .IntroductionAn often seen suggestion in practice for projects with high bid preparation cost is that the owner should consider paying bid compensation,also called a stipend or honorarium,to the unsuc-cessful bidders.For example,according to the Design–build Manual of Practice Document Number 201by Design–Build In-stitute of America (DBIA )(1996a ),it is suggested that that “the owner should consider paying a stipend or honorarium to the unsuccessful proposers”because “excessive submittal require-ments without some compensation is abusive to the design–build industry and discourages quality teams from participating.”In another publication by DBIA (1995),it is also stated that “it is strongly recommended that honorariums be offered to the unsuc-cessful proposers”and that “the provision of reasonable compen-sation will encourage the more sought-after design–build teams to apply and,if short listed,to make an extra effort in the prepara-tion of their proposal.”Whereas bid preparation costs depend on project scale,delivery method,and other factors,the cost of pre-paring a proposal is often relatively high in some particular project delivery schemes,such as design–build or build–operate–transfer (BOT )contracting.Plus,costly bid preparation often im-plying a large project scale,the issue of bid compensation strat-egy should be important to practitioners and of great interest of study.Existing research on the procurement process in constructionhas addressed the selection of projects that are appropriate for certain project delivery methods (Molenaar and Songer 1998;Molenaar and Gransberg 2001),the design–build project procure-ment processes (Songer et al.1994;Gransberg and Senadheera 1999;Palaneeswaran and Kumaraswamy 2000),and the BOT project procurement process (United Nations Industrial Develop-ment Organization 1996).However,the bid compensation strat-egy for projects with a relatively high bid preparation cost has not been studied.Among the issues over the bidder’s response to the owner’s procurement or bid compensation strategy,it is in own-er’s interest to understand how the owner can stimulate high-quality inputs or extra effort from the bidder during bid prepara-tion.Whereas the argument for using bid compensation is intuitively sound,there is no theoretical basis or empirical evi-dence for such an argument.Therefore,it is crucial to study under what conditions the bid compensation is effective,and how much compensation is adequate with respect to different bidding situa-tions.This paper focuses on theoretically studying the impacts of bid compensation and tries to develop appropriate compensation strategies for projects with a costly bid preparation.Game theory will be applied to analyze the behavioral dynamics between com-peting bidders.Based on the game theoretic analysis and numeric trials,a bid compensation model is developed.The model pro-vides a quantitative framework,as well as qualitative implica-tions,on bid compensation strategies.Research Methodology:Game TheoryGame theory can be defined as “the study of mathematical models of conflict and cooperation between intelligent rational decision-makers”(Myerson 1991).Among economic theories,game theory has been successfully applied to many important issues such as negotiations,finance,and imperfect markets.Game theory has also been applied to construction management in two areas.Ho (2001)applied game theory to analyze the information asymme-try problem during the procurement of a BOT project and its1Assistant Professor,Dept.of Civil Engineering,National Taiwan Univ.,Taipei 10617,Taiwan.E-mail:spingho@.twNote.Discussion open until July 1,2005.Separate discussions must be submitted for individual papers.To extend the closing date by one month,a written request must be filed with the ASCE Managing Editor.The manuscript for this paper was submitted for review and possible publication on March 5,2003;approved on March 1,2004.This paper is part of the Journal of Construction Engineering and Management ,V ol.131,No.2,February 1,2005.©ASCE,ISSN 0733-9364/2005/2-151–159/$25.00.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .implication in project financing and government policy.Ho and Liu (2004)develop a game theoretic model for analyzing the behavioral dynamics of builders and owners in construction claims.In competitive bidding,the strategic interactions among competing bidders and that between bidders and owners are com-mon,and thus game theory is a natural tool to analyze the prob-lem of concern.A well-known example of a game is the “prisoner’s dilemma”shown in Fig.1.Two suspects are arrested and held in separate cells.If both of them confess,then they will be sentenced to jail for 6years.If neither confesses,each will be sentenced for only 1year.However,if one of them confesses and the other does not,then the honest one will be rewarded by being released (in jail for 0year )and the other will be punished for 9years in jail.Note that in each cell,the first number represents player No.1’s payoff and the second one represents player No.2’s.The prisoner’s dilemma is called a “static game,”in which they act simultaneously;i.e.,each player does not know the other player’s decision before the player makes the decision.If the payoff matrix shown in Fig.1is known to all players,then the payoff matrix is a “common knowledge”to all players and this game is called a game of “complete information.”Note that the players of a game are assumed to be rational;i.e.,to maximize their payoffs.To answer what each prisoner will play/behave in this game,we will introduce the concept of “Nash equilibrium ,”one of the most important concepts in game theory.Nash equilibrium is a set of actions that will be chosen by each player.In a Nash equilib-rium,each player’s strategy should be the best response to the other player’s strategy,and no player wants to deviate from the equilibrium solution.Thus,the equilibrium or solution is “strate-gically stable”or “self-enforcing”(Gibbons 1992).Conversely,a nonequilibrium solution is not stable since at least one of the players can be better off by deviating from the nonequilibrium solution.In the prisoner’s dilemma,only the (confess,confess )solution where both players choose to confess,satisfies the stabil-ity test or requirement of Nash equilibrium.Note that although the (not confess,not confess )solution seems better off for both players compared to Nash equilibrium;however,this solution is unstable since either player can obtain extra benefit by deviating from this solution.Interested readers can refer to Gibbons (1992),Fudenberg and Tirole (1992),and Myerson (1991).Bid Compensation ModelIn this section,the bid compensation model is developed on the basis of game theoretic analysis.The model could help the ownerform bid compensation strategies under various competition situ-ations and project characteristics.Illustrative examples with nu-merical results are given when necessary to show how the model can be used in various scenarios.Assumptions and Model SetupTo perform a game theoretic study,it is critical to make necessary simplifications so that one can focus on the issues of concern and obtain insightful results.Then,the setup of a model will follow.The assumptions made in this model are summarized as follows.Note that these assumptions can be relaxed in future studies for more general purposes.1.Average bidders:The bidders are equally good,in terms oftheir technical and managerial capabilities.Since the design–build and BOT focus on quality issues,the prequalification process imposed during procurement reduces the variation of the quality of bidders.As a result,it is not unreasonable to make the “average bidders”assumption.plete information:If all players consider each other tobe an average bidder as suggested in the first assumption,it is natural to assume that the payoffs of each player in each potential solution are known to all players.3.Bid compensation for the second best bidder:Since DBIA’s(1996b )manual,document number 103,suggests that “the stipend is paid only to the most highly ranked unsuccessful offerors to prevent proposals being submitted simply to ob-tain a stipend,”we shall assume that the bid compensation will be offered to the second best bidder.4.Two levels of efforts:It is assumed that there are two levelsof efforts in preparing a proposal,high and average,denoted by H and A ,respectively.The effort A is defined as the level of effort that does not incur extra cost to improve quality.Contrarily,the effort H is defined as the level of effort that will incur extra cost,denoted as E ,to improve the quality of a proposal,where the improvement is detectable by an effec-tive proposal evaluation system.Typically,the standard of quality would be transformed to the evaluation criteria and their respective weights specified in the Request for Pro-posal.5.Fixed amount of bid compensation,S :The fixed amount canbe expressed by a certain percentage of the average profit,denoted as P ,assumed during the procurement by an average bidder.6.Absorption of extra cost,E :For convenience,it is assumedthat E will not be included in the bid price so that the high effort bidder will win the contract under the price–quality competition,such as best-value approach.This assumption simplifies the tradeoff between quality improvement and bid price increase.Two-Bidder GameIn this game,there are only two qualified bidders.The possible payoffs for each bidder in the game are shown in a normal form in Fig.2.If both bidders choose “H ,”denoted by ͑H ,H ͒,both bidders will have a 50%probability of wining the contract,and at the same time,have another 50%probability of losing the con-tract but being rewarded with the bid compensation,S .As a re-sult,the expected payoffs for the bidders in ͑H ,H ͒solution are ͑S /2+P /2−E ,S /2+P /2−E ͒.Note that the computation of the expected payoff is based on the assumption of the average bidder.Similarly,if the bidders choose ͑A ,A ͒,the expected payoffswillFig.1.Prisoner’s dilemmaD o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .be ͑S /2+P /2,S /2+P /2͒.If the bidders choose ͑H ,A ͒,bidder No.1will have a 100%probability of winning the contract,and thus the expected payoffs are ͑P −E ,S ͒.Similarly,if the bidders choose ͑A ,H ͒,the expected payoffs will be ͑S ,P −E ͒.Payoffs of an n -bidder game can be obtained by the same reasoning.Nash EquilibriumSince the payoffs in each equilibrium are expressed as functions of S ,P ,and E ,instead of a particular number,the model will focus on the conditions for each possible Nash equilibrium of the game.Here,the approach to solving for Nash equilibrium is to find conditions that ensure the stability or self-enforcing require-ment of Nash equilibrium.This technique will be applied throughout this paper.First,check the payoffs of ͑H ,H ͒solution.For bidder No.1or 2not to deviate from this solution,we must haveS /2+P /2−E ϾS →S ϽP −2E͑1͒Therefore,condition (1)guarantees ͑H ,H ͒to be a Nash equilib-rium.Second,check the payoffs of ͑A ,A ͒solution.For bidder No.1or 2not to deviate from ͑A ,A ͒,condition (2)must be satisfiedS /2+P /2ϾP −E →S ϾP −2E͑2͒Thus,condition (2)guarantees ͑A ,A ͒to be a Nash equilibrium.Note that the condition “S =P −2E ”will be ignored since the con-dition can become (1)or (2)by adding or subtracting an infinitely small positive number.Thus,since S must satisfy either condition (1)or condition (2),either ͑H ,H ͒or ͑A ,A ͒must be a unique Nash equilibrium.Third,check the payoffs of ͑H ,A ͒solution.For bid-der No.1not to deviate from H to A ,we must have P −E ϾS /2+P /2;i.e.,S ϽP −2E .For bidder No.2not to deviate from A to H ,we must have S ϾS /2+P /2−E ;i.e.,S ϾP −2E .Since S cannot be greater than and less than P −2E at the same time,͑H ,A ͒solution cannot exist.Similarly,͑A ,H ͒solution cannot exist either.This also confirms the previous conclusion that either ͑H ,H ͒or ͑A ,A ͒must be a unique Nash equilibrium.Impacts of Bid CompensationBid compensation is designed to serve as an incentive to induce bidders to make high effort.Therefore,the concerns of bid com-pensation strategy should focus on whether S can induce high effort and how effective it is.According to the equilibrium solu-tions,the bid compensation decision should depend on the mag-nitude of P −2E or the relative magnitude of E compared to P .If E is relatively small such that P Ͼ2E ,then P −2E will be positive and condition (1)will be satisfied even when S =0.This means that bid compensation is not an incentive for high effort when the extra cost of high effort is relatively low.Moreover,surprisingly,S can be damaging when S is high enough such that S ϾP −2E .On the other hand,if E is relatively large so that P −2E is negative,then condition (2)will always be satisfied since S can-not be negative.In this case,͑A ,A ͒will be a unique Nash equi-librium.In other words,when E is relatively large,it is not in the bidder’s interest to incur extra cost for improving the quality of proposal,and therefore,S cannot provide any incentives for high effort.To summarize,when E is relatively low,it is in the bidder’s interest to make high effort even if there is no bid compensation.When E is relatively high,the bidder will be better off by making average effort.In other words,bid compensation cannot promote extra effort in a two-bidder game,and ironically,bid compensa-tion may discourage high effort if the compensation is too much.Thus,in the two-bidder procurement,the owner should not use bid compensation as an incentive to induce high effort.Three-Bidder GameNash EquilibriumFig.3shows all the combinations of actions and their respective payoffs in a three-bidder game.Similar to the two-bidder game,here the Nash equilibrium can be solved by ensuring the stability of the solution.For equilibrium ͑H ,H ,H ͒,condition (3)must be satisfied for stability requirementS /3+P /3−E Ͼ0→S Ͼ3E −P͑3͒For equilibrium ͑A ,A ,A ͒,condition (4)must be satisfied so that no one has any incentives to choose HS /3+P /3ϾP −E →S Ͼ2P −3E͑4͒In a three-bidder game,it is possible that S will satisfy conditions (3)and (4)at the same time.This is different from the two-bidder game,where S can only satisfy either condition (1)or (2).Thus,there will be two pure strategy Nash equilibria when S satisfies conditions (3)and (4).However,since the payoff of ͑A ,A ,A ͒,S /3+P /3,is greater than the payoff of ͑H ,H ,H ͒,S /3+P /3−E ,for all bidders,the bidder will choose ͑A ,A ,A ͒eventually,pro-vided that a consensus between bidders of making effort A can be reached.The process of reaching such consensus is called “cheap talk,”where the agreement is beneficial to all players,and no player will want to deviate from such an agreement.In the design–build or BOT procurement,it is reasonable to believe that cheap talk can occur.Therefore,as long as condition (4)is satis-fied,͑A ,A ,A ͒will be a unique Nash equilibrium.An important implication is that the cheap talk condition must not be satisfied for any equilibrium solution other than ͑A ,A ,A ͒.In other words,condition (5)must be satisfied for all equilibrium solution except ͑A ,A ,A͒Fig.2.Two-biddergameFig.3.Three-bidder gameD o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .S Ͻ2P −3E ͑5͒Following this result,for ͑H ,H ,H ͒to be unique,conditions (3)and (5)must be satisfied;i.e.,we must have3E −P ϽS Ͻ2P −3E͑6͒Note that by definition S is a non-negative number;thus,if one cannot find a non-negative number to satisfy the equilibrium con-dition,then the respective equilibrium does not exist and the equi-librium condition will be marked as “N/A”in the illustrative fig-ures and tables.Next,check the solution where two bidders make high efforts and one bidder makes average effort,e.g.,͑H ,H ,A ͒.The ex-pected payoffs for ͑H ,H ,A ͒are ͑S /2+P /2−E ,S /2+P /2−E ,0͒.For ͑H ,H ,A ͒to be a Nash equilibrium,S /3+P /3−E Ͻ0must be satisfied so that the bidder with average effort will not deviate from A to H ,S /2+P /2−E ϾS /2must be satisfied so that the bidder with high effort will not deviate from H to A ,and condi-tion (5)must be satisfied as argued previously.The three condi-tions can be rewritten asS Ͻmin ͓3E −P ,2P −3E ͔andP −2E Ͼ0͑7͒Note that because of the average bidder assumption,if ͑H ,H ,A ͒is a Nash equilibrium,then ͑H ,A ,H ͒and ͑A ,H ,H ͒will also be the Nash equilibria.The three Nash equilibria will constitute a so-called mixed strategy Nash equilibrium,denoted by 2H +1A ,where each bidder randomizes actions between H and A with certain probabilities.The concept of mixed strategy Nash equilib-rium shall be explained in more detail in next section.Similarly,we can obtain the requirements for solution 1H +2A ,condition (5)and S /2+P /2−E ϽS /2must be satisfied.The requirements can be reorganized asS Ͻ2P −3EandP −2E Ͻ0͑8͒Note that the conflicting relationship between “P −2E Ͼ0”in condition (7)and “P −2E Ͻ0”in condition (8)seems to show that the two types of Nash equilibria are exclusive.Nevertheless,the only difference between 2H +1A and 1H +2A is that the bidder in 2H +1A equilibrium has a higher probability of playing H ,whereas the bidder in 1H +2A also mixes actions H and A but with lower probability of playing H .From this perspective,the difference between 2H +1A and 1H +2A is not very distinctive.In other words,one should not consider,for example,2H +1A ,to be two bidders playing H and one bidder playing A ;instead,one should consider each bidder to be playing H with higher probabil-ity.Similarly,1H +2A means that the bidder has a lower probabil-ity of playing H ,compared to 2H +1A .Illustrative Example:Effectiveness of Bid Compensation The equilibrium conditions for a three-bidder game is numerically illustrated and shown in Table 1,where P is arbitrarily assumed as 10%for numerical computation purposes and E varies to rep-resent different costs for higher efforts.The “*”in Table 1indi-cates that the zero compensation is the best strategy;i.e.,bid compensation is ineffective in terms of stimulating extra effort.According to the numerical results,Table 1shows that bid com-pensation can promote higher effort only when E is within the range of P /3ϽE ϽP /2,where zero compensation is not neces-sarily the best strategy.The question is that whether it is benefi-cial to the owner by incurring the cost of bid compensation when P /3ϽE ϽP /2.The answer to this question lies in the concept and definition of the mix strategy Nash equilibrium,2H +1A ,as explained previously.Since 2H +1A indicates that each bidderwill play H with significantly higher probability,2H +1A may already be good enough,knowing that we only need one bidder out of three to actually play H .We shall elaborate on this concept later in a more general setting.As a result,if the 2H +1A equilib-rium is good enough,the use of bid compensation in a three-bidder game will not be recommended.Four-Bidder Game and n-Bidder GameNash Equilibrium of Four-Bidder GameThe equilibrium of the four-bidder procurement can also be ob-tained.As the number of bidders increases,the number of poten-tial equilibria increases as well.Due to the length limitation,we shall only show the major equilibria and their conditions,which are derived following the same technique applied previously.The condition for pure strategy equilibrium 4H ,is4E −P ϽS Ͻ3P −4E͑9͒The condition for another pure strategy equilibrium,4A ,isS Ͼ3P −4E͑10͒Other potential equilibria are mainly mixed strategies,such as 3H +1A ,2H +2A ,and 1H +3A ,where the numeric number asso-ciated with H or A represents the number of bidders with effort H or A in a equilibrium.The condition for the 3H +1A equilibrium is3E −P ϽS Ͻmin ͓4E −P ,3P −4E ͔͑11͒For the 2H +2A equilibrium the condition is6E −3P ϽS Ͻmin ͓3E −P ,3P −4E ͔͑12͒The condition for the 1H +3A equilibrium isS Ͻmin ͓6E −3P ,3P −4E ͔͑13͒Illustrative Example of Four-Bidder GameTable 2numerically illustrates the impacts of bid compensation on the four-bidder procurement under different relative magni-tudes of E .When E is very small,bid compensation is not needed for promoting effort H .However,when E grows gradually,bid compensation becomes more effective.As E grows to a larger magnitude,greater than P /2,the 4H equilibrium would become impossible,no matter how large S is.In fact,if S is too large,bidders will be encouraged to take effort A .When E is extremely large,e.g.,E Ͼ0.6P ,the best strategy is to set S =0.The “*”in Table 2also indicates the cases that bid compensation is ineffec-Table pensation Impacts on a Three-Bidder GameEquilibriumE ;P =10%3H 2H +1A 1H +2A 3A E ϽP /3e.g.,E =2%S Ͻ14%*N/A N/N 14%ϽS P /3ϽE ϽP /2e.g.,E =4%2%ϽS Ͻ8%S Ͻ2%N/A 8%ϽS P /2ϽE Ͻ͑2/3͒P e.g.,E =5.5%N/AN/AS Ͻ3.5%*3.5%ϽS͑2/3͒P ϽEe.g.,E =7%N/A N/A N/A Always*Note:*denotes that zero compensation is the best strategy;and N/A =the respective equilibrium does not exist.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .tive.To conclude,in a four-bidder procurement,bid compensation is not effective when E is relatively small or large.Again,similar to the three-bidder game,when bid compensation becomes more effective,it does not mean that offering bid compensation is the best strategy,since more variables need to be considered.Further analysis shall be performed later.Nash Equilibrium of n -Bidder GameIt is desirable to generalize our model to the n -bidder game,al-though only very limited qualified bidders will be involved in most design–build or BOT procurements,since for other project delivery methods it is possible to have many bidders.Interested readers can follow the numerical illustrations for three-and four-bidder games to obtain the numerical solutions of n -bidder game.Here,only analytical equilibrium solutions will be solved.For “nA ”to be the Nash equilibrium,we must have P −E ϽS /n +P /n for bidder A not to deviate.In other words,condition (14)must be satisfiedS Ͼ͑n −1͒P −nE͑14͒Note that condition (14)can be rewritten as S Ͼn ͑P −E ͒−P ,which implies that it is not likely for nA to be the Nash equilib-rium when there are many bidders,unless E is very close to or larger than P .Similar to previous analysis,for “nH ”to be the equilibrium,we must have S /n +P /n −E Ͼ0for stability requirement,and condition (15)for excluding the possibility of cheap talk or nA equilibrium.The condition for the nH equilibrium can be reorga-nized as condition (16).S Ͻ͑n −1͒P −nE ͑15͒nE −P ϽS Ͻ͑n −1͒P −nE͑16͒Note that if E ϽP /n ,condition (16)will always be satisfied and nH will be a unique equilibrium even when S =0.In other words,nH will not be the Nash equilibrium when there are many bidders,unless E is extremely small,i.e.,E ϽP /n .For “aH +͑n −a ͒A ,where 2Ͻa Ͻn ”to be the equilibrium so-lution,we must have S /a +P /a −E Ͼ0for bidder H not to devi-ate,S /͑a +1͒+P /͑a +1͒−E Ͻ0for bidder A not to deviate,and condition (15).These requirements can be rewritten asaE −P ϽS Ͻmin ͓͑a +1͒E −P ,͑n −1͒P −nE ͔͑17͒Similarly,for “2H +͑n −2͒A ,”the stability requirements for bidder H and A are S /͑n −1͒ϽS /2+P /2−E and S /3+P /3−E Ͻ0,re-spectively,and thus the equilibrium condition can be written as ͓͑n −1͒/͑n −3͔͒͑2E −P ͒ϽS Ͻmin ͓3E −P ,͑n −1͒P −nE ͔͑18͒For the “1H +͑n −1͒A ”equilibrium,we must haveS Ͻmin ͕͓͑n −1͒/͑n −3͔͒͑2E −P ͒,͑n −1͒P −nE ͖͑19͒An interesting question is:“What conditions would warrant that the only possible equilibrium of the game is either “1H +͑n −1͒A ”or nA ,no matter how large S is?”A logical response to the question is:when equilibria “aH +͑n −a ͒A ,where a Ͼ2”and equilibrium 2H +͑n −2͒A are not possible solutions.Thus,a suf-ficient condition here is that for any S Ͼ͓͑n −1͒/͑n −3͔͒͑2E −P ͒,the “S Ͻ͑n −1͒P −nE ”is not satisfied.This can be guaranteed if we have͑n −1͒P −nE Ͻ͓͑n −1͒/͑n −3͔͒͑2E −P ͒→E Ͼ͓͑n −1͒/͑n +1͔͒P͑20͒Conditions (19)and (20)show that when E is greater than ͓͑n −1͒/͑n +1͔͒P ,the only possible equilibrium of the game is either 1H +͑n −1͒A or nA ,no matter how large S is.Two important practical implications can be drawn from this finding.First,when n is small in a design–build contract,it is not unusual that E will be greater than ͓͑n −1͒/͑n +1͔͒P ,and in that case,bid compensa-tion cannot help to promote higher effort.For example,for a three-bidder procurement,bid compensation will not be effective when E is greater than ͑2/4͒P .Second,when the number of bidders increases,bid compensation will become more effective since it will be more unlikely that E is greater than ͓͑n −1͒/͑n +1͔͒P .The two implications confirm the previous analyses of two-,three-,and four-bidder game.After the game equilibria and the effective range of bid compensation have been solved,the next important task is to develop the bid compensation strategy with respect to various procurement situations.Table pensation Impacts on a Four-Bidder GameEquilibriumE ;P =10%4H 3H +1A 2H +2A 1H +3A 4A E ϽP /4e.g.,E =2%S Ͻ22%*N/A N/A N/A S Ͼ22%P /4ϽE ϽP /3e.g.,E =3%2%ϽS Ͻ18%S Ͻ2%N/A N/A S Ͼ18%P /3ϽE ϽP /2e.g.,E =4%6%ϽS Ͻ14%2%ϽS Ͻ6%S Ͻ2%N/A S Ͼ14%P /2ϽE Ͻ͑3/5͒P e.g.,E =5.5%N/A 6.5%ϽS Ͻ8%3%ϽS Ͻ6.5%S Ͻ3%S Ͼ8%͑3/5͒P ϽE Ͻ͑3/4͒P e.g.,E =6.5%N/AN/AN/AS Ͻ4%*S Ͼ4%͑3/4͒P ϽEe.g.,E =8%N/A N/A N/A N/AAlways*Note:*denotes that zero compensation is the best strategy;and N/A=respective equilibrium does not exist.D o w n l o a d e d f r o m a s c e l i b r a r y .o r g b y N A N J I N G U N I VE R S I T Y OF o n 01/06/14. C o p y r i g h t A S C E . F o r p e r s o n a l u s e o n l y ; a l l r i g h t s r e s e r v e d .。
外文翻译—电力电子技术(英文+译文)
1 Power Electronic ConceptsPower electronics is a rapidly developing technology. Components are tting higher current and voltage ratings, the power losses decrease and the devices become more reliable. The devices are also very easy tocontrol with a mega scale power amplification. The prices are still going down pr. kVA and power converters are becoming attractive as a mean to improve the performance of a wind turbine. This chapter will discuss the standard power converter topologies from the simplest converters for starting up the turbine to advanced power converter topologies, where the whole power is flowing through the converter. Further, different park solutions using power electronics arealso discussed.1.1 Criteria for concept evaluationThe most common topologies are selected and discussed in respect to advantages and drawbacks. Very advanced power converters, where many extra devices are necessary in order to get a proper operation, are omitted.1.2 Power convertersMany different power converters can be used in wind turbine applications. In the case of using an induction generator, the power converter has to convert from a fixed voltage and frequency to a variable voltage and frequency. This may be implemented in many different ways, as it will be seen in the next section. Other generator types can demand other complex protection. However, the most used topology so far is a soft-starter, which is used during start up in order to limit the in-rush current and thereby reduce the disturbances to the grid.1.2.1 Soft starterThe soft starter is a power converter, which has been introduced to fixedspeed wind turbines to reduce the transient current during connection or disconnection of the generator to the grid. When the generator speed exceeds the synchronous speed, the soft-starter is connected. Using firing angle control of the thyristors in the soft starter the generator is smoothly connected to the grid over a predefined number of grid periods. An example of connection diagram for the softstarter with a generator is presented in Figure1.Figure 1. Connection diagram of soft starter with generators.The commutating devices are two thyristors for each phase. These are connected in anti-parallel. The relationship between the firing angle (﹤) and the resulting amplification of the soft starter is non-linear and depends additionally on the power factor of the connected element. In the case of a resistive load, may vary between 0 (full on) and 90 (full off) degrees, in the case of a purely inductive load between 90 (full on) and 180 (full off) degrees. For any power factor between 0 and 90 degrees, w ill be somewhere between the limits sketched in Figure 2.Figure 2. Control characteristic for a fully controlled soft starter.When the generator is completely connected to the grid a contactor (Kbyp) bypass the soft-starter in order to reduce the losses during normal operation. The soft-starter is very cheap and it is a standard converter in many wind turbines.1.2.2 Capacitor bankFor the power factor compensation of the reactive power in the generator, AC capacitor banks are used, as shown in Figure 3. The generators are normally compensated into whole power range. The switching of capacitors is done as a function of the average value of measured reactive power during a certain period.Figure 3. Capacitor bank configuration for power factor compensation ina wind turbine.The capacitor banks are usually mounted in the bottom of the tower or in thenacelle. In order to reduce the current at connection/disconnection of capacitors a coil (L) can be connected in series. The capacitors may be heavy loaded and damaged in the case of over-voltages to the grid and thereby they may increase the maintenance cost.1.2.3 Diode rectifierThe diode rectifier is the most common used topology in power electronic applications. For a three-phase system it consists of six diodes. It is shown in Figure 4.Figure 4. Diode rectifier for three-phase ac/dc conversionThe diode rectifier can only be used in one quadrant, it is simple and it is notpossible to control it. It could be used in some applications with a dc-bus.1.2.4 The back-to-back PWM-VSIThe back-to-back PWM-VSI is a bi-directional power converter consisting of two conventional PWM-VSI. The topology is shown in Figure 5.To achieve full control of the grid current, the DC-link voltage must be boosted to a level higher than the amplitude of the grid line-line voltage. The power flow of the grid side converter is controlled in orderto keep the DC-link voltage constant, while the control of the generator side is set to suit the magnetization demand and the reference speed. The control of the back-to-back PWM-VSI in the wind turbine application is described in several papers (Bogalecka, 1993), (Knowles-Spittle et al., 1998), (Pena et al., 1996), (Yifan & Longya, 1992), (Yifan & Longya, 1995).Figure 5. The back-to-back PWM-VSI converter topology.1.2.4.1 Advantages related to the use of the back-to-back PWM-VSIThe PWM-VSI is the most frequently used three-phase frequency converter. As a consequence of this, the knowledge available in the field is extensive and well established. The literature and the available documentation exceed that for any of the other converters considered in this survey. Furthermore, many manufacturers produce components especially designed for use in this type of converter (e.g., a transistor-pack comprising six bridge coupled transistors and anti paralleled diodes). Due to this, the component costs can be low compared to converters requiring components designed for a niche production.A technical advantage of the PWM-VSI is the capacitor decoupling between the grid inverter and the generator inverter. Besides affording some protection, this decoupling offers separate control of the two inverters, allowing compensation of asymmetry both on the generator side and on the grid side, independently.The inclusion of a boost inductance in the DC-link circuit increases the component count, but a positive effect is that the boost inductance reduces the demands on the performance of the grid side harmonic filter, and offers some protection of the converter against abnormal conditions on the grid.1.2.4.2 Disadvantages of applying the back-to-back PWM-VSIThis section highlights some of the reported disadvantages of the back-to-back PWM-VSI which justify the search for a more suitable alternative converter:In several papers concerning adjustable speed drives, the presence of the DC link capacitor is mentioned as a drawback, since it is heavy and bulky, it increases the costs and maybe of most importance, - it reduces the overall lifetime of the system. (Wen-Song & Ying-Yu, 1998); (Kim & Sul, 1993); (Siyoung Kim et al., 1998).Another important drawback of the back-to-back PWM-VSI is the switching losses. Every commutation in both the grid inverter and the generator inverter between the upper and lower DC-link branch is associated with a hard switching and a natural commutation. Since the back-to-back PWM-VSI consists of two inverters, the switching losses might be even more pronounced. The high switching speed to the grid may also require extra EMI-filters.To prevent high stresses on the generator insulation and to avoid bearing current problems (Salo & Tuusa, 1999), the voltage gradient may have to be limited by applying an output filter.1.2.5 Tandem converterThe tandem converter is quite a new topology and a few papers only have treated it up till now ((Marques & Verdelho, 1998); (Trzynadlowski et al., 1998a); (Trzynadlowski et al., 1998b)). However, the idea behind the converter is similar to those presented in ((Zhang et al., 1998b)), where the PWM-VSI is used as an active harmonic filter to compensate harmonic distortion. The topology of the tandem converter is shown inFigure 6.Figure 6. The tandem converter topology used in an induction generator wind turbine system.The tandem converter consists of a current source converter, CSC, in thefollowing designated the primary converter, and a back-to-back PWM-VSI, designated the secondary converter. Since the tandem converter consists of four controllable inverters, several degrees of freedom exist which enable sinusoidal input and sinusoidal output currents. However, in this context it is believed that the most advantageous control of the inverters is to control the primary converter to operate in square-wave current mode. Here, the switches in the CSC are turned on and off only once per fundamental period of the input- and output current respectively. In square wave current mode, the switches in the primary converter may either be GTO.s, or a series connection of an IGBT and a diode.Unlike the primary converter, the secondary converter has to operateat a high switching frequency, but the switched current is only a small fraction of the total load current. Figure 7 illustrates the current waveform for the primary converter, the secondary converter, is, and the total load current il.In order to achieve full control of the current to/from the back-to-back PWMVSI, the DC-link voltage is boosted to a level above the grid voltage. As mentioned, the control of the tandem converter is treated in only a few papers. However, the independent control of the CSC and the back-to-back PWM-VSI are both well established, (Mutschler & Meinhardt, 1998); (Nikolic & Jeftenic, 1998); (Salo & Tuusa, 1997); (Salo & Tuusa, 1999).Figure 7. Current waveform for the primary converter, ip, the secondary converter, is, and the total load current il.1.2.5.1Advantages in the use of the Tandem ConverterThe investigation of new converter topologies is commonly justifiedby thesearch for higher converter efficiency. Advantages of the tandem converter are the low switching frequency of the primary converter, and the low level of the switched current in the secondary converter. It is stated that the switching losses of a tandem inverter may be reduced by 70%, (Trzynadlowski et al., 1998a) in comparison with those of an equivalent VSI, and even though the conduction losses are higher for the tandem converter, the overall converter efficiency may be increased.Compared to the CSI, the voltage across the terminals of the tandem converter contains no voltage spikes since the DC-link capacitor of the secondary converter is always connected between each pair of input- and output lines (Trzynadlowski et al., 1998b).Concerning the dynamic properties, (Trzynadlowski et al., 1998a) states that the overall performance of the tandem converter is superior to both the CSC and the VSI. This is because current magnitude commands are handled by the voltage source converter, while phase-shift current commands are handled by the current source converter (Zhang et al., 1998b).Besides the main function, which is to compensate the current distortion introduced by the primary converter, the secondary converter may also act like an active resistor, providing damping of the primary inverter in light load conditions (Zhang et al., 1998b).1.2.5.2 Disadvantages of using the Tandem ConverterAn inherent obstacle to applying the tandem converter is the high number of components and sensors required. This increases the costs and complexity of both hardware and software. The complexity is justified by the redundancy of the system (Trzynadlowski et al., 1998a), however the system is only truly redundant if a reduction in power capability and performance is acceptable.Since the voltage across the generator terminals is set by the secondary inverter, the voltage stresses at the converter are high.Therefore the demands on the output filter are comparable to those when applying the back-to-back PWM-VSI.In the system shown in Figure 38, a problem for the tandem converter in comparison with the back-to-back PWM-VSI is the reduced generator voltage. By applying the CSI as the primary converter, only 0.866% of the grid voltage can be utilized. This means that the generator currents (and also the current through the switches) for the tandem converter must be higher in order to achieve the same power.1.2.6 Matrix converterIdeally, the matrix converter should be an all silicon solution with no passive components in the power circuit. The ideal conventional matrix converter topology is shown in Figure 8.Figure 8. The conventional matrix converter topology.The basic idea of the matrix converter is that a desired input current (to/from the supply), a desired output voltage and a desired output frequency may be obtained by properly connecting the output terminals of the converter to the input terminals of the converter. In order to protect the converter, the following two control rules must be complied with: Two (or three) switches in an output leg are never allowed to be on at the same time. All of the three output phases must be connected to an input phase at any instant of time. The actual combination of the switchesdepends on the modulation strategy.1.2.6.1 Advantages of using the Matrix ConverterThis section summarises some of the advantages of using the matrix converter in the control of an induction wind turbine generator. For a low output frequency of the converter the thermal stresses of the semiconductors in a conventional inverter are higher than those in a matrix converter. This arises from the fact that the semiconductors in a matrix converter are equally stressed, at least during every period of the grid voltage, while the period for the conventional inverter equals the output frequency. This reduces thethermal design problems for the matrix converter.Although the matrix converter includes six additional power switches compared to the back-to-back PWM-VSI, the absence of the DC-link capacitor may increase the efficiency and the lifetime for the converter (Schuster, 1998). Depending on the realization of the bi-directional switches, the switching losses of the matrix inverter may be less than those of the PWM-VSI, because the half of the switchings become natural commutations (soft switchings) (Wheeler & Grant, 1993).1.2.6.2 Disadvantages and problems of the matrix converterA disadvantage of the matrix converter is the intrinsic limitation of the output voltage. Without entering the over-modulation range, the maximum output voltage of the matrix converter is 0.866 times the input voltage. To achieve the same output power as the back-to-back PWM-VSI, the output current of the matrix converter has to be 1.15 times higher, giving rise to higher conducting losses in the converter (Wheeler & Grant, 1993).In many of the papers concerning the matrix converter, the unavailability of a true bi-directional switch is mentioned as one of the major obstacles for the propagation of the matrix converter. In the literature, three proposals for realizing a bi-directional switch exists. The diode embedded switch (Neft & Schauder, 1988) which acts like a truebi-directional switch, the common emitter switch and the common collector switch (Beasant et al., 1989).Since real switches do not have infinitesimal switching times (which is not desirable either) the commutation between two input phases constitutes a contradiction between the two basic control rules of the matrix converter. In the literature at least six different commutation strategies are reported, (Beasant et al., 1990); (Burany, 1989); (Jung & Gyu, 1991); (Hey et al., 1995); (Kwon et al., 1998); (Neft & Schauder, 1988). The most simple of the commutation strategies are those reported in (Beasant et al., 1990) and (Neft & Schauder, 1988), but neither of these strategies complies with the basic control rules.译文1 电力电子技术的内容电力电子技术是一门正在快速发展的技术,电力电子元器件有很高的额定电流和额定电压,它的功率减小元件变得更加可靠、耐用.这种元件还可以用来控制比它功率大很多倍的元件。
外文翻译及外文原文(参考格式)
外文翻译要求:1、外文资料与毕业设计(论文)选题密切相关,译文准确、质量好。
2、阅读2篇幅以上(10000字符左右)的外文资料,完成2篇不同文章的共2000汉字以上的英译汉翻译3、外文资料可以由指导教师提供,外文资料原则上应是外国作者。
严禁采用专业外语教材文章。
4、排序:“一篇中文译文、一篇外文原文、一篇中文译文、一篇外文原文”。
插图内文字及图名也译成中文。
5、标题与译文格式(字体、字号、行距、页边距等)与论文格式要求相同。
下页附:外文翻译与原文参考格式英文翻译 (黑体、四号、顶格)外文原文出处:(译文前列出外文原文出处、作者、国籍,译文后附上外文原文)《ASHRAE Handbook —Refrigeration 》.CHAPTER3 .SYSTEM Practices for ammonia 3.1 System Selection 3.2 Equipment3.10 Reciprocating Compressors第3章 氨制冷系统的实施3.1 系统选择在选择一个氨制冷系统设计时,须要考虑一些设计决策要素,包括是否采用(1)单级压缩(2)带经济器的压缩(3)多级压缩(4)直接蒸发(5)满液式(6)液体再循环(7)载冷剂。
单级压缩系统基本的单级压缩系统由蒸发器、压缩机、冷凝器、储液器(假如用的话)和制冷剂控制装置(膨胀阀、浮球阀等)。
1997 ASHRAE 手册——“原理篇”中的第一章讨论了压缩制冷循环。
图1.壳管式经济器的布置外文翻译的标题与译文中的字体、字号、行距、页边距等与论文格式相同。
英文原文(黑体、四号、顶格)英文翻译2(黑体,四号,顶格)外文原文出处:(黑体,四号,顶格)P. Fanning. Nonlinear Models of Reinforced and Post-tensioned Concrete Beams. Lecturer, Department of Civil Engineering, University College Dublin. Received 16 Jul 2001.非线形模型钢筋和后张法预应力混凝土梁摘要:商业有限元软件一般包括混凝土在荷载做用下非线性反应的专用数值模型。
道路路桥工程中英文对照外文翻译文献
道路路桥工程中英文对照外文翻译文献中英文资料中英文资料外文翻译(文档含英文原文和中文翻译)原文:Asphalt Mixtures-Applications。
Theory and Principles1.ApplicationsXXX is the most common of its applications。
however。
and the onethat will be XXX.XXX “flexible” is used to distinguish these pavements from those made with Portland cement,which are classified as rigid pavements。
that is。
XXX it provides they key to the design approach which must be used XXX.XXX XXX down into high and low types,the type usually XXX product is used。
The low typesof pavement are made with the cutback。
or emulsion。
XXX type may have several names。
However。
XXX is similar for most low-type pavements and XXX mix。
forming the pavement.The high type of asphalt XXX中英文资料XXX grade.中英文资料Fig.·1 A modern XXX.Fig.·2 Asphalt con crete at the San Francisco XXX.They are used when high wheel loads and high volumes of traffic occur and are。
机械类外文文献翻译(中英文翻译)
机械类外文文献翻译(中英文翻译)英文原文Mechanical Design and Manufacturing ProcessesMechanical design is the application of science and technology to devise new or improved products for the purpose of satisfying human needs. It is a vast field of engineering technology which not only concerns itself with the original conception of the product in terms of its size, shape and construction details, but also considers the various factors involved in the manufacture, marketing and use of the product.People who perform the various functions of mechanical design are typically called designers, or design engineers. Mechanical design is basically a creative activity. However, in addition to being innovative, a design engineer must also have a solid background in the areas of mechanical drawing, kinematics, dynamics, materials engineering, strength of materials and manufacturing processes.As stated previously, the purpose of mechanical design is to produce a product which will serve a need for man. Inventions, discoveries and scientific knowledge by themselves do not necessarily benefit people; only if they are incorporated into a designed product will a benefit be derived. It should be recognized, therefore, that a human need must be identified before a particular product is designed.Mechanical design should be considered to be an opportunity to use innovative talents to envision a design of a product, to analyze the systemand then make sound judgments on how the product is to be manufactured. It is important to understand the fundamentals of engineering rather than memorize mere facts and equations. There are no facts or equations which alone can be used to provide all the correct decisions required to produce a good design.On the other hand, any calculations made must be done with the utmost care and precision. For example, if a decimal point is misplaced, an otherwise acceptable design may not function.Good designs require trying new ideas and being willing to take a certain amount of risk, knowing that if the new idea does not work the existing method can be reinstated. Thus a designer must have patience, since there is no assurance of success for the time and effort expended. Creating a completely new design generally requires that many old and well-established methods be thrust aside. This is not easy since many people cling to familiar ideas, techniques and attitudes. A design engineer should constantly search for ways to improve an existing product and must decide what old, proven concepts should be used and what new, untried ideas should be incorporated.New designs generally have "bugs" or unforeseen problems which must be worked out before the superior characteristics of the new designs can be enjoyed. Thus there is a chance for a superior product, but only at higher risk. It should be emphasized that, if a design does not warrant radical new methods, such methods should not be applied merely for the sake of change.During the beginning stages of design, creativity should be allowedto flourish without a great number of constraints. Even though many impractical ideas may arise, it is usually easy to eliminate them in the early stages of design before firm details are required by manufacturing. In this way, innovative ideas are not inhibited. Quite often, more than one design is developed, up to the point where they can be compared against each other. It is entirely possible that the design which is ultimately accepted will use ideas existing in one of the rejected designs that did not show as much overall promise.Psychologists frequently talk about trying to fit people to the machines they operate. It is essentially the responsibility of the design engineer to strive to fit machines to people. This is not an easy task, since there is really no average person for which certain operating dimensions and procedures are optimum.Another important point which should be recognized is that a design engineer must be able to communicate ideas to other people if they are to be incorporated. Communicating the design to others is the final, vital step in the design process. Undoubtedly many great designs, inventions, and creative works have been lost to mankind simply because the originators were unable or unwilling to explain their accomplishments to others. Presentation is a selling job. The engineer, when presenting a new solution to administrative, management, or supervisory persons, is attempting to sell or to prove to them that this solution is a better one. Unless this can be done successfully, the time and effort spent on obtaining the solution have been largely wasted.Basically, there are only three means of communication available tous. These are the written, the oral, and the graphical forms. Therefore the successful engineer will be technically competent and versatile in all three forms of communication. A technically competent person who lacks ability in any one of these forms is severely handicapped. If ability in all three forms is lacking, no one will ever know how competent that person is!The competent engineer should not be afraid of the possibility of not succeeding in a presentation. In fact, occasional failure should be expected because failure or criticism seems to accompany every really creative idea. There is a great deal to be learned from a failure, and the greatest gains are obtained by those willing to risk defeat. In the final analysis, the real failure would lie in deciding not to make the presentation at all. To communicate effectively, the following questions must be answered:(1) Does the design really serve a human need?(2) Will it be competitive with existing products of rival companies?(3) Is it economical to produce?(4) Can it be readily maintained?(5) Will it sell and make a profit?Only time will provide the true answers to the preceding questions, but the product should be designed, manufactured and marketed only with initial affirmative answers. The design engineer also must communicate the finalized design to manufacturing through the use of detail and assembly drawings.Quite often, a problem will occur during the manufacturing cycle [3].It may be that a change is required in the dimensioning or tolerancing of a part so that it can be more readily produced. This fails in the category of engineering changes which must be approved by the design engineer so that the product function will not be adversely affected. In other cases, a deficiency in the design may appear during assembly or testing just prior to shipping. These realities simply bear out the fact that design is a living process. There is always a better way to do it and the designer should constantly strive towards finding that better way.Designing starts with a need, real or imagined. Existing apparatus may need improvements in durability, efficiently, weight, speed, or cost. New apparatus may be needed to perform a function previously done by men, such as computation, assembly, or servicing. With the objective wholly or partly defined, the next step in design is the conception of mechanisms and their arrangements that will perform the needed functions.For this, freehand sketching is of great value, not only as a record of one's thoughts and as an aid in discussion with others, but particularly for communication with one's own mind, as a stimulant for creative ideas.When the general shape and a few dimensions of the several components become apparent, analysis can begin in earnest. The analysis will have as its objective satisfactory or superior performance, plus safety and durability with minimum weight, and a competitive east. Optimum proportions and dimensions will be sought for each critically loaded section, together with a balance between the strength of the several components. Materials and their treatment will be chosen. These important objectives can be attained only by analysis based upon the principles ofmechanics, such as those of statics for reaction forces and for the optimumutilization of friction; of dynamics for inertia, acceleration, and energy; of elasticity and strength of materials for stress。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Title: Modelling of transport costs and logistics for on-farm milk segregation in New Zealand dairyingMaterial Source: Computers and Electronics in AgricultureAuthor: A. E. Dooley, Parker, H. T. BlairAbstractOn-farm milk segregation to keep milk with high value properties separate from bulk milk will affect transport logistics. Separate milk collection, either as independent runs for different milk types,or storage of distinct milk types in the truck and trailer units, may increase the length and number of runs required. Two contrasting regions,with different farm sizes and roading networks were modelled,at two stages of lactation over 20 years. Thirty farms in each region were modelled with 0, 25, 50 and 100% of farms per region changing milk types over a transition period of up to 18 years. Genetic algorithm software was used to search for the order of the farm milk collection pick-ups which gave an optimal, least cost solution for milk collection for each prescribed set of inputs. Milk collection costs within scenario were variable over time depending on the amounts of the different milk types, increasing whenever another run was required, then decreasing over time as the milk load increased. Milk collection cost is small relative to milk income, with the status quo (SQ) cost for milk collection being less than NZ$9.61/kl for the North Island and NZ$13.53/kl for the South Island farm sets. The increased transport costs associated with collecting two milk types ranged from 4.5 to 22.0% more for the different scenarios. The extra cost to an average size North Island farm changing systems (25% farms changing), compared to an equivalent status quo farm, would be between NZ$307 and NZ$1244 per year. Fewer farms changing to differentiated milk production increased the costs per kilolitre of differentiated milk.Keywords: Milk transport; Scheduling; Milk segregation; Collection costs1.IntroductionMilk with high value properties can be segregated from bulk milk, both on-farm and between farms, allowing it to be processed into niche products, e.g., milk with particular proteins such as A2 β-casein or B β-lactoglobulin milk, light coloured milk, organic milk or milk with antibiotic properties. On-farm segregation of high value milk has associated effects on the logistics of milk collection. Currently, New Zealand dairy companies deduct about $0.04/l from farmers’ payouts to cover costs associated with the transportation and storage of bulk milk,and the removal of water at the factory. Milk segregated at the farm is likely to increase this cost because of higher transport and milk storage costs. Separate milk collection, either as independent runs for different milk types, or storage of distinct milk types in the truck and trailer units, may increase the length and number of trips required. Extra vats and milk silos may be also required to segregate milk. It follows that products from segregated milk must command either a higher market value or a reduced processing cost, to offset these additional costs.The software used by dairy and other transport companies to optimise scheduling decisions is commercially sensitive and specific to a compa ny’s particular operation. Furthermore,this software typically relates to the collection of only one milk type.A simulation model for studying transport logistics was, therefore, constructed to quantify these costs and the practicalities of collecting different milks. Increased transport costs associated with milk changing from one type to another were determined by modelling situations where none, 25, 50% and all farms in a collection area changed to another milk type over a 20-year period. Implications for farmers and their milk processor in adopting on-farm milk segregation are discussed.2. Method2.1. Problem descriptionTwo contrasting geographic configurations of dairy farms were modelled, at twostages of lactation (peak and late). The smaller, more concentrated dairy farms were represented by a North Island dairying area and the larger, more dispersed farms were represented by a South Island dairying area. The model was developed using Microsoft Excel spreadsheets, and the Evolver genetic algorithm software to search for the order of the farm milk collection pick-ups which gave an optimal, least cost solution for milk collection for each prescribed set of inputs.A hypothetical set of 30 farms was defined for each region, based on actual farm milk production data supplied by a New Zealand dairy company. The North Island set of farms represented an area with small herds (average=177cowsperfarm) near the factory, whereas the South Island farms had large herds (average greater than 500 cows, Livestock Improvement Corporation (LIC), 1999) on farms physically further apart. Each farm produced one or two types of milk, henceforth labelled “milk A” and “milk B”. Th e collection of each milk type, on each farm, was defined as a separate stop, giving 60 possible milk collection stops. The number of stops and the milk volumes collected varied over the 20 years according to the number of farms changing from milk A to milkB milk and the rate of change between milk types within farms. All herds were seasonally calved in the spring.2.2. Scenarios examinedThe model simulated the effect of some farms within a catchment changing from the production, and segregation, of milk A to milk B milk over time on changing milk volumes of the two milk types, milk collection requirements and collection costs. Four scenarios of change in a milk collection area were explored: no farms (status quo (SQ)), 25% (8 farms), 50% (15 farms) and all farms changing to milk B milk (Table 1). For each scenario, farms were randomly allocated to the two groups (changing or not). North and South Island herds (small and large volumes per stop) and either daily or every other day collections were simulated.The initial percentage of milk B milk on farms involved in a change in milk type ranged from 26 to 47%, with herds randomly allocated to five different gene frequencies associated with the different amounts of milk B. Once 95% or more of the milk from a herd was milk B; it was assumed all milk was milk B, since for practical purposes, it is unlikely a separate stop would be made for 5% of the herd’s production. The time taken for a herd to change from one particular type of milk to another using genetic selection took about 14 years, but this was influenced by the initial number of milk B cows in the herd and associated gene frequency.Table 1 Transport model scenarios runTo simplify the analyses, it was assumed that all farmers would commit to supplying Milk B milk or not,with in the first 3 years.Farms changing to milk B supply were randomly allocated to an initial year of change at a ratio of 3:4:1 for years 1–3 for the 25 and 50% scenarios. Where all herds in a collection area changed, it was assumed that this was a policy decision and that all farms changed in the first year.A bridging point en route, at the edge of the collection area closest to the dairy factory was selected. Consequently, only the distances between farms, farms and the bridging point, and the bridging point and the factory, needed to be recorded. Mellalieu andHall (1981) adopted a similar approach in modelling a milk transport planning model. The distance between the dairy factory and the bridging point was assumed to be 25 and 85km for the North and South Islands, respectively.2.3. Milk production volumesProduction for each farm in year 1 was based on actual production data for the farms in the 1997/98 (North Island) and 1998/99 (South Island) lactations. Milk collection wassimulated for the peak supply day for both the North and South Islands, and the first daywhen all farms were on every second day pick-up during late lactation for the North Island.The flatter lactation curve in the South Island compared to the North Island (LIC, 1999)meant the amount collected on the first day of every second day collection in late lactationwas similar to the daily pick-up during peak lactation, therefore, this scenario was not modelled. These 2 lactation days simulated two points on the seasonal supply milk volume curve from which other transport effects could be interpolated.The average amount ofmilkfortheherdsinyear1atpeaklactationwas3094l(σ =1544)per day for the North Island an d 11577 (σ =3629) for the South Island. In late lacta- tion, this value was 1920l (σ =1036) every second day for the North Island. Milk yield per farm was assumed to increase, based on the historic average, by 1.5% per hectare per year (LIC, 1999). The percentage of milk B produced over the 20 years is shown in Table 2.2.4. Tanker parametersTanker capacity was 11,300l for the truck unit and 17,500l for the trailer unit based on approximately 95% loading for actual milk volumes (Spooner, General Manager Trans-port Operations, New Zealand Dairy Group, Hamilton, 2000, personnel communication).If only one type of milk could be collected during a run, it was assumed that the full amount (28,800l) could be collected in one unit (truck and trailer combined). Total vol-umes of milk A and milk B milk to be collected were checked for each stop and if the tanker was empty, the type with the greater volume was allocated first to the larger trailer unit.While costs can be calculated by separating them into running (per kilometre costs) and hourly costs, the information was not readily available in this format, therefore, a flat rateper kilometre cost was assumed. Costs were estimated from dairy company information tobe $3.45 and $1.75/km for the North and South Islands, respectively, with the former beinggreater due to overheads being spread over the shorter distance travelled.Table 2 Percentage of the total milk supply that was milk B over the 20 years for different rates of farm adoption2.5. Milk collection routesThe model inputs required were:1. A grid with distances between each stop and the factory, and between each of the stops.2. A table with the amount of milk at each stop on a given day (in either peak or late lactation), for each of the 20 years.3. The volume of milk that can be carried in the truck and trailer units.4. Costs per hour and per kilometre, time spent unloading at the factory, time per stop and the average tanker speed. The latter three were used in calculating the time taken per trip.5. The initial sort order for the stops. To set up a run, the number of stops with milk to be collected was counted. These stops were then sorted into one of 12 predefined orders.The orders of the milk collection stops used to initialise the GA were derived using a greedy heuristic (Hesse, 1997). Stops with milk to be collected were sorted by visiting the stop nearest the factory, then moving to the next closest stop and so on until all stops had been visited. Six initial sort orders were generated by ordering stops by milk type within farm order and farm within milk type order, in both clockwise and anticlockwise directions.A further six sort orders were generated by running these sort orders through a program that assumed that once a stop was reached that was unable to be collected(e.g.,wrong milk type, too much milk volume) the program continued to check if further stops could be collected rather than stopping the run there. This ensured the tanker was as full as possible before returning to the factory, but increased the distance travelled per run. This procedure was repeated until all milk was collected. Direction travelled had no effect on distance so it was assumed the tanker would travel in the most efficient direction (clockwise or anticlockwise) in terms of loading, i.e., to the furthermost point on the route first to ensure the load is at a minimum for as long as possible. Consequently, loading was not taken into consideration.The 12 predefined sort orders were used to initialise the GA. The Evolver GA sorted the sequence of the milk collection stops to find the least cost sort order. Milk was collected in sequence of sort order. If the volume of milk at the next stop could not beaccommodated, the tanker returned to the factory. It then returned to the next stop in the sort order to resume milk collection. Evolver default parameters for the order solving method were used for the mutation rate (0.06) and the crossover rate (0.5). Population size was set to 1000 and a random seed was used to generate the sort orders evaluated by Evolver. The Evolver GA was run fives times for each of the 20 years for the North Island, but only three times for the South Island due to the computing time required to derive a solution.The optimum value found by the genetic algorithm search method may not necessarily be the actual optimum value (Buckles and Petry, 1992). Therefore, a direct comparison between two scenarios in a particular year cannot be made definitively, as the optimum value identified for one scenario may be closer to its actual optimum value than the other. However, if it is assumed that over the 20 years, the average deviation of values from their actual optimum is similar for all scenarios then this search method is likely to be effective in comparing the various scenarios.The optimum (least cost scenario) for each year was written to a summary output page. Other information included the number of stops and runs, the distance travelled, the time taken,the volumes of milk A and milk B milk, and the order of the stops, highlighting when the tanker returned to the factory.The time taken to collect and return all the milk to the factory was derived, even though this value was not used directly for calculating milk collection costs. Time taken was estimated to be half an hour for the turn around at the factory and 0.2h (12min) per stop. Average tanker speed was estimated to be 70km/h in the North Island and 80km/h in the South Island. Travelling time was calculated as kilometres travelled divided by speed. The proportional increase in the number of tankers required to collect all the milk was the difference between a scenario and its associated status quo option, assuming all milk must be collected within a set time period, e.g., every 24h during peak lactation.2.6. Milk collection costing methodsTwo milk collection costs were applied to each scenario. First, the average collection cost per kilolitre of milk was calculated for each of the 20 years, i.e., the extra cost associated with transport of differentiated milk was spread across all milk. Second, a “user pays” or marginal cost approach was applied where the extra cost relative to the SQ associated with collecting differentiated milk was assigned to milk B. Thus, extra costs were assigned to those switching to milk B milk. There was considerable variability within years making it difficult to compare between scenarios (Dooley, 2002). Hence, costs were discounted overthe 20 years and a constant SQ cost per kilolitre for the 20 years calculated which gave an equivalent overall cost. This cost was also used for milk A. The remainder of the cost was allocated to milk B and a constant milk B cost per kilolitre was calculated in a similar manner. These methods are described more fully by Dooley (2002). The single value for milk A and milk B transport costs enabled comparability between scenarios. Discounting takes time into account when comparing costs by converting costs for all years to year 1 values.Dairy companies charge farmers a per litre volume charge which covers volume related costs, including transport. The extra on-farm costs associated with milk collection were calculated for a North Island farm and a South Island farm. Costs were calculated for 25 and 50% of farms changing, with both types of milk able to be collected in a run. Farms were assumed to start differentiating milk in year 1. Peak milk collection costs only were used for the South Island. For the North Island, with a much more pronounced seasonal milk supply curve, the average of the peak and late lactation costs were used. The North Island farm was assumed to produce 574,884 l per lactation in year 1 (the average for the data set), and the South Island 2,097,676l (LIC, 1999).3. Results and discussion3.1. Average milk collection cost3.1.1. Comparison with the SQ (0% of farms changing) ThedifferenceintheaveragemilkcollectioncostsbetweentheSQandthedifferentiatedmilk scenarios for all years ranged from 4.48% less to 26.86% more for the differentiatedmilk scenario (Table 3). Differences were most variable for the North Island peak lactationoption. The average cost per kilolitre for milk collection in the North Island during peaklactation for 0, 25, 50 and 100% farms changing is shown in Fig. 1 for every alternate year.3.1.2. Stage of lactation comparisonTotal collection costs are greater at peak than late lactation because of the larger volumeofmilk;however,costsperkilolitreweregreateratlatethanpeaklactationbecauseoflonger distances travelled to collect an equivalent volume of milk. Average North Island collectioncosts per kilolitre over the 20 years were 16.4, 14.7 and 14.1% more in late lactation ascompared to peak lactation for SQ, 25 and 50% of farms changing to milk B production,respectively.Averagemilkcollectioncostsperyearrangedfrom1to23%moreperkilolitrein late lactation than peak lactation and this variation could be explained almost entirelyby the number of trips required to collect the milk. Costs were 12–23% more per kilolitrefor late lactation milk where only one less trip was required to collect milk in late lactationas compared to peak lactation. Once the collection of peak lactation milk became less efficient (two extra trips for peak lactation milk collection) the difference was only 1–2%more.Late lactation costs were not calculated for the South Island because production was about half that of peak lactation, therefore, collection costs per kilolitre once all herds wereon every second day collection (185 days after peak lactation) would be similar to peak lactation. In contrast, North Island production was about 31% of peak lactation, once allfarms were on every second day collection (203 days after peak lactation).Factors other than milk volume relative to peak lactation volumes may influence the change to every second day milk collection. For example, changing to two milk types may mean a farm moves to every second day collection sooner, particularly during the transition years, when the volumes of one or both milk types would be less than for theSQ situation. Although not investigated, costs per kilolitre may be greater still at the endof lactation, or prior to all farms going on to every second day collection, as the volumeof milk collected per stop will be lower at these times than for the situation modelled forlate lactation. Modelling the final stages of lactation would be complex as not all farmsswitch to every second day collection at once, nor do all herds cease lactation on the sameday.3.1.3. Variation in average milk collection costs over the years Withineachofthescenarios,milkcollectioncostsvariedovertime(Fig.2).Thecostper kilolitre increased sharply once an extra run was required to collect the milk, thendeclinedgradually as the tanker loads approached capacity volumes, thus spreading costs over agreater volume of milk (Fig. 3). As the number of farms changing to milk B productionincreased, the likelihood of having partial loads of one or the other milk types increased,resulting in greater variation in the collection costs over time.The number of tanker runs had the greatest impact on milk collection costs because most of the distance travelled was getting to and from the milk collection area, rather thancollectingmilkfromthefarmswithinthearea.Forexample,inthepeaklactationSQscenario for year 1, and assuming a flat per kilometre cost, 91.6 and 86.0% of the collection costsfor the North and South Islands, respectively, were for travelling to and from the collectionarea. Thus, the first priority in determining the order of the stops for milk collection is to ensure the loads are as close to capacity as possible. The distance travelled around thestops within a collection area is of secondary importance. The balance of milk types in thetransition years can affect the number of runs required as is shown by year 16 in Fig.3. Inthis year, milk A and milk B milk volumes are similar and all milk can be carried in fourtrips, whereas in years 15 and 17, the slightly greater amount of either milk type means anextra trip is required with consequent cost increases.This variation in collection costs affected the difference between the SQ and farmschanging options. Some of the more extreme differences in collection costs between theSQ and other options occurred in years where the average cost was decreasing for the SQoption but increasing for the differentiated option. This is illustrated by the North Islandpeak lactation costs for years 15 and 16 in the 25% option, 14 and 15 in the 50% option,and 12–16 in the 100% option. In most of these cases, the cost per kilolitre exceeded theSQ cost by more than 20% in that year (Table 3).In general, average costs for milk segregation were greater than the SQ in the middle tolater transition years (Table 3) once most of the milk had changed to milk B. North Islandlate lactation results did not show this to the same extent, probably because the number oftrips remained the same (three) for all scenarios over the 20 years. The South Island earlylactation results are not as marked as those for the North Island and in some instances, thecollection of two milk types in the South Island was more efficient than the SQ scenario because the smaller lot sizes allowed the tanker to carry closer to capacity volumes (e.g.,year 13, for 25% of the farms changing to milk B, fewer trips were required than in the SQscenario).3.2. Technology adoption time frame ThemodelassumedallfarmschangedtomilkBovera20-yearperiodthroughselection,with a 3-year technology adoption time frame. These assumptions simplify reality.Farmerscould, for example, adopt a number of policies to move toward producing a different milktype. As well as changing the herd over time through breeding, they could also buy and sellcows to accelerate the change to one milk type (reducing or eliminating transition years),maintain split herds as a policy to spread risk, or adopt a combination of policies. The farmers changing to milk B production are likely to adopt a range of management policiesand this will impact on the rate of technology adoption. Any combination of transitionalmanagementpoliciesandtechnologyuptakewithina20-yearperiodcanbeexploredwithin the model.Factors other than farmer policy may affect the amount of milk produced over time and associated transport costs. A dairy company may pay on the level of a component in the milk rather than segregating the milk so that all milk B milk would be collected together from the start (i.e., no transitional years). If there are no transitional years and those farms changing produce all milk B in their first year, then the increased transportcosts are likely to be lower, e.g., similar to the last 2–3 years modelled. Alternatively, where transitional years apply, the initial amount of milk B produced will be depen- dent on the level in the herd, e.g., selection on a qualitative trait with a higher or lower gene frequency. Where there is a higher initial proportion of milk B, a comparison can bemade from the year that starts with that proportion. However, in this situation the first fewyears may be inaccurate, as the rate of technology adoption will not have been taken intoconsideration.3.3. Average minimum load sizeThe average minimum load in the North and South Islands was compared for years 11–20 at peak lactation with 25% of the farms changing to milk B milk. The North Islandaverage minimum load was less than for the South Island (average minimum load was 54.4% of capacity for the North Island as compared to 71.3% for the South Island). Thesmall number of farms modelled would have affected these results, particularly in the North Island where the number of runs required was small (3 or 5) relative to the SouthIsland where 13–18 runs were required. However, the average capacity of the remainingloads was slightly greater for the North than the South Island, i.e., 94.3 and 92.6% for the North and South Islands, respectively. These results gave an overall average tankerload of 86.0 and 91.3% of capacity, for the North and South Islands, respectively. The better South Island loading rate reflected the greater number of runs required to col- lect all the milk, with most of the loads at near to full capacity. In practice, a larger number of farms in a collection area would enable tanker capacity to be more fully utilised.3.4. Farm and herd sizeThe 30 farms were assumed to remain the same size over the 20 years, whereas currenttrendssuggestthatbothfarmsizeandherdsizeareincreasing(LIC,1999).Farmamalgama- tions are, therefore, likely to occur over the 20 years. While this would reduce the numberof stops and increase the amount of milk per stop and farm, the total milk collected fromthe geographic area incorporating these 30 farms in the North Island may not differ greatlyfrom that predicted, assuming the increase in per hectare production (1.5% per annum)remains similar. Fewer farms would, however, affect the milk collection pattern with pos-sibly 2–3 farm stops per run in the North Island rather than 5 or 6 as modelled, giving a farm distribution and milk collection cost pattern similar to that of South Island. SouthIsland milk production within a given area is likely to increase through farm conversionsto dairying (MAF, 2000). This would reduce collection costs per kilolitre slightly becausethe tanker will travel shorter distances within a set geographic area to collect a full load ofmilk.3.5. Time taken for milk collection and tanker requirementsDifferences among the scenarios were small for the time taken to collect the milk over the last 2–3 years, when all farms produced milk of one type or another (0–5% more time than the SQ). The difference in time taken between the SQ and segregation scenar-ios tended to increase as the number of farms changing to milk B increased. The overallaverage difference in collection times between the SQ and the other scenarios at peak lactation in the North Island for 25, 50 and 100% of farms changing was 12.7, 23.0 and 45.0%, respectively. The greatest difference between the SQ and the other scenar- ios for 25, 50 and 100% of farms changing was 23.2, 38.4 and 65.2%, respectively. In the South Island, the difference in most cases was less than 10% (averages of 4.0 and 7.5%, maximums of 9.5 and 13.3%, respectively, for 25 and 50% of farms changing). Asfor costs, a direct time comparison between scenarios within years cannot easily be madebecause time taken to collect milk is not solely affected by the number of runs (see Sec-tion 2). However, while it offers simplicity a flat per kilolitre rate may not fully accountfor labour costs or the extra time required for more stops where farms are changing milktypes.3.6. User pays cost calculation methodDairy companies are unlikely to pass actual extra costs on to farmers changing milk type policy at rates that vary markedly from year to year. However, the “user pays” methodallowed the likely extra transport costs to be passed on to farmers changing policies to bedetermined and this is spread over the 20 years. The overall difference in total collectioncosts between the SQ and other policies within scenarios using this pricing method rangedfrom 0.8 to 7.0% at a 7% discount rate (Table 4).The SQ cost per kilolitre for late lactation milk collection was 17.5% more than for peak lactation ($7.56 cf. $8.89 for peak and late lactation, respectively). South Island milkcollection costs were 73.8% more than for the North Island at peak lactation ($7.56/kl cf.$13.14/kl for the North Island and the South Island, respectively). The actual extra costsassociated with milk B milk collection at peak lactation and late lactation were almost the same in the North Island with 25% of farms changing, i.e., 9.23−7.56=$1.67/kl and 10.57−8.89=$1.68/kl. The difference with 50% of farms changing was less in late lactation than in peak lactation, i.e., $0.87 versus $1.06/kl, respectively. The difference。